Download as xls, pdf, or txt
Download as xls, pdf, or txt
You are on page 1of 150

OPTIONS

QUESTIONS A B
TALLY
The ------ key can be used to select an existing
company
Import andfrom list of
Export of companies.
data between Tally and F1 ALT+F1
other programs is possible only through ----------
Program. Tally ODBC Tally IMP
The re-order point is the inventory quantity that
trigger a stock replishment activity. TRUE false
A created company's detail can be modified
through keys F3 ALT+F3
A/An ------------- is the official notice that the firm
sends to its customers to advise then to the
amount of money that is owed. Invoice Bill
In tally,all masters have ________main options Two Three
In tally,to create a new column in balance sheet
press _______ Ctrl+C Alt+C
In tally,the use of group behaves like a sub-
ledger, option is that we can summarize many
ledger accounts into one line statements TRUE FALSE
In tally, we can alter ledger details using either
single or multiple modes but not alble to delete
a ledger from multiple modes. TRUE FALSE
In tally,a group company is marked with an
______________ * $
The systems that work together to
order,receive, and pay for replenishment of Puchasing and Puchasing and
stock are --------------- Accounts payable Receiving
Tally allows to delete a ledger from ---------
alteration mode. Single Multiple
--------------------- is/are useful for management in Cash Flow Fund Flow
the decision making. Statements Statements
In tally,the group company must contain at least
_____________ members Two Three
To cancel a vourcher entry in Tally, short-cut key
is ----------- Alt+D Alt+X
The accounting masters and inventory masters
related to Create Information Alter Information
We press ------------- function key to display the
age-wise analysis of Bills Receivable or Bills
Payable report F4 F5
In Tally, we press ------------, to print report . Alt+P Ctrl+P
In Tally, Types of Accounts and Types of
Vouchers passed during the period, can be seen
in ------------- report. Tally Audit Statistics
In the Tally Software, the ------------ directory
stores all data entered by the user. Bin Data
The Ledger Accounts are unique in Financial
Accounting Packages True False
Customers can be permitted to enter their own
data into the firm’s computer using the firm’s Enterprise Data Enterprise Data -
wide area network is an example of Interchange Information
In Tally, we can customize the Vouchers as per
our requirements TRUE FALSE
are 2 3
Each action/transaction of a firm is described by
a ----------------. data element data record
Tally is based on mercantile accounting system FALSE TRUE
Display stock
Ctrl + N is used to ----------- valuation method Open Calculator
------------- in Tally classify the accounts under
different heads so that summarised information
is possible. Ledgers Groups
Account Personal Nominal
Method of Voucher Numbering is/are Manual Automatic
Accounts Receivable are displayed in Balance Sheet Profit & Loss
To assemble a product from different items
-------------- entry is used Journal Stock Journal
A --------- purchase orders data flow is directed to
the purchasing system for use in closing out the
outstanding purchase orders in the receiving
system diagram. Filled Receipt
Tally provides at least --------- predefined
voucher formats 11 16

The value of the inventory is included in a


ledger accounts as an asset on the balance
sheet FALSE TRUE
" The buyers can follow up with the suppliers to
determine the reasons " is an example of management by management by
-----------------
From voucher entry mode , if we press objective exception
__________ then we get payment voucher in
tally F4 F5

Default Cost Category in Tally is/are -------------- Main Location Primary


A Group Company is simply a name and an
identify given to the merged accounts member
companies of the group. True False
A ----------- is a primary document for recording
all financial transactions. Ledgers Reports
The field can have a value between
________________ in FA Package. 0 to 9 1 to 100
The _______ file maintains data that describes
the supplier past transaction with the firm in
terms of material quality in AIS Supplier Suspense
It is necessary to manipulate data to transform
it into ---------------- Report Output
In tally, to change the date of the voucher press
______ F2 F4
Tally can maintain budgets on ---------------- Net Transactions Closing Balance
The value of the inventory is included as an
asset on the balance sheet True False
In ratio analysis report of Tally FA packagewe we
press ________________ function key to the Alt + f6 function
display of bills receivable , bills payables report F6 function key key
The accounts payable system is responsible for
paying the suppliers for the ----------------- Sales Purchases
What is the default financial year in Tally6.3 1-4-1995 to 31-3- 1-4-1996 to 31-3-
_________________ 1996 1997
Tally encrypts and stores TALLY DATA at the data
directory True False
The Profit & Loss statement can be displayed in
---------------- format(s). Horizontal Vertical
Balance sheet &
profit & loss profit
& loss and trial Profit & loss and
Default ledger accounts in tally are ______ balance trial balance
Default 'godown' name in tally is ____________ Primary Main location
Security
'Tally vault' is a _________________ mechanism Ledger a/c
To create a sales voucher in tally , you have to
press _______ F5 F7
A Group Company is ------------------------- given to
the merged accounts of member companies of
the group. a name an identity
In tally,"credit note" voucher type records entry
for ________________ Sales return Purchase return
In tally you get currency symbol option from Company
_______ menu creation Stock items units
------------------ gives the balance for each day for
the voucher type has been selected. Trial Balance Daybook
For 'stock journal' entry we press ______________
in tally F7 Alt + F7
Tally provides the capability to the Changes in
administrator/auditor to track changes in the transactions or Changes in Ledger
areas is/are vouchers Masters
In tally, types of users are _______________ 2 3
By pressing -------- key, a list of inventory reports
can be displayed straightaway from the balace
sheet report F9 F10
Projected approximation of income or expenses
is called ______________ . Balance sheet Profit & loss a/c
"Administrator" type user is also called 'Auditor'
of a company in Tally TRUE FALSE
You will get company information , if you press
__________ from gateway of tally F3 Ctrl+F3
A constituent(member) company can be a
member of more than one group. TRUE FALSE
Default stock category in tally is ______ Main location Primary
To create a log of the import activity in a file
_____________ is located in the same directory as
an executable program in tally Tally.imp Tally.ini
In Tally,inventory valuation method option is
available from _______ Stock summary Stock journal
During the
Tally audit feature is available in a company By pressing F11 creation of a
__________________ function key company
In tally, a group company can also be a
constituent(member) of another group company TRUE FALSE
Default number of groups in tally are ________ 128 228
During voucher entry ------------- are used. Ledger Accounts Groups
list. Administrator Owner
One company to
another company Other programs - a
Tally supports Importing of data from created withon Tally spreadsheet or a
---------------- Package database file.
In an accounting information system, which of
the following types of computer files most likely Inventory Cash
would be a master file? subsidiary. disbursements.

Which of the following is an advantage of a Will produce a


computer-based system for transaction Does not require as more accurate set
processing over a manual system? A computer- stringent a set of of financial
based system: internal controls. statements.
data to be data that has been
transferred to transferred from
The memory address register is used to store memory memory

FUNDAMENTALS OF COMPUTER
Inefficient usage of excess computer equipment Contingency System feasibility
can be controlled by Planning report
Which of the following is not the component of a
CPU NIC Card VSAT
A trailer label is used on a magnetic tape file, it
is the last record and summarises the file. The
following is an information not found in the Identification
trailer label Record Count Number
Writing on a hard
Hard copy is a term used to describe...? board Printed output
Voice activated
What control
What do the abbreviations
would preventVABthe stand for
accidental broadcasting Voice answer back
erasure of customer information from a Boundary
magnetic tape Validity check protection
What are the individual dots which make up a
picture on the monitor screen called? Coloured spots Pixels
Header label normally include all the following Identification
except the File Name number
A daisy wheel is a type of...? Printer Storage device
Which approach or technique is a control usually
associated with microcomputers System Logs Physical Security
Electrically charged
An impact printer creates characters by using...? ink An
Useink pen
only
The best security control in a microcomputer Restrict physical unremovable
environment is to access media
What would you NOT use with a flatbed plotter? A pen Paper
What do you need for an ink jet printer? A cartridge A drum
Centralised
The greatest control exposure in a Separation of function for PC
microcomputer environment is the lack of duties acquisition
What do you need for an ink jet printer? A cartridge A drum
A laser printer does NOT use? A print head A laser beam
The amount of data that a disk may contain is
known as the disks...? Volume Size
You can ________ protect a floppy disk. Read Write
Information on a hard disk is usually backed-up
using a...? Magnetic tape PAN drive
Serial access Random access
Magnetic tape is a...? medium medium
Hard disks can have a storage capacity in the
region of...? 1.44MB 20 GB
Which storage device has the largest capacity in
Mb? A CD-ROM A floppy disk

Which storage device cannot be erased? A CD-ROM A floppy disk


Where should floppy disks be stored? By a sunny window By magnet objects
The contents of these chips are lost when the
computer is switched off? ROM chips RAM chips
What are responsible for storing permanent
data and instructions? RAM chips ROM chips
Which parts of the computer perform arithmetic
calculations? ALU Registers
What are small high speed memory units used
for storing temporary results? CPUs Registers
How many bits of information can each memory
cell in a computer chip hold? 0 bits 1 bit
What type of computer chips are said to be
volatile? RAM chips ROM chips
Systems
Network software software and
and security application
Software can be divided into two areas: software software
Travel agents use this computer system when Personal
reserving flights Supercomputer computer
Which computers are used in the weather Notebook
forecasting industry? computers Supercomputers

Vacuum tube based electronic computers are...? First generation Second generation
Which generation of computer was developed
from microchips? Second generation First generation
Which generation of computer uses more than
one microprocessor? Second generation Third generation
Which generation of computer developed using
integrated circuits? Second generation Third generation
Which generation of computer developed using Second
solid state components? generation Third generation

DATABASES
Specification,
Name three steps involved in developing an Design, and Programming,
information system Testing Design, and Testing
_______ is used for CAAT as database Oracle ACL
Generalized audit software perform auditors to
undertake any past records and not concurrent
auditing True False
Generalized audit software is a file whose
capabilities for verifying processing is logic True False
CAAT's are computer program and data that
auditor uses as part of the audit procedures to
process data if audit significance contained in
an entity information system True False
CAAT do not contains package programs,
purpose written program, utility programs or
system management programs yes no
Embedded audit routines are sometimes built
into an entity's computer system to provide
data for later user by the auditor true false
SCARF involves embedding audit software
modules within an application system to provide
continuous monitoring 1 false
Concurrent use auditors as the member of the
system 1 false
Regular cross system verification may minimize
frauds true false
Computer security is frequently associated with
confidentiality, integrity and authentication true false
Data reserve engineering process metadata to
document system and abstract business rules
and relationship true false
review and
to determine the evaluate the types
The first step for developing CAAT is_________ audit objective of data
Using the open database connectivity feature in can bring the can bring the data
ACL is ______________
Computer Assisted Audited Technique involves data directly indirectly
the use of computers through "Black Box
Approach" True False
White Box Approach necessary involves expert
knowledge on the part of Auditor True
change in the 0
method of
The transition from manual system to CIS recording
environment bring dramatic changes including accounting use of accounting
________________ transaction codes
documents driven risk driven
Auditing with computer necessarily supports the approach approach
hardware and
CAAT involves an Auditors' appreciation of software processing options,
__________ configuration file data structure
Widespread end use computing result in
unlimited errors creeping into system going to
accept handling, thereby
For computerized auditingincreasing
usage of audit risks true false
sophisticated audit software would be a
necessity truesource of
the false
data available to
Important knowledge needed to begin planning the audit source of data for
the use of CAAT is _________ organization material planing
The move towards paperless EDI would
eliminate much of the traditional audit trail,
radically changing the nature of audit evidence true false
providing access to
computer to all
Computer operation controls are designed to the of by all organization
provide
Systems________________
development control, apart from concerned personnel
others, include authorization, approval, testing,
implementation and documentation of new
systems software and system software
modification true false

A system could be _________ natural/man-made open/closed


A system exhibits 'entropy' true false
Super computer are the largest and fastest and
is very suitable for commercial application
including audit work true false
Assembler language uses Mnemonic symbols true false
Operating systems are devised to optimize the manage hardware
machine capabilities, the function & software
include_______________ scheduled jobs resources
General purpose software provides a framework
for highly complex scientific operation true false
In batch processing, transactions are processed
one use
The afterofanother
computer assisted audit techniques true false
is not gaining popularity not only with audit with production
________________ departments departments
On-line processing refers to grouping of
transaction and processing the same in one go
from start to finish true false
Real time refers to the technique of updating
files with transaction data immediately after the
occurrence of the event to which it relates true false
In OLRT the CPU should process the capability of
program interruption true false
Time sharing system allow access to a CPU from
remote terminals true false
DSS is defined as a system that provides tools
to managers to assist them in solving structured
problems true false
DSS has the following components
_________________ databases planning language
Master files contains current records for
identification and summarizing true false
Transaction files contain relatively permanent
records take product profile, customer profile,
employee profile etc true false
Master file configuration includes ____________ reference files table files
______ is a file management software package
that lets users and programmers organize data
into files and then process those files filex file-o-man
to have a
CAATS provide added value to the clients complete picture decentralized
because
File _______________
volatility refers to the number of addition of a system picture of a system
and deletions to the file in a given period of
time true false
File activity is the proportion of transaction file
records that are actually used and accessed in a
given processing run: true false
File interrogation refers to the _____ of
information from a file back-ups retrieval
One -to-one relationship means a single entity
to a single entity in a monogamous structure true false
RDBMS is structured to a series of 2 dimensional
tables true false
seriously affected subject area
SADB stands for ____________ database database
Controls are present over many aspects of the
computer system and its surrounding social
environment true false
In framed checking the data entry is checked
against an expected picture or format true false
Errors are correlated_________ at the year end immediately
Field check is exclusive to a field true false
_________ law basically states that there is a
specific probability of the first digit of a no.
being
Check 1,2,3 etca group of nos. added to a code
digit is Benfish Benford
for determining the accuracy of other digits in
the code true false
blocks of nos. to
consecutive nos. or the primary
alphabets to attribute of the the
Hierarchical code means _________ entities entity
The validation checks applied to a field depend
on the field's logical inter relationships with
other fields in the record 1 false
The contents of a field could determine _______
sign for
Batch is athe
______ fieldof ______ together _____
process valid, numeric invalid, alphabetic
that bear some type of relationship to one grouping,
another transaction regrouping, events
Hash totals means meaningless totals true false
With OLRT where interactive data entry is
available, the master file associated with a
transaction may be searched for confirming
data true false
Controls are required for authorization to ensure
data integrity and detect possible breaches in
security true false
Data from client application are not stored in
the organization's database through auditables
events and function true false
All input records in a batch are normally of
different types true false
interactive data
IDEA stands for incremental design extraction and
_________________________________ and enlarge activity analysis
A transaction file is sorted prior to the update of
master file true false
A sequence check on the transaction or master
files by an update program is not required true false
Whenever monetary transactions are processed
against master files, the update program should
maintain a correlation account to record such
transaction that does not have a matching
master file record true false
Internal tables are stored tables from which
certain values are extracted for further
processing
For small toand storing
medium sized systems, individual true false
modules are coded and individually tested and
then assembled to be tested as a whole-the
testing strategy is referred to as
___________________ e-brain bouncing ball
involves_________________ bottom up tests top-down tests
Recording transactions in a controlled manner
may amount to loss of stored data yes no

Audit software is used by the auditor to read data on provide information


_________ client's file to the audit
Core image comparison is a software used by
the auditor to compare _______ version of a executables,
program with a secure ________ copy master deleted, hard
Database analyzer is a software which provides
detailed information concerning the operation of
the database true false
system analysis system advanced
SAS stands for ______________ software software
Embedded code is a software used by the
auditor to examine backup data true false
Embedded code performs wide variety of audit
task yes no
Core image comparison is particularly useful
where only executable versions are distributed true false
Log analysis is a software used by auditor to
detect
On linevirus
testing techniques the auditor ______ true false
data either _______ or fictitious in order to see
that a specific program or sever edit test is
doing its work manipulates, real create, false
Mapping software is used by the auditor to list
unused program instructions true false
Mapping software has very objectives yes no
can enable the
auditor to execute
can be very provisions on a
Modeling is a variety of software which powerful analytical number of different
________________ tool bases
On line testing can be targeted for specific
functions carried out by programs yes no

identifies program
provides detailed code which may be
information of there for fraudulent
Program code analysis involves _____________ machine uses reason
__________
Snapshot isissoftware
a software of CAAT
which takes a picture of a IDEA ACL
file or data or a transaction passing though the
system true
fictitious data false
applied against comparison of
Base case system evaluation the client source version of a
includes____________ program programmed
While base testing forces on finding if there are
any defective execution policies in a program 1 false
Black box testing seeks to determine whether
application output
In integrated is whatapproach
test facility it is supposed to be
the auditor true false
should ensure that the impact of test
transaction is subsequently eliminated from the
computer files true false
Black box testing is _______ based and white specification,
box testing is _______ based program file, hardware
identifying identifying
Source code review means__________ erroneous code ineffective code
In formula in flow hypothesis the auditor should
expand the extent of substantive tests to
determine how the defects may impact the
attainment of the program objectives true false
All material application oriented events that
occur within the boundary subsystem should be
recorded in the accounting audit trail true false
authentication of
In examination of audit trail the following data start and finish information
associated with an event may be ___________- time support
job control job connectivity
JCL means_________________ language language
Audit should be periodically analyzed to detect
any control weakness of the system yes no
In an accounting audit trail, intrusion detection
system might monitor the amount of processor
time consumed by the user to detect unusual
deviation from the amount processor time
requested by the user in the past true false
A sample size calculator program assists
auditors in determining RAND() function true false
package
computer
p[program for
performing a
variety of data
processing mathematical
Generalized audit software consists ___________ function concept

prepared by the prepared by the


Specializes
Generalised audit software could be used by the auditor
audit program may be___________ entity
following in consistencies or significant
fluctuations 1 false
file
Generalized audit software function access/organization statistical/arithmeti
include____________ s c operation
In the file reorganization merging capabilities
are needed in data from separate file is to be
combined on a separate work file 1 false
Auditors cannot use generalised audit software
to extract the data needed for audit purpose true false
Auditors can combine functional capabilities of examining the
generalized audit software to accomplish the quality of system carrying analytical
task of __________________ process review
Wide access to Can extract and
Which of the following is not the feature of GAPs various data base analyse data
Which is the example of CAATs ACL IDEA
A sample of A utility software
In audit procedures, test data is transactions programme

Tests of details of Analytical review


Which of the following is not the use of CAATs transactions procedures
Which of the following are called explicitly by
another procedure? Macros Action Procedures
_________ data type is generally used for fields
assigned as primary keys in a table integer number
MS access objects can be published in the web true false
In code-builder, got_focuse, click,dbl_click,enter
are examples of _______ actions events
_______can be used to automate certain actions
in response to events report form
In the macro sheet the macro is selected in the expression
_____field macro elements

To build complex expressions_____is used calculator code builder

The three list boxes present at the bottom of the


expression builder are called_____ action list macro list
________option is selected from the view menu
to create macros with conditions conditions action
_______report can be created with minimum user
input tabular columnar
_______layout of a form displays one record at a
time tabular columnar
The table or query name on which we are going
to build our report is selected from the ____
dialogue box create report link report
______and_____are the two types of auto reports columnar and
available tabular stable and unstable
There are no wizards for creating a database in
access true false
______option from the insert menu option is
chosen to add an embedded chart create fields add chart
In ms-access, while using SQL, references
constraint is used for creating _______ primary key alternate key
_______is used to create a mailing label label wizard chart wizard
______header is present at the beginning of the
report start header group header
______is present at the bottom of each page in a
report report footer page footer

for updating
In SQL, having clause is used for _________ for ordering records records
______field is added to the macro sheet when we
select grouping option from the view menu condition group
______can be used to create toolbars VB Modules reports
_______query is used to add records from one or
more tables into an existing table add append
_______window is used to write VB code in
access application report macro sheet
Values for other tables, queries are maintained
in look up fields data type true false
Visual Basic language is a _____ tool RAD RAP
______ function is used to display a message box SysCmd MsgBox
Other ms-office applications can be accessed
from ms-access using a concept called ________ OLE DDE
object linking
OLE stands for_____ and embedding on line execution
The application that supplies data in OLE is
called an _________ OLE object OLE client
If any change made on the object from the
client side is reflected on the server then the
object is said to be _____ linked embedded
_______is the file format that works on internet exe DLL
______ is used to convert any ms-access object
into html format form wizard report wizard
_______ option in publish to web wizard produces
a page that is static in nature static file static html
_______query is used to create or change
database objects in a current database append add

Currency fields express the amount in _________ dollars rupees


_______is selected from the toolbar to add an
OLE object unbound object bound object
To display an OLE object in the form of an icon
____ option is selected from insert object
dialogue box display as icon display
_______option from the file menu is selected to
run 'publish
_____page into
anthe
webweb wizard' is used to
application create html new
navigate to the rest of the pages in the
application startup home
______ is fired when an event is triggered is the
concept based on a Visual Basic language bullet command
Ms access is a ___________ DBMS RDBMS
A collection of data stored in different objects is
known as a _________ data group data collection
new blank
A blank database can be created using database dialog
__________ new dialog box box
Text type data can be of _____ characters in
ACCESS 255 64000
______is a datatype that assigns values
automatically automatic number AutoNumber
Tables cannot be imported from other databases true false
If two tables having same values for the fields
are joined it is called an ______ inner join outer join
Duplication of records in a field won't be allowed
if the fields are declared a________ primary key not null

