Anda di halaman 1dari 630

q_desc

The ------ key can be used to select an existing company from list of
AC1 companies.
Import and Export of data between Tally and other programs is possible only
AC2 through ---------- Program.
The re-order point is the inventory quantity that trigger a stock replishment
AC3 activity.
AC4 A created company's detail can be modified through keys
A/An ------------- is the official notice that the firm sends to its customers to
AC5 advise then to the amount of money that is owed.
AC6 In tally,all masters have ________main options
AC7 In tally,to create a new column in balance sheet press _______
In tally,the use of group behaves like a sub-ledger, option is that we can
AC8 summarize many ledger accounts into one line statements
In tally, we can alter ledger details using either single or multiple modes but
AC9 not alble to delete a ledger from multiple modes.
AC10 In tally,a group company is marked with an ______________
q_id

op1
F1
Tally ODBC
TRUE
F3
Invoice
Two
Ctrl+C
TRUE
TRUE
*

The systems that work together to order,receive, and pay for replenishment of Puchasing and
AC11 stock are --------------Accounts payable
AC12 Tally allows to delete a ledger from --------- alteration mode.
AC13 --------------------- is/are useful for management in the decision making.

Single
Cash Flow
Statements

AC14 In tally,the group company must contain at least _____________ members


AC15 To cancel a vourcher entry in Tally, short-cut key is -----------

Two
Alt+D

AC16 The accounting masters and inventory masters related to


We press ------------- function key to display the age-wise analysis of Bills
AC17 Receivable or Bills Payable report
AC18 In Tally, we press ------------, to print report .
In Tally, Types of Accounts and Types of Vouchers passed during the period,
AC19 can be seen in ------------- report.
In the Tally Software, the ------------ directory stores all data entered by the
AC20 user.
AC21 The Ledger Accounts are unique in Financial Accounting Packages
Customers can be permitted to enter their own data into the firms computer
AC22 using the firms wide area network is an example of
AC23 In Tally, we can customize the Vouchers as per our requirements
AC24 The number of steps in Accounts Compilation are
AC25 Each action/transaction of a firm is described by a ----------------.
AC26 Tally is based on mercantile accounting system

Create Information

AC27 Ctrl + N is used to ----------------------- in Tally classify the accounts under different heads so that
AC28 summarised information is possible.
AC29 Revenue Account also known as -------------- Account
AC30 Method of Voucher Numbering is/are
AC31 Accounts Receivable are displayed in

F4
Alt+P
Tally Audit
Bin
True
Enterprise Data
Interchange
TRUE
2
data element
FALSE
Display stock
valuation method
Ledgers
Personal
Manual
Balance Sheet

AC32 To assemble a product from different items -------------- entry is used


A --------- purchase orders data flow is directed to the purchasing system for
use in closing out the outstanding purchase orders in the receiving system
AC33 diagram.
AC34 Tally provides at least --------- predefined voucher formats
The value of the inventory is included in a ledger accounts as an asset on the
AC35 balance sheet
" The buyers can follow up with the suppliers to determine the reasons " is an
AC36 example of ----------------From voucher entry mode , if we press __________ then we get payment
AC37 voucher in tally

Journal

AC38 Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged
AC39 accounts member companies of the group.
AC40 A ----------- is a primary document for recording all financial transactions.
AC41 The field can have a value between ________________ in FA Package.
The _______ file maintains data that describes the supplier past transaction
AC42 with the firm in terms of material quality in AIS
AC43 It is necessary to manipulate data to transform it into ---------------AC44 In tally, to change the date of the voucher press ______
AC45 Tally can maintain budgets on ---------------AC46 The value of the inventory is included as an asset on the balance sheet

Main Location

Filled
11
FALSE
management by
objective
F4

True
Ledgers
0 to 9
Supplier
Report
F2
Net Transactions
True

In ratio analysis report of Tally FA packagewe we press ________________


AC47 function key to the display of bills receivable , bills payables report
F6 function key
The accounts payable system is responsible for paying the suppliers for the ---AC48 ------------Sales
1-4-1995 to 31-3AC49 What is the default financial year in Tally6.3 _________________
1996
AC50 Tally encrypts and stores TALLY DATA at the data directory
True
AC51 The Profit & Loss statement can be displayed in ---------------- format(s).
Horizontal
Balance sheet &
profit & loss profit
& loss and trial
AC52 Default ledger accounts in tally are ______
balance
AC53 Default 'godown' name in tally is ____________
Primary
Security
AC54 'Tally vault' is a _________________
mechanism
AC55 To create a sales voucher in tally , you have to press _______
F5
A Group Company is ------------------------- given to the merged accounts of
AC56 member companies of the group.
a name
AC57 In tally,"credit note" voucher type records entry for ________________
Sales return
Company
AC58 In tally you get currency symbol option from _______ menu
creation
------------------ gives the balance for each day for the voucher type has been
AC59 selected.
Trial Balance
AC60 For 'stock journal' entry we press ______________ in tally
F7
Changes in
Tally provides the capability to the administrator/auditor to track changes in the transactions or
AC61 areas is/are
vouchers

AC62 In tally, types of users are _______________


By pressing -------- key, a list of inventory reports can be displayed
AC63 straightaway from the balace sheet report

AC64 Projected approximation of income or expenses is called ______________ .


AC65 "Administrator" type user is also called 'Auditor' of a company in Tally
You will get company information , if you press __________ from gateway of
AC66 tally

Balance sheet
TRUE

AC67 A constituent(member) company can be a member of more than one group.


AC68 Default stock category in tally is ______
To create a log of the import activity in a file _____________ is located in the
AC69 same directory as an executable program in tally
AC70 In Tally,inventory valuation method option is available from _______

TRUE
Main location

F9

F3

Tally.imp
Stock summary

By pressing F11
AC71 Tally audit feature is available in a company __________________
function key
In tally, a group company can also be a constituent(member) of another group
AC72 company
TRUE
AC73 Default number of groups in tally are ________
128
AC74 During voucher entry ------------- are used.
AC75 User designated as --------------- can view audit list.

Ledger Accounts
Administrator
One company to
another company
created withon
AC76 Tally supports Importing of data from ---------------Tally Package
In an accounting information system, which of the following types of computer Inventory
AC77 files most likely would be a master file?
subsidiary.

Which of the following is an advantage of a computer-based system for


AC78 transaction processing over a manual system? A computer-based system:

Does not require


as stringent a set
of internal controls.

op2

op3

op4

ans

ALT+F1

CTRL+F1

None of the above A

Tally IMP

Tally INI

None of the above A

false
ALT+F3

CTRL+F3

A
None of the above B

Bill
Three
Alt+C

A or B
Four
Alt+Ctrl+C

None of the above C


Five
B
None of the above B

FALSE

FALSE
$

&

Puchasing and
Receiving

Accounts payable
and Receiving

^
Puchasing,
Receiving and
Accounts
payable

A
A

Multiple
Fund Flow
Statements

A or B

Mone of the above A

Ratio Analysis

All of the above

Three
Alt+X

One
Ctrl+D

A
B

Alter Information

Four
Ctrl+T
Display
Information

All of the above

F5
Ctrl+P

F6
Shift+P

F7
C
None of the above A

Statistics

Day Book

Journal Book

Data
False
Enterprise Data Information
FALSE
3
data record
TRUE

Sub

None of the above B


A

Electronic Data
Interchange.

All of the above

4
Field

5
All of the above

Open Calculator

Change Period

None of the above B

Groups
Nominal
Automatic
Profit & Loss

Journals
Real
None
Journal Book

None of the above


None of the above
All of the above
All of the above

C
A
C
B
B

B
B
B
A

Stock Journal

Physical Stock
Transfer

Reversing Journal B

Receipt
16

Issue
18

None of the above A


21
B

TRUE
management by
exception

electronic data
analysis

B
All of the above

Alt+f5

All of the above

Primary

F6
Primary Cost
Category

False
Reports
1 to 100

Vouchers
10 to 60

A
None of the above C
None
A

Order
Information
Ctrl+f2
A and B

All of the above


None of the above
Ctrl+f4
None of the above

F7 function key

None of the above A

Purchases
1-4-1996 to 31-31997
False
Vertical

A or B
1-4-1997 to 31-31998

None of the above B

Profit & loss and


trial balance
Main location

Cash and profit &


Cash and bank
C
loss
A or b
None of the above B

Ledger a/c
F7

Cost category
F8

None of the above A


D
F9

an identity
Purchase return

A and B
a or b

None of the above C


None of the above A

Stock items units

Regional setting

None of the above A

Daybook
Alt + F7

Balance Sheet
F10

None of the above B


F11
B

Changes in Ledger
Masters
Both A and B

None of the above C

F5

Suspense
Output
F4
Closing Balance
False
Alt + f6 function
key

A or B

A
C
A
C
A

None of the above B


A
None of the above C

F10

F11

F12

Profit & loss a/c


FALSE

Budget

None

C
A

Ctrl+F3

Alt+F3

None of the above C

FALSE
Primary

Symbol

None of them

Tally.ini
Stock journal
During the
creation of a
company

A or b
Stock analysis
In 'comp info ->
security control'
option

None
A
None of the above A

None

FALSE
228

28

16

A
C

Groups
Owner

Sub-Groups
Data Entry

B or C
TallyVault

A
A

Other programs - a
spreadsheet or a
database file.
Both A and B
Cash
disbursements.
Cash receipts.
Will be more
efficient at
Will produce a
more accurate set producing
financial
of financial
statements.
statements.

A
B

None of the above C


Payroll
transactions.
A
Eliminates the
need to reconcile
control accounts
and subsidiary
ledgers.
C

Q_id

Q_desc

BC1

The memory address register is used to store

BC2
BC3

BC4

Inefficient usage of excess computer equipment can be controlled by


Which of the following is not the component of a CPU
A trailer label is used on a magnetic tape file, it is the last record and
summarises the file. The following is an information not found in the
trailer label

BC5

Hard copy is a term used to describe...?

BC6

What do the abbreviations VAB stand for


What control would prevent the accidental erasure of customer
information from a magnetic tape
What are the individual dots which make up a picture on the monitor
screen called?

BC7
BC8
BC9
BC10

Op1
data to be
transferred to
memory
Contingency
Planning
NIC Card

Record Count
Writing on a hard
board
Voice activated
broadcasting
Validity check
Coloured spots

BC11

Header label normally include all the following except the


A daisy wheel is a type of...?
Which approach or technique is a control usually associated with
microcomputers

File Name
Printer

BC12

An impact printer creates characters by using...?

BC13
BC14
BC15

The best security control in a microcomputer environment is to


What would you NOT use with a flatbed plotter?
What do you need for an ink jet printer?

System Logs
Electrically charged
ink
Restrict physical
access
A pen
A cartridge

BC16
BC17
BC18

The greatest control exposure in a microcomputer environment is the


lack of
What do you need for an ink jet printer?
A laser printer does NOT use?

Separation of
duties
A cartridge
A print head

BC19
BC20
BC21

The amount of data that a disk may contain is known as the disks...?
You can ________ protect a floppy disk.
Information on a hard disk is usually backed-up using a...?

BC22
BC23

Magnetic tape is a...?


Hard disks can have a storage capacity in the region of...?

Volume
Read
Magnetic tape
Serial access
medium
1.44MB

BC24

Which storage device has the largest capacity in Mb?

A CD-ROM

BC25
BC26
BC27

Which storage device cannot be erased?


You can ________ protect a floppy disk
Where should floppy disks be stored?

A CD-ROM
Read
By a sunny window

BC28
BC29
BC30

The contents of these chips are lost when the computer is switched off? ROM chips
What are responsible for storing permanent data and instructions?
RAM chips
Which parts of the computer perform arithmetic calculations?
ALU

BC35

What are small high speed memory units used for storing temporary
results?
CPUs
How many bits of information can each memory cell in a computer chip
hold?
0 bits
What type of computer chips are said to be volatile?
RAM chips
Serial access
Magnetic tape is a...?
medium
Network software
and security
Software can be divided into two areas:
software

BC36

Travel agents use this computer system when reserving flights

BC37
BC38

Which computers are used in the weather forecasting industry?


Vacuum tube based electronic computers are...?

Supercomputer
Notebook
computers
First generation

BC39

Which generation of computer was developed from microchips?

Second generation

BC40
BC41

Second generation
Second generation

BC42

Which generation of computer uses more than one microprocessor?


Which generation of computer developed using integrated circuits?
Which generation of computer developed using solid state
components?

BC43

Name three steps involved in developing an information system

Second generation
Specification,
Design, and
Testing

BC44

How do you define analysis of an information system?

Analysis translates
program code of a
high level language
to machine code

BC45

Only hardware and


What areas need to be considered in the SOFTWARE design process? software

BC46

What is the function of systems software?

BC47

Formatting a disk results in all the data being...?

BC31
BC32
BC33
BC34

BC48

What is Direct Implementation?

BC49

What is parallel running?

BC50

What documents are produced during the development of a system?

To collect data
Deleted from the
disk
Users operate the
manual system and
computer system at
the same time
The new system is
introduced
alongside the
existing system
Instructions and
technical
documentation

BC51

What are User Guides are used for?

For technical
support

BC52

Systems software can be categorised into:

BC53

Which storage device cannot be erased?

BC54

Application software are programs that are written

Operating systems
and system
services
Magnetic tape
storage
To maintain a
backup copy of all
the information

BC55
BC56
BC57

Which bus carries information between processors and peripherals?


Convert the decimal number 2989 to Hexadecimal
Which bus controls the sequencing of read/write operations?

Data bus
FDDI
Data bus

BC58
BC59

What are utilities?


Numbers are stored and transmitted inside a computer in

Peripherals that are


connected to a
computer.
binary form

BC60
BC61

The original ASCII codes


A Nibble corresponds to

BC62

A gigabyte represents

BC63

A 32-bit processor has

BC64

A parity bit is

32 registers
used to indicate
uppercase letters

BC65
BC66

he contents of these chips are lost when the computer is switched off?
Clock speed is measured in

ROM
bits per second

BC67

Cache memory enhances

BC68
BC69

CISC machines
Which parts of the computer perform arithmetic calculations?

memory capacity
have fewer
instructions than
RISC machines
ALU

BC70
BC71
BC72

Every data from the primary memory will be erased if


An RS-232 interface is
For print quality you would expect best results from

Power is switched
off
a parallel interface
line printer

BC73

ROM

is faster to access
than RAM

were 7 bits
4 bits
More than 1000
mega bytes

BC74

A UPS

increased the
storage capacity of a
computer system

BC75

smart card

is a form of ATM
card

BC76

Laptop computers use

BC77

Multiprogramming refers to

BC78
BC79

Multitasking refers to
What are small high speed memory units used for storing temporary
results?

BC80

A good way to exchange information that changes rapidly is through

brochures

BC81

Multiprogramming is a prerequisite for

multitasking

BC82

Timesharing is the same as

BC83

Virtual memory is

multitasking
related to virtual
reality

BC84
BC85

Multiprocessing is
To help keep sensitive computer-based information confidential, the
user should

BC86

What is the function of a disk drive?

BC87
BC88

A 4GL is
A nanosecond is
What small, hand-held device is used to move the cursor to a specific
location on the screen?

BC89

BC90

BC91

CRT displays
having several
programs in RAM
at the same time
having several
softwares running at
the same time
ALU

same as
multitasking
save the file

to calculate
numbers
Uses Cobol
106 sec
a keypad

The memory address register is used to store

data to be
transferred to
memory

The memory data register is used to store

data to be
transferred to or
from memory

BC92
BC93
BC94
BC95
BC96
BC97
BC98

The instruction register stores


Which of the following is used to indicate the location on the computer
monitor?
A mathematical procedure that can be explicitly coded in a set of
computer language instructions that manipulate data.
Which of the following translates a program written in high-level
language into machine language for execution?
Detecting errors in real memory is a function of

an instruction that
has been decoded
a cursor
Formula
Assembler
Memory protection
use the directory
search tools

To find where a file has been saved on disk, the user should
A series of instructions telling the computer how to process data or files
is defined as a
Network

To ensure that data is not lost if a computer system fails, the user
BC99 should
Having a single CPU alternatively process tasks entered from multiple
BC100 terminals is called
The place in the CPU where the data and programs are temporarily
BC101 stored during processing is called the
BC102 All are examples of computer software except
Computer manufactures are now installing software programs
BC103 permanently inside the computer. It is known as
Which of the following file organisation forms most efficiently allows
BC104 access to a record
The part of the computer system controlling data manipulation is called
BC105 the
BC106 For direct access storage devices the recording area is divided into
BC107 The data hierarchy from the largest to the smallest is

save copies of the


file with the same
name on the system
Multiprocessing
ROM
Firmware
Firmware
Sequential
Operating System
Tracks and
Sectors
Character, field,
database

Which of the following hardware or software system controls provides a Valid character
BC108 detailed record of all activities performed by a computer system
check
Which one of the following parts of a computer is necessary to enable it
BC109 to play music?
Sound card.
An educational CD-ROM on Indian Poets contains 1000 pages of text,
500 colour pictures, 15 minutes of sound and 1 minute of video. Which
BC110 of the four different media listed takes up most space on the CD-ROM? Text
Which one of the following printers is suitable for printing sprocket fed
BC111 carbon copies?
Laser

BC112 Multimedia software can be most productively used for

viewing an
encyclopaedia CDROM.

BC113 To be effective a virus checker should be

replaced regularly

Which one of the following software applications would be the MOST


BC114 appropriate for performing numerical and statistical calculations?

Database

BC115 Passwords enable users to


BC116 12. How many bytes do 4 Kilobytes represent?

get into the system


quickly
512

BC117 Back up of the data files will help to prevent


BC118 Which one of the following is the MOST common internet protocol?

loss of confidentiality
TCP/IP

BC119 The advantage of a PC network is that


BC120 The term A:\ refers to

access to the
internet is quicker
a file name

BC121 UPS stands for

universal port serial

BC122 The main problem associated with uninstalling software is that


You are conducting research for a Income Tax assignment. The raw
BC123 facts you collect are called

BC124 A flow chart is the

BC125 A voucher entry in Tally is done for

BC126 Passwords are applied to files in order to


BC127 Each of the following is an enabler of IT-business alignment except:
The basic systems model is used to describe virtually all information
BC128 systems and it consists of the following elements:

orphan files can be


left on the system
data.
Graphical
representation of
logic
Purchase, sales,
receipt, payments
etc.
assist in
maintenance
senior executive
support for IT.

BC130 A(n) __________ offers a solution package for an entire industry.

input.
The use of
computers to
design state-of-theart, high-quality
products.
specialist or
functional

BC131 File extensions are used in order to

name the file

BC132 Information systems controls include all of the following EXCEPT:


BC133 Hashing for disk files is called
Components of expert systems include: a) inference engine; b) user
BC134 interface; c) knowledge base; d) fuzzy logic

preventive controls.
external hashing

BC129 What is a computer-aided design system?

A: (a) , (b), (d)

BC135 Black box testing and white box testing are part of:
What is the term used to describe the point of interaction between a
BC136 computer and any other entity, such as a printer or human operator?
The advantages of CASE tools are: a) reusability; b) maintainability; c)
BC137 portability; d) flexibility

BC138 Which of the following is an acceptable way to shut down the computer?
Yesterday, in your music class you saved your compositions as MP3
files. Today, you cannot remember where you saved them. Which is the
BC139 best way to locate the files?
Components of an information system model are: a) applications
architecture; b) functional architecture; c) technology architecture; d)
BC140 information architecture

corrective controls

Component
(a), (c), (d)
Press the reset
button.
Create the files
again.

(a), (c), (d)

BC141 Benchmarks form part of:


Continuity controls include: a) record counts; b) date checks; c) label
BC142 checks; d) run-to-run totals

detective controls

BC143 Which is not part of help desk documentation:


BC144 Testing of individual modules is known as:

problem logging
unit testing

Design phase of CASE tools includes: a) data architecture; b) decision


BC145 architecture; c) interface architecture; d) presentation architecture

(b), (c), (d)

(a), (c), (d)

BC146 Which is part of installation testing:


benchmark testing
The computer operating system performs scheduling, resource
allocation, and data retrieval functions based on a set of instructions
BC147 provided by the:
Multiplexer.
Which of the following falls under multimedia data: a) text; b) images; c)
BC148 video; d) audio
(a) to (d)
Replacement
personal computers
Which of the following procedures should be included in the disaster
for user
BC149 recovery plan for an Information Technology department?
departments.
architectural
BC150 Designing relationships among components is part of:
design
BC151 Several Computers connected together is called:
BC152 Which network topology uses a Hub?
BC153 Which of the following topologies is used for Ethernet?

BC154 Application software are programs


Which type of file search method requires a computer first read all
BC155 locations preceding the desired one

Client-server
Star
Star
To maintain a
backup copy of are
written all the
information
Direct

Which of the following areas of responsibility are normally assigned to a


BC156 systems programmer in a computer system environment?
Which of the following is recommended when many searches for data
BC157 are required

It is unlikely that a magnetic tape containing several thousand blocked


records can be used on two machines of different architecture directly
BC158 because
Which component of the CPU has the most influence on its cost versus
BC159 performance
Which of the following terms applies to network used to connect
computers with other computers, peripherals and workstations that are
BC160 in fairly close proximity

BC161 Intelligent terminals differ from dumb terminals in that they


A computer is to be linked to 8 terminals using a single communication
link. To permit simultaneous terminal operations, communication path
BC162 will require which of the following

BC163 A modem is a device that


A LAN includes 20 PCs, each directly connected to the central shared
BC164 pool of disk drives and printers. This type of network is called a
A computer based system for sending, forwarding, receiving and
BC165 storing messages is called an
If a workstation contains a processor, monitor, screen manipulation
BC166 device, printer, storage and communication capabilities, it is said to be

Systems analysis
and applications
programming.
A sequential file on
a disk
Tapes can only be
read by the machine
on which they are
written
Data path part

Distributed systems

Can send data to a


computer and
receive data from a
computer

Mixer
Allows computer
signals to be send
over a telephone
line

Planetary network
Office Automation

BC167 Terminal hardware controls include

A dumb workstation
Time of day control
locks

BC168 RS-232 is a

Type of cable

BC169 What is a compiler?

A compiler does a
conversion line by
line as the program
is run

BC170 What are the stages in the compilation process?


BC171 Which of the following is not a data transmission coding scheme

Feasibility study,
system design, and
testing
CRC

BC172 What is the definition of an interpreter?

An interpreter does
the conversion line
by line as the
program is run

A device used in data communications to divide a transmission signal


BC173 into several sub-bands is known as a
Third generation languages such as COBOL, C, and FORTRAN are
BC174 referred to as

BC175 Serial Communication is used over long distance because it

Modem
High-level
languages
It is faster than
parallel
communication

BC176 In what areas is the COBOL programming language used?

Financial sector and


engineering

BC177 The primary function of a front-end processor is to


BC178 What is the first stage in program development?
Which of the following is not used for data transmission within a local
BC179 area network

Communicate with
the console operator
Specification and
design
Fiber Optics

BC180 What is System Analysis?


BC181 A device to device hardware communication link is called

The design of the


screen the user will
see and use to enter
or display data
A cache

BC182 What will a good software provider consider?


BC183 The topology of a network can be each of the following except
BC184 What is the 8-bit binary value of the decimal number 85?

The different types


of network to be
used
Star
10101010

BC185 Which is the most common data transmission error checking method
BC186 What is the decimal value of the binary number 1111?
Which of the following devices merges communication signals onto a
BC187 single line
BC188 What is the decimal value of the octal number 215?
Which tool is used to help an organization build and use business
BC189 intelligence?

Parity
15
Port
327
Data warehouse

BC190
BC191
BC192
BC193
BC194

Cache memory enhances


What is the decimal value of the hexadecimal number FF?
Numbers are stored and transmitted inside a computer in
What is the hexadecimal value of the decimal number 1476?
A byte corresponds to

BC200 A parity bit is

memory capacity
30
binary form
4C5
4 bits
Basic Coding
Description
1024 bits
10000
binary form
Mouse
used to indicate
uppercase letters

BC195
BC196
BC197
BC198
BC199

What does EBCDIC coding of numbers mean?


A Kb corresponds to
What is the binary sum of 01011 and 00101?
Information is stored and transmitted inside a computer in
Where would you find the letters QWERTY?

BC201
BC202
BC203
BC204
BC205

Because it squeaks
when moved
bits per second
Touch screen
BPS
Printing letters

How did the computer mouse get its name?


Clock speed is measured in
What are you most likely to use when playing a computer game?
CPU performance may be measured in
A digitising tablet can be used for?
In processing cheques which of the following I/O techniques have banks
BC206 traditionally used
BC207 Which of the following is a pointing device used for computer input?

BC208 A UPS

OCR
Touch screen
increased the
storage capacity of a
computer system

BC209 What does a light pen contain?


BC210 The capacity of a 3.5 floppy is around
What general term describes the physical equipment of a computer
BC211 system, such as its video screen, keyboard, and storage devices?
BC212 Where would you find the letters QUERTY?
BC213 What are you most likely to use when playing a computer game?
BC214 A digitising tablet can be used for?
BC215 Which of the following is a pointing device used for computer input?

Refillable ink
100K

BC216 What input device could tell you the price of a product
BC217 Where would you find a magnetic strip?

Mouse
Credit card
Writing on a hard
board

BC218 Hard copy is a term used to describe...?


What are the individual dots which make up a picture on the monitor
BC219 screen Called
BC220 A daisy wheel is a type of...?

hardware
Mouse
Touch screen
Printing letters
Touch screen

Coloured spots
Printer

BC221 What input device can be used for marking a multiple-choice test?

Mouse

BC222 Laptop computers use

CRT displays

BC223 QWERTY is used with reference to

screen layout

BC224 What input device could tell you the price of a bar of chocolate?

Mouse

BC225 A GUI is
BC226 Where would you find a magnetic strip?

BC227 Multiprogramming refers to

hardware
Credit card
having several
programs in RAM
at the same time

BC228 Multitasking refers to

having several
programs in RAM at
the same time

BC229 Multiprogramming is a prerequisite for

multitasking

BC230 UNIVAC Computer belongs to the

First - generation
computers.

BC231 Timesharing is the same as


BC232 Name the first Indian Super Computer?

multitasking
Vishwajeet

BC233 Disk fragmentation

is caused by wear

The technology which is used to check answer sheets of multiple-choice Bar code Reader
BC234 questions in civil services or similar examinations is: Technology

BC235 A compiler is
BC236 Which printer among the following is fastest
BC237 Zipping a file means

BC238 What does acronym VIRUS stands for


BC239 An impact printer creates characters by using...?

a fast interpreter
Drum Printer
encrypting it
Very important
reader user
sequence
Electrically charged
ink
mainframe
technology
10-6 sec

BC240 A client-server system is based on


BC241 A nanosecond is
A procedural control used to minimize the possibility of data or program
BC242 file destruction through operator error is the use of
Limit checks
_______ software enables users to send and receive data to/from
BC243 remote computers
application
BC244 A _____ is a running instance of an application
project

BC245 Splitting of CPU's time for different tasks _______ prevents time slicing multiprocessing
______ computers are used in large organizations for large scale jobs
BC246 which have large storage capacities
mainframes
_______ is responsible for all calculations and logical operations that
BC247 have to be performed on the data
control unit

BC248 ______ printer use laser light


band printer
______ software enhances the user to enter ,store, manipulate and print
BC249 any text
data management
______ software enables users to send and receive data to/from remote
BC250 computers
integrated software
BC251 _______ is the temporary storage place for deleted files
BC252 _____ is a collection of related fields

my computer
field

BC253 _____ language consists of strings of binary numbers


assembly language
______ symbol is used to represent processes like assigning a value to
BC254 a variable or adding a number
terminator symbol
BC255 _______ is an example for micro computer

PC-at

BC256 _________capability supports concurrent users doing different tasks

multiprocessing

The ______ do not have processing power of their own and has only a
screen, keyboard and the necessary hardware to communicate with the
BC257 host. For this reason, the terminals are referred as_______________
"dumb terminals"
BC258 A______is nothing but a PC with a network operating system
_____system is responsible for handling the screen and user I/O
BC259 processing
The______ handles data processing and disk access in a Client/Server
BC260 architecture
Both the DBMS and the application resides on the same component in a
BC261 ____system
When all the processing is done by the mainframe itself, the type of
BC262 processing is sometimes called as
BC263 DBMS models can be grouped under____ categories

wan
host
host
PC
server processing
four
file management
system

BC264 ______is the most advantageous database system


A new user initiates a new process of execution at the background,while
the user can continue his query process as usual in the foreground. This
BC265 situation is referred to as ______
multiprocessing
The process of data being automatically written to a duplicate database
BC266 is called______
repairing
BC267 Modem stands for __________ .
Multiple changes to the same record or a field are prevented by the
BC268 DBMS through______
BC269 _________allows an application to multitask within itself

Code/De-code

BC270 LAN stands for __________ .


BC271 New process of execution is referred to as______

fixes
multiprocessing
Linear area
networks
task

BC272 ISDN stands for _______.


BC273 _____________ is the Worlds largest computer network .
BC274 _______is/are a popular front end tool

Integrated system
dynamic networks.
Ethernet
visual basic

BC275 When LAN connected together ,it is called __________ .

MAN

BC276 TCP/IP stands for _________ .


BC277 Data is broken into small unit called __________ .

Transfer control
protocol/Internet
protocol
Cells

System modulation
BC278 SMTP stands for __________ .
transfer protocol
The __________ protocol is a network protocol to be built for the World
BC279 Wide Web .
Transfer Protocol
Aggregate transfer
BC280 ATM stands for __________ .
mode
The computer which can receive data from other computers on the
BC281 network and print it is _______
File server
BC282 The hardware and the software requirements together form the_____

platform

BC283 ATM, Asynchronous transfer mode is a __________ technology.


BC284 __________ is designed telephone system

MAN and WAN


ISDN

BC285 Expansion of ISDN is ________


BC286
BC287
BC288
BC289

Expansion of WBT is ______________


_________ connects LANs.
Collection of instruction is called a _____
Combination of alphabetic and numeric data is called _____ data

BC290 Computers can be classified based on ______,______and _______


BC291 _________ are used in large organizations for large scale jobs
BC292 _______ is responsible for feeding data into the computer
_______ is the capability of the o/s to run numerous applications
BC293 simultaneously
_______ involves conversion of raw data into some meaningful
BC294 information
_______ is responsible for obtaining the processed data from the
BC295 computer
_______ printers use light to produce the dots needed to form pages of
BC296 characters

BC297 Hardware components in a computer are _____,____,_____,______


_______ software are programs that are complex and can be
BC298 developed or purchased
_______ is a set of special instructions used to communicate effectively
BC299 with the computer
BC300 _______ converts a high level language into machine language
_______ translates assembly language program into machine language
BC301 instructions

Internal Services
Digital Network
Web based
Training
Bridges
procedure
alpha numeric
space occupied,
price, no. of users
allowed
mini computers
input
multiprocessing
interpreter
input
impact printers
operating system,
bootstrap, kernel,
shell
operating system
batch
processor
compiler

Op2
data that has been
transferred from
memory
System feasibility
report
VSAT
Identification
Number

Op3

the address of a
memory location

Op4
an instruction that
has been
transferred from
memory

Capacity Planning Exception reporting


RAM
AGP Card

Ans

C
C
B

Printed output

Control totals for


one or more fields
Storing information
on the hard disk

End-of-file and endof-reel code

None of above

Voice answer back

Visual audio board None of above

Boundary protection File protection ring Limited access files

Pixies

None of above

Reel Number
Pointing device

Batch Total
None of above

D
A

Console Log
An inked ribbon
An ink pen
and print head
Use only
Require user
unremovable media passwords
Paper
Eraser
A drum
A ribbon

Data Dictionary

None of above
Make duplicate
copies of files
None of above
A cassette

Centralised function
for PC acquisition
A drum
A laser beam

Centralised function
for PC Disposition
A ribbon
An INK RIBBON

Distributed policies
or procedures
None of above
None of above

A
A
C

Size
Write
PAN drive
Random access
medium
20 GB

None of above
None of above
None of above

C
B
A

None of above
None of above

A
B

None of above

A floppy disk
Write
By magnet objects

Storage capacity
Read and Write
Floppy disk
A parallel access
medium
700MB
Magnetic tape
storage
Magnetic tape
storage
Read and Write
In a drawer

None of above
Not
None of above

A
B
C

RAM chips
ROM chips
Registers

CDROM chips
DRAM chips
Logic bus

None of above
None of above
None of above

B
B
A

Pixels
Identification
number
Storage device
Physical Security

A floppy disk

A
C
A

Registers

Control unit

None of above

1 bit
ROM chips
Random access
medium
Systems software
and application
software

8 bits
CACHE
A parallel access
medium

None of above
None of above
A selective access
medium

B
A

Business software
and games software None of the above

Personal computer Mainframe computer None of above


Jon Von Neumann
computers
None of above
Supercomputers
Second generation Hoover generation None of above

First generation

Fourth generation

None of above

Third generation
Third generation

Fifth generation
Fifth generation

None of above
None of above

C
B

Third generation

Fifth generation
None of above
Analysis, System
Programming,
Design, and
Design, and Testing Implementation
None of above
This involves
looking at a
Analysis is the
loading of programs system and finding
out how
that perform
information is
routines to control
peripheral devices being handled
None of above
Inputs, outputs,
file design
Maintenance,
hardware, and
reliability, and
upgradeability
None of above
software
To execute any
programs
To maintain security None of the above
Transferred from the
Copied from the disk Saved to the disk
disk

Users operate the


computer system
from a given date
The new system is
introduced and
users start operating
it
Log files and
temporary files

Users operate the


manual system
Users continue
operating the old
system
User Guide and
technical
documentation

B
A

B
D
A

None of above

None of above

None of above

To enable any
printer to be
connected to the
network

User guides cover


how to run the
system, enter data,
None of above
save, print, etc.

Network systems
and communication Database systems
services
and backup services None of the above

floppy disk
To help someone
who is applying for
employment

Hard disk

None of the above

Control Bus
MAD
Control Bus

A
B
D

8 bits
8 bits

Address bus
TED
Address bus
Data structures that
are part of the
kernel of an
operating system.
decimal form
represented 256
characters
16 bits

1000 kilobytes

230 bytes

32 I/O devices
used to detect
errors

32 Mb of RAM
is the first bit in a
byte

1024 bytes
a 32-bit bus or 32bit registers
is the last bit in a
byte

RAM
baud
memory access
time

DRAM
bytes
secondary storage
capacity

CROM
Hertz
secondary storage
access time

use more RAM than


RISC machines
Registers
Computer is
improperly shut
down
a serial interface
dot matrix printer

have medium clock


speeds
Variables
Data is not saved
before computer is
shut down
printer interface
ink-jet printer
stores more
information than
RAM

use variable size


instructions
Logic Bus

D
A

All of the above


a modem interface
laser printer.

D
B
D

is used for cache


memory

CD-ROM
To do a particular
task.
Auto bus
BAD
Auto bus
Operating system
routines that
execute in
supervisor mode.
ASCII code form

is non-volatile

Shells, compilers
and other useful
system programs.
alphanumeric form
represented 127
characters
32 bits

D
A
A
A
A
D
B
A
D
B

increases the
process speed
has more storage
capacity than an
ATM card
LCD displays

multitasking
the ability to run 2
or more programs
concurrently
Registers

provides backup
power in the event
none of the previous
of a power cut
is an access card
for a security
contains a
microprocessor
system
none of the
SSGA displays
previous

C
B

writing programs in none of the


multiple languages previous

writing programs in none of the


multiple languages previous

Variables

Logic Bus

magazines

CD-ROM
e-mail
to run more than
one program at the
an operating
system
none of the above
same time
none of the
multiprogramming
previous
multiuser
none of the
a form of ROM
a form of VRAM
previous
involves using
more than one
processor at the
same as
multiprogramming
multiuser
same time
use a virus
set up a password make a backup copy protection program
to read from or
write information
to a floppy disk

to print sheets of
paper

uses Java
103 sec

uses C++
1012 sec

a mouse

a frog

data that has been


transferred from
memory

the address of a
memory location

data to be
transferred to the
stack

the address of a
memory location

to display
information or
pictures on a screen
none of the
previous.
109 sec
a message pad
an instruction that
has been
transferred from
memory.
an instruction that
has been
transferred from
memory

C
C
D

D
B

B
D
D
B

an instruction that
has been fetched
from memory

an instruction that
has been executed

the address of the


next instruction to
be executed

a scroll bar

a light pen

a magic marker

Algorithm

Program

Data

Compiler
Parity Checking
search each file in
turn

Artificial Intelligence Parity Checker


Range checking
Validation
use the backup
facility
use find and replace

B
B

Program

System

Modem

use different
filenames on the
system

keep a record of
computer failures

backup to a secure
medium

Time sharing

Multiprogramming

Multiplexing

RAM

Floppy Disk

Magnetic Disk

Word Processor

Telephone modem Shareware

Word Processor

Telephone modem

Shareware

Hashed

Indexed

Random

ALU

CPU

Blocks and Sectors


Database,
character, record

Files and Tracks

Primary Storage
Schema and
subschema

File, record, field

Element, field, file

Maintenance
diagnostic program

Systems logs

Parity check

CD-ROM

MIDI interface

Serial interface

Pictures

Sound

Video

Drum
recording current
stock in a
presenting an order supermarket and
creating the plans
for stock to a
answering customer
for a building design. warehouse.
queries.
Dot matrix

Ink-jet

never updated

updated regularly

updated once a year

Spreadsheet

make efficient use


of time
1024

Graphics package
retain
confidentiality of
files
4096

simplify file
structures
8192

C
C

duplication of data
HTML

virus infection
IPX/SPX

Document
processor

loss of data
NetBEUI
the operating
printer can do 1000s system is easy to
use
files can be shared of pages a day
a subdirectory
the root directory
the hard drive
uninterruptable
up-line provider
service
uniform page source
power supply
the program
the system requires the system always
executable may not a network
requires a re-boot
allow it to be
administrator to
and defrag
uninstalled
uninstall it
afterwards

D
A

documents.

information.

text.

B
D
C

Rules writte in
Logical Steps in any
procedural language language
None of the above

To fill the log


register

None of the bove

allow encryption

None of the above

All of the above

speed up access
IT management
lacks leadership.

It is mandatory in
tally
prevent
unauthorised
access
IT understands the
business

output.

processing.

Software that
generates innovated
Using computers to designs and artistic
do architecture.
patterns.
None of the above
Application
enterprise
local
Service Provider
identify the file
ensure the filename
is not lost
identify the file
type
All of the above are
parts of IS
detective controls.
corrective controls. controls.
static hashing
dynamic hashing
extensible hashing
B: (a) to (d)

C: (a), (b), (c)

D: (b), (c), (d)

A
B
D

D
A
C

preventive controls

detective controls

general controls

Interface

Settings

Control

(b), (c), (d)


Turn the computer
off at the power
point.

(a) to (d)
Select the Shut
Down option from
a menu.

(a), (b), (c)


Pull the power cord
from the back of the
computer.

Ask the person next Use the Find or


to you.
Search feature.

Put your hand up


and ask the teacher

(a), (b), (c)


organisational
controls

(a) to (d)
preventive
controls

(b), (c), (d)

corrective controls

(a), (b), (c)

(a) to (d)
program change
requests
thread testing

(b), (c), (d)


resolution
procedures
loop testing

(a), (b), (c)

parallel operations

(a) to (d)
system
walkthroughs

Peripheral
processors.

Concentrator.

Job control
language.

(b), (c), (d)

(a), (b), (c)

(a), (c), (d)

Identification of
critical
applications.

Physical security of Cross-training of


warehouse facilities. operating personnel.

interface design

procedural design

Client
Bus
Bus

Computer network Hub


Mesh
Ring
Ring
All of the above

C
A
D

To do a particular
job such as
editing, storing
information

To help someone
who is applying for
employment

To Store data in an
organised manner

Sequential

Binary

Indexed

call lights
data testing

(a), (b), (d)


specifications
matching

data design

C
A

Data
communications
hardware and
software.
A sequential file on
a tape

Parity errors will


result
Control Unit

Operating systems
and compilers.
A direct access file
on a disk
Information
formats commonly
vary between
architectures
Address calculation
part

Local Area network Wide area network

Computer
operations.
A direct access file
on a tape

C
C

Data record can


never be blocked
together

Input output channel

Protocol

Use the computer to


which they are
connected to
perform all
processing
operations

Are required with a


microprocessor
Generally require a which permits
some data
keyboard for data
entry and a CRT for processing such
display
as input validation

Modem

Multiplexor

Aids in back-up
procedures

Packs data in a disk Speeds up online


file
printing

Ring Network

Loop Network

Executor systems

Electronic mailing Instant post-office

An intelligent
workstation
Encryption
algorithms

A personal
computer

A mainframe PC

B
C

Time sharing
computer

Star Network

Terminal Standard

Communication
protocol

All of them
Device
interconnect
standard

A compiler
converts the whole
of a higher level
program code into
machine code in
one step

A compiler is a
general purpose
language providing
very efficient
execution

None of the above

Parity checks

Lexical analysis,
Implementation and CONVERSION, and
documentation
code generation
None of the above
Baudot
ASCII
EBCDIC
An interpreter is a
An interpreter is a
general purpose
representation of the language providing
system being
very efficient
designed
execution
None of the above

Demodulator
Middle-level
languages

Frequency division Time Division


Multiplexor
multiplexor
Low-level
None of the above
languages

It is less prone to
It is less error prone attenuation

Uses only one path

D
A

C
C

Accounting
Graphic design and systems,
education
commercial sector None of the above

Manage the paging


function in a virtual
environment

Relieve the main


CPU of repetitive
communication
tasks

Reduce competition
between the
input/output devices

System Analysis

Testing

None of the above

Telephone Lines
Common carrier
System Analysis
involves creating a
System Analysis
formal model of
defines the format
and type of data the the problem to be
program will use
None of the above
solved
A buffer
An online protocol
An interface
Testing to check
for errors before
the system is
Hardware, Software
and size of program. None of the above
introduced
Ring
Bus
Packet
1100101
1010101
None of the above

Retransmission
4

Cyclic Redundancy
64

Hash Count
None of the above

A
A

Modem
141

Multiplexor
97
Data management
systems

Acoustic coupler
None of the above

C
B

All of them

Coaxial Cable

Data Mining tools

C
B

B
B
C

memory access
time
255
ASCII code form
1B7
8 bits
Binary Coded
Decimal
1000 bytes
1112
ASCII code form
Keyboard
used to detect
errors

secondary storage
capacity
256
decimal form
5C4
16 bits

secondary storage
access time
None of the above
alphanumeric form
None of the above
32 bits

Bit Code Design


210 bits
1110
decimal form
Numeric Keypad
is the first bit in a
byte

None of the above


210 bytes
None of the above
alphanumeric form
None of the above
is the last bit in a
byte

D
A
A
A
A

Its moves like a


mouse
baud
Light pen
MIPS
Tracing diagrams

It has ears
bytes
Joystick
MHz
Reading bar codes

None of the above


Hertz
None of the above
VLSI
None of the above

D
D
C
B
B

MICR
Hard disk

barcode scanning
CD-ROM drive

voice recognition
None of the above

B
A

B
B
A
A
B

Pencil lead
1.44 Mb

provides backup
power in the event
none of the previous
of a power cut
Light sensitive
None of the above
elements
5 Mb
1 Gb

software
Keyboard
Light pen
Tracing Diagrams
Hard disk

output
Numeric Keypad
Joystick
Reading Bar Codes
Keyboard

input
Printer
Scanner
Digital Signatures
CD ROM Drive

A
B
C
B
A

Bar code reader


Mouse

Optical mark reader


Speakers
Storing information
on the hard disk

Keyboard
Printer
Back-up on a
Cartridge

B
A

Pickers
CD-ROM

B
A

Bar code reader

Pixies
Pointing device
Optical mark
reader

None of the above

LCD displays

SSGA displays

none of the previous


word processing
software

increases the
process speed

Printed output
Pixels
Storage device

mouse button layout keyboard layout

C
C
B

Bar code reader

Optical mark reader None of the above

language interpreter software interface


Speakers
Smart card

an operating system
None of the above

C
A

writing programs in
multiple languages

none of the previous

multitasking

The ability to run 2


or more programs writing programs in
multiple languages none of the previous
concurrently
To run more than
one program at the
an operating system same time
none of the above

Second - generation Third - generation


computers.
computers.

Fifth - generation
computers.

multiprogramming
Deep Blue

none of the previous


Arjun

A
C

none of the previous

Image Scanning
Technology

none of the previous


Thermal Printer
transmitting it

C
A
C

None of above
An inked ribbon
and print head
Unix operating
system
10-9 sec

slower than an
interpreter
Dot - Matrix Printer
decrypting it
Vital information
resource under
siege

Multi-user
Param
is due to bad disk
blocks
Magnetic Ink
Character
Recognition
Technology
converts a
program to
machine code
Desk - jet Printer
compressing it
Virtual information
reader & user
system

Thermal Paper

An ink pen

LAN technology
10-3 sec

WAN technology
10-12 sec

Control figures

External file labels Cross footing tests

system
model

operating system
pilot project

communication
process

D
D

multithreading

multiplexing

multitasking

super computers
arithmetic and
logic unit

micro computers
central processing
unit

none of the above

none of the above

caused by overuse
Optical Mark
Reader
Technology

D
B
D

drum printer
word processing
communication
software
recycle bin
file

non impact printer none of the above


electronic
spreadsheet
none of the above

idea processor

none of the above

Microsoft exchange none of the above


none of the above
record

B
C

machine language high level language

none of the above

processed symbol connector symbol

input/output symbol

hp vectra system

fazitsu vp200 series IBM-PC

multithreading

multiplexing

none of the above

dumb servers
distributed
computing system

dummy terminals

dummy servers

windows NT

LAN

server

back end

front end

server

front end

LAN

back end
distributed
computing

centralized

host processing
one
hierarchical
database system

dumb processing
two
network database
system

data processing
many
relational database
system

B
A

multithreading

multiplexing
disk
defragmentation

none of the above

redo logging
Modulation/Demod
Module/De-module
ulation

disk mirroring

None of the above

constraints
multiplexing
Local array of
networks.
thread
Integrated
Integrated Symbolic Services Digital
Digital networks.
network.
ARPANET
Internet
power builder
SQL * plus

traps
none of the above

B
B

None of the above


client-server

B
C

None of the above.


None of the above.
all of the above

C
B
D

locks
multithreading
Local area
networks
process

WAN
Transfer
communication
protocol/Internet
protocol
Bits
Software Mail
transmission
protocol
Transmission
protocol
Asynchronous
transfer mode

GAN
Transmission
control
protocol/Internet
protocol
Packets

None of the above.

None of the above.


None of the above.

C
C

Simple Mail
transfer protocol

None of the above.

Hyper text

None of the above.

Area transfer mode None of the above.

Printer server

Receiver

None of the above.

configuration

package

system

LAN and WAN


ATM

LAN WAN and MAN


Intranet

B
A

Internal Services
Design Network
Web based
Technology
Routers
batch
alpha beta

LAN and MAN


Internet
Integrated
Services Digital
Network
Web based
Transport
Protocol
command
numerous alpha

None of the above.


Web based
Transaction
Repeaters
program
number and alpha

cost, performance
their ratio
microprocessors
output

size, performance,
cost
PCs
feed

input, output,
performance ratios
mainframes
write

C
D
A

multithreading

multiplexing

multitasking

compiler

converter

process

processor

ram
non-impact
desktop printers

output

thermal printers

CPU, memory,
input, output

interpreter

drum printers

control program,
interpreter,
monitor, program,
assembler, compiler keyboard, bus
application
windows 95
software

A
B
D
A

protocols
compiler

software's
assembler

procedures
coder

C
B

interpreter

assembler

processor

q_id

BC1

q_desc

ISDN stands for _______.

op1

op2

Integrated
system
dynamic
networks.

Integrated
Symbolic
Digital
networks.

op3

op4

Integrated
Services
Digital
None of
network. the above.

The computer which can receive data from other


BC10 computers on the network and print it is _______
The hardware and the software requirements together
BC11 form the_____

Printer
File server server
Receiver
configurati
package
platform on

None of
the above.

ATM, Asynchronous transfer mode is a __________


BC12 technology.
BC13 __________ is designed telephone system

MAN and LAN and LAN and


WAN
MAN
WAN
ATM
Internet
ISDN

LAN WAN
and MAN
Intranet

BC14 Expansion of ISDN is ________

Internal
Services
Digital
Network

BC15 Expansion of WBT is ______________

Web
based
Training

BC16 _________ connects LANs.


BC17 Collection of instruction is called a _____
Combination of alphabetic and numeric data is called
BC18 _____ data

Computers can be classified based on


BC19 ______,______and _______

BC2

Bridges
procedure
alpha
numeric
space
occupied,
price, no.
of users
allowed

_____________ is the Worlds largest computer network


.
Ethernet

_________ are used in large organizations for large


BC20 scale jobs
_______ is responsible for feeding data into the
BC21 computer
_______ is the capability of the o/s to run numerous
BC22 applications simultaneously
_______ involves conversion of raw data into some
BC23 meaningful information
_______ is responsible for obtaining the processed data
BC24 from the computer

Internal
Services
Design
Network
Web
based
Technolog
y

system

Integrated
Services
Digital
None of
the above.
Network
Web
based
Web based Transactio
Transport n

Routers
batch

Protocol
command
numerous
alpha beta alpha

Repeaters
program
number
and alpha

cost,
performan size,
performan
ce their
ratio
ce, cost

input,
output,
performan
ce ratios

Internet

None of
ARPANET the above.

mini
microproc
computers essors
PCs

mainfram
es

output
feed
write
input
multiproce multithrea multiplexin multitaski
ssing
ding
g
ng
interpreter compiler
input

_______ printers use light to produce the dots needed to impact


BC25 form pages of characters
printers

converter

processor ram
nonimpact
desktop
drum
printers
printers

process
output

thermal
printers

Hardware components in a computer are


BC26 _____,____,_____,______
_______ software are programs that are complex and
BC27 can be developed or purchased
_______ is a set of special instructions used to
BC28 communicate effectively with the computer
_______ converts a high level language into machine
BC29 language
BC3

_______is/are a popular front end tool


_______ translates assembly language program into
BC30 machine language instructions
_______ software enables users to send and receive
BC31 data to/from remote computers

control
program,
interpreter
,
assembler
, compiler
applicatio
operating n
system
software
operating
system,
bootstrap,
kernel,
shell

monitor,
program,
keyboard,
bus

batch

windows 95 interpreter
procedure
software's s

protocols

CPU,
memory,
input,
output

processor compiler assembler coder


all of the
visual
power
basic
builder
SQL * plus above
compiler interpreter assembler processor
applicatio
operating communi
n
system
system
cation

BC32 A _____ is a running instance of an application


Splitting of CPU's time for different tasks _______
BC33 prevents time slicing

project
model
pilot project process
multiproce multithrea multiplexin multitaski
ssing
ding
g
ng

______ computers are used in large organizations for


BC34 large scale jobs which have large storage capacities

mainfram super
micro
none of
computers computers the above
es

BC39

arithmeti central
c and
_______ is responsible for all calculations and logical
control
processing
operations that have to be performed on the data
unit
logic unit unit
non
impact
band
drum
______ printer use laser light
printer
printer
printer
word
data
electronic
______ software enhances the user to enter ,store,
managem processi spreadshee
manipulate and print any text
ent
t
ng
communi
______ software enables users to send and receive data integrated cation
idea
to/from remote computers
software software processor
recycle
my
Microsoft
_______ is the temporary storage place for deleted files computer bin
exchange

BC4

When LAN connected together ,it is called __________ . MAN

BC35

BC36

BC37

BC38

none of
the above
none of
the above
none of
the above
none of
the above
none of
the above

BC40 _____ is a collection of related fields

field

file

record

None of
the above.
none of
the above

BC41 _____ language consists of strings of binary numbers


______ symbol is used to represent processes like
BC42 assigning a value to a variable or adding a number

assembly
language
terminator
symbol

machine
language
processe
d symbol

high level
language
connector
symbol

none of
the above
input/outp
ut symbol

WAN

GAN

fazitsu
hp vectra vp200
series
system

BC43 _______ is an example for micro computer

PC-at

_________capability supports concurrent users doing


BC44 different tasks

multiproce multithrea multiplexin none of


ssing
ding
g
the above

The ______ do not have processing power of their own


"dumb
and has only a screen, keyboard and the necessary
hardware to communicate with the host. For this reason, terminals dumb
BC45 the terminals are referred as_______________
servers
"

BC46
BC47
BC48
BC49

BC5

BC50
BC51

BC52

BC53

A______is nothing but a PC with a network operating


system
_____system is responsible for handling the screen and
user I/O processing
The______ handles data processing and disk access in
a Client/Server architecture
Both the DBMS and the application resides on the same
component in a ____system

BC55 Modem stands for __________ .


Multiple changes to the same record or a field are
BC56 prevented by the DBMS through______

dummy
servers

wan

distributed
computing windows
system
NT

LAN

host

server

back end

front end

host

server

back end
distributed
computing

front end
centralize
d

LAN
Transfer
Transfer communic
control
ation
protocol/In protocol/In
ternet
ternet
TCP/IP stands for _________ .
protocol
protocol
host
server
When all the processing is done by the mainframe itself, processin processi
the type of processing is sometimes called as
g
ng
DBMS models can be grouped under____ categories
one
four
file
hierarchic
managem al
ent
database
______is the most advantageous database system
system
system
A new user initiates a new process of execution at the
background,while the user can continue his query
process as usual in the foreground. This situation is
multiproce multithre
referred to as ______
ssing
ading

The process of data being automatically written to a


BC54 duplicate database is called______

dummy
terminals

IBM-PC

PC

Transmiss
ion control
protocol/In
ternet
None of
the above.
protocol
data
dumb
processin
processing g
two
many
network
database
system

relational
database
system

multiplexin
g
disk
defragment
ation

none of
the above

constraints
multiplexin
g
Local array
of
networks.

traps
none of
the above

disk
redo
repairing logging
mirroring
Modulati
Code/De- on/Demo Module/De- None of
code
the above
dulation module

fixes
multiproce
BC57 _________allows an application to multitask within itself ssing
Linear
area
BC58 LAN stands for __________ .
networks

locks
multithre
ading
Local
area
networks

None of
the above

BC59 New process of execution is referred to as______

task

BC6

Cells

thread

clientserver

Packets

None of
the above.

Simple
Mail
transfer
protocol

None of
the above.

BC7

SMTP stands for __________ .

BC8

The __________ protocol is a network protocol to be


built for the World Wide Web .

Bits
Software
System
Mail
modulatio transmissi
n transfer on
protocol
protocol
Transmiss
Transfer ion
Protocol protocol

ATM stands for __________ .

Asynchro
Aggregate nous
Area
transfer transfer
transfer
mode
mode
mode

BC9

Data is broken into small unit called __________ .

process

None of
Hyper text the above.

None of
the above.

ans

B
A

B
A

A
B
D
A

D
A
D
D
D

B
C
B
D
C
D
D
D

B
B

B
C

B
B

D
D
C
A

B
A

B
B
B

q_id

q_desc

OS 01

Which of the following computer software is designed to direct and assist the execution of
application programs

OS 127
OS 131
OS 132

Formatting a disk results in all the data being...?


Which bus carries information between processors and peripherals?
Which bus controls the sequencing of read/write operations?

OS 139
OS 193

Which computers use single chip processors?


CPU performance may be measured in

OS 199

In processing cheques which of the following I/O techniques have banks traditionally used

OS 215

Disk fragmentation

OS 216

A compiler is

OS 217

An interpreter is

OS 219

Zipping a file means

OS 233

An assembly language program is translated to machine code by

OS 234

Which of the following is not part of the processor

OS 276
OS 277

If the Cancel Error Property of the CommonDialog Box is set to true then which of the
following statement is true:
__________ control defaults to displaying the files in the current directory:
A ____________ occurs any time a program writes more information into the temporary
space it has allocated in the memory.
Assessing a system requires certain common tools. Which of the following is NOT a tool
used to assess a system?
The ____________________ Web site has a utility that will tell you what software and
operating system a Web server is running.
When software vendors discover flaws in their software, they usually will write corrections
to their code, known as:
All ____________ have the option of blocking ports.

OS 278

Which of the following is NOT a characteristic of a firewall?

OS 236
OS 238
OS 271
OS 274
OS 275

OS 280

Before shutting a service on an individual machine, which of the following would you
always check?

OS 281

At a minimum, which of the following should be implemented under the protection phase?

OS 282
OS 283

Attacks on your system may be prevented or trapped through the use of:
Setting restrictions as to the number of unique passwords to use before a user can
recycle them is called a password:

OS 284

Which of the following is NOT a step to take in securing a workstation?

OS 286

To prevent a hacker from unauthorized access, what should you do with the administrator
account?

OS 287
OS 289

What should be done with old backup tapes and CDs?


Which of the following is NOT an example of malware?

OS 291

One step you can take to reduce the risk of being infected by a virus is to:

OS 292

Which of the following is NOT a sign that a virus has infected your system?

OS 293
OS 294

Which of the following is the safest way to protect yourself from e-mail viruses?
A ____________ attack causes too much information to be placed into temporary memory
space.

OS 295

____________ gathers user information with the users knowledge.

OS 296

Which of the following is the most common function of spyware?

OS 299

Which of the following is NOT a virus-scanning technique?

OS 300

Which of the following would NOT be a way to protect your system from spyware?

OS 309

For which of the following positions would it be advisable to conduct an extensive


background check?

OS 329
OS 355

Which of the following would you use to open an existing file?


The ability to have multiple applications open at the same time is known as:

OS 356
OS 357

Which of the following can be changed using the Options command?


Which of the following leaves an application open but shrinks the window to a button on
the Windows taskbar?

OS 396

Which of the following actions would move a floating toolbar to dock it in a different place?

OS 397

To display a missing or needed toolbar, click the:

OS 399

Which of the following is NOT a true statement regarding password protection?

OS 495

The Linux operating systems is an example of:

OS 496

The Windows operating systems is:

OS 497

Application service providers offer:

OS 498

A(n) _________ offers on-demand software on an as-needed basis to its clients over the
web.

OS 502

_________ are systems used to interact with customers and run a business in real time.

OS 504
OS 505

The most common cause(s) of disaster is (are):


A _______ backup site is backup facility consisting of an empty warehouse with all
necessary connections for power and communication, but nothing else.

OS239

To destroy an object and free the memory space occupied by it, the keyword used is:

op1

op2

op3
Operating
system
Saved to the
disk
Address bus
Control bus
Super
computers
MHz
barcode
scanning
is due to bad
disk blocks

op4
Database
management
system

Application
Software
Deleted from
the disk
Data bus
Data bus
Personal
computers
BPS

Utility
Programs
Copied from
the disk
Auto bus
Address bus
Parallel
computers
MIPS

OCR
is caused by
wear

MICR
caused by
overuse

a fast
interpreter

converts a
slower than program to
none of the
an interpreter assembly code previous

faster than a
compiler
encrypting it

None of above A
None of above A
None of above C
None of above
VLSI
voice
recognition
none of the
previous

A
B
B
B

translates
and executes
programs
converts a
statement by program to
none of the
machine code previous
B
statement
compressing
decrypting it
transmitting it C
it

an assembler a compiler
the ALU
A runtime
error can
result if the
user clicks
the cancel
button
File List Box
memory
overflow

ans

the CU

an interpreter a linker
the power
None of the
above
cord

The program
executes
A compile time without any
error occurs
error
Dir List Box
Drive List Box
systems
overload
RAM overflow

You need to
carry out
conditional
compilation
Combo Box
buffer
overflow

A
C

A
A
D

Netcop
NetBrute
Netcraft
D
NetBIOS
www.nettools.c www.WhoIs.co www.netcraft.c www.netstat.co
om
m
om
m
C
code correct.
firewalls

patches.
switches

It can consist
of hardware,
software, or
both.

It hides your
network.

updates.
hubs

upgrades.
scanners
It is a barrier
between your
One of its
network and
techniques is the rest of the
packet filtering. Internet.

B
A

That any open Dependencies That you are


applications be on other
not on the
exited
Internet
services
IntrusionAntivirus
detection
software
software
Firewall
an intrusiona network
detection
antivirus
prevention
software.
system.
system.
cycle.
Make sure all
update and
security
patches are
applied.

renewal.
Install and
keep current
antivirus and
anti-spyware
programs.

Delete it and
change the
Delete it from built-in guest
the system and account to a
use the guest power user
account.
account.
Tapes can be
used over and Tapes and
over, and CDs CDs can be
should be kept thrown away in
forever.
the trash.
Trojan horse
Virus
place a router
between your
ISP and your add spyware to
system.
your system.

System acts
abnormal

Update
antivirus
software.
virus
A virus

That you also


shut down
associated
services

Router

a proxy filtering
system.
A

age.

history.

Limit users
ability to
configure the
workstation.
Disable it and
create a
nondescript
user account
with
administrator
rights.

Block all
incoming
traffic on a
network.

Tapes should
be melted and
CDs broken.
IP spoofing
download
files from
reliable Web
sites.

Create another
administrator
account to
confuse the
hacker.
C

Give them to a
recycle shop. C
Spyware
C

hone your
programming
skills.
Problems
with your
wireless
Files are
Printing
missing
problems
mouse
Never open
an e-mail
attachment
unless you
Turn off the
Do not
auto-launch in know what it
is and who
propagate
your e-mail
hoax viruses. client.
sent it.
buffer
Trojan horse
spyware
overflow
A buffer
A Trojan horse Spyware
overflow

D
D
C

Obtain
usernames
Obtain system
Check for open and
IP addresses Obtain cookies ports
passwords
E-mail and
Backup file
attachment
Download
scanning
scanning
File scanning scanning
Use your
Do not open
browsers
attachments in Avoid skins Use
security
unknown eand toolbars encryption
settings
mails
download
software
Administrative
Network
assistant to the
Junior
president
Cook
accountant
administrator
The Open
The Save
The Standard The Formatting command on command on
toolbar
the Edit menu the File menu
toolbar
tiling.
cascading.
minimizing.
multitasking.
whether the
worksheet
prints in
the default file landscape or the number of the margins on
location of
portrait
windows you
the printed
orientation
have open
DOCUMENT
new files

A
A

shrinking

multitasking

minimizing

cascading

Click on any
border and
drag.

Click on any
corner and
drag.

Click on the
title bar and
drag.

You cannot
move a floating
toolbar.
C

right mouse
button
anywhere on
the Word
window,
choose the
Customize
command from
the contextsensitive
menu, and
check the box
for the missing
toolbar from
the Toolbars
tab dialog box.

left mouse
button
anywhere on
the Word
window,
choose the
Customize
command from
the contextsensitive
right mouse
left mouse
menu, and
button on any button on any check the box
visible toolbar, visible toolbar, for the missing
and click on
and click on
toolbar from
the missing
the missing
the Toolbars
toolbar.
toolbar.
tab dialog box. B

All
documents
are
automatically
saved with a The password
default
is casesensitive.
password.
nonprotective
public domain open source
software.
software.
nonprotective
public domain open source
software.
software.
on-demand
on-demand
computing.
software.

Once a
document is
protected by a
password, it
cannot be
opened without
that password.
protective
open source
software.
protective open
source
software.
utility
computing.

best-cost
provider

Web service
provider

software
provider

Operational
systems

Passwords can
be up to only
seven
characters
long.
A
proprietary
software

proprietary
software.

utility software. B
application
service
D
provider

Informational
systems
hardware
power outages. failures.

Structured
Office
query systems automation
All of the
floods.
above.

hot

cold

empty

dormant

Delete

Kill

Nothing

New

A
D

q_id

CA1
CA2

q_desc
Using generalized audit software packages can add a
lot of value _______
_______ is used for CAAT as database

op1
to an audit
department's
products & services
Oracle

CA8

Generalized audit software perform auditors to


undertake any past records and not concurrent auditing
Generalized audit software is a file whose capabilities
for verifying processing is logic
CAAT's are computer program and data that auditor
uses as part of the audit procedures to process data if
audit significance contained in an entity information
system
CAAT do not contains package programs, purpose
written program, utility programs or system
management programs
Embedded audit routines are sometimes built into an
entity's computer system to provide data for later user
by the auditor
SCARF involves embedding audit software modules
within an application system to provide continuous
monitoring

CA9

Concurrent use auditors as the member of the system

true

CA10

Regular cross system verification may minimize frauds


Computer security is frequently associated with
confidentiality, integrity and authentication
Data reserve engineering process metadata to
document system and abstract business rules and
relationship

true

CA3
CA4

CA5

CA6

CA7

CA11

CA12
CA13

True
True

True

yes

true

true

true

true
to determine the audit
objective
can bring the data
directly

CA16

The first step for developing CAAT is_________


Using the open database connectivity feature in ACL is
______________
Computer Assisted Audited Technique involves the use
of computers through "Black Box Approach"
True
White Box Approach necessary involves expert
knowledge on the part of Auditor
True

CA17

The transition from manual system to CIS environment


bring dramatic changes including ________________

CA14
CA15

CA18
CA19

CA20

change in the method


of recording accounting
transaction
documents driven
Auditing with computer necessarily supports the
approach
hardware and software
CAAT involves an Auditors' appreciation of __________ configuration
Widespread end use computing result in unlimited
errors creeping into system going to accept handling,
thereby increasing audit risks
true

CA21

CA22

CA23

For computerized auditing usage of sophisticated audit


software would be a necessity

true
the source of data
Important knowledge needed to begin planning the use available to the audit
of CAAT is _________
organization
The move towards paperless EDI would eliminate much
of the traditional audit trail, radically changing the nature
of audit evidence
true

CA25
CA26
CA27

Computer operation controls are designed to provide


________________
Systems development control, apart from others,
include authorization, approval, testing, implementation
and documentation of new systems software and
system software modification
A system could be _________
A system exhibits 'entropy'

CA28
CA29

Super computer are the largest and fastest and is very


suitable for commercial application including audit work true
Assembler language uses Mnemonic symbols
true

CA24

CA30
CA31
CA32
CA33

CA34

CA35
CA36
CA37

CA38
CA39
CA40

CA41
CA42

Operating systems are devised to optimize the machine


capabilities, the function include_______________
General purpose software provides a framework for
highly complex scientific operation
In batch processing, transactions are processed one
after another
The use of computer assisted audit techniques is not
gaining popularity not only ________________
On-line processing refers to grouping of transaction and
processing the same in one go from start to finish
Real time refers to the technique of updating files with
transaction data immediately after the occurrence of the
event to which it relates
In OLRT the CPU should process the capability of
program interruption
Time sharing system allow access to a CPU from
remote terminals
DSS is defined as a system that provides tools to
managers to assist them in solving structured problems
DSS has the following components
_________________
Master files contains current records for identification
and summarizing
Transaction files contain relatively permanent records
take product profile, customer profile, employee profile
etc
Master file configuration includes ____________

the of by all concerned

true
natural/man-made
true

scheduled jobs
true
true
with audit
departments

true

true
true
true

true
databases
true

true
reference files

CA43
CA44
CA45

CA46
CA47
CA48
CA49
CA50

CA51
CA52
CA53
CA54

CA55
CA56

CA57

CA58
CA59
CA60
CA61

CA62
CA63

CA64
CA65

______ is a file management software package that lets


users and programmers organize data into files and
then process those files
CAATS provide added value to the clients because
_______________
File volatility refers to the number of addition and
deletions to the file in a given period of time
File activity is the proportion of transaction file records
that are actually used and accessed in a given
processing run:
File interrogation refers to the _____ of information from
a file
One -to-one relationship means a single entity to a
single entity in a monogamous structure

filex
to have a complete
picture of a system
true

true
back-ups
true

RDBMS is structured to a series of 2 dimensional tables true


seriously affected
SADB stands for ____________
database
Controls are present over many aspects of the
computer system and its surrounding social
environment
true
In framed checking the data entry is checked against an
expected picture or format
true
Errors are correlated_________
at the year end
Field check is exclusive to a field
true
_________ law basically states that there is a specific
probability of the first digit of a no. being 1,2,3 etc
Check digit is a group of nos. added to a code for
determining the accuracy of other digits in the code

Hierarchical code means _________


The validation checks applied to a field depend on the
field's logical inter relationships with other fields in the
record
The contents of a field could determine _______ sign
for a ______ field
Batch is the process of ______ together _____ that
bear some type of relationship to one another
Hash totals means meaningless totals
With OLRT where interactive data entry is available, the
master file associated with a transaction may be
searched for confirming data
Controls are required for authorization to ensure data
integrity and detect possible breaches in security
Data from client application are not stored in the
organization's database through auditables events and
function
All input records in a batch are normally of different
types

Benfish
true
consecutive nos. or
alphabets to entities

TRUE
valid, numeric
grouping, transaction
true

true
true

true
true

CA68

IDEA stands for


_________________________________
A transaction file is sorted prior to the update of master
file
A sequence check on the transaction or master files by
an update program is not required

CA69

Whenever monetary transactions are processed against


master files, the update program should maintain a
correlation account to record such transaction that does
not have a matching master file record
true

CA66
CA67

CA70

CA71
CA72
CA73

CA74

CA75

CA76
CA77
CA78
CA79
CA80
CA81

CA82
CA83
CA84

CA85
CA86

Internal tables are stored tables from which certain


values are extracted for further processing and storing
For small to medium sized systems, individual modules
are coded and individually tested and then assembled to
be tested as a whole-the testing strategy is referred to
as ___________________
In systems testing, test involves_________________
Recording transactions in a controlled manner may
amount to loss of stored data

incremental design and


enlarge activity
true
true

true

e-brain
bottom up tests
yes

Audit software is used by the auditor to _________


read data on client's file
Core image comparison is a software used by the
auditor to compare _______ version of a program with a
secure ________ copy
executables, master
Database analyzer is a software which provides detailed
information concerning the operation of the database
true
system analysis
SAS stands for ______________
software
Embedded code is a software used by the auditor to
examine backup data
true
Embedded code performs wide variety of audit task
yes
Core image comparison is particularly useful where only
executable versions are distributed
true
Log analysis is a software used by auditor to detect
virus
true
On line testing techniques the auditor ______ data
either _______ or fictitious in order to see that a specific
program or sever edit test is doing its work
manipulates, real
Mapping software is used by the auditor to list unused
program instructions
true
Mapping software has very objectives
yes

Modeling is a variety of software which


________________
On line testing can be targeted for specific functions
carried out by programs

can be very powerful


analytical tool
yes

CA87
CA88
CA89

CA90
CA91
CA92

CA93
CA94
CA95

CA96

CA97
CA98
CA99
CA100

Program code analysis involves _____________


__________ is a software of CAAT
Snapshot is software which takes a picture of a file or
data or a transaction passing though the system

Base case system evaluation includes____________


While base testing forces on finding if there are any
defective execution policies in a program
Black box testing seeks to determine whether
application output is what it is supposed to be
In integrated test facility approach the auditor should
ensure that the impact of test transaction is
subsequently eliminated from the computer files
Black box testing is _______ based and white box
testing is _______ based

provides detailed
information of machine
uses
IDEA
true
fictitious data applied
against the client
program
true
true

true
specification,
program
identifying erroneous
code

Source code review means__________


In formula in flow hypothesis the auditor should expand
the extent of substantive tests to determine how the
defects may impact the attainment of the program
objectives
true
All material application oriented events that occur within
the boundary subsystem should be recorded in the
accounting audit trail
true
In examination of audit trail the following data
associated with an event may be ___________start and finish time
JCL means_________________
Audit should be periodically analyzed to detect any
control weakness of the system

job control language


yes

CA103

In an accounting audit trail, intrusion detection system


might monitor the amount of processor time consumed
by the user to detect unusual deviation from the amount
processor time requested by the user in the past
true
A sample size calculator program assists auditors in
determining RAND() function
true
package computer
p[program for
performing a variety
of data processing
Generalized audit software consists ___________
function

CA104

Specializes audit program may be___________

CA101
CA102

prepared by the auditor

CA109

Generalised audit software could be used by the


following in consistencies or significant fluctuations
Generalized audit software function
include____________
In the file reorganization merging capabilities are
needed in data from separate file is to be combined on
a separate work file
Auditors cannot use generalised audit software to
extract the data needed for audit purpose
Auditors can combine functional capabilities of
generalized audit software to accomplish the task of
__________________

CA110
CA111

Which of the following is not the feature of GAPs


Which is the example of CAATs

CA112

In audit procedures, test data is

CA113

Which of the following is not the use of CAATs


Which of the following are called explicitly by another
procedure?

