Sunteți pe pagina 1din 164

OPTIONS

QUESTIONS A B
TALLY
The ------ key can be used to select an existing
company from list of companies. F1 ALT+F1

Import and Export of data between Tally and other


programs is possible only through ---------- Program. Tally ODBC Tally IMP
The re-order point is the inventory quantity that
trigger a stock replishment activity. TRUE false
A created company's detail can be modified through
keys F3 ALT+F3
A/An ------------- is the official notice that the firm
sends to its customers to advise then to the amount
of money that is owed. Invoice Bill
In tally,all masters have ________main options Two Three
In tally,to create a new column in balance sheet
press _______ Ctrl+C Alt+C
In tally,the use of group behaves like a sub-ledger,
option is that we can summarize many ledger
accounts into one line statements TRUE FALSE
In tally, we can alter ledger details using either
single or multiple modes but not alble to delete a
ledger from multiple modes. TRUE FALSE
In tally,a group company is marked with an
______________ * $

The systems that work together to order,receive, Puchasing and Puchasing and
and pay for replenishment of stock are --------------- Accounts payable Receiving
Tally allows to delete a ledger from ---------
alteration mode. Single Multiple
--------------------- is/are useful for management in the Cash Flow Fund Flow
decision making. Statements Statements
In tally,the group company must contain at least
_____________ members Two Three
To cancel a vourcher entry in Tally, short-cut key is
----------- Alt+D Alt+X
The accounting masters and inventory masters Create
related to Information Alter Information
We press ------------- function key to display the age-
wise analysis of Bills Receivable or Bills Payable
report F4 F5
In Tally, we press ------------, to print report . Alt+P Ctrl+P
In Tally, Types of Accounts and Types of Vouchers
passed during the period, can be seen in -------------
report. Tally Audit Statistics
In the Tally Software, the ------------ directory stores
all data entered by the user. Bin Data
The Ledger Accounts are unique in Financial
Accounting Packages True False
Customers can be permitted to enter their own data
into the firm’s computer using the firm’s wide area Enterprise Data Enterprise Data -
network is an example of Interchange Information
In Tally, we can customize the Vouchers as per our
requirements TRUE FALSE

The number of steps in Accounts Compilation are 2 3


Each action/transaction of a firm is described by a
----------------. data element data record

Tally is based on mercantile accounting system FALSE TRUE

Display stock Open


Ctrl + N is used to ----------- valuation method Calculator
------------- in Tally classify the accounts under
different heads so that summarised information is
possible. Ledgers Groups

Revenue Account also known as -------------- Account Personal Nominal


Method of Voucher Numbering is/are Manual Automatic

Accounts Receivable are displayed in Balance Sheet Profit & Loss


To assemble a product from different items
-------------- entry is used Journal Stock Journal
A --------- purchase orders data flow is directed to
the purchasing system for use in closing out the
outstanding purchase orders in the receiving
system diagram. Filled Receipt
Tally provides at least --------- predefined voucher
formats 11 16

The value of the inventory is included in a ledger


accounts as an asset on the balance sheet FALSE TRUE
" The buyers can follow up with the suppliers to
determine the reasons " is an example of management by management
----------------- objective by exception

From voucher entry mode , if we press __________


then we get payment voucher in tally F4 F5

Default Cost Category in Tally is/are -------------- Main Location Primary


A Group Company is simply a name and an identify
given to the merged accounts member companies
of the group. True False
A ----------- is a primary document for recording all
financial transactions. Ledgers Reports
The field can have a value between ________________
in FA Package. 0 to 9 1 to 100
The _______ file maintains data that describes the
supplier past transaction with the firm in terms of
material quality in AIS Supplier Suspense
It is necessary to manipulate data to transform it
into ---------------- Report Output
In tally, to change the date of the voucher press
______ F2 F4

Tally can maintain budgets on ---------------- Net Transactions Closing Balance


The value of the inventory is included as an asset
on the balance sheet True False

In ratio analysis report of Tally FA packagewe we


press ________________ function key to the display of Alt + f6 function
bills receivable , bills payables report F6 function key key
The accounts payable system is responsible for
paying the suppliers for the ----------------- Sales Purchases
What is the default financial year in Tally6.3 1-4-1995 to 31-3- 1-4-1996 to
_________________ 1996 31-3-1997
Tally encrypts and stores TALLY DATA at the data
directory True False
The Profit & Loss statement can be displayed in
---------------- format(s). Horizontal Vertical
Balance sheet &
profit & loss profit
& loss and trial Profit & loss and
Default ledger accounts in tally are ______ balance trial balance

Default 'godown' name in tally is ____________ Primary Main location


Security
'Tally vault' is a _________________ mechanism Ledger a/c
To create a sales voucher in tally , you have to
press _______ F5 F7
A Group Company is ------------------------- given to the
merged accounts of member companies of the
group. a name an identity
In tally,"credit note" voucher type records entry for
________________ Sales return Purchase return
In tally you get currency symbol option from _______ Company
menu creation Stock items units
------------------ gives the balance for each day for the
voucher type has been selected. Trial Balance Daybook
For 'stock journal' entry we press ______________ in
tally F7 Alt + F7
Tally provides the capability to the Changes in
administrator/auditor to track changes in the areas transactions or Changes in
is/are vouchers Ledger Masters
In tally, types of users are _______________ 2 3
By pressing -------- key, a list of inventory reports
can be displayed straightaway from the balace
sheet report F9 F10
Projected approximation of income or expenses is
called ______________ . Balance sheet Profit & loss a/c
"Administrator" type user is also called 'Auditor' of a
company in Tally TRUE FALSE
You will get company information , if you press
__________ from gateway of tally F3 Ctrl+F3
A constituent(member) company can be a member
of more than one group. TRUE FALSE
Default stock category in tally is ______ Main location Primary

To create a log of the import activity in a file


_____________ is located in the same directory
as an executable program in tally Tally.imp Tally.ini
In Tally,inventory valuation method option is
available from _______ Stock summary Stock journal
During the
Tally audit feature is available in a company By pressing F11 creation of a
__________________ function key company
In tally, a group company can also be a
constituent(member) of another group company TRUE FALSE
Default number of groups in tally are ________ 128 228
Ledger
During voucher entry ------------- are used. Accounts Groups

User designated as --------------- can view audit list. Administrator Owner

One company to
another company Other programs -
created withon a spreadsheet or
Tally supports Importing of data from ---------------- Tally Package a database file.
In an accounting information system, which of the
following types of computer files most likely would Inventory Cash
be a master file? subsidiary. disbursements.

Does not require Will produce a


Which of the following is an advantage of a as stringent a set more accurate
computer-based system for transaction processing of internal set of financial
over a manual system? A computer-based system: controls. statements.

data to be data that has


transferred to been transferred
The memory address register is used to store memory from memory

FUNDAMENTALS OF COMPUTER

Inefficient usage of excess computer equipment can Contingency System


be controlled by Planning feasibility report
Which of the following is not the component of a
CPU NIC Card VSAT
A trailer label is used on a magnetic tape file, it is
the last record and summarises the file. The
following is an information not found in the trailer Identification
label Record Count Number
Writing on a hard
Hard copy is a term used to describe...? board Printed output
Voice activated Voice answer
What do the abbreviations VAB stand for broadcasting back

What control would prevent the accidental erasure Boundary


of customer information from a magnetic tape Validity check protection
What are the individual dots which make up a
picture on the monitor screen called? Coloured spots Pixels
Header label normally include all the following Identification
except the File Name number

A daisy wheel is a type of...? Printer Storage device


Which approach or technique is a control usually Physical
associated with microcomputers System Logs Security

Electrically
An impact printer creates characters by using...? charged ink An ink pen
Use only
The best security control in a microcomputer Restrict unremovable
environment is to physical access media
What would you NOT use with a flatbed plotter? A pen Paper
What do you need for an ink jet printer? A cartridge A drum
Centralised
The greatest control exposure in a microcomputer Separation of function for PC
environment is the lack of duties acquisition

A laser printer does NOT use? A print head A laser beam


The amount of data that a disk may contain is
known as the disks...? Volume Size

You can ________ protect a floppy disk. Read Write


Information on a hard disk is usually backed-up
using a...? Magnetic tape PAN drive

Serial access Random access


Magnetic tape is a...? medium medium
Hard disks can have a storage capacity in the region
of...? 1.44MB 20 GB
Which storage device has the largest capacity in
Mb? A CD-ROM A floppy disk

Which storage device cannot be erased? A CD-ROM A floppy disk


By a sunny By magnet
Where should floppy disks be stored? window objects
The contents of these chips are lost when the
computer is switched off? ROM chips RAM chips
What are responsible for storing permanent data
and instructions? RAM chips ROM chips
Which parts of the computer perform arithmetic
calculations? ALU Registers
What are small high speed memory units used for
storing temporary results? CPUs Registers
How many bits of information can each memory cell
in a computer chip hold? 0 bits 1 bit

What type of computer chips are said to be volatile? RAM chips ROM chips

Systems
Network software software and
and security application
Software can be divided into two areas: software software
Travel agents use this computer system when Personal
reserving flights Supercomputer computer

Which computers are used in the weather Notebook Supercompute


forecasting industry? computers rs
First Second
Vacuum tube based electronic computers are...? generation generation
Which generation of computer was developed from Second
microchips? generation First generation
Which generation of computer uses more than one Second
microprocessor? generation Third generation
Which generation of computer developed using Second
integrated circuits? generation Third generation
Which generation of computer developed using solid Second
state components? generation Third generation

DATABASES

Specification, Programming,
Name three steps involved in developing an Design, and Design, and
information system Testing Testing
_______ is used for CAAT as database Oracle ACL
Generalized audit software perform auditors to
undertake any past records and not concurrent
auditing TRUE FALSE
Generalized audit software is a file whose
capabilities for verifying processing is logic TRUE FALSE
CAAT's are computer program and data that auditor
uses as part of the audit procedures to process data
if audit significance contained in an entity
information system TRUE FALSE
CAAT do not contains package programs, purpose
written program, utility programs or system
management programs yes no
Embedded audit routines are sometimes built into
an entity's computer system to provide data for
later user by the auditor TRUE FALSE
SCARF involves embedding audit software modules
within an application system to provide continuous
monitoring TRUE FALSE
Concurrent use auditors as the member of the
system TRUE false
Regular cross system verification may minimize
frauds true false
Computer security is frequently associated with
confidentiality, integrity and authentication true false
Data reserve engineering process metadata to
document system and abstract business rules and
relationship true false
to determine review and
the audit evaluate the
The first step for developing CAAT is_________ objective types of data
Using the open database connectivity feature in ACL can bring the can bring the
is ______________ data directly data indirectly

Computer Assisted Audited Technique involves the


use of computers through "Black Box Approach" True False
White Box Approach necessary involves expert
knowledge on the part of Auditor True False
change in the
method of
The transition from manual system to CIS recording use of
environment bring dramatic changes including accounting accounting
________________ transaction codes

documents driven risk driven


Auditing with computer necessarily supports the approach approach
hardware and processing
CAAT involves an Auditors' appreciation of software options, file data
__________ configuration structure
Widespread end use computing result in unlimited
errors creeping into system going to accept
handling, thereby increasing audit risks true false

For computerized auditing usage of sophisticated


audit software would be a necessity true false

the source of
data available source of data
Important knowledge needed to begin planning the to the audit for material
use of CAAT is _________ organization planing
The move towards paperless EDI would eliminate
much of the traditional audit trail, radically changing
the nature of audit evidence true false
providing access
to computer to
Computer operation controls are designed to the of by all all organization
provide ________________ concerned personnel

Systems development control, apart from others,


include authorization, approval, testing,
implementation and documentation of new systems
software and system software modification true false
natural/man-
A system could be _________ made open/closed
A system exhibits 'entropy' true false
Super computer are the largest and fastest and is
very suitable for commercial application including
audit work true false
Assembler language uses Mnemonic symbols true false
manage
Operating systems are devised to optimize the hardware &
machine capabilities, the function software
include_______________ scheduled jobs resources

General purpose software provides a framework for


highly complex scientific operation true false
In batch processing, transactions are processed one
after another true false

The use of computer assisted audit techniques is with audit with production
not gaining popularity not only ________________ departments departments
On-line processing refers to grouping of transaction
and processing the same in one go from start to
finish true false
Real time refers to the technique of updating files
with transaction data immediately after the
occurrence of the event to which it relates true false
In OLRT the CPU should process the capability of
program interruption true false
Time sharing system allow access to a CPU from
remote terminals true false
DSS is defined as a system that provides tools to
managers to assist them in solving structured
problems true false
planning
DSS has the following components _________________ databases language
Master files contains current records for
identification and summarizing true false
Transaction files contain relatively permanent
records take product profile, customer profile,
employee profile etc true false

Master file configuration includes ____________ reference files table files


______ is a file management software package that
lets users and programmers organize data into files
and then process those files filex file-o-man
to have a
complete decentralized
CAATS provide added value to the clients because picture of a picture of a
_______________ system system
File volatility refers to the number of addition and
deletions to the file in a given period of time true false
File activity is the proportion of transaction file
records that are actually used and accessed in a
given processing run: true false
File interrogation refers to the _____ of information
from a file back-ups retrieval
One -to-one relationship means a single entity to a
single entity in a monogamous structure true false
RDBMS is structured to a series of 2 dimensional
tables true false

seriously affected subject area


SADB stands for ____________ database database
Controls are present over many aspects of the
computer system and its surrounding social
environment true false
In framed checking the data entry is checked
against an expected picture or format true false

Errors are correlated_________ at the year end immediately


Field check is exclusive to a field true false

_________ law basically states that there is a specific


probability of the first digit of a no. being 1,2,3 etc Benfish Benford

Check digit is a group of nos. added to a code for


determining the accuracy of other digits in the code true false
blocks of nos. to
consecutive nos. the primary
or alphabets to attribute of the
Hierarchical code means _________ entities the entity
The validation checks applied to a field depend on
the field's logical inter relationships with other fields
in the record TRUE false
The contents of a field could determine _______ sign invalid,
for a ______ field valid, numeric alphabetic

Batch is the process of ______ together _____ that grouping, regrouping,


bear some type of relationship to one another transaction events
Hash totals means meaningless totals true false
With OLRT where interactive data entry is available,
the master file associated with a transaction may be
searched for confirming data true false
Controls are required for authorization to ensure
data integrity and detect possible breaches in
security true false
Data from client application are not stored in the
organization's database through auditables events
and function true false
All input records in a batch are normally of different
types true false

interactive
incremental data
design and extraction and
IDEA stands for _________________________________ enlarge activity analysis
A transaction file is sorted prior to the update of
master file true false
A sequence check on the transaction or master files
by an update program is not required true false
Whenever monetary transactions are processed
against master files, the update program should
maintain a correlation account to record such
transaction that does not have a matching master
file record true false
Internal tables are stored tables from which certain
values are extracted for further processing and
storing true false

For small to medium sized systems, individual


modules are coded and individually tested and then
assembled to be tested as a whole-the testing
strategy is referred to as ___________________ e-brain bouncing ball

In systems testing, test involves_________________ bottom up tests top-down tests


Recording transactions in a controlled manner may
amount to loss of stored data yes no

provide
read data on information to
Audit software is used by the auditor to _________ client's file the audit
Core image comparison is a software used by the
auditor to compare _______ version of a program executables,
with a secure ________ copy master deleted, hard
Database analyzer is a software which provides
detailed information concerning the operation of the
database true false
system
system analysis advanced
SAS stands for ______________ software software
Embedded code is a software used by the auditor to
examine backup data true false

Embedded code performs wide variety of audit task yes no


Core image comparison is particularly useful where
only executable versions are distributed true false
Log analysis is a software used by auditor to detect
virus true false

On line testing techniques the auditor ______ data


either _______ or fictitious in order to see that a manipulates,
specific program or sever edit test is doing its work real create, false
Mapping software is used by the auditor to list
unused program instructions true false
Mapping software has very objectives yes no
can enable the
auditor to
execute
can be very provisions on a
Modeling is a variety of software which powerful number of
________________ analytical tool different bases
On line testing can be targeted for specific functions
carried out by programs yes no

identifies
program code
which may be
provides detailed there for
information of fraudulent
Program code analysis involves _____________ machine uses reason
__________ is a software of CAAT IDEA ACL

Snapshot is software which takes a picture of a file


or data or a transaction passing though the system true false

fictitious data
applied against comparison of
the client source version of
Base case system evaluation includes____________ program a programmed
While base testing forces on finding if there are any
defective execution policies in a program true false
Black box testing seeks to determine whether
application output is what it is supposed to be true false

In integrated test facility approach the auditor


should ensure that the impact of test transaction is
subsequently eliminated from the computer files true false
Black box testing is _______ based and white box specification,
testing is _______ based program file, hardware

identifying identifying
Source code review means__________ erroneous code ineffective code
In formula in flow hypothesis the auditor should
expand the extent of substantive tests to
determine how the defects may impact the
attainment of the program objectives true false
All material application oriented events that occur
within the boundary subsystem should be recorded
in the accounting audit trail true false
authentication of
In examination of audit trail the following data start and finish information
associated with an event may be ___________- time support

job control job connectivity


JCL means_________________ language language
Audit should be periodically analyzed to detect any
control weakness of the system yes no
In an accounting audit trail, intrusion detection
system might monitor the amount of processor time
consumed by the user to detect unusual deviation
from the amount processor time requested by the
user in the past true false
A sample size calculator program assists auditors in
determining RAND() function true false

package
computer
p[program for
performing a
variety of data
processing mathematical
Generalized audit software consists ___________ function concept

prepared by the prepared by the


Specializes audit program may be___________ auditor entity

Generalised audit software could be used by the


following in consistencies or significant fluctuations true false
file
Generalized audit software function access/organizati statistical/arithm
include____________ ons etic operation
In the file reorganization merging capabilities are
needed in data from separate file is to be combined
on a separate work file true false
Auditors cannot use generalised audit software to
extract the data needed for audit purpose true false
Auditors can combine functional capabilities of examining the
generalized audit software to accomplish the task of quality of system carrying
__________________ process analytical review

Wide access to Can extract and


Which of the following is not the feature of GAPs various data base analyse data

Which is the example of CAATs ACL IDEA

A sample of A utility software


In audit procedures, test data is transactions programme

Tests of details of Analytical review


Which of the following is not the use of CAATs transactions procedures
Which of the following are called explicitly by Action
another procedure? Macros Procedures
_________ data type is generally used for fields
assigned as primary keys in a table integer number

MS access objects can be published in the web true false


In code-builder, got_focuse, click,dbl_click,enter are
examples of _______ actions events
_______can be used to automate certain actions in
response to events report form
In the macro sheet the macro is selected in the expression
_____field macro elements

To build complex expressions_____is used calculator code builder

The three list boxes present at the bottom of the


expression builder are called_____ action list macro list
________option is selected from the view menu to
create macros with conditions conditions action
_______report can be created with minimum user
input tabular columnar

_______layout of a form displays one record at a time tabular columnar


The table or query name on which we are going to
build our report is selected from the ____ dialogue
box create report link report
______and_____are the two types of auto reports columnar and stable and
available tabular unstable
There are no wizards for creating a database in
access true false
______option from the insert menu option is chosen
to add an embedded chart create fields add chart
In ms-access, while using SQL, references constraint
is used for creating _______ primary key alternate key
_______is used to create a mailing label label wizard chart wizard
______header is present at the beginning of the
report start header group header
______is present at the bottom of each page in a
report report footer page footer

for ordering for updating


In SQL, having clause is used for _________ records records
______field is added to the macro sheet when we
select grouping option from the view menu condition group
______can be used to create toolbars VB Modules reports
_______query is used to add records from one or
more tables into an existing table add append
_______window is used to write VB code in access
application report macro sheet
Values for other tables, queries are maintained in
look up fields data type true false
Visual Basic language is a _____ tool RAD RAP

______ function is used to display a message box SysCmd MsgBox

Other ms-office applications can be accessed from


ms-access using a concept called ________ OLE DDE

object linking
OLE stands for_____ and embedding on line execution
The application that supplies data in OLE is called
an _________ OLE object OLE client
If any change made on the object from the client
side is reflected on the server then the object is said
to be _____ linked embedded
_______is the file format that works on internet exe DLL
______ is used to convert any ms-access object into
html format form wizard report wizard
_______ option in publish to web wizard produces a
page that is static in nature static file static html
_______query is used to create or change database
objects in a current database append add

Currency fields express the amount in _________ dollars rupees


_______is selected from the toolbar to add an OLE
object unbound object bound object

To display an OLE object in the form of an icon ____


option is selected from insert object dialogue box display as icon display
_______option from the file menu is selected to run
'publish to the web wizard' create html new

_____page in an web application is used to navigate


to the rest of the pages in the application startup home
______ is fired when an event is triggered is the
concept based on a Visual Basic language bullet command
Ms access is a ___________ DBMS RDBMS
A collection of data stored in different objects is
known as a _________ data group data collection
new blank
database dialog
A blank database can be created using __________ new dialog box box

