Sei sulla pagina 1di 569

q_idq_desc

op1

_______ is a word processing that is a member of the office 2000 family

Word 2000

The feature that enables user to type anywhere in a document without

click-n-type

O1
W

O2 pressing or tab
W

The______ feature allows the user to copy and paste upto 12 items at the office clipboard

O3 same time in an application


W

______ and _____ key combination will extend the selection by one

shift+end and

O4 character on the left and right

shift+home

web layout,

_____and_____ are improved layout in Word 2000

O5
W

printlayout
The easiest way to create a document in word is

wizard

O6

In Office2000 environment the tool that makes work easier for us is_____ office assistant

A short description of a tool bar button called the ______ is displayed

Screen Tip

when the mouse pointer is allowed to stay for a second on the button
9

The _____ helps us to keep track of the margin of the page

10 The keys that are used to navigate between headers and footers are

tab stop
up arrow keys
only

11 Pick out the element from the following that dose not form the type of

left

tabs for the Word 2000


12 _______are blueprints or patterns for documents of a certain type

template

13 The______ is used for quickly setting paragraph indention using the

increase indent

mouse
14 Word art is text with

special effect

15 AutoShapes in word can be created by accessing the _____

drawing toolbar

16 By default, a document consists of_____ section

17 The dialog box that is used to determine the documents margins is

page setup from


the file

________ is a box surrounding a page on all slides or a line that sets off a

border

O1 paragraph on one or more slides


8
W

The key that is used to perform a task to select all t he text in the

ctrl+a

O1 documents is
9
W

The key that is used to indent a paragraph is

ctrl+a

The key that is used to change the font from the current positioned in a

CTRL+SHIFT+F

O2
0
W

O2 document is
1
W

The key that is used to change the style of the document that is from

ctrl+shift+f

O2 that normal to heading1 or heading1 to other document styles.


2
W

______ is the default view in Word used for typing Editing and Formatting

O2 the Text
3

NORMAL

The short-cut-key that is used to indent a paragraph spacing in the

ctrl+m

O2 documents is
4
W

The short-cut-key that is used to paste the selected text

ctrl+v or ins

The short-cut-key that is used for paragraph spacing(1.5)

ctrl+2

The box that separate text from the document and allows it to behave

Text Box

O2
5
W
O2
6
W

O2 like an independent object is known as


7
W

The object that is used to provide information like the title of the book,

O2 name of the chapter, page number etc.

Header and
Footer

8
W

The object that helps us analyzing data statistically is known as

Chart

To highlight certain parts of a page to set it apart from the rest of the

Borders

O2
9
W

O3 page we make use of the following features


0
W

To clear all the tabs in a document the option that is clicked from the

clear

O3 tabs dialog
1
W

The dialog box that is used to incorporate picture bullets into our

O3 documents or web pages is

picture bullets
dialog box

2
W

The object that composes of set of tools which helps to create and work charts

O3 on different shapes like rectangles, circles, flowcharts etc.


3
W

When word is opened a new document called_____ is displayed, where

doc1

O3 the user starts typing the content right way


4
W

______ is an online dictionary maintained by word to obtain synonyms for

thesaurus

O3 words
5
W

The thesaurus is invoked by pressing_______

shift+f7

When a new table is created the insertion point flashes in the _____

first

By pressing the _____ key inserts a blank row after the last row in the

tab

O3
6
W
O3
7
W

O3 table
8
W

The ______ option enables us to convert text into a table format

O3

convert text to
table

9
W

A table consists of ______ that contain text or graphics

row

The _______ option in word allows the user to automatically correct

AutoCorrect

O4
0
W

O4 misspell words as and when they are typed


1

______ is a facility that enables recording and replaying of a sequence of

Mail Merging

O4 keystroke
2
W

In Word Macros are written in _____

basic

In Word 2000 the macro dialog box is activated with the help of ____ key

shift+f8

O4
3
W

O4 combination
4
W

________shows how a document would look like when published on the

web layout view

O4 web or on an intranet
5
W

______ is a software for sending and receiving e-mail messages

email client

________is the coding system used to create web pages

html

The network that makes information easily accessible across various

internet

O4
6
W
O4
7
W

O4 networks is _______
8
W

Which of the following statements are false with reference to the use of

field name must

O4 a header row source for a mail merge

be listed in the

same order as the


corresponding
information in the
data source

With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE

it is not possible

O5 false

to change the

height of only
selected rows of a
table

The alignment available for tabs does not include

left

Which of the following statements related to a Section Break are True

A new section is

O5
1
W
O5

created in order

to change
properties like
number of
columns

W
O5
3

The user can set a spelling checker to skip the marked part of the next

true

New option under the file menu of word creates a new blank document

true

O5 that is based on the normal templates


4
W

The user can split the screen only into two parts

true

The features that enables the user to type text graphics tables

drag & drop

O5
5
W

O5 anywhere in the document without pressing enter or tab


6
W

The user can modify the picture from the clip art

true

With reference to auto correct which of the following statements are

automatically

O5
7
W

O5 false

corrects common

typing, spelling
errors

With the reference to password protected documents which of the

O5 following statements are false

password can not


include spaces

The alignment available for tabs does not include

left

Which of the following statements are False

a .ppt file can not

O6
0
W
O6

not be inserted at

specified position
in the current
document

Drop Cap tool does not work for the contents in the table format

true

The user can split the screen only into two parts in MS-Word

true

O6
2
W
O6
3
W

The special symbols that are inserted using "insert symbol" option of the true

O6 word can not be printed by the printer as they are not standard keyboard
4

symbols

The "format columns" option allows to create columnar text up 12

O6 columns only.
5

true

The document that makes the user to organize and maintain a long

Master Document

O6 document, such as multipart report or a book consisting of chapters


6
W

The view that enables us to view how objects will be positioned on the

Print Layout View

O6 page when it is printed


7
W

The mode that is initialized or toggled to if the user is in a position to

Insert Mode

O6 overwrite the text in the word


8
W

Veena is entering a paragraph in a word processing program. When the

press the return

O6 cursor gets to the end of a line, what is the best way to get the cursor to key
9

the next line?

How are data organized in a spreadsheet?

layers and planes

Which key moves the cursor to the beginning of the next line of text?

tab

Veena typed the following sentence: "The girl was very beautiful." In

grammar checker

O7
0
W
O7
1
W

O7 which word processing utility could she find a synonym for "beautiful"?
2
W

Using an electronic bulletin board, Seema can do all of the following

send a public

O7 except which one?

message to

friends interested
in one topic

Aryan has created a ten-page story, but only wants to print the first two

Print all

O7 pages. What printer command should he select?


4
W

What process should be used to recall a document saved previously?

Enter

Which is used to indent text within a document?

closing

Desktop publishing is a more sophisticated form of which of the

database

O7
5
W
O7
6
W

O7 following types of software?


7
W

What is a Word Processor used for?

To analyse figures

What is a picture that is saved on a diskette and can be pasted into a

subscript

O7
8
W

O7 document?
9
W

What is a Word Processor used for?

To analyse figures

What basic tools would you find in the Edit menu of a word processor

Clear, replace and

O8
0
W
O8

select

1
W

What is a header in a document?

Text at the

O8

bottom of every

page

What hardware is essential for a word?

Mouse, printer

O8

and processing

system keyboard?

The user could take a picture from a magazine and insert it into the

Browser

O8 document by using a
4
W

What basic tools would you find in the Edit

O8

Clear, replace and


Toolbars

5
W

Assume you are creating a two-column newsletter. Which type size is

6 point

O8 the most reasonable for the text in the columns?


6
W

Given the default left and right margins, and -inch spacing between

2 inches.

O8 columns, the width of each column in a two-column document will be:


7
W

Assume you have made all appropriate selections in the Columns dialog

O8 box in Word, but cannot see any columns on the screen. What is the
8

most likely cause?

While word processing, in which of the following situations would Tom

O8 use the "Copy" command?

You are not in


Print Layout view.

to store a file on
the hard drive

What does a document contain?

O9

Data about a set


of similar things

0
W

Before submitting your work you want to find any words spelt

Thesaurus

O9 incorrectly. Which of the following would you use?


1
W

What command in a word-processing program can be used to change the Paste

O9 word him to her, and also the word he to she in the given phrase?
2

On a cold and still night, the only sound that could be heard was the
owl that had ade its home in the nest outs

What edit commands would you use to insert a paragraph from one

Copy, then paste

O9 document into another document, while still keeping the paragraph in


3

the first document?

Which of the following statements would NOT be a reason for showing

To give the

O9 suggested revisions in a Word document without changing the original

original author a

chance to accept

document?

suggested
changes from the
person who
entered the
revisions

Which statement is NOT true regarding revisions made in a Word

A line appears

O9 document?

through text that

is to be deleted.

How are suggested changes entered for review on an initial Word

Through the Edit

O9 document?

menu by choosing

Track Changes
command

Which of the following is TRUE about saving a document using the

The Versions

O9 Versions command?

command will

allow you to save


multiple versions
of a document,
including any
changes that may
have been made
to that document.

What happens when you open a document that has been saved using the All versions are

O9 Versions command?

opened

automatically.

You have used the word discover four times in an English essay you

Dictionary

O9 have created using a word processing program. You would like to find
9

another word of similar meaning to use instead of discover. Which of


the following would you use to do this?

When opening and working with multiple versions of a document, how

Word displays a

O1 can you tell which is the most recent version?

list of the dates

00

and times each


file was saved.

Various fields are added to a regular document to create a special

Fields

O1 document called a form through the ____________ toolbar.


01
W
O1
02

Which of the following types of fields CANNOT be inserted into a form?

Check boxes

Which of the following is TRUE related to editing comments in a Word

O1 document?

Comments cannot
be edited.

03

What is a header in a document?

Text at the

O1

bottom of every

04

page

In your English essay you notice that the paragraph at the bottom of

Press tab.

O1 page 1 continues on to page 2. You would like to make this paragraph


05 start on page 2.What would be the best way to do this?
W

Tables in a document help you to easily arrange all of the following

text.

O1 EXCEPT:
06
W

To identify a document, it is helpful to include the file name on each

header/footer.

O1 page as a
07
W

Which of the following tools will copy the formatting of selected text to

Copy button

O1 other places?
08
W

What is the name of the process of determining the cause of errors in a

Fault Finding

O1 macro?
09
W

Drop caps are added to a Word document using the ___________ menu.

Insert

A reverse in a newsletter is:

a section of white

O1
10
W
O1

text on a black

11

background.

A pull quote is best emphasized by:

O1

setting it in larger
type or font size.

12
W

Which of the following definitions is CORRECT?

The reverse

O1

technique means

13

to add dark text


on a light
background.

Pertaining to newsletters, which of the following cannot be changed

O1 using the Columns command dialog box?


14

The width of each


column

As related to type size, how many points are there to the inch?

O1
15
W

Assume you are working on a newsletter in which the masthead extends One

O1 across the top of the entire first page. The rest of the newsletter has
16 two columns. What is the minimum number of sections in the
newsletter?
W

Which of the following is NOT correct with respect to page, column, and Press Ctrl+Enter

O1 section breaks?

to create a page

17

break.

Which of the following would be the most appropriate font for a

O1 newsletter headline?

A serif font at 10
points

18
W
O1
19

Which of the following is the default Word column width?

2 inches

op2

op3

op4

ans

Office 2000

Office 97

Back Office

double click

drag & drop

none of the

above
cut

select

none of the

above
shift+left and

ctr+end and

none of the

shift+right

ctr+home

above

normal layout,

web layout, page

none of the

web layout

layout

above

templates

click from start

none of the

program, MSWord

above

B
A

from the task menu


inbox assistant

document assistant none of the

above
Tool Tip

Icon Tip

Document Tip A

marginal stop

ruler

none

page up keys only home and end keys up and down

B
D

only

arrow

center

decimal

rotation

model

dialogs/alerts

none

decrease indent

both A and B

none of the

above
control tool box

design wizard

pictures

control box

database

forms

11

printer setup

print preview from

from the file

the file

above

style box

none of the

none of the

menu
shading

above
Del

ctrl+f

ctrl+m

Del

ctrl+f

ctrl+m

CTRL+O

CTRL+SHIFT+S

CTRL+SHIFT+ A
P

ctrl+o

ctrl+shift+s

ctrl+shift+p

ONLINE LAYOUT

PAGELAYOUT

ONLINE

DOCUMENT

ctrl+2

ctrl+end

ctrl+home

ctrl+c or ins

ctrl+x or ins

ctrl+v or Del

ctrl+5

ctrl+1

none of the

above
Frame

AutoShape

Border

Screen Tips

Page Layout

none of the

above
WordArt

Auto Shapes

File

Shading

WordArt

Bullets

remove all

remove

clear all

arrow bullet

circle bullet dialog

none dialog

dialog box

box

box

WordArt

AutoShapes

files

document1

new document

default

document
hyphenation

mail merge

none of t he

above
thesaurus menu

shift+f8

tools+spelling A
menu

second

first row

last cell of the A


t able

end

enter

none of the

above
convert data to

table auto format

none of the

table

option

above

rows & columns

records

none of the

above
AutoFormat

style gallery

none of the
above

Macro

Data Source

none of the

above
visual basic

vj++

visual FoxPro

shift+f7

alt+f8

alt+f5

online layout

browser

none of the

view

above

outlook express

micro soft outlook

hotmail

xml

sgml

vb script

intranet

arpanet

LAN

the field

field names in the

the number of B

separators in a

header source must fields names

header source

match any merge

in the header

and the data

fields you've

source must

source can not be inserted in the main be the same


set as paragraph

document

as the number
of data fields
in the data
source

auto format

by default cell

delete cells

option applies to

height and weight

option allows

the entire table

option applies to all to delete the

and not only to

the rows and

entire row or a

the selected rows columns of a table

column or

or columns of a

shift cells up

table

or shifts cells

decimal

left
top

In order to type a If a header is

A section is a

header from the

inserted in the

portion of a

third page of the

second section

document in

document a

then the same

which certain

section break is

header is

page

inserted after t

applicable to the

formatting

he third page

first section

option can be

justified

set
false

false

false

click -n-type

Double Click

none of the

above
false

prohibits the user automatically

with t he caps B

from renaming an corrects the

lock key

auto correct

grammatically

accidentally

entry

errors

turned on
reverses the
case of the
letters that
were
capitalized
incorrectly
and then turns
off the caps
lock

password

password are not

password can B

protected

case sensitive

be upto 15

document can be

characters

opened without

long

password as read
only
justified

hanging

top

a document file

a multiple

an .xls data

can be inserted in documents files

can not be

the current

can be inserted in

inserted at

document at

the single

specified

specified position document

position in the
current
document

false

false

false

false

Child Document

Page Layout

Hyperlink

none of the

Document

above

Outline Layout

none of the

above
Type Over mode

Remove

none of the

above
press the tab key press the escape

lines and spaces

just keep

key

typing

height and width

rows and

columns
enter/return

backspace/ delete

shift

spell checker

thesaurus

outliner

send pictures to

send private

send a

a friend

messages to a

package to a

friend

friend

From ___ To ____

Page setup

Print preview

Copy

Retrieve

Save

tabbing

spacing

sorting

graphing

word processing

spreadsheet

Creating and

Storing information None of the

editing

above

documents
annotation

clip art

Creating and

Storing information Making

editing

clipboard

Calculations

documents
Spelling,

Cut, copy, paste

Font,

grammar and

and clear

Paragraph,

autocorrect

Bullet and
Numbering

Numbers which

Text which appear

Designated

appear on every

at the top of every

area on the

page

page

document

Keyboard, Mouse, Monitor, keyboard

None of the

monitor and

and mouse

above

microphone

digital

printer
clip-art file

scanner
Spelling,

Cut, copy, paste

None of the

grammar and

and clear

above

10 point

15 point

25 point

2 inches.

3 inches.

impossible to

autocorrect

determine.
You have not

You have not

inserted a column specified


section break..

Word cannot

display

continuous section columns


breaks.

during editing;
you will see
them only
when you
print the

to store a file on

to move a section

document.
to leave an

a diskette

of text from the

original

original location to

section of text

another location

in place while

pasting a copy
elsewhere
Mainly text

Spell Checker

A set of different

None of the

graphics

above

Grammar Checker

Find and

Replace
Replace

Select all

AutoCorrect

Cut, then paste

Delete, then paste

Insert, then

paste
To give the

To complicate the

To allow

original author a

revision process

multiple

chance to reject

and to force the

people to

suggested

author to spend

work on one

changes from the more time making

document in

person who

collaboration

corrections

entered the

with one

revisions

another

A red underline

A vertical line

Comments are D

appears beneath

outside the left

enclosed in a

text that is to be

margin signifies a

text box at

added.

change has been

the right of

made at that point

the document.

in the document.
Through the

Through tools on

Both through

Tools menu by

the Reviewing

the Tools

choosing Track

toolbar

menu and the

Changes

Reviewing

command

toolbar

The Versions

The Versions

The Versions

command will

command will allow command will

allow you to save you to save only

allow you to

only one version

one version of a

save only two

of a document,

document without

versions of a

including any

any changes that

document:

changes that may were just made to

one version of

have been made

the original

the document.

to that document.

and one
version of any
changes made
to the
document.

The latest

The first and

The previous

version is opened second versions

version is

automatically.

are opened

opened

automatically.

automatically.

Grammar check

Spell check

Thesaurus

The most recent

Word will show the

Word is not

version will

name of the person able to tell the

appear at the

who saved each

bottom of the list. version.

most recent
version of a
document.

Tools

Forms

Insert

Toggle button

Text fields

A drop-down

list

Comments

Comments can be

Comments

cannot be

edited or deleted by can be edited

deleted.

right clicking the

or deleted by

highlighted text.

left clicking

the
highlighted
text.
Numbers which

Text which appear

None of the

appear on every

at the top of every

above

page

page

Press Return.

Copy and paste.

Insert page

break.
graphics.

forms.

numbers.

bibliography.

find/search.

macro.

Paste button

Format Painter

This action is

button

not possible.

Bug Squashing

Error Injecting

Debugging

Tools

Format

Edit

a section of text

the guidelines used an enlarged

where the first

to establish where

capital letter

letter of each

different elements

at the

sentence is

of the newsletter

beginning of a

lowercase and

will go.

paragraph.

the rest are


uppercase.
typing it all in

underlining the text changing the

capital letters.

of the pull quote.

color.

A pull quote is a

A dropped cap is a

A grid is a set D

quotation taken

word that starts

of horizontal

from (pulled) from with a lowercase

and vertical

another

letter when it

lines that

document.

should have a

determine the

capital letter.

placement of

elements in a
newsletter or
other
document.

The height of

The number of

The tab

each column

columns

spacing within
each column

10

12

72

Two

Three

Four

Press

Press Enter to

Press

Ctrl+Shift+Enter

create a section

Shift+Enter to

to create a

break.

force a line

column break.

break.

A sans serif font

A serif font at 20

A sans serif

at 10 points

points

font at 45

points
3 inches

4 inches

It depends on
the left and
right margins,
and how many
columns are
specified.

q_id

EX1
EX2
EX3
EX4
EX5
EX6
EX7
EX8
EX9
EX10
EX11

EX12
EX13
EX14
EX15
EX16
EX17
EX18
EX19

q_desc

The wizard that is used to import text files is_________________


The alphabet indicating the column followed by the row number is known
an__________

op1
text import
wizard
cell
reference

Which of the following files could not be opened in excel _______________


In excel, the dates that are stored as sequential numbers known as
________________-

text files

The command to display the current date in a cell is _________________


In excel, absolute references are represented by a ________ before the column
and row addresses
The ________ can be used to select the function and assemble the arguments
correctly
Specific parts of information required by functions to perform certain tasks are
called as___________
Which of the following do not belong to the formula category in excel
environment__________

=today()

The function that in used to join cell values together in a single cell ________
The function that is used to count all the values that meet specific criteria
_________

concatenate

The wizard that is used to create and edit charts _______________


The function that is used to calculate the payment for specific loan terms
____________
The function that is used to add together all values that meet specific criteria is
known as ____________
The __________ option present in the file menu options is used to specify major
facts of the page to be printed

serial values

dollar sign
AutoSum
variables
text

countif
pivot table
wizard
sumif
average
page setup

The command that is used to apply a format automatically __________


autoformat
The ____________ makes the information in a worksheet meaningful and easy to
understand
bordering
A particular part of a work sheet can be printed by setting the _________
page setup

EX22

The process of finding or selecting information is known as ____________


The option that is used to cancel the filter process for a specific column and
display all the records is ________
There are _________ types of data tables
The tables that allows the user to change or rearrange the data, summarize the
data and evaluate the data using changing points of view is known as

EX23

The wizard that is used to suggest hints for doing a task

EX24

In a chart Y-axis is known as_________

pivot table
wizard
series or
rank

EX25

In a chart X-axis is known as_______________

series or rank

EX20
EX21

filtering
all option
1
data table

EX26

_________ is a set of tables that describe each of the data series

series or rank

EX27
EX28
EX29

________ is used to differentiate one data series from another


The chart that contains only one data series is _________
The chart that holds the column chart is _________

series or rank
column chart
column chart

EX30

The chart that display two or more data series on a surface is _________

EX31

The chart that is used to display discrete data

column chart
column
chart

EX32

_________ are not allowed in a macro name

spaces

EX33

Which of the following tool cannot be used to view the excel web page_______

excel97

EX34
EX35

The wizard that used to build an interactive table from data existing on sheets
The chart that is used for displaying stock market information
In excel, the subtotal command also generates grand total after the last group
subtotal_________
In advanced filter , the criteria occupying multiple columns but more than one row,
is considered as an ________ criteria.

EX36
EX37
EX38
EX39
EX40

EX41

The stacked bar graphs can be represented in __________


A pie chart can represent only one data series at a time
The ______ generates a summarized report in tabular form in an interactive
manner

pivot table
wizard
line chart
true
and
3dimensions
true
Data table

It is also
called as highlow-close
chart

EX44

Which one of the following statements related to stock chart is NOT TRUE ?
The state government needs to finalize a five years plan to implement 100%
literacy in the state. Which one of the following will be the best tool that should be
used to work out the plan ?
Pivot table
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC
party needs to won in totality to obtain majority to form the government. Which
one of the following will be the tool that will help the team ?
Goal seek
Which one of the following will be the tool that provides a way to view and
compare the results of all the different variations together on the worksheet ?
Goal seek

EX45

A ___________ is an excel file where the user stores his data

Workbook

EX46

Spreadsheets are useful for _______________

Performing
calculations.

EX47
EX48
EX49

Which one of the following is NOT the component of the pivot table ?
Excel allows upto ______ levels of sorting
Filtering rearranges a list to display the required records

Column field
two
true

EX42

EX43

EX50
EX51

The stacked bar graphs can be represented in _____________


The ______ generates a summarised report in tabular form in an interactive
manner

3dimensions
Data table

EX54

It displays the
data series
Which one of the following statements related to stacked bar chart is NOT TRUE one on top of
?
the other.
The state government needs to finalize a five years plan to implement 100%
literacy in the state. Which one of the following will be the best tool that should be
used to work out the plan ?
Pivot table.
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC
party needs to won in totality to obtain majority to form the government. Which
one of the following will be the tool that will help the team ?
Goal seek

EX55
EX56

Which following function is used in subtotal option ?______________


A workbook consists of many ________

Count.
databases

EX57

Which two of the following statements related to pivot table are TRUE ?

It is a tool
for
summarizing
and
analyzing
the data
records in
an
interactive
manner.

EX58

Which one of the following is NOT a What-if analysis tool ?

Goal seek.

EX59
EX60

The _________ wizard separates contents in a cell into different cells


A spreadsheet is a grid of rows and columns and is called as a ________

EX61

Pick out the window that is not a form of excel ___________

EX62

On an Excel sheet the active cell is indicated by


Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8.
The contents of cells A6, A7, and A8 are _____.

EX52

EX53

EX63

text import
wizard
worksheet
application
window
A dark wide
border
8,16,32

your formula
has a syntax
error
ability to
generate
tables

EX64

If a cell shows ####### , it means that _____.

EX65

Which is not an advantage of using computerized spreadsheets?


The gym teacher has a new program to calculate physical fitness in terms of
weight and exercise. The use inputs different weights or amounts of exercise to
determine the related physical fitness. This "What if" program is most likely which word
of the followin
processing
The difference between the highest and the lowest values.
Range
Producing
Spreadsheets can be used for...
graphs

EX66
EX67
EX68

double-click
any cell in the
column

EX69

To select a column the easiest method is to

EX70

ENTER

EX71

If you press _____, the cell accepts your typing as its contents.
The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known
as

EX72

All of the following are considered constants EXCEPT:

EX73
EX74

Which of the following may NOT be included in a formula?


Which of the following is NOT a valid mathematical operator in Excel?

100
Cell
references
^

EX75

Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first?

B5*B6

EX76

Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?

E12

How can you tell which cell in a worksheet is the active cell?

It is
surrounded
by a heavy
border.

How can you change the active cell?

By clicking in
a different
cell

EX77

EX78

array.

The Standard
toolbar
the New
command on
the File
menu.

EX79

Which of the following would you use to change the font size of a cell in Excel?

EX80

EX84

The command that will save the current workbook with a different file type is:
The command that will print an Excel workbook is found on the ____________
menu.
In the Save As and Open dialog boxes, the ___________ view shows the file size
as well as the date and time a file was last modified.
Which of the following commands will automatically adjust cell references in
formulas?
Which of the following commands will remove cells, rows, or columns from a
worksheet?

EX85

Which of the following options is NOT controlled through the Page Setup
command?

Clear
Orientation
(portrait or
landscape)

EX86
EX87
EX88

Which command enables you to change the margins for a printed worksheet?
All commands are carried out on a rectangular groups of cells known as a:
Which of the following is a valid cell range?

Options
worksheet.
6

EX89

In a copy operation, the cell(s) you are copying from is called the:

copy range.

EX90

In a copy operation, the cell(s) you are copying to is called the:

paste range.

The Duplicate
command
absolute
B4

EX95

Which of the following commands is needed to duplicate the contents of a cell in


another?
A cell reference that does not change during a copy operation is known as
Which of the following is considered an absolute cell reference?
Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are
copied to cell E4, what will be the contents of cell E4?
Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3
are copied to cell E4, what will be the contents of cell E4?

EX96

Which of the following commands is needed to transfer the contents of one cell
range to another?

The Move
command

EX97

The F4 key is used to:

copy and
paste cells.

EX98

Which of the following quickly copies the formatting of a selected cell to other
cells?

the Fill
Handle

EX81
EX82
EX83

EX91
EX92
EX93
EX94

File
Preview
Insert

#DIV/0!
#DIV/0!

Which of the following will insert a hyperlink into an Excel worksheet?

Select the
Insert
Hyperlink
command
from the File
menu.

EX100

Conditional formatting applies formatting to a cell based on:

whether the
cell has a
formula or a
value in it.

EX101

If you enter a date into a cell, Excel stores the date as:

text with a
two-digit year.

EX102

You created a worksheet on July 30 and entered the =Today() function in cell
E17. You opened that worksheet again on August 31. What will be displayed in
cell E17 on August 31?

EX103
EX104

The number of days between two cells containing dates can be calculated by:
The function key that is used to quickly edit the contents of a cell is:

Jul-30
subtracting
the earlier
date from
the later
one.
the F4 key.

EX105

What will be stored in a cell if 3/4 is entered in it?

03-Apr

EX106

A users response to the InputBox function can be stored in:


The cell reference for a range of cells that starts in cell B1 and goes over to
column G and down to row 10 is _____.
The teacher has a spreadsheet showing all Year 10 students and their marks in
one Mathematics test. To find the student with the highest mark, which of the
following functions should be used?
Which chart type best shows proportions of a whole?

EX99

EX107

EX108
EX109

a cell on a
worksheet.
B1-G10

AVERAGE
Combination

EX110

Which of the following is TRUE regarding chart types?

Once a bar
chart is
chosen it
cannot be
changed to a
column chart.
hold down
the CTRL
key

EX114

To select several cells or ranges that are not touching each other, you would
_____ while selecting.
Your Institute teachers have set an assignment on Studies. You are required to
use a spreadsheet to record all that you study on each day for four weeks. You
decide to show each weeks data with an accompanying graph. What is the best
way of doing this
Use tables
What would be the best method to quickly copy the formula from the active cell to
each cell below it?
Paste
To arrange rows in alphabetical order based on column A, you need to use the
command _____.
Tools | Sort

EX115

What can you NOT do with a spreadsheet?

EX116

To print just part of a sheet, you would select what you want to print and _____ .

EX117
EX118

Spreadsheets can be used for...


The formula that will add the value of cell D4 to the value of C2 and then multiply
by the value in B2 is _____.

EX119

Which of the functions is not valid for performing addition

EX120

The default orientation for the printed page is _____.

portrait

EX121

Which is not a valid cell address?

AD213

EX111

EX112
EX113

Analyse data

click the Print


button
producing
graphs
(D4+C2)*B2

op2
op3
convert text to
columns
wizard
tip wizard
column
row reference reference
quattropro or
Lotus 1-2-3
xbase files
domain
values
range values
=currentdate(
=date()
)

op4
function
wizard
none of the
above

ans

A
A

class files
reference
values
none of the
above
none of the
above
none of the
above
none of the
above

Boolean
none of the
above

pmt
count
convert text to
columns
tip wizard
chart wizard wizard
none of the
countif
above
pmt

sum

sumif

print area

print
none of the
above

' = ' sign


AutoFill

# sign
function
wizard

arguments

parameters

logical

numeric

pmt

merge

vlookup

AutoFill

countif
none of the
above

D
A
A
C
B

B
B

A
A

formatting
print area

shading
print

searching

sorting

none of the
above
print preview
none of the
above

blanks
2

all blanks
3

none
4

filtered table

chart wizard

index table
pivot table
convert text to
columns
wizard
tip wizard

category

legend

data marker

category

legend

data marker

B
B
A
A
B

category

legend

data marker

category
bar chart
bar chart

legend
pie chart
pie chart

data marker
surface chart
surface chart

D
C
B

bar chart

pie chart

surface chart D

bar chart
wild card
characters
internet
explorer

pie chart

surface chart
none of the
above

chart wizard
bar chart

symbols

Netscape
word 2000
convert text to
columns
wizard
tip wizard
stock chart pie chart

A
A
A

A
C

false

or

Multi4-dimensions dimensions
false

A
A

Pivot table

It shows
trends over
time

It is often
used to
display share
market prices
over a period
of time

It is also used
for indicating
fluctuations in
temperature
changes
B

Scenario
manager

Solver

Data table.

Scenario
manager

Pivot table

Data table.

Pivot table

Solver

Data table.
none of the
Spreadsheet above
Performing
All of the
text
formatting.
above
Source table Pivot table
item.
name.
N

Worksheet
Performing
database
operations
Row field.
three
false

D
C
B
B

Multi4-dimensions dimensions

Pivot table

It is useful
when several
components
are changing
and the user
is interested
in the sum of
the
components.

It can be
represented
in 3dimensions

Scenario
manager

Solver

Data table

Pivot table

Data table

SumIf
tables

worksheets

A
D

Scenario
manager
Standard
deviation
records
It is a tool that
provides a
way to view
and compare
the results of
all the
different
variations
together on
the worksheet
Scenario
manager
convert text
to columns
wizard
workbook
document
window
A dotted
border
2,4,2

It summarizes
the data by
using
analytical
functions.
solver

tip wizard
tables
modal
window

A
Pivot table

function
wizard
database

B
A
C

No border

A blinking
border

2,2,2

6,8,10

the column
the row is too is too
short to show narrow to
the number at show all the
digits of the
the current
font size
either b or c
C
number
flexibility of
cost of initial
speed of
moving
calculation
entries
D
set-up

graphical
Address

database
Gap
Drawing
Writing letters pictures
drag from the
top cell in the
column to the click the
last cell in the column
column
heading
CTRL +
ENTER
TAB
function.
(201)5551212.

constant.

Functions
/

#VALUE!
Numeric
constants
*

C3/D4

D4^2

spreadsheet
Rows
Document
filing

D
A
A

click the
column label

INSERT

formula.
Tom
McKenzie.
Text
constants
\

B
C
D
D

It is impossible
to determine. C
G7*SUM(H9:H
SUM(H9:H11) 11)
B

It is blinking.

The phrase
It is displayed active cell
in reverse
appears in the
video.
Status bar.
A

By either
clicking in a
different cell
By using the or using the
arrow keys to arrow keys
to move to a
move to a
different cell different cell

By typing the
reference of
the cell you
want to move
to in the
formula bar

The Cell
Format
command on
the Edit menu
the Save As
command on
the Save
command on the File
the File menu. menu.

The Font Size


command on
the Tools
menu.
B

Edit

View

Window

Details

Properties

Clear

Delete

List
Both Insert
and Delete
Both Clear
and Delete

Remove

Headers and
footers

Fonts

Margins

Page Setup
range.
D12, G25
destination
range.
destination
range.

View
group.
D12:G25

Edit
cell group.
D

B
B
C

clipboard.

source range. D

clipboard.

The Copy
command
relative
$B4

The Paste
command
mixed
B$4

source range.
Both the
Copy and
Paste
commands
constant
$B$4

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

The Cut
command

The Paste
command

#DIV/0!
C
Both the Cut
and Paste
D
commands

The
Formatting
toolbar

Delete

edit cells.
the Format
Painter

cycle
through
absolute,
relative, and
mixed cell
references.
the
Formatting
toolbar

the File Type


command on
the File menu. C

D
A
D

cycle through
open
applications.

Conditional
formatting

Click the
Insert
Hyperlink
button on
the Standard
toolbar.

the cell
address.

Right-click a
cell and click
the Edit
Hyperlink
command.
whether the
cell has an
absolute or a
relative cell
reference.

Double-click a
cell and click
the Insert
Hyperlink
command.
B

the value in
the cell

text with a
four-digit year. an integer.

text with either


a two-digit or
four-digit year,
depending on
the format.
C

Aug-31

29/03/2008

It is impossible
to determine
from the
information
given.
B

adding the
earlier date to
the later one.
the F2 key.

subtracting
the later date
from the
earlier one.
the Esc key.

adding the
later date to
the earlier
one.
the F1 key.

0.75

March 4 of
the current
year

Either 3/4 or
.75, depending
on the cell
formatting
C

a variable.

a constant.

either a cell
on a
worksheet or
D
a variable.

B1.G10

B1;G10

B1:G10

COUNT
Line

MAX
Pie

SUM
Scatter

C
C

A
B

Once a line
chart has
been chosen
it can be
changed to a
D
pie chart.
hold down
hold down the hold down the CTRL +
SHIFT key
ALT key
SHIFT
A
Once a
column chart
is chosen it
cannot be
changed to a
bar chart.

Once a pie
chart has
been chosen
it cannot be
changed to
line chart.

Transfer
Create four
information to Use multiple
separate files a database
sheets
Paste Special
none of the
choices
Data | Sort
None of the
Calculate data Create forms above
select Print
select Print
selection on selection in
press the
Page Setup | the Print
dialog and
PRINT
Sheet and
SCREEN key then print
then print
drawing
None of the
writing letters pictures
above
Fill Down

Fill Right
Edit | Data |
Sort

D4+C2*B2
#VALUE!
=A3SUM:B3S
UM:C3SUM REF!
whatever was
landscape
last used
ZA1

A0

D
B
B
C

D
A

=(B2*(D4+C2) C
None of the
above
B
vertical
None of the
above

A
C

q_id

DB62

q_desc
In MS-Access, while using form design view, for creating a command button for adding
a new record, we should select the _______ category from the command button
wizard

DB63

_______ form displays fields in a single horizontal row

DB64
DB65

The process of arranging the data in a meaningful order is known as ___________


______ are used to select only some particular records from the table or any other
database objects

DB66
DB67
DB68

In MS-Access, user may specify criteria for filter in form view using _________
___wildcard character represents any single character
Records cannot be sorted by a primary key

DB69
DB70

A control without a data source is known as ___________


Set of related option buttons, check boxes and toggle buttons is known as
_____________

DB71

The collection of related data and objects is called a ____________

DB72
DB73
DB74

Which of the following is control types ____________


In MS-Access, the function that gives the current date is _____________
_____is a control that lists set of data

DB75

______is a form that summarize large amount of data

DB76

______allows to create a filter by typing the value in a data sheet

DB77

Wizards for toolbox controls are called a __________


The wild card representation for any 5 letter word that starts with ram is
________________
Look up fields slow up data entry
____is an access object that displays un-editable data

DB78
DB79
DB80
DB81
DB82
DB83
DB84
DB85
DB86
DB87
DB88

_____option from the new object toolbar gives the easiest way of generating a report
______ represents data in a pictorial format
Changes of one table can be carried over to another related table
Hyperlinks are used to jump to any kind of information or data from a file
The memo field can have text upto_____ characters in length
In MS-Access, columnar layout can be used to view multiple records in a form
In MS-Access, alter command may be used in adding a primary key to a table
Update query is used to add records from one or more tables to the end of an existing
table

DB89
DB90
DB91
DB92

In ms-access, datasheet view is available in ___________


______are used to jump to any kind of information from a datasheet or a form
Home page will always be present as a first page of an application
Make table queries create a new table from the records of another table

DB93

In ms-access, to protect a database file from illegal access, we may set database
password. The option of setting database password is available in _______ menu

DB94
DB95

Foreign key is a field that uniquely identifies each record and accept no null values
Data definition queries are used to create or change database objects

DB96
DB97
DB98
DB99

The attributes of a composite key are known as ________


OLE object is a data type in access
Data displayed in forms cannot be edited
A sub form is used to display one to many relationship between tables

DB100
DB101
DB102
DB103
DB104
DB105
DB106

We can switch from datasheet view to form view by selecting view -> form view option
In MS-Access long integer is a datatype
In MS-Access, while designing a table for a particular field, the Required parameter is
set to yes. This validates the field as _______
Sorting is applied to select only some particular records
Filter by form can be created from a forms shortcut menu
Advanced filter uses a filter similar to the query design window to create a filter
? Wildcard character represents any number of characters

DB107
DB108
DB109
DB110

_________ of the following is/are a type of chart


A bound control is tied to a underlying query or table
A calculated control uses expression as a source of data
Text boxes cannot be bound controls

DB111
DB112
DB113
DB114
DB115
DB116
DB117
DB118
DB119
DB120
DB121
DB122

The default query invoked by ms-access is


A control can be bind to a record using row source property
List box is a control that offers a list of choices
If a table is joined to itself it is called a ________________
A picture box combines the activities of both a text box or a list box
Line is a tool box control
Text boxes can be part of a option group
_____ chart exists as a separate object
Filtering data is a way of arranging data in a meaning full order
Wild card characters are used for sorting records
Pivot tables are used to navigate to the other tables in a database
Reports are used to represent un-editable data

DB123
DB124
DB125
DB126
DB127
DB128
DB129

In MS -Access, the records in a table are sorted based on _________


Relationship is an association between _________
Summary options dialog box is used to summarize data
______ queries can be used to delete a group of records that meet some specific
records
Charts can convert numerical data in a easily understandable format
Embedded charts exist separately
The chart which cannot exists as a separate entity are _______________

DB130
DB131
DB132

From ms - access, if we want to view the records stored in a table in ms - excel


worksheet, we need to
Page header is present at the beginning of each record
Detail section has a header and footer

DB133
DB134
DB135

A macro is performed only when the user initiates an event


The macro is selected from the action field of a macro sheet
A macro can be made to execute before the starting of a database

DB1
DB2

_________ data type is generally used for fields assigned as primary keys in a table
MS access objects can be published in the web

DB3
DB4

In code-builder, got_focuse, click,dbl_click,enter are examples of _______


_______can be used to automate certain actions in response to events

DB5

In the macro sheet the macro is selected in the _____field

DB6

To build complex expressions_____is used

DB7

The three list boxes present at the bottom of the expression builder are called_____

DB8
DB9
DB10
DB11

________option is selected from the view menu to create macros with conditions
_______report can be created with minimum user input
_______layout of a form displays one record at a time
The table or query name on which we are going to build our report is selected from the
____ dialogue box

DB12
DB13
DB14

______and_____are the two types of auto reports available


There are no wizards for creating a database in access
______option from the insert menu option is chosen to add an embedded chart

DB15

In ms-access, while using SQL, references constraint is used for creating _______

DB16

_______is used to create a mailing label

DB17

______header is present at the beginning of the report

DB18

______is present at the bottom of each page in a report

DB19
DB20
DB21

In SQL, having clause is used for _________


______field is added to the macro sheet when we select grouping option from the view
menu
______can be used to create toolbars

DB22

_______query is used to add records from one or more tables into an existing table

DB23
DB24

_______window is used to write VB code in access application


Values for other tables, queries are maintained in look up fields data type

DB25

Visual Basic language is a _____ tool

DB26

______ function is used to display a message box


Other ms-office applications can be accessed from ms-access using a concept called
________

DB27

DB28

OLE stands for_____

DB29
DB30
DB31

The application that supplies data in OLE is called an _________


If any change made on the object from the client side is reflected on the server then
the object is said to be _____
_______is the file format that works on internet

DB32

______ is used to convert any ms-access object into html format

DB33

_______ option in publish to web wizard produces a page that is static in nature

DB34
DB35

_______query is used to create or change database objects in a current database


Currency fields express the amount in _________

DB36

_______is selected from the toolbar to add an OLE object


To display an OLE object in the form of an icon ____ option is selected from insert
object dialogue box

DB37
DB38

DB40
DB41

_______option from the file menu is selected to run 'publish to the web wizard'
_____page in an web application is used to navigate to the rest of the pages in the
application
______ is fired when an event is triggered is the concept based on a Visual Basic
language
Ms access is a ___________

DB42

A collection of data stored in different objects is known as a _________

DB43
DB44

A blank database can be created using __________


Text type data can be of _____ characters in ACCESS

DB45
DB46

______is a datatype that assigns values automatically


Tables cannot be imported from other databases

DB47

If two tables having same values for the fields are joined it is called an ______

DB48

Duplication of records in a field won't be allowed if the fields are declared a________

DB49

Changes from a master table can be reflected on to the child table by selecting
_____option

DB50

To see more than one record at a time in a form we use _______

DB51
DB52

In SQL, delete command is used to remove _________


In MS-Access, filter excluding selection will display only those record(s) which meet the
criteria.

DB53

Properties of the fields are managed by _____ in Dynaset

DB39

DB54
DB55
DB56
DB57

______queries allows us to view data in row by column manner


The type of queries that can update or delete record(s) in a table(s) are called
__________
Joining tables without any matching values in the fields is called ____________
Primary key uniquely identifies each record

DB58
DB59

Which of the following dialog box is/are used in the creation of form ________
_______ query wizards are used to generate summary calculations for a table

DB60
DB61

Properties of a form can be changed by selecting ______from view menu options


Forms that are included in other forms are called ______________
In MS-Access. While appending records, the source and the target table must have
similar structure and fields
We can add our own functions to the expression elements list box of the expression
builder
_______is the wildcard character which represents the presence of any number of
characters
Macros can be used to add a menu to a database object
_____ header is a unique feature of reports
Chart can either be a form or a report
Group header will be present at the design view of a report even if the report is not
grouped
We can change from the design view to the form view without being prompted for
saving the changes made
Charts can be produced without the wizard
Macros can be used to create user defined error messages
Between and Not Between is ______ type of operators
The default data type of VB is integer

DB136
DB137
DB138
DB139
DB140
DB141
DB142
DB143
DB144
DB145
DB146
DB147

DB148
DB149
DB150
DB151

Visual Basic is based on __________


_______is the name of the database object that displays data and can be used to edit
data
In access OLE objects cannot be linked
_____ section is present for each record in the report

DB152
DB153
DB154

A ________ sheet lists all the properties that pertain to the form or the controls
Textboxes can also be an example of unbound control
In MS-Access, we may design command buttons for navigating records

DB155
DB156
DB157

_______are forms that are included in other forms


_______ are used to represent our data in graphical format
A field with a _______ uniquely identifies each record

DB158

Large amount of data can be summarized using ______ tables

DB159

_______ are employed to select only some particular records from a database object

DB160
DB161

______ control need not have a data source


______ control combines the functionality of both a text box and a drop down list

DB162

MS access is a DBMS

DB163

A form can be bind to a record source using _____ property of the form

DB164

______ forms displays field in single row

DB165

______ forms are usually used for tables with one to many relationship

DB166
DB167

_______ control uses an expression as a source of control


_______ control is tied to field

DB168

_______is the form that can be created with minimum input from the user

DB169

______option from the tool menu is selected for setting relationships between tables

DB170

______,______and_____are the buttons belonging to the options group

DB171

_________allows us to create a filter from a field short cut menu

DB172
DB173

________is a database object which displays data but cannot be used to edit data
What term applies to a collection of related records in a database?

DB174

All of the following terms are related to computerized databases except which one?

DB175

What is a database?

DB176

What does a record contain?

DB177

An RDBMS is a

DB178

Data Warehousing refers to

DB179

Unauthorised alteration of on-line records can be prevented by employing

DB180

What is a database?

DB181

What does a record contain?

DB182

What is a report?

DB183

What is the best way to analyse and change data

DB184

What are some popular office orientated software applications?

DB185

Which of the following constraints can be used to enforce the uniqueness of rows in a
table?

DB186

Which of the following commands is used to change the structure of table?

DB187

An RDBMS is a

DB188

Data Warehousing refers to


You are creating a client application that calls ActiveX DLLs. Which of the following
properties of the Err object provides the name of a component that sends an error
back to the client application?

DB189

DB190

DB192
DB193
DB194

This database holds personal information. The user can help to keep it confidential by
If the database holds customer names and addresses, personalised letters can be
created automatically using
Application software suited to storing the survey information obtained in the table
would be
The characters * and ? are sometimes used in search criteria as
Which of the following field types will generate the primary key automatically?

DB195

Referential integrity ensures that the:

DB191

DB196

Tables are related to one another through a:

DB197

A foreign key is:

DB198
DB199

You are creating a banking database to track customer loans. The bank will, of course,
have many customers, each of whom may take out one or more loans, while each loan
may be associated with only one customer (there are no joint accounts). What is the re
In a one-to-many relationship between Companies and Employees, which field is found
in both tables?

DB200

Which of the following ensures that records in related tables are consistent with one
another? For example, it ensures that you cannot add a record with an invalid foreign
key.

DB201

How would you delete a relationship between tables in the Relationships window?

DB202

In a Customers tables, what does a plus sign next to the CustomerID field mean?

DB203

What is required of the fields that join two tables?

DB204

Assume a one-to-many relationship between the Customers table and the Loans table,
with referential integrity in effect. What happens when you attempt to delete a
customer ID from the Customer table that still has entries in the Loans table?

DB205

Which of the following is true when viewing a main form and its associated subform in
the Form Design view?

DB207

Which of the following relationships does not belong in a database based on a


professional sports league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the many
side of a one-to-many relationship?

DB208

You have created a one-to-many relationship with referential integrity between a


Customers table and a Loans table. From which table can you delete a record?

DB209

The correct order of the arguments for the MsgBox statement is:

DB210

The first statement in a procedure named CreateList is:

DB211

Which of the following is TRUE related to form fields?

DB212

A text field:

DB213

The purpose of a database is to:

DB214
DB215

A database stores:
A database records:

DB206

DB216

A sales contact manager used by a salesperson is an example of _______________

DB217

A Customer Resource Management (CRM) system is an example of_________

DB218

The industry standard supported by all major DBMSs that allows tables to be joined
together is called __________.

DB219
DB220

A program whose job is to create, process and administer databases is called the
_____
Microsoft Access may use which of the following DBMS engines?

DB221

Which of the following are basic components of an enterprise-class database system?

DB222

In an enterprise-class database system ________ .

DB223

In an enterprise-class database system, the database application ___ .

DB224

In an enterprise-class database system, reports are created by


____________________ .

DB225

A database is considered "self-describing" because _______ .

DB226

In an enterprise-class database system, the database _________ .

DB227

A database may contain _________________________ .

DB228

A database designed using spreadsheets from the Sales department is a database


being designed _________________________ .

DB229

A database designed to implement requirements for a reporting application needed by


the Sales department is a database being designed _______ .

DB230

A database designed to combine two databases used by the Sales department is a


database being designed _________________________ .

DB231

Database professionals use ________________ as specific data sources for studies


and analyses.

DB232

Database professionals use a set of principles called ________________ to guide and


assess database design.

DB233

A very popular development technique used by database professionals for database


design is known as _______________________ .

DB234

A very popular development technique used by database professionals to adopt a


database design to new or changing requirement is known as _____ .

DB235

The predecessor(s) of database processing was (were) __________ .

DB236
DB237

In a relation __________________________ .
An attribute is also known as a(n)

DB238

A combination of one or more columns used to identify particular rows in a is___ .


A combination of two or more columns used to identify particular rows in a relation
is________ .

DB239
DB240

DB242

A determinant that determines all the other columns in a relation is______ .


When designing a database, one of the candidate keys in a relation is selected as the
_________ .
Normalization is a process used to deal with which of the following modification
anomalies?

DB243

When you are given a set of tables and asked to create a database to store their data,
the first step is to ____ .

DB244

Modern microcomputer personal DBMS products______.

DB245

Which of the following are true about data mining applications?

DB241

DB246

We have obtained access to the company's operational data. We examine 50 records


for customers with phone numbers that should use the current area code of 345. Of
these 50 records, we find 10 that still use an older area code of 567. This is an
example

DB247

We have obtained access to the company's operational data. We have been asked to
produce a report with an item by item analysis of sales, but the only sales figure
available is the total sale value for each order. This is example of_____

DB248
DB249

A data warehouse database differs from an operational database because:


Which of the following objects is used to display a menu?

DB250

Which of the following objects are NOT found in an Access application?

DB251

You are developing an Access application that you expect to upgrade periodically.
Which of the following statements is TRUE?

DB252
DB253

Which of the following statements regarding Access applications is NOT true?


Which of the following brings a copy of the table into the current database and does
not maintain a tie to the original table?

DB254

What makes a database an application?

DB255

What is the Access tool that is used to create the user interface?

DB256

The purpose of a data warehouse is to:

op1
Record
Navigation

op2

op3

Record
Operations

op4

Form
Operations
hierarchical
columnar form tabular form form

None of the
above
one to many
form

filtering

querying

ordering

sorts
filter by
filter by form selection
*
$
true
false
unbound
bound control control
option
button group group
filter

database

form

sorting
pipes

gateways
None of the
filter by menu above
@
?
data less
control

controls group record group


none of the
collection
above
all of the
controlled
above
DAY()
DATE()
combo box
static text

bound
unbound
CURRDATE() TODAY()
text box
list box
columnar
form
tabular form
pivot table
data sheet
filter
filter by input filter by form
option
control
control
button wizard wizard
wizard
two of the
ram*
above
ram??
true
false
form
table
report
autoreport
chart
true
true
60,000
true
true

report
label
false
false
255
false
false

true

false

table
table
true
true

query
form
false
false

data control

ans

B
B
C
A
A
D
B
B
B
A
C
C
B

main form
none of the
above

tool wizard
none of the
above

module
bitmap

ledger
none of the
above
report

25,000

64,000

form
report

all of the
above
hyperlink

B
B
A
A
A
A
A
D
B
A
B
D
D
A
A

Insert

Records

Tools

none of the
above

true
true

false
false
composite
alternate keys keys
false
true
true
false
false
true

B
A
candidate
keys

primary key

true
true

false
false

null
true
true
true
true

not null
false
false
false
false

pie
true
true
true

bar
false
false
false

update query
true
true
inner join
true
true
true
freestanding
true
true
true
true
the first field
of the table
forms
true

select query
false
false
outer join
false
false
false
embedded
false
false
false
false
the last field
of the table
reports
false

delete query

delete
true
true
freestanding

insert
false
false
embedded

append

add

stand alone

sub chart

use hyperlink use import


true
false
true
false

C
A
B
A
A
B

zero

none of the
above

none of the
both 1 and 2 above

self join

stand alone

primary key
field
attributes

B
B
B
A
B
C
A
A
B

append query B
B
A
table join
C
B
A
B
D
sub chart
B
B
B
A
none of the
above
C
D
entities
A

use datasheet
in forms
use export

A
A
B
B

D
B
B

true
true
true

false
false
false

integer
true

number
false

actions
report

events
form
expression
elements

macro

B
A
A
primary
number

procedures
chart

auto number D
A
none of the
above
B
macros
D

action list

comments
expression
code builder builder
expression
elements list
macro list
box

conditions
tabular
tabular

action
columnar
columnar

create report
columnar and
tabular
true
create fields

link report
stable and
unstable
false
add chart

primary key

alternate key foreign key

label wizard

chart wizard

start header

group header page header

report footer

page footer

for ordering
records

for updating
records

condition
VB Modules

group
reports

group footer
for specifying
conditions
with group by none of the
clause
above
none of the
macro names above
forms
macros

add

append

insert

report
true

macro sheet module


false

RAD

RAP

RAID

SysCmd

MsgBox

message

OLE

DDE

CME

calculator

insert
auto report
datasheet
embedded
report
dynamic and
static
chart

mail wizard

action
expression
elements
none of the
above
none of the
above
embedded
justified
new report
none of the
above
insert chart
none of the
above
none of the
above

D
C

C
A
C
B
D
A
B
C
C
A

report header D
none of the
above
B

delete
none of the
above
none of the
above
none of the
above
none of the
above

C
C
D
B
C
A
A
B
A

object linking
and
embedding

on line
execution

OLE object

OLE client

none of the
on line editing above
A
OLE
communicato
OLE server
r
C

linked
exe

embedded
DLL

connected
BMP

form wizard

report wizard query wizard

static file

static html

append
dollars
unbound
object
display as
icon

add
rupees

dynamic file

edited
html
publish to
web wizard
none of the
above

A
D
D
B

insert
pesos
command
bound object button

data definition D
yen
A
list box

display

link

create html

new

save as html

startup

home

end

bullet
DBMS

command
RDBMS
data
collection
new blank
database
dialog box
64000

procedure
front end

create icon
none of the
above
none of the
above
none of the
above
language

database

data storage

data group
new dialog
box
255
automatic
number
true

new database database


dialog box
dialog box
235
63500
automatic
AutoNumber number
field
false
none of the
inner join
outer join
explicit join
above
no duplicate
primary key
not null
candidate key key
cascade
cascade
change
cascade
change all
delete related related
update related related
records
records
fields
records
none of the
columnar
tabular
both a and b above
query or
record or
none of the
table or tables queries
records
above

C
B
C
A

A
A
B
B
A
A

C
B
C

true

false

property field

Dynaset field
field property properties
properties

crosstab
queries

row/column
queries
row/column
action queries queries
inner join
self join
true
false
new form
form create
dialog box
dialog box
summary
sum
change
properties
properties
included form sub form

select queries
change/delete
queries
no match join

update
queries
update
queries
outer join

form wizard
dialog
append
form
properties
new form

both 1 and 3
simple
new
properties
child form

A
A
D
A
D
D
B
B

true

false

true

false

&
true
page
true

#
false
detail
false

true

false

true
true
true
relational
true

false
false
false
list
false

A
B
A
C
B

action
language

structured
query
language

report
true
group

group

topic

range

logical

event procedural
based
language

none of the
above

form
false
record

query

table

session

data
true
true

property
false
false

both a and b

detail
none of the
above

sub forms
graphs
number

child forms
chart
primary key

inner form
labels
index

pivot

create

form

filters

queries

sorts

form
list box

bound
combo box

unbound
button

none of the
above
report
identifier
none of the
above

D
A
C
A

C
B
B
D
B
A
A
A
B
B
A

forms
A
none of the
above
C
option button B

true

false

form name

control

tabular form

chart form

sub forms

tabular form

calculated
calculated

bound
unbound

sub form

auto form

set relation

connect

A
none of the
record source above
data sheet
none of the
form
above
columnar
none of the
form
above
none of the
unbound
above
bound
static
columnar
tabular form form
none of the
relationships above

C
A
A
A
C
B
C

command
option, toggle button, check
and command and list
list, check and
buttons
boxes
combo boxes
filter by
filter by form report
filter by record

option button,
toggle button
and check
boxes
D
filter by input

form
clipboard

report
file

macro
field

table
layout

B
B

search

sort

field names

record grab

A way to
analyse and
manipulate
numerical
information

An organised
A tool to
way of storing
produce high information
A way of
quality
about a set of maintaining a
documents
similar things log
It contains all
Information
the data
A document
about certain about one
which
A collection of
programs
specific item contains text files
relative
Relational
Reliable
remote DBMS DBMS
DBMS
DBMS
storing data
uses tape as
offline at a
backing up
is related to
opposed to
separate site data regularly data mining
disk
Computer
Database
Key
sequence
Computer
access
verification
checks
matching
controls

A way to
analyse and
manipulate
numerical
information

A tool to
produce high
qualitydocum
ents

An organised
way of storing
information
about a set of None of the
similar things above

B
C

It contains all
the data
about one
specific item
Reports
provide a
very flexible
way of
creating and
editing
documents
Spreadsheet
s make data
Extracting and easy to
analysing data analyse
Information
about certain
programs
Reports allow
users to
extract
information as
hard copy
(printed
output)

Compilers,
interpreters,
editors
DEFAULT
and NOT
NULL
constraints
CHANGE
TABLE

Network
software,
backup
systems

A document
which
contains text

None of the
above

A tool which
allows text
and graphics
to be placed None of the
in documents above

None of the
above

None of the
above

Using queries
Word
processors,
spreadsheets,
databases,
DTP
PRIMARY
KEY and
UNIQUE
constraints
ALTER
TABLE
Relational
DBMS

FOREIGN
KEY
constraints
MODIFY
TABLE
relative
remote DBMS DBMS
storing data
offline at a
backing up
is related to
separate site data regularly data mining

IDENTITY
columns
UPDATE
TABLE
Reliable
DBMS
uses tape as
opposed to
disk

Number

Description

Source

using a
password
the product
code

keeping the
keeping a
original paper
backup copy copy
the primary
key
mail merge

saving the file


with different
filenames
A
e-mail

A database
bookmarks
Auto Primary

Graphics
operators
Auto ID

e-mail
engines
Auto Key

A
C
C

reports are
consistent
with the
underlying
tables or
queries.

records in a
dynaset are
consistent
with the
underlying
tables.

Component

browser
wildcards
AutoNumber
forms in a
related tables database are
in a database consistent
are
with the
consistent
underlying
with one
tables or
another.
queries.

C
C
C

foreign key.

main form
and a
subform.

query and its


associated
dynaset.

report and its


related query. A

the primary
the primary a field from an not a primary
key of both
key of the
unrelated
key of either
related tables. related table. table.
related table. B

One-to-one
EmployeeID
The Tools
menu,
Relationship
window

One-to-many Many-to-many Many-to-one B


EmployeeLast CompanyAdd
CompanyID Name
ress
A

Referential
integrity
Right-click
the
Relationship
line, then
select Delete
from the
shortcut
menu

Double click
the
Relationship
line
That there are
several
customers
That some of
associated
the data is
with that ID
not viewable
They must
both be
numbers

Nothing,
Access
ignores the
attempted
command.

The join line

The one-tomany
relationship

Select Undo
in the
Relationships
pull-down
menu

Click the
Delete
Relationships
button on the
toolbar
B

That there are


records in a
related table
They cannot
be
They cannot AutoNumber
be text fields data types
The
customers ID
is deleted
from the
Customers
The
table, and all
customers
the related
ID is deleted loans are
from the
deleted from
Customers
the Loans
table.
table.

That records
can be added
by clicking on
the plus sign C
They must be
the same
data type
D

An error
message is
displayed.

The subform
is not visible.
A one-tomany
relationship
between
teams and
players

The subform
is an object
on the form
The subform
and can be
is displayed The subform moved or
in Datasheet is displayed in sized like any
view.
Form view.
other object. D
A one-toA one-toA many-tomany
many
many
relationship relationship
relationship
between
between
between
teams and
coaches and players and
coaches
teams
teams
C

M
The
Customers
table only
when there
are Loan
records
associated
Either table at with that
any time
customer

The Loans
table at any
time

Neither table C

prompt, title
bar text, icon.
Dim
CreateList.

title bar text, title bar text,


prompt, icon. icon, prompt. B

prompt, icon,
title bar text.
Sub
CreateList.
A text field
A check box enables the
enables the
form user to
form user to choose from
choose from one of
one of several several
existing
existing
entries.
entries.
must be set
must be set
for multiple
for one word. words.

CreateList.

Sub.

A drop-down
list enables
the user to
choose from
one of several
existing
entries.

A drop-down
list enables
the user to
enter text.
C

does not have must be set


to be set.
for two words. C

help people
keep track of
things.

create tables
store data in of rows and
tables.
columns.

data.
facts.

relationships. metadata.
figures.
information.

maintain data
on different
things in
different
tables.
A
all of the
above
D
a and b
D

single-user
database
application
single-user
database
application
Sequential
Query
Language
(SQL)

multiuser
database
application
multiuser
database
application
Structured
Question
Language
(SQL)

e-commerce
database
application
e-commerce
database
application
Structured
Query
Language
(SQL)

Database
Modeling
System
Jet

Database
Management
System
SQL Server

Data
Business
Model System
Oracle
The database
management
system
(DBMS)

The user
the database
application(s)
interact(s)
with the
DBMS
creates
queries

The
database
application

the DBMS
accesses the
database
None of
data
above
creates
creates form reports
the database
management
the database system
the user
application
(DBMS)
it contains a
all the users' it reduces
description of
data is in one data
its own
place
duplication
structure
holds user
holds
data
metadata
holds indexes
stored
tables
metadata
procedures
as a new
systems
as a redesign
from existing development of an existing
data
project
database
as a new
from existing systems
as a redesign
non-database development of an existing
data
project
database
as a new
systems
as a redesign
from existing development of an existing
data
project
database

a or b
None of
above
Relational
Question
Language
(RQL)

Relational
Model
Manager
a and b

B
D

All of the
above.

All of above

b and c

the database B

All of the
above.
All of the
above.
All of the
above.

C
D
D

a and b

a and b

a and b

data marts

data marts

data marts

normalization data models

entityrelationship
data modeling A

normalization data models

entityrelationship
data modeling B

normalization data models

entityrelationship
data modeling D

entityrelationship
data marts
normalization data modeling
hierarchical network
file managers models
models

data
migration
relational data
model
more than
one column
can use the
same name
field

D
A

entities in a
column vary
as to kind
table

the order of
the columns
is important
relation

the order of
the rows is
unimportant
row

record

field

tuple

record

field

key
composite
key

foreign key

record

field

foreign key

candidate key D

composite key
Insertion
anomaly
assess the
existing
tables'
structure and
content

primary key
Update
anomaly

foreign key
Deletion
anomaly

surrogate key B

design the
database
structure

create one or move the


more new
data into the
tables
new database A

are supplied
by several
wellestablished
manufacturers

were
essentially
killed off by
MS Access
Their report
delivery is
more difficult
They use
than report
sophisticated delivery for
mathematical reporting
techniques.
systems.

All of above

C
D

are not true


have poor
DBMS
response time products

Nonintegrated None of the


data
above

dirty data

inconsistent
data

a "wrong
nonintegrated format"
data
problem

dirty data

inconsistent
data

a "wrong
nonintegrated format"
data
problem

data
warehouse
data are not
stored in
tables.
Form
Forms and
reports

data
warehouse
databases do
not have
metadata.
Table
Queries and
tables

data
warehouse
data are often
denormalized. b and c
Report
Query

C
A

The Link
Tables
command can
be used to
associate the
tables in one
database with
the objects in
another
database.

An
application
may consist
of multiple
databases,
each with
multiple
objects,
linked to yet
another
database
containing
only tables.

Spreadsheets D
Regardless of
how the
objects and
It will be
tables are
It will be
easier for the
stored, the
easier for the user to
user will have
user to
upgrade it if It is advisable to reenter the
upgrade it if
the objects
to put each
data in the
the objects
are in one
object and
tables when
and tables are database and table into a
the
in one
the tables in separate
application is
database.
another.
database.
upgraded.
B

Import

It contains
more than
one table

Link
It contains
tables,
reports,
queries, and
forms

Macros

All objects in
an
application,
including the
tables, must
reside within
the same
database.

An application
can be
created in
such a way
that it objects
such as forms
and reports
can be
changed
without
disturbing the
existing data. C

Merge

Join

It contains a
user interface,
or
It contains
switchboard macros

Menu Wizard Build Menu

create
backups for
mission
critical
corporate
data.

Interface
Design
Wizard

put key
business
information
centralize the into the hands
manageabilit or more
y of data
decision
collection.
makers.

