All Itt Questions
All Itt Questions
op1
Word 2000
click-n-type
O1
W
O2 pressing or tab
W
The______ feature allows the user to copy and paste upto 12 items at the office clipboard
______ and _____ key combination will extend the selection by one
shift+end and
shift+home
web layout,
O5
W
printlayout
The easiest way to create a document in word is
wizard
O6
In Office2000 environment the tool that makes work easier for us is_____ office assistant
Screen Tip
when the mouse pointer is allowed to stay for a second on the button
9
10 The keys that are used to navigate between headers and footers are
tab stop
up arrow keys
only
11 Pick out the element from the following that dose not form the type of
left
template
increase indent
mouse
14 Word art is text with
special effect
drawing toolbar
________ is a box surrounding a page on all slides or a line that sets off a
border
The key that is used to perform a task to select all t he text in the
ctrl+a
O1 documents is
9
W
ctrl+a
The key that is used to change the font from the current positioned in a
CTRL+SHIFT+F
O2
0
W
O2 document is
1
W
The key that is used to change the style of the document that is from
ctrl+shift+f
______ is the default view in Word used for typing Editing and Formatting
O2 the Text
3
NORMAL
ctrl+m
O2 documents is
4
W
ctrl+v or ins
ctrl+2
The box that separate text from the document and allows it to behave
Text Box
O2
5
W
O2
6
W
The object that is used to provide information like the title of the book,
Header and
Footer
8
W
Chart
To highlight certain parts of a page to set it apart from the rest of the
Borders
O2
9
W
To clear all the tabs in a document the option that is clicked from the
clear
O3 tabs dialog
1
W
The dialog box that is used to incorporate picture bullets into our
picture bullets
dialog box
2
W
The object that composes of set of tools which helps to create and work charts
doc1
thesaurus
O3 words
5
W
shift+f7
When a new table is created the insertion point flashes in the _____
first
By pressing the _____ key inserts a blank row after the last row in the
tab
O3
6
W
O3
7
W
O3 table
8
W
O3
convert text to
table
9
W
row
AutoCorrect
O4
0
W
Mail Merging
O4 keystroke
2
W
basic
In Word 2000 the macro dialog box is activated with the help of ____ key
shift+f8
O4
3
W
O4 combination
4
W
O4 web or on an intranet
5
W
email client
html
internet
O4
6
W
O4
7
W
O4 networks is _______
8
W
Which of the following statements are false with reference to the use of
be listed in the
it is not possible
O5 false
to change the
height of only
selected rows of a
table
left
A new section is
O5
1
W
O5
created in order
to change
properties like
number of
columns
W
O5
3
The user can set a spelling checker to skip the marked part of the next
true
New option under the file menu of word creates a new blank document
true
The user can split the screen only into two parts
true
The features that enables the user to type text graphics tables
O5
5
W
The user can modify the picture from the clip art
true
automatically
O5
7
W
O5 false
corrects common
typing, spelling
errors
left
O6
0
W
O6
not be inserted at
specified position
in the current
document
Drop Cap tool does not work for the contents in the table format
true
The user can split the screen only into two parts in MS-Word
true
O6
2
W
O6
3
W
The special symbols that are inserted using "insert symbol" option of the true
O6 word can not be printed by the printer as they are not standard keyboard
4
symbols
O6 columns only.
5
true
The document that makes the user to organize and maintain a long
Master Document
The view that enables us to view how objects will be positioned on the
Insert Mode
O6 cursor gets to the end of a line, what is the best way to get the cursor to key
9
Which key moves the cursor to the beginning of the next line of text?
tab
Veena typed the following sentence: "The girl was very beautiful." In
grammar checker
O7
0
W
O7
1
W
O7 which word processing utility could she find a synonym for "beautiful"?
2
W
send a public
message to
friends interested
in one topic
Aryan has created a ten-page story, but only wants to print the first two
Print all
Enter
closing
database
O7
5
W
O7
6
W
To analyse figures
subscript
O7
8
W
O7 document?
