Professional Documents
Culture Documents
Mcq Basic Itt
Mcq Basic Itt
Mcq Basic Itt
1 _____ gives the balance for each day for the voucher type has been selected.
_____ in Tally classify the accounts under different heads so that summarised information is
2 possible.
3 _____ --- is/are useful for management in the decision making.
4 _____ statements help management in the decision making process
" The buyers can follow up with the suppliers to determine the reasons " is an example of _____
5
6 "Administrator" type user is also called 'Auditor' of a company in Tally
7 A _____ is a primary document for recording all financial transactions.
A _____ purchase orders data flow is directed to the purchasing system for use in closing out
8 the outstanding purchase orders in the receiving system diagram.
9 A constituent(member) company can be a member of more than one group.
10 A created company's detail can be modified through keys
A Group Company is _____ _____ given to the merged accounts of member companies of the
11 group.
A Group Company is simply a name and an identify given to the merged accounts member
12 companies of the group.
A voucher entry in Tally is done for
13
A/An _____ is the official notice that the firm sends to its customers to advise then to the
14 amount of money that is owed.
15 Accounts Receivable are displayed in
Accounts receivable report provides a clear picture of outstanding for __________ in Tally
16
By pressing _____ key, a list of inventory reports can be displayed straightaway from the balace
17 sheet report
Ctrl + N is used to _____
18
Customers can be permitted to enter their own data into the firm’s computer using the firm’s
19 wide area network is an example of
23
24 Default number of groups in tally are ________
25 Default stock category in tally is ______
26 During voucher entry _____ are used.
27 Each action/transaction of a firm is described by a _____ .
28 For 'stock journal' entry we press ______________ in tally
29 From voucher entry mode , if we press ______ then we get payment voucher in tally
Import and Export of data between Tally and other programs is possible only through _____
30 Program.
In an accounting information system, which of the following types of computer files most likely
31 would be a master file?
In ratio analysis report of Tally FA packagewe we press _________ function key to the display of
32 bills receivable , bills payables report
33 In tally budget can be on ______________
34 In tally you get currency symbol option from _______ menu
35 In tally, a group company can also be a constituent(member) of another group company
36 In tally, to change the date of the voucher press ______
In Tally, Types of Accounts and Types of Vouchers passed during the period, can be seen in
37 _____ report.
38 In tally, types of users are _______________
In tally, we can alter ledger details using either single or multiple modes but not alble to delete
39 a ledger from multiple modes.
In tally, we can alter ledger details using either single or multiple modes but are not allowed to
40 delete a ledger from multiple modes.
41 In Tally, we can customize the Vouchers as per our requirements
42 In Tally, we press _____ , to print report .
43 In tally,"credit note" voucher type records entry for ________________
44 In tally,a group company is marked with an ______________
45 In tally,a member company can be a member of more than one group company
46 In tally,all masters have ________main options
47 In tally,all the masters have ________main options
48 In tally,during voucher entry ________________ are used
In tally,in ratio analysis we press ________________ function key in the display of bills
49 receivable , bills payables report
50 In Tally,inventory valuation method option is available from _______
51 In tally,the group company must contain at least _____________ members
In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger
52 accounts into one line statements
53 In tally,to cancel a voucher entry we press ______________
54 In tally,to create a new column in balance sheet press _______
55 In the Tally Software, the _____ directory stores all data entered by the user.
56 Method of voucher numbering is Tally5.4 is/are ________________
57 Method of Voucher Numbering is/are
58 Projected approximation of income or expenses is called ______________ .
59 Revenue Account also known as _____ Account
60 Tally allows to delete a ledger from _____ alteration mode.
Tally audit feature is available in a company __________________
61
62 Tally can maintain budget _______________
63 Tally can maintain budgets on _____
Tally can maintain company type 'accounts with inventory' by activating feature integrate the
64 accounts with inventory
65 Tally encrypts and stores TALLY DATA at the data directory
66 Tally is based on mercantile accounting system
67 Tally provides _____________ different predefined voucher types.
68 Tally provides at least _____ predefined voucher formats
Tally provides the capability to the administrator/auditor to track changes in the areas is/are
69
True False
Purchase, sales, receipt,
payments etc. To fill the log register It is mandatory in tally
Invoice Bill A or B
Balance Sheet Profit & Loss Journal Book
Customers Suppliers A and B
F9 F10 F11
Display stock valuation
method Open Calculator Change Period
Enterprise Data - Electronic Data
Enterprise Data Interchange Information Interchange.
Balance sheet & profit &
loss profit & loss and trial Profit & loss and trial
balance balance Cash and profit & loss
Main Location Primary Primary Cost Category
Primary Main location A or b
Balance sheet & profit & Profit & loss and trial Cash and profit & loss
loss profit & loss and trial balance
balance
128 228 28
Main location Primary Symbol
Ledger Accounts Groups Sub-Groups
data element data record Field
F7 Alt + F7 F10
F4 F5 F6
TRUE FALSE
1 FALSE
TRUE FALSE
Alt+P Ctrl+P Shift+P
Sales return Purchase return a or b
* $ &
1 FALSE
Two Three Four
Two Three Four
Groups Ledger accounts A or b
F6 function key Alt + f6 function key F7 function key
TRUE FALSE
Alt+x Alt+d Alt+c
Ctrl+C Alt+C Alt+Ctrl+C
Bin Data Sub
Automatic Manual None
Manual Automatic None
Balance sheet Profit & loss a/c Budget
Personal Nominal Real
Single Multiple A or B
By pressing F11 function During the creation of a In 'comp info -> security
key company control' option
On net transactions On closing balance Both a & b
Net Transactions Closing Balance A and B
1 FALSE
True False
FALSE TRUE
4 11 16
11 16 18
Changes in transactions or
vouchers Changes in Ledger Masters Both A and B
One company to another Other programs - a
company created withon spreadsheet or a database
Tally Package file. Both A and B
Security mechanism Ledger a/c Cost category
F1 ALT+F1 CTRL+F1
Puchasing and Accounts Accounts payable and
payable Puchasing and Receiving Receiving
FALSE TRUE
1 FALSE
Journal Stock Journal Physical Stock Transfer
Alt+D Alt+X Ctrl+T
F2 F4 Alt+f2
Tally.imp Tally.ini A or b
F5 F7 F8
Administrator Owner Data Entry
F4 F5 F6
1-4-1995 to 31-3-1996 1-4-2006 to 31-3-2007 1-4-1997 to 31-3-1998
Does not require as Will produce a more Will be more efficient at
stringent a set of internal accurate set of financial producing financial
controls. statements. statements.
F3 Ctrl+F3 Alt+F3
Option 4 ans
None of the above B
F12 A
16 C
None of them B
B or C A
All of the above B
F11 B
Alt+f5 B
Payroll transactions. A
Journal Book B
1 B
A
A
A
None of the above A
None of the above A
^ A
A
Five B
Five B
None of the above B
None of the above A
A
Ctrl+d A
None of the above B
None of the above B
All of the above D
All of the above D
None C
None of the above B
Mone of the above A
None B
None C
None of the above C
A
A
B
28 C
21 B
B
A
Reversing Journal B
Ctrl+D B
Ctrl+f2 C
None A
F9 C
TallyVault A
F7 C
None of the above B
Eliminates the need to
reconcile control accounts
and subsidiary ledgers. C
None of the above C
No Question
1 A System Auditor can use CAAT tools to analyze data
4
5 Black box testing and white box testing are part of:
Components of expert systems include: a) inference engine; b) user interface; c) knowledge base;
6 d) fuzzy logic
Computer operation controls are designed to provide ________________
7
Computer security is frequently associated with confidentiality, integrity and authentication
8
9 Concurrent use auditors as the member of the system
Database analyzer is a software which provides detailed information concerning the operation of
10 the database
Each of the following is an enabler of IT-business alignment except:
11
12 Errors are correlated_________
13 Field check is exclusive to a field
File extensions are used in order to
14
15 For computerized auditing usage of sophisticated audit software would be a necessity
For small to medium sized systems, individual modules are coded and individually tested and then
assembled to be tested as a whole-the testing strategy is referred to as ___________________
16
17 Hashing for disk files is called
In an accounting audit trail, intrusion detection system might monitor the amount of processor
time consumed by the user to detect unusual deviation from the amount processor time
requested by the user in the past
18
19 In framed checking the data entry is checked against an expected picture or format
In integrated test facility approach the auditor should ensure that the impact of test transaction is
20 subsequently eliminated from the computer files
In the file reorganization merging capabilities are needed in data from separate file is to be
21 combined on a separate work file
Information systems controls include all of the following EXCEPT:
22
On-line processing refers to grouping of transaction and processing the same in one go from start
23 to finish
Passwords are applied to files in order to
24
25 Recording transactions in a controlled manner may amount to loss of stored data
26 Regular cross system verification may minimize frauds
The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility
27
The basic systems model is used to describe virtually all information systems and it consists of the
28 following elements:
1 FALSE
1 FALSE
1 FALSE
1 FALSE
1 FALSE
local B
A
general controls C
A
A
extensible hashing A
A
A
A
Control B
A
No Question
1 ? Wildcard character represents any number of characters
2 _____ chart exists as a separate object
3 _____ header is a unique feature of reports
4 _____ is a collection of related fields
5 _____ section is present for each record in the report
______ are used to select only some particular records from the table or any other database
6 objects
7 ______ control combines the functionality of both a text box and a drop down list
8 ______ control need not have a data source
9 ______ forms are usually used for tables with one to many relationship
10 ______ forms displays field in single row
11 ______ function is used to display a message box
______ is a file management software package that lets users and programmers organize data
12 into files and then process those files
______ is fired when an event is triggered is the concept based on a Visual Basic language
13
14 ______ is used to convert any ms-access object into html format
______ queries can be used to delete a group of records that meet some specific records
15
16 ______ represents data in a pictorial format
______,______and_____are the buttons belonging to the options group
17
18 _______ are employed to select only some particular records from a database object
19 _______ are used to represent our data in graphical format
20 _______ control is tied to field
21 _______ control uses an expression as a source of control
22 _______ form displays fields in a single horizontal row
23 _______ is used for CAAT as database
24 _______ option in publish to web wizard produces a page that is static in nature
25 _______ query wizards are used to generate summary calculations for a table
26 _________ data type is generally used for fields assigned as primary keys in a table
