Mcq Basic Itt

You might also like

Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 210

No Question

1 _____ gives the balance for each day for the voucher type has been selected.
_____ in Tally classify the accounts under different heads so that summarised information is
2 possible.
3 _____ --- is/are useful for management in the decision making.
4 _____ statements help management in the decision making process
" The buyers can follow up with the suppliers to determine the reasons " is an example of _____
5
6 "Administrator" type user is also called 'Auditor' of a company in Tally
7 A _____ is a primary document for recording all financial transactions.
A _____ purchase orders data flow is directed to the purchasing system for use in closing out
8 the outstanding purchase orders in the receiving system diagram.
9 A constituent(member) company can be a member of more than one group.
10 A created company's detail can be modified through keys
A Group Company is _____ _____ given to the merged accounts of member companies of the
11 group.
A Group Company is simply a name and an identify given to the merged accounts member
12 companies of the group.
A voucher entry in Tally is done for
13
A/An _____ is the official notice that the firm sends to its customers to advise then to the
14 amount of money that is owed.
15 Accounts Receivable are displayed in
Accounts receivable report provides a clear picture of outstanding for __________ in Tally
16
By pressing _____ key, a list of inventory reports can be displayed straightaway from the balace
17 sheet report
Ctrl + N is used to _____
18
Customers can be permitted to enter their own data into the firm’s computer using the firm’s
19 wide area network is an example of

Default ledger accounts in tally are ______


20
21 Default Cost Category in Tally is/are _____
22 Default 'godown' name in tally is _____
Default ledger accounts in tally are ______

23
24 Default number of groups in tally are ________
25 Default stock category in tally is ______
26 During voucher entry _____ are used.
27 Each action/transaction of a firm is described by a _____ .
28 For 'stock journal' entry we press ______________ in tally
29 From voucher entry mode , if we press ______ then we get payment voucher in tally
Import and Export of data between Tally and other programs is possible only through _____
30 Program.
In an accounting information system, which of the following types of computer files most likely
31 would be a master file?
In ratio analysis report of Tally FA packagewe we press _________ function key to the display of
32 bills receivable , bills payables report
33 In tally budget can be on ______________
34 In tally you get currency symbol option from _______ menu
35 In tally, a group company can also be a constituent(member) of another group company
36 In tally, to change the date of the voucher press ______
In Tally, Types of Accounts and Types of Vouchers passed during the period, can be seen in
37 _____ report.
38 In tally, types of users are _______________
In tally, we can alter ledger details using either single or multiple modes but not alble to delete
39 a ledger from multiple modes.
In tally, we can alter ledger details using either single or multiple modes but are not allowed to
40 delete a ledger from multiple modes.
41 In Tally, we can customize the Vouchers as per our requirements
42 In Tally, we press _____ , to print report .
43 In tally,"credit note" voucher type records entry for ________________
44 In tally,a group company is marked with an ______________
45 In tally,a member company can be a member of more than one group company
46 In tally,all masters have ________main options
47 In tally,all the masters have ________main options
48 In tally,during voucher entry ________________ are used
In tally,in ratio analysis we press ________________ function key in the display of bills
49 receivable , bills payables report
50 In Tally,inventory valuation method option is available from _______
51 In tally,the group company must contain at least _____________ members
In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger
52 accounts into one line statements
53 In tally,to cancel a voucher entry we press ______________
54 In tally,to create a new column in balance sheet press _______
55 In the Tally Software, the _____ directory stores all data entered by the user.
56 Method of voucher numbering is Tally5.4 is/are ________________
57 Method of Voucher Numbering is/are
58 Projected approximation of income or expenses is called ______________ .
59 Revenue Account also known as _____ Account
60 Tally allows to delete a ledger from _____ alteration mode.
Tally audit feature is available in a company __________________
61
62 Tally can maintain budget _______________
63 Tally can maintain budgets on _____
Tally can maintain company type 'accounts with inventory' by activating feature integrate the
64 accounts with inventory
65 Tally encrypts and stores TALLY DATA at the data directory
66 Tally is based on mercantile accounting system
67 Tally provides _____________ different predefined voucher types.
68 Tally provides at least _____ predefined voucher formats
Tally provides the capability to the administrator/auditor to track changes in the areas is/are
69

Tally supports Importing of data from _____


70
71 Tally vault' is a _________________
72 The ------ key can be used to select an existing company from list of companies.
The systems that work together to order,receive, and pay for replenishment of stock are _____
73
The _______ file maintains data that describes the supplier past transaction with the firm in
74 terms of material quality in AIS
75 The accounting masters and inventory masters related to
76 The accounts payable system is responsible for paying the suppliers for the _____
77 The field can have a value between ________________ in FA Package.
78 The Ledger Accounts are unique in Financial Accounting Packages
79 The most beneficial advantage of ERP system is
80 The number of steps in Accounts Compilation are
81 The Profit & Loss statement can be displayed in _____ format(s).
82 The re-order point is the inventory quantity that trigger a stock replishment activity.
The value of the inventory is included in a ledger accounts as an asset on the balance sheet
83
84 The value of the inventory is included as an asset on the balance sheet
85 To assemble a product from different items _____ entry is used
86 To cancel a vourcher entry in Tally, short-cut key is _____
87 To change the period in tally press ______
To create a log of the import activity in a file _____________ is located in the same directory as
88 an executable program in tally
89 To create a sales voucher in tally , you have to press _______
90 User designated as _____ can view audit list.
We press _____ function key to display the age-wise analysis of Bills Receivable or Bills Payable
91 report
92 What is the default financial year in Tally9 R1

Which of the following is an advantage of a computer-based system for transaction processing


over a manual system? A computer-based system:
93
94 You will get company information , if you press __________ from gateway of tally
Option 1 Option 2 Option 3
Trial Balance Daybook Balance Sheet

Ledgers Groups Journals


Cash Flow Statements Fund Flow Statements Ratio Analysis
Cash Flow Fund Flow Cash Flow & Fund Flow

management by objective management by exception electronic data analysis


TRUE FALSE
Ledgers Reports Vouchers

Filled Receipt Issue


TRUE FALSE
F3 ALT+F3 CTRL+F3

a name an identity A and B

True False
Purchase, sales, receipt,
payments etc. To fill the log register It is mandatory in tally

Invoice Bill A or B
Balance Sheet Profit & Loss Journal Book
Customers Suppliers A and B

F9 F10 F11
Display stock valuation
method Open Calculator Change Period
Enterprise Data - Electronic Data
Enterprise Data Interchange Information Interchange.
Balance sheet & profit &
loss profit & loss and trial Profit & loss and trial
balance balance Cash and profit & loss
Main Location Primary Primary Cost Category
Primary Main location A or b
Balance sheet & profit & Profit & loss and trial Cash and profit & loss
loss profit & loss and trial balance
balance

128 228 28
Main location Primary Symbol
Ledger Accounts Groups Sub-Groups
data element data record Field
F7 Alt + F7 F10
F4 F5 F6

Tally ODBC Tally IMP Tally INI

Inventory subsidiary. Cash disbursements. Cash receipts.

F6 function key Alt + f6 function key F7 function key


Closing balance Net transactions Both a and b
Company creation Stock items units Regional setting
TRUE FALSE
F2 F4 Ctrl+f2

Tally Audit Statistics Day Book


2 3 4

TRUE FALSE
1 FALSE

TRUE FALSE
Alt+P Ctrl+P Shift+P
Sales return Purchase return a or b
* $ &
1 FALSE
Two Three Four
Two Three Four
Groups Ledger accounts A or b
F6 function key Alt + f6 function key F7 function key

Stock summary Stock journal Stock analysis


Two Three Four

TRUE FALSE
Alt+x Alt+d Alt+c
Ctrl+C Alt+C Alt+Ctrl+C
Bin Data Sub
Automatic Manual None
Manual Automatic None
Balance sheet Profit & loss a/c Budget
Personal Nominal Real
Single Multiple A or B
By pressing F11 function During the creation of a In 'comp info -> security
key company control' option
On net transactions On closing balance Both a & b
Net Transactions Closing Balance A and B
1 FALSE

True False
FALSE TRUE
4 11 16
11 16 18
Changes in transactions or
vouchers Changes in Ledger Masters Both A and B
One company to another Other programs - a
company created withon spreadsheet or a database
Tally Package file. Both A and B
Security mechanism Ledger a/c Cost category
F1 ALT+F1 CTRL+F1
Puchasing and Accounts Accounts payable and
payable Puchasing and Receiving Receiving

Supplier Suspense Order


Create Information Alter Information Display Information
Sales Purchases A or B
0 to 9 1 to 100 10 to 60
True False
Error checking Data Integration Low cost of operation
2 3 4
Horizontal Vertical A or B
TRUE false

FALSE TRUE
1 FALSE
Journal Stock Journal Physical Stock Transfer
Alt+D Alt+X Ctrl+T
F2 F4 Alt+f2

Tally.imp Tally.ini A or b
F5 F7 F8
Administrator Owner Data Entry

F4 F5 F6
1-4-1995 to 31-3-1996 1-4-2006 to 31-3-2007 1-4-1997 to 31-3-1998
Does not require as Will produce a more Will be more efficient at
stringent a set of internal accurate set of financial producing financial
controls. statements. statements.
F3 Ctrl+F3 Alt+F3
Option 4 ans
None of the above B

None of the above B


All of the above D
None of the above C

All of the above B


A
None of the above C

None of the above A


A
None of the above B

None of the above C

None of the bove A

None of the above C


All of the above A
None A

F12 A

None of the above B

All of the above C

Cash and bank C


All of the above C
None of the above B
Cash and bank C

16 C
None of them B
B or C A
All of the above B
F11 B
Alt+f5 B

None of the above A

Payroll transactions. A

None of the above A


None C
None of the above A
A
Ctrl+f4 A

Journal Book B
1 B

A
A

A
None of the above A
None of the above A
^ A
A
Five B
Five B
None of the above B
None of the above A

None of the above A


One A

A
Ctrl+d A
None of the above B
None of the above B
All of the above D
All of the above D
None C
None of the above B
Mone of the above A

None B
None C
None of the above C
A

A
B
28 C
21 B

None of the above C

None of the above C


None of the above A
None of the above A
Puchasing, Receiving and
Accounts payable D

All of the above A


All of the above D
None of the above B
None A
A
Quality management B
5 C
None of the above C
A

B
A
Reversing Journal B
Ctrl+D B
Ctrl+f2 C

None A
F9 C
TallyVault A

F7 C
None of the above B
Eliminates the need to
reconcile control accounts
and subsidiary ledgers. C
None of the above C
No Question
1 A System Auditor can use CAAT tools to analyze data

A(n) __________ offers a solution package for an entire industry.


2
All material application oriented events that occur within the boundary subsystem should be
3 recorded in the accounting audit trail
Base case system evaluation includes____________

4
5 Black box testing and white box testing are part of:
Components of expert systems include: a) inference engine; b) user interface; c) knowledge base;
6 d) fuzzy logic
Computer operation controls are designed to provide ________________

7
Computer security is frequently associated with confidentiality, integrity and authentication
8
9 Concurrent use auditors as the member of the system
Database analyzer is a software which provides detailed information concerning the operation of
10 the database
Each of the following is an enabler of IT-business alignment except:
11
12 Errors are correlated_________
13 Field check is exclusive to a field
File extensions are used in order to
14
15 For computerized auditing usage of sophisticated audit software would be a necessity
For small to medium sized systems, individual modules are coded and individually tested and then
assembled to be tested as a whole-the testing strategy is referred to as ___________________
16
17 Hashing for disk files is called
In an accounting audit trail, intrusion detection system might monitor the amount of processor
time consumed by the user to detect unusual deviation from the amount processor time
requested by the user in the past
18
19 In framed checking the data entry is checked against an expected picture or format
In integrated test facility approach the auditor should ensure that the impact of test transaction is
20 subsequently eliminated from the computer files
In the file reorganization merging capabilities are needed in data from separate file is to be
21 combined on a separate work file
Information systems controls include all of the following EXCEPT:
22
On-line processing refers to grouping of transaction and processing the same in one go from start
23 to finish
Passwords are applied to files in order to
24
25 Recording transactions in a controlled manner may amount to loss of stored data
26 Regular cross system verification may minimize frauds
The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility
27
The basic systems model is used to describe virtually all information systems and it consists of the
28 following elements:

What is a computer-aided design system?


29
What is the term used to describe the point of interaction between a computer and any other
30 entity, such as a printer or human operator?
31 White Box Approach necessary involves expert knowledge on the part of Auditor
Option 1 Option 2 Option 3
0 TRUE

specialist or functional Application Service Provider enterprise


1 FALSE

fictitious data applied comparison of source analyzing the picture of a


against the client program version of a programmed file or data

corrective controls preventive controls detective controls

A: (a) , (b), (d) B: (a) to (d) C: (a), (b), (c)


the of by all concerned providing access to use of any programs
computer to all organization
personnel
1 FALSE

1 FALSE
1 FALSE

senior executive support for IT management lacks


IT. leadership. IT understands the business
at the year end immediately on quarterly basis
1 FALSE
ensure the filename is not
name the file lost identify the file
1 FALSE
e-brain bouncing ball big-bang

external hashing static hashing dynamic hashing


1 FALSE

1 FALSE
1 FALSE

1 FALSE

preventive controls. detective controls. corrective controls.


1 FALSE
prevent unauthorised
assist in maintenance speed up access access
yes no
1 FALSE

(a), (c), (d) (b), (c), (d) (a) to (d)

input. output. processing.


The use of computers to Software that generates
design state-of-the-art, Using computers to do innovated designs and
high-quality products. architecture. artistic patterns.

Component Interface Settings


1 FALSE
Option 4 ans

local B
A

all the above A

general controls C

D: (b), (c), (d) C


none of the above D

A
A

None of the above B


none of the above B
A

identify the file type D


A
stub C

extensible hashing A
A

A
A

All of the above are parts of


IS controls. D
A
allow encryption C
B
A

(a), (b), (c) C

All of the above D

None of the above A

Control B
A
No Question
1 ? Wildcard character represents any number of characters
2 _____ chart exists as a separate object
3 _____ header is a unique feature of reports
4 _____ is a collection of related fields
5 _____ section is present for each record in the report
______ are used to select only some particular records from the table or any other database
6 objects
7 ______ control combines the functionality of both a text box and a drop down list
8 ______ control need not have a data source
9 ______ forms are usually used for tables with one to many relationship
10 ______ forms displays field in single row
11 ______ function is used to display a message box
______ is a file management software package that lets users and programmers organize data
12 into files and then process those files

______ is fired when an event is triggered is the concept based on a Visual Basic language
13
14 ______ is used to convert any ms-access object into html format
______ queries can be used to delete a group of records that meet some specific records
15
16 ______ represents data in a pictorial format
______,______and_____are the buttons belonging to the options group
17
18 _______ are employed to select only some particular records from a database object
19 _______ are used to represent our data in graphical format
20 _______ control is tied to field
21 _______ control uses an expression as a source of control
22 _______ form displays fields in a single horizontal row
23 _______ is used for CAAT as database
24 _______ option in publish to web wizard produces a page that is static in nature
25 _______ query wizards are used to generate summary calculations for a table
26 _________ data type is generally used for fields assigned as primary keys in a table
_________ law basically states that there is a specific probability of the first digit of a no.
27 being 1,2,3 etc
28 _________ of the following is/are a type of chart
29 __________ is a software of CAAT
30 _________allows us to create a filter from a field short cut menu
31 ________is a database object which displays data but cannot be used to edit data
32 ________option is selected from the view menu to create macros with conditions
33 _______are forms that are included in other forms
34 _______can be used to automate certain actions in response to events
35 _______is selected from the toolbar to add an OLE object
36 _______is the file format that works on internet
37 _______is the form that can be created with minimum input from the user
_______is the name of the database object that displays data and can be used to edit data
38

_______is the wildcard character which represents the presence of any number of characters
39
40 _______is used to create a mailing label
41 _______layout of a form displays one record at a time
42 _______option from the file menu is selected to run 'publish to the web wizard'
43 _______query is used to add records from one or more tables into an existing table
44 _______query is used to create or change database objects in a current database
45 _______report can be created with minimum user input
46 _______window is used to write VB code in access application
47 ______allows to create a filter by typing the value in a data sheet
48 ______and_____are the two types of auto reports available
49 ______are used to jump to any kind of information from a datasheet or a form
50 ______can be used to create toolbars
______field is added to the macro sheet when we select grouping option from the view menu
51
52 ______header is present at the beginning of the report
53 ______is a datatype that assigns values automatically
54 ______is a form that summarize large amount of data
55 ______is present at the bottom of each page in a report
56 ______option from the insert menu option is chosen to add an embedded chart
57 ______option from the tool menu is selected for setting relationships between tables
58 ______queries allows us to view data in row by column manner
59 _____is a control that lists set of data
60 _____option from the new object toolbar gives the easiest way of generating a report

_____page in an web application is used to navigate to the rest of the pages in the application
61
62 ____is an access object that displays un-editable data
___is the name of the database object that displays data and can be used to edit data
63
___is the wildcard character which represents the presence of any number of characters
64
65 ___queries can be used to delete a group of records that meet some specific records
66 ___wildcard character represents any single character
__field is added to the macro sheet when we select grouping option from the view menu
67
68 A ________ sheet lists all the properties that pertain to the form or the controls
A blank database can be created using __________
69
70 A bound control is tied to a underlying query or table
71 A calculated control uses expression as a source of data
72 A collection of data stored in different objects is known as a _________
73 A combination of one or more columns used to identify particular rows in a is___ .
A combination of two or more columns used to identify particular rows in a relation
74 is________ .
75 A control can be bind to a record using row source property
76 A control without a data source is known as ___________

A Customer Resource Management (CRM) system is an example of_________


77

A data warehouse database differs from an operational database because:


78
A database designed to combine two databases used by the Sales department is a database
79 being designed _________________________ .
A database designed to implement requirements for a reporting application needed by the
80 Sales department is a database being designed _______ .
A database designed using spreadsheets from the Sales department is a database being
81 designed _________________________ .

A database is considered "self-describing" because _______ .


82
83 A database records:
84 A database stores:
85 A determinant that determines all the other columns in a relation is______ .
86 A field with a _______ uniquely identifies each record
A foreign key is:
87
88 A form can be bind to a record source using _____ property of the form
89 A macro can be made to execute before the starting of a database
90 A macro is performed only when the user initiates an event
91 A picture box combines the activities of both a text box or a list box
A program whose job is to create, process and administer databases is called the _____
92

A sales contact manager used by a salesperson is an example of _______________


93
94 A sample size calculator program assists auditors in determining RAND() function
A sequence check on the transaction or master files by an update program is not required
95
96 A sub form is used to display one to many relationship between tables
97 A system could be _________
98 A system exhibits 'entropy'
A text field:
99
100 A transaction file is sorted prior to the update of master file
A very popular development technique used by database professionals for database design is
101 known as _______________________ .
A very popular development technique used by database professionals to adopt a database
102 design to new or changing requirement is known as _____ .
103 Advanced filter uses a filter similar to the query design window to create a filter
104 All input records in a batch are normally of different types
All material application oriented events that occur within the boundary subsystem should be
105 recorded in the accounting audit trail
106 All of the following terms are related to computerized databases except which one?
107 An attribute is also known as a(n) .
108 An RDBMS is a
109 Analyse fields by arranging them into rows and columns is called

Application software suited to storing the survey information obtained in the table would be
110
111 Assembler language uses Mnemonic symbols
Assume a one-to-many relationship between the Customers table and the Loans table, with
referential integrity in effect. What happens when you attempt to delete a customer ID from
112 the Customer table that still has entries in the Loans table?
113 Audit should be periodically analyzed to detect any control weakness of the system

Audit software is used by the auditor to _________


114

Auditing with computer necessarily supports the


115
Auditors can combine functional capabilities of generalized audit software to accomplish the
116 task of __________________

Auditors cannot use generalised audit software to extract the data needed for audit purpose
117

Base case system evaluation includes____________

118
Batch is the process of ______ together _____ that bear some type of relationship to one
119 another
120 Between and Not Between is ______ type of operators
121 Black box testing is _______ based and white box testing is _______ based

Black box testing seeks to determine whether application output is what it is supposed to be
122
CAAT do not contains package programs, purpose written program, utility programs or system
123 management programs

CAAT involves an Auditors' appreciation of __________


124
CAAT's are computer program and data that auditor uses as part of the audit procedures to
process data if audit significance contained in an entity information system
125

CAATS provide added value to the clients because _______________


126

Changes from a master table can be reflected on to the child table by selecting _____option
127
128 Changes of one table can be carried over to another related table
129 Chart can either be a form or a report
130 Charts can be produced without the wizard
131 Charts can convert numerical data in a easily understandable format
Check digit is a group of nos. added to a code for determining the accuracy of other digits in
132 the code
Computer Assisted Audited Technique involves the use of computers through "Black Box
133 Approach"

Computer operation controls are designed to provide ________________


134

Computer security is frequently associated with confidentiality, integrity and authentication


135
136 Concurrent use auditors as the member of the system
Controls are present over many aspects of the computer system and its surrounding social
137 environment
Controls are required for authorization to ensure data integrity and detect possible breaches
138 in security
Core image comparison is a software used by the auditor to compare _______ version of a
139 program with a secure ________ copy

Core image comparison is particularly useful where only executable versions are distributed
140
141 Currency fields express the amount in _________
142 Data definition queries are used to create or change database objects

Data displayed in forms cannot be edited


143
Data from client application are not stored in the organization's database through auditables
144 events and function
Data reserve engineering process metadata to document system and abstract business rules
145 and relationship

Data Warehousing refers to


146
Database analyzer is a software which provides detailed information concerning the
147 operation of the database
Database professionals use ________________ as specific data sources for studies and
148 analyses.
Database professionals use a set of principles called ________________ to guide and assess
149 database design.
150 Detail section has a header and footer
151 DSS has the following components _________________
DSS is defined as a system that provides tools to managers to assist them in solving structured
152 problems

Duplication of records in a field won't be allowed if the fields are declared a________
153
Embedded audit routines are sometimes built into an entity's computer system to provide
154 data for later user by the auditor
155 Embedded charts exist separately
156 Embedded code is a software used by the auditor to examine backup data
157 Embedded code performs wide variety of audit task
158 Errors are correlated_________
159 Field check is exclusive to a field
File activity is the proportion of transaction file records that are actually used and accessed in
160 a given processing run:
161 File interrogation refers to the _____ of information from a file
File volatility refers to the number of addition and deletions to the file in a given period of
162 time
163 Filter by form can be created from a forms shortcut menu
164 Filtering data is a way of arranging data in a meaning full order
165 For computerized auditing usage of sophisticated audit software would be a necessity
For small to medium sized systems, individual modules are coded and individually tested and
then assembled to be tested as a whole-the testing strategy is referred to as
166 ___________________
167 Foreign key is a field that uniquely identifies each record and accept no null values
168 Forms that are included in other forms are called ______________
From ms - access, if we want to view the records stored in a table in ms - excel worksheet,
169 we need to
From ms - access, if we want to view the records stored in a table in ms - excel worksheet, we
170
need to

General purpose software provides a framework for highly complex scientific operation
171
Generalised audit software could be used by the following in consistencies or significant
172 fluctuations

Generalized audit software consists ___________

173

Generalized audit software function include____________


174
Generalized audit software is a file whose capabilities for verifying processing is logic
175
Generalized audit software perform auditors to undertake any past records and not
176 concurrent auditing

Group header will be present at the design view of a report even if the report is not grouped
177
Group header willbe present at the design view ofa report even ifthe report is not grouped
178
179 Hash totals means meaningless totals

Hierarchical code means _________


180
181 Home page will always be present as a first page of an application

How would you delete a relationship between tables in the Relationships window?