9
W
To analyse figures
What basic tools would you find in the Edit menu of a word processor
O8
0
W
O8
select
1
W
Text at the
O8
bottom of every
page
Mouse, printer
O8
and processing
system keyboard?
The user could take a picture from a magazine and insert it into the
Browser
O8 document by using a
4
W
O8
5
W
6 point
Given the default left and right margins, and -inch spacing between
2 inches.
Assume you have made all appropriate selections in the Columns dialog
O8 box in Word, but cannot see any columns on the screen. What is the
8
to store a file on
the hard drive
O9
0
W
Before submitting your work you want to find any words spelt
Thesaurus
O9 word him to her, and also the word he to she in the given phrase?
2
On a cold and still night, the only sound that could be heard was the
owl that had ade its home in the nest outs
What edit commands would you use to insert a paragraph from one
To give the
original author a
chance to accept
document?
suggested
changes from the
person who
entered the
revisions
A line appears
O9 document?
is to be deleted.
O9 document?
menu by choosing
Track Changes
command
The Versions
O9 Versions command?
command will
What happens when you open a document that has been saved using the All versions are
O9 Versions command?
opened
automatically.
You have used the word discover four times in an English essay you
Dictionary
O9 have created using a word processing program. You would like to find
9
Word displays a
00
Fields
Check boxes
O1 document?
Comments cannot
be edited.
03
Text at the
O1
bottom of every
04
page
In your English essay you notice that the paragraph at the bottom of
Press tab.
text.
O1 EXCEPT:
06
W
header/footer.
O1 page as a
07
W
Which of the following tools will copy the formatting of selected text to
Copy button
O1 other places?
08
W
Fault Finding
O1 macro?
09
W
Drop caps are added to a Word document using the ___________ menu.
Insert
a section of white
O1
10
W
O1
text on a black
11
background.
O1
setting it in larger
type or font size.
12
W
The reverse
O1
technique means
13
As related to type size, how many points are there to the inch?
O1
15
W
Assume you are working on a newsletter in which the masthead extends One
O1 across the top of the entire first page. The rest of the newsletter has
16 two columns. What is the minimum number of sections in the
newsletter?
W
Which of the following is NOT correct with respect to page, column, and Press Ctrl+Enter
O1 section breaks?
to create a page
17
break.
O1 newsletter headline?
A serif font at 10
points
18
W
O1
19
2 inches
op2
op3
op4
ans
Office 2000
Office 97
Back Office
double click
none of the
above
cut
select
none of the
above
shift+left and
ctr+end and
none of the
shift+right
ctr+home
above
normal layout,
none of the
web layout
layout
above
templates
none of the
program, MSWord
above
B
A
above
Tool Tip
Icon Tip
Document Tip A
marginal stop
ruler
none
B
D
only
arrow
center
decimal
rotation
model
dialogs/alerts
none
decrease indent
both A and B
none of the
above
control tool box
design wizard
pictures
control box
database
forms
11
printer setup
the file
above
style box
none of the
none of the
menu
shading
above
Del
ctrl+f
ctrl+m
Del
ctrl+f
ctrl+m
CTRL+O
CTRL+SHIFT+S
CTRL+SHIFT+ A
P
ctrl+o
ctrl+shift+s
ctrl+shift+p
ONLINE LAYOUT
PAGELAYOUT
ONLINE
DOCUMENT
ctrl+2
ctrl+end
ctrl+home
ctrl+c or ins
ctrl+x or ins
ctrl+v or Del
ctrl+5
ctrl+1
none of the
above
Frame
AutoShape
Border
Screen Tips
Page Layout
none of the
above
WordArt
Auto Shapes
File
Shading
WordArt
Bullets
remove all
remove
clear all
arrow bullet
none dialog
dialog box
box
box
WordArt
AutoShapes
files
document1
new document
default
document
hyphenation
mail merge
none of t he
above
thesaurus menu
shift+f8
tools+spelling A
menu
second
first row
end
enter
none of the
above
convert data to
none of the
table
option
above
records
none of the
above
AutoFormat
style gallery
none of the
above
Macro
Data Source
none of the
above
visual basic
vj++
visual FoxPro
shift+f7
alt+f8
alt+f5
online layout
browser
none of the
view
above
outlook express
hotmail
xml
sgml
vb script
intranet
arpanet
LAN
the field
the number of B
separators in a
header source