_________ law basically states that there is a specific probability of the first digit of a no.
27 being 1,2,3 etc
28 _________ of the following is/are a type of chart
29 __________ is a software of CAAT
30 _________allows us to create a filter from a field short cut menu
31 ________is a database object which displays data but cannot be used to edit data
32 ________option is selected from the view menu to create macros with conditions
33 _______are forms that are included in other forms
34 _______can be used to automate certain actions in response to events
35 _______is selected from the toolbar to add an OLE object
36 _______is the file format that works on internet
37 _______is the form that can be created with minimum input from the user
_______is the name of the database object that displays data and can be used to edit data
38
_______is the wildcard character which represents the presence of any number of characters
39
40 _______is used to create a mailing label
41 _______layout of a form displays one record at a time
42 _______option from the file menu is selected to run 'publish to the web wizard'
43 _______query is used to add records from one or more tables into an existing table
44 _______query is used to create or change database objects in a current database
45 _______report can be created with minimum user input
46 _______window is used to write VB code in access application
47 ______allows to create a filter by typing the value in a data sheet
48 ______and_____are the two types of auto reports available
49 ______are used to jump to any kind of information from a datasheet or a form
50 ______can be used to create toolbars
______field is added to the macro sheet when we select grouping option from the view menu
51
52 ______header is present at the beginning of the report
53 ______is a datatype that assigns values automatically
54 ______is a form that summarize large amount of data
55 ______is present at the bottom of each page in a report
56 ______option from the insert menu option is chosen to add an embedded chart
57 ______option from the tool menu is selected for setting relationships between tables
58 ______queries allows us to view data in row by column manner
59 _____is a control that lists set of data
60 _____option from the new object toolbar gives the easiest way of generating a report
_____page in an web application is used to navigate to the rest of the pages in the application
61
62 ____is an access object that displays un-editable data
___is the name of the database object that displays data and can be used to edit data
63
___is the wildcard character which represents the presence of any number of characters
64
65 ___queries can be used to delete a group of records that meet some specific records
66 ___wildcard character represents any single character
__field is added to the macro sheet when we select grouping option from the view menu
67
68 A ________ sheet lists all the properties that pertain to the form or the controls
A blank database can be created using __________
69
70 A bound control is tied to a underlying query or table
71 A calculated control uses expression as a source of data
72 A collection of data stored in different objects is known as a _________
73 A combination of one or more columns used to identify particular rows in a is___ .
A combination of two or more columns used to identify particular rows in a relation
74 is________ .
75 A control can be bind to a record using row source property
76 A control without a data source is known as ___________
Application software suited to storing the survey information obtained in the table would be
110
111 Assembler language uses Mnemonic symbols
Assume a one-to-many relationship between the Customers table and the Loans table, with
referential integrity in effect. What happens when you attempt to delete a customer ID from
112 the Customer table that still has entries in the Loans table?
113 Audit should be periodically analyzed to detect any control weakness of the system
Auditors cannot use generalised audit software to extract the data needed for audit purpose
117
118
Batch is the process of ______ together _____ that bear some type of relationship to one
119 another
120 Between and Not Between is ______ type of operators
121 Black box testing is _______ based and white box testing is _______ based
Black box testing seeks to determine whether application output is what it is supposed to be
122
CAAT do not contains package programs, purpose written program, utility programs or system
123 management programs
Changes from a master table can be reflected on to the child table by selecting _____option
127
128 Changes of one table can be carried over to another related table
129 Chart can either be a form or a report
130 Charts can be produced without the wizard
131 Charts can convert numerical data in a easily understandable format
Check digit is a group of nos. added to a code for determining the accuracy of other digits in
132 the code
Computer Assisted Audited Technique involves the use of computers through "Black Box
133 Approach"
Core image comparison is particularly useful where only executable versions are distributed
140
141 Currency fields express the amount in _________
142 Data definition queries are used to create or change database objects
Duplication of records in a field won't be allowed if the fields are declared a________
153
Embedded audit routines are sometimes built into an entity's computer system to provide
154 data for later user by the auditor
155 Embedded charts exist separately
156 Embedded code is a software used by the auditor to examine backup data
157 Embedded code performs wide variety of audit task
158 Errors are correlated_________
159 Field check is exclusive to a field
File activity is the proportion of transaction file records that are actually used and accessed in
160 a given processing run:
161 File interrogation refers to the _____ of information from a file
File volatility refers to the number of addition and deletions to the file in a given period of
162 time
163 Filter by form can be created from a forms shortcut menu
164 Filtering data is a way of arranging data in a meaning full order
165 For computerized auditing usage of sophisticated audit software would be a necessity
For small to medium sized systems, individual modules are coded and individually tested and
then assembled to be tested as a whole-the testing strategy is referred to as
166 ___________________
167 Foreign key is a field that uniquely identifies each record and accept no null values
168 Forms that are included in other forms are called ______________
From ms - access, if we want to view the records stored in a table in ms - excel worksheet,
169 we need to
From ms - access, if we want to view the records stored in a table in ms - excel worksheet, we
170
need to
General purpose software provides a framework for highly complex scientific operation
171
Generalised audit software could be used by the following in consistencies or significant
172 fluctuations
173
Group header will be present at the design view of a report even if the report is not grouped
177
Group header willbe present at the design view ofa report even ifthe report is not grouped
178
179 Hash totals means meaningless totals
How would you delete a relationship between tables in the Relationships window?
182
183 Hyperlinks are used to jump to any kind of information or data from a file
In a Customers tables, what does a plus sign next to the CustomerID field mean?
190
In a one-to-many relationship between Companies and Employees, which field is found in
191 both tables?
In a relation __________________________ .
192
193 In access OLE objects cannot be linked
In an accounting audit trail, intrusion detection system might monitor the amount of
processor time consumed by the user to detect unusual deviation from the amount processor
194 time requested by the user in the past
In an enterprise-class database system ________ .
195
In examination of audit trail the following data associated with an event may be ___
202
In formula in flow hypothesis the auditor should expand the extent of substantive tests to
determine how the defects may impact the attainment of the program objectives
203
204 In framed checking the data entry is checked against an expected picture or format
In integrated test facility approach the auditor should ensure that the impact of test
205 transaction is subsequently eliminated from the computer files
206 In MS -Access, the records in a table are sorted based on _________
207 In MS-Access long integer is a datatype
208 In MS-Access, alter command may be used in adding a primary key to a table
209 In MS-Access, columnar layout can be used to view multiple records in a form
210 In ms-access, datasheet view is available in ___________
In MS-Access, filter excluding selection will display only those record(s) which meet the
211 criteria.
212 In MS-Access, the function that gives the current date is _____________
In ms-access, to protect a database file from illegal access, we may set database password.
213 The option of setting database password is available in _______ menu
214 In MS-Access, user may specify criteria for filter in form view using _________
215 In MS-Access, we may design command buttons for navigating records
In MS-Access, while designing a table for a particular field, the Required parameter is set to
216 yes. This validates the field as _______
In MS-Access, while using form design view, for creating a command button for adding a new
record, we should select the _______ category from the command button wizard
217
218 In ms-access, while using SQL, references constraint is used for creating _______
In MS-Access. While appending records, the source and the target table must have similar
219 structure and fields
220 In OLRT the CPU should process the capability of program interruption
In Range Check , the data may not be in proper sequence but should be within a
221
predetermined range
In SQL, delete command is used to remove _________
222
243
One -to-one relationship means a single entity to a single entity in a monogamous structure
255
On-line processing refers to grouping of transaction and processing the same in one go from
256 start to finish
Operating systems are devised to optimize the machine capabilities, the function
257 include_______________
Other ms-office applications can be accessed from ms-access using a concept called __
258
Other ms-office applications can be accessed from ms-access using a concept called ________
259
260 Page header is present at the beginning of each record
261 Pivot tables are used to navigate to the other tables in a database
262 Primary key uniquely identifies each record
263
264 Properties of a form can be changed by selecting ______from view menu options
265 Properties of the fields are managed by _____ in Dynaset
266 RDBMS is structured to a series of 2 dimensional tables
Real time refers to the technique of updating files with transaction data immediately after the
267 occurrence of the event to which it relates
268 Recording transactions in a controlled manner may amount to loss of stored data
269 Records cannot be sorted by a primary key
270
271 Regular cross system verification may minimize frauds
272 Relationship is an association between _________
273 Reports are used to represent un-editable data
310
The three list boxes present at the bottom of the expression builder are called_____
313
The transition from manual system to CIS environment bring dramatic changes including
________________
314
The type of queries that can update or delete record(s) in a table(s) are called __________
315
The use of computer assisted audit techniques is not gaining popularity not only ___
316
The validation checks applied to a field depend on the field's logical inter relationships with
317 other fields in the record
318 The wild card representation for any 5 letter word that starts with ram is ___
The wild card representation for any 5 letter word that starts with ram is ________________
319
320 There are no wizards for creating a database in access
This database holds personal information. The user can help to keep it confidential by
321
322 Time sharing system allow access to a CPU from remote terminals
323 To build complex expressions_____is used
To display an OLE object in the form of an icon ____ option is selected from insert object
324 dialogue box
To import data from Access to Excel ,it is not possible to link between Access and Excel sheet
325
326 To see more than one record at a time in a form we use _______
Transaction files contain relatively permanent records take product profile, customer profile,
327 employee profile etc
We can add our own functions to the expression elements list box of the expression builder
334
We can change from the design view to the form view without being prompted for saving the
335 changes made
We can switch from datasheet view to form view by selecting view -> form view option
336
We have obtained access to the company's operational data. We examine 50 records for
customers with phone numbers that should use the current area code of 345. Of these 50
records, we find 10 that still use an older area code of 567. This is an example
337
We have obtained access to the company's operational data. We have been asked to
produce a report with an item by item analysis of sales, but the only sales figure available is
338 the total sale value for each order. This is example of_____
What is a database?
341
What is a report?
342
When you are given a set of tables and asked to create a database to store their data, the first
step is to ____ .
349
Whenever monetary transactions are processed against master files, the update program
should maintain a correlation account to record such transaction that does not have a
350 matching master file record
351 Which is the example of CAATs
354
Which of the following brings a copy of the table into the current database and does not
355 maintain a tie to the original table?
356 Which of the following commands is used to change the structure of table?
Which of the following constraints can be used to enforce the uniqueness of rows in a table?
