Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
QUESTIONS A B C
TALLY
The ------ key can be used to select an existing
company from list of companies. F1 ALT+F1 CTRL+F1
Accounts Receivable are displayed in Balance Sheet Profit & Loss Journal Book
To assemble a product from different items ---------- Physical Stock
---- entry is used Journal Stock Journal Transfer
A --------- purchase orders data flow is directed to
the purchasing system for use in closing out the
outstanding purchase orders in the receiving
system diagram. Filled Receipt Issue
Tally provides at least --------- predefined voucher
formats 11 16 18
The value of the inventory is included in a ledger
accounts as an asset on the balance sheet FALSE TRUE
" The buyers can follow up with the suppliers to
determine the reasons " is an example of -------------- management by management electronic data
--- objective by exception analysis
Tally can maintain budgets on ---------------- Net Transactions Closing Balance A and B
The value of the inventory is included as an asset
on the balance sheet True False
User designated as --------------- can view audit list. Administrator Owner Data Entry
FUNDAMENTALS OF COMPUTER
What control would prevent the accidental erasure Boundary File protection
of customer information from a magnetic tape Validity check protection ring
What are the individual dots which make up a
picture on the monitor screen called? Coloured spots Pixels Pixies
Header label normally include all the following Identification
except the File Name number Reel Number
A laser printer does NOT use? A print head A laser beam An INK RIBBON
The amount of data that a disk may contain is Storage
known as the disks...? Volume Size capacity
You can ________ protect a floppy disk. Read Write Read and Write
Information on a hard disk is usually backed-up
using a...? Magnetic tape PAN drive Floppy disk
What type of computer chips are said to be volatile? RAM chips ROM chips CACHE
Systems
Network software software and
Business
and security application
software and
Software can be divided into two areas: software software games software
Travel agents use this computer system when Personal Mainframe
reserving flights Supercomputer computer computer
Jon Von
Which computers are used in the weather Notebook Supercomputer Neumann
forecasting industry? computers s computers
Second Hoover
Vacuum tube based electronic computers are...? First generation generation generation
Which generation of computer was developed from Second Fourth
microchips? generation First generation generation
Which generation of computer uses more than one Second
microprocessor? generation Third generation Fifth generation
Which generation of computer developed using Second
integrated circuits? generation Third generation Fifth generation
Which generation of computer developed using Second
solid state components? generation Third generation Fifth generation
DATABASES
the source of
data available to source of data
Important knowledge needed to begin planning the the audit for material
use of CAAT is _________ organization planing all the above
The move towards paperless EDI would eliminate
much of the traditional audit trail, radically changing
the nature of audit evidence true false
providing
access to
computer to all
Computer operation controls are designed to the of by all organization use of any
provide ________________ concerned personnel programs
The use of computer assisted audit techniques is with audit with production
not gaining popularity not only ________________ departments departments all the above
On-line processing refers to grouping of transaction
and processing the same in one go from start to
finish true false
Real time refers to the technique of updating files
with transaction data immediately after the
occurrence of the event to which it relates true false
In OLRT the CPU should process the capability of
program interruption true false
Time sharing system allow access to a CPU from
remote terminals true false
DSS is defined as a system that provides tools to
managers to assist them in solving structured
problems true false
DSS has the following components planning
_________________ databases language model base
Master files contains current records for
identification and summarizing true false
Transaction files contain relatively permanent
records take product profile, customer profile,
employee profile etc true false
Master file configuration includes ____________ reference files table files report files
______ is a file management software package that
lets users and programmers organize data into files
and then process those files filex file-o-man file manager
to have a
complete decentralized
CAATS provide added value to the clients because picture of a picture of a
_______________ system system all the above
File volatility refers to the number of addition and
deletions to the file in a given period of time true false
File activity is the proportion of transaction file
records that are actually used and accessed in a
given processing run: true false
File interrogation refers to the _____ of information
from a file back-ups retrieval deletion
One -to-one relationship means a single entity to a
single entity in a monogamous structure true false
RDBMS is structured to a series of 2 dimensional
tables true false
Batch is the process of ______ together _____ that grouping, regrouping, none of the
bear some type of relationship to one another transaction events above
Hash totals means meaningless totals true false
examination of
identifies source code of
program code a program with
which may be advice to
provides detailed there for following the
information of fraudulent logic of a
Program code analysis involves _____________ machine uses reason program
__________ is a software of CAAT IDEA ACL ALC
package
computer
p[program for
performing a
variety of data
processing mathematical master list of
Generalized audit software consists ___________ function concept transactions
prepared by an
outside
programmer
prepared by the prepared by the engaged by the
Specializes audit program may be___________ auditor entity auditor
for specifying
conditions with
for ordering for updating group by
In SQL, having clause is used for _________ records records clause
______field is added to the macro sheet when we
select grouping option from the view menu condition group macro names
______can be used to create toolbars VB Modules reports forms
_______query is used to add records from one or
more tables into an existing table add append insert
_______window is used to write VB code in access
application report macro sheet module
Values for other tables, queries are maintained in
look up fields data type true false
Visual Basic language is a _____ tool RAD RAP RAID
Changes from a master table can be reflected on to cascade delete cascade change cascade update
the child table by selecting _____option related records related records related fields
To see more than one record at a time in a form we
use _______ columnar tabular both a and b
In SQL, delete command is used to remove record or
_________ table or tables query or queries records
Wild card characters are used for sorting records true false
Pivot tables are used to navigate to the other tables
in a database true false
Reports are used to represent un-editable data true false
In MS -Access, the records in a table are sorted the first field of the last field of
based on _________ the table the table primary key field
event -
structured query procedural
Visual Basic is based on __________ action language language based language
_______is the name of the database object that
displays data and can be used to edit data report form query
In access OLE objects cannot be linked true false
_____ section is present for each record in the
report group record session
A ________ sheet lists all the properties that
pertain to the form or the controls data property both a and b
Textboxes can also be an example of unbound
control true false
In MS-Access, we may design command buttons
for navigating records true false
_______are forms that are included in other forms sub forms child forms inner form
_______ are used to represent our data in graphical
format graphs chart labels
A field with a _______ uniquely identifies each
record number primary key index
Large amount of data can be summarized using
______ tables pivot create form
_______ are employed to select only some
particular records from a database object filters queries sorts
______ control need not have a data source form bound unbound
______ control combines the functionality of both a
text box and a drop down list list box combo box button
MS access is a DBMS true false
A form can be bind to a record source using _____
property of the form form name control record source
______ forms displays field in single row tabular form chart form data sheet form
______ forms are usually used for tables with one
to many relationship sub forms tabular form columnar form
_______ control uses an expression as a source of
control calculated bound unbound
_______ control is tied to field calculated unbound bound
_______is the form that can be created with
minimum input from the user sub form auto form tabular form
______option from the tool menu is selected for
setting relationships between tables set relation connect relationships
option, toggle command
______,______and_____are the buttons belonging and command button, check list, check and
to the options group buttons and list boxes combo boxes
_________allows us to create a filter from a field
short cut menu filter by form filter by report filter by record
________is a database object which displays data
but cannot be used to edit data form report macro
What term applies to a collection of related records
in a database? clipboard file field
All of the following terms are related to
computerized databases except which one? search sort field names
An organised
A way to analyse A tool to way of storing
and manipulate produce high information
numerical quality about a set of
What is a database? information documents similar things
It contains all
the data about A document
Information about one specific which contains
What does a record contain? certain programs item text
Spreadsheets
Extracting and make data easy
What is the best way to analyse and change data analysing data to analyse Using queries
Word
Compilers, Network processors,
What are some popular office orientated software interpreters, software, spreadsheets,
applications? editors backup systems databases, DTP
DEFAULT and PRIMARY KEY
Which of the following constraints can be used to NOT NULL FOREIGN KEY and UNIQUE
enforce the uniqueness of rows in a table? constraints constraints constraints
Which of the following commands is used to
change the structure of table? CHANGE TABLE MODIFY TABLE ALTER TABLE
Right-click the
Relationship Select Undo in
line, then select the
How would you delete a relationship between tables Double click the Delete from the Relationships
in the Relationships window? Relationship line shortcut menu pull-down menu
That there are
several
customers That some of That there are
In a Customers tables, what does a plus sign next associated with the data is not records in a
to the CustomerID field mean? that ID viewable related table
They cannot be
They must both They cannot be AutoNumber
What is required of the fields that join two tables? be numbers text fields data types
The customers
ID is deleted
Assume a one-to-many relationship between the from the
Customers table and the Loans table, with The customers Customers table,
referential integrity in effect. What happens when Nothing, Access ID is deleted and all the
you attempt to delete a customer ID from the ignores the from the related loans are
Customer table that still has entries in the Loans attempted Customers deleted from the
table? command. table. Loans table.