Switchboard
Manager

store all
corporate
transaction
data in one
single
location.

q_id

CA1
CA2

q_desc
Using generalized audit software packages can add a
lot of value _______
_______ is used for CAAT as database

op1
to an audit
department's
products & services
Oracle

CA8

Generalized audit software perform auditors to


undertake any past records and not concurrent auditing
Generalized audit software is a file whose capabilities
for verifying processing is logic
CAAT's are computer program and data that auditor
uses as part of the audit procedures to process data if
audit significance contained in an entity information
system
CAAT do not contains package programs, purpose
written program, utility programs or system
management programs
Embedded audit routines are sometimes built into an
entity's computer system to provide data for later user
by the auditor
SCARF involves embedding audit software modules
within an application system to provide continuous
monitoring

CA9

Concurrent use auditors as the member of the system

true

CA10

Regular cross system verification may minimize frauds


Computer security is frequently associated with
confidentiality, integrity and authentication
Data reserve engineering process metadata to
document system and abstract business rules and
relationship

true

CA3
CA4

CA5

CA6

CA7

CA11

CA12
CA13

True
True

True

yes

true

true

true

true
to determine the audit
objective
can bring the data
directly

CA16

The first step for developing CAAT is_________


Using the open database connectivity feature in ACL is
______________
Computer Assisted Audited Technique involves the use
of computers through "Black Box Approach"
True
White Box Approach necessary involves expert
knowledge on the part of Auditor
True

CA17

The transition from manual system to CIS environment


bring dramatic changes including ________________

CA14
CA15

CA18
CA19

CA20

change in the method


of recording accounting
transaction
documents driven
Auditing with computer necessarily supports the
approach
hardware and software
CAAT involves an Auditors' appreciation of __________ configuration
Widespread end use computing result in unlimited
errors creeping into system going to accept handling,
thereby increasing audit risks
true

CA21

CA22

CA23

For computerized auditing usage of sophisticated audit


software would be a necessity

true
the source of data
Important knowledge needed to begin planning the use available to the audit
of CAAT is _________
organization
The move towards paperless EDI would eliminate much
of the traditional audit trail, radically changing the nature
of audit evidence
true

CA25
CA26
CA27

Computer operation controls are designed to provide


________________
Systems development control, apart from others,
include authorization, approval, testing, implementation
and documentation of new systems software and
system software modification
A system could be _________
A system exhibits 'entropy'

CA28
CA29

Super computer are the largest and fastest and is very


suitable for commercial application including audit work true
Assembler language uses Mnemonic symbols
true

CA24

CA30
CA31
CA32
CA33

CA34

CA35
CA36
CA37

CA38
CA39
CA40

CA41
CA42

Operating systems are devised to optimize the machine


capabilities, the function include_______________
General purpose software provides a framework for
highly complex scientific operation
In batch processing, transactions are processed one
after another
The use of computer assisted audit techniques is not
gaining popularity not only ________________
On-line processing refers to grouping of transaction and
processing the same in one go from start to finish
Real time refers to the technique of updating files with
transaction data immediately after the occurrence of the
event to which it relates
In OLRT the CPU should process the capability of
program interruption
Time sharing system allow access to a CPU from
remote terminals
DSS is defined as a system that provides tools to
managers to assist them in solving structured problems
DSS has the following components
_________________
Master files contains current records for identification
and summarizing
Transaction files contain relatively permanent records
take product profile, customer profile, employee profile
etc
Master file configuration includes ____________

the of by all concerned

true
natural/man-made
true

scheduled jobs
true
true
with audit
departments

true

true
true
true

true
databases
true

true
reference files

CA43
CA44
CA45

CA46
CA47
CA48
CA49
CA50

CA51
CA52
CA53
CA54

CA55
CA56

CA57

CA58
CA59
CA60
CA61

CA62
CA63

CA64
CA65

______ is a file management software package that lets


users and programmers organize data into files and
then process those files
CAATS provide added value to the clients because
_______________
File volatility refers to the number of addition and
deletions to the file in a given period of time
File activity is the proportion of transaction file records
that are actually used and accessed in a given
processing run:
File interrogation refers to the _____ of information from
a file
One -to-one relationship means a single entity to a
single entity in a monogamous structure

filex
to have a complete
picture of a system
true

true
back-ups
true

RDBMS is structured to a series of 2 dimensional tables true


seriously affected
SADB stands for ____________
database
Controls are present over many aspects of the
computer system and its surrounding social
environment
true
In framed checking the data entry is checked against an
expected picture or format
true
Errors are correlated_________
at the year end
Field check is exclusive to a field
true
_________ law basically states that there is a specific
probability of the first digit of a no. being 1,2,3 etc
Check digit is a group of nos. added to a code for
determining the accuracy of other digits in the code

Hierarchical code means _________


The validation checks applied to a field depend on the
field's logical inter relationships with other fields in the
record
The contents of a field could determine _______ sign
for a ______ field
Batch is the process of ______ together _____ that
bear some type of relationship to one another
Hash totals means meaningless totals
With OLRT where interactive data entry is available, the
master file associated with a transaction may be
searched for confirming data
Controls are required for authorization to ensure data
integrity and detect possible breaches in security
Data from client application are not stored in the
organization's database through auditables events and
function
All input records in a batch are normally of different
types

Benfish
true
consecutive nos. or
alphabets to entities

TRUE
valid, numeric
grouping, transaction
true

true
true

true
true

CA68

IDEA stands for


_________________________________
A transaction file is sorted prior to the update of master
file
A sequence check on the transaction or master files by
an update program is not required

CA69

Whenever monetary transactions are processed against


master files, the update program should maintain a
correlation account to record such transaction that does
not have a matching master file record
true

CA66
CA67

CA70

CA71
CA72
CA73

CA74

CA75

CA76
CA77
CA78
CA79
CA80
CA81

CA82
CA83
CA84

CA85
CA86

Internal tables are stored tables from which certain


values are extracted for further processing and storing
For small to medium sized systems, individual modules
are coded and individually tested and then assembled to
be tested as a whole-the testing strategy is referred to
as ___________________
In systems testing, test involves_________________
Recording transactions in a controlled manner may
amount to loss of stored data

incremental design and


enlarge activity
true
true

true

e-brain
bottom up tests
yes

Audit software is used by the auditor to _________


read data on client's file
Core image comparison is a software used by the
auditor to compare _______ version of a program with a
secure ________ copy
executables, master
Database analyzer is a software which provides detailed
information concerning the operation of the database
true
system analysis
SAS stands for ______________
software
Embedded code is a software used by the auditor to
examine backup data
true
Embedded code performs wide variety of audit task
yes
Core image comparison is particularly useful where only
executable versions are distributed
true
Log analysis is a software used by auditor to detect
virus
true
On line testing techniques the auditor ______ data
either _______ or fictitious in order to see that a specific
program or sever edit test is doing its work
manipulates, real
Mapping software is used by the auditor to list unused
program instructions
true
Mapping software has very objectives
yes

Modeling is a variety of software which


________________
On line testing can be targeted for specific functions
carried out by programs

can be very powerful


analytical tool
yes

CA87
CA88
CA89

CA90
CA91
CA92

CA93
CA94
CA95

CA96

CA97
CA98
CA99
CA100

Program code analysis involves _____________


__________ is a software of CAAT
Snapshot is software which takes a picture of a file or
data or a transaction passing though the system

Base case system evaluation includes____________


While base testing forces on finding if there are any
defective execution policies in a program
Black box testing seeks to determine whether
application output is what it is supposed to be
In integrated test facility approach the auditor should
ensure that the impact of test transaction is
subsequently eliminated from the computer files
Black box testing is _______ based and white box
testing is _______ based

provides detailed
information of machine
uses
IDEA
true
fictitious data applied
against the client
program
true
true

true
specification,
program
identifying erroneous
code

Source code review means__________


In formula in flow hypothesis the auditor should expand
the extent of substantive tests to determine how the
defects may impact the attainment of the program
objectives
true
All material application oriented events that occur within
the boundary subsystem should be recorded in the
accounting audit trail
true
In examination of audit trail the following data
associated with an event may be ___________start and finish time
JCL means_________________
Audit should be periodically analyzed to detect any
control weakness of the system

job control language


yes

CA103

In an accounting audit trail, intrusion detection system


might monitor the amount of processor time consumed
by the user to detect unusual deviation from the amount
processor time requested by the user in the past
true
A sample size calculator program assists auditors in
determining RAND() function
true
package computer
p[program for
performing a variety
of data processing
Generalized audit software consists ___________
function

CA104

Specializes audit program may be___________

CA101
CA102

prepared by the auditor

CA109

Generalised audit software could be used by the


following in consistencies or significant fluctuations
Generalized audit software function
include____________
In the file reorganization merging capabilities are
needed in data from separate file is to be combined on
a separate work file
Auditors cannot use generalised audit software to
extract the data needed for audit purpose
Auditors can combine functional capabilities of
generalized audit software to accomplish the task of
__________________

CA110
CA111

Which of the following is not the feature of GAPs


Which is the example of CAATs

CA112

In audit procedures, test data is

CA113

Which of the following is not the use of CAATs


Which of the following are called explicitly by another
procedure?

CA105
CA106

CA107
CA108

CA114

true
file
access/organizations

true
true
examining the quality of
system process
Wide access to various
data base
ACL
A sample of
transactions
Tests of details of
transactions
Macros

op2

to add customers
ACL

op3

all the above


JCL

op4

none of these
none the above

ans

A
A

False

False

False

no

false

false

false

false

false

false
review and evaluate the to obtain a record
types of data
layout
can bring the data
indirectly
all the above

A
extract data from file

none of the above

False

False

use of accounting
codes

absence of audit trails

risk driven approach unique approach


processing options, file
data structure
checks and controls

false

all the above

none of the above

all the above

false
source of data for
material planing

all the above

false
providing access to
computer to all
organization personnel use of any programs

false
open/closed
false

conceptual/physical

none of these

none of the above

all of them

A
D
A

false
false
manage hardware &
software resources

A
A
enable multiple user
resource sharing

all the above

false

false
with production
departments

B
all the above

none of these

false

false

false

false

false

planning language

model base

all the above

false

false
table files

report files

none of the above

B
D

file-o-man
file manager
decentralized picture of
a system
all the above

filepet

none of the above

false

false

retrieval

deletion

addition

false

false

subject area database software and database safety and database

false

false
immediately
false

on quarterly basis

none of the above

B
B
A

Benford

Benjamin

none of the above

false
blocks of nos. to the
primary attribute of the
the entity

B
random placement of
component

none of the above

false

invalid, alphabetic

none of the above

all the above

regrouping, events
false

none of the above

all the above

A
A

false

false

false

false

interactive data
extraction and
analysis

interactive data
innumerable analysis

none of the above

false

false

false

false

bouncing ball
top-down tests

big-bang
hybrid tests

stub
all the above

C
D
B

no
provide information to
the audit

re-perform procedures
carried out by the
clients programs

all the above

deleted, hard

none of these

all the above

false
system advanced
software

A
all the above

none of the above

false
no

B
A

false

false

create, false
false
no
can enable the auditor
to execute provisions
on a number of
different bases
no

none of these

all the above

A
A
A

can provide the


auditors with useful
information with trend s
and patterns
all of the above

D
A

examination of source
code of a program
identifies program code with advice to
which may be there for following the logic of
fraudulent reason
none of the above
a program
ALC
ACLL
ACL
false
comparison of source
version of a
programmed

C
B
A

analyzing the picture of


a file or data
all the above

false

false

false

file, hardware
identifying ineffective
code

none of the above


all the above
identifying non-standard
code
all the above

A
D

false

false
authentication of
information support
job connectivity
language

A
resource requested

all the above

all the above

none of the above

no

false

false

mathematical concept

master list of
transactions

administered
questionnaire

prepared by the entity

prepared by an outside
programmer engaged
by the auditor
all the above

false
statistical/arithmetic
operation

A
stratification and
frequency analysis

all the above

false

false

carrying analytical
review
Can extract and
analyse data
IDEA
A utility software
programme
Analytical review
procedures

examining the quality of


data
Can aid in simple
selection
High End CAATs
A special purpose
written program
Compliance tests of
general EDP controls

Action Procedures

Event Procedures

all the above


Can define the audit
objectives
All of the above

None of the above

All of the above

General Procedures

D
D

Field0

Field1

CA107 In integrated test facility approach the auditor should ensure


that the impact of test transaction is subsequently eliminated
from the computer files
CA108 In olrt the cpu should posses the capability of program
interrupt interrupts
CA109 In system testing,test involves _______
CA11

All input records in a batch are normally of different types

CA110 In the planning phase gathering information and risk


assessment will be done
CA111 Information collection encompasses logging the selected
auditable events
CA112 Input controls are designed to ensure processing safety
CA113 Integrated test facility is a facility of ________

CA114 Internal tables are stored tables from which certain values are
extracted for further processing and storing
CA115 Log analysers are _______ required by the auditor
CA116 Log analyzers is ________

CA117 Log analyzer is a software used by auditor to detect virus

CA118 Mapping software is used by the auditor to list unused program


instruction has veryspecific objectives
CA119 Master file configuration includes ______

CA12

All material application -oriented events that occur within the


boundary sub-system should be recorded in the accounting
audit trail

CA120 Master file contains current records for identification and


summarising
CA121 Metadata approach is _______

CA122 Modeling is a variety of software which _________

CA123 One-to-one relationship means a single entity to a single entity


in a monogenus structure
CA124 On-line processing refers to grouping of transaction processing
the same in one go from start to finish
CA125 On-line testing can be targeted for specific function carried out
by programs

CA126 Operating systems are devised to optimise the machine


capabilities-the function include:

CA127 Parallel processing is a concept associated with _______ and


________
CA128 Parallelsimulation is there to authenticate the _______ system
CA129 Prevention,detection,investigation and reaction are the ______
of an auditor
CA13

Any audit enable software may include _______

CA130 Procedure driven approach of auditing is __________

CA131 Processing controls can be grouped into general controls


CA132 Program code analysis involves ______

CA133 Programme code analysis is being implemented by the


_________

CA134 Public audit trail is an important control in system that use


__________ for authentication purposes
CA135 Rdbms is a structured into a series of 2-dimensional table
CA136 Real time refers to the technique of updating files with
transaction data immediately after the occurrence of the event
to which it vrelates
CA137 Reasonableness checking is

CA138 Recording transactions in a controlled manner may amount to


loss of stored data
CA139 Regular cross-system validation may minimise frauds
CA14

Application controls can be categorized into _______ types

CA140 Risk assessment is a phase of an audit


CA141 Risk assessment is the phase of ______

CA142 Scarf involves embedding audit software modules within an


application system to provide continuous monitoring
CA143 Security audit can be done through oracle database
CA144 Security can be broken into ________ areas
CA145 Sign test is a type of field checks on processed data

CA146 Snapshot is a software which takes a "picture" of a file or data


or a transaction processing through the system
CA147 Snapshot is a technique of __________ which is a part of audit
software
CA148 Source code review means _______

CA149 Specialised audit programs may be _______

CA15

Application controls grouped into

CA150 Super computer are the largest and fastest and is very
suitablefor commercial applicationincluding audit work
CA151 System development control, apart from others,include
authorisation,approval,testing,implementation and
documentation of new systems software and system software
modification
CA152 System privilege can be checked by auditor
CA153 System security audit is an on site inspection ,which identifies
potential securityvulnerabilities within an organization

CA154 Test data can be defined as __________

CA155 Test data pack is ________

CA156 The contents of a field could determine _______ sign for ______
field
CA157 The move towards paperless edi would eliminate much of the
traditional audit trail,radically changing the nature of audit
evidence
CA158 The stream of data that are generated by these tools is called
as the __________
CA159 The transition from manual system to cis environment bring
dramatic changes including
CA16

Ar=ir*cr*dr

CA160 The validation checks applied to a field depend on the fields


logical interrelationships with other fields in the record
CA161 There are ______ types of approaches of test data techniques
CA162 There are ______ types of control totals
CA163 There are _______ types of audits of the systems development
process
CA164 There are ________ types of checks that can run when data is
input through a terminal
CA165 There are _____types of checks frequently used in validating
the data
CA166 There are 13 system development phases while audit of the
system development processes
CA167 There are four type of audit risks
CA168 Top down tests,bottom up tests and hybrid tests are under the
_______ category
CA169 Tracing helps to analyse the change caused by viruses
CA17

Assembler language uses mnemonic symbols

CA170 Transaction file contain relatively permanent records take


product profile,customer profile,employee profile etc.
CA171 Transactions are not lost ,added,duplicated or improperly
changed is called as control over input
CA172 Validation checks is applied to a field depend on the field's
logical interrelationships with other fields in the records

CA173 Whenever monetary transaction are processed against master


files,the update program should maintain a correlation account
to record such transaction that does not have a matching
master file record
CA174 White box testing focuses on finding if there are any defective
execution paths in a program
CA175 White box approach is program based
CA176 With olrt where interactive data entry is available ,the master
file associated with a transaction may be searched for
confirming data
CA18

Audit around the computer is called

CA19

Audit risk cannot be viewed as a joint probability of inherent


risk,control risk and detection risk

CA2

White box approach necessarily involves expert knowledge on


the part of auditor

CA20

Audit software is a type of audit technique

CA21

Audit software is used by the auditor to ________

CA22

Audit software can be categorized under ______ heads

CA23

Audit software can be divided into ________ categories

CA24

Audit through can be done using simulation

CA25

Audit trail should be periodically analysed to detect any


control weaknesses of the system

CA26

Audit with networking and database help is called _______

CA27

Auditing is a form of attestation

CA28

Auditor can also check default roles in oracle database


software

CA29

Auditor can combine functional capabilities of generalized


audit software to accomplish the task of ________

CA3

_________ Is the file management software package that lets


users and programmers organise data into files and then
process those files

CA30

Auditors can issue the sql commands to audit

CA31

Auditors can use profiles in their white-box approach of


auditing

CA32

Auditors cannot use generalised audit software to extract the


data needed for audit purposes

CA33

Auditors has to take care of the fact to link between multiple


databases with one application

CA34

Base case system evaluation includes _______

CA35

Black box approach is specification based

CA36

Black box testing is ______ based and white box testing is _____
based

CA37

Black box testing seeks to determine whether application


output is what it is supposed to be

CA38

Caat do not contain package programs, purpose written


programmes,utility program or system management program

CA39

Caat's are computer program and data the auditor uses as part
of audit procedures to process data of audit significance
contained in an entity's information system

CA4

A sample size calculator program assists auditors in


determining rand() function

CA40

Caat's are computer programs and data the auditor uses as a


part of the audit procedures

CA41

Case-is ________

CA42

Check digit is a group of numbers added to a code for


determining the accuracy of other digits with code

CA43

Check digit is a tool under field checks

CA44

Check digit is a type of ___________

CA45

Codd's rule are being implemented on database

CA46

Computer assisted audit technique involves the use of


computer through "black box " approach

CA47

Computer operation controls are designed to provide ________

CA48

Computer security is frequently associated with confidentiality


,integrity and authentication

CA49

Concurrent audit include auditors as members of s.d team

CA5

A sequence check on the transaction or master file by an


update program is not required

CA50

Concurrent audit is taking care of the ______ data that is being


transacted

CA51

Confidentiality,integrity and availability are the major security


attributes to the auditor

CA52

Control total is under batch checks

CA53

Controls are present over many aspects of the computer


system and its surrounding social environments

CA54

Controls are required for authorisation,to ensure data


integration and to detect possible breachesin security

CA55

Conventional data entry giving way to scanner,digitised image


processors etc. For auditing in cis environment

CA56

Core image comparison is a ________ used by the auditor

CA57

Core image comparison is a type of audit technique

CA58

Core image comparison is particularly useful where only


executable versions are distributed

CA59

Critical review of the system of book-keeping,accountingand


internal organizational controls.

CA6

A system could be ________

CA60

Cryptographic techniques are the part of security audit

CA61

Data communication and networking would introduce new


audit risk

CA62

Data from client application are not stored in the organisations


database through auditable events and functions

CA63

Data integrity can be imposed on the database through dbms

CA64

Data reverse engineering process metadata to document


system and abstract business rules and relationships

CA65

Data security in audit techniques can be done through three


ways

CA66

Database analyser is a software which provides detailed


information concerning the operation of the database

CA67

Databases are a key element in most business-related


information systems

CA68

Ddl,dml,dcl-statements can be exercised in rdbms

CA69

Deterrenece meance _______

CA7

A system ehibit entropy

CA70

Dss has the following components

CA71

Dss is defined as a system that provides tools to managers to


assist them in solving structural problem

CA72

Embedded audit routines are sometimes built into an entity's


computer system to provide data for later use by the auditor

CA73

Embedded code is a software used by the auditor to examine


backup

CA74

Embedded code performs a wide variety of audit tasks

CA75

Errors are corrected :_______

CA76

Event detection is an audit procedure

CA77

Event detection is the audit procedures

CA78

Examine the quality of data is not the task of generalized


audit software

CA79

Examine the quality of system processes is _________

CA8

A system means -totality

CA80

Field check is exclusive to a field

CA81

File access is a function of _________ software

CA82

File access will be the functional capabilities of generalized


audit software

CA83

File activity is the proportion of transaction file records that


are actually used or accssed in a given processing run

CA84

File integration refers to the ________ of information from a file

CA85

File volatility refers to the number of additions and deletions to


the file in a given period of time

CA86

For computerised auditing,usage of sophisticated audit


software would be a necessity

CA87

For small to medium sized systems,individual modules are


coded and individually tested and then assembled to be tested
as a whole.the testing strategy is referred to as:

CA88

General purpose software provides a framework for highly


complex scientific operations

CA89

Generalised audit software could be used by the auditor for


identifying inconsistencies or significant fluctuations

CA9

A transaction file is sorted prior to the update of master file

CA90

Generalised audit software function include _______

CA91

Generalised audit software never allow several files to be read


simultaneously _______

CA92

Generalized audit software consists _______

CA93

Generalized audit software has infile capabilities for verifying


processing logic

CA94

Generalized audit software has only limited capabilities for


verifying processing logic

CA95

Generalized audit software permits auditors to undertake only


expost auditing and not concurrent auditing

CA96

Generalized audit software provides the full set of arithmetic


operators

CA97

Hash total is a type of _________

CA98

Hash totals falls under control totals

Field2

Field3

Field4

Field5

Field6

TRUE

FALSE

TRUE

FALSE

BOTTOM UP

TOP DOWN

HYBRID

ALL THE

TESTS

TESTS

TESTS

ABOVE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

PARALLEL

SOURCE

TEST DATA

NONE OF

PROCESSING

CODE

APPROACH

THESE

REVIEW
TRUE

FALSE

HARDWARE

SOFTWARE

A
NETWORK

NONE OF

THESE
AUDIT TOOL

SOFTWARE

MACHINE

SOFTWARE D

ACTIVITY

USED TO
READ AND
ANALYZE
RECORDS
OF
MACHINE
ACTIVITY

TRUE

FALSE

TRUE

FALSE

REFERENCE FILE

TABLE

REPORT

NONE OF

FILES

FILE

THE

ABOVE
TRUE

FALSE

TRUE

FALSE

APPROACH TO

APPROACH

IT IS DATA

ALL THE

THE SYSTEM

TO THE

ABOUT

ABOVE

DATA ONLY

APPLICATIO SOME
N DATA

OTHER DATA

ONLY
CAN BE VERY

CAN

CAN

POWERFUL

ENABLE THE PROVIDE

ANALYTICAL

AUDITOR TO THE

TOOL

EXAMINE

AUDITOR

PROVISION

WITH

ON A

USEFUL

ALL THE

ABOVE

NUMBER OF INFORMATIO
DIFFERENT

N ON

BASES

TRENDS AND
PATTERN

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

SCHEDULE JOBS

MANAGE

ENABLE

ALL THE

HARDWARE

MULTI USER ABOVE

AND

RESOURCE

SOFTWARE

SHARING

RESOURCES
OS AND RAM

OS AND ROM OS AND

NONE OF

MICROPROC THE
REEL SYSTEM
FUNCTION
COMPLETENESS

ESSOR

ABOVE

REAL

BOTH (A)

DATABASE B

SYSTEM

AND (B)

SYSTEM

ROLE

BOTH (A)

NONE OF

AND (B)

THESE

ACCURACY

AVAILABILIT ALL THE


Y

ABOVE

TRADITIONAL

LATEST

BOTH (A)

NONE OF

APPROACH

APPROACH

AND (B)

THE

B
D
A

ABOVE
TRUE

FALSE

PROVIDES

IDENTIFIES

EXAMINATIO NONE OF

DETAILED

PROGRAM

N OF

THE

SOURCE

ABOVE

INFORMATION ON CODES
MACHINE USAGE

WHICH MAY CODE OF A


BE THERE

PROGRAM

FOR

WITH A VIEW

FRAUDULEN TO
T REASON

FOLLOWING
THE LOGIC
OF A
PROGRAM

COMPANY

DATABASE

AUDITOR

AUDITOR

ADMINISTRA

USING

TOR

COMPUTE

RS
PUBLIC KEY

PRIVATE

DIGITAL

NONE OF

KEY

SIGNATURE

THESE

TRUE

FALSE

TRUE

FALSE

TYPE OF RECORD

TYPE OF

TYPE OF

NONE OF

CHECK

RANGE

SIGN TEST

THESE

CHECKS
TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

AUDIT

AUDIT

ALL THE

NONE OF

THROUGH

ABOVE

THE

D
A

COMPUTERS

ABOVE

TRUE

FALSE

TRUE

FALSE

RISK AVOIDANCE

DETERRENC PREVENTIO

ALL THE

ABOVE

TRUE

FALSE

D
A

TRUE

FALSE

AUDIT ROUTINE

AUDIT

A
AUDITING

TECHNIQUE
IDENTIFYING

IDENTIFYIN

ENORMOUS CODE G

NONE OF

THESE
IDENTIFYIN

ALL THE

G NON-

ABOVE

INEFFECTIV STANDARD
E CODE

CODE

PREPARED BY

PREPARED

PREPARED

ALL THE

THE AUDITOR

BY THE

BY AN

ABOVE

ENTITY

OUTSIDE

PROGRAMM
ER
ENGAGED
BY THE
TWO GROUPS

THREE

AUDITOR
FOUR

ALL THE

GROUPS

GROUPS

ABOVE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

SAMPLE OF DATA

SAMPLE OF

SAMPLE OF

ALL THE

USED FOR THE

DATA USED

DATA USED

ABOVE

PURPOSE OF

FOR THE

FOR

TESTING THE

PURPOSE OF TESTING

SYSTEM

CHECKING

THE

SOFTWARE

LOG FILES

APPLICATIO

N
PROGRAMM
E
PROGARMM
STREAM OF DATA STREAM OF
DATA THAT

E
BOTH (A)

NONE OF

AND (B)

THESE

ARE
GENERATED
BY TEST
DATA
TECHNIQUE
INVALID

TOOLS
BOTH C & D VALID

TRUE

FALSE

TEST DATA

TEST DATA

TEST DATA

NONE OF

APPROACH

PACK

THE

NUMERIC

B
A

ABOVE
CHANGE IN THE

USE OF

ABSENCE OF ALL THE

METHOD OF

ACCOUNTIN AUDIT TRAIL ABOVE

RECORDING

G CODES

ACCOUNTING
TRUE

FALSE

TRUE

FALSE

ONE

TWO

THREE

FOUR

THREE

FOUR

TWO

ONE

FIVE

THREE

FOUR

ONE

TRUE

FALSE

TRUE

FALSE

INTER TABLE

SYSTEM

TABLE

NONE OF

TEST

TEST

LEVEL

THESE

TESTS
TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

BLACK BOX

WHITE BOX

BOTH (A)

NONE OF

APPROACH

APPROACH

AND (B)

THESE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

READ DATA ON

PROVIDE

CLIENT'S FILES

INFORMATIO PROCEDURE ABOVE

REPERFORM ALL THE

N TO THE

S CARRIED

AUDIT

OUT BY THE

CLIENT'S
PROGRAMS

TWO

FOUR

THREE

NONE OF

THESE
TRUE

FALSE

TRUE

FALSE

WHITE BOX

BLACK BOX

ALL THE

NONE OF

APPROACH

APPROACH

ABOVE

THE

ABOVE
TRUE

FALSE

TRUE

FALSE

EXAMINE THE THE CARRYING


QUALITY OF

EXAMINING

ANALYSING THE

SYSTEM PROCESS REVIEW

ALL THE

ABOVE

QUALITY OF
DATA

FILE

FILE-O-MAN

THE FILE

FILEPET

MANAGER
TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

FICTITIOUS DATA COMPARISO ANALYSING

ALL THE

APPLIED AGAINST N OF

THE

ABOVE

THE CLIENT

SOURCE

PICTURE OF

PROGRAM

VERSION OF A FILE OR

A PROGRAM DATA
TRUE

FALSE

BOTH C & D

HARDWARE

A
SPECIFICATI PROGRAM

ON
TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

COMPUTER AIDED COMPUTER

COMPUTER

NONE OF

SOFTWARE

AIDED

AIDED

THESE

EDITOR

SOFTWARE

SOFTWARE

EMBEDDED

ENGINEERIN

G
TRUE

FALSE

TRUE

FALSE

FIELD CHECKS

RECORD

BOTH (A)

NONE OF

CHECKS

AND (B)

THESE

TRUE

FALSE

TRUE

FALSE

THE USE OF

PROVIDING

USE OF ANY NONE OF

COMPUTERS BY

ACCESS TO

PROGRAMS

ALL CONCERNED

COMPUTER

THE
ABOVE

TO ALL
ORGANIZATI
ON
TRUE

PERSONEL
FALSE

TRUE

FALSE

TRUE

FALSE

PREVIOUS DATA

CURRENT

ALL THE

NONE OF

DATA

ABOVE

THESE

NONE OF
THESE
TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TYPE OF

TYPE OF

TYPE OF

NONE OF

NETWORK

SOFTWARE

HARDWARE

THESE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

NATURAL/MAN

OPEN/CLOSE CONCEPTUA ALL THE

MADE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

L/PHYSICAL

ABOVE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

THREAT

BROADCAST NETWORK

NONE OF

ING

THESE

TRUE

FALSE

DATABASE

PLANNING

A
A

MODEL BASE ALL THE

LANGUAGE

ABOVE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

AT THE YEAR END IMMEDIATEL ON


Y

NONE OF

QUARTERLY THE
BASIS

ABOVE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

AUDIT TASK OF

AUDIT TASK AUDIT TASK ALL THE

THE AUDITOR

OF THE

OF THE

AUDITORS

GENERALIZE

USING

D AUDIT

COMPUTERS SOFTWARE

ABOVE

TRUE

FALSE

TRUE

FALSE

GENERALIZED

SPECIALIZE UTILITY

NONE OF

AUDIT

D AUDIT

THESE

TRUE

FALSE

TRUE

FALSE

BACKUPS

RETRIEVAL

TRUE

FALSE

TRUE

FALSE

C-BRAIN

BIG BANG

PROGRAM

DELETION

STUB

ADDITION

BOUNCING B
BALL

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

FILE

STATISTICA STRATIFICA ALL THE

ACCESS/ORGANIZ L/ARITHMET TION AND


ATION

ICAL

ABOVE

FREQUENCY

OPERATION ANALYSES
TRUE

FALSE

PACKAGE

MATHEMATI A MASTER

ADMINISTE A

COMPUTER

CAL

LIST

RED

PROGRAM FOR

CONCEPTS

TRANSACTI

QUESTION

ON

NAIRE

PERFORMING A
VARIETY OF DATA
PROCESSING
FUNCTION
TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

TRUE

FALSE

CONTROL TOTAL

TRANSACTI

BATCH

SEQUENCE A

ON TYPE

SERIAL

CHECK

NUMBER
TRUE

FALSE

q_desc
The ------ key can be used to select an existing company from list of
AC1 companies.
Import and Export of data between Tally and other programs is possible only
AC2 through ---------- Program.
The re-order point is the inventory quantity that trigger a stock replishment
AC3 activity.
AC4 A created company's detail can be modified through keys
A/An ------------- is the official notice that the firm sends to its customers to
AC5 advise then to the amount of money that is owed.
AC6 In tally,all masters have ________main options
AC7 In tally,to create a new column in balance sheet press _______
In tally,the use of group behaves like a sub-ledger, option is that we can
AC8 summarize many ledger accounts into one line statements
In tally, we can alter ledger details using either single or multiple modes but
AC9 not alble to delete a ledger from multiple modes.
AC10 In tally,a group company is marked with an ______________
q_id

op1
F1
Tally ODBC
TRUE
F3
Invoice
Two
Ctrl+C
TRUE
TRUE
*

The systems that work together to order,receive, and pay for replenishment of Puchasing and
AC11 stock are --------------Accounts payable
AC12 Tally allows to delete a ledger from --------- alteration mode.
AC13 --------------------- is/are useful for management in the decision making.

Single
Cash Flow
Statements

AC14 In tally,the group company must contain at least _____________ members


AC15 To cancel a vourcher entry in Tally, short-cut key is -----------

Two
Alt+D

AC16 The accounting masters and inventory masters related to


We press ------------- function key to display the age-wise analysis of Bills
AC17 Receivable or Bills Payable report
AC18 In Tally, we press ------------, to print report .
In Tally, Types of Accounts and Types of Vouchers passed during the period,
AC19 can be seen in ------------- report.
In the Tally Software, the ------------ directory stores all data entered by the
AC20 user.
AC21 The Ledger Accounts are unique in Financial Accounting Packages
Customers can be permitted to enter their own data into the firms computer
AC22 using the firms wide area network is an example of
AC23 In Tally, we can customize the Vouchers as per our requirements
AC24 The number of steps in Accounts Compilation are
AC25 Each action/transaction of a firm is described by a ----------------.
AC26 Tally is based on mercantile accounting system

Create Information

AC27 Ctrl + N is used to ----------------------- in Tally classify the accounts under different heads so that
AC28 summarised information is possible.
AC29 Revenue Account also known as -------------- Account
AC30 Method of Voucher Numbering is/are
AC31 Accounts Receivable are displayed in

F4
Alt+P
Tally Audit
Bin
True
Enterprise Data
Interchange
TRUE
2
data element
FALSE
Display stock
valuation method
Ledgers
Personal
Manual
Balance Sheet

AC32 To assemble a product from different items -------------- entry is used


A --------- purchase orders data flow is directed to the purchasing system for
use in closing out the outstanding purchase orders in the receiving system
AC33 diagram.
AC34 Tally provides at least --------- predefined voucher formats
The value of the inventory is included in a ledger accounts as an asset on the
AC35 balance sheet
" The buyers can follow up with the suppliers to determine the reasons " is an
AC36 example of ----------------From voucher entry mode , if we press __________ then we get payment
AC37 voucher in tally

Journal

AC38 Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged
AC39 accounts member companies of the group.
AC40 A ----------- is a primary document for recording all financial transactions.
AC41 The field can have a value between ________________ in FA Package.
The _______ file maintains data that describes the supplier past transaction
AC42 with the firm in terms of material quality in AIS
AC43 It is necessary to manipulate data to transform it into ---------------AC44 In tally, to change the date of the voucher press ______
AC45 Tally can maintain budgets on ---------------AC46 The value of the inventory is included as an asset on the balance sheet

Main Location

Filled
11
FALSE
management by
objective
F4

True
Ledgers
0 to 9
Supplier
Report
F2
Net Transactions
True

In ratio analysis report of Tally FA packagewe we press ________________


AC47 function key to the display of bills receivable , bills payables report
F6 function key
The accounts payable system is responsible for paying the suppliers for the ---AC48 ------------Sales
1-4-1995 to 31-3AC49 What is the default financial year in Tally6.3 _________________
1996
AC50 Tally encrypts and stores TALLY DATA at the data directory
True
AC51 The Profit & Loss statement can be displayed in ---------------- format(s).
Horizontal
Balance sheet &
profit & loss profit
& loss and trial
AC52 Default ledger accounts in tally are ______
balance
AC53 Default 'godown' name in tally is ____________
Primary
Security
AC54 'Tally vault' is a _________________
mechanism
AC55 To create a sales voucher in tally , you have to press _______
F5
A Group Company is ------------------------- given to the merged accounts of
AC56 member companies of the group.
a name
AC57 In tally,"credit note" voucher type records entry for ________________
Sales return
Company
AC58 In tally you get currency symbol option from _______ menu
creation
------------------ gives the balance for each day for the voucher type has been
AC59 selected.
Trial Balance
AC60 For 'stock journal' entry we press ______________ in tally
F7
Changes in
Tally provides the capability to the administrator/auditor to track changes in the transactions or
AC61 areas is/are
vouchers

AC62 In tally, types of users are _______________


By pressing -------- key, a list of inventory reports can be displayed
AC63 straightaway from the balace sheet report

AC64 Projected approximation of income or expenses is called ______________ .


AC65 "Administrator" type user is also called 'Auditor' of a company in Tally
You will get company information , if you press __________ from gateway of
AC66 tally

Balance sheet
TRUE

AC67 A constituent(member) company can be a member of more than one group.


AC68 Default stock category in tally is ______
To create a log of the import activity in a file _____________ is located in the
AC69 same directory as an executable program in tally
AC70 In Tally,inventory valuation method option is available from _______

TRUE
Main location

F9

F3

Tally.imp
Stock summary

By pressing F11
AC71 Tally audit feature is available in a company __________________
function key
In tally, a group company can also be a constituent(member) of another group
AC72 company
TRUE
AC73 Default number of groups in tally are ________
128
AC74 During voucher entry ------------- are used.
AC75 User designated as --------------- can view audit list.

Ledger Accounts
Administrator
One company to
another company
created withon
AC76 Tally supports Importing of data from ---------------Tally Package
In an accounting information system, which of the following types of computer Inventory
AC77 files most likely would be a master file?
subsidiary.

Which of the following is an advantage of a computer-based system for


AC78 transaction processing over a manual system? A computer-based system:

Does not require


as stringent a set
of internal controls.

op2

op3

op4

ans

ALT+F1

CTRL+F1

None of the above A

Tally IMP

Tally INI

None of the above A

false
ALT+F3

CTRL+F3

A
None of the above B

Bill
Three
Alt+C

A or B
Four
Alt+Ctrl+C

None of the above C


Five
B
None of the above B

FALSE

FALSE
$

&

Puchasing and
Receiving

Accounts payable
and Receiving

^
Puchasing,
Receiving and
Accounts
payable

A
A

Multiple
Fund Flow
Statements

A or B

Mone of the above A

Ratio Analysis

All of the above

Three
Alt+X

One
Ctrl+D

A
B

Alter Information

Four
Ctrl+T
Display
Information

All of the above

F5
Ctrl+P

F6
Shift+P

F7
C
None of the above A

Statistics

Day Book

Journal Book

Data
False
Enterprise Data Information
FALSE
3
data record
TRUE

Sub

None of the above B


A

Electronic Data
Interchange.

All of the above

4
Field

5
All of the above

Open Calculator

Change Period

None of the above B

Groups
Nominal
Automatic
Profit & Loss

Journals
Real
None
Journal Book

None of the above


None of the above
All of the above
All of the above

C
A
C
B
B

B
B
B
A

Stock Journal

Physical Stock
Transfer

Reversing Journal B

Receipt
16

Issue
18

None of the above A


21
B

TRUE
management by
exception

electronic data
analysis

B
All of the above

Alt+f5

All of the above

Primary

F6
Primary Cost
Category

False
Reports
1 to 100

Vouchers
10 to 60

A
None of the above C
None
A

Order
Information
Ctrl+f2
A and B

All of the above


None of the above
Ctrl+f4
None of the above

F7 function key

None of the above A

Purchases
1-4-1996 to 31-31997
False
Vertical

A or B
1-4-1997 to 31-31998

None of the above B

Profit & loss and


trial balance
Main location

Cash and profit &


Cash and bank
C
loss
A or b
None of the above B

Ledger a/c
F7

Cost category
F8

None of the above A


D
F9

an identity
Purchase return

A and B
a or b

None of the above C


None of the above A

Stock items units

Regional setting

None of the above A

Daybook
Alt + F7

Balance Sheet
F10

None of the above B


F11
B

Changes in Ledger
Masters
Both A and B

None of the above C

F5

Suspense
Output
F4
Closing Balance
False
Alt + f6 function
key

A or B

A
C
A
C
A

None of the above B


A
None of the above C

F10

F11

F12

Profit & loss a/c


FALSE

Budget

None

C
A

Ctrl+F3

Alt+F3

None of the above C

FALSE
Primary

Symbol

None of them

Tally.ini
Stock journal
During the
creation of a
company

A or b
Stock analysis
In 'comp info ->
security control'
option

None
A
None of the above A

None

FALSE
228

28

16

A
C

Groups
Owner

Sub-Groups
Data Entry

B or C
TallyVault

A
A

Other programs - a
spreadsheet or a
database file.
Both A and B
Cash
disbursements.
Cash receipts.
Will be more
efficient at
Will produce a
more accurate set producing
financial
of financial
statements.
statements.

A
B

None of the above C


Payroll
transactions.
A
Eliminates the
need to reconcile
control accounts
and subsidiary
ledgers.
C

q_id
VB1

q_desc
Microsoft visual basic project file has _______ file extension.

VB2
VB3

In visual basic, _______ method is used to add an item in a combobox


In visual basic, _______ method is used to load picture during runtime in an image
control

VB4

In visual basic, to populate a drive list box with a directory list box __________
statement is used

VB5
VB6
VB7

VB8
VB9
VB10
VB11
VB12
VB13
VB14
VB15
VB16
VB17
VB18

In visual basic, to display a message in the run time _________ function is used
In visual basic, to populate a directory list box with a file list box ________ statement is
used
In visual basic, ________ is a property of a recordset object which counts the number of
rows in a recordsourse object
In visual basic, using a data control, a record can only be added from the last record.
Adding a new record is only possible using _______ method of a recordset object.
In visual basic, using a data control, a record is saved to a recordsource object using
_______ method of a recordset object.
In visual basic, using a data control, to navigate to the previous record ________
method of a recordset object is used.
In visual basic, when a record pointer reaches to the last record, _______ property of a
recordset object is automatically set to ______
In visual basic, the explorer view of a project is displayed in ___________
In visual basic, when a record pointer reaches to the first record, _______ property of a
recordset object is automatically set to ______
In visual basic, _______ is a method to convert a string into integer.
In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type
of shape should we get?
In visual basic, a timer event is only available in timer control.
In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any
object

VB19

In visual basic, _______ is a property of a textbox control to set a color of a text.


In visual basic, _______ property of a textbox control is set to _______ to underline a
text

VB20

In visual basic, _______ property of a textbox control is used to change the size of text.

VB21

In visual basic, the interval property of a timer control is given in ________

VB22

In visual basic, _______ property of listbox control counts the number of items in the list

VB23

In visual basic, the properties of various controls can be set using __________
In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a
messagebox function.
In visual basic, ________ is a function which displays a message and it also allows the
user to enter values in a form object

VB24
VB25

VB28
VB29
VB30

In visual basic, using a data control, ________ is a recordset type which allows to add a
new record and also to update existing record in a recordsourse object
In visual basic, while closing a form _______ event of a form object is triggered earlier to
terminate event.
In visual basic, to give a backcolor or to bring in a picture to a command button can only
be done if we set the style property to ______
In visual basic, a method RGB(255,0,0) will generate _______ color
In visual basic, a method RGB(255,255,255) will generate _______ color

VB31

In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible.

VB32

In visual basic, if a user uses a function key F4 _________ becomes visible.

VB33

In visual basic, when a textbox control receives the focus ________ event is triggered.

VB34
VB35

In visual basic, a form is a ________ object.


Microsoft visual basic is a Rapid Application Development tool.

VB36

In visual basic, when a form object appears on the screen _________ event is triggered.

VB37

In visual basic, to display text on a label object _________ property is used


In visual basic, _______ object is used to access the database and also to manage the
data in the database.
In visual basic, when a checkbox control is checked _______ property is automatically
assigned with 1.

VB26
VB27

VB38
VB39
VB40
VB41

In visual basic, _______ keyword is used to declare a variable


What is the extension of the Visual Basic project file that stores the design of a user
control.

VB42

Which event of a text box would you use for validating the data entered by the user?

VB43
VB44

Which of the following statements forces inline error handling?


The _______ method resets the contents of bound controls to their original values when
the user clicks on the cancel button.

VB45

To deactivate the Form UnLoad event, you make the following change in the function
definiton:

VB46

How many root nodes can a TreeView control have?

VB47

A project group is a Project which:

VB48

Procedures declared in a _____ are local whereas procedures declared in a ______ are
available to the whole application.

VB49
VB50

How can you keep the user from exiting a form by clicking the Close button?
The _______ property enables Visual Basic to draw complete images in memory before
displaying them on the Screen.

VB51

You want to display the code and the description of an error. What would be the correct
syntax?

VB52
VB53
VB54

What is the purpose of the Image List Control?


Which method would you use to get a free or unused File identifier while opening any
file:
Which property procedure is used to retrieve the value of a property?

VB55
VB56

Which of the following can be shown to the user using the Common Dialog control in
VB?
Which of the following are not properties of Command Button:

VB57

Which events enable you to determine which key was pressed by the user?

VB58

In order to access a file in Non-textual format, you have to open file in:

VB63

Visual Basic displays information depending upon the current value of two properties of
the form, called:
Which of the following procedure types will execute when you assign a value to a
property of an object?
In order to overlap the controls (say a command button) during design time, we use the
Send To Back or Bring To Front option from the Edit menu. To change it dynamically
(i.e.during program execution) we need to change:
Which property of the ProgressBar determines how much of the bar is filled?
The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual
Basic program.

VB64

The caption and the name properties of the command button:

VB65

You try to initialize a new Object variable with the following line but receive an error.
What could be the possible cause? Set MyVar = New Classname

VB66

Which of the following will perform a direct execution of a Command object?

VB59
VB60

VB61
VB62

VB67

The vb Critical symbol displays:

VB68

vbYesNo is an example of a(n):

VB69

VB70

The primary difference between the MsgBox statement and the InputBox function is the:
Which of the following is TRUE about a protected form (i.e., a form where the Protect
Form button on the Forms toolbar is toggled on and is assumed to remain in that
position)?

VB71

Which event is triggered when the user moves to another open form?

VB72

To deactivate the Form UnLoad event, you make the following change in the function
definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To
prevent the Form from closing, you will set the:

op1

op3

op2

op4
.frx
none of the
above
none of the
above

ans

.vbg

.vbp

.frm

add

additem

loaditem

load

loadpicture addpicture

Drive1.Drive=
Dir1.Path
messagebox(
)
Dir1.Path=Fil
e1.Path
openrecordse
t

Dir1.Path = File1.Path =
Drive1.Drive Dir1.Path
message()
Dir1.Path =
Drive1.Drive
opendatabas
e

msgbox()
File1.Path =
Dir1.Path

none of the
above
B
none of the
above
C
File1.pattern=
Dir1.path
C

recordcount

count

update

append

addnew

additem

append

update

additem

addnew

movenext

moveprevious

movefirst

movelast,false

toolbox

eof,true
project
explorer

bof,false
value()

movelast
movelast,tru
e
form layout
window
movefirst,tru
e
int()

movefirst,false
number()

bof,true
val()

D
D

circle
true

rectangle
false

square

oval

D
A

true

false

eof,false
properties
window

B
B
B

fontcolor

color
forecolor
fontunderlin
underline,true e,true
textunderline,true
textsize

none of the
above
none of the
above

C
B

size
foresize
oneone- millionth hundredth of one-thousandth of a
of a second a second
second

D
fontsize
one-ten
thousandth of
a second
C

count
form layout
window

recordcount itemcount
prperties
project explorer
window

listcount

D
B

title

prompt

vbmsgboxstyle

toolbox
none of the
above

msgbox()

textbox

label

inputbox()

opensnapsh
opendynaset ot
dbopensnapshot

dbopendyna
D
set

load

activate

unload

initialze

standard
blue
red

opaque
red
green

transparent
green
blue

D
B
D

properties
window

form layout
window

toolbox

properties
window

form layout
window

toolbox

graphical
black
white
project
explorer
window
project
explorer
window

change

lostfocus

text

child
true

parent
false

container

gotfocus
none of the
above

load

unload

initialize

activate
none of the
above
none of the
above

C
A

text
name
opendatabas
e
dbengine

caption

enabled

visible

value

dime

dim

var

style
none of the
above

.ctx

.ctl

.ctr

.ocx

Validate
On Error
GoTo
linelabel
UpdateContr
ols
Cancel
parameter to
a non-zero
value

Validation

Check

Audit

On Error
GoTo Inline

On Error Stop

On Error
Resume Next D

1
Consists of
several
Programs

2
Consists of
several
Applications

openrecordset

PaintPicture Refresh

Resize

Cancel
UnloadMode
parameter to parameter to a non0
zero value

UnloadMode
parameter to
a zero value
None of the
above
Consists of
several
Projects

3
Consists of Various
Forms And Code
Modules

Form
window,
Project
standard or window, view Class module, code
code module code window module

None of the
above

C
B

A
D

Place code in
the Terminate
event
AutoRedraw
= True

Place code
in the
Unload
Place code in the
Deactivate event
event
AutoRedraw
= False
Refresh

None of the
above

GetFileNum GetFile
GetProperty
Get

GetBytes
Value

PaintPicture A
Msgbox
error.number
&
Msgbox
Msgbox
err.no &
err.number & Msgbox error.number error.descrip
err.text
err.text
& error.text
D
tion
To provide a
repository
for images
used by
To display
To help in
images to the creating a
To allow the editing of other
user
ToolBar
icons
D
controls
FreeFile
Retrieve
Common
messages
passed to
Windows
Caption

Open dialog
box
Visible
Click, KeyUp
Click and
and
KeyPress
KeyDown
Binary
Ascii Format Format
CurrentX
ScaleLeft
and
and
ScaleTop
CurrentY
Property
Property Get Assign
Background Caption
color property property
Min
Max
Shell
Are one and
the same
You do not
need to use
the Set
command
here
The Open
method

Substr
Can be
different at
times
You do not
have the
permission
to access
the class
The Exec
method

Windows explorer
Multi-Line

A
B

Input box
Font
KeyPress,
KeyUp and
KeyUp and KeyDown KeyDown

D
C

Input Mode

Output mode

ScaleHeight and
ScaleTop

x and y

Property Let

Property Set

ZOrder property
Value

AutoRedraw
property
CurrentVal

C
B

SetAttr

CStr

Are actually not


properties

None of the
above

MyVar has not been


declared
The ExecProcedure
method

None of the
above
None of the
above

C
D

A warning
query icon

A critical
message
icon

None of the
above
built-in
statement.
variable.
intrinsic constant. procedure.
MsgBox
statement can
be created
InputBox
MsgBox
with the
function
statement
macro
returns a
returns a
InputBox function can recorder,
value, while value, while be created with the
while the
the InputBox the MsgBox macro recorder, while InputBox
function does statement
the MsgBox
function
not.
statement cannot.
cannot.
does not.
Data cannot The form
A new check
Data can be
be entered
can be
box can be
into the form. modified.
added.
entered.
Unload
Cancel
parameter to
a non-zero
value

An exclamation icon

B
C

QueryUnload Deactivate

Terminate

Cancel
UnloadMode
parameter to parameter to a non0
zero value

UnloadMode
parameter to
a zero value

q_id

q_desc

IN90

The two major browsers used to surf the Internet are ________,_______

IN91

IN93
IN94
IN95

Special characters allow browsers to display _________________


The keyword for providing links within or across documents
is____________
Stringing pages together using hypertext technology helps view pages
_______________
The initial web pages present in a web site is the ________ page.
The image format supported by most browsers is________________.

IN96

The components of a URL are ___________

IN92

op1
MS Internet
Explorer and
Mosaic
text
hyperlink
in random order
first
.bmp and .gif
Service, hostname
and directory path

mail servers,mail
clients and
alternate services

IN98

The mail we send has a mailing address and most of them correspond
to_____,_____ and
Which of the following is not supported by internet explorer
_______________

IN99
IN100
IN101

CGI stands for ____________


Host name indicates the domain name of the web ________
The internet is also called as _______________

<center>
communication
generated
information
Server
arpanet

IN102
IN103
IN1

The internet is similar to _________________


The net drivers______ from one place to another
The World Wide Web was devised by _________

LAN
data
CERN

IN2

The useful URL schemes are_____ and______

yahoo and infoseek

IN3

The other ways of getting connected to the net are_____

news groups,yahoo
and infoseek

IN4
IN5
IN6
IN7

BBS stands for______


USENET is a BBS on ____ scale
WINSOCKS is expanded as______
IETF Level 2 HTML DTD supports graphical browsers like _______

bulletin board
system
small
windows socks
Mosaic

IN8
IN9
IN10

The space used by Netscape to store the retrieved page is called______


The URL for encyclopedia Britannica is_________
_______ maps IP addresses with the domain names of the sites

buffer
www.ency.in
URL

IN11
IN12

Internet can be defined as _______


The most important service of the ______ is to manage traffic control

internal network
application layer

IN97

IN15

_________is a program that displays information about a host connected to


the net
finger service
_______ is a program or a tool that helps in locating a file anywhere on the
net
FTP
uniform research
URL stands for ____________
locator

IN16
IN17
IN18
IN19

IN an URL the word before the color refers to _______


A ______ always begins with a slash
Prodigy is run by IBM and ______
The World Wide Web is referred to shortly as the _______

host computer
message
Delphi
net

IN20

Gopher and WAIS enables the user to ______

IN21

______ is the program used to run CompuServe's regular services

browser
CompuServe
internet dialer

IN22

Navigating through the menu of gopher is called moving around _______

gophering

IN23

Alta vista

IN24
IN25

The directories that come with built-in engines are yahoo,lycos and ______
To use the finger command,SLIP users must run a programme
called______
The web maps are called _______

IN26
IN27
IN28

Directories consists of _______ levels


The _____ level gives the broadcast overview of the net
The huge list of keywords from important items is called ______

IN29
IN30

The two types of search in veronica are _____ and ______


_______ searches by keywords

no
middle
hotlist
directory
search,index
search
infoseek

IN31
IN32
IN33
IN34

Mosaic displays links in color whereas _____ does not display links in color
______ supports one button publish
SPY MOSAIC is distributed by_______
______ is a program that helps us to log on to other networks

IN35
IN36
IN37

HTTP is the acronym for __________


______is used to transfer and copy files over the internet
_____ is a program that helps us to log on to other networks

IN13
IN14

IN38
IN39
IN40
IN41
IN42
IN43

finger server
list

netshark
lynx
Microsoft
Usenet
Higher text transfer
protocol
iccp
yahoo

transfer control
TCP/IP stands for ________________
protocol/internet
Archie servers can be accessed in_______ different ways in internet
one
_______is the computer on the internet that translates between the internet
domain names and the internet numeric address
ftp servers
the internet
TIA stands for_____ in internet
adapter
Service indicates the name of the ________ used to access data, present
on the other end of the link.
browser
hotlink text transfer
HTTP stands for______
protocol

universal resource
locator
frequent asked
query

IN44

________ is used to link pages in the world wide web

IN45

FAQ stands for ______


The internet adapter is a programme that makes our connection act like a
_____or a ____ account
SLIP,PPP
The step involved in Communicating between the web clients and servers is
______________
connection
wide search for
information and
WSIRC stands for______
research
Two of the important browsers are_____ and_____
lynx,minx
world wide web
Lynx is a _______ programme that works with terminals
server
The huge list of keywords from important items is called an_____
glossary
very easy and
rodent oriented
net wide index to
computerized
VERONICA is an acronym for _______________
archives
university of
berkeley,berkeley
The first freenet is created at the_____ and is called______
freenet
________ are defined as ways of communication amongst networks
protocols
search
engines,directorie
______and_____ are web searching features
s
WINWAIS has two source lists namely____ and______
allsrc,winsocks
________ is also called as WAIS manager
allsrc

IN46
IN47

IN48
IN49
IN50
IN51

IN52

IN53
IN54

IN55
IN56
IN57

IN58
IN59
IN60
IN61
IN62

HTML stands for_____


The system of interlinked documents is known as_______
The small programmes that create animation,multimedia,real-time games
and multi user games are called______
The information displayed on the web page includes______,_____
and_____

higher text medium


language
hot links
images
graphics,videos,a
udio

IN63
IN64

The web pages that represent online home of their author are called______ first page
global network
GNN stands for______
news
_____ is the most popular internet service
yahoo service

IN65

The online service offered by navigator gold 2.0 are _______ and_____

email and net


conference

IN66

_______ is a program or a tool that helps us find a file anywhere on the net

newsgroup

IN67
IN68

The databases to enable keyword search using Lycos are a2z,_______


______ is a large worldwide bulletin board service network

Lycos catalog
apple link

IN69

computer related
abbreviations and
acronym
encyclopedia
Britannica
search engines
Graphical
interpreter
formatting

IN70
IN71

BABEL consists a glossary of _____


Dictionaries,encyclopaedias,government and other references are found in
______
Yahoo,lycos,excite and webcrawlers are _____

IN72

GIF is the acronym for ____________

IN73
IN74

JPEG is the acronym for ___________


The Web aids users to explore the ________

IN75

The three most popular mailer are_____,_____ and______

IN76

The World Wide Web consists of _________


In Microsoft Internet Explorer, the color of the text can be specified using
_________ attribute of the font tag.

information

Communication
gateway interface
Network

IN80

The interface that provides effective communication between the web


browsers and servers is _________
CGI is the _________ between web browsers and servers
CGI programs are invoked based on the information provided by the
_________

IN81

A CGI program is usually called after a request made by the _________

IN82

URL stands for ________

Browser/user
Unknown
resonance
language

IN83
IN84
IN85

A hyperlink can be on ___________


HTML was derived from _________
SGML is a _________

text only
SQL
alphalanguage

IN86
IN87
IN88

PINE stands for _____________


palm is not eatable
The application that confirms whether a document is compliant to its DTD is
_________
SGML Processor
Web is a collection of ___________
web sites

IN89

IETF stands for ________

Internet equipment
training faculty

IN104

The net provides interesting services like______,______ and______


The windows internet software available are______,_______,________
and______
________ is the ancestors of the internet

scripting,parsing
and compiling
nt,windows95,ie,wi
nzip
dnet

IN77

IN78
IN79

IN105
IN106

Joint Pictures
Expert Group
mails
yahoo,infoseek,alta
vista

BACKGROUND

Current web page

IN115

defensive
administrative rank
DARPA stands for
administration
_______________________________________________
network
The uuencode files start with a _______
start
milnet,smaller
DARPA is broken into ________ and _______
arpanet
education,researc
NSFNET is the united states provides service to _____ and_____
h
Higher text
manipulation
HTML stands for ______________________________________
language
The first international IP network connections were established in 1973 with united states and
_____ and_____
UK
A_____ is a set of computers interconnected by transmission paths to
exchange information in internet
server
A computer that provides a service usable by other computers is
called______
client
A_______ is the representation of physical connectivity of the computers in
internet
network card

IN116
IN117

DTE stands for ____________________


The basic function of the ______ is transmitting the bits over a channel

IN118
IN119

The point to point channel network is also called as _____ and_____


Accessing files using FTP servers is called_____

detailed transaction
explanation
application layer
point to point
network and
broadcast channel
network
file access

IN120
IN121
IN122
IN123

The three most commonly used networks are______,______ and______


________ is in between LAN and WAN
_____ can be owed by multiple organisation
Data is transmitted in the form of_____ signals

PAN,NAN,AAN
VAN
LAN
analog

IN124

DTD stands for __________

IN125
IN126

Modem stands for __________________


______ is the process of the digital signals being converted into a form
suitable for analog transmission

Data type definition


Moralize/demoraliz
e

IN127

________ and______ are two basic ways of getting connected to the


internet

IN128

SLIP stands for ________________

IN129

PPP stands for _____

Satellite link and


digital signals
Standard long
internet protocol
Prime prolonged
protocol

Which of the following best describes uploading information?

storing data on a
disk drive

IN107
IN108
IN109
IN110

IN111
IN112
IN113
IN114

IN130

Mapping

IN131
IN132
IN133

IN134
IN135
IN136
IN137
IN138
IN139

IN140
IN141
IN142
IN143

IN144

A characteristic of a communication channel that is the amount of


information that can be passed through it in a given amount of time,
expressed in bits per second.
The act of searching through storage to locate information without
necessarily knowing of the existence of the information being sought.
The principles, means and methods for rendering information unintelligible
and for restoring encrypted information to intelligible form.
A long string of seemingly random bits used with cryptographic algorithms to
create or verify digital signatures and encrypt an decrypt messages and
conversations.
Protected/private character string used to authenticate an identity or to
authorize access to data.
The successful act of bypassing security mechanisms of the system.
A set of rules and formats, semantic and syntactic, that permits entities to
exchange information.
An attempt to get access to a system by posing to be an authorised person.
An action or event that might prejudice security.
According to information Technology Act, 2000, To investigate
contraventions the controller of certifying authority shall exercise the like
powers to that of
Malicious software.
None the person who is known as father of Internet
This website is the biggest bookstore on the earth.

Bandwidth
Find
Photography

Key
User-id
Penetration
Acts
Spoofing
Loss
Sales - tax
authorities
Utility
Tim Berner Lee
Etrade.com
Automated Tailor
Machine

IN147

When we talk of Data Transmission modes, then ATM stands for


A sequence of bits or characters that identifies the destination and the
source of a transmission.
The means of communicating between networks
A group of computers and other devices dispersed over a relatively limited
area and connected by communication links that enable a device to interact
with any other on the network.

IN148

The term HTTP stands for

IN149

A NIC is considered as

LAN
hyper terminal
tracing program
National
Informatics Center

IN150

A hub is a device that can connect

Only Computers

IN151

Which of the following is true concerning the function of a switch?

IN152
IN153
IN154

What do routers connect?


What does a router route?
Software which prevents external access to a system is termed
If four computers are connected to a hub and then to the internet, how many
IP addresses are required for these 5 devices?
One
Which of the following in an OSI layer
Physical Layer

IN145
IN146

IN155
IN156

Acts
Router

Concentrates
connectivity
Bridges and
Repeaters.
bits
firewall

IN157
IN158

When creating a network from just two PCs, what kind of cable would be
used to connect them?

IN159

An IP address is a
To construct a simple LAN of 4 computers, you would connect them with
______connect them

IN160

What happens to data that is ruined before reaching to receiver

IN161
IN162
IN163
IN164

Bluetooth is
Which is not one of the recognized IEEE sub layers?
The most preferred number system to represent a IP address is
A MAC address is of

IN165

Protocol is
A ............... is a LAN-based computer with software that acts as a
controlling device for controlling access to at least part, if not all, of a local
area network and its available resources.

IN166

IN167

RG7U
Physical address
A cable
Data return to the
sender
Wireless
technology
Physical Layer
Binary
48 Bits
software that
facilitates
connection to the
internet

Novell PC

IN175
IN176

What is the biggest disadvantage of the Ring topology?


The .............. of the network concerns how network devices are physically
(or optically) interconnected.
The principal topologies used with LANs are:
What are the various types of bus architecture?
What are the various types of ring architecture?
In a ................., each workstation attaches to a common backplane via its
own physical cable that terminates at the hub
In a ............... , each work station is directly connected to a common
communications channel
Which one of the following is NOT a network topology?
In a .............. , the cable system forms a loop with workstations attached at
various intervals around the loop
The Media Access Control (MAC) is a sub layer of the:

IN177
IN178
IN179

What are the most common LAN technologies used in networking today?
Modem speeds are measured in
LAN speeds are measured in

Ring
Network Layer
Ethernet, token
ring, DecNET
bps
bps

IN180
IN181

WAN speeds are


Accessing the Internet from a typical home PC requires the use of

usually higher than


LAN speeds
CD-ROM drive

IN182

To use the Internet, you

must use the


World Wide Web

IN168
IN169
IN170
IN171
IN172
IN173
IN174

There isn't one


Physiology
Bus
Linear
Parallel
Ring
Ring
Star

IN183

The worldwide web server uses the following standard interface to act as
the middleware:

IN184
IN185
IN186

An NIC
Accessing the Internet from a typical home PC requires the use of
The most widely used network operating system on PC LANs is

IN187

JPEG and MPEG

a Novell Interface
Controller
CD-ROM drive
Linux
have to do with
compression of
graphics and
video

IN188

To use the Internet you

must use the


World Wide Web

IN189

A multiplexer is a form of

IN190

An ISP

Printer
provides access
to the Internet

IN191

FTP is

used to send
email

IN192

Telnet

IN193
IN194

A firewall is
A proxy server is

IN195

IN197

A search engine is
hardware
To look for information about interest areas on the internet, the user should
use a
scanner
provides access
An ISP
to the Internet

IN198

FTP is

used to send email

IN199

Telnet

used to send email

Which of the following is a true statement about the OSI model layers?

The layers cannot


communicate with
one another.

IN196

IN200

key gateway
interface

used to send
email
used to protect a
computer room
from fires and
floods
a backup server

IN201
IN202

IN203

IN204
IN205
IN206
IN207

It is one large
Which of the following is NOT true about the Internet?
network.
The traditional intent and impact of this common type of attack is to prevent
or impair the legitimate use of network resources.
Password cracking
used to protect a
computer room
from fires and
A firewall is
floods
Which of the following is NOT an example of a DoS attack that is popular
among hackers?
A ____________ attack is when a hacker sends a continuous flow of
packets to a system.
One defense option on a large network is to configure a ____________ to
disallow any external traffic.

IP flood
hack
firewall

IN208

A proxy server is
Which of the following would be performed on a network server and not
normally on individual workstations?

a backup server
Apply security
patches

IN209

What can be said about the safety of the Internet?

All sites are safe


and reliable.

IN210

To secure communication network against wire-tapping the most effective


control is

Use of identifiers

IN211

IN214

One way that a virus CANNOT spread throughout a network is:


Which of the following is NOT a means of monitoring employee use of
company technology?
____________ would be used by parents to monitor their children on their
home system.
The formal rules and parameters which are established to permit a
microcomputer to communicate with the mainframe computer as though it
was a terminal of the mainframe are called

IN215

The two most common tools used to help with extracting information are:

IN216

Which of the following would NOT be considered an example of cyber


terrorism?

IN217

Which of the following would be a form of cyber terrorism?

IN218

Which of the following is a likely target of a cyber terrorist that would cause
considerable loss of life?

IN212
IN213

by attaching to an
e-mail.
Phone
A Trojan horse

Modems
cookies and Trojan
horses.
An attack on a
system for
personal gain
Economic damage
Crashing the stock
market, as in the
1930s

IN219

IN220
IN221
IN222
IN223

IN224

An organisation is upgrading its telecommunication lines. Which is the least To carry more
important objective while upgradation
network capacity
A company posts a price list of its products on its website. The advantage to set its prices very
the customer is that the company can
high
Which of the following is an easy-to-use service to get information on
someone?
People Search
Name of your
Which of the following pieces of information would NOT be found online?
bank
Which of the following is the most common danger on the Internet?
Virus

IN227

The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in
order to obtain sensitive information is called _________________.
Using the Internet to pursue, harass, or contact another in an unsolicited
fashion is called:
Setting your privacy settings in Internet Explorer to medium is one way to
block:

IN228

What is the best means of protection from cyber stalking?

IN225
IN226

buy stocks.
Shill bidding
Internet stalking.
pop-ups.
Use a fake e-mail
address.

IN231

Which of the following is not an appropriate control over


telecommunications software
Encryption techniques can be implemented in Hardware-Software
Which protocol would be used to download a free anti-virus program from
the Internet?

IN232

The major advantage of the checksum program is when it

Adds more bytes to


programs

IN233

Which of the following is a Web browser?

HTML

IN234

A Web page is another name for ----------Domain names must contain a description of the type of organisation that
the domain represents. A very common abbreviation used include:

Web query.
.com is used for
company

A standard language for creating and formatting Web documents is:


The Web page format in which all elements of a Web page are saved as
one file is called:

round trip HTML.

IN229
IN230

IN235
IN236
IN237

Encryption
I only
irc

XML.

IN238

IN239

IN240

IN241
IN242

IN243
IN244
IN245
IN246

IN247
IN248
IN249

using Internet
Explorer to view a
Web page that is
stored on the hard
drive on your
Which of the following requires an Internet connection?
computer
Click on the Back
arrow until the
Mr Rao wants to find a website that he briefly browsed over yesterday. After desired site is
turning on his computer how would he do this?
found
the Refresh
Which of the following is used to update a Web query?
command
You download from the internet, a screensaver, a ten-second sound file and
a ten-second music video clip. You also add a hyperlink. Which of the media
elements has the greatest effect on the file size?
Hyperlink
When saving a photograph for use on a website, which format should you
choose?
BMP

While researching the Direct taxes assignment, you find a useful website.
Save it to a floppy
What is the most efficient way to access the site at a later time?
disk.
A system that uses the Internet for business-to-business interaction is called
a(n):
extranet.
A block of text automatically added to the end of an outgoing email is called an attachment.
_________ refers to the use of Internet technologies for placing telephone
calls.
VoIP
Desktop client,
application, and
Most client/server applications operate on a three-tiered architecture
consisting of which of the following layers?
database.
Which do you NOT need to connect to the Internet?
Modem
File Transfer
What does FTP stand for?
Program
So computers
can be referenced
by a name

IN250

What is the purpose of DNS?

IN251

Which of the following is NOT a properly formatted IP address?

IN252

Which of the following is a properly formatted email address?

IN253

The Internet is controlled by whom?

193.1.2.3
paul .trigg @
domain. org. uk
The US
government

IN254

What does IRC stand for?

Internet Relay
Chat

IN255

If you do not pick up your email for a week...?

It will be deleted

IN256

What does HTML stand for?

IN257

What is a disadvantage of joining a mailing list?