Text type data can be of _____ characters in ACCESS 255 64000


______is a datatype that assigns values automatic
automatically number AutoNumber

Tables cannot be imported from other databases true false


If two tables having same values for the fields are
joined it is called an ______ inner join outer join
Duplication of records in a field won't be allowed if
the fields are declared a________ primary key not null

Changes from a master table can be reflected on to cascade delete cascade change
the child table by selecting _____option related records related records
To see more than one record at a time in a form we
use _______ columnar tabular

In SQL, delete command is used to remove _________ table or tables query or queries

In MS-Access, filter excluding selection will display


only those record(s) which meet the criteria. true false
Properties of the fields are managed by _____ in
Dynaset property field field property
______queries allows us to view data in row by crosstab row/column
column manner queries queries
The type of queries that can update or delete row/column
record(s) in a table(s) are called __________ action queries queries
Joining tables without any matching values in the
fields is called ____________ inner join self join
Primary key uniquely identifies each record true false
Which of the following dialog box is/are used in the new form dialog form create
creation of form ________ box dialog box
_______ query wizards are used to generate
summary calculations for a table summary sum
Properties of a form can be changed by selecting change
______from view menu options properties properties
Forms that are included in other forms are called
______________ included form sub form
In MS-Access, while using form design view, for
creating a command button for adding a new
record, we should select the _______ category from Record Record
the command button wizard Navigation Operations

_______ form displays fields in a single horizontal row columnar form tabular form
The process of arranging the data in a meaningful
order is known as ___________ filtering ordering
______ are used to select only some particular
records from the table or any other database
objects filter sorts
In MS-Access, user may specify criteria for filter in filter by
form view using _________ filter by form selection
___wildcard character represents any single
character * $
Records cannot be sorted by a primary key true false
A control without a data source is known as unbound
___________ bound control control
Set of related option buttons, check boxes and
toggle buttons is known as _____________ button group option group

Which of the following is control types ____________ bound unbound


In MS-Access, the function that gives the current
date is _____________ CURRDATE() TODAY()
_____is a control that lists set of data text box list box

______is a form that summarize large amount of data pivot table columnar form
______allows to create a filter by typing the value in
a data sheet data sheet filter filter by input

Wizards for toolbox controls are called a __________ button wizard control wizard
The wild card representation for any 5 letter word
that starts with ram is ________________ ram* ram??
Look up fields slow up data entry true false
____is an access object that displays un-editable
data report form
_____option from the new object toolbar gives the
easiest way of generating a report autoreport report
______ represents data in a pictorial format chart label
Changes of one table can be carried over to another
related table true false
Hyperlinks are used to jump to any kind of
information or data from a file true false
The memo field can have text upto_____ characters
in length 60,000 255
In MS-Access, columnar layout can be used to view
multiple records in a form true false
In MS-Access, alter command may be used in
adding a primary key to a table true false
Update query is used to add records from one or
more tables to the end of an existing table true false
In ms-access, datasheet view is available in
___________ table query
______are used to jump to any kind of information
from a datasheet or a form table form
Home page will always be present as a first page of
an application true false
Make table queries create a new table from the
records of another table true false
In ms-access, to protect a database file from illegal
access, we may set database password. The option
of setting database password is available in _______
menu Insert Records
Foreign key is a field that uniquely identifies each
record and accept no null values true false
Data definition queries are used to create or change
database objects true false
The attributes of a composite key are known as
________ alternate keys composite keys
OLE object is a data type in access true false
Data displayed in forms cannot be edited true false
A sub form is used to display one to many
relationship between tables true false
We can switch from datasheet view to form view by
selecting view -> form view option true false
In MS-Access long integer is a datatype true false
In MS-Access, while designing a table for a
particular field, the Required parameter is set to
yes. This validates the field as _______ null not null
Sorting is applied to select only some particular
records true false
Filter by form can be created from a forms shortcut
menu true false
Advanced filter uses a filter similar to the query
design window to create a filter true false
? Wildcard character represents any number of
characters true false
_________ of the following is/are a type of chart pie bar
A bound control is tied to a underlying query or
table true false
A calculated control uses expression as a source of
data true false
Text boxes cannot be bound controls true false
The default query invoked by ms-access is update query select query
A control can be bind to a record using row source
property true false
List box is a control that offers a list of choices true false
If a table is joined to itself it is called a
________________ inner join outer join
A picture box combines the activities of both a text
box or a list box true false
Line is a tool box control true false
Text boxes can be part of a option group true false
_____ chart exists as a separate object freestanding embedded
Filtering data is a way of arranging data in a
meaning full order true false
Wild card characters are used for sorting records true false
Pivot tables are used to navigate to the other tables
in a database true false
Reports are used to represent un-editable data true false
In MS -Access, the records in a table are sorted the first field of the last field of
based on _________ the table the table

Relationship is an association between _________ forms reports


Summary options dialog box is used to summarize
data true false
______ queries can be used to delete a group of
records that meet some specific records delete insert
Charts can convert numerical data in a easily
understandable format true false
Embedded charts exist separately true false
From ms - access, if we want to view the records
stored in a table in ms - excel worksheet, we need
to use hyperlink use import
Page header is present at the beginning of each
record true false
Detail section has a header and footer true false
A macro is performed only when the user initiates
an event true false
The macro is selected from the action field of a
macro sheet true false
A macro can be made to execute before the starting
of a database true false
In MS-Access. While appending records, the source
and the target table must have similar structure and
fields true false

We can add our own functions to the expression


elements list box of the expression builder true false

_______is the wildcard character which represents


the presence of any number of characters & #
Macros can be used to add a menu to a database
object true false
_____ header is a unique feature of reports page detail
Chart can either be a form or a report true false
Group header will be present at the design view of a
report even if the report is not grouped true false
We can change from the design view to the form
view without being prompted for saving the changes
made true false
Charts can be produced without the wizard true false
Macros can be used to create user defined error
messages true false
Between and Not Between is ______ type of
operators relational list
The default data type of VB is integer true false

structured query
Visual Basic is based on __________ action language language
_______is the name of the database object that
displays data and can be used to edit data report form
In access OLE objects cannot be linked true false

_____ section is present for each record in the report group record
A ________ sheet lists all the properties that pertain
to the form or the controls data property
Textboxes can also be an example of unbound
control true false
In MS-Access, we may design command buttons for
navigating records true false

_______are forms that are included in other forms sub forms child forms
_______ are used to represent our data in graphical
format graphs chart

A field with a _______ uniquely identifies each record number primary key
Large amount of data can be summarized using
______ tables pivot create
_______ are employed to select only some particular
records from a database object filters queries
______ control need not have a data source form bound
______ control combines the functionality of both a
text box and a drop down list list box combo box
MS access is a DBMS true false
A form can be bind to a record source using _____
property of the form form name control
______ forms displays field in single row tabular form chart form
______ forms are usually used for tables with one to
many relationship sub forms tabular form
_______ control uses an expression as a source of
control calculated bound
_______ control is tied to field calculated unbound
_______is the form that can be created with
minimum input from the user sub form auto form
______option from the tool menu is selected for
setting relationships between tables set relation connect
option, toggle command
______,______and_____are the buttons belonging to and command button, check
the options group buttons and list boxes
_________allows us to create a filter from a field
short cut menu filter by form filter by report
________is a database object which displays data but
cannot be used to edit data form report
What term applies to a collection of related records
in a database? clipboard file
All of the following terms are related to
computerized databases except which one? search sort

A way to analyse
and manipulate A tool to produce
numerical high quality
What is a database? information documents

It contains all
Information about the data about
What does a record contain? certain programs one specific item

An RDBMS is a remote DBMS relative DBMS


storing data
offline at a backing up data
Data Warehousing refers to separate site regularly

Unauthorised alteration of on-line records can be Computer


prevented by employing Key verification sequence checks

Reports allow Reports provide


users to extract a very flexible
information as way of creating
hard copy and editing
What is a report? (printed output) documents

Spreadsheets
Extracting and make data easy
What is the best way to analyse and change data analysing data to analyse

Compilers, Network
What are some popular office orientated software interpreters, software, backup
applications? editors systems
DEFAULT and
Which of the following constraints can be used to NOT NULL FOREIGN KEY
enforce the uniqueness of rows in a table? constraints constraints
Which of the following commands is used to change
the structure of table? CHANGE TABLE MODIFY TABLE

You are creating a client application that calls


ActiveX DLLs. Which of the following properties of
the Err object provides the name of a component
that sends an error back to the client application? Number Description

This database holds personal information. The user keeping a


can help to keep it confidential by using a password backup copy
If the database holds customer names and
addresses, personalised letters can be created
automatically using the product code the primary key
Application software suited to storing the survey
information obtained in the table would be A database Graphics
The characters * and ? are sometimes used in
search criteria as bookmarks operators
Which of the following field types will generate the
primary key automatically? Auto Primary Auto ID

records in a
dynaset are related tables in
consistent with a database are
the underlying consistent with
Referential integrity ensures that the: tables. one another.

main form and a


Tables are related to one another through a: foreign key. subform.
the primary key the primary key
of both related of the related
A foreign key is: tables. table.
You are creating a banking database to track
customer loans. The bank will, of course, have many
customers, each of whom may take out one or more
loans, while each loan may be associated with only
one customer (there are no joint accounts). What is
the re One-to-one One-to-many

In a one-to-many relationship between Companies


and Employees, which field is found in both tables? EmployeeID CompanyID
Which of the following ensures that records in
related tables are consistent with one another? For The Tools menu,
example, it ensures that you cannot add a record Relationship Referential
with an invalid foreign key. window integrity

Right-click the
Relationship line,
then select
How would you delete a relationship between tables Double click the Delete from the
in the Relationships window? Relationship line shortcut menu
That there are
several
customers That some of the
In a Customers tables, what does a plus sign next to associated with data is not
the CustomerID field mean? that ID viewable

They must both They cannot be


What is required of the fields that join two tables? be numbers text fields
Assume a one-to-many relationship between the
Customers table and the Loans table, with
referential integrity in effect. What happens when Nothing, Access The customer’s
you attempt to delete a customer ID from the ignores the ID is deleted
Customer table that still has entries in the Loans attempted from the
table? command. Customers table.

Which of the following is true when viewing a main The subform is


form and its associated subform in the Form Design The subform is displayed in
view? not visible. Datasheet view.

A one-to-many A one-to-many
Which of the following relationships does not belong relationship relationship
in a database based on a professional sports league between teams between teams
such as football or basketball? and players and coaches
Which symbol is used at the end of the join line in a
related table to signify the “many” side of a one-to-
many relationship? # M

The Customers
table only when
You have created a one-to-many relationship with there are Loan
referential integrity between a Customers table and records
a Loans table. From which table can you delete a Either table at associated with
record? any time that customer
The correct order of the arguments for the MsgBox prompt, title bar prompt, icon,
statement is: text, icon. title bar text.
The first statement in a procedure named CreateList
is: Dim CreateList. Sub CreateList.

A check box A text field


enables the form enables the form
user to choose user to choose
from one of from one of
Which of the following is TRUE related to form several existing several existing
fields? entries. entries.
must be set for must be set for
A text field: one word. multiple words.

help people keep store data in


The purpose of a database is to: track of things. tables.
A database stores: data. relationships.
A database records: facts. figures.
single-user multiuser
A sales contact manager used by a salesperson is
database database
an example of _______________ application application
single-user multiuser
A Customer Resource Management (CRM) system is database database
an example of_________ application application

The industry standard supported by all major DBMSs Structured


that allows tables to be joined together is called Sequential Query Question
__________. Language (SQL) Language (SQL)
Database
A program whose job is to create, process and Database Management
administer databases is called the _____ Modeling System System
Microsoft Access may use which of the following
DBMS engines? Jet SQL Server

Which of the following are basic components of an The database


enterprise-class database system? The user application
the database
application(s) the DBMS
interact(s) with accesses the
In an enterprise-class database system ________ . the DBMS database data
In an enterprise-class database system, the
database application ___ . creates queries creates form

In an enterprise-class database system, reports are the database


created by ____________________ . the user application

A database is considered "self-describing" because all the users' data it reduces data
_______ . is in one place duplication
In an enterprise-class database system, the
database _________ . holds user data holds metadata
as a new
A database designed using spreadsheets from the systems
Sales department is a database being designed from existing development
_________________________ . data project
as a new
A database designed to implement requirements for from existing systems
a reporting application needed by the Sales non-database development
department is a database being designed _______ . data project
as a new
A database designed to combine two databases systems
used by the Sales department is a database being from existing development
designed _________________________ . data project

Database professionals use ________________ as


specific data sources for studies and analyses. data marts normalization
Database professionals use a set of principles called
________________ to guide and assess database
design. data marts normalization
A very popular development technique used by
database professionals for database design is
known as _______________________ . data marts normalization

A very popular development technique used by


database professionals to adopt a database design
to new or changing requirement is known as _____ . data marts normalization
The predecessor(s) of database processing was hierarchical
(were) __________ . file managers models
entities in a the order of the
column vary as to columns is
In a relation __________________________ . kind important
An attribute is also known as a(n)
. table relation
A combination of one or more columns used to
identify particular rows in a is___ . record field
A combination of two or more columns used to
identify particular rows in a relation is________ . record field
A determinant that determines all the other
columns in a relation is______ . record field

When designing a database, one of the candidate


keys in a relation is selected as the _________ . composite key primary key
Normalization is a process used to deal with which
of the following modification anomalies? Insertion anomaly Update anomaly
assess the
When you are given a set of tables and asked to existing tables' design the
create a database to store their data, the first step structure and database
is to ____ . content structure
are supplied by
several well- were essentially
Modern microcomputer personal DBMS established killed off by MS
products______. manufacturers Access

Their report
delivery is more
They use difficult than
sophisticated report delivery
Which of the following are true about data mining mathematical for reporting
applications? techniques. systems.
We have obtained access to the company's
operational data. We examine 50 records for
customers with phone numbers that should use the
current area code of 345. Of these 50 records, we
find 10 that still use an older area code of 567. This
is an example dirty data inconsistent data
We have obtained access to the company's
operational data. We have been asked to produce a
report with an item by item analysis of sales, but
the only sales figure available is the total sale value
for each order. This is example of_____ dirty data inconsistent data

data warehouse data warehouse


A data warehouse database differs from an data are not databases do not
operational database because: stored in tables. have metadata.
Which of the following objects is used to display a
menu? Form Table
Which of the following objects are NOT found in an Forms and Queries and
Access application? reports tables

It will be easier
It will be easier for the user to
for the user to upgrade it if the
upgrade it if the objects are in
You are developing an Access application that you objects and one database
expect to upgrade periodically. Which of the tables are in one and the tables in
following statements is TRUE? database. another.

An application
may consist of
multiple
The Link Tables databases, each
command can be with multiple
used to associate objects, linked to
the tables in one yet another
database with the database
Which of the following statements regarding Access objects in another containing only
applications is NOT true? database. tables.
Which of the following brings a copy of the table
into the current database and does not maintain a
tie to the original table? Import Link
It contains
tables, reports,
It contains more queries, and
What makes a database an application? than one table forms
What is the Access tool that is used to create the
user interface? Menu Wizard Build Menu

create backups
for mission centralize the
critical corporate manageability of
The purpose of a data warehouse is to: data. data collection.
___________ means the result of applying to specific Digital
information certain specific technical processes. Digital Sign Certificate
__________ is an algorithm which creates a digital
representation or "fingerprint" in the form of a "hash
result". Hash Function Digital Signature
__________ is of standard length which is usually
much smaller than the message but nevertheless
substantially unique to it. Hash Function Hash Value

Digital Signature involves two processes. They are Digital Signature Digital Signature
___________ and __________. creation Verification
Institutional
Overhead and
Subscriber Subscriber
The Costs of Digital Signature consists mainly of the Relying Party Relying Party
following Cost Cost
Certification Certified
CA stands for ________________ Authority Authority

A Digital Certificate is issued by a Certification


Authority and is signed with the CA's Private Key True False

A Digital Certificate does contain Owner's Public


Key, Owner's name, Expiration date of the Private
Key, Serial number of the digital certificate True False

______________ enable web servers to operate in a Developer


secure mode. Server Certificate Certificate
______________ are used by individuals when they
exchange messages with other users or online Developer
services. Server Certificate Certificate
______________ are on-line databases of certificates
and other information available for retrieval and use
in verifying digital signatures. Private Certificate Repositories

Evidence,
Signing Writings serve the following general Ceremony, Approval,
purposes______,_______,_______ and _______ Approval Evidence
The most widely accepted format for Digital
Certificate is defined by the CCITT X.509 True False

A certificate may prove to be unreliable, such as in


situations where the subscriber misrepresents his
identity to the certification authority True False

Certificate Certificate
CRL stands for Revocation List Resource List
The prospective signer identified in the digital
certificate holds the_________ and is called the Private Key, Public key,
___________ Subscriber Recipient
In EDI interface, the translation service receives
_________ as incoming files from the communication Internal Format External Format
service File File
The EDI standardisation for International Trade and
Commerce is introduced by __________ ANSI UN/EBCDIC
In EDI, the transmission files are composed of
different sets of external format files which are
grouped into multiple sets under the name of
________ batch files interchange sets
The ________________ are pre-paid credit cards that
include an embedded cards Smart Card Embedded cards
________________ are another form of credit payment
that lets customers use digital online cheques to
pay Web merchants directly E-cash Digital Cash

In Active advertisement, there are two types of Billboards and Online Catalog
models. They are _____ and ________ Junk Mail and Billboards

The network based technology is/are ____________ EDI E-mail

Decryption is a process employed for scrambling of


plain text for web based transactions True False

Asymmetric cryptosystem is based on __________ Login_Id and Primary Key and


and ____________ Password Private Key

Value Added Network is an example of _________ Global Network Private Network


Passive or pull-
The advertising strategies emerging in the on-line Active or push based
world are ____________ based advertising advertising

The _________ model use direct mail, spot television


or cable television, in active based advertisement. Broadcast Junk mail
The ________ is a form of mail that is not targeted to
a specific audience E-mail Bulk-mail
The __________ model refers to information that is
placed at a point where it will be noticed by
customers in the course of other activities and does
not require active search Catalog Endorsement

The most beneficial advantage of ERP system is Error checking Data Integration

What is the term that describes spying on one’s Competitive Corporate


business rivals to gain a competitive advantage? espionage espionage
Contact numbers
A list of of the
What would you NOT be looking for when spying on competitor’s management
a competitor? clients group
single-user multi-user
An online drugstore such as Drugstore.com is an database database
example of_______ application application
Which of the following is an example of Replying Keeping
unacceptable online ‘netiquette’? promptly messages short

Message
Removable drives authentication in
that can be EDI systems
locked up at night performs the
provide adequate same function as
security when the segregation of
Which of the following statements is correct confidentiality of duties in other
concerning the security of messages in an data is the information
electronic data interchange (EDI) system? primary risk. systems.