357
358 Which of the following dialog box is/are used in the creation of form ________
Which of the following ensures that records in related tables are consistent with one
another? For example, it ensures that you cannot add a record with an invalid foreign key.
359
360 Which of the following field types will generate the primary key automatically?
361 Which of the following is control types ____________
364
Which of the following is true when viewing a main form and its associated subform in the
Form Design view?
365
366 Which of the following objects are NOT found in an Access application?
367 Which of the following objects is used to display a menu?
Which of the following relationships does not belong in a database based on a professional
sports league such as football or basketball?
368
369
Which symbol is used at the end of the join line in a related table to signify the “many” side of
370 a one-to-many relationship?
While base testing forces on finding if there are any defective execution policies in a program
371
372 White Box Approach necessary involves expert knowledge on the part of Auditor
Widespread end use computing result in unlimited errors creeping into system going to
373 accept handling, thereby increasing audit risks
374 Wild card characters are used for sorting records
With OLRT where interactive data entry is available, the master file associated with a
375 transaction may be searched for confirming data
376 Wizards for toolbox controls are called a __________
Year end ledger, inventory files or transaction files can be tested for cut-off , to ensure that
377
the data has been provided is for the correct audit period
You are creating a banking database to track customer loans. The bank will, of course, have
many customers, each of whom may take out one or more loans, while each loan may be
associated with only one customer (there are no joint accounts). What is the re
378
You are creating a client application that calls ActiveX DLLs. Which of the following properties
of the Err object provides the name of a component that sends an error back to the client
379 application?
You are developing an Access application that you expect to upgrade periodically. Which of
the following statements is TRUE?
380
You have created a one-to-many relationship with referential integrity between a Customers
table and a Loans table. From which table can you delete a record?
381
Option 1 Option 2 Option 3
1 FALSE
freestanding embedded stand alone
page detail group
field file record
group record session
& # ?
label wizard chart wizard mail wizard
tabular columnar datasheet
create html new save as html
add append insert
append add insert
tabular columnar auto report
report macro sheet module
data sheet filter filter by input filter by form
columnar and tabular stable and unstable dynamic and static
table form report
VB Modules reports forms
& # ?
data warehouse data are data warehouse databases data warehouse data are
not stored in tables. do not have metadata. often denormalized.
as a new systems as a redesign of an existing
from existing data development project database
from existing non-database as a new systems as a redesign of an existing
data development project database
as a new systems as a redesign of an existing
from existing data development project database
all the users' data is in one it contains a description of
place it reduces data duplication its own structure
facts. figures. information.
data. relationships. metadata.
record field foreign key
number primary key index
the primary key of both the primary key of the a field from an unrelated
related tables. related table. table.
form name control record source
true false
1 FALSE
true false
Database Management Data Business Model
Database Modeling System System System
single-user database multiuser database e-commerce database
application application application
true false
true false
true false
natural/man-made open/closed conceptual/physical
true false
must be set for multiple
must be set for one word. words. does not have to be set.
true false
data marts normalization data models
entity-relationship data
data marts normalization modeling
true false
true false
true false
search sort field names
table relation row
remote DBMS relative DBMS Relational DBMS
Cross Tabulate Filter Merge
true false
true false
yes no
hardware and software processing options, file data
configuration structure checks and controls
1 FALSE
to have a complete picture decentralized picture of a
of a system system all the above
cascade delete related cascade change related cascade update related
records records fields
true false
true false
true false
true false
true false
True False
providing access to
computer to all organization
the of by all concerned personnel use of any programs
true false
1 false
true false
true false
true false
dollars rupees pesos
true false
true false
true false
true false
storing data offline at a
separate site backing up data regularly is related to data mining
true false
true false
1 FALSE
true false
true false
yes no
at the year end immediately on quarterly basis
true false
true false
back-ups retrieval deletion
true false
true false
true false
true false
true false
true false
1 FALSE
true false
1 FALSE
true false
blocks of nos. to the
consecutive nos. or primary attribute of the the random placement of
alphabets to entities entity component
1 FALSE
true false
the database application(s) the DBMS accesses the
interact(s) with the DBMS database data None of above
true false
true false
true false
the first field of the table the last field of the table primary key field
true false
true false
1 FALSE
table query form
true false
CURRDATE() TODAY() DATE()
true false
true false
1 FALSE
table or tables query or queries record or records
true false
macro expression elements comments
true false
job control language job connectivity language all the above
inner join self join no match join
pivot create form
1 FALSE
true false
true false
true false
true false
true false
true false
yes no
true false
reference files table files report files
true false
Jet SQL Server Oracle
true false
true false
manage hardware & enable multiple user
scheduled jobs software resources resource sharing
OLE DDE CME
true false
yes no
1 FALSE
true false
1 FALSE
identifying non-standard
identifying erroneous code identifying ineffective code code
prepared by an outside
programmer engaged by
prepared by the auditor prepared by the entity the auditor
true false
true false
true false
query and its associated
foreign key. main form and a subform. dynaset.
true false
true false
true false
255 64000 235
true false
OLE object OLE client OLE server
alternate keys composite keys candidate keys
bookmarks operators wildcards
database form collection
valid, numeric invalid, alphabetic none of the above
prompt, title bar text, icon. prompt, icon, title bar text. title bar text, prompt, icon.
true false
file managers hierarchical models network models
filtering ordering sorting
1 false
ram* ram?? two of the above
true false
can bring the data directly can bring the data indirectly all the above
true false
event - procedural based
action language structured query language language
RAD RAP RAID
true false
true false
1 FALSE
Reports allow users to Reports provide a very A tool which allows text and
extract information as hard flexible way of creating and graphics to be placed in
copy (printed output) editing documents documents
They cannot be
They must both be numbers They cannot be text fields AutoNumber data types
Menu Wizard Build Menu Interface Design Wizard
Extracting and analysing Spreadsheets make data
data easy to analyse Using queries
It contains more than one It contains tables, reports, It contains a user interface,
table queries, and forms or switchboard
clipboard file field
composite key primary key foreign key
assess the existing tables' design the database create one or more new
structure and content structure tables
true false
ACL IDEA High End CAATs
A check box enables the A text field enables the A drop-down list enables
form user to choose from form user to choose from the user to choose from
one of several existing one of several existing one of several existing
entries. entries. entries.
# M ¥
true false
True False
true false
true false
true false
button wizard control wizard option control wizard
1 FALSE
It will be easier for the user It will be easier for the user
to upgrade it if the objects to upgrade it if the objects It is advisable to put each
and tables are in one are in one database and object and table into a
database. the tables in another. separate database.
gateways A
option button B
none of the above C
none of the above A
none of the above A
none of the above B
filepet C
add A
report A
option button, toggle
button and check boxes D
forms A
report B
static C
none of the above A
one to many form B
none the above A
none of the above B
simple D
auto number D
table B
* D
none of the above A
justified B
none of the above C
delete B
data definition D
embedded C
none of the above C
none of the above C
none of the above A
hyperlink D
macros D
* D
add A
? D
none of the above C
foreign key C
B
data control B
None of above B
b and c C
a and b C
a and b B
a and b A
a or b A
B
A
A
all of them D
A
data migration D
A
B
A
record grab D
field D
Reliable DBMS C
None of the above B
e-mail A
A
An error message is
displayed. D
A
A
A
A
yen A
A
A
uses tape as opposed to
disk C
A
entity-relationship data
modeling A
entity-relationship data
modeling B
B
all the above D
no duplicate key A
A
B
B
A
none of the above B
A
B
addition B
A
B
B
A
stub C
B
child form B
use export D
use export D
administered questionnaire A
B
B
edited A
e-mail C
none of the above A
none of these A
CompanyAddress A
more than one column can
use the same name C
B
A
All of above A
the database B
All of the above. D
b and c D
A
B
A
none of the above C
B
A
A
all of the above D
B
DAY() C
A
A
A
none of the above C
B
action D
A
none of the above A
outer join D
none of the above A
A
A
B
B
A
A
A
A
A
none of the above D
B
a and b D
None of above A
All of above D
A
A
B
B
A
B
A
relational data model A
querying C
new report D
update queries A
none of these A
A
none of the above B
create icon A
A
A
A
A collection of files B
It contains macros C
layout B
surrogate key B
B
All of the above D
Join A
UPDATE TABLE C
IDENTITY columns C
both 1 and 3 D
The one-to-many
relationship B
Auto Key C
all of the above C
Can define the audit
objectives D
An application can be
created in such a way that it
objects such as forms and
reports can be changed
without disturbing the
existing data. C
* C
A
A
A
B
A
tool wizard C
A
Many-to-one B
Source D
Neither table C
Digital Signature and Verification of Electronic Records
No Question
1 "Hash Function" is used in both creating and verifying Digital Signature
___ is a characteristic of a communication channel that is the amount of information that can
2 be passed through it in a given amount of time, expressed in bits per second.
___ means the result of applying to specific information, certain specific technical processes
3
4 _____ can be owned by multiple organisation
5 _____ is a program that helps us to log on to other networks
6 _____ is the most popular internet service
7 ______ is a large worldwide bulletin board service network
8 ______ is a program that helps us to log on to other networks
______ is the process of the digital signals being converted into a form suitable for analog
9 transmission
Digital Signatures, if properly implemented and utilized offer promising solutions to the
problems of Imposters, Message Integrity, __________ and _____________
67
68 Directories consists of _______ levels
DTD stands for __________
69
In processing cheques which of the following I/O techniques have banks traditionally used
85
In, Digital Signature, _____________ perform the "ceremonial" function of alerting the signer
to the fact that the signer is consummating a transaction with legal consequences
86
87 Internet can be defined as _______
JPEG is the acronym for ___________
88
89 Lynx is a _______ programme that works with terminals
Modem stands for __________________
90
91 Mosaic displays links in color whereas _____ does not display links in color
92 Navigating through the menu of gopher is called moving around _______
93 NSFNET is the united states provides service to _____ and_____
94 PINE stands for _____________
95 PPP stands for _____
96 Prodigy is run by IBM and ______
Service indicates the name of the ________ used to access data, present on the other end of
97 the link.