CA105
CA106

CA107
CA108

CA114

true
file
access/organizations

true
true
examining the quality of
system process
Wide access to various
data base
ACL
A sample of
transactions
Tests of details of
transactions
Macros

op2

to add customers
ACL

op3

all the above


JCL

op4

none of these
none the above

ans

A
A

False

False

False

no

false

false

false

false

false

false
review and evaluate the to obtain a record
types of data
layout
can bring the data
indirectly
all the above

A
extract data from file

none of the above

False

False

use of accounting
codes

absence of audit trails

risk driven approach unique approach


processing options, file
data structure
checks and controls

false

all the above

none of the above

all the above

false
source of data for
material planing

all the above

false
providing access to
computer to all
organization personnel use of any programs

false
open/closed
false

conceptual/physical

none of these

none of the above

all of them

A
D
A

false
false
manage hardware &
software resources

A
A
enable multiple user
resource sharing

all the above

false

false
with production
departments

B
all the above

none of these

false

false

false

false

false

planning language

model base

all the above

false

false
table files

report files

none of the above

B
D

file-o-man
file manager
decentralized picture of
a system
all the above

filepet

none of the above

false

false

retrieval

deletion

addition

false

false

subject area database software and database safety and database

false

false
immediately
false

on quarterly basis

none of the above

B
B
A

Benford

Benjamin

none of the above

false
blocks of nos. to the
primary attribute of the
the entity

B
random placement of
component

none of the above

false

invalid, alphabetic

none of the above

all the above

regrouping, events
false

none of the above

all the above

A
A

false

false

false

false

interactive data
extraction and
analysis

interactive data
innumerable analysis

none of the above

false

false

false

false

bouncing ball
top-down tests

big-bang
hybrid tests

stub
all the above

C
D
B

no
provide information to
the audit

re-perform procedures
carried out by the
clients programs

all the above

deleted, hard

none of these

all the above

false
system advanced
software

A
all the above

none of the above

false
no

B
A

false

false

create, false
false
no
can enable the auditor
to execute provisions
on a number of
different bases
no

none of these

all the above

A
A
A

can provide the


auditors with useful
information with trend s
and patterns
all of the above

D
A

examination of source
code of a program
identifies program code with advice to
which may be there for following the logic of
fraudulent reason
none of the above
a program
ALC
ACLL
ACL
false
comparison of source
version of a
programmed

C
B
A

analyzing the picture of


a file or data
all the above

false

false

false

file, hardware
identifying ineffective
code

none of the above


all the above
identifying non-standard
code
all the above

A
D

false

false
authentication of
information support
job connectivity
language

A
resource requested

all the above

all the above

none of the above

no

false

false

mathematical concept

master list of
transactions

administered
questionnaire

prepared by the entity

prepared by an outside
programmer engaged
by the auditor
all the above

false
statistical/arithmetic
operation

A
stratification and
frequency analysis

all the above

false

false

carrying analytical
review
Can extract and
analyse data
IDEA
A utility software
programme
Analytical review
procedures

examining the quality of


data
Can aid in simple
selection
High End CAATs
A special purpose
written program
Compliance tests of
general EDP controls

Action Procedures

Event Procedures

all the above


Can define the audit
objectives
All of the above

None of the above

All of the above

General Procedures

D
D

Field0

CA114

Field1
Field2
In integrated test facility approach the auditor should ensure that the impact of test
transaction is subsequently eliminated from the computer files
TRUE
In olrt the cpu should posses the capability of program interrupt interrupts
TRUE
BOTTOM
UP
In system testing,test involves _______
TESTS
All input records in a batch are normally of different types
TRUE
In the planning phase gathering information and risk assessment will be done
TRUE
Information collection encompasses logging the selected auditable events
TRUE
Input controls are designed to ensure processing safety
TRUE
PARALLE
L
PROCES
Integrated test facility is a facility of ________
SING
Internal tables are stored tables from which certain values are extracted for further
processing and storing
TRUE

CA115

Log analysers are _______ required by the auditor

CA116
CA117

Log analyzers is ________


Log analyzer is a software used by auditor to detect virus
Mapping software is used by the auditor to list unused program instruction has
veryspecific objectives

CA107
CA108

CA109
CA11
CA110
CA111
CA112

CA113

CA118

CA119
CA12
CA120

CA121

HARDWA
RE

AUDIT
TOOL
TRUE
TRUE

REFERE
Master file configuration includes ______
NCE FILE
All material application -oriented events that occur within the boundary sub-system
should be recorded in the accounting audit trail
TRUE
Master file contains current records for identification and summarising
TRUE

Metadata approach is _______

APPROA
CH TO
THE
SYSTEM
DATA
ONLY

CA122

CAN BE
VERY
POWERF
UL
ANALYTI
CAL
TOOL

CA124
CA125

Modeling is a variety of software which _________


One-to-one relationship means a single entity to a single entity in a monogenus
structure
On-line processing refers to grouping of transaction processing the same in one
go from start to finish
On-line testing can be targeted for specific function carried out by programs

CA126

Operating systems are devised to optimise the machine capabilities-the function


include:

SCHEDU
LE JOBS

CA127

Parallel processing is a concept associated with _______ and ________

OS AND
RAM

CA128

Parallelsimulation is there to authenticate the _______ system

REEL
SYSTEM

CA129

Prevention,detection,investigation and reaction are the ______ of an auditor

CA13

Any audit enable software may include _______

CA130
CA131

Procedure driven approach of auditing is __________


Processing controls can be grouped into general controls

CA123

TRUE
TRUE
TRUE

FUNCTIO
N
COMPLE
TENESS
TRADITI
ONAL
APPROA
CH
TRUE

CA132

Program code analysis involves ______

PROVIDE
S
DETAILE
D
INFORMA
TION ON
MACHINE
USAGE

CA133

Programme code analysis is being implemented by the _________

COMPAN
Y

CA136

Public audit trail is an important control in system that use __________ for
authentication purposes
Rdbms is a structured into a series of 2-dimensional table
Real time refers to the technique of updating files with transaction data
immediately after the occurrence of the event to which it vrelates

CA137

Reasonableness checking is

TRUE
TYPE OF
RECORD
CHECK

CA138
CA139
CA14
CA140

Recording transactions in a controlled manner may amount to loss of stored data


Regular cross-system validation may minimise frauds
Application controls can be categorized into _______ types
Risk assessment is a phase of an audit

TRUE
TRUE
4
TRUE

CA141

Risk assessment is the phase of ______


Scarf involves embedding audit software modules within an application system to
provide continuous monitoring
Security audit can be done through oracle database

AUDIT

CA134
CA135

CA142
CA143

CA144
CA145
CA146

Security can be broken into ________ areas


Sign test is a type of field checks on processed data
Snapshot is a software which takes a "picture" of a file or data or a transaction
processing through the system

CA147

Snapshot is a technique of __________ which is a part of audit software

PUBLIC
KEY
TRUE

TRUE
TRUE
RISK
AVOIDAN
CE
TRUE
TRUE
AUDIT
ROUTINE

CA148

Source code review means _______

CA149

Specialised audit programs may be _______

CA15

Application controls grouped into


Super computer are the largest and fastest and is very suitablefor commercial
applicationincluding audit work
System development control, apart from others,include
authorisation,approval,testing,implementation and documentation of new systems
software and system software modification
System privilege can be checked by auditor
System security audit is an on site inspection ,which identifies potential
securityvulnerabilities within an organization

CA150

CA151
CA152
CA153

IDENTIFY
ING
ENORMO
US CODE

PREPAR
ED BY
THE
AUDITOR
TWO
GROUPS
TRUE

TRUE
TRUE
TRUE

CA154

Test data can be defined as __________

SAMPLE
OF DATA
USED
FOR THE
PURPOS
E OF
TESTING
THE
SYSTEM
SOFTWA
RE

CA155

Test data pack is ________

STREAM
OF DATA

CA156

The contents of a field could determine _______ sign for ______ field
The move towards paperless edi would eliminate much of the traditional audit
trail,radically changing the nature of audit evidence

CA157

INVALID
TRUE

CA158

CA159
CA16
CA160
CA161
CA162
CA163
CA164
CA165
CA166
CA167

CA168
CA169
CA17
CA170
CA171
CA172

CA173
CA174
CA175
CA176

CA18
CA19

The stream of data that are generated by these tools is called as the __________

The transition from manual system to cis environment bring dramatic changes
including
Ar=ir*cr*dr
The validation checks applied to a field depend on the fields logical
interrelationships with other fields in the record
There are ______ types of approaches of test data techniques
There are ______ types of control totals
There are _______ types of audits of the systems development process
There are ________ types of checks that can run when data is input through a
terminal
There are _____types of checks frequently used in validating the data
There are 13 system development phases while audit of the system development
processes
There are four type of audit risks

Top down tests,bottom up tests and hybrid tests are under the _______ category
Tracing helps to analyse the change caused by viruses
Assembler language uses mnemonic symbols
Transaction file contain relatively permanent records take product profile,customer
profile,employee profile etc.
Transactions are not lost ,added,duplicated or improperly changed is called as
control over input
Validation checks is applied to a field depend on the field's logical
interrelationships with other fields in the records
Whenever monetary transaction are processed against master files,the update
program should maintain a correlation account to record such transaction that
does not have a matching master file record
White box testing focuses on finding if there are any defective execution paths in
a program
White box approach is program based
With olrt where interactive data entry is available ,the master file associated with a
transaction may be searched for confirming data

Audit around the computer is called


Audit risk cannot be viewed as a joint probability of inherent risk,control risk and
detection risk

TEST
DATA
CHANGE
IN THE
METHOD
OF
RECORDI
NG
ACCOUN
TING
TRANSA
CTION
TRUE
TRUE
ONE
2
THREE
FIVE
4
TRUE
TRUE
INTER
TABLE
TEST
TRUE
TRUE
TRUE
TRUE
TRUE

TRUE
TRUE
TRUE
TRUE
BLACK
BOX
APPROA
CH
TRUE

CA2
CA20

White box approach necessarily involves expert knowledge on the part of auditor
Audit software is a type of audit technique

TRUE
TRUE

CA21
CA22

Audit software is used by the auditor to ________


Audit software can be categorized under ______ heads

READ
DATA ON
CLIENT'S
FILES
2

CA23
CA24

Audit software can be divided into ________ categories


TWO
Audit through can be done using simulation
TRUE
Audit trail should be periodically analysed to detect any control weaknesses of the
system
TRUE
WHITE
BOX
APPROA
Audit with networking and database help is called _______
CH
Auditing is a form of attestation
TRUE
Auditor can also check default roles in oracle database software
TRUE
EXAMINE
THE THE
QUALITY
OF
SYSTEM
Auditor can combine functional capabilities of generalized audit software to
PROCES
accomplish the task of ________
S

CA25

CA26
CA27
CA28

CA29

CA33

_________ Is the file management software package that lets users and
programmers organise data into files and then process those files
Auditors can issue the sql commands to audit
Auditors can use profiles in their white-box approach of auditing
Auditors cannot use generalised audit software to extract the data needed for audit
purposes
Auditors has to take care of the fact to link between multiple databases with one
application

CA34
CA35

Base case system evaluation includes _______


Black box approach is specification based

CA3
CA30
CA31
CA32

FILE
TRUE
TRUE
TRUE
TRUE
FICTITIO
US DATA
APPLIED
AGAINST
THE
CLIENT
PROGRA
M
TRUE

CA36
CA37
CA38

CA39
CA4
CA40

CA41
CA42
CA43

CA44
CA45
CA46

CA47
CA48
CA49
CA5

CA50
CA51

Black box testing is ______ based and white box testing is _____ based
Black box testing seeks to determine whether application output is what it is
supposed to be
Caat do not contain package programs, purpose written programmes,utility
program or system management program
Caat's are computer program and data the auditor uses as part of audit
procedures to process data of audit significance contained in an entity's
information system
A sample size calculator program assists auditors in determining rand() function
Caat's are computer programs and data the auditor uses as a part of the audit
procedures

BOTH C
&D
TRUE
TRUE

TRUE
TRUE
TRUE

COMPUT
ER AIDED
SOFTWA
RE
EDITOR

Case-is ________
Check digit is a group of numbers added to a code for determining the accuracy of
other digits with code
TRUE
Check digit is a tool under field checks
TRUE

Check digit is a type of ___________


Codd's rule are being implemented on database
Computer assisted audit technique involves the use of computer through "black
box " approach

Computer operation controls are designed to provide ________


Computer security is frequently associated with confidentiality ,integrity and
authentication
Concurrent audit include auditors as members of s.d team
A sequence check on the transaction or master file by an update program is not
required

Concurrent audit is taking care of the ______ data that is being transacted
Confidentiality,integrity and availability are the major security attributes to the
auditor

FIELD
CHECKS
TRUE
TRUE

THE USE
OF
COMPUT
ERS BY
ALL
CONCER
NED
TRUE
TRUE
TRUE

PREVIOU
S DATA
TRUE

CA52
CA53
CA54
CA55

CA56
CA57

Control total is under batch checks


Controls are present over many aspects of the computer system and its
surrounding social environments
Controls are required for authorisation,to ensure data integration and to detect
possible breachesin security
Conventional data entry giving way to scanner,digitised image processors etc. For
auditing in cis environment

TRUE
TRUE
TRUE
TRUE
TYPE OF
NETWOR
K
TRUE

CA66
CA67
CA68

Core image comparison is a ________ used by the auditor


Core image comparison is a type of audit technique
Core image comparison is particularly useful where only executable versions are
distributed
TRUE
Critical review of the system of book-keeping,accountingand internal organizational
controls.
TRUE
NATURAL
/MAN
A system could be ________
MADE
Cryptographic techniques are the part of security audit
TRUE
Data communication and networking would introduce new audit risk
TRUE
Data from client application are not stored in the organisations database through
auditable events and functions
TRUE
Data integrity can be imposed on the database through dbms
TRUE
Data reverse engineering process metadata to document system and abstract
business rules and relationships
TRUE
Data security in audit techniques can be done through three ways
TRUE
Database analyser is a software which provides detailed information concerning
the operation of the database
TRUE
Databases are a key element in most business-related information systems
TRUE
Ddl,dml,dcl-statements can be exercised in rdbms
TRUE

CA69
CA7

Deterrenece meance _______


A system ehibit entropy

CA70

Dss has the following components


Dss is defined as a system that provides tools to managers to assist them in
solving structural problem
Embedded audit routines are sometimes built into an entity's computer system to
provide data for later use by the auditor
Embedded code is a software used by the auditor to examine backup
Embedded code performs a wide variety of audit tasks

CA58
CA59

CA6
CA60
CA61
CA62
CA63
CA64
CA65

CA71
CA72
CA73
CA74

CA75
CA76
CA77
CA78

Errors are corrected :_______


Event detection is an audit procedure
Event detection is the audit procedures
Examine the quality of data is not the task of generalized audit software

THREAT
TRUE

DATABAS
E
TRUE
TRUE
TRUE
TRUE
AT THE
YEAR
END
TRUE
TRUE
TRUE

CA79
CA8
CA80

Examine the quality of system processes is _________


A system means -totality
Field check is exclusive to a field

CA81
CA82

File access is a function of _________ software


File access will be the functional capabilities of generalized audit software
File activity is the proportion of transaction file records that are actually used or
accssed in a given processing run

CA83
CA84
CA85
CA86

CA87
CA88
CA89
CA9

CA90
CA91

File integration refers to the ________ of information from a file


File volatility refers to the number of additions and deletions to the file in a given
period of time
For computerised auditing,usage of sophisticated audit software would be a
necessity
For small to medium sized systems,individual modules are coded and individually
tested and then assembled to be tested as a whole.the testing strategy is referred
to as:
General purpose software provides a framework for highly complex scientific
operations
Generalised audit software could be used by the auditor for identifying
inconsistencies or significant fluctuations
A transaction file is sorted prior to the update of master file

Generalised audit software function include _______


Generalised audit software never allow several files to be read simultaneously
_______

AUDIT
TASK OF
THE
AUDITOR
TRUE
TRUE
GENERA
LIZED
AUDIT
TRUE
TRUE
BACKUP
S
TRUE
TRUE

C-BRAIN
TRUE
TRUE
TRUE

FILE
ACCESS/
ORGANIZ
ATION
TRUE

CA92
CA93

PACKAG
E
COMPUT
ER
PROGRA
M FOR
PERFOR
MING A
VARIETY
OF DATA
PROCES
SING
FUNCTIO
N
TRUE

CA95
CA96

Generalized audit software consists _______


Generalized audit software has infile capabilities for verifying processing logic
Generalized audit software has only limited capabilities for verifying processing
logic
TRUE
Generalized audit software permits auditors to undertake only expost auditing and
not concurrent auditing
TRUE
Generalized audit software provides the full set of arithmetic operators
TRUE

CA97
CA98

Hash total is a type of _________


Hash totals falls under control totals

CA94

CONTRO
L TOTAL
TRUE

Field3
FALSE
FALSE
TOP
DOWN
TESTS
FALSE
FALSE
FALSE
FALSE

Field4

Field5

Field6
A
A

HYBRID
TESTS

ALL THE
D
ABOVE
B
A
A
B

TEST
SOURCE DATA
APPROA NONE OF
CODE
REVIEW CH
THESE
C
FALSE

SOFTWA NETWOR NONE OF


K
THESE
B
RE

SOFTWA
RE USED
TO READ
AND
ANALYZE
RECORD
S OF
SOFTWA MACHINE MACHINE
RE
ACTIVITY ACTIVITY D
B
FALSE
FALSE
TABLE
FILES
FALSE
FALSE
APPROA
CH TO
THE
APPLICA
TION
DATA
ONLY

A
NONE OF
REPORT THE
FILE
D
ABOVE
A
B
IT IS
DATA
ABOUT
SOME
OTHER
DATA

ALL THE
ABOVE

CAN
ENABLE
THE
AUDITOR
TO
EXAMINE
PROVISI
ON ON A
NUMBER
OF
DIFFERE
NT
BASES

CAN
PROVIDE
THE
AUDITOR
WITH
USEFUL
INFORMA
TION ON
TRENDS
ALL THE
AND
PATTERN ABOVE
D

FALSE

FALSE
FALSE

B
A

MANAGE
HARDWA
RE AND
SOFTWA
RE
RESOUR
CES

ENABLE
MULTI
USER
RESOUR
CE
SHARING
OS AND
MICROP
ROCESS
OR

ALL THE
D
ABOVE

BOTH (A)
AND (B)
ROLE
ACCURA AVAILABI
CY
LITY

NONE OF
THESE
B
ALL THE
D
ABOVE

NONE OF
THE
ABOVE
C
DATABAS
REAL
BOTH (A) E
SYSTEM AND (B) SYSTEM B
OS AND
ROM

LATEST
NONE OF
APPROA BOTH (A) THE
CH
AND (B) ABOVE
A
B
FALSE

IDENTIFI
ES
PROGRA
M CODES
WHICH
MAY BE
THERE
FOR
FRAUDU
LENT
REASON
DATABAS
E
ADMINIS
TRATOR
PRIVATE
KEY
FALSE

EXAMINA
TION OF
SOURCE
CODE OF
A
PROGRA
M WITH A
VIEW TO
FOLLOWI
NG THE
LOGIC
OF A
NONE OF
PROGRA THE
ABOVE
C
M
AUDITOR
USING
COMPUT
AUDITOR ERS
D
DIGITAL
SIGNATU NONE OF
THESE
C
RE
A

FALSE
A
TYPE OF TYPE OF
RANGE
SIGN
NONE OF
CHECKS TEST
THESE
A
FALSE
FALSE
2
5
FALSE
AUDIT
THROUG
H
COMPUT ALL THE
ABOVE
ERS
FALSE
FALSE

B
A
D
A

NONE OF
THE
ABOVE
B
A
A

DETERR PREVEN ALL THE


ENCE
TION
D
ABOVE
FALSE
A
FALSE
AUDIT
TECHNIQ AUDITIN
UE
G

A
NONE OF
THESE
A

IDENTIFY
ING
INEFFEC
TIVE
CODE

IDENTIFY
ING NONSTANDA ALL THE
RD CODE ABOVE
D

PREPAR
ED BY AN
OUTSIDE
PROGRA
PREPAR MMER
ED BY
ENGAGE
THE
D BY THE
ENTITY AUDITOR
THREE
FOUR
GROUPS GROUPS

ALL THE
D
ABOVE
ALL THE
ABOVE
B

FALSE

FALSE
FALSE

A
A

FALSE

SAMPLE
OF DATA
USED
FOR
TESTING
THE
APPLICA
TION
PROGRA
MME
PROGAR ALL THE
ABOVE
MME

SAMPLE
OF DATA
USED
FOR THE
PURPOS
E OF
CHECKIN
G LOG
FILES
C
STREAM
OF DATA
THAT
ARE
GENERA
TED BY
TEST
DATA
TECHNIQ
UE
BOTH (A) NONE OF
AND (B) THESE
B
TOOLS
BOTH C
&D
VALID
NUMERIC B
FALSE

TEST
DATA
TEST
APPROA DATA
CH
PACK

USE OF
ACCOUN
TING
CODES
FALSE

NONE OF
THE
ABOVE
C

ABSENC
E OF
AUDIT
ALL THE
TRAIL
ABOVE

D
A

FALSE
TWO
4
FOUR

THREE
3
TWO

FOUR
5
ONE

A
B
B
A

THREE
2

FOUR
5

ONE
3

C
A

FALSE
FALSE
TABLE
SYSTEM LEVEL
TEST
TESTS
FALSE
FALSE

A
B
NONE OF
THESE
B
A
A

FALSE

FALSE

FALSE

FALSE

FALSE
FALSE

A
B

FALSE
A
WHITE
BOX
APPROA BOTH (A) NONE OF
CH
AND (B) THESE
A
FALSE

FALSE
FALSE

A
A

REPERF
ORM
PROCED
URES
CARRIED
PROVIDE OUT BY
INFORMA THE
TION TO CLIENT'S
THE
PROGRA ALL THE
AUDIT
MS
ABOVE
4
5
3

D
D

FOUR
FALSE

THREE

FALSE
BLACK
BOX
APPROA ALL THE
CH
ABOVE
FALSE
FALSE

CARRYIN
G
ANALYSI
NG
REVIEW
FILE-OMAN
FALSE
FALSE

NONE OF
THESE
C
A
A
NONE OF
THE
ABOVE
A
A
A

EXAMINI
NG THE
QUALITY ALL THE
OF DATA ABOVE
THE FILE
MANAGE
R
FILEPET

C
A
A

FALSE

FALSE

COMPARI
SON OF
SOURCE
VERSION
OF A
PROGRA
M
FALSE

ANALYSI
NG THE
PICTURE
OF A
FILE OR ALL THE
DATA
ABOVE

A
A

HARDWA SPECIFIC PROGRA


RE
ATION
M
A
FALSE

FALSE

FALSE

FALSE

FALSE

COMPUT
ER AIDED
SOFTWA
RE
EMBEDD
ED
FALSE
FALSE

COMPUT
ER AIDED
SOFTWA
RE
ENGINEE NONE OF
RING
THESE
C
B
A

RECORD BOTH (A) NONE OF


CHECKS AND (B) THESE
A
FALSE
B
FALSE
PROVIDI
NG
ACCESS
TO
COMPUT
ER TO
ALL
ORGANIZ
ATION
PERSON
EL

USE OF
ANY
NONE OF
PROGRA THE
MS
ABOVE
D

FALSE
FALSE

A
A

FALSE

ALL THE
ABOVE
CURREN NONE OF NONE OF
T DATA THESE
THESE
B
FALSE

FALSE

FALSE

FALSE

FALSE
A
TYPE OF TYPE OF
SOFTWA HARDWA NONE OF
RE
RE
THESE
B
FALSE
A
FALSE

FALSE

CONCEP
OPEN/CL TUAL/PH ALL THE
OSED
YSICAL
ABOVE
FALSE
FALSE

D
A
A

FALSE
FALSE

B
A

FALSE
FALSE

A
A

FALSE
FALSE
FALSE

A
A
A

BROADC
ASTING
FALSE
PLANNIN
G
LANGUA
GE

NETWOR NONE OF
K
THESE
A
A

MODEL
BASE

ALL THE
ABOVE

FALSE

FALSE
FALSE
FALSE

A
B
A

ON
QUARTE NONE OF
IMMEDIA RLY
THE
TELY
BASIS
ABOVE
FALSE
FALSE
FALSE

B
A
A
B

AUDIT
TASK OF
THE
AUDITOR
S USING
COMPUT
ERS
FALSE
FALSE
SPECIALI
ZED
AUDIT
FALSE

AUDIT
TASK OF
THE
GENERA
LIZED
AUDIT
SOFTWA ALL THE
RE
ABOVE

C
A
A

UTILITY
PROGRA NONE OF
M
THESE
A
A

FALSE
RETRIEV DELETIO ADDITIO
AL
N
N

FALSE

FALSE

BIG
BANG

STUB

BOUNCIN
G BALL
B

FALSE

FALSE
FALSE

A
A

STATISTI
CAL/ARIT
HMETICA
L
OPERATI
ON
FALSE

STRATIFI
CATION
AND
FREQUE
NCY
ANALYSE ALL THE
S
ABOVE

D
B

MATHEM
ATICAL
CONCEP
TS
FALSE

A
MASTER
LIST
TRANSA
CTION

ADMINIS
TERED
QUESTIO
NNAIRE A
A

FALSE

FALSE
FALSE
TRANSA
CTION
TYPE
FALSE

A
A
BATCH
SEQUEN
SERIAL
CE
NUMBER CHECK
A
A

q_id
DA1
DA2
DA3
DA4

DA5
DA6
DA7
DA8
DA9

DA10

q_desc

op1

Sequence Check is a --------------- level control check.


Analyse data over two or more periods is called ---------------------- analysis
We use Hash Total to identify ------------ within a series
where there is a definite relation between items
Analyse fields by arranging them into rows and columns is
called

Field
Horizonta
l
Duplicate
Value
Cross
Tabulate

--------------------- function searches for a value in the


leftmost column of a table and then returns a value in the
same row from a column that we specify in the table.
To import data from Access to Excel ,it is not possible to
link between Access and Excel sheet
The GAP detection options can be used to test for
completeness of data.
Exception testing can be used to identify ----------------items
Data validity test represents
Year end ledger, inventory files or transaction files can be
tested for cut-off , to ensure that the data has been
provided is for the correct audit period
In Range Check , the data may not be in proper sequence
but should be within a predetermined range
In ---------------- Check data entry follow a particular
sequence and also a predetermined range.
'Set mapping' Check control that follows a text-type
validation, we use ----------------- application for data
analysis.
Excel can import data from other databases for the data
analysis.

op2
Record

op3
Both

Vertical
A or B
Combined
Value
Gaps
Filter

Merge

RAND()

VLOOKU HLOOKU
P()
P()

TRUE

FALSE

TRUE

FALSE

Unusual Strange
A or B
exception compariso duplicates
testing
n of data testing

True

False

True
Limit

False
Sequenc
Range
e

Excel

Access

True

False

False

True

Valid
Signs

Transactio Limit
n type
Check

DA17

A System Auditor can uses CAAT tools to analyze data


In the case of the ---------- control, it is ensured that the
data in combination with other fields are reasonable as per
standard set by an organisation.
--------------- function searches for a value in the leftmost
column of a table and then returns a value in the same
row from a column that we specify in a table

DA18

Most of the tools use in Data Analysis depends on

DDE

DA11
DA12

DA13
DA14
DA15

DA16

Both

HLOOKU VLOOKU
P
A or B
P
OLE

ODBC

op4
None of
the above
None of
the Above
All of the
above
None of
the above

ans
A
A
C
A

None of
the above B
A
A
None of
the above C
All of the
D
above

A
A
Both B &
C

None of
the above B
A
B
Reasona
bleness D
None of
the above B
All of the
above
C

q_id
WO1

WO4

q_desc
_______ is a word processing that is a member of the office 2000 family
The feature that enables user to type anywhere in a document without pressing or
tab
The______ feature allows the user to copy and paste upto 12 items at the same
time in an application
______ and _____ key combination will extend the selection by one character on
the left and right

WO5

_____and_____ are improved layout in Word 2000

office clipboard
shift+end and
shift+home
web layout,
printlayout

WO6

The easiest way to create a document in word is

wizard

WO7

office assistant

WO8

In Office2000 environment the tool that makes work easier for us is_____
A short description of a tool bar button called the ______ is displayed when the
mouse pointer is allowed to stay for a second on the button

WO9

The _____ helps us to keep track of the margin of the page

WO10
WO11

The keys that are used to navigate between headers and footers are
Pick out the element from the following that dose not form the type of tabs for the
Word 2000

tab stop
up arrow keys
only

WO12

_______are blueprints or patterns for documents of a certain type

template

WO13
WO14

The______ is used for quickly setting paragraph indention using the mouse
Word art is text with

increase indent
special effect

WO15
WO16

AutoShapes in word can be created by accessing the _____


By default, a document consists of_____ section

drawing toolbar
1

WO17

The dialog box that is used to determine the documents margins is


________ is a box surrounding a page on all slides or a line that sets off a
paragraph on one or more slides

WO2
WO3

WO18
WO19
WO20

op1
Word 2000
click-n-type

Screen Tip

left

page setup
from the file
border

WO22

The key that is used to perform a task to select all t he text in the documents is
The key that is used to indent a paragraph is
The key that is used to change the font from the current positioned in a document
is
The key that is used to change the style of the document that is from that normal to
heading1 or heading1 to other document styles.

WO23

______ is the default view in Word used for typing Editing and Formatting the Text NORMAL

WO24
WO25

The short-cut-key that is used to indent a paragraph spacing in the documents is


The short-cut-key that is used to paste the selected text

ctrl+m
ctrl+v or ins

WO26

The short-cut-key that is used for paragraph spacing(1.5)

ctrl+2

WO21

ctrl+a
ctrl+a
CTRL+SHIFT+F
ctrl+shift+f

WO27
WO28
WO29
WO30
WO31

The box that separate text from the document and allows it to behave like an
independent object is known as
The object that is used to provide information like the title of the book, name of the
chapter, page number etc.
The object that helps us analyzing data statistically is known as
To highlight certain parts of a page to set it apart from the rest of the page we
make use of the following features

Text Box
Header and
Footer
Chart
Borders
clear
picture bullets
dialog box

WO34

To clear all the tabs in a document the option that is clicked from the tabs dialog
The dialog box that is used to incorporate picture bullets into our documents or
web pages is
The object that composes of set of tools which helps to create and work on
different shapes like rectangles, circles, flowcharts etc.
When word is opened a new document called_____ is displayed, where the user
starts typing the content right way

WO35

______ is an online dictionary maintained by word to obtain synonyms for words

thesaurus

WO36

The thesaurus is invoked by pressing_______

shift+f7

WO37

When a new table is created the insertion point flashes in the _____

first

WO38

By pressing the _____ key inserts a blank row after the last row in the table

WO39

The ______ option enables us to convert text into a table format

tab
convert text to
table

WO40

A table consists of ______ that contain text or graphics


The _______ option in word allows the user to automatically correct misspell words
as and when they are typed
______ is a facility that enables recording and replaying of a sequence of
keystroke
In Word Macros are written in _____
In Word 2000 the macro dialog box is activated with the help of ____ key
combination
________shows how a document would look like when published on the web or on
an intranet

row

______ is a software for sending and receiving e-mail messages


________is the coding system used to create web pages
The network that makes information easily accessible across various networks is
_______

email client
html

WO32
WO33

WO41
WO42
WO43
WO44
WO45
WO46
WO47
WO48

WO49

Which of the following statements are false with reference to the use of a header
row source for a mail merge

charts
doc1

AutoCorrect
Mail Merging
basic
shift+f8
web layout
view

internet
field name must
be listed in the
same order as
the
corresponding
information in
the data source

WO50
WO51

WO52
WO53
WO54
WO55
WO56
WO57

With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE


false
The alignment available for tabs does not include

Which of the following statements related to a Section Break are True


The user can set a spelling checker to skip the marked part of the next
New option under the file menu of word creates a new blank document that is
based on the normal templates
The user can split the screen only into two parts
The features that enables the user to type text graphics tables anywhere in the
document without pressing enter or tab
The user can modify the picture from the clip art

it is not possible
to change the
height of only
selected rows of
a table
left
A new section is
created in order
to change
properties like
number of
columns
true
true
true
drag & drop
true

WO58

With reference to auto correct which of the following statements are false

automatically
corrects
common typing,
spelling errors

WO59
WO60

With the reference to password protected documents which of the following


statements are false
The alignment available for tabs does not include

password can
not include
spaces
left

Which of the following statements are False


Drop Cap tool does not work for the contents in the table format
The user can split the screen only into two parts in MS-Word

a .ppt file can not


not be inserted
at specified
position in the
current
document
true
true

WO61
WO62
WO63

WO64
WO65

The special symbols that are inserted using "insert symbol" option of the word can
not be printed by the printer as they are not standard keyboard symbols
true
true
Master
Document
Print Layout
View

WO68

The "format columns" option allows to create columnar text up 12 columns only.
The document that makes the user to organize and maintain a long document,
such as multipart report or a book consisting of chapters
The view that enables us to view how objects will be positioned on the page when it
is printed
The mode that is initialized or toggled to if the user is in a position to overwrite the
text in the word

WO69

Veena is entering a paragraph in a word processing program. When the cursor


gets to the end of a line, what is the best way to get the cursor to the next line?

WO70

How are data organized in a spreadsheet?

press the return


key
layers and
planes

WO71

Which key moves the cursor to the beginning of the next line of text?
Veena typed the following sentence: "The girl was very beautiful." In which word
processing utility could she find a synonym for "beautiful"?

WO66
WO67

WO72

Insert Mode

tab
grammar
checker
send a public
message to
friends
interested in one
topic

WO77

Using an electronic bulletin board, Seema can do all of the following except which
one?
Aryan has created a ten-page story, but only wants to print the first two pages.
What printer command should he select?
What process should be used to recall a document saved previously?
Which is used to indent text within a document?
Desktop publishing is a more sophisticated form of which of the following types of
software?

WO78

What is a Word Processor used for?

To analyse
figures

WO79

What is a picture that is saved on a diskette and can be pasted into a document?

subscript

WO80

What is a Word Processor used for?

To analyse
figures

WO81

What basic tools would you find in the Edit menu of a word processor

Clear, replace
and select

WO73
WO74
WO75
WO76

WO82

What is a header in a document?

WO83

What hardware is essential for a word?

Print all
Enter
closing
database

Text at the
bottom of every
page
Mouse, printer
and processing
system
keyboard?

WO84

The user could take a picture from a magazine and insert it into the document by
using a

Browser

WO87

Clear, replace
What basic tools would you find in the Edit
and Toolbars
Assume you are creating a two-column newsletter. Which type size is the most
reasonable for the text in the columns?
6 point
Given the default left and right margins, and -inch spacing between columns, the
width of each column in a two-column document will be:
2 inches.

WO88

Assume you have made all appropriate selections in the Columns dialog box in
Word, but cannot see any columns on the screen. What is the most likely cause?

You are not in


Print Layout
view.

WO89

While word processing, in which of the following situations would Tom use the
"Copy" command?

to store a file on
the hard drive

WO85
WO86

WO90

Data about a set


of similar things

WO92

What does a document contain?


Before submitting your work you want to find any words spelt incorrectly. Which of
the following would you use?
What command in a word-processing program can be used to change the word
him to her, and also the word he to she in the given phrase? On a cold and
still night, the only sound that could be heard was the owl that had ade its home in
the nest outs

WO93

What edit commands would you use to insert a paragraph from one document into Copy, then
another document, while still keeping the paragraph in the first document?
paste

WO91

WO94

WO95

Thesaurus

Paste

Which of the following statements would NOT be a reason for showing suggested
revisions in a Word document without changing the original document?

To give the
original author a
chance to accept
suggested
changes from
the person who
entered the
revisions

Which statement is NOT true regarding revisions made in a Word document?

A line appears
through text that
is to be deleted.

WO96

WO97

How are suggested changes entered for review on an initial Word document?

Through the Edit


menu by
choosing Track
Changes
command

Which of the following is TRUE about saving a document using the Versions
command?

The Versions
command will
allow you to save
multiple versions
of a document,
including any
changes that
may have been
made to that
document.

WO101
WO102

All versions are


What happens when you open a document that has been saved using the Versions opened
command?
automatically.
You have used the word discover four times in an English essay you have created
using a word processing program. You would like to find another word of similar
meaning to use instead of discover. Which of the following would you use to do
this?
Dictionary
Word displays
a list of the
dates and times
When opening and working with multiple versions of a document, how can you tell each file was
which is the most recent version?
saved.
Various fields are added to a regular document to create a special document called
a form through the ____________ toolbar.
Fields
Which of the following types of fields CANNOT be inserted into a form?
Check boxes

WO103

Comments
cannot be
Which of the following is TRUE related to editing comments in a Word document? edited.

WO98

WO99

WO100

WO104

WO105
WO106
WO107
WO108

What is a header in a document?


In your English essay you notice that the paragraph at the bottom of page 1
continues on to page 2. You would like to make this paragraph start on page
2.What would be the best way to do this?
Tables in a document help you to easily arrange all of the following EXCEPT:
To identify a document, it is helpful to include the file name on each page as a
Which of the following tools will copy the formatting of selected text to other
places?

Text at the
bottom of every
page

Press tab.
text.
header/footer.
Copy button

WO109
WO110

What is the name of the process of determining the cause of errors in a macro?
Drop caps are added to a Word document using the ___________ menu.

Fault Finding
Insert

WO111

A reverse in a newsletter is:

WO112

A pull quote is best emphasized by:

a section of
white text on a
black
background.
setting it in
larger type or
font size.

Which of the following definitions is CORRECT?

The reverse
technique means
to add dark text
on a light
background.

WO113

WO116

Pertaining to newsletters, which of the following cannot be changed using the


Columns command dialog box?
As related to type size, how many points are there to the inch?
Assume you are working on a newsletter in which the masthead extends across
the top of the entire first page. The rest of the newsletter has two columns. What is
the minimum number of sections in the newsletter?

WO117

Which of the following is NOT correct with respect to page, column, and section
breaks?

Press Ctrl+Enter
to create a page
break.

WO118

Which of the following would be the most appropriate font for a newsletter
headline?

A serif font at 10
points

WO119

Which of the following is the default Word column width?

2 inches

WO114
WO115

The width of
each column
6

One

op2
Office 2000

ans
A

inbox assistant

op4
Back Office
none of the
drag & drop
above
none of the
select
above
ctr+end and
none of the
ctr+home
above
web layout, page none of the
layout
above
click from start
program,
MSWord from
none of the
the task menu
above
document
none of the
assistant
above

Tool Tip

Icon Tip

marginal stop
page up keys
only

ruler
home and end
keys only

Document Tip
none of the
above
up and down
arrow

center

decimal

model

dialogs/alerts

rotation
none of the
above
none of the
above
pictures

A
A

double click
cut
shift+left and
shift+right
normal layout,
web layout

templates

op3
Office 97

decrease indent both A and B


control tool box design wizard

A
A
B
A

A
A

B
D

B
C
A

control box
2
printer setup
from the file
menu

database
0

forms
11

print preview
from the file

shading

style box

none of the
above
none of the
above

Del
Del

ctrl+f
ctrl+f

ctrl+m
ctrl+m

CTRL+O

CTRL+SHIFT+S CTRL+SHIFT+P A

ctrl+o
ONLINE
LAYOUT

ctrl+shift+s

ctrl+2
ctrl+c or ins

ctrl+end
ctrl+x or ins

ctrl+5

ctrl+1

PAGELAYOUT

A
A
A
D

ctrl+shift+p
ONLINE
DOCUMENT

ctrl+home
ctrl+v or Del
none of the
above

B
A

Frame

AutoShape

Page Layout
Auto Shapes

Border
none of the
above
File

Screen Tips
WordArt
Shading

WordArt

Bullets

remove all
arrow bullet
dialog box

remove
circle bullet
dialog box

clear all

WordArt

AutoShapes

A
A

none dialog box A

files
default
new document document
document1
none of t he
hyphenation
mail merge
above
tools+spelling
thesaurus menu shift+f8
menu
last cell of the t
second
first row
able
none of the
end
enter
above
convert data to table auto format none of the
table
option
above
rows &
none of the
records
above
columns
none of the
AutoFormat
style gallery
above
none of the
Data Source
above
Macro
vj++
visual FoxPro
visual basic

shift+f7
online layout
view

alt+f5
none of the
above

hotmail
vb script

A
A

alt+f8

browser
micro soft
outlook express outlook
xml
sgml
intranet
the field
separators in a
header source
and the data
source can not
be set as
paragraph

arpanet
field names in
the header
source must
match any
merge fields
you've inserted
in the main
document

B
A
A
A
A
A
B
A
B
B

LAN
A
the number of
fields names in
the header
source must be
the same as the
number of data
fields in the data
source
B

auto format
option applies to
the entire table
and not only to
the selected
rows or columns
of a table
decimal
In order to type a
header from the
third page of the
document a
section break is
inserted after t
he third page
false

by default cell
height and
weight option
applies to all the
rows and
columns of a
table
justified
If a header is
inserted in the
second section
then the same
header is
applicable to the
first section

delete cells
option allows to
delete the entire
row or a column
or shift cells up
or shifts cells left C
top
A
A section is a
portion of a
document in
which certain
page formatting
option can be set D
A

false
false
click -n-type
false

prohibits the
user from
renaming an
auto correct
entry
password
protected
document can
be opened
without
password as
read only
justified
a document file
can be inserted
in the current
document at
specified
position
false
false

A
A
Double Click

none of the
above

automatically
corrects the
grammatically
errors

with t he caps
lock key
accidentally
turned on
reverses the
case of the
letters that were
capitalized
incorrectly and
then turns off the
caps lock
B

password are
not case
sensitive
hanging

password can be
upto 15
characters long B
top
A

a multiple
documents files
can be inserted
in the single
document

an .xls data can


not be inserted
at specified
position in the
current
document

B
A

B
A
A

false
false

Hyperlink
Child Document Document
Page Layout

Outline Layout

Type Over mode Remove

none of the
above
none of the
above
none of the
above

A
B
A

press the escape


press the tab key key
just keep typing D
rows and
lines and spaces height and width columns
D
backspace/
delete
shift
B
enter/return
spell checker

send pictures to
a friend
From ___ To
____
Copy
tabbing
graphing
Creating and
editing
documents
annotation
Creating and
editing
documents

thesaurus

outliner

send private
messages to a
friend

send a package
D
to a friend

Page setup
Retrieve
spacing
word
processing

Print preview
Save
sorting

B
C
B

spreadsheet

Storing
information

None of the
above

clip art

clipboard

Storing
information

Making
Calculations

Spelling,
grammar and
autocorrect

Cut, copy,
paste and clear
Text which
Numbers which appear at the
appear on every top of every
page
page
Keyboard,
Monitor,
Mouse, monitor keyboard and
mouse
and printer

Font, Paragraph,
Bullet and
Numbering
C

Designated area
on the document C

None of the
above

clip-art file
Spelling,
grammar and
autocorrect

microphone

10 point

15 point

2 inches.

3 inches.

You have not


inserted a
column section
break..

You have not


specified
continuous
section breaks.

digital scanner D

Cut, copy,
None of the
paste and clear above

to move a
section of text
from the original
to store a file on location to
a diskette
another location

25 point
B
impossible to
determine.
B
Word cannot
display columns
during editing;
you will see them
only when you
print the
document.
A
to leave an
original section
of text in place
while pasting a
copy elsewhere D

Spell Checker

A set of different
graphics
Grammar
Checker

None of the
above
Find and
Replace

Replace

Select all

AutoCorrect

Cut, then paste

Delete, then
paste

Insert, then
paste

Mainly text

To give the
original author a
chance to reject
suggested
changes from
the person who
entered the
revisions

To complicate
the revision
process and to
force the author
to spend more
time making
corrections
A vertical line
outside the left
margin signifies
A red underline a change has
appears beneath been made at
text that is to be that point in the
added.
document.

B
B

To allow multiple
people to work
on one
document in
collaboration
with one another C

Comments are
enclosed in a
text box at the
right of the
document.

Through the
Tools menu by
choosing Track
Changes
command

The Versions
command will
allow you to save
only one version
of a document,
including any
changes that
may have been
made to that
document.
The latest
version is
opened
automatically.

Both through the


Through tools on Tools menu and
the Reviewing
the Reviewing
toolbar
toolbar
D

The Versions
command will
allow you to save
only one version
of a document
without any
changes that
were just made
to the document.
The first and
second versions
are opened
automatically.

The Versions
command will
allow you to save
only two versions
of a document:
one version of
the original and
one version of
any changes
made to the
document.
A
The previous
version is
opened
automatically.
B

Grammar check Spell check


Word will show
The most recent the name of the
version will
person who
appear at the
saved each
bottom of the list. version.

Thesaurus

Tools
Toggle button

Insert
C
A drop-down list B

Forms
Text fields

Comments can
be edited or
deleted by right
clicking the
Comments
highlighted
cannot be
deleted.
text.
Text which
Numbers which appear at the
appear on every top of every
page
page

Press Return.
graphics.
bibliography.
Paste button

Word is not able


to tell the most
recent version of
a document.
A

Comments can
be edited or
deleted by left
clicking the
highlighted text.

None of the
above

Insert page
Copy and paste. break.
numbers.
forms.

D
C

find/search.
macro.
A
Format Painter This action is not
possible.
C
button

Bug Squashing
Tools
a section of text
where the first
letter of each
sentence is
lowercase and
the rest are
uppercase.
typing it all in
capital letters.

Error Injecting
Format
the guidelines
used to establish
where different
elements of the
newsletter will
go.
underlining the
text of the pull
quote.

A dropped cap is
a word that
A pull quote is a starts with a
quotation taken lowercase letter
from (pulled)
when it should
from another
have a capital
document.
letter.
The height of
each column
10

The number of
columns
12

D
C

an enlarged
capital letter at
the beginning of
a paragraph.
A
changing the
color.

A grid is a set of
horizontal and
vertical lines that
determine the
placement of
elements in a
newsletter or
other document. D
The tab spacing
within each
D
column
D
72

Four
Press
Press Enter to Shift+Enter to
create a section force a line
break.
break.
A sans serif
A sans serif font A serif font at 20 font at 45
at 10 points
points
points
It depends on
the left and
right margins,
and how many
columns are
3 inches
4 inches
specified.
Two
Press
Ctrl+Shift+Enter
to create a
column break.

Three

Debugging
Edit

q_id

DB62

q_desc
op1
In MS-Access, while using form design view, for creating a command button for adding
a new record, we should select the _______ category from the command button
Record
wizard
Navigation

DB63

_______ form displays fields in a single horizontal row

DB64
DB65

The process of arranging the data in a meaningful order is known as ___________


______ are used to select only some particular records from the table or any other
database objects

DB66
DB67
DB68

In MS-Access, user may specify criteria for filter in form view using _________
___wildcard character represents any single character
Records cannot be sorted by a primary key

DB69
DB70

A control without a data source is known as ___________


Set of related option buttons, check boxes and toggle buttons is known as
_____________

filter
filter by
form
*
true
bound
control
button
group

DB71

The collection of related data and objects is called a ____________

database

DB72

Which of the following is control types ____________

DB73

In MS-Access, the function that gives the current date is _____________

bound
CURRDA
TE()

DB74

_____is a control that lists set of data

DB75

______is a form that summarize large amount of data

text box
pivot
table

DB76

______allows to create a filter by typing the value in a data sheet

data sheet
filter

DB77

Wizards for toolbox controls are called a __________


The wild card representation for any 5 letter word that starts with ram is
________________
Look up fields slow up data entry
____is an access object that displays un-editable data

DB78
DB79
DB80
DB81
DB82
DB83
DB84
DB85
DB86
DB87

columnar
form
filtering

button
wizard
ram*
true
report
autorepor
t
chart
true
true
60,000
true
true

DB88

_____option from the new object toolbar gives the easiest way of generating a report
______ represents data in a pictorial format
Changes of one table can be carried over to another related table
Hyperlinks are used to jump to any kind of information or data from a file
The memo field can have text upto_____ characters in length
In MS-Access, columnar layout can be used to view multiple records in a form
In MS-Access, alter command may be used in adding a primary key to a table
Update query is used to add records from one or more tables to the end of an existing
table
true

DB89

In ms-access, datasheet view is available in ___________

table

DB90
DB91
DB92

______are used to jump to any kind of information from a datasheet or a form


Home page will always be present as a first page of an application
Make table queries create a new table from the records of another table

table
true
true

DB93

In ms-access, to protect a database file from illegal access, we may set database
password. The option of setting database password is available in _______ menu

Insert

DB94
DB95

Foreign key is a field that uniquely identifies each record and accept no null values
Data definition queries are used to create or change database objects

DB96
DB97
DB98
DB99

The attributes of a composite key are known as ________


OLE object is a data type in access
Data displayed in forms cannot be edited
A sub form is used to display one to many relationship between tables

DB100
DB101

true
true

DB102
DB103
DB104
DB105
DB106

We can switch from datasheet view to form view by selecting view -> form view option
In MS-Access long integer is a datatype
In MS-Access, while designing a table for a particular field, the Required parameter is
set to yes. This validates the field as _______
Sorting is applied to select only some particular records
Filter by form can be created from a forms shortcut menu
Advanced filter uses a filter similar to the query design window to create a filter
? Wildcard character represents any number of characters

DB107
DB108
DB109
DB110

_________ of the following is/are a type of chart


A bound control is tied to a underlying query or table
A calculated control uses expression as a source of data
Text boxes cannot be bound controls

DB111
DB112
DB113
DB114
DB115
DB116
DB117

The default query invoked by ms-access is


A control can be bind to a record using row source property
List box is a control that offers a list of choices
If a table is joined to itself it is called a ________________
A picture box combines the activities of both a text box or a list box
Line is a tool box control
Text boxes can be part of a option group

DB118
DB119
DB120
DB121
DB122

_____ chart exists as a separate object


Filtering data is a way of arranging data in a meaning full order
Wild card characters are used for sorting records
Pivot tables are used to navigate to the other tables in a database
Reports are used to represent un-editable data

DB123
DB124
DB125

In MS -Access, the records in a table are sorted based on _________


Relationship is an association between _________
Summary options dialog box is used to summarize data
______ queries can be used to delete a group of records that meet some specific
records
Charts can convert numerical data in a easily understandable format
Embedded charts exist separately

pie
true
true
true
update
query
true
true
inner join
true
true
true
freestandi
ng
true
true
true
true
the first
field of the
table
forms
true

DB126
DB127
DB128

true
true
alternate
keys
true
true
true

null
true
true
true
true

delete
true
true

DB129

The chart which cannot exists as a separate entity are _______________

freestandi
ng

DB130
DB131
DB132
DB133
DB134
DB135

From ms - access, if we want to view the records stored in a table in ms - excel


worksheet, we need to
Page header is present at the beginning of each record
Detail section has a header and footer
A macro is performed only when the user initiates an event
The macro is selected from the action field of a macro sheet
A macro can be made to execute before the starting of a database

use
hyperlink
true
true
true
true
true

DB1
DB2

_________ data type is generally used for fields assigned as primary keys in a table
MS access objects can be published in the web

integer
true

DB3
DB4

In code-builder, got_focuse, click,dbl_click,enter are examples of _______


_______can be used to automate certain actions in response to events

actions
report

DB5

In the macro sheet the macro is selected in the _____field

macro

DB6

To build complex expressions_____is used

calculator

DB7

The three list boxes present at the bottom of the expression builder are called_____

action list

DB8

________option is selected from the view menu to create macros with conditions

conditions

DB9
DB10
DB11

_______report can be created with minimum user input


_______layout of a form displays one record at a time
The table or query name on which we are going to build our report is selected from the
____ dialogue box

DB12
DB13

______and_____are the two types of auto reports available


There are no wizards for creating a database in access

DB14

______option from the insert menu option is chosen to add an embedded chart

DB15

In ms-access, while using SQL, references constraint is used for creating _______

DB16

_______is used to create a mailing label

DB17

______header is present at the beginning of the report

DB18

______is present at the bottom of each page in a report

tabular
tabular
create
report
columnar
and
tabular
true
create
fields
primary
key
label
wizard
start
header
report
footer

DB19

for
ordering
records

DB21

In SQL, having clause is used for _________


______field is added to the macro sheet when we select grouping option from the view
menu
condition
VB
______can be used to create toolbars
Modules

DB22

_______query is used to add records from one or more tables into an existing table

add

DB23
DB24

_______window is used to write VB code in access application


Values for other tables, queries are maintained in look up fields data type

report
true

DB25

Visual Basic language is a _____ tool

RAD

DB26

SysCmd

DB27

______ function is used to display a message box


Other ms-office applications can be accessed from ms-access using a concept called
________

DB28

OLE stands for_____

DB20

DB29

OLE
object
linking
and
embeddin
g
OLE
object

DB30
DB31

The application that supplies data in OLE is called an _________


If any change made on the object from the client side is reflected on the server then
the object is said to be _____
_______is the file format that works on internet

DB32

______ is used to convert any ms-access object into html format

form
wizard

DB33

_______ option in publish to web wizard produces a page that is static in nature

static file

DB34
DB35

_______query is used to create or change database objects in a current database


Currency fields express the amount in _________

DB36

_______is selected from the toolbar to add an OLE object


To display an OLE object in the form of an icon ____ option is selected from insert
object dialogue box

append
dollars
unbound
object
display as
icon
create
html

DB37
DB38
DB39
DB40
DB41

_______option from the file menu is selected to run 'publish to the web wizard'
_____page in an web application is used to navigate to the rest of the pages in the
application
______ is fired when an event is triggered is the concept based on a Visual Basic
language
Ms access is a ___________

linked
exe

startup
bullet
DBMS

data
group

DB42

A collection of data stored in different objects is known as a _________

DB43
DB44

A blank database can be created using __________


Text type data can be of _____ characters in ACCESS

DB45
DB46

______is a datatype that assigns values automatically


Tables cannot be imported from other databases

new
dialog box
255
automatic
number
true

DB47

If two tables having same values for the fields are joined it is called an ______

inner join

DB48

Duplication of records in a field won't be allowed if the fields are declared a________

DB49

Changes from a master table can be reflected on to the child table by selecting
_____option

DB50

To see more than one record at a time in a form we use _______

DB51
DB52

In SQL, delete command is used to remove _________


In MS-Access, filter excluding selection will display only those record(s) which meet the
criteria.
true

DB53

Properties of the fields are managed by _____ in Dynaset

property
field

DB54

______queries allows us to view data in row by column manner

crosstab
queries

DB55

The type of queries that can update or delete record(s) in a table(s) are called
__________

action
queries

DB56
DB57

Joining tables without any matching values in the fields is called ____________
Primary key uniquely identifies each record

inner join
true

DB58
DB59

Which of the following dialog box is/are used in the creation of form ________
_______ query wizards are used to generate summary calculations for a table

DB60

Properties of a form can be changed by selecting ______from view menu options

DB61

Forms that are included in other forms are called ______________


In MS-Access. While appending records, the source and the target table must have
similar structure and fields
We can add our own functions to the expression elements list box of the expression
builder

DB136
DB137

primary
key
cascade
delete
related
records
columnar
table or
tables

new form
dialog box
summary
change
properties
included
form
true
true

DB138
DB139
DB140
DB141
DB142
DB143
DB144
DB145
DB146
DB147

DB148

_______is the wildcard character which represents the presence of any number of
characters
Macros can be used to add a menu to a database object
_____ header is a unique feature of reports
Chart can either be a form or a report
Group header will be present at the design view of a report even if the report is not
grouped
We can change from the design view to the form view without being prompted for
saving the changes made
Charts can be produced without the wizard
Macros can be used to create user defined error messages
Between and Not Between is ______ type of operators
The default data type of VB is integer

&
true
page
true
true
true
true
true
relational
true

action
language

DB149
DB150
DB151

Visual Basic is based on __________


_______is the name of the database object that displays data and can be used to edit
data
In access OLE objects cannot be linked
_____ section is present for each record in the report

DB152
DB153
DB154

A ________ sheet lists all the properties that pertain to the form or the controls
Textboxes can also be an example of unbound control
In MS-Access, we may design command buttons for navigating records

data
true
true

DB155
DB156

_______are forms that are included in other forms


_______ are used to represent our data in graphical format

sub forms
graphs

DB157

A field with a _______ uniquely identifies each record

number

DB158

Large amount of data can be summarized using ______ tables

pivot

DB159

_______ are employed to select only some particular records from a database object

filters

DB160

______ control need not have a data source

form

DB161
DB162

______ control combines the functionality of both a text box and a drop down list
MS access is a DBMS

DB163

A form can be bind to a record source using _____ property of the form

list box
true
form
name

DB164

______ forms displays field in single row

tabular
form

DB165

______ forms are usually used for tables with one to many relationship

sub forms

DB166

_______ control uses an expression as a source of control

calculated

DB167

_______ control is tied to field

calculated

DB168

_______is the form that can be created with minimum input from the user

sub form

report
true
group

DB169

______option from the tool menu is selected for setting relationships between tables

set
relation

DB170

______,______and_____are the buttons belonging to the options group

DB171

_________allows us to create a filter from a field short cut menu

option,
toggle and
command
buttons
filter by
form

DB172
DB173

________is a database object which displays data but cannot be used to edit data
What term applies to a collection of related records in a database?

form
clipboard

DB174

All of the following terms are related to computerized databases except which one?

search

What is a database?

A way to
analyse
and
manipulat
e
numerical
informatio
n

DB175

DB176

What does a record contain?

DB177

An RDBMS is a

Informatio
n about
certain
programs
remote
DBMS

DB178

Data Warehousing refers to

DB179

Unauthorised alteration of on-line records can be prevented by employing

storing
data
offline at a
separate
site
Key
verificatio
n

What is a database?

A way to
analyse
and
manipulat
e
numerical
informatio
n

DB180

DB181

DB182

DB183

DB184

What does a record contain?

Informatio
n about
certain
programs

What is a report?

Reports
allow
users to
extract
informatio
n as hard
copy
(printed
output)

What is the best way to analyse and change data

Extracting
and
analysing
data

What are some popular office orientated software applications?

Compilers
,
interpreter
s, editors

DB185

Which of the following constraints can be used to enforce the uniqueness of rows in a
table?

DB186

Which of the following commands is used to change the structure of table?

DB187

An RDBMS is a

DB188

DB189

Data Warehousing refers to


You are creating a client application that calls ActiveX DLLs. Which of the following
properties of the Err object provides the name of a component that sends an error
back to the client application?

DEFAULT
and NOT
NULL
constraint
s
CHANGE
TABLE
remote
DBMS
storing
data
offline at a
separate
site

Number

DB194

using a
This database holds personal information. The user can help to keep it confidential by password
the
If the database holds customer names and addresses, personalised letters can be
product
created automatically using
code
Application software suited to storing the survey information obtained in the table
A
would be
database
bookmark
The characters * and ? are sometimes used in search criteria as
s
Auto
Which of the following field types will generate the primary key automatically?
Primary

DB195

Referential integrity ensures that the:

records in
a dynaset
are
consistent
with the
underlying
tables.

DB196

Tables are related to one another through a:

DB197

A foreign key is:

DB198

You are creating a banking database to track customer loans. The bank will, of course,
have many customers, each of whom may take out one or more loans, while each loan One-tomay be associated with only one customer (there are no joint accounts). What is the re one

DB199

In a one-to-many relationship between Companies and Employees, which field is found EmployeeI
in both tables?
D

DB200

Which of the following ensures that records in related tables are consistent with one
another? For example, it ensures that you cannot add a record with an invalid foreign
key.

DB190

DB191
DB192
DB193

foreign
key.
the
primary
key of
both
related
tables.

The Tools
menu,
Relationsh
ip window

How would you delete a relationship between tables in the Relationships window?

Double
click the
Relationsh
ip line

In a Customers tables, what does a plus sign next to the CustomerID field mean?

That there
are
several
customers
associate
d with that
ID

DB203

What is required of the fields that join two tables?

They must
both be
numbers

DB204

Nothing,
Access
ignores
Assume a one-to-many relationship between the Customers table and the Loans table, the
with referential integrity in effect. What happens when you attempt to delete a
attempted
customer ID from the Customer table that still has entries in the Loans table?
command.

DB205

The
Which of the following is true when viewing a main form and its associated subform in subform is
the Form Design view?
not visible.

DB201

DB202

DB207

Which of the following relationships does not belong in a database based on a


professional sports league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the many
side of a one-to-many relationship?

DB208

You have created a one-to-many relationship with referential integrity between a


Customers table and a Loans table. From which table can you delete a record?

DB206

A one-tomany
relationshi
p between
teams and
players
#

Either
table at
any time

DB209

The correct order of the arguments for the MsgBox statement is:

DB210

The first statement in a procedure named CreateList is:

DB211

Which of the following is TRUE related to form fields?

prompt,
title bar
text, icon.
Dim
CreateList
.
A check
box
enables
the form
user to
choose
from one
of several
existing
entries.

A text field:

must be
set for
one word.

DB213

The purpose of a database is to:

help
people
keep track
of things.

DB214

A database stores:

data.

DB212

DB215

A database records:

facts.

A sales contact manager used by a salesperson is an example of _______________

singleuser
database
applicatio
n

A Customer Resource Management (CRM) system is an example of_________

singleuser
database
applicatio
n

DB218

The industry standard supported by all major DBMSs that allows tables to be joined
together is called __________.

Sequential
Query
Language
(SQL)

DB219

A program whose job is to create, process and administer databases is called the
_____

Database
Modeling
System

DB220

Microsoft Access may use which of the following DBMS engines?

Jet

DB221

DB223

Which of the following are basic components of an enterprise-class database system? The user
the
database
applicatio
n(s)
interact(s)
with the
In an enterprise-class database system ________ .
DBMS
creates
In an enterprise-class database system, the database application ___ .
queries

DB224

In an enterprise-class database system, reports are created by


____________________ .

DB216

DB217

DB222

the user

DB225

A database is considered "self-describing" because _______ .

DB226

In an enterprise-class database system, the database _________ .

all the
users'
data is in
one place
holds user
data

DB227

A database may contain _________________________ .

tables

DB228

A database designed using spreadsheets from the Sales department is a database


being designed _________________________ .

DB229

from
existing
data
from
existing
nonA database designed to implement requirements for a reporting application needed by database
the Sales department is a database being designed _______ .
data

DB230

A database designed to combine two databases used by the Sales department is a


database being designed _________________________ .

from
existing
data

DB231

Database professionals use ________________ as specific data sources for studies


and analyses.

data
marts

DB232

Database professionals use a set of principles called ________________ to guide and data
assess database design.
marts

DB233

A very popular development technique used by database professionals for database


design is known as _______________________ .

data
marts

DB234

A very popular development technique used by database professionals to adopt a


database design to new or changing requirement is known as _____ .

data
marts

DB235

The predecessor(s) of database processing was (were) __________ .

file
managers

In a relation __________________________ .

entities in
a column
vary as to
kind

DB236

DB237

An attribute is also known as a(n)

DB238

A combination of one or more columns used to identify particular rows in a is___ .


A combination of two or more columns used to identify particular rows in a relation
is________ .

DB239
DB240

table
record
record

DB243

record
composite
key
Insertion
anomaly
assess
the
existing
tables'
structure
When you are given a set of tables and asked to create a database to store their data, and
the first step is to ____ .
content

DB244

are
supplied
by several
wellestablishe
d
manufactu
rers

DB241
DB242

DB245

A determinant that determines all the other columns in a relation is______ .


When designing a database, one of the candidate keys in a relation is selected as the
_________ .
Normalization is a process used to deal with which of the following modification
anomalies?

Modern microcomputer personal DBMS products______.

They use
sophistica
ted
mathemati
cal
technique
s.

DB246

Which of the following are true about data mining applications?


We have obtained access to the company's operational data. We examine 50 records
for customers with phone numbers that should use the current area code of 345. Of
these 50 records, we find 10 that still use an older area code of 567. This is an
example
dirty data

DB247

We have obtained access to the company's operational data. We have been asked to
produce a report with an item by item analysis of sales, but the only sales figure
available is the total sale value for each order. This is example of_____
dirty data

DB248
DB249

A data warehouse database differs from an operational database because:


Which of the following objects is used to display a menu?

DB250

Which of the following objects are NOT found in an Access application?

data
warehous
e data are
not stored
in tables.
Form
Forms
and
reports

You are developing an Access application that you expect to upgrade periodically.
Which of the following statements is TRUE?

It will be
easier for
the user
to
upgrade it
if the
objects
and tables
are in one
database.

DB251

DB252
DB253

Which of the following statements regarding Access applications is NOT true?


Which of the following brings a copy of the table into the current database and does
not maintain a tie to the original table?

The Link
Tables
command
can be
used to
associate
the tables
in one
database
with the
objects in
another
database.
Import

DB254

What makes a database an application?

It contains
more than
one table

DB255

What is the Access tool that is used to create the user interface?

Menu
Wizard

The purpose of a data warehouse is to:

create
backups
for
mission
critical
corporate
data.