Changes from a master table can be reflected cascade delete cascade change
on to the child table by selecting _____option related records related records
To see more than one record at a time in a form
we use _______ columnar tabular
In SQL, delete command is used to remove
_________
In MS-Access, filter excluding selection will table or tables query or queries
display only those record(s) which meet the
criteria. true false
Properties of the fields are managed by _____ in
Dynaset property field field property
______queries allows us to view data in row by
column manner crosstab queries row/column queries
The type of queries that can update or delete
record(s) in a table(s) are called __________ action queries row/column queries
Joining tables without any matching values in
the fields is called ____________ inner join self join
Primary key uniquely identifies each record true false
Which of the following dialog box is/are used in new form dialog form create dialog
the creation of form ________ box box
_______ query wizards are used to generate
summary calculations for a table summary sum
Properties of a form can be changed by
selecting ______from view menu options change properties properties
Forms that are included in other forms are
called ______________ included form sub form
In MS-Access, while using form design view, for
creating a command button for adding a new
record, we should select the _______ category Record
from the command button wizard Record Navigation Operations
_______ form displays fields in a single horizontal
row columnar form tabular form
The process of arranging the data in a
meaningful order is known as ___________ filtering ordering
______ are used to select only some particular
records from the table or any other database
objects filter sorts
In MS-Access, user may specify criteria for filter filter by
in form view using _________ filter by form selection
___wildcard character represents any single
character * $
Records cannot be sorted by a primary key true false
A control without a data source is known as
___________ bound control unbound control
Set of related option buttons, check boxes and
toggle buttons is known as _____________ button group option group
The collection of related data and objects is
called a ____________ database form
Which of the following is control types
____________ bound unbound
In MS-Access, the function that gives the current
date is _____________ CURRDATE() TODAY()
_____is a control that lists set of data text box list box
______is a form that summarize large amount of
data pivot table columnar form
______allows to create a filter by typing the
value in a data sheet data sheet filter filter by input
Wizards for toolbox controls are called a
__________ button wizard control wizard
The wild card representation for any 5 letter
word that starts with ram is ________________ ram* ram??
Look up fields slow up data entry true false
____is an access object that displays un-editable
data report form
_____option from the new object toolbar gives
the easiest way of generating a report autoreport report
______ represents data in a pictorial format chart label
Changes of one table can be carried over to
another related table true false
Hyperlinks are used to jump to any kind of
information or data from a file true false
The memo field can have text upto_____
characters in length 60,000 255
In MS-Access, columnar layout can be used to
view multiple records in a form true false
In MS-Access, alter command may be used in
adding a primary key to a table true false
Update query is used to add records from one or
more tables to the end of an existing table true false
In ms-access, datasheet view is available in
___________ table query
______are used to jump to any kind of
information from a datasheet or a form table form
Home page will always be present as a first
page of an application true false
Make table queries create a new table from the
records of another table true false
In ms-access, to protect a database file from
illegal access, we may set database password.
The option of setting database password is
available in _______ menu Insert Records
Foreign key is a field that uniquely identifies
each record and accept no null values true false
Data definition queries are used to create or
change database objects true false
The attributes of a composite key are known as
________ alternate keys composite keys
OLE object is a data type in access true false
Data displayed in forms cannot be edited true false
A sub form is used to display one to many
relationship between tables true false
We can switch from datasheet view to form view
by selecting view -> form view option true false
In MS-Access long integer is a datatype true false
In MS-Access, while designing a table for a
particular field, the Required parameter is set to
yes. This validates the field as _______ null not null
Sorting is applied to select only some particular
records true false
Filter by form can be created from a forms
shortcut menu true false
Advanced filter uses a filter similar to the query
design window to create a filter true false
? Wildcard character represents any number of
characters true false
_________ of the following is/are a type of chart pie bar
A bound control is tied to a underlying query or
table true false
A calculated control uses expression as a source
of data true false
Text boxes cannot be bound controls true false
The default query invoked by ms-access is update query select query
A control can be bind to a record using row
source property true false
List box is a control that offers a list of choices true false
If a table is joined to itself it is called a
________________ inner join outer join
A picture box combines the activities of both a
text box or a list box true false
Line is a tool box control true false
Text boxes can be part of a option group true false
_____ chart exists as a separate object freestanding embedded
Filtering data is a way of arranging data in a
meaning full order true false
Wild card characters are used for sorting records true false
Pivot tables are used to navigate to the other
tables in a database true false
Reports are used to represent un-editable data true false
In MS -Access, the records in a table are sorted the first field of the the last field of the
based on _________ table table
Relationship is an association between _________ forms reports
Summary options dialog box is used to
summarize data true false
______ queries can be used to delete a group of
records that meet some specific records delete insert
Charts can convert numerical data in a easily
understandable format true false
Embedded charts exist separately true false
The chart which cannot exists as a separate
entity are _______________ freestanding embedded
From ms - access, if we want to view the records
stored in a table in ms - excel worksheet, we
need to use hyperlink use import
Page header is present at the beginning of each
record true false
Detail section has a header and footer true false
A macro is performed only when the user
initiates an event true false
The macro is selected from the action field of a
macro sheet true false
A macro can be made to execute before the
starting of a database true false
In MS-Access. While appending records, the
source and the target table must have similar
structure and fields true false
We can add our own functions to the expression
elements list wildcard
_______is the box of the expression
character builder
which true false
represents the presence of any number of
characters & #
Macros can be used to add a menu to a
database object true false
_____ header is a unique feature of reports page detail
Chart can either be a form or a report true false
Group header will be present at the design view
of a report even if the report is not grouped true false
We can change from the design view to the form
view without being prompted for saving the
changes made true false
Charts can be produced without the wizard true false
Macros can be used to create user defined error
messages true false
Between and Not Between is ______ type of
operators relational list
The default data type of VB is integer true false

structured query
Visual Basic is based on __________ action language language
_______is the name of the database object that
displays data and can be used to edit data report form
In access OLE objects cannot be linked true false
_____ section is present for each record in the
report group record
A ________ sheet lists all the properties that
pertain to the form or the controls data property
Textboxes can also be an example of unbound
control true false
In MS-Access, we may design command buttons
for navigating records true false
forms sub forms child forms
_______ are used to represent our data in
graphical format graphs chart
A field with a _______ uniquely identifies each
record number primary key
Large amount of data can be summarized using
______ tables pivot create
_______ are employed to select only some
particular records from a database object filters queries
______ control need not have a data source form bound
______ control combines the functionality of both
a text box and a drop down list list box combo box
MS access is a DBMS true false
A form can be bind to a record source using
_____ property of the form form name control
______ forms displays field in single row tabular form chart form
______ forms are usually used for tables with one
to many relationship sub forms tabular form
_______ control uses an expression as a source of
control calculated bound
_______ control is tied to field calculated unbound
_______is the form that can be created with
minimum input from the user sub form auto form
______option from the tool menu is selected for
setting relationships between tables set relation connect
command button,
______,______and_____are the buttons belonging option, toggle and check and list
to the options group command buttons boxes
_________allows us to create a filter from a field
short cut menu filter by form filter by report
________is a database object which displays data
but cannot be used to edit data form report
What term applies to a collection of related
records in a database? clipboard file
All of the following terms are related to
computerized databases except which one? search sort

A way to analyse
and manipulate A tool to produce
numerical high quality
What is a database? information documents
It contains all
Information about the data about
What does a record contain? certain programs one specific item

An RDBMS is a remote DBMS relative DBMS


storing data offline backing up data
Data Warehousing refers to at a separate site regularly
Unauthorised alteration of on-line records can Computer
be prevented by employing Key verification sequence checks

A way to analyse
and manipulate A tool to produce
numerical high
What is a database? information qualitydocuments
It contains all
Information about the data about
What does a record contain? certain programs one specific item
Reports allow
users to extract Reports provide a
information as very flexible way of
hard copy creating and
What is a report? (printed output) editing documents
Spreadsheets make
What is the best way to analyse and change Extracting and data easy to
data analysing data analyse
What are some popular office orientated Compilers, Network software,
software applications? interpreters, editors backup systems

Which of the following constraints can be used DEFAULT and NOT FOREIGN KEY
to enforce the uniqueness of rows in a table? NULL constraints constraints
Which of the following commands is used to
change the structure of table? CHANGE TABLE MODIFY TABLE

An RDBMS is a remote DBMS relative DBMS


storing data offline backing up data
Data Warehousing
You are refersapplication
creating a client to that calls at a separate site regularly
ActiveX DLLs. Which of the following properties
of the Err object provides the name of a
component that sends an error back to the
client application? Number Description

This database holds personal information. The keeping a backup


user can help to keep it confidential by using a password copy
If the database holds customer names and
addresses, personalised letters can be created
automatically using the product code the primary key
Application software suited to storing the survey
information obtained in the table would be A database Graphics
The characters * and ? are sometimes used in
search criteria as bookmarks operators
Which of the following field types will generate
the primary key automatically? Auto Primary Auto ID

records in a related tables in


dynaset are a database are
consistent with the consistent with
Referential integrity ensures that the: underlying tables. one another.

main form and a


Tables are related to one another through a: foreign key. subform.
the primary key
the primary key of of the related
A foreign key is: both related tables. table.
You are creating a banking database to track
customer loans. The bank will, of course, have
many customers, each of whom may take out
one or more loans, while each loan may be
associated with only one customer (there are no
joint
In accounts). What
a one-to-many is the rebetween
relationship One-to-one One-to-many
Companies and Employees, which field is found
in both tables? EmployeeID CompanyID
Which of the following ensures that records in
related tables are consistent with one another? The Tools menu,
For example, it ensures that you cannot add a Relationship Referential
record with an invalid foreign key. window integrity
Right-click the
Relationship line,
then select
How would you delete a relationship between Double click the Delete from the
tables in the Relationships window? Relationship line shortcut menu
That there are
several customers That some of the
In a Customers tables, what does a plus sign associated with data is not
next to the CustomerID field mean? that ID viewable

What is required of the fields that join two They must both be They cannot be
tables? numbers text fields

Assume a one-to-many relationship between the


Customers table and the Loans table, with
referential integrity in effect. What happens Nothing, Access
when you attempt to delete a customer ID from ignores the The customer’s ID
the Customer table that still has entries in the attempted is deleted from the
Loans table? command. Customers table.

Which of the following is true when viewing a The subform is


main form and its associated subform in the The subform is not displayed in
Form Design view? visible. Datasheet view.

A one-to-many A one-to-many
Which of the following relationships does not relationship relationship
belong in a database based on a professional between teams and between teams
sports league such as football or basketball? players and coaches
Which symbol is used at the end of the join line
in a related table to signify the “many” side of a
one-to-many relationship? # M
The Customers
You have created a one-to-many relationship table only when
with referential integrity between a Customers there are Loan
table and a Loans table. From which table can Either table at any records associated
you delete a record? time with that customer
The correct order of the arguments for the prompt, title bar prompt, icon,
MsgBox statement is: text, icon. title bar text.
The first statement in a procedure named
CreateList is: Dim CreateList. Sub CreateList.

A check box A text field enables


enables the form the form user to
user to choose from choose from one of
Which of the following is TRUE related to form one of several several existing
fields? existing entries. entries.
must be set for one must be set for
A text field: word. multiple words.

help people keep store data in


The purpose of a database is to: track of things. tables.
A database stores: data. relationships.
A database records: facts. figures.
single-user
A sales contact manager used by a salesperson database multiuser database
is an example of _______________ application application
single-user
A Customer Resource Management (CRM) database multiuser database
system is an example of_________ application application

The industry standard supported by all major Structured


DBMSs that allows tables to be joined together Sequential Query Question Language
is called __________. Language (SQL) (SQL)
Database
A program whose job is to create, process and Database Modeling Management
administer databases is called the _____ System System
Microsoft Access may use which of the following
DBMS engines? Jet SQL Server

Which of the following are basic components of The database


an enterprise-class database system? The user application
the database
application(s)
In an enterprise-class database system interact(s) with the DBMS accesses
________ . the DBMS the database data
In an enterprise-class database system, the
database application ___ . creates queries creates form

In an enterprise-class database system, reports the database


are created by ____________________ . the user application

A database is considered "self-describing" all the users' data it reduces data


because _______ . is in one place duplication
In an enterprise-class database system, the
database _________ . holds user data holds metadata
A database may contain
_________________________ . tables metadata
A database designed using spreadsheets from as a new systems
the Sales department is a database being from existing development
designed _________________________ . data project
A database designed to implement as a new
requirements for a reporting application needed systems
by the Sales department is a database being from existing non- development
designed _______ . database data project
A database designed to combine two databases as a new systems
used by the Sales department is a database development
being designed _________________________ . from existing data project
Database professionals use ________________ as
specific data sources for studies and analyses. data marts normalization
Database professionals use a set of principles
called ________________ to guide and assess
database design. data marts normalization
A very popular development technique used by
database professionals for database design is
known as _______________________ . data marts normalization
A very popular development technique used by
database professionals to adopt a database
design to new or changing requirement is
known as _____ . data marts normalization
The predecessor(s) of database processing was
(were) __________ . file managers hierarchical models
the order of the
entities in a column columns is
In a relation __________________________ . vary as to kind important
An attribute is also known as a(n)
. table relation
A combination of one or more columns used to
identify particular rows in a is___ . record field
A combination of two or more columns used to
identify particular rows in a relation is________ . record field
A determinant that determines all the other
columns in a relation
When designing is______one
a database, . of the record field
candidate keys in a relation is selected as the
_________ . composite key primary key
Normalization is a process used to deal with
which of the following modification anomalies? Insertion anomaly Update anomaly
When you are given a set of tables and asked to assess the existing design the
create a database to store their data, the first tables' structure database
step is to ____ . and content structure
are supplied by
several well- were essentially
Modern microcomputer personal DBMS established killed off by MS
products______. manufacturers Access
Their report
They use delivery is more
sophisticated difficult than report
Which of the following are true about data mathematical delivery for
mining applications? techniques. reporting systems.
We have obtained access to the company's
operational data. We examine 50 records for
customers with phone numbers that should use
the current area code of 345. Of these 50
records, we find 10 that still use an older area
code of 567. This is an example dirty data inconsistent data
We have obtained access to the company's
operational data. We have been asked to
produce a report with an item by item analysis
of sales, but the only sales figure available is
the total sale value for each order. This is
example of_____ dirty data inconsistent data

data warehouse data warehouse


A data warehouse database differs from an data are not stored databases do not
operational database because: in tables. have metadata.
Which of the following objects is used to display
a menu? Form Table
Which of the following objects are NOT found in
an Access application? Forms and reports Queries and tables
It will be easier
for the user to
It will be easier for upgrade it if the
the user to upgrade objects are in
You are developing an Access application that it if the objects and one database
you expect to upgrade periodically. Which of the tables are in one and the tables in
following statements is TRUE? database. another.
consist of multiple
The Link Tables databases, each
command can be with multiple
used to associate objects, linked to
the tables in one yet another
database with the database
Which of the following statements regarding objects in another containing only
Access applications is NOT true? database. tables.
Which of the following brings a copy of the table
into the current database and does not maintain
a tie to the original table? Import Link
It contains tables,
It contains more reports, queries,
What makes a database an application? than one table and forms
What is the Access tool that is used to create
the user interface? Menu Wizard Build Menu

create backups for centralize the


mission critical manageability of
The purpose of a data warehouse is to: corporate data. data collection.
___________ means the result of applying to
specific information certain specific technical
processes. Digital Sign Digital Certificate
__________ is an algorithm which creates a digital
representation or "fingerprint" in the form of a
"hash result". Hash Function Digital Signature
__________ is of standard length which is usually
much smaller than the message but
nevertheless substantially unique to it. Hash Function Hash Value
Digital Signature involves two processes. They Digital Signature Digital Signature
are ___________ and __________. creation Verification
Institutional
Overhead and
Subscriber
The Costs of Digital Signature consists mainly of Relying Party Subscriber Relying
the following Cost Party Cost
Certification
CA stands for ________________ Authority Certified Authority
A Digital Certificate is issued by a Certification
Authority and is signed
A Digital Certificate does with the CA's
contain Private
Owner's Key True
Public False
Key, Owner's name, Expiration date of the
Private Key, Serial number of the digital
certificate True False
______________ enable web servers to operate in Developer
a secure mode. Server Certificate Certificate
______________ are used by individuals when
they exchange messages with other users or Developer
online services. Server Certificate Certificate
______________ are on-line databases of
certificates and other information available for
retrieval and use in verifying digital signatures. Private Certificate Repositories

Evidence,
Signing Writings serve the following general Ceremony,
purposes______,_______,_______ and _______ Approval Approval, Evidence
The most widely accepted format for Digital
Certificate is defined by the CCITT X.509 True False
A certificate may prove to be unreliable, such as
in situations where the subscriber misrepresents
his identity to the certification authority True False
Certificate Certificate
CRL stands for Revocation List Resource List
The prospective signer identified in the digital
certificate holds the_________ and is called the Private Key, Public key,
___________ Subscriber Recipient
In EDI interface, the translation service receives
_________ as incoming files from the External Format
communication service Internal Format File File
The EDI standardisation for International Trade
and Commerce is introduced by __________ ANSI UN/EBCDIC
In EDI, the transmission files are composed of
different sets of external format files which are
grouped into multiple sets under the name of
________ batch files interchange sets
The ________________ are pre-paid credit cards
that include an embedded cards Smart Card Embedded cards
________________ are another form of credit
payment that lets customers use digital online
cheques to pay Web merchants directly E-cash Digital Cash
In Active advertisement, there are two types of Billboards and Junk Online Catalog and
models. They are _____ and ________ Mail Billboards
The network based technology is/are
____________
Decryption is a process employed for EDI E-mail
scrambling of plain text for web based
transactions True False
Asymmetric cryptosystem is based on __________ Login_Id and Primary Key and
and ____________ Password Private Key

Value Added Network is an example of _________ Global Network Private Network

The advertising strategies emerging in the on- Active or push Passive or pull-
line world are ____________ based advertising based advertising
The _________ model use direct mail, spot
television or cable television, in active based
advertisement. Broadcast Junk mail
The ________ is a form of mail that is not
targeted to a specific audience E-mail Bulk-mail
The __________ model refers to information that
is placed at a point where it will be noticed by
customers in the course of other activities and
does not require active search Catalog Endorsement

The most
What beneficial
is the term thatadvantage
describesof ERP system
spying is Error checking
on one’s Data Integration
business rivals to gain a competitive Competitive Corporate
advantage? espionage espionage
Contact numbers
of the
What would you NOT be looking for when spying A list of management
on a competitor? competitor’s clients group
single-user multi-user
An online drugstore such as Drugstore.com is an database database
example of_______ application application
Which of the following is an example of Keeping messages
unacceptable online ‘netiquette’? Replying promptly short

Message
Removable drives authentication in
that can be locked EDI systems
up at night provide performs the same
adequate security function as
when the segregation of
Which of the following statements is correct confidentiality of duties in other
concerning the security of messages in an data is the primary information
electronic data interchange (EDI) system? risk. systems.
The wizard that is used to import text files text import convert text to
is_________________ wizard columns wizard

The alphabet indicating the column followed by


the row number is known an__________ cell reference row reference
Which of the following files could not be opened
in excel _______________ text files Lotus 1-2-3
In excel, the dates that are stored as sequential
numbers known as ________________- serial values domain values
The command to display the current date in a
cell is _________________ =today() =date()
In excel, absolute references are represented by
a ________ before the column and row addresses dollar sign ' = ' sign
The ________ can be used to select the function
and assemble
Specific the
parts of argumentsrequired
information correctlyby AutoSum AutoFill
functions to perform certain tasks are called
as___________ variables arguments
Which of the following do not belong to the
formula category in excel environment__________ text logical
The function that in used to join cell values
together in a single cell ________ concatenate pmt
The function that is used to count all the values
that meet specific criteria _________ countif vlookup
The wizard that is used to create and edit charts
_______________ pivot table wizard chart wizard
The function that is used to calculate the
payment for specific loan terms ____________ sumif pmt
The function that is used to add together all
values that meet specific criteria is known as
____________ average sum
The __________ option present in the file menu
options is used to specify major facts of the
page to be printed page setup print area
The command that is used to apply a format
automatically __________ autoformat AutoFill
The ____________ makes the information in a
worksheet meaningful and easy to understand bordering formatting
A particular part of a work sheet can be printed
by setting the _________ page setup print area
The process of finding or selecting information is
known as ____________ filtering searching
The option that is used to cancel the filter
process for a specific column and display all the
records is ________ all option blanks

The URL for encyclopedia Britannica is_________ www.ency.in www.eb.com


_______ maps IP addresses with the domain
names of the sites URL DNS
network of
Internet can be defined as _______ internal network network
The most important service of the ______ is to
manage traffic control application layer transport layer
_________is a program that displays information
about a host connected to the net finger service ping service
_______ is a program or a tool that helps in
locating a file anywhere on the net FTP TELNET
uniform research uniform resource
URL stands for ____________ locator locator
IN an URL the word before the color refers to name of the
_______ host computer resource
A ______ always begins with a slash message scheme
Prodigy is run by IBM and ______ Delphi Microsoft
The World Wide Web is referred to shortly as the
_______ net web
read the Usenet
Gopher and WAIS enables the user to ______ browser news
______ is the program used to run CompuServe's CompuServe
regular services internet dialer spy mosaic
Navigating through the menu of gopher is called
moving around _______ gophering gopherspace
The directories that come with built-in engines
are yahoo,lycos and ______ Alta vista open text
To use the finger command,SLIP users must run
a programme called______ finger server ftp server
The web maps are called _______ list directories
Directories consists of _______ levels no maximum of five
The _____ level gives the broadcast overview of
the net middle lower
The huge list of keywords from important items
is called ______ hotlist directory

