Professional Documents
Culture Documents
Itt Questions m2
Itt Questions m2
QUESTIONS A B
TALLY
The ------ key can be used to select an existing
company
Import andfrom list of
Export of companies.
data between Tally and F1 ALT+F1
other programs is possible only through ----------
Program. Tally ODBC Tally IMP
The re-order point is the inventory quantity that
trigger a stock replishment activity. TRUE false
A created company's detail can be modified
through keys F3 ALT+F3
A/An ------------- is the official notice that the firm
sends to its customers to advise then to the
amount of money that is owed. Invoice Bill
In tally,all masters have ________main options Two Three
In tally,to create a new column in balance sheet
press _______ Ctrl+C Alt+C
In tally,the use of group behaves like a sub-
ledger, option is that we can summarize many
ledger accounts into one line statements TRUE FALSE
In tally, we can alter ledger details using either
single or multiple modes but not alble to delete
a ledger from multiple modes. TRUE FALSE
In tally,a group company is marked with an
______________ * $
The systems that work together to
order,receive, and pay for replenishment of Puchasing and Puchasing and
stock are --------------- Accounts payable Receiving
Tally allows to delete a ledger from ---------
alteration mode. Single Multiple
--------------------- is/are useful for management in Cash Flow Fund Flow
the decision making. Statements Statements
In tally,the group company must contain at least
_____________ members Two Three
To cancel a vourcher entry in Tally, short-cut key
is ----------- Alt+D Alt+X
The accounting masters and inventory masters
related to Create Information Alter Information
We press ------------- function key to display the
age-wise analysis of Bills Receivable or Bills
Payable report F4 F5
In Tally, we press ------------, to print report . Alt+P Ctrl+P
In Tally, Types of Accounts and Types of
Vouchers passed during the period, can be seen
in ------------- report. Tally Audit Statistics
In the Tally Software, the ------------ directory
stores all data entered by the user. Bin Data
The Ledger Accounts are unique in Financial
Accounting Packages True False
Customers can be permitted to enter their own
data into the firm’s computer using the firm’s Enterprise Data Enterprise Data -
wide area network is an example of Interchange Information
In Tally, we can customize the Vouchers as per
our requirements TRUE FALSE
are 2 3
Each action/transaction of a firm is described by
a ----------------. data element data record
Tally is based on mercantile accounting system FALSE TRUE
Display stock
Ctrl + N is used to ----------- valuation method Open Calculator
------------- in Tally classify the accounts under
different heads so that summarised information
is possible. Ledgers Groups
Account Personal Nominal
Method of Voucher Numbering is/are Manual Automatic
Accounts Receivable are displayed in Balance Sheet Profit & Loss
To assemble a product from different items
-------------- entry is used Journal Stock Journal
A --------- purchase orders data flow is directed to
the purchasing system for use in closing out the
outstanding purchase orders in the receiving
system diagram. Filled Receipt
Tally provides at least --------- predefined
voucher formats 11 16
FUNDAMENTALS OF COMPUTER
Inefficient usage of excess computer equipment Contingency System feasibility
can be controlled by Planning report
Which of the following is not the component of a
CPU NIC Card VSAT
A trailer label is used on a magnetic tape file, it
is the last record and summarises the file. The
following is an information not found in the Identification
trailer label Record Count Number
Writing on a hard
Hard copy is a term used to describe...? board Printed output
Voice activated
What control
What do the abbreviations
would preventVABthe stand for
accidental broadcasting Voice answer back
erasure of customer information from a Boundary
magnetic tape Validity check protection
What are the individual dots which make up a
picture on the monitor screen called? Coloured spots Pixels
Header label normally include all the following Identification
except the File Name number
A daisy wheel is a type of...? Printer Storage device
Which approach or technique is a control usually
associated with microcomputers System Logs Physical Security
Electrically charged
An impact printer creates characters by using...? ink An
Useink pen
only
The best security control in a microcomputer Restrict physical unremovable
environment is to access media
What would you NOT use with a flatbed plotter? A pen Paper
What do you need for an ink jet printer? A cartridge A drum
Centralised
The greatest control exposure in a Separation of function for PC
microcomputer environment is the lack of duties acquisition
What do you need for an ink jet printer? A cartridge A drum
A laser printer does NOT use? A print head A laser beam
The amount of data that a disk may contain is
known as the disks...? Volume Size
You can ________ protect a floppy disk. Read Write
Information on a hard disk is usually backed-up
using a...? Magnetic tape PAN drive
Serial access Random access
Magnetic tape is a...? medium medium
Hard disks can have a storage capacity in the
region of...? 1.44MB 20 GB
Which storage device has the largest capacity in
Mb? A CD-ROM A floppy disk
Vacuum tube based electronic computers are...? First generation Second generation
Which generation of computer was developed
from microchips? Second generation First generation
Which generation of computer uses more than
one microprocessor? Second generation Third generation
Which generation of computer developed using
integrated circuits? Second generation Third generation
Which generation of computer developed using Second
solid state components? generation Third generation
DATABASES
Specification,
Name three steps involved in developing an Design, and Programming,
information system Testing Design, and Testing
_______ is used for CAAT as database Oracle ACL
Generalized audit software perform auditors to
undertake any past records and not concurrent
auditing True False
Generalized audit software is a file whose
capabilities for verifying processing is logic True False
CAAT's are computer program and data that
auditor uses as part of the audit procedures to
process data if audit significance contained in
an entity information system True False
CAAT do not contains package programs,
purpose written program, utility programs or
system management programs yes no
Embedded audit routines are sometimes built
into an entity's computer system to provide
data for later user by the auditor true false
SCARF involves embedding audit software
modules within an application system to provide
continuous monitoring 1 false
Concurrent use auditors as the member of the
system 1 false
Regular cross system verification may minimize
frauds true false
Computer security is frequently associated with
confidentiality, integrity and authentication true false
Data reserve engineering process metadata to
document system and abstract business rules
and relationship true false
review and
to determine the evaluate the types
The first step for developing CAAT is_________ audit objective of data
Using the open database connectivity feature in can bring the can bring the data
ACL is ______________
Computer Assisted Audited Technique involves data directly indirectly
the use of computers through "Black Box
Approach" True False
White Box Approach necessary involves expert
knowledge on the part of Auditor True
change in the 0
method of
The transition from manual system to CIS recording
environment bring dramatic changes including accounting use of accounting
________________ transaction codes
documents driven risk driven
Auditing with computer necessarily supports the approach approach
hardware and
CAAT involves an Auditors' appreciation of software processing options,
__________ configuration file data structure
Widespread end use computing result in
unlimited errors creeping into system going to
accept handling, thereby
For computerized auditingincreasing
usage of audit risks true false
sophisticated audit software would be a
necessity truesource of
the false
data available to
Important knowledge needed to begin planning the audit source of data for
the use of CAAT is _________ organization material planing
The move towards paperless EDI would
eliminate much of the traditional audit trail,
radically changing the nature of audit evidence true false
providing access to
computer to all
Computer operation controls are designed to the of by all organization
provide
Systems________________
development control, apart from concerned personnel
others, include authorization, approval, testing,
implementation and documentation of new
systems software and system software
modification true false
identifies program
provides detailed code which may be
information of there for fraudulent
Program code analysis involves _____________ machine uses reason
__________
Snapshot isissoftware
a software of CAAT
which takes a picture of a IDEA ACL
file or data or a transaction passing though the
system true
fictitious data false
applied against comparison of
Base case system evaluation the client source version of a
includes____________ program programmed
While base testing forces on finding if there are
any defective execution policies in a program 1 false
Black box testing seeks to determine whether
application output
In integrated is whatapproach
test facility it is supposed to be
the auditor true false
should ensure that the impact of test
transaction is subsequently eliminated from the
computer files true false
Black box testing is _______ based and white specification,
box testing is _______ based program file, hardware
identifying identifying
Source code review means__________ erroneous code ineffective code
In formula in flow hypothesis the auditor should
expand the extent of substantive tests to
determine how the defects may impact the
attainment of the program objectives true false
All material application oriented events that
occur within the boundary subsystem should be
recorded in the accounting audit trail true false
authentication of
In examination of audit trail the following data start and finish information
associated with an event may be ___________- time support
job control job connectivity
JCL means_________________ language language
Audit should be periodically analyzed to detect
any control weakness of the system yes no
In an accounting audit trail, intrusion detection
system might monitor the amount of processor
time consumed by the user to detect unusual
deviation from the amount processor time
requested by the user in the past true false
A sample size calculator program assists
auditors in determining RAND() function true false
package
computer
p[program for
performing a
variety of data
processing mathematical
Generalized audit software consists ___________ function concept
for updating
In SQL, having clause is used for _________ for ordering records records
______field is added to the macro sheet when we
select grouping option from the view menu condition group
______can be used to create toolbars VB Modules reports
_______query is used to add records from one or
more tables into an existing table add append
_______window is used to write VB code in
access application report macro sheet
Values for other tables, queries are maintained
in look up fields data type true false
Visual Basic language is a _____ tool RAD RAP
______ function is used to display a message box SysCmd MsgBox
Other ms-office applications can be accessed
from ms-access using a concept called ________ OLE DDE
object linking
OLE stands for_____ and embedding on line execution
The application that supplies data in OLE is
called an _________ OLE object OLE client
If any change made on the object from the
client side is reflected on the server then the
object is said to be _____ linked embedded
_______is the file format that works on internet exe DLL
______ is used to convert any ms-access object
into html format form wizard report wizard
_______ option in publish to web wizard produces
a page that is static in nature static file static html
_______query is used to create or change
database objects in a current database append add
Changes from a master table can be reflected cascade delete cascade change
on to the child table by selecting _____option related records related records
To see more than one record at a time in a form
we use _______ columnar tabular
In SQL, delete command is used to remove
_________
In MS-Access, filter excluding selection will table or tables query or queries
display only those record(s) which meet the
criteria. true false
Properties of the fields are managed by _____ in
Dynaset property field field property
______queries allows us to view data in row by
column manner crosstab queries row/column queries
The type of queries that can update or delete
record(s) in a table(s) are called __________ action queries row/column queries
Joining tables without any matching values in
the fields is called ____________ inner join self join
Primary key uniquely identifies each record true false
Which of the following dialog box is/are used in new form dialog form create dialog
the creation of form ________ box box
_______ query wizards are used to generate
summary calculations for a table summary sum
Properties of a form can be changed by
selecting ______from view menu options change properties properties
Forms that are included in other forms are
called ______________ included form sub form
In MS-Access, while using form design view, for
creating a command button for adding a new
record, we should select the _______ category Record
from the command button wizard Record Navigation Operations
_______ form displays fields in a single horizontal
row columnar form tabular form
The process of arranging the data in a
meaningful order is known as ___________ filtering ordering
______ are used to select only some particular
records from the table or any other database
objects filter sorts
In MS-Access, user may specify criteria for filter filter by
in form view using _________ filter by form selection
___wildcard character represents any single
character * $
Records cannot be sorted by a primary key true false
A control without a data source is known as
___________ bound control unbound control
Set of related option buttons, check boxes and
toggle buttons is known as _____________ button group option group
The collection of related data and objects is
called a ____________ database form
Which of the following is control types
____________ bound unbound
In MS-Access, the function that gives the current
date is _____________ CURRDATE() TODAY()
_____is a control that lists set of data text box list box
______is a form that summarize large amount of
data pivot table columnar form
______allows to create a filter by typing the
value in a data sheet data sheet filter filter by input
Wizards for toolbox controls are called a
__________ button wizard control wizard
The wild card representation for any 5 letter
word that starts with ram is ________________ ram* ram??
