Sunteți pe pagina 1din 451

q_id AC1 AC2 AC3 AC4 AC5 AC6 AC7 AC8 AC9 AC1 0 AC1 1 AC1 2 AC1 3 AC1

4 AC1 5 AC1 6 AC1 7 AC1 8 AC1 9 AC2 0 AC2 1

AC2 2 AC2 3 AC2 4 AC2 5 AC2 6 AC2 7 AC2 8 AC2 9 AC3 0 AC3 1 AC3 2 AC3 3 AC3 4 AC3 5 AC3 6 AC3 7 AC3 8 AC3 9 AC4 0 AC4 1 AC4 2 AC4 3

AC4 4 AC4 5 AC4 6 AC4 7 AC4 8 AC4 9 AC5 0 AC5 1 AC5 2 AC5 3 AC5 4 AC5 5 AC5 6 AC5 7 AC5 8 AC5 9 AC6 0 AC6 1 AC6 2 AC6 3 AC6 4 AC6 5

AC6 6 AC6 7 AC6 8 AC6 9 AC7 0 AC7 1 AC7 2 AC7 3 AC7 4 AC7 5 AC7 6 AC7 7 AC7 8

q_desc The ------ key can be used to select an existing company from list of companies. Import and Export of data between Tally and other programs is possible only through ---------Program. The re-order point is the inventory quantity that trigger a stock replishment activity. 0 A/An ------------- is the official notice that the firm sends to its customers to advise then to the amount of money that is owed. In tally,all masters have ________main options In tally,to create a new column in balance sheet press _______ In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger accounts into one line statements In tally, we can alter ledger details using either single or multiple modes but not alble to delete a ledger from multiple modes. In tally,a group company is marked with an ______________ The systems that work together to order,receive, and pay for replenishment of stock are -------------Tally allows to delete a ledger from --------- alteration mode. --------------------- is/are useful for management in the decision making. In tally,the group company must contain at least _____________ members To cancel a vourcher entry in Tally, short-cut key is ----------The accounting masters and inventory masters related to We press ------------- function key to display the age-wise analysis of Bills Receivable or Bills Payable report In Tally, we press ------------, to print report . In Tally, Types of Accounts and Types of Vouchers passed during the period, can be seen in ------------ report. In the Tally Software, the ------------ directory stores all data entered by the user. The Ledger Accounts are unique in Financial Accounting Packages

Customers can be permitted to enter their own data into the firms computer using the firms wide area network is an example of In Tally, we can customize the Vouchers as per our requirements The number of steps in Accounts Compilation are Each action/transaction of a firm is described by a ----------------. Tally is based on mercantile accounting system Ctrl + N is used to ----------------------- in Tally classify the accounts under different heads so that summarised information is possible. Revenue Account also known as -------------- Account Method of Voucher Numbering is/are Accounts Receivable are displayed in To assemble a product from different items -------------- entry is used A --------- purchase orders data flow is directed to the purchasing system for use in closing out the outstanding purchase orders in the receiving system diagram. Tally provides at least --------- predefined voucher formats The value of the inventory is included in a ledger accounts as an asset on the balance sheet " The buyers can follow up with the suppliers to determine the reasons " is an example of ---------------From voucher entry mode , if we press __________ then we get payment voucher in tally Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged accounts member companies of the group. A ----------- is a primary document for recording all financial transactions. The field can have a value between ________________ in FA Package. The _______ file maintains data that describes the supplier past transaction with the firm in terms of material quality in AIS It is necessary to manipulate data to transform it into ----------------

In tally, to change the date of the voucher press ______ Tally can maintain budgets on ---------------The value of the inventory is included as an asset on the balance sheet In ratio analysis report of Tally FA packagewe we press ________________ function key to the display of bills receivable , bills payables report The accounts payable system is responsible for paying the suppliers for the ----------------What is the default financial year in Tally6.3 _________________ Tally encrypts and stores TALLY DATA at the data directory The Profit & Loss statement can be displayed in ---------------- format(s). Default ledger accounts in tally are ______ Default 'godown' name in tally is ____________ 'Tally vault' is a _________________ To create a sales voucher in tally , you have to press _______ A Group Company is ------------------------- given to the merged accounts of member companies of the group. In tally,"credit note" voucher type records entry for ________________ In tally you get currency symbol option from _______ menu ------------------ gives the balance for each day for the voucher type has been selected. For 'stock journal' entry we press ______________ in tally Tally provides the capability to the administrator/auditor to track changes in the areas is/are In tally, types of users are _______________ By pressing -------- key, a list of inventory reports can be displayed straightaway from the balace sheet report Projected approximation of income or expenses is called ______________ . "Administrator" type user is also called 'Auditor' of a company in Tally

You will get company information , if you press __________ from gateway of tally A constituent(member) company can be a member of more than one group. Default stock category in tally is ______ To create a log of the import activity in a file _____________ is located in the same directory as an executable program in tally In Tally,inventory valuation method option is available from _______ Tally audit feature is available in a company __________________ In tally, a group company can also be a constituent(member) of another group company Default number of groups in tally are ________ During voucher entry ------------- are used. User designated as --------------- can view audit list. Tally supports Importing of data from ---------------In an accounting information system, which of the following types of computer files most likely would be a master file? Which of the following is an advantage of a computer-based system for transaction processing over a manual system? A computer-based system:

op1 F1 Tally ODBC TRUE F3 Invoice Two Ctrl+C TRUE TRUE * ALT+F1 Tally IMP false ALT+F3 Bill Three Alt+C FALSE FALSE $

op2

op3 CTRL+F1 Tally INI

op4 None of the above None of the above

CTRL+F3 A or B Four Alt+Ctrl+C

None of the above None of the above Five None of the above

&

^ Puchasing, Receiving and Accounts payable Mone of the above All of the above One Ctrl+D All of the above F7 None of the above Journal Book None of the above

Puchasing and Accounts Accounts payable payable Puchasing and Receiving and Receiving Single Cash Flow Statements Two Alt+D Create Information F4 Alt+P Tally Audit Bin True Multiple Fund Flow Statements Three Alt+X Alter Information F5 Ctrl+P Statistics Data False A or B Ratio Analysis Four Ctrl+T Display Information F6 Shift+P Day Book Sub

Enterprise Data Interchange TRUE 2 data element FALSE Display stock valuation method Ledgers Personal Manual Balance Sheet Journal Filled 11 FALSE

Enterprise Data Information FALSE 3 data record TRUE Open Calculator Groups Nominal Automatic Profit & Loss Stock Journal Receipt 16 TRUE

Electronic Data Interchange.

All of the above

4 Field

5 All of the above

Change Period Journals Real None Journal Book Physical Stock Transfer Issue 18

None of the above None of the above None of the above All of the above All of the above Reversing Journal None of the above 21

management by management by objective exception F4 Main Location True Ledgers 0 to 9 Supplier Report F5 Primary False Reports 1 to 100 Suspense Output

electronic data analysis F6 Primary Cost Category

All of the above Alt+f5 All of the above

Vouchers 10 to 60 Order Information

None of the above None All of the above None of the above

F2 Net Transactions True F6 function key Sales 1-4-1995 to 31-3-1996 True

F4 Closing Balance False Alt + f6 function key Purchases 1-4-1996 to 31-3-1997 False

Ctrl+f2 A and B

Ctrl+f4 None of the above

F7 function key A or B 1-4-1997 to 31-31998

None of the above None of the above None of the above

Horizontal Balance sheet & profit & Vertical loss profit & loss and trial Profit & loss and trial balance balance Primary Security mechanism F5 a name Sales return Company creation Trial Balance F7 Changes in transactions or vouchers 2 F9 Balance sheet TRUE Main location Ledger a/c F7 an identity Purchase return Stock items units Daybook Alt + F7 Changes in Ledger Masters 3 F10 Profit & loss a/c FALSE

A or B

None of the above

Cash and profit & Cash and bank loss A or b Cost category F8 A and B a or b Regional setting Balance Sheet F10 Both A and B 4 F11 Budget None of the above None of the above F9 None of the above None of the above None of the above None of the above F11 None of the above 1 F12 None

F3 TRUE Main location Tally.imp Stock summary

Ctrl+F3 FALSE Primary Tally.ini Stock journal

Alt+F3

None of the above

Symbol A or b

None of them None None of the above None

Stock analysis In 'comp info -> By pressing F11 function During the creation of a security control' key option company TRUE 128 Ledger Accounts Administratorto another One company company created withon Tally Package Inventory subsidiary. Does not require as stringent a set of internal controls. FALSE 228 Groups Ownerprograms - a Other spreadsheet or a database file. Cash disbursements. Will produce a more accurate set of financial statements. 28 Sub-Groups Data Entry Both A and B Cash receipts. Will be more efficient at producing

16 B or C TallyVault None of the above Payroll transactions. to Eliminates the need reconcile control accounts and subsidiary ledgers.

ans A A A B C B B A A A D A D A B D C A B B A

C A C B B B B B B A B A B B B B C A C A A C

A C A A B B A C C B A D C A A B B C B A C A

C A B A A B A C A A C A C

Q_id

Q_desc

BC1 The memory address register is used to store BC2 Inefficient usage of excess computer equipment can be controlled by BC3 Which of the following is not the component of a CPU A trailer label is used on a magnetic tape file, it is the last record and BC4 summarises the file. The following is an information not found in the trailer label BC5 Hard copy is a term used to describe...? BC6 What do the abbreviations VAB stand for What control would prevent the accidental erasure of customer information BC7 from a magnetic tape What are the individual dots which make up a picture on the monitor screen BC8 called? BC9 BC1 0 BC1 1 BC1 2 BC1 3 BC1 4 BC1 5 BC1 6 BC1 7 BC1 8 BC1 9 BC2 0 BC2 1 BC2 2 BC2 3 BC2 4 BC2 5 Header label normally include all the following except the A daisy wheel is a type of...? Which approach or technique is a control usually associated with microcomputers An impact printer creates characters by using...? The best security control in a microcomputer environment is to What would you NOT use with a flatbed plotter? What do you need for an ink jet printer? The greatest control exposure in a microcomputer environment is the lack of What do you need for an ink jet printer? A laser printer does NOT use? The amount of data that a disk may contain is known as the disks...? You can ________ protect a floppy disk. Information on a hard disk is usually backed-up using a...? Magnetic tape is a...? Hard disks can have a storage capacity in the region of...? Which storage device has the largest capacity in Mb? Which storage device cannot be erased?

BC2 6 BC2 7 BC2 8 BC2 9 BC3 0 BC3 1 BC3 2 BC3 3 BC3 4 BC3 5 BC3 6 BC3 7 BC3 8 BC3 9 BC4 0 BC4 1 BC4 2 BC4 3 BC4 4 BC4 5 BC4 6 BC4 7 BC4 8 BC4 9 BC5 0 BC5 1

You can ________ protect a floppy disk Where should floppy disks be stored? The contents of these chips are lost when the computer is switched off? What are responsible for storing permanent data and instructions? Which parts of the computer perform arithmetic calculations? What are small high speed memory units used for storing temporary results? How many bits of information can each memory cell in a computer chip hold? What type of computer chips are said to be volatile? Magnetic tape is a...? Software can be divided into two areas: Travel agents use this computer system when reserving flights Which computers are used in the weather forecasting industry? Vacuum tube based electronic computers are...? Which generation of computer was developed from microchips? Which generation of computer uses more than one microprocessor? Which generation of computer developed using integrated circuits? Which generation of computer developed using solid state components? Name three steps involved in developing an information system How do you define analysis of an information system? What areas need to be considered in the SOFTWARE design process? What is the function of systems software? Formatting a disk results in all the data being...? What is Direct Implementation? What is parallel running? What documents are produced during the development of a system? What are User Guides are used for?

BC5 2 BC5 3 BC5 4 BC5 5 BC5 6 BC5 7 BC5 8 BC5 9 BC6 0 BC6 1 BC6 2 BC6 3 BC6 4 BC6 5 BC6 6 BC6 7 BC6 8 BC6 9 BC7 0 BC7 1 BC7 2 BC7 3 BC7 4 BC7 5 BC7 6 BC7 7

Systems software can be categorised into: Which storage device cannot be erased? Application software are programs that are written Which bus carries information between processors and peripherals? Convert the decimal number 2989 to Hexadecimal Which bus controls the sequencing of read/write operations? What are utilities? Numbers are stored and transmitted inside a computer in The original ASCII codes A Nibble corresponds to A gigabyte represents A 32-bit processor has A parity bit is he contents of these chips are lost when the computer is switched off? Clock speed is measured in Cache memory enhances CISC machines Which parts of the computer perform arithmetic calculations? Every data from the primary memory will be erased if An RS-232 interface is For print quality you would expect best results from ROM A UPS smart card Laptop computers use Multiprogramming refers to

BC7 8 BC7 9 BC8 0 BC8 1 BC8 2 BC8 3 BC8 4 BC8 5 BC8 6 BC8 7 BC8 8 BC8 9 BC9 0 BC9 1 BC9 2 BC9 3 BC9 4 BC9 5 BC9 6 BC9 7 BC9 8 BC9 9 BC1 00 BC1 01 BC1 02 BC1 03

Multitasking refers to What are small high speed memory units used for storing temporary results? A good way to exchange information that changes rapidly is through Multiprogramming is a prerequisite for Timesharing is the same as Virtual memory is Multiprocessing is To help keep sensitive computer-based information confidential, the user should What is the function of a disk drive? A 4GL is A nanosecond is What small, hand-held device is used to move the cursor to a specific location on the screen? The memory address register is used to store The memory data register is used to store The instruction register stores Which of the following is used to indicate the location on the computer monitor? A mathematical procedure that can be explicitly coded in a set of computer language instructions that manipulate data. Which of the following translates a program written in high-level language into machine language for execution? Detecting errors in real memory is a function of To find where a file has been saved on disk, the user should A series of instructions telling the computer how to process data or files is defined as a To ensure that data is not lost if a computer system fails, the user should Having a single CPU alternatively process tasks entered from multiple terminals is called The place in the CPU where the data and programs are temporarily stored during processing is called the All are examples of computer software except Computer manufactures are now installing software programs permanently inside the computer. It is known as

BC1 04 BC1 05 BC1 06 BC1 07 BC1 08 BC1 09 BC1 10 BC1 11 BC1 12 BC1 13 BC1 14 BC1 15 BC1 16 BC1 17 BC1 18 BC1 19 BC1 20 BC1 21 BC1 22 BC1 23 BC1 24 BC1 25 BC1 26 BC1 27 BC1 28 BC1 29

Which of the following file organisation forms most efficiently allows access to a record The part of the computer system controlling data manipulation is called the For direct access storage devices the recording area is divided into The data hierarchy from the largest to the smallest is Which of the following hardware or software system controls provides a detailed record of all activities performed by a computer system Which one of the following parts of a computer is necessary to enable it to play music? An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15 minutes of sound and 1 minute of video. Which of the four Which one of the following printers is suitable for printing sprocket fed carbon copies? Multimedia software can be most productively used for To be effective a virus checker should be Which one of the following software applications would be the MOST appropriate for performing numerical and statistical calculations? Passwords enable users to 12. How many bytes do 4 Kilobytes represent? Back up of the data files will help to prevent Which one of the following is the MOST common internet protocol? The advantage of a PC network is that The term A:\ refers to UPS stands for The main problem associated with uninstalling software is that You are conducting research for a Income Tax assignment. The raw facts you collect are called A flow chart is the A voucher entry in Tally is done for Passwords are applied to files in order to Each of the following is an enabler of IT-business alignment except: The basic systems model is used to describe virtually all information systems and it consists of the following elements: What is a computer-aided design system?

BC1 30 BC1 31 BC1 32 BC1 33 BC1 34 BC1 35 BC1 36 BC1 37 BC1 38 BC1 39 BC1 40 BC1 41 BC1 42 BC1 43 BC1 44 BC1 45 BC1 46 BC1 47 BC1 48 BC1 49 BC1 50 BC1 51 BC1 52 BC1 53 BC1 54 BC1 55

A(n) __________ offers a solution package for an entire industry. File extensions are used in order to Information systems controls include all of the following EXCEPT: Hashing for disk files is called Components of expert systems include: a) inference engine; b) user interface; c) knowledge base; d) fuzzy logic Black box testing and white box testing are part of: What is the term used to describe the point of interaction between a computer and any other entity, such as a printer or human operator? The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility Which of the following is an acceptable way to shut down the computer? Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot remember where you saved them. Which is the best way to Components of an information system model are: a) applications architecture; b) functional architecture; c) technology architecture; d) information architecture Benchmarks form part of: Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run totals Which is not part of help desk documentation: Testing of individual modules is known as: Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface architecture; d) presentation architecture Which is part of installation testing: The computer operating system performs scheduling, resource allocation, and data retrieval functions based on a set of instructions provided by the: Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio Which of the following procedures should be included in the disaster recovery plan for an Information Technology department? Designing relationships among components is part of: Several Computers connected together is called: Which network topology uses a Hub? Which of the following topologies is used for Ethernet? Application software are programs Which type of file search method requires a computer first read all locations preceding the desired one

BC1 56 BC1 57 BC1 58 BC1 59 BC1 60 BC1 61 BC1 62 BC1 63 BC1 64 BC1 65 BC1 66 BC1 67 BC1 68 BC1 69 BC1 70 BC1 71 BC1 72 BC1 73 BC1 74 BC1 75 BC1 76 BC1 77 BC1 78 BC1 79 BC1 80 BC1 81

Which of the following areas of responsibility are normally assigned to a systems programmer in a computer system environment? Which of the following is recommended when many searches for data are required It is unlikely that a magnetic tape containing several thousand blocked records can be used on two machines of different architecture directly because Which component of the CPU has the most influence on its cost versus performance Which of the following terms applies to network used to connect computers with other computers, peripherals and workstations that are in fairly close Intelligent terminals differ from dumb terminals in that they A computer is to be linked to 8 terminals using a single communication link. To permit simultaneous terminal operations, communication path will require which A modem is a device that A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives and printers. This type of network is called a A computer based system for sending, forwarding, receiving and storing messages is called an If a workstation contains a processor, monitor, screen manipulation device, printer, storage and communication capabilities, it is said to be Terminal hardware controls include RS-232 is a What is a compiler? What are the stages in the compilation process? Which of the following is not a data transmission coding scheme What is the definition of an interpreter? A device used in data communications to divide a transmission signal into several sub-bands is known as a Third generation languages such as COBOL, C, and FORTRAN are referred to as Serial Communication is used over long distance because it In what areas is the COBOL programming language used? The primary function of a front-end processor is to What is the first stage in program development? Which of the following is not used for data transmission within a local area network What is System Analysis? A device to device hardware communication link is called

BC1 82 BC1 83 BC1 84 BC1 85 BC1 86 BC1 87 BC1 88 BC1 89 BC1 90 BC1 91 BC1 92 BC1 93 BC1 94 BC1 95 BC1 96 BC1 97 BC1 98 BC1 99 BC2 00 BC2 01 BC2 02 BC2 03 BC2 04 BC2 05 BC2 06 BC2 07

What will a good software provider consider? The topology of a network can be each of the following except What is the 8-bit binary value of the decimal number 85? Which is the most common data transmission error checking method What is the decimal value of the binary number 1111? Which of the following devices merges communication signals onto a single line What is the decimal value of the octal number 215? Which tool is used to help an organization build and use business intelligence? Cache memory enhances What is the decimal value of the hexadecimal number FF? Numbers are stored and transmitted inside a computer in What is the hexadecimal value of the decimal number 1476? A byte corresponds to What does EBCDIC coding of numbers mean? A Kb corresponds to What is the binary sum of 01011 and 00101? Information is stored and transmitted inside a computer in Where would you find the letters QWERTY? A parity bit is How did the computer mouse get its name? Clock speed is measured in What are you most likely to use when playing a computer game? CPU performance may be measured in A digitising tablet can be used for? In processing cheques which of the following I/O techniques have banks traditionally used Which of the following is a pointing device used for computer input?

BC2 08 BC2 09 BC2 10 BC2 11 BC2 12 BC2 13 BC2 14 BC2 15 BC2 16 BC2 17 BC2 18 BC2 19 BC2 20 BC2 21 BC2 22 BC2 23 BC2 24 BC2 25 BC2 26 BC2 27 BC2 28 BC2 29 BC2 30 BC2 31 BC2 32 BC2 33

A UPS What does a light pen contain? The capacity of a 3.5 floppy is around What general term describes the physical equipment of a computer system, such as its video screen, keyboard, and storage devices? Where would you find the letters QUERTY? What are you most likely to use when playing a computer game? A digitising tablet can be used for? Which of the following is a pointing device used for computer input? What input device could tell you the price of a product Where would you find a magnetic strip? Hard copy is a term used to describe...? What are the individual dots which make up a picture on the monitor screen Called A daisy wheel is a type of...? What input device can be used for marking a multiple-choice test? Laptop computers use QWERTY is used with reference to What input device could tell you the price of a bar of chocolate? A GUI is Where would you find a magnetic strip? Multiprogramming refers to Multitasking refers to Multiprogramming is a prerequisite for UNIVAC Computer belongs to the Timesharing is the same as Name the first Indian Super Computer? Disk fragmentation

BC2 34 BC2 35 BC2 36 BC2 37 BC2 38 BC2 39 BC2 40 BC2 41 BC2 42 BC2 43 BC2 44 BC2 45 BC2 46 BC2 47 BC2 48 BC2 49 BC2 50 BC2 51 BC2 52 BC2 53 BC2 54 BC2 55 BC2 56 BC2 57 BC2 58 BC2 59

The technology which is used to check answer sheets of multiple-choice questions in civil services or similar examinations is: A compiler is Which printer among the following is fastest Zipping a file means What does acronym VIRUS stands for An impact printer creates characters by using...? A client-server system is based on A nanosecond is A procedural control used to minimize the possibility of data or program file destruction through operator error is the use of _______ software enables users to send and receive data to/from remote computers A _____ is a running instance of an application Splitting of CPU's time for different tasks _______ prevents time slicing ______ computers are used in large organizations for large scale jobs which have large storage capacities _______ is responsible for all calculations and logical operations that have to be performed on the data ______ printer use laser light ______ software enhances the user to enter ,store, manipulate and print any text ______ software enables users to send and receive data to/from remote computers _______ is the temporary storage place for deleted files _____ is a collection of related fields _____ language consists of strings of binary numbers ______ symbol is used to represent processes like assigning a value to a variable or adding a number _______ is an example for micro computer _________capability supports concurrent users doing different tasks The ______ do not have processing power of their own and has only a screen, keyboard and the necessary hardware to communicate with the host. For this A______is nothing but a PC with a network operating system _____system is responsible for handling the screen and user I/O processing

BC2 60 BC2 61 BC2 62 BC2 63 BC2 64 BC2 65 BC2 66 BC2 67 BC2 68 BC2 69 BC2 70 BC2 71 BC2 72 BC2 73 BC2 74 BC2 75 BC2 76 BC2 77 BC2 78 BC2 79 BC2 80 BC2 81 BC2 82 BC2 83 BC2 84 BC2 85

The______ handles data processing and disk access in a Client/Server architecture Both the DBMS and the application resides on the same component in a ____system When all the processing is done by the mainframe itself, the type of processing is sometimes called as DBMS models can be grouped under____ categories ______is the most advantageous database system A new user initiates a new process of execution at the background,while the user can continue his query process as usual in the foreground. This situation The process of data being automatically written to a duplicate database is called______ Modem stands for __________ . Multiple changes to the same record or a field are prevented by the DBMS through______ _________allows an application to multitask within itself LAN stands for __________ . New process of execution is referred to as______ ISDN stands for _______. _____________ is the Worlds largest computer network . _______is/are a popular front end tool When LAN connected together ,it is called __________ . TCP/IP stands for _________ . Data is broken into small unit called __________ . SMTP stands for __________ . The __________ protocol is a network protocol to be built for the World Wide Web . ATM stands for __________ . The computer which can receive data from other computers on the network and print it is _______ The hardware and the software requirements together form the_____ ATM, Asynchronous transfer mode is a __________ technology. __________ is designed telephone system Expansion of ISDN is ________

BC2 86 BC2 87 BC2 88 BC2 89 BC2 90 BC2 91 BC2 92 BC2 93 BC2 94 BC2 95 BC2 96 BC2 97 BC2 98 BC2 99 BC3 00 BC3 01

Expansion of WBT is ______________ _________ connects LANs. Collection of instruction is called a _____ Combination of alphabetic and numeric data is called _____ data Computers can be classified based on ______,______and _______ _________ are used in large organizations for large scale jobs _______ is responsible for feeding data into the computer _______ is the capability of the o/s to run numerous applications simultaneously _______ involves conversion of raw data into some meaningful information _______ is responsible for obtaining the processed data from the computer _______ printers use light to produce the dots needed to form pages of characters Hardware components in a computer are _____,____,_____,______ _______ software are programs that are complex and can be developed or purchased _______ is a set of special instructions used to communicate effectively with the computer _______ converts a high level language into machine language _______ translates assembly language program into machine language instructions

Op1 data to be transferred to memory Contingency Planning NIC Card Record Count Writing on a hard board Voice activated broadcasting Validity check Coloured spots File Name Printer System Logs Electrically charged ink Restrict physical access A pen A cartridge Separation of duties A cartridge A print head Volume Read Magnetic tape Serial access medium 1.44MB A CD-ROM A CD-ROM

Op2 data that has been transferred from memory System feasibility report VSAT Identification Number Printed output Voice answer back Boundary protection Pixels Identification number Storage device Physical Security An ink pen Use only unremovable media Paper A drum Centralised function for PC acquisition A drum A laser beam Size Write PAN drive Random access medium 20 GB A floppy disk A floppy disk

Op3 the address of a memory location Capacity Planning RAM Control totals for one or more fields Storing information on the hard disk Visual audio board File protection ring Pixies Reel Number Pointing device Console Log An inked ribbon and print head Require user passwords Eraser A ribbon Centralised function for PC Disposition A ribbon An INK RIBBON Storage capacity Read and Write Floppy disk A parallel access medium 700MB Magnetic tape storage Magnetic tape storage

Read By a sunny window ROM chips RAM chips ALU CPUs 0 bits RAM chips Serial access medium Network software and security software Supercomputer Notebook computers First generation Second generation Second generation Second generation Second generation Specification, Design, and Testing Analysis translates program code of a high level language Only hardware and software To collect data Deleted from the disk Users operate the manual system and computer system The new system is introduced alongside the Instructions and technical documentation For technical support

Write By magnet objects RAM chips ROM chips Registers Registers 1 bit ROM chips Random access medium Systems software and application software Personal computer Supercomputers Second generation First generation Third generation Third generation Third generation Programming, Design, and Testing Analysis is the loading of programs that perform routines to Inputs, outputs, file design hardware, and software To execute any programs

Read and Write In a drawer CDROM chips DRAM chips Logic bus Control unit 8 bits CACHE A parallel access medium Business software and games software Mainframe computer Jon Von Neumann computers Hoover generation Fourth generation Fifth generation Fifth generation Fifth generation Analysis, System Design, and Implementation This involves looking at a system and finding out how information is being Maintenance, reliability, and upgradeability To maintain security

Copied from the disk Saved to the disk Users operate the computer Users operate the manual system system from a given date The new system is introduced and users start operating it Users continue operating the old system User Guide and technical Log files and temporary files documentation User guides cover how to run the To enable any printer to be connected to the network system, enter data, save, print, etc.

Operating systems and system services Magnetic tape storage To maintain a backup copy of all the information Data bus FDDI

Network systems and communication services CD-ROM To do a particular task. Auto bus BAD

Database systems and backup services floppy disk To help someone who is applying for employment Address bus TED Address bus Data structures that are part of the kernel of an operating system. decimal form represented 256 characters 16 bits 230 bytes 32 Mb of RAM is the first bit in a byte DRAM bytes secondary storage capacity have medium clock speeds

Data bus Auto bus Peripherals that are connected Operating system routines that to a computer. execute in supervisor mode. binary form were 7 bits 4 bits More than 1000 mega bytes 32 registers used to indicate uppercase letters ROM bits per second memory capacity have fewer instructions than RISC machines ALU Power is switched off a parallel interface line printer ASCII code form 8 bits 8 bits 1000 kilobytes 32 I/O devices used to detect errors RAM baud memory access time use more RAM than RISC machines Registers

Variables Data is not saved before computer is Computer is improperly shut down shut down a serial interface dot matrix printer printer interface ink-jet printer stores more information than RAM provides backup power in the event of a power cut is an access card for a security system SSGA displays writing programs in multiple languages

is faster to access than RAM is non-volatile increased the storage capacity of a computer system increases the process speed has more storage capacity than is a form of ATM card an ATM card CRT displays having several programs in RAM at the same time LCD displays multitasking

having several softwares running at the same time ALU brochures multitasking multitasking related to virtual reality same as multitasking save the file to calculate numbers Uses Cobol 106 sec a keypad data to be transferred to memory data to be transferred to or from memory an instruction that has been decoded a cursor Formula Assembler Memory protection use the directory search tools Network save copies of the file with the same name on the system Multiprocessing ROM Firmware Firmware

the ability to run 2 or more programs concurrently Registers magazines an operating system multiprogramming a form of ROM same as multiprogramming set up a password to read from or write information to a floppy disk uses Java 103 sec a mouse data that has been transferred from memory data to be transferred to the stack an instruction that has been fetched from memory a scroll bar Algorithm Compiler Parity Checking search each file in turn Program use different filenames on the system Time sharing RAM Word Processor Word Processor

writing programs in multiple languages Variables CD-ROM to run more than one program at the same time multiuser a form of VRAM multiuser make a backup copy to print sheets of paper uses C++ 1012 sec a frog the address of a memory location the address of a memory location an instruction that has been executed a light pen Program Artificial Intelligence Range checking use the backup facility System keep a record of computer failures Multiprogramming Floppy Disk Telephone modem Telephone modem

Sequential Operating System Tracks and Sectors Character, field, database Valid character check Sound card. Text

Hashed ALU Blocks and Sectors Database, character, record Maintenance diagnostic program CD-ROM Pictures

Indexed CPU Files and Tracks File, record, field Systems logs MIDI interface Sound Ink-jet presenting an order for stock to a warehouse. updated regularly Graphics package retain confidentiality of files 4096 virus infection IPX/SPX printer can do 1000s of pages a day the root directory uninterruptable power supply the system requires a network administrator to uninstall it information. Logical Steps in any language It is mandatory in tally prevent unauthorised access IT understands the business processing. Software that generates innovated designs and artistic patterns.

Laser Dot matrix viewing an encyclopaedia CD- creating the plans for a building design. ROM. replaced regularly Database get into the system quickly 512 loss of confidentiality TCP/IP never updated Document processor make efficient use of time 1024 duplication of data HTML

access to the internet is quicker files can be shared a file name universal port serial orphan files can be left on the system data. Graphical representation of logic Purchase, sales, receipt, payments etc. assist in maintenance a subdirectory up-line provider service the program executable may not allow it to be uninstalled documents. Rules writte in procedural language To fill the log register

speed up access IT management lacks senior executive support for IT. leadership. input. output. The use of computers to Using computers to do design state-of-the-art, high- architecture.

specialist or functional name the file preventive controls. external hashing A: (a) , (b), (d) corrective controls Component (a), (c), (d) Press the reset button. Create the files again. (a), (c), (d) detective controls (a), (c), (d) problem logging unit testing (b), (c), (d) benchmark testing Multiplexer. (a) to (d) Replacement personal computers for user architectural design Client-server Star Star To maintain a backup copy of are written all the information Direct

Application Service Provider ensure the filename is not lost detective controls. static hashing B: (a) to (d) preventive controls Interface (b), (c), (d) Turn the computer off at the power point. Ask the person next to you. (a), (b), (c) organisational controls (a), (b), (c) call lights data testing (a), (b), (d) specifications matching Peripheral processors. (b), (c), (d) Identification of critical applications. interface design Client Bus Bus To do a particular job such as editing, storing information Sequential

enterprise identify the file corrective controls. dynamic hashing C: (a), (b), (c) detective controls Settings (a) to (d) Select the Shut Down option from a menu. Use the Find or Search feature. (a) to (d) preventive controls (a) to (d) program change requests thread testing (a), (b), (c) parallel operations Concentrator. (a), (b), (c) Physical security of warehouse facilities. procedural design Computer network Mesh Ring To help someone who is applying for employment Binary

Systems analysis and applications programming. A sequential file on a disk Tapes can only be read by the machine on which they are Data path part Distributed systems Can send data to a computer and receive data from a

Data communications hardware and software. A sequential file on a tape Parity errors will result Control Unit Local Area network Use the computer to which they are connected to perform all

Operating systems and compilers. A direct access file on a disk Information formats commonly vary between architectures Address calculation part Wide area network Generally require a keyboard for data entry and a CRT for display Multiplexor Packs data in a disk file Loop Network Electronic mailing A personal computer Parity checks Communication protocol A compiler is a general purpose language providing very efficient Lexical analysis, CONVERSION, and code generation

Mixer Modem Allows computer signals to be send over a telephone line Aids in back-up procedures Planetary network Office Automation A dumb workstation Time of day control locks Type of cable A compiler does a conversion line by line as the program is Feasibility study, system design, and testing Ring Network Executor systems An intelligent workstation Encryption algorithms Terminal Standard A compiler converts the whole of a higher level program code Implementation and documentation

Baudot ASCII CRC An interpreter does the An interpreter is a representation An interpreter is a general purpose language providing very efficient conversion line by line as the of the system being designed Modem High-level languages It is faster than parallel communication Financial sector and engineering Communicate with the console operator Specification and design Fiber Optics The design of the screen the user will see and use to enter A cache Demodulator Middle-level languages It is less error prone Graphic design and education Manage the paging function in a virtual environment System Analysis Coaxial Cable System Analysis defines the format and type of data the An interface Frequency division multiplexor Low-level languages It is less prone to attenuation Accounting systems, commercial sector Relieve the main CPU of repetitive communication tasks Testing Common carrier System Analysis involves creating a formal model of the problem to be A buffer

The different types of network to be used Star 10101010 Parity 15 Port 327 Data warehouse memory capacity 30 binary form 4C5 4 bits Basic Coding Description 1024 bits 10000 binary form Mouse used to indicate uppercase letters Because it squeaks when moved bits per second Touch screen BPS Printing letters OCR Touch screen

Testing to check for errors Hardware, Software and size of before the system is introduced program. Packet 1100101 Retransmission 4 Modem 141 Data Mining tools memory access time 255 ASCII code form 1B7 8 bits Binary Coded Decimal 1000 bytes 1112 ASCII code form Keyboard used to detect errors Its moves like a mouse baud Light pen MIPS Tracing diagrams MICR Hard disk Ring 1010101 Cyclic Redundancy 64 Multiplexor 97 Data management systems secondary storage capacity 256 decimal form 5C4 16 bits Bit Code Design 210 bits 1110 decimal form Numeric Keypad is the first bit in a byte It has ears bytes Joystick MHz Reading bar codes barcode scanning CD-ROM drive

increased the storage capacity of a computer system increases the process speed Refillable ink 100K hardware Mouse Touch screen Printing letters Touch screen Mouse Credit card Writing on a hard board Coloured spots Printer Mouse CRT displays screen layout Mouse hardware Credit card having several programs in RAM at the same time having several programs in RAM at the same time multitasking Pencil lead 1.44 Mb software Keyboard Light pen Tracing Diagrams Hard disk Bar code reader Mouse Printed output Pixels Storage device Bar code reader LCD displays mouse button layout Bar code reader language interpreter Speakers multitasking The ability to run 2 or more programs concurrently an operating system

provides backup power in the event of a power cut Light sensitive elements 5 Mb output Numeric Keypad Joystick Reading Bar Codes Keyboard Optical mark reader Speakers Storing information on the hard disk Pixies Pointing device Optical mark reader SSGA displays keyboard layout Optical mark reader software interface Smart card writing programs in multiple languages writing programs in multiple languages To run more than one program at the same time Third - generation computers. Multi-user Param is due to bad disk blocks

First - generation computers. Second - generation computers. multitasking Vishwajeet is caused by wear multiprogramming Deep Blue caused by overuse

Bar code Reader Technology a fast interpreter Drum Printer encrypting it Very important reader user sequence Electrically charged ink mainframe technology 10-6 sec Limit checks application project multiprocessing mainframes control unit band printer data management integrated software my computer field assembly language terminator symbol PC-at multiprocessing "dumb terminals" wan host

Optical Mark Reader Technology slower than an interpreter Dot - Matrix Printer decrypting it Vital information resource under siege Thermal Paper LAN technology 10-3 sec Control figures system model multithreading super computers arithmetic and logic unit drum printer word processing communication software recycle bin file machine language processed symbol hp vectra system multithreading dumb servers distributed computing system server

Magnetic Ink Character Recognition Technology converts a program to machine code Desk - jet Printer compressing it Virtual information reader & user system An ink pen WAN technology 10-12 sec External file labels operating system pilot project multiplexing micro computers central processing unit non impact printer electronic spreadsheet idea processor Microsoft exchange record high level language connector symbol fazitsu vp200 series multiplexing dummy terminals windows NT back end

host PC server processing four file management system multiprocessing repairing Code/De-code fixes multiprocessing Linear area networks task Integrated system dynamic networks. Ethernet visual basic MAN Transfer control protocol/Internet protocol Cells System modulation transfer protocol Transfer Protocol Aggregate transfer mode File server platform MAN and WAN ISDN Internal Services Digital Network

server LAN host processing one hierarchical database system multithreading redo logging Modulation/Demodulation locks multithreading Local area networks process Integrated Symbolic Digital networks. Internet power builder WAN Transfer communication protocol/Internet protocol Bits Software Mail transmission protocol Transmission protocol Asynchronous transfer mode Printer server configuration LAN and WAN ATM

back end distributed computing dumb processing two network database system multiplexing disk defragmentation Module/De-module constraints multiplexing Local array of networks. thread Integrated Services Digital network. ARPANET SQL * plus GAN Transmission control protocol/Internet protocol Packets Simple Mail transfer protocol Hyper text Area transfer mode Receiver package LAN and MAN Internet

Internal Services Design Network Integrated Services Digital Network

Web based Training Bridges procedure alpha numeric space occupied, price, no. of users allowed mini computers input multiprocessing interpreter input impact printers operating system, bootstrap, kernel, shell operating system batch processor compiler

Web based Technology Routers batch alpha beta cost, performance their ratio microprocessors output multithreading compiler processor drum printers control program, interpreter, assembler, compiler application software protocols compiler interpreter

Web based Transport Protocol command numerous alpha size, performance, cost PCs feed multiplexing converter ram non-impact desktop printers monitor, program, keyboard, bus windows 95 software's assembler assembler

Op4 an instruction that has been Exception reporting AGP Card End-of-file and endof-reel code None of above None of above Limited access files None of above Batch Total None of above Data Dictionary None of above Make duplicate copies of files None of above A cassette Distributed policies or procedures None of above None of above None of above None of above None of above None of above None of above None of above None of above

Ans C C B B B C C B D A B C A C A A A C C B A A B C A

Not None of above None of above None of above None of above None of above None of above None of above A selective access medium None of the above None of above None of above None of above None of above None of above None of above None of above None of above None of above None of above None of the above Transferred from the disk None of above None of above None of above None of above

B C B B A B B A A B B B A C C B A A C B D A B A C C

None of the above Hard disk None of the above Control Bus MAD Control Bus Shells, compilers and other useful alphanumeric form represented 127 characters 32 bits 1024 bytes a 32-bit bus or 32bit registers is the last bit in a byte CROM Hertz secondary storage access time use variable size instructions Logic Bus All of the above a modem interface laser printer. is used for cache memory none of the previous contains a microprocessor none of the previous none of the previous

A B B A B D D A A A A D B A D B D A D B D B C C B A

none of the previous Logic Bus e-mail none of the above none of the previous none of the previous involves using more than one use a virus protection program to display information or none of the previous. 109 sec a message pad an instruction that has been an instruction that has been the address of the next instruction to a magic marker Data Parity Checker Validation use find and replace Modem backup to a secure medium Multiplexing Magnetic Disk Shareware Shareware

D B D C C D D B B D D B C A D A B B B A B D D B C A

Random Primary Storage Schema and subschema Element, field, file Parity check Serial interface Video Drum recording current stock in a updated once a year Spreadsheet simplify file structures 8192 loss of data NetBEUI the operating system is easy to the hard drive uniform page source the system always requires a re-boot text. None of the above None of the bove allow encryption None of the above All of the above None of the above

C B A C C A D B A C D C C D A B D C A A A A C B D A

local identify the file type All of the above are parts of IS extensible hashing D: (b), (c), (d) general controls Control (a), (b), (c) Pull the power cord from the back of the Put your hand up and ask the teacher (b), (c), (d) corrective controls (b), (c), (d) resolution procedures loop testing (a) to (d) system walkthroughs Job control language. (a), (c), (d) Cross-training of operating personnel. data design Hub Ring All of the above To Store data in an organised manner Indexed

B D D A C C B C C C C C C C A D B D A B A C A D B B

Computer operations. A direct access file on a tape Data record can never be blocked Input output channel Protocol Are required with a microprocessor Time sharing computer Speeds up online printing Star Network Instant post-office A mainframe PC All of them Device interconnect None of the above None of the above EBCDIC None of the above Time Division Multiplexor None of the above Uses only one path None of the above Reduce competition between the None of the above Telephone Lines None of the above An online protocol

C C C A B D C A D C B C D B D A A C C D C C B C C B

None of the above Bus None of the above Hash Count None of the above Acoustic coupler None of the above All of them secondary storage access time None of the above alphanumeric form None of the above 32 bits None of the above 210 bytes None of the above alphanumeric form None of the above is the last bit in a byte None of the above Hertz None of the above VLSI None of the above voice recognition None of the above

B B C A A C B B B B A A B D A A A A B D D C B B B A

none of the previous None of the above 1 Gb input Printer Scanner Digital Signatures CD ROM Drive Keyboard Printer Back-up on a Cartridge Pickers CD-ROM None of the above none of the previous word processing software None of the above an operating system None of the above none of the previous none of the previous none of the above Fifth - generation computers. none of the previous Arjun none of the previous

C C B A B C B A B A B B A C B C B C A A B C A A C C

Image Scanning Technology none of the previous Thermal Printer transmitting it None of above An inked ribbon and print head Unix operating system 10-9 sec Cross footing tests communication process multitasking none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above input/output symbol IBM-PC none of the above dummy servers LAN front end

B C A C B D B D C D D D A B C B B B C B B B D A D D

front end centralized data processing many relational database system none of the above disk mirroring None of the above traps none of the above None of the above client-server None of the above. None of the above. all of the above None of the above. None of the above. None of the above. None of the above. None of the above. None of the above. None of the above. system LAN WAN and MAN Intranet None of the above.

C A B A D B D B B B B C C B D B C C C C B B A B A C

Web based Transaction Repeaters program number and alpha input, output, performance ratios mainframes write multitasking process output thermal printers CPU, memory, input, output interpreter procedures coder processor

A B D A C D A D D D C D B C B C

q_id BC1 BC1 0 BC1 1 BC1 2 BC1 3 BC1 4 BC1 5 BC1 6 BC1 7 BC1 8 BC1 9 BC2 BC2 0 BC2 1 BC2 2 BC2 3 BC2 4 BC2 5 BC2 6 BC2 7 BC2 8 BC2 9 BC3 BC3 0 BC3 1

q_desc ISDN stands for _______. The computer which can receive data from other computers on the network and print it is _______ The hardware and the software requirements together form the_____

op1 Integrated system dynamic networks. File server platform

ATM, Asynchronous transfer mode is a __________ technology. MAN and WAN __________ is designed telephone system Expansion of ISDN is ________ Expansion of WBT is ______________ _________ connects LANs. Collection of instruction is called a _____ ISDN Internal Services Digital Network Web based Training Bridges procedure

Combination of alphabetic and numeric data is called _____ data alpha numeric Computers can be classified based on ______,______and space occupied, price, no. of _______ users allowed _____________ is the Worlds largest computer network . _________ are used in large organizations for large scale jobs _______ is responsible for feeding data into the computer _______ is the capability of the o/s to run numerous applications simultaneously _______ involves conversion of raw data into some meaningful information _______ is responsible for obtaining the processed data from the computer _______ printers use light to produce the dots needed to form pages of characters Hardware components in a computer are _____,____,_____,______ _______ software are programs that are complex and can be developed or purchased _______ is a set of special instructions used to communicate effectively with the computer _______ converts a high level language into machine language _______is/are a popular front end tool _______ translates assembly language program into machine language instructions _______ software enables users to send and receive data to/from remote computers Ethernet mini computers input multiprocessing interpreter input impact printers operating system, bootstrap, kernel, shell operating system batch processor visual basic compiler application

BC3 2 BC3 3 BC3 4 BC3 5 BC3 6 BC3 7 BC3 8 BC3 9 BC4 BC4 0 BC4 1 BC4 2 BC4 3 BC4 4 BC4 5 BC4 6 BC4 7 BC4 8 BC4 9 BC5 BC5 0 BC5 1 BC5 2 BC5 3 BC5 4 BC5 5

A _____ is a running instance of an application Splitting of CPU's time for different tasks _______ prevents time slicing ______ computers are used in large organizations for large scale jobs which have large storage capacities _______ is responsible for all calculations and logical operations that have to be performed on the data

project multiprocessing mainframes control unit

______ printer use laser light band printer ______ software enhances the user to enter ,store, manipulate and print any text data management ______ software enables users to send and receive data to/from remote computers integrated software _______ is the temporary storage place for deleted files When LAN connected together ,it is called __________ . _____ is a collection of related fields _____ language consists of strings of binary numbers ______ symbol is used to represent processes like assigning a value to a variable or adding a number _______ is an example for micro computer _________capability supports concurrent users doing different tasks The ______ do not have processing power of their own and has only a screen, keyboard and the necessary hardware to A______is nothing but a PC with a network operating system _____system is responsible for handling the screen and user I/O processing The______ handles data processing and disk access in a Client/Server architecture Both the DBMS and the application resides on the same component in a ____system my computer MAN field assembly language terminator symbol PC-at multiprocessing "dumb terminals" wan host host PC Transfer control protocol/Internet protocol

TCP/IP stands for _________ . When all the processing is done by the mainframe itself, the type of processing is sometimes called as server processing DBMS models can be grouped under____ categories ______is the most advantageous database system A new user initiates a new process of execution at the background,while the user can continue his query process as The process of data being automatically written to a duplicate database is called______ Modem stands for __________ . four

file management system multiprocessing repairing Code/De-code

BC5 6 BC5 7 BC5 8 BC5 9

Multiple changes to the same record or a field are prevented by the DBMS through______ _________allows an application to multitask within itself LAN stands for __________ . New process of execution is referred to as______

fixes multiprocessing Linear area networks task Cells System modulation transfer protocol

BC6 Data is broken into small unit called __________ .

BC7 SMTP stands for __________ . The __________ protocol is a network protocol to be built for the BC8 World Wide Web . Transfer Protocol BC9 ATM stands for __________ .

Aggregate transfer mode

op2 Integrated Symbolic Digital networks. Printer server configuration LAN and WAN ATM Internal Services Design Network Web based Technology Routers batch alpha beta

op3 Integrated Services Digital network. Receiver package LAN and MAN Internet Integrated Services Digital Network Web based Transport Protocol command numerous alpha

op4 None of the above. None of the above. system LAN WAN and MAN Intranet None of the above. Web based Transaction Repeaters program number and alpha input, output, performance ratios None of the above. mainframes write multitasking process output thermal printers CPU, memory, input, output interpreter procedures coder all of the above processor communication

ans C B A B A C A B D A C B D A D D D C D B C B D C D

cost, performance their ratio size, performance, cost Internet microprocessors output multithreading compiler processor ARPANET PCs feed multiplexing converter

ram non-impact desktop drum printers printers control program, interpreter, monitor, program, assembler, compiler keyboard, bus application software protocols compiler power builder interpreter system windows 95 software's assembler SQL * plus assembler operating system

model multithreading super computers arithmetic and logic unit drum printer word processing communication software recycle bin WAN file machine language processed symbol hp vectra system multithreading dumb servers distributed computing system server server LAN Transfer communication protocol/Internet protocol host processing one

pilot project multiplexing micro computers central processing unit non impact printer electronic spreadsheet idea processor Microsoft exchange GAN record high level language connector symbol fazitsu vp200 series multiplexing dummy terminals windows NT back end back end

process multitasking none of the above none of the above none of the above none of the above none of the above none of the above None of the above. none of the above none of the above input/output symbol IBM-PC none of the above dummy servers LAN front end front end

D D A B C B B B B C B B B D A D D C A C B A D B D B

distributed computing centralized Transmission control protocol/Internet protocol None of the above. dumb processing two data processing many relational database system none of the above disk mirroring None of the above

hierarchical database system network database system multithreading redo logging multiplexing disk defragmentation

Modulation/Demodulation Module/De-module

locks multithreading Local area networks process Bits Software Mail transmission protocol Transmission protocol Asynchronous transfer mode

constraints multiplexing Local array of networks. thread Packets Simple Mail transfer protocol Hyper text Area transfer mode

traps none of the above None of the above client-server None of the above. None of the above. None of the above. None of the above.

B B B C C C C B

q_id OS 01 OS 127 OS 131 OS 132 OS 139 OS 193 OS 199 OS 215 OS 216 OS 217 OS 219 OS 233 OS 234 OS 236 OS 238 OS 271 OS 274 OS 275 OS 276 OS 277 OS 278 OS 280 OS 281 OS 282 OS 283

q_desc Which of the following computer software is designed to direct and assist the execution of application programs Formatting a disk results in all the data being...? Which bus carries information between processors and peripherals? Which bus controls the sequencing of read/write operations? Which computers use single chip processors? CPU performance may be measured in In processing cheques which of the following I/O techniques have banks traditionally used Disk fragmentation A compiler is An interpreter is Zipping a file means An assembly language program is translated to machine code by Which of the following is not part of the processor If the Cancel Error Property of the CommonDialog Box is set to true then which of the following statement is true: __________ control defaults to displaying the files in the current directory: A ____________ occurs any time a program writes more information into the temporary space it has allocated in the memory. Assessing a system requires certain common tools. Which of the following is NOT a tool used to assess a system? The ____________________ Web site has a utility that will tell you what software and operating system a Web server is running. When software vendors discover flaws in their software, they usually will write corrections to their code, known as: All ____________ have the option of blocking ports. Which of the following is NOT a characteristic of a firewall? Before shutting a service on an individual machine, which of the following would you always check? At a minimum, which of the following should be implemented under the protection phase? Attacks on your system may be prevented or trapped through the use of: Setting restrictions as to the number of unique passwords to use before a user can recycle them is called a password:

OS 284 OS 286 OS 287 OS 289 OS 291 OS 292 OS 293 OS 294 OS 295 OS 296 OS 299 OS 300 OS 309 OS 329 OS 355 OS 356 OS 357 OS 396 OS 397 OS 399 OS 495 OS 496 OS 497 OS 498 OS 502 OS 504

Which of the following is NOT a step to take in securing a workstation? To prevent a hacker from unauthorized access, what should you do with the administrator account? What should be done with old backup tapes and CDs? Which of the following is NOT an example of malware? One step you can take to reduce the risk of being infected by a virus is to: Which of the following is NOT a sign that a virus has infected your system? Which of the following is the safest way to protect yourself from e-mail viruses? A ____________ attack causes too much information to be placed into temporary memory space. ____________ gathers user information with the users knowledge. Which of the following is the most common function of spyware? Which of the following is NOT a virus-scanning technique? Which of the following would NOT be a way to protect your system from spyware? For which of the following positions would it be advisable to conduct an extensive background check? Which of the following would you use to open an existing file? The ability to have multiple applications open at the same time is known as: Which of the following can be changed using the Options command? Which of the following leaves an application open but shrinks the window to a button on the Windows taskbar? Which of the following actions would move a floating toolbar to dock it in a different place? To display a missing or needed toolbar, click the: Which of the following is NOT a true statement regarding password protection? The Linux operating systems is an example of: The Windows operating systems is: Application service providers offer: A(n) _________ offers on-demand software on an as-needed basis to its clients over the web. _________ are systems used to interact with customers and run a business in real time. The most common cause(s) of disaster is (are):

OS 505 OS239

A _______ backup site is backup facility consisting of an empty warehouse with all necessary connections for power and communication, but nothing else. To destroy an object and free the memory space occupied by it, the keyword used is:

op1 Application Software Deleted from the disk Data bus Data bus Personal computers BPS OCR is caused by wear a fast interpreter faster than a compiler encrypting it an assembler the ALU A runtime error can result if the user clicks File List Box memory overflow Netcop www.nettools.com code correct. firewalls It can consist of hardware, software, or both. That any open applications be exited Antivirus software an intrusion-detection system. cycle.

op2 Utility Programs Copied from the disk Auto bus Address bus Parallel computers MIPS MICR caused by overuse slower than an interpreter translates and executes programs decrypting it a compiler the CU A compile time error occurs Dir List Box systems overload NetBrute www.WhoIs.com patches. switches

op3 Operating system Saved to the disk Address bus Control bus Super computers MHz barcode scanning is due to bad disk blocks converts a program to assembly code converts a program to machine code compressing it an interpreter the power cord The program executes without any error Drive List Box RAM overflow Netcraft www.netcraft.com updates.

op4 Database management system None of above None of above None of above None of above VLSI voice recognition none of the previous none of the previous none of the previous transmitting it a linker None of the above You need to carry out conditional compilation Combo Box buffer overflow NetBIOS www.netstat.com upgrades. scanners It is a barrier between your network and the That you also shut down associated Router a proxy filtering system. history.

hubs One of its techniques is It hides your network. packet filtering. Dependencies on That you are not on the Internet other services Intrusion-detection software Firewall a network prevention antivirus software. system. renewal. age.

Make sure all update and security patches are Delete it from the system and use the guest Tapes can be used over and over, and CDs should

Install and keep current antivirus and antiDelete it and change the built-in guest account to Tapes and CDs can be thrown away in the

Limit users ability to configure the Disable it and create a nondescript user Tapes should be melted and CDs IP spoofing download files from reliable Web sites.

Block all incoming traffic on a network. Create another administrator account Give them to a recycle shop.

Trojan horse Virus place a router between add spyware to your your ISP and your system. system. System acts abnormal Files are missing Do not propagate hoax Update antivirus software. viruses. virus A virus Obtain system IP addresses E-mail and attachment scanning Use your browsers security settings Administrative assistant to the president The Standard toolbar multitasking. the default file location of new files shrinking Click on any border and drag. right mouse button anywhere on the Word All documents are automatically saved public domain software. public domain software. on-demand computing. best-cost provider Operational systems power outages. Trojan horse A Trojan horse Obtain cookies

Spyware hone your programming skills. Problems with your Printing problems wireless mouse Turn off the auto-launch Never open an e-mail in your e-mail client. attachment unless spyware Spyware Check for open ports buffer overflow A buffer overflow Obtain usernames and passwords

Download scanning File scanning Do not open Avoid skins and attachments in unknown toolbars download Cook The Formatting toolbar tiling. whether the worksheet prints in landscape or multitasking Click on any corner and drag. right mouse button on any visible toolbar, and The password is casesensitive. nonprotective open source software. nonprotective open source software. on-demand software. software provider Informational systems hardware failures.