The two types of search in veronica are _____ directory index search,menu
and ______ search,index search search
_______ searches by keywords infoseek excite
Mosaic displays links in color whereas _____
does not display links in color netshark cello
______ supports one button publish lynx mosaic
SPY MOSAIC is distributed by_______ Microsoft internet
______ is a program that helps us to log on to
other networks Usenet finger service

Higher text transfer Hyper text


HTTP is the acronym for __________ protocol transmission port
______is used to transfer and copy files over the
internet iccp ftp
_____ is a program that helps us to log on to
other networks yahoo ftp
transmission
control
transfer control protocol/internet
TCP/IP stands for ________________ protocol/internet protocol
Archie servers can be accessed in_______
different ways in internet one two
_______is the computer on the internet that
translates between the internet domain names domain name
and the internet numeric address ftp servers servers
the internet the internet
TIA stands
Service for_____
indicates in name
the internet
of the ________ used adapter administration
to access data, present on the other end of the
link. browser protocol
hotlink text transfer hyper text
HTTP stands for______ protocol transfer protocol
________ is used to link pages in the world wide universal resource uniform resource
web locator locator
frequent asked frequently asked
FAQ stands for ______
The internet adapter is a programme that query question
makes our connection act like a _____or a ____
account SLIP,PPP TCP,IP
The step involved in Communicating between
the web clients and servers is ______________ connection response
wide search for windows sockets
information and internets relay
WSIRC stands for______ research chat
Two of the important browsers are_____ and_____ lynx,minx netscape,ie
Lynx is a _______ programme that works with world wide web world wide web
terminals server client
The huge list of keywords from important items
is called an_____ glossary index
very easy and very organised
rodent oriented network integration
net wide index to and
computerized communication
VERONICA is an acronym for _______________ archives application
university of university of
The first freenet is created at the_____ and is berkeley,berkeley cleveland,clevela
called______ freenet nd freenet
________ are defined as ways of communication
amongst networks protocols IP address
search
engines,directori
______and_____ are web searching features es ftp and finger
WINWAIS has two source lists namely____
and______ allsrc,winsocks wais,allsrc
________ is also called as WAIS manager allsrc waisman

higher text medium hyper transfer


HTML stands for_____ language markup language
The system of interlinked documents is known
as_______ hot links hyper text
The small programmes that create
animation,multimedia,real-time games and
multi user games are called______ images applets
The information displayed on the web page graphics,videos,a programms,images
includes______,_____ and_____ udio ,text
The web pages that represent online home of
their author are called______ first page home page
global network global networks
GNN stands for______ news navigator
_____ is the most popular internet service yahoo service electronic mail
Netscape page
starter
The online service offered by navigator gold 2.0 email and net site,netscape
are _______ and_____ conference page wizard
_______ is a program or a tool that helps us find
a file anywhere on the net newsgroup telnet
The databases to enable keyword search using
Lycos are a2z,_______ Lycos catalog point review
______ is a large worldwide bulletin board
service network apple link bitnet
computer related
abbreviations biographical
BABEL consists a glossary of _____ and acronym information
Dictionaries,encyclopaedias,government and encyclopedia on-line reference
other references are found in ______ Britannica works
Yahoo,lycos,excite and webcrawlers are _____ search engines web directories
Graphical Graphical
interpreter interchange
GIF is the acronym for ____________ formatting Format
Joint Pictures Jumbled pictures
JPEG is the acronym for ___________ Expert Group expert graph
The Web aids users to explore the ________ mails documents
The three most popular mailer are_____,_____ yahoo,infoseek,alta
and______ vista netscape,ie,lynx

The World Wide Web consists of _________ information web pages


In Microsoft Internet Explorer, the color of the
text can be specified using _________ attribute of
the font tag. BACKGROUND COLOR
The interface that provides effective
communication between the web browsers and Communication Common graphical
servers is _________ gateway interface Interface
CGI is the _________ between web browsers and
servers Network Interface
CGI programs are invoked based on the
information provided by the _________ Current web page Browser
A CGI program is usually called after a request
made by the _________ Browser/user
Unknown Server
resonance Uniform resource
URL stands for ________ language locator
A hyperlink can be on ___________ text only image only
HTML was derived from _________ SQL PLSQL
SGML is a _________ alphalanguage betalanguage

PINE stands for _____________ palm is not eatable palm is not elm
The application that confirms whether a
document is compliant to its DTD is _________ SGML Processor SGML Preprocessor
Web is a collection of ___________ web sites images
International
Internet equipment Engineering
IETF stands for ________ training faculty trainers and faculty

MS Internet Netscape
The two major browsers used to surf the Explorer and Navigator and
Internet are ________,_______ Mosaic Mosaic
Special characters allow browsers to display data from a
_________________ text database
The keyword for providing links within or across
documents is____________ hyperlink hypertext
Stringing pages together using hypertext in sequential
technology helps view pages _______________ in random order order
The initial web pages present in a web site is
the ________ page. first start
The image format supported by most browsers
is________________. .bmp and .gif .bmp and .jpeg
service,hostnam
Service, hostname e,port,directory-
The components of a URL are ___________ and directory path path

mail servers,mail mail vendors,mail


The mail we send has a mailing address and clients and identification and
most of them correspond to_____,_____ and alternate services password
Which of the following is not supported by
internet explorer _______________ <center> <font size=n>
communication
generated common gateway
CGI stands for ____________ information interface
Host name indicates the domain name of the
web ________ Server Client
The internet is also called as _______________ arpanet the net
peer-to-peer
The internet is similar to _________________ LAN connectivity
The net drivers______ from one place to another data parcel

The net provides interesting services scripting,parsing news,cooking and


like______,______ and______ and compiling fine arts
The windows internet software available nt,windows95,ie,wi mosaic,gopher,e
are______,_______,________ and______ nzip udora,trumpnet
________ is the ancestors of the internet dnet arpanet

defensive
administrative rank dedicated and
DARPA stands for administration registered projects
_______________________________________________ network administration
The uuencode files start with a _______ start begin
milnet,smaller
DARPA is broken into ________ and _______ arpanet mailnet,inet
NSFNET is the united states provides service to education,resear
_____ and_____ ch music and dance
Higher text
HTML stands for manipulation Hotlink text
______________________________________ language markup language
The first international IP network connections united states and
were established in 1973 with _____ and_____ UK england,norway
A_____ is a set of computers interconnected by
transmission paths to exchange information in
internet server client
A computer that provides a service usable by
other computers is called______ client stand-alone
A_______ is the representation of physical network
connectivity of the computers in internet network card topology
detailed transaction data terminal
DTE stands for ____________________ explanation equipment
The basic function of the ______ is transmitting
the bits over a channel application layer physical layer
point to point packet
network and switching,store
The point to point channel network is also called broadcast channel and forward
as _____ and_____ network network
Accessing files using FTP servers is called_____ file access anonymous ftp
The three most commonly used networks
are______,______ and______ PAN,NAN,AAN KAN,RAN,VAN
________ is in between LAN and WAN VAN MAN
_____ can be owed by multiple organisation LAN MAN
Data is transmitted in the form of_____ signals analog digital

DTD stands for __________ Data type definition Define type of data
Moralize/demoraliz Modulation/demo
Modem stands for __________________ e dulation
______ is the process of the digital signals being
converted into a form suitable for analog
transmission Mapping Modulation
Dedicated access
________ and______ are two basic ways of getting Satellite link and and dial up
connected to the internet digital signals access
Standard long Stream line
SLIP stands for ________________ internet protocol internet protocol
Prime prolonged Point to point
PPP stands for _____ protocol protocol
sending
Which of the following best describes uploading storing data on a information to a
information? disk drive host computer
A characteristic of a communication channel
that is the amount of information that can be
passed through it in a given amount of time,
expressed in bits per second. Bandwidth Speed
The act of searching through storage to locate
information without necessarily knowing of the
existence
A of the
"recipient" information
of the certificatebeing sought.
desiring to rely Find Save
upon a Digital Signature created by the
subscriber named in the certificate is called the
____________
The Relying Party can use the ___________ listed Recipient Party Relying Party
in the certificate to verify that the digital
signature was created with the corresponding
_________ Public Key Private Key
Digital Signatures are used for a variety of
Electronic Transactions like Electronic
________________________ E-mail Commerce
To associate with a key pair with a prospective
signer, a Certification Authority issues Digital
Certificate Not False Not True
Digital Signatures, if properly implemented and
utilized offer promising solutions to the Closed
problems of Imposters, Message Integrity, System,Formal Formal Legal
__________ and _____________ Legal requirements Requirements
In, Digital Signature, _____________ perform the
"ceremonial" function of alerting the signer to
the fact that the signer is consummating a
transaction with legal consequences Affirmative Act Efficiency
A Digital Signature must have the following Signer Document
attributes ________________ and _____________ Authentication Authentication
"Hash Function" is used in both creating and
verifying Digital Signature Not True Not False
___________ provides assurance of the origin or
delivery of data in order to protect the sender
against false denial by the recipient that the
data has been received, or to protect the
recipient against false denial by the sender that Nonrepudiation
the data was
___________ sent. the ceremonial and approval
serves Service Digital signature
functions of a signature and establishes the
sense of having legally consummated a
transaction. Affirmative Act Efficiency
________ is a branch of applied mathematics
concerns itself with transforming messages into
seemingly unintelligible forms and back again. Cryptography Public Key
The complementary keys of an asymmetric
cryptosystem for Digital Signatures are arbitarily
termed as _________, and ____________ Private Key Public Key
_______ is known only to the signer and is used
to create the digital signature. Private Key Public Key
_______ is ordinarily more widely known and is
used by a relying party to verify the digital
signature. Private Key Public Key
____________ is the art of protecting information
by transforming it into an unreadable format. Decryption Cipher
Which of the following activities would most Using data Performing validity
likely detect computer-related fraud? encryption. checks.
A digital signature is used primarily to Unaltered in Not intercepted en
determine that a message is: transmission. route.
Both sender and
receiver must
have the private The private key
key before this cannot be broken
encryption into fragments and
What is a major disadvantage to using a private method will distributed to the
key to encrypt data? work. receiver.
Which of the following risks can be minimized
by requiring all employees accessing the
information system to use passwords? Collision. Data entry errors.
Business-to- Business-to-
The acronym for B2B is ___________ Business Backend
The _____________ model is the least intrusive
model but requires active search on the part of
the customer Billboard On-line Catalog
__________ is / are a form of advertisement
where people relate their experience with Customer
products and services Endorsements Billboard
The _________ are software agents who
communicate with the business merchants on
behalf of the customers Intermediaries portals
The Pre-purchase preparation phase includes
_______________ for a set of products Order Placement Service
The _________ phase includes customer service
and support to address customer complaints , Post purchase Purchase
product returns and products defects interaction consummation

The ________ allow companies to bypass the Billboard model of


need for costly printed
A ________________ catalogs
is a basket on the Net that is marketing Online catalog
used to place the items that are being
purchased Online Catalog Shopping cart
EDI For EDI For
Administration, Administration,
Commerce and Consumer and
EDIFACT is an abbreviation of ________ Transaction Transport
The __________ allows for protocol conversion
and communicates with the bank using the
banks private network or the Internet EDI TCP/IP
In Ecommerce, data extraction, transforming the
data into transmittable form, transmitting the
data and downloading the data are the
operations employed in _________ Compiler Interpreter
The _________ commerce assists in integrating
the customers and suppliers of the company Business-to- Business-to-
directly into the organisation Business Consumer
E-cash means______________________ Emergency Cash Electronic Cash
E-commerce is a tool that addresses the desire
of firms to cut services cost and improving the
quality of goods. It is a definition of e-commerce Communication Business Process
from _________ Perspective Perspective
The small denomination digital tokens are called
_________ Microcash Micro Transactions
The ____________ is the process of encoding
information to prevent it from being read by
unauthorized parties Decryption SSL
There are _________ types of data tables 1 2

The tables that allows the user to change or


rearrange the data, summarize the data and
evaluate the data using changing points of view
is known as data table filtered table
The wizard that is used to suggest hints for
doing a task pivot table wizard chart wizard
In a chart Y-axis is known as_________ series or rank category
In a chart X-axis is known as_______________ series or rank category
_________ is a set of tables that describe each of
the data series series or rank category
________ is used to differentiate one data series
from another series or rank category
The chart that contains only one data series is
_________ column chart bar chart
_________ column chart bar chart
The chart that display two or more data series
on a surface is _________ column chart bar chart
The chart that is used to display discrete data column chart bar chart
_________ are not allowed in a macro name spaces characters
Which of the following tool cannot be used to
view the excel web page_______ excel97 internet explorer
The wizard that used to build an interactive pivot table
table from data existing on sheets wizard chart wizard
The chart that is used for displaying stock
market information line chart bar chart
In excel, the subtotal command also generates
grand total after the last group subtotal_________ true false
In advanced filter , the criteria occupying
multiple columns but more than one row, is
considered as an ________ criteria. and or
The stacked bar graphs can be represented in
__________ 3-dimensions 4-dimensions
A pie chart can represent only one data series
at a time true false
The ______ generates a summarized report in
tabular form in an interactive manner Data table Pivot table
It is also called as
Which one of the following statements related high-low-close It shows trends
to
Thestock
statechart is NOT TRUE
government ? to finalize a five
needs chart over time
years plan to implement 100% literacy in the
state. Which one of the following will be the
best tool that should be used to work out the
plan ? Pivot table Scenario manager
Forecast'99 is a group working on exit poll. It
wants to know how many seat ABC party needs
to won in totality to obtain majority to form the
government. Which one of the following will be
the tool that will help the team ? Goal seek Scenario manager
Which one of the following will be the tool that
provides a way to view and compare the results
of all the different variations together on the
worksheet ? Goal seek Pivot table
A ___________ is an excel file where the user
stores his data Workbook Worksheet
Performing
Performing database
Spreadsheets are useful for _______________ calculations. operations
Which one of the following is NOT the
component of the pivot table ? Column field Row field.
Excel allows upto ______ levels of sorting two three
Filtering rearranges a list to display the required
records true false
The stacked bar graphs can be represented in
_____________ 3-dimensions 4-dimensions
The ______ generates a summarised report in
tabular form in an interactive manner Data table Pivot table
It is useful when
several
components are
changing and the
user is
It displays the data interested in the
Which one of the following statements related series one on top of sum of the
to
Thestacked bar chart is needs
state government NOT TRUE ?
to finalize a five the other. components.
years plan to implement 100% literacy in the
state. Which one of the following will be the
best tool that should be used to work out the
plan ? Pivot table. Scenario manager
Forecast'99 is a group working on exit poll. It
wants to know how many seat ABC party needs
to won in totality to obtain majority to form the
government. Which one of the following will be
the tool that will help the team ? Goal seek Scenario manager
Which following function is used in subtotal
option ?______________ Count. Standard deviation
A workbook consists of many ________ databases records
It is a tool that
It is a tool for provides a way to
summarizing and view and compare
analyzing the the results of all
data records in the different
Which two of the following statements related to an interactive variations together
pivot table are TRUE ? manner. on the worksheet
Which one of the following is NOT a What-if
analysis tool ? Goal seek. Scenario manager
The _________ wizard separates contents in a cell convert text to
into different cells text import wizard columns wizard
A spreadsheet is a grid of rows and columns and
is called as a ________ worksheet workbook
Pick out the window that is not a form of excel
___________ application window document window
On an Excel sheet the active cell is indicated A dark wide
by… border A dotted border
Cell A4 =2 and A5 = 4. You select both cells and
drag the fill handle down to A8. The contents of
cells A6, A7, and A8 are _____. 8,16,32 2,4,2

the row is too short


to show the
your formula has a number at the
If a cell shows  ####### , it means that _____. syntax error current font size
Which is not an advantage of using ability to generate speed of
computerized spreadsheets? tables calculation
The gym teacher has a new program to
calculate physical fitness in terms of weight and
exercise. The use inputs different weights or
amounts of exercise to determine the related
physical fitness. This "What if" program is most
likely which of the followin word processing graphical
The difference between the highest and the
lowest values. Range Address
Spreadsheets can be used for... Producing graphs Writing letters
drag from the top
cell in the column
double-click any to the last cell in
To select a column the easiest method is to … cell in the column the column
If you press _____, the cell accepts your typing
as its contents. ENTER CTRL + ENTER
The contents of cell C15 is =AVERAGE(C3:C14).
AVERAGE(C3:C14) is known as array. function.
All of the following are considered constants
EXCEPT: 100 (201)555-1212.
Which of the following may NOT be included in a
formula? Cell references Functions
Which of the following is NOT a valid
mathematical operator in Excel? ^ /
Given the formula =B5*B6+C3/D4^2, which
expression would be evaluated first? B5*B6 C3/D4
Which part of the formula +E12/6+
(G7*SUM(H9:H11) is considered a constant? E12 6
It is surrounded
How can you tell which cell in a worksheet is the by a heavy
active cell? border. It is blinking.

By using the arrow


By clicking in a keys to move to a
How can you change the active cell? different cell different cell

Which of the following would you use to change The Standard The Formatting
the font size of a cell in Excel? toolbar toolbar

The command that will save the current the New command the Save command
workbook with a different file type is: on the File menu. on the File menu.
The command that will print an Excel workbook
is found on the ____________ menu. File Edit
In the Save As and Open dialog boxes, the
___________ view shows the file size as well as
the date and time a file was last modified. Preview Details
Which of the following commands will
automatically adjust cell references in formulas? Insert Delete
Which of the following commands will remove
cells, rows, or columns from a worksheet? Clear
Orientation Delete
Which of the following options is NOT controlled (portrait or Headers and
through the Page Setup command? landscape) footers
Which command enables you to change the
margins for a printed worksheet? Options Page Setup
All commands are carried out on a rectangular
groups of cells known as a: worksheet. range.
Which of the following is a valid cell range? 6 D12, G25
In a copy operation, the cell(s) you are copying
from is called the: copy range. destination range.
In a copy operation, the cell(s) you are copying destination
to is called the: paste range. range.
Which of the following commands is needed to The Duplicate The Copy
duplicate the contents of a cell in another? command command
A cell reference that does not change during a
copy operation is known as absolute relative
Which of the following is considered an absolute
cell reference? B4 $B4
Cell E3 contains the function =AVERAGE(A3:D3).
If the contents of cell E3 are copied to cell E4,
what will be the contents of cell E4? #DIV/0! #DIV/0!
Cell E3 contains the function
=AVERAGE($A$3:$D$3). If the contents of cell
E3 are copied to cell E4, what will be the
contents
Which of of
thecell E4?
following commands is needed to #DIV/0! #DIV/0!
transfer the contents of one cell range to The Move
another? command The Cut command

copy and paste


The F4 key is used to: cells. edit cells.
Which of the following quickly copies the the Format
formatting of a selected cell to other cells? the Fill Handle Painter
Select the Insert Click the Insert
Hyperlink Hyperlink button
Which of the following will insert a hyperlink into command from the on the Standard
an Excel worksheet? File menu. toolbar.

whether the cell


Conditional formatting applies formatting to a has a formula or a
cell based on: value in it. the cell address.

If you enter a date into a cell, Excel stores the text with a two- text with a four-
date as: digit year. digit year.
You created a worksheet on July 30 and entered
the =Today() function in cell E17. You opened
that worksheet again on August 31. What will
be displayed in cell E17 on August 31? Jul-30 Aug-31
subtracting the adding the earlier
The number of days between two cells earlier date from date to the later
containing dates can be calculated by: the later one. one.
The function key that is used to quickly edit the
contents of a cell is: the F4 key. the F2 key.