Which of the following is true when viewing a main The subform is The subform is
form and its associated subform in the Form Design The subform is displayed in displayed in
view? not visible. Datasheet view. Form view.
A one-to-many
A one-to-many A one-to-many relationship
Which of the following relationships does not relationship relationship between
belong in a database based on a professional between teams between teams coaches and
sports league such as football or basketball? and players and coaches teams
Which symbol is used at the end of the join line in a
related table to signify the many side of a one-to-
many relationship? # M
The Customers
table only when
You have created a one-to-many relationship with there are Loan
referential integrity between a Customers table and records
a Loans table. From which table can you delete a Either table at associated with The Loans table
record? any time that customer at any time
The correct order of the arguments for the MsgBox prompt, title bar prompt, icon, title bar text,
statement is: text, icon. title bar text. prompt, icon.
The first statement in a procedure named
CreateList is: Dim CreateList. Sub CreateList. CreateList.
Their report
delivery is more
They use difficult than
sophisticated report delivery
Which of the following are true about data mining mathematical for reporting Nonintegrated
applications? techniques. systems. data
We have obtained access to the company's
operational data. We examine 50 records for
customers with phone numbers that should use the
current area code of 345. Of these 50 records, we
find 10 that still use an older area code of 567. This inconsistent nonintegrated
is an example dirty data data data
data warehouse
data warehouse databases do data warehouse
A data warehouse database differs from an data are not not have data are often
operational database because: stored in tables. metadata. denormalized.
Which of the following objects is used to display a
menu? Form Table Report
Which of the following objects are NOT found in an Forms and Queries and
Access application? reports tables Macros
It will be easier
It will be easier for the user to
for the user to upgrade it if the It is advisable to
upgrade it if the objects are in put each object
You are developing an Access application that you objects and one database and table into a
expect to upgrade periodically. Which of the tables are in one and the tables in separate
following statements is TRUE? database. another. database.
An application
may consist of
The Link Tables multiple
command can be databases, each
used to associate with multiple All objects in an
the tables in one objects, linked application,
database with to yet another including the
the objects in database tables, must
Which of the following statements regarding Access another containing only reside within the
applications is NOT true? database. tables. same database.
Which of the following brings a copy of the table
into the current database and does not maintain a
tie to the original table? Import Link Merge
It contains
tables, reports, It contains a user
It contains more queries, and interface, or
What makes a database an application? than one table forms switchboard
What is the Access tool that is used to create the Interface Design
user interface? Menu Wizard Build Menu Wizard
Digital Signature involves two processes. They are Digital Signature Digital Signature
___________ and __________. creation Verification Both A and B
Institutional
Overhead and
Subscriber Subscriber
The Costs of Digital Signature consists mainly of Relying Party Relying Party Institutional
the following Cost Cost Overhead
Certification Certified Certificate
CA stands for ________________ Authority Authority Authority
In Active advertisement, there are two types of Billboards and Online Catalog Broadcast and
models. They are _____ and ________ Junk Mail and Billboards Junk Mail
The network based technology is/are
____________ EDI E-mail EFT
Asymmetric cryptosystem is based on __________ Login_Id and Primary Key and Public Key and
and ____________ Password Private Key Password
Satellite Area
Value Added Network is an example of _________ Global Network Private Network Network
Active or push Passive or pull- Glow sign or
The advertising strategies emerging in the on-line based based hoarding
world are ____________ advertising advertising strategies
The _________ model use direct mail, spot
television or cable television, in active based
advertisement. Broadcast Junk mail Billboard
The ________ is a form of mail that is not targeted
to a specific audience E-mail Bulk-mail Direct-mail
The __________ model refers to information that is
placed at a point where it will be noticed by
customers in the course of other activities and does
not require active search Catalog Endorsement Billboard
Low cost of
The most beneficial advantage of ERP system is Error checking Data Integration operation
What is the term that describes spying on ones Competitive Corporate Industrial
business rivals to gain a competitive advantage? espionage espionage espionage
Contact
A list of numbers of the
What would you NOT be looking for when spying on competitors management
a competitor? clients group Research data
single-user multi-user e-commerce
An online drugstore such as Drugstore.com is an database database database
example of_______ application application application
Removable Message
drives that can authentication in Encryption
be locked up at EDI systems performed by a
night provide performs the physically secure
adequate same function hardware device
security when the as segregation is more secure
Which of the following statements is correct confidentiality of of duties in other than encryption
concerning the security of messages in an data is the information performed by
electronic data interchange (EDI) system? primary risk. systems. software.