Backup file scanning Use encryption software Network Junior accountant administrator The Open command on The Save command the Edit menu on the File menu cascading. the number of windows you have open minimizing Click on the title bar and drag. left mouse button on any visible toolbar, and click Once a document is protected by a protective open source software. protective open source software. utility computing. Web service provider Structured query systems floods. minimizing. the margins on the printed DOCUMENT cascading You cannot move a floating toolbar. left mouse button anywhere on the Word Passwords can be up to only seven proprietary software proprietary software. utility software. application service provider Office automation All of the above.

hot Delete

cold Kill

empty Nothing

dormant New

ans C A A C A B B B B B C A C A A D D C B A B B C A D

D C C C C D D D C D D D D A A A C C B A C D B D A D

B C

q_id CA1 CA2 CA3 CA4 CA5 CA6 CA7 CA8 CA9 CA10 CA11 CA12 CA13 CA14 CA15 CA16 CA17 CA18 CA19 CA20 CA21 CA22 CA23 CA24 CA25

q_desc Using generalized audit software packages can add a lot of value _______ _______ is used for CAAT as database Generalized audit software perform auditors to undertake any past records and not concurrent auditing Generalized audit software is a file whose capabilities for verifying processing is logic CAAT's are computer program and data that auditor uses as part of the audit procedures to process data if CAAT do not contains package programs, purpose written program, utility programs or system Embedded audit routines are sometimes built into an entity's computer system to provide data for later user SCARF involves embedding audit software modules within an application system to provide continuous Concurrent use auditors as the member of the system Regular cross system verification may minimize frauds Computer security is frequently associated with confidentiality, integrity and authentication Data reserve engineering process metadata to document system and abstract business rules and The first step for developing CAAT is_________ Using the open database connectivity feature in ACL is ______________ Computer Assisted Audited Technique involves the use of computers through "Black Box Approach" White Box Approach necessary involves expert knowledge on the part of Auditor The transition from manual system to CIS environment bring dramatic changes including ________________

op1 to an audit department's Oracle True True True yes true true true true true true to determine the audit objective can bring the data directly True

True change in the method of recording accounting documents driven Auditing with computer necessarily supports the approach hardware and software CAAT involves an Auditors' appreciation of __________ configuration Widespread end use computing result in unlimited errors creeping into system going to accept handling, true For computerized auditing usage of sophisticated audit software would be a necessity true Important knowledge needed to begin planning the use the source of data of CAAT is _________ available to the audit The move towards paperless EDI would eliminate much of the traditional audit trail, radically changing the nature true Computer operation controls are designed to provide ________________ the of by all concerned Systems development control, apart from others, include authorization, approval, testing, implementation true

CA26 CA27 CA28 CA29 CA30 CA31 CA32 CA33 CA34 CA35 CA36 CA37 CA38 CA39 CA40 CA41 CA42 CA43 CA44 CA45 CA46 CA47 CA48 CA49 CA50 CA51

A system could be _________

natural/man-made

A system exhibits 'entropy' true Super computer are the largest and fastest and is very suitable for commercial application including audit work true Assembler language uses Mnemonic symbols Operating systems are devised to optimize the machine capabilities, the function include_______________ General purpose software provides a framework for highly complex scientific operation In batch processing, transactions are processed one after another The use of computer assisted audit techniques is not gaining popularity not only ________________ On-line processing refers to grouping of transaction and processing the same in one go from start to finish Real time refers to the technique of updating files with transaction data immediately after the occurrence of the In OLRT the CPU should process the capability of program interruption Time sharing system allow access to a CPU from remote terminals DSS is defined as a system that provides tools to managers to assist them in solving structured problems DSS has the following components _________________ Master files contains current records for identification and summarizing Transaction files contain relatively permanent records take product profile, customer profile, employee profile Master file configuration includes ____________ ______ is a file management software package that lets users and programmers organize data into files and CAATS provide added value to the clients because _______________ File volatility refers to the number of addition and deletions to the file in a given period of time File activity is the proportion of transaction file records that are actually used and accessed in a given File interrogation refers to the _____ of information from a file One -to-one relationship means a single entity to a single entity in a monogamous structure true scheduled jobs true true with audit departments true true true true true databases true true reference files filex to have a complete picture of a system true true back-ups true

RDBMS is structured to a series of 2 dimensional tables true seriously affected SADB stands for ____________ database Controls are present over many aspects of the computer system and its surrounding social true

CA52 CA53 CA54 CA55 CA56 CA57 CA58 CA59 CA60 CA61 CA62 CA63 CA64 CA65 CA66 CA67 CA68 CA69 CA70 CA71 CA72 CA73 CA74 CA75 CA76 CA77

In framed checking the data entry is checked against an expected picture or format true Errors are correlated_________ Field check is exclusive to a field _________ law basically states that there is a specific probability of the first digit of a no. being 1,2,3 etc Check digit is a group of nos. added to a code for determining the accuracy of other digits in the code Hierarchical code means _________ The validation checks applied to a field depend on the field's logical inter relationships with other fields in the The contents of a field could determine _______ sign for a ______ field Batch is the process of ______ together _____ that bear some type of relationship to one another Hash totals means meaningless totals With OLRT where interactive data entry is available, the master file associated with a transaction may be Controls are required for authorization to ensure data integrity and detect possible breaches in security Data from client application are not stored in the organization's database through auditables events and All input records in a batch are normally of different types IDEA stands for _________________________________ A transaction file is sorted prior to the update of master file A sequence check on the transaction or master files by an update program is not required Whenever monetary transactions are processed against master files, the update program should maintain a Internal tables are stored tables from which certain values are extracted for further processing and storing For small to medium sized systems, individual modules are coded and individually tested and then assembled to In systems testing, test involves_________________ Recording transactions in a controlled manner may amount to loss of stored data at the year end true Benfish true consecutive nos. or alphabets to entities TRUE valid, numeric grouping, transaction true true true true true incremental design and enlarge activity true true true true e-brain bottom up tests yes

Audit software is used by the auditor to _________ read data on client's file Core image comparison is a software used by the auditor to compare _______ version of a program with a executables, master Database analyzer is a software which provides detailed information concerning the operation of the database true system analysis SAS stands for ______________ software

CA78 CA79 CA80 CA81 CA82 CA83 CA84 CA85 CA86 CA87 CA88 CA89 CA90 CA91 CA92 CA93 CA94 CA95 CA96 CA97 CA98 CA99 CA100 CA101 CA102 CA103

Embedded code is a software used by the auditor to examine backup data Embedded code performs wide variety of audit task Core image comparison is particularly useful where only executable versions are distributed Log analysis is a software used by auditor to detect virus On line testing techniques the auditor ______ data either _______ or fictitious in order to see that a specific Mapping software is used by the auditor to list unused program instructions Mapping software has very objectives Modeling is a variety of software which ________________ On line testing can be targeted for specific functions carried out by programs Program code analysis involves _____________ __________ is a software of CAAT Snapshot is software which takes a picture of a file or data or a transaction passing though the system Base case system evaluation includes____________ While base testing forces on finding if there are any defective execution policies in a program Black box testing seeks to determine whether application output is what it is supposed to be In integrated test facility approach the auditor should ensure that the impact of test transaction is Black box testing is _______ based and white box testing is _______ based

true yes true true manipulates, real true yes can be very powerful analytical tool yes provides detailed information of machine IDEA true fictitious data applied against the client true true true specification, program identifying erroneous code

Source code review means__________ In formula in flow hypothesis the auditor should expand the extent of substantive tests to determine how the true All material application oriented events that occur within the boundary subsystem should be recorded in the true In examination of audit trail the following data associated with an event may be ___________start and finish time JCL means_________________ Audit should be periodically analyzed to detect any control weakness of the system In an accounting audit trail, intrusion detection system might monitor the amount of processor time consumed A sample size calculator program assists auditors in determining RAND() function Generalized audit software consists ___________

job control language yes true true package computer p[program for

CA104 CA105 CA106 CA107 CA108 CA109 CA110 CA111 CA112 CA113 CA114

Specializes audit program may be___________ Generalised audit software could be used by the following in consistencies or significant fluctuations Generalized audit software function include____________ In the file reorganization merging capabilities are needed in data from separate file is to be combined on Auditors cannot use generalised audit software to extract the data needed for audit purpose Auditors can combine functional capabilities of generalized audit software to accomplish the task of Which of the following is not the feature of GAPs Which is the example of CAATs In audit procedures, test data is Which of the following is not the use of CAATs Which of the following are called explicitly by another procedure?

prepared by the auditor true file access/organizations true true examining the quality of system process Wide access to various data base ACL A sample of transactions Tests of details of transactions Macros

op2 to add customers ACL False False False no false false false false false

op3 all the above JCL

op4 none of these none the above

ans A A A B A B A A A A A A

false review and evaluate the to obtain a record types of data layout can bring the data indirectly all the above False False use of accounting codes

extract data from file none of the above

A A B A

absence of audit trails

all the above none of the above all the above

D B D A A

risk driven approach unique approach processing options, file data structure checks and controls false false source of data for material planing false providing access to computer to all false

all the above

none of these

A A

use of any programs

none of the above

D A

open/closed false false false manage hardware & software resources false false with production departments false false false false false planning language false false table files

conceptual/physical

all of them

D A A A

enable multiple user resource sharing

all the above

D B B

all the above

none of these

A A A A A B

model base

all the above

D B B

report files

none of the above filepet none of the above

D C A A B

file-o-man file manager decentralized picture of a system all the above false false retrieval false false deletion

addition

B A A B A

subject area database software and database safety and database false

false immediately false Benford false blocks of nos. to the primary attribute of the false invalid, alphabetic regrouping, events false false false false false interactive data extraction and false false false false bouncing ball top-down tests no provide information to the audit deleted, hard false system advanced software big-bang hybrid tests stub all the above none of the above none of the above all the above all the above Benjamin none of the above on quarterly basis none of the above

B B A B B random placement of component none of the above D A A A A A A B B interactive data innumerable analysis none of the above B A A B A C D B re-perform procedures carried out by the none of these all the above all the above D A A all the above none of the above A

false no false false create, false false no can enable the auditor to execute provisions none of these all the above

B A A B A A A can provide the auditors with useful all of the above D A C B A analyzing the picture of a file or data all the above A A A A none of the above all the above identifying non-standard code all the above A D A A resource requested all the above all the above none of the above D A A A B master list of transactions administered questionnaire A

no identifies program code examination of source which may be there for code of a program none of the above ACL false comparison of source version of a false false false file, hardware identifying ineffective code false false authentication of information support job connectivity language no false false mathematical concept ALC ACLL

prepared by the entity false statistical/arithmetic operation false false carrying analytical review Can extract and analyse data IDEA A utility software programme Analytical review procedures Action Procedures

prepared by an outside programmer engaged all the above

D A

stratification and frequency analysis

all the above

D B B

examining the quality of data all the above Can define the audit Can aid in simple selection objectives High End CAATs A special purpose written program Compliance tests of general EDP controls Event Procedures All of the above None of the above All of the above General Procedures

D D D A D D

Field0 CA107 CA108 CA109 CA11 CA110 CA111 CA112 CA113 CA114 CA115 CA116 CA117 CA118 CA119 CA12 CA120 CA121 CA122 CA123 CA124 CA125 CA126 CA127 CA128 CA129

Field1 In integrated test facility approach the auditor should ensure that the impact of test transaction is subsequently eliminated from the computer files In olrt the cpu should posses the capability of program interrupt interrupts In system testing,test involves _______ All input records in a batch are normally of different types In the planning phase gathering information and risk assessment will be done Information collection encompasses logging the selected auditable events Input controls are designed to ensure processing safety Integrated test facility is a facility of ________ Internal tables are stored tables from which certain values are extracted for further processing and storing Log analysers are _______ required by the auditor Log analyzers is ________ Log analyzer is a software used by auditor to detect virus Mapping software is used by the auditor to list unused program instruction has veryspecific objectives Master file configuration includes ______ All material application -oriented events that occur within the boundary sub-system should be recorded in the accounting audit trail Master file contains current records for identification and summarising Metadata approach is _______ Modeling is a variety of software which _________ One-to-one relationship means a single entity to a single entity in a monogenus structure On-line processing refers to grouping of transaction processing the same in one go from start to finish On-line testing can be targeted for specific function carried out by programs Operating systems are devised to optimise the machine capabilities-the function include: Parallel processing is a concept associated with _______ and ________ Parallelsimulation is there to authenticate the _______ system Prevention,detection,investigation and reaction are the ______ of an auditor

CA13 CA130 CA131 CA132 CA133 CA134 CA135 CA136 CA137 CA138 CA139 CA14 CA140 CA141 CA142 CA143 CA144 CA145 CA146 CA147 CA148 CA149 CA15 CA150 CA151 CA152

Any audit enable software may include _______ Procedure driven approach of auditing is __________ Processing controls can be grouped into general controls Program code analysis involves ______ Programme code analysis is being implemented by the _________ Public audit trail is an important control in system that use __________ for authentication purposes Rdbms is a structured into a series of 2-dimensional table Real time refers to the technique of updating files with transaction data immediately after the occurrence of the event to which it vrelates Reasonableness checking is Recording transactions in a controlled manner may amount to loss of stored data Regular cross-system validation may minimise frauds Application controls can be categorized into _______ types Risk assessment is a phase of an audit Risk assessment is the phase of ______ Scarf involves embedding audit software modules within an application system to provide continuous monitoring Security audit can be done through oracle database Security can be broken into ________ areas Sign test is a type of field checks on processed data Snapshot is a software which takes a "picture" of a file or data or a transaction processing through the system Snapshot is a technique of __________ which is a part of audit software Source code review means _______ Specialised audit programs may be _______ Application controls grouped into Super computer are the largest and fastest and is very suitablefor commercial applicationincluding audit work System development control, apart from others,include authorisation,approval,testing,implementation and documentation of new systems System privilege can be checked by auditor

CA153 CA154 CA155 CA156 CA157 CA158 CA159 CA16 CA160 CA161 CA162 CA163 CA164 CA165 CA166 CA167 CA168 CA169 CA17 CA170 CA171 CA172 CA173 CA174 CA175 CA176

System security audit is an on site inspection ,which identifies potential securityvulnerabilities within an organization Test data can be defined as __________ Test data pack is ________ The contents of a field could determine _______ sign for ______ field The move towards paperless edi would eliminate much of the traditional audit trail,radically changing the nature of audit evidence The stream of data that are generated by these tools is called as the __________ The transition from manual system to cis environment bring dramatic changes including Ar=ir*cr*dr The validation checks applied to a field depend on the fields logical interrelationships with other fields in the record There are ______ types of approaches of test data techniques There are ______ types of control totals There are _______ types of audits of the systems development process There are ________ types of checks that can run when data is input through a terminal There are _____types of checks frequently used in validating the data There are 13 system development phases while audit of the system development processes There are four type of audit risks Top down tests,bottom up tests and hybrid tests are under the _______ category Tracing helps to analyse the change caused by viruses Assembler language uses mnemonic symbols Transaction file contain relatively permanent records take product profile,customer profile,employee profile etc. Transactions are not lost ,added,duplicated or improperly changed is called as control over input Validation checks is applied to a field depend on the field's logical interrelationships with other fields in the records Whenever monetary transaction are processed against master files,the update program should maintain a correlation account to record such transaction that White box testing focuses on finding if there are any defective execution paths in a program White box approach is program based With olrt where interactive data entry is available ,the master file associated with a transaction may be searched for confirming data

CA18 CA19 CA2 CA20 CA21 CA22 CA23 CA24 CA25 CA26 CA27 CA28 CA29 CA3 CA30 CA31 CA32 CA33 CA34 CA35 CA36 CA37 CA38 CA39 CA4 CA40

Audit around the computer is called Audit risk cannot be viewed as a joint probability of inherent risk,control risk and detection risk White box approach necessarily involves expert knowledge on the part of auditor Audit software is a type of audit technique Audit software is used by the auditor to ________ Audit software can be categorized under ______ heads Audit software can be divided into ________ categories Audit through can be done using simulation Audit trail should be periodically analysed to detect any control weaknesses of the system Audit with networking and database help is called _______ Auditing is a form of attestation Auditor can also check default roles in oracle database software Auditor can combine functional capabilities of generalized audit software to accomplish the task of ________ _________ Is the file management software package that lets users and programmers organise data into files and then process those files Auditors can issue the sql commands to audit Auditors can use profiles in their white-box approach of auditing Auditors cannot use generalised audit software to extract the data needed for audit purposes Auditors has to take care of the fact to link between multiple databases with one application Base case system evaluation includes _______ Black box approach is specification based Black box testing is ______ based and white box testing is _____ based Black box testing seeks to determine whether application output is what it is supposed to be Caat do not contain package programs, purpose written programmes,utility program or system management program Caat's are computer program and data the auditor uses as part of audit procedures to process data of audit significance contained in an entity's A sample size calculator program assists auditors in determining rand() function Caat's are computer programs and data the auditor uses as a part of the audit procedures

CA41 CA42 CA43 CA44 CA45 CA46 CA47 CA48 CA49 CA5 CA50 CA51 CA52 CA53 CA54 CA55 CA56 CA57 CA58 CA59 CA6 CA60 CA61 CA62 CA63 CA64

Case-is ________ Check digit is a group of numbers added to a code for determining the accuracy of other digits with code Check digit is a tool under field checks Check digit is a type of ___________ Codd's rule are being implemented on database Computer assisted audit technique involves the use of computer through "black box " approach Computer operation controls are designed to provide ________ Computer security is frequently associated with confidentiality ,integrity and authentication Concurrent audit include auditors as members of s.d team A sequence check on the transaction or master file by an update program is not required Concurrent audit is taking care of the ______ data that is being transacted Confidentiality,integrity and availability are the major security attributes to the auditor Control total is under batch checks Controls are present over many aspects of the computer system and its surrounding social environments Controls are required for authorisation,to ensure data integration and to detect possible breachesin security Conventional data entry giving way to scanner,digitised image processors etc. For auditing in cis environment Core image comparison is a ________ used by the auditor Core image comparison is a type of audit technique Core image comparison is particularly useful where only executable versions are distributed Critical review of the system of book-keeping,accountingand internal organizational controls. A system could be ________ Cryptographic techniques are the part of security audit Data communication and networking would introduce new audit risk Data from client application are not stored in the organisations database through auditable events and functions Data integrity can be imposed on the database through dbms Data reverse engineering process metadata to document system and abstract business rules and relationships

CA65 CA66 CA67 CA68 CA69 CA7 CA70 CA71 CA72 CA73 CA74 CA75 CA76 CA77 CA78 CA79 CA8 CA80 CA81 CA82 CA83 CA84 CA85 CA86 CA87 CA88

Data security in audit techniques can be done through three ways Database analyser is a software which provides detailed information concerning the operation of the database Databases are a key element in most business-related information systems Ddl,dml,dcl-statements can be exercised in rdbms Deterrenece meance _______ A system ehibit entropy Dss has the following components Dss is defined as a system that provides tools to managers to assist them in solving structural problem Embedded audit routines are sometimes built into an entity's computer system to provide data for later use by the auditor Embedded code is a software used by the auditor to examine backup Embedded code performs a wide variety of audit tasks Errors are corrected :_______ Event detection is an audit procedure Event detection is the audit procedures Examine the quality of data is not the task of generalized audit software Examine the quality of system processes is _________ A system means -totality Field check is exclusive to a field File access is a function of _________ software File access will be the functional capabilities of generalized audit software File activity is the proportion of transaction file records that are actually used or accssed in a given processing run File integration refers to the ________ of information from a file File volatility refers to the number of additions and deletions to the file in a given period of time For computerised auditing,usage of sophisticated audit software would be a necessity For small to medium sized systems,individual modules are coded and individually tested and then assembled to be tested as a whole.the testing strategy is referred General purpose software provides a framework for highly complex scientific operations

CA89 CA9 CA90 CA91 CA92 CA93 CA94 CA95 CA96 CA97 CA98

Generalised audit software could be used by the auditor for identifying inconsistencies or significant fluctuations A transaction file is sorted prior to the update of master file Generalised audit software function include _______ Generalised audit software never allow several files to be read simultaneously _______ Generalized audit software consists _______ Generalized audit software has infile capabilities for verifying processing logic Generalized audit software has only limited capabilities for verifying processing logic Generalized audit software permits auditors to undertake only expost auditing and not concurrent auditing Generalized audit software provides the full set of arithmetic operators Hash total is a type of _________ Hash totals falls under control totals

Field2 TRUE TRUE BOTTOM UP TESTS TRUE TRUE TRUE TRUE PARALLEL PROCESSING TRUE HARDWARE AUDIT TOOL TRUE TRUE REFERENCE FILE TRUE TRUE APPROACH TO THE SYSTEM DATA ONLY CAN BE VERY POWERFUL ANALYTICAL TOOL TRUE TRUE TRUE SCHEDULE JOBS OS AND RAM REEL SYSTEM FUNCTION FALSE FALSE

Field3

Field4

TOP DOWN TESTS FALSE FALSE FALSE FALSE SOURCE CODE REVIEW FALSE SOFTWARE SOFTWARE FALSE FALSE TABLE FILES FALSE FALSE APPROACH TO THE APPLICATION DATA CAN ENABLE THE AUDITOR TO EXAMINE FALSE FALSE FALSE MANAGE HARDWARE AND SOFTWARE OS AND ROM REAL SYSTEM ROLE

HYBRID TESTS

TEST DATA APPROACH

NETWORK MACHINE ACTIVITY

REPORT FILE

IT IS DATA ABOUT SOME OTHER DATA CAN PROVIDE THE AUDITOR WITH USEFUL

ENABLE MULTI USER RESOURCE SHARING OS AND MICROPROCESSOR BOTH (A) AND (B) BOTH (A) AND (B)

COMPLETENESS TRADITIONAL APPROACH

ACCURACY LATEST APPROACH

AVAILABILITY BOTH (A) AND (B)

TRUE FALSE PROVIDES DETAILED IDENTIFIES PROGRAM EXAMINATION OF INFORMATION ON MACHINE CODES WHICH MAY BE SOURCE CODE OF A DATABASE COMPANY ADMINISTRATOR AUDITOR PUBLIC KEY TRUE TRUE TYPE OF RECORD CHECK TRUE TRUE 4 TRUE AUDIT TRUE TRUE RISK AVOIDANCE TRUE TRUE AUDIT ROUTINE IDENTIFYING ENORMOUS CODE PRIVATE KEY FALSE FALSE TYPE OF RANGE CHECKS FALSE FALSE 2 FALSE AUDIT THROUGH COMPUTERS FALSE FALSE DETERRENCE FALSE FALSE AUDITING IDENTIFYING NONSTANDARD CODE PREPARED BY AN OUTSIDE PROGRAMMER FOUR GROUPS PREVENTION 5 DIGITAL SIGNATURE

TYPE OF SIGN TEST

ALL THE ABOVE

AUDIT TECHNIQUE IDENTIFYING INEFFECTIVE CODE PREPARED BY THE PREPARED BY THE AUDITOR ENTITY TWO GROUPS TRUE TRUE TRUE THREE GROUPS FALSE FALSE FALSE

TRUE FALSE SAMPLE OF DATA USED FOR SAMPLE OF DATA THE PURPOSE OF TESTING USED FOR THE STREAM OF DATA STREAM OF DATA THAT ARE INVALID TRUE BOTH C & D FALSE

SAMPLE OF DATA USED FOR TESTING THE BOTH (A) AND (B) VALID

TEST DATA TEST DATA APPROACH TEST DATA PACK CHANGE IN THE METHOD OF USE OF ACCOUNTING ABSENCE OF AUDIT RECORDING ACCOUNTING CODES TRAIL TRUE TRUE ONE 2 THREE FIVE 4 TRUE TRUE INTER TABLE TEST TRUE TRUE TRUE TRUE TRUE TRUE TRUE TRUE TRUE FALSE FALSE TWO 4 FOUR THREE 2 FALSE FALSE SYSTEM TEST FALSE FALSE FALSE FALSE FALSE FALSE FALSE FALSE FALSE TABLE LEVEL TESTS THREE 3 TWO FOUR 5

BLACK BOX APPROACH TRUE TRUE TRUE READ DATA ON CLIENT'S FILES 2 TWO TRUE TRUE WHITE BOX APPROACH TRUE

WHITE BOX APPROACH FALSE FALSE

BOTH (A) AND (B)

FALSE PROVIDE REPERFORM INFORMATION TO THE PROCEDURES CARRIED 4 FOUR FALSE FALSE BLACK BOX APPROACH FALSE 5 THREE

ALL THE ABOVE

TRUE FALSE EXAMINE THE THE QUALITY CARRYING ANALYSING EXAMINING THE QUALITY OF SYSTEM PROCESS REVIEW OF DATA FILE TRUE TRUE TRUE TRUE FICTITIOUS DATA APPLIED AGAINST THE CLIENT TRUE BOTH C & D TRUE TRUE TRUE TRUE TRUE FILE-O-MAN FALSE FALSE FALSE FALSE COMPARISON OF SOURCE VERSION OF FALSE HARDWARE FALSE FALSE FALSE FALSE FALSE SPECIFICATION THE FILE MANAGER

ANALYSING THE PICTURE OF A FILE OR

COMPUTER AIDED SOFTWARE EDITOR TRUE TRUE FIELD CHECKS TRUE

COMPUTER AIDED SOFTWARE FALSE FALSE RECORD CHECKS FALSE

COMPUTER AIDED SOFTWARE

BOTH (A) AND (B)

TRUE FALSE THE USE OF COMPUTERS BY PROVIDING ACCESS ALL CONCERNED TO COMPUTER TO ALL USE OF ANY PROGRAMS TRUE TRUE TRUE PREVIOUS DATA TRUE TRUE TRUE TRUE TRUE TYPE OF NETWORK TRUE TRUE TRUE NATURAL/MAN MADE TRUE TRUE TRUE TRUE TRUE FALSE FALSE FALSE CURRENT DATA FALSE FALSE FALSE FALSE FALSE TYPE OF SOFTWARE FALSE FALSE FALSE OPEN/CLOSED FALSE FALSE FALSE FALSE FALSE CONCEPTUAL/PHYSICAL TYPE OF HARDWARE ALL THE ABOVE NONE OF THESE

TRUE TRUE TRUE TRUE THREAT TRUE DATABASE TRUE TRUE TRUE TRUE AT THE YEAR END TRUE TRUE TRUE AUDIT TASK OF THE AUDITOR TRUE TRUE GENERALIZED AUDIT TRUE TRUE BACKUPS TRUE TRUE C-BRAIN TRUE

FALSE FALSE FALSE FALSE BROADCASTING FALSE PLANNING LANGUAGE MODEL BASE FALSE FALSE FALSE FALSE IMMEDIATELY FALSE FALSE FALSE AUDIT TASK OF THE AUDITORS USING FALSE FALSE SPECIALIZED AUDIT FALSE FALSE RETRIEVAL FALSE FALSE BIG BANG FALSE STUB DELETION UTILITY PROGRAM ON QUARTERLY BASIS NETWORK

AUDIT TASK OF THE GENERALIZED AUDIT

TRUE TRUE FILE ACCESS/ORGANIZATION TRUE PACKAGE COMPUTER PROGRAM FOR TRUE TRUE TRUE TRUE CONTROL TOTAL TRUE

FALSE FALSE STATISTICAL/ARITHME STRATIFICATION AND TICAL OPERATION FREQUENCY ANALYSES FALSE MATHEMATICAL CONCEPTS FALSE FALSE FALSE FALSE TRANSACTION TYPE FALSE BATCH SERIAL NUMBER

A MASTER LIST TRANSACTION

Field5

Field6 A A

ALL THE ABOVE

D B A A B

NONE OF THESE

C A

NONE OF THESE SOFTWARE USED TO READ AND ANALYZE RECORDS OF MACHINE

B D B A

NONE OF THE ABOVE

D A B

ALL THE ABOVE ALL THE ABOVE

C D A B A

ALL THE ABOVE NONE OF THE ABOVE DATABASE SYSTEM NONE OF THESE

D C B B

ALL THE ABOVE NONE OF THE ABOVE

D A B

NONE OF THE ABOVE AUDITOR USING COMPUTERS NONE OF THESE

C D C A A

NONE OF THESE

A B A

D A

NONE OF THE ABOVE

B A A

ALL THE ABOVE

D A A

NONE OF THESE ALL THE ABOVE ALL THE ABOVE ALL THE ABOVE

A D D B A A A

A ALL THE ABOVE NONE OF THESE NUMERIC C B B A NONE OF THE ABOVE ALL THE ABOVE C D A A FOUR 5 ONE ONE 3 B B A C A A B NONE OF THESE B A A B A A B A B A

NONE OF THESE

A B A A

ALL THE ABOVE 3 NONE OF THESE

D D C A A

NONE OF THE ABOVE

A A A

ALL THE ABOVE FILEPET

D C A A B A

ALL THE ABOVE

A A

PROGRAM

A A B A B A

NONE OF THESE

C B A

NONE OF THESE

A B B

NONE OF THE ABOVE

D A A A

NONE OF THESE

B A A A A A

NONE OF THESE

B A A A

ALL THE ABOVE

D A A B A A

A A A A NONE OF THESE A A ALL THE ABOVE D B A B A NONE OF THE ABOVE B A A B ALL THE ABOVE C A A NONE OF THESE A A B ADDITION B A A BOUNCING BALL B B

A A ALL THE ABOVE D B ADMINISTERED QUESTIONNAIRE A A A A A SEQUENCE CHECK A A

q_id DA1 DA2 DA3 DA4 DA5 DA6 DA7 DA8 DA9 DA10 DA11 DA12 DA13 DA14 DA15 DA16 DA17 DA18

q_desc Sequence Check is a --------------- level control check. Analyse data over two or more periods is called ----------------------- analysis We use Hash Total to identify ------------ within a series where there is a definite relation between items Analyse fields by arranging them into rows and columns is called --------------------- function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in the table. To import data from Access to Excel ,it is not possible to link between Access and Excel sheet The GAP detection options can be used to test for completeness of data. Exception testing can be used to identify ----------------- items Data validity test represents Year end ledger, inventory files or transaction files can be tested for cut-off , to ensure that the data has been provided is for the correct audit period In Range Check , the data may not be in proper sequence but should be within a predetermined range In ---------------- Check data entry follow a particular sequence and also a predetermined range. 'Set mapping' Check control that follows a text-type validation, we use ----------------- application for data analysis. Excel can import data from other databases for the data analysis. A System Auditor can uses CAAT tools to analyze data In the case of the ---------- control, it is ensured that the data in combination with other fields are reasonable as per standard set by an organisation. --------------- function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in a table Most of the tools use in Data Analysis depends on

op1 Field Horizontal Duplicate Value Cross Tabulate RAND() TRUE TRUE Unusual exception testing True True Limit Excel True False Valid Signs HLOOKUP DDE Record

op2 Both A or B Gaps Merge

op3

op4 None of the above None of the Above All of the above None of the above None of the above A A C A B A A

ans

Vertical Combined Value Filter VLOOKUP() FALSE FALSE Strange comparison of data False False Sequence Access False True Transaction type VLOOKUP OLE

HLOOKUP()

A or B duplicates testing

None of the above All of the above

C D A A

Range Both

Both B & C None of the above

B B A B

Limit Check A or B ODBC

Reasonableness None of the above All of the above

D B C

q_id WO1 WO2 WO3 WO4 WO5

q_desc _______ is a word processing that is a member of the office 2000 family The feature that enables user to type anywhere in a document without pressing or tab The______ feature allows the user to copy and paste upto 12 items at the same time in an application ______ and _____ key combination will extend the selection by one character on the left and right _____and_____ are improved layout in Word 2000

op1 Word 2000 click-n-type office clipboard shift+end and shift+home web layout, printlayout

WO6 WO7 WO8 WO9 WO10 WO11 WO12 WO13 WO14 WO15 WO16

The easiest way to create a document in word is In Office2000 environment the tool that makes work easier for us is_____ A short description of a tool bar button called the ______ is displayed when the mouse pointer is allowed to stay for a second on the button The _____ helps us to keep track of the margin of the page The keys that are used to navigate between headers and footers are Pick out the element from the following that dose not form the type of tabs for the Word 2000 _______are blueprints or patterns for documents of a certain type The______ is used for quickly setting paragraph indention using the mouse Word art is text with AutoShapes in word can be created by accessing the _____ By default, a document consists of_____ section

wizard office assistant Screen Tip tab stop up arrow keys only left template increase indent special effect drawing toolbar 1 page setup from the file border ctrl+a ctrl+a CTRL+SHIFT+F ctrl+shift+f

WO17 WO18 WO19 WO20 WO21 WO22 WO23 WO24 WO25 WO26

The dialog box that is used to determine the documents margins is ________ is a box surrounding a page on all slides or a line that sets off a paragraph on one or more slides The key that is used to perform a task to select all t he text in the documents is The key that is used to indent a paragraph is The key that is used to change the font from the current positioned in a document is The key that is used to change the style of the document that is from that normal to heading1 or heading1 to other document styles.

______ is the default view in Word used for typing Editing and Formatting the Text NORMAL The short-cut-key that is used to indent a paragraph spacing in the documents is The short-cut-key that is used to paste the selected text The short-cut-key that is used for paragraph spacing(1.5) ctrl+m ctrl+v or ins ctrl+2

WO27 WO28 WO29 WO30 WO31 WO32 WO33 WO34 WO35 WO36 WO37 WO38 WO39 WO40 WO41 WO42 WO43 WO44 WO45 WO46 WO47 WO48

The box that separate text from the document and allows it to behave like an independent object is known as The object that is used to provide information like the title of the book, name of the chapter, page number etc. The object that helps us analyzing data statistically is known as To highlight certain parts of a page to set it apart from the rest of the page we make use of the following features To clear all the tabs in a document the option that is clicked from the tabs dialog The dialog box that is used to incorporate picture bullets into our documents or web pages is The object that composes of set of tools which helps to create and work on different shapes like rectangles, circles, flowcharts etc. When word is opened a new document called_____ is displayed, where the user starts typing the content right way ______ is an online dictionary maintained by word to obtain synonyms for words The thesaurus is invoked by pressing_______ When a new table is created the insertion point flashes in the _____ By pressing the _____ key inserts a blank row after the last row in the table The ______ option enables us to convert text into a table format A table consists of ______ that contain text or graphics The _______ option in word allows the user to automatically correct misspell words as and when they are typed ______ is a facility that enables recording and replaying of a sequence of keystroke In Word Macros are written in _____ In Word 2000 the macro dialog box is activated with the help of ____ key combination ________shows how a document would look like when published on the web or on an intranet ______ is a software for sending and receiving e-mail messages ________is the coding system used to create web pages The network that makes information easily accessible across various networks is _______

Text Box Header and Footer Chart Borders clear picture bullets dialog box charts doc1 thesaurus shift+f7 first tab convert text to table row AutoCorrect Mail Merging basic shift+f8 web layout view email client html internet field name must be listed in the same order as the corresponding information in the data source

WO49

Which of the following statements are false with reference to the use of a header row source for a mail merge

WO50 WO51

With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE false The alignment available for tabs does not include

it is not possible to change the height of only selected rows of a table left A new section is created in order to change properties like number of columns true true true drag & drop true

WO52 WO53 WO54 WO55 WO56 WO57

Which of the following statements related to a Section Break are True The user can set a spelling checker to skip the marked part of the next New option under the file menu of word creates a new blank document that is based on the normal templates The user can split the screen only into two parts The features that enables the user to type text graphics tables anywhere in the document without pressing enter or tab The user can modify the picture from the clip art

WO58

With reference to auto correct which of the following statements are false

automatically corrects common typing, spelling errors

WO59 WO60

With the reference to password protected documents which of the following statements are false The alignment available for tabs does not include

password can not include spaces left a .ppt file can not not be inserted at specified position in the current document true true

WO61 WO62 WO63

Which of the following statements are False Drop Cap tool does not work for the contents in the table format The user can split the screen only into two parts in MS-Word

WO64 WO65 WO66 WO67 WO68

The special symbols that are inserted using "insert symbol" option of the word can not be printed by the printer as they are not standard keyboard symbols true The "format columns" option allows to create columnar text up 12 columns only. The document that makes the user to organize and maintain a long document, such as multipart report or a book consisting of chapters The view that enables us to view how objects will be positioned on the page when it is printed The mode that is initialized or toggled to if the user is in a position to overwrite the text in the word Veena is entering a paragraph in a word processing program. When the cursor gets to the end of a line, what is the best way to get the cursor to the next line? How are data organized in a spreadsheet? Which key moves the cursor to the beginning of the next line of text? Veena typed the following sentence: "The girl was very beautiful." In which word processing utility could she find a synonym for "beautiful"? true Master Document Print Layout View Insert Mode press the return key layers and planes tab grammar checker send a public message to friends interested in one topic Print all Enter closing database To analyse figures subscript To analyse figures

WO69 WO70 WO71 WO72

WO73 WO74 WO75 WO76 WO77

Using an electronic bulletin board, Seema can do all of the following except which one? Aryan has created a ten-page story, but only wants to print the first two pages. What printer command should he select? What process should be used to recall a document saved previously? Which is used to indent text within a document? Desktop publishing is a more sophisticated form of which of the following types of software?

WO78 WO79

What is a Word Processor used for? What is a picture that is saved on a diskette and can be pasted into a document?

WO80

What is a Word Processor used for?

WO81

What basic tools would you find in the Edit menu of a word processor

Clear, replace and select Text at the bottom of every page Mouse, printer and processing system keyboard?

WO82

What is a header in a document?

WO83

What hardware is essential for a word?

WO84

The user could take a picture from a magazine and insert it into the document by using a

Browser

WO85 WO86 WO87

Clear, replace What basic tools would you find in the Edit and Toolbars Assume you are creating a two-column newsletter. Which type size is the most reasonable for the text in the columns? 6 point Given the default left and right margins, and -inch spacing between columns, the width of each column in a two-column document will be: 2 inches.

WO88

Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot see any columns on the screen. What is the most likely cause?

You are not in Print Layout view.

WO89

While word processing, in which of the following situations would Tom use the "Copy" command?

to store a file on the hard drive Data about a set of similar things Thesaurus

WO90 WO91

WO92

What does a document contain? Before submitting your work you want to find any words spelt incorrectly. Which of the following would you use? What command in a word-processing program can be used to change the word him to her, and also the word he to she in the given phrase? On a cold and still night, the only sound that could be heard was the owl that had ade its home in the nest outs

Paste

WO93

What edit commands would you use to insert a paragraph from one document into Copy, then another document, while still keeping the paragraph in the first document? paste To give the original author a chance to accept suggested changes from the person who entered the revisions

WO94

Which of the following statements would NOT be a reason for showing suggested revisions in a Word document without changing the original document?

WO95

Which statement is NOT true regarding revisions made in a Word document?

A line appears through text that is to be deleted.

WO96

How are suggested changes entered for review on an initial Word document?

Through the Edit menu by choosing Track Changes command

WO97

Which of the following is TRUE about saving a document using the Versions command?

The Versions command will allow you to save multiple versions of a document, including any changes that may have been made to that document.

WO98

WO99

WO100 WO101 WO102

All versions are What happens when you open a document that has been saved using the Versions opened command? automatically. You have used the word discover four times in an English essay you have created using a word processing program. You would like to find another word of similar meaning to use instead of discover. Which of the following would you use to do this? Dictionary Word displays a list of the dates and times When opening and working with multiple versions of a document, how can you tell each file was which is the most recent version? saved. Various fields are added to a regular document to create a special document called a form through the ____________ toolbar. Fields Which of the following types of fields CANNOT be inserted into a form? Check boxes

WO103

Comments cannot be Which of the following is TRUE related to editing comments in a Word document? edited. Text at the bottom of every page

WO104

WO105 WO106 WO107 WO108

What is a header in a document? In your English essay you notice that the paragraph at the bottom of page 1 continues on to page 2. You would like to make this paragraph start on page 2.What would be the best way to do this? Tables in a document help you to easily arrange all of the following EXCEPT: To identify a document, it is helpful to include the file name on each page as a Which of the following tools will copy the formatting of selected text to other places?

Press tab. text. header/footer. Copy button

WO109 WO110

What is the name of the process of determining the cause of errors in a macro? Drop caps are added to a Word document using the ___________ menu.

Fault Finding Insert

WO111

A reverse in a newsletter is:

WO112

A pull quote is best emphasized by:

a section of white text on a black background. setting it in larger type or font size.

WO113

Which of the following definitions is CORRECT? Pertaining to newsletters, which of the following cannot be changed using the Columns command dialog box? As related to type size, how many points are there to the inch? Assume you are working on a newsletter in which the masthead extends across the top of the entire first page. The rest of the newsletter has two columns. What is the minimum number of sections in the newsletter?

The reverse technique means to add dark text on a light background. The width of each column 6

WO114 WO115

WO116

One Press Ctrl+Enter to create a page break. A serif font at 10 points

WO117

Which of the following is NOT correct with respect to page, column, and section breaks? Which of the following would be the most appropriate font for a newsletter headline?

WO118

WO119

Which of the following is the default Word column width?

2 inches

op2 Office 2000 double click cut shift+left and shift+right normal layout, web layout

op3 Office 97

templates inbox assistant Tool Tip marginal stop page up keys only center model

op4 Back Office none of the drag & drop above none of the select above ctr+end and none of the ctr+home above web layout, page none of the layout above click from start program, MSWord from none of the the task menu above document none of the assistant above Icon Tip ruler home and end keys only decimal dialogs/alerts Document Tip none of the above up and down arrow rotation none of the above none of the above pictures forms 11 none of the above none of the above ctrl+m ctrl+m

ans A A A B A

A A A B D D B C A A A

decrease indent both A and B control tool box design wizard control box 2 printer setup from the file menu shading Del Del CTRL+O ctrl+o ONLINE LAYOUT ctrl+2 ctrl+c or ins ctrl+5 database 0 print preview from the file style box ctrl+f ctrl+f

A A A D

CTRL+SHIFT+S CTRL+SHIFT+P A ctrl+shift+s PAGELAYOUT ctrl+end ctrl+x or ins ctrl+1 ctrl+shift+p ONLINE DOCUMENT ctrl+home ctrl+v or Del none of the above C A B A B

Frame Screen Tips WordArt Shading remove all arrow bullet dialog box WordArt

AutoShape Page Layout Auto Shapes WordArt remove circle bullet dialog box AutoShapes

Border none of the above File Bullets clear all

A A A D D

none dialog box A C B A A A A A B A B B A A A A

files default new document document document1 none of t he hyphenation mail merge above tools+spelling thesaurus menu shift+f8 menu last cell of the t second first row able none of the end enter above convert data to table auto format none of the table option above rows & none of the records above columns none of the AutoFormat style gallery above none of the Data Source above Macro vj++ visual FoxPro visual basic shift+f7 online layout view alt+f8 alt+f5 none of the above hotmail vb script

browser micro soft outlook express outlook xml sgml intranet the field separators in a header source and the data source can not be set as paragraph arpanet field names in the header source must match any merge fields you've inserted in the main document

LAN A the number of fields names in the header source must be the same as the number of data fields in the data source B

auto format option applies to the entire table and not only to the selected rows or columns of a table decimal In order to type a header from the third page of the document a section break is inserted after t he third page false false false click -n-type false

by default cell height and weight option applies to all the rows and columns of a table justified If a header is inserted in the second section then the same header is applicable to the first section

delete cells option allows to delete the entire row or a column or shift cells up or shifts cells left C top A A section is a portion of a document in which certain page formatting option can be set D A A A

Double Click

none of the above

B A

prohibits the user from renaming an auto correct entry password protected document can be opened without password as read only justified a document file can be inserted in the current document at specified position false false

automatically corrects the grammatically errors

with t he caps lock key accidentally turned on reverses the case of the letters that were capitalized incorrectly and then turns off the caps lock B

password are not case sensitive hanging

password can be upto 15 characters long B top A an .xls data can not be inserted at specified position in the current document

a multiple documents files can be inserted in the single document

B A A

false false Hyperlink Child Document Document Page Layout Outline Layout none of the above none of the above none of the above

B A A B A

Type Over mode Remove

press the escape press the tab key key just keep typing D rows and lines and spaces height and width columns D backspace/ delete shift B enter/return spell checker thesaurus outliner C

send pictures to a friend From ___ To ____ Copy tabbing graphing Creating and editing documents annotation Creating and editing documents Spelling, grammar and autocorrect

send private messages to a friend Page setup Retrieve spacing word processing Storing information clip art Storing information

send a package D to a friend Print preview Save sorting spreadsheet None of the above clipboard Making Calculations B C B C

B C

Cut, copy, paste and clear Text which Numbers which appear at the appear on every top of every page page Keyboard, Monitor, Mouse, monitor keyboard and mouse and printer

Font, Paragraph, Bullet and Numbering C

Designated area on the document C

None of the above

clip-art file Spelling, grammar and autocorrect 10 point 2 inches.

microphone

digital scanner D

Cut, copy, None of the paste and clear above 15 point 3 inches.

You have not inserted a column section break..

You have not specified continuous section breaks.

25 point B impossible to determine. B Word cannot display columns during editing; you will see them only when you print the document. A to leave an original section of text in place while pasting a copy elsewhere D None of the above Find and Replace

to move a section of text from the original to store a file on location to a diskette another location A set of different graphics Grammar Checker

Mainly text Spell Checker

B B

Replace

Select all Delete, then paste

AutoCorrect Insert, then paste

Cut, then paste To give the original author a chance to reject suggested changes from the person who entered the revisions

To complicate the revision process and to force the author to spend more time making corrections A vertical line outside the left margin signifies A red underline a change has appears beneath been made at text that is to be that point in the added. document.

To allow multiple people to work on one document in collaboration with one another C

Comments are enclosed in a text box at the right of the document.

Through the Tools menu by choosing Track Changes command

Both through the Through tools on Tools menu and the Reviewing the Reviewing toolbar toolbar D The Versions command will allow you to save only two versions of a document: one version of the original and one version of any changes made to the document. A The previous version is opened automatically. B

The Versions command will allow you to save only one version of a document, including any changes that may have been made to that document. The latest version is opened automatically.

The Versions command will allow you to save only one version of a document without any changes that were just made to the document. The first and second versions are opened automatically.

Grammar check Spell check Word will show The most recent the name of the version will person who appear at the saved each bottom of the list. version. Tools Toggle button Forms Text fields

Thesaurus

Word is not able to tell the most recent version of a document. A Insert C A drop-down list B

Comments can be edited or deleted by right clicking the Comments highlighted cannot be deleted. text. Text which Numbers which appear at the appear on every top of every page page

Comments can be edited or deleted by left clicking the highlighted text.

None of the above

Press Return. graphics. bibliography. Paste button

Insert page Copy and paste. break. numbers. forms.

D C

find/search. macro. A Format Painter This action is not possible. C button

Bug Squashing Tools a section of text where the first letter of each sentence is lowercase and the rest are uppercase. typing it all in capital letters.

Error Injecting Format the guidelines used to establish where different elements of the newsletter will go. underlining the text of the pull quote.

Debugging Edit

D C

an enlarged capital letter at the beginning of a paragraph. A changing the color.

A dropped cap is a word that A pull quote is a starts with a quotation taken lowercase letter from (pulled) when it should from another have a capital document. letter. The height of each column 10 The number of columns 12

A grid is a set of horizontal and vertical lines that determine the placement of elements in a newsletter or other document. D The tab spacing within each D column D 72

Four Press Press Enter to Shift+Enter to create a section force a line break. break. A sans serif A sans serif font A serif font at 20 font at 45 at 10 points points points It depends on the left and right margins, and how many columns are 3 inches 4 inches specified. Two Press Ctrl+Shift+Enter to create a column break.

Three

q_id

DB62

q_desc op1 In MS-Access, while using form design view, for creating a command button for adding a new record, we should select the _______ category from the command button Record wizard Navigation columnar form filtering filter filter by form * true bound control button group database bound CURRDA TE() text box pivot table data sheet filter button wizard ram* true report autorepor t chart true true 60,000 true true

DB63 DB64 DB65 DB66 DB67 DB68 DB69 DB70 DB71 DB72 DB73 DB74 DB75

_______ form displays fields in a single horizontal row The process of arranging the data in a meaningful order is known as ___________ ______ are used to select only some particular records from the table or any other database objects In MS-Access, user may specify criteria for filter in form view using _________ ___wildcard character represents any single character Records cannot be sorted by a primary key A control without a data source is known as ___________ Set of related option buttons, check boxes and toggle buttons is known as _____________ The collection of related data and objects is called a ____________ Which of the following is control types ____________ In MS-Access, the function that gives the current date is _____________ _____is a control that lists set of data ______is a form that summarize large amount of data

DB76

______allows to create a filter by typing the value in a data sheet

DB77 DB78 DB79 DB80 DB81 DB82 DB83 DB84 DB85 DB86 DB87 DB88 DB89

Wizards for toolbox controls are called a __________ The wild card representation for any 5 letter word that starts with ram is ________________ Look up fields slow up data entry ____is an access object that displays un-editable data

_____option from the new object toolbar gives the easiest way of generating a report ______ represents data in a pictorial format Changes of one table can be carried over to another related table Hyperlinks are used to jump to any kind of information or data from a file The memo field can have text upto_____ characters in length In MS-Access, columnar layout can be used to view multiple records in a form In MS-Access, alter command may be used in adding a primary key to a table Update query is used to add records from one or more tables to the end of an existing table true In ms-access, datasheet view is available in ___________

table

DB90 DB91 DB92

______are used to jump to any kind of information from a datasheet or a form Home page will always be present as a first page of an application Make table queries create a new table from the records of another table In ms-access, to protect a database file from illegal access, we may set database password. The option of setting database password is available in _______ menu Foreign key is a field that uniquely identifies each record and accept no null values Data definition queries are used to create or change database objects The attributes of a composite key are known as ________ OLE object is a data type in access Data displayed in forms cannot be edited A sub form is used to display one to many relationship between tables We can switch from datasheet view to form view by selecting view -> form view option In MS-Access long integer is a datatype In MS-Access, while designing a table for a particular field, the Required parameter is set to yes. This validates the field as _______ Sorting is applied to select only some particular records Filter by form can be created from a forms shortcut menu Advanced filter uses a filter similar to the query design window to create a filter ? Wildcard character represents any number of characters _________ of the following is/are a type of chart A bound control is tied to a underlying query or table A calculated control uses expression as a source of data Text boxes cannot be bound controls The default query invoked by ms-access is A control can be bind to a record using row source property List box is a control that offers a list of choices If a table is joined to itself it is called a ________________ A picture box combines the activities of both a text box or a list box Line is a tool box control Text boxes can be part of a option group _____ chart exists as a separate object Filtering data is a way of arranging data in a meaning full order Wild card characters are used for sorting records Pivot tables are used to navigate to the other tables in a database Reports are used to represent un-editable data

table true true

DB93 DB94 DB95 DB96 DB97 DB98 DB99 DB100 DB101 DB102 DB103 DB104 DB105 DB106 DB107 DB108 DB109 DB110 DB111 DB112 DB113 DB114 DB115 DB116 DB117 DB118 DB119 DB120 DB121 DB122

Insert true true alternate keys true true true true true null true true true true pie true true true update query true true inner join true true true freestandi ng true true true true the first field of the table forms true delete true true

DB123 DB124 DB125 DB126 DB127 DB128

In MS -Access, the records in a table are sorted based on _________ Relationship is an association between _________ Summary options dialog box is used to summarize data ______ queries can be used to delete a group of records that meet some specific records Charts can convert numerical data in a easily understandable format Embedded charts exist separately

DB129

The chart which cannot exists as a separate entity are _______________ From ms - access, if we want to view the records stored in a table in ms - excel worksheet, we need to Page header is present at the beginning of each record Detail section has a header and footer A macro is performed only when the user initiates an event The macro is selected from the action field of a macro sheet A macro can be made to execute before the starting of a database _________ data type is generally used for fields assigned as primary keys in a table MS access objects can be published in the web In code-builder, got_focuse, click,dbl_click,enter are examples of _______ _______can be used to automate certain actions in response to events

freestandi ng use hyperlink true true true true true integer true actions report

DB130 DB131 DB132 DB133 DB134 DB135 DB1 DB2 DB3 DB4

DB5

In the macro sheet the macro is selected in the _____field

macro

DB6

To build complex expressions_____is used

calculator

DB7 DB8 DB9 DB10 DB11

The three list boxes present at the bottom of the expression builder are called_____ ________option is selected from the view menu to create macros with conditions _______report can be created with minimum user input _______layout of a form displays one record at a time The table or query name on which we are going to build our report is selected from the ____ dialogue box

action list conditions tabular tabular create report columnar and tabular true create fields primary key label wizard start header report footer

DB12 DB13 DB14 DB15 DB16 DB17 DB18

______and_____are the two types of auto reports available There are no wizards for creating a database in access ______option from the insert menu option is chosen to add an embedded chart In ms-access, while using SQL, references constraint is used for creating _______ _______is used to create a mailing label ______header is present at the beginning of the report ______is present at the bottom of each page in a report

DB19 DB20 DB21 DB22 DB23 DB24 DB25 DB26 DB27

In SQL, having clause is used for _________ ______field is added to the macro sheet when we select grouping option from the view menu condition VB ______can be used to create toolbars Modules _______query is used to add records from one or more tables into an existing table _______window is used to write VB code in access application Values for other tables, queries are maintained in look up fields data type Visual Basic language is a _____ tool ______ function is used to display a message box Other ms-office applications can be accessed from ms-access using a concept called ________ add report true RAD SysCmd OLE object linking and embeddin g OLE object linked exe form wizard static file append dollars unbound object display as icon create html startup bullet DBMS

for ordering records

DB28

OLE stands for_____

DB29 DB30 DB31

The application that supplies data in OLE is called an _________ If any change made on the object from the client side is reflected on the server then the object is said to be _____ _______is the file format that works on internet

DB32 DB33 DB34 DB35 DB36 DB37 DB38 DB39 DB40 DB41

______ is used to convert any ms-access object into html format _______ option in publish to web wizard produces a page that is static in nature _______query is used to create or change database objects in a current database Currency fields express the amount in _________ _______is selected from the toolbar to add an OLE object To display an OLE object in the form of an icon ____ option is selected from insert object dialogue box _______option from the file menu is selected to run 'publish to the web wizard' _____page in an web application is used to navigate to the rest of the pages in the application ______ is fired when an event is triggered is the concept based on a Visual Basic language Ms access is a ___________

DB42

A collection of data stored in different objects is known as a _________

data group

DB43 DB44 DB45 DB46 DB47

A blank database can be created using __________ Text type data can be of _____ characters in ACCESS ______is a datatype that assigns values automatically Tables cannot be imported from other databases If two tables having same values for the fields are joined it is called an ______

new dialog box 255 automatic number true inner join primary key cascade delete related records columnar table or tables

DB48

Duplication of records in a field won't be allowed if the fields are declared a________

DB49 DB50 DB51 DB52

Changes from a master table can be reflected on to the child table by selecting _____option To see more than one record at a time in a form we use _______

In SQL, delete command is used to remove _________ In MS-Access, filter excluding selection will display only those record(s) which meet the criteria. true

DB53

Properties of the fields are managed by _____ in Dynaset

property field crosstab queries action queries inner join true

DB54

______queries allows us to view data in row by column manner The type of queries that can update or delete record(s) in a table(s) are called __________ Joining tables without any matching values in the fields is called ____________ Primary key uniquely identifies each record

DB55 DB56 DB57

DB58 DB59 DB60 DB61 DB136 DB137

Which of the following dialog box is/are used in the creation of form ________ _______ query wizards are used to generate summary calculations for a table Properties of a form can be changed by selecting ______from view menu options Forms that are included in other forms are called ______________ In MS-Access. While appending records, the source and the target table must have similar structure and fields We can add our own functions to the expression elements list box of the expression builder

new form dialog box summary change properties included form true true

DB138 DB139 DB140 DB141 DB142 DB143 DB144 DB145 DB146 DB147

_______is the wildcard character which represents the presence of any number of characters Macros can be used to add a menu to a database object _____ header is a unique feature of reports Chart can either be a form or a report Group header will be present at the design view of a report even if the report is not grouped We can change from the design view to the form view without being prompted for saving the changes made Charts can be produced without the wizard Macros can be used to create user defined error messages Between and Not Between is ______ type of operators The default data type of VB is integer

& true page true true true true true relational true

DB148 DB149 DB150 DB151 DB152 DB153 DB154 DB155 DB156 DB157 DB158 DB159 DB160 DB161 DB162 DB163

Visual Basic is based on __________ _______is the name of the database object that displays data and can be used to edit data In access OLE objects cannot be linked _____ section is present for each record in the report A ________ sheet lists all the properties that pertain to the form or the controls Textboxes can also be an example of unbound control In MS-Access, we may design command buttons for navigating records _______are forms that are included in other forms _______ are used to represent our data in graphical format A field with a _______ uniquely identifies each record Large amount of data can be summarized using ______ tables _______ are employed to select only some particular records from a database object ______ control need not have a data source ______ control combines the functionality of both a text box and a drop down list MS access is a DBMS A form can be bind to a record source using _____ property of the form

action language report true group data true true sub forms graphs number pivot filters form list box true form name tabular form sub forms calculated calculated sub form

DB164 DB165 DB166 DB167 DB168

______ forms displays field in single row ______ forms are usually used for tables with one to many relationship _______ control uses an expression as a source of control _______ control is tied to field _______is the form that can be created with minimum input from the user

DB169

______option from the tool menu is selected for setting relationships between tables

set relation

DB170 DB171 DB172 DB173 DB174

______,______and_____are the buttons belonging to the options group _________allows us to create a filter from a field short cut menu ________is a database object which displays data but cannot be used to edit data What term applies to a collection of related records in a database? All of the following terms are related to computerized databases except which one?

option, toggle and command buttons filter by form form clipboard search A way to analyse and manipulat e numerical informatio n

DB175

What is a database?

DB176 DB177

What does a record contain? An RDBMS is a

Informatio n about certain programs remote DBMS storing data offline at a separate site Key verificatio n A way to analyse and manipulat e numerical informatio n

DB178

Data Warehousing refers to

DB179

Unauthorised alteration of on-line records can be prevented by employing

DB180

What is a database?

DB181

What does a record contain?

Informatio n about certain programs Reports allow users to extract informatio n as hard copy (printed output)

DB182

What is a report?

DB183

What is the best way to analyse and change data

Extracting and analysing data

DB184

What are some popular office orientated software applications?

Compilers , interpreter s, editors DEFAULT and NOT NULL constraint s CHANGE TABLE remote DBMS storing data offline at a separate site

DB185 DB186 DB187

Which of the following constraints can be used to enforce the uniqueness of rows in a table? Which of the following commands is used to change the structure of table? An RDBMS is a

DB188

DB189

Data Warehousing refers to You are creating a client application that calls ActiveX DLLs. Which of the following properties of the Err object provides the name of a component that sends an error back to the client application?