What will be stored in a cell if 3/4 is entered in


it? 03-Apr 0.75

A user’s response to the InputBox function can a cell on a


be stored in: worksheet. a variable.
The cell reference for a range of cells that starts
in cell B1 and goes over to column G and down
to row 10 is _____. B1-G10 B1.G10
The teacher has a spreadsheet showing all Year
10 students and their marks in one Mathematics
test. To find the student with the highest mark,
which of the following functions should be used? AVERAGE COUNT
Which chart type best shows proportions of a
whole? Combination Line
Once a bar chart is Once a column
chosen it cannot be chart is chosen it
Which of the following is TRUE regarding chart changed to a cannot be changed
types? column chart. to a bar chart.
To select several cells or ranges that are not
touching each other, you would _____ while hold down the hold down the
selecting. CTRL key SHIFT key
Your Institute teachers have set an assignment
on ‘Studies’. You are required to use a
spreadsheet to record all that you study on each
day for four weeks. You decide to show each
week’s data with an accompanying graph. What Create four
is the would
What best way of doing
be the this
best method to quickly copy Use tables separate files
the formula from the active cell to each cell
below it? Paste Fill Down
To arrange rows in alphabetical order based on
column A, you need to use the command _____. Tools | Sort Data | Sort
What can you NOT do with a spreadsheet? Analyse data Calculate data

To print just part of a sheet, you would select click the Print press the PRINT
what you want to print and _____ . button SCREEN key
Spreadsheets can be used for... producing graphs writing letters
The formula that will add the value of cell D4 to
the value of C2 and then multiply by the value
in B2 is _____. (D4+C2)*B2 D4+C2*B2
Which of the functions is not valid for =A3SUM:B3SUM:
performing addition 0 C3SUM
The default orientation for the printed page is
_____. portrait landscape
Which is not a valid cell address? AD213 ZA1

The World Wide Web was devised by _________ CERN ECRN

The useful URL schemes are_____ and______ yahoo and infoseek mailto and files
bulletin
boards,mails call
The other ways of getting connected to the net news groups,yahoo and wireless
are_____ and infoseek system
business
bulletin board broadcasting
BBS stands for______ system system
USENET is a BBS on ____ scale small large
WINSOCKS is expanded as______ windows socks windows sockets
IETF Level 2 HTML DTD supports graphical
browsers like _______ Mosaic Yahoo
The space used by Netscape to store the
retrieved page is called______ buffer cache
The principles, means and methods for
rendering information unintelligible and for
restoring encrypted information to intelligible
form. Photography Digital Signature
A long string of seemingly random bits used
with cryptographic algorithms to create or verify
digital signatures and encrypt an decrypt
messages and conversations. Key Lock
Protected/private character string used to
authenticate an identity or to authorize access
to data. User-id Password
The successful act of bypassing security
mechanisms
A set of rules of theformats,
and system.semantic and Penetration Retrieval
syntactic, that permits entities to exchange
information. Acts Regulations
An attempt to get access to a system by posing
to be an authorised person. Spoofing Imposting
An action or
According to event that might
information prejudice
Technology Act,security.
2000, Loss Threat
To investigate contraventions the controller of
certifying authority shall exercise the like Sales - tax Income - tax
powers to that of authorities authorities
Malicious software. Utility Pirated software
Internet Tim Berner Lee Hoffman
earth. Etrade.com Amazon .com

When we talk of Data Transmission modes, then Automated Tailor


ATM
A stands for
sequence of bits or characters that identifies Machine Any Time Money
the destination and the source of a
transmission. Acts Regulations
The means
A group of communicating
of computers between
and other devicesnetworks Router Gateway
dispersed over a relatively limited area and
connected by communication links that enable a
device to interact with any other on the
network. LAN WAN

hyper terminal hypertext tracing


The term HTTP stands for tracing program program
National Network
A NIC is considered as Informatics Center Interface card
A hub is a device that can connect Only Computers Can not computers
Combines
connectivity of a
hub with the
Which of the following is true concerning the Concentrates traffic regulation
function of a switch? connectivity of a bridge
Bridges and Two or more
What do routers connect? Repeaters. networks
What does a router route? bits frames
Software which prevents external access to a
system is termed firewall gateway
If four computers are connected to a hub and
then to the internet, how many IP addresses are
required for these 5 devices? One Two
Which creating
When of the following in an
a network OSIjust
from layer
two PCs, Physical Layer Data-Link Layer
what kind of cable would be used to connect
them? RG7U Coaxial cable

An IP address is a Physical address Logical address


To construct a simple LAN of 4 computers, you
would connect them with ______connect them A cable Hub

What happens to data that is ruined before Data return to the It gets destroyed
reaching to receiver sender bit by bit.
Wireless
Bluetooth is technology Wired Technology
Which is not one of the recognized IEEE sub
layers? Physical Layer Data Link Layer
The most preferred number system to represent
a IP address is Binary ASCII
A MAC address is of 48 Bits that
software 48 Bytes
facilitates a list of rules for
connection to the transferring data
Protocol is internet over a network
A ............... is a LAN-based computer with
software that acts as a controlling device for
controlling access to at least part, if not all, of a
local area network and its available resources. Novell PC Client

If one node goes


down, it brings
What is the biggest disadvantage of the Ring down the entire
topology?
The .............. of the network concerns how There isn't one ring
network devices are physically (or optically)
interconnected. Physiology Topology
The principal topologies used with LANs are: Bus Star
What are the various types of bus architecture? Linear Parallel
What are the various types of ring architecture? Parallel Circular
In a ................., each workstation attaches to a
common backplane via its own physical cable
that
In terminates, each
a ............... at thework
hub station is directly Ring Bus
connected to a common communications
channel Ring Bus
Which one of the following is NOT a network
topology? Star Bus
In a .............. , the cable system forms a loop
with workstations attached at various intervals
around the loop Ring Bus
The Media Access Control (MAC) is a sub layer of
the: Network Layer Transport Layer
What are the most common LAN technologies Ethernet, token Ethernet, token
used in networking today? ring, DecNET ring, FDDI
Modem speeds are measured in bps kbps
LAN speeds are measured in bps Kbps

usually higher than measured in bytes


WAN speeds are LAN speeds per second
Accessing the Internet from a typical home PC
requires the use of CD-ROM drive a modem
must use the must use electronic
To use the Internet, you World Wide Web mail

The worldwide web server uses the following key gateway uniform resource
standard interface to act as the middleware: interface locator

a Novell Interface used to control a


An NIC Controller printer
Accessing the Internet from a typical home PC
requires the use of CD-ROM drive a modem
The most widely used network operating system
on PC LANs is Linux Novell Netware
have to do with
compression of
graphics and have to do with
JPEG and MPEG video Web pages

must use the must use electronic


To use the Internet you World Wide Web mail

A multiplexer is a form of Printer modem


provides access
An ISP to the Internet is a CPU register

used to browse the


FTP is used to send email Web
uses wireless
communication
Telnet used to send email
used to protect a medium
computer room
from fires and
A firewall is floods a form of virus
A proxy server is a backup server an email server
IR system for the
A search engine is hardware Internet
To look for information about interest areas on
the internet, the user should use a scanner CD-ROM
provides access
An ISP to the Internet is a CPU register
used to browse the
FTP is used to send email Web

uses telephone
Telnet used to send email lines

Any layer can


The layers cannot communicate
Which of the following is a true statement about communicate with directly with any
the OSI model layers? one another. other layer.
It is made up of
many networks
connected into
Which of the following is NOT true about the It is one large transmission lines
Internet? network. called backbones.
The traditional intent and impact of this
common type of attack is to prevent or impair
the legitimate use of network resources. Password cracking
used to protect a System intrusion
computer room
from fires and
A firewall is floods a form of virus
Which of the following is NOT an example of a Flood a Web server
DoS attack that is popular among hackers? IP flood with requests
A ____________ attack is when a hacker sends a
continuous flow of packets to a system. hack packet
One defense option on a large network is to
configure a ____________ to disallow any external
traffic. firewall router
A proxy server is a backup server an email server
Which of the following would be performed on a
network server and not normally on individual Apply security Update virus
workstations? patches definitions

What can be said about the safety of the All sites are safe There are safe
Internet? and reliable. and unsafe sites.
To secure communication network against wire-
tapping the most effective control is Use of identifiers Use of passwords

One way that a virus CANNOT spread by attaching to an through an FTP


throughout
Which of thea following
network is:
is NOT a means of e-mail. port.
monitoring employee use of company
technology? Phone E-mail
____________ would be used by parents to
monitor their
The formal children
rules on their home
and parameters system.
which are A Trojan horse Adware
established to permit a microcomputer to
communicate with the mainframe computer as
though it was a terminal of the mainframe are
called Modems Protocols
The two most common tools used to help with cookies and Trojan Trojan horses and
extracting information are: horses. key loggers.
An attack on a An attack with the
Which of the following would NOT be considered system for personal purpose of gaining
an example of cyber terrorism? gain publicity
Which of the following would be a form of cyber Disruption in
terrorism? Economic damage communication
Which of the following is a likely target of a Crashing the stock Shutdown of
cyber terrorist that would cause considerable market, as in the military security
loss of life? 1930s systems

An organisation is upgrading its


telecommunication lines. Which is the least To carry more To improve network
important objective while upgradation network capacity services
A company posts a price list of its products on limit access to
its website. The advantage to the customer is set its prices very computer owners
that the company can high only
Which of the following is an easy-to-use service Yahoo People
to get information on someone? People Search Search
Which of the following pieces of information Name of your
would NOT be found online? bank Date of birth
Which of the following is the most common
danger on the Internet? Virus Fraud

The famous Nigerian Fraud scam offered victims


the opportunity to: buy stocks. invest without risk.
The fraud type that sends e-mails that claim to
be from legitimate sites in order to obtain
sensitive information is called _________________. Shill bidding Phishing
Using the Internet to pursue, harass, or contact
another in an unsolicited fashion is called: Internet stalking. cyber stalking.
Setting your privacy settings in Internet Explorer
to medium is one way to block: pop-ups. cookies.
What is the best means of protection from cyber Use a fake e-mail Never use your
stalking? address. real identity.

Which of the following is not an appropriate Physical Security


control over telecommunications software Encryption controls
Encryption techniques can be implemented in
Hardware-Software I only II only
Which protocol would be used to download a
free anti-virus program from the Internet? irc ftp
The major advantage of the checksum program Adds more bytes to Verifies integrity
is when it programs of files

Which of the following is a Web browser? HTML Internet Explorer


A Web page is another name for ----------- Web query. HTML document.
Domain names must contain a description of the
type of organisation that the domain represents. .com is used for .co in used for
A very common abbreviation used include: company company
A standard language for creating and formatting the World Wide
Web documents is: round trip HTML. Web Consortium
The Web page format in which all elements of a
Web page are saved as one file is called: XML. HTML.

using Internet
Explorer to view a
Web page that is updating the
stored on the hard values that are
Which of the following requires an Internet drive on your obtained through
connection? computer a Web query
Click on the Back
Mr Rao wants to find a website that he briefly arrow until the Click on ‘Go to’ or
browsed over yesterday. After turning on his desired site is ‘Search’ in the
computer how would he do this? found browser
the Insert
Which of the following is used to update a Web the Refresh Hyperlink
query? command command
You download from the internet, a screensaver,
a ten-second sound file and a ten-second music
video clip. You also add a hyperlink. Which of
the media elements has the greatest effect on
the file size? Hyperlink Screensaver
When saving a photograph for use on a website,
which format should you choose? BMP GIF
While researching the Direct taxes assignment,
you find a useful website. What is the most Save it to a floppy Write it down on a
efficient way to access the site at a later time? disk. piece of paper.
A system that uses the Internet for business-to-
business interaction is called a(n): extranet. intranet.
A block of text automatically added to the end
of an outgoing email is called an attachment. a signature.
_________ refers to the use of Internet
technologies for placing telephone calls. VoIP IPT
Most client/server applications operate on a Desktop client, Desktop client,
three-tiered architecture consisting of which of application, and software, and
the following layers? database. hardware.
Internet? Modem CD-ROM
File Transfer File Transmission
What does FTP stand for? Program
So computers Protocol
can be
referenced by a So IP addresses
What is the purpose of DNS? name can be shorter
Which of the following is NOT a properly
formatted IP address? 193.1.2.3 45.1.1.1
Which of the following is a properly formatted paul .trigg @ paul.trigg@doma
email address? domain. org. uk in.org.uk
The US Scientists in
The Internet is controlled by whom? government Switzerland
Internet Relay International Relay
What does IRC stand for? Chat of Characters
It will be waiting
If you do not pick up your email for a week...? It will be deleted for you to collect it

Hyper Textual Mark- Hyperlink Text


What does HTML stand for? up Lingo
Receiving Marking Language
messages
automatically from People discussing a
anyone in the topic of interest
What is a disadvantage of joining a mailing list? group globally

autolayouts and
In Powerpoint2000 ,the built-in professional clipart & auto presentation
design elements are shapes templates
Selection handles are the 8 small ___________
that appear around the object, when an object
is selected circles points
The _______ is an invisible matrix of vertical and
horizontal lines that covers the entire slide
workspace square image
_______ are drop-down menus that appear when
the right mouse button is clicked on the screen
element
________ and ______ have the ability to add a lot tool bars short cut menus
of visual impact into the PowerPoint clip gallery & slide show & view
presentation word art show
_______ is a motion picture or any animation file wave file media clip
In visual basic, when a record pointer reaches to
the last record, _______ property of a recordset
object is automatically set to ______ eof,false movelast,true
In visual basic, the explorer view of a project is
displayed in ___________ properties window form layout window
In visual basic, when a record pointer reaches to
the first record, _______ property of a recordset
object is automatically set to ______ bof,false movefirst,true
In visual basic, _______ is a method to convert a
string into integer. value() int()
In visual basic, in a shape control, a vb
statement gives Shape1.Shape = 2. What type
of shape should we get? circle rectangle
In visual basic, a timer event is only available in
timer control. true false
In visual basic, vbred or vbgreen or vbblue are
the property values of a backcolor of any object true false
In visual basic, _______ is a property of a textbox
control to set a color of a text. fontcolor color
In visual basic, _______ property of a textbox fontunderline,tru
control is set to _______ to underline a text underline,true e
In visual basic, _______ property of a textbox
control is used to change the size of text. textsize size
In visual basic, the interval property of a timer one- millionth of a one-hundredth of a
control is given in ________ second second
In visual basic, _______ property of listbox control
counts the number of items in the list count recordcount
In visual basic, the properties of various controls
can be set using __________ form layout window prperties window
In visual basic, vbinformation, vbcritical,
vbexclaimation are the values of _______ in a
messagebox function. title prompt
In visual basic, ________ is a function which
displays a message and it also allows the user
to enter values in a form object msgbox() textbox
In visual basic, using a data control, ________ is
a recordset type which allows to add a new
record and also to update existing record in a
recordsourse object opendynaset opensnapshot
In visual basic, while closing a form _______
event of a form object is triggered earlier to
terminate event. load activate
In visual basic, to give a backcolor or to bring in
a picture to a command button can only be
done if we set the style property to ______ standard opaque
In visual basic, a method RGB(255,0,0) will
generate _______ color blue red
In visual basic, a method RGB(255,255,255) will
generate _______ color red green
In visual basic, if a user uses a shortcut key
ctrl+R _________ becomes visible. properties window form layout window
In visual basic, if a user uses a function key F4 properties
_________ becomes visible. window form layout window
In visual basic, when a textbox control receives
the focus ________ event is triggered. change lostfocus
In visual basic, a form is a ________ object. child parent
Microsoft visual basic is a Rapid Application
Development tool. true false
In visual basic, when a form object appears on
the screen _________ event is triggered. load unload
In visual basic, to display text on a label object
_________ property is used text name
In visual basic, _______ object is used to access
the database and also to manage the data in
the database.
In visual basic, when a checkbox control is opendatabase dbengine
checked _______ property is automatically
assigned with 1. enabled visible
In visual basic, _______ keyword is used to
declare a variable dime dim
What is the extension of the Visual Basic project
file that stores the design of a user control. .ctx .ctl
Which event of a text box would you use for
validating the data entered by the user? Validate Validation
Which of the following statements forces inline On Error GoTo On Error GoTo
error handling? linelabel Inline
The _______ method resets the contents of
bound controls to their original values when the
user clicks on the cancel button. UpdateControls PaintPicture
Cancel parameter
To deactivate the Form UnLoad event, you make to a non-zero Cancel parameter
the following change in the function definiton: value to 0
How many root nodes can a TreeView control
have? 1 2

Consists of several Consists of several


A project group is a Project which: Programs Applications
Procedures declared in a _____ are local whereas Form window,
procedures declared in a ______ are available to standard or code Project window,
the whole application. module view code window
How can you keep the user from exiting a form Place code in the Place code in the
by clicking the Close button? Terminate event Unload event
The _______ property enables Visual Basic to
draw complete images in memory before AutoRedraw = AutoRedraw =
displaying them on the Screen. True False
You want to display the code and the
description of an error. What would be the Msgbox err.no & Msgbox err.number
correct syntax? err.text & err.text

To display images To help in creating


What is the purpose of the Image List Control? to the user a ToolBar
Which method would you use to get a free or
unused File identifier while opening any file: FreeFile GetFileNum
Which property procedure is used to retrieve the
value of a property? Retrieve Get
Which of the following can be shown to the user Common messages
using the Common Dialog control in VB? passed to Windows Open dialog box
Which of the following are not properties of
Command Button: Caption Visible
Which events enable you to determine which Click, KeyUp and
key was pressed by the user? Click and KeyPress KeyDown
In order to access a file in Non-textual format,
you have to open file in: Ascii Format Binary Format
Visual Basic displays information depending
upon the current value of two properties of the CurrentX and ScaleLeft and
form, called:
Which of the following procedure types will CurrentY ScaleTop
execute when you assign a value to a property
of an object? Property Get Property Assign
In order to overlap the controls (say a command
button) during design time, we use the ‘Send To
Back’ or ‘Bring To Front’ option from the Edit
menu. To change it dynamically (i.e.during Background color
program execution) we need to change: property Caption property
Which property of the ProgressBar determines
how much of
The ______ the barcan
function is filled?
be used to run any Min Max
.com, .exe, .bat or .pif file from a Visual Basic
program. Shell Substr
The caption and the name properties of the Are one and the Can be different
command button: a new Object variable with
You try to initialize same at times
the following line but receive an error. What You do not need to You do not have
could be the possible cause? Set MyVar = New use the Set the permission to
Classname command here access the class

Which of the following will perform a direct


execution of a Command object? The Open method The Exec method
A warning query A critical
The vb Critical symbol displays: icon message icon

vbYesNo is an example of a(n): statement. variable.


InputBox
function returns
MsgBox statement a value, while
returns a value, the MsgBox
The primary difference between the MsgBox while the InputBox statement does
statement and the InputBox function is the: function does not. not.
Which of the following is TRUE about a
protected form (i.e., a form where the Protect Data cannot be
Form button on the Forms toolbar is toggled on entered into the The form can be
and is assumed to remain in that position)? form. modified.
Which event is triggered when the user moves
to another open form? Unload QueryUnload
The user can use ______ to remove the
undesirable part of the image clipping tool cropping tool

The power presentation has a _____ for a set of


compatible colors color palette color box
The set three colors used for graphs and for
secondary slide items is called as ascent tricolor scheme
There are ______ types of charts available in
PowerPoint 10 28
_______ charts are useful while showing
variations over a period of time column bar
presentation images images and text
A PIE Chart is a ____ diagram that depicts the
relationship between a whole and its parts circular radar
Each individual piece of data in a series is called
a/an entity
Microsoft data point
PowerPoint launches an OLE-compatible organization
application called chart clip art
the chart is made
When the user double-clicks on an organization the organization available for
chart object in PowerPoint chart is expanded editing
The _____ are used for selecting, editing and general purpose
viewing objects in the chart box tools tools

Manager box tool in organizational chart window used to mange accessed only by
is organizational chart manager

The custom drawing tools are _______ by default turned on turned off
Click on the box tool ______ to draw three boxes once twice
There are ____ default fields available in all
boxes of the organizational chart two four
The _____ tool is used in the same way as we
use a pen to draw a table native tool draw tool
A/An _______ consists of smaller printed version
of the slides autolayouts handlayouts
The size of the object can be changed using the
______ tool zoom reduce/enlarge
_______ is the process through which the slides
in the current presentation are included in
another presentation or application importing exporting
________ can be used to create charts as well as
worksheets Microsoft excel auto shapes
PowerPoint can import text files that have been .rtf(rich text
saved in ______ format .ppt(PowerPoint) format)
levels nine only one
When a file is saved with _____ extension, the
graphics and text are also saved along with the .rtf(rich text .wmf(windows
slide format) metafile)
not displayed displayed only
during the slide during the slide
The hidden slide is show show
____ effect is used to introduce a slide during a DTS(digital track
slide show sound) 3D(3 dimension)
A _____ is a special effect that determines how
the objects appear on the slide build transition
The notes page is formatted based on the notes master slide master
Pick the odd man out of the following outline view slide view
When a new presentation is opened ,powerpoint
creates slides that have a width of _____ and a 10 inches,7.5
height of ______ with the landscape orientation 15 inches,10 inches inches
The default orientation for notes ,handouts and
outlines is ____ orientation portrait landscape
Build effect is also called as ______ animation view show
Graphics for web pages are automatically stored
in ____ format gif jpeg
A _______ is used to jump to any slide in the
presentation hyperlink hypertext
The ______ language has been incorporated into visual basic for
PowerPoint visual c++ application
In PowerPoint _____ is a series of commands that
are executed in sequence macro batch file
while creating a during slide
The macro will be activated .exe file transition
Developers can easily add ____ to PowerPoint
2000 by
______ using the the
determines programming interface
order in which order in virus checkers spell checkers
which the slides will be displayed during the
show slide show custom show
_______ is used to organize and develop the
contents of a presentation slide pane notes pane
If we save the presentation file as a metafile, it
can be opened using internet explorer paint shop pro
PowerPoint creates
a sample
With reference to autocontent wizard for presentation to it is the quickest
creating a new presentation, which of the which user can add way to create a
following statements are not true words and pictures presentation
user can insert user can insert
objects like clip- only pre-drawn,
arts, pictures pre-colored
stored in a graphic images
separate files to reflected in a clip
Which of the following statement is not TRUE the slides arts to the slides

in outline view, in slide sorter view,


With reference to changing the order of slides, drag the slide icon drag the slide to a
which of the following statement is not true to a new location new location
the slide that holds
the formatted
placeholders for
the titles, main text
and any
background items transition means
that user wants to applying special
appear on the effects to the
slides is called a crossover between
Which of the following definitions are not true master templates the slides
in outline view,
user can see the
miniatures of all
slides in a
with notes pages presentation,
view user can complete with
prepare speaker text and
Which of the following statements are not true notes and handouts graphics
the slide that holds
the formatted
placeholders for
the titles, main text
and any
background items transition means
that user wants to applying special
appear on the effects to the
slides is called a crossover between
Which of the following definitions are not true master template the slides
The options available in the common task
toolbar does not include slide layout customize
by default,
doughnut chart
is displayed
data to be graphed based on the
With reference to chart, which of the following resides in a data in the
statements are not true datasheet window datasheet
The format of the text entered in a title, subtitle,
or bulleted-list object is determined by the
format settings in a special slide called -------- the master slide the slide master
PowerPoint provides a _________ that searches
the entire presentation i.e., all the text objects
in all the slides, outlines, notes and handouts for
spelling errors office assistant spell checker
PowerPoint's drawing toolbar contains _______
drawing tools 10 12
Click _______ on the rectangle drawing tools
enables us to draw multiple rectangles once twice

An example of the components of a multimedia text, graphics and text, hypertext and
presentation could include email address. Power Point.
Which of the following formatting elements can
be applied to a PowerPoint diagram using the
AutoFormat tool? the Line style the Line color
Which of the following formatting elements can
be applied to a PowerPoint diagram using the
Format AutoShape command? Fill color Line color
A popup box
Excel is started so prompts you for an
What happens when you double click a blank that you can create existing Excel chart
graph placeholder in a PowerPoint presentation? a chart. to insert.

always taken from


always taken from the first column of
the first row of data data in the
The legend in a Microsoft Graph chart is: in the datasheet. datasheet.
Suppose you are creating a Microsoft Graph of
quarterly sales by region. Which would be the
best chart type if you want to emphasize the Side-by-side
total sales of each region? column Stacked column

Pull down the Insert Click the Insert


Which of the following actions will enable you to menu and select Chart button on the
insert a graph into a PowerPoint presentation? Chart. Standard toolbar.
Click the chart
object, then click
the View
If you are editing a slide containing a Microsoft It automatically Datasheet
Graph, how do you display the underlying displays in Slide button on the
datasheet? view. Standard toolbar.
How do you deselect a chart that has been
placed onto a PowerPoint slide after you have Single click the Double click the
finished creating the chart? chart. chart.