The wizard that is used to import text files text import convert text to
is_________________ wizard columns wizard tip wizard
The alphabet indicating the column followed by the column
row number is known an__________ cell reference row reference reference
Which of the following files could not be opened in quattropro or
excel _______________ text files Lotus 1-2-3 xbase files
In excel, the dates that are stored as sequential
numbers known as ________________- serial values domain values range values
The command to display the current date in a cell is
_________________ =today() =date() =currentdate()
computer related
abbreviations biographical
BABEL consists a glossary of _____ and acronym information bookstores
Yahoo,lycos,excite and webcrawlers are _____ search engines web directories database
Graphical Graphical
interpreter interchange Graphical
GIF is the acronym for ____________ formatting Format interface format
Jumbled
Joint Pictures pictures expert Joint pictures
JPEG is the acronym for ___________ Expert Group graph expert graph
The Web aids users to explore the ________ mails documents net
The three most popular mailer are_____,_____ yahoo,infoseek,al eudora,netscape
and______ tavista netscape,ie,lynx and pine
network
The World Wide Web consists of _________ information web pages connections
In Microsoft Internet Explorer, the color of the text
can be specified using _________ attribute of the
font tag. BACKGROUND COLOR FCOLOR
The interface that provides effective communication Common Communication
between the web browsers and servers is Communication graphical graphical
_________ gateway interface Interface interface
CGI is the _________ between web browsers and
servers Network Interface Communication
CGI programs are invoked based on the Current web
information provided by the _________ page Browser Client
A CGI program is usually called after a request
made by the _________ Browser/user Server Web
The net drivers______ from one place to another data parcel packets
email,file
The net provides interesting services scripting,parsing news,cooking retrived,internet
like______,______ and______ and compiling and fine arts tools
Accessing files using FTP servers is called_____ file access anonymous ftp file transfer
The three most commonly used networks
are______,______ and______ PAN,NAN,AAN KAN,RAN,VAN LAN,WAN,MAN
________ is in between LAN and WAN VAN MAN TAN
_____ can be owed by multiple organisation LAN MAN WAN
Data is transmitted in the form of_____ signals analog digital non-digital
Data type Define type of Document type
DTD stands for __________ definition data definition
Moralize/demoral Modulation/dem Manipulate/dem
Modem stands for __________________ ize odulation anipulate
______ is the process of the digital signals being
converted into a form suitable for analog
transmission Mapping Modulation Manipulation
Dedicated
________ and______ are two basic ways of getting Satellite link and access and dial
connected to the internet digital signals up access Cable and wires
Conducting fraud-
Which of the following activities would most likely Using data Performing awareness
detect computer-related fraud? encryption. validity checks. training.
Received by the
A digital signature is used primarily to determine Unaltered in Not intercepted intended
that a message is: transmission. en route. recipient.
The chart that holds the column chart is _________ column chart bar chart pie chart
The chart that display two or more data series on a
surface is _________ column chart bar chart pie chart
The chart that is used to display discrete data column chart bar chart pie chart
wild card
_________ are not allowed in a macro name spaces characters symbols
Which of the following tool cannot be used to view
the excel web page_______ excel97 internet explorer Netscape
The wizard that used to build an interactive table convert text to
from data existing on sheets pivot table wizard chart wizard columns wizard
The chart that is used for displaying stock market
information line chart bar chart stock chart
The _________ wizard separates contents in a cell text import convert text to
into different cells wizard columns wizard tip wizard
A spreadsheet is a grid of rows and columns and is
called as a ________ worksheet workbook tables
Pick out the window that is not a form of excel application document
___________ window window modal window
A dark wide
On an Excel sheet the active cell is indicated by border A dotted border No border
Cell A4 =2 and A5 = 4. You select both cells and
drag the fill handle down to A8. The contents of
cells A6, A7, and A8 are _____. 8,16,32 2,4,2 2,2,2
the row is too
short to show the column is too
the number at narrow to show
your formula has the current font all the digits of
If a cell shows ####### , it means that _____. a syntax error size the number
Which is not an advantage of using computerized ability to speed of flexibility of
spreadsheets? generate tables calculation moving entries
The gym teacher has a new program to calculate
physical fitness in terms of weight and exercise.
The use inputs different weights or amounts of
exercise to determine the related physical fitness.
This "What if" program is most likely which of the
followin word processing graphical database
The difference between the highest and the lowest
values. Range Address Gap
Producing
Spreadsheets can be used for... graphs Writing letters Drawing pictures
drag from the
top cell in the
column to the
double-click any last cell in the click the column
To select a column the easiest method is to cell in the column column heading
If you press _____, the cell accepts your typing as
its contents. ENTER CTRL + ENTER TAB
By either clicking
in a different cell
By using the or using the
arrow keys to arrow keys to
By clicking in a move to a move to a
How can you change the active cell? different cell different cell different cell
Which of the following commands is needed to The Move The Cut The Paste
transfer the contents of one cell range to another? command command command
cycle through
absolute,
relative, and
copy and paste mixed cell
The F4 key is used to: cells. edit cells. references.
Which of the following quickly copies the formatting the Format the Formatting
of a selected cell to other cells? the Fill Handle Painter toolbar
If you enter a date into a cell, Excel stores the date text with a two- text with a four-
as: digit year. digit year. an integer.
March 4 of the
What will be stored in a cell if 3/4 is entered in it? 03-Apr 0.75 current year
The World Wide Web was devised by _________ CERN ECRN CARN
This website is the biggest bookstore on the earth. Etrade.com Amazon .com Dell .com
Asynchronous
When we talk of Data Transmission modes, then Automated Tailor Any Time Transmission
ATM stands for Machine Money mode
Combines
connectivity of a Switches data
hub with the from incoming
Which of the following is true concerning the Concentrates traffic regulation ports to outgoing
function of a switch? connectivity of a bridge ports.
Bridges and Two or more Bridges and
What do routers connect? Repeaters. networks Hubs
What does a router route? bits frames Packets
Software which prevents external access to a
system is termed firewall gateway router
If four computers are connected to a hub and then
to the internet, how many IP addresses are required
for these 5 devices? One Two Four
Which of the following in an OSI layer Physical Layer Data-Link Layer Network Layer
It continue on to
What happens to data that is ruined before Data return to the It gets destroyed target device
reaching to receiver sender bit by bit. with corrupt data
Wireless Wired Ultra violet
Bluetooth is technology Technology technology
Which is not one of the recognized IEEE sub
layers? Physical Layer Data Link Layer Network Layer
The most preferred number system to represent a
IP address is Binary ASCII Octal
A MAC address is of 48 Bits 48 Bytes 48 KB
software that
facilitates a list of rules for software that
connection to the transferring data allows file
Protocol is internet over a network copying
A ............... is a LAN-based computer with software
that acts as a controlling device for controlling
access to at least part, if not all, of a local area
network and its available resources. Novell PC Client Server
If the hub goes
If one node down, it brings
goes down, it down all of the
What is the biggest disadvantage of the Ring brings down the nodes on that
topology? There isn't one entire ring section
The two most common tools used to help with cookies and Trojan horses cookies and key
extracting information are: Trojan horses. and key loggers. loggers.
The famous Nigerian Fraud scam offered victims invest without purchase off-
the opportunity to: buy stocks. risk. shore property.
What is the best means of protection from cyber Use a fake e- Never use your Use a proxy
stalking? mail address. real identity. server.