Hyper Textual
Mark-up Lingo
Receiving
messages
automatically from
anyone in the
group

op2

op3
MS Internet
Explorer and
Netscape
Navigator

None of the above C

symbols

video

hotword
in user-defined
order
home
.gif and .jpeg

hotlink

none of the above


none of the above
.wmf and .bmp

B
C
C

service,port and
directory path

service,hostname
and port

mail vendors,mail
identification and
password

mailing lists,mail
server robots and
gateways to other
none of the above
services

<font size=n>

<hr size=n>

<l1 type=shape>

common gateway
interface
Client
the net
peer-to-peer
connectivity
parcel
ECRN

classified general
instructions
Browser
intranet

none of the above


User
none of the above

B
A
B

none of the above


none of the above
NET

B
A
A

none of the above

none of the above

none of the above


none of the above
none of the above
Lynx

A
B
B
A

none of the above


none of the above
none of the above

B
B
B

none of the above


session layer

B
D

Netscape
Navigator and
Mosaic
data from a
database
hypertext
in sequential
order
start
.bmp and .jpeg
service,hostname
,port,directorypath

wan
packets
CARN
newsgroups and
search engines
mailto and files
bulletin
application
boards,mails call servers,proxy
and wireless
servers and web
servers
system
business
bulletin
broadcasting
broadcasting
system
system
very small
large
windows sockets windows stocks
Yahoo
PINE
cache
www.eb.com
DNS
network of
network
transport layer

built-in
www.encybrit.com
FTP
intermediate
network
physical layer

op4

ans

ping service

ftp service

none of the above

TELNET
uniform resource
locator
name of the
resource
scheme
Microsoft
web
read the Usenet
news

ARCHIE
unlimited restore
locator

none of the above

none of the above

none of the above


none of the above
general electric
editor

C
C
C
B

none of the above

spy mosaic

scheme
command line
sears
browser
search for
database
wincim or
maccim

none of the above

gopherspace

cyberspace

none of the above

open text

excite

none of the above

ftp server
directories

web server
image list

none of the above


none of the above

A
C

maximum of five
lower
directory

one
top
index

many
middle and lower
glossary

B
D
C

index search,menu menu search,item item search,index


search
search
search
excite
lycos
all the above

C
D

cello
mosaic
internet
finger service
Hyper text
transmission port
ftp
ftp
transmission
control
protocol/internet
protocol
two
domain name
servers
the internet
administration

lynx
Lycos
IBM
ftp
Hyper text
transfer protocol
uucp
telnet
transfer
communication
protocol/internet
protocol
three

all the above


navigator gold 2.0
CompuServe
telnet
Hyper text transfer
port
none of the above
none of the above

C
C
D
D

none of the above


none of the above

B
C

web servers

none of the above

the internet access none of the above

protocol
hyper text
transfer protocol

site
organization
higher type transfer
protocol
none of the above

C
C
C

uniform resource
locator
frequently asked
question

uniform resource
label
frantically asked
question

TCP,IP

name of the above B


none of the above

IP,UDP

none of the above

response
windows sockets
internets relay
chat
netscape,ie
world wide web
client
index
very organised
network integration
and
communication
application
university of
cleveland,clevela
nd freenet
IP address

request
world search for
information and
research council
mosaic,gopher

close

none of the above


none of the above

B
B

interface
hotwords

none of the above


none of the above

B
B

verification on
network integration
and
communication
none of the above

university of
California net
dns

none of the above


none of the above

B
A

ftp and finger


wais,allsrc
waisman

telnet and ftp


wais,winsocks
winsock

none of the above


none of the above
none of the above

A
B
B

none of the above


none of the above

C
B

animation
none of the above
applets
programms,images animation,scripts,e
,text
xecutables
none of the above

hyper transfer
hyper text markup
markup language language
books marks
hyper text

home page
global networks
navigator
electronic mail
Netscape page
starter
site,netscape
page wizard

welcome page
grand network
news
search engines

none of the above

none of the above


none of the above

B
B

yahoo and altavista none of the above

telnet

ftp

archive

point review
bitnet

all the above


Delphi

none of the above D


fidonet
A

biographical
information
on-line reference
works
web directories
Graphical
interchange
Format
Jumbled pictures
expert graph
documents

bookstores

none the above

more information
database

galenet
channel

A
B

Graphical interface Graphical Interface


format
format
B
Joint pictures
experimental group A
browsers
C

web pages

Joint pictures
expert graph
net
eudora,netscape
and pine
network
connections

COLOR

FCOLOR

netscape,ie,lynx

none of the above

mails

FONTCOLOR

Common
Common graphical Communication
Interface
graphical interface Gateway Interface D
Communication
Connection
B
Interface
Browser

Client

None of the above B

Server

Web

Channel

Uniform resource
United relay limited None of the above
locator
neither text nor
image only
image
text or image
PLSQL
CGI
SGML
betalanguage
none of the above
metalanguage
pancake is not
edible
none of the above
palm is not elm
SGML
Preprocessor
SGML Composer
SGML Parser
images
applets
documents
Internet
International
Engineering Task
Engineering
trainers and faculty Force
email,file
news,cooking and retrived,internet
fine arts
tools
mosaic,gopher,eu communicator,ie,ly
nx,winsock
dora,trumpnet
ARPANET
arpanet

B
C
C
C
B
C
A

None of the above C

none of the above

all of the above


none of the above

B
B

defensive
advanced
research projects
dedicated and
registered projects administration
administration
none of the above
net
first
none of the above
begin

C
B

mailnet,inet

intranet,extranet

none of the above

music and dance

cooking and dining none of the above

Hotlink text markup Hyper transfer


language
meta language
united states &
england,norway Russia

Hyper text
markup Language D
none of the above

client

network

none of the above

stand-alone

servers

none of the above

network topology network redirectors none of the above

data terminal
equipment
physical layer
packet
switching,store
and forward
network
anonymous ftp

data target
equipment
network layer

none of the above


none of the above

B
B

smart network and


dumb network
none of the above
file transfer
none of the above

B
B

KAN,RAN,VAN
MAN
MAN
digital

none of the above


none of t he above
none of the above
none of the above
Document type
data

C
B
C
B

none of the above

Manipulation

none of the above

Cable and wires


Serial line
protocol
Pillar to pillar
protocol

none of the above

none of the above

LAN,WAN,MAN
TAN
WAN
non-digital
Document type
Define type of data definition
Modulation/demo Manipulate/demani
pulate
dulation
Modulation
Dedicated access
and dial up
access
Stream line internet
protocol
Point to point
protocol
sending
information to a
host computer

none of the above B


receiving
storing data on the information from a
hard drive
host computer
B

Speed

Size

Channel

Save

Browse

Retrieve

Digital Signature

Cryptography

Message Digest

Lock

Hash Function

Formula

Password
Retrieval

Name
Cryptography

Address
B
Password Cracker A

Regulations

Address

Protocols

Imposting
Threat

Unauthorising
Exposure

Approving
Hacking

A
B

Income - tax
authorities
Pirated software
Hoffman
Amazon .com

Police officer of
IPS rank.
Cracker
Howard Aiken
Msn .com

B
C
A
B

Any Time Money

Judge of a civil
court
Virus
Charles Bubbage
Dell .com
Asynchronous
Transmission
mode

None of above

Regulations
Gateway

Address
Port

Protocols
Pin

C
B

WAN
hypertext tracing
program
Network Interface
card

CAN
hypertext transfer
protocol
New Information
Card

PAN
hypertext tracing
protocol

Can not computers


Combines
connectivity of a
hub with the
traffic regulation
of a bridge
Two or more
networks
frames
gateway

Only printers

Bridges and Hubs


Packets
router

Hubs and nodes


B
None of the above C
virus checker
A

Two
Data-Link Layer

Four
Network Layer

None of the above C


D
All of the above

None of the above B


None of the
D
above

Switches data from


incoming ports to
outgoing ports.
All of Above

Coaxial cable

Fiber

Twisted pair

Logical address

A memory address None of the above B

Router
It continue on to
It gets destroyed target device with
corrupt data
bit by bit.
Ultra violet
Wired Technology technology
Data Link Layer
Network Layer
ASCII
Octal
48 Bytes
48 KB

None of the above B

None of the above


All of the above
None of the above
48 MB

A
D
A
A

a list of rules for


transferring data
over a network

software that
allows file copying

a gateway calling
program for
internet bridging

If one node goes


down, it brings
down the entire
ring

Server
If the hub goes
down, it brings
down all of the
nodes on that
section

Network PC
C
If the hub goes
down, it brings
down all of the
nodes on all of the
rings
B

Topology
Star
Parallel
Circular

Both A and B
Ring
Both A and B
Linear

None of the above


All of above
None
Both A and B

B
D
A
B

Bus

Star

Mesh

Bus
Bus

Star
Linear

Mesh
Ring

B
C

Mesh
Data Link Layer
Ethernet, token
ring, ARCnet
mips
Mips

A
D

Hub

Client

Bus
Transport Layer
Ethernet, token
ring, FDDI
kbps
Kbps

Star
Physical Layer
Ethernet, DecNET,
FDDI
mbps
Mbps
depend on the
measured in bytes transmission
per second
medium
Windows 95
a modem
must use electronic must have a LAN
mail
account

None of the above B

B
B
C

limited by modem
speeds
Netscape

C
B

All of the above

used to control a
printer
a modem
Novell Netware

common gateway
interface
interfaces a
modem to a
computer
Windows package
Windows NT

have to do with
Web pages

the Internet

uniform resource
locator

must use electronic must have a LAN


mail
account
modem

application protocol
interface
connects a
computer to a
network
Netscape
None of the above

none of the
previous
use appropriate
communications
software
none of the
previous

is a CPU register

bridge
is a CPU
functional unit

used to browse
the Web
uses wireless
communication
medium

None of the
is part of Netscape above

a form of virus
an email server
IR system for the
Internet

D
B
C

A
D

make of processor A
is a protocol for
the transfer of
files between
is part of Netscape computers
D

a screen saver
program
a poor file server
browser

CD-ROM

none of the
previous
none
none of the
previous

clip-art file
search engine
is a CPU functional
is a CPU register unit
make of processor
is a protocol for
the transfer of
files between
used to browse the
Web
is part of Netscape computers
is a protocol that
allows for remote
uses telephone
lines
is part of Netscape login

Any layer can


communicate
directly with any
other layer.

Any layer can


communicate
only with the
layer directly
above or below it.

D
D
C
D
A

Any layer can


communicate only
with the layer
above it.
C

It is made up of
many networks
connected into
transmission lines
called backbones.

It works the same


way as a local
network.

System intrusion

Denial of Service Port sniffing

a screen saver
program

none of the
previous

Virus that initiates


a ping flood

UDP flood

packet

flood

traffic

router

switch

hub

a form of virus
Flood a Web
server with
requests

an email server
Update virus
definitions

a poor file server


Backup data on a
daily basis
Only large nameThere are safe
recognizable sites
and unsafe sites. are safe.

Individual
computers can
connect to it using
an ISP.
A

none of the above D


Limit logging on
access
C
ActiveX-enabled
sites are safe.

Use of passwords

Use of logical
access methods

through an FTP
port.

by attaching itself
to a document.

E-mail

Web traffic

Use of encryption
D
methods
by scanning the
computer for a
connection.
B
Application
D
updates

Adware

A worm

Spyware

Protocols
Trojan horses and
key loggers.
An attack with the
purpose of gaining
publicity
Disruption in
communication
Shutdown of
military security
systems

Multiplexors
cookies and key
loggers.

LAN
key loggers and
worms.
Changing the
content of a Web
page
All of the above
are correct.
Shutdown of
nuclear plant
safety systems

Giving out
disinformation
Disruption in
supply lines
Contaminating
water systems

D
D

To improve
network services
limit access to
computer owners
only
Yahoo People
Search

To obtain an
accurate
inventory of
network related
equipment and
To improve system parts and network
response time
D
nodes
update its prices
stop its competitors as soon as they
seeing their prices are changed
D
USA People
Search
Lycos Search
B

Date of birth
Fraud

Personal assets
Adware

Criminal records
Spyware

A
B

make large
amounts of
money by parking
purchase off-shore funds in their
invest without risk. property.
D
bank account.
Phishing

Siphoning

Hoaxing

cyber stalking.

virtual stalking.

Web stalking.

viruses.
Use anti-spyware
Use a proxy server. software.
Message
Physical Security sequence number Logical access
checking
controls
controls
II only
Neither I or II
Both I & II

ftp

www

Verifies integrity
of files

Increases boot up
time

telnet
Misleads a
program
recompilation
both HTML and
Internet Explorer
Web browser.

cookies.
Never use your
real identity.

spam.

Microsoft Excel
round trip HTML
HTML document. document.
.co in used for
.con is used for
company
companies
the World Wide
Web Consortium
HTML.
Internet Explorer

HTML.

DHTML.

B
C

B
B

None of the above A


one way HTML.

MHTML

clicking a hyperlink
that references a
updating the
document that is
values that are
stored in the floppy
obtained through drive on your
computer
a Web query
Click on Go to or
Search in the
browser

viewing an Excel
worksheet that you
have saved as a
Web page.
B

Go to the History Go to the


page and look for Bookmarks or
Favorites page
the site

the Insert Hyperlink the Update


command
command

the External Data


command

Screensaver

Sound

Video

GIF

JPEG

TIFF

Add it to
Write it down on a Favourites or
piece of paper.
Bookmarks.

Cut and paste it to


a word processor
document.
C

intranet.

privileged network. network topology

a signature.

a footer.

an encryption.

IPT
Desktop client,
software, and
hardware.
CD-ROM
File Transmission
Protocol

IPP
Desktop server,
application, and
database.
Telephone line
File Transfer
Protocol

PoIP
A
Desktop server,
software, and
hardware.
A
None of the above B

So IP addresses
can be shorter

So email is
delivered faster

45.1.1.1
143.215.12.19
paul.trigg@domai
paul.domain.uk
n.org.uk
Scientists in
Switzerland
No-one
International Relay Internet Remote
of Characters
Conversations

None of the above B

None of the above A


None of the
D
above
None of the above B
None of the above C

None of the above A

It will be waiting for A letter will be sent


you to collect it
to you in the post None of the above A

Hyper Text MarkHyperlink Text


Marking Language up Language
None of the above C

People discussing
a topic of interest High volumes of
globally
email

None of the above C

q_id
EC1

q_desc

EC8

The acronym for B2B is ___________


The _____________ model is the least intrusive model but
requires active search on the part of the customer
__________ is / are a form of advertisement where people relate
their experience with products and services
The _________ are software agents who communicate with the
business merchants on behalf of the customers
The Pre-purchase preparation phase includes _______________
for a set of products
The _________ phase includes customer service and support to
address customer complaints , product returns and products
defects
The ________ allow companies to bypass the need for costly
printed catalogs
A ________________ is a basket on the Net that is used to place
the items that are being purchased

EC9

EDIFACT is an abbreviation of ________

EC2
EC3
EC4
EC5

EC6
EC7

EC10

EC11

EC12
EC13

EC14
EC15
EC16
EC17
EC18

EC19
EC20

EC21

op1
Business-toBusiness
Billboard
Customer
Endorsements
Intermediaries
Order Placement
Post purchase
interaction
Billboard model of
marketing
Online Catalog
EDI For
Administration,
Commerce and
Transaction

The __________ allows for protocol conversion and communicates


with the bank using the banks private network or the Internet
EDI
In Ecommerce, data extraction, transforming the data into
transmittable form, transmitting the data and downloading the data
are the operations employed in _________
Compiler
The _________ commerce assists in integrating the customers
and suppliers of the company directly into the organisation
E-cash means______________________
E-commerce is a tool that addresses the desire of firms to cut
services cost and improving the quality of goods. It is a
definition of e-commerce from _________
The small denomination digital tokens are called _________
The ____________ is the process of encoding information to
prevent it from being read by unauthorized parties
In EDI interface, the translation service receives _________ as
incoming files from the communication service
The EDI standardisation for International Trade and Commerce is
introduced by __________
In EDI, the transmission files are composed of different sets of
external format files which are grouped into multiple sets under the
name of ________
The ________________ are pre-paid credit cards that include an
embedded cards
________________ are another form of credit payment that lets
customers use digital online cheques to pay Web merchants
directly

Business-to-Business
Emergency Cash
Communication
Perspective
Microcash
Decryption
Internal Format File
ANSI

batch files
Smart Card

E-cash

In Active advertisement, there are two types of models. They are


_____ and ________
The network based technology is/are ____________
Decryption is a process employed for scrambling of plain text for
web based transactions
Asymmetric cryptosystem is based on __________ and
____________

Billboards and Junk


Mail
EDI

Global Network
Active or push based
advertising

EC29

Value Added Network is an example of _________


The advertising strategies emerging in the on-line world are
____________
The _________ model use direct mail, spot television or cable
television, in active based advertisement.
The ________ is a form of mail that is not targeted to a specific
audience

EC30

The __________ model refers to information that is placed at a


point where it will be noticed by customers in the course of
Catalog
other activities and does not require active search

EC22
EC23
EC24
EC25
EC26
EC27
EC28

EC31

True
Login_Id and
Password

Broadcast
E-mail

EC32

The most beneficial advantage of ERP system is


What is the term that describes spying on ones business rivals to
gain a competitive advantage?

EC33

A list of competitors
What would you NOT be looking for when spying on a competitor? clients

EC34
EC35

EC36

An online drugstore such as Drugstore.com is an example


of_______
Which of the following is an example of unacceptable online
netiquette?

Which of the following statements is correct concerning the


security of messages in an electronic data interchange (EDI)
system?

Error checking
Competitive
espionage

single-user database
application
Replying promptly
Removable drives
that can be locked up
at night provide
adequate security
when the
confidentiality of data
is the primary risk.

op2

op3

op4

ans

Business-to-Backend Backend-to-Business Business- to-Billboard A


On-line Catalog

Endorsements

Broadcast

Billboard

Catalog

Broadcast

portals

.COM
Search and
discovery

Domains

None of the above

Service
Purchase
consummation
Online catalog

Pre-purchase
preparation
Endorsement model
of marketing

Shopping cart
EDI For
Administration,
Consumer and
Transport

Search and discovery A


None of the above

Billboard
EDI For
Administration,
Commerce and
Transport

Pulling cart

None of the above

TCP/IP

EFT

Gateway

Interpreter

Assembler

EDI

Business-toConsumer
Electronic Cash

Consumer-toBusiness
Euro Cash

Customer-toCompany
Endorsed Cash

B
B

Business Process
Perspective
Micro Transactions

Service Perspective None of the above


TT(Tiny token)
E-token

SSL

Encryption

Subscription

External Format File

Transmission File

None of the above

UN/EBCDIC

UNESCO

UN/EDIFACT

interchange sets

functions

functional groups

Embedded cards

SET

None of the above

Digital Cash

Smart Cards

Electronic cheques

C
A

Online Catalog and


Billboards
E-mail

Online Catalog and


Broadcast and Junk Customer
Endorsements
Mail
EFT
All of the above

False
Primary Key and
Private Key

Public Key and


Password

C
D
B

Public Key and


Private Key

Satellite Area Network None of the above


Private Network
Passive or pull-based Glow sign or hoarding
advertising
strategies
All of the above

Junk mail

Billboard

Endorsements

Bulk-mail

Direct-mail

Junk mail

Endorsement

Billboard

Broadcast

Data Integration

Low cost of operation Quality management

Corporate espionage Industrial espionage Economic espionage

Contact numbers of
the management
Research data
group

A competitors new
project

e-commerce
C
database application None of above
Using all capital
Including the Subject letters
D
Encryption
performed by a
Message
Security at the
authentication in EDI physically secure
transaction phase in
systems performs the hardware device is EDI systems is not
more secure than
same function as
necessary because
segregation of duties encryption
problems at that level
performed by
in other information
will be identified by
systems.
the service provider. C
software.
multi-user database
application
Keeping messages
short

q_id

DS3

q_desc
___________ means the result of applying to specific information certain
specific technical processes.
__________ is an algorithm which creates a digital representation or
"fingerprint" in the form of a "hash result".
__________ is of standard length which is usually much smaller than the
message but nevertheless substantially unique to it.

DS4

Digital Signature involves two processes. They are ___________ and


__________.

DS5

The Costs of Digital Signature consists mainly of the following

DS6

DS8

CA stands for ________________


A Digital Certificate is issued by a Certification Authority and is signed with the
CA's Private Key
A Digital Certificate does contain Owner's Public Key, Owner's name,
Expiration date of the Private Key, Serial number of the digital certificate

DS9

______________ enable web servers to operate in a secure mode.

True
Server
Certificate

______________ are used by individuals when they exchange messages with


other users or online services.
______________ are on-line databases of certificates and other information
available for retrieval and use in verifying digital signatures.

Server
Certificate
Private
Certificate

DS1
DS2

DS7

DS10
DS11

DS12
DS13
DS14

Signing Writings serve the following general


purposes______,_______,_______ and _______
The most widely accepted format for Digital Certificate is defined by the CCITT
X.509
A certificate may prove to be unreliable, such as in situations where the
subscriber misrepresents his identity to the certification authority

op1
Digital Sign
Hash Function
Hash Function
Digital Signature
creation
Institutional
Overhead and
Subscriber
Relying Party
Cost
Certification
Authority
True

Evidence,
Ceremony,
Approval
True
True

DS16

CRL stands for


The prospective signer identified in the digital certificate holds the_________
and is called the ___________

Certificate
Revocation List
Private Key,
Subscriber

DS17

A "recipient" of the certificate desiring to rely upon a Digital Signature created


by the subscriber named in the certificate is called the ____________

Recipient Party

DS15

DS18
DS19
DS20

The Relying Party can use the ___________ listed in the certificate to verify
that the digital signature was created with the corresponding _________
Digital Signatures are used for a variety of Electronic Transactions like
________________________
To associate with a key pair with a prospective signer, a Certification Authority
issues Digital Certificate

Public Key
E-mail
Not False

DS21

DS22
DS23
DS24

DS25
DS26

DS27
DS28
DS29

Digital Signatures, if properly implemented and utilized offer promising


solutions to the problems of Imposters, Message Integrity, __________ and
_____________
In, Digital Signature, _____________ perform the "ceremonial" function of
alerting the signer to the fact that the signer is consummating a transaction with
legal consequences
A Digital Signature must have the following attributes ________________ and
_____________
"Hash Function" is used in both creating and verifying Digital Signature
___________ provides assurance of the origin or delivery of data in order to
protect the sender against false denial by the recipient that the data has been
received, or to protect the recipient against false denial by the sender that the
data was sent.
___________ serves the ceremonial and approval functions of a signature and
establishes the sense of having legally consummated a transaction.

Closed
System,Formal
Legal
requirements

Affirmative Act
Signer
Authentication
Not True

Nonrepudiation
Service
Affirmative Act

________ is a branch of applied mathematics concerns itself with transforming


messages into seemingly unintelligible forms and back again.
Cryptography
The complementary keys of an asymmetric cryptosystem for Digital Signatures
are arbitarily termed as _________, and ____________
Private Key

DS31

_______ is known only to the signer and is used to create the digital signature. Private Key
_______ is ordinarily more widely known and is used by a relying party to verify
the digital signature.
Private Key
____________ is the art of protecting information by transforming it into an
unreadable format.
Decryption

DS32

Which of the following activities would most likely detect computer-related


fraud?

DS33

A digital signature is used primarily to determine that a message is:

DS34

What is a major disadvantage to using a private key to encrypt data?

Unaltered in
transmission.
Both sender
and receiver
must have the
private key
before this
encryption
method will
work.

DS35

Which of the following risks can be minimized by requiring all employees


accessing the information system to use passwords?

Collision.

DS30

Using data
encryption.

op2

op3
Digital
Digital Certificate Signature

op4
None of the
above

Digital Signature Digital Certificate Private Key

Hash Value

Both B and A

Digital Signature
Verification
Both A and B

Either A or B

Subscriber
Relying Party
Cost
Certified
Authority

None of the
above
None of the
above

Hash Result

Institutional
Overhead
Certificate
Authority

False
False
Developer
Certificate
Developer
Certificate
Repositories

Approval,
Evidence

ans

A
A
A
B

Personal Digital
Certificate

None of the
above

Personal Digital None of the


above
certificate
none of the
Public Key
above
Evidence,
Ceremony,
Approval,
Efficiency and
Efficiency and
logistics,
Evidence
Logistics

False

C
B

D
A

False

Certificate
Resource List
Public key,
Recipient

certificate
Revocation
Letter
Private Key,
Recipient

None Of The
Above
None Of The
Above

Relying Party

Either A or B

Neither A nor B

Private Key
Electronic
Commerce

Both A and B
Electronic Fund
Transfers

Both B and A

All The Above

Not True

A
A

Formal Legal
Requirements

Efficiency
Document
Authentication
Not False

Open System

Formal Legal
Requirements,
Open System

Signer
authentication

None of the
above

Both A and B

Neither A nor B

Digital signature Digital certificate Private Key


Efficiency

C
B

Either A or B

Neither A nor B. A

Public Key

Private Key

None of the
above

Public Key

Both A and B

Either A or B

Public Key

Both A and B

Either A or B

Public Key

Both A and B

Either A or B

Cipher

Cryptography
C
Encryption
Conducting fraud- Reviewing the
systems-access
awareness
training.
D
log.
Received by the
intended
Sent to the
recipient.
correct address. A

Performing
validity checks.
Not intercepted
en route.

The private key


cannot be
broken into
fragments and
distributed to the
receiver.
Data entry
errors.

The private key


is used by the
sender for
encryption but
not by the
receiver for
decryption.
Failure of server
duplicating
function.

The private key


is used by the
receiver for
decryption but
not by the sender
for encryption.
A
Firewall
vulnerability.

q_id
AC1
AC2
AC3
AC4
AC5
AC6
AC7
AC8
AC9
AC10

AC11
AC12

AC13
AC14
AC15

AC16
AC17
AC18
AC19
AC20
AC21

AC22
AC23
AC24
AC25

AC26

AC27
AC28
AC29
AC30
AC31

AC32
AC33
AC34
AC35

AC36
AC37

AC38
AC39
AC40
AC41
AC42
AC43
AC44

AC45
AC46

AC47
AC48

AC49
AC50
AC51

AC52
AC53

AC54
AC55
AC56
AC57

AC58
AC59
AC60

AC61
AC62
AC63
AC64
AC65
AC66
AC67
AC68
AC69
AC70

AC71
AC72
AC73
AC74

AC75

AC76

AC77

AC78

BC1

BC2
BC3

BC4

BC5

BC6

BC7

BC8

BC9
BC10

BC11

BC12

BC13
BC14
BC15

BC16
BC17
BC18
BC19
BC20
BC21

CA1
CA2
CA3
CA4

BC22
BC23

BC24

BC25
BC26

BC27
BC28
BC29
BC30
BC31
BC32
BC33

BC34

BC35

BC36

BC37

BC38

BC39

BC40

BC41

BC42

BC43
CA5
CA6
CA7
CA8
CA9
CA10
CA11
CA12

CA13

CA14
CA15
CA16

CA17

CA18

CA19
CA20
CA21

CA22
CA23

CA24
CA25

CA26
CA27
CA28
CA29

CA30
CA31
CA32

CA33
CA34
CA35
CA36
CA37

CA38
CA39
CA40
CA41
CA42
CA43

CA44
CA45
CA46
CA47
CA48
CA49

CA50
CA51
CA52

CA53
CA54
CA55
CA56

CA57
CA58

CA59

CA60
CA61

CA62
CA63
CA64
CA65

CA66
CA67
CA68

CA69
CA70

CA71
CA72
CA73

CA74

CA75
CA76

CA77
CA78
CA79
CA80
CA81
CA82
CA83
CA84

CA85
CA86

CA87
CA88
CA89

CA90
CA91
CA92
CA93

CA94

CA95
CA96
CA97

CA98

CA99
CA100

CA101
CA102

CA103

CA104
CA105

CA106
CA107
CA108

CA109

CA110
CA111

CA112

CA113

CA114
DB1
DB2
DB3
DB4

DB5

DB6

DB7
DB8
DB9
DB10
DB11

DB12
DB13
DB14
DB15
DB16
DB17
DB18

DB19

DB20
DB21
DB22
DB23
DB24
DB25
DB26
DB27

DB28

DB29
DB30
DB31

DB32
DB33
DB34
DB35
DB36
DB37
DB38
DB39
DB40
DB41
DB42

DB43
DB44

DB45
DB46
DB47

DB48

DB49
DB50
DB51
DB52

DB53

DB54

DB55
DB56
DB57

DB58
DB59
DB60
DB61

DB62

DB63
DB64
DB65
DB66
DB67
DB68

DB69
DB70
DB71
DB72
DB73
DB74
DB75

DB76

DB77
DB78
DB79
DB80
DB81
DB82
DB83
DB84
DB85
DB86
DB87
DB88
DB89
DB90
DB91
DB92
DB93
DB94
DB95
DB96
DB97
DB98
DB99
DB100
DB101
DB102
DB103

DB104
DB105
DB106
DB107
DB108
DB109
DB110
DB111
DB112
DB113
DB114
DB115
DB116
DB117
DB118
DB119
DB120
DB121
DB122

DB123
DB124
DB125
DB126
DB127
DB128
DB129

DB130
DB131
DB132
DB133
DB134
DB135
DB136
DB137
DB138
DB139
DB140
DB141
DB142
DB143
DB144
DB145

DB146
DB147

DB148
DB149
DB150
DB151
DB152
DB153
DB154
DB155
DB156
DB157
DB158
DB159
DB160
DB161
DB162
DB163

DB164
DB165
DB166
DB167
DB168
DB169

DB170
DB171
DB172
DB173

DB174

DB175

DB176
DB177

DB178

DB179

DB180

DB181

DB182

DB183

DB184

DB185
DB186
DB187

DB188

DB189

DB190

DB191
DB192

DB193
DB194

DB195

DB196

DB197

DB198

DB199

DB200

DB201

DB202

DB203

DB204

DB205

DB206
DB207

DB208

DB209

DB210

DB211

DB212

DB213
DB214
DB215

DB216

DB217

DB218

DB219
DB220

DB221

DB222
DB223

DB224

DB225
DB226

DB227

DB228

DB229

DB230

DB231

DB232

DB233

DB234

DB235

DB236
DB237
DB238
DB239
DB240
DB241
DB242

DB243

DB244

DB245

DB246

DB247

DB248
DB249

DB250

DB251

DB252
DB253

DB254

DB255

DB256

DS1

DS2
DS3

DS4

DS5

DS6
DS7
DS8

DS9

DS10

DS11

DS12
DS13
DS14

DS15

DS16

EC17
EC18
EC19
EC20

EC21

EC22
EC23
EC24

EC25

EC26

EC27

EC28
EC29
EC30

EC31

EC32

EC33

EC34

EC35

EC36

EX1
EX2

EX3
EX4
EX5
EX6
EX7
EX8
EX9
EX10
EX11

EX12
EX13
EX14
EX15
EX16
EX17
EX18
EX19
EX20
IN9
IN10

IN11
IN12
IN13
IN14

IN15

IN16
IN17
IN18
IN19

IN20

IN21
IN22
IN23
IN24
IN25
IN26
IN27
IN28

IN29
IN30
IN31
IN32
IN33
IN34

IN35
IN36

IN37

IN38
IN39

IN40

IN41
IN42

IN43

IN44

IN45
IN46
IN47

IN48
IN49

IN50
IN51

IN52

IN53
IN54

IN55
IN56
IN57

IN58
IN59
IN60

IN61
IN62

IN63
IN64

IN65
IN66
IN67

IN68

IN69

IN70

IN71

IN72

IN73
IN74

IN75

IN76
IN77

IN78
IN79
IN80
IN81

IN82

IN83
IN84
IN85

IN86

IN87
IN88

IN89

IN90

IN91
IN92

IN93
IN94
IN95

IN96

IN97

IN98

IN99
IN100
IN101

IN102
IN103

IN104

IN105
IN106

IN107
IN108

IN109

IN110

IN111

IN112
IN113
IN114

IN115

IN116
IN117

IN118
IN119
IN120
IN121
IN122
IN123

IN124

IN125
IN126

IN127

IN128

IN129

IN130

IN131
IN132
DS17
DS18

DS19
DS20

DS21

DS22

DS23
DS24

DS25
DS26
DS27
DS28
DS29
DS30
DS31

DS32

DS33

DS34

DS35

EC1
EC2

EC3
EC4

EC5

EC6

EC7
EC8

EC9
EC10
EC11

EC12
EC13

EC14

EC15
EC16
EX21
EX22

EX23
EX24
EX25
EX26
EX27
EX28
EX29
EX30
EX31

EX32
EX33

EX34
EX35
EX36

EX37

EX38
EX39
EX40

EX41
EX42

EX43
EX44
EX45

EX46

EX47
EX48
EX49

EX50
EX51

EX52
EX53

EX54
EX55
EX56

EX57
EX58

EX59
EX60
EX61

EX62

EX63

EX64

EX65

EX66
EX67
EX68

EX69
EX70
EX71

EX72

EX73
EX74

EX75
EX76

EX77

EX78

EX79

EX80
EX81
EX82

EX83

EX84

EX85
EX86
EX87
EX88
EX89
EX90

EX91
EX92

EX93
EX94
EX95

EX96

EX97

EX98

EX99

EX100

EX101

EX102

EX103
EX104

EX105

EX106
EX107

EX108

EX109

EX110

EX111

EX112

EX113

EX114
EX115

EX116
EX117
EX118

EX119

EX120
EX121
IN1

IN2

IN3

IN4
IN5
IN6
IN7
IN8
IN133

IN134
IN135
IN136
IN137
IN138
IN139

IN140
IN141

IN142
IN143

IN144
IN145
IN146
IN147

IN148

IN149

IN150

IN151

IN152
IN153
IN154
IN155
IN156
IN157

IN158
IN159

IN160

IN161
IN162
IN163
IN164

IN165
IN166

IN167
IN168
IN169
IN170
IN171
IN172
IN173
IN174
IN175
IN176

IN177
IN178
IN179

IN180
IN181

IN182

IN183

IN184
IN185

IN186

IN187

IN188

IN189

IN190

IN191

IN192

IN193
IN194

IN195
IN196

IN197

IN198

IN199

IN200

IN201
IN202

IN203

IN204

IN205
IN206
IN207

IN208

IN209

IN210

IN211
IN212
IN213

IN214

IN215

IN216

IN217

IN218

IN219

IN220

IN221
IN222
IN223

IN224
IN225
IN226
IN227

IN228

IN229
IN230
IN231

IN232

IN233

IN234

IN235

IN236
IN237

IN238

IN239

IN240

IN241
IN242

IN243
IN244

IN245
IN246

IN247
IN248

IN249

IN250
IN251

IN252

IN253

IN254

IN255

IN256

IN257

PP1
PP2
PP3
PP4

PP5
PP6
VB11

VB12
VB13
VB14
VB15
VB16
VB17
VB18
VB19
VB20

VB21
VB22

VB23
VB24
VB25
VB26
VB27
VB28
VB29
VB30

VB31

VB32
VB33
VB34
VB35
VB36
VB37
VB38
VB39
VB40
VB41
VB42

VB43
VB44

VB45
VB46

VB47

VB48

VB49

VB50

VB51

VB52
VB53
VB54

VB55
VB56

VB57
VB58

VB59

VB60

VB61
VB62
VB63

VB64

VB65

VB66

VB67

VB68

VB69

VB70
VB71

PP7

PP8

PP9
PP10
PP11

PP12
PP13
PP14

PP15

PP16

PP17

PP18

PP19
PP20
PP21
PP22
PP23
PP24
PP25
PP26

PP27

PP28

PP29

PP30

PP31
PP32
PP33

PP34

PP35
PP36
PP37
PP38
PP39

PP40
PP41

PP42
PP43
PP44
PP45

PP46

PP47

PP48

PP49

PP50

PP51

PP52
PP53

PP54

PP55
PP56
PP57
PP58

PP59

PP60

PP61

PP62

PP63

PP64

PP65

PP66

PP67

PP68

PP69

PP70

PP71

PP72

PP73
PP74

PP75

PP76

PP77

PP78

PP79

PP80
PP81

PP82
PP83
VB1
VB2
VB3

VB4
VB5

VB6
VB7
VB8
VB9
VB10

VB72
WO1

WO2
WO3

WO4

WO5

WO6
WO7
WO8
WO9

WO10
WO11
WO12
WO13
WO14
WO15
WO16

WO17
WO18
WO19
WO20
WO21
WO22
DA13

DA14
DA15
DA16
DA17
DA18

BC44

BC45

BC46

BC47

BC48

BC49

BC50

BC51

BC52

BC53

BC54
BC55
BC56
BC57

BC58
BC59

BC60
BC61

BC62

BC63

BC64
BC65
BC66

BC67

BC68
BC69

BC70
BC71

BC72

BC73

BC74

BC75

BC76

BC77

BC78
BC79
BC80

BC81

BC82

WO23
WO24
WO25
WO26
WO27

WO28

WO29
WO30
WO31

WO32
WO33
WO34
WO35

WO36

WO37
WO38

WO39
WO40
WO41
WO42
WO43
WO44

WO45
WO46
WO47
WO48

WO49

WO50
WO51

WO52
WO53
WO54
WO55
WO56
WO57

WO58

WO59
WO60

WO61
WO62
WO63
WO64
WO65

WO66

WO67

WO68

WO69

WO70
WO71
WO72

WO73
WO74
WO75
WO76

WO77

WO78
WO79

WO80

WO81

WO82

WO83
WO84

WO85
WO86

WO87

WO88

WO89

WO90
WO91

WO92

WO93

WO94

WO95

WO96

WO97

WO98

WO99

WO100
WO101
WO102

WO103

WO104

WO105
WO106
WO107

WO108

WO109
WO110

WO111

WO112

WO113

WO114
WO115

WO116

WO117

WO118

WO119
DA1
DA2
DA3

DA4
DA5
DA6
DA7
DA8
DA9
DA10
DA11
DA12

BC83

BC84

BC85

BC86

BC87
BC88

BC89

BC90

BC91

BC92
BC93
BC94

BC95
BC96

BC97
BC98

BC99
BC100
BC101

BC102

BC103
BC104
BC105

BC106

BC107

BC108
BC109

BC110
BC111

BC112

BC113

BC114

BC115
BC116

BC117
BC118

BC119

BC120

BC121

BC122

BC123

BC124

BC125

BC126

BC127
BC128

BC129

BC130

BC131

BC132
BC133
BC134
BC135

BC136
BC137

BC138

BC139
BC140

BC141
BC142

BC143
BC144
BC145

BC146

BC147
BC148

BC149
BC150
BC151
BC152
BC153

BC154
BC155

BC156

BC157

BC158

BC159

BC160

BC161

BC162

BC163
BC164

BC165

BC166

BC167

BC168

BC169

BC170
BC171

BC172

BC173

BC174

BC175

BC176

BC177

BC178
BC179

BC180
BC181

BC182
BC183
BC184

BC185
BC186
BC187
BC188

BC189

BC190

BC191
BC192
BC193
BC194

BC195
BC196
BC197
BC198
BC199

BC200

BC201
BC202
BC203
BC204
BC205

BC206
BC207

BC208

BC209
BC210

BC211
BC212
BC213

BC214
BC215

BC216
BC217

BC218
BC219
BC220

BC221

BC222

BC223

BC224

BC225
BC226

BC227

BC228

BC229

BC230

BC231
BC232

BC233

BC234

BC235

BC236
BC237

BC238

BC239

BC240
BC241

BC242
BC243
BC244
BC245

BC246

BC247

BC248

BC249

BC250
BC251
BC252
BC253
BC254

BC255
BC256

BC257

BC258
BC259
BC260

BC261

BC262
BC263

BC264
BC265

BC266

BC267
BC268
BC269

BC270
BC271

BC272

BC273
BC274

BC275

BC276

BC277

BC278

BC279

BC280

BC281
BC282

BC283
BC284

BC285

BC286
BC287
BC288
BC289

BC290

BC291

BC292
BC293
BC294
BC295

BC296

BC297

BC298
BC299
BC300
BC301

q_desc
The ------ key can be used to select an existing company from list of companies.
Import and Export of data between Tally and other programs is possible only through ---------Program.
The re-order point is the inventory quantity that trigger a stock replishment activity.
A created company's detail can be modified through keys
A/An ------------- is the official notice that the firm sends to its customers to advise then to the amount
of money that is owed.
In tally,all masters have ________main options
In tally,to create a new column in balance sheet press _______
In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger
accounts into one line statements
In tally, we can alter ledger details using either single or multiple modes but not alble to delete a
ledger from multiple modes.
In tally,a group company is marked with an ______________

The systems that work together to order,receive, and pay for replenishment of stock are --------------Tally allows to delete a ledger from --------- alteration mode.

--------------------- is/are useful for management in the decision making.


In tally,the group company must contain at least _____________ members
To cancel a vourcher entry in Tally, short-cut key is -----------

The accounting masters and inventory masters related to


We press ------------- function key to display the age-wise analysis of Bills Receivable or Bills Payable
report
In Tally, we press ------------, to print report .
In Tally, Types of Accounts and Types of Vouchers passed during the period, can be seen in ------------report.
In the Tally Software, the ------------ directory stores all data entered by the user.
The Ledger Accounts are unique in Financial Accounting Packages

Customers can be permitted to enter their own data into the firms computer using the firms wide area
network is an example of
In Tally, we can customize the Vouchers as per our requirements
The number of steps in Accounts Compilation are
Each action/transaction of a firm is described by a ----------------.

Tally is based on mercantile accounting system

Ctrl + N is used to ----------------------- in Tally classify the accounts under different heads so that summarised information is
possible.
Revenue Account also known as -------------- Account
Method of Voucher Numbering is/are
Accounts Receivable are displayed in

To assemble a product from different items -------------- entry is used


A --------- purchase orders data flow is directed to the purchasing system for use in closing out the
outstanding purchase orders in the receiving system diagram.
Tally provides at least --------- predefined voucher formats
The value of the inventory is included in a ledger accounts as an asset on the balance sheet

" The buyers can follow up with the suppliers to determine the reasons " is an example of ----------------From voucher entry mode , if we press __________ then we get payment voucher in tally

Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged accounts member companies
of the group.
A ----------- is a primary document for recording all financial transactions.
The field can have a value between ________________ in FA Package.
The _______ file maintains data that describes the supplier past transaction with the firm in terms of
material quality in AIS
It is necessary to manipulate data to transform it into ---------------In tally, to change the date of the voucher press ______

Tally can maintain budgets on ---------------The value of the inventory is included as an asset on the balance sheet
In ratio analysis report of Tally FA packagewe we press ________________ function key to the display
of bills receivable , bills payables report
The accounts payable system is responsible for paying the suppliers for the -----------------

What is the default financial year in Tally6.3 _________________


Tally encrypts and stores TALLY DATA at the data directory
The Profit & Loss statement can be displayed in ---------------- format(s).

Default ledger accounts in tally are ______


Default 'godown' name in tally is ____________

'Tally vault' is a _________________


To create a sales voucher in tally , you have to press _______
A Group Company is ------------------------- given to the merged accounts of member companies of the
group.
In tally,"credit note" voucher type records entry for ________________

In tally you get currency symbol option from _______ menu


------------------ gives the balance for each day for the voucher type has been selected.
For 'stock journal' entry we press ______________ in tally

Tally provides the capability to the administrator/auditor to track changes in the areas is/are
In tally, types of users are _______________
By pressing -------- key, a list of inventory reports can be displayed straightaway from the balace sheet
report
Projected approximation of income or expenses is called ______________ .
"Administrator" type user is also called 'Auditor' of a company in Tally
You will get company information , if you press __________ from gateway of tally
A constituent(member) company can be a member of more than one group.
Default stock category in tally is ______
To create a log of the import activity in a file _____________ is located in the same directory as an
executable program in tally
In Tally,inventory valuation method option is available from _______

Tally audit feature is available in a company __________________


In tally, a group company can also be a constituent(member) of another group company
Default number of groups in tally are ________
During voucher entry ------------- are used.

User designated as --------------- can view audit list.

Tally supports Importing of data from ---------------In an accounting information system, which of the following types of computer files most likely would
be a master file?

Which of the following is an advantage of a computer-based system for transaction processing over a
manual system? A computer-based system:

The memory address register is used to store

Inefficient usage of excess computer equipment can be controlled by


Which of the following is not the component of a CPU

A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The
following is an information not found in the trailer label

Hard copy is a term used to describe...?

What do the abbreviations VAB stand for

What control would prevent the accidental erasure of customer information from a magnetic tape

What are the individual dots which make up a picture on the monitor screen called?

Header label normally include all the following except the


A daisy wheel is a type of...?

Which approach or technique is a control usually associated with microcomputers

An impact printer creates characters by using...?

The best security control in a microcomputer environment is to


What would you NOT use with a flatbed plotter?
What do you need for an ink jet printer?

The greatest control exposure in a microcomputer environment is the lack of


What do you need for an ink jet printer?
A laser printer does NOT use?
The amount of data that a disk may contain is known as the disks...?
You can ________ protect a floppy disk.
Information on a hard disk is usually backed-up using a...?

Using generalized audit software packages can add a lot of value _______
_______ is used for CAAT as database
Generalized audit software perform auditors to undertake any past records and not concurrent auditing
Generalized audit software is a file whose capabilities for verifying processing is logic

Magnetic tape is a...?


Hard disks can have a storage capacity in the region of...?

Which storage device has the largest capacity in Mb?

Which storage device cannot be erased?


You can ________ protect a floppy disk

Where should floppy disks be stored?


The contents of these chips are lost when the computer is switched off?
What are responsible for storing permanent data and instructions?
Which parts of the computer perform arithmetic calculations?
What are small high speed memory units used for storing temporary results?
How many bits of information can each memory cell in a computer chip hold?
What type of computer chips are said to be volatile?

Magnetic tape is a...?

Software can be divided into two areas:

Travel agents use this computer system when reserving flights

Which computers are used in the weather forecasting industry?

Vacuum tube based electronic computers are...?

Which generation of computer was developed from microchips?

Which generation of computer uses more than one microprocessor?

Which generation of computer developed using integrated circuits?

Which generation of computer developed using solid state components?

Name three steps involved in developing an information system


CAAT's are computer program and data that auditor uses as part of the audit procedures to process
data if audit significance contained in an entity information system
CAAT do not contains package programs, purpose written program, utility programs or system
management programs
Embedded audit routines are sometimes built into an entity's computer system to provide data for later
user by the auditor
SCARF involves embedding audit software modules within an application system to provide
continuous monitoring
Concurrent use auditors as the member of the system
Regular cross system verification may minimize frauds
Computer security is frequently associated with confidentiality, integrity and authentication
Data reserve engineering process metadata to document system and abstract business rules and
relationship

The first step for developing CAAT is_________

Using the open database connectivity feature in ACL is ______________


Computer Assisted Audited Technique involves the use of computers through "Black Box Approach"
White Box Approach necessary involves expert knowledge on the part of Auditor

The transition from manual system to CIS environment bring dramatic changes including
________________

Auditing with computer necessarily supports the

CAAT involves an Auditors' appreciation of __________


Widespread end use computing result in unlimited errors creeping into system going to accept
handling, thereby increasing audit risks
For computerized auditing usage of sophisticated audit software would be a necessity

Important knowledge needed to begin planning the use of CAAT is _________


The move towards paperless EDI would eliminate much of the traditional audit trail, radically changing
the nature of audit evidence

Computer operation controls are designed to provide ________________


Systems development control, apart from others, include authorization, approval, testing,
implementation and documentation of new systems software and system software modification

A system could be _________


A system exhibits 'entropy'
Super computer are the largest and fastest and is very suitable for commercial application including
audit work
Assembler language uses Mnemonic symbols

Operating systems are devised to optimize the machine capabilities, the function
include_______________
General purpose software provides a framework for highly complex scientific operation
In batch processing, transactions are processed one after another

The use of computer assisted audit techniques is not gaining popularity not only ________________
On-line processing refers to grouping of transaction and processing the same in one go from start to
finish
Real time refers to the technique of updating files with transaction data immediately after the
occurrence of the event to which it relates
In OLRT the CPU should process the capability of program interruption
Time sharing system allow access to a CPU from remote terminals

DSS is defined as a system that provides tools to managers to assist them in solving structured
problems
DSS has the following components _________________
Master files contains current records for identification and summarizing
Transaction files contain relatively permanent records take product profile, customer profile, employee
profile etc
Master file configuration includes ____________
______ is a file management software package that lets users and programmers organize data into
files and then process those files

CAATS provide added value to the clients because _______________


File volatility refers to the number of addition and deletions to the file in a given period of time
File activity is the proportion of transaction file records that are actually used and accessed in a given
processing run:
File interrogation refers to the _____ of information from a file
One -to-one relationship means a single entity to a single entity in a monogamous structure
RDBMS is structured to a series of 2 dimensional tables

SADB stands for ____________


Controls are present over many aspects of the computer system and its surrounding social
environment
In framed checking the data entry is checked against an expected picture or format

Errors are correlated_________


Field check is exclusive to a field
_________ law basically states that there is a specific probability of the first digit of a no. being 1,2,3
etc
Check digit is a group of nos. added to a code for determining the accuracy of other digits in the code

Hierarchical code means _________


The validation checks applied to a field depend on the field's logical inter relationships with other fields
in the record

The contents of a field could determine _______ sign for a ______ field

Batch is the process of ______ together _____ that bear some type of relationship to one another
Hash totals means meaningless totals

With OLRT where interactive data entry is available, the master file associated with a transaction may
be searched for confirming data
Controls are required for authorization to ensure data integrity and detect possible breaches in security
Data from client application are not stored in the organization's database through auditables events
and function
All input records in a batch are normally of different types

IDEA stands for _________________________________


A transaction file is sorted prior to the update of master file
A sequence check on the transaction or master files by an update program is not required
Whenever monetary transactions are processed against master files, the update program should
maintain a correlation account to record such transaction that does not have a matching master file
record
Internal tables are stored tables from which certain values are extracted for further processing and
storing
For small to medium sized systems, individual modules are coded and individually tested and then
assembled to be tested as a whole-the testing strategy is referred to as ___________________
In systems testing, test involves_________________
Recording transactions in a controlled manner may amount to loss of stored data

Audit software is used by the auditor to _________


Core image comparison is a software used by the auditor to compare _______ version of a program
with a secure ________ copy
Database analyzer is a software which provides detailed information concerning the operation of the
database

SAS stands for ______________


Embedded code is a software used by the auditor to examine backup data
Embedded code performs wide variety of audit task
Core image comparison is particularly useful where only executable versions are distributed
Log analysis is a software used by auditor to detect virus
On line testing techniques the auditor ______ data either _______ or fictitious in order to see that a
specific program or sever edit test is doing its work
Mapping software is used by the auditor to list unused program instructions
Mapping software has very objectives

Modeling is a variety of software which ________________


On line testing can be targeted for specific functions carried out by programs

Program code analysis involves _____________


__________ is a software of CAAT
Snapshot is software which takes a picture of a file or data or a transaction passing though the system

Base case system evaluation includes____________


While base testing forces on finding if there are any defective execution policies in a program
Black box testing seeks to determine whether application output is what it is supposed to be
In integrated test facility approach the auditor should ensure that the impact of test transaction is
subsequently eliminated from the computer files

Black box testing is _______ based and white box testing is _______ based

Source code review means__________


In formula in flow hypothesis the auditor should expand the extent of substantive tests to determine
how the defects may impact the attainment of the program objectives
All material application oriented events that occur within the boundary subsystem should be recorded
in the accounting audit trail

In examination of audit trail the following data associated with an event may be ___________-

JCL means_________________
Audit should be periodically analyzed to detect any control weakness of the system
In an accounting audit trail, intrusion detection system might monitor the amount of processor time
consumed by the user to detect unusual deviation from the amount processor time requested by the
user in the past
A sample size calculator program assists auditors in determining RAND() function

Generalized audit software consists ___________

Specializes audit program may be___________


Generalised audit software could be used by the following in consistencies or significant fluctuations

Generalized audit software function include____________


In the file reorganization merging capabilities are needed in data from separate file is to be combined
on a separate work file
Auditors cannot use generalised audit software to extract the data needed for audit purpose

Auditors can combine functional capabilities of generalized audit software to accomplish the task of
__________________

Which of the following is not the feature of GAPs


Which is the example of CAATs

In audit procedures, test data is

Which of the following is not the use of CAATs

Which of the following are called explicitly by another procedure?


_________ data type is generally used for fields assigned as primary keys in a table
MS access objects can be published in the web
In code-builder, got_focuse, click,dbl_click,enter are examples of _______
_______can be used to automate certain actions in response to events

In the macro sheet the macro is selected in the _____field

To build complex expressions_____is used

The three list boxes present at the bottom of the expression builder are called_____
________option is selected from the view menu to create macros with conditions
_______report can be created with minimum user input
_______layout of a form displays one record at a time
The table or query name on which we are going to build our report is selected from the ____ dialogue
box

______and_____are the two types of auto reports available


There are no wizards for creating a database in access
______option from the insert menu option is chosen to add an embedded chart
In ms-access, while using SQL, references constraint is used for creating _______
_______is used to create a mailing label
______header is present at the beginning of the report
______is present at the bottom of each page in a report

In SQL, having clause is used for _________

______field is added to the macro sheet when we select grouping option from the view menu
______can be used to create toolbars
_______query is used to add records from one or more tables into an existing table
_______window is used to write VB code in access application
Values for other tables, queries are maintained in look up fields data type
Visual Basic language is a _____ tool
______ function is used to display a message box
Other ms-office applications can be accessed from ms-access using a concept called ________

OLE stands for_____

The application that supplies data in OLE is called an _________


If any change made on the object from the client side is reflected on the server then the object is said
to be _____
_______is the file format that works on internet

______ is used to convert any ms-access object into html format


_______ option in publish to web wizard produces a page that is static in nature
_______query is used to create or change database objects in a current database
Currency fields express the amount in _________
_______is selected from the toolbar to add an OLE object
To display an OLE object in the form of an icon ____ option is selected from insert object dialogue box
_______option from the file menu is selected to run 'publish to the web wizard'
_____page in an web application is used to navigate to the rest of the pages in the application
______ is fired when an event is triggered is the concept based on a Visual Basic language
Ms access is a ___________
A collection of data stored in different objects is known as a _________

A blank database can be created using __________


Text type data can be of _____ characters in ACCESS

______is a datatype that assigns values automatically


Tables cannot be imported from other databases
If two tables having same values for the fields are joined it is called an ______

Duplication of records in a field won't be allowed if the fields are declared a________

Changes from a master table can be reflected on to the child table by selecting _____option
To see more than one record at a time in a form we use _______
In SQL, delete command is used to remove _________
In MS-Access, filter excluding selection will display only those record(s) which meet the criteria.

Properties of the fields are managed by _____ in Dynaset

______queries allows us to view data in row by column manner

The type of queries that can update or delete record(s) in a table(s) are called __________
Joining tables without any matching values in the fields is called ____________
Primary key uniquely identifies each record

Which of the following dialog box is/are used in the creation of form ________
_______ query wizards are used to generate summary calculations for a table
Properties of a form can be changed by selecting ______from view menu options
Forms that are included in other forms are called ______________
In MS-Access, while using form design view, for creating a command button for adding a new record,
we should select the _______ category from the command button wizard

_______ form displays fields in a single horizontal row


The process of arranging the data in a meaningful order is known as ___________
______ are used to select only some particular records from the table or any other database objects
In MS-Access, user may specify criteria for filter in form view using _________
___wildcard character represents any single character
Records cannot be sorted by a primary key

A control without a data source is known as ___________


Set of related option buttons, check boxes and toggle buttons is known as _____________
The collection of related data and objects is called a ____________
Which of the following is control types ____________
In MS-Access, the function that gives the current date is _____________
_____is a control that lists set of data
______is a form that summarize large amount of data

______allows to create a filter by typing the value in a data sheet

Wizards for toolbox controls are called a __________


The wild card representation for any 5 letter word that starts with ram is ________________
Look up fields slow up data entry
____is an access object that displays un-editable data
_____option from the new object toolbar gives the easiest way of generating a report
______ represents data in a pictorial format
Changes of one table can be carried over to another related table
Hyperlinks are used to jump to any kind of information or data from a file
The memo field can have text upto_____ characters in length
In MS-Access, columnar layout can be used to view multiple records in a form
In MS-Access, alter command may be used in adding a primary key to a table
Update query is used to add records from one or more tables to the end of an existing table
In ms-access, datasheet view is available in ___________
______are used to jump to any kind of information from a datasheet or a form
Home page will always be present as a first page of an application
Make table queries create a new table from the records of another table
In ms-access, to protect a database file from illegal access, we may set database password. The
option of setting database password is available in _______ menu
Foreign key is a field that uniquely identifies each record and accept no null values
Data definition queries are used to create or change database objects
The attributes of a composite key are known as ________
OLE object is a data type in access
Data displayed in forms cannot be edited
A sub form is used to display one to many relationship between tables
We can switch from datasheet view to form view by selecting view -> form view option
In MS-Access long integer is a datatype
In MS-Access, while designing a table for a particular field, the Required parameter is set to yes. This
validates the field as _______
Sorting is applied to select only some particular records

Filter by form can be created from a forms shortcut menu


Advanced filter uses a filter similar to the query design window to create a filter
? Wildcard character represents any number of characters
_________ of the following is/are a type of chart
A bound control is tied to a underlying query or table
A calculated control uses expression as a source of data
Text boxes cannot be bound controls
The default query invoked by ms-access is
A control can be bind to a record using row source property
List box is a control that offers a list of choices
If a table is joined to itself it is called a ________________
A picture box combines the activities of both a text box or a list box
Line is a tool box control
Text boxes can be part of a option group
_____ chart exists as a separate object
Filtering data is a way of arranging data in a meaning full order
Wild card characters are used for sorting records
Pivot tables are used to navigate to the other tables in a database
Reports are used to represent un-editable data

In MS -Access, the records in a table are sorted based on _________


Relationship is an association between _________
Summary options dialog box is used to summarize data
______ queries can be used to delete a group of records that meet some specific records
Charts can convert numerical data in a easily understandable format
Embedded charts exist separately
The chart which cannot exists as a separate entity are _______________
From ms - access, if we want to view the records stored in a table in ms - excel worksheet, we need
to
Page header is present at the beginning of each record
Detail section has a header and footer
A macro is performed only when the user initiates an event
The macro is selected from the action field of a macro sheet
A macro can be made to execute before the starting of a database
In MS-Access. While appending records, the source and the target table must have similar structure
and fields
We can add our own functions to the expression elements list box of the expression builder
_______is the wildcard character which represents the presence of any number of characters
Macros can be used to add a menu to a database object
_____ header is a unique feature of reports
Chart can either be a form or a report
Group header will be present at the design view of a report even if the report is not grouped
We can change from the design view to the form view without being prompted for saving the changes
made
Charts can be produced without the wizard
Macros can be used to create user defined error messages

Between and Not Between is ______ type of operators


The default data type of VB is integer

Visual Basic is based on __________


_______is the name of the database object that displays data and can be used to edit data
In access OLE objects cannot be linked
_____ section is present for each record in the report
A ________ sheet lists all the properties that pertain to the form or the controls
Textboxes can also be an example of unbound control
In MS-Access, we may design command buttons for navigating records
_______are forms that are included in other forms
_______ are used to represent our data in graphical format
A field with a _______ uniquely identifies each record
Large amount of data can be summarized using ______ tables
_______ are employed to select only some particular records from a database object
______ control need not have a data source
______ control combines the functionality of both a text box and a drop down list
MS access is a DBMS
A form can be bind to a record source using _____ property of the form

______ forms displays field in single row


______ forms are usually used for tables with one to many relationship
_______ control uses an expression as a source of control
_______ control is tied to field
_______is the form that can be created with minimum input from the user
______option from the tool menu is selected for setting relationships between tables

______,______and_____are the buttons belonging to the options group


_________allows us to create a filter from a field short cut menu
________is a database object which displays data but cannot be used to edit data
What term applies to a collection of related records in a database?

All of the following terms are related to computerized databases except which one?

What is a database?

What does a record contain?


An RDBMS is a

Data Warehousing refers to

Unauthorised alteration of on-line records can be prevented by employing

What is a database?

What does a record contain?

What is a report?

What is the best way to analyse and change data

What are some popular office orientated software applications?

Which of the following constraints can be used to enforce the uniqueness of rows in a table?
Which of the following commands is used to change the structure of table?
An RDBMS is a

Data Warehousing refers to


You are creating a client application that calls ActiveX DLLs. Which of the following properties of the
Err object provides the name of a component that sends an error back to the client application?

This database holds personal information. The user can help to keep it confidential by
If the database holds customer names and addresses, personalised letters can be created
automatically using
Application software suited to storing the survey information obtained in the table would be

The characters * and ? are sometimes used in search criteria as


Which of the following field types will generate the primary key automatically?

Referential integrity ensures that the:

Tables are related to one another through a:

A foreign key is:


You are creating a banking database to track customer loans. The bank will, of course, have many
customers, each of whom may take out one or more loans, while each loan may be associated with
only one customer (there are no joint accounts). What is the re

In a one-to-many relationship between Companies and Employees, which field is found in both tables?

Which of the following ensures that records in related tables are consistent with one another? For
example, it ensures that you cannot add a record with an invalid foreign key.

How would you delete a relationship between tables in the Relationships window?

In a Customers tables, what does a plus sign next to the CustomerID field mean?

What is required of the fields that join two tables?

Assume a one-to-many relationship between the Customers table and the Loans table, with referential
integrity in effect. What happens when you attempt to delete a customer ID from the Customer table
that still has entries in the Loans table?

Which of the following is true when viewing a main form and its associated subform in the Form
Design view?

Which of the following relationships does not belong in a database based on a professional sports
league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the many side of a one-tomany relationship?

You have created a one-to-many relationship with referential integrity between a Customers table and
a Loans table. From which table can you delete a record?

The correct order of the arguments for the MsgBox statement is:

The first statement in a procedure named CreateList is:

Which of the following is TRUE related to form fields?

A text field:

The purpose of a database is to:


A database stores:
A database records:

A sales contact manager used by a salesperson is an example of _______________

A Customer Resource Management (CRM) system is an example of_________

The industry standard supported by all major DBMSs that allows tables to be joined together is called
__________.

A program whose job is to create, process and administer databases is called the _____
Microsoft Access may use which of the following DBMS engines?

Which of the following are basic components of an enterprise-class database system?

In an enterprise-class database system ________ .


In an enterprise-class database system, the database application ___ .

In an enterprise-class database system, reports are created by ____________________ .

A database is considered "self-describing" because _______ .


In an enterprise-class database system, the database _________ .

A database may contain _________________________ .

A database designed using spreadsheets from the Sales department is a database being designed
_________________________ .

A database designed to implement requirements for a reporting application needed by the Sales
department is a database being designed _______ .

A database designed to combine two databases used by the Sales department is a database being
designed _________________________ .

Database professionals use ________________ as specific data sources for studies and analyses.

Database professionals use a set of principles called ________________ to guide and assess
database design.

A very popular development technique used by database professionals for database design is known
as _______________________ .

A very popular development technique used by database professionals to adopt a database design to
new or changing requirement is known as _____ .

The predecessor(s) of database processing was (were) __________ .

In a relation __________________________ .
An attribute is also known as a(n)
.
A combination of one or more columns used to identify particular rows in a is___ .
A combination of two or more columns used to identify particular rows in a relation is________ .
A determinant that determines all the other columns in a relation is______ .
When designing a database, one of the candidate keys in a relation is selected as the _________ .
Normalization is a process used to deal with which of the following modification anomalies?

When you are given a set of tables and asked to create a database to store their data, the first step is
to ____ .

Modern microcomputer personal DBMS products______.

Which of the following are true about data mining applications?


We have obtained access to the company's operational data. We examine 50 records for customers
with phone numbers that should use the current area code of 345. Of these 50 records, we find 10
that still use an older area code of 567. This is an example
We have obtained access to the company's operational data. We have been asked to produce a
report with an item by item analysis of sales, but the only sales figure available is the total sale value
for each order. This is example of_____

A data warehouse database differs from an operational database because:


Which of the following objects is used to display a menu?

Which of the following objects are NOT found in an Access application?

You are developing an Access application that you expect to upgrade periodically. Which of the
following statements is TRUE?

Which of the following statements regarding Access applications is NOT true?


Which of the following brings a copy of the table into the current database and does not maintain a tie
to the original table?

What makes a database an application?

What is the Access tool that is used to create the user interface?

The purpose of a data warehouse is to:

___________ means the result of applying to specific information certain specific technical processes.
__________ is an algorithm which creates a digital representation or "fingerprint" in the form of a
"hash result".
__________ is of standard length which is usually much smaller than the message but nevertheless
substantially unique to it.

Digital Signature involves two processes. They are ___________ and __________.

The Costs of Digital Signature consists mainly of the following

CA stands for ________________


A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private Key
A Digital Certificate does contain Owner's Public Key, Owner's name, Expiration date of the Private
Key, Serial number of the digital certificate

______________ enable web servers to operate in a secure mode.


______________ are used by individuals when they exchange messages with other users or online
services.
______________ are on-line databases of certificates and other information available for retrieval and
use in verifying digital signatures.

Signing Writings serve the following general purposes______,_______,_______ and _______


The most widely accepted format for Digital Certificate is defined by the CCITT X.509
A certificate may prove to be unreliable, such as in situations where the subscriber misrepresents his
identity to the certification authority

CRL stands for

The prospective signer identified in the digital certificate holds the_________ and is called the
___________
In EDI interface, the translation service receives _________ as incoming files from the communication
service
The EDI standardisation for International Trade and Commerce is introduced by __________
In EDI, the transmission files are composed of different sets of external format files which are grouped
into multiple sets under the name of ________
The ________________ are pre-paid credit cards that include an embedded cards
________________ are another form of credit payment that lets customers use digital online cheques
to pay Web merchants directly

In Active advertisement, there are two types of models. They are _____ and ________
The network based technology is/are ____________
Decryption is a process employed for scrambling of plain text for web based transactions

Asymmetric cryptosystem is based on __________ and ____________

Value Added Network is an example of _________

The advertising strategies emerging in the on-line world are ____________

The _________ model use direct mail, spot television or cable television, in active based
advertisement.
The ________ is a form of mail that is not targeted to a specific audience
The __________ model refers to information that is placed at a point where it will be noticed by
customers in the course of other activities and does not require active search

The most beneficial advantage of ERP system is

What is the term that describes spying on ones business rivals to gain a competitive advantage?

What would you NOT be looking for when spying on a competitor?

An online drugstore such as Drugstore.com is an example of_______

Which of the following is an example of unacceptable online netiquette?

Which of the following statements is correct concerning the security of messages in an electronic data
interchange (EDI) system?

The wizard that is used to import text files is_________________


The alphabet indicating the column followed by the row number is known an__________

Which of the following files could not be opened in excel _______________


In excel, the dates that are stored as sequential numbers known as ________________The command to display the current date in a cell is _________________
In excel, absolute references are represented by a ________ before the column and row addresses
The ________ can be used to select the function and assemble the arguments correctly
Specific parts of information required by functions to perform certain tasks are called as___________
Which of the following do not belong to the formula category in excel environment__________
The function that in used to join cell values together in a single cell ________
The function that is used to count all the values that meet specific criteria _________

The wizard that is used to create and edit charts _______________


The function that is used to calculate the payment for specific loan terms ____________
The function that is used to add together all values that meet specific criteria is known as
____________
The __________ option present in the file menu options is used to specify major facts of the page to
be printed
The command that is used to apply a format automatically __________
The ____________ makes the information in a worksheet meaningful and easy to understand
A particular part of a work sheet can be printed by setting the _________
The process of finding or selecting information is known as ____________
The option that is used to cancel the filter process for a specific column and display all the records is
________
The URL for encyclopedia Britannica is_________
_______ maps IP addresses with the domain names of the sites

Internet can be defined as _______


The most important service of the ______ is to manage traffic control
_________is a program that displays information about a host connected to the net
_______ is a program or a tool that helps in locating a file anywhere on the net

URL stands for ____________

IN an URL the word before the color refers to _______


A ______ always begins with a slash
Prodigy is run by IBM and ______
The World Wide Web is referred to shortly as the _______

Gopher and WAIS enables the user to ______

______ is the program used to run CompuServe's regular services


Navigating through the menu of gopher is called moving around _______
The directories that come with built-in engines are yahoo,lycos and ______
To use the finger command,SLIP users must run a programme called______
The web maps are called _______
Directories consists of _______ levels
The _____ level gives the broadcast overview of the net
The huge list of keywords from important items is called ______

The two types of search in veronica are _____ and ______


_______ searches by keywords
Mosaic displays links in color whereas _____ does not display links in color
______ supports one button publish
SPY MOSAIC is distributed by_______
______ is a program that helps us to log on to other networks

HTTP is the acronym for __________


______is used to transfer and copy files over the internet

_____ is a program that helps us to log on to other networks

TCP/IP stands for ________________


Archie servers can be accessed in_______ different ways in internet
_______is the computer on the internet that translates between the internet domain names and the
internet numeric address

TIA stands for_____ in internet


Service indicates the name of the ________ used to access data, present on the other end of the link.

HTTP stands for______

________ is used to link pages in the world wide web

FAQ stands for ______


The internet adapter is a programme that makes our connection act like a _____or a ____ account
The step involved in Communicating between the web clients and servers is ______________

WSIRC stands for______


Two of the important browsers are_____ and_____

Lynx is a _______ programme that works with terminals


The huge list of keywords from important items is called an_____

VERONICA is an acronym for _______________

The first freenet is created at the_____ and is called______


________ are defined as ways of communication amongst networks

______and_____ are web searching features


WINWAIS has two source lists namely____ and______
________ is also called as WAIS manager

HTML stands for_____


The system of interlinked documents is known as_______
The small programmes that create animation,multimedia,real-time games and multi user games are
called______

The information displayed on the web page includes______,_____ and_____


The web pages that represent online home of their author are called______

GNN stands for______


_____ is the most popular internet service

The online service offered by navigator gold 2.0 are _______ and_____
_______ is a program or a tool that helps us find a file anywhere on the net
The databases to enable keyword search using Lycos are a2z,_______

______ is a large worldwide bulletin board service network

BABEL consists a glossary of _____

Dictionaries,encyclopaedias,government and other references are found in ______

Yahoo,lycos,excite and webcrawlers are _____

GIF is the acronym for ____________

JPEG is the acronym for ___________


The Web aids users to explore the ________

The three most popular mailer are_____,_____ and______

The World Wide Web consists of _________


In Microsoft Internet Explorer, the color of the text can be specified using _________ attribute of the
font tag.