DB256

op2
op3
op4
ans
Record
Form
Operatio Operation None of
s
the above B
ns
one to
tabular
hierarchic many
al form
form
B
form
ordering

sorting

sorts
filter by
selection
$
false
unbound
control
option
group

pipes
filter by
menu
@

form
unbound

control
wizard
ram??
false
form
report
label
false
false
255
false
false

filter by
form
option
control
wizard
two of the
above
table
module
bitmap

25,000

false
query

gateways A
None of
the above A
D
?
B
data less data
control
control
B
controls
record
group
group
B
none of
collection the above A
all of the
controlled above
C

TODAY() DATE()
combo
box
list box
columnar tabular
form
form
filter by
input

querying

form

DAY()

static text B
main form A
none of
the above C
tool
wizard
C
none of
the above B
B
ledger
A
none of
the above A
report
A
A
A
D
64,000
B
A
B
all of the
D
above

form
false
false

Records

report

Tools

hyperlink D
A
A
none of
the above C

false
false
composite candidate primary
keys
key
keys
false
false
false

B
A

false
false

A
B

not null
false
false
false
false
bar
false
false
false
select
query
false
false
outer join
false
false
false
embedde
d
false
false
false
false
the last
field of the
table
reports
false
insert
false
false

zero

both 1
and 2

delete
query

self join

stand
alone

C
A
B
A

none of
the above B
B
B
A
B
none of
the above C
A
A
B
append
query
B
B
A
table join C
B
A
B
sub chart D
B
B
B
A

primary none of
key field the above C
attributes entities
D
A
append

add

A
A
B

embedde stand
alone
d
use
datasheet
use import in forms
false
false
false
false
false
primary
number
number
false
procedure
events
s
form
chart
expressio
n
elements comments
code
builder

macro list
action
columnar
columnar
link report

sub chart B
use
export

auto
number

D
B
B
B
A
A
D
A

none of
the above B
macros
D

action
D
expressio
expressio n
n builder elements C
expressio
n
elements none of
list box
the above C
none of
insert
the above A
auto
embedde
report
d
C
datasheet justified
B
embedde
d report
new report D

stable and dynamic none of


unstable and static the above
false
insert
add chart chart
chart
alternate foreign
none of
key
key
the above
chart
mail
none of
wizard
wizard
the above
group
page
report
header
header
header
page
group
none of
footer
footer
the above

A
B
C
C
A
D
B

group

for
specifying
conditions
with group
by clause
macro
names

none of
the above C
none of
the above C

reports

forms

macros

append
macro
sheet
false

insert

for
updating
records

RAP
MsgBox
DDE

delete
B
none of
module
the above C
A
none of
RAID
the above A
none of
message the above B
none of
CME
the above A

on line
on line
execution editing

none of
the above A
OLE
communic
ator
C

OLE
OLE client server
embedde
d
connected edited
DLL
BMP
html
publish to
report
query
web
wizard
wizard
wizard
dynamic none of
static html file
the above
data
add
insert
definition
rupees
pesos
yen
bound
command
object
button
list box
create
display
link
icon
save as
none of
new
html
the above
none of
home
end
the above
none of
command procedure the above
RDBMS front end language

A
D

D
B
D
A
B
A
C
B
C
A

data
data
collection database storage

new blank
database
dialog box
64000
AutoNum
ber
false

new
database database
dialog box dialog box A
235
63500
A
automatic
number
field
B
B
explicit
none of
outer join join
the above A
no
candidate duplicate
not null
key
key
A
cascade cascade
change
update
change all
related
related
related
records
fields
records
C
both a and none of
tabular
b
the above B
query or record or none of
queries
records
the above C
false
field
property

B
Dynaset
field
properties properties B

row/colum select
n queries queries
change/de
row/colum lete
n queries queries
no match
self join
join
false
form
create
dialog box
sum

form
wizard
dialog
append
form
properties properties
sub form

update
queries

update
queries

outer join D
A

both 1 and
3
D
simple
D
new
properties B

new form child form B

false

false

#
false
detail
false

group

topic

D
A
C
A

false

false
false
false
list
false

A
B
A
C
B

range

logical

event structured procedura


query
l based
none of
language language the above C
form
false
record
property
false
false
child
forms
chart
primary
key

query

index
form

queries

sorts

bound
combo
box
false

unbound
button
record
source

data sheet
chart form form
tabular
columnar
form
form
bound
unbound

B
B
D

session
detail
both a and none of
b
the above B
A
A
none of
inner form the above A
labels
report
B

create

control

table

unbound

bound
tabular
auto form form

identifier B
none of
the above A
forms
A
none of
the above C
option
button
B
A
none of
the above C
none of
the above A
none of
the above A
none of
the above A
static
C
columnar
form
B

connect

relationshi none of
ps
the above C

option
button,
command list, check toggle
button,
and
button and
check and combo
check
list boxes boxes
boxes
D
filter by
filter by
filter by
report
record
input
D
report
file

macro
field
field
sort
names
An
organised
way of
A tool to storing
produce informatio
high
n about a
quality
set of
document similar
s
things
It contains
all the
data about
one
specific
item
relative
DBMS

A
document
which
contains
text
Relational
DBMS

table
layout
record
grab

B
B
D

A way of
maintainin
g a log
C

A
collection
of files
B
Reliable
DBMS
C

uses tape
as
opposed
to disk
C
Database
Computer access
matching controls
D
An
organised
way of
storing
A tool to informatio
produce n about a
high
set of
qualitydoc similar
None of
uments
things
the above C
backing
up data
regularly
Computer
sequence
checks

is related
to data
mining

It contains
all the
data about
one
specific
item
Reports
provide a
very
flexible
way of
creating
and
editing
document
s

A
document
which
contains None of
text
the above B
A tool
which
allows text
and
graphics
to be
placed in
document None of
s
the above A

Spreadsh
eets make
data easy Using
to analyse queries
Word
processor
s,
Network spreadshe
software, ets,
backup
databases
systems , DTP

None of
the above C

None of
the above C

FOREIGN
KEY
constraint
s
MODIFY
TABLE
relative
DBMS

PRIMARY
KEY and
UNIQUE
constraint
s
ALTER
TABLE
Relational
DBMS

backing
up data
regularly

uses tape
is related as
to data
opposed
mining
to disk
C

IDENTITY
columns C
UPDATE
TABLE
C
Reliable
DBMS
C

Descriptio Compone
n
nt
Source

keeping
the
keeping a original
backup
paper
copy
copy
the
primary
mail
key
merge
Graphics

browser

saving the
file with
different
filenames A

e-mail

e-mail

operators wildcards engines


AutoNum
Auto ID
ber
Auto Key

related
tables in a
database
are
consistent
with one
another.

forms in a
database
are
consistent
with the
underlying
tables or
queries.

C
C

reports
are
consistent
with the
underlying
tables or
queries.
B

query and
main form its
report and
and a
associate its related
subform. d dynaset. query.
A
not a
the
primary
primary
a field
key of
key of the from an
either
related
unrelated related
table.
table.
table.
B

One-tomany

Many-tomany

Many-toone

CompanyI Employee Company


D
LastName Address A

Referentia The join


l integrity line

The oneto-many
relationshi
p
B

Right-click
the
Relationsh
ip line,
then
select
Delete
from the
shortcut
menu

Select
Undo in
the
Relationsh
ips pulldown
menu

Click the
Delete
Relationsh
ips button
on the
toolbar
B

That
records
That
That there can be
some of are
added by
the data is records in clicking on
not
a related the plus
viewable table
sign
C
They
cannot be They must
They
AutoNum be the
cannot be ber data same data
text fields types
type
D
The
customer
s ID is
deleted
from the
Customer
s table,
The
and all the
customer related
s ID is
loans are
deleted
deleted
from the from the
Customer Loans
s table.
table.

An error
message
is
displayed. D

The
subform is
an object
on the
The
form and
subform is The
can be
displayed subform is moved or
in
displayed sized like
Datasheet in Form
any other
view.
view.
object.
D

A one-tomany
relationshi
p between
teams and
coaches

A one-tomany
relationshi
p between
coaches
and teams

A many-tomany
relationshi
p between
players
and teams C

Neither
table

The
Customer
s table
only when
there are
Loan
records
associate
d with that
customer

The
Loans
table at
any time
title bar
text,
prompt,
icon.

prompt,
title bar
icon, title
text, icon,
bar text.
prompt.
B
Sub
CreateList CreateList
.
.
Sub.
B
A text field
enables
the form
user to
choose
from one
of several
existing
entries.
must be
set for
multiple
words.

A dropdown list
enables
the user
to choose
from one
of several
existing
entries.

A dropdown list
enables
the user
to enter
text.

does not must be


have to be set for two
set.
words.
C
maintain
data on
create
different
tables of things in
store data rows and different
in tables. columns. tables.
A
relationshi
all of the
ps.
metadata. above
D

figures.

multiuser
database
applicatio
n

multiuser
database
applicatio
n
Structured
Question
Language
(SQL)
Database
Managem
ent
System
SQL
Server

informatio
n.
ecommerc
e
database
applicatio
n
ecommerc
e
database
applicatio
n
Structured
Query
Language
(SQL)
Data
Business
Model
System

a and b

a or b

None of
above

Relational
Question
Language
(RQL)
C
Relational
Model
Manager B

Oracle
a and b
The
database
The
managem
database ent
applicatio system
All of the
n
(DBMS)
above.

the DBMS
accesses
the
database
data
creates
form

None of
above
creates
reports
the
database
the
managem
database ent
applicatio system
n
(DBMS)

All of
above

b and c

the
database B

it reduces
data
duplicatio
n
holds
metadata

metadata
as a new
systems
developm
ent project
as a new
systems
developm
ent project
as a new
systems
developm
ent project

it contains
a
descriptio
n of its
own
structure
holds
indexes
stored
procedure
s
as a
redesign
of an
existing
database
as a
redesign
of an
existing
database
as a
redesign
of an
existing
database

normalizat data
ion
models

normalizat data
ion
models

All of the
above.
All of the
above.

C
D

All of the
above.

a and b

a and b

a and b
entityrelationshi
p data
modeling
entityrelationshi
p data
modeling
entityrelationshi
p data
modeling

normalizat data
ion
models
entityrelationshi
normalizat p data
data
ion
modeling migration
relational
hierarchic network
data
al models models
model
more than
the order the order one
of the
of the
column
columns rows is
can use
is
unimporta the same
important nt
name

relation

row

field

field

key
composite
key
foreign
key
foreign
key
Deletion
anomaly

tuple
foreign
key
candidate
key
surrogate
key
All of
above

field
field
primary
key
Update
anomaly

C
D
B
D

create
move the
design the one or
data into
database more new the new
structure tables
database A

were
essentially
killed off
by MS
Access
Their
report
delivery is
more
difficult
than
report
delivery
for
reporting
systems.

are not
have poor true
response DBMS
time
products

Nonintegr None of
ated data the above A

a "wrong
inconsiste nonintegra format"
nt data
ted data problem

a "wrong
inconsiste nonintegra format"
nt data
ted data problem

data
warehous
e
databases
do not
have
metadata.
Table

data
warehous
e data are
often
denormali
zed.
b and c
Report
Query

C
A

Queries
and tables Macros

Spreadsh
eets
D

It will be
easier for
the user
to
upgrade it
if the
objects
are in one
database
and the
tables in
another.
An
applicatio
n may
consist of
multiple
databases
, each
with
multiple
objects,
linked to
yet
another
database
containing
only
tables.

All objects
in an
applicatio
n,
including
the tables,
must
reside
within the
same
database.

Regardles
s of how
the
objects
and tables
are
stored,
the user
will have
to reenter
the data in
the tables
when the
applicatio
n is
upgraded. B
An
applicatio
n can be
created in
such a
way that it
objects
such as
forms and
reports
can be
changed
without
disturbing
the
existing
data.
C

Merge

Join

Link

It is
advisable
to put
each
object and
table into
a
separate
database.

It contains
a user
interface,
or
switchboa
rd
Interface
Build
Design
Menu
Wizard
put key
business
centralize informatio
the
n into the
managea hands or
bility of
more
data
decision
collection. makers.
It contains
tables,
reports,
queries,
and forms

It contains
macros
C
Switchboa
rd
Manager D

store all
corporate
transactio
n data in
one single
location. C

q_id
VB1

q_desc
Microsoft visual basic project file has _______ file extension.

VB2
VB3

In visual basic, _______ method is used to add an item in a combobox


In visual basic, _______ method is used to load picture during runtime in an image
control

VB4

In visual basic, to populate a drive list box with a directory list box __________
statement is used

VB5
VB6
VB7

VB8
VB9
VB10
VB11
VB12
VB13
VB14
VB15
VB16
VB17
VB18

In visual basic, to display a message in the run time _________ function is used
In visual basic, to populate a directory list box with a file list box ________ statement is
used
In visual basic, ________ is a property of a recordset object which counts the number of
rows in a recordsourse object
In visual basic, using a data control, a record can only be added from the last record.
Adding a new record is only possible using _______ method of a recordset object.
In visual basic, using a data control, a record is saved to a recordsource object using
_______ method of a recordset object.
In visual basic, using a data control, to navigate to the previous record ________
method of a recordset object is used.
In visual basic, when a record pointer reaches to the last record, _______ property of a
recordset object is automatically set to ______
In visual basic, the explorer view of a project is displayed in ___________
In visual basic, when a record pointer reaches to the first record, _______ property of a
recordset object is automatically set to ______
In visual basic, _______ is a method to convert a string into integer.
In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type
of shape should we get?
In visual basic, a timer event is only available in timer control.
In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any
object

VB19

In visual basic, _______ is a property of a textbox control to set a color of a text.


In visual basic, _______ property of a textbox control is set to _______ to underline a
text

VB20

In visual basic, _______ property of a textbox control is used to change the size of text.

VB21

In visual basic, the interval property of a timer control is given in ________

VB22

In visual basic, _______ property of listbox control counts the number of items in the list

VB23

In visual basic, the properties of various controls can be set using __________
In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a
messagebox function.
In visual basic, ________ is a function which displays a message and it also allows the
user to enter values in a form object

VB24
VB25

VB28
VB29
VB30

In visual basic, using a data control, ________ is a recordset type which allows to add a
new record and also to update existing record in a recordsourse object
In visual basic, while closing a form _______ event of a form object is triggered earlier to
terminate event.
In visual basic, to give a backcolor or to bring in a picture to a command button can only
be done if we set the style property to ______
In visual basic, a method RGB(255,0,0) will generate _______ color
In visual basic, a method RGB(255,255,255) will generate _______ color

VB31

In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible.

VB32

In visual basic, if a user uses a function key F4 _________ becomes visible.

VB33

In visual basic, when a textbox control receives the focus ________ event is triggered.

VB34
VB35

In visual basic, a form is a ________ object.


Microsoft visual basic is a Rapid Application Development tool.

VB36

In visual basic, when a form object appears on the screen _________ event is triggered.

VB37

In visual basic, to display text on a label object _________ property is used


In visual basic, _______ object is used to access the database and also to manage the
data in the database.
In visual basic, when a checkbox control is checked _______ property is automatically
assigned with 1.

VB26
VB27

VB38
VB39
VB40
VB41

In visual basic, _______ keyword is used to declare a variable


What is the extension of the Visual Basic project file that stores the design of a user
control.

VB42

Which event of a text box would you use for validating the data entered by the user?

VB43
VB44

Which of the following statements forces inline error handling?


The _______ method resets the contents of bound controls to their original values when
the user clicks on the cancel button.

VB45

To deactivate the Form UnLoad event, you make the following change in the function
definiton:

VB46

How many root nodes can a TreeView control have?

VB47

A project group is a Project which:

VB48

Procedures declared in a _____ are local whereas procedures declared in a ______ are
available to the whole application.

VB49
VB50

How can you keep the user from exiting a form by clicking the Close button?
The _______ property enables Visual Basic to draw complete images in memory before
displaying them on the Screen.

VB51

You want to display the code and the description of an error. What would be the correct
syntax?

VB52
VB53
VB54

What is the purpose of the Image List Control?


Which method would you use to get a free or unused File identifier while opening any
file:
Which property procedure is used to retrieve the value of a property?

VB55
VB56

Which of the following can be shown to the user using the Common Dialog control in
VB?
Which of the following are not properties of Command Button:

VB57

Which events enable you to determine which key was pressed by the user?

VB58

In order to access a file in Non-textual format, you have to open file in:

VB63

Visual Basic displays information depending upon the current value of two properties of
the form, called:
Which of the following procedure types will execute when you assign a value to a
property of an object?
In order to overlap the controls (say a command button) during design time, we use the
Send To Back or Bring To Front option from the Edit menu. To change it dynamically
(i.e.during program execution) we need to change:
Which property of the ProgressBar determines how much of the bar is filled?
The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual
Basic program.

VB64

The caption and the name properties of the command button:

VB65

You try to initialize a new Object variable with the following line but receive an error.
What could be the possible cause? Set MyVar = New Classname

VB66

Which of the following will perform a direct execution of a Command object?

VB59
VB60

VB61
VB62

VB67

The vb Critical symbol displays:

VB68

vbYesNo is an example of a(n):

VB69

VB70

The primary difference between the MsgBox statement and the InputBox function is the:
Which of the following is TRUE about a protected form (i.e., a form where the Protect
Form button on the Forms toolbar is toggled on and is assumed to remain in that
position)?

VB71

Which event is triggered when the user moves to another open form?

VB72

To deactivate the Form UnLoad event, you make the following change in the function
definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To
prevent the Form from closing, you will set the:

op1

op3

op2

op4
.frx
none of the
above
none of the
above

ans

.vbg

.vbp

.frm

add

additem

loaditem

load

loadpicture addpicture

Drive1.Drive=
Dir1.Path
messagebox(
)
Dir1.Path=Fil
e1.Path
openrecordse
t

Dir1.Path = File1.Path =
Drive1.Drive Dir1.Path
message()
Dir1.Path =
Drive1.Drive
opendatabas
e

msgbox()
File1.Path =
Dir1.Path

none of the
above
B
none of the
above
C
File1.pattern=
Dir1.path
C

recordcount

count

update

append

addnew

additem

append

update

additem

addnew

movenext

moveprevious

movefirst

movelast,false

toolbox

eof,true
project
explorer

bof,false
value()

movelast
movelast,tru
e
form layout
window
movefirst,tru
e
int()

movefirst,false
number()

bof,true
val()

D
D

circle
true

rectangle
false

square

oval

D
A

true

false

eof,false
properties
window

B
B
B

fontcolor

color
forecolor
fontunderlin
underline,true e,true
textunderline,true
textsize

none of the
above
none of the
above

C
B

size
foresize
oneone- millionth hundredth of one-thousandth of a
of a second a second
second

D
fontsize
one-ten
thousandth of
a second
C

count
form layout
window

recordcount itemcount
prperties
project explorer
window

listcount

D
B

title

prompt

vbmsgboxstyle

toolbox
none of the
above

msgbox()

textbox

label

inputbox()

opensnapsh
opendynaset ot
dbopensnapshot

dbopendyna
D
set

load

activate

unload

initialze

standard
blue
red

opaque
red
green

transparent
green
blue

D
B
D

properties
window

form layout
window

toolbox

properties
window

form layout
window

toolbox

graphical
black
white
project
explorer
window
project
explorer
window

change

lostfocus

text

child
true

parent
false

container

gotfocus
none of the
above

load

unload

initialize

activate
none of the
above
none of the
above

C
A

text
name
opendatabas
e
dbengine

caption

enabled

visible

value

dime

dim

var

style
none of the
above

.ctx

.ctl

.ctr

.ocx

Validate
On Error
GoTo
linelabel
UpdateContr
ols
Cancel
parameter to
a non-zero
value

Validation

Check

Audit

On Error
GoTo Inline

On Error Stop

On Error
Resume Next D

1
Consists of
several
Programs

2
Consists of
several
Applications

openrecordset

PaintPicture Refresh

Resize

Cancel
UnloadMode
parameter to parameter to a non0
zero value

UnloadMode
parameter to
a zero value
None of the
above
Consists of
several
Projects

3
Consists of Various
Forms And Code
Modules

Form
window,
Project
standard or window, view Class module, code
code module code window module

None of the
above

C
B

A
D

Place code in
the Terminate
event
AutoRedraw
= True

Place code
in the
Unload
Place code in the
Deactivate event
event
AutoRedraw
= False
Refresh

None of the
above

GetFileNum GetFile
GetProperty
Get

GetBytes
Value

PaintPicture A
Msgbox
error.number
&
Msgbox
Msgbox
err.no &
err.number & Msgbox error.number error.descrip
err.text
err.text
& error.text
D
tion
To provide a
repository
for images
used by
To display
To help in
images to the creating a
To allow the editing of other
user
ToolBar
icons
D
controls
FreeFile
Retrieve
Common
messages
passed to
Windows
Caption

Open dialog
box
Visible
Click, KeyUp
Click and
and
KeyPress
KeyDown
Binary
Ascii Format Format
CurrentX
ScaleLeft
and
and
ScaleTop
CurrentY
Property
Property Get Assign
Background Caption
color property property
Min
Max
Shell
Are one and
the same
You do not
need to use
the Set
command
here
The Open
method

Substr
Can be
different at
times
You do not
have the
permission
to access
the class
The Exec
method

Windows explorer
Multi-Line

A
B

Input box
Font
KeyPress,
KeyUp and
KeyUp and KeyDown KeyDown

D
C

Input Mode

Output mode

ScaleHeight and
ScaleTop

x and y

Property Let

Property Set

ZOrder property
Value

AutoRedraw
property
CurrentVal

C
B

SetAttr

CStr

Are actually not


properties

None of the
above

MyVar has not been


declared
The ExecProcedure
method

None of the
above
None of the
above

C
D

A warning
query icon

A critical
message
icon

None of the
above
built-in
statement.
variable.
intrinsic constant. procedure.
MsgBox
statement can
be created
InputBox
MsgBox
with the
function
statement
macro
returns a
returns a
InputBox function can recorder,
value, while value, while be created with the
while the
the InputBox the MsgBox macro recorder, while InputBox
function does statement
the MsgBox
function
not.
statement cannot.
cannot.
does not.
Data cannot The form
A new check
Data can be
be entered
can be
box can be
into the form. modified.
added.
entered.
Unload
Cancel
parameter to
a non-zero
value

An exclamation icon

B
C

QueryUnload Deactivate

Terminate

Cancel
UnloadMode
parameter to parameter to a non0
zero value

UnloadMode
parameter to
a zero value

Q_desc

AC64

In an accounting information system, which of the following types of computer files most likely
would be a master file?

AC65

Which of the following is an advantage of a computer-based system for transaction processing


over a manual system? A computer-based system:

BC 113

Which of the following is not the component of a CPU

BC 114

A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The
following is an information not found in the trailer label

BC 114

Hard copy is a term used to describe...?

BC 115

What do the abbreviations VAB stand for

BC 116

What control would prevent the accidental erasure of customer information from a magnetic tape

BC 116

What are the individual dots which make up a picture on the monitor screen called?

BC 117

Header label normally include all the following except the

BC 117

A daisy wheel is a type of...?

BC 118

Which approach or technique is a control usually associated with microcomputers

BC 118

An impact printer creates characters by using...?

BC 119

The best security control in a microcomputer environment is to

BC 119

What would you NOT use with a flatbed plotter?

BC 12

What do you need for an ink jet printer?

BC 120

The greatest control exposure in a microcomputer environment is the lack of

BC 120

What do you need for an ink jet printer?

BC 121

A laser printer does NOT use?

BC 122

The amount of data that a disk may contain is known as the disks...?

BC 123

You can ________ protect a floppy disk.

BC 124

Information on a hard disk is usually backed-up using a...?

BC 125

Magnetic tape is a...?

BC 126

Hard disks can have a storage capacity in the region of...?

BC 128

Which storage device has the largest capacity in Mb?

BC 129

Which storage device cannot be erased?

BC 13

You can ________ protect a floppy disk

BC 130

Where should floppy disks be stored?

BC 133

The contents of these chips are lost when the computer is switched off?

BC 134

What are responsible for storing permanent data and instructions?

BC 135

Which parts of the computer perform arithmetic calculations?

BC 136

What are small high speed memory units used for storing temporary results?

BC 137

How many bits of information can each memory cell in a computer chip hold?

BC 138

What type of computer chips are said to be volatile?

BC 14

Magnetic tape is a...?

BC 14

Software can be divided into two areas:

BC 140

Travel agents use this computer system when reserving flights

BC 141

Which computers are used in the weather forecasting industry?

BC 142

Vacuum tube based electronic computers are...?

BC 143

Which generation of computer was developed from microchips?

BC 144

Which generation of computer uses more than one microprocessor?

BC 145

Which generation of computer developed using integrated circuits?

BC 146

Which generation of computer developed using solid state components?

BC 147

Name three steps involved in developing an information system

BC 148

How do you define analysis of an information system?

BC 149

What areas need to be considered in the SOFTWARE design process?

BC 15

What is the function of systems software?

BC 15

Formatting a disk results in all the data being...?

BC 151

What is Direct Implementation?

BC 152

What is parallel running?

BC 153

What documents are produced during the development of a system?

BC 154

What are User Guides are used for?

BC 16

Systems software can be categorised into:

BC 16

Which storage device cannot be erased?

BC 17

Application software are programs that are written

BC 17
BC 170

Which bus carries information between processors and peripherals?


Convert the decimal number 2989 to Hexadecimal

BC 18

Which bus controls the sequencing of read/write operations?

BC 183

What are utilities?

BC 184

Numbers are stored and transmitted inside a computer in

BC 185
BC 186

The original ASCII codes


A Nibble corresponds to

BC 187

A gigabyte represents

BC 188

A 32-bit processor has

BC 189
BC 19

A parity bit is
he contents of these chips are lost when the computer is switched off?

BC 190

Clock speed is measured in

BC 191

Cache memory enhances

BC 192

CISC machines

BC 20

Which parts of the computer perform arithmetic calculations?

BC 200

Every data from the primary memory will be erased if

BC 201

An RS-232 interface is

BC 202

For print quality you would expect best results from

BC 203

ROM

BC 204

A UPS

BC 206

smart card

BC 207

Laptop computers use

BC 208

Multiprogramming refers to

BC 209

Multitasking refers to

BC 21

What are small high speed memory units used for storing temporary results?

BC 21

A good way to exchange information that changes rapidly is through

BC 210

Multiprogramming is a prerequisite for

BC 211

Timesharing is the same as

BC 212

Virtual memory is

BC 213

Multiprocessing is

BC 22

To help keep sensitive computer-based information confidential, the user should

BC 22

What is the function of a disk drive?

BC 228
BC 229

A 4GL is
A nanosecond is

BC 23

What small, hand-held device is used to move the cursor to a specific location on the screen?

BC 230

The memory address register is used to store

BC 231

The memory data register is used to store

BC 232

The instruction register stores

BC 24
BC 25

Which of the following is used to indicate the location on the computer monitor?
A mathematical procedure that can be explicitly coded in a set of computer language instructions
that manipulate data.

BC 26

Which of the following translates a program written in high-level language into machine language
for execution?

BC 27

Detecting errors in real memory is a function of

BC 28
BC 28

To find where a file has been saved on disk, the user should
A series of instructions telling the computer how to process data or files is defined as a

BC 29

To ensure that data is not lost if a computer system fails, the user should

BC 29
BC 30

Having a single CPU alternatively process tasks entered from multiple terminals is called
The place in the CPU where the data and programs are temporarily stored during processing is
called the

BC 31

All are examples of computer software except

BC 32

Computer manufactures are now installing software programs permanently inside the computer.
It is known as

BC 32

Which of the following file organisation forms most efficiently allows access to a record

BC 33

The part of the computer system controlling data manipulation is called the

BC 34

For direct access storage devices the recording area is divided into

BC 35

The data hierarchy from the largest to the smallest is

BC 36

Which of the following hardware or software system controls provides a detailed record of all
activities performed by a computer system

BC 37

BC 37

Which one of the following parts of a computer is necessary to enable it to play music?
An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15
minutes of sound and 1 minute of video. Which of the four different media listed takes up most
space on the CD-ROM?

BC 38

Which one of the following printers is suitable for printing sprocket fed carbon copies?

BC 38

Multimedia software can be most productively used for

BC 39

To be effective a virus checker should be

BC 40

Which one of the following software applications would be the MOST appropriate for performing
numerical and statistical calculations?

BC 41
BC 42

Passwords enable users to


12. How many bytes do 4 Kilobytes represent?

BC 43
BC 44

Back up of the data files will help to prevent


Which one of the following is the MOST common internet protocol?

BC 45

The advantage of a PC network is that

BC 46

The term A:\ refers to

BC 47

UPS stands for

BC 48

The main problem associated with uninstalling software is that

BC 48

You are conducting research for a Income Tax assignment. The raw facts you collect are called

BC 484

A flow chart is the

BC 485

A voucher entry in Tally is done for

BC 49

Passwords are applied to files in order to

BC 491
BC 492

Each of the following is an enabler of IT-business alignment except:


The basic systems model is used to describe virtually all information systems and it consists of
the following elements:

BC 494

What is a computer-aided design system?

BC 499

A(n) __________ offers a solution package for an entire industry.

BC 50

File extensions are used in order to

BC 506

Information systems controls include all of the following EXCEPT:

BC 51
BC 52

Hashing for disk files is called


Components of expert systems include: a) inference engine; b) user interface; c) knowledge
base; d) fuzzy logic

BC 53

Black box testing and white box testing are part of:

BC 53

What is the term used to describe the point of interaction between a computer and any other
entity, such as a printer or human operator?

BC 54

The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility

BC 54

Which of the following is an acceptable way to shut down the computer?

BC 555

Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best way to locate the files?
Components of an information system model are: a) applications architecture; b) functional
architecture; c) technology architecture; d) information architecture

BC 56

Benchmarks form part of:

BC 57

Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run totals

BC 58

Which is not part of help desk documentation:

BC 59
BC 60

Testing of individual modules is known as:


Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface
architecture; d) presentation architecture

BC 60

Which is part of installation testing:

BC 55

BC 60

The computer operating system performs scheduling, resource allocation, and data retrieval
functions based on a set of instructions provided by the:

BC 61

Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio

BC 61

Which of the following procedures should be included in the disaster recovery plan for an
Information Technology department?

BC 62

Designing relationships among components is part of:

BC 63
BC 64

Several Computers connected together is called:


Which network topology uses a Hub?

BC 65

Which of the following topologies is used for Ethernet?

BC 66
BC 67

Application software are programs


Which type of file search method requires a computer first read all locations preceding the
desired one

BC 67

Which of the following areas of responsibility are normally assigned to a systems programmer in
a computer system environment?

BC 68

Which of the following is recommended when many searches for data are required

BC 69

It is unlikely that a magnetic tape containing several thousand blocked records can be used on
two machines of different architecture directly because

BC 70

Which component of the CPU has the most influence on its cost versus performance

BC 71

Which of the following terms applies to network used to connect computers with other
computers, peripherals and workstations that are in fairly close proximity

BC 72

Intelligent terminals differ from dumb terminals in that they

BC 73

A computer is to be linked to 8 terminals using a single communication link. To permit


simultaneous terminal operations, communication path will require which of the following

BC 74
BC 75

A modem is a device that


A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives and
printers. This type of network is called a

BC 76

A computer based system for sending, forwarding, receiving and storing messages is called an

BC 77

If a workstation contains a processor, monitor, screen manipulation device, printer, storage and
communication capabilities, it is said to be

BC 78

Terminal hardware controls include

BC 79

RS-232 is a

BC 79

What is a compiler?

BC 80
BC 80

What are the stages in the compilation process?


Which of the following is not a data transmission coding scheme

BC 81

What is the definition of an interpreter?

BC 81

A device used in data communications to divide a transmission signal into several sub-bands is
known as a

BC 82

Third generation languages such as COBOL, C, and FORTRAN are referred to as

BC 82

Serial Communication is used over long distance because it

BC 83

In what areas is the COBOL programming language used?

BC 83

The primary function of a front-end processor is to

BC 84

What is the first stage in program development?

BC 84

Which of the following is not used for data transmission within a local area network

BC 85

What is System Analysis?

BC 85

A device to device hardware communication link is called

BC 86
BC 86

What will a good software provider consider?


The topology of a network can be each of the following except

BC 87

What is the 8-bit binary value of the decimal number 85?

BC 87

Which is the most common data transmission error checking method

BC 88

What is the decimal value of the binary number 1111?

BC 88

Which of the following devices merges communication signals onto a single line

BC 89

What is the decimal value of the octal number 215?

BC 89

Which tool is used to help an organization build and use business intelligence?

BC 9

Cache memory enhances

BC 90

What is the decimal value of the hexadecimal number FF?

BC 90

Numbers are stored and transmitted inside a computer in

BC 91
BC 91

What is the hexadecimal value of the decimal number 1476?


A byte corresponds to

BC 92

What does EBCDIC coding of numbers mean?

BC 92

A Kb corresponds to

BC 93

What is the binary sum of 01011 and 00101?

BC 93

Information is stored and transmitted inside a computer in

BC 94

Where would you find the letters QWERTY?

BC 94

A parity bit is

BC 95

How did the computer mouse get its name?

BC 95

Clock speed is measured in

BC 96
BC 96

What are you most likely to use when playing a computer game?
CPU performance may be measured in

BC 97

A digitising tablet can be used for?

BC 97

In processing cheques which of the following I/O techniques have banks traditionally used

BC 98

Which of the following is a pointing device used for computer input?

BC 98

A UPS

BC 99
BC 99

What does a light pen contain?


The capacity of a 3.5 floppy is around

BC01

What general term describes the physical equipment of a computer system, such as its video
screen, keyboard, and storage devices?

BC02

Where would you find the letters QUERTY?

BC03

What are you most likely to use when playing a computer game?

BC04

A digitising tablet can be used for?

BC05

Which of the following is a pointing device used for computer input?

BC06

What input device could tell you the price of a product

BC07

Where would you find a magnetic strip?

BC08

Hard copy is a term used to describe...?

BC09

What are the individual dots which make up a picture on the monitor screen Called

BC10

A daisy wheel is a type of...?

BC100

What input device can be used for marking a multiple-choice test?

BC100

Laptop computers use

BC101

QWERTY is used with reference to

BC101

What input device could tell you the price of a bar of chocolate?

BC102

A GUI is

BC102

Where would you find a magnetic strip?

BC103

Multiprogramming refers to

BC104

Multitasking refers to

BC105

Multiprogramming is a prerequisite for

BC105

UNIVAC Computer belongs to the

BC106

Timesharing is the same as

BC106

Name the first Indian Super Computer?

BC107

Disk fragmentation

BC107

The technology which is used to check answer sheets of multiple-choice questions in civil
services or similar examinations is: -

BC108

A compiler is

BC108

Which printer among the following is fastest

BC109

Zipping a file means

BC109

What does acronym VIRUS stands for

BC11

An impact printer creates characters by using...?

BC110
BC111

A client-server system is based on


A nanosecond is

BC112

The memory address register is used to store

BC113

Inefficient usage of excess computer equipment can be controlled by

BC115
BS 319

A procedural control used to minimize the possibility of data or program file destruction through
operator error is the use of
A predefined computational task is referred to as a(n):

CA 486

Which of the following is not the feature of GAPs

CA 487

Which is the example of CAATs

CA 488

In audit procedures, test data is

CA 489

Which of the following is not the use of CAATs

CA 490
DB 01

Which of the following are called explicitly by another procedure?


What term applies to a collection of related records in a database?

DB 02

All of the following terms are related to computerized databases except which one?

DB 03

What is a database?

DB 04

What does a record contain?

DB 05

An RDBMS is a

DB 06

Data Warehousing refers to

DB 07

Unauthorised alteration of on-line records can be prevented by employing

DB 10

What is a database?

DB 11

What does a record contain?

DB 12

What is a report?

DB 13

What is the best way to analyse and change data

DB 18

What are some popular office orientated software applications?

DB 19

Which of the following constraints can be used to enforce the uniqueness of rows in a table?

DB 20

Which of the following commands is used to change the structure of table?

DB 226

An RDBMS is a

DB 227

DB 235

Data Warehousing refers to


You are creating a client application that calls ActiveX DLLs. Which of the following properties of
the Err object provides the name of a component that sends an error back to the client
application?

DB 24

This database holds personal information. The user can help to keep it confidential by

DB 26

If the database holds customer names and addresses, personalised letters can be created
automatically using

DB 27

Application software suited to storing the survey information obtained in the table would be

DB 30

The characters * and ? are sometimes used in search criteria as

DB 365

Which of the following field types will generate the primary key automatically?

DB 366

Referential integrity ensures that the:

DB 367

Tables are related to one another through a:

DB 368

DB 369

A foreign key is:


You are creating a banking database to track customer loans. The bank will, of course, have
many customers, each of whom may take out one or more loans, while each loan may be
associated with only one customer (there are no joint accounts). What is the re

DB 370

In a one-to-many relationship between Companies and Employees, which field is found in both
tables?

DB 371

Which of the following ensures that records in related tables are consistent with one another?
For example, it ensures that you cannot add a record with an invalid foreign key.

DB 372

How would you delete a relationship between tables in the Relationships window?

DB 373

In a Customers tables, what does a plus sign next to the CustomerID field mean?

DB 374

What is required of the fields that join two tables?

DB 375

Assume a one-to-many relationship between the Customers table and the Loans table, with
referential integrity in effect. What happens when you attempt to delete a customer ID from the
Customer table that still has entries in the Loans table?

DB 376

Which of the following is true when viewing a main form and its associated subform in the Form
Design view?

DB 377
DB 378

Which of the following relationships does not belong in a database based on a professional
sports league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the many side of a
one-to-many relationship?

DB 379

You have created a one-to-many relationship with referential integrity between a Customers table
and a Loans table. From which table can you delete a record?

DB 380

The correct order of the arguments for the MsgBox statement is:

DB 381

The first statement in a procedure named CreateList is:

DB 393

Which of the following is TRUE related to form fields?

DB 394

A text field:

DB 401

The purpose of a database is to:

DB 402

A database stores:

DB 403

A database records:

DB 404

A sales contact manager used by a salesperson is an example of _______________

DB 405

A Customer Resource Management (CRM) system is an example of_________

DB 407

The industry standard supported by all major DBMSs that allows tables to be joined together is
called __________.

DB 408

A program whose job is to create, process and administer databases is called the _____

DB 409

Microsoft Access may use which of the following DBMS engines?

DB 410

Which of the following are basic components of an enterprise-class database system?

DB 411

In an enterprise-class database system ________ .

DB 412

In an enterprise-class database system, the database application ___ .

DB 413

In an enterprise-class database system, reports are created by ____________________ .

DB 414

A database is considered "self-describing" because _______ .

DB 415

In an enterprise-class database system, the database _________ .

DB 416

A database may contain _________________________ .

DB 417

A database designed using spreadsheets from the Sales department is a database being
designed _________________________ .

DB 418

A database designed to implement requirements for a reporting application needed by the Sales
department is a database being designed _______ .

DB 419

A database designed to combine two databases used by the Sales department is a database
being designed _________________________ .

DB 420

Database professionals use ________________ as specific data sources for studies and
analyses.

DB 421

Database professionals use a set of principles called ________________ to guide and assess
database design.

DB 422

A very popular development technique used by database professionals for database design is
known as _______________________ .

DB 423

A very popular development technique used by database professionals to adopt a database


design to new or changing requirement is known as _____ .

DB 424

The predecessor(s) of database processing was (were) __________ .

DB 425
DB 426
DB 427

In a relation __________________________ .
An attribute is also known as a(n)
.
A combination of one or more columns used to identify particular rows in a is___ .

DB 428

A combination of two or more columns used to identify particular rows in a relation is________ .

DB 429
DB 430

A determinant that determines all the other columns in a relation is______ .


When designing a database, one of the candidate keys in a relation is selected as the
_________ .

DB 431

Normalization is a process used to deal with which of the following modification anomalies?

DB 432

When you are given a set of tables and asked to create a database to store their data, the first
step is to ____ .

DB 433

Modern microcomputer personal DBMS products______.

DB 434

DB 436

Which of the following are true about data mining applications?


We have obtained access to the company's operational data. We examine 50 records for
customers with phone numbers that should use the current area code of 345. Of these 50
records, we find 10 that still use an older area code of 567. This is an example
We have obtained access to the company's operational data. We have been asked to produce a
report with an item by item analysis of sales, but the only sales figure available is the total sale
value for each order. This is example of_____

DB 437
DB 463

A data warehouse database differs from an operational database because:


Which of the following objects is used to display a menu?

DB 464

Which of the following objects are NOT found in an Access application?

DB 435

DB 465

DB 466

You are developing an Access application that you expect to upgrade periodically. Which of the
following statements is TRUE?

DB 467

Which of the following statements regarding Access applications is NOT true?


Which of the following brings a copy of the table into the current database and does not maintain
a tie to the original table?

DB 469

What makes a database an application?

DB 470

What is the Access tool that is used to create the user interface?

DB 503

The purpose of a data warehouse is to:

DS 279

____________ is the art of protecting information by transforming it into an unreadable format.

DS 59

Which of the following activities would most likely detect computer-related fraud?

DS 62

A digital signature is used primarily to determine that a message is:

DS 63

What is a major disadvantage to using a private key to encrypt data?

DS 66

Which of the following risks can be minimized by requiring all employees accessing the
information system to use passwords?

EC 103

The most beneficial advantage of ERP system is

EC 301

What is the term that describes spying on ones business rivals to gain a competitive advantage?

EC 302

What would you NOT be looking for when spying on a competitor?

EC 406

An online drugstore such as Drugstore.com is an example of_______

EC 51

Which of the following is an example of unacceptable online netiquette?

EC 58

Which of the following statements is correct concerning the security of messages in an electronic
data interchange (EDI) system?

EX 10

On an Excel sheet the active cell is indicated by


Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of
cells A6, A7, and A8 are _____.

EX 11

If a cell shows ####### , it means that _____.

EX 12

EX 13
EX 14

Which is not an advantage of using computerized spreadsheets?


The gym teacher has a new program to calculate physical fitness in terms of weight and
exercise. The use inputs different weights or amounts of exercise to determine the related
physical fitness. This "What if" program is most likely which of the followin
The difference between the highest and the lowest values.

EX 15

Spreadsheets can be used for...

EX 1

EX 2

To select a column the easiest method is to

EX 3
EX 320

If you press _____, the cell accepts your typing as its contents.
The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as

EX 321

All of the following are considered constants EXCEPT:

EX 322
EX 323

Which of the following may NOT be included in a formula?


Which of the following is NOT a valid mathematical operator in Excel?

EX 324

Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first?

EX 325

Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?

EX 326

How can you tell which cell in a worksheet is the active cell?

EX 327

How can you change the active cell?

EX 328

Which of the following would you use to change the font size of a cell in Excel?

EX 330
EX 331
EX 332

The command that will save the current workbook with a different file type is:
The command that will print an Excel workbook is found on the ____________ menu.
In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the
date and time a file was last modified.

EX 333

Which of the following commands will automatically adjust cell references in formulas?

EX 334

Which of the following commands will remove cells, rows, or columns from a worksheet?

EX 335

Which of the following options is NOT controlled through the Page Setup command?

EX 336

Which command enables you to change the margins for a printed worksheet?

EX 337
EX 338

All commands are carried out on a rectangular groups of cells known as a:


Which of the following is a valid cell range?

EX 339

In a copy operation, the cell(s) you are copying from is called the:

EX 340

In a copy operation, the cell(s) you are copying to is called the:

EX 341
EX 342
EX 343

EX 345

Which of the following commands is needed to duplicate the contents of a cell in another?
A cell reference that does not change during a copy operation is known as
Which of the following is considered an absolute cell reference?
Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4,
what will be the contents of cell E4?
Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to
cell E4, what will be the contents of cell E4?

EX 346

Which of the following commands is needed to transfer the contents of one cell range to
another?

EX 344

EX 347

The F4 key is used to:

EX 352

Which of the following quickly copies the formatting of a selected cell to other cells?

EX 353

Which of the following will insert a hyperlink into an Excel worksheet?

EX 354

Conditional formatting applies formatting to a cell based on:

EX 358

If you enter a date into a cell, Excel stores the date as:

EX 361

You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened
that worksheet again on August 31. What will be displayed in cell E17 on August 31?

EX 362

The number of days between two cells containing dates can be calculated by:

EX 363

The function key that is used to quickly edit the contents of a cell is:

EX 364

What will be stored in a cell if 3/4 is entered in it?

EX 384

EX 42

A users response to the InputBox function can be stored in:


The cell reference for a range of cells that starts in cell B1 and goes over to column G and down
to row 10 is _____.
The teacher has a spreadsheet showing all Year 10 students and their marks in one
Mathematics test. To find the student with the highest mark, which of the following functions
should be used?

EX 43

Which chart type best shows proportions of a whole?

EX 462

Which of the following is TRUE regarding chart types?

EX 5

To select several cells or ranges that are not touching each other, you would _____ while
selecting.

EX 4

EX 57

Your Institute teachers have set an assignment on Studies. You are required to use a
spreadsheet to record all that you study on each day for four weeks. You decide to show each
weeks data with an accompanying graph. What is the best way of doing this
What would be the best method to quickly copy the formula from the active cell to each cell
below it?

EX 6

To arrange rows in alphabetical order based on column A, you need to use the command _____.

EX 6

What can you NOT do with a spreadsheet?

EX 7

To print just part of a sheet, you would select what you want to print and _____ .

EX 52

EX 7
EX 8

Spreadsheets can be used for...


The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in
B2 is _____.

EX 8

Which of the functions is not valid for performing addition

EX 9

The default orientation for the printed page is _____.

EX9.

Which is not a valid cell address?

IN 01

IN 05

Which of the following best describes uploading information?


A characteristic of a communication channel that is the amount of information that can be
passed through it in a given amount of time, expressed in bits per second.
The act of searching through storage to locate information without necessarily knowing of the
existence of the information being sought.
The principles, means and methods for rendering information unintelligible and for restoring
encrypted information to intelligible form.
A long string of seemingly random bits used with cryptographic algorithms to create or verify
digital signatures and encrypt an decrypt messages and conversations.

IN 06

Protected/private character string used to authenticate an identity or to authorize access to data.

IN 07

The successful act of bypassing security mechanisms of the system.

IN 08

A set of rules and formats, semantic and syntactic, that permits entities to exchange information.

IN 09
IN 10

An attempt to get access to a system by posing to be an authorised person.


An action or event that might prejudice security.

IN 104

According to information Technology Act, 2000, To investigate contraventions the controller of


certifying authority shall exercise the like powers to that of

IN 11

Malicious software.

IN 110

None the person who is known as father of Internet

IN 111

This website is the biggest bookstore on the earth.

IN 112

When we talk of Data Transmission modes, then ATM stands for

IN 12

A sequence of bits or characters that identifies the destination and the source of a transmission.

IN 02
IN 03
IN 04

IN 13

The means of communicating between networks

IN 14

A group of computers and other devices dispersed over a relatively limited area and connected
by communication links that enable a device to interact with any other on the network.

IN 15

The term HTTP stands for

IN 155

A NIC is considered as

IN 156

A hub is a device that can connect

IN 157

Which of the following is true concerning the function of a switch?

IN 158

What do routers connect?

IN 159

What does a router route?

IN 16
IN 160

Software which prevents external access to a system is termed


If four computers are connected to a hub and then to the internet, how many IP addresses are
required for these 5 devices?

IN 161

Which of the following in an OSI layer

IN 162

When creating a network from just two PCs, what kind of cable would be used to connect them?

IN 163

An IP address is a

IN 164

To construct a simple LAN of 4 computers, you would connect them with ______connect them

IN 165

What happens to data that is ruined before reaching to receiver

IN 166

Bluetooth is

IN 167

Which is not one of the recognized IEEE sub layers?

IN 168
IN 169

The most preferred number system to represent a IP address is


A MAC address is of

IN 17

Protocol is

IN 172

A ............... is a LAN-based computer with software that acts as a controlling device for
controlling access to at least part, if not all, of a local area network and its available resources.

IN 173
IN 174

What is the biggest disadvantage of the Ring topology?


The .............. of the network concerns how network devices are physically (or optically)
interconnected.

IN 175

The principal topologies used with LANs are:

IN 176

What are the various types of bus architecture?

IN 177

What are the various types of ring architecture?


In a ................., each workstation attaches to a common backplane via its own physical cable
that terminates at the hub

IN 178
IN 179
IN 18
IN 180

In a ............... , each work station is directly connected to a common communications channel


Which one of the following is NOT a network topology?
In a .............. , the cable system forms a loop with workstations attached at various intervals
around the loop

IN 181

The Media Access Control (MAC) is a sub layer of the:

IN 182
IN 194
IN 195

What are the most common LAN technologies used in networking today?
Modem speeds are measured in
LAN speeds are measured in

IN 196

WAN speeds are

IN 197

Accessing the Internet from a typical home PC requires the use of

IN 198

To use the Internet, you

IN 20

The worldwide web server uses the following standard interface to act as the middleware:

IN 205

An NIC

IN 21

Accessing the Internet from a typical home PC requires the use of

IN 214

The most widely used network operating system on PC LANs is

IN 218

JPEG and MPEG

IN 22

To use the Internet you

IN 220

A multiplexer is a form of

IN 221

An ISP

IN 222

FTP is

IN 223

Telnet

IN 224

A firewall is

IN 225

A proxy server is

IN 23

A search engine is

IN 23

To look for information about interest areas on the internet, the user should use a

IN 24

An ISP

IN 25

FTP is

IN 26

Telnet

IN 267

Which of the following is a true statement about the OSI model layers?

IN 268
IN 269

Which of the following is NOT true about the Internet?


The traditional intent and impact of this common type of attack is to prevent or impair the
legitimate use of network resources.

IN 27

A firewall is

IN 270
IN 272
IN 273

Which of the following is NOT an example of a DoS attack that is popular among hackers?
A ____________ attack is when a hacker sends a continuous flow of packets to a system.
One defense option on a large network is to configure a ____________ to disallow any external
traffic.

IN 28

A proxy server is

IN 285

Which of the following would be performed on a network server and not normally on individual
workstations?

IN 288

What can be said about the safety of the Internet?

IN 29

To secure communication network against wire-tapping the most effective control is

IN 290

One way that a virus CANNOT spread throughout a network is:

IN 297

Which of the following is NOT a means of monitoring employee use of company technology?

IN 298

IN 30

____________ would be used by parents to monitor their children on their home system.
The formal rules and parameters which are established to permit a microcomputer to
communicate with the mainframe computer as though it was a terminal of the mainframe are
called

IN 304

The two most common tools used to help with extracting information are:

IN 306

Which of the following would NOT be considered an example of cyber terrorism?

IN 307

Which of the following would be a form of cyber terrorism?

IN 308

Which of the following is a likely target of a cyber terrorist that would cause considerable loss of
life?

IN 31

An organisation is upgrading its telecommunication lines. Which is the least important objective
while upgradation

IN 31

A company posts a price list of its products on its website. The advantage to the customer is that
the company can

IN 310

Which of the following is an easy-to-use service to get information on someone?

IN 312
IN 313

Which of the following pieces of information would NOT be found online?


Which of the following is the most common danger on the Internet?

IN 314
IN 315

The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain
sensitive information is called _________________.

IN 316
IN 317

Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called:
Setting your privacy settings in Internet Explorer to medium is one way to block:

IN 318

What is the best means of protection from cyber stalking?

IN 32

Which of the following is not an appropriate control over telecommunications software

IN 33
IN 33

Encryption techniques can be implemented in Hardware-Software


Which protocol would be used to download a free anti-virus program from the Internet?

IN 34

The major advantage of the checksum program is when it

IN 348

Which of the following is a Web browser?

IN 349

A Web page is another name for -----------

IN 35

Domain names must contain a description of the type of organisation that the domain represents.
A very common abbreviation used include:

IN 350
IN 351

A standard language for creating and formatting Web documents is:


The Web page format in which all elements of a Web page are saved as one file is called:

IN 359

Which of the following requires an Internet connection?

IN 36

Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his
computer how would he do this?

IN 360

IN 45
IN 47

Which of the following is used to update a Web query?


You download from the internet, a screensaver, a ten-second sound file and a ten-second music
video clip. You also add a hyperlink. Which of the media elements has the greatest effect on the
file size?
When saving a photograph for use on a website, which format should you choose?

IN 49

While researching the Direct taxes assignment, you find a useful website. What is the most
efficient way to access the site at a later time?

IN 493

A system that uses the Internet for business-to-business interaction is called a(n):

IN 50
IN 501

A block of text automatically added to the end of an outgoing email is called


_________ refers to the use of Internet technologies for placing telephone calls.

IN 68

Most client/server applications operate on a three-tiered architecture consisting of which of the


following layers?

IN 69

Which do you NOT need to connect to the Internet?

IN 70

What does FTP stand for?

IN 71

What is the purpose of DNS?

IN 72.

Which of the following is NOT a properly formatted IP address?

IN 73.

Which of the following is a properly formatted email address?

IN 74.

The Internet is controlled by whom?

IN 75.

What does IRC stand for?

IN 76

If you do not pick up your email for a week...?

IN 77

What does HTML stand for?

IN 78

What is a disadvantage of joining a mailing list?

OS 01

Which of the following computer software is designed to direct and assist the execution of
application programs

OS 127

Formatting a disk results in all the data being...?

OS 131

Which bus carries information between processors and peripherals?

OS 132

Which bus controls the sequencing of read/write operations?

OS 139
OS 193

Which computers use single chip processors?


CPU performance may be measured in

OS 199

In processing cheques which of the following I/O techniques have banks traditionally used

OS 215

Disk fragmentation

OS 216

A compiler is

OS 217

An interpreter is

OS 219

Zipping a file means

OS 233

An assembly language program is translated to machine code by

OS 234

Which of the following is not part of the processor

OS 236

If the Cancel Error Property of the CommonDialog Box is set to true then which of the following
statement is true:

OS 238
OS 271
OS 274
OS 275
OS 276
OS 277

__________ control defaults to displaying the files in the current directory:


A ____________ occurs any time a program writes more information into the temporary space it
has allocated in the memory.
Assessing a system requires certain common tools. Which of the following is NOT a tool used to
assess a system?
The ____________________ Web site has a utility that will tell you what software and operating
system a Web server is running.
When software vendors discover flaws in their software, they usually will write corrections to their
code, known as:
All ____________ have the option of blocking ports.

OS 278

Which of the following is NOT a characteristic of a firewall?

OS 280

Before shutting a service on an individual machine, which of the following would you always
check?

OS 281

At a minimum, which of the following should be implemented under the protection phase?

OS 282
OS 283

Attacks on your system may be prevented or trapped through the use of:
Setting restrictions as to the number of unique passwords to use before a user can recycle them
is called a password:

OS 284

Which of the following is NOT a step to take in securing a workstation?

OS 286

To prevent a hacker from unauthorized access, what should you do with the administrator
account?

OS 287

What should be done with old backup tapes and CDs?

OS 289

Which of the following is NOT an example of malware?

OS 291

One step you can take to reduce the risk of being infected by a virus is to:

OS 292

Which of the following is NOT a sign that a virus has infected your system?

OS 293
OS 294

Which of the following is the safest way to protect yourself from e-mail viruses?
A ____________ attack causes too much information to be placed into temporary memory
space.

OS 295

____________ gathers user information with the users knowledge.

OS 296

Which of the following is the most common function of spyware?

OS 299

Which of the following is NOT a virus-scanning technique?

OS 300

Which of the following would NOT be a way to protect your system from spyware?

OS 309

For which of the following positions would it be advisable to conduct an extensive background
check?

OS 329

Which of the following would you use to open an existing file?

OS 355

The ability to have multiple applications open at the same time is known as:

OS 356
OS 357

Which of the following can be changed using the Options command?


Which of the following leaves an application open but shrinks the window to a button on the
Windows taskbar?

OS 396

Which of the following actions would move a floating toolbar to dock it in a different place?

OS 397

To display a missing or needed toolbar, click the:

OS 399

Which of the following is NOT a true statement regarding password protection?

OS 495

The Linux operating systems is an example of:

OS 496

The Windows operating systems is:

OS 497

Application service providers offer:

OS 498

A(n) _________ offers on-demand software on an as-needed basis to its clients over the web.

OS 502

_________ are systems used to interact with customers and run a business in real time.

OS 504
OS 505
OS239

The most common cause(s) of disaster is (are):


A _______ backup site is backup facility consisting of an empty warehouse with all necessary
connections for power and communication, but nothing else.
To destroy an object and free the memory space occupied by it, the keyword used is:

PP 44

An example of the components of a multimedia presentation could include

PP 442

Which of the following formatting elements can be applied to a PowerPoint diagram using the
AutoFormat tool?

PP 443

Which of the following formatting elements can be applied to a PowerPoint diagram using the
Format AutoShape command?

PP 444

What happens when you double click a blank graph placeholder in a PowerPoint presentation?

PP 445

The legend in a Microsoft Graph chart is:

PP 446

Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the
best chart type if you want to emphasize the total sales of each region?

PP 447

Which of the following actions will enable you to insert a graph into a PowerPoint presentation?

PP 448

If you are editing a slide containing a Microsoft Graph, how do you display the underlying
datasheet?

PP 449

How do you deselect a chart that has been placed onto a PowerPoint slide after you have
finished creating the chart?

PP 450

What happens when you click the Datasheet button on the Microsoft Graph toolbar?

PP 451

What happens if you single click a chart that is not currently active?

PP 452

What happens if you double click a chart that is not currently active?

PP 453

Using custom animation effects, you can build:

PP 454

Which of the following animation effects can be added to a slide?

PP 455
PP 456

Which of the following animations effects can be added to a slide?


Which keyboard key is used to select more than one picture on a slide?

PP 457

Custom animation can be used to affect ONLY:

PP 458

Which of the following best describes the information that appears on the advanced timeline?

PP 459

Which of the following objects can contain custom animation effects?

PP 46

What type of program allows an object within an image to be edited without affecting other
objects?

PP 460

Which of the following animation effects can be added to a slide?

PP 461
PP 500

Which of the following is TRUE regarding the Datasheet?


Graphical software tools that provide complex analysis of stored data are:

PP438
PP439

Which of the following statements is TRUE regarding PowerPoint diagrams?


Which keyboard key combination is used to undo the previous command(s)?

VB 237
VB 240

What is the extension of the Visual Basic project file that stores the design of a user control.
Which event of a text box would you use for validating the data entered by the user?

VB 241
VB 242

Which of the following statements forces inline error handling?


The _______ method resets the contents of bound controls to their original values when the user
clicks on the cancel button.

VB 243

To deactivate the Form UnLoad event, you make the following change in the function definiton:

VB 243

To deactivate the Form UnLoad event, you make the following change in the function
definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To prevent the
Form from closing, you will set the:

VB 244

How many root nodes can a TreeView control have?

VB 245

A project group is a Project which:

VB 246

Procedures declared in a _____ are local whereas procedures declared in a ______ are
available to the whole application.

VB 247

How can you keep the user from exiting a form by clicking the Close button?

VB 248

The _______ property enables Visual Basic to draw complete images in memory before
displaying them on the Screen.

VB 249

You want to display the code and the description of an error. What would be the correct syntax?

VB 250

What is the purpose of the Image List Control?

VB 251

Which method would you use to get a free or unused File identifier while opening any file:

VB 252

Which property procedure is used to retrieve the value of a property?

VB 253
VB 255

Which of the following can be shown to the user using the Common Dialog control in VB?
Which of the following are not properties of Command Button:

VB 256

Which events enable you to determine which key was pressed by the user?

VB 257

In order to access a file in Non-textual format, you have to open file in:

VB 258
VB 259

VB 260
VB 261

Visual Basic displays information depending upon the current value of two properties of the form,
called:
Which of the following procedure types will execute when you assign a value to a property of an
object?
In order to overlap the controls (say a command button) during design time, we use the Send To
Back or Bring To Front option from the Edit menu. To change it dynamically (i.e.during program
execution) we need to change:

VB 262

Which property of the ProgressBar determines how much of the bar is filled?
The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic
program.

VB 263

The caption and the name properties of the command button:

VB 264

You try to initialize a new Object variable with the following line but receive an error. What could
be the possible cause? Set MyVar = New Classname

VB 265

Which of the following will perform a direct execution of a Command object?

VB 266

The vb Critical symbol displays:

VB 382

vbYesNo is an example of a(n):

VB 383

The primary difference between the MsgBox statement and the InputBox function is the:

VB 395

Which of the following is TRUE about a protected form (i.e., a form where the Protect Form
button on the Forms toolbar is toggled on and is assumed to remain in that position)?

VB254

Which event is triggered when the user moves to another open form?

WO 01

Veena is entering a paragraph in a word processing program. When the cursor gets to the end of
a line, what is the best way to get the cursor to the next line?

WO 02

How are data organized in a spreadsheet?

WO 03
WO 04

Which key moves the cursor to the beginning of the next line of text?
Veena typed the following sentence: "The girl was very beautiful." In which word processing utility
could she find a synonym for "beautiful"?

WO 05

Using an electronic bulletin board, Seema can do all of the following except which one?

WO 06
WO 07
WO 08

Aryan has created a ten-page story, but only wants to print the first two pages. What printer
command should he select?
What process should be used to recall a document saved previously?
Which is used to indent text within a document?

WO 09

Desktop publishing is a more sophisticated form of which of the following types of software?

WO 1

What is a Word Processor used for?

WO 10

What is a picture that is saved on a diskette and can be pasted into a document?

WO 11

What is a Word Processor used for?

WO 12

What basic tools would you find in the Edit menu of a word processor

WO 13

What is a header in a document?

WO 2

What hardware is essential for a word?

WO 25

The user could take a picture from a magazine and insert it into the document by using a

WO 3

WO 32

What basic tools would you find in the Edit


What command in a word-processing program can be used to change the word him to her,
and also the word he to she in the given phrase? On a cold and still night, the only sound that
could be heard was the owl that had ade its home in the nest outs

WO 34

What edit commands would you use to insert a paragraph from one document into another
document, while still keeping the paragraph in the first document?

WO 385

Which of the following statements would NOT be a reason for showing suggested revisions in a
Word document without changing the original document?

WO 386

Which statement is NOT true regarding revisions made in a Word document?

WO 387

How are suggested changes entered for review on an initial Word document?

WO 388

Which of the following is TRUE about saving a document using the Versions command?

WO 389

What happens when you open a document that has been saved using the Versions command?
You have used the word discover four times in an English essay you have created using a word
processing program. You would like to find another word of similar meaning to use instead of
discover. Which of the following would you use to do this?

WO 39

WO 391

When opening and working with multiple versions of a document, how can you tell which is the
most recent version?
Various fields are added to a regular document to create a special document called a form
through the ____________ toolbar.

WO 392

Which of the following types of fields CANNOT be inserted into a form?

WO 390

WO 398

Which of the following is TRUE related to editing comments in a Word document?

WO 4

What is a header in a document?

WO 40
WO 400

In your English essay you notice that the paragraph at the bottom of page 1 continues on to page
2. You would like to make this paragraph start on page 2.What would be the best way to do this?
Tables in a document help you to easily arrange all of the following EXCEPT:

WO 41

To identify a document, it is helpful to include the file name on each page as a

WO 440

Which of the following tools will copy the formatting of selected text to other places?

WO 468
WO 471

What is the name of the process of determining the cause of errors in a macro?
Drop caps are added to a Word document using the ___________ menu.

WO 472

A reverse in a newsletter is:

WO 473

A pull quote is best emphasized by:

WO 474

Which of the following definitions is CORRECT?

WO 477

Pertaining to newsletters, which of the following cannot be changed using the Columns
command dialog box?
As related to type size, how many points are there to the inch?
Assume you are working on a newsletter in which the masthead extends across the top of the
entire first page. The rest of the newsletter has two columns. What is the minimum number of
sections in the newsletter?

WO 478

Which of the following is NOT correct with respect to page, column, and section breaks?

WO 479

Which of the following would be the most appropriate font for a newsletter headline?

WO 480

Which of the following is the default Word column width?


Assume you are creating a two-column newsletter. Which type size is the most reasonable for
the text in the columns?

WO 475
WO 476

WO 481

WO 482

Given the default left and right margins, and -inch spacing between columns, the width of each
column in a two-column document will be:

WO 483

Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot
see any columns on the screen. What is the most likely cause?

WO 484

While word processing, in which of the following situations would Tom use the "Copy"
command?

WO 5
WO 56

What does a document contain?


Before submitting your work you want to find any words spelt incorrectly. Which of the following
would you use?

Op1
Op2
Op3
Inventory Cash
subsidiary disbursem Cash
.
ents.
receipts.

Op4
Ans
Payroll
transactio
ns.
A
Eliminates
Will
the need
produce a Will be
to
Does not more
more
reconcile
require as accurate efficient at control
stringent a set of
producing accounts
set of
financial financial and
internal
statement statement subsidiary
controls. s.
s.
ledgers.
C
NIC Card VSAT

RAM
Control
totals for
Identificati one or
Record
on
more
Count
Number
fields
Storing
Writing on
informatio
a hard
Printed
n on the
board
output
hard disk
Voice
activated Voice
Visual
broadcasti answer
audio
ng
back
board
File
Validity
Boundary protection
check
protection ring
Coloured
spots
Pixels
Pixies
Identificati
on
Reel
File Name number
Number
Storage
Pointing
Printer
device
device

AGP Card B

System
Logs

Data
Dictionary B

Physical
Security

Console
Log

Electricall
y charged An ink
ink
pen
Restrict
physical
access

An inked
ribbon and
print head
Require
Use only user
unremova password
ble media s

A pen

Paper

Eraser

End-of-file
and endof-reel
code
B

None of
above

None of
above
Limited
access
files
None of
above
Batch
Total
None of
above

None of
above
Make
duplicate
copies of
files
None of
above

C
B

D
A

A
C

A
cartridge

A drum

Read
Magnetic
tape
Serial
access
medium
1.44MB
A CDROM
A CDROM
Read
By a
sunny
window
ROM
chips
RAM
chips
ALU
CPUs
0 bits
RAM
chips
Serial
access
medium

Centralise
d function
for PC
Dispositio
n

A cassette A

Distribute
d policies
or
procedure
s
None of
A ribbon above
An INK
None of
RIBBON above
Storage
None of
Size
capacity above
Read and None of
Write
Write
above
Floppy
None of
PAN drive disk
above
Random A parallel
access
access
None of
medium
medium
above
None of
20 GB
700MB
above
Magnetic
A floppy tape
None of
disk
storage
above
Magnetic
A floppy tape
None of
disk
storage
above
Read and
Write
Write
Not
By
magnet
In a
None of
objects
drawer
above
RAM
CDROM None of
chips
chips
above
ROM
DRAM
None of
chips
chips
above
None of
Registers Logic bus above
Control
None of
Registers unit
above
None of
1 bit
8 bits
above
ROM
None of
chips
CACHE
above
A
Random A parallel selective
access
access
access
medium
medium
medium

Centralise
d function
Separatio for PC
n of duties acquisition
A
cartridge A drum
A print
A laser
head
beam
Volume

A ribbon

A
A
C
C
B
A

A
B

A
B

C
B
B
A
B
B
A

Network
software
and
security
software

Systems
software
and
applicatio
n software

Business
software
and
games
software
Mainfram
Supercom Personal e
puter
computer computer

None of
the above B
None of
above

Jon Von
Notebook Supercom Neumann None of
computers puters
computers above

First
Second
Hoover
None of
generation generation generation above

Second
First
Fourth
None of
generation generation generation above

Second
Third
Fifth
None of
generation generation generation above

Second
Third
Fifth
None of
generation generation generation above

Second
Third
Fifth
generation generation generation
Analysis,
Specificati Programm System
on,
ing,
Design,
Design,
Design,
and
and
and
Implement
Testing
Testing
ation
Analysis is This
Analysis the
involves
translates loading of looking at
program programs a system
code of a that
and
high level perform
finding out
language routines to how
to
control
informatio
machine peripheral n is being
code
devices
handled
Inputs,
outputs,
Only
file design
hardware hardware,
and
and
software software

None of
above

None of
above

None of
above

Maintenan
ce,
reliability,
and
upgradea None of
bility
above

To
execute
To collect any
data
programs
Deleted
Copied
from the from the
disk
disk

To
maintain
security
Saved to
the disk

None of
the above D
Transferre
d from the
disk
A

Users
operate
the
manual
system
and
computer
system at
the same
time

Users
operate
the
computer
system
from a
given date

Users
operate
the
manual
system

None of
above

The new
system is
introduced
alongside
the
existing
system

The new
system is
introduced
and users
start
operating
it

Users
continue
operating
the old
None of
system
above

Instruction
s and
technical
document
ation

Log files
and
temporary
files

User
Guide and
technical
document
ation
User
guides
cover how
To enable to run the
any printer system,
to be
enter
For
connected data,
technical to the
save,
support
network
print, etc.
Network
Operating systems Database
systems and
systems
and
communic and
system
ation
backup
services services services
Magnetic
tape
storage
CD-ROM floppy disk

None of
above

None of
above

None of
the above A

Hard disk B

To
maintain a
backup
copy of all
the
To do a
informatio particular
n
task.
Data bus
FDDI

Auto bus
BAD

Data bus

Auto bus

Peripheral
s that are
connected
to a
computer.
binary
form

Operating
system
routines
that
execute in
supervisor
mode.
ASCII
code form

To help
someone
who is
applying
for
employme
nt
Address
bus
TED
Address
bus
Data
structures
that are
part of the
kernel of
an
operating
system.
decimal
form

8 bits
8 bits

represent
ed 256
characters
16 bits

were 7
bits
4 bits
More than
1000
mega
bytes

32
registers
used to
indicate
uppercase
letters
ROM
bits per
second

memory
capacity
have
fewer
instruction
s than
RISC
machines

1000
kilobytes

None of
the above
Control
Bus
MAD
Control
Bus

B
A
B
D

Shells,
compilers
and other
useful
system
programs. D
alphanum
eric form A
represent
ed 127
characters A
32 bits
A

32 I/O
devices

1024
230 bytes bytes
A
a 32-bit
bus or 3232 Mb of bit
RAM
registers D

used to
detect
errors
RAM

is the first
bit in a
byte
DRAM

baud

bytes

is the last
bit in a
byte
B
CROM
A

memory
access
time

Hertz
D
secondary
secondary storage
storage
access
capacity time
B

use more
RAM than
RISC
machines

have
medium
clock
speeds

use
variable
size
instruction
s
D

ALU

Power is
switched
off
a parallel
interface

Registers Variables
Data is
not saved
Computer before
is
computer
improperly is shut
shut down down
a serial
printer
interface interface

dot matrix ink-jet


line printer printer
printer
stores
more
is faster
informatio
to access is nonn than
than RAM volatile
RAM
increased
the
provides
storage
backup
capacity increases power in
of a
the
the event
computer process
of a power
system
speed
cut
has more
storage
is a form capacity
of ATM
than an
card
ATM card
CRT
displays

LCD
displays

Logic Bus A

All of the
above
D
a modem
interface B
laser
printer.

is used
for cache
memory B

none of
the
previous

is an
access
contains
card for a a
security
microproc
system
essor
C
none of
SSGA
the
displays
previous B

having
several
programs
writing
in RAM at
programs none of
the same multitaski in multiple the
time
ng
languages previous

having
several
softwares
running at
the same
time

ALU

the ability
to run 2 or
more
programs
concurren
tly

writing
programs none of
in multiple the
languages previous

Registers Variables Logic Bus B


magazine
brochures s
CD-ROM e-mail
D

to run
more than
one
an
program
multitaski operating at the
none of
ng
system
same time the above C
none of
multitaski multiprogr
the
ng
amming
multiuser previous C
related to
none of
virtual
a form of a form of the
reality
ROM
VRAM
previous D

same as same as
multitaski multiprogr
ng
amming multiuser

save the
file

make a
set up a
backup
password copy
to read
from or
write
informatio to print
n to a
sheets of
floppy disk paper

involves
using
more than
one
processor
at the
same time D
use a
virus
protection
program B

to display
informatio
n or
to
pictures
calculate
on a
numbers
screen
none of
Uses
uses
the
Cobol
Java
uses C++ previous.
106 sec
103 sec
1012 sec 109 sec
a
message
a keypad a mouse a frog
pad
an
instruction
data that
that has
data to be has been the
been
transferre transferre address of transferre
d to
d from
a memory d from
memory memory location
memory.