98 SGML is a _________
Signing Writings serve the following general purposes______,_______,_______ and _______
99
Stringing pages together using hypertext technology helps view pages _______________
103
The application that confirms whether a document is compliant to its DTD is _________
115
116 The basic function of the ______ is transmitting the bits over a channel
The complementary keys of an asymmetric cryptosystem for Digital Signatures are arbitarily
117
termed as _________, and ____________
The EDI standardisation for International Trade and Commerce is introduced by __________
122
The first international IP network connections were established in 1973 with _____ and_____
124
125 The huge list of keywords from important items is called ______
126 The huge list of keywords from important items is called an_____
127 The image format supported by most browsers is________________.
The mail we send has a mailing address and most of them correspond to_____,_____ and
135
136 The most important service of the ______ is to manage traffic control
137 The most widely accepted format for Digital Certificate is defined by the CCITT X.509
138 The net drivers______ from one place to another
The online service offered by navigator gold 2.0 are _______ and_____
141
The two major browsers used to surf the Internet are ________,_______
151
166
167 Web is a collection of ___________
168
Which of the following activities would most likely detect computer-related fraud?
169
Which of the following statements is correct concerning the security of messages in an electronic data
interchange (EDI) system?
173
174 WINWAIS has two source lists namely____ and______
1 FALSE
Browser/user Server Web
client stand-alone servers
True False
True False
computer related
biographical information bookstores
abbreviations and acronym
Certification Authority Certified Authority Certificate Authority
Network Interface Communication
Current web page Browser Client
communication generated Common Gateway classified general
information Interface instructions
detailed transaction
data terminal equipment data target equipment
explanation
university of university of
university of California net
berkeley,berkeley freenet cleveland,cleveland freenet
point to point network and packet switching,store and smart network and dumb
broadcast channel network forward network network
Conducting fraud-
Using data encryption. Performing validity checks.
awareness training.
sending information to a storing data on the hard
storing data on a disk drive
host computer drive
<center> <font size=n> <hr size=n>
Failure of server duplicating
Collision. Data entry errors.
function.
Removable drives that can be Encryption performed by a
locked up at night provide Message authentication in EDI physically secure hardware
adequate security when the systems performs the same device is more secure than
confidentiality of data is the function as segregation of duties encryption performed by
primary risk. in other information systems. software.
Channel A
none of the above C
A
Sent to the correct address.
A
Neither A nor B C
neither text nor image C
none of the above
C
none of the above B
none of the above B
none of the above C
Public Key and Private Key
D
B
galenet A
Either A or B
C
All The Above D
Formal Legal
Requirements, Open
System D
many B
Document type data
C
none of the above
B
voice recognition B
A
none of the above A
none of the above B
none of the above
A
A
documents A
Endorsed Cash B
None of the above C
EDI D
functional groups D
Customer-to-Company B
Broadcast C
Subscription C
Business- to-Billboard A
UN/EDIFACT D
All of the above D
E-token A
No Question [Internet]
1 ___ would be used by parents to monitor their children on their home system.
2 ______ supports one button publish
3 ________ is the ancestors of the internet
4 _________ connects LANs.
5 _________ refers to the use of Internet technologies for placing telephone calls.
6 __________ is designed telephone system
7 _____________ is the Worlds largest computer network .
8 _________allows an application to multitask within itself
9 _________is a program that displays information about a host connected to the net
13
______is the most advantageous database system
14 _____page in an web application is used to navigate to the rest of the pages in the
application
15 _____system is responsible for handling the screen and user I/O processing
16
A ............... is a LAN-based computer with software that acts as a controlling device for
controlling access to at least part, if not all, of a local area network and its available
resources.
17
A ____________ attack is when a hacker sends a continuous flow of packets to a system.
18 A block of text automatically added to the end of an outgoing email is called
19
A company posts a price list of its products on its website. The advantage to the
customer is that the company can
20 A computer based system for sending, forwarding, receiving and storing messages is
called an
21
A computer is to be linked to 8 terminals using a single communication link. To permit
simultaneous terminal operations, communication path will require which of the
following
22
A firewall is
23
A group of computers and other devices dispersed over a relatively limited area and
connected by communication links that enable a device to interact with any other on the
network.
24 A hub is a device that can connect
25 A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives
and printers. This type of network is called a
26
A long string of seemingly random bits used with cryptographic algorithms to create or
verify digital signatures and encrypt an decrypt messages and conversations.
27 A MAC address is of
28
A modem is a device that
29 A multiplexer is a form of
30
A new user initiates a new process of execution at the background,while the user can
continue his query process as usual in the foreground. This situation is referred to as
______
31
A NIC is considered as
32 A proxy server is
33 A search engine is
34 A sequence of bits or characters that identifies the destination and the source of a
transmission.
35 A set of rules and formats, semantic and syntactic, that permits entities to exchange
information.
36
A standard language for creating and formatting Web documents is:
37
A system that uses the Internet for business-to-business interaction is called a(n):
38
A Web page is another name for -----------
39 A_____ is a set of computers interconnected by transmission paths to exchange
information in internet
40
A______is nothing but a PC with a network operating system
41 Accessing the Internet from a typical home PC requires the use of
42 According to information Technology Act, 2000, To investigate contraventions the
controller of certifying authority shall exercise the like powers to that of
43 An action or event that might prejudice security.
44 An attempt to get access to a system by posing to be an authorised person.
45 An IP address is a
46
An ISP
47
An NIC
48
An online drugstore such as Drugstore.com is an example of_______
49
52
BBS stands for______
53 Bluetooth is
54
Both the DBMS and the application resides on the same component in a ____system
55 Data is broken into small unit called __________ .
56 DBMS models can be grouped under____ categories
57 Dictionaries,encyclopaedias,government and other references are found in ______
58 Domain names must contain a description of the type of organisation that the domain
represents. A very common abbreviation used include:
59 Encryption techniques can be implemented in Hardware-Software
60 Expansion of WBT is ______________
61
FTP is
72
ISDN stands for _______.
73
JPEG and MPEG
90
RS-232 is a
91 Setting your privacy settings in Internet Explorer to medium is one way to block:
92
SMTP stands for __________ .
93 Software which prevents external access to a system is termed
94 TCP/IP stands for ________________
95
Telnet
96 Terminal hardware controls include
97 The .............. of the network concerns how network devices are physically (or optically)
interconnected.
98 The _____ level gives the broadcast overview of the net
99 The _____ protocol is a network protocol to be built for the World Wide Web
100
The ______ do not have processing power of their own and has only a screen, keyboard
and the necessary hardware to communicate with the host. For this reason, the
terminals are referred as_______________
101 The ________ is a form of mail that is not targeted to a specific audience
102 The _________ model use direct mail, spot television or cable television, in active based
advertisement.
103
The __________ model refers to information that is placed at a point where it will be
noticed by customers in the course of other activities and does not require active search
104
The advertising strategies emerging in the on-line world are ____________
105 The computer which can receive data from other computers on the network and print it
is _______
106
The famous Nigerian Fraud scam offered victims the opportunity to:
108
The formal rules and parameters which are established to permit a microcomputer to
communicate with the mainframe computer as though it was a terminal of the
mainframe are called
109 The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain
sensitive information is called _________________.
110 The hardware and the software requirements together form the_____
111 The image format supported by most browsers is________________.
112 The initial web pages present in a web site is the ________ page.
113 The Internet is controlled by whom?
114
The major advantage of the checksum program is when it
115 The means of communicating between networks
116 The Media Access Control (MAC) is a sub layer of the:
117 The most preferred number system to represent a IP address is
118 The most widely used network operating system on PC LANs is
119
The other ways of getting connected to the net are_____
120 The principal topologies used with LANs are:
121 The principles, means and methods for rendering information unintelligible and for
restoring encrypted information to intelligible form.
122
The process of data being automatically written to a duplicate database is called______
123 The space used by Netscape to store the retrieved page is called______
124 The successful act of bypassing security mechanisms of the system.
125
The term HTTP stands for
126 The traditional intent and impact of this common type of attack is to prevent or impair
the legitimate use of network resources.
127
The two most common tools used to help with extracting information are:
128 The URL for encyclopedia Britannica is_________
129
The useful URL schemes are_____ and______
130 The uuencode files start with a _______
131
The Web page format in which all elements of a Web page are saved as one file is called:
132 The World Wide Web consists of _________
133 The World Wide Web was devised by _________
134 The worldwide web server uses the following standard interface to act as the
middleware:
135
The______ handles data processing and disk access in a Client/Server architecture
136
137 To construct a simple LAN of 4 computers, you would connect them with _____
138 To look for information about interest areas on the internet, the user should use
139
To secure communication network against wire-tapping the most effective control is
140
To use the Internet, you
141 URL stands for ________
156
What is the best means of protection from cyber stalking?
157
What is the biggest disadvantage of the Ring topology?
158
What is the purpose of DNS?
159 What is the term that describes spying on one’s business rivals to gain a competitive
advantage?
160
What would you NOT be looking for when spying on a competitor?
161 When all the processing is done by the mainframe itself, the type of processing is
sometimes called as
162 When creating a network from just two PCs, what kind of cable would be used to connect
them?
163 When LAN connected together ,it is called __________ .
164
When saving a photograph for use on a website, which format should you choose?
165
When we talk of Data Transmission modes, then ATM stands for
166 Which do you NOT need to connect to the Internet?
167 Which is not one of the recognized IEEE sub layers?
168 Which of the following in an OSI layer
169 Which of the following is a likely target of a cyber terrorist that would cause considerable
loss of life?
170
Which of the following is a properly formatted email address?
171
Which of the following is a true statement about the OSI model layers?
172
Which of the following is a Web browser?
173 Which of the following is an easy-to-use service to get information on someone?
174 Which of the following is an example of unacceptable online ‘netiquette’?
175 Which of the following is NOT a means of monitoring employee use of company
technology?
176 Which of the following is NOT a properly formatted IP address?
177
Which of the following is not an appropriate control over telecommunications software
178
Which of the following is NOT an example of a DoS attack that is popular among hackers?
179
180 Which of the following is the most common danger on the Internet?
181
Which of the following is true concerning the function of a switch?
182
Which of the following is used to update a Web query?
183 Which of the following pieces of information would NOT be found online?
184
185
Which of the following terms applies to network used to connect computers with other
computers, peripherals and workstations that are in fairly close proximity
186
Which of the following would be a form of cyber terrorism?
187 Which of the following would be performed on a network server and not normally on
individual workstations?