Number

DB190

DB191 DB192 DB193 DB194

using a This database holds personal information. The user can help to keep it confidential by password the If the database holds customer names and addresses, personalised letters can be product created automatically using code Application software suited to storing the survey information obtained in the table A would be database bookmark The characters * and ? are sometimes used in search criteria as s Auto Which of the following field types will generate the primary key automatically? Primary

DB195

Referential integrity ensures that the:

records in a dynaset are consistent with the underlying tables.

DB196

Tables are related to one another through a:

DB197

A foreign key is:

foreign key. the primary key of both related tables.

DB198

You are creating a banking database to track customer loans. The bank will, of course, have many customers, each of whom may take out one or more loans, while each loan One-tomay be associated with only one customer (there are no joint accounts). What is the re one In a one-to-many relationship between Companies and Employees, which field is found EmployeeI in both tables? D The Tools menu, Relationsh ip window

DB199

DB200

Which of the following ensures that records in related tables are consistent with one another? For example, it ensures that you cannot add a record with an invalid foreign key.

DB201

How would you delete a relationship between tables in the Relationships window?

Double click the Relationsh ip line That there are several customers associate d with that ID

DB202

In a Customers tables, what does a plus sign next to the CustomerID field mean?

DB203

What is required of the fields that join two tables?

They must both be numbers

DB204

Nothing, Access ignores Assume a one-to-many relationship between the Customers table and the Loans table, the with referential integrity in effect. What happens when you attempt to delete a attempted customer ID from the Customer table that still has entries in the Loans table? command.

DB205

The Which of the following is true when viewing a main form and its associated subform in subform is the Form Design view? not visible.

DB206 DB207

Which of the following relationships does not belong in a database based on a professional sports league such as football or basketball? Which symbol is used at the end of the join line in a related table to signify the many side of a one-to-many relationship?

A one-tomany relationshi p between teams and players #

DB208

You have created a one-to-many relationship with referential integrity between a Customers table and a Loans table. From which table can you delete a record?

Either table at any time prompt, title bar text, icon. Dim CreateList . A check box enables the form user to choose from one of several existing entries. must be set for one word.

DB209

The correct order of the arguments for the MsgBox statement is:

DB210

The first statement in a procedure named CreateList is:

DB211

Which of the following is TRUE related to form fields?

DB212

A text field:

DB213 DB214

The purpose of a database is to: A database stores:

help people keep track of things. data.

DB215

A database records:

facts. singleuser database applicatio n singleuser database applicatio n Sequential Query Language (SQL) Database Modeling System Jet

DB216

A sales contact manager used by a salesperson is an example of _______________

DB217

A Customer Resource Management (CRM) system is an example of_________

DB218

The industry standard supported by all major DBMSs that allows tables to be joined together is called __________.

DB219 DB220

A program whose job is to create, process and administer databases is called the _____ Microsoft Access may use which of the following DBMS engines?

DB221

DB222 DB223

Which of the following are basic components of an enterprise-class database system? The user the database applicatio n(s) interact(s) with the In an enterprise-class database system ________ . DBMS creates In an enterprise-class database system, the database application ___ . queries

DB224

In an enterprise-class database system, reports are created by ____________________ .

the user

DB225 DB226

A database is considered "self-describing" because _______ . In an enterprise-class database system, the database _________ .

all the users' data is in one place holds user data

DB227

A database may contain _________________________ .

tables

DB228

DB229

from existing data from existing nonA database designed to implement requirements for a reporting application needed by database the Sales department is a database being designed _______ . data A database designed using spreadsheets from the Sales department is a database being designed _________________________ .

DB230

A database designed to combine two databases used by the Sales department is a database being designed _________________________ .

from existing data

DB231

Database professionals use ________________ as specific data sources for studies and analyses.

data marts

DB232

Database professionals use a set of principles called ________________ to guide and data assess database design. marts

DB233

A very popular development technique used by database professionals for database design is known as _______________________ .

data marts

DB234

A very popular development technique used by database professionals to adopt a database design to new or changing requirement is known as _____ .

data marts file managers

DB235

The predecessor(s) of database processing was (were) __________ .

DB236

In a relation __________________________ .

entities in a column vary as to kind

DB237 DB238 DB239 DB240 DB241 DB242

An attribute is also known as a(n)

table record record

A combination of one or more columns used to identify particular rows in a is___ . A combination of two or more columns used to identify particular rows in a relation is________ . A determinant that determines all the other columns in a relation is______ . When designing a database, one of the candidate keys in a relation is selected as the _________ . Normalization is a process used to deal with which of the following modification anomalies?

DB243

record composite key Insertion anomaly assess the existing tables' structure When you are given a set of tables and asked to create a database to store their data, and the first step is to ____ . content are supplied by several wellestablishe d manufactu rers

DB244

Modern microcomputer personal DBMS products______.

DB245

DB246

Which of the following are true about data mining applications? We have obtained access to the company's operational data. We examine 50 records for customers with phone numbers that should use the current area code of 345. Of these 50 records, we find 10 that still use an older area code of 567. This is an example dirty data We have obtained access to the company's operational data. We have been asked to produce a report with an item by item analysis of sales, but the only sales figure available is the total sale value for each order. This is example of_____ dirty data

They use sophistica ted mathemati cal technique s.

DB247

DB248 DB249

A data warehouse database differs from an operational database because: Which of the following objects is used to display a menu?

DB250

Which of the following objects are NOT found in an Access application?

data warehous e data are not stored in tables. Form Forms and reports

DB251

You are developing an Access application that you expect to upgrade periodically. Which of the following statements is TRUE?

It will be easier for the user to upgrade it if the objects and tables are in one database.

DB252 DB253

Which of the following statements regarding Access applications is NOT true? Which of the following brings a copy of the table into the current database and does not maintain a tie to the original table?

The Link Tables command can be used to associate the tables in one database with the objects in another database. Import

DB254

What makes a database an application?

It contains more than one table Menu Wizard create backups for mission critical corporate data.

DB255

What is the Access tool that is used to create the user interface?

DB256

The purpose of a data warehouse is to:

op2 op3 op4 ans Record Form Operatio Operation None of s the above B ns one to tabular hierarchic many al form form B form ordering sorts filter by selection $ false unbound control option group form unbound sorting pipes filter by menu @ querying C

gateways A None of the above A D ? B data less data control control B controls record group group B none of collection the above A all of the controlled above C DAY() C

TODAY() DATE() combo box list box columnar tabular form form filter by input control wizard ram?? false form report label false false 255 false false false query form filter by form option control wizard two of the above table module bitmap

static text B main form A none of the above C tool wizard C none of the above B B ledger A none of the above A report A A A D 64,000 B A B all of the D above

25,000

form false false

report

hyperlink D A A none of the above C B A C A B A A B

Records

Tools

false false composite candidate primary keys key keys false false false false false not null false false false false bar false false false select query false false outer join false false false embedde d false false false false the last field of the table reports false insert false false zero

both 1 and 2

delete query

self join

none of the above B B B A B none of the above C A A B append query B B A table join C B A B sub chart D B B B A

stand alone

primary none of key field the above C attributes entities D A append add A A B

embedde stand alone d use datasheet use import in forms false false false false false primary number number false procedure events s form chart expressio n elements comments code builder

sub chart B use export

D B B B A A D A

auto number

none of the above B macros D

macro list action columnar columnar link report

action D expressio expressio n n builder elements C expressio n elements none of list box the above C none of insert the above A auto embedde report d C datasheet justified B embedde d report new report D

stable and dynamic none of unstable and static the above false insert add chart chart chart alternate foreign none of key key the above chart mail none of wizard wizard the above group page report header header header page group none of footer footer the above

A B C C A D B

for updating records group reports append macro sheet false RAP MsgBox DDE

for specifying conditions with group by clause macro names forms insert

none of the above C none of the above C macros D

delete B none of module the above C A none of RAID the above A none of message the above B none of CME the above A

on line on line execution editing

OLE OLE client server embedde d connected edited DLL BMP html publish to report query web wizard wizard wizard dynamic none of static html file the above data add insert definition rupees pesos yen bound command object button list box create display link icon save as none of new html the above none of home end the above none of command procedure the above RDBMS front end language

none of the above A OLE communic ator C A D

D B D A B A C B C A

data data collection database storage

new blank database dialog box 64000 AutoNum ber false

new database database dialog box dialog box A 235 63500 A automatic number field B B explicit none of outer join join the above A no candidate duplicate not null key key A cascade cascade change update change all related related related records fields records C both a and none of tabular b the above B query or record or none of queries records the above C false field property B Dynaset field properties properties B update queries update queries

row/colum select n queries queries change/de row/colum lete n queries queries no match self join join false form create dialog box sum form wizard dialog append form properties properties sub form false false

outer join D A

both 1 and 3 D simple D new properties B

new form child form B A A

# false detail false false false false false list false

? group

* topic

D A C A B A B A C B

range

logical

event structured procedura query l based none of language language the above C form false record property false false child forms chart primary key create queries bound combo box false control query table B B D

session detail both a and none of b the above B A A none of inner form the above A labels report B index form sorts unbound button record source identifier B none of the above A

forms A none of the above C option button B A none of the above C none of the above A none of the above A none of the above A static C columnar form B

data sheet chart form form tabular columnar form form bound unbound unbound

bound tabular auto form form

connect

relationshi none of ps the above C

option button, command list, check toggle button, and button and check and combo check list boxes boxes boxes D filter by filter by filter by report record input D report file macro field field sort names An organised way of A tool to storing produce informatio high n about a quality set of document similar s things It contains all the data about one specific item relative DBMS table layout record grab B B D

A way of maintainin g a log C

A document which contains text Relational DBMS

A collection of files B Reliable DBMS C

uses tape as opposed to disk C Database Computer access matching controls D An organised way of storing A tool to informatio produce n about a high set of qualitydoc similar None of uments things the above C backing up data regularly Computer sequence checks is related to data mining

It contains all the data about one specific item Reports provide a very flexible way of creating and editing document s

A document which contains None of text the above B A tool which allows text and graphics to be placed in document None of s the above A

Spreadsh eets make data easy Using to analyse queries Word processor s, Network spreadshe software, ets, backup databases systems , DTP PRIMARY KEY and UNIQUE constraint s ALTER TABLE Relational DBMS

None of the above C

None of the above C

FOREIGN KEY constraint s MODIFY TABLE relative DBMS

IDENTITY columns C UPDATE TABLE C Reliable DBMS C

backing up data regularly

uses tape is related as to data opposed mining to disk C

Descriptio Compone n nt Source

keeping the keeping a original backup paper copy copy the primary mail key merge Graphics browser

saving the file with different filenames A

e-mail e-mail

C A C C

operators wildcards engines AutoNum Auto ID ber Auto Key forms in a database are consistent with the underlying tables or queries.

related tables in a database are consistent with one another.

reports are consistent with the underlying tables or queries. B

query and main form its report and and a associate its related subform. d dynaset. query. A not a the primary primary a field key of key of the from an either related unrelated related table. table. table. B

One-tomany

Many-tomany

Many-toone

CompanyI Employee Company D LastName Address A The oneto-many relationshi p B

Referentia The join l integrity line

Right-click the Relationsh ip line, then select Delete from the shortcut menu

Select Undo in the Relationsh ips pulldown menu

Click the Delete Relationsh ips button on the toolbar B

That records That That there can be some of are added by the data is records in clicking on not a related the plus viewable table sign C They cannot be They must They AutoNum be the cannot be ber data same data text fields types type D The customer s ID is deleted from the Customer s table, The and all the customer related s ID is loans are deleted deleted from the from the Customer Loans s table. table.

An error message is displayed. D

The subform is an object on the The form and subform is The can be displayed subform is moved or in displayed sized like Datasheet in Form any other view. view. object. D

A one-tomany relationshi p between teams and coaches M

A one-tomany relationshi p between coaches and teams

A many-tomany relationshi p between players and teams C * C

The Customer s table only when there are Loan records associate d with that customer

prompt, title bar icon, title text, icon, bar text. prompt. B Sub CreateList CreateList . . Sub. B A text field enables the form user to choose from one of several existing entries. must be set for multiple words. A dropdown list enables the user to choose from one of several existing entries.

The Loans table at any time title bar text, prompt, icon.

Neither table

A dropdown list enables the user to enter text.

does not must be have to be set for two set. words. C maintain data on create different tables of things in store data rows and different in tables. columns. tables. A relationshi all of the ps. metadata. above D

figures.

multiuser database applicatio n

multiuser database applicatio n Structured Question Language (SQL) Database Managem ent System SQL Server

informatio n. ecommerc e database applicatio n ecommerc e database applicatio n Structured Query Language (SQL) Data Business Model System

a and b

a or b

None of above

Relational Question Language (RQL) C Relational Model Manager B D

Oracle a and b The database The managem database ent applicatio system All of the n (DBMS) above.

the DBMS accesses the database data creates form

None of above creates reports the database the managem database ent applicatio system n (DBMS)

All of above b and c

A D

the database B

it reduces data duplicatio n holds metadata

metadata as a new systems developm ent project as a new systems developm ent project as a new systems developm ent project

it contains a descriptio n of its own structure holds indexes stored procedure s as a redesign of an existing database as a redesign of an existing database as a redesign of an existing database

All of the above. All of the above. All of the above.

C D

a and b

a and b

normalizat data ion models

normalizat data ion models

normalizat data ion models entityrelationshi normalizat p data data ion modeling migration relational hierarchic network data al models models model more than the order the order one of the of the column columns rows is can use is unimporta the same important nt name

a and b entityrelationshi p data modeling entityrelationshi p data modeling entityrelationshi p data modeling

relation field field field primary key Update anomaly

row key composite key foreign key foreign key Deletion anomaly

field tuple foreign key candidate key surrogate key All of above

D C C D B D

create move the design the one or data into database more new the new structure tables database A

were essentially killed off by MS Access Their report delivery is more difficult than report delivery for reporting systems.

are not have poor true response DBMS time products

Nonintegr None of ated data the above A

a "wrong inconsiste nonintegra format" nt data ted data problem a "wrong inconsiste nonintegra format" nt data ted data problem

data warehous e databases do not have metadata. Table

data warehous e data are often denormali zed. b and c Report Query

C A

Queries and tables Macros

Spreadsh eets D Regardles s of how the objects and tables are stored, the user will have to reenter the data in the tables when the applicatio n is upgraded. B An applicatio n can be created in such a way that it objects such as forms and reports can be changed without disturbing the existing data. C Join A

It will be easier for the user to upgrade it if the objects are in one database and the tables in another. An applicatio n may consist of multiple databases , each with multiple objects, linked to yet another database containing only tables. Link

It is advisable to put each object and table into a separate database.

All objects in an applicatio n, including the tables, must reside within the same database. Merge

It contains a user interface, or switchboa rd Interface Build Design Menu Wizard put key business centralize informatio the n into the managea hands or bility of more data decision collection. makers. It contains tables, reports, queries, and forms

It contains macros C Switchboa rd Manager D

store all corporate transactio n data in one single location. C

q_id VB1 VB2 VB3

q_desc Microsoft visual basic project file has _______ file extension. In visual basic, _______ method is used to add an item in a combobox In visual basic, _______ method is used to load picture during runtime in an image control In visual basic, to populate a drive list box with a directory list box __________ statement is used In visual basic, to display a message in the run time _________ function is used In visual basic, to populate a directory list box with a file list box ________ statement is used In visual basic, ________ is a property of a recordset object which counts the number of rows in a recordsourse object In visual basic, using a data control, a record can only be added from the last record. Adding a new record is only possible using _______ method of a recordset object. In visual basic, using a data control, a record is saved to a recordsource object using _______ method of a recordset object. In visual basic, using a data control, to navigate to the previous record ________ method of a recordset object is used. In visual basic, when a record pointer reaches to the last record, _______ property of a recordset object is automatically set to ______ In visual basic, the explorer view of a project is displayed in ___________ In visual basic, when a record pointer reaches to the first record, _______ property of a recordset object is automatically set to ______ In visual basic, _______ is a method to convert a string into integer. In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type of shape should we get? In visual basic, a timer event is only available in timer control. In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any object In visual basic, _______ is a property of a textbox control to set a color of a text. In visual basic, _______ property of a textbox control is set to _______ to underline a text In visual basic, _______ property of a textbox control is used to change the size of text. In visual basic, the interval property of a timer control is given in ________ In visual basic, _______ property of listbox control counts the number of items in the list In visual basic, the properties of various controls can be set using __________ In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a messagebox function. In visual basic, ________ is a function which displays a message and it also allows the user to enter values in a form object

VB4 VB5 VB6 VB7

VB8 VB9 VB10 VB11 VB12 VB13 VB14 VB15 VB16 VB17 VB18 VB19 VB20 VB21 VB22 VB23 VB24 VB25

VB26 VB27 VB28 VB29 VB30

In visual basic, using a data control, ________ is a recordset type which allows to add a new record and also to update existing record in a recordsourse object In visual basic, while closing a form _______ event of a form object is triggered earlier to terminate event. In visual basic, to give a backcolor or to bring in a picture to a command button can only be done if we set the style property to ______ In visual basic, a method RGB(255,0,0) will generate _______ color In visual basic, a method RGB(255,255,255) will generate _______ color

VB31

In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible.

VB32 VB33 VB34 VB35 VB36 VB37 VB38 VB39 VB40 VB41 VB42

In visual basic, if a user uses a function key F4 _________ becomes visible. In visual basic, when a textbox control receives the focus ________ event is triggered. In visual basic, a form is a ________ object. Microsoft visual basic is a Rapid Application Development tool. In visual basic, when a form object appears on the screen _________ event is triggered. In visual basic, to display text on a label object _________ property is used In visual basic, _______ object is used to access the database and also to manage the data in the database. In visual basic, when a checkbox control is checked _______ property is automatically assigned with 1. In visual basic, _______ keyword is used to declare a variable What is the extension of the Visual Basic project file that stores the design of a user control. Which event of a text box would you use for validating the data entered by the user?

VB43 VB44

Which of the following statements forces inline error handling? The _______ method resets the contents of bound controls to their original values when the user clicks on the cancel button.

VB45 VB46

To deactivate the Form UnLoad event, you make the following change in the function definiton: How many root nodes can a TreeView control have?

VB47

A project group is a Project which:

VB48

Procedures declared in a _____ are local whereas procedures declared in a ______ are available to the whole application.

VB49 VB50

How can you keep the user from exiting a form by clicking the Close button? The _______ property enables Visual Basic to draw complete images in memory before displaying them on the Screen.

VB51

You want to display the code and the description of an error. What would be the correct syntax?

VB52 VB53 VB54

What is the purpose of the Image List Control? Which method would you use to get a free or unused File identifier while opening any file: Which property procedure is used to retrieve the value of a property?

VB55 VB56

Which of the following can be shown to the user using the Common Dialog control in VB? Which of the following are not properties of Command Button:

VB57 VB58

Which events enable you to determine which key was pressed by the user? In order to access a file in Non-textual format, you have to open file in: Visual Basic displays information depending upon the current value of two properties of the form, called: Which of the following procedure types will execute when you assign a value to a property of an object? In order to overlap the controls (say a command button) during design time, we use the Send To Back or Bring To Front option from the Edit menu. To change it dynamically (i.e.during program execution) we need to change: Which property of the ProgressBar determines how much of the bar is filled? The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program.

VB59 VB60

VB61 VB62 VB63

VB64

The caption and the name properties of the command button:

VB65 VB66

You try to initialize a new Object variable with the following line but receive an error. What could be the possible cause? Set MyVar = New Classname Which of the following will perform a direct execution of a Command object?

VB67 VB68

The vb Critical symbol displays: vbYesNo is an example of a(n):

VB69

VB70 VB71

The primary difference between the MsgBox statement and the InputBox function is the: Which of the following is TRUE about a protected form (i.e., a form where the Protect Form button on the Forms toolbar is toggled on and is assumed to remain in that position)? Which event is triggered when the user moves to another open form? To deactivate the Form UnLoad event, you make the following change in the function definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To prevent the Form from closing, you will set the:

VB72

op1 .vbg add load Drive1.Drive= Dir1.Path messagebox( ) Dir1.Path=Fil e1.Path openrecordse t .vbp

op2 .frm loaditem

op3

additem

loadpicture addpicture Dir1.Path = File1.Path = Drive1.Drive Dir1.Path message() Dir1.Path = Drive1.Drive opendatabas e msgbox() File1.Path = Dir1.Path recordcount

op4 .frx none of the above none of the above

ans B B B

none of the above B none of the above C File1.pattern= Dir1.path C count C

update append movenext eof,false properties window bof,false value() circle true true fontcolor

append update movelast movelast,tru e form layout window movefirst,tru e int() rectangle false false

addnew additem moveprevious movelast,false toolbox movefirst,false number() square

additem addnew movefirst eof,true project explorer bof,true val() oval

C B C D D D D D A A

color forecolor fontunderlin underline,true e,true textunderline,true textsize size foresize oneone- millionth hundredth of one-thousandth of a of a second a second second count form layout window title msgbox() recordcount itemcount prperties project explorer window prompt textbox vbmsgboxstyle label

none of the above none of the above

C B

D fontsize one-ten thousandth of a second C listcount toolbox none of the above inputbox() D B C D

opensnapsh opendynaset ot dbopensnapshot load standard blue red properties window properties window change child true load activate opaque red green form layout window form layout window lostfocus parent false unload unload transparent green blue

dbopendyna D set initialze graphical black white project explorer window project explorer window gotfocus none of the above C D B D

toolbox

toolbox text container

A D C A D C B C B B A

initialize caption openrecordset value var .ctr Check

text name opendatabas e dbengine enabled dime .ctx Validate On Error GoTo linelabel UpdateContr ols Cancel parameter to a non-zero value 1 Consists of several Programs visible dim .ctl Validation On Error GoTo Inline

activate none of the above none of the above style none of the above .ocx Audit

On Error Stop

On Error Resume Next D Resize UnloadMode parameter to a zero value None of the above Consists of several Projects A

PaintPicture Refresh Cancel UnloadMode parameter to parameter to a non0 zero value 2 Consists of several Applications 3 Consists of Various Forms And Code Modules

A D

Form window, Project standard or window, view Class module, code code module code window module

None of the above

Place code in the Terminate event AutoRedraw = True

PaintPicture A Msgbox error.number & Msgbox Msgbox err.no & err.number & Msgbox error.number error.descrip err.text err.text & error.text D tion To provide a repository for images used by To display To help in images to the creating a To allow the editing of other user ToolBar icons D controls FreeFile Retrieve Common messages passed to Windows Caption GetFileNum GetFile GetProperty Get GetBytes Value A B

Place code in the Unload Place code in the Deactivate event event AutoRedraw = False Refresh

None of the above

Open dialog box Visible Click, KeyUp Click and and KeyPress KeyDown Binary Ascii Format Format CurrentX ScaleLeft and and ScaleTop CurrentY Property Property Get Assign Background Caption color property property Min Max Shell Are one and the same You do not need to use the Set command here The Open method Substr Can be different at times You do not have the permission to access the class The Exec method

Windows explorer Multi-Line

Input box Font KeyPress, KeyUp and KeyUp and KeyDown KeyDown Input Mode ScaleHeight and ScaleTop Property Let Output mode

D C

D B

x and y Property Set AutoRedraw property CurrentVal CStr None of the above

A C

ZOrder property Value SetAttr Are actually not properties

C B A

MyVar has not been declared The ExecProcedure method

None of the above None of the above

C D

A warning query icon

None of the above built-in statement. variable. intrinsic constant. procedure. MsgBox statement can be created InputBox MsgBox with the function statement macro returns a returns a InputBox function can recorder, value, while value, while be created with the while the the InputBox the MsgBox macro recorder, while InputBox function does statement the MsgBox function not. statement cannot. cannot. does not. Data cannot The form A new check Data can be be entered can be box can be into the form. modified. added. entered. An exclamation icon Unload Cancel parameter to a non-zero value QueryUnload Deactivate Cancel UnloadMode parameter to parameter to a non0 zero value Terminate UnloadMode parameter to a zero value

A critical message icon

B C

C C

AC64

Q_desc In an accounting information system, which of the following types of computer files most likely would be a master file?

AC65 BC 113 BC 114 BC 114 BC 115 BC 116 BC 116 BC 117 BC 117 BC 118 BC 118 BC 119 BC 119 BC 12 BC 120 BC 120 BC 121 BC 122 BC 123 BC 124 BC 125 BC 126 BC 128 BC 129 BC 13 BC 130 BC 133 BC 134 BC 135 BC 136 BC 137 BC 138 BC 14

Which of the following is an advantage of a computer-based system for transaction processing over a manual system? A computer-based system: Which of the following is not the component of a CPU A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The following is an information not found in the trailer label Hard copy is a term used to describe...? What do the abbreviations VAB stand for What control would prevent the accidental erasure of customer information from a magnetic tape What are the individual dots which make up a picture on the monitor screen called? Header label normally include all the following except the A daisy wheel is a type of...? Which approach or technique is a control usually associated with microcomputers An impact printer creates characters by using...? The best security control in a microcomputer environment is to What would you NOT use with a flatbed plotter? What do you need for an ink jet printer? The greatest control exposure in a microcomputer environment is the lack of What do you need for an ink jet printer? A laser printer does NOT use? The amount of data that a disk may contain is known as the disks...? You can ________ protect a floppy disk. Information on a hard disk is usually backed-up using a...? Magnetic tape is a...? Hard disks can have a storage capacity in the region of...? Which storage device has the largest capacity in Mb? Which storage device cannot be erased? You can ________ protect a floppy disk Where should floppy disks be stored? The contents of these chips are lost when the computer is switched off? What are responsible for storing permanent data and instructions? Which parts of the computer perform arithmetic calculations? What are small high speed memory units used for storing temporary results? How many bits of information can each memory cell in a computer chip hold? What type of computer chips are said to be volatile? Magnetic tape is a...?

BC 14

Software can be divided into two areas:

BC 140 BC 141 BC 142 BC 143 BC 144 BC 145 BC 146

Travel agents use this computer system when reserving flights Which computers are used in the weather forecasting industry? Vacuum tube based electronic computers are...? Which generation of computer was developed from microchips? Which generation of computer uses more than one microprocessor? Which generation of computer developed using integrated circuits? Which generation of computer developed using solid state components?

BC 147

Name three steps involved in developing an information system

BC 148

How do you define analysis of an information system?

BC 149 BC 15 BC 15

What areas need to be considered in the SOFTWARE design process? What is the function of systems software? Formatting a disk results in all the data being...?

BC 151

What is Direct Implementation?

BC 152

What is parallel running?

BC 153

What documents are produced during the development of a system?

BC 154

What are User Guides are used for?

BC 16 BC 16

Systems software can be categorised into: Which storage device cannot be erased?

BC 17

Application software are programs that are written

BC 17 BC 170 BC 18

Which bus carries information between processors and peripherals? Convert the decimal number 2989 to Hexadecimal Which bus controls the sequencing of read/write operations?

BC 183 BC 184 BC 185 BC 186 BC 187 BC 188 BC 189 BC 19 BC 190 BC 191

What are utilities? Numbers are stored and transmitted inside a computer in The original ASCII codes A Nibble corresponds to A gigabyte represents A 32-bit processor has A parity bit is he contents of these chips are lost when the computer is switched off? Clock speed is measured in Cache memory enhances

BC 192 BC 20

CISC machines Which parts of the computer perform arithmetic calculations?

BC 200 BC 201 BC 202 BC 203

Every data from the primary memory will be erased if An RS-232 interface is For print quality you would expect best results from ROM

BC 204

A UPS

BC 206 BC 207

smart card Laptop computers use

BC 208

Multiprogramming refers to

BC 209 BC 21 BC 21

Multitasking refers to What are small high speed memory units used for storing temporary results? A good way to exchange information that changes rapidly is through

BC 210 BC 211

Multiprogramming is a prerequisite for Timesharing is the same as

BC 212

Virtual memory is

BC 213 BC 22

Multiprocessing is To help keep sensitive computer-based information confidential, the user should

BC 22 BC 228 BC 229 BC 23

What is the function of a disk drive? A 4GL is A nanosecond is What small, hand-held device is used to move the cursor to a specific location on the screen?

BC 230

The memory address register is used to store

BC 231

The memory data register is used to store

BC 232 BC 24 BC 25 BC 26 BC 27 BC 28 BC 28

The instruction register stores Which of the following is used to indicate the location on the computer monitor? A mathematical procedure that can be explicitly coded in a set of computer language instructions that manipulate data. Which of the following translates a program written in high-level language into machine language for execution? Detecting errors in real memory is a function of To find where a file has been saved on disk, the user should A series of instructions telling the computer how to process data or files is defined as a

BC 29 BC 29 BC 30 BC 31 BC 32 BC 32 BC 33 BC 34 BC 35 BC 36 BC 37

To ensure that data is not lost if a computer system fails, the user should Having a single CPU alternatively process tasks entered from multiple terminals is called The place in the CPU where the data and programs are temporarily stored during processing is called the All are examples of computer software except Computer manufactures are now installing software programs permanently inside the computer. It is known as Which of the following file organisation forms most efficiently allows access to a record The part of the computer system controlling data manipulation is called the For direct access storage devices the recording area is divided into The data hierarchy from the largest to the smallest is Which of the following hardware or software system controls provides a detailed record of all activities performed by a computer system Which one of the following parts of a computer is necessary to enable it to play music?

BC 37 BC 38

An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15 minutes of sound and 1 minute of video. Which of the four different media listed takes up most space on the CD-ROM? Which one of the following printers is suitable for printing sprocket fed carbon copies?

BC 38 BC 39 BC 40 BC 41 BC 42 BC 43 BC 44 BC 45 BC 46 BC 47

Multimedia software can be most productively used for To be effective a virus checker should be Which one of the following software applications would be the MOST appropriate for performing numerical and statistical calculations? Passwords enable users to 12. How many bytes do 4 Kilobytes represent? Back up of the data files will help to prevent Which one of the following is the MOST common internet protocol? The advantage of a PC network is that The term A:\ refers to UPS stands for

BC 48 BC 48

The main problem associated with uninstalling software is that You are conducting research for a Income Tax assignment. The raw facts you collect are called

BC 484

A flow chart is the

BC 485 BC 49 BC 491 BC 492

A voucher entry in Tally is done for Passwords are applied to files in order to Each of the following is an enabler of IT-business alignment except: The basic systems model is used to describe virtually all information systems and it consists of the following elements:

BC 494 BC 499 BC 50 BC 506 BC 51

What is a computer-aided design system? A(n) __________ offers a solution package for an entire industry. File extensions are used in order to Information systems controls include all of the following EXCEPT: Hashing for disk files is called

BC 52 BC 53 BC 53 BC 54

Components of expert systems include: a) inference engine; b) user interface; c) knowledge base; d) fuzzy logic Black box testing and white box testing are part of: What is the term used to describe the point of interaction between a computer and any other entity, such as a printer or human operator? The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility

BC 54 BC 55 BC 555 BC 56 BC 57 BC 58 BC 59 BC 60 BC 60 BC 60 BC 61

Which of the following is an acceptable way to shut down the computer? Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot remember where you saved them. Which is the best way to locate the files? Components of an information system model are: a) applications architecture; b) functional architecture; c) technology architecture; d) information architecture Benchmarks form part of: Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run totals Which is not part of help desk documentation: Testing of individual modules is known as: Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface architecture; d) presentation architecture Which is part of installation testing: The computer operating system performs scheduling, resource allocation, and data retrieval functions based on a set of instructions provided by the: Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio

BC 61 BC 62 BC 63 BC 64 BC 65

Which of the following procedures should be included in the disaster recovery plan for an Information Technology department? Designing relationships among components is part of: Several Computers connected together is called: Which network topology uses a Hub? Which of the following topologies is used for Ethernet?

BC 66 BC 67

Application software are programs Which type of file search method requires a computer first read all locations preceding the desired one Which of the following areas of responsibility are normally assigned to a systems programmer in a computer system environment? Which of the following is recommended when many searches for data are required

BC 67 BC 68

BC 69

It is unlikely that a magnetic tape containing several thousand blocked records can be used on two machines of different architecture directly because

BC 70 BC 71

Which component of the CPU has the most influence on its cost versus performance Which of the following terms applies to network used to connect computers with other computers, peripherals and workstations that are in fairly close proximity

BC 72 BC 73

Intelligent terminals differ from dumb terminals in that they A computer is to be linked to 8 terminals using a single communication link. To permit simultaneous terminal operations, communication path will require which of the following

BC 74 BC 75 BC 76 BC 77 BC 78 BC 79

A modem is a device that A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives and printers. This type of network is called a A computer based system for sending, forwarding, receiving and storing messages is called an If a workstation contains a processor, monitor, screen manipulation device, printer, storage and communication capabilities, it is said to be Terminal hardware controls include RS-232 is a

BC 79

What is a compiler?

BC 80 BC 80

What are the stages in the compilation process? Which of the following is not a data transmission coding scheme

BC 81 BC 81 BC 82

What is the definition of an interpreter? A device used in data communications to divide a transmission signal into several sub-bands is known as a Third generation languages such as COBOL, C, and FORTRAN are referred to as

BC 82 BC 83

Serial Communication is used over long distance because it In what areas is the COBOL programming language used?

BC 83

The primary function of a front-end processor is to

BC 84 BC 84

What is the first stage in program development? Which of the following is not used for data transmission within a local area network

BC 85 BC 85

What is System Analysis? A device to device hardware communication link is called

BC 86 BC 86 BC 87 BC 87 BC 88 BC 88 BC 89 BC 89 BC 9 BC 90 BC 90 BC 91 BC 91 BC 92 BC 92 BC 93 BC 93 BC 94 BC 94

What will a good software provider consider? The topology of a network can be each of the following except What is the 8-bit binary value of the decimal number 85? Which is the most common data transmission error checking method What is the decimal value of the binary number 1111? Which of the following devices merges communication signals onto a single line What is the decimal value of the octal number 215? Which tool is used to help an organization build and use business intelligence? Cache memory enhances What is the decimal value of the hexadecimal number FF? Numbers are stored and transmitted inside a computer in What is the hexadecimal value of the decimal number 1476? A byte corresponds to What does EBCDIC coding of numbers mean? A Kb corresponds to What is the binary sum of 01011 and 00101? Information is stored and transmitted inside a computer in Where would you find the letters QWERTY? A parity bit is

BC 95 BC 95 BC 96 BC 96 BC 97 BC 97 BC 98

How did the computer mouse get its name? Clock speed is measured in What are you most likely to use when playing a computer game? CPU performance may be measured in A digitising tablet can be used for? In processing cheques which of the following I/O techniques have banks traditionally used Which of the following is a pointing device used for computer input?

BC 98 BC 99 BC 99 BC01

A UPS What does a light pen contain? The capacity of a 3.5 floppy is around What general term describes the physical equipment of a computer system, such as its video screen, keyboard, and storage devices?

BC02 BC03 BC04 BC05 BC06 BC07 BC08 BC09 BC10 BC100 BC100 BC101 BC101 BC102 BC102

Where would you find the letters QUERTY? What are you most likely to use when playing a computer game? A digitising tablet can be used for? Which of the following is a pointing device used for computer input? What input device could tell you the price of a product Where would you find a magnetic strip? Hard copy is a term used to describe...? What are the individual dots which make up a picture on the monitor screen Called A daisy wheel is a type of...? What input device can be used for marking a multiple-choice test? Laptop computers use QWERTY is used with reference to What input device could tell you the price of a bar of chocolate? A GUI is Where would you find a magnetic strip?

BC103

Multiprogramming refers to

BC104

Multitasking refers to

BC105 BC105 BC106 BC106 BC107

Multiprogramming is a prerequisite for UNIVAC Computer belongs to the Timesharing is the same as Name the first Indian Super Computer? Disk fragmentation The technology which is used to check answer sheets of multiple-choice questions in civil services or similar examinations is: A compiler is Which printer among the following is fastest Zipping a file means

BC107 BC108 BC108 BC109

BC109 BC11 BC110 BC111

What does acronym VIRUS stands for An impact printer creates characters by using...? A client-server system is based on A nanosecond is

BC112 BC113

The memory address register is used to store Inefficient usage of excess computer equipment can be controlled by

BC115 BS 319 CA 486 CA 487 CA 488 CA 489 CA 490 DB 01 DB 02

A procedural control used to minimize the possibility of data or program file destruction through operator error is the use of A predefined computational task is referred to as a(n): Which of the following is not the feature of GAPs Which is the example of CAATs In audit procedures, test data is Which of the following is not the use of CAATs Which of the following are called explicitly by another procedure? What term applies to a collection of related records in a database? All of the following terms are related to computerized databases except which one?

DB 03 DB 04 DB 05 DB 06 DB 07

What is a database? What does a record contain? An RDBMS is a Data Warehousing refers to Unauthorised alteration of on-line records can be prevented by employing

DB 10 DB 11

What is a database? What does a record contain?

DB 12 DB 13

What is a report? What is the best way to analyse and change data

DB 18

What are some popular office orientated software applications?

DB 19 DB 20 DB 226

Which of the following constraints can be used to enforce the uniqueness of rows in a table? Which of the following commands is used to change the structure of table? An RDBMS is a

DB 227

DB 235

Data Warehousing refers to You are creating a client application that calls ActiveX DLLs. Which of the following properties of the Err object provides the name of a component that sends an error back to the client application?

DB 24 DB 26 DB 27 DB 30 DB 365

This database holds personal information. The user can help to keep it confidential by If the database holds customer names and addresses, personalised letters can be created automatically using Application software suited to storing the survey information obtained in the table would be The characters * and ? are sometimes used in search criteria as Which of the following field types will generate the primary key automatically?

DB 366 DB 367

Referential integrity ensures that the: Tables are related to one another through a:

DB 368

DB 369 DB 370

A foreign key is: You are creating a banking database to track customer loans. The bank will, of course, have many customers, each of whom may take out one or more loans, while each loan may be associated with only one customer (there are no joint accounts). What is the re In a one-to-many relationship between Companies and Employees, which field is found in both tables? Which of the following ensures that records in related tables are consistent with one another? For example, it ensures that you cannot add a record with an invalid foreign key.

DB 371

DB 372

How would you delete a relationship between tables in the Relationships window?

DB 373

In a Customers tables, what does a plus sign next to the CustomerID field mean?

DB 374

What is required of the fields that join two tables?

DB 375

Assume a one-to-many relationship between the Customers table and the Loans table, with referential integrity in effect. What happens when you attempt to delete a customer ID from the Customer table that still has entries in the Loans table?

DB 376

Which of the following is true when viewing a main form and its associated subform in the Form Design view?

DB 377

Which of the following relationships does not belong in a database based on a professional sports league such as football or basketball?

DB 378

Which symbol is used at the end of the join line in a related table to signify the many side of a one-to-many relationship?

DB 379 DB 380 DB 381

You have created a one-to-many relationship with referential integrity between a Customers table and a Loans table. From which table can you delete a record? The correct order of the arguments for the MsgBox statement is: The first statement in a procedure named CreateList is:

DB 393 DB 394

Which of the following is TRUE related to form fields? A text field:

DB 401 DB 402 DB 403

The purpose of a database is to: A database stores: A database records:

DB 404

A sales contact manager used by a salesperson is an example of _______________

DB 405 DB 407 DB 408 DB 409

A Customer Resource Management (CRM) system is an example of_________ The industry standard supported by all major DBMSs that allows tables to be joined together is called __________. A program whose job is to create, process and administer databases is called the _____ Microsoft Access may use which of the following DBMS engines?

DB 410

Which of the following are basic components of an enterprise-class database system?

DB 411 DB 412

In an enterprise-class database system ________ . In an enterprise-class database system, the database application ___ .

DB 413

In an enterprise-class database system, reports are created by ____________________ .

DB 414 DB 415 DB 416 DB 417

A database is considered "self-describing" because _______ . In an enterprise-class database system, the database _________ . A database may contain _________________________ . A database designed using spreadsheets from the Sales department is a database being designed _________________________ .

DB 418 DB 419 DB 420 DB 421 DB 422 DB 423 DB 424

A database designed to implement requirements for a reporting application needed by the Sales department is a database being designed _______ . A database designed to combine two databases used by the Sales department is a database being designed _________________________ . Database professionals use ________________ as specific data sources for studies and analyses. Database professionals use a set of principles called ________________ to guide and assess database design. A very popular development technique used by database professionals for database design is known as _______________________ . A very popular development technique used by database professionals to adopt a database design to new or changing requirement is known as _____ . The predecessor(s) of database processing was (were) __________ .

DB 425 DB 426 DB 427 DB 428 DB 429 DB 430 DB 431

In a relation __________________________ . An attribute is also known as a(n) . A combination of one or more columns used to identify particular rows in a is___ . A combination of two or more columns used to identify particular rows in a relation is________ . A determinant that determines all the other columns in a relation is______ . When designing a database, one of the candidate keys in a relation is selected as the _________ . Normalization is a process used to deal with which of the following modification anomalies?

DB 432

When you are given a set of tables and asked to create a database to store their data, the first step is to ____ .

DB 433

Modern microcomputer personal DBMS products______.

DB 434

DB 435

DB 436

Which of the following are true about data mining applications? We have obtained access to the company's operational data. We examine 50 records for customers with phone numbers that should use the current area code of 345. Of these 50 records, we find 10 that still use an older area code of 567. This is an example We have obtained access to the company's operational data. We have been asked to produce a report with an item by item analysis of sales, but the only sales figure available is the total sale value for each order. This is example of_____

DB 437 DB 463 DB 464

A data warehouse database differs from an operational database because: Which of the following objects is used to display a menu? Which of the following objects are NOT found in an Access application?

DB 465

You are developing an Access application that you expect to upgrade periodically. Which of the following statements is TRUE?

DB 466 DB 467

Which of the following statements regarding Access applications is NOT true? Which of the following brings a copy of the table into the current database and does not maintain a tie to the original table?

DB 469 DB 470

What makes a database an application? What is the Access tool that is used to create the user interface?

DB 503 DS 279 DS 59 DS 62

The purpose of a data warehouse is to: ____________ is the art of protecting information by transforming it into an unreadable format. Which of the following activities would most likely detect computer-related fraud? A digital signature is used primarily to determine that a message is:

DS 63 DS 66 EC 103 EC 301

What is a major disadvantage to using a private key to encrypt data? Which of the following risks can be minimized by requiring all employees accessing the information system to use passwords? The most beneficial advantage of ERP system is What is the term that describes spying on ones business rivals to gain a competitive advantage?

EC 302

What would you NOT be looking for when spying on a competitor?

EC 406 EC 51

An online drugstore such as Drugstore.com is an example of_______ Which of the following is an example of unacceptable online netiquette?

EC 58 EX 1 EX 10

Which of the following statements is correct concerning the security of messages in an electronic data interchange (EDI) system? On an Excel sheet the active cell is indicated by Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of cells A6, A7, and A8 are _____.

EX 11 EX 12

If a cell shows ####### , it means that _____. Which is not an advantage of using computerized spreadsheets? The gym teacher has a new program to calculate physical fitness in terms of weight and exercise. The use inputs different weights or amounts of exercise to determine the related physical fitness. This "What if" program is most likely which of the followin The difference between the highest and the lowest values. Spreadsheets can be used for...

EX 13 EX 14 EX 15

EX 2 EX 3 EX 320 EX 321 EX 322 EX 323 EX 324 EX 325

To select a column the easiest method is to If you press _____, the cell accepts your typing as its contents. The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as All of the following are considered constants EXCEPT: Which of the following may NOT be included in a formula? Which of the following is NOT a valid mathematical operator in Excel? Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first? Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?

EX 326

How can you tell which cell in a worksheet is the active cell?

EX 327

How can you change the active cell?

EX 328

Which of the following would you use to change the font size of a cell in Excel?

EX 330 EX 331 EX 332 EX 333 EX 334

The command that will save the current workbook with a different file type is: The command that will print an Excel workbook is found on the ____________ menu. In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the date and time a file was last modified. Which of the following commands will automatically adjust cell references in formulas? Which of the following commands will remove cells, rows, or columns from a worksheet?

EX 335 EX 336 EX 337 EX 338 EX 339 EX 340 EX 341 EX 342 EX 343 EX 344 EX 345 EX 346

Which of the following options is NOT controlled through the Page Setup command? Which command enables you to change the margins for a printed worksheet? All commands are carried out on a rectangular groups of cells known as a: Which of the following is a valid cell range? In a copy operation, the cell(s) you are copying from is called the: In a copy operation, the cell(s) you are copying to is called the: Which of the following commands is needed to duplicate the contents of a cell in another? A cell reference that does not change during a copy operation is known as Which of the following is considered an absolute cell reference? Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, what will be the contents of cell E4? Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to cell E4, what will be the contents of cell E4? Which of the following commands is needed to transfer the contents of one cell range to another?

EX 347 EX 352

The F4 key is used to: Which of the following quickly copies the formatting of a selected cell to other cells?

EX 353

Which of the following will insert a hyperlink into an Excel worksheet?

EX 354

Conditional formatting applies formatting to a cell based on:

EX 358

If you enter a date into a cell, Excel stores the date as: You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened that worksheet again on August 31. What will be displayed in cell E17 on August 31?

EX 361

EX 362 EX 363

The number of days between two cells containing dates can be calculated by: The function key that is used to quickly edit the contents of a cell is:

EX 364

What will be stored in a cell if 3/4 is entered in it?

EX 384 EX 4

EX 42 EX 43

A users response to the InputBox function can be stored in: The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is _____. The teacher has a spreadsheet showing all Year 10 students and their marks in one Mathematics test. To find the student with the highest mark, which of the following functions should be used? Which chart type best shows proportions of a whole?

EX 462 EX 5

EX 52 EX 57 EX 6 EX 6

Which of the following is TRUE regarding chart types? To select several cells or ranges that are not touching each other, you would _____ while selecting. Your Institute teachers have set an assignment on Studies. You are required to use a spreadsheet to record all that you study on each day for four weeks. You decide to show each weeks data with an accompanying graph. What is the best way of doing this What would be the best method to quickly copy the formula from the active cell to each cell below it? To arrange rows in alphabetical order based on column A, you need to use the command _____. What can you NOT do with a spreadsheet?

EX 7 EX 7 EX 8 EX 8 EX 9 EX9. IN 01 IN 02 IN 03 IN 04 IN 05 IN 06 IN 07 IN 08 IN 09 IN 10 IN 104 IN 11 IN 110 IN 111 IN 112 IN 12

To print just part of a sheet, you would select what you want to print and _____ . Spreadsheets can be used for... The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in B2 is _____. Which of the functions is not valid for performing addition The default orientation for the printed page is _____. Which is not a valid cell address? Which of the following best describes uploading information? A characteristic of a communication channel that is the amount of information that can be passed through it in a given amount of time, expressed in bits per second. The act of searching through storage to locate information without necessarily knowing of the existence of the information being sought. The principles, means and methods for rendering information unintelligible and for restoring encrypted information to intelligible form. A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt an decrypt messages and conversations. Protected/private character string used to authenticate an identity or to authorize access to data. The successful act of bypassing security mechanisms of the system. A set of rules and formats, semantic and syntactic, that permits entities to exchange information. An attempt to get access to a system by posing to be an authorised person. An action or event that might prejudice security. According to information Technology Act, 2000, To investigate contraventions the controller of certifying authority shall exercise the like powers to that of Malicious software. None the person who is known as father of Internet This website is the biggest bookstore on the earth. When we talk of Data Transmission modes, then ATM stands for A sequence of bits or characters that identifies the destination and the source of a transmission.

IN 13

The means of communicating between networks A group of computers and other devices dispersed over a relatively limited area and connected by communication links that enable a device to interact with any other on the network. The term HTTP stands for A NIC is considered as A hub is a device that can connect

IN 14 IN 15 IN 155 IN 156

IN 157 IN 158 IN 159 IN 16 IN 160 IN 161 IN 162 IN 163 IN 164

Which of the following is true concerning the function of a switch? What do routers connect? What does a router route? Software which prevents external access to a system is termed If four computers are connected to a hub and then to the internet, how many IP addresses are required for these 5 devices? Which of the following in an OSI layer When creating a network from just two PCs, what kind of cable would be used to connect them? An IP address is a To construct a simple LAN of 4 computers, you would connect them with ______connect them

IN 165 IN 166 IN 167 IN 168 IN 169

What happens to data that is ruined before reaching to receiver Bluetooth is Which is not one of the recognized IEEE sub layers? The most preferred number system to represent a IP address is A MAC address is of

IN 17

Protocol is A ............... is a LAN-based computer with software that acts as a controlling device for controlling access to at least part, if not all, of a local area network and its available resources.

IN 172

IN 173 IN 174 IN 175 IN 176 IN 177 IN 178 IN 179

What is the biggest disadvantage of the Ring topology? The .............. of the network concerns how network devices are physically (or optically) interconnected. The principal topologies used with LANs are: What are the various types of bus architecture? What are the various types of ring architecture? In a ................., each workstation attaches to a common backplane via its own physical cable that terminates at the hub In a ............... , each work station is directly connected to a common communications channel

IN 18 IN 180 IN 181 IN 182 IN 194 IN 195 IN 196 IN 197 IN 198 IN 20

Which one of the following is NOT a network topology? In a .............. , the cable system forms a loop with workstations attached at various intervals around the loop The Media Access Control (MAC) is a sub layer of the: What are the most common LAN technologies used in networking today? Modem speeds are measured in LAN speeds are measured in WAN speeds are Accessing the Internet from a typical home PC requires the use of To use the Internet, you The worldwide web server uses the following standard interface to act as the middleware:

IN 205 IN 21 IN 214

An NIC Accessing the Internet from a typical home PC requires the use of The most widely used network operating system on PC LANs is

IN 218

JPEG and MPEG

IN 22 IN 220 IN 221

To use the Internet you A multiplexer is a form of An ISP

IN 222 IN 223

FTP is Telnet

IN 224 IN 225 IN 23 IN 23 IN 24

A firewall is A proxy server is A search engine is To look for information about interest areas on the internet, the user should use a An ISP

IN 25

FTP is

IN 26

Telnet

IN 267

Which of the following is a true statement about the OSI model layers?

IN 268 IN 269

Which of the following is NOT true about the Internet? The traditional intent and impact of this common type of attack is to prevent or impair the legitimate use of network resources.

IN 27 IN 270 IN 272 IN 273 IN 28 IN 285

A firewall is Which of the following is NOT an example of a DoS attack that is popular among hackers? A ____________ attack is when a hacker sends a continuous flow of packets to a system. One defense option on a large network is to configure a ____________ to disallow any external traffic. A proxy server is Which of the following would be performed on a network server and not normally on individual workstations?

IN 288 IN 29

What can be said about the safety of the Internet? To secure communication network against wire-tapping the most effective control is

IN 290 IN 297 IN 298

One way that a virus CANNOT spread throughout a network is: Which of the following is NOT a means of monitoring employee use of company technology? ____________ would be used by parents to monitor their children on their home system. The formal rules and parameters which are established to permit a microcomputer to communicate with the mainframe computer as though it was a terminal of the mainframe are called The two most common tools used to help with extracting information are:

IN 30 IN 304

IN 306 IN 307

Which of the following would NOT be considered an example of cyber terrorism? Which of the following would be a form of cyber terrorism? Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life?

IN 308

IN 31

An organisation is upgrading its telecommunication lines. Which is the least important objective while upgradation

IN 31 IN 310 IN 312 IN 313

A company posts a price list of its products on its website. The advantage to the customer is that the company can Which of the following is an easy-to-use service to get information on someone? Which of the following pieces of information would NOT be found online? Which of the following is the most common danger on the Internet?

IN 314 IN 315 IN 316 IN 317 IN 318 IN 32 IN 33 IN 33 IN 34 IN 348 IN 349 IN 35 IN 350 IN 351

The famous Nigerian Fraud scam offered victims the opportunity to: The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is called _________________. Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called: Setting your privacy settings in Internet Explorer to medium is one way to block: What is the best means of protection from cyber stalking? Which of the following is not an appropriate control over telecommunications software Encryption techniques can be implemented in Hardware-Software Which protocol would be used to download a free anti-virus program from the Internet? The major advantage of the checksum program is when it Which of the following is a Web browser? A Web page is another name for ----------Domain names must contain a description of the type of organisation that the domain represents. A very common abbreviation used include: A standard language for creating and formatting Web documents is: The Web page format in which all elements of a Web page are saved as one file is called:

IN 359

Which of the following requires an Internet connection?

IN 36 IN 360

Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his computer how would he do this? Which of the following is used to update a Web query? You download from the internet, a screensaver, a ten-second sound file and a ten-second music video clip. You also add a hyperlink. Which of the media elements has the greatest effect on the file size? When saving a photograph for use on a website, which format should you choose? While researching the Direct taxes assignment, you find a useful website. What is the most efficient way to access the site at a later time? A system that uses the Internet for business-to-business interaction is called a(n):

IN 45 IN 47

IN 49 IN 493

IN 50 IN 501

A block of text automatically added to the end of an outgoing email is called _________ refers to the use of Internet technologies for placing telephone calls. Most client/server applications operate on a three-tiered architecture consisting of which of the following layers? Which do you NOT need to connect to the Internet? What does FTP stand for?

IN 68 IN 69 IN 70

IN 71 IN 72. IN 73. IN 74. IN 75. IN 76 IN 77

What is the purpose of DNS? Which of the following is NOT a properly formatted IP address? Which of the following is a properly formatted email address? The Internet is controlled by whom? What does IRC stand for? If you do not pick up your email for a week...? What does HTML stand for?

IN 78 OS 01 OS 127 OS 131 OS 132 OS 139 OS 193 OS 199 OS 215 OS 216

What is a disadvantage of joining a mailing list? Which of the following computer software is designed to direct and assist the execution of application programs Formatting a disk results in all the data being...? Which bus carries information between processors and peripherals? Which bus controls the sequencing of read/write operations? Which computers use single chip processors? CPU performance may be measured in In processing cheques which of the following I/O techniques have banks traditionally used Disk fragmentation A compiler is

OS 217 OS 219 OS 233 OS 234

An interpreter is Zipping a file means An assembly language program is translated to machine code by Which of the following is not part of the processor

OS 236 OS 238

If the Cancel Error Property of the CommonDialog Box is set to true then which of the following statement is true: __________ control defaults to displaying the files in the current directory:

OS 271 OS 274 OS 275 OS 276 OS 277

A ____________ occurs any time a program writes more information into the temporary space it has allocated in the memory. Assessing a system requires certain common tools. Which of the following is NOT a tool used to assess a system? The ____________________ Web site has a utility that will tell you what software and operating system a Web server is running. When software vendors discover flaws in their software, they usually will write corrections to their code, known as: All ____________ have the option of blocking ports.

OS 278

Which of the following is NOT a characteristic of a firewall? Before shutting a service on an individual machine, which of the following would you always check? At a minimum, which of the following should be implemented under the protection phase? Attacks on your system may be prevented or trapped through the use of: Setting restrictions as to the number of unique passwords to use before a user can recycle them is called a password:

OS 280 OS 281 OS 282 OS 283

OS 284

Which of the following is NOT a step to take in securing a workstation?

OS 286

To prevent a hacker from unauthorized access, what should you do with the administrator account?

OS 287 OS 289

What should be done with old backup tapes and CDs? Which of the following is NOT an example of malware?

OS 291 OS 292

One step you can take to reduce the risk of being infected by a virus is to: Which of the following is NOT a sign that a virus has infected your system?

OS 293 OS 294 OS 295 OS 296

Which of the following is the safest way to protect yourself from e-mail viruses? A ____________ attack causes too much information to be placed into temporary memory space. ____________ gathers user information with the users knowledge. Which of the following is the most common function of spyware?

OS 299

Which of the following is NOT a virus-scanning technique?

OS 300

Which of the following would NOT be a way to protect your system from spyware? For which of the following positions would it be advisable to conduct an extensive background check? Which of the following would you use to open an existing file? The ability to have multiple applications open at the same time is known as:

OS 309 OS 329 OS 355

OS 356 OS 357 OS 396

Which of the following can be changed using the Options command? Which of the following leaves an application open but shrinks the window to a button on the Windows taskbar? Which of the following actions would move a floating toolbar to dock it in a different place?

OS 397

To display a missing or needed toolbar, click the:

OS 399 OS 495 OS 496 OS 497 OS 498 OS 502 OS 504 OS 505 OS239

Which of the following is NOT a true statement regarding password protection? The Linux operating systems is an example of: The Windows operating systems is: Application service providers offer: A(n) _________ offers on-demand software on an as-needed basis to its clients over the web. _________ are systems used to interact with customers and run a business in real time. The most common cause(s) of disaster is (are): A _______ backup site is backup facility consisting of an empty warehouse with all necessary connections for power and communication, but nothing else. To destroy an object and free the memory space occupied by it, the keyword used is:

PP 44

An example of the components of a multimedia presentation could include

PP 442 PP 443

Which of the following formatting elements can be applied to a PowerPoint diagram using the AutoFormat tool? Which of the following formatting elements can be applied to a PowerPoint diagram using the Format AutoShape command?

PP 444

What happens when you double click a blank graph placeholder in a PowerPoint presentation?

