Вы находитесь на странице: 1из 176

OPTIONS

QUESTIONS A B C D
TALLY
The ------ key can be used to select an
existing company from list of None of the
companies. F1 ALT+F1 CTRL+F1 above
Import and Export of data between
Tally and other programs is possible None of the
only through ---------- Program. Tally ODBC Tally IMP Tally INI above
The re-order point is the inventory
quantity that trigger a stock
replishment activity. TRUE false
A created company's detail can be None of the
modified through keys F3 ALT+F3 CTRL+F3 above
A/An ------------- is the official notice that
the firm sends to its customers to
advise then to the amount of money None of the
that
In is owed.
tally,all masters have ________main Invoice Bill A or B above
options Two Three Four Five
In tally,to create a new column in None of the
balance sheet press _______ Ctrl+C Alt+C Alt+Ctrl+C above
In tally,the use of group behaves like a
sub-ledger, option is that we can
summarize many ledger accounts into
one line statements TRUE FALSE
In tally, we can alter ledger details
using either single or multiple modes
but not alble to delete a ledger from
multiple modes. TRUE FALSE
In tally,a group company is marked with
an ______________ * $ & ^
Puchasing,
The systems that work together to Puchasing Puchasing Accounts Receiving and
order,receive, and pay for and Accounts and payable and Accounts
replenishment of stock are --------------- payable Receiving Receiving payable
Tally allows to delete a ledger from Mone of the
--------- alteration mode. Single Multiple A or B above
--------------------- is/are useful for Cash Flow Fund Flow Ratio All of the
management in the decision making. Statements Statements Analysis above
In tally,the group company must
contain at least _____________ members Two Three Four One
To cancel a vourcher entry in Tally,
short-cut key is ----------- Alt+D Alt+X Ctrl+T Ctrl+D
The accounting masters and inventory Create Alter Display All of the
masters related to Information Information Information above
We press ------------- function key to
display the age-wise analysis of Bills
Receivable
In Tally, we or Bills------------,
press Payable report
to print F4 F5 F6 F7
None of the
report . Alt+P Ctrl+P Shift+P above
In Tally, Types of Accounts and Types of
Vouchers passed during the period, can
be seen in ------------- report. Tally Audit Statistics Day Book Journal Book
In the Tally Software, the ------------
directory stores all data entered by the None of the
user. Bin Data Sub above
The Ledger Accounts are unique in
Financial Accounting Packages True False
Customers can be permitted to enter Electronic
their own data into the firm’s computer Enterprise Enterprise Data
using the firm’s wide area network is an Data Data - Interchang
example of Interchange Information e. All of the above
In Tally, we can customize the Vouchers
as per our requirements TRUE FALSE
The number of steps in Accounts
Compilation are 2 3 4 5
Each action/transaction of a firm is
described by a ----------------. data element data record Field All of the above
Tally is based on mercantile accounting
system FALSE TRUE
Display stock
valuation Open Change None of the
Ctrl + N is used to ----------- method Calculator Period above
------------- in Tally classify the accounts
under different heads so that None of the
summarised information is possible. Ledgers Groups Journals above
Revenue Account also known as None of the
-------------- Account Personal Nominal Real above
All of the
Method of Voucher Numbering is/are Manual Automatic None above
Balance
Accounts Receivable are displayed in Sheet Profit & Loss Journal Book All of the above
Physical
To assemble a product from different Stock Stock Reversing
items -------------- entry is used Journal Journal Transfer Journal
A --------- purchase orders data flow is
directed to the purchasing system for
use in closing out the outstanding
purchase orders in the receiving None of the
system diagram. Filled Receipt Issue above
Tally provides at least ---------
predefined voucher formats 11 16 18 21
The value of the inventory is included
in a ledger accounts as an asset on the
balance sheet FALSE TRUE
" The buyers can follow up with the manageme
suppliers to determine the reasons " is management nt by electronic
an example of ----------------- by objective exception data analysis All of the above
From voucher entry mode , if we press
__________ then we get payment
voucher in tally F4 F5 F6 Alt+f5
Primary
Default Cost Category in Tally is/are Main Cost
-------------- Location Primary Category All of the above
A Group Company is simply a name and
an identify given to the merged
accounts member companies of the
group. True False
A ----------- is a primary document for None of the
recording all financial transactions. Ledgers Reports Vouchers above
The field can have a value between
________________ in FA Package. 0 to 9 1 to 100 10 to 60 None
The _______ file maintains data that
describes the supplier past transaction
with the firm in terms of material
quality in AIS Supplier Suspense Order All of the above
It is necessary to manipulate data to None of the
transform it into ---------------- Report Output Information above
In tally, to change the date of the
voucher press ______ F2 F4 Ctrl+f2 Ctrl+f4
Tally can maintain budgets on Net Closing None of the
---------------- Transactions Balance A and B above
The value of the inventory is included
as an asset on the balance sheet True False
In ratio analysis report of Tally FA
packagewe we press ________________
function key to the display of bills F6 function Alt + f6 F7 function None of the
receivable , bills payables report key function key key above
The accounts payable system is
responsible for paying the suppliers for None of the
the ----------------- Sales Purchases A or B above

What is the default financial year in 1-4-1995 to 1-4-1996 to 1-4-1997 to None of the
Tally6.3 _________________ 31-3-1996 31-3-1997 31-3-1998 above
Tally encrypts and stores TALLY DATA
at the data directory True False
The Profit & Loss statement can be None of the
displayed in ---------------- format(s). Horizontal Vertical A or B above

Balance
sheet & profit
& loss profit Profit & loss Cash and
Default ledger accounts in tally are & loss and and trial profit &
______ trial balance balance loss Cash and bank
Default 'godown' name in tally is Main None of the
____________ Primary location A or b above
Security Cost None of the
'Tally vault' is a _________________ mechanism Ledger a/c category above
To create a sales voucher in tally , you
have to press _______ F5 F7 F8 F9
A Group Company is -------------------------
given to the merged accounts of None of the
member companies of the group. a name an identity A and B above
In tally,"credit note" voucher type Purchase None of the
records entry for ________________ Sales return return a or b above
In tally you get currency symbol option Company Stock items Regional None of the
from _______ menu creation units setting above
------------------ gives the balance for each
day for the voucher type has been Balance None of the
selected. Trial Balance Daybook Sheet above
For 'stock journal' entry we press
______________ in tally F7 Alt + F7 F10 F11
Tally provides the capability to the Changes in Changes in
administrator/auditor to track changes transactions Ledger Both A and None of the
in the
In tally,areas
types is/are
of users are or vouchers Masters B above
_______________ 2 3 4 1
By pressing -------- key, a list of
inventory reports can be displayed
straightaway from the balace sheet
report F9 F10 F11 F12
Projected approximation of income or Balance Profit & loss
expenses is called ______________ . sheet a/c Budget None
"Administrator" type user is also called
'Auditor' of a company in Tally TRUE FALSE
You will get company information , if
you press __________ from gateway of None of the
tally F3 Ctrl+F3 Alt+F3 above
A constituent(member) company can
be a member of more than one group. TRUE FALSE
Default stock category in tally is ______ Main location Primary Symbol None of them
To create a log of the import
activity in a file _____________ is
located in the same directory as an
executable program in tally Tally.imp Tally.ini A or b None
In Tally,inventory valuation method Stock Stock None of the
option is available from _______ summary Stock journal analysis above
In 'comp info
By pressing During the -> security
Tally audit feature is available in a F11 function creation of control'
company __________________ key a company option None
In tally, a group company can also be a
constituent(member) of another group
company
Default number of groups in tally are TRUE FALSE
________ 128 228 28 16
During voucher entry ------------- are Ledger
used. Accounts Groups Sub-Groups B or C
User designated as --------------- can view Administrat
audit list. or Owner Data Entry TallyVault
One
company to Other
another programs - a
company spreadsheet
created or a
Tally supports Importing of data from withon Tally database Both A and None of the
---------------- Package file. B above
In an accounting information system,
which of the following types of Cash
computer files most likely would be a Inventory disbursemen Cash Payroll
master file? subsidiary. ts. receipts. transactions.
Will be
Does not more Eliminates the
require as Will produce efficient at need to
Which of the following is an advantage stringent a a more producing reconcile control
of a computer-based system for set of accurate set financial accounts and
transaction processing over a manual internal of financial statements subsidiary
system? A computer-based system: controls. statements. . ledgers.
data that
has been the address an instruction
data to be transferred of a that has been
The memory address register is used to transferred to from memory transferred from
store memory memory location memory
FUNDAMENTALS OF COMPUTER
System
Inefficient usage of excess computer Contingency feasibility Capacity Exception
equipment can be controlled by Planning report Planning reporting
Which of the following is not the
component of a CPU NIC Card VSAT RAM AGP Card

A trailer label is used on a magnetic


tape file, it is the last record and Control totals
summarises the file. The following is an Identificati for one or End-of-file and
information not found in the trailer label Record Count on Number more fields end-of-reel code
Storing
information
Writing on a Printed on the hard
Hard copy is a term used to describe...? hard board output disk None of above
Voice
What do the abbreviations VAB stand activated Voice Visual
for broadcasting answer back audio board None of above
What control would prevent the File
accidental erasure of customer Validity Boundary protection Limited access
information from a magnetic tape check protection ring files
What are the individual dots which
make up a picture on the monitor Coloured
screen called? spots Pixels Pixies None of above
Header label normally include all the Identification
following except the File Name number Reel Number Batch Total
Storage Pointing
A daisy wheel is a type of...? Printer device device None of above
Which approach or technique is a
control usually associated with Physical
microcomputers System Logs Security Console Log Data Dictionary
An inked
An impact printer creates characters by Electrically ribbon and
using...? charged ink An ink pen print head None of above
Restrict Use only
The best security control in a physical unremovabl Require user Make duplicate
microcomputer
What would youenvironment
NOT use withisatoflatbed access e media passwords copies of files
plotter? A pen Paper Eraser None of above
What do you need for an ink jet printer? A cartridge A drum A ribbon A cassette
Centralised Centralised
The greatest control exposure in a function for function for Distributed
microcomputer environment is the lack Separation PC PC policies or
of of duties acquisition Disposition procedures
A laser An INK
A laser printer does NOT use? A print head beam RIBBON None of above
The amount of data that a disk may Storage
contain is known as the disks...? Volume Size capacity None of above
Read and
You can ________ protect a floppy disk. Read Write Write None of above
Information on a hard disk is usually Magnetic
backed-up using a...? tape PAN drive Floppy disk None of above
Serial Random A parallel
access access access
Magnetic tape is a...? medium medium medium None of above
Hard disks can have a storage capacity
in the region of...? 1.44MB 20 GB 700MB None of above
Magnetic
Which storage device has the largest tape
capacity in Mb? A CD-ROM A floppy disk storage None of above
Which storage device cannot be Magnetic
erased? A CD-ROM A floppy disk tape storage None of above
By a sunny By magnet
Where should floppy disks be stored? window objects In a drawer None of above
The contents of these chips are lost
when the computer is switched off? ROM chips RAM chips CDROM chips None of above
What are responsible for storing
permanent data and instructions? RAM chips ROM chips DRAM chips None of above
Which parts of the computer perform
arithmetic calculations? ALU Registers Logic bus None of above
What are small high speed memory
units used for storing temporary
results? CPUs Registers Control unit None of above
How many bits of information can each
memory cell in a computer chip hold? 0 bits 1 bit 8 bits None of above
What type of computer chips are said to
be volatile? RAM chips ROM chips CACHE None of above
Systems
Network software Business
software and and software and
security application
games None of the
Software can be divided into two areas: software software software above
Travel agents use this computer system Supercomput Personal Mainframe
when reserving flights er computer computer None of above
Jon Von
Which computers are used in the Notebook Supercomp Neumann
weather forecasting industry? computers uters computers None of above
Vacuum tube based electronic First Second Hoover
computers are...? generation generation generation None of above
Which generation of computer was Second First Fourth
developed from microchips? generation generation generation None of above
Which generation of computer uses Second Third Fifth
more than one microprocessor? generation generation generation None of above
Which generation of computer Second Third Fifth
developed using integrated circuits? generation generation generation None of above
Which generation of computer
developed using solid state Second Third Fifth
components? generation generation generation None of above

DATABASES
Analysis,
System
Specificatio Programmin Design, and
Name three steps involved in n, Design, g, Design, Implementati
developing an information system and Testing and Testing on None of above
_______ is used for CAAT as database Oracle ACL JCL none the above
Generalized audit software perform
auditors to undertake any past records
and not concurrent auditing TRUE FALSE
Generalized audit software is a file
whose capabilities for verifying
processing is logic TRUE FALSE
CAAT's are computer program and data
that auditor uses as part of the audit
procedures to process data if audit
significance contained in an entity
information system TRUE FALSE
CAAT do not contains package
programs, purpose written program,
utility programs or system
management programs yes no
Embedded audit routines are
sometimes built into an entity's
computer system to provide data for
later user by the auditor TRUE FALSE
SCARF involves embedding audit
software modules within an application
system to provide continuous
monitoring TRUE FALSE
Concurrent use auditors as the member
of the system TRUE false
Regular cross system verification may
minimize frauds true false
Computer security is frequently
associated with confidentiality, integrity
and authentication true false

Data reserve engineering process


metadata to document system and
abstract business rules and relationship true false
to review and
determine evaluate the
The first step for developing CAAT the audit types of to obtain a extract data
is_________ objective data record layout from file
can bring can bring
Using the open database connectivity the data the data none of the
feature in ACL is ______________ directly indirectly all the above above
Computer Assisted Audited Technique
involves the use of computers through
"Black Box Approach" True False

White Box Approach necessary involves


expert knowledge on the part of Auditor True False
change in the
method of
The transition from manual system to recording use of
CIS environment bring dramatic accounting accounting absence of
changes including ________________ transaction codes audit trails all the above
documents
Auditing with computer necessarily driven risk driven unique none of the
supports the approach approach approach above
processing
hardware options, file
CAAT involves an Auditors' appreciation and software data checks and
of __________ configuration structure controls all the above
Widespread end use computing result
in unlimited errors creeping into system
going to accept handling, thereby
increasing audit risks true false
For computerized auditing usage of
sophisticated audit software would be a
necessity true false
the source
of data
available to source of
the audit data for
Important knowledge needed to begin organizatio material
planning the use of CAAT is _________ n planing all the above none of these
The move towards paperless EDI would
eliminate much of the traditional audit
trail, radically changing the nature of
audit evidence true false
providing
access to
computer to
all
Computer operation controls are the of by all organization use of any none of the
designed to provide ________________ concerned personnel programs above
Systems development control, apart
from others, include authorization,
approval, testing, implementation and
documentation of new systems
software and system software
modification true false
natural/man- conceptual/p
A system could be _________ made open/closed hysical all of them
A system exhibits 'entropy' true false
Super computer are the largest and
fastest and is very suitable for
commercial application including audit
work
Assembler language uses Mnemonic true false
symbols true false

manage enable
Operating systems are devised to hardware & multiple user
optimize the machine capabilities, the scheduled software resource
function include_______________ jobs resources sharing all the above
General purpose software provides a
framework for highly complex scientific
operation true false
In batch processing, transactions are
processed one after another true false

The use of computer assisted audit with audit with


techniques is not gaining popularity not department production
only ________________ s departments all the above none of these
On-line processing refers to grouping of
transaction and processing the same in
one go from start to finish true false
Real time refers to the technique of
updating files with transaction data
immediately after the occurrence of the
event to which it relates true false
In OLRT the CPU should process the
capability of program interruption true false
Time sharing system allow access to a
CPU from remote terminals true false
DSS is defined as a system that
provides tools to managers to assist
them in solving structured problems true false
DSS has the following components planning
_________________ databases language model base all the above
Master files contains current records for
identification and summarizing true false

Transaction files contain relatively


permanent records take product profile,
customer profile, employee profile etc true false
Master file configuration includes reference none of the
____________ files table files report files above
______ is a file management software
package that lets users and
programmers organize data into files file
and then process those files filex file-o-man manager filepet
to have a
complete decentralize
CAATS provide added value to the picture of a d picture of none of the
clients because _______________ system a system all the above above
File volatility refers to the number of
addition and deletions to the file in a
given period of time true false
File activity is the proportion of
transaction file records that are actually
used and accessed in a given
processing run: true false
File interrogation refers to the _____ of
information from a file back-ups retrieval deletion addition
One -to-one relationship means a single
entity to a single entity in a
monogamous structure true false
RDBMS is structured to a series of 2
dimensional tables true false
seriously subject
affected area software and safety and
SADB stands for ____________ database database database database
Controls are present over many aspects
of the computer system and its
surrounding social environment true false
In framed checking the data entry is
checked against an expected picture or
format true false
at the year immediatel on quarterly none of the
Errors are correlated_________ end y basis above
Field check is exclusive to a field true false
_________ law basically states that there
is a specific probability of the first digit none of the
of a no. being 1,2,3 etc Benfish Benford Benjamin above
Check digit is a group of nos. added to
a code for determining the accuracy of
other digits in the code true false
blocks of
nos. to the
consecutive primary
nos. or attribute of random
alphabets to the the placement of none of the
Hierarchical code means _________ entities entity component above
The validation checks applied to a field
depend on the field's logical inter
relationships with other fields in the
record TRUE false
The contents of a field could determine valid, invalid, none of the
_______ sign for a ______ field numeric alphabetic above all the above
Batch is the process of ______ together
_____ that bear some type of grouping, regrouping, none of the
relationship to one another transaction events above all the above
Hash totals means meaningless totals true false
With OLRT where interactive data entry
is available, the master file associated
with a transaction may be searched for
confirming data true false
Controls are required for authorization
to ensure data integrity and detect
possible breaches in security true false
Data from client application are not
stored in the organization's database
through auditables events and function true false
All input records in a batch are normally
of different types true false
interactive
incremental data interactive
design and extraction data
IDEA stands for enlarge and innumerable none of the
_________________________________ activity analysis analysis above
A transaction file is sorted prior to the
update of master file true false
A sequence check on the transaction or
master files by an update program is
not required true false
Whenever monetary transactions are
processed against master files, the
update program should maintain a
correlation account to record such
transaction that does not have a
matching master file record true false
Internal tables are stored tables from
which certain values are extracted for
further processing and storing true false
For small to medium sized systems,
individual modules are coded and
individually tested and then assembled
to be tested as a whole-the testing
strategy is referred to as bouncing
___________________ e-brain ball big-bang stub
In systems testing, test bottom up top-down
involves_________________ tests tests hybrid tests all the above
Recording transactions in a controlled
manner may amount to loss of stored
data yes no

re-perform
procedures
provide carried out
Audit software is used by the auditor to read data on information by the clients
_________ client's file to the audit programs all the above
Core image comparison is a software
used by the auditor to compare _______
version of a program with a secure executables deleted, none of
________ copy , master hard these all the above
Database analyzer is a software which
provides detailed information
concerning the operation of the
database true false
system system
analysis advanced none of the
SAS stands for ______________ software software all the above above
Embedded code is a software used by
the auditor to examine backup data true false
Embedded code performs wide variety
of audit task yes no
Core image comparison is particularly
useful where only executable versions
are distributed true false
Log analysis is a software used by
auditor to detect virus true false
On line testing techniques the auditor
______ data either _______ or fictitious in
order to see that a specific program or manipulate none of
sever edit test is doing its work s, real create, false these all the above