Message
sequence
Which of the following is not an appropriate control Physical number
over telecommunications software Encryption Security controls checking
Encryption techniques can be implemented in
Hardware-Software I only II only Both I & II
Which protocol would be used to download a free
anti-virus program from the Internet? irc ftp www
The major advantage of the checksum program is Adds more bytes Verifies integrity Increases boot
when it to programs of files up time
Which of the following is a Web browser? HTML Internet Explorer Microsoft Excel
Most client/server applications operate on a three- Desktop client, Desktop client, Desktop server,
tiered architecture consisting of which of the application, and software, and application, and
following layers? database. hardware. database.
Which do you NOT need to connect to the Internet? Modem CD-ROM Telephone line
File
File Transfer Transmission File Transfer
What does FTP stand for? Program Protocol Protocol
So computers
can be
referenced by a So IP addresses So email is
What is the purpose of DNS? name can be shorter delivered faster
Which of the following is NOT a properly formatted
IP address? 193.1.2.3 45.1.1.1 143.215.12.19
Which of the following is a properly formatted email paul .trigg @ paul.trigg@dom
address? domain. org. uk ain.org.uk paul.domain.uk
The US Scientists in
The Internet is controlled by whom? government Switzerland No-one
International
Internet Relay Relay of Internet Remote
What does IRC stand for? Chat Characters Conversations
It will be waiting A letter will be
for you to collect sent to you in the
If you do not pick up your email for a week...? It will be deleted it post
Receiving
messages People
automatically discussing a
from anyone in topic of interest High volumes of
What is a disadvantage of joining a mailing list? the group globally email
autolayouts and
In Powerpoint2000 ,the built-in professional design clipart & auto presentation slide view &
elements are shapes templates outline view
Selection handles are the 8 small ___________
that appear around the object, when an object is
selected circles points squares
The _______ is an invisible matrix of vertical and
horizontal lines that covers the entire slide
workspace square image grid
_______ are drop-down menus that appear when
the right mouse button is clicked on the screen
element tool bars short cut menus auto shapes
________ and ______ have the ability to add a lot clip gallery & slide show &
of visual impact into the PowerPoint presentation word art view show fonts & images
_______ is a motion picture or any animation file wave file media clip .video file
In visual basic, when a record pointer reaches to
the last record, _______ property of a recordset
object is automatically set to ______ eof,false movelast,true movelast,false
In visual basic, the explorer view of a project is properties form layout
displayed in ___________ window window toolbox
In visual basic, when a record pointer reaches to
the first record, _______ property of a recordset
object is automatically set to ______ bof,false movefirst,true movefirst,false
In visual basic, _______ is a method to convert a
string into integer. value() int() number()
In visual basic, in a shape control, a vb statement
gives Shape1.Shape = 2. What type of shape
should we get? circle rectangle square
In visual basic, a timer event is only available in
timer control. true false
To display To help in
images to the creating a To allow the
What is the purpose of the Image List Control? user ToolBar editing of icons
Which method would you use to get a free or
unused File identifier while opening any file: FreeFile GetFileNum GetFile
Which property procedure is used to retrieve the
value of a property? Retrieve Get GetProperty
Common
messages
Which of the following can be shown to the user passed to Windows
using the Common Dialog control in VB? Windows Open dialog box explorer
Which of the following are not properties of
Command Button: Caption Visible Multi-Line
Which events enable you to determine which key Click and Click, KeyUp KeyUp and
was pressed by the user? KeyPress and KeyDown KeyDown
In order to access a file in Non-textual format, you
have to open file in: Ascii Format Binary Format Input Mode
Visual Basic displays information depending upon
the current value of two properties of the form, CurrentX and ScaleLeft and ScaleHeight and
called: CurrentY ScaleTop ScaleTop
The caption and the name properties of the Are one and the Can be different Are actually not
command button: same at times properties
_______ are the individual pages of a presentation images images and text slides
A PIE Chart is a ____ diagram that depicts the
relationship between a whole and its parts circular radar doughnut
Each individual piece of data in a series is
called a/an entity data point data
Microsoft
PowerPoint launches an OLE-compatible organization
application called chart clip art auto shapes
Click on the box tool ______ to draw three boxes once twice thrice
There are ____ default fields available in all boxes
of the organizational chart two four five
The _____ tool is used in the same way as we use
a pen to draw a table native tool draw tool standard tool
A/An _______ consists of smaller printed version of
the slides autolayouts handlayouts slide view
The size of the object can be changed using the
______ tool zoom reduce/enlarge preview
_______ is the process through which the slides in
the current presentation are included in another
presentation or application importing exporting copying
________ can be used to create charts as well as
worksheets Microsoft excel auto shapes clip art
PowerPoint can import text files that have been .rtf(rich text
saved in ______ format .ppt(PowerPoint) format) .doc(document)
PowerPoint outlines can have _____ outline levels nine only one six
When a file is saved with _____ extension, the
graphics and text are also saved along with the .rtf(rich text .wmf(windows
slide format) metafile) .txt(plain text)
not displayed displayed only
during the slide during the slide displayed only in
The hidden slide is show show outline view
____ effect is used to introduce a slide during a DTS(digital track
slide show sound) 3D(3 dimension) both a and b
A _____ is a special effect that determines how the
objects appear on the slide build transition slide show
The notes page is formatted based on the notes master slide master master slide
Pick the odd man out of the following outline view slide view view show
When a new presentation is opened ,powerpoint
creates slides that have a width of _____ and a 15 inches,10 10 inches,7.5 7.5 inches,5
height of ______ with the landscape orientation inches inches inches
The default orientation for notes ,handouts and
outlines is ____ orientation portrait landscape a or b
Build effect is also called as ______ animation view show transition
Graphics for web pages are automatically stored in
____ format gif jpeg png
A _______ is used to jump to any slide in the
presentation hyperlink hypertext action button
The ______ language has been incorporated into visual basic for Microsoft visual
PowerPoint visual c++ application interdev
In PowerPoint _____ is a series of commands that
are executed in sequence macro batch file templates
while creating a during slide when the slide
The macro will be activated .exe file transition show is run
Developers can easily add ____ to PowerPoint
2000 by using the programming interface virus checkers spell checkers header files
PowerPoint
creates a sample
presentation to contains sample
With reference to autocontent wizard for creating a which user can it is the quickest presentations for
new presentation, which of the following statements add words and way to create a a variety of
are not true pictures presentation topics
What happens if you single click a chart that is not The chart is The chart is The chart is
currently active? selected. deleted. doubled in size.
What happens if you double click a chart that is not The chart is The chart is The chart is
currently active? selected. deleted. doubled in size.
what objects do
the way objects after they
appear on a appear on a the way objects
Custom animation can be used to affect ONLY: slide. slide. exit a slide.