PP 445 PP 446

The legend in a Microsoft Graph chart is: Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best chart type if you want to emphasize the total sales of each region?

PP 447

Which of the following actions will enable you to insert a graph into a PowerPoint presentation?

PP 448 PP 449

If you are editing a slide containing a Microsoft Graph, how do you display the underlying datasheet? How do you deselect a chart that has been placed onto a PowerPoint slide after you have finished creating the chart?

PP 450

What happens when you click the Datasheet button on the Microsoft Graph toolbar?

PP 451 PP 452

What happens if you single click a chart that is not currently active? What happens if you double click a chart that is not currently active?

PP 453 PP 454

Using custom animation effects, you can build: Which of the following animation effects can be added to a slide?

PP 455 PP 456

Which of the following animations effects can be added to a slide? Which keyboard key is used to select more than one picture on a slide?

PP 457

Custom animation can be used to affect ONLY:

PP 458 PP 459 PP 46 PP 460

Which of the following best describes the information that appears on the advanced timeline? Which of the following objects can contain custom animation effects? What type of program allows an object within an image to be edited without affecting other objects? Which of the following animation effects can be added to a slide?

PP 461 PP 500

Which of the following is TRUE regarding the Datasheet? Graphical software tools that provide complex analysis of stored data are:

PP438 PP439 VB 237 VB 240 VB 241 VB 242

Which of the following statements is TRUE regarding PowerPoint diagrams? Which keyboard key combination is used to undo the previous command(s)? What is the extension of the Visual Basic project file that stores the design of a user control. Which event of a text box would you use for validating the data entered by the user? Which of the following statements forces inline error handling? The _______ method resets the contents of bound controls to their original values when the user clicks on the cancel button.

VB 243

VB 243 VB 244

To deactivate the Form UnLoad event, you make the following change in the function definiton: To deactivate the Form UnLoad event, you make the following change in the function definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To prevent the Form from closing, you will set the: How many root nodes can a TreeView control have?

VB 245

A project group is a Project which: Procedures declared in a _____ are local whereas procedures declared in a ______ are available to the whole application. How can you keep the user from exiting a form by clicking the Close button? The _______ property enables Visual Basic to draw complete images in memory before displaying them on the Screen. You want to display the code and the description of an error. What would be the correct syntax?

VB 246 VB 247 VB 248 VB 249

VB 250 VB 251 VB 252

What is the purpose of the Image List Control? Which method would you use to get a free or unused File identifier while opening any file: Which property procedure is used to retrieve the value of a property?

VB 253 VB 255 VB 256 VB 257 VB 258 VB 259

Which of the following can be shown to the user using the Common Dialog control in VB? Which of the following are not properties of Command Button: Which events enable you to determine which key was pressed by the user? In order to access a file in Non-textual format, you have to open file in: Visual Basic displays information depending upon the current value of two properties of the form, called: Which of the following procedure types will execute when you assign a value to a property of an object? In order to overlap the controls (say a command button) during design time, we use the Send To Back or Bring To Front option from the Edit menu. To change it dynamically (i.e.during program execution) we need to change: Which property of the ProgressBar determines how much of the bar is filled? The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program. The caption and the name properties of the command button: You try to initialize a new Object variable with the following line but receive an error. What could be the possible cause? Set MyVar = New Classname Which of the following will perform a direct execution of a Command object? The vb Critical symbol displays: vbYesNo is an example of a(n):

VB 260 VB 261 VB 262 VB 263

VB 264 VB 265 VB 266 VB 382

VB 383

The primary difference between the MsgBox statement and the InputBox function is the:

VB 395 VB254 WO 01 WO 02 WO 03 WO 04

Which of the following is TRUE about a protected form (i.e., a form where the Protect Form button on the Forms toolbar is toggled on and is assumed to remain in that position)? Which event is triggered when the user moves to another open form? Veena is entering a paragraph in a word processing program. When the cursor gets to the end of a line, what is the best way to get the cursor to the next line? How are data organized in a spreadsheet? Which key moves the cursor to the beginning of the next line of text? Veena typed the following sentence: "The girl was very beautiful." In which word processing utility could she find a synonym for "beautiful"?

WO 05 WO 06 WO 07 WO 08 WO 09 WO 1 WO 10 WO 11 WO 12

Using an electronic bulletin board, Seema can do all of the following except which one? Aryan has created a ten-page story, but only wants to print the first two pages. What printer command should he select? What process should be used to recall a document saved previously? Which is used to indent text within a document? Desktop publishing is a more sophisticated form of which of the following types of software? What is a Word Processor used for? What is a picture that is saved on a diskette and can be pasted into a document? What is a Word Processor used for? What basic tools would you find in the Edit menu of a word processor

WO 13

What is a header in a document?

WO 2 WO 25 WO 3

What hardware is essential for a word? The user could take a picture from a magazine and insert it into the document by using a What basic tools would you find in the Edit What command in a word-processing program can be used to change the word him to her, and also the word he to she in the given phrase? On a cold and still night, the only sound that could be heard was the owl that had ade its home in the nest outs What edit commands would you use to insert a paragraph from one document into another document, while still keeping the paragraph in the first document?

WO 32 WO 34

WO 385

Which of the following statements would NOT be a reason for showing suggested revisions in a Word document without changing the original document?

WO 386

Which statement is NOT true regarding revisions made in a Word document?

WO 387

How are suggested changes entered for review on an initial Word document?

WO 388

Which of the following is TRUE about saving a document using the Versions command?

WO 389

WO 39

What happens when you open a document that has been saved using the Versions command? You have used the word discover four times in an English essay you have created using a word processing program. You would like to find another word of similar meaning to use instead of discover. Which of the following would you use to do this?

WO 390 WO 391 WO 392

When opening and working with multiple versions of a document, how can you tell which is the most recent version? Various fields are added to a regular document to create a special document called a form through the ____________ toolbar. Which of the following types of fields CANNOT be inserted into a form?

WO 398

Which of the following is TRUE related to editing comments in a Word document?

WO 4

What is a header in a document? In your English essay you notice that the paragraph at the bottom of page 1 continues on to page 2. You would like to make this paragraph start on page 2.What would be the best way to do this? Tables in a document help you to easily arrange all of the following EXCEPT: To identify a document, it is helpful to include the file name on each page as a Which of the following tools will copy the formatting of selected text to other places? What is the name of the process of determining the cause of errors in a macro? Drop caps are added to a Word document using the ___________ menu.

WO 40 WO 400 WO 41 WO 440 WO 468 WO 471

WO 472

A reverse in a newsletter is:

WO 473

A pull quote is best emphasized by:

WO 474 WO 475 WO 476

WO 477

Which of the following definitions is CORRECT? Pertaining to newsletters, which of the following cannot be changed using the Columns command dialog box? As related to type size, how many points are there to the inch? Assume you are working on a newsletter in which the masthead extends across the top of the entire first page. The rest of the newsletter has two columns. What is the minimum number of sections in the newsletter?

WO 478 WO 479

Which of the following is NOT correct with respect to page, column, and section breaks? Which of the following would be the most appropriate font for a newsletter headline?

WO 480 WO 481 WO 482

Which of the following is the default Word column width? Assume you are creating a two-column newsletter. Which type size is the most reasonable for the text in the columns? Given the default left and right margins, and -inch spacing between columns, the width of each column in a two-column document will be:

WO 483

Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot see any columns on the screen. What is the most likely cause?

WO 484 WO 5 WO 56

While word processing, in which of the following situations would Tom use the "Copy" command? What does a document contain? Before submitting your work you want to find any words spelt incorrectly. Which of the following would you use?

Op1 Inventory subsidiary. Does not require as stringent a set of internal controls. NIC Card Record Count Writing on a hard board Voice activated broadcasting Validity check Coloured spots File Name Printer System Logs Electrically charged ink Restrict physical access A pen A cartridge Separation of duties A cartridge A print head Volume Read Magnetic tape Serial access medium 1.44MB A CD-ROM A CD-ROM Read By a sunny window ROM chips RAM chips ALU CPUs 0 bits RAM chips Serial access medium Network software and security software

Op2 Cash disbursements. Will produce a more accurate set of financial statements. VSAT Identification Number Printed output Voice answer back Boundary protection Pixels Identification number Storage device Physical Security An ink pen Use only unremovable media Paper A drum Centralised function for PC acquisition A drum A laser beam Size Write PAN drive

Op3 Cash receipts.

Op4 A

Ans

Payroll transactions. Eliminates the need to Will be more efficient at reconcile control producing financial accounts and statements. subsidiary ledgers. RAM AGP Card Control totals for one or End-of-file and end-ofmore fields reel code Storing information on the hard disk None of above Visual audio board File protection ring Pixies Reel Number Pointing device Console Log An inked ribbon and print head None of above Limited access files None of above Batch Total None of above Data Dictionary

C B B B C C B D A B C A C A A A C C B A A B C A B C B B A B B A A

None of above Make duplicate copies Require user passwords of files Eraser None of above A ribbon A cassette Centralised function for Distributed policies or PC Disposition procedures A ribbon None of above An INK RIBBON None of above Storage capacity None of above Read and Write None of above Floppy disk None of above A parallel access Random access medium medium None of above 20 GB 700MB None of above A floppy disk Magnetic tape storage None of above A floppy disk Magnetic tape storage None of above Write Read and Write Not By magnet objects RAM chips ROM chips Registers Registers 1 bit ROM chips In a drawer CDROM chips DRAM chips Logic bus Control unit 8 bits CACHE A parallel access Random access medium medium Systems software and application software Business software and games software None of above None of above None of above None of above None of above None of above None of above A selective access medium

None of the above

Supercomputer Notebook computers First generation

Personal computer Supercomputers Second generation

Mainframe computer Jon Von Neumann computers Hoover generation Fourth generation Fifth generation Fifth generation Fifth generation Analysis, System Design, and Implementation

None of above None of above None of above None of above None of above None of above None of above

B B A C C B A

Second generation First generation Second generation Third generation Second generation Third generation Second generation Third generation Specification, Design, and Programming, Design, Testing and Testing

None of above

Analysis translates program code of a high level language to machine code

Analysis is the loading of programs that perform routines to control peripheral devices Inputs, outputs, file Only hardware and design hardware, and software software To collect data Deleted from the disk Users operate the manual system and computer system at the same time The new system is introduced alongside the existing system Instructions and technical documentation

This involves looking at a system and finding out how information is being handled None of above Maintenance, reliability, and upgradeability None of above None of the above Transferred from the disk

B D A

To execute any programs To maintain security Copied from the disk Saved to the disk

Users operate the computer system from a given date

Users operate the manual system

None of above

The new system is introduced and users start Users continue operating it operating the old system None of above Log files and temporary files To enable any printer to be connected to the network Network systems and communication services CD-ROM User Guide and technical documentation None of above User guides cover how to run the system, enter data, save, print, etc. None of above Database systems and backup services floppy disk

For technical support Operating systems and system services Magnetic tape storage To maintain a backup copy of all the information

None of the above Hard disk

A B

To do a particular task.

To help someone who is applying for employment None of the above

Data bus FDDI Data bus Peripherals that are connected to a computer. binary form were 7 bits 4 bits More than 1000 mega bytes 32 registers used to indicate uppercase letters ROM bits per second memory capacity have fewer instructions than RISC machines ALU Power is switched off a parallel interface line printer is faster to access than RAM

Auto bus BAD Auto bus Operating system routines that execute in supervisor mode. ASCII code form 8 bits 8 bits 1000 kilobytes 32 I/O devices used to detect errors RAM baud memory access time

Address bus TED Address bus Data structures that are part of the kernel of an operating system. decimal form represented 256 characters 16 bits 230 bytes 32 Mb of RAM is the first bit in a byte DRAM bytes secondary storage capacity

Control Bus MAD Control Bus Shells, compilers and other useful system programs. alphanumeric form represented 127 characters 32 bits 1024 bytes a 32-bit bus or 32-bit registers is the last bit in a byte CROM Hertz secondary storage access time use variable size instructions Logic Bus

A B D

D A A A A D B A D B

use more RAM than RISC have medium clock machines speeds Registers Variables Computer is improperly shut down a serial interface dot matrix printer is non-volatile Data is not saved before computer is shut down printer interface ink-jet printer stores more information than RAM

D A

All of the above a modem interface laser printer. is used for cache memory

D B D B

increased the storage capacity of increases the process a computer system speed has more storage is a form of ATM capacity than an ATM card card CRT displays LCD displays having several programs in RAM at the same time multitasking having several the ability to run 2 or softwares running more programs at the same time concurrently ALU Registers brochures magazines

provides backup power in the event of a power cut none of the previous is an access card for a contains a security system microprocessor SSGA displays none of the previous writing programs in multiple languages writing programs in multiple languages Variables CD-ROM to run more than one program at the same time multiuser

C B

none of the previous

none of the previous Logic Bus e-mail

D B D

multitasking multitasking

an operating system multiprogramming

none of the above none of the previous

C C

related to virtual reality same as multitasking save the file to calculate numbers Uses Cobol 106 sec a keypad data to be transferred to memory data to be transferred to or from memory

a form of ROM same as multiprogramming set up a password to read from or write information to a floppy disk uses Java 103 sec a mouse

a form of VRAM

multiuser make a backup copy

none of the previous D involves using more than one processor at the same time D use a virus protection program B to display information or pictures on a screen B none of the previous. D 109 sec D a message pad an instruction that has been transferred from memory. an instruction that has been transferred from memory the address of the next instruction to be executed a magic marker Data Parity Checker Validation use find and replace Modem B

to print sheets of paper uses C++ 1012 sec a frog

data that has been the address of a transferred from memory memory location the address of a memory location an instruction that has been executed a light pen Program Artificial Intelligence Range checking use the backup facility System

data to be transferred to the stack an instruction that has an instruction that been fetched from has been decoded memory a cursor a scroll bar Formula Assembler Memory protection use the directory search tools Network save copies of the file with the same name on the system Multiprocessing ROM Firmware Firmware Sequential Operating System Tracks and Sectors Character, field, database Valid character check Sound card. Algorithm Compiler Parity Checking search each file in turn Program

D A B B B A B

use different filenames on keep a record of the system computer failures Time sharing Multiprogramming RAM Word Processor Word Processor Hashed ALU Blocks and Sectors Database, character, record Maintenance diagnostic program CD-ROM Floppy Disk Telephone modem Telephone modem Indexed CPU Files and Tracks File, record, field Systems logs MIDI interface

backup to a secure medium Multiplexing Magnetic Disk Shareware Shareware Random Primary Storage Schema and subschema Element, field, file Parity check Serial interface

D D B C A C B A C C A

Text Laser

Pictures Dot matrix

Sound Ink-jet

Video Drum

D B

viewing an encyclopaedia CD- creating the plans for a ROM. building design. replaced regularly never updated Database get into the system quickly 512 loss of confidentiality TCP/IP access to the internet is quicker a file name Document processor

presenting an order for stock to a warehouse. updated regularly

recording current stock in a supermarket and answering customer queries. A updated once a year C Spreadsheet simplify file structures 8192 loss of data NetBEUI the operating system is easy to use the hard drive D C C D A B D

Graphics package retain confidentiality of make efficient use of time files 1024 4096 duplication of data HTML files can be shared a subdirectory virus infection IPX/SPX printer can do 1000s of pages a day the root directory uninterruptable power supply the system requires a network administrator to uninstall it information.

universal port serial up-line provider service the program executable orphan files can be may not allow it to be left on the system uninstalled data. Graphical representation of logic Purchase, sales, receipt, payments etc. assist in maintenance senior executive support for IT. input. The use of computers to design state-of-theart, high-quality products. specialist or functional name the file documents.

uniform page source C the system always requires a re-boot and defrag afterwards A text. A

Rules writte in procedural Logical Steps in any language language

None of the above

To fill the log register speed up access IT management lacks leadership. output.

It is mandatory in tally prevent unauthorised access IT understands the business processing.

None of the bove allow encryption None of the above All of the above

A C B D

Using computers to do architecture. Application Service Provider ensure the filename is not lost

Software that generates innovated designs and artistic patterns. None of the above enterprise identify the file corrective controls. dynamic hashing local identify the file type All of the above are parts of IS controls. extensible hashing

A B D D A

preventive controls. detective controls. external hashing static hashing

A: (a) , (b), (d) B: (a) to (d) corrective controls preventive controls Component (a), (c), (d) Press the reset button. Create the files again. (a), (c), (d) detective controls (a), (c), (d) problem logging unit testing (b), (c), (d) Interface (b), (c), (d) Turn the computer off at the power point. Ask the person next to you. (a), (b), (c) organisational controls (a), (b), (c) call lights data testing (a), (b), (d)

C: (a), (b), (c) detective controls Settings (a) to (d)

D: (b), (c), (d) general controls Control

C C B C

(a), (b), (c) Pull the power cord Select the Shut Down from the back of the option from a menu. computer. Use the Find or Search Put your hand up and feature. ask the teacher (a) to (d) preventive controls (a) to (d) program change requests thread testing (a), (b), (c) parallel operations Concentrator. (a), (b), (c) (b), (c), (d) corrective controls (b), (c), (d) resolution procedures loop testing (a) to (d) system walkthroughs Job control language. (a), (c), (d)

C C C C C C A D B D A

benchmark testing specifications matching Multiplexer. (a) to (d) Replacement personal computers for user departments. architectural design Client-server Star Star To maintain a backup copy of are written all the information Direct Systems analysis and applications programming. A sequential file on a disk Tapes can only be read by the machine on which they are written Peripheral processors. (b), (c), (d)

Identification of critical applications. interface design Client Bus Bus To do a particular job such as editing, storing information Sequential Data communications hardware and software.

Physical security of warehouse facilities. procedural design Computer network Mesh Ring

Cross-training of operating personnel. data design Hub Ring All of the above

B A C A D

To help someone who is To Store data in an applying for employment organised manner Binary Indexed

B B

Operating systems and compilers. Computer operations. C A direct access file on a A direct access file on A sequential file on a tape disk a tape C Information formats commonly vary between Data record can never architectures be blocked together C

Parity errors will result

Data path part Distributed systems

Control Unit Local Area network

Address calculation part Input output channel Wide area network

Protocol B Are required with a Can send data to a Use the computer to microprocessor which computer and which they are connected Generally require a permits some data receive data from a to perform all processing keyboard for data entry processing such as computer operations and a CRT for display input validation D Time sharing Mixer Modem Multiplexor computer C Allows computer signals to be send over a telephone Aids in back-up Speeds up online line procedures Packs data in a disk file printing A Planetary network Ring Network Loop Network Star Network Instant post-office A mainframe PC D C B C D

Office Automation Executor systems Electronic mailing A dumb workstation An intelligent workstation A personal computer Time of day control locks Encryption algorithms Parity checks Type of cable A compiler does a conversion line by line as the program is run Feasibility study, system design, and testing CRC Terminal Standard A compiler converts the whole of a higher level program code into machine code in one step Implementation and documentation Baudot

All of them Device interconnect Communication protocol standard A compiler is a general purpose language providing very efficient execution Lexical analysis, CONVERSION, and code generation ASCII

None of the above

None of the above EBCDIC

D A

An interpreter does the conversion line An interpreter is a by line as the representation of the program is run system being designed Modem High-level languages It is faster than parallel communication Financial sector and engineering Communicate with the console operator Demodulator Middle-level languages

An interpreter is a general purpose language providing very efficient execution None of the above Frequency division Time Division multiplexor Multiplexor Low-level languages It is less prone to attenuation Accounting systems, commercial sector Relieve the main CPU of repetitive communication tasks None of the above

A C C

It is less error prone Graphic design and education Manage the paging function in a virtual environment

Uses only one path None of the above Reduce competition between the input/output devices

D C

Specification and design Fiber Optics The design of the screen the user will see and use to enter or display data A cache The different types of network to be used Star 10101010 Parity 15 Port 327 Data warehouse memory capacity 30 binary form 4C5 4 bits Basic Coding Description 1024 bits 10000 binary form Mouse used to indicate uppercase letters Because it squeaks when moved bits per second Touch screen BPS Printing letters OCR Touch screen

System Analysis Coaxial Cable

Testing Common carrier System Analysis involves creating a formal model of the problem to be solved A buffer Hardware, Software and size of program. Ring 1010101 Cyclic Redundancy 64 Multiplexor 97 Data management systems secondary storage capacity 256 decimal form 5C4 16 bits Bit Code Design 210 bits 1110 decimal form Numeric Keypad is the first bit in a byte

None of the above Telephone Lines

B C

System Analysis defines the format and type of data the program will use An interface Testing to check for errors before the system is introduced Packet 1100101 Retransmission 4 Modem 141 Data Mining tools memory access time 255 ASCII code form 1B7 8 bits Binary Coded Decimal 1000 bytes 1112 ASCII code form Keyboard used to detect errors

None of the above An online protocol

C B

None of the above Bus None of the above Hash Count None of the above Acoustic coupler None of the above All of them secondary storage access time None of the above alphanumeric form None of the above 32 bits None of the above 210 bytes None of the above alphanumeric form None of the above is the last bit in a byte

B B C A A C B B B B A A B D A A A A B

Its moves like a mouse baud Light pen MIPS Tracing diagrams MICR Hard disk

It has ears bytes Joystick MHz Reading bar codes barcode scanning CD-ROM drive

None of the above Hertz None of the above VLSI None of the above voice recognition None of the above

D D C B B B A

increased the storage capacity of increases the process a computer system speed Refillable ink 100K hardware Pencil lead 1.44 Mb software

provides backup power in the event of a power cut none of the previous Light sensitive elements None of the above 5 Mb 1 Gb output input

C C B A

Mouse Touch screen Printing letters Touch screen Mouse Credit card Writing on a hard board Coloured spots Printer Mouse CRT displays screen layout Mouse hardware Credit card having several programs in RAM at the same time having several programs in RAM at the same time

Keyboard Light pen Tracing Diagrams Hard disk Bar code reader Mouse Printed output Pixels Storage device Bar code reader LCD displays mouse button layout Bar code reader language interpreter Speakers

Numeric Keypad Joystick Reading Bar Codes Keyboard Optical mark reader Speakers Storing information on the hard disk Pixies Pointing device Optical mark reader SSGA displays keyboard layout Optical mark reader software interface Smart card writing programs in multiple languages writing programs in multiple languages To run more than one program at the same time Third - generation computers. Multi-user Param is due to bad disk blocks

Printer Scanner Digital Signatures CD ROM Drive Keyboard Printer Back-up on a Cartridge Pickers CD-ROM None of the above none of the previous word processing software None of the above an operating system None of the above

B C B A B A B B A B C B C A

multitasking The ability to run 2 or more programs concurrently

none of the previous

none of the previous

multitasking First - generation computers. multitasking Vishwajeet is caused by wear Bar code Reader Technology a fast interpreter Drum Printer encrypting it Very important reader user sequence Electrically charged ink mainframe technology 10-6 sec data to be transferred to memory Contingency Planning

an operating system Second - generation computers. multiprogramming Deep Blue caused by overuse Optical Mark Reader Technology

none of the above Fifth - generation computers. none of the previous Arjun none of the previous Image Scanning Technology none of the previous Thermal Printer transmitting it

C A A C C

Magnetic Ink Character Recognition Technology converts a program to slower than an interpreter machine code Dot - Matrix Printer Desk - jet Printer decrypting it compressing it Vital information resource Virtual information under siege reader & user system Thermal Paper LAN technology 10-3 sec An ink pen WAN technology 10-12 sec

B C A C

None of above An inked ribbon and print head

B D

data that has been the address of a transferred from memory memory location System feasibility report Capacity Planning

Unix operating system B 10-9 sec D an instruction that has been transferred from memory C Exception reporting C

Limit checks array. Wide access to various data base ACL A sample of transactions Tests of details of transactions Macros clipboard search A way to analyse and manipulate numerical information Information about certain programs remote DBMS storing data offline at a separate site Key verification A way to analyse and manipulate numerical information Information about certain programs Reports allow users to extract information as hard copy (printed output) Extracting and analysing data

Control figures constant. Can extract and analyse data IDEA A utility software programme Analytical review procedures Action Procedures file sort

A tool to produce high quality documents It contains all the data about one specific item relative DBMS

A collection of files Reliable DBMS uses tape as opposed backing up data regularly is related to data mining to disk Computer sequence Database access checks Computer matching controls An organised way of storing information A tool to produce high about a set of similar qualitydocuments things None of the above It contains all the data A document which about one specific item contains text None of the above

External file labels function. Can aid in simple selection High End CAATs A special purpose written program Compliance tests of general EDP controls Event Procedures field field names An organised way of storing information about a set of similar things A document which contains text Relational DBMS

Cross footing tests formula. Can define the audit objectives All of the above None of the above All of the above General Procedures layout record grab

C C D D A D D B D

A way of maintaining a log C B C C D

C B

Using queries Word processors, Compilers, Network software, backup spreadsheets, interpreters, editors systems databases, DTP DEFAULT and NOT NULL FOREIGN KEY PRIMARY KEY and constraints constraints UNIQUE constraints CHANGE TABLE MODIFY TABLE ALTER TABLE remote DBMS relative DBMS Relational DBMS

Reports provide a very flexible way of creating and editing documents Spreadsheets make data easy to analyse

A tool which allows text and graphics to be placed in documents None of the above None of the above

A C

None of the above

IDENTITY columns UPDATE TABLE Reliable DBMS

C C C

storing data offline uses tape as opposed at a separate site backing up data regularly is related to data mining to disk C

Number

Description

Component

Source

using a password the product code A database bookmarks Auto Primary

keeping a backup copy the primary key Graphics operators Auto ID

keeping the original paper copy mail merge browser wildcards AutoNumber

saving the file with different filenames e-mail e-mail engines Auto Key

A C A C C

records in a dynaset are related tables in a consistent with the database are consistent underlying tables. with one another. foreign key.

forms in a database are consistent with the underlying tables or queries. query and its associated main form and a subform. dynaset.

reports are consistent with the underlying tables or queries. B report and its related query. A

the primary key of the primary key of the both related tables. related table.

a field from an unrelated not a primary key of table. either related table.

One-to-one EmployeeID The Tools menu, Relationship window

One-to-many CompanyID

Many-to-many EmployeeLastName

Many-to-one CompanyAddress The one-to-many relationship

B A

Double click the Relationship line That there are several customers associated with That some of the data is that ID not viewable

Referential integrity Right-click the Relationship line, then select Delete from the shortcut menu

The join line

Select Undo in the Click the Delete Relationships pull-down Relationships button menu on the toolbar That records can be added by clicking on the plus sign They must be the same data type

That there are records in a related table

They must both be They cannot be numbers They cannot be text fields AutoNumber data types The customers ID is deleted from the Nothing, Access Customers table, and all ignores the The customers ID is the related loans are attempted deleted from the deleted from the Loans command. Customers table. table.

An error message is displayed.

The subform is an object on the form and The subform is not The subform is displayed The subform is can be moved or sized visible. in Datasheet view. displayed in Form view. like any other object. D A one-to-many relationship A one-to-many A one-to-many A many-to-many between teams relationship between relationship between relationship between and players teams and coaches coaches and teams players and teams C

The Customers table only when there are Loan Either table at any records associated with The Loans table at any time that customer time prompt, title bar title bar text, prompt, text, icon. prompt, icon, title bar text. icon. Dim CreateList. Sub CreateList. CreateList. A check box enables the form user to choose from one of several existing entries. must be set for one word. help people keep track of things. data. facts. single-user database application single-user database application Sequential Query Language (SQL) Database Modeling System Jet

Neither table title bar text, icon, prompt. Sub.

C B B

A text field enables the form user to choose from one of several existing entries. must be set for multiple words.

store data in tables. relationships. figures. multiuser database application multiuser database application Structured Question Language (SQL) Database Management System SQL Server

A drop-down list enables the user to A drop-down list choose from one of enables the user to several existing entries. enter text. must be set for two does not have to be set. words. maintain data on create tables of rows different things in and columns. different tables. metadata. all of the above information. a and b e-commerce database application

C C

A D D

a or b

The user the database application(s) interact(s) with the the DBMS accesses the DBMS database data creates queries creates form

e-commerce database application Structured Query Language (SQL) Data Business Model System Oracle The database management system The database application (DBMS)

None of above Relational Question Language (RQL) Relational Model Manager a and b

B C B D

All of the above.

the user all the users' data is in one place holds user data tables from existing data

the database application

None of above creates reports the database management system (DBMS) it contains a description of its own structure holds indexes stored procedures as a redesign of an existing database

All of above b and c

A D

the database

it reduces data duplication holds metadata metadata as a new systems development project

All of the above. All of the above. All of the above. a and b

C D D A

from existing nondatabase data from existing data data marts data marts data marts data marts file managers entities in a column vary as to kind table record record record composite key Insertion anomaly assess the existing tables' structure and content are supplied by several wellestablished manufacturers They use sophisticated mathematical techniques.

as a new systems development project as a new systems development project normalization normalization normalization normalization hierarchical models the order of the columns is important relation field field field primary key Update anomaly

as a redesign of an existing database as a redesign of an existing database data models data models data models entity-relationship data modeling network models the order of the rows is unimportant row key composite key foreign key foreign key Deletion anomaly

a and b a and b entity-relationship data modeling entity-relationship data modeling entity-relationship data modeling data migration relational data model more than one column can use the same name field tuple foreign key candidate key surrogate key All of above

B C A B D D A

C D C C D B D

design the database structure

create one or more new move the data into the tables new database A

were essentially killed off have poor response by MS Access time Their report delivery is more difficult than report delivery for reporting systems. Nonintegrated data

are not true DBMS products

None of the above a "wrong format" problem a "wrong format" problem

dirty data

inconsistent data

nonintegrated data

dirty data data warehouse data are not stored in tables. Form Forms and reports

inconsistent data data warehouse databases do not have metadata. Table Queries and tables

nonintegrated data

data warehouse data are often denormalized. b and c Report Query Macros Spreadsheets

C A D

It will be easier for the user to upgrade it if the objects and tables are in one database. The Link Tables command can be used to associate the tables in one database with the objects in another database. Import It contains more than one table Menu Wizard

It will be easier for the user to upgrade it if the objects are in one database and the tables in another.

It is advisable to put each object and table into a separate database.

Regardless of how the objects and tables are stored, the user will have to reenter the data in the tables when the application is upgraded. B An application can be created in such a way that it objects such as forms and reports can be changed without disturbing the existing data. C Join A

An application may consist of multiple databases, each with multiple objects, linked to yet another database containing only tables. Link

All objects in an application, including the tables, must reside within the same database.

Merge It contains a user It contains tables, reports, interface, or queries, and forms switchboard Build Menu Interface Design Wizard put key business information into the hands or more decision makers.

It contains macros

Switchboard Manager D store all corporate transaction data in one single location. C Cryptography C Reviewing the systemsaccess log. D Sent to the correct address. A The private key is used by the receiver for decryption but not by the sender for encryption. Firewall vulnerability. Quality management Economic espionage A competitors new project

create backups for centralize the mission critical manageability of data corporate data. collection. Decryption Using data encryption. Unaltered in transmission. Both sender and receiver must have the private key before this encryption method will work. Collision. Error checking Competitive espionage A list of competitors clients single-user database application Replying promptly Cipher Performing validity checks.

Encryption Conducting fraudawareness training. Received by the Not intercepted en route. intended recipient.

The private key cannot be broken into fragments and distributed to the receiver. Data entry errors. Data Integration Corporate espionage Contact numbers of the management group multi-user database application

The private key is used by the sender for encryption but not by the receiver for decryption. Failure of server duplicating function. Low cost of operation Industrial espionage

A D B C

Research data e-commerce database application

None of above

Keeping messages short Including the Subject

Using all capital letters D

Removable drives that can be locked up at night provide adequate security when the confidentiality of data is the primary risk.

Message authentication in EDI systems performs the same function as segregation of duties in other information systems.

Encryption performed by a physically secure hardware device is more secure than encryption performed by software. No border 2,2,2 the column is too narrow to show all the digits of the number flexibility of moving entries

Security at the transaction phase in EDI systems is not necessary because problems at that level will be identified by the service provider. C A blinking border 6,8,10 A D

A dark wide border A dotted border 8,16,32 2,4,2 the row is too short to your formula has a show the number at the syntax error current font size ability to generate tables speed of calculation

either b or c cost of initial set-up

C D

word processing Range Producing graphs double-click any cell in the column ENTER array. 100 Cell references ^

click the column label INSERT formula. Tom McKenzie. Text constants \ It is impossible to B5*B6 C3/D4 D4^2 determine. E12 6 SUM(H9:H11) G7*SUM(H9:H11) The phrase active It is surrounded by It is displayed in reverse cell appears in the a heavy border. It is blinking. video. Status bar. By either clicking in a By typing the reference different cell or using of the cell you want to By clicking in a By using the arrow keys the arrow keys to move move to in the formula different cell to move to a different cell to a different cell bar The Cell Format The Font Size The Standard command on the Edit command on the Tools toolbar The Formatting toolbar menu menu. the File Type the New command the Save command on the Save As command command on the File on the File menu. the File menu. on the File menu. menu. File Edit View Window Preview Insert Clear Details Delete Delete List Both Insert and Delete Both Clear and Delete Properties Clear Remove

graphical Address Writing letters drag from the top cell in the column to the last cell in the column CTRL + ENTER function. (201)555-1212. Functions /

database Gap Drawing pictures click the column heading TAB constant. #VALUE! Numeric constants *

spreadsheet Rows Document filing

D A A

C A B C D D C B

C A B C B

Orientation (portrait or landscape) Options worksheet. 6 copy range. paste range. The Duplicate command absolute B4 #DIV/0! #DIV/0! The Move command copy and paste cells. the Fill Handle Select the Insert Hyperlink command from the File menu. whether the cell has a formula or a value in it.

Headers and footers Page Setup range. D12, G25 destination range. destination range. The Copy command relative $B4 #DIV/0! #DIV/0! The Cut command

Fonts View group. D12:G25 clipboard. clipboard. The Paste command mixed B$4 #DIV/0! #DIV/0! The Paste command cycle through absolute, relative, and mixed cell references. the Formatting toolbar

Margins Edit cell group. D source range. source range. Both the Copy and Paste commands constant $B$4 #DIV/0! #DIV/0! Both the Cut and Paste commands

C B B C D B D A D B C D

edit cells. the Format Painter

cycle through open applications. C Conditional formatting B Double-click a cell and click the Insert Hyperlink command. B

Click the Insert Hyperlink Right-click a cell and button on the Standard click the Edit Hyperlink toolbar. command. whether the cell has an absolute or a relative the cell address. cell reference.

text with a two-digit year. text with a four-digit year. an integer.

Jul-30 subtracting the earlier date from the later one. the F4 key.

Aug-31

29/03/2008 subtracting the later adding the earlier date to date from the earlier the later one. one. the F2 key. the Esc key. March 4 of the current year

the value in the cell D text with either a twodigit or four-digit year, depending on the format. C It is impossible to determine from the information given. B adding the later date to the earlier one. the F1 key. Either 3/4 or .75, depending on the cell formatting either a cell on a worksheet or a variable. B1:G10

A B

03-Apr a cell on a worksheet. B1-G10

0.75

a variable. B1.G10

a constant. B1;G10

D D

AVERAGE Combination

COUNT Line

MAX Pie

SUM Scatter

C C

Once a bar chart is chosen it cannot be changed to a column chart. hold down the CTRL key

Once a column chart is chosen it cannot be changed to a bar chart.

Once a pie chart has been chosen it cannot be changed to line chart.

hold down the SHIFT key hold down the ALT key Transfer information to Create four separate files a database Fill Down Data | Sort Calculate data press the PRINT SCREEN key writing letters D4+C2*B2 Fill Right Edit | Data | Sort Create forms select Print selection on Page Setup | Sheet and then print drawing pictures #VALUE!

Once a line chart has been chosen it can be changed to a pie chart. D hold down CTRL + SHIFT A

Use tables Paste Tools | Sort Analyse data click the Print button producing graphs (D4+C2)*B2 0 portrait AD213 storing data on a disk drive Bandwidth Find Photography Key User-id Penetration Acts Spoofing Loss Sales - tax authorities Utility Tim Berner Lee Etrade.com Automated Tailor Machine Acts

Use multiple sheets Paste Special none of the choices None of the above select Print selection in the Print dialog and then print None of the above =(B2*(D4+C2) None of the above vertical None of the above receiving information from a host computer Channel Retrieve Message Digest Formula Address Password Cracker Protocols Approving Hacking Police officer of IPS rank. Cracker Howard Aiken Msn .com None of above Protocols

D B B C

D A C B A C B A C C A B A D A B B C A B C C

=A3SUM:B3SUM:C3SUM REF! landscape ZA1 sending information to a host computer Speed Save Digital Signature Lock Password Retrieval Regulations Imposting Threat Income - tax authorities Pirated software Hoffman Amazon .com Any Time Money Regulations whatever was last used A0 storing data on the hard drive Size Browse Cryptography Hash Function Name Cryptography Address Unauthorising Exposure Judge of a civil court Virus Charles Bubbage Dell .com Asynchronous Transmission mode Address

Router

Gateway

Port

Pin

LAN hyper terminal tracing program National Informatics Center Only Computers Concentrates connectivity Bridges and Repeaters. bits firewall One Physical Layer RG7U Physical address A cable Data return to the sender Wireless technology Physical Layer Binary 48 Bits software that facilitates connection to the internet

WAN

CAN hypertext transfer hypertext tracing program protocol Network Interface card Can not computers Combines connectivity of a hub with the traffic regulation of a bridge Two or more networks frames gateway Two Data-Link Layer Coaxial cable Logical address Hub New Information Card Only printers Switches data from incoming ports to outgoing ports. Bridges and Hubs Packets router Four Network Layer Fiber A memory address Router

PAN hypertext tracing protocol None of the above None of the above

A C B D

All of Above Hubs and nodes None of the above virus checker None of the above All of the above Twisted pair None of the above None of the above

B B C A C D B B B

It continue on to target It gets destroyed bit by bit. device with corrupt data None of the above Wired Technology Data Link Layer ASCII 48 Bytes a list of rules for transferring data over a network Ultra violet technology Network Layer Octal 48 KB None of the above All of the above None of the above 48 MB

B A D A A

a gateway calling software that allows file program for internet copying bridging

Novell PC

Client

There isn't one Physiology Bus Linear Parallel Ring Ring

Network PC C If the hub goes down, If one node goes down, it If the hub goes down, it it brings down all of the brings down the entire brings down all of the nodes on all of the ring nodes on that section rings B Topology Star Parallel Circular Bus Bus Both A and B Ring Both A and B Linear Star Star None of the above All of above None Both A and B Mesh Mesh B D A B C B

Server

Star Ring Network Layer Ethernet, token ring, DecNET bps bps usually higher than LAN speeds CD-ROM drive must use the World Wide Web key gateway interface

Bus Bus Transport Layer Ethernet, token ring, FDDI kbps Kbps measured in bytes per second a modem must use electronic mail uniform resource locator

Linear Star Physical Layer Ethernet, DecNET, FDDI mbps Mbps depend on the transmission medium Windows 95 must have a LAN account common gateway interface interfaces a modem to a computer Windows package Windows NT

Ring Mesh Data Link Layer Ethernet, token ring, ARCnet mips Mips limited by modem speeds Netscape All of the above application protocol interface connects a computer to a network Netscape None of the above

C A D B B C C B A C

a Novell Interface Controller used to control a printer CD-ROM drive a modem Linux Novell Netware have to do with compression of have to do with Web graphics and video pages must use the World Wide Web must use electronic mail Printer modem provides access to the Internet is a CPU register used to send email used to send email used to protect a computer room from fires and floods a backup server

D B C

the Internet must have a LAN account bridge

none of the previous use appropriate communications software none of the previous

A D A

used to browse the Web uses wireless communication medium

is a CPU functional unit make of processor is a protocol for the transfer of files is part of Netscape between computers is part of Netscape None of the above

D D

a form of virus an email server

a screen saver program none of the previous a poor file server none

D D C D A

hardware IR system for the Internet browser none of the previous scanner CD-ROM clip-art file search engine provides access to the Internet is a CPU register is a CPU functional unit make of processor is a protocol for the transfer of files used to send email used to browse the Web is part of Netscape between computers

used to send email uses telephone lines

is part of Netscape

is a protocol that allows for remote login D

The layers cannot communicate with one another.

It is one large network.

Any layer can communicate directly with any other layer. It is made up of many networks connected into transmission lines called backbones.

Any layer can communicate only with the layer directly above or below it.

Any layer can communicate only with the layer above it. C Individual computers can connect to it using an ISP. A Port sniffing C

It works the same way as a local network. Denial of Service

Password cracking System intrusion used to protect a computer room from fires and floods a form of virus Flood a Web server with IP flood requests hack packet firewall a backup server Apply security patches All sites are safe and reliable. Use of identifiers by attaching to an e-mail. Phone A Trojan horse router an email server Update virus definitions There are safe and unsafe sites. Use of passwords

a screen saver program none of the previous Virus that initiates a ping flood UDP flood flood traffic switch a poor file server Backup data on a daily basis Only large namerecognizable sites are safe. Use of logical access methods by attaching itself to a document. Web traffic A worm hub none of the above Limit logging on access ActiveX-enabled sites are safe. Use of encryption methods by scanning the computer for a connection. Application updates Spyware

D A C B D C

B D

through an FTP port. E-mail Adware

B D D

Modems cookies and Trojan horses. An attack on a system for personal gain

Protocols Trojan horses and key loggers. An attack with the purpose of gaining publicity Disruption in Economic damage communication Crashing the stock market, as in the Shutdown of military 1930s security systems

Multiplexors cookies and key loggers. Giving out disinformation Disruption in supply lines Contaminating water systems

LAN key loggers and worms. Changing the content of a Web page All of the above are correct.

B C

D D

To carry more network capacity

To improve network services

To improve system response time

Shutdown of nuclear plant safety systems D To obtain an accurate inventory of network related equipment and parts and network nodes D

set its prices very high People Search

limit access to computer owners only Yahoo People Search

stop its competitors seeing their prices USA People Search Personal assets Adware

update its prices as soon as they are changed Lycos Search

D B

Name of your bank Date of birth Virus Fraud

buy stocks. Shill bidding Internet stalking. pop-ups. Use a fake e-mail address.

invest without risk. Phishing cyber stalking. cookies. Never use your real identity.

purchase off-shore property. Siphoning virtual stalking. spam.

Criminal records A Spyware B make large amounts of money by parking funds in their bank account. D Hoaxing Web stalking. viruses. Use anti-spyware software. Logical access controls Neither I or II telnet Misleads a program recompilation both HTML and Internet Explorer Web browser. None of the above one way HTML. MHTML B B B B B C C B B B A C D

Encryption I only irc Adds more bytes to programs Verifies integrity of files HTML Web query. .com is used for company round trip HTML. XML. using Internet Explorer to view a Web page that is stored on the hard drive on your computer Click on the Back arrow until the desired site is found the Refresh command Internet Explorer HTML document.

Use a proxy server. Message sequence Physical Security controls number checking II only Both I & II ftp www Increases boot up time Microsoft Excel round trip HTML document. .con is used for companies HTML. DHTML. clicking a hyperlink that references a document that is stored in the floppy drive on your computer

.co in used for company the World Wide Web Consortium HTML.

updating the values that are obtained through a Web query

viewing an Excel worksheet that you have saved as a Web page. B

Click on Go to or Search in the browser the Insert Hyperlink command

Go to the History page and look for the site the Update command

Go to the Bookmarks or Favorites page the External Data command

C A

Hyperlink BMP

Screensaver GIF

Sound JPEG

Save it to a floppy Write it down on a piece Add it to Favourites or disk. of paper. Bookmarks. extranet. intranet. privileged network.

Video TIFF Cut and paste it to a word processor document. network topology

C C

C A

an attachment. VoIP Desktop client, application, and database. Modem File Transfer Program So computers can be referenced by a name 193.1.2.3 paul .trigg @ domain. org. uk The US government

a signature. IPT Desktop client, software, and hardware. CD-ROM File Transmission Protocol So IP addresses can be shorter 45.1.1.1

a footer. IPP Desktop server, application, and database. Telephone line File Transfer Protocol So email is delivered faster 143.215.12.19

an encryption. PoIP Desktop server, software, and hardware. None of the above None of the above

B A

A B B

None of the above None of the above None of the above None of the above None of the above None of the above None of the above

A D B C A A C

paul.trigg@domain.org.uk paul.domain.uk No-one Internet Remote Conversations A letter will be sent to you in the post Hyper Text Mark-up Language

Scientists in Switzerland International Relay of Internet Relay Chat Characters It will be waiting for you to It will be deleted collect it Hyper Textual Hyperlink Text Marking Mark-up Lingo Language Receiving messages automatically from anyone in the People discussing a topic group of interest globally Application Software Utility Programs Deleted from the disk Copied from the disk Data bus Auto bus Data bus Address bus Personal computers Parallel computers BPS MIPS OCR MICR

High volumes of email Operating system Saved to the disk Address bus Control bus

None of the above Database management system None of above None of above None of above None of above VLSI voice recognition none of the previous none of the previous

C C A A C A B B B B

Super computers MHz barcode scanning is due to bad disk is caused by wear caused by overuse blocks converts a program to a fast interpreter slower than an interpreter assembly code translates and executes faster than a programs statement by converts a program to compiler statement machine code encrypting it decrypting it compressing it an assembler a compiler an interpreter the ALU the CU the power cord A runtime error can result if the user clicks the cancel A compile time error The program executes button occurs without any error File List Box Dir List Box Drive List Box

none of the previous transmitting it a linker None of the above

B C A C

You need to carry out conditional compilation A Combo Box A

memory overflow Netcop

systems overload NetBrute

RAM overflow Netcraft www.netcraft.com updates. hubs

buffer overflow NetBIOS www.netstat.com

D D C B A

www.nettools.com www.WhoIs.com code correct. firewalls It can consist of hardware, software, or both. That any open applications be exited Antivirus software an intrusiondetection system. cycle. Make sure all update and security patches are applied. patches. switches

It hides your network. Dependencies on other services Intrusion-detection software antivirus software. renewal.

upgrades. scanners It is a barrier between One of its techniques is your network and the packet filtering. rest of the Internet. That you also shut That you are not on the down associated Internet services Firewall a network prevention system. age. Router a proxy filtering system. history.

B C A D

Install and keep current Limit users ability to antivirus and anti-spyware configure the programs. workstation. Disable it and create a Delete it from the Delete it and change the nondescript user system and use the built-in guest account to a account with guest account. power user account. administrator rights. Tapes can be used over and over, and CDs should be kept forever. Trojan horse place a router between your ISP and your system. System acts abnormal

Block all incoming traffic on a network.

Create another administrator account to confuse the hacker. C

Tapes and CDs can be Tapes should be melted Give them to a recycle thrown away in the trash. and CDs broken. shop. C Virus IP spoofing Spyware C add spyware to your system. Files are missing download files from reliable Web sites. hone your programming skills. C Problems with your Printing problems wireless mouse D Never open an e-mail attachment unless you Turn off the auto-launch know what it is and in your e-mail client. who sent it. D spyware Spyware Check for open ports buffer overflow D A buffer overflow C Obtain usernames and passwords D

Update antivirus software. virus A virus Obtain system IP addresses E-mail and attachment scanning

Do not propagate hoax viruses. Trojan horse A Trojan horse Obtain cookies

Download scanning

File scanning

Backup file scanning

Use your browsers security settings Administrative assistant to the president The Standard toolbar multitasking. the default file location of new files

Do not open attachments Avoid skins and in unknown e-mails toolbars download

Use encryption software

Cook The Formatting toolbar tiling. whether the worksheet prints in landscape or portrait orientation

Junior accountant The Open command on the Edit menu cascading.

Network administrator D The Save command on the File menu A minimizing. A

the number of windows the margins on the you have open printed DOCUMENT minimizing cascading Click on the title bar and You cannot move a drag. floating toolbar.

A C C

shrinking multitasking Click on any border Click on any corner and and drag. drag. right mouse button anywhere on the Word window, choose the Customize command from the context-sensitive menu, and check the box for the missing toolbar right mouse button on any from the Toolbars visible toolbar, and click tab dialog box. on the missing toolbar. All documents are automatically saved with a default password. public domain software. public domain software. on-demand computing. best-cost provider Operational systems power outages. hot Delete

The password is casesensitive. nonprotective open source software. nonprotective open source software. on-demand software. software provider Informational systems hardware failures. cold Kill

left mouse button on any visible toolbar, and click on the missing toolbar. Once a document is protected by a password, it cannot be opened without that password. protective open source software. protective open source software. utility computing. Web service provider Structured query systems floods. empty Nothing

left mouse button anywhere on the Word window, choose the Customize command from the contextsensitive menu, and check the box for the missing toolbar from the Toolbars tab dialog box. B

Passwords can be up to only seven characters long. proprietary software proprietary software. utility software. application service provider Office automation All of the above.

A C D B D A D

text, graphics and text, hypertext and Power CD-ROM, digital email address. Point. camera and sound.

dormant B New C text, hypertext, Power Point, video and sound. D

the Line style Fill color Excel is started so that you can create a chart.

the Line color Line color A popup box prompts you for an existing Excel chart to insert.

the Font and the text alignment

Line thickness D Microsoft Graph is started so that you can The graph placeholder create a graph. is deleted. C taken from the first column or row of data in the datasheet, always taken from always taken from the depending on whether the first row of data first column of data in the the data series are in in the datasheet. datasheet. rows or columns. entered by the user. C Side-by-side column Stacked column Pie chart Line chart B Pull down the Insert menu and select Chart, click the Insert Chart button on the Standard toolbar, or Pull down the Click the Insert Chart Pull down the Insert pull down the Insert Insert menu and button on the Standard menu and select the menu and select the select Chart. toolbar. appropriate Object. appropriate Object. D Click the chart object, You cannot display the It automatically then click the View Pull down the Edit underlying datasheet displays in Slide Datasheet button on the menu, then select once the slide is view. Standard toolbar. Object. finished. B Single click the Change to Slide Sorter chart. Double click the chart. Click outside the chart. view. C A dialog box is displayed allowing you to enter the A dialog box is displayed name of the Excel allowing you to enter the worksheet that name of the Excel The datasheet window should be linked to worksheet that should be is toggled from closed the PowerPoint embedded in the The datasheet is saved to open (or from open presentation. PowerPoint presentation. as a separate file. to closed). D The application that The chart is The chart is doubled in created the chart is selected. The chart is deleted. size. started. A The chart is The chart is doubled in Microsoft Graph will selected. The chart is deleted. size. restart. D a slide one bullet item at a time, build bullet items a letter at a time, bullet items one letter at a bullet items one word at and build bullet items a time. a time. word at a time. D Subtle, Moderate, or Moderate Exciting Exciting D

Line style, Line color, text font, and text alignment Fill color, Line color, and Line thickness

a slide one bullet item at a time. Subtle

Enter and exit Enter

the way objects appear on a slide.

Neither enter nor exit; Both enter and exit, and neither fly in from top Fly in from top or bottom fly in from top or bottom nor bottom C Shift Alt Ctrl B Custom animation can be used to affect the way objects appear on a slide, to what objects do after they appear on a slide, and to the what objects do after they the way objects exit a way objects exit a appear on a slide. slide. slide. D The advanced timeline shows neither the sequence in which objects will appear on the slide, nor the duration of the effect applied to each object. C Clips, organization charts, and text D Animation program Fly in, From top, and Dissolve in A D

The advanced timeline The advanced shows the sequence in timeline shows the The advanced timeline which objects will sequence in which shows the duration of the appear on the slide and objects will appear effect applied to each the duration of the effect on the slide. object. applied to each object. Clips Paint program Fly in Once data is entered it cannot be changed. OLTP. You can change the appearance of a whole diagram, but not individual shapes of a diagram. [Enter+A] .ctx Validate On Error GoTo linelabel UpdateControls Organization charts Draw program From top Once data is entered it can be changed. OLAP. You can change both the appearance of a whole diagram and the individual shapes of a diagram. [Shift+Z] .ctl Validation On Error GoTo Inline PaintPicture Text Filtering program Dissolve in

Data cannot be entered There is no such thing into Datasheet. as a Datasheet. B OLST. OLIP. B

You cannot change the style of the connecting lines in an Organization chart. [Alt+Z] .ctr Check On Error Stop Refresh

You cannot change the color of the boxes in an Organization chart. B [Ctrl+Z] D .ocx Audit B A

On Error Resume Next D A

Cancel parameter to a non-zero value Cancel parameter to 0 Cancel parameter to a non-zero value Cancel parameter to 0 1 2

Resize UnloadMode UnloadMode parameter parameter to a zero to a non-zero value value UnloadMode UnloadMode parameter parameter to a zero to a non-zero value value 3 None of the above

A D

Consists of several Programs Form window, standard or code module Place code in the Terminate event AutoRedraw = True Msgbox err.no & err.text

Consists of several Applications Project window, view code window Place code in the Unload event AutoRedraw = False Msgbox err.number & err.text

Consists of Various Forms And Code Modules Class module, code module Place code in the Deactivate event

Consists of several Projects

None of the above None of the above

A B A D

Refresh PaintPicture Msgbox error.number & Msgbox error.number error.text & error.description

To display images to the user FreeFile Retrieve Common messages passed to Windows Caption

To help in creating a ToolBar GetFileNum Get

To allow the editing of icons GetFile GetProperty

To provide a repository for images used by other controls D GetBytes A Value B

Open dialog box Visible Click, KeyUp and Click and KeyPress KeyDown Ascii Format Binary Format CurrentX and CurrentY ScaleLeft and ScaleTop Property Get Background color property Min Shell Are one and the same You do not need to use the Set command here Property Assign

Windows explorer Multi-Line KeyUp and KeyDown Input Mode ScaleHeight and ScaleTop Property Let

Input box Font KeyPress, KeyUp and KeyDown Output mode x and y Property Set

D C D B A C

Caption property Max Substr

ZOrder property Value SetAttr Are actually not properties

AutoRedraw property CurrentVal CStr None of the above

C B A B

Can be different at times You do not have the permission to access the MyVar has not been class declared The ExecProcedure The Open method The Exec method method A warning query icon A critical message icon An exclamation icon statement. variable. intrinsic constant. InputBox function can MsgBox statement be created with the returns a value, InputBox function returns macro recorder, while while the InputBox a value, while the MsgBox the MsgBox statement function does not. statement does not. cannot.

None of the above None of the above

C D

None of the above B built-in procedure. C MsgBox statement can be created with the macro recorder, while the InputBox function cannot. B

Data cannot be entered into the form. Unload press the return key layers and planes tab

The form can be modified. QueryUnload press the tab key lines and spaces enter/return

Data can be entered. Deactivate press the escape key height and width backspace/ delete thesaurus

A new check box can be added. Terminate just keep typing rows and columns shift outliner

C C D D B C

grammar checker spell checker send a public message to friends interested in one topic send pictures to a friend Print all Enter closing database From ___ To ____ Copy tabbing

send private messages send a package to a to a friend friend Page setup Retrieve spacing word processing Storing information clip art Storing information Cut, copy, paste and clear Text which appear at the top of every page Print preview Save sorting spreadsheet None of the above clipboard

D B C B C B C

graphing Creating and editing To analyse figures documents subscript annotation Creating and editing To analyse figures documents Clear, replace and Spelling, grammar and select autocorrect Text at the bottom Numbers which appear of every page on every page Mouse, printer and processing system keyboard? Browser Clear, replace and Toolbars

Making Calculations B Font, Paragraph, Bullet and Numbering C Designated area on the document

Keyboard, Mouse, monitor and printer clip-art file Spelling, grammar and autocorrect

Monitor, keyboard and mouse microphone Cut, copy, paste and clear

None of the above digital scanner None of the above

B D C

Paste

Replace

Select all Delete, then paste

AutoCorrect Insert, then paste

B A

Copy, then paste Cut, then paste To give the original author a chance to accept suggested changes from the person who entered the revisions

To give the original author a chance to reject suggested changes from the person who entered the revisions

To complicate the revision process and to force the author to spend more time making corrections

To allow multiple people to work on one document in collaboration with one another C

A line appears through text that is to be deleted. Through the Edit menu by choosing Track Changes command The Versions command will allow you to save multiple versions of a document, including any changes that may have been made to that document. All versions are opened automatically.

A red underline appears beneath text that is to be added. Through the Tools menu by choosing Track Changes command

A vertical line outside the left margin signifies a change has been made at that point in the document.

Comments are enclosed in a text box at the right of the D document. Both through the Tools menu and the Reviewing toolbar

Through tools on the Reviewing toolbar

The Versions command will allow you to save only one version of a document, including any changes that may have been made to that document. The latest version is opened automatically.