182
183 Hyperlinks are used to jump to any kind of information or data from a file

IDEA stands for _________________________________


184
185 If a table is joined to itself it is called a ________________
If any change made on the object from the client side is reflected on the server then the
186 object is said to be _____
If the database holds customer names and addresses, personalised letters can be created
187 automatically using
188 If two tables having same values for the fields are joined it is called an ______

Important knowledge needed to begin planning the use of CAAT is _________


189

In a Customers tables, what does a plus sign next to the CustomerID field mean?
190
In a one-to-many relationship between Companies and Employees, which field is found in
191 both tables?

In a relation __________________________ .
192
193 In access OLE objects cannot be linked
In an accounting audit trail, intrusion detection system might monitor the amount of
processor time consumed by the user to detect unusual deviation from the amount processor
194 time requested by the user in the past
In an enterprise-class database system ________ .
195

In an enterprise-class database system, reports are created by ____________________ .


196
197 In an enterprise-class database system, the database _________ .
198 In an enterprise-class database system, the database application ___ .

In audit procedures, test data is


199
200 In batch processing, transactions are processed one after another
201 In code-builder, got_focuse, click,dbl_click,enter are examples of _______

In examination of audit trail the following data associated with an event may be ___
202

In formula in flow hypothesis the auditor should expand the extent of substantive tests to
determine how the defects may impact the attainment of the program objectives
203
204 In framed checking the data entry is checked against an expected picture or format
In integrated test facility approach the auditor should ensure that the impact of test
205 transaction is subsequently eliminated from the computer files
206 In MS -Access, the records in a table are sorted based on _________
207 In MS-Access long integer is a datatype
208 In MS-Access, alter command may be used in adding a primary key to a table
209 In MS-Access, columnar layout can be used to view multiple records in a form
210 In ms-access, datasheet view is available in ___________
In MS-Access, filter excluding selection will display only those record(s) which meet the
211 criteria.
212 In MS-Access, the function that gives the current date is _____________
In ms-access, to protect a database file from illegal access, we may set database password.
213 The option of setting database password is available in _______ menu
214 In MS-Access, user may specify criteria for filter in form view using _________
215 In MS-Access, we may design command buttons for navigating records
In MS-Access, while designing a table for a particular field, the Required parameter is set to
216 yes. This validates the field as _______

In MS-Access, while using form design view, for creating a command button for adding a new
record, we should select the _______ category from the command button wizard
217
218 In ms-access, while using SQL, references constraint is used for creating _______
In MS-Access. While appending records, the source and the target table must have similar
219 structure and fields
220 In OLRT the CPU should process the capability of program interruption
In Range Check , the data may not be in proper sequence but should be within a
221
predetermined range
In SQL, delete command is used to remove _________
222

In SQL, having clause is used for _________


223
224 In systems testing, test involves_________________
In the file reorganization merging capabilities are needed in data from separate file is to be
225 combined on a separate work file
226 In the macro sheet the macro is selected in the _____field
Internal tables are stored tables from which certain values are extracted for further
227 processing and storing
228 JCL means_________________
229 Joining tables without any matching values in the fields is called ____________
230 Large amount of data can be summarized using ______ tables
231 Line is a tool box control
232 List box is a control that offers a list of choices
233 Log analysis is a software used by auditor to detect virus
234 Look up fields slow up data entry
235 Macros can be used to add a menu to a database object
236 Macros can be used to create user defined error messages
237 Make table queries create a new table from the records of another table
238 Mapping software has very objectives

Mapping software is used by the auditor to list unused program instructions


239
240 Master file configuration includes ____________
241 Master files contains current records for identification and summarizing
242 Microsoft Access may use which of the following DBMS engines?

Modeling is a variety of software which ________________

243

Modern microcomputer personal DBMS products______.


244
245 Most of the tools use in Data Analysis depends on
246 Ms access is a ___________
247 MS access is a DBMS
248 MS access objects can be published in the web
Name three steps involved in developing an information system
249
Normalization is a process used to deal with which of the following modification anomalies?
250
251 OLE object is a data type in access

OLE stands for_____


252
253 On line testing can be targeted for specific functions carried out by programs
On line testing techniques the auditor ______ data either _______ or fictitious in order to see
254 that a specific program or sever edit test is doing its work

One -to-one relationship means a single entity to a single entity in a monogamous structure
255
On-line processing refers to grouping of transaction and processing the same in one go from
256 start to finish
Operating systems are devised to optimize the machine capabilities, the function
257 include_______________
Other ms-office applications can be accessed from ms-access using a concept called __
258

Other ms-office applications can be accessed from ms-access using a concept called ________
259
260 Page header is present at the beginning of each record
261 Pivot tables are used to navigate to the other tables in a database
262 Primary key uniquely identifies each record

Program code analysis involves _____________

263
264 Properties of a form can be changed by selecting ______from view menu options
265 Properties of the fields are managed by _____ in Dynaset
266 RDBMS is structured to a series of 2 dimensional tables
Real time refers to the technique of updating files with transaction data immediately after the
267 occurrence of the event to which it relates
268 Recording transactions in a controlled manner may amount to loss of stored data
269 Records cannot be sorted by a primary key

Referential integrity ensures that the:

270
271 Regular cross system verification may minimize frauds
272 Relationship is an association between _________
273 Reports are used to represent un-editable data

SADB stands for ____________


274

SAS stands for ______________


275
SCARF involves embedding audit software modules within an application system to provide
276 continuous monitoring
277 Sequence Check is a --------------- level control check.
278 Set of related option buttons, check boxes and toggle buttons is known as ___
Set of related option buttons, check boxes and toggle buttons is known as _____________
279
Snapshot is software which takes a picture of a file or data or a transaction passing though the
280 system
281 Sorting is applied to select only some particular records

Source code review means__________


282

Specializes audit program may be___________


283
284 Summary options dialog box is used to summarize data
Super computer are the largest and fastest and is very suitable for commercial application
285 including audit work
Systems development control, apart from others, include authorization, approval, testing,
implementation and documentation of new systems software and system software
286 modification

Tables are related to one another through a:


287
288 Tables cannot be imported from other databases
289 Text boxes can be part of a option group
290 Text boxes cannot be bound controls
291 Text type data can be of _____ characters in ACCESS
292 Textboxes can also be an example of unbound control
293 The application that supplies data in OLE is called an _________
294 The attributes of a composite key are known as ________
295 The characters * and ? are sometimes used in search criteria as
296 The collection of related data and objects is called a ____________
297 The contents of a field could determine _______ sign for a ______ field
The correct order of the arguments for the MsgBox statement is:
298

The data hierarchy from the largest to the smallest is


299
300 The default data type of VB is integer
301 The default query invoked by ms-access is
302 The first statement in a procedure named CreateList is:

The first step for developing CAAT is_________


303
The industry standard supported by all major DBMSs that allows tables to be joined together
304 is called __________.
305 The macro is selected from the action field of a macro sheet
306 The memo field can have text upto_____ characters in length
The move towards paperless EDI would eliminate much of the traditional audit trail, radically
307 changing the nature of audit evidence
308 The predecessor(s) of database processing was (were) __________ .
309 The process of arranging the data in a meaningful order is known as ___________

The purpose of a data warehouse is to:

310

The purpose of a database is to:


311
The table or query name on which we are going to build our report is selected from the ____
312 dialogue box

The three list boxes present at the bottom of the expression builder are called_____
313

The transition from manual system to CIS environment bring dramatic changes including
________________
314

The type of queries that can update or delete record(s) in a table(s) are called __________
315

The use of computer assisted audit techniques is not gaining popularity not only ___
316
The validation checks applied to a field depend on the field's logical inter relationships with
317 other fields in the record
318 The wild card representation for any 5 letter word that starts with ram is ___

The wild card representation for any 5 letter word that starts with ram is ________________
319
320 There are no wizards for creating a database in access

This database holds personal information. The user can help to keep it confidential by
321
322 Time sharing system allow access to a CPU from remote terminals
323 To build complex expressions_____is used
To display an OLE object in the form of an icon ____ option is selected from insert object
324 dialogue box
To import data from Access to Excel ,it is not possible to link between Access and Excel sheet
325
326 To see more than one record at a time in a form we use _______
Transaction files contain relatively permanent records take product profile, customer profile,
327 employee profile etc

Unauthorised alteration of on-line records can be prevented by employing


328
Update query is used to add records from one or more tables to the end of an existing table
329

Using the open database connectivity feature in ACL is ______________


330
331 Values for other tables, queries are maintained in look up fields data type

Visual Basic is based on __________


332
333 Visual Basic language is a _____ tool

We can add our own functions to the expression elements list box of the expression builder
334
We can change from the design view to the form view without being prompted for saving the
335 changes made
We can switch from datasheet view to form view by selecting view -> form view option
336

We have obtained access to the company's operational data. We examine 50 records for
customers with phone numbers that should use the current area code of 345. Of these 50
records, we find 10 that still use an older area code of 567. This is an example
337
We have obtained access to the company's operational data. We have been asked to
produce a report with an item by item analysis of sales, but the only sales figure available is
338 the total sale value for each order. This is example of_____

What are some popular office orientated software applications?


339

What does a record contain?


340

What is a database?

341

What is a report?

342

What is required of the fields that join two tables?


343
344 What is the Access tool that is used to create the user interface?

What is the best way to analyse and change data


345

What makes a database an application?


346
347 What term applies to a collection of related records in a database?
When designing a database, one of the candidate keys in a relation is selected as the _
348

When you are given a set of tables and asked to create a database to store their data, the first
step is to ____ .
349
Whenever monetary transactions are processed against master files, the update program
should maintain a correlation account to record such transaction that does not have a
350 matching master file record
351 Which is the example of CAATs

Which of the following are basic components of an enterprise-class database system?


352
353 Which of the following are called explicitly by another procedure?

Which of the following are true about data mining applications?

354
Which of the following brings a copy of the table into the current database and does not
355 maintain a tie to the original table?
356 Which of the following commands is used to change the structure of table?

Which of the following constraints can be used to enforce the uniqueness of rows in a table?
357
358 Which of the following dialog box is/are used in the creation of form ________

Which of the following ensures that records in related tables are consistent with one
another? For example, it ensures that you cannot add a record with an invalid foreign key.
359
360 Which of the following field types will generate the primary key automatically?
361 Which of the following is control types ____________

Which of the following is not the feature of GAPs


362

Which of the following is not the use of CAATs


363

Which of the following is TRUE related to form fields?

364

Which of the following is true when viewing a main form and its associated subform in the
Form Design view?
365
366 Which of the following objects are NOT found in an Access application?
367 Which of the following objects is used to display a menu?
Which of the following relationships does not belong in a database based on a professional
sports league such as football or basketball?
368

Which of the following statements regarding Access applications is NOT true?

369
Which symbol is used at the end of the join line in a related table to signify the “many” side of
370 a one-to-many relationship?

While base testing forces on finding if there are any defective execution policies in a program
371
372 White Box Approach necessary involves expert knowledge on the part of Auditor
Widespread end use computing result in unlimited errors creeping into system going to
373 accept handling, thereby increasing audit risks
374 Wild card characters are used for sorting records
With OLRT where interactive data entry is available, the master file associated with a
375 transaction may be searched for confirming data
376 Wizards for toolbox controls are called a __________
Year end ledger, inventory files or transaction files can be tested for cut-off , to ensure that
377
the data has been provided is for the correct audit period

You are creating a banking database to track customer loans. The bank will, of course, have
many customers, each of whom may take out one or more loans, while each loan may be
associated with only one customer (there are no joint accounts). What is the re
378
You are creating a client application that calls ActiveX DLLs. Which of the following properties
of the Err object provides the name of a component that sends an error back to the client
379 application?

You are developing an Access application that you expect to upgrade periodically. Which of
the following statements is TRUE?

380

You have created a one-to-many relationship with referential integrity between a Customers
table and a Loans table. From which table can you delete a record?
381
Option 1 Option 2 Option 3
1 FALSE
freestanding embedded stand alone
page detail group
field file record
group record session

filter sorts pipes


list box combo box button
form bound unbound
sub forms tabular form columnar form
tabular form chart form data sheet form
SysCmd MsgBox message

filex file-o-man file manager

bullet command procedure


form wizard report wizard query wizard

delete insert append


chart label bitmap
option, toggle and command button, check
command buttons and list boxes list, check and combo boxes
filters queries sorts
graphs chart labels
calculated unbound bound
calculated bound unbound
columnar form tabular form hierarchical form
Oracle ACL JCL
static file static html dynamic file
summary sum append
integer number primary number

Benfish Benford Benjamin


pie bar both 1 and 2
IDEA ACL ALC
filter by form filter by report filter by record
form report macro
conditions action insert
sub forms child forms inner form
report form chart
unbound object bound object command button
exe DLL BMP
sub form auto form tabular form

report form query

& # ?
label wizard chart wizard mail wizard
tabular columnar datasheet
create html new save as html
add append insert
append add insert
tabular columnar auto report
report macro sheet module
data sheet filter filter by input filter by form
columnar and tabular stable and unstable dynamic and static
table form report
VB Modules reports forms

condition group macro names


start header group header page header
automatic number AutoNumber number
pivot table columnar form tabular form
report footer page footer group footer
create fields add chart chart
set relation connect relationships
crosstab queries row/column queries select queries
text box list box combo box
autoreport report module

startup home end


report form table
report form query

& # ?

delete insert append


* $ @
condition group macro names

data property both a and b


new blank database dialog
new dialog box box new database dialog box
1 FALSE
1 FALSE
data group data collection database
record field key

record field composite key


1 FALSE
bound control unbound control data less control
single-user database multiuser database e-commerce database
application application application

data warehouse data are data warehouse databases data warehouse data are
not stored in tables. do not have metadata. often denormalized.
as a new systems as a redesign of an existing
from existing data development project database
from existing non-database as a new systems as a redesign of an existing
data development project database
as a new systems as a redesign of an existing
from existing data development project database
all the users' data is in one it contains a description of
place it reduces data duplication its own structure
facts. figures. information.
data. relationships. metadata.
record field foreign key
number primary key index
the primary key of both the primary key of the a field from an unrelated
related tables. related table. table.
form name control record source
true false
1 FALSE
true false
Database Management Data Business Model
Database Modeling System System System
single-user database multiuser database e-commerce database
application application application
true false

true false
true false
natural/man-made open/closed conceptual/physical
true false
must be set for multiple
must be set for one word. words. does not have to be set.
true false
data marts normalization data models
entity-relationship data
data marts normalization modeling
true false
true false

true false
search sort field names
table relation row
remote DBMS relative DBMS Relational DBMS
Cross Tabulate Filter Merge

A database Graphics The customer’s ID is deleted


browser
true false from the Customers table,
and all the related loans are
Nothing, Access ignores the The customer’s ID is deleted deleted from the Loans
attempted command. from the Customers table. table.
yes no
re-perform procedures
provide information to the carried out by the clients
read data on client's file audit programs

documents driven approach risk driven approach unique approach


examining the quality of examining the quality of
system process carrying analytical review data

true false

fictitious data applied comparison of source analyzing the picture of a


against the client program version of a programmed file or data

grouping, transaction regrouping, events none of the above


relational list range
specification, program file, hardware none of the above

true false

yes no
hardware and software processing options, file data
configuration structure checks and controls
1 FALSE
to have a complete picture decentralized picture of a
of a system system all the above
cascade delete related cascade change related cascade update related
records records fields
true false
true false
true false
true false

true false

True False
providing access to
computer to all organization
the of by all concerned personnel use of any programs

true false
1 false

true false

true false

executables, master deleted, hard none of these

true false
dollars rupees pesos
true false

true false

true false

true false
storing data offline at a
separate site backing up data regularly is related to data mining

true false

data marts normalization data models


data marts normalization data models
true false
databases planning language model base

true false

primary key not null candidate key

1 FALSE
true false
true false
yes no
at the year end immediately on quarterly basis
true false

true false
back-ups retrieval deletion

true false
true false
true false
true false

e-brain bouncing ball big-bang


true false
included form sub form new form

use hyperlink use import use datasheet in forms


use hyperlink use import use datasheet in forms

true false

true false

package computer program


for performing a variety of
data processing function mathematical concept master list of transactions
statistical/arithmetic stratification and frequency
file access/organizations operation analysis
1 FALSE

1 FALSE

true false
1 FALSE

true false
blocks of nos. to the
consecutive nos. or primary attribute of the the random placement of
alphabets to entities entity component
1 FALSE

Right-click the Relationship Select Undo in the


Double click the line, then select Delete Relationships pull-down
Relationship line from the shortcut menu menu
true false
incremental design and interactive data extraction interactive data
enlarge activity and analysis innumerable analysis
inner join outer join self join

linked embedded connected

the product code the primary key mail merge


inner join outer join explicit join

the source of data available source of data for material


to the audit organization planing all the above
That there are several
customers associated with That some of the data is not That there are records in a
that ID viewable related table

EmployeeID CompanyID EmployeeLastName


entities in a column vary as the order of the columns is the order of the rows is
to kind important unimportant
true false

true false
the database application(s) the DBMS accesses the
interact(s) with the DBMS database data None of above

the database management


the user the database application system (DBMS)
holds user data holds metadata holds indexes
creates queries creates form creates reports
A utility software A special purpose written
A sample of transactions programme program
true false
actions events procedures
authentication of
start and finish time information support resource requested

true false
true false

true false
the first field of the table the last field of the table primary key field
true false
true false
1 FALSE
table query form

true false
CURRDATE() TODAY() DATE()

Insert Records Tools


filter by form filter by selection filter by menu
1 FALSE

null not null zero

Record Navigation Record Operations Form Operations


primary key alternate key foreign key

true false
true false
1 FALSE
table or tables query or queries record or records

for specifying conditions


for ordering records for updating records with group by clause
bottom up tests top-down tests hybrid tests

true false
macro expression elements comments

true false
job control language job connectivity language all the above
inner join self join no match join
pivot create form
1 FALSE
true false
true false
true false
true false
true false
true false
yes no

true false
reference files table files report files
true false
Jet SQL Server Oracle

can enable the auditor to can provide the auditors


can be very powerful execute provisions on a with useful information
analytical tool number of different bases with trend s and patterns
are supplied by several
well-established were essentially killed off
manufacturers by MS Access have poor response time
DDE OLE ODBC
DBMS RDBMS front end
true false
true false
Specification, Design, and Programming, Design, and Analysis, System Design,
Testing Testing and Implementation
Insertion anomaly Update anomaly Deletion anomaly
true false
object linking and
embedding on line execution on line editing
yes no

manipulates, real create, false none of these

true false

true false
manage hardware & enable multiple user
scheduled jobs software resources resource sharing
OLE DDE CME

OLE DDE CME


true false
1 FALSE
true false

examination of source code


provides detailed identifies program code of a program with advice to
information of machine which may be there for following the logic of a
uses fraudulent reason program
change properties properties form properties
property field field property Dynaset field properties
true false

true false
yes no
1 FALSE

forms in a database are


records in a dynaset are related tables in a database consistent with the
consistent with the are consistent with one underlying tables or
underlying tables. another. queries.
true false
forms reports attributes
true false

seriously affected database subject area database software and database

system analysis software system advanced software all the above


1 FALSE
Field Record Both
button group option group controls group
button group option group controls group

true false
1 FALSE
identifying non-standard
identifying erroneous code identifying ineffective code code
prepared by an outside
programmer engaged by
prepared by the auditor prepared by the entity the auditor
true false

true false

true false
query and its associated
foreign key. main form and a subform. dynaset.
true false
true false
true false
255 64000 235
true false
OLE object OLE client OLE server
alternate keys composite keys candidate keys
bookmarks operators wildcards
database form collection
valid, numeric invalid, alphabetic none of the above

prompt, title bar text, icon. prompt, icon, title bar text. title bar text, prompt, icon.

Character, field, database Database, character, record File, record, field


true false
update query select query delete query
Dim CreateList. Sub CreateList. CreateList.
to determine the audit review and evaluate the
objective types of data to obtain a record layout
Sequential Query Language Structured Question Structured Query Language
(SQL) Language (SQL) (SQL)
true false
60,000 255 25,000

true false
file managers hierarchical models network models
filtering ordering sorting

put key business


create backups for mission centralize the manageability information into the hands
critical corporate data. of data collection. or more decision makers.

help people keep track of create tables of rows and


things. store data in tables. columns.

create report link report embedded report


expression elements list
action list macro list box
change in the method of
recording accounting
transaction use of accounting codes absence of audit trails

action queries row/column queries change/delete queries


with production
with audit departments departments all the above

1 false
ram* ram?? two of the above

ram* ram?? two of the above


true false
keeping the original paper
using a password keeping a backup copy copy
true false
calculator code builder expression builder

display as icon display link


1 FALSE

columnar tabular both a and b

true false

Key verification Computer sequence checks Computer matching


true false

can bring the data directly can bring the data indirectly all the above
true false
event - procedural based
action language structured query language language
RAD RAP RAID

true false

true false
1 FALSE

dirty data inconsistent data nonintegrated data

dirty data inconsistent data nonintegrated data


Word processors,
Compilers, interpreters, Network software, backup spreadsheets, databases,
editors systems DTP
Information about certain It contains all the data A document which contains
programs about one specific item text

A way to analyse and An organised way of


manipulate numerical A tool to produce high storing information about a
information quality documents set of similar things

Reports allow users to Reports provide a very A tool which allows text and
extract information as hard flexible way of creating and graphics to be placed in
copy (printed output) editing documents documents
They cannot be
They must both be numbers They cannot be text fields AutoNumber data types
Menu Wizard Build Menu Interface Design Wizard
Extracting and analysing Spreadsheets make data
data easy to analyse Using queries

It contains more than one It contains tables, reports, It contains a user interface,
table queries, and forms or switchboard
clipboard file field
composite key primary key foreign key

assess the existing tables' design the database create one or more new
structure and content structure tables

true false
ACL IDEA High End CAATs

The database management


The user The database application system (DBMS)
Macros Action Procedures Event Procedures

Their report delivery is


more difficult than report
They use sophisticated delivery for reporting
mathematical techniques. systems. Nonintegrated data

Import Link Merge


CHANGE TABLE MODIFY TABLE ALTER TABLE
DEFAULT and NOT NULL PRIMARY KEY and UNIQUE
constraints FOREIGN KEY constraints constraints
new form dialog box form create dialog box form wizard dialog

The Tools menu, Referential integrity


Relationship window The join line
Auto Primary Auto ID AutoNumber
bound unbound controlled
Wide access to various data Can extract and analyse
base data Can aid in simple selection
Tests of details of Analytical review Compliance tests of general
transactions procedures EDP controls

A check box enables the A text field enables the A drop-down list enables
form user to choose from form user to choose from the user to choose from
one of several existing one of several existing one of several existing
entries. entries. entries.