Look up fields slow up data entry true false
____is an access object that displays un-editable
data report form
_____option from the new object toolbar gives
the easiest way of generating a report autoreport report
______ represents data in a pictorial format chart label
Changes of one table can be carried over to
another related table true false
Hyperlinks are used to jump to any kind of
information or data from a file true false
The memo field can have text upto_____
characters in length 60,000 255
In MS-Access, columnar layout can be used to
view multiple records in a form true false
In MS-Access, alter command may be used in
adding a primary key to a table true false
Update query is used to add records from one or
more tables to the end of an existing table true false
In ms-access, datasheet view is available in
___________ table query
______are used to jump to any kind of
information from a datasheet or a form table form
Home page will always be present as a first
page of an application true false
Make table queries create a new table from the
records of another table true false
In ms-access, to protect a database file from
illegal access, we may set database password.
The option of setting database password is
available in _______ menu Insert Records
Foreign key is a field that uniquely identifies
each record and accept no null values true false
Data definition queries are used to create or
change database objects true false
The attributes of a composite key are known as
________ alternate keys composite keys
OLE object is a data type in access true false
Data displayed in forms cannot be edited true false
A sub form is used to display one to many
relationship between tables true false
We can switch from datasheet view to form view
by selecting view -> form view option true false
In MS-Access long integer is a datatype true false
In MS-Access, while designing a table for a
particular field, the Required parameter is set to
yes. This validates the field as _______ null not null
Sorting is applied to select only some particular
records true false
Filter by form can be created from a forms
shortcut menu true false
Advanced filter uses a filter similar to the query
design window to create a filter true false
? Wildcard character represents any number of
characters true false
_________ of the following is/are a type of chart pie bar
A bound control is tied to a underlying query or
table true false
A calculated control uses expression as a source
of data true false
Text boxes cannot be bound controls true false
The default query invoked by ms-access is update query select query
A control can be bind to a record using row
source property true false
List box is a control that offers a list of choices true false
If a table is joined to itself it is called a
________________ inner join outer join
A picture box combines the activities of both a
text box or a list box true false
Line is a tool box control true false
Text boxes can be part of a option group true false
_____ chart exists as a separate object freestanding embedded
Filtering data is a way of arranging data in a
meaning full order true false
Wild card characters are used for sorting records true false
Pivot tables are used to navigate to the other
tables in a database true false
Reports are used to represent un-editable data true false
In MS -Access, the records in a table are sorted the first field of the the last field of the
based on _________ table table
Relationship is an association between _________ forms reports
Summary options dialog box is used to
summarize data true false
______ queries can be used to delete a group of
records that meet some specific records delete insert
Charts can convert numerical data in a easily
understandable format true false
Embedded charts exist separately true false
The chart which cannot exists as a separate
entity are _______________ freestanding embedded
From ms - access, if we want to view the records
stored in a table in ms - excel worksheet, we
need to use hyperlink use import
Page header is present at the beginning of each
record true false
Detail section has a header and footer true false
A macro is performed only when the user
initiates an event true false
The macro is selected from the action field of a
macro sheet true false
A macro can be made to execute before the
starting of a database true false
In MS-Access. While appending records, the
source and the target table must have similar
structure and fields true false
We can add our own functions to the expression
elements list wildcard
_______is the box of the expression
character builder
which true false
represents the presence of any number of
characters & #
Macros can be used to add a menu to a
database object true false
_____ header is a unique feature of reports page detail
Chart can either be a form or a report true false
Group header will be present at the design view
of a report even if the report is not grouped true false
We can change from the design view to the form
view without being prompted for saving the
changes made true false
Charts can be produced without the wizard true false
Macros can be used to create user defined error
messages true false
Between and Not Between is ______ type of
operators relational list
The default data type of VB is integer true false
structured query
Visual Basic is based on __________ action language language
_______is the name of the database object that
displays data and can be used to edit data report form
In access OLE objects cannot be linked true false
_____ section is present for each record in the
report group record
A ________ sheet lists all the properties that
pertain to the form or the controls data property
Textboxes can also be an example of unbound
control true false
In MS-Access, we may design command buttons
for navigating records true false
forms sub forms child forms
_______ are used to represent our data in
graphical format graphs chart
A field with a _______ uniquely identifies each
record number primary key
Large amount of data can be summarized using
______ tables pivot create
_______ are employed to select only some
particular records from a database object filters queries
______ control need not have a data source form bound
______ control combines the functionality of both
a text box and a drop down list list box combo box
MS access is a DBMS true false
A form can be bind to a record source using
_____ property of the form form name control
______ forms displays field in single row tabular form chart form
______ forms are usually used for tables with one
to many relationship sub forms tabular form
_______ control uses an expression as a source of
control calculated bound
_______ control is tied to field calculated unbound
_______is the form that can be created with
minimum input from the user sub form auto form
______option from the tool menu is selected for
setting relationships between tables set relation connect
command button,
______,______and_____are the buttons belonging option, toggle and check and list
to the options group command buttons boxes
_________allows us to create a filter from a field
short cut menu filter by form filter by report
________is a database object which displays data
but cannot be used to edit data form report
What term applies to a collection of related
records in a database? clipboard file
All of the following terms are related to
computerized databases except which one? search sort
A way to analyse
and manipulate A tool to produce
numerical high quality
What is a database? information documents
It contains all
Information about the data about
What does a record contain? certain programs one specific item
A way to analyse
and manipulate A tool to produce
numerical high
What is a database? information qualitydocuments
It contains all
Information about the data about
What does a record contain? certain programs one specific item
Reports allow
users to extract Reports provide a
information as very flexible way of
hard copy creating and
What is a report? (printed output) editing documents
Spreadsheets make
What is the best way to analyse and change Extracting and data easy to
data analysing data analyse
What are some popular office orientated Compilers, Network software,
software applications? interpreters, editors backup systems
Which of the following constraints can be used DEFAULT and NOT FOREIGN KEY
to enforce the uniqueness of rows in a table? NULL constraints constraints
Which of the following commands is used to
change the structure of table? CHANGE TABLE MODIFY TABLE
What is required of the fields that join two They must both be They cannot be
tables? numbers text fields
A one-to-many A one-to-many
Which of the following relationships does not relationship relationship
belong in a database based on a professional between teams and between teams
sports league such as football or basketball? players and coaches
Which symbol is used at the end of the join line
in a related table to signify the “many” side of a
one-to-many relationship? # M
The Customers
You have created a one-to-many relationship table only when
with referential integrity between a Customers there are Loan
table and a Loans table. From which table can Either table at any records associated
you delete a record? time with that customer
The correct order of the arguments for the prompt, title bar prompt, icon,
MsgBox statement is: text, icon. title bar text.
The first statement in a procedure named
CreateList is: Dim CreateList. Sub CreateList.
Evidence,
Signing Writings serve the following general Ceremony,
purposes______,_______,_______ and _______ Approval Approval, Evidence
The most widely accepted format for Digital
Certificate is defined by the CCITT X.509 True False
A certificate may prove to be unreliable, such as
in situations where the subscriber misrepresents
his identity to the certification authority True False
Certificate Certificate
CRL stands for Revocation List Resource List
The prospective signer identified in the digital
certificate holds the_________ and is called the Private Key, Public key,
___________ Subscriber Recipient
In EDI interface, the translation service receives
_________ as incoming files from the External Format
communication service Internal Format File File
The EDI standardisation for International Trade
and Commerce is introduced by __________ ANSI UN/EBCDIC
In EDI, the transmission files are composed of
different sets of external format files which are
grouped into multiple sets under the name of
________ batch files interchange sets
The ________________ are pre-paid credit cards
that include an embedded cards Smart Card Embedded cards
________________ are another form of credit
payment that lets customers use digital online
cheques to pay Web merchants directly E-cash Digital Cash
In Active advertisement, there are two types of Billboards and Junk Online Catalog and
models. They are _____ and ________ Mail Billboards
The network based technology is/are
____________
Decryption is a process employed for EDI E-mail
scrambling of plain text for web based
transactions True False
Asymmetric cryptosystem is based on __________ Login_Id and Primary Key and
and ____________ Password Private Key
The advertising strategies emerging in the on- Active or push Passive or pull-
line world are ____________ based advertising based advertising
The _________ model use direct mail, spot
television or cable television, in active based
advertisement. Broadcast Junk mail
The ________ is a form of mail that is not
targeted to a specific audience E-mail Bulk-mail
The __________ model refers to information that
is placed at a point where it will be noticed by
customers in the course of other activities and
does not require active search Catalog Endorsement
The most
What beneficial
is the term thatadvantage
describesof ERP system
spying is Error checking
on one’s Data Integration
business rivals to gain a competitive Competitive Corporate
advantage? espionage espionage
Contact numbers
of the
What would you NOT be looking for when spying A list of management
on a competitor? competitor’s clients group
single-user multi-user
An online drugstore such as Drugstore.com is an database database
example of_______ application application
Which of the following is an example of Keeping messages
unacceptable online ‘netiquette’? Replying promptly short
Message
Removable drives authentication in
that can be locked EDI systems
up at night provide performs the same
adequate security function as
when the segregation of
Which of the following statements is correct confidentiality of duties in other
concerning the security of messages in an data is the primary information
electronic data interchange (EDI) system? risk. systems.