The advanced
timeline shows
the sequence in
The advanced The advanced which objects will
timeline shows timeline shows appear on the
the sequence in the duration of slide and the
which objects will the effect duration of the
Which of the following best describes the appear on the applied to each effect applied to
information that appears on the advanced timeline? slide. object. each object.
Which of the following objects can contain custom Organization
animation effects? Clips charts Text
What type of program allows an object within an
image to be edited without affecting other objects? Paint program Draw program Filtering program
Which of the following animation effects can be
added to a slide? Fly in From top Dissolve in
In visual basic, to populate a drive list box with a Drive1.Drive=Dir Dir1.Path = File1.Path =
directory list box __________ statement is used 1.Path Drive1.Drive Dir1.Path
In visual basic, to display a message in the run time
_________ function is used messagebox() message() msgbox()
In visual basic, to populate a directory list box with a Dir1.Path=File1. Dir1.Path = File1.Path =
file list box ________ statement is used Path Drive1.Drive Dir1.Path
In visual basic, ________ is a property of a
recordset object which counts the number of rows
in a recordsourse object openrecordset opendatabase recordcount
In visual basic, using a data control, a record can
only be added from the last record. Adding a new
record is only possible using _______ method of a
recordset object. update append addnew
In visual basic, using a data control, a record is
saved to a recordsource object using _______
method of a recordset object. append update additem
In visual basic, using a data control, to navigate to
the previous record ________ method of a
recordset object is used. movenext movelast moveprevious
To deactivate the Form UnLoad event, you make
the following change in the function definiton:Private
Sub Query_Unload(Cancel as Integer,UnloadMode Cancel UnloadMode
as Integer) To prevent the Form from closing, you parameter to a Cancel parameter to a
will set the: non-zero value parameter to 0 non-zero value
_______ is a word processing that is a member of
the office 2000 family Word 2000 Office 2000 Office 97
The feature that enables user to type anywhere in a
document without pressing or tab click-n-type double click drag & drop
The______ feature allows the user to copy and
paste upto 12 items at the same time in an
application office clipboard cut select
Most of the tools use in Data Analysis depends on DDE OLE ODBC
Analysis is the
Analysis loading of This involves
translates programs that looking at a
program code of perform routines system and
a high level to control finding out how
How do you define analysis of an information language to peripheral information is
system? machine code devices being handled
Inputs, outputs,
file design Maintenance,
What areas need to be considered in the Only hardware hardware, and reliability, and
SOFTWARE design process? and software software upgradeability
To execute any To maintain
What is the function of systems software? To collect data programs security
Deleted from the Copied from the Saved to the
Formatting a disk results in all the data being...? disk disk disk
Users operate
the manual Users operate
system and the computer Users operate
computer system system from a the manual
What is Direct Implementation? at the same time given date system
The dialog box that is used to incorporate picture picture bullets arrow bullet circle bullet
bullets into our documents or web pages is dialog box dialog box dialog box
The object that composes of set of tools which
helps to create and work on different shapes like
rectangles, circles, flowcharts etc. charts WordArt AutoShapes
When word is opened a new document called_____
is displayed, where the user starts typing the
content right way doc1 document1 new document
______ is an online dictionary maintained by word
to obtain synonyms for words thesaurus hyphenation mail merge
The alignment available for tabs does not include left decimal justified
prohibits the
automatically user from automatically
corrects common renaming an corrects the
With reference to auto correct which of the following typing, spelling auto correct grammatically
statements are false errors entry errors
password
protected
document can
be opened
With the reference to password protected password can without password are
documents which of the following statements are not include password as not case
false spaces read only sensitive
The alignment available for tabs does not include left justified hanging
a document file
a .ppt file can not can be inserted a multiple
not be inserted at in the current documents files
specified position document at can be inserted
in the current specified in the single
Which of the following statements are False document position document
Drop Cap tool does not work for the contents in the
table format true false
send a public
message to send private
Using an electronic bulletin board, Seema can do friends interested send pictures to messages to a
all of the following except which one? in one topic a friend friend
Aryan has created a ten-page story, but only wants
to print the first two pages. What printer command From ___ To
should he select? Print all ____ Page setup
What process should be used to recall a document
saved previously? Enter Copy Retrieve
Which is used to indent text within a document? closing tabbing spacing
Desktop publishing is a more sophisticated form of
which of the following types of software? database graphing word processing
Creating and
To analyse editing Storing
What is a Word Processor used for? figures documents information
What is a picture that is saved on a diskette and
can be pasted into a document? subscript annotation clip art
Spelling,
What basic tools would you find in the Edit menu of Clear, replace grammar and Cut, copy, paste
a word processor and select autocorrect and clear
Assume you have made all appropriate selections You have not You have not
in the Columns dialog box in Word, but cannot see You are not in inserted a specified
any columns on the screen. What is the most likely Print Layout column section continuous
cause? view. break.. section breaks.
to move a
section of text
from the original
While word processing, in which of the following to store a file on to store a file on location to
situations would Tom use the "Copy" command? the hard drive a diskette another location
a section of text
where the first the guidelines
letter of each used to establish
sentence is where different
a section of white lowercase and elements of the
text on a black the rest are newsletter will
A reverse in a newsletter is: background. uppercase. go.
underlining the
setting it in larger typing it all in text of the pull
A pull quote is best emphasized by: type or font size. capital letters. quote.
A dropped cap is
a word that
The reverse A pull quote is a starts with a
technique means quotation taken lowercase letter
to add dark text from (pulled) when it should
on a light from another have a capital
Which of the following definitions is CORRECT? background. document. letter.
Pertaining to newsletters, which of the following
cannot be changed using the Columns command The width of The height of The number of
dialog box? each column each column columns
As related to type size, how many points are there
to the inch? 6 10 12
Assume you are working on a newsletter in which
the masthead extends across the top of the entire
first page. The rest of the newsletter has two
columns. What is the minimum number of sections
in the newsletter? One Two Three
Press
Press Ctrl+Enter Ctrl+Shift+Enter Press Enter to
Which of the following is NOT correct with respect to create a page to create a create a section
to page, column, and section breaks? break. column break. break.