A dialog box is
A dialog box is displayed allowing
displayed allowing you to enter the
you to enter the name of the Excel
name of the Excel worksheet that
worksheet that should be
should be linked to embedded in the
What happens when you click the Datasheet the PowerPoint PowerPoint
button on the Microsoft Graph toolbar? presentation. presentation.

What happens if you single click a chart that is The chart is The chart is
not currently active? selected. deleted.
What happens if you double click a chart that is The chart is The chart is
not currently active? selected. deleted.

a slide one bullet bullet items one


Using custom animation effects, you can build: item at a time. letter at a time.
Which of the following animation effects can be
added to a slide? Subtle Moderate

Which of the following animations effects can be Fly in from top or


added to a slide? Enter and exit bottom
Which keyboard key is used to select more than
one picture on a slide? Enter Shift

what objects do
the way objects after they appear
Custom animation can be used to affect ONLY: appear on a slide. on a slide.

The advanced The advanced


timeline shows the timeline shows the
Which of the following best describes the sequence in which duration of the
information that appears on the advanced objects will appear effect applied to
timeline? on the slide. each object.
Which of the following objects can contain
custom
What animation
type effects?
of program allows an object within an Clips Organization charts
image to be edited without affecting other
objects? Paint program Draw program
Which of the following animation effects can be
added to a slide? Fly in From top
Once data is Once data is
Which of the following is TRUE regarding the entered it cannot entered it can be
Datasheet? be changed. changed.
Graphical software tools that provide complex
analysis of stored data are: OLTP. OLAP.
You can change
You can change the both the
appearance of a appearance of a
whole diagram, but whole diagram
not individual and the
Which of the following statements is TRUE shapes of a individual shapes
regarding PowerPoint diagrams? diagram. of a diagram.
Which keyboard key combination is used to
undo the previous command(s)? [Enter+A] [Shift+Z]

Microsoft visual basic project file has _______ file


extension. .vbg .vbp
In visual basic, _______ method is used to add an
item in a combobox add additem
In visual basic, _______ method is used to load
picture during runtime in an image control load loadpicture
In visual basic, to populate a drive list box with Drive1.Drive=Dir1. Dir1.Path =
a directory list box __________ statement is used Path Drive1.Drive
In visual basic, to display a message in the run
time _________ function is used messagebox() message()
In visual basic, to populate a directory list box Dir1.Path=File1.Pat Dir1.Path =
with a file list box ________ statement is used h Drive1.Drive
In visual basic, ________ is a property of a
recordset object which counts the number of
rows in a recordsourse object openrecordset opendatabase
In visual basic, using a data control, a record
can only be added from the last record. Adding
a new record is only possible using _______
method of a recordset object. update append
In visual basic, using a data control, a record is
saved to a recordsource object using _______
method of a recordset object. append update
In visual basic, using a data control, to navigate
to the previous record ________ method of a
recordset object is used. movenext movelast
To deactivate the Form UnLoad event, you make
the following change in the function
definiton:Private Sub Query_Unload(Cancel as Cancel parameter
Integer,UnloadMode as Integer) To prevent the to a non-zero Cancel parameter
Form from closing, you will set the: value to 0

_______ is a word processing that is a member of


the office 2000 family Word 2000 Office 2000
The feature that enables user to type anywhere
in a document without pressing or tab click-n-type double click
The______ feature allows the user to copy and
paste upto 12 items at the same time in an
application office clipboard cut
______ and _____ key combination will extend the
shift+end and shift+left and
selection by one character on the left and right
shift+home shift+right
web layout, normal layout, web
_____and_____ are improved layout in Word 2000 printlayout layout

The easiest way to create a document in word is wizard templates


In Office2000 environment the tool that makes
work easier for us is_____ office assistant inbox assistant
A short description of a tool bar button called
the ______ is displayed when the mouse pointer
is allowed to stay for a second on the button Screen Tip Tool Tip
The _____ helps us to keep track of the margin
of the page tab stop marginal stop
The keys that are used to navigate between
headers
Pick andelement
out the footers are
from the following that up arrow keys only page up keys only
dose not form the type of tabs for the Word
2000 left center
_______are blueprints or patterns for documents
of a certain type template model
The______ is used for quickly setting paragraph
indention using the mouse increase indent decrease indent
Word art is text with special effect control tool box
AutoShapes in word can be created by
accessing the _____ drawing toolbar control box
By default, a document consists of_____ section 1 2
The dialog box that is used to determine the page setup from printer setup from
documents margins is the file the file menu
________ is a box surrounding a page on all slides
or a line that sets off a paragraph on one or
more slides border shading
The key that is used to perform a task to select
all t he text in the documents is ctrl+a Del
The key that is used to indent a paragraph is ctrl+a Del
The key that is used to change the font from the
current positioned in a document is CTRL+SHIFT+F CTRL+O
The key that is used to change the style of the
document that is from that normal to heading1
or heading1 to other document styles. ctrl+shift+f ctrl+o
'Set mapping' Check control that follows a text-
type validation, we use ----------------- application
for data analysis. Excel Access
Excel can import data from other databases for
the data analysis. True False
A System Auditor can uses CAAT tools to
analyze data
In the case of the ---------- control, it is ensured False True
that the data in combination with other fields
are reasonable as per standard set by an
organisation. Valid Signs Transaction type
--------------- function searches for a value in the
leftmost column of a table and then returns a
value in the same row from a column that we
specify in a table HLOOKUP VLOOKUP
on DDE OLE
Analysis is the
loading of
Analysis translates programs that
program code of a perform routines to
How do you define analysis of an information high level language control peripheral
system? to machine code devices
Inputs, outputs,
file design
What areas need to be considered in the Only hardware and hardware, and
SOFTWARE design process? software software
To execute any
What is the function of systems software? To collect data programs
Deleted from the Copied from the
Formatting a disk results in all the data being...? disk disk
Users operate the Users operate
manual system and the computer
computer system system from a
What is Direct Implementation? at the same time given date
The new system The new system is
is introduced introduced and
alongside the users start
What is parallel running? existing system operating it
Instructions and
What documents are produced during the technical Log files and
development of a system? documentation temporary files

To enable any
printer to be
For technical connected to the
What are User Guides are used for? support network
Network systems
Operating and
systems and communication
Systems software can be categorised into: system services services
Magnetic tape
Which storage device cannot be erased? storage CD-ROM
To maintain a
Application software are programs that are backup copy of all To do a particular
written the information task.
Which bus carries information between
processors and peripherals? Data bus Auto bus
Hexadecimal FDDI BAD
Which bus controls the sequencing of read/write
operations? Data bus Auto bus
Operating system
Peripherals that are routines that
connected to a execute in
What are utilities? computer. supervisor mode.
Numbers are stored and transmitted inside a
computer in binary form ASCII code form

The original ASCII codes were 7 bits 8 bits


A Nibble corresponds to 4 bits 8 bits
More than 1000
A gigabyte represents mega bytes 1000 kilobytes

A 32-bit processor has 32 registers 32 I/O devices


used to indicate used to detect
A parity bit is uppercase letters errors
he contents of these chips are lost when the
computer is switched off? ROM RAM
Clock speed is measured in bits per second baud
memory access
Cache memory enhances memory capacity time
have fewer
instructions than use more RAM than
CISC machines RISC machines RISC machines
Which parts of the computer perform arithmetic
calculations? ALU Registers
Computer is
Every data from the primary memory will be Power is switched improperly shut
erased if off down
An RS-232 interface is a parallel interface a serial interface
from line printer dot matrix printer

is faster to access
ROM than RAM is non-volatile

increased the
storage capacity of increases the
A UPS a computer system process speed
has more storage
is a form of ATM capacity than an
smart card card ATM card
Laptop computers use CRT displays LCD displays
having several
programs in RAM
Multiprogramming refers to at the same time multitasking
having several the ability to run 2
softwares running or more programs
Multitasking refers to at the same time concurrently
What are small high speed memory units used
for storing temporary results? ALU Registers
A good way to exchange information that
changes rapidly is through brochures magazines

an operating
Multiprogramming is a prerequisite for multitasking system
Timesharing is the same as multitasking multiprogramming
______ is the default view in Word used for
typing Editing and Formatting the Text NORMAL ONLINE LAYOUT
The short-cut-key that is used to indent a
paragraph spacing in the documents is ctrl+m ctrl+2
The short-cut-key that is used to paste the
selected text ctrl+v or ins ctrl+c or ins
The short-cut-key that is used for paragraph
spacing(1.5) ctrl+2 ctrl+5
The box that separate text from the document
and allows it to behave like an independent
object is known as Text Box Frame
The object that is used to provide information
like the title of the book, name of the chapter, Header and
page number etc. Footer Screen Tips
The object that helps us analyzing data
statistically is known as Chart WordArt
To highlight certain parts of a page to set it
apart from the rest of the page we make use of
the following features Borders Shading
To clear all the tabs in a document the option
that is clicked
The dialog boxfrom
that the tabsto
is used dialog
incorporate clear remove all
picture bullets into our documents or web pages picture bullets arrow bullet dialog
is dialog box box
The object that composes of set of tools which
helps to create and work on different shapes like
rectangles, circles, flowcharts etc. charts WordArt
When word is opened a new document
called_____ is displayed, where the user starts
typing the content right way doc1 document1
______ is an online dictionary maintained by
word to obtain synonyms for words thesaurus hyphenation
The thesaurus is invoked by pressing_______ shift+f7 thesaurus menu
When a new table is created the insertion point
flashes in the _____ first second
By pressing the _____ key inserts a blank row
after the last row in the table tab end
The ______ option enables us to convert text into convert text to convert data to
a table format table table
A table consists of ______ that contain text or
graphics row rows & columns
The _______ option in word allows the user to
automatically correct misspell words as and
when they are typed AutoCorrect AutoFormat
______ is a facility that enables recording and
replaying of a sequence of keystroke Mail Merging Macro
In Word Macros are written in _____ basic visual basic
In Word 2000 the macro dialog box is activated
with the help of ____ key combination shift+f8 shift+f7
________shows how a document would look like
when published on the web or on an intranet web layout view online layout view
______ is a software for sending and receiving e-
mail messages email client outlook express
________is the coding system used to create web
pages html xml
The network that makes information easily
accessible across various networks is _______ internet intranet
the field
field name must be separators in a
listed in the same header source
order as the and the data
Which of the following statements are false with corresponding source can not
reference to the use of a header row source for information in the be set as
a mail merge data source paragraph

auto format option


applies to the
it is not possible to entire table and
change the height not only to the
With reference TO TABLE WHICH OF THE of only selected selected rows or
FOLLOWING STATEMENT ARE false rows of a table columns of a table
include left decimal
In order to type a
header from the
A new section is third page of the
created in order to document a
change properties section break is
Which of the following statements related to a like number of inserted after t he
Section Break are True columns third page
The user can set a spelling checker to skip the
marked part of the next true false
New option under the file menu of word creates
a new blank document that is based on the
normal templates true false
The user can split the screen only into two parts true false
The features that enables the user to type text
graphics tables anywhere in the document
without pressing enter or tab drag & drop click -n-type
The user can modify the picture from the clip art true false

prohibits the
automatically user from
corrects common renaming an
With reference to auto correct which of the typing, spelling auto correct
following statements are false errors entry
password
protected
document can be
With the reference to password protected opened without
documents which of the following statements password can not password as
are false include spaces read only
include left justified
a document file
a .ppt file can not can be inserted
not be inserted at in the current
specified position in document at
the current specified
Which of the following statements are False document position
Drop Cap tool does not work for the contents in
the table format true false
The user can split the screen only into two parts
in
TheMS-Word
special symbols that are inserted using true false
"insert symbol" option of the word can not be
printed by the printer as they are not standard
keyboard symbols true false
The "format columns" option allows to create
columnar text up 12 columns only. true false
The document that makes the user to organize
and maintain a long document, such as
multipart report or a book consisting of chapters Master Document Child Document
The view that enables us to view how objects
will be
The positioned
mode on the page
that is initialized when it to
or toggled is printed
if the Print Layout View Page Layout
user is in a position to overwrite the text in the
word Insert Mode Type Over mode
Veena is entering a paragraph in a word
processing program. When the cursor gets to
the end of a line, what is the best way to get the press the return
cursor to the next line? key press the tab key
How are data organized in a spreadsheet? layers and planes lines and spaces
Which key moves the cursor to the beginning of
the next line of text? tab enter/return
Veena typed the following sentence: "The girl
was very beautiful." In which word processing
utility could she find a synonym for "beautiful"? grammar checker spell checker
send a public
message to friends
Using an electronic bulletin board, Seema can interested in one send pictures to a
do all of the following except which one? topic friend
Aryan has created a ten-page story, but only
wants to print the first two pages. What printer
command should he select? Print all From ___ To ____
What process should be used to recall a
document saved previously? Enter Copy
Which is used to indent text within a document? closing tabbing
Desktop publishing is a more sophisticated form
of which of the following types of software? database graphing
Creating and
editing
What is a Word Processor used for? To analyse figures documents
What is a picture that is saved on a diskette and
can be pasted into a document? subscript annotation
Creating and
editing
What is a Word Processor used for? To analyse figures documents
What basic tools would you find in the Edit Clear, replace and Spelling, grammar
menu of a word processor select and autocorrect

Numbers which
Text at the bottom appear on every
What is a header in a document? of every page page
Mouse, printer
and processing
system Keyboard, Mouse,
What hardware is essential for a word? keyboard? monitor and printer
The user could take a picture from a magazine
and insert it into the document by using a Browser clip-art file
Clear, replace and Spelling, grammar
What basic tools would you find in the Edit Toolbars and autocorrect
Assume you are creating a two-column
newsletter. Which type size is the most
reasonable for the text in the columns? 6 point 10 point
Given the default left and right margins, and ½-
inch spacing between columns, the width of
each column in a two-column document will be: 2½ inches. 2¾ inches.

Assume you have made all appropriate


selections in the Columns dialog box in Word, You are not in You have not
but cannot see any columns on the screen. Print Layout inserted a column
What is the most likely cause? view. section break..

While word processing, in which of the following to store a file on to store a file on a
situations would Tom use the "Copy" command? the hard drive diskette
Data about a set of
What does a document contain? similar things Mainly text
Before submitting your work you want to find
any words spelt incorrectly. Which of the
following would you use? Thesaurus Spell Checker
What command in a word-processing program
can be used to change the word ‘him’ to ‘her’,
and also the word ‘he’ to ‘she’ in the given
phrase? “On a cold and still night, the only
sound that could be heard was the owl that had
ade its home in the nest outs Paste Replace
What edit commands would you use to insert a
paragraph from one document into another
document, while still keeping the paragraph in
the first document? Copy, then paste Cut, then paste
To give the original
To give the original author a chance to
author a chance to reject suggested
Which of the following statements would NOT accept suggested changes from the
be a reason for showing suggested revisions in a changes from the person who
Word document without changing the original person who entered entered the
document? the revisions revisions

A red underline
A line appears appears beneath
Which statement is NOT true regarding revisions through text that is text that is to be
made in a Word document? to be deleted. added.
Through the Edit Through the Tools
menu by choosing menu by choosing
How are suggested changes entered for review Track Changes Track Changes
on an initial Word document? command command
The Versions
command will The Versions
allow you to save command will allow
multiple versions you to save only
of a document, one version of a
including any document,
changes that including any
may have been changes that may
Which of the following is TRUE about saving a made to that have been made to
document using the Versions command? document. that document.
The latest
All versions are version is
What happens when you open a document that opened opened
has been saved using the Versions command? automatically. automatically.
You have used the word ‘discover’ four times in
an English essay you have created using a word
processing program. You would like to find
another word of similar meaning to use instead
of ‘discover’. Which of the following would you
use to do this? Dictionary Grammar check
Word displays a The most recent
When opening and working with multiple list of the dates version will appear
versions of a document, how can you tell which and times each at the bottom of
is the most recent version? file was saved. the list.
Various fields are added to a regular document
to create a special document called a form
through the ____________ toolbar. Fields Tools
Which of the following types of fields CANNOT
be inserted into a form? Check boxes Toggle button

Which of the following is TRUE related to editing Comments cannot Comments cannot
comments in a Word document? be edited. be deleted.
Numbers which
Text at the bottom appear on every
What
In youris English
a header in a you
essay document?
notice that the of every page page
paragraph at the bottom of page 1 continues on
to page 2. You would like to make this
paragraph start on page 2.What would be the
best way to do this? Press tab. Press Return.
Tables in a document help you to easily arrange
all of the following EXCEPT: text. graphics.
To identify a document, it is helpful to include
the file name on each page as a header/footer. bibliography.
Which of the following tools will copy the
formatting of selected text to other places? Copy button Paste button
What is the name of the process of determining
the cause of errors in a macro? Fault Finding Bug Squashing
Drop caps are added to a Word document using
the ___________ menu. Insert Tools
a section of text
where the first
a section of letter of each
white text on a sentence is
black lowercase and the
A reverse in a newsletter is: background.
setting it in rest are uppercase.
larger type or typing it all in
A pull quote is best emphasized by: font size. capital letters.