Mapping software is used by the auditor


to list unused program instructions true false
Mapping software has very objectives yes no

can enable
the auditor can provide
to execute the auditors
can be very provisions with useful
powerful on a number information
Modeling is a variety of software which analytical of different with trend s all of the
________________ tool bases and patterns above
On line testing can be targeted for
specific functions carried out by
programs yes no
examinatio
identifies n of source
program code of a
provides code which program
detailed may be with advice
information there for to following
Program code analysis involves of machine fraudulent the logic of none of the
_____________ uses reason a program above
__________ is a software of CAAT IDEA ACL ALC ACLL
Snapshot is software which takes a
picture of a file or data or a transaction
passing though the system true false
fictitious
data
applied comparison
against the of source analyzing the
Base case system evaluation client version of a picture of a
includes____________ program programmed file or data all the above
While base testing forces on finding if
there are any defective execution
policies in a program true false
Black box testing seeks to determine
whether application output is what it is
supposed to be true false
In integrated test facility approach the
auditor should ensure that the impact
of test transaction is subsequently
eliminated from the computer files true false
Black box testing is _______ based and specificatio file, none of the
white box testing is _______ based n, program hardware above all the above

identifying identifying identifying


erroneous ineffective non-standard
Source code review means__________ code code code all the above
In formula in flow hypothesis the
auditor should expand the extent of
substantive tests to determine how the
defects may impact the attainment of
the program objectives true false
All material application oriented events
that occur within the boundary
subsystem should be recorded in the
accounting audit trail true false
authenticati
In examination of audit trail the on of
following data associated with an event start and information resource
may be ___________- finish time support requested all the above
job
job control connectivity none of the
JCL means_________________ language language all the above above
Audit should be periodically analyzed to
detect any control weakness of the
system yes no
In an accounting audit trail, intrusion
detection system might monitor the
amount of processor time consumed by
the user to detect unusual deviation
from the amount processor time
requested by the user in the past true false
A sample size calculator program
assists auditors in determining RAND()
function true false
package
computer
p[program
for
performing
a variety of
data
Generalized audit software consists processing mathematic master list of administered
___________ function al concept transactions questionnaire
prepared by
an outside
programmer
Specializes audit program may prepared by prepared by engaged by
be___________ the auditor the entity the auditor all the above
Generalised audit software could be
used by the following in consistencies
or significant fluctuations true false
stratification
file statistical/ari and
Generalized audit software function access/organi thmetic frequency
include____________ zations operation analysis all the above
In the file reorganization merging
capabilities are needed in data from
separate file is to be combined on a
separate work file true false
Auditors cannot use generalised audit
software to extract the data needed for
audit purpose true false
Auditors can combine functional examining
capabilities of generalized audit the quality of carrying
examining
software to accomplish the task of system analytical
the quality of
__________________ process reviewdata all the above
Wide access Can extract
Can aid in Can define the
Which of the following is not the feature to various and analyse
simple audit
of GAPs data base data selection objectives
High End All of the
Which is the example of CAATs ACL IDEA CAATs above
A special
A sample of A utility purpose
transaction software written None of the
In audit procedures, test data is s programme program above
Compliance
Tests of Analytical tests of
Which of the following is not the use of details of review general EDP All of the
CAATs transactions procedures controls above
Which of the following are called Action Event General
explicitly by another procedure? Macros Procedures Procedures Procedures
_________ data type is generally used for
fields assigned as primary keys in a primary
table integer number number auto number
MS access objects can be published in
the web true false
In code-builder, got_focuse,
click,dbl_click,enter are examples of none of the
_______ actions events procedures above
_______can be used to automate certain
actions in response to events report form chart macros
In the macro sheet the macro is expression
selected in the _____field macro elements comments action
To build complex expressions_____is expression expression
used calculator code builder builder elements
The three list boxes present at the expression
bottom of the expression builder are elements none of the
called_____ action list macro list list box above

________option is selected from the view none of the


menu to create macros with conditions conditions action insert above
_______report can be created with
minimum user input tabular columnar auto report embedded
_______layout of a form displays one
record at a time tabular columnar datasheet justified
The table or query name on which we
are going to build our report is selected embedded
from the ____ dialogue box create report link report report new report
______and_____are the two types of auto columnar stable and dynamic and none of the
reports available and tabular unstable static above
There are no wizards for creating a
database in access true false
______option from the insert menu
option is chosen to add an embedded
chart create fields add chart chart insert chart
In ms-access, while using SQL,
references constraint is used for alternate none of the
creating _______ primary key key foreign key none
aboveof the
_______is used to create a mailing label label wizard chart wizard mail wizard above
______header is present at the group
beginning of the report start header header page header report header
______is present at the bottom of each page none of the
page in a report report footer footer group footer above
for
specifying
conditions
In SQL, having clause is used for for ordering for updating with group none of the
_________ records records by clause above
______field is added to the macro sheet
when we select grouping option from macro none of the
the view menu condition group names above
______can be used to create toolbars VB Modules reports forms macros
_______query is used to add records
from one or more tables into an existing
table add append insert delete
_______window is used to write VB code none of the
in access application report macro sheet module above
Values for other tables, queries are
maintained in look up fields data type true false none of the
Visual Basic language is a _____ tool RAD RAP RAID above
______ function is used to display a none of the
message box SysCmd MsgBox message above
Other ms-office applications can be
accessed from ms-access using a none of the
concept called ________ OLE DDE CME above
object
linking and on line on line none of the
OLE stands for_____ embedding execution editing above
The application that supplies data in OLE
OLE is called an _________ OLE object OLE client OLE server communicator

If any change made on the object from


the client side is reflected on the server
then the object
_______is the fileisformat
said tothat
be _____
works on linked embedded connected edited
internet exe DLL BMP html
______ is used to convert any ms-access report publish to web
object into html format form wizard wizard query wizard wizard
_______ option in publish to web wizard none of the
produces a page that is static in nature static file static html dynamic file above
_______query is used to create or
change database objects in a current
database append add insert data definition
Currency fields express the amount in
_________ dollars rupees pesos yen
_______is selected from the toolbar to unbound bound command
add an OLE object object object button list box
To display an OLE object in the form of
an icon ____ option is selected from display as
insert object dialogue box icon display link create icon
_______option from the file menu is
selected to run 'publish to the web save as none of the
wizard' create html new html above
_____page in an web application is used
to navigate to the rest of the pages in none of the
the application startup home end above
______ is fired when an event is
triggered is the concept based on a none of the
Visual Basic language bullet command procedure above
Ms access is a ___________ DBMS RDBMS front end language
A collection of data stored in different data
objects is known as a _________ data group collection database data storage
new blank new
A blank database can be created using new dialog database database database dialog
__________ box dialog box dialog box box
Text type data can be of _____
characters in ACCESS 255 64000 235 63500
______is a datatype that assigns values automatic AutoNumb
automatically number er number automatic field
Tables cannot be imported from other
databases true false
If two tables having same values for the none of the
fields are joined it is called an ______ inner join outer join explicit join above
Duplication of records in a field won't
be allowed if the fields are declared candidate
a________ primary key not null key no duplicate key
cascade cascade cascade
Changes from a master table can be delete change update
reflected on to the child table by related related related change all
selecting _____option records records fields related records
To see more than one record at a time none of the
in a form we use _______ columnar tabular both a and b above
In SQL, delete command is used to table or query or record or none of the
remove _________ tables queries records above
In MS-Access, filter excluding selection
will display only those record(s) which
meet the criteria. true false

Properties of the fields are managed by field Dynaset field


_____ in Dynaset property field property properties properties
______queries allows us to view data in crosstab row/column select
row by column manner queries queries queries update queries
The type of queries that can update or
delete record(s) in a table(s) are called action row/column change/delet
__________ queries queries e queries update queries

Joining tables without any matching no match


values inkey
Primary theuniquely
fields is called ____________
identifies each inner join self join join outer join
record true false

Which of the following dialog box is/are new form form create form wizard
used in the creation of form ________ dialog box dialog box dialog both 1 and 3
_______ query wizards are used to
generate summary calculations for a
table summary sum append simple

Properties of a form can be changed by change form


selecting ______from view menu options properties properties properties new properties
Forms that are included in other forms
are called ______________ included form sub form new form child form
In MS-Access, while using form design
view, for creating a command button
for adding a new record, we should
select the _______ category from the Record Record Form None of the
command button wizard Navigation Operations Operations above
_______ form displays fields in a single columnar tabular hierarchical one to many
horizontal row form form form form
The process of arranging the data in a
meaningful order is known as
___________ filtering ordering sorting querying
______ are used to select only some
particular records from the table or any
other database objects filter sorts pipes gateways
In MS-Access, user may specify criteria filter by filter by filter by None of the
for filter in form view using _________ form selection menu above
___wildcard character represents any
single character
Records cannot be sorted by a primary * $ @ ?
key true false
A control without a data source is bound unbound data less
known as ___________ control control control data control
Set of related option buttons, check
boxes and toggle buttons is known as option controls
_____________ button group group group record group
Which of the following is control types
____________ bound unbound controlled all of the above
In MS-Access, the function that gives
the current date is _____________ CURRDATE() TODAY() DATE() DAY()
_____is a control that lists set of data text box list box combo box static text
______is a form that summarize large columnar
amount of data pivot table form tabular form main form
______allows to create a filter by typing data sheet filter by filter by none of the
the value in a data sheet filter input form above
option
Wizards for toolbox controls are called a control control
__________ button wizard wizard wizard tool wizard
The wild card representation for any 5
letter word that starts with ram is two of the none of the
________________ ram* ram?? above above
Look up fields slow up data entry true false
____is an access object that displays un-
editable data report form table ledger
_____option from the new object toolbar
gives the easiest way of generating a none of the
report
______ represents data in a pictorial autoreport report module above
format chart label bitmap report
Changes of one table can be carried
over to another related table true false
Hyperlinks are used to jump to any kind
of information or data from a file true false
The memo field can have text upto_____
characters in length 60,000 255 25,000 64,000
In MS-Access, columnar layout can be
used to view multiple records in a form true false
In MS-Access, alter command may be
used in adding a primary key to a table true false
Update query is used to add records
from one or more tables to the end of
an existing table true false
In ms-access, datasheet view is all of the
available in ___________ table query form above

______are used to jump to any kind of


information from a datasheet or a form table form report hyperlink
Home page will always be present as a
first page of an application true false
Make table queries create a new table
from the records of another table true false
In ms-access, to protect a database file
from illegal access, we may set
database password. The option of
setting database password is available none of the
in _______ menu Insert Records Tools above
Foreign key is a field that uniquely
identifies each record and accept no
null values true false
Data definition queries are used to
create or change database objects true false
The attributes of a composite key are alternate composite candidate
known as ________ keys keys keys primary key
OLE object
Data is a data
displayed typecannot
in forms in access
be true false
edited true false
A sub form is used to display one to
many relationship between tables true false
We can switch from datasheet view to
form view by selecting view -> form
view option true false
In MS-Access long integer is a datatype true false
In MS-Access, while designing a table
for a particular field, the Required
parameter is set to yes. This validates none of the
the field as _______ null not null zero above
Sorting is applied to select only some
particular records true false
Filter by form can be created from a
forms shortcut menu true false
Advanced filter uses a filter similar to
the query design window to create a
filter true false
? Wildcard character represents any
number ofofcharacters
_________ the following is/are a type true false both 1 and none of the
of chart pie bar 2 above
A bound control is tied to a underlying
query or table true false
A calculated control uses expression as
a source of data true false
Text boxes cannot
The default be bound
query invoked bycontrols
ms- true false
select
access is update query query delete query append query
A control can be bind to a record using
row box
List source
is aproperty
control that offers a list of true false
choices true false
If a table is joined to itself it is called a
________________ inner join outer join self join table join
A picture box combines the activities of
both a text box or a list box true false
Line
Text is a tool
boxes canbox
becontrol
part of a option true false
group true false
_____ chart exists as a separate object freestanding embedded stand alone sub chart
Filtering data is a way of arranging data
in a meaning full order true false
Wild card characters are used for
sorting records true false
Pivot tables are used to navigate to the
other tables
Reports in a database
are used to represent un- true false
editable data true false
In MS -Access, the records in a table are the first field the last field primary key none of the
sorted based on _________ of the table of the table field above
Relationship is an association between
_________ forms reports attributes entities
Summary options dialog box is used to
summarize data true false
______ queries can be used to delete a
group of records that meet some
specific records delete insert append add
Charts can convert numerical data in a
easily understandable format true false
Embedded charts exist separately true false
From ms - access, if we want to view use
the records stored in a table in ms - datasheet in
excel worksheet, we need to use hyperlink use import forms use export
Page header is present at the beginning
of each record true false
Detail section has a header and footer true false
A macro is performed only when the
user initiates an event true false
The macro is selected from the action
field of a macro sheet true false
A macro can be made to execute before
the starting of a database true false

In MS-Access. While appending records,


the source and the target table must
have similar structure and fields true false
We can add our own functions to the
expression elements list box of the
expression builder true false
_______is the wildcard character which
represents the presence of any number
of characters & # ? *
Macros can be used to add a menu to a
database
_____ object
header is a unique feature of true false
reports page detail group topic
Chart can either be a form or a report true false
Group header will be present at the
design view of a report even if the
report is not grouped true false

We can change from the design view to


the form view without being prompted
for saving
Charts canthe
be changes
producedmade
without the true false
wizard true false
Macros can be used to create user
defined error messages true false
Between and Not Between is ______
type of operators relational list range logical
The default data type of VB is integer true false
event -
structured procedural
action query based none of the
Visual Basic is based on __________ language language language above
_______is the name of the database
object that displays data and can be
used to edit data report form query table
In access OLE objects cannot be linked true false
_____ section is present for each record
in the report group record session detail
A ________ sheet lists all the properties none of the
that pertain to the form or the controls data property both a and b above
Textboxes can also be an example of
unbound control true false

In MS-Access, we may design command


buttons for navigating records true false
_______are forms that are included in none of the
other forms sub forms child forms inner form above
_______ are used to represent our data
in graphical format graphs chart labels report
A field with a _______ uniquely identifies
each record number primary key index identifier
Large amount of data can be none of the
summarized using ______ tables pivot create form above
_______ are employed to select only
some particular records from a
database
______ object
control need not have a data filters queries sorts formsof the
none
source form bound unbound above
______ control combines the
functionality of both a text box and a
drop down list list box combo box button option button
MS access is a DBMS true false
A form can be bind to a record source record none of the
using _____ property of the form form name control source
data sheet above
none of the
______ forms displays field in single row tabular form chart form form above
______ forms are usually used for tables columnar none of the
with one to many relationship sub forms tabular form form above
_______ control uses an expression as a none of the
source of control calculated bound unbound above
_______ control is tied to field calculated unbound bound static
_______is the form that can be created
with minimum input from the user sub form auto form tabular form columnar form
______option from the tool menu is
selected for setting relationships none of the
between tables set relation connect relationships above
option, command
toggle and button, list, check option button,
______,______and_____are the buttons command check and and combo toggle button
belonging to the options group buttons list boxes boxes and check boxes
_________allows us to create a filter from filter by filter by
a field short cut menu filter by form report record filter by input
________is a database object which
displays data but cannot be used to edit
data form report macro table
What term applies to a collection of
related records in a database? clipboard file field layout
All of the following terms are related to
computerized databases except which
one? search sort field names record grab

An organised
way of
A way to storing
analyse and A tool to information
manipulate produce high about a set A way of
numerical quality of similar maintaining a
What is a database? information documents things log

It contains
Information all the data A document
about certain about one which A collection of
What does a record contain? programs specific item contains text files
relative Relational
An RDBMS is a remote DBMS DBMS DBMS Reliable DBMS
storing data backing up
offline at a data is related to uses tape as
Data Warehousing refers to separate site regularly data mining opposed to disk
Computer
Unauthorised alteration of on-line Key sequence Computer Database access
records can be prevented by employing verification checks matching controls
Reports allow Reports
users to provide a
extract very flexible A tool which
information way of allows text
as hard copy creating and and graphics
(printed editing to be placed None of the
What is a report? output) documents in documents above
Extracting Spreadsheet
and s make data
What is the best way to analyse and analysing easy to Using None of the
change data data analyse queries above
Word
Network processors,
Compilers, software, spreadsheets
What are some popular office interpreters, backup , databases, None of the
orientated software applications? editors systems DTP above

Which of the following constraints can DEFAULT and FOREIGN PRIMARY KEY
be used to enforce the uniqueness of NOT NULL KEY and UNIQUE IDENTITY
rows in a table? constraints constraints constraints columns
Which of the following commands is CHANGE MODIFY
used to change the structure of table? TABLE TABLE ALTER TABLE UPDATE TABLE
You are creating a client application
that calls ActiveX DLLs. Which of the
following properties of the Err object
provides the name of a component that
sends an error back to the client
application? Number Description Component Source
This database holds personal keeping the saving the file
information. The user can help to keep using a keeping a original with different
it confidential by password backup copy paper copy filenames
If the database holds customer names
and addresses, personalised letters can the product the primary
be created automatically using code key mail merge e-mail
Application software suited to storing
the survey information obtained in the
table would be A database Graphics browser e-mail
The characters * and ? are sometimes
used in search criteria as bookmarks operators wildcards engines
Which of the following field types will
generate the primary key
automatically? Auto Primary Auto ID AutoNumber Auto Key

forms in a
records in a related database are
dynaset are tables in a consistent reports are
consistent database are with the consistent with
with the consistent underlying the underlying
underlying with one tables or tables or
Referential integrity ensures that the: tables. another. queries. queries.
main form query and its
Tables are related to one another and a associated report and its
through a: foreign key. subform. dynaset. related query.
the primary the primary
key of both key of the a field from not a primary
related related an unrelated key of either
A foreign key is: tables. table. table. related table.

You are creating a banking database to


track customer loans. The bank will, of
course, have many customers, each of
whom may take out one or more loans,
while each loan may be associated with
only one customer (there are no joint Many-to-
accounts). What is the re One-to-one One-to-many many Many-to-one
In a one-to-many relationship between
Companies and Employees, which field EmployeeLas CompanyAddres
is found in both tables? EmployeeID CompanyID tName s
Which of the following ensures that
records in related tables are consistent The Tools
with one another? For example, it menu,
ensures that you cannot add a record Relationship Referential The one-to-many
with an invalid foreign key. window integrity The join line relationship
Right-click
the
Relationship
line, then Select Undo
Double click select in the Click the Delete
How would you delete a relationship the Delete from Relationships Relationships
between tables in the Relationships Relationship the shortcut pull-down button on the
window? line menu menu toolbar
That there
are several That there That records can
In a Customers tables, what does a plus customers That some of are records be added by
sign next to the CustomerID field associated the data is in a related clicking on the
mean? with that ID not viewable table plus sign
They cannot
They must be They must be
What is required of the fields that join both be They cannot AutoNumber the same data
two tables? numbers be text fields data types type
The
customer’s
ID is deleted
from the
Assume a one-to-many relationship Customers
between the Customers table and the The table, and all
Loans table, with referential integrity in Nothing, customer’s the related
effect. What happens when you Access ID is deleted loans are
attempt to delete a customer ID from ignores the from the deleted from An error
the Customer table that still has entries attempted Customers the Loans message is
in the Loans table? command. table. table. displayed.
The subform is
an object on the
The subform form and can be
Which of the following is true when is displayed The subform moved or sized
viewing a main form and its associated The subform in Datasheet is displayed like any other
subform in the Form Design view? is not visible. view. in Form view. object.
A one-to- A one-to- A one-to-
many many many
Which of the following relationships relationship relationship relationship A many-to-many
does not belong in a database based on between between between relationship
a professional sports league such as teams and teams and coaches and between players
football or basketball? players coaches teams and teams
Which symbol is used at the end of the
join line in a related table to signify the
“many” side of a one-to-many
relationship? # M ¥ *
The
Customers
table only
when there
You have created a one-to-many are Loan
relationship with referential integrity records
between a Customers table and a Loans associated The Loans
table. From which table can you delete Either table with that table at any
a record? at any time customer time Neither table
prompt, title prompt,
The correct order of the arguments for bar text, icon, title title bar text, title bar text,
the MsgBox statement is: icon. bar text. prompt, icon. icon, prompt.
The first statement in a procedure Dim Sub
named CreateList is: CreateList. CreateList. CreateList. Sub.
A check box A text field A drop-down
enables the enables the list enables
form user to form user to the user to
choose from choose from choose from
one of one of one of
several several several A drop-down list
Which of the following is TRUE related existing existing existing enables the user
to form fields? entries. entries. entries. to enter text.
must be set does not
must be set for multiple have to be must be set for
A text field: for one word. words. set. two words.
maintain data on
help people create tables different things
keep track of store data in of rows and in different
The purpose of a database is to: things. tables.
relationships columns. tables.
A database stores: data. . metadata. all of the above
A database records: facts. figures. information. a and b
A sales contact manager used by a single-user multiuser e-commerce
salesperson is an example of database database database
_______________ application application application a or b
single-user multiuser e-commerce
A Customer Resource Management database database database
(CRM) system is an example of_________ application application application None of above
Sequential Structured Structured
The industry standard supported by all Query Question Query Relational
major DBMSs that allows tables to be Language Language Language Question
joined together is called __________. (SQL) (SQL) (SQL) Language (RQL)
Data
A program whose job is to create, Database Database Business
process and administer databases is Modeling Management Model Relational Model
called the _____ System System System Manager
Microsoft Access may use which of the
following DBMS engines? Jet SQL Server Oracle a and b
The
database
Which of the following are basic The management
components of an enterprise-class database system
database system? The user application (DBMS) All of the above.
the database
application(s) the DBMS
interact(s) accesses the
In an enterprise-class database system with the database None of
________ . DBMS data above All of above
In an enterprise-class database system, creates creates
the database application ___ . queries creates form reports b and c

the database
In an enterprise-class database system, management
reports are created by the database system
____________________ . the user application (DBMS) the database
it contains a
all the users' it reduces description
A database is considered "self- data is in one data of its own
describing" because _______ . place duplication structure All of the above.
In an enterprise-class database system, holds user holds holds
the database _________ . data metadata indexes All of the above.
A database designed using as a new
spreadsheets from the Sales systems as a redesign
department is a database being from existing developmen of an existing
designed _________________________ . data t project database a and b