The interface that provides effective communication between the web browsers and servers is
_________
CGI is the _________ between web browsers and servers
CGI programs are invoked based on the information provided by the _________
A CGI program is usually called after a request made by the _________

URL stands for ________

A hyperlink can be on ___________


HTML was derived from _________
SGML is a _________

PINE stands for _____________

The application that confirms whether a document is compliant to its DTD is _________
Web is a collection of ___________

IETF stands for ________

The two major browsers used to surf the Internet are ________,_______

Special characters allow browsers to display _________________


The keyword for providing links within or across documents is____________

Stringing pages together using hypertext technology helps view pages _______________
The initial web pages present in a web site is the ________ page.
The image format supported by most browsers is________________.

The components of a URL are ___________

The mail we send has a mailing address and most of them correspond to_____,_____ and

Which of the following is not supported by internet explorer _______________

CGI stands for ____________


Host name indicates the domain name of the web ________
The internet is also called as _______________

The internet is similar to _________________


The net drivers______ from one place to another

The net provides interesting services like______,______ and______

The windows internet software available are______,_______,________ and______


________ is the ancestors of the internet

DARPA stands for _______________________________________________


The uuencode files start with a _______

DARPA is broken into ________ and _______

NSFNET is the united states provides service to _____ and_____

HTML stands for ______________________________________

The first international IP network connections were established in 1973 with _____ and_____
A_____ is a set of computers interconnected by transmission paths to exchange information in
internet
A computer that provides a service usable by other computers is called______

A_______ is the representation of physical connectivity of the computers in internet

DTE stands for ____________________


The basic function of the ______ is transmitting the bits over a channel

The point to point channel network is also called as _____ and_____


Accessing files using FTP servers is called_____
The three most commonly used networks are______,______ and______
________ is in between LAN and WAN
_____ can be owed by multiple organisation
Data is transmitted in the form of_____ signals

DTD stands for __________

Modem stands for __________________


______ is the process of the digital signals being converted into a form suitable for analog
transmission

________ and______ are two basic ways of getting connected to the internet

SLIP stands for ________________

PPP stands for _____

Which of the following best describes uploading information?

A characteristic of a communication channel that is the amount of information that can be passed
through it in a given amount of time, expressed in bits per second.
The act of searching through storage to locate information without necessarily knowing of the
existence of the information being sought.
A "recipient" of the certificate desiring to rely upon a Digital Signature created by the subscriber named
in the certificate is called the ____________
The Relying Party can use the ___________ listed in the certificate to verify that the digital signature
was created with the corresponding _________

Digital Signatures are used for a variety of Electronic Transactions like ________________________
To associate with a key pair with a prospective signer, a Certification Authority issues Digital
Certificate

Digital Signatures, if properly implemented and utilized offer promising solutions to the problems of
Imposters, Message Integrity, __________ and _____________
In, Digital Signature, _____________ perform the "ceremonial" function of alerting the signer to the
fact that the signer is consummating a transaction with legal consequences

A Digital Signature must have the following attributes ________________ and _____________
"Hash Function" is used in both creating and verifying Digital Signature
___________ provides assurance of the origin or delivery of data in order to protect the sender
against false denial by the recipient that the data has been received, or to protect the recipient against
false denial by the sender that the data was sent.
___________ serves the ceremonial and approval functions of a signature and establishes the sense
of having legally consummated a transaction.
________ is a branch of applied mathematics concerns itself with transforming messages into
seemingly unintelligible forms and back again.
The complementary keys of an asymmetric cryptosystem for Digital Signatures are arbitarily termed as
_________, and ____________
_______ is known only to the signer and is used to create the digital signature.
_______ is ordinarily more widely known and is used by a relying party to verify the digital signature.
____________ is the art of protecting information by transforming it into an unreadable format.

Which of the following activities would most likely detect computer-related fraud?

A digital signature is used primarily to determine that a message is:

What is a major disadvantage to using a private key to encrypt data?

Which of the following risks can be minimized by requiring all employees accessing the information
system to use passwords?

The acronym for B2B is ___________


The _____________ model is the least intrusive model but requires active search on the part of the
customer
__________ is / are a form of advertisement where people relate their experience with products and
services
The _________ are software agents who communicate with the business merchants on behalf of the
customers

The Pre-purchase preparation phase includes _______________ for a set of products

The _________ phase includes customer service and support to address customer complaints ,
product returns and products defects

The ________ allow companies to bypass the need for costly printed catalogs
A ________________ is a basket on the Net that is used to place the items that are being purchased

EDIFACT is an abbreviation of ________


The __________ allows for protocol conversion and communicates with the bank using the banks
private network or the Internet
In Ecommerce, data extraction, transforming the data into transmittable form, transmitting the data
and downloading the data are the operations employed in _________

The _________ commerce assists in integrating the customers and suppliers of the company directly
into the organisation
E-cash means______________________

E-commerce is a tool that addresses the desire of firms to cut services cost and improving the quality
of goods. It is a definition of e-commerce from _________

The small denomination digital tokens are called _________


The ____________ is the process of encoding information to prevent it from being read by
unauthorized parties
There are _________ types of data tables
The tables that allows the user to change or rearrange the data, summarize the data and evaluate the
data using changing points of view is known as

The wizard that is used to suggest hints for doing a task


In a chart Y-axis is known as_________
In a chart X-axis is known as_______________
_________ is a set of tables that describe each of the data series
________ is used to differentiate one data series from another
The chart that contains only one data series is _________
The chart that holds the column chart is _________
The chart that display two or more data series on a surface is _________
The chart that is used to display discrete data

_________ are not allowed in a macro name


Which of the following tool cannot be used to view the excel web page_______

The wizard that used to build an interactive table from data existing on sheets
The chart that is used for displaying stock market information
In excel, the subtotal command also generates grand total after the last group subtotal_________

In advanced filter , the criteria occupying multiple columns but more than one row, is considered as an
________ criteria.

The stacked bar graphs can be represented in __________


A pie chart can represent only one data series at a time
The ______ generates a summarized report in tabular form in an interactive manner

Which one of the following statements related to stock chart is NOT TRUE ?
The state government needs to finalize a five years plan to implement 100% literacy in the state.
Which one of the following will be the best tool that should be used to work out the plan ?
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won
in totality to obtain majority to form the government. Which one of the following will be the tool that will
help the team ?
Which one of the following will be the tool that provides a way to view and compare the results of all
the different variations together on the worksheet ?
A ___________ is an excel file where the user stores his data

Spreadsheets are useful for _______________

Which one of the following is NOT the component of the pivot table ?
Excel allows upto ______ levels of sorting
Filtering rearranges a list to display the required records

The stacked bar graphs can be represented in _____________


The ______ generates a summarised report in tabular form in an interactive manner

Which one of the following statements related to stacked bar chart is NOT TRUE ?
The state government needs to finalize a five years plan to implement 100% literacy in the state.
Which one of the following will be the best tool that should be used to work out the plan ?
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won
in totality to obtain majority to form the government. Which one of the following will be the tool that will
help the team ?
Which following function is used in subtotal option ?______________
A workbook consists of many ________

Which two of the following statements related to pivot table are TRUE ?
Which one of the following is NOT a What-if analysis tool ?

The _________ wizard separates contents in a cell into different cells


A spreadsheet is a grid of rows and columns and is called as a ________
Pick out the window that is not a form of excel ___________

On an Excel sheet the active cell is indicated by

Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of cells
A6, A7, and A8 are _____.

If a cell shows ####### , it means that _____.

Which is not an advantage of using computerized spreadsheets?


The gym teacher has a new program to calculate physical fitness in terms of weight and exercise. The
use inputs different weights or amounts of exercise to determine the related physical fitness. This
"What if" program is most likely which of the followin
The difference between the highest and the lowest values.
Spreadsheets can be used for...

To select a column the easiest method is to


If you press _____, the cell accepts your typing as its contents.
The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as

All of the following are considered constants EXCEPT:

Which of the following may NOT be included in a formula?


Which of the following is NOT a valid mathematical operator in Excel?

Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first?


Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?

How can you tell which cell in a worksheet is the active cell?

How can you change the active cell?

Which of the following would you use to change the font size of a cell in Excel?

The command that will save the current workbook with a different file type is:
The command that will print an Excel workbook is found on the ____________ menu.
In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the date
and time a file was last modified.

Which of the following commands will automatically adjust cell references in formulas?

Which of the following commands will remove cells, rows, or columns from a worksheet?

Which of the following options is NOT controlled through the Page Setup command?
Which command enables you to change the margins for a printed worksheet?
All commands are carried out on a rectangular groups of cells known as a:
Which of the following is a valid cell range?
In a copy operation, the cell(s) you are copying from is called the:
In a copy operation, the cell(s) you are copying to is called the:

Which of the following commands is needed to duplicate the contents of a cell in another?
A cell reference that does not change during a copy operation is known as

Which of the following is considered an absolute cell reference?


Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, what
will be the contents of cell E4?
Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to cell E4,
what will be the contents of cell E4?

Which of the following commands is needed to transfer the contents of one cell range to another?

The F4 key is used to:

Which of the following quickly copies the formatting of a selected cell to other cells?

Which of the following will insert a hyperlink into an Excel worksheet?

Conditional formatting applies formatting to a cell based on:

If you enter a date into a cell, Excel stores the date as:

You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened that
worksheet again on August 31. What will be displayed in cell E17 on August 31?

The number of days between two cells containing dates can be calculated by:
The function key that is used to quickly edit the contents of a cell is:

What will be stored in a cell if 3/4 is entered in it?

A users response to the InputBox function can be stored in:


The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to
row 10 is _____.
The teacher has a spreadsheet showing all Year 10 students and their marks in one Mathematics test.
To find the student with the highest mark, which of the following functions should be used?

Which chart type best shows proportions of a whole?

Which of the following is TRUE regarding chart types?

To select several cells or ranges that are not touching each other, you would _____ while selecting.
Your Institute teachers have set an assignment on Studies. You are required to use a spreadsheet to
record all that you study on each day for four weeks. You decide to show each weeks data with an
accompanying graph. What is the best way of doing this

What would be the best method to quickly copy the formula from the active cell to each cell below it?

To arrange rows in alphabetical order based on column A, you need to use the command _____.
What can you NOT do with a spreadsheet?

To print just part of a sheet, you would select what you want to print and _____ .
Spreadsheets can be used for...
The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in B2 is
_____.

Which of the functions is not valid for performing addition

The default orientation for the printed page is _____.


Which is not a valid cell address?
The World Wide Web was devised by _________

The useful URL schemes are_____ and______

The other ways of getting connected to the net are_____

BBS stands for______


USENET is a BBS on ____ scale
WINSOCKS is expanded as______
IETF Level 2 HTML DTD supports graphical browsers like _______
The space used by Netscape to store the retrieved page is called______
The principles, means and methods for rendering information unintelligible and for restoring encrypted
information to intelligible form.

A long string of seemingly random bits used with cryptographic algorithms to create or verify digital
signatures and encrypt an decrypt messages and conversations.
Protected/private character string used to authenticate an identity or to authorize access to data.
The successful act of bypassing security mechanisms of the system.
A set of rules and formats, semantic and syntactic, that permits entities to exchange information.
An attempt to get access to a system by posing to be an authorised person.
An action or event that might prejudice security.

According to information Technology Act, 2000, To investigate contraventions the controller of


certifying authority shall exercise the like powers to that of
Malicious software.

None the person who is known as father of Internet


This website is the biggest bookstore on the earth.

When we talk of Data Transmission modes, then ATM stands for


A sequence of bits or characters that identifies the destination and the source of a transmission.
The means of communicating between networks
A group of computers and other devices dispersed over a relatively limited area and connected by
communication links that enable a device to interact with any other on the network.

The term HTTP stands for

A NIC is considered as

A hub is a device that can connect

Which of the following is true concerning the function of a switch?

What do routers connect?


What does a router route?
Software which prevents external access to a system is termed
If four computers are connected to a hub and then to the internet, how many IP addresses are
required for these 5 devices?
Which of the following in an OSI layer
When creating a network from just two PCs, what kind of cable would be used to connect them?

An IP address is a
To construct a simple LAN of 4 computers, you would connect them with ______connect them

What happens to data that is ruined before reaching to receiver

Bluetooth is
Which is not one of the recognized IEEE sub layers?
The most preferred number system to represent a IP address is
A MAC address is of

Protocol is
A ............... is a LAN-based computer with software that acts as a controlling device for controlling
access to at least part, if not all, of a local area network and its available resources.

What is the biggest disadvantage of the Ring topology?


The .............. of the network concerns how network devices are physically (or optically)
interconnected.
The principal topologies used with LANs are:
What are the various types of bus architecture?
What are the various types of ring architecture?
In a ................., each workstation attaches to a common backplane via its own physical cable that
terminates at the hub
In a ............... , each work station is directly connected to a common communications channel
Which one of the following is NOT a network topology?
In a .............. , the cable system forms a loop with workstations attached at various intervals around
the loop
The Media Access Control (MAC) is a sub layer of the:

What are the most common LAN technologies used in networking today?
Modem speeds are measured in
LAN speeds are measured in

WAN speeds are


Accessing the Internet from a typical home PC requires the use of

To use the Internet, you

The worldwide web server uses the following standard interface to act as the middleware:

An NIC
Accessing the Internet from a typical home PC requires the use of

The most widely used network operating system on PC LANs is

JPEG and MPEG

To use the Internet you

A multiplexer is a form of

An ISP

FTP is

Telnet

A firewall is
A proxy server is

A search engine is
To look for information about interest areas on the internet, the user should use a

An ISP

FTP is

Telnet

Which of the following is a true statement about the OSI model layers?

Which of the following is NOT true about the Internet?


The traditional intent and impact of this common type of attack is to prevent or impair the legitimate
use of network resources.

A firewall is

Which of the following is NOT an example of a DoS attack that is popular among hackers?

A ____________ attack is when a hacker sends a continuous flow of packets to a system.


One defense option on a large network is to configure a ____________ to disallow any external traffic.
A proxy server is

Which of the following would be performed on a network server and not normally on individual
workstations?

What can be said about the safety of the Internet?

To secure communication network against wire-tapping the most effective control is

One way that a virus CANNOT spread throughout a network is:


Which of the following is NOT a means of monitoring employee use of company technology?
____________ would be used by parents to monitor their children on their home system.
The formal rules and parameters which are established to permit a microcomputer to communicate
with the mainframe computer as though it was a terminal of the mainframe are called

The two most common tools used to help with extracting information are:

Which of the following would NOT be considered an example of cyber terrorism?

Which of the following would be a form of cyber terrorism?

Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life?

An organisation is upgrading its telecommunication lines. Which is the least important objective while
upgradation

A company posts a price list of its products on its website. The advantage to the customer is that the
company can

Which of the following is an easy-to-use service to get information on someone?


Which of the following pieces of information would NOT be found online?
Which of the following is the most common danger on the Internet?

The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive
information is called _________________.
Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called:
Setting your privacy settings in Internet Explorer to medium is one way to block:

What is the best means of protection from cyber stalking?

Which of the following is not an appropriate control over telecommunications software


Encryption techniques can be implemented in Hardware-Software
Which protocol would be used to download a free anti-virus program from the Internet?

The major advantage of the checksum program is when it

Which of the following is a Web browser?

A Web page is another name for -----------

Domain names must contain a description of the type of organisation that the domain represents. A
very common abbreviation used include:

A standard language for creating and formatting Web documents is:


The Web page format in which all elements of a Web page are saved as one file is called:

Which of the following requires an Internet connection?

Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his computer
how would he do this?

Which of the following is used to update a Web query?


You download from the internet, a screensaver, a ten-second sound file and a ten-second music video
clip. You also add a hyperlink. Which of the media elements has the greatest effect on the file size?
When saving a photograph for use on a website, which format should you choose?

While researching the Direct taxes assignment, you find a useful website. What is the most efficient
way to access the site at a later time?
A system that uses the Internet for business-to-business interaction is called a(n):

A block of text automatically added to the end of an outgoing email is called


_________ refers to the use of Internet technologies for placing telephone calls.

Most client/server applications operate on a three-tiered architecture consisting of which of the


following layers?
Which do you NOT need to connect to the Internet?

What does FTP stand for?

What is the purpose of DNS?


Which of the following is NOT a properly formatted IP address?

Which of the following is a properly formatted email address?

The Internet is controlled by whom?

What does IRC stand for?

If you do not pick up your email for a week...?

What does HTML stand for?

What is a disadvantage of joining a mailing list?

In Powerpoint2000 ,the built-in professional design elements are


Selection handles are the 8 small ___________ that appear around the object, when an object is
selected
The _______ is an invisible matrix of vertical and horizontal lines that covers the entire slide
workspace
_______ are drop-down menus that appear when the right mouse button is clicked on the screen
element

________ and ______ have the ability to add a lot of visual impact into the PowerPoint presentation
_______ is a motion picture or any animation file
In visual basic, when a record pointer reaches to the last record, _______ property of a recordset
object is automatically set to ______

In visual basic, the explorer view of a project is displayed in ___________


In visual basic, when a record pointer reaches to the first record, _______ property of a recordset
object is automatically set to ______
In visual basic, _______ is a method to convert a string into integer.
In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type of shape
should we get?
In visual basic, a timer event is only available in timer control.
In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any object
In visual basic, _______ is a property of a textbox control to set a color of a text.
In visual basic, _______ property of a textbox control is set to _______ to underline a text
In visual basic, _______ property of a textbox control is used to change the size of text.

In visual basic, the interval property of a timer control is given in ________


In visual basic, _______ property of listbox control counts the number of items in the list

In visual basic, the properties of various controls can be set using __________
In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a messagebox
function.
In visual basic, ________ is a function which displays a message and it also allows the user to enter
values in a form object
In visual basic, using a data control, ________ is a recordset type which allows to add a new record
and also to update existing record in a recordsourse object
In visual basic, while closing a form _______ event of a form object is triggered earlier to terminate
event.
In visual basic, to give a backcolor or to bring in a picture to a command button can only be done if we
set the style property to ______
In visual basic, a method RGB(255,0,0) will generate _______ color
In visual basic, a method RGB(255,255,255) will generate _______ color

In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible.

In visual basic, if a user uses a function key F4 _________ becomes visible.


In visual basic, when a textbox control receives the focus ________ event is triggered.
In visual basic, a form is a ________ object.
Microsoft visual basic is a Rapid Application Development tool.
In visual basic, when a form object appears on the screen _________ event is triggered.
In visual basic, to display text on a label object _________ property is used
In visual basic, _______ object is used to access the database and also to manage the data in the
database.
In visual basic, when a checkbox control is checked _______ property is automatically assigned with
1.
In visual basic, _______ keyword is used to declare a variable
What is the extension of the Visual Basic project file that stores the design of a user control.
Which event of a text box would you use for validating the data entered by the user?

Which of the following statements forces inline error handling?


The _______ method resets the contents of bound controls to their original values when the user
clicks on the cancel button.

To deactivate the Form UnLoad event, you make the following change in the function definiton:
How many root nodes can a TreeView control have?

A project group is a Project which:

Procedures declared in a _____ are local whereas procedures declared in a ______ are available to
the whole application.

How can you keep the user from exiting a form by clicking the Close button?
The _______ property enables Visual Basic to draw complete images in memory before displaying
them on the Screen.

You want to display the code and the description of an error. What would be the correct syntax?

What is the purpose of the Image List Control?


Which method would you use to get a free or unused File identifier while opening any file:
Which property procedure is used to retrieve the value of a property?

Which of the following can be shown to the user using the Common Dialog control in VB?
Which of the following are not properties of Command Button:

Which events enable you to determine which key was pressed by the user?
In order to access a file in Non-textual format, you have to open file in:
Visual Basic displays information depending upon the current value of two properties of the form,
called:

Which of the following procedure types will execute when you assign a value to a property of an
object?
In order to overlap the controls (say a command button) during design time, we use the Send To
Back or Bring To Front option from the Edit menu. To change it dynamically (i.e.during program
execution) we need to change:
Which property of the ProgressBar determines how much of the bar is filled?
The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program.

The caption and the name properties of the command button:

You try to initialize a new Object variable with the following line but receive an error. What could be the
possible cause? Set MyVar = New Classname

Which of the following will perform a direct execution of a Command object?

The vb Critical symbol displays:

vbYesNo is an example of a(n):

The primary difference between the MsgBox statement and the InputBox function is the:

Which of the following is TRUE about a protected form (i.e., a form where the Protect Form button on
the Forms toolbar is toggled on and is assumed to remain in that position)?
Which event is triggered when the user moves to another open form?

The user can use ______ to remove the undesirable part of the image

The power presentation has a _____ for a set of compatible colors

The set three colors used for graphs and for secondary slide items is called as
There are ______ types of charts available in PowerPoint
_______ charts are useful while showing variations over a period of time

_______ are the individual pages of a presentation


A PIE Chart is a ____ diagram that depicts the relationship between a whole and its parts
Each individual piece of data in a series is called a/an

PowerPoint launches an OLE-compatible application called

When the user double-clicks on an organization chart object in PowerPoint

The _____ are used for selecting, editing and viewing objects in the chart

Manager box tool in organizational chart window is

The custom drawing tools are _______ by default


Click on the box tool ______ to draw three boxes
There are ____ default fields available in all boxes of the organizational chart
The _____ tool is used in the same way as we use a pen to draw a table
A/An _______ consists of smaller printed version of the slides
The size of the object can be changed using the ______ tool
_______ is the process through which the slides in the current presentation are included in another
presentation or application
________ can be used to create charts as well as worksheets

PowerPoint can import text files that have been saved in ______ format

PowerPoint outlines can have _____ outline levels

When a file is saved with _____ extension, the graphics and text are also saved along with the slide

The hidden slide is

____ effect is used to introduce a slide during a slide show


A _____ is a special effect that determines how the objects appear on the slide
The notes page is formatted based on the

Pick the odd man out of the following


When a new presentation is opened ,powerpoint creates slides that have a width of _____ and a
height of ______ with the landscape orientation
The default orientation for notes ,handouts and outlines is ____ orientation
Build effect is also called as ______
Graphics for web pages are automatically stored in ____ format
A _______ is used to jump to any slide in the presentation

The ______ language has been incorporated into PowerPoint


In PowerPoint _____ is a series of commands that are executed in sequence

The macro will be activated


Developers can easily add ____ to PowerPoint 2000 by using the programming interface
______ determines the order in which order in which the slides will be displayed during the show
_______ is used to organize and develop the contents of a presentation

If we save the presentation file as a metafile, it can be opened using

With reference to autocontent wizard for creating a new presentation, which of the following
statements are not true

Which of the following statement is not TRUE

With reference to changing the order of slides, which of the following statement is not true

Which of the following definitions are not true

Which of the following statements are not true

Which of the following definitions are not true


The options available in the common task toolbar does not include

With reference to chart, which of the following statements are not true
The format of the text entered in a title, subtitle, or bulleted-list object is determined by the format
settings in a special slide called -------PowerPoint provides a _________ that searches the entire presentation i.e., all the text objects in all
the slides, outlines, notes and handouts for spelling errors
PowerPoint's drawing toolbar contains _______ drawing tools
Click _______ on the rectangle drawing tools enables us to draw multiple rectangles

An example of the components of a multimedia presentation could include

Which of the following formatting elements can be applied to a PowerPoint diagram using the
AutoFormat tool?

Which of the following formatting elements can be applied to a PowerPoint diagram using the Format
AutoShape command?

What happens when you double click a blank graph placeholder in a PowerPoint presentation?

The legend in a Microsoft Graph chart is:


Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best
chart type if you want to emphasize the total sales of each region?

Which of the following actions will enable you to insert a graph into a PowerPoint presentation?

If you are editing a slide containing a Microsoft Graph, how do you display the underlying datasheet?

How do you deselect a chart that has been placed onto a PowerPoint slide after you have finished
creating the chart?

What happens when you click the Datasheet button on the Microsoft Graph toolbar?

What happens if you single click a chart that is not currently active?

What happens if you double click a chart that is not currently active?

Using custom animation effects, you can build:

Which of the following animation effects can be added to a slide?

Which of the following animations effects can be added to a slide?


Which keyboard key is used to select more than one picture on a slide?

Custom animation can be used to affect ONLY:

Which of the following best describes the information that appears on the advanced timeline?

Which of the following objects can contain custom animation effects?

What type of program allows an object within an image to be edited without affecting other objects?

Which of the following animation effects can be added to a slide?

Which of the following is TRUE regarding the Datasheet?


Graphical software tools that provide complex analysis of stored data are:

Which of the following statements is TRUE regarding PowerPoint diagrams?


Which keyboard key combination is used to undo the previous command(s)?
Microsoft visual basic project file has _______ file extension.
In visual basic, _______ method is used to add an item in a combobox
In visual basic, _______ method is used to load picture during runtime in an image control

In visual basic, to populate a drive list box with a directory list box __________ statement is used
In visual basic, to display a message in the run time _________ function is used

In visual basic, to populate a directory list box with a file list box ________ statement is used
In visual basic, ________ is a property of a recordset object which counts the number of rows in a
recordsourse object
In visual basic, using a data control, a record can only be added from the last record. Adding a new
record is only possible using _______ method of a recordset object.
In visual basic, using a data control, a record is saved to a recordsource object using _______ method
of a recordset object.
In visual basic, using a data control, to navigate to the previous record ________ method of a
recordset object is used.

To deactivate the Form UnLoad event, you make the following change in the function definiton:Private
Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To prevent the Form from closing, you
will set the:
_______ is a word processing that is a member of the office 2000 family

The feature that enables user to type anywhere in a document without pressing or tab
The______ feature allows the user to copy and paste upto 12 items at the same time in an application

______ and _____ key combination will extend the selection by one character on the left and right

_____and_____ are improved layout in Word 2000

The easiest way to create a document in word is


In Office2000 environment the tool that makes work easier for us is_____
A short description of a tool bar button called the ______ is displayed when the mouse pointer is
allowed to stay for a second on the button
The _____ helps us to keep track of the margin of the page

The keys that are used to navigate between headers and footers are
Pick out the element from the following that dose not form the type of tabs for the Word 2000
_______are blueprints or patterns for documents of a certain type
The______ is used for quickly setting paragraph indention using the mouse
Word art is text with
AutoShapes in word can be created by accessing the _____
By default, a document consists of_____ section

The dialog box that is used to determine the documents margins is


________ is a box surrounding a page on all slides or a line that sets off a paragraph on one or more
slides
The key that is used to perform a task to select all t he text in the documents is
The key that is used to indent a paragraph is
The key that is used to change the font from the current positioned in a document is
The key that is used to change the style of the document that is from that normal to heading1 or
heading1 to other document styles.
'Set mapping' Check control that follows a text-type validation, we use ----------------- application for
data analysis.

Excel can import data from other databases for the data analysis.
A System Auditor can uses CAAT tools to analyze data
In the case of the ---------- control, it is ensured that the data in combination with other fields are
reasonable as per standard set by an organisation.
--------------- function searches for a value in the leftmost column of a table and then returns a value in
the same row from a column that we specify in a table
Most of the tools use in Data Analysis depends on

How do you define analysis of an information system?

What areas need to be considered in the SOFTWARE design process?

What is the function of systems software?

Formatting a disk results in all the data being...?

What is Direct Implementation?

What is parallel running?

What documents are produced during the development of a system?

What are User Guides are used for?

Systems software can be categorised into:

Which storage device cannot be erased?

Application software are programs that are written


Which bus carries information between processors and peripherals?
Convert the decimal number 2989 to Hexadecimal
Which bus controls the sequencing of read/write operations?

What are utilities?


Numbers are stored and transmitted inside a computer in

The original ASCII codes


A Nibble corresponds to

A gigabyte represents

A 32-bit processor has

A parity bit is
he contents of these chips are lost when the computer is switched off?
Clock speed is measured in

Cache memory enhances

CISC machines
Which parts of the computer perform arithmetic calculations?

Every data from the primary memory will be erased if


An RS-232 interface is

For print quality you would expect best results from

ROM

A UPS

smart card

Laptop computers use

Multiprogramming refers to

Multitasking refers to
What are small high speed memory units used for storing temporary results?
A good way to exchange information that changes rapidly is through

Multiprogramming is a prerequisite for

Timesharing is the same as

______ is the default view in Word used for typing Editing and Formatting the Text
The short-cut-key that is used to indent a paragraph spacing in the documents is
The short-cut-key that is used to paste the selected text
The short-cut-key that is used for paragraph spacing(1.5)
The box that separate text from the document and allows it to behave like an independent object is
known as
The object that is used to provide information like the title of the book, name of the chapter, page
number etc.

The object that helps us analyzing data statistically is known as


To highlight certain parts of a page to set it apart from the rest of the page we make use of the
following features
To clear all the tabs in a document the option that is clicked from the tabs dialog

The dialog box that is used to incorporate picture bullets into our documents or web pages is
The object that composes of set of tools which helps to create and work on different shapes like
rectangles, circles, flowcharts etc.
When word is opened a new document called_____ is displayed, where the user starts typing the
content right way
______ is an online dictionary maintained by word to obtain synonyms for words

The thesaurus is invoked by pressing_______

When a new table is created the insertion point flashes in the _____
By pressing the _____ key inserts a blank row after the last row in the table

The ______ option enables us to convert text into a table format


A table consists of ______ that contain text or graphics
The _______ option in word allows the user to automatically correct misspell words as and when they
are typed
______ is a facility that enables recording and replaying of a sequence of keystroke
In Word Macros are written in _____
In Word 2000 the macro dialog box is activated with the help of ____ key combination

________shows how a document would look like when published on the web or on an intranet
______ is a software for sending and receiving e-mail messages
________is the coding system used to create web pages
The network that makes information easily accessible across various networks is _______

Which of the following statements are false with reference to the use of a header row source for a mail
merge

With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE false


The alignment available for tabs does not include

Which of the following statements related to a Section Break are True


The user can set a spelling checker to skip the marked part of the next
New option under the file menu of word creates a new blank document that is based on the normal
templates
The user can split the screen only into two parts
The features that enables the user to type text graphics tables anywhere in the document without
pressing enter or tab
The user can modify the picture from the clip art

With reference to auto correct which of the following statements are false

With the reference to password protected documents which of the following statements are false
The alignment available for tabs does not include

Which of the following statements are False


Drop Cap tool does not work for the contents in the table format
The user can split the screen only into two parts in MS-Word
The special symbols that are inserted using "insert symbol" option of the word can not be printed by
the printer as they are not standard keyboard symbols
The "format columns" option allows to create columnar text up 12 columns only.
The document that makes the user to organize and maintain a long document, such as multipart
report or a book consisting of chapters

The view that enables us to view how objects will be positioned on the page when it is printed

The mode that is initialized or toggled to if the user is in a position to overwrite the text in the word
Veena is entering a paragraph in a word processing program. When the cursor gets to the end of a
line, what is the best way to get the cursor to the next line?

How are data organized in a spreadsheet?


Which key moves the cursor to the beginning of the next line of text?
Veena typed the following sentence: "The girl was very beautiful." In which word processing utility
could she find a synonym for "beautiful"?

Using an electronic bulletin board, Seema can do all of the following except which one?
Aryan has created a ten-page story, but only wants to print the first two pages. What printer command
should he select?
What process should be used to recall a document saved previously?
Which is used to indent text within a document?

Desktop publishing is a more sophisticated form of which of the following types of software?

What is a Word Processor used for?


What is a picture that is saved on a diskette and can be pasted into a document?

What is a Word Processor used for?

What basic tools would you find in the Edit menu of a word processor

What is a header in a document?

What hardware is essential for a word?


The user could take a picture from a magazine and insert it into the document by using a

What basic tools would you find in the Edit


Assume you are creating a two-column newsletter. Which type size is the most reasonable for the text
in the columns?

Given the default left and right margins, and -inch spacing between columns, the width of each
column in a two-column document will be:

Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot see
any columns on the screen. What is the most likely cause?

While word processing, in which of the following situations would Tom use the "Copy" command?

What does a document contain?


Before submitting your work you want to find any words spelt incorrectly. Which of the following would
you use?

What command in a word-processing program can be used to change the word him to her, and also
the word he to she in the given phrase? On a cold and still night, the only sound that could be heard
was the owl that had ade its home in the nest outs
What edit commands would you use to insert a paragraph from one document into another document,
while still keeping the paragraph in the first document?

Which of the following statements would NOT be a reason for showing suggested revisions in a Word
document without changing the original document?

Which statement is NOT true regarding revisions made in a Word document?

How are suggested changes entered for review on an initial Word document?

Which of the following is TRUE about saving a document using the Versions command?

What happens when you open a document that has been saved using the Versions command?
You have used the word discover four times in an English essay you have created using a word
processing program. You would like to find another word of similar meaning to use instead of
discover. Which of the following would you use to do this?

When opening and working with multiple versions of a document, how can you tell which is the most
recent version?
Various fields are added to a regular document to create a special document called a form through the
____________ toolbar.
Which of the following types of fields CANNOT be inserted into a form?

Which of the following is TRUE related to editing comments in a Word document?

What is a header in a document?


In your English essay you notice that the paragraph at the bottom of page 1 continues on to page 2.
You would like to make this paragraph start on page 2.What would be the best way to do this?
Tables in a document help you to easily arrange all of the following EXCEPT:
To identify a document, it is helpful to include the file name on each page as a

Which of the following tools will copy the formatting of selected text to other places?

What is the name of the process of determining the cause of errors in a macro?
Drop caps are added to a Word document using the ___________ menu.

A reverse in a newsletter is:

A pull quote is best emphasized by:

Which of the following definitions is CORRECT?

Pertaining to newsletters, which of the following cannot be changed using the Columns command
dialog box?
As related to type size, how many points are there to the inch?
Assume you are working on a newsletter in which the masthead extends across the top of the entire
first page. The rest of the newsletter has two columns. What is the minimum number of sections in the
newsletter?

Which of the following is NOT correct with respect to page, column, and section breaks?

Which of the following would be the most appropriate font for a newsletter headline?

Which of the following is the default Word column width?


Sequence Check is a --------------- level control check.
Analyse data over two or more periods is called ----------------------- analysis
We use Hash Total to identify ------------ within a series where there is a definite relation between
items

Analyse fields by arranging them into rows and columns is called


--------------------- function searches for a value in the leftmost column of a table and then returns a
value in the same row from a column that we specify in the table.
To import data from Access to Excel ,it is not possible to link between Access and Excel sheet
The GAP detection options can be used to test for completeness of data.
Exception testing can be used to identify ----------------- items
Data validity test represents
Year end ledger, inventory files or transaction files can be tested for cut-off , to ensure that the data
has been provided is for the correct audit period
In Range Check , the data may not be in proper sequence but should be within a predetermined range
In ---------------- Check data entry follow a particular sequence and also a predetermined range.

Virtual memory is

Multiprocessing is

To help keep sensitive computer-based information confidential, the user should

What is the function of a disk drive?

A 4GL is
A nanosecond is

What small, hand-held device is used to move the cursor to a specific location on the screen?

The memory address register is used to store

The memory data register is used to store

The instruction register stores


Which of the following is used to indicate the location on the computer monitor?
A mathematical procedure that can be explicitly coded in a set of computer language instructions that
manipulate data.
Which of the following translates a program written in high-level language into machine language for
execution?
Detecting errors in real memory is a function of

To find where a file has been saved on disk, the user should
A series of instructions telling the computer how to process data or files is defined as a

To ensure that data is not lost if a computer system fails, the user should
Having a single CPU alternatively process tasks entered from multiple terminals is called
The place in the CPU where the data and programs are temporarily stored during processing is called
the

All are examples of computer software except

Computer manufactures are now installing software programs permanently inside the computer. It is
known as
Which of the following file organisation forms most efficiently allows access to a record
The part of the computer system controlling data manipulation is called the

For direct access storage devices the recording area is divided into

The data hierarchy from the largest to the smallest is

Which of the following hardware or software system controls provides a detailed record of all activities
performed by a computer system
Which one of the following parts of a computer is necessary to enable it to play music?
An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15 minutes
of sound and 1 minute of video. Which of the four different media listed takes up most space on the
CD-ROM?
Which one of the following printers is suitable for printing sprocket fed carbon copies?

Multimedia software can be most productively used for

To be effective a virus checker should be


Which one of the following software applications would be the MOST appropriate for performing
numerical and statistical calculations?

Passwords enable users to


How many bytes do 4 Kilobytes represent?

Back up of the data files will help to prevent


Which one of the following is the MOST common internet protocol?

The advantage of a PC network is that

The term A:\ refers to

UPS stands for

The main problem associated with uninstalling software is that

You are conducting research for a Income Tax assignment. The raw facts you collect are called

A flow chart is the

A voucher entry in Tally is done for

Passwords are applied to files in order to

Each of the following is an enabler of IT-business alignment except:


The basic systems model is used to describe virtually all information systems and it consists of the
following elements:

What is a computer-aided design system?

A(n) __________ offers a solution package for an entire industry.

File extensions are used in order to

Information systems controls include all of the following EXCEPT:


Hashing for disk files is called
Components of expert systems include: a) inference engine; b) user interface; c) knowledge base; d)
fuzzy logic
Black box testing and white box testing are part of:
What is the term used to describe the point of interaction between a computer and any other entity,
such as a printer or human operator?
The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility

Which of the following is an acceptable way to shut down the computer?

Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best way to locate the files?
Components of an information system model are: a) applications architecture; b) functional
architecture; c) technology architecture; d) information architecture

Benchmarks form part of:


Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run totals

Which is not part of help desk documentation:


Testing of individual modules is known as:
Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface
architecture; d) presentation architecture

Which is part of installation testing:

The computer operating system performs scheduling, resource allocation, and data retrieval functions
based on a set of instructions provided by the:
Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio

Which of the following procedures should be included in the disaster recovery plan for an Information
Technology department?
Designing relationships among components is part of:
Several Computers connected together is called:
Which network topology uses a Hub?
Which of the following topologies is used for Ethernet?

Application software are programs


Which type of file search method requires a computer first read all locations preceding the desired
one

Which of the following areas of responsibility are normally assigned to a systems programmer in a
computer system environment?

Which of the following is recommended when many searches for data are required

It is unlikely that a magnetic tape containing several thousand blocked records can be used on two
machines of different architecture directly because

Which component of the CPU has the most influence on its cost versus performance
Which of the following terms applies to network used to connect computers with other computers,
peripherals and workstations that are in fairly close proximity

Intelligent terminals differ from dumb terminals in that they


A computer is to be linked to 8 terminals using a single communication link. To permit simultaneous
terminal operations, communication path will require which of the following

A modem is a device that


A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives and printers.
This type of network is called a

A computer based system for sending, forwarding, receiving and storing messages is called an

If a workstation contains a processor, monitor, screen manipulation device, printer, storage and
communication capabilities, it is said to be

Terminal hardware controls include

RS-232 is a

What is a compiler?

What are the stages in the compilation process?


Which of the following is not a data transmission coding scheme

What is the definition of an interpreter?

A device used in data communications to divide a transmission signal into several sub-bands is known
as a

Third generation languages such as COBOL, C, and FORTRAN are referred to as

Serial Communication is used over long distance because it

In what areas is the COBOL programming language used?

The primary function of a front-end processor is to

What is the first stage in program development?


Which of the following is not used for data transmission within a local area network

What is System Analysis?


A device to device hardware communication link is called

What will a good software provider consider?


The topology of a network can be each of the following except
What is the 8-bit binary value of the decimal number 85?

Which is the most common data transmission error checking method


What is the decimal value of the binary number 1111?
Which of the following devices merges communication signals onto a single line
What is the decimal value of the octal number 215?

Which tool is used to help an organization build and use business intelligence?

Cache memory enhances

What is the decimal value of the hexadecimal number FF?


Numbers are stored and transmitted inside a computer in
What is the hexadecimal value of the decimal number 1476?
A byte corresponds to

What does EBCDIC coding of numbers mean?


A Kb corresponds to
What is the binary sum of 01011 and 00101?
Information is stored and transmitted inside a computer in
Where would you find the letters QWERTY?

A parity bit is

How did the computer mouse get its name?


Clock speed is measured in
What are you most likely to use when playing a computer game?
CPU performance may be measured in
A digitising tablet can be used for?

In processing cheques which of the following I/O techniques have banks traditionally used
Which of the following is a pointing device used for computer input?

A UPS

What does a light pen contain?


The capacity of a 3.5 floppy is around

What general term describes the physical equipment of a computer system, such as its video screen,
keyboard, and storage devices?
Where would you find the letters QUERTY?
What are you most likely to use when playing a computer game?

A digitising tablet can be used for?


Which of the following is a pointing device used for computer input?

What input device could tell you the price of a product


Where would you find a magnetic strip?

Hard copy is a term used to describe...?


What are the individual dots which make up a picture on the monitor screen Called
A daisy wheel is a type of...?

What input device can be used for marking a multiple-choice test?

Laptop computers use

QWERTY is used with reference to

What input device could tell you the price of a bar of chocolate?

A GUI is
Where would you find a magnetic strip?

Multiprogramming refers to

Multitasking refers to

Multiprogramming is a prerequisite for

UNIVAC Computer belongs to the

Timesharing is the same as


Name the first Indian Super Computer?

Disk fragmentation

The technology which is used to check answer sheets of multiple-choice questions in civil services or
similar examinations is: -

A compiler is

Which printer among the following is fastest


Zipping a file means

What does acronym VIRUS stands for

An impact printer creates characters by using...?

A client-server system is based on


A nanosecond is
A procedural control used to minimize the possibility of data or program file destruction through
operator error is the use of
_______ software enables users to send and receive data to/from remote computers
A _____ is a running instance of an application
Splitting of CPU's time for different tasks _______ prevents time slicing
______ computers are used in large organizations for large scale jobs which have large storage
capacities
_______ is responsible for all calculations and logical operations that have to be performed on the
data

______ printer use laser light

______ software enhances the user to enter ,store, manipulate and print any text

______ software enables users to send and receive data to/from remote computers
_______ is the temporary storage place for deleted files
_____ is a collection of related fields
_____ language consists of strings of binary numbers
______ symbol is used to represent processes like assigning a value to a variable or adding a number

_______ is an example for micro computer


_________capability supports concurrent users doing different tasks
The ______ do not have processing power of their own and has only a screen, keyboard and the
necessary hardware to communicate with the host. For this reason, the terminals are referred
as_______________

A______is nothing but a PC with a network operating system


_____system is responsible for handling the screen and user I/O processing
The______ handles data processing and disk access in a Client/Server architecture

Both the DBMS and the application resides on the same component in a ____system

When all the processing is done by the mainframe itself, the type of processing is sometimes called as
DBMS models can be grouped under____ categories

______is the most advantageous database system


A new user initiates a new process of execution at the background,while the user can continue his
query process as usual in the foreground. This situation is referred to as ______

The process of data being automatically written to a duplicate database is called______

Modem stands for __________ .


Multiple changes to the same record or a field are prevented by the DBMS through______
_________allows an application to multitask within itself

LAN stands for __________ .


New process of execution is referred to as______

ISDN stands for _______.

_____________ is the Worlds largest computer network .


_______is/are a popular front end tool

When LAN connected together ,it is called __________ .

TCP/IP stands for _________ .

Data is broken into small unit called __________ .

SMTP stands for __________ .

The __________ protocol is a network protocol to be built for the World Wide Web .

ATM stands for __________ .

The computer which can receive data from other computers on the network and print it is _______
The hardware and the software requirements together form the_____

ATM, Asynchronous transfer mode is a __________ technology.


__________ is designed telephone system

Expansion of ISDN is ________

Expansion of WBT is ______________


_________ connects LANs.
Collection of instruction is called a _____
Combination of alphabetic and numeric data is called _____ data

Computers can be classified based on ______,______and _______

_________ are used in large organizations for large scale jobs

_______ is responsible for feeding data into the computer


_______ is the capability of the o/s to run numerous applications simultaneously
_______ involves conversion of raw data into some meaningful information
_______ is responsible for obtaining the processed data from the computer

_______ printers use light to produce the dots needed to form pages of characters

Hardware components in a computer are _____,____,_____,______

_______ software are programs that are complex and can be developed or purchased
_______ is a set of special instructions used to communicate effectively with the computer
_______ converts a high level language into machine language
_______ translates assembly language program into machine language instructions

op1

Ctrl+C

op4
ans
None of
ALT+F1 CTRL+F1 the above A
None of
Tally IMP Tally INI the above A
false
A
None of
ALT+F3 CTRL+F3 the above B
None of
Bill
A or B
the above C
Three
Four
Five
B
None of
Alt+C
Alt+Ctrl+C the above B

TRUE

FALSE

TRUE
*

FALSE
$

&

Cash Flow
Statement
s
Two
Alt+D
Create
Informatio
n

Fund Flow
Statement
s
Three
Alt+X
Alter
Informatio
n

Ratio
Analysis
Four
Ctrl+T
Display
Informatio
n

F4

F5

F6

Alt+P

Ctrl+P

F1
Tally
ODBC
TRUE
F3
Invoice
Two

op2

op3

A
^
A
Puchasing
,
Puchasing
Accounts Receiving
and
Puchasing payable
and
Accounts and
and
Accounts
payable
Receiving Receiving payable
D
Mone of
Single
Multiple
A or B
the above A

Tally Audit Statistics


Bin
True
Enterprise
Data
Interchan
ge
TRUE
2
data
element

Data
False
Enterprise
Data Informatio
n
FALSE
3
data
record

All of the
above
One
Ctrl+D

D
A
B

All of the
above

F7
None of
Shift+P
the above
Journal
Day Book Book
None of
Sub
the above
Electronic
Data
Interchan All of the
ge.
above
4
Field

5
All of the
above

C
A
B
B
A

C
A
C
B

FALSE
Display
stock
valuation
method

TRUE

Ledgers

Groups

Journals

Personal

Nominal

Real

Manual
Balance
Sheet

Journal

Automatic None
Profit &
Journal
Loss
Book
Physical
Stock
Stock
Journal
Transfer

Filled
11
FALSE
managem
ent by
objective
F4

Receipt
16
TRUE
managem
ent by
exception
F5

Main
Location

Primary

True

False

Ledgers
0 to 9

Reports
1 to 100

Supplier
Report
F2
Net
Transactio
ns
True
F6
function
key
Sales
1-4-1995
to 31-31996
True

Open
Change
Calculator Period

Issue
18
electronic
data
analysis
F6
Primary
Cost
Category

None of
the above
None of
the above
None of
the above
All of the
above
All of the
above

Horizontal Vertical

B
B
D
A

Reversing
Journal
B
None of
the above A
21
B
B
All of the
above
Alt+f5

B
B

All of the
above

C
A

None of
Vouchers the above
10 to 60 None
All of the
Suspense Order
above
Informatio None of
Output
n
the above
F4
Ctrl+f2
Ctrl+f4
Closing
Balance
False
Alt + f6
function
key
Purchase
s
1-4-1996
to 31-31997
False

A and B
F7
function
key
A or B
1-4-1997
to 31-31998

A or B

C
A
A
C
A

None of
the above C
A
None of
the above A
None of
the above B
None of
the above B
A
None of
the above C

Balance
sheet &
profit &
loss profit
& loss and
trial
balance

Profit &
loss and
trial
balance
Main
location

Primary
Security
mechanis Ledger
m
a/c
F5
F7

Cash and
profit &
Cash and
loss
bank
C
None of
A or b
the above B

a or b

None of
the above
F9
None of
the above
None of
the above

Regional
setting
Balance
Sheet
F10

None of
the above A
None of
the above B
F11
B

Both A
and B
4

None of
the above C
1
B

F10
Profit &
loss a/c
FALSE

F11

F12

Budget

None

C
A

F3
TRUE
Main
location

Ctrl+F3
FALSE

Alt+F3

Primary

Symbol

Tally.imp
Stock
summary
By
pressing
F11
function
key
TRUE
128
Ledger
Accounts

Tally.ini
Stock
journal

a name
Sales
return

Cost
category
F8

an identity
Purchase
return
Stock
Company items
creation
units
Trial
Balance Daybook
F7
Alt + F7
Changes
in
transactio Changes
ns or
in Ledger
vouchers Masters
2
3

A and B

F9
Balance
sheet
TRUE

A or b
Stock
analysis
In 'comp
During the info ->
creation of security
a
control'
company option
FALSE
228
28
SubGroups
Groups

A
D
C
A

None of
the above C
A
None of
them
B
None
A
None of
the above A

None
16

B
A
C

B or C

Administr
ator
Owner
One
company
to another
company
created
withon
Tally
Package
Inventory
subsidiary
.

Other
programs a
spreadshe
et or a
database Both A
file.
and B
Cash
disbursem Cash
ents.
receipts.

Will
produce a
Does not more
require as accurate
stringent a set of
set of
financial
internal
statement
controls. s.

data to be
transferre
d to
memory
Contingen
cy
Planning

Data Entry TallyVault A

data that
has been
transferre
d from
memory
System
feasibility
report

NIC Card VSAT

the
address of
a memory
location

None of
the above
Payroll
transactio
ns.
Eliminates
the need
to
reconcile
control
accounts
and
subsidiary
ledgers.
an
instruction
that has
been
transferre
d from
memory

Capacity
Planning

Exception
reporting C

Will be
more
efficient at
producing
financial
statement
s.

RAM
Control
totals for
Identificati one or
Record
on
more
Count
Number
fields
Storing
Writing on
informatio
a hard
Printed
n on the
board
output
hard disk
Voice
activated Voice
Visual
broadcasti answer
audio
ng
back
board
File
Validity
Boundary protection
check
protection ring

AGP Card B
End-of-file
and endof-reel
code
B

None of
above

None of
above
Limited
access
files

Coloured
spots

Pixels
Identificati
on
File Name number
Storage
Printer
device

Pixies

None of
above

Reel
Number
Pointing
device

Batch
Total
None of
above

System
Logs

Console
Log

Data
Dictionary B

Physical
Security

Electricall
y charged An ink
ink
pen
Restrict
physical
access
A pen
A
cartridge

An inked
ribbon and
print head
Require
Use only user
unremova password
ble media s

Read
Magnetic
tape

D
A

Paper

Eraser

None of
above
Make
duplicate
copies of
files
None of
above

A drum

A ribbon

A cassette A

Distribute
d policies
or
procedure
s
None of
A ribbon above
An INK
None of
RIBBON above
Storage
None of
Size
capacity above
Read and None of
Write
Write
above
Floppy
None of
PAN drive disk
above

Centralise
d function
Separatio for PC
n of duties acquisition
A
cartridge A drum
A print
A laser
head
beam
Volume

Centralise
d function
for PC
Dispositio
n

to an audit
departme
nt's
products to add
all the
& services customers above
Oracle

ACL

True
True

False
False

JCL

none of
these
none the
above

A
C

A
A
C
C
B
A

A
A
A
B

Serial
access
medium

Random
access
medium

1.44MB

20 GB

A CDROM

A floppy
disk

A CDROM

A floppy
disk

Read
By a
sunny
window
ROM
chips
RAM
chips

Write
By
magnet
objects
RAM
chips
ROM
chips

A parallel
access
None of
medium
above
None of
700MB
above
Magnetic
tape
None of
storage
above
Magnetic
tape
None of
storage
above
Read and
Write
Not

Serial
access
medium

None of
above
None of
above
None of
above
None of
Registers Logic bus above
Control
None of
Registers unit
above
None of
1 bit
8 bits
above
ROM
None of
chips
CACHE
above
A
Random A parallel selective
access
access
access
medium
medium
medium

Network
software
and
security
software

Systems
software
and
applicatio
n software

ALU
CPUs
0 bits
RAM
chips

In a
drawer
CDROM
chips
DRAM
chips

Business
software
and
games
software
Mainfram
Supercom Personal e
puter
computer computer

A
B

A
B

C
B
B
A
B
B
A

None of
the above B
None of
above

Jon Von
Notebook Supercom Neumann None of
computers puters
computers above

First
Second
Hoover
None of
generation generation generation above

Second
First
Fourth
None of
generation generation generation above

Second
Third
Fifth
None of
generation generation generation above

Second
Third
Fifth
None of
generation generation generation above

Second
Third
Fifth
generation generation generation
Analysis,
Specificati Programm System
on,
ing,
Design,
Design,
Design,
and
and
and
Implement
Testing
Testing
ation

None of
above

None of
above

True

False

yes

no

true

false

true
true
true
true

false
false
false
false

A
A
A
A

true

false
review
to
and
determine evaluate
the audit the types
objective of data
can bring can bring
the data the data
directly
indirectly
True
True
change in
the
method of
recording
accountin
g
transactio
n
document
s driven
approach

to obtain a extract
record
data from
layout
file
A
all the
above

none of
the above A

False
False

use of
absence
accountin of audit
g codes
trails

B
A

all the
above

risk driven unique


none of
approach approach the above B

hardware
and
software
configurati
on

processin
g options, checks
file data
and
structure controls

true
true

false
false

the source
of data
available
to the
audit
organizati
on

source of
data for
material
all the
planing
above

all the
above

D
A
A

none of
these

true

false
A
providing
access to
computer
to all
the of by organizati
all
on
use of any none of
concerned personnel programs the above D
true

false

natural/m open/clos conceptua


an-made ed
l/physical all of them D
true
false
A
true
true

false
false
manage
hardware
&
scheduled software
jobs
resources
true
false
true
false

A
A
enable
multiple
user
resource
sharing

with
with audit production
departme departme all the
nts
nts
above

all the
above

none of
these

D
B
B

true

false

true
true
true

false
false
false

A
A
A

true

false
planning model
databases language base
true
false
true
false
reference
files
table files report files
file
filex
file-o-man manager
to have a decentrali
complete zed
picture of picture of all the
a system a system above
true
false
true
back-ups
true
true
seriously
affected
database

false
retrieval
false
false
subject
area
database

true
true

false
false

deletion

B
all the
above

D
B
B

none of
the above D
filepet

none of
the above A
A

addition

B
B
A
A

software
and
safety and
database database B
A
B

on
at the year immediate quarterly
end
ly
basis
true
false

none of
the above B
A
none of
Benjamin the above B

Benfish

Benford

true

false

consecuti
ve nos. or
alphabets
to entities

blocks of
nos. to the
primary
attribute
of the the
entity

true

false

valid,
numeric
grouping,
transactio
n
true

invalid,
none of
all the
alphabetic the above above

regroupin none of
all the
g, events the above above
false

A
A

random
placement
of
componen none of
t
the above D

true

false

true

false

true
true
increment
al design
and
enlarge
activity
true
true

false
false
interactive
data
extraction
and
analysis
false
false

B
B

true

false

true

false

e-brain
bottom up
tests
yes

bouncing
ball
big-bang
top-down hybrid
tests
tests
no

interactive
data
innumera
ble
none of
analysis
the above B
A
A

stub
all the
above

C
D
B

re-perform
procedure
provide
s carried
read data informatio out by the
on client's n to the
clients
all the
file
audit
programs above

executabl deleted,
es, master hard

true
system
analysis
software
true
yes
true
true
manipulat
es, real
true
yes

false
system
advanced
software
false
no
false
false
create,
false
false
no

none of
these

all the
above

A
all the
above

none of
these

none of
the above A
B
A
A
B
all the
above
A
A
A

can
enable the
auditor to
execute
can be
provisions
very
on a
powerful number of
analytical different
tool
bases
yes
no

can
provide
the
auditors
with useful
informatio
n with
trend s
and
all of the
patterns above

D
A

examinati
on of
source
identifies code of a
program program
provides code
with
detailed
which may advice to
informatio be there following
n of
for
the logic
machine fraudulent of a
none of
uses
reason
program the above C
IDEA
ACL
ALC
ACLL
B
true
fictitious
data
applied
against
the client
program
true
true

false
compariso
n of
source
version of
a
programm
ed
false
false

analyzing
the picture
of a file or all the
data
above

true
false
specificati
on,
file,
none of
program hardware the above
identifying
identifying identifying nonerroneous ineffective standard
code
code
code
true
true

A
A
A
A

all the
above

all the
above

false

false
authentica
tion of
start and informatio resource all the
finish time n support requested above

A
A

job
connectivit
job control y
all the
language language above
yes
no

true
true

none of
the above A
A

false
false

A
B

package
computer
p[program
for
performin
g a variety
master list administer
of data
mathemati of
ed
processin cal
transactio questionn
g function concept
ns
aire
A
prepared
by an
outside
programm
er
prepared prepared engaged
by the
by the
by the
all the
auditor
entity
auditor
above
D
true
file
access/or
ganization
s

false

stratificati
statistical/ on and
arithmetic frequency all the
operation analysis
above

true
true

false
false

B
B

examining
the quality carrying
of system analytical
process
review
Can
Wide
extract
access to and
various
analyse
data base data

examining
the quality all the
of data
above

Can aid in
simple
selection
High End
ACL
IDEA
CAATs
A sample A utility
A special
of
software purpose
transactio programm written
ns
e
program

Can
define the
audit
objectives D
All of the
above
D

None of
the above A

Tests of
details of
transactio
ns

Macros

Analytical
review
procedure
s
Action
Procedure
s

integer
true

number
false

actions
report

Complian
ce tests of
general
EDP
controls
Event
Procedure
s
primary
number

All of the
above
D
General
Procedure
s
D
auto
number
D
A
procedure none of
s
the above B
chart
macros
D

events
form
expressio
n
macro
elements comments action
expressio
code
expressio n
calculator builder
n builder elements
expressio
n
elements none of
action list macro list list box
the above
none of
conditions action
insert
the above
auto
embedde
tabular
columnar report
d
tabular
columnar datasheet justified
create
embedde
report
link report d report
new report
columnar
and
stable and dynamic none of
tabular
unstable and static the above
true
false
create
insert
fields
add chart chart
chart
primary
alternate foreign
none of
key
key
key
the above
label
chart
mail
none of
wizard
wizard
wizard
the above
start
group
page
report
header
header
header
header
report
page
group
none of
footer
footer
footer
the above

for
ordering
records

for
updating
records

C
A
C
B
D

A
B
C
C
A
D
B

for
specifying
conditions
with group none of
by clause the above C

condition
VB
Modules
add

group

report
true

reports
append
macro
sheet
false

RAD

RAP

SysCmd

MsgBox

macro
names
forms
insert

macros
D
delete
B
none of
module
the above C
A
none of
RAID
the above A
none of
message the above B
none of
CME
the above A

OLE
DDE
object
linking
and
embeddin on line
on line
g
execution editing
OLE
object

none of
the above C

none of
the above A
OLE
communic
ator
C

OLE
OLE client server
embedde
linked
d
connected edited
exe
DLL
BMP
html
publish to
form
report
query
web
wizard
wizard
wizard
wizard
dynamic none of
static file static html file
the above
data
append
add
insert
definition
dollars
rupees
pesos
yen
unbound bound
command
object
object
button
list box
display as
create
icon
display
link
icon
create
save as
none of
html
new
html
the above
none of
startup
home
end
the above
none of
bullet
command procedure the above
DBMS
RDBMS front end language
data
data
data
group
collection database storage

A
D

D
B
D
A
B
A
C
B
C
A
C

new blank new


new
database database database
dialog box dialog box dialog box dialog box A
255
64000
235
63500
A

automatic AutoNum
number
ber
number
true
false
explicit
inner join outer join join
primary
key
cascade
delete
related
records

not null
cascade
change
related
records

columnar tabular
table or
query or
tables
queries

automatic
field
B
B
none of
the above A
no
candidate duplicate
key
key
A
cascade
update
change all
related
related
fields
records
C
both a and none of
b
the above B
record or none of
records
the above C

true

false

property
field

field
property

crosstab
queries

row/colum select
n queries queries
change/de
row/colum lete
n queries queries
no match
self join
join
false

action
queries
inner join
true

new form
dialog box
summary
change
properties
included
form

Dynaset
field
properties properties B

form
create
dialog box
sum

form
wizard
dialog
append
form
properties properties

sub form
Record
Record
Operation
Navigation s
columnar tabular
form
form
filtering
ordering
filter
filter by
form
*
true

sorts
filter by
selection
$
false

update
queries

update
queries

outer join D
A

both 1 and
3
D
simple
D
new
properties B

new form child form


Form
Operation None of
s
the above
one to
hierarchic many
al form
form
sorting
querying
pipes
filter by
menu
@

B
C

gateways A
None of
the above A
?
D
B

bound
control
button
group

unbound
control
option
group

database form

data less
control
controls
group

data
control
record
group
none of
collection the above
all of the
controlled above

bound
unbound
CURRDA
TE()
TODAY() DATE()
combo
text box
list box
box
columnar tabular
pivot table form
form
data sheet filter by
filter
input
button
wizard

control
wizard

filter by
form
option
control
wizard
two of the
above

DAY()

B
B
A
C
C

static text B
main form A
none of
the above C

tool
wizard
C
none of
ram*
ram??
the above B
true
false
B
report
form
table
ledger
A
none of
autoreport report
module
the above A
chart
label
bitmap
report
A
true
false
A
true
false
A
60,000
255
25,000
64,000
D
true
false
B
true
false
A
true
false
B
all of the
table
query
form
above
D
table
form
report
hyperlink D
true
false
A
true
false
A
none of
Insert
Records Tools
the above C
true
false
B
true
false
A
alternate composite candidate primary
keys
keys
keys
key
C
true
false
A
true
false
B
true
false
A
true
false
A
true
false
B
none of
null
not null
zero
the above B
true
false
B

true
true
true

false
false
false

pie
true
true
true
update
query
true
true
inner join
true
true
true
freestandi
ng
true
true
true
true
the first
field of the
table
forms
true
delete
true
true
freestandi
ng

bar
false
false
false
select
query
false
false
outer join
false
false
false
embedde
d
false
false
false
false
the last
field of the
table
reports
false
insert
false
false
embedde
d

B
A
B
both 1 and none of
2
the above C
A
A
B
delete
append
query
query
B
B
A
self join
table join C
B
A
B
stand
alone
sub chart D
B
B
B
A

use
hyperlink
true
true
true
true
true

primary
none of
key field the above C
attributes entities
D
A
append
add
A
A
B
stand
alone
sub chart B
use
datasheet
use import in forms use export D
false
B
false
B
false
B
false
A
false
A

true
true
&
true
page
true
true

false
false
#
false
detail
false
false

true
true
true

false
false
false

group

topic

A
A
D
A
C
A
B
A
B
A

relational
true

list
false

structured
action
query
language language
report
form
true
false
group
record
data
true
true

property
false
false
child
sub forms forms
graphs
chart
primary
number
key

range

index

button

identifier
none of
the above
forms
none of
the above
option
button

record
source

none of
the above C

create
queries

form
sorts

form

bound
combo
box
false

unbound

control

tabular
form

data sheet
chart form form
tabular
columnar
sub forms form
form
calculated bound
calculated unbound
sub form
set
relation

C
B

event procedura
l based
none of
language the above C
query
table
B
B
session
detail
D
both a and none of
b
the above B
A
A
none of
inner form the above A
labels
report
B

pivot
filters

list box
true
form
name

logical

unbound

bound
tabular
auto form form
relationshi
connect
ps

B
A
A
C
B
A

none of
the above A
none of
the above A
none of
the above A
static
C
columnar
form
B
none of
the above C

option
button,
option,
command list, check toggle
toggle and button,
and
button and
command check and combo
check
buttons
list boxes boxes
boxes
filter by
filter by
filter by
filter by
form
report
record
input
form
report
macro
table
clipboard file
field
layout

D
D
B
B

field
names
An
A way to
organised
analyse
way of
and
A tool to storing
manipulat produce informatio
e
high
n about a
numerical quality
set of
informatio document similar
n
s
things
search

sort

It contains
all the
Informatio data about
n about
one
certain
specific
programs item
remote
relative
DBMS
DBMS
storing
data
offline at a
separate
site
Key
verificatio
n

A
document
which
contains
text
Relational
DBMS

record
grab

A way of
maintainin
g a log
C

A
collection
of files
B
Reliable
DBMS
C

uses tape
as
opposed
to disk
C
Database
Computer access
matching controls
D
An
A way to
organised
analyse
way of
and
storing
manipulat A tool to informatio
e
produce n about a
numerical high
set of
informatio qualitydoc similar
None of
n
uments
things
the above C
backing
up data
regularly
Computer
sequence
checks

It contains
all the
Informatio data about
n about
one
certain
specific
programs item

is related
to data
mining

A
document
which
contains None of
text
the above B

Reports
allow
users to
extract
informatio
n as hard
copy
(printed
output)

Reports
provide a
very
flexible
way of
creating
and
editing
document
s

A tool
which
allows text
and
graphics
to be
placed in
document None of
s
the above A

Extracting
and
analysing
data

Spreadsh
eets make
data easy Using
to analyse queries
Word
processor
s,
Compilers Network spreadshe
,
software, ets,
interpreter backup
databases
s, editors systems , DTP
DEFAULT
and NOT
NULL
constraint
s
CHANGE
TABLE
remote
DBMS

FOREIGN
KEY
constraint
s
MODIFY
TABLE
relative
DBMS

storing
data
offline at a backing
separate up data
site
regularly

PRIMARY
KEY and
UNIQUE
constraint
s
ALTER
TABLE
Relational
DBMS

None of
the above C

None of
the above C

IDENTITY
columns C
UPDATE
TABLE
C
Reliable
DBMS
C

uses tape
is related as
to data
opposed
mining
to disk
C

Descriptio Compone
n
nt
Source
D
keeping
the
saving the
keeping a original
file with
using a
backup
paper
different
password copy
copy
filenames A
the
the
product
primary
mail
code
key
merge
e-mail
C
A
database Graphics browser
e-mail
A
Number

bookmark
s
operators wildcards engines
Auto
AutoNum
Primary
Auto ID
ber
Auto Key
forms in a
database
are
consistent
with the
underlying
tables or
queries.

C
C

records in
a dynaset
are
consistent
with the
underlying
tables.

related
tables in a
database
are
consistent
with one
another.

foreign
key.
the
primary
key of
both
related
tables.

query and
main form its
report and
and a
associate its related
subform. d dynaset. query.
A
not a
the
primary
primary
a field
key of
key of the from an
either
related
unrelated related
table.
table.
table.
B

One-toone

One-tomany

Many-tomany

reports
are
consistent
with the
underlying
tables or
queries.
B

Many-toone

EmployeeI CompanyI Employee Company


D
D
LastName Address A
The Tools
menu,
Relationsh Referentia The join
ip window l integrity line
Right-click
the
Relationsh
ip line,
Select
then
Undo in
select
the
Double
Delete
Relationsh
click the from the ips pullRelationsh shortcut
down
ip line
menu
menu

The oneto-many
relationshi
p
B

Click the
Delete
Relationsh
ips button
on the
toolbar
B

That there
are
several
customers
associate
d with that
ID

That
records
That
That there can be
some of are
added by
the data is records in clicking on
not
a related the plus
viewable table
sign
C
They
cannot be They must
They must They
AutoNum be the
both be
cannot be ber data same data
numbers text fields types
type
D
The
customer
s ID is
deleted
from the
Customer
s table,
The
and all the
Nothing, customer related
Access
s ID is
loans are
ignores
deleted
deleted
the
from the from the
attempted Customer Loans
command. s table.
table.

An error
message
is
displayed. D

The
subform is
an object
on the
The
form and
subform is The
can be
displayed subform is moved or
The
in
displayed sized like
subform is Datasheet in Form
any other
not visible. view.
view.
object.
D

A one-tomany
relationshi
p between
teams and
players

A one-tomany
relationshi
p between
teams and
coaches

A one-tomany
relationshi
p between
coaches
and teams

A many-tomany
relationshi
p between
players
and teams C

Either
table at
any time
prompt,
title bar
text, icon.
Dim
CreateList
.
A check
box
enables
the form
user to
choose
from one
of several
existing
entries.

The
Customer
s table
only when
there are
Loan
records
associate
d with that
customer

The
Loans
table at
any time
title bar
text,
prompt,
icon.

Neither
table

prompt,
title bar
icon, title
text, icon,
bar text.
prompt.
B
Sub
CreateList CreateList
.
.
Sub.
B

A text field
enables
the form
user to
choose
from one
of several
existing
entries.
must be
must be set for
set for
multiple
one word. words.

help
people
keep track store data
of things. in tables.
relationshi
data.
ps.
facts.

figures.

singleuser
database
applicatio
n

multiuser
database
applicatio
n

A dropdown list
enables
the user
to choose
from one
of several
existing
entries.