Which of the following would be the most A serif font at 10 A sans serif font A serif font at 20
appropriate font for a newsletter headline? points at 10 points points
to read from or
to calculate write information to print sheets of
What is the function of a disk drive? numbers to a floppy disk paper
data to be data to be
transferred to or transferred to the address of a
The memory data register is used to store from memory the stack memory location
an instruction
an instruction that has been an instruction
that has been fetched from that has been
The instruction register stores decoded memory executed
Which of the following is used to indicate the
location on the computer monitor? a cursor a scroll bar a light pen
A mathematical procedure that can be explicitly
coded in a set of computer language instructions
that manipulate data. Formula Algorithm Program
Which of the following translates a program written
in high-level language into machine language for Artificial
execution? Assembler Compiler Intelligence
Memory
Detecting errors in real memory is a function of protection Parity Checking Range checking
To find where a file has been saved on disk, the use the directory search each file use the backup
user should search tools in turn facility
A series of instructions telling the computer how to
process data or files is defined as a Network Program System
save copies of
the file with the use different keep a record of
To ensure that data is not lost if a computer system same name on filenames on the computer
fails, the user should the system system failures
Having a single CPU alternatively process tasks Multiprogrammin
entered from multiple terminals is called Multiprocessing Time sharing g
The place in the CPU where the data and programs
are temporarily stored during processing is called
the ROM RAM Floppy Disk
Telephone
All are examples of computer software except Firmware Word Processor modem
Computer manufactures are now installing software
programs permanently inside the computer. It is Telephone
known as Firmware Word Processor modem
Which of the following file organisation forms most
efficiently allows access to a record Sequential Hashed Indexed
The part of the computer system controlling data Operating
manipulation is called the System ALU CPU
For direct access storage devices the recording Tracks and Blocks and
area is divided into Sectors Sectors Files and Tracks
Database,
The data hierarchy from the largest to the smallest Character, field, character,
is database record File, record, field
Which of the following hardware or software system Maintenance
controls provides a detailed record of all activities Valid character diagnostic
performed by a computer system check program Systems logs
Which one of the following parts of a computer is
necessary to enable it to play music? Sound card. CD-ROM MIDI interface
An educational CD-ROM on Indian Poets contains
1000 pages of text, 500 colour pictures, 15 minutes
of sound and 1 minute of video. Which of the four
different media listed takes up most space on the
CD-ROM? Text Pictures Sound
Which one of the following printers is suitable for
printing sprocket fed carbon copies? Laser Dot matrix Ink-jet
The term A:\ refers to a file name a subdirectory the root directory
IT management
Each of the following is an enabler of IT-business senior executive lacks IT understands
alignment except: support for IT. leadership. the business
The basic systems model is used to describe
virtually all information systems and it consists of
the following elements: input. output. processing.
Hashing for disk files is called external hashing static hashing dynamic hashing
Components of expert systems include: a)
inference engine; b) user interface; c) knowledge
base; d) fuzzy logic A: (a) , (b), (d) B: (a) to (d) C: (a), (b), (c)
corrective preventive detective
Black box testing and white box testing are part of: controls controls controls
What is the term used to describe the point of
interaction between a computer and any other
entity, such as a printer or human operator? Component Interface Settings
program change
Which is not part of help desk documentation: problem logging call lights requests
Testing of individual modules is known as: unit testing data testing thread testing
Allows computer
signals to be
send over a Aids in back-up Packs data in a
A modem is a device that telephone line procedures disk file
Lexical analysis,
Feasibility study, Implementation CONVERSION,
system design, and and code
What are the stages in the compilation process? and testing documentation generation
Which of the following is not a data transmission
coding scheme CRC Baudot ASCII
An interpreter is
a general
An interpreter purpose
does the An interpreter is language
conversion line a representation providing very
by line as the of the system efficient
What is the definition of an interpreter? program is run being designed execution
A device used in data communications to divide a Frequency
transmission signal into several sub-bands is division
known as a Modem Demodulator multiplexor
Third generation languages such as COBOL, C, High-level Middle-level Low-level
and FORTRAN are referred to as languages languages languages
It is faster than
Serial Communication is used over long distance parallel It is less error It is less prone to
because it communication prone attenuation
Accounting
systems,
In what areas is the COBOL programming Financial sector Graphic design commercial
language used? and engineering and education sector
Where would you find the letters QUERTY? Mouse Keyboard Numeric Keypad
What input device could tell you the price of a Optical mark
product Mouse Bar code reader reader
Where would you find a magnetic strip? Credit card Mouse Speakers
What are the individual dots which make up a
picture on the monitor screen Called Coloured spots Pixels Pixies
What input device can be used for marking a Optical mark
multiple-choice test? Mouse Bar code reader reader
mouse button
QWERTY is used with reference to screen layout layout keyboard layout
What input device could tell you the price of a bar of Optical mark
chocolate? Mouse Bar code reader reader
language software
A GUI is hardware interpreter interface
Second - Third -
First - generation generation generation
UNIVAC Computer belongs to the computers. computers. computers.
Name the first Indian Super Computer? Vishwajeet Deep Blue Param
is caused by caused by is due to bad
Disk fragmentation wear overuse disk blocks
Magnetic Ink
The technology which is used to check answer Optical Mark Character
sheets of multiple-choice questions in civil services Bar code Reader Reader Recognition
or similar examinations is: - Technology Technology Technology
converts a
slower than an program to
A compiler is a fast interpreter interpreter machine code
Dot - Matrix
Which printer among the following is fastest Drum Printer Printer Desk - jet Printer
Zipping a file means encrypting it decrypting it compressing it
Virtual
Very important Vital information information
reader user resource under reader & user
What does acronym VIRUS stands for sequence siege system
Electrically
An impact printer creates characters by using...? charged ink Thermal Paper An ink pen
mainframe
A client-server system is based on technology LAN technology WAN technology
A nanosecond is 10-6 sec 10-3 sec 10-12 sec
A procedural control used to minimize the possibility
of data or program file destruction through operator External file
error is the use of Limit checks Control figures labels
_______ software enables users to send and
receive data to/from remote computers application system operating system
A _____ is a running instance of an application project model pilot project
Splitting of CPU's time for different tasks _______
prevents time slicing multiprocessing multithreading multiplexing
______ computers are used in large organizations
for large scale jobs which have large storage super
capacities mainframes computers micro computers
_______ is responsible for all calculations and
logical operations that have to be performed on the arithmetic and central
data control unit logic unit processing unit
non impact
______ printer use laser light band printer drum printer printer
______ software enhances the user to enter ,store, data electronic
manipulate and print any text management word processing spreadsheet
______ software enables users to send and receive integrated communication
data to/from remote computers software software idea processor
_______ is the temporary storage place for deleted Microsoft
files my computer recycle bin exchange
_____ is a collection of related fields field file record
_____ language consists of strings of binary assembly machine high level
numbers language language language
Modulation/De Module/De-
Modem stands for __________ . Code/De-code modulation module
Multiple changes to the same record or a field are
prevented by the DBMS through______ fixes locks constraints
_________allows an application to multitask within
itself multiprocessing multithreading multiplexing
Linear area Local area Local array of
LAN stands for __________ . networks networks networks.