A database designed to implement as a new


requirements for a reporting application from existing systems as a redesign
needed by the Sales department is a non-database developmen of an existing
database being designed _______ . data t project database a and b
A database designed to combine two as a new
databases used by the Sales systems as a redesign
department is a database being from existing developmen of an existing
designed _________________________ . data t project database a and b
Database professionals use entity-
________________ as specific data normalizatio relationship data
sources for studies and analyses. data marts n data models modeling
Database professionals use a set of entity-
principles called ________________ to normalizatio relationship data
guide and assess database design. data marts n data models modeling
A very popular development technique
used by database professionals for entity-
database design is known as normalizatio relationship data
_______________________ . data marts n data models modeling
A very popular development technique
used by database professionals to entity-
adopt a database design to new or relationship
changing requirement is known as _____ normalizatio data
. data marts n modeling data migration
The predecessor(s) of database hierarchical network relational data
processing was (were) __________ . file managers models models model
entities in a the order of the order of more than one
column vary the columns the rows is column can use
In a relation __________________________ . as to kind is important unimportant the same name
An attribute is also known as a(n)
. table relation row field
A combination of one or more columns
used to identify particular rows in a
is___ . record field key tuple
A combination of two or more columns
used to identify particular rows in a composite
relation is________ . record field key foreign key
A determinant that determines all the
other columns in a relation is______ . record field foreign key candidate key
When designing a database, one of the
candidate keys in a relation is selected composite
as the _________ . key primary key foreign key surrogate key
Normalization is a process used to deal
with which of the following modification Insertion Update Deletion
anomalies? anomaly anomaly anomaly All of above
assess the
existing
When you are given a set of tables and tables' design the create one or move the data
asked to create a database to store structure and database more new into the new
their data, the first step is to ____ . content structure tables database
are supplied
by several
well- were
established essentially have poor
Modern microcomputer personal DBMS manufacturer killed off by response are not true
products______. s MS Access time DBMS products
Their report
delivery is
more
difficult than
They use report
sophisticated delivery for
Which of the following are true about mathematical reporting Nonintegrate None of the
data mining applications? techniques. systems. d data above
We have obtained access to the
company's operational data. We
examine 50 records for customers with
phone numbers that should use the
current area code of 345. Of these 50
records, we find 10 that still use an
older area code of 567. This is an inconsistent nonintegrate a "wrong format"
example dirty data data d data problem
We have obtained access to the
company's operational data. We have
been asked to produce a report with an
item by item analysis of sales, but the
only sales figure available is the total
sale value for each order. This is inconsistent nonintegrate a "wrong format"
example of_____ dirty data data d data problem
data
data data warehouse
warehouse warehouse data are
data are not databases often
A data warehouse database differs from stored in do not have denormalize
an operational database because: tables. metadata. d. b and c
Which of the following objects is used to
display a menu? Form Table Report Query
Which of the following objects are NOT Forms and Queries and
found in an Access application? reports tables Macros Spreadsheets
It will be Regardless of
easier for how the objects
It will be the user to and tables are
easier for the upgrade it if It is stored, the user
user to the objects advisable to will have to
upgrade it if are in one put each reenter the data
You are developing an Access the objects database object and in the tables
application that you expect to upgrade and tables and the table into a when the
periodically. Which of the following are in one tables in separate application is
statements is TRUE? database. another. database. upgraded.
An
application
The Link may consist
Tables of multiple An application
command databases, can be created
can be used each with All objects in in such a way
to associate multiple an that it objects
the tables in objects, application, such as forms
one database linked to yet including the and reports can
with the another tables, must be changed
Which of the following statements objects in database reside within without
regarding Access applications is NOT another containing the same disturbing the
true? database. only tables. database. existing data.
Which of the following brings a copy of
the table into the current database and
does not maintain a tie to the original
table? Import Link Merge Join
It contains
tables, It contains a
It contains reports, user
more than queries, and
interface, or It contains
What makes a database an application? one table forms switchboard macros
Interface
What is the Access tool that is used to Design Switchboard
create the user interface? Menu Wizard Build Menu Wizard Manager
put key
business
create information
backups for centralize into the store all
mission the hands or corporate
critical manageabilit more transaction data
corporate y of data decision in one single
The purpose of a data warehouse is to: data. collection. makers. location.
___________ means the result of applying
to specific information certain specific Digital Digital None of the
technical processes. Digital Sign Certificate Signature above

__________ is an algorithm which creates


a digital representation or "fingerprint" Hash Digital Digital
in the form of a "hash result". Function Signature Certificate Private Key
__________ is of standard length which is
usually much smaller than the message
but nevertheless substantially unique to Hash
it. Function Hash Value Hash Result Either B or C
Digital Signature involves two Digital Digital
processes. They are ___________ and Signature Signature
__________. creation Verification Both A and B Either A or B
Institutional
Overhead
and
Subscriber Subscriber
The Costs of Digital Signature consists Relying Party Relying Institutional None of the
mainly of the following Cost Party Cost Overhead above
Certification Certified Certificate None of the
CA stands for ________________ Authority Authority Authority above
A Digital Certificate is issued by a
Certification Authority and is signed
with the CA's Private Key True False
A Digital Certificate does contain
Owner's Public Key, Owner's name,
Expiration date of the Private Key,
Serial number of the digital certificate True False
Personal
______________ enable web servers to Server Developer Digital None of the
operate in a secure mode. Certificate Certificate Certificate above
______________ are used by individuals Personal
when they exchange messages with Server Developer Digital None of the
other users or online services. Certificate Certificate certificate above
______________ are on-line databases of
certificates and other information
available for retrieval and use in Private none of the
verifying digital signatures. Certificate Repositories Public Key above
Evidence,
Ceremony,
Signing Writings serve the following Evidence, Efficiency Approval,
general purposes______,_______,_______ Ceremony, Approval, and logistics, Efficiency and
and _______ Approval Evidence Evidence Logistics
The most widely accepted format for
Digital Certificate is defined by the
CCITT X.509 True False
A certificate may prove to be
unreliable, such as in situations where
the subscriber misrepresents his
identity to the certification authority True False
Certificate Certificate certificate
Revocation Resource Revocation None Of The
CRL stands for List List Letter Above
The prospective signer identified in the
digital certificate holds the_________ and Private Key, Public key, Private Key, None Of The
is called the ___________ Subscriber Recipient Recipient Above
In EDI interface, the translation service
receives _________ as incoming files Internal External Transmission None of the
from the communication service Format File Format File File above
The EDI standardisation for
International Trade and Commerce is
introduced by __________ ANSI UN/EBCDIC UNESCO UN/EDIFACT
In EDI, the transmission files are
composed of different sets of external
format files which are grouped into
multiple sets under the name of interchange functional
________ batch files sets functions groups

The ________________ are pre-paid credit Embedded None of the


cards that include an embedded cards Smart Card cards SET above
________________ are another form of
credit payment that lets customers use
digital online cheques to pay Web Electronic
merchants directly E-cash Digital Cash Smart Cards cheques
In Active advertisement, there are two Online Online Catalog
types of models. They are _____ and Billboards Catalog and Broadcast and Customer
________ and Junk Mail Billboards and Junk Mail Endorsements
The network based technology is/are
____________ EDI E-mail EFT All of the above
Decryption is a process employed for
scrambling of plain text for web based
transactions True False
Primary Key Public Key
Asymmetric cryptosystem is based on Login_Id and and Private and Public Key and
__________ and ____________ Password Key Password Private Key

Value Added Network is an example of Global Private Satellite Area None of the
_________ Network Network Network above
Active or Passive or Glow sign or
The advertising strategies emerging in push based pull-based hoarding
the on-line world are ____________ advertising advertising strategies All of the above
The _________ model use direct mail,
spot television or cable television, in
active based advertisement. Broadcast Junk mail Billboard Endorsements
The ________ is a form of mail that is not
targeted to a specific audience E-mail Bulk-mail Direct-mail Junk mail
The __________ model refers to
information that is placed at a point
where it will be noticed by customers in
the course of other activities and does Endorsemen
not require active search Catalog t Billboard Broadcast
The most beneficial advantage of ERP Error Data Low cost of Quality
system is checking Integration operation management
What is the term that describes spying
on one’s business rivals to gain a Competitive Corporate Industrial Economic
competitive advantage? espionage espionage espionage espionage
Contact
numbers of
A list of the
What would you NOT be looking for competitor’s managemen Research A competitor’s
when spying on a competitor? clients t group data new project
single-user multi-user e-commerce
An online drugstore such as database database database
Drugstore.com is an example of_______ application application application None of above
Keeping
Which of the following is an example of Replying messages Including the Using all capital
unacceptable online ‘netiquette’? promptly short Subject letters
Removable Message Encryption
drives that authenticati performed
can be on in EDI by a Security at the
locked up at systems physically transaction
night provide performs the secure phase in EDI
adequate same hardware systems is not
security function as device is necessary
when the segregation more secure because
Which of the following statements is confidentialit of duties in than problems at that
correct concerning the security of y of data is other encryption level will be
messages in an electronic data the primary information performed identified by the
interchange (EDI) system? risk. systems. by software. service provider.
convert text
The wizard that is used to import text text import to columns
files is_________________ wizard wizard tip wizard function wizard
The alphabet indicating the column
followed by the row number is known row column none of the
an__________ cell reference reference reference above

Which of the following files could not be quattropro or


opened in excel _______________ text files Lotus 1-2-3 xbase files class files
In excel, the dates that are stored as
sequential numbers known as domain
________________- serial values values range values reference values
The command to display the current =currentdate none of the
date in a cell is _________________ =today() =date() () above
In excel, absolute references are
represented by a ________ before the none of the
column and row addresses dollar sign ' = ' sign # sign above
The ________ can be used to select the
function and assemble the arguments function none of the
correctly AutoSum AutoFill wizard above
Specific parts of information required
by functions to perform certain tasks none of the
are called as___________ variables arguments parameters above
Which of the following do not belong to
the formula category in excel
environment__________ text logical numeric Boolean
The function that in used to join cell none of the
values together in a single cell ________ concatenate pmt merge above
The function that is used to count all
the values that meet specific criteria
_________ countif vlookup pmt count
convert text
The wizard that is used to create and pivot table to columns
edit charts _______________ wizard chart wizard wizard tip wizard
The function that is used to calculate
the payment for specific loan terms none of the
____________ sumif pmt countif above
The function that is used to add
together all values that meet specific
criteria is known as ____________ average sum sumif countif
The __________ option present in the file
menu options is used to specify major none of the
facts of the page to be printed page setup print area print above
The command that is used to apply a none of the
format automatically __________ autoformat AutoFill above
The ____________ makes the information
in a worksheet meaningful and easy to none of the
understand bordering formatting shading above
A particular part of a work sheet can be
printed by setting the _________ page setup print area print print preview
The process of finding or selecting none of the
information is known as ____________ filtering searching sorting above
The option that is used to cancel the
filter process for a specific column and
display all the records is ________ all option blanks all blanks none
The URL for encyclopedia Britannica www.encybri none of the
is_________ www.ency.in www.eb.com t.com above
_______ maps IP addresses with the none of the
domain names of the sites URL DNS FTP above
internal network of intermediate none of the
Internet can be defined as _______ network network network above
The most important service of the application transport physical
______ is to manage traffic control layer layer layer session layer
_________is a program that displays
information about a host connected to none of the
the net finger service ping service ftp service above

_______ is a program or a tool that helps none of the


in locating a file anywhere on the net FTP TELNET ARCHIE above
uniform uniform unlimited
research resource restore none of the
URL stands for ____________ locator locator locator above
IN an URL the word before the color host name of the none of the
refers to _______ computer resource scheme
command above
none of the
A ______ always begins with a slash message scheme line above
Prodigy is run by IBM and ______ Delphi Microsoft sears general electric
The World Wide Web is referred to
shortly as the _______ net web browser editor
Gopher and WAIS enables the user to read the search for none of the
______ browser Usenet news database above
CompuServe
______ is the program used to run internet wincim or none of the
CompuServe's regular services dialer spy mosaic maccim above
Navigating through the menu of gopher none of the
is called moving around _______ gophering gopherspace cyberspace above
The directories that come with built-in none of the
engines are yahoo,lycos and ______ Alta vista open text excite above
To use the finger command,SLIP users none of the
must run a programme called______ finger server ftp server web server above
none of the
The web maps are called _______ list directories image list above
maximum of
Directories consists of _______ levels no five one many
The _____ level gives the broadcast
overview of the net middle lower top middle and lower
The huge list of keywords from
important items is called ______ hotlist directory index glossary
directory index menu item
The two types of search in veronica are search,index search,menu search,item search,index
_____ and ______ search search search search
_______ searches by keywords infoseek excite lycos all the above
Mosaic displays links in color whereas
_____ does not display links in color netshark cello lynx all the above
navigator gold
______ supports one button publish lynx mosaic Lycos 2.0
SPY MOSAIC is distributed by_______ Microsoft internet IBM CompuServe
______ is a program that helps us to log finger
on to other networks Usenet service ftp telnet
Higher text Hyper text Hyper text
transfer transmission transfer Hyper text
HTTP is the acronym for __________ protocol port protocol transfer port
______is used to transfer and copy files none of the
over the internet iccp ftp uucp above
_____ is a program that helps us to log none of the
on to other networks yahoo ftp telnet above
transfer
transfer transmission communicati
control control on
protocol/inter protocol/inte protocol/inter none of the
TCP/IP stands for ________________ net rnet protocol net protocol above
Archie servers can be accessed none of the
in_______ different ways in internet one two three above
_______is the computer on the internet
that translates between the internet domain
domain names and the internet name none of the
numeric address ftp servers servers web servers above
the internet
the internet administrati the internet none of the
TIA stands for_____ in internet adapter on access above
Service indicates the name of the
________ used to access data, present
on the other end of the link. browser protocol site organization
universal uniform uniform
________ is used to link pages in the resource resource resource name of the
world wide web locator locator label above
frequently frantically
frequent asked asked none of the
FAQ stands for ______ asked query question question above
The internet adapter is a programme
that makes our connection act like a none of the
_____or a ____ account SLIP,PPP TCP,IP IP,UDP above
The step involved in Communicating
between the web clients and servers is
______________ connection response request close

world search
wide search windows for
for sockets information
information internets and research none of the
WSIRC stands for______ and research relay chat council above
Two of the important browsers are_____ mosaic,goph none of the
and_____ lynx,minx netscape,ie er above
Lynx is a _______ programme that works world wide world wide none of the
with terminals web server web client interface above
The huge list of keywords from none ofthe
important items is called an_____ glossary index hotwords above
very
organised
very easy network verification
and rodent integration on network
oriented net and integration
wide index to communicati and
VERONICA is an acronym for computerized on communicati none of the
_______________ archives application on above
university of
university of cleveland,cle
The first freenet is created at the_____ berkeley,berk veland university of none of the
and is called______ eley freenet freenet California net above
________ are defined as ways of none of the
communication amongst networks protocols IP address dns above
search
______and_____ are web searching engines,direc ftp and telnet and none of the
features tories finger ftp above
WINWAIS has two source lists allsrc,winsoc wais,winsocknone of the
namely____ and______ ks wais,allsrc s above
none of the
________ is also called as WAIS manager allsrc waisman winsock above
The system of interlinked documents is none of the
known as_______ hot links hyper text books marks above
The small programmes that create
animation,multimedia,real-time games none of the
and multi user games are called______ images applets animation above
animation,sc
The information displayed on the web graphics,vide programms,i ripts,executa none of the
page includes______,_____ and_____ os,audio mages,text bles above
The web pages that represent online welcome none of the
home of their author are called______ first page home page page above
global global grand
network networks network none of the
GNN is
_____ stands for______
the most popular internet news
yahoo navigator
electronic news
search aboveof the
none
service service mail engines above
Netscape
page starter
site,netscap
The online service offered by navigator email and net e page yahoo and none of the
gold 2.0 are _______ and_____ conference wizard altavista above
_______ is a program or a tool that helps
us find a file anywhere on the net newsgroup telnet ftp archive
The databases to enable keyword none of the
search using Lycos are a2z,_______ Lycos catalog point review all the above above
______ is a large worldwide bulletin
board service network apple link bitnet Delphi fidonet

computer
related
abbreviations biographical
BABEL consists a glossary of _____ and acronym information bookstores none the above
Dictionaries,encyclopaedias,governmen on-line
t and other references are found in encyclopedia reference more
______ Britannica works information galenet
Yahoo,lycos,excite and webcrawlers are search web
_____ engines directories database channel
Graphical Graphical Graphical
interpreter interchange interface Graphical
GIF is the acronym for ____________ formatting Format format Interface format

Jumbled Joint pictures


Joint Pictures pictures Joint pictures experimental
JPEGWeb
The is the acronym
aids forexplore
users to ___________
the Expert Group expert graph expert graph group
________ mails documents net browsers

The three most popular mailer yahoo,infose netscape,ie,l eudora,netsc none of the
are_____,_____ and______ ek,altavista ynx ape and pine above
The World Wide Web consists of network
_________ information web pages connections mails
In Microsoft Internet Explorer, the color
of the text can be specified using BACKGROUN
_________ attribute of the font tag. D COLOR FCOLOR FONTCOLOR

The interface that provides effective Communicati Common Communicati Common


communication between the web on gateway graphical on graphical Gateway
browsers and servers is _________ interface Interface interface Interface
CGI is the _________ between web Communicati
browsers and servers Network Interface on Connection

CGI programs are invoked based on the Current web None of the
information provided by the _________ page Browser Client above
A CGI program is usually called after a
request made by the _________ Browser/user Server Web Channel
neither text nor
A hyperlink can be on ___________ text only image only text or image image
HTML was derived from _________ SQL
alphalanguag PLSQL
betalanguag SGML
metalanguag CGI
none of the
SGML is a _________ e e e above
palm is not palm is not pancake is none of the
PINE stands for _____________ eatable elm not edible above
The application that confirms whether a
document is compliant to its DTD is SGML SGML
_________ Processor Preprocessor SGML Parser SGML Composer
Web is a collection of ___________ web sites images applets documents

Internet International
equipment Engineering Internet
training trainers and Engineering None of the
IETF stands for ________ faculty faculty Task Force above
MS Internet
MS Internet Netscape Explorer and
The two major browsers used to surf Explorer and Navigator Netscape None of the
the Internet are ________,_______ Mosaic and Mosaic Navigator above
Special characters allow browsers to data from a
display _________________ text database symbols video
The keyword for providing links within
or across documents is____________ hyperlink hypertext hotword hotlink
Stringing pages together using
hypertext technology helps view pages in random in sequential in user- none of the
_______________ order order defined order above
The initial web pages present in a web none of the
site is the ________ page. first start home above
The image format supported by most .bmp and
browsers is________________. .bmp and .gif .jpeg .gif and .jpeg .wmf and .bmp

Service,
hostname service,host service,port
The components of a URL are and directory name,port,di and directory service,hostnam
___________ path rectory-path path e and port
mailing
lists,mail
mail mail server robots
servers,mail vendors,mail and
The mail we send has a mailing address clients and identification gateways to
and most of them correspond alternate and other none of the
to_____,_____ and services password services above
Which of the following is not supported <font <l1
by internet explorer _______________ <center> size=n> <hr size=n> type=shape>

communicati common classified


on generated gateway general none of the
CGI stands for ____________ information interface instructions above
Host name indicates the domain name
of the
The web ________
internet is also called as Server Client Browser User of the
none
_______________ arpanet the net intranet above