A dropdown list
enables
the user
to enter
text.

does not must be


have to be set for two
set.
words.
C
maintain
data on
create
different
tables of things in
rows and different
columns. tables.
A
all of the
metadata. above
D
informatio
n.
a and b
D
ecommerc
e
database
applicatio
n
a or b
A

singleuser
database
applicatio
n

ecommerc
multiuser e
database database
applicatio applicatio None of
n
n
above

Sequential
Query
Language
(SQL)

Structured
Question
Language
(SQL)
Database
Database Managem
Modeling ent
System
System
SQL
Jet
Server

The user
the
database
applicatio
n(s)
interact(s)
with the
DBMS
creates
queries

the user

Structured
Query
Language
(SQL)
Data
Business
Model
System

Relational
Question
Language
(RQL)
C
Relational
Model
Manager B

Oracle
a and b
The
database
The
managem
database ent
applicatio system
All of the
n
(DBMS)
above.

the DBMS
accesses
the
database
data
creates
form

None of
above
creates
reports
the
database
the
managem
database ent
applicatio system
n
(DBMS)

all the
users'
data is in
one place
holds user
data

it reduces
data
duplicatio
n
holds
metadata

tables

metadata

it contains
a
descriptio
n of its
own
structure
holds
indexes
stored
procedure
s

All of
above

b and c

the
database B

All of the
above.
All of the
above.
All of the
above.

C
D

from
existing
data
from
existing
nondatabase
data

as a new
systems
developm
ent project
as a new
systems
developm
ent project

from
existing
data

as a new
systems
developm
ent project

data
marts

normalizat
ion

data
marts

normalizat
ion

data
marts

normalizat
ion

data
marts

normalizat
ion

file
hierarchic
managers al models

entities in
a column
vary as to
kind
table
record

the order
of the
columns
is
important
relation
field

record

field

record
composite
key
Insertion
anomaly

field
primary
key
Update
anomaly

as a
redesign
of an
existing
database a and b
as a
redesign
of an
existing
database a and b
as a
redesign
of an
existing
database a and b
entityrelationshi
data
p data
models
modeling
entityrelationshi
data
p data
models
modeling
entityrelationshi
data
p data
models
modeling
entityrelationshi
p data
data
modeling migration
relational
network
data
models
model
more than
the order one
of the
column
rows is
can use
unimporta the same
nt
name
row
field
key
tuple
composite foreign
key
key
foreign
candidate
key
key
foreign
surrogate
key
key
Deletion All of
anomaly above

C
D
C
C
D
B
D

assess
the
existing
tables'
structure
and
content
are
supplied
by several
wellestablishe
d
manufactu
rers

They use
sophistica
ted
mathemati
cal
technique
s.

create
move the
design the one or
data into
database more new the new
structure tables
database A

were
essentially
killed off
by MS
Access
Their
report
delivery is
more
difficult
than
report
delivery
for
reporting
systems.

are not
have poor true
response DBMS
time
products

Nonintegr None of
ated data the above A
a "wrong
inconsiste nonintegra format"
dirty data nt data
ted data problem B
a "wrong
inconsiste nonintegra format"
dirty data nt data
ted data problem D
data
warehous
data
e
warehous databases
e data are do not
not stored have
in tables. metadata.
Form
Table
Forms
and
Queries
reports
and tables

data
warehous
e data are
often
denormali
zed.
b and c
Report
Query

Macros

C
A

Spreadsh
eets
D

The Link
Tables
command
can be
used to
associate
the tables
in one
database
with the
objects in
another
database.

It will be
easier for
the user
to
upgrade it
if the
objects
are in one
database
and the
tables in
another.
An
applicatio
n may
consist of
multiple
databases
, each
with
multiple
objects,
linked to
yet
another
database
containing
only
tables.

Import

Link

It will be
easier for
the user
to
upgrade it
if the
objects
and tables
are in one
database.

It contains
tables,
It contains reports,
more than queries,
one table and forms
Menu
Wizard

Build
Menu

All objects
in an
applicatio
n,
including
the tables,
must
reside
within the
same
database.

Regardles
s of how
the
objects
and tables
are
stored,
the user
will have
to reenter
the data in
the tables
when the
applicatio
n is
upgraded. B
An
applicatio
n can be
created in
such a
way that it
objects
such as
forms and
reports
can be
changed
without
disturbing
the
existing
data.
C

Merge

Join

It contains
a user
interface,
or
switchboa
rd
Interface
Design
Wizard

It contains
macros
C
Switchboa
rd
Manager D

It is
advisable
to put
each
object and
table into
a
separate
database.

create
backups
for
mission
critical
corporate
data.

put key
business
centralize informatio
the
n into the
managea hands or
bility of
more
data
decision
collection. makers.

Digital
Sign

Digital
Digital
None of
Certificate Signature the above C

Hash
Function
Hash
Function

Digital
Signature
Hash
Value
Digital
Digital
Signature
Signature Verificatio
creation
n

Institution
al
Overhead
and
Subscribe
r Relying
Party Cost
Certificati
on
Authority

store all
corporate
transactio
n data in
one single
location. C

Digital
Certificate
Hash
Result

Private
Key
A
Either B or
C
D

Both A
and B

Either A or
B
C

Subscribe Institution
r Relying al
None of
Party Cost Overhead the above A
Certified
Authority

Certificate None of
Authority the above A

True

False

True

False

Personal
Server
Developer Digital
Certificate Certificate Certificate
Personal
Server
Developer Digital
Certificate Certificate certificate

None of
the above A
None of
the above C

Private
Repositori
none of
Certificate es
Public Key the above B

Evidence,
Ceremony
,
Efficiency Approval,
Evidence,
and
Efficiency
Ceremony Approval, logistics, and
, Approval Evidence Evidence Logistics D
True
False
A
True

False

Certificate
Revocatio
n List
Private
Key,
Subscribe
r
Internal
Format
File

Certificate certificate None Of


Resource Revocatio The
List
n Letter
Above

Public
key,
Recipient
External
Format
File
UN/EBCD
ANSI
IC
interchang
batch files e sets
Smart
Embedde
Card
d cards
Digital
Cash

Private
None Of
Key,
The
Recipient Above
Transmiss None of
ion File
the above
UN/EDIFA
UNESCO CT
functional
functions groups
None of
SET
the above
Smart
Cards

C
D
D
A

Electronic
E-cash
cheques D
Online
Catalog
Online
and
Billboards Catalog
Broadcast Customer
and Junk and
and Junk Endorsem
Mail
Billboards Mail
ents
C
All of the
EDI
E-mail
EFT
above
D
True
False
B
Primary
Public Key
Login_Id Key and Public Key and
and
Private
and
Private
Password Key
Password Key
D
Satellite
Global
Private
Area
None of
Network Network Network the above B
Active or
push
Passive or Glow sign
based
pull-based or
advertisin advertisin hoarding All of the
g
g
strategies above
D

Broadcast Junk mail Billboard


DirectE-mail
Bulk-mail mail
Endorsem
Catalog
ent
Billboard
Low cost
Error
Data
of
checking Integration operation
Competiti
ve
Corporate Industrial
espionage espionage espionage
Contact
numbers
A list of
of the
competitor managem Research
s clients ent group data
esinglecommerc
user
multi-user e
database database database
applicatio applicatio applicatio
n
n
n
Keeping Including
Replying messages the
promptly short
Subject

Removabl
e drives
that can
be locked
up at night
provide
adequate
security
when the
confidenti
ality of
data is the
primary
risk.

Message
authentica
tion in EDI
systems
performs
the same
function
as
segregatio
n of duties
in other
informatio
n
systems.
convert
text to
text import columns
wizard
wizard
cell
row
reference reference

Encryption
performed
by a
physically
secure
hardware
device is
more
secure
than
encryption
performed
by
software.

Endorsem
ents
A
Junk mail D
Broadcast C
Quality
managem
ent
B

Economic
espionage C
A
competitor
s new
project
B

None of
above
Using all
capital
letters

Security at
the
transactio
n phase in
EDI
systems is
not
necessary
because
problems
at that
level will
be
identified
by the
service
provider. C

function
tip wizard wizard
A
column
none of
reference the above A

text files
serial
values

Lotus 1-23
domain
values

quattropro
or xbase
files
range
values
=currentd
ate()

class files
reference
values
none of
=today() =date()
the above
none of
dollar sign ' = ' sign # sign
the above
function
none of
AutoSum AutoFill
wizard
the above
argument parameter none of
variables s
s
the above
text
logical
numeric Boolean
concatena
none of
te
pmt
merge
the above
countif
vlookup
pmt
count
convert
text to
pivot table chart
columns
wizard
wizard
wizard
tip wizard
none of
sumif
pmt
countif
the above

average sum
sumif
countif
page
none of
setup
print area print
the above
autoforma
none of
t
AutoFill
the above
none of
bordering formatting shading
the above
page
print
setup
print area print
preview
none of
filtering
searching sorting
the above

D
A
A
C
B
D
A
A

B
B

A
A
B
B
A

all option blanks


all blanks none
A
www.ency www.eb.c www.ency none of
.in
om
brit.com
the above B
none of
URL
DNS
FTP
the above B
internal
network
applicatio
n layer
finger
service

network of
network
transport
layer
ping
service

FTP

TELNET

intermedia
te network
physical
layer

none of
the above
session
layer
none of
ftp service the above
none of
ARCHIE the above

B
D
A
C

uniform
research
locator

uniform
resource
locator
name of
host
the
computer resource

unlimited
restore
locator

message scheme

none of
scheme
the above
command none of
line
the above
general
sears
electric
browser
editor

Delphi
net

Microsoft
web
read the
Usenet
news

browser
CompuSe
rve
internet
spy
dialer
mosaic
gophersp
gophering ace
Alta vista
finger
server
list
no
middle
hotlist

none of
the above A

C
C
C
B

search for none of


database the above C

wincim or
maccim
cyberspac
e

none of
the above
none of
the above
none of
open text excite
the above
web
none of
ftp server server
the above
none of
directories image list the above
maximum
of five
one
many
middle
lower
top
and lower
directory index
glossary

directory index
menu
item
search,ind search,me search,ite search,ind
ex search nu search m search ex search
all the
infoseek excite
lycos
above
all the
netshark cello
lynx
above
navigator
lynx
mosaic
Lycos
gold 2.0
CompuSe
Microsoft internet
IBM
rve
finger
Usenet
service
ftp
telnet
Higher
text
Hyper text Hyper text Hyper text
transfer
transmissi transfer
transfer
protocol
on port
protocol
port
none of
iccp
ftp
uucp
the above

C
C
B
A
C
B
D
C

C
D
C
C
D
D

C
C

none of
telnet
the above
transfer
transmissi communic
transfer
on control ation
control
protocol/in protocol/in
protocol/in ternet
ternet
none of
ternet
protocol
protocol
the above
none of
one
two
three
the above
domain
name
web
none of
ftp servers servers
servers
the above
the
the
internet
the
internet
administra internet
none of
adapter
tion
access
the above
organizati
browser
protocol
site
on
hotlink
higher
text
hyper text type
transfer
transfer
transfer
none of
protocol
protocol
protocol
the above
universal uniform
uniform
resource resource resource name of
locator
locator
label
the above
frequent frequently frantically
asked
asked
asked
none of
query
question question the above
none of
SLIP,PPP TCP,IP
IP,UDP
the above
connectio
n
response request
close
world
wide
search for
search for windows informatio
informatio sockets
n and
n and
internets research none of
research relay chat council
the above
netscape,i mosaic,go none of
lynx,minx e
pher
the above
world wide
web
world wide
none of
server
web client interface the above
none of
glossary index
hotwords the above
yahoo

ftp

B
C

A
B

B
A
A

B
B

B
B

very easy
and
rodent
oriented
net wide
index to
computeri
zed
archives
university
of
berkeley,b
erkeley
freenet

very
organised
network
integration
and
communic
ation
applicatio
n
university
of
cleveland,
cleveland
freenet
IP
address

protocols
search
engines,di ftp and
rectories finger
allsrc,wins
ocks
wais,allsrc
allsrc

waisman
hyper
higher text transfer
medium
markup
language language

verificatio
n on
network
integration
and
communic none of
ation
the above A
university
of
California none of
net
the above B
none of
dns
the above A
telnet and
ftp
wais,wins
ocks
winsock

hot links

hyper text
markup
language
books
hyper text marks

images

applets

none of
the above A
none of
the above B
none of
the above B

none of
the above C
none of
the above B
none of
animation the above B

graphics,v programm animation,


ideos,audi s,images,t scripts,ex none of
o
ext
ecutables the above
home
welcome none of
first page page
page
the above
global
global
grand
network
networks network
none of
news
navigator news
the above
yahoo
electronic search
none of
service
mail
engines
the above
Netscape
page
email and starter
net
site,netsc
conferenc ape page yahoo and none of
e
wizard
altavista the above
newsgrou
p
telnet
ftp
archive
Lycos
point
all the
none of
catalog
review
above
the above

A
B

B
B

B
D
D

apple link
computer
related
abbreviati
ons and
acronym

bitnet

Delphi

fidonet

biographic
al
informatio bookstore none the
n
s
above

encyclope on-line
more
dia
reference informatio
Britannica works
n
galenet

search
engines

web
directories database channel

Graphical
interpreter
formatting
Joint
Pictures
Expert
Group

Graphical
interchang
e Format
Jumbled
pictures
expert
graph
document
s

Graphical
interface
format
Joint
pictures
expert
graph

mails
net
yahoo,info
eudora,ne
seek,altav netscape,i tscape
ista
e,lynx
and pine
network
informatio web
connectio
n
pages
ns
BACKGR
OUND
COLOR
FCOLOR
Communi
Communi
cation
Common cation
gateway graphical graphical
interface Interface interface
Communi
Network Interface cation
Current
web page Browser Client
Browser/u
ser
Server
Web
Unknown Uniform
resonance resource
language locator

United
relay
limited

Graphical
Interface
format
B
Joint
pictures
experimen
tal group A
browsers

none of
the above C

mails
B
FONTCO
LOR
B
Common
Gateway
Interface D
Connectio
n
B
None of
the above B
Channel

None of
the above
neither
image
text or
text nor
text only only
image
image
SQL
PLSQL
SGML
CGI
alphalang betalangu metalangu none of
uage
age
age
the above

C
C
C

palm is
not
eatable

palm is
not elm
SGML
SGML
Preproces
Processor sor
web sites images
Internation
al
Engineeri
Internet
ng
equipment trainers
training
and
faculty
faculty

pancake
is not
edible
SGML
Parser
applets

Internet
Engineeri
ng Task
Force
MS
MS
Internet
Internet
Netscape Explorer
Explorer Navigator and
and
and
Netscape
Mosaic
Mosaic
Navigator
data from
a
text
database symbols
hyperlink hypertext hotword
in
in userin random sequential defined
order
order
order
first
.bmp and
.gif
Service,
hostname
and
directory
path

start
home
.bmp and .gif and
.jpeg
.jpeg

service,ho service,po
stname,po rt and
rt,directory- directory
path
path
mailing
lists,mail
mail
mail
server
servers,m vendors,m robots
ail clients ail
and
and
identificati gateways
alternate on and
to other
services password services

<center>

<font
size=n>

<hr
size=n>

none of
the above B
SGML
Composer C
document
s
A

None of
the above C

None of
the above C

video
hotlink

C
B

none of
the above B
none of
the above C
.wmf and
.bmp
C

service,ho
stname
and port B

none of
the above C
<l1
type=shap
e>
D

communic
ation
generated
informatio
n
Server
arpanet

common
gateway
interface
Client

classified
general
instruction none of
s
the above B
Browser User
A
none of
intranet
the above B

LAN

the net
peer-topeer
connectivit
y
wan

data

parcel

packets

none of
the above B
none of
the above A

scripting,p news,coo email,file


arsing and king and retrived,int none of
compiling fine arts
ernet tools the above
mosaic,go
nt,window pher,eudo communic
s95,ie,win ra,trumpn ator,ie,lyn all of the
zip
et
x,winsock above
ARPANE none of
dnet
arpanet
T
the above
defensive dedicated defensive
administra and
advanced
tive rank registered research
administra projects
projects
tion
administra administra none of
network
tion
tion net
the above
none of
start
begin
first
the above
milnet,sm
aller
mailnet,in intranet,ex none of
arpanet
et
tranet
the above

B
B

C
B

education,
research
Higher
text
manipulati
on
language
united
states and
UK

music and cooking


none of
dance
and dining the above A
Hotlink
text
markup
language

Hyper text
markup
Language D

server

client
standalone

none of
the above B
none of
the above C
none of
the above C

client

Hyper
transfer
meta
language
united
england,n states &
orway
Russia
network
servers

network
topology

network
redirector none of
s
the above B

data
terminal
equipment
physical
layer

data
target
equipment
network
layer

packet
switching,
store and
forward
network
anonymou
file access s ftp
PAN,NAN, KAN,RAN,
AAN
VAN

smart
network
and dumb
network
file
transfer
LAN,WAN
,MAN

network
card
detailed
transactio
n
explanatio
n
applicatio
n layer
point to
point
network
and
broadcast
channel
network

none of
the above B
none of
the above B

none of
the above
none of
the above
none of
the above
none of t
VAN
MAN
TAN
he above
none of
LAN
MAN
WAN
the above
none of
analog
digital
non-digital the above
Define
Document
Data type type of
type
Document
definition data
definition type data
Modulatio Manipulat
Moralize/d n/demodul e/demanip none of
emoralize ation
ulate
the above
Modulatio Manipulati none of
Mapping n
on
the above
Satellite
link and
digital
signals
Standard
long
internet
protocol
Prime
prolonged
protocol

Dedicated
access
and dial
up access
Stream
line
internet
protocol
Point to
point
protocol

B
B
C
B
C
B

B
B

Cable and none of


wires
the above B

Serial line
protocol
Pillar to
pillar
protocol

sending
storing
storing
informatio data on
data on a n to a host the hard
disk drive computer drive

none of
the above C
none of
the above B
receiving
informatio
n from a
host
computer B

Bandwidth Speed

Size

Channel

Find
Save
Recipient Relying
Party
Party
Private
Public Key Key

Browse
Either A or
B
Both A
and B

Retrieve C
Neither A
nor B
B
Both B
and A
C

E-mail

Electronic Electronic
Commerc Fund
All The
e
Transfers Above

Not False
Closed
System,F
ormal
Legal
requireme
nts

Not True

Signer
Authentica
tion
Not True
Nonrepudi
ation
Service
Affirmativ
e Act
Cryptogra
phy
Private
Key
Private
Key
Private
Key
Decryptio
n

Document
Authentica Both A
tion
and B
Not False

A
Formal
Legal
Requirem
ents,
Open
System
D

Formal
Legal
Requirem Open
ents
System
Signer
Affirmativ
authentica None of
e Act
Efficiency tion
the above A

Using
data
encryption
.
Unaltered
in
transmissi
on.

Digital
Digital
signature certificate
Either A or
Efficiency B
Private
Public Key Key
Both A
Public Key and B
Both A
Public Key and B
Both A
Public Key and B
Cipher

Encryption

Performin
g validity
checks.
Not
intercepte
d en
route.

Conductin
g fraudawarenes
s training.
Received
by the
intended
recipient.

Neither A
nor B
C
B
Private
Key
Neither A
nor B.
None of
the above
Either A or
B
Either A or
B
Either A or
B
Cryptogra
phy
Reviewing
the
systemsaccess
log.
Sent to
the
correct
address.

A
A
A
C
A
B
C

The
private
Both
The
key is
sender
private
used by
and
key
the
receiver
cannot be sender for
must have broken
encryption
the private into
but not by
key before fragments the
this
and
receiver
encryption distributed for
method
to the
decryption
will work. receiver. .
Failure of
server
Data entry duplicatin
Collision. errors.
g function.
Business- Business- BackendtototoBusiness Backend Business
On-line
Endorsem
Billboard Catalog
ents
Customer
Endorsem
ents
Billboard Catalog
Intermedi
aries
portals
.COM
Order
Search
Placemen
and
t
Service
discovery
PrePost
Purchase purchase
purchase consumm preparatio
interaction ation
n
Endorsem
Billboard
ent model
model of Online
of
marketing catalog
marketing
Online
Shopping
Catalog
cart
Billboard
EDI For
Administr EDI For
EDI For
ation,
Administr Administr
Commerc ation,
ation,
e and
Consumer Commerc
Transactio and
e and
n
Transport Transport
EDI
Compiler

TCP/IP

The
private
key is
used by
the
receiver
for
decryption
but not by
the
sender for
encryption
.
A

Firewall
vulnerabili
ty.
D
BusinesstoBillboard A
Broadcast B

Broadcast A
Domains

None of
the above C
Search
and
discovery A

None of
the above B
Pulling
cart
B

None of
the above C

EFT
Gateway
Assemble
Interpreter r
EDI

D
D

BusinesstoBusiness
Emergenc
y Cash
Communi
cation
Perspectiv
e

BusinesstoConsumer
Electronic
Cash
Business
Process
Perspectiv
e
Micro
Transactio
Microcash ns
Decryptio
n
SSL
1
2
filtered
data table table

pivot table
wizard
series or
rank
series or
rank
series or
rank
series or
rank
column
chart
column
chart
column
chart
column
chart

chart
wizard
category
category
category
category
bar chart
bar chart
bar chart
bar chart

Consumer- CustomertotoBusiness Company B


Euro
Endorsed
Cash
Cash
B
Service
Perspectiv None of
e
the above C
TT(Tiny
token)

E-token
A
Subscripti
Encryption on
C
3
4
B
index
table
pivot table D
convert
text to
columns
wizard
tip wizard D
data
legend
marker
A
data
legend
marker
B
data
legend
marker
C
data
legend
marker
D
surface
pie chart chart
C
surface
pie chart chart
B
surface
pie chart chart
D
surface
pie chart chart
A

wild card
spaces
characters symbols
internet
excel97
explorer Netscape
convert
text to
pivot table chart
columns
wizard
wizard
wizard
stock
line chart bar chart chart
true

false

none of
the above A
word 2000 A

tip wizard A
pie chart

C
A

and
3dimension
s
true
Data
table

or
4Multidimension dimension
s
s
false

Pivot table

It is often
used to
display
share
It is also
market
called as
prices
high-low- It shows over a
close
trends
period of
chart
over time time
Scenario
Pivot table manager Solver

A
A

It is also
used for
indicating
fluctuation
s in
temperatu
re
changes B
Data
table.
C

Scenario
Goal seek manager

Data
Pivot table table.
A
Data
Goal seek Pivot table Solver
table.
D
Workshee Spreadsh none of
Workbook t
eet
the above A
Performin
g
calculation
s.

Performin
g
database
operations

Performin
g text
formatting
.
Source
Column
table
field
Row field. name.
two
three
N
true
false
34Multidimension dimension dimension
s
s
s
Data table Pivot table

All of the
above

Pivot table
item.
C
B
B

A
B

It is useful
when
several
componen
ts are
changing
and the
user is
It displays interested
the data in the sum
series one of the
on top of componen
the other. ts.
Pivot
Scenario
table.
manager
Scenario
Goal seek manager
Standard
Count.
deviation
databases records

It is a tool
for
summarizi
ng and
analyzing
the data
records in
an
interactive
manner.
Goal
seek.

text import
wizard
worksheet
applicatio
n window
A dark
wide
border

It is a tool
that
provides a
way to
view and
compare
the results
of all the
different
variations
together
on the
worksheet
Scenario
manager
convert
text to
columns
wizard

It can be
represent
ed in 3dimension
s
Solver

Data table C

Pivot table Data table A


SumIf
tables

A
worksheet
s
D

It
summariz
es the
data by
using
analytical
functions.
solver

A
Pivot
table

function
tip wizard wizard

workbook tables
document modal
window
window
A dotted
border

database A
C

A blinking
No border border
A

8,16,32

your
formula
has a
syntax
error
ability to
generate
tables
word
processin
g
Range
Producing
graphs

2,4,2
the row is
too short
to show
the
number at
the
current
font size

2,2,2

the
column is
too narrow
to show all
the digits
of the
number
flexibility
speed of of moving
calculation entries

6,8,10

either b or
c
C
cost of
initial setup
D

graphical
Address
Writing
letters
drag from
the top
cell in the
doublecolumn to
click any the last
cell in the cell in the
column
column
CTRL +
ENTER
ENTER
array.
function.

database
Gap
Drawing
pictures

spreadshe
et
D
Rows
A
Document
filing
A

click the
column
heading

click the
column
label

TAB
constant.

INSERT
formula.

A
B

(201)555100
1212.
Cell
reference
s
Functions
^
/

Tom
#VALUE! McKenzie. C

B5*B6

C3/D4

E12

It is
surrounde
d by a
heavy
It is
border.
blinking.

Numeric Text
constants constants
*
\
It is
impossibl
e to
determine
D4^2
.
SUM(H9: G7*SUM(
H11)
H9:H11)

D
D

C
B

The
phrase
active
It is
cell
displayed appears in
in reverse the Status
video.
bar.
A

By either
clicking in
a different
cell or
By using using the
the arrow arrow
By clicking keys to
keys to
in a
move to a move to a
different different different
cell
cell
cell

The
Standard
toolbar

By typing
the
reference
of the cell
you want
to move to
in the
formula
bar
C
The Font
The Cell Size
Format
command
The
command on the
Formattin on the
Tools
g toolbar Edit menu menu.
B

the New
command
on the File
menu.
File

the Save
command
on the File
menu.
Edit

Preview

Details

Insert

Delete

Clear
Orientatio
n (portrait
or
landscape
)

Delete

Options
worksheet
.
6
copy
range.
paste
range.

Headers
and
footers
Page
Setup
range.
D12, G25
destinatio
n range.
destinatio
n range.

the Save
As
command
on the File
menu.
View

the File
Type
command
on the File
menu.
C
Window A

List
Properties B
Both
Insert and
Delete
Clear
C
Both Clear
and
Delete
Remove B

Fonts

Margins

View

Edit

group.
D12:G25

cell group.
D
source
range.
source
range.
Both the
Copy and
Paste
command
s
constant

B
C

clipboard.
clipboard.

The
Duplicate The Copy The Paste
command command command
absolute relative
mixed

D
B

D
A

B4

$B4

B$4

$B$4

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!
C
Both the
Cut and
Paste
The Move The Cut
The Paste command
command command command s
D

the Fill
Handle

cycle
through
absolute,
relative,
and mixed
cell
reference
edit cells. s.
the
the
Format
Formattin
Painter
g toolbar

cycle
through
open
applicatio
ns.
C
Condition
al
formatting B

Select the
Insert
Hyperlink
command
from the
File menu.

Click the
Insert
Hyperlink
button on
the
Standard
toolbar.

Doubleclick a cell
and click
the Insert
Hyperlink
command. B

copy and
paste
cells.

whether
the cell
has a
formula or
a value in the cell
it.
address.

Right-click
a cell and
click the
Edit
Hyperlink
command.
whether
the cell
has an
absolute
or a
relative
cell
reference.

the value
in the cell D
text with
either a
two-digit
or fourdigit year,
text with a text with a
depending
two-digit four-digit
on the
year.
year.
an integer. format.
C

Jul-30
subtractin
g the
earlier
date from
the later
one.
the F4
key.

Aug-31

It is
impossibl
e to
determine
from the
29/03/200 informatio
8
n given.
B

adding the
earlier
date to the
later one.
the F2
key.

subtractin
g the later
date from
the earlier
one.
the Esc
key.

0.75

March 4
of the
current
year

adding the
later date
to the
earlier
one.
A
the F1
key.
B

a cell on a
worksheet
a
.
a variable. constant.

Either 3/4
or .75,
depending
on the cell
formatting C
either a
cell on a
worksheet
or a
variable. D

B1-G10

B1.G10

B1;G10

B1:G10

AVERAG
E

COUNT

MAX

SUM

Line

Pie

Scatter

Once a
column
chart is
chosen it
cannot be
changed
to a bar
chart.

Once a
pie chart
has been
chosen it
cannot be
changed
to line
chart.

Once a
line chart
has been
chosen it
can be
changed
to a pie
chart.
D

hold down hold down


the CTRL the SHIFT
key
key
Create
four
Use
separate
tables
files

hold down
the ALT
key
Transfer
informatio
n to a
database

hold down
CTRL +
SHIFT
A

03-Apr

Combinati
on
Once a
bar chart
is chosen
it cannot
be
changed
to a
column
chart.

Use
multiple
sheets

Paste
Special
B
none of
Edit | Data the
| Sort
choices
B
Create
None of
forms
the above C
select
Print
select
selection Print
on Page selection
Setup |
in the
Sheet
Print
and then dialog and
print
then print D
drawing
None of
pictures
the above A
=(B2*(D4+
#VALUE! C2)
C

Paste

Fill Down Fill Right

Tools |
Sort
Analyse
data

Data |
Sort
Calculate
data

portrait

press the
PRINT
SCREEN
key
writing
letters
D4+C2*B
2
=A3SUM:
B3SUM:C
3SUM
REF!
whatever
was last
landscape used

AD213
CERN

ZA1
ECRN

click the
Print
button
producing
graphs
(D4+C2)*
B2

A0
CARN
newsgrou
ps and
yahoo and mailto and search
infoseek files
engines
applicatio
bulletin
n
boards,m servers,pr
news
ails call
oxy
groups,ya and
servers
hoo and wireless and web
infoseek system
servers
bulletin
board
system

None of
the above B

vertical
A
None of
the above C
NET
A

none of
the above B

none of
the above B

business bulletin
broadcasti broadcasti none of
ng system ng system the above
none of
small
large
very small the above
windows windows windows none of
socks
sockets
stocks
the above
Mosaic
Yahoo
PINE
Lynx
none of
buffer
cache
built-in
the above
Photograp Digital
Cryptogra Message
hy
Signature phy
Digest

A
B
B
A
B
C

Key

Lock

Hash
Function

Formula

User-id
Password Name
Address
Penetratio
Cryptogra Password
n
Retrieval phy
Cracker
Regulatio
Acts
ns
Address Protocols
Unauthori
Spoofing Imposting sing
Approving
Loss
Threat
Exposure Hacking
Sales Income tax
tax
authorities authorities
Pirated
Utility
software
Tim
Berner
Lee
Hoffman
Etrade.co Amazon
m
.com

Automate
d Tailor
Any Time
Machine Money
Regulatio
Acts
ns
Router
Gateway
LAN
hyper
terminal
tracing
program
National
Informatic
s Center
Only
Computer
s

A
B
A
D
A
B

Police
Judge of a officer of
civil court IPS rank. B
Virus

Cracker

Charles
Bubbage

Howard
Aiken

Dell .com Msn .com B


Asynchron
ous
Transmiss None of
ion mode above

Address
Port

Protocols C
Pin
B

WAN

CAN

PAN

hypertext
tracing
program
Network
Interface
card

hypertext
transfer
protocol
New
Informatio
n Card

hypertext
tracing
protocol
C

Can not
Only
computers printers

Combines
connectivit
y of a hub
with the
Concentra traffic
tes
regulation
connectivit of a
y
bridge

None of
the above B
None of
the above D

Switches
data from
incoming
ports to
outgoing All of
ports.
Above

Bridges
and
Two or
Repeaters more
.
networks

bits

RG7U

Bridges
Hubs and
and Hubs nodes
None of
frames
Packets the above
virus
gateway router
checker
None of
Two
Four
the above
Data-Link Network All of the
Layer
Layer
above
Coaxial
Twisted
cable
Fiber
pair

Physical
address

Logical
address

A cable

Hub

Data
return to
the
sender

It continue
on to
target
device
It gets
with
destroyed corrupt
None of
bit by bit. data
the above B

Wireless
technolog
y
Physical
Layer

Wired
Technolog
y
Data Link
Layer

Ultra violet
technolog
y
Network
Layer

Binary
48 Bits

ASCII
48 Bytes

Octal
48 KB

software
that
facilitates
connectio
n to the
internet

a list of
rules for
transferrin
g data
over a
network

a gateway
calling
software program
that allows for
file
internet
copying
bridging
B
Network
Server
PC
C

firewall
One
Physical
Layer

Novell PC Client

A
C
D
B

A memory None of
address
the above B
None of
Router
the above B

None of
the above
All of the
above
None of
the above
48 MB

A
D
A
A

If the hub
goes
down, it
If one
brings
node goes down all
down, it
of the
brings
nodes on
There isn't down the that
one
entire ring section
Physiolog
Both A
y
Topology and B

If the hub
goes
down, it
brings
down all
of the
nodes on
all of the
rings
B
None of
the above B
All of
above
D

Bus

Star

Linear

Parallel

Ring
Both A
and B

Parallel

Circular

Ring
Ring
Star

Bus
Bus
Bus

Ring
Network
Layer

Bus
Star
Transport Physical
Layer
Layer

Mesh
A
Data Link
Layer
D

Ethernet,
token ring,
DecNET
bps
bps

Ethernet,
token ring,
FDDI
kbps
Kbps

Ethernet,
token ring,
ARCnet
B
mips
B
Mips
C

Linear

None
Both A
and B

Star
Star
Linear

Mesh
Mesh
Ring

C
B
C

Ethernet,
DecNET,
FDDI
mbps
Mbps
depend on
usually
measured the
higher
in bytes
transmissi
than LAN per
on
speeds
second
medium
CD-ROM
Windows
drive
a modem 95
must use
the World
Wide Web
key
gateway
interface

must use
electronic
mail
uniform
resource
locator

must have
a LAN
account
common
gateway
interface

limited by
modem
speeds
C
Netscape B

All of the
above
A
applicatio
n protocol
interface C
connects
interfaces a
a Novell used to
a modem computer
Interface control a to a
to a
Controller printer
computer network
D
CD-ROM
Windows
drive
a modem package Netscape B

Linux
have to
do with
compressi
on of
graphics
and video

Novell
Netware

Windows None of
NT
the above C

have to
do with
Web
pages

the
Internet

none of
the
previous A
use
appropriat
e
must use must use must have communic
the World electronic a LAN
ations
Wide Web mail
account
software A
none of
the
Printer
modem
bridge
previous D
provides
access to
is a CPU
the
is a CPU functional make of
Internet
register
unit
processor A

used to
send
email

is a
protocol
for the
transfer of
files
is part of between
Netscape computers D

used to
send
email

used to
browse
the Web
uses
wireless
communic
ation
is part of None of
medium
Netscape the above D

used to
protect a
computer
room from
fires and
floods
a backup
server

a screen none of
a form of saver
the
virus
program previous
an email a poor file
server
server
none
none of
the
previous
search
CD-ROM clip-art file engine

D
D

IR system
for the
hardware Internet
browser

scanner

provides
access to
the
is a CPU
Internet
register

is a CPU
functional make of
unit
processor A

used to
send
email

is a
protocol
for the
transfer of
files
is part of between
Netscape computers D

used to
browse
the Web

is a
protocol
used to
uses
that allows
send
telephone is part of for remote
email
lines
Netscape login
D
Any layer
Any layer can
can
communic Any layer
The layers communic ate only
can
cannot
ate
with the
communic
communic directly
layer
ate only
ate with
with any directly
with the
one
other
above or layer
another. layer.
below it. above it. C
It is made
up of
many
networks
connected
into
Individual
transmissi It works
computers
on lines
the same can
It is one
called
way as a connect to
large
backbone local
it using an
network. s.
network. ISP.
A
Password System
Denial of Port
cracking intrusion Service
sniffing
C
used to
protect a
computer
room from
fires and a form of
floods
virus
Flood a
Web
server
with
IP flood
requests

a screen
saver
program

none of
the
previous

Virus that
initiates a
ping flood UDP flood A

hack

packet

firewall
router
a backup an email
server
server
Apply
security
patches

flood

switch
hub
B
a poor file none of
server
the above D

Update
Backup
Limit
virus
data on a logging on
definitions daily basis access
C

Only large
namerecogniza
ble sites
are safe.
Use of
Use of
logical
Use of
password access
identifiers s
methods
All sites
are safe
and
reliable.

traffic

There are
safe and
unsafe
sites.

ActiveXenabled
sites are
safe.

Phone
A Trojan
horse

E-mail

Use of
encryption
methods D
by
scanning
the
by
computer
attaching for a
itself to a connectio
document. n.
B
Web
Applicatio
traffic
n updates D

Adware

A worm

Modems
cookies
and
Trojan
horses.

Protocols
Trojan
horses
and key
loggers.

Multiplexo
rs
LAN
key
cookies
loggers
and key
and
loggers.
worms.

by
attaching
to an email.

An attack
on a
system for
personal
gain

through
an FTP
port.

An attack
with the
purpose
of gaining
publicity
Disruption
in
Economic communic
damage ation
Crashing
the stock Shutdown
market, as of military
in the
security
1930s
systems

Spyware

Changing
the
Giving out content of
disinforma a Web
tion
page
D
Disruption All of the
in supply above are
lines
correct.
D
Shutdown
Contamin of nuclear
ating
plant
water
safety
systems systems D

To obtain
an
accurate
inventory
of network
related
To
equipment
To carry To
improve
and parts
more
improve
system
and
network
network
response network
capacity services time
nodes
D
limit
stop its
update its
access to competitor prices as
set its
computer s seeing soon as
prices
owners
their
they are
very high only
prices
changed D
Yahoo
USA
People
People
People
Lycos
Search
Search
Search
Search
B
Name of Date of
Personal Criminal
your bank birth
assets
records
A
Virus
Fraud
Adware
Spyware B

buy
stocks.
Shill
bidding
Internet
stalking.
pop-ups.
Use a
fake email
address.

invest
without
risk.

make
large
amounts
of money
by parking
purchase funds in
off-shore their bank
property. account. D

Phishing
cyber
stalking.
cookies.

Siphoning
virtual
stalking.
spam.

Never use Use a


your real proxy
identity.
server.
Message
Physical sequence
Security number
Encryption controls
checking
I only
irc

II only
ftp

Hoaxing
Web
stalking.
viruses.
Use antispyware
software.

Logical
access
controls
Neither I
Both I & II or II
www
telnet

B
B
B

B
C
C

Adds
more
Verifies
Increases
bytes to
integrity of boot up
programs files
time

HTML

Internet
Explorer

Microsoft
Excel

round trip
HTML
HTML
document. document.
.con is
.com is
.co in
used for
used for used for companie
company company s
Web
query.

the World
Wide Web
round trip Consortiu
HTML.
m
HTML.
XML.
HTML.
DHTML.
clicking a
using
hyperlink
Internet
that
Explorer
reference
to view a
sa
Web page updating document
that is
the values that is
stored on that are
stored in
the hard obtained the floppy
drive on
through a drive on
your
Web
your
computer query
computer
Click on
the Back
arrow until Click on
Go to the
the
Go to or History
desired
Search in page and
site is
the
look for
found
browser
the site

Misleads
a program
recompilat
ion
B
both
HTML and
Internet
Explorer B

Web
browser.

None of
the above A

one way
HTML.
MHTML

C
D

viewing an
Excel
worksheet
that you
have
saved as
a Web
page.
B

Go to the
Bookmark
s or
Favorites
page
C
the
the
the Insert the
External
Refresh
Hyperlink Update
Data
command command command command A
Screensa
Hyperlink ver
Sound
BMP
GIF
JPEG

Video
TIFF

C
C

Cut and
paste it to
a word
processor
document.
network
extranet. intranet.
topology
an
an
attachmen a
encryption
t.
signature. a footer. .
VoIP
IPT
IPP
PoIP
Desktop Desktop Desktop Desktop
client,
client,
server,
server,
applicatio software, applicatio software,
n, and
and
n, and
and
database. hardware. database. hardware.
Telephon None of
Modem
CD-ROM e line
the above
File
File
Transmiss File
Transfer ion
Transfer None of
Program Protocol Protocol the above
So
computers
can be
So IP
So email
reference addresses is
d by a
can be
delivered None of
name
shorter
faster
the above
143.215.1 None of
193.1.2.3 45.1.1.1 2.19
the above
paul .trigg
@
paul.trigg
domain.
@domain. paul.doma None of
org. uk
org.uk
in.uk
the above
Scientists
The US
in
governme Switzerlan
None of
nt
d
No-one
the above
Write it
Save it to down on a
a floppy
piece of
disk.
paper.

Internet
Relay
Chat

It will be
deleted

Internation
al Relay of
Character
s

Add it to
Favourite
s or
Bookmar
ks.
privileged
network.

Internet
Remote
Conversat
ions
A letter
It will be will be
waiting for sent to
you to
you in the
collect it post

C
A

B
A

A
B

A
D

None of
the above A

None of
the above A

Hyper
Textual
Mark-up
Lingo
Receiving
messages
automatic
ally from
anyone in
the group

Hyperlink
Text
Marking
Language

Hyper
Text Markup
None of
Language the above C

clipart &
auto
shapes

People
discussing
a topic of
interest
globally
autolayout
s and
presentati
on
templates

circles

points

squares

icons

square

image
short cut
menus

grid
auto
shapes

guide
all the
above

tool bars

High
volumes
of email

None of
the above C

slide view
& outline none of
view
the above B

slide show
clip gallery & view
fonts &
& word art show
images

none the
above
all the
wave file media clip .video file above
movelast,t movelast,f
eof,false rue
alse
eof,true
form
properties layout
project
window
window
toolbox
explorer
movefirst,t movefirst,f
bof,false rue
alse
bof,true
value()
int()
number() val()
circle
true
true

rectangle square
false
false

fontcolor
underline,t
rue
textsize
onemillionth
of a
second

color
fontunderli
ne,true
size
onehundredth
of a
second
recordcou
nt

count

forecolor
textunderli
ne,true
foresize
onethousandt
h of a
second

oval

none of
the above
none of
the above
fontsize
one-ten
thousandt
h of a
second

itemcount listcount

A
B
D

D
D
D
D
A
A
C
B
D

C
D

form
layout
window

prperties
window

title

prompt

project
explorer toolbox
B
vbmsgbox none of
style
the above C

msgbox() textbox
label
inputbox() D
opendyna opensnap dbopensn dbopendy
set
shot
apshot
naset
D
load

activate

standard
blue
red

opaque
red
green
form
properties layout
window
window
form
properties layout
window
window
change
lostfocus

unload
transpare
nt
green
blue

initialze

graphical
black
white
project
explorer
toolbox
window
project
explorer
toolbox
window
text
gotfocus
none of
container the above

child
true
load

parent
false
unload

enabled

visible

value

dime
.ctx
Validate
On Error
GoTo
linelabel
UpdateCo
ntrols

dim
.ctl
Validation
On Error
GoTo
Inline
PaintPictu
re

var
.ctr
Check

initialize

C
D
B
D

A
D
C
A
D

activate
none of
text
name
caption
the above C
opendatab
openrecor none of
ase
dbengine dset
the above B
C

On Error
Stop

style
none of
the above
.ocx
Audit
On Error
Resume
Next

Refresh

Resize

Cancel
parameter Cancel
to a non- parameter
zero value to 0

UnloadMo
de
parameter
to a nonzero value

UnloadMo
de
parameter
to a zero
value
A
None of
the above D

B
B
A

Consists
Consists of several
of several Applicatio
Programs ns
Form
window, Project
standard window,
or code
view code
module
window
Place
Place
code in
code in
the
the
Terminate Unload
event
event
AutoRedr
AutoRedr aw =
aw = True False

Msgbox
err.no &
err.text

Consists
of Various
Forms
Consists
And Code of several
Modules Projects D
Class
module,
code
module
Place
code in
the
Deactivate
event

None of
the above A

None of
the above B

PaintPictu
Refresh
re
A
Msgbox
Msgbox
error.num
Msgbox
error.num ber &
err.numbe ber &
error.desc
r & err.text error.text ription
D

To
provide a
repository
for images
To display To help in To allow used by
images to creating a the editing other
the user ToolBar
of icons
controls
D
GetFileNu
FreeFile m
GetFile
GetBytes A
GetProper
Retrieve Get
ty
Value
B
Common
messages
passed to Open
Windows
Windows dialog box explorer
Caption
Visible
Multi-Line
Click,
KeyUp
KeyUp
Click and and
and
KeyPress KeyDown KeyDown
Ascii
Binary
Input
Format
Format
Mode
CurrentX ScaleLeft ScaleHeig
and
and
ht and
CurrentY ScaleTop ScaleTop

Input box
Font
KeyPress,
KeyUp
and
KeyDown
Output
mode

D
C

x and y

D
B

Property
Get
Backgrou
nd color
property

Property
Assign

Property
Let

Caption
property

ZOrder
property

Min

Max

Value

Shell

Substr

SetAttr
CStr
A
Are
actually
not
None of
properties the above B

Are one
and the
same

Can be
different
at times
You do
You do
not have
not need the
to use the permissio
Set
n to
command access
here
the class

MyVar
has not
been
declared
The
ExecProc
The Open The Exec edure
method
method
method
A critical An
A warning message exclamati
query icon icon
on icon

Property
Set
C
AutoRedr
aw
property C
CurrentVa
l
B

None of
the above C

None of
the above D

None of
the above B
built-in
intrinsic
procedure
statement. variable. constant. .
C
InputBox MsgBox
function
statement
can be
can be
MsgBox InputBox created
created
statement function
with the
with the
returns a returns a macro
macro
value,
value,
recorder, recorder,
while the while the while the while the
InputBox MsgBox MsgBox InputBox
function
statement statement function
does not. does not. cannot.
cannot.
B
Data
cannot be
A new
entered
The form Data can check box
into the
can be
be
can be
form.
modified. entered. added.
C
QueryUnl
Unload
oad
Deactivate Terminate C
scribble
clipping
cropping cutting
drawing
tool
tool
tool
tool
A

color
palette

ascent
10
column

images

color
guide
primary
tricolor
color
color
scheme
palette
scheme
28
18
36
bar
pie
linear
slide
images
sorter
and text
slides
views
all the
radar
doughnut above
data point data
stream
color box

color
scheme

circular
entity
Microsoft
organizati
on chart clip art

A
C
A

C
A
B

auto
shapes
the chart
window
the
the chart opens
organizati is made
displaying
on chart is available a chart
expanded for editing template
general
custom
purpose drawing
box tools tools
tools

track
changes

used to
create a
used to
manager
mange
accessed box for an
organizati only by
existing
onal chart manager box
not
available
in the tool
turned on turned off bar

used to
store the
other tools
of the
organizati
onal chart C

none of
the above C
standard
drawing
tools
C

available
in the tool
bar
any of the
once
twice
thrice
above
two
four
five
eight
standard all the
native tool draw tool tool
above
autolayout handlayou
none of
s
ts
slide view these
reduce/enl
none of
zoom
arge
preview
the above
importing exporting copying
Microsoft auto
excel
shapes
clip art
.rtf(rich
.ppt(Powe text
.doc(docu
rPoint)
format)
ment)

B
C
B
B
B
B

moving
B
drawing
tools
A
.html(hype
rtext
format)
B

nine
.rtf(rich
text
format)

only one six


.wmf(wind
ows
.txt(plain
metafile) text)

not
displayed
during the
slide show
DTS(digit
al track
sound)

displayed
only
during the
slide show
3D(3
dimension
)

build
notes
master

transition
slide
master

twelve

.doc(docu
ment)
B

displayed
only in
outline
none of
view
the above A
both a and
b
transition

slide show view show


master
master
slide
notes
slide
outline
sorter
view
slide view view show view
15
10
7.5
inches,10 inches,7.5 inches,5 none the
inches
inches
inches
above
none of
portrait
landscape a or b
the above
animation view show transition
gif

jpeg

during
slide
transition
spell
checkers
custom
slide show show
notes
slide pane pane
internet
explorer

when the
slide show
is run
header
files
both a and
b
properties
pane

D
A
A

B
A

b or c
A
none of
the above D
all the
above
D

png
action
hyperlink hypertext button
visual
basic for Microsoft
applicatio visual
all the
visual c++ n
interdev
above
macro
batch file templates add-ins
while
creating a
.exe file
virus
checkers

none of
the above
all the
above
none of
the above
outline
pane

B
A

C
A
B
D

paint shop paint shop power


pro
pro
point 2000 D

PowerPoi
nt creates
a sample
presentati
on to
which
user can
add words
and
pictures

it is the
quickest
way to
create a
presentati
on

contains
sample
presentati
ons for a
variety of
topics

user can
insert
user can picture to
user can insert only the
insert
premaster
objects
drawn, pre- slide
like clip- colored
which gets
arts,
graphic
reflected
pictures
images
in all the
stored in a reflected slides
separate in a clip
using that
files to the arts to the master
slides
slides
slide
in notes
in outline in slide
pages
view, drag sorter
view, drag
the slide view, drag the slide
icon to a the slide icon to a
new
to a new new
location
location
location
the slide
that holds
the
formatted
placehold
ers for the
design
titles,
templates
main text
is the
and any
template
backgroun transition whose
d items
means
format
that user applying and color
wants to special
scheme
appear on effects to user
the slides the
applies to
is called a crossover a
master
between presentati
templates the slides on

provides
suggested
content
and
design
D

user can
insert
picture to
the title
slide
which gets
reflected
in all the
slides
using that
title slide B
I slide
view, drag
the slide
icon to a
new
location
C

the slide
that holds
the
formatted
placehold
ers for the
title and
sub-title
for the
presentati
on is
called a
title
template D

with notes
pages
view user
can
prepare
speaker
notes and
handouts
the slide
that holds
the
formatted
placehold
ers for the
titles,
main text
and any
backgroun
d items
that user
wants to
appear on
the slides
is called a
master
template
slide
layout

in outline
view, user
can see
the
miniatures
of all
slides in a
presentati
on,
complete
with text
and
graphics

user
should
select the
slide view
to add the
text to the
slide

the slides
can be
reordered
in the
outline
view
B

the slide
that holds
the
formatted
placehold
ers for the
title and
subtitle for
the
presentati
on is
called a
title
template D
set up
customize new slide show
B
design
template
is the
template
transition whose
means
format
applying and color
special
scheme
effects to user
the
applies to
crossover a
between presentati
the slides on

by default,
doughnut
data to be chart is
graphed displayed
resides in based on
a
the data in
datasheet the
window
datasheet
the
master
the slide
slide
master
office
spell
assistant checker
10
12
once
twice

data is
plotted in
a chart
window
the
header
slide
grammar
checker
102
three

user can
add data
labels and
gridlines
to the
chart
B
the format
slide
none of
the above
22
four times

B
B
B
B

text,
text,
hypertext
graphics and
and email Power
address. Point.

CD-ROM,
digital
camera
and
sound.

text,
hypertext,
Power
Point,
video and
sound.
D

the Line
style

the Font
and the
text
alignment

Line style,
Line color,
text font,
and text
alignment D

the Line
color

Fill color,
Line color,
Line
and Line
Fill color Line color thickness thickness D
A popup
box
prompts Microsoft
Excel is
you for an Graph is
started so existing
started so The graph
that you
Excel
that you
placehold
can create chart to
can create er is
a chart.
insert.
a graph. deleted.
C

taken
from the
first
column or
row of
data in the
datasheet,
always
depending
always
taken
on
taken
from the whether
from the first
the data
first row of column of series are
data in the data in the in rows or entered by
datasheet. datasheet. columns. the user. C
Side-byside
Stacked
column
column
Pie chart Line chart B

It
automatic
ally
displays in
Slide
view.

Click the
Insert
Chart
button on
the
Standard
toolbar.
Click the
chart
object,
then click
the View
Datasheet
button on
the
Standard
toolbar.

Single
click the
chart.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
linked to
the
PowerPoi
nt
presentati
on.

Double
click the
chart.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
embedde
d in the
PowerPoi
nt
presentati
on.

Pull down
the Insert
menu and
select
Chart.

Pull down
the Insert
menu and
select the
appropriat
e Object.

Pull down
the Insert
menu and
select
Chart,
click the
Insert
Chart
button on
the
Standard
toolbar, or
pull down
the Insert
menu and
select the
appropriat
e Object. D

You
cannot
display
Pull down the
the Edit
underlying
menu,
datasheet
then
once the
select
slide is
Object.
finished. B
Change to
Click
Slide
outside
Sorter
the chart. view.
C

The
datasheet
window is
The
toggled
datasheet from
is saved closed to
as a
open (or
separate from open
file.
to closed). D

The
applicatio
n that
The chart
The chart created
is
The chart is doubled the chart
selected. is deleted. in size.
is started. A
The chart
The chart Microsoft
is
The chart is doubled Graph will
selected. is deleted. in size.
restart.
D
a slide
one bullet
item at a
time, build
bullet
items a
letter at a
time, and
build
a slide
bullet
bullet
bullet
one bullet items one items one items a
item at a letter at a word at a word at a
time.
time.
time.
time.
D
Subtle,
Moderate,
Subtle
Moderate Exciting
or Exciting D
Neither
enter nor
Both enter exit;
and exit, neither fly
Fly in from and fly in in from
Enter and top or
from top top nor
exit
bottom
or bottom bottom
C
Enter
Shift
Alt
Ctrl
B

the way
objects
appear on
a slide.

what
objects do
after they
appear on
a slide.

the way
objects
exit a
slide.

The
advanced
timeline
shows the
sequence
in which
objects
The
The
will
advanced advanced appear on
timeline
timeline
the slide
shows the shows the and the
sequence duration duration
in which of the
of the
objects
effect
effect
will
applied to applied to
appear on each
each
the slide. object.
object.

Clips

Organizati
on charts Text

Paint
program

Draw
program

Filtering
program

From top

Dissolve
in

Fly in

Custom
animation
can be
used to
affect the
way
objects
appear on
a slide, to
what
objects do
after they
appear on
a slide,
and to the
way
objects
exit a
slide.
D
The
advanced
timeline
shows
neither the
sequence
in which
objects
will
appear on
the slide,
nor the
duration
of the
effect
applied to
each
object.
C
Clips,
organizati
on charts,
and text
D
Animation
program A
Fly in,
From top,
and
Dissolve
in
D

Once data
is entered
it cannot
be
changed.
OLTP.
You can
change
the
appearan
ce of a
whole
diagram,
but not
individual
shapes of
a
diagram.
[Enter+A]
.vbg

Data
cannot be
Once data entered
is entered into
it can be Datasheet
changed. .
OLAP.
OLST.
You can
change
both the You
appearan cannot
ce of a
change
whole
the style
diagram of the
and the
connectin
individual g lines in
shapes of an
a
Organizati
diagram. on chart.
[Shift+Z] [Alt+Z]
.vbp
.frm

There is
no such
thing as a
Datasheet
.
B
OLIP.
B

Dir1.Path
=File1.Pat
h
openrecor
dset

You
cannot
change
the color
of the
boxes in
an
Organizati
on chart.
[Ctrl+Z]
.frx
none of
additem
loaditem the above
loadpictur
none of
e
addpicture the above
Dir1.Path
=
File1.Path
Drive1.Dri =
none of
ve
Dir1.Path the above
message(
none of
)
msgbox() the above
Dir1.Path
=
File1.Path File1.patte
Drive1.Dri =
rn=Dir1.pa
ve
Dir1.Path th
opendatab recordcou
ase
nt
count

update

append

addnew

append

update

additem
addnew
B
moveprevi
ous
movefirst C

add
load
Drive1.Dri
ve=Dir1.P
ath
messageb
ox()

movenext movelast

Cancel
parameter
to a nonzero value
Word
2000

UnloadMo
de
Cancel
parameter
parameter to a nonto 0
zero value
Office
2000
Office 97

additem

B
D
B
B
B

B
C

C
C
C

UnloadMo
de
parameter
to a zero
value
A
Back
Office
A

click-ntype
office
clipboard
shift+end
and
shift+hom
e

double
click

drag &
drop

cut

select

shift+left
and
shift+right
normal
web
layout,
layout,
web
printlayout layout

ctr+end
and
ctr+home
web
layout,
page
layout

click from
start
program,
MSWord
from the
templates task menu
inbox
document
assistant assistant

none of
the above A
none of
the above A

none of
the above B

none of
the above A

none of
wizard
the above
office
none of
assistant
the above
Screen
Document
Tip
Tool Tip Icon Tip
Tip
marginal
none of
tab stop
stop
ruler
the above
home and up and
up arrow page up end keys down
keys only keys only only
arrow
left
center
decimal
rotation
dialogs/al none of
template model
erts
the above
increase decrease both A
none of
indent
indent
and B
the above
special
control
design
effect
tool box
wizard
pictures
drawing
control
toolbar
box
database forms
1
2
0
11
page
printer
print
setup
setup
preview
from the from the from the
none of
file
file menu file
the above
none of
border
shading
style box the above
ctrl+a
Del
ctrl+f
ctrl+m
ctrl+a
Del
ctrl+f
ctrl+m
CTRL+SH
CTRL+SH CTRL+SH
IFT+F
CTRL+O IFT+S
IFT+P
ctrl+shift+ ctrl+shift+
ctrl+shift+f ctrl+o
s
p
None of
Excel
Access
Both
the above

A
A
A
B

D
D
B
C
A
A
A

A
A
A
D
A
C
B

True
False
Valid
Signs
HLOOKU
P

False
True
Transactio Limit
n type
Check
VLOOKU
P
A or B

DDE

OLE
Analysis is
the
loading of
programs
that
perform
routines to
control
peripheral
devices

ODBC
This
involves
looking at
a system
and
finding out
how
informatio
n is being None of
handled
above

Inputs,
outputs,
Only
file design
hardware hardware,
and
and
software software
To
execute
To collect any
data
programs
Deleted
Copied
from the from the
disk
disk

Maintenan
ce,
reliability,
and
upgradea None of
bility
above

Analysis
translates
program
code of a
high level
language
to
machine
code

To
maintain
security

A
B
Reasonab
leness
D
None of
the above B
All of the
above
C

Saved to
the disk

None of
the above D
Transferre
d from the
disk
A

Users
operate
the
manual
system
and
computer
system at
the same
time

Users
operate
the
computer
system
from a
given date

Users
operate
the
manual
system

None of
above

The new
system is
introduced
alongside
the
existing
system

The new
system is
introduced
and users
start
operating
it

Users
continue
operating
the old
None of
system
above

Instruction
s and
technical
document
ation

User
Guide and
technical
document
ation
User
guides
cover how
To enable to run the
any printer system,
to be
enter
For
connected data,
technical to the
save,
support
network
print, etc.
Network
Operating systems Database
systems and
systems
and
communic and
system
ation
backup
services services services
Magnetic
tape
storage
CD-ROM floppy disk
To
To help
maintain a
someone
backup
who is
copy of all
applying
the
To do a
for
informatio particular employme
n
task.
nt
Address
Data bus Auto bus bus
FDDI
BAD
TED
Address
Data bus Auto bus bus
Data
Operating structures
system
that are
Peripheral routines
part of the
s that are that
kernel of
connected execute in an
to a
supervisor operating
computer. mode.
system.
binary
ASCII
decimal
form
code form form

were 7
bits
4 bits

Log files
and
temporary
files

8 bits
8 bits

represent
ed 256
characters
16 bits

None of
above

None of
above

None of
the above A

Hard disk B

None of
the above
Control
Bus
MAD
Control
Bus

B
A
B
D

Shells,
compilers
and other
useful
system
programs. D
alphanum
eric form A
represent
ed 127
characters A
32 bits
A

More than
1000
mega
1000
bytes
kilobytes

32
registers
used to
indicate
uppercase
letters
ROM
bits per
second

memory
capacity
have
fewer
instruction
s than
RISC
machines
ALU

Power is
switched
off
a parallel
interface

32 I/O
devices

1024
230 bytes bytes
A
a 32-bit
bus or 3232 Mb of bit
RAM
registers D

used to
detect
errors
RAM

is the first
bit in a
byte
DRAM

baud

bytes

is the last
bit in a
byte
B
CROM
A

memory
access
time

Hertz
D
secondary
secondary storage
storage
access
capacity time
B

use more
RAM than
RISC
machines

have
medium
clock
speeds

Registers Variables
Data is
not saved
Computer before
is
computer
improperly is shut
shut down down
a serial
printer
interface interface

dot matrix ink-jet


line printer printer
printer
stores
more
is faster
informatio
to access is nonn than
than RAM volatile
RAM
increased
the
provides
storage
backup
capacity increases power in
of a
the
the event
computer process
of a power
system
speed
cut

use
variable
size
instruction
s
D
Logic Bus A

All of the
above
D
a modem
interface B
laser
printer.

is used
for cache
memory B

none of
the
previous

has more
storage
is a form capacity
of ATM
than an
card
ATM card
CRT
displays

LCD
displays

is an
access
contains
card for a a
security
microproc
system
essor
C
none of
SSGA
the
displays
previous B

having
several
programs
writing
in RAM at
programs none of
the same multitaski in multiple the
time
ng
languages previous

having
several
softwares
running at
the same
time

the ability
to run 2 or
more
programs
concurren
tly

writing
programs none of
in multiple the
languages previous

ALU

Registers Variables Logic Bus B


magazine
brochures s
CD-ROM e-mail
D
to run
more than
one
an
program
multitaski operating at the
none of
ng
system
same time the above C
none of
multitaski multiprogr
the
ng
amming
multiuser previous C
ONLINE
ONLINE PAGELAY DOCUME
NORMAL LAYOUT OUT
NT
A
ctrl+m
ctrl+v or
ins

ctrl+2
ctrl+c or
ins

ctrl+end
ctrl+x or
ins

ctrl+home B
ctrl+v or
Del
A
none of
the above B

ctrl+2

ctrl+5

Text Box
Header
and
Footer

Frame

ctrl+1
AutoShap
e
Border

Screen
Tips

Page
Layout

none of
the above A

Chart

WordArt

Auto
Shapes

File

Borders

Shading

WordArt

Bullets

clear

remove all remove

clear all

picture
arrow
circle
bullets
bullet
bullet
dialog box dialog box dialog box
AutoShap
charts
WordArt es
document new
doc1
1
document
hyphenati mail
thesaurus on
merge

shift+f7

thesaurus
menu
shift+f8

first

second

tab
convert
text to
table

end
convert
data to
table
rows &
row
columns
AutoCorre AutoForm
ct
at
Mail
Merging Macro
visual
basic
basic
shift+f8
shift+f7
web
online
layout
layout
view
view
email
outlook
client
express
html
xml
internet
intranet

first row

none
dialog box A
files
C
default
document B
none of t
he above A
tools+spel
ling menu A
last cell of
the t able A
none of
the above A

enter
table auto
format
none of
option
the above
none of
records
the above
style
none of
gallery
the above
Data
none of
Source
the above
visual
vj++
FoxPro
alt+f8
alt+f5

browser
micro soft
outlook
sgml
arpanet

A
B
A
B
B
A

none of
the above A
hotmail
vb script
LAN

A
A
A

field
field name
names in
must be the field
the
listed in
separator header
the same s in a
source
order as header
must
the
source
match any
correspon and the
merge
ding
data
fields
informatio source
you've
n in the
can not be inserted in
data
set as
the main
source
paragraph document
auto
format
option
by default
applies to cell height
it is not
the entire and
possible table and weight
to change not only to option
the height the
applies to
of only
selected all the
selected rows or
rows and
rows of a columns columns
table
of a table of a table
left
decimal
justified

the
number of
fields
names in
the
header
source
must be
the same
as the
number of
data fields
in the data
source
B
delete
cells
option
allows to
delete the
entire row
or a
column or
shift cells
up or
shifts cells
left
C
top
A

A new
section is
created in
order to
change
properties
like
number of
columns
true

In order to
type a
header
from the
third page
of the
document
a section
break is
inserted
after t he
third page
false

A section
is a
portion of
a
document
in which
certain
page
formatting
option can
be set
D
A

true
true
drag &
drop
true

false
false
click -ntype
false

If a
header is
inserted in
the
second
section
then the
same
header is
applicable
to the first
section

A
A
Double
Click

none of
the above B
A

with t he
caps lock
key
accidentall
y turned
on
reverses
the case
of the
letters that
automatic prohibits
were
ally
the user automatic capitalized
corrects
from
ally
incorrectly
common renaming corrects
and then
typing,
an auto
the
turns off
spelling
correct
grammatic the caps
errors
entry
ally errors lock
B
password
protected
document
can be
opened
password
password without
password can be
can not
password are not
upto 15
include
as read
case
characters
spaces
only
sensitive long
B
left
justified
hanging
top
A

a .ppt file
can not
not be
inserted at
specified
position in
the
current
document
true
true

a
document
file can be
inserted in
the
current
document
at
specified
position
false
false

true
true

false
false

Master
Document
Print
Layout
View

Child
Hyperlink none of
Document Document the above A
Page
Layout

a multiple
document
s files can
be
inserted in
the single
document

an .xls
data can
not be
inserted at
specified
position in
the
current
document B
A
A
B
A

Outline
Layout

none of
the above B

Insert
Mode

Type Over
mode
Remove
press the
press the press the escape
return key tab key
key
layers and lines and
planes
spaces
enter/retur
tab
n
grammar spell
checker
checker
send a
public
message
to friends
interested send
in one
pictures to
topic
a friend
From ___
Print all
To ____
Enter
Copy
closing
tabbing

none of
the above A
just keep
typing

height and rows and


width
columns
backspac
e/ delete shift
thesaurus outliner

send
private
messages
to a friend
Page
setup
Retrieve
spacing
word
processin
g

send a
package
to a friend
Print
preview
Save
sorting

D
B
C

D
B
C
B

spreadshe
database graphing
et
C
Creating
and
To
editing
Storing
analyse
document informatio None of
figures
s
n
the above B
subscript

To
analyse
figures

annotation
Creating
and
editing
document
s

clip art

clipboard

Storing
Making
informatio Calculatio
n
ns
B
Font,
Spelling,
Paragraph
grammar
, Bullet
Clear,
and
Cut, copy, and
replace
autocorre paste and Numberin
and select ct
clear
g
C
Text
Text at
Numbers which
the
which
appear at Designate
bottom of appear on the top of d area on
every
every
every
the
page
page
page
document C

Mouse,
printer
and
processin
g system
keyboard?

Keyboard,
Mouse,
monitor
and
printer

Clear,
replace
and
Toolbars

Monitor,
keyboard
and
mouse
microphon
clip-art file e
Spelling,
grammar
and
Cut, copy,
autocorre paste and
ct
clear

6 point

10 point

15 point

2
inches.

2
inches.

3 inches.

You are
not in
Print
Layout
view.

Word
cannot
display
columns
during
editing;
You have You have you will
not
not
see them
inserted a specified only when
column
continuou you print
section
s section the
break..
breaks.
document. A

Browser

to move a
section of
text from
the
original
to store a to store a location to
file on the file on a
another
hard drive diskette
location
Data
about a
set of
A set of
similar
Mainly
different
things
text
graphics
Thesauru Spell
Grammar
s
Checker Checker

None of
the above B
digital
scanner
D

None of
the above C
25 point
B
impossibl
e to
determine
.
B

to leave
an original
section of
text in
place
while
pasting a
copy
elsewhere D

None of
the above B
Find and
Replace B

Paste

Replace

Select all

AutoCorre
ct
B

Copy,
Cut, then
then paste paste

Delete,
Insert,
then paste then paste A

To give
the
original
author a
chance to
accept
suggested
changes
from the
person
who
entered
the
revisions

To
complicat
e the
revision
process
and to
force the
author to
spend
more time
making
correction
s

To allow
multiple
people to
work on
one
document
in
collaborati
on with
one
another
C

A vertical
line
outside
the left
margin
A red
signifies a
A line
underline change
appears appears has been
through
beneath made at
text that is text that is that point
to be
to be
in the
deleted.
added.
document.
Through Through
the Edit
the Tools
menu by menu by Through
choosing choosing tools on
Track
Track
the
Changes Changes Reviewing
command command toolbar

Comment
s are
enclosed
in a text
box at the
right of
the
document. D
Both
through
the Tools
menu and
the
Reviewing
toolbar
D

To give
the
original
author a
chance to
reject
suggested
changes
from the
person
who
entered
the
revisions

The
Versions
command
will allow
you to
save
multiple
versions
of a
document,
including
any
changes
that may
have been
made to
that
document.

The
Versions
command
will allow
you to
save only
one
version of
a
document,
including
any
changes
that may
have been
made to
that
document.