The subform is displayed in The subform is displayed in


The subform is not visible. Datasheet view. Form view.
Forms and reports Queries and tables Macros
Form Table Report
A one-to-many relationship A one-to-many relationship
A one-to-many relationship between teams and between coaches and
between teams and players coaches teams

The Link Tables command An application may consist


can be used to associate the of multiple databases, each All objects in an
tables in one database with with multiple objects, linked application, including the
the objects in another to yet another database tables, must reside within
database. containing only tables. the same database.

# M ¥

true false
True False

true false
true false

true false
button wizard control wizard option control wizard
1 FALSE

One-to-one One-to-many Many-to-many

Number Description Component

It will be easier for the user It will be easier for the user
to upgrade it if the objects to upgrade it if the objects It is advisable to put each
and tables are in one are in one database and object and table into a
database. the tables in another. separate database.

The Customers table only


when there are Loan
records associated with that
Either table at any time customer The Loans table at any time
Option 4 ans q_desc
B "*access*"
sub chart D
topic C
none of the above C
detail D

gateways A
option button B
none of the above C
none of the above A
none of the above A
none of the above B

filepet C

none of the above C


publish to web wizard D

add A
report A
option button, toggle
button and check boxes D
forms A
report B
static C
none of the above A
one to many form B
none the above A
none of the above B
simple D
auto number D

none of the above B


none of the above C
ACLL B
filter by input D
table B
none of the above A
none of the above A
macros D
list box B
html D
columnar form B

table B

* D
none of the above A
justified B
none of the above C
delete B
data definition D
embedded C
none of the above C
none of the above C
none of the above A
hyperlink D
macros D

none of the above C


report header D
automatic field B
main form A
none of the above B
insert chart C
none of the above C
update queries A
static text B
none of the above A

none of the above B


ledger A
table B

* D

add A
? D
none of the above C

none of the above B

database dialog box A


A
A
data storage C
tuple C

foreign key C
B
data control B

None of above B

b and c C

a and b C

a and b B

a and b A

All of the above. C


a and b D
all of the above D
candidate key D
identifier B
not a primary key of either
related table. B
none of the above C
A
B
B

Relational Model Manager B

a or b A
B

A
A
all of them D
A

must be set for two words. C


A
entity-relationship data
modeling D

data migration D
A
B

A
record grab D
field D
Reliable DBMS C
None of the above B

e-mail A
A
An error message is
displayed. D
A

all the above D

none of the above B

all the above D

all the above A

all the above A


logical C
all the above A

all the above D


A

none of the above A

change all related records C


A
A
B
A

none of the above D

A
A

all the above A

A
yen A
A

A
uses tape as opposed to
disk C

A
entity-relationship data
modeling A
entity-relationship data
modeling B
B
all the above D

no duplicate key A

A
B
B
A
none of the above B
A

B
addition B

A
B
B
A

stub C
B
child form B

use export D
use export D

administered questionnaire A

all the above D


B

B
B

none of the above D


A

Click the Delete


Relationships button on the
toolbar B
A

none of the above B


table join C

edited A

e-mail C
none of the above A

none of these A

That records can be added


by clicking on the plus sign C

CompanyAddress A
more than one column can
use the same name C
B

A
All of above A

the database B
All of the above. D
b and c D

None of the above A


B
none of the above B

all the above D

A
B

A
none of the above C
B
A
A
all of the above D

B
DAY() C

none of the above C


None of the above A
A

none of the above B

None of the above B


none of the above C

A
A
A
none of the above C

none of the above C


all the above D

B
action D

A
none of the above A
outer join D
none of the above A
A
A
B
B
A
A
A
A

A
none of the above D
B
a and b D

all of the above D

are not true DBMS products B


All of the above C
language A
A
A

None of above A
All of above D
A

none of the above A


A

all the above A

all the above D


none of the above A

none of the above A


B
B
A

none of the above C


new properties B
properties B
A

A
B
B

reports are consistent with


the underlying tables or
queries. B
A
entities D
A

safety and database B

none of the above A


A
None of the above C
record group B
record group B

A
B

all the above D

all the above D


A

report and its related query. A


B
B
B
63500 A
A
OLE communicator C
primary key C
engines C
none of the above A
all the above A

title bar text, icon, prompt. B

Element, field, file C


B
append query B
Sub. B

extract data from file A


Relational Question
Language (RQL) C
A
64,000 D

A
relational data model A
querying C

store all corporate


transaction data in one
single location. C

maintain data on different


things in different tables. A

new report D

none of the above C

all the above D

update queries A

none of these A

A
none of the above B

none of the above B


B
saving the file with different
filenames A
A
expression elements C

create icon A
A

none of the above B

Database access controls D


B

none of the above A


A

none of the above C


none of the above A

A
A

a "wrong format" problem B

a "wrong format" problem D

None of the above C

A collection of files B

A way of maintaining a log C

None of the above A


They must be the same
data type D
Switchboard Manager D

None of the above C

It contains macros C
layout B
surrogate key B

move the data into the new


database A

B
All of the above D

All of the above. D


General Procedures D

None of the above A

Join A
UPDATE TABLE C

IDENTITY columns C
both 1 and 3 D

The one-to-many
relationship B
Auto Key C
all of the above C
Can define the audit
objectives D

All of the above D

A drop-down list enables


the user to enter text. C

The subform is an object on


the form and can be moved
or sized like any other
object. D
Spreadsheets D
Query A
A many-to-many
relationship between
players and teams C

An application can be
created in such a way that it
objects such as forms and
reports can be changed
without disturbing the
existing data. C

* C

A
A

A
B

A
tool wizard C
A

Many-to-one B

Source D

Regardless of how the


objects and tables are
stored, the user will have to
reenter the data in the
tables when the application
is upgraded. B

Neither table C
Digital Signature and Verification of Electronic Records
No Question
1 "Hash Function" is used in both creating and verifying Digital Signature
___ is a characteristic of a communication channel that is the amount of information that can
2 be passed through it in a given amount of time, expressed in bits per second.

___ means the result of applying to specific information, certain specific technical processes
3
4 _____ can be owned by multiple organisation
5 _____ is a program that helps us to log on to other networks
6 _____ is the most popular internet service
7 ______ is a large worldwide bulletin board service network
8 ______ is a program that helps us to log on to other networks
______ is the process of the digital signals being converted into a form suitable for analog
9 transmission

______ is the program used to run CompuServe's regular services


10
11 ______ supports one button publish
12 _______ is a program or a tool that helps in locating a file anywhere on the net
13 _______ is a program or a tool that helps us find a file anywhere on the net
14 _______ is known only to the signer and is used to create the digital signature.
_______ is ordinarily more widely known and is used by a relying party to verify the digital
15 signature.
16 _______ maps IP addresses with the domain names of the sites
17 _______ searches by keywords
________ and______ are two basic ways of getting connected to the internet
18
19 ________ are defined as ways of communication amongst networks
________ is a branch of applied mathematics concerns itself with transforming messages into
20 seemingly unintelligible forms and back again.
21 ________ is also called as WAIS manager
22 ________ is in between LAN and WAN
23 ________ is the ancestors of the internet
________ is used to link pages in the world wide web
24
__________ is / are a form of advertisement where people relate their experience with
25 products and services
__________ is an algorithm which creates a digital representation or "fingerprint" in the form
26 of a "hash result".
__________ is of standard length which is usually much smaller than the message but
27 nevertheless substantially unique to it.
___________ provides assurance of the origin or delivery of data in order to protect the
sender against false denial by the recipient that the data has been received, or to protect the
recipient against false denial by the sender that the data was sent.
28
____________ is the art of protecting information by transforming it into an unreadable
29 format.
______________ are on-line databases of certificates and other information available for
30 retrieval and use in verifying digital signatures.
______________ are used by individuals when they exchange messages with other users or
31 online services.

______________ enable web servers to operate in a secure mode.


32
________________ are another form of credit payment that lets customers use digital online
33 cheques to pay Web merchants directly
34 _________is a program that displays information about a host connected to the net
_______is the computer on the internet that translates between the internet domain names
35 and the internet numeric address

______and_____ are web searching features


36
37 ______is used to transfer and copy files over the internet
A "recipient" of the certificate desiring to rely upon a Digital Signature created by the
38 subscriber named in the certificate is called the ____________
39 A ______ always begins with a slash
A ________________ is a basket on the Net that is used to place the items that are being
40 purchased
A certificate may prove to be unreliable, such as in situations where the subscriber
41
misrepresents his identity to the certification authority
42 A CGI program is usually called after a request made by the _________
43 A computer that provides a service usable by other computers is called______
A Digital Certificate does contain Owner's Public Key, Owner's name, Expiration date of the
44 Private Key, Serial number of the digital certificate
A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private
45 Key

A digital signature is used primarily to determine that a message is:


46
47 A Digital Signature must have the following attributes _______ and ______
48 A hyperlink can be on ___________
A_____ is a set of computers interconnected by transmission paths to exchange information
49 in internet
50 A_______ is the representation of physical connectivity of the computers in internet
51 Accessing files using FTP servers is called_____
52 Archie servers can be accessed in_______ different ways in internet
Asymmetric cryptosystem is based on __________ and ____________
53

BABEL consists a glossary of _____


54
55 CA stands for ________________
56 CGI is the _________ between web browsers and servers
57 CGI programs are invoked based on the information provided by the _________

CGI stands for ____________


58

CRL stands for


59
60 DARPA is broken into ________ and _______

DARPA stands for _______________________________________________


61
62 Data is transmitted in the form of_____ signals
Decryption is a process employed for scrambling of plain text for web based transactions
63
64 Dictionaries,encyclopedias,government and other references are found in ______
Digital Signature involves two processes. They are ___________ and __________.
65
66 Digital Signatures are used for a variety of Electronic Transactions like __________

Digital Signatures, if properly implemented and utilized offer promising solutions to the
problems of Imposters, Message Integrity, __________ and _____________
67
68 Directories consists of _______ levels
DTD stands for __________
69

DTE stands for ____________________


70

EDIFACT is an abbreviation of ________


71

FAQ stands for ______


72

GIF is the acronym for ____________


73

GNN stands for______


74
75 Gopher and WAIS enables the user to ______
76 Host name indicates the domain name of the web ________
77 HTML was derived from _________

HTTP is the acronym for __________


78

IETF stands for ________


79
In Active advertisement, there are two types of models. They are _____ and ________
80
81 IN an URL the word before the color refers to _______
In EDI interface, the translation service receives _________ as incoming files from the
82 communication service
In EDI, the transmission files are composed of different sets of external format files which are
83 grouped into multiple sets under the name of ________
In Microsoft Internet Explorer, the color of the text can be specified using _________
84 attribute of the font tag.

In processing cheques which of the following I/O techniques have banks traditionally used
85

In, Digital Signature, _____________ perform the "ceremonial" function of alerting the signer
to the fact that the signer is consummating a transaction with legal consequences
86
87 Internet can be defined as _______
JPEG is the acronym for ___________
88
89 Lynx is a _______ programme that works with terminals
Modem stands for __________________
90
91 Mosaic displays links in color whereas _____ does not display links in color
92 Navigating through the menu of gopher is called moving around _______
93 NSFNET is the united states provides service to _____ and_____
94 PINE stands for _____________
95 PPP stands for _____
96 Prodigy is run by IBM and ______
Service indicates the name of the ________ used to access data, present on the other end of
97 the link.
98 SGML is a _________
Signing Writings serve the following general purposes______,_______,_______ and _______

99

SLIP stands for ________________


100
101 Special characters allow browsers to display _________________
102 SPY MOSAIC is distributed by_______

Stringing pages together using hypertext technology helps view pages _______________
103

TCP/IP stands for ________________


104
105 The _____ level gives the broadcast overview of the net
The ________ allow companies to bypass the need for costly printed catalogs
106
The _________ are software agents who communicate with the business merchants on behalf
107 of the customers
The _________ phase includes customer service and support to address customer
108 complaints , product returns and products defects
The __________ allows for protocol conversion and communicates with the bank using the
109 banks private network or the Internet
The ____________ is the process of encoding information to prevent it from being read by
110 unauthorized parties
The _____________ model is the least intrusive model but requires active search on the part
111 of the customer
112 The ________________ are pre-paid credit cards that include an embedded cards
113 The acronym for B2B is ___________
The act of searching through storage to locate information without necessarily knowing of the
114 existence of the information being sought.

The application that confirms whether a document is compliant to its DTD is _________
115
116 The basic function of the ______ is transmitting the bits over a channel
The complementary keys of an asymmetric cryptosystem for Digital Signatures are arbitarily
117
termed as _________, and ____________

The components of a URL are ___________


118

The Costs of Digital Signature consists mainly of the following


119
120 The databases to enable keyword search using Lycos are a2z,_______
121 The directories that come with built-in engines are yahoo,lycos and ______

The EDI standardisation for International Trade and Commerce is introduced by __________
122

The first freenet is created at the_____ and is called______


123

The first international IP network connections were established in 1973 with _____ and_____
124
125 The huge list of keywords from important items is called ______
126 The huge list of keywords from important items is called an_____
127 The image format supported by most browsers is________________.

The information displayed on the web page includes______,_____ and_____


128
129 The initial web pages present in a web site is the ________ page.
The interface that provides effective communication between the web browsers and servers
130 is _________
The internet adapter is a programme that makes our connection act like a _____or a ____
131 account
132 The internet is also called as _______________

The internet is similar to _________________


133
134 The keyword for providing links within or across documents is____________

The mail we send has a mailing address and most of them correspond to_____,_____ and
135
136 The most important service of the ______ is to manage traffic control
137 The most widely accepted format for Digital Certificate is defined by the CCITT X.509
138 The net drivers______ from one place to another

The net provides interesting services like______,______ and______


139
140 The network based technology is/are ____________

The online service offered by navigator gold 2.0 are _______ and_____
141

The point to point channel network is also called as _____ and_____


142
143 The Pre-purchase preparation phase includes _______________ for a set of products
The prospective signer identified in the digital certificate holds the_________ and is called the
144 ___________
The Relying Party can use the ___________ listed in the certificate to verify that the digital
145 signature was created with the corresponding _________
The small programmes that create animation,multimedia,real-time games and multi user
146 games are called______
147 The step involved in Communicating between the web clients and servers is _____
148 The system of interlinked documents is known as_______
149 The three most commonly used networks are______,______ and______
The three most popular mailer are_____,_____ and______
150

The two major browsers used to surf the Internet are ________,_______
151

The two types of search in veronica are _____ and ______


152
153 The URL for encyclopedia Britannica is_________
154 The uuencode files start with a _______
155 The Web aids users to explore the ________
156 The web maps are called _______
157 The web pages that represent online home of their author are called______
The windows internet software available are______,_______,________ and______
158
159 The World Wide Web consists of _________
160 The World Wide Web is referred to shortly as the _______

TIA stands for_____ in internet


161
To associate with a key pair with a prospective signer, a Certification Authority issues Digital
162 Certificate
163 To use the finger command,SLIP users must run a programme called______
164 Two of the important browsers are_____ and_____

URL stands for ____________


165

VERONICA is an acronym for _______________

166
167 Web is a collection of ___________

What is a major disadvantage to using a private key to encrypt data?

168

Which of the following activities would most likely detect computer-related fraud?
169

Which of the following best describes uploading information?


170
171 Which of the following is not supported by internet explorer _______________
Which of the following risks can be minimized by requiring all employees accessing the
172 information system to use passwords?

Which of the following statements is correct concerning the security of messages in an electronic data
interchange (EDI) system?

173
174 WINWAIS has two source lists namely____ and______

WSIRC stands for______


175
176 Yahoo,lycos,excite and webcrawlers are _____
Option 1 Option 2 Option 3
Not True Not False
Bandwidth Speed Size

Digital Sign Digital Certificate Digital Signature


LAN MAN WAN
yahoo ftp telnet
yahoo service electronic mail search engines
apple link bitnet Delphi
Usenet finger service ftp
Mapping Modulation Manipulation

CompuServe internet dialer spy mosaic wincim or maccim


lynx mosaic Lycos
FTP TELNET ARCHIE
newsgroup telnet ftp
Private Key Public Key Both A and B
Private Key Public Key Both A and B
URL DNS FTP
infoseek excite lycos
Satellite link and digital Dedicated access and dial
Cable and wires
signals up access
protocols IP address dns
Cryptography Public Key Private Key
allsrc waisman winsock
VAN MAN TAN
dnet arpanet ARPANET
universal resource locator uniform resource locator uniform resource label

Customer Endorsements Billboard Catalog


Hash Function Digital Signature Digital Certificate
Hash Function Hash Value Hash Result

Nonrepudiation Service Digital signature Digital certificate


Decryption Cipher Encryption

Private Certificate Repositories Public Key

Server Certificate Developer Certificate Personal Digital certificate

Server Certificate Developer Certificate Personal Digital Certificate

E-cash Digital Cash Smart Cards


finger service ping service ftp service
ftp servers domain name servers web servers

search engines,directories ftp and finger telnet and ftp


iccp ftp uucp
Recipient Party Relying Party Either A or B
message scheme command line
Online Catalog Shopping cart Billboard

1 FALSE
Browser/user Server Web
client stand-alone servers
True False

True False

Received by the intended


Unaltered in transmission. Not intercepted en route.
recipient.
Signer Authentication Document Authentication Both A and B
text only image only text or image
server client network
network card network topology network redirectors
file access anonymous ftp file transfer
one two three
Login_Id and Password Primary Key and Private Key Public Key and Password

computer related
biographical information bookstores
abbreviations and acronym
Certification Authority Certified Authority Certificate Authority
Network Interface Communication
Current web page Browser Client
communication generated Common Gateway classified general
information Interface instructions

Certificate Revocation List Certificate Resource List certificate Revocation Letter


milnet,smaller arpanet mailnet,inet intranet,extranet
defensive administrative defensive advanced
dedicated and registered
rank administration research projects
projects administration
network administration net
analog digital non-digital
True False
encyclopedia Britannica on-line reference works more information
Digital Signature
Digital Signature creation Both A and B
Verification
E-mail Electronic Commerce Electronic Fund Transfers

Closed System,Formal Legal


Formal Legal Requirements Open System
requirements

no maximum of five one


Data type definition Define type of data Document type definition

detailed transaction
data terminal equipment data target equipment
explanation

EDI For Administration, EDI For Administration, EDI For Administration,


Commerce and Transaction Consumer and Transport Commerce and Transport

frequent asked query frequently asked question frantically asked question

Graphical interpreter Graphical interchange


Graphical interface format
formatting Format

global network news global networks navigator grand network news


browser read the Usenet news search for database
Server Client Browser
SQL PLSQL SGML
Higher text transfer Hyper text transmission Hyper text transfer
protocol port protocol
Internet equipment training International Engineering Internet Engineering Task
faculty trainers and faculty Force
Online Catalog and
Billboards and Junk Mail Broadcast and Junk Mail
Billboards
host computer name of the resource scheme
Internal Format File External Format File Transmission File

batch files interchange sets functions

BACKGROUND COLOR FCOLOR

OCR MICR barcode scanning

Affirmative Act Efficiency Signer authentication

internal network network of networks intermediate network


Jumbled pictures expert
Joint Pictures Expert Group Joint pictures expert graph
graph
world wide web server world wide web client interface
Moralize/demoralize Modulation/demodulation Manipulate/demanipulate
netshark cello lynx
gophering gopherspace cyberspace
education,research music and dance cooking and dining
palm is not eatable palm is not elm pancake is not edible
Prime prolonged protocol Point to point protocol Pillar to pillar protocol
Delphi Microsoft sears
browser protocol site
alphalanguage betalanguage metalanguage

Evidence, Ceremony, Efficiency and logistics,


Approval, Evidence
Approval Evidence

Standard long internet Stream line internet


Serial line protocol
protocol protocol
text data from a database symbols
Microsoft internet IBM
in random order in sequential order in user-defined order

transfer control transmission control transfer communication


protocol/internet protocol/internet protocol protocol/internet protocol

middle lower top


Billboard model of Endorsement model of
Online catalog
marketing marketing

Intermediaries portals .COM

Post purchase interaction Purchase consummation Pre-purchase preparation

EDI TCP/IP EFT

Decryption SSL Encryption

Billboard On-line Catalog Endorsements


Smart Card Embedded cards SET
Business-to- Business Business-to-Backend Backend-to-Business
Find Save Browse

SGML Processor SGML Preprocessor SGML Parser


application layer physical layer network layer
Private Key Public Key Both A and B

Service, hostname and service,hostname,port,dire service,port and directory


directory path ctory-path path
Institutional Overhead and
Subscriber Relying Party
Subscriber Relying Party Institutional Overhead
Cost
Cost
Lycos catalog point review all the above
Alta vista open text excite
ANSI UN/EBCDIC UNESCO

university of university of
university of California net
berkeley,berkeley freenet cleveland,cleveland freenet

united states and UK england,norway united states & Russia


hotlist directory index
glossary index hotwords
.bmp and .gif .bmp and .jpeg .gif and .jpeg
animation,scripts,executabl
graphics,videos,audio programms,images,text
es
first start home
Communication gateway Common graphical Communication graphical
interface Interface interface
SLIP,PPP TCP,IP IP,UDP
arpanet the net intranet
LAN peer-to-peer connectivity wan
hyperlink hypertext hotword
mailing lists,mail server
mail servers,mail clients and mail vendors,mail
robots and gateways to
alternate services identification and password
other services
application layer transport layer physical layer
True False
data parcel packets
scripting,parsing and email,file retrived,internet
news,cooking and fine arts
compiling tools
EDI E-mail EFT

Netscape page starter


email and net conference yahoo and altavista
site,netscape page wizard

point to point network and packet switching,store and smart network and dumb
broadcast channel network forward network network

Order Placement Service Search and discovery


Private Key, Subscriber Public key, Recipient Private Key, Recipient

Public Key Private Key Both A and B

images applets animation


connection response request
hot links hyper text books marks
PAN,NAN,AAN KAN,RAN,VAN LAN,WAN,MAN
yahoo,infoseek,altavista netscape,ie,lynx eudora,netscape and pine

MS Internet Explorer and Netscape Navigator and MS Internet Explorer and


Mosaic Mosaic Netscape Navigator
directory search,index
index search,menu search menu search,item search
search
www.ency.in www.eb.com www.encybrit.com
start begin first
mails documents net
list directories image list
first page home page welcome page
mosaic,gopher,eudora,tru communicator,ie,lynx,winso
nt,windows95,ie,winzip
mpnet ck
information web pages network connections
net web browser
the internet adapter the internet administration the internet access

Not False Not True


finger server ftp server web server
lynx,minx netscape,ie mosaic,gopher
uniform research locator uniform resource locator unlimited restore locator

very easy and rodent very organised network verification on network


oriented net wide index to integration and integration and
computerized archives communication application communication

web sites images applets

Both sender and receiver The private key is used by


The private key cannot be
must have the private key the sender for encryption
broken into fragments and
before this encryption but not by the receiver for
distributed to the receiver.
method will work. decryption.