D
D

an
instruction
data to be
that has
transferre data to be the
been
d to or
transferre address of transferre
from
d to the
a memory d from
memory stack
location
memory A
an
instruction
the
an
that has
an
address of
instruction been
instruction the next
that has
fetched
that has
instruction
been
from
been
to be
decoded memory executed executed D
a scroll
a magic
a cursor bar
a light pen marker
A
Formula

Algorithm Program
Artificial
Assemble
Intelligenc
r
Compiler e
Memory Parity
Range
protection Checking checking
use the
directory search
use the
search
each file backup
tools
in turn
facility
Network Program System
save
copies of
the file
with the
use
same
different keep a
name on filenames record of
the
on the
computer
system
system
failures
Multiproce Time
Multiprogr
ssing
sharing
amming
Floppy
ROM
RAM
Disk

Data

Parity
Checker

Validation B
use find
and
replace
Modem

A
B

backup to
a secure
medium
D
Multiplexin
g
D
Magnetic
Disk
B

Word
Telephon Sharewar
Firmware Processor e modem e
C
Word
Telephon Sharewar
Firmware Processor e modem e
A
Sequential Hashed
Operating
System
ALU

Indexed
CPU

Random
Primary
Storage

C
B

Tracks
and
Sectors

Blocks
and
Sectors

Files and
Tracks

Character, Database, File,


field,
character, record,
database record
field

Schema
and
subschem
a
A

Element,
field, file

Valid
character
check
Sound
card.

Maintenan
ce
diagnostic Systems
program logs
MIDI
CD-ROM interface

Parity
check
Serial
interface

Text

Pictures

Sound

Video

Laser

Dot matrix Ink-jet

Drum

C
A

viewing an
encyclopa
edia CDROM.

creating
the plans
for a
building
design.

replaced
regularly

never
updated

recording
current
presenting stock in a
an order supermar
for stock ket and
to a
answering
warehous customer
e.
queries.
A
updated
updated once a
regularly year
C

Document
processor
make
efficient
use of
time
1024

Graphics
package
retain
confidenti
ality of
files
4096

Database
get into
the
system
quickly
512
loss of
confidenti
ality
TCP/IP

duplicatio virus
n of data infection
HTML
IPX/SPX
printer
access to
can do
the
1000s of
internet is files can pages a
quicker
be shared day
a
a file
subdirecto the root
name
ry
directory

Spreadsh
eet
D
simplify
file
structures C
8192
C
loss of
data
D
NetBEUI A
the
operating
system is
easy to
use
B
the hard
drive

up-line
universal provider
port serial service

uninterrup
table
uniform
power
page
supply
source

the
program
executabl
orphan
e may not
files can allow it to
be left on be
the
uninstalle
system
d

the
system
requires a
network
administra
tor to
uninstall it

data.
Graphical
represent
ation of
logic
Purchase,
sales,
receipt,
payments
etc.

the
system
always
requires a
re-boot
and
defrag
afterwards A

document informatio
s.
n.
text.

Rules
writte in
procedura
l language

Logical
Steps in
any
None of
language the above A

To fill the
log
register

It is
mandatory None of
in tally
the bove

assist in
maintenan speed up
ce
access
IT
senior
managem
executive ent lacks
support
leadership
for IT.
.

prevent
unauthoris allow
ed access encryption C
IT
understan
ds the
business
processin
g.

None of
the above B
All of the
above
D

input.

output.

The use
of
computers
to design
state-ofthe-art,
highquality
products.
specialist
or
functional

Software
that
generates
Using
innovated
computers designs
to do
and
architectur artistic
None of
e.
patterns. the above A
Applicatio
n Service
Provider enterprise local
B

ensure
the
name the filename identify
file
is not lost the file

identify
the file
type

All of the
above are
preventive detective corrective parts of IS
controls. controls. controls. controls.
external
static
dynamic extensible
hashing
hashing
hashing
hashing
A: (a) ,
B: (a) to
C: (a), (b), D: (b), (c),
(b), (d)
(d)
(c)
(d)
corrective preventive detective general
controls
controls
controls
controls
Compone
nt
Interface Settings
(a), (c),
(b), (c),
(d)
(d)
(a) to (d)

Turn the
computer
Press the off at the
reset
power
button.
point.
Ask the
Create the person
files
next to
again.
you.
(a), (c),
(a), (b),
(d)
(c)
organisati
detective onal
controls
controls
(a), (c),
(a), (b),
(d)
(c)

Select the
Shut
Down
option
from a
menu.
Use the
Find or
Search
feature.
(a) to (d)

Control
(a), (b),
(c)

D
A
C
C

B
C

Pull the
power
cord from
the back
of the
computer. C
Put your
hand up
and ask
the
teacher
C
(b), (c),
(d)
C

preventive corrective
controls
controls
C
(b), (c),
(a) to (d) (d)
C
program resolution
problem
change
procedure
logging
call lights requests s
C
unit
data
thread
loop
testing
testing
testing
testing
A
(b), (c),
(a), (b),
(a), (b),
(d)
(d)
(c)
(a) to (d) D
specificati
system
benchmar ons
parallel
walkthrou
k testing matching operations ghs
B

Peripheral
Multiplexe processor Concentra
r.
s.
tor.
(b), (c),
(a), (b),
(a) to (d) (d)
(c)
Replacem
ent
personal Identificati
computers on of
Physical
for user
critical
security of
departme applicatio warehous
nts.
ns.
e facilities.
architectur interface procedura
al design design
l design
ClientComputer
server
Client
network
Star
Bus
Mesh

Job
control
language. D
(a), (c),
(d)
A

Crosstraining of
operating
personnel. B
data
design
A

Star

Bus

Ring

Hub
Ring
All of the
above

To
maintain a
backup
copy of
are written
all the
informatio
n

To do a
particular
job such
as editing,
storing
informatio
n

To help
someone
who is
applying
for
employme
nt

To Store
data in an
organised
manner
B

Direct
Systems
analysis
and
applicatio
ns
programm
ing.
A
sequential
file on a
disk
Tapes can
only be
read by
the
machine
on which
they are
written

Sequential Binary
Data
communic
ations
hardware
and
software.
A
sequential
file on a
tape

Indexed

C
A
D

Operating
systems Computer
and
operations
compilers. .
C
A direct
A direct
access file access file
on a disk on a tape C

Informatio
n formats
commonly
vary
Parity
between
errors will architectur
result
es

Data
record
can never
be
blocked
together C

Data path Control


part
Unit
Local
Distribute Area
d systems network

Can send
data to a
computer
and
receive
data from
a
computer

Mixer
Allows
computer
signals to
be send
over a
telephone
line
Planetary
network
Office
Automatio
n

Wide area
network
Protocol

Use the
computer
to which
they are
connected
to perform
all
processin
g
operations

Generally
require a
keyboard
for data
entry and
a CRT for
display

Modem

Multiplexo
r

Are
required
with a
microproc
essor
which
permits
some data
processin
g such as
input
validation D
Time
sharing
computer C

Aids in
back-up
procedure
s
Ring
Network

Packs
data in a
disk file
Loop
Network

Speeds
up online
printing
Star
Network

Executor
systems
An
A dumb
intelligent
workstatio workstatio
n
n
Time of
day
control
Encryption
locks
algorithms

Type of
cable

Address Input
calculation output
part
channel

Terminal
Standard

A
D

Electronic Instant
mailing
post-office C
A
A
personal mainfram
computer e PC
B

Parity
checks

All of
them
C
Device
Communi interconne
cation
ct
protocol
standard D

A
compiler
converts
the whole
A
of a
compiler higher
does a
level
conversio program
n line by code into
line as the machine
program code in
is run
one step
Feasibility
study,
system
design,
and
testing
CRC

Implement
ation and
document
ation
Baudot

An
interpreter
does the
conversio
n line by
line as the
program
is run

An
interpreter
is a
represent
ation of
the
system
being
designed

Modem

Demodula
tor

High-level
languages
It is faster
than
parallel
communic
ation

A
compiler
is a
general
purpose
language
providing
very
efficient
None of
execution the above B
Lexical
analysis,
CONVER
SION, and
code
generation
ASCII
An
interpreter
is a
general
purpose
language
providing
very
efficient
execution
Frequency
division
multiplexo
r

None of
the above D
EBCDIC A

None of
the above A
Time
Division
Multiplexo
r
C

Middlelevel
Low-level None of
languages languages the above C

It is less
It is less prone to
error
attenuatio
prone
n
Accountin
Financial Graphic
g
sector and design
systems,
engineerin and
commerci
g
education al sector

Uses only
one path D

None of
the above C

Manage
Communi the paging
cate with function in
the
a virtual
console
environme
operator nt
Specificati
on and
System
design
Analysis
Fiber
Coaxial
Optics
Cable

Relieve
the main
CPU of
repetitive
communic
ation
tasks

Testing
Common
carrier
System
The
System
Analysis
design of Analysis involves
the screen defines
creating a
the user the format formal
will see
and type model of
and use to of data
the
enter or
the
problem
display
program to be
data
will use
solved
An
A cache interface A buffer

The
different
types of
network to
be used
Star

Testing to
check for
errors
before the
system is
introduced
Packet

Reduce
competitio
n between
the
input/outp
ut devices C
None of
the above B
Telephon
e Lines
C

None of
the above C
An online
protocol
B

Hardware,
Software
and size
of
None of
program. the above
Ring
Bus
None of
10101010 1100101 1010101 the above
Cyclic
Retransmi Redundan Hash
Parity
ssion
cy
Count
None of
15
4
64
the above
Multiplexo Acoustic
Port
Modem
r
coupler
None of
327
141
97
the above
Data
Data
Data
managem
warehous Mining
ent
All of
e
tools
systems them
secondary
memory secondary storage
memory access
storage
access
capacity time
capacity time

B
B
C

A
A
C
B

5C4
16 bits

None of
the above
alphanum
eric form
None of
the above
32 bits

Bit Code
Design

None of
the above D

210 bits

210 bytes
None of
the above
alphanum
eric form
None of
the above

30
binary
form

255
256
ASCII
decimal
code form form

4C5
4 bits
Basic
Coding
Descriptio
n

1B7
8 bits

1024 bits
10000
binary
form

Binary
Coded
Decimal
1000
bytes

1112
1110
ASCII
decimal
code form form
Numeric
Keyboard Keypad

Mouse
used to
indicate
used to
uppercase detect
letters
errors
Because it
squeaks
when
moved
bits per
second
Touch
screen
BPS
Printing
letters

OCR
Touch
screen
increased
the
storage
capacity
of a
computer
system

B
A
A
B

A
A
A
A

is the first is the last


bit in a
bit in a
byte
byte
B

Its moves
like a
None of
mouse
It has ears the above D
baud

bytes

Hertz
None of
Light pen Joystick
the above
MIPS
MHz
VLSI
Tracing
Reading None of
diagrams bar codes the above
voice
barcode recognitio
MICR
scanning n
CD-ROM None of
Hard disk drive
the above

provides
backup
increases power in
the
the event
process
of a power
speed
cut
Light
Refillable Pencil
sensitive
ink
lead
elements
100K
1.44 Mb 5 Mb

none of
the
previous

D
C
B
B

B
A

None of
the above C
1 Gb
B

hardware software

input

Mouse
Touch
screen

Printer

Printing
letters
Touch
screen

Mouse
Credit
card

output
Numeric
Keyboard Keypad
Light pen Joystick
Reading
Tracing
Bar
Diagrams Codes

Scanner C
Digital
Signature
s
B
CD ROM
Hard disk Keyboard Drive
A
Optical
Bar code mark
reader
reader
Keyboard B
Mouse

Writing on
a hard
Printed
board
output
Coloured
spots
Pixels
Storage
Printer
device

Speakers
Storing
informatio
n on the
hard disk

Printer

Pickers

Mouse

Bar code
reader

Pixies
Pointing
device
Optical
mark
reader

CRT
displays

LCD
displays

SSGA
displays

screen
layout

mouse
button
layout

Mouse

Bar code
reader

keyboard
layout
Optical
mark
reader

language software
hardware interpreter interface
Credit
Smart
card
Speakers card

Back-up
on a
Cartridge B
B

CD-ROM A
None of
the above
none of
the
previous B
word
processin
g software C
None of
the above B
an
operating
system
C
None of
the above A

having
several
programs
writing
in RAM at
programs none of
the same multitaski in multiple the
time
ng
languages previous

having
several
programs
in RAM at
the same
time

The ability
to run 2 or
more
programs
concurren
tly

writing
programs none of
in multiple the
languages previous

To run
more than
one
an
program
multitaski operating at the
none of
ng
system
same time the above C
First generation
computers
.

Fifth generation
computers
.
A
none of
multitaski multiprogr
the
ng
amming Multi-user previous A
Vishwajee
t
Deep Blue Param
Arjun
C
is due to none of
is caused caused by bad disk the
by wear
overuse
blocks
previous C
Magnetic
Ink
Optical
Character
Bar code Mark
Recognitio Image
Reader
Reader
n
Scanning
Technolog Technolog Technolog Technolog
y
y
y
y
B

a fast
interpreter
Drum
Printer
encrypting
it
Very
important
reader
user
sequence

Second generation
computers
.

Third generation
computers
.

converts a
program
slower
to
none of
than an
machine the
interpreter code
previous
Dot Matrix
Desk - jet Thermal
Printer
Printer
Printer
decrypting compressi transmittin
it
ng it
g it
Vital
informatio Virtual
n
informatio
resource n reader &
under
user
None of
siege
system
above

A
C

Electricall
y charged
ink
mainfram
e
technolog
y
10-6 sec

data to be
transferre
d to
memory
Contingen
cy
Planning
Limit
checks
array.
Wide
access to
various
data base
ACL
A sample
of
transactio
ns
Tests of
details of
transactio
ns

Macros
clipboard
search

Thermal
Paper

An ink
pen

LAN
technolog
y
10-3 sec

WAN
technolog
y
10-12 sec

An inked
ribbon and
print head D

Unix
operating
system
B
10-9 sec D
an
instruction
data that
that has
has been the
been
transferre address of transferre
d from
a memory d from
memory location
memory C
System
feasibility Capacity Exception
report
Planning reporting C
Cross
Control
External footing
figures
file labels tests
C
constant. function. formula. C
Can
extract
Can
and
Can aid in define the
analyse
simple
audit
data
selection objectives D
High End All of the
IDEA
CAATs
above
D
A utility
A special
software purpose
programm written
None of
e
program the above A
Complian
Analytical ce tests of
review
general
procedure EDP
All of the
s
controls
above
D
Action
Event
General
Procedure Procedure Procedure
s
s
s
D
file
field
layout
B
field
record
sort
names
grab
D

A way to
analyse
and
manipulat
e
numerical
informatio
n

An
organised
way of
A tool to storing
produce informatio
high
n about a
quality
set of
A way of
document similar
maintainin
s
things
g a log
C

It contains
all the
Informatio data about
n about
one
certain
specific
programs item
remote
relative
DBMS
DBMS
storing
data
offline at a
separate
site
Key
verificatio
n

A
document
which
contains
text
Relational
DBMS

A
collection
of files
B
Reliable
DBMS
C

uses tape
as
opposed
to disk
C
Database
Computer access
matching controls
D
An
A way to
organised
analyse
way of
and
storing
manipulat A tool to informatio
e
produce n about a
numerical high
set of
informatio qualitydoc similar
None of
n
uments
things
the above C
backing
up data
regularly
Computer
sequence
checks

It contains
all the
Informatio data about
n about
one
certain
specific
programs item

is related
to data
mining

A
document
which
contains None of
text
the above B

Reports
allow
users to
extract
informatio
n as hard
copy
(printed
output)

Reports
provide a
very
flexible
way of
creating
and
editing
document
s

A tool
which
allows text
and
graphics
to be
placed in
document None of
s
the above A

Extracting
and
analysing
data

Spreadsh
eets make
data easy Using
to analyse queries
Word
processor
s,
Compilers Network spreadshe
,
software, ets,
interpreter backup
databases
s, editors systems , DTP
DEFAULT
and NOT
NULL
constraint
s
CHANGE
TABLE
remote
DBMS

FOREIGN
KEY
constraint
s
MODIFY
TABLE
relative
DBMS

storing
data
offline at a backing
separate up data
site
regularly

PRIMARY
KEY and
UNIQUE
constraint
s
ALTER
TABLE
Relational
DBMS

None of
the above C

None of
the above C

IDENTITY
columns C
UPDATE
TABLE
C
Reliable
DBMS
C

uses tape
is related as
to data
opposed
mining
to disk
C

Descriptio Compone
n
nt
Source
D
keeping
the
saving the
keeping a original
file with
using a
backup
paper
different
password copy
copy
filenames A
the
the
product
primary
mail
code
key
merge
e-mail
C
A
database Graphics browser
e-mail
A
Number

bookmark
s
operators wildcards engines
Auto
AutoNum
Primary
Auto ID
ber
Auto Key
forms in a
database
are
consistent
with the
underlying
tables or
queries.

C
C

records in
a dynaset
are
consistent
with the
underlying
tables.

related
tables in a
database
are
consistent
with one
another.

foreign
key.
the
primary
key of
both
related
tables.

query and
main form its
report and
and a
associate its related
subform. d dynaset. query.
A
not a
the
primary
primary
a field
key of
key of the from an
either
related
unrelated related
table.
table.
table.
B

One-toone

One-tomany

Many-tomany

reports
are
consistent
with the
underlying
tables or
queries.
B

Many-toone

EmployeeI CompanyI Employee Company


D
D
LastName Address A
The Tools
menu,
Relationsh Referentia The join
ip window l integrity line
Right-click
the
Relationsh
ip line,
Select
then
Undo in
select
the
Double
Delete
Relationsh
click the from the ips pullRelationsh shortcut
down
ip line
menu
menu

The oneto-many
relationshi
p
B

Click the
Delete
Relationsh
ips button
on the
toolbar
B

That there
are
several
customers
associate
d with that
ID

That
records
That
That there can be
some of are
added by
the data is records in clicking on
not
a related the plus
viewable table
sign
C
They
cannot be They must
They must They
AutoNum be the
both be
cannot be ber data same data
numbers text fields types
type
D
The
customer
s ID is
deleted
from the
Customer
s table,
The
and all the
Nothing, customer related
Access
s ID is
loans are
ignores
deleted
deleted
the
from the from the
attempted Customer Loans
command. s table.
table.

An error
message
is
displayed. D

The
subform is
an object
on the
The
form and
subform is The
can be
displayed subform is moved or
The
in
displayed sized like
subform is Datasheet in Form
any other
not visible. view.
view.
object.
D

A one-tomany
relationshi
p between
teams and
players

A one-tomany
relationshi
p between
teams and
coaches

A one-tomany
relationshi
p between
coaches
and teams

A many-tomany
relationshi
p between
players
and teams C

Either
table at
any time
prompt,
title bar
text, icon.
Dim
CreateList
.
A check
box
enables
the form
user to
choose
from one
of several
existing
entries.

The
Customer
s table
only when
there are
Loan
records
associate
d with that
customer

The
Loans
table at
any time
title bar
text,
prompt,
icon.

Neither
table

prompt,
title bar
icon, title
text, icon,
bar text.
prompt.
B
Sub
CreateList CreateList
.
.
Sub.
B

A text field
enables
the form
user to
choose
from one
of several
existing
entries.
must be
must be set for
set for
multiple
one word. words.

help
people
keep track store data
of things. in tables.
relationshi
data.
ps.
facts.

figures.

singleuser
database
applicatio
n

multiuser
database
applicatio
n

A dropdown list
enables
the user
to choose
from one
of several
existing
entries.

A dropdown list
enables
the user
to enter
text.

does not must be


have to be set for two
set.
words.
C
maintain
data on
create
different
tables of things in
rows and different
columns. tables.
A
all of the
metadata. above
D
informatio
n.
a and b
D
ecommerc
e
database
applicatio
n
a or b
A

singleuser
database
applicatio
n

ecommerc
multiuser e
database database
applicatio applicatio None of
n
n
above

Sequential
Query
Language
(SQL)

Structured
Question
Language
(SQL)
Database
Database Managem
Modeling ent
System
System
SQL
Jet
Server

The user
the
database
applicatio
n(s)
interact(s)
with the
DBMS
creates
queries

the user

Structured
Query
Language
(SQL)
Data
Business
Model
System

Relational
Question
Language
(RQL)
C
Relational
Model
Manager B

Oracle
a and b
The
database
The
managem
database ent
applicatio system
All of the
n
(DBMS)
above.

the DBMS
accesses
the
database
data
creates
form

None of
above
creates
reports
the
database
the
managem
database ent
applicatio system
n
(DBMS)

all the
users'
data is in
one place
holds user
data

it reduces
data
duplicatio
n
holds
metadata

tables

metadata

it contains
a
descriptio
n of its
own
structure
holds
indexes
stored
procedure
s

All of
above

b and c

the
database B

All of the
above.
All of the
above.
All of the
above.

C
D

from
existing
data
from
existing
nondatabase
data

as a new
systems
developm
ent project
as a new
systems
developm
ent project

from
existing
data

as a new
systems
developm
ent project

data
marts

normalizat
ion

data
marts

normalizat
ion

data
marts

normalizat
ion

data
marts

normalizat
ion

file
hierarchic
managers al models

entities in
a column
vary as to
kind
table
record

the order
of the
columns
is
important
relation
field

record

field

record
composite
key
Insertion
anomaly

field
primary
key
Update
anomaly

as a
redesign
of an
existing
database a and b
as a
redesign
of an
existing
database a and b
as a
redesign
of an
existing
database a and b
entityrelationshi
data
p data
models
modeling
entityrelationshi
data
p data
models
modeling
entityrelationshi
data
p data
models
modeling
entityrelationshi
p data
data
modeling migration
relational
network
data
models
model
more than
the order one
of the
column
rows is
can use
unimporta the same
nt
name
row
field
key
tuple
composite foreign
key
key
foreign
candidate
key
key
foreign
surrogate
key
key
Deletion All of
anomaly above

C
D
C
C
D
B
D

assess
the
existing
tables'
structure
and
content
are
supplied
by several
wellestablishe
d
manufactu
rers

They use
sophistica
ted
mathemati
cal
technique
s.

create
move the
design the one or
data into
database more new the new
structure tables
database A

were
essentially
killed off
by MS
Access
Their
report
delivery is
more
difficult
than
report
delivery
for
reporting
systems.

are not
have poor true
response DBMS
time
products

Nonintegr None of
ated data the above A
a "wrong
inconsiste nonintegra format"
dirty data nt data
ted data problem B
a "wrong
inconsiste nonintegra format"
dirty data nt data
ted data problem D
data
warehous
data
e
warehous databases
e data are do not
not stored have
in tables. metadata.
Form
Table
Forms
and
Queries
reports
and tables

data
warehous
e data are
often
denormali
zed.
b and c
Report
Query

Macros

C
A

Spreadsh
eets
D

The Link
Tables
command
can be
used to
associate
the tables
in one
database
with the
objects in
another
database.

It will be
easier for
the user
to
upgrade it
if the
objects
are in one
database
and the
tables in
another.
An
applicatio
n may
consist of
multiple
databases
, each
with
multiple
objects,
linked to
yet
another
database
containing
only
tables.

Import

Link

It will be
easier for
the user
to
upgrade it
if the
objects
and tables
are in one
database.

It contains
tables,
It contains reports,
more than queries,
one table and forms
Menu
Wizard

Build
Menu

All objects
in an
applicatio
n,
including
the tables,
must
reside
within the
same
database.

Regardles
s of how
the
objects
and tables
are
stored,
the user
will have
to reenter
the data in
the tables
when the
applicatio
n is
upgraded. B
An
applicatio
n can be
created in
such a
way that it
objects
such as
forms and
reports
can be
changed
without
disturbing
the
existing
data.
C

Merge

Join

It contains
a user
interface,
or
switchboa
rd
Interface
Design
Wizard

It contains
macros
C
Switchboa
rd
Manager D

It is
advisable
to put
each
object and
table into
a
separate
database.

create
backups
for
mission
critical
corporate
data.
Decryptio
n
Using
data
encryption
.
Unaltered
in
transmissi
on.

put key
business
centralize informatio
the
n into the
managea hands or
bility of
more
data
decision
collection. makers.
Cipher

Encryption

Conductin
g fraudawarenes
s training.
Received
by the
intended
recipient.
The
private
Both
The
key is
sender
private
used by
and
key
the
receiver
cannot be sender for
must have broken
encryption
the private into
but not by
key before fragments the
this
and
receiver
encryption distributed for
method
to the
decryption
will work. receiver. .

Collision.
Error
checking

Performin
g validity
checks.
Not
intercepte
d en
route.

Failure of
server
Data entry duplicatin
errors.
g function.
Low cost
Data
of
Integration operation

Competiti
ve
Corporate Industrial
espionage espionage espionage
Contact
numbers
A list of
of the
competitor managem Research
s clients ent group data

store all
corporate
transactio
n data in
one single
location.
Cryptogra
phy
Reviewing
the
systemsaccess
log.
Sent to
the
correct
address.
The
private
key is
used by
the
receiver
for
decryption
but not by
the
sender for
encryption
.

C
C

Firewall
vulnerabili
ty.
D
Quality
managem
ent
B

Economic
espionage C
A
competitor
s new
project
B

singleuser
database
applicatio
n

multi-user
database
applicatio
n
Keeping
Replying messages
promptly short

ecommerc
e
database
applicatio
n
Including
the
Subject

None of
above
Using all
capital
letters

Security at
the
transactio
n phase in
EDI
systems is
not
necessary
because
problems
at that
level will
be
identified
by the
service
provider. C

Removabl
e drives
that can
be locked
up at night
provide
adequate
security
when the
confidenti
ality of
data is the
primary
risk.
A dark
wide
border

Message
authentica
tion in EDI
systems
performs
the same
function
as
segregatio
n of duties
in other
informatio
n
systems.

Encryption
performed
by a
physically
secure
hardware
device is
more
secure
than
encryption
performed
by
software.

A dotted
border

A blinking
No border border
A

8,16,32

2,4,2
the row is
too short
to show
the
number at
the
current
font size

2,2,2

the
column is
too narrow
to show all
the digits
of the
number
flexibility
speed of of moving
calculation entries

either b or
c
C
cost of
initial setup
D

graphical
Address
Writing
letters

database
Gap
Drawing
pictures

spreadshe
et
D
Rows
A
Document
filing
A

your
formula
has a
syntax
error
ability to
generate
tables
word
processin
g
Range
Producing
graphs

6,8,10

drag from
the top
cell in the
doublecolumn to
click any the last
cell in the cell in the
column
column
CTRL +
ENTER
ENTER
array.
function.
(201)555100
1212.
Cell
reference
s
Functions
^
/

B5*B6

C3/D4

E12

It is
surrounde
d by a
heavy
It is
border.
blinking.

click the
column
heading

click the
column
label

TAB
constant.

INSERT
formula.

A
B

Tom
#VALUE! McKenzie. C
Numeric Text
constants constants
*
\
It is
impossibl
e to
determine
D4^2
.
SUM(H9: G7*SUM(
H11)
H9:H11)

C
B

The
phrase
active
It is
cell
displayed appears in
in reverse the Status
video.
bar.
A

By either
clicking in
a different
cell or
By using using the
the arrow arrow
By clicking keys to
keys to
in a
move to a move to a
different different different
cell
cell
cell

The
Standard
toolbar

D
D

By typing
the
reference
of the cell
you want
to move to
in the
formula
bar
C
The Font
The Cell Size
Format
command
The
command on the
Formattin on the
Tools
g toolbar Edit menu menu.
B

the New
command
on the File
menu.
File

the Save
command
on the File
menu.
Edit

Preview

Details

Insert

Delete

Clear
Orientatio
n (portrait
or
landscape
)

Delete

Headers
and
footers
Page
Setup

the Save
As
command
on the File
menu.
View

the File
Type
command
on the File
menu.
C
Window A

List
Properties B
Both
Insert and
Delete
Clear
C
Both Clear
and
Delete
Remove B

Fonts

Margins

View

Edit

range.
D12, G25
destinatio
n range.
destinatio
n range.

group.
D12:G25

B
C

The
Duplicate
command
absolute
B4

The Copy
command
relative
$B4

The Paste
command
mixed
B$4

cell group.
D
source
range.
source
range.
Both the
Copy and
Paste
command
s
constant
$B$4

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

Options
worksheet
.
6
copy
range.
paste
range.

clipboard.
clipboard.

D
B

D
A
D

#DIV/0!
C
Both the
Cut and
Paste
The Move The Cut
The Paste command
command command command s
D

the Fill
Handle

cycle
through
absolute,
relative,
and mixed
cell
reference
edit cells. s.
the
the
Format
Formattin
Painter
g toolbar

cycle
through
open
applicatio
ns.
C
Condition
al
formatting B

Select the
Insert
Hyperlink
command
from the
File menu.

Click the
Insert
Hyperlink
button on
the
Standard
toolbar.

Doubleclick a cell
and click
the Insert
Hyperlink
command. B

copy and
paste
cells.

whether
the cell
has a
formula or
a value in the cell
it.
address.

Right-click
a cell and
click the
Edit
Hyperlink
command.
whether
the cell
has an
absolute
or a
relative
cell
reference.

the value
in the cell D
text with
either a
two-digit
or fourdigit year,
text with a text with a
depending
two-digit four-digit
on the
year.
year.
an integer. format.
C
It is
impossibl
e to
determine
from the
29/03/200 informatio
Jul-30
Aug-31
8
n given.
B
subtractin
g the
subtractin adding the
earlier
adding the g the later later date
date from earlier
date from to the
the later date to the the earlier earlier
one.
later one. one.
one.
A
the F4
the F2
the Esc
the F1
key.
key.
key.
key.
B

a cell on a
worksheet
a
.
a variable. constant.

Either 3/4
or .75,
depending
on the cell
formatting C
either a
cell on a
worksheet
or a
variable. D

B1-G10

B1.G10

B1;G10

B1:G10

AVERAG
E

COUNT

MAX

SUM

Line

Pie

Scatter

Once a
column
chart is
chosen it
cannot be
changed
to a bar
chart.

Once a
pie chart
has been
chosen it
cannot be
changed
to line
chart.

Once a
line chart
has been
chosen it
can be
changed
to a pie
chart.
D

hold down hold down


the CTRL the SHIFT
key
key
Create
four
Use
separate
tables
files

hold down
the ALT
key
Transfer
informatio
n to a
database

hold down
CTRL +
SHIFT
A

03-Apr

Combinati
on
Once a
bar chart
is chosen
it cannot
be
changed
to a
column
chart.

0.75

Paste

Fill Down

Tools |
Sort
Analyse
data

Data |
Sort
Calculate
data

click the
Print
button

press the
PRINT
SCREEN
key

March 4
of the
current
year

Use
multiple
sheets
Paste
Fill Right Special
none of
Edit | Data the
| Sort
choices
Create
None of
forms
the above
select
Print
select
selection Print
on Page selection
Setup |
in the
Sheet
Print
and then dialog and
print
then print

D
B

B
C

producing
graphs
(D4+C2)*
B2

writing
letters
D4+C2*B
2
=A3SUM:
B3SUM:C
3SUM

drawing
pictures

None of
the above A
=(B2*(D4+
#VALUE! C2)
C

portrait

REF!
whatever
was last
landscape used

AD213

ZA1

None of
the above B

sending
storing
storing
informatio data on
data on a n to a host the hard
disk drive computer drive

vertical
A
None of
the above C
receiving
informatio
n from a
host
computer B

Bandwidth Speed

Channel

Retrieve
Message
Digest

Formula

A0

Size

Find
Save
Browse
Photograp Digital
Cryptogra
hy
Signature phy
Hash
Key
Lock
Function

User-id
Password Name
Address
Penetratio
Cryptogra Password
n
Retrieval phy
Cracker
Regulatio
Acts
ns
Address Protocols
Unauthori
Spoofing Imposting sing
Approving
Loss
Threat
Exposure Hacking
Sales Income tax
tax
authorities authorities
Pirated
Utility
software
Tim
Berner
Lee
Hoffman
Etrade.co Amazon
m
.com

Automate
d Tailor
Any Time
Machine Money
Regulatio
Acts
ns

B
A
D
A
B

Police
Judge of a officer of
civil court IPS rank. B
Virus

Cracker

Charles
Bubbage

Howard
Aiken

Dell .com Msn .com B


Asynchron
ous
Transmiss None of
ion mode above
Address

Protocols C

Router

Gateway

Port

Pin

LAN
hyper
terminal
tracing
program
National
Informatic
s Center
Only
Computer
s

WAN

CAN

PAN

hypertext
tracing
program
Network
Interface
card

hypertext
transfer
protocol
New
Informatio
n Card

hypertext
tracing
protocol
C

Can not
Only
computers printers

Combines
connectivit
y of a hub
with the
Concentra traffic
tes
regulation
connectivit of a
y
bridge
Bridges
and
Two or
Repeaters more
.
networks

None of
the above B
None of
the above D

Switches
data from
incoming
ports to
outgoing All of
ports.
Above

RG7U

Bridges
Hubs and
and Hubs nodes
None of
frames
Packets the above
virus
gateway router
checker
None of
Two
Four
the above
Data-Link Network All of the
Layer
Layer
above
Coaxial
Twisted
cable
Fiber
pair

Physical
address

Logical
address

A cable

Hub

Data
return to
the
sender

It continue
on to
target
device
It gets
with
destroyed corrupt
None of
bit by bit. data
the above B

bits
firewall
One
Physical
Layer

B
C
A
C
D
B

A memory None of
address
the above B
None of
Router
the above B

Wireless
technolog
y
Physical
Layer

Wired
Technolog
y
Data Link
Layer

Ultra violet
technolog
y
Network
Layer

Binary
48 Bits

ASCII
48 Bytes

Octal
48 KB

software
that
facilitates
connectio
n to the
internet

a list of
rules for
transferrin
g data
over a
network

a gateway
calling
software program
that allows for
file
internet
copying
bridging
B

None of
the above
All of the
above
None of
the above
48 MB

Network
Novell PC Client
Server
PC
If the hub If the hub
goes
goes
down, it
down, it
If one
brings
brings
node goes down all down all
down, it
of the
of the
brings
nodes on nodes on
There isn't down the that
all of the
one
entire ring section
rings
Physiolog
Both A
None of
y
Topology and B
the above
All of
Bus
Star
Ring
above
Both A
Linear
Parallel
and B
None
Both A
Parallel
Circular
Linear
and B

A
D
A
A

B
B
D
A
B

Ring

Bus

Star

Mesh

Ring
Star

Bus
Bus

Star
Linear

Mesh
Ring

B
C

Ring
Network
Layer

Bus
Star
Transport Physical
Layer
Layer

Mesh
A
Data Link
Layer
D

Ethernet,
token ring,
DecNET
bps
bps

Ethernet,
token ring,
FDDI
kbps
Kbps

Ethernet,
token ring,
ARCnet
B
mips
B
Mips
C

Ethernet,
DecNET,
FDDI
mbps
Mbps

depend on
the
transmissi
on
medium
Windows
a modem 95

usually
higher
than LAN
speeds
CD-ROM
drive

measured
in bytes
per
second

must use
the World
Wide Web
key
gateway
interface

must use
electronic
mail
uniform
resource
locator

must have
a LAN
account
common
gateway
interface

used to
browse
the Web

is a
protocol
for the
transfer of
files
is part of between
Netscape computers D

limited by
modem
speeds
C
Netscape B

All of the
above
A
applicatio
n protocol
interface C
connects
interfaces a
a Novell used to
a modem computer
Interface control a to a
to a
Controller printer
computer network
D
CD-ROM
Windows
drive
a modem package Netscape B
Novell
Windows None of
Linux
Netware NT
the above C
have to
do with
compressi have to
on of
do with
none of
graphics Web
the
the
and video pages
Internet
previous A
use
appropriat
e
must use must use must have communic
the World electronic a LAN
ations
Wide Web mail
account
software A
none of
the
Printer
modem
bridge
previous D
provides
access to
is a CPU
the
is a CPU functional make of
Internet
register
unit
processor A

used to
send
email

used to
send
email

uses
wireless
communic
ation
is part of None of
medium
Netscape the above D

used to
protect a
computer
room from
fires and
floods
a backup
server

a screen none of
a form of saver
the
virus
program previous
an email a poor file
server
server
none

IR system
for the
hardware Internet
browser

none of
the
previous
search
CD-ROM clip-art file engine

D
D

scanner
provides
access to
the
is a CPU
Internet
register

is a CPU
functional make of
unit
processor A

used to
send
email

is a
protocol
for the
transfer of
files
is part of between
Netscape computers D

used to
browse
the Web

is a
protocol
used to
uses
that allows
send
telephone is part of for remote
email
lines
Netscape login
D
Any layer
Any layer can
can
communic Any layer
The layers communic ate only
can
cannot
ate
with the
communic
communic directly
layer
ate only
ate with
with any directly
with the
one
other
above or layer
another. layer.
below it. above it. C

It is made
up of
many
networks
connected
into
transmissi
on lines
It is one
called
large
backbone
network. s.
Password System
cracking intrusion
used to
protect a
computer
room from
fires and a form of
floods
virus
Flood a
Web
server
with
IP flood
requests
hack
packet
firewall
router
a backup an email
server
server
Apply
security
patches

It works
the same
way as a
local
network.
Denial of
Service

Individual
computers
can
connect to
it using an
ISP.
A
Port
sniffing
C

a screen
saver
program

none of
the
previous

Virus that
initiates a
ping flood UDP flood A
flood
traffic
C
switch
hub
B
a poor file none of
server
the above D

Update
Backup
Limit
virus
data on a logging on
definitions daily basis access
C

Only large
namerecogniza
ble sites
are safe.
Use of
Use of
logical
Use of
password access
identifiers s
methods
All sites
are safe
and
reliable.

by
attaching
to an email.

There are
safe and
unsafe
sites.

through
an FTP
port.

ActiveXenabled
sites are
safe.

Use of
encryption
methods D
by
scanning
the
by
computer
attaching for a
itself to a connectio
document. n.
B

Phone
A Trojan
horse

E-mail

Web
traffic

Applicatio
n updates D

Adware

A worm

Spyware

Modems
cookies
and
Trojan
horses.

Protocols
Trojan
horses
and key
loggers.

Multiplexo
rs
LAN
key
cookies
loggers
and key
and
loggers.
worms.

An attack
on a
system for
personal
gain

An attack
with the
purpose
of gaining
publicity
Disruption
in
Economic communic
damage ation
Crashing
the stock Shutdown
market, as of military
in the
security
1930s
systems

Changing
the
Giving out content of
disinforma a Web
tion
page
D
Disruption All of the
in supply above are
lines
correct.
D
Shutdown
Contamin of nuclear
ating
plant
water
safety
systems systems D

To obtain
an
accurate
inventory
of network
related
To
equipment
To carry To
improve
and parts
more
improve
system
and
network
network
response network
capacity services time
nodes
D
limit
stop its
update its
access to competitor prices as
set its
computer s seeing soon as
prices
owners
their
they are
very high only
prices
changed D
Yahoo
USA
People
People
People
Lycos
Search
Search
Search
Search
B
Name of Date of
Personal Criminal
your bank birth
assets
records
A
Virus
Fraud
Adware
Spyware B

buy
stocks.
Shill
bidding
Internet
stalking.
pop-ups.
Use a
fake email
address.

invest
without
risk.

make
large
amounts
of money
by parking
purchase funds in
off-shore their bank
property. account. D

Phishing
cyber
stalking.
cookies.

Siphoning
virtual
stalking.
spam.

Never use Use a


your real proxy
identity.
server.
Message
Physical sequence
Security number
Encryption controls
checking
I only
irc

II only
ftp

Internet
Explorer

Use antispyware
software.

Logical
access
controls
Neither I
Both I & II or II
www
telnet

Adds
more
Verifies
Increases
bytes to
integrity of boot up
programs files
time

HTML

Hoaxing
Web
stalking.
viruses.

Microsoft
Excel

round trip
HTML
HTML
document. document.
.con is
.com is
.co in
used for
used for used for companie
company company s
Web
query.

the World
Wide Web
round trip Consortiu
HTML.
m
HTML.
XML.
HTML.
DHTML.

B
B
B

B
C
C

Misleads
a program
recompilat
ion
B
both
HTML and
Internet
Explorer B

Web
browser.

None of
the above A

one way
HTML.
MHTML

C
D

using
Internet
Explorer
to view a
Web page
that is
stored on
the hard
drive on
your
computer
Click on
the Back
arrow until
the
desired
site is
found

clicking a
hyperlink
that
reference
sa
updating document
the values that is
that are
stored in
obtained the floppy
through a drive on
Web
your
query
computer

Click on
Go to or
Search in
the
browser

viewing an
Excel
worksheet
that you
have
saved as
a Web
page.
B

Go to the
History
page and
look for
the site

Go to the
Bookmark
s or
Favorites
page
C
the
the
the Insert the
External
Refresh
Hyperlink Update
Data
command command command command A
Screensa
Hyperlink ver
Sound
BMP
GIF
JPEG
Add it to
Write it
Favourite
Save it to down on a s or
a floppy
piece of
Bookmar
disk.
paper.
ks.
privileged
extranet. intranet. network.
an
attachmen a
t.
signature. a footer.
VoIP
IPT
IPP
Desktop Desktop Desktop
client,
client,
server,
applicatio software, applicatio
n, and
and
n, and
database. hardware. database.
Telephon
Modem
CD-ROM e line
File
File
Transmiss File
Transfer ion
Transfer
Program Protocol Protocol

Video
TIFF
Cut and
paste it to
a word
processor
document.
network
topology
an
encryption
.
PoIP
Desktop
server,
software,
and
hardware.
None of
the above

C
C

C
A

B
A

A
B

None of
the above B

So
computers
can be
reference
d by a
name
193.1.2.3
paul .trigg
@
domain.
org. uk

So IP
addresses
can be
shorter
45.1.1.1

So email
is
delivered
faster
143.215.1
2.19

None of
the above A
None of
the above D

paul.trigg
@domain. paul.doma None of
org.uk
in.uk
the above B
Scientists
The US
in
governme Switzerlan
None of
nt
d
No-one
the above C

It will be
deleted
Hyper
Textual
Mark-up
Lingo

Internet
Remote
Conversat None of
ions
the above A
A letter
It will be will be
waiting for sent to
you to
you in the None of
collect it post
the above A
Hyperlink Hyper
Text
Text MarkMarking
up
None of
Language Language the above C

Receiving
messages
automatic
ally from
anyone in
the group

People
discussing
a topic of High
interest
volumes
globally
of email

Internet
Relay
Chat

Internation
al Relay of
Character
s

None of
the above C
Database
Applicatio
managem
n
Utility
Operating ent
Software Programs system
system
C
Deleted
Copied
from the from the Saved to None of
disk
disk
the disk
above
A
Address None of
Data bus Auto bus bus
above
A
Address Control
None of
Data bus bus
bus
above
C
Personal Parallel
Super
None of
computers computers computers above
BPS
MIPS
MHz
VLSI

A
B

OCR

MICR
caused
is caused by
by wear
overuse

barcode
scanning
is due to
bad disk
blocks

voice
recognitio
n
B
none of
the
previous B

converts
a program
slower
to
none of
a fast
than an
assembly the
interpreter interpreter code
previous

faster
than a
compiler

translates
and
executes
programs
statement
by
statement

converts
a program
to
none of
machine the
code
previous

encrypting decrypting compressi transmittin


it
it
ng it
g it
C
an
a
assembler compiler

an
interpreter a linker

the power None of


the ALU the CU
cord
the above
A runtime
You need
error can
to carry
result if
The
out
the user
program conditiona
clicks the A compile executes l
cancel
time error without
compilatio
button
occurs
any error n
File List
Dir List
Drive List Combo
Box
Box
Box
Box
memory systems RAM
buffer
overflow overload overflow overflow
Netcop
www.netto
ols.com
code
correct.
firewalls

A
A
D

NetBrute Netcraft
NetBIOS D
www.Who www.netcr www.netst
Is.com
aft.com
at.com
C
patches.
switches

updates.
hubs

upgrades. B
scanners A

It can
consist of
hardware, It hides
software, your
or both.
network.

It is a
barrier
between
One of its your
technique network
s is
and the
packet
rest of the
filtering.
Internet. B

That any
open
applicatio
ns be
exited

That you
are not on
the
Internet

That you
also shut
down
associate
d services B

Firewall

Router

Dependen
cies on
other
services
Intrusiondetection
software

Antivirus
software
an
intrusiondetection antivirus
system.
software.

a network a proxy
prevention filtering
system.
system.

A
D

cycle.

renewal.

age.

history.

Make sure
all update
and
security
patches
are
applied.

Install and
keep
current
antivirus
and antispyware
programs.

Limit
users
ability to
configure
the
workstatio
n.

Block all
incoming
traffic on a
network. D

Delete it
and
change
Delete it the built-in
from the guest
system
account to
and use
a power
the guest user
account. account.
Tapes can
be used
over and Tapes
over, and and CDs
CDs
can be
should be thrown
kept
away in
forever.
the trash.
Trojan
horse
Virus

Disable it
and
create a
nondescri
pt user
account
with
administra
tor rights.

Create
another
administra
tor
account to
confuse
the
hacker.
C

Tapes
should be
melted
and CDs
broken.
IP
spoofing

Give them
to a
recycle
shop.
C
Spyware

place a
router
between
your ISP
and your
system.

download
files from
reliable
hone your
Web
programm
sites.
ing skills.
Problems
System
with your
acts
Files are Printing
wireless
abnormal missing
problems mouse
Never
open an email
Turn off
attachmen
the auto- t unless
Do not
launch in you know
Update
propagate your ewhat it is
antivirus hoax
mail
and who
software. viruses.
client.
sent it.
Trojan
buffer
virus
horse
spyware overflow
A Trojan
A buffer
A virus
horse
Spyware overflow
Obtain
username
Obtain
Check for s and
system IP Obtain
open
password
addresses cookies
ports
s
add
spyware
to your
system.

E-mail
and
attachmen Download File
t scanning scanning scanning
Do not
open
Avoid
Use your attachmen skins
browsers ts in
and
security
unknown toolbars
settings
e-mails
download
Administr
ative
assistant
Junior
to the
accountan
president Cook
t

The
Standard
toolbar
multitaski
ng.

Backup
file
scanning

D
D
C

Use
encryption
software D

Network
administra
tor
D

The Open The Save


The
command command
Formattin on the
on the File
g toolbar Edit menu menu
A
cascading minimizin
tiling.
.
g.
A

whether
the
worksheet
the default prints in
file
landscape
location of or portrait
new files orientation
multitaski
shrinking ng

the
number of
windows
you have
open
minimizin
g

Click on
any
Click on
border
any corner
and drag. and drag.

Click on
the title
bar and
drag.

right
mouse
button
anywhere
on the
Word
window,
choose
the
Customiz
e
command
from the
contextsensitive
menu,
and check
the box
for the
missing
toolbar
from the
Toolbars
tab dialog
box.

the
margins
on the
printed
DOCUME
NT
A
cascading C
You
cannot
move a
floating
toolbar.
C

left mouse
button
anywhere
on the
Word
window,
choose
the
Customiz
e
command
from the
contextsensitive
menu,
right
and check
mouse
left mouse the box
button on button on for the
any visible any visible missing
toolbar,
toolbar,
toolbar
and click and click from the
on the
on the
Toolbars
missing
missing
tab dialog
toolbar.
toolbar.
box.
B

All
document
s are
automatic
ally saved
with a
default
password.
public
domain
software.

The
password
is casesensitive.
nonprotec
tive open
source
software.
nonprotec
tive open
source
software.

public
domain
software.
ondemand oncomputing demand
.
software.

Once a
document
is
protected
by a
password,
it cannot
be opened
without
that
password.
protective
open
source
software.
protective
open
source
software.

utility
computing
.
Web
best-cost software service
provider provider provider
Operation Informatio Structured
al
nal
query
systems systems systems
power
hardware
outages. failures.
floods.
hot
Delete

empty
Nothing

the Line
color

the Font
and the
text
alignment

proprietar
y software C
proprietar
y
software. D

utility
software.
applicatio
n service
provider
Office
automatio
n
All of the
above.

A
D

dormant B
New
C
text,
text,
CD-ROM, hypertext,
text,
hypertext digital
Power
graphics and
camera
Point,
and email Power
and
video and
address. Point.
sound.
sound.
D

the Line
style

cold
Kill

Password
s can be
up to only
seven
characters
long.
A

Line style,
Line color,
text font,
and text
alignment D

Fill color,
Line color,
Line
and Line
Fill color Line color thickness thickness D
A popup
box
prompts Microsoft
Excel is
you for an Graph is
started so existing
started so The graph
that you
Excel
that you
placehold
can create chart to
can create er is
a chart.
insert.
a graph. deleted.
C

taken
from the
first
column or
row of
data in the
datasheet,
always
depending
always
taken
on
taken
from the whether
from the first
the data
first row of column of series are
data in the data in the in rows or entered by
datasheet. datasheet. columns. the user. C
Side-byside
Stacked
column
column
Pie chart Line chart B

Click the
Insert
Pull down Chart
the Insert button on
menu and the
select
Standard
Chart.
toolbar.

Pull down
the Insert
menu and
select the
appropriat
e Object.

Pull down
the Insert
menu and
select
Chart,
click the
Insert
Chart
button on
the
Standard
toolbar, or
pull down
the Insert
menu and
select the
appropriat
e Object. D

Click the
chart
object,
then click
It
the View
automatic Datasheet
ally
button on
displays in the
Slide
Standard
view.
toolbar.
Single
click the
chart.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
linked to
the
PowerPoi
nt
presentati
on.

Double
click the
chart.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
embedde
d in the
PowerPoi
nt
presentati
on.

You
cannot
display
Pull down the
the Edit
underlying
menu,
datasheet
then
once the
select
slide is
Object.
finished. B
Change to
Click
Slide
outside
Sorter
the chart. view.
C

The
datasheet
window is
The
toggled
datasheet from
is saved closed to
as a
open (or
separate from open
file.
to closed). D

The
applicatio
n that
The chart
The chart created
is
The chart is doubled the chart
selected. is deleted. in size.
is started. A
The chart
The chart Microsoft
is
The chart is doubled Graph will
selected. is deleted. in size.
restart.
D

a slide
one bullet
item at a
time, build
bullet
items a
letter at a
time, and
build
a slide
bullet
bullet
bullet
one bullet items one items one items a
item at a letter at a word at a word at a
time.
time.
time.
time.
D
Subtle,
Moderate,
Subtle
Moderate Exciting
or Exciting D
Neither
enter nor
Both enter exit;
and exit, neither fly
Fly in from and fly in in from
Enter and top or
from top top nor
exit
bottom
or bottom bottom
C
Enter
Shift
Alt
Ctrl
B

the way
objects
appear on
a slide.

what
objects do
after they
appear on
a slide.

the way
objects
exit a
slide.

Custom
animation
can be
used to
affect the
way
objects
appear on
a slide, to
what
objects do
after they
appear on
a slide,
and to the
way
objects
exit a
slide.
D

The
advanced
timeline
shows the
sequence
in which
objects
The
The
will
advanced advanced appear on
timeline
timeline
the slide
shows the shows the and the
sequence duration duration
in which of the
of the
objects
effect
effect
will
applied to applied to
appear on each
each
the slide. object.
object.

Clips

Organizati
on charts Text

Paint
program

Draw
program

Fly in

From top

Once data
is entered
it cannot
be
changed.
OLTP.
You can
change
the
appearan
ce of a
whole
diagram,
but not
individual
shapes of
a
diagram.
[Enter+A]

Filtering
program

Dissolve
in
Data
cannot be
Once data entered
is entered into
it can be Datasheet
changed. .
OLAP.
OLST.
You can
change
both the You
appearan cannot
ce of a
change
whole
the style
diagram of the
and the
connectin
individual g lines in
shapes of an
a
Organizati
diagram. on chart.
[Shift+Z] [Alt+Z]

The
advanced
timeline
shows
neither the
sequence
in which
objects
will
appear on
the slide,
nor the
duration
of the
effect
applied to
each
object.
C
Clips,
organizati
on charts,
and text
D
Animation
program A
Fly in,
From top,
and
Dissolve
in
D
There is
no such
thing as a
Datasheet
.
B
OLIP.
B

You
cannot
change
the color
of the
boxes in
an
Organizati
on chart. B
[Ctrl+Z]
D

.ctx
Validate
On Error
GoTo
linelabel
UpdateCo
ntrols

.ctl
Validation
On Error
GoTo
Inline
PaintPictu
re

B
A

On Error
Stop

.ocx
Audit
On Error
Resume
Next

Refresh

Resize

Cancel
parameter Cancel
to a non- parameter
zero value to 0

UnloadMo
de
parameter
to a nonzero value

UnloadMo
de
parameter
to a zero
value
A

Cancel
parameter Cancel
to a non- parameter
zero value to 0

UnloadMo
de
parameter
to a nonzero value

UnloadMo
de
parameter
to a zero
value
A
None of
the above D

Consists
Consists of several
of several Applicatio
Programs ns
Form
window, Project
standard window,
or code
view code
module
window
Place
Place
code in
code in
the
the
Terminate Unload
event
event
AutoRedr
AutoRedr aw =
aw = True False

Msgbox
err.no &
err.text

.ctr
Check

Consists
of Various
Forms
Consists
And Code of several
Modules Projects D
Class
module,
code
module
Place
code in
the
Deactivate
event

None of
the above A

None of
the above B

PaintPictu
Refresh
re
A
Msgbox
Msgbox
error.num
Msgbox
error.num ber &
err.numbe ber &
error.desc
r & err.text error.text ription
D

To
provide a
repository
for images
To display To help in To allow used by
images to creating a the editing other
the user ToolBar
of icons
controls
D
GetFileNu
FreeFile m
GetFile
GetBytes A
GetProper
Retrieve Get
ty
Value
B
Common
messages
passed to Open
Windows
Windows dialog box explorer
Caption
Visible
Multi-Line
Click,
KeyUp
KeyUp
Click and and
and
KeyPress KeyDown KeyDown
Ascii
Binary
Input
Format
Format
Mode
CurrentX ScaleLeft ScaleHeig
and
and
ht and
CurrentY ScaleTop ScaleTop
Property Property Property
Get
Assign
Let
Backgrou
nd color
Caption
ZOrder
property property property

Input box
Font
KeyPress,
KeyUp
and
KeyDown
Output
mode

D
C

x and y
Property
Set
AutoRedr
aw
property
CurrentVa
l

D
B

Min

Max

Value

Shell

Substr

SetAttr
CStr
A
Are
actually
not
None of
properties the above B

Are one
and the
same

Can be
different
at times
You do
You do
not have
not need the
to use the permissio
Set
n to
command access
here
the class

MyVar
has not
been
declared
The
ExecProc
The Open The Exec edure
method
method
method

None of
the above C

None of
the above D

A critical An
A warning message exclamati None of
query icon icon
on icon
the above
built-in
intrinsic
procedure
statement. variable. constant. .
InputBox MsgBox
function
statement
can be
can be
MsgBox InputBox created
created
statement function
with the
with the
returns a returns a macro
macro
value,
value,
recorder, recorder,
while the while the while the while the
InputBox MsgBox MsgBox InputBox
function
statement statement function
does not. does not. cannot.
cannot.
Data
cannot be
A new
entered
The form Data can check box
into the
can be
be
can be
form.
modified. entered. added.
QueryUnl
Unload
oad
Deactivate Terminate
press the
press the press the escape
just keep
return key tab key
key
typing
layers and lines and
planes
spaces
enter/retu
tab
rn
grammar spell
checker
checker
send a
public
message
to friends
interested send
in one
pictures to
topic
a friend

Print all
Enter
closing

From ___
To ____
Copy
tabbing

database graphing

C
C

height and
width
backspac
e/ delete
thesauru
s

rows and
columns

shift

outliner

send
private
messages
to a friend

send a
package
to a
friend

Page
setup
Retrieve
spacing
word
processin
g

Print
preview
Save
sorting

B
C
B

spreadsh
C
eet

To
analyse
figures
subscript

To
analyse
figures

Creating
and
editing
Storing
documen informatio None of
n
the above B
ts
annotation
Creating
and
editing
documen
ts

clip art

clipboard

Storing
Making
informatio Calculatio
n
ns
B
Font,
Spelling,
Paragraph
grammar Cut,
, Bullet
copy,
Clear,
and
and
replace
autocorre paste and Numberin
and select ct
g
C
clear
Text
Text at
Numbers which
appear at
the
which
bottom of appear on the top of
every
every
every
page
page
page
Mouse,
printer
and
processin
g system
keyboard?
Browser
Clear,
replace
and
Toolbars

Paste
Copy,
then
paste

Keyboard
, Mouse,
monitor
and
printer

Monitor,
keyboard
and
mouse
microphon
clip-art file e
Spelling,
grammar Cut,
copy,
and
autocorre paste and
ct
clear

Designate
d area on
the
document C

None of
the above B
digital
scanner D

None of
the above C
AutoCorre
ct
B

Replace

Select all

Cut, then
paste

Delete,
Insert,
then paste then paste A

To
complicat
e the
revision
process
and to
force the
author to
spend
more
time
making
correctio
ns

To allow
multiple
people to
work on
one
document
in
collaborati
on with
one
another
C

A vertical
line
outside
the left
margin
A red
signifies a
A line
underline change
appears appears has been
through
beneath made at
text that is text that is that point
to be
to be
in the
deleted.
added.
document.

Comment
s are
enclosed
in a text
box at
the right
of the
documen
D
t.

To give
the
original
author a
chance to
accept
suggested
changes
from the
person
who
entered
the
revisions

Through
the Edit
menu by
choosing
Track
Changes
command

To give
the
original
author a
chance to
reject
suggested
changes
from the
person
who
entered
the
revisions

Through
the Tools
menu by
choosing
Track
Changes
command

Both
through
Through the Tools
menu
tools on
and the
the
Reviewing Reviewin
toolbar
g toolbar D

The
Versions
comman
d will
allow you
to save
multiple
versions
of a
documen
t,
including
any
changes
that may
have
been
made to
that
documen
t.

The
Versions
command
will allow
you to
save only
one
version of
a
document,
including
any
changes
that may
have been
made to
that
document.

The
Versions
command
will allow
you to
save only
one
version of
a
document
without
any
changes
that were
just made
to the
document.
The first
and
All
second
versions The latest versions
version is are
are
opened
opened
opened
automatic automati automatic
ally.
ally.
cally.
Dictionar Grammar Spell
check
check
y
Word
displays
a list of
the dates
and times
each file
was
saved.

The most
recent
version
will
appear at
the
bottom of
the list.

Fields
Check
boxes

Tools
Toggle
button

Word will
show the
name of
the
person
who
saved
each
version.

The
Versions
command
will allow
you to
save only
two
versions
of a
document:
one
version of
the
original
and one
version of
any
changes
made to
the
document. A

The
previous
version is
opened
automatic
ally.
B
Thesauru
s
A

Word is
not able to
tell the
most
recent
version of
a
document. A

Insert
A dropText fields down list
Forms

C
B

Comment
s can be
edited or
deleted
by right
Comment clicking
Comment s cannot the
highlight
s cannot be
be edited. deleted.
ed text.

Comment
s can be
edited or
deleted by
left
clicking
the
highlighte
d text.
C

Text
Text at
Numbers which
appear at
the
which
bottom of appear on the top of
every
every
every
None of
page
page
the above
page
Insert
Press
Copy and page
Press tab. Return.
paste.
break.
text.
graphics. forms.
numbers.
header/fo bibliograp find/searc
hy.
h.
macro.
oter.
This
Format
action is
Painter
Copy
Paste
not
button
button
possible.
button
Fault
Finding
Insert

Bug
Squashing
Tools
a section
of text
where the
first letter
of each
sentence
a section is
of white lowercase
text on a and the
black
rest are
backgrou uppercase
.
nd.
setting it
in larger typing it all
type or
in capital
font size. letters.

Error
Injecting
Format

the
guidelines
used to
establish
where
different
elements
of the
newsletter
will go.
underlinin
g the text
of the pull
quote.

D
C
A

Debuggin
D
g
Edit
C

an
enlarged
capital
letter at
the
beginning
of a
paragraph
.
A

changing
the color. A

The
number of
columns
12

A grid is
a set of
horizonta
l and
vertical
lines that
determin
e the
placemen
t of
elements
in a
newslette
r or other
documen
D
t.
The tab
spacing
within
each
D
column
D
72

Three

Four

A dropped
cap is a
word that
The
A pull
starts with
reverse
quote is a a
technique quotation lowercase
means to taken
letter
add dark from
when it
text on a (pulled)
should
light
from
have a
backgroun another
capital
d.
document. letter.

The width
of each
column
6

The
height of
each
column
10

One

Two
Press
Press
Ctrl+Shift+
Ctrl+Enter Enter to
to create create a
a page
column
break.
break.
A sans
A serif
serif font
font at 10 at 10
points
points

Press
Enter to
create a
section
break.

Press
Shift+Ente
r to force
a line
break.
C
A sans
serif font
A serif
font at 20 at 45
points
D
points

2 inches

3 inches 4 inches

6 point

10 point

15 point

It
depends
on the
left and
right
margins,
and how
many
columns
are
specified. D
25 point

2
inches.

You are
not in
Print
Layout
view.

2
inches.

You have
not
inserted a
column
section
break..

3 inches.