Data is broken into small unit called __________ . Cells Bits Packets
^ A
Puchasing,
Receiving and
Accounts payable D
One A
Ctrl+D B
F7 C
None of the above A
Journal Book B
A
All of the above C
5C
Reversing Journal B
21 B
Alt+f5 B
None A
Ctrl+f4 A
F9 C
F11 B
F12 A
None C
A
None of the above C
A
None of them B
None A
None B
A
16 C
B or C A
TallyVault A
Payroll transactions. A
Exception reporting C
AGP Card B
None of above B
None of above C
None of above B
Batch Total D
None of above A
Data Dictionary B
None of above C
Make duplicate
copies of files A
None of above C
A cassette A
Distributed policies or
procedures A
None of above C
None of above C
None of above B
None of above A
None of above A
None of above B
None of above C
None of above A
None of above C
None of above B
None of above B
None of above A
None of above B
None of above B
None of above A
None of above B
None of above B
None of above A
None of above C
None of above C
None of above B
None of above A
None of above A
none the above A
A
A
none of these A
all of them D
A
A
A
none of these A
filepet C
B
addition B
stub C
A
A
all of the above D
administered
questionnaire A
General Procedures D
auto number D
A
macros D
action D
expression elements C
embedded C
justified B
new report D
insert chart C
report header D
delete B
A
none of the above A
OLE communicator C
edited A
html D
publish to web
wizard D
data definition D
yen A
list box B
create icon A
data storage C
63500 A
automatic field B
no duplicate key A
properties B
update queries A
update queries A
outer join D
A
both 1 and 3 D
simple D
new properties B
child form B
querying C
gateways A
? D
B
data control B
record group B
DAY() C
static text B
main form A
none of the above C
tool wizard C
ledger A
64,000 D
hyperlink D
primary key C
A
B
A
B
none of the above B
B
none of the above C
A
B
append query B
B
A
table join C
B
A
B
sub chart D
B
A
entities D
add A
A
B
use export D
B
B
B
* D
A
topic C
A
A
B
logical C
B
table B
B
detail D
report B
identifier B
none of the above A
forms A
none of the above C
option button B
A
columnar form B
filter by input D
table B
layout B
record grab D
A way of maintaining
a log C
A collection of files B
Reliable DBMS C
uses tape as
opposed to disk C
Database access
controls D
None of the above A
IDENTITY columns C
UPDATE TABLE C
Source D
e-mail C
e-mail A
engines C
Auto Key C
CompanyAddress A
The one-to-many
relationship B
An error message is
displayed. D
The subform is an
object on the form
and can be moved or
sized like any other
object. D
A many-to-many
relationship between
players and teams C
* C
Neither table C
title bar text, icon,
prompt. B
Sub. B
A drop-down list
enables the user to
enter text. C
must be set for two
words. C
maintain data on
different things in
different tables. A
all of the above D
a and b D
a or b A
None of above B
Relational Question
Language (RQL) C
Relational Model
Manager B
a and b D
All of above A
b and c D
the database B
a and b A
a and b B
a and b C
entity-relationship
data modeling A
entity-relationship
data modeling B
entity-relationship
data modeling D
data migration D
field D
tuple C
foreign key C
candidate key D
surrogate key B
All of above D
move the data into
the new database A
a "wrong format"
problem B
a "wrong format"
problem D
b and c C
Query A
Spreadsheets D
Regardless of how
the objects and tables
are stored, the user
will have to reenter
the data in the tables
when the application
is upgraded. B
An application can be
created in such a way
that it objects such as
forms and reports can
be changed without
disturbing the existing
data. C
Join A
It contains macros C
Switchboard Manager D
Private Key A
Either B or C D
Either A or B C
B
None of the above A
Evidence, Ceremony,
Approval, Efficiency
and Logistics D
UN/EDIFACT D
functional groups D
Electronic cheques D
Online Catalog and
Customer
Endorsements C
Endorsements A
Junk mail D
Broadcast C
Quality management B
Economic espionage C
A competitors new
project B
None of above C
Security at the
transaction phase in
EDI systems is not
necessary because
problems at that level
will be identified by
the service provider. C
function wizard A
class files D
reference values D
Boolean D
count A
tip wizard B
countif C
print preview B
none A
session layer D
many B
glossary C
item search,index
search C
all the above D
telnet D
organization B
name of the above B
close A
archive D
fidonet A
galenet A
channel B
Graphical Interface
format B
Joint pictures
experimental group A
browsers C
mails B
FONTCOLOR B
Common Gateway
Interface D
Connection B
Channel A
SGML Composer C
documents A
None of the above C
video C
hotlink B
service,hostname
and port B
<l1 type=shape> D
User A
none of the above B
receiving information
from a host computer B
Channel A
Retrieve C
Neither A nor B B
Both B and A C
Formal Legal
Requirements, Open
System D
Neither A nor B C
Private Key A
Either A or B C
Either A or B A
Either A or B B
Cryptography C
Reviewing the
systems-access log. D
Firewall vulnerability. D
Business- to-Billboard A
Broadcast B
Broadcast A
Domains A
Pulling cart B
Gateway D
EDI D
Customer-to-
Company B
Endorsed Cash B
E-token A
Subscription C
4B
pivot table D
tip wizard D
data marker A
data marker B
data marker C
data marker D
surface chart C
surface chart B
surface chart D
surface chart A
word 2000 A
tip wizard A
pie chart C
B
A
Data table. C
Data table. A
Data table. D
A
worksheets D
A
Pivot table D
function wizard B
database A
A blinking border A
6,8,10 D
either b or c C
spreadsheet D
Rows A
Document filing A
INSERT A
formula. B
Tom McKenzie. C
Text constants D
\ D
It is impossible to
determine. C
G7*SUM(H9:H11) B
The phrase active
cell appears in the
Status bar. A
By typing the
reference of the cell
you want to move to
in the formula bar C
Window A
Properties B
Clear C
Remove B
Margins C
Edit B
cell group. B
D C
source range. D
source range. B
Both the Copy and
Paste commands D
constant A
$B$4 D
#DIV/0! B
#DIV/0! C
Conditional formatting B
Double-click a cell
and click the Insert
Hyperlink command. B
It is impossible to
determine from the
information given. B
the F1 key. B
Either 3/4 or .75,
depending on the cell
formatting C
either a cell on a
worksheet or a
variable. D
B1:G10 D
SUM C
Scatter C
Paste Special B
=(B2*(D4+C2) C
vertical A
None of the above C
NET A
Lynx A
Message Digest C
Formula A
Address B
Password Cracker A
Protocols D
Approving A
Hacking B
Cracker C
Howard Aiken A
Msn .com B
None of above C
Protocols C
Pin B
PAN A
hypertext tracing
protocol C
All of Above B
virus checker A
Twisted pair B
a gateway calling
program for internet
bridging B
Network PC C
Mesh C
Mesh B
Ring C
Mesh A
limited by modem
speeds C
Netscape B
application protocol
interface C
connects a computer
to a network D
Netscape B
make of processor A
is a protocol for the
transfer of files
between computers D
none D
search engine D
make of processor A
is a protocol for the
transfer of files
between computers D
is a protocol that
allows for remote
login D