Conducting fraud-
Using data encryption. Performing validity checks.
awareness training.
sending information to a storing data on the hard
storing data on a disk drive
host computer drive
<center> <font size=n> <hr size=n>
Failure of server duplicating
Collision. Data entry errors.
function.
Removable drives that can be Encryption performed by a
locked up at night provide Message authentication in EDI physically secure hardware
adequate security when the systems performs the same device is more secure than
confidentiality of data is the function as segregation of duties encryption performed by
primary risk. in other information systems. software.

allsrc,winsocks wais,allsrc wais,winsocks


world search for
wide search for information windows sockets internets
information and research
and research relay chat
council
search engines web directories database
Option 4 ans
B
Channel
A
None of the above
C
none of the above C
none of the above C
none of the above B
fidonet A
telnet D
none of the above
B
none of the above
C
navigator gold 2.0 C
none of the above C
archive D
Either A or B A
Either A or B
B
none of the above B
all the above D
none of the above
B
none of the above A
None of the above
A
none of the above B
none of t he above B
none of the above B
name of the above
B
Broadcast
A
Private Key A
Either B or C
D
A
Private Key
Cryptography
C
none of the above
B
None of the above
C
None of the above
A
Electronic cheques
D
none of the above A
none of the above
B
none of the above
A
none of the above C
Neither A nor B
B
none of the above C
Pulling cart
B
A

Channel A
none of the above C

A
Sent to the correct address.
A
Neither A nor B C
neither text nor image C
none of the above
C
none of the above B
none of the above B
none of the above C
Public Key and Private Key
D

none the above


A
None of the above A
Connection B
None of the above B
none of the above
B
None Of The Above
A
none of the above A

none of the above


C
none of the above B

B
galenet A
Either A or B
C
All The Above D
Formal Legal
Requirements, Open
System D
many B
Document type data
C
none of the above
B

None of the above


C
none of the above
B
Graphical Interface format
B
none of the above
B
none of the above C
User A
CGI C
Hyper text transfer port
C
None of the above
C
Online Catalog and
Customer Endorsements C
none of the above C
None of the above
C
functional groups
D
FONTCOLOR
B

voice recognition B

None of the above


A
none of the above B
Joint pictures experimental
group A
none of the above B
none of the above
B
all the above C
none of the above C
none of the above A
none of the above B
none of the above B
general electric C
organization
B
none of the above C
Evidence, Ceremony, D
Approval, Efficiency and
Logistics

none of the above


C
video C
CompuServe D
none of the above
B

none of the above


B
middle and lower D
None of the above
B
Domains
A
Search and discovery
A
Gateway
D
Subscription
C
Broadcast
B
None of the above A
Business- to-Billboard A
Retrieve
C
SGML Composer
C
none of the above B
C
Either A or B

service,hostname and port


B

None of the above


A
none of the above D
none of the above B
UN/EDIFACT
D

none of the above


B
none of the above
B
glossary C
none of the above B
.wmf and .bmp C
none of the above
A
none of the above C
Common Gateway
Interface D
none of the above
A
none of the above B
none of the above
B
hotlink B

none of the above


C
session layer D
A
none of the above A
none of the above
C
All of the above D

none of the above


B

none of the above


B
None of the above C
None Of The Above
A
Both B and A
C
none of the above
B
close A
none of the above B
none of the above C
none of the above
C
None of the above
C
item search,index search
C
none of the above B
none of the above B
browsers C
none of the above C
none of the above B
all of the above
B
mails B
editor B
none of the above
A

A
none of the above A
none of the above B
none of the above
A

none of the above

A
documents A

The private key is used by


the receiver for decryption
but not by the sender for
encryption.
A
Reviewing the systems-
access log. D
receiving information from
a host computer B
<l1 type=shape> D
Firewall vulnerability.
D
Security at the transaction phase
in EDI systems is not necessary
because problems at that level
will be identified by the service
provider.
C
none of the above B

none of the above


B
channel B
E-Commerce
No Question
________________ are another form of credit payment that lets customers use digital online
1
cheques to pay Web merchants directly
2 E-cash means______________________
E-commerce is a tool that addresses the desire of firms to cut services cost and improving the
3
quality of goods. It is a definition of e-commerce from _________
In Active advertisement, there are two types of models. They are _____ and ________
4
In E-Commerce, data extraction, transforming the data into transmittable form, transmitting the
5 data and downloading the data are the operations employed in _
In EDI, the transmission files are composed of different sets of external format files which are
6
grouped into multiple sets under the name of ________
The ________ allow companies to bypass the need for costly printed catalogs
7
The _________ commerce assists in integrating the customers and suppliers of the company
8
directly into the organisation
The _________ phase includes customer service and support to address customer complaints ,
9
product returns and products defects
The __________ model refers to information that is placed at a point where it will be noticed by
10
customers in the course of other activities and does not require active search
The ____________ is the process of encoding information to prevent it from being read by
11
unauthorized parties
12 The acronym for B2B is ___________
13 The EDI standardisation for International Trade and Commerce is introduced by ______
14 The network based technology is/are ____________
15 The small denomination digital tokens are called _________
Option 1 Option 2 Option 3
E-cash Digital Cash Smart Cards

Emergency Cash Electronic Cash Euro Cash


Communication Perspective Business Process Service Perspective
Perspective
Billboards and Junk Mail Online Catalog and Broadcast and Junk Mail
Billboards

Compiler Interpreter Assembler


batch files interchange sets functions

Billboard model of Online catalog Endorsement model of


marketing marketing
Business-to-Business Business-to-Consumer Consumer-to-Business

Post purchase interaction Purchase consummation Pre-purchase preparation

Catalog Endorsement Billboard

Decryption SSL Encryption

Business-to- Business Business-to-Backend Backend-to-Business


ANSI UN/EBCDIC UNESCO
EDI E-mail EFT
Microcash Micro Transactions TT(Tiny token)
Option 4 ans
Electronic cheques D

Endorsed Cash B
None of the above C

Online Catalog and C


Customer Endorsements

EDI D
functional groups D

None of the above B

Customer-to-Company B

Search and discovery A

Broadcast C

Subscription C

Business- to-Billboard A
UN/EDIFACT D
All of the above D
E-token A
No Question [Internet]
1 ___ would be used by parents to monitor their children on their home system.
2 ______ supports one button publish
3 ________ is the ancestors of the internet
4 _________ connects LANs.
5 _________ refers to the use of Internet technologies for placing telephone calls.
6 __________ is designed telephone system
7 _____________ is the Worlds largest computer network .
8 _________allows an application to multitask within itself
9 _________is a program that displays information about a host connected to the net

10 _______is the file format that works on internet


11 _______is/are a popular front end tool
12 ______and_____ are web searching features

13
______is the most advantageous database system
14 _____page in an web application is used to navigate to the rest of the pages in the
application
15 _____system is responsible for handling the screen and user I/O processing
16
A ............... is a LAN-based computer with software that acts as a controlling device for
controlling access to at least part, if not all, of a local area network and its available
resources.
17
A ____________ attack is when a hacker sends a continuous flow of packets to a system.
18 A block of text automatically added to the end of an outgoing email is called
19
A company posts a price list of its products on its website. The advantage to the
customer is that the company can
20 A computer based system for sending, forwarding, receiving and storing messages is
called an
21
A computer is to be linked to 8 terminals using a single communication link. To permit
simultaneous terminal operations, communication path will require which of the
following
22
A firewall is

23
A group of computers and other devices dispersed over a relatively limited area and
connected by communication links that enable a device to interact with any other on the
network.
24 A hub is a device that can connect
25 A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives
and printers. This type of network is called a
26
A long string of seemingly random bits used with cryptographic algorithms to create or
verify digital signatures and encrypt an decrypt messages and conversations.
27 A MAC address is of
28
A modem is a device that

29 A multiplexer is a form of
30
A new user initiates a new process of execution at the background,while the user can
continue his query process as usual in the foreground. This situation is referred to as
______
31
A NIC is considered as
32 A proxy server is
33 A search engine is
34 A sequence of bits or characters that identifies the destination and the source of a
transmission.
35 A set of rules and formats, semantic and syntactic, that permits entities to exchange
information.
36
A standard language for creating and formatting Web documents is:
37
A system that uses the Internet for business-to-business interaction is called a(n):
38
A Web page is another name for -----------
39 A_____ is a set of computers interconnected by transmission paths to exchange
information in internet
40
A______is nothing but a PC with a network operating system
41 Accessing the Internet from a typical home PC requires the use of
42 According to information Technology Act, 2000, To investigate contraventions the
controller of certifying authority shall exercise the like powers to that of
43 An action or event that might prejudice security.
44 An attempt to get access to a system by posing to be an authorised person.
45 An IP address is a
46
An ISP
47
An NIC
48
An online drugstore such as Drugstore.com is an example of_______
49

An organisation is upgrading its telecommunication lines. Which is the least important


objective while upgradation

50 ATM, Asynchronous transfer mode is a __________ technology.


51 BABEL consists a glossary of _____

52
BBS stands for______
53 Bluetooth is
54
Both the DBMS and the application resides on the same component in a ____system
55 Data is broken into small unit called __________ .
56 DBMS models can be grouped under____ categories
57 Dictionaries,encyclopaedias,government and other references are found in ______

58 Domain names must contain a description of the type of organisation that the domain
represents. A very common abbreviation used include:
59 Encryption techniques can be implemented in Hardware-Software
60 Expansion of WBT is ______________
61
FTP is

62 Home page will always be present as a first page of an application


63 HTTP stands for______

64 IETF Level 2 HTML DTD supports graphical browsers like _______


65 If a workstation contains a processor, monitor, screen manipulation device, printer,
storage and communication capabilities, it is said to be
66 If four computers are connected to a hub and then to the internet, how many IP
addresses are required for these 5 devices?
67
If you do not pick up your email for a week...?
68 In a .............. , the cable system forms a loop with workstations attached at various
intervals around the loop
69 In a ............... , each work station is directly connected to a common communications
channel
70 In a ................., each workstation attaches to a common backplane via its own physical
cable that terminates at the hub
71

Intelligent terminals differ from dumb terminals in that they

72
ISDN stands for _______.
73
JPEG and MPEG

74 LAN speeds are measured in


75 LAN stands for __________ .
76 Lynx is a _______ programme that works with terminals
77 Malicious software.
78 Modem speeds are measured in
79
Modem stands for __________ .
80
Most client/server applications operate on a three-tiered architecture consisting of
which of the following layers?
81
Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on
his computer how would he do this?
82 Multiple changes to the same record or a field are prevented by the DBMS
through______
83 Navigating through the menu of gopher is called moving around _______
84 New process of execution is referred to as______
85 None the person who is known as father of Internet
86 One defense option on a large network is to configure a ____________ to disallow any
external traffic.
87
One way that a virus CANNOT spread throughout a network is:
88 Protected/private character string used to authenticate an identity or to authorize access
to data.
89
Protocol is

90
RS-232 is a
91 Setting your privacy settings in Internet Explorer to medium is one way to block:
92
SMTP stands for __________ .
93 Software which prevents external access to a system is termed
94 TCP/IP stands for ________________

95
Telnet
96 Terminal hardware controls include
97 The .............. of the network concerns how network devices are physically (or optically)
interconnected.
98 The _____ level gives the broadcast overview of the net
99 The _____ protocol is a network protocol to be built for the World Wide Web
100
The ______ do not have processing power of their own and has only a screen, keyboard
and the necessary hardware to communicate with the host. For this reason, the
terminals are referred as_______________
101 The ________ is a form of mail that is not targeted to a specific audience
102 The _________ model use direct mail, spot television or cable television, in active based
advertisement.
103
The __________ model refers to information that is placed at a point where it will be
noticed by customers in the course of other activities and does not require active search
104
The advertising strategies emerging in the on-line world are ____________
105 The computer which can receive data from other computers on the network and print it
is _______
106
The famous Nigerian Fraud scam offered victims the opportunity to:

107 The first freenet is created at the_____ and is called______

108
The formal rules and parameters which are established to permit a microcomputer to
communicate with the mainframe computer as though it was a terminal of the
mainframe are called
109 The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain
sensitive information is called _________________.
110 The hardware and the software requirements together form the_____
111 The image format supported by most browsers is________________.
112 The initial web pages present in a web site is the ________ page.
113 The Internet is controlled by whom?
114
The major advantage of the checksum program is when it
115 The means of communicating between networks
116 The Media Access Control (MAC) is a sub layer of the:
117 The most preferred number system to represent a IP address is
118 The most widely used network operating system on PC LANs is
119
The other ways of getting connected to the net are_____
120 The principal topologies used with LANs are:
121 The principles, means and methods for rendering information unintelligible and for
restoring encrypted information to intelligible form.
122
The process of data being automatically written to a duplicate database is called______
123 The space used by Netscape to store the retrieved page is called______
124 The successful act of bypassing security mechanisms of the system.
125
The term HTTP stands for
126 The traditional intent and impact of this common type of attack is to prevent or impair
the legitimate use of network resources.
127
The two most common tools used to help with extracting information are:
128 The URL for encyclopedia Britannica is_________
129
The useful URL schemes are_____ and______
130 The uuencode files start with a _______
131
The Web page format in which all elements of a Web page are saved as one file is called:
132 The World Wide Web consists of _________
133 The World Wide Web was devised by _________
134 The worldwide web server uses the following standard interface to act as the
middleware:
135
The______ handles data processing and disk access in a Client/Server architecture
136

This website is the biggest bookstore on the earth.

137 To construct a simple LAN of 4 computers, you would connect them with _____
138 To look for information about interest areas on the internet, the user should use
139
To secure communication network against wire-tapping the most effective control is
140
To use the Internet, you
141 URL stands for ________

142 USENET is a BBS on ____ scale


143 Using the Internet to pursue, harass, or contact another in an unsolicited fashion is
called:
144 Value Added Network is an example of _________
145
WAN speeds are
146
What are the most common LAN technologies used in networking today?
147 What are the various types of bus architecture?
148 What are the various types of ring architecture?
149
What can be said about the safety of the Internet?

150 What do routers connect?


151 What does a router route?
152
What does FTP stand for?
153
What does IRC stand for?
154
What happens to data that is ruined before reaching to receiver
155
What is a disadvantage of joining a mailing list?

156
What is the best means of protection from cyber stalking?
157
What is the biggest disadvantage of the Ring topology?

158
What is the purpose of DNS?
159 What is the term that describes spying on one’s business rivals to gain a competitive
advantage?
160
What would you NOT be looking for when spying on a competitor?
161 When all the processing is done by the mainframe itself, the type of processing is
sometimes called as
162 When creating a network from just two PCs, what kind of cable would be used to connect
them?
163 When LAN connected together ,it is called __________ .
164
When saving a photograph for use on a website, which format should you choose?
165
When we talk of Data Transmission modes, then ATM stands for
166 Which do you NOT need to connect to the Internet?
167 Which is not one of the recognized IEEE sub layers?
168 Which of the following in an OSI layer
169 Which of the following is a likely target of a cyber terrorist that would cause considerable
loss of life?
170
Which of the following is a properly formatted email address?
171

Which of the following is a true statement about the OSI model layers?

172
Which of the following is a Web browser?
173 Which of the following is an easy-to-use service to get information on someone?
174 Which of the following is an example of unacceptable online ‘netiquette’?
175 Which of the following is NOT a means of monitoring employee use of company
technology?
176 Which of the following is NOT a properly formatted IP address?
177
Which of the following is not an appropriate control over telecommunications software
178
Which of the following is NOT an example of a DoS attack that is popular among hackers?
179

Which of the following is NOT true about the Internet?

180 Which of the following is the most common danger on the Internet?
181
Which of the following is true concerning the function of a switch?

182
Which of the following is used to update a Web query?
183 Which of the following pieces of information would NOT be found online?
184

Which of the following requires an Internet connection?

185
Which of the following terms applies to network used to connect computers with other
computers, peripherals and workstations that are in fairly close proximity
186
Which of the following would be a form of cyber terrorism?
187 Which of the following would be performed on a network server and not normally on
individual workstations?
188
Which of the following would NOT be considered an example of cyber terrorism?

189 Which one of the following is NOT a network topology?


190
Which protocol would be used to download a free anti-virus program from the Internet?
191
While researching the Direct taxes assignment, you find a useful website. What is the
most efficient way to access the site at a later time?
192 WINSOCKS is expanded as______
193 Yahoo,lycos,excite and webcrawlers are _____
194
You download from the internet, a screensaver, a ten-second sound file and a ten-second
music video clip. You also add a hyperlink. Which of the media elements has the greatest
effect on the file size?
Option 1 Option 2 Option 3
A Trojan horse Adware A worm
lynx mosaic Lycos
dnet arpanet ARPANET
Bridges Routers Protocol
VoIP IPT IPP
ISDN ATM Internet
Ethernet Internet ARPANET
multiprocessing multithreading multiplexing
finger service ping service ftp service

exe DLL BMP


visual basic power builder SQL * plus
search engines,directories ftp and finger telnet and ftp

hierarchical database
file management system system network database system
startup home end

host server back end

Novell PC Client Server

hack packet flood


an attachment. a signature. a footer.

limit access to computer stop its competitors seeing


set its prices very high owners only their prices

Office Automation Executor systems Electronic mailing

Mixer Modem Multiplexor

used to protect a computer


room from fires and floods a form of virus a screen saver program

LAN WAN CAN


Only Computers Can not computers Only printers

Planetary network Ring Network Loop Network


Key Lock Hash Function
48 Bits 48 Bytes 48 KB
Allows computer signals to
be send over a telephone
line Aids in back-up procedures Packs data in a disk file
Printer modem bridge

multiprocessing multithreading multiplexing

National Informatics Center Network Interface card New Information Card


a backup server an email server a poor file server
hardware IR system for the Internet browser

Acts Regulations Address

Acts Regulations Address


the World Wide Web
round trip HTML. Consortium HTML.

extranet. intranet. privileged network.

Web query. HTML document. round trip HTML document.


server client network

distributed computing
wan system windows NT
CD-ROM drive a modem Windows 95

Sales - tax authorities Income - tax authorities Judge of a civil court


Loss Threat Exposure
Spoofing Imposting Unauthorising
Physical address Logical address A memory address
provides access to the
Internet is a CPU register is a CPU functional unit
interfaces a modem to a
a Novell Interface Controller used to control a printer computer
single-user database multi-user database e-commerce database
application application application
To carry more network To improve network To improve system
capacity services response time
MAN and WAN LAN and WAN LAN and MAN
computer related biographical information bookstores
abbreviations and acronym

business broadcasting bulletin broadcasting


bulletin board system system system
Wireless technology Wired Technology Ultra violet technology

PC LAN distributed computing


Cells Bits Packets
four one two
encyclopedia Britannica on-line reference works more information

.com is used for company .co in used for company .con is used for companies
I only II only Both I & II
Web based Training Web based Technology Web based Transport

used to send email used to browse the Web is part of Netscape


1 FALSE
hotlink text transfer hyper text transfer higher type transfer
protocol protocol protocol
Mosaic Yahoo PINE

A dumb workstation An intelligent workstation A personal computer

One Two Four


It will be waiting for you to A letter will be sent to you
It will be deleted collect it in the post

Ring Bus Star

Ring Bus Star

Ring Bus Star


Use the computer to which
Can send data to a they are connected to Generally require a
computer and receive data perform all processing keyboard for data entry and
from a computer operations a CRT for display
Integrated system dynamic Integrated Symbolic Digital Integrated Services Digital
networks. networks. network.
have to do with
compression of graphics
and video have to do with Web pages the Internet
bps Kbps Mbps
Linear area networks Local area networks Local array of networks.
world wide web server world wide web client interface
Utility Pirated software Virus
bps kbps mbps

Code/De-code Modulation/Demodulation Module/De-module

Desktop client, application, Desktop client, software, Desktop server, application,


and database. and hardware. and database.
Click on the Back arrow
until the desired site is Click on ‘Go to’ or ‘Search’ Go to the History page and
found in the browser look for the site

fixes locks constraints


gophering gopherspace cyberspace
task process thread
Tim Berner Lee Hoffman Charles Bubbage

firewall router switch


by attaching itself to a
by attaching to an e-mail. through an FTP port. document.

User-id Password Name


a list of rules for
software that facilitates transferring data over a software that allows file
connection to the internet network copying

Type of cable Terminal Standard Communication protocol


pop-ups. cookies. spam.
System modulation transfer Software Mail transmission Simple Mail transfer
protocol protocol protocol
firewall gateway router
transfer control transmission control transfer communication
protocol/internet protocol/internet protocol protocol/internet protocol

uses wireless
used to send email communication medium is part of Netscape
Time of day control locks Encryption algorithms Parity checks

Physiology Topology Both A and B


middle lower top
Transfer Protocol Transmission protocol Hyper text

"dumb terminals" dumb servers dummy terminals


E-mail Bulk-mail Direct-mail

Broadcast Junk mail Billboard

Catalog Endorsement Billboard


Active or push based Passive or pull-based Glow sign or hoarding
advertising advertising strategies

File server Printer server Receiver

purchase off-shore
buy stocks. invest without risk. property.
university of university of university of California net
berkeley,berkeley freenet cleveland,cleveland freenet

Modems Protocols Multiplexors

Shill bidding Phishing Siphoning


platform configuration package
.bmp and .gif .bmp and .jpeg .gif and .jpeg
first start home
The US government Scientists in Switzerland No-one
Adds more bytes to
programs Verifies integrity of files Increases boot up time
Router Gateway Port
Network Layer Transport Layer Physical Layer
Binary ASCII Octal
Linux Novell Netware Windows NT
news groups,yahoo and bulletin boards,mails call application servers,proxy
infoseek and wireless system servers and web servers
Bus Star Ring

Photography Digital Signature Cryptography

repairing redo logging disk defragmentation


buffer cache built-in
Penetration Retrieval Cryptography
hyper terminal tracing
program hypertext tracing program hypertext transfer protocol

Password cracking System intrusion Denial of Service


Trojan horses and key
cookies and Trojan horses. loggers. cookies and key loggers.
www.ency.in www.eb.com www.encybrit.com
newsgroups and search
yahoo and infoseek mailto and files engines
start begin first

XML. HTML. DHTML.


information web pages network connections
CERN ECRN CARN

key gateway interface uniform resource locator common gateway interface

host server back end

Etrade.com Amazon .com Dell .com


A cable Hub Router
scanner CD-ROM clip-art file
Use of logical access
Use of identifiers Use of passwords methods
must use the World Wide
Web must use electronic mail must have a LAN account
Unknown resonance Uniform resource locator United relay limited
language
small large very small

Internet stalking. cyber stalking. virtual stalking.