You have
not
specified
continuou
s section
breaks.

to move a
section of
text from
the
original
to store a to store a location to
file on the file on a
another
hard drive diskette
location
Data
about a
set of
A set of
Mainly
similar
different
things
graphics
text
Thesauru Spell
Grammar
s
Checker Checker

impossibl
e to
determine
.
B
Word
cannot
display
columns
during
editing;
you will
see them
only when
you print
the
document. A
to leave
an
original
section
of text in
place
while
pasting a
copy
elsewher
D
e

None of
the above B
Find and
Replace B

q_id
AC1
AC2
AC3
AC4
AC5
AC6
AC7
AC8
AC9
AC10

AC11
AC12

AC13
AC14
AC15

AC16
AC17
AC18
AC19
AC20
AC21

AC22
AC23
AC24
AC25

AC26

AC27
AC28
AC29
AC30
AC31

AC32
AC33
AC34
AC35

AC36
AC37

AC38
AC39
AC40
AC41
AC42
AC43
AC44

AC45
AC46

AC47
AC48

AC49
AC50
AC51

AC52
AC53

AC54
AC55
AC56
AC57

AC58
AC59
AC60

AC61
AC62
AC63
AC64
AC65
AC66
AC67
AC68
AC69
AC70

AC71
AC72
AC73
AC74

AC75

AC76

AC77

AC78

BC1

BC2
BC3

BC4

BC5

BC6

BC7

BC8

BC9
BC10

BC11

BC12

BC13
BC14
BC15

BC16
BC17
BC18
BC19
BC20
BC21

CA1
CA2
CA3
CA4

BC22
BC23

BC24

BC25
BC26

BC27
BC28
BC29
BC30
BC31
BC32
BC33

BC34

BC35

BC36

BC37

BC38

BC39

BC40

BC41

BC42

BC43
CA5
CA6
CA7
CA8
CA9
CA10
CA11
CA12

CA13

CA14
CA15
CA16

CA17

CA18

CA19
CA20
CA21

CA22
CA23

CA24
CA25

CA26
CA27
CA28
CA29

CA30
CA31
CA32

CA33
CA34
CA35
CA36
CA37

CA38
CA39
CA40
CA41
CA42
CA43

CA44
CA45
CA46
CA47
CA48
CA49

CA50
CA51
CA52

CA53
CA54
CA55
CA56

CA57
CA58

CA59

CA60
CA61

CA62
CA63
CA64
CA65

CA66
CA67
CA68

CA69
CA70

CA71
CA72
CA73

CA74

CA75
CA76

CA77
CA78
CA79
CA80
CA81
CA82
CA83
CA84

CA85
CA86

CA87
CA88
CA89

CA90
CA91
CA92
CA93

CA94

CA95
CA96
CA97

CA98

CA99
CA100

CA101
CA102

CA103

CA104
CA105

CA106
CA107
CA108

CA109

CA110
CA111

CA112

CA113

CA114
DB1
DB2
DB3
DB4

DB5

DB6

DB7
DB8
DB9
DB10
DB11

DB12
DB13
DB14
DB15
DB16
DB17
DB18

DB19

DB20
DB21
DB22
DB23
DB24
DB25
DB26
DB27

DB28

DB29
DB30
DB31

DB32
DB33
DB34
DB35
DB36
DB37
DB38
DB39
DB40
DB41
DB42

DB43
DB44

DB45
DB46
DB47

DB48

DB49
DB50
DB51
DB52

DB53

DB54

DB55
DB56
DB57

DB58
DB59
DB60
DB61

DB62

DB63
DB64
DB65
DB66
DB67
DB68

DB69
DB70
DB71
DB72
DB73
DB74
DB75

DB76

DB77
DB78
DB79
DB80
DB81
DB82
DB83
DB84
DB85
DB86
DB87
DB88
DB89
DB90
DB91
DB92
DB93
DB94
DB95
DB96
DB97
DB98
DB99
DB100
DB101
DB102
DB103

DB104
DB105
DB106
DB107
DB108
DB109
DB110
DB111
DB112
DB113
DB114
DB115
DB116
DB117
DB118
DB119
DB120
DB121
DB122

DB123
DB124
DB125
DB126
DB127
DB128
DB129

DB130
DB131
DB132
DB133
DB134
DB135
DB136
DB137
DB138
DB139
DB140
DB141
DB142
DB143
DB144
DB145

DB146
DB147

DB148
DB149
DB150
DB151
DB152
DB153
DB154
DB155
DB156
DB157
DB158
DB159
DB160
DB161
DB162
DB163

DB164
DB165
DB166
DB167
DB168
DB169

DB170
DB171
DB172
DB173

DB174

DB175

DB176
DB177

DB178

DB179

DB180

DB181

DB182

DB183

DB184

DB185
DB186
DB187

DB188

DB189

DB190

DB191
DB192

DB193
DB194

DB195

DB196

DB197

DB198

DB199

DB200

DB201

DB202

DB203

DB204

DB205

DB206
DB207

DB208

DB209

DB210

DB211

DB212

DB213
DB214
DB215

DB216

DB217

DB218

DB219
DB220

DB221

DB222
DB223

DB224

DB225
DB226

DB227

DB228

DB229

DB230

DB231

DB232

DB233

DB234

DB235

DB236
DB237
DB238
DB239
DB240
DB241
DB242

DB243

DB244

DB245

DB246

DB247

DB248
DB249

DB250

DB251

DB252
DB253

DB254

DB255

DB256

DS1

DS2
DS3

DS4

DS5

DS6
DS7
DS8

DS9

DS10

DS11

DS12
DS13
DS14

DS15

DS16

EC17
EC18
EC19
EC20

EC21

EC22
EC23
EC24

EC25

EC26

EC27

EC28
EC29
EC30

EC31

EC32

EC33

EC34

EC35

EC36

EX1
EX2

EX3
EX4
EX5
EX6
EX7
EX8
EX9
EX10
EX11

EX12
EX13
EX14
EX15
EX16
EX17
EX18
EX19
EX20
IN9
IN10

IN11
IN12
IN13
IN14

IN15

IN16
IN17
IN18
IN19

IN20

IN21
IN22
IN23
IN24
IN25
IN26
IN27
IN28

IN29
IN30
IN31
IN32
IN33
IN34

IN35
IN36

IN37

IN38
IN39

IN40

IN41
IN42

IN43

IN44

IN45
IN46
IN47

IN48
IN49

IN50
IN51

IN52

IN53
IN54

IN55
IN56
IN57

IN58
IN59
IN60

IN61
IN62

IN63
IN64

IN65
IN66
IN67

IN68

IN69

IN70

IN71

IN72

IN73
IN74

IN75

IN76
IN77

IN78
IN79
IN80
IN81

IN82

IN83
IN84
IN85

IN86

IN87
IN88

IN89

IN90

IN91
IN92

IN93
IN94
IN95

IN96

IN97

IN98

IN99
IN100
IN101

IN102
IN103

IN104

IN105
IN106

IN107
IN108

IN109

IN110

IN111

IN112
IN113
IN114

IN115

IN116
IN117

IN118
IN119
IN120
IN121
IN122
IN123

IN124

IN125
IN126

IN127

IN128

IN129

IN130

IN131
IN132
DS17
DS18

DS19
DS20

DS21

DS22

DS23
DS24

DS25
DS26
DS27
DS28
DS29
DS30
DS31

DS32

DS33

DS34

DS35

EC1
EC2

EC3
EC4

EC5

EC6

EC7
EC8

EC9
EC10
EC11

EC12
EC13

EC14

EC15
EC16
EX21
EX22

EX23
EX24
EX25
EX26
EX27
EX28
EX29
EX30
EX31

EX32
EX33

EX34
EX35
EX36

EX37

EX38
EX39
EX40

EX41
EX42

EX43
EX44
EX45

EX46

EX47
EX48
EX49

EX50
EX51

EX52
EX53

EX54
EX55
EX56

EX57
EX58

EX59
EX60
EX61

EX62

EX63

EX64

EX65

EX66
EX67
EX68

EX69
EX70
EX71

EX72

EX73
EX74

EX75
EX76

EX77

EX78

EX79

EX80
EX81
EX82

EX83

EX84

EX85
EX86
EX87
EX88
EX89
EX90

EX91
EX92

EX93
EX94
EX95

EX96

EX97

EX98

EX99

EX100

EX101

EX102

EX103
EX104

EX105

EX106
EX107

EX108

EX109

EX110

EX111

EX112

EX113

EX114
EX115

EX116
EX117
EX118

EX119

EX120
EX121
IN1

IN2

IN3

IN4
IN5
IN6
IN7
IN8
IN133

IN134
IN135
IN136
IN137
IN138
IN139

IN140
IN141

IN142
IN143

IN144
IN145
IN146
IN147

IN148

IN149

IN150

IN151

IN152
IN153
IN154
IN155
IN156
IN157

IN158
IN159

IN160

IN161
IN162
IN163
IN164

IN165
IN166

IN167
IN168
IN169
IN170
IN171
IN172
IN173
IN174
IN175
IN176

IN177
IN178
IN179

IN180
IN181

IN182

IN183

IN184
IN185

IN186

IN187

IN188

IN189

IN190

IN191

IN192

IN193
IN194

IN195
IN196

IN197

IN198

IN199

IN200

IN201
IN202

IN203

IN204

IN205
IN206
IN207

IN208

IN209

IN210

IN211
IN212
IN213

IN214

IN215

IN216

IN217

IN218

IN219

IN220

IN221
IN222
IN223

IN224
IN225
IN226
IN227

IN228

IN229
IN230
IN231

IN232

IN233

IN234

IN235

IN236
IN237

IN238

IN239

IN240

IN241
IN242

IN243
IN244

IN245
IN246

IN247
IN248

IN249

IN250
IN251

IN252

IN253

IN254

IN255

IN256

IN257

PP1
PP2
PP3
PP4

PP5
PP6
VB11

VB12
VB13
VB14
VB15
VB16
VB17
VB18
VB19
VB20

VB21
VB22

VB23
VB24
VB25
VB26
VB27
VB28
VB29
VB30

VB31

VB32
VB33
VB34
VB35
VB36
VB37
VB38
VB39
VB40
VB41
VB42

VB43
VB44

VB45
VB46

VB47

VB48

VB49

VB50

VB51

VB52
VB53
VB54

VB55
VB56

VB57
VB58

VB59

VB60

VB61
VB62
VB63

VB64

VB65

VB66

VB67

VB68

VB69

VB70
VB71

PP7

PP8

PP9
PP10
PP11

PP12
PP13
PP14

PP15

PP16

PP17

PP18

PP19
PP20
PP21
PP22
PP23
PP24
PP25
PP26

PP27

PP28

PP29

PP30

PP31
PP32
PP33

PP34

PP35
PP36
PP37
PP38
PP39

PP40
PP41

PP42
PP43
PP44
PP45

PP46

PP47

PP48

PP49

PP50

PP51

PP52
PP53

PP54

PP55
PP56
PP57
PP58

PP59

PP60

PP61

PP62

PP63

PP64

PP65

PP66

PP67

PP68

PP69

PP70

PP71

PP72

PP73
PP74

PP75

PP76

PP77

PP78

PP79

PP80
PP81

PP82
PP83
VB1
VB2
VB3

VB4
VB5

VB6
VB7
VB8
VB9
VB10

VB72
WO1

WO2
WO3

WO4

WO5

WO6
WO7
WO8
WO9

WO10
WO11
WO12
WO13
WO14
WO15
WO16

WO17
WO18
WO19
WO20
WO21
WO22
DA13

DA14
DA15
DA16
DA17
DA18

BC44

BC45

BC46

BC47

BC48

BC49

BC50

BC51

BC52

BC53

BC54
BC55
BC56
BC57

BC58
BC59

BC60
BC61

BC62

BC63

BC64
BC65
BC66

BC67

BC68
BC69

BC70
BC71

BC72

BC73

BC74

BC75

BC76

BC77

BC78
BC79
BC80

BC81

BC82

WO23
WO24
WO25
WO26
WO27

WO28

WO29
WO30
WO31

WO32
WO33
WO34
WO35

WO36

WO37
WO38

WO39
WO40
WO41
WO42
WO43
WO44

WO45
WO46
WO47
WO48

WO49

WO50
WO51

WO52
WO53
WO54
WO55
WO56
WO57

WO58

WO59
WO60

WO61
WO62
WO63
WO64
WO65

WO66

WO67

WO68

WO69

WO70
WO71
WO72

WO73
WO74
WO75
WO76

WO77

WO78
WO79

WO80

WO81

WO82

WO83
WO84

WO85
WO86

WO87

WO88

WO89

WO90
WO91

WO92

WO93

WO94

WO95

WO96

WO97

WO98

WO99

WO100
WO101
WO102

WO103

WO104

WO105
WO106
WO107

WO108

WO109
WO110

WO111

WO112

WO113

WO114
WO115

WO116

WO117

WO118

WO119
DA1
DA2
DA3

DA4
DA5
DA6
DA7
DA8
DA9
DA10
DA11
DA12

BC83

BC84

BC85

BC86

BC87
BC88

BC89

BC90

BC91

BC92
BC93
BC94

BC95
BC96

BC97
BC98

BC99
BC100
BC101

BC102

BC103
BC104
BC105

BC106

BC107

BC108
BC109

BC110
BC111

BC112

BC113

BC114

BC115
BC116

BC117
BC118

BC119

BC120

BC121

BC122

BC123

BC124

BC125

BC126

BC127
BC128

BC129

BC130

BC131

BC132
BC133
BC134
BC135

BC136
BC137

BC138

BC139
BC140

BC141
BC142

BC143
BC144
BC145

BC146

BC147
BC148

BC149
BC150
BC151
BC152
BC153

BC154
BC155

BC156

BC157

BC158

BC159

BC160

BC161

BC162

BC163
BC164

BC165

BC166

BC167

BC168

BC169

BC170
BC171

BC172

BC173

BC174

BC175

BC176

BC177

BC178
BC179

BC180
BC181

BC182
BC183
BC184

BC185
BC186
BC187
BC188

BC189

BC190

BC191
BC192
BC193
BC194

BC195
BC196
BC197
BC198
BC199

BC200

BC201
BC202
BC203
BC204
BC205

BC206
BC207

BC208

BC209
BC210

BC211
BC212
BC213

BC214
BC215

BC216
BC217

BC218
BC219
BC220

BC221

BC222

BC223

BC224

BC225
BC226

BC227

BC228

BC229

BC230

BC231
BC232

BC233

BC234

BC235

BC236
BC237

BC238

BC239

BC240
BC241

BC242
BC243
BC244
BC245

BC246

BC247

BC248

BC249

BC250
BC251
BC252
BC253
BC254

BC255
BC256

BC257

BC258
BC259
BC260

BC261

BC262
BC263

BC264
BC265

BC266

BC267
BC268
BC269

BC270
BC271

BC272

BC273
BC274

BC275

BC276

BC277

BC278

BC279

BC280

BC281
BC282

BC283
BC284

BC285

BC286
BC287
BC288
BC289

BC290

BC291

BC292
BC293
BC294
BC295

BC296

BC297

BC298
BC299
BC300
BC301

q_desc
The ------ key can be used to select an existing company from list of companies.
Import and Export of data between Tally and other programs is possible only through ---------Program.
The re-order point is the inventory quantity that trigger a stock replishment activity.
A created company's detail can be modified through keys
A/An ------------- is the official notice that the firm sends to its customers to advise then to the amount
of money that is owed.
In tally,all masters have ________main options
In tally,to create a new column in balance sheet press _______
In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger
accounts into one line statements
In tally, we can alter ledger details using either single or multiple modes but not alble to delete a
ledger from multiple modes.
In tally,a group company is marked with an ______________

The systems that work together to order,receive, and pay for replenishment of stock are --------------Tally allows to delete a ledger from --------- alteration mode.

--------------------- is/are useful for management in the decision making.


In tally,the group company must contain at least _____________ members
To cancel a vourcher entry in Tally, short-cut key is -----------

The accounting masters and inventory masters related to


We press ------------- function key to display the age-wise analysis of Bills Receivable or Bills Payable
report
In Tally, we press ------------, to print report .
In Tally, Types of Accounts and Types of Vouchers passed during the period, can be seen in ------------report.
In the Tally Software, the ------------ directory stores all data entered by the user.
The Ledger Accounts are unique in Financial Accounting Packages

Customers can be permitted to enter their own data into the firms computer using the firms wide area
network is an example of
In Tally, we can customize the Vouchers as per our requirements
The number of steps in Accounts Compilation are
Each action/transaction of a firm is described by a ----------------.

Tally is based on mercantile accounting system

Ctrl + N is used to ----------------------- in Tally classify the accounts under different heads so that summarised information is
possible.
Revenue Account also known as -------------- Account
Method of Voucher Numbering is/are
Accounts Receivable are displayed in

To assemble a product from different items -------------- entry is used


A --------- purchase orders data flow is directed to the purchasing system for use in closing out the
outstanding purchase orders in the receiving system diagram.
Tally provides at least --------- predefined voucher formats
The value of the inventory is included in a ledger accounts as an asset on the balance sheet

" The buyers can follow up with the suppliers to determine the reasons " is an example of ----------------From voucher entry mode , if we press __________ then we get payment voucher in tally

Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged accounts member companies
of the group.
A ----------- is a primary document for recording all financial transactions.
The field can have a value between ________________ in FA Package.
The _______ file maintains data that describes the supplier past transaction with the firm in terms of
material quality in AIS
It is necessary to manipulate data to transform it into ---------------In tally, to change the date of the voucher press ______

Tally can maintain budgets on ---------------The value of the inventory is included as an asset on the balance sheet
In ratio analysis report of Tally FA packagewe we press ________________ function key to the display
of bills receivable , bills payables report
The accounts payable system is responsible for paying the suppliers for the -----------------

What is the default financial year in Tally6.3 _________________


Tally encrypts and stores TALLY DATA at the data directory
The Profit & Loss statement can be displayed in ---------------- format(s).

Default ledger accounts in tally are ______


Default 'godown' name in tally is ____________

'Tally vault' is a _________________


To create a sales voucher in tally , you have to press _______
A Group Company is ------------------------- given to the merged accounts of member companies of the
group.
In tally,"credit note" voucher type records entry for ________________

In tally you get currency symbol option from _______ menu


------------------ gives the balance for each day for the voucher type has been selected.
For 'stock journal' entry we press ______________ in tally

Tally provides the capability to the administrator/auditor to track changes in the areas is/are
In tally, types of users are _______________
By pressing -------- key, a list of inventory reports can be displayed straightaway from the balace sheet
report
Projected approximation of income or expenses is called ______________ .
"Administrator" type user is also called 'Auditor' of a company in Tally
You will get company information , if you press __________ from gateway of tally
A constituent(member) company can be a member of more than one group.
Default stock category in tally is ______
To create a log of the import activity in a file _____________ is located in the same directory as an
executable program in tally
In Tally,inventory valuation method option is available from _______

Tally audit feature is available in a company __________________


In tally, a group company can also be a constituent(member) of another group company
Default number of groups in tally are ________
During voucher entry ------------- are used.

User designated as --------------- can view audit list.

Tally supports Importing of data from ---------------In an accounting information system, which of the following types of computer files most likely would
be a master file?

Which of the following is an advantage of a computer-based system for transaction processing over a
manual system? A computer-based system:

The memory address register is used to store

Inefficient usage of excess computer equipment can be controlled by


Which of the following is not the component of a CPU

A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The
following is an information not found in the trailer label

Hard copy is a term used to describe...?

What do the abbreviations VAB stand for

What control would prevent the accidental erasure of customer information from a magnetic tape

What are the individual dots which make up a picture on the monitor screen called?

Header label normally include all the following except the


A daisy wheel is a type of...?

Which approach or technique is a control usually associated with microcomputers

An impact printer creates characters by using...?

The best security control in a microcomputer environment is to


What would you NOT use with a flatbed plotter?
What do you need for an ink jet printer?

The greatest control exposure in a microcomputer environment is the lack of


What do you need for an ink jet printer?
A laser printer does NOT use?
The amount of data that a disk may contain is known as the disks...?
You can ________ protect a floppy disk.
Information on a hard disk is usually backed-up using a...?

Using generalized audit software packages can add a lot of value _______
_______ is used for CAAT as database
Generalized audit software perform auditors to undertake any past records and not concurrent auditing
Generalized audit software is a file whose capabilities for verifying processing is logic

Magnetic tape is a...?


Hard disks can have a storage capacity in the region of...?

Which storage device has the largest capacity in Mb?

Which storage device cannot be erased?


You can ________ protect a floppy disk

Where should floppy disks be stored?


The contents of these chips are lost when the computer is switched off?
What are responsible for storing permanent data and instructions?
Which parts of the computer perform arithmetic calculations?
What are small high speed memory units used for storing temporary results?
How many bits of information can each memory cell in a computer chip hold?
What type of computer chips are said to be volatile?

Magnetic tape is a...?

Software can be divided into two areas:

Travel agents use this computer system when reserving flights

Which computers are used in the weather forecasting industry?

Vacuum tube based electronic computers are...?

Which generation of computer was developed from microchips?

Which generation of computer uses more than one microprocessor?

Which generation of computer developed using integrated circuits?

Which generation of computer developed using solid state components?

Name three steps involved in developing an information system


CAAT's are computer program and data that auditor uses as part of the audit procedures to process
data if audit significance contained in an entity information system
CAAT do not contains package programs, purpose written program, utility programs or system
management programs
Embedded audit routines are sometimes built into an entity's computer system to provide data for later
user by the auditor
SCARF involves embedding audit software modules within an application system to provide
continuous monitoring
Concurrent use auditors as the member of the system
Regular cross system verification may minimize frauds
Computer security is frequently associated with confidentiality, integrity and authentication
Data reserve engineering process metadata to document system and abstract business rules and
relationship

The first step for developing CAAT is_________

Using the open database connectivity feature in ACL is ______________


Computer Assisted Audited Technique involves the use of computers through "Black Box Approach"
White Box Approach necessary involves expert knowledge on the part of Auditor

The transition from manual system to CIS environment bring dramatic changes including
________________

Auditing with computer necessarily supports the

CAAT involves an Auditors' appreciation of __________


Widespread end use computing result in unlimited errors creeping into system going to accept
handling, thereby increasing audit risks
For computerized auditing usage of sophisticated audit software would be a necessity

Important knowledge needed to begin planning the use of CAAT is _________


The move towards paperless EDI would eliminate much of the traditional audit trail, radically changing
the nature of audit evidence

Computer operation controls are designed to provide ________________


Systems development control, apart from others, include authorization, approval, testing,
implementation and documentation of new systems software and system software modification

A system could be _________


A system exhibits 'entropy'
Super computer are the largest and fastest and is very suitable for commercial application including
audit work
Assembler language uses Mnemonic symbols

Operating systems are devised to optimize the machine capabilities, the function
include_______________
General purpose software provides a framework for highly complex scientific operation
In batch processing, transactions are processed one after another

The use of computer assisted audit techniques is not gaining popularity not only ________________
On-line processing refers to grouping of transaction and processing the same in one go from start to
finish
Real time refers to the technique of updating files with transaction data immediately after the
occurrence of the event to which it relates
In OLRT the CPU should process the capability of program interruption
Time sharing system allow access to a CPU from remote terminals

DSS is defined as a system that provides tools to managers to assist them in solving structured
problems
DSS has the following components _________________
Master files contains current records for identification and summarizing
Transaction files contain relatively permanent records take product profile, customer profile, employee
profile etc
Master file configuration includes ____________
______ is a file management software package that lets users and programmers organize data into
files and then process those files

CAATS provide added value to the clients because _______________


File volatility refers to the number of addition and deletions to the file in a given period of time
File activity is the proportion of transaction file records that are actually used and accessed in a given
processing run:
File interrogation refers to the _____ of information from a file
One -to-one relationship means a single entity to a single entity in a monogamous structure
RDBMS is structured to a series of 2 dimensional tables

SADB stands for ____________


Controls are present over many aspects of the computer system and its surrounding social
environment
In framed checking the data entry is checked against an expected picture or format

Errors are correlated_________


Field check is exclusive to a field
_________ law basically states that there is a specific probability of the first digit of a no. being 1,2,3
etc
Check digit is a group of nos. added to a code for determining the accuracy of other digits in the code

Hierarchical code means _________


The validation checks applied to a field depend on the field's logical inter relationships with other fields
in the record

The contents of a field could determine _______ sign for a ______ field

Batch is the process of ______ together _____ that bear some type of relationship to one another
Hash totals means meaningless totals

With OLRT where interactive data entry is available, the master file associated with a transaction may
be searched for confirming data
Controls are required for authorization to ensure data integrity and detect possible breaches in security
Data from client application are not stored in the organization's database through auditables events
and function
All input records in a batch are normally of different types

IDEA stands for _________________________________


A transaction file is sorted prior to the update of master file
A sequence check on the transaction or master files by an update program is not required
Whenever monetary transactions are processed against master files, the update program should
maintain a correlation account to record such transaction that does not have a matching master file
record
Internal tables are stored tables from which certain values are extracted for further processing and
storing
For small to medium sized systems, individual modules are coded and individually tested and then
assembled to be tested as a whole-the testing strategy is referred to as ___________________
In systems testing, test involves_________________
Recording transactions in a controlled manner may amount to loss of stored data

Audit software is used by the auditor to _________


Core image comparison is a software used by the auditor to compare _______ version of a program
with a secure ________ copy
Database analyzer is a software which provides detailed information concerning the operation of the
database

SAS stands for ______________


Embedded code is a software used by the auditor to examine backup data
Embedded code performs wide variety of audit task
Core image comparison is particularly useful where only executable versions are distributed
Log analysis is a software used by auditor to detect virus
On line testing techniques the auditor ______ data either _______ or fictitious in order to see that a
specific program or sever edit test is doing its work
Mapping software is used by the auditor to list unused program instructions
Mapping software has very objectives

Modeling is a variety of software which ________________


On line testing can be targeted for specific functions carried out by programs

Program code analysis involves _____________


__________ is a software of CAAT
Snapshot is software which takes a picture of a file or data or a transaction passing though the system

Base case system evaluation includes____________


While base testing forces on finding if there are any defective execution policies in a program
Black box testing seeks to determine whether application output is what it is supposed to be
In integrated test facility approach the auditor should ensure that the impact of test transaction is
subsequently eliminated from the computer files

Black box testing is _______ based and white box testing is _______ based

Source code review means__________


In formula in flow hypothesis the auditor should expand the extent of substantive tests to determine
how the defects may impact the attainment of the program objectives
All material application oriented events that occur within the boundary subsystem should be recorded
in the accounting audit trail

In examination of audit trail the following data associated with an event may be ___________-

JCL means_________________
Audit should be periodically analyzed to detect any control weakness of the system
In an accounting audit trail, intrusion detection system might monitor the amount of processor time
consumed by the user to detect unusual deviation from the amount processor time requested by the
user in the past
A sample size calculator program assists auditors in determining RAND() function

Generalized audit software consists ___________

Specializes audit program may be___________


Generalised audit software could be used by the following in consistencies or significant fluctuations

Generalized audit software function include____________


In the file reorganization merging capabilities are needed in data from separate file is to be combined
on a separate work file
Auditors cannot use generalised audit software to extract the data needed for audit purpose

Auditors can combine functional capabilities of generalized audit software to accomplish the task of
__________________

Which of the following is not the feature of GAPs


Which is the example of CAATs

In audit procedures, test data is

Which of the following is not the use of CAATs

Which of the following are called explicitly by another procedure?


_________ data type is generally used for fields assigned as primary keys in a table
MS access objects can be published in the web
In code-builder, got_focuse, click,dbl_click,enter are examples of _______
_______can be used to automate certain actions in response to events

In the macro sheet the macro is selected in the _____field

To build complex expressions_____is used

The three list boxes present at the bottom of the expression builder are called_____
________option is selected from the view menu to create macros with conditions
_______report can be created with minimum user input
_______layout of a form displays one record at a time
The table or query name on which we are going to build our report is selected from the ____ dialogue
box

______and_____are the two types of auto reports available


There are no wizards for creating a database in access
______option from the insert menu option is chosen to add an embedded chart
In ms-access, while using SQL, references constraint is used for creating _______
_______is used to create a mailing label
______header is present at the beginning of the report
______is present at the bottom of each page in a report

In SQL, having clause is used for _________

______field is added to the macro sheet when we select grouping option from the view menu
______can be used to create toolbars
_______query is used to add records from one or more tables into an existing table
_______window is used to write VB code in access application
Values for other tables, queries are maintained in look up fields data type
Visual Basic language is a _____ tool
______ function is used to display a message box
Other ms-office applications can be accessed from ms-access using a concept called ________

OLE stands for_____

The application that supplies data in OLE is called an _________


If any change made on the object from the client side is reflected on the server then the object is said
to be _____
_______is the file format that works on internet

______ is used to convert any ms-access object into html format


_______ option in publish to web wizard produces a page that is static in nature
_______query is used to create or change database objects in a current database
Currency fields express the amount in _________
_______is selected from the toolbar to add an OLE object
To display an OLE object in the form of an icon ____ option is selected from insert object dialogue box
_______option from the file menu is selected to run 'publish to the web wizard'
_____page in an web application is used to navigate to the rest of the pages in the application
______ is fired when an event is triggered is the concept based on a Visual Basic language
Ms access is a ___________
A collection of data stored in different objects is known as a _________

A blank database can be created using __________


Text type data can be of _____ characters in ACCESS

______is a datatype that assigns values automatically


Tables cannot be imported from other databases
If two tables having same values for the fields are joined it is called an ______

Duplication of records in a field won't be allowed if the fields are declared a________

Changes from a master table can be reflected on to the child table by selecting _____option
To see more than one record at a time in a form we use _______
In SQL, delete command is used to remove _________
In MS-Access, filter excluding selection will display only those record(s) which meet the criteria.

Properties of the fields are managed by _____ in Dynaset

______queries allows us to view data in row by column manner

The type of queries that can update or delete record(s) in a table(s) are called __________
Joining tables without any matching values in the fields is called ____________
Primary key uniquely identifies each record

Which of the following dialog box is/are used in the creation of form ________
_______ query wizards are used to generate summary calculations for a table
Properties of a form can be changed by selecting ______from view menu options
Forms that are included in other forms are called ______________
In MS-Access, while using form design view, for creating a command button for adding a new record,
we should select the _______ category from the command button wizard

_______ form displays fields in a single horizontal row


The process of arranging the data in a meaningful order is known as ___________
______ are used to select only some particular records from the table or any other database objects
In MS-Access, user may specify criteria for filter in form view using _________
___wildcard character represents any single character
Records cannot be sorted by a primary key

A control without a data source is known as ___________


Set of related option buttons, check boxes and toggle buttons is known as _____________
The collection of related data and objects is called a ____________
Which of the following is control types ____________
In MS-Access, the function that gives the current date is _____________
_____is a control that lists set of data
______is a form that summarize large amount of data

______allows to create a filter by typing the value in a data sheet

Wizards for toolbox controls are called a __________


The wild card representation for any 5 letter word that starts with ram is ________________
Look up fields slow up data entry
____is an access object that displays un-editable data
_____option from the new object toolbar gives the easiest way of generating a report
______ represents data in a pictorial format
Changes of one table can be carried over to another related table
Hyperlinks are used to jump to any kind of information or data from a file
The memo field can have text upto_____ characters in length
In MS-Access, columnar layout can be used to view multiple records in a form
In MS-Access, alter command may be used in adding a primary key to a table
Update query is used to add records from one or more tables to the end of an existing table
In ms-access, datasheet view is available in ___________
______are used to jump to any kind of information from a datasheet or a form
Home page will always be present as a first page of an application
Make table queries create a new table from the records of another table
In ms-access, to protect a database file from illegal access, we may set database password. The
option of setting database password is available in _______ menu
Foreign key is a field that uniquely identifies each record and accept no null values
Data definition queries are used to create or change database objects
The attributes of a composite key are known as ________
OLE object is a data type in access
Data displayed in forms cannot be edited
A sub form is used to display one to many relationship between tables
We can switch from datasheet view to form view by selecting view -> form view option
In MS-Access long integer is a datatype
In MS-Access, while designing a table for a particular field, the Required parameter is set to yes. This
validates the field as _______
Sorting is applied to select only some particular records

Filter by form can be created from a forms shortcut menu


Advanced filter uses a filter similar to the query design window to create a filter
? Wildcard character represents any number of characters
_________ of the following is/are a type of chart
A bound control is tied to a underlying query or table
A calculated control uses expression as a source of data
Text boxes cannot be bound controls
The default query invoked by ms-access is
A control can be bind to a record using row source property
List box is a control that offers a list of choices
If a table is joined to itself it is called a ________________
A picture box combines the activities of both a text box or a list box
Line is a tool box control
Text boxes can be part of a option group
_____ chart exists as a separate object
Filtering data is a way of arranging data in a meaning full order
Wild card characters are used for sorting records
Pivot tables are used to navigate to the other tables in a database
Reports are used to represent un-editable data

In MS -Access, the records in a table are sorted based on _________


Relationship is an association between _________
Summary options dialog box is used to summarize data
______ queries can be used to delete a group of records that meet some specific records
Charts can convert numerical data in a easily understandable format
Embedded charts exist separately
The chart which cannot exists as a separate entity are _______________
From ms - access, if we want to view the records stored in a table in ms - excel worksheet, we need
to
Page header is present at the beginning of each record
Detail section has a header and footer
A macro is performed only when the user initiates an event
The macro is selected from the action field of a macro sheet
A macro can be made to execute before the starting of a database
In MS-Access. While appending records, the source and the target table must have similar structure
and fields
We can add our own functions to the expression elements list box of the expression builder
_______is the wildcard character which represents the presence of any number of characters
Macros can be used to add a menu to a database object
_____ header is a unique feature of reports
Chart can either be a form or a report
Group header will be present at the design view of a report even if the report is not grouped
We can change from the design view to the form view without being prompted for saving the changes
made
Charts can be produced without the wizard
Macros can be used to create user defined error messages

Between and Not Between is ______ type of operators


The default data type of VB is integer

Visual Basic is based on __________


_______is the name of the database object that displays data and can be used to edit data
In access OLE objects cannot be linked
_____ section is present for each record in the report
A ________ sheet lists all the properties that pertain to the form or the controls
Textboxes can also be an example of unbound control
In MS-Access, we may design command buttons for navigating records
_______are forms that are included in other forms
_______ are used to represent our data in graphical format
A field with a _______ uniquely identifies each record
Large amount of data can be summarized using ______ tables
_______ are employed to select only some particular records from a database object
______ control need not have a data source
______ control combines the functionality of both a text box and a drop down list
MS access is a DBMS
A form can be bind to a record source using _____ property of the form

______ forms displays field in single row


______ forms are usually used for tables with one to many relationship
_______ control uses an expression as a source of control
_______ control is tied to field
_______is the form that can be created with minimum input from the user
______option from the tool menu is selected for setting relationships between tables

______,______and_____are the buttons belonging to the options group


_________allows us to create a filter from a field short cut menu
________is a database object which displays data but cannot be used to edit data
What term applies to a collection of related records in a database?

All of the following terms are related to computerized databases except which one?

What is a database?

What does a record contain?


An RDBMS is a

Data Warehousing refers to

Unauthorised alteration of on-line records can be prevented by employing

What is a database?

What does a record contain?

What is a report?

What is the best way to analyse and change data

What are some popular office orientated software applications?

Which of the following constraints can be used to enforce the uniqueness of rows in a table?
Which of the following commands is used to change the structure of table?
An RDBMS is a

Data Warehousing refers to


You are creating a client application that calls ActiveX DLLs. Which of the following properties of the
Err object provides the name of a component that sends an error back to the client application?

This database holds personal information. The user can help to keep it confidential by
If the database holds customer names and addresses, personalised letters can be created
automatically using
Application software suited to storing the survey information obtained in the table would be

The characters * and ? are sometimes used in search criteria as


Which of the following field types will generate the primary key automatically?

Referential integrity ensures that the:

Tables are related to one another through a:

A foreign key is:


You are creating a banking database to track customer loans. The bank will, of course, have many
customers, each of whom may take out one or more loans, while each loan may be associated with
only one customer (there are no joint accounts). What is the re

In a one-to-many relationship between Companies and Employees, which field is found in both tables?

Which of the following ensures that records in related tables are consistent with one another? For
example, it ensures that you cannot add a record with an invalid foreign key.

How would you delete a relationship between tables in the Relationships window?

In a Customers tables, what does a plus sign next to the CustomerID field mean?

What is required of the fields that join two tables?

Assume a one-to-many relationship between the Customers table and the Loans table, with referential
integrity in effect. What happens when you attempt to delete a customer ID from the Customer table
that still has entries in the Loans table?

Which of the following is true when viewing a main form and its associated subform in the Form
Design view?

Which of the following relationships does not belong in a database based on a professional sports
league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the many side of a one-tomany relationship?

You have created a one-to-many relationship with referential integrity between a Customers table and
a Loans table. From which table can you delete a record?

The correct order of the arguments for the MsgBox statement is:

The first statement in a procedure named CreateList is:

Which of the following is TRUE related to form fields?

A text field:

The purpose of a database is to:


A database stores:
A database records:

A sales contact manager used by a salesperson is an example of _______________

A Customer Resource Management (CRM) system is an example of_________

The industry standard supported by all major DBMSs that allows tables to be joined together is called
__________.

A program whose job is to create, process and administer databases is called the _____
Microsoft Access may use which of the following DBMS engines?

Which of the following are basic components of an enterprise-class database system?

In an enterprise-class database system ________ .


In an enterprise-class database system, the database application ___ .

In an enterprise-class database system, reports are created by ____________________ .

A database is considered "self-describing" because _______ .


In an enterprise-class database system, the database _________ .

A database may contain _________________________ .

A database designed using spreadsheets from the Sales department is a database being designed
_________________________ .

A database designed to implement requirements for a reporting application needed by the Sales
department is a database being designed _______ .

A database designed to combine two databases used by the Sales department is a database being
designed _________________________ .

Database professionals use ________________ as specific data sources for studies and analyses.

Database professionals use a set of principles called ________________ to guide and assess
database design.

A very popular development technique used by database professionals for database design is known
as _______________________ .

A very popular development technique used by database professionals to adopt a database design to
new or changing requirement is known as _____ .

The predecessor(s) of database processing was (were) __________ .

In a relation __________________________ .
An attribute is also known as a(n)
.
A combination of one or more columns used to identify particular rows in a is___ .
A combination of two or more columns used to identify particular rows in a relation is________ .
A determinant that determines all the other columns in a relation is______ .
When designing a database, one of the candidate keys in a relation is selected as the _________ .
Normalization is a process used to deal with which of the following modification anomalies?

When you are given a set of tables and asked to create a database to store their data, the first step is
to ____ .

Modern microcomputer personal DBMS products______.

Which of the following are true about data mining applications?


We have obtained access to the company's operational data. We examine 50 records for customers
with phone numbers that should use the current area code of 345. Of these 50 records, we find 10
that still use an older area code of 567. This is an example
We have obtained access to the company's operational data. We have been asked to produce a
report with an item by item analysis of sales, but the only sales figure available is the total sale value
for each order. This is example of_____

A data warehouse database differs from an operational database because:


Which of the following objects is used to display a menu?

Which of the following objects are NOT found in an Access application?

You are developing an Access application that you expect to upgrade periodically. Which of the
following statements is TRUE?

Which of the following statements regarding Access applications is NOT true?


Which of the following brings a copy of the table into the current database and does not maintain a tie
to the original table?

What makes a database an application?

What is the Access tool that is used to create the user interface?

The purpose of a data warehouse is to:

___________ means the result of applying to specific information certain specific technical processes.
__________ is an algorithm which creates a digital representation or "fingerprint" in the form of a
"hash result".
__________ is of standard length which is usually much smaller than the message but nevertheless
substantially unique to it.

Digital Signature involves two processes. They are ___________ and __________.

The Costs of Digital Signature consists mainly of the following

CA stands for ________________


A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private Key
A Digital Certificate does contain Owner's Public Key, Owner's name, Expiration date of the Private
Key, Serial number of the digital certificate

______________ enable web servers to operate in a secure mode.


______________ are used by individuals when they exchange messages with other users or online
services.
______________ are on-line databases of certificates and other information available for retrieval and
use in verifying digital signatures.

Signing Writings serve the following general purposes______,_______,_______ and _______


The most widely accepted format for Digital Certificate is defined by the CCITT X.509
A certificate may prove to be unreliable, such as in situations where the subscriber misrepresents his
identity to the certification authority

CRL stands for

The prospective signer identified in the digital certificate holds the_________ and is called the
___________
In EDI interface, the translation service receives _________ as incoming files from the communication
service
The EDI standardisation for International Trade and Commerce is introduced by __________
In EDI, the transmission files are composed of different sets of external format files which are grouped
into multiple sets under the name of ________
The ________________ are pre-paid credit cards that include an embedded cards
________________ are another form of credit payment that lets customers use digital online cheques
to pay Web merchants directly

In Active advertisement, there are two types of models. They are _____ and ________
The network based technology is/are ____________
Decryption is a process employed for scrambling of plain text for web based transactions

Asymmetric cryptosystem is based on __________ and ____________

Value Added Network is an example of _________

The advertising strategies emerging in the on-line world are ____________

The _________ model use direct mail, spot television or cable television, in active based
advertisement.
The ________ is a form of mail that is not targeted to a specific audience
The __________ model refers to information that is placed at a point where it will be noticed by
customers in the course of other activities and does not require active search

The most beneficial advantage of ERP system is

What is the term that describes spying on ones business rivals to gain a competitive advantage?

What would you NOT be looking for when spying on a competitor?

An online drugstore such as Drugstore.com is an example of_______

Which of the following is an example of unacceptable online netiquette?

Which of the following statements is correct concerning the security of messages in an electronic data
interchange (EDI) system?

The wizard that is used to import text files is_________________


The alphabet indicating the column followed by the row number is known an__________

Which of the following files could not be opened in excel _______________


In excel, the dates that are stored as sequential numbers known as ________________The command to display the current date in a cell is _________________
In excel, absolute references are represented by a ________ before the column and row addresses
The ________ can be used to select the function and assemble the arguments correctly
Specific parts of information required by functions to perform certain tasks are called as___________
Which of the following do not belong to the formula category in excel environment__________
The function that in used to join cell values together in a single cell ________
The function that is used to count all the values that meet specific criteria _________

The wizard that is used to create and edit charts _______________


The function that is used to calculate the payment for specific loan terms ____________
The function that is used to add together all values that meet specific criteria is known as
____________
The __________ option present in the file menu options is used to specify major facts of the page to
be printed
The command that is used to apply a format automatically __________
The ____________ makes the information in a worksheet meaningful and easy to understand
A particular part of a work sheet can be printed by setting the _________
The process of finding or selecting information is known as ____________
The option that is used to cancel the filter process for a specific column and display all the records is
________
The URL for encyclopedia Britannica is_________
_______ maps IP addresses with the domain names of the sites

Internet can be defined as _______


The most important service of the ______ is to manage traffic control
_________is a program that displays information about a host connected to the net
_______ is a program or a tool that helps in locating a file anywhere on the net

URL stands for ____________

IN an URL the word before the color refers to _______


A ______ always begins with a slash
Prodigy is run by IBM and ______
The World Wide Web is referred to shortly as the _______

Gopher and WAIS enables the user to ______

______ is the program used to run CompuServe's regular services


Navigating through the menu of gopher is called moving around _______
The directories that come with built-in engines are yahoo,lycos and ______
To use the finger command,SLIP users must run a programme called______
The web maps are called _______
Directories consists of _______ levels
The _____ level gives the broadcast overview of the net
The huge list of keywords from important items is called ______

The two types of search in veronica are _____ and ______


_______ searches by keywords
Mosaic displays links in color whereas _____ does not display links in color
______ supports one button publish
SPY MOSAIC is distributed by_______
______ is a program that helps us to log on to other networks

HTTP is the acronym for __________


______is used to transfer and copy files over the internet

_____ is a program that helps us to log on to other networks

TCP/IP stands for ________________


Archie servers can be accessed in_______ different ways in internet
_______is the computer on the internet that translates between the internet domain names and the
internet numeric address

TIA stands for_____ in internet


Service indicates the name of the ________ used to access data, present on the other end of the link.

HTTP stands for______

________ is used to link pages in the world wide web

FAQ stands for ______


The internet adapter is a programme that makes our connection act like a _____or a ____ account
The step involved in Communicating between the web clients and servers is ______________

WSIRC stands for______


Two of the important browsers are_____ and_____

Lynx is a _______ programme that works with terminals


The huge list of keywords from important items is called an_____

VERONICA is an acronym for _______________

The first freenet is created at the_____ and is called______


________ are defined as ways of communication amongst networks

______and_____ are web searching features


WINWAIS has two source lists namely____ and______
________ is also called as WAIS manager

HTML stands for_____


The system of interlinked documents is known as_______
The small programmes that create animation,multimedia,real-time games and multi user games are
called______

The information displayed on the web page includes______,_____ and_____


The web pages that represent online home of their author are called______

GNN stands for______


_____ is the most popular internet service

The online service offered by navigator gold 2.0 are _______ and_____
_______ is a program or a tool that helps us find a file anywhere on the net
The databases to enable keyword search using Lycos are a2z,_______

______ is a large worldwide bulletin board service network

BABEL consists a glossary of _____

Dictionaries,encyclopaedias,government and other references are found in ______

Yahoo,lycos,excite and webcrawlers are _____

GIF is the acronym for ____________

JPEG is the acronym for ___________


The Web aids users to explore the ________

The three most popular mailer are_____,_____ and______

The World Wide Web consists of _________


In Microsoft Internet Explorer, the color of the text can be specified using _________ attribute of the
font tag.

The interface that provides effective communication between the web browsers and servers is
_________
CGI is the _________ between web browsers and servers
CGI programs are invoked based on the information provided by the _________
A CGI program is usually called after a request made by the _________

URL stands for ________

A hyperlink can be on ___________


HTML was derived from _________
SGML is a _________

PINE stands for _____________

The application that confirms whether a document is compliant to its DTD is _________
Web is a collection of ___________

IETF stands for ________

The two major browsers used to surf the Internet are ________,_______

Special characters allow browsers to display _________________


The keyword for providing links within or across documents is____________

Stringing pages together using hypertext technology helps view pages _______________
The initial web pages present in a web site is the ________ page.
The image format supported by most browsers is________________.

The components of a URL are ___________

The mail we send has a mailing address and most of them correspond to_____,_____ and

Which of the following is not supported by internet explorer _______________

CGI stands for ____________


Host name indicates the domain name of the web ________
The internet is also called as _______________

The internet is similar to _________________


The net drivers______ from one place to another

The net provides interesting services like______,______ and______

The windows internet software available are______,_______,________ and______


________ is the ancestors of the internet

DARPA stands for _______________________________________________


The uuencode files start with a _______

DARPA is broken into ________ and _______

NSFNET is the united states provides service to _____ and_____

HTML stands for ______________________________________

The first international IP network connections were established in 1973 with _____ and_____
A_____ is a set of computers interconnected by transmission paths to exchange information in
internet
A computer that provides a service usable by other computers is called______

A_______ is the representation of physical connectivity of the computers in internet

DTE stands for ____________________


The basic function of the ______ is transmitting the bits over a channel

The point to point channel network is also called as _____ and_____


Accessing files using FTP servers is called_____
The three most commonly used networks are______,______ and______
________ is in between LAN and WAN
_____ can be owed by multiple organisation
Data is transmitted in the form of_____ signals

DTD stands for __________

Modem stands for __________________


______ is the process of the digital signals being converted into a form suitable for analog
transmission

________ and______ are two basic ways of getting connected to the internet

SLIP stands for ________________

PPP stands for _____

Which of the following best describes uploading information?

A characteristic of a communication channel that is the amount of information that can be passed
through it in a given amount of time, expressed in bits per second.
The act of searching through storage to locate information without necessarily knowing of the
existence of the information being sought.
A "recipient" of the certificate desiring to rely upon a Digital Signature created by the subscriber named
in the certificate is called the ____________
The Relying Party can use the ___________ listed in the certificate to verify that the digital signature
was created with the corresponding _________

Digital Signatures are used for a variety of Electronic Transactions like ________________________
To associate with a key pair with a prospective signer, a Certification Authority issues Digital
Certificate

Digital Signatures, if properly implemented and utilized offer promising solutions to the problems of
Imposters, Message Integrity, __________ and _____________
In, Digital Signature, _____________ perform the "ceremonial" function of alerting the signer to the
fact that the signer is consummating a transaction with legal consequences

A Digital Signature must have the following attributes ________________ and _____________
"Hash Function" is used in both creating and verifying Digital Signature
___________ provides assurance of the origin or delivery of data in order to protect the sender
against false denial by the recipient that the data has been received, or to protect the recipient against
false denial by the sender that the data was sent.
___________ serves the ceremonial and approval functions of a signature and establishes the sense
of having legally consummated a transaction.
________ is a branch of applied mathematics concerns itself with transforming messages into
seemingly unintelligible forms and back again.
The complementary keys of an asymmetric cryptosystem for Digital Signatures are arbitarily termed as
_________, and ____________
_______ is known only to the signer and is used to create the digital signature.
_______ is ordinarily more widely known and is used by a relying party to verify the digital signature.
____________ is the art of protecting information by transforming it into an unreadable format.

Which of the following activities would most likely detect computer-related fraud?

A digital signature is used primarily to determine that a message is:

What is a major disadvantage to using a private key to encrypt data?

Which of the following risks can be minimized by requiring all employees accessing the information
system to use passwords?

The acronym for B2B is ___________


The _____________ model is the least intrusive model but requires active search on the part of the
customer
__________ is / are a form of advertisement where people relate their experience with products and
services
The _________ are software agents who communicate with the business merchants on behalf of the
customers

The Pre-purchase preparation phase includes _______________ for a set of products

The _________ phase includes customer service and support to address customer complaints ,
product returns and products defects

The ________ allow companies to bypass the need for costly printed catalogs
A ________________ is a basket on the Net that is used to place the items that are being purchased

EDIFACT is an abbreviation of ________


The __________ allows for protocol conversion and communicates with the bank using the banks
private network or the Internet
In Ecommerce, data extraction, transforming the data into transmittable form, transmitting the data
and downloading the data are the operations employed in _________

The _________ commerce assists in integrating the customers and suppliers of the company directly
into the organisation
E-cash means______________________

E-commerce is a tool that addresses the desire of firms to cut services cost and improving the quality
of goods. It is a definition of e-commerce from _________

The small denomination digital tokens are called _________


The ____________ is the process of encoding information to prevent it from being read by
unauthorized parties
There are _________ types of data tables
The tables that allows the user to change or rearrange the data, summarize the data and evaluate the
data using changing points of view is known as

The wizard that is used to suggest hints for doing a task


In a chart Y-axis is known as_________
In a chart X-axis is known as_______________
_________ is a set of tables that describe each of the data series
________ is used to differentiate one data series from another
The chart that contains only one data series is _________
The chart that holds the column chart is _________
The chart that display two or more data series on a surface is _________
The chart that is used to display discrete data

_________ are not allowed in a macro name


Which of the following tool cannot be used to view the excel web page_______

The wizard that used to build an interactive table from data existing on sheets
The chart that is used for displaying stock market information
In excel, the subtotal command also generates grand total after the last group subtotal_________

In advanced filter , the criteria occupying multiple columns but more than one row, is considered as an
________ criteria.

The stacked bar graphs can be represented in __________


A pie chart can represent only one data series at a time
The ______ generates a summarized report in tabular form in an interactive manner

Which one of the following statements related to stock chart is NOT TRUE ?
The state government needs to finalize a five years plan to implement 100% literacy in the state.
Which one of the following will be the best tool that should be used to work out the plan ?
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won
in totality to obtain majority to form the government. Which one of the following will be the tool that will
help the team ?
Which one of the following will be the tool that provides a way to view and compare the results of all
the different variations together on the worksheet ?
A ___________ is an excel file where the user stores his data

Spreadsheets are useful for _______________

Which one of the following is NOT the component of the pivot table ?
Excel allows upto ______ levels of sorting
Filtering rearranges a list to display the required records

The stacked bar graphs can be represented in _____________


The ______ generates a summarised report in tabular form in an interactive manner

Which one of the following statements related to stacked bar chart is NOT TRUE ?
The state government needs to finalize a five years plan to implement 100% literacy in the state.
Which one of the following will be the best tool that should be used to work out the plan ?
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won
in totality to obtain majority to form the government. Which one of the following will be the tool that will
help the team ?
Which following function is used in subtotal option ?______________
A workbook consists of many ________

Which two of the following statements related to pivot table are TRUE ?
Which one of the following is NOT a What-if analysis tool ?

The _________ wizard separates contents in a cell into different cells


A spreadsheet is a grid of rows and columns and is called as a ________
Pick out the window that is not a form of excel ___________

On an Excel sheet the active cell is indicated by

Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of cells
A6, A7, and A8 are _____.

If a cell shows ####### , it means that _____.

Which is not an advantage of using computerized spreadsheets?


The gym teacher has a new program to calculate physical fitness in terms of weight and exercise. The
use inputs different weights or amounts of exercise to determine the related physical fitness. This
"What if" program is most likely which of the followin
The difference between the highest and the lowest values.
Spreadsheets can be used for...

To select a column the easiest method is to


If you press _____, the cell accepts your typing as its contents.
The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as

All of the following are considered constants EXCEPT:

Which of the following may NOT be included in a formula?


Which of the following is NOT a valid mathematical operator in Excel?

Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first?


Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?

How can you tell which cell in a worksheet is the active cell?

How can you change the active cell?

Which of the following would you use to change the font size of a cell in Excel?

The command that will save the current workbook with a different file type is:
The command that will print an Excel workbook is found on the ____________ menu.
In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the date
and time a file was last modified.

Which of the following commands will automatically adjust cell references in formulas?

Which of the following commands will remove cells, rows, or columns from a worksheet?

Which of the following options is NOT controlled through the Page Setup command?
Which command enables you to change the margins for a printed worksheet?
All commands are carried out on a rectangular groups of cells known as a:
Which of the following is a valid cell range?
In a copy operation, the cell(s) you are copying from is called the:
In a copy operation, the cell(s) you are copying to is called the:

Which of the following commands is needed to duplicate the contents of a cell in another?
A cell reference that does not change during a copy operation is known as

Which of the following is considered an absolute cell reference?


Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, what
will be the contents of cell E4?
Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to cell E4,
what will be the contents of cell E4?

Which of the following commands is needed to transfer the contents of one cell range to another?

The F4 key is used to:

Which of the following quickly copies the formatting of a selected cell to other cells?

Which of the following will insert a hyperlink into an Excel worksheet?

Conditional formatting applies formatting to a cell based on:

If you enter a date into a cell, Excel stores the date as:

You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened that
worksheet again on August 31. What will be displayed in cell E17 on August 31?

The number of days between two cells containing dates can be calculated by:
The function key that is used to quickly edit the contents of a cell is:

What will be stored in a cell if 3/4 is entered in it?

A users response to the InputBox function can be stored in:


The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to
row 10 is _____.
The teacher has a spreadsheet showing all Year 10 students and their marks in one Mathematics test.
To find the student with the highest mark, which of the following functions should be used?

Which chart type best shows proportions of a whole?

Which of the following is TRUE regarding chart types?

To select several cells or ranges that are not touching each other, you would _____ while selecting.
Your Institute teachers have set an assignment on Studies. You are required to use a spreadsheet to
record all that you study on each day for four weeks. You decide to show each weeks data with an
accompanying graph. What is the best way of doing this

What would be the best method to quickly copy the formula from the active cell to each cell below it?

To arrange rows in alphabetical order based on column A, you need to use the command _____.
What can you NOT do with a spreadsheet?

To print just part of a sheet, you would select what you want to print and _____ .
Spreadsheets can be used for...
The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in B2 is
_____.

Which of the functions is not valid for performing addition

The default orientation for the printed page is _____.


Which is not a valid cell address?
The World Wide Web was devised by _________

The useful URL schemes are_____ and______

The other ways of getting connected to the net are_____

BBS stands for______


USENET is a BBS on ____ scale
WINSOCKS is expanded as______
IETF Level 2 HTML DTD supports graphical browsers like _______
The space used by Netscape to store the retrieved page is called______
The principles, means and methods for rendering information unintelligible and for restoring encrypted
information to intelligible form.

A long string of seemingly random bits used with cryptographic algorithms to create or verify digital
signatures and encrypt an decrypt messages and conversations.
Protected/private character string used to authenticate an identity or to authorize access to data.
The successful act of bypassing security mechanisms of the system.
A set of rules and formats, semantic and syntactic, that permits entities to exchange information.
An attempt to get access to a system by posing to be an authorised person.
An action or event that might prejudice security.

According to information Technology Act, 2000, To investigate contraventions the controller of


certifying authority shall exercise the like powers to that of
Malicious software.

None the person who is known as father of Internet


This website is the biggest bookstore on the earth.

When we talk of Data Transmission modes, then ATM stands for


A sequence of bits or characters that identifies the destination and the source of a transmission.
The means of communicating between networks
A group of computers and other devices dispersed over a relatively limited area and connected by
communication links that enable a device to interact with any other on the network.

The term HTTP stands for

A NIC is considered as

A hub is a device that can connect

Which of the following is true concerning the function of a switch?

What do routers connect?


What does a router route?
Software which prevents external access to a system is termed
If four computers are connected to a hub and then to the internet, how many IP addresses are
required for these 5 devices?
Which of the following in an OSI layer
When creating a network from just two PCs, what kind of cable would be used to connect them?

An IP address is a
To construct a simple LAN of 4 computers, you would connect them with ______connect them

What happens to data that is ruined before reaching to receiver

Bluetooth is
Which is not one of the recognized IEEE sub layers?
The most preferred number system to represent a IP address is
A MAC address is of

Protocol is
A ............... is a LAN-based computer with software that acts as a controlling device for controlling
access to at least part, if not all, of a local area network and its available resources.

What is the biggest disadvantage of the Ring topology?


The .............. of the network concerns how network devices are physically (or optically)
interconnected.
The principal topologies used with LANs are:
What are the various types of bus architecture?
What are the various types of ring architecture?
In a ................., each workstation attaches to a common backplane via its own physical cable that
terminates at the hub
In a ............... , each work station is directly connected to a common communications channel
Which one of the following is NOT a network topology?
In a .............. , the cable system forms a loop with workstations attached at various intervals around
the loop
The Media Access Control (MAC) is a sub layer of the:

What are the most common LAN technologies used in networking today?
Modem speeds are measured in
LAN speeds are measured in

WAN speeds are


Accessing the Internet from a typical home PC requires the use of

To use the Internet, you

The worldwide web server uses the following standard interface to act as the middleware:

An NIC
Accessing the Internet from a typical home PC requires the use of

The most widely used network operating system on PC LANs is

JPEG and MPEG

To use the Internet you

A multiplexer is a form of

An ISP

FTP is

Telnet

A firewall is
A proxy server is

A search engine is
To look for information about interest areas on the internet, the user should use a

An ISP

FTP is

Telnet

Which of the following is a true statement about the OSI model layers?

Which of the following is NOT true about the Internet?


The traditional intent and impact of this common type of attack is to prevent or impair the legitimate
use of network resources.

A firewall is

Which of the following is NOT an example of a DoS attack that is popular among hackers?

A ____________ attack is when a hacker sends a continuous flow of packets to a system.


One defense option on a large network is to configure a ____________ to disallow any external traffic.
A proxy server is

Which of the following would be performed on a network server and not normally on individual
workstations?

What can be said about the safety of the Internet?

To secure communication network against wire-tapping the most effective control is

One way that a virus CANNOT spread throughout a network is:


Which of the following is NOT a means of monitoring employee use of company technology?
____________ would be used by parents to monitor their children on their home system.
The formal rules and parameters which are established to permit a microcomputer to communicate
with the mainframe computer as though it was a terminal of the mainframe are called

The two most common tools used to help with extracting information are:

Which of the following would NOT be considered an example of cyber terrorism?

Which of the following would be a form of cyber terrorism?

Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life?

An organisation is upgrading its telecommunication lines. Which is the least important objective while
upgradation

A company posts a price list of its products on its website. The advantage to the customer is that the
company can

Which of the following is an easy-to-use service to get information on someone?


Which of the following pieces of information would NOT be found online?
Which of the following is the most common danger on the Internet?

The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive
information is called _________________.
Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called:
Setting your privacy settings in Internet Explorer to medium is one way to block:

What is the best means of protection from cyber stalking?

Which of the following is not an appropriate control over telecommunications software


Encryption techniques can be implemented in Hardware-Software
Which protocol would be used to download a free anti-virus program from the Internet?

The major advantage of the checksum program is when it

Which of the following is a Web browser?

A Web page is another name for -----------

Domain names must contain a description of the type of organisation that the domain represents. A
very common abbreviation used include:

A standard language for creating and formatting Web documents is:


The Web page format in which all elements of a Web page are saved as one file is called:

Which of the following requires an Internet connection?

Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his computer
how would he do this?

Which of the following is used to update a Web query?


You download from the internet, a screensaver, a ten-second sound file and a ten-second music video
clip. You also add a hyperlink. Which of the media elements has the greatest effect on the file size?
When saving a photograph for use on a website, which format should you choose?

While researching the Direct taxes assignment, you find a useful website. What is the most efficient
way to access the site at a later time?
A system that uses the Internet for business-to-business interaction is called a(n):

A block of text automatically added to the end of an outgoing email is called


_________ refers to the use of Internet technologies for placing telephone calls.

Most client/server applications operate on a three-tiered architecture consisting of which of the


following layers?
Which do you NOT need to connect to the Internet?

What does FTP stand for?

What is the purpose of DNS?


Which of the following is NOT a properly formatted IP address?

Which of the following is a properly formatted email address?

The Internet is controlled by whom?

What does IRC stand for?

If you do not pick up your email for a week...?

What does HTML stand for?

What is a disadvantage of joining a mailing list?

In Powerpoint2000 ,the built-in professional design elements are


Selection handles are the 8 small ___________ that appear around the object, when an object is
selected
The _______ is an invisible matrix of vertical and horizontal lines that covers the entire slide
workspace
_______ are drop-down menus that appear when the right mouse button is clicked on the screen
element

________ and ______ have the ability to add a lot of visual impact into the PowerPoint presentation
_______ is a motion picture or any animation file
In visual basic, when a record pointer reaches to the last record, _______ property of a recordset
object is automatically set to ______

In visual basic, the explorer view of a project is displayed in ___________


In visual basic, when a record pointer reaches to the first record, _______ property of a recordset
object is automatically set to ______
In visual basic, _______ is a method to convert a string into integer.
In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type of shape
should we get?
In visual basic, a timer event is only available in timer control.
In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any object
In visual basic, _______ is a property of a textbox control to set a color of a text.
In visual basic, _______ property of a textbox control is set to _______ to underline a text
In visual basic, _______ property of a textbox control is used to change the size of text.

In visual basic, the interval property of a timer control is given in ________


In visual basic, _______ property of listbox control counts the number of items in the list

In visual basic, the properties of various controls can be set using __________
In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a messagebox
function.
In visual basic, ________ is a function which displays a message and it also allows the user to enter
values in a form object
In visual basic, using a data control, ________ is a recordset type which allows to add a new record
and also to update existing record in a recordsourse object
In visual basic, while closing a form _______ event of a form object is triggered earlier to terminate
event.
In visual basic, to give a backcolor or to bring in a picture to a command button can only be done if we
set the style property to ______
In visual basic, a method RGB(255,0,0) will generate _______ color
In visual basic, a method RGB(255,255,255) will generate _______ color

In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible.

In visual basic, if a user uses a function key F4 _________ becomes visible.


In visual basic, when a textbox control receives the focus ________ event is triggered.
In visual basic, a form is a ________ object.
Microsoft visual basic is a Rapid Application Development tool.
In visual basic, when a form object appears on the screen _________ event is triggered.
In visual basic, to display text on a label object _________ property is used
In visual basic, _______ object is used to access the database and also to manage the data in the
database.
In visual basic, when a checkbox control is checked _______ property is automatically assigned with
1.
In visual basic, _______ keyword is used to declare a variable
What is the extension of the Visual Basic project file that stores the design of a user control.
Which event of a text box would you use for validating the data entered by the user?

Which of the following statements forces inline error handling?


The _______ method resets the contents of bound controls to their original values when the user
clicks on the cancel button.

To deactivate the Form UnLoad event, you make the following change in the function definiton:
How many root nodes can a TreeView control have?

A project group is a Project which:

Procedures declared in a _____ are local whereas procedures declared in a ______ are available to
the whole application.

How can you keep the user from exiting a form by clicking the Close button?
The _______ property enables Visual Basic to draw complete images in memory before displaying
them on the Screen.

You want to display the code and the description of an error. What would be the correct syntax?

What is the purpose of the Image List Control?


Which method would you use to get a free or unused File identifier while opening any file:
Which property procedure is used to retrieve the value of a property?

Which of the following can be shown to the user using the Common Dialog control in VB?
Which of the following are not properties of Command Button:

Which events enable you to determine which key was pressed by the user?
In order to access a file in Non-textual format, you have to open file in:
Visual Basic displays information depending upon the current value of two properties of the form,
called:

Which of the following procedure types will execute when you assign a value to a property of an
object?
In order to overlap the controls (say a command button) during design time, we use the Send To
Back or Bring To Front option from the Edit menu. To change it dynamically (i.e.during program
execution) we need to change:
Which property of the ProgressBar determines how much of the bar is filled?
The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program.

The caption and the name properties of the command button:

You try to initialize a new Object variable with the following line but receive an error. What could be the
possible cause? Set MyVar = New Classname

Which of the following will perform a direct execution of a Command object?

The vb Critical symbol displays:

vbYesNo is an example of a(n):

The primary difference between the MsgBox statement and the InputBox function is the:

Which of the following is TRUE about a protected form (i.e., a form where the Protect Form button on
the Forms toolbar is toggled on and is assumed to remain in that position)?
Which event is triggered when the user moves to another open form?

The user can use ______ to remove the undesirable part of the image

The power presentation has a _____ for a set of compatible colors

The set three colors used for graphs and for secondary slide items is called as
There are ______ types of charts available in PowerPoint
_______ charts are useful while showing variations over a period of time

_______ are the individual pages of a presentation


A PIE Chart is a ____ diagram that depicts the relationship between a whole and its parts
Each individual piece of data in a series is called a/an

PowerPoint launches an OLE-compatible application called

When the user double-clicks on an organization chart object in PowerPoint

The _____ are used for selecting, editing and viewing objects in the chart

Manager box tool in organizational chart window is

The custom drawing tools are _______ by default


Click on the box tool ______ to draw three boxes
There are ____ default fields available in all boxes of the organizational chart
The _____ tool is used in the same way as we use a pen to draw a table
A/An _______ consists of smaller printed version of the slides
The size of the object can be changed using the ______ tool
_______ is the process through which the slides in the current presentation are included in another
presentation or application
________ can be used to create charts as well as worksheets

PowerPoint can import text files that have been saved in ______ format

PowerPoint outlines can have _____ outline levels

When a file is saved with _____ extension, the graphics and text are also saved along with the slide

The hidden slide is

____ effect is used to introduce a slide during a slide show


A _____ is a special effect that determines how the objects appear on the slide
The notes page is formatted based on the

Pick the odd man out of the following


When a new presentation is opened ,powerpoint creates slides that have a width of _____ and a
height of ______ with the landscape orientation
The default orientation for notes ,handouts and outlines is ____ orientation
Build effect is also called as ______
Graphics for web pages are automatically stored in ____ format
A _______ is used to jump to any slide in the presentation

The ______ language has been incorporated into PowerPoint


In PowerPoint _____ is a series of commands that are executed in sequence

The macro will be activated


Developers can easily add ____ to PowerPoint 2000 by using the programming interface
______ determines the order in which order in which the slides will be displayed during the show
_______ is used to organize and develop the contents of a presentation

If we save the presentation file as a metafile, it can be opened using

With reference to autocontent wizard for creating a new presentation, which of the following
statements are not true

Which of the following statement is not TRUE

With reference to changing the order of slides, which of the following statement is not true

Which of the following definitions are not true

Which of the following statements are not true

Which of the following definitions are not true


The options available in the common task toolbar does not include

With reference to chart, which of the following statements are not true
The format of the text entered in a title, subtitle, or bulleted-list object is determined by the format
settings in a special slide called -------PowerPoint provides a _________ that searches the entire presentation i.e., all the text objects in all
the slides, outlines, notes and handouts for spelling errors
PowerPoint's drawing toolbar contains _______ drawing tools
Click _______ on the rectangle drawing tools enables us to draw multiple rectangles

An example of the components of a multimedia presentation could include

Which of the following formatting elements can be applied to a PowerPoint diagram using the
AutoFormat tool?

Which of the following formatting elements can be applied to a PowerPoint diagram using the Format
AutoShape command?

What happens when you double click a blank graph placeholder in a PowerPoint presentation?

The legend in a Microsoft Graph chart is:


Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best
chart type if you want to emphasize the total sales of each region?

Which of the following actions will enable you to insert a graph into a PowerPoint presentation?

If you are editing a slide containing a Microsoft Graph, how do you display the underlying datasheet?

How do you deselect a chart that has been placed onto a PowerPoint slide after you have finished
creating the chart?

What happens when you click the Datasheet button on the Microsoft Graph toolbar?

What happens if you single click a chart that is not currently active?

What happens if you double click a chart that is not currently active?

Using custom animation effects, you can build:

Which of the following animation effects can be added to a slide?

Which of the following animations effects can be added to a slide?


Which keyboard key is used to select more than one picture on a slide?

Custom animation can be used to affect ONLY:

Which of the following best describes the information that appears on the advanced timeline?

Which of the following objects can contain custom animation effects?

What type of program allows an object within an image to be edited without affecting other objects?

Which of the following animation effects can be added to a slide?

Which of the following is TRUE regarding the Datasheet?


Graphical software tools that provide complex analysis of stored data are:

Which of the following statements is TRUE regarding PowerPoint diagrams?


Which keyboard key combination is used to undo the previous command(s)?
Microsoft visual basic project file has _______ file extension.
In visual basic, _______ method is used to add an item in a combobox
In visual basic, _______ method is used to load picture during runtime in an image control

In visual basic, to populate a drive list box with a directory list box __________ statement is used
In visual basic, to display a message in the run time _________ function is used

In visual basic, to populate a directory list box with a file list box ________ statement is used
In visual basic, ________ is a property of a recordset object which counts the number of rows in a
recordsourse object
In visual basic, using a data control, a record can only be added from the last record. Adding a new
record is only possible using _______ method of a recordset object.
In visual basic, using a data control, a record is saved to a recordsource object using _______ method
of a recordset object.
In visual basic, using a data control, to navigate to the previous record ________ method of a
recordset object is used.

To deactivate the Form UnLoad event, you make the following change in the function definiton:Private
Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To prevent the Form from closing, you
will set the:
_______ is a word processing that is a member of the office 2000 family

The feature that enables user to type anywhere in a document without pressing or tab
The______ feature allows the user to copy and paste upto 12 items at the same time in an application

______ and _____ key combination will extend the selection by one character on the left and right

_____and_____ are improved layout in Word 2000

The easiest way to create a document in word is


In Office2000 environment the tool that makes work easier for us is_____
A short description of a tool bar button called the ______ is displayed when the mouse pointer is
allowed to stay for a second on the button
The _____ helps us to keep track of the margin of the page

The keys that are used to navigate between headers and footers are
Pick out the element from the following that dose not form the type of tabs for the Word 2000
_______are blueprints or patterns for documents of a certain type
The______ is used for quickly setting paragraph indention using the mouse
Word art is text with
AutoShapes in word can be created by accessing the _____
By default, a document consists of_____ section

The dialog box that is used to determine the documents margins is


________ is a box surrounding a page on all slides or a line that sets off a paragraph on one or more
slides
The key that is used to perform a task to select all t he text in the documents is
The key that is used to indent a paragraph is
The key that is used to change the font from the current positioned in a document is
The key that is used to change the style of the document that is from that normal to heading1 or
heading1 to other document styles.
'Set mapping' Check control that follows a text-type validation, we use ----------------- application for
data analysis.

Excel can import data from other databases for the data analysis.
A System Auditor can uses CAAT tools to analyze data
In the case of the ---------- control, it is ensured that the data in combination with other fields are
reasonable as per standard set by an organisation.
--------------- function searches for a value in the leftmost column of a table and then returns a value in
the same row from a column that we specify in a table
Most of the tools use in Data Analysis depends on

How do you define analysis of an information system?

What areas need to be considered in the SOFTWARE design process?

What is the function of systems software?

Formatting a disk results in all the data being...?

What is Direct Implementation?

What is parallel running?

What documents are produced during the development of a system?

What are User Guides are used for?

Systems software can be categorised into:

Which storage device cannot be erased?

Application software are programs that are written


Which bus carries information between processors and peripherals?
Convert the decimal number 2989 to Hexadecimal
Which bus controls the sequencing of read/write operations?

What are utilities?


Numbers are stored and transmitted inside a computer in

The original ASCII codes


A Nibble corresponds to

A gigabyte represents

A 32-bit processor has

A parity bit is
he contents of these chips are lost when the computer is switched off?
Clock speed is measured in

Cache memory enhances

CISC machines
Which parts of the computer perform arithmetic calculations?