The wizard that is used to import text files text import convert text to
is_________________ wizard columns wizard
The two types of search in veronica are _____ directory index search,menu
and ______ search,index search search
_______ searches by keywords infoseek excite
Mosaic displays links in color whereas _____
does not display links in color netshark cello
______ supports one button publish lynx mosaic
SPY MOSAIC is distributed by_______ Microsoft internet
______ is a program that helps us to log on to
other networks Usenet finger service
PINE stands for _____________ palm is not eatable palm is not elm
The application that confirms whether a
document is compliant to its DTD is _________ SGML Processor SGML Preprocessor
Web is a collection of ___________ web sites images
International
Internet equipment Engineering
IETF stands for ________ training faculty trainers and faculty
MS Internet Netscape
The two major browsers used to surf the Explorer and Navigator and
Internet are ________,_______ Mosaic Mosaic
Special characters allow browsers to display data from a
_________________ text database
The keyword for providing links within or across
documents is____________ hyperlink hypertext
Stringing pages together using hypertext in sequential
technology helps view pages _______________ in random order order
The initial web pages present in a web site is
the ________ page. first start
The image format supported by most browsers
is________________. .bmp and .gif .bmp and .jpeg
service,hostnam
Service, hostname e,port,directory-
The components of a URL are ___________ and directory path path
defensive
administrative rank dedicated and
DARPA stands for administration registered projects
_______________________________________________ network administration
The uuencode files start with a _______ start begin
milnet,smaller
DARPA is broken into ________ and _______ arpanet mailnet,inet
NSFNET is the united states provides service to education,resear
_____ and_____ ch music and dance
Higher text
HTML stands for manipulation Hotlink text
______________________________________ language markup language
The first international IP network connections united states and
were established in 1973 with _____ and_____ UK england,norway
A_____ is a set of computers interconnected by
transmission paths to exchange information in
internet server client
A computer that provides a service usable by
other computers is called______ client stand-alone
A_______ is the representation of physical network
connectivity of the computers in internet network card topology
detailed transaction data terminal
DTE stands for ____________________ explanation equipment
The basic function of the ______ is transmitting
the bits over a channel application layer physical layer
point to point packet
network and switching,store
The point to point channel network is also called broadcast channel and forward
as _____ and_____ network network
Accessing files using FTP servers is called_____ file access anonymous ftp
The three most commonly used networks
are______,______ and______ PAN,NAN,AAN KAN,RAN,VAN
________ is in between LAN and WAN VAN MAN
_____ can be owed by multiple organisation LAN MAN
Data is transmitted in the form of_____ signals analog digital
DTD stands for __________ Data type definition Define type of data
Moralize/demoraliz Modulation/demo
Modem stands for __________________ e dulation
______ is the process of the digital signals being
converted into a form suitable for analog
transmission Mapping Modulation
Dedicated access
________ and______ are two basic ways of getting Satellite link and and dial up
connected to the internet digital signals access
Standard long Stream line
SLIP stands for ________________ internet protocol internet protocol
Prime prolonged Point to point
PPP stands for _____ protocol protocol
sending
Which of the following best describes uploading storing data on a information to a
information? disk drive host computer
A characteristic of a communication channel
that is the amount of information that can be
passed through it in a given amount of time,
expressed in bits per second. Bandwidth Speed
The act of searching through storage to locate
information without necessarily knowing of the
existence
A of the
"recipient" information
of the certificatebeing sought.
desiring to rely Find Save
upon a Digital Signature created by the
subscriber named in the certificate is called the
____________
The Relying Party can use the ___________ listed Recipient Party Relying Party
in the certificate to verify that the digital
signature was created with the corresponding
_________ Public Key Private Key
Digital Signatures are used for a variety of
Electronic Transactions like Electronic
________________________ E-mail Commerce
To associate with a key pair with a prospective
signer, a Certification Authority issues Digital
Certificate Not False Not True
Digital Signatures, if properly implemented and
utilized offer promising solutions to the Closed
problems of Imposters, Message Integrity, System,Formal Formal Legal
__________ and _____________ Legal requirements Requirements
In, Digital Signature, _____________ perform the
"ceremonial" function of alerting the signer to
the fact that the signer is consummating a
transaction with legal consequences Affirmative Act Efficiency
A Digital Signature must have the following Signer Document
attributes ________________ and _____________ Authentication Authentication
"Hash Function" is used in both creating and
verifying Digital Signature Not True Not False
___________ provides assurance of the origin or
delivery of data in order to protect the sender
against false denial by the recipient that the
data has been received, or to protect the
recipient against false denial by the sender that Nonrepudiation
the data was
___________ sent. the ceremonial and approval
serves Service Digital signature
functions of a signature and establishes the
sense of having legally consummated a
transaction. Affirmative Act Efficiency
________ is a branch of applied mathematics
concerns itself with transforming messages into
seemingly unintelligible forms and back again. Cryptography Public Key
The complementary keys of an asymmetric
cryptosystem for Digital Signatures are arbitarily
termed as _________, and ____________ Private Key Public Key
_______ is known only to the signer and is used
to create the digital signature. Private Key Public Key
_______ is ordinarily more widely known and is
used by a relying party to verify the digital
signature. Private Key Public Key
____________ is the art of protecting information
by transforming it into an unreadable format. Decryption Cipher
Which of the following activities would most Using data Performing validity
likely detect computer-related fraud? encryption. checks.
A digital signature is used primarily to Unaltered in Not intercepted en
determine that a message is: transmission. route.
Both sender and
receiver must
have the private The private key
key before this cannot be broken
encryption into fragments and
What is a major disadvantage to using a private method will distributed to the
key to encrypt data? work. receiver.
Which of the following risks can be minimized
by requiring all employees accessing the
information system to use passwords? Collision. Data entry errors.
Business-to- Business-to-
The acronym for B2B is ___________ Business Backend
The _____________ model is the least intrusive
model but requires active search on the part of
the customer Billboard On-line Catalog
__________ is / are a form of advertisement
where people relate their experience with Customer
products and services Endorsements Billboard
The _________ are software agents who
communicate with the business merchants on
behalf of the customers Intermediaries portals
The Pre-purchase preparation phase includes
_______________ for a set of products Order Placement Service
The _________ phase includes customer service
and support to address customer complaints , Post purchase Purchase
product returns and products defects interaction consummation
Which of the following would you use to change The Standard The Formatting
the font size of a cell in Excel? toolbar toolbar
The command that will save the current the New command the Save command
workbook with a different file type is: on the File menu. on the File menu.
The command that will print an Excel workbook
is found on the ____________ menu. File Edit
In the Save As and Open dialog boxes, the
___________ view shows the file size as well as
the date and time a file was last modified. Preview Details
Which of the following commands will
automatically adjust cell references in formulas? Insert Delete
Which of the following commands will remove
cells, rows, or columns from a worksheet? Clear
Orientation Delete
Which of the following options is NOT controlled (portrait or Headers and
through the Page Setup command? landscape) footers
Which command enables you to change the
margins for a printed worksheet? Options Page Setup
All commands are carried out on a rectangular
groups of cells known as a: worksheet. range.
Which of the following is a valid cell range? 6 D12, G25
In a copy operation, the cell(s) you are copying
from is called the: copy range. destination range.
In a copy operation, the cell(s) you are copying destination
to is called the: paste range. range.
Which of the following commands is needed to The Duplicate The Copy
duplicate the contents of a cell in another? command command
A cell reference that does not change during a
copy operation is known as absolute relative
Which of the following is considered an absolute
cell reference? B4 $B4
Cell E3 contains the function =AVERAGE(A3:D3).
If the contents of cell E3 are copied to cell E4,
what will be the contents of cell E4? #DIV/0! #DIV/0!
Cell E3 contains the function
=AVERAGE($A$3:$D$3). If the contents of cell
E3 are copied to cell E4, what will be the
contents
Which of of
thecell E4?
following commands is needed to #DIV/0! #DIV/0!
transfer the contents of one cell range to The Move
another? command The Cut command
If you enter a date into a cell, Excel stores the text with a two- text with a four-
date as: digit year. digit year.
You created a worksheet on July 30 and entered
the =Today() function in cell E17. You opened
that worksheet again on August 31. What will
be displayed in cell E17 on August 31? Jul-30 Aug-31
subtracting the adding the earlier
The number of days between two cells earlier date from date to the later
containing dates can be calculated by: the later one. one.
The function key that is used to quickly edit the
contents of a cell is: the F4 key. the F2 key.
To print just part of a sheet, you would select click the Print press the PRINT
what you want to print and _____ . button SCREEN key
Spreadsheets can be used for... producing graphs writing letters
The formula that will add the value of cell D4 to
the value of C2 and then multiply by the value
in B2 is _____. (D4+C2)*B2 D4+C2*B2
Which of the functions is not valid for =A3SUM:B3SUM:
performing addition 0 C3SUM
The default orientation for the printed page is
_____. portrait landscape
Which is not a valid cell address? AD213 ZA1
The useful URL schemes are_____ and______ yahoo and infoseek mailto and files
bulletin
boards,mails call
The other ways of getting connected to the net news groups,yahoo and wireless
are_____ and infoseek system
business
bulletin board broadcasting
BBS stands for______ system system
USENET is a BBS on ____ scale small large
WINSOCKS is expanded as______ windows socks windows sockets
IETF Level 2 HTML DTD supports graphical
browsers like _______ Mosaic Yahoo
The space used by Netscape to store the
retrieved page is called______ buffer cache
The principles, means and methods for
rendering information unintelligible and for
restoring encrypted information to intelligible
form. Photography Digital Signature
A long string of seemingly random bits used
with cryptographic algorithms to create or verify
digital signatures and encrypt an decrypt
messages and conversations. Key Lock
Protected/private character string used to
authenticate an identity or to authorize access
to data. User-id Password
The successful act of bypassing security
mechanisms
A set of rules of theformats,
and system.semantic and Penetration Retrieval
syntactic, that permits entities to exchange
information. Acts Regulations
An attempt to get access to a system by posing
to be an authorised person. Spoofing Imposting
An action or
According to event that might
information prejudice
Technology Act,security.