The wizard that is used to import text files text import convert text to
is_________________ wizard columns wizard
The alphabet indicating the column followed by the
row number is known an__________ cell reference row reference
Which of the following files could not be opened in
excel _______________ text files Lotus 1-2-3
In excel, the dates that are stored as sequential
numbers known as ________________- serial values domain values
The command to display the current date in a cell is
_________________ =today() =date()

In excel, absolute references are represented by a


________ before the column and row addresses dollar sign ' = ' sign
The ________ can be used to select the function and
assemble the arguments correctly AutoSum AutoFill

Specific parts of information required by functions


to perform certain tasks are called as___________ variables arguments

Which of the following do not belong to the formula


category in excel environment__________ text logical
The function that in used to join cell values together
in a single cell ________ concatenate pmt
The function that is used to count all the values that
meet specific criteria _________ countif vlookup
The wizard that is used to create and edit charts
_______________ pivot table wizard chart wizard
The function that is used to calculate the payment
for specific loan terms ____________ sumif pmt

The function that is used to add together all values


that meet specific criteria is known as ____________ average sum
The __________ option present in the file menu
options is used to specify major facts of the page to
be printed page setup print area
The command that is used to apply a format
automatically __________ autoformat AutoFill
The ____________ makes the information in a
worksheet meaningful and easy to understand bordering formatting
A particular part of a work sheet can be printed by
setting the _________ page setup print area
The process of finding or selecting information is
known as ____________ filtering searching
The option that is used to cancel the filter process
for a specific column and display all the records is
________ all option blanks

The URL for encyclopedia Britannica is_________ www.ency.in www.eb.com


_______ maps IP addresses with the domain names
of the sites URL DNS
network of
Internet can be defined as _______ internal network network
The most important service of the ______ is to
manage traffic control application layer transport layer
_________is a program that displays information
about a host connected to the net finger service ping service
_______ is a program or a tool that helps in locating a
file anywhere on the net FTP TELNET

uniform research uniform resource


URL stands for ____________ locator locator
name of the
IN an URL the word before the color refers to _______ host computer resource
A ______ always begins with a slash message scheme
Prodigy is run by IBM and ______ Delphi Microsoft
The World Wide Web is referred to shortly as the
_______ net web
read the Usenet
Gopher and WAIS enables the user to ______ browser news
______ is the program used to run CompuServe's CompuServe
regular services internet dialer spy mosaic
Navigating through the menu of gopher is called
moving around _______ gophering gopherspace
The directories that come with built-in engines are
yahoo,lycos and ______ Alta vista open text
To use the finger command,SLIP users must run a
programme called______ finger server ftp server
The web maps are called _______ list directories

Directories consists of _______ levels no maximum of five


The _____ level gives the broadcast overview of the
net middle lower
The huge list of keywords from important items is
called ______ hotlist directory
directory index
The two types of search in veronica are _____ and search,index search,menu
______ search search
_______ searches by keywords infoseek excite
Mosaic displays links in color whereas _____ does not
display links in color netshark cello
______ supports one button publish lynx mosaic
SPY MOSAIC is distributed by_______ Microsoft internet
______ is a program that helps us to log on to other
networks Usenet finger service
Hyper text
Higher text transmission
HTTP is the acronym for __________ transfer protocol port
______is used to transfer and copy files over the
internet iccp ftp
_____ is a program that helps us to log on to other
networks yahoo ftp
transmission
control
transfer control protocol/internet
TCP/IP stands for ________________ protocol/internet protocol
Archie servers can be accessed in_______ different
ways in internet one two
_______is the computer on the internet that
translates between the internet domain names and domain name
the internet numeric address ftp servers servers
the internet the internet
TIA stands for_____ in internet adapter administration

Service indicates the name of the ________ used to


access data, present on the other end of the link. browser protocol

universal uniform resource


________ is used to link pages in the world wide web resource locator locator

frequent asked frequently asked


FAQ stands for ______ query question

The internet adapter is a programme that makes


our connection act like a _____or a ____ account SLIP,PPP TCP,IP
The step involved in Communicating between the
web clients and servers is ______________ connection response

wide search for windows sockets


information and internets relay
WSIRC stands for______ research chat

Two of the important browsers are_____ and_____ lynx,minx netscape,ie


Lynx is a _______ programme that works with world wide web world wide web
terminals server client
The huge list of keywords from important items is
called an_____ glossary index
very easy and very organised
rodent oriented network
net wide index to integration and
computerized communication
VERONICA is an acronym for _______________ archives application
university of university of
The first freenet is created at the_____ and is berkeley,berkeley cleveland,clevel
called______ freenet and freenet
________ are defined as ways of communication
amongst networks protocols IP address
search
engines,directorie
______and_____ are web searching features s ftp and finger

WINWAIS has two source lists namely____ and______ allsrc,winsocks wais,allsrc


________ is also called as WAIS manager allsrc waisman
The system of interlinked documents is known
as_______ hot links hyper text
The small programmes that create
animation,multimedia,real-time games and multi
user games are called______ images applets
The information displayed on the web page graphics,videos,a programms,imag
includes______,_____ and_____ udio es,text
The web pages that represent online home of their
author are called______ first page home page

global network global networks


GNN stands for______ news navigator
_____ is the most popular internet service yahoo service electronic mail
Netscape page
starter
The online service offered by navigator gold 2.0 are email and net site,netscape
_______ and_____ conference page wizard
_______ is a program or a tool that helps us find a file
anywhere on the net newsgroup telnet
The databases to enable keyword search using
Lycos are a2z,_______ Lycos catalog point review
______ is a large worldwide bulletin board service
network apple link bitnet

computer related
abbreviations and biographical
BABEL consists a glossary of _____ acronym information

Dictionaries,encyclopaedias,government and other encyclopedia on-line reference


references are found in ______ Britannica works

Yahoo,lycos,excite and webcrawlers are _____ search engines web directories


Graphical Graphical
interpreter interchange
GIF is the acronym for ____________ formatting Format

Joint Pictures Jumbled pictures


JPEG is the acronym for ___________ Expert Group expert graph
The Web aids users to explore the ________ mails documents
The three most popular mailer are_____,_____ yahoo,infoseek,al
and______ tavista netscape,ie,lynx

The World Wide Web consists of _________ information web pages


In Microsoft Internet Explorer, the color of the text
can be specified using _________ attribute of the font
tag. BACKGROUND COLOR
Common
The interface that provides effective communication Communication graphical
between the web browsers and servers is _________ gateway interface Interface
CGI is the _________ between web browsers and
servers Network Interface
CGI programs are invoked based on the information
provided by the _________ Current web page Browser
A CGI program is usually called after a request
made by the _________ Browser/user Server

A hyperlink can be on ___________ text only image only


HTML was derived from _________ SQL PLSQL
SGML is a _________ alphalanguage betalanguage
palm is not
PINE stands for _____________ eatable palm is not elm
The application that confirms whether a document SGML
is compliant to its DTD is _________ SGML Processor Preprocessor
Web is a collection of ___________ web sites images
International
Internet Engineering
equipment trainers and
IETF stands for ________ training faculty faculty

MS Internet Netscape
The two major browsers used to surf the Internet Explorer and Navigator and
are ________,_______ Mosaic Mosaic
Special characters allow browsers to display data from a
_________________ text database
The keyword for providing links within or across
documents is____________ hyperlink hypertext

Stringing pages together using hypertext in sequential


technology helps view pages _______________ in random order order
The initial web pages present in a web site is the
________ page. first start
The image format supported by most browsers
is________________. .bmp and .gif .bmp and .jpeg
Service, service,hostnam
hostname and e,port,directory-
The components of a URL are ___________ directory path path

mail
mail servers,mail vendors,mail
The mail we send has a mailing address and most of clients and identification
them correspond to_____,_____ and alternate services and password
Which of the following is not supported by internet
explorer _______________ <center> <font size=n>
communication common
generated gateway
CGI stands for ____________ information interface
Host name indicates the domain name of the web
________ Server Client
The internet is also called as _______________ arpanet the net
peer-to-peer
The internet is similar to _________________ LAN connectivity

The net drivers______ from one place to another data parcel

The net provides interesting services scripting,parsing news,cooking


like______,______ and______ and compiling and fine arts

The windows internet software available nt,windows95,ie, mosaic,gopher,e


are______,_______,________ and______ winzip udora,trumpnet
________ is the ancestors of the internet dnet arpanet

defensive
administrative dedicated and
rank registered
DARPA stands for administration projects
_______________________________________________ network administration
The uuencode files start with a _______ start begin
milnet,smaller
DARPA is broken into ________ and _______ arpanet mailnet,inet
NSFNET is the united states provides service to education,researc
_____ and_____ h music and dance
The first international IP network connections were united states and
established in 1973 with _____ and_____ UK england,norway
A_____ is a set of computers interconnected by
transmission paths to exchange information in
internet server client
A computer that provides a service usable by other
computers is called______ client stand-alone
A_______ is the representation of physical network
connectivity of the computers in internet network card topology
detailed
transaction data terminal
DTE stands for ____________________ explanation equipment
The basic function of the ______ is transmitting the
bits over a channel application layer physical layer

point to point packet


network and switching,store
The point to point channel network is also called as broadcast and forward
_____ and_____ channel network network

Accessing files using FTP servers is called_____ file access anonymous ftp
The three most commonly used networks
are______,______ and______ PAN,NAN,AAN KAN,RAN,VAN
________ is in between LAN and WAN VAN MAN
_____ can be owed by multiple organisation LAN MAN
Data is transmitted in the form of_____ signals analog digital
Data type Define type of
DTD stands for __________ definition data
Moralize/demorali Modulation/dem
Modem stands for __________________ ze odulation
______ is the process of the digital signals being
converted into a form suitable for analog
transmission Mapping Modulation
Dedicated
________ and______ are two basic ways of getting Satellite link and access and dial
connected to the internet digital signals up access

Standard long Stream line


SLIP stands for ________________ internet protocol internet protocol

Prime prolonged Point to point


PPP stands for _____ protocol protocol

sending
Which of the following best describes uploading storing data on a information to a
information? disk drive host computer
A characteristic of a communication channel that is
the amount of information that can be passed
through it in a given amount of time, expressed in
bits per second. Bandwidth Speed
The act of searching through storage to locate
information without necessarily knowing of the
existence of the information being sought. Find Save

A "recipient" of the certificate desiring to rely upon


a Digital Signature created by the subscriber named
in the certificate is called the ____________ Recipient Party Relying Party

The Relying Party can use the ___________ listed in


the certificate to verify that the digital signature
was created with the corresponding _________ Public Key Private Key
Digital Signatures are used for a variety of Electronic
Electronic Transactions like ________________________ E-mail Commerce
To associate with a key pair with a prospective
signer, a Certification Authority issues Digital
Certificate Not False Not True
Digital Signatures, if properly implemented and Closed
utilized offer promising solutions to the problems of System,Formal
Imposters, Message Integrity, __________ and Legal Formal Legal
_____________ requirements Requirements
In, Digital Signature, _____________ perform the
"ceremonial" function of alerting the signer to the
fact that the signer is consummating a transaction
with legal consequences Affirmative Act Efficiency

A Digital Signature must have the following Signer Document


attributes ________________ and _____________ Authentication Authentication
"Hash Function" is used in both creating and
verifying Digital Signature Not True Not False
___________ provides assurance of the origin or
delivery of data in order to protect the sender
against false denial by the recipient that the data
has been received, or to protect the recipient
against false denial by the sender that the data was Nonrepudiation
sent. Service Digital signature
________ is a branch of applied mathematics
concerns itself with transforming messages into
seemingly unintelligible forms and back again. Cryptography Public Key

The complementary keys of an asymmetric


cryptosystem for Digital Signatures are arbitarily
termed as _________, and ____________ Private Key Public Key
_______ is known only to the signer and is used to
create the digital signature. Private Key Public Key

_______ is ordinarily more widely known and is used


by a relying party to verify the digital signature. Private Key Public Key
____________ is the art of protecting information by
transforming it into an unreadable format. Decryption Cipher

Which of the following activities would most likely Using data Performing
detect computer-related fraud? encryption. validity checks.

A digital signature is used primarily to determine Unaltered in Not intercepted


that a message is: transmission. en route.
Both sender and The private key
receiver must cannot be
have the private broken into
key before this fragments and
What is a major disadvantage to using a private key encryption distributed to
to encrypt data? method will work. the receiver.

Which of the following risks can be minimized by


requiring all employees accessing the information Data entry
system to use passwords? Collision. errors.
Business-to- Business-to-
The acronym for B2B is ___________ Business Backend
The _____________ model is the least intrusive model
but requires active search on the part of the
customer Billboard On-line Catalog
__________ is / are a form of advertisement where
people relate their experience with products and Customer
services Endorsements Billboard
The _________ are software agents who
communicate with the business merchants on
behalf of the customers Intermediaries portals
The Pre-purchase preparation phase includes
_______________ for a set of products Order Placement Service

The _________ phase includes customer service and


support to address customer complaints , product Post purchase Purchase
returns and products defects interaction consummation

The ________ allow companies to bypass the need for Billboard model
costly printed catalogs of marketing Online catalog

A ________________ is a basket on the Net that is


used to place the items that are being purchased Online Catalog Shopping cart
EDI For EDI For
Administration, Administration,
Commerce and Consumer and
EDIFACT is an abbreviation of ________ Transaction Transport
The __________ allows for protocol conversion and
communicates with the bank using the banks
private network or the Internet EDI TCP/IP
In Ecommerce, data extraction, transforming the
data into transmittable form, transmitting the data
and downloading the data are the operations
employed in _________ Compiler Interpreter
The _________ commerce assists in integrating the
customers and suppliers of the company directly Business-to- Business-to-
into the organisation Business Consumer

E-cash means______________________ Emergency Cash Electronic Cash


E-commerce is a tool that addresses the desire of
firms to cut services cost and improving the quality
of goods. It is a definition of e-commerce from Communication Business Process
_________ Perspective Perspective
The small denomination digital tokens are called Micro
_________ Microcash Transactions
The ____________ is the process of encoding
information to prevent it from being read by
unauthorized parties Decryption SSL
There are _________ types of data tables 1 2
The tables that allows the user to change or
rearrange the data, summarize the data and
evaluate the data using changing points of view is
known as data table filtered table
The wizard that is used to suggest hints for doing a
task pivot table wizard chart wizard
In a chart Y-axis is known as_________ series or rank category
In a chart X-axis is known as_______________ series or rank category
_________ is a set of tables that describe each of the
data series series or rank category
________ is used to differentiate one data series from
another series or rank category
The chart that contains only one data series is
_________ column chart bar chart

The chart that holds the column chart is _________ column chart bar chart
The chart that display two or more data series on a
surface is _________ column chart bar chart
The chart that is used to display discrete data column chart bar chart
wild card
_________ are not allowed in a macro name spaces characters
Which of the following tool cannot be used to view
the excel web page_______ excel97 internet explorer
The wizard that used to build an interactive table
from data existing on sheets pivot table wizard chart wizard
The chart that is used for displaying stock market
information line chart bar chart

In excel, the subtotal command also generates


grand total after the last group subtotal_________ true false
In advanced filter , the criteria occupying multiple
columns but more than one row, is considered as an
________ criteria. and or
The stacked bar graphs can be represented in
__________ 3-dimensions 4-dimensions
A pie chart can represent only one data series at a
time true false
The ______ generates a summarized report in
tabular form in an interactive manner Data table Pivot table
It is also called as
Which one of the following statements related to high-low-close It shows trends
stock chart is NOT TRUE ? chart over time
The state government needs to finalize a five years
plan to implement 100% literacy in the state. Which
one of the following will be the best tool that should Scenario
be used to work out the plan ? Pivot table manager
Forecast'99 is a group working on exit poll. It wants
to know how many seat ABC party needs to won in
totality to obtain majority to form the government.
Which one of the following will be the tool that will Scenario
help the team ? Goal seek manager
Which one of the following will be the tool that
provides a way to view and compare the results of
all the different variations together on the
worksheet ? Goal seek Pivot table
A ___________ is an excel file where the user stores
his data Workbook Worksheet
Performing
Performing database
Spreadsheets are useful for _______________ calculations. operations
Which one of the following is NOT the component of
the pivot table ? Column field Row field.
Excel allows upto ______ levels of sorting two three
Filtering rearranges a list to display the required
records true false
The stacked bar graphs can be represented in
_____________ 3-dimensions 4-dimensions
The ______ generates a summarised report in
tabular form in an interactive manner Data table Pivot table
It is useful when
several
components are
changing and
It displays the the user is
data series one interested in the
Which one of the following statements related to on top of the sum of the
stacked bar chart is NOT TRUE ? other. components.
Which following function is used in subtotal option ? Standard
______________ Count. deviation
A workbook consists of many ________ databases records
It is a tool that
provides a way
to view and
It is a tool for compare the
summarizing and results of all the
analyzing the different
data records in an variations
Which two of the following statements related to interactive together on the
pivot table are TRUE ? manner. worksheet
Which one of the following is NOT a What-if analysis Scenario
tool ? Goal seek. manager

The _________ wizard separates contents in a cell text import convert text to
into different cells wizard columns wizard
A spreadsheet is a grid of rows and columns and is
called as a ________ worksheet workbook
Pick out the window that is not a form of excel application document
___________ window window
A dark wide
On an Excel sheet the active cell is indicated by… border A dotted border
Cell A4 =2 and A5 = 4. You select both cells and
drag the fill handle down to A8. The contents of cells
A6, A7, and A8 are _____. 8,16,32 2,4,2
the row is too
short to show
the number at
your formula has the current font
If a cell shows  ####### , it means that _____. a syntax error size
Which is not an advantage of using computerized ability to speed of
spreadsheets? generate tables calculation

The gym teacher has a new program to calculate


physical fitness in terms of weight and exercise. The
use inputs different weights or amounts of exercise
to determine the related physical fitness. This "What
if" program is most likely which of the followin word processing graphical
The difference between the highest and the lowest
values. Range Address

Spreadsheets can be used for... Producing graphs Writing letters


drag from the
top cell in the
column to the
double-click any last cell in the
To select a column the easiest method is to … cell in the column column
If you press _____, the cell accepts your typing as its
contents. ENTER CTRL + ENTER

The contents of cell C15 is =AVERAGE(C3:C14).


AVERAGE(C3:C14) is known as array. function.
All of the following are considered constants
EXCEPT: 100 (201)555-1212.
Which of the following may NOT be included in a
formula? Cell references Functions
Which of the following is NOT a valid mathematical
operator in Excel? ^ /
Given the formula =B5*B6+C3/D4^2, which
expression would be evaluated first? B5*B6 C3/D4

Which part of the formula +E12/6+


(G7*SUM(H9:H11) is considered a constant? E12 6
It is surrounded
How can you tell which cell in a worksheet is the by a heavy
active cell? border. It is blinking.

By using the
arrow keys to
By clicking in a move to a
How can you change the active cell? different cell different cell

Which of the following would you use to change the The Standard The Formatting
font size of a cell in Excel? toolbar toolbar
the New the Save
The command that will save the current workbook command on the command on the
with a different file type is: File menu. File menu.
The command that will print an Excel workbook is
found on the ____________ menu. File Edit
In the Save As and Open dialog boxes, the
___________ view shows the file size as well as the
date and time a file was last modified. Preview Details

Which of the following commands will automatically


adjust cell references in formulas? Insert Delete
Which of the following commands will remove cells,
rows, or columns from a worksheet? Clear Delete
Orientation
Which of the following options is NOT controlled (portrait or Headers and
through the Page Setup command? landscape) footers
Which command enables you to change the margins
for a printed worksheet? Options Page Setup
All commands are carried out on a rectangular
groups of cells known as a: worksheet. range.
Which of the following is a valid cell range? 6 D12, G25
In a copy operation, the cell(s) you are copying from destination
is called the: copy range. range.
In a copy operation, the cell(s) you are copying to is destination
called the: paste range. range.
Which of the following commands is needed to The Duplicate The Copy
duplicate the contents of a cell in another? command command
A cell reference that does not change during a copy
operation is known as absolute relative
Which of the following is considered an absolute cell
reference? B4 $B4

Cell E3 contains the function =AVERAGE(A3:D3). If


the contents of cell E3 are copied to cell E4, what
will be the contents of cell E4? #DIV/0! #DIV/0!
Cell E3 contains the function
=AVERAGE($A$3:$D$3). If the contents of cell E3
are copied to cell E4, what will be the contents of
cell E4? #DIV/0! #DIV/0!

Which of the following commands is needed to The Move The Cut


transfer the contents of one cell range to another? command command

copy and paste


The F4 key is used to: cells. edit cells.
Which of the following quickly copies the formatting the Format
of a selected cell to other cells? the Fill Handle Painter

Select the Insert Click the Insert


Hyperlink Hyperlink button
Which of the following will insert a hyperlink into an command from on the Standard
Excel worksheet? the File menu. toolbar.

whether the cell


Conditional formatting applies formatting to a cell has a formula or
based on: a value in it. the cell address.

If you enter a date into a cell, Excel stores the date text with a two- text with a four-
as: digit year. digit year.