Global Network Private Network Satellite Area Network
usually higher than LAN measured in bytes per depend on the
speeds second transmission medium
Ethernet, token ring,
DecNET Ethernet, token ring, FDDI Ethernet, DecNET, FDDI
Linear Parallel Both A and B
Parallel Circular Linear

All sites are safe and There are safe and unsafe Only large name-
reliable. sites. recognizable sites are safe.
Bridges and Repeaters. Two or more networks Bridges and Hubs
bits frames Packets

File Transfer Program File Transmission Protocol File Transfer Protocol


International Relay of Internet Remote
Internet Relay Chat Characters Conversations
It continue on to target
Data return to the sender It gets destroyed bit by bit. device with corrupt data
Receiving messages
automatically from anyone People discussing a topic of
in the group interest globally High volumes of email
Never use your real
Use a fake e-mail address. identity. Use a proxy server.
If the hub goes down, it
If one node goes down, it brings down all of the nodes
There isn't one brings down the entire ring on that section
So computers can be So IP addresses can be
referenced by a name shorter So email is delivered faster

Competitive espionage Corporate espionage Industrial espionage


Contact numbers of the
A list of competitor’s clients management group Research data

server processing host processing dumb processing

RG7U Coaxial cable Fiber


MAN WAN GAN

BMP GIF JPEG


Asynchronous
Automated Tailor Machine Any Time Money Transmission mode
Modem CD-ROM Telephone line
Physical Layer Data Link Layer Network Layer
Physical Layer Data-Link Layer Network Layer
Crashing the stock market, Shutdown of military Contaminating water
as in the 1930s security systems systems
paul .trigg @ domain. org.
uk paul.trigg@domain.org.uk paul.domain.uk

The layers cannot Any layer can communicate Any layer can communicate
communicate with one directly with any other only with the layer directly
another. layer. above or below it.

HTML Internet Explorer Microsoft Excel


People Search Yahoo People Search USA People Search
Replying promptly Keeping messages short Including the Subject

Phone E-mail Web traffic


193.1.2.3 45.1.1.1 143.215.12.19
Message sequence number
Encryption Physical Security controls checking
Flood a Web server with Virus that initiates a ping
IP flood requests flood

It is made up of many
networks connected into
transmission lines called It works the same way as a
It is one large network. backbones. local network.
Virus Fraud Adware
Combines connectivity of a Switches data from
hub with the traffic incoming ports to outgoing
Concentrates connectivity regulation of a bridge ports.
the Insert Hyperlink
the Refresh command command the Update command
Name of your bank Date of birth Personal assets

using Internet Explorer to clicking a hyperlink that


view a Web page that is updating the values that references a document that
stored on the hard drive on are obtained through a is stored in the floppy drive
your computer Web query on your computer

Distributed systems Local Area network Wide area network


Disruption in
Economic damage communication Disruption in supply lines
Backup data on a daily
Apply security patches Update virus definitions basis
An attack on a system for An attack with the purpose
personal gain of gaining publicity Giving out disinformation
Star Bus Linear

irc ftp www

Write it down on a piece of Add it to ‘Favourites’ or


Save it to a floppy disk. paper. ‘Bookmarks’.
windows socks windows sockets windows stocks
search engines web directories database

Hyperlink Screensaver Sound


Option 4 ans
Spyware D
navigator gold 2.0 C
none of the above B
Repeaters B
PoIP A
Intranet A
None of the above. B
none of the above B
none of the above A

html D
all of the above D
none of the above A

relational database system D


none of the above B

front end D

Network PC C

traffic C
an encryption. B

update its prices as soon as


they are changed D

Instant post-office C

Time sharing computer C

none of the previous D

PAN A
None of the above D

Star Network D
Formula A
48 MB A

Speeds up online printing A


none of the previous D

none of the above B

None of the above B


none D
none of the previous C

Protocols C

Protocols D

one way HTML. C

network topology A

Web browser. B
none of the above C

LAN D
Netscape B

Police officer of IPS rank. B


Hacking B
Approving A
None of the above B

make of processor A
connects a computer to a
network D

None of above C
To obtain an accurate
inventory of network
related equipment and
parts and network nodes D
LAN WAN and MAN B
none the above D

none of the above A


None of the above A

centralized A
None of the above. C
many A
galenet A

None of the above A


Neither I or II C
Web based Transaction A

is a protocol for the


transfer of files between
computers D
A
none of the above B

Lynx A

A mainframe PC B

None of the above C

None of the above A

Mesh A

Mesh B

Mesh C
Are required with a
microprocessor which
permits some data
processing such as input
validation D

None of the above. C

none of the previous A


Mips C
None of the above B
none of the above B
Cracker C
mips B

None of the above B

Desktop server, software,


and hardware. A

Go to the Bookmarks or
Favorites page C

traps B
none of the above C
client-server C
Howard Aiken A

hub B
by scanning the computer
for a connection. B

Address B

a gateway calling program


for internet bridging B
Device interconnect
standard D
viruses. B

None of the above. C


virus checker A
none of the above B

None of the above D


All of them C

None of the above B


middle and lower D
None of the above. C

dummy servers A
Junk mail D

Endorsements A

Broadcast C

All of the above D

None of the above. B

make large amounts of


money by parking funds in
their bank account. D
none of the above B

LAN B

Hoaxing B
system A
.wmf and .bmp C
none of the above C
None of the above C
Misleads a program
recompilation B
Pin B
Data Link Layer D
None of the above A
None of the above C

none of the above B


All of above D

Message Digest C

disk mirroring D
none of the above B
Password Cracker A

hypertext tracing protocol C

Port sniffing C

key loggers and worms. C


none of the above B

none of the above B


none of the above B

MHTML D
mails B
NET A
application protocol
interface C

front end C

Msn .com B
None of the above B
search engine D

Use of encryption methods D

All of the above A


None of the above B

none of the above B

Web stalking. B
None of the above B

limited by modem speeds C


Ethernet, token ring,
ARCnet B
None A
Both A and B B

ActiveX-enabled sites are


safe. B
Hubs and nodes B
None of the above C

None of the above B

None of the above A

None of the above B

None of the above C

Use anti-spyware software. B


If the hub goes down, it
brings down all of the nodes
on all of the rings B

None of the above A

Economic espionage C

A competitor’s new project B

data processing B

Twisted pair B
None of the above. B

TIFF C

None of above C
None of the above B
All of the above D
All of the above D
Shutdown of nuclear plant
safety systems D

None of the above B

Any layer can communicate


only with the layer above it. C
both HTML and Internet
Explorer B
Lycos Search B
Using all capital letters D

Application updates D
None of the above D

Logical access controls B

UDP flood A

Individual computers can


connect to it using an ISP. A
Spyware B

All of Above B

the External Data command A


Criminal records A

viewing an Excel worksheet


that you have saved as a
Web page. B

Protocol B
All of the above are
correct. D

Limit logging on access C


Changing the content of a
Web page D
Ring C

telnet C

Cut and paste it to a word


processor document. C
none of the above B
channel B

Video C
No Question
Visual Basic
1 In visual basic, _______ is a method to convert a string into integer.
2 In visual basic, _______ keyword is used to declare a variable
3 In visual basic, _______ method is used to add an item in a combobox
4 In visual basic, _______ property of a textbox control is set to _______ to underline a text

5 In visual basic, a method RGB(255,0,0) will generate _______ color


6 In visual basic, a method RGB(255,255,255) will generate _______ color
7 In visual basic, if a user uses a function key F4 _________ becomes visible.
8 In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type of
shape should we get?
9 In visual basic, the interval property of a timer control is given in ________

10 In visual basic, to display a message in the run time _________ function is used
11 In visual basic, to display text on a label object _________ property is used
12 In visual basic, to populate a drive list box with a directory list box __________ statement is
used
13 In visual basic, using a data control, a record can only be added from the last record. Adding a
new record is only possible using _______ method of a recordset object.
14 In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a
messagebox function.
15 In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any
object
16 In visual basic, when a form object appears on the screen _________ event is triggered.

17 In visual basic, when a record pointer reaches to the first record, _______ property of a
recordset object is automatically set to ______
18 In visual basic, when a record pointer reaches to the last record, _______ property of a
recordset object is automatically set to ______
19 In visual basic, when a textbox control receives the focus ________ event is triggered.

20 In visual basic, while closing a form _______ event of a form object is triggered earlier to
terminate event.
21 In visual basic, when a record pointer reaches to the last record, _______ property of a
recordset object is automatically set to ______
22 In visual basic, the explorer view of a project is displayed in ___________
23 In visual basic, when a record pointer reaches to the first record, _______ property of a
recordset object is automatically set to ______
24 In visual basic, _______ is a method to convert a string into integer.
25 In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type of
shape should we get?
26 In visual basic, a timer event is only available in timer control.
27 In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any
object
28 In visual basic, _______ is a property of a textbox control to set a color of a text.
29
In visual basic, _______ property of a textbox control is set to _______ to underline a text
30
In visual basic, _______ property of a textbox control is used to change the size of text.
31
In visual basic, the interval property of a timer control is given in ________
32
In visual basic, _______ property of listbox control counts the number of items in the list
33 In visual basic, the properties of various controls can be set using __________
34 In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a
messagebox function.
35 In visual basic, ________ is a function which displays a message and it also allows the user to
enter values in a form object
36 In visual basic, using a data control, ________ is a recordset type which allows to add a new
record and also to update existing record in a recordsourse object
37 In visual basic, while closing a form _______ event of a form object is triggered earlier to
terminate event.
38 In visual basic, to give a backcolor or to bring in a picture to a command button can only be
done if we set the style property to ______
39 In visual basic, a method RGB(255,0,0) will generate _______ color
40 In visual basic, a method RGB(255,255,255) will generate _______ color
41 In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible.
42 In visual basic, if a user uses a function key F4 _________ becomes visible.
43
In visual basic, when a textbox control receives the focus ________ event is triggered.
44 In visual basic, a form is a ________ object.
45 Microsoft visual basic is a Rapid Application Development tool.
46
In visual basic, when a form object appears on the screen _________ event is triggered.
47 In visual basic, to display text on a label object _________ property is used
48 In visual basic, _______ object is used to access the database and also to manage the data in
the database.
49 In visual basic, when a checkbox control is checked _______ property is automatically
assigned with 1.
50 In visual basic, _______ keyword is used to declare a variable
51
What is the extension of the Visual Basic project file that stores the design of a user control.
52 Which event of a text box would you use for validating the data entered by the user?
53 Which of the following statements forces inline error handling?
54 The _______ method resets the contents of bound controls to their original values when the
user clicks on the cancel button.
55 To deactivate the Form UnLoad event, you make the following change in the function
definiton:
56 How many root nodes can a TreeView control have?
57
A project group is a Project which:
58 Procedures declared in a _____ are local whereas procedures declared in a ______ are
available to the whole application.
59
How can you keep the user from exiting a form by clicking the Close button?
60 The _______ property enables Visual Basic to draw complete images in memory before
displaying them on the Screen.
61 You want to display the code and the description of an error. What would be the correct
syntax?
62
What is the purpose of the Image List Control?

63
Which method would you use to get a free or unused File identifier while opening any file:
64 Which property procedure is used to retrieve the value of a property?
65
Which of the following can be shown to the user using the Common Dialog control in VB?
66 Which of the following are not properties of Command Button:
67
Which events enable you to determine which key was pressed by the user?
68 In order to access a file in Non-textual format, you have to open file in:
69 Visual Basic displays information depending upon the current value of two properties of the
form, called:
70 Which of the following procedure types will execute when you assign a value to a property of
an object?
71
In order to overlap the controls (say a command button) during design time, we use the
‘Send To Back’ or ‘Bring To Front’ option from the Edit menu. To change it dynamically
(i.e.during program execution) we need to change:
72 Which property of the ProgressBar determines how much of the bar is filled?
73 The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic
program.
74
The caption and the name properties of the command button:
75
You try to initialize a new Object variable with the following line but receive an error. What
could be the possible cause? Set MyVar = New Classname
76
Which of the following will perform a direct execution of a Command object?
77 The vb Critical symbol displays:
78 vbYesNo is an example of a(n):
79

The primary difference between the MsgBox statement and the InputBox function is the:

80
Which of the following is TRUE about a protected form (i.e., a form where the Protect Form
button on the Forms toolbar is toggled on and is assumed to remain in that position)?
81 Which event is triggered when the user moves to another open form?
82
Which of the following is TRUE regarding the Datasheet?
83 Graphical software tools that provide complex analysis of stored data are:
84

Which of the following statements is TRUE regarding PowerPoint diagrams?

85 Which keyboard key combination is used to undo the previous command(s)?


86 Microsoft visual basic project file has _______ file extension.
87 In visual basic, _______ method is used to add an item in a combobox
88
In visual basic, _______ method is used to load picture during runtime in an image control
89 In visual basic, to populate a drive list box with a directory list box __________ statement is
used
90 In visual basic, to display a message in the run time _________ function is used
91
In visual basic, to populate a directory list box with a file list box ________ statement is used
92 In visual basic, ________ is a property of a recordset object which counts the number of
rows in a recordsourse object
93 In visual basic, using a data control, a record can only be added from the last record. Adding a
new record is only possible using _______ method of a recordset object.
94 In visual basic, using a data control, a record is saved to a recordsource object using _______
method of a recordset object.
95 In visual basic, using a data control, to navigate to the previous record ________ method of a
recordset object is used.
96
To deactivate the Form UnLoad event, you make the following change in the function
definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To prevent
the Form from closing, you will set the:
97 ______ function is used to display a message box
98 ______ is fired when an event is triggered is the concept based on a Visual Basic language

99 A ________ sheet lists all the properties that pertain to the form or the controls
100 A form can be bind to a record source using _____ property of the form
101 Properties of a form can be changed by selecting ______from view menu options
102 The default data type of VB is integer
103 Visual Basic is based on __________

104 Visual Basic language is a _____ tool


Option 1 Option 2 Option 3

value() int() number()


dime dim var
add additem loaditem
underline,true fontunderline,true textunderline,true

blue red green


red green blue
properties window form layout window toolbox
circle rectangle square

one- millionth of a second one-hundredth of a second one-thousandth of a second

messagebox() message() msgbox()


text name caption
Drive1.Drive=Dir1.Path Dir1.Path = Drive1.Drive File1.Path = Dir1.Path

update append addnew

title prompt vbmsgboxstyle

1 FALSE

load unload initialize

bof,false movefirst,true movefirst,false

eof,false movelast,true movelast,false

change lostfocus text

load activate unload

eof,false movelast,true movelast,false


properties window form layout window toolbox

bof,false movefirst,true movefirst,false


value() int() number()

circle rectangle square


true false
true false
fontcolor color forecolor

underline,true fontunderline,true textunderline,true

textsize size foresize

one- millionth of a second one-hundredth of a second one-thousandth of a second

count recordcount itemcount


form layout window prperties window project explorer

title prompt vbmsgboxstyle

msgbox() textbox label

opendynaset opensnapshot dbopensnapshot

load activate unload

standard opaque transparent


blue red green
red green blue
properties window form layout window toolbox
properties window form layout window toolbox

change lostfocus text


child parent container
true false

load unload initialize


text name caption

opendatabase dbengine openrecordset

enabled visible value


dime dim var

.ctx .ctl .ctr


Validate Validation Check
On Error GoTo linelabel On Error GoTo Inline On Error Stop
UpdateControls PaintPicture Refresh
Cancel parameter to a non- UnloadMode parameter to
zero value Cancel parameter to 0 a non-zero value
1 2 3
Consists of several Consists of several Consists of Various Forms
Programs Applications And Code Modules
Form window, standard or Project window, view code
code module window Class module, code module
Place code in the Terminate Place code in the Unload Place code in the Deactivate
event event event

AutoRedraw = True AutoRedraw = False Refresh


Msgbox err.number & Msgbox error.number &
Msgbox err.no & err.text err.text error.text

To display images to the To help in creating a


user ToolBar To allow the editing of icons

FreeFile GetFileNum GetFile


Retrieve Get GetProperty
Common messages passed
to Windows Open dialog box Windows explorer
Caption Visible Multi-Line

Click and KeyPress Click, KeyUp and KeyDown KeyUp and KeyDown
Ascii Format Binary Format Input Mode

CurrentX and CurrentY ScaleLeft and ScaleTop ScaleHeight and ScaleTop

Property Get Property Assign Property Let

Background color property Caption property ZOrder property


Min Max Value

Shell Substr SetAttr

Are one and the same Can be different at times Are actually not properties
You do not have the
You do not need to use the permission to access the MyVar has not been
Set command here class declared
The Open method The Exec method The ExecProcedure method
A warning query icon A critical message icon An exclamation icon
statement. variable. intrinsic constant.

InputBox function can be


MsgBox statement returns InputBox function returns a created with the macro
a value, while the InputBox value, while the MsgBox recorder, while the MsgBox
function does not. statement does not. statement cannot.

Data cannot be entered into


the form. The form can be modified. Data can be entered.
Unload QueryUnload Deactivate
Once data is entered it Once data is entered it can Data cannot be entered into
cannot be changed. be changed. Datasheet.
OLTP. OLAP. OLST.

You can change the You can change both the


appearance of a whole appearance of a whole You cannot change the style
diagram, but not individual diagram and the individual of the connecting lines in an
shapes of a diagram. shapes of a diagram. Organization chart.
[Enter+A] [Shift+Z] [Alt+Z]
.vbg .vbp .frm
add additem loaditem

load loadpicture addpicture

Drive1.Drive=Dir1.Path Dir1.Path = Drive1.Drive File1.Path = Dir1.Path


messagebox() message() msgbox()

Dir1.Path=File1.Path Dir1.Path = Drive1.Drive File1.Path = Dir1.Path

openrecordset opendatabase recordcount

update append addnew

append update additem

movenext movelast moveprevious

Cancel parameter to a non- UnloadMode parameter to


zero value Cancel parameter to 0 a non-zero value
SysCmd MsgBox message
bullet command procedure

data property both a and b


form name control record source
change properties properties form properties
1 FALSE
action language structured query language event - procedural based
language
RAD RAP RAID
Option 4 ans

val() D
none of the above B
none of the above B
none of the above
B
black B
white D
project explorer window A
oval
D
one-ten thousandth of a
second C
none of the above C
none of the above C
none of the above
B
additem
C
none of the above
C

A
activate
D
bof,true
D
eof,true
D
gotfocus
D
initialze
C

eof,true D
project explorer D

bof,true D
val() D

oval D
A
A
none of the above C

none of the above B

fontsize D
one-ten thousandth of a
second C

listcount D
toolbox B

none of the above C

inputbox() D

dbopendynaset D

initialze C

graphical D
black B
white D
project explorer window D
project explorer window A

gotfocus D
none of the above C
A

activate D
none of the above C

none of the above B

style C
none of the above B

.ocx B
Audit A
On Error Resume Next D
Resize A
UnloadMode parameter to
a zero value A
None of the above D

Consists of several Projects D

None of the above A

None of the above B

PaintPicture A
Msgbox error.number &
error.description D
To provide a repository for
images used by other
controls D

GetBytes A
Value B

Input box D
Font C
KeyPress, KeyUp and
KeyDown D
Output mode B

x and y A

Property Set C

AutoRedraw property C
CurrentVal B

CStr A

None of the above B

None of the above C


None of the above D
None of the above B
built-in procedure. C

MsgBox statement can be


created with the macro
recorder, while the
InputBox function cannot. B

A new check box can be


added. C
Terminate C
There is no such thing as a
Datasheet. B
OLIP. B

You cannot change the


color of the boxes in an
Organization chart. B
[Ctrl+Z] D
.frx B
none of the above B

none of the above B

none of the above B


none of the above C

File1.pattern=Dir1.path C

count C

additem C

addnew B

movefirst C

UnloadMode parameter to
a zero value A
none of the above B
none of the above C

none of the above B


none of the above C
new properties B
B
none of the above C

none of the above A


No Question
1 ______ and _____ key combination will extend the selection by one character on the left and
right
2 ______ is a facility that enables recording and replaying of a sequence of keystroke
3 ______ is a software for sending and receiving e-mail messages
4 ______ is an online dictionary maintained by word to obtain synonyms for words
5 ______ is the default view in Word used for typing Editing and Formatting the Text
6 _______ is a word processing that is a member of the office 2000 family
7 ________ is a box surrounding a page on all slides or a line that sets off a paragraph on one or
more slides
8 ________is the coding system used to create web pages
9 ________shows how a document would look like when published on the web or on an
intranet
10 _______are blueprints or patterns for documents of a certain type
11 _______can be used to automate certain actions in response to events
12 _______option from the file menu is selected to run 'publish to the web wizard'
13
_____and_____ are improved layout in Word 2000
14
A pull quote is best emphasized by:
15

A reverse in a newsletter is:

16 A short description of a tool bar button called the ______ is displayed when the mouse
pointer is allowed to stay for a second on the button
17 A table consists of ______ that contain text or graphics
18 Aryan has created a ten-page story, but only wants to print the first two pages. What printer
command should he select?
19 As related to type size, how many points are there to the inch?
20 Assume you are creating a two-column newsletter. Which type size is the most reasonable for
the text in the columns?
21
Assume you are working on a newsletter in which the masthead extends across the top of the
entire first page. The rest of the newsletter has two columns. What is the minimum number
of sections in the newsletter?
22

Assume you have made all appropriate selections in the Columns dialog box in Word, but
cannot see any columns on the screen. What is the most likely cause?

23 AutoShapes in word can be created by accessing the _____


24 Before submitting your work you want to find any words spelt incorrectly. Which of the
following would you use?
25 By default, a document consists of_____ section
26 By pressing the _____ key inserts a blank row after the last row in the table
27
Desktop publishing is a more sophisticated form of which of the following types of software?
28 Drop Cap tool does not work for the contents in the table format
29 Drop caps are added to a Word document using the ___________ menu.
30 Given the default left and right margins, and ½-inch spacing between columns, the width of
each column in a two-column document will be:
31 How are data organized in a spreadsheet?
32
How are suggested changes entered for review on an initial Word document?

33 In Office2000 environment the tool that makes work easier for us is_____
34 In Word 2000 the macro dialog box is activated with the help of ____ key combination
35 In Word Macros are written in _____
36
In your English essay you notice that the paragraph at the bottom of page 1 continues on to
page 2. You would like to make this paragraph start on page 2.What would be the best way to
do this?
37 New option under the file menu of word creates a new blank document that is based on the
normal templates
38 OLE stands for_____

39 Pertaining to newsletters, which of the following cannot be changed using the Columns
command dialog box?
40 Pick out the element from the following that does not form the type of tabs for the Word
2000
41 Tables in a document help you to easily arrange all of the following EXCEPT:
42 The "format columns" option allows to create columnar text up 12 columns only.
43 The _____ helps us to keep track of the margin of the page
44 The ______ option enables us to convert text into a table format
45 The _______ option in word allows the user to automatically correct misspell words as and
when they are typed
46 The alignment available for tabs does not include
47 The application that supplies data in OLE is called an _________
48 The box that separate text from the document and allows it to behave like an independent
object is known as
49
The dialog box that is used to determine the documents margins is
50
The dialog box that is used to incorporate picture bullets into our documents or web pages is
51 The document that makes the user to organize and maintain a long document, such as
multipart report or a book consisting of chapters
52
The easiest way to create a document in word is

53 The feature that enables user to type anywhere in a document without pressing or tab
54 The features that enables the user to type text graphics tables anywhere in the document
without pressing enter or tab
55 The key that is used to change the font from the current positioned in a document is
56 The key that is used to change the style of the document that is from that normal to heading1
or heading1 to other document styles.
57 The key that is used to indent a paragraph is
58 The key that is used to perform a task to select all t he text in the documents is
59 The keys that are used to navigate between headers and footers are
60 The mode that is initialized or toggled to if the user is in a position to overwrite the text in the
word
61 The network that makes information easily accessible across various networks is _______

62 The object that composes of set of tools which helps to create and work on different shapes
like rectangles, circles, flowcharts etc.
63 The object that helps us analyzing data statistically is known as
64 The object that is used to provide information like the title of the book, name of the chapter,
page number etc.
65 The short-cut-key that is used for paragraph spacing(1.5)
66 The short-cut-key that is used to indent a paragraph spacing in the documents is
67 The short-cut-key that is used to paste the selected text
68 The special symbols that are inserted using "insert symbol" option of the word can not be
printed by the printer as they are not standard keyboard symbols
69 The thesaurus is invoked by pressing_______
70 The user can modify the picture from the clip art
71 The user can set a spelling checker to skip the marked part of the next
72 The user can split the screen only into two parts
73
The user could take a picture from a magazine and insert it into the document by using a
74 The view that enables us to view how objects will be positioned on the page when it is printed

75 The______ feature allows the user to copy and paste upto 12 items at the same time in an
application
76 The______ is used for quickly setting paragraph indention using the mouse
77 To clear all the tabs in a document the option that is clicked from the tabs dialog
78 To display an OLE object in the form of an icon ____ option is selected from insert object
dialogue box
79 To highlight certain parts of a page to set it apart from the rest of the page we make use of
the following features
80 To identify a document, it is helpful to include the file name on each page as a
81
Using an electronic bulletin board, Seema can do all of the following except which one?