2000, Loss Threat
To investigate contraventions the controller of
certifying authority shall exercise the like Sales - tax Income - tax
powers to that of authorities authorities
Malicious software. Utility Pirated software
Internet Tim Berner Lee Hoffman
earth. Etrade.com Amazon .com
What happens to data that is ruined before Data return to the It gets destroyed
reaching to receiver sender bit by bit.
Wireless
Bluetooth is technology Wired Technology
Which is not one of the recognized IEEE sub
layers? Physical Layer Data Link Layer
The most preferred number system to represent
a IP address is Binary ASCII
A MAC address is of 48 Bits that
software 48 Bytes
facilitates a list of rules for
connection to the transferring data
Protocol is internet over a network
A ............... is a LAN-based computer with
software that acts as a controlling device for
controlling access to at least part, if not all, of a
local area network and its available resources. Novell PC Client
The worldwide web server uses the following key gateway uniform resource
standard interface to act as the middleware: interface locator
uses telephone
Telnet used to send email lines
What can be said about the safety of the All sites are safe There are safe
Internet? and reliable. and unsafe sites.
To secure communication network against wire-
tapping the most effective control is Use of identifiers Use of passwords
using Internet
Explorer to view a
Web page that is updating the
stored on the hard values that are
Which of the following requires an Internet drive on your obtained through
connection? computer a Web query
Click on the Back
Mr Rao wants to find a website that he briefly arrow until the Click on ‘Go to’ or
browsed over yesterday. After turning on his desired site is ‘Search’ in the
computer how would he do this? found browser
the Insert
Which of the following is used to update a Web the Refresh Hyperlink
query? command command
You download from the internet, a screensaver,
a ten-second sound file and a ten-second music
video clip. You also add a hyperlink. Which of
the media elements has the greatest effect on
the file size? Hyperlink Screensaver
When saving a photograph for use on a website,
which format should you choose? BMP GIF
While researching the Direct taxes assignment,
you find a useful website. What is the most Save it to a floppy Write it down on a
efficient way to access the site at a later time? disk. piece of paper.
A system that uses the Internet for business-to-
business interaction is called a(n): extranet. intranet.
A block of text automatically added to the end
of an outgoing email is called an attachment. a signature.
_________ refers to the use of Internet
technologies for placing telephone calls. VoIP IPT
Most client/server applications operate on a Desktop client, Desktop client,
three-tiered architecture consisting of which of application, and software, and
the following layers? database. hardware.
Internet? Modem CD-ROM
File Transfer File Transmission
What does FTP stand for? Program
So computers Protocol
can be
referenced by a So IP addresses
What is the purpose of DNS? name can be shorter
Which of the following is NOT a properly
formatted IP address? 193.1.2.3 45.1.1.1
Which of the following is a properly formatted paul .trigg @ paul.trigg@doma
email address? domain. org. uk in.org.uk
The US Scientists in
The Internet is controlled by whom? government Switzerland
Internet Relay International Relay
What does IRC stand for? Chat of Characters
It will be waiting
If you do not pick up your email for a week...? It will be deleted for you to collect it
autolayouts and
In Powerpoint2000 ,the built-in professional clipart & auto presentation
design elements are shapes templates
Selection handles are the 8 small ___________
that appear around the object, when an object
is selected circles points
The _______ is an invisible matrix of vertical and
horizontal lines that covers the entire slide
workspace square image
_______ are drop-down menus that appear when
the right mouse button is clicked on the screen
element
________ and ______ have the ability to add a lot tool bars short cut menus
of visual impact into the PowerPoint clip gallery & slide show & view
presentation word art show
_______ is a motion picture or any animation file wave file media clip
In visual basic, when a record pointer reaches to
the last record, _______ property of a recordset
object is automatically set to ______ eof,false movelast,true
In visual basic, the explorer view of a project is
displayed in ___________ properties window form layout window
In visual basic, when a record pointer reaches to
the first record, _______ property of a recordset
object is automatically set to ______ bof,false movefirst,true
In visual basic, _______ is a method to convert a
string into integer. value() int()
In visual basic, in a shape control, a vb
statement gives Shape1.Shape = 2. What type
of shape should we get? circle rectangle
In visual basic, a timer event is only available in
timer control. true false
In visual basic, vbred or vbgreen or vbblue are
the property values of a backcolor of any object true false
In visual basic, _______ is a property of a textbox
control to set a color of a text. fontcolor color
In visual basic, _______ property of a textbox fontunderline,tru
control is set to _______ to underline a text underline,true e
In visual basic, _______ property of a textbox
control is used to change the size of text. textsize size
In visual basic, the interval property of a timer one- millionth of a one-hundredth of a
control is given in ________ second second
In visual basic, _______ property of listbox control
counts the number of items in the list count recordcount
In visual basic, the properties of various controls
can be set using __________ form layout window prperties window
In visual basic, vbinformation, vbcritical,
vbexclaimation are the values of _______ in a
messagebox function. title prompt
In visual basic, ________ is a function which
displays a message and it also allows the user
to enter values in a form object msgbox() textbox
In visual basic, using a data control, ________ is
a recordset type which allows to add a new
record and also to update existing record in a
recordsourse object opendynaset opensnapshot
In visual basic, while closing a form _______
event of a form object is triggered earlier to
terminate event. load activate
In visual basic, to give a backcolor or to bring in
a picture to a command button can only be
done if we set the style property to ______ standard opaque
In visual basic, a method RGB(255,0,0) will
generate _______ color blue red
In visual basic, a method RGB(255,255,255) will
generate _______ color red green
In visual basic, if a user uses a shortcut key
ctrl+R _________ becomes visible. properties window form layout window
In visual basic, if a user uses a function key F4 properties
_________ becomes visible. window form layout window
In visual basic, when a textbox control receives
the focus ________ event is triggered. change lostfocus
In visual basic, a form is a ________ object. child parent
Microsoft visual basic is a Rapid Application
Development tool. true false
In visual basic, when a form object appears on
the screen _________ event is triggered. load unload
In visual basic, to display text on a label object
_________ property is used text name
In visual basic, _______ object is used to access
the database and also to manage the data in
the database.
In visual basic, when a checkbox control is opendatabase dbengine
checked _______ property is automatically
assigned with 1. enabled visible
In visual basic, _______ keyword is used to
declare a variable dime dim
What is the extension of the Visual Basic project
file that stores the design of a user control. .ctx .ctl
Which event of a text box would you use for
validating the data entered by the user? Validate Validation
Which of the following statements forces inline On Error GoTo On Error GoTo
error handling? linelabel Inline
The _______ method resets the contents of
bound controls to their original values when the
user clicks on the cancel button. UpdateControls PaintPicture
Cancel parameter
To deactivate the Form UnLoad event, you make to a non-zero Cancel parameter
the following change in the function definiton: value to 0
How many root nodes can a TreeView control
have? 1 2
Manager box tool in organizational chart window used to mange accessed only by
is organizational chart manager
The custom drawing tools are _______ by default turned on turned off
Click on the box tool ______ to draw three boxes once twice
There are ____ default fields available in all
boxes of the organizational chart two four
The _____ tool is used in the same way as we
use a pen to draw a table native tool draw tool
A/An _______ consists of smaller printed version
of the slides autolayouts handlayouts
The size of the object can be changed using the
______ tool zoom reduce/enlarge
_______ is the process through which the slides
in the current presentation are included in
another presentation or application importing exporting
________ can be used to create charts as well as
worksheets Microsoft excel auto shapes
PowerPoint can import text files that have been .rtf(rich text
saved in ______ format .ppt(PowerPoint) format)
levels nine only one
When a file is saved with _____ extension, the
graphics and text are also saved along with the .rtf(rich text .wmf(windows
slide format) metafile)
not displayed displayed only
during the slide during the slide
The hidden slide is show show
____ effect is used to introduce a slide during a DTS(digital track
slide show sound) 3D(3 dimension)
A _____ is a special effect that determines how
the objects appear on the slide build transition
The notes page is formatted based on the notes master slide master
Pick the odd man out of the following outline view slide view
When a new presentation is opened ,powerpoint
creates slides that have a width of _____ and a 10 inches,7.5
height of ______ with the landscape orientation 15 inches,10 inches inches
The default orientation for notes ,handouts and
outlines is ____ orientation portrait landscape
Build effect is also called as ______ animation view show
Graphics for web pages are automatically stored
in ____ format gif jpeg
A _______ is used to jump to any slide in the
presentation hyperlink hypertext
The ______ language has been incorporated into visual basic for
PowerPoint visual c++ application
In PowerPoint _____ is a series of commands that
are executed in sequence macro batch file
while creating a during slide
The macro will be activated .exe file transition
Developers can easily add ____ to PowerPoint
2000 by
______ using the the
determines programming interface
order in which order in virus checkers spell checkers
which the slides will be displayed during the
show slide show custom show
_______ is used to organize and develop the
contents of a presentation slide pane notes pane
If we save the presentation file as a metafile, it
can be opened using internet explorer paint shop pro
PowerPoint creates
a sample
With reference to autocontent wizard for presentation to it is the quickest
creating a new presentation, which of the which user can add way to create a
following statements are not true words and pictures presentation
user can insert user can insert
objects like clip- only pre-drawn,
arts, pictures pre-colored
stored in a graphic images
separate files to reflected in a clip
Which of the following statement is not TRUE the slides arts to the slides
An example of the components of a multimedia text, graphics and text, hypertext and
presentation could include email address. Power Point.
Which of the following formatting elements can
be applied to a PowerPoint diagram using the
AutoFormat tool? the Line style the Line color
Which of the following formatting elements can
be applied to a PowerPoint diagram using the
Format AutoShape command? Fill color Line color
A popup box
Excel is started so prompts you for an
What happens when you double click a blank that you can create existing Excel chart
graph placeholder in a PowerPoint presentation? a chart. to insert.
A dialog box is
A dialog box is displayed allowing
displayed allowing you to enter the
you to enter the name of the Excel
name of the Excel worksheet that
worksheet that should be
should be linked to embedded in the
What happens when you click the Datasheet the PowerPoint PowerPoint
button on the Microsoft Graph toolbar? presentation. presentation.
What happens if you single click a chart that is The chart is The chart is
not currently active? selected. deleted.
What happens if you double click a chart that is The chart is The chart is
not currently active? selected. deleted.
what objects do
the way objects after they appear
Custom animation can be used to affect ONLY: appear on a slide. on a slide.