You created a worksheet on July 30 and entered the


=Today() function in cell E17. You opened that
worksheet again on August 31. What will be
displayed in cell E17 on August 31? Jul-30 Aug-31

subtracting the adding the


The number of days between two cells containing earlier date from earlier date to
dates can be calculated by: the later one. the later one.
The function key that is used to quickly edit the
contents of a cell is: the F4 key. the F2 key.
What will be stored in a cell if 3/4 is entered in it? 03-Apr 0.75

A user’s response to the InputBox function can be a cell on a


stored in: worksheet. a variable.
The cell reference for a range of cells that starts in
cell B1 and goes over to column G and down to row
10 is _____. B1-G10 B1.G10

The teacher has a spreadsheet showing all Year 10


students and their marks in one Mathematics test.
To find the student with the highest mark, which of
the following functions should be used? AVERAGE COUNT
Which chart type best shows proportions of a
whole? Combination Line

Once a bar chart Once a column


is chosen it chart is chosen it
cannot be cannot be
Which of the following is TRUE regarding chart changed to a changed to a bar
types? column chart. chart.
To select several cells or ranges that are not
touching each other, you would _____ while hold down the hold down the
selecting. CTRL key SHIFT key
Your Institute teachers have set an assignment on
‘Studies’. You are required to use a spreadsheet to
record all that you study on each day for four
weeks. You decide to show each week’s data with
an accompanying graph. What is the best way of Create four
doing this Use tables separate files

What would be the best method to quickly copy the


formula from the active cell to each cell below it? Paste Fill Down

To arrange rows in alphabetical order based on


column A, you need to use the command _____. Tools | Sort Data | Sort
What can you NOT do with a spreadsheet? Analyse data Calculate data

To print just part of a sheet, you would select what click the Print press the PRINT
you want to print and _____ . button SCREEN key
The formula that will add the value of cell D4 to the
value of C2 and then multiply by the value in B2 is
_____. (D4+C2)*B2 D4+C2*B2
Which of the functions is not valid for performing =A3SUM:B3SUM:
addition 0 C3SUM

The default orientation for the printed page is _____. portrait landscape
Which is not a valid cell address? AD213 ZA1
The World Wide Web was devised by _________ CERN ECRN

yahoo and
The useful URL schemes are_____ and______ infoseek mailto and files

bulletin
news boards,mails call
The other ways of getting connected to the net groups,yahoo and and wireless
are_____ infoseek system
business
bulletin board broadcasting
BBS stands for______ system system
USENET is a BBS on ____ scale small large

WINSOCKS is expanded as______ windows socks windows sockets


IETF Level 2 HTML DTD supports graphical browsers
like _______ Mosaic Yahoo
The space used by Netscape to store the retrieved
page is called______ buffer cache

The principles, means and methods for rendering


information unintelligible and for restoring
encrypted information to intelligible form. Photography Digital Signature
A long string of seemingly random bits used with
cryptographic algorithms to create or verify digital
signatures and encrypt an decrypt messages and
conversations. Key Lock
Protected/private character string used to
authenticate an identity or to authorize access to
data. User-id Password
The successful act of bypassing security
mechanisms of the system. Penetration Retrieval

A set of rules and formats, semantic and syntactic,


that permits entities to exchange information. Acts Regulations
An attempt to get access to a system by posing to
be an authorised person. Spoofing Imposting
An action or event that might prejudice security. Loss Threat
According to information Technology Act, 2000, To
investigate contraventions the controller of
certifying authority shall exercise the like powers to Sales - tax Income - tax
that of authorities authorities

Malicious software. Utility Pirated software

None the person who is known as father of Internet Tim Berner Lee Hoffman

This website is the biggest bookstore on the earth. Etrade.com Amazon .com
When we talk of Data Transmission modes, then Automated Tailor
ATM stands for Machine Any Time Money

A sequence of bits or characters that identifies the


destination and the source of a transmission. Acts Regulations

The means of communicating between networks Router Gateway

A group of computers and other devices dispersed


over a relatively limited area and connected by
communication links that enable a device to interact
with any other on the network. LAN WAN

hyper terminal hypertext


The term HTTP stands for tracing program tracing program
National
Informatics Network
A NIC is considered as Center Interface card
Can not
A hub is a device that can connect Only Computers computers

Combines
connectivity of a
hub with the
Which of the following is true concerning the Concentrates traffic regulation
function of a switch? connectivity of a bridge
Bridges and Two or more
What do routers connect? Repeaters. networks
What does a router route? bits frames
Software which prevents external access to a
system is termed firewall gateway
If four computers are connected to a hub and then
to the internet, how many IP addresses are required
for these 5 devices? One Two

Which of the following in an OSI layer Physical Layer Data-Link Layer

When creating a network from just two PCs, what


kind of cable would be used to connect them? RG7U Coaxial cable

An IP address is a Physical address Logical address


To construct a simple LAN of 4 computers, you
would connect them with ______connect them A cable Hub

What happens to data that is ruined before reaching Data return to the It gets destroyed
to receiver sender bit by bit.
Wireless Wired
Bluetooth is technology Technology
Which is not one of the recognized IEEE sub layers? Physical Layer Data Link Layer
The most preferred number system to represent a
IP address is Binary ASCII
A MAC address is of 48 Bits 48 Bytes
software that
facilitates a list of rules for
connection to the transferring data
Protocol is internet over a network
A ............... is a LAN-based computer with software
that acts as a controlling device for controlling
access to at least part, if not all, of a local area
network and its available resources. Novell PC Client

If one node goes


down, it brings
What is the biggest disadvantage of the Ring down the entire
topology? There isn't one ring

The .............. of the network concerns how network


devices are physically (or optically) interconnected. Physiology Topology
The principal topologies used with LANs are: Bus Star
What are the various types of bus architecture? Linear Parallel
What are the various types of ring architecture? Parallel Circular
In a ................., each workstation attaches to a
common backplane via its own physical cable that
terminates at the hub Ring Bus

In a ............... , each work station is directly


connected to a common communications channel Ring Bus
Which one of the following is NOT a network
topology? Star Bus
In a .............. , the cable system forms a loop with
workstations attached at various intervals around
the loop Ring Bus
The Media Access Control (MAC) is a sub layer of
the: Network Layer Transport Layer
What are the most common LAN technologies used Ethernet, token Ethernet, token
in networking today? ring, DecNET ring, FDDI
Modem speeds are measured in bps kbps
LAN speeds are measured in bps Kbps

usually higher measured in


WAN speeds are than LAN speeds bytes per second
Accessing the Internet from a typical home PC
requires the use of CD-ROM drive a modem

must use the must use


To use the Internet, you World Wide Web electronic mail
The worldwide web server uses the following key gateway uniform resource
standard interface to act as the middleware: interface locator

a Novell Interface used to control a


An NIC Controller printer
Accessing the Internet from a typical home PC
requires the use of CD-ROM drive a modem
The most widely used network operating system on
PC LANs is Linux Novell Netware
have to do with
compression of
graphics and have to do with
JPEG and MPEG video Web pages

A multiplexer is a form of Printer modem

provides access
An ISP to the Internet is a CPU register

used to send used to browse


FTP is email the Web
uses wireless
used to send communication
Telnet email medium
used to protect a
computer room
from fires and
A firewall is floods a form of virus

A proxy server is a backup server an email server


IR system for the
A search engine is hardware Internet
To look for information about interest areas on the
internet, the user should use a scanner CD-ROM

provides access
An ISP to the Internet is a CPU register

used to send used to browse


FTP is email the Web

used to send uses telephone


Telnet email lines

Any layer can


The layers cannot communicate
Which of the following is a true statement about the communicate directly with any
OSI model layers? with one another. other layer.
It is made up of
many networks
connected into
transmission
Which of the following is NOT true about the It is one large lines called
Internet? network. backbones.
The traditional intent and impact of this common
type of attack is to prevent or impair the legitimate Password
use of network resources. cracking System intrusion
Flood a Web
Which of the following is NOT an example of a DoS server with
attack that is popular among hackers? IP flood requests
A ____________ attack is when a hacker sends a
continuous flow of packets to a system. hack packet
One defense option on a large network is to
configure a ____________ to disallow any external
traffic. firewall router

A proxy server is a backup server an email server


Which of the following would be performed on a
network server and not normally on individual Apply security Update virus
workstations? patches definitions

All sites are safe There are safe


What can be said about the safety of the Internet? and reliable. and unsafe sites.

To secure communication network against wire- Use of


tapping the most effective control is Use of identifiers passwords

One way that a virus CANNOT spread throughout a by attaching to through an FTP
network is: an e-mail. port.

Which of the following is NOT a means of monitoring


employee use of company technology? Phone E-mail
____________ would be used by parents to monitor
their children on their home system. A Trojan horse Adware
The formal rules and parameters which are
established to permit a microcomputer to
communicate with the mainframe computer as
though it was a terminal of the mainframe are
called Modems Protocols

The two most common tools used to help with cookies and Trojan horses
extracting information are: Trojan horses. and key loggers.

An attack on a An attack with


Which of the following would NOT be considered an system for the purpose of
example of cyber terrorism? personal gain gaining publicity
Which of the following would be a form of cyber Economic Disruption in
terrorism? damage communication

Crashing the Shutdown of


Which of the following is a likely target of a cyber stock market, as military security
terrorist that would cause considerable loss of life? in the 1930s systems

An organisation is upgrading its telecommunication


lines. Which is the least important objective while To carry more To improve
upgradation network capacity network services

A company posts a price list of its products on its limit access to


website. The advantage to the customer is that the set its prices very computer
company can high owners only
Which of the following is an easy-to-use service to Yahoo People
get information on someone? People Search Search
Which of the following pieces of information would Name of your
NOT be found online? bank Date of birth
Which of the following is the most common danger
on the Internet? Virus Fraud

The famous Nigerian Fraud scam offered victims the invest without
opportunity to: buy stocks. risk.

The fraud type that sends e-mails that claim to be


from legitimate sites in order to obtain sensitive
information is called _________________. Shill bidding Phishing
Using the Internet to pursue, harass, or contact
another in an unsolicited fashion is called: Internet stalking. cyber stalking.
Setting your privacy settings in Internet Explorer to
medium is one way to block: pop-ups. cookies.

What is the best means of protection from cyber Use a fake e-mail Never use your
stalking? address. real identity.

Which of the following is not an appropriate control Physical Security


over telecommunications software Encryption controls
Encryption techniques can be implemented in
Hardware-Software I only II only
Which protocol would be used to download a free
anti-virus program from the Internet? irc ftp

The major advantage of the checksum program is Adds more bytes Verifies integrity
when it to programs of files

Which of the following is a Web browser? HTML Internet Explorer


A Web page is another name for ----------- Web query. HTML document.

Domain names must contain a description of the


type of organisation that the domain represents. A .com is used for .co in used for
very common abbreviation used include: company company

A standard language for creating and formatting the World Wide


Web documents is: round trip HTML. Web Consortium
The Web page format in which all elements of a
Web page are saved as one file is called: XML. HTML.

using Internet
Explorer to view a
Web page that is updating the
stored on the values that are
Which of the following requires an Internet hard drive on obtained through
connection? your computer a Web query
Click on the Back
Mr Rao wants to find a website that he briefly arrow until the Click on ‘Go to’
browsed over yesterday. After turning on his desired site is or ‘Search’ in the
computer how would he do this? found browser
the Insert
Which of the following is used to update a Web the Refresh Hyperlink
query? command command

You download from the internet, a screensaver, a


ten-second sound file and a ten-second music video
clip. You also add a hyperlink. Which of the media
elements has the greatest effect on the file size? Hyperlink Screensaver
When saving a photograph for use on a website,
which format should you choose? BMP GIF
While researching the Direct taxes assignment, you
find a useful website. What is the most efficient way Save it to a floppy Write it down on
to access the site at a later time? disk. a piece of paper.
A system that uses the Internet for business-to-
business interaction is called a(n): extranet. intranet.
A block of text automatically added to the end of an
outgoing email is called an attachment. a signature.
_________ refers to the use of Internet technologies
for placing telephone calls. VoIP IPT

Most client/server applications operate on a three- Desktop client, Desktop client,


tiered architecture consisting of which of the application, and software, and
following layers? database. hardware.

Which do you NOT need to connect to the Internet? Modem CD-ROM


File
File Transfer Transmission
What does FTP stand for? Program Protocol
So computers can
be referenced by So IP addresses
What is the purpose of DNS? a name can be shorter
Which of the following is NOT a properly formatted
IP address? 193.1.2.3 45.1.1.1
Which of the following is a properly formatted email paul .trigg @ paul.trigg@doma
address? domain. org. uk in.org.uk
The US Scientists in
The Internet is controlled by whom? government Switzerland
International
Internet Relay Relay of
What does IRC stand for? Chat Characters
It will be waiting
for you to collect
If you do not pick up your email for a week...? It will be deleted it
Receiving
messages People
automatically discussing a
from anyone in topic of interest
What is a disadvantage of joining a mailing list? the group globally

autolayouts and
In Powerpoint2000 ,the built-in professional design clipart & auto presentation
elements are shapes templates
Selection handles are the 8 small ___________ that
appear around the object, when an object is
selected circles points
The _______ is an invisible matrix of vertical and
horizontal lines that covers the entire slide
workspace square image

_______ are drop-down menus that appear when the


right mouse button is clicked on the screen element tool bars short cut menus

________ and ______ have the ability to add a lot of clip gallery & slide show &
visual impact into the PowerPoint presentation word art view show
_______ is a motion picture or any animation file wave file media clip
In visual basic, when a record pointer reaches to the
last record, _______ property of a recordset object is
automatically set to ______ eof,false movelast,true
In visual basic, the explorer view of a project is properties form layout
displayed in ___________ window window
In visual basic, when a record pointer reaches to the
first record, _______ property of a recordset object is
automatically set to ______ bof,false movefirst,true
In visual basic, _______ is a method to convert a
string into integer. value() int()
In visual basic, in a shape control, a vb statement
gives Shape1.Shape = 2. What type of shape should
we get? circle rectangle
In visual basic, a timer event is only available in
timer control. true false

In visual basic, vbred or vbgreen or vbblue are the


property values of a backcolor of any object true false
In visual basic, _______ is a property of a textbox
control to set a color of a text. fontcolor color
In visual basic, _______ property of a textbox control fontunderline,tru
is set to _______ to underline a text underline,true e
In visual basic, _______ property of a textbox control
is used to change the size of text. textsize size
In visual basic, the interval property of a timer one- millionth of a one-hundredth
control is given in ________ second of a second
In visual basic, _______ property of listbox control
counts the number of items in the list count recordcount
In visual basic, the properties of various controls form layout
can be set using __________ window prperties window
In visual basic, vbinformation, vbcritical,
vbexclaimation are the values of _______ in a
messagebox function. title prompt
In visual basic, ________ is a function which displays
a message and it also allows the user to enter
values in a form object msgbox() textbox
In visual basic, using a data control, ________ is a
recordset type which allows to add a new record
and also to update existing record in a recordsourse
object opendynaset opensnapshot

In visual basic, while closing a form _______ event of


a form object is triggered earlier to terminate event. load activate
In visual basic, to give a backcolor or to bring in a
picture to a command button can only be done if we
set the style property to ______ standard opaque
In visual basic, a method RGB(255,0,0) will generate
_______ color blue red
In visual basic, a method RGB(255,255,255) will
generate _______ color red green
In visual basic, if a user uses a shortcut key ctrl+R properties form layout
_________ becomes visible. window window
In visual basic, if a user uses a function key F4 properties form layout
_________ becomes visible. window window
In visual basic, when a textbox control receives the
focus ________ event is triggered. change lostfocus
In visual basic, a form is a ________ object. child parent
Microsoft visual basic is a Rapid Application
Development tool. true false
In visual basic, when a form object appears on the
screen _________ event is triggered. load unload
In visual basic, to display text on a label object
_________ property is used text name
In visual basic, _______ object is used to access the
database and also to manage the data in the
database. opendatabase dbengine

In visual basic, when a checkbox control is checked


_______ property is automatically assigned with 1. enabled visible
In visual basic, _______ keyword is used to declare a
variable dime dim

What is the extension of the Visual Basic project file


that stores the design of a user control. .ctx .ctl
Which event of a text box would you use for
validating the data entered by the user? Validate Validation
Which of the following statements forces inline error On Error GoTo On Error GoTo
handling? linelabel Inline
The _______ method resets the contents of bound
controls to their original values when the user clicks
on the cancel button. UpdateControls PaintPicture
Cancel parameter
To deactivate the Form UnLoad event, you make to a non-zero Cancel
the following change in the function definiton: value parameter to 0

How many root nodes can a TreeView control have? 1 2

Consists of
Consists of several
A project group is a Project which: several Programs Applications
Procedures declared in a _____ are local whereas Form window, Project window,
procedures declared in a ______ are available to the standard or code view code
whole application. module window

How can you keep the user from exiting a form by Place code in the Place code in the
clicking the Close button? Terminate event Unload event
The _______ property enables Visual Basic to draw
complete images in memory before displaying them AutoRedraw = AutoRedraw =
on the Screen. True False
Msgbox
You want to display the code and the description of Msgbox err.no & err.number &
an error. What would be the correct syntax? err.text err.text

To help in
To display images creating a
What is the purpose of the Image List Control? to the user ToolBar
Which method would you use to get a free or
unused File identifier while opening any file: FreeFile GetFileNum
Which property procedure is used to retrieve the
value of a property? Retrieve Get

Common
Which of the following can be shown to the user messages passed
using the Common Dialog control in VB? to Windows Open dialog box
Which of the following are not properties of
Command Button: Caption Visible
Which events enable you to determine which key Click and Click, KeyUp and
was pressed by the user? KeyPress KeyDown
In order to access a file in Non-textual format, you
have to open file in: Ascii Format Binary Format
Visual Basic displays information depending upon
the current value of two properties of the form, CurrentX and ScaleLeft and
called: CurrentY ScaleTop

Which of the following procedure types will execute


when you assign a value to a property of an object? Property Get Property Assign

In order to overlap the controls (say a command


button) during design time, we use the ‘Send To
Back’ or ‘Bring To Front’ option from the Edit menu.
To change it dynamically (i.e.during program Background color
execution) we need to change: property Caption property
Which property of the ProgressBar determines how
much of the bar is filled? Min Max

The ______ function can be used to run any .com,


.exe, .bat or .pif file from a Visual Basic program. Shell Substr

The caption and the name properties of the Are one and the Can be different
command button: same at times

You do not have


You try to initialize a new Object variable with the You do not need the permission
following line but receive an error. What could be to use the Set to access the
the possible cause? Set MyVar = New Classname command here class

Which of the following will perform a direct The Exec


execution of a Command object? The Open method method
A warning query A critical
The vb Critical symbol displays: icon message icon

vbYesNo is an example of a(n): statement. variable.

InputBox
MsgBox function returns
statement returns a value, while
a value, while the the MsgBox
The primary difference between the MsgBox InputBox function statement does
statement and the InputBox function is the: does not. not.
Which of the following is TRUE about a protected
form (i.e., a form where the Protect Form button on Data cannot be
the Forms toolbar is toggled on and is assumed to entered into the The form can be
remain in that position)? form. modified.
Which event is triggered when the user moves to
another open form? Unload QueryUnload
The user can use ______ to remove the undesirable
part of the image clipping tool cropping tool
The power presentation has a _____ for a set of
compatible colors color palette color box
The set three colors used for graphs and for
secondary slide items is called as ascent tricolor scheme
There are ______ types of charts available in
PowerPoint 10 28
_______ charts are useful while showing variations
over a period of time column bar

_______ are the individual pages of a presentation images images and text
A PIE Chart is a ____ diagram that depicts the
relationship between a whole and its parts circular radar
Each individual piece of data in a series is
called a/an entity data point
Microsoft
PowerPoint launches an OLE-compatible application organization
called chart clip art

the chart is
When the user double-clicks on an organization the organization made available
chart object in PowerPoint chart is expanded for editing
The _____ are used for selecting, editing and viewing general purpose
objects in the chart box tools tools

used to mange
organizational accessed only by
Manager box tool in organizational chart window is chart manager

The custom drawing tools are _______ by default turned on turned off

Click on the box tool ______ to draw three boxes once twice
There are ____ default fields available in all boxes of
the organizational chart two four
The _____ tool is used in the same way as we use a
pen to draw a table native tool draw tool
A/An _______ consists of smaller printed version of
the slides autolayouts handlayouts
The size of the object can be changed using the
______ tool zoom reduce/enlarge
_______ is the process through which the slides in
the current presentation are included in another
presentation or application importing exporting
________ can be used to create charts as well as
worksheets Microsoft excel auto shapes
PowerPoint can import text files that have been .rtf(rich text
saved in ______ format .ppt(PowerPoint) format)
PowerPoint outlines can have _____ outline levels nine only one
When a file is saved with _____ extension, the
graphics and text are also saved along with the .rtf(rich text .wmf(windows
slide format) metafile)
not displayed displayed only
during the slide during the slide
The hidden slide is show show
____ effect is used to introduce a slide during a slide DTS(digital track
show sound) 3D(3 dimension)
A _____ is a special effect that determines how the
objects appear on the slide build transition
The notes page is formatted based on the notes master slide master
Pick the odd man out of the following outline view slide view

When a new presentation is opened ,powerpoint


creates slides that have a width of _____ and a 15 inches,10 10 inches,7.5
height of ______ with the landscape orientation inches inches
The default orientation for notes ,handouts and
outlines is ____ orientation portrait landscape
Build effect is also called as ______ animation view show
Graphics for web pages are automatically stored in
____ format gif jpeg
A _______ is used to jump to any slide in the
presentation hyperlink hypertext
The ______ language has been incorporated into visual basic for
PowerPoint visual c++ application
In PowerPoint _____ is a series of commands that are
executed in sequence macro batch file
while creating during slide
The macro will be activated a .exe file transition
Developers can easily add ____ to PowerPoint 2000
by using the programming interface virus checkers spell checkers

______ determines the order in which order in which


the slides will be displayed during the show slide show custom show
_______ is used to organize and develop the contents
of a presentation slide pane notes pane
If we save the presentation file as a metafile, it can
be opened using internet explorer paint shop pro

PowerPoint
creates a sample
presentation to
With reference to autocontent wizard for creating a which user can it is the quickest
new presentation, which of the following statements add words and way to create a
are not true pictures presentation
user can insert
user can insert only pre-drawn,
objects like clip- pre-colored
arts, pictures graphic images
stored in a reflected in a
separate files to clip arts to the
Which of the following statement is not TRUE the slides slides
in outline view, in slide sorter
drag the slide view, drag the
With reference to changing the order of slides, icon to a new slide to a new
which of the following statement is not true location location

the slide that


holds the
formatted
placeholders for
the titles, main
text and any transition means
background items applying special
that user wants effects to the
to appear on the crossover
slides is called a between the
Which of the following definitions are not true master templates slides
in outline view,
user can see the
miniatures of all
with notes pages slides in a
view user can presentation,
prepare speaker complete with
notes and text and
Which of the following statements are not true handouts graphics

the slide that


holds the
formatted
placeholders for
the titles, main
text and any transition means
background items applying special
that user wants effects to the
to appear on the crossover
slides is called a between the
Which of the following definitions are not true master template slides
The options available in the common task toolbar
does not include slide layout customize
by default,
doughnut chart
data to be is displayed
graphed resides based on the
With reference to chart, which of the following in a datasheet data in the
statements are not true window datasheet
The format of the text entered in a title, subtitle, or
bulleted-list object is determined by the format
settings in a special slide called -------- the master slide the slide master
PowerPoint provides a _________ that searches the
entire presentation i.e., all the text objects in all the
slides, outlines, notes and handouts for spelling
errors office assistant spell checker
PowerPoint's drawing toolbar contains _______
drawing tools 10 12
Click _______ on the rectangle drawing tools enables
us to draw multiple rectangles once twice

An example of the components of a multimedia text, graphics and text, hypertext


presentation could include email address. and Power Point.
Which of the following formatting elements can be
applied to a PowerPoint diagram using the
AutoFormat tool? the Line style the Line color
Which of the following formatting elements can be
applied to a PowerPoint diagram using the Format
AutoShape command? Fill color Line color

A popup box
Excel is started prompts you for
What happens when you double click a blank graph so that you can an existing Excel
placeholder in a PowerPoint presentation? create a chart. chart to insert.

always taken always taken


from the first row from the first
of data in the column of data
The legend in a Microsoft Graph chart is: datasheet. in the datasheet.
Suppose you are creating a Microsoft Graph of
quarterly sales by region. Which would be the best
chart type if you want to emphasize the total sales Side-by-side
of each region? column Stacked column
Click the Insert
Pull down the Chart button on
Which of the following actions will enable you to Insert menu and the Standard
insert a graph into a PowerPoint presentation? select Chart. toolbar.
Click the chart
object, then click
the View
Datasheet
If you are editing a slide containing a Microsoft It automatically button on the
Graph, how do you display the underlying displays in Slide Standard
datasheet? view. toolbar.
How do you deselect a chart that has been placed
onto a PowerPoint slide after you have finished Single click the Double click the
creating the chart? chart. chart.