The Versions command will allow The Versions command you to save only two will allow you to save versions of a only one version of a document: one version document without any of the original and one changes that were just version of any changes made to the document. made to the document. A The first and second The previous version versions are opened is opened automatically. automatically. B

Dictionary Word displays a list of the dates and times each file was saved. Fields Check boxes

Grammar check The most recent version will appear at the bottom of the list. Tools Toggle button

Spell check

Thesaurus

Word will show the Word is not able to tell name of the person who the most recent saved each version. version of a document. A Forms Text fields Comments can be edited or deleted by right clicking the highlighted text. Text which appear at the top of every page Insert A drop-down list Comments can be edited or deleted by left clicking the highlighted text. C B

Comments cannot Comments cannot be be edited. deleted. Text at the bottom Numbers which appear of every page on every page

None of the above

Press tab. text. header/footer. Copy button Fault Finding Insert

Press Return. graphics. bibliography. Paste button Bug Squashing Tools

Copy and paste. forms. find/search.

Insert page break. numbers. macro. This action is not Format Painter button possible. Error Injecting Debugging Edit Format

D C A C D C

a section of text where the first letter of each a section of white sentence is lowercase text on a black and the rest are uppercase. background. setting it in larger typing it all in capital type or font size. letters.

the guidelines used to establish where different an enlarged capital elements of the letter at the beginning newsletter will go. of a paragraph. underlining the text of the pull quote.

changing the color. A grid is a set of horizontal and vertical lines that A dropped cap is a word determine the placement of The reverse that starts with a technique means A pull quote is a quotation lowercase letter when it elements in a newsletter or other to add dark text on taken from (pulled) from should have a capital a light background. another document. letter. document. The tab spacing The width of each The height of each column column The number of columns within each column 6 10 12 72

D D D

One Press Ctrl+Enter to create a page break. A serif font at 10 points

Two

Three

Four

Press Ctrl+Shift+Enter to Press Enter to create a create a column break. section break. A sans serif font at 10 points A serif font at 20 points

2 inches 6 point 2 inches.

3 inches 10 point 2 inches.

4 inches 15 point

Press Shift+Enter to force a line break. C A sans serif font at D 45 points It depends on the left and right margins, and how many columns are D specified. B B

You are not in You have not inserted a Print Layout view. column section break..

to store a file on to store a file on a the hard drive diskette Data about a set of similar things Mainly text Thesaurus Spell Checker

25 point impossible to 3 inches. determine. Word cannot display columns during You have not specified editing; you will see continuous section them only when you breaks. print the document. to move a section of text to leave an original section of text in from the original place while pasting a location to another location copy elsewhere A set of different graphics None of the above Grammar Checker Find and Replace

D B B

q_id AC1 AC2 AC3 AC4 AC5 AC6 AC7 AC8 AC9 AC10 AC11 AC12 AC13 AC14 AC15 AC16 AC17 AC18 AC19 AC20 AC21 AC22 AC23 AC24 AC25

q_desc The ------ key can be used to select an existing company from list of companies. Import and Export of data between Tally and other programs is possible only through ---------- Program. The re-order point is the inventory quantity that trigger a stock replishment activity. A created company's detail can be modified through keys A/An ------------- is the official notice that the firm sends to its customers to advise then to the amount of money that is owed. In tally,all masters have ________main options In tally,to create a new column in balance sheet press _______ In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger accounts into one line statements In tally, we can alter ledger details using either single or multiple modes but not alble to delete a ledger from multiple modes. In tally,a group company is marked with an ______________ The systems that work together to order,receive, and pay for replenishment of stock are --------------Tally allows to delete a ledger from --------- alteration mode. --------------------- is/are useful for management in the decision making. In tally,the group company must contain at least _____________ members To cancel a vourcher entry in Tally, short-cut key is ----------The accounting masters and inventory masters related to We press ------------- function key to display the age-wise analysis of Bills Receivable or Bills Payable report In Tally, we press ------------, to print report . In Tally, Types of Accounts and Types of Vouchers passed during the period, can be seen in ------------- report. In the Tally Software, the ------------ directory stores all data entered by the user. The Ledger Accounts are unique in Financial Accounting Packages Customers can be permitted to enter their own data into the firms computer using the firms wide area network is an example of In Tally, we can customize the Vouchers as per our requirements The number of steps in Accounts Compilation are Each action/transaction of a firm is described by a ----------------.

AC26 AC27 AC28 AC29 AC30 AC31 AC32 AC33 AC34 AC35 AC36 AC37 AC38 AC39 AC40 AC41 AC42 AC43 AC44 AC45 AC46 AC47 AC48 AC49 AC50 AC51

Tally is based on mercantile accounting system Ctrl + N is used to ----------------------- in Tally classify the accounts under different heads so that summarised information is possible. Revenue Account also known as -------------- Account Method of Voucher Numbering is/are Accounts Receivable are displayed in To assemble a product from different items -------------- entry is used A --------- purchase orders data flow is directed to the purchasing system for use in closing out the outstanding purchase orders in the receiving system diagram. Tally provides at least --------- predefined voucher formats The value of the inventory is included in a ledger accounts as an asset on the balance sheet " The buyers can follow up with the suppliers to determine the reasons " is an example of ----------------From voucher entry mode , if we press __________ then we get payment voucher in tally Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged accounts member companies of the group. A ----------- is a primary document for recording all financial transactions. The field can have a value between ________________ in FA Package. The _______ file maintains data that describes the supplier past transaction with the firm in terms of material quality in AIS It is necessary to manipulate data to transform it into ---------------In tally, to change the date of the voucher press ______ Tally can maintain budgets on ---------------The value of the inventory is included as an asset on the balance sheet In ratio analysis report of Tally FA packagewe we press ________________ function key to the display of bills receivable , bills payables report The accounts payable system is responsible for paying the suppliers for the ---------------What is the default financial year in Tally6.3 _________________ Tally encrypts and stores TALLY DATA at the data directory The Profit & Loss statement can be displayed in ---------------- format(s).

AC52 AC53 AC54 AC55 AC56 AC57 AC58 AC59 AC60 AC61 AC62 AC63 AC64 AC65 AC66 AC67 AC68 AC69 AC70 AC71 AC72 AC73 AC74 AC75 AC76 AC77

Default ledger accounts in tally are ______ Default 'godown' name in tally is ____________ 'Tally vault' is a _________________ To create a sales voucher in tally , you have to press _______ A Group Company is ------------------------- given to the merged accounts of member companies of the group. In tally,"credit note" voucher type records entry for ________________ In tally you get currency symbol option from _______ menu ------------------ gives the balance for each day for the voucher type has been selected. For 'stock journal' entry we press ______________ in tally Tally provides the capability to the administrator/auditor to track changes in the areas is/are In tally, types of users are _______________ By pressing -------- key, a list of inventory reports can be displayed straightaway from the balace sheet report Projected approximation of income or expenses is called ______________ . "Administrator" type user is also called 'Auditor' of a company in Tally You will get company information , if you press __________ from gateway of tally A constituent(member) company can be a member of more than one group. Default stock category in tally is ______ To create a log of the import activity in a file _____________ is located in the same directory as an executable program in tally In Tally,inventory valuation method option is available from _______ Tally audit feature is available in a company __________________ In tally, a group company can also be a constituent(member) of another group company Default number of groups in tally are ________ During voucher entry ------------- are used. User designated as --------------- can view audit list. Tally supports Importing of data from ---------------In an accounting information system, which of the following types of computer files most likely would be a master file?

AC78 BC1 BC2 BC3 BC4 BC5 BC6 BC7 BC8 BC9 BC10 BC11 BC12 BC13 BC14 BC15 BC16 BC17 BC18 BC19 BC20 BC21 CA1 CA2 CA3 CA4

Which of the following is an advantage of a computer-based system for transaction processing over a manual system? A computer-based system: The memory address register is used to store Inefficient usage of excess computer equipment can be controlled by Which of the following is not the component of a CPU A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The following is an information not found in the trailer label Hard copy is a term used to describe...? What do the abbreviations VAB stand for What control would prevent the accidental erasure of customer information from a magnetic tape What are the individual dots which make up a picture on the monitor screen called? Header label normally include all the following except the A daisy wheel is a type of...? Which approach or technique is a control usually associated with microcomputers An impact printer creates characters by using...? The best security control in a microcomputer environment is to What would you NOT use with a flatbed plotter? What do you need for an ink jet printer? The greatest control exposure in a microcomputer environment is the lack of What do you need for an ink jet printer? A laser printer does NOT use? The amount of data that a disk may contain is known as the disks...? You can ________ protect a floppy disk. Information on a hard disk is usually backed-up using a...? Using generalized audit software packages can add a lot of value _______ _______ is used for CAAT as database Generalized audit software perform auditors to undertake any past records and not concurrent auditing Generalized audit software is a file whose capabilities for verifying processing is logic

BC22 BC23 BC24 BC25 BC26 BC27 BC28 BC29 BC30 BC31 BC32 BC33 BC34 BC35 BC36 BC37 BC38 BC39 BC40 BC41 BC42 BC43 CA5 CA6 CA7 CA8

Magnetic tape is a...? Hard disks can have a storage capacity in the region of...? Which storage device has the largest capacity in Mb? Which storage device cannot be erased? You can ________ protect a floppy disk Where should floppy disks be stored? The contents of these chips are lost when the computer is switched off? What are responsible for storing permanent data and instructions? Which parts of the computer perform arithmetic calculations? What are small high speed memory units used for storing temporary results? How many bits of information can each memory cell in a computer chip hold? What type of computer chips are said to be volatile? Magnetic tape is a...? Software can be divided into two areas: Travel agents use this computer system when reserving flights Which computers are used in the weather forecasting industry? Vacuum tube based electronic computers are...? Which generation of computer was developed from microchips? Which generation of computer uses more than one microprocessor? Which generation of computer developed using integrated circuits? Which generation of computer developed using solid state components? Name three steps involved in developing an information system CAAT's are computer program and data that auditor uses as part of the audit procedures to process data if audit significance contained in an entity CAAT do not contains package programs, purpose written program, utility programs or system management programs Embedded audit routines are sometimes built into an entity's computer system to provide data for later user by the auditor SCARF involves embedding audit software modules within an application system to provide continuous monitoring

CA9 CA10 CA11 CA12 CA13 CA14 CA15 CA16 CA17 CA18 CA19 CA20 CA21 CA22 CA23 CA24 CA25 CA26 CA27 CA28 CA29 CA30 CA31 CA32 CA33 CA34

Concurrent use auditors as the member of the system Regular cross system verification may minimize frauds Computer security is frequently associated with confidentiality, integrity and authentication Data reserve engineering process metadata to document system and abstract business rules and relationship The first step for developing CAAT is_________ Using the open database connectivity feature in ACL is ______________ Computer Assisted Audited Technique involves the use of computers through "Black Box Approach" White Box Approach necessary involves expert knowledge on the part of Auditor The transition from manual system to CIS environment bring dramatic changes including ________________ Auditing with computer necessarily supports the CAAT involves an Auditors' appreciation of __________ Widespread end use computing result in unlimited errors creeping into system going to accept handling, thereby increasing audit risks For computerized auditing usage of sophisticated audit software would be a necessity Important knowledge needed to begin planning the use of CAAT is _________ The move towards paperless EDI would eliminate much of the traditional audit trail, radically changing the nature of audit evidence Computer operation controls are designed to provide ________________ Systems development control, apart from others, include authorization, approval, testing, implementation and documentation of new systems software A system could be _________ A system exhibits 'entropy' Super computer are the largest and fastest and is very suitable for commercial application including audit work Assembler language uses Mnemonic symbols Operating systems are devised to optimize the machine capabilities, the function include_______________ General purpose software provides a framework for highly complex scientific operation In batch processing, transactions are processed one after another The use of computer assisted audit techniques is not gaining popularity not only ________________ On-line processing refers to grouping of transaction and processing the same in one go from start to finish

CA35 CA36 CA37 CA38 CA39 CA40 CA41 CA42 CA43 CA44 CA45 CA46 CA47 CA48 CA49 CA50 CA51 CA52 CA53 CA54 CA55 CA56 CA57 CA58 CA59 CA60

Real time refers to the technique of updating files with transaction data immediately after the occurrence of the event to which it relates In OLRT the CPU should process the capability of program interruption Time sharing system allow access to a CPU from remote terminals DSS is defined as a system that provides tools to managers to assist them in solving structured problems DSS has the following components _________________ Master files contains current records for identification and summarizing Transaction files contain relatively permanent records take product profile, customer profile, employee profile etc Master file configuration includes ____________ ______ is a file management software package that lets users and programmers organize data into files and then process those files CAATS provide added value to the clients because _______________ File volatility refers to the number of addition and deletions to the file in a given period of time File activity is the proportion of transaction file records that are actually used and accessed in a given processing run: File interrogation refers to the _____ of information from a file One -to-one relationship means a single entity to a single entity in a monogamous structure RDBMS is structured to a series of 2 dimensional tables SADB stands for ____________ Controls are present over many aspects of the computer system and its surrounding social environment In framed checking the data entry is checked against an expected picture or format Errors are correlated_________ Field check is exclusive to a field _________ law basically states that there is a specific probability of the first digit of a no. being 1,2,3 etc Check digit is a group of nos. added to a code for determining the accuracy of other digits in the code Hierarchical code means _________ The validation checks applied to a field depend on the field's logical inter relationships with other fields in the record The contents of a field could determine _______ sign for a ______ field Batch is the process of ______ together _____ that bear some type of relationship to one another

CA61 CA62 CA63 CA64 CA65 CA66 CA67 CA68 CA69 CA70 CA71 CA72 CA73 CA74 CA75 CA76 CA77 CA78 CA79 CA80 CA81 CA82 CA83 CA84 CA85 CA86

Hash totals means meaningless totals With OLRT where interactive data entry is available, the master file associated with a transaction may be searched for confirming data Controls are required for authorization to ensure data integrity and detect possible breaches in security Data from client application are not stored in the organization's database through auditables events and function All input records in a batch are normally of different types IDEA stands for _________________________________ A transaction file is sorted prior to the update of master file A sequence check on the transaction or master files by an update program is not required Whenever monetary transactions are processed against master files, the update program should maintain a correlation account to record such Internal tables are stored tables from which certain values are extracted for further processing and storing For small to medium sized systems, individual modules are coded and individually tested and then assembled to be tested as a whole-the testing In systems testing, test involves_________________ Recording transactions in a controlled manner may amount to loss of stored data Audit software is used by the auditor to _________ Core image comparison is a software used by the auditor to compare _______ version of a program with a secure ________ copy Database analyzer is a software which provides detailed information concerning the operation of the database SAS stands for ______________ Embedded code is a software used by the auditor to examine backup data Embedded code performs wide variety of audit task Core image comparison is particularly useful where only executable versions are distributed Log analysis is a software used by auditor to detect virus On line testing techniques the auditor ______ data either _______ or fictitious in order to see that a specific program or sever edit test is doing its work Mapping software is used by the auditor to list unused program instructions Mapping software has very objectives Modeling is a variety of software which ________________ On line testing can be targeted for specific functions carried out by programs

CA87 CA88 CA89 CA90 CA91 CA92 CA93 CA94 CA95 CA96 CA97 CA98 CA99 CA100 CA101 CA102 CA103 CA104 CA105 CA106 CA107 CA108 CA109 CA110 CA111 CA112

Program code analysis involves _____________ __________ is a software of CAAT Snapshot is software which takes a picture of a file or data or a transaction passing though the system Base case system evaluation includes____________ While base testing forces on finding if there are any defective execution policies in a program Black box testing seeks to determine whether application output is what it is supposed to be In integrated test facility approach the auditor should ensure that the impact of test transaction is subsequently eliminated from the computer files Black box testing is _______ based and white box testing is _______ based Source code review means__________ In formula in flow hypothesis the auditor should expand the extent of substantive tests to determine how the defects may impact the attainment of the All material application oriented events that occur within the boundary subsystem should be recorded in the accounting audit trail In examination of audit trail the following data associated with an event may be ___________JCL means_________________ Audit should be periodically analyzed to detect any control weakness of the system In an accounting audit trail, intrusion detection system might monitor the amount of processor time consumed by the user to detect unusual deviation from the A sample size calculator program assists auditors in determining RAND() function Generalized audit software consists ___________ Specializes audit program may be___________ Generalised audit software could be used by the following in consistencies or significant fluctuations Generalized audit software function include____________ In the file reorganization merging capabilities are needed in data from separate file is to be combined on a separate work file Auditors cannot use generalised audit software to extract the data needed for audit purpose Auditors can combine functional capabilities of generalized audit software to accomplish the task of __________________ Which of the following is not the feature of GAPs Which is the example of CAATs In audit procedures, test data is

CA113 CA114 DB1 DB2 DB3 DB4 DB5 DB6 DB7 DB8 DB9 DB10 DB11 DB12 DB13 DB14 DB15 DB16 DB17 DB18 DB19 DB20 DB21 DB22 DB23 DB24

Which of the following is not the use of CAATs Which of the following are called explicitly by another procedure? _________ data type is generally used for fields assigned as primary keys in a table MS access objects can be published in the web In code-builder, got_focuse, click,dbl_click,enter are examples of _______ _______can be used to automate certain actions in response to events In the macro sheet the macro is selected in the _____field To build complex expressions_____is used The three list boxes present at the bottom of the expression builder are called_____ ________option is selected from the view menu to create macros with conditions _______report can be created with minimum user input _______layout of a form displays one record at a time The table or query name on which we are going to build our report is selected from the ____ dialogue box ______and_____are the two types of auto reports available There are no wizards for creating a database in access ______option from the insert menu option is chosen to add an embedded chart In ms-access, while using SQL, references constraint is used for creating _______ _______is used to create a mailing label ______header is present at the beginning of the report ______is present at the bottom of each page in a report In SQL, having clause is used for _________ ______field is added to the macro sheet when we select grouping option from the view menu ______can be used to create toolbars _______query is used to add records from one or more tables into an existing table _______window is used to write VB code in access application Values for other tables, queries are maintained in look up fields data type

DB25 DB26 DB27 DB28 DB29 DB30 DB31 DB32 DB33 DB34 DB35 DB36 DB37 DB38 DB39 DB40 DB41 DB42 DB43 DB44 DB45 DB46 DB47 DB48 DB49 DB50

Visual Basic language is a _____ tool ______ function is used to display a message box Other ms-office applications can be accessed from ms-access using a concept called ________ OLE stands for_____ The application that supplies data in OLE is called an _________ If any change made on the object from the client side is reflected on the server then the object is said to be _____ _______is the file format that works on internet ______ is used to convert any ms-access object into html format _______ option in publish to web wizard produces a page that is static in nature _______query is used to create or change database objects in a current database Currency fields express the amount in _________ _______is selected from the toolbar to add an OLE object To display an OLE object in the form of an icon ____ option is selected from insert object dialogue box _______option from the file menu is selected to run 'publish to the web wizard' _____page in an web application is used to navigate to the rest of the pages in the application ______ is fired when an event is triggered is the concept based on a Visual Basic language Ms access is a ___________ A collection of data stored in different objects is known as a _________ A blank database can be created using __________ Text type data can be of _____ characters in ACCESS ______is a datatype that assigns values automatically Tables cannot be imported from other databases If two tables having same values for the fields are joined it is called an ______ Duplication of records in a field won't be allowed if the fields are declared a________ Changes from a master table can be reflected on to the child table by selecting _____option To see more than one record at a time in a form we use _______

DB51 DB52 DB53 DB54 DB55 DB56 DB57 DB58 DB59 DB60 DB61 DB62 DB63 DB64 DB65 DB66 DB67 DB68 DB69 DB70 DB71 DB72 DB73 DB74 DB75 DB76

In SQL, delete command is used to remove _________ In MS-Access, filter excluding selection will display only those record(s) which meet the criteria. Properties of the fields are managed by _____ in Dynaset ______queries allows us to view data in row by column manner The type of queries that can update or delete record(s) in a table(s) are called __________ Joining tables without any matching values in the fields is called ____________ Primary key uniquely identifies each record Which of the following dialog box is/are used in the creation of form ________ _______ query wizards are used to generate summary calculations for a table Properties of a form can be changed by selecting ______from view menu options Forms that are included in other forms are called ______________ In MS-Access, while using form design view, for creating a command button for adding a new record, we should select the _______ category from the _______ form displays fields in a single horizontal row The process of arranging the data in a meaningful order is known as ___________ ______ are used to select only some particular records from the table or any other database objects In MS-Access, user may specify criteria for filter in form view using _________ ___wildcard character represents any single character Records cannot be sorted by a primary key A control without a data source is known as ___________ Set of related option buttons, check boxes and toggle buttons is known as _____________ The collection of related data and objects is called a ____________ Which of the following is control types ____________ In MS-Access, the function that gives the current date is _____________ _____is a control that lists set of data ______is a form that summarize large amount of data ______allows to create a filter by typing the value in a data sheet

DB77 DB78 DB79 DB80 DB81 DB82 DB83 DB84 DB85 DB86 DB87 DB88 DB89 DB90 DB91 DB92 DB93 DB94 DB95 DB96 DB97 DB98 DB99 DB100 DB101 DB102

Wizards for toolbox controls are called a __________ The wild card representation for any 5 letter word that starts with ram is ________________ Look up fields slow up data entry ____is an access object that displays un-editable data _____option from the new object toolbar gives the easiest way of generating a report ______ represents data in a pictorial format Changes of one table can be carried over to another related table Hyperlinks are used to jump to any kind of information or data from a file The memo field can have text upto_____ characters in length In MS-Access, columnar layout can be used to view multiple records in a form In MS-Access, alter command may be used in adding a primary key to a table Update query is used to add records from one or more tables to the end of an existing table In ms-access, datasheet view is available in ___________ ______are used to jump to any kind of information from a datasheet or a form Home page will always be present as a first page of an application Make table queries create a new table from the records of another table In ms-access, to protect a database file from illegal access, we may set database password. The option of setting database password is available in Foreign key is a field that uniquely identifies each record and accept no null values Data definition queries are used to create or change database objects The attributes of a composite key are known as ________ OLE object is a data type in access Data displayed in forms cannot be edited A sub form is used to display one to many relationship between tables We can switch from datasheet view to form view by selecting view -> form view option In MS-Access long integer is a datatype In MS-Access, while designing a table for a particular field, the Required parameter is set to yes. This validates the field as _______

DB103 DB104 DB105 DB106 DB107 DB108 DB109 DB110 DB111 DB112 DB113 DB114 DB115 DB116 DB117 DB118 DB119 DB120 DB121 DB122 DB123 DB124 DB125 DB126 DB127 DB128

Sorting is applied to select only some particular records Filter by form can be created from a forms shortcut menu Advanced filter uses a filter similar to the query design window to create a filter ? Wildcard character represents any number of characters _________ of the following is/are a type of chart A bound control is tied to a underlying query or table A calculated control uses expression as a source of data Text boxes cannot be bound controls The default query invoked by ms-access is A control can be bind to a record using row source property List box is a control that offers a list of choices If a table is joined to itself it is called a ________________ A picture box combines the activities of both a text box or a list box Line is a tool box control Text boxes can be part of a option group _____ chart exists as a separate object Filtering data is a way of arranging data in a meaning full order Wild card characters are used for sorting records Pivot tables are used to navigate to the other tables in a database Reports are used to represent un-editable data In MS -Access, the records in a table are sorted based on _________ Relationship is an association between _________ Summary options dialog box is used to summarize data ______ queries can be used to delete a group of records that meet some specific records Charts can convert numerical data in a easily understandable format Embedded charts exist separately

DB129 DB130 DB131 DB132 DB133 DB134 DB135 DB136 DB137 DB138 DB139 DB140 DB141 DB142 DB143 DB144 DB145 DB146 DB147 DB148 DB149 DB150 DB151 DB152 DB153 DB154

The chart which cannot exists as a separate entity are _______________ From ms - access, if we want to view the records stored in a table in ms - excel worksheet, we need to Page header is present at the beginning of each record Detail section has a header and footer A macro is performed only when the user initiates an event The macro is selected from the action field of a macro sheet A macro can be made to execute before the starting of a database In MS-Access. While appending records, the source and the target table must have similar structure and fields We can add our own functions to the expression elements list box of the expression builder _______is the wildcard character which represents the presence of any number of characters Macros can be used to add a menu to a database object _____ header is a unique feature of reports Chart can either be a form or a report Group header will be present at the design view of a report even if the report is not grouped We can change from the design view to the form view without being prompted for saving the changes made Charts can be produced without the wizard Macros can be used to create user defined error messages Between and Not Between is ______ type of operators The default data type of VB is integer Visual Basic is based on __________ _______is the name of the database object that displays data and can be used to edit data In access OLE objects cannot be linked _____ section is present for each record in the report A ________ sheet lists all the properties that pertain to the form or the controls Textboxes can also be an example of unbound control In MS-Access, we may design command buttons for navigating records

DB155 DB156 DB157 DB158 DB159 DB160 DB161 DB162 DB163 DB164 DB165 DB166 DB167 DB168 DB169 DB170 DB171 DB172 DB173 DB174 DB175 DB176 DB177 DB178 DB179 DB180

_______are forms that are included in other forms _______ are used to represent our data in graphical format A field with a _______ uniquely identifies each record Large amount of data can be summarized using ______ tables _______ are employed to select only some particular records from a database object ______ control need not have a data source ______ control combines the functionality of both a text box and a drop down list MS access is a DBMS A form can be bind to a record source using _____ property of the form ______ forms displays field in single row ______ forms are usually used for tables with one to many relationship _______ control uses an expression as a source of control _______ control is tied to field _______is the form that can be created with minimum input from the user ______option from the tool menu is selected for setting relationships between tables ______,______and_____are the buttons belonging to the options group _________allows us to create a filter from a field short cut menu ________is a database object which displays data but cannot be used to edit data What term applies to a collection of related records in a database? All of the following terms are related to computerized databases except which one? What is a database? What does a record contain? An RDBMS is a Data Warehousing refers to Unauthorised alteration of on-line records can be prevented by employing What is a database?

DB181 DB182 DB183 DB184 DB185 DB186 DB187 DB188 DB189 DB190 DB191 DB192 DB193 DB194 DB195 DB196 DB197 DB198 DB199 DB200 DB201 DB202 DB203 DB204 DB205 DB206

What does a record contain? What is a report? What is the best way to analyse and change data What are some popular office orientated software applications? Which of the following constraints can be used to enforce the uniqueness of rows in a table? Which of the following commands is used to change the structure of table? An RDBMS is a Data Warehousing refers to You are creating a client application that calls ActiveX DLLs. Which of the following properties of the Err object provides the name of a component that This database holds personal information. The user can help to keep it confidential by If the database holds customer names and addresses, personalised letters can be created automatically using Application software suited to storing the survey information obtained in the table would be The characters * and ? are sometimes used in search criteria as Which of the following field types will generate the primary key automatically? Referential integrity ensures that the: Tables are related to one another through a: A foreign key is: You are creating a banking database to track customer loans. The bank will, of course, have many customers, each of whom may take out one or more loans, In a one-to-many relationship between Companies and Employees, which field is found in both tables? Which of the following ensures that records in related tables are consistent with one another? For example, it ensures that you cannot add a record with an How would you delete a relationship between tables in the Relationships window? In a Customers tables, what does a plus sign next to the CustomerID field mean? What is required of the fields that join two tables? Assume a one-to-many relationship between the Customers table and the Loans table, with referential integrity in effect. What happens when you attempt Which of the following is true when viewing a main form and its associated subform in the Form Design view? Which of the following relationships does not belong in a database based on a professional sports league such as football or basketball?

DB207 DB208 DB209 DB210 DB211 DB212 DB213 DB214 DB215 DB216 DB217 DB218 DB219 DB220 DB221 DB222 DB223 DB224 DB225 DB226 DB227 DB228 DB229 DB230 DB231 DB232

Which symbol is used at the end of the join line in a related table to signify the many side of a one-to-many relationship? You have created a one-to-many relationship with referential integrity between a Customers table and a Loans table. From which table can you delete a record? The correct order of the arguments for the MsgBox statement is: The first statement in a procedure named CreateList is: Which of the following is TRUE related to form fields? A text field: The purpose of a database is to: A database stores: A database records: A sales contact manager used by a salesperson is an example of _______________ A Customer Resource Management (CRM) system is an example of_________ The industry standard supported by all major DBMSs that allows tables to be joined together is called __________. A program whose job is to create, process and administer databases is called the _____ Microsoft Access may use which of the following DBMS engines? Which of the following are basic components of an enterprise-class database system? In an enterprise-class database system ________ . In an enterprise-class database system, the database application ___ . In an enterprise-class database system, reports are created by ____________________ . A database is considered "self-describing" because _______ . In an enterprise-class database system, the database _________ . A database may contain _________________________ . A database designed using spreadsheets from the Sales department is a database being designed _________________________ . A database designed to implement requirements for a reporting application needed by the Sales department is a database being designed _______ . A database designed to combine two databases used by the Sales department is a database being designed _________________________ . Database professionals use ________________ as specific data sources for studies and analyses. Database professionals use a set of principles called ________________ to guide and assess database design.

DB233 DB234 DB235 DB236 DB237 DB238 DB239 DB240 DB241 DB242 DB243 DB244 DB245 DB246 DB247 DB248 DB249 DB250 DB251 DB252 DB253 DB254 DB255 DB256 DS1 DS2

A very popular development technique used by database professionals for database design is known as _______________________ . A very popular development technique used by database professionals to adopt a database design to new or changing requirement is known as _____ . The predecessor(s) of database processing was (were) __________ . In a relation __________________________ . An attribute is also known as a(n) . A combination of one or more columns used to identify particular rows in a is___ . A combination of two or more columns used to identify particular rows in a relation is________ . A determinant that determines all the other columns in a relation is______ . When designing a database, one of the candidate keys in a relation is selected as the _________ . Normalization is a process used to deal with which of the following modification anomalies? When you are given a set of tables and asked to create a database to store their data, the first step is to ____ . Modern microcomputer personal DBMS products______. Which of the following are true about data mining applications? We have obtained access to the company's operational data. We examine 50 records for customers with phone numbers that should use the current area We have obtained access to the company's operational data. We have been asked to produce a report with an item by item analysis of sales, but the only A data warehouse database differs from an operational database because: Which of the following objects is used to display a menu? Which of the following objects are NOT found in an Access application? You are developing an Access application that you expect to upgrade periodically. Which of the following statements is TRUE? Which of the following statements regarding Access applications is NOT true? Which of the following brings a copy of the table into the current database and does not maintain a tie to the original table? What makes a database an application? What is the Access tool that is used to create the user interface? The purpose of a data warehouse is to: ___________ means the result of applying to specific information certain specific technical processes. __________ is an algorithm which creates a digital representation or "fingerprint" in the form of a "hash result".

DS3 DS4 DS5 DS6 DS7 DS8 DS9 DS10 DS11 DS12 DS13 DS14 DS15 DS16 EC17 EC18 EC19 EC20 EC21 EC22 EC23 EC24 EC25 EC26 EC27 EC28

__________ is of standard length which is usually much smaller than the message but nevertheless substantially unique to it. Digital Signature involves two processes. They are ___________ and __________. The Costs of Digital Signature consists mainly of the following CA stands for ________________ A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private Key A Digital Certificate does contain Owner's Public Key, Owner's name, Expiration date of the Private Key, Serial number of the digital certificate ______________ enable web servers to operate in a secure mode. ______________ are used by individuals when they exchange messages with other users or online services. ______________ are on-line databases of certificates and other information available for retrieval and use in verifying digital signatures. Signing Writings serve the following general purposes______,_______,_______ and _______ The most widely accepted format for Digital Certificate is defined by the CCITT X.509 A certificate may prove to be unreliable, such as in situations where the subscriber misrepresents his identity to the certification authority CRL stands for The prospective signer identified in the digital certificate holds the_________ and is called the ___________ In EDI interface, the translation service receives _________ as incoming files from the communication service The EDI standardisation for International Trade and Commerce is introduced by __________ In EDI, the transmission files are composed of different sets of external format files which are grouped into multiple sets under the name of ________ The ________________ are pre-paid credit cards that include an embedded cards ________________ are another form of credit payment that lets customers use digital online cheques to pay Web merchants directly In Active advertisement, there are two types of models. They are _____ and ________ The network based technology is/are ____________ Decryption is a process employed for scrambling of plain text for web based transactions Asymmetric cryptosystem is based on __________ and ____________ Value Added Network is an example of _________ The advertising strategies emerging in the on-line world are ____________ The _________ model use direct mail, spot television or cable television, in active based advertisement.

EC29 EC30 EC31 EC32 EC33 EC34 EC35 EC36 EX1 EX2 EX3 EX4 EX5 EX6 EX7 EX8 EX9 EX10 EX11 EX12 EX13 EX14 EX15 EX16 EX17 EX18

The ________ is a form of mail that is not targeted to a specific audience The __________ model refers to information that is placed at a point where it will be noticed by customers in the course of other activities and does not The most beneficial advantage of ERP system is What is the term that describes spying on ones business rivals to gain a competitive advantage? What would you NOT be looking for when spying on a competitor? An online drugstore such as Drugstore.com is an example of_______ Which of the following is an example of unacceptable online netiquette? Which of the following statements is correct concerning the security of messages in an electronic data interchange (EDI) system? The wizard that is used to import text files is_________________ The alphabet indicating the column followed by the row number is known an__________ Which of the following files could not be opened in excel _______________ In excel, the dates that are stored as sequential numbers known as ________________The command to display the current date in a cell is _________________ In excel, absolute references are represented by a ________ before the column and row addresses The ________ can be used to select the function and assemble the arguments correctly Specific parts of information required by functions to perform certain tasks are called as___________ Which of the following do not belong to the formula category in excel environment__________ The function that in used to join cell values together in a single cell ________ The function that is used to count all the values that meet specific criteria _________ The wizard that is used to create and edit charts _______________ The function that is used to calculate the payment for specific loan terms ____________ The function that is used to add together all values that meet specific criteria is known as ____________ The __________ option present in the file menu options is used to specify major facts of the page to be printed The command that is used to apply a format automatically __________ The ____________ makes the information in a worksheet meaningful and easy to understand A particular part of a work sheet can be printed by setting the _________

EX19 EX20 IN9 IN10 IN11 IN12 IN13 IN14 IN15 IN16 IN17 IN18 IN19 IN20 IN21 IN22 IN23 IN24 IN25 IN26 IN27 IN28 IN29 IN30 IN31 IN32

The process of finding or selecting information is known as ____________ The option that is used to cancel the filter process for a specific column and display all the records is ________ The URL for encyclopedia Britannica is_________ _______ maps IP addresses with the domain names of the sites Internet can be defined as _______ The most important service of the ______ is to manage traffic control _________is a program that displays information about a host connected to the net _______ is a program or a tool that helps in locating a file anywhere on the net URL stands for ____________ IN an URL the word before the color refers to _______ A ______ always begins with a slash Prodigy is run by IBM and ______ The World Wide Web is referred to shortly as the _______ Gopher and WAIS enables the user to ______ ______ is the program used to run CompuServe's regular services Navigating through the menu of gopher is called moving around _______ The directories that come with built-in engines are yahoo,lycos and ______ To use the finger command,SLIP users must run a programme called______ The web maps are called _______ Directories consists of _______ levels The _____ level gives the broadcast overview of the net The huge list of keywords from important items is called ______ The two types of search in veronica are _____ and ______ _______ searches by keywords Mosaic displays links in color whereas _____ does not display links in color ______ supports one button publish

IN33 IN34 IN35 IN36 IN37 IN38 IN39 IN40 IN41 IN42 IN43 IN44 IN45 IN46 IN47 IN48 IN49 IN50 IN51 IN52 IN53 IN54 IN55 IN56 IN57 IN58

SPY MOSAIC is distributed by_______ ______ is a program that helps us to log on to other networks HTTP is the acronym for __________ ______is used to transfer and copy files over the internet _____ is a program that helps us to log on to other networks TCP/IP stands for ________________ Archie servers can be accessed in_______ different ways in internet _______is the computer on the internet that translates between the internet domain names and the internet numeric address TIA stands for_____ in internet Service indicates the name of the ________ used to access data, present on the other end of the link. HTTP stands for______ ________ is used to link pages in the world wide web FAQ stands for ______ The internet adapter is a programme that makes our connection act like a _____or a ____ account The step involved in Communicating between the web clients and servers is ______________ WSIRC stands for______ Two of the important browsers are_____ and_____ Lynx is a _______ programme that works with terminals The huge list of keywords from important items is called an_____ VERONICA is an acronym for _______________ The first freenet is created at the_____ and is called______ ________ are defined as ways of communication amongst networks ______and_____ are web searching features WINWAIS has two source lists namely____ and______ ________ is also called as WAIS manager HTML stands for_____

IN59 IN60 IN61 IN62 IN63 IN64 IN65 IN66 IN67 IN68 IN69 IN70 IN71 IN72 IN73 IN74 IN75 IN76 IN77 IN78 IN79 IN80 IN81 IN82 IN83 IN84

The system of interlinked documents is known as_______ The small programmes that create animation,multimedia,real-time games and multi user games are called______ The information displayed on the web page includes______,_____ and_____ The web pages that represent online home of their author are called______ GNN stands for______ _____ is the most popular internet service The online service offered by navigator gold 2.0 are _______ and_____ _______ is a program or a tool that helps us find a file anywhere on the net The databases to enable keyword search using Lycos are a2z,_______ ______ is a large worldwide bulletin board service network BABEL consists a glossary of _____ Dictionaries,encyclopaedias,government and other references are found in ______ Yahoo,lycos,excite and webcrawlers are _____ GIF is the acronym for ____________ JPEG is the acronym for ___________ The Web aids users to explore the ________ The three most popular mailer are_____,_____ and______ The World Wide Web consists of _________ In Microsoft Internet Explorer, the color of the text can be specified using _________ attribute of the font tag. The interface that provides effective communication between the web browsers and servers is _________ CGI is the _________ between web browsers and servers CGI programs are invoked based on the information provided by the _________ A CGI program is usually called after a request made by the _________ URL stands for ________ A hyperlink can be on ___________ HTML was derived from _________

IN85 IN86 IN87 IN88 IN89 IN90 IN91 IN92 IN93 IN94 IN95 IN96 IN97 IN98 IN99 IN100 IN101 IN102 IN103 IN104 IN105 IN106 IN107 IN108 IN109 IN110

SGML is a _________ PINE stands for _____________ The application that confirms whether a document is compliant to its DTD is _________ Web is a collection of ___________ IETF stands for ________ The two major browsers used to surf the Internet are ________,_______ Special characters allow browsers to display _________________ The keyword for providing links within or across documents is____________ Stringing pages together using hypertext technology helps view pages _______________ The initial web pages present in a web site is the ________ page. The image format supported by most browsers is________________. The components of a URL are ___________ The mail we send has a mailing address and most of them correspond to_____,_____ and Which of the following is not supported by internet explorer _______________ CGI stands for ____________ Host name indicates the domain name of the web ________ The internet is also called as _______________ The internet is similar to _________________ The net drivers______ from one place to another The net provides interesting services like______,______ and______ The windows internet software available are______,_______,________ and______ ________ is the ancestors of the internet DARPA stands for _______________________________________________ The uuencode files start with a _______ DARPA is broken into ________ and _______ NSFNET is the united states provides service to _____ and_____

IN111 IN112 IN113 IN114 IN115 IN116 IN117 IN118 IN119 IN120 IN121 IN122 IN123 IN124 IN125 IN126 IN127 IN128 IN129 IN130 IN131 IN132 DS17 DS18 DS19 DS20

HTML stands for ______________________________________ The first international IP network connections were established in 1973 with _____ and_____ A_____ is a set of computers interconnected by transmission paths to exchange information in internet A computer that provides a service usable by other computers is called______ A_______ is the representation of physical connectivity of the computers in internet DTE stands for ____________________ The basic function of the ______ is transmitting the bits over a channel The point to point channel network is also called as _____ and_____ Accessing files using FTP servers is called_____ The three most commonly used networks are______,______ and______ ________ is in between LAN and WAN _____ can be owed by multiple organisation Data is transmitted in the form of_____ signals DTD stands for __________ Modem stands for __________________ ______ is the process of the digital signals being converted into a form suitable for analog transmission ________ and______ are two basic ways of getting connected to the internet SLIP stands for ________________ PPP stands for _____ Which of the following best describes uploading information? A characteristic of a communication channel that is the amount of information that can be passed through it in a given amount of time, expressed in bits per The act of searching through storage to locate information without necessarily knowing of the existence of the information being sought. A "recipient" of the certificate desiring to rely upon a Digital Signature created by the subscriber named in the certificate is called the ____________ The Relying Party can use the ___________ listed in the certificate to verify that the digital signature was created with the corresponding _________ Digital Signatures are used for a variety of Electronic Transactions like ________________________ To associate with a key pair with a prospective signer, a Certification Authority issues Digital Certificate

DS21 DS22 DS23 DS24 DS25 DS26 DS27 DS28 DS29 DS30 DS31 DS32 DS33 DS34 DS35 EC1 EC2 EC3 EC4 EC5 EC6 EC7 EC8 EC9 EC10 EC11

Digital Signatures, if properly implemented and utilized offer promising solutions to the problems of Imposters, Message Integrity, __________ and In, Digital Signature, _____________ perform the "ceremonial" function of alerting the signer to the fact that the signer is consummating a transaction with A Digital Signature must have the following attributes ________________ and _____________ "Hash Function" is used in both creating and verifying Digital Signature ___________ provides assurance of the origin or delivery of data in order to protect the sender against false denial by the recipient that the data has been ___________ serves the ceremonial and approval functions of a signature and establishes the sense of having legally consummated a transaction. ________ is a branch of applied mathematics concerns itself with transforming messages into seemingly unintelligible forms and back again. The complementary keys of an asymmetric cryptosystem for Digital Signatures are arbitarily termed as _________, and ____________ _______ is known only to the signer and is used to create the digital signature. _______ is ordinarily more widely known and is used by a relying party to verify the digital signature. ____________ is the art of protecting information by transforming it into an unreadable format. Which of the following activities would most likely detect computer-related fraud? A digital signature is used primarily to determine that a message is: What is a major disadvantage to using a private key to encrypt data? Which of the following risks can be minimized by requiring all employees accessing the information system to use passwords? The acronym for B2B is ___________ The _____________ model is the least intrusive model but requires active search on the part of the customer __________ is / are a form of advertisement where people relate their experience with products and services The _________ are software agents who communicate with the business merchants on behalf of the customers The Pre-purchase preparation phase includes _______________ for a set of products The _________ phase includes customer service and support to address customer complaints , product returns and products defects The ________ allow companies to bypass the need for costly printed catalogs A ________________ is a basket on the Net that is used to place the items that are being purchased EDIFACT is an abbreviation of ________ The __________ allows for protocol conversion and communicates with the bank using the banks private network or the Internet In Ecommerce, data extraction, transforming the data into transmittable form, transmitting the data and downloading the data are the operations employed in

EC12 EC13 EC14 EC15 EC16 EX21 EX22 EX23 EX24 EX25 EX26 EX27 EX28 EX29 EX30 EX31 EX32 EX33 EX34 EX35 EX36 EX37 EX38 EX39 EX40 EX41

The _________ commerce assists in integrating the customers and suppliers of the company directly into the organisation E-cash means______________________ E-commerce is a tool that addresses the desire of firms to cut services cost and improving the quality of goods. It is a definition of e-commerce from _________ The small denomination digital tokens are called _________ The ____________ is the process of encoding information to prevent it from being read by unauthorized parties There are _________ types of data tables The tables that allows the user to change or rearrange the data, summarize the data and evaluate the data using changing points of view is known as The wizard that is used to suggest hints for doing a task In a chart Y-axis is known as_________ In a chart X-axis is known as_______________ _________ is a set of tables that describe each of the data series ________ is used to differentiate one data series from another The chart that contains only one data series is _________ The chart that holds the column chart is _________ The chart that display two or more data series on a surface is _________ The chart that is used to display discrete data _________ are not allowed in a macro name Which of the following tool cannot be used to view the excel web page_______ The wizard that used to build an interactive table from data existing on sheets The chart that is used for displaying stock market information In excel, the subtotal command also generates grand total after the last group subtotal_________ In advanced filter , the criteria occupying multiple columns but more than one row, is considered as an ________ criteria. The stacked bar graphs can be represented in __________ A pie chart can represent only one data series at a time The ______ generates a summarized report in tabular form in an interactive manner Which one of the following statements related to stock chart is NOT TRUE ?

EX42 EX43 EX44 EX45 EX46 EX47 EX48 EX49 EX50 EX51 EX52 EX53 EX54 EX55 EX56 EX57 EX58 EX59 EX60 EX61 EX62 EX63 EX64 EX65 EX66 EX67

The state government needs to finalize a five years plan to implement 100% literacy in the state. Which one of the following will be the best tool that should Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won in totality to obtain majority to form the government. Which one of the following will be the tool that provides a way to view and compare the results of all the different variations together on the worksheet ? A ___________ is an excel file where the user stores his data Spreadsheets are useful for _______________ Which one of the following is NOT the component of the pivot table ? Excel allows upto ______ levels of sorting Filtering rearranges a list to display the required records The stacked bar graphs can be represented in _____________ The ______ generates a summarised report in tabular form in an interactive manner Which one of the following statements related to stacked bar chart is NOT TRUE ? The state government needs to finalize a five years plan to implement 100% literacy in the state. Which one of the following will be the best tool that should Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won in totality to obtain majority to form the government. Which following function is used in subtotal option ?______________ A workbook consists of many ________ Which two of the following statements related to pivot table are TRUE ? Which one of the following is NOT a What-if analysis tool ? The _________ wizard separates contents in a cell into different cells A spreadsheet is a grid of rows and columns and is called as a ________ Pick out the window that is not a form of excel ___________ On an Excel sheet the active cell is indicated by Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of cells A6, A7, and A8 are _____. If a cell shows ####### , it means that _____. Which is not an advantage of using computerized spreadsheets? The gym teacher has a new program to calculate physical fitness in terms of weight and exercise. The use inputs different weights or amounts of exercise to The difference between the highest and the lowest values.

EX68 EX69 EX70 EX71 EX72 EX73 EX74 EX75 EX76 EX77 EX78 EX79 EX80 EX81 EX82 EX83 EX84 EX85 EX86 EX87 EX88 EX89 EX90 EX91 EX92 EX93

Spreadsheets can be used for... To select a column the easiest method is to If you press _____, the cell accepts your typing as its contents. The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as All of the following are considered constants EXCEPT: Which of the following may NOT be included in a formula? Which of the following is NOT a valid mathematical operator in Excel? Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first? Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant? How can you tell which cell in a worksheet is the active cell? How can you change the active cell? Which of the following would you use to change the font size of a cell in Excel? The command that will save the current workbook with a different file type is: The command that will print an Excel workbook is found on the ____________ menu. In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the date and time a file was last modified. Which of the following commands will automatically adjust cell references in formulas? Which of the following commands will remove cells, rows, or columns from a worksheet? Which of the following options is NOT controlled through the Page Setup command? Which command enables you to change the margins for a printed worksheet? All commands are carried out on a rectangular groups of cells known as a: Which of the following is a valid cell range? In a copy operation, the cell(s) you are copying from is called the: In a copy operation, the cell(s) you are copying to is called the: Which of the following commands is needed to duplicate the contents of a cell in another? A cell reference that does not change during a copy operation is known as Which of the following is considered an absolute cell reference?

EX94 EX95 EX96 EX97 EX98 EX99 EX100 EX101 EX102 EX103 EX104 EX105 EX106 EX107 EX108 EX109 EX110 EX111 EX112 EX113 EX114 EX115 EX116 EX117 EX118 EX119

Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, what will be the contents of cell E4? Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to cell E4, what will be the contents of cell E4? Which of the following commands is needed to transfer the contents of one cell range to another? The F4 key is used to: Which of the following quickly copies the formatting of a selected cell to other cells? Which of the following will insert a hyperlink into an Excel worksheet? Conditional formatting applies formatting to a cell based on: If you enter a date into a cell, Excel stores the date as: You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened that worksheet again on August 31. What will be displayed in The number of days between two cells containing dates can be calculated by: The function key that is used to quickly edit the contents of a cell is: What will be stored in a cell if 3/4 is entered in it? A users response to the InputBox function can be stored in: The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is _____. The teacher has a spreadsheet showing all Year 10 students and their marks in one Mathematics test. To find the student with the highest mark, which of the Which chart type best shows proportions of a whole? Which of the following is TRUE regarding chart types? To select several cells or ranges that are not touching each other, you would _____ while selecting. Your Institute teachers have set an assignment on Studies. You are required to use a spreadsheet to record all that you study on each day for four weeks. You What would be the best method to quickly copy the formula from the active cell to each cell below it? To arrange rows in alphabetical order based on column A, you need to use the command _____. What can you NOT do with a spreadsheet? To print just part of a sheet, you would select what you want to print and _____ . Spreadsheets can be used for... The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in B2 is _____. Which of the functions is not valid for performing addition

EX120 EX121 IN1 IN2 IN3 IN4 IN5 IN6 IN7 IN8 IN133 IN134 IN135 IN136 IN137 IN138 IN139 IN140 IN141 IN142 IN143 IN144 IN145 IN146 IN147 IN148

The default orientation for the printed page is _____. Which is not a valid cell address? The World Wide Web was devised by _________ The useful URL schemes are_____ and______ The other ways of getting connected to the net are_____ BBS stands for______ USENET is a BBS on ____ scale WINSOCKS is expanded as______ IETF Level 2 HTML DTD supports graphical browsers like _______ The space used by Netscape to store the retrieved page is called______ The principles, means and methods for rendering information unintelligible and for restoring encrypted information to intelligible form. A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt an decrypt messages and Protected/private character string used to authenticate an identity or to authorize access to data. The successful act of bypassing security mechanisms of the system. A set of rules and formats, semantic and syntactic, that permits entities to exchange information. An attempt to get access to a system by posing to be an authorised person. An action or event that might prejudice security. According to information Technology Act, 2000, To investigate contraventions the controller of certifying authority shall exercise the like powers to that of Malicious software. None the person who is known as father of Internet This website is the biggest bookstore on the earth. When we talk of Data Transmission modes, then ATM stands for A sequence of bits or characters that identifies the destination and the source of a transmission. The means of communicating between networks A group of computers and other devices dispersed over a relatively limited area and connected by communication links that enable a device to interact with any The term HTTP stands for

IN149 IN150 IN151 IN152 IN153 IN154 IN155 IN156 IN157 IN158 IN159 IN160 IN161 IN162 IN163 IN164 IN165 IN166 IN167 IN168 IN169 IN170 IN171 IN172 IN173 IN174

A NIC is considered as A hub is a device that can connect Which of the following is true concerning the function of a switch? What do routers connect? What does a router route? Software which prevents external access to a system is termed If four computers are connected to a hub and then to the internet, how many IP addresses are required for these 5 devices? Which of the following in an OSI layer When creating a network from just two PCs, what kind of cable would be used to connect them? An IP address is a To construct a simple LAN of 4 computers, you would connect them with ______connect them What happens to data that is ruined before reaching to receiver Bluetooth is Which is not one of the recognized IEEE sub layers? The most preferred number system to represent a IP address is A MAC address is of Protocol is A ............... is a LAN-based computer with software that acts as a controlling device for controlling access to at least part, if not all, of a local area network What is the biggest disadvantage of the Ring topology? The .............. of the network concerns how network devices are physically (or optically) interconnected. The principal topologies used with LANs are: What are the various types of bus architecture? What are the various types of ring architecture? In a ................., each workstation attaches to a common backplane via its own physical cable that terminates at the hub In a ............... , each work station is directly connected to a common communications channel Which one of the following is NOT a network topology?

IN175 IN176 IN177 IN178 IN179 IN180 IN181 IN182 IN183 IN184 IN185 IN186 IN187 IN188 IN189 IN190 IN191 IN192 IN193 IN194 IN195 IN196 IN197 IN198 IN199 IN200

In a .............. , the cable system forms a loop with workstations attached at various intervals around the loop The Media Access Control (MAC) is a sub layer of the: What are the most common LAN technologies used in networking today? Modem speeds are measured in LAN speeds are measured in WAN speeds are Accessing the Internet from a typical home PC requires the use of To use the Internet, you The worldwide web server uses the following standard interface to act as the middleware: An NIC Accessing the Internet from a typical home PC requires the use of The most widely used network operating system on PC LANs is JPEG and MPEG To use the Internet you A multiplexer is a form of An ISP FTP is Telnet A firewall is A proxy server is A search engine is To look for information about interest areas on the internet, the user should use a An ISP FTP is Telnet Which of the following is a true statement about the OSI model layers?

IN201 IN202 IN203 IN204 IN205 IN206 IN207 IN208 IN209 IN210 IN211 IN212 IN213 IN214 IN215 IN216 IN217 IN218 IN219 IN220 IN221 IN222 IN223 IN224 IN225 IN226

Which of the following is NOT true about the Internet? The traditional intent and impact of this common type of attack is to prevent or impair the legitimate use of network resources. A firewall is Which of the following is NOT an example of a DoS attack that is popular among hackers? A ____________ attack is when a hacker sends a continuous flow of packets to a system. One defense option on a large network is to configure a ____________ to disallow any external traffic. A proxy server is Which of the following would be performed on a network server and not normally on individual workstations? What can be said about the safety of the Internet? To secure communication network against wire-tapping the most effective control is One way that a virus CANNOT spread throughout a network is: Which of the following is NOT a means of monitoring employee use of company technology? ____________ would be used by parents to monitor their children on their home system. The formal rules and parameters which are established to permit a microcomputer to communicate with the mainframe computer as though it was The two most common tools used to help with extracting information are: Which of the following would NOT be considered an example of cyber terrorism? Which of the following would be a form of cyber terrorism? Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life? An organisation is upgrading its telecommunication lines. Which is the least important objective while upgradation A company posts a price list of its products on its website. The advantage to the customer is that the company can Which of the following is an easy-to-use service to get information on someone? Which of the following pieces of information would NOT be found online? Which of the following is the most common danger on the Internet? The famous Nigerian Fraud scam offered victims the opportunity to: The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is called _________________. Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called:

IN227 IN228 IN229 IN230 IN231 IN232 IN233 IN234 IN235 IN236 IN237 IN238 IN239 IN240 IN241 IN242 IN243 IN244 IN245 IN246 IN247 IN248 IN249 IN250 IN251 IN252

Setting your privacy settings in Internet Explorer to medium is one way to block: What is the best means of protection from cyber stalking? Which of the following is not an appropriate control over telecommunications software Encryption techniques can be implemented in Hardware-Software Which protocol would be used to download a free anti-virus program from the Internet? The major advantage of the checksum program is when it Which of the following is a Web browser? A Web page is another name for ----------Domain names must contain a description of the type of organisation that the domain represents. A very common abbreviation used include: A standard language for creating and formatting Web documents is: The Web page format in which all elements of a Web page are saved as one file is called: Which of the following requires an Internet connection? Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his computer how would he do this? Which of the following is used to update a Web query? You download from the internet, a screensaver, a ten-second sound file and a ten-second music video clip. You also add a hyperlink. Which of the media When saving a photograph for use on a website, which format should you choose? While researching the Direct taxes assignment, you find a useful website. What is the most efficient way to access the site at a later time? A system that uses the Internet for business-to-business interaction is called a(n): A block of text automatically added to the end of an outgoing email is called _________ refers to the use of Internet technologies for placing telephone calls. Most client/server applications operate on a three-tiered architecture consisting of which of the following layers? Which do you NOT need to connect to the Internet? What does FTP stand for? What is the purpose of DNS? Which of the following is NOT a properly formatted IP address? Which of the following is a properly formatted email address?

IN253 IN254 IN255 IN256 IN257 PP1 PP2 PP3 PP4 PP5 PP6 VB11 VB12 VB13 VB14 VB15 VB16 VB17 VB18 VB19 VB20 VB21 VB22 VB23 VB24 VB25

The Internet is controlled by whom? What does IRC stand for? If you do not pick up your email for a week...? What does HTML stand for? What is a disadvantage of joining a mailing list? In Powerpoint2000 ,the built-in professional design elements are Selection handles are the 8 small ___________ that appear around the object, when an object is selected The _______ is an invisible matrix of vertical and horizontal lines that covers the entire slide workspace _______ are drop-down menus that appear when the right mouse button is clicked on the screen element ________ and ______ have the ability to add a lot of visual impact into the PowerPoint presentation _______ is a motion picture or any animation file In visual basic, when a record pointer reaches to the last record, _______ property of a recordset object is automatically set to ______ In visual basic, the explorer view of a project is displayed in ___________ In visual basic, when a record pointer reaches to the first record, _______ property of a recordset object is automatically set to ______ In visual basic, _______ is a method to convert a string into integer. In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type of shape should we get? In visual basic, a timer event is only available in timer control. In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any object In visual basic, _______ is a property of a textbox control to set a color of a text. In visual basic, _______ property of a textbox control is set to _______ to underline a text In visual basic, _______ property of a textbox control is used to change the size of text. In visual basic, the interval property of a timer control is given in ________ In visual basic, _______ property of listbox control counts the number of items in the list In visual basic, the properties of various controls can be set using __________ In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a messagebox function. In visual basic, ________ is a function which displays a message and it also allows the user to enter values in a form object

VB26 VB27 VB28 VB29 VB30 VB31 VB32 VB33 VB34 VB35 VB36 VB37 VB38 VB39 VB40 VB41 VB42 VB43 VB44 VB45 VB46 VB47 VB48 VB49 VB50 VB51

In visual basic, using a data control, ________ is a recordset type which allows to add a new record and also to update existing record in a recordsourse object In visual basic, while closing a form _______ event of a form object is triggered earlier to terminate event. In visual basic, to give a backcolor or to bring in a picture to a command button can only be done if we set the style property to ______ In visual basic, a method RGB(255,0,0) will generate _______ color In visual basic, a method RGB(255,255,255) will generate _______ color In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible. In visual basic, if a user uses a function key F4 _________ becomes visible. In visual basic, when a textbox control receives the focus ________ event is triggered. In visual basic, a form is a ________ object. Microsoft visual basic is a Rapid Application Development tool. In visual basic, when a form object appears on the screen _________ event is triggered. In visual basic, to display text on a label object _________ property is used In visual basic, _______ object is used to access the database and also to manage the data in the database. In visual basic, when a checkbox control is checked _______ property is automatically assigned with 1. In visual basic, _______ keyword is used to declare a variable What is the extension of the Visual Basic project file that stores the design of a user control. Which event of a text box would you use for validating the data entered by the user? Which of the following statements forces inline error handling? The _______ method resets the contents of bound controls to their original values when the user clicks on the cancel button. To deactivate the Form UnLoad event, you make the following change in the function definiton: How many root nodes can a TreeView control have? A project group is a Project which: Procedures declared in a _____ are local whereas procedures declared in a ______ are available to the whole application. How can you keep the user from exiting a form by clicking the Close button? The _______ property enables Visual Basic to draw complete images in memory before displaying them on the Screen. You want to display the code and the description of an error. What would be the correct syntax?