To enable any
printer to be
For technical connected to the
What are User Guides are used for? support network
Network systems
Operating and
systems and communication
Systems software can be categorised into: system services services
Magnetic tape
Which storage device cannot be erased? storage CD-ROM
To maintain a
Application software are programs that are backup copy of all To do a particular
written the information task.
Which bus carries information between
processors and peripherals? Data bus Auto bus
Hexadecimal FDDI BAD
Which bus controls the sequencing of read/write
operations? Data bus Auto bus
Operating system
Peripherals that are routines that
connected to a execute in
What are utilities? computer. supervisor mode.
Numbers are stored and transmitted inside a
computer in binary form ASCII code form
is faster to access
ROM than RAM is non-volatile
increased the
storage capacity of increases the
A UPS a computer system process speed
has more storage
is a form of ATM capacity than an
smart card card ATM card
Laptop computers use CRT displays LCD displays
having several
programs in RAM
Multiprogramming refers to at the same time multitasking
having several the ability to run 2
softwares running or more programs
Multitasking refers to at the same time concurrently
What are small high speed memory units used
for storing temporary results? ALU Registers
A good way to exchange information that
changes rapidly is through brochures magazines
an operating
Multiprogramming is a prerequisite for multitasking system
Timesharing is the same as multitasking multiprogramming
______ is the default view in Word used for
typing Editing and Formatting the Text NORMAL ONLINE LAYOUT
The short-cut-key that is used to indent a
paragraph spacing in the documents is ctrl+m ctrl+2
The short-cut-key that is used to paste the
selected text ctrl+v or ins ctrl+c or ins
The short-cut-key that is used for paragraph
spacing(1.5) ctrl+2 ctrl+5
The box that separate text from the document
and allows it to behave like an independent
object is known as Text Box Frame
The object that is used to provide information
like the title of the book, name of the chapter, Header and
page number etc. Footer Screen Tips
The object that helps us analyzing data
statistically is known as Chart WordArt
To highlight certain parts of a page to set it
apart from the rest of the page we make use of
the following features Borders Shading
To clear all the tabs in a document the option
that is clicked
The dialog boxfrom
that the tabsto
is used dialog
incorporate clear remove all
picture bullets into our documents or web pages picture bullets arrow bullet dialog
is dialog box box
The object that composes of set of tools which
helps to create and work on different shapes like
rectangles, circles, flowcharts etc. charts WordArt
When word is opened a new document
called_____ is displayed, where the user starts
typing the content right way doc1 document1
______ is an online dictionary maintained by
word to obtain synonyms for words thesaurus hyphenation
The thesaurus is invoked by pressing_______ shift+f7 thesaurus menu
When a new table is created the insertion point
flashes in the _____ first second
By pressing the _____ key inserts a blank row
after the last row in the table tab end
The ______ option enables us to convert text into convert text to convert data to
a table format table table
A table consists of ______ that contain text or
graphics row rows & columns
The _______ option in word allows the user to
automatically correct misspell words as and
when they are typed AutoCorrect AutoFormat
______ is a facility that enables recording and
replaying of a sequence of keystroke Mail Merging Macro
In Word Macros are written in _____ basic visual basic
In Word 2000 the macro dialog box is activated
with the help of ____ key combination shift+f8 shift+f7
________shows how a document would look like
when published on the web or on an intranet web layout view online layout view
______ is a software for sending and receiving e-
mail messages email client outlook express
________is the coding system used to create web
pages html xml
The network that makes information easily
accessible across various networks is _______ internet intranet
the field
field name must be separators in a
listed in the same header source
order as the and the data
Which of the following statements are false with corresponding source can not
reference to the use of a header row source for information in the be set as
a mail merge data source paragraph
prohibits the
automatically user from
corrects common renaming an
With reference to auto correct which of the typing, spelling auto correct
following statements are false errors entry
password
protected
document can be
With the reference to password protected opened without
documents which of the following statements password can not password as
are false include spaces read only
include left justified
a document file
a .ppt file can not can be inserted
not be inserted at in the current
specified position in document at
the current specified
Which of the following statements are False document position
Drop Cap tool does not work for the contents in
the table format true false
The user can split the screen only into two parts
in
TheMS-Word
special symbols that are inserted using true false
"insert symbol" option of the word can not be
printed by the printer as they are not standard
keyboard symbols true false
The "format columns" option allows to create
columnar text up 12 columns only. true false
The document that makes the user to organize
and maintain a long document, such as
multipart report or a book consisting of chapters Master Document Child Document
The view that enables us to view how objects
will be
The positioned
mode on the page
that is initialized when it to
or toggled is printed
if the Print Layout View Page Layout
user is in a position to overwrite the text in the
word Insert Mode Type Over mode
Veena is entering a paragraph in a word
processing program. When the cursor gets to
the end of a line, what is the best way to get the press the return
cursor to the next line? key press the tab key
How are data organized in a spreadsheet? layers and planes lines and spaces
Which key moves the cursor to the beginning of
the next line of text? tab enter/return
Veena typed the following sentence: "The girl
was very beautiful." In which word processing
utility could she find a synonym for "beautiful"? grammar checker spell checker
send a public
message to friends
Using an electronic bulletin board, Seema can interested in one send pictures to a
do all of the following except which one? topic friend
Aryan has created a ten-page story, but only
wants to print the first two pages. What printer
command should he select? Print all From ___ To ____
What process should be used to recall a
document saved previously? Enter Copy
Which is used to indent text within a document? closing tabbing
Desktop publishing is a more sophisticated form
of which of the following types of software? database graphing
Creating and
editing
What is a Word Processor used for? To analyse figures documents
What is a picture that is saved on a diskette and
can be pasted into a document? subscript annotation
Creating and
editing
What is a Word Processor used for? To analyse figures documents
What basic tools would you find in the Edit Clear, replace and Spelling, grammar
menu of a word processor select and autocorrect
Numbers which
Text at the bottom appear on every
What is a header in a document? of every page page
Mouse, printer
and processing
system Keyboard, Mouse,
What hardware is essential for a word? keyboard? monitor and printer
The user could take a picture from a magazine
and insert it into the document by using a Browser clip-art file
Clear, replace and Spelling, grammar
What basic tools would you find in the Edit Toolbars and autocorrect
Assume you are creating a two-column
newsletter. Which type size is the most
reasonable for the text in the columns? 6 point 10 point
Given the default left and right margins, and ½-
inch spacing between columns, the width of
each column in a two-column document will be: 2½ inches. 2¾ inches.
While word processing, in which of the following to store a file on to store a file on a
situations would Tom use the "Copy" command? the hard drive diskette
Data about a set of
What does a document contain? similar things Mainly text
Before submitting your work you want to find
any words spelt incorrectly. Which of the
following would you use? Thesaurus Spell Checker
What command in a word-processing program
can be used to change the word ‘him’ to ‘her’,
and also the word ‘he’ to ‘she’ in the given
phrase? “On a cold and still night, the only
sound that could be heard was the owl that had
ade its home in the nest outs Paste Replace
What edit commands would you use to insert a
paragraph from one document into another
document, while still keeping the paragraph in
the first document? Copy, then paste Cut, then paste
To give the original
To give the original author a chance to
author a chance to reject suggested
Which of the following statements would NOT accept suggested changes from the
be a reason for showing suggested revisions in a changes from the person who
Word document without changing the original person who entered entered the
document? the revisions revisions
A red underline
A line appears appears beneath
Which statement is NOT true regarding revisions through text that is text that is to be
made in a Word document? to be deleted. added.
Through the Edit Through the Tools
menu by choosing menu by choosing
How are suggested changes entered for review Track Changes Track Changes
on an initial Word document? command command
The Versions
command will The Versions
allow you to save command will allow
multiple versions you to save only
of a document, one version of a
including any document,
changes that including any
may have been changes that may
Which of the following is TRUE about saving a made to that have been made to
document using the Versions command? document. that document.
The latest
All versions are version is
What happens when you open a document that opened opened
has been saved using the Versions command? automatically. automatically.
You have used the word ‘discover’ four times in
an English essay you have created using a word
processing program. You would like to find
another word of similar meaning to use instead
of ‘discover’. Which of the following would you
use to do this? Dictionary Grammar check
Word displays a The most recent
When opening and working with multiple list of the dates version will appear
versions of a document, how can you tell which and times each at the bottom of
is the most recent version? file was saved. the list.
Various fields are added to a regular document
to create a special document called a form
through the ____________ toolbar. Fields Tools
Which of the following types of fields CANNOT
be inserted into a form? Check boxes Toggle button
Which of the following is TRUE related to editing Comments cannot Comments cannot
comments in a Word document? be edited. be deleted.
Numbers which
Text at the bottom appear on every
What
In youris English
a header in a you
essay document?
notice that the of every page page
paragraph at the bottom of page 1 continues on
to page 2. You would like to make this
paragraph start on page 2.What would be the
best way to do this? Press tab. Press Return.
Tables in a document help you to easily arrange
all of the following EXCEPT: text. graphics.
To identify a document, it is helpful to include
the file name on each page as a header/footer. bibliography.
Which of the following tools will copy the
formatting of selected text to other places? Copy button Paste button
What is the name of the process of determining
the cause of errors in a macro? Fault Finding Bug Squashing
Drop caps are added to a Word document using
the ___________ menu. Insert Tools
a section of text
where the first
a section of letter of each
white text on a sentence is
black lowercase and the
A reverse in a newsletter is: background.
setting it in rest are uppercase.
larger type or typing it all in
A pull quote is best emphasized by: font size. capital letters.
same as same as
Multiprocessing is multitasking multiprogramming
To help keep sensitive computer-based
information confidential, the user should save the file set up a password
to read from or
to calculate write information
What is the function of a disk drive? numbers to a floppy disk
A 4GL is Uses Cobol uses Java
A nanosecond is 106 sec 103 sec
What small, hand-held device is used to move
the cursor to a specific location on the screen? a keypad a mouse
data to be data that has been
transferred to transferred from
The memory address register is used to store memory memory
data to be data to be
transferred to or transferred to the
The memory data register is used to store from memory stack
an instruction that
an instruction that has been fetched
The instruction register stores has been decoded from memory
Which of the following is used to indicate the
location on the computer monitor? a cursor a scroll bar
A mathematical procedure that can be explicitly
coded in a set of computer language
instructions that manipulate data. Formula Algorithm
Which of the following translates a program
written in high-level language into machine
language for execution? Assembler Compiler
Detecting errors in real memory is a function of Memory protection Parity Checking
To find where a file has been saved on disk, the use the directory search each file in
user should search tools turn
A series of instructions telling the computer how
to process data or files is defined as a Network
save copies of the Program
file with the same use different
To ensure that data is not lost if a computer name on the filenames on the
system fails, the user should system system
Having a single CPU alternatively process tasks
entered from multiple terminals is called Multiprocessing Time sharing
The place in the CPU where the data and
programs are temporarily stored during
processing is called the ROM RAM
access to the
The advantage of a PC network is that internet is quicker files can be shared
The term A:\ refers to a file name a subdirectory
up-line provider
UPS stands for universal port serial service
the program
executable may
The main problem associated with uninstalling orphan files can be not allow it to be
software is that left on the system uninstalled
You are conducting research for a Income Tax
assignment. The raw facts you collect are called data. documents.