A dialog box is
A dialog box is displayed
displayed allowing you to
allowing you to enter the name
enter the name of of the Excel
the Excel worksheet that
worksheet that should be
should be linked embedded in the
What happens when you click the Datasheet button to the PowerPoint PowerPoint
on the Microsoft Graph toolbar? presentation. presentation.

What happens if you single click a chart that is not The chart is The chart is
currently active? selected. deleted.
What happens if you double click a chart that is not The chart is The chart is
currently active? selected. deleted.

a slide one bullet bullet items one


Using custom animation effects, you can build: item at a time. letter at a time.
Which of the following animation effects can be
added to a slide? Subtle Moderate

Which of the following animations effects can be Fly in from top or


added to a slide? Enter and exit bottom
Which keyboard key is used to select more than one
picture on a slide? Enter Shift
what objects do
after they
the way objects appear on a
Custom animation can be used to affect ONLY: appear on a slide. slide.

The advanced The advanced


timeline shows timeline shows
the sequence in the duration of
which objects will the effect
Which of the following best describes the appear on the applied to each
information that appears on the advanced timeline? slide. object.
Which of the following objects can contain custom Organization
animation effects? Clips charts

What type of program allows an object within an


image to be edited without affecting other objects? Paint program Draw program
Which of the following animation effects can be
added to a slide? Fly in From top

Once data is Once data is


Which of the following is TRUE regarding the entered it cannot entered it can be
Datasheet? be changed. changed.
Graphical software tools that provide complex
analysis of stored data are: OLTP. OLAP.

You can change


both the
You can change appearance of a
the appearance whole diagram
of a whole and the
diagram, but not individual
Which of the following statements is TRUE regarding individual shapes shapes of a
PowerPoint diagrams? of a diagram. diagram.
Which keyboard key combination is used to undo
the previous command(s)? [Enter+A] [Shift+Z]
Microsoft visual basic project file has _______ file
extension. .vbg .vbp
In visual basic, _______ method is used to add an
item in a combobox add additem
In visual basic, _______ method is used to load
picture during runtime in an image control load loadpicture
In visual basic, to populate a drive list box with a Drive1.Drive=Dir Dir1.Path =
directory list box __________ statement is used 1.Path Drive1.Drive
In visual basic, to display a message in the run time
_________ function is used messagebox() message()
In visual basic, to populate a directory list box with Dir1.Path=File1.P Dir1.Path =
a file list box ________ statement is used ath Drive1.Drive
In visual basic, ________ is a property of a recordset
object which counts the number of rows in a
recordsourse object openrecordset opendatabase
In visual basic, using a data control, a record can
only be added from the last record. Adding a new
record is only possible using _______ method of a
recordset object. update append
In visual basic, using a data control, a record is
saved to a recordsource object using _______
method of a recordset object. append update
In visual basic, using a data control, to navigate to
the previous record ________ method of a recordset
object is used. movenext movelast
To deactivate the Form UnLoad event, you make
the following change in the function
definiton:Private Sub Query_Unload(Cancel as Cancel parameter
Integer,UnloadMode as Integer) To prevent the to a non-zero Cancel
Form from closing, you will set the: value parameter to 0
_______ is a word processing that is a member of the
office 2000 family Word 2000 Office 2000
The feature that enables user to type anywhere in a
document without pressing or tab click-n-type double click

The______ feature allows the user to copy and paste


upto 12 items at the same time in an application office clipboard cut

______ and _____ key combination will extend the shift+end and shift+left and
selection by one character on the left and right shift+home shift+right
web layout, normal layout,
_____and_____ are improved layout in Word 2000 printlayout web layout

The easiest way to create a document in word is wizard templates


In Office2000 environment the tool that makes work
easier for us is_____ office assistant inbox assistant

A short description of a tool bar button called the


______ is displayed when the mouse pointer is
allowed to stay for a second on the button Screen Tip Tool Tip
The _____ helps us to keep track of the margin of
the page tab stop marginal stop
The keys that are used to navigate between up arrow keys page up keys
headers and footers are only only
Pick out the element from the following that does
not form the type of tabs for the Word 2000 left center
_______are blueprints or patterns for documents of a
certain type template model
The______ is used for quickly setting paragraph
indention using the mouse increase indent decrease indent

Word art is text with special effect control tool box


AutoShapes in word can be created by accessing
the _____ drawing toolbar control box

By default, a document consists of_____ section 1 2


printer setup
The dialog box that is used to determine the page setup from from the file
documents margins is the file menu
________ is a box surrounding a page on all slides or
a line that sets off a paragraph on one or more
slides border shading
The key that is used to perform a task to select all t
he text in the documents is ctrl+a Del
The key that is used to indent a paragraph is ctrl+a Del
The key that is used to change the font from the
current positioned in a document is CTRL+SHIFT+F CTRL+O
The key that is used to change the style of the
document that is from that normal to heading1 or
heading1 to other document styles. ctrl+shift+f ctrl+o
Set mapping' Check control that follows a text-type
validation, we use ----------------- application for data
analysis. Excel Access
Excel can import data from other databases for the
data analysis. TRUE FALSE
A System Auditor can uses CAAT tools to analyze
data FALSE TRUE

In the case of the ---------- control, it is ensured that


the data in combination with other fields are
reasonable as per standard set by an organisation. Valid Signs Transaction type
--------------- function searches for a value in the
leftmost column of a table and then returns a value
in the same row from a column that we specify in a
table HLOOKUP VLOOKUP

Most of the tools use in Data Analysis depends on DDE OLE

Analysis is the
Analysis loading of
translates programs that
program code of perform routines
a high level to control
How do you define analysis of an information language to peripheral
system? machine code devices
Inputs, outputs,
file design
What areas need to be considered in the SOFTWARE Only hardware hardware, and
design process? and software software
To execute any
What is the function of systems software? To collect data programs
Deleted from the Copied from the
Formatting a disk results in all the data being...? disk disk

Users operate the


manual system Users operate
and computer the computer
system at the system from a
What is Direct Implementation? same time given date

The new system The new system


is introduced is introduced
alongside the and users start
What is parallel running? existing system operating it
Instructions and
What documents are produced during the technical Log files and
development of a system? documentation temporary files

To enable any
printer to be
For technical connected to the
What are User Guides are used for? support network
Network systems
Operating and
systems and communication
Systems software can be categorised into: system services services
Magnetic tape
Which storage device cannot be erased? storage CD-ROM

To maintain a
backup copy of all To do a
Application software are programs that are written the information particular task.
Which bus carries information between processors
and peripherals? Data bus Auto bus

Convert the decimal number 2989 to Hexadecimal FDDI BAD


Which bus controls the sequencing of read/write
operations? Data bus Auto bus

Operating
system routines
Peripherals that that execute in
are connected to supervisor
What are utilities? a computer. mode.
Numbers are stored and transmitted inside a
computer in binary form ASCII code form
The original ASCII codes were 7 bits 8 bits
A Nibble corresponds to 4 bits 8 bits
More than 1000
A gigabyte represents mega bytes 1000 kilobytes

A 32-bit processor has 32 registers 32 I/O devices

used to indicate used to detect


A parity bit is uppercase letters errors
the contents of these chips are lost when the
computer is switched off? ROM RAM
Clock speed is measured in bits per second baud

memory access
Cache memory enhances memory capacity time

have fewer use more RAM


instructions than than RISC
CISC machines RISC machines machines

Computer is
Every data from the primary memory will be erased Power is switched improperly shut
if off down
a parallel
An RS-232 interface is interface a serial interface
dot matrix
For print quality you would expect best results from line printer printer

is faster to access
ROM than RAM is non-volatile

increased the
storage capacity
of a computer increases the
A UPS system process speed
has more
storage capacity
is a form of ATM than an ATM
smart card card card

Laptop computers use CRT displays LCD displays

having several
programs in RAM
Multiprogramming refers to at the same time multitasking
the ability to run
having several 2 or more
softwares running programs
Multitasking refers to at the same time concurrently
What are small high speed memory units used for
storing temporary results? ALU Registers
A good way to exchange information that changes
rapidly is through brochures magazines

an operating
Multiprogramming is a prerequisite for multitasking system
multiprogrammi
Timesharing is the same as multitasking ng
______ is the default view in Word used for typing
Editing and Formatting the Text NORMAL ONLINE LAYOUT
The short-cut-key that is used to indent a paragraph
spacing in the documents is ctrl+m ctrl+2
The short-cut-key that is used to paste the selected
text ctrl+v or ins ctrl+c or ins
The short-cut-key that is used for paragraph
spacing(1.5) ctrl+2 ctrl+5
The box that separate text from the document and
allows it to behave like an independent object is
known as Text Box Frame
The object that is used to provide information like
the title of the book, name of the chapter, page Header and
number etc. Footer Screen Tips
The object that helps us analyzing data statistically
is known as Chart WordArt
To highlight certain parts of a page to set it apart
from the rest of the page we make use of the
following features Borders Shading
To clear all the tabs in a document the option that is
clicked from the tabs dialog clear remove all

The dialog box that is used to incorporate picture picture bullets arrow bullet
bullets into our documents or web pages is dialog box dialog box
The object that composes of set of tools which helps
to create and work on different shapes like
rectangles, circles, flowcharts etc. charts WordArt
When word is opened a new document called_____ is
displayed, where the user starts typing the content
right way doc1 document1
______ is an online dictionary maintained by word to
obtain synonyms for words thesaurus hyphenation

The thesaurus is invoked by pressing_______ shift+f7 thesaurus menu


When a new table is created the insertion point
flashes in the _____ first second
By pressing the _____ key inserts a blank row after
the last row in the table tab end
The ______ option enables us to convert text into a convert text to convert data to
table format table table
A table consists of ______ that contain text or
graphics row rows & columns
The _______ option in word allows the user to
automatically correct misspell words as and when
they are typed AutoCorrect AutoFormat
______ is a facility that enables recording and
replaying of a sequence of keystroke Mail Merging Macro
In Word Macros are written in _____ basic visual basic
In Word 2000 the macro dialog box is activated with
the help of ____ key combination shift+f8 shift+f7

________shows how a document would look like online layout


when published on the web or on an intranet web layout view view
______ is a software for sending and receiving e-mail
messages email client outlook express
________is the coding system used to create web
pages html xml
The network that makes information easily
accessible across various networks is _______ internet intranet

field name must the field


be listed in the separators in a
same order as header source
the and the data
Which of the following statements are false with corresponding source can not
reference to the use of a header row source for a information in the be set as
mail merge data source paragraph

auto format
option applies to
it is not possible the entire table
to change the and not only to
height of only the selected
With reference TO TABLE WHICH OF THE selected rows of rows or columns
FOLLOWING STATEMENT ARE false a table of a table

The alignment available for tabs does not include left decimal

In order to type
A new section is a header from
created in order the third page of
to change the document a
properties like section break is
Which of the following statements related to a number of inserted after t
Section Break are True columns he third page
The user can set a spelling checker to skip the
marked part of the next true false
New option under the file menu of word creates a
new blank document that is based on the normal
templates true false
The user can split the screen only into two parts true false
The features that enables the user to type text
graphics tables anywhere in the document without
pressing enter or tab drag & drop click -n-type
The user can modify the picture from the clip art true false

prohibits the
automatically user from
corrects common renaming an
With reference to auto correct which of the typing, spelling auto correct
following statements are false errors entry
password
protected
document can
be opened
With the reference to password protected without
documents which of the following statements are password can not password as
false include spaces read only

The alignment available for tabs does not include left justified

a document file
a .ppt file can not can be inserted
not be inserted at in the current
specified position document at
in the current specified
Which of the following statements are False document position
Drop Cap tool does not work for the contents in the
table format true false
The special symbols that are inserted using "insert
symbol" option of the word can not be printed by
the printer as they are not standard keyboard
symbols true false
The "format columns" option allows to create
columnar text up 12 columns only. true false
The document that makes the user to organize and
maintain a long document, such as multipart report
or a book consisting of chapters Master Document Child Document
The view that enables us to view how objects will be
positioned on the page when it is printed Print Layout View Page Layout

The mode that is initialized or toggled to if the user


is in a position to overwrite the text in the word Insert Mode Type Over mode
Veena is entering a paragraph in a word processing
program. When the cursor gets to the end of a line,
what is the best way to get the cursor to the next press the return press the tab
line? key key
How are data organized in a spreadsheet? layers and planes lines and spaces
Which key moves the cursor to the beginning of the
next line of text? tab enter/return
Veena typed the following sentence: "The girl was
very beautiful." In which word processing utility
could she find a synonym for "beautiful"? grammar checker spell checker

send a public
message to
Using an electronic bulletin board, Seema can do all friends interested send pictures to
of the following except which one? in one topic a friend
Aryan has created a ten-page story, but only wants
to print the first two pages. What printer command
should he select? Print all From ___ To ____
What process should be used to recall a document
saved previously? Enter Copy
Which is used to indent text within a document? closing tabbing
Desktop publishing is a more sophisticated form of
which of the following types of software? database graphing
Creating and
To analyse editing
What is a Word Processor used for? figures documents
What is a picture that is saved on a diskette and can
be pasted into a document? subscript annotation
Spelling,
What basic tools would you find in the Edit menu of Clear, replace grammar and
a word processor and select autocorrect

Text at the Numbers which


bottom of every appear on every
What is a header in a document? page page
Mouse, printer
and processing Keyboard,
system Mouse, monitor
What hardware is essential for a word? keyboard? and printer
The user could take a picture from a magazine and
insert it into the document by using a Browser clip-art file
Assume you are creating a two-column newsletter.
Which type size is the most reasonable for the text
in the columns? 6 point 10 point
Given the default left and right margins, and ½-inch
spacing between columns, the width of each column
in a two-column document will be: 2½ inches. 2¾ inches.

Assume you have made all appropriate selections in You have not
the Columns dialog box in Word, but cannot see any inserted a
columns on the screen. What is the most likely You are not in column section
cause? Print Layout view. break..
While word processing, in which of the following to store a file on to store a file on
situations would Tom use the "Copy" command? the hard drive a diskette

Data about a set


What does a document contain? of similar things Mainly text
Before submitting your work you want to find any
words spelt incorrectly. Which of the following would
you use? Thesaurus Spell Checker
What command in a word-processing program can
be used to change the word ‘him’ to ‘her’, and also
the word ‘he’ to ‘she’ in the given phrase? “On a
cold and still night, the only sound that could be
heard was the owl that had ade its home in the nest
outs Paste Replace
What edit commands would you use to insert a
paragraph from one document into another
document, while still keeping the paragraph in the
first document? Copy, then paste Cut, then paste

To give the To give the


original author a original author a
chance to accept chance to reject
suggested suggested
changes from the changes from
Which of the following statements would NOT be a person who the person who
reason for showing suggested revisions in a Word entered the entered the
document without changing the original document? revisions revisions

A red underline
A line appears appears beneath
Which statement is NOT true regarding revisions through text that text that is to be
made in a Word document? is to be deleted. added.

Through the Edit Through the


menu by Tools menu by
choosing Track choosing Track
How are suggested changes entered for review on Changes Changes
an initial Word document? command command
The Versions
command will
The Versions allow you to
command will save only one
allow you to save version of a
multiple versions document,
of a document, including any
including any changes that
changes that may may have been
Which of the following is TRUE about saving a have been made made to that
document using the Versions command? to that document. document.

The latest
All versions are version is
What happens when you open a document that has opened opened
been saved using the Versions command? automatically. automatically.

You have used the word ‘discover’ four times in an


English essay you have created using a word
processing program. You would like to find another
word of similar meaning to use instead of ‘discover’.
Which of the following would you use to do this? Dictionary Grammar check
The most recent
Word displays a version will
When opening and working with multiple versions of list of the dates appear at the
a document, how can you tell which is the most and times each bottom of the
recent version? file was saved. list.
Various fields are added to a regular document to
create a special document called a form through the
____________ toolbar. Fields Tools
Which of the following types of fields CANNOT be
inserted into a form? Check boxes Toggle button

Comments
Which of the following is TRUE related to editing Comments cannot be
comments in a Word document? cannot be edited. deleted.

Text at the Numbers which


bottom of every appear on every
What is a header in a document? page page

In your English essay you notice that the paragraph


at the bottom of page 1 continues on to page 2. You
would like to make this paragraph start on page
2.What would be the best way to do this? Press tab. Press Return.
Tables in a document help you to easily arrange all
of the following EXCEPT: text. graphics.
To identify a document, it is helpful to include the
file name on each page as a header/footer. bibliography.
Which of the following tools will copy the formatting
of selected text to other places? Copy button Paste button
What is the name of the process of determining the
cause of errors in a macro? Fault Finding Bug Squashing
Drop caps are added to a Word document using the
___________ menu. Insert Tools

a section of text
where the first
letter of each
sentence is
a section of white lowercase and
text on a black the rest are
A reverse in a newsletter is: background. uppercase.

setting it in larger typing it all in


A pull quote is best emphasized by: type or font size. capital letters.

The reverse A pull quote is a


technique means quotation taken
to add dark text from (pulled)
on a light from another
Which of the following definitions is CORRECT? background. document.
Pertaining to newsletters, which of the following
cannot be changed using the Columns command The width of each The height of
dialog box? column each column
As related to type size, how many points are there
to the inch? 6 10
Assume you are working on a newsletter in which
the masthead extends across the top of the entire
first page. The rest of the newsletter has two
columns. What is the minimum number of sections
in the newsletter? One Two
Press
Press Ctrl+Enter Ctrl+Shift+Enter
Which of the following is NOT correct with respect to to create a page to create a
page, column, and section breaks? break. column break.