Every data from the primary memory will be erased if


An RS-232 interface is

For print quality you would expect best results from

ROM

A UPS

smart card

Laptop computers use

Multiprogramming refers to

Multitasking refers to
What are small high speed memory units used for storing temporary results?
A good way to exchange information that changes rapidly is through

Multiprogramming is a prerequisite for

Timesharing is the same as

______ is the default view in Word used for typing Editing and Formatting the Text
The short-cut-key that is used to indent a paragraph spacing in the documents is
The short-cut-key that is used to paste the selected text
The short-cut-key that is used for paragraph spacing(1.5)
The box that separate text from the document and allows it to behave like an independent object is
known as
The object that is used to provide information like the title of the book, name of the chapter, page
number etc.

The object that helps us analyzing data statistically is known as


To highlight certain parts of a page to set it apart from the rest of the page we make use of the
following features
To clear all the tabs in a document the option that is clicked from the tabs dialog

The dialog box that is used to incorporate picture bullets into our documents or web pages is
The object that composes of set of tools which helps to create and work on different shapes like
rectangles, circles, flowcharts etc.
When word is opened a new document called_____ is displayed, where the user starts typing the
content right way
______ is an online dictionary maintained by word to obtain synonyms for words

The thesaurus is invoked by pressing_______

When a new table is created the insertion point flashes in the _____
By pressing the _____ key inserts a blank row after the last row in the table

The ______ option enables us to convert text into a table format


A table consists of ______ that contain text or graphics
The _______ option in word allows the user to automatically correct misspell words as and when they
are typed
______ is a facility that enables recording and replaying of a sequence of keystroke
In Word Macros are written in _____
In Word 2000 the macro dialog box is activated with the help of ____ key combination

________shows how a document would look like when published on the web or on an intranet
______ is a software for sending and receiving e-mail messages
________is the coding system used to create web pages
The network that makes information easily accessible across various networks is _______

Which of the following statements are false with reference to the use of a header row source for a mail
merge

With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE false


The alignment available for tabs does not include

Which of the following statements related to a Section Break are True


The user can set a spelling checker to skip the marked part of the next
New option under the file menu of word creates a new blank document that is based on the normal
templates
The user can split the screen only into two parts
The features that enables the user to type text graphics tables anywhere in the document without
pressing enter or tab
The user can modify the picture from the clip art

With reference to auto correct which of the following statements are false

With the reference to password protected documents which of the following statements are false
The alignment available for tabs does not include

Which of the following statements are False


Drop Cap tool does not work for the contents in the table format
The user can split the screen only into two parts in MS-Word
The special symbols that are inserted using "insert symbol" option of the word can not be printed by
the printer as they are not standard keyboard symbols
The "format columns" option allows to create columnar text up 12 columns only.
The document that makes the user to organize and maintain a long document, such as multipart
report or a book consisting of chapters

The view that enables us to view how objects will be positioned on the page when it is printed

The mode that is initialized or toggled to if the user is in a position to overwrite the text in the word
Veena is entering a paragraph in a word processing program. When the cursor gets to the end of a
line, what is the best way to get the cursor to the next line?

How are data organized in a spreadsheet?


Which key moves the cursor to the beginning of the next line of text?
Veena typed the following sentence: "The girl was very beautiful." In which word processing utility
could she find a synonym for "beautiful"?

Using an electronic bulletin board, Seema can do all of the following except which one?
Aryan has created a ten-page story, but only wants to print the first two pages. What printer command
should he select?
What process should be used to recall a document saved previously?
Which is used to indent text within a document?

Desktop publishing is a more sophisticated form of which of the following types of software?

What is a Word Processor used for?


What is a picture that is saved on a diskette and can be pasted into a document?

What is a Word Processor used for?

What basic tools would you find in the Edit menu of a word processor

What is a header in a document?

What hardware is essential for a word?


The user could take a picture from a magazine and insert it into the document by using a

What basic tools would you find in the Edit


Assume you are creating a two-column newsletter. Which type size is the most reasonable for the text
in the columns?

Given the default left and right margins, and -inch spacing between columns, the width of each
column in a two-column document will be:

Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot see
any columns on the screen. What is the most likely cause?

While word processing, in which of the following situations would Tom use the "Copy" command?

What does a document contain?


Before submitting your work you want to find any words spelt incorrectly. Which of the following would
you use?

What command in a word-processing program can be used to change the word him to her, and also
the word he to she in the given phrase? On a cold and still night, the only sound that could be heard
was the owl that had ade its home in the nest outs
What edit commands would you use to insert a paragraph from one document into another document,
while still keeping the paragraph in the first document?

Which of the following statements would NOT be a reason for showing suggested revisions in a Word
document without changing the original document?

Which statement is NOT true regarding revisions made in a Word document?

How are suggested changes entered for review on an initial Word document?

Which of the following is TRUE about saving a document using the Versions command?

What happens when you open a document that has been saved using the Versions command?
You have used the word discover four times in an English essay you have created using a word
processing program. You would like to find another word of similar meaning to use instead of
discover. Which of the following would you use to do this?

When opening and working with multiple versions of a document, how can you tell which is the most
recent version?
Various fields are added to a regular document to create a special document called a form through the
____________ toolbar.
Which of the following types of fields CANNOT be inserted into a form?

Which of the following is TRUE related to editing comments in a Word document?

What is a header in a document?


In your English essay you notice that the paragraph at the bottom of page 1 continues on to page 2.
You would like to make this paragraph start on page 2.What would be the best way to do this?
Tables in a document help you to easily arrange all of the following EXCEPT:
To identify a document, it is helpful to include the file name on each page as a

Which of the following tools will copy the formatting of selected text to other places?

What is the name of the process of determining the cause of errors in a macro?
Drop caps are added to a Word document using the ___________ menu.

A reverse in a newsletter is:

A pull quote is best emphasized by:

Which of the following definitions is CORRECT?

Pertaining to newsletters, which of the following cannot be changed using the Columns command
dialog box?
As related to type size, how many points are there to the inch?
Assume you are working on a newsletter in which the masthead extends across the top of the entire
first page. The rest of the newsletter has two columns. What is the minimum number of sections in the
newsletter?

Which of the following is NOT correct with respect to page, column, and section breaks?

Which of the following would be the most appropriate font for a newsletter headline?

Which of the following is the default Word column width?


Sequence Check is a --------------- level control check.
Analyse data over two or more periods is called ----------------------- analysis
We use Hash Total to identify ------------ within a series where there is a definite relation between
items

Analyse fields by arranging them into rows and columns is called


--------------------- function searches for a value in the leftmost column of a table and then returns a
value in the same row from a column that we specify in the table.
To import data from Access to Excel ,it is not possible to link between Access and Excel sheet
The GAP detection options can be used to test for completeness of data.
Exception testing can be used to identify ----------------- items
Data validity test represents
Year end ledger, inventory files or transaction files can be tested for cut-off , to ensure that the data
has been provided is for the correct audit period
In Range Check , the data may not be in proper sequence but should be within a predetermined range
In ---------------- Check data entry follow a particular sequence and also a predetermined range.

Virtual memory is

Multiprocessing is

To help keep sensitive computer-based information confidential, the user should

What is the function of a disk drive?

A 4GL is
A nanosecond is

What small, hand-held device is used to move the cursor to a specific location on the screen?

The memory address register is used to store

The memory data register is used to store

The instruction register stores


Which of the following is used to indicate the location on the computer monitor?
A mathematical procedure that can be explicitly coded in a set of computer language instructions that
manipulate data.
Which of the following translates a program written in high-level language into machine language for
execution?
Detecting errors in real memory is a function of

To find where a file has been saved on disk, the user should
A series of instructions telling the computer how to process data or files is defined as a

To ensure that data is not lost if a computer system fails, the user should
Having a single CPU alternatively process tasks entered from multiple terminals is called
The place in the CPU where the data and programs are temporarily stored during processing is called
the

All are examples of computer software except

Computer manufactures are now installing software programs permanently inside the computer. It is
known as
Which of the following file organisation forms most efficiently allows access to a record
The part of the computer system controlling data manipulation is called the

For direct access storage devices the recording area is divided into

The data hierarchy from the largest to the smallest is

Which of the following hardware or software system controls provides a detailed record of all activities
performed by a computer system
Which one of the following parts of a computer is necessary to enable it to play music?
An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15 minutes
of sound and 1 minute of video. Which of the four different media listed takes up most space on the
CD-ROM?
Which one of the following printers is suitable for printing sprocket fed carbon copies?

Multimedia software can be most productively used for

To be effective a virus checker should be


Which one of the following software applications would be the MOST appropriate for performing
numerical and statistical calculations?

Passwords enable users to


How many bytes do 4 Kilobytes represent?

Back up of the data files will help to prevent


Which one of the following is the MOST common internet protocol?

The advantage of a PC network is that

The term A:\ refers to

UPS stands for

The main problem associated with uninstalling software is that

You are conducting research for a Income Tax assignment. The raw facts you collect are called

A flow chart is the

A voucher entry in Tally is done for

Passwords are applied to files in order to

Each of the following is an enabler of IT-business alignment except:


The basic systems model is used to describe virtually all information systems and it consists of the
following elements:

What is a computer-aided design system?

A(n) __________ offers a solution package for an entire industry.

File extensions are used in order to

Information systems controls include all of the following EXCEPT:


Hashing for disk files is called
Components of expert systems include: a) inference engine; b) user interface; c) knowledge base; d)
fuzzy logic
Black box testing and white box testing are part of:
What is the term used to describe the point of interaction between a computer and any other entity,
such as a printer or human operator?
The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility

Which of the following is an acceptable way to shut down the computer?

Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best way to locate the files?
Components of an information system model are: a) applications architecture; b) functional
architecture; c) technology architecture; d) information architecture

Benchmarks form part of:


Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run totals

Which is not part of help desk documentation:


Testing of individual modules is known as:
Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface
architecture; d) presentation architecture

Which is part of installation testing:

The computer operating system performs scheduling, resource allocation, and data retrieval functions
based on a set of instructions provided by the:
Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio

Which of the following procedures should be included in the disaster recovery plan for an Information
Technology department?
Designing relationships among components is part of:
Several Computers connected together is called:
Which network topology uses a Hub?
Which of the following topologies is used for Ethernet?

Application software are programs


Which type of file search method requires a computer first read all locations preceding the desired
one

Which of the following areas of responsibility are normally assigned to a systems programmer in a
computer system environment?

Which of the following is recommended when many searches for data are required

It is unlikely that a magnetic tape containing several thousand blocked records can be used on two
machines of different architecture directly because

Which component of the CPU has the most influence on its cost versus performance
Which of the following terms applies to network used to connect computers with other computers,
peripherals and workstations that are in fairly close proximity

Intelligent terminals differ from dumb terminals in that they


A computer is to be linked to 8 terminals using a single communication link. To permit simultaneous
terminal operations, communication path will require which of the following

A modem is a device that


A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives and printers.
This type of network is called a

A computer based system for sending, forwarding, receiving and storing messages is called an

If a workstation contains a processor, monitor, screen manipulation device, printer, storage and
communication capabilities, it is said to be

Terminal hardware controls include

RS-232 is a

What is a compiler?

What are the stages in the compilation process?


Which of the following is not a data transmission coding scheme

What is the definition of an interpreter?

A device used in data communications to divide a transmission signal into several sub-bands is known
as a

Third generation languages such as COBOL, C, and FORTRAN are referred to as

Serial Communication is used over long distance because it

In what areas is the COBOL programming language used?

The primary function of a front-end processor is to

What is the first stage in program development?


Which of the following is not used for data transmission within a local area network

What is System Analysis?


A device to device hardware communication link is called

What will a good software provider consider?


The topology of a network can be each of the following except
What is the 8-bit binary value of the decimal number 85?

Which is the most common data transmission error checking method


What is the decimal value of the binary number 1111?
Which of the following devices merges communication signals onto a single line
What is the decimal value of the octal number 215?

Which tool is used to help an organization build and use business intelligence?

Cache memory enhances

What is the decimal value of the hexadecimal number FF?


Numbers are stored and transmitted inside a computer in
What is the hexadecimal value of the decimal number 1476?
A byte corresponds to

What does EBCDIC coding of numbers mean?


A Kb corresponds to
What is the binary sum of 01011 and 00101?
Information is stored and transmitted inside a computer in
Where would you find the letters QWERTY?

A parity bit is

How did the computer mouse get its name?


Clock speed is measured in
What are you most likely to use when playing a computer game?
CPU performance may be measured in
A digitising tablet can be used for?

In processing cheques which of the following I/O techniques have banks traditionally used
Which of the following is a pointing device used for computer input?

A UPS

What does a light pen contain?


The capacity of a 3.5 floppy is around

What general term describes the physical equipment of a computer system, such as its video screen,
keyboard, and storage devices?
Where would you find the letters QUERTY?
What are you most likely to use when playing a computer game?

A digitising tablet can be used for?


Which of the following is a pointing device used for computer input?

What input device could tell you the price of a product


Where would you find a magnetic strip?

Hard copy is a term used to describe...?


What are the individual dots which make up a picture on the monitor screen Called
A daisy wheel is a type of...?

What input device can be used for marking a multiple-choice test?

Laptop computers use

QWERTY is used with reference to

What input device could tell you the price of a bar of chocolate?

A GUI is
Where would you find a magnetic strip?

Multiprogramming refers to

Multitasking refers to

Multiprogramming is a prerequisite for

UNIVAC Computer belongs to the

Timesharing is the same as


Name the first Indian Super Computer?

Disk fragmentation

The technology which is used to check answer sheets of multiple-choice questions in civil services or
similar examinations is: -

A compiler is

Which printer among the following is fastest


Zipping a file means

What does acronym VIRUS stands for

An impact printer creates characters by using...?

A client-server system is based on


A nanosecond is
A procedural control used to minimize the possibility of data or program file destruction through
operator error is the use of
_______ software enables users to send and receive data to/from remote computers
A _____ is a running instance of an application
Splitting of CPU's time for different tasks _______ prevents time slicing
______ computers are used in large organizations for large scale jobs which have large storage
capacities
_______ is responsible for all calculations and logical operations that have to be performed on the
data

______ printer use laser light

______ software enhances the user to enter ,store, manipulate and print any text

______ software enables users to send and receive data to/from remote computers
_______ is the temporary storage place for deleted files
_____ is a collection of related fields
_____ language consists of strings of binary numbers
______ symbol is used to represent processes like assigning a value to a variable or adding a number

_______ is an example for micro computer


_________capability supports concurrent users doing different tasks
The ______ do not have processing power of their own and has only a screen, keyboard and the
necessary hardware to communicate with the host. For this reason, the terminals are referred
as_______________

A______is nothing but a PC with a network operating system


_____system is responsible for handling the screen and user I/O processing
The______ handles data processing and disk access in a Client/Server architecture

Both the DBMS and the application resides on the same component in a ____system

When all the processing is done by the mainframe itself, the type of processing is sometimes called as
DBMS models can be grouped under____ categories

______is the most advantageous database system


A new user initiates a new process of execution at the background,while the user can continue his
query process as usual in the foreground. This situation is referred to as ______

The process of data being automatically written to a duplicate database is called______

Modem stands for __________ .


Multiple changes to the same record or a field are prevented by the DBMS through______
_________allows an application to multitask within itself

LAN stands for __________ .


New process of execution is referred to as______

ISDN stands for _______.

_____________ is the Worlds largest computer network .


_______is/are a popular front end tool

When LAN connected together ,it is called __________ .

TCP/IP stands for _________ .

Data is broken into small unit called __________ .

SMTP stands for __________ .

The __________ protocol is a network protocol to be built for the World Wide Web .

ATM stands for __________ .

The computer which can receive data from other computers on the network and print it is _______
The hardware and the software requirements together form the_____

ATM, Asynchronous transfer mode is a __________ technology.


__________ is designed telephone system

Expansion of ISDN is ________

Expansion of WBT is ______________


_________ connects LANs.
Collection of instruction is called a _____
Combination of alphabetic and numeric data is called _____ data

Computers can be classified based on ______,______and _______

_________ are used in large organizations for large scale jobs

_______ is responsible for feeding data into the computer


_______ is the capability of the o/s to run numerous applications simultaneously
_______ involves conversion of raw data into some meaningful information
_______ is responsible for obtaining the processed data from the computer

_______ printers use light to produce the dots needed to form pages of characters

Hardware components in a computer are _____,____,_____,______

_______ software are programs that are complex and can be developed or purchased
_______ is a set of special instructions used to communicate effectively with the computer
_______ converts a high level language into machine language
_______ translates assembly language program into machine language instructions

op1

Ctrl+C

op4
ans
None of
ALT+F1 CTRL+F1 the above A
None of
Tally IMP Tally INI the above A
false
A
None of
ALT+F3 CTRL+F3 the above B
None of
Bill
A or B
the above C
Three
Four
Five
B
None of
Alt+C
Alt+Ctrl+C the above B

TRUE

FALSE

TRUE
*

FALSE
$

&

Cash Flow
Statement
s
Two
Alt+D
Create
Informatio
n

Fund Flow
Statement
s
Three
Alt+X
Alter
Informatio
n

Ratio
Analysis
Four
Ctrl+T
Display
Informatio
n

F4

F5

F6

Alt+P

Ctrl+P

F1
Tally
ODBC
TRUE
F3
Invoice
Two

op2

op3

A
^
A
Puchasing
,
Puchasing
Accounts Receiving
and
Puchasing payable
and
Accounts and
and
Accounts
payable
Receiving Receiving payable
D
Mone of
Single
Multiple
A or B
the above A

Tally Audit Statistics


Bin
True
Enterprise
Data
Interchan
ge
TRUE
2
data
element

Data
False
Enterprise
Data Informatio
n
FALSE
3
data
record

All of the
above
One
Ctrl+D

D
A
B

All of the
above

F7
None of
Shift+P
the above
Journal
Day Book Book
None of
Sub
the above
Electronic
Data
Interchan All of the
ge.
above
4
Field

5
All of the
above

C
A
B
B
A

C
A
C
B

FALSE
Display
stock
valuation
method

TRUE

Ledgers

Groups

Journals

Personal

Nominal

Real

Manual
Balance
Sheet

Journal

Automatic None
Profit &
Journal
Loss
Book
Physical
Stock
Stock
Journal
Transfer

Filled
11
FALSE
managem
ent by
objective
F4

Receipt
16
TRUE
managem
ent by
exception
F5

Main
Location

Primary

True

False

Ledgers
0 to 9

Reports
1 to 100

Supplier
Report
F2
Net
Transactio
ns
True
F6
function
key
Sales
1-4-1995
to 31-31996
True

Open
Change
Calculator Period

Issue
18
electronic
data
analysis
F6
Primary
Cost
Category

None of
the above
None of
the above
None of
the above
All of the
above
All of the
above

Horizontal Vertical

B
B
D
A

Reversing
Journal
B
None of
the above A
21
B
B
All of the
above
Alt+f5

B
B

All of the
above

C
A

None of
Vouchers the above
10 to 60 None
All of the
Suspense Order
above
Informatio None of
Output
n
the above
F4
Ctrl+f2
Ctrl+f4
Closing
Balance
False
Alt + f6
function
key
Purchase
s
1-4-1996
to 31-31997
False

A and B
F7
function
key
A or B
1-4-1997
to 31-31998

A or B

C
A
A
C
A

None of
the above C
A
None of
the above A
None of
the above B
None of
the above B
A
None of
the above C

Balance
sheet &
profit &
loss profit
& loss and
trial
balance

Profit &
loss and
trial
balance
Main
location

Primary
Security
mechanis Ledger
m
a/c
F5
F7

Cash and
profit &
Cash and
loss
bank
C
None of
A or b
the above B

a or b

None of
the above
F9
None of
the above
None of
the above

Regional
setting
Balance
Sheet
F10

None of
the above A
None of
the above B
F11
B

Both A
and B
4

None of
the above C
1
B

F10
Profit &
loss a/c
FALSE

F11

F12

Budget

None

C
A

F3
TRUE
Main
location

Ctrl+F3
FALSE

Alt+F3

Primary

Symbol

Tally.imp
Stock
summary
By
pressing
F11
function
key
TRUE
128
Ledger
Accounts

Tally.ini
Stock
journal

a name
Sales
return

Cost
category
F8

an identity
Purchase
return
Stock
Company items
creation
units
Trial
Balance Daybook
F7
Alt + F7
Changes
in
transactio Changes
ns or
in Ledger
vouchers Masters
2
3

A and B

F9
Balance
sheet
TRUE

A or b
Stock
analysis
In 'comp
During the info ->
creation of security
a
control'
company option
FALSE
228
28
SubGroups
Groups

A
D
C
A

None of
the above C
A
None of
them
B
None
A
None of
the above A

None
16

B
A
C

B or C

Administr
ator
Owner
One
company
to another
company
created
withon
Tally
Package
Inventory
subsidiary
.

Other
programs a
spreadshe
et or a
database Both A
file.
and B
Cash
disbursem Cash
ents.
receipts.

Will
produce a
Does not more
require as accurate
stringent a set of
set of
financial
internal
statement
controls. s.

data to be
transferre
d to
memory
Contingen
cy
Planning

Data Entry TallyVault A

data that
has been
transferre
d from
memory
System
feasibility
report

NIC Card VSAT

the
address of
a memory
location

None of
the above
Payroll
transactio
ns.
Eliminates
the need
to
reconcile
control
accounts
and
subsidiary
ledgers.
an
instruction
that has
been
transferre
d from
memory

Capacity
Planning

Exception
reporting C

Will be
more
efficient at
producing
financial
statement
s.

RAM
Control
totals for
Identificati one or
Record
on
more
Count
Number
fields
Storing
Writing on
informatio
a hard
Printed
n on the
board
output
hard disk
Voice
activated Voice
Visual
broadcasti answer
audio
ng
back
board
File
Validity
Boundary protection
check
protection ring

AGP Card B
End-of-file
and endof-reel
code
B

None of
above

None of
above
Limited
access
files

Coloured
spots

Pixels
Identificati
on
File Name number
Storage
Printer
device

Pixies

None of
above

Reel
Number
Pointing
device

Batch
Total
None of
above

System
Logs

Console
Log

Data
Dictionary B

Physical
Security

Electricall
y charged An ink
ink
pen
Restrict
physical
access
A pen
A
cartridge

An inked
ribbon and
print head
Require
Use only user
unremova password
ble media s

Read
Magnetic
tape

D
A

Paper

Eraser

None of
above
Make
duplicate
copies of
files
None of
above

A drum

A ribbon

A cassette A

Distribute
d policies
or
procedure
s
None of
A ribbon above
An INK
None of
RIBBON above
Storage
None of
Size
capacity above
Read and None of
Write
Write
above
Floppy
None of
PAN drive disk
above

Centralise
d function
Separatio for PC
n of duties acquisition
A
cartridge A drum
A print
A laser
head
beam
Volume

Centralise
d function
for PC
Dispositio
n

to an audit
departme
nt's
products to add
all the
& services customers above
Oracle

ACL

True
True

False
False

JCL

none of
these
none the
above

A
C

A
A
C
C
B
A

A
A
A
B

Serial
access
medium

Random
access
medium

1.44MB

20 GB

A CDROM

A floppy
disk

A CDROM

A floppy
disk

Read
By a
sunny
window
ROM
chips
RAM
chips

Write
By
magnet
objects
RAM
chips
ROM
chips

A parallel
access
None of
medium
above
None of
700MB
above
Magnetic
tape
None of
storage
above
Magnetic
tape
None of
storage
above
Read and
Write
Not

Serial
access
medium

None of
above
None of
above
None of
above
None of
Registers Logic bus above
Control
None of
Registers unit
above
None of
1 bit
8 bits
above
ROM
None of
chips
CACHE
above
A
Random A parallel selective
access
access
access
medium
medium
medium

Network
software
and
security
software

Systems
software
and
applicatio
n software

ALU
CPUs
0 bits
RAM
chips

In a
drawer
CDROM
chips
DRAM
chips

Business
software
and
games
software
Mainfram
Supercom Personal e
puter
computer computer

A
B

A
B

C
B
B
A
B
B
A

None of
the above B
None of
above

Jon Von
Notebook Supercom Neumann None of
computers puters
computers above

First
Second
Hoover
None of
generation generation generation above

Second
First
Fourth
None of
generation generation generation above

Second
Third
Fifth
None of
generation generation generation above

Second
Third
Fifth
None of
generation generation generation above

Second
Third
Fifth
generation generation generation
Analysis,
Specificati Programm System
on,
ing,
Design,
Design,
Design,
and
and
and
Implement
Testing
Testing
ation

None of
above

None of
above

True

False

yes

no

true

false

true
true
true
true

false
false
false
false

A
A
A
A

true

false
review
to
and
determine evaluate
the audit the types
objective of data
can bring can bring
the data the data
directly
indirectly
True
True
change in
the
method of
recording
accountin
g
transactio
n
document
s driven
approach

to obtain a extract
record
data from
layout
file
A
all the
above

none of
the above A

False
False

use of
absence
accountin of audit
g codes
trails

B
A

all the
above

risk driven unique


none of
approach approach the above B

hardware
and
software
configurati
on

processin
g options, checks
file data
and
structure controls

true
true

false
false

the source
of data
available
to the
audit
organizati
on

source of
data for
material
all the
planing
above

all the
above

D
A
A

none of
these

true

false
A
providing
access to
computer
to all
the of by organizati
all
on
use of any none of
concerned personnel programs the above D
true

false

natural/m open/clos conceptua


an-made ed
l/physical all of them D
true
false
A
true
true

false
false
manage
hardware
&
scheduled software
jobs
resources
true
false
true
false

A
A
enable
multiple
user
resource
sharing

with
with audit production
departme departme all the
nts
nts
above

all the
above

none of
these

D
B
B

true

false

true
true
true

false
false
false

A
A
A

true

false
planning model
databases language base
true
false
true
false
reference
files
table files report files
file
filex
file-o-man manager
to have a decentrali
complete zed
picture of picture of all the
a system a system above
true
false
true
back-ups
true
true
seriously
affected
database

false
retrieval
false
false
subject
area
database

true
true

false
false

deletion

B
all the
above

D
B
B

none of
the above D
filepet

none of
the above A
A

addition

B
B
A
A

software
and
safety and
database database B
A
B

on
at the year immediate quarterly
end
ly
basis
true
false

none of
the above B
A
none of
Benjamin the above B

Benfish

Benford

true

false

consecuti
ve nos. or
alphabets
to entities

blocks of
nos. to the
primary
attribute
of the the
entity

true

false

valid,
numeric
grouping,
transactio
n
true

invalid,
none of
all the
alphabetic the above above

regroupin none of
all the
g, events the above above
false

A
A

random
placement
of
componen none of
t
the above D

true

false

true

false

true
true
increment
al design
and
enlarge
activity
true
true

false
false
interactive
data
extraction
and
analysis
false
false

B
B

true

false

true

false

e-brain
bottom up
tests
yes

bouncing
ball
big-bang
top-down hybrid
tests
tests
no

interactive
data
innumera
ble
none of
analysis
the above B
A
A

stub
all the
above

C
D
B

re-perform
procedure
provide
s carried
read data informatio out by the
on client's n to the
clients
all the
file
audit
programs above

executabl deleted,
es, master hard

true
system
analysis
software
true
yes
true
true
manipulat
es, real
true
yes

false
system
advanced
software
false
no
false
false
create,
false
false
no

none of
these

all the
above

A
all the
above

none of
these

none of
the above A
B
A
A
B
all the
above
A
A
A

can
enable the
auditor to
execute
can be
provisions
very
on a
powerful number of
analytical different
tool
bases
yes
no

can
provide
the
auditors
with useful
informatio
n with
trend s
and
all of the
patterns above

D
A

examinati
on of
source
identifies code of a
program program
provides code
with
detailed
which may advice to
informatio be there following
n of
for
the logic
machine fraudulent of a
none of
uses
reason
program the above C
IDEA
ACL
ALC
ACLL
B
true
fictitious
data
applied
against
the client
program
true
true

false
compariso
n of
source
version of
a
programm
ed
false
false

analyzing
the picture
of a file or all the
data
above

true
false
specificati
on,
file,
none of
program hardware the above
identifying
identifying identifying nonerroneous ineffective standard
code
code
code
true
true

A
A
A
A

all the
above

all the
above

false

false
authentica
tion of
start and informatio resource all the
finish time n support requested above

A
A

job
connectivit
job control y
all the
language language above
yes
no

true
true

none of
the above A
A

false
false

A
B

package
computer
p[program
for
performin
g a variety
master list administer
of data
mathemati of
ed
processin cal
transactio questionn
g function concept
ns
aire
A
prepared
by an
outside
programm
er
prepared prepared engaged
by the
by the
by the
all the
auditor
entity
auditor
above
D
true
file
access/or
ganization
s

false

stratificati
statistical/ on and
arithmetic frequency all the
operation analysis
above

true
true

false
false

B
B

examining
the quality carrying
of system analytical
process
review
Can
Wide
extract
access to and
various
analyse
data base data

examining
the quality all the
of data
above

Can aid in
simple
selection
High End
ACL
IDEA
CAATs
A sample A utility
A special
of
software purpose
transactio programm written
ns
e
program

Can
define the
audit
objectives D
All of the
above
D

None of
the above A

Tests of
details of
transactio
ns

Macros

Analytical
review
procedure
s
Action
Procedure
s

integer
true

number
false

actions
report

Complian
ce tests of
general
EDP
controls
Event
Procedure
s
primary
number

All of the
above
D
General
Procedure
s
D
auto
number
D
A
procedure none of
s
the above B
chart
macros
D

events
form
expressio
n
macro
elements comments action
expressio
code
expressio n
calculator builder
n builder elements
expressio
n
elements none of
action list macro list list box
the above
none of
conditions action
insert
the above
auto
embedde
tabular
columnar report
d
tabular
columnar datasheet justified
create
embedde
report
link report d report
new report
columnar
and
stable and dynamic none of
tabular
unstable and static the above
true
false
create
insert
fields
add chart chart
chart
primary
alternate foreign
none of
key
key
key
the above
label
chart
mail
none of
wizard
wizard
wizard
the above
start
group
page
report
header
header
header
header
report
page
group
none of
footer
footer
footer
the above

for
ordering
records

for
updating
records

C
A
C
B
D

A
B
C
C
A
D
B

for
specifying
conditions
with group none of
by clause the above C

condition
VB
Modules
add

group

report
true

reports
append
macro
sheet
false

RAD

RAP

SysCmd

MsgBox

macro
names
forms
insert

macros
D
delete
B
none of
module
the above C
A
none of
RAID
the above A
none of
message the above B
none of
CME
the above A

OLE
DDE
object
linking
and
embeddin on line
on line
g
execution editing
OLE
object

none of
the above C

none of
the above A
OLE
communic
ator
C

OLE
OLE client server
embedde
linked
d
connected edited
exe
DLL
BMP
html
publish to
form
report
query
web
wizard
wizard
wizard
wizard
dynamic none of
static file static html file
the above
data
append
add
insert
definition
dollars
rupees
pesos
yen
unbound bound
command
object
object
button
list box
display as
create
icon
display
link
icon
create
save as
none of
html
new
html
the above
none of
startup
home
end
the above
none of
bullet
command procedure the above
DBMS
RDBMS front end language
data
data
data
group
collection database storage

A
D

D
B
D
A
B
A
C
B
C
A
C

new blank new


new
database database database
dialog box dialog box dialog box dialog box A
255
64000
235
63500
A

automatic AutoNum
number
ber
number
true
false
explicit
inner join outer join join
primary
key
cascade
delete
related
records

not null
cascade
change
related
records

columnar tabular
table or
query or
tables
queries

automatic
field
B
B
none of
the above A
no
candidate duplicate
key
key
A
cascade
update
change all
related
related
fields
records
C
both a and none of
b
the above B
record or none of
records
the above C

true

false

property
field

field
property

crosstab
queries

row/colum select
n queries queries
change/de
row/colum lete
n queries queries
no match
self join
join
false

action
queries
inner join
true

new form
dialog box
summary
change
properties
included
form

Dynaset
field
properties properties B

form
create
dialog box
sum

form
wizard
dialog
append
form
properties properties

sub form
Record
Record
Operation
Navigation s
columnar tabular
form
form
filtering
ordering
filter
filter by
form
*
true

sorts
filter by
selection
$
false

update
queries

update
queries

outer join D
A

both 1 and
3
D
simple
D
new
properties B

new form child form


Form
Operation None of
s
the above
one to
hierarchic many
al form
form
sorting
querying
pipes
filter by
menu
@

B
C

gateways A
None of
the above A
?
D
B

bound
control
button
group

unbound
control
option
group

database form

data less
control
controls
group

data
control
record
group
none of
collection the above
all of the
controlled above

bound
unbound
CURRDA
TE()
TODAY() DATE()
combo
text box
list box
box
columnar tabular
pivot table form
form
data sheet filter by
filter
input
button
wizard

control
wizard

filter by
form
option
control
wizard
two of the
above

DAY()

B
B
A
C
C

static text B
main form A
none of
the above C

tool
wizard
C
none of
ram*
ram??
the above B
true
false
B
report
form
table
ledger
A
none of
autoreport report
module
the above A
chart
label
bitmap
report
A
true
false
A
true
false
A
60,000
255
25,000
64,000
D
true
false
B
true
false
A
true
false
B
all of the
table
query
form
above
D
table
form
report
hyperlink D
true
false
A
true
false
A
none of
Insert
Records Tools
the above C
true
false
B
true
false
A
alternate composite candidate primary
keys
keys
keys
key
C
true
false
A
true
false
B
true
false
A
true
false
A
true
false
B
none of
null
not null
zero
the above B
true
false
B

true
true
true

false
false
false

pie
true
true
true
update
query
true
true
inner join
true
true
true
freestandi
ng
true
true
true
true
the first
field of the
table
forms
true
delete
true
true
freestandi
ng

bar
false
false
false
select
query
false
false
outer join
false
false
false
embedde
d
false
false
false
false
the last
field of the
table
reports
false
insert
false
false
embedde
d

B
A
B
both 1 and none of
2
the above C
A
A
B
delete
append
query
query
B
B
A
self join
table join C
B
A
B
stand
alone
sub chart D
B
B
B
A

use
hyperlink
true
true
true
true
true

primary
none of
key field the above C
attributes entities
D
A
append
add
A
A
B
stand
alone
sub chart B
use
datasheet
use import in forms use export D
false
B
false
B
false
B
false
A
false
A

true
true
&
true
page
true
true

false
false
#
false
detail
false
false

true
true
true

false
false
false

group

topic

A
A
D
A
C
A
B
A
B
A

relational
true

list
false

structured
action
query
language language
report
form
true
false
group
record
data
true
true

property
false
false
child
sub forms forms
graphs
chart
primary
number
key

range

index

button

identifier
none of
the above
forms
none of
the above
option
button

record
source

none of
the above C

create
queries

form
sorts

form

bound
combo
box
false

unbound

control

tabular
form

data sheet
chart form form
tabular
columnar
sub forms form
form
calculated bound
calculated unbound
sub form
set
relation

C
B

event procedura
l based
none of
language the above C
query
table
B
B
session
detail
D
both a and none of
b
the above B
A
A
none of
inner form the above A
labels
report
B

pivot
filters

list box
true
form
name

logical

unbound

bound
tabular
auto form form
relationshi
connect
ps

B
A
A
C
B
A

none of
the above A
none of
the above A
none of
the above A
static
C
columnar
form
B
none of
the above C

option
button,
option,
command list, check toggle
toggle and button,
and
button and
command check and combo
check
buttons
list boxes boxes
boxes
filter by
filter by
filter by
filter by
form
report
record
input
form
report
macro
table
clipboard file
field
layout

D
D
B
B

field
names
An
A way to
organised
analyse
way of
and
A tool to storing
manipulat produce informatio
e
high
n about a
numerical quality
set of
informatio document similar
n
s
things
search

sort

It contains
all the
Informatio data about
n about
one
certain
specific
programs item
remote
relative
DBMS
DBMS
storing
data
offline at a
separate
site
Key
verificatio
n

A
document
which
contains
text
Relational
DBMS

record
grab

A way of
maintainin
g a log
C

A
collection
of files
B
Reliable
DBMS
C

uses tape
as
opposed
to disk
C
Database
Computer access
matching controls
D
An
A way to
organised
analyse
way of
and
storing
manipulat A tool to informatio
e
produce n about a
numerical high
set of
informatio qualitydoc similar
None of
n
uments
things
the above C
backing
up data
regularly
Computer
sequence
checks

It contains
all the
Informatio data about
n about
one
certain
specific
programs item

is related
to data
mining

A
document
which
contains None of
text
the above B

Reports
allow
users to
extract
informatio
n as hard
copy
(printed
output)

Reports
provide a
very
flexible
way of
creating
and
editing
document
s

A tool
which
allows text
and
graphics
to be
placed in
document None of
s
the above A

Extracting
and
analysing
data

Spreadsh
eets make
data easy Using
to analyse queries
Word
processor
s,
Compilers Network spreadshe
,
software, ets,
interpreter backup
databases
s, editors systems , DTP
DEFAULT
and NOT
NULL
constraint
s
CHANGE
TABLE
remote
DBMS

FOREIGN
KEY
constraint
s
MODIFY
TABLE
relative
DBMS

storing
data
offline at a backing
separate up data
site
regularly

PRIMARY
KEY and
UNIQUE
constraint
s
ALTER
TABLE
Relational
DBMS

None of
the above C

None of
the above C

IDENTITY
columns C
UPDATE
TABLE
C
Reliable
DBMS
C

uses tape
is related as
to data
opposed
mining
to disk
C

Descriptio Compone
n
nt
Source
D
keeping
the
saving the
keeping a original
file with
using a
backup
paper
different
password copy
copy
filenames A
the
the
product
primary
mail
code
key
merge
e-mail
C
A
database Graphics browser
e-mail
A
Number

bookmark
s
operators wildcards engines
Auto
AutoNum
Primary
Auto ID
ber
Auto Key
forms in a
database
are
consistent
with the
underlying
tables or
queries.

C
C

records in
a dynaset
are
consistent
with the
underlying
tables.

related
tables in a
database
are
consistent
with one
another.

foreign
key.
the
primary
key of
both
related
tables.

query and
main form its
report and
and a
associate its related
subform. d dynaset. query.
A
not a
the
primary
primary
a field
key of
key of the from an
either
related
unrelated related
table.
table.
table.
B

One-toone

One-tomany

Many-tomany

reports
are
consistent
with the
underlying
tables or
queries.
B

Many-toone

EmployeeI CompanyI Employee Company


D
D
LastName Address A
The Tools
menu,
Relationsh Referentia The join
ip window l integrity line
Right-click
the
Relationsh
ip line,
Select
then
Undo in
select
the
Double
Delete
Relationsh
click the from the ips pullRelationsh shortcut
down
ip line
menu
menu

The oneto-many
relationshi
p
B

Click the
Delete
Relationsh
ips button
on the
toolbar
B

That there
are
several
customers
associate
d with that
ID

That
records
That
That there can be
some of are
added by
the data is records in clicking on
not
a related the plus
viewable table
sign
C
They
cannot be They must
They must They
AutoNum be the
both be
cannot be ber data same data
numbers text fields types
type
D
The
customer
s ID is
deleted
from the
Customer
s table,
The
and all the
Nothing, customer related
Access
s ID is
loans are
ignores
deleted
deleted
the
from the from the
attempted Customer Loans
command. s table.
table.

An error
message
is
displayed. D

The
subform is
an object
on the
The
form and
subform is The
can be
displayed subform is moved or
The
in
displayed sized like
subform is Datasheet in Form
any other
not visible. view.
view.
object.
D

A one-tomany
relationshi
p between
teams and
players

A one-tomany
relationshi
p between
teams and
coaches

A one-tomany
relationshi
p between
coaches
and teams

A many-tomany
relationshi
p between
players
and teams C

Either
table at
any time
prompt,
title bar
text, icon.
Dim
CreateList
.
A check
box
enables
the form
user to
choose
from one
of several
existing
entries.

The
Customer
s table
only when
there are
Loan
records
associate
d with that
customer

The
Loans
table at
any time
title bar
text,
prompt,
icon.

Neither
table

prompt,
title bar
icon, title
text, icon,
bar text.
prompt.
B
Sub
CreateList CreateList
.
.
Sub.
B

A text field
enables
the form
user to
choose
from one
of several
existing
entries.
must be
must be set for
set for
multiple
one word. words.

help
people
keep track store data
of things. in tables.
relationshi
data.
ps.
facts.

figures.

singleuser
database
applicatio
n

multiuser
database
applicatio
n

A dropdown list
enables
the user
to choose
from one
of several
existing
entries.

A dropdown list
enables
the user
to enter
text.

does not must be


have to be set for two
set.
words.
C
maintain
data on
create
different
tables of things in
rows and different
columns. tables.
A
all of the
metadata. above
D
informatio
n.
a and b
D
ecommerc
e
database
applicatio
n
a or b
A

singleuser
database
applicatio
n

ecommerc
multiuser e
database database
applicatio applicatio None of
n
n
above

Sequential
Query
Language
(SQL)

Structured
Question
Language
(SQL)
Database
Database Managem
Modeling ent
System
System
SQL
Jet
Server

The user
the
database
applicatio
n(s)
interact(s)
with the
DBMS
creates
queries

the user

Structured
Query
Language
(SQL)
Data
Business
Model
System

Relational
Question
Language
(RQL)
C
Relational
Model
Manager B

Oracle
a and b
The
database
The
managem
database ent
applicatio system
All of the
n
(DBMS)
above.

the DBMS
accesses
the
database
data
creates
form

None of
above
creates
reports
the
database
the
managem
database ent
applicatio system
n
(DBMS)

all the
users'
data is in
one place
holds user
data

it reduces
data
duplicatio
n
holds
metadata

tables

metadata

it contains
a
descriptio
n of its
own
structure
holds
indexes
stored
procedure
s

All of
above

b and c

the
database B

All of the
above.
All of the
above.
All of the
above.

C
D

from
existing
data
from
existing
nondatabase
data

as a new
systems
developm
ent project
as a new
systems
developm
ent project

from
existing
data

as a new
systems
developm
ent project

data
marts

normalizat
ion

data
marts

normalizat
ion

data
marts

normalizat
ion

data
marts

normalizat
ion

file
hierarchic
managers al models

entities in
a column
vary as to
kind
table
record

the order
of the
columns
is
important
relation
field

record

field

record
composite
key
Insertion
anomaly

field
primary
key
Update
anomaly

as a
redesign
of an
existing
database a and b
as a
redesign
of an
existing
database a and b
as a
redesign
of an
existing
database a and b
entityrelationshi
data
p data
models
modeling
entityrelationshi
data
p data
models
modeling
entityrelationshi
data
p data
models
modeling
entityrelationshi
p data
data
modeling migration
relational
network
data
models
model
more than
the order one
of the
column
rows is
can use
unimporta the same
nt
name
row
field
key
tuple
composite foreign
key
key
foreign
candidate
key
key
foreign
surrogate
key
key
Deletion All of
anomaly above

C
D
C
C
D
B
D

assess
the
existing
tables'
structure
and
content
are
supplied
by several
wellestablishe
d
manufactu
rers

They use
sophistica
ted
mathemati
cal
technique
s.

create
move the
design the one or
data into
database more new the new
structure tables
database A

were
essentially
killed off
by MS
Access
Their
report
delivery is
more
difficult
than
report
delivery
for
reporting
systems.

are not
have poor true
response DBMS
time
products

Nonintegr None of
ated data the above A
a "wrong
inconsiste nonintegra format"
dirty data nt data
ted data problem B
a "wrong
inconsiste nonintegra format"
dirty data nt data
ted data problem D
data
warehous
data
e
warehous databases
e data are do not
not stored have
in tables. metadata.
Form
Table
Forms
and
Queries
reports
and tables

data
warehous
e data are
often
denormali
zed.
b and c
Report
Query

Macros

C
A

Spreadsh
eets
D

The Link
Tables
command
can be
used to
associate
the tables
in one
database
with the
objects in
another
database.

It will be
easier for
the user
to
upgrade it
if the
objects
are in one
database
and the
tables in
another.
An
applicatio
n may
consist of
multiple
databases
, each
with
multiple
objects,
linked to
yet
another
database
containing
only
tables.

Import

Link

It will be
easier for
the user
to
upgrade it
if the
objects
and tables
are in one
database.

It contains
tables,
It contains reports,
more than queries,
one table and forms
Menu
Wizard

Build
Menu

All objects
in an
applicatio
n,
including
the tables,
must
reside
within the
same
database.

Regardles
s of how
the
objects
and tables
are
stored,
the user
will have
to reenter
the data in
the tables
when the
applicatio
n is
upgraded. B
An
applicatio
n can be
created in
such a
way that it
objects
such as
forms and
reports
can be
changed
without
disturbing
the
existing
data.
C

Merge

Join

It contains
a user
interface,
or
switchboa
rd
Interface
Design
Wizard

It contains
macros
C
Switchboa
rd
Manager D

It is
advisable
to put
each
object and
table into
a
separate
database.

create
backups
for
mission
critical
corporate
data.

put key
business
centralize informatio
the
n into the
managea hands or
bility of
more
data
decision
collection. makers.

Digital
Sign

Digital
Digital
None of
Certificate Signature the above C

Hash
Function
Hash
Function

Digital
Signature
Hash
Value
Digital
Digital
Signature
Signature Verificatio
creation
n

Institution
al
Overhead
and
Subscribe
r Relying
Party Cost
Certificati
on
Authority

store all
corporate
transactio
n data in
one single
location. C

Digital
Certificate
Hash
Result

Private
Key
A
Either B or
C
D

Both A
and B

Either A or
B
C

Subscribe Institution
r Relying al
None of
Party Cost Overhead the above A
Certified
Authority

Certificate None of
Authority the above A

True

False

True

False

Personal
Server
Developer Digital
Certificate Certificate Certificate
Personal
Server
Developer Digital
Certificate Certificate certificate

None of
the above A
None of
the above C

Private
Repositori
none of
Certificate es
Public Key the above B

Evidence,
Ceremony
,
Efficiency Approval,
Evidence,
and
Efficiency
Ceremony Approval, logistics, and
, Approval Evidence Evidence Logistics D
True
False
A
True

False

Certificate
Revocatio
n List
Private
Key,
Subscribe
r
Internal
Format
File

Certificate certificate None Of


Resource Revocatio The
List
n Letter
Above

Public
key,
Recipient
External
Format
File
UN/EBCD
ANSI
IC
interchang
batch files e sets
Smart
Embedde
Card
d cards
Digital
Cash

Private
None Of
Key,
The
Recipient Above
Transmiss None of
ion File
the above
UN/EDIFA
UNESCO CT
functional
functions groups
None of
SET
the above
Smart
Cards

C
D
D
A

Electronic
E-cash
cheques D
Online
Catalog
Online
and
Billboards Catalog
Broadcast Customer
and Junk and
and Junk Endorsem
Mail
Billboards Mail
ents
C
All of the
EDI
E-mail
EFT
above
D
True
False
B
Primary
Public Key
Login_Id Key and Public Key and
and
Private
and
Private
Password Key
Password Key
D
Satellite
Global
Private
Area
None of
Network Network Network the above B
Active or
push
Passive or Glow sign
based
pull-based or
advertisin advertisin hoarding All of the
g
g
strategies above
D

Broadcast Junk mail Billboard


DirectE-mail
Bulk-mail mail
Endorsem
Catalog
ent
Billboard
Low cost
Error
Data
of
checking Integration operation
Competiti
ve
Corporate Industrial
espionage espionage espionage
Contact
numbers
A list of
of the
competitor managem Research
s clients ent group data
esinglecommerc
user
multi-user e
database database database
applicatio applicatio applicatio
n
n
n
Keeping Including
Replying messages the
promptly short
Subject

Removabl
e drives
that can
be locked
up at night
provide
adequate
security
when the
confidenti
ality of
data is the
primary
risk.

Message
authentica
tion in EDI
systems
performs
the same
function
as
segregatio
n of duties
in other
informatio
n
systems.
convert
text to
text import columns
wizard
wizard
cell
row
reference reference

Encryption
performed
by a
physically
secure
hardware
device is
more
secure
than
encryption
performed
by
software.

Endorsem
ents
A
Junk mail D
Broadcast C
Quality
managem
ent
B

Economic
espionage C
A
competitor
s new
project
B

None of
above
Using all
capital
letters

Security at
the
transactio
n phase in
EDI
systems is
not
necessary
because
problems
at that
level will
be
identified
by the
service
provider. C

function
tip wizard wizard
A
column
none of
reference the above A

text files
serial
values

Lotus 1-23
domain
values

quattropro
or xbase
files
range
values
=currentd
ate()

class files
reference
values
none of
=today() =date()
the above
none of
dollar sign ' = ' sign # sign
the above
function
none of
AutoSum AutoFill
wizard
the above
argument parameter none of
variables s
s
the above
text
logical
numeric Boolean
concatena
none of
te
pmt
merge
the above
countif
vlookup
pmt
count
convert
text to
pivot table chart
columns
wizard
wizard
wizard
tip wizard
none of
sumif
pmt
countif
the above

average sum
sumif
countif
page
none of
setup
print area print
the above
autoforma
none of
t
AutoFill
the above
none of
bordering formatting shading
the above
page
print
setup
print area print
preview
none of
filtering
searching sorting
the above

D
A
A
C
B
D
A
A

B
B

A
A
B
B
A

all option blanks


all blanks none
A
www.ency www.eb.c www.ency none of
.in
om
brit.com
the above B
none of
URL
DNS
FTP
the above B
internal
network
applicatio
n layer
finger
service

network of
network
transport
layer
ping
service

FTP

TELNET

intermedia
te network
physical
layer

none of
the above
session
layer
none of
ftp service the above
none of
ARCHIE the above

B
D
A
C

uniform
research
locator

uniform
resource
locator
name of
host
the
computer resource

unlimited
restore
locator

message scheme

none of
scheme
the above
command none of
line
the above
general
sears
electric
browser
editor

Delphi
net

Microsoft
web
read the
Usenet
news

browser
CompuSe
rve
internet
spy
dialer
mosaic
gophersp
gophering ace
Alta vista
finger
server
list
no
middle
hotlist

none of
the above A

C
C
C
B

search for none of


database the above C

wincim or
maccim
cyberspac
e

none of
the above
none of
the above
none of
open text excite
the above
web
none of
ftp server server
the above
none of
directories image list the above
maximum
of five
one
many
middle
lower
top
and lower
directory index
glossary

directory index
menu
item
search,ind search,me search,ite search,ind
ex search nu search m search ex search
all the
infoseek excite
lycos
above
all the
netshark cello
lynx
above
navigator
lynx
mosaic
Lycos
gold 2.0
CompuSe
Microsoft internet
IBM
rve
finger
Usenet
service
ftp
telnet
Higher
text
Hyper text Hyper text Hyper text
transfer
transmissi transfer
transfer
protocol
on port
protocol
port
none of
iccp
ftp
uucp
the above

C
C
B
A
C
B
D
C

C
D
C
C
D
D

C
C

none of
telnet
the above
transfer
transmissi communic
transfer
on control ation
control
protocol/in protocol/in
protocol/in ternet
ternet
none of
ternet
protocol
protocol
the above
none of
one
two
three
the above
domain
name
web
none of
ftp servers servers
servers
the above
the
the
internet
the
internet
administra internet
none of
adapter
tion
access
the above
organizati
browser
protocol
site
on
hotlink
higher
text
hyper text type
transfer
transfer
transfer
none of
protocol
protocol
protocol
the above
universal uniform
uniform
resource resource resource name of
locator
locator
label
the above
frequent frequently frantically
asked
asked
asked
none of
query
question question the above
none of
SLIP,PPP TCP,IP
IP,UDP
the above
connectio
n
response request
close
world
wide
search for
search for windows informatio
informatio sockets
n and
n and
internets research none of
research relay chat council
the above
netscape,i mosaic,go none of
lynx,minx e
pher
the above
world wide
web
world wide
none of
server
web client interface the above
none of
glossary index
hotwords the above
yahoo

ftp

B
C

A
B

B
A
A

B
B

B
B

very easy
and
rodent
oriented
net wide
index to
computeri
zed
archives
university
of
berkeley,b
erkeley
freenet

very
organised
network
integration
and
communic
ation
applicatio
n
university
of
cleveland,
cleveland
freenet
IP
address

protocols
search
engines,di ftp and
rectories finger
allsrc,wins
ocks
wais,allsrc
allsrc

waisman
hyper
higher text transfer
medium
markup
language language

verificatio
n on
network
integration
and
communic none of
ation
the above A
university
of
California none of
net
the above B
none of
dns
the above A
telnet and
ftp
wais,wins
ocks
winsock

hot links

hyper text
markup
language
books
hyper text marks

images

applets

none of
the above A
none of
the above B
none of
the above B

none of
the above C
none of
the above B
none of
animation the above B

graphics,v programm animation,


ideos,audi s,images,t scripts,ex none of
o
ext
ecutables the above
home
welcome none of
first page page
page
the above
global
global
grand
network
networks network
none of
news
navigator news
the above
yahoo
electronic search
none of
service
mail
engines
the above
Netscape
page
email and starter
net
site,netsc
conferenc ape page yahoo and none of
e
wizard
altavista the above
newsgrou
p
telnet
ftp
archive
Lycos
point
all the
none of
catalog
review
above
the above

A
B

B
B

B
D
D

apple link
computer
related
abbreviati
ons and
acronym

bitnet

Delphi

fidonet

biographic
al
informatio bookstore none the
n
s
above

encyclope on-line
more
dia
reference informatio
Britannica works
n
galenet

search
engines

web
directories database channel

Graphical
interpreter
formatting
Joint
Pictures
Expert
Group

Graphical
interchang
e Format
Jumbled
pictures
expert
graph
document
s

Graphical
interface
format
Joint
pictures
expert
graph

mails
net
yahoo,info
eudora,ne
seek,altav netscape,i tscape
ista
e,lynx
and pine
network
informatio web
connectio
n
pages
ns
BACKGR
OUND
COLOR
FCOLOR
Communi
Communi
cation
Common cation
gateway graphical graphical
interface Interface interface
Communi
Network Interface cation
Current
web page Browser Client
Browser/u
ser
Server
Web
Unknown Uniform
resonance resource
language locator

United
relay
limited

Graphical
Interface
format
B
Joint
pictures
experimen
tal group A
browsers

none of
the above C

mails
B
FONTCO
LOR
B
Common
Gateway
Interface D
Connectio
n
B
None of
the above B
Channel

None of
the above
neither
image
text or
text nor
text only only
image
image
SQL
PLSQL
SGML
CGI
alphalang betalangu metalangu none of
uage
age
age
the above

C
C
C

palm is
not
eatable

palm is
not elm
SGML
SGML
Preproces
Processor sor
web sites images
Internation
al
Engineeri
Internet
ng
equipment trainers
training
and
faculty
faculty

pancake
is not
edible
SGML
Parser
applets

Internet
Engineeri
ng Task
Force
MS
MS
Internet
Internet
Netscape Explorer
Explorer Navigator and
and
and
Netscape
Mosaic
Mosaic
Navigator
data from
a
text
database symbols
hyperlink hypertext hotword
in
in userin random sequential defined
order
order
order
first
.bmp and
.gif
Service,
hostname
and
directory
path

start
home
.bmp and .gif and
.jpeg
.jpeg

service,ho service,po
stname,po rt and
rt,directory- directory
path
path
mailing
lists,mail
mail
mail
server
servers,m vendors,m robots
ail clients ail
and
and
identificati gateways
alternate on and
to other
services password services

<center>

<font
size=n>

<hr
size=n>

none of
the above B
SGML
Composer C
document
s
A

None of
the above C

None of
the above C

video
hotlink

C
B

none of
the above B
none of
the above C
.wmf and
.bmp
C

service,ho
stname
and port B

none of
the above C
<l1
type=shap
e>
D

communic
ation
generated
informatio
n
Server
arpanet

common
gateway
interface
Client

classified
general
instruction none of
s
the above B
Browser User
A
none of
intranet
the above B

LAN

the net
peer-topeer
connectivit
y
wan

data

parcel

packets

none of
the above B
none of
the above A

scripting,p news,coo email,file


arsing and king and retrived,int none of
compiling fine arts
ernet tools the above
mosaic,go
nt,window pher,eudo communic
s95,ie,win ra,trumpn ator,ie,lyn all of the
zip
et
x,winsock above
ARPANE none of
dnet
arpanet
T
the above
defensive dedicated defensive
administra and
advanced
tive rank registered research
administra projects
projects
tion
administra administra none of
network
tion
tion net
the above
none of
start
begin
first
the above
milnet,sm
aller
mailnet,in intranet,ex none of
arpanet
et
tranet
the above

B
B

C
B

education,
research
Higher
text
manipulati
on
language
united
states and
UK

music and cooking


none of
dance
and dining the above A
Hotlink
text
markup
language

Hyper text
markup
Language D

server

client
standalone

none of
the above B
none of
the above C
none of
the above C

client

Hyper
transfer
meta
language
united
england,n states &
orway
Russia
network
servers

network
topology

network
redirector none of
s
the above B

data
terminal
equipment
physical
layer

data
target
equipment
network
layer

packet
switching,
store and
forward
network
anonymou
file access s ftp
PAN,NAN, KAN,RAN,
AAN
VAN

smart
network
and dumb
network
file
transfer
LAN,WAN
,MAN

network
card
detailed
transactio
n
explanatio
n
applicatio
n layer
point to
point
network
and
broadcast
channel
network

none of
the above B
none of
the above B

none of
the above
none of
the above
none of
the above
none of t
VAN
MAN
TAN
he above
none of
LAN
MAN
WAN
the above
none of
analog
digital
non-digital the above
Define
Document
Data type type of
type
Document
definition data
definition type data
Modulatio Manipulat
Moralize/d n/demodul e/demanip none of
emoralize ation
ulate
the above
Modulatio Manipulati none of
Mapping n
on
the above
Satellite
link and
digital
signals
Standard
long
internet
protocol
Prime
prolonged
protocol

Dedicated
access
and dial
up access
Stream
line
internet
protocol
Point to
point
protocol

B
B
C
B
C
B

B
B

Cable and none of


wires
the above B

Serial line
protocol
Pillar to
pillar
protocol

sending
storing
storing
informatio data on
data on a n to a host the hard
disk drive computer drive

none of
the above C
none of
the above B
receiving
informatio
n from a
host
computer B

Bandwidth Speed

Size

Channel

Find
Save
Recipient Relying
Party
Party
Private
Public Key Key

Browse
Either A or
B
Both A
and B

Retrieve C
Neither A
nor B
B
Both B
and A
C

E-mail

Electronic Electronic
Commerc Fund
All The
e
Transfers Above

Not False
Closed
System,F
ormal
Legal
requireme
nts

Not True

Signer
Authentica
tion
Not True
Nonrepudi
ation
Service
Affirmativ
e Act
Cryptogra
phy
Private
Key
Private
Key
Private
Key
Decryptio
n

Document
Authentica Both A
tion
and B
Not False

A
Formal
Legal
Requirem
ents,
Open
System
D

Formal
Legal
Requirem Open
ents
System
Signer
Affirmativ
authentica None of
e Act
Efficiency tion
the above A

Using
data
encryption
.
Unaltered
in
transmissi
on.

Digital
Digital
signature certificate
Either A or
Efficiency B
Private
Public Key Key
Both A
Public Key and B
Both A
Public Key and B
Both A
Public Key and B
Cipher

Encryption

Performin
g validity
checks.
Not
intercepte
d en
route.

Conductin
g fraudawarenes
s training.
Received
by the
intended
recipient.

Neither A
nor B
C
B
Private
Key
Neither A
nor B.
None of
the above
Either A or
B
Either A or
B
Either A or
B
Cryptogra
phy
Reviewing
the
systemsaccess
log.
Sent to
the
correct
address.

A
A
A
C
A
B
C

The
private
Both
The
key is
sender
private
used by
and
key
the
receiver
cannot be sender for
must have broken
encryption
the private into
but not by
key before fragments the
this
and
receiver
encryption distributed for
method
to the
decryption
will work. receiver. .
Failure of
server
Data entry duplicatin
Collision. errors.
g function.
Business- Business- BackendtototoBusiness Backend Business
On-line
Endorsem
Billboard Catalog
ents
Customer
Endorsem
ents
Billboard Catalog
Intermedi
aries
portals
.COM
Order
Search
Placemen
and
t
Service
discovery
PrePost
Purchase purchase
purchase consumm preparatio
interaction ation
n
Endorsem
Billboard
ent model
model of Online
of
marketing catalog
marketing
Online
Shopping
Catalog
cart
Billboard
EDI For
Administr EDI For
EDI For
ation,
Administr Administr
Commerc ation,
ation,
e and
Consumer Commerc
Transactio and
e and
n
Transport Transport
EDI
Compiler

TCP/IP

The
private
key is
used by
the
receiver
for
decryption
but not by
the
sender for
encryption
.
A

Firewall
vulnerabili
ty.
D
BusinesstoBillboard A
Broadcast B

Broadcast A
Domains

None of
the above C
Search
and
discovery A

None of
the above B
Pulling
cart
B

None of
the above C

EFT
Gateway
Assemble
Interpreter r
EDI

D
D

BusinesstoBusiness
Emergenc
y Cash
Communi
cation
Perspectiv
e

BusinesstoConsumer
Electronic
Cash
Business
Process
Perspectiv
e
Micro
Transactio
Microcash ns
Decryptio
n
SSL
1
2
filtered
data table table

pivot table
wizard
series or
rank
series or
rank
series or
rank
series or
rank
column
chart
column
chart
column
chart
column
chart

chart
wizard
category
category
category
category
bar chart
bar chart
bar chart
bar chart

Consumer- CustomertotoBusiness Company B


Euro
Endorsed
Cash
Cash
B
Service
Perspectiv None of
e
the above C
TT(Tiny
token)

E-token
A
Subscripti
Encryption on
C
3
4
B
index
table
pivot table D
convert
text to
columns
wizard
tip wizard D
data
legend
marker
A
data
legend
marker
B
data
legend
marker
C
data
legend
marker
D
surface
pie chart chart
C
surface
pie chart chart
B
surface
pie chart chart
D
surface
pie chart chart
A

wild card
spaces
characters symbols
internet
excel97
explorer Netscape
convert
text to
pivot table chart
columns
wizard
wizard
wizard
stock
line chart bar chart chart
true

false

none of
the above A
word 2000 A

tip wizard A
pie chart

C
A

and
3dimension
s
true
Data
table

or
4Multidimension dimension
s
s
false

Pivot table

It is often
used to
display
share
It is also
market
called as
prices
high-low- It shows over a
close
trends
period of
chart
over time time
Scenario
Pivot table manager Solver

A
A

It is also
used for
indicating
fluctuation
s in
temperatu
re
changes B
Data
table.
C

Scenario
Goal seek manager

Data
Pivot table table.
A
Data
Goal seek Pivot table Solver
table.
D
Workshee Spreadsh none of
Workbook t
eet
the above A
Performin
g
calculation
s.

Performin
g
database
operations

Performin
g text
formatting
.
Source
Column
table
field
Row field. name.
two
three
N
true
false
34Multidimension dimension dimension
s
s
s
Data table Pivot table

All of the
above

Pivot table
item.
C
B
B

A
B

It is useful
when
several
componen
ts are
changing
and the
user is
It displays interested
the data in the sum
series one of the
on top of componen
the other. ts.
Pivot
Scenario
table.
manager
Scenario
Goal seek manager
Standard
Count.
deviation
databases records

It is a tool
for
summarizi
ng and
analyzing
the data
records in
an
interactive
manner.
Goal
seek.

text import
wizard
worksheet
applicatio
n window
A dark
wide
border

It is a tool
that
provides a
way to
view and
compare
the results
of all the
different
variations
together
on the
worksheet
Scenario
manager
convert
text to
columns
wizard

It can be
represent
ed in 3dimension
s
Solver

Data table C

Pivot table Data table A


SumIf
tables

A
worksheet
s
D

It
summariz
es the
data by
using
analytical
functions.
solver

A
Pivot
table

function
tip wizard wizard

workbook tables
document modal
window
window
A dotted
border

database A
C

A blinking
No border border
A

8,16,32

your
formula
has a
syntax
error
ability to
generate
tables
word
processin
g
Range
Producing
graphs

2,4,2
the row is
too short
to show
the
number at
the
current
font size

2,2,2

the
column is
too narrow
to show all
the digits
of the
number
flexibility
speed of of moving
calculation entries

6,8,10

either b or
c
C
cost of
initial setup
D

graphical
Address
Writing
letters
drag from
the top
cell in the
doublecolumn to
click any the last
cell in the cell in the
column
column
CTRL +
ENTER
ENTER
array.
function.

database
Gap
Drawing
pictures

spreadshe
et
D
Rows
A
Document
filing
A

click the
column
heading

click the
column
label

TAB
constant.

INSERT
formula.

A
B

(201)555100
1212.
Cell
reference
s
Functions
^
/

Tom
#VALUE! McKenzie. C

B5*B6

C3/D4

E12

It is
surrounde
d by a
heavy
It is
border.
blinking.

Numeric Text
constants constants
*
\
It is
impossibl
e to
determine
D4^2
.
SUM(H9: G7*SUM(
H11)
H9:H11)

D
D

C
B

The
phrase
active
It is
cell
displayed appears in
in reverse the Status
video.
bar.
A

By either
clicking in
a different
cell or
By using using the
the arrow arrow
By clicking keys to
keys to
in a
move to a move to a
different different different
cell
cell
cell

The
Standard
toolbar

By typing
the
reference
of the cell
you want
to move to
in the
formula
bar
C
The Font
The Cell Size
Format
command
The
command on the
Formattin on the
Tools
g toolbar Edit menu menu.
B

the New
command
on the File
menu.
File

the Save
command
on the File
menu.
Edit

Preview

Details

Insert

Delete

Clear
Orientatio
n (portrait
or
landscape
)

Delete

Options
worksheet
.
6
copy
range.
paste
range.

Headers
and
footers
Page
Setup
range.
D12, G25
destinatio
n range.
destinatio
n range.

the Save
As
command
on the File
menu.
View

the File
Type
command
on the File
menu.
C
Window A

List
Properties B
Both
Insert and
Delete
Clear
C
Both Clear
and
Delete
Remove B

Fonts

Margins

View

Edit

group.
D12:G25

cell group.
D
source
range.
source
range.
Both the
Copy and
Paste
command
s
constant

B
C

clipboard.
clipboard.

The
Duplicate The Copy The Paste
command command command
absolute relative
mixed

D
B

D
A

B4

$B4

B$4

$B$4

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!
C
Both the
Cut and
Paste
The Move The Cut
The Paste command
command command command s
D

the Fill
Handle

cycle
through
absolute,
relative,
and mixed
cell
reference
edit cells. s.
the
the
Format
Formattin
Painter
g toolbar

cycle
through
open
applicatio
ns.
C
Condition
al
formatting B

Select the
Insert
Hyperlink
command
from the
File menu.

Click the
Insert
Hyperlink
button on
the
Standard
toolbar.

Doubleclick a cell
and click
the Insert
Hyperlink
command. B

copy and
paste
cells.

whether
the cell
has a
formula or
a value in the cell
it.
address.

Right-click
a cell and
click the
Edit
Hyperlink
command.
whether
the cell
has an
absolute
or a
relative
cell
reference.

the value
in the cell D
text with
either a
two-digit
or fourdigit year,
text with a text with a
depending
two-digit four-digit
on the
year.
year.
an integer. format.
C

Jul-30
subtractin
g the
earlier
date from
the later
one.
the F4
key.

Aug-31

It is
impossibl
e to
determine
from the
29/03/200 informatio
8
n given.
B

adding the
earlier
date to the
later one.
the F2
key.

subtractin
g the later
date from
the earlier
one.
the Esc
key.

0.75

March 4
of the
current
year

adding the
later date
to the
earlier
one.
A
the F1
key.
B

a cell on a
worksheet
a
.
a variable. constant.

Either 3/4
or .75,
depending
on the cell
formatting C
either a
cell on a
worksheet
or a
variable. D

B1-G10

B1.G10

B1;G10

B1:G10

AVERAG
E

COUNT

MAX

SUM

Line

Pie

Scatter

Once a
column
chart is
chosen it
cannot be
changed
to a bar
chart.

Once a
pie chart
has been
chosen it
cannot be
changed
to line
chart.

Once a
line chart
has been
chosen it
can be
changed
to a pie
chart.
D

hold down hold down


the CTRL the SHIFT
key
key
Create
four
Use
separate
tables
files

hold down
the ALT
key
Transfer
informatio
n to a
database

hold down
CTRL +
SHIFT
A

03-Apr

Combinati
on
Once a
bar chart
is chosen
it cannot
be
changed
to a
column
chart.