The reverse A pull quote is a


technique means to quotation taken
add dark text on a from (pulled) from
Which of the following definitions is CORRECT? light background. another document.
Pertaining to newsletters, which of the following
cannot be changed using the Columns The width of each The height of each
command dialog box? column column
As related to type size, how many points are
there to the inch? 6 10
Assume you are working on a newsletter in
which the masthead extends across the top of
the entire first page. The rest of the newsletter
has two columns. What is the minimum number
of sections in the newsletter? One Two
Press
Press Ctrl+Enter to Ctrl+Shift+Enter to
Which of the following is NOT correct with create a page create a column
respect to page, column, and section breaks? break. break.
Which of the following would be the most A serif font at 10 A sans serif font at
appropriate font for a newsletter headline? points 10 points
Which of the following is the default Word
column width? 2 inches 3½ inches
Sequence Check is a --------------- level control
check. Field Record
Analyse data over two or more periods is called
----------------------- analysis Horizontal Vertical
We use Hash Total to identify ------------ within a
series where there is a definite relation between
items Duplicate Value Combined Value
Analyse fields by arranging them into rows and
columns is called Cross Tabulate Filter
--------------------- function searches for a value in
the leftmost column of a table and then returns
a value in the same row from a column that we
specify in the table. RAND() VLOOKUP()
To import data from Access to Excel ,it is not
possible to link between Access and Excel sheet TRUE FALSE
The GAP detection options can be used to test
for completeness of data. TRUE FALSE
Exception testing can be used to identify
----------------- items Unusual Strange
Data validity
Year end testinventory
ledger, represents
files or transaction exception testing comparison of data
files can be tested for cut-off , to ensure that
the data has been provided is for the correct
audit period True False
In Range Check , the data may not be in proper
sequence but should be within a predetermined
range
In ---------------- Check data entry follow a True False
particular sequence and also a predetermined
range. Limit Sequence
related to virtual
Virtual memory is reality a form of ROM

same as same as
Multiprocessing is multitasking multiprogramming
To help keep sensitive computer-based
information confidential, the user should save the file set up a password
to read from or
to calculate write information
What is the function of a disk drive? numbers to a floppy disk
A 4GL is Uses Cobol uses Java
A nanosecond is 106 sec 103 sec
What small, hand-held device is used to move
the cursor to a specific location on the screen? a keypad a mouse
data to be data that has been
transferred to transferred from
The memory address register is used to store memory memory
data to be data to be
transferred to or transferred to the
The memory data register is used to store from memory stack
an instruction that
an instruction that has been fetched
The instruction register stores has been decoded from memory
Which of the following is used to indicate the
location on the computer monitor? a cursor a scroll bar
A mathematical procedure that can be explicitly
coded in a set of computer language
instructions that manipulate data. Formula Algorithm
Which of the following translates a program
written in high-level language into machine
language for execution? Assembler Compiler
Detecting errors in real memory is a function of Memory protection Parity Checking
To find where a file has been saved on disk, the use the directory search each file in
user should search tools turn
A series of instructions telling the computer how
to process data or files is defined as a Network
save copies of the Program
file with the same use different
To ensure that data is not lost if a computer name on the filenames on the
system fails, the user should system system
Having a single CPU alternatively process tasks
entered from multiple terminals is called Multiprocessing Time sharing
The place in the CPU where the data and
programs are temporarily stored during
processing is called the ROM RAM

All are examples of computer software except Firmware Word Processor


Computer manufactures are now installing
software programs permanently inside the
computer. It is known as Firmware Word Processor
Which of the following file organisation forms
most efficiently allows access to a record Sequential Hashed
The part of the computer system controlling
data manipulation is called the Operating System ALU
For direct access storage devices the recording
area is divided into Tracks and Sectors Blocks and Sectors
The data hierarchy from the largest to the Character, field, Database,
smallest is database character, record
Which of the following hardware or software
system controls provides a detailed record of all Valid character Maintenance
activities performed by a computer system check diagnostic program
Which one of the following parts of a computer
is necessary to enable it to play music? Sound card. CD-ROM
An educational CD-ROM on Indian Poets
contains 1000 pages of text, 500 colour
pictures, 15 minutes of sound and 1 minute of
video. Which of the four different media listed
takes up most space on the CD-ROM? Text Pictures
Which one of the following printers is suitable
for printing sprocket fed carbon copies? Laser Dot matrix

viewing an creating the plans


Multimedia software can be most productively encyclopaedia CD- for a building
used for ROM. design.
To be effective a virus checker should be replaced regularly never updated
Which one of the following software applications
would be the MOST appropriate for performing Document
numerical and statistical calculations? Database processor

get into the system make efficient use


Passwords enable users to quickly of time
How many bytes do 4 Kilobytes represent? 512 1024
Back up of the data files will help to prevent confidentiality duplication of data
Which one of the following is the MOST common
internet protocol? TCP/IP HTML

access to the
The advantage of a PC network is that internet is quicker files can be shared
The term A:\ refers to a file name a subdirectory
up-line provider
UPS stands for universal port serial service
the program
executable may
The main problem associated with uninstalling orphan files can be not allow it to be
software is that left on the system uninstalled
You are conducting research for a Income Tax
assignment. The raw facts you collect are called data. documents.
Graphical Rules writte in
representation of procedural
A flow chart is the logic language
Purchase, sales,
receipt, payments To fill the log
A voucher entry in Tally is done for etc. register

assist in
Passwords are applied to files in order to maintenance speed up access
Each of the following is an enabler of IT-business senior executive IT management
alignment except: support for IT. lacks leadership.
The basic systems model is used to describe
virtually all information systems and it consists
of the following elements: input. output.
The use of
computers to
design state-of-the-
art, high-quality Using computers to
What is a computer-aided design system? products. do architecture.
A(n) __________ offers a solution package for an specialist or Application Service
entire industry. functional Provider
ensure the
File extensions are used in order to name the file filename is not lost
Information systems controls include all of the
following EXCEPT: preventive controls. detective controls.
Hashing for disk files is called external hashing static hashing
Components of expert systems include: a)
inference engine; b) user interface; c)
knowledge base; d) fuzzy logic A: (a) , (b), (d) B: (a) to (d)
of: corrective controls preventive controls
What is the term used to describe the point of
interaction between a computer and any other
entity, such as a of
The advantages printer
CASEor human
tools are: operator?
a) Component Interface
reusability; b) maintainability; c) portability; d)
flexibility (a), (c), (d) (b), (c), (d)
Turn the computer
Which of the following is an acceptable way to Press the reset off at the power
shut down the computer? button. point.
Yesterday, in your music class you saved your
compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the Create the files Ask the person
best way to locate the files? again. next to you.
Components of an information system model
are: a) applications architecture; b) functional
architecture; c) technology architecture; d)
information architecture (a), (c), (d) (a), (b), (c)
organisational
Benchmarks form part of: detective controls controls
Continuity controls include: a) record counts; b)
date checks; c) label checks; d) run-to-run totals (a), (c), (d) (a), (b), (c)

Which is not part of help desk documentation: problem logging call lights
Testing of individual
Design phase of CASEmodules is knowna)as:
tools includes: data unit testing data testing
architecture; b) decision architecture; c)
interface architecture; d) presentation
architecture (b), (c), (d) (a), (b), (d)
specifications
Which is part of installation testing: benchmark testing matching
The computer operating system performs
scheduling, resource allocation, and data
retrieval functions based on a set of instructions Peripheral
provided by the: Multiplexer. processors.
Which of the following falls under multimedia
data: a) text; b) images; c) video; d) audio (a) to (d)
Replacement (b), (c), (d)
Which of the following procedures should be personal computers Identification of
included in the disaster recovery plan for an for user critical
Information Technology department? departments. applications.
Designing relationships among components is
part of: architectural design interface design
called: Client-server Client
Which network topology uses a Hub? Star Bus
Which of the following topologies is used for
Ethernet? Star Bus
To maintain a
backup copy of are To do a particular
written all the job such as editing,
Application software are programs information storing information
Which type of file search method requires a
computer first read all locations preceding the
desired one Direct Sequential
Data
Which of the following areas of responsibility are Systems analysis communications
normally assigned to a systems programmer in and applications hardware and
a computer system environment? programming. software.
Which of the following is recommended when A sequential file on A sequential file on
many searches for data are required a disk a tape
It is unlikely that a magnetic tape containing Tapes can only be
several thousand blocked records can be used read by the
on two machines of different architecture machine on which Parity errors will
directly because they are written result
Which component of the CPU has the most
influence on its cost versus performance Data path part Control Unit
Which of the following terms applies to network
used to connect computers with other
computers, peripherals and workstations that
are in fairly close proximity Distributed systems Local Area network
Use the computer
to which they are
Can send data to a connected to
computer and perform all
Intelligent terminals differ from dumb terminals receive data from a processing
in that they is to be linked to 8 terminals using a computer
A computer operations
single communication link. To permit
simultaneous terminal operations,
communication path will require which of the
following Mixer computer
Allows Modem
signals to be send
over a telephone Aids in back-up
A modem is a device that line procedures
A LAN includes 20 PCs, each directly connected
to the central shared pool of disk drives and
printers.
A Thisbased
computer type of network
system for issending,
called a Planetary network Ring Network
forwarding, receiving and storing messages is
called an Office Automation Executor systems
If a workstation contains a processor, monitor,
screen manipulation device, printer, storage and An intelligent
communication capabilities, it is said to be A dumb workstation workstation
Time of day control Encryption
Terminal hardware controls include locks algorithms

RS-232 is a Type of cable Terminal Standard


A compiler
converts the whole
A compiler does a of a higher level
conversion line by program code into
line as the program machine code in
What is a compiler? is run one step

Feasibility study,
system design, and Implementation
What are the stages in the compilation process? testing and documentation
Which of the following is not a data transmission
coding scheme CRC Baudot

An interpreter does An interpreter is a


the conversion line representation of
by line as the the system being
What is the definition of an interpreter? program is run designed
A device used in data communications to divide
a transmission signal into several sub-bands is
known as a Modem Demodulator
Third generation languages such as COBOL, C, High-level Middle-level
and FORTRAN are referred to as languages languages
It is faster than
Serial Communication is used over long distance parallel It is less error
because it communication prone

In what areas is the COBOL programming Financial sector and Graphic design and
language used? engineering education

Communicate with Manage the paging


The primary function of a front-end processor is the console function in a virtual
to operator environment
Specification and
What is the first stage in program development? design System Analysis
Which of the following is not used for data
transmission within a local area network Fiber Optics Coaxial Cable
The design of the System Analysis
screen the user will defines the format
see and use to and type of data
enter or display the program will
What is System Analysis? data use
A device to device hardware communication link
is called A cache An interface
Testing to check for
The different types errors before the
of network to be system is
What will a good software provider consider? used introduced
The topology of a network can be each of the
following except Star Packet
What is the 8-bit binary value of the decimal
number 85? 10101010 1100101
Which is the most common data transmission
error checking method Parity Retransmission
What is the decimal value of the binary number
1111? 15 4
Which of the following devices merges
communication signals onto a single line Port Modem
215? 327 141

Which tool is used to help an organization build


and use business intelligence? Data warehouse Data Mining tools
memory access
Cache memory enhances memory capacity time
What is the decimal value of the hexadecimal
number FF? 30 255
Numbers are stored and transmitted inside a
computer in binary form ASCII code form
What is the hexadecimal value of the decimal
number 1476? 4C5 1B7
A byte corresponds to 4 bits 8 bits
Basic Coding Binary Coded
What does EBCDIC coding of numbers mean? Description Decimal
A Kb corresponds to 1024 bits 1000 bytes
What is the binary sum of 01011 and 00101? 10000 1112
Information is stored and transmitted inside a
computer in binary form ASCII code form
Where would you find the letters QWERTY? Mouse Keyboard
used to indicate used to detect
A parity bit is uppercase letters errors
Because it squeaks Its moves like a
How did the computer mouse get its name? when moved mouse
Clock speed is measured in bits per second baud
What are you most likely to use when playing a
computer game? Touch screen Light pen
CPU performance may be measured in BPS MIPS

A digitising tablet can be used for? Printing letters Tracing diagrams


In processing cheques which of the following I/O
techniques have banks traditionally used OCR MICR
Which of the following is a pointing device used
for computer input? Touch screen Hard disk
increased the
storage capacity of increases the
A UPS a computer system process speed

What does a light pen contain? Refillable ink Pencil lead


The capacity of a 3.5” floppy is around 100K 1.44 Mb
What general term describes the physical
equipment of a computer system, such as its
video screen, keyboard, and storage devices? hardware software
Where would you find the letters QUERTY? Mouse Keyboard
What are you most likely to use when playing a
computer game? Touch screen Light pen
A digitising tablet can be used for? Printing letters Tracing Diagrams
Which of the following is a pointing device used
for computer input? Touch screen Hard disk
What input device could tell you the price of a
product Mouse Bar code reader
Where would you find a magnetic strip? Credit card Mouse
Writing on a hard
Hard copy is a term used to describe...? board Printed output
What are the individual dots which make up a
picture on the monitor screen Called Coloured spots Pixels
A daisy wheel is a type of...? Printer Storage device
What input device can be used for marking a
multiple-choice test? Mouse Bar code reader
Laptop computers use CRT displays LCD displays
mouse button
QWERTY is used with reference to screen layout layout
What input device could tell you the price of a
bar of chocolate? Mouse Bar code reader
A GUI is hardware interpreter
Where would you find a magnetic strip? Credit card Speakers
having several
programs in RAM at
Multiprogramming refers to the same time multitasking
having several The ability to run 2
programs in RAM at or more programs
Multitasking refers to the same time concurrently

an operating
Multiprogramming is a prerequisite for multitasking system
Second -
First - generation generation
UNIVAC Computer belongs to the computers. computers.
Timesharing is the same as multitasking multiprogramming
Name the first Indian Super Computer? Vishwajeet Deep Blue

Disk fragmentation is caused by wear caused by overuse

The technology which is used to check answer


sheets of multiple-choice questions in civil Bar code Reader Optical Mark
services or similar examinations is: - Technology Reader Technology

slower than an
A compiler is a fast interpreter interpreter
Which printer among the following is fastest Drum Printer Dot - Matrix Printer
“Zipping” a file means encrypting it decrypting it
Very important Vital information
reader user resource under
What does acronym VIRUS stands for sequence siege
Electrically charged
An impact printer creates characters by using...? ink Thermal Paper
mainframe
A client-server system is based on technology LAN technology
A nanosecond is 10-6 sec 10-3 sec
A procedural control used to minimize the
possibility of data or program file destruction
through operator error is the use of Limit checks Control figures
_______ software enables users to send and
receive data to/from remote computers application system
A _____ is a running instance of an application project model
Splitting of CPU's time for different tasks
_______ prevents time slicing multiprocessing multithreading
______ computers are used in large organizations
for large scale jobs which have large storage
capacities mainframes super computers
_______ is responsible for all calculations and
logical operations that have to be performed on arithmetic and
the data control unit logic unit
______ printer use laser light band printer drum printer
______ software enhances the user to enter
,store, manipulate and print any text data management word processing
______ software enables users to send and communication
receive data to/from remote computers integrated software software
_______ is the temporary storage place for
deleted files my computer recycle bin
_____ is a collection of related fields field file
_____ language consists of strings of binary
numbers
______ symbol is used to represent processes assembly language machine language
like assigning a value to a variable or adding a
number terminator symbol processed symbol

_______ is an example for micro computer PC-at hp vectra system


_________capability supports concurrent users
doing different tasks multiprocessing multithreading
The ______ do not have processing power of
their own and has only a screen, keyboard and
the necessary hardware to communicate with
the host. For this reason, the terminals are
referred as_______________ "dumb terminals" dumb servers
A______is nothing but a PC with a network distributed
operating system wan computing system
_____system is responsible for handling the
screen and user I/O processing host server
The______ handles data processing and disk
access in a Client/Server architecture host server
Both the DBMS and the application resides on
the same
When component
all the in ais____system
processing done by the PC LAN
mainframe itself, the type of processing is
sometimes called as server processing host processing
DBMS models can be grouped under____
categories four one
______is the most advantageous database file management hierarchical
system system database system
A new user initiates a new process of execution
at the background,while the user can continue
his query process as usual in the foreground.
This situation is referred to as ______ multiprocessing multithreading
The process of data being automatically written
to a duplicate database is called______ repairing redo logging
Modulation/Demod
Modem stands for __________ . Code/De-code ulation
Multiple changes to the same record or a field
are prevented by the DBMS through______ fixes locks
_________allows an application to multitask
within itself multiprocessing multithreading
Linear area Local area
LAN stands for __________ . networks networks
New process of execution is referred to as______ task process
Integrated
Integrated system Symbolic Digital
ISDN stands for _______. dynamic networks. networks.
_____________ is the Worlds largest computer
network . Ethernet Internet
_______is/are a popular front end tool visual basic power builder
When LAN connected together ,it is called
__________ . MAN WAN
Transfer
Transfer control communication
protocol/Internet protocol/Internet
TCP/IP stands for _________ . protocol protocol
Data is broken into small unit called __________ . Cells Bits
Software Mail
System modulation transmission
SMTP stands for __________ . transfer protocol protocol
The __________ protocol is a network protocol to Transmission
be built for the World Wide Web . Transfer Protocol protocol
Aggregate transfer Asynchronous
ATM stands forwhich
The computer __________ .
can receive data from mode transfer mode
other computers on the network and print it is
_______ File server Printer server
The hardware and the software requirements
together form the_____ platform configuration
ATM, Asynchronous transfer mode is a
__________ technology. MAN and WAN LAN and WAN
__________ is designed telephone system ISDN ATM

Internal Services Internal Services


Expansion of ISDN is ________ Digital Network Design Network
Web based
Expansion of WBT is ______________ Web based Training Technology
_________ connects LANs. Bridges Routers
Collection of instruction is called a _____ procedure batch
Combination of alphabetic and numeric data is
called _____ data alpha numeric alpha beta
space occupied,
Computers can be classified based on price, no. of users cost, performance
______,______and _______ allowed their ratio
_________ are used in large organizations for
large scale jobs mini computers microprocessors
_______ is responsible for feeding data into the
computer input output
_______ is the capability of the o/s to run
numerous applications simultaneously multiprocessing multithreading
_______ involves conversion of raw data into
some meaningful information interpreter compiler
_______ is responsible for obtaining the
processed data from the computer input processor
_______ printers use light to produce the dots
needed to form pages of characters impact printers drum
controlprinters
program,
operating system, interpreter,
Hardware components in a computer are bootstrap, kernel, assembler,
_____,____,_____,______ shell compiler
_______ software are programs that are complex application
and can be developed or purchased operating system software
_______ is a set of special instructions used to
communicate effectively with the computer batch protocols
_______ converts a high level language into
machine language processor compiler
_______ translates assembly language program
into machine language instructions compiler interpreter
C D ANS

CTRL+F1 None of the above A

Tally INI None of the above A

CTRL+F3 None of the above B

A or B None of the above C


Four Five B

Alt+Ctrl+C None of the above B

& ^ A
Accounts Puchasing,
payable and Receiving and
Receiving Accounts payable D

A or B Mone of the above A

Ratio Analysis All of the above D

Four One A

Ctrl+T Ctrl+D B
Display
Information All of the above D

F6 F7 C
Shift+P None of the above A

Day Book Journal Book B

Sub None of the above B

A
Electronic Data
Interchange. All of the above C

A
4 5 C

Field All of the above B


B

Change Period None of the above B

Journals None of the above B


Real None of the above B
None All of the above D
Journal Book All of the above A
Physical Stock
Transfer Reversing Journal B

Issue None of the above A

18 21 B

electronic data
analysis All of the above B

F6 Alt+f5 B
Primary Cost
Category All of the above C

Vouchers None of the above C

10 to 60 None A

Order All of the above A

Information None of the above C

Ctrl+f2 Ctrl+f4 A
A and B None of the above C
A

F7 function key None of the above A

A or B None of the above B


1-4-1997 to 31-
3-1998 None of the above B

A or B None of the above C

Cash and profit


& loss Cash and bank C
A or b None of the above B

Cost category None of the above A

F8 F9 C

A and B None of the above C

a or b None of the above A

Regional setting None of the above A

Balance Sheet None of the above B

F10 F11 B

Both A and B None of the above C


4 1 B

F11 F12 A

Budget None C

Alt+F3 None of the above C

A
Symbol None of them B
A or b None A

Stock analysis None of the above A


In 'comp info ->
security control'
option None B

A
28 16 C
Sub-Groups B or C A
Data Entry TallyVault A

Both A and B None of the above C

Cash receipts. Payroll transactions. A


Will be more
efficient at Eliminates the need
producing to reconcile control
financial accounts and
statements. subsidiary ledgers. C
the address of an instruction that
a memory has been transferred
location from memory C

Capacity
Planning Exception reporting C

RAM AGP Card B

Control totals for


one or more End-of-file and end-
fields
Storing of-reel code B
information on
the hard disk None of above B
Visual audio
board None of above C
File protection
ring Limited access files C

Pixies None of above B

Reel Number Batch Total D


Pointing device None of above A

Console Log Data Dictionary B


An inked
ribbon and
print head None of above C
Require user Make duplicate
passwords copies of files A
Eraser None of above C
A ribbon A cassette A
Centralised
function for PC Distributed policies
Disposition or procedures A
A ribbon None of above A
An INK RIBBON None of above C
Storage
capacity None of above C
Read and Write None of above B

Floppy disk None of above A


A parallel access
medium None of above A

700MB None of above B


Magnetic tape
storage None of above C
Magnetic tape
storage None of above A
In a drawer None of above C

CDROM chips None of above B

DRAM chips None of above B

Logic bus None of above A

Control unit None of above B

8 bits None of above B

CACHE None of above A


Business
software and
games software None of the above B
Mainframe
computer
Jon Von None of above B
Neumann
computers None of above B
Hoover
generation None of above A
Fourth
generation None of above C
Fifth
generation None of above C
Fifth generation None of above B

Fifth generation None of above A

Analysis, System
Design, and
Implementation None of above A
JCL none the above A

A
to obtain a
record layout extract data from file A

all the above none of the above A

absence of audit
trails all the above D

unique approach none of the above B


checks and
controls all the above D

all the above none of these A

use of any
programs none of the above D

A
conceptual/physi
cal all of them D
A

A
enable multiple
user resource
sharing all the above D

all the above none of these A

B
model base all the above D

B
report files none of the above D

file manager filepet C

all the above none of the above A

deletion addition B

A
software and
database safety and database B

B
basis none of the above B
A

Benjamin none of the above B

B
random
placement of
component none of the above D

A
none of the
above all the above A
none of the
above all the above A
A
A

B
interactive data
innumerable
analysis none of the above B

big-bang stub C
hybrid tests all the above D

re-perform B
procedures
carried out by
the clients
programs all the above D

none of these all the above A

all the above none of the above A

A
B

none of these all the above A

A
A
can provide the
auditors with
useful
information with
trend s and
patterns all of the above D

A
examination of
source code of
a program with
advice to
following the
logic of a
program none of the above C
ALC ACLL B

A
analyzing the
picture of a file
or data all the above A

A
none of the
above all the above A
identifying non-
standard code all the above D

A
resource
requested all the above D

all the above none of the above A


A

master list of administered


transactions questionnaire A
prepared by an
outside
programmer
engaged by the
auditor all the above D