in the header
fields you've
source must
document
as the number
of data fields
in the data
source
auto format
by default cell
delete cells
option applies to
option allows
entire row or a
column or
or columns of a
shift cells up
table
or shifts cells
decimal
left
top
A section is a
inserted in the
portion of a
second section
document in
document a
which certain
section break is
header is
page
inserted after t
applicable to the
formatting
he third page
first section
option can be
justified
set
false
false
false
click -n-type
Double Click
none of the
above
false
with t he caps B
lock key
auto correct
grammatically
accidentally
entry
errors
turned on
reverses the
case of the
letters that
were
capitalized
incorrectly
and then turns
off the caps
lock
password
password can B
protected
case sensitive
be upto 15
document can be
characters
opened without
long
password as read
only
justified
hanging
top
a document file
a multiple
an .xls data
can not be
the current
can be inserted in
inserted at
document at
the single
specified
position in the
current
document
false
false
false
false
Child Document
Page Layout
Hyperlink
none of the
Document
above
Outline Layout
none of the
above
Type Over mode
Remove
none of the
above
press the tab key press the escape
just keep
key
typing
rows and
columns
enter/return
backspace/ delete
shift
spell checker
thesaurus
outliner
send pictures to
send private
send a
a friend
messages to a
package to a
friend
friend
Page setup
Print preview
Copy
Retrieve
Save
tabbing
spacing
sorting
graphing
word processing
spreadsheet
Creating and
editing
above
documents
annotation
clip art
Creating and
editing
clipboard
Calculations
documents
Spelling,
Font,
grammar and
and clear
Paragraph,
autocorrect
Bullet and
Numbering
Numbers which
Designated
appear on every
area on the
page
page
document
None of the
monitor and
and mouse
above
microphone
digital
printer
clip-art file
scanner
Spelling,
None of the
grammar and
and clear
above
10 point
15 point
25 point
2 inches.
3 inches.
impossible to
autocorrect
determine.
You have not
Word cannot
display
during editing;
you will see
them only
when you
print the
to store a file on
to move a section
document.
to leave an
a diskette
original
original location to
section of text
another location
in place while
pasting a copy
elsewhere
Mainly text
Spell Checker
A set of different
None of the
graphics
above
Grammar Checker
Find and
Replace
Replace
Select all
AutoCorrect
Insert, then
paste
To give the
To complicate the
To allow
original author a
revision process
multiple
chance to reject
people to
suggested
author to spend
work on one
document in
person who
collaboration
corrections
entered the
with one
revisions
another
A red underline
A vertical line
Comments are D
appears beneath
enclosed in a
text that is to be
margin signifies a
text box at
added.
the right of
the document.
in the document.
Through the
Through tools on
Both through
Tools menu by
the Reviewing
the Tools
choosing Track
toolbar
Changes
Reviewing
command
toolbar
The Versions
The Versions
The Versions
command will
allow you to
one version of a
of a document,
document without
versions of a
including any
document:
one version of
the original
the document.
to that document.
and one
version of any
changes made
to the
document.
The latest
The previous
version is
automatically.
are opened
opened
automatically.
automatically.
Grammar check
Spell check
Thesaurus
Word is not
version will
appear at the
most recent
version of a
document.
Tools
Forms
Insert
Toggle button
Text fields
A drop-down
list
Comments
Comments can be
Comments
cannot be
deleted.
or deleted by
highlighted text.
left clicking
the
highlighted
text.
Numbers which
None of the
appear on every
above
page
page
Press Return.
Insert page
break.
graphics.
forms.
numbers.
bibliography.
find/search.
macro.
Paste button
Format Painter
This action is
button
not possible.
Bug Squashing
Error Injecting
Debugging
Tools
Format
Edit
a section of text
to establish where
capital letter
letter of each
different elements
at the
sentence is
of the newsletter
beginning of a
lowercase and
will go.
paragraph.
capital letters.
color.