VB52 VB53 VB54 VB55 VB56 VB57 VB58 VB59 VB60 VB61 VB62 VB63 VB64 VB65 VB66 VB67 VB68 VB69 VB70 VB71 PP7 PP8 PP9 PP10 PP11 PP12

What is the purpose of the Image List Control? Which method would you use to get a free or unused File identifier while opening any file: Which property procedure is used to retrieve the value of a property? Which of the following can be shown to the user using the Common Dialog control in VB? Which of the following are not properties of Command Button: Which events enable you to determine which key was pressed by the user? In order to access a file in Non-textual format, you have to open file in: Visual Basic displays information depending upon the current value of two properties of the form, called: Which of the following procedure types will execute when you assign a value to a property of an object? In order to overlap the controls (say a command button) during design time, we use the Send To Back or Bring To Front option from the Edit menu. To Which property of the ProgressBar determines how much of the bar is filled? The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program. The caption and the name properties of the command button: You try to initialize a new Object variable with the following line but receive an error. What could be the possible cause? Set MyVar = New Classname Which of the following will perform a direct execution of a Command object? The vb Critical symbol displays: vbYesNo is an example of a(n): The primary difference between the MsgBox statement and the InputBox function is the: Which of the following is TRUE about a protected form (i.e., a form where the Protect Form button on the Forms toolbar is toggled on and is assumed to Which event is triggered when the user moves to another open form? The user can use ______ to remove the undesirable part of the image The power presentation has a _____ for a set of compatible colors The set three colors used for graphs and for secondary slide items is called as There are ______ types of charts available in PowerPoint _______ charts are useful while showing variations over a period of time _______ are the individual pages of a presentation

PP13 PP14 PP15 PP16 PP17 PP18 PP19 PP20 PP21 PP22 PP23 PP24 PP25 PP26 PP27 PP28 PP29 PP30 PP31 PP32 PP33 PP34 PP35 PP36 PP37 PP38

A PIE Chart is a ____ diagram that depicts the relationship between a whole and its parts Each individual piece of data in a series is called a/an PowerPoint launches an OLE-compatible application called When the user double-clicks on an organization chart object in PowerPoint The _____ are used for selecting, editing and viewing objects in the chart Manager box tool in organizational chart window is The custom drawing tools are _______ by default Click on the box tool ______ to draw three boxes There are ____ default fields available in all boxes of the organizational chart The _____ tool is used in the same way as we use a pen to draw a table A/An _______ consists of smaller printed version of the slides The size of the object can be changed using the ______ tool _______ is the process through which the slides in the current presentation are included in another presentation or application ________ can be used to create charts as well as worksheets PowerPoint can import text files that have been saved in ______ format PowerPoint outlines can have _____ outline levels When a file is saved with _____ extension, the graphics and text are also saved along with the slide The hidden slide is ____ effect is used to introduce a slide during a slide show A _____ is a special effect that determines how the objects appear on the slide The notes page is formatted based on the Pick the odd man out of the following When a new presentation is opened ,powerpoint creates slides that have a width of _____ and a height of ______ with the landscape orientation The default orientation for notes ,handouts and outlines is ____ orientation Build effect is also called as ______ Graphics for web pages are automatically stored in ____ format

PP39 PP40 PP41 PP42 PP43 PP44 PP45 PP46 PP47 PP48 PP49 PP50 PP51 PP52 PP53 PP54 PP55 PP56 PP57 PP58 PP59 PP60 PP61 PP62 PP63 PP64

A _______ is used to jump to any slide in the presentation The ______ language has been incorporated into PowerPoint In PowerPoint _____ is a series of commands that are executed in sequence The macro will be activated Developers can easily add ____ to PowerPoint 2000 by using the programming interface ______ determines the order in which order in which the slides will be displayed during the show _______ is used to organize and develop the contents of a presentation If we save the presentation file as a metafile, it can be opened using With reference to autocontent wizard for creating a new presentation, which of the following statements are not true Which of the following statement is not TRUE With reference to changing the order of slides, which of the following statement is not true Which of the following definitions are not true Which of the following statements are not true Which of the following definitions are not true The options available in the common task toolbar does not include With reference to chart, which of the following statements are not true The format of the text entered in a title, subtitle, or bulleted-list object is determined by the format settings in a special slide called -------PowerPoint provides a _________ that searches the entire presentation i.e., all the text objects in all the slides, outlines, notes and handouts for spelling errors PowerPoint's drawing toolbar contains _______ drawing tools Click _______ on the rectangle drawing tools enables us to draw multiple rectangles An example of the components of a multimedia presentation could include Which of the following formatting elements can be applied to a PowerPoint diagram using the AutoFormat tool? Which of the following formatting elements can be applied to a PowerPoint diagram using the Format AutoShape command? What happens when you double click a blank graph placeholder in a PowerPoint presentation? The legend in a Microsoft Graph chart is: Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best chart type if you want to emphasize the total sales of each

PP65 PP66 PP67 PP68 PP69 PP70 PP71 PP72 PP73 PP74 PP75 PP76 PP77 PP78 PP79 PP80 PP81 PP82 PP83 VB1 VB2 VB3 VB4 VB5 VB6 VB7

Which of the following actions will enable you to insert a graph into a PowerPoint presentation? If you are editing a slide containing a Microsoft Graph, how do you display the underlying datasheet? How do you deselect a chart that has been placed onto a PowerPoint slide after you have finished creating the chart? What happens when you click the Datasheet button on the Microsoft Graph toolbar? What happens if you single click a chart that is not currently active? What happens if you double click a chart that is not currently active? Using custom animation effects, you can build: Which of the following animation effects can be added to a slide? Which of the following animations effects can be added to a slide? Which keyboard key is used to select more than one picture on a slide? Custom animation can be used to affect ONLY: Which of the following best describes the information that appears on the advanced timeline? Which of the following objects can contain custom animation effects? What type of program allows an object within an image to be edited without affecting other objects? Which of the following animation effects can be added to a slide? Which of the following is TRUE regarding the Datasheet? Graphical software tools that provide complex analysis of stored data are: Which of the following statements is TRUE regarding PowerPoint diagrams? Which keyboard key combination is used to undo the previous command(s)? Microsoft visual basic project file has _______ file extension. In visual basic, _______ method is used to add an item in a combobox In visual basic, _______ method is used to load picture during runtime in an image control In visual basic, to populate a drive list box with a directory list box __________ statement is used In visual basic, to display a message in the run time _________ function is used In visual basic, to populate a directory list box with a file list box ________ statement is used In visual basic, ________ is a property of a recordset object which counts the number of rows in a recordsourse object

VB8 VB9 VB10 VB72 WO1 WO2 WO3 WO4 WO5 WO6 WO7 WO8 WO9 WO10 WO11 WO12 WO13 WO14 WO15 WO16 WO17 WO18 WO19 WO20 WO21 WO22

In visual basic, using a data control, a record can only be added from the last record. Adding a new record is only possible using _______ method of a In visual basic, using a data control, a record is saved to a recordsource object using _______ method of a recordset object. In visual basic, using a data control, to navigate to the previous record ________ method of a recordset object is used. To deactivate the Form UnLoad event, you make the following change in the function definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as _______ is a word processing that is a member of the office 2000 family The feature that enables user to type anywhere in a document without pressing or tab The______ feature allows the user to copy and paste upto 12 items at the same time in an application ______ and _____ key combination will extend the selection by one character on the left and right _____and_____ are improved layout in Word 2000 The easiest way to create a document in word is In Office2000 environment the tool that makes work easier for us is_____ A short description of a tool bar button called the ______ is displayed when the mouse pointer is allowed to stay for a second on the button The _____ helps us to keep track of the margin of the page The keys that are used to navigate between headers and footers are Pick out the element from the following that dose not form the type of tabs for the Word 2000 _______are blueprints or patterns for documents of a certain type The______ is used for quickly setting paragraph indention using the mouse Word art is text with AutoShapes in word can be created by accessing the _____ By default, a document consists of_____ section The dialog box that is used to determine the documents margins is ________ is a box surrounding a page on all slides or a line that sets off a paragraph on one or more slides The key that is used to perform a task to select all t he text in the documents is The key that is used to indent a paragraph is The key that is used to change the font from the current positioned in a document is The key that is used to change the style of the document that is from that normal to heading1 or heading1 to other document styles.

DA13 DA14 DA15 DA16 DA17 DA18 BC44 BC45 BC46 BC47 BC48 BC49 BC50 BC51 BC52 BC53 BC54 BC55 BC56 BC57 BC58 BC59 BC60 BC61 BC62 BC63

'Set mapping' Check control that follows a text-type validation, we use ---------------- application for data analysis. Excel can import data from other databases for the data analysis. A System Auditor can uses CAAT tools to analyze data In the case of the ---------- control, it is ensured that the data in combination with other fields are reasonable as per standard set by an organisation. --------------- function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in a table Most of the tools use in Data Analysis depends on How do you define analysis of an information system? What areas need to be considered in the SOFTWARE design process? What is the function of systems software? Formatting a disk results in all the data being...? What is Direct Implementation? What is parallel running? What documents are produced during the development of a system? What are User Guides are used for? Systems software can be categorised into: Which storage device cannot be erased? Application software are programs that are written Which bus carries information between processors and peripherals? Convert the decimal number 2989 to Hexadecimal Which bus controls the sequencing of read/write operations? What are utilities? Numbers are stored and transmitted inside a computer in The original ASCII codes A Nibble corresponds to A gigabyte represents A 32-bit processor has

BC64 BC65 BC66 BC67 BC68 BC69 BC70 BC71 BC72 BC73 BC74 BC75 BC76 BC77 BC78 BC79 BC80 BC81 BC82 WO23 WO24 WO25 WO26 WO27 WO28 WO29

A parity bit is he contents of these chips are lost when the computer is switched off? Clock speed is measured in Cache memory enhances CISC machines Which parts of the computer perform arithmetic calculations? Every data from the primary memory will be erased if An RS-232 interface is For print quality you would expect best results from ROM A UPS smart card Laptop computers use Multiprogramming refers to Multitasking refers to What are small high speed memory units used for storing temporary results? A good way to exchange information that changes rapidly is through Multiprogramming is a prerequisite for Timesharing is the same as ______ is the default view in Word used for typing Editing and Formatting the Text The short-cut-key that is used to indent a paragraph spacing in the documents is The short-cut-key that is used to paste the selected text The short-cut-key that is used for paragraph spacing(1.5) The box that separate text from the document and allows it to behave like an independent object is known as The object that is used to provide information like the title of the book, name of the chapter, page number etc. The object that helps us analyzing data statistically is known as

WO30 WO31 WO32 WO33 WO34 WO35 WO36 WO37 WO38 WO39 WO40 WO41 WO42 WO43 WO44 WO45 WO46 WO47 WO48 WO49 WO50 WO51 WO52 WO53 WO54 WO55

To highlight certain parts of a page to set it apart from the rest of the page we make use of the following features To clear all the tabs in a document the option that is clicked from the tabs dialog The dialog box that is used to incorporate picture bullets into our documents or web pages is The object that composes of set of tools which helps to create and work on different shapes like rectangles, circles, flowcharts etc. When word is opened a new document called_____ is displayed, where the user starts typing the content right way ______ is an online dictionary maintained by word to obtain synonyms for words The thesaurus is invoked by pressing_______ When a new table is created the insertion point flashes in the _____ By pressing the _____ key inserts a blank row after the last row in the table The ______ option enables us to convert text into a table format A table consists of ______ that contain text or graphics The _______ option in word allows the user to automatically correct misspell words as and when they are typed ______ is a facility that enables recording and replaying of a sequence of keystroke In Word Macros are written in _____ In Word 2000 the macro dialog box is activated with the help of ____ key combination ________shows how a document would look like when published on the web or on an intranet ______ is a software for sending and receiving e-mail messages ________is the coding system used to create web pages The network that makes information easily accessible across various networks is _______ Which of the following statements are false with reference to the use of a header row source for a mail merge With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE false The alignment available for tabs does not include Which of the following statements related to a Section Break are True The user can set a spelling checker to skip the marked part of the next New option under the file menu of word creates a new blank document that is based on the normal templates The user can split the screen only into two parts

WO56 WO57 WO58 WO59 WO60 WO61 WO62 WO63 WO64 WO65 WO66 WO67 WO68 WO69 WO70 WO71 WO72 WO73 WO74 WO75 WO76 WO77 WO78 WO79 WO80 WO81

The features that enables the user to type text graphics tables anywhere in the document without pressing enter or tab The user can modify the picture from the clip art With reference to auto correct which of the following statements are false With the reference to password protected documents which of the following statements are false The alignment available for tabs does not include Which of the following statements are False Drop Cap tool does not work for the contents in the table format The user can split the screen only into two parts in MS-Word The special symbols that are inserted using "insert symbol" option of the word can not be printed by the printer as they are not standard keyboard symbols The "format columns" option allows to create columnar text up 12 columns only. The document that makes the user to organize and maintain a long document, such as multipart report or a book consisting of chapters The view that enables us to view how objects will be positioned on the page when it is printed The mode that is initialized or toggled to if the user is in a position to overwrite the text in the word Veena is entering a paragraph in a word processing program. When the cursor gets to the end of a line, what is the best way to get the cursor to the next line? How are data organized in a spreadsheet? Which key moves the cursor to the beginning of the next line of text? Veena typed the following sentence: "The girl was very beautiful." In which word processing utility could she find a synonym for "beautiful"? Using an electronic bulletin board, Seema can do all of the following except which one? Aryan has created a ten-page story, but only wants to print the first two pages. What printer command should he select? What process should be used to recall a document saved previously? Which is used to indent text within a document? Desktop publishing is a more sophisticated form of which of the following types of software? What is a Word Processor used for? What is a picture that is saved on a diskette and can be pasted into a document? What is a Word Processor used for? What basic tools would you find in the Edit menu of a word processor

WO82 WO83 WO84 WO85 WO86 WO87 WO88 WO89 WO90 WO91 WO92 WO93 WO94 WO95 WO96 WO97 WO98 WO99 WO100 WO101 WO102 WO103 WO104 WO105 WO106 WO107

What is a header in a document? What hardware is essential for a word? The user could take a picture from a magazine and insert it into the document by using a What basic tools would you find in the Edit Assume you are creating a two-column newsletter. Which type size is the most reasonable for the text in the columns? Given the default left and right margins, and -inch spacing between columns, the width of each column in a two-column document will be: Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot see any columns on the screen. What is the most likely While word processing, in which of the following situations would Tom use the "Copy" command? What does a document contain? Before submitting your work you want to find any words spelt incorrectly. Which of the following would you use? What command in a word-processing program can be used to change the word him to her, and also the word he to she in the given phrase? On a cold and What edit commands would you use to insert a paragraph from one document into another document, while still keeping the paragraph in the first document? Which of the following statements would NOT be a reason for showing suggested revisions in a Word document without changing the original Which statement is NOT true regarding revisions made in a Word document? How are suggested changes entered for review on an initial Word document? Which of the following is TRUE about saving a document using the Versions command? What happens when you open a document that has been saved using the Versions command? You have used the word discover four times in an English essay you have created using a word processing program. You would like to find another word When opening and working with multiple versions of a document, how can you tell which is the most recent version? Various fields are added to a regular document to create a special document called a form through the ____________ toolbar. Which of the following types of fields CANNOT be inserted into a form? Which of the following is TRUE related to editing comments in a Word document? What is a header in a document? In your English essay you notice that the paragraph at the bottom of page 1 continues on to page 2. You would like to make this paragraph start on page Tables in a document help you to easily arrange all of the following EXCEPT: To identify a document, it is helpful to include the file name on each page as a

WO108 WO109 WO110 WO111 WO112 WO113 WO114 WO115 WO116 WO117 WO118 WO119 DA1 DA2 DA3 DA4 DA5 DA6 DA7 DA8 DA9 DA10 DA11 DA12 BC83 BC84

Which of the following tools will copy the formatting of selected text to other places? What is the name of the process of determining the cause of errors in a macro? Drop caps are added to a Word document using the ___________ menu. A reverse in a newsletter is: A pull quote is best emphasized by: Which of the following definitions is CORRECT? Pertaining to newsletters, which of the following cannot be changed using the Columns command dialog box? As related to type size, how many points are there to the inch? Assume you are working on a newsletter in which the masthead extends across the top of the entire first page. The rest of the newsletter has two columns. Which of the following is NOT correct with respect to page, column, and section breaks? Which of the following would be the most appropriate font for a newsletter headline? Which of the following is the default Word column width? Sequence Check is a --------------- level control check. Analyse data over two or more periods is called ----------------------- analysis We use Hash Total to identify ------------ within a series where there is a definite relation between items Analyse fields by arranging them into rows and columns is called --------------------- function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in the To import data from Access to Excel ,it is not possible to link between Access and Excel sheet The GAP detection options can be used to test for completeness of data. Exception testing can be used to identify ----------------- items Data validity test represents Year end ledger, inventory files or transaction files can be tested for cut-off , to ensure that the data has been provided is for the correct audit period In Range Check , the data may not be in proper sequence but should be within a predetermined range In ---------------- Check data entry follow a particular sequence and also a predetermined range. Virtual memory is Multiprocessing is

BC85 BC86 BC87 BC88 BC89 BC90 BC91 BC92 BC93 BC94 BC95 BC96 BC97 BC98 BC99 BC100 BC101 BC102 BC103 BC104 BC105 BC106 BC107 BC108 BC109 BC110

To help keep sensitive computer-based information confidential, the user should What is the function of a disk drive? A 4GL is A nanosecond is What small, hand-held device is used to move the cursor to a specific location on the screen? The memory address register is used to store The memory data register is used to store The instruction register stores Which of the following is used to indicate the location on the computer monitor? A mathematical procedure that can be explicitly coded in a set of computer language instructions that manipulate data. Which of the following translates a program written in high-level language into machine language for execution? Detecting errors in real memory is a function of To find where a file has been saved on disk, the user should A series of instructions telling the computer how to process data or files is defined as a To ensure that data is not lost if a computer system fails, the user should Having a single CPU alternatively process tasks entered from multiple terminals is called The place in the CPU where the data and programs are temporarily stored during processing is called the All are examples of computer software except Computer manufactures are now installing software programs permanently inside the computer. It is known as Which of the following file organisation forms most efficiently allows access to a record The part of the computer system controlling data manipulation is called the For direct access storage devices the recording area is divided into The data hierarchy from the largest to the smallest is Which of the following hardware or software system controls provides a detailed record of all activities performed by a computer system Which one of the following parts of a computer is necessary to enable it to play music? An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15 minutes of sound and 1 minute of video. Which of the four

BC111 BC112 BC113 BC114 BC115 BC116 BC117 BC118 BC119 BC120 BC121 BC122 BC123 BC124 BC125 BC126 BC127 BC128 BC129 BC130 BC131 BC132 BC133 BC134 BC135 BC136

Which one of the following printers is suitable for printing sprocket fed carbon copies? Multimedia software can be most productively used for To be effective a virus checker should be Which one of the following software applications would be the MOST appropriate for performing numerical and statistical calculations? Passwords enable users to How many bytes do 4 Kilobytes represent? Back up of the data files will help to prevent Which one of the following is the MOST common internet protocol? The advantage of a PC network is that The term A:\ refers to UPS stands for The main problem associated with uninstalling software is that You are conducting research for a Income Tax assignment. The raw facts you collect are called A flow chart is the A voucher entry in Tally is done for Passwords are applied to files in order to Each of the following is an enabler of IT-business alignment except: The basic systems model is used to describe virtually all information systems and it consists of the following elements: What is a computer-aided design system? A(n) __________ offers a solution package for an entire industry. File extensions are used in order to Information systems controls include all of the following EXCEPT: Hashing for disk files is called Components of expert systems include: a) inference engine; b) user interface; c) knowledge base; d) fuzzy logic Black box testing and white box testing are part of: What is the term used to describe the point of interaction between a computer and any other entity, such as a printer or human operator?

BC137 BC138 BC139 BC140 BC141 BC142 BC143 BC144 BC145 BC146 BC147 BC148 BC149 BC150 BC151 BC152 BC153 BC154 BC155 BC156 BC157 BC158 BC159 BC160 BC161 BC162

The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility Which of the following is an acceptable way to shut down the computer? Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot remember where you saved them. Which is the best way to Components of an information system model are: a) applications architecture; b) functional architecture; c) technology architecture; d) information architecture Benchmarks form part of: Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run totals Which is not part of help desk documentation: Testing of individual modules is known as: Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface architecture; d) presentation architecture Which is part of installation testing: The computer operating system performs scheduling, resource allocation, and data retrieval functions based on a set of instructions provided by the: Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio Which of the following procedures should be included in the disaster recovery plan for an Information Technology department? Designing relationships among components is part of: Several Computers connected together is called: Which network topology uses a Hub? Which of the following topologies is used for Ethernet? Application software are programs Which type of file search method requires a computer first read all locations preceding the desired one Which of the following areas of responsibility are normally assigned to a systems programmer in a computer system environment? Which of the following is recommended when many searches for data are required It is unlikely that a magnetic tape containing several thousand blocked records can be used on two machines of different architecture directly because Which component of the CPU has the most influence on its cost versus performance Which of the following terms applies to network used to connect computers with other computers, peripherals and workstations that are in fairly close Intelligent terminals differ from dumb terminals in that they A computer is to be linked to 8 terminals using a single communication link. To permit simultaneous terminal operations, communication path will require which

BC163 BC164 BC165 BC166 BC167 BC168 BC169 BC170 BC171 BC172 BC173 BC174 BC175 BC176 BC177 BC178 BC179 BC180 BC181 BC182 BC183 BC184 BC185 BC186 BC187 BC188

A modem is a device that A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives and printers. This type of network is called a A computer based system for sending, forwarding, receiving and storing messages is called an If a workstation contains a processor, monitor, screen manipulation device, printer, storage and communication capabilities, it is said to be Terminal hardware controls include RS-232 is a What is a compiler? What are the stages in the compilation process? Which of the following is not a data transmission coding scheme What is the definition of an interpreter? A device used in data communications to divide a transmission signal into several sub-bands is known as a Third generation languages such as COBOL, C, and FORTRAN are referred to as Serial Communication is used over long distance because it In what areas is the COBOL programming language used? The primary function of a front-end processor is to What is the first stage in program development? Which of the following is not used for data transmission within a local area network What is System Analysis? A device to device hardware communication link is called What will a good software provider consider? The topology of a network can be each of the following except What is the 8-bit binary value of the decimal number 85? Which is the most common data transmission error checking method What is the decimal value of the binary number 1111? Which of the following devices merges communication signals onto a single line What is the decimal value of the octal number 215?

BC189 BC190 BC191 BC192 BC193 BC194 BC195 BC196 BC197 BC198 BC199 BC200 BC201 BC202 BC203 BC204 BC205 BC206 BC207 BC208 BC209 BC210 BC211 BC212 BC213 BC214

Which tool is used to help an organization build and use business intelligence? Cache memory enhances What is the decimal value of the hexadecimal number FF? Numbers are stored and transmitted inside a computer in What is the hexadecimal value of the decimal number 1476? A byte corresponds to What does EBCDIC coding of numbers mean? A Kb corresponds to What is the binary sum of 01011 and 00101? Information is stored and transmitted inside a computer in Where would you find the letters QWERTY? A parity bit is How did the computer mouse get its name? Clock speed is measured in What are you most likely to use when playing a computer game? CPU performance may be measured in A digitising tablet can be used for? In processing cheques which of the following I/O techniques have banks traditionally used Which of the following is a pointing device used for computer input? A UPS What does a light pen contain? The capacity of a 3.5 floppy is around What general term describes the physical equipment of a computer system, such as its video screen, keyboard, and storage devices? Where would you find the letters QUERTY? What are you most likely to use when playing a computer game? A digitising tablet can be used for?

BC215 BC216 BC217 BC218 BC219 BC220 BC221 BC222 BC223 BC224 BC225 BC226 BC227 BC228 BC229 BC230 BC231 BC232 BC233 BC234 BC235 BC236 BC237 BC238 BC239 BC240

Which of the following is a pointing device used for computer input? What input device could tell you the price of a product Where would you find a magnetic strip? Hard copy is a term used to describe...? What are the individual dots which make up a picture on the monitor screen Called A daisy wheel is a type of...? What input device can be used for marking a multiple-choice test? Laptop computers use QWERTY is used with reference to What input device could tell you the price of a bar of chocolate? A GUI is Where would you find a magnetic strip? Multiprogramming refers to Multitasking refers to Multiprogramming is a prerequisite for UNIVAC Computer belongs to the Timesharing is the same as Name the first Indian Super Computer? Disk fragmentation The technology which is used to check answer sheets of multiple-choice questions in civil services or similar examinations is: A compiler is Which printer among the following is fastest Zipping a file means What does acronym VIRUS stands for An impact printer creates characters by using...? A client-server system is based on

BC241 BC242 BC243 BC244 BC245 BC246 BC247 BC248 BC249 BC250 BC251 BC252 BC253 BC254 BC255 BC256 BC257 BC258 BC259 BC260 BC261 BC262 BC263 BC264 BC265 BC266

A nanosecond is A procedural control used to minimize the possibility of data or program file destruction through operator error is the use of _______ software enables users to send and receive data to/from remote computers A _____ is a running instance of an application Splitting of CPU's time for different tasks _______ prevents time slicing ______ computers are used in large organizations for large scale jobs which have large storage capacities _______ is responsible for all calculations and logical operations that have to be performed on the data ______ printer use laser light ______ software enhances the user to enter ,store, manipulate and print any text ______ software enables users to send and receive data to/from remote computers _______ is the temporary storage place for deleted files _____ is a collection of related fields _____ language consists of strings of binary numbers ______ symbol is used to represent processes like assigning a value to a variable or adding a number _______ is an example for micro computer _________capability supports concurrent users doing different tasks The ______ do not have processing power of their own and has only a screen, keyboard and the necessary hardware to communicate with the host. For this A______is nothing but a PC with a network operating system _____system is responsible for handling the screen and user I/O processing The______ handles data processing and disk access in a Client/Server architecture Both the DBMS and the application resides on the same component in a ____system When all the processing is done by the mainframe itself, the type of processing is sometimes called as DBMS models can be grouped under____ categories ______is the most advantageous database system A new user initiates a new process of execution at the background,while the user can continue his query process as usual in the foreground. This situation is The process of data being automatically written to a duplicate database is called______

BC267 BC268 BC269 BC270 BC271 BC272 BC273 BC274 BC275 BC276 BC277 BC278 BC279 BC280 BC281 BC282 BC283 BC284 BC285 BC286 BC287 BC288 BC289 BC290 BC291 BC292

Modem stands for __________ . Multiple changes to the same record or a field are prevented by the DBMS through______ _________allows an application to multitask within itself LAN stands for __________ . New process of execution is referred to as______ ISDN stands for _______. _____________ is the Worlds largest computer network . _______is/are a popular front end tool When LAN connected together ,it is called __________ . TCP/IP stands for _________ . Data is broken into small unit called __________ . SMTP stands for __________ . The __________ protocol is a network protocol to be built for the World Wide Web . ATM stands for __________ . The computer which can receive data from other computers on the network and print it is _______ The hardware and the software requirements together form the_____ ATM, Asynchronous transfer mode is a __________ technology. __________ is designed telephone system Expansion of ISDN is ________ Expansion of WBT is ______________ _________ connects LANs. Collection of instruction is called a _____ Combination of alphabetic and numeric data is called _____ data Computers can be classified based on ______,______and _______ _________ are used in large organizations for large scale jobs _______ is responsible for feeding data into the computer

BC293 BC294 BC295 BC296 BC297 BC298 BC299 BC300 BC301

_______ is the capability of the o/s to run numerous applications simultaneously _______ involves conversion of raw data into some meaningful information _______ is responsible for obtaining the processed data from the computer _______ printers use light to produce the dots needed to form pages of characters Hardware components in a computer are _____,____,_____,______ _______ software are programs that are complex and can be developed or purchased _______ is a set of special instructions used to communicate effectively with the computer _______ converts a high level language into machine language _______ translates assembly language program into machine language instructions

op1 F1 Tally ODBC TRUE F3 Invoice Two Ctrl+C TRUE TRUE ALT+F1 Tally IMP false ALT+F3 Bill Three Alt+C FALSE FALSE

op2 CTRL+F1 Tally INI

op3

op4 None of the above None of the above

CTRL+F3 A or B Four Alt+Ctrl+C

None of the above None of the above Five None of the above

* $ & Puchasing and Accounts Accounts payable and payable Puchasing and Receiving Receiving Single Cash Flow Statements Two Alt+D Create Information F4 Alt+P Tally Audit Bin True Enterprise Data Interchange TRUE 2 data element Multiple Fund Flow Statements Three Alt+X Alter Information F5 Ctrl+P Statistics Data False Enterprise Data Information FALSE 3 data record 4 Field A or B Ratio Analysis Four Ctrl+T Display Information F6 Shift+P Day Book Sub

^ Puchasing, Receiving and Accounts payable Mone of the above All of the above One Ctrl+D All of the above F7 None of the above Journal Book None of the above

Electronic Data Interchange.

All of the above

5 All of the above

FALSE Display stock valuation method Ledgers Personal Manual Balance Sheet Journal Filled 11 FALSE management by objective F4 Main Location True Ledgers 0 to 9 Supplier Report F2 Net Transactions True F6 function key Sales 1-4-1995 to 31-3-1996 True Horizontal

TRUE Open Calculator Groups Nominal Automatic Profit & Loss Stock Journal Receipt 16 TRUE management by exception F5 Primary False Reports 1 to 100 Suspense Output F4 Closing Balance False Alt + f6 function key Purchases 1-4-1996 to 31-3-1997 False Vertical A or B None of the above F7 function key A or B 1-4-1997 to 31-3-1998 None of the above None of the above None of the above Vouchers 10 to 60 Order Information Ctrl+f2 A and B None of the above None All of the above None of the above Ctrl+f4 None of the above Change Period Journals Real None Journal Book Physical Stock Transfer Issue 18 None of the above None of the above None of the above All of the above All of the above Reversing Journal None of the above 21

electronic data analysis F6 Primary Cost Category

All of the above Alt+f5 All of the above

Balance sheet & profit & Profit & loss and trial loss profit & loss and trial balance Primary Security mechanism F5 a name Sales return Company creation Trial Balance Main location Ledger a/c F7 an identity Purchase return Stock items units Daybook

Cash and profit & loss A or b Cost category F8 A and B a or b Regional setting Balance Sheet F10 Both A and B 4 F11 Budget

Cash and bank None of the above None of the above F9 None of the above None of the above None of the above None of the above F11 None of the above 1 F12 None

F7 Alt + F7 Changes in transactions Changes in Ledger or vouchers Masters 2 F9 Balance sheet TRUE F3 TRUE Main location Tally.imp 3 F10 Profit & loss a/c FALSE Ctrl+F3 FALSE Primary Tally.ini

Alt+F3

None of the above

Symbol A or b Stock analysis In 'comp info -> security control' option

None of them None None of the above None

Stock summary Stock journal By pressing F11 function During the creation of a key company TRUE 128 Ledger Accounts FALSE 228 Groups

28 Sub-Groups Data Entry Both A and B Cash receipts.

16 B or C TallyVault None of the above Payroll transactions.

Administrator Owner One company to another Other programs - a company created withon spreadsheet or a Inventory subsidiary. Cash disbursements.

Does not require as stringent a set of internal data to be transferred to memory Contingency Planning NIC Card Record Count Writing on a hard board Voice activated broadcasting Validity check Coloured spots File Name Printer System Logs Electrically charged ink

Will produce a more accurate set of financial data that has been transferred from memory System feasibility report VSAT Identification Number Printed output Voice answer back Boundary protection Pixels Identification number Storage device Physical Security

Will be more efficient at producing financial the address of a memory location Capacity Planning RAM Control totals for one or more fields Storing information on the hard disk Visual audio board File protection ring Pixies Reel Number Pointing device

Eliminates the need to reconcile control an instruction that has been transferred from Exception reporting AGP Card End-of-file and end-ofreel code None of above None of above Limited access files None of above Batch Total None of above

An ink pen Use only unremovable Restrict physical access media A pen A cartridge Separation of duties A cartridge A print head Volume Read Paper A drum Centralised function for PC acquisition A drum A laser beam Size Write

Console Log Data Dictionary An inked ribbon and print head None of above Make duplicate copies of Require user passwords files Eraser A ribbon Centralised function for PC Disposition A ribbon An INK RIBBON Storage capacity Read and Write Floppy disk all the above JCL None of above A cassette Distributed policies or procedures None of above None of above None of above None of above None of above none of these none the above

Magnetic tape PAN drive to an audit department's products & services to add customers Oracle True True ACL False False

Serial access medium 1.44MB A CD-ROM A CD-ROM Read By a sunny window ROM chips RAM chips ALU CPUs 0 bits RAM chips Serial access medium Network software and security software Supercomputer Notebook computers First generation Second generation Second generation Second generation Second generation Specification, Design, and Testing True yes true true

A parallel access Random access medium medium 20 GB A floppy disk A floppy disk Write By magnet objects RAM chips ROM chips Registers Registers 1 bit ROM chips 700MB Magnetic tape storage Magnetic tape storage Read and Write In a drawer CDROM chips DRAM chips Logic bus Control unit 8 bits

None of above None of above None of above None of above Not None of above None of above None of above None of above None of above None of above None of above A selective access medium None of the above None of above None of above None of above None of above None of above None of above

CACHE A parallel access Random access medium medium Systems software and Business software and application software games software Personal computer Supercomputers Second generation First generation Third generation Third generation Third generation Programming, Design, and Testing False no false false Mainframe computer Jon Von Neumann computers Hoover generation Fourth generation Fifth generation Fifth generation

Fifth generation None of above Analysis, System Design, and Implementation None of above

true true true true to determine the audit objective can bring the data directly True True change in the method of recording accounting documents driven approach hardware and software configuration true true the source of data available to the audit true the of by all concerned true natural/man-made true true true scheduled jobs true true with audit departments true

false false false false review and evaluate the types of data can bring the data indirectly False False use of accounting codes absence of audit trails risk driven approach processing options, file data structure false false source of data for material planing false providing access to computer to all false open/closed false false false manage hardware & software resources false false with production departments false conceptual/physical all of them unique approach checks and controls all the above none of the above all the above

to obtain a record layout extract data from file all the above none of the above

all the above

none of these

use of any programs

none of the above

enable multiple user resource sharing

all the above

all the above

none of these

true true true true databases true true reference files filex to have a complete picture of a system true true back-ups true true seriously affected database true true at the year end true Benfish true consecutive nos. or alphabets to entities true valid, numeric grouping, transaction

false false false false planning language false false table files report files none of the above filepet none of the above model base all the above

file-o-man file manager decentralized picture of a system all the above false false retrieval false false subject area database false false immediately false Benford false blocks of nos. to the primary attribute of the false invalid, alphabetic regrouping, events none of the above none of the above Benjamin on quarterly basis software and database deletion

addition

safety and database

none of the above

none of the above

random placement of component

none of the above

all the above all the above

true true true true true incremental design and enlarge activity true true true true e-brain bottom up tests yes read data on client's file executables, master true

false false false false false interactive data extraction and analysis false false false false bouncing ball top-down tests big-bang hybrid tests stub all the above

interactive data innumerable analysis

none of the above

no provide information to the re-perform procedures audit carried out by the clients all the above deleted, hard none of these all the above

false system advanced system analysis software software true yes true true manipulates, real true yes can be very powerful analytical tool yes false no false false create, false false

all the above

none of the above

none of these

all the above

no can enable the auditor to can provide the auditors execute provisions on a with useful information all of the above no

provides detailed information of machine IDEA true fictitious data applied against the client true true true specification, program identifying erroneous code true true start and finish time job control language yes true

identifies program code which may be there for ACL

examination of source code of a program with ALC

none of the above ACLL

false comparison of source analyzing the picture of a version of a programmed file or data all the above false false false file, hardware identifying ineffective code false false authentication of information support none of the above identifying non-standard code all the above all the above

resource requested

all the above none of the above

job connectivity language all the above no false

true false package computer p[program for performing mathematical concept prepared by the auditor true prepared by the entity

master list of administered transactions questionnaire prepared by an outside programmer engaged by all the above

false statistical/arithmetic file access/organizations operation true true examining the quality of system process Wide access to various data base ACL false false

stratification and frequency analysis

all the above

examining the quality of carrying analytical review data Can extract and analyse Can aid in simple data selection

all the above Can define the audit objectives

IDEA A utility software A sample of transactions programme

High End CAATs All of the above A special purpose written program None of the above

Tests of details of transactions Macros integer true actions report macro calculator action list conditions tabular tabular create report columnar and tabular true create fields primary key label wizard start header report footer for ordering records condition VB Modules add report true

Analytical review procedures Action Procedures number false events form expression elements code builder macro list action columnar columnar link report stable and unstable false add chart alternate key chart wizard group header page footer for updating records group reports append macro sheet false

Compliance tests of general EDP controls Event Procedures primary number

All of the above General Procedures auto number

procedures chart comments

none of the above macros action

expression builder expression elements expression elements list box none of the above insert auto report datasheet embedded report dynamic and static none of the above embedded justified new report none of the above

chart foreign key mail wizard page header group footer for specifying conditions with group by clause macro names forms insert module

insert chart none of the above none of the above report header none of the above none of the above none of the above macros delete none of the above

RAD SysCmd OLE object linking and embedding OLE object linked exe form wizard static file append dollars unbound object display as icon create html startup bullet DBMS data group new dialog box 255 automatic number true inner join primary key cascade delete related records columnar

RAP MsgBox DDE on line execution OLE client embedded DLL report wizard static html add rupees bound object display new home command RDBMS data collection new blank database dialog box 64000 AutoNumber false outer join not null cascade change related records tabular

RAID message CME on line editing OLE server connected BMP query wizard dynamic file insert pesos command button link save as html end procedure front end database

none of the above none of the above none of the above none of the above OLE communicator edited html publish to web wizard none of the above data definition yen list box create icon none of the above none of the above none of the above language data storage

new database dialog box database dialog box 235 number 63500 automatic field

explicit join candidate key cascade update related fields both a and b

none of the above no duplicate key change all related records none of the above

table or tables true property field crosstab queries action queries inner join true new form dialog box summary change properties included form Record Navigation columnar form filtering filter filter by form * true bound control button group database bound CURRDATE() text box pivot table data sheet filter

query or queries false field property row/column queries row/column queries self join false form create dialog box sum properties sub form Record Operations tabular form ordering sorts filter by selection $ false unbound control option group form unbound TODAY() list box columnar form filter by input

record or records

none of the above

Dynaset field properties select queries change/delete queries no match join

properties update queries update queries outer join

form wizard dialog append form properties new form Form Operations hierarchical form sorting pipes filter by menu @

both 1 and 3 simple new properties child form None of the above one to many form querying gateways None of the above ?

data less control controls group collection controlled DATE() combo box tabular form filter by form

data control record group none of the above all of the above DAY() static text main form none of the above

button wizard ram* true report autoreport chart true true 60,000 true true true table table true true Insert true true alternate keys true true true true true null

control wizard ram?? false form report label false false 255 false false false query form false false Records false false composite keys false false false false false not null

option control wizard two of the above

tool wizard none of the above

table module bitmap

ledger none of the above report

25,000

64,000

form report

all of the above hyperlink

Tools

none of the above

candidate keys

primary key

zero

none of the above

true true true true pie true true true update query true true inner join true true true freestanding true true true true the first field of the table forms true delete true true

false false false false bar false false false select query false false outer join false false false embedded false false false false the last field of the table reports false insert false false append add primary key field attributes none of the above entities stand alone sub chart self join table join delete query append query both 1 and 2 none of the above

freestanding use hyperlink true true true true true true true & true page true true true true true relational true action language report true group data true true

embedded use import false false false false false false false # false detail false false false false false list false structured query language form false record property false false

stand alone use datasheet in forms

sub chart use export

group

topic

range

logical

event - procedural based language none of the above query table

session both a and b

detail none of the above

sub forms graphs number pivot filters form list box true form name tabular form sub forms calculated calculated sub form set relation option, toggle and command buttons filter by form form clipboard search A way to analyse and manipulate numerical Information about certain programs remote DBMS storing data offline at a separate site Key verification A way to analyse and manipulate numerical

child forms chart primary key create queries bound combo box false control chart form tabular form bound unbound auto form

inner form labels index form sorts unbound button

none of the above report identifier none of the above forms none of the above option button

record source data sheet form columnar form unbound bound tabular form

none of the above none of the above none of the above none of the above static columnar form none of the above option button, toggle button and check boxes filter by input table layout record grab A way of maintaining a log A collection of files Reliable DBMS uses tape as opposed to disk Database access controls

connect relationships command button, check list, check and combo and list boxes boxes filter by report report file sort A tool to produce high quality documents It contains all the data about one specific item relative DBMS backing up data regularly Computer sequence checks A tool to produce high qualitydocuments filter by record macro field field names An organised way of storing information about A document which contains text Relational DBMS is related to data mining

Computer matching An organised way of storing information about None of the above

Information about certain programs Reports allow users to extract information as Extracting and analysing data Compilers, interpreters, editors DEFAULT and NOT NULL constraints CHANGE TABLE remote DBMS storing data offline at a separate site Number using a password the product code A database bookmarks

It contains all the data about one specific item Reports provide a very flexible way of creating Spreadsheets make data easy to analyse Network software, backup systems FOREIGN KEY constraints MODIFY TABLE relative DBMS backing up data regularly Description keeping a backup copy the primary key Graphics operators

A document which contains text A tool which allows text and graphics to be Using queries Word processors, spreadsheets, PRIMARY KEY and UNIQUE constraints ALTER TABLE Relational DBMS

None of the above None of the above None of the above None of the above IDENTITY columns UPDATE TABLE

Reliable DBMS uses tape as opposed to is related to data mining disk Source saving the file with different filenames e-mail e-mail engines Auto Key reports are consistent with the underlying tables report and its related query. not a primary key of either related table. Many-to-one

Component keeping the original paper copy mail merge browser wildcards AutoNumber forms in a database are consistent with the query and its associated dynaset. a field from an unrelated table. Many-to-many EmployeeLastName

Auto Primary Auto ID records in a dynaset are related tables in a consistent with the database are consistent main form and a foreign key. subform. the primary key of both the primary key of the related tables. related table. One-to-one EmployeeID The Tools menu, Relationship window Double click the Relationship line That there are several customers associated They must both be numbers Nothing, Access ignores the attempted command. The subform is not visible. A one-to-many relationship between One-to-many CompanyID

CompanyAddress The one-to-many Referential integrity The join line relationship Right-click the Select Undo in the Click the Delete Relationship line, then Relationships pull-down Relationships button on That some of the data is That there are records in That records can be not viewable a related table added by clicking on the They cannot be text They cannot be They must be the same fields AutoNumber data types data type The customers ID is The customers ID is An error message is deleted from the deleted from the displayed. The subform is displayed The subform is displayed The subform is an object in Datasheet view. in Form view. on the form and can be A one-to-many A one-to-many A many-to-many relationship between relationship between relationship between

# Either table at any time prompt, title bar text, icon. Dim CreateList. A check box enables the form user to choose from must be set for one word. help people keep track of things. data. facts. single-user database application single-user database application Sequential Query Language (SQL) Database Modeling System Jet

M The Customers table only when there are Loan prompt, icon, title bar text. Sub CreateList. A text field enables the form user to choose from must be set for multiple words. store data in tables. relationships. figures. multiuser database application multiuser database application Structured Question Language (SQL) Database Management System SQL Server

The Loans table at any time title bar text, prompt, icon.

* Neither table title bar text, icon, prompt.

CreateList. Sub. A drop-down list enables A drop-down list enables the user to choose from the user to enter text. must be set for two does not have to be set. words. create tables of rows and maintain data on columns. different things in metadata. information. e-commerce database application e-commerce database application Structured Query Language (SQL) Data Business Model System all of the above a and b a or b None of above Relational Question Language (RQL) Relational Model Manager a and b All of the above. All of above b and c the database All of the above. All of the above. All of the above. a and b a and b a and b entity-relationship data modeling entity-relationship data modeling

Oracle The database The user The database application management system the database the DBMS accesses the application(s) interact(s) database data None of above creates queries the user all the users' data is in one place holds user data tables from existing data from existing nondatabase data from existing data data marts data marts creates form creates reports the database the database application management system it reduces data it contains a description duplication of its own structure holds metadata metadata as a new systems development project as a new systems development project as a new systems development project normalization normalization holds indexes stored procedures as a redesign of an existing database as a redesign of an existing database as a redesign of an existing database data models data models

data marts data marts

normalization normalization

data models entity-relationship data modeling

entity-relationship data modeling data migration relational data model more than one column can use the same name field tuple foreign key candidate key surrogate key

file managers hierarchical models network models entities in a column vary the order of the columns the order of the rows is as to kind is important unimportant table record record record composite key Insertion anomaly assess the existing tables' structure and are supplied by several well-established They use sophisticated mathematical dirty data relation field field field primary key Update anomaly design the database structure were essentially killed off by MS Access Their report delivery is more difficult than report inconsistent data row key composite key foreign key foreign key Deletion anomaly create one or more new tables

All of above move the data into the new database are not true DBMS have poor response time products Nonintegrated data nonintegrated data None of the above a "wrong format" problem a "wrong format" problem

dirty data inconsistent data data warehouse data are data warehouse not stored in tables. databases do not have Form Forms and reports It will be easier for the user to upgrade it if the The Link Tables command can be used to Import It contains more than one table Table Queries and tables It will be easier for the user to upgrade it if the An application may consist of multiple Link It contains tables, reports, queries, and

nonintegrated data data warehouse data are often denormalized. b and c Report Macros It is advisable to put each object and table into a All objects in an application, including the Query

Spreadsheets Regardless of how the objects and tables are An application can be created in such a way

Merge Join It contains a user interface, or switchboard It contains macros Interface Design Wizard Switchboard Manager put key business store all corporate information into the transaction data in one Digital Signature Digital Certificate None of the above Private Key

Menu Wizard Build Menu create backups for centralize the mission critical corporate manageability of data Digital Sign Hash Function Digital Certificate Digital Signature

Hash Function

Hash Value Hash Result Digital Signature Digital Signature creation Verification Both A and B Institutional Overhead Subscriber Relying Party and Subscriber Relying Cost Institutional Overhead Certification Authority True True Server Certificate Server Certificate Private Certificate Evidence, Ceremony, Approval True True Certificate Revocation List Private Key, Subscriber Internal Format File ANSI batch files Smart Card E-cash Certified Authority False False Developer Certificate Developer Certificate Repositories Approval, Evidence False False certificate Revocation Certificate Resource List Letter Public key, Recipient External Format File UN/EBCDIC interchange sets Embedded cards Private Key, Recipient Transmission File UNESCO functions SET Smart Cards Personal Digital Certificate Personal Digital certificate Public Key Efficiency and logistics, Evidence Certificate Authority

Either B or C Either A or B None of the above None of the above

None of the above None of the above none of the above Evidence, Ceremony, Approval, Efficiency and

None Of The Above None Of The Above None of the above UN/EDIFACT functional groups None of the above

Digital Cash Online Catalog and Billboards and Junk Mail Billboards EDI True Login_Id and Password Global Network Active or push based advertising Broadcast E-mail

Electronic cheques Online Catalog and Broadcast and Junk Mail Customer Endorsements EFT All of the above

False Primary Key and Private Public Key and Private Key Public Key and Password Key Private Network Passive or pull-based advertising Junk mail Satellite Area Network Glow sign or hoarding strategies Billboard None of the above All of the above Endorsements

E-mail Catalog Error checking Competitive espionage A list of competitors clients single-user database application

Bulk-mail Endorsement Data Integration

Direct-mail Billboard Low cost of operation Industrial espionage Research data e-commerce database application

Junk mail Broadcast Quality management Economic espionage A competitors new project None of above

Corporate espionage Contact numbers of the management group multi-user database application Keeping messages Replying promptly short Removable drives that Message authentication can be locked up at night in EDI systems performs convert text to columns text import wizard wizard cell reference text files serial values =today() dollar sign AutoSum variables text concatenate countif pivot table wizard sumif average page setup autoformat bordering page setup row reference Lotus 1-2-3 domain values =date() ' = ' sign AutoFill arguments logical pmt vlookup chart wizard pmt sum print area AutoFill formatting print area

Including the Subject Using all capital letters Encryption performed by Security at the a physically secure transaction phase in EDI tip wizard column reference function wizard none of the above

quattropro or xbase files class files range values =currentdate() # sign function wizard parameters numeric merge pmt convert text to columns wizard countif sumif print none of the above shading print none of the above print preview reference values none of the above none of the above none of the above none of the above Boolean none of the above count tip wizard none of the above countif none of the above

filtering all option www.ency.in URL internal network application layer finger service FTP

searching blanks www.eb.com DNS network of network transport layer ping service TELNET

sorting all blanks www.encybrit.com FTP intermediate network physical layer ftp service ARCHIE

none of the above none none of the above none of the above none of the above session layer none of the above none of the above

uniform research locator uniform resource locator unlimited restore locator none of the above host computer message Delphi net browser CompuServe internet dialer gophering Alta vista finger server list no middle hotlist directory search,index search infoseek netshark lynx name of the resource scheme Microsoft web read the Usenet news spy mosaic gopherspace open text ftp server directories maximum of five lower directory index search,menu search excite cello mosaic scheme command line sears browser search for database wincim or maccim cyberspace excite web server image list one top index none of the above none of the above general electric editor none of the above none of the above none of the above none of the above none of the above none of the above many middle and lower glossary

menu search,item search item search,index search lycos lynx Lycos all the above all the above navigator gold 2.0

Microsoft Usenet Higher text transfer protocol iccp yahoo transfer control protocol/internet one ftp servers the internet adapter browser hotlink text transfer protocol universal resource locator frequent asked query SLIP,PPP

internet finger service Hyper text transmission port ftp

IBM ftp Hyper text transfer protocol uucp

CompuServe telnet Hyper text transfer port none of the above

ftp telnet none of the above transmission control transfer communication protocol/internet protocol protocol/internet protocol none of the above two domain name servers the internet administration protocol hyper text transfer protocol three web servers the internet access site higher type transfer protocol none of the above none of the above none of the above organization none of the above

uniform resource locator uniform resource label name of the above frequently asked question frantically asked question none of the above TCP,IP IP,UDP none of the above

connection response wide search for windows sockets information and research internets relay chat lynx,minx world wide web server glossary very easy and rodent oriented net wide index university of berkeley,berkeley freenet protocols search engines,directories allsrc,winsocks allsrc higher text medium language netscape,ie world wide web client index very organised network integration and university of cleveland,cleveland IP address ftp and finger wais,allsrc waisman hyper transfer markup language

request close world search for information and research none of the above mosaic,gopher interface hotwords verification on network integration and university of California net dns telnet and ftp wais,winsocks winsock hyper text markup language none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above

hot links images graphics,videos,audio first page global network news yahoo service

hyper text applets programms,images,text home page global networks navigator

books marks

none of the above

animation none of the above animation,scripts,execut ables none of the above welcome page grand network news search engines yahoo and altavista ftp all the above Delphi bookstores more information database Graphical interface format Joint pictures expert graph net eudora,netscape and pine network connections FCOLOR Communication graphical interface Communication Client Web none of the above none of the above none of the above none of the above archive none of the above fidonet none the above galenet channel Graphical Interface format Joint pictures experimental group browsers none of the above mails FONTCOLOR Common Gateway Interface Connection None of the above Channel None of the above neither text nor image CGI

electronic mail Netscape page starter email and net conference site,netscape page newsgroup Lycos catalog apple link computer related abbreviations and encyclopedia Britannica search engines Graphical interpreter formatting Joint Pictures Expert Group mails yahoo,infoseek,altavista information telnet point review bitnet biographical information on-line reference works web directories Graphical interchange Format Jumbled pictures expert graph documents netscape,ie,lynx web pages

BACKGROUND COLOR Communication gateway Common graphical interface Interface Network Current web page Browser/user Unknown resonance language text only SQL Interface Browser Server

Uniform resource locator United relay limited image only PLSQL text or image SGML

alphalanguage palm is not eatable SGML Processor web sites Internet equipment training faculty MS Internet Explorer and Mosaic text hyperlink in random order first .bmp and .gif Service, hostname and directory path mail servers,mail clients and alternate services <center> communication generated information Server arpanet LAN data scripting,parsing and compiling nt,windows95,ie,winzip

betalanguage palm is not elm SGML Preprocessor images International Engineering trainers and faculty Netscape Navigator and Mosaic data from a database hypertext in sequential order start .bmp and .jpeg service,hostname,port,dir ectory-path mail vendors,mail identification and <font size=n> common gateway interface Client the net

metalanguage pancake is not edible SGML Parser

none of the above none of the above SGML Composer

applets documents Internet Engineering Task Force None of the above MS Internet Explorer and Netscape Navigator None of the above symbols hotword in user-defined order home .gif and .jpeg service,port and directory path mailing lists,mail server robots and gateways to <hr size=n> classified general instructions Browser intranet video hotlink none of the above none of the above .wmf and .bmp service,hostname and port none of the above <l1 type=shape> none of the above User none of the above none of the above

peer-to-peer connectivity wan parcel news,cooking and fine arts mosaic,gopher,eudora,tr umpnet

packets none of the above email,file retrived,internet tools none of the above communicator,ie,lynx,win sock all of the above none of the above none of the above none of the above none of the above none of the above

dnet arpanet ARPANET defensive administrative dedicated and registered defensive advanced rank administration projects administration research projects start milnet,smaller arpanet education,research begin mailnet,inet music and dance first intranet,extranet cooking and dining

Higher text manipulation Hotlink text markup language language united states and UK server client network card detailed transaction explanation application layer point to point network and broadcast channel file access PAN,NAN,AAN VAN LAN analog Data type definition Moralize/demoralize Mapping Satellite link and digital signals Standard long internet protocol england,norway client stand-alone network topology

Hyper transfer meta language united states & Russia network servers network redirectors

Hyper text markup Language none of the above none of the above none of the above none of the above none of the above

data terminal equipment data target equipment physical layer packet switching,store and forward network anonymous ftp KAN,RAN,VAN MAN MAN digital Define type of data

network layer none of the above smart network and dumb network none of the above file transfer LAN,WAN,MAN TAN WAN non-digital none of the above none of the above none of t he above none of the above none of the above

Document type definition Document type data

Modulation/demodulation Manipulate/demanipulate none of the above Modulation Dedicated access and dial up access Stream line internet protocol Manipulation Cable and wires Serial line protocol none of the above none of the above none of the above none of the above receiving information from a host computer Channel Retrieve Neither A nor B Both B and A All The Above

Prime prolonged protocol Point to point protocol Pillar to pillar protocol storing data on a disk sending information to a storing data on the hard drive host computer drive Bandwidth Find Recipient Party Public Key E-mail Not False Speed Save Relying Party Private Key Electronic Commerce Not True Size Browse Either A or B Both A and B Electronic Fund Transfers

Closed System,Formal Legal requirements Affirmative Act Signer Authentication Not True Nonrepudiation Service Affirmative Act Cryptography Private Key Private Key Private Key Decryption

Formal Legal Requirements Efficiency

Open System Signer authentication

Formal Legal Requirements, Open None of the above Neither A nor B

Document Authentication Both A and B Not False Digital signature Efficiency Public Key Public Key Public Key Public Key Cipher Performing validity checks. Digital certificate Either A or B Private Key Both A and B Both A and B Both A and B

Private Key Neither A nor B. None of the above Either A or B Either A or B Either A or B Cryptography Reviewing the systemsaccess log. Sent to the correct address. The private key is used by the receiver for Firewall vulnerability. Business- to-Billboard Broadcast Broadcast Domains None of the above Search and discovery None of the above Pulling cart None of the above Gateway EDI

Encryption Conducting fraudUsing data encryption. awareness training. Unaltered in Received by the intended transmission. Not intercepted en route. recipient. Both sender and receiver The private key cannot The private key is used must have the private be broken into fragments by the sender for Failure of server Collision. Data entry errors. duplicating function. Business-to- Business Billboard Business-to-Backend On-line Catalog Backend-to-Business Endorsements Catalog .COM

Customer Endorsements Billboard Intermediaries Order Placement portals Service

Search and discovery Pre-purchase Post purchase interaction Purchase consummation preparation Billboard model of Endorsement model of marketing Online catalog marketing Online Catalog EDI For Administration, Commerce and EDI Compiler Shopping cart Billboard EDI For Administration, EDI For Administration, Consumer and Transport Commerce and TCP/IP Interpreter EFT Assembler

Business-to-Business Emergency Cash Communication Perspective Microcash Decryption 1 data table pivot table wizard series or rank series or rank series or rank series or rank column chart column chart column chart column chart spaces excel97 pivot table wizard line chart true and 3-dimensions true Data table It is also called as highlow-close chart

Business-to-Consumer Electronic Cash Business Process Perspective Micro Transactions SSL 2 filtered table chart wizard category category category category bar chart bar chart bar chart bar chart wild card characters internet explorer chart wizard bar chart false or 4-dimensions false Pivot table

Consumer-to-Business Euro Cash Service Perspective TT(Tiny token) Encryption 3 index table convert text to columns wizard legend legend legend legend pie chart pie chart pie chart pie chart symbols Netscape convert text to columns wizard stock chart

Customer-to-Company Endorsed Cash None of the above E-token Subscription 4 pivot table tip wizard data marker data marker data marker data marker surface chart surface chart surface chart surface chart none of the above word 2000 tip wizard pie chart

Multi-dimensions

It is often used to display It is also used for It shows trends over time share market prices over indicating fluctuations in

Pivot table Goal seek Goal seek Workbook

Scenario manager Scenario manager Pivot table

Solver Pivot table Solver Spreadsheet Performing text formatting. Source table name. N

Data table. Data table. Data table. none of the above All of the above Pivot table item.