Graphical Rules writte in
representation of procedural
A flow chart is the logic language
Purchase, sales,
receipt, payments To fill the log
A voucher entry in Tally is done for etc. register
assist in
Passwords are applied to files in order to maintenance speed up access
Each of the following is an enabler of IT-business senior executive IT management
alignment except: support for IT. lacks leadership.
The basic systems model is used to describe
virtually all information systems and it consists
of the following elements: input. output.
The use of
computers to
design state-of-the-
art, high-quality Using computers to
What is a computer-aided design system? products. do architecture.
A(n) __________ offers a solution package for an specialist or Application Service
entire industry. functional Provider
ensure the
File extensions are used in order to name the file filename is not lost
Information systems controls include all of the
following EXCEPT: preventive controls. detective controls.
Hashing for disk files is called external hashing static hashing
Components of expert systems include: a)
inference engine; b) user interface; c)
knowledge base; d) fuzzy logic A: (a) , (b), (d) B: (a) to (d)
of: corrective controls preventive controls
What is the term used to describe the point of
interaction between a computer and any other
entity, such as a of
The advantages printer
CASEor human
tools are: operator?
a) Component Interface
reusability; b) maintainability; c) portability; d)
flexibility (a), (c), (d) (b), (c), (d)
Turn the computer
Which of the following is an acceptable way to Press the reset off at the power
shut down the computer? button. point.
Yesterday, in your music class you saved your
compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the Create the files Ask the person
best way to locate the files? again. next to you.
Components of an information system model
are: a) applications architecture; b) functional
architecture; c) technology architecture; d)
information architecture (a), (c), (d) (a), (b), (c)
organisational
Benchmarks form part of: detective controls controls
Continuity controls include: a) record counts; b)
date checks; c) label checks; d) run-to-run totals (a), (c), (d) (a), (b), (c)
Which is not part of help desk documentation: problem logging call lights
Testing of individual
Design phase of CASEmodules is knowna)as:
tools includes: data unit testing data testing
architecture; b) decision architecture; c)
interface architecture; d) presentation
architecture (b), (c), (d) (a), (b), (d)
specifications
Which is part of installation testing: benchmark testing matching
The computer operating system performs
scheduling, resource allocation, and data
retrieval functions based on a set of instructions Peripheral
provided by the: Multiplexer. processors.
Which of the following falls under multimedia
data: a) text; b) images; c) video; d) audio (a) to (d)
Replacement (b), (c), (d)
Which of the following procedures should be personal computers Identification of
included in the disaster recovery plan for an for user critical
Information Technology department? departments. applications.
Designing relationships among components is
part of: architectural design interface design
called: Client-server Client
Which network topology uses a Hub? Star Bus
Which of the following topologies is used for
Ethernet? Star Bus
To maintain a
backup copy of are To do a particular
written all the job such as editing,
Application software are programs information storing information
Which type of file search method requires a
computer first read all locations preceding the
desired one Direct Sequential
Data
Which of the following areas of responsibility are Systems analysis communications
normally assigned to a systems programmer in and applications hardware and
a computer system environment? programming. software.
Which of the following is recommended when A sequential file on A sequential file on
many searches for data are required a disk a tape
It is unlikely that a magnetic tape containing Tapes can only be
several thousand blocked records can be used read by the
on two machines of different architecture machine on which Parity errors will
directly because they are written result
Which component of the CPU has the most
influence on its cost versus performance Data path part Control Unit
Which of the following terms applies to network
used to connect computers with other
computers, peripherals and workstations that
are in fairly close proximity Distributed systems Local Area network
Use the computer
to which they are
Can send data to a connected to
computer and perform all
Intelligent terminals differ from dumb terminals receive data from a processing
in that they is to be linked to 8 terminals using a computer
A computer operations
single communication link. To permit
simultaneous terminal operations,
communication path will require which of the
following Mixer computer
Allows Modem
signals to be send
over a telephone Aids in back-up
A modem is a device that line procedures
A LAN includes 20 PCs, each directly connected
to the central shared pool of disk drives and
printers.
A Thisbased
computer type of network
system for issending,
called a Planetary network Ring Network
forwarding, receiving and storing messages is
called an Office Automation Executor systems
If a workstation contains a processor, monitor,
screen manipulation device, printer, storage and An intelligent
communication capabilities, it is said to be A dumb workstation workstation
Time of day control Encryption
Terminal hardware controls include locks algorithms
Feasibility study,
system design, and Implementation
What are the stages in the compilation process? testing and documentation
Which of the following is not a data transmission
coding scheme CRC Baudot
In what areas is the COBOL programming Financial sector and Graphic design and
language used? engineering education
an operating
Multiprogramming is a prerequisite for multitasking system
Second -
First - generation generation
UNIVAC Computer belongs to the computers. computers.
Timesharing is the same as multitasking multiprogramming
Name the first Indian Super Computer? Vishwajeet Deep Blue
slower than an
A compiler is a fast interpreter interpreter
Which printer among the following is fastest Drum Printer Dot - Matrix Printer
“Zipping” a file means encrypting it decrypting it
Very important Vital information
reader user resource under
What does acronym VIRUS stands for sequence siege
Electrically charged
An impact printer creates characters by using...? ink Thermal Paper
mainframe
A client-server system is based on technology LAN technology
A nanosecond is 10-6 sec 10-3 sec
A procedural control used to minimize the
possibility of data or program file destruction
through operator error is the use of Limit checks Control figures
_______ software enables users to send and
receive data to/from remote computers application system
A _____ is a running instance of an application project model
Splitting of CPU's time for different tasks
_______ prevents time slicing multiprocessing multithreading
______ computers are used in large organizations
for large scale jobs which have large storage
capacities mainframes super computers
_______ is responsible for all calculations and
logical operations that have to be performed on arithmetic and
the data control unit logic unit
______ printer use laser light band printer drum printer
______ software enhances the user to enter
,store, manipulate and print any text data management word processing
______ software enables users to send and communication
receive data to/from remote computers integrated software software
_______ is the temporary storage place for
deleted files my computer recycle bin
_____ is a collection of related fields field file
_____ language consists of strings of binary
numbers
______ symbol is used to represent processes assembly language machine language
like assigning a value to a variable or adding a
number terminator symbol processed symbol
& ^ A
Accounts Puchasing,
payable and Receiving and
Receiving Accounts payable D
Four One A
Ctrl+T Ctrl+D B
Display
Information All of the above D
F6 F7 C
Shift+P None of the above A
A
Electronic Data
Interchange. All of the above C
A
4 5 C
18 21 B
electronic data
analysis All of the above B
F6 Alt+f5 B
Primary Cost
Category All of the above C
10 to 60 None A
Ctrl+f2 Ctrl+f4 A
A and B None of the above C
A
F8 F9 C
F10 F11 B
F11 F12 A
Budget None C
A
Symbol None of them B
A or b None A
A
28 16 C
Sub-Groups B or C A
Data Entry TallyVault A
Capacity
Planning Exception reporting C
Analysis, System
Design, and
Implementation None of above A
JCL none the above A
A
to obtain a
record layout extract data from file A
absence of audit
trails all the above D
use of any
programs none of the above D
A
conceptual/physi
cal all of them D
A
A
enable multiple
user resource
sharing all the above D
B
model base all the above D
B
report files none of the above D
deletion addition B
A
software and
database safety and database B
B
basis none of the above B
A
B
random
placement of
component none of the above D
A
none of the
above all the above A
none of the
above all the above A
A
A
B
interactive data
innumerable
analysis none of the above B
big-bang stub C
hybrid tests all the above D
re-perform B
procedures
carried out by
the clients
programs all the above D
A
B
A
A
can provide the
auditors with
useful
information with
trend s and
patterns all of the above D
A
examination of
source code of
a program with
advice to
following the
logic of a
program none of the above C
ALC ACLL B
A
analyzing the
picture of a file
or data all the above A
A
none of the
above all the above A
identifying non-
standard code all the above D
A
resource
requested all the above D
A
stratification and
frequency
analysis all the above D
examining the
quality of data all the above D
Can aid in simple Can define the
selection audit objectives D
High End CAATs
A special All of the above D
purpose written
program None of the above A
Compliance tests
of general EDP
controls All of the above D
General
Event Procedures Procedures D
chart macros D
comments action D
expression
builder expression elements C
expression
elements list
box none of the above C
datasheet justified B
insert delete B
A
RAID none of the above A
message none of the above B
pesos yen A
235 63500 A
B
Dynaset field
properties properties B
append simple D
sorting querying C
pipes gateways A
@ ? D
B
DATE() DAY() C
combo box static text B
table ledger A
module none of the above A
bitmap report A
25,000 64,000 D
report hyperlink D
1 B
A
B
B
both 1 and 2 none of the above C
A
B
delete query append query B
B
A
B
A
B
stand alone sub chart D
B
B
B
A
primary key
field none of the above C
attributes entities D
append add A
A
B
use datasheet in
forms use export D
B
B
A
A
? * D
A
group topic C
A
A
B
range logical C
B
event -
procedural
based
language none of the above C
query table B
B
session detail D
A
inner form none of the above A
labels report B
index identifier B
sorts forms A
unbound none of the above C
macro table B
field layout B
Component Source D
keeping the
original paper saving the file with
copy different filenames A
browser e-mail A
wildcards engines C
Many-to-many Many-to-one B
EmployeeLastNa
me CompanyAddress A
The one-to-many
The join line relationship B
¥ * C
The Loans
table at any
time Neither table C
title bar text, title bar text, icon,