Individual computers
can connect to it
using an ISP. A
Port sniffing C
UDP flood A
traffic C
hub B
Limit logging on
access C
ActiveX-enabled sites
are safe. B
Use of encryption
methods D
by scanning the
computer for a
connection. B
Application updates D
Spyware D
LAN B
Shutdown of nuclear
plant safety systems D
To obtain an accurate
inventory of network
related equipment
and parts and
network nodes D
update its prices as
soon as they are
changed D
Lycos Search B
Criminal records A
Spyware B
make large amounts
of money by parking
funds in their bank
account. D
Hoaxing B
Web stalking. B
viruses. B
Use anti-spyware
software. B
Logical access
controls B
Neither I or II C
telnet C
Misleads a program
recompilation B
both HTML and
Internet Explorer B
Web browser. B
MHTML D
viewing an Excel
worksheet that you
have saved as a Web
page. B
Go to the Bookmarks
or Favorites page C
Video C
TIFF C
Cut and paste it to a
word processor
document. C
network topology A
an encryption. B
PoIP A
Desktop server,
software, and
hardware. A
icons C
guide C
eof,true D
project explorer D
bof,true D
val() D
oval D
fontsize D
one-ten thousandth of
a second C
listcount D
toolbox B
inputbox() D
dbopendynaset D
initialze C
graphical D
black B
white D
project explorer
window D
project explorer
window A
gotfocus D
none of the above C
activate D
style C
.ocx B
Audit A
On Error Resume
Next D
Resize A
UnloadMode
parameter to a zero
value A
Consists of several
Projects D
PaintPicture A
Msgbox error.number
& error.description D
To provide a
repository for images
used by other
controls D
GetBytes A
Value B
Input box D
Font C
KeyPress, KeyUp and
KeyDown D
Output mode B
x and y A
Property Set C
AutoRedraw property C
CurrentVal B
CStr A
built-in procedure. C
MsgBox statement
can be created with
the macro recorder,
while the InputBox
function cannot. B
Terminate C
color guide C
36 C
linear A
stream B
track changes A
eight B
none of these B
moving B
drawing tools A
.html(hypertext
format) B
twelve C
.doc(document) B
transition D
view show A
master notes A
slide sorter view C
none the above B
add-ins A
outline pane D
provides suggested
content and design D
set up show B
22 B
four times B
text, hypertext, Power
Point, video and
sound. D
Line style, Line color,
text font, and text
alignment D
The graph
placeholder is
deleted. C
Line chart B
Change to Slide
Sorter view. C
The datasheet
window is toggled
from closed to open
(or from open to
closed). D
The application that
created the chart is
started. A
Microsoft Graph will
restart. D
a slide one bullet item
at a time, build bullet
items a letter at a
time, and build bullet
items a word at a
time. D
Subtle, Moderate, or
Exciting D
Ctrl B
Custom animation
can be used to affect
the way objects
appear on a slide, to
what objects do after
they appear on a
slide, and to the way
objects exit a slide. D
The advanced
timeline shows
neither the sequence
in which objects will
appear on the slide,
nor the duration of the
effect applied to each
object. C
Clips, organization
charts, and text D
Animation program A
Fly in, From top, and
Dissolve in D
There is no such
thing as a Datasheet. B
OLIP. B
[Ctrl+Z] D
.frx B
count C
additem C
addnew B
movefirst C
UnloadMode
parameter to a zero
value A
Back Office A
Document Tip A
rotation D
forms A
11 A
ctrl+m A
ctrl+m D
CTRL+SHIFT+P A
ctrl+shift+p C
Reasonableness D
None of above C
None of above B
None of above B
None of above A
None of above C
None of above C
Hard disk B
Control Bus A
MAD B
Control Bus D
alphanumeric form A
represented 127
characters A
32 bits A
1024 bytes A
a 32-bit bus or 32-bit
registers D
CROM A
Hertz D
secondary storage
access time B
laser printer. D
contains a
microprocessor C
Logic Bus B
e-mail D
ctrl+home B
ctrl+v or Del A
Border A
File A
Bullets D
clear all D
files C
default document B
none of t he above A
tools+spelling menu A
alt+f5 A
hotmail A
vb script A
LAN A
top A
A section is a portion
of a document in
which certain page
formatting option can
be set D
A
A
top A
an .xls data can not
be inserted at
specified position in
the current document B
shift B
outliner C
send a package to a
friend D
Print preview B
Save C
sorting B
spreadsheet C
clipboard C
Font, Paragraph,
Bullet and Numbering C
Designated area on
the document C
digital scanner D
25 point B
impossible to
determine. B
to leave an original
section of text in
place while pasting a
copy elsewhere D
AutoCorrect B
Comments are
enclosed in a text box
at the right of the
document. D
The Versions
command will allow
you to save only two
versions of a
document: one
version of the original
and one version of
any changes made to
the document. A
Thesaurus A
Insert C
A drop-down list B
Comments can be
edited or deleted by
left clicking the
highlighted text. C
numbers. C
macro. A
This action is not
possible. C
Debugging D
Edit C
an enlarged capital
letter at the beginning
of a paragraph. A
A grid is a set of
horizontal and vertical
lines that determine
the placement of
elements in a
newsletter or other
document. D
72 D
Four B
Press Shift+Enter to
force a line break. C
Both B & C B
to display information
or pictures on a
screen B
a message pad B
a magic marker A
Data B
Parity Checker B
Validation B
Modem B
backup to a secure
medium D
Multiplexing D
Magnetic Disk B
Shareware C
Shareware A
Random C
Primary Storage B
Schema and
subschema A
Parity check C
Serial interface A
Video D
Drum B
recording current
stock in a
supermarket and
answering customer
queries. A
Spreadsheet D
loss of data D
NetBEUI A
text. A
allow encryption C
local B
extensible hashing A
general controls C
Control B
corrective controls C
resolution procedures C
loop testing A
(a) to (d) D
system walkthroughs B
Cross-training of
operating personnel. B
data design A
Hub C
Ring A
To Store data in an
organised manner B
Indexed B
Computer operations. C
A direct access file on
a tape C
Protocol B
Time sharing
computer C
Speeds up online
printing A
Star Network D
Instant post-office C
A mainframe PC B
All of them C
Device interconnect
standard D
None of the above B
EBCDIC A
Time Division
Multiplexor C
Reduce competition
between the
input/output devices C
Telephone Lines C
An online protocol B
None of the above B
Bus B
Hash Count A
Acoustic coupler C
All of them B
secondary storage
access time B
alphanumeric form A
alphanumeric form A
voice recognition B
input A
Printer B
Keyboard B
Printer A
Pickers B
an operating system C
Fifth - generation
computers. A
Arjun C
Image Scanning
Technology B
Thermal Printer A
transmitting it C
None of above B
An inked ribbon and
print head D
Unix operating
system B
10-9 sec D
communication D
process D
multitasking D
input/output symbol B
IBM-PC B
dummy servers A
LAN D
front end D
front end C
centralized A
data processing B
many A
relational database
system D
traps B
client-server C
system A
input, output,
performance ratios C
write A
multitasking D
process D
output D
thermal printers C
CPU, memory,
input, output D
interpreter B
procedures C
coder B
processor C