The internet is similar to peer-to-peer none of the


_________________ LAN connectivity wan above
The net drivers______ from one place to none of the
another data parcel packets above
scripting,pars
news,cookin email,file
The net provides interesting services ing and g and fine retrived,inter none of the
like______,______ and______ compiling arts net tools above
The windows internet software mosaic,goph communicat
available are______,_______,________ nt,windows9 er,eudora,tr or,ie,lynx,win
and______ 5,ie,winzip umpnet sock all of the
none above
of the
________ is the ancestors of the internet dnet arpanet ARPANET above
dedicated defensive
defensive and advanced
administrativ registered research
DARPA stands for e rank projects projects
________________________________________ administratio administrati administratio none of the
_______ n network on n net above
none of the
The uuencode files start with a _______ start begin first above
DARPA is broken into ________ and milnet,smalle intranet,extr none of the
_______ r arpanet mailnet,inet anet above
NSFNET is the united states provides education,res music and cooking and none of the
service to _____ and_____ earch dance dining above
The first international IP network
connections were established in 1973 united states england,nor united states none of the
with _____ and_____ and UK way & Russia above
A_____ is a set of computers
interconnected by transmission paths to none of the
exchange information in internet server client network above
A computer that provides a service
usable by other computers is none of the
called______ client stand-alone servers above
A_______ is the representation of
physical connectivity of the computers network network none of the
in internet network card topology redirectors above
detailed data
transaction terminal data target none of the
DTE stands for ____________________ explanation equipment equipment above
The basic function of the ______ is application physical network none of the
transmitting the bits over a channel layer layer layer above
point to point
packet
network and switching,sto smart
broadcast re and network and
The point to point channel network is channel forward dumb none of the
also called as _____ and_____ network network network above
Accessing files using FTP servers is anonymous none of the
called_____ file access ftp file transfer above
The three most commonly used PAN,NAN,AA KAN,RAN,VA LAN,WAN,MA none of the
networks are______,______ and______ N N N above
none of t he
________
_____ canisbe
in owed
between LAN and WAN
by multiple VAN MAN TAN aboveof
none the
organisation
Data is transmitted in the form of_____ LAN MAN WAN aboveof
none the
signals analog digital non-digital above
Document
Data type Define type type Document type
DTD stands for __________ definition of data definition data

Moralize/dem Modulation/d Manipulate/d none of the


Modem stands for __________________ oralize emodulation emanipulate above
______ is the process of the digital
signals being converted into a form none of the
suitable for analog transmission Mapping Modulation Manipulation above
Dedicated
Satellite link access and
________ and______ are two basic ways and digital dial up Cable and none of the
of getting connected to the internet signals access wires above
Standard Stream line
long internet internet Serial line none of the
SLIP stands for ________________ protocol protocol protocol above
Prime Point to
prolonged point Pillar to pillar none of the
PPP stands for _____ protocol protocol protocol above
sending
storing data information storing data receiving
Which of the following best describes on a disk to a host on the hard information from
uploading information? drive computer drive a host computer
A characteristic of a communication
channel that is the amount of
information that can be passed through
it in a given amount of time, expressed
in bits per second. Bandwidth Speed Size Channel
The act of searching through storage to
locate information without necessarily
knowing of the existence of the
information being sought. Find Save Browse Retrieve
A "recipient" of the certificate desiring
to rely upon a Digital Signature created
by the subscriber named in the Recipient Relying
certificate is called the ____________ Party Party Either A or B Neither A nor B
The Relying Party can use the
___________ listed in the certificate to
verify that the digital signature was
created with the corresponding
_________ Public Key Private Key Both A and B Both B and A
Digital Signatures are used for a variety Electronic
of Electronic Transactions like Electronic Fund
________________________ E-mail Commerce Transfers All The Above
To associate with a key pair with a
prospective signer, a Certification
Authority issues Digital Certificate Not False Not True
Digital Signatures, if properly
implemented and utilized offer Closed
promising solutions to the problems of System,Form Formal Legal Formal Legal
Imposters, Message Integrity, al Legal Requirement Requirements,
__________ and _____________ requirements s Open System Open System
In, Digital Signature, _____________
perform the "ceremonial" function of
alerting the signer to the fact that the Signer
signer is consummating a transaction Affirmative authenticatio None of the
with legal consequences Act Efficiency n above
A Digital Signature must have the Signer Document
following attributes ________________ and Authenticatio Authenticati
_____________ n on Both A and B Neither A nor B

"Hash Function" is used in both creating


and verifying Digital Signature Not True Not False
___________ provides assurance of the
origin or delivery of data in order to
protect the sender against false denial
by the recipient that the data has been
received, or to protect the recipient
against false denial by the sender that Nonrepudiati Digital Digital
the data was sent. on Service signature certificate Private Key
________ is a branch of applied
mathematics concerns itself with
transforming messages into seemingly None of the
unintelligible forms and back again. Cryptography Public Key Private Key above
The complementary keys of an
asymmetric cryptosystem for Digital
Signatures are arbitarily termed as
_________, and ____________ Private Key Public Key Both A and B Either A or B
_______ is known only to the signer and
is used to create the digital signature. Private Key Public Key Both A and B Either A or B
_______ is ordinarily more widely known
and is used by a relying party to verify Both A and
the digital signature. Private Key Public Key B Either A or B
____________ is the art of protecting
information by transforming it into an
unreadable format. Decryption Cipher Encryption Cryptography
Conducting
Which of the following activities would Performing fraud- Reviewing the
most likely detect computer-related Using data validity awareness systems-access
fraud? encryption. checks. training. log.
Not Received by
A digital signature is used primarily to Unaltered in intercepted the intended Sent to the
determine that a message is: transmission. en route. recipient. correct address.
Both sender The private The private
and receiver key cannot key is used
must have be broken by the The private key
the private into sender for is used by the
key before fragments encryption receiver for
this and but not by decryption but
encryption distributed the receiver not by the
What is a major disadvantage to using a method will to the for sender for
private key to encrypt data? work. receiver. decryption. encryption.
Which of the following risks can be Failure of
minimized by requiring all employees server
accessing the information system to Data entry duplicating Firewall
use passwords? Collision. errors. function. vulnerability.
Business-to- Business-to- Backend-to- Business- to-
The acronym for B2B is ___________ Business Backend Business Billboard
The _____________ model is the least
intrusive model but requires active On-line Endorsement
search on the part of the customer Billboard Catalog s Broadcast
__________ is / are a form of
advertisement where people relate Customer
their experience with products and Endorsement
services s Billboard Catalog Broadcast
The _________ are software agents who
communicate with the business Intermediarie
merchants on behalf of the customers s portals .COM Domains
The Pre-purchase preparation phase
includes _______________ for a set of Order Search and None of the
products Placement Service discovery above
The _________ phase includes customer
service and support to address Post Purchase
customer complaints , product returns purchase consummati Pre-purchase Search and
and products defects interaction on preparation discovery
Billboard Endorsement
The ________ allow companies to bypass model of Online model of None of the
the need for costly printed catalogs marketing catalog marketing above
A ________________ is a basket on the
Net that is used to place the items that Online Shopping
are being purchased Catalog cart Billboard Pulling cart
EDI For
EDI For Administrati EDI For
Administratio on, Administratio
n, Commerce Consumer n, Commerce
and and and None of the
EDIFACT is an abbreviation of ________ Transaction Transport Transport above
The __________ allows for protocol
conversion and communicates with the
bank using the banks private network
or the Internet EDI TCP/IP EFT Gateway
In Ecommerce, data extraction,
transforming the data into
transmittable form, transmitting the
data and downloading the data are the
operations employed in _________ Compiler Interpreter Assembler EDI
The _________ commerce assists in
integrating the customers and suppliers
of the company directly into the Business-to- Business-to- Consumer- Customer-to-
organisation Business Consumer to-Business Company
Emergency Electronic
E-cash means______________________ Cash Cash Euro Cash Endorsed Cash
E-commerce is a tool that addresses
the desire of firms to cut services cost
and improving the quality of goods. It is Communicati Business
a definition of e-commerce from on Process Service None of the
_________ Perspective Perspective Perspective above

The small denomination digital tokens Micro TT(Tiny


are called _________ Microcash Transactions token) E-token

The ____________ is the process of


encoding information to prevent it from
being read by unauthorized parties Decryption SSL Encryption Subscription
There are _________ types of data tables 1 2 3 4
The tables that allows the user to
change or rearrange the data,
summarize the data and evaluate the
data using changing points of view is
known as data table filtered table index table pivot table
convert text
The wizard that is used to suggest hints pivot table to columns
for doing a task wizard chart wizard wizard tip wizard
Y-axis is known as_________
In a chart X-axis series or rank category legend data marker
as_______________ series or rank category legend data marker
_________ is a set of tables that describe
each of the data series series or rank category legend data marker
________ is used to differentiate one
data series from another series or rank category legend data marker
The chart that contains only one data
series is _________ column chart bar chart pie chart surface chart
The chart that holds the column chart is
_________ column chart bar chart pie chart surface chart
The chart that display two or more data
series
The on athat
chart surface is _________
is used to display column chart bar chart pie chart surface chart
discrete data column chart bar chart pie chart surface chart
_________ are not allowed in a macro wild card none of the
name spaces characters symbols above

Which of the following tool cannot be internet


used to view the excel web page_______ excel97 explorer Netscape word 2000
The wizard that used to build an convert text
interactive table from data existing on pivot table to columns
sheets wizard chart wizard wizard tip wizard
The chart that is used for displaying
stock market information line chart bar chart stock chart pie chart
In excel, the subtotal command also
generates grand total after the last
group subtotal_________ true false
In advanced filter , the criteria
occupying multiple columns but more
than one row, is considered as an
________ criteria. and or
The stacked bar graphs can be 4- Multi-
represented in __________ 3-dimensions dimensions dimensions
A pie chart can represent only one data
series at a time true false
The ______ generates a summarized
report in tabular form in an interactive
manner Data table Pivot table

It is often
used to
display share It is also used for
It is also market indicating
called as It shows prices over a fluctuations in
Which one of the following statements high-low- trends over period of temperature
related to stock chart is NOT TRUE ? close chart time time changes
The state government needs to finalize
a five years plan to implement 100%
literacy in the state. Which one of the
following will be the best tool that Scenario
should be used to work out the plan ? Pivot table manager Solver Data table.

Forecast'99 is a group working on exit


poll. It wants to know how many seat
ABC party needs to won in totality to
obtain majority to form the
government. Which one of the following Scenario
will be the tool that will help the team ? Goal seek manager Pivot table Data table.
Which one of the following will be the
tool that provides a way to view and
compare the results of all the different
variations together on the worksheet ? Goal seek Pivot table Solver Data table.
A ___________ is an excel file where the none of the
user stores his data Workbook Worksheet Spreadsheet above
Performing Performing
Spreadsheets are useful for Performing database text
_______________ calculations. operations formatting. All of the above
Which one of the following is NOT the Source table
component
Excel allowsofupto
the ______
pivot table
levels? of Column field Row field. name. Pivot table item.
sorting two three N
Filtering rearranges a list to display the
required records true false
The stacked bar graphs can be 4- Multi-
represented in _____________ 3-dimensions dimensions dimensions
The ______ generates a summarised
report in tabular form in an interactive
manner Data table Pivot table
It is useful
when
several
components
are changing
It displays and the user
the data is interested It can be
Which one of the following statements series one on in the sum represented
related to stacked bar chart is NOT top of the of the in 3-
TRUE ? other. components. dimensions
Which following function is used in Standard
subtotal option ?______________ Count. deviation SumIf
A workbook consists of many ________ databases records tables worksheets

It is a tool
that
provides a
way to view
It is a tool for and
summarizing compare the
and results of all It
analyzing the the different summarizes
data records variations the data by
in an together on using
Which two of the following statements interactive the analytical
related to pivot table are TRUE ? manner. worksheet functions.
Which one of the following is NOT a Scenario
What-if analysis tool ? Goal seek. manager solver Pivot table
convert text
The _________ wizard separates contents text import to columns
in a cell into different cells wizard wizard tip wizard function wizard
A spreadsheet is a grid of rows and
columns and is called as a ________ worksheet workbook tables database
Pick out the window that is not a form application document modal
of excel ___________ window window window
On an Excel sheet the active cell is A dark wide A dotted
indicated by… border border No border A blinking border
Cell A4 =2 and A5 = 4. You select both
cells and drag the fill handle down to
A8. The contents of cells A6, A7, and A8
are _____. 8,16,32 2,4,2 2,2,2 6,8,10
the row is
too short to the column is
show the too narrow to
your formula number at show all the
If a cell shows  ####### , it means has a syntax the current digits of the
that _____. error font size number either b or c
ability to flexibility of
Which is not an advantage of using generate speed of moving cost of initial set-
computerized spreadsheets? tables calculation entries up
The gym teacher has a new program to
calculate physical fitness in terms of
weight and exercise. The use inputs
different weights or amounts of
exercise to determine the related
physical fitness. This "What if" program word
is most likely which of the followin processing graphical database spreadsheet
The difference between the highest and
the lowest values. Range Address Gap Rows
Producing Writing Drawing
Spreadsheets can be used for... graphs letters pictures Document filing
drag from
the top cell
in the
column to
double-click the last cell click the
To select a column the easiest method any cell in in the column click the column
is to … the column column heading label
If you press _____, the cell accepts your CTRL +
typing as its contents. ENTER ENTER TAB INSERT
The contents of cell C15 is
=AVERAGE(C3:C14). AVERAGE(C3:C14)
is known as array. function. constant. formula.
All of the following are considered (201)555-
constants EXCEPT: 100 1212. #VALUE! Tom McKenzie.
Which of the following may NOT be Cell Numeric
included in a formula? references Functions constants Text constants
Which of the following is NOT a valid
mathematical operator in Excel? ^ / * \
Given the formula =B5*B6+C3/D4^2,
which expression would be evaluated It is impossible
first? B5*B6 C3/D4 D4^2 to determine.
Which part of the formula +E12/6+
(G7*SUM(H9:H11) is considered a G7*SUM(H9:H11
constant? E12 6 SUM(H9:H11) )
It is It is The phrase
surrounded displayed in “active cell”
How can you tell which cell in a by a heavy reverse appears in the
worksheet is the active cell? border. It is blinking. video. Status bar.
By either
clicking in a
different cell By typing the
By using the or using the reference of the
By clicking in arrow keys arrow keys cell you want to
a different to move to a to move to a move to in the
How can you change the active cell? cell different cell different cell formula bar
The Cell
Format
The command on The Font Size
Which of the following would you use to The Standard Formatting the Edit command on the
change the font size of a cell in Excel? toolbar toolbar menu Tools menu.
the New the Save the Save As
command on command on command on the File Type
The command that will save the current the File the File the File command on the
workbook with a different file type is: menu. menu. menu. File menu.
The command that will print an Excel
workbook is found on the ____________
menu. File Edit View Window
In the Save As and Open dialog boxes,
the ___________ view shows the file size
as well as the date and time a file was
last modified. Preview Details List Properties
Which of the following commands will
automatically adjust cell references in Both Insert
formulas? Insert Delete and Delete Clear
Which of the following commands will
remove cells, rows, or columns from a Both Clear
worksheet? Clear Delete and Delete Remove
Which of the following options is NOT Orientation
controlled through the Page Setup (portrait or Headers and
command? landscape) footers Fonts Margins

Which command enables you to change


the margins for a printed worksheet? Options Page Setup View Edit
All commands are carried out on a
rectangular
Which of thegroups of cells
following known
is a valid as a: worksheet.
cell range. group. cell group.
range? 6 D12, G25 D12:G25 D
In a copy operation, the cell(s) you are destination
copying from is called the: copy range. range. clipboard. source range.
In a copy operation, the cell(s) you are destination
copying to is called the: paste range. range. clipboard. source range.
Which of the following commands is The Both the Copy
needed to duplicate the contents of a Duplicate The Copy The Paste and Paste
cell in another? command command command commands
A cell reference that does not change
during a copy operation is known as absolute relative mixed constant
Which of the following is considered an
absolute cell reference? B4 $B4 B$4 $B$4
Cell E3 contains the function
=AVERAGE(A3:D3). If the contents of
cell E3 are copied to cell E4, what will
be the contents of cell E4? #DIV/0! #DIV/0! #DIV/0! #DIV/0!
Cell E3 contains the function
=AVERAGE($A$3:$D$3). If the
contents of cell E3 are copied to cell E4,
what will be the contents of cell E4? #DIV/0! #DIV/0! #DIV/0! #DIV/0!
Which of the following commands is
needed to transfer the contents of one The Move The Cut The Paste Both the Cut and
cell range to another? command command command Paste commands
cycle
through
absolute,
relative, and cycle through
copy and mixed cell open
The F4 key is used to: paste cells. edit cells. references. applications.
Which of the following quickly copies the
the formatting of a selected cell to the Fill the Format Formatting Conditional
other cells? Handle Painter toolbar formatting
Select the Click the
Insert Insert Right-click a
Hyperlink Hyperlink cell and click Double-click a
command button on the Edit cell and click the
Which of the following will insert a from the File the Standard Hyperlink Insert Hyperlink
hyperlink into an Excel worksheet? menu. toolbar. command. command.

whether the
whether the cell has an
cell has a absolute or a
Conditional formatting applies formula or a the cell relative cell the value in the
formatting to a cell based on: value in it. address. reference. cell
text with either a
two-digit or four-
text with a text with a digit year,
If you enter a date into a cell, Excel two-digit four-digit depending on
stores the date as: year. year. an integer. the format.
You created a worksheet on July 30 and It is impossible
entered the =Today() function in cell to determine
E17. You opened that worksheet again from the
on August 31. What will be displayed in information
cell E17 on August 31? Jul-30 Aug-31 29/03/2008 given.
subtracting
subtracting adding the the later
the earlier earlier date date from adding the later
The number of days between two cells date from the to the later the earlier date to the
containing dates can be calculated by: later one. one. one. earlier one.
The function key that is used to quickly
edit the contents of a cell is: the F4 key. the F2 key. the Esc key. the F1 key.
Either 3/4 or .75,
March 4 of depending on
What will be stored in a cell if 3/4 is the current the cell
entered in it? 03-Apr 0.75 year formatting
either a cell on a
A user’s response to the InputBox a cell on a worksheet or a
function can be stored in: worksheet. a variable. a constant. variable.
The cell reference for a range of cells
that starts in cell B1 and goes over to
column G and down to row 10 is _____. B1-G10 B1.G10 B1;G10 B1:G10

The teacher has a spreadsheet showing


all Year 10 students and their marks in
one Mathematics test. To find the
student with the highest mark, which of
the following functions should be used? AVERAGE COUNT MAX SUM
Which chart type best shows
proportions of a whole? Combination Line Pie Scatter

Once a bar Once a Once a pie


chart is column chart chart has Once a line chart
chosen it is chosen it been chosen has been chosen
cannot be cannot be it cannot be it can be
Which of the following is TRUE changed to a changed to a changed to changed to a pie
regarding chart types? column chart. bar chart. line chart. chart.
To select several cells or ranges that hold down
are not touching each other, you would hold down the SHIFT hold down hold down CTRL
_____ while selecting. the CTRL key key the ALT key + SHIFT