prompt, icon. prompt. B
CreateList. Sub. B
A drop-down
list enables the
user to choose
from one of
several A drop-down list
existing enables the user to
entries. enter text. C
does not have must be set for two
to be set. words. C
create tables of maintain data on
rows and different things in
columns. different tables. A
metadata. all of the above D
information. a and b D
e-commerce
database
application a or b A
e-commerce
database
application None of above B
Structured
Query
Language Relational Question
(SQL) Language (RQL) C
Oracle a and b D
The database
management
system (DBMS) All of the above. D
as a redesign of
an existing
database a and b B
as a redesign
of an existing
database a and b C
entity-relationship
data models data modeling A
entity-relationship
data models data modeling B
entity-relationship
data models data modeling D
entity-
relationship data
modeling data migration D
relational data
network models model A
the order of more than one
the rows is column can use the
unimportant same name C
row field D
key tuple C
Nonintegrated
data None of the above A
Report Query A
Macros Spreadsheets D
Regardless of how
the objects and
tables are stored,
It is advisable to the user will have to
put each object reenter the data in
and table into a the tables when the
separate application is
database. upgraded. B
An application can
All objects in be created in such a
an application, way that it objects
including the such as forms and
tables, must reports can be
reside within changed without
the same disturbing the
database. existing data. C
Merge Join A
It contains a
user interface,
or switchboard It contains macros C
Interface Design Switchboard
Wizard Manager D
put key
business
information
into the hands
or more store all corporate
decision transaction data in
makers. one single location. C
Digital
Signature None of the above C
Institutional
Overhead None of the above A
Certificate
Authority None of the above A
B
Personal Digital
Certificate None of the above A
Personal
Digital
certificate None of the above C
certificate A
Revocation
Letter None Of The Above A
Private Key,
Recipient None Of The Above A
Transmission
File None of the above C
UNESCO UN/EDIFACT D
B
Public Key and Public Key and
Password Private Key D
Satellite Area
Network None of the above B
Glow sign or
hoarding
strategies All of the above D
Billboard Endorsements A
Billboard Broadcast C
Low cost of
operation Quality management B
Industrial
espionage Economic espionage C
A competitor’s new
Research data project B
e-commerce
database
application None of above C
Including the Using all capital
Subject letters D
Encryption
performed by a
physically Security at the
secure transaction phase in
hardware EDI systems is not
device is more necessary because
secure than problems at that
encryption level will be
performed by identified by the
software. service provider. C
numeric Boolean D
pmt count A
convert text to
columns wizard tip wizard B
sumif countif C
browser editor B
search for
database none of the above C
wincim or
maccim none of the above C
index glossary C
menu
search,item item search,index
search search C
lycos all the above D
ftp telnet D
Hyper text
transfer Hyper text transfer
protocol port C
site organization B
higher type
transfer protocol none of the above B
uniform resource
label name of the above B
frantically asked
question none of the above B
request close A
world search for
information and
research council none of the above B
mosaic,gopher none of the above B
verification on
network
integration and
communication none of the above A
university of
California net none of the above B
yahoo and
altavista none of the above B
ftp archive D
Delphi fidonet A
FCOLOR FONTCOLOR B
Communication
graphical Common Gateway
interface Interface D
Communication Connection B
Web Channel A
United relay
limited None of the above B
text or image image C
SGML CGI C
metalanguage none of the above C
pancake is not
edible none of the above B
symbols video C
hotword hotlink B
in user-defined
order none of the above B
classified general
instructions none of the above B
Browser User A
intranet none of the above B
smart network
and dumb
network none of the above B
file transfer none of the above B
Size Channel A
Browse Retrieve C
Electronic Fund
Transfers All The Above D
Formal Legal
Requirements,
Open System Open System D
Signer
authentication None of the above A
Encryption Cryptography C
Conducting Reviewing the
fraud-awareness systems-access
training. by the
Received log. D
intended Sent to the correct
recipient. address. A
The private key
is used by the
sender for The private key is
encryption but used by the receiver
not by the for decryption but
receiver for not by the sender for
decryption. encryption. A
Failure of server
duplicating Firewall
function. vulnerability. D
Backend-to- Business- to-
Business Billboard A
Endorsements Broadcast B
Catalog Broadcast A
.COM Domains A
Search and
discovery None of the above C
EFT Gateway D
Assembler EDI D
Consumer-to- Customer-to-
Business Company B
Euro Cash Endorsed Cash B
Service
Perspective None of the above C
Encryption Subscription C
3 4 B
Multi-dimensions A
B
It is often used to It is also used for
display share indicating
market prices fluctuations in
over a period of temperature
time changes B
Performing text
formatting. All of the above D
Source table
name. Pivot table item. C
N B
Multi-dimensions A
It can be
represented in 3-
dimensions B
SumIf A
tables worksheets D
It summarizes
the data by using
analytical
functions. A
tables database A
modal window C
2,2,2 6,8,10 D
the column is
too narrow to
show all the
digits of the
number either b or c C
flexibility of cost of initial set-
moving entries up D
database spreadsheet D
Gap Rows A
Drawing pictures Document filing A
click the
column click the column
heading label C
TAB INSERT A
constant. formula. B
* \ D
It is impossible to
D4^2 determine. C
SUM(H9:H11) G7*SUM(H9:H11) B
The phrase “active
It is displayed in cell” appears in the
reverse video. Status bar. A
By either
clicking in a
different cell or
using the By typing the
arrow keys to reference of the cell
move to a you want to move to
different cell in the formula bar C
The Cell Format The Font Size
command on the command on the
Edit menu Tools menu. B
the Save As the File Type
command on command on the File
the File menu. menu. C
View Window A
List Properties B
Both Insert and
Delete Clear C
Both Clear and
Delete Remove B
Fonts Margins C
View Edit B
mixed constant A
B$4 $B$4 D
#DIV/0! #DIV/0! B
#DIV/0! #DIV/0! C
The Paste Both the Cut and
command
cycle through Paste commands D
absolute,
relative, and
mixed cell cycle through
references. open applications. C
the Formatting Conditional
toolbar formatting B
Right-click a cell
and click the Edit Double-click a cell
Hyperlink and click the Insert
command. Hyperlink command. B
whether the cell
has an absolute
or a relative cell the value in the
reference. cell D
It is impossible to
determine from the
29/03/2008 information given. B
subtracting the
later date from adding the later date
the earlier one. to the earlier one. A
B1;G10 B1:G10 D
MAX SUM C
Pie Scatter C
Once a pie chart
has been chosen Once a line chart
it cannot be has been chosen it
changed to line can be changed to
chart. a pie chart. D
Transfer
information to a Use multiple
database sheets D
#VALUE! =(B2*(D4+C2) C
CARN NET A
newsgroups and
search engines none of the above B
application
servers,proxy
servers and web
servers none of the above B
bulletin
broadcasting
system none of the above A
very small none of the above B
windows stocks none of the above B
PINE Lynx A
Name Address B
Address Protocols D
Unauthorising Approving A
Exposure Hacking B
Address Protocols C
Port Pin B
CAN PAN A
hypertext
transfer hypertext tracing
protocol protocol C
New Information
Card None of the above B
Only printers None of the above D
Switches data
from incoming
ports to outgoing
ports. All of Above B
Bridges and
Hubs Hubs and nodes B
Packets None of the above C
Server Network PC C
If the hub goes
down, it brings If the hub goes
down all of the down, it brings down
nodes on that all of the nodes on
section all of the rings B
Star Mesh C
Star Mesh B
Linear Ring C
Star Mesh A
depend on the
transmission limited by modem
medium speeds C
Windows 95 Netscape B
must have a LAN
account All of the above A
common
gateway application protocol
interface interface C
interfaces a connects a
modem to a computer to a
computer network D
Windows
package Netscape B
is part of
Netscape None of the above D
Denial of
Service Port sniffing C
flood traffic C
switch hub B
a poor file server none of the above D
A worm Spyware D
Multiplexors LAN B
cookies and key loggers and
key loggers. worms. C
Changing the
Giving out content of a Web
disinformation page D
Disruption in All of the above
supply lines are correct. D
Shutdown of
Contaminating nuclear plant
water systems safety systems D
To obtain an
accurate inventory
of network related
To improve equipment and
system response parts and network
time
stop its nodes D
competitors update its prices
seeing their as soon as they
prices are changed D
USA People
Search Lycos Search B
Adware Spyware
make large B
amounts of money
by parking funds
purchase off- in their bank
shore property. account. D
Siphoning Hoaxing B
spam. viruses. B
Use a proxy Use anti-spyware
server. software. B
Message
sequence Logical access
number checking controls B
www telnet C
Increases boot Misleads a program
up time recompilation B
both HTML and
Microsoft Excel Internet Explorer B
round trip HTML
document. Web browser. B
DHTML. MHTML D
clicking a
hyperlink that
references a
document that is viewing an Excel
stored in the worksheet that you
floppy drive on have saved as a Web
your computer page. B
Go to the
History page
and look for Go to the Bookmarks
the site or Favorites page C
the Update the External Data
command command A
Sound Video C
JPEG TIFF C
Add it to Cut and paste it to a
‘Favourites’ or word processor
‘Bookmarks’. document. C
privileged
network. network topology A
a footer. an encryption. B
IPP PoIP A
Desktop server, Desktop server,
application, and software, and
database. hardware. A
Telephone line None of the above B
File Transfer
Protocol None of the above C
So email is
delivered faster None of the above A
High volumes
of email None of the above C
squares icons C
grid guide C
movelast,false eof,true D
movefirst,false bof,true D
number() val() D
square oval D
itemcount listcount D
label inputbox() D
dbopensnapshot dbopendynaset D
unload initialze C
transparent graphical D
green black B
blue white D
project explorer
toolbox window D
project explorer
toolbox window A
text gotfocus D
container none of the above C
initialize activate D
value style C
.ctr .ocx B
Check Audit A
On Error Resume
On Error Stop Next D
Refresh Resize A
UnloadMode UnloadMode
parameter to a parameter to a zero
non-zero value value A
Class module,
code module None of the above A
Place code in the
Deactivate event None of the above B
Refresh PaintPicture A
Msgbox Msgbox
error.number & error.number &
error.text error.description D
To provide a
repository for
To allow the images used by
editing of icons other controls D
GetFile GetBytes A
GetProperty Value B
Windows
explorer Input box D
Multi-Line Font C
KeyUp and KeyPress, KeyUp
KeyDown and KeyDown D
ScaleHeight and
ScaleTop x and y A
Value CurrentVal B
SetAttr CStr A
Are actually not
properties None of the above B
Deactivate Terminate C
18 36 C