Which of the following would be the most A serif font at 10 A sans serif font
appropriate font for a newsletter headline? points at 10 points

Which of the following is the default Word column


width? 2 inches 3½ inches

Sequence Check is a --------------- level control check. Field Record


Analyse data over two or more periods is called
----------------------- analysis Horizontal Vertical
We use Hash Total to identify ------------ within a
series where there is a definite relation between
items Duplicate Value Combined Value
Analyse fields by arranging them into rows and
columns is called Cross Tabulate Filter
--------------------- function searches for a value in the
leftmost column of a table and then returns a value
in the same row from a column that we specify in
the table. RAND() VLOOKUP()

To import data from Access to Excel ,it is not


possible to link between Access and Excel sheet TRUE FALSE
The GAP detection options can be used to test for
completeness of data. TRUE FALSE
Exception testing can be used to identify
----------------- items Unusual Strange
comparison of
Data validity test represents exception testing data

Year end ledger, inventory files or transaction files


can be tested for cut-off , to ensure that the data
has been provided is for the correct audit period True False
In Range Check , the data may not be in proper
sequence but should be within a predetermined
range True False

In ---------------- Check data entry follow a particular


sequence and also a predetermined range. Limit Sequence
related to virtual
Virtual memory is reality a form of ROM
same as
same as multiprogrammi
Multiprocessing is multitasking ng
To help keep sensitive computer-based information set up a
confidential, the user should save the file password

to read from or
to calculate write information
What is the function of a disk drive? numbers to a floppy disk

A 4GL is Uses Cobol uses Java


A nanosecond is 106 sec 103 sec
What small, hand-held device is used to move the
cursor to a specific location on the screen? a keypad a mouse

data to be data that has


transferred to been transferred
The memory address register is used to store memory from memory
data to be data to be
transferred to or transferred to
The memory data register is used to store from memory the stack
an instruction
an instruction that has been
that has been fetched from
The instruction register stores decoded memory
Which of the following is used to indicate the
location on the computer monitor? a cursor a scroll bar
A mathematical procedure that can be explicitly
coded in a set of computer language instructions
that manipulate data. Formula Algorithm
Which of the following translates a program written
in high-level language into machine language for
execution? Assembler Compiler
Memory
Detecting errors in real memory is a function of protection Parity Checking

To find where a file has been saved on disk, the use the directory search each file
user should search tools in turn
A series of instructions telling the computer how to
process data or files is defined as a Network Program
save copies of
the file with the use different
To ensure that data is not lost if a computer system same name on filenames on the
fails, the user should the system system
Having a single CPU alternatively process tasks
entered from multiple terminals is called Multiprocessing Time sharing
The place in the CPU where the data and programs
are temporarily stored during processing is called
the ROM RAM

All are examples of computer software except Firmware Word Processor


Computer manufactures are now installing software
programs permanently inside the computer. It is
known as Firmware Word Processor
Which of the following file organisation forms most
efficiently allows access to a record Sequential Hashed
The part of the computer system controlling data
manipulation is called the Operating System ALU
For direct access storage devices the recording area Tracks and Blocks and
is divided into Sectors Sectors

The data hierarchy from the largest to the smallest Character, field, Database,
is database character, record
Which of the following hardware or software system Maintenance
controls provides a detailed record of all activities Valid character diagnostic
performed by a computer system check program
Which one of the following parts of a computer is
necessary to enable it to play music? Sound card. CD-ROM
An educational CD-ROM on Indian Poets contains
1000 pages of text, 500 colour pictures, 15 minutes
of sound and 1 minute of video. Which of the four
different media listed takes up most space on the
CD-ROM? Text Pictures
Which one of the following printers is suitable for
printing sprocket fed carbon copies? Laser Dot matrix

viewing an creating the


Multimedia software can be most productively used encyclopaedia plans for a
for CD-ROM. building design.
replaced
To be effective a virus checker should be regularly never updated

Which one of the following software applications


would be the MOST appropriate for performing Document
numerical and statistical calculations? Database processor

get into the make efficient


Passwords enable users to system quickly use of time
How many bytes do 4 Kilobytes represent? 512 1024
loss of duplication of
Back up of the data files will help to prevent confidentiality data
Which one of the following is the MOST common
internet protocol? TCP/IP HTML
access to the
internet is files can be
The advantage of a PC network is that quicker shared

The term A:\ refers to a file name a subdirectory

universal port up-line provider


UPS stands for serial service

the program
orphan files can executable may
The main problem associated with uninstalling be left on the not allow it to be
software is that system uninstalled

You are conducting research for a Income Tax


assignment. The raw facts you collect are called data. documents.
Graphical Rules writte in
representation of procedural
A flow chart is the logic language
Purchase, sales,
receipt, payments To fill the log
A voucher entry in Tally is done for etc. register

assist in
Passwords are applied to files in order to maintenance speed up access
Each of the following is an enabler of IT-business senior executive IT management
alignment except: support for IT. lacks leadership.
The basic systems model is used to describe
virtually all information systems and it consists of
the following elements: input. output.

The use of
computers to
design state-of- Using computers
the-art, high- to do
What is a computer-aided design system? quality products. architecture.

A(n) __________ offers a solution package for an specialist or Application


entire industry. functional Service Provider
ensure the
filename is not
File extensions are used in order to name the file lost
Information systems controls include all of the preventive detective
following EXCEPT: controls. controls.

Hashing for disk files is called external hashing static hashing


Components of expert systems include: a) inference
engine; b) user interface; c) knowledge base; d)
fuzzy logic A: (a) , (b), (d) B: (a) to (d)
corrective preventive
Black box testing and white box testing are part of: controls controls
What is the term used to describe the point of
interaction between a computer and any other
entity, such as a printer or human operator? Component Interface

The advantages of CASE tools are: a) reusability; b)


maintainability; c) portability; d) flexibility (a), (c), (d) (b), (c), (d)

Turn the
Which of the following is an acceptable way to shut Press the reset computer off at
down the computer? button. the power point.
Yesterday, in your music class you saved your
compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best Create the files Ask the person
way to locate the files? again. next to you.
Components of an information system model are: a)
applications architecture; b) functional architecture;
c) technology architecture; d) information
architecture (a), (c), (d) (a), (b), (c)
organisational
Benchmarks form part of: detective controls controls
Continuity controls include: a) record counts; b)
date checks; c) label checks; d) run-to-run totals (a), (c), (d) (a), (b), (c)
Which is not part of help desk documentation: problem logging call lights
Testing of individual modules is known as: unit testing data testing

Design phase of CASE tools includes: a) data


architecture; b) decision architecture; c) interface
architecture; d) presentation architecture (b), (c), (d) (a), (b), (d)
benchmark specifications
Which is part of installation testing: testing matching
The computer operating system performs
scheduling, resource allocation, and data retrieval
functions based on a set of instructions provided by Peripheral
the: Multiplexer. processors.
Which of the following falls under multimedia data:
a) text; b) images; c) video; d) audio (a) to (d) (b), (c), (d)
Replacement
personal
Which of the following procedures should be computers for Identification of
included in the disaster recovery plan for an user critical
Information Technology department? departments. applications.
Designing relationships among components is part architectural
of: design interface design

Several Computers connected together is called: Client-server Client


Which network topology uses a Hub? Star Bus
Which of the following topologies is used for
Ethernet? Star Bus
To do a
To maintain a particular job
backup copy of such as editing,
are written all the storing
Application software are programs information information
Which type of file search method requires a
computer first read all locations preceding the
desired one Direct Sequential
Data
Which of the following areas of responsibility are Systems analysis communications
normally assigned to a systems programmer in a and applications hardware and
computer system environment? programming. software.
Which of the following is recommended when many A sequential file A sequential file
searches for data are required on a disk on a tape

Tapes can only be


It is unlikely that a magnetic tape containing several read by the
thousand blocked records can be used on two machine on which Parity errors will
machines of different architecture directly because they are written result
Which component of the CPU has the most influence
on its cost versus performance Data path part Control Unit
Which of the following terms applies to network
used to connect computers with other computers,
peripherals and workstations that are in fairly close Distributed Local Area
proximity systems network
Use the
computer to
which they are
Can send data to connected to
a computer and perform all
Intelligent terminals differ from dumb terminals in receive data from processing
that they a computer operations

A computer is to be linked to 8 terminals using a


single communication link. To permit simultaneous
terminal operations, communication path will
require which of the following Mixer Modem

Allows computer
signals to be send
over a telephone Aids in back-up
A modem is a device that line procedures

A LAN includes 20 PCs, each directly connected to


the central shared pool of disk drives and printers. Planetary
This type of network is called a network Ring Network

A computer based system for sending, forwarding, Executor


receiving and storing messages is called an Office Automation systems
If a workstation contains a processor, monitor,
screen manipulation device, printer, storage and A dumb An intelligent
communication capabilities, it is said to be workstation workstation
Time of day Encryption
Terminal hardware controls include control locks algorithms
Terminal
RS-232 is a Type of cable Standard

A compiler
converts the
whole of a
A compiler does a higher level
conversion line program code
by line as the into machine
What is a compiler? program is run code in one step

Feasibility study, Implementation


system design, and
What are the stages in the compilation process? and testing documentation
Which of the following is not a data transmission
coding scheme CRC Baudot
An interpreter
does the An interpreter is
conversion line a representation
by line as the of the system
What is the definition of an interpreter? program is run being designed
A device used in data communications to divide a
transmission signal into several sub-bands is known
as a Modem Demodulator
Third generation languages such as COBOL, C, and High-level Middle-level
FORTRAN are referred to as languages languages
It is faster than
Serial Communication is used over long distance parallel It is less error
because it communication prone

In what areas is the COBOL programming language Financial sector Graphic design
used? and engineering and education

Manage the
Communicate paging function
with the console in a virtual
The primary function of a front-end processor is to operator environment
Specification and
What is the first stage in program development? design System Analysis
Which of the following is not used for data
transmission within a local area network Fiber Optics Coaxial Cable

The design of the System Analysis


screen the user defines the
will see and use format and type
to enter or of data the
What is System Analysis? display data program will use
A device to device hardware communication link is
called A cache An interface

Testing to check
The different for errors before
types of network the system is
What will a good software provider consider? to be used introduced
The topology of a network can be each of the
following except Star Packet
What is the 8-bit binary value of the decimal
number 85? 10101010 1100101
Which is the most common data transmission error
checking method Parity Retransmission
What is the decimal value of the binary number
1111? 15 4
Which of the following devices merges
communication signals onto a single line Port Modem

What is the decimal value of the octal number 215? 327 141

Which tool is used to help an organization build and Data Mining


use business intelligence? Data warehouse tools

memory access
Cache memory enhances memory capacity time
What is the decimal value of the hexadecimal
number FF? 30 255
Numbers are stored and transmitted inside a
computer in binary form ASCII code form
What is the hexadecimal value of the decimal
number 1476? 4C5 1B7
A byte corresponds to 4 bits 8 bits
Basic Coding Binary Coded
What does EBCDIC coding of numbers mean? Description Decimal
A Kb corresponds to 1024 bits 1000 bytes
What is the binary sum of 01011 and 00101? 10000 1112
Information is stored and transmitted inside a
computer in binary form ASCII code form

used to indicate used to detect


A parity bit is uppercase letters errors
Because it
squeaks when Its moves like a
How did the computer mouse get its name? moved mouse
What are you most likely to use when playing a
computer game? Touch screen Light pen
CPU performance may be measured in BPS MIPS
Tracing
A digitising tablet can be used for? Printing letters diagrams
In processing cheques which of the following I/O
techniques have banks traditionally used OCR MICR
Which of the following is a pointing device used for
computer input? Touch screen Hard disk

What does a light pen contain? Refillable ink Pencil lead


The capacity of a 3.5” floppy is around 100K 1.44 Mb
What general term describes the physical
equipment of a computer system, such as its video
screen, keyboard, and storage devices? hardware software

Where would you find the letters QUERTY? Mouse Keyboard


What input device could tell you the price of a
product Mouse Bar code reader
Where would you find a magnetic strip? Credit card Mouse
What are the individual dots which make up a
picture on the monitor screen Called Coloured spots Pixels
What input device can be used for marking a
multiple-choice test? Mouse Bar code reader
mouse button
QWERTY is used with reference to screen layout layout
What input device could tell you the price of a bar of
chocolate? Mouse Bar code reader
language
A GUI is hardware interpreter
Second -
First - generation generation
UNIVAC Computer belongs to the computers. computers.
Name the first Indian Super Computer? Vishwajeet Deep Blue
caused by
Disk fragmentation is caused by wear overuse

The technology which is used to check answer Optical Mark


sheets of multiple-choice questions in civil services Bar code Reader Reader
or similar examinations is: - Technology Technology

slower than an
A compiler is a fast interpreter interpreter
Dot - Matrix
Which printer among the following is fastest Drum Printer Printer
“Zipping” a file means encrypting it decrypting it

Very important Vital information


reader user resource under
What does acronym VIRUS stands for sequence siege
Electrically
An impact printer creates characters by using...? charged ink Thermal Paper
mainframe
A client-server system is based on technology LAN technology
A nanosecond is 10-6 sec 10-3 sec
A procedural control used to minimize the possibility
of data or program file destruction through operator
error is the use of Limit checks Control figures
_______ software enables users to send and receive
data to/from remote computers application system
A _____ is a running instance of an application project model
Splitting of CPU's time for different tasks _______
prevents time slicing multiprocessing multithreading

______ computers are used in large organizations for


large scale jobs which have large storage capacities mainframes super computers

_______ is responsible for all calculations and logical arithmetic and


operations that have to be performed on the data control unit logic unit

______ printer use laser light band printer drum printer


______ software enhances the user to enter ,store, data
manipulate and print any text management word processing
______ software enables users to send and receive integrated communication
data to/from remote computers software software
_______ is the temporary storage place for deleted
files my computer recycle bin
_____ is a collection of related fields field file
assembly machine
_____ language consists of strings of binary numbers language language

______ symbol is used to represent processes like terminator processed


assigning a value to a variable or adding a number symbol symbol
hp vectra
_______ is an example for micro computer PC-at system
_________capability supports concurrent users doing
different tasks multiprocessing multithreading
The ______ do not have processing power of their
own and has only a screen, keyboard and the
necessary hardware to communicate with the host.
For this reason, the terminals are referred
as_______________ "dumb terminals" dumb servers
distributed
A______is nothing but a PC with a network operating computing
system wan system
_____system is responsible for handling the screen
and user I/O processing host server
The______ handles data processing and disk access
in a Client/Server architecture host server
Both the DBMS and the application resides on the
same component in a ____system PC LAN

When all the processing is done by the mainframe host


itself, the type of processing is sometimes called as server processing processing

DBMS models can be grouped under____ categories four one

file management hierarchical


______is the most advantageous database system system database system
A new user initiates a new process of execution at
the background,while the user can continue his
query process as usual in the foreground. This
situation is referred to as ______ multiprocessing multithreading

The process of data being automatically written to a


duplicate database is called______ repairing redo logging

Modulation/De
Modem stands for __________ . Code/De-code modulation
Multiple changes to the same record or a field are
prevented by the DBMS through______ fixes locks
_________allows an application to multitask within
itself multiprocessing multithreading
Linear area Local area
LAN stands for __________ . networks networks

New process of execution is referred to as______ task process

Integrated Integrated
system dynamic Symbolic Digital
ISDN stands for _______. networks. networks.
_____________ is the Worlds largest computer
network . Ethernet Internet
_______is/are a popular front end tool visual basic power builder
When LAN connected together ,it is called __________
. MAN WAN

Data is broken into small unit called __________ . Cells Bits

System Software Mail


modulation transmission
SMTP stands for __________ . transfer protocol protocol
The __________ protocol is a network protocol to be Transmission
built for the World Wide Web . Transfer Protocol protocol

The computer which can receive data from other


computers on the network and print it is _______ File server Printer server
The hardware and the software requirements
together form the_____ platform configuration
ATM, Asynchronous transfer mode is a __________
technology. MAN and WAN LAN and WAN
__________ is designed telephone system ISDN ATM
Web based Web based
Expansion of WBT is ______________ Training Technology
_________ connects LANs. Bridges Routers
Collection of instruction is called a _____ procedure batch
Combination of alphabetic and numeric data is
called _____ data alpha numeric alpha beta

space occupied, cost,


Computers can be classified based on price, no. of users performance
______,______and _______ allowed their ratio
_______ is responsible for feeding data into the
computer input output
_______ is the capability of the o/s to run numerous
applications simultaneously multiprocessing multithreading
_______ involves conversion of raw data into some
meaningful information interpreter compiler
_______ is responsible for obtaining the processed
data from the computer input processor

_______ printers use light to produce the dots


needed to form pages of characters impact printers drum printers
control program,
operating system, interpreter,
Hardware components in a computer are bootstrap, kernel, assembler,
_____,____,_____,______ shell compiler
_______ software are programs that are complex and application
can be developed or purchased operating system software
_______ is a set of special instructions used to
communicate effectively with the computer batch protocols
_______ converts a high level language into machine
language processor compiler
_______ translates assembly language program into
machine language instructions compiler interpreter
OPTIONS
C D ANS

CTRL+F1 None of the above A

Tally INI None of the above A

CTRL+F3 None of the above B

A or B None of the above C


Four Five B

Alt+Ctrl+C None of the above B

& ^ A

Puchasing,
Accounts payable Receiving and
and Receiving Accounts payable D

A or B Mone of the above A

Ratio Analysis All of the above D

Four One A

Ctrl+T Ctrl+D B
Display
Information All of the above D

F6 F7 C
Shift+P None of the above A

Day Book Journal Book B

Sub None of the above B

A
Electronic Data
Interchange. All of the above C

4 5C

Field All of the above B

Change Period None of the above B

Journals None of the above B

Real None of the above B


None All of the above D

Journal Book All of the above A


Physical Stock
Transfer Reversing Journal B

Issue None of the above A

18 21 B

electronic data
analysis All of the above B

F6 Alt+f5 B
Primary Cost
Category All of the above C

Vouchers None of the above C

10 to 60 None A

Order All of the above A


Information None of the above C

Ctrl+f2 Ctrl+f4 A

A and B None of the above C

F7 function key None of the above A

A or B None of the above B


1-4-1997 to 31-3-
1998 None of the above B

A or B None of the above C

Cash and profit


& loss Cash and bank C

A or b None of the above B

Cost category None of the above A

F8 F9 C

A and B None of the above C

a or b None of the above A

Regional setting None of the above A

Balance Sheet None of the above B

F10 F11 B

Both A and B None of the above C


4 1B

F11 F12 A

Budget None C
A

Alt+F3 None of the above C

A
Symbol None of them B

A or b None A

Stock analysis None of the above A


In 'comp info ->
security control'
option None B

A
28 16 C

Sub-Groups B or C A

Data Entry TallyVault A

Both A and B None of the above C

Cash receipts. Payroll transactions. A


Will be more
efficient at Eliminates the need to
producing reconcile control
financial accounts and
statements. subsidiary ledgers. C

the address of an instruction that has


a memory been transferred from
location memory C

Capacity
Planning Exception reporting C

RAM AGP Card B

Control totals for


one or more End-of-file and end-of-
fields reel code B
Storing
information on
the hard disk None of above B
Visual audio
board None of above C

File protection
ring Limited access files C

Pixies None of above B

Reel Number Batch Total D

Pointing device None of above A

Console Log Data Dictionary B


An inked
ribbon and
print head None of above C

Require user Make duplicate copies


passwords of files A
Eraser None of above C
A ribbon A cassette A
Centralised
function for PC Distributed policies or
Disposition procedures A

An INK RIBBON None of above C


Storage
capacity None of above C

Read and Write None of above B

Floppy disk None of above A

A parallel access
medium None of above A

700MB None of above B


Magnetic tape
storage None of above C
Magnetic tape
storage None of above A

In a drawer None of above C

CDROM chips None of above B

DRAM chips None of above B


Logic bus None of above A

Control unit None of above B

8 bits None of above B

CACHE None of above A

Business
software and
games software None of the above B
Mainframe
computer None of above B
Jon Von
Neumann
computers None of above B
Hoover
generation None of above A
Fourth
generation None of above C
Fifth
generation None of above C

Fifth generation None of above B

Fifth generation None of above A

Analysis, System
Design, and
Implementation None of above A
JCL none the above A

A
A

to obtain a
record layout extract data from file A

all the above none of the above A

absence of audit
trails all the above D

unique approach none of the above B

checks and
controls all the above D

all the above none of these A

A
use of any
programs none of the above D

A
conceptual/physi
cal all of them D
A

A
A

enable multiple
user resource
sharing all the above D

all the above none of these A

model base all the above D

report files none of the above D


file manager filepet C

all the above none of the above A

deletion addition B

software and
database safety and database B

B
on quarterly
basis none of the above B
A

Benjamin none of the above B

random
placement of
component none of the above D

A
none of the
above all the above A

none of the
above all the above A
A
A

interactive data
innumerable
analysis none of the above B

big-bang stub C

hybrid tests all the above D

B
re-perform
procedures
carried out by
the clients
programs all the above D

none of these all the above A

A
all the above none of the above A

none of these all the above A

A
A
can provide the
auditors with
useful
information with
trend s and
patterns all of the above D

examination of
source code of
a program with
advice to
following the
logic of a
program none of the above C
ALC ACLL B

analyzing the
picture of a file or
data all the above A

A
none of the
above all the above A

identifying non-
standard code all the above D

resource
requested all the above D

all the above none of the above A

master list of administered


transactions questionnaire A
prepared by an
outside
programmer
engaged by the
auditor all the above D