Your Institute teachers have set an


assignment on ‘Studies’. You are
required to use a spreadsheet to record
all that you study on each day for four Transfer
weeks. You decide to show each week’s Create four information
data with an accompanying graph. separate to a Use multiple
What is the best way of doing this Use tables files database sheets
What would be the best method to
quickly copy the formula from the
active cell to each cell below it? Paste Fill Down Fill Right Paste Special
To arrange rows in alphabetical order
based on column A, you need to use Edit | Data | none of the
the
What command _____.do with a
can you NOT Tools | Sort Data | Sort
Calculate Sort choices
None of the
spreadsheet? Analyse data data Create forms above
select Print
selection on select Print
To print just part of a sheet, you would press the  Page Setup  selection in the
select what you want to print and click the Print PRINT |  Sheet  and Print dialog and
_____ . button SCREEN key then print then print
The formula that will add the value of
cell D4 to the value of C2 and then
multiply by the value in B2 is _____. (D4+C2)*B2 D4+C2*B2 #VALUE! =(B2*(D4+C2)
Which of the functions is not valid for =A3SUM:B3 None of the
performing addition 0 SUM:C3SUM REF! above
whatever
The default orientation for the printed was last
page is _____. portrait landscape used vertical
None of the
Which is not a valid cell address? AD213 ZA1 A0 above
The World Wide Web was devised by
_________ CERN ECRN CARN NET
newsgroups
The useful URL schemes are_____ yahoo and mailto and and search none of the
and______ infoseek files engines above
bulletin application
boards,mails servers,prox
news call and y servers
The other ways of getting connected to groups,yahoo wireless and web none of the
the net are_____ and infoseek system servers above
business bulletin
bulletin broadcasting broadcasting none of the
BBS stands for______ board system system system above
none of the
USENET is a BBS on ____ scale small large very small above
windows windows windows none of the
WINSOCKS is expanded as______ socks sockets stocks above
IETF Level 2 HTML DTD supports
graphical browsers like _______ Mosaic Yahoo PINE Lynx
The space used by Netscape to store none of the
the retrieved page is called______ buffer cache built-in above
The principles, means and methods for
rendering information unintelligible and
for restoring encrypted information to Digital Cryptograph
intelligible form. Photography Signature y Message Digest
A long string of seemingly random bits
used with cryptographic algorithms to
create or verify digital signatures and
encrypt an decrypt messages and Hash
conversations. Key Lock Function Formula
Protected/private character string used
to authenticate an identity or to
authorize access to data. User-id Password Name Address
The successful act of bypassing security Cryptograph Password
mechanisms of the system. Penetration Retrieval y Cracker
A set of rules and formats, semantic
and syntactic, that permits entities to
exchange information. Acts Regulations Address Protocols
An attempt to get access to a system Unauthorisin
by posing
An to event
action or be an that
authorised person. Spoofing
might prejudice Imposting g Approving
security. Loss Threat Exposure Hacking
According to information Technology
Act, 2000, To investigate
contraventions the controller of
certifying authority shall exercise the Sales - tax Income - tax Judge of a Police officer of
like powers to that of authorities authorities civil court IPS rank.
Pirated
Malicious software. Utility software Virus Cracker
None the person who is known as father Tim Berner Charles
of Internet Lee Hoffman Bubbage Howard Aiken
This website is the biggest bookstore on Amazon
the earth. Etrade.com .com Dell .com Msn .com
Asynchronou
Automated s
When we talk of Data Transmission Tailor Any Time Transmission
modes, then ATM stands for Machine Money mode None of above
A sequence of bits or characters that
identifies the destination and the
source of a transmission. Acts Regulations Address Protocols
The means of communicating between
networks Router Gateway Port Pin

A group of computers and other devices


dispersed over a relatively limited area
and connected by communication links
that enable a device to interact with
any other on the network. LAN WAN CAN PAN
hyper
terminal hypertext hypertext
tracing tracing transfer hypertext
The term HTTP stands for program program protocol tracing protocol
National Network New
Informatics Interface Information None of the
A NIC is considered as Center card Card above
Only Can not None of the
A hub is a device that can connect Computers computers Only printers above
Combines Switches
connectivity data from
of a hub with incoming
the traffic ports to
Which of the following is true Concentrates regulation of outgoing
concerning the function of a switch? connectivity a bridge ports. All of Above

Bridges and Two or more Bridges and


What do routers connect? Repeaters. networks Hubs Hubs
None and nodes
of the
What does a router route? bits frames Packets above
Software which prevents external
access to a system is termed firewall gateway router virus checker
If four computers are connected to a
hub and then to the internet, how many
IP addresses are required for these 5 None of the
devices? One Two Four above
Physical Data-Link Network
Which of the following in an OSI layer Layer Layer Layer All of the above
When creating a network from just two
PCs, what kind of cable would be used Coaxial
to connect them? RG7U cable Fiber Twisted pair
Physical Logical A memory None of the
An IP address is a address address address above
To construct a simple LAN of 4
computers, you would connect them None of the
with ______connect them A cable Hub Router above
It continue
It gets on to target
What happens to data that is ruined Data return destroyed device with None of the
before reaching to receiver to the sender bit by bit. corrupt data above
Wireless Wired Ultra violet None of the
Bluetooth is technology Technology technology above
Which is not one of the recognized IEEE Physical Data Link Network
sub layers? Layer Layer Layer All of the above
The most preferred number system to None of the
represent a IP address is Binary ASCII Octal above
A MAC address is of 48 Bits 48 Bytes 48 KB 48 MB
a list of rules
software that for a gateway
facilitates transferring software that calling program
connection to data over a allows file for internet
Protocol is the internet network copying bridging
A ............... is a LAN-based computer
with software that acts as a controlling
device for controlling access to at least
part, if not all, of a local area network
and its available resources. Novell PC Client Server Network PC
If the hub
If one node goes down, it If the hub goes
goes down, brings down down, it brings
it brings all of the down all of the
What is the biggest disadvantage of the There isn't down the nodes on nodes on all of
Ring topology? one entire ring that section the rings
The .............. of the network concerns
how network devices are physically (or None of the
optically)
The principalinterconnected.
topologies used with LANs Physiology Topology Both A and B above
are:
What are the various types of bus Bus Star Ring All of above
architecture?
What are the various types of ring Linear Parallel Both A and B None
architecture? Parallel Circular Linear Both A and B
In a ................., each workstation
attaches to a common backplane via its
own physical cable that terminates at
the hub Ring Bus Star Mesh
In a ............... , each work station is
directly connected to a common
communications channel Ring Bus Star Mesh
Which one of the following is NOT a
network topology? Star Bus Linear Ring
In a .............. , the cable system forms
a loop with workstations attached at
various intervals around the loop Ring Bus Star Mesh
The Media Access Control (MAC) is a Network Transport Physical
sub layer of the: Layer Layer Layer Data Link Layer
Ethernet, Ethernet, Ethernet,
What are the most common LAN token ring, token ring, DecNET, Ethernet, token
technologies used in networking today? DecNET FDDI FDDI ring, ARCnet
Modem speeds are measured in bps kbps mbps mips
LAN speeds are measured in bps Kbps Mbps Mips
depend on
usually measured in the
higher than bytes per transmission limited by
WAN speeds are LAN speeds second medium modem speeds
Accessing the Internet from a typical CD-ROM
home PC requires the use of drive a modem Windows 95 Netscape
must use themust use
World Wide electronic must have a
To use the Internet, you Web mail LAN account All of the above
The worldwide web server uses the uniform common application
following standard interface to act as key gateway resource gateway protocol
the middleware: interface locator interface interface
a Novell used to interfaces a connects a
Interface control a modem to a computer to a
An NIC Controller printer computer network
Accessing the Internet from a typical CD-ROM Windows
home PC requires the use of drive a modem package Netscape
The most widely used network Novell None of the
operating system on PC LANs is Linux Netware Windows NT above
have to do
with
compression have to do
of graphics with Web none of the
JPEG and MPEG and video pages the Internet previous
none of the
A multiplexer is a form of Printer modem bridge previous
provides is a CPU
access to the is a CPU functional make of
An ISP Internet register unit processor
is a protocol for
used to the transfer of
used to send browse the is part of files between
FTP is email Web Netscape computers
uses
wireless
used to send communicati is part of None of the
Telnet email on medium Netscape above
used to
protect a
computer
room from a screen
fires and a form of saver none of the
A firewall is floods virus program previous
a backup an email a poor file
A proxy server is server server server none
IR system
for the none of the
A search engine is hardware Internet browser previous
To look for information about interest
areas on the internet, the user should
use a scanner CD-ROM clip-art file search engine
provides is a CPU
access to the is a CPU functional make of
An ISP Internet register unit processor
is a protocol for
used to the transfer of
used to send browse the is part of files between
FTP is email Web Netscape computers
uses is a protocol that
used to send telephoneis part of allows for
Telnet email lines Netscape remote login
Any layer
can
Any layer communicat
The layers can e only with
cannot communicat the layer Any layer can
communicate e directly directly communicate
Which of the following is a true with one with any above or only with the
statement about the OSI model layers? another. other layer. below it. layer above it.

It is made up
of many
networks
connected
into It works the Individual
transmission same way as computers can
Which of the following is NOT true It is one large lines called a local connect to it
about the Internet? network. backbones. network. using an ISP.
The traditional intent and impact of this
common type of attack is to prevent or
impair the legitimate use of network Password System Denial of
resources. cracking intrusion Service Port sniffing
Which of the following is NOT an Flood a Web Virus that
example of a DoS attack that is popular server with initiates a
among hackers? IP flood requests ping flood UDP flood
A ____________ attack is when a hacker
sends a continuous flow of packets to a
system. hack packet flood traffic
One defense option on a large network
is to configure a ____________ to disallow
any external traffic. firewall router switch hub
a backup an email a poor file none of the
A proxy server is server server server above

Which of the following would be Apply Backup data


performed on a network server and not security Update virus on a daily Limit logging on
normally on individual workstations? patches definitions basis access
Only large
name-
All sites are There are recognizable
What can be said about the safety of safe and safe and sites are ActiveX-enabled
the Internet? reliable. unsafe sites. safe. sites are safe.

To secure communication network Use of logical Use of


against wire-tapping the most effective Use of Use of access encryption
control is identifiers passwords methods methods
by attaching by scanning the
One way that a virus CANNOT spread by attaching through an itself to a computer for a
throughout a network is: to an e-mail. FTP port. document. connection.
Which of the following is NOT a means
of monitoring employee use of Application
company technology? Phone E-mail Web traffic updates
____________ would be used by parents
to monitor their children on their home A Trojan
system. horse Adware A worm Spyware
The formal rules and parameters which
are established to permit a
microcomputer to communicate with
the mainframe computer as though it
was a terminal of the mainframe are
called Modems Protocols Multiplexors LAN
cookies and Trojan
The two most common tools used to Trojan horses and cookies and key loggers and
help with extracting information are: horses. key loggers. key loggers. worms.
An attack
with the
Which of the following would NOT be An attack on purpose of Giving out Changing the
considered an example of cyber a system for gaining disinformatio content of a Web
terrorism? personal gain publicity n page

Disruption in
Which of the following would be a form Economic communicati Disruption in All of the above
of cyber terrorism? damage on supply lines are correct.
Crashing the Shutdown of
Which of the following is a likely target stock market, military Contaminatin Shutdown of
of a cyber terrorist that would cause as in the security g water nuclear plant
considerable loss of life? 1930s systems systems safety systems
To obtain an
accurate
inventory of
An organisation is upgrading its To carry To improve network related
telecommunication lines. Which is the more To improve system equipment and
least important objective while network network response parts and
upgradation capacity services time network nodes
A company posts a price list of its stop its
products on its website. The advantage limit access competitors update its prices
to the customer is that the company set its prices to computer seeing their as soon as they
can very high owners only prices are changed
Yahoo
Which of the following is an easy-to-use People People USA People
service to get information on someone? Search Search Search Lycos Search

Which of the following pieces of Name of your Personal


information would NOT be found online? bank Date of birth assets Criminal records
Which of the following is the most
common danger on the Internet? Virus Fraud Adware Spyware
make large
amounts of
money by
purchase off- parking funds in
The famous Nigerian Fraud scam invest shore their bank
offered victims the opportunity to: buy stocks. without risk. property. account.
The fraud type that sends e-mails that
claim to be from legitimate sites in
order to obtain sensitive information is
called _________________. Shill bidding Phishing Siphoning Hoaxing
Using the Internet to pursue, harass, or
contact another in an unsolicited Internet cyber virtual
fashion is called: stalking. stalking. stalking. Web stalking.

Setting your privacy settings in Internet


Explorer to medium is one way to block: pop-ups. cookies. spam. viruses.
Never use Use anti-
What is the best means of protection Use a fake e- your real Use a proxy spyware
from cyber stalking? mail address. identity. server. software.
Message
Which of the following is not an Physical sequence
appropriate control over Security number Logical access
telecommunications software Encryption controls checking controls
Encryption techniques can be
implemented in Hardware-Software I only II only Both I & II Neither I or II
Which protocol would be used to
download a free anti-virus program
from the Internet? irc ftp www telnet
Adds more Verifies Misleads a
The major advantage of the checksum bytes to integrity of Increases program
program is when it programs files boot up time recompilation

Which of the following is a Web Internet Microsoft both HTML and


browser? HTML Explorer Excel Internet Explorer
round trip
A Web page is another name for HTML HTML
----------- Web query. document. document. Web browser.
Domain names must contain a
description of the type of organisation .con is used
that the domain represents. A very .com is used .co in used for None of the
common abbreviation used include: for company for company companies above
the World
A standard language for creating and round trip Wide Web
formatting Web documents is: HTML. Consortium HTML. one way HTML.
The Web page format in which all
elements of a Web page are saved as
one file is called: XML. HTML. DHTML. MHTML

using clicking a
Internet hyperlink
Explorer to that
view a Web references a
page that is updating the document
stored on the values that that is stored viewing an Excel
hard drive on are obtained in the floppy worksheet that
Which of the following requires an your through a drive on your you have saved
Internet connection? computer Web query computer as a Web page.
Click on the
Mr Rao wants to find a website that he Back arrow Click on ‘Go Go to the
briefly browsed over yesterday. After until the to’ or History page Go to the
turning on his computer how would he desired site ‘Search’ in and look for Bookmarks or
do this? is found the browser the site Favorites page
the Insert
Which of the following is used to update the Refresh Hyperlink the Update the External
a Web query? command command command Data command
You download from the internet, a
screensaver, a ten-second sound file
and a ten-second music video clip. You
also add a hyperlink. Which of the
media elements has the greatest effect
on the file size? Hyperlink Screensaver Sound Video
When saving a photograph for use on a
website, which format should you
choose? BMP GIF JPEG TIFF
While researching the Direct taxes Write it Add it to Cut and paste it
assignment, you find a useful website. down on a ‘Favourites’ to a word
What is the most efficient way to Save it to a piece of or processor
access the site at a later time? floppy disk. paper. ‘Bookmarks’. document.
A system that uses the Internet for
business-to-business interaction is privileged network
called a(n): extranet. intranet. network. topology
A block of text automatically added to an
the end of an outgoing email is called attachment. a signature. a footer. an encryption.
_________ refers to the use of Internet
technologies for placing telephone
calls. VoIP IPT IPP PoIP
Desktop Desktop Desktop
Most client/server applications operate client, client, server,
on a three-tiered architecture application, software, application, Desktop server,
consisting of which of the following and and and software, and
layers? database. hardware. database. hardware.
Which do you NOT need to connect to Telephone None of the
the Internet? Modem CD-ROM line above
File
File Transfer Transmissio File Transfer None of the
What does FTP stand for? Program n Protocol Protocol above

So computers So IP
can be addresses So email is
referenced can be delivered None of the
What is the purpose of DNS? by a name shorter faster above
Which of the following is NOT a properly 143.215.12.1 None of the
formatted IP address? 193.1.2.3 45.1.1.1 9 above
paul .trigg @ paul.trigg@d
Which of the following is a properly domain. org. omain.org.u paul.domain. None of the
formatted email address? uk k uk above
The US Scientists in None of the
The Internet is controlled by whom? government Switzerland No-one above
Internet
International Remote
Internet Relay of Conversation None of the
What does IRC stand for? Relay Chat Characters s above
It will be A letter will
waiting for be sent to
If you do not pick up your email for a It will be you to you in the None of the
week...? deleted collect it post above

Receiving People
messages discussing a
automatically topic of High
What is a disadvantage of joining a from anyone interest volumes of None of the
mailing list? in the group globally email above
autolayouts
and
In Powerpoint2000 ,the built-in clipart & auto presentation slide view & none of the
professional design elements are shapes templates outline view above
Selection handles are the 8 small
___________ that appear around the
object, when an object is selected circles points squares icons
The _______ is an invisible matrix of
vertical and horizontal lines that covers
the entire slide workspace square image grid guide
_______ are drop-down menus that
appear when the right mouse button is short cut
clicked on the screen element tool bars menus auto shapes all the above
________ and ______ have the ability to
add a lot of visual impact into the clip gallery & slide show & fonts &
PowerPoint presentation
_______ is a motion picture or any word art view show images none the above
animation file wave file media clip .video file all the above
In visual basic, when a record pointer
reaches to the last record, _______
property of a recordset object is movelast,tru movelast,fals
automatically set to ______ eof,false e e eof,true
In visual basic, the explorer view of a properties form layout
project is displayed in ___________ window window toolbox project explorer
In visual basic, when a record pointer
reaches to the first record, _______
property of a recordset object is movefirst,tru movefirst,fal
automatically set to ______ bof,false e se bof,true
In visual basic, _______ is a method to
convert a string into integer. value() int() number() val()
In visual basic, in a shape control, a vb
statement gives Shape1.Shape = 2.
What type of shape should we get? circle rectangle square oval
In visual basic, a timer event is only
available in timer control. true false
In visual basic, vbred or vbgreen or
vbblue are the property values of a
backcolor of any object true false

In visual basic, _______ is a property of a none of the


textbox control to set a color of a text. fontcolor color forecolor above
In visual basic, _______ property of a
textbox control is set to _______ to underline,tru fontunderlin textunderline none of the
underline a text e e,true ,true above
In visual basic, _______ property of a
textbox control is used to change the
size of text. textsize size foresize fontsize
one- one- one-ten
In visual basic, the interval property of one- millionth hundredth of thousandth thousandth of a
a timer control is given in ________ of a second a second of a second second
In visual basic, _______ property of
listbox control counts the number of
items in the list count recordcount itemcount listcount

In visual basic, the properties of various form layout prperties project


controls can be set using __________ window window explorer toolbox
In visual basic, vbinformation,
vbcritical, vbexclaimation are the
values of _______ in a messagebox vbmsgboxsty none of the
function. title prompt le above
In visual basic, ________ is a function
which displays a message and it also
allows the user to enter values in a
form object msgbox() textbox label inputbox()
In visual basic, using a data control,
________ is a recordset type which
allows to add a new record and also to
update existing record in a opensnapsh dbopensnaps
recordsourse object opendynaset ot hot dbopendynaset
In visual basic, while closing a form
_______ event of a form object is
triggered earlier to terminate event. load activate unload initialze
In visual basic, to give a backcolor or to
bring in a picture to a command button
can only be done if we set the style
property to ______ standard opaque transparent graphical
In visual basic, a method RGB(255,0,0)
will generate _______ color blue red green black
In visual basic, a method
RGB(255,255,255) will generate _______
color red green blue white
In visual basic, if a user uses a shortcut properties form layout project explorer
key ctrl+R _________ becomes visible. window window toolbox window
In visual basic, if a user uses a function properties form layout project explorer
key F4 _________ becomes visible. window window toolbox window
In visual basic, when a textbox control
receives the focus ________ event is
triggered.
In visual basic, a form is a ________ change lostfocus text gotfocus
none of the
object. child parent container above
Microsoft visual basic is a Rapid
Application Development tool. true false
In visual basic, when a form object
appears on the screen _________ event
is triggered. load unload initialize activate
In visual basic, to display text on a label none of the
object _________ property is used text name caption above
In visual basic, _______ object is used to
access the database and also to opendatabas openrecords none of the
manage the data in the database. e dbengine et above
In visual basic, when a checkbox
control is checked _______ property is
automatically assigned with 1. enabled visible value style
In visual basic, _______ keyword is used none of the
to declare a variable dime dim var above
What is the extension of the Visual
Basic project file that stores the design
of a user control. .ctx .ctl .ctr .ocx
Which event of a text box would you
use for validating the data entered by
the user? Validate Validation Check Audit
On Error
Which of the following statements GoTo On Error On Error On Error Resume
forces inline error handling? linelabelGoTo Inline Stop Next
The _______ method resets the contents
of bound controls to their original
values when the user clicks on the UpdateContr
cancel button. ols PaintPicture Refresh Resize
Cancel UnloadMode
To deactivate the Form UnLoad event, parameter to Cancel parameter to UnloadMode
you make the following change in the a non-zero parameter a non-zero parameter to a
function definiton: value to 0 value zero value
How many root nodes can a TreeView None of the
control have? 1 2 3 above
Consists of
Various
Consists of Consists of Forms And
several several Code Consists of
A project group is a Project which: Programs Applications Modules several Projects
Procedures declared in a _____ are local Form Project
whereas procedures declared in a window, window, Class
______ are available to the whole standard or view code module, None of the
application. code module window code module above
Place code in Place code Place code in
the in the the
How can you keep the user from exiting Terminate Unload Deactivate None of the
a form by clicking the Close button? event event event above
The _______ property enables Visual
Basic to draw complete images in
memory before displaying them on the AutoRedraw AutoRedraw
Screen. = True = False Refresh PaintPicture