The
Versions
command
will allow
you to
save only
one
version of
a
document
without
any
changes
that were
just made
to the
document.
The first
and
All
second
versions The latest versions
are
version is are
opened
opened
opened
automatic automatic automatic
ally.
ally.
ally.
Grammar Spell
Dictionary check
check
Word will
Word
The most show the
displays a recent
name of
list of the version
the
dates and will
person
times
appear at who
each file the
saved
was
bottom of each
saved.
the list.
version.
Fields
Check
boxes

Tools
Toggle
button

Forms

The
Versions
command
will allow
you to
save only
two
versions
of a
document:
one
version of
the
original
and one
version of
any
changes
made to
the
document. A

The
previous
version is
opened
automatic
ally.
B
Thesauru
s
A
Word is
not able to
tell the
most
recent
version of
a
document. A

Insert
A dropText fields down list

C
B

Comment
s can be
edited or
deleted by
right
Comment clicking
Comment s cannot the
s cannot be
highlighte
be edited. deleted.
d text.
Text
Text at
Numbers which
the
which
appear at
bottom of appear on the top of
every
every
every
page
page
page

Comment
s can be
edited or
deleted by
left
clicking
the
highlighte
d text.
C

Fault
Finding
Insert

Debuggin
g
D
Edit
C

None of
the above C
Insert
Press
Copy and page
Press tab. Return.
paste.
break.
D
text.
graphics. forms.
numbers. C
header/fo bibliograp find/searc
oter.
hy.
h.
macro.
A
This
Format
action is
Copy
Paste
Painter
not
button
button
button
possible. C
Bug
Squashing
Tools
a section
of text
where the
first letter
of each
sentence
a section is
of white
lowercase
text on a and the
black
rest are
backgroun uppercase
d.
.
setting it
in larger typing it all
type or
in capital
font size. letters.

Error
Injecting
Format

the
guidelines
used to
establish
where
different
elements
of the
newsletter
will go.
underlinin
g the text
of the pull
quote.

an
enlarged
capital
letter at
the
beginning
of a
paragraph
.
A

changing
the color. A

The
The width height of
of each
each
column
column
6
10

The
number of
columns
12

A grid is a
set of
horizontal
and
vertical
lines that
determine
the
placement
of
elements
in a
newsletter
or other
document. D
The tab
spacing
within
each
column
D
72
D

One

Three

Four

A dropped
cap is a
word that
The
A pull
starts with
reverse
quote is a a
technique quotation lowercase
means to taken
letter
add dark from
when it
text on a (pulled)
should
light
from
have a
backgroun another
capital
d.
document. letter.

Two
Press
Press
Ctrl+Shift+
Ctrl+Enter Enter to
to create create a
a page
column
break.
break.
A sans
A serif
serif font
font at 10 at 10
points
points

Press
Enter to
create a
section
break.

Press
Shift+Ente
r to force
a line
break.
C
A sans
A serif
serif font
font at 20 at 45
points
points
D

2 inches

3 inches 4 inches

Field

Record

Both

Horizontal Vertical
A or B
Duplicate Combined
Value
Value
Gaps

It depends
on the left
and right
margins,
and how
many
columns
are
specified.
None of
the above
None of
the Above
All of the
above

D
A
A
C

Cross
Tabulate
RAND()

None of
Filter
Merge
the above A
VLOOKU HLOOKU None of
P()
P()
the above B

TRUE
TRUE

FALSE
FALSE

A
A

None of
Unusual Strange
A or B
the above C
exception compariso duplicates All of the
testing
n of data testing
above
D
True

False

True

False

Both B &
Limit
Sequence Range
C
related to
none of
virtual
a form of a form of the
reality
ROM
VRAM
previous

same as same as
multitaski multiprogr
ng
amming multiuser

involves
using
more than
one
processor
at the
same time D
use a
virus
protection
program B

save the
file

make a
set up a
backup
password copy

to
calculate
numbers

to read
from or
write
informatio to print
n to a
sheets of
floppy disk paper

Uses
Cobol
106 sec

uses
Java
103 sec

D
D

a keypad

a mouse

to display
informatio
n or
pictures
on a
screen
none of
the
uses C++ previous.
1012 sec 109 sec
a
message
a frog
pad

data to be
transferre
d to
memory

data that
has been the
transferre address of
d from
a memory
memory location

data to be
transferre
d to or
from
memory

the
address of
a memory
location

data to be
transferre
d to the
stack
an
instruction
an
that has
instruction been
that has
fetched
been
from
decoded memory
a scroll
a cursor bar
Formula

an
instruction
that has
been
transferre
d from
memory. C
an
instruction
that has
been
transferre
d from
memory A

the
address of
the next
instruction
to be
executed D
a magic
a light pen marker
A
an
instruction
that has
been
executed

Algorithm Program
Artificial
Assemble
Intelligenc
r
Compiler e
Memory Parity
Range
protection Checking checking
use the
directory search
use the
search
each file backup
tools
in turn
facility
Network Program System
save
copies of
the file
with the
use
same
different keep a
name on filenames record of
the
on the
computer
system
system
failures
Multiproce Time
Multiprogr
ssing
sharing
amming
Floppy
ROM
RAM
Disk

Data

Parity
Checker

Validation B
use find
and
replace
Modem

A
B

backup to
a secure
medium
D
Multiplexin
g
D
Magnetic
Disk
B

Word
Telephon Sharewar
Firmware Processor e modem e
C

Word
Telephon Sharewar
Firmware Processor e modem e
A
Sequential Hashed
Operating
System
ALU
Tracks
and
Sectors

Blocks
and
Sectors

Indexed
CPU

Files and
Tracks

Character, Database, File,


field,
character, record,
database record
field

Random C
Primary
Storage
B
Schema
and
subschem
a
A

Element,
field, file

Valid
character
check
Sound
card.

Maintenan
ce
diagnostic Systems
program logs
MIDI
CD-ROM interface

Parity
check
Serial
interface

Text

Pictures

Sound

Video

Laser

Dot matrix Ink-jet

Drum

C
A

viewing an
encyclopa
edia CDROM.

creating
the plans
for a
building
design.

replaced
regularly

never
updated

recording
current
presenting stock in a
an order supermar
for stock ket and
to a
answering
warehous customer
e.
queries.
A
updated
updated once a
regularly year
C

Document
processor
make
efficient
use of
time
1024

Graphics
package
retain
confidenti
ality of
files
4096

Database
get into
the
system
quickly
512
loss of
confidenti
ality
TCP/IP

duplicatio virus
n of data infection
HTML
IPX/SPX

Spreadsh
eet
D
simplify
file
structures C
8192
C
loss of
data
NetBEUI

D
A

printer
can do
1000s of
pages a
day

the
operating
system is
easy to
use
B
the hard
drive

up-line
universal provider
port serial service

the root
directory
uninterrup
table
power
supply

uniform
page
source

the
program
executabl
orphan
e may not
files can allow it to
be left on be
the
uninstalle
system
d

the
system
requires a
network
administra
tor to
uninstall it

access to
the
internet is files can
quicker
be shared
a
a file
subdirecto
name
ry

data.
Graphical
represent
ation of
logic
Purchase,
sales,
receipt,
payments
etc.

document informatio
s.
n.
text.

Rules
writte in
procedura
l language

Logical
Steps in
any
None of
language the above A

To fill the
log
register

It is
mandatory None of
in tally
the bove

assist in
maintenan speed up
ce
access
IT
senior
managem
executive ent lacks
support
leadership
for IT.
.
input.

the
system
always
requires a
re-boot
and
defrag
afterwards A

output.

prevent
unauthoris allow
ed access encryption C
IT
understan
ds the
business
processin
g.

None of
the above B
All of the
above
D

The use
of
computers
to design
state-ofthe-art,
highquality
products.
specialist
or
functional

Software
that
generates
Using
innovated
computers designs
to do
and
architectur artistic
None of
e.
patterns. the above A
Applicatio
n Service
Provider enterprise local
B
ensure
the
identify
name the filename identify
the file
file
is not lost the file
type
D
All of the
above are
preventive detective corrective parts of IS
controls. controls. controls. controls.
external
static
dynamic extensible
hashing
hashing
hashing
hashing
A: (a) ,
B: (a) to
C: (a), (b), D: (b), (c),
(b), (d)
(d)
(c)
(d)
corrective preventive detective general
controls
controls
controls
controls
Compone
nt
Interface Settings
(a), (c),
(b), (c),
(d)
(d)
(a) to (d)

Turn the
computer
Press the off at the
reset
power
button.
point.

Create the
files
again.
(a), (c),
(d)
detective
controls
(a), (c),
(d)

Ask the
person
next to
you.
(a), (b),
(c)
organisati
onal
controls
(a), (b),
(c)

Select the
Shut
Down
option
from a
menu.
Use the
Find or
Search
feature.
(a) to (d)

Control
(a), (b),
(c)

D
A
C
C

B
C

Pull the
power
cord from
the back
of the
computer. C
Put your
hand up
and ask
the
teacher
C
(b), (c),
(d)
C

preventive corrective
controls
controls
C
(b), (c),
(a) to (d) (d)
C

program
change
call lights requests
data
thread
testing
testing
(a), (b),
(a), (b),
(d)
(c)
specificati
benchmar ons
parallel
k testing matching operations

resolution
procedure
s
C
loop
testing
A

Peripheral
Multiplexe processor Concentra
r.
s.
tor.
(b), (c),
(a), (b),
(a) to (d) (d)
(c)
Replacem
ent
personal Identificati
computers on of
Physical
for user
critical
security of
departme applicatio warehous
nts.
ns.
e facilities.
architectur interface procedura
al design design
l design
ClientComputer
server
Client
network
Star
Bus
Mesh

Job
control
language. D
(a), (c),
(d)
A

problem
logging
unit
testing
(b), (c),
(d)

(a) to (d) D
system
walkthrou
ghs
B

Crosstraining of
operating
personnel. B
data
design
A

Star

Bus

Ring

Hub
Ring
All of the
above

To
maintain a
backup
copy of
are written
all the
informatio
n

To do a
particular
job such
as editing,
storing
informatio
n

To help
someone
who is
applying
for
employme
nt

To Store
data in an
organised
manner
B

Direct
Systems
analysis
and
applicatio
ns
programm
ing.
A
sequential
file on a
disk

Sequential Binary
Data
communic
ations
hardware
and
software.
A
sequential
file on a
tape

Indexed

C
A
D

Operating
systems Computer
and
operations
compilers. .
C
A direct
A direct
access file access file
on a disk on a tape C

Tapes can
only be
Informatio
read by
n formats
the
commonly
machine
vary
on which Parity
between
they are errors will architectur
written
result
es
Address
Data path Control
calculation
part
Unit
part
Local
Distribute Area
Wide area
d systems network
network

Can send
data to a
computer
and
receive
data from
a
computer

Mixer
Allows
computer
signals to
be send
over a
telephone
line
Planetary
network
Office
Automatio
n

Data
record
can never
be
blocked
together C
Input
output
channel
A

Protocol

Use the
computer
to which
they are
connected
to perform
all
processin
g
operations

Generally
require a
keyboard
for data
entry and
a CRT for
display

Modem

Multiplexo
r

Are
required
with a
microproc
essor
which
permits
some data
processin
g such as
input
validation D
Time
sharing
computer C

Aids in
back-up
procedure
s
Ring
Network

Packs
data in a
disk file
Loop
Network

Speeds
up online
printing
Star
Network

Executor
systems
An
A dumb
intelligent
workstatio workstatio
n
n
Time of
day
control
Encryption
locks
algorithms

A
D

Electronic Instant
mailing
post-office C
A
A
personal mainfram
computer e PC
B

Parity
checks

All of
them

Type of
cable

Terminal
Standard
A
compiler
converts
the whole
A
of a
compiler higher
does a
level
conversio program
n line by code into
line as the machine
program code in
is run
one step
Feasibility
study,
system
design,
and
testing
CRC

Implement
ation and
document
ation
Baudot

An
interpreter
does the
conversio
n line by
line as the
program
is run

An
interpreter
is a
represent
ation of
the
system
being
designed

Modem

Demodula
tor

Device
Communi interconne
cation
ct
protocol
standard D

A
compiler
is a
general
purpose
language
providing
very
efficient
None of
execution the above B
Lexical
analysis,
CONVER
SION, and
code
generation
ASCII
An
interpreter
is a
general
purpose
language
providing
very
efficient
execution
Frequency
division
multiplexo
r

None of
the above D
EBCDIC A

None of
the above A
Time
Division
Multiplexo
r
C

MiddleHigh-level level
Low-level None of
languages languages languages the above C
It is faster
than
It is less
parallel
It is less prone to
communic error
attenuatio Uses only
ation
prone
n
one path D
Accountin
Financial Graphic
g
sector and design
systems,
engineerin and
commerci None of
g
education al sector the above C

Manage
Communi the paging
cate with function in
the
a virtual
console
environme
operator nt
Specificati
on and
System
design
Analysis
Fiber
Coaxial
Optics
Cable

Relieve
the main
CPU of
repetitive
communic
ation
tasks

Testing
Common
carrier
System
The
System
Analysis
design of Analysis involves
the screen defines
creating a
the user the format formal
will see
and type model of
and use to of data
the
enter or
the
problem
display
program to be
data
will use
solved
An
A cache interface A buffer

The
different
types of
network to
be used
Star

Testing to
check for
errors
before the
system is
introduced
Packet

Reduce
competitio
n between
the
input/outp
ut devices C
None of
the above B
Telephon
e Lines
C

None of
the above C
An online
protocol
B

Hardware,
Software
and size
of
None of
program. the above
Ring
Bus
None of
10101010 1100101 1010101 the above
Cyclic
Retransmi Redundan Hash
Parity
ssion
cy
Count
None of
15
4
64
the above
Multiplexo Acoustic
Port
Modem
r
coupler
None of
327
141
97
the above
Data
Data
Data
managem
warehous Mining
ent
All of
e
tools
systems them
secondary
memory secondary storage
memory access
storage
access
capacity time
capacity time

B
B
C

A
A
C
B

5C4
16 bits

None of
the above
alphanum
eric form
None of
the above
32 bits

Bit Code
Design

None of
the above D

210 bits

210 bytes
None of
the above
alphanum
eric form
None of
the above

30
binary
form

255
256
ASCII
decimal
code form form

4C5
4 bits
Basic
Coding
Descriptio
n

1B7
8 bits

1024 bits
10000
binary
form

Binary
Coded
Decimal
1000
bytes

1112
1110
ASCII
decimal
code form form
Numeric
Keyboard Keypad

Mouse
used to
indicate
used to
uppercase detect
letters
errors
Because it
squeaks
when
moved
bits per
second
Touch
screen
BPS
Printing
letters

OCR
Touch
screen
increased
the
storage
capacity
of a
computer
system

B
A
A
B

A
A
A
A

is the first is the last


bit in a
bit in a
byte
byte
B

Its moves
like a
None of
mouse
It has ears the above D
baud

bytes

Hertz
None of
Light pen Joystick
the above
MIPS
MHz
VLSI
Tracing
Reading None of
diagrams bar codes the above
voice
barcode recognitio
MICR
scanning n
CD-ROM None of
Hard disk drive
the above

provides
backup
increases power in
the
the event
process
of a power
speed
cut
Light
Refillable Pencil
sensitive
ink
lead
elements
100K
1.44 Mb 5 Mb

none of
the
previous

D
C
B
B

B
A

None of
the above C
1 Gb
B

hardware software

input

Mouse
Touch
screen

Printer

Printing
letters
Touch
screen

Mouse
Credit
card

output
Numeric
Keyboard Keypad
Light pen Joystick
Reading
Tracing
Bar
Diagrams Codes

Scanner C
Digital
Signature
s
B
CD ROM
Hard disk Keyboard Drive
A
Optical
Bar code mark
reader
reader
Keyboard B
Mouse

Writing on
a hard
Printed
board
output
Coloured
spots
Pixels
Storage
Printer
device

Speakers
Storing
informatio
n on the
hard disk

Printer

Pickers

Mouse

Bar code
reader

Pixies
Pointing
device
Optical
mark
reader

CRT
displays

LCD
displays

SSGA
displays

screen
layout

mouse
button
layout

Mouse

Bar code
reader

keyboard
layout
Optical
mark
reader

language software
hardware interpreter interface
Credit
Smart
card
Speakers card

Back-up
on a
Cartridge B
B

CD-ROM A
None of
the above
none of
the
previous B
word
processin
g software C
None of
the above B
an
operating
system
C
None of
the above A

having
several
programs
writing
in RAM at
programs none of
the same multitaski in multiple the
time
ng
languages previous

having
several
programs
in RAM at
the same
time

The ability
to run 2 or
more
programs
concurren
tly

writing
programs none of
in multiple the
languages previous

To run
more than
one
an
program
multitaski operating at the
none of
ng
system
same time the above C
First generation
computers
.

Fifth generation
computers
.
A
none of
multitaski multiprogr
the
ng
amming Multi-user previous A
Vishwajee
t
Deep Blue Param
Arjun
C
is due to none of
is caused caused by bad disk the
by wear
overuse
blocks
previous C
Magnetic
Ink
Optical
Character
Bar code Mark
Recognitio Image
Reader
Reader
n
Scanning
Technolog Technolog Technolog Technolog
y
y
y
y
B

a fast
interpreter
Drum
Printer
encrypting
it
Very
important
reader
user
sequence

Second generation
computers
.

Third generation
computers
.

converts a
program
slower
to
none of
than an
machine the
interpreter code
previous
Dot Matrix
Desk - jet Thermal
Printer
Printer
Printer
decrypting compressi transmittin
it
ng it
g it
Vital
informatio Virtual
n
informatio
resource n reader &
under
user
None of
siege
system
above

A
C

Electricall
y charged
ink
mainfram
e
technolog
y
10-6 sec

Thermal
Paper

An ink
pen

LAN
technolog
y
10-3 sec

WAN
technolog
y
10-12 sec

An inked
ribbon and
print head D

Unix
operating
system
10-9 sec
Cross
Limit
Control
External footing
checks
figures
file labels tests
applicatio
operating communic
n
system
system
ation
pilot
project
model
project
process
multiproce multithrea multiplexi multitaski
ssing
ding
ng
ng
mainfram super
es
computers
arithmetic
control
and logic
unit
unit

micro
computers
central
processin
g unit
non
band
drum
impact
printer
printer
printer
data
word
electronic
managem processin spreadshe
ent
g
et
communic
integrated ation
idea
software software processor
my
recycle
Microsoft
computer bin
exchange

D
D
D

none of
the above B
none of
the above C
none of
the above B

hp vectra
PC-at
system
multiproce multithrea
ssing
ding
"dumb
dumb
terminals" servers

dummy
terminals

file
machine
language
processed
symbol

none of
the above A

none of
the above
none of
the above
none of
record
the above
high level none of
language the above
connector input/outp
symbol
ut symbol
fazitsu
vp200
series
IBM-PC
multiplexi none of
ng
the above

field
assembly
language
terminator
symbol

B
D

dummy
servers

B
B
C
B
B

B
D

wan
host
host

distributed
computing
system
server
server

PC
server
processin
g
four
file
managem
ent
system
multiproce
ssing

LAN
host
processin
g
one
hierarchic
al
database
system
multithrea
ding

windows
NT
back end
back end

LAN
front end
front end

distributed
computing
dumb
processin
g
two

centralize
d
A
data
processin
g
B
many
A

network
database
system
multiplexi
ng
disk
defragme
ntation

relational
database
system
D
none of
the above B

redo
disk
logging
mirroring
Modulatio
Code/De- n/Demodu Module/D None of
code
lation
e-module the above
constraint
fixes
locks
s
traps
multiproce multithrea multiplexi none of
ssing
ding
ng
the above
Linear
Local
area
Local area array of
None of
networks networks networks. the above
clienttask
process
thread
server
Integrated Integrated Integrated
system
Symbolic Services
dynamic Digital
Digital
None of
networks. networks. network. the above.
repairing

D
D
C

B
B
B

B
C

Ethernet
visual
basic

Internet
power
builder

ARPANE
T
SQL *
plus

None of
the above. B
all of the
above
D

MAN

WAN

GAN

None of
the above. B

Transfer
control
protocol/In
ternet
protocol

Transfer
communic
ation
protocol/In
ternet
protocol

Cells

Bits
Software
System
Mail
modulatio transmissi
n transfer on
protocol
protocol
Transmiss
Transfer ion
Protocol protocol

Transmiss
ion control
protocol/In
ternet
None of
protocol
the above. C

Packets

None of
the above. C

Simple
Mail
transfer
protocol

None of
the above. C

None of
Hyper text the above. C

Asynchron
Aggregate ous
Area
transfer
transfer
transfer
mode
mode
mode

None of
the above. B

Printer
File server server
Receiver
configurati
platform on
package

None of
the above. B

MAN and
WAN
ISDN
Internal
Services
Digital
Network

LAN and
MAN
Internet
Integrated
Services
Digital
Network

LAN WAN
and MAN B
Intranet
A

Routers
batch

Protocol
command
numerous
alpha beta alpha

Repeaters B
program D
number
and alpha A

cost,
performan size,
ce their
performan
ratio
ce, cost

input,
output,
performan
ce ratios C

Web
based
Training
Bridges
procedure
alpha
numeric
space
occupied,
price, no.
of users
allowed

LAN and
WAN
ATM
Internal
Services
Design
Network
Web
based
Technolog
y

system

None of
the above. C
Web
Web
based
based
Transactio
Transport n
A

mini
microproc
computers essors
PCs

mainfram
es
D

input
output
feed
write
A
multiproce multithrea multiplexi multitaski
ssing
ding
ng
ng
D
interpreter compiler converter process
input
processor ram
output
nonimpact
impact
drum
desktop
thermal
printers
printers
printers
printers

operating
system,
bootstrap,
kernel,
shell

control
program,
interpreter
,
assembler
, compiler

monitor,
program,
keyboard,
bus

CPU,
memory,
input,
output

D
D

operating applicatio windows


system
n software 95
batch

protocols

processor compiler
compiler

interpreter B
procedure
software's s
C
assembler coder

interpreter assembler processor C

Q_desc

AC64

In an accounting information system, which of the following types of computer files most likely
would be a master file?

AC65
BC 113

Which of the following is an advantage of a computer-based system for transaction processing


over a manual system? A computer-based system:
Which of the following is not the component of a CPU

BC 114

A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The
following is an information not found in the trailer label

BC 114

Hard copy is a term used to describe...?

BC 115

What do the abbreviations VAB stand for

BC 116
BC 116

What control would prevent the accidental erasure of customer information from a magnetic tape
What are the individual dots which make up a picture on the monitor screen called?

BC 117

Header label normally include all the following except the

BC 117

A daisy wheel is a type of...?

BC 118

Which approach or technique is a control usually associated with microcomputers

BC 118

An impact printer creates characters by using...?

BC 119
BC 119
BC 12

The best security control in a microcomputer environment is to


What would you NOT use with a flatbed plotter?
What do you need for an ink jet printer?

BC 120
BC 120

The greatest control exposure in a microcomputer environment is the lack of


What do you need for an ink jet printer?

BC 121

A laser printer does NOT use?

BC 122

The amount of data that a disk may contain is known as the disks...?

BC 123
BC 124

You can ________ protect a floppy disk.


Information on a hard disk is usually backed-up using a...?

BC 125
BC 126

Magnetic tape is a...?


Hard disks can have a storage capacity in the region of...?

BC 128

Which storage device has the largest capacity in Mb?

BC 129

Which storage device cannot be erased?

BC 13

You can ________ protect a floppy disk

BC 130

Where should floppy disks be stored?

BC 133
BC 134
BC 135
BC 136
BC 137
BC 138

The contents of these chips are lost when the computer is switched off?
What are responsible for storing permanent data and instructions?
Which parts of the computer perform arithmetic calculations?
What are small high speed memory units used for storing temporary results?
How many bits of information can each memory cell in a computer chip hold?
What type of computer chips are said to be volatile?

BC 14

Magnetic tape is a...?

BC 14

Software can be divided into two areas:

BC 140

Travel agents use this computer system when reserving flights

BC 141

Which computers are used in the weather forecasting industry?

BC 142

Vacuum tube based electronic computers are...?

BC 143

Which generation of computer was developed from microchips?

BC 144

Which generation of computer uses more than one microprocessor?

BC 145

Which generation of computer developed using integrated circuits?

BC 146

Which generation of computer developed using solid state components?

BC 147

Name three steps involved in developing an information system

BC 148

How do you define analysis of an information system?

BC 149

What areas need to be considered in the SOFTWARE design process?

BC 15

What is the function of systems software?

BC 15

Formatting a disk results in all the data being...?

BC 151

What is Direct Implementation?

BC 152

What is parallel running?

BC 153

What documents are produced during the development of a system?

BC 154

What are User Guides are used for?

BC 16

Systems software can be categorised into:

BC 16

Which storage device cannot be erased?

BC 17
BC 17

Application software are programs that are written


Which bus carries information between processors and peripherals?

BC 170
BC 18

Convert the decimal number 2989 to Hexadecimal


Which bus controls the sequencing of read/write operations?

BC 183

What are utilities?

BC 184

Numbers are stored and transmitted inside a computer in

BC 185
BC 186

The original ASCII codes


A Nibble corresponds to

BC 187

A gigabyte represents

BC 188

A 32-bit processor has

BC 189
BC 19
BC 190

A parity bit is
he contents of these chips are lost when the computer is switched off?
Clock speed is measured in

BC 191

Cache memory enhances

BC 192
BC 20

CISC machines
Which parts of the computer perform arithmetic calculations?

BC 200

Every data from the primary memory will be erased if

BC 201

An RS-232 interface is

BC 202

For print quality you would expect best results from

BC 203

ROM

BC 204

A UPS

BC 206

smart card

BC 207

Laptop computers use

BC 208

Multiprogramming refers to

BC 209
BC 21
BC 21

Multitasking refers to
What are small high speed memory units used for storing temporary results?
A good way to exchange information that changes rapidly is through

BC 210

Multiprogramming is a prerequisite for

BC 211

Timesharing is the same as

BC 212

Virtual memory is

BC 213

Multiprocessing is

BC 22

To help keep sensitive computer-based information confidential, the user should

BC 22

What is the function of a disk drive?

BC 228
BC 229

A 4GL is
A nanosecond is

BC 23

What small, hand-held device is used to move the cursor to a specific location on the screen?

BC 230

The memory address register is used to store

BC 231

The memory data register is used to store

BC 232
BC 24

The instruction register stores


Which of the following is used to indicate the location on the computer monitor?

BC 26

A mathematical procedure that can be explicitly coded in a set of computer language instructions
that manipulate data.
Which of the following translates a program written in high-level language into machine language
for execution?

BC 27

Detecting errors in real memory is a function of

BC 28
BC 28

To find where a file has been saved on disk, the user should
A series of instructions telling the computer how to process data or files is defined as a

BC 29

To ensure that data is not lost if a computer system fails, the user should

BC 29

Having a single CPU alternatively process tasks entered from multiple terminals is called
The place in the CPU where the data and programs are temporarily stored during processing is
called the

BC 25

BC 30
BC 31
BC 32
BC 32

All are examples of computer software except


Computer manufactures are now installing software programs permanently inside the computer.
It is known as
Which of the following file organisation forms most efficiently allows access to a record

BC 33

The part of the computer system controlling data manipulation is called the

BC 34

For direct access storage devices the recording area is divided into

BC 35

The data hierarchy from the largest to the smallest is

BC 36

Which of the following hardware or software system controls provides a detailed record of all
activities performed by a computer system

BC 37

BC 37
BC 38

Which one of the following parts of a computer is necessary to enable it to play music?
An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15
minutes of sound and 1 minute of video. Which of the four different media listed takes up most
space on the CD-ROM?
Which one of the following printers is suitable for printing sprocket fed carbon copies?

BC 38

Multimedia software can be most productively used for

BC 39
BC 40

To be effective a virus checker should be


Which one of the following software applications would be the MOST appropriate for performing
numerical and statistical calculations?

BC 41

Passwords enable users to

BC 42

12. How many bytes do 4 Kilobytes represent?

BC 43
BC 44

Back up of the data files will help to prevent


Which one of the following is the MOST common internet protocol?

BC 45

The advantage of a PC network is that

BC 46

The term A:\ refers to

BC 47

UPS stands for

BC 48

The main problem associated with uninstalling software is that

BC 48

You are conducting research for a Income Tax assignment. The raw facts you collect are called

BC 484

A flow chart is the

BC 485

A voucher entry in Tally is done for

BC 49

Passwords are applied to files in order to

BC 491
BC 492

Each of the following is an enabler of IT-business alignment except:


The basic systems model is used to describe virtually all information systems and it consists of
the following elements:

BC 494

What is a computer-aided design system?

BC 499

A(n) __________ offers a solution package for an entire industry.

BC 50

File extensions are used in order to

BC 506

Information systems controls include all of the following EXCEPT:

BC 51

Hashing for disk files is called

BC 52
BC 53

Components of expert systems include: a) inference engine; b) user interface; c) knowledge


base; d) fuzzy logic

BC 53

Black box testing and white box testing are part of:
What is the term used to describe the point of interaction between a computer and any other
entity, such as a printer or human operator?

BC 54

The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility

BC 54

Which of the following is an acceptable way to shut down the computer?

BC 555

Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best way to locate the files?
Components of an information system model are: a) applications architecture; b) functional
architecture; c) technology architecture; d) information architecture

BC 56

Benchmarks form part of:

BC 57

Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run totals

BC 58

Which is not part of help desk documentation:

BC 59

Testing of individual modules is known as:


Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface
architecture; d) presentation architecture

BC 55

BC 60
BC 60
BC 60
BC 61

Which is part of installation testing:


The computer operating system performs scheduling, resource allocation, and data retrieval
functions based on a set of instructions provided by the:
Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio

BC 61

Which of the following procedures should be included in the disaster recovery plan for an
Information Technology department?

BC 62

Designing relationships among components is part of:

BC 63
BC 64
BC 65

Several Computers connected together is called:


Which network topology uses a Hub?
Which of the following topologies is used for Ethernet?

BC 66

Application software are programs


Which type of file search method requires a computer first read all locations preceding the
desired one

BC 67

BC 67

Which of the following areas of responsibility are normally assigned to a systems programmer in
a computer system environment?

BC 68

Which of the following is recommended when many searches for data are required

BC 69

It is unlikely that a magnetic tape containing several thousand blocked records can be used on
two machines of different architecture directly because

BC 70
BC 71

BC 72
BC 73

BC 74
BC 75
BC 76

Which component of the CPU has the most influence on its cost versus performance
Which of the following terms applies to network used to connect computers with other
computers, peripherals and workstations that are in fairly close proximity

Intelligent terminals differ from dumb terminals in that they


A computer is to be linked to 8 terminals using a single communication link. To permit
simultaneous terminal operations, communication path will require which of the following

A modem is a device that


A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives and
printers. This type of network is called a

BC 77

A computer based system for sending, forwarding, receiving and storing messages is called an
If a workstation contains a processor, monitor, screen manipulation device, printer, storage and
communication capabilities, it is said to be

BC 78

Terminal hardware controls include

BC 79

RS-232 is a

BC 79

What is a compiler?

BC 80
BC 80

What are the stages in the compilation process?


Which of the following is not a data transmission coding scheme

BC 81

What is the definition of an interpreter?

BC 81

A device used in data communications to divide a transmission signal into several sub-bands is
known as a

BC 82

Third generation languages such as COBOL, C, and FORTRAN are referred to as

BC 82

Serial Communication is used over long distance because it

BC 83

In what areas is the COBOL programming language used?

BC 83

The primary function of a front-end processor is to

BC 84

What is the first stage in program development?

BC 84

Which of the following is not used for data transmission within a local area network

BC 85

What is System Analysis?

BC 85

A device to device hardware communication link is called

BC 86
BC 86

What will a good software provider consider?


The topology of a network can be each of the following except

BC 87

What is the 8-bit binary value of the decimal number 85?

BC 87

Which is the most common data transmission error checking method

BC 88

What is the decimal value of the binary number 1111?

BC 88

Which of the following devices merges communication signals onto a single line

BC 89

What is the decimal value of the octal number 215?

BC 89

Which tool is used to help an organization build and use business intelligence?

BC 9

Cache memory enhances

BC 90

What is the decimal value of the hexadecimal number FF?

BC 90

Numbers are stored and transmitted inside a computer in

BC 91
BC 91

What is the hexadecimal value of the decimal number 1476?


A byte corresponds to

BC 92
BC 92

What does EBCDIC coding of numbers mean?


A Kb corresponds to

BC 93

What is the binary sum of 01011 and 00101?

BC 93

Information is stored and transmitted inside a computer in

BC 94

Where would you find the letters QWERTY?

BC 94

A parity bit is

BC 95
BC 95

How did the computer mouse get its name?


Clock speed is measured in

BC 96
BC 96

What are you most likely to use when playing a computer game?
CPU performance may be measured in

BC 97

A digitising tablet can be used for?

BC 97

In processing cheques which of the following I/O techniques have banks traditionally used

BC 98

Which of the following is a pointing device used for computer input?

BC 98

A UPS

BC 99
BC 99
BC01

What does a light pen contain?


The capacity of a 3.5 floppy is around
What general term describes the physical equipment of a computer system, such as its video
screen, keyboard, and storage devices?

BC02
BC03

Where would you find the letters QUERTY?


What are you most likely to use when playing a computer game?

BC04
BC05

A digitising tablet can be used for?


Which of the following is a pointing device used for computer input?

BC06
BC07

What input device could tell you the price of a product


Where would you find a magnetic strip?

BC08
BC09

Hard copy is a term used to describe...?


What are the individual dots which make up a picture on the monitor screen Called

BC10

A daisy wheel is a type of...?

BC100

What input device can be used for marking a multiple-choice test?

BC100

Laptop computers use

BC101

QWERTY is used with reference to

BC101

What input device could tell you the price of a bar of chocolate?

BC102

A GUI is

BC102

Where would you find a magnetic strip?

BC103

Multiprogramming refers to

BC104

Multitasking refers to

BC105

Multiprogramming is a prerequisite for

BC105

UNIVAC Computer belongs to the

BC106
BC106

Timesharing is the same as


Name the first Indian Super Computer?

BC107

Disk fragmentation

BC107

The technology which is used to check answer sheets of multiple-choice questions in civil
services or similar examinations is: -

BC108

A compiler is

BC108

Which printer among the following is fastest

BC109

Zipping a file means

BC109

What does acronym VIRUS stands for

BC11

An impact printer creates characters by using...?

BC110
BC111

A client-server system is based on


A nanosecond is

BC112

The memory address register is used to store

BC113
BC115
BS 319

Inefficient usage of excess computer equipment can be controlled by


A procedural control used to minimize the possibility of data or program file destruction through
operator error is the use of
A predefined computational task is referred to as a(n):

CA 486

Which of the following is not the feature of GAPs

CA 487

Which is the example of CAATs

CA 488

In audit procedures, test data is

CA 489

Which of the following is not the use of CAATs

CA 490
DB 01
DB 02

Which of the following are called explicitly by another procedure?


What term applies to a collection of related records in a database?
All of the following terms are related to computerized databases except which one?

DB 03

What is a database?

DB 04

What does a record contain?

DB 05

An RDBMS is a

DB 06

Data Warehousing refers to

DB 07

Unauthorised alteration of on-line records can be prevented by employing

DB 10

What is a database?

DB 11

What does a record contain?

DB 12

What is a report?

DB 13

What is the best way to analyse and change data

DB 18

What are some popular office orientated software applications?

DB 19

Which of the following constraints can be used to enforce the uniqueness of rows in a table?

DB 20

Which of the following commands is used to change the structure of table?

DB 226

An RDBMS is a

DB 227

Data Warehousing refers to


You are creating a client application that calls ActiveX DLLs. Which of the following properties of
the Err object provides the name of a component that sends an error back to the client
application?

DB 235

DB 24
DB 26
DB 27
DB 30
DB 365

This database holds personal information. The user can help to keep it confidential by
If the database holds customer names and addresses, personalised letters can be created
automatically using
Application software suited to storing the survey information obtained in the table would be
The characters * and ? are sometimes used in search criteria as
Which of the following field types will generate the primary key automatically?

DB 366

Referential integrity ensures that the:

DB 367

Tables are related to one another through a:

DB 368

DB 370

A foreign key is:


You are creating a banking database to track customer loans. The bank will, of course, have
many customers, each of whom may take out one or more loans, while each loan may be
associated with only one customer (there are no joint accounts). What is the re
In a one-to-many relationship between Companies and Employees, which field is found in both
tables?

DB 371

Which of the following ensures that records in related tables are consistent with one another?
For example, it ensures that you cannot add a record with an invalid foreign key.

DB 372

How would you delete a relationship between tables in the Relationships window?

DB 369

DB 373

In a Customers tables, what does a plus sign next to the CustomerID field mean?

DB 374

What is required of the fields that join two tables?

DB 375

Assume a one-to-many relationship between the Customers table and the Loans table, with
referential integrity in effect. What happens when you attempt to delete a customer ID from the
Customer table that still has entries in the Loans table?

DB 376

Which of the following is true when viewing a main form and its associated subform in the Form
Design view?

DB 378

Which of the following relationships does not belong in a database based on a professional
sports league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the many side of a
one-to-many relationship?

DB 379

You have created a one-to-many relationship with referential integrity between a Customers table
and a Loans table. From which table can you delete a record?

DB 380

The correct order of the arguments for the MsgBox statement is:

DB 381

The first statement in a procedure named CreateList is:

DB 377

DB 393

Which of the following is TRUE related to form fields?

DB 394

A text field:

DB 401
DB 402
DB 403

The purpose of a database is to:


A database stores:
A database records:

DB 404

A sales contact manager used by a salesperson is an example of _______________

DB 405

A Customer Resource Management (CRM) system is an example of_________

DB 407

The industry standard supported by all major DBMSs that allows tables to be joined together is
called __________.

DB 408
DB 409

A program whose job is to create, process and administer databases is called the _____
Microsoft Access may use which of the following DBMS engines?

DB 410

Which of the following are basic components of an enterprise-class database system?

DB 411

In an enterprise-class database system ________ .

DB 412

In an enterprise-class database system, the database application ___ .

DB 413

In an enterprise-class database system, reports are created by ____________________ .

DB 414

A database is considered "self-describing" because _______ .

DB 415

In an enterprise-class database system, the database _________ .

DB 416

A database may contain _________________________ .

DB 417

A database designed using spreadsheets from the Sales department is a database being
designed _________________________ .

DB 418

A database designed to implement requirements for a reporting application needed by the Sales
department is a database being designed _______ .

DB 419

A database designed to combine two databases used by the Sales department is a database
being designed _________________________ .

DB 420

Database professionals use ________________ as specific data sources for studies and
analyses.

DB 421

Database professionals use a set of principles called ________________ to guide and assess
database design.

DB 422

A very popular development technique used by database professionals for database design is
known as _______________________ .

DB 423

A very popular development technique used by database professionals to adopt a database


design to new or changing requirement is known as _____ .

DB 424

The predecessor(s) of database processing was (were) __________ .

DB 425
DB 426
DB 427

In a relation __________________________ .
An attribute is also known as a(n)
.
A combination of one or more columns used to identify particular rows in a is___ .

DB 428
DB 429
DB 430

A combination of two or more columns used to identify particular rows in a relation is________ .
A determinant that determines all the other columns in a relation is______ .
When designing a database, one of the candidate keys in a relation is selected as the
_________ .

DB 431

Normalization is a process used to deal with which of the following modification anomalies?

DB 432

When you are given a set of tables and asked to create a database to store their data, the first
step is to ____ .

DB 433

Modern microcomputer personal DBMS products______.

DB 434

DB 436

Which of the following are true about data mining applications?


We have obtained access to the company's operational data. We examine 50 records for
customers with phone numbers that should use the current area code of 345. Of these 50
records, we find 10 that still use an older area code of 567. This is an example
We have obtained access to the company's operational data. We have been asked to produce a
report with an item by item analysis of sales, but the only sales figure available is the total sale
value for each order. This is example of_____

DB 437
DB 463

A data warehouse database differs from an operational database because:


Which of the following objects is used to display a menu?

DB 464

Which of the following objects are NOT found in an Access application?

DB 465

You are developing an Access application that you expect to upgrade periodically. Which of the
following statements is TRUE?

DB 435

DB 466
DB 467

Which of the following statements regarding Access applications is NOT true?


Which of the following brings a copy of the table into the current database and does not maintain
a tie to the original table?

DB 469

What makes a database an application?

DB 470

What is the Access tool that is used to create the user interface?

DB 503

The purpose of a data warehouse is to:

DS 279

____________ is the art of protecting information by transforming it into an unreadable format.

DS 59

Which of the following activities would most likely detect computer-related fraud?

DS 62

A digital signature is used primarily to determine that a message is:

DS 63

What is a major disadvantage to using a private key to encrypt data?

DS 66

Which of the following risks can be minimized by requiring all employees accessing the
information system to use passwords?

EC 103

The most beneficial advantage of ERP system is

EC 301

What is the term that describes spying on ones business rivals to gain a competitive advantage?

EC 302

What would you NOT be looking for when spying on a competitor?

EC 406

An online drugstore such as Drugstore.com is an example of_______

EC 51

Which of the following is an example of unacceptable online netiquette?

EC 58

Which of the following statements is correct concerning the security of messages in an electronic
data interchange (EDI) system?

EX 10

On an Excel sheet the active cell is indicated by


Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of
cells A6, A7, and A8 are _____.

EX 11

If a cell shows ####### , it means that _____.

EX 12

EX 13
EX 14

Which is not an advantage of using computerized spreadsheets?


The gym teacher has a new program to calculate physical fitness in terms of weight and
exercise. The use inputs different weights or amounts of exercise to determine the related
physical fitness. This "What if" program is most likely which of the followin
The difference between the highest and the lowest values.

EX 15

Spreadsheets can be used for...

EX 2

To select a column the easiest method is to

EX 3
EX 320
EX 321

If you press _____, the cell accepts your typing as its contents.
The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as
All of the following are considered constants EXCEPT:

EX 322
EX 323

Which of the following may NOT be included in a formula?


Which of the following is NOT a valid mathematical operator in Excel?

EX 324

Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first?

EX 325

Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?

EX 326

How can you tell which cell in a worksheet is the active cell?

EX 1

EX 327

How can you change the active cell?

EX 328

Which of the following would you use to change the font size of a cell in Excel?

EX 330
EX 331
EX 332

The command that will save the current workbook with a different file type is:
The command that will print an Excel workbook is found on the ____________ menu.
In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the
date and time a file was last modified.

EX 333

Which of the following commands will automatically adjust cell references in formulas?

EX 334

Which of the following commands will remove cells, rows, or columns from a worksheet?

EX 335
EX 336
EX 337
EX 338

Which of the following options is NOT controlled through the Page Setup command?
Which command enables you to change the margins for a printed worksheet?
All commands are carried out on a rectangular groups of cells known as a:
Which of the following is a valid cell range?

EX 339

In a copy operation, the cell(s) you are copying from is called the:

EX 340

In a copy operation, the cell(s) you are copying to is called the:

EX 341
EX 342
EX 343

EX 345

Which of the following commands is needed to duplicate the contents of a cell in another?
A cell reference that does not change during a copy operation is known as
Which of the following is considered an absolute cell reference?
Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4,
what will be the contents of cell E4?
Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to
cell E4, what will be the contents of cell E4?

EX 346

Which of the following commands is needed to transfer the contents of one cell range to
another?

EX 347

The F4 key is used to:

EX 344

EX 352

Which of the following quickly copies the formatting of a selected cell to other cells?

EX 353

Which of the following will insert a hyperlink into an Excel worksheet?

EX 354

Conditional formatting applies formatting to a cell based on:

EX 358

If you enter a date into a cell, Excel stores the date as:

EX 361

You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened
that worksheet again on August 31. What will be displayed in cell E17 on August 31?

EX 362
EX 363

The number of days between two cells containing dates can be calculated by:
The function key that is used to quickly edit the contents of a cell is:

EX 364

What will be stored in a cell if 3/4 is entered in it?

EX 384

A users response to the InputBox function can be stored in:


The cell reference for a range of cells that starts in cell B1 and goes over to column G and down
to row 10 is _____.
The teacher has a spreadsheet showing all Year 10 students and their marks in one
Mathematics test. To find the student with the highest mark, which of the following functions
should be used?
Which chart type best shows proportions of a whole?

EX 4

EX 42
EX 43

EX 462
EX 5

Which of the following is TRUE regarding chart types?


To select several cells or ranges that are not touching each other, you would _____ while
selecting.

EX 57

Your Institute teachers have set an assignment on Studies. You are required to use a
spreadsheet to record all that you study on each day for four weeks. You decide to show each
weeks data with an accompanying graph. What is the best way of doing this
What would be the best method to quickly copy the formula from the active cell to each cell
below it?

EX 6

To arrange rows in alphabetical order based on column A, you need to use the command _____.

EX 6

What can you NOT do with a spreadsheet?

EX 7

To print just part of a sheet, you would select what you want to print and _____ .

EX 7
EX 8

Spreadsheets can be used for...


The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in
B2 is _____.

EX 8

Which of the functions is not valid for performing addition

EX 9

The default orientation for the printed page is _____.

EX9.

Which is not a valid cell address?

IN 01

IN 05

Which of the following best describes uploading information?


A characteristic of a communication channel that is the amount of information that can be
passed through it in a given amount of time, expressed in bits per second.
The act of searching through storage to locate information without necessarily knowing of the
existence of the information being sought.
The principles, means and methods for rendering information unintelligible and for restoring
encrypted information to intelligible form.
A long string of seemingly random bits used with cryptographic algorithms to create or verify
digital signatures and encrypt an decrypt messages and conversations.

IN 06

Protected/private character string used to authenticate an identity or to authorize access to data.

IN 07

The successful act of bypassing security mechanisms of the system.

IN 08

A set of rules and formats, semantic and syntactic, that permits entities to exchange information.

IN 09
IN 10
IN 104

An attempt to get access to a system by posing to be an authorised person.


An action or event that might prejudice security.
According to information Technology Act, 2000, To investigate contraventions the controller of
certifying authority shall exercise the like powers to that of

IN 11

Malicious software.

EX 52

IN 02
IN 03
IN 04

IN 110
IN 111

None the person who is known as father of Internet


This website is the biggest bookstore on the earth.

IN 112

When we talk of Data Transmission modes, then ATM stands for

IN 12
IN 13

A sequence of bits or characters that identifies the destination and the source of a transmission.
The means of communicating between networks

IN 14

A group of computers and other devices dispersed over a relatively limited area and connected
by communication links that enable a device to interact with any other on the network.

IN 15

The term HTTP stands for

IN 155

A NIC is considered as

IN 156

A hub is a device that can connect

IN 157

Which of the following is true concerning the function of a switch?

IN 158

What do routers connect?

IN 159
IN 16
IN 160

What does a router route?


Software which prevents external access to a system is termed
If four computers are connected to a hub and then to the internet, how many IP addresses are
required for these 5 devices?

IN 161

Which of the following in an OSI layer

IN 162

When creating a network from just two PCs, what kind of cable would be used to connect them?

IN 163

An IP address is a

IN 164

To construct a simple LAN of 4 computers, you would connect them with ______connect them

IN 165

What happens to data that is ruined before reaching to receiver

IN 166

Bluetooth is

IN 167

Which is not one of the recognized IEEE sub layers?

IN 168

The most preferred number system to represent a IP address is

IN 169

A MAC address is of

IN 17

Protocol is

IN 172

A ............... is a LAN-based computer with software that acts as a controlling device for
controlling access to at least part, if not all, of a local area network and its available resources.

IN 173
IN 174
IN 175
IN 176
IN 177
IN 178
IN 179
IN 18

What is the biggest disadvantage of the Ring topology?


The .............. of the network concerns how network devices are physically (or optically)
interconnected.
The principal topologies used with LANs are:
What are the various types of bus architecture?
What are the various types of ring architecture?
In a ................., each workstation attaches to a common backplane via its own physical cable
that terminates at the hub

IN 180

In a ............... , each work station is directly connected to a common communications channel


Which one of the following is NOT a network topology?
In a .............. , the cable system forms a loop with workstations attached at various intervals
around the loop

IN 181

The Media Access Control (MAC) is a sub layer of the:

IN 182
IN 194
IN 195

What are the most common LAN technologies used in networking today?
Modem speeds are measured in
LAN speeds are measured in

IN 196
IN 197

WAN speeds are


Accessing the Internet from a typical home PC requires the use of

IN 198

To use the Internet, you

IN 20

The worldwide web server uses the following standard interface to act as the middleware:

IN 205

An NIC

IN 21

Accessing the Internet from a typical home PC requires the use of

IN 214

The most widely used network operating system on PC LANs is

IN 218

JPEG and MPEG

IN 22

To use the Internet you

IN 220

A multiplexer is a form of

IN 221

An ISP

IN 222

FTP is

IN 223

Telnet

IN 224

A firewall is

IN 225

A proxy server is

IN 23
IN 23

A search engine is
To look for information about interest areas on the internet, the user should use a

IN 24

An ISP

IN 25

FTP is

IN 26

Telnet

IN 267

Which of the following is a true statement about the OSI model layers?

IN 268
IN 269

Which of the following is NOT true about the Internet?


The traditional intent and impact of this common type of attack is to prevent or impair the
legitimate use of network resources.

IN 27

A firewall is

IN 270
IN 272
IN 273

Which of the following is NOT an example of a DoS attack that is popular among hackers?
A ____________ attack is when a hacker sends a continuous flow of packets to a system.
One defense option on a large network is to configure a ____________ to disallow any external
traffic.

IN 28

A proxy server is

IN 285

Which of the following would be performed on a network server and not normally on individual
workstations?

IN 288

What can be said about the safety of the Internet?

IN 29

To secure communication network against wire-tapping the most effective control is

IN 290

One way that a virus CANNOT spread throughout a network is:

IN 297
IN 298

IN 30

Which of the following is NOT a means of monitoring employee use of company technology?
____________ would be used by parents to monitor their children on their home system.
The formal rules and parameters which are established to permit a microcomputer to
communicate with the mainframe computer as though it was a terminal of the mainframe are
called

IN 304

The two most common tools used to help with extracting information are:

IN 306

Which of the following would NOT be considered an example of cyber terrorism?

IN 307

Which of the following would be a form of cyber terrorism?

IN 308

Which of the following is a likely target of a cyber terrorist that would cause considerable loss of
life?

IN 31

An organisation is upgrading its telecommunication lines. Which is the least important objective
while upgradation

IN 31

A company posts a price list of its products on its website. The advantage to the customer is that
the company can

IN 310

Which of the following is an easy-to-use service to get information on someone?

IN 312
IN 313

Which of the following pieces of information would NOT be found online?


Which of the following is the most common danger on the Internet?

IN 314
IN 315

The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain
sensitive information is called _________________.

IN 316
IN 317

Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called:
Setting your privacy settings in Internet Explorer to medium is one way to block:

IN 318

What is the best means of protection from cyber stalking?

IN 32
IN 33
IN 33

Which of the following is not an appropriate control over telecommunications software


Encryption techniques can be implemented in Hardware-Software
Which protocol would be used to download a free anti-virus program from the Internet?

IN 34

The major advantage of the checksum program is when it

IN 348

Which of the following is a Web browser?

IN 349

A Web page is another name for -----------

IN 35

Domain names must contain a description of the type of organisation that the domain represents.
A very common abbreviation used include:

IN 350
IN 351

A standard language for creating and formatting Web documents is:


The Web page format in which all elements of a Web page are saved as one file is called:

IN 359

Which of the following requires an Internet connection?

IN 36

Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his
computer how would he do this?

IN 360

IN 45
IN 47

Which of the following is used to update a Web query?


You download from the internet, a screensaver, a ten-second sound file and a ten-second music
video clip. You also add a hyperlink. Which of the media elements has the greatest effect on the
file size?
When saving a photograph for use on a website, which format should you choose?

IN 49

While researching the Direct taxes assignment, you find a useful website. What is the most
efficient way to access the site at a later time?

IN 493
IN 50
IN 501

A system that uses the Internet for business-to-business interaction is called a(n):
A block of text automatically added to the end of an outgoing email is called
_________ refers to the use of Internet technologies for placing telephone calls.

IN 68

Most client/server applications operate on a three-tiered architecture consisting of which of the


following layers?

IN 69

Which do you NOT need to connect to the Internet?

IN 70

What does FTP stand for?

IN 71

What is the purpose of DNS?

IN 72.

Which of the following is NOT a properly formatted IP address?

IN 73.

Which of the following is a properly formatted email address?

IN 74.

The Internet is controlled by whom?

IN 75.

What does IRC stand for?

IN 76

If you do not pick up your email for a week...?

IN 77

What does HTML stand for?

IN 78

What is a disadvantage of joining a mailing list?

OS 01

Which of the following computer software is designed to direct and assist the execution of
application programs

OS 127
OS 131
OS 132

Formatting a disk results in all the data being...?


Which bus carries information between processors and peripherals?
Which bus controls the sequencing of read/write operations?

OS 139
OS 193

Which computers use single chip processors?


CPU performance may be measured in

OS 199

In processing cheques which of the following I/O techniques have banks traditionally used

OS 215

Disk fragmentation

OS 216

A compiler is

OS 217

An interpreter is

OS 219

Zipping a file means

OS 233

An assembly language program is translated to machine code by

OS 234

Which of the following is not part of the processor

OS 236

If the Cancel Error Property of the CommonDialog Box is set to true then which of the following
statement is true:

OS 238

OS 276
OS 277

__________ control defaults to displaying the files in the current directory:


A ____________ occurs any time a program writes more information into the temporary space it
has allocated in the memory.
Assessing a system requires certain common tools. Which of the following is NOT a tool used to
assess a system?
The ____________________ Web site has a utility that will tell you what software and operating
system a Web server is running.
When software vendors discover flaws in their software, they usually will write corrections to their
code, known as:
All ____________ have the option of blocking ports.

OS 278

Which of the following is NOT a characteristic of a firewall?

OS 280

Before shutting a service on an individual machine, which of the following would you always
check?

OS 281

At a minimum, which of the following should be implemented under the protection phase?

OS 282
OS 283

Attacks on your system may be prevented or trapped through the use of:
Setting restrictions as to the number of unique passwords to use before a user can recycle them
is called a password:

OS 284

Which of the following is NOT a step to take in securing a workstation?

OS 286

To prevent a hacker from unauthorized access, what should you do with the administrator
account?

OS 287
OS 289

What should be done with old backup tapes and CDs?


Which of the following is NOT an example of malware?

OS 291

One step you can take to reduce the risk of being infected by a virus is to:

OS 271
OS 274
OS 275

OS 292

Which of the following is NOT a sign that a virus has infected your system?

OS 293
OS 294
OS 295

Which of the following is the safest way to protect yourself from e-mail viruses?
A ____________ attack causes too much information to be placed into temporary memory
space.
____________ gathers user information with the users knowledge.

OS 296

Which of the following is the most common function of spyware?

OS 299

Which of the following is NOT a virus-scanning technique?

OS 300

Which of the following would NOT be a way to protect your system from spyware?

OS 309

For which of the following positions would it be advisable to conduct an extensive background
check?

OS 329
OS 355

Which of the following would you use to open an existing file?


The ability to have multiple applications open at the same time is known as:

OS 356
OS 357

Which of the following can be changed using the Options command?


Which of the following leaves an application open but shrinks the window to a button on the
Windows taskbar?

OS 396

Which of the following actions would move a floating toolbar to dock it in a different place?

OS 397

To display a missing or needed toolbar, click the:

OS 399

Which of the following is NOT a true statement regarding password protection?

OS 495

The Linux operating systems is an example of:

OS 496

The Windows operating systems is:

OS 497

Application service providers offer:

OS 498

A(n) _________ offers on-demand software on an as-needed basis to its clients over the web.

OS 502

_________ are systems used to interact with customers and run a business in real time.

OS 504
OS 505
OS239

The most common cause(s) of disaster is (are):


A _______ backup site is backup facility consisting of an empty warehouse with all necessary
connections for power and communication, but nothing else.
To destroy an object and free the memory space occupied by it, the keyword used is:

PP 44

An example of the components of a multimedia presentation could include

PP 442

Which of the following formatting elements can be applied to a PowerPoint diagram using the
AutoFormat tool?

PP 443

Which of the following formatting elements can be applied to a PowerPoint diagram using the
Format AutoShape command?

PP 444

What happens when you double click a blank graph placeholder in a PowerPoint presentation?

PP 445
PP 446

The legend in a Microsoft Graph chart is:


Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the
best chart type if you want to emphasize the total sales of each region?

PP 447

Which of the following actions will enable you to insert a graph into a PowerPoint presentation?

PP 448
PP 449

If you are editing a slide containing a Microsoft Graph, how do you display the underlying
datasheet?
How do you deselect a chart that has been placed onto a PowerPoint slide after you have
finished creating the chart?

PP 450

What happens when you click the Datasheet button on the Microsoft Graph toolbar?

PP 451

What happens if you single click a chart that is not currently active?

PP 452

What happens if you double click a chart that is not currently active?

PP 453

Using custom animation effects, you can build:

PP 454

Which of the following animation effects can be added to a slide?

PP 455
PP 456

Which of the following animations effects can be added to a slide?


Which keyboard key is used to select more than one picture on a slide?

PP 457

Custom animation can be used to affect ONLY:

PP 458

Which of the following best describes the information that appears on the advanced timeline?

PP 459
PP 46

Which of the following objects can contain custom animation effects?


What type of program allows an object within an image to be edited without affecting other
objects?

PP 460

Which of the following animation effects can be added to a slide?

PP 461
PP 500

Which of the following is TRUE regarding the Datasheet?


Graphical software tools that provide complex analysis of stored data are:

PP438
PP439

Which of the following statements is TRUE regarding PowerPoint diagrams?


Which keyboard key combination is used to undo the previous command(s)?

VB 237
VB 240

What is the extension of the Visual Basic project file that stores the design of a user control.
Which event of a text box would you use for validating the data entered by the user?

VB 241
VB 242

Which of the following statements forces inline error handling?


The _______ method resets the contents of bound controls to their original values when the user
clicks on the cancel button.

VB 243

To deactivate the Form UnLoad event, you make the following change in the function definiton:

VB 243

To deactivate the Form UnLoad event, you make the following change in the function
definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To prevent the
Form from closing, you will set the:

VB 244

How many root nodes can a TreeView control have?

VB 245

A project group is a Project which:

VB 246

Procedures declared in a _____ are local whereas procedures declared in a ______ are
available to the whole application.

VB 247
VB 248

How can you keep the user from exiting a form by clicking the Close button?
The _______ property enables Visual Basic to draw complete images in memory before
displaying them on the Screen.

VB 249

You want to display the code and the description of an error. What would be the correct syntax?

VB 250
VB 251
VB 252

What is the purpose of the Image List Control?


Which method would you use to get a free or unused File identifier while opening any file:
Which property procedure is used to retrieve the value of a property?

VB 253
VB 255

Which of the following can be shown to the user using the Common Dialog control in VB?
Which of the following are not properties of Command Button:

VB 256
VB 257

Which events enable you to determine which key was pressed by the user?
In order to access a file in Non-textual format, you have to open file in:

VB 262

Visual Basic displays information depending upon the current value of two properties of the form,
called:
Which of the following procedure types will execute when you assign a value to a property of an
object?
In order to overlap the controls (say a command button) during design time, we use the Send To
Back or Bring To Front option from the Edit menu. To change it dynamically (i.e.during program
execution) we need to change:
Which property of the ProgressBar determines how much of the bar is filled?
The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic
program.

VB 263

The caption and the name properties of the command button:

VB 258
VB 259

VB 260
VB 261

VB 264

You try to initialize a new Object variable with the following line but receive an error. What could
be the possible cause? Set MyVar = New Classname

VB 265

Which of the following will perform a direct execution of a Command object?

VB 266

The vb Critical symbol displays:

VB 382

vbYesNo is an example of a(n):

VB 383

The primary difference between the MsgBox statement and the InputBox function is the:

WO 01

Which of the following is TRUE about a protected form (i.e., a form where the Protect Form
button on the Forms toolbar is toggled on and is assumed to remain in that position)?
Which event is triggered when the user moves to another open form?
Veena is entering a paragraph in a word processing program. When the cursor gets to the end of
a line, what is the best way to get the cursor to the next line?

WO 02

How are data organized in a spreadsheet?

WO 03

Which key moves the cursor to the beginning of the next line of text?
Veena typed the following sentence: "The girl was very beautiful." In which word processing utility
could she find a synonym for "beautiful"?

VB 395
VB254

WO 04

WO 05
WO 06
WO 07
WO 08

Using an electronic bulletin board, Seema can do all of the following except which one?
Aryan has created a ten-page story, but only wants to print the first two pages. What printer
command should he select?
What process should be used to recall a document saved previously?
Which is used to indent text within a document?

WO 09

Desktop publishing is a more sophisticated form of which of the following types of software?

WO 1
WO 10

What is a Word Processor used for?


What is a picture that is saved on a diskette and can be pasted into a document?

WO 11

What is a Word Processor used for?

WO 12

What basic tools would you find in the Edit menu of a word processor

WO 13

What is a header in a document?

WO 2
WO 25

What hardware is essential for a word?


The user could take a picture from a magazine and insert it into the document by using a

WO 3

WO 34

What basic tools would you find in the Edit


What command in a word-processing program can be used to change the word him to her,
and also the word he to she in the given phrase? On a cold and still night, the only sound that
could be heard was the owl that had ade its home in the nest outs
What edit commands would you use to insert a paragraph from one document into another
document, while still keeping the paragraph in the first document?

WO 385

Which of the following statements would NOT be a reason for showing suggested revisions in a
Word document without changing the original document?

WO 386

Which statement is NOT true regarding revisions made in a Word document?

WO 387

How are suggested changes entered for review on an initial Word document?

WO 32

WO 388

Which of the following is TRUE about saving a document using the Versions command?

WO 389

What happens when you open a document that has been saved using the Versions command?
You have used the word discover four times in an English essay you have created using a word
processing program. You would like to find another word of similar meaning to use instead of
discover. Which of the following would you use to do this?

WO 39

WO 391

When opening and working with multiple versions of a document, how can you tell which is the
most recent version?
Various fields are added to a regular document to create a special document called a form
through the ____________ toolbar.

WO 392

Which of the following types of fields CANNOT be inserted into a form?

WO 398

Which of the following is TRUE related to editing comments in a Word document?

WO 4

What is a header in a document?

WO 40
WO 400
WO 41

In your English essay you notice that the paragraph at the bottom of page 1 continues on to page
2. You would like to make this paragraph start on page 2.What would be the best way to do this?
Tables in a document help you to easily arrange all of the following EXCEPT:
To identify a document, it is helpful to include the file name on each page as a

WO 440

Which of the following tools will copy the formatting of selected text to other places?

WO 390

WO 468
WO 471

What is the name of the process of determining the cause of errors in a macro?
Drop caps are added to a Word document using the ___________ menu.

WO 472

A reverse in a newsletter is:

WO 473

A pull quote is best emphasized by:

WO 474

Which of the following definitions is CORRECT?

WO 477

Pertaining to newsletters, which of the following cannot be changed using the Columns
command dialog box?
As related to type size, how many points are there to the inch?
Assume you are working on a newsletter in which the masthead extends across the top of the
entire first page. The rest of the newsletter has two columns. What is the minimum number of
sections in the newsletter?

WO 478

Which of the following is NOT correct with respect to page, column, and section breaks?

WO 479

Which of the following would be the most appropriate font for a newsletter headline?

WO 480

Which of the following is the default Word column width?


Assume you are creating a two-column newsletter. Which type size is the most reasonable for
the text in the columns?
Given the default left and right margins, and -inch spacing between columns, the width of each
column in a two-column document will be:

WO 475
WO 476

WO 481
WO 482

WO 483

Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot
see any columns on the screen. What is the most likely cause?

WO 484

While word processing, in which of the following situations would Tom use the "Copy"
command?

WO 5
WO 56

What does a document contain?


Before submitting your work you want to find any words spelt incorrectly. Which of the following
would you use?

Op1
Inventory
subsidiary.

Op2

Cash
Cash
disbursements. receipts.

Does not require


as stringent a set
of internal
controls.
NIC Card

Will produce a
more accurate
set of financial
statements.
VSAT

Record Count

Identification
Number

Writing on a hard
board
Printed output
Voice activated Voice answer
broadcasting
back

Validity check
Coloured spots
File Name

Op3

Boundary
protection
Pixels
Identification
number

Will be more
efficient at
producing
financial
statements.
RAM
Control totals
for one or
more fields
Storing
information
on the hard
disk
Visual audio
board
File
protection
ring
Pixies

Op4
Payroll
transactions.