A
stratification and
frequency
analysis all the above D

examining the
quality of data all the above D
Can aid in simple Can define the
selection audit objectives D
High End CAATs
A special All of the above D
purpose written
program None of the above A
Compliance tests
of general EDP
controls All of the above D
General
Event Procedures Procedures D

primary number auto number D


A

procedures none of the above B

chart macros D
comments action D
expression
builder expression elements C
expression
elements list
box none of the above C

insert none of the above A

auto report embedded C

datasheet justified B

embedded report new report D


dynamic and
static none of the above A

chart insert chart C

foreign key none of the above C


mail wizard none of the above A

page header report header D

group footer none of the above B


for specifying
conditions with
group by
clause none of the above C

macro names none of the above C


forms macros D

insert delete B

module none of the above C

A
RAID none of the above A
message none of the above B

CME none of the above A

on line editing none of the above A

OLE server OLE communicator C


connected edited A
BMP html D
publish to web
query wizard wizard D

dynamic file none of the above B

insert data definition D

pesos yen A

command button list box B

link create icon A

save as html none of the above C

end none of the above B

procedure none of the above C


front end language A

database data storage C


new database
dialog box database dialog box A

235 63500 A

number automatic field B


B

explicit join none of the above A

candidate key no duplicate key A


cascade
update related change all related
fields records C

both a and b none of the above B


record or
records none of the above C

B
Dynaset field
properties properties B

select queries update queries A


change/delete
queries update queries A

no match join outer join D


A
form wizard
dialog both 1 and 3 D

append simple D

form properties new properties B

new form child form B

Form Operations None of the above B

hierarchical form one to many form B

sorting querying C

pipes gateways A

filter by menu None of the above A

@ ? D
B

data less control data control B

controls group record group B

collection none of the above A

controlled all of the above C

DATE() DAY() C
combo box static text B

tabular form main form A

filter by form none of the above C


option control
wizard tool wizard C

two of the above none of the above B


B

table ledger A
module none of the above A
bitmap report A

25,000 64,000 D

form all of the above D

report hyperlink D

Tools none of the above C

1 B

candidate keys primary key C


A
B

A
B

zero none of the above B

B
both 1 and 2 none of the above C

A
B
delete query append query B

B
A

self join table join C

B
A
B
stand alone sub chart D

B
B

B
A
primary key
field none of the above C
attributes entities D

append add A

A
B

stand alone sub chart B

use datasheet in
forms use export D

B
B

A
A

? * D

A
group topic C
A

A
B

range logical C
B
event -
procedural
based
language none of the above C

query table B
B

session detail D

both a and b none of the above B

A
inner form none of the above A

labels report B

index identifier B

form none of the above A

sorts forms A
unbound none of the above C

button option button B


A

record source none of the above C


data sheet form none of the above A
columnar form none of the above A

unbound none of the above A


bound static C

tabular form columnar form B

relationships none of the above C


option button,
list, check and toggle button and
combo boxes check boxes D

filter by record filter by input D

macro table B

field layout B

field names record grab D


An organised
way of storing
information
about a set of A way of maintaining
similar things a log C
A document
which contains
text A collection of files B
Relational
DBMS Reliable DBMS C
is related to uses tape as
data mining opposed to disk C
Computer Database access
matching controls D
An organised
way of storing
information
about a set of
similar things None of the above C
A document
which contains
text None of the above B
A tool which
allows text and
graphics to be
placed in
documents None of the above A

Using queries None of the above C


Word
processors,
spreadsheets,
databases, DTP None of the above C
PRIMARY KEY
and UNIQUE
constraints IDENTITY columns C

ALTER TABLE UPDATE TABLE C


Relational
DBMS Reliable DBMS C
is related to uses tape as
data mining opposed to disk C

Component Source D
keeping the
original paper saving the file with
copy different filenames A

mail merge e-mail C

browser e-mail A

wildcards engines C

AutoNumber Auto Key C


forms in a
database are reports are
consistent with consistent with the
the underlying underlying tables or
tables or queries. queries. B
query and its
associated report and its related
dynaset. query. A

a field from an not a primary key of


unrelated table. either related table. B

Many-to-many Many-to-one B
EmployeeLastNa
me CompanyAddress A
The one-to-many
The join line relationship B

Select Undo in Click the Delete


the Relationships Relationships button
pull-down menu on the toolbar B

That there are That records can be


records in a added by clicking on
related table the plus sign C
They cannot be
AutoNumber They must be the
data types same data type D
The customer’s
ID is deleted
from the
Customers table,
and all the
related loans are
deleted from the An error message
Loans table. is displayed. D
The subform is an
object on the form
The subform is and can be moved
displayed in or sized like any
Form view. other object. D
A one-to-many
relationship
between A many-to-many
coaches and relationship between
teams players and teams C

¥ * C

The Loans
table at any
time Neither table C
title bar text, title bar text, icon,
prompt, icon. prompt. B

CreateList. Sub. B
A drop-down
list enables the
user to choose
from one of
several A drop-down list
existing enables the user to
entries. enter text. C
does not have must be set for two
to be set. words. C
create tables of maintain data on
rows and different things in
columns. different tables. A
metadata. all of the above D
information. a and b D
e-commerce
database
application a or b A
e-commerce
database
application None of above B
Structured
Query
Language Relational Question
(SQL) Language (RQL) C

Data Business Relational Model


Model System Manager B

Oracle a and b D
The database
management
system (DBMS) All of the above. D

None of above All of above A

creates reports b and c D


the database
management
system (DBMS) the database B
it contains a
description of
its own
structure All of the above. C

holds indexes All of the above. D


stored
procedures All of the above. D
as a redesign of
an existing
database a and b A

as a redesign of
an existing
database a and b B
as a redesign
of an existing
database a and b C
entity-relationship
data models data modeling A

entity-relationship
data models data modeling B

entity-relationship
data models data modeling D

entity-
relationship data
modeling data migration D
relational data
network models model A
the order of more than one
the rows is column can use the
unimportant same name C

row field D

key tuple C

composite key foreign key C

foreign key candidate key D

foreign key surrogate key B


Deletion
anomaly All of above D

create one or move the data into


more new tables the new database A

have poor are not true DBMS


response time products B

Nonintegrated
data None of the above A

nonintegrated a "wrong format"


data problem B
nonintegrated a "wrong format"
data problem D
data
warehouse
data are often
denormalized. b and c C

Report Query A

Macros Spreadsheets D
Regardless of how
the objects and
tables are stored,
It is advisable to the user will have to
put each object reenter the data in
and table into a the tables when the
separate application is
database. upgraded. B
An application can
All objects in be created in such a
an application, way that it objects
including the such as forms and
tables, must reports can be
reside within changed without
the same disturbing the
database. existing data. C

Merge Join A
It contains a
user interface,
or switchboard It contains macros C
Interface Design Switchboard
Wizard Manager D
put key
business
information
into the hands
or more store all corporate
decision transaction data in
makers. one single location. C

Digital
Signature None of the above C

Digital Certificate Private Key A

Hash Result Either B or C D


Both A and B Either A or B C

Institutional
Overhead None of the above A
Certificate
Authority None of the above A

B
Personal Digital
Certificate None of the above A
Personal
Digital
certificate None of the above C

Public Key none of the above B


Evidence,
Ceremony,
Efficiency and Approval,
logistics, Efficiency and
Evidence Logistics D

certificate A
Revocation
Letter None Of The Above A

Private Key,
Recipient None Of The Above A

Transmission
File None of the above C

UNESCO UN/EDIFACT D

functions functional groups D

SET None of the above A

Smart Cards Electronic cheques D


Online Catalog and
Broadcast and Customer
Junk Mail Endorsements C

EFT All of the above D

B
Public Key and Public Key and
Password Private Key D
Satellite Area
Network None of the above B
Glow sign or
hoarding
strategies All of the above D

Billboard Endorsements A

Direct-mail Junk mail D

Billboard Broadcast C
Low cost of
operation Quality management B
Industrial
espionage Economic espionage C

A competitor’s new
Research data project B
e-commerce
database
application None of above C
Including the Using all capital
Subject letters D

Encryption
performed by a
physically Security at the
secure transaction phase in
hardware EDI systems is not
device is more necessary because
secure than problems at that
encryption level will be
performed by identified by the
software. service provider. C

tip wizard function wizard A

column reference none of the above A


quattropro or
xbase files class files D

range values reference values D

=currentdate() none of the above A

# sign none of the above A

function wizard none of the above C

parameters none of the above B

numeric Boolean D

merge none of the above A

pmt count A
convert text to
columns wizard tip wizard B

countif none of the above B

sumif countif C

print none of the above A


none of the
above A

shading none of the above B

print print preview B

sorting none of the above A

all blanks none A

m none of the above B

FTP none of the above B


intermediate
network none of the above B

physical layer session layer D

ftp service none of the above A

ARCHIE none of the above C


unlimited restore
locator none of the above A

scheme none of the above C


command line none of the above C
sears general electric C

browser editor B
search for
database none of the above C
wincim or
maccim none of the above C

cyberspace none of the above B

excite none of the above B

web server none of the above A


image list none of the above C
one many B

top middle and lower D

index glossary C
menu
search,item item search,index
search search C
lycos all the above D

lynx all the above C


Lycos navigator gold 2.0 C
IBM CompuServe D

ftp telnet D
Hyper text
transfer Hyper text transfer
protocol port C

uucp none of the above b

telnet none of the above C


transfer
communication
protocol/internet
protocol none of the above B

three none of the above C

web servers none of the above B


the internet
access none of the above A

site organization B
higher type
transfer protocol none of the above B
uniform resource
label name of the above B
frantically asked
question none of the above B

IP,UDP none of the above A

request close A
world search for
information and
research council none of the above B
mosaic,gopher none of the above B

interface none of the above B

hotwords none of the above B

verification on
network
integration and
communication none of the above A

university of
California net none of the above B

dns none of the above A

telnet and ftp none of the above A

wais,winsocks none of the above B


winsock none of the above B
hyper text
markup
language none of the above C

books marks none of the above B

animation none of the above B


animation,scripts
,executables none of the above A

welcome page none of the above B


grand network
news none of the above B
search engines none of the above B

yahoo and
altavista none of the above B

ftp archive D

all the above none of the above D

Delphi fidonet A

bookstores none the above A

more information galenet A


database channel B

Graphical Graphical Interface


interface format format B
Joint pictures Joint pictures
expert graph experimental group A
net browsers C
eudora,netsca
pe and pine none of the above C
network
connections mails B

FCOLOR FONTCOLOR B
Communication
graphical Common Gateway
interface Interface D

Communication Connection B

Client None of the above B

Web Channel A
United relay
limited None of the above B
text or image image C
SGML CGI C
metalanguage none of the above C
pancake is not
edible none of the above B

SGML Parser SGML Composer C


applets documents A
Internet
Engineering
Task Force None of the above C
MS Internet
Explorer and
Netscape
Navigator None of the above C

symbols video C

hotword hotlink B
in user-defined
order none of the above B

home none of the above C

.gif and .jpeg .wmf and .bmp C

service,port and service,hostname


directory path and port B
mailing
lists,mail
server robots
and gateways
to other
services none of the above C

<hr size=n> <l1 type=shape> D

classified general
instructions none of the above B

Browser User A
intranet none of the above B

wan none of the above B


packets none of the above A
email,file
retrived,intern
et tools none of the above C
communicator,ie,
lynx,winsock all of the above B
ARPANET none of the above B
defensive
advanced
research
projects
administration
net none of the above C
first none of the above B
intranet,extran
et none of the above A
cooking and
dining none of the above A

Hyper transfer Hyper text


meta language markup Language D
united states &
Russia none of the above B

network none of the above C

servers none of the above C


network
redirectors none of the above B
data target
equipment none of the above B

network layer none of the above B

smart network
and dumb
network none of the above B
file transfer none of the above B

LAN,WAN,MAN none of the above C


TAN none of t he above B
WAN none of the above C
non-digital none of the above B
Document type
definition Document type data C
Manipulate/dema
nipulate none of the above B

Manipulation none of the above B

Cable and wires none of the above B


Serial line
protocol none of the above C
Pillar to pillar
protocol none of the above B
receiving information
storing data on from a host
the hard drive computer B

Size Channel A
Browse Retrieve C

Either A or B Neither A nor B B

Both A and B Both B and A C

Electronic Fund
Transfers All The Above D

Formal Legal
Requirements,
Open System Open System D

Signer
authentication None of the above A

Both A and B Neither A nor B C

Digital certificate Private Key A

Either A or B Neither A nor B. A

Private Key None of the above A

Both A and B Either A or B C

Both A and B Either A or B A

Both A and B Either A or B B

Encryption Cryptography C
Conducting Reviewing the
fraud-awareness systems-access
training. by the
Received log. D
intended Sent to the correct
recipient. address. A
The private key
is used by the
sender for The private key is
encryption but used by the receiver
not by the for decryption but
receiver for not by the sender for
decryption. encryption. A
Failure of server
duplicating Firewall
function. vulnerability. D
Backend-to- Business- to-
Business Billboard A

Endorsements Broadcast B

Catalog Broadcast A

.COM Domains A
Search and
discovery None of the above C

Pre-purchase Search and


preparation discovery A
Endorsement
model of
marketing None of the above B

Billboard Pulling cart B


EDI For
Administration,
Commerce and
Transport None of the above C

EFT Gateway D

Assembler EDI D

Consumer-to- Customer-to-
Business Company B
Euro Cash Endorsed Cash B
Service
Perspective None of the above C

TT(Tiny token) E-token A

Encryption Subscription C
3 4 B

index table pivot table D


convert text to
columns wizard tip wizard D
legend data marker A
legend data marker B

legend data marker C

legend data marker D

pie chart surface chart C


pie chart surface chart B

pie chart surface chart D


pie chart surface chart A
symbols none of the above A

Netscape word 2000 A


convert text to
columns wizard tip wizard A

stock chart pie chart C

Multi-dimensions A

B
It is often used to It is also used for
display share indicating
market prices fluctuations in
over a period of temperature
time changes B

Solver Data table. C

Pivot table Data table. A

Solver Data table. D

Spreadsheet none of the above A

Performing text
formatting. All of the above D
Source table
name. Pivot table item. C
N B

Multi-dimensions A

It can be
represented in 3-
dimensions B

Solver Data table C

Pivot table Data table A

SumIf A
tables worksheets D
It summarizes
the data by using
analytical
functions. A

solver Pivot table D

tip wizard function wizard B

tables database A

modal window C

No border A blinking border A

2,2,2 6,8,10 D
the column is
too narrow to
show all the
digits of the
number either b or c C
flexibility of cost of initial set-
moving entries up D

database spreadsheet D

Gap Rows A
Drawing pictures Document filing A

click the
column click the column
heading label C

TAB INSERT A

constant. formula. B

#VALUE! Tom McKenzie. C


Numeric
constants Text constants D

* \ D
It is impossible to
D4^2 determine. C

SUM(H9:H11) G7*SUM(H9:H11) B
The phrase “active
It is displayed in cell” appears in the
reverse video. Status bar. A
By either
clicking in a
different cell or
using the By typing the
arrow keys to reference of the cell
move to a you want to move to
different cell in the formula bar C
The Cell Format The Font Size
command on the command on the
Edit menu Tools menu. B
the Save As the File Type
command on command on the File
the File menu. menu. C

View Window A

List Properties B
Both Insert and
Delete Clear C
Both Clear and
Delete Remove B

Fonts Margins C

View Edit B

group. cell group. B


D12:G25 D C

clipboard. source range. D

clipboard. source range. B


The Paste Both the Copy and
command Paste commands D

mixed constant A

B$4 $B$4 D

#DIV/0! #DIV/0! B
#DIV/0! #DIV/0! C
The Paste Both the Cut and
command
cycle through Paste commands D
absolute,
relative, and
mixed cell cycle through
references. open applications. C
the Formatting Conditional
toolbar formatting B
Right-click a cell
and click the Edit Double-click a cell
Hyperlink and click the Insert
command. Hyperlink command. B
whether the cell
has an absolute
or a relative cell the value in the
reference. cell D

text with either a


two-digit or four-digit
year, depending on
an integer. the format. C

It is impossible to
determine from the
29/03/2008 information given. B
subtracting the
later date from adding the later date
the earlier one. to the earlier one. A

the Esc key. the F1 key. B


Either 3/4 or .75,
March 4 of the depending on the
current year cell formatting C
either a cell on a
worksheet or a
a constant. variable. D

B1;G10 B1:G10 D

MAX SUM C

Pie Scatter C
Once a pie chart
has been chosen Once a line chart
it cannot be has been chosen it
changed to line can be changed to
chart. a pie chart. D

hold down the hold down CTRL +


ALT key SHIFT A

Transfer
information to a Use multiple
database sheets D

Fill Right Paste Special B

Edit | Data | Sort none of the choices B


Create forms None of the above C
select Print
selection on select Print
 Page Setup  | selection in the
 Sheet  and then Print dialog and
print then print D
drawing pictures None of the above A

#VALUE! =(B2*(D4+C2) C

REF! None of the above B


whatever was
last used vertical A
A0 None of the above C

CARN NET A
newsgroups and
search engines none of the above B
application
servers,proxy
servers and web
servers none of the above B
bulletin
broadcasting
system none of the above A
very small none of the above B
windows stocks none of the above B

PINE Lynx A

built-in none of the above B


Cryptography Message Digest C

Hash Function Formula A

Name Address B

Cryptography Password Cracker A

Address Protocols D

Unauthorising Approving A
Exposure Hacking B

Judge of a civil Police officer of IPS


court rank. B
Virus Cracker C
Charles Bubbage Howard Aiken A
Dell .com Msn .com B
Asynchronous
Transmission
mode None of above C

Address Protocols C
Port Pin B

CAN PAN A
hypertext
transfer hypertext tracing
protocol protocol C
New Information
Card None of the above B
Only printers None of the above D

Switches data
from incoming
ports to outgoing
ports. All of Above B
Bridges and
Hubs Hubs and nodes B
Packets None of the above C

router virus checker A


Four None of the above C
Network Layer All of the above D

Fiber Twisted pair B


A memory
address None of the above B

Router None of the above B


It continue on to
target device
with corrupt data None of the above B
Ultra violet
technology None of the above A

Network Layer All of the above D

Octal None of the above A


48 KB 48 MB A
software that a gateway calling
allows file program for internet
copying bridging B

Server Network PC C
If the hub goes
down, it brings If the hub goes
down all of the down, it brings down
nodes on that all of the nodes on
section all of the rings B

Both A and B None of the above B


Ring All of above D
Both A and B None A
Linear Both A and B B

Star Mesh C

Star Mesh B

Linear Ring C

Star Mesh A

Physical Layer Data Link Layer D


Ethernet, Ethernet, token ring,
DecNET, FDDI ARCnet B
mbps mips B
Mbps Mips C

depend on the
transmission limited by modem
medium speeds C

Windows 95 Netscape B
must have a LAN
account All of the above A
common
gateway application protocol
interface interface C
interfaces a connects a
modem to a computer to a
computer network D
Windows
package Netscape B

Windows NT None of the above C

the Internet none of the previous A


use appropriate
must have a LAN communications
account software A
none of the
bridge previous D
is a CPU
functional unit make of processor A
is a protocol for
the transfer of
is part of files between
Netscape computers D

is part of
Netscape None of the above D

a screen saver none of the


program previous D
a poor file server none D

browser none of the previous C

clip-art file search engine D


is a CPU
functional unit make of processor A
is a protocol for
the transfer of
is part of files between
Netscape computers D
is a protocol that
is part of allows for remote
Netscape login D
Any layer can
communicate
only with the Any layer can
layer directly communicate only
above or below with the layer above
it. it. C

It works the Individual computers


same way as a can connect to it
local network. using an ISP. A

Denial of
Service Port sniffing C

a screen saver none of the


program
Virus that previous D
initiates a ping
flood UDP flood A

flood traffic C

switch hub B
a poor file server none of the above D

Backup data on Limit logging on


a daily basis access C
Only large name-
recognizable ActiveX-enabled
sites are safe. sites are safe. B
Use of logical Use of encryption
access methods methods D
by attaching by scanning the
itself to a computer for a
document. connection. B
Application
Web traffic updates D

A worm Spyware D

Multiplexors LAN B
cookies and key loggers and
key loggers. worms. C
Changing the
Giving out content of a Web
disinformation page D
Disruption in All of the above
supply lines are correct. D
Shutdown of
Contaminating nuclear plant
water systems safety systems D
To obtain an
accurate inventory
of network related
To improve equipment and
system response parts and network
time
stop its nodes D
competitors update its prices
seeing their as soon as they
prices are changed D
USA People
Search Lycos Search B

Personal assets Criminal records A

Adware Spyware
make large B
amounts of money
by parking funds
purchase off- in their bank
shore property. account. D

Siphoning Hoaxing B

virtual stalking. Web stalking. B

spam. viruses. B
Use a proxy Use anti-spyware
server. software. B
Message
sequence Logical access
number checking controls B

Both I & II Neither I or II C

www telnet C
Increases boot Misleads a program
up time recompilation B
both HTML and
Microsoft Excel Internet Explorer B
round trip HTML
document. Web browser. B

.con is used for


companies None of the above A

HTML. one way HTML. C

DHTML. MHTML D
clicking a
hyperlink that
references a
document that is viewing an Excel
stored in the worksheet that you
floppy drive on have saved as a Web
your computer page. B
Go to the
History page
and look for Go to the Bookmarks
the site or Favorites page C
the Update the External Data
command command A

Sound Video C

JPEG TIFF C
Add it to Cut and paste it to a
‘Favourites’ or word processor
‘Bookmarks’. document. C
privileged
network. network topology A

a footer. an encryption. B

IPP PoIP A
Desktop server, Desktop server,
application, and software, and
database. hardware. A
Telephone line None of the above B
File Transfer
Protocol None of the above C

So email is
delivered faster None of the above A

143.215.12.19 None of the above D

paul.domain.uk None of the above B


No-one None of the above C
Internet Remote
Conversations
A letter will be None of the above A
sent to you in
the post None of the above A
Hyper Text
Mark-up
Language None of the above C