You want to display the code and the Msgbox Msgbox Msgbox Msgbox
description of an error. What would be err.no & err.number error.number error.number &
the correct syntax? err.text & err.text & error.text error.description
To provide a
To display To help in To allow the repository for
What is the purpose of the Image List images to the creating a editing of images used by
Control? user ToolBar icons other controls
Which method would you use to get a
free or unused File identifier while
opening any file: FreeFile GetFileNum GetFile GetBytes
Which property procedure is used to
retrieve the value of a property? Retrieve Get GetProperty Value
Common
Which of the following can be shown to messages
the user using the Common Dialog passed to Open dialog Windows
control in VB? Windows box explorer Input box
Which of the following are not
properties of Command Button: Caption Visible Multi-Line Font
Click, KeyUp
Which events enable you to determine Click and and KeyUp and KeyPress, KeyUp
which key was pressed by the user? KeyPress KeyDown KeyDown and KeyDown
In order to access a file in Non-textual Binary
format, you have to open file in: Ascii Format Format Input Mode Output mode
Visual Basic displays information ScaleLeft
depending upon the current value of CurrentX and and ScaleHeight
two properties of the form, called: CurrentY ScaleTop and ScaleTop x and y
Which of the following procedure types
will execute when you assign a value to Property
a property of an object? Property Get Assign Property Let Property Set

In order to overlap the controls (say a


command button) during design time,
we use the ‘Send To Back’ or ‘Bring To
Front’ option from the Edit menu. To Background
change it dynamically (i.e.during color Caption ZOrder AutoRedraw
program execution) we need to change: property property property property
Which property of the ProgressBar
determines how much of the bar is
filled? Min Max Value CurrentVal
The ______ function can be used to run
any .com, .exe, .bat or .pif file from a
Visual Basic program. Shell Substr SetAttr CStr
Can be Are actually
The caption and the name properties of Are one and different at not None of the
the command button: the same times properties above
You try to initialize a new Object You do not You do not
variable with the following line but need to use have the
receive an error. What could be the the Set permission MyVar has
possible cause? Set MyVar = New command to access not been None of the
Classname here the class declared above
The
Which of the following will perform a The Open The Exec ExecProcedu None of the
direct execution of a Command object? method method re method above
A critical
An
A warning message exclamation None of the
The vb Critical symbol displays: query icon icon icon above
intrinsic built-in
vbYesNo is an example of a(n): statement. variable. constant. procedure.
InputBox
function can
be created
MsgBox InputBox with the MsgBox
statement function macro statement can
returns a returns a recorder, be created with
value, while value, while while the the macro
The primary difference between the the InputBox the MsgBox MsgBox recorder, while
MsgBox statement and the InputBox function does statement statement the InputBox
function is the: not. does not. cannot. function cannot.
Which of the following is TRUE about a
protected form (i.e., a form where the
Protect Form button on the Forms Data cannot The form
toolbar is toggled on and is assumed to be entered can be Data can be A new check box
remain in that position)? into the form. modified. entered. can be added.
Which event is triggered when the user
moves to another open form? Unload QueryUnload Deactivate Terminate
The user can use ______ to remove the scribble drawing
undesirable part of the image clipping tool cropping tool cutting tool tool
The power presentation has a _____ for
a set of compatible colors color palette color box color scheme color guide
The set three colors used for graphs
and for secondary slide items is called tricolor primary color
as ascent scheme color palette scheme
There are ______ types of charts
available in PowerPoint 10 28 18 36
_______ charts are useful while showing
variations over a period of time column bar pie linear
_______ are the individual pages of a images and slide sorter
presentation images text slides views
A PIE Chart is a ____ diagram that
depicts the relationship between a
whole and its parts circular radar doughnut all the above
Each individual piece of data in a
series is called a/an entity data point data stream
Microsoft
PowerPoint launches an OLE-compatible organization
application called chart clip art auto shapes track changes
the chart
window
the the chart is opens
organization made displaying a
When the user double-clicks on an chart is available for chart none of the
organization chart object in PowerPoint expanded editing template above
general
The _____ are used for selecting, editing purpose custom standard
and viewing objects in the chart box tools tools drawing tools drawing tools
used to
used to create a used to store the
mange accessed manager box other tools of the
Manager box tool in organizational organizationa only by for an organizational
chart window is l chart manager existing box chart
not available
The custom drawing tools are _______ in the tool available in the
by default turned on turned off bar tool bar
Click on the box tool ______ to draw
three boxes once twice thrice any of the above
There are ____ default fields available in
all boxes of the organizational chart two four five eight
The _____ tool is used in the same way
as we use a pen to draw a table native tool draw tool standard tool all the above
A/An _______ consists of smaller printed
version of the slides autolayouts handlayouts slide view none of these
The size of the object can be changed reduce/enlar none of the
using the ______ tool zoom ge preview above
_______ is the process through which the
slides in the current presentation are
included in another presentation or
application importing exporting copying moving
________ can be used to create charts as Microsoft
well as worksheets excel auto shapes clip art drawing tools
. .
PowerPoint can import text files that ppt(PowerPoi .rtf(rich text doc(docume .html(hypertext
have been saved in ______ format nt) format) nt) format)
PowerPoint outlines can have _____
outline levels nine only one six twelve
When a file is saved with _____ .
extension, the graphics and text are .rtf(rich text wmf(window .txt(plain
also saved along with the slide format) s metafile) text) .doc(document)
displayed
not displayed only during displayed
during the the slide only in none of the
The hidden slide is slide show show outline view above
____ effect is used to introduce a slide DTS(digital 3D(3
during a slide show track sound) dimension) both a and b transition
A _____ is a special effect that
determines how the objects appear on
the
The slide
notes page is formatted based on build transition slide show view show
the notes master slide master master slide master notes
Pick the odd man out of the following outline view slide view view show slide sorter view
When a new presentation is opened
,powerpoint creates slides that have a 10
width of _____ and a height of ______ 15 inches,10 inches,7.5 7.5 inches,5
with the landscape orientation inches inches inches none the above
The default orientation for notes
,handouts and outlines is ____ none of the
orientation portrait landscape a or b above
Build effect is also called as ______ animation view show transition b or c
Graphics for web pages are none of the
automatically stored in ____ format gif jpeg png above
A _______ is used to jump to any slide in
the presentation hyperlink hypertext action button all the above
visual basic Microsoft
The ______ language has been for visual
incorporated into PowerPoint visual c++ application interdev all the above
In PowerPoint _____ is a series of
commands that are executed in
sequence macro batch file templates add-ins
while when the
creating a during slide slide show is none of the
The macro will be activated .exe file transition run above
Developers can easily add ____ to
PowerPoint 2000 by using the virus spell
programming interface checkers checkers header files all the above
______ determines the order in which
order in which the slides will be none of the
displayed during the show slide show custom show both a and b above
_______ is used to organize and develop properties
the contents of a presentation slide pane notes pane pane outline pane
If we save the presentation file as a internet paint shop paint shop power point
metafile, it can be opened using explorer pro pro 2000
PowerPoint
creates a
sample contains
presentation sample
to which user it is the presentation provides
With reference to autocontent wizard can add quickest way s for a suggested
for creating a new presentation, which words and to create a variety of content and
of the following statements are not true pictures presentation topics design

user can user can


insert only insert picture
user can pre-drawn, to the user can insert
insert objects pre-colored master slide picture to the
like clip-arts, graphic which gets title slide which
pictures images reflected in gets reflected in
stored in a reflected inall the slides all the slides
Which of the following statement is not separate files a clip arts to
using that using that title
TRUE to the slides the slides master slide slide
in notes
in outline in slide pages view,
view, drag sorter view, drag the
With reference to changing the order of the slide icon drag the slide icon to I slide view, drag
slides, which of the following statement to a new slide to a a new the slide icon to
is not true location new location location a new location
the slide that
holds the
formatted
placeholders
for the titles,
main text
and any transition design the slide that
background means templates is holds the
items that applying the template formatted
user wants to special whose placeholders for
appear on effects to format and the title and sub-
the slides is the color scheme title for the
called a crossover user applies presentation is
Which of the following definitions are master between the to a called a title
not true templates slides presentation template

in outline
view, user
can see the
with notes miniatures
pages view of all slides
user can in a user should
prepare presentation select the
speaker , complete slide view to the slides can be
Which of the following statements are notes and with text add the text reordered in the
not true handouts and graphics to the slide outline view
the slide that
holds the
formatted
placeholders
for the titles,
main text
and any transition design the slide that
background means template is holds the
items that applying the template formatted
user wants to special whose placeholders for
appear on effects to format and the title and
the slides is the color scheme subtitle for the
called a crossover user applies presentation is
Which of the following definitions are master between the to a called a title
not true template slides presentation template
The options available in the common
task toolbar does not include slide layout customize new slide set up show

by default,
doughnut
data to be chart is
graphed displayed user can add
resides in a based on the data is data labels and
With reference to chart, which of the datasheet data in the plotted in a gridlines to the
following statements are not true window datasheet chart window chart
The format of the text entered in a title,
subtitle, or bulleted-list object is
determined by the format settings in a the master the slide the header
special slide called -------- slide master slide the format slide
PowerPoint provides a _________ that
searches the entire presentation i.e., all
the text objects in all the slides,
outlines, notes and handouts for office spell grammar none of the
spelling errors assistant checker checker above
PowerPoint's drawing toolbar contains
_______ drawing tools 10 12 102 22
Click _______ on the rectangle drawing
tools enables us to draw multiple
rectangles once twice three four times
text, CD-ROM,
text, graphics hypertext digital text, hypertext,
An example of the components of a and email and Power camera and Power Point,
multimedia presentation could include address. Point. sound. video and sound.
Which of the following formatting Line style, Line
elements can be applied to a the Font and color, text font,
PowerPoint diagram using the the Line the text and text
AutoFormat tool? the Line style color alignment alignment
Which of the following formatting
elements can be applied to a Fill color, Line
PowerPoint diagram using the Format Line color, and Line
AutoShape command? Fill color Line color thickness thickness
A popup box Microsoft
Excel is prompts you Graph is
started so for an started so
What happens when you double click a that you can existing that you can The graph
blank graph placeholder in a PowerPoint create a Excel chart create a placeholder is
presentation? chart. to insert. graph. deleted.
taken from
the first
column or
row of data
in the
datasheet,
depending
always taken always taken on whether
from the first from the first the data
row of data in column of series are in
The legend in a Microsoft Graph chart the data in the rows or entered by the
is: datasheet. datasheet. columns. user.
Suppose you are creating a Microsoft
Graph of quarterly sales by region.
Which would be the best chart type if
you want to emphasize the total sales Side-by-side Stacked
of each region? column column Pie chart Line chart
Pull down the
Insert menu and
select Chart,
click the Insert
Chart button on
Pull down the the Standard
Click the Insert menu toolbar, or pull
Pull down the Insert Chart and select down the Insert
Which of the following actions will Insert menu button on the menu and select
enable you to insert a graph into a and select the Standard appropriate the appropriate
PowerPoint presentation? Chart. toolbar. Object. Object.
Click the
chart object,
then click You cannot
the View display the
It Datasheet Pull down the underlying
If you are editing a slide containing a automatically button on Edit menu, datasheet once
Microsoft Graph, how do you display the displays in the Standard then select the slide is
underlying datasheet? Slide view. toolbar. Object. finished.
How do you deselect a chart that has
been placed onto a PowerPoint slide
after you have finished creating the Single click Double click Click outside Change to Slide
chart? the chart. the chart. the chart. Sorter view.
A dialog box
is displayed
A dialog box allowing you
is displayed to enter the
allowing you name of the
to enter the Excel
name of the worksheet
Excel that should
worksheet be The datasheet
that should embedded in window is
be linked to the The toggled from
What happens when you click the the PowerPoint datasheet is closed to open
Datasheet button on the Microsoft PowerPoint presentation saved as a (or from open to
Graph toolbar? presentation. . separate file. closed).
The chart is The application
What happens if you single click a chart The chart is The chart is doubled in that created the
that is not currently active? selected. deleted. size. chart is started.
The chart is
What happens if you double click a The chart is The chart is doubled in Microsoft Graph
chart that is not currently active? selected. deleted. size. will restart.

a slide one bullet


item at a time,
build bullet
items a letter at
a slide one bullet items bullet items a time, and build
Using custom animation effects, you bullet item at one letter at one word at bullet items a
can build: a time. a time. a time. word at a time.
Subtle,
Which of the following animation effects Moderate, or
can be added to a slide? Subtle Moderate Exciting Exciting
Both enter
and exit, and Neither enter
Fly in from fly in from nor exit; neither
Which of the following animations Enter and top or top or fly in from top
effects can be added to a slide? exit bottom bottom nor bottom
Which keyboard key is used to select
more than one picture on a slide? Enter Shift Alt Ctrl
Custom
animation can
be used to affect
the way objects
appear on a
slide, to what
objects do after
the way what objects they appear on a
objects do after they the way slide, and to the
Custom animation can be used to affect appear on a appear on a objects exit a way objects exit
ONLY: slide. slide. slide. a slide.
The
advanced
timeline
shows the The advanced
sequence in timeline shows
The The which neither the
advanced advanced objects will sequence in
timeline timeline appear on which objects
shows the shows the the slide and will appear on
sequence in duration of the duration the slide, nor the
Which of the following best describes which objects the effect of the effect duration of the
the information that appears on the will appear applied to applied to effect applied to
advanced timeline? on the slide. each object. each object. each object.
Clips,
Which of the following objects can Organization organization
contain custom animation effects? Clips charts Text charts, and text
What type of program allows an object
within an image to be edited without Paint Draw Filtering Animation
affecting other objects? program program program program
Which of the following animation effects Fly in, From top,
can be added to a slide? Fly in From top Dissolve in and Dissolve in
Once data is Once data is Data cannot
entered it entered it be entered There is no such
Which of the following is TRUE cannot be can be into thing as a
regarding the Datasheet? changed. changed. Datasheet. Datasheet.
Graphical software tools that provide
complex analysis of stored data are: OLTP. OLAP. OLST. OLIP.
You can
change both
You can the
change the appearance You cannot
appearance of a whole change the
of a whole diagram and style of the You cannot
diagram, but the connecting change the color
not individual individual lines in an of the boxes in
Which of the following statements is shapes of a shapes of a Organization an Organization
TRUE regarding PowerPoint diagrams? diagram. diagram. chart. chart.
Which keyboard key combination is
used to undo the previous
command(s)? [Enter+A] [Shift+Z] [Alt+Z] [Ctrl+Z]
Microsoft visual basic project file has
_______ file extension. .vbg .vbp .frm .frx
In visual basic, _______ method is used none of the
to add an item in a combobox add additem loaditem above
In visual basic, _______ method is used
to load picture during runtime in an none of the
image control load loadpicture addpicture above
In visual basic, to populate a drive list
box with a directory list box __________ Drive1.Drive Dir1.Path = File1.Path = none of the
statement is used =Dir1.Path Drive1.Drive Dir1.Path above
In visual basic, to display a message in messagebox( none of the
the run time _________ function is used ) message() msgbox() above
In visual basic, to populate a directory
list box with a file list box ________ Dir1.Path=Fil Dir1.Path = File1.Path = File1.pattern=Di
statement is used e1.Path Drive1.Drive Dir1.Path r1.path
In visual basic, ________ is a property of
a recordset object which counts the
number of rows in a recordsourse openrecordse opendatabas
object t e recordcount count
In visual basic, using a data control, a
record can only be added from the last
record. Adding a new record is only
possible using _______ method of a
recordset object. update append addnew additem
In visual basic, using a data control, a
record is saved to a recordsource object
using _______ method of a recordset
object. append update additem addnew

In visual basic, using a data control, to


navigate to the previous record ________ movepreviou
method of a recordset object is used. movenext movelast s movefirst
To deactivate the Form UnLoad event,
you make the following change in the
function definiton:Private Sub
Query_Unload(Cancel as Cancel UnloadMode
Integer,UnloadMode as Integer) To parameter to Cancel parameter to UnloadMode
prevent the Form from closing, you will a non-zero parameter a non-zero parameter to a
set the: value to 0 value zero value
_______ is a word processing that is a
member of the office 2000 family Word 2000 Office 2000 Office 97 Back Office
The feature that enables user to type
anywhere in a document without none of the
pressing or tab click-n-type double click drag & drop above
The______ feature allows the user to
copy and paste upto 12 items at the office none of the
same time in an application clipboard cut select above
______ and _____ key combination will shift+end shift+left
extend the selection by one character and and ctr+end and none of the
on the left and right shift+home shift+right ctr+home above
normal
_____and_____ are improved layout in web layout, layout, web web layout, none of the
Word 2000 printlayout layout page layout above
click from
start
program,
MSWord
The easiest way to create a document from the task none of the
in word is wizard templates menu above
In Office2000 environment the tool that office inbox document none of the
makes work easier for us is_____ assistant assistant assistant above
A short description of a tool bar button
called the ______ is displayed when the
mouse pointer is allowed to stay for a
second on the button Screen Tip Tool Tip Icon Tip Document Tip
The _____ helps us to keep track of the marginal none of the
margin of the page tab stop stop ruler above
home and
The keys that are used to navigate up arrow page up end keys up and down
between headers and footers are keys only keys only only arrow
Pick out the element from the following
that does not form the type of tabs for
the Word 2000 left center decimal rotation
_______are blueprints or patterns for none of the
documents of a certain type template model dialogs/alerts above
The______ is used for quickly setting increase decrease none of the
paragraph indention using the mouse indent indent
control tool both A
design and B above
Word art is text with special effect box wizard pictures
AutoShapes in word can be created by drawing
accessing the _____ toolbar control box database forms
By default, a document consists of_____
section 1 2 0 11

printer setup
The dialog box that is used to page setup from the file print preview none of the
determine the documents margins is from the file menu from the file above
________ is a box surrounding a page on
all slides or a line that sets off a none of the
paragraph on one or more slides border shading style box above
The key that is used to perform a task
to select all t he text in the documents
is
The key that is used to indent a ctrl+a Del ctrl+f ctrl+m
paragraph is ctrl+a Del ctrl+f ctrl+m
The key that is used to change the font
from the current positioned in a CTRL+SHIFT CTRL+SHIFT
document is +F CTRL+O +S CTRL+SHIFT+P
The key that is used to change the style
of the document that is from that
normal to heading1 or heading1 to
other document styles. ctrl+shift+f ctrl+o ctrl+shift+s ctrl+shift+p
Set mapping' Check control that follows
a text-type validation, we use
----------------- application for data None of the
analysis. Excel Access Both above
Excel can import data from other
databases for the data analysis. TRUE FALSE
A System Auditor can uses CAAT tools
to analyze data FALSE TRUE
In the case of the ---------- control, it is
ensured that the data in combination
with other fields are reasonable as per Transaction
standard set by an organisation. Valid Signs type Limit Check Reasonableness
--------------- function searches for a
value in the leftmost column of a table
and then returns a value in the same
row from a column that we specify in a None of the
table HLOOKUP VLOOKUP A or B above
Most of the tools use in Data Analysis
depends on DDE OLE ODBC All of the above

Analysis Analysis is This involves


translates the loading looking at a
program of programs system and
code of a that perform finding out
high level routines to how
language to control information
How do you define analysis of an machine peripheral is being
information system? code devices handled None of above

Inputs, Maintenance,
outputs, file reliability,
Only design and
What areas need to be considered in hardware hardware, upgradeabilit
the SOFTWARE design process? and software and software y None of above
To execute
What is the function of systems To collect any To maintain None of the
software? data programs security above
Formatting a disk results in all the data Deleted from Copied from Saved to the Transferred from
being...? the disk the disk disk the disk

Users
operate the
manual Users
system and operate the Users
computer computer operate the
system at the system from manual
What is Direct Implementation? same time a given date system None of above
The new The new
system is system is
introduced introduced Users
alongside the and users continue
existing start operating the
What is parallel running? system operating it old system None of above

Instructions User Guide


and technical Log files andand technical
What documents are produced during documentatio temporary documentati
the development of a system? n files on None of above
User guides
cover how to
To enable run the
any printer system,
to be enter data,
For technical connected to save, print,
What are User Guides are used for? support the network etc. None of above
Operating Network Database
systems and systems and systems and
Systems software can be categorised system communicati backup None of the
into: services on services services above
Which storage device cannot be Magnetic
erased? tape storage CD-ROM floppy disk Hard disk
To help
To maintain a someone
backup copy To do a who is
Application software are programs that of all the particular applying for None of the
are written information task. employment above
Which bus carries information between
processors and peripherals? Data bus Auto bus Address bus Control Bus
Convert the decimal number 2989 to
Hexadecimal FDDI BAD TED MAD
Which bus controls the sequencing of
read/write operations? Data bus Auto bus Address bus Control Bus
Data
Operating structures
system that are part
Peripherals routines that of the kernel Shells, compilers
that are execute in of an and other useful
connected to supervisor operating system
What are utilities? a computer. mode. system. programs.
Numbers are stored and transmitted ASCII code alphanumeric
inside a computer in binary form form decimal form form
represented
256 represented 127
The original ASCII codes were 7 bits 8 bits characters characters
A Nibble corresponds to 4 bits 8 bits 16 bits 32 bits
More than
1000 mega 1000
A gigabyte represents bytes kilobytes 230 bytes 1024 bytes
32 I/O 32 Mb of a 32-bit bus or
A 32-bit processor has 32 registers devices RAM 32-bit registers
used to
indicate
uppercase used to is the first bit is the last bit in
A parity bit is letters detect errors in a byte a byte
the contents of these chips are lost
when the computer is switched off? ROMper
bits RAM DRAM CROM
Clock speed is measured in second baud bytes Hertz
secondary secondary
memory memory storage storage access
Cache memory enhances capacity access time capacity time
have fewer use more
instructions RAM than have
than RISC RISC medium use variable size
CISC machines machines machines clock speeds instructions