188
Which of the following would NOT be considered an example of cyber terrorism?
hierarchical database
file management system system network database system
startup home end
distributed computing
wan system windows NT
CD-ROM drive a modem Windows 95
.com is used for company .co in used for company .con is used for companies
I only II only Both I & II
Web based Training Web based Technology Web based Transport
uses wireless
used to send email communication medium is part of Netscape
Time of day control locks Encryption algorithms Parity checks
purchase off-shore
buy stocks. invest without risk. property.
university of university of university of California net
berkeley,berkeley freenet cleveland,cleveland freenet
All sites are safe and There are safe and unsafe Only large name-
reliable. sites. recognizable sites are safe.
Bridges and Repeaters. Two or more networks Bridges and Hubs
bits frames Packets
The layers cannot Any layer can communicate Any layer can communicate
communicate with one directly with any other only with the layer directly
another. layer. above or below it.
It is made up of many
networks connected into
transmission lines called It works the same way as a
It is one large network. backbones. local network.
Virus Fraud Adware
Combines connectivity of a Switches data from
hub with the traffic incoming ports to outgoing
Concentrates connectivity regulation of a bridge ports.
the Insert Hyperlink
the Refresh command command the Update command
Name of your bank Date of birth Personal assets
html D
all of the above D
none of the above A
front end D
Network PC C
traffic C
an encryption. B
Instant post-office C
PAN A
None of the above D
Star Network D
Formula A
48 MB A
Protocols C
Protocols D
network topology A
Web browser. B
none of the above C
LAN D
Netscape B
make of processor A
connects a computer to a
network D
None of above C
To obtain an accurate
inventory of network
related equipment and
parts and network nodes D
LAN WAN and MAN B
none the above D
centralized A
None of the above. C
many A
galenet A
Lynx A
A mainframe PC B
Mesh A
Mesh B
Mesh C
Are required with a
microprocessor which
permits some data
processing such as input
validation D
Go to the Bookmarks or
Favorites page C
traps B
none of the above C
client-server C
Howard Aiken A
hub B
by scanning the computer
for a connection. B
Address B
dummy servers A
Junk mail D
Endorsements A
Broadcast C
LAN B
Hoaxing B
system A
.wmf and .bmp C
none of the above C
None of the above C
Misleads a program
recompilation B
Pin B
Data Link Layer D
None of the above A
None of the above C
Message Digest C
disk mirroring D
none of the above B
Password Cracker A
Port sniffing C
MHTML D
mails B
NET A
application protocol
interface C
front end C
Msn .com B
None of the above B
search engine D
Web stalking. B
None of the above B
Economic espionage C
data processing B
Twisted pair B
None of the above. B
TIFF C
None of above C
None of the above B
All of the above D
All of the above D
Shutdown of nuclear plant
safety systems D
Application updates D
None of the above D
UDP flood A
All of Above B
Protocol B
All of the above are
correct. D
telnet C
Video C
No Question
Visual Basic
1 In visual basic, _______ is a method to convert a string into integer.
2 In visual basic, _______ keyword is used to declare a variable
3 In visual basic, _______ method is used to add an item in a combobox
4 In visual basic, _______ property of a textbox control is set to _______ to underline a text
10 In visual basic, to display a message in the run time _________ function is used
11 In visual basic, to display text on a label object _________ property is used
12 In visual basic, to populate a drive list box with a directory list box __________ statement is
used
13 In visual basic, using a data control, a record can only be added from the last record. Adding a
new record is only possible using _______ method of a recordset object.
14 In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a
messagebox function.
15 In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any
object
16 In visual basic, when a form object appears on the screen _________ event is triggered.
17 In visual basic, when a record pointer reaches to the first record, _______ property of a
recordset object is automatically set to ______
18 In visual basic, when a record pointer reaches to the last record, _______ property of a
recordset object is automatically set to ______
19 In visual basic, when a textbox control receives the focus ________ event is triggered.
20 In visual basic, while closing a form _______ event of a form object is triggered earlier to
terminate event.
21 In visual basic, when a record pointer reaches to the last record, _______ property of a
recordset object is automatically set to ______
22 In visual basic, the explorer view of a project is displayed in ___________
23 In visual basic, when a record pointer reaches to the first record, _______ property of a
recordset object is automatically set to ______
24 In visual basic, _______ is a method to convert a string into integer.
25 In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type of
shape should we get?
26 In visual basic, a timer event is only available in timer control.
27 In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any
object
28 In visual basic, _______ is a property of a textbox control to set a color of a text.
29
In visual basic, _______ property of a textbox control is set to _______ to underline a text
30
In visual basic, _______ property of a textbox control is used to change the size of text.
31
In visual basic, the interval property of a timer control is given in ________
32
In visual basic, _______ property of listbox control counts the number of items in the list
33 In visual basic, the properties of various controls can be set using __________
34 In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a
messagebox function.
35 In visual basic, ________ is a function which displays a message and it also allows the user to
enter values in a form object
36 In visual basic, using a data control, ________ is a recordset type which allows to add a new
record and also to update existing record in a recordsourse object
37 In visual basic, while closing a form _______ event of a form object is triggered earlier to
terminate event.
38 In visual basic, to give a backcolor or to bring in a picture to a command button can only be
done if we set the style property to ______
39 In visual basic, a method RGB(255,0,0) will generate _______ color
40 In visual basic, a method RGB(255,255,255) will generate _______ color
41 In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible.
42 In visual basic, if a user uses a function key F4 _________ becomes visible.
43
In visual basic, when a textbox control receives the focus ________ event is triggered.
44 In visual basic, a form is a ________ object.
45 Microsoft visual basic is a Rapid Application Development tool.
46
In visual basic, when a form object appears on the screen _________ event is triggered.
47 In visual basic, to display text on a label object _________ property is used
48 In visual basic, _______ object is used to access the database and also to manage the data in
the database.
49 In visual basic, when a checkbox control is checked _______ property is automatically
assigned with 1.
50 In visual basic, _______ keyword is used to declare a variable
51
What is the extension of the Visual Basic project file that stores the design of a user control.
52 Which event of a text box would you use for validating the data entered by the user?
53 Which of the following statements forces inline error handling?
54 The _______ method resets the contents of bound controls to their original values when the
user clicks on the cancel button.
55 To deactivate the Form UnLoad event, you make the following change in the function
definiton:
56 How many root nodes can a TreeView control have?
57
A project group is a Project which:
58 Procedures declared in a _____ are local whereas procedures declared in a ______ are
available to the whole application.
59
How can you keep the user from exiting a form by clicking the Close button?
60 The _______ property enables Visual Basic to draw complete images in memory before
displaying them on the Screen.
61 You want to display the code and the description of an error. What would be the correct
syntax?
62
What is the purpose of the Image List Control?
63
Which method would you use to get a free or unused File identifier while opening any file:
64 Which property procedure is used to retrieve the value of a property?
65
Which of the following can be shown to the user using the Common Dialog control in VB?
66 Which of the following are not properties of Command Button:
67
Which events enable you to determine which key was pressed by the user?
68 In order to access a file in Non-textual format, you have to open file in:
69 Visual Basic displays information depending upon the current value of two properties of the
form, called:
70 Which of the following procedure types will execute when you assign a value to a property of
an object?
71
In order to overlap the controls (say a command button) during design time, we use the
‘Send To Back’ or ‘Bring To Front’ option from the Edit menu. To change it dynamically
(i.e.during program execution) we need to change:
72 Which property of the ProgressBar determines how much of the bar is filled?
73 The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic
program.
74
The caption and the name properties of the command button:
75
You try to initialize a new Object variable with the following line but receive an error. What
could be the possible cause? Set MyVar = New Classname
76
Which of the following will perform a direct execution of a Command object?
77 The vb Critical symbol displays:
78 vbYesNo is an example of a(n):
79
The primary difference between the MsgBox statement and the InputBox function is the:
80
Which of the following is TRUE about a protected form (i.e., a form where the Protect Form
button on the Forms toolbar is toggled on and is assumed to remain in that position)?
81 Which event is triggered when the user moves to another open form?
82
Which of the following is TRUE regarding the Datasheet?
83 Graphical software tools that provide complex analysis of stored data are:
84
99 A ________ sheet lists all the properties that pertain to the form or the controls
100 A form can be bind to a record source using _____ property of the form
101 Properties of a form can be changed by selecting ______from view menu options
102 The default data type of VB is integer
103 Visual Basic is based on __________
1 FALSE
Click and KeyPress Click, KeyUp and KeyDown KeyUp and KeyDown
Ascii Format Binary Format Input Mode
Are one and the same Can be different at times Are actually not properties
You do not have the
You do not need to use the permission to access the MyVar has not been
Set command here class declared
The Open method The Exec method The ExecProcedure method
A warning query icon A critical message icon An exclamation icon
statement. variable. intrinsic constant.
val() D
none of the above B
none of the above B
none of the above
B
black B
white D
project explorer window A
oval
D
one-ten thousandth of a
second C
none of the above C
none of the above C
none of the above
B
additem
C
none of the above
C
A
activate
D
bof,true
D
eof,true
D
gotfocus
D
initialze
C
eof,true D
project explorer D
bof,true D
val() D
oval D
A
A
none of the above C
fontsize D
one-ten thousandth of a
second C
listcount D
toolbox B
inputbox() D
dbopendynaset D
initialze C
graphical D
black B
white D
project explorer window D
project explorer window A
gotfocus D
none of the above C
A
activate D
none of the above C
style C
none of the above B
.ocx B
Audit A
On Error Resume Next D
Resize A
UnloadMode parameter to
a zero value A
None of the above D
PaintPicture A
Msgbox error.number &
error.description D
To provide a repository for
images used by other
controls D
GetBytes A
Value B
Input box D
Font C
KeyPress, KeyUp and
KeyDown D
Output mode B
x and y A
Property Set C
AutoRedraw property C
CurrentVal B
CStr A
File1.pattern=Dir1.path C
count C
additem C
addnew B
movefirst C
UnloadMode parameter to
a zero value A
none of the above B
none of the above C
16 A short description of a tool bar button called the ______ is displayed when the mouse
pointer is allowed to stay for a second on the button
17 A table consists of ______ that contain text or graphics
18 Aryan has created a ten-page story, but only wants to print the first two pages. What printer
command should he select?
19 As related to type size, how many points are there to the inch?
20 Assume you are creating a two-column newsletter. Which type size is the most reasonable for
the text in the columns?