Worksheet Performing database Performing calculations. operations Column field two true 3-dimensions Row field. three false 4-dimensions

Multi-dimensions

Data table Pivot table It displays the data series It is useful when several It can be represented in one on top of the other. components are 3-dimensions Pivot table. Goal seek Count. databases It is a tool for summarizing and Goal seek. text import wizard worksheet application window A dark wide border 8,16,32 your formula has a syntax error Scenario manager Scenario manager Standard deviation Solver Pivot table SumIf worksheets Data table Data table

records tables It is a tool that provides a It summarizes the data way to view and compare by using analytical Scenario manager convert text to columns wizard workbook document window A dotted border 2,4,2 the row is too short to show the number at the solver tip wizard tables modal window No border

Pivot table function wizard database

A blinking border

ability to generate tables speed of calculation word processing Range graphical Address

2,2,2 6,8,10 the column is too narrow to show all the digits of either b or c flexibility of moving entries cost of initial set-up database Gap spreadsheet Rows

Producing graphs double-click any cell in the column ENTER array. 100 Cell references ^ B5*B6 E12 It is surrounded by a heavy border. By clicking in a different cell The Standard toolbar the New command on the File menu. File Preview Insert Clear Orientation (portrait or landscape) Options worksheet. 6 copy range. paste range.

Writing letters Drawing pictures Document filing drag from the top cell in the column to the last cell click the column heading click the column label CTRL + ENTER function. (201)555-1212. Functions / C3/D4 6 TAB constant. #VALUE! Numeric constants * D4^2 INSERT formula. Tom McKenzie. Text constants \ It is impossible to determine. G7*SUM(H9:H11) The phrase active cell appears in the Status By typing the reference of the cell you want to The Font Size command on the Tools menu. the File Type command on the File menu. Window Properties Clear Remove Margins Edit cell group. D source range. source range. Both the Copy and Paste commands constant $B$4

SUM(H9:H11) It is displayed in reverse It is blinking. video. By using the arrow keys By either clicking in a to move to a different cell different cell or using the The Cell Format The Formatting toolbar command on the Edit the Save command on the Save As command the File menu. on the File menu. Edit Details Delete Delete Headers and footers Page Setup range. D12, G25 destination range. destination range. View List Both Insert and Delete Both Clear and Delete Fonts View group. D12:G25 clipboard. clipboard. The Paste command mixed B$4

The Duplicate command The Copy command absolute B4 relative $B4

#DIV/0! #DIV/0! The Move command copy and paste cells. the Fill Handle Select the Insert Hyperlink command from whether the cell has a formula or a value in it.

#DIV/0! #DIV/0! The Cut command edit cells.

#DIV/0! #DIV/0! The Paste command cycle through absolute, relative, and mixed cell

#DIV/0! #DIV/0! Both the Cut and Paste commands cycle through open applications. Conditional formatting Double-click a cell and click the Insert Hyperlink

the value in the cell text with either a two-digit text with a two-digit year. text with a four-digit year. an integer. or four-digit year, It is impossible to Jul-30 Aug-31 29/03/2008 determine from the subtracting the earlier adding the earlier date to subtracting the later date adding the later date to date from the later one. the later one. from the earlier one. the earlier one. the F4 key. 03-Apr a cell on a worksheet. B1-G10 AVERAGE Combination Once a bar chart is chosen it cannot be the F2 key. 0.75 a variable. B1.G10 COUNT Line Once a column chart is chosen it cannot be the Esc key. March 4 of the current year a constant. B1;G10 MAX the F1 key. Either 3/4 or .75, depending on the cell either a cell on a worksheet or a variable. B1:G10 SUM

the Format Painter the Formatting toolbar Click the Insert Hyperlink Right-click a cell and button on the Standard click the Edit Hyperlink whether the cell has an the cell address. absolute or a relative cell

Pie Scatter Once a pie chart has Once a line chart has been chosen it cannot be been chosen it can be hold down CTRL + hold down the CTRL key hold down the SHIFT key hold down the ALT key SHIFT Transfer information to a Use tables Create four separate files database Use multiple sheets Paste Tools | Sort Analyse data click the Print button producing graphs (D4+C2)*B2 0 Fill Down Data | Sort Calculate data press the PRINT SCREEN key writing letters Fill Right Edit | Data | Sort Create forms select Print selection on Page Setup | Sheet drawing pictures Paste Special none of the choices None of the above select Print selection in the Print dialog and then None of the above =(B2*(D4+C2) None of the above

D4+C2*B2 #VALUE! =A3SUM:B3SUM:C3SU M REF!

portrait AD213 CERN yahoo and infoseek news groups,yahoo and infoseek bulletin board system small windows socks Mosaic buffer Photography Key User-id Penetration Acts Spoofing Loss Sales - tax authorities Utility Tim Berner Lee Etrade.com Automated Tailor Machine Acts Router LAN hyper terminal tracing program

landscape ZA1 ECRN

whatever was last used A0

vertical None of the above NET none of the above none of the above none of the above none of the above none of the above Lynx none of the above Message Digest Formula Address Password Cracker Protocols Approving Hacking Police officer of IPS rank. Cracker Howard Aiken Msn .com None of above Protocols Pin PAN hypertext tracing protocol

CARN newsgroups and search mailto and files engines bulletin boards,mails call application servers,proxy and wireless system servers and web servers business broadcasting bulletin broadcasting system system large windows sockets Yahoo cache Digital Signature Lock Password Retrieval Regulations Imposting Threat Income - tax authorities Pirated software Hoffman Amazon .com Any Time Money Regulations Gateway WAN hypertext tracing program very small windows stocks PINE built-in Cryptography Hash Function Name Cryptography Address Unauthorising Exposure Judge of a civil court Virus Charles Bubbage Dell .com Asynchronous Transmission mode Address Port CAN hypertext transfer protocol

National Informatics Center Only Computers Concentrates connectivity Bridges and Repeaters. bits firewall One Physical Layer RG7U Physical address A cable

Network Interface card

New Information Card

None of the above None of the above All of Above Hubs and nodes None of the above virus checker None of the above All of the above Twisted pair None of the above None of the above None of the above None of the above All of the above None of the above 48 MB a gateway calling program for internet Network PC If the hub goes down, it brings down all of the None of the above All of above None Both A and B Mesh Mesh Ring

Can not computers Only printers Combines connectivity of Switches data from a hub with the traffic incoming ports to Two or more networks frames gateway Two Data-Link Layer Coaxial cable Logical address Bridges and Hubs Packets router Four Network Layer Fiber A memory address Router It continue on to target device with corrupt data Ultra violet technology Network Layer Octal 48 KB software that allows file copying

Hub It gets destroyed bit by Data return to the sender bit. Wireless technology Physical Layer Binary Wired Technology Data Link Layer ASCII

48 Bits 48 Bytes software that facilitates a list of rules for connection to the internet transferring data over a Novell PC There isn't one Physiology Bus Linear Parallel Ring Ring Star

Client Server If one node goes down, it If the hub goes down, it brings down the entire brings down all of the Topology Star Parallel Circular Bus Bus Bus Both A and B Ring Both A and B Linear Star Star Linear

Ring Network Layer Ethernet, token ring, DecNET bps bps usually higher than LAN speeds CD-ROM drive must use the World Wide Web key gateway interface a Novell Interface Controller CD-ROM drive

Bus Transport Layer Ethernet, token ring, FDDI kbps Kbps measured in bytes per second a modem

Star Physical Layer

Mesh

Data Link Layer Ethernet, token ring, Ethernet, DecNET, FDDI ARCnet mbps Mbps depend on the transmission medium mips Mips limited by modem speeds Netscape All of the above application protocol interface connects a computer to a network Netscape None of the above none of the previous use appropriate communications none of the previous make of processor is a protocol for the transfer of files between None of the above none of the previous none none of the previous search engine make of processor is a protocol for the transfer of files between is a protocol that allows for remote login Any layer can communicate only with

Windows 95 must have a LAN must use electronic mail account common gateway uniform resource locator interface interfaces a modem to a used to control a printer computer a modem Windows package

Linux Novell Netware Windows NT have to do with have to do with Web compression of graphics pages the Internet must use the World must have a LAN Wide Web must use electronic mail account Printer provides access to the Internet used to send email modem is a CPU register bridge is a CPU functional unit

used to send email used to protect a computer room from fires a form of virus a backup server hardware scanner provides access to the Internet used to send email used to send email The layers cannot communicate with one

used to browse the Web is part of Netscape uses wireless communication medium is part of Netscape a screen saver program a poor file server

an email server

IR system for the Internet browser CD-ROM is a CPU register clip-art file is a CPU functional unit

used to browse the Web is part of Netscape uses telephone lines Any layer can communicate directly is part of Netscape Any layer can communicate only with

It is one large network.

It is made up of many It works the same way as Individual computers can networks connected into a local network. connect to it using an Denial of Service Port sniffing

Password cracking System intrusion used to protect a computer room from fires a form of virus Flood a Web server with IP flood requests hack firewall a backup server Apply security patches All sites are safe and reliable. Use of identifiers packet router an email server Update virus definitions There are safe and unsafe sites. Use of passwords

a screen saver program none of the previous Virus that initiates a ping flood UDP flood flood switch a poor file server Backup data on a daily basis Only large namerecognizable sites are Use of logical access methods by attaching itself to a document. Web traffic A worm Multiplexors traffic hub none of the above Limit logging on access ActiveX-enabled sites are safe. Use of encryption methods by scanning the computer for a Application updates Spyware LAN

by attaching to an e-mail. through an FTP port. Phone A Trojan horse Modems cookies and Trojan horses. An attack on a system for personal gain Economic damage Crashing the stock market, as in the 1930s To carry more network capacity set its prices very high People Search Name of your bank Virus buy stocks. Shill bidding Internet stalking. E-mail Adware Protocols Trojan horses and key loggers. An attack with the purpose of gaining Disruption in communication Shutdown of military security systems To improve network services limit access to computer owners only Yahoo People Search Date of birth Fraud invest without risk. Phishing cyber stalking.

cookies and key loggers. key loggers and worms. Changing the content of Giving out disinformation a Web page All of the above are Disruption in supply lines correct. Contaminating water Shutdown of nuclear systems plant safety systems To improve system To obtain an accurate response time inventory of network stop its competitors update its prices as soon seeing their prices as they are changed USA People Search Personal assets Adware purchase off-shore property. Siphoning virtual stalking. Lycos Search Criminal records Spyware make large amounts of money by parking funds Hoaxing Web stalking.

pop-ups. Use a fake e-mail address. Encryption I only irc Adds more bytes to programs HTML Web query. .com is used for company round trip HTML. XML. using Internet Explorer to view a Web page that is Click on the Back arrow until the desired site is the Refresh command Hyperlink BMP Save it to a floppy disk. extranet. an attachment. VoIP Desktop client, application, and Modem File Transfer Program So computers can be referenced by a name 193.1.2.3 paul .trigg @ domain. org. uk

cookies. Never use your real identity. Physical Security controls II only ftp Verifies integrity of files Internet Explorer HTML document. .co in used for company the World Wide Web Consortium HTML. updating the values that are obtained through a Click on Go to or Search in the browser the Insert Hyperlink command Screensaver

spam. Use a proxy server. Message sequence number checking Both I & II www Increases boot up time Microsoft Excel round trip HTML document. .con is used for companies HTML. DHTML. clicking a hyperlink that references a document Go to the History page and look for the site the Update command Sound

viruses. Use anti-spyware software. Logical access controls Neither I or II telnet Misleads a program recompilation both HTML and Internet Explorer Web browser. None of the above one way HTML. MHTML viewing an Excel worksheet that you have Go to the Bookmarks or Favorites page the External Data command Video TIFF Cut and paste it to a word processor network topology an encryption. PoIP Desktop server, software, and hardware. None of the above None of the above None of the above None of the above None of the above

GIF JPEG Write it down on a piece Add it to Favourites or of paper. Bookmarks. intranet. a signature. privileged network. a footer.

IPT IPP Desktop client, software, Desktop server, and hardware. application, and CD-ROM File Transmission Protocol So IP addresses can be shorter Telephone line File Transfer Protocol So email is delivered faster

45.1.1.1 143.215.12.19 paul.trigg@domain.org.u k paul.domain.uk

The US government Internet Relay Chat It will be deleted Hyper Textual Mark-up Lingo Receiving messages automatically from clipart & auto shapes circles square tool bars clip gallery & word art wave file eof,false properties window bof,false value() circle true true fontcolor underline,true textsize one- millionth of a second count form layout window title msgbox()

Scientists in Switzerland International Relay of Characters It will be waiting for you to collect it Hyperlink Text Marking Language People discussing a topic of interest globally autolayouts and presentation templates points image short cut menus slide show & view show media clip movelast,true form layout window movefirst,true int() rectangle false false color fontunderline,true size one-hundredth of a second recordcount prperties window prompt textbox

No-one Internet Remote Conversations A letter will be sent to you in the post Hyper Text Mark-up Language High volumes of email

None of the above None of the above None of the above None of the above None of the above

slide view & outline view none of the above squares grid auto shapes fonts & images .video file movelast,false toolbox movefirst,false number() square icons guide all the above none the above all the above eof,true project explorer bof,true val() oval

forecolor textunderline,true foresize one-thousandth of a second itemcount project explorer vbmsgboxstyle label

none of the above none of the above fontsize one-ten thousandth of a second listcount toolbox none of the above inputbox()

opendynaset load standard blue red properties window properties window change child true load text opendatabase enabled dime .ctx Validate On Error GoTo linelabel UpdateControls Cancel parameter to a non-zero value 1 Consists of several Programs Form window, standard or code module Place code in the Terminate event AutoRedraw = True

opensnapshot activate opaque red green form layout window form layout window lostfocus parent false unload name dbengine visible dim .ctl Validation On Error GoTo Inline PaintPicture Cancel parameter to 0 2 Consists of several Applications Project window, view code window Place code in the Unload event

dbopensnapshot unload transparent green blue toolbox toolbox text container

dbopendynaset initialze graphical black white project explorer window project explorer window gotfocus none of the above

initialize caption openrecordset value var .ctr Check On Error Stop Refresh UnloadMode parameter to a non-zero value 3 Consists of Various Forms And Code Class module, code module Place code in the Deactivate event Refresh Msgbox error.number & error.text

activate none of the above none of the above style none of the above .ocx Audit On Error Resume Next Resize UnloadMode parameter to a zero value None of the above Consists of several Projects None of the above None of the above PaintPicture Msgbox error.number & error.description

AutoRedraw = False Msgbox err.number & Msgbox err.no & err.text err.text

To display images to the To help in creating a user ToolBar FreeFile Retrieve Common messages passed to Windows Caption Click and KeyPress Ascii Format CurrentX and CurrentY Property Get Background color property Min Shell Are one and the same You do not need to use the Set command here The Open method A warning query icon statement. MsgBox statement returns a value, while the Data cannot be entered into the form. Unload clipping tool color palette ascent 10 column images GetFileNum Get Open dialog box Visible Click, KeyUp and KeyDown Binary Format ScaleLeft and ScaleTop Property Assign Caption property Max Substr

To allow the editing of icons GetFile GetProperty Windows explorer Multi-Line KeyUp and KeyDown Input Mode ScaleHeight and ScaleTop Property Let ZOrder property Value

To provide a repository for images used by other GetBytes Value Input box Font KeyPress, KeyUp and KeyDown Output mode x and y Property Set AutoRedraw property CurrentVal CStr None of the above None of the above None of the above None of the above

SetAttr Are actually not Can be different at times properties You do not have the MyVar has not been permission to access the declared The ExecProcedure The Exec method method A critical message icon variable. InputBox function returns a value, while the The form can be modified. QueryUnload cropping tool color box tricolor scheme 28 bar images and text An exclamation icon

intrinsic constant. built-in procedure. InputBox function can be MsgBox statement can created with the macro be created with the A new check box can be Data can be entered. added. Deactivate cutting tool color scheme color palette 18 pie slides Terminate scribble drawing tool color guide primary color scheme 36 linear slide sorter views

circular entity Microsoft organization chart the organization chart is expanded box tools used to mange organizational chart turned on once two native tool autolayouts zoom importing Microsoft excel .ppt(PowerPoint) nine .rtf(rich text format) not displayed during the slide show

radar data point clip art the chart is made available for editing general purpose tools accessed only by manager turned off twice four draw tool handlayouts reduce/enlarge exporting auto shapes .rtf(rich text format) only one

doughnut data auto shapes the chart window opens displaying a chart custom drawing tools used to create a manager box for an not available in the tool bar thrice five standard tool slide view preview copying clip art .doc(document) six

all the above stream track changes none of the above standard drawing tools used to store the other tools of the available in the tool bar any of the above eight all the above none of these none of the above moving drawing tools .html(hypertext format) twelve .doc(document) none of the above transition view show master notes slide sorter view none the above none of the above b or c none of the above

.wmf(windows metafile) .txt(plain text) displayed only during the displayed only in outline slide show view both a and b slide show master slide view show 7.5 inches,5 inches a or b transition png

DTS(digital track sound) 3D(3 dimension) build notes master outline view 15 inches,10 inches portrait animation gif transition slide master slide view 10 inches,7.5 inches landscape view show jpeg

hyperlink visual c++ macro while creating a .exe file virus checkers slide show slide pane internet explorer PowerPoint creates a sample presentation to user can insert objects like clip-arts, pictures in outline view, drag the slide icon to a new the slide that holds the formatted placeholders with notes pages view user can prepare the slide that holds the formatted placeholders slide layout data to be graphed resides in a datasheet the master slide office assistant 10

hypertext visual basic for application batch file during slide transition spell checkers custom show notes pane paint shop pro it is the quickest way to create a presentation user can insert only predrawn, pre-colored in slide sorter view, drag the slide to a new transition means applying special effects in outline view, user can see the miniatures of all transition means applying special effects

action button

all the above

Microsoft visual interdev all the above templates when the slide show is run header files both a and b properties pane paint shop pro contains sample presentations for a user can insert picture to the master slide which in notes pages view, drag the slide icon to a design templates is the template whose format user should select the slide view to add the text design template is the template whose format add-ins none of the above all the above none of the above outline pane power point 2000 provides suggested content and design user can insert picture to the title slide which gets I slide view, drag the slide icon to a new the slide that holds the formatted placeholders the slides can be reordered in the outline the slide that holds the formatted placeholders set up show user can add data labels and gridlines to the chart the format slide none of the above 22 four times text, hypertext, Power Point, video and sound. Line style, Line color, text font, and text alignment Fill color, Line color, and Line thickness The graph placeholder is deleted.

customize new slide by default, doughnut data is plotted in a chart chart is displayed based window the slide master spell checker 12 the header slide grammar checker 102 three CD-ROM, digital camera and sound. the Font and the text alignment

once twice text, graphics and email text, hypertext and address. Power Point. the Line style Fill color Excel is started so that you can create a chart. always taken from the first row of data in the Side-by-side column the Line color Line color A popup box prompts you for an existing Excel always taken from the first column of data in the Stacked column

Line thickness Microsoft Graph is started so that you can taken from the first column or row of data in entered by the user. Pie chart Line chart

Pull down the Insert menu and select Chart. It automatically displays in Slide view.

Click the Insert Chart button on the Standard Click the chart object, then click the View

Pull down the Insert menu and select the Pull down the Edit menu, then select Object.

Single click the chart. Double click the chart. Click outside the chart. A dialog box is displayed A dialog box is displayed The datasheet is saved allowing you to enter the allowing you to enter the as a separate file. The chart is doubled in The chart is selected. The chart is deleted. size. The chart is doubled in The chart is selected. The chart is deleted. size. a slide one bullet item at bullet items one letter at bullet items one word at a time. a time. a time. Subtle Enter and exit Enter the way objects appear on a slide. The advanced timeline shows the sequence in Clips Paint program Fly in Once data is entered it cannot be changed. OLTP. You can change the appearance of a whole [Enter+A] .vbg add load Drive1.Drive=Dir1.Path messagebox() Dir1.Path=File1.Path openrecordset Moderate Exciting Both enter and exit, and Fly in from top or bottom fly in from top or bottom Shift what objects do after they appear on a slide. The advanced timeline shows the duration of the Organization charts Draw program From top Once data is entered it can be changed. Alt the way objects exit a slide. The advanced timeline shows the sequence in Text Filtering program Dissolve in Data cannot be entered into Datasheet.

Pull down the Insert menu and select Chart, You cannot display the underlying datasheet Change to Slide Sorter view. The datasheet window is toggled from closed to The application that created the chart is Microsoft Graph will restart. a slide one bullet item at a time, build bullet items Subtle, Moderate, or Exciting Neither enter nor exit; neither fly in from top nor Ctrl Custom animation can be used to affect the way The advanced timeline shows neither the Clips, organization charts, and text Animation program Fly in, From top, and Dissolve in There is no such thing as a Datasheet. OLIP. You cannot change the color of the boxes in an [Ctrl+Z] .frx none of the above none of the above none of the above none of the above File1.pattern=Dir1.path count

OLAP. OLST. You can change both the You cannot change the appearance of a whole style of the connecting [Shift+Z] .vbp additem loadpicture Dir1.Path = Drive1.Drive message() [Alt+Z] .frm loaditem addpicture File1.Path = Dir1.Path msgbox()

Dir1.Path = Drive1.Drive File1.Path = Dir1.Path opendatabase recordcount

update append movenext Cancel parameter to a non-zero value Word 2000 click-n-type office clipboard

append update movelast Cancel parameter to 0 Office 2000 double click cut

addnew additem moveprevious UnloadMode parameter to a non-zero value Office 97 drag & drop select ctr+end and ctr+home

additem addnew movefirst UnloadMode parameter to a zero value Back Office none of the above none of the above none of the above

shift+end and shift+home shift+left and shift+right web layout, printlayout wizard office assistant Screen Tip tab stop up arrow keys only left template increase indent special effect drawing toolbar 1 page setup from the file border ctrl+a ctrl+a CTRL+SHIFT+F ctrl+shift+f

normal layout, web layout web layout, page layout none of the above click from start program, templates MSWord from the task none of the above inbox assistant Tool Tip marginal stop page up keys only center model decrease indent control tool box control box document assistant Icon Tip ruler none of the above Document Tip none of the above

home and end keys only up and down arrow decimal dialogs/alerts both A and B design wizard database rotation none of the above none of the above pictures forms

2 0 11 printer setup from the file menu print preview from the file none of the above shading Del Del CTRL+O ctrl+o style box ctrl+f ctrl+f CTRL+SHIFT+S ctrl+shift+s none of the above ctrl+m ctrl+m CTRL+SHIFT+P ctrl+shift+p

Excel True False Valid Signs HLOOKUP DDE Analysis translates program code of a high Only hardware and software To collect data Deleted from the disk Users operate the manual system and The new system is introduced alongside the Instructions and technical documentation For technical support Operating systems and system services Magnetic tape storage To maintain a backup copy of all the Data bus FDDI Data bus Peripherals that are connected to a binary form were 7 bits 4 bits More than 1000 mega bytes 32 registers

Access False True Transaction type VLOOKUP OLE Analysis is the loading of programs that perform Inputs, outputs, file design hardware, and To execute any programs Copied from the disk Users operate the computer system from a The new system is introduced and users Log files and temporary files To enable any printer to be connected to the Network systems and communication services CD-ROM To do a particular task. Auto bus BAD Auto bus Operating system routines that execute in ASCII code form 8 bits 8 bits 1000 kilobytes 32 I/O devices

Both

None of the above

Limit Check A or B

Reasonableness None of the above

ODBC All of the above This involves looking at a system and finding out None of above Maintenance, reliability, and upgradeability None of above To maintain security Saved to the disk Users operate the manual system Users continue operating the old system User Guide and technical documentation User guides cover how to run the system, enter Database systems and backup services None of the above Transferred from the disk None of above None of above None of above None of above None of the above

floppy disk Hard disk To help someone who is applying for employment None of the above Address bus TED Address bus Data structures that are part of the kernel of an decimal form represented 256 characters 16 bits 230 bytes 32 Mb of RAM Control Bus MAD Control Bus Shells, compilers and other useful system alphanumeric form represented 127 characters 32 bits 1024 bytes a 32-bit bus or 32-bit registers

used to indicate uppercase letters ROM bits per second memory capacity have fewer instructions than RISC machines ALU Power is switched off a parallel interface line printer is faster to access than RAM increased the storage capacity of a computer is a form of ATM card CRT displays having several programs in RAM at the same time having several softwares running at the same time ALU brochures multitasking multitasking NORMAL ctrl+m ctrl+v or ins ctrl+2 Text Box Header and Footer Chart

used to detect errors RAM baud memory access time use more RAM than RISC machines Registers Computer is improperly shut down a serial interface dot matrix printer is non-volatile increases the process speed has more storage capacity than an ATM LCD displays multitasking the ability to run 2 or more programs Registers magazines an operating system multiprogramming ONLINE LAYOUT ctrl+2 ctrl+c or ins ctrl+5 Frame Screen Tips WordArt

is the first bit in a byte DRAM bytes secondary storage capacity have medium clock speeds

is the last bit in a byte CROM Hertz secondary storage access time use variable size instructions

Variables Logic Bus Data is not saved before computer is shut down All of the above printer interface ink-jet printer stores more information than RAM provides backup power in the event of a power is an access card for a security system SSGA displays writing programs in multiple languages writing programs in multiple languages Variables CD-ROM to run more than one program at the same multiuser PAGELAYOUT ctrl+end ctrl+x or ins ctrl+1 AutoShape Page Layout Auto Shapes a modem interface laser printer. is used for cache memory none of the previous contains a microprocessor none of the previous none of the previous none of the previous Logic Bus e-mail none of the above none of the previous ONLINE DOCUMENT ctrl+home ctrl+v or Del none of the above Border none of the above File

Borders clear

Shading remove all

WordArt remove circle bullet dialog box AutoShapes new document mail merge shift+f8 first row enter table auto format option records style gallery Data Source vj++ alt+f8 browser micro soft outlook sgml arpanet field names in the header source must match any by default cell height and weight option applies to

Bullets clear all none dialog box files default document none of t he above tools+spelling menu last cell of the t able none of the above none of the above none of the above none of the above none of the above visual FoxPro alt+f5 none of the above hotmail vb script LAN the number of fields names in the header delete cells option allows to delete the entire row

picture bullets dialog box arrow bullet dialog box charts doc1 thesaurus shift+f7 first tab convert text to table row AutoCorrect Mail Merging basic shift+f8 web layout view email client html internet field name must be listed in the same order as the it is not possible to change the height of only WordArt document1 hyphenation thesaurus menu second end convert data to table rows & columns AutoFormat Macro visual basic shift+f7 online layout view outlook express xml intranet the field separators in a header source and the auto format option applies to the entire table

left decimal justified top A new section is created In order to type a header If a header is inserted in A section is a portion of a in order to change from the third page of the the second section then document in which true true true false false false

drag & drop true automatically corrects common typing, spelling password can not include spaces

click -n-type false prohibits the user from renaming an auto correct password protected document can be

Double Click

none of the above

automatically corrects the grammatically errors password are not case sensitive hanging a multiple documents files can be inserted in

with t he caps lock key accidentally turned on password can be upto 15 characters long top an .xls data can not be inserted at specified

left justified a .ppt file can not not be a document file can be inserted at specified inserted in the current true true true true Master Document Print Layout View Insert Mode press the return key layers and planes tab grammar checker send a public message to friends interested in Print all Enter closing database To analyse figures subscript false false false false Child Document Page Layout Type Over mode press the tab key lines and spaces enter/return spell checker

Hyperlink Document Outline Layout Remove press the escape key height and width backspace/ delete

none of the above none of the above none of the above just keep typing rows and columns shift outliner send a package to a friend Print preview Save sorting spreadsheet None of the above clipboard Making Calculations Font, Paragraph, Bullet and Numbering

thesaurus send private messages send pictures to a friend to a friend From ___ To ____ Copy tabbing graphing Creating and editing documents Page setup Retrieve spacing word processing Storing information clip art Storing information Cut, copy, paste and clear

annotation Creating and editing To analyse figures documents Spelling, grammar and Clear, replace and select autocorrect

Text at the bottom of every page Mouse, printer and processing system Browser Clear, replace and Toolbars 6 point 2 inches. You are not in Print Layout view. to store a file on the hard drive Data about a set of similar things Thesaurus Paste Copy, then paste To give the original author a chance to A line appears through text that is to be deleted. Through the Edit menu by choosing Track The Versions command will allow you to save All versions are opened automatically.

Numbers which appear on every page Keyboard, Mouse, monitor and printer clip-art file Spelling, grammar and autocorrect 10 point 2 inches. You have not inserted a column section break.. to store a file on a diskette Mainly text Spell Checker Replace Cut, then paste To give the original author a chance to reject A red underline appears beneath text that is to be Through the Tools menu by choosing Track The Versions command will allow you to save The latest version is opened automatically.

Text which appear at the Designated area on the top of every page document Monitor, keyboard and mouse None of the above microphone Cut, copy, paste and clear 15 point 3 inches. You have not specified continuous section to move a section of text from the original location A set of different graphics Grammar Checker Select all Delete, then paste To complicate the revision process and to A vertical line outside the left margin signifies a Through tools on the Reviewing toolbar The Versions command will allow you to save The first and second versions are opened digital scanner None of the above 25 point impossible to determine. Word cannot display columns during editing; to leave an original section of text in place None of the above Find and Replace AutoCorrect Insert, then paste To allow multiple people to work on one document Comments are enclosed in a text box at the right Both through the Tools menu and the Reviewing The Versions command will allow you to save The previous version is opened automatically.

Dictionary Grammar check Spell check Thesaurus Word displays a list of The most recent version Word will show the name Word is not able to tell the dates and times each will appear at the bottom of the person who saved the most recent version Fields Check boxes Comments cannot be edited. Text at the bottom of every page Press tab. text. header/footer. Tools Toggle button Comments cannot be deleted. Numbers which appear on every page Press Return. graphics. bibliography. Forms Text fields Comments can be edited or deleted by right Text which appear at the top of every page Copy and paste. forms. find/search. Insert A drop-down list Comments can be edited or deleted by left clicking None of the above Insert page break. numbers. macro.

Copy button Fault Finding Insert a section of white text on a black background. setting it in larger type or font size. The reverse technique means to add dark text The width of each column 6 One Press Ctrl+Enter to create a page break. A serif font at 10 points 2 inches Field Horizontal Duplicate Value Cross Tabulate RAND() TRUE TRUE Unusual exception testing True True Limit related to virtual reality same as multitasking

Paste button Bug Squashing Tools a section of text where the first letter of each typing it all in capital letters. A pull quote is a quotation taken from The height of each column 10 Two Press Ctrl+Shift+Enter to create a column break. A sans serif font at 10 points 3 inches Record Vertical Combined Value Filter VLOOKUP() FALSE FALSE Strange comparison of data False False Sequence a form of ROM same as multiprogramming

Format Painter button Error Injecting Format the guidelines used to establish where different underlining the text of the pull quote. A dropped cap is a word that starts with a The number of columns 12 Three Press Enter to create a section break. A serif font at 20 points 4 inches Both A or B Gaps Merge HLOOKUP()

This action is not possible. Debugging Edit an enlarged capital letter at the beginning of a changing the color. A grid is a set of horizontal and vertical The tab spacing within each column 72 Four Press Shift+Enter to force a line break. A sans serif font at 45 points It depends on the left and right margins, and how None of the above None of the Above All of the above None of the above None of the above

A or B duplicates testing

None of the above All of the above

Range a form of VRAM multiuser

Both B & C none of the previous involves using more than one processor at the

save the file to calculate numbers Uses Cobol 106 sec a keypad data to be transferred to memory data to be transferred to or from memory an instruction that has been decoded a cursor Formula Assembler

set up a password to read from or write information to a floppy uses Java 103 sec a mouse data that has been transferred from memory data to be transferred to the stack an instruction that has been fetched from a scroll bar Algorithm Compiler

make a backup copy to print sheets of paper uses C++ 1012 sec a frog the address of a memory location the address of a memory location an instruction that has been executed a light pen Program Artificial Intelligence Range checking use the backup facility System keep a record of computer failures Multiprogramming Floppy Disk Telephone modem Telephone modem Indexed CPU Files and Tracks File, record, field Systems logs MIDI interface Sound

use a virus protection program to display information or pictures on a screen none of the previous. 109 sec a message pad an instruction that has been transferred from an instruction that has been transferred from the address of the next instruction to be a magic marker Data Parity Checker Validation use find and replace Modem backup to a secure medium Multiplexing Magnetic Disk Shareware Shareware Random Primary Storage Schema and subschema Element, field, file Parity check Serial interface Video

Memory protection Parity Checking use the directory search tools search each file in turn Network save copies of the file with the same name on Multiprocessing ROM Firmware Firmware Sequential Operating System Tracks and Sectors Character, field, database Valid character check Sound card. Text Program use different filenames on the system Time sharing RAM Word Processor Word Processor Hashed ALU Blocks and Sectors Database, character, record Maintenance diagnostic program CD-ROM Pictures

Laser Dot matrix viewing an creating the plans for a encyclopaedia CD-ROM. building design. replaced regularly Database get into the system quickly 512 loss of confidentiality TCP/IP access to the internet is quicker a file name universal port serial orphan files can be left on the system data. Graphical representation of logic Purchase, sales, receipt, payments etc. never updated Document processor make efficient use of time 1024 duplication of data HTML files can be shared a subdirectory up-line provider service the program executable may not allow it to be

Ink-jet presenting an order for stock to a warehouse. updated regularly Graphics package retain confidentiality of files 4096 virus infection IPX/SPX printer can do 1000s of pages a day the root directory uninterruptable power supply the system requires a network administrator to

Drum recording current stock in a supermarket and updated once a year Spreadsheet simplify file structures 8192 loss of data NetBEUI the operating system is easy to use the hard drive uniform page source the system always requires a re-boot and text. None of the above None of the bove allow encryption None of the above All of the above None of the above local identify the file type All of the above are parts of IS controls. extensible hashing D: (b), (c), (d) general controls Control

documents. information. Rules writte in procedural Logical Steps in any language language To fill the log register It is mandatory in tally prevent unauthorised access IT understands the business processing. Software that generates innovated designs and enterprise identify the file corrective controls. dynamic hashing C: (a), (b), (c) detective controls Settings

assist in maintenance speed up access senior executive support IT management lacks for IT. leadership. input. output. The use of computers to Using computers to do design state-of-the-art, architecture. Application Service specialist or functional Provider ensure the filename is name the file not lost preventive controls. external hashing A: (a) , (b), (d) corrective controls Component detective controls. static hashing B: (a) to (d) preventive controls Interface

(a), (c), (d) Press the reset button. Create the files again. (a), (c), (d) detective controls (a), (c), (d) problem logging unit testing (b), (c), (d) benchmark testing Multiplexer. (a) to (d) Replacement personal computers for user architectural design Client-server Star

(b), (c), (d) Turn the computer off at the power point. Ask the person next to you. (a), (b), (c) organisational controls (a), (b), (c) call lights data testing (a), (b), (d) specifications matching Peripheral processors. (b), (c), (d) Identification of critical applications. interface design Client Bus

(a) to (d) Select the Shut Down option from a menu. Use the Find or Search feature. (a) to (d) preventive controls (a) to (d) program change requests thread testing (a), (b), (c) parallel operations Concentrator. (a), (b), (c) Physical security of warehouse facilities. procedural design Computer network Mesh

(a), (b), (c) Pull the power cord from the back of the Put your hand up and ask the teacher (b), (c), (d) corrective controls (b), (c), (d) resolution procedures loop testing (a) to (d) system walkthroughs Job control language. (a), (c), (d) Cross-training of operating personnel. data design Hub Ring

Star Bus To maintain a backup To do a particular job copy of are written all the such as editing, storing Direct Systems analysis and applications A sequential file on a disk Tapes can only be read by the machine on which Data path part Distributed systems Can send data to a computer and receive Mixer Sequential Data communications hardware and software. A sequential file on a tape Parity errors will result Control Unit Local Area network Use the computer to which they are Modem

Ring All of the above To help someone who is To Store data in an applying for employment organised manner Binary Operating systems and compilers. A direct access file on a disk Information formats commonly vary between Indexed Computer operations. A direct access file on a tape Data record can never be blocked together

Address calculation part Input output channel Wide area network Generally require a keyboard for data entry Multiplexor Protocol Are required with a microprocessor which Time sharing computer

Allows computer signals Aids in back-up to be send over a procedures Planetary network Office Automation A dumb workstation Ring Network Executor systems

Packs data in a disk file Loop Network Electronic mailing

Speeds up online printing Star Network Instant post-office A mainframe PC

An intelligent workstation A personal computer Parity checks

Time of day control locks Encryption algorithms Type of cable A compiler does a conversion line by line as Feasibility study, system design, and testing Terminal Standard A compiler converts the whole of a higher level Implementation and documentation

All of them Device interconnect Communication protocol standard A compiler is a general purpose language None of the above Lexical analysis, CONVERSION, and None of the above ASCII An interpreter is a general purpose Frequency division multiplexor Low-level languages It is less prone to attenuation Accounting systems, commercial sector Relieve the main CPU of repetitive communication Testing EBCDIC None of the above Time Division Multiplexor None of the above Uses only one path None of the above Reduce competition between the input/output None of the above

CRC Baudot An interpreter does the An interpreter is a conversion line by line as representation of the Modem High-level languages It is faster than parallel communication Financial sector and engineering Communicate with the console operator Demodulator Middle-level languages It is less error prone Graphic design and education Manage the paging function in a virtual

Specification and design System Analysis

Fiber Optics Coaxial Cable Common carrier Telephone Lines The design of the screen System Analysis defines System Analysis involves the user will see and use the format and type of creating a formal model None of the above A cache The different types of network to be used Star 10101010 Parity 15 Port 327 An interface A buffer An online protocol Testing to check for Hardware, Software and errors before the system size of program. None of the above Packet 1100101 Retransmission 4 Modem 141 Ring 1010101 Cyclic Redundancy 64 Multiplexor 97 Bus None of the above Hash Count None of the above Acoustic coupler None of the above

Data warehouse memory capacity 30 binary form 4C5 4 bits

Data Mining tools memory access time 255 ASCII code form 1B7 8 bits

Data management systems secondary storage capacity 256 decimal form 5C4 16 bits Bit Code Design 210 bits 1110 decimal form Numeric Keypad is the first bit in a byte It has ears bytes Joystick MHz Reading bar codes barcode scanning CD-ROM drive provides backup power in the event of a power

All of them secondary storage access time None of the above alphanumeric form None of the above 32 bits None of the above 210 bytes None of the above alphanumeric form None of the above is the last bit in a byte None of the above Hertz None of the above VLSI None of the above voice recognition None of the above none of the previous

Basic Coding Description Binary Coded Decimal 1024 bits 10000 binary form Mouse used to indicate uppercase letters Because it squeaks when moved bits per second Touch screen BPS Printing letters OCR Touch screen increased the storage capacity of a computer Refillable ink 100K hardware Mouse Touch screen Printing letters 1000 bytes 1112 ASCII code form Keyboard used to detect errors Its moves like a mouse baud Light pen MIPS Tracing diagrams MICR Hard disk increases the process speed Pencil lead 1.44 Mb software Keyboard Light pen Tracing Diagrams

Light sensitive elements None of the above 5 Mb output Numeric Keypad Joystick Reading Bar Codes 1 Gb input Printer Scanner Digital Signatures

Touch screen Mouse Credit card Writing on a hard board Coloured spots Printer Mouse CRT displays screen layout Mouse hardware Credit card having several programs in RAM at the same time having several programs in RAM at the same time multitasking First - generation computers. multitasking Vishwajeet is caused by wear Bar code Reader Technology a fast interpreter Drum Printer encrypting it Very important reader user sequence Electrically charged ink mainframe technology

Hard disk Bar code reader Mouse Printed output Pixels Storage device Bar code reader LCD displays mouse button layout Bar code reader language interpreter Speakers multitasking The ability to run 2 or more programs an operating system Second - generation computers. multiprogramming Deep Blue caused by overuse Optical Mark Reader Technology slower than an interpreter Dot - Matrix Printer decrypting it Vital information resource under siege Thermal Paper LAN technology

Keyboard Optical mark reader Speakers Storing information on the hard disk Pixies Pointing device Optical mark reader SSGA displays keyboard layout Optical mark reader software interface Smart card writing programs in multiple languages writing programs in multiple languages To run more than one program at the same Third - generation computers. Multi-user Param is due to bad disk blocks Magnetic Ink Character Recognition Technology converts a program to machine code Desk - jet Printer

CD ROM Drive Keyboard Printer Back-up on a Cartridge Pickers CD-ROM None of the above none of the previous word processing software None of the above an operating system None of the above none of the previous none of the previous none of the above Fifth - generation computers. none of the previous Arjun none of the previous Image Scanning Technology none of the previous Thermal Printer

compressing it transmitting it Virtual information reader & user system None of above An inked ribbon and print An ink pen head WAN technology Unix operating system

10-6 sec Limit checks application project multiprocessing mainframes control unit band printer data management integrated software my computer field assembly language terminator symbol PC-at multiprocessing "dumb terminals" wan host host PC server processing four

10-3 sec Control figures system model multithreading super computers arithmetic and logic unit drum printer word processing

10-12 sec External file labels operating system pilot project multiplexing micro computers central processing unit non impact printer electronic spreadsheet

10-9 sec Cross footing tests communication process multitasking none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above input/output symbol IBM-PC none of the above dummy servers LAN front end front end centralized data processing many relational database system none of the above disk mirroring

communication software idea processor recycle bin file machine language processed symbol hp vectra system multithreading dumb servers distributed computing system server server LAN host processing Microsoft exchange record high level language connector symbol fazitsu vp200 series multiplexing dummy terminals windows NT back end back end distributed computing dumb processing two network database system multiplexing disk defragmentation

one hierarchical database file management system system multiprocessing repairing multithreading redo logging

Code/De-code fixes multiprocessing Linear area networks task Integrated system dynamic networks. Ethernet visual basic

Modulation/Demodulatio n Module/De-module locks multithreading Local area networks process Integrated Symbolic Digital networks. Internet power builder constraints multiplexing Local array of networks. thread Integrated Services Digital network. ARPANET SQL * plus

None of the above traps none of the above None of the above client-server None of the above. None of the above. all of the above

MAN WAN GAN None of the above. Transfer control Transfer communication Transmission control protocol/Internet protocol protocol/Internet protocol protocol/Internet protocol None of the above. Cells System modulation transfer protocol Transfer Protocol Bits Software Mail transmission protocol Packets Simple Mail transfer protocol Hyper text Area transfer mode Receiver package LAN and MAN None of the above. None of the above. None of the above. None of the above. None of the above. system LAN WAN and MAN Intranet None of the above. Web based Transaction Repeaters program number and alpha input, output, performance ratios mainframes write

Transmission protocol Asynchronous transfer Aggregate transfer mode mode File server platform MAN and WAN ISDN Internal Services Digital Network Web based Training Bridges procedure alpha numeric space occupied, price, no. of users allowed mini computers input Printer server configuration LAN and WAN

ATM Internet Internal Services Design Integrated Services Network Digital Network Web based Technology Routers batch alpha beta cost, performance their ratio microprocessors output Web based Transport Protocol command numerous alpha size, performance, cost PCs feed

multiprocessing interpreter input impact printers operating system, bootstrap, kernel, shell operating system batch processor compiler

multithreading compiler processor drum printers control program, interpreter, assembler, application software protocols compiler interpreter

multiplexing converter ram non-impact desktop printers monitor, program, keyboard, bus windows 95 software's assembler assembler

multitasking process output thermal printers CPU, memory, input, output interpreter procedures coder processor

ans A A A B C B B A A A D A D A B D C A B B A C A C B

B B B B D A B A B B B B C A C A A C A C A A B B A C

C B A D C A A B B C B A C A C A B A A B A C A A C A

C C C B B B C C B D A B C A C A A A C C B A A A A B

A B C A B C B B A B B A A B B B A C C B A A A B A A

A A A A A A B A D B D A A A A D A D A A A D B B A A

A A A B D B B D C A A B B A A B A B B A B B D A A A

A A A B B B A A B A C D B D A A A B A A B A A A D A

C B A A A A A A D A A D A A A B A D A D B B D D D A

D D D A B D D C C A C B D A B C C A D B C C D B C A

A B A A C A D D B D A B A C B C A C A A B B A A C B

C B B A A D A D D B B B B C A A D B B B A C C B A C

C B B A A A A A D B A B D D A A C B A C A B A A B B

B B A B C A A B B B A C B A B D B B B A C D A A A B

B D B B B A A A A D A C A B A B A C B C B B D B A A

A B B A A C B A C A A A C B C D D B B D C B C C D C

B A C C C C C C D A C A C C B A B B A B B C D D D C

C C B B C C A D D A B C B D D A D B C D D A B C A B

D D A C D C C D B D A B A B D C A D B C A C D C C A

D C A A A B A C B D A A A A C D D A D C D B D B D A

D C B C B C D C A A D D A A C B D A A B B C A A B B

A A B B B D A C A C C C B C C C B A C B D C C D C C

D D C C C B C B A B B B B A A B B B B A B A A B B C

B B A B B B B D D A D A B B A C C B B D B B A B C C

C B C A C C C B B C C B C D B A B B A C B B C B A A

D B C C B B B B B C B C B C B B B C B B A C B C D A

D A C B A A A C A B C D A A D A B A A C A B B C D D

B B C A C B D D A B C D C B D A A A A C A B A A B B

C A D A D C B B A B B C A A D A D B A C A D C D D A

A C A B C D D C B A C B C A B C B C B B C D B D A D

B C D C B B D C B A B C D D C C D A D B B C D A C B

A C A B B A B B A B C A B A D A B B C A B C C B A C

B D B B C A C D B B B B A D A A B C B B D A B C B C

A D B B C C B A C D B C A A D A D D D D C D A D D C

A C D A C B D C B D B D D B C D D D D D B A B D B B

B B B C C B B B A C D B C A C C C A B A A B B A D B

C A A C C B C C B A B D D D D D A A C B D C D B C D

D C D B D D A D C A D C B C B B A D A A D D A B A D

D A B D C D B A C C B A B C D B C B C C A C A C A C

A B A C C C B C B B B B B A B C B A D A A C B A A D

D B A C A B D D D B C D B D B B B B B B D D D C C B

D B C D A D D D C B D C D A D B B B D B B B B C C C

C B C A A A A B A A A A B D D B C A A A A A A D A C

B A B D B C C B D A B A C C A B B A B D D A A A A D

B A D B D A D B D B C C B A D B D C C A B A B A A A

D D A C B A A A A A B A B B A A A A A B C A D A A A

B A B B A B A A B A A B A D D B C D B C B C B C B C

C B D C B B A D B B B A C D D A B A A C B C C D C A

C D C A A D D D B C D D A A C A B A A C D A A B D D

B B D D B C A D A B B B A B D D B C A C B A C C A D

B A C D C C D A B D C A A A A C B D A B D D A C C B

C C C C C C C A D B D A B A C A D B B C C C A B D C

A D C B C D B D A A C C D C C B C C B B B C A A C B

B B B A A B D A A A A B D D C B B B A C C B A B C B

A B A B B A

B C B C A A B C A A C C B C A C B D B

D C D D D A B C B B B C B B B D A D D C A B A D B D

B B B B C C B D B C C C C B B A B A C A B D A C D A

D D D C D B C B C

q_id

q_desc

op1 clipart & auto shapes circles square tool bars clip gallery & word art wave file

PP1 In Powerpoint2000 ,the built-in professional design elements are Selection handles are the 8 small ___________ that appear around the PP2 object, when an object is selected The _______ is an invisible matrix of vertical and horizontal lines that PP3 covers the entire slide workspace _______ are drop-down menus that appear when the right mouse PP4 button is clicked on the screen element ________ and ______ have the ability to add a lot of visual impact into PP5 the PowerPoint presentation PP6 _______ is a motion picture or any animation file

PP7 The user can use ______ to remove the undesirable part of the image clipping tool PP8 The power presentation has a _____ for a set of compatible colors The set three colors used for graphs and for secondary slide items is PP9 called as PP1 0 There are ______ types of charts available in PowerPoint PP1 _______ charts are useful while showing variations over a period of 1 time PP1 2 _______ are the individual pages of a presentation PP1 A PIE Chart is a ____ diagram that depicts the relationship between a 3 whole and its parts PP1 4 Each individual piece of data in a series is called a/an PP1 5 PowerPoint launches an OLE-compatible application called PP1 When the user double-clicks on an organization chart object in 6 PowerPoint PP1 The _____ are used for selecting, editing and viewing objects in the 7 chart PP1 8 Manager box tool in organizational chart window is PP1 9 The custom drawing tools are _______ by default PP2 0 Click on the box tool ______ to draw three boxes PP2 There are ____ default fields available in all boxes of the organizational 1 chart PP2 The _____ tool is used in the same way as we use a pen to draw a 2 table PP2 3 A/An _______ consists of smaller printed version of the slides PP2 4 The size of the object can be changed using the ______ tool PP2 _______ is the process through which the slides in the current 5 presentation are included in another presentation or application color palette ascent 10 column images circular entity Microsoft organization chart the organization chart is expanded box tools used to mange organizational chart turned on once two native tool autolayouts zoom importing

PP2 6 PP2 7 PP2 8 PP2 9 PP3 0 PP3 1 PP3 2 PP3 3 PP3 4 PP3 5 PP3 6 PP3 7 PP3 8 PP3 9 PP4 0 PP4 1 PP4 2 PP4 3 PP4 4 PP4 5 PP4 6 PP4 7 PP4 8 PP4 9 PP5 0 PP5 1

________ can be used to create charts as well as worksheets PowerPoint can import text files that have been saved in ______ format PowerPoint outlines can have _____ outline levels When a file is saved with _____ extension, the graphics and text are also saved along with the slide The hidden slide is ____ effect is used to introduce a slide during a slide show A _____ is a special effect that determines how the objects appear on the slide The notes page is formatted based on the Pick the odd man out of the following When a new presentation is opened ,powerpoint creates slides that have a width of _____ and a height of ______ with the landscape The default orientation for notes ,handouts and outlines is ____ orientation Build effect is also called as ______ Graphics for web pages are automatically stored in ____ format A _______ is used to jump to any slide in the presentation The ______ language has been incorporated into PowerPoint In PowerPoint _____ is a series of commands that are executed in sequence The macro will be activated Developers can easily add ____ to PowerPoint 2000 by using the programming interface ______ determines the order in which order in which the slides will be displayed during the show _______ is used to organize and develop the contents of a presentation If we save the presentation file as a metafile, it can be opened using With reference to autocontent wizard for creating a new presentation, which of the following statements are not true Which of the following statement is not TRUE With reference to changing the order of slides, which of the following statement is not true Which of the following definitions are not true Which of the following statements are not true

Microsoft excel .ppt(PowerPoint) nine .rtf(rich text format) not displayed during the slide show DTS(digital track sound) build notes master outline view 15 inches,10 inches portrait animation gif hyperlink visual c++ macro while creating a .exe file virus checkers slide show slide pane internet explorer PowerPoint creates a sample presentation to user can insert objects like clip-arts, pictures in outline view, drag the slide icon to a new the slide that holds the formatted placeholders with notes pages view user can prepare

PP5 2 PP5 3 PP5 4 PP5 5 PP5 6 PP5 7 PP5 8 PP5 9 PP6 0 PP6 1 PP6 2 PP6 3 PP6 4 PP6 5 PP6 6 PP6 7 PP6 8 PP6 9 PP7 0 PP7 1 PP7 2 PP7 3 PP7 4 PP7 5 PP7 6 PP7 7

Which of the following definitions are not true The options available in the common task toolbar does not include

the slide that holds the formatted placeholders slide layout data to be graphed resides in a datasheet

With reference to chart, which of the following statements are not true The format of the text entered in a title, subtitle, or bulleted-list object is determined by the format settings in a special slide called -------the master slide PowerPoint provides a _________ that searches the entire presentation i.e., all the text objects in all the slides, outlines, notes and office assistant PowerPoint's drawing toolbar contains _______ drawing tools Click _______ on the rectangle drawing tools enables us to draw multiple rectangles An example of the components of a multimedia presentation could include Which of the following formatting elements can be applied to a PowerPoint diagram using the AutoFormat tool? Which of the following formatting elements can be applied to a PowerPoint diagram using the Format AutoShape command? What happens when you double click a blank graph placeholder in a PowerPoint presentation? The legend in a Microsoft Graph chart is: Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best chart type if you want to emphasize Which of the following actions will enable you to insert a graph into a PowerPoint presentation? If you are editing a slide containing a Microsoft Graph, how do you display the underlying datasheet? How do you deselect a chart that has been placed onto a PowerPoint slide after you have finished creating the chart? What happens when you click the Datasheet button on the Microsoft Graph toolbar? What happens if you single click a chart that is not currently active? What happens if you double click a chart that is not currently active? Using custom animation effects, you can build: Which of the following animation effects can be added to a slide? Which of the following animations effects can be added to a slide? Which keyboard key is used to select more than one picture on a slide? Custom animation can be used to affect ONLY: Which of the following best describes the information that appears on the advanced timeline? Which of the following objects can contain custom animation effects? 10

once text, graphics and email address. the Line style Fill color Excel is started so that you can create a chart. always taken from the first row of data in the Side-by-side column Pull down the Insert menu and select Chart. It automatically displays in Slide view. Single click the chart. A dialog box is displayed allowing you The chart is selected. The chart is selected. a slide one bullet item at a time. Subtle Enter and exit Enter the way objects appear on a slide. The advanced timeline shows the sequence in Clips

PP7 8 PP7 9 PP8 0 PP8 1 PP8 2 PP8 3

What type of program allows an object within an image to be edited without affecting other objects? Which of the following animation effects can be added to a slide? Which of the following is TRUE regarding the Datasheet? Graphical software tools that provide complex analysis of stored data are: Which of the following statements is TRUE regarding PowerPoint diagrams? Which keyboard key combination is used to undo the previous command(s)?