Data is not
Computer is saved before
Every data from the primary memory Power is improperly computer is
will be erased if switched off shut down shut down All of the above
a parallel a serial printer a modem
An RS-232 interface is interface interface interface interface
For print quality you would expect best dot matrix ink-jet
results from line printer printer printer laser printer.
is faster to stores more
access than is non- information is used for cache
ROM RAM volatile than RAM memory
increased the provides
storage backup
capacity of a increases power in the
computer the process event of a none of the
A UPS system speed power cut previous
has more
storage is an access
capacity card for a
is a form of than an ATM security contains a
smart card ATM card card system microprocessor
SSGA none of the
Laptop computers use CRT displays LCD displays displays previous
having
several writing
programs in programs in
RAM at the multiple none of the
Multiprogramming refers to same time multitasking languages previous
having
several the ability to
softwares run 2 or writing
running at more programs in
the same programs multiple none of the
Multitasking refers to time concurrently languages previous
What are small high speed memory
units used for storing temporary
results? ALU Registers Variables Logic Bus
A good way to exchange information
that changes rapidly is through brochures magazines CD-ROM e-mail
to run more
than one
program at
an operating the same none of the
Multiprogramming is a prerequisite for multitasking system time above
multiprogra none of the
Timesharing is the same as multitasking mming multiuser previous
______ is the default view in Word used
for typing Editing and Formatting the ONLINE ONLINE
Text NORMAL LAYOUT PAGELAYOUT DOCUMENT
The short-cut-key that is used to indent
a paragraph spacing in the documents
is ctrl+m ctrl+2 ctrl+end ctrl+home
The short-cut-key that is used to paste
the selected text ctrl+v or ins ctrl+c or ins ctrl+x or ins ctrl+v or Del
The short-cut-key that is used for none of the
paragraph spacing(1.5) ctrl+2 ctrl+5 ctrl+1 above
The box that separate text from the
document and allows it to behave like
an independent object is known as Text Box Frame AutoShape Border

The object that is used to provide


information like the title of the book, Header and none of the
name of the chapter, page number etc. Footer Screen Tips Page Layout above
The object that helps us analyzing data
statistically is known as Chart WordArt Auto Shapes File
To highlight certain parts of a page to
set it apart from the rest of the page we
make use of the following features Borders Shading WordArt Bullets
To clear all the tabs in a document the
option that is clicked from the tabs
dialog clear remove all remove clear all
The dialog box that is used to picture
incorporate picture bullets into our bullets dialog arrow bullet circle bullet
documents or web pages is box dialog box dialog box none dialog box
The object that composes of set of tools
which helps to create and work on
different shapes like rectangles, circles,
flowcharts etc. charts WordArt AutoShapes files
When word is opened a new document
called_____ is displayed, where the user new default
starts typing the content right way doc1 document1 document document
______ is an online dictionary
maintained by word to obtain synonyms none of t he
for words thesaurus hyphenation mail merge above
The thesaurus is invoked by thesaurus tools+spelling
pressing_______ shift+f7 menu shift+f8 menu
When a new table is created the last cell of the t
insertion point flashes in the _____ first second first row able
By pressing the _____ key inserts a none of the
blank row after the last row in the table tab end enter above
table auto
The ______ option enables us to convert convert text convert data format none of the
text into a table format to table to table option above
A table consists of ______ that contain rows & none of the
text or graphics row columns records above
The _______ option in word allows the
user to automatically correct misspell none of the
words as and when they are typed AutoCorrect AutoFormat style gallery above
______ is a facility that enables
recording and replaying of a sequence none of the
of keystroke Mail Merging Macro Data Source above
In Word Macros are written in _____ basic visual basic vj++ visual FoxPro
In Word 2000 the macro dialog box is
activated with the help of ____ key
combination shift+f8 shift+f7 alt+f8 alt+f5
________shows how a document would
look like when published on the web or web layout online layout none of the
on an intranet view view browser above
______ is a software for sending and outlook micro soft
receiving e-mail messages email client express outlook hotmail
________is the coding system used to
create web pages html xml sgml vb script
The network that makes information
easily accessible across various
networks is _______ internet intranet arpanet LAN
field name field names
must be the field in the header the number of
listed in the separators in source must fields names in
same order a header match any the header
as the source and merge fields source must be
correspondin the data you've the same as the
Which of the following statements are g information source can inserted in number of data
false with reference to the use of a in the data not be set as the main fields in the data
header row source for a mail merge source paragraph document source
auto format
option
applies to by default
the entire cell height
it is not table and and weight delete cells
possible to not only to option option allows to
change the the selected applies to all delete the entire
height of only rows or the rows and row or a column
With reference TO TABLE WHICH OF selected rows columns of a columns of a or shift cells up
THE FOLLOWING STATEMENT ARE false of a table table table or shifts cells left
The alignment available for tabs does
not include left decimal justified top
In order to
type a
header from If a header is
A new the third inserted in
section is page of the the second A section is a
created in document a section then portion of a
order to section the same document in
change break is header is which certain
properties inserted applicable to page formatting
Which of the following statements like number after t he the first option can be
related to a Section Break are True of columns third page section set
The user can set a spelling checker to
skip the marked part of the next true false
New option under the file menu of word
creates a new blank document that is
based
The on can
user the split
normalthetemplates
screen only into true false
two parts true false
The features that enables the user to
type text graphics tables anywhere in
the document without pressing enter or none of the
tab user can modify the picture from
The drag & drop click -n-type Double Click above
the clip art true false
with t he caps
lock key
accidentally
turned on
reverses the
automatically case of the
corrects prohibits the automaticall letters that were
common user from y corrects capitalized
typing, renaming an the incorrectly and
With reference to auto correct which of spelling auto correct grammaticall then turns off
the following statements are false errors entry y errors the caps lock
password
protected
document
can be
opened
With the reference to password password can without password are password can be
protected documents which of the not include password as not case upto 15
following statements are false spaces read only sensitive characters long
The alignment available for tabs does
not include left justified hanging top
a .ppt file can a document
not not be file can be a multiple an .xls data can
inserted at inserted in documents not be inserted
specified the current files can be at specified
position in document at inserted in position in the
Which of the following statements are the current specified the single current
False document position document document
Drop Cap tool does not work for the
contents in the table format true false
The special symbols that are inserted
using "insert symbol" option of the word
can not be printed by the printer as
they are not standard keyboard
symbols true false
The "format columns" option allows to
create columnar text up 12 columns
only. true false
The document that makes the user to
organize and maintain a long
document, such as multipart report or a Master Child Hyperlink none of the
book consisting of chapters Document Document Document above
The view that enables us to view how
objects will be positioned on the page Print Layout Outline none of the
when it is printed View Page Layout Layout above
The mode that is initialized or toggled
to if the user is in a position to Type Over none of the
overwrite the text in the word Insert Mode mode Remove above
Veena is entering a paragraph in a word
processing program. When the cursor
gets to the end of a line, what is the
best way to get the cursor to the next press the press the press the
line? return key tab key escape key just keep typing
How are data organized in a layers and lines and height and rows and
spreadsheet? planes spaces width columns
Which key moves the cursor to the backspace/
beginning of the next line of text? tab enter/return delete shift
Veena typed the following sentence:
"The girl was very beautiful." In which
word processing utility could she find a grammar spell
synonym for "beautiful"? checker checker thesaurus outliner
send a public
message to
Using an electronic bulletin board, friends send send private
Seema can do all of the following interested in pictures to a messages to send a package
except which one? one topic friend a friend to a friend
Aryan has created a ten-page story, but
only wants to print the first two pages.
What printer command should he From ___ To
select? Print all ____ Page setup Print preview
What process should be used to recall a
document
Which saved
is used previously?
to indent text within a Enter Copy Retrieve Save
document? closing tabbing spacing sorting
Desktop publishing is a more
sophisticated form of which of the word
following types of software? database graphing processing spreadsheet
Creating and
To analyse editing Storing None of the
What is a Word Processor used for? figures documents information above
What is a picture that is saved on a
diskette and can be pasted into a
document? subscript annotation clip art clipboard
Spelling,
Clear, grammar Cut, copy, Font, Paragraph,
What basic tools would you find in the replace and and paste and Bullet and
Edit menu of a word processor select autocorrect clear Numbering
Numbers Text which
Text at the which appear at
bottom of appear on the top of Designated area
What is a header in a document? every page every page every page on the document
Mouse,
printer and Keyboard,
processing Mouse, Monitor,
system monitor and keyboard None of the
What hardware is essential for a word? keyboard? printer and mouse above
The user could take a picture from a
magazine and insert it into the
document by using a Browser clip-art file microphone digital scanner
Assume you are creating a two-column
newsletter. Which type size is the most
reasonable for the text in the columns? 6 point 10 point 15 point 25 point
Given the default left and right margins,
and ½-inch spacing between columns,
the width of each column in a two- impossible to
column document will be: 2½ inches. 2¾ inches. 3 inches. determine.
Word cannot
display columns
Assume you have made all appropriate You have not You have not during editing;
selections in the Columns dialog box in inserted a specified you will see
Word, but cannot see any columns on You are not column continuous them only when
the screen. What is the most likely in Print section section you print the
cause? Layout view. break.. breaks. document.
to move a
section of
text from the to leave an
original original section
While word processing, in which of the to store a file to store a location to of text in place
following situations would Tom use the on the hard file on a another while pasting a
"Copy" command? drive diskette location copy elsewhere
Data about a A set of
set of similar different None of the
What does a document contain? things Mainly text graphics above
Before submitting your work you want
to find any words spelt incorrectly. Spell Grammar
Which of the following would you use? Thesaurus Checker Checker Find and Replace
What command in a word-processing
program can be used to change the
word ‘him’ to ‘her’, and also the word
‘he’ to ‘she’ in the given phrase? “On a
cold and still night, the only sound that
could be heard was the owl that had
ade its home in the nest outs Paste Replace Select all AutoCorrect
What edit commands would you use to
insert a paragraph from one document
into another document, while still
keeping the paragraph in the first Copy, then
Cut, then Delete, then Insert, then
document? paste paste paste paste
To give the
To give the original
original author a To
author a chance to complicate
chance to reject the revision
accept suggested process and To allow multiple
Which of the following statements suggested changes to force the people to work
would NOT be a reason for showing changes from from the author to on one
suggested revisions in a Word the person person who spend more document in
document without changing the original who entered entered the time making collaboration
document? the revisions revisions corrections with one another
A vertical
line outside
the left
margin
A red signifies a
A line underline change has Comments are
appears appears been made enclosed in a
through text beneath text at that point text box at the
Which statement is NOT true regarding that is to be that is to be in the right of the
revisions made in a Word document? deleted. added. document. document.
Through the Through the
Edit menu by Tools menu
choosing by choosing Through Both through the
Track Track tools on the Tools menu and
How are suggested changes entered for Changes Changes Reviewing the Reviewing
review on an initial Word document? command command toolbar toolbar
The Versions The Versions
command command The Versions
will allow youwill allow command The Versions
to save you to save will allow you command will
multiple only one to save only allow you to
versions of a version of a one version save only two
document, document, of a versions of a
including any including document document: one
changes that any changes without any version of the
may have that may changes that original and one
Which of the following is TRUE about been made have been were just version of any
saving a document using the Versions to that made to that made to the changes made
command? document. document. document. to the document.
The first and
The latest second
All versions version is versions are The previous
What happens when you open a are opened opened opened version is
document that has been saved using automatically automaticall automaticall opened
the Versions command? . y. y. automatically.
You have used the word ‘discover’ four
times in an English essay you have
created using a word processing
program. You would like to find another
word of similar meaning to use instead
of ‘discover’. Which of the following Grammar
would you use to do this? Dictionary check Spell check Thesaurus
Word The most Word will
displays a list recent show the
When opening and working with of the dates version will name of the Word is not able
multiple versions of a document, how and times appear at person who to tell the most
can you tell which is the most recent each file was the bottom saved each recent version of
version? saved. of the list. version. a document.
Various fields are added to a regular
document to create a special document
called a form through the ____________
toolbar. Fields Tools Forms Insert
Which of the following types of fields Toggle
CANNOT be inserted into a form? Check boxes button Text fields A drop-down list
Comments
can be
edited or
deleted by Comments can
right clicking be edited or
Which of the following is TRUE related Comments Comments the deleted by left
to editing comments in a Word cannot be cannot be highlighted clicking the
document? edited. deleted. text. highlighted text.
Numbers Text which
Text at the which appear at
bottom of appear on the top of None of the
What is a header in a document? every page every page every page above
In your English essay you notice that
the paragraph at the bottom of page 1
continues on to page 2. You would like
to make this paragraph start on page
2.What would be the best way to do Press Copy and Insert page
this? Press tab. Return. paste. break.

Tables in a document help you to easily


arrange all of the following EXCEPT: text. graphics. forms. numbers.

To identify a document, it is helpful to header/footer


include the file name on each page as a . bibliography. find/search. macro.
Which of the following tools will copy Format
the formatting of selected text to other Painter This action is not
places? Copy button Paste button button possible.
What is the name of the process of
determining the cause of errors in a Bug Error
macro? Fault Finding Squashing Injecting Debugging
Drop caps are added to a Word
document using the ___________ menu. Insert Tools Format Edit
a section of the
text where guidelines
the first used to
letter of establish
each where
sentence is different
a section of lowercase elements of an enlarged
white text on and the rest the capital letter at
a black are newsletter the beginning of
A reverse in a newsletter is: background. uppercase. will go. a paragraph.
underlining
setting it in typing it all the text of
larger type or in capital the pull changing the
A pull quote is best emphasized by: font size. letters. quote. color.

A dropped
cap is a word A grid is a set of
A pull quote that starts horizontal and
The reverse is a with a vertical lines
technique quotation lowercase that determine
means to add taken from letter when it the placement of
dark text on (pulled) from should have elements in a
Which of the following definitions is a light another a capital newsletter or
CORRECT? background. document. letter. other document.
Pertaining to newsletters, which of the The height The tab spacing
following cannot be changed using the The width of of each The number within each
Columns command dialog box? each column column of columns column
As related to type size, how many
points are there to the inch? 6 10 12 72
Assume you are working on a
newsletter in which the masthead
extends across the top of the entire
first page. The rest of the newsletter
has two columns. What is the minimum
number of sections in the newsletter? One Two Three Four
Press
Ctrl+Shift+E
Press nter to Press Enter Press
Which of the following is NOT correct Ctrl+Enter to create a to create a Shift+Enter to
with respect to page, column, and create a column section force a line
section breaks? page break. break. break. break.
Which of the following would be the A sans serif
most appropriate font for a newsletter A serif font at font at 10 A serif font A sans serif font
headline? 10 points points at 20 points at 45 points
It depends on
the left and right
margins, and
how many
Which of the following is the default columns are
Word column width? 2 inches 3½ inches 4 inches specified.
Sequence Check is a --------------- level None of the
control check. Field Record Both above
Analyse data over two or more periods None of the
is called ----------------------- analysis Horizontal Vertical A or B Above
We use Hash Total to identify ------------
within a series where there is a definite Duplicate Combined
relation between items Value Value Gaps All of the above
Analyse fields by arranging them into Cross None of the
rows and columns is called Tabulate Filter Merge above
--------------------- function searches for a
value in the leftmost column of a table
and then returns a value in the same
row from a column that we specify in None of the
the table. RAND() VLOOKUP() HLOOKUP() above
To import data from Access to Excel ,it
is not possible to link between Access
and Excel sheet TRUE FALSE
The GAP detection options can be used
to test for completeness of data. TRUE FALSE
Exception testing can be used to None of the
identify ----------------- items Unusual Strange A or B above
exception comparison duplicates
Data validity test represents testing of data testing All of the above
Year end ledger, inventory files or
transaction files can be tested for cut-
off , to ensure that the data has been
provided is for the correct audit period True False
In Range Check , the data may not be
in proper sequence but should be within
a predetermined range True False
In ---------------- Check data entry follow a
particular sequence and also a
predetermined range. Limit Sequence Range Both B & C
related to a form of a form of none of the
Virtual memory is virtual reality ROM VRAM previous
involves using
same as more than one
same as multiprogra processor at the
Multiprocessing is multitasking mming multiuser same time
To help keep sensitive computer-based use a virus
information confidential, the user set up a make a protection
should save the file password backup copy program
to read from
or write to display
information to print information or
to calculate to a floppy sheets of pictures on a
What is the function of a disk drive? numbers disk paper screen
none of the
A 4GL is Uses Cobol uses Java uses C++ previous.
A nanosecond is 106 sec 103 sec 1012 sec 109 sec
What small, hand-held device is used to
move the cursor to a specific location
on the screen? a keypad a mouse a frog a message pad
data that
has been an instruction
data to be transferred the address that has been
The memory address register is used to transferred to from of a memory transferred from
store memory memory location memory.
data to be an instruction
transferred to data to be the address that has been
The memory data register is used to or from transferred of a memory transferred from
store memory to the stack location memory

an
instruction an
that has instruction the address of
an instruction been that has the next
that has been fetched from been instruction to be
The instruction register stores decoded memory executed executed
Which of the following is used to
indicate the location on the computer
monitor? a cursor a scroll bar a light pen a magic marker
A mathematical procedure that can be
explicitly coded in a set of computer
language instructions that manipulate
data. Formula Algorithm Program Data
Which of the following translates a
program written in high-level language Artificial
into machine language for execution? Assembler Compiler Intelligence Parity Checker
Detecting errors in real memory is a Memory Parity Range
function of protection Checking checking Validation
use the use the
To find where a file has been saved on directory search each backup use find and
disk, the user should search tools file in turn facility replace
A series of instructions telling the
computer how to process data or files is
defined as a Network Program System Modem
save copies
of the file
with the keep a
same name use different record of
To ensure that data is not lost if a on the filenames on computer backup to a
computer system fails, the user should system the system failures secure medium
Having a single CPU alternatively
process tasks entered from multiple Multiprocessi Multiprogram
terminals is called ng Time sharing ming Multiplexing
The place in the CPU where the data
and programs are temporarily stored
during processing is called the ROM RAM Floppy Disk Magnetic Disk
All are examples of computer software Word Telephone
except Firmware Processor modem Shareware
Computer manufactures are now
installing software programs
permanently inside the computer. It is Word Telephone
known as Firmware Processor modem Shareware
Which of the following file organisation
forms most efficiently allows access to
a record Sequential Hashed Indexed Random
The part of the computer system
controlling data manipulation is called Operating
the System ALU CPU Primary Storage
For direct access storage devices the Tracks and Blocks and Files and Schema and
recording area is divided into Sectors Sectors Tracks subschema
Character, Database,
The data hierarchy from the largest to field, character, File, record, Element, field,
the smallest is database record field file
Which of the following hardware or
software system controls provides a Valid Maintenance
detailed record of all activities character diagnostic
performed by a computer system check program Systems logs Parity check
Which one of the following parts of a
computer is necessary to enable it to MIDI
play music? Sound card. CD-ROM interface Serial interface
An educational CD-ROM on Indian Poets
contains 1000 pages of text, 500 colour
pictures, 15 minutes of sound and 1
minute of video. Which of the four
different media listed takes up most
space on the CD-ROM? Text Pictures Sound Video
Which one of the following printers is
suitable for printing sprocket fed carbon
copies? Laser Dot matrix Ink-jet Drum
recording
current stock in
creating the presenting a supermarket
viewing an plans for a an order for and answering
Multimedia software can be most encyclopaedi building stock to a customer
productively used for a CD-ROM. design. warehouse. queries.
To be effective a virus checker should replaced never updated updated once a
be regularly updated regularly year
Which one of the following software
applications would be the MOST
appropriate for performing numerical Document Graphics
and statistical calculations? Database processor package Spreadsheet
get into the make retain
system efficient use confidentialit simplify file
Passwords
How many enable users
bytes do to
4 Kilobytes quickly of time y of files structures
represent? 512 1024 4096 8192
loss of
Back up of the data files will help to confidentialit duplication virus
prevent y of data infection loss of data
Which one of the following is the MOST
common internet protocol? TCP/IP HTML IPX/SPX NetBEUI
access to the printer can the operating
internet is files can be do 1000s of system is easy
The advantage of a PC network is that quicker shared pages a day to use
a the root
The term A:\ refers to a file name subdirectory directory the hard drive
up-line uninterrupta
universal provider ble power uniform page
UPS stands for port serial service supply source

the program the system the system


executable requires a always requires
orphan files may not network a re-boot and
The main problem associated with can be left on allow it to be administrator defrag
uninstalling software is that the system uninstalled to uninstall it afterwards
You are conducting research for a
Income Tax assignment. The raw facts
you collect are called data. documents. information. text.
Rules writte
Graphical in Logical Steps
representatio procedural in any None of the
A flow chart is the n of logic language language above
Purchase,
sales,
receipt, It is
payments To fill the log mandatory in
A voucher entry in Tally is done for etc. register tally None of the bove
prevent
Passwords are applied to files in order assist in speed up unauthorised
to maintenance access access allow encryption
senior IT
executive managemen IT
Each of the following is an enabler of IT- support for t lacks understands None of the
business alignment except: IT. leadership. the business above
The basic systems model is used to
describe virtually all information
systems and it consists of the following
elements: input. output. processing. All of the above