21
Assume you are working on a newsletter in which the masthead extends across the top of the
entire first page. The rest of the newsletter has two columns. What is the minimum number
of sections in the newsletter?
22
Assume you have made all appropriate selections in the Columns dialog box in Word, but
cannot see any columns on the screen. What is the most likely cause?
33 In Office2000 environment the tool that makes work easier for us is_____
34 In Word 2000 the macro dialog box is activated with the help of ____ key combination
35 In Word Macros are written in _____
36
In your English essay you notice that the paragraph at the bottom of page 1 continues on to
page 2. You would like to make this paragraph start on page 2.What would be the best way to
do this?
37 New option under the file menu of word creates a new blank document that is based on the
normal templates
38 OLE stands for_____
39 Pertaining to newsletters, which of the following cannot be changed using the Columns
command dialog box?
40 Pick out the element from the following that does not form the type of tabs for the Word
2000
41 Tables in a document help you to easily arrange all of the following EXCEPT:
42 The "format columns" option allows to create columnar text up 12 columns only.
43 The _____ helps us to keep track of the margin of the page
44 The ______ option enables us to convert text into a table format
45 The _______ option in word allows the user to automatically correct misspell words as and
when they are typed
46 The alignment available for tabs does not include
47 The application that supplies data in OLE is called an _________
48 The box that separate text from the document and allows it to behave like an independent
object is known as
49
The dialog box that is used to determine the documents margins is
50
The dialog box that is used to incorporate picture bullets into our documents or web pages is
51 The document that makes the user to organize and maintain a long document, such as
multipart report or a book consisting of chapters
52
The easiest way to create a document in word is
53 The feature that enables user to type anywhere in a document without pressing or tab
54 The features that enables the user to type text graphics tables anywhere in the document
without pressing enter or tab
55 The key that is used to change the font from the current positioned in a document is
56 The key that is used to change the style of the document that is from that normal to heading1
or heading1 to other document styles.
57 The key that is used to indent a paragraph is
58 The key that is used to perform a task to select all t he text in the documents is
59 The keys that are used to navigate between headers and footers are
60 The mode that is initialized or toggled to if the user is in a position to overwrite the text in the
word
61 The network that makes information easily accessible across various networks is _______
62 The object that composes of set of tools which helps to create and work on different shapes
like rectangles, circles, flowcharts etc.
63 The object that helps us analyzing data statistically is known as
64 The object that is used to provide information like the title of the book, name of the chapter,
page number etc.
65 The short-cut-key that is used for paragraph spacing(1.5)
66 The short-cut-key that is used to indent a paragraph spacing in the documents is
67 The short-cut-key that is used to paste the selected text
68 The special symbols that are inserted using "insert symbol" option of the word can not be
printed by the printer as they are not standard keyboard symbols
69 The thesaurus is invoked by pressing_______
70 The user can modify the picture from the clip art
71 The user can set a spelling checker to skip the marked part of the next
72 The user can split the screen only into two parts
73
The user could take a picture from a magazine and insert it into the document by using a
74 The view that enables us to view how objects will be positioned on the page when it is printed
75 The______ feature allows the user to copy and paste upto 12 items at the same time in an
application
76 The______ is used for quickly setting paragraph indention using the mouse
77 To clear all the tabs in a document the option that is clicked from the tabs dialog
78 To display an OLE object in the form of an icon ____ option is selected from insert object
dialogue box
79 To highlight certain parts of a page to set it apart from the rest of the page we make use of
the following features
80 To identify a document, it is helpful to include the file name on each page as a
81
Using an electronic bulletin board, Seema can do all of the following except which one?
82 Various fields are added to a regular document to create a special document called a form
through the ____________ toolbar.
83 Veena is entering a paragraph in a word processing program. When the cursor gets to the end
of a line, what is the best way to get the cursor to the next line?
84 Veena typed the following sentence: "The girl was very beautiful." In which word processing
utility could she find a synonym for "beautiful"?
85
What basic tools would you find in the Edit menu of a word processor
86
What command in a word-processing program can be used to change the word ‘him’ to ‘her’,
and also the word ‘he’ to ‘she’ in the given phrase? “On a cold and still night, the only sound
that could be heard was the owl that had ade its home in the nest outs
87
What does a document contain?
88 What edit commands would you use to insert a paragraph from one document into another
document, while still keeping the paragraph in the first document?
89
What happens when you open a document that has been saved using the Versions
command?
90
What hardware is essential for a word?
91
What is a header in a document?
92 What is a picture that is saved on a diskette and can be pasted into a document?
93
What is a Word Processor used for?
94 What is the name of the process of determining the cause of errors in a macro?
95 What process should be used to recall a document saved previously?
96 When a new table is created the insertion point flashes in the _____
97
When opening and working with multiple versions of a document, how can you tell which is
the most recent version?
98 When word is opened a new document called_____ is displayed, where the user starts typing
the content right way
99 Which is used to indent text within a document?
100 Which key moves the cursor to the beginning of the next line of text?
101
102
Which of the following is NOT correct with respect to page, column, and section breaks?
103
104
Which of the following is TRUE about saving a document using the Versions command?
105
106
107
Which of the following statements are false with reference to the use of a header row source
for a mail merge
108
109
Which of the following statements would NOT be a reason for showing suggested revisions in
a Word document without changing the original document?
110
Which of the following tools will copy the formatting of selected text to other places?
111 Which of the following types of fields CANNOT be inserted into a form?
112
Which of the following would be the most appropriate font for a newsletter headline?
113
114
While word processing, in which of the following situations would Tom use the "Copy"
command?
115 With reference to auto correct which of the following statements are false
116
117
With the reference to password protected documents which of the following statements are
false
web layout, printlayout normal layout, web layout web layout, page layout
setting it in larger type or underlining the text of the
font size. typing it all in capital letters. pull quote.
You are not in Print Layout You have not inserted a You have not specified
view. column section break.. continuous section breaks.
drawing toolbar control box database
true false
object linking and on line execution on line editing
embedding
The width of each column The height of each column The number of columns
picture bullets dialog box arrow bullet dialog box circle bullet dialog box
Master Document Child Document Hyperlink Document
click from start program,
MSWord from the task
wizard templates menu
click-n-type double click drag & drop
true false
shift+f7 thesaurus menu shift+f8
true false
true false
true false
press the return key press the tab key press the escape key
The Versions command will The Versions command will The Versions command will
allow you to save multiple allow you to save only one allow you to save only one
versions of a document, version of a document, version of a document
including any changes that including any changes that without any changes that
may have been made to may have been made to were just made to the
that document. that document. document.
field name must be listed in the field separators in a field names in the header
the same order as the header source and the data source must match any
corresponding information source can not be set as merge fields you've inserted
in the data source paragraph in the main document
To give the original author a To give the original author a To complicate the revision
chance to accept suggested chance to reject suggested process and to force the
changes from the person changes from the person author to spend more time
who entered the revisions who entered the revisions making corrections
Copy button Paste button Format Painter button
Check boxes Toggle button Text fields
A sans serif font at 10
A serif font at 10 points points A serif font at 20 points
password protected
document can be opened
password can not include without password as read password are not case
spaces only sensitive
special effect control tool box design wizard
Document Tip A
none of the above B
Print preview B
72 D
25 point B
Four B
spreadsheet C
A
Edit C
impossible to determine. B
rows and columns D
Both through the Tools
menu and the Reviewing
toolbar D
none of the above A
alt+f5 A
visual FoxPro B
A
none of the above A
rotation D
numbers. C
A
none of the above B
none of the above A
Border A
ctrl+shift+p C
ctrl+m D
ctrl+m A
up and down arrow D
none of the above A
LAN A
files C
File A
none of the above A
B
tools+spelling menu A
A
A
A
digital scanner D
none of the above B
Bullets D
macro. A
send a package to a friend D
Insert C
outliner C
Font, Paragraph, Bullet and
Numbering C
AutoCorrect B
default document B
sorting B
shift B
A grid is a set of horizontal
and vertical lines that
determine the placement
of elements in a newsletter
or other document. D
Press Shift+Enter to force a
line break. C
A section is a portion of a
document in which certain
page formatting option can
be set D
Thesaurus A
No Question [Excel and Data Analysis]
1 --------------- function searches for a value in the leftmost column of a table and then returns a
value in the same row from a column that we specify in a table
2 --------------------- function searches for a value in the leftmost column of a table and then
returns a value in the same row from a column that we specify in the table.
3 _____ chart exists as a separate object
4 ________ is used to differentiate one data series from another
5 _________ are not allowed in a macro name
6 _________ is a set of tables that describe each of the data series
7 ___wildcard character represents any single character
8 A ___________ is an excel file where the user stores his data
9 A cell reference that does not change during a copy operation is known as
10
A flow chart is the
11 A particular part of a work sheet can be printed by setting the _________
12 A pie chart can represent only one data series at a time
13 A spreadsheet is a grid of rows and columns and is called as a ________
14 A System Auditor can uses CAAT tools to analyze data
15
A user’s response to the InputBox function can be stored in:
16 A workbook consists of many ________
17 Advanced filter uses a filter similar to the query design window to create a filter
18 All commands are carried out on a rectangular groups of cells known as a:
19 All of the following are considered constants EXCEPT:
20 Analyse data over two or more periods is called ----------------------- analysis
21 Analyse fields by arranging them into rows and columns is called
22 Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents
of cells A6, A7, and A8 are _____.
23 Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to
cell E4, what will be the contents of cell E4?
24 Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell
E4, what will be the contents of cell E4?
25
Conditional formatting applies formatting to a cell based on:
26 Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run
totals
27 Currency fields express the amount in _________
28 Data validity test represents
29 Excel allows upto ______ levels of sorting
30 Excel can import data from other databases for the data analysis.
31 Exception testing can be used to identify ----------------- items
32 Filtering rearranges a list to display the required records
33
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs
to won in totality to obtain majority to form the government. Which one of the following will
be the tool that will help the team ?
34
Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first?
35
36
How can you tell which cell in a worksheet is the active cell?
37
38
If a cell shows ####### , it means that _____.
39
If you enter a date into a cell, Excel stores the date as:
40 If you press _____, the cell accepts your typing as its contents.
41 In ---------------- Check data entry follow a particular sequence and also a predetermined
range.