Use
multiple
sheets

Paste
Special
B
none of
Edit | Data the
| Sort
choices
B
Create
None of
forms
the above C
select
Print
select
selection Print
on Page selection
Setup |
in the
Sheet
Print
and then dialog and
print
then print D
drawing
None of
pictures
the above A
=(B2*(D4+
#VALUE! C2)
C

Paste

Fill Down Fill Right

Tools |
Sort
Analyse
data

Data |
Sort
Calculate
data

portrait

press the
PRINT
SCREEN
key
writing
letters
D4+C2*B
2
=A3SUM:
B3SUM:C
3SUM
REF!
whatever
was last
landscape used

AD213
CERN

ZA1
ECRN

click the
Print
button
producing
graphs
(D4+C2)*
B2

A0
CARN
newsgrou
ps and
yahoo and mailto and search
infoseek files
engines
applicatio
bulletin
n
boards,m servers,pr
news
ails call
oxy
groups,ya and
servers
hoo and wireless and web
infoseek system
servers
bulletin
board
system

None of
the above B

vertical
A
None of
the above C
NET
A

none of
the above B

none of
the above B

business bulletin
broadcasti broadcasti none of
ng system ng system the above
none of
small
large
very small the above
windows windows windows none of
socks
sockets
stocks
the above
Mosaic
Yahoo
PINE
Lynx
none of
buffer
cache
built-in
the above
Photograp Digital
Cryptogra Message
hy
Signature phy
Digest

A
B
B
A
B
C

Key

Lock

Hash
Function

Formula

User-id
Password Name
Address
Penetratio
Cryptogra Password
n
Retrieval phy
Cracker
Regulatio
Acts
ns
Address Protocols
Unauthori
Spoofing Imposting sing
Approving
Loss
Threat
Exposure Hacking
Sales Income tax
tax
authorities authorities
Pirated
Utility
software
Tim
Berner
Lee
Hoffman
Etrade.co Amazon
m
.com

Automate
d Tailor
Any Time
Machine Money
Regulatio
Acts
ns
Router
Gateway
LAN
hyper
terminal
tracing
program
National
Informatic
s Center
Only
Computer
s

A
B
A
D
A
B

Police
Judge of a officer of
civil court IPS rank. B
Virus

Cracker

Charles
Bubbage

Howard
Aiken

Dell .com Msn .com B


Asynchron
ous
Transmiss None of
ion mode above

Address
Port

Protocols C
Pin
B

WAN

CAN

PAN

hypertext
tracing
program
Network
Interface
card

hypertext
transfer
protocol
New
Informatio
n Card

hypertext
tracing
protocol
C

Can not
Only
computers printers

Combines
connectivit
y of a hub
with the
Concentra traffic
tes
regulation
connectivit of a
y
bridge

None of
the above B
None of
the above D

Switches
data from
incoming
ports to
outgoing All of
ports.
Above

Bridges
and
Two or
Repeaters more
.
networks

bits

RG7U

Bridges
Hubs and
and Hubs nodes
None of
frames
Packets the above
virus
gateway router
checker
None of
Two
Four
the above
Data-Link Network All of the
Layer
Layer
above
Coaxial
Twisted
cable
Fiber
pair

Physical
address

Logical
address

A cable

Hub

Data
return to
the
sender

It continue
on to
target
device
It gets
with
destroyed corrupt
None of
bit by bit. data
the above B

Wireless
technolog
y
Physical
Layer

Wired
Technolog
y
Data Link
Layer

Ultra violet
technolog
y
Network
Layer

Binary
48 Bits

ASCII
48 Bytes

Octal
48 KB

software
that
facilitates
connectio
n to the
internet

a list of
rules for
transferrin
g data
over a
network

a gateway
calling
software program
that allows for
file
internet
copying
bridging
B
Network
Server
PC
C

firewall
One
Physical
Layer

Novell PC Client

A
C
D
B

A memory None of
address
the above B
None of
Router
the above B

None of
the above
All of the
above
None of
the above
48 MB

A
D
A
A

If the hub
goes
down, it
If one
brings
node goes down all
down, it
of the
brings
nodes on
There isn't down the that
one
entire ring section
Physiolog
Both A
y
Topology and B

If the hub
goes
down, it
brings
down all
of the
nodes on
all of the
rings
B
None of
the above B
All of
above
D

Bus

Star

Linear

Parallel

Ring
Both A
and B

Parallel

Circular

Ring
Ring
Star

Bus
Bus
Bus

Ring
Network
Layer

Bus
Star
Transport Physical
Layer
Layer

Mesh
A
Data Link
Layer
D

Ethernet,
token ring,
DecNET
bps
bps

Ethernet,
token ring,
FDDI
kbps
Kbps

Ethernet,
token ring,
ARCnet
B
mips
B
Mips
C

Linear

None
Both A
and B

Star
Star
Linear

Mesh
Mesh
Ring

C
B
C

Ethernet,
DecNET,
FDDI
mbps
Mbps
depend on
usually
measured the
higher
in bytes
transmissi
than LAN per
on
speeds
second
medium
CD-ROM
Windows
drive
a modem 95
must use
the World
Wide Web
key
gateway
interface

must use
electronic
mail
uniform
resource
locator

must have
a LAN
account
common
gateway
interface

limited by
modem
speeds
C
Netscape B

All of the
above
A
applicatio
n protocol
interface C
connects
interfaces a
a Novell used to
a modem computer
Interface control a to a
to a
Controller printer
computer network
D
CD-ROM
Windows
drive
a modem package Netscape B

Linux
have to
do with
compressi
on of
graphics
and video

Novell
Netware

Windows None of
NT
the above C

have to
do with
Web
pages

the
Internet

none of
the
previous A
use
appropriat
e
must use must use must have communic
the World electronic a LAN
ations
Wide Web mail
account
software A
none of
the
Printer
modem
bridge
previous D
provides
access to
is a CPU
the
is a CPU functional make of
Internet
register
unit
processor A

used to
send
email

is a
protocol
for the
transfer of
files
is part of between
Netscape computers D

used to
send
email

used to
browse
the Web
uses
wireless
communic
ation
is part of None of
medium
Netscape the above D

used to
protect a
computer
room from
fires and
floods
a backup
server

a screen none of
a form of saver
the
virus
program previous
an email a poor file
server
server
none
none of
the
previous
search
CD-ROM clip-art file engine

D
D

IR system
for the
hardware Internet
browser

scanner

provides
access to
the
is a CPU
Internet
register

is a CPU
functional make of
unit
processor A

used to
send
email

is a
protocol
for the
transfer of
files
is part of between
Netscape computers D

used to
browse
the Web

is a
protocol
used to
uses
that allows
send
telephone is part of for remote
email
lines
Netscape login
D
Any layer
Any layer can
can
communic Any layer
The layers communic ate only
can
cannot
ate
with the
communic
communic directly
layer
ate only
ate with
with any directly
with the
one
other
above or layer
another. layer.
below it. above it. C
It is made
up of
many
networks
connected
into
Individual
transmissi It works
computers
on lines
the same can
It is one
called
way as a connect to
large
backbone local
it using an
network. s.
network. ISP.
A
Password System
Denial of Port
cracking intrusion Service
sniffing
C
used to
protect a
computer
room from
fires and a form of
floods
virus
Flood a
Web
server
with
IP flood
requests

a screen
saver
program

none of
the
previous

Virus that
initiates a
ping flood UDP flood A

hack

packet

firewall
router
a backup an email
server
server
Apply
security
patches

flood

switch
hub
B
a poor file none of
server
the above D

Update
Backup
Limit
virus
data on a logging on
definitions daily basis access
C

Only large
namerecogniza
ble sites
are safe.
Use of
Use of
logical
Use of
password access
identifiers s
methods
All sites
are safe
and
reliable.

traffic

There are
safe and
unsafe
sites.

ActiveXenabled
sites are
safe.

Phone
A Trojan
horse

E-mail

Use of
encryption
methods D
by
scanning
the
by
computer
attaching for a
itself to a connectio
document. n.
B
Web
Applicatio
traffic
n updates D

Adware

A worm

Modems
cookies
and
Trojan
horses.

Protocols
Trojan
horses
and key
loggers.

Multiplexo
rs
LAN
key
cookies
loggers
and key
and
loggers.
worms.

by
attaching
to an email.

An attack
on a
system for
personal
gain

through
an FTP
port.

An attack
with the
purpose
of gaining
publicity
Disruption
in
Economic communic
damage ation
Crashing
the stock Shutdown
market, as of military
in the
security
1930s
systems

Spyware

Changing
the
Giving out content of
disinforma a Web
tion
page
D
Disruption All of the
in supply above are
lines
correct.
D
Shutdown
Contamin of nuclear
ating
plant
water
safety
systems systems D

To obtain
an
accurate
inventory
of network
related
To
equipment
To carry To
improve
and parts
more
improve
system
and
network
network
response network
capacity services time
nodes
D
limit
stop its
update its
access to competitor prices as
set its
computer s seeing soon as
prices
owners
their
they are
very high only
prices
changed D
Yahoo
USA
People
People
People
Lycos
Search
Search
Search
Search
B
Name of Date of
Personal Criminal
your bank birth
assets
records
A
Virus
Fraud
Adware
Spyware B

buy
stocks.
Shill
bidding
Internet
stalking.
pop-ups.
Use a
fake email
address.

invest
without
risk.

make
large
amounts
of money
by parking
purchase funds in
off-shore their bank
property. account. D

Phishing
cyber
stalking.
cookies.

Siphoning
virtual
stalking.
spam.

Never use Use a


your real proxy
identity.
server.
Message
Physical sequence
Security number
Encryption controls
checking
I only
irc

II only
ftp

Hoaxing
Web
stalking.
viruses.
Use antispyware
software.

Logical
access
controls
Neither I
Both I & II or II
www
telnet

B
B
B

B
C
C

Adds
more
Verifies
Increases
bytes to
integrity of boot up
programs files
time

HTML

Internet
Explorer

Microsoft
Excel

round trip
HTML
HTML
document. document.
.con is
.com is
.co in
used for
used for used for companie
company company s
Web
query.

the World
Wide Web
round trip Consortiu
HTML.
m
HTML.
XML.
HTML.
DHTML.
clicking a
using
hyperlink
Internet
that
Explorer
reference
to view a
sa
Web page updating document
that is
the values that is
stored on that are
stored in
the hard obtained the floppy
drive on
through a drive on
your
Web
your
computer query
computer
Click on
the Back
arrow until Click on
Go to the
the
Go to or History
desired
Search in page and
site is
the
look for
found
browser
the site

Misleads
a program
recompilat
ion
B
both
HTML and
Internet
Explorer B

Web
browser.

None of
the above A

one way
HTML.
MHTML

C
D

viewing an
Excel
worksheet
that you
have
saved as
a Web
page.
B

Go to the
Bookmark
s or
Favorites
page
C
the
the
the Insert the
External
Refresh
Hyperlink Update
Data
command command command command A
Screensa
Hyperlink ver
Sound
BMP
GIF
JPEG

Video
TIFF

C
C

Cut and
paste it to
a word
processor
document.
network
extranet. intranet.
topology
an
an
attachmen a
encryption
t.
signature. a footer. .
VoIP
IPT
IPP
PoIP
Desktop Desktop Desktop Desktop
client,
client,
server,
server,
applicatio software, applicatio software,
n, and
and
n, and
and
database. hardware. database. hardware.
Telephon None of
Modem
CD-ROM e line
the above
File
File
Transmiss File
Transfer ion
Transfer None of
Program Protocol Protocol the above
So
computers
can be
So IP
So email
reference addresses is
d by a
can be
delivered None of
name
shorter
faster
the above
143.215.1 None of
193.1.2.3 45.1.1.1 2.19
the above
paul .trigg
@
paul.trigg
domain.
@domain. paul.doma None of
org. uk
org.uk
in.uk
the above
Scientists
The US
in
governme Switzerlan
None of
nt
d
No-one
the above
Write it
Save it to down on a
a floppy
piece of
disk.
paper.

Internet
Relay
Chat

It will be
deleted

Internation
al Relay of
Character
s

Add it to
Favourite
s or
Bookmar
ks.
privileged
network.

Internet
Remote
Conversat
ions
A letter
It will be will be
waiting for sent to
you to
you in the
collect it post

C
A

B
A

A
B

A
D

None of
the above A

None of
the above A

Hyper
Textual
Mark-up
Lingo
Receiving
messages
automatic
ally from
anyone in
the group

Hyperlink
Text
Marking
Language

Hyper
Text Markup
None of
Language the above C

clipart &
auto
shapes

People
discussing
a topic of
interest
globally
autolayout
s and
presentati
on
templates

circles

points

squares

icons

square

image
short cut
menus

grid
auto
shapes

guide
all the
above

tool bars

High
volumes
of email

None of
the above C

slide view
& outline none of
view
the above B

slide show
clip gallery & view
fonts &
& word art show
images

none the
above
all the
wave file media clip .video file above
movelast,t movelast,f
eof,false rue
alse
eof,true
form
properties layout
project
window
window
toolbox
explorer
movefirst,t movefirst,f
bof,false rue
alse
bof,true
value()
int()
number() val()
circle
true
true

rectangle square
false
false

fontcolor
underline,t
rue
textsize
onemillionth
of a
second

color
fontunderli
ne,true
size
onehundredth
of a
second
recordcou
nt

count

forecolor
textunderli
ne,true
foresize
onethousandt
h of a
second

oval

none of
the above
none of
the above
fontsize
one-ten
thousandt
h of a
second

itemcount listcount

A
B
D

D
D
D
D
A
A
C
B
D

C
D

form
layout
window

prperties
window

title

prompt

project
explorer toolbox
B
vbmsgbox none of
style
the above C

msgbox() textbox
label
inputbox() D
opendyna opensnap dbopensn dbopendy
set
shot
apshot
naset
D
load

activate

standard
blue
red

opaque
red
green
form
properties layout
window
window
form
properties layout
window
window
change
lostfocus

unload
transpare
nt
green
blue

initialze

graphical
black
white
project
explorer
toolbox
window
project
explorer
toolbox
window
text
gotfocus
none of
container the above

child
true
load

parent
false
unload

enabled

visible

value

dime
.ctx
Validate
On Error
GoTo
linelabel
UpdateCo
ntrols

dim
.ctl
Validation
On Error
GoTo
Inline
PaintPictu
re

var
.ctr
Check

initialize

C
D
B
D

A
D
C
A
D

activate
none of
text
name
caption
the above C
opendatab
openrecor none of
ase
dbengine dset
the above B
C

On Error
Stop

style
none of
the above
.ocx
Audit
On Error
Resume
Next

Refresh

Resize

Cancel
parameter Cancel
to a non- parameter
zero value to 0

UnloadMo
de
parameter
to a nonzero value

UnloadMo
de
parameter
to a zero
value
A
None of
the above D

B
B
A

Consists
Consists of several
of several Applicatio
Programs ns
Form
window, Project
standard window,
or code
view code
module
window
Place
Place
code in
code in
the
the
Terminate Unload
event
event
AutoRedr
AutoRedr aw =
aw = True False

Msgbox
err.no &
err.text

Consists
of Various
Forms
Consists
And Code of several
Modules Projects D
Class
module,
code
module
Place
code in
the
Deactivate
event

None of
the above A

None of
the above B

PaintPictu
Refresh
re
A
Msgbox
Msgbox
error.num
Msgbox
error.num ber &
err.numbe ber &
error.desc
r & err.text error.text ription
D

To
provide a
repository
for images
To display To help in To allow used by
images to creating a the editing other
the user ToolBar
of icons
controls
D
GetFileNu
FreeFile m
GetFile
GetBytes A
GetProper
Retrieve Get
ty
Value
B
Common
messages
passed to Open
Windows
Windows dialog box explorer
Caption
Visible
Multi-Line
Click,
KeyUp
KeyUp
Click and and
and
KeyPress KeyDown KeyDown
Ascii
Binary
Input
Format
Format
Mode
CurrentX ScaleLeft ScaleHeig
and
and
ht and
CurrentY ScaleTop ScaleTop

Input box
Font
KeyPress,
KeyUp
and
KeyDown
Output
mode

D
C

x and y

D
B

Property
Get
Backgrou
nd color
property

Property
Assign

Property
Let

Caption
property

ZOrder
property

Min

Max

Value

Shell

Substr

SetAttr
CStr
A
Are
actually
not
None of
properties the above B

Are one
and the
same

Can be
different
at times
You do
You do
not have
not need the
to use the permissio
Set
n to
command access
here
the class

MyVar
has not
been
declared
The
ExecProc
The Open The Exec edure
method
method
method
A critical An
A warning message exclamati
query icon icon
on icon

Property
Set
C
AutoRedr
aw
property C
CurrentVa
l
B

None of
the above C

None of
the above D

None of
the above B
built-in
intrinsic
procedure
statement. variable. constant. .
C
InputBox MsgBox
function
statement
can be
can be
MsgBox InputBox created
created
statement function
with the
with the
returns a returns a macro
macro
value,
value,
recorder, recorder,
while the while the while the while the
InputBox MsgBox MsgBox InputBox
function
statement statement function
does not. does not. cannot.
cannot.
B
Data
cannot be
A new
entered
The form Data can check box
into the
can be
be
can be
form.
modified. entered. added.
C
QueryUnl
Unload
oad
Deactivate Terminate C
scribble
clipping
cropping cutting
drawing
tool
tool
tool
tool
A

color
palette

ascent
10
column

images

color
guide
primary
tricolor
color
color
scheme
palette
scheme
28
18
36
bar
pie
linear
slide
images
sorter
and text
slides
views
all the
radar
doughnut above
data point data
stream
color box

color
scheme

circular
entity
Microsoft
organizati
on chart clip art

A
C
A

C
A
B

auto
shapes
the chart
window
the
the chart opens
organizati is made
displaying
on chart is available a chart
expanded for editing template
general
custom
purpose drawing
box tools tools
tools

track
changes

used to
create a
used to
manager
mange
accessed box for an
organizati only by
existing
onal chart manager box
not
available
in the tool
turned on turned off bar

used to
store the
other tools
of the
organizati
onal chart C

none of
the above C
standard
drawing
tools
C

available
in the tool
bar
any of the
once
twice
thrice
above
two
four
five
eight
standard all the
native tool draw tool tool
above
autolayout handlayou
none of
s
ts
slide view these
reduce/enl
none of
zoom
arge
preview
the above
importing exporting copying
Microsoft auto
excel
shapes
clip art
.rtf(rich
.ppt(Powe text
.doc(docu
rPoint)
format)
ment)

B
C
B
B
B
B

moving
B
drawing
tools
A
.html(hype
rtext
format)
B

nine
.rtf(rich
text
format)

only one six


.wmf(wind
ows
.txt(plain
metafile) text)

not
displayed
during the
slide show
DTS(digit
al track
sound)

displayed
only
during the
slide show
3D(3
dimension
)

build
notes
master

transition
slide
master

twelve

.doc(docu
ment)
B

displayed
only in
outline
none of
view
the above A
both a and
b
transition

slide show view show


master
master
slide
notes
slide
outline
sorter
view
slide view view show view
15
10
7.5
inches,10 inches,7.5 inches,5 none the
inches
inches
inches
above
none of
portrait
landscape a or b
the above
animation view show transition
gif

jpeg

during
slide
transition
spell
checkers
custom
slide show show
notes
slide pane pane
internet
explorer

when the
slide show
is run
header
files
both a and
b
properties
pane

D
A
A

B
A

b or c
A
none of
the above D
all the
above
D

png
action
hyperlink hypertext button
visual
basic for Microsoft
applicatio visual
all the
visual c++ n
interdev
above
macro
batch file templates add-ins
while
creating a
.exe file
virus
checkers

none of
the above
all the
above
none of
the above
outline
pane

B
A

C
A
B
D

paint shop paint shop power


pro
pro
point 2000 D

PowerPoi
nt creates
a sample
presentati
on to
which
user can
add words
and
pictures

it is the
quickest
way to
create a
presentati
on

contains
sample
presentati
ons for a
variety of
topics

user can
insert
user can picture to
user can insert only the
insert
premaster
objects
drawn, pre- slide
like clip- colored
which gets
arts,
graphic
reflected
pictures
images
in all the
stored in a reflected slides
separate in a clip
using that
files to the arts to the master
slides
slides
slide
in notes
in outline in slide
pages
view, drag sorter
view, drag
the slide view, drag the slide
icon to a the slide icon to a
new
to a new new
location
location
location
the slide
that holds
the
formatted
placehold
ers for the
design
titles,
templates
main text
is the
and any
template
backgroun transition whose
d items
means
format
that user applying and color
wants to special
scheme
appear on effects to user
the slides the
applies to
is called a crossover a
master
between presentati
templates the slides on

provides
suggested
content
and
design
D

user can
insert
picture to
the title
slide
which gets
reflected
in all the
slides
using that
title slide B
I slide
view, drag
the slide
icon to a
new
location
C

the slide
that holds
the
formatted
placehold
ers for the
title and
sub-title
for the
presentati
on is
called a
title
template D

with notes
pages
view user
can
prepare
speaker
notes and
handouts
the slide
that holds
the
formatted
placehold
ers for the
titles,
main text
and any
backgroun
d items
that user
wants to
appear on
the slides
is called a
master
template
slide
layout

in outline
view, user
can see
the
miniatures
of all
slides in a
presentati
on,
complete
with text
and
graphics

user
should
select the
slide view
to add the
text to the
slide

the slides
can be
reordered
in the
outline
view
B

the slide
that holds
the
formatted
placehold
ers for the
title and
subtitle for
the
presentati
on is
called a
title
template D
set up
customize new slide show
B
design
template
is the
template
transition whose
means
format
applying and color
special
scheme
effects to user
the
applies to
crossover a
between presentati
the slides on

by default,
doughnut
data to be chart is
graphed displayed
resides in based on
a
the data in
datasheet the
window
datasheet
the
master
the slide
slide
master
office
spell
assistant checker
10
12
once
twice

data is
plotted in
a chart
window
the
header
slide
grammar
checker
102
three

user can
add data
labels and
gridlines
to the
chart
B
the format
slide
none of
the above
22
four times

B
B
B
B

text,
text,
hypertext
graphics and
and email Power
address. Point.

CD-ROM,
digital
camera
and
sound.

text,
hypertext,
Power
Point,
video and
sound.
D

the Line
style

the Font
and the
text
alignment

Line style,
Line color,
text font,
and text
alignment D

the Line
color

Fill color,
Line color,
Line
and Line
Fill color Line color thickness thickness D
A popup
box
prompts Microsoft
Excel is
you for an Graph is
started so existing
started so The graph
that you
Excel
that you
placehold
can create chart to
can create er is
a chart.
insert.
a graph. deleted.
C

taken
from the
first
column or
row of
data in the
datasheet,
always
depending
always
taken
on
taken
from the whether
from the first
the data
first row of column of series are
data in the data in the in rows or entered by
datasheet. datasheet. columns. the user. C
Side-byside
Stacked
column
column
Pie chart Line chart B

It
automatic
ally
displays in
Slide
view.

Click the
Insert
Chart
button on
the
Standard
toolbar.
Click the
chart
object,
then click
the View
Datasheet
button on
the
Standard
toolbar.

Single
click the
chart.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
linked to
the
PowerPoi
nt
presentati
on.

Double
click the
chart.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
embedde
d in the
PowerPoi
nt
presentati
on.

Pull down
the Insert
menu and
select
Chart.

Pull down
the Insert
menu and
select the
appropriat
e Object.

Pull down
the Insert
menu and
select
Chart,
click the
Insert
Chart
button on
the
Standard
toolbar, or
pull down
the Insert
menu and
select the
appropriat
e Object. D

You
cannot
display
Pull down the
the Edit
underlying
menu,
datasheet
then
once the
select
slide is
Object.
finished. B
Change to
Click
Slide
outside
Sorter
the chart. view.
C

The
datasheet
window is
The
toggled
datasheet from
is saved closed to
as a
open (or
separate from open
file.
to closed). D

The
applicatio
n that
The chart
The chart created
is
The chart is doubled the chart
selected. is deleted. in size.
is started. A
The chart
The chart Microsoft
is
The chart is doubled Graph will
selected. is deleted. in size.
restart.
D
a slide
one bullet
item at a
time, build
bullet
items a
letter at a
time, and
build
a slide
bullet
bullet
bullet
one bullet items one items one items a
item at a letter at a word at a word at a
time.
time.
time.
time.
D
Subtle,
Moderate,
Subtle
Moderate Exciting
or Exciting D
Neither
enter nor
Both enter exit;
and exit, neither fly
Fly in from and fly in in from
Enter and top or
from top top nor
exit
bottom
or bottom bottom
C
Enter
Shift
Alt
Ctrl
B

the way
objects
appear on
a slide.

what
objects do
after they
appear on
a slide.

the way
objects
exit a
slide.

The
advanced
timeline
shows the
sequence
in which
objects
The
The
will
advanced advanced appear on
timeline
timeline
the slide
shows the shows the and the
sequence duration duration
in which of the
of the
objects
effect
effect
will
applied to applied to
appear on each
each
the slide. object.
object.

Clips

Organizati
on charts Text

Paint
program

Draw
program

Filtering
program

From top

Dissolve
in

Fly in

Custom
animation
can be
used to
affect the
way
objects
appear on
a slide, to
what
objects do
after they
appear on
a slide,
and to the
way
objects
exit a
slide.
D
The
advanced
timeline
shows
neither the
sequence
in which
objects
will
appear on
the slide,
nor the
duration
of the
effect
applied to
each
object.
C
Clips,
organizati
on charts,
and text
D
Animation
program A
Fly in,
From top,
and
Dissolve
in
D

Once data
is entered
it cannot
be
changed.
OLTP.
You can
change
the
appearan
ce of a
whole
diagram,
but not
individual
shapes of
a
diagram.
[Enter+A]
.vbg

Data
cannot be
Once data entered
is entered into
it can be Datasheet
changed. .
OLAP.
OLST.
You can
change
both the You
appearan cannot
ce of a
change
whole
the style
diagram of the
and the
connectin
individual g lines in
shapes of an
a
Organizati
diagram. on chart.
[Shift+Z] [Alt+Z]
.vbp
.frm

There is
no such
thing as a
Datasheet
.
B
OLIP.
B

Dir1.Path
=File1.Pat
h
openrecor
dset

You
cannot
change
the color
of the
boxes in
an
Organizati
on chart.
[Ctrl+Z]
.frx
none of
additem
loaditem the above
loadpictur
none of
e
addpicture the above
Dir1.Path
=
File1.Path
Drive1.Dri =
none of
ve
Dir1.Path the above
message(
none of
)
msgbox() the above
Dir1.Path
=
File1.Path File1.patte
Drive1.Dri =
rn=Dir1.pa
ve
Dir1.Path th
opendatab recordcou
ase
nt
count

update

append

addnew

append

update

additem
addnew
B
moveprevi
ous
movefirst C

add
load
Drive1.Dri
ve=Dir1.P
ath
messageb
ox()

movenext movelast

Cancel
parameter
to a nonzero value
Word
2000

UnloadMo
de
Cancel
parameter
parameter to a nonto 0
zero value
Office
2000
Office 97

additem

B
D
B
B
B

B
C

C
C
C

UnloadMo
de
parameter
to a zero
value
A
Back
Office
A

click-ntype
office
clipboard
shift+end
and
shift+hom
e

double
click

drag &
drop

cut

select

shift+left
and
shift+right
normal
web
layout,
layout,
web
printlayout layout

ctr+end
and
ctr+home
web
layout,
page
layout

click from
start
program,
MSWord
from the
templates task menu
inbox
document
assistant assistant

none of
the above A
none of
the above A

none of
the above B

none of
the above A

none of
wizard
the above
office
none of
assistant
the above
Screen
Document
Tip
Tool Tip Icon Tip
Tip
marginal
none of
tab stop
stop
ruler
the above
home and up and
up arrow page up end keys down
keys only keys only only
arrow
left
center
decimal
rotation
dialogs/al none of
template model
erts
the above
increase decrease both A
none of
indent
indent
and B
the above
special
control
design
effect
tool box
wizard
pictures
drawing
control
toolbar
box
database forms
1
2
0
11
page
printer
print
setup
setup
preview
from the from the from the
none of
file
file menu file
the above
none of
border
shading
style box the above
ctrl+a
Del
ctrl+f
ctrl+m
ctrl+a
Del
ctrl+f
ctrl+m
CTRL+SH
CTRL+SH CTRL+SH
IFT+F
CTRL+O IFT+S
IFT+P
ctrl+shift+ ctrl+shift+
ctrl+shift+f ctrl+o
s
p
None of
Excel
Access
Both
the above

A
A
A
B

D
D
B
C
A
A
A

A
A
A
D
A
C
B

True
False
Valid
Signs
HLOOKU
P

False
True
Transactio Limit
n type
Check
VLOOKU
P
A or B

DDE

OLE
Analysis is
the
loading of
programs
that
perform
routines to
control
peripheral
devices

ODBC
This
involves
looking at
a system
and
finding out
how
informatio
n is being None of
handled
above

Inputs,
outputs,
Only
file design
hardware hardware,
and
and
software software
To
execute
To collect any
data
programs
Deleted
Copied
from the from the
disk
disk

Maintenan
ce,
reliability,
and
upgradea None of
bility
above

Analysis
translates
program
code of a
high level
language
to
machine
code

To
maintain
security

A
B
Reasonab
leness
D
None of
the above B
All of the
above
C

Saved to
the disk

None of
the above D
Transferre
d from the
disk
A

Users
operate
the
manual
system
and
computer
system at
the same
time

Users
operate
the
computer
system
from a
given date

Users
operate
the
manual
system

None of
above

The new
system is
introduced
alongside
the
existing
system

The new
system is
introduced
and users
start
operating
it

Users
continue
operating
the old
None of
system
above

Instruction
s and
technical
document
ation

User
Guide and
technical
document
ation
User
guides
cover how
To enable to run the
any printer system,
to be
enter
For
connected data,
technical to the
save,
support
network
print, etc.
Network
Operating systems Database
systems and
systems
and
communic and
system
ation
backup
services services services
Magnetic
tape
storage
CD-ROM floppy disk
To
To help
maintain a
someone
backup
who is
copy of all
applying
the
To do a
for
informatio particular employme
n
task.
nt
Address
Data bus Auto bus bus
FDDI
BAD
TED
Address
Data bus Auto bus bus
Data
Operating structures
system
that are
Peripheral routines
part of the
s that are that
kernel of
connected execute in an
to a
supervisor operating
computer. mode.
system.
binary
ASCII
decimal
form
code form form

were 7
bits
4 bits

Log files
and
temporary
files

8 bits
8 bits

represent
ed 256
characters
16 bits

None of
above

None of
above

None of
the above A

Hard disk B

None of
the above
Control
Bus
MAD
Control
Bus

B
A
B
D

Shells,
compilers
and other
useful
system
programs. D
alphanum
eric form A
represent
ed 127
characters A
32 bits
A

More than
1000
mega
1000
bytes
kilobytes

32
registers
used to
indicate
uppercase
letters
ROM
bits per
second

memory
capacity
have
fewer
instruction
s than
RISC
machines
ALU

Power is
switched
off
a parallel
interface

32 I/O
devices

1024
230 bytes bytes
A
a 32-bit
bus or 3232 Mb of bit
RAM
registers D

used to
detect
errors
RAM

is the first
bit in a
byte
DRAM

baud

bytes

is the last
bit in a
byte
B
CROM
A

memory
access
time

Hertz
D
secondary
secondary storage
storage
access
capacity time
B

use more
RAM than
RISC
machines

have
medium
clock
speeds

Registers Variables
Data is
not saved
Computer before
is
computer
improperly is shut
shut down down
a serial
printer
interface interface

dot matrix ink-jet


line printer printer
printer
stores
more
is faster
informatio
to access is nonn than
than RAM volatile
RAM
increased
the
provides
storage
backup
capacity increases power in
of a
the
the event
computer process
of a power
system
speed
cut

use
variable
size
instruction
s
D
Logic Bus A

All of the
above
D
a modem
interface B
laser
printer.

is used
for cache
memory B

none of
the
previous

has more
storage
is a form capacity
of ATM
than an
card
ATM card
CRT
displays

LCD
displays

is an
access
contains
card for a a
security
microproc
system
essor
C
none of
SSGA
the
displays
previous B

having
several
programs
writing
in RAM at
programs none of
the same multitaski in multiple the
time
ng
languages previous

having
several
softwares
running at
the same
time

the ability
to run 2 or
more
programs
concurren
tly

writing
programs none of
in multiple the
languages previous

ALU

Registers Variables Logic Bus B


magazine
brochures s
CD-ROM e-mail
D
to run
more than
one
an
program
multitaski operating at the
none of
ng
system
same time the above C
none of
multitaski multiprogr
the
ng
amming
multiuser previous C
ONLINE
ONLINE PAGELAY DOCUME
NORMAL LAYOUT OUT
NT
A
ctrl+m
ctrl+v or
ins

ctrl+2
ctrl+c or
ins

ctrl+end
ctrl+x or
ins

ctrl+home B
ctrl+v or
Del
A
none of
the above B

ctrl+2

ctrl+5

Text Box
Header
and
Footer

Frame

ctrl+1
AutoShap
e
Border

Screen
Tips

Page
Layout

none of
the above A

Chart

WordArt

Auto
Shapes

File

Borders

Shading

WordArt

Bullets

clear

remove all remove

clear all

picture
arrow
circle
bullets
bullet
bullet
dialog box dialog box dialog box
AutoShap
charts
WordArt es
document new
doc1
1
document
hyphenati mail
thesaurus on
merge

shift+f7

thesaurus
menu
shift+f8

first

second

tab
convert
text to
table

end
convert
data to
table
rows &
row
columns
AutoCorre AutoForm
ct
at
Mail
Merging Macro
visual
basic
basic
shift+f8
shift+f7
web
online
layout
layout
view
view
email
outlook
client
express
html
xml
internet
intranet

first row

none
dialog box A
files
C
default
document B
none of t
he above A
tools+spel
ling menu A
last cell of
the t able A
none of
the above A

enter
table auto
format
none of
option
the above
none of
records
the above
style
none of
gallery
the above
Data
none of
Source
the above
visual
vj++
FoxPro
alt+f8
alt+f5

browser
micro soft
outlook
sgml
arpanet

A
B
A
B
B
A

none of
the above A
hotmail
vb script
LAN

A
A
A

field
field name
names in
must be the field
the
listed in
separator header
the same s in a
source
order as header
must
the
source
match any
correspon and the
merge
ding
data
fields
informatio source
you've
n in the
can not be inserted in
data
set as
the main
source
paragraph document
auto
format
option
by default
applies to cell height
it is not
the entire and
possible table and weight
to change not only to option
the height the
applies to
of only
selected all the
selected rows or
rows and
rows of a columns columns
table
of a table of a table
left
decimal
justified

the
number of
fields
names in
the
header
source
must be
the same
as the
number of
data fields
in the data
source
B
delete
cells
option
allows to
delete the
entire row
or a
column or
shift cells
up or
shifts cells
left
C
top
A

A new
section is
created in
order to
change
properties
like
number of
columns
true

In order to
type a
header
from the
third page
of the
document
a section
break is
inserted
after t he
third page
false

A section
is a
portion of
a
document
in which
certain
page
formatting
option can
be set
D
A

true
true
drag &
drop
true

false
false
click -ntype
false

If a
header is
inserted in
the
second
section
then the
same
header is
applicable
to the first
section

A
A
Double
Click

none of
the above B
A

with t he
caps lock
key
accidentall
y turned
on
reverses
the case
of the
letters that
automatic prohibits
were
ally
the user automatic capitalized
corrects
from
ally
incorrectly
common renaming corrects
and then
typing,
an auto
the
turns off
spelling
correct
grammatic the caps
errors
entry
ally errors lock
B
password
protected
document
can be
opened
password
password without
password can be
can not
password are not
upto 15
include
as read
case
characters
spaces
only
sensitive long
B
left
justified
hanging
top
A

a .ppt file
can not
not be
inserted at
specified
position in
the
current
document
true
true

a
document
file can be
inserted in
the
current
document
at
specified
position
false
false

true
true

false
false

Master
Document
Print
Layout
View

Child
Hyperlink none of
Document Document the above A
Page
Layout

a multiple
document
s files can
be
inserted in
the single
document

an .xls
data can
not be
inserted at
specified
position in
the
current
document B
A
A
B
A

Outline
Layout

none of
the above B

Insert
Mode

Type Over
mode
Remove
press the
press the press the escape
return key tab key
key
layers and lines and
planes
spaces
enter/retur
tab
n
grammar spell
checker
checker
send a
public
message
to friends
interested send
in one
pictures to
topic
a friend
From ___
Print all
To ____
Enter
Copy
closing
tabbing

none of
the above A
just keep
typing

height and rows and


width
columns
backspac
e/ delete shift
thesaurus outliner

send
private
messages
to a friend
Page
setup
Retrieve
spacing
word
processin
g

send a
package
to a friend
Print
preview
Save
sorting

D
B
C

D
B
C
B

spreadshe
database graphing
et
C
Creating
and
To
editing
Storing
analyse
document informatio None of
figures
s
n
the above B
subscript

To
analyse
figures

annotation
Creating
and
editing
document
s

clip art

clipboard

Storing
Making
informatio Calculatio
n
ns
B
Font,
Spelling,
Paragraph
grammar
, Bullet
Clear,
and
Cut, copy, and
replace
autocorre paste and Numberin
and select ct
clear
g
C
Text
Text at
Numbers which
the
which
appear at Designate
bottom of appear on the top of d area on
every
every
every
the
page
page
page
document C

Mouse,
printer
and
processin
g system
keyboard?

Keyboard,
Mouse,
monitor
and
printer

Clear,
replace
and
Toolbars

Monitor,
keyboard
and
mouse
microphon
clip-art file e
Spelling,
grammar
and
Cut, copy,
autocorre paste and
ct
clear

6 point

10 point

15 point

2
inches.

2
inches.

3 inches.

You are
not in
Print
Layout
view.

Word
cannot
display
columns
during
editing;
You have You have you will
not
not
see them
inserted a specified only when
column
continuou you print
section
s section the
break..
breaks.
document. A

Browser

to move a
section of
text from
the
original
to store a to store a location to
file on the file on a
another
hard drive diskette
location
Data
about a
set of
A set of
similar
Mainly
different
things
text
graphics
Thesauru Spell
Grammar
s
Checker Checker

None of
the above B
digital
scanner
D

None of
the above C
25 point
B
impossibl
e to
determine
.
B

to leave
an original
section of
text in
place
while
pasting a
copy
elsewhere D

None of
the above B
Find and
Replace B

Paste

Replace

Select all

AutoCorre
ct
B

Copy,
Cut, then
then paste paste

Delete,
Insert,
then paste then paste A

To give
the
original
author a
chance to
accept
suggested
changes
from the
person
who
entered
the
revisions

To
complicat
e the
revision
process
and to
force the
author to
spend
more time
making
correction
s

To allow
multiple
people to
work on
one
document
in
collaborati
on with
one
another
C

A vertical
line
outside
the left
margin
A red
signifies a
A line
underline change
appears appears has been
through
beneath made at
text that is text that is that point
to be
to be
in the
deleted.
added.
document.
Through Through
the Edit
the Tools
menu by menu by Through
choosing choosing tools on
Track
Track
the
Changes Changes Reviewing
command command toolbar

Comment
s are
enclosed
in a text
box at the
right of
the
document. D
Both
through
the Tools
menu and
the
Reviewing
toolbar
D

To give
the
original
author a
chance to
reject
suggested
changes
from the
person
who
entered
the
revisions

The
Versions
command
will allow
you to
save
multiple
versions
of a
document,
including
any
changes
that may
have been
made to
that
document.

The
Versions
command
will allow
you to
save only
one
version of
a
document,
including
any
changes
that may
have been
made to
that
document.

The
Versions
command
will allow
you to
save only
one
version of
a
document
without
any
changes
that were
just made
to the
document.
The first
and
All
second
versions The latest versions
are
version is are
opened
opened
opened
automatic automatic automatic
ally.
ally.
ally.
Grammar Spell
Dictionary check
check
Word will
Word
The most show the
displays a recent
name of
list of the version
the
dates and will
person
times
appear at who
each file the
saved
was
bottom of each
saved.
the list.
version.
Fields
Check
boxes

Tools
Toggle
button

Forms

The
Versions
command
will allow
you to
save only
two
versions
of a
document:
one
version of
the
original
and one
version of
any
changes
made to
the
document. A

The
previous
version is
opened
automatic
ally.
B
Thesauru
s
A
Word is
not able to
tell the
most
recent
version of
a
document. A

Insert
A dropText fields down list

C
B

Comment
s can be
edited or
deleted by
right
Comment clicking
Comment s cannot the
s cannot be
highlighte
be edited. deleted.
d text.
Text
Text at
Numbers which
the
which
appear at
bottom of appear on the top of
every
every
every
page
page
page

Comment
s can be
edited or
deleted by
left
clicking
the
highlighte
d text.
C

Fault
Finding
Insert

Debuggin
g
D
Edit
C

None of
the above C
Insert
Press
Copy and page
Press tab. Return.
paste.
break.
D
text.
graphics. forms.
numbers. C
header/fo bibliograp find/searc
oter.
hy.
h.
macro.
A
This
Format
action is
Copy
Paste
Painter
not
button
button
button
possible. C
Bug
Squashing
Tools
a section
of text
where the
first letter
of each
sentence
a section is
of white
lowercase
text on a and the
black
rest are
backgroun uppercase
d.
.
setting it
in larger typing it all
type or
in capital
font size. letters.

Error
Injecting
Format

the
guidelines
used to
establish
where
different
elements
of the
newsletter
will go.
underlinin
g the text
of the pull
quote.

an
enlarged
capital
letter at
the
beginning
of a
paragraph
.
A

changing
the color. A

The
The width height of
of each
each
column
column
6
10

The
number of
columns
12

A grid is a
set of
horizontal
and
vertical
lines that
determine
the
placement
of
elements
in a
newsletter
or other
document. D
The tab
spacing
within
each
column
D
72
D

One

Three

Four

A dropped
cap is a
word that
The
A pull
starts with
reverse
quote is a a
technique quotation lowercase
means to taken
letter
add dark from
when it
text on a (pulled)
should
light
from
have a
backgroun another
capital
d.
document. letter.

Two
Press
Press
Ctrl+Shift+
Ctrl+Enter Enter to
to create create a
a page
column
break.
break.
A sans
A serif
serif font
font at 10 at 10
points
points

Press
Enter to
create a
section
break.

Press
Shift+Ente
r to force
a line
break.
C
A sans
A serif
serif font
font at 20 at 45
points
points
D

2 inches

3 inches 4 inches

Field

Record

Both

Horizontal Vertical
A or B
Duplicate Combined
Value
Value
Gaps

It depends
on the left
and right
margins,
and how
many
columns
are
specified.
None of
the above
None of
the Above
All of the
above

D
A
A
C

Cross
Tabulate
RAND()

None of
Filter
Merge
the above A
VLOOKU HLOOKU None of
P()
P()
the above B

TRUE
TRUE

FALSE
FALSE

A
A

None of
Unusual Strange
A or B
the above C
exception compariso duplicates All of the
testing
n of data testing
above
D
True

False

True

False

Both B &
Limit
Sequence Range
C
related to
none of
virtual
a form of a form of the
reality
ROM
VRAM
previous

same as same as
multitaski multiprogr
ng
amming multiuser

involves
using
more than
one
processor
at the
same time D
use a
virus
protection
program B

save the
file

make a
set up a
backup
password copy

to
calculate
numbers

to read
from or
write
informatio to print
n to a
sheets of
floppy disk paper

Uses
Cobol
106 sec

uses
Java
103 sec

D
D

a keypad

a mouse

to display
informatio
n or
pictures
on a
screen
none of
the
uses C++ previous.
1012 sec 109 sec
a
message
a frog
pad

data to be
transferre
d to
memory

data that
has been the
transferre address of
d from
a memory
memory location

data to be
transferre
d to or
from
memory

the
address of
a memory
location

data to be
transferre
d to the
stack
an
instruction
an
that has
instruction been
that has
fetched
been
from
decoded memory
a scroll
a cursor bar
Formula

an
instruction
that has
been
transferre
d from
memory. C
an
instruction
that has
been
transferre
d from
memory A

the
address of
the next
instruction
to be
executed D
a magic
a light pen marker
A
an
instruction
that has
been
executed

Algorithm Program
Artificial
Assemble
Intelligenc
r
Compiler e
Memory Parity
Range
protection Checking checking
use the
directory search
use the
search
each file backup
tools
in turn
facility
Network Program System
save
copies of
the file
with the
use
same
different keep a
name on filenames record of
the
on the
computer
system
system
failures
Multiproce Time
Multiprogr
ssing
sharing
amming
Floppy
ROM
RAM
Disk

Data

Parity
Checker

Validation B
use find
and
replace
Modem

A
B

backup to
a secure
medium
D
Multiplexin
g
D
Magnetic
Disk
B

Word
Telephon Sharewar
Firmware Processor e modem e
C

Word
Telephon Sharewar
Firmware Processor e modem e
A
Sequential Hashed
Operating
System
ALU
Tracks
and
Sectors

Blocks
and
Sectors

Indexed
CPU

Files and
Tracks

Character, Database, File,


field,
character, record,
database record
field

Random C
Primary
Storage
B
Schema
and
subschem
a
A

Element,
field, file

Valid
character
check
Sound
card.

Maintenan
ce
diagnostic Systems
program logs
MIDI
CD-ROM interface

Parity
check
Serial
interface

Text

Pictures

Sound

Video

Laser

Dot matrix Ink-jet

Drum

C
A

viewing an
encyclopa
edia CDROM.

creating
the plans
for a
building
design.

replaced
regularly

never
updated

recording
current
presenting stock in a
an order supermar
for stock ket and
to a
answering
warehous customer
e.
queries.
A
updated
updated once a
regularly year
C

Document
processor
make
efficient
use of
time
1024

Graphics
package
retain
confidenti
ality of
files
4096

Database
get into
the
system
quickly
512
loss of
confidenti
ality
TCP/IP

duplicatio virus
n of data infection
HTML
IPX/SPX

Spreadsh
eet
D
simplify
file
structures C
8192
C
loss of
data
NetBEUI

D
A

printer
can do
1000s of
pages a
day

the
operating
system is
easy to
use
B
the hard
drive

up-line
universal provider
port serial service

the root
directory
uninterrup
table
power
supply

uniform
page
source

the
program
executabl
orphan
e may not
files can allow it to
be left on be
the
uninstalle
system
d

the
system
requires a
network
administra
tor to
uninstall it

access to
the
internet is files can
quicker
be shared
a
a file
subdirecto
name
ry

data.
Graphical
represent
ation of
logic
Purchase,
sales,
receipt,
payments
etc.

document informatio
s.
n.
text.

Rules
writte in
procedura
l language

Logical
Steps in
any
None of
language the above A

To fill the
log
register

It is
mandatory None of
in tally
the bove

assist in
maintenan speed up
ce
access
IT
senior
managem
executive ent lacks
support
leadership
for IT.
.
input.

the
system
always
requires a
re-boot
and
defrag
afterwards A

output.

prevent
unauthoris allow
ed access encryption C
IT
understan
ds the
business
processin
g.

None of
the above B
All of the
above
D

The use
of
computers
to design
state-ofthe-art,
highquality
products.
specialist
or
functional

Software
that
generates
Using
innovated
computers designs
to do
and
architectur artistic
None of
e.
patterns. the above A
Applicatio
n Service
Provider enterprise local
B
ensure
the
identify
name the filename identify
the file
file
is not lost the file
type
D
All of the
above are
preventive detective corrective parts of IS
controls. controls. controls. controls.
external
static
dynamic extensible
hashing
hashing
hashing
hashing
A: (a) ,
B: (a) to
C: (a), (b), D: (b), (c),
(b), (d)
(d)
(c)
(d)
corrective preventive detective general
controls
controls
controls
controls
Compone
nt
Interface Settings
(a), (c),
(b), (c),
(d)
(d)
(a) to (d)

Turn the
computer
Press the off at the
reset
power
button.
point.

Create the
files
again.
(a), (c),
(d)
detective
controls
(a), (c),
(d)

Ask the
person
next to
you.
(a), (b),
(c)
organisati
onal
controls
(a), (b),
(c)

Select the
Shut
Down
option
from a
menu.
Use the
Find or
Search
feature.
(a) to (d)

Control
(a), (b),
(c)

D
A
C
C

B
C

Pull the
power
cord from
the back
of the
computer. C
Put your
hand up
and ask
the
teacher
C
(b), (c),
(d)
C

preventive corrective
controls
controls
C
(b), (c),
(a) to (d) (d)
C

program
change
call lights requests
data
thread
testing
testing
(a), (b),
(a), (b),
(d)
(c)
specificati
benchmar ons
parallel
k testing matching operations

resolution
procedure
s
C
loop
testing
A

Peripheral
Multiplexe processor Concentra
r.
s.
tor.
(b), (c),
(a), (b),
(a) to (d) (d)
(c)
Replacem
ent
personal Identificati
computers on of
Physical
for user
critical
security of
departme applicatio warehous
nts.
ns.
e facilities.
architectur interface procedura
al design design
l design
ClientComputer
server
Client
network
Star
Bus
Mesh

Job
control
language. D
(a), (c),
(d)
A

problem
logging
unit
testing
(b), (c),
(d)

(a) to (d) D
system
walkthrou
ghs
B

Crosstraining of
operating
personnel. B
data
design
A

Star

Bus

Ring

Hub
Ring
All of the
above

To
maintain a
backup
copy of
are written
all the
informatio
n

To do a
particular
job such
as editing,
storing
informatio
n

To help
someone
who is
applying
for
employme
nt

To Store
data in an
organised
manner
B

Direct
Systems
analysis
and
applicatio
ns
programm
ing.
A
sequential
file on a
disk

Sequential Binary
Data
communic
ations
hardware
and
software.
A
sequential
file on a
tape

Indexed

C
A
D

Operating
systems Computer
and
operations
compilers. .
C
A direct
A direct
access file access file
on a disk on a tape C

Tapes can
only be
Informatio
read by
n formats
the
commonly
machine
vary
on which Parity
between
they are errors will architectur
written
result
es
Address
Data path Control
calculation
part
Unit
part
Local
Distribute Area
Wide area
d systems network
network

Can send
data to a
computer
and
receive
data from
a
computer

Mixer
Allows
computer
signals to
be send
over a
telephone
line
Planetary
network
Office
Automatio
n

Data
record
can never
be
blocked
together C
Input
output
channel
A

Protocol

Use the
computer
to which
they are
connected
to perform
all
processin
g
operations

Generally
require a
keyboard
for data
entry and
a CRT for
display

Modem

Multiplexo
r

Are
required
with a
microproc
essor
which
permits
some data
processin
g such as
input
validation D
Time
sharing
computer C

Aids in
back-up
procedure
s
Ring
Network

Packs
data in a
disk file
Loop
Network

Speeds
up online
printing
Star
Network

Executor
systems
An
A dumb
intelligent
workstatio workstatio
n
n
Time of
day
control
Encryption
locks
algorithms

A
D

Electronic Instant
mailing
post-office C
A
A
personal mainfram
computer e PC
B

Parity
checks

All of
them

Type of
cable

Terminal
Standard
A
compiler
converts
the whole
A
of a
compiler higher
does a
level
conversio program
n line by code into
line as the machine
program code in
is run
one step
Feasibility
study,
system
design,
and
testing
CRC

Implement
ation and
document
ation
Baudot

An
interpreter
does the
conversio
n line by
line as the
program
is run

An
interpreter
is a
represent
ation of
the
system
being
designed

Modem

Demodula
tor

Device
Communi interconne
cation
ct
protocol
standard D

A
compiler
is a
general
purpose
language
providing
very
efficient
None of
execution the above B
Lexical
analysis,
CONVER
SION, and
code
generation
ASCII
An
interpreter
is a
general
purpose
language
providing
very
efficient
execution
Frequency
division
multiplexo
r

None of
the above D
EBCDIC A

None of
the above A
Time
Division
Multiplexo
r
C

MiddleHigh-level level
Low-level None of
languages languages languages the above C
It is faster
than
It is less
parallel
It is less prone to
communic error
attenuatio Uses only
ation
prone
n
one path D
Accountin
Financial Graphic
g
sector and design
systems,
engineerin and
commerci None of
g
education al sector the above C

Manage
Communi the paging
cate with function in
the
a virtual
console
environme
operator nt
Specificati
on and
System
design
Analysis
Fiber
Coaxial
Optics
Cable

Relieve
the main
CPU of
repetitive
communic
ation
tasks

Testing
Common
carrier
System
The
System
Analysis
design of Analysis involves
the screen defines
creating a
the user the format formal
will see
and type model of
and use to of data
the
enter or
the
problem
display
program to be
data
will use
solved
An
A cache interface A buffer

The
different
types of
network to
be used
Star

Testing to
check for
errors
before the
system is
introduced
Packet

Reduce
competitio
n between
the
input/outp
ut devices C
None of
the above B
Telephon
e Lines
C

None of
the above C
An online
protocol
B

Hardware,
Software
and size
of
None of
program. the above
Ring
Bus
None of
10101010 1100101 1010101 the above
Cyclic
Retransmi Redundan Hash
Parity
ssion
cy
Count
None of
15
4
64
the above
Multiplexo Acoustic
Port
Modem
r
coupler
None of
327
141
97
the above
Data
Data
Data
managem
warehous Mining
ent
All of
e
tools
systems them
secondary
memory secondary storage
memory access
storage
access
capacity time
capacity time

B
B
C

A
A
C
B

5C4
16 bits

None of
the above
alphanum
eric form
None of
the above
32 bits

Bit Code
Design

None of
the above D

210 bits

210 bytes
None of
the above
alphanum
eric form
None of
the above

30
binary
form

255
256
ASCII
decimal
code form form

4C5
4 bits
Basic
Coding
Descriptio
n

1B7
8 bits

1024 bits
10000
binary
form

Binary
Coded
Decimal
1000
bytes

1112
1110
ASCII
decimal
code form form
Numeric
Keyboard Keypad

Mouse
used to
indicate
used to
uppercase detect
letters
errors
Because it
squeaks
when
moved
bits per
second
Touch
screen
BPS
Printing
letters

OCR
Touch
screen
increased
the
storage
capacity
of a
computer
system

B
A
A
B

A
A
A
A

is the first is the last


bit in a
bit in a
byte
byte
B

Its moves
like a
None of
mouse
It has ears the above D
baud

bytes

Hertz
None of
Light pen Joystick
the above
MIPS
MHz
VLSI
Tracing
Reading None of
diagrams bar codes the above
voice
barcode recognitio
MICR
scanning n
CD-ROM None of
Hard disk drive
the above

provides
backup
increases power in
the
the event
process
of a power
speed
cut
Light
Refillable Pencil
sensitive
ink
lead
elements
100K
1.44 Mb 5 Mb

none of
the
previous

D
C
B
B

B
A

None of
the above C
1 Gb
B

hardware software

input

Mouse
Touch
screen

Printer

Printing
letters
Touch
screen

Mouse
Credit
card

output
Numeric
Keyboard Keypad
Light pen Joystick
Reading
Tracing
Bar
Diagrams Codes

Scanner C
Digital
Signature
s
B
CD ROM
Hard disk Keyboard Drive
A
Optical
Bar code mark
reader
reader
Keyboard B
Mouse

Writing on
a hard
Printed
board
output
Coloured
spots
Pixels
Storage
Printer
device

Speakers
Storing
informatio
n on the
hard disk

Printer

Pickers

Mouse

Bar code
reader

Pixies
Pointing
device
Optical
mark
reader

CRT
displays

LCD
displays

SSGA
displays

screen
layout

mouse
button
layout

Mouse

Bar code
reader

keyboard
layout
Optical
mark
reader

language software
hardware interpreter interface
Credit
Smart
card
Speakers card

Back-up
on a
Cartridge B
B

CD-ROM A
None of
the above
none of
the
previous B
word
processin
g software C
None of
the above B
an
operating
system
C
None of
the above A

having
several
programs
writing
in RAM at
programs none of
the same multitaski in multiple the
time
ng
languages previous

having
several
programs
in RAM at
the same
time

The ability
to run 2 or
more
programs
concurren
tly

writing
programs none of
in multiple the
languages previous

To run
more than
one
an
program
multitaski operating at the
none of
ng
system
same time the above C
First generation
computers
.

Fifth generation
computers
.
A
none of
multitaski multiprogr
the
ng
amming Multi-user previous A
Vishwajee
t
Deep Blue Param
Arjun
C
is due to none of
is caused caused by bad disk the
by wear
overuse
blocks
previous C
Magnetic
Ink
Optical
Character
Bar code Mark
Recognitio Image
Reader
Reader
n
Scanning
Technolog Technolog Technolog Technolog
y
y
y
y
B

a fast
interpreter
Drum
Printer
encrypting
it
Very
important
reader
user
sequence

Second generation
computers
.

Third generation
computers
.

converts a
program
slower
to
none of
than an
machine the
interpreter code
previous
Dot Matrix
Desk - jet Thermal
Printer
Printer
Printer
decrypting compressi transmittin
it
ng it
g it
Vital
informatio Virtual
n
informatio
resource n reader &
under
user
None of
siege
system
above

A
C

Electricall
y charged
ink
mainfram
e
technolog
y
10-6 sec

Thermal
Paper

An ink
pen

LAN
technolog
y
10-3 sec

WAN
technolog
y
10-12 sec

An inked
ribbon and
print head D

Unix
operating
system
10-9 sec
Cross
Limit
Control
External footing
checks
figures
file labels tests
applicatio
operating communic
n
system
system
ation
pilot
project
model
project
process
multiproce multithrea multiplexi multitaski
ssing
ding
ng
ng
mainfram super
es
computers
arithmetic
control
and logic
unit
unit

micro
computers
central
processin
g unit
non
band
drum
impact
printer
printer
printer
data
word
electronic
managem processin spreadshe
ent
g
et
communic
integrated ation
idea
software software processor
my
recycle
Microsoft
computer bin
exchange

D
D
D

none of
the above B
none of
the above C
none of
the above B

hp vectra
PC-at
system
multiproce multithrea
ssing
ding
"dumb
dumb
terminals" servers

dummy
terminals

file
machine
language
processed
symbol

none of
the above A

none of
the above
none of
the above
none of
record
the above
high level none of
language the above
connector input/outp
symbol
ut symbol
fazitsu
vp200
series
IBM-PC
multiplexi none of
ng
the above

field
assembly
language
terminator
symbol

B
D

dummy
servers

B
B
C
B
B

B
D

wan
host
host

distributed
computing
system
server
server

PC
server
processin
g
four
file
managem
ent
system
multiproce
ssing

LAN
host
processin
g
one
hierarchic
al
database
system
multithrea
ding

windows
NT
back end
back end

LAN
front end
front end

distributed
computing
dumb
processin
g
two

centralize
d
A
data
processin
g
B
many
A

network
database
system
multiplexi
ng
disk
defragme
ntation

relational
database
system
D
none of
the above B

redo
disk
logging
mirroring
Modulatio
Code/De- n/Demodu Module/D None of
code
lation
e-module the above
constraint
fixes
locks
s
traps
multiproce multithrea multiplexi none of
ssing
ding
ng
the above
Linear
Local
area
Local area array of
None of
networks networks networks. the above
clienttask
process
thread
server
Integrated Integrated Integrated
system
Symbolic Services
dynamic Digital
Digital
None of
networks. networks. network. the above.
repairing

D
D
C

B
B
B

B
C

Ethernet
visual
basic

Internet
power
builder

ARPANE
T
SQL *
plus

None of
the above. B
all of the
above
D

MAN

WAN

GAN

None of
the above. B

Transfer
control
protocol/In
ternet
protocol

Transfer
communic
ation
protocol/In
ternet
protocol

Cells

Bits
Software
System
Mail
modulatio transmissi
n transfer on
protocol
protocol
Transmiss
Transfer ion
Protocol protocol

Transmiss
ion control
protocol/In
ternet
None of
protocol
the above. C

Packets

None of
the above. C

Simple
Mail
transfer
protocol

None of
the above. C

None of
Hyper text the above. C

Asynchron
Aggregate ous
Area
transfer
transfer
transfer
mode
mode
mode

None of
the above. B

Printer
File server server
Receiver
configurati
platform on
package

None of
the above. B

MAN and
WAN
ISDN
Internal
Services
Digital
Network

LAN and
MAN
Internet
Integrated
Services
Digital
Network

LAN WAN
and MAN B
Intranet
A

Routers
batch

Protocol
command
numerous
alpha beta alpha

Repeaters B
program D
number
and alpha A

cost,
performan size,
ce their
performan
ratio
ce, cost

input,
output,
performan
ce ratios C

Web
based
Training
Bridges
procedure
alpha
numeric
space
occupied,
price, no.
of users
allowed

LAN and
WAN
ATM
Internal
Services
Design
Network
Web
based
Technolog
y

system

None of
the above. C
Web
Web
based
based
Transactio
Transport n
A

mini
microproc
computers essors
PCs

mainfram
es
D

input
output
feed
write
A
multiproce multithrea multiplexi multitaski
ssing
ding
ng
ng
D
interpreter compiler converter process
input
processor ram
output
nonimpact
impact
drum
desktop
thermal
printers
printers
printers
printers

operating
system,
bootstrap,
kernel,
shell

control
program,
interpreter
,
assembler
, compiler

monitor,
program,
keyboard,
bus

CPU,
memory,
input,
output

D
D

operating applicatio windows


system
n software 95
batch

protocols

processor compiler
compiler

interpreter B
procedure
software's s
C
assembler coder

interpreter assembler processor C

q_id

PP1

q_desc

op1

clipart &
auto
shapes

PP4

In Powerpoint2000 ,the built-in professional design elements are


Selection handles are the 8 small ___________ that appear around the object, when
an object is selected
circles
The _______ is an invisible matrix of vertical and horizontal lines that covers the entire
slide workspace
square
_______ are drop-down menus that appear when the right mouse button is clicked on
the screen element
tool bars

PP5

clip
________ and ______ have the ability to add a lot of visual impact into the PowerPoint gallery &
presentation
word art

PP6

_______ is a motion picture or any animation file

PP7

The user can use ______ to remove the undesirable part of the image

PP8

The power presentation has a _____ for a set of compatible colors

clipping
tool
color
palette

PP9
PP10
PP11

The set three colors used for graphs and for secondary slide items is called as
There are ______ types of charts available in PowerPoint
_______ charts are useful while showing variations over a period of time

ascent
10
column

PP12

images

PP13

_______ are the individual pages of a presentation


A PIE Chart is a ____ diagram that depicts the relationship between a whole and its
parts

PP14

Each individual piece of data in a series is called a/an

entity

PowerPoint launches an OLE-compatible application called

Microsoft
organizat
ion chart

PP16

When the user double-clicks on an organization chart object in PowerPoint

the
organizati
on chart is
expanded

PP17

The _____ are used for selecting, editing and viewing objects in the chart

box tools

PP2
PP3

PP15

wave file

circular

PP18

Manager box tool in organizational chart window is

used to
mange
organizati
onal chart

PP19

The custom drawing tools are _______ by default

turned on

PP20
PP21

Click on the box tool ______ to draw three boxes


There are ____ default fields available in all boxes of the organizational chart

once
two

PP22

The _____ tool is used in the same way as we use a pen to draw a table

PP23

A/An _______ consists of smaller printed version of the slides

native tool
autolayout
s

PP24
PP25

The size of the object can be changed using the ______ tool
_______ is the process through which the slides in the current presentation are
included in another presentation or application

PP26

________ can be used to create charts as well as worksheets

PP27
PP28

PowerPoint can import text files that have been saved in ______ format
PowerPoint outlines can have _____ outline levels

zoom
importing
Microsoft
excel

PP31

.ppt(Powe
rPoint)
nine
.rtf(rich
When a file is saved with _____ extension, the graphics and text are also saved along text
with the slide
format)
not
displayed
during
the slide
The hidden slide is
show
DTS(digit
al track
____ effect is used to introduce a slide during a slide show
sound)

PP32

A _____ is a special effect that determines how the objects appear on the slide

PP33

The notes page is formatted based on the

PP34

Pick the odd man out of the following

PP35

When a new presentation is opened ,powerpoint creates slides that have a width of
_____ and a height of ______ with the landscape orientation

outline
view
15
inches,10
inches

PP36

The default orientation for notes ,handouts and outlines is ____ orientation

portrait

PP29

PP30

build
notes
master

PP37

Build effect is also called as ______

animatio
n

PP38

Graphics for web pages are automatically stored in ____ format

gif

PP39

A _______ is used to jump to any slide in the presentation

hyperlink

PP40
PP41

The ______ language has been incorporated into PowerPoint


In PowerPoint _____ is a series of commands that are executed in sequence

visual c++
macro

PP42

while
creating a
.exe file
virus
checkers

PP44

The macro will be activated


Developers can easily add ____ to PowerPoint 2000 by using the programming
interface
______ determines the order in which order in which the slides will be displayed during
the show
slide show

PP45

_______ is used to organize and develop the contents of a presentation

slide pane

PP46

If we save the presentation file as a metafile, it can be opened using

internet
explorer

With reference to autocontent wizard for creating a new presentation, which of the
following statements are not true

PowerPoi
nt creates
a sample
presentati
on to
which
user can
add words
and
pictures

Which of the following statement is not TRUE

user can
insert
objects
like cliparts,
pictures
stored in a
separate
files to the
slides

PP43

PP47

PP48

PP49

With reference to changing the order of slides, which of the following statement is not
true

PP50

Which of the following definitions are not true

in outline
view, drag
the slide
icon to a
new
location
the slide
that holds
the
formatted
placehold
ers for the
titles,
main text
and any
backgroun
d items
that user
wants to
appear on
the slides
is called a
master
templates

Which of the following statements are not true

with notes
pages
view user
can
prepare
speaker
notes and
handouts

PP51

PP52

Which of the following definitions are not true

PP53

The options available in the common task toolbar does not include

the slide
that holds
the
formatted
placehold
ers for the
titles,
main text
and any
backgroun
d items
that user
wants to
appear on
the slides
is called a
master
template
slide
layout

PP56
PP57

data to be
graphed
resides in
a
datasheet
With reference to chart, which of the following statements are not true
window
the
The format of the text entered in a title, subtitle, or bulleted-list object is determined by master
the format settings in a special slide called -------slide
PowerPoint provides a _________ that searches the entire presentation i.e., all the
office
text objects in all the slides, outlines, notes and handouts for spelling errors
assistant
PowerPoint's drawing toolbar contains _______ drawing tools
10

PP58

Click _______ on the rectangle drawing tools enables us to draw multiple rectangles

once

An example of the components of a multimedia presentation could include

text,
graphics
and email
address.

PP54

PP55

PP59

PP60

Which of the following formatting elements can be applied to a PowerPoint diagram


using the AutoFormat tool?

the Line
style

PP61

Which of the following formatting elements can be applied to a PowerPoint diagram


using the Format AutoShape command?

Fill color

What happens when you double click a blank graph placeholder in a PowerPoint
presentation?

Excel is
started so
that you
can create
a chart.

PP62

PP63

PP64

always
taken
from the
first row of
data in the
The legend in a Microsoft Graph chart is:
datasheet.
Side-bySuppose you are creating a Microsoft Graph of quarterly sales by region. Which would side
be the best chart type if you want to emphasize the total sales of each region?
column

Which of the following actions will enable you to insert a graph into a PowerPoint
presentation?

Pull down
the Insert
menu and
select
Chart.

PP66

If you are editing a slide containing a Microsoft Graph, how do you display the
underlying datasheet?

It
automatic
ally
displays in
Slide
view.

PP67

How do you deselect a chart that has been placed onto a PowerPoint slide after you
have finished creating the chart?

Single
click the
chart.

PP65

What happens when you click the Datasheet button on the Microsoft Graph toolbar?

A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
linked to
the
PowerPoi
nt
presentati
on.

What happens if you single click a chart that is not currently active?

The chart
is
selected.

What happens if you double click a chart that is not currently active?

The chart
is
selected.

PP71

Using custom animation effects, you can build:

a slide
one bullet
item at a
time.

PP72

Which of the following animation effects can be added to a slide?

Subtle

PP68

PP69

PP70

PP73
PP74

PP75

PP76

Which of the following animations effects can be added to a slide?


Which keyboard key is used to select more than one picture on a slide?

Enter and
exit
Enter

Custom animation can be used to affect ONLY:

the way
objects
appear on
a slide.

Which of the following best describes the information that appears on the advanced
timeline?

The
advanced
timeline
shows the
sequence
in which
objects
will
appear on
the slide.

PP77

Which of the following objects can contain custom animation effects?

Clips

PP78

What type of program allows an object within an image to be edited without affecting
other objects?

Paint
program

PP79

Which of the following animation effects can be added to a slide?

Fly in

PP80
PP81

Which of the following is TRUE regarding the Datasheet?