Paint program Fly in Once data is entered it cannot be changed. OLTP. You can change the appearance of a whole [Enter+A]

op2 autolayouts and presentation templates points image short cut menus slide show & view show media clip cropping tool color box tricolor scheme 28 bar images and text radar data point

op3 slide view & outline view squares grid auto shapes fonts & images .video file cutting tool color scheme color palette 18 pie slides doughnut data

op4 none of the above icons guide all the above none the above all the above scribble drawing tool color guide primary color scheme 36 linear slide sorter views all the above stream track changes none of the above

clip art auto shapes the chart is made available for the chart window opens editing displaying a chart template general purpose tools accessed only by manager turned off twice four draw tool handlayouts reduce/enlarge exporting

standard drawing tools custom drawing tools used to create a manager box for used to store the other tools of the organizational chart an existing box not available in the tool bar thrice five standard tool slide view preview copying available in the tool bar any of the above eight all the above none of these none of the above moving

auto shapes .rtf(rich text format) only one

clip art .doc(document) six

drawing tools .html(hypertext format) twelve .doc(document) none of the above transition view show master notes slide sorter view none the above none of the above b or c none of the above all the above all the above add-ins none of the above all the above none of the above outline pane power point 2000 provides suggested content and design user can insert picture to the title slide which gets reflected in all I slide view, drag the slide icon to a new location the slide that holds the formatted placeholders for the the slides can be reordered in the outline view

.txt(plain text) .wmf(windows metafile) displayed only during the slide show displayed only in outline view 3D(3 dimension) transition slide master slide view 10 inches,7.5 inches landscape view show jpeg hypertext both a and b slide show master slide view show 7.5 inches,5 inches a or b transition png action button

visual basic for application Microsoft visual interdev batch file during slide transition spell checkers custom show notes pane paint shop pro it is the quickest way to create a presentation user can insert only predrawn, pre-colored graphic in slide sorter view, drag the slide to a new location transition means applying special effects to the in outline view, user can see the miniatures of all slides in a templates when the slide show is run header files both a and b properties pane paint shop pro contains sample presentations for a variety of topics user can insert picture to the master slide which gets reflected in in notes pages view, drag the slide icon to a new location design templates is the template whose format and color scheme user should select the slide view to add the text to the slide

transition means applying special effects to the customize by default, doughnut chart is displayed based on the the slide master spell checker 12 twice text, hypertext and Power Point. the Line color Line color A popup box prompts you for an existing Excel chart to always taken from the first column of data in the Stacked column Click the Insert Chart button on the Standard toolbar. Click the chart object, then click the View Datasheet Double click the chart. A dialog box is displayed allowing you to enter the The chart is deleted. The chart is deleted. bullet items one letter at a time. Moderate Fly in from top or bottom Shift what objects do after they appear on a slide. The advanced timeline shows the duration of the effect Organization charts

design template is the template whose format and color scheme new slide data is plotted in a chart window the header slide grammar checker 102 three CD-ROM, digital camera and sound. the Font and the text alignment

the slide that holds the formatted placeholders for the title and set up show user can add data labels and gridlines to the chart the format slide none of the above 22 four times text, hypertext, Power Point, video and sound. Line style, Line color, text font, and text alignment Fill color, Line color, and Line thickness

Line thickness Microsoft Graph is started so The graph placeholder is deleted. that you can create a graph. taken from the first column or row of data in the datasheet, depending entered by the user. Pie chart Pull down the Insert menu and select the appropriate Object. Pull down the Edit menu, then select Object. Click outside the chart. The datasheet is saved as a separate file. The chart is doubled in size. The chart is doubled in size. bullet items one word at a time. Exciting Both enter and exit, and fly in from top or bottom Alt the way objects exit a slide. The advanced timeline shows the sequence in which objects Text Line chart Pull down the Insert menu and select Chart, click the Insert You cannot display the underlying datasheet once the slide is Change to Slide Sorter view. The datasheet window is toggled from closed to open The application that created the chart is started. Microsoft Graph will restart. a slide one bullet item at a time, build bullet items a letter Subtle, Moderate, or Exciting Neither enter nor exit; neither fly in from top nor bottom Ctrl Custom animation can be used to affect the way objects The advanced timeline shows neither the sequence in which Clips, organization charts, and text

Draw program From top Once data is entered it can be changed. OLAP. You can change both the appearance of a whole [Shift+Z]

Filtering program Dissolve in Data cannot be entered into Datasheet.

Animation program Fly in, From top, and Dissolve in There is no such thing as a Datasheet.

OLST. OLIP. You cannot change the style of the You cannot change the color of connecting lines in an Organization the boxes in an Organization [Alt+Z] [Ctrl+Z]

ans B C C B A B A C A C A C A B A C C C B C B B B B B

A B C B A D A A C B A A D D B A C A B D D D B C D B

D B B B B B B D D D C C B D B C D A D D D C B D C D

A D B B B D

q_id IN90 IN91 IN92 IN93 IN94 IN95 IN96

q_desc The two major browsers used to surf the Internet are ________,_______ Special characters allow browsers to display _________________ The keyword for providing links within or across documents is____________ Stringing pages together using hypertext technology helps view pages _______________ The initial web pages present in a web site is the ________ page. The image format supported by most browsers is________________. The components of a URL are ___________ The mail we send has a mailing address and most of them correspond to_____,_____ and Which of the following is not supported by internet explorer _______________ CGI stands for ____________ Host name indicates the domain name of the web ________ The internet is also called as _______________ The internet is similar to _________________ The net drivers______ from one place to another The World Wide Web was devised by _________ The useful URL schemes are_____ and______ The other ways of getting connected to the net are_____ BBS stands for______ USENET is a BBS on ____ scale WINSOCKS is expanded as______ IETF Level 2 HTML DTD supports graphical browsers like _______ The space used by Netscape to store the retrieved page is called______ The URL for encyclopedia Britannica is_________ _______ maps IP addresses with the domain names of the sites Internet can be defined as _______ The most important service of the ______ is to manage traffic control _________is a program that displays information about a host connected to the net _______ is a program or a tool that helps in locating a file anywhere on the net URL stands for ____________ IN an URL the word before the color refers to _______ A ______ always begins with a slash Prodigy is run by IBM and ______ The World Wide Web is referred to shortly as the _______ Gopher and WAIS enables the user to ______ ______ is the program used to run CompuServe's regular services Navigating through the menu of gopher is called moving around _______

IN97 IN98 IN99 IN100 IN101 IN102 IN103 IN1 IN2 IN3 IN4 IN5 IN6 IN7 IN8 IN9 IN10 IN11 IN12 IN13 IN14 IN15 IN16 IN17 IN18 IN19 IN20 IN21 IN22

IN23 IN24 IN25 IN26 IN27 IN28 IN29 IN30 IN31 IN32 IN33 IN34 IN35 IN36 IN37 IN38 IN39 IN40 IN41 IN42 IN43 IN44 IN45 IN46 IN47 IN48 IN49 IN50 IN51

The directories that come with built-in engines are yahoo,lycos and ______ To use the finger command,SLIP users must run a programme called______ The web maps are called _______ Directories consists of _______ levels The _____ level gives the broadcast overview of the net The huge list of keywords from important items is called ______ The two types of search in veronica are _____ and ______ _______ searches by keywords Mosaic displays links in color whereas _____ does not display links in color ______ supports one button publish SPY MOSAIC is distributed by_______ ______ is a program that helps us to log on to other networks HTTP is the acronym for __________ ______is used to transfer and copy files over the internet _____ is a program that helps us to log on to other networks TCP/IP stands for ________________ Archie servers can be accessed in_______ different ways in internet _______is the computer on the internet that translates between the internet domain names and the internet numeric address TIA stands for_____ in internet Service indicates the name of the ________ used to access data, present on the other end of the link. HTTP stands for______ ________ is used to link pages in the world wide web FAQ stands for ______ The internet adapter is a programme that makes our connection act like a _____or a ____ account The step involved in Communicating between the web clients and servers is ______________ WSIRC stands for______ Two of the important browsers are_____ and_____ Lynx is a _______ programme that works with terminals The huge list of keywords from important items is called an_____

IN52 IN53 IN54 IN55 IN56 IN57

VERONICA is an acronym for _______________ The first freenet is created at the_____ and is called______ ________ are defined as ways of communication amongst networks ______and_____ are web searching features WINWAIS has two source lists namely____ and______ ________ is also called as WAIS manager

IN58 IN59 IN60 IN61 IN62 IN63 IN64 IN65 IN66 IN67 IN68 IN69 IN70 IN71 IN72 IN73 IN74 IN75 IN76 IN77 IN78 IN79 IN80 IN81 IN82 IN83 IN84 IN85 IN86 IN87 IN88 IN89 IN104

HTML stands for_____ The system of interlinked documents is known as_______ The small programmes that create animation,multimedia,real-time games and multi user games are called______ The information displayed on the web page includes______,_____ and_____ The web pages that represent online home of their author are called______ GNN stands for______ _____ is the most popular internet service The online service offered by navigator gold 2.0 are _______ and_____ _______ is a program or a tool that helps us find a file anywhere on the net The databases to enable keyword search using Lycos are a2z,_______ ______ is a large worldwide bulletin board service network BABEL consists a glossary of _____ Dictionaries,encyclopaedias,government and other references are found in ______ Yahoo,lycos,excite and webcrawlers are _____ GIF is the acronym for ____________ JPEG is the acronym for ___________ The Web aids users to explore the ________ The three most popular mailer are_____,_____ and______ The World Wide Web consists of _________ In Microsoft Internet Explorer, the color of the text can be specified using _________ attribute of the font tag. The interface that provides effective communication between the web browsers and servers is _________ CGI is the _________ between web browsers and servers CGI programs are invoked based on the information provided by the _________ A CGI program is usually called after a request made by the _________ URL stands for ________ A hyperlink can be on ___________ HTML was derived from _________ SGML is a _________ PINE stands for _____________ The application that confirms whether a document is compliant to its DTD is _________ Web is a collection of ___________ IETF stands for ________ The net provides interesting services like______,______ and______

IN105 IN106

The windows internet software available are______,_______,________ and______ ________ is the ancestors of the internet DARPA stands for _______________________________________________ The uuencode files start with a _______ DARPA is broken into ________ and _______ NSFNET is the united states provides service to _____ and_____ HTML stands for ______________________________________ The first international IP network connections were established in 1973 with _____ and_____ A_____ is a set of computers interconnected by transmission paths to exchange information in internet A computer that provides a service usable by other computers is called______ A_______ is the representation of physical connectivity of the computers in internet DTE stands for ____________________ The basic function of the ______ is transmitting the bits over a channel The point to point channel network is also called as _____ and_____ Accessing files using FTP servers is called_____ The three most commonly used networks are______,______ and______ ________ is in between LAN and WAN _____ can be owed by multiple organisation Data is transmitted in the form of_____ signals DTD stands for __________ Modem stands for __________________ ______ is the process of the digital signals being converted into a form suitable for analog transmission ________ and______ are two basic ways of getting connected to the internet SLIP stands for ________________ PPP stands for _____ Which of the following best describes uploading information? A characteristic of a communication channel that is the amount of information that can be passed through it in a given amount of time, expressed in bits per second. The act of searching through storage to locate information without necessarily knowing of the existence of the information being sought. The principles, means and methods for rendering information unintelligible and for restoring encrypted information to intelligible form.

IN107 IN108 IN109 IN110 IN111 IN112 IN113 IN114 IN115 IN116 IN117 IN118 IN119 IN120 IN121 IN122 IN123 IN124 IN125 IN126 IN127 IN128 IN129 IN130

IN131 IN132

IN133

IN134 IN135 IN136 IN137 IN138 IN139

IN140 IN141 IN142 IN143 IN144 IN145 IN146

A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt an decrypt messages and conversations. Protected/private character string used to authenticate an identity or to authorize access to data. The successful act of bypassing security mechanisms of the system. A set of rules and formats, semantic and syntactic, that permits entities to exchange information. An attempt to get access to a system by posing to be an authorised person. An action or event that might prejudice security. According to information Technology Act, 2000, To investigate contraventions the controller of certifying authority shall exercise the like powers to that of Malicious software. None the person who is known as father of Internet This website is the biggest bookstore on the earth. When we talk of Data Transmission modes, then ATM stands for A sequence of bits or characters that identifies the destination and the source of a transmission. The means of communicating between networks A group of computers and other devices dispersed over a relatively limited area and connected by communication links that enable a device to interact with any other on the network. The term HTTP stands for A NIC is considered as A hub is a device that can connect

IN147 IN148 IN149 IN150

IN151 IN152 IN153 IN154 IN155 IN156 IN157 IN158 IN159 IN160 IN161 IN162 IN163 IN164 IN165

Which of the following is true concerning the function of a switch? What do routers connect? What does a router route? Software which prevents external access to a system is termed If four computers are connected to a hub and then to the internet, how many IP addresses are required for these 5 devices? Which of the following in an OSI layer When creating a network from just two PCs, what kind of cable would be used to connect them? An IP address is a To construct a simple LAN of 4 computers, you would connect them with ______connect them What happens to data that is ruined before reaching to receiver Bluetooth is Which is not one of the recognized IEEE sub layers? The most preferred number system to represent a IP address is A MAC address is of Protocol is

IN166

A ............... is a LAN-based computer with software that acts as a controlling device for controlling access to at least part, if not all, of a local area network and its available resources.

IN167 IN168 IN169 IN170 IN171 IN172 IN173 IN174 IN175 IN176 IN177 IN178 IN179 IN180 IN181 IN182 IN183 IN184 IN185 IN186

What is the biggest disadvantage of the Ring topology? The .............. of the network concerns how network devices are physically (or optically) interconnected. The principal topologies used with LANs are: What are the various types of bus architecture? What are the various types of ring architecture? In a ................., each workstation attaches to a common backplane via its own physical cable that terminates at the hub In a ............... , each work station is directly connected to a common communications channel Which one of the following is NOT a network topology? In a .............. , the cable system forms a loop with workstations attached at various intervals around the loop The Media Access Control (MAC) is a sub layer of the: What are the most common LAN technologies used in networking today? Modem speeds are measured in LAN speeds are measured in WAN speeds are Accessing the Internet from a typical home PC requires the use of To use the Internet, you The worldwide web server uses the following standard interface to act as the middleware: An NIC Accessing the Internet from a typical home PC requires the use of The most widely used network operating system on PC LANs is

IN187 IN188 IN189 IN190

JPEG and MPEG To use the Internet you A multiplexer is a form of An ISP

IN191 IN192 IN193 IN194 IN195

FTP is Telnet A firewall is A proxy server is A search engine is

IN196 IN197 IN198 IN199

To look for information about interest areas on the internet, the user should use a An ISP FTP is Telnet

IN200

Which of the following is a true statement about the OSI model layers?

IN201 IN202 IN203 IN204 IN205 IN206 IN207 IN208 IN209 IN210 IN211 IN212 IN213

Which of the following is NOT true about the Internet? The traditional intent and impact of this common type of attack is to prevent or impair the legitimate use of network resources. A firewall is Which of the following is NOT an example of a DoS attack that is popular among hackers? A ____________ attack is when a hacker sends a continuous flow of packets to a system. One defense option on a large network is to configure a ____________ to disallow any external traffic. A proxy server is Which of the following would be performed on a network server and not normally on individual workstations? What can be said about the safety of the Internet? To secure communication network against wire-tapping the most effective control is One way that a virus CANNOT spread throughout a network is: Which of the following is NOT a means of monitoring employee use of company technology? ____________ would be used by parents to monitor their children on their home system. The formal rules and parameters which are established to permit a microcomputer to communicate with the mainframe computer as though it was a terminal of the mainframe are called The two most common tools used to help with extracting information are: Which of the following would NOT be considered an example of cyber terrorism? Which of the following would be a form of cyber terrorism? Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life?

IN214 IN215 IN216 IN217 IN218

IN219 IN220 IN221 IN222 IN223

An organisation is upgrading its telecommunication lines. Which is the least important objective while upgradation A company posts a price list of its products on its website. The advantage to the customer is that the company can Which of the following is an easy-to-use service to get information on someone? Which of the following pieces of information would NOT be found online? Which of the following is the most common danger on the Internet?

IN224

The famous Nigerian Fraud scam offered victims the opportunity to: The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is called _________________. Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called: Setting your privacy settings in Internet Explorer to medium is one way to block: What is the best means of protection from cyber stalking? Which of the following is not an appropriate control over telecommunications software Encryption techniques can be implemented in Hardware-Software Which protocol would be used to download a free anti-virus program from the Internet? The major advantage of the checksum program is when it Which of the following is a Web browser? A Web page is another name for ----------Domain names must contain a description of the type of organisation that the domain represents. A very common abbreviation used include: A standard language for creating and formatting Web documents is: The Web page format in which all elements of a Web page are saved as one file is called:

IN225 IN226 IN227 IN228 IN229 IN230 IN231 IN232 IN233 IN234

IN235 IN236 IN237

IN238

Which of the following requires an Internet connection? Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his computer how would he do this? Which of the following is used to update a Web query? You download from the internet, a screensaver, a ten-second sound file and a ten-second music video clip. You also add a hyperlink. Which of the media elements has the greatest effect on the file size? When saving a photograph for use on a website, which format should you choose?

IN239 IN240

IN241 IN242

IN243 IN244 IN245 IN246

While researching the Direct taxes assignment, you find a useful website. What is the most efficient way to access the site at a later time? A system that uses the Internet for business-to-business interaction is called a(n): A block of text automatically added to the end of an outgoing email is called _________ refers to the use of Internet technologies for placing telephone calls. Most client/server applications operate on a three-tiered architecture consisting of which of the following layers? Which do you NOT need to connect to the Internet? What does FTP stand for? What is the purpose of DNS? Which of the following is NOT a properly formatted IP address? Which of the following is a properly formatted email address? The Internet is controlled by whom? What does IRC stand for? If you do not pick up your email for a week...? What does HTML stand for?

IN247 IN248 IN249 IN250 IN251 IN252 IN253 IN254 IN255 IN256

IN257

What is a disadvantage of joining a mailing list?

op1 MS Internet Explorer and Mosaic text hyperlink in random order first .bmp and .gif Service, hostname and directory path

op3 MS Internet Explorer and Netscape Navigator and Mosaic Netscape Navigator data from a database symbols hypertext in sequential order start .bmp and .jpeg service,hostname,port,director y-path hotword in user-defined order home .gif and .jpeg service,port and directory path mailing lists,mail server robots and gateways to other services <hr size=n> classified general instructions Browser intranet wan packets CARN newsgroups and search engines application servers,proxy servers and web servers bulletin broadcasting system very small windows stocks PINE built-in www.encybrit.com FTP intermediate network physical layer ftp service ARCHIE unlimited restore locator scheme command line sears browser search for database wincim or maccim cyberspace

op2

mail servers,mail clients and mail vendors,mail identification alternate services and password <center> communication generated information Server arpanet LAN data CERN yahoo and infoseek news groups,yahoo and infoseek bulletin board system small windows socks Mosaic buffer www.ency.in URL internal network application layer finger service FTP uniform research locator host computer message Delphi net browser CompuServe internet dialer gophering <font size=n> common gateway interface Client the net peer-to-peer connectivity parcel ECRN mailto and files bulletin boards,mails call and wireless system business broadcasting system large windows sockets Yahoo cache www.eb.com DNS network of network transport layer ping service TELNET uniform resource locator name of the resource scheme Microsoft web read the Usenet news spy mosaic gopherspace

Alta vista finger server list no middle hotlist

open text ftp server directories maximum of five lower directory

excite web server image list one top index menu search,item search lycos lynx Lycos IBM ftp Hyper text transfer protocol uucp telnet transfer communication protocol/internet protocol three web servers the internet access site higher type transfer protocol uniform resource label frantically asked question IP,UDP request world search for information and research council mosaic,gopher interface hotwords verification on network integration and communication university of California net dns telnet and ftp wais,winsocks winsock

directory search,index search index search,menu search infoseek excite netshark lynx Microsoft Usenet Higher text transfer protocol iccp yahoo transfer control protocol/internet one ftp servers the internet adapter browser hotlink text transfer protocol universal resource locator frequent asked query SLIP,PPP connection wide search for information and research lynx,minx world wide web server glossary very easy and rodent oriented net wide index to computerized archives university of berkeley,berkeley freenet protocols cello mosaic internet finger service Hyper text transmission port ftp ftp transmission control protocol/internet protocol two domain name servers the internet administration protocol hyper text transfer protocol uniform resource locator frequently asked question TCP,IP response windows sockets internets relay chat netscape,ie world wide web client index very organised network integration and communication application university of cleveland,cleveland freenet IP address

search engines,directories ftp and finger allsrc,winsocks wais,allsrc allsrc waisman

hyper transfer markup higher text medium language language hot links hyper text images graphics,videos,audio first page global network news yahoo service email and net conference newsgroup Lycos catalog apple link computer related abbreviations and acronym encyclopedia Britannica search engines Graphical interpreter formatting Joint Pictures Expert Group mails yahoo,infoseek,altavista information BACKGROUND Communication gateway interface Network Current web page Browser/user Unknown resonance language text only SQL alphalanguage palm is not eatable SGML Processor web sites Internet equipment training faculty scripting,parsing and compiling applets programms,images,text home page global networks navigator electronic mail Netscape page starter site,netscape page wizard telnet point review bitnet biographical information on-line reference works web directories

hyper text markup language books marks animation animation,scripts,executables welcome page grand network news search engines yahoo and altavista ftp all the above Delphi bookstores more information database

Graphical interchange Format Graphical interface format Jumbled pictures expert graph documents netscape,ie,lynx web pages COLOR Common graphical Interface Interface Browser Server Uniform resource locator image only PLSQL betalanguage palm is not elm SGML Preprocessor images International Engineering trainers and faculty news,cooking and fine arts Joint pictures expert graph net eudora,netscape and pine network connections FCOLOR Communication graphical interface Communication Client Web United relay limited text or image SGML metalanguage pancake is not edible SGML Parser applets Internet Engineering Task Force email,file retrived,internet tools

nt,windows95,ie,winzip dnet defensive administrative rank administration network start milnet,smaller arpanet education,research Higher text manipulation language united states and UK server client network card detailed transaction explanation application layer point to point network and broadcast channel network file access PAN,NAN,AAN VAN LAN analog Data type definition Moralize/demoralize Mapping Satellite link and digital signals Standard long internet protocol Prime prolonged protocol storing data on a disk drive

mosaic,gopher,eudora,trumpn communicator,ie,lynx,winsock et ARPANET arpanet dedicated and registered projects administration begin mailnet,inet music and dance Hotlink text markup language england,norway client stand-alone network topology data terminal equipment physical layer packet switching,store and forward network anonymous ftp KAN,RAN,VAN MAN MAN digital Define type of data Modulation/demodulation Modulation Dedicated access and dial up access Stream line internet protocol Point to point protocol sending information to a host computer defensive advanced research projects administration net first intranet,extranet cooking and dining Hyper transfer meta language united states & Russia network servers network redirectors data target equipment network layer smart network and dumb network file transfer LAN,WAN,MAN TAN WAN non-digital Document type definition Manipulate/demanipulate Manipulation Cable and wires Serial line protocol Pillar to pillar protocol storing data on the hard drive

Bandwidth Find

Speed Save

Size Browse

Photography

Digital Signature

Cryptography

Key User-id Penetration Acts Spoofing Loss

Lock Password Retrieval Regulations Imposting Threat

Hash Function Name Cryptography Address Unauthorising Exposure

Sales - tax authorities Utility Tim Berner Lee Etrade.com Automated Tailor Machine Acts Router

Income - tax authorities Pirated software Hoffman Amazon .com Any Time Money Regulations Gateway

Judge of a civil court Virus Charles Bubbage Dell .com Asynchronous Transmission mode Address Port

LAN hyper terminal tracing program National Informatics Center Only Computers

WAN hypertext tracing program Network Interface card Can not computers Combines connectivity of a hub with the traffic regulation of a bridge Two or more networks frames gateway Two Data-Link Layer Coaxial cable Logical address Hub It gets destroyed bit by bit. Wired Technology Data Link Layer ASCII 48 Bytes a list of rules for transferring data over a network

CAN hypertext transfer protocol New Information Card Only printers Switches data from incoming ports to outgoing ports. Bridges and Hubs Packets router Four Network Layer Fiber A memory address Router It continue on to target device with corrupt data Ultra violet technology Network Layer Octal 48 KB software that allows file copying

Concentrates connectivity Bridges and Repeaters. bits firewall One Physical Layer RG7U Physical address A cable Data return to the sender Wireless technology Physical Layer Binary 48 Bits software that facilitates connection to the internet

Novell PC

Client If one node goes down, it brings down the entire ring Topology Star Parallel Circular Bus Bus Bus Bus Transport Layer Ethernet, token ring, FDDI kbps Kbps measured in bytes per second a modem must use electronic mail uniform resource locator

There isn't one Physiology Bus Linear Parallel Ring Ring Star Ring Network Layer Ethernet, token ring, DecNET bps bps usually higher than LAN speeds CD-ROM drive must use the World Wide Web key gateway interface

Server If the hub goes down, it brings down all of the nodes on that section Both A and B Ring Both A and B Linear Star Star Linear Star Physical Layer Ethernet, DecNET, FDDI mbps Mbps depend on the transmission medium Windows 95 must have a LAN account common gateway interface interfaces a modem to a computer Windows package Windows NT

a Novell Interface Controller used to control a printer CD-ROM drive a modem Linux Novell Netware have to do with compression of graphics have to do with Web pages and video must use the World Wide must use electronic mail Web Printer modem provides access to the is a CPU register Internet

the Internet must have a LAN account bridge is a CPU functional unit

used to send email used to send email used to protect a computer room from fires and floods a backup server hardware

used to browse the Web uses wireless communication medium a form of virus an email server IR system for the Internet

is part of Netscape is part of Netscape a screen saver program a poor file server browser

scanner provides access to the Internet used to send email used to send email The layers cannot communicate with one another.

CD-ROM is a CPU register used to browse the Web uses telephone lines

clip-art file is a CPU functional unit is part of Netscape is part of Netscape Any layer can communicate only with the layer directly above or below it.

Any layer can communicate directly with any other layer.

It is one large network. Password cracking used to protect a computer room from fires and floods IP flood hack firewall a backup server Apply security patches

It is made up of many networks connected into transmission lines It works the same way as a called backbones. local network. System intrusion a form of virus Flood a Web server with requests packet router an email server Denial of Service a screen saver program Virus that initiates a ping flood flood switch a poor file server Backup data on a daily basis Only large name-recognizable sites are safe. Use of logical access methods by attaching itself to a document. Web traffic A worm

Update virus definitions There are safe and unsafe All sites are safe and reliable. sites. Use of identifiers by attaching to an e-mail. Phone A Trojan horse Use of passwords through an FTP port. E-mail Adware

Modems cookies and Trojan horses. An attack on a system for personal gain Economic damage Crashing the stock market, as in the 1930s

Protocols Trojan horses and key loggers. An attack with the purpose of gaining publicity Disruption in communication Shutdown of military security systems

Multiplexors cookies and key loggers. Giving out disinformation Disruption in supply lines Contaminating water systems

To carry more network capacity set its prices very high People Search Name of your bank Virus

To improve system response To improve network services time limit access to computer owners stop its competitors seeing only their prices Yahoo People Search Date of birth Fraud USA People Search Personal assets Adware

buy stocks.

invest without risk.

purchase off-shore property.

Shill bidding Internet stalking. pop-ups. Use a fake e-mail address. Encryption I only irc Adds more bytes to programs HTML Web query.

Phishing cyber stalking. cookies. Never use your real identity. Physical Security controls II only ftp Verifies integrity of files Internet Explorer HTML document.

Siphoning virtual stalking. spam. Use a proxy server. Message sequence number checking Both I & II www Increases boot up time Microsoft Excel round trip HTML document.

.com is used for company round trip HTML. XML. using Internet Explorer to view a Web page that is stored on the hard drive on your computer

.co in used for company

.con is used for companies

the World Wide Web Consortium HTML. HTML. DHTML. clicking a hyperlink that references a document that is updating the values that are stored in the floppy drive on obtained through a Web query your computer

Click on the Back arrow until Click on Go to or Search in the Go to the History page and the desired site is found browser look for the site the Insert Hyperlink command the Update command the Refresh command

Hyperlink BMP

Screensaver GIF

Sound JPEG

Save it to a floppy disk. extranet. an attachment. VoIP Desktop client, application, and database. Modem File Transfer Program So computers can be referenced by a name 193.1.2.3

Write it down on a piece of paper. intranet. a signature. IPT Desktop client, software, and hardware. CD-ROM File Transmission Protocol So IP addresses can be shorter 45.1.1.1

Add it to Favourites or Bookmarks. privileged network. a footer. IPP Desktop server, application, and database. Telephone line File Transfer Protocol So email is delivered faster 143.215.12.19 paul.domain.uk No-one Internet Remote Conversations A letter will be sent to you in the post Hyper Text Mark-up Language

paul .trigg @ domain. org. uk paul.trigg@domain.org.uk The US government Scientists in Switzerland International Relay of Characters It will be waiting for you to collect it It will be deleted Hyperlink Text Marking Hyper Textual Mark-up Lingo Language Receiving messages automatically from anyone in People discussing a topic of the group interest globally Internet Relay Chat

High volumes of email

op4 None of the above video hotlink none of the above none of the above .wmf and .bmp service,hostname and port

ans C C B B C C B

none of the above <l1 type=shape> none of the above User none of the above none of the above none of the above NET none of the above none of the above none of the above none of the above none of the above Lynx none of the above none of the above none of the above none of the above session layer none of the above none of the above none of the above none of the above none of the above general electric editor none of the above none of the above none of the above

C D B A B B A A B B A B B A B B B B D A C B C C C B C C C

none of the above none of the above none of the above many middle and lower glossary item search,index search all the above all the above navigator gold 2.0 CompuServe telnet Hyper text transfer port none of the above none of the above none of the above none of the above none of the above none of the above organization none of the above name of the above none of the above none of the above close none of the above none of the above none of the above none of the above

B A C B D C C D C C D D C C C B C B A B B B B A A B B B B

none of the above none of the above none of the above none of the above none of the above none of the above

A B A A B B

none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above archive none of the above fidonet none the above galenet channel Graphical Interface format Joint pictures experimental group browsers none of the above mails FONTCOLOR Common Gateway Interface Connection None of the above Channel None of the above neither text nor image CGI none of the above none of the above SGML Composer documents None of the above none of the above

C B B A B B B B D D A D A B B A C C B B D B B A B C C C B C A C C

all of the above none of the above

B B

none of the above none of the above none of the above none of the above Hyper text markup Language none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of t he above none of the above none of the above Document type data none of the above none of the above none of the above none of the above none of the above receiving information from a host computer

C B A A D B C C B B B B B C B C B C B B B C B B

Channel Retrieve

A C

Message Digest

Formula Address Password Cracker Protocols Approving Hacking

A B A D A B

Police officer of IPS rank. Cracker Howard Aiken Msn .com None of above Protocols Pin

B C A B C C B

PAN hypertext tracing protocol None of the above None of the above

A C B D

All of Above Hubs and nodes None of the above virus checker None of the above All of the above Twisted pair None of the above None of the above None of the above None of the above All of the above None of the above 48 MB a gateway calling program for internet bridging

B B C A C D B B B B A D A A B

Network PC If the hub goes down, it brings down all of the nodes on all of the rings None of the above All of above None Both A and B Mesh Mesh Ring Mesh Data Link Layer Ethernet, token ring, ARCnet mips Mips limited by modem speeds Netscape All of the above application protocol interface connects a computer to a network Netscape None of the above

B B D A B C B C A D B B C C B A C D B C

none of the previous use appropriate communications software none of the previous make of processor is a protocol for the transfer of files between computers None of the above none of the previous none none of the previous

A A D A

D D D D C

search engine make of processor is a protocol for the transfer of files between computers is a protocol that allows for remote login

D A D D

Any layer can communicate only with the layer above it.

Individual computers can connect to it using an ISP. Port sniffing none of the previous UDP flood traffic hub none of the above Limit logging on access ActiveX-enabled sites are safe. Use of encryption methods by scanning the computer for a connection. Application updates Spyware

A C D A C B D C B D B D D

LAN key loggers and worms. Changing the content of a Web page All of the above are correct. Shutdown of nuclear plant safety systems

B C D D D

To obtain an accurate inventory of network related equipment and parts and network nodes update its prices as soon as they are changed Lycos Search Criminal records Spyware make large amounts of money by parking funds in their bank account.

D D B A B

Hoaxing Web stalking. viruses. Use anti-spyware software. Logical access controls Neither I or II telnet Misleads a program recompilation both HTML and Internet Explorer Web browser.

B B B B B C C B B B

None of the above one way HTML. MHTML

A C D

viewing an Excel worksheet that you have saved as a Web page. Go to the Bookmarks or Favorites page the External Data command

C A

Video TIFF

C C

Cut and paste it to a word processor document. network topology an encryption. PoIP Desktop server, software, and hardware. None of the above None of the above None of the above None of the above None of the above None of the above None of the above None of the above None of the above

C A B A

A B B A D B C A A C

None of the above

q_id EX1 EX2 EX3 EX4 EX5 EX6 EX7 EX8 EX9 EX10 EX11 EX12 EX13 EX14 EX15 EX16 EX17 EX18 EX19 EX20 EX21 EX22 EX23 EX24 EX25 EX26 EX27 EX28 EX29 EX30 EX31 EX32 EX33

q_desc The wizard that is used to import text files is_________________ The alphabet indicating the column followed by the row number is known an__________ Which of the following files could not be opened in excel _______________ In excel, the dates that are stored as sequential numbers known as ________________The command to display the current date in a cell is _________________ In excel, absolute references are represented by a ________ before the column and row addresses The ________ can be used to select the function and assemble the arguments correctly Specific parts of information required by functions to perform certain tasks are called as___________ Which of the following do not belong to the formula category in excel environment__________ The function that in used to join cell values together in a single cell ________ The function that is used to count all the values that meet specific criteria _________ The wizard that is used to create and edit charts _______________ The function that is used to calculate the payment for specific loan terms ____________ The function that is used to add together all values that meet specific criteria is known as ____________ The __________ option present in the file menu options is used to specify major facts of the page to be printed The command that is used to apply a format automatically __________ The ____________ makes the information in a worksheet meaningful and easy to understand A particular part of a work sheet can be printed by setting the _________ The process of finding or selecting information is known as ____________ The option that is used to cancel the filter process for a specific column and display all the records is ________ There are _________ types of data tables The tables that allows the user to change or rearrange the data, summarize the data and evaluate the data using changing points of view is known as The wizard that is used to suggest hints for doing a task In a chart Y-axis is known as_________ In a chart X-axis is known as_______________ _________ is a set of tables that describe each of the data series ________ is used to differentiate one data series from another The chart that contains only one data series is _________ The chart that holds the column chart is _________ The chart that display two or more data series on a surface is _________ The chart that is used to display discrete data _________ are not allowed in a macro name Which of the following tool cannot be used to view the excel web page_______

EX34 EX35 EX36 EX37 EX38 EX39 EX40

The wizard that used to build an interactive table from data existing on sheets The chart that is used for displaying stock market information In excel, the subtotal command also generates grand total after the last group subtotal_________ In advanced filter , the criteria occupying multiple columns but more than one row, is considered as an ________ criteria. The stacked bar graphs can be represented in __________ A pie chart can represent only one data series at a time The ______ generates a summarized report in tabular form in an interactive manner

EX41

EX42

EX43 EX44 EX45 EX46 EX47 EX48 EX49 EX50 EX51

Which one of the following statements related to stock chart is NOT TRUE ? The state government needs to finalize a five years plan to implement 100% literacy in the state. Which one of the following will be the best tool that should be used to work out the plan ? Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won in totality to obtain majority to form the government. Which one of the following will be the tool that will help the team ? Which one of the following will be the tool that provides a way to view and compare the results of all the different variations together on the worksheet ? A ___________ is an excel file where the user stores his data Spreadsheets are useful for _______________ Which one of the following is NOT the component of the pivot table ? Excel allows upto ______ levels of sorting Filtering rearranges a list to display the required records The stacked bar graphs can be represented in _____________ The ______ generates a summarised report in tabular form in an interactive manner

EX52

EX53

EX54 EX55 EX56

Which one of the following statements related to stacked bar chart is NOT TRUE ? The state government needs to finalize a five years plan to implement 100% literacy in the state. Which one of the following will be the best tool that should be used to work out the plan ? Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won in totality to obtain majority to form the government. Which one of the following will be the tool that will help the team ? Which following function is used in subtotal option ?______________ A workbook consists of many ________

EX57 EX58

Which two of the following statements related to pivot table are TRUE ? Which one of the following is NOT a What-if analysis tool ?

EX59 EX60 EX61 EX62 EX63

The _________ wizard separates contents in a cell into different cells A spreadsheet is a grid of rows and columns and is called as a ________ Pick out the window that is not a form of excel ___________ On an Excel sheet the active cell is indicated by Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of cells A6, A7, and A8 are _____.

EX64 EX65

If a cell shows ####### , it means that _____. Which is not an advantage of using computerized spreadsheets? The gym teacher has a new program to calculate physical fitness in terms of weight and exercise. The use inputs different weights or amounts of exercise to determine the related physical fitness. This "What if" program is most likely which of the followin The difference between the highest and the lowest values. Spreadsheets can be used for...

EX66 EX67 EX68

EX69 EX70 EX71 EX72 EX73 EX74 EX75 EX76 EX77

To select a column the easiest method is to If you press _____, the cell accepts your typing as its contents. The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as All of the following are considered constants EXCEPT: Which of the following may NOT be included in a formula? Which of the following is NOT a valid mathematical operator in Excel? Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first? Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant? How can you tell which cell in a worksheet is the active cell?

EX78

How can you change the active cell?

EX79

Which of the following would you use to change the font size of a cell in Excel?

EX80 EX81 EX82 EX83

The command that will save the current workbook with a different file type is: The command that will print an Excel workbook is found on the ____________ menu. In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the date and time a file was last modified. Which of the following commands will automatically adjust cell references in formulas?

EX84 EX85 EX86 EX87 EX88 EX89 EX90 EX91 EX92 EX93 EX94 EX95 EX96

Which of the following commands will remove cells, rows, or columns from a worksheet? Which of the following options is NOT controlled through the Page Setup command? Which command enables you to change the margins for a printed worksheet? All commands are carried out on a rectangular groups of cells known as a: Which of the following is a valid cell range? In a copy operation, the cell(s) you are copying from is called the: In a copy operation, the cell(s) you are copying to is called the: Which of the following commands is needed to duplicate the contents of a cell in another? A cell reference that does not change during a copy operation is known as Which of the following is considered an absolute cell reference? Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, what will be the contents of cell E4? Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to cell E4, what will be the contents of cell E4? Which of the following commands is needed to transfer the contents of one cell range to another?

EX97 EX98

The F4 key is used to: Which of the following quickly copies the formatting of a selected cell to other cells?

EX99

Which of the following will insert a hyperlink into an Excel worksheet?

EX100

Conditional formatting applies formatting to a cell based on:

EX101

EX102

If you enter a date into a cell, Excel stores the date as: You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened that worksheet again on August 31. What will be displayed in cell E17 on August 31?

EX103 EX104

The number of days between two cells containing dates can be calculated by: The function key that is used to quickly edit the contents of a cell is:

EX105 EX106 EX107

What will be stored in a cell if 3/4 is entered in it? A users response to the InputBox function can be stored in: The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is _____. The teacher has a spreadsheet showing all Year 10 students and their marks in one Mathematics test. To find the student with the highest mark, which of the following functions should be used?

EX108

EX109

Which chart type best shows proportions of a whole?

EX110 EX111

EX112 EX113 EX114 EX115

Which of the following is TRUE regarding chart types? To select several cells or ranges that are not touching each other, you would _____ while selecting. Your Institute teachers have set an assignment on Studies. You are required to use a spreadsheet to record all that you study on each day for four weeks. You decide to show each weeks data with an accompanying graph. What is the best way of doing this What would be the best method to quickly copy the formula from the active cell to each cell below it? To arrange rows in alphabetical order based on column A, you need to use the command _____. What can you NOT do with a spreadsheet?

EX116 EX117 EX118 EX119 EX120 EX121

To print just part of a sheet, you would select what you want to print and _____ . Spreadsheets can be used for... The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in B2 is _____. Which of the functions is not valid for performing addition The default orientation for the printed page is _____. Which is not a valid cell address?

op1 text import wizard cell reference text files serial values =today() dollar sign AutoSum variables text concatenate countif pivot table wizard sumif average page setup autoformat bordering page setup filtering all option 1 data table pivot table wizard series or rank series or rank series or rank series or rank column chart column chart column chart column chart spaces excel97

op2 convert text to columns wizard row reference Lotus 1-2-3 domain values =date() ' = ' sign AutoFill arguments logical pmt vlookup chart wizard pmt sum print area AutoFill formatting print area searching blanks 2 filtered table chart wizard category category category category bar chart bar chart bar chart bar chart wild card characters internet explorer

op3 tip wizard column reference quattropro or xbase files range values =currentdate() # sign function wizard parameters numeric merge pmt convert text to columns wizard countif sumif print none of the above shading print sorting all blanks 3 index table convert text to columns wizard legend legend legend legend pie chart pie chart pie chart pie chart symbols Netscape

op4 function wizard none of the above class files reference values none of the above none of the above none of the above none of the above Boolean none of the above count tip wizard none of the above countif none of the above

none of the above print preview none of the above none 4 pivot table tip wizard data marker data marker data marker data marker surface chart surface chart surface chart surface chart none of the above word 2000

pivot table wizard line chart true and 3-dimensions true Data table

chart wizard bar chart false or 4-dimensions false Pivot table

convert text to columns wizard stock chart

tip wizard pie chart

Multi-dimensions

It is often used to display It is also used for indicating It is also called as highshare market prices over fluctuations in temperature low-close chart changes It shows trends over time a period of time

Pivot table

Scenario manager

Solver

Data table.

Goal seek Goal seek Workbook Performing calculations. Column field two true 3-dimensions Data table

Scenario manager Pivot table Worksheet Performing database operations Row field. three false 4-dimensions

Pivot table Solver Spreadsheet Performing text formatting. Source table name. N Multi-dimensions

Data table. Data table. none of the above All of the above Pivot table item.

It displays the data series one on top of the other.

Pivot table It is useful when several components are changing and the user is interested in the sum of the It can be represented in 3dimensions components.

Pivot table.

Scenario manager

Solver

Data table

Goal seek Count. databases It is a tool for summarizing and analyzing the data records in an interactive manner. Goal seek.

Scenario manager Standard deviation records It is a tool that provides a way to view and compare the results of all the different variations together on the worksheet Scenario manager

Pivot table SumIf tables

Data table worksheets

It summarizes the data by using analytical functions. solver Pivot table

text import wizard worksheet application window A dark wide border 8,16,32

convert text to columns wizard workbook document window A dotted border 2,4,2

tip wizard tables modal window No border 2,2,2

function wizard database A blinking border 6,8,10

your formula has a syntax error ability to generate tables

the row is too short to show the column is too narrow to show all the the number at the current font size digits of the number flexibility of moving speed of calculation entries

either b or c cost of initial set-up

word processing Range Producing graphs

graphical Address Writing letters drag from the top cell in the double-click any cell in column to the last cell in the the column column CTRL + ENTER ENTER array. 100 Cell references ^ B5*B6 function. (201)555-1212. Functions / C3/D4

database Gap Drawing pictures click the column heading TAB constant. #VALUE! Numeric constants * D4^2 SUM(H9:H11) It is displayed in reverse video. By either clicking in a different cell or using the arrow keys to move to a different cell The Cell Format command on the Edit menu the Save As command on the File menu. View List Both Insert and Delete

spreadsheet Rows Document filing

click the column label INSERT formula. Tom McKenzie. Text constants \ It is impossible to determine. G7*SUM(H9:H11) The phrase active cell appears in the Status bar.

E12 6 It is surrounded by a It is blinking. heavy border.

By clicking in a different cell

By using the arrow keys to move to a different cell

By typing the reference of the cell you want to move to in the formula bar The Font Size command on the Tools menu. the File Type command on the File menu. Window Properties Clear

The Standard toolbar

The Formatting toolbar

the New command on the Save command on the the File menu. File menu. File Preview Insert Edit Details Delete

Clear Delete Orientation (portrait or landscape) Headers and footers Options worksheet. 6 copy range. paste range. The Duplicate command absolute B4 #DIV/0! #DIV/0! The Move command Page Setup range. D12, G25 destination range. destination range. The Copy command relative $B4 #DIV/0! #DIV/0! The Cut command

Both Clear and Delete Fonts View group. D12:G25 clipboard. clipboard. The Paste command mixed B$4 #DIV/0! #DIV/0! The Paste command

Remove Margins Edit cell group. D source range. source range. Both the Copy and Paste commands constant $B$4 #DIV/0! #DIV/0! Both the Cut and Paste commands

copy and paste cells. the Fill Handle Select the Insert Hyperlink command from the File menu.

edit cells. the Format Painter Click the Insert Hyperlink button on the Standard toolbar.

cycle through absolute, relative, and mixed cell cycle through open applications. references. the Formatting toolbar Right-click a cell and click the Edit Hyperlink command. whether the cell has an absolute or a relative cell reference. Conditional formatting Double-click a cell and click the Insert Hyperlink command.

whether the cell has a formula or a value in it. the cell address. text with a two-digit year.

text with a four-digit year.

an integer.

the value in the cell text with either a two-digit or four-digit year, depending on the format. It is impossible to determine from the information given.

Jul-30 subtracting the earlier date from the later one. the F4 key.

Aug-31 adding the earlier date to the later one. the F2 key.

29/03/2008

subtracting the later date adding the later date to the from the earlier one. earlier one. the Esc key. the F1 key. March 4 of the current year a constant. B1;G10 Either 3/4 or .75, depending on the cell formatting either a cell on a worksheet or a variable. B1:G10

03-Apr a cell on a worksheet. B1-G10

0.75 a variable. B1.G10

AVERAGE

COUNT

MAX

SUM

Combination Once a bar chart is chosen it cannot be changed to a column chart. hold down the CTRL key

Line Once a column chart is chosen it cannot be changed to a bar chart. hold down the SHIFT key

Pie

Scatter

Once a line chart has been Once a pie chart has been chosen it cannot be chosen it can be changed changed to line chart. to a pie chart. hold down the ALT key hold down CTRL + SHIFT

Use tables Paste Tools | Sort Analyse data

Create four separate files Fill Down Data | Sort Calculate data

Transfer information to a database Use multiple sheets Fill Right Paste Special none of the choices None of the above select Print selection in the Print dialog and then print None of the above =(B2*(D4+C2) None of the above vertical None of the above

click the Print button producing graphs (D4+C2)*B2 0 portrait AD213

Edit | Data | Sort Create forms select Print selection on press the PRINT SCREEN Page Setup | Sheet key and then print writing letters drawing pictures D4+C2*B2 =A3SUM:B3SUM:C3SUM landscape ZA1 #VALUE! REF! whatever was last used A0

ans A A D D A A C B D A A B B C A A B B A A B D D A B C D C B D A A A

A C A B A A B

A D A D C B B A B

A A D

A D

B A C A D

C D

D A A

C A B C D D C B A

C A B C

B C B B C D B D A D B C D

C B

A B

C D D

D A

D B B C

D A C B A C

q_id EC1 EC2 EC3 EC4 EC5

q_desc The acronym for B2B is ___________ The _____________ model is the least intrusive model but requires active search on the part of the customer __________ is / are a form of advertisement where people relate their experience with products and services The _________ are software agents who communicate with the business merchants on behalf of the customers The Pre-purchase preparation phase includes _______________ for a set of products The _________ phase includes customer service and support to address customer complaints , product returns and products defects The ________ allow companies to bypass the need for costly printed catalogs A ________________ is a basket on the Net that is used to place the items that are being purchased

op1 Business-toBusiness Billboard Customer Endorsements Intermediaries Order Placement Post purchase interaction Billboard model of marketing Online Catalog EDI For Administration, Commerce and Transaction

EC6 EC7 EC8

EC9

EDIFACT is an abbreviation of ________

EC10

EC11

The __________ allows for protocol conversion and communicates with the bank using the banks private network or the Internet EDI In Ecommerce, data extraction, transforming the data into transmittable form, transmitting the data and downloading the data are the operations employed in _________ Compiler The _________ commerce assists in integrating the customers and suppliers of the company directly into the organisation E-cash means______________________ E-commerce is a tool that addresses the desire of firms to cut services cost and improving the quality of goods. It is a definition of e-commerce from _________ The small denomination digital tokens are called _________ The ____________ is the process of encoding information to prevent it from being read by unauthorized parties In EDI interface, the translation service receives _________ as incoming files from the communication service The EDI standardisation for International Trade and Commerce is introduced by __________ In EDI, the transmission files are composed of different sets of external format files which are grouped into multiple sets under the name of ________ The ________________ are pre-paid credit cards that include an embedded cards ________________ are another form of credit payment that lets customers use digital online cheques to pay Web merchants directly

EC12 EC13

Business-to-Business Emergency Cash Communication Perspective Microcash Decryption Internal Format File ANSI

EC14 EC15 EC16 EC17 EC18

EC19 EC20

batch files Smart Card

EC21

E-cash

EC22 EC23 EC24 EC25 EC26 EC27 EC28 EC29

In Active advertisement, there are two types of models. They are _____ and ________ The network based technology is/are ____________ Decryption is a process employed for scrambling of plain text for web based transactions Asymmetric cryptosystem is based on __________ and ____________ Value Added Network is an example of _________ The advertising strategies emerging in the on-line world are ____________ The _________ model use direct mail, spot television or cable television, in active based advertisement. The ________ is a form of mail that is not targeted to a specific audience The __________ model refers to information that is placed at a point where it will be noticed by customers in the course of other activities and does not require active search The most beneficial advantage of ERP system is What is the term that describes spying on ones business rivals to gain a competitive advantage?

Billboards and Junk Mail EDI True Login_Id and Password Global Network Active or push based advertising Broadcast E-mail

EC30 EC31 EC32

Catalog Error checking Competitive espionage

EC33

A list of competitors What would you NOT be looking for when spying on a competitor? clients An online drugstore such as Drugstore.com is an example of_______ Which of the following is an example of unacceptable online netiquette? single-user database application Replying promptly Removable drives that can be locked up at night provide adequate security when the confidentiality of data is the primary risk.

EC34 EC35

EC36

Which of the following statements is correct concerning the security of messages in an electronic data interchange (EDI) system?

op2

op3

op4

ans A B A A C

Business-to-Backend Backend-to-Business Business- to-Billboard On-line Catalog Billboard portals Service Purchase consummation Online catalog Shopping cart EDI For Administration, Consumer and Transport Endorsements Catalog .COM Search and discovery Pre-purchase preparation Endorsement model of marketing Billboard EDI For Administration, Commerce and Transport Broadcast Broadcast Domains None of the above

Search and discovery None of the above Pulling cart

A B B

None of the above

TCP/IP

EFT

Gateway

Interpreter Business-toConsumer Electronic Cash Business Process Perspective Micro Transactions SSL External Format File UN/EBCDIC

Assembler Consumer-toBusiness Euro Cash

EDI Customer-toCompany Endorsed Cash

B B

Service Perspective None of the above TT(Tiny token) E-token Encryption Transmission File UNESCO Subscription None of the above UN/EDIFACT

C A C C D

interchange sets Embedded cards

functions SET

functional groups None of the above

D A

Digital Cash

Smart Cards

Electronic cheques

Online Catalog and Billboards E-mail False Primary Key and Private Key

Online Catalog and Broadcast and Junk Customer Endorsements Mail EFT All of the above

C D B

Public Key and Password

Public Key and Private Key

D B D A D

Satellite Area Network None of the above Private Network Passive or pull-based Glow sign or hoarding advertising strategies All of the above Junk mail Bulk-mail Billboard Direct-mail Endorsements Junk mail

Endorsement Data Integration

Billboard

Broadcast

C B C

Low cost of operation Quality management

Corporate espionage Industrial espionage Economic espionage Contact numbers of the management Research data group multi-user database application Keeping messages short

A competitors new project

e-commerce database application None of above Using all capital Including the Subject letters Encryption performed by a Message Security at the authentication in EDI physically secure transaction phase in systems performs the hardware device is EDI systems is not more secure than same function as necessary because segregation of duties encryption problems at that level performed by in other information will be identified by systems. the service provider. software.

C D

q_id DS1 DS2 DS3 DS4

q_desc ___________ means the result of applying to specific information certain specific technical processes. __________ is an algorithm which creates a digital representation or "fingerprint" in the form of a "hash result". __________ is of standard length which is usually much smaller than the message but nevertheless substantially unique to it. Digital Signature involves two processes. They are ___________ and __________.

DS5 DS6 DS7 DS8 DS9

The Costs of Digital Signature consists mainly of the following CA stands for ________________ A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private Key A Digital Certificate does contain Owner's Public Key, Owner's name, Expiration date of the Private Key, Serial number of the digital certificate ______________ enable web servers to operate in a secure mode. ______________ are used by individuals when they exchange messages with other users or online services. ______________ are on-line databases of certificates and other information available for retrieval and use in verifying digital signatures.

DS10 DS11

DS12 DS13 DS14

Signing Writings serve the following general purposes______,_______,_______ and _______ The most widely accepted format for Digital Certificate is defined by the CCITT X.509 A certificate may prove to be unreliable, such as in situations where the subscriber misrepresents his identity to the certification authority

DS15 DS16

CRL stands for The prospective signer identified in the digital certificate holds the_________ and is called the ___________ A "recipient" of the certificate desiring to rely upon a Digital Signature created by the subscriber named in the certificate is called the ____________ The Relying Party can use the ___________ listed in the certificate to verify that the digital signature was created with the corresponding _________ Digital Signatures are used for a variety of Electronic Transactions like ________________________ To associate with a key pair with a prospective signer, a Certification Authority issues Digital Certificate Digital Signatures, if properly implemented and utilized offer promising solutions to the problems of Imposters, Message Integrity, __________ and _____________

DS17

DS18 DS19 DS20

DS21

DS22 DS23 DS24

DS25 DS26

In, Digital Signature, _____________ perform the "ceremonial" function of alerting the signer to the fact that the signer is consummating a transaction with legal consequences A Digital Signature must have the following attributes ________________ and _____________ "Hash Function" is used in both creating and verifying Digital Signature ___________ provides assurance of the origin or delivery of data in order to protect the sender against false denial by the recipient that the data has been received, or to protect the recipient against false denial by the sender that the data was sent. ___________ serves the ceremonial and approval functions of a signature and establishes the sense of having legally consummated a transaction. ________ is a branch of applied mathematics concerns itself with transforming messages into seemingly unintelligible forms and back again. The complementary keys of an asymmetric cryptosystem for Digital Signatures are arbitarily termed as _________, and ____________ _______ is known only to the signer and is used to create the digital signature. _______ is ordinarily more widely known and is used by a relying party to verify the digital signature. ____________ is the art of protecting information by transforming it into an unreadable format. Which of the following activities would most likely detect computer-related fraud?

DS27 DS28 DS29 DS30 DS31

DS32

DS33

A digital signature is used primarily to determine that a message is:

DS34

What is a major disadvantage to using a private key to encrypt data? Which of the following risks can be minimized by requiring all employees accessing the information system to use passwords?

DS35

op1 Digital Sign Hash Function Hash Function Digital Signature creation Institutional Overhead and Subscriber Relying Party Cost Certification Authority True True Server Certificate

op2 Digital Certificate Digital Signature Hash Value Digital Signature Verification

op3 Digital Signature

op4 None of the above

ans C A D C

Digital Certificate Private Key Hash Result Both A and B Both B and A Either A or B None of the above None of the above

Subscriber Relying Party Institutional Cost Overhead Certificate Certified Authority Authority False False Developer Certificate Personal Digital Certificate

A A A B

None of the above

Server Certificate Private Certificate

Developer Certificate Repositories

Evidence, Ceremony, Approval Approval, Evidence True True False False

Personal Digital None of the above certificate none of the Public Key above Evidence, Ceremony, Approval, Efficiency and Efficiency and logistics, Evidence Logistics

C B

D A A

Certificate Revocation List Private Key, Subscriber

certificate Revocation Certificate Resource List Letter Private Key, Public key, Recipient Recipient

None Of The Above None Of The Above

A A

Recipient Party

Relying Party

Either A or B

Neither A nor B

Public Key E-mail Not False Closed System,Formal Legal requirements

Private Key Electronic Commerce Not True Formal Legal Requirements

Both A and B Electronic Fund Transfers

Both B and A All The Above

C D A

Open System

Formal Legal Requirements, Open System

Affirmative Act Signer Authentication Not True

Efficiency

Signer authentication

None of the above Neither A nor B

A C B

Document Authentication Both A and B Not False

Nonrepudiation Service Affirmative Act

Digital signature Efficiency

Digital certificate Private Key Either A or B

Neither A nor B. A None of the above Either A or B Either A or B Either A or B

Cryptography Private Key Private Key Private Key Decryption

Public Key Public Key Public Key Public Key Cipher

Private Key Both A and B Both A and B Both A and B

A C A B C

Using data encryption.

Unaltered in transmission.

Both sender and receiver must have the private key before this encryption method will work.

Collision.

Cryptography Encryption Conducting fraud- Reviewing the systems-access Performing validity awareness checks. training. log. Received by the intended Sent to the Not intercepted en route. recipient. correct address. The private key is used by the The private key sender for is used by the The private key cannot encryption but receiver for be broken into fragments not by the decryption but and distributed to the receiver for not by the sender receiver. decryption. for encryption. Failure of server Firewall duplicating Data entry errors. function. vulnerability.