Ans

Eliminates the
need to reconcile
control accounts
and subsidiary
ledgers.
C
AGP Card
B

End-of-file and
end-of-reel code B

None of above

None of above

Limited access
files
None of above

C
B

Reel Number Batch Total


Pointing
Printer
Storage device device
None of above
Physical
System Logs
Security
Console Log Data Dictionary
An inked
Electrically
ribbon and
charged ink
An ink pen
print head
None of above
Use only
Restrict physical unremovable
Require user Make duplicate
access
media
passwords
copies of files
A pen
Paper
Eraser
None of above
A cartridge
A drum
A ribbon
A cassette
Centralised
Centralised
function for
Distributed
Separation of
function for PC PC
policies or
duties
acquisition
Disposition
procedures
A cartridge
A drum
A ribbon
None of above
An INK
A print head
A laser beam
RIBBON
None of above
Storage
Volume
Size
capacity
None of above
Read and
Read
Write
Write
None of above
Magnetic tape
PAN drive
Floppy disk
None of above

D
A
B

A
C
A

A
A
C
C
B
A

A parallel
Random
access
access medium medium
20 GB
700MB
Magnetic
A CD-ROM
A floppy disk
tape storage
Magnetic
A CD-ROM
A floppy disk
tape storage
Read and
Read
Write
Write
By a sunny
By magnet
window
objects
In a drawer
CDROM
ROM chips
RAM chips
chips
RAM chips
ROM chips
DRAM chips
ALU
Registers
Logic bus
CPUs
Registers
Control unit
0 bits
1 bit
8 bits
RAM chips
ROM chips
CACHE
A parallel
Serial access
Random
access
medium
access medium medium
Systems
Business
Network
software and
software and
software and
application
games
security software software
software
Personal
Mainframe
Supercomputer computer
computer
Jon Von
Notebook
Supercomputer Neumann
computers
s
computers
Second
Hoover
First generation generation
generation
Second
Fourth
generation
First generation generation
Second
Third
Fifth
generation
generation
generation
Second
Third
Fifth
generation
generation
generation
Second
Third
Fifth
generation
generation
generation
Analysis,
System
Specification,
Programming, Design, and
Design, and
Design, and
Implementati
Testing
Testing
on
Serial access
medium
1.44MB

None of above
None of above

A
B

None of above

None of above

Not

None of above

None of above
None of above
None of above
None of above
None of above
None of above

B
B
A
B
B
A

A selective
access medium

None of the
above

None of above

None of above

None of above

None of above

None of above

None of above

None of above

None of above

Analysis is the
loading of
Analysis
programs that
translates
perform
program code of routines to
a high level
control
language to
peripheral
machine code
devices

This involves
looking at a
system and
finding out
how
information is
being
handled
None of above

Inputs, outputs,
file design
Only hardware
hardware, and
and software
software
To execute any
To collect data
programs
Deleted from the Copied from
disk
the disk

Maintenance,
reliability, and
upgradeability
To maintain
security
Saved to the
disk

None of above
B
None of the
above
D
Transferred from
the disk
A

Users operate
the manual
system and
computer system
at the same time

Users
operate the
manual
system

None of above

Users
continue
operating the
old system
None of above

User Guide
and technical
Log files and
documentatio
temporary files n
None of above

Users operate
the computer
system from a
given date
The new
The new system system is
is introduced
introduced and
alongside the
users start
existing system operating it

Instructions and
technical
documentation

User guides
cover how to
To enable any run the
printer to be
system, enter
For technical
connected to
data, save,
support
the network
print, etc.
None of above
Network
Database
Operating
systems and
systems and
systems and
communication backup
None of the
system services services
services
above
Magnetic tape
storage
CD-ROM
floppy disk
Hard disk
To help
To maintain a
someone
backup copy of
who is
all the
To do a
applying for None of the
information
particular task. employment above
Data bus
Auto bus
Address bus Control Bus

A
B

B
A

FDDI
Data bus

BAD
Auto bus

TED
Address bus
Data
structures
Operating
that are part
system routines of the kernel
Peripherals that that execute in of an
are connected to supervisor
operating
a computer.
mode.
system.
ASCII code
binary form
form
decimal form
represented
256
were 7 bits
8 bits
characters
4 bits
8 bits
16 bits
More than 1000
mega bytes
1000 kilobytes 230 bytes
32 Mb of
32 registers
32 I/O devices RAM

MAD
Control Bus

used to indicate
uppercase letters
ROM
bits per second

is the last bit in a


byte
CROM
Hertz
secondary
storage access
time

is the first bit


in a byte
DRAM
bytes
secondary
memory access storage
memory capacity time
capacity
have fewer
instructions than
RISC machines
ALU

used to detect
errors
RAM
baud

B
D

Shells, compilers
and other useful
system
programs.
D
alphanumeric
form
A
represented 127
characters
A
32 bits
A
1024 bytes
a 32-bit bus or
32-bit registers

use more RAM


than RISC
have medium use variable size
machines
clock speeds instructions
Registers
Variables
Logic Bus
Data is not
Computer is
saved before
Power is
improperly shut computer is
switched off
down
shut down
All of the above
a parallel
a serial
printer
a modem
interface
interface
interface
interface
dot matrix
line printer
printer
ink-jet printer laser printer.
is faster to
stores more
access than
information
is used for
RAM
is non-volatile than RAM
cache memory
provides
increased the
backup
storage capacity
power in the
of a computer
increases the event of a
none of the
system
process speed power cut
previous
has more
is an access
storage
card for a
is a form of ATM capacity than
security
contains a
card
an ATM card
system
microprocessor

A
D

B
A
D

D
A

D
B
D

CRT displays
having several
programs in
RAM at the
same time
having several
softwares
running at the
same time
ALU
brochures

LCD displays

multitasking
the ability to
run 2 or more
programs
concurrently
Registers
magazines

multitasking

an operating
system

SSGA
displays
writing
programs in
multiple
languages
writing
programs in
multiple
languages
Variables
CD-ROM
to run more
than one
program at
the same
time

none of the
previous

none of the
previous

none of the
previous
Logic Bus
e-mail

D
B
D

none of the
above

multiprogrammi
multitasking
ng
multiuser
related to virtual
a form of
reality
a form of ROM VRAM

same as
multitasking

save the file

to calculate
numbers
Uses Cobol
106 sec
a keypad
data to be
transferred to
memory

none of the
previous
none of the
previous
involves using
same as
more than one
multiprogrammi
processor at the
ng
multiuser
same time
use a virus
set up a
make a
protection
password
backup copy program
to read from or
to display
write
to print
information or
information to a sheets of
pictures on a
floppy disk
paper
screen
none of the
uses Java
uses C++
previous.
103 sec
1012 sec
109 sec
a mouse
data that has
been
transferred
from memory

data to be
data to be
transferred to or transferred to
from memory
the stack

an instruction
that has been
decoded
a cursor

an instruction
that has been
fetched from
memory
a scroll bar

C
D

B
D
D

a frog

a message pad B
an instruction
the address that has been
of a memory transferred from
location
memory.
C
an instruction
the address that has been
of a memory transferred from
location
memory
A
an
instruction
that has been
executed
a light pen

the address of
the next
instruction to be
executed
a magic marker

D
A

Formula

Algorithm

Program
Artificial
Assembler
Compiler
Intelligence
Memory
Range
protection
Parity Checking checking
use the
use the directory search each file backup
search tools
in turn
facility
Network
Program
System
save copies of
the file with the use different
keep a record
same name on filenames on
of computer
the system
the system
failures
Multiprogram
Multiprocessing Time sharing
ming

Data

Parity Checker

Validation

use find and


replace
Modem

A
B

backup to a
secure medium

Multiplexing

ROM

RAM
Word
Processor
Word
Processor
Hashed

Floppy Disk
Telephone
modem
Telephone
modem
Indexed

Magnetic Disk

Shareware

Shareware
Random

A
C

CPU
Files and
Tracks

Primary Storage B
Schema and
subschema
A

File, record,
field

Element, field,
file

Valid character
check

ALU
Blocks and
Sectors
Database,
character,
record
Maintenance
diagnostic
program

Sound card.

Text
Laser

Firmware
Firmware
Sequential
Operating
System
Tracks and
Sectors
Character, field,
database

viewing an
encyclopaedia
CD-ROM.
replaced
regularly
Database
get into the
system quickly

CD-ROM

Systems logs Parity check


MIDI
interface
Serial interface

Pictures
Dot matrix

Sound
Ink-jet

D
B

Video
Drum
recording current
stock in a
presenting an supermarket and
creating the
order for
answering
plans for a
stock to a
customer
building design. warehouse. queries.
updated
updated once a
never updated regularly
year
Document
Graphics
processor
package
Spreadsheet
retain
make efficient confidentiality simplify file
use of time
of files
structures

A
C
D

512
loss of
confidentiality
TCP/IP
access to the
internet is
quicker

1024
duplication of
data
HTML

4096

8192

virus infection
IPX/SPX
printer can do
files can be
1000s of
shared
pages a day
the root
a subdirectory directory
uninterruptabl
up-line provider e power
service
supply
the system
the program
requires a
executable may network
not allow it to
administrator
be uninstalled to uninstall it

loss of data
D
NetBEUI
A
the operating
system is easy to
use
B

data.
Graphical
representation of
logic
Purchase, sales,
receipt,
payments etc.

documents.
Rules writte in
procedural
language

text.

None of the
above

assist in
maintenance

speed up
access

a file name
universal port
serial

orphan files can


be left on the
system

To fill the log


register

information.
Logical Steps
in any
language
It is
mandatory in
tally
prevent
unauthorised
access

the hard drive


uniform page
source
the system
always requires
a re-boot and
defrag
afterwards

None of the bove A

allow encryption C

IT management IT
senior executive lacks
understands None of the
support for IT.
leadership.
the business above

input.

output.

processing. All of the above


Software that
The use of
generates
computers to
innovated
design state-of- Using
designs and
the-art, highcomputers to
artistic
None of the
quality products. do architecture. patterns.
above
Application
specialist or
Service
functional
Provider
enterprise
local
ensure the
filename is not identify the
identify the file
name the file
lost
file
type
All of the above
preventive
detective
corrective
are parts of IS
controls.
controls.
controls.
controls.
dynamic
extensible
external hashing static hashing hashing
hashing

D
A

A: (a) , (b), (d)


corrective
controls

B: (a) to (d)
preventive
controls

C: (a), (b), (c) D: (b), (c), (d)


C
detective
controls
general controls C

Component

Interface

Settings

(a), (c), (d)

(b), (c), (d)

Control

Create the files


again.

(a) to (d)
Select the
Turn the
Shut Down
computer off at option from a
the power point. menu.
Use the Find
Ask the person or Search
next to you.
feature.

(a), (b), (c)


C
Pull the power
cord from the
back of the
computer.
C
Put your hand up
and ask the
teacher
C

(a), (c), (d)


detective
controls

(a), (b), (c)


organisational
controls

(a) to (d)
preventive
controls

(b), (c), (d)


corrective
controls

(a), (c), (d)

(a), (b), (c)

(b), (c), (d)

problem logging call lights

(a) to (d)
program
change
requests

resolution
procedures

unit testing

data testing

thread testing loop testing

(b), (c), (d)


benchmark
testing

(a), (b), (d)


specifications
matching
Peripheral
processors.
(b), (c), (d)

(a), (b), (c)


parallel
operations

Press the reset


button.

Multiplexer.
(a) to (d)
Replacement
personal
computers for
user
departments.
architectural
design

(a) to (d)
system
walkthroughs
Job control
Concentrator. language.
(a), (b), (c)
(a), (c), (d)

Physical
Identification of security of
critical
warehouse
applications.
facilities.
procedural
interface design design
Computer
Client-server
Client
network
Star
Bus
Mesh
Star
Bus
Ring
To do a
To help
To maintain a
particular job
someone
backup copy of such as editing, who is
are written all the storing
applying for
information
information
employment
Direct

Sequential

Binary

B
D
A

Cross-training of
operating
personnel.
B
data design

Hub
Ring
All of the above

C
A
D

To Store data in
an organised
manner
B
Indexed

Data
Systems analysis communication Operating
and applications s hardware and systems and
programming.
software.
compilers.
A direct
A sequential file A sequential file access file on
on a disk
on a tape
a disk
Tapes can only
Information
be read by the
formats
machine on
commonly
which they are
Parity errors will vary between
written
result
architectures
Address
calculation
Data path part
Control Unit
part
Distributed
Local Area
Wide area
systems
network
network
Use the
computer to
which they are
Can send data to connected to
a computer and perform all
receive data
processing
from a computer operations

Generally
require a
keyboard for
data entry
and a CRT
for display

Mixer

Multiplexor

Allows computer
signals to be
send over a
telephone line
Planetary
network
Office
Automation
A dumb
workstation
Time of day
control locks

Modem

A direct access
file on a tape

Data record can


never be blocked
together
C
Input output
channel

Protocol

Are required with


a microprocessor
which permits
some data
processing such
as input
validation
D
Time sharing
computer
C

Aids in back-up Packs data in Speeds up online


procedures
a disk file
printing
A
Ring Network
Executor
systems
An intelligent
workstation
Encryption
algorithms

Terminal
Standard
A compiler
converts the
whole of a
higher level
A compiler does program code
a conversion line into machine
by line as the
code in one
program is run
step
Type of cable

Computer
operations.

Loop Network
Electronic
mailing
A personal
computer

Star Network
Instant postoffice

D
C

A mainframe PC B

Parity checks All of them


Device
Communicati interconnect
on protocol
standard
A compiler is
a general
purpose
language
providing very
efficient
None of the
execution
above

Lexical
analysis,
Feasibility study, Implementation CONVERSIO
system design, and
N, and code None of the
and testing
documentation generation
above
CRC
Baudot
ASCII
EBCDIC

An interpreter
does the
conversion line
by line as the
program is run

An interpreter is
a
representation
of the system
being designed

Modem
High-level
languages
It is faster than
parallel
communication

Demodulator
Middle-level
languages
It is less error
prone

Financial sector Graphic design


and engineering and education

An interpreter
is a general
purpose
language
providing very
efficient
execution
Frequency
division
multiplexor
Low-level
languages
It is less
prone to
attenuation
Accounting
systems,
commercial
sector
Relieve the
main CPU of
repetitive
communicatio
n tasks

None of the
above
Time Division
Multiplexor
None of the
above
Uses only one
path

None of the
above
Reduce
competition
between the
input/output
devices
None of the
above

Manage the
Communicate
paging function
with the console in a virtual
operator
environment
Specification and System
design
Analysis
Testing
Common
Fiber Optics
Coaxial Cable carrier
Telephone Lines
System
System
Analysis
Analysis
involves
The design of
defines the
creating a
the screen the
format and type formal model
user will see and of data the
of the
use to enter or
program will
problem to be None of the
display data
use
solved
above
An online
A cache
An interface
A buffer
protocol
Testing to
check for errors Hardware,
The different
before the
Software and
types of network system is
size of
None of the
to be used
introduced
program.
above
Star
Packet
Ring
Bus

D
A

C
C

C
B
C

C
B

B
B

15

None of the
1010101
above
Cyclic
Retransmission Redundancy Hash Count
None of the
4
64
above

Port

Modem

327

141

10101010
Parity

1100101

Multiplexor

97
Data
Data Mining
management
Data warehouse tools
systems
secondary
memory access storage
memory capacity time
capacity

C
A
A

Acoustic coupler C
None of the
above
B

binary form

255
ASCII code
form

4C5
4 bits
Basic Coding
Description
1024 bits

1B7
8 bits
Binary Coded
Decimal
1000 bytes

10000
binary form

1112
ASCII code
form

Mouse

Keyboard

All of them
secondary
storage access
time
None of the
256
above
alphanumeric
decimal form form
None of the
5C4
above
16 bits
32 bits
Bit Code
None of the
Design
above
210 bits
210 bytes
None of the
1110
above
alphanumeric
decimal form form
Numeric
None of the
Keypad
above

used to indicate
uppercase letters
Because it
squeaks when
moved
bits per second

used to detect
errors

is the first bit is the last bit in a


in a byte
byte
B

Touch screen
BPS
Printing letters

Light pen
MIPS
Tracing
diagrams

OCR

MICR

Touch screen

Hard disk

30

Its moves like a


mouse
It has ears
baud
bytes
Joystick
MHz
Reading bar
codes
barcode
scanning
CD-ROM
drive

None of the
above
Hertz
None of the
above
VLSI
None of the
above

B
B
A
A
B
D
A
A
A
A

D
D
C
B
B

voice recognition B
None of the
above
A

increased the
storage capacity
of a computer
increases the
system
process speed

Refillable ink
100K

Pencil lead
1.44 Mb

hardware

software

provides
backup
power in the
event of a
power cut
Light
sensitive
elements
5 Mb

output
Numeric
Mouse
Keyboard
Keypad
Touch screen
Light pen
Joystick
Tracing
Reading Bar
Printing letters
Diagrams
Codes
Touch screen
Hard disk
Keyboard
Bar code
Optical mark
Mouse
reader
reader
Credit card
Mouse
Speakers
Storing
information
Writing on a hard
on the hard
board
Printed output disk
Coloured spots Pixels
Pixies
Pointing
Printer
Storage device device
Bar code
Optical mark
Mouse
reader
reader
SSGA
CRT displays
LCD displays
displays
mouse button keyboard
screen layout
layout
layout
Bar code
Optical mark
Mouse
reader
reader
language
software
hardware
interpreter
interface
Credit card
having several
programs in
RAM at the
same time
having several
programs in
RAM at the
same time

multitasking

Speakers

multitasking
The ability to
run 2 or more
programs
concurrently

an operating
system

Smart card
writing
programs in
multiple
languages
writing
programs in
multiple
languages
To run more
than one
program at
the same
time

none of the
previous

None of the
above
1 Gb

C
B

input

Printer
Scanner
Digital
Signatures
CD ROM Drive

B
C

Keyboard
Printer

B
A

Back-up on a
Cartridge
Pickers

B
B

CD-ROM
None of the
above
none of the
previous
word processing
software
None of the
above
an operating
system
None of the
above

B
A

B
C
B
C
A

none of the
previous

none of the
previous

none of the
above

Second First - generation generation


computers.
computers.
multiprogrammi
multitasking
ng
Vishwajeet
Deep Blue
is caused by
caused by
wear
overuse
Optical Mark
Bar code Reader Reader
Technology
Technology

slower than an
a fast interpreter interpreter
Dot - Matrix
Drum Printer
Printer
encrypting it
Very important
reader user
sequence
Electrically
charged ink
mainframe
technology
10-6 sec
data to be
transferred to
memory
Contingency
Planning
Limit checks
array.
Wide access to
various data
base
ACL

A sample of
transactions

Tests of details
of transactions

decrypting it
Vital
information
resource under
siege
Thermal Paper
LAN technology
10-3 sec
data that has
been
transferred
from memory

Third generation
computers.

Fifth - generation
computers.
none of the
Multi-user
previous
Param
Arjun
is due to bad none of the
disk blocks
previous
Magnetic Ink
Character
Recognition Image Scanning
Technology Technology
converts a
program to
machine
none of the
code
previous
Desk - jet
Printer
Thermal Printer
compressing
it
transmitting it
Virtual
information
reader & user
system
None of above
An inked ribbon
An ink pen
and print head
WAN
Unix operating
technology
system
10-12 sec
10-9 sec
an instruction
the address that has been
of a memory transferred from
location
memory

System
Capacity
feasibility report Planning
External file
Control figures labels
constant.
function.
Can aid in
Can extract and simple
analyse data
selection
High End
IDEA
CAATs
A special
A utility
purpose
software
written
programme
program
Compliance
Analytical
tests of
review
general EDP
procedures
controls

Exception
reporting
Cross footing
tests
formula.

A
A
C
C

C
A
C

B
D
B
D

C
C
C

Can define the


audit objectives

All of the above

None of the
above

All of the above

Macros
clipboard
search

A way to analyse
and manipulate
numerical
information
Information
about certain
programs
remote DBMS
storing data
offline at a
separate site

Key verification

A way to analyse
and manipulate
numerical
information

Action
Procedures
file
sort

A tool to
produce high
quality
documents
It contains all
the data about
one specific
item
relative DBMS
backing up data
regularly
Computer
sequence
checks

Event
Procedures
field
field names

General
Procedures
layout
record grab

D
B
D

An organised
way of storing
information
about a set of A way of
similar things maintaining a log C
A document
which
A collection of
contains text files
Relational
DBMS
Reliable DBMS

B
C

is related to
data mining

uses tape as
opposed to disk

Computer
matching

Database access
controls
D

An organised
way of storing
information
about a set of None of the
similar things above

A document
which
None of the
contains text above

Information
about certain
programs

A tool to
produce high
qualitydocumen
ts
It contains all
the data about
one specific
item

Reports allow
users to extract
information as
hard copy
(printed output)

Reports provide
a very flexible
way of creating
and editing
documents

A tool which
allows text
and graphics
to be placed None of the
in documents above

Extracting and
analysing data

Spreadsheets
make data easy
None of the
to analyse
Using queries above

Compilers,
interpreters,
editors

Network
software,
backup
systems

Word
processors,
spreadsheets
, databases, None of the
DTP
above

DEFAULT and
NOT NULL
constraints
CHANGE
TABLE
remote DBMS
storing data
offline at a
separate site

PRIMARY
KEY and
FOREIGN KEY UNIQUE
constraints
constraints
MODIFY
ALTER
TABLE
TABLE
Relational
relative DBMS DBMS

IDENTITY
columns

UPDATE TABLE C
Reliable DBMS

backing up
data regularly

is related to
data mining

uses tape as
opposed to disk

Number

Description
keeping a
backup copy

Source
saving the file
with different
filenames

using a
password

Component
keeping the
original paper
copy

the product code


A database
bookmarks
Auto Primary

the primary key


Graphics
operators
Auto ID

e-mail
e-mail
engines
Auto Key

C
A
C
C

records in a
dynaset are
consistent with
the underlying
tables.

related tables in
a database are
consistent with
one another.

foreign key.
the primary key
of both related
tables.

main form and


a subform.
the primary key
of the related
table.

mail merge
browser
wildcards
AutoNumber
forms in a
database are
consistent
with the
underlying
tables or
queries.
query and its
associated
dynaset.
a field from
an unrelated
table.

One-to-one

One-to-many

EmployeeID

CompanyID

reports are
consistent with
the underlying
tables or queries. B
report and its
related query.
A
not a primary key
of either related
table.
B

Many-tomany
Many-to-one
B
EmployeeLas CompanyAddres
tName
s
A

The Tools menu,


Relationship
Referential
window
integrity

The join line

The one-to-many
relationship
B

Right-click the
Relationship
line, then select
Double click the Delete from the
Relationship line shortcut menu

Select Undo
in the
Relationships
pull-down
menu

Click the Delete


Relationships
button on the
toolbar

That there are


several
customers
associated with
that ID

That there
are records in
a related
table
They cannot
be
They must both They cannot be AutoNumber
be numbers
text fields
data types
The
customers ID
is deleted
from the
Customers
table, and all
The customers the related
Nothing, Access ID is deleted
loans are
ignores the
from the
deleted from
attempted
Customers
the Loans
command.
table.
table.
That some of
the data is not
viewable

That records can


be added by
clicking on the
plus sign
C
They must be
the same data
type

The subform is
not visible.

The subform is
displayed in
Datasheet view.

A one-to-many
relationship
between teams
and players

A one-to-many
relationship
between teams
and coaches

An error
message is
displayed.
D
The subform is
an object on the
form and can be
The subform moved or sized
is displayed like any other
in Form view. object.
D
A one-tomany
relationship A many-to-many
between
relationship
coaches and between players
teams
and teams
C

Either table at
any time
prompt, title bar
text, icon.

The Customers
table only when
there are Loan
records
associated with
that customer
prompt, icon,
title bar text.

The Loans
table at any
time
Neither table
title bar text, title bar text,
prompt, icon. icon, prompt.

Dim CreateList.

Sub CreateList. CreateList.

Sub.

C
B
B

A drop-down
list enables
A check box
A text field
the user to
enables the form enables the
choose from
user to choose
form user to
one of
from one of
choose from
several
several existing one of several existing
entries.
existing entries. entries.
does not
must be set for must be set for have to be
one word.
multiple words. set.

help people keep


track of things.
data.
facts.
single-user
database
application
single-user
database
application

store data in
tables.
relationships.
figures.
multiuser
database
application
multiuser
database
application
Structured
Question
Sequential Query Language
Language (SQL) (SQL)
Database
Database
Management
Modeling System System
Jet
SQL Server

The user
the database
application(s)
interact(s) with
the DBMS
creates queries

the user
all the users'
data is in one
place

The database
application
the DBMS
accesses the
database data

create tables
of rows and
columns.
metadata.
information.
e-commerce
database
application
e-commerce
database
application
Structured
Query
Language
(SQL)
Data
Business
Model
System
Oracle

A drop-down list
enables the user
to enter text.
C
must be set for
two words.

maintain data on
different things in
different tables. A
all of the above D
a and b
D

a or b

None of above

Relational
Question
Language (RQL) C

Relational Model
Manager
B
a and b
D

The database
management
system
(DBMS)
All of the above. D

None of
above
creates
creates form
reports
the database
management
the database
system
application
(DBMS)
it contains a
description of
it reduces data its own
duplication
structure

All of above

b and c

the database

All of the above. C

holds user data

holds metadata holds indexes


stored
tables
metadata
procedures
as a new
systems
as a redesign
from existing
development
of an existing
data
project
database
as a new
systems
as a redesign
from existing non- development
of an existing
database data
project
database
as a new
systems
as a redesign
from existing
development
of an existing
data
project
database

data marts

normalization

data models

data marts

normalization

data models

data marts

normalization

data marts
file managers
entities in a
column vary as
to kind
table
record
record
record
composite key
Insertion
anomaly
assess the
existing tables'
structure and
content
are supplied by
several wellestablished
manufacturers

data models
entityrelationship
data
normalization
modeling
hierarchical
network
models
models
the order of the the order of
columns is
the rows is
important
unimportant
relation
row
field
key
composite
field
key
field
foreign key

All of the above. D


All of the above. D

a and b

a and b

a and b
entityrelationship data
modeling
entityrelationship data
modeling
entityrelationship data
modeling

data migration
relational data
model
more than one
column can use
the same name
field
tuple

foreign key
candidate key

C
D

surrogate key

All of above

primary key
Update
anomaly

foreign key
Deletion
anomaly

design the
database
structure

create one or move the data


more new
into the new
tables
database

were essentially have poor


killed off by MS response
Access
time

are not true


DBMS products

C
D
C

They use
sophisticated
mathematical
techniques.

Their report
delivery is more
difficult than
report delivery
for reporting
Nonintegrate None of the
systems.
d data
above

dirty data

inconsistent
data

nonintegrated a "wrong format"


data
problem
B

dirty data

inconsistent
data

nonintegrated a "wrong format"


data
problem
D

data
warehouse
data warehouse databases do
data are not
not have
stored in tables. metadata.
Form
Table
Forms and
Queries and
reports
tables

data
warehouse
data are often
denormalized
.
b and c
Report
Query

Import

Merge

Join

It contains a
user
interface, or
switchboard

It contains
macros

C
A

Spreadsheets
D
Regardless of
how the objects
and tables are
It will be easier
stored, the user
It will be easier for the user to It is advisable will have to
for the user to
upgrade it if the to put each
reenter the data
upgrade it if the objects are in object and
in the tables
objects and
one database table into a
when the
tables are in one and the tables separate
application is
database.
in another.
database.
upgraded.
B
An application
may consist of
The Link Tables multiple
An application
command can be databases,
All objects in can be created in
used to
each with
an
such a way that it
associate the
multiple
application,
objects such as
tables in one
objects, linked including the forms and
database with
to yet another tables, must reports can be
the objects in
database
reside within changed without
another
containing only the same
disturbing the
database.
tables.
database.
existing data.
C
Link

It contains
tables, reports,
It contains more queries, and
than one table
forms

Macros

Menu Wizard

Build Menu

create backups
for mission
critical corporate
data.

centralize the
manageability
of data
collection.

Decryption

Cipher

Interface
Design
Wizard
put key
business
information
into the
hands or
more
decision
makers.

Unaltered in
transmission.

Encryption
Conducting
fraudPerforming
awareness
validity checks. training.
Received by
Not intercepted the intended
en route.
recipient.

Both sender and


receiver must
have the private
key before this
encryption
method will work.

The private key


cannot be
broken into
fragments and
distributed to
the receiver.

Using data
encryption.

Collision.
Error checking
Competitive
espionage
A list of
competitors
clients
single-user
database
application
Replying
promptly

Data entry
errors.
Data
Integration
Corporate
espionage
Contact
numbers of the
management
group
multi-user
database
application
Keeping
messages
short

The private
key is used
by the sender
for encryption
but not by the
receiver for
decryption.
Failure of
server
duplicating
function.
Low cost of
operation
Industrial
espionage

Switchboard
Manager

store all
corporate
transaction data
in one single
location.
C
Cryptography

Reviewing the
systems-access
log.
D
Sent to the
correct address. A

The private key


is used by the
receiver for
decryption but
not by the sender
for encryption.
A

Firewall
vulnerability.
Quality
management
Economic
espionage

Research
A competitors
data
new project
e-commerce
database
application
None of above
Including the Using all capital
Subject
letters

D
B
C

Encryption
performed by
a physically
secure
hardware
device is
more secure
than
encryption
performed by
software.

Security at the
transaction
phase in EDI
systems is not
necessary
because
problems at that
level will be
identified by the
service provider. C

No border

A blinking border A

2,2,2
the column is
too narrow to
show all the
digits of the
number
flexibility of
moving
entries

6,8,10

either b or c

word processing graphical


Range
Address
Producing
graphs
Writing letters
drag from the
top cell in the
double-click any column to the
cell in the
last cell in the
column
column
CTRL +
ENTER
ENTER
array.
function.
100
(201)555-1212.

database
Gap
Drawing
pictures

spreadsheet
Rows

D
A

Document filing

Cell references
^

Functions
/

B5*B6

C3/D4

E12

It is surrounded
by a heavy
border.

It is blinking.

Text constants
\
It is impossible to
D4^2
determine.
SUM(H9:H11 G7*SUM(H9:H11
)
)
The phrase
It is displayed active cell
in reverse
appears in the
video.
Status bar.

Message
Removable
authentication
drives that can
in EDI systems
be locked up at performs the
night provide
same function
adequate
as segregation
security when
of duties in
the confidentiality other
of data is the
information
primary risk.
systems.
A dark wide
border
A dotted border
8,16,32

2,4,2
the row is too
short to show
the number at
your formula has the current font
a syntax error
size
ability to
generate tables

speed of
calculation

click the
column
heading
TAB
constant.
#VALUE!
Numeric
constants
*

cost of initial setup


D

click the column


label
C
INSERT
formula.
Tom McKenzie.

A
B
C
D
D
C
B

By clicking in a
different cell

By using the
arrow keys to
move to a
different cell

By either
clicking in a
different cell
or using the
arrow keys to
move to a
different cell

The Cell
Format
The Standard
The Formatting command on
toolbar
toolbar
the Edit menu
the Save As
the New
the Save
command on
command on the command on
the File
File menu.
the File menu. menu.
File
Edit
View
Preview

Details

Insert

Delete

Clear
Orientation
(portrait or
landscape)
Options
worksheet.
6

Delete

By typing the
reference of the
cell you want to
move to in the
formula bar

The Font Size


command on the
Tools menu.
B
the File Type
command on the
File menu.
C
Window
A

List
Both Insert
and Delete
Both Clear
and Delete

Properties

Clear

Remove

Fonts
View
group.
D12:G25

Margins
Edit
cell group.
D

C
B
B
C

clipboard.

source range.

clipboard.

paste range.

Headers and
footers
Page Setup
range.
D12, G25
destination
range.
destination
range.

The Duplicate
command
absolute
B4

The Copy
command
relative
$B4

The Paste
command
mixed
B$4

source range.
Both the Copy
and Paste
commands
constant
$B$4

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

#DIV/0!

The Move
command

The Cut
command

The Paste
command

#DIV/0!
C
Both the Cut and
Paste
commands
D

edit cells.

cycle through
absolute,
relative, and cycle through
mixed cell
open
references.
applications.

copy range.

copy and paste


cells.

D
A
D

the Fill Handle

the Format
Painter

Select the Insert


Hyperlink
command from
the File menu.

Click the Insert


Hyperlink
button on the
Standard
toolbar.

whether the cell


has a formula or the cell
a value in it.
address.

the
Formatting
toolbar
Right-click a
cell and click
the Edit
Hyperlink
command.
whether the
cell has an
absolute or a
relative cell
reference.

Conditional
formatting

Double-click a
cell and click the
Insert Hyperlink
command.
B

text with a fourdigit year.


an integer.

the value in the


cell
D
text with either a
two-digit or fourdigit year,
depending on the
format.
C

Jul-30

Aug-31

subtracting the
earlier date from
the later one.
the F4 key.

adding the
earlier date to
the later one.
the F2 key.

29/03/2008
subtracting
the later date
from the
earlier one.
the Esc key.

It is impossible to
determine from
the information
given.
B

03-Apr

0.75

March 4 of
the current
year

a cell on a
worksheet.

a variable.

a constant.

Either 3/4 or .75,


depending on the
cell formatting
C
either a cell on a
worksheet or a
variable.
D

B1-G10

B1.G10

B1;G10

B1:G10

AVERAGE
Combination

COUNT
Line

SUM
Scatter

C
C

text with a twodigit year.

MAX
Pie
Once a pie
Once a bar chart Once a column chart has
is chosen it
chart is chosen been chosen
cannot be
it cannot be
it cannot be
changed to a
changed to a
changed to
column chart.
bar chart.
line chart.
hold down the
hold down the hold down the
CTRL key
SHIFT key
ALT key

adding the later


date to the
earlier one.
the F1 key.

A
B

Once a line chart


has been chosen
it can be
changed to a pie
chart.
D
hold down CTRL
+ SHIFT
A

Use tables

Create four
separate files

Paste

Fill Down

Tools | Sort

Data | Sort

Analyse data

Calculate data

click the Print


button
producing
graphs
(D4+C2)*B2

press the
PRINT
SCREEN key
writing letters

Transfer
information to Use multiple
a database
sheets
Fill Right
Edit | Data |
Sort

Paste Special
none of the
choices
None of the
Create forms above
select Print
selection on select Print
Page Setup selection in the
| Sheet and Print dialog and
then print
then print
drawing
None of the
pictures
above

D4+C2*B2
#VALUE!
=A3SUM:B3SU
M:C3SUM
REF!

portrait

landscape

AD213

ZA1

=(B2*(D4+C2)
None of the
above

whatever was
last used
vertical
None of the
A0
above

D
B
B
C

D
A
C
B

A
C

sending
storing data
storing data on a information to a on the hard
disk drive
host computer drive

receiving
information from
a host computer B

Bandwidth

Speed

Size

Channel

Find

Browse

Retrieve

Photography

Save
Digital
Signature

Key

Lock

Cryptography Message Digest C


Hash
Function
Formula
A

User-id

Password

Name

Penetration

Retrieval

Address
Password
Cryptography Cracker

Acts

Regulations

Address

Protocols

Spoofing
Loss
Sales - tax
authorities

Imposting
Threat
Income - tax
authorities
Pirated
software

Unauthorising
Exposure
Judge of a
civil court

Approving
Hacking
Police officer of
IPS rank.

A
B

Virus

Cracker

Utility

Automated Tailor Any Time


Machine
Money

Charles
Bubbage
Howard Aiken
Dell .com
Msn .com
Asynchronou
s
Transmission
mode
None of above

Acts
Router

Regulations
Gateway

Address
Port

LAN

WAN

Tim Berner Lee


Etrade.com

Hoffman
Amazon .com

CAN
hypertext
hyper terminal
hypertext
transfer
tracing program tracing program protocol
National
New
Informatics
Network
Information
Center
Interface card Card
Can not
Only Computers computers
Only printers
Combines
Switches data
connectivity of from
a hub with the incoming
traffic
ports to
Concentrates
regulation of a outgoing
connectivity
bridge
ports.
Bridges and
Two or more
Bridges and
Repeaters.
networks
Hubs
bits
firewall

frames
gateway

One

Two

Packets
router

Physical Layer

Four
Network
Data-Link Layer Layer

RG7U

Coaxial cable

Fiber
A memory
Physical address Logical address address
A cable

Physical Layer

Router
It continue on
It gets
to target
destroyed bit by device with
bit.
corrupt data
Wired
Ultra violet
Technology
technology
Network
Data Link Layer Layer

Binary

ASCII

Data return to
the sender
Wireless
technology

Hub

Octal

A
B

Protocols
Pin

C
B

PAN

hypertext tracing
protocol
C
None of the
above
None of the
above

B
D

All of Above

Hubs and nodes


None of the
above
virus checker
None of the
above

All of the above

Twisted pair
None of the
above
None of the
above

None of the
above
None of the
above
All of the above
None of the
above

C
A
C

B
B

B
A
D
A

48 Bits
software that
facilitates
connection to the
internet

48 Bytes
a list of rules for
transferring
data over a
network

Novell PC

Client

48 KB

48 MB

software that a gateway calling


allows file
program for
copying
internet bridging B

There isn't one

Server
If the hub
goes down, it
If one node
brings down
goes down, it
all of the
brings down the nodes on that
entire ring
section

Physiology
Bus

Topology
Star

If the hub goes


down, it brings
down all of the
nodes on all of
the rings
None of the
Both A and B above
Ring
All of above

Linear
Parallel

Parallel
Circular

Both A and B None


Linear
Both A and B

A
B

Ring

Bus

Star

Mesh

Ring
Star

Bus
Bus

Star
Linear

Mesh
Ring

B
C

Ring

Bus

Mesh

Data Link Layer

Ethernet, token
ring, ARCnet
mips
Mips

B
B
C

limited by
modem speeds
Netscape

C
B

All of the above

Star
Physical
Network Layer
Transport Layer Layer
Ethernet,
Ethernet, token Ethernet, token DecNET,
ring, DecNET
ring, FDDI
FDDI
bps
kbps
mbps
bps
Kbps
Mbps
depend on
measured in
the
usually higher
bytes per
transmission
than LAN speeds second
medium
CD-ROM drive
a modem
Windows 95
must use the
must use
World Wide Web electronic mail
uniform
key gateway
resource
interface
locator
a Novell
Interface
used to control
Controller
a printer
CD-ROM drive
Linux

a modem

must have a
LAN account
common
gateway
interface
interfaces a
modem to a
computer
Windows
package

Network PC

B
B
D

application
protocol interface C
connects a
computer to a
network
D

Netscape
None of the
Novell Netware Windows NT above

B
C

have to do with
compression of
graphics and
video

have to do with
Web pages
the Internet

must use the


must use
World Wide Web electronic mail
Printer

modem

none of the
previous
A
use appropriate
must have a communications
LAN account software
A
none of the
bridge
previous
D

provides access is a CPU


to the Internet
register

used to send
email

is a CPU
make of
functional unit processor
A
is a protocol for
the transfer of
used to browse is part of
files between
the Web
Netscape
computers
D
uses wireless
communication is part of
None of the
medium
Netscape
above
D

used to send
email
used to protect
a computer room
from fires and
floods
a form of virus
an email
a backup server server
IR system for
hardware
the Internet
scanner
CD-ROM

a screen
saver
program
a poor file
server
browser
clip-art file

none of the
previous
none
none of the
previous
search engine

D
D
C
D

provides access is a CPU


to the Internet
register

used to send
email
used to send
email

is a CPU
make of
functional unit processor
A
is a protocol for
the transfer of
used to browse is part of
files between
the Web
Netscape
computers
D
is a protocol that
uses telephone is part of
allows for remote
lines
Netscape
login
D

Any layer can


communicate
The layers
Any layer can only with the
cannot
communicate layer directly
communicate
directly with any above or
with one another. other layer.
below it.

Any layer can


communicate
only with the
layer above it.

It is made up of
many networks
connected into
transmission
lines called
backbones.
System
intrusion

It is one large
network.
Password
cracking
used to protect a
computer room
from fires and
floods
a form of virus
Flood a Web
server with
IP flood
requests
hack
packet
firewall

It works the
same way as
a local
network.
Denial of
Service
a screen
saver
program
Virus that
initiates a
ping flood
flood

router

switch
a poor file
a backup server an email server server
Backup data
Apply security
Update virus
on a daily
patches
definitions
basis
Only large
nameThere are safe recognizable
All sites are safe and unsafe
sites are
and reliable.
sites.
safe.

Individual
computers can
connect to it
using an ISP.

Port sniffing

none of the
previous

UDP flood
traffic

A
C

hub
none of the
above

Limit logging on
access

ActiveX-enabled
sites are safe.
B

by attaching to
an e-mail.

Use of logical
access
methods
by attaching
through an FTP itself to a
port.
document.

Phone
A Trojan horse

E-mail
Adware

Web traffic
A worm

Use of
encryption
methods
by scanning the
computer for a
connection.
Application
updates
Spyware

Modems

Multiplexors

LAN

cookies and
Trojan horses.

Protocols
Trojan horses
and key
loggers.

cookies and
key loggers.

key loggers and


worms.

An attack on a
system for
personal gain

An attack with Giving out


Changing the
the purpose of disinformatio content of a Web
gaining publicity n
page
D

Economic
damage

Disruption in
Disruption in
communication supply lines

Use of
Use of identifiers passwords

All of the above


are correct.

B
D
D

Crashing the
Shutdown of
Contaminatin Shutdown of
stock market, as military security g water
nuclear plant
in the 1930s
systems
systems
safety systems
To obtain an
accurate
inventory of
To improve
network related
To improve
system
equipment and
To carry more
network
response
parts and
network capacity services
time
network nodes
stop its
limit access to competitors update its prices
set its prices very computer
seeing their as soon as they
high
owners only
prices
are changed
Yahoo People USA People
People Search
Search
Search
Lycos Search
Name of your
Personal
bank
Date of birth
assets
Criminal records
Virus
Fraud
Adware
Spyware
make large
amounts of
money by
purchase off- parking funds in
invest without shore
their bank
buy stocks.
risk.
property.
account.
Shill bidding

Phishing

Internet stalking. cyber stalking.


pop-ups.
cookies.
Use a fake email address.

Encryption
I only
irc

Siphoning
virtual
stalking.
spam.

Never use your Use a proxy


real identity.
server.
Message
Physical
sequence
Security
number
controls
checking
II only
Both I & II
ftp
www

Adds more bytes Verifies integrity Increases


to programs
of files
boot up time

HTML

Internet
Explorer

Web query.

HTML
document.

.com is used for .co in used for


company
company

Microsoft
Excel
round trip
HTML
document.
.con is used
for
companies

D
B
A
B

Hoaxing

Web stalking.
viruses.

B
B

Use anti-spyware
software.
B

Logical access
controls
Neither I or II
telnet
Misleads a
program
recompilation

B
C
C

both HTML and


Internet Explorer B

Web browser.

None of the
above

the World Wide


Web
round trip HTML. Consortium
HTML.
XML.
HTML.
DHTML.
clicking a
hyperlink that
using Internet
references a
Explorer to view updating the
document
a Web page that values that are that is stored
is stored on the obtained
in the floppy
hard drive on
through a Web drive on your
your computer
query
computer
Click on the
Go to the
Back arrow until Click on Go to History page
the desired site or Search in
and look for
is found
the browser
the site
the Insert
the Refresh
Hyperlink
the Update
command
command
command

Hyperlink
BMP

Save it to a
floppy disk.
extranet.
an attachment.
VoIP

Desktop client,
application, and
database.
Modem
File Transfer
Program
So computers
can be
referenced by a
name
193.1.2.3
paul .trigg @
domain. org. uk
The US
government

Screensaver
GIF

Sound
JPEG
Add it to
Write it down Favourites
on a piece of
or
paper.
Bookmarks.
privileged
intranet.
network.
a signature.
a footer.
IPT
IPP
Desktop
server,
Desktop client, application,
software, and and
hardware.
database.
Telephone
CD-ROM
line
File
Transmission File Transfer
Protocol
Protocol
So IP
So email is
addresses can delivered
be shorter
faster
143.215.12.1
45.1.1.1
9
paul.trigg@dom paul.domain.
ain.org.uk
uk
Scientists in
Switzerland
No-one

one way HTML.


MHTML

C
D

viewing an Excel
worksheet that
you have saved
as a Web page. B
Go to the
Bookmarks or
Favorites page

the External Data


command
A

Video
TIFF
Cut and paste it
to a word
processor
document.

C
C

network topology A
an encryption.
B
PoIP
A

Desktop server,
software, and
hardware.
None of the
above
None of the
above

None of the
above
None of the
above
None of the
above
None of the
above

A
B

A
D
B
C

Internet Relay
Chat

International
Relay of
Characters

It will be waiting
for you to
It will be deleted collect it
Hyperlink Text
Hyper Textual
Marking
Mark-up Lingo
Language
Receiving
messages
People
automatically
discussing a
from anyone in topic of interest
the group
globally

Internet
Remote
Conversation None of the
s
above
A letter will be
sent to you in
the post
Hyper Text
Mark-up
Language

None of the
above

None of the
above

High volumes None of the


of email
above
Database
Application
Operating
management
Software
Utility Programs system
system
Deleted from the Copied from
Saved to the
disk
the disk
disk
None of above
Data bus
Auto bus
Address bus None of above
Data bus
Address bus
Control bus None of above
Personal
Parallel
Super
computers
computers
computers
None of above
BPS
MIPS
MHz
VLSI
barcode
OCR
MICR
scanning
voice recognition
is caused by
wear

is due to bad
disk blocks
converts a
program to
slower than an assembly
a fast interpreter interpreter
code
translates and
executes
converts a
programs
program to
faster than a
statement by
machine
compiler
statement
code

encrypting it
an assembler
the ALU
A runtime error
can result if the
user clicks the
cancel button

caused by
overuse

compressing
it
an
a compiler
interpreter
the power
the CU
cord
The program
executes
A compile time without any
error occurs
error
decrypting it

C
A
A
C
A
B
B

none of the
previous

none of the
previous

none of the
previous

transmitting it

a linker
None of the
above
You need to
carry out
conditional
compilation

A
C

File List Box

Dir List Box


systems
memory overflow overload

Drive List Box Combo Box

RAM overflow buffer overflow

Netcop
NetBrute
Netcraft
NetBIOS
D
www.nettools.co www.WhoIs.co www.netcraft.
m
m
com
www.netstat.com C
code correct.
firewalls

patches.
switches

It can consist of
hardware,
software, or
both.

It hides your
network.

That any open


applications be
exited
Antivirus
software
an intrusiondetection
system.
cycle.

Dependencies
on other
services
Intrusiondetection
software
antivirus
software.

renewal.
Install and keep
Make sure all
current
update and
antivirus and
security patches anti-spyware
are applied.
programs.

updates.
hubs

upgrades.
scanners
It is a barrier
One of its
between your
techniques is network and the
packet
rest of the
filtering.
Internet.
That you also
That you are shut down
not on the
associated
Internet
services

B
A

Firewall
a network
prevention
system.

Router

a proxy filtering
system.

age.

history.

Block all
incoming traffic
on a network.

Create another
administrator
account to
confuse the
hacker.

Give them to a
recycle shop.
Spyware

C
C

hone your
programming
skills.

Limit users
ability to
configure the
workstation.
Disable it and
Delete it and
create a
change the built- nondescript
Delete it from the in guest
user account
system and use account to a
with
the guest
power user
administrator
account.
account.
rights.
Tapes can be
used over and
Tapes and CDs Tapes should
over, and CDs
can be thrown be melted
should be kept
away in the
and CDs
forever.
trash.
broken.
Trojan horse
Virus
IP spoofing
place a router
download
between your
files from
ISP and your
add spyware to reliable Web
system.
your system.
sites.

Problems with
your wireless
mouse
D
Never open an eTurn off the mail attachment
Do not
auto-launch unless you know
Update antivirus propagate hoax in your e-mail what it is and
software.
viruses.
client.
who sent it.
D
System acts
abnormal

Files are
missing

virus
A virus

Trojan horse
spyware
A Trojan horse Spyware

Obtain system IP
addresses
Obtain cookies
E-mail and
attachment
Download
scanning
scanning
Do not open
Use your
attachments in
browsers
unknown esecurity settings mails
Administrative
assistant to the
president
Cook

The Standard
toolbar
multitasking.

the default file


location of new
files
shrinking

The Formatting
toolbar
tiling.
whether the
worksheet
prints in
landscape or
portrait
orientation

multitasking
Click on any
Click on any
corner and
border and drag. drag.

Printing
problems

Check for
open ports

buffer overflow D
A buffer overflow C
Obtain
usernames and
passwords
D

Backup file
File scanning scanning

Avoid skins
and toolbars Use encryption
download
software

Junior
accountant

Network
administrator

The Open
command on
the Edit menu
cascading.

The Save
command on the
File menu
A
minimizing.
A

the number of the margins on


windows you the printed
have open
DOCUMENT
minimizing
Click on the
title bar and
drag.

cascading
You cannot
move a floating
toolbar.

A
C

right mouse
button anywhere
on the Word
window, choose
the Customize
command from
the contextsensitive menu,
and check the
box for the
missing toolbar
from the
Toolbars tab
dialog box.

left mouse button


anywhere on the
Word window,
choose the
Customize
command from
the contextleft mouse
sensitive menu,
button on any and check the
right mouse
visible
box for the
button on any toolbar, and missing toolbar
visible toolbar, click on the
from the
and click on the missing
Toolbars tab
missing toolbar. toolbar.
dialog box.
B
Once a
document is
protected by
All documents
a password, it
are automatically
cannot be
Passwords can
saved with a
The password opened
be up to only
default
is casewithout that seven characters
password.
sensitive.
password.
long.
A
nonprotective protective
public domain
open source
open source proprietary
software.
software.
software.
software
C
nonprotective protective
public domain
open source
open source proprietary
software.
software.
software.
software.
D
on-demand
on-demand
utility
computing.
software.
computing.
utility software.
B
best-cost
software
Web service application
provider
provider
provider
service provider D
Structured
Operational
Informational
query
Office
systems
systems
systems
automation
A
hardware
power outages. failures.
floods.
All of the above. D
hot
Delete

cold
Kill

text, graphics
and email
address.

empty
Nothing
CD-ROM,
text, hypertext digital
and Power
camera and
Point.
sound.

the Line style

the Line color

Fill color

Line color

dormant
New

B
C

text, hypertext,
Power Point,
video and sound. D
Line style, Line
the Font and color, text font,
the text
and text
alignment
alignment
D
Fill color, Line
Line
color, and Line
thickness
thickness
D

Excel is started
so that you can
create a chart.

A popup box
prompts you for
an existing
Excel chart to
insert.

Microsoft
Graph is
started so
that you can
create a
graph.

The graph
placeholder is
deleted.

taken from
the first
column or
row of data in
the
datasheet,
always taken
depending on
always taken
from the first
whether the
from the first row column of data data series
of data in the
in the
are in rows or entered by the
datasheet.
datasheet.
columns.
user.
Side-by-side
Stacked
column
column
Pie chart
Line chart

C
B

Pull down the


Insert menu and
select Chart,
click the Insert
Chart button on
Pull down the the Standard
Insert menu toolbar, or pull
Click the Insert and select
down the Insert
Pull down the
Chart button on the
menu and select
Insert menu and the Standard
appropriate
the appropriate
select Chart.
toolbar.
Object.
Object.
D
Click the chart
object, then
You cannot
click the View
display the
Datasheet
Pull down the underlying
It automatically button on the
Edit menu,
datasheet once
displays in Slide Standard
then select
the slide is
view.
toolbar.
Object.
finished.
B
Single click the Double click the Click outside Change to Slide
chart.
chart.
the chart.
Sorter view.
C

A dialog box is
displayed
allowing you to
enter the name
of the Excel
worksheet that
should be linked
to the
PowerPoint
presentation.

A dialog box is
displayed
allowing you to
enter the name
of the Excel
worksheet that
should be
embedded in
the PowerPoint
presentation.

The chart is
selected.

The chart is
deleted.

The chart is
selected.

The chart is
deleted.

The datasheet
window is
The
toggled from
datasheet is closed to open
saved as a
(or from open to
separate file. closed).
D
The chart is The application
doubled in
that created the
size.
chart is started. A
The chart is
doubled in
Microsoft Graph
size.
will restart.
D

a slide one bullet


item at a time,
build bullet items
a letter at a time,
bullet items
and build bullet
a slide one bullet bullet items one one word at a items a word at a
item at a time.
letter at a time. time.
time.
D
Subtle,
Moderate, or
Subtle
Moderate
Exciting
Exciting
D
Both enter
and exit, and
fly in from top
or bottom
Alt

Neither enter nor


exit; neither fly in
from top nor
bottom
C
Ctrl
B

Enter and exit


Enter

Fly in from top


or bottom
Shift

the way objects


appear on a
slide.

Custom
animation can be
used to affect the
way objects
appear on a
slide, to what
objects do after
what objects do
they appear on a
after they
the way
slide, and to the
appear on a
objects exit a way objects exit
slide.
slide.
a slide.
D

The
advanced
timeline
shows the
sequence in
which objects
The advanced
The advanced will appear on
timeline shows
timeline shows the slide and
the sequence in the duration of the duration
which objects will the effect
of the effect
appear on the
applied to each applied to
slide.
object.
each object.

Paint program

Text
Filtering
Draw program program

The advanced
timeline shows
neither the
sequence in
which objects will
appear on the
slide, nor the
duration of the
effect applied to
each object.
C
Clips,
organization
charts, and text D
Animation
program
A

Fly in

From top

Fly in, From top,


and Dissolve in D

Once data is
entered it cannot
be changed.
OLTP.

Once data is
entered it can
be changed.
OLAP.

Clips

Organization
charts

You can
change both
You can change the appearance
the appearance of a whole
of a whole
diagram and
diagram, but not the individual
individual shapes shapes of a
of a diagram.
diagram.
[Enter+A]
[Shift+Z]

Dissolve in
Data cannot
be entered
into
Datasheet.
OLST.

You cannot
change the
style of the
connecting
lines in an
Organization
chart.
[Alt+Z]

There is no such
thing as a
Datasheet.
B
OLIP.
B

You cannot
change the color
of the boxes in
an Organization
chart.
B
[Ctrl+Z]
D

.ctx
Validate
On Error GoTo
linelabel

.ctl
.ctr
Validation
Check
On Error GoTo
Inline
On Error Stop

.ocx
Audit
On Error
Resume Next

B
A

UpdateControls

PaintPicture

Resize

UnloadMode
parameter to a
zero value

UnloadMode
parameter to a
zero value

Cancel
parameter to a
non-zero value
Cancel
parameter to a
non-zero value

Refresh
UnloadMode
parameter to
Cancel
a non-zero
parameter to 0 value
UnloadMode
parameter to
Cancel
a non-zero
parameter to 0 value

3
Consists of
Various
Consists of
Consists of
Forms And
several
several
Code
Programs
Applications
Modules
Form window,
Project window, Class
standard or code view code
module, code
module
window
module
Place code in
Place code in the
Place code in the the Unload
Deactivate
Terminate event event
event
AutoRedraw =
AutoRedraw =
True
False
Refresh
Msgbox
Msgbox
Msgbox err.no & err.number &
error.number
err.text
err.text
& error.text

None of the
above

Consists of
several Projects D
None of the
above

None of the
above

PaintPicture
Msgbox
error.number &
error.description
To provide a
repository for
images used by
other controls
GetBytes
Value

Input box
Font
KeyPress,
KeyUp and
KeyDown
Output mode

D
C

To display
images to the
user
FreeFile
Retrieve
Common
messages
passed to
Windows
Caption

To help in
creating a
ToolBar
GetFileNum
Get

To allow the
editing of
icons
GetFile
GetProperty

Open dialog
box
Visible

Windows
explorer
Multi-Line

Click and
KeyPress
Ascii Format

Click, KeyUp
and KeyDown
Binary Format

KeyUp and
KeyDown
Input Mode

CurrentX and
CurrentY

ScaleLeft and
ScaleTop

ScaleHeight
and ScaleTop x and y

Property Get

Property Assign Property Let

Property Set

Background
color property
Min

Caption
property
Max

ZOrder
property
Value

AutoRedraw
property
CurrentVal

C
B

SetAttr

CStr

Shell

Substr
Can be
Are one and the different at
same
times

Are actually None of the


not properties above

D
A
B

D
B

You do not
have the
You do not need permission to
to use the Set
access the
command here class

MyVar has
not been
declared
The
The Open
The Exec
ExecProcedu
method
method
re method
An
A warning query A critical
exclamation
icon
message icon icon
intrinsic
statement.
variable.
constant.
InputBox
function can
be created
MsgBox
with the
statement
InputBox
macro
returns a value, function returns recorder,
while the
a value, while while the
InputBox
the MsgBox
MsgBox
function does
statement does statement
not.
not.
cannot.
Data cannot be
entered into the The form can
Data can be
form.
be modified.
entered.
Unload
QueryUnload
Deactivate
press the return press the tab
press the
key
key
escape key
layers and
lines and
height and
planes
spaces
width
backspace/
tab
delete
enter/return
grammar
checker
spell checker
thesaurus
send a public
message to
friends interested send pictures to
in one topic
a friend
From ___ To
Print all
____
Enter
Copy
closing
tabbing
database
To analyse
figures
subscript

graphing
Creating and
editing
documents
annotation

None of the
above

None of the
above

None of the
above
built-in
procedure.

B
C

MsgBox
statement can be
created with the
macro recorder,
while the
InputBox
function cannot. B
A new check box
can be added.
C
Terminate
C
just keep typing
rows and
columns

shift

outliner

send private
messages to send a package
a friend
D
to a friend
Page setup
Retrieve
spacing
word
processing

Print preview
Save
sorting

B
C
B

spreadsheet

Storing
information
clip art

None of the
above
clipboard

B
C

To analyse
figures

Creating and
editing
documents

Clear, replace
and select

Spelling,
grammar and
autocorrect

Text at the
bottom of every
page
Mouse, printer
and processing
system
keyboard?
Browser
Clear, replace
and Toolbars

Paste
Copy, then
paste

Storing
information

Making
Calculations

Cut, copy,
paste and
clear
Text which
Numbers which appear at
the top of
appear on
every page
every page
Keyboard,
Mouse,
Monitor,
monitor and
keyboard and
mouse
printer
clip-art file
microphone
Cut, copy,
Spelling,
grammar and paste and
autocorrect
clear

Font, Paragraph,
Bullet and
Numbering
C

Select all
Delete, then
Cut, then paste paste

AutoCorrect
Insert, then
paste

Replace

To give the
To give the
original author
original author a a chance to
chance to accept reject
suggested
suggested
changes from
changes from
the person who the person who
entered the
entered the
revisions
revisions

To
complicate
the revision
process and
to force the
author to
spend more
time making
corrections

Designated area
on the document C

None of the
above
digital scanner

B
D

None of the
above

B
A

To allow multiple
people to work
on one
document in
collaboration with
one another
C

A vertical line
outside the
left margin
signifies a
A red underline change has
appears
been made at
A line appears
beneath text
that point in
through text that that is to be
the
is to be deleted. added.
document.

Comments are
enclosed in a
text box at the
right of the
document.

Through the Edit


menu by
choosing Track
Changes
command

Both through
the Tools menu
and the
Reviewing
D
toolbar

Through the
Tools menu by
choosing Track
Changes
command

Through tools
on the
Reviewing
toolbar

The Versions
command will
allow you to
save multiple
versions of a
document,
including any
changes that
may have been
made to that
document.

The Versions
command will
allow you to
save only one
version of a
document,
including any
changes that
may have been
made to that
document.

The Versions
command will
allow you to
save only one
version of a
document
without any
changes that
were just
made to the
document.

The Versions
command will
allow you to save
only two versions
of a document:
one version of
the original and
one version of
any changes
made to the
document.
A

All versions are


opened
automatically.

The latest
version is
opened
automatically.

The first and


second
versions are
opened
automatically.

The previous
version is
opened
automatically.

Dictionary

Grammar
check

Thesaurus

Word displays a
list of the dates
and times each
file was saved.

The most
recent version
will appear at
the bottom of
the list.

Spell check
Word will
show the
name of the
person who
saved each
version.

Fields

Tools

Forms

Insert

Check boxes

Toggle button Text fields


Comments
can be
edited or
deleted by
right
clicking the
Comments
highlighted
Comments
cannot be
cannot be edited. deleted.
text.
Text which
Text at the
Numbers which appear at
the top of
bottom of every appear on
page
every page
every page

Press tab.
text.
header/footer.

Press Return.
graphics.
bibliography.

Copy button

Paste button

Copy and
paste.
forms.
find/search.
Format
Painter
button

Word is not able


to tell the most
recent version of
a document.
A
C

A drop-down list B

Comments can
be edited or
deleted by left
clicking the
highlighted text.

None of the
above

Insert page
break.
numbers.
macro.

D
C
A

This action is not


possible.
C

Fault Finding
Insert

Error
Bug Squashing Injecting
Tools
Format

a section of
white text on a
black
background.

a section of text
where the first
letter of each
sentence is
lowercase and
the rest are
uppercase.

setting it in
larger type or
font size.

typing it all in
capital letters.

the guidelines
used to
establish
where
different
elements of
the newsletter
will go.

Debugging
Edit

an enlarged
capital letter at
the beginning of
a paragraph.
A

underlining
the text of the changing the
pull quote.
color.
A grid is a set
of horizontal
and vertical
A dropped
cap is a word lines that
determine the
that starts
placement of
The reverse
A pull quote is a with a
elements in a
technique means quotation taken lowercase
to add dark text from (pulled)
letter when it newsletter or
on a light
from another
should have a other
background.
document.
capital letter. document.
The tab spacing
The width of
The height of
The number within each
each column
each column
of columns
column
6
10
12
72

One

2 inches

3 inches

Four
Press
Shift+Enter to
force a line
break.
A sans serif
A serif font at font at 45
20 points
points
It depends on
the left and
right margins,
and how many
columns are
4 inches
specified.

6 point

10 point

15 point

2 inches.

2 inches.

3 inches.

Two
Press
Press Ctrl+Enter Ctrl+Shift+Ente
to create a page r to create a
break.
column break.
A sans serif
A serif font at 10 font at 10
points
points

D
C

Three
Press Enter
to create a
section
break.

25 point
impossible to
determine.

D
D

Word cannot
display columns
You have not during editing;
You have not
specified
you will see them
You are not in inserted a
continuous
only when you
Print Layout
column section section
print the
break..
breaks.
document.
A
view.
to move a
section of text
to leave an
from the
original section
original
of text in place
location to
while pasting a
to store a file on to store a file
another
the hard drive
on a diskette
location
copy elsewhere D
A set of
Data about a set
different
None of the
of similar things Mainly text
graphics
above
B
Grammar
Find and
Thesaurus
Replace
B
Spell Checker Checker

Q_id

Q_desc

Op1

Op2

Op3

Op4

Ans

an instruction that has


been transferred from
memory
Exception reporting
AGP Card

C
C
B

End-of-file and end-ofreel code

Printed output

Control totals for one or


more fields
Storing information on the
hard disk

None of above

Voice answer back

Visual audio board

None of above

Boundary protection

File protection ring

Limited access files

BC1
BC2
BC3

The memory address register is used to store


Inefficient usage of excess computer equipment can be controlled by
Which of the following is not the component of a CPU

data to be transferred to
memory
Contingency Planning
NIC Card

data that has been transferred


from memory
System feasibility report
VSAT

BC4

A trailer label is used on a magnetic tape file, it is the last record and summarises the file.
The following is an information not found in the trailer label

Record Count

Identification Number

Writing on a hard board


Voice activated
broadcasting
Validity check

the address of a
memory location
Capacity Planning
RAM

BC5

Hard copy is a term used to describe...?

BC6
BC7

What do the abbreviations VAB stand for


What control would prevent the accidental erasure of customer information from a magnetic
tape

BC8
BC9
BC10

What are the individual dots which make up a picture on the monitor screen called?
Header label normally include all the following except the
A daisy wheel is a type of...?

Coloured spots
File Name
Printer

Pixels
Identification number
Storage device

Pixies
Reel Number
Pointing device

None of above
Batch Total
None of above

B
D
A

BC11

Which approach or technique is a control usually associated with microcomputers

System Logs

Physical Security

Data Dictionary

An ink pen

Console Log
An inked ribbon and
print head

Separation of duties
A cartridge
A print head
Volume
Read
Magnetic tape

Use only unremovable media


Paper
A drum
Centralised function for PC
acquisition
A drum
A laser beam
Size
W rite
PAN drive

Require user passwords


Eraser
A ribbon
Centralised function for
PC Disposition
A ribbon
An INK RIBBON
Storage capacity
Read and Write
Floppy disk

None of above
Make duplicate copies
of files
None of above
A cassette
Distributed policies or
procedures
None of above
None of above
None of above
None of above
None of above

Magnetic tape is a...?


Hard disks can have a storage capacity in the region of...?

Serial access medium


1.44MB

Random access medium


20 GB

A parallel access medium


700MB

None of above
None of above

A
B

Which storage device has the largest capacity in Mb?


Which storage device cannot be erased?
You can ________ protect a floppy disk
Where should floppy disks be stored?
The contents of these chips are lost when the computer is switched off?
What are responsible for storing permanent data and instructions?
Which parts of the computer perform arithmetic calculations?
What are small high speed memory units used for storing temporary results?
How many bits of information can each memory cell in a computer chip hold?
What type of computer chips are said to be volatile?

A CD-ROM
A CD-ROM
Read
By a sunny window
ROM chips
RAM chips
ALU
CPUs
0 bits
RAM chips

A floppy disk
A floppy disk
W rite
By magnet objects
RAM chips
ROM chips
Registers
Registers
1 bit
ROM chips

Magnetic tape storage


Magnetic tape storage
Read and Write
In a drawer
CDROM chips
DRAM chips
Logic bus
Control unit
8 bits
CACHE

C
A
B
C
B
B
A
B
B
A

A parallel access medium


Business software and
games software
Mainframe computer
Jon Von Neumann
computers
Hoover generation
Fourth generation
Fifth generation
Fifth generation
Fifth generation

None of above
None of above
Not
None of above
None of above
None of above
None of above
None of above
None of above
None of above
A selective access
medium
None of the above
None of above

B
B

None of above
None of above
None of above
None of above
None of above
None of above

B
A
C
C
B
A

BC12

An impact printer creates characters by using...?

BC13
BC14
BC15

The best security control in a microcomputer environment is to


What would you NOT use with a flatbed plotter?
What do you need for an ink jet printer?

Electrically charged ink


Restrict physical
access
A pen
A cartridge

BC16
BC17
BC18
BC19
BC20
BC21

The greatest control exposure in a microcomputer environment is the lack of


What do you need for an ink jet printer?
A laser printer does NOT use?
The amount of data that a disk may contain is known as the disks...?
You can ________ protect a floppy disk.
Information on a hard disk is usually backed-up using a...?

BC22
BC23
BC24
BC25
BC26
BC27
BC28
BC29
BC30
BC31
BC32
BC33

C
A
C
A
A
A
C
C
B
A

BC34

Magnetic tape is a...?

BC35
BC36

Software can be divided into two areas:


Travel agents use this computer system when reserving flights

Serial access medium


Network software and
security software
Supercomputer

Random access medium


Systems software and
application software
Personal computer

BC37
BC38
BC39
BC40
BC41
BC42

Which computers are used in the weather forecasting industry?


Vacuum tube based electronic computers are...?
Which generation of computer was developed from microchips?
Which generation of computer uses more than one microprocessor?
Which generation of computer developed using integrated circuits?
Which generation of computer developed using solid state components?

Notebook computers
First generation
Second generation
Second generation
Second generation
Second generation

Supercomputers
Second generation
First generation
Third generation
Third generation
Third generation

BC43

Name three steps involved in developing an information system

Specification, Design,
and Testing

Programming, Design, and


Testing

Analysis, System Design,


and Implementation

None of above

BC44

How do you define analysis of an information system?

Analysis translates
program code of a high
level language to
machine code

Analysis is the loading of


programs that perform
routines to control peripheral
devices

This involves looking at


a system and finding
out how information is
being handled

None of above

BC45
BC46

What areas need to be considered in the SOFTWARE design process?


What is the function of systems software?

Only hardware and


software
To collect data

Inputs, outputs, file design


hardware, and software
To execute any programs

Maintenance, reliability,
and upgradeability
To maintain security

Formatting a disk results in all the data being...?

Copied from the disk

Saved to the disk

BC48

What is Direct Implementation?

Deleted from the disk


Users operate the
manual system and
computer system at the
same time

None of above
None of the above
Transferred from the
disk

B
D

BC47

Users operate the


computer system from a
given date

Users operate the manual


system

None of above

What is parallel running?

The new system is


introduced alongside
the existing system

The new system is introduced


and users start operating it

None of above

What documents are produced during the development of a system?

Instructions and
technical documentation

Log files and temporary files

Users continue operating


the old system
User Guide and
technical
documentation

None of above

To enable any printer to be


connected to the network
Network systems and
communication services
CD-ROM

User guides cover how


to run the system, enter
data, save, print, etc.
Database systems and
backup services
floppy disk

None of above

None of the above


Hard disk

A
B

None of the above


Control Bus
MAD
Control Bus
Shells, compilers
and other useful
system programs.
alphanumeric form
represented 127
characters
32 bits

B
A
B
D

B
A
D

BC49

BC50

BC51

What are User Guides are used for?

BC52
BC53

Systems software can be categorised into:


Which storage device cannot be erased?

BC54
BC55
BC56
BC57

Application software are programs that are written


Which bus carries information between processors and peripherals?
Convert the decimal number 2989 to Hexadecimal
Which bus controls the sequencing of read/write operations?

For technical support


Operating systems
and system services
Magnetic tape storage
To maintain a backup
copy of all the
information
Data bus
FDDI
Data bus

To help someone who is


To do a particular task.
applying for employment
Auto bus
Address bus
BAD
TED
Auto bus
Address bus
Data structures that are
Peripherals that are
Operating system routines that part of the kernel of an
connected to a computer. execute in supervisor mode.
operating system.
binary form
ASCII code form
decimal form
represented 256
were 7 bits
8 bits
characters
4 bits
8 bits
16 bits
More than 1000 mega
bytes
1000 kilobytes
230 bytes

BC58
BC59

What are utilities?


Numbers are stored and transmitted inside a computer in

BC60
BC61

The original ASCII codes


A Nibble corresponds to

BC62

A gigabyte represents

BC63

A 32-bit processor has

32 I/O devices

32 Mb of RAM

BC64
BC65
BC66

A parity bit is
he contents of these chips are lost when the computer is switched off?
Clock speed is measured in

32 registers
used to indicate
uppercase letters
ROM
bits per second

1024 bytes
a 32-bit bus or 32bit registers

used to detect errors


RAM
baud

BC67

Cache memory enhances

memory capacity

memory access time

is the first bit in a byte


DRAM
bytes
secondary storage
capacity

is the last bit in a byte


CROM
Hertz
secondary storage
access time

BC68
BC69

CISC machines
Which parts of the computer perform arithmetic calculations?

have fewer instructions


than RISC machines
ALU

use more RAM than RISC


machines
Registers

have medium clock speeds


Variables

use variable size


instructions
Logic Bus

BC70
BC71
BC72

Every data from the primary memory will be erased if


An RS-232 interface is
For print quality you would expect best results from

BC73

ROM

BC74

A UPS

Power is switched off


a parallel interface
line printer
is faster to access than
RAM
increased the storage
capacity of a computer
system

Computer is improperly shut


down
a serial interface
dot matrix printer

D
A
A
A

D
A

increases the process speed


has more storage capacity
than an ATM card

Data is not saved before


computer is shut down
printer interface
ink-jet printer
stores more information
than RAM
provides backup power
in the event of a power
cut
is an access card for a
security system

LCD displays

SSGA displays

none of the previous

multitasking

writing programs in
multiple languages

none of the previous

writing programs in
multiple languages
Variables
CD-ROM
to run more than one
program at the same
time

none of the
previous
Logic Bus
e-mail

D
B
D

none of the above

none of the previous


none of the
previous
involves using
more than one
processor at the
same time
use a virus protection
program

is non-volatile

BC75

smart card

is a form of ATM card

BC76

Laptop computers use

BC77

Multiprogramming refers to

BC78
BC79
BC80

Multitasking refers to
What are small high speed memory units used for storing temporary results?
A good way to exchange information that changes rapidly is through

CRT displays
having several
programs in RAM at
the same time
having several
softwares running at the
same time
ALU
brochures

the ability to run 2 or more


programs concurrently
Registers
magazines

BC81

Multiprogramming is a prerequisite for

multitasking

an operating system

All of the above


a modem interface
laser printer.
is used for cache
memory

D
B
D

none of the previous


contains a
microprocessor

BC82

Timesharing is the same as

multitasking

multiprogramming

multiuser

BC83

Virtual memory is

related to virtual reality

a form of ROM

a form of VRAM

BC84

Multiprocessing is

same as multitasking

same as multiprogramming

multiuser

BC85

To help keep sensitive computer-based information confidential, the user should

save the file

set up a password

make a backup copy

BC86

What is the function of a disk drive?

to calculate numbers

to read from or write


information to a floppy disk to print sheets of paper

BC87
BC88

A 4GL is
A nanosecond is
What small, hand-held device is used to move the cursor to a specific location on the
screen?