Graphical software tools that provide complex analysis of stored data are:

PP82
PP83

Which of the following statements is TRUE regarding PowerPoint diagrams?


Which keyboard key combination is used to undo the previous command(s)?

Once data
is entered
it cannot
be
changed.
OLTP.
You can
change
the
appearan
ce of a
whole
diagram,
but not
individual
shapes of
a
diagram.
[Enter+A]

op2

op3

op4

ans

autolayo
uts and
presentat slide view
ion
& outline none of
the above B
templates view
points

squares

image
grid
short cut auto
shapes
menus

icons

guide
all the
above

slide show
& view
fonts &
show
images
media
.video file
clip
cropping
tool
color box
tricolor
scheme
28
bar
images
and text
radar
data
point

none the
above
all the
above
scribble
cutting
drawing
tool
tool
color
color
scheme guide
primary
color
color
palette
scheme
36
18
pie
linear
slide
sorter
views
slides
all the
doughnut above
data

auto
shapes
the chart
window
the chart opens
displayin
is made
available g a chart
for editing template
custom
general
purpose drawing
tools
tools
clip art

A
B

A
C

A
C
A

C
A

stream

track
changes

none of
the above C
standard
drawing
tools
C

used to
create a
manager
box for
accessed an
existing
only by
manager box
not
available
in the tool
turned off bar

used to
store the
other tools
of the
organizati
onal chart C

available
in the tool
bar
any of the
twice
above
thrice
five
eight
four
standard all the
above
draw tool tool
handlayo
none of
slide
view
these
uts
reduce/e
none of
preview
the above
nlarge

C
B
B
B
B

exporting
auto
shapes
.rtf(rich
text
format)
only one
.wmf(win
dows
metafile)

copying

displayed
only
during the
slide show
3D(3
dimension
)

displayed
only in
outline
none of
view
the above A

transition
slide
master

moving
drawing
clip art
tools
.html(hype
.doc(docu rtext
ment)
format)
twelve
six

.txt(plain
text)

B
A

B
C

.doc(docu
ment)
B

both a and
b
transition D

slide show view show


master
master
slide
notes
slide
view
sorter
slide view show
view
10
7.5
inches,7. inches,5 none the
above
5 inches inches
none of
landscape a or b
the above

A
A

B
A

view show transition

jpeg

png
action
hypertext button
visual
basic for Microsoft
applicatio visual
interdev
n
batch file templates
when the
slide
during
show is
slide
transition run
spell
header
checkers files
custom
both a and
b
show
notes
properties
pane
pane

b or c

none of
the above D
all the
D
above

all the
above
add-ins

none of
the above
all the
above
none of
the above
outline
pane
power
paint shop paint shop point
pro
pro
2000

B
A

C
A
B
D

it is the
quickest
way to
create a
presentati
on

contains
sample
presentati
ons for a
variety of
topics

provides
suggeste
d content
and
D
design

user can
insert
only predrawn,
precolored
graphic
images
reflected
in a clip
arts to
the slides

user can
insert
picture to
the
master
slide
which gets
reflected
in all the
slides
using that
master
slide

user can
insert
picture to
the title
slide
which gets
reflected
in all the
slides
using that
title slide B

in notes
pages
in slide
view,
sorter
view, drag drag the
the slide slide icon
to a new to a new
location
location

I slide
view, drag
the slide
icon to a
new
location
C

design
templates
is the
template
transition whose
means
format
applying and color
special
scheme
effects to user
the
applies to
crossover a
between presentati
the slides on

the slide
that
holds the
formatted
placehold
ers for
the title
and subtitle for
the
presentat
ion is
called a
title
template D

in outline
view, user
can see
the
miniatures
of all
slides in a
presentati
on,
complete
with text
and
graphics

the slides
can be
reordered
in the
outline
view
B

user
should
select the
slide view
to add the
text to the
slide

design
template
is the
template
transition whose
means
format
applying and color
special
scheme
effects to user
the
applies to
crossover a
between presentati
the slides on
customiz
new slide
e

the slide
that holds
the
formatted
placehold
ers for the
title and
subtitle for
the
presentati
on is
called a
title
template D
set up
show
B

by
default,
doughnut
chart is
displayed
based on
the data
in the
datasheet

user can
add data
labels and
gridlines
to the
chart
B

the slide
master
spell
checker
12

data is
plotted in
a chart
window
the
header
slide
grammar
checker
102

twice

three

the format
slide
B
none of
the above B
22
B
four times B

text,
text,
CD-ROM, hypertext
, Power
hypertext digital
Point,
and
camera
video and
Power
and
Point.
sound.
D
sound.

the Line
color

Line
style,
Line
color,
the Font text font,
and text
and the
alignmen
text
alignment t
D

Fill color,
Line
color,
and Line
Line
Line color thickness thickness D
A popup
Microsoft
box
prompts Graph is
you for an started
so that
existing
The graph
you can placehold
Excel
create a er is
chart to
insert.
deleted.
C
graph.

taken
from the
first
column or
row of
data in the
datasheet,
always
depending
taken
on
from the whether
first
the data
column of series are
data in the in rows or entered by
datasheet. columns. the user. C
Stacked
column

Pie chart

Line chart B

Click the
Insert
Chart
button on
the
Standard
toolbar.
Click the
chart
object,
then click
the View
Datashee
t button
on the
Standard
toolbar.
Double
click the
chart.

Pull down
the Insert
menu and
select the
appropriat
e Object.

Pull
down the
Insert
menu
and
select
Chart,
click the
Insert
Chart
button on
the
Standard
toolbar,
or pull
down the
Insert
menu
and
select the
appropria
te Object. D

You
cannot
display
Pull down the
the Edit
underlying
menu,
datasheet
then
once the
select
slide is
Object.
finished. B
Change to
Click
Slide
outside
Sorter
C
the chart. view.

A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
embedde
d in the
PowerPoi
nt
presentati
on.

The
datasheet
window
is
toggled
from
The
datasheet closed to
is saved open (or
from
as a
separate open to
file.
closed). D

The chart
The chart is doubled
is deleted. in size.
The chart
The chart is doubled
is deleted. in size.

The
applicatio
n that
created
the chart
is started. A
Microsoft
Graph
will
D
restart.

a slide
one
bullet
item at a
time,
build
bullet
items a
letter at a
time, and
build
bullet
bullet
bullet
items one items one items a
letter at a word at a word at a
time.
time.
D
time.
Subtle,
Moderate
, or
Moderate Exciting
Exciting D

Both
enter and
exit, and
Fly in from fly in
from top
top or
bottom
or bottom
Alt
Shift

Neither
enter nor
exit;
neither fly
in from
top nor
bottom
C
Ctrl
B
Custom

what
objects do
after they
appear on
a slide.

animatio
n can be
used to
affect the
way
objects
appear
on a
slide, to
what
objects
do after
they
appear
on a
slide, and
to the
way
objects
exit a
D
slide.

the way
objects
exit a
slide.

The
advanced
timeline
shows
the
sequence
in which
objects
will
appear
The
advanced on the
slide and
timeline
shows the the
duration duration
of the
of the
effect
effect
applied to applied
to each
each
object.
object.

The
advanced
timeline
shows
neither the
sequence
in which
objects
will
appear on
the slide,
nor the
duration
of the
effect
applied to
each
object.
C

Organizati
on charts Text
Draw
program

Filtering
program

Dissolve
in
Data
Once
cannot be
data is
entered
entered it into
can be
Datasheet
changed. .
OLST.
OLAP.
You can
change
both the You
appearan cannot
ce of a
change
whole
the style
diagram of the
and the
connectin
individual g lines in
shapes of an
a
Organizati
diagram. on chart.
[Shift+Z] [Alt+Z]
From top

Clips,
organizat
ion
charts,
and text D
Animation
program A
Fly in,
From top,
and
Dissolve
D
in
There is
no such
thing as a
Datasheet
.
B
OLIP.
B

You
cannot
change
the color
of the
boxes in
an
Organizati
on chart. B
[Ctrl+Z] D

q_id

q_desc

IN90

The two major browsers used to surf the Internet are ________,_______

IN91

IN93
IN94
IN95

Special characters allow browsers to display _________________


The keyword for providing links within or across documents
is____________
Stringing pages together using hypertext technology helps view pages
_______________
The initial web pages present in a web site is the ________ page.
The image format supported by most browsers is________________.

IN96

The components of a URL are ___________

IN92

op1
MS Internet
Explorer and
Mosaic
text
hyperlink
in random order
first
.bmp and .gif
Service, hostname
and directory path

mail servers,mail
clients and
alternate services

IN98

The mail we send has a mailing address and most of them correspond
to_____,_____ and
Which of the following is not supported by internet explorer
_______________

IN99
IN100
IN101

CGI stands for ____________


Host name indicates the domain name of the web ________
The internet is also called as _______________

<center>
communication
generated
information
Server
arpanet

IN102
IN103
IN1

The internet is similar to _________________


The net drivers______ from one place to another
The World Wide Web was devised by _________

LAN
data
CERN

IN2

The useful URL schemes are_____ and______

yahoo and infoseek

IN3

The other ways of getting connected to the net are_____

news groups,yahoo
and infoseek

IN4
IN5
IN6
IN7

BBS stands for______


USENET is a BBS on ____ scale
WINSOCKS is expanded as______
IETF Level 2 HTML DTD supports graphical browsers like _______

bulletin board
system
small
windows socks
Mosaic

IN8
IN9
IN10

The space used by Netscape to store the retrieved page is called______


The URL for encyclopedia Britannica is_________
_______ maps IP addresses with the domain names of the sites

buffer
www.ency.in
URL

IN11
IN12

Internet can be defined as _______


The most important service of the ______ is to manage traffic control

internal network
application layer

IN97

IN15

_________is a program that displays information about a host connected to


the net
finger service
_______ is a program or a tool that helps in locating a file anywhere on the
net
FTP
uniform research
URL stands for ____________
locator

IN16
IN17
IN18
IN19

IN an URL the word before the color refers to _______


A ______ always begins with a slash
Prodigy is run by IBM and ______
The World Wide Web is referred to shortly as the _______

host computer
message
Delphi
net

IN20

Gopher and WAIS enables the user to ______

IN21

______ is the program used to run CompuServe's regular services

browser
CompuServe
internet dialer

IN22

Navigating through the menu of gopher is called moving around _______

gophering

IN23

Alta vista

IN24
IN25

The directories that come with built-in engines are yahoo,lycos and ______
To use the finger command,SLIP users must run a programme
called______
The web maps are called _______

IN26
IN27
IN28

Directories consists of _______ levels


The _____ level gives the broadcast overview of the net
The huge list of keywords from important items is called ______

IN29
IN30

The two types of search in veronica are _____ and ______


_______ searches by keywords

no
middle
hotlist
directory
search,index
search
infoseek

IN31
IN32
IN33
IN34

Mosaic displays links in color whereas _____ does not display links in color
______ supports one button publish
SPY MOSAIC is distributed by_______
______ is a program that helps us to log on to other networks

IN35
IN36
IN37

HTTP is the acronym for __________


______is used to transfer and copy files over the internet
_____ is a program that helps us to log on to other networks

IN13
IN14

IN38
IN39
IN40
IN41
IN42
IN43

finger server
list

netshark
lynx
Microsoft
Usenet
Higher text transfer
protocol
iccp
yahoo

transfer control
TCP/IP stands for ________________
protocol/internet
Archie servers can be accessed in_______ different ways in internet
one
_______is the computer on the internet that translates between the internet
domain names and the internet numeric address
ftp servers
the internet
TIA stands for_____ in internet
adapter
Service indicates the name of the ________ used to access data, present
on the other end of the link.
browser
hotlink text transfer
HTTP stands for______
protocol

universal resource
locator
frequent asked
query

IN44

________ is used to link pages in the world wide web

IN45

FAQ stands for ______


The internet adapter is a programme that makes our connection act like a
_____or a ____ account
SLIP,PPP
The step involved in Communicating between the web clients and servers is
______________
connection
wide search for
information and
WSIRC stands for______
research
Two of the important browsers are_____ and_____
lynx,minx
world wide web
Lynx is a _______ programme that works with terminals
server
The huge list of keywords from important items is called an_____
glossary
very easy and
rodent oriented
net wide index to
computerized
VERONICA is an acronym for _______________
archives
university of
berkeley,berkeley
The first freenet is created at the_____ and is called______
freenet
________ are defined as ways of communication amongst networks
protocols
search
engines,directorie
______and_____ are web searching features
s
WINWAIS has two source lists namely____ and______
allsrc,winsocks
________ is also called as WAIS manager
allsrc

IN46
IN47

IN48
IN49
IN50
IN51

IN52

IN53
IN54

IN55
IN56
IN57

IN58
IN59
IN60
IN61
IN62

HTML stands for_____


The system of interlinked documents is known as_______
The small programmes that create animation,multimedia,real-time games
and multi user games are called______
The information displayed on the web page includes______,_____
and_____

higher text medium


language
hot links
images
graphics,videos,a
udio

IN63
IN64

The web pages that represent online home of their author are called______ first page
global network
GNN stands for______
news
_____ is the most popular internet service
yahoo service

IN65

The online service offered by navigator gold 2.0 are _______ and_____

email and net


conference

IN66

_______ is a program or a tool that helps us find a file anywhere on the net

newsgroup

IN67
IN68

The databases to enable keyword search using Lycos are a2z,_______


______ is a large worldwide bulletin board service network

Lycos catalog
apple link

IN69

computer related
abbreviations and
acronym
encyclopedia
Britannica
search engines
Graphical
interpreter
formatting

IN70
IN71

BABEL consists a glossary of _____


Dictionaries,encyclopaedias,government and other references are found in
______
Yahoo,lycos,excite and webcrawlers are _____

IN72

GIF is the acronym for ____________

IN73
IN74

JPEG is the acronym for ___________


The Web aids users to explore the ________

IN75

The three most popular mailer are_____,_____ and______

IN76

The World Wide Web consists of _________


In Microsoft Internet Explorer, the color of the text can be specified using
_________ attribute of the font tag.

information

Communication
gateway interface
Network

IN80

The interface that provides effective communication between the web


browsers and servers is _________
CGI is the _________ between web browsers and servers
CGI programs are invoked based on the information provided by the
_________

IN81

A CGI program is usually called after a request made by the _________

IN82

URL stands for ________

Browser/user
Unknown
resonance
language

IN83
IN84
IN85

A hyperlink can be on ___________


HTML was derived from _________
SGML is a _________

text only
SQL
alphalanguage

IN86
IN87
IN88

PINE stands for _____________


palm is not eatable
The application that confirms whether a document is compliant to its DTD is
_________
SGML Processor
Web is a collection of ___________
web sites

IN89

IETF stands for ________

Internet equipment
training faculty

IN104

The net provides interesting services like______,______ and______


The windows internet software available are______,_______,________
and______
________ is the ancestors of the internet

scripting,parsing
and compiling
nt,windows95,ie,wi
nzip
dnet

IN77

IN78
IN79

IN105
IN106

Joint Pictures
Expert Group
mails
yahoo,infoseek,alta
vista

BACKGROUND

Current web page

IN115

defensive
administrative rank
DARPA stands for
administration
_______________________________________________
network
The uuencode files start with a _______
start
milnet,smaller
DARPA is broken into ________ and _______
arpanet
education,researc
NSFNET is the united states provides service to _____ and_____
h
Higher text
manipulation
HTML stands for ______________________________________
language
The first international IP network connections were established in 1973 with united states and
_____ and_____
UK
A_____ is a set of computers interconnected by transmission paths to
exchange information in internet
server
A computer that provides a service usable by other computers is
called______
client
A_______ is the representation of physical connectivity of the computers in
internet
network card

IN116
IN117

DTE stands for ____________________


The basic function of the ______ is transmitting the bits over a channel

IN118
IN119

The point to point channel network is also called as _____ and_____


Accessing files using FTP servers is called_____

detailed transaction
explanation
application layer
point to point
network and
broadcast channel
network
file access

IN120
IN121
IN122
IN123

The three most commonly used networks are______,______ and______


________ is in between LAN and WAN
_____ can be owed by multiple organisation
Data is transmitted in the form of_____ signals

PAN,NAN,AAN
VAN
LAN
analog

IN124

DTD stands for __________

IN125
IN126

Modem stands for __________________


______ is the process of the digital signals being converted into a form
suitable for analog transmission

Data type definition


Moralize/demoraliz
e

IN127

________ and______ are two basic ways of getting connected to the


internet

IN128

SLIP stands for ________________

IN129

PPP stands for _____

Satellite link and


digital signals
Standard long
internet protocol
Prime prolonged
protocol

Which of the following best describes uploading information?

storing data on a
disk drive

IN107
IN108
IN109
IN110

IN111
IN112
IN113
IN114

IN130

Mapping

IN131
IN132
IN133

IN134
IN135
IN136
IN137
IN138
IN139

IN140
IN141
IN142
IN143

IN144

A characteristic of a communication channel that is the amount of


information that can be passed through it in a given amount of time,
expressed in bits per second.
The act of searching through storage to locate information without
necessarily knowing of the existence of the information being sought.
The principles, means and methods for rendering information unintelligible
and for restoring encrypted information to intelligible form.
A long string of seemingly random bits used with cryptographic algorithms to
create or verify digital signatures and encrypt an decrypt messages and
conversations.
Protected/private character string used to authenticate an identity or to
authorize access to data.
The successful act of bypassing security mechanisms of the system.
A set of rules and formats, semantic and syntactic, that permits entities to
exchange information.
An attempt to get access to a system by posing to be an authorised person.
An action or event that might prejudice security.
According to information Technology Act, 2000, To investigate
contraventions the controller of certifying authority shall exercise the like
powers to that of
Malicious software.
None the person who is known as father of Internet
This website is the biggest bookstore on the earth.

Bandwidth
Find
Photography

Key
User-id
Penetration
Acts
Spoofing
Loss
Sales - tax
authorities
Utility
Tim Berner Lee
Etrade.com
Automated Tailor
Machine

IN147

When we talk of Data Transmission modes, then ATM stands for


A sequence of bits or characters that identifies the destination and the
source of a transmission.
The means of communicating between networks
A group of computers and other devices dispersed over a relatively limited
area and connected by communication links that enable a device to interact
with any other on the network.

IN148

The term HTTP stands for

IN149

A NIC is considered as

LAN
hyper terminal
tracing program
National
Informatics Center

IN150

A hub is a device that can connect

Only Computers

IN151

Which of the following is true concerning the function of a switch?

IN152
IN153
IN154

What do routers connect?


What does a router route?
Software which prevents external access to a system is termed
If four computers are connected to a hub and then to the internet, how many
IP addresses are required for these 5 devices?
One
Which of the following in an OSI layer
Physical Layer

IN145
IN146

IN155
IN156

Acts
Router

Concentrates
connectivity
Bridges and
Repeaters.
bits
firewall

IN157
IN158

When creating a network from just two PCs, what kind of cable would be
used to connect them?

IN159

An IP address is a
To construct a simple LAN of 4 computers, you would connect them with
______connect them

IN160

What happens to data that is ruined before reaching to receiver

IN161
IN162
IN163
IN164

Bluetooth is
Which is not one of the recognized IEEE sub layers?
The most preferred number system to represent a IP address is
A MAC address is of

IN165

Protocol is
A ............... is a LAN-based computer with software that acts as a
controlling device for controlling access to at least part, if not all, of a local
area network and its available resources.

IN166

IN167

RG7U
Physical address
A cable
Data return to the
sender
Wireless
technology
Physical Layer
Binary
48 Bits
software that
facilitates
connection to the
internet

Novell PC

IN175
IN176

What is the biggest disadvantage of the Ring topology?


The .............. of the network concerns how network devices are physically
(or optically) interconnected.
The principal topologies used with LANs are:
What are the various types of bus architecture?
What are the various types of ring architecture?
In a ................., each workstation attaches to a common backplane via its
own physical cable that terminates at the hub
In a ............... , each work station is directly connected to a common
communications channel
Which one of the following is NOT a network topology?
In a .............. , the cable system forms a loop with workstations attached at
various intervals around the loop
The Media Access Control (MAC) is a sub layer of the:

IN177
IN178
IN179

What are the most common LAN technologies used in networking today?
Modem speeds are measured in
LAN speeds are measured in

Ring
Network Layer
Ethernet, token
ring, DecNET
bps
bps

IN180
IN181

WAN speeds are


Accessing the Internet from a typical home PC requires the use of

usually higher than


LAN speeds
CD-ROM drive

IN182

To use the Internet, you

must use the


World Wide Web

IN168
IN169
IN170
IN171
IN172
IN173
IN174

There isn't one


Physiology
Bus
Linear
Parallel
Ring
Ring
Star

IN183

The worldwide web server uses the following standard interface to act as
the middleware:

IN184
IN185
IN186

An NIC
Accessing the Internet from a typical home PC requires the use of
The most widely used network operating system on PC LANs is

IN187

JPEG and MPEG

a Novell Interface
Controller
CD-ROM drive
Linux
have to do with
compression of
graphics and
video

IN188

To use the Internet you

must use the


World Wide Web

IN189

A multiplexer is a form of

IN190

An ISP

Printer
provides access
to the Internet

IN191

FTP is

used to send
email

IN192

Telnet

IN193
IN194

A firewall is
A proxy server is

IN195

IN197

A search engine is
hardware
To look for information about interest areas on the internet, the user should
use a
scanner
provides access
An ISP
to the Internet

IN198

FTP is

used to send email

IN199

Telnet

used to send email

Which of the following is a true statement about the OSI model layers?

The layers cannot


communicate with
one another.

IN196

IN200

key gateway
interface

used to send
email
used to protect a
computer room
from fires and
floods
a backup server

IN201
IN202

IN203

IN204
IN205
IN206
IN207

It is one large
Which of the following is NOT true about the Internet?
network.
The traditional intent and impact of this common type of attack is to prevent
or impair the legitimate use of network resources.
Password cracking
used to protect a
computer room
from fires and
A firewall is
floods
Which of the following is NOT an example of a DoS attack that is popular
among hackers?
A ____________ attack is when a hacker sends a continuous flow of
packets to a system.
One defense option on a large network is to configure a ____________ to
disallow any external traffic.

IP flood
hack
firewall

IN208

A proxy server is
Which of the following would be performed on a network server and not
normally on individual workstations?

a backup server
Apply security
patches

IN209

What can be said about the safety of the Internet?

All sites are safe


and reliable.

IN210

To secure communication network against wire-tapping the most effective


control is

Use of identifiers

IN211

IN214

One way that a virus CANNOT spread throughout a network is:


Which of the following is NOT a means of monitoring employee use of
company technology?
____________ would be used by parents to monitor their children on their
home system.
The formal rules and parameters which are established to permit a
microcomputer to communicate with the mainframe computer as though it
was a terminal of the mainframe are called

IN215

The two most common tools used to help with extracting information are:

IN216

Which of the following would NOT be considered an example of cyber


terrorism?

IN217

Which of the following would be a form of cyber terrorism?

IN218

Which of the following is a likely target of a cyber terrorist that would cause
considerable loss of life?

IN212
IN213

by attaching to an
e-mail.
Phone
A Trojan horse

Modems
cookies and Trojan
horses.
An attack on a
system for
personal gain
Economic damage
Crashing the stock
market, as in the
1930s

IN219

IN220
IN221
IN222
IN223

IN224

An organisation is upgrading its telecommunication lines. Which is the least To carry more
important objective while upgradation
network capacity
A company posts a price list of its products on its website. The advantage to set its prices very
the customer is that the company can
high
Which of the following is an easy-to-use service to get information on
someone?
People Search
Name of your
Which of the following pieces of information would NOT be found online?
bank
Which of the following is the most common danger on the Internet?
Virus

IN227

The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in
order to obtain sensitive information is called _________________.
Using the Internet to pursue, harass, or contact another in an unsolicited
fashion is called:
Setting your privacy settings in Internet Explorer to medium is one way to
block:

IN228

What is the best means of protection from cyber stalking?

IN225
IN226

buy stocks.
Shill bidding
Internet stalking.
pop-ups.
Use a fake e-mail
address.

IN231

Which of the following is not an appropriate control over


telecommunications software
Encryption techniques can be implemented in Hardware-Software
Which protocol would be used to download a free anti-virus program from
the Internet?

IN232

The major advantage of the checksum program is when it

Adds more bytes to


programs

IN233

Which of the following is a Web browser?

HTML

IN234

A Web page is another name for ----------Domain names must contain a description of the type of organisation that
the domain represents. A very common abbreviation used include:

Web query.
.com is used for
company

A standard language for creating and formatting Web documents is:


The Web page format in which all elements of a Web page are saved as
one file is called:

round trip HTML.

IN229
IN230

IN235
IN236
IN237

Encryption
I only
irc

XML.

IN238

IN239

IN240

IN241
IN242

IN243
IN244
IN245
IN246

IN247
IN248
IN249

using Internet
Explorer to view a
Web page that is
stored on the hard
drive on your
Which of the following requires an Internet connection?
computer
Click on the Back
arrow until the
Mr Rao wants to find a website that he briefly browsed over yesterday. After desired site is
turning on his computer how would he do this?
found
the Refresh
Which of the following is used to update a Web query?
command
You download from the internet, a screensaver, a ten-second sound file and
a ten-second music video clip. You also add a hyperlink. Which of the media
elements has the greatest effect on the file size?
Hyperlink
When saving a photograph for use on a website, which format should you
choose?
BMP

While researching the Direct taxes assignment, you find a useful website.
Save it to a floppy
What is the most efficient way to access the site at a later time?
disk.
A system that uses the Internet for business-to-business interaction is called
a(n):
extranet.
A block of text automatically added to the end of an outgoing email is called an attachment.
_________ refers to the use of Internet technologies for placing telephone
calls.
VoIP
Desktop client,
application, and
Most client/server applications operate on a three-tiered architecture
consisting of which of the following layers?
database.
Which do you NOT need to connect to the Internet?
Modem
File Transfer
What does FTP stand for?
Program
So computers
can be referenced
by a name

IN250

What is the purpose of DNS?

IN251

Which of the following is NOT a properly formatted IP address?

IN252

Which of the following is a properly formatted email address?

IN253

The Internet is controlled by whom?

193.1.2.3
paul .trigg @
domain. org. uk
The US
government

IN254

What does IRC stand for?

Internet Relay
Chat

IN255

If you do not pick up your email for a week...?

It will be deleted

IN256

What does HTML stand for?

IN257

What is a disadvantage of joining a mailing list?

Hyper Textual
Mark-up Lingo
Receiving
messages
automatically from
anyone in the
group

op2

op3
MS Internet
Explorer and
Netscape
Navigator

None of the above C

symbols

video

hotword
in user-defined
order
home
.gif and .jpeg

hotlink

none of the above


none of the above
.wmf and .bmp

B
C
C

service,port and
directory path

service,hostname
and port

mail vendors,mail
identification and
password

mailing lists,mail
server robots and
gateways to other
none of the above
services

<font size=n>

<hr size=n>

<l1 type=shape>

common gateway
interface
Client
the net
peer-to-peer
connectivity
parcel
ECRN

classified general
instructions
Browser
intranet

none of the above


User
none of the above

B
A
B

none of the above


none of the above
NET

B
A
A

none of the above

none of the above

none of the above


none of the above
none of the above
Lynx

A
B
B
A

none of the above


none of the above
none of the above

B
B
B

none of the above


session layer

B
D

Netscape
Navigator and
Mosaic
data from a
database
hypertext
in sequential
order
start
.bmp and .jpeg
service,hostname
,port,directorypath

wan
packets
CARN
newsgroups and
search engines
mailto and files
bulletin
application
boards,mails call servers,proxy
and wireless
servers and web
servers
system
business
bulletin
broadcasting
broadcasting
system
system
very small
large
windows sockets windows stocks
Yahoo
PINE
cache
www.eb.com
DNS
network of
network
transport layer

built-in
www.encybrit.com
FTP
intermediate
network
physical layer

op4

ans

ping service

ftp service

none of the above

TELNET
uniform resource
locator
name of the
resource
scheme
Microsoft
web
read the Usenet
news

ARCHIE
unlimited restore
locator

none of the above

none of the above

none of the above


none of the above
general electric
editor

C
C
C
B

none of the above

spy mosaic

scheme
command line
sears
browser
search for
database
wincim or
maccim

none of the above

gopherspace

cyberspace

none of the above

open text

excite

none of the above

ftp server
directories

web server
image list

none of the above


none of the above

A
C

maximum of five
lower
directory

one
top
index

many
middle and lower
glossary

B
D
C

index search,menu menu search,item item search,index


search
search
search
excite
lycos
all the above

C
D

cello
mosaic
internet
finger service
Hyper text
transmission port
ftp
ftp
transmission
control
protocol/internet
protocol
two
domain name
servers
the internet
administration

lynx
Lycos
IBM
ftp
Hyper text
transfer protocol
uucp
telnet
transfer
communication
protocol/internet
protocol
three

all the above


navigator gold 2.0
CompuServe
telnet
Hyper text transfer
port
none of the above
none of the above

C
C
D
D

none of the above


none of the above

B
C

web servers

none of the above

the internet access none of the above

protocol
hyper text
transfer protocol

site
organization
higher type transfer
protocol
none of the above

C
C
C

uniform resource
locator
frequently asked
question

uniform resource
label
frantically asked
question

TCP,IP

name of the above B


none of the above

IP,UDP

none of the above

response
windows sockets
internets relay
chat
netscape,ie
world wide web
client
index
very organised
network integration
and
communication
application
university of
cleveland,clevela
nd freenet
IP address

request
world search for
information and
research council
mosaic,gopher

close

none of the above


none of the above

B
B

interface
hotwords

none of the above


none of the above

B
B

verification on
network integration
and
communication
none of the above

university of
California net
dns

none of the above


none of the above

B
A

ftp and finger


wais,allsrc
waisman

telnet and ftp


wais,winsocks
winsock

none of the above


none of the above
none of the above

A
B
B

none of the above


none of the above

C
B

animation
none of the above
applets
programms,images animation,scripts,e
,text
xecutables
none of the above

hyper transfer
hyper text markup
markup language language
books marks
hyper text

home page
global networks
navigator
electronic mail
Netscape page
starter
site,netscape
page wizard

welcome page
grand network
news
search engines

none of the above

none of the above


none of the above

B
B

yahoo and altavista none of the above

telnet

ftp

archive

point review
bitnet

all the above


Delphi

none of the above D


fidonet
A

biographical
information
on-line reference
works
web directories
Graphical
interchange
Format
Jumbled pictures
expert graph
documents

bookstores

none the above

more information
database

galenet
channel

A
B

Graphical interface Graphical Interface


format
format
B
Joint pictures
experimental group A
browsers
C

web pages

Joint pictures
expert graph
net
eudora,netscape
and pine
network
connections

COLOR

FCOLOR

netscape,ie,lynx

none of the above

mails

FONTCOLOR

Common
Common graphical Communication
Interface
graphical interface Gateway Interface D
Communication
Connection
B
Interface
Browser

Client

None of the above B

Server

Web

Channel

Uniform resource
United relay limited None of the above
locator
neither text nor
image only
image
text or image
PLSQL
CGI
SGML
betalanguage
none of the above
metalanguage
pancake is not
edible
none of the above
palm is not elm
SGML
Preprocessor
SGML Composer
SGML Parser
images
applets
documents
Internet
International
Engineering Task
Engineering
trainers and faculty Force
email,file
news,cooking and retrived,internet
fine arts
tools
mosaic,gopher,eu communicator,ie,ly
nx,winsock
dora,trumpnet
ARPANET
arpanet

B
C
C
C
B
C
A

None of the above C

none of the above

all of the above


none of the above

B
B

defensive
advanced
research projects
dedicated and
registered projects administration
administration
none of the above
net
first
none of the above
begin

C
B

mailnet,inet

intranet,extranet

none of the above

music and dance

cooking and dining none of the above

Hotlink text markup Hyper transfer


language
meta language
united states &
england,norway Russia

Hyper text
markup Language D
none of the above

client

network

none of the above

stand-alone

servers

none of the above

network topology network redirectors none of the above

data terminal
equipment
physical layer
packet
switching,store
and forward
network
anonymous ftp

data target
equipment
network layer

none of the above


none of the above

B
B

smart network and


dumb network
none of the above
file transfer
none of the above

B
B

KAN,RAN,VAN
MAN
MAN
digital

none of the above


none of t he above
none of the above
none of the above
Document type
data

C
B
C
B

none of the above

Manipulation

none of the above

Cable and wires


Serial line
protocol
Pillar to pillar
protocol

none of the above

none of the above

LAN,WAN,MAN
TAN
WAN
non-digital
Document type
Define type of data definition
Modulation/demo Manipulate/demani
pulate
dulation
Modulation
Dedicated access
and dial up
access
Stream line internet
protocol
Point to point
protocol
sending
information to a
host computer

none of the above B


receiving
storing data on the information from a
hard drive
host computer
B

Speed

Size

Channel

Save

Browse

Retrieve

Digital Signature

Cryptography

Message Digest

Lock

Hash Function

Formula

Password
Retrieval

Name
Cryptography

Address
B
Password Cracker A

Regulations

Address

Protocols

Imposting
Threat

Unauthorising
Exposure

Approving
Hacking

A
B

Income - tax
authorities
Pirated software
Hoffman
Amazon .com

Police officer of
IPS rank.
Cracker
Howard Aiken
Msn .com

B
C
A
B

Any Time Money

Judge of a civil
court
Virus
Charles Bubbage
Dell .com
Asynchronous
Transmission
mode

None of above

Regulations
Gateway

Address
Port

Protocols
Pin

C
B

WAN
hypertext tracing
program
Network Interface
card

CAN
hypertext transfer
protocol
New Information
Card

PAN
hypertext tracing
protocol

Can not computers


Combines
connectivity of a
hub with the
traffic regulation
of a bridge
Two or more
networks
frames
gateway

Only printers

Bridges and Hubs


Packets
router

Hubs and nodes


B
None of the above C
virus checker
A

Two
Data-Link Layer

Four
Network Layer

None of the above C


D
All of the above

None of the above B


None of the
D
above

Switches data from


incoming ports to
outgoing ports.
All of Above

Coaxial cable

Fiber

Twisted pair

Logical address

A memory address None of the above B

Router
It continue on to
It gets destroyed target device with
corrupt data
bit by bit.
Ultra violet
Wired Technology technology
Data Link Layer
Network Layer
ASCII
Octal
48 Bytes
48 KB

None of the above B

None of the above


All of the above
None of the above
48 MB

A
D
A
A

a list of rules for


transferring data
over a network

software that
allows file copying

a gateway calling
program for
internet bridging

If one node goes


down, it brings
down the entire
ring

Server
If the hub goes
down, it brings
down all of the
nodes on that
section

Network PC
C
If the hub goes
down, it brings
down all of the
nodes on all of the
rings
B

Topology
Star
Parallel
Circular

Both A and B
Ring
Both A and B
Linear

None of the above


All of above
None
Both A and B

B
D
A
B

Bus

Star

Mesh

Bus
Bus

Star
Linear

Mesh
Ring

B
C

Mesh
Data Link Layer
Ethernet, token
ring, ARCnet
mips
Mips

A
D

Hub

Client

Bus
Transport Layer
Ethernet, token
ring, FDDI
kbps
Kbps

Star
Physical Layer
Ethernet, DecNET,
FDDI
mbps
Mbps
depend on the
measured in bytes transmission
per second
medium
Windows 95
a modem
must use electronic must have a LAN
mail
account

None of the above B

B
B
C

limited by modem
speeds
Netscape

C
B

All of the above

used to control a
printer
a modem
Novell Netware

common gateway
interface
interfaces a
modem to a
computer
Windows package
Windows NT

have to do with
Web pages

the Internet

uniform resource
locator

must use electronic must have a LAN


mail
account
modem

application protocol
interface
connects a
computer to a
network
Netscape
None of the above

none of the
previous
use appropriate
communications
software
none of the
previous

is a CPU register

bridge
is a CPU
functional unit

used to browse
the Web
uses wireless
communication
medium

None of the
is part of Netscape above

a form of virus
an email server
IR system for the
Internet

D
B
C

A
D

make of processor A
is a protocol for
the transfer of
files between
is part of Netscape computers
D

a screen saver
program
a poor file server
browser

CD-ROM

none of the
previous
none
none of the
previous

clip-art file
search engine
is a CPU functional
is a CPU register unit
make of processor
is a protocol for
the transfer of
files between
used to browse the
Web
is part of Netscape computers
is a protocol that
allows for remote
uses telephone
lines
is part of Netscape login

Any layer can


communicate
directly with any
other layer.

Any layer can


communicate
only with the
layer directly
above or below it.

D
D
C
D
A

Any layer can


communicate only
with the layer
above it.
C

It is made up of
many networks
connected into
transmission lines
called backbones.

It works the same


way as a local
network.

System intrusion

Denial of Service Port sniffing

a screen saver
program

none of the
previous

Virus that initiates


a ping flood

UDP flood

packet

flood

traffic

router

switch

hub

a form of virus
Flood a Web
server with
requests

an email server
Update virus
definitions

a poor file server


Backup data on a
daily basis
Only large nameThere are safe
recognizable sites
and unsafe sites. are safe.

Individual
computers can
connect to it using
an ISP.
A

none of the above D


Limit logging on
access
C
ActiveX-enabled
sites are safe.

Use of passwords

Use of logical
access methods

through an FTP
port.

by attaching itself
to a document.

E-mail

Web traffic

Use of encryption
D
methods
by scanning the
computer for a
connection.
B
Application
D
updates

Adware

A worm

Spyware

Protocols
Trojan horses and
key loggers.
An attack with the
purpose of gaining
publicity
Disruption in
communication
Shutdown of
military security
systems

Multiplexors
cookies and key
loggers.

LAN
key loggers and
worms.
Changing the
content of a Web
page
All of the above
are correct.
Shutdown of
nuclear plant
safety systems

Giving out
disinformation
Disruption in
supply lines
Contaminating
water systems

D
D

To improve
network services
limit access to
computer owners
only
Yahoo People
Search

To obtain an
accurate
inventory of
network related
equipment and
To improve system parts and network
response time
D
nodes
update its prices
stop its competitors as soon as they
seeing their prices are changed
D
USA People
Search
Lycos Search
B

Date of birth
Fraud

Personal assets
Adware

Criminal records
Spyware

A
B

make large
amounts of
money by parking
purchase off-shore funds in their
invest without risk. property.
D
bank account.
Phishing

Siphoning

Hoaxing

cyber stalking.

virtual stalking.

Web stalking.

viruses.
Use anti-spyware
Use a proxy server. software.
Message
Physical Security sequence number Logical access
checking
controls
controls
II only
Neither I or II
Both I & II

ftp

www

Verifies integrity
of files

Increases boot up
time

telnet
Misleads a
program
recompilation
both HTML and
Internet Explorer
Web browser.

cookies.
Never use your
real identity.

spam.

Microsoft Excel
round trip HTML
HTML document. document.
.co in used for
.con is used for
company
companies
the World Wide
Web Consortium
HTML.
Internet Explorer

HTML.

DHTML.

B
C

B
B

None of the above A


one way HTML.

MHTML

clicking a hyperlink
that references a
updating the
document that is
values that are
stored in the floppy
obtained through drive on your
computer
a Web query
Click on Go to or
Search in the
browser

viewing an Excel
worksheet that you
have saved as a
Web page.
B

Go to the History Go to the


page and look for Bookmarks or
Favorites page
the site

the Insert Hyperlink the Update


command
command

the External Data


command

Screensaver

Sound

Video

GIF

JPEG

TIFF

Add it to
Write it down on a Favourites or
piece of paper.
Bookmarks.

Cut and paste it to


a word processor
document.
C

intranet.

privileged network. network topology

a signature.

a footer.

an encryption.

IPT
Desktop client,
software, and
hardware.
CD-ROM
File Transmission
Protocol

IPP
Desktop server,
application, and
database.
Telephone line
File Transfer
Protocol

PoIP
A
Desktop server,
software, and
hardware.
A
None of the above B

So IP addresses
can be shorter

So email is
delivered faster

45.1.1.1
143.215.12.19
paul.trigg@domai
paul.domain.uk
n.org.uk
Scientists in
Switzerland
No-one
International Relay Internet Remote
of Characters
Conversations

None of the above B

None of the above A


None of the
D
above
None of the above B
None of the above C

None of the above A

It will be waiting for A letter will be sent


you to collect it
to you in the post None of the above A

Hyper Text MarkHyperlink Text


Marking Language up Language
None of the above C

People discussing
a topic of interest High volumes of
globally
email

None of the above C

q_id

q_desc

op1

EX1

The wizard that is used to import text files is_________________

text
import
wizard

EX2

The alphabet indicating the column followed by the row number is known
an__________

cell
reference

Which of the following files could not be opened in excel _______________


In excel, the dates that are stored as sequential numbers known as
________________-

text files
serial
values

The command to display the current date in a cell is _________________


In excel, absolute references are represented by a ________ before the column
and row addresses
The ________ can be used to select the function and assemble the arguments
correctly
Specific parts of information required by functions to perform certain tasks are
called as___________
Which of the following do not belong to the formula category in excel
environment__________

=today()
dollar
sign

EX3
EX4
EX5
EX6
EX7
EX8
EX9
EX10
EX11

EX12
EX13
EX14
EX15
EX16
EX17
EX18
EX19
EX20
EX21
EX22

The function that in used to join cell values together in a single cell ________
The function that is used to count all the values that meet specific criteria
_________

The wizard that is used to create and edit charts _______________


The function that is used to calculate the payment for specific loan terms
____________
The function that is used to add together all values that meet specific criteria is
known as ____________
The __________ option present in the file menu options is used to specify major
facts of the page to be printed

AutoSum
variables
text
concaten
ate
countif

pivot table
wizard
sumif
average
page
setup
autoform
at

The command that is used to apply a format automatically __________


The ____________ makes the information in a worksheet meaningful and easy to
understand
bordering
page
A particular part of a work sheet can be printed by setting the _________
setup
The process of finding or selecting information is known as ____________
The option that is used to cancel the filter process for a specific column and
display all the records is ________
There are _________ types of data tables
The tables that allows the user to change or rearrange the data, summarize the
data and evaluate the data using changing points of view is known as

filtering
all option
1
data table

EX23

The wizard that is used to suggest hints for doing a task

EX24

In a chart Y-axis is known as_________

EX25

In a chart X-axis is known as_______________

EX26

_________ is a set of tables that describe each of the data series

EX27

________ is used to differentiate one data series from another

EX28

The chart that contains only one data series is _________

EX29

The chart that holds the column chart is _________

EX30

The chart that display two or more data series on a surface is _________

EX31

The chart that is used to display discrete data

pivot table
wizard
series or
rank
series or
rank
series or
rank
series or
rank
column
chart
column
chart
column
chart
column
chart

EX32

_________ are not allowed in a macro name

spaces

EX33

Which of the following tool cannot be used to view the excel web page_______

excel97

EX34

The wizard that used to build an interactive table from data existing on sheets

pivot
table
wizard

EX35

The chart that is used for displaying stock market information


line chart
In excel, the subtotal command also generates grand total after the last group
subtotal_________
true
In advanced filter , the criteria occupying multiple columns but more than one row,
is considered as an ________ criteria.
and
3dimensio
The stacked bar graphs can be represented in __________
ns
A pie chart can represent only one data series at a time
true
The ______ generates a summarized report in tabular form in an interactive
Data
manner
table

EX36
EX37

EX38
EX39
EX40

EX41

Which one of the following statements related to stock chart is NOT TRUE ?

It is also
called as
high-lowclose
chart

EX44

The state government needs to finalize a five years plan to implement 100%
literacy in the state. Which one of the following will be the best tool that should be
used to work out the plan ?
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC
party needs to won in totality to obtain majority to form the government. Which
one of the following will be the tool that will help the team ?
Which one of the following will be the tool that provides a way to view and
compare the results of all the different variations together on the worksheet ?

EX45

A ___________ is an excel file where the user stores his data

Goal seek
Workboo
k

EX46

Spreadsheets are useful for _______________

Performin
g
calculation
s.

EX47
EX48
EX49

Which one of the following is NOT the component of the pivot table ?
Excel allows upto ______ levels of sorting
Filtering rearranges a list to display the required records

EX50

The stacked bar graphs can be represented in _____________


The ______ generates a summarised report in tabular form in an interactive
manner

EX42

EX43

EX51

Pivot table
Goal
seek

Column
field
two
true
3dimensio
ns
Data table

EX54

It displays
the data
series one
Which one of the following statements related to stacked bar chart is NOT TRUE on top of
?
the other.
The state government needs to finalize a five years plan to implement 100%
literacy in the state. Which one of the following will be the best tool that should be Pivot
used to work out the plan ?
table.
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC
Goal
party needs to won in totality to obtain majority to form the government. Which
one of the following will be the tool that will help the team ?
seek

EX55

Which following function is used in subtotal option ?______________

Count.

EX56

A workbook consists of many ________

databases

EX52

EX53

EX57

Which two of the following statements related to pivot table are TRUE ?

EX58

Which one of the following is NOT a What-if analysis tool ?

EX59

The _________ wizard separates contents in a cell into different cells

EX60

A spreadsheet is a grid of rows and columns and is called as a ________

EX61

Pick out the window that is not a form of excel ___________

EX62

On an Excel sheet the active cell is indicated by


Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8.
The contents of cells A6, A7, and A8 are _____.

EX63

EX64

If a cell shows ####### , it means that _____.

EX65

EX66
EX67

Which is not an advantage of using computerized spreadsheets?


The gym teacher has a new program to calculate physical fitness in terms of
weight and exercise. The use inputs different weights or amounts of exercise to
determine the related physical fitness. This "What if" program is most likely which
of the followin
The difference between the highest and the lowest values.

EX68

Spreadsheets can be used for...

It is a tool
for
summariz
ing and
analyzing
the data
records
in an
interactiv
e
manner.
Goal
seek.

text import
wizard
workshee
t
applicatio
n window
A dark
wide
border
8,16,32

your
formula
has a
syntax
error
ability to
generate
tables
word
processin
g
Range
Producin
g graphs

doubleclick any
cell in the
column

EX69

To select a column the easiest method is to

EX70

ENTER

EX71

If you press _____, the cell accepts your typing as its contents.
The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known
as

EX72

All of the following are considered constants EXCEPT:

EX73
EX74

Which of the following may NOT be included in a formula?


Which of the following is NOT a valid mathematical operator in Excel?

100
Cell
reference
s
^

EX75

Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first?

B5*B6

EX76

Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?

E12

How can you tell which cell in a worksheet is the active cell?

It is
surround
ed by a
heavy
border.

How can you change the active cell?

By clicking
in a
different
cell

Which of the following would you use to change the font size of a cell in Excel?

The
Standard
toolbar

EX77

EX78

EX79

array.

EX80

the New
command
on the File
menu.

EX82

The command that will save the current workbook with a different file type is:
The command that will print an Excel workbook is found on the ____________
menu.
File
In the Save As and Open dialog boxes, the ___________ view shows the file size
as well as the date and time a file was last modified.
Preview

EX83

Which of the following commands will automatically adjust cell references in


formulas?

EX84

Which of the following commands will remove cells, rows, or columns from a
worksheet?

EX85

Which of the following options is NOT controlled through the Page Setup
command?

EX86

Which command enables you to change the margins for a printed worksheet?

EX87
EX88

All commands are carried out on a rectangular groups of cells known as a:


Which of the following is a valid cell range?

EX89

In a copy operation, the cell(s) you are copying from is called the:

Options
worksheet
.
6
copy
range.

EX90

In a copy operation, the cell(s) you are copying to is called the:

paste
range.

EX81

EX95

Which of the following commands is needed to duplicate the contents of a cell in


another?
A cell reference that does not change during a copy operation is known as
Which of the following is considered an absolute cell reference?
Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are
copied to cell E4, what will be the contents of cell E4?
Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3
are copied to cell E4, what will be the contents of cell E4?

EX96

Which of the following commands is needed to transfer the contents of one cell
range to another?

EX91
EX92
EX93
EX94

Insert

Clear
Orientatio
n (portrait
or
landscape
)

The
Duplicate
command
absolute
B4
#DIV/0!
#DIV/0!

The Move
command

EX97

The F4 key is used to:

copy and
paste
cells.

EX98

Which of the following quickly copies the formatting of a selected cell to other
cells?

the Fill
Handle

Which of the following will insert a hyperlink into an Excel worksheet?

Select the
Insert
Hyperlink
command
from the
File menu.

Conditional formatting applies formatting to a cell based on:

whether
the cell
has a
formula or
a value in
it.

EX101

If you enter a date into a cell, Excel stores the date as:

text with a
two-digit
year.

EX102

You created a worksheet on July 30 and entered the =Today() function in cell
E17. You opened that worksheet again on August 31. What will be displayed in
cell E17 on August 31?

Jul-30

The number of days between two cells containing dates can be calculated by:

subtracti
ng the
earlier
date from
the later
one.

EX99

EX100

EX103

EX104

The function key that is used to quickly edit the contents of a cell is:

the F4
key.

EX105

What will be stored in a cell if 3/4 is entered in it?

03-Apr

a cell on a
worksheet
.

EX108

A users response to the InputBox function can be stored in:


The cell reference for a range of cells that starts in cell B1 and goes over to
column G and down to row 10 is _____.
The teacher has a spreadsheet showing all Year 10 students and their marks in
one Mathematics test. To find the student with the highest mark, which of the
following functions should be used?

EX109

Which chart type best shows proportions of a whole?

Combinati
on

Which of the following is TRUE regarding chart types?

Once a
bar chart
is chosen
it cannot
be
changed
to a
column
chart.

EX106
EX107

EX110

EX113

To select several cells or ranges that are not touching each other, you would
_____ while selecting.
Your Institute teachers have set an assignment on Studies. You are required to
use a spreadsheet to record all that you study on each day for four weeks. You
decide to show each weeks data with an accompanying graph. What is the best
way of doing this
What would be the best method to quickly copy the formula from the active cell to
each cell below it?

EX114

To arrange rows in alphabetical order based on column A, you need to use the
command _____.

EX115

What can you NOT do with a spreadsheet?

EX111

EX112

B1-G10
AVERAG
E

hold
down the
CTRL key

Use
tables
Paste
Tools |
Sort
Analyse
data

EX116

To print just part of a sheet, you would select what you want to print and _____ .

EX117
EX118

Spreadsheets can be used for...


The formula that will add the value of cell D4 to the value of C2 and then multiply
by the value in B2 is _____.

click the
Print
button
producin
g graphs
(D4+C2)*
B2

EX119

Which of the functions is not valid for performing addition

EX120

The default orientation for the printed page is _____.

portrait

EX121

Which is not a valid cell address?

AD213

op2
convert
text to
columns
wizard

op3

op4

function
tip wizard wizard

ans

row
column
none of
reference reference the above A
quattropro
or xbase
files
range
values
=currentd
ate()

class
files
reference
values
none of
=date()
the above
none of
' = ' sign # sign
the above
function none of
AutoFill
the above
wizard
argument parameter none of
s
the above
s
Lotus 1-23
domain
values

logical

numeric

pmt

merge

vlookup

chart
wizard

pmt
convert
text to
columns
wizard

pmt

countif

sum

sumif

all blanks
3
index
table

D
A
A
C
B

Boolean D
none of
the above A
count

tip wizard B
none of
the above B
countif
C
none of
the above A

print area print


none of
AutoFill
the above
formattin
none of
shading
the above
g
print
preview
print area print
none of
searching sorting
the above
blanks
2
filtered
table

none
4
pivot
table

A
B
B
A
A
B
D

chart
wizard

convert
text to
columns
wizard

tip wizard
data
category legend
marker
data
marker
category legend
data
category legend
marker
data
category legend
marker
surface
bar chart pie chart chart
surface
bar chart pie chart chart
surface
bar chart pie chart chart
surface
bar chart pie chart chart
wild card
characters symbols
internet
explorer Netscape
convert
text to
chart
columns
wizard
wizard
stock
bar chart chart

D
A
B
C
D
C
B
D
A

none of
the above A
word 2000 A

tip wizard A
pie chart

false

or
4Multidimension dimension
s
s
false
Pivot
table
It is often
used to
display
share
market
prices
It shows over a
trends
period of
over time time

A
A
B
It is also
used for
indicating
fluctuation
s in
temperatu
re
changes B

Scenario
manager

Solver

Data
table.

Scenario
manager

Data
Pivot table table.
A
Data
Pivot table Solver
D
table.
Workshee Spreadsh none of
t
eet
the above A
Performin
g
database
operations

Performin
g text
formatting
.
Source
table
Row field. name.
N
three
false
4Multidimension dimension
s
s
Pivot
table
It is
useful
when
several
compone
nts are
changing
and the
user is
intereste
d in the
sum of
the
compone
nts.

It can be
represent
ed in 3dimension
s

Scenario
manager

Solver

Scenario
manager
Standard
deviation
records

All of the
D
above
Pivot table
item.
C
B
B

A
B

Data table C

Pivot table Data table A


SumIf
tables

A
workshee
D
ts

It is a tool
that
provides a
way to
view and
compare
the results
of all the
different
variations
together
on the
worksheet
Scenario
manager
convert
text to
columns
wizard

It
summariz
es the
data by
using
analytical
functions.
solver

A
Pivot
table

function
tip wizard wizard

workbook tables
document modal
window
window

database A
C

A dotted
border

A blinking
No border border
A

2,4,2

2,2,2

6,8,10

the
column is
too
narrow to
show all
the digits
of the
number
flexibility
speed of of moving
calculation entries

either b or
c
C
cost of
initial setD
up

graphical
Address
Writing
letters

spreadsh
D
eet
Rows
A
Document
filing
A

the row is
too short
to show
the
number at
the
current
font size

database
Gap
Drawing
pictures

drag from
the top
cell in the
column to
the last
cell in the
column
CTRL +
ENTER

click the
column
heading

click the
column
label

TAB

INSERT

formula.

function. constant.

(201)555Tom
1212.
#VALUE! McKenzie.
Text
Numeric constant
Functions constants s
/
*
\
It is
impossibl
e to
determine
C3/D4
.
D4^2
SUM(H9: G7*SUM(
H11)
H9:H11)
6

It is
blinking.

D
D

C
B

The
phrase
active
It is
cell
displayed appears in
in reverse the Status
video.
bar.
A

By either
clicking
in a
different
cell or
By using using the
the arrow arrow
keys to
keys to
move to a move to a
different different
cell
cell

By typing
the
reference
of the cell
you want
to move to
in the
formula
bar
C
The Font
The Cell Size
Format
command
The
command on the
Formattin on the
Tools
B
g toolbar Edit menu menu.

the Save
As
the Save comman
command d on the
on the File File
menu.
menu.

the File
Type
command
on the File
menu.
C

Edit

View

Window

Details

List
Properties B
Both
Insert
and
Clear
C
Delete
Both Clear
and
Delete
Remove B

Delete

Delete

Headers
and
footers
Page
Setup

Fonts

Margins

View

Edit

group.
range.
D12, G25 D12:G25
destinatio
n range. clipboard.

cell group. B
D
C
source
D
range.

destinati
source
on range. clipboard. range.

Both the
Copy and
Paste
The Copy The Paste comman
command command ds
D
relative
mixed
constant A
$B4
B$4
D
$B$4
#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!
C
Both the
Cut and
Paste
The Cut
The Paste comman
command command ds
D

cycle
through
absolute,
relative,
and
mixed
cell
reference
edit cells. s.
the
the
Format
Formattin
g toolbar
Painter

cycle
through
open
applicatio
ns.
C
Condition
al
formatting B

Click the
Insert
Hyperlink
button on
the
Standard
toolbar.

Doubleclick a cell
and click
the Insert
Hyperlink
command. B

the cell
address.

Right-click
a cell and
click the
Edit
Hyperlink
command.
whether
the cell
has an
absolute
or a
relative
cell
reference.

adding the
earlier
date to the
later one.

subtractin
g the later
date from
the earlier
one.

adding the
later date
to the
earlier
one.
A

the value
in the cell D
text with
either a
two-digit
or fourdigit year,
text with a
depending
four-digit an
on the
year.
C
integer. format.
It is
impossibl
e to
determine
from the
29/03/200 informatio
8
n given.
B
Aug-31

the F2
key.

the Esc
key.

0.75

March 4
of the
current
year

the F1
key.

a
a variable. constant.

Either 3/4
or .75,
depending
on the cell
formatting C
either a
cell on a
workshee
t or a
variable. D

B1.G10

B1;G10

B1:G10

COUNT

MAX

SUM

Line

Pie

Scatter

Once a
column
chart is
chosen it
cannot be
changed
to a bar
chart.

Once a
pie chart
has been
chosen it
cannot be
changed
to line
chart.

Once a
line chart
has been
chosen it
can be
changed
to a pie
D
chart.

hold down
the SHIFT
key
Create
four
separate
files

hold down
the ALT
key
Transfer
informatio
n to a
database

hold down
CTRL +
SHIFT
A

Use
multiple
sheets
Paste
Fill Down Fill Right Special
none of
Data |
Edit | Data the
| Sort
choices
Sort
Calculate Create
None of
data
the above
forms

D
B

B
C

select
Print
selection
on Page
press the Setup |
PRINT
Sheet
SCREEN and then
key
print
writing
drawing
letters
pictures
D4+C2*B
2
#VALUE!
=A3SUM:
B3SUM:C
REF!
3SUM
whatever
was last
landscape used
ZA1

A0

select
Print
selection
in the
Print
dialog
and then
D
print
None of
the above A
=(B2*(D4+
C2)
C
None of
the above B

vertical
A
None of
the above C

q_id
EC1

q_desc

EC8

The acronym for B2B is ___________


The _____________ model is the least intrusive model but
requires active search on the part of the customer
__________ is / are a form of advertisement where people relate
their experience with products and services
The _________ are software agents who communicate with the
business merchants on behalf of the customers
The Pre-purchase preparation phase includes _______________
for a set of products
The _________ phase includes customer service and support to
address customer complaints , product returns and products
defects
The ________ allow companies to bypass the need for costly
printed catalogs
A ________________ is a basket on the Net that is used to place
the items that are being purchased

EC9

EDIFACT is an abbreviation of ________

EC2
EC3
EC4
EC5

EC6
EC7

EC10

EC11

EC12
EC13

EC14
EC15
EC16
EC17
EC18

EC19
EC20

EC21

op1
Business-toBusiness
Billboard
Customer
Endorsements
Intermediaries
Order Placement
Post purchase
interaction
Billboard model of
marketing
Online Catalog
EDI For
Administration,
Commerce and
Transaction

The __________ allows for protocol conversion and communicates


with the bank using the banks private network or the Internet
EDI
In Ecommerce, data extraction, transforming the data into
transmittable form, transmitting the data and downloading the data
are the operations employed in _________
Compiler
The _________ commerce assists in integrating the customers
and suppliers of the company directly into the organisation
E-cash means______________________
E-commerce is a tool that addresses the desire of firms to cut
services cost and improving the quality of goods. It is a definition of
e-commerce from _________
The small denomination digital tokens are called _________
The ____________ is the process of encoding information to
prevent it from being read by unauthorized parties
In EDI interface, the translation service receives _________ as
incoming files from the communication service
The EDI standardisation for International Trade and Commerce is
introduced by __________
In EDI, the transmission files are composed of different sets of
external format files which are grouped into multiple sets under the
name of ________
The ________________ are pre-paid credit cards that include an
embedded cards
________________ are another form of credit payment that lets
customers use digital online cheques to pay Web merchants
directly

Business-to-Business
Emergency Cash
Communication
Perspective
Microcash
Decryption
Internal Format File
ANSI

batch files
Smart Card

E-cash

In Active advertisement, there are two types of models. They are


_____ and ________
The network based technology is/are ____________
Decryption is a process employed for scrambling of plain text for
web based transactions
Asymmetric cryptosystem is based on __________ and
____________

Billboards and Junk


Mail
EDI

Value Added Network is an example of _________


The advertising strategies emerging in the on-line world are
____________
The _________ model use direct mail, spot television or cable
television, in active based advertisement.
The ________ is a form of mail that is not targeted to a specific
audience
The __________ model refers to information that is placed at a
point where it will be noticed by customers in the course of other
activities and does not require active search

Global Network
Active or push based
advertising

EC32

The most beneficial advantage of ERP system is


What is the term that describes spying on ones business rivals to
gain a competitive advantage?

Error checking
Competitive
espionage

EC33

A list of competitors
What would you NOT be looking for when spying on a competitor? clients

EC22
EC23
EC24
EC25
EC26
EC27
EC28
EC29

EC30
EC31

EC34
EC35

EC36

An online drugstore such as Drugstore.com is an example


of_______
Which of the following is an example of unacceptable online
netiquette?

Which of the following statements is correct concerning the


security of messages in an electronic data interchange (EDI)
system?

True
Login_Id and
Password

Broadcast
E-mail

Catalog

single-user database
application
Replying promptly
Removable drives
that can be locked up
at night provide
adequate security
when the
confidentiality of data
is the primary risk.

op2

op3

op4

ans

Business-to-Backend Backend-to-Business Business- to-Billboard A


On-line Catalog

Endorsements

Broadcast

Billboard

Catalog

Broadcast

portals

.COM
Search and
discovery

Domains

None of the above

Service
Purchase
consummation
Online catalog

Pre-purchase
preparation
Endorsement model
of marketing

Shopping cart
EDI For
Administration,
Consumer and
Transport

Search and discovery A


None of the above

Billboard
EDI For
Administration,
Commerce and
Transport

Pulling cart

None of the above

TCP/IP

EFT

Gateway

Interpreter

Assembler

EDI

Business-toConsumer
Electronic Cash

Consumer-toBusiness
Euro Cash

Customer-toCompany
Endorsed Cash

B
B

Business Process
Perspective
Micro Transactions

Service Perspective None of the above


TT(Tiny token)
E-token

SSL

Encryption

Subscription

External Format File

Transmission File

None of the above

UN/EBCDIC

UNESCO

UN/EDIFACT

interchange sets

functions

functional groups

Embedded cards

SET

None of the above

Digital Cash

Smart Cards

Electronic cheques

C
A

Online Catalog and


Billboards
E-mail

Online Catalog and


Broadcast and Junk Customer
Endorsements
Mail
EFT
All of the above

False
Primary Key and
Private Key

Public Key and


Password

C
D
B

Public Key and


Private Key

Satellite Area Network None of the above


Private Network
Passive or pull-based Glow sign or hoarding
advertising
strategies
All of the above

Junk mail

Billboard

Endorsements

Bulk-mail

Direct-mail

Junk mail

Endorsement

Billboard

Broadcast

Data Integration

Low cost of operation Quality management

Corporate espionage Industrial espionage Economic espionage

Contact numbers of
the management
Research data
group

A competitors new
project

e-commerce
C
database application None of above
Using all capital
Including the Subject letters
D
Encryption
performed by a
Message
Security at the
authentication in EDI physically secure
transaction phase in
systems performs the hardware device is EDI systems is not
more secure than
same function as
necessary because
segregation of duties encryption
problems at that level
performed by
in other information
will be identified by
systems.
the service provider. C
software.
multi-user database
application
Keeping messages
short

q_id

DS3

q_desc
___________ means the result of applying to specific information certain
specific technical processes.
__________ is an algorithm which creates a digital representation or
"fingerprint" in the form of a "hash result".
__________ is of standard length which is usually much smaller than the
message but nevertheless substantially unique to it.

DS4

Digital Signature involves two processes. They are ___________ and


__________.

DS5

The Costs of Digital Signature consists mainly of the following

DS6

DS8

CA stands for ________________


A Digital Certificate is issued by a Certification Authority and is signed with the
CA's Private Key
A Digital Certificate does contain Owner's Public Key, Owner's name,
Expiration date of the Private Key, Serial number of the digital certificate

DS9

______________ enable web servers to operate in a secure mode.

True
Server
Certificate

______________ are used by individuals when they exchange messages with


other users or online services.
______________ are on-line databases of certificates and other information
available for retrieval and use in verifying digital signatures.

Server
Certificate
Private
Certificate

DS1
DS2

DS7

DS10
DS11

DS12
DS13
DS14

Signing Writings serve the following general


purposes______,_______,_______ and _______
The most widely accepted format for Digital Certificate is defined by the CCITT
X.509
A certificate may prove to be unreliable, such as in situations where the
subscriber misrepresents his identity to the certification authority

op1
Digital Sign
Hash Function
Hash Function
Digital Signature
creation
Institutional
Overhead and
Subscriber
Relying Party
Cost
Certification
Authority
True

Evidence,
Ceremony,
Approval
True
True

DS16

CRL stands for


The prospective signer identified in the digital certificate holds the_________
and is called the ___________

Certificate
Revocation List
Private Key,
Subscriber

DS17

A "recipient" of the certificate desiring to rely upon a Digital Signature created


by the subscriber named in the certificate is called the ____________

Recipient Party

DS15

DS18
DS19
DS20

The Relying Party can use the ___________ listed in the certificate to verify
that the digital signature was created with the corresponding _________
Digital Signatures are used for a variety of Electronic Transactions like
________________________
To associate with a key pair with a prospective signer, a Certification Authority
issues Digital Certificate

Public Key
E-mail
Not False

DS21

DS22
DS23
DS24

DS25
DS26

DS27
DS28
DS29

Digital Signatures, if properly implemented and utilized offer promising


solutions to the problems of Imposters, Message Integrity, __________ and
_____________
In, Digital Signature, _____________ perform the "ceremonial" function of
alerting the signer to the fact that the signer is consummating a transaction with
legal consequences
A Digital Signature must have the following attributes ________________ and
_____________
"Hash Function" is used in both creating and verifying Digital Signature
___________ provides assurance of the origin or delivery of data in order to
protect the sender against false denial by the recipient that the data has been
received, or to protect the recipient against false denial by the sender that the
data was sent.
___________ serves the ceremonial and approval functions of a signature and
establishes the sense of having legally consummated a transaction.

Closed
System,Formal
Legal
requirements

Affirmative Act
Signer
Authentication
Not True

Nonrepudiation
Service
Affirmative Act

________ is a branch of applied mathematics concerns itself with transforming


messages into seemingly unintelligible forms and back again.
Cryptography
The complementary keys of an asymmetric cryptosystem for Digital Signatures
are arbitarily termed as _________, and ____________
Private Key

DS31

_______ is known only to the signer and is used to create the digital signature. Private Key
_______ is ordinarily more widely known and is used by a relying party to verify
the digital signature.
Private Key
____________ is the art of protecting information by transforming it into an
unreadable format.
Decryption

DS32

Which of the following activities would most likely detect computer-related


fraud?

DS33

A digital signature is used primarily to determine that a message is:

DS34

What is a major disadvantage to using a private key to encrypt data?

Unaltered in
transmission.
Both sender
and receiver
must have the
private key
before this
encryption
method will
work.

DS35

Which of the following risks can be minimized by requiring all employees


accessing the information system to use passwords?

Collision.

DS30

Using data
encryption.

op2

op3
Digital
Digital Certificate Signature

op4
None of the
above

Digital Signature Digital Certificate Private Key

Hash Value

Both B and A

Digital Signature
Verification
Both A and B

Either A or B

Subscriber
Relying Party
Cost
Certified
Authority

None of the
above
None of the
above

Hash Result

Institutional
Overhead
Certificate
Authority

False
False
Developer
Certificate
Developer
Certificate
Repositories

Approval,
Evidence

ans

A
A
A
B

Personal Digital
Certificate

None of the
above

Personal Digital None of the


above
certificate
none of the
Public Key
above
Evidence,
Ceremony,
Approval,
Efficiency and
Efficiency and
logistics,
Evidence
Logistics

False

C
B

D
A

False

Certificate
Resource List
Public key,
Recipient

certificate
Revocation
Letter
Private Key,
Recipient

None Of The
Above
None Of The
Above

Relying Party

Either A or B

Neither A nor B

Private Key
Electronic
Commerce

Both A and B
Electronic Fund
Transfers

Both B and A

All The Above

Not True

A
A

Formal Legal
Requirements

Efficiency
Document
Authentication
Not False

Open System

Formal Legal
Requirements,
Open System

Signer
authentication

None of the
above

Both A and B

Neither A nor B

Digital signature Digital certificate Private Key


Efficiency

C
B

Either A or B

Neither A nor B. A

Public Key

Private Key

None of the
above

Public Key

Both A and B

Either A or B

Public Key

Both A and B

Either A or B

Public Key

Both A and B

Either A or B

Cipher

Cryptography
C
Encryption
Conducting fraud- Reviewing the
systems-access
awareness
training.
D
log.
Received by the
intended
Sent to the
recipient.
correct address. A

Performing
validity checks.
Not intercepted
en route.

The private key


cannot be
broken into
fragments and
distributed to the
receiver.
Data entry
errors.

The private key


is used by the
sender for
encryption but
not by the
receiver for
decryption.
Failure of server
duplicating
function.

The private key


is used by the
receiver for
decryption but
not by the sender
for encryption.
A
Firewall
vulnerability.