pie linear A
slides slide sorter views C
data stream B
five eight B
copying moving B
displayed only in
outline view none of the above A
7.5 inches,5
inches none the above B
templates add-ins A
when the slide
show is run none of the above C
contains sample
presentations for provides
a variety of suggested content
topics and design D
user can insert
picture to the user can insert
master slide picture to the title
which gets slide which gets
reflected in all reflected in all the
the slides using slides using that title
that master slide slide B
in notes pages
view, drag the I slide view, drag the
slide icon to a slide icon to a new
new location location C
user should
select the slide the slides can be
view to add the reordered in the
text to the slide outline view B
the slide that
holds the
design template formatted
is the template placeholders for
whose format the title and
and color subtitle for the
scheme user presentation is
applies to a called a title
presentation template D
grammar
checker none of the above B
102 22 B
The datasheet
window is toggled
The datasheet is from closed to
saved as a open (or from
separate file. open to closed). D
The application that
The chart is created the chart is
doubled in size. started. A
The chart is Microsoft Graph
doubled in size. will restart. D
a slide one bullet
item at a time,
build bullet items
a letter at a time,
and build bullet
bullet items one items a word at a
word at a time. time. D
Subtle, Moderate,
Exciting or Exciting D
Both enter and
exit, and fly in Neither enter nor
from top or exit; neither fly in
bottom from top nor bottom C
Alt Ctrl B
Custom animation
can be used to
affect the way
objects appear on
a slide, to what
objects do after
they appear on a
slide, and to the
the way objects way objects exit a
exit a slide. slide. D
The advanced
timeline shows The advanced
the sequence timeline shows
in which neither the
objects will sequence in which
appear on the objects will appear
slide and the on the slide, nor the
duration of the duration of the effect
effect applied applied to each
to each object. object. C
Clips, organization
Text charts, and text D
OLST. OLIP. B
You cannot
change the style
of the connecting You cannot change
lines in an the color of the
Organization boxes in an
chart. Organization chart. B
[Alt+Z] [Ctrl+Z] D
.frm .frx B
recordcount count C
addnew additem C
additem addnew B
moveprevious movefirst C
UnloadMode UnloadMode
parameter to a parameter to a zero
non-zero value value A
decimal rotation D
database forms A
0 11 A
print preview
from the file none of the above A
ctrl+f ctrl+m A
ctrl+f ctrl+m D
CTRL+SHIFT+S CTRL+SHIFT+P A
ctrl+shift+s ctrl+shift+p C
Maintenance,
reliability, and
upgradeability None of above B
To maintain
security None of the above D
Transferred from the
Saved to the disk disk A
Users operate
the manual
system None of above B
Users continue
operating the old
system None of above A
User Guide and
technical
documentation None of above C
User guides
cover how to
run the
system, enter
data, save,
print, etc. None of above C
Database
systems and
backup services None of the above A
Address bus
Data structures Control Bus D
that are part of
the kernel of an Shells, compilers
operating and other useful
system. system programs. D
DRAM CROM A
bytes Hertz D
secondary secondary storage
storage capacity access time B
have medium use variable size
clock speeds instructions D
CD-ROM e-mail D
to run more
than one
program at the
same time none of the above C
multiuser none of the previous C
ctrl+end ctrl+home B
AutoShape Border A
Page Layout none of the above A
WordArt Bullets D
AutoShapes files C
alt+f8 alt+f5 A
sgml vb script A
arpanet LAN A
field names in
the header
source must the number of fields
match any names in the header
merge fields source must be the
you've inserted same as the number
in the main of data fields in the
document data source B
by default cell
height and
weight option delete cells option
applies to all allows to delete the
the rows and entire row or a
columns of a column or shift cells
table up or shifts cells left C
justified top A
If a header is
inserted in the A section is a
second section portion of a
then the same document in which
header is certain page
applicable to the formatting option
first section can be set D
A
A
password can be
password are not upto 15 characters
case sensitive long B
hanging top A
a multiple an .xls data can not
documents files be inserted at
can be inserted specified position in
in the single the current
document document B
Hyperlink
Document none of the above A
thesaurus outliner C
send private
messages to a send a package to
friend a friend D
Retrieve Save C
spacing sorting B
Storing
information None of the above B
Monitor,
keyboard and
mouse None of the above B
15 point 25 point B
impossible to
3 inches. determine. B
Word cannot display
You have not columns during
specified editing; you will see
continuous them only when you
section breaks. print the document. A
to move a to leave an
section of text original section of
from the original text in place while
location to pasting a copy
another location elsewhere D
A set of different
graphics None of the above B
Grammar
Checker Find and Replace B
Delete, then
paste Insert, then paste A
To complicate
the revision
process and to
force the To allow multiple
author to people to work on
spend more one document in
time making collaboration with
corrections one another C
A vertical line
outside the left
margin signifies
a change has Comments are
been made at enclosed in a text
that point in the box at the right of
document. the document. D
Both through the
Through tools on Tools menu and
the Reviewing the Reviewing
toolbar toolbar D
The Versions
The Versions command will allow
command will you to save only two
allow you to save versions of a
only one version document: one
of a document version of the
without any original and one
changes that version of any
were just made changes made to the
to the document. document. A
The first and
second versions The previous version
are opened is opened
automatically. automatically. B
Spell
Word check
will show Thesaurus A
the name of the Word is not able to
person who tell the most recent
saved each version of a
version. document. A
Forms Insert C
Text fields
Comments can
A drop-down list B
be edited or
deleted by Comments can be
right clicking edited or deleted by
the highlighted left clicking the
text. highlighted text. C
Text which
appear at the
top of every
page None of the above C
forms. numbers. C
find/search. macro. A
Format Painter This action is not
button possible. C
ss Debugging D
Format
the guidelines
Edit C
used to establish
where different an enlarged capital
elements of the letter at the
newsletter will beginning of a
go.
underlining the paragraph. A
text of the pull
quote. changing the color. A
A grid is a set of
A dropped cap is horizontal and
a word that vertical lines that
starts with a determine the
lowercase letter placement of
when it should elements in a
have a capital newsletter or other
letter. document. D
The tab spacing
The number of within each
columns column D
12 72 D
Three Four B
Press Enter to
create a Press Shift+Enter to
section break. force a line break. C
A serif font at 20 A sans serif font
points at 45 points D
It depends on the
left and right
margins, and how
many columns are
4 inches specified. D
Program Data B
Artificial
Intelligence Parity Checker B
Range checking Validation B
use the backup
facility use find and replace A
System Modem B
keep a record of
computer backup to a secure
failures medium D
Multiprogrammin
g Multiplexing D
Telephone
modem Shareware A
Indexed Random C
Sound Video D
Ink-jet Drum B
recording current
stock in a
presenting an supermarket and
order for stock to answering customer
a warehouse. queries. A
regularly updated once a year C
Graphics
package Spreadsheet D
retain
confidentiality of simplify file
files structures C
4096 8192 C
virus infection loss of data D
IPX/SPX NetBEUI A
printer can do the operating
1000s of pages a system is easy to
day use B
the root directory the hard drive D
uninterruptable
power supply
the system uniform page source C
requires a the system always
network requires a re-boot
administrator to and defrag
uninstall it afterwards A
information. text. A
Logical Steps in
any language None of the above A
It is mandatory
in tally None of the bove A
prevent
unauthorised
access allow encryption C
IT understands
the business None of the above B
enterprise local B
identify the file identify the file type D
corrective All of the above are
controls. parts of IS controls. D
dynamic hashing extensible hashing A
Settings Control B
To help someone
who is applying To Store data in an
for employment organised manner B
Binary Indexed B
Operating
systems and Computer
compilers. operations. C
A direct access A direct access file
file on a disk
Information on a tape C
formats
commonly vary Data record can
between never be blocked
architectures together C
Address
calculation part Input output channel A
Wide area
network Protocol B
Time sharing
Multiplexor computer C
A personal
computer A mainframe PC B
ASCII
a general
EBCDIC A
purpose
language
providing very
efficient
execution None of the above A
Frequency
division Time Division
multiplexor Multiplexor C
Low-level
languages None of the above C
It is less prone to
attenuation
Accounting Uses only one path D
systems,
commercial
sector None of the above C
Relieve the main
CPU of repetitive Reduce competition
communication between the
tasks input/output devices C
Ring Bus B
CD-ROM
provides drive
backup None of the above A
power in the
event of a power
cut none of the previous C
Light sensitive
elements None of the above C
5 Mb 1 Gb B
output input A
Numeric Keypad Printer B
Joystick Scanner C
Reading Bar
Codes Digital Signatures B
Pixies Pickers B
Pointing device CD-ROM A
Optical mark
reader None of the above
SSGA displays none of the previous B
word processing
keyboard layout software C
Optical mark
reader None of the above B
interface an operating system C
Smart card None of the above A
writing programs
in multiple
languages none of the previous A
writing programs
in multiple
languages none of the previous B
To run more than
one program at
the same
Third - time none of the above C
generation Fifth - generation
computers. computers. A
Multi-user none of the previous A
Param Arjun C
is due to bad
disk blocks none of the previous C
Magnetic Ink
Character
Recognition Image Scanning
Technology Technology B
converts a
program to
machine code none of the previous C
Desk - jet Printer Thermal Printer A
compressing
Virtual it transmitting it C
information
reader & user
system None of above B
An inked ribbon and
An ink pen print head D
Unix operating
WAN technology system B
10-12 sec 10-9 sec D
External file
labels Cross footing tests C
multiplexing multitasking D
central
processing unit none of the above B
printer none of the above C
electronic
spreadsheet none of the above B
dummy
terminals dummy servers A
windows NT LAN D
two many A
network relational database
database system system D
constraints traps B
Simple Mail
transfer protocol None of the above. C
package system A
PCs mainframes D
feed write A
multiplexing multitasking D
converter process D
ram output D
non-impact
desktop printers thermal printers C
monitor,
program, CPU, memory, input,
keyboard, bus output D
windows 95 interpreter B
software's procedures C
assembler coder B
assembler processor C