High volumes
of email None of the above C

slide view &


outline view none of the above B

squares icons C

grid guide C

auto shapes all the above B

fonts & images none the above A


.video file all the above B

movelast,false eof,true D

toolbox project explorer D

movefirst,false bof,true D

number() val() D

square oval D

forecolor none of the above C


textunderline,tru
e none of the above B
foresize
one- fontsize D
thousandth of one-ten thousandth
a second of a second C

itemcount listcount D

project explorer toolbox B

vbmsgboxstyle none of the above C

label inputbox() D

dbopensnapshot dbopendynaset D

unload initialze C

transparent graphical D

green black B

blue white D
project explorer
toolbox window D
project explorer
toolbox window A

text gotfocus D
container none of the above C

initialize activate D

caption none of the above C

openrecordset none of the above B

value style C

var none of the above B

.ctr .ocx B
Check Audit A
On Error Resume
On Error Stop Next D

Refresh Resize A
UnloadMode UnloadMode
parameter to a parameter to a zero
non-zero value value A

3 None of the above D


Consists of
Various Forms
And Code Consists of
Modules several Projects D

Class module,
code module None of the above A
Place code in the
Deactivate event None of the above B

Refresh PaintPicture A
Msgbox Msgbox
error.number & error.number &
error.text error.description D
To provide a
repository for
To allow the images used by
editing of icons other controls D

GetFile GetBytes A

GetProperty Value B
Windows
explorer Input box D

Multi-Line Font C
KeyUp and KeyPress, KeyUp
KeyDown and KeyDown D

Input Mode Output mode B

ScaleHeight and
ScaleTop x and y A

Property Let Property Set C


ZOrder
property AutoRedraw property C

Value CurrentVal B

SetAttr CStr A
Are actually not
properties None of the above B

MyVar has not


been declared None of the above C
The
ExecProcedure
method None of the above D
An exclamation
icon None of the above B
intrinsic
constant. built-in procedure. C
InputBox
function can be
created with the MsgBox statement
macro recorder, can be created with
while the MsgBox the macro recorder,
statement while the InputBox
cannot. function cannot. B

Data can be A new check box can


entered. be added. C

Deactivate Terminate C

cutting tool scribble drawing tool A

color scheme color guide C


primary color
color palette scheme A

18 36 C

pie linear A
slides slide sorter views C

doughnut all the above A

data stream B

auto shapes track changes A


the chart
window opens
displaying a
chart template none of the above C
custom standard drawing
drawing tools tools C
used to create
a manager box used to store the
for an existing other tools of the
box organizational chart C
not available in available in the tool
the tool bar bar B
thrice any of the above C

five eight B

standard tool all the above B

slide view none of these B

preview none of the above B

copying moving B

clip art drawing tools A


.html(hypertext
.doc(document) format) B
six twelve C

.txt(plain text) .doc(document) B

displayed only in
outline view none of the above A

both a and b transition D

slide show view show A


master slide master notes A
view show slide sorter view C

7.5 inches,5
inches none the above B

a or b none of the above A


transition b or c A

png none of the above D

action button all the above D


Microsoft visual
interdev all the above B

templates add-ins A
when the slide
show is run none of the above C

header files all the above A

both a and b none of the above B

properties pane outline pane D

paint shop pro power point 2000 D

contains sample
presentations for provides
a variety of suggested content
topics and design D
user can insert
picture to the user can insert
master slide picture to the title
which gets slide which gets
reflected in all reflected in all the
the slides using slides using that title
that master slide slide B
in notes pages
view, drag the I slide view, drag the
slide icon to a slide icon to a new
new location location C

the slide that


holds the
design templates formatted
is the template placeholders for
whose format the title and sub-
and color title for the
scheme user presentation is
applies to a called a title
presentation template D

user should
select the slide the slides can be
view to add the reordered in the
text to the slide outline view B
the slide that
holds the
design template formatted
is the template placeholders for
whose format the title and
and color subtitle for the
scheme user presentation is
applies to a called a title
presentation template D

new slide set up show B

user can add data


data is plotted in labels and gridlines
a chart window to the chart B

the header slide the format slide B

grammar
checker none of the above B

102 22 B

three four times B


CD-ROM, digital text, hypertext,
camera and Power Point, video
sound. and sound.
Line style, Line D
color, text font,
the Font and the and text
text alignment alignment D
Fill color, Line
color, and Line
Line thickness
Microsoft thickness D
Graph is
started so that The graph
you can create placeholder is
a graph. deleted. C

taken from the


first column or
row of data in
the datasheet,
depending on
whether the
data series are
in rows or
columns. entered by the user. C
Pie chart Line chart B

Pull down the


Insert menu and
select Chart, click
the Insert Chart
button on the
Standard toolbar,
Pull down the or pull down the
Insert menu and Insert menu and
select the select the
appropriate appropriate
Object. Object. D

You cannot display


Pull down the the underlying
Edit menu, then datasheet once the
select Object. slide is finished. B

Click outside Change to Slide


the chart. Sorter view. C

The datasheet
window is toggled
The datasheet is from closed to
saved as a open (or from
separate file. open to closed). D
The application that
The chart is created the chart is
doubled in size. started. A
The chart is Microsoft Graph
doubled in size. will restart. D
a slide one bullet
item at a time,
build bullet items
a letter at a time,
and build bullet
bullet items one items a word at a
word at a time. time. D
Subtle, Moderate,
Exciting or Exciting D
Both enter and
exit, and fly in Neither enter nor
from top or exit; neither fly in
bottom from top nor bottom C
Alt Ctrl B

Custom animation
can be used to
affect the way
objects appear on
a slide, to what
objects do after
they appear on a
slide, and to the
the way objects way objects exit a
exit a slide. slide. D

The advanced
timeline shows The advanced
the sequence timeline shows
in which neither the
objects will sequence in which
appear on the objects will appear
slide and the on the slide, nor the
duration of the duration of the effect
effect applied applied to each
to each object. object. C
Clips, organization
Text charts, and text D

Filtering program Animation program A


Fly in, From top,
Dissolve in and Dissolve in D
Data cannot be There is no such
entered into thing as a
Datasheet. Datasheet. B

OLST. OLIP. B

You cannot
change the style
of the connecting You cannot change
lines in an the color of the
Organization boxes in an
chart. Organization chart. B

[Alt+Z] [Ctrl+Z] D

.frm .frx B

loaditem none of the above B

addpicture none of the above B


File1.Path =
Dir1.Path none of the above B
msgbox() none of the above C
File1.Path = File1.pattern=Dir1.p
Dir1.Path ath C

recordcount count C

addnew additem C

additem addnew B

moveprevious movefirst C

UnloadMode UnloadMode
parameter to a parameter to a zero
non-zero value value A

Office 97 Back Office A

drag & drop none of the above A

select none of the above A


ctr+end and
ctr+home none of the above B
web layout, page
layout none of the above A
click from start
program,
MSWord from the
task menu none of the above A
document
assistant none of the above A

Icon Tip Document Tip A

ruler none of the above B


home and end up and down
keys only arrow D

decimal rotation D

dialogs/alerts none of the above B


both A and B none of the above C
design wizard pictures A

database forms A
0 11 A
print preview
from the file none of the above A

style box none of the above A

ctrl+f ctrl+m A
ctrl+f ctrl+m D

CTRL+SHIFT+S CTRL+SHIFT+P A

ctrl+shift+s ctrl+shift+p C

Both None of the above B

Limit Check Reasonableness D

A or B None of the above B


ODBC All of the above C
This involves
looking at a
system and
finding out
how
information is
being handled None of above C

Maintenance,
reliability, and
upgradeability None of above B
To maintain
security None of the above D
Transferred from the
Saved to the disk disk A
Users operate
the manual
system None of above B

Users continue
operating the old
system None of above A
User Guide and
technical
documentation None of above C
User guides
cover how to
run the
system, enter
data, save,
print, etc. None of above C
Database
systems and
backup services None of the above A

floppy disk Hard disk B


To help someone
who is applying
for employment None of the above B

Address bus Control Bus A


TED MAD B

Address bus
Data structures Control Bus D
that are part of
the kernel of an Shells, compilers
operating and other useful
system. system programs. D

decimal form alphanumeric form A


represented 256 represented 127
characters characters A
16 bits 32 bits A

230 bytes 1024 bytes A


a 32-bit bus or 32-
32 Mb of RAM bit registers D
is the first bit in is the last bit in a
a byte byte B

DRAM CROM A
bytes Hertz D
secondary secondary storage
storage capacity access time B
have medium use variable size
clock speeds instructions D

Variables Logic Bus A


Data is not saved
before computer
is shut down All of the above D
printer interface a modem interface B
ink-jet printer laser printer. D
stores more
information than is used for cache
RAM memory B
provides
backup power
in the event of
a power
is cut
an access none of the previous C
card for a
security contains a
system microprocessor C
SSGA displays none of the previous B
writing programs
in multiple
languages none of the previous A
writing programs
in multiple none of the
languages previous D

Variables Logic Bus B

CD-ROM e-mail D
to run more
than one
program at the
same time none of the above C
multiuser none of the previous C

PAGELAYOUT ONLINE DOCUMENT A

ctrl+end ctrl+home B

ctrl+x or ins ctrl+v or Del A

ctrl+1 none of the above B

AutoShape Border A
Page Layout none of the above A

Auto Shapes File A

WordArt Bullets D

remove clear all D


circle bullet
dialog box none dialog box A

AutoShapes files C

new document default document B

mail merge none of t he above A


shift+f8 tools+spelling menu A

first row last cell of the t able A

enter none of the above A


table auto format
option none of the above A

records none of the above B

style gallery none of the above A

Data Source none of the above B


vj++ visual FoxPro B

alt+f8 alt+f5 A

browser none of the above A


micro soft
outlook hotmail A

sgml vb script A

arpanet LAN A
field names in
the header
source must the number of fields
match any names in the header
merge fields source must be the
you've inserted same as the number
in the main of data fields in the
document data source B
by default cell
height and
weight option delete cells option
applies to all allows to delete the
the rows and entire row or a
columns of a column or shift cells
table up or shifts cells left C
justified top A
If a header is
inserted in the A section is a
second section portion of a
then the same document in which
header is certain page
applicable to the formatting option
first section can be set D

A
A

Double Click none of the above B


A
key accidentally
turned on reverses
the case of the
letters that were
automatically capitalized
corrects the incorrectly and then
grammatically turns off the caps
errors lock B

password can be
password are not upto 15 characters
case sensitive long B
hanging top A
a multiple an .xls data can not
documents files be inserted at
can be inserted specified position in
in the single the current
document document B

Hyperlink
Document none of the above A

Outline Layout none of the above B

Remove none of the above A

press the escape


key just keep typing D
height and width rows and columns D
backspace/
delete shift B

thesaurus outliner C

send private
messages to a send a package to
friend a friend D

Page setup Print preview B

Retrieve Save C
spacing sorting B

word processing spreadsheet C

Storing
information None of the above B

clip art clipboard C


Storing
information Making Calculations
Font, Paragraph, B
Cut, copy, Bullet and
paste and clear Numbering C
Text which
appear at the
top of every Designated area on
page the document C

Monitor,
keyboard and
mouse None of the above B

microphone digital scanner D


Cut, copy,
paste and clear None of the above C

15 point 25 point B

impossible to
3 inches. determine. B
Word cannot display
You have not columns during
specified editing; you will see
continuous them only when you
section breaks. print the document. A
to move a to leave an
section of text original section of
from the original text in place while
location to pasting a copy
another location elsewhere D
A set of different
graphics None of the above B

Grammar
Checker Find and Replace B

Select all AutoCorrect B

Delete, then
paste Insert, then paste A
To complicate
the revision
process and to
force the To allow multiple
author to people to work on
spend more one document in
time making collaboration with
corrections one another C
A vertical line
outside the left
margin signifies
a change has Comments are
been made at enclosed in a text
that point in the box at the right of
document. the document. D
Both through the
Through tools on Tools menu and
the Reviewing the Reviewing
toolbar toolbar D
The Versions
The Versions command will allow
command will you to save only two
allow you to save versions of a
only one version document: one
of a document version of the
without any original and one
changes that version of any
were just made changes made to the
to the document. document. A
The first and
second versions The previous version
are opened is opened
automatically. automatically. B

Spell
Word check
will show Thesaurus A
the name of the Word is not able to
person who tell the most recent
saved each version of a
version. document. A

Forms Insert C

Text fields
Comments can
A drop-down list B
be edited or
deleted by Comments can be
right clicking edited or deleted by
the highlighted left clicking the
text. highlighted text. C
Text which
appear at the
top of every
page None of the above C

Copy and paste. Insert page break. D

forms. numbers. C

find/search. macro. A
Format Painter This action is not
button possible. C

ss Debugging D

Format
the guidelines
Edit C
used to establish
where different an enlarged capital
elements of the letter at the
newsletter will beginning of a
go.
underlining the paragraph. A
text of the pull
quote. changing the color. A
A grid is a set of
A dropped cap is horizontal and
a word that vertical lines that
starts with a determine the
lowercase letter placement of
when it should elements in a
have a capital newsletter or other
letter. document. D
The tab spacing
The number of within each
columns column D

12 72 D

Three Four B

Press Enter to
create a Press Shift+Enter to
section break. force a line break. C
A serif font at 20 A sans serif font
points at 45 points D
It depends on the
left and right
margins, and how
many columns are
4 inches specified. D

Both None of the above A

A or B None of the Above A

Gaps All of the above C

Merge None of the above A

HLOOKUP() None of the above B

A or B None of the above C


testing All of the above D

Range Both B & C B

a form of VRAM none of the previous D


involves using more
than one processor
multiuser at the same time D
make a backup use a virus
copy protection program B
to display
to print sheets of information or
paper pictures on a screen B
uses C++ none of the previous. D
1012 sec 109 sec D

a frog a message pad B


an instruction that
the address of a has been transferred
memory location from memory. C
an instruction that
the address of a has been transferred
memory location from memory A
an instruction the address of the
that has been next instruction to
executed be executed D

a light pen a magic marker A

Program Data B

Artificial
Intelligence Parity Checker B
Range checking Validation B
use the backup
facility use find and replace A

System Modem B
keep a record of
computer backup to a secure
failures medium D
Multiprogrammin
g Multiplexing D

Floppy Disk Magnetic Disk B


Telephone
modem Shareware C

Telephone
modem Shareware A

Indexed Random C

CPU Primary Storage B


Schema and
Files and Tracks subschema A

File, record, field Element, field, file C

Systems logs Parity check C

MIDI interface Serial interface A

Sound Video D
Ink-jet Drum B
recording current
stock in a
presenting an supermarket and
order for stock to answering customer
a warehouse. queries. A
regularly updated once a year C

Graphics
package Spreadsheet D
retain
confidentiality of simplify file
files structures C
4096 8192 C
virus infection loss of data D

IPX/SPX NetBEUI A
printer can do the operating
1000s of pages a system is easy to
day use B
the root directory the hard drive D
uninterruptable
power supply
the system uniform page source C
requires a the system always
network requires a re-boot
administrator to and defrag
uninstall it afterwards A

information. text. A

Logical Steps in
any language None of the above A

It is mandatory
in tally None of the bove A
prevent
unauthorised
access allow encryption C
IT understands
the business None of the above B

processing. All of the above D


Software that
generates
innovated
designs and
artistic patterns. None of the above A

enterprise local B
identify the file identify the file type D
corrective All of the above are
controls. parts of IS controls. D
dynamic hashing extensible hashing A

C: (a), (b), (c) D: (b), (c), (d) C


controls general controls C

Settings Control B

(a) to (d) (a), (b), (c) C


Select the ‘Shut Pull the power cord
Down’ option from the back of the
from a menu. computer. C

Use the Find or Put your hand up


Search feature. and ask the teacher C

(a) to (d) (b), (c), (d) C


preventive
controls corrective controls C

(a) to (d) (b), (c), (d) C


program change resolution
requests procedures C
thread testing loop testing A

(a), (b), (c) (a) to (d) D


parallel
operations system walkthroughs B

Concentrator. Job control language. D

(a), (b), (c) (a), (c), (d) A


Physical security
of warehouse Cross-training of
facilities. operating personnel. B
procedural
design data design A
network Hub C
Mesh Ring A
Ring All of the above D

To help someone
who is applying To Store data in an
for employment organised manner B

Binary Indexed B

Operating
systems and Computer
compilers. operations. C
A direct access A direct access file
file on a disk
Information on a tape C
formats
commonly vary Data record can
between never be blocked
architectures together C
Address
calculation part Input output channel A

Wide area
network Protocol B

Are required with a


Generally require microprocessor
a keyboard for which permits some
data entry and a data processing such
CRT for display as input validation D

Time sharing
Multiplexor computer C

Packs data in a Speeds up online


disk file printing A

Loop Network Star Network D


Electronic
mailing Instant post-office C

A personal
computer A mainframe PC B

Parity checks All of them C


Communication Device interconnect
protocol standard D
A compiler is a
general purpose
language
providing very
efficient
execution None of the above B
Lexical analysis,
CONVERSION,
and code
generation None of the above D

ASCII
a general
EBCDIC A
purpose
language
providing very
efficient
execution None of the above A
Frequency
division Time Division
multiplexor Multiplexor C
Low-level
languages None of the above C

It is less prone to
attenuation
Accounting Uses only one path D
systems,
commercial
sector None of the above C
Relieve the main
CPU of repetitive Reduce competition
communication between the
tasks input/output devices C

Testing None of the above B

Common carrier Telephone Lines C


System Analysis
involves creating
a formal model
of the problem to
be solved None of the above C

A buffer An online protocol B


Hardware,
Software and
size of program. None of the above B

Ring Bus B

1010101 None of the above C


Cyclic
Redundancy Hash Count A
64 None of the above A

Multiplexor Acoustic coupler C


97 None of the above B
Data
management
systems All of them B
secondary secondary storage
storage capacity access time B

256 None of the above B

decimal form alphanumeric form A

5C4 None of the above A


16 bits 32 bits B

Bit Code Design None of the above D


210 bits 210 bytes A
1110 None of the above A

decimal form alphanumeric form A


Numeric Keypad None of the above A
is the first bit in is the last bit in a
a byte byte B

It has ears None of the above D


bytes Hertz D

Joystick None of the above C


MHz VLSI B
Reading bar
codes None of the above B
barcode
scanning voice recognition B

CD-ROM
provides drive
backup None of the above A
power in the
event of a power
cut none of the previous C
Light sensitive
elements None of the above C
5 Mb 1 Gb B

output input A
Numeric Keypad Printer B

Joystick Scanner C
Reading Bar
Codes Digital Signatures B

Keyboard CD ROM Drive A


Optical mark
reader Keyboard B
Speakers
Storing Printer A
information on Back-up on a
the hard disk Cartridge B

Pixies Pickers B
Pointing device CD-ROM A
Optical mark
reader None of the above
SSGA displays none of the previous B
word processing
keyboard layout software C
Optical mark
reader None of the above B
interface an operating system C
Smart card None of the above A
writing programs
in multiple
languages none of the previous A
writing programs
in multiple
languages none of the previous B
To run more than
one program at
the same
Third - time none of the above C
generation Fifth - generation
computers. computers. A
Multi-user none of the previous A
Param Arjun C
is due to bad
disk blocks none of the previous C
Magnetic Ink
Character
Recognition Image Scanning
Technology Technology B
converts a
program to
machine code none of the previous C
Desk - jet Printer Thermal Printer A
compressing
Virtual it transmitting it C
information
reader & user
system None of above B
An inked ribbon and
An ink pen print head D
Unix operating
WAN technology system B
10-12 sec 10-9 sec D

External file
labels Cross footing tests C

operating system communication D


pilot project process D

multiplexing multitasking D

micro computers none of the above A

central
processing unit none of the above B
printer none of the above C
electronic
spreadsheet none of the above B

idea processor none of the above B


Microsoft
exchange none of the above B
record none of the above C
high level
language none of the above B
connector
symbol input/output symbol B
fazitsu vp200
series IBM-PC B

multiplexing none of the above D

dummy
terminals dummy servers A

windows NT LAN D

back end front end D

back end front end C


distributed
computing centralized A

dumb processing data processing B

two many A
network relational database
database system system D

multiplexing none of the above B


disk
defragmentation disk mirroring D
Module/De-
module None of the above B

constraints traps B

multiplexing none of the above B


Local array of
networks. None of the above B
thread client-server C
Integrated
Services Digital
network. None of the above. C

ARPANET None of the above. B


SQL * plus all of the above D

GAN None of the above. B


Transmission
control
protocol/Internet
protocol None of the above. C
Packets None of the above. C

Simple Mail
transfer protocol None of the above. C

Hyper text None of the above. C


Area transfer
mode None of the above. B

Receiver None of the above. B

package system A

LAN and MAN LAN WAN and MAN B


Internet Intranet A
Integrated
Services Digital
Network None of the above. C
Web based Web based
Transport Transaction A
Protocol Repeaters B
command program D
numerous alpha number and alpha A
size,
performance, input, output,
cost performance ratios C

PCs mainframes D

feed write A

multiplexing multitasking D

converter process D

ram output D
non-impact
desktop printers thermal printers C
monitor,
program, CPU, memory, input,
keyboard, bus output D

windows 95 interpreter B

software's procedures C

assembler coder B

assembler processor C

You might also like