82 Various fields are added to a regular document to create a special document called a form
through the ____________ toolbar.
83 Veena is entering a paragraph in a word processing program. When the cursor gets to the end
of a line, what is the best way to get the cursor to the next line?
84 Veena typed the following sentence: "The girl was very beautiful." In which word processing
utility could she find a synonym for "beautiful"?
85
What basic tools would you find in the Edit menu of a word processor
86
What command in a word-processing program can be used to change the word ‘him’ to ‘her’,
and also the word ‘he’ to ‘she’ in the given phrase? “On a cold and still night, the only sound
that could be heard was the owl that had ade its home in the nest outs
87
What does a document contain?
88 What edit commands would you use to insert a paragraph from one document into another
document, while still keeping the paragraph in the first document?
89
What happens when you open a document that has been saved using the Versions
command?
90
What hardware is essential for a word?

91
What is a header in a document?
92 What is a picture that is saved on a diskette and can be pasted into a document?
93
What is a Word Processor used for?
94 What is the name of the process of determining the cause of errors in a macro?
95 What process should be used to recall a document saved previously?
96 When a new table is created the insertion point flashes in the _____
97
When opening and working with multiple versions of a document, how can you tell which is
the most recent version?
98 When word is opened a new document called_____ is displayed, where the user starts typing
the content right way
99 Which is used to indent text within a document?
100 Which key moves the cursor to the beginning of the next line of text?
101

Which of the following definitions is CORRECT?

102
Which of the following is NOT correct with respect to page, column, and section breaks?
103

Which of the following is the default Word column width?

104

Which of the following is TRUE about saving a document using the Versions command?

105

Which of the following is TRUE related to editing comments in a Word document?

106

Which of the following statements are False

107

Which of the following statements are false with reference to the use of a header row source
for a mail merge

108

Which of the following statements related to a Section Break are True

109

Which of the following statements would NOT be a reason for showing suggested revisions in
a Word document without changing the original document?
110
Which of the following tools will copy the formatting of selected text to other places?
111 Which of the following types of fields CANNOT be inserted into a form?
112
Which of the following would be the most appropriate font for a newsletter headline?
113

Which statement is NOT true regarding revisions made in a Word document?

114
While word processing, in which of the following situations would Tom use the "Copy"
command?

115 With reference to auto correct which of the following statements are false

116

With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE false

117
With the reference to password protected documents which of the following statements are
false

118 Word art is text with


119
You have used the word ‘discover’ four times in an English essay you have created using a
word processing program. You would like to find another word of similar meaning to use
instead of ‘discover’. Which of the following would you use to do this?
Option 1 Option 2 Option 3

shift+end and shift+home shift+left and shift+right ctr+end and ctr+home


Mail Merging Macro Data Source
email client outlook express micro soft outlook
thesaurus hyphenation mail merge
NORMAL ONLINE LAYOUT PAGELAYOUT
Word 2000 Office 2000 Office 97

border shading style box


html xml sgml

web layout view online layout view browser


template model dialogs/alerts
report form chart
create html new save as html

web layout, printlayout normal layout, web layout web layout, page layout
setting it in larger type or underlining the text of the
font size. typing it all in capital letters. pull quote.

a section of text where the the guidelines used to


first letter of each sentence establish where different
a section of white text on a is lowercase and the rest elements of the newsletter
black background. are uppercase. will go.

Screen Tip Tool Tip Icon Tip


row rows & columns records

Print all From ___ To ____ Page setup


6 10 12

6 point 10 point 15 point

One Two Three

You are not in Print Layout You have not inserted a You have not specified
view. column section break.. continuous section breaks.
drawing toolbar control box database

Thesaurus Spell Checker Grammar Checker


1 2 0
tab end enter

database graphing word processing


1 FALSE
Insert Tools Format

2½ inches. 2¾ inches. 3 inches.


layers and planes lines and spaces height and width
Through the Edit menu by Through the Tools menu by
choosing Track Changes choosing Track Changes Through tools on the
command command Reviewing toolbar
office assistant inbox assistant document assistant
shift+f8 shift+f7 alt+f8
basic visual basic vj++

Press tab. Press Return. Copy and paste.

true false
object linking and on line execution on line editing
embedding

The width of each column The height of each column The number of columns

left center decimal


text. graphics. forms.
true false
tab stop marginal stop ruler
convert text to table convert data to table table auto format option

AutoCorrect AutoFormat style gallery


left decimal justified
OLE object OLE client OLE server

Text Box Frame AutoShape


printer setup from the file
page setup from the file menu print preview from the file

picture bullets dialog box arrow bullet dialog box circle bullet dialog box
Master Document Child Document Hyperlink Document
click from start program,
MSWord from the task
wizard templates menu
click-n-type double click drag & drop

drag & drop click -n-type Double Click


CTRL+SHIFT+F CTRL+O CTRL+SHIFT+S

ctrl+shift+f ctrl+o ctrl+shift+s


ctrl+a Del ctrl+f
ctrl+a Del ctrl+f
up arrow keys only page up keys only home and end keys only
Insert Mode Type Over mode Remove

internet intranet arpanet

charts WordArt AutoShapes

Chart WordArt Auto Shapes


Header and Footer Screen Tips Page Layout

ctrl+2 ctrl+5 ctrl+1


ctrl+m ctrl+2 ctrl+end
ctrl+v or ins ctrl+c or ins ctrl+x or ins

true false
shift+f7 thesaurus menu shift+f8
true false
true false
true false

Browser clip-art file microphone


Print Layout View Page Layout Outline Layout

office clipboard cut select

increase indent decrease indent both A and B


clear remove all remove
display as icon display link

Borders Shading WordArt


header/footer. bibliography. find/search.
send a public message to
friends interested in one send private messages to a
topic send pictures to a friend friend

Fields Tools Forms

press the return key press the tab key press the escape key

grammar checker spell checker thesaurus


Spelling, grammar and
Clear, replace and select autocorrect Cut, copy, paste and clear

Paste Replace Select all


Data about a set of similar
things Mainly text A set of different graphics

Copy, then paste Cut, then paste Delete, then paste


The first and second
All versions are opened The latest version is versions are opened
automatically. opened automatically. automatically.
Mouse, printer and
processing system Keyboard, Mouse, monitor Monitor, keyboard and
keyboard? and printer mouse
Text at the bottom of every Numbers which appear on Text which appear at the
page every page top of every page
subscript annotation clip art
Creating and editing
To analyse figures documents Storing information
Fault Finding Bug Squashing Error Injecting
Enter Copy Retrieve
first second first row
Word displays a list of the The most recent version will Word will show the name of
dates and times each file appear at the bottom of the the person who saved each
was saved. list. version.

doc1 document1 new document


closing tabbing spacing
tab enter/return backspace/ delete
A dropped cap is a word
The reverse technique A pull quote is a quotation that starts with a lowercase
means to add dark text on a taken from (pulled) from letter when it should have a
light background. another document. capital letter.
Press Ctrl+Enter to create a Press Ctrl+Shift+Enter to Press Enter to create a
page break. create a column break. section break.

2 inches 3½ inches 4 inches

The Versions command will The Versions command will The Versions command will
allow you to save multiple allow you to save only one allow you to save only one
versions of a document, version of a document, version of a document
including any changes that including any changes that without any changes that
may have been made to may have been made to were just made to the
that document. that document. document.

Comments can be edited or


Comments cannot be Comments cannot be deleted by right clicking the
edited. deleted. highlighted text.

a .ppt file can not not be a document file can be


inserted at specified inserted in the current a multiple documents files
position in the current document at specified can be inserted in the single
document position document

field name must be listed in the field separators in a field names in the header
the same order as the header source and the data source must match any
corresponding information source can not be set as merge fields you've inserted
in the data source paragraph in the main document

In order to type a header


from the third page of the If a header is inserted in the
A new section is created in document a section break is second section then the
order to change properties inserted after t he third same header is applicable
like number of columns page to the first section

To give the original author a To give the original author a To complicate the revision
chance to accept suggested chance to reject suggested process and to force the
changes from the person changes from the person author to spend more time
who entered the revisions who entered the revisions making corrections
Copy button Paste button Format Painter button
Check boxes Toggle button Text fields
A sans serif font at 10
A serif font at 10 points points A serif font at 20 points

A vertical line outside the


A red underline appears left margin signifies a
A line appears through text beneath text that is to be change has been made at
that is to be deleted. added. that point in the document.

to move a section of text


to store a file on the hard from the original location to
drive to store a file on a diskette another location
automatically corrects prohibits the user from automatically corrects the
common typing, spelling renaming an auto correct grammatically errors
errors entry

auto format option applies by default cell height and


it is not possible to change to the entire table and not weight option applies to all
the height of only selected only to the selected rows or the rows and columns of a
rows of a table columns of a table table

password protected
document can be opened
password can not include without password as read password are not case
spaces only sensitive
special effect control tool box design wizard

Dictionary Grammar check Spell check


Option 4 ans

none of the above B


none of the above B
hotmail A
none of t he above A
ONLINE DOCUMENT A
Back Office A

none of the above A


vb script A

none of the above A


none of the above B
macros D
none of the above C

none of the above A

changing the color. A

an enlarged capital letter at


the beginning of a
paragraph. A

Document Tip A
none of the above B

Print preview B
72 D

25 point B

Four B

Word cannot display


columns during editing; you
will see them only when
you print the document. A
forms A

Find and Replace B


11 A
none of the above A

spreadsheet C
A
Edit C

impossible to determine. B
rows and columns D
Both through the Tools
menu and the Reviewing
toolbar D
none of the above A
alt+f5 A
visual FoxPro B

Insert page break. D

A
none of the above A

The tab spacing within each


column D

rotation D
numbers. C
A
none of the above B
none of the above A

none of the above A


top A
OLE communicator C

Border A

none of the above A

none dialog box A


none of the above A
none of the above A
none of the above A

none of the above B


CTRL+SHIFT+P A

ctrl+shift+p C
ctrl+m D
ctrl+m A
up and down arrow D
none of the above A

LAN A

files C

File A
none of the above A

none of the above B


ctrl+home B
ctrl+v or Del A

B
tools+spelling menu A
A
A
A

digital scanner D
none of the above B

none of the above A

none of the above C


clear all D
create icon A

Bullets D
macro. A
send a package to a friend D

Insert C

just keep typing D

outliner C
Font, Paragraph, Bullet and
Numbering C

AutoCorrect B

None of the above B

Insert, then paste A

The previous version is


opened automatically. B

None of the above B


Designated area on the
document C
clipboard C

None of the above B


Debugging D
Save C
last cell of the t able A
Word is not able to tell the
most recent version of a
document. A

default document B
sorting B
shift B
A grid is a set of horizontal
and vertical lines that
determine the placement
of elements in a newsletter
or other document. D
Press Shift+Enter to force a
line break. C

It depends on the left and


right margins, and how
many columns are
specified. D

The Versions command will


allow you to save only two
versions of a document:
one version of the original
and one version of any
changes made to the
document. A

Comments can be edited or


deleted by left clicking the
highlighted text. C

an .xls data can not be


inserted at specified
position in the current
document B

the number of fields names


in the header source must
be the same as the number
of data fields in the data
source B

A section is a portion of a
document in which certain
page formatting option can
be set D

To allow multiple people to


work on one document in
collaboration with one
another C
This action is not possible. C
A drop-down list B
A sans serif font at 45
points D

Comments are enclosed in


a text box at the right of
the document. D

to leave an original section


of text in place while
pasting a copy elsewhere D
with t he caps lock key B
accidentally turned on
reverses the case of the
letters that were capitalized
incorrectly and then turns
off the caps lock

delete cells option allows to


delete the entire row or a
column or shift cells up or
shifts cells left C

password can be upto 15


characters long B
pictures A

Thesaurus A
No Question [Excel and Data Analysis]
1 --------------- function searches for a value in the leftmost column of a table and then returns a
value in the same row from a column that we specify in a table
2 --------------------- function searches for a value in the leftmost column of a table and then
returns a value in the same row from a column that we specify in the table.
3 _____ chart exists as a separate object
4 ________ is used to differentiate one data series from another
5 _________ are not allowed in a macro name
6 _________ is a set of tables that describe each of the data series
7 ___wildcard character represents any single character
8 A ___________ is an excel file where the user stores his data
9 A cell reference that does not change during a copy operation is known as
10
A flow chart is the
11 A particular part of a work sheet can be printed by setting the _________
12 A pie chart can represent only one data series at a time
13 A spreadsheet is a grid of rows and columns and is called as a ________
14 A System Auditor can uses CAAT tools to analyze data
15
A user’s response to the InputBox function can be stored in:
16 A workbook consists of many ________
17 Advanced filter uses a filter similar to the query design window to create a filter
18 All commands are carried out on a rectangular groups of cells known as a:
19 All of the following are considered constants EXCEPT:
20 Analyse data over two or more periods is called ----------------------- analysis
21 Analyse fields by arranging them into rows and columns is called
22 Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents
of cells A6, A7, and A8 are _____.
23 Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to
cell E4, what will be the contents of cell E4?
24 Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell
E4, what will be the contents of cell E4?
25
Conditional formatting applies formatting to a cell based on:

26 Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run
totals
27 Currency fields express the amount in _________
28 Data validity test represents
29 Excel allows upto ______ levels of sorting
30 Excel can import data from other databases for the data analysis.
31 Exception testing can be used to identify ----------------- items
32 Filtering rearranges a list to display the required records
33
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs
to won in totality to obtain majority to form the government. Which one of the following will
be the tool that will help the team ?
34
Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first?
35

How can you change the active cell?

36
How can you tell which cell in a worksheet is the active cell?
37

How do you define analysis of an information system?

38
If a cell shows ####### , it means that _____.

39
If you enter a date into a cell, Excel stores the date as:

40 If you press _____, the cell accepts your typing as its contents.
41 In ---------------- Check data entry follow a particular sequence and also a predetermined
range.
42 In _____ Check data entry follow a particular sequence and also a predetermined range.

43 In a chart X-axis is known as_______________


44 In a chart Y-axis is known as_________
45 In a copy operation, the cell(s) you are copying from is called the:
46 In a copy operation, the cell(s) you are copying to is called the:
47 In advanced filter , the criteria occupying multiple columns but more than one row, is
considered as an ________ criteria.
48 In excel, absolute references are represented by a ________ before the column and row
addresses
49
In excel, the dates that are stored as sequential numbers known as ________________-
50 In excel, the subtotal command also generates grand total after the last group
subtotal_________
51 In Range Check , the data may not be in proper sequence but should be within a
predetermined range
52 In the case of the ---------- control, it is ensured that the data in combination with other fields
are reasonable as per standard set by an organisation.
53 In the Save As and Open dialog boxes, the ___________ view shows the file size as well as
the date and time a file was last modified.
54 Large amount of data can be summarized using ______ tables
55 Most of the tools use in Data Analysis depends on
56 On an Excel sheet the active cell is indicated by…
57 Pick out the window that is not a form of excel ___________
58 Pivot tables are used to navigate to the other tables in a database
59 Sequence Check is a --------------- level control check.
60 Set mapping' Check control that follows a text-type validation, we use -----------------
application for data analysis.
61 'Set mapping' Check control that follows a text-type validation, we use -----------------
application for data analysis.
62 Sorting is applied to select only some particular records
63 Specific parts of information required by functions to perform certain tasks are called
as___________
64 Spreadsheets are useful for _______________

65 Spreadsheets can be used for...


66 Summary options dialog box is used to summarize data
67 Testing of individual modules is known as:
68 The ______ generates a summarised report in tabular form in an interactive manner
69 The ______ generates a summarized report in tabular form in an interactive manner
70 The ________ can be used to select the function and assemble the arguments correctly

71 The _________ wizard separates contents in a cell into different cells

72 The __________ option present in the file menu options is used to specify major facts of the
page to be printed
73
The ____________ makes the information in a worksheet meaningful and easy to understand
74
The alphabet indicating the column followed by the row number is known an__________
75 The cell reference for a range of cells that starts in cell B1 and goes over to column G and
down to row 10 is _____.
76 The chart that contains only one data series is _________
77 The chart that display two or more data series on a surface is _________
78 The chart that holds the column chart is _________
79 The chart that is used for displaying stock market information
80 The chart that is used to display discrete data
81 The command that is used to apply a format automatically __________
82 The command that will print an Excel workbook is found on the ____________ menu.
83
The command that will save the current workbook with a different file type is:
84 The command to display the current date in a cell is _________________
85 The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as
86 The default orientation for the printed page is _____.
87 The difference between the highest and the lowest values.
88
The F4 key is used to:

89 The formula that will add the value of cell D4 to the value of C2 and then multiply by the
value in B2 is _____.
90 The function key that is used to quickly edit the contents of a cell is:
91 The function that in used to join cell values together in a single cell ________
92 The function that is used to add together all values that meet specific criteria is known as
____________
93
The function that is used to calculate the payment for specific loan terms ____________
94
The function that is used to count all the values that meet specific criteria _________
95 The GAP detection options can be used to test for completeness of data.
96
The gym teacher has a new program to calculate physical fitness in terms of weight and
exercise. The use inputs different weights or amounts of exercise to determine the related
physical fitness. This "What if" program is most likely which of the followin

97
The number of days between two cells containing dates can be calculated by:
98 The option that is used to cancel the filter process for a specific column and display all the
records is ________
99 The process of finding or selecting information is known as ____________
100 The stacked bar graphs can be represented in __________
101 The stacked bar graphs can be represented in _____________
102
The state government needs to finalize a five years plan to implement 100% literacy in the
state. Which one of the following will be the best tool that should be used to work out the
plan ?
103 The tables that allows the user to change or rearrange the data, summarize the data and
evaluate the data using changing points of view is known as
104
The teacher has a spreadsheet showing all Year 10 students and their marks in one
Mathematics test. To find the student with the highest mark, which of the following
functions should be used?
105
The wizard that is used to create and edit charts _______________
106
The wizard that is used to import text files is_________________
107 The wizard that is used to suggest hints for doing a task
108
The wizard that used to build an interactive table from data existing on sheets
109 There are _________ types of data tables
110 To arrange rows in alphabetical order based on column A, you need to use the command
_____.
111
To import data from Access to Excel ,it is not possible to link between Access and Excel sheet
112
To print just part of a sheet, you would select what you want to print and _____ .

113
To select a column the easiest method is to …

114 To select several cells or ranges that are not touching each other, you would _____ while
selecting.
115 We use Hash Total to identify ------------ within a series where there is a definite relation
between items
116 We use Hash Total to identify ------------ within a series where there is a definite relation
between items
117 What can you NOT do with a spreadsheet?
118
What will be stored in a cell if 3/4 is entered in it?

119 What would be the best method to quickly copy the formula from the active cell to each cell
below it?
120 Which chart type best shows proportions of a whole?
121 Which command enables you to change the margins for a printed worksheet?
122 Which following function is used in subtotal option ?______________
123 Which is not a valid cell address?
124
Which is not an advantage of using computerized spreadsheets?
125
Which of the following commands is needed to duplicate the contents of a cell in another?
126 Which of the following commands is needed to transfer the contents of one cell range to
another?
127
Which of the following commands will automatically adjust cell references in formulas?
128
Which of the following commands will remove cells, rows, or columns from a worksheet?
129 Which of the following do not belong to the formula category in excel
environment__________
130 Which of the following files could not be opened in excel _______________
131 Which of the following is a valid cell range?
132 Which of the following is considered an absolute cell reference?
133 Which of the following is NOT a valid mathematical operator in Excel?
134

Which of the following is TRUE regarding chart types?

135 Which of the following may NOT be included in a formula?


136
Which of the following options is NOT controlled through the Page Setup command?
137 Which of the following quickly copies the formatting of a selected cell to other cells?
138 Which of the following tool cannot be used to view the excel web page_______
139
Which of the following will insert a hyperlink into an Excel worksheet?

140
Which of the following would you use to change the font size of a cell in Excel?

141 Which of the functions is not valid for performing addition


142 Which one of the following is NOT a What-if analysis tool ?
143 Which one of the following is NOT the component of the pivot table ?
144

Which one of the following statements related to stacked bar chart is NOT TRUE ?

145
Which one of the following statements related to stock chart is NOT TRUE ?

146 Which one of the following will be the tool that provides a way to view and compare the
results of all the different variations together on the worksheet ?
147 Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?
148 Which two of the following statements related to pivot table are TRUE ?

149 Year end ledger, inventory files or transaction files can be tested for cut-off , to ensure that
the data has been provided is for the correct audit period
150 You are conducting research for a Income Tax assignment. The raw facts you collect are called
151
You created a worksheet on July 30 and entered the =Today() function in cell E17. You
opened that worksheet again on August 31. What will be displayed in cell E17 on August 31?
152
Your Institute teachers have set an assignment on ‘Studies’. You are required to use a
spreadsheet to record all that you study on each day for four weeks. You decide to show
each week’s data with an accompanying graph. What is the best way of doing this
Option 1 Option 2 Option 3

HLOOKUP VLOOKUP A or B
RAND() VLOOKUP() HLOOKUP()

freestanding embedded stand alone


series or rank category legend
spaces wild card characters symbols
series or rank category legend
* $ @
Workbook Worksheet Spreadsheet
absolute relative mixed
Graphical representation of Rules writte in procedural Logical Steps in any
logic language language
page setup print area print
1 FALSE
worksheet workbook tables
0 TRUE

a cell on a worksheet. a variable. a constant.


databases records tables
1 FALSE
worksheet. range. group.
100 (201)555-1212. #VALUE!
Horizontal Vertical A or B
Cross Tabulate Filter Merge

8,16,32 2,4,2 2,2,2

#DIV/0! #DIV/0! #DIV/0!