The use of Software that


computers to generates
design state- Using innovated
of-the-art, computers designs and
What is a computer-aided design high-quality to do artistic None of the
system? products. architecture. patterns. above
Application
A(n) __________ offers a solution specialist or Service
package for an entire industry. functional Provider enterprise local
ensure the
filename is identify the identify the file
File extensions are used in order to name the file not lost file type
All of the above
Information systems controls include all preventive detective corrective are parts of IS
of the following EXCEPT: controls. controls. controls. controls.
external static dynamic extensible
Hashing for disk files is called hashing hashing hashing hashing

Components of expert systems include:


a) inference engine; b) user interface; A: (a) , (b),
c) knowledge base; d) fuzzy logic (d) B: (a) to (d) C: (a), (b), (c) D: (b), (c), (d)
Black box testing and white box testing corrective preventive detective
are part of: controls controls controls general controls
What is the term used to describe the
point of interaction between a
computer and any other entity, such as
a printer or human operator? Component Interface Settings Control
The advantages of CASE tools are: a)
reusability; b) maintainability; c)
portability; d) flexibility (a), (c), (d)
(b), (c), (d) (a) to (d) (a), (b), (c)
Turn the Select the Pull the power
computer off ‘Shut Down’ cord from the
Which of the following is an acceptable Press the at the power option from a back of the
way to shut down the computer? reset button. point. menu. computer.
Yesterday, in your music class you
saved your compositions as MP3 files.
Today, you cannot remember where Ask the Use the Find Put your hand up
you saved them. Which is the best way Create the person next or Search and ask the
to locate the files? files again. to you. feature. teacher

Components of an information system


model are: a) applications architecture;
b) functional architecture; c) technology
architecture; d) information
architecture (a), (c), (d) (a), (b), (c) (a) to (d) (b), (c), (d)
detective organisation preventive corrective
Benchmarks form part of: controls al controls controls controls
Continuity controls include: a) record
counts; b) date checks; c) label checks;
d) run-to-run totals (a), (c), (d) (a), (b), (c)(a) to (d) (b), (c), (d)
program
Which is not part of help desk problem change resolution
documentation:
Testing of individual modules is known logging call lights requests
thread procedures
as: unit testing data testing testing loop testing
Design phase of CASE tools includes: a)
data architecture; b) decision
architecture; c) interface architecture;
d) presentation architecture (b), (c), (d) (a), (b), (d) (a), (b), (c) (a) to (d)
benchmark specification parallel system
Which is part of installation testing: testing s matching operations walkthroughs
The computer operating system
performs scheduling, resource
allocation, and data retrieval functions
based on a set of instructions provided Peripheral Concentrator Job control
by the: Multiplexer. processors. . language.
Which of the following falls under
multimedia data: a) text; b) images; c)
video; d) audio (a) to (d) (b), (c), (d) (a), (b), (c) (a), (c), (d)
Replacement
Which of the following procedures personal Physical
should be included in the disaster computers Identification security of Cross-training of
recovery plan for an Information for user of critical warehouse operating
Technology department? departments. applications. facilities. personnel.
Designing relationships among architectural interface procedural
components is part of: design design design data design
Several Computers connected together Computer
is called: Client-server Client network Hub
Which network topology uses a Hub? Star Bus Mesh Ring
Which of the following topologies is
used for Ethernet? Star Bus Ring All of the above
To do a
To maintain a particular To help
backup copy job such as someone
of are written editing, who is To Store data in
all the storing applying for an organised
Application software are programs information information employment manner
Which type of file search method
requires a computer first read all
locations preceding the desired one Direct Sequential Binary Indexed
Data
Systems communicati
Which of the following areas of analysis and ons
responsibility are normally assigned to applications hardware Operating
a systems programmer in a computer programming and systems and Computer
system environment? . software. compilers. operations.
Which of the following is recommended A sequential A direct
when many searches for data are A sequential file on a access file on A direct access
required file on a disk tape a disk file on a tape

Tapes can Information


It is unlikely that a magnetic tape only be read formats
containing several thousand blocked by the commonly
records can be used on two machines machine on vary Data record can
of different architecture directly which they Parity errors between never be
because are written will result architectures blocked together
Which component of the CPU has the Address
most influence on its cost versus Data path calculation Input output
performance part Control Unit part channel
Which of the following terms applies to
network used to connect computers
with other computers, peripherals and
workstations that are in fairly close Distributed Local Area Wide area
proximity systems network network Protocol

Use the Are required


computer to with a
Can send which they Generally microprocessor
data to a are require a which permits
computer connected to keyboard for some data
and receive perform all data entry processing such
Intelligent terminals differ from dumb data from a processing and a CRT as input
terminals in that they computer operations for display validation
A computer is to be linked to 8
terminals using a single communication
link. To permit simultaneous terminal
operations, communication path will Time sharing
require which of the following Mixer Modem Multiplexor computer
Allows
computer
signals to be
send over a Aids in back-
telephone up Packs data in Speeds up online
A modem is a device that line procedures a disk file printing
A LAN includes 20 PCs, each directly
connected to the central shared pool of
disk drives and printers. This type of Planetary Ring Loop
network is called a network Network Network Star Network
A computer based system for sending,
forwarding, receiving and storing Office Executor Electronic Instant post-
messages is called an Automation systems mailing office
If a workstation contains a processor,
monitor, screen manipulation device, An
printer, storage and communication A dumb intelligent A personal
capabilities, it is said to be workstation workstation computer A mainframe PC
Time of day Encryption
Terminal hardware controls include control locksalgorithms Parity checks All of them
Device
Terminal Communicati interconnect
RS-232 is a Type of cable Standard on protocol standard
A compiler
converts the
A compiler whole of a A compiler is
does a higher level a general
conversion program purpose
line by line code into language
as the machine providing
program is code in one very efficient None of the
What is a compiler? run step execution above
Feasibility Lexical
study, Implementat analysis,
system ion and CONVERSION
What are the stages in the compilation design, and documentati , and code None of the
process? testing on generation above
Which of the following is not a data
transmission coding scheme CRC Baudot ASCII EBCDIC

An An An
interpreter interpreter is interpreter is
does the a a general
conversion representati purpose
line by line on of the language
as the system providing
program is being very efficient None of the
What is the definition of an interpreter? run designed execution above
A device used in data communications Frequency
to divide a transmission signal into division Time Division
several sub-bands is known as a Modem Demodulator multiplexor Multiplexor
Third generation languages such as
COBOL, C, and FORTRAN are referred to High-level Middle-level Low-level None of the
as languages languages languages above
It is faster
than parallel It is less
Serial Communication is used over long communicati It is less prone to Uses only one
distance because it on error prone attenuation path
Accounting
Financial Graphic systems,
In what areas is the COBOL sector and design and commercial None of the
programming language used? engineering education sector above

Manage the Relieve the Reduce


Communicat paging main CPU of competition
e with the function in a repetitive between the
The primary function of a front-end console virtual communicati input/output
processor is to operator environment on tasks devices
What is the first stage in program Specification System None of the
development? and design Analysis Testing above
Which of the following is not used for
data transmission within a local area Coaxial Common
network Fiber Optics Cable carrier Telephone Lines
System
System Analysis
The design of Analysis involves
the screen defines the creating a
the user will format and formal model
see and use type of data of the
to enter or the program problem to None of the
What is System Analysis? display data will use be solved above
A device to device hardware An online
communication link is called A cache An interface A buffer protocol

Testing to
The different check for Hardware,
types of errors before Software and
What will a good software provider network to the system size of None of the
consider? be used is introduced program. above
The topology of a network can be each
of the following except Star Packet Ring Bus
What is the 8-bit binary value of the None of the
decimal number 85? 10101010 1100101 1010101 above
Which is the most common data Retransmissi Cyclic
transmission error checking method Parity on Redundancy Hash Count
What is the decimal value of the binary None of the
number 1111? 15 4 64 above
Which of the following devices merges
communication signals onto a single
line Port Modem Multiplexor Acoustic coupler
What is the decimal value of the octal None of the
number 215? 327 141 97 above
Which tool is used to help an Data
organization build and use business Data Data Mining management
intelligence? warehouse tools systems All of them
secondary secondary
memory memory storage storage access
Cache memory enhances capacity access time capacity time
What is the decimal value of the None of the
hexadecimal number FF? 30 255 256 above
Numbers are stored and transmitted ASCII code alphanumeric
inside a computer in binary form form decimal form form
What is the hexadecimal value of the None of the
decimal number 1476? 4C5 1B7 5C4 above
A byte corresponds to 4 bits 8 bits 16 bits 32 bits
Binary
What does EBCDIC coding of numbers Basic Coding Coded Bit Code None of the
mean? Description Decimal Design above
A Kb corresponds
What is the binaryto
sum of 01011 and 1024 bits 1000 bytes 210 bits 210 bytes
None of the
00101? 10000 1112 1110 above
Information is stored and transmitted ASCII code alphanumeric
inside a computer in binary form form decimal form form
used to
indicate
uppercase used to is the first bit is the last bit in
A parity bit is letters detect errors in a byte a byte
Because it
How did the computer mouse get its squeaks Its moves None of the
name? when moved like a mouse It has ears above
What are you most likely to use when None of the
playing a computer game? Touch screen Light pen Joystick above
CPU performance may be measured in BPS MIPS MHz VLSI
Printing Tracing Reading bar None of the
A digitising tablet can be used for? letters diagrams codes above
In processing cheques which of the
following I/O techniques have banks barcode
traditionally used OCR MICR scanning voice recognition
Which of the following is a pointing CD-ROM None of the
device used for computer input? Touch screen Hard disk drive above
Light
sensitive None of the
What does a light pen contain? Refillable ink Pencil lead elements above
The capacity of a 3.5” floppy is around 100K 1.44 Mb 5 Mb 1 Gb
What general term describes the
physical equipment of a computer
system, such as its video screen,
keyboard, and storage devices? hardware software output input
Where would you find the letters Numeric
QUERTY? Mouse Keyboard Keypad Printer
What input device could tell you the Bar code Optical mark
price of a product Mouse reader reader Keyboard
Where would you find a magnetic strip? Credit card Mouse Speakers Printer
What are the individual dots which
make up a picture on the monitor Coloured
screen Called spots Pixels Pixies Pickers
What input device can be used for Bar code Optical mark None of the
marking a multiple-choice test? Mouse reader reader above
mouse
button keyboard word processing
QWERTY is used with reference to screen layout layout layout software
What input device could tell you the Bar code Optical mark None of the
price of a bar of chocolate? Mouse reader reader above
language software an operating
A GUI is hardware interpreter interface system
First - Second - Third - Fifth -
generation generation generation generation
UNIVAC Computer belongs to the computers. computers. computers. computers.
Name the first Indian Super Computer? Vishwajeet Deep Blue Param Arjun
is caused by caused by is due to bad none of the
Disk fragmentation wear overuse disk blocks previous
The technology which is used to check Magnetic Ink
answer sheets of multiple-choice Bar code Optical Mark Character
questions in civil services or similar Reader Reader Recognition Image Scanning
examinations is: - Technology Technology Technology Technology
converts a
slower than program to
a fast an machine none of the
A compiler is interpreter interpreter code previous
Which printer among the following is Dot - Matrix Desk - jet
fastest Drum Printer Printer Printer
compressing Thermal Printer
“Zipping” a file means encrypting it decrypting it it transmitting it
Very Vital Virtual
important information information
reader user resource reader &
What does acronym VIRUS stands for sequence under siege user system None of above
An impact printer creates characters by Electrically Thermal An inked ribbon
using...? charged ink Paper An ink pen and print head
mainframe LAN WAN Unix operating
A client-server system is based on technology technology technology system
A nanosecond is 10-6 sec 10-3 sec 10-12 sec 10-9 sec
A procedural control used to minimize
the possibility of data or program file
destruction through operator error is Control External file Cross footing
the use of Limit checks figures labels tests
_______ software enables users to send
and receive data to/from remote operating
computers
A _____ is a running instance of an application system system communication
application project model pilot project process
Splitting of CPU's time for different multiprocessi multithreadi
tasks _______ prevents time slicing ng ng multiplexing multitasking
______ computers are used in large
organizations for large scale jobs which super micro none of the
have large storage capacities mainframes computers computers above
_______ is responsible for all calculations arithmeticcentral
and logical operations that have to be and logic processing none of the
performed on the data control unit unit unit above
non impact none of the
______ printer use laser light band printer drum printer printer above
______ software enhances the user to
enter ,store, manipulate and print any data word electronic none of the
text management processing spreadsheet above
______ software enables users to send
and receive data to/from remote integrated communicati idea none of the
computers software on software processor above
_______ is the temporary storage place Microsoft none of the
for deleted files my computer recycle bin exchange above
none of the
_____ is a collection of related fields field file record above
_____ language consists of strings of assembly machine high level none of the
binary numbers language language language above
______ symbol is used to represent
processes like assigning a value to a terminator processed connector input/output
variable or adding a number symbol symbol symbol symbol
_______ is an example for micro hp vectra fazitsu vp200
computer PC-at system series IBM-PC
_________capability supports concurrent multiprocessi multithreadi none of the
users doing different tasks ng ng multiplexing above
The ______ do not have processing
power of their own and has only a
screen, keyboard and the necessary
hardware to communicate with the
host. For this reason, the terminals are "dumb dumb dummy
referred as_______________ terminals" servers terminals dummy servers
distributed
A______is nothing but a PC with a computing
network operating system wan system windows NT LAN
_____system is responsible for handling
the screen and user I/O processing host server back end front end
The______ handles data processing and
disk access in a Client/Server
architecture host server back end front end
Both the DBMS and the application
resides on the same component in a distributed
____system PC LAN computing centralized
When all the processing is done by the
mainframe itself, the type of processing server host dumb
is sometimes called as processing processing processing data processing
DBMS models can be grouped
under____ categories four one two many
file hierarchical network relational
______is the most advantageous management database database database
database system system system system system
A new user initiates a new process of
execution at the background,while the
user can continue his query process as
usual in the foreground. This situation is multiprocessi multithrea none of the
referred to as ______ ng ding multiplexing above
The process of data being automatically disk
written to a duplicate database is defragmenta
called______ repairing redo logging tion disk mirroring
Modulation
Code/De- /Demodulat Module/De- None of the
Modem stands for __________ . code ion module above
Multiple changes to the same record or
a field are prevented by the DBMS
through______ fixes locks constraints traps
_________allows an application to multiprocessi multithrea none of the
multitask within itself ng ding multiplexing above
Linear area Local area Local array None of the
LAN stands for __________ . networks networks of networks. above
New process of execution is referred to
as______ task process thread client-server
Integrated Integrated Integrated
system Symbolic Services
dynamic Digital Digital None of the
ISDN stands for _______. networks. networks. network. above.
_____________ is the Worlds largest None of the
computer network . Ethernet Internet
power ARPANET above.
all of the
_______is/are a popular front end tool visual basic builder SQL * plus above
When LAN connected together ,it is None of the
called __________ . MAN WAN GAN above.
Data is broken into small unit called None of the
__________ . Cells Bits Packets above.
System Software
modulation Mail Simple Mail
transfer transmission transfer None of the
SMTP stands for __________ . protocol protocol protocol above.
The __________ protocol is a network
protocol to be built for the World Wide Transfer Transmissio None of the
Web . Protocol n protocol Hyper text above.
The computer which can receive data
from other computers on the network Printer None of the
and print it is _______ File server server Receiver above.
The hardware and the software configuratio
requirements together form the_____ platform n package system
ATM, Asynchronous transfer mode is a MAN and LAN and LAN and LAN WAN and
technology.
__________ is designed telephone WAN WAN MAN MAN
system ISDN ATM Internet Intranet
Web based Web based Web based Web based
Expansion of WBT is ______________ Training Technology Transport Transaction
_________ connects LANs. Bridges Routers Protocol Repeaters
Collection of instruction is called a _____ procedure batch command program
Combination of alphabetic and numeric alpha numerous number and
data is called _____ data numeric alpha beta alpha alpha

space
occupied, cost, size, input, output,
Computers can be classified based on price, no. of performance performanc performance
______,______and _______ users allowed their ratio e, cost ratios
_______ is responsible for feeding data
into the computer input output feed write

_______ is the capability of the o/s to run multiprocessi multithreadi


numerous applications simultaneously ng ng multiplexing multitasking
_______ involves conversion of raw data
into some meaningful information interpreter compiler converter process
_______ is responsible for obtaining the
processed data from the computer input processor ram output
_______ printers use light to produce the non-impact
dots needed to form pages of impact drum desktop
characters printers printers printers thermal printers
control
operating program, monitor,
system, interpreter, program,
Hardware components in a computer bootstrap, assembler, keyboard, CPU, memory,
are _____,____,_____,______ kernel, shell compiler bus input, output
_______ software are programs that are
complex and can be developed or operating application
purchased system software windows 95 interpreter
_______ is a set of special instructions
used to communicate effectively with
the computer batch protocols software's procedures
_______ converts a high level language
into machine language processor compiler assembler coder
_______ translates assembly language
program into machine language
instructions compiler interpreter assembler processor
ANS

C
B

C
A

B
A

B
D

A
A

C
B
A

A
B

A
C

C
C

A
C
A

A
B

A
A

A
B

D
A

D
A

A
A

A
A

B
A
B

A
A

A
C

A
A

A
C
B

A
A

D
D

C
A

C
D

B
C

A
A

A
D

C
A

B
A

D
A

A
D
B

C
B

B
B

A
A

A
C

C
A
B

A
B

B
C

A
B
B

B
A

B
A
B
D

B
B
A

A
B

B
B

A
C
A

A
B

C
B
C

B
B

A
C

B
A

C
A

A
C

B
B

D
A

B
C

B
C

A
D
D

D
A

A
B

B
C

A
A

C
D

A
A

B
B

C
C
C

A
C

C
D

C
C
D

C
C

B
A

B
B

B
B

A
C

C
B

C
C
C

C
A

B
C

A
B

B
B

C
B

B
B

C
B
C
B

D
A

A
A

D
B

C
B

D
A
B

D
A

A
B

C
B

B
B

A
D

D
D

C
A

B
C

B
B

D
A

B
C

A
C

A
B

C
A

A
B

D
B

B
C

A
A

B
B
D
A
B

B
B
C

A
D

A
C

D
D

B
A

B
B

A
B

D
D

D
A

D
C

B
A

C
D

C
C

A
A
C

A
A

D
B

C
D

B
B

D
B

B
D

B
B

A
A

C
A

A
D

D
B

A
B

A
A

A
D

D
B

A
A

B
B

A
B

A
A

B
A

B
B

D
B

C
B

B
B

D
A

C
D

B
C

D
B

D
D

D
D

C
C
D

D
D

C
A

A
B

C
A

D
C

C
C

B
B

A
B

D
A
A

C
B

C
B

B
A

C
B

A
C

A
C

B
D

D
D

B
B
C

B
C

B
D

B
A

A
B
D

C
D

Вам также может понравиться