42 In _____ Check data entry follow a particular sequence and also a predetermined range.
72 The __________ option present in the file menu options is used to specify major facts of the
page to be printed
73
The ____________ makes the information in a worksheet meaningful and easy to understand
74
The alphabet indicating the column followed by the row number is known an__________
75 The cell reference for a range of cells that starts in cell B1 and goes over to column G and
down to row 10 is _____.
76 The chart that contains only one data series is _________
77 The chart that display two or more data series on a surface is _________
78 The chart that holds the column chart is _________
79 The chart that is used for displaying stock market information
80 The chart that is used to display discrete data
81 The command that is used to apply a format automatically __________
82 The command that will print an Excel workbook is found on the ____________ menu.
83
The command that will save the current workbook with a different file type is:
84 The command to display the current date in a cell is _________________
85 The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as
86 The default orientation for the printed page is _____.
87 The difference between the highest and the lowest values.
88
The F4 key is used to:
89 The formula that will add the value of cell D4 to the value of C2 and then multiply by the
value in B2 is _____.
90 The function key that is used to quickly edit the contents of a cell is:
91 The function that in used to join cell values together in a single cell ________
92 The function that is used to add together all values that meet specific criteria is known as
____________
93
The function that is used to calculate the payment for specific loan terms ____________
94
The function that is used to count all the values that meet specific criteria _________
95 The GAP detection options can be used to test for completeness of data.
96
The gym teacher has a new program to calculate physical fitness in terms of weight and
exercise. The use inputs different weights or amounts of exercise to determine the related
physical fitness. This "What if" program is most likely which of the followin
97
The number of days between two cells containing dates can be calculated by:
98 The option that is used to cancel the filter process for a specific column and display all the
records is ________
99 The process of finding or selecting information is known as ____________
100 The stacked bar graphs can be represented in __________
101 The stacked bar graphs can be represented in _____________
102
The state government needs to finalize a five years plan to implement 100% literacy in the
state. Which one of the following will be the best tool that should be used to work out the
plan ?
103 The tables that allows the user to change or rearrange the data, summarize the data and
evaluate the data using changing points of view is known as
104
The teacher has a spreadsheet showing all Year 10 students and their marks in one
Mathematics test. To find the student with the highest mark, which of the following
functions should be used?
105
The wizard that is used to create and edit charts _______________
106
The wizard that is used to import text files is_________________
107 The wizard that is used to suggest hints for doing a task
108
The wizard that used to build an interactive table from data existing on sheets
109 There are _________ types of data tables
110 To arrange rows in alphabetical order based on column A, you need to use the command
_____.
111
To import data from Access to Excel ,it is not possible to link between Access and Excel sheet
112
To print just part of a sheet, you would select what you want to print and _____ .
113
To select a column the easiest method is to …
114 To select several cells or ranges that are not touching each other, you would _____ while
selecting.
115 We use Hash Total to identify ------------ within a series where there is a definite relation
between items
116 We use Hash Total to identify ------------ within a series where there is a definite relation
between items
117 What can you NOT do with a spreadsheet?
118
What will be stored in a cell if 3/4 is entered in it?
119 What would be the best method to quickly copy the formula from the active cell to each cell
below it?
120 Which chart type best shows proportions of a whole?
121 Which command enables you to change the margins for a printed worksheet?
122 Which following function is used in subtotal option ?______________
123 Which is not a valid cell address?
124
Which is not an advantage of using computerized spreadsheets?
125
Which of the following commands is needed to duplicate the contents of a cell in another?
126 Which of the following commands is needed to transfer the contents of one cell range to
another?
127
Which of the following commands will automatically adjust cell references in formulas?
128
Which of the following commands will remove cells, rows, or columns from a worksheet?
129 Which of the following do not belong to the formula category in excel
environment__________
130 Which of the following files could not be opened in excel _______________
131 Which of the following is a valid cell range?
132 Which of the following is considered an absolute cell reference?
133 Which of the following is NOT a valid mathematical operator in Excel?
134
140
Which of the following would you use to change the font size of a cell in Excel?
Which one of the following statements related to stacked bar chart is NOT TRUE ?
145
Which one of the following statements related to stock chart is NOT TRUE ?
146 Which one of the following will be the tool that provides a way to view and compare the
results of all the different variations together on the worksheet ?
147 Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?
148 Which two of the following statements related to pivot table are TRUE ?
149 Year end ledger, inventory files or transaction files can be tested for cut-off , to ensure that
the data has been provided is for the correct audit period
150 You are conducting research for a Income Tax assignment. The raw facts you collect are called
151
You created a worksheet on July 30 and entered the =Today() function in cell E17. You
opened that worksheet again on August 31. What will be displayed in cell E17 on August 31?
152
Your Institute teachers have set an assignment on ‘Studies’. You are required to use a
spreadsheet to record all that you study on each day for four weeks. You decide to show
each week’s data with an accompanying graph. What is the best way of doing this
Option 1 Option 2 Option 3
HLOOKUP VLOOKUP A or B
RAND() VLOOKUP() HLOOKUP()
By either clicking in a
different cell or using the
By using the arrow keys to arrow keys to move to a
By clicking in a different cell move to a different cell different cell
It is surrounded by a heavy It is displayed in reverse
border. It is blinking. video.
and or
1 FALSE
1 FALSE
1 FALSE
select Print selection on
Page Setup | Sheet and
click the Print button press the PRINT SCREEN key then print
drag from the top cell in the
double-click any cell in the column to the last cell in
column the column click the column heading
hold down the CTRL key hold down the SHIFT key hold down the ALT key
Once a bar chart is chosen it Once a column chart is Once a pie chart has been
cannot be changed to a chosen it cannot be chosen it cannot be
column chart. changed to a bar chart. changed to line chart.
Cell references Functions Numeric constants
Orientation (portrait or
landscape) Headers and footers Fonts
the Fill Handle the Format Painter the Formatting toolbar
excel97 internet explorer Netscape
Select the Insert Hyperlink Click the Insert Hyperlink Right-click a cell and click
command from the File button on the Standard the Edit Hyperlink
menu. toolbar. command.
E12 6 SUM(H9:H11)
It is a tool for summarizing It is a tool that provides a It summarizes the data by
and analyzing the data way to view and compare using analytical functions.
records in an interactive the results of all the
manner. different variations together
on the worksheet
True False
data. documents. information.
sub chart D
data marker D
none of the above A
data marker C
? D
none of the above A
constant A
6,8,10 D
#DIV/0! C
#DIV/0! B
None of above C
either b or c C
text with either a two-digit
or four-digit year,
depending on the format. C
INSERT A
Both B & C B
Both B & C B
data marker B
data marker A
source range. D
source range. B
reference values D
A
Reasonableness D
Properties B
none of the above A
All of the above C
A blinking border A
C
B
None of the above A
Document filing A
A
loop testing A
B
B
none of the above C
function wizard B
B1:G10 D
surface chart C
surface chart D
surface chart B
pie chart C
surface chart A
A
Window A
the File Type command on
the File menu. C
none of the above A
formula. B
vertical A
Rows A
=(B2*(D4+C2) C
the F1 key. B
none of the above A
countif C
count A
A
spreadsheet D
adding the later date to the
earlier one. A
none A
Data table. C
pivot table D
SUM C
tip wizard B
function wizard A
tip wizard D
tip wizard A
4 B
Paste Special B
Scatter C
Edit B
A
None of the above C
Clear C
Remove B
Boolean D
class files D
D C
$B$4 D
\ D
Margins C
Conditional formatting B
word 2000 A
Double-click a cell and click
the Insert Hyperlink
command. B
B
It is also used for indicating
fluctuations in temperature
changes B
Data table. D
G7*SUM(H9:H11) B
A
A
text. A
It is impossible to
determine from the
information given. B
Use multiple sheets D
No Question
1 ____ effect is used to introduce a slide during a slide show
2 ______ determines the order in which order in which the slides will be displayed during the
show
3 ______ represents data in a pictorial format
4 _______ are drop-down menus that appear when the right mouse button is clicked on the
screen element
5 _______ are the individual pages of a presentation
6 _______ are used to represent our data in graphical format
7 _______ charts are useful while showing variations over a period of time
8 _______ is a motion picture or any animation file
9 _______ is the process through which the slides in the current presentation are included in
another presentation or application
10 _______ is used to organize and develop the contents of a presentation
11 ________ and ______ have the ability to add a lot of visual impact into the PowerPoint
presentation
12 ________ can be used to create charts as well as worksheets
13 _________ of the following is/are a type of chart
14 ______option from the insert menu option is chosen to add an embedded chart
15 A _____ is a special effect that determines how the objects appear on the slide
16 A _______ is used to jump to any slide in the presentation
17
A PIE Chart is a ____ diagram that depicts the relationship between a whole and its parts
18 A/An _______ consists of smaller printed version of the slides
19
An example of the components of a multimedia presentation could include
20 Build effect is also called as ______
21 Charts can be produced without the wizard
22 Charts can convert numerical data in a easily understandable format
23 Click _______ on the rectangle drawing tools enables us to draw multiple rectangles
24 Click on the box tool ______ to draw three boxes
25
26
Developers can easily add ____ to PowerPoint 2000 by using the programming interface
27 Each individual piece of data in a series is called a/an
28 Embedded charts exist separately
29 Graphics for web pages are automatically stored in ____ format
30 How do you deselect a chart that has been placed onto a PowerPoint slide after you have
finished creating the chart?
31 If we save the presentation file as a metafile, it can be opened using
32
If you are editing a slide containing a Microsoft Graph, how do you display the underlying
datasheet?
47 The _______ is an invisible matrix of vertical and horizontal lines that covers the entire slide
workspace
48 The chart which cannot exists as a separate entity are _______________
49 The custom drawing tools are _______ by default
50 The default orientation for notes ,handouts and outlines is ____ orientation
51 The format of the text entered in a title, subtitle, or bulleted-list object is determined by the
format settings in a special slide called --------
52 The hidden slide is
53
54
The macro will be activated
55 The notes page is formatted based on the
56 The options available in the common task toolbar does not include
57 The power presentation has a _____ for a set of compatible colors
58 The set three colors used for graphs and for secondary slide items is called as
59 The size of the object can be changed using the ______ tool
60 The user can use ______ to remove the undesirable part of the image
61 There are ____ default fields available in all boxes of the organizational chart
62 There are ______ types of charts available in PowerPoint
63
64
What happens if you double click a chart that is not currently active?
65
What happens if you single click a chart that is not currently active?
66
What happens when you click the Datasheet button on the Microsoft Graph toolbar?