#DIV/0! #DIV/0! #DIV/0!


whether the cell has an
whether the cell has a absolute or a relative cell
formula or a value in it. the cell address. reference.

(a), (c), (d) (a), (b), (c) (a) to (d)


dollars rupees pesos
exception testing comparison of data duplicates testing
two three N
1 FALSE
Unusual Strange A or B
1 FALSE
Goal seek Scenario manager Pivot table

B5*B6 C3/D4 D4^2

By either clicking in a
different cell or using the
By using the arrow keys to arrow keys to move to a
By clicking in a different cell move to a different cell different cell
It is surrounded by a heavy It is displayed in reverse
border. It is blinking. video.

Analysis is the loading of This involves looking at a


Analysis translates program programs that perform system and finding out how
code of a high level routines to control information is being
language to machine code peripheral devices handled
the row is too short to show the column is too narrow
your formula has a syntax the number at the current to show all the digits of the
error font size number

text with a two-digit year. text with a four-digit year. an integer.


ENTER CTRL + ENTER TAB

Limit Sequence Range


Limit Sequence Range

series or rank category legend


series or rank category legend
copy range. destination range. clipboard.
paste range. destination range. clipboard.

and or

dollar sign ' = ' sign # sign

serial values domain values range values


1 FALSE

1 FALSE

Valid Signs Transaction type Limit Check


Preview Details List
pivot create form
DDE OLE ODBC
A dark wide border A dotted border No border
application window document window modal window
1 FALSE
Field Record Both

Excel Access Both


Excel Access Both

1 FALSE

variables arguments parameters


Performing calculations. Performing database Performing text formatting.
operations
Producing graphs Writing letters Drawing pictures
1 FALSE
unit testing data testing thread testing
Data table Pivot table
Data table Pivot table
AutoSum AutoFill function wizard

text import wizard convert text to columns tip wizard


wizard

page setup print area print

bordering formatting shading

cell reference row reference column reference

B1-G10 B1.G10 B1;G10


column chart bar chart pie chart
column chart bar chart pie chart
column chart bar chart pie chart
line chart bar chart stock chart
column chart bar chart pie chart
autoformat AutoFill none of the above
File Edit View
the New command on the the Save command on the the Save As command on
File menu. File menu. the File menu.
=today() =date() =currentdate()
array. function. constant.
portrait landscape whatever was last used
Range Address Gap
cycle through absolute,
relative, and mixed cell
copy and paste cells. edit cells. references.

(D4+C2)*B2 D4+C2*B2 #VALUE!


the F4 key. the F2 key. the Esc key.
concatenate pmt merge

average sum sumif

sumif pmt countif

countif vlookup pmt


1 FALSE

word processing graphical database


subtracting the earlier date adding the earlier date to subtracting the later date
from the later one. the later one. from the earlier one.
all option blanks all blanks

filtering searching sorting


3-dimensions 4-dimensions Multi-dimensions
3-dimensions 4-dimensions Multi-dimensions

Pivot table Scenario manager Solver

data table filtered table index table

AVERAGE COUNT MAX


convert text to columns
pivot table wizard chart wizard wizard
convert text to columns
text import wizard wizard tip wizard
pivot table wizard chart wizard convert text to columns
wizard
convert text to columns
pivot table wizard chart wizard wizard
1 2 3

Tools | Sort Data | Sort Edit | Data | Sort

1 FALSE
select Print selection on
Page Setup | Sheet and
click the Print button press the PRINT SCREEN key then print
drag from the top cell in the
double-click any cell in the column to the last cell in
column the column click the column heading

hold down the CTRL key hold down the SHIFT key hold down the ALT key

Duplicate Value Combined Value Gaps


Duplicate Value Combined Value Gaps

Analyse data Calculate data Create forms

03-Apr 0.75 March 4 of the current year

Paste Fill Down Fill Right


Combination Line Pie
Options Page Setup View
Count. Standard deviation SumIf
AD213 ZA1 A0

ability to generate tables speed of calculation flexibility of moving entries

The Duplicate command The Copy command The Paste command

The Move command The Cut command The Paste command

Insert Delete Both Insert and Delete

Clear Delete Both Clear and Delete


text logical numeric

text files Lotus 1-2-3 quattropro or xbase files


6 D12, G25 D12:G25
B4 $B4 B$4
^ / *

Once a bar chart is chosen it Once a column chart is Once a pie chart has been
cannot be changed to a chosen it cannot be chosen it cannot be
column chart. changed to a bar chart. changed to line chart.
Cell references Functions Numeric constants
Orientation (portrait or
landscape) Headers and footers Fonts
the Fill Handle the Format Painter the Formatting toolbar
excel97 internet explorer Netscape
Select the Insert Hyperlink Click the Insert Hyperlink Right-click a cell and click
command from the File button on the Standard the Edit Hyperlink
menu. toolbar. command.

The Cell Format command


The Standard toolbar The Formatting toolbar on the Edit menu
0 =A3SUM:B3SUM:C3SUM REF!
Goal seek. Scenario manager solver
Column field Row field. Source table name.

It is useful when several


components are changing
and the user is interested
It displays the data series in the sum of the It can be represented in 3-
one on top of the other. components. dimensions
It is often used to display
It is also called as high-low- share market prices over a
close chart It shows trends over time period of time
Goal seek Pivot table Solver

E12 6 SUM(H9:H11)
It is a tool for summarizing It is a tool that provides a It summarizes the data by
and analyzing the data way to view and compare using analytical functions.
records in an interactive the results of all the
manner. different variations together
on the worksheet

True False
data. documents. information.

Jul-30 Aug-31 29/03/2008


Transfer information to a
Use tables Create four separate files database
Option 4 ans

None of the above B


None of the above B

sub chart D
data marker D
none of the above A
data marker C
? D
none of the above A
constant A

None of the above A


print preview B
A
database A
B
either a cell on a worksheet
or a variable. D
worksheets D
A
cell group. B
Tom McKenzie. C
None of the Above A
None of the above A

6,8,10 D

#DIV/0! C

#DIV/0! B

the value in the cell D

(b), (c), (d) C


yen A
All of the above D
B
A
None of the above C
B
Data table. A
It is impossible to
determine. C

By typing the reference of


the cell you want to move
to in the formula bar C
The phrase “active cell”
appears in the Status bar. A

None of above C

either b or c C
text with either a two-digit
or four-digit year,
depending on the format. C
INSERT A

Both B & C B
Both B & C B

data marker B
data marker A
source range. D
source range. B

none of the above A

reference values D
A

Reasonableness D
Properties B
none of the above A
All of the above C
A blinking border A
C
B
None of the above A

None of the above B


None of the above B

none of the above B


All of the above D

Document filing A
A
loop testing A
B
B
none of the above C

function wizard B

none of the above A

none of the above B

none of the above A

B1:G10 D
surface chart C
surface chart D
surface chart B
pie chart C
surface chart A
A
Window A
the File Type command on
the File menu. C
none of the above A
formula. B
vertical A
Rows A

cycle through open


applications. C

=(B2*(D4+C2) C
the F1 key. B
none of the above A

countif C

none of the above B

count A
A

spreadsheet D
adding the later date to the
earlier one. A
none A

none of the above A


A
A

Data table. C

pivot table D

SUM C

tip wizard B

function wizard A
tip wizard D
tip wizard A
4 B

none of the choices B

select Print selection in the


Print dialog and then print D

click the column label C

hold down CTRL + SHIFT A

All of the above C


All of the above C

None of the above C

Either 3/4 or .75, depending


on the cell formatting C

Paste Special B
Scatter C
Edit B
A
None of the above C

cost of initial set-up D


Both the Copy and Paste
commands D
Both the Cut and Paste
commands D

Clear C

Remove B
Boolean D

class files D
D C
$B$4 D
\ D

Once a line chart has been


chosen it can be changed to
a pie chart. D
Text constants D

Margins C
Conditional formatting B
word 2000 A
Double-click a cell and click
the Insert Hyperlink
command. B

The Font Size command on


the Tools menu. B
None of the above B
Pivot table D
Pivot table item. C

B
It is also used for indicating
fluctuations in temperature
changes B
Data table. D

G7*SUM(H9:H11) B
A

A
text. A

It is impossible to
determine from the
information given. B
Use multiple sheets D
No Question
1 ____ effect is used to introduce a slide during a slide show
2 ______ determines the order in which order in which the slides will be displayed during the
show
3 ______ represents data in a pictorial format
4 _______ are drop-down menus that appear when the right mouse button is clicked on the
screen element
5 _______ are the individual pages of a presentation
6 _______ are used to represent our data in graphical format
7 _______ charts are useful while showing variations over a period of time
8 _______ is a motion picture or any animation file
9 _______ is the process through which the slides in the current presentation are included in
another presentation or application
10 _______ is used to organize and develop the contents of a presentation
11 ________ and ______ have the ability to add a lot of visual impact into the PowerPoint
presentation
12 ________ can be used to create charts as well as worksheets
13 _________ of the following is/are a type of chart
14 ______option from the insert menu option is chosen to add an embedded chart
15 A _____ is a special effect that determines how the objects appear on the slide
16 A _______ is used to jump to any slide in the presentation
17
A PIE Chart is a ____ diagram that depicts the relationship between a whole and its parts
18 A/An _______ consists of smaller printed version of the slides
19
An example of the components of a multimedia presentation could include
20 Build effect is also called as ______
21 Charts can be produced without the wizard
22 Charts can convert numerical data in a easily understandable format
23 Click _______ on the rectangle drawing tools enables us to draw multiple rectangles
24 Click on the box tool ______ to draw three boxes
25

Custom animation can be used to affect ONLY:

26
Developers can easily add ____ to PowerPoint 2000 by using the programming interface
27 Each individual piece of data in a series is called a/an
28 Embedded charts exist separately
29 Graphics for web pages are automatically stored in ____ format
30 How do you deselect a chart that has been placed onto a PowerPoint slide after you have
finished creating the chart?
31 If we save the presentation file as a metafile, it can be opened using
32

If you are editing a slide containing a Microsoft Graph, how do you display the underlying
datasheet?

33 In PowerPoint _____ is a series of commands that are executed in sequence


34
In Powerpoint2000 ,the built-in professional design elements are
35
Manager box tool in organizational chart window is

36 Pick the odd man out of the following


37 PowerPoint can import text files that have been saved in ______ format
38
PowerPoint launches an OLE-compatible application called
39 PowerPoint outlines can have _____ outline levels
40 PowerPoint provides a _________ that searches the entire presentation i.e., all the text
objects in all the slides, outlines, notes and handouts for spelling errors
41 PowerPoint's drawing toolbar contains _______ drawing tools
42 Selection handles are the 8 small ___________ that appear around the object, when an object
is selected
43 Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the
best chart type if you want to emphasize the total sales of each region?
44 The _____ are used for selecting, editing and viewing objects in the chart
45 The _____ tool is used in the same way as we use a pen to draw a table
46 The ______ language has been incorporated into PowerPoint

47 The _______ is an invisible matrix of vertical and horizontal lines that covers the entire slide
workspace
48 The chart which cannot exists as a separate entity are _______________
49 The custom drawing tools are _______ by default

50 The default orientation for notes ,handouts and outlines is ____ orientation
51 The format of the text entered in a title, subtitle, or bulleted-list object is determined by the
format settings in a special slide called --------
52 The hidden slide is
53

The legend in a Microsoft Graph chart is:

54
The macro will be activated
55 The notes page is formatted based on the
56 The options available in the common task toolbar does not include
57 The power presentation has a _____ for a set of compatible colors
58 The set three colors used for graphs and for secondary slide items is called as
59 The size of the object can be changed using the ______ tool
60 The user can use ______ to remove the undesirable part of the image
61 There are ____ default fields available in all boxes of the organizational chart
62 There are ______ types of charts available in PowerPoint
63

Using custom animation effects, you can build:

64
What happens if you double click a chart that is not currently active?
65
What happens if you single click a chart that is not currently active?

66

What happens when you click the Datasheet button on the Microsoft Graph toolbar?

67
What happens when you double click a blank graph placeholder in a PowerPoint
presentation?
68 What type of program allows an object within an image to be edited without affecting other
objects?
69 When a file is saved with _____ extension, the graphics and text are also saved along with the
slide
70 When a new presentation is opened ,powerpoint creates slides that have a width of _____
and a height of ______ with the landscape orientation
71
When the user double-clicks on an organization chart object in PowerPoint

72 Which keyboard key is used to select more than one picture on a slide?
73

Which of the following actions will enable you to insert a graph into a PowerPoint
presentation?

74
Which of the following animation effects can be added to a slide?
75
Which of the following animations effects can be added to a slide?

76

Which of the following best describes the information that appears on the advanced timeline?

77 Which of the following definitions are not true

78
Which of the following formatting elements can be applied to a PowerPoint diagram using the
AutoFormat tool?
79 Which of the following formatting elements can be applied to a PowerPoint diagram using the
Format AutoShape command?
80
Which of the following objects can contain custom animation effects?
81

Which of the following statement is not TRUE

82

Which of the following statements are not true

83

With reference to autocontent wizard for creating a new presentation, which of the following
statements are not true

84
With reference to changing the order of slides, which of the following statement is not true

85 With reference to chart, which of the following statements are not true
Option 1 Option 2 Option 3
DTS(digital track sound) 3D(3 dimension) both a and b

slide show custom show both a and b


chart label bitmap

tool bars short cut menus auto shapes


images images and text slides
graphs chart labels
column bar pie
wave file media clip .video file

importing exporting copying


slide pane notes pane properties pane

clip gallery & word art slide show & view show fonts & images
Microsoft excel auto shapes clip art
pie bar both 1 and 2
create fields add chart chart
build transition slide show
hyperlink hypertext action button

circular radar doughnut


autolayouts handlayouts slide view
text, graphics and email text, hypertext and Power CD-ROM, digital camera and
address. Point. sound.
animation view show transition
1 FALSE
1 FALSE
once twice three
once twice thrice

the way objects appear on a what objects do after they


slide. appear on a slide. the way objects exit a slide.

virus checkers spell checkers header files


entity data point data
1 FALSE
gif jpeg png

Single click the chart. Double click the chart. Click outside the chart.
internet explorer paint shop pro paint shop pro

Click the chart object, then


click the View Datasheet
It automatically displays in button on the Standard Pull down the Edit menu,
Slide view. toolbar. then select Object.
macro batch file templates
autolayouts and
clipart & auto shapes presentation templates slide view & outline view

used to mange used to create a manager


organizational chart accessed only by manager box for an existing box
outline view slide view view show
.ppt(PowerPoint) .rtf(rich text format) .doc(document)
Microsoft organization
chart clip art auto shapes
nine only one six

office assistant spell checker grammar checker


10 12 102
circles points squares

Side-by-side column Stacked column Pie chart


box tools general purpose tools custom drawing tools
native tool draw tool standard tool
visual c++ visual basic for application Microsoft visual interdev

square image grid


freestanding embedded stand alone
turned on turned off not available in the tool bar

portrait landscape a or b
the master slide the slide master the header slide

not displayed during the displayed only during the displayed only in outline
slide show slide show view
taken from the first column
or row of data in the
always taken from the first always taken from the first datasheet, depending on
row of data in the column of data in the whether the data series are
datasheet. datasheet. in rows or columns.

while creating a .exe file during slide transition when the slide show is run
notes master slide master master slide
slide layout customize new slide
color palette color box color scheme
ascent tricolor scheme color palette
zoom reduce/enlarge preview
clipping tool cropping tool cutting tool
two four five
10 28 18

a slide one bullet item at a bullet items one letter at a bullet items one word at a
time. time. time.

The chart is selected. The chart is deleted. The chart is doubled in size.

The chart is selected. The chart is deleted. The chart is doubled in size.

A dialog box is displayed A dialog box is displayed


allowing you to enter the allowing you to enter the
name of the Excel name of the Excel
worksheet that should be worksheet that should be
linked to the PowerPoint embedded in the The datasheet is saved as a
presentation. PowerPoint presentation. separate file.
A popup box prompts you Microsoft Graph is started
Excel is started so that you for an existing Excel chart to so that you can create a
can create a chart. insert. graph.

Paint program Draw program Filtering program

.rtf(rich text format) .wmf(windows metafile) .txt(plain text)

15 inches,10 inches 10 inches,7.5 inches 7.5 inches,5 inches


the organization chart is the chart is made available the chart window opens
expanded for editing displaying a chart template
Enter Shift Alt

Pull down the Insert menu


Pull down the Insert menu Click the Insert Chart button and select the appropriate
and select Chart. on the Standard toolbar. Object.

Subtle Moderate Exciting

Both enter and exit, and fly


Enter and exit Fly in from top or bottom in from top or bottom

The advanced timeline


shows the sequence in
The advanced timeline The advanced timeline which objects will appear
shows the sequence in shows the duration of the on the slide and the
which objects will appear effect applied to each duration of the effect
on the slide. object. applied to each object.
the slide that holds the transition means applying design templates is the
formatted placeholders for special effects to the template whose format and
the titles, main text and any crossover between the color scheme user applies
background items that user slides to a presentation
wants to appear on the
slides is called a master
templates

the Font and the text


the Line style the Line color alignment

Fill color Line color Line thickness

Clips Organization charts Text


user can insert only pre- user can insert picture to
user can insert objects like drawn, pre-colored graphic the master slide which gets
clip-arts, pictures stored in images reflected in a clip reflected in all the slides
a separate files to the slides arts to the slides using that master slide

in outline view, user can


see the miniatures of all
with notes pages view user slides in a presentation, user should select the slide
can prepare speaker notes complete with text and view to add the text to the
and handouts graphics slide

PowerPoint creates a
sample presentation to contains sample
which user can add words it is the quickest way to presentations for a variety
and pictures create a presentation of topics
in notes pages view, drag
in outline view, drag the in slide sorter view, drag the slide icon to a new
slide icon to a new location the slide to a new location location
data to be graphed resides by default, doughnut chart data is plotted in a chart
in a datasheet window is displayed based on the window
data in the datasheet
Option 4 ans
transition D

none of the above B


report A

all the above B


slide sorter views C
report B
linear A
all the above B

moving B
outline pane D

none the above A


drawing tools A
none of the above C
insert chart C
view show A
all the above D

all the above A


none of these B
text, hypertext, Power
Point, video and sound. D
b or c A
B
A
four times B
any of the above C

Custom animation can be


used to affect the way
objects appear on a slide,
to what objects do after
they appear on a slide, and
to the way objects exit a
slide. D

all the above A


stream B
B
none of the above D

Change to Slide Sorter view. C


power point 2000 D

You cannot display the


underlying datasheet once
the slide is finished. B
add-ins A

none of the above B


used to store the other
tools of the organizational
chart C
slide sorter view C
.html(hypertext format) B

track changes A
twelve C

none of the above B


22 B
icons C

Line chart B
standard drawing tools C
all the above B
all the above B

guide C
sub chart B
available in the tool bar B

none of the above A


the format slide B

none of the above A


entered by the user. C

none of the above C


master notes A
set up show B
color guide C
primary color scheme A
none of the above B
scribble drawing tool A
eight B
36 C

a slide one bullet item at a


time, build bullet items a
letter at a time, and build
bullet items a word at a
time. D
Microsoft Graph will
restart. D

The application that created


the chart is started. A

The datasheet window is


toggled from closed to
open (or from open to
closed). D

The graph placeholder is


deleted. C

Animation program A

.doc(document) B

none the above B


none of the above C
Ctrl B

Pull down the Insert menu


and select Chart, click the
Insert Chart button on the
Standard toolbar, or pull
down the Insert menu and
select the appropriate
Object. D
Subtle, Moderate, or
Exciting D
Neither enter nor exit;
neither fly in from top nor
bottom C

The advanced timeline


shows neither the sequence
in which objects will appear
on the slide, nor the
duration of the effect
applied to each object. C
the slide that holds the D
formatted placeholders for
the title and sub-title for
the presentation is called a
title template

Line style, Line color, text


font, and text alignment D
Fill color, Line color, and
Line thickness D
Clips, organization charts,
and text D
user can insert picture to
the title slide which gets
reflected in all the slides
using that title slide B

the slides can be reordered


in the outline view B

provides suggested content


and design D

I slide view, drag the slide


icon to a new location C
user can add data labels B
and gridlines to the chart
No Question
1 _____ is a set of special instructions used to communicate effectively with the computer
2 _____ language consists of strings of binary numbers
3 ______ computers are used in large organizations for large scale jobs which have large storage
capacities
4 ______ printer use laser light
5 ______ software enables users to send and receive data to/from remote computers
6 ______ software enhances the user to enter ,store, manipulate and print any text
7 ______ symbol is used to represent processes like assigning a value to a variable or adding a
number
8 _______ converts a high level language into machine language
9 _______ involves conversion of raw data into some meaningful information
10 _______ is an example for micro computer
11 _______ is responsible for all calculations and logical operations that have to be performed on the
data
12 _______ is responsible for feeding data into the computer
13 _______ is responsible for obtaining the processed data from the computer
14 _______ is the capability of the o/s to run numerous applications simultaneously
15 _______ is the temporary storage place for deleted files
16 _______ option in publish to web wizard produces a page that is static in nature
17 _______ printers use light to produce the dots needed to form pages of characters

18 _______ software are programs that are complex and can be developed or purchased
19 _______ software enables users to send and receive data to/from remote computers
20 _______ translates assembly language program into machine language instructions
21 __________ is designed telephone system
22 _________capability supports concurrent users doing different tasks
23 ________option is selected from the view menu to create macros with conditions
24 _______is used to create a mailing label
25 “Zipping” a file means
26 A _____ is a running instance of an application
27
A 32-bit processor has
28 A 4GL is
29 A byte corresponds to
30 A client-server system is based on
31
A compiler is
32 A daisy wheel is a type of...?
33 A device to device hardware communication link is called
34 A device used in data communications to divide a transmission signal into several sub-bands is
known as a
35 A digitising tablet can be used for?
36
A gigabyte represents
37 A good example of AIS is the one that is used by distribution firms engaged in distributing products
or services to their customers
38 A good way to exchange information that changes rapidly is through
39 A GUI is
40 A Kb corresponds to
41 A laser printer does NOT use?
42 A mathematical procedure that can be explicitly coded in a set of computer language instructions
that manipulate data.
43 A nanosecond is
44 A new user initiates a new process of execution at the background,while the user can continue his
query process as usual in the foreground. This situation is referred to as __
45 A Nibble corresponds to
46
A parity bit is
47 A procedural control used to minimize the possibility of data or program file destruction through
operator error is the use of
48 A series of instructions telling the computer how to process data or files is defined as a
49 A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The
following is an information not found in the trailer label
50
A UPS

51 All are examples of computer software except


52 All the rejected orders will be stored in ______ file in AIS
53
An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15
minutes of sound and 1 minute of video. Which of the four different media listed takes up most
space on the CD-ROM?
54
An impact printer creates characters by using...?
55 An RS-232 interface is
56
Application software are programs

57
Application software are programs that are written

58 Back up of the data files will help to prevent


59 Benchmarks form part of:
60
Cache memory enhances
61
CISC machines
62 Clock speed is measured in
63 Collection of instruction is called a _____
64 Combination of alphabetic and numeric data is called _____ data
65 Components of an information system model are: a) applications architecture; b) functional
architecture; c) technology architecture; d) information architecture
66 Computer manufactures are now installing software programs permanently inside the computer. It
is known as
67
Computers can be classified based on ______,______and _______
68 Convert the decimal number 2989 to Hexadecimal
69 Copy of supplier's invoice is called ________ in AIS
70 CPU performance may be measured in
71 Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface
architecture; d) presentation architecture
72 Designing relationships among components is part of:
73 Detecting errors in real memory is a function of
74 Disk fragmentation
75
Every data from the primary memory will be erased if
76 For direct access storage devices the recording area is divided into
77 For print quality you would expect best results from
78 Formatting a disk results in all the data being...?
79
Hard copy is a term used to describe...?
80 Hard disks can have a storage capacity in the region of...?
81
Hardware components in a computer are _____,____,_____,______

82 Having a single CPU alternatively process tasks entered from multiple terminals is called
83 Header label normally include all the following except the
84
How did the computer mouse get its name?
85 How many bits of information can each memory cell in a computer chip hold?
86 How many bytes do 4 Kilobytes represent?
87 Hyperlinks are used to jump to any kind of information or data from a file
88 If any change made on the object from the client side is reflected on the server then the object is
said to be _____
89 In AIS, the information stores in a database is called --------------------- subsystems

90 In AIS,data manipulation can be classified by ____ ways


91 In AIS,the rejected orders will be stored in a new file called ________
92 In SQL, having clause is used for _________

93
In what areas is the COBOL programming language used?
94 Inefficient usage of excess computer equipment can be controlled by
95 Information is stored and transmitted inside a computer in
96 Information on a hard disk is usually backed-up using a...?
97 It is necessary to manipulate data to transform it into ----------------
98
It is unlikely that a magnetic tape containing several thousand blocked records can be used on two
machines of different architecture directly because
99 Laptop computers use
100 Magnetic tape is a...?
101

Multimedia software can be most productively used for

102
Multiprocessing is

103
Multiprogramming is a prerequisite for

104
Multiprogramming refers to

105
Multitasking refers to

106 Name the first Indian Super Computer?


107 Numbers are stored and transmitted inside a computer in
108 Orders that do not pass the credit check are filled in the _______ file in AIS
109
Passwords enable users to
110 Properties of the fields are managed by _____ in Dynaset
111 QWERTY is used with reference to
112
ROM
113
Serial Communication is used over long distance because it
114 Several Computers connected together is called:
115
smart card

116
Software can be divided into two areas:
117 Splitting of CPU's time for different tasks _______ prevents time slicing
118
Systems software can be categorised into:
119 TCP/IP stands for _________ .