A
stratification and
frequency
analysis all the above D

B
examining the
quality of data all the above D

Can aid in simple Can define the


selection audit objectives D

High End CAATs All of the above D

A special purpose
written program None of the above A
Compliance tests
of general EDP
controls All of the above D

Event Procedures General Procedures D

primary number auto number D

procedures none of the above B

chart macros D

comments action D
expression
builder expression elements C
expression
elements list
box none of the above C

insert none of the above A

auto report embedded C

datasheet justified B

embedded report new report D


dynamic and
static none of the above A

chart insert chart C

foreign key none of the above C


mail wizard none of the above A

page header report header D


group footer none of the above B

for specifying
conditions with
group by
clause none of the above C

macro names none of the above C


forms macros D

insert delete B

module none of the above C

A
RAID none of the above A

message none of the above B

CME none of the above A

on line editing none of the above A

OLE server OLE communicator C

connected edited A
BMP html D
publish to web
query wizard wizard D

dynamic file none of the above B

insert data definition D

pesos yen A

command button list box B

link create icon A

save as html none of the above C

end none of the above B

procedure none of the above C


front end language A

database data storage C

new database
dialog box database dialog box A

235 63500 A

number automatic field B

explicit join none of the above A

candidate key no duplicate key A

cascade update change all related


related fields records C

both a and b none of the above B


record or
records none of the above C

B
Dynaset field
properties properties B

select queries update queries A


change/delete
queries update queries A

no match join outer join D


A
form wizard
dialog both 1 and 3 D

append simple D

form properties new properties B

new form child form B

Form Operations None of the above B

hierarchical form one to many form B


sorting querying C

pipes gateways A

filter by menu None of the above A

@ ? D
B

data less control data control B

controls group record group B

controlled all of the above C

DATE() DAY() C
combo box static text B

tabular form main form A

filter by form none of the above C

option control
wizard tool wizard C

two of the above none of the above B


B

table ledger A

module none of the above A


bitmap report A

25,000 64,000 D

form all of the above D

report hyperlink D
A

Tools none of the above C

candidate keys primary key C


A
B

A
B

zero none of the above B

B
both 1 and 2 none of the above C

A
B
delete query append query B

B
A

self join table join C

B
A
B
stand alone sub chart D

B
B

B
A

primary key field none of the above C

attributes entities D

append add A

A
B

use datasheet in
forms use export D

B
B

? * D

A
group topic C
A

A
B

range logical C
B

event -
procedural based
language none of the above C

query table B
B

session detail D

both a and b none of the above B

inner form none of the above A

labels report B

index identifier B

form none of the above A

sorts forms A
unbound none of the above C

button option button B


A

record source none of the above C


data sheet form none of the above A

columnar form none of the above A

unbound none of the above A


bound static C

tabular form columnar form B

relationships none of the above C


option button, toggle
list, check and button and check
combo boxes boxes D

filter by record filter by input D

macro table B

field layout B
field names record grab D
An organised way
of storing
information
about a set of A way of maintaining
similar things a log C

A document
which contains
text A collection of files B

Relational DBMS Reliable DBMS C

is related to data uses tape as opposed


mining to disk C

Computer Database access


matching controls D

A tool which
allows text and
graphics to be
placed in
documents None of the above A

Using queries None of the above C

Word processors,
spreadsheets,
databases, DTP None of the above C
PRIMARY KEY and
UNIQUE
constraints IDENTITY columns C

ALTER TABLE UPDATE TABLE C

Component Source D
keeping the
original paper saving the file with
copy different filenames A

mail merge e-mail C


browser e-mail A

wildcards engines C

AutoNumber Auto Key C

forms in a
database are
consistent with reports are consistent
the underlying with the underlying
tables or queries. tables or queries. B
query and its
associated report and its related
dynaset. query. A

a field from an not a primary key of


unrelated table. either related table. B

Many-to-many Many-to-one B

EmployeeLastNa
me CompanyAddress A

The one-to-many
The join line relationship B

Select Undo in Click the Delete


the Relationships Relationships button
pull-down menu on the toolbar B

That there are That records can be


records in a added by clicking on
related table the plus sign C
They cannot be
AutoNumber data They must be the
types same data type D
The customer’s
ID is deleted
from the
Customers table,
and all the
related loans are
deleted from the An error message is
Loans table. displayed. D
The subform is an
object on the form
The subform is and can be moved or
displayed in Form sized like any other
view. object. D

A one-to-many
relationship A many-to-many
between coaches relationship between
and teams players and teams C

¥ * C

The Loans table


at any time Neither table C
title bar text, title bar text, icon,
prompt, icon. prompt. B

CreateList. Sub. B

A drop-down list
enables the user
to choose from A drop-down list
one of several enables the user to
existing entries. enter text. C
does not have to must be set for two
be set. words. C
create tables of maintain data on
rows and different things in
columns. different tables. A
metadata. all of the above D
information. a and b D
e-commerce
database
application a or b A
e-commerce
database
application None of above B

Structured Query Relational Question


Language (SQL) Language (RQL) C

Data Business Relational Model


Model System Manager B

Oracle a and b D
The database
management
system (DBMS) All of the above. D

None of above All of above A

creates reports b and c D


the database
management
system (DBMS) the database B
it contains a
description of its
own structure All of the above. C

holds indexes All of the above. D

as a redesign of
an existing
database a and b A

as a redesign of
an existing
database a and b B

as a redesign of
an existing
database a and b C

entity-relationship
data models data modeling A

entity-relationship
data models data modeling B
entity-relationship
data models data modeling D

entity-
relationship data
modeling data migration D

network models relational data model A


the order of the more than one column
rows is can use the same
unimportant name C

row field D

key tuple C

composite key foreign key C

foreign key candidate key D

foreign key surrogate key B

Deletion anomaly All of above D

create one or move the data into


more new tables the new database A

have poor are not true DBMS


response time products B

Nonintegrated
data None of the above A

nonintegrated a "wrong format"


data problem B
nonintegrated a "wrong format"
data problem D

data warehouse
data are often
denormalized. b and c C

Report Query A

Macros Spreadsheets D

Regardless of how the


objects and tables are
It is advisable to stored, the user will
put each object have to reenter the
and table into a data in the tables
separate when the application
database. is upgraded. B

An application can be
All objects in an created in such a way
application, that it objects such as
including the forms and reports can
tables, must be changed without
reside within the disturbing the existing
same database. data. C

Merge Join A

It contains a user
interface, or
switchboard It contains macros C
Interface Design
Wizard Switchboard Manager D

put key business


information into
the hands or store all corporate
more decision transaction data in
makers. one single location. C
Digital Signature None of the above C

Digital Certificate Private Key A

Hash Result Either B or C D

Both A and B Either A or B C

Institutional
Overhead None of the above A
Certificate
Authority None of the above A

Personal Digital
Certificate None of the above A

Personal Digital
certificate None of the above C

Public Key none of the above B

Efficiency and Evidence, Ceremony,


logistics, Approval, Efficiency
Evidence and Logistics D

certificate
Revocation Letter None Of The Above A

Private Key,
Recipient None Of The Above A
Transmission File None of the above C

UNESCO UN/EDIFACT D

functions functional groups D

SET None of the above A

Smart Cards Electronic cheques D


Online Catalog and
Broadcast and Customer
Junk Mail Endorsements C

EFT All of the above D

Public Key and Public Key and Private


Password Key D
Satellite Area
Network None of the above B
Glow sign or
hoarding
strategies All of the above D

Billboard Endorsements A

Direct-mail Junk mail D

Billboard Broadcast C
Low cost of
operation Quality management B

Industrial
espionage Economic espionage C

A competitor’s new
Research data project B
e-commerce
database
application None of above C
Including the Using all capital
Subject letters D

Encryption
performed by a Security at the
physically secure transaction phase in
hardware device EDI systems is not
is more secure necessary because
than encryption problems at that level
performed by will be identified by
software. the service provider. C

tip wizard function wizard A

column reference none of the above A


quattropro or
xbase files class files D

range values reference values D

=currentdate() none of the above A

# sign none of the above A

function wizard none of the above C

parameters none of the above B

numeric Boolean D

merge none of the above A

pmt count A
convert text to
columns wizard tip wizard B

countif none of the above B

sumif countif C

print none of the above A


none of the
above A
shading none of the above B

print print preview B

sorting none of the above A

all blanks none A


www.encybrit.co
m none of the above B

FTP none of the above B


intermediate
network none of the above B

physical layer session layer D

ftp service none of the above A

ARCHIE none of the above C

unlimited restore
locator none of the above A

scheme none of the above C


command line none of the above C
sears general electric C

browser editor B
search for
database none of the above C
wincim or
maccim none of the above C

cyberspace none of the above C

excite none of the above B

web server none of the above A


image list none of the above C

one many B

top middle and lower D

index glossary C
menu
search,item item search,index
search search C
lycos all the above D
lynx all the above C
Lycos navigator gold 2.0 C
IBM CompuServe D

ftp telnet D

Hyper text Hyper text transfer


transfer protocol port C

uucp none of the above C

telnet none of the above C


transfer
communication
protocol/internet
protocol none of the above B

three none of the above C

web servers none of the above B


the internet
access none of the above A

site organization B

uniform resource
label name of the above B

frantically asked
question none of the above B

IP,UDP none of the above A

request close A

world search for


information and
research council none of the above B

mosaic,gopher none of the above B

interface none of the above B

hotwords none of the above B


verification on
network
integration and
communication none of the above A

university of
California net none of the above B

dns none of the above A

telnet and ftp none of the above A

wais,winsocks none of the above B


winsock none of the above B

books marks none of the above B

animation none of the above B


animation,scripts
,executables none of the above A

welcome page none of the above B

grand network
news none of the above B
search engines none of the above B

yahoo and
altavista none of the above B

ftp archive D

all the above none of the above D

Delphi fidonet A

bookstores none the above A

more information galenet A

database channel B
Graphical Graphical Interface
interface format format B

Joint pictures Joint pictures


expert graph experimental group A
net browsers C
eudora,netscape
and pine none of the above C
network
connections mails B

FCOLOR FONTCOLOR B
Communication
graphical Common Gateway
interface Interface D

Communication Connection B

Client None of the above B

Web Channel A

text or image neither text nor image C


SGML CGI C
metalanguage none of the above C
pancake is not
edible none of the above B

SGML Parser SGML Composer C


applets documents A

Internet
Engineering Task
Force None of the above C
MS Internet
Explorer and
Netscape
Navigator None of the above C

symbols video C

hotword hotlink B

in user-defined
order none of the above B

home none of the above C

.gif and .jpeg .wmf and .bmp C


service,port and service,hostname and
directory path port B

mailing lists,mail
server robots and
gateways to
other services none of the above C

<hr size=n> <l1 type=shape> D

classified general
instructions none of the above B

Browser User A
intranet none of the above B

wan none of the above B

packets none of the above A


email,file
retrived,internet
tools none of the above C

communicator,ie,
lynx,winsock all of the above B
ARPANET none of the above B

defensive
advanced
research projects
administration
net none of the above C
first none of the above B

intranet,extranet none of the above A


cooking and
dining none of the above A
united states &
Russia none of the above B

network none of the above C

servers none of the above C


network
redirectors none of the above B

data target
equipment none of the above B
network layer none of the above B

smart network
and dumb
network none of the above B

file transfer none of the above B

LAN,WAN,MAN none of the above C


TAN none of t he above B
WAN none of the above C
non-digital none of the above B
Document type
definition Document type data C
Manipulate/dema
nipulate none of the above B

Manipulation none of the above B

Cable and wires none of the above B

Serial line
protocol none of the above C

Pillar to pillar
protocol none of the above B

storing data on receiving information


the hard drive from a host computer B

Size Channel A

Browse Retrieve C

Either A or B Neither A nor B B

Both A and B Both B and A C


Electronic Fund
Transfers All The Above D

Formal Legal
Requirements, Open
Open System System D

Signer
authentication None of the above A

Both A and B Neither A nor B C

Digital certificate Private Key A

Private Key None of the above A

Both A and B Either A or B C

Both A and B Either A or B A

Both A and B Either A or B B

Encryption Cryptography C

Conducting
fraud-awareness Reviewing the
training. systems-access log. D
Received by the
intended Sent to the correct
recipient. address. A
The private key
is used by the
sender for The private key is
encryption but used by the receiver
not by the for decryption but not
receiver for by the sender for
decryption. encryption. A

Failure of server
duplicating
function. Firewall vulnerability. D
Backend-to-
Business Business- to-Billboard A

Endorsements Broadcast B

Catalog Broadcast A

.COM Domains A
Search and
discovery None of the above C

Pre-purchase
preparation Search and discovery A
Endorsement
model of
marketing None of the above B

Billboard Pulling cart B


EDI For
Administration,
Commerce and
Transport None of the above C

EFT Gateway D

Assembler EDI D

Consumer-to-
Business Customer-to-Company B

Euro Cash Endorsed Cash B


Service
Perspective None of the above C

TT(Tiny token) E-token A

Encryption Subscription C
3 4B

index table pivot table D


convert text to
columns wizard tip wizard D
legend data marker A
legend data marker B

legend data marker C

legend data marker D

pie chart surface chart C

pie chart surface chart B

pie chart surface chart D


pie chart surface chart A

symbols none of the above A

Netscape word 2000 A


convert text to
columns wizard tip wizard A

stock chart pie chart C

Multi-dimensions A

B
It is often used to
display share It is also used for
market prices indicating fluctuations
over a period of in temperature
time changes B

Solver Data table. C

Pivot table Data table. A

Solver Data table. D

Spreadsheet none of the above A

Performing text
formatting. All of the above D
Source table
name. Pivot table item. C
N B

Multi-dimensions A

It can be
represented in 3-
dimensions B

SumIf A
tables worksheets D
It summarizes
the data by using
analytical
functions. A

solver Pivot table D

tip wizard function wizard B

tables database A

modal window C

No border A blinking border A

2,2,2 6,8,10 D

the column is too


narrow to show
all the digits of
the number either b or c C
flexibility of
moving entries cost of initial set-up D

database spreadsheet D

Gap Rows A

Drawing pictures Document filing A

click the column


heading click the column label C

TAB INSERT A

constant. formula. B
#VALUE! Tom McKenzie. C
Numeric
constants Text constants D

* \ D
It is impossible to
D4^2 determine. C

SUM(H9:H11) G7*SUM(H9:H11) B
The phrase “active
It is displayed in cell” appears in the
reverse video. Status bar. A

By either clicking
in a different cell
or using the By typing the
arrow keys to reference of the cell
move to a you want to move to
different cell in the formula bar C

The Cell Format The Font Size


command on the command on the
Edit menu Tools menu. B
the Save As the File Type
command on the command on the File
File menu. menu. C

View Window A

List Properties B

Both Insert and


Delete Clear C
Both Clear and
Delete Remove B

Fonts Margins C

View Edit B

group. cell group. B


D12:G25 D C

clipboard. source range. D

clipboard. source range. B


The Paste Both the Copy and
command Paste commands D

mixed constant A

B$4 $B$4 D

#DIV/0! #DIV/0! B

#DIV/0! #DIV/0! C

The Paste Both the Cut and


command Paste commands D
cycle through
absolute,
relative, and
mixed cell cycle through open
references. applications. C
the Formatting
toolbar Conditional formatting B

Right-click a cell
and click the Edit Double-click a cell and
Hyperlink click the Insert
command. Hyperlink command. B

whether the cell


has an absolute
or a relative cell
reference. the value in the cell D
text with either a two-
digit or four-digit year,
depending on the
an integer. format. C

It is impossible to
determine from the
29/03/2008 information given. B

subtracting the
later date from adding the later date
the earlier one. to the earlier one. A

the Esc key. the F1 key. B


Either 3/4 or .75,
March 4 of the depending on the cell
current year formatting C
either a cell on a
worksheet or a
a constant. variable. D

B1;G10 B1:G10 D

MAX SUM C

Pie Scatter C

Once a pie chart


has been chosen Once a line chart has
it cannot be been chosen it can be
changed to line changed to a pie
chart. chart. D

hold down the hold down CTRL +


ALT key SHIFT A

Transfer
information to a
database Use multiple sheets D

Fill Right Paste Special B

Edit | Data | Sort none of the choices B


Create forms None of the above C
select Print
selection on
 Page Setup  | select Print selection
 Sheet  and then in the Print dialog and
print then print D

#VALUE! =(B2*(D4+C2) C

REF! None of the above B


whatever was
last used vertical A
A0 None of the above C
CARN NET A

newsgroups and
search engines none of the above B

application
servers,proxy
servers and web
servers none of the above B
bulletin
broadcasting
system none of the above A
very small none of the above B

windows stocks none of the above B

PINE Lynx A

built-in none of the above B

Cryptography Message Digest C

Hash Function Formula A

Name Address B

Cryptography Password Cracker A

Address Protocols D

Unauthorising Approving A
Exposure Hacking B

Judge of a civil Police officer of IPS


court rank. B

Virus Cracker C

Charles Bubbage Howard Aiken A

Dell .com Msn .com B


Asynchronous
Transmission
mode None of above C

Address Protocols C

Port Pin B

CAN PAN A

hypertext hypertext tracing


transfer protocol protocol C

New Information
Card None of the above B

Only printers None of the above D

Switches data
from incoming
ports to outgoing
ports. All of Above B

Bridges and Hubs Hubs and nodes B


Packets None of the above C

router virus checker A

Four None of the above C

Network Layer All of the above D

Fiber Twisted pair B


A memory
address None of the above B

Router None of the above B

It continue on to
target device
with corrupt data None of the above B
Ultra violet
technology None of the above A
Network Layer All of the above D

Octal None of the above A


48 KB 48 MB A

software that a gateway calling


allows file program for internet
copying bridging B

Server Network PC C
If the hub goes
down, it brings If the hub goes down,
down all of the it brings down all of
nodes on that the nodes on all of the
section rings B

Both A and B None of the above B


Ring All of above D
Both A and B None A
Linear Both A and B B

Star Mesh C

Star Mesh B

Linear Ring C

Star Mesh A

Physical Layer Data Link Layer D


Ethernet, Ethernet, token ring,
DecNET, FDDI ARCnet B
mbps mips B
Mbps Mips C
depend on the
transmission limited by modem
medium speeds C

Windows 95 Netscape B

must have a LAN


account All of the above A
common
gateway application protocol
interface interface C
interfaces a
modem to a connects a computer
computer to a network D
Windows
package Netscape B

Windows NT None of the above C

the Internet none of the previous A

bridge none of the previous D

is a CPU
functional unit make of processor A
is a protocol for the
is part of transfer of files
Netscape between computers D

is part of
Netscape None of the above D

a screen saver
program none of the previous D

a poor file server none D

browser none of the previous C

clip-art file search engine D

is a CPU
functional unit make of processor A
is a protocol for the
is part of transfer of files
Netscape between computers D
is a protocol that
is part of allows for remote
Netscape login D
Any layer can
communicate
only with the Any layer can
layer directly communicate only
above or below with the layer above
it. it. C
It works the Individual computers
same way as a can connect to it
local network. using an ISP. A

Denial of Service Port sniffing C


Virus that
initiates a ping
flood UDP flood A

flood traffic C

switch hub B

a poor file server none of the above D

Backup data on a Limit logging on


daily basis access C

Only large name-


recognizable ActiveX-enabled sites
sites are safe. are safe. B

Use of logical Use of encryption


access methods methods D
by attaching by scanning the
itself to a computer for a
document. connection. B

Web traffic Application updates D

A worm Spyware D

Multiplexors LAN B

cookies and key key loggers and


loggers. worms. C

Giving out Changing the content


disinformation of a Web page D
Disruption in All of the above are
supply lines correct. D

Contaminating Shutdown of nuclear


water systems plant safety systems D

To obtain an accurate
inventory of network
To improve related equipment
system response and parts and network
time nodes D
stop its
competitors update its prices as
seeing their soon as they are
prices changed D
USA People
Search Lycos Search B

Personal assets Criminal records A

Adware Spyware B
make large amounts
of money by parking
purchase off- funds in their bank
shore property. account. D

Siphoning Hoaxing B

virtual stalking. Web stalking. B

spam. viruses. B

Use a proxy Use anti-spyware


server. software. B

Message
sequence Logical access
number checking controls B

Both I & II Neither I or II C

www telnet C

Increases boot up Misleads a program


time recompilation B
both HTML and
Microsoft Excel Internet Explorer B
round trip HTML
document. Web browser. B

.con is used for


companies None of the above A

HTML. one way HTML. C

DHTML. MHTML D
clicking a
hyperlink that
references a
document that is viewing an Excel
stored in the worksheet that you
floppy drive on have saved as a Web
your computer page. B

Go to the History
page and look for Go to the Bookmarks
the site or Favorites page C

the Update the External Data


command command A

Sound Video C

JPEG TIFF C
Add it to Cut and paste it to a
‘Favourites’ or word processor
‘Bookmarks’. document. C
privileged
network. network topology A

a footer. an encryption. B

IPP PoIP A

Desktop server, Desktop server,


application, and software, and
database. hardware. A

Telephone line None of the above B

File Transfer
Protocol None of the above B
So email is
delivered faster None of the above A