67
What happens when you double click a blank graph placeholder in a PowerPoint
presentation?
68 What type of program allows an object within an image to be edited without affecting other
objects?
69 When a file is saved with _____ extension, the graphics and text are also saved along with the
slide
70 When a new presentation is opened ,powerpoint creates slides that have a width of _____
and a height of ______ with the landscape orientation
71
When the user double-clicks on an organization chart object in PowerPoint
72 Which keyboard key is used to select more than one picture on a slide?
73
Which of the following actions will enable you to insert a graph into a PowerPoint
presentation?
74
Which of the following animation effects can be added to a slide?
75
Which of the following animations effects can be added to a slide?
76
Which of the following best describes the information that appears on the advanced timeline?
78
Which of the following formatting elements can be applied to a PowerPoint diagram using the
AutoFormat tool?
79 Which of the following formatting elements can be applied to a PowerPoint diagram using the
Format AutoShape command?
80
Which of the following objects can contain custom animation effects?
81
82
83
With reference to autocontent wizard for creating a new presentation, which of the following
statements are not true
84
With reference to changing the order of slides, which of the following statement is not true
85 With reference to chart, which of the following statements are not true
Option 1 Option 2 Option 3
DTS(digital track sound) 3D(3 dimension) both a and b
clip gallery & word art slide show & view show fonts & images
Microsoft excel auto shapes clip art
pie bar both 1 and 2
create fields add chart chart
build transition slide show
hyperlink hypertext action button
Single click the chart. Double click the chart. Click outside the chart.
internet explorer paint shop pro paint shop pro
portrait landscape a or b
the master slide the slide master the header slide
not displayed during the displayed only during the displayed only in outline
slide show slide show view
taken from the first column
or row of data in the
always taken from the first always taken from the first datasheet, depending on
row of data in the column of data in the whether the data series are
datasheet. datasheet. in rows or columns.
while creating a .exe file during slide transition when the slide show is run
notes master slide master master slide
slide layout customize new slide
color palette color box color scheme
ascent tricolor scheme color palette
zoom reduce/enlarge preview
clipping tool cropping tool cutting tool
two four five
10 28 18
a slide one bullet item at a bullet items one letter at a bullet items one word at a
time. time. time.
The chart is selected. The chart is deleted. The chart is doubled in size.
The chart is selected. The chart is deleted. The chart is doubled in size.
PowerPoint creates a
sample presentation to contains sample
which user can add words it is the quickest way to presentations for a variety
and pictures create a presentation of topics
in notes pages view, drag
in outline view, drag the in slide sorter view, drag the slide icon to a new
slide icon to a new location the slide to a new location location
data to be graphed resides by default, doughnut chart data is plotted in a chart
in a datasheet window is displayed based on the window
data in the datasheet
Option 4 ans
transition D
moving B
outline pane D
track changes A
twelve C
Line chart B
standard drawing tools C
all the above B
all the above B
guide C
sub chart B
available in the tool bar B
Animation program A
.doc(document) B
18 _______ software are programs that are complex and can be developed or purchased
19 _______ software enables users to send and receive data to/from remote computers
20 _______ translates assembly language program into machine language instructions
21 __________ is designed telephone system
22 _________capability supports concurrent users doing different tasks
23 ________option is selected from the view menu to create macros with conditions
24 _______is used to create a mailing label
25 “Zipping” a file means
26 A _____ is a running instance of an application
27
A 32-bit processor has
28 A 4GL is
29 A byte corresponds to
30 A client-server system is based on
31
A compiler is
32 A daisy wheel is a type of...?
33 A device to device hardware communication link is called
34 A device used in data communications to divide a transmission signal into several sub-bands is
known as a
35 A digitising tablet can be used for?
36
A gigabyte represents
37 A good example of AIS is the one that is used by distribution firms engaged in distributing products
or services to their customers
38 A good way to exchange information that changes rapidly is through
39 A GUI is
40 A Kb corresponds to
41 A laser printer does NOT use?
42 A mathematical procedure that can be explicitly coded in a set of computer language instructions
that manipulate data.
43 A nanosecond is
44 A new user initiates a new process of execution at the background,while the user can continue his
query process as usual in the foreground. This situation is referred to as __
45 A Nibble corresponds to
46
A parity bit is
47 A procedural control used to minimize the possibility of data or program file destruction through
operator error is the use of
48 A series of instructions telling the computer how to process data or files is defined as a
49 A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The
following is an information not found in the trailer label
50
A UPS
57
Application software are programs that are written
82 Having a single CPU alternatively process tasks entered from multiple terminals is called
83 Header label normally include all the following except the
84
How did the computer mouse get its name?
85 How many bits of information can each memory cell in a computer chip hold?
86 How many bytes do 4 Kilobytes represent?
87 Hyperlinks are used to jump to any kind of information or data from a file
88 If any change made on the object from the client side is reflected on the server then the object is
said to be _____
89 In AIS, the information stores in a database is called --------------------- subsystems
93
In what areas is the COBOL programming language used?
94 Inefficient usage of excess computer equipment can be controlled by
95 Information is stored and transmitted inside a computer in
96 Information on a hard disk is usually backed-up using a...?
97 It is necessary to manipulate data to transform it into ----------------
98
It is unlikely that a magnetic tape containing several thousand blocked records can be used on two
machines of different architecture directly because
99 Laptop computers use
100 Magnetic tape is a...?
101
102
Multiprocessing is
103
Multiprogramming is a prerequisite for
104
Multiprogramming refers to
105
Multitasking refers to
116
Software can be divided into two areas:
117 Splitting of CPU's time for different tasks _______ prevents time slicing
118
Systems software can be categorised into:
119 TCP/IP stands for _________ .
120 The _______ file maintains data that describes the supplier past transaction with the firm in terms
of material quality in AIS
121
The advantage of a PC network is that
122 The amount of data that a disk may contain is known as the disk's...?
123
The best security control in a microcomputer environment is to
124 The capacity of a 3.5” floppy is around
125 The computer operating system performs scheduling, resource allocation, and data retrieval
functions based on a set of instructions provided by the:
126 The computer which can receive data from other computers on the network and print it is
_______
127 The contents of these chips are lost when the computer is switched off?
128
The greatest control exposure in a microcomputer environment is the lack of
129
The instruction register stores
130 The macro is selected from the action field of a macro sheet
131
The main problem associated with uninstalling software is that
132
The memory address register is used to store
133
The memory data register is used to store
134
The original ASCII codes
135 The part of the computer system controlling data manipulation is called the
136 The place in the CPU where the data and programs are temporarily stored during processing is
called the
137
The primary function of a front-end processor is to
138 The process of data being automatically written to a duplicate database is called______
139 The technology which is used to check answer sheets of multiple-choice questions in civil services
or similar examinations is: -
140 The term A:\ refers to
141 The topology of a network can be each of the following except
142 Third generation languages such as COBOL, C, and FORTRAN are referred to as
143 Timesharing is the same as
144 To be effective a virus checker should be
145
To ensure that data is not lost if a computer system fails, the user should
146
To find where a file has been saved on disk, the user should
147
To help keep sensitive computer-based information confidential, the user should
148 Travel agents use this computer system when reserving flights
149
UNIVAC Computer belongs to the
150
UPS stands for
151 Vacuum tube based electronic computers are...?
152 Virtual memory is
153 What are responsible for storing permanent data and instructions?
154 What are small high speed memory units used for storing temporary results?
155 What are the individual dots which make up a picture on the monitor screen Called
156
What are the stages in the compilation process?
157
What are User Guides are used for?
158
What are utilities?
159 What are you most likely to use when playing a computer game?
160
What areas need to be considered in the SOFTWARE design process?
161
What control would prevent the accidental erasure of customer information from a magnetic tape
162
What do the abbreviations VAB stand for
163 What do you need for an ink jet printer?
164
What documents are produced during the development of a system?
What is a compiler?
173
What is Direct Implementation?
174
What is parallel running?
175
176 What is the 8-bit binary value of the decimal number 85?
177 What is the binary sum of 01011 and 00101?
178 What is the decimal value of the binary number 1111?
179 What is the decimal value of the hexadecimal number FF?
180
an instruction that has been an instruction that has been an instruction that has been
decoded fetched from memory executed
1 FALSE
The design of the screen the System Analysis defines the System Analysis involves
user will see and use to format and type of data the creating a formal model of
enter or display data program will use the problem to be solved
10101010 1100101 1010101
10000 1112 1110
15 4 64
30 255 256
A sequential file on a disk A sequential file on a tape A direct access file on a disk
a cursor a scroll bar a light pen
Replacement personal
computers for user Identification of critical Physical security of
departments. applications. warehouse facilities.
Star Bus Ring
input/output symbol B
coder B
process D
IBM-PC B
interpreter B
communication D
processor C
Intranet A
none of the above D
none of the above A
none of the above A
transmitting it C
process D
a 32-bit bus or 32-bit
registers D
none of the previous. D
32 bits B
Unix operating system B
e-mail D
an operating system C
210 bytes A
None of above C
Data B
10-9 sec D
none of the above B
32 bits A
Video D
None of above C
a modem interface B
To Store data in an
organised manner B
Shareware A
input, output, performance
ratios C
MAD B
None of the above C
VLSI B
(a) to (d) D
data design A
Validation B
none of the previous C
None of above B
None of above B
4 D
Suspense file C
none of the above C
None of above B
Distributed policies or
procedures A
None of above C
None of above B
Limited access files C
None of above C
A cassette A
None of above C
None of the above C
None of above B
None of the above D
input A
None of the above C
None of the above B
None of the above B
None of above B
None of above A
a message pad B
None of above A
None of above C
Printer A
Printer B
Data Dictionary B
Control Bus A
Control Bus D
Input output channel A
None of above B
None of above B
None of above A
None of above C
None of above C
resolution procedures C
system walkthroughs B
Hash Count A
Ring A
Computer operations. C
Acoustic coupler C
(a), (c), (d) A
Parity check C
None of the above A
Pull the power cord from
the back of the computer. C
EBCDIC A
AGP Card B
Telephone Lines C
Cross-training of operating
personnel. B
All of the above D
Parity Checker B
NetBEUI A
Serial interface A
Drum B
Spreadsheet D
None of above A
Thermal Printer A
None of above A
None of above C
All of them B
Put your hand up and ask
the teacher C
None of above B