120 The _______ file maintains data that describes the supplier past transaction with the firm in terms
of material quality in AIS
121
The advantage of a PC network is that
122 The amount of data that a disk may contain is known as the disk's...?
123
The best security control in a microcomputer environment is to
124 The capacity of a 3.5” floppy is around
125 The computer operating system performs scheduling, resource allocation, and data retrieval
functions based on a set of instructions provided by the:
126 The computer which can receive data from other computers on the network and print it is
_______
127 The contents of these chips are lost when the computer is switched off?
128
The greatest control exposure in a microcomputer environment is the lack of
129
The instruction register stores

130 The macro is selected from the action field of a macro sheet
131
The main problem associated with uninstalling software is that

132
The memory address register is used to store

133
The memory data register is used to store

134
The original ASCII codes
135 The part of the computer system controlling data manipulation is called the
136 The place in the CPU where the data and programs are temporarily stored during processing is
called the
137
The primary function of a front-end processor is to

138 The process of data being automatically written to a duplicate database is called______
139 The technology which is used to check answer sheets of multiple-choice questions in civil services
or similar examinations is: -
140 The term A:\ refers to
141 The topology of a network can be each of the following except
142 Third generation languages such as COBOL, C, and FORTRAN are referred to as
143 Timesharing is the same as
144 To be effective a virus checker should be
145
To ensure that data is not lost if a computer system fails, the user should

146
To find where a file has been saved on disk, the user should
147
To help keep sensitive computer-based information confidential, the user should
148 Travel agents use this computer system when reserving flights
149
UNIVAC Computer belongs to the
150
UPS stands for
151 Vacuum tube based electronic computers are...?
152 Virtual memory is
153 What are responsible for storing permanent data and instructions?
154 What are small high speed memory units used for storing temporary results?
155 What are the individual dots which make up a picture on the monitor screen Called
156
What are the stages in the compilation process?

157
What are User Guides are used for?

158
What are utilities?

159 What are you most likely to use when playing a computer game?
160
What areas need to be considered in the SOFTWARE design process?
161
What control would prevent the accidental erasure of customer information from a magnetic tape
162
What do the abbreviations VAB stand for
163 What do you need for an ink jet printer?
164
What documents are produced during the development of a system?

165 What does a light pen contain?


166
What does acronym VIRUS stands for
167 What does EBCDIC coding of numbers mean?
168 What general term describes the physical equipment of a computer system, such as its video
screen, keyboard, and storage devices?
169 What input device can be used for marking a multiple-choice test?
170 What input device could tell you the price of a bar of chocolate?
171 What is the decimal value of the octal number 215?
172

What is a compiler?

173
What is Direct Implementation?

174
What is parallel running?

175

What is System Analysis?

176 What is the 8-bit binary value of the decimal number 85?
177 What is the binary sum of 01011 and 00101?
178 What is the decimal value of the binary number 1111?
179 What is the decimal value of the hexadecimal number FF?
180

What is the definition of an interpreter?

181 What is the first stage in program development?


182
What is the function of a disk drive?

183 What is the function of systems software?


184 What is the hexadecimal value of the decimal number 1476?
185
What small, hand-held device is used to move the cursor to a specific location on the screen?
186 What type of computer chips are said to be volatile?
187
What will a good software provider consider?

188 What would you NOT use with a flatbed plotter?


189 When all the processing is done by the mainframe itself, the type of processing is sometimes
called as
190 Where should floppy disks be stored?
191 Where would you find a magnetic strip?
192 Where would you find the letters QUERTY?
193 Which approach or technique is a control usually associated with microcomputers
194 Which bus carries information between processors and peripherals?
195 Which bus controls the sequencing of read/write operations?
196 Which component of the CPU has the most influence on its cost versus performance
197
Which computers are used in the weather forecasting industry?
198 Which generation of computer developed using integrated circuits?
199 Which generation of computer developed using solid state components?
200 Which generation of computer uses more than one microprocessor?
201 Which generation of computer was developed from microchips?
202
Which is not part of help desk documentation:
203 Which is part of installation testing:
204 Which is the most common data transmission error checking method
205 Which network topology uses a Hub?
206
Which of the following areas of responsibility are normally assigned to a systems programmer in a
computer system environment?
207 Which of the following devices merges communication signals onto a single line
208 Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio
209 Which of the following hardware or software system controls provides a detailed record of all
activities performed by a computer system
210 Which of the following is a pointing device used for computer input?
211
Which of the following is an acceptable way to shut down the computer?
212 Which of the following is not a data transmission coding scheme
213 Which of the following is not the component of a CPU
214 Which of the following is not used for data transmission within a local area network
215
Which of the following is recommended when many searches for data are required
216 Which of the following is used to indicate the location on the computer monitor?
217
Which of the following procedures should be included in the disaster recovery plan for an
Information Technology department?
218 Which of the following topologies is used for Ethernet?
219 Which of the following translates a program written in high-level language into machine language
for execution?
220 Which one of the following is the MOST common internet protocol?
221 Which one of the following parts of a computer is necessary to enable it to play music?
222 Which one of the following printers is suitable for printing sprocket fed carbon copies?
223 Which one of the following software applications would be the MOST appropriate for performing
numerical and statistical calculations?
224 Which parts of the computer perform arithmetic calculations?
225 Which printer among the following is fastest
226 Which storage device cannot be erased?
227 Which storage device has the largest capacity in Mb?
228
Which tool is used to help an organization build and use business intelligence?
229 Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best way to locate the files?
230 You can ________ protect a floppy disk.
Option 1 Option 2 Option 3
batch protocols software's
assembly language machine language high level language

mainframes super computers micro computers


band printer drum printer non impact printer
integrated software communication software idea processor
data management word processing electronic spreadsheet

terminator symbol processed symbol connector symbol


processor compiler assembler
interpreter compiler converter
PC-at hp vectra system fazitsu vp200 series

control unit arithmetic and logic unit central processing unit


input output feed
input processor ram
multiprocessing multithreading multiplexing
my computer recycle bin Microsoft exchange
static file static html dynamic file
impact printers drum printers non-impact desktop
printers
operating system application software windows 95
application system operating system
compiler interpreter assembler
ISDN ATM Internet
multiprocessing multithreading multiplexing
conditions action insert
label wizard chart wizard mail wizard
encrypting it decrypting it compressing it
project model pilot project

32 registers 32 I/O devices 32 Mb of RAM


Uses Cobol uses Java uses C++
4 bits 8 bits 16 bits
mainframe technology LAN technology WAN technology
converts a program to
a fast interpreter slower than an interpreter machine code
Printer Storage device Pointing device
A cache An interface A buffer
Frequency division
Modem Demodulator multiplexor
Printing letters Tracing diagrams Reading bar codes
More than 1000 mega
bytes 1000 kilobytes 230 bytes
1 FALSE

brochures magazines CD-ROM


hardware language interpreter software interface
1024 bits 1000 bytes 210 bits
A print head A laser beam An INK RIBBON

Formula Algorithm Program


10-6 sec 10-3 sec 10-12 sec
multiprocessing multithreading multiplexing

4 bits 8 bits 16 bits


used to indicate uppercase
letters used to detect errors is the first bit in a byte

Limit checks Control figures External file labels


Network Program System
Control totals for one or
Record Count Identification Number more fields
increased the storage
capacity of a computer provides backup power in
system increases the process speed the event of a power cut
Firmware Word Processor Telephone modem
Customer Suspense Order

Text Pictures Sound


An inked ribbon and print
Electrically charged ink An ink pen head
a parallel interface a serial interface printer interface
To maintain a backup copy To do a particular job such
of are written all the as editing, storing To help someone who is
information information applying for employment

To maintain a backup copy To help someone who is


of all the information To do a particular task. applying for employment
loss of confidentiality duplication of data virus infection
detective controls organisational controls preventive controls

memory capacity memory access time secondary storage capacity


have fewer instructions use more RAM than RISC
than RISC machines machines have medium clock speeds
bits per second baud bytes
procedure batch command
alpha numeric alpha beta numerous alpha

(a), (c), (d) (a), (b), (c) (a) to (d)

Firmware Word Processor Telephone modem


space occupied, price, no. cost, performance their
of users allowed ratio size, performance, cost
FDDI BAD TED
Packing slip Gate pass Challan
BPS MIPS MHz

(b), (c), (d) (a), (b), (d) (a), (b), (c)


architectural design interface design procedural design
Memory protection Parity Checking Range checking
is caused by wear caused by overuse is due to bad disk blocks
Computer is improperly Data is not saved before
Power is switched off shut down computer is shut down
Tracks and Sectors Blocks and Sectors Files and Tracks
line printer dot matrix printer ink-jet printer
Deleted from the disk Copied from the disk Saved to the disk
Storing information on the
Writing on a hard board Printed output hard disk
1.44MB 20 GB 700MB
control program,
operating system, interpreter, assembler, monitor, program,
bootstrap, kernel, shell compiler keyboard, bus
Multiprocessing Time sharing Multiprogramming
File Name Identification number Reel Number
Because it squeaks when
moved Its moves like a mouse It has ears
0 bits 1 bit 8 bits
512 1024 4096
1 FALSE
linked embedded connected

Components Based Computer Based Company Based


Information System Information System Information System
1 2 3
Pending file Order file Pending order file
for ordering records for updating records for specifying conditions
with group by clause

Financial sector and Graphic design and Accounting systems,


engineering education commercial sector
Contingency Planning System feasibility report Capacity Planning
binary form ASCII code form decimal form
Magnetic tape PAN drive Floppy disk
Report Output Information

Tapes can only be read by Information formats


the machine on which they commonly vary between
are written Parity errors will result architectures
CRT displays LCD displays SSGA displays
Serial access medium Random access medium A parallel access medium

viewing an encyclopaedia creating the plans for a presenting an order for


CD-ROM. building design. stock to a warehouse.

same as multitasking same as multiprogramming multiuser

to run more than one


multitasking an operating system program at the same time

having several programs in writing programs in


RAM at the same time multitasking multiple languages

having several softwares the ability to run 2 or more writing programs in


running at the same time programs concurrently multiple languages
Vishwajeet Deep Blue Param
binary form ASCII code form decimal form
Sales order Sales order credit Sales order credit reject
retain confidentiality of
get into the system quickly make efficient use of time files
property field field property Dynaset field properties
screen layout mouse button layout keyboard layout
stores more information
is faster to access than RAM is non-volatile than RAM
It is faster than parallel It is less prone to
communication It is less error prone attenuation
Client-server Client Computer network
has more storage capacity is an access card for a
is a form of ATM card than an ATM card security system
Network software and Systems software and Business software and
security software application software games software
multiprocessing multithreading multiplexing
Operating systems and Network systems and Database systems and
system services communication services backup services
Transfer control Transfer communication Transmission control
protocol/Internet protocol protocol/Internet protocol protocol/Internet protocol

Supplier Suspense Order

access to the internet is printer can do 1000s of


quicker files can be shared pages a day
Volume Size Storage capacity
Use only unremovable
Restrict physical access media Require user passwords
100K 1.44 Mb 5 Mb

Multiplexer. Peripheral processors. Concentrator.


File server Printer server Receiver

ROM chips RAM chips CDROM chips


Centralised function for PC Centralised function for PC
Separation of duties acquisition Disposition

an instruction that has been an instruction that has been an instruction that has been
decoded fetched from memory executed
1 FALSE

the program executable the system requires a


orphan files can be left on may not allow it to be network administrator to
the system uninstalled uninstall it

data to be transferred to data that has been the address of a memory


memory transferred from memory location

data to be transferred to or data to be transferred to the address of a memory


from memory the stack location

were 7 bits 8 bits represented 256 characters


Operating System ALU CPU
ROM RAM Floppy Disk
Relieve the main CPU of
Communicate with the Manage the paging function repetitive communication
console operator in a virtual environment tasks
repairing redo logging disk defragmentation
Bar code Reader Optical Mark Reader Magnetic Ink Character
Technology Technology Recognition Technology
a file name a subdirectory the root directory
Star Packet Ring
High-level languages Middle-level languages Low-level languages
multitasking multiprogramming multiuser
replaced regularly never updated updated regularly
save copies of the file with
the same name on the use different filenames on keep a record of computer
system the system failures
use the directory search
tools search each file in turn use the backup facility

save the file set up a password make a backup copy


Supercomputer Personal computer Mainframe computer
First - generation Second - generation Third - generation
computers. computers. computers.
uninterruptable power
universal port serial up-line provider service supply
First generation Second generation Hoover generation
related to virtual reality a form of ROM a form of VRAM
RAM chips ROM chips DRAM chips
CPUs Registers Control unit
Coloured spots Pixels Pixies
Lexical analysis,
Feasibility study, system Implementation and CONVERSION, and code
design, and testing documentation generation
User guides cover how to
To enable any printer to be run the system, enter data,
For technical support connected to the network save, print, etc.
Operating system routines Data structures that are
Peripherals that are that execute in supervisor part of the kernel of an
connected to a computer. mode. operating system.
Touch screen Light pen Joystick

Only hardware and Inputs, outputs, file design Maintenance, reliability,


software hardware, and software and upgradeability
Validity check Boundary protection File protection ring
Voice activated
broadcasting Voice answer back Visual audio board
A cartridge A drum A ribbon

Instructions and technical User Guide and technical


documentation Log files and temporary files documentation
Refillable ink Pencil lead Light sensitive elements
Very important reader user Vital information resource Virtual information reader
sequence under siege & user system
Basic Coding Description Binary Coded Decimal Bit Code Design

hardware software output


Mouse Bar code reader Optical mark reader
Mouse Bar code reader Optical mark reader
327 141 97

A compiler converts the


A compiler does a whole of a higher level A compiler is a general
conversion line by line as program code into machine purpose language providing
the program is run code in one step very efficient execution
User operate the manual Users operate the
system and computer computer system from a Users operate the manual
system at the same time given date system
The new system is The new system is
introduced alongside the introduced and users start Users continue operating
existing system operating it the old system

The design of the screen the System Analysis defines the System Analysis involves
user will see and use to format and type of data the creating a formal model of
enter or display data program will use the problem to be solved
10101010 1100101 1010101
10000 1112 1110
15 4 64
30 255 256

An interpreter does the An interpreter is a An interpreter is a general


conversion line by line as representation of the purpose language providing
the program is run system being designed very efficient execution
Specification and design System Analysis Testing
to read from or write
information to a floppy
to calculate numbers disk to print sheets of paper
To collect data To execute any programs To maintain security
4C5 1B7 5C4

a keypad a mouse a frog


RAM chips ROM chips CACHE
Testing to check for errors
The different types of before the system is Hardware, Software and
network to be used introduced size of program.
A pen Paper Eraser
server processing host processing dumb processing

By a sunny window By magnet objects In a drawer


Credit card Mouse Speakers
Mouse Keyboard Numeric Keypad
System Logs Physical Security Console Log
Data bus Auto bus Address bus
Data bus Auto bus Address bus
Data path part Control Unit Address calculation part
Jon Von Neumann
Notebook computers Supercomputers computers
Second generation Third generation Fifth generation
Second generation Third generation Fifth generation
Second generation Third generation Fifth generation
Second generation First generation Fourth generation

problem logging call lights program change requests


benchmark testing specifications matching parallel operations
Parity Retransmission Cyclic Redundancy
Star Bus Mesh

Systems analysis and Data communications Operating systems and


applications programming. hardware and software. compilers.
Port Modem Multiplexor
(a) to (d) (b), (c), (d) (a), (b), (c)
Maintenance diagnostic
Valid character check program Systems logs
Touch screen Hard disk CD-ROM drive
Turn the computer off at Select the ‘Shut Down’
Press the reset button. the power point. option from a menu.
CRC Baudot ASCII
NIC Card VSAT RAM
Fiber Optics Coaxial Cable Common carrier

A sequential file on a disk A sequential file on a tape A direct access file on a disk
a cursor a scroll bar a light pen
Replacement personal
computers for user Identification of critical Physical security of
departments. applications. warehouse facilities.
Star Bus Ring

Assembler Compiler Artificial Intelligence


TCP/IP HTML IPX/SPX
Sound card. CD-ROM MIDI interface
Laser Dot matrix Ink-jet

Database Document processor Graphics package


ALU Registers Logic bus
Drum Printer Dot - Matrix Printer Desk - jet Printer
A CD-ROM A floppy disk Magnetic tape storage
A CD-ROM A floppy disk Magnetic tape storage

Data warehouse Data Mining tools Data management systems


Use the Find or Search
Create the files again. Ask the person next to you. feature.
Read Write Read and Write
op4 ans
procedures C
none of the above B

none of the above A


none of the above C
none of the above B
none of the above B

input/output symbol B
coder B
process D
IBM-PC B

none of the above B


write A
output D
multitasking D
none of the above B
none of the above B
thermal printers C

interpreter B
communication D
processor C
Intranet A
none of the above D
none of the above A
none of the above A
transmitting it C
process D
a 32-bit bus or 32-bit
registers D
none of the previous. D
32 bits B
Unix operating system B

none of the previous C


None of above A
An online protocol B

Time Division Multiplexor C


None of the above B
1024 bytes A
A

e-mail D
an operating system C
210 bytes A
None of above C

Data B
10-9 sec D
none of the above B

32 bits A

is the last bit in a byte B

Cross footing tests C


Modem B
End-of-file and end-of-reel
code B

none of the previous C


Shareware C
None of the above B

Video D

None of above C
a modem interface B

To Store data in an
organised manner B

None of the above B


loss of data D
corrective controls C
secondary storage access
time B
use variable size
instructions D
Hertz D
program D
number and alpha A

(b), (c), (d) C

Shareware A
input, output, performance
ratios C
MAD B
None of the above C
VLSI B

(a) to (d) D
data design A
Validation B
none of the previous C

All of the above D


Schema and subschema A
laser printer. D
Transferred from the disk A

None of above B
None of above B

CPU, memory, input,


output D
Multiplexing D
Batch Total D

None of the above D


None of above B
8192 C
A
edited A

All of the above B

4 D
Suspense file C
none of the above C

None of the above C


Exception reporting C
alphanumeric form A
None of above A
None of the above C

Data record can never be


blocked together C
none of the previous B
None of above A

recording current stock in a


supermarket and answering
customer queries. A
involves using more than
one processor at the same
time D

none of the above C

none of the previous A

none of the previous D


Arjun C
alphanumeric form A
All of the above C

simplify file structures C


properties B
word processing software C

is used for cache memory B

Uses only one path D


Hub C
contains a microprocessor C

None of the above B


multitasking D

None of the above A


None of the above. C

All of the above A

the operating system is easy


to use B
None of above C
Make duplicate copies of
files A
1 Gb B

Job control language. D


None of the above. B

None of above B
Distributed policies or
procedures A

the address of the next


instruction to be executed D
A

the system always requires


a re-boot and defrag
afterwards A

an instruction that has been


transferred from memory. C

an instruction that has been


transferred from memory A

represented 127 characters A


Primary Storage B
Magnetic Disk B
Reduce competition
between the input/output
devices C
disk mirroring D

Image Scanning Technology B


the hard drive D
Bus B
None of the above C
none of the previous C
updated once a year C

backup to a secure medium D

use find and replace A


use a virus protection
program B
None of above B
Fifth - generation
computers. A

uniform page source C


None of above A
none of the previous D
None of above B
None of above B
Pickers B

None of the above D

None of above C

Shells, compilers and other


useful system programs. D
None of the above C

None of above B
Limited access files C

None of above C
A cassette A

None of above C
None of the above C

None of above B
None of the above D

input A
None of the above C
None of the above B
None of the above B

None of the above B

None of above B

None of above A

None of the above C


None of the above C
None of the above A
None of the above A
None of the above B

None of the above A


None of the above B
to display information or
pictures on a screen B
None of the above D
None of the above A

a message pad B
None of above A

None of the above B


None of above C
data processing C

None of above C
Printer A
Printer B
Data Dictionary B
Control Bus A
Control Bus D
Input output channel A

None of above B
None of above B
None of above A
None of above C
None of above C

resolution procedures C
system walkthroughs B
Hash Count A
Ring A

Computer operations. C
Acoustic coupler C
(a), (c), (d) A

Parity check C
None of the above A
Pull the power cord from
the back of the computer. C
EBCDIC A
AGP Card B
Telephone Lines C

A direct access file on a tape C


a magic marker A

Cross-training of operating
personnel. B
All of the above D

Parity Checker B
NetBEUI A
Serial interface A
Drum B

Spreadsheet D
None of above A
Thermal Printer A
None of above A
None of above C

All of them B
Put your hand up and ask
the teacher C
None of above B

You might also like