143.215.12.19 None of the above D

paul.domain.uk None of the above B

No-one None of the above C

Internet Remote
Conversations None of the above A
A letter will be
sent to you in the
post None of the above A

High volumes of
email None of the above C

slide view &


outline view none of the above B

squares icons C

grid guide C

auto shapes all the above B

fonts & images none the above A


.video file all the above B

movelast,false eof,true D

toolbox project explorer D

movefirst,false bof,true D

number() val() D

square oval D
A

forecolor none of the above C


textunderline,tru
e none of the above B

foresize fontsize D
one-thousandth one-ten thousandth of
of a second a second C

itemcount listcount D

project explorer toolbox B

vbmsgboxstyle none of the above C

label inputbox() D

dbopensnapshot dbopendynaset D

unload initialze C

transparent graphical D

green black B

blue white D
project explorer
toolbox window D
project explorer
toolbox window A

text gotfocus D
container none of the above C

initialize activate D

caption none of the above C


openrecordset none of the above B

value style C

var none of the above B

.ctr .ocx B

Check Audit A

On Error Stop On Error Resume Next D

Refresh Resize A
UnloadMode UnloadMode
parameter to a parameter to a zero
non-zero value value A

3 None of the above D


Consists of
Various Forms
And Code Consists of several
Modules Projects D

Class module,
code module None of the above A

Place code in the


Deactivate event None of the above B

Refresh PaintPicture A
Msgbox
error.number & Msgbox error.number
error.text & error.description D

To provide a
To allow the repository for images
editing of icons used by other controls D

GetFile GetBytes A

GetProperty Value B

Windows
explorer Input box D
Multi-Line Font C
KeyUp and KeyPress, KeyUp and
KeyDown KeyDown D

Input Mode Output mode B

ScaleHeight and
ScaleTop x and y A

Property Let Property Set C

ZOrder property AutoRedraw property C

Value CurrentVal B

SetAttr CStr A

Are actually not


properties None of the above B

MyVar has not


been declared None of the above C
The
ExecProcedure
method None of the above D
An exclamation
icon None of the above B
intrinsic
constant. built-in procedure. C

InputBox function
can be created
with the macro MsgBox statement
recorder, while can be created with
the MsgBox the macro recorder,
statement while the InputBox
cannot. function cannot. B

Data can be A new check box can


entered. be added. C
Deactivate Terminate C

cutting tool scribble drawing tool A

color scheme color guide C

color palette primary color scheme A

18 36 C

pie linear A

slides slide sorter views C

doughnut all the above A

data stream B

auto shapes track changes A

the chart window


opens displaying
a chart template none of the above C
custom drawing standard drawing
tools tools C

used to create a used to store the


manager box for other tools of the
an existing box organizational chart C
not available in available in the tool
the tool bar bar B

thrice any of the above C

five eight B

standard tool all the above B

slide view none of these B

preview none of the above B

copying moving B

clip art drawing tools A


.html(hypertext
.doc(document) format) B
six twelve C

.txt(plain text) .doc(document) B

displayed only in
outline view none of the above A

both a and b transition D

slide show view show A


master slide master notes A
view show slide sorter view C

7.5 inches,5
inches none the above B

a or b none of the above A


transition b or c A

png none of the above D

action button all the above D


Microsoft visual
interdev all the above B

templates add-ins A
when the slide
show is run none of the above C

header files all the above A

both a and b none of the above B

properties pane outline pane D

paint shop pro power point 2000 D

contains sample
presentations for
a variety of provides suggested
topics content and design D
user can insert
picture to the
master slide user can insert picture
which gets to the title slide which
reflected in all gets reflected in all
the slides using the slides using that
that master slide title slide B
in notes pages
view, drag the I slide view, drag the
slide icon to a slide icon to a new
new location location C

design templates the slide that holds


is the template the formatted
whose format placeholders for the
and color scheme title and sub-title for
user applies to a the presentation is
presentation called a title template D

user should
select the slide the slides can be
view to add the reordered in the
text to the slide outline view B

design template the slide that holds


is the template the formatted
whose format placeholders for the
and color scheme title and subtitle for
user applies to a the presentation is
presentation called a title template D

new slide set up show B


user can add data
data is plotted in labels and gridlines to
a chart window the chart B

the header slide the format slide B

grammar checker none of the above B

102 22 B

three four times B


CD-ROM, digital text, hypertext, Power
camera and Point, video and
sound. sound. D
Line style, Line color,
the Font and the text font, and text
text alignment alignment D

Fill color, Line color,


Line thickness and Line thickness D

Microsoft Graph
is started so that
you can create a The graph placeholder
graph. is deleted. C

taken from the


first column or
row of data in the
datasheet,
depending on
whether the data
series are in rows
or columns. entered by the user. C

Pie chart Line chart B


Pull down the Insert
menu and select
Chart, click the Insert
Pull down the Chart button on the
Insert menu and Standard toolbar, or
select the pull down the Insert
appropriate menu and select the
Object. appropriate Object. D

You cannot display


Pull down the the underlying
Edit menu, then datasheet once the
select Object. slide is finished. B

Click outside the Change to Slide Sorter


chart. view. C

The datasheet window


The datasheet is is toggled from closed
saved as a to open (or from open
separate file. to closed). D
The application that
The chart is created the chart is
doubled in size. started. A
The chart is Microsoft Graph will
doubled in size. restart. D
a slide one bullet item
at a time, build bullet
items a letter at a
time, and build bullet
bullet items one items a word at a
word at a time. time. D
Subtle, Moderate, or
Exciting Exciting D
Both enter and
exit, and fly in Neither enter nor exit;
from top or neither fly in from top
bottom nor bottom C

Alt Ctrl B
Custom animation can
be used to affect the
way objects appear on
a slide, to what
objects do after they
appear on a slide, and
the way objects to the way objects
exit a slide. exit a slide. D

The advanced
timeline shows The advanced
the sequence in timeline shows
which objects will neither the sequence
appear on the in which objects will
slide and the appear on the slide,
duration of the nor the duration of the
effect applied to effect applied to each
each object. object. C
Clips, organization
Text charts, and text D

Filtering program Animation program A


Fly in, From top, and
Dissolve in Dissolve in D

Data cannot be
entered into There is no such thing
Datasheet. as a Datasheet. B

OLST. OLIP. B

You cannot
change the style
of the connecting You cannot change
lines in an the color of the boxes
Organization in an Organization
chart. chart. B

[Alt+Z] [Ctrl+Z] D

.frm .frx B

loaditem none of the above B

addpicture none of the above B


File1.Path =
Dir1.Path none of the above B

msgbox() none of the above C


File1.Path = File1.pattern=Dir1.pat
Dir1.Path h C

recordcount count C

addnew additem C

additem addnew B

moveprevious movefirst C

UnloadMode UnloadMode
parameter to a parameter to a zero
non-zero value value A

Office 97 Back Office A

drag & drop none of the above A

select none of the above A

ctr+end and
ctr+home none of the above B
web layout, page
layout none of the above A
click from start
program,
MSWord from the
task menu none of the above A
document
assistant none of the above A

Icon Tip Document Tip A

ruler none of the above B


home and end
keys only up and down arrow D
decimal rotation D

dialogs/alerts none of the above B

both A and B none of the above C

design wizard pictures A

database forms A

0 11 A

print preview
from the file none of the above A

style box none of the above A

ctrl+f ctrl+m A
ctrl+f ctrl+m D

CTRL+SHIFT+S CTRL+SHIFT+P A

ctrl+shift+s ctrl+shift+p C

Both None of the above B

Limit Check Reasonableness D

A or B None of the above B

ODBC All of the above C

This involves
looking at a
system and
finding out how
information is
being handled None of above C
Maintenance,
reliability, and
upgradeability None of above B
To maintain
security None of the above D
Transferred from the
Saved to the disk disk A

Users operate
the manual
system None of above B

Users continue
operating the old
system None of above A
User Guide and
technical
documentation None of above C
User guides
cover how to run
the system, enter
data, save, print,
etc. None of above C

Database
systems and
backup services None of the above A

floppy disk Hard disk B

To help someone
who is applying
for employment None of the above B

Address bus Control Bus A

TED MAD B

Address bus Control Bus D

Data structures
that are part of
the kernel of an Shells, compilers and
operating other useful system
system. programs. D

decimal form alphanumeric form A


represented 256 represented 127
characters characters A
16 bits 32 bits A

230 bytes 1024 bytes A


a 32-bit bus or 32-bit
32 Mb of RAM registers D

is the first bit in a


byte is the last bit in a byte B

DRAM CROM A
bytes Hertz D

secondary secondary storage


storage capacity access time B

have medium use variable size


clock speeds instructions D

Data is not saved


before computer
is shut down All of the above D

printer interface a modem interface B

ink-jet printer laser printer. D


stores more
information than is used for cache
RAM memory B

provides backup
power in the
event of a power
cut none of the previous C

is an access card
for a security contains a
system microprocessor C

SSGA displays none of the previous B

writing programs
in multiple
languages none of the previous A

writing programs
in multiple
languages none of the previous D
Variables Logic Bus B

CD-ROM e-mail D

to run more than


one program at
the same time none of the above C

multiuser none of the previous C

PAGELAYOUT ONLINE DOCUMENT A

ctrl+end ctrl+home B

ctrl+x or ins ctrl+v or Del A

ctrl+1 none of the above B

AutoShape Border A

Page Layout none of the above A

Auto Shapes File A

WordArt Bullets D

remove clear all D

circle bullet
dialog box none dialog box A

AutoShapes files C

new document default document B

mail merge none of t he above A

shift+f8 tools+spelling menu A

first row last cell of the t able A

enter none of the above A


table auto format
option none of the above A
records none of the above B

style gallery none of the above A

Data Source none of the above B


vj++ visual FoxPro B

alt+f8 alt+f5 A

browser none of the above A


micro soft
outlook hotmail A

sgml vb script A

arpanet LAN A

field names in
the header the number of fields
source must names in the header
match any merge source must be the
fields you've same as the number
inserted in the of data fields in the
main document data source B

by default cell
height and
weight option delete cells option
applies to all the allows to delete the
rows and entire row or a
columns of a column or shift cells
table up or shifts cells left C

justified top A

If a header is
inserted in the
second section A section is a portion
then the same of a document in
header is which certain page
applicable to the formatting option can
first section be set D

A
A

Double Click none of the above B


A

with t he caps lock


key accidentally
turned on reverses
automatically the case of the letters
corrects the that were capitalized
grammatically incorrectly and then
errors turns off the caps lock B

password are not password can be upto


case sensitive 15 characters long B

hanging top A

a multiple
documents files an .xls data can not
can be inserted be inserted at
in the single specified position in
document the current document B

Hyperlink
Document none of the above A

Outline Layout none of the above B

Remove none of the above A

press the escape


key just keep typing D
height and width rows and columns D
backspace/
delete shift B

thesaurus outliner C

send private
messages to a send a package to a
friend friend D

Page setup Print preview B

Retrieve Save C
spacing sorting B

word processing spreadsheet C

Storing
information None of the above B

clip art clipboard C

Cut, copy, paste Font, Paragraph,


and clear Bullet and Numbering C

Text which
appear at the top Designated area on
of every page the document C

Monitor,
keyboard and
mouse None of the above B

microphone digital scanner D

15 point 25 point B

impossible to
3 inches. determine. B

Word cannot display


You have not columns during
specified editing; you will see
continuous them only when you
section breaks. print the document. A
to move a
section of text to leave an original
from the original section of text in
location to place while pasting a
another location copy elsewhere D

A set of different
graphics None of the above B

Grammar
Checker Find and Replace B

Select all AutoCorrect B

Delete, then
paste Insert, then paste A

To complicate
the revision
process and to To allow multiple
force the author people to work on one
to spend more document in
time making collaboration with one
corrections another C
A vertical line
outside the left
margin signifies a
change has been Comments are
made at that enclosed in a text box
point in the at the right of the
document. document. D

Through tools on Both through the


the Reviewing Tools menu and the
toolbar Reviewing toolbar D
The Versions The Versions
command will command will allow
allow you to save you to save only two
only one version versions of a
of a document document: one
without any version of the original
changes that and one version of
were just made any changes made to
to the document. the document. A

The first and


second versions The previous version
are opened is opened
automatically. automatically. B

Spell check Thesaurus A


Word will show
the name of the Word is not able to
person who tell the most recent
saved each version of a
version. document. A

Forms Insert C

Text fields A drop-down list B


Comments can
be edited or Comments can be
deleted by right edited or deleted by
clicking the left clicking the
highlighted text. highlighted text. C

Text which
appear at the top
of every page None of the above C

Copy and paste. Insert page break. D

forms. numbers. C

find/search. macro. A
Format Painter This action is not
button possible. C

Error Injecting Debugging D

Format Edit C

the guidelines
used to establish
where different
elements of the an enlarged capital
newsletter will letter at the beginning
go. of a paragraph. A
underlining the
text of the pull
quote. changing the color. A

A grid is a set of
A dropped cap is horizontal and vertical
a word that starts lines that determine
with a lowercase the placement of
letter when it elements in a
should have a newsletter or other
capital letter. document. D

The number of The tab spacing within


columns each column D

12 72 D

Three Four B

Press Enter to
create a section Press Shift+Enter to
break. force a line break. C

A serif font at 20 A sans serif font at 45


points points D

It depends on the left


and right margins,
and how many
4 inches columns are specified. D

Both None of the above A

A or B None of the Above A


Gaps All of the above C

Merge None of the above A

HLOOKUP() None of the above B

A or B None of the above C

duplicates testing All of the above D

Range Both B & C B

a form of VRAM none of the previous D


involves using more
than one processor at
multiuser the same time D
make a backup use a virus protection
copy program B

to display information
to print sheets of or pictures on a
paper screen B

uses C++ none of the previous. D


1012 sec 109 sec D

a frog a message pad B

an instruction that has


the address of a been transferred from
memory location memory. C
an instruction that has
the address of a been transferred from
memory location memory A

an instruction the address of the


that has been next instruction to be
executed executed D

a light pen a magic marker A

Program Data B

Artificial
Intelligence Parity Checker B

Range checking Validation B

use the backup


facility use find and replace A

System Modem B

keep a record of backup to a secure


computer failures medium D
Multiprogrammin
g Multiplexing D

Floppy Disk Magnetic Disk B


Telephone
modem Shareware C

Telephone
modem Shareware A

Indexed Random C

CPU Primary Storage B


Schema and
Files and Tracks subschema A

File, record, field Element, field, file C

Systems logs Parity check C

MIDI interface Serial interface A


Sound Video D

Ink-jet Drum B
recording current
stock in a
presenting an supermarket and
order for stock to answering customer
a warehouse. queries. A

updated regularly updated once a year C

Graphics
package Spreadsheet D
retain
confidentiality of
files simplify file structures C
4096 8192 C

virus infection loss of data D

IPX/SPX NetBEUI A
printer can do
1000s of pages a the operating system
day is easy to use B

the root directory the hard drive D

uninterruptable
power supply uniform page source C
the system
requires a
network the system always
administrator to requires a re-boot and
uninstall it defrag afterwards A

information. text. A

Logical Steps in
any language None of the above A

It is mandatory in
tally None of the bove A
prevent
unauthorised
access allow encryption C
IT understands
the business None of the above B

processing. All of the above D

Software that
generates
innovated
designs and
artistic patterns. None of the above A

enterprise local B

identify the file identify the file type D


corrective All of the above are
controls. parts of IS controls. D

dynamic hashing extensible hashing A

C: (a), (b), (c) D: (b), (c), (d) C


detective
controls general controls C

Settings Control B

(a) to (d) (a), (b), (c) C

Select the ‘Shut Pull the power cord


Down’ option from the back of the
from a menu. computer. C

Use the Find or Put your hand up and


Search feature. ask the teacher C

(a) to (d) (b), (c), (d) C


preventive
controls corrective controls C

(a) to (d) (b), (c), (d) C


program change
requests resolution procedures C
thread testing loop testing A

(a), (b), (c) (a) to (d) D


parallel
operations system walkthroughs B

Concentrator. Job control language. D

(a), (b), (c) (a), (c), (d) A

Physical security
of warehouse Cross-training of
facilities. operating personnel. B
procedural
design data design A
Computer
network Hub C
Mesh Ring A

Ring All of the above D

To help someone
who is applying To Store data in an
for employment organised manner B

Binary Indexed B

Operating
systems and
compilers. Computer operations. C
A direct access A direct access file on
file on a disk a tape C
Information
formats
commonly vary
between Data record can never
architectures be blocked together C
Address
calculation part Input output channel A
Wide area
network Protocol B

Are required with a


Generally require microprocessor which
a keyboard for permits some data
data entry and a processing such as
CRT for display input validation D

Time sharing
Multiplexor computer C

Packs data in a Speeds up online


disk file printing A

Loop Network Star Network D

Electronic
mailing Instant post-office C

A personal
computer A mainframe PC B

Parity checks All of them C


Communication Device interconnect
protocol standard D

A compiler is a
general purpose
language
providing very
efficient
execution None of the above B

Lexical analysis,
CONVERSION,
and code
generation None of the above D

ASCII EBCDIC A
An interpreter is
a general
purpose
language
providing very
efficient
execution None of the above A
Frequency
division Time Division
multiplexor Multiplexor C
Low-level
languages None of the above C

It is less prone to
attenuation Uses only one path D
Accounting
systems,
commercial
sector None of the above C

Relieve the main


CPU of repetitive Reduce competition
communication between the
tasks input/output devices C

Testing None of the above B

Common carrier Telephone Lines C

System Analysis
involves creating
a formal model of
the problem to
be solved None of the above C

A buffer An online protocol B

Hardware,
Software and size
of program. None of the above B

Ring Bus B

1010101 None of the above C


Cyclic
Redundancy Hash Count A

64 None of the above A


Multiplexor Acoustic coupler C

97 None of the above B


Data
management
systems All of them B

secondary secondary storage


storage capacity access time B

256 None of the above B

decimal form alphanumeric form A

5C4 None of the above A


16 bits 32 bits B

Bit Code Design None of the above D


210 bits 210 bytes A
1110 None of the above A

decimal form alphanumeric form A

is the first bit in a


byte is the last bit in a byte B

It has ears None of the above D

Joystick None of the above C


MHz VLSI B
Reading bar
codes None of the above B

barcode scanning voice recognition B

CD-ROM drive None of the above A


Light sensitive
elements None of the above C
5 Mb 1 Gb B

output input A

Numeric Keypad Printer B


Optical mark
reader Keyboard B
Speakers Printer A

Pixies Pickers B
Optical mark
reader None of the above C
word processing
keyboard layout software C
Optical mark
reader None of the above B
software
interface an operating system C
Third -
generation Fifth - generation
computers. computers. A
Param Arjun C
is due to bad disk
blocks none of the previous C
Magnetic Ink
Character
Recognition Image Scanning
Technology Technology B
converts a
program to
machine code none of the previous C

Desk - jet Printer Thermal Printer A


compressing it transmitting it C
Virtual
information
reader & user
system None of above B
An inked ribbon and
An ink pen print head D

WAN technology Unix operating system B


10-12 sec 10-9 sec D

External file
labels Cross footing tests C

operating system communication D


pilot project process D

multiplexing multitasking D

micro computers none of the above A

central
processing unit none of the above B
non impact
printer none of the above C
electronic
spreadsheet none of the above B
idea processor none of the above B
Microsoft
exchange none of the above B
record none of the above C
high level
language none of the above B

connector symbol input/output symbol B


fazitsu vp200
series IBM-PC B

multiplexing none of the above D

dummy terminals dummy servers A

windows NT LAN D

back end front end D

back end front end C


distributed
computing centralized A

dumb processing data processing B

two many A

network relational database


database system system D

multiplexing none of the above B

disk
defragmentation disk mirroring D

Module/De-
module None of the above B

constraints traps B

multiplexing none of the above B


Local array of
networks. None of the above B

thread client-server C

Integrated
Services Digital
network. None of the above. C

ARPANET None of the above. B


SQL * plus all of the above D

GAN None of the above. B

Packets None of the above. C

Simple Mail
transfer
protocol None of the above. C

Hyper text None of the above. C

Receiver None of the above. B

package system A

LAN and MAN LAN WAN and MAN B


Internet Intranet A
Web based Web based
Transport Transaction A
Protocol Repeaters B
command program D

numerous alpha number and alpha A

size,
performance, input, output,
cost performance ratios C

feed write A

multiplexing multitasking D

converter process D

ram output D
non-impact
desktop
printers thermal printers C
monitor,
program, CPU, memory,
keyboard, bus input, output D

windows 95 interpreter B

software's procedures C

assembler coder B

assembler processor C

S-ar putea să vă placă și