Uses Cobol
106 sec

uses Java
103 sec

uses C++
1012 sec

to display information
or pictures on a
screen
none of the
previous.
109 sec

a keypad

a mouse

a frog

a message pad

BC89

C
D

D
B

B
D
D

BC90

The memory address register is used to store

data to be transferred to
memory

data that has been transferred


from memory

the address of a
memory location

an instruction that
has been transferred
from memory.

BC91

The memory data register is used to store

data to be transferred
to or from memory

data to be transferred to the


stack

the address of a memory


location

an instruction that
has been transferred
from memory

BC92

The instruction register stores

an instruction that has


been decoded

an instruction that has been


fetched from memory

an instruction that has


been executed

the address of the


next instruction to
be executed

BC93

a cursor

a scroll bar

a light pen

a magic marker

BC95
BC96

Which of the following is used to indicate the location on the computer monitor?
A mathematical procedure that can be explicitly coded in a set of computer language
instructions that manipulate data.
Which of the following translates a program written in high-level language into machine
language for execution?
Detecting errors in real memory is a function of

BC97

To find where a file has been saved on disk, the user should

BC98

A series of instructions telling the computer how to process data or files is defined as a

BC99

To ensure that data is not lost if a computer system fails, the user should

BC100

Multiprocessing

Time sharing

Multiprogramming

Multiplexing

ROM
Firmware

RAM
Word Processor

Floppy Disk
Telephone modem

Magnetic Disk
Shareware

B
C

BC103

Having a single CPU alternatively process tasks entered from multiple terminals is called
The place in the CPU where the data and programs are temporarily stored during
processing is called the
All are examples of computer software except
Computer manufactures are now installing software programs permanently inside the
computer. It is known as

Firmware

Word Processor

Telephone modem

Shareware

BC104
BC105

Which of the following file organisation forms most efficiently allows access to a record
The part of the computer system controlling data manipulation is called the

Sequential
Operating System

Hashed
ALU

Indexed
CPU

C
B

Tracks and Sectors


Character, field,
database

Blocks and Sectors

Files and Tracks

Random
Primary Storage
Schema and
subschema

Database, character, record

File, record, field

Element, field, file

BC94

BC101
BC102

BC106

For direct access storage devices the recording area is divided into

BC107

The data hierarchy from the largest to the smallest is

BC108

Which of the following hardware or software system controls provides a detailed record of
all activities performed by a computer system

Formula

Algorithm

Program

Data

Assembler
Memory protection
use the directory
search tools

Compiler
Parity Checking

Artificial Intelligence
Range checking

Parity Checker
Validation

B
B

search each file in turn

use the backup facility

use find and replace

Network
save copies of the file
with the same name on
the system

Program

System

Modem

use different filenames on the


system

keep a record of computer


failures

backup to a secure
medium

Valid character check

Maintenance diagnostic
program

Systems logs

Parity check

Sound card.

CD-ROM

MIDI interface

Serial interface

BC110

Which one of the following parts of a computer is necessary to enable it to play music?
An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures,
15 minutes of sound and 1 minute of video. Which of the four different media listed takes up
most space on the CD-ROM?

Text

Pictures

Sound

Video

BC111

Which one of the following printers is suitable for printing sprocket fed carbon copies?

Laser

Dot matrix

Ink-jet

Drum

BC112

Multimedia software can be most productively used for

viewing an
encyclopaedia CDROM.

creating the plans for a


building design.

presenting an order for


stock to a warehouse.

recording current
stock in a supermarket
and answering
customer queries.

BC113

replaced regularly

never updated

updated regularly

updated once a year

Document processor

Graphics package
retain confidentiality of
files
4096
virus infection
IPX/SPX

Spreadsheet

simplify file structures


8192
loss of data
NetBEUI

C
C
D
A

the operating system


is easy to use
the hard drive

B
D

uniform page source

BC109

BC114

To be effective a virus checker should be


Which one of the following software applications would be the MOST appropriate for
performing numerical and statistical calculations?

BC115
BC116
BC117
BC118

Passwords enable users to


12. How many bytes do 4 Kilobytes represent?
Back up of the data files will help to prevent
Which one of the following is the MOST common internet protocol?

Database
get into the system
quickly
512
loss of confidentiality
TCP/IP

make efficient use of time


1024
duplication of data
HTML

BC119
BC120

The advantage of a PC network is that


The term A:\ refers to

access to the internet is


quicker
a file name

files can be shared


a subdirectory

BC121

UPS stands for

universal port serial

up-line provider service

printer can do 1000s of


pages a day
the root directory
uninterruptable power
supply

BC122

The main problem associated with uninstalling software is that


You are conducting research for a Income Tax assignment. The raw facts you collect are
called

orphan files can be


left on the system

the program executable may


not allow it to be uninstalled

the system requires a


network administrator to
uninstall it

the system always


requires a re-boot
and defrag afterwards

BC123

documents.

information.

text.

BC124

A flow chart is the

data.
Graphical
representation of
logic

Rules writte in procedural


language

Logical Steps in any


language

None of the above

Purchase, sales,
receipt, payments etc.

To fill the log register

speed up access
IT management lacks
leadership.

It is mandatory in tally
prevent unauthorised
access
IT understands the
business

None of the bove

assist in maintenance
senior executive support
for IT.

allow encryption

None of the above

BC125

A voucher entry in Tally is done for

BC126

Passwords are applied to files in order to

BC127

Each of the following is an enabler of IT-business alignment except:


The basic systems model is used to describe virtually all information systems and it consists
of the following elements:

BC128

BC130

A(n) __________ offers a solution package for an entire industry.

input.
output.
The use of computers
to design state-of-theart, high-quality
Using computers to do
products.
architecture.
Application Service
specialist or functional
Provider

enterprise

local

BC131

File extensions are used in order to

name the file

ensure the filename is not lost

identify the file

identify the file type

BC132
BC133

Information systems controls include all of the following EXCEPT:


Hashing for disk files is called
Components of expert systems include: a) inference engine; b) user interface; c) knowledge
base; d) fuzzy logic
Black box testing and white box testing are part of:
What is the term used to describe the point of interaction between a computer and any other
entity, such as a printer or human operator?
The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d)
flexibility

preventive controls.
external hashing

detective controls.
static hashing

corrective controls.
dynamic hashing

All of the above are


parts of IS controls.
extensible hashing

D
A

A: (a) , (b), (d)


corrective controls

B: (a) to (d)
preventive controls

C: (a), (b), (c)


detective controls

D: (b), (c), (d)


general controls

C
C

Component

Interface

Settings

Control

B
C

BC129

BC134
BC135
BC136
BC137

What is a computer-aided design system?

(a) to (d)

Press the reset button.

Select the Shut Down


option from a menu.

(a), (b), (c)


Pull the power cord
from the back of the
computer.
Put your hand up and
ask the teacher

BC139

BC143
BC144
BC145
BC146
BC147

Which is not part of help desk documentation:


Testing of individual modules is known as:
Design phase of CASE tools includes: a) data architecture; b) decision architecture; c)
interface architecture; d) presentation architecture
Which is part of installation testing:
The computer operating system performs scheduling, resource allocation, and data
retrieval functions based on a set of instructions provided by the:

BC148

Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio

BC149
BC150
BC151
BC152
BC153

Which of the following procedures should be included in the disaster recovery plan for an
Information Technology department?
Designing relationships among components is part of:
Several Computers connected together is called:
Which network topology uses a Hub?
Which of the following topologies is used for Ethernet?

BC154

(b), (c), (d)

Which of the following is an acceptable way to shut down the computer?

BC142

None of the above

Turn the computer off at the


power point.

Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best way to locate the files?
Create the files again.
Components of an information system model are: a) applications architecture; b) functional
architecture; c) technology architecture; d) information architecture
Benchmarks form part of:
Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run
totals

All of the above

(a), (c), (d)

BC138

BC140
BC141

processing.
Software that generates
innovated designs and
artistic patterns.

Ask the person next to you.

Use the Find or Search


feature.

(a), (c), (d)


detective controls

(a), (b), (c)


organisational controls

(a) to (d)
preventive controls

(b), (c), (d)


corrective controls

C
C

(a), (c), (d)

(a), (b), (c)

(b), (c), (d)

problem logging
unit testing

call lights
data testing

(a) to (d)
program change
requests
thread testing

resolution procedures
loop testing

C
A

(b), (c), (d)

(a), (b), (d)

(a), (b), (c)

(a) to (d)

system walkthroughs
Job control
language.

benchmark testing

specifications matching

parallel operations

Multiplexer.

Peripheral processors.

Concentrator.

(a) to (d)
Replacement personal
computers for user
departments.
architectural design
Client-server
Star
Star
To maintain a backup
copy of are written all the
information

(b), (c), (d)

(a), (b), (c)

(a), (c), (d)

Identification of critical
applications.
interface design
Client
Bus
Bus
To do a particular job such
as editing, storing
information

Physical security of
warehouse facilities.
procedural design
Computer network
Mesh
Ring

Cross-training of
operating personnel.
data design
Hub
Ring
All of the above

B
A
C
A
D

To help someone who is


applying for employment

To Store data in an
organised manner

BC155

Application software are programs


Which type of file search method requires a computer first read all locations preceding the
desired one

BC156

Which of the following areas of responsibility are normally assigned to a systems


programmer in a computer system environment?

BC157

Which of the following is recommended when many searches for data are required

Direct
Systems analysis and
applications
programming.
A sequential file on a
disk

BC158

It is unlikely that a magnetic tape containing several thousand blocked records can be used
on two machines of different architecture directly because

Tapes can only be read


by the machine on which
they are written

BC159

Which component of the CPU has the most influence on its cost versus performance

BC160

Which of the following terms applies to network used to connect computers with other
computers, peripherals and workstations that are in fairly close proximity

Sequential

Binary

Indexed

Data communications
hardware and software.

Computer operations.
A direct access file on
a tape

A sequential file on a tape

Operating systems and


compilers.
A direct access file on a
disk

Parity errors will result

Information formats
commonly vary between
architectures

Data record can never


be blocked together

Data path part

Control Unit

Address calculation part

Input output channel

Distributed systems

Local Area network

Wide area network

Protocol

Use the computer to which


they are connected to perform
all processing operations

Generally require a
keyboard for data entry and
a CRT for display

Are required with a


microprocessor
which permits some
data processing
such as input
validation

BC161

Intelligent terminals differ from dumb terminals in that they

Can send data to a


computer and receive
data from a computer

BC162

A computer is to be linked to 8 terminals using a single communication link. To permit


simultaneous terminal operations, communication path will require which of the following

Mixer

Modem

Multiplexor

Time sharing
computer

Allows computer
signals to be send
over a telephone line

Aids in back-up procedures

Packs data in a disk file

Speeds up online
printing

BC163

BC166

A modem is a device that


A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives
and printers. This type of network is called a
A computer based system for sending, forwarding, receiving and storing messages is
called an
If a workstation contains a processor, monitor, screen manipulation device, printer, storage
and communication capabilities, it is said to be

BC167

Terminal hardware controls include

BC164
BC165

BC168

RS-232 is a

BC169

What is a compiler?

BC170
BC171

What are the stages in the compilation process?


Which of the following is not a data transmission coding scheme

BC172
BC173

What is the definition of an interpreter?


A device used in data communications to divide a transmission signal into several subbands is known as a

BC174

Third generation languages such as COBOL, C, and FORTRAN are referred to as

Planetary network

Ring Network

Loop Network

Star Network

Office Automation

Executor systems

Electronic mailing

Instant post-office

A dumb workstation

An intelligent workstation

A personal computer

A mainframe PC

Time of day control locks

Encryption algorithms

Parity checks

All of them

Communication protocol

Device interconnect
standard

None of the above

None of the above


EBCDIC

D
A

None of the above


Time Division
Multiplexor

None of the above

Type of cable

Terminal Standard

Modem

A compiler converts the


A compiler is a general
whole of a higher level
purpose language
program code into machine providing very efficient
code in one step
execution
Lexical analysis,
Implementation and
CONVERSION, and code
documentation
generation
Baudot
ASCII
An interpreter is a general
An interpreter is a
purpose language
representation of the system
providing very efficient
being designed
execution
Frequency division
Demodulator
multiplexor

High-level languages

Middle-level languages

It is less error prone

Graphic design and education

A compiler does a
conversion line by line as
the program is run
Feasibility study, system
design, and testing
CRC
An interpreter does
the conversion line by
line as the program is
run

Low-level languages

BC175

Serial Communication is used over long distance because it

The primary function of a front-end processor is to

Communicate with the


console operator

None of the above


Reduce competition
between the
input/output devices

BC177

It is less prone to
attenuation
Accounting systems,
commercial sector
Relieve the main CPU
Manage the paging function in of repetitive
a virtual environment
communication tasks

In what areas is the COBOL programming language used?

It is faster than parallel


communication
Financial sector and
engineering

Uses only one path

BC176

BC178

What is the first stage in program development?

Specification and design

System Analysis

Testing

None of the above

BC179

Which of the following is not used for data transmission within a local area network

Fiber Optics

Coaxial Cable

Common carrier
System Analysis
involves creating a
formal model of the
problem to be solved
A buffer

Telephone Lines

None of the above


An online protocol

C
B

None of the above


Bus
None of the above
Hash Count
None of the above

B
B
C
A
A

Acoustic coupler
None of the above

C
B

All of them
secondary storage
access time
None of the above
alphanumeric form
None of the above
32 bits

BC180
BC181

What is System Analysis?


A device to device hardware communication link is called

BC182
BC183
BC184
BC185
BC186

What will a good software provider consider?


The topology of a network can be each of the following except
What is the 8-bit binary value of the decimal number 85?
Which is the most common data transmission error checking method
What is the decimal value of the binary number 1111?

The design of the screen System Analysis defines the


the user will see and use format and type of data the
to enter or display data
program will use
A cache
An interface
Testing to check for errors
before the system is
The different types of
network to be used
introduced
Star
Packet
10101010
1100101
Parity
Retransmission
15
4

BC187
BC188

Which of the following devices merges communication signals onto a single line
What is the decimal value of the octal number 215?

Port
327

Modem
141

BC189

Which tool is used to help an organization build and use business intelligence?

Data warehouse

Data Mining tools

BC190
BC191
BC192
BC193
BC194

Cache memory enhances


What is the decimal value of the hexadecimal number FF?
Numbers are stored and transmitted inside a computer in
What is the hexadecimal value of the decimal number 1476?
A byte corresponds to

memory access time


255
ASCII code form
1B7
8 bits

BC195
BC196
BC197
BC198
BC199

What does EBCDIC coding of numbers mean?


A Kb corresponds to
What is the binary sum of 01011 and 00101?
Information is stored and transmitted inside a computer in
Where would you find the letters QWERTY?

Binary Coded Decimal


1000 bytes
1112
ASCII code form
Keyboard

Bit Code Design


210 bits
1110
decimal form
Numeric Keypad

None of the above


210 bytes
None of the above
alphanumeric form
None of the above

D
A
A
A
A

BC200

A parity bit is

used to detect errors

is the first bit in a byte

is the last bit in a byte

BC201
BC202
BC203
BC204
BC205

How did the computer mouse get its name?


Clock speed is measured in
What are you most likely to use when playing a computer game?
CPU performance may be measured in
A digitising tablet can be used for?

memory capacity
30
binary form
4C5
4 bits
Basic Coding
Description
1024 bits
10000
binary form
Mouse
used to indicate
uppercase letters
Because it squeaks
when moved
bits per second
Touch screen
BPS
Printing letters

Multiplexor
97
Data management
systems
secondary storage
capacity
256
decimal form
5C4
16 bits

Its moves like a mouse


baud
Light pen
MIPS
Tracing diagrams

It has ears
bytes
Joystick
MHz
Reading bar codes

None of the above


Hertz
None of the above
VLSI
None of the above

D
D
C
B
B

BC206
BC207

In processing cheques which of the following I/O techniques have banks traditionally used
Which of the following is a pointing device used for computer input?

MICR
Hard disk

B
A

A UPS

none of the previous

BC209
BC210

Refillable ink
100K

Pencil lead
1.44 Mb

None of the above


1 Gb

C
B

BC211
BC212
BC213
BC214
BC215
BC216
BC217

What does a light pen contain?


The capacity of a 3.5 floppy is around
What general term describes the physical equipment of a computer system, such as its
video screen, keyboard, and storage devices?
Where would you find the letters QUERTY?
What are you most likely to use when playing a computer game?
A digitising tablet can be used for?
Which of the following is a pointing device used for computer input?
What input device could tell you the price of a product
Where would you find a magnetic strip?

barcode scanning
CD-ROM drive
provides backup power
in the event of a power
cut
Light sensitive
elements
5 Mb

voice recognition
None of the above

BC208

OCR
Touch screen
increased the storage
capacity of a computer
system

hardware
Mouse
Touch screen
Printing letters
Touch screen
Mouse
Credit card

software
Keyboard
Light pen
Tracing Diagrams
Hard disk
Bar code reader
Mouse

Hard copy is a term used to describe...?

Writing on a hard board

Printed output

input
Printer
Scanner
Digital Signatures
CD ROM Drive
Keyboard
Printer
Back-up on a
Cartridge

A
B
C
B
A
B
A

BC218

output
Numeric Keypad
Joystick
Reading Bar Codes
Keyboard
Optical mark reader
Speakers
Storing information on the
hard disk

BC219
BC220
BC221
BC222

What are the individual dots which make up a picture on the monitor screen Called
A daisy wheel is a type of...?
What input device can be used for marking a multiple-choice test?
Laptop computers use

Coloured spots
Printer
Mouse
CRT displays

Pixels
Storage device
Bar code reader
LCD displays

Pixies
Pointing device
Optical mark reader
SSGA displays

QWERTY is used with reference to


What input device could tell you the price of a bar of chocolate?

screen layout
Mouse

mouse button layout


Bar code reader

keyboard layout
Optical mark reader

Pickers
CD-ROM
None of the above
none of the previous
word processing
software
None of the above

B
A
C
B

BC223
BC224
BC225
BC226

A GUI is
Where would you find a magnetic strip?

language interpreter
Speakers

software interface
Smart card

an operating system
None of the above

C
A

BC227

Multiprogramming refers to

hardware
Credit card
having several
programs in RAM at
the same time

multitasking

writing programs in
multiple languages

none of the previous

BC228

Multitasking refers to

having several programs


in RAM at the same time

The ability to run 2 or more


programs concurrently

none of the previous

BC229

Multiprogramming is a prerequisite for


UNIVAC Computer belongs to the
Timesharing is the same as
Name the first Indian Super Computer?

an operating system
Second - generation
computers.
multiprogramming
Deep Blue

none of the above


Fifth - generation
computers.
none of the previous
Arjun

BC230
BC231
BC232

multitasking
First - generation
computers.
multitasking
Vishwajeet

BC233

is caused by wear
Bar code Reader
Technology

caused by overuse
Optical Mark Reader
Technology

none of the previous


Image Scanning
Technology

BC234

Disk fragmentation
The technology which is used to check answer sheets of multiple-choice questions in civil
services or similar examinations is: -

BC235
BC236
BC237

A compiler is
Which printer among the following is fastest
Zipping a file means

C
A
C

What does acronym VIRUS stands for

slower than an interpreter


Dot - Matrix Printer
decrypting it
Vital information resource
under siege

none of the previous


Thermal Printer
transmitting it

BC238

a fast interpreter
Drum Printer
encrypting it
Very important reader
user sequence

writing programs in
multiple languages
To run more than one
program at the same
time
Third - generation
computers.
Multi-user
Param
is due to bad disk
blocks
Magnetic Ink Character
Recognition Technology
converts a program to
machine code
Desk - jet Printer
compressing it
Virtual information reader
& user system

BC239

An impact printer creates characters by using...?

Electrically charged ink

Thermal Paper

An ink pen

None of above
An inked ribbon
and print head

BC240
BC241

A client-server system is based on


A nanosecond is
A procedural control used to minimize the possibility of data or program file destruction
through operator error is the use of

mainframe technology
10-6 sec

LAN technology
10-3 sec

WAN technology
10-12 sec

Unix operating system


10-9 sec

B
D

Limit checks

Control figures

External file labels

Cross footing tests

application
project
multiprocessing

system
model
multithreading

operating system
pilot project
multiplexing

communication
process
multitasking

D
D
D

mainframes

super computers

micro computers

none of the above

BC247
BC248

_______ software enables users to send and receive data to/from remote computers
A _____ is a running instance of an application
Splitting of CPU's time for different tasks _______ prevents time slicing
______ computers are used in large organizations for large scale jobs which have large
storage capacities
_______ is responsible for all calculations and logical operations that have to be performed
on the data
______ printer use laser light

control unit
band printer

arithmetic and logic unit


drum printer

central processing unit


non impact printer

none of the above


none of the above

B
C

BC249

______ software enhances the user to enter ,store, manipulate and print any text

data management

word processing

electronic spreadsheet

none of the above

BC250
BC251
BC252
BC253

integrated software
my computer
field
assembly language

communication software
recycle bin
file
machine language

idea processor
Microsoft exchange
record
high level language

none of the above


none of the above
none of the above
none of the above

B
B
C
B

terminator symbol
PC-at
multiprocessing

processed symbol
hp vectra system
multithreading

connector symbol
fazitsu vp200 series
multiplexing

input/output symbol
IBM-PC
none of the above

B
B
D

BC257

______ software enables users to send and receive data to/from remote computers
_______ is the temporary storage place for deleted files
_____ is a collection of related fields
_____ language consists of strings of binary numbers
______ symbol is used to represent processes like assigning a value to a variable or adding
a number
_______ is an example for micro computer
_________capability supports concurrent users doing different tasks
The ______ do not have processing power of their own and has only a screen, keyboard and
the necessary hardware to communicate with the host. For this reason, the terminals are
referred as_______________

"dumb terminals"

dumb servers

dummy terminals

dummy servers

BC258
BC259

A______is nothing but a PC with a network operating system


_____system is responsible for handling the screen and user I/O processing

wan
host

distributed computing system


server

windows NT
back end

LAN
front end

D
D

BC260

The______ handles data processing and disk access in a Client/Server architecture

host

server

back end

front end

BC261

Both the DBMS and the application resides on the same component in a ____system
When all the processing is done by the mainframe itself, the type of processing is
sometimes called as
DBMS models can be grouped under____ categories

PC

LAN

distributed computing

centralized

server processing
four

host processing
one

dumb processing
two

file management system

hierarchical database system

network database system

data processing
many
relational database
system

BC265

______is the most advantageous database system


A new user initiates a new process of execution at the background,while the user can
continue his query process as usual in the foreground. This situation is referred to as
______

multiprocessing

multithreading

multiplexing

none of the above

BC266

The process of data being automatically written to a duplicate database is called______

repairing

redo logging

disk defragmentation

disk mirroring

BC242
BC243
BC244
BC245
BC246

BC254
BC255
BC256

BC262
BC263
BC264

increases the process speed

Hardware, Software and


size of program.
Ring
1010101
Cyclic Redundancy
64

B
B
A
A
B

C
B

A
A
C

B
A

BC267

Modem stands for __________ .

Code/De-code

Modulation/Demodulation

Module/De-module

None of the above

BC268
BC269
BC270
BC271

Multiple changes to the same record or a field are prevented by the DBMS through______
_________allows an application to multitask within itself
LAN stands for __________ .
New process of execution is referred to as______

None of the above.


None of the above.
all of the above
None of the above.

C
B
D
B

Transfer control
protocol/Internet protocol
Cells
System modulation
transfer protocol

Transfer communication
protocol/Internet protocol
Bits
Software Mail transmission
protocol

constraints
multiplexing
Local array of networks.
thread
Integrated Services
Digital network.
ARPANET
SQL * plus
GAN
Transmission control
protocol/Internet
protocol
Packets
Simple Mail transfer
protocol

B
B
B
C

ISDN stands for _______.


_____________ is the Worlds largest computer network .
_______is/are a popular front end tool
When LAN connected together ,it is called __________ .

locks
multithreading
Local area networks
process
Integrated Symbolic Digital
networks.
Internet
power builder
W AN

traps
none of the above
None of the above
client-server

BC272
BC273
BC274
BC275

fixes
multiprocessing
Linear area networks
task
Integrated system
dynamic networks.
Ethernet
visual basic
MAN

None of the above.


None of the above.

C
C

None of the above.

Transfer Protocol
Aggregate transfer
mode

Transmission protocol
Asynchronous transfer
mode

Hyper text

None of the above.

Area transfer mode

None of the above.

File server
platform

Printer server
configuration

Receiver
package

None of the above.


system

B
A

LAN and W AN
ATM
Internal Services Design
Network

LAN and MAN


Internet
Integrated Services
Digital Network

LAN WAN and MAN


Intranet

B
A
C

Web based Technology


Routers
batch
alpha beta

Web based Transport


Protocol
command
numerous alpha

None of the above.


Web based
Transaction
Repeaters
program
number and alpha

BC276
BC277

TCP/IP stands for _________ .


Data is broken into small unit called __________ .

BC278

SMTP stands for __________ .

BC279

The __________ protocol is a network protocol to be built for the World Wide Web .

BC280
BC281
BC282

ATM stands for __________ .


The computer which can receive data from other computers on the network and print it is
_______
The hardware and the software requirements together form the_____

BC283
BC284

ATM, Asynchronous transfer mode is a __________ technology.


__________ is designed telephone system

BC285

Expansion of ISDN is ________

MAN and WAN


ISDN
Internal Services Digital
Network

BC286
BC287
BC288
BC289

Expansion of WBT is ______________


_________ connects LANs.
Collection of instruction is called a _____
Combination of alphabetic and numeric data is called _____ data

W eb based Training
Bridges
procedure
alpha numeric

A
B
D
A

BC290
BC291
BC292

Computers can be classified based on ______,______and _______


_________ are used in large organizations for large scale jobs
_______ is responsible for feeding data into the computer

space occupied, price,


no. of users allowed
mini computers
input

cost, performance their ratio


microprocessors
output

size, performance, cost


PCs
feed

BC293
BC294
BC295

input, output,
performance ratios
mainframes
write

C
D
A
D
D
D

_______ printers use light to produce the dots needed to form pages of characters

impact printers

drum printers

multiplexing
converter
ram
non-impact desktop
printers

multitasking
process
output

BC296

BC297

_______ is the capability of the o/s to run numerous applications simultaneously


_______ involves conversion of raw data into some meaningful information
_______ is responsible for obtaining the processed data from the computer

Hardware components in a computer are _____,____,_____,______

multiprocessing
interpreter
input

operating system,
bootstrap, kernel, shell

multithreading
compiler
processor

control program, interpreter,


assembler, compiler

monitor, program,
keyboard, bus

CPU, memory,
input, output

BC298

_______ software are programs that are complex and can be developed or purchased

operating system

application software

windows 95

interpreter

BC299
BC300

thermal printers

D
B

_______ is a set of special instructions used to communicate effectively with the computer
_______ converts a high level language into machine language

batch
processor

protocols
compiler

software's
assembler

procedures
coder

BC301

_______ translates assembly language program into machine language instructions

BC1

compiler
Integrated system
dynamic networks.

interpreter
Integrated Symbolic Digital
networks.

assembler
Integrated Services
Digital network.

None of the above.

BC10
BC11

ISDN stands for _______.


The computer which can receive data from other computers on the network and print it is
_______
The hardware and the software requirements together form the_____

File server
platform

Printer server
configuration

Receiver
package

None of the above.


system

B
A

BC12
BC13

ATM, Asynchronous transfer mode is a __________ technology.


__________ is designed telephone system

LAN and W AN
ATM
Internal Services Design
Network

LAN and MAN


Internet
Integrated Services
Digital Network

LAN WAN and MAN


Intranet

B
A

C
B

processor

BC14

Expansion of ISDN is ________

MAN and WAN


ISDN
Internal Services Digital
Network

BC15
BC16
BC17
BC18

Expansion of WBT is ______________


_________ connects LANs.
Collection of instruction is called a _____
Combination of alphabetic and numeric data is called _____ data

W eb based Training
Bridges
procedure
alpha numeric

Web based Technology


Routers
batch
alpha beta

Web based Transport


Protocol
command
numerous alpha

None of the above.


Web based
Transaction
Repeaters
program
number and alpha

A
B
D
A

BC19
BC2
BC20
BC21

Computers can be classified based on ______,______and _______


_____________ is the Worlds largest computer network .
_________ are used in large organizations for large scale jobs
_______ is responsible for feeding data into the computer

space occupied, price,


no. of users allowed
Ethernet
mini computers
input

cost, performance their ratio


Internet
microprocessors
output

size, performance, cost


ARPANET
PCs
feed

input, output,
performance ratios
None of the above.
mainframes
write

C
B
D
A

BC22
BC23
BC24

_______ is the capability of the o/s to run numerous applications simultaneously


_______ involves conversion of raw data into some meaningful information
_______ is responsible for obtaining the processed data from the computer

multiprocessing
interpreter
input

multithreading
compiler
processor

D
D
D

_______ printers use light to produce the dots needed to form pages of characters

impact printers

drum printers

multiplexing
converter
ram
non-impact desktop
printers

multitasking
process
output

BC25

thermal printers

BC26

Hardware components in a computer are _____,____,_____,______

operating system,
bootstrap, kernel, shell

control program, interpreter,


assembler, compiler

monitor, program,
keyboard, bus

CPU, memory,
input, output

BC27

_______ software are programs that are complex and can be developed or purchased

operating system

application software

windows 95

interpreter

BC28
BC29
BC3

_______ is a set of special instructions used to communicate effectively with the computer
_______ converts a high level language into machine language
_______is/are a popular front end tool

batch
processor
visual basic

protocols
compiler
power builder

software's
assembler
SQL * plus

procedures
coder
all of the above

C
B
D

BC30

_______ translates assembly language program into machine language instructions

compiler

interpreter

assembler

processor

BC31
BC32
BC33

_______ software enables users to send and receive data to/from remote computers
A _____ is a running instance of an application
Splitting of CPU's time for different tasks _______ prevents time slicing
______ computers are used in large organizations for large scale jobs which have large
storage capacities
_______ is responsible for all calculations and logical operations that have to be performed
on the data
______ printer use laser light

application
project
multiprocessing

system
model
multithreading

operating system
pilot project
multiplexing

communication
process
multitasking

D
D
D

mainframes

super computers

micro computers

none of the above

control unit
band printer

arithmetic and logic unit


drum printer

central processing unit


non impact printer

none of the above


none of the above

B
C

BC34
BC35
BC36
BC37

______ software enhances the user to enter ,store, manipulate and print any text

data management

word processing

electronic spreadsheet

none of the above

BC38
BC39
BC4
BC40
BC41

integrated software
my computer
MAN
field
assembly language

communication software
recycle bin
W AN
file
machine language

idea processor
Microsoft exchange
GAN
record
high level language

none of the above


none of the above
None of the above.
none of the above
none of the above

B
B
B
C
B

terminator symbol
PC-at
multiprocessing

processed symbol
hp vectra system
multithreading

connector symbol
fazitsu vp200 series
multiplexing

input/output symbol
IBM-PC
none of the above

B
B
D

BC45

______ software enables users to send and receive data to/from remote computers
_______ is the temporary storage place for deleted files
When LAN connected together ,it is called __________ .
_____ is a collection of related fields
_____ language consists of strings of binary numbers
______ symbol is used to represent processes like assigning a value to a variable or adding
a number
_______ is an example for micro computer
_________capability supports concurrent users doing different tasks
The ______ do not have processing power of their own and has only a screen, keyboard and
the necessary hardware to communicate with the host. For this reason, the terminals are
referred as_______________

"dumb terminals"

dumb servers

dummy terminals

dummy servers

BC46
BC47

A______is nothing but a PC with a network operating system


_____system is responsible for handling the screen and user I/O processing

wan
host

distributed computing system


server

windows NT
back end

LAN
front end

D
D

BC48

The______ handles data processing and disk access in a Client/Server architecture

host

server

back end

front end

BC49

Both the DBMS and the application resides on the same component in a ____system

PC

LAN

TCP/IP stands for _________ .


When all the processing is done by the mainframe itself, the type of processing is
sometimes called as
DBMS models can be grouped under____ categories

Transfer control
protocol/Internet protocol

Transfer communication
protocol/Internet protocol

distributed computing
Transmission control
protocol/Internet
protocol

centralized

BC5

None of the above.

server processing
four

host processing
one

dumb processing
two

B
A

BC42
BC43
BC44

BC50
BC51

file management system

hierarchical database system

network database system

BC53

______is the most advantageous database system


A new user initiates a new process of execution at the background,while the user can
continue his query process as usual in the foreground. This situation is referred to as
______

data processing
many
relational database
system

multiprocessing

multithreading

multiplexing

none of the above

BC54

The process of data being automatically written to a duplicate database is called______

repairing

redo logging

disk defragmentation

disk mirroring

BC52

BC55

Modem stands for __________ .

Code/De-code

Modulation/Demodulation

Module/De-module

None of the above

BC56
BC57
BC58
BC59
BC6

Multiple changes to the same record or a field are prevented by the DBMS through______
_________allows an application to multitask within itself
LAN stands for __________ .
New process of execution is referred to as______
Data is broken into small unit called __________ .

constraints
multiplexing
Local array of networks.
thread
Packets
Simple Mail transfer
protocol

B
B
B
C
C

SMTP stands for __________ .

locks
multithreading
Local area networks
process
Bits
Software Mail transmission
protocol

traps
none of the above
None of the above
client-server
None of the above.

BC7

fixes
multiprocessing
Linear area networks
task
Cells
System modulation
transfer protocol

None of the above.

Transfer Protocol
Aggregate transfer
mode

Transmission protocol
Asynchronous transfer
mode

Hyper text

None of the above.

Area transfer mode

None of the above.

BC8

The __________ protocol is a network protocol to be built for the World Wide Web .

BC9

ATM stands for __________ .

q_id

q_desc

OS 01

Which of the following computer software is designed to direct and assist the execution of
application programs

OS 127
OS 131
OS 132

Formatting a disk results in all the data being...?


Which bus carries information between processors and peripherals?
Which bus controls the sequencing of read/write operations?

OS 139
OS 193

Which computers use single chip processors?


CPU performance may be measured in

OS 199

In processing cheques which of the following I/O techniques have banks traditionally used

OS 215

Disk fragmentation

OS 216

A compiler is

OS 217

An interpreter is

OS 219

Zipping a file means

OS 233

An assembly language program is translated to machine code by

OS 234

Which of the following is not part of the processor

OS 276
OS 277

If the Cancel Error Property of the CommonDialog Box is set to true then which of the
following statement is true:
__________ control defaults to displaying the files in the current directory:
A ____________ occurs any time a program writes more information into the temporary
space it has allocated in the memory.
Assessing a system requires certain common tools. Which of the following is NOT a tool
used to assess a system?
The ____________________ Web site has a utility that will tell you what software and
operating system a Web server is running.
When software vendors discover flaws in their software, they usually will write corrections
to their code, known as:
All ____________ have the option of blocking ports.

OS 278

Which of the following is NOT a characteristic of a firewall?

OS 236
OS 238
OS 271
OS 274
OS 275

OS 280

Before shutting a service on an individual machine, which of the following would you
always check?

OS 281

At a minimum, which of the following should be implemented under the protection phase?

OS 282
OS 283

Attacks on your system may be prevented or trapped through the use of:
Setting restrictions as to the number of unique passwords to use before a user can
recycle them is called a password:

OS 284

Which of the following is NOT a step to take in securing a workstation?

OS 286

To prevent a hacker from unauthorized access, what should you do with the administrator
account?

OS 287
OS 289

What should be done with old backup tapes and CDs?


Which of the following is NOT an example of malware?

OS 291

One step you can take to reduce the risk of being infected by a virus is to:

OS 292

Which of the following is NOT a sign that a virus has infected your system?

OS 293
OS 294

Which of the following is the safest way to protect yourself from e-mail viruses?
A ____________ attack causes too much information to be placed into temporary memory
space.

OS 295

____________ gathers user information with the users knowledge.

OS 296

Which of the following is the most common function of spyware?

OS 299

Which of the following is NOT a virus-scanning technique?

OS 300

Which of the following would NOT be a way to protect your system from spyware?

OS 309

For which of the following positions would it be advisable to conduct an extensive


background check?

OS 329
OS 355

Which of the following would you use to open an existing file?


The ability to have multiple applications open at the same time is known as:

OS 356
OS 357

Which of the following can be changed using the Options command?


Which of the following leaves an application open but shrinks the window to a button on
the Windows taskbar?

OS 396

Which of the following actions would move a floating toolbar to dock it in a different place?

OS 397

To display a missing or needed toolbar, click the:

OS 399

Which of the following is NOT a true statement regarding password protection?

OS 495

The Linux operating systems is an example of:

OS 496

The Windows operating systems is:

OS 497

Application service providers offer:

OS 498

A(n) _________ offers on-demand software on an as-needed basis to its clients over the
web.

OS 502

_________ are systems used to interact with customers and run a business in real time.

OS 504
OS 505

The most common cause(s) of disaster is (are):


A _______ backup site is backup facility consisting of an empty warehouse with all
necessary connections for power and communication, but nothing else.

OS239

To destroy an object and free the memory space occupied by it, the keyword used is:

op1

op2

op3
Operating
system
Saved to the
disk
Address bus
Control bus
Super
computers
MHz
barcode
scanning
is due to bad
disk blocks

op4
Database
management
system

Application
Software
Deleted from
the disk
Data bus
Data bus
Personal
computers
BPS

Utility
Programs
Copied from
the disk
Auto bus
Address bus
Parallel
computers
MIPS

OCR
is caused by
wear

MICR
caused by
overuse

a fast
interpreter

converts a
slower than program to
none of the
an interpreter assembly code previous

faster than a
compiler
encrypting it

None of above A
None of above A
None of above C
None of above
VLSI
voice
recognition
none of the
previous

A
B
B
B

translates
and executes
programs
converts a
statement by program to
none of the
machine code previous
B
statement
compressing
decrypting it
transmitting it C
it

an assembler a compiler
the ALU
A runtime
error can
result if the
user clicks
the cancel
button
File List Box
memory
overflow

ans

the CU

an interpreter a linker
the power
None of the
above
cord

The program
executes
A compile time without any
error occurs
error
Dir List Box
Drive List Box
systems
overload
RAM overflow

You need to
carry out
conditional
compilation
Combo Box
buffer
overflow

A
C

A
A
D

Netcop
NetBrute
Netcraft
D
NetBIOS
www.nettools.c www.WhoIs.co www.netcraft.c www.netstat.co
om
m
om
m
C
code correct.
firewalls

patches.
switches

It can consist
of hardware,
software, or
both.

It hides your
network.

updates.
hubs

upgrades.
scanners
It is a barrier
between your
One of its
network and
techniques is the rest of the
packet filtering. Internet.

B
A

That any open Dependencies That you are


applications be on other
not on the
exited
Internet
services
IntrusionAntivirus
detection
software
software
Firewall
an intrusiona network
detection
antivirus
prevention
software.
system.
system.
cycle.
Make sure all
update and
security
patches are
applied.

renewal.
Install and
keep current
antivirus and
anti-spyware
programs.

Delete it and
change the
Delete it from built-in guest
the system and account to a
use the guest power user
account.
account.
Tapes can be
used over and Tapes and
over, and CDs CDs can be
should be kept thrown away in
forever.
the trash.
Trojan horse
Virus
place a router
between your
ISP and your add spyware to
system.
your system.

System acts
abnormal

Update
antivirus
software.
virus
A virus

That you also


shut down
associated
services

Router

a proxy filtering
system.
A

age.

history.

Limit users
ability to
configure the
workstation.
Disable it and
create a
nondescript
user account
with
administrator
rights.

Block all
incoming
traffic on a
network.

Tapes should
be melted and
CDs broken.
IP spoofing
download
files from
reliable Web
sites.

Create another
administrator
account to
confuse the
hacker.
C

Give them to a
recycle shop. C
Spyware
C

hone your
programming
skills.
Problems
with your
wireless
Files are
Printing
missing
problems
mouse
Never open
an e-mail
attachment
unless you
Turn off the
Do not
auto-launch in know what it
is and who
propagate
your e-mail
hoax viruses. client.
sent it.
buffer
Trojan horse
spyware
overflow
A buffer
A Trojan horse Spyware
overflow

D
D
C

Obtain
usernames
Obtain system
Check for open and
IP addresses Obtain cookies ports
passwords
E-mail and
Backup file
attachment
Download
scanning
scanning
File scanning scanning
Use your
Do not open
browsers
attachments in Avoid skins Use
security
unknown eand toolbars encryption
settings
mails
download
software
Administrative
Network
assistant to the
Junior
president
Cook
accountant
administrator
The Open
The Save
The Standard The Formatting command on command on
toolbar
the Edit menu the File menu
toolbar
tiling.
cascading.
minimizing.
multitasking.
whether the
worksheet
prints in
the default file landscape or the number of the margins on
location of
portrait
windows you
the printed
orientation
have open
DOCUMENT
new files

A
A

shrinking

multitasking

minimizing

cascading

Click on any
border and
drag.

Click on any
corner and
drag.

Click on the
title bar and
drag.

You cannot
move a floating
toolbar.
C

right mouse
button
anywhere on
the Word
window,
choose the
Customize
command from
the contextsensitive
menu, and
check the box
for the missing
toolbar from
the Toolbars
tab dialog box.

left mouse
button
anywhere on
the Word
window,
choose the
Customize
command from
the contextsensitive
right mouse
left mouse
menu, and
button on any button on any check the box
visible toolbar, visible toolbar, for the missing
and click on
and click on
toolbar from
the missing
the missing
the Toolbars
toolbar.
toolbar.
tab dialog box. B

All
documents
are
automatically
saved with a The password
default
is casesensitive.
password.
nonprotective
public domain open source
software.
software.
nonprotective
public domain open source
software.
software.
on-demand
on-demand
computing.
software.

Once a
document is
protected by a
password, it
cannot be
opened without
that password.
protective
open source
software.
protective open
source
software.
utility
computing.

best-cost
provider

Web service
provider

software
provider

Operational
systems

Passwords can
be up to only
seven
characters
long.
A
proprietary
software

proprietary
software.

utility software. B
application
service
D
provider

Informational
systems
hardware
power outages. failures.

Structured
Office
query systems automation
All of the
floods.
above.

hot

cold

empty

dormant

Delete

Kill

Nothing

New

A
D

q_id
DA1
DA2
DA3
DA4

DA5
DA6
DA7
DA8
DA9

DA10

q_desc

op1

Sequence Check is a --------------- level control check.


Analyse data over two or more periods is called ---------------------- analysis
We use Hash Total to identify ------------ within a series
where there is a definite relation between items
Analyse fields by arranging them into rows and columns is
called

Field
Horizonta
l
Duplicate
Value
Cross
Tabulate

--------------------- function searches for a value in the


leftmost column of a table and then returns a value in the
same row from a column that we specify in the table.
To import data from Access to Excel ,it is not possible to
link between Access and Excel sheet
The GAP detection options can be used to test for
completeness of data.
Exception testing can be used to identify ----------------items
Data validity test represents
Year end ledger, inventory files or transaction files can be
tested for cut-off , to ensure that the data has been
provided is for the correct audit period
In Range Check , the data may not be in proper sequence
but should be within a predetermined range
In ---------------- Check data entry follow a particular
sequence and also a predetermined range.
'Set mapping' Check control that follows a text-type
validation, we use ----------------- application for data
analysis.
Excel can import data from other databases for the data
analysis.

op2
Record

op3
Both

Vertical
A or B
Combined
Value
Gaps
Filter

Merge

RAND()

VLOOKU HLOOKU
P()
P()

TRUE

FALSE

TRUE

FALSE

Unusual Strange
A or B
exception compariso duplicates
testing
n of data testing

True

False

True
Limit

False
Sequenc
Range
e

Excel

Access

True

False

False

True

Valid
Signs

Transactio Limit
n type
Check

DA17

A System Auditor can uses CAAT tools to analyze data


In the case of the ---------- control, it is ensured that the
data in combination with other fields are reasonable as per
standard set by an organisation.
--------------- function searches for a value in the leftmost
column of a table and then returns a value in the same
row from a column that we specify in a table

DA18

Most of the tools use in Data Analysis depends on

DDE

DA11
DA12

DA13
DA14
DA15

DA16

Both

HLOOKU VLOOKU
P
A or B
P
OLE

ODBC

op4
None of
the above
None of
the Above
All of the
above
None of
the above

ans
A
A
C
A

None of
the above B
A
A
None of
the above C
All of the
D
above

A
A
Both B &
C

None of
the above B
A
B
Reasona
bleness D
None of
the above B
All of the
above
C

q_id

PP1

q_desc

op1

clipart &
auto
shapes

PP4

In Powerpoint2000 ,the built-in professional design elements are


Selection handles are the 8 small ___________ that appear around the object, when
an object is selected
circles
The _______ is an invisible matrix of vertical and horizontal lines that covers the entire
slide workspace
square
_______ are drop-down menus that appear when the right mouse button is clicked on
the screen element
tool bars

PP5

clip
________ and ______ have the ability to add a lot of visual impact into the PowerPoint gallery &
presentation
word art

PP6

_______ is a motion picture or any animation file

PP7

The user can use ______ to remove the undesirable part of the image

PP8

The power presentation has a _____ for a set of compatible colors

clipping
tool
color
palette

PP9
PP10
PP11

The set three colors used for graphs and for secondary slide items is called as
There are ______ types of charts available in PowerPoint
_______ charts are useful while showing variations over a period of time

ascent
10
column

PP12

images

PP13

_______ are the individual pages of a presentation


A PIE Chart is a ____ diagram that depicts the relationship between a whole and its
parts

PP14

Each individual piece of data in a series is called a/an

entity

PowerPoint launches an OLE-compatible application called

Microsoft
organizat
ion chart

PP16

When the user double-clicks on an organization chart object in PowerPoint

the
organizati
on chart is
expanded

PP17

The _____ are used for selecting, editing and viewing objects in the chart

box tools

PP2
PP3

PP15

wave file

circular

PP18

Manager box tool in organizational chart window is

used to
mange
organizati
onal chart

PP19

The custom drawing tools are _______ by default

turned on

PP20
PP21

Click on the box tool ______ to draw three boxes


There are ____ default fields available in all boxes of the organizational chart

once
two

PP22

The _____ tool is used in the same way as we use a pen to draw a table

PP23

A/An _______ consists of smaller printed version of the slides

native tool
autolayout
s

PP24
PP25

The size of the object can be changed using the ______ tool
_______ is the process through which the slides in the current presentation are
included in another presentation or application

PP26

________ can be used to create charts as well as worksheets

PP27
PP28

PowerPoint can import text files that have been saved in ______ format
PowerPoint outlines can have _____ outline levels

zoom
importing
Microsoft
excel

PP31

.ppt(Powe
rPoint)
nine
.rtf(rich
When a file is saved with _____ extension, the graphics and text are also saved along text
with the slide
format)
not
displayed
during
the slide
The hidden slide is
show
DTS(digit
al track
____ effect is used to introduce a slide during a slide show
sound)

PP32

A _____ is a special effect that determines how the objects appear on the slide

PP33

The notes page is formatted based on the

PP34

Pick the odd man out of the following

PP35

When a new presentation is opened ,powerpoint creates slides that have a width of
_____ and a height of ______ with the landscape orientation

outline
view
15
inches,10
inches

PP36

The default orientation for notes ,handouts and outlines is ____ orientation

portrait

PP29

PP30

build
notes
master

PP37

Build effect is also called as ______

animatio
n

PP38

Graphics for web pages are automatically stored in ____ format

gif

PP39

A _______ is used to jump to any slide in the presentation

hyperlink

PP40
PP41

The ______ language has been incorporated into PowerPoint


In PowerPoint _____ is a series of commands that are executed in sequence

visual c++
macro

PP42

while
creating a
.exe file
virus
checkers

PP44

The macro will be activated


Developers can easily add ____ to PowerPoint 2000 by using the programming
interface
______ determines the order in which order in which the slides will be displayed during
the show
slide show

PP45

_______ is used to organize and develop the contents of a presentation

slide pane

PP46

If we save the presentation file as a metafile, it can be opened using

internet
explorer

With reference to autocontent wizard for creating a new presentation, which of the
following statements are not true

PowerPoi
nt creates
a sample
presentati
on to
which
user can
add words
and
pictures

Which of the following statement is not TRUE

user can
insert
objects
like cliparts,
pictures
stored in a
separate
files to the
slides

PP43

PP47

PP48

PP49

With reference to changing the order of slides, which of the following statement is not
true

PP50

Which of the following definitions are not true

in outline
view, drag
the slide
icon to a
new
location
the slide
that holds
the
formatted
placehold
ers for the
titles,
main text
and any
backgroun
d items
that user
wants to
appear on
the slides
is called a
master
templates

Which of the following statements are not true

with notes
pages
view user
can
prepare
speaker
notes and
handouts

PP51

PP52

Which of the following definitions are not true

PP53

The options available in the common task toolbar does not include

the slide
that holds
the
formatted
placehold
ers for the
titles,
main text
and any
backgroun
d items
that user
wants to
appear on
the slides
is called a
master
template
slide
layout

PP56
PP57

data to be
graphed
resides in
a
datasheet
With reference to chart, which of the following statements are not true
window
the
The format of the text entered in a title, subtitle, or bulleted-list object is determined by master
the format settings in a special slide called -------slide
PowerPoint provides a _________ that searches the entire presentation i.e., all the
office
text objects in all the slides, outlines, notes and handouts for spelling errors
assistant
PowerPoint's drawing toolbar contains _______ drawing tools
10

PP58

Click _______ on the rectangle drawing tools enables us to draw multiple rectangles

once

An example of the components of a multimedia presentation could include

text,
graphics
and email
address.

PP54

PP55

PP59

PP60

Which of the following formatting elements can be applied to a PowerPoint diagram


using the AutoFormat tool?

the Line
style

PP61

Which of the following formatting elements can be applied to a PowerPoint diagram


using the Format AutoShape command?

Fill color

What happens when you double click a blank graph placeholder in a PowerPoint
presentation?

Excel is
started so
that you
can create
a chart.

PP62

PP63

PP64

always
taken
from the
first row of
data in the
The legend in a Microsoft Graph chart is:
datasheet.
Side-bySuppose you are creating a Microsoft Graph of quarterly sales by region. Which would side
be the best chart type if you want to emphasize the total sales of each region?
column

Which of the following actions will enable you to insert a graph into a PowerPoint
presentation?

Pull down
the Insert
menu and
select
Chart.

PP66

If you are editing a slide containing a Microsoft Graph, how do you display the
underlying datasheet?

It
automatic
ally
displays in
Slide
view.

PP67

How do you deselect a chart that has been placed onto a PowerPoint slide after you
have finished creating the chart?

Single
click the
chart.

PP65

What happens when you click the Datasheet button on the Microsoft Graph toolbar?

A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
linked to
the
PowerPoi
nt
presentati
on.

What happens if you single click a chart that is not currently active?

The chart
is
selected.

What happens if you double click a chart that is not currently active?

The chart
is
selected.

PP71

Using custom animation effects, you can build:

a slide
one bullet
item at a
time.

PP72

Which of the following animation effects can be added to a slide?

Subtle

PP68

PP69

PP70

PP73
PP74

PP75

PP76

Which of the following animations effects can be added to a slide?


Which keyboard key is used to select more than one picture on a slide?

Enter and
exit
Enter

Custom animation can be used to affect ONLY:

the way
objects
appear on
a slide.

Which of the following best describes the information that appears on the advanced
timeline?

The
advanced
timeline
shows the
sequence
in which
objects
will
appear on
the slide.

PP77

Which of the following objects can contain custom animation effects?

Clips

PP78

What type of program allows an object within an image to be edited without affecting
other objects?

Paint
program

PP79

Which of the following animation effects can be added to a slide?

Fly in

PP80
PP81

Which of the following is TRUE regarding the Datasheet?


Graphical software tools that provide complex analysis of stored data are:

PP82
PP83

Which of the following statements is TRUE regarding PowerPoint diagrams?


Which keyboard key combination is used to undo the previous command(s)?

Once data
is entered
it cannot
be
changed.
OLTP.
You can
change
the
appearan
ce of a
whole
diagram,
but not
individual
shapes of
a
diagram.
[Enter+A]

op2

op3

op4

ans

autolayo
uts and
presentat slide view
ion
& outline none of
the above B
templates view
points

squares

image
grid
short cut auto
shapes
menus

icons

guide
all the
above

slide show
& view
fonts &
show
images
media
.video file
clip
cropping
tool
color box
tricolor
scheme
28
bar
images
and text
radar
data
point

none the
above
all the
above
scribble
cutting
drawing
tool
tool
color
color
scheme guide
primary
color
color
palette
scheme
36
18
pie
linear
slide
sorter
views
slides
all the
doughnut above
data

auto
shapes
the chart
window
the chart opens
displayin
is made
available g a chart
for editing template
custom
general
purpose drawing
tools
tools
clip art

A
B

A
C

A
C
A

C
A

stream

track
changes

none of
the above C
standard
drawing
tools
C

used to
create a
manager
box for
accessed an
existing
only by
manager box
not
available
in the tool
turned off bar

used to
store the
other tools
of the
organizati
onal chart C

available
in the tool
bar
any of the
twice
above
thrice
five
eight
four
standard all the
above
draw tool tool
handlayo
none of
slide
view
these
uts
reduce/e
none of
preview
the above
nlarge

C
B
B
B
B

exporting
auto
shapes
.rtf(rich
text
format)
only one
.wmf(win
dows
metafile)

copying

displayed
only
during the
slide show
3D(3
dimension
)

displayed
only in
outline
none of
view
the above A

transition
slide
master

moving
drawing
clip art
tools
.html(hype
.doc(docu rtext
ment)
format)
twelve
six

.txt(plain
text)

B
A

B
C

.doc(docu
ment)
B

both a and
b
transition D

slide show view show


master
master
slide
notes
slide
view
sorter
slide view show
view
10
7.5
inches,7. inches,5 none the
above
5 inches inches
none of
landscape a or b
the above

A
A

B
A

view show transition

jpeg

png
action
hypertext button
visual
basic for Microsoft
applicatio visual
interdev
n
batch file templates
when the
slide
during
show is
slide
transition run
spell
header
checkers files
custom
both a and
b
show
notes
properties
pane
pane

b or c

none of
the above D
all the
D
above

all the
above
add-ins

none of
the above
all the
above
none of
the above
outline
pane
power
paint shop paint shop point
pro
pro
2000

B
A

C
A
B
D

it is the
quickest
way to
create a
presentati
on

contains
sample
presentati
ons for a
variety of
topics

provides
suggeste
d content
and
D
design

user can
insert
only predrawn,
precolored
graphic
images
reflected
in a clip
arts to
the slides

user can
insert
picture to
the
master
slide
which gets
reflected
in all the
slides
using that
master
slide

user can
insert
picture to
the title
slide
which gets
reflected
in all the
slides
using that
title slide B

in notes
pages
in slide
view,
sorter
view, drag drag the
the slide slide icon
to a new to a new
location
location

I slide
view, drag
the slide
icon to a
new
location
C

design
templates
is the
template
transition whose
means
format
applying and color
special
scheme
effects to user
the
applies to
crossover a
between presentati
the slides on

the slide
that
holds the
formatted
placehold
ers for
the title
and subtitle for
the
presentat
ion is
called a
title
template D

in outline
view, user
can see
the
miniatures
of all
slides in a
presentati
on,
complete
with text
and
graphics

the slides
can be
reordered
in the
outline
view
B

user
should
select the
slide view
to add the
text to the
slide

design
template
is the
template
transition whose
means
format
applying and color
special
scheme
effects to user
the
applies to
crossover a
between presentati
the slides on
customiz
new slide
e

the slide
that holds
the
formatted
placehold
ers for the
title and
subtitle for
the
presentati
on is
called a
title
template D
set up
show
B

by
default,
doughnut
chart is
displayed
based on
the data
in the
datasheet

user can
add data
labels and
gridlines
to the
chart
B

the slide
master
spell
checker
12

data is
plotted in
a chart
window
the
header
slide
grammar
checker
102

twice

three

the format
slide
B
none of
the above B
22
B
four times B

text,
text,
CD-ROM, hypertext
, Power
hypertext digital
Point,
and
camera
video and
Power
and
Point.
sound.
D
sound.

the Line
color

Line
style,
Line
color,
the Font text font,
and text
and the
alignmen
text
alignment t
D

Fill color,
Line
color,
and Line
Line
Line color thickness thickness D
A popup
Microsoft
box
prompts Graph is
you for an started
so that
existing
The graph
you can placehold
Excel
create a er is
chart to
insert.
deleted.
C
graph.

taken
from the
first
column or
row of
data in the
datasheet,
always
depending
taken
on
from the whether
first
the data
column of series are
data in the in rows or entered by
datasheet. columns. the user. C
Stacked
column

Pie chart

Line chart B

Click the
Insert
Chart
button on
the
Standard
toolbar.
Click the
chart
object,
then click
the View
Datashee
t button
on the
Standard
toolbar.
Double
click the
chart.

Pull down
the Insert
menu and
select the
appropriat
e Object.

Pull
down the
Insert
menu
and
select
Chart,
click the
Insert
Chart
button on
the
Standard
toolbar,
or pull
down the
Insert
menu
and
select the
appropria
te Object. D

You
cannot
display
Pull down the
the Edit
underlying
menu,
datasheet
then
once the
select
slide is
Object.
finished. B
Change to
Click
Slide
outside
Sorter
C
the chart. view.

A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
embedde
d in the
PowerPoi
nt
presentati
on.

The
datasheet
window
is
toggled
from
The
datasheet closed to
is saved open (or
from
as a
separate open to
file.
closed). D

The chart
The chart is doubled
is deleted. in size.
The chart
The chart is doubled
is deleted. in size.

The
applicatio
n that
created
the chart
is started. A
Microsoft
Graph
will
D
restart.

a slide
one
bullet
item at a
time,
build
bullet
items a
letter at a
time, and
build
bullet
bullet
bullet
items one items one items a
letter at a word at a word at a
time.
time.
D
time.
Subtle,
Moderate
, or
Moderate Exciting
Exciting D

Both
enter and
exit, and
Fly in from fly in
from top
top or
bottom
or bottom
Alt
Shift

Neither
enter nor
exit;
neither fly
in from
top nor
bottom
C
Ctrl
B
Custom

what
objects do
after they
appear on
a slide.

animatio
n can be
used to
affect the
way
objects
appear
on a
slide, to
what
objects
do after
they
appear
on a
slide, and
to the
way
objects
exit a
D
slide.

the way
objects
exit a
slide.

The
advanced
timeline
shows
the
sequence
in which
objects
will
appear
The
advanced on the
slide and
timeline
shows the the
duration duration
of the
of the
effect
effect
applied to applied
to each
each
object.
object.

The
advanced
timeline
shows
neither the
sequence
in which
objects
will
appear on
the slide,
nor the
duration
of the
effect
applied to
each
object.
C

Organizati
on charts Text
Draw
program

Filtering
program

Dissolve
in
Data
Once
cannot be
data is
entered
entered it into
can be
Datasheet
changed. .
OLST.
OLAP.
You can
change
both the You
appearan cannot
ce of a
change
whole
the style
diagram of the
and the
connectin
individual g lines in
shapes of an
a
Organizati
diagram. on chart.
[Shift+Z] [Alt+Z]
From top

Clips,
organizat
ion
charts,
and text D
Animation
program A
Fly in,
From top,
and
Dissolve
D
in
There is
no such
thing as a
Datasheet
.
B
OLIP.
B

You
cannot
change
the color
of the
boxes in
an
Organizati
on chart. B
[Ctrl+Z] D

q_id

BC1
BC10
BC11
BC12
BC13

q_desc

ISDN stands for _______.


The computer which can receive data from other
computers on the network and print it is _______
The hardware and the software requirements together
form the_____
ATM, Asynchronous transfer mode is a __________
technology.
__________ is designed telephone system

BC14 Expansion of ISDN is ________


BC15 Expansion of WBT is ______________
BC16 _________ connects LANs.
BC17 Collection of instruction is called a _____
Combination of alphabetic and numeric data is called
BC18 _____ data
Computers can be classified based on
BC19 ______,______and _______
_____________ is the Worlds largest computer network
BC2 .
_________ are used in large organizations for large
BC20 scale jobs
_______ is responsible for feeding data into the
BC21 computer
_______ is the capability of the o/s to run numerous
BC22 applications simultaneously
_______ involves conversion of raw data into some
BC23 meaningful information
_______ is responsible for obtaining the processed data
BC24 from the computer
_______ printers use light to produce the dots needed to
BC25 form pages of characters

BC26
BC27
BC28
BC29
BC3
BC30
BC31
BC32

Hardware components in a computer are


_____,____,_____,______
_______ software are programs that are complex and
can be developed or purchased
_______ is a set of special instructions used to
communicate effectively with the computer
_______ converts a high level language into machine
language
_______is/are a popular front end tool
_______ translates assembly language program into
machine language instructions
_______ software enables users to send and receive
data to/from remote computers
A _____ is a running instance of an application

op1

op2
Integrated
Integrated system Symbolic Digital
dynamic networks. networks.
File server

Printer server

platform

configuration

MAN and WAN


ISDN
Internal Services
Digital Network
Web based
Training
Bridges
procedure

LAN and WAN


ATM
Internal Services
Design Network
Web based
Technology
Routers
batch

alpha numeric
space occupied,
price, no. of users
allowed

alpha beta
cost,
performance their
ratio

Ethernet

Internet

mini computers

microprocessors

input

output

multiprocessing

multithreading

interpreter

compiler

input

processor

impact printers

operating system

drum printers
control program,
interpreter,
assembler,
compiler
application
software

batch

protocols

processor
visual basic

compiler
power builder

compiler

interpreter

application
project

system
model

operating system,
bootstrap, kernel,
shell

Splitting of CPU's time for different tasks _______


BC33 prevents time slicing
______ computers are used in large organizations for
BC34 large scale jobs which have large storage capacities
_______ is responsible for all calculations and logical
BC35 operations that have to be performed on the data
BC36 ______ printer use laser light
______ software enhances the user to enter ,store,
BC37 manipulate and print any text
______ software enables users to send and receive data
BC38 to/from remote computers

multiprocessing

multithreading

super computers
arithmetic and
control unit
logic unit
band printer
drum printer
word
data management processing
communication
integrated software software
mainframes

BC39 _______ is the temporary storage place for deleted files my computer

recycle bin

BC4 When LAN connected together ,it is called __________ . MAN


BC40 _____ is a collection of related fields
field
BC41 _____ language consists of strings of binary numbers
______ symbol is used to represent processes like
BC42 assigning a value to a variable or adding a number
BC43 _______ is an example for micro computer
_________capability supports concurrent users doing
BC44 different tasks

WAN
file
machine
assembly language language
processed
terminator symbol symbol
hp vectra
PC-at
system
multiprocessing

multithreading

The ______ do not have processing power of their own


and has only a screen, keyboard and the necessary
hardware to communicate with the host. For this reason,
BC45 the terminals are referred as_______________
"dumb terminals" dumb servers
distributed
A______is nothing but a PC with a network operating
computing
BC46 system
wan
system
_____system is responsible for handling the screen and
BC47 user I/O processing
host
server
The______ handles data processing and disk access in
BC48 a Client/Server architecture
host
server
Both the DBMS and the application resides on the same
BC49 component in a ____system
LAN
PC
Transfer
Transfer control
communication
protocol/Internet
protocol/Internet
BC5 TCP/IP stands for _________ .
protocol
protocol
When all the processing is done by the mainframe itself,
BC50 the type of processing is sometimes called as
server processing host processing
BC51 DBMS models can be grouped under____ categories
one
four

BC52 ______is the most advantageous database system


A new user initiates a new process of execution at the
background,while the user can continue his query
process as usual in the foreground. This situation is
BC53 referred to as ______

file management
system

hierarchical
database system

multiprocessing

multithreading

The process of data being automatically written to a


BC54 duplicate database is called______
BC55 Modem stands for __________ .
Multiple changes to the same record or a field are
BC56 prevented by the DBMS through______

repairing
Code/De-code

redo logging
Modulation/Dem
odulation

fixes

locks

BC57 _________allows an application to multitask within itself multiprocessing


Linear area
BC58 LAN stands for __________ .
networks
BC59 New process of execution is referred to as______
task
BC6 Data is broken into small unit called __________ .
Cells

BC7
BC8

SMTP stands for __________ .


The __________ protocol is a network protocol to be
built for the World Wide Web .

BC9

ATM stands for __________ .

multithreading
Local area
networks
process
Bits
Software Mail
System modulation transmission
transfer protocol
protocol
Transmission
Transfer Protocol protocol
Aggregate transfer Asynchronous
mode
transfer mode

op3

op4

ans

Integrated Services
Digital network.

None of the above.

Receiver

None of the above.

package

system

LAN and MAN


Internet
Integrated Services
Digital Network

LAN WAN and MAN B


Intranet
A
C

Web based Transport


Protocol
command

None of the above.


Web based
Transaction
Repeaters
program

numerous alpha

number and alpha

size, performance, cost

input, output,
performance ratios

ARPANET

None of the above.

PCs

mainframes

feed

write

multiplexing

multitasking

converter

process

ram
non-impact desktop
printers

output

thermal printers

monitor, program,
keyboard, bus

CPU, memory,
input, output

windows 95

interpreter

software's

procedures

assembler
SQL * plus

coder
all of the above

B
D

assembler

processor

operating system
pilot project

communication
process

D
D

A
B
D

multiplexing

multitasking

micro computers

none of the above

central processing unit


non impact printer

none of the above


none of the above

B
C

electronic spreadsheet

none of the above

idea processor

none of the above

Microsoft exchange

none of the above

GAN
record

None of the above.


none of the above

B
C

high level language

none of the above

connector symbol

input/output symbol

fazitsu vp200 series

IBM-PC

multiplexing

none of the above

dummy terminals

dummy servers

windows NT

LAN

back end

front end

back end

front end

distributed computing

centralized

Transmission control
protocol/Internet protocol None of the above.

dumb processing
two

data processing
many

B
A

network database system

relational database
system
D

multiplexing

none of the above

disk defragmentation

disk mirroring

Module/De-module

None of the above

constraints

traps

multiplexing

none of the above

Local array of networks.


thread
Packets

None of the above


client-server
None of the above.

B
C
C

Simple Mail transfer


protocol

None of the above.

Hyper text

None of the above.

Area transfer mode

None of the above.

Compatibility Report for All_itt_questions.xls


Run on 7/14/2014 23:15
The following features in this workbook are not supported by earlier versions of
Excel. These features may be lost or degraded when you save this workbook in
an earlier file format.
Minor loss of fidelity
Some cells or styles in this workbook contain formatting that is not supported by
the selected file format. These formats will be converted to the closest format
available.

# of occurrences
1

Potrebbero piacerti anche