A pull quote is a
A dropped cap is a
A grid is a set D
quotation taken
of horizontal
and vertical
another
letter when it
lines that
document.
should have a
determine the
capital letter.
placement of
elements in a
newsletter or
other
document.
The height of
The number of
The tab
each column
columns
spacing within
each column
10
12
72
Two
Three
Four
Press
Press Enter to
Press
Ctrl+Shift+Enter
create a section
Shift+Enter to
to create a
break.
force a line
column break.
break.
A serif font at 20
A sans serif
at 10 points
points
font at 45
points
3 inches
4 inches
It depends on
the left and
right margins,
and how many
columns are
specified.
q_id
EX1
EX2
EX3
EX4
EX5
EX6
EX7
EX8
EX9
EX10
EX11
EX12
EX13
EX14
EX15
EX16
EX17
EX18
EX19
q_desc
op1
text import
wizard
cell
reference
text files
=today()
The function that in used to join cell values together in a single cell ________
The function that is used to count all the values that meet specific criteria
_________
concatenate
serial values
dollar sign
AutoSum
variables
text
countif
pivot table
wizard
sumif
average
page setup
EX22
EX23
EX24
pivot table
wizard
series or
rank
EX25
series or rank
EX20
EX21
filtering
all option
1
data table
EX26
series or rank
EX27
EX28
EX29
series or rank
column chart
column chart
EX30
The chart that display two or more data series on a surface is _________
EX31
column chart
column
chart
EX32
spaces
EX33
Which of the following tool cannot be used to view the excel web page_______
excel97
EX34
EX35
The wizard that used to build an interactive table from data existing on sheets
The chart that is used for displaying stock market information
In excel, the subtotal command also generates grand total after the last group
subtotal_________
In advanced filter , the criteria occupying multiple columns but more than one row,
is considered as an ________ criteria.
EX36
EX37
EX38
EX39
EX40
EX41
pivot table
wizard
line chart
true
and
3dimensions
true
Data table
It is also
called as highlow-close
chart
EX44
Which one of the following statements related to stock chart is NOT TRUE ?
The state government needs to finalize a five years plan to implement 100%
literacy in the state. Which one of the following will be the best tool that should be
used to work out the plan ?
Pivot table
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC
party needs to won in totality to obtain majority to form the government. Which
one of the following will be the tool that will help the team ?
Goal seek
Which one of the following will be the tool that provides a way to view and
compare the results of all the different variations together on the worksheet ?
Goal seek
EX45
Workbook
EX46
Performing
calculations.
EX47
EX48
EX49
Which one of the following is NOT the component of the pivot table ?
Excel allows upto ______ levels of sorting
Filtering rearranges a list to display the required records
Column field
two
true
EX42
EX43
EX50
EX51
3dimensions
Data table
EX54
It displays the
data series
Which one of the following statements related to stacked bar chart is NOT TRUE one on top of
?
the other.
The state government needs to finalize a five years plan to implement 100%
literacy in the state. Which one of the following will be the best tool that should be
used to work out the plan ?
Pivot table.
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC
party needs to won in totality to obtain majority to form the government. Which
one of the following will be the tool that will help the team ?
Goal seek
EX55
EX56
Count.
databases
EX57
Which two of the following statements related to pivot table are TRUE ?
It is a tool
for
summarizing
and
analyzing
the data
records in
an
interactive
manner.
EX58
Goal seek.
EX59
EX60
EX61
EX62
EX52
EX53
EX63
text import
wizard
worksheet
application
window
A dark wide
border
8,16,32
your formula
has a syntax
error
ability to
generate
tables
EX64
EX65
EX66
EX67
EX68
double-click
any cell in the
column
EX69
EX70
ENTER
EX71
If you press _____, the cell accepts your typing as its contents.
The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known
as
EX72
EX73
EX74
100
Cell
references
^
EX75
B5*B6
EX76
E12
How can you tell which cell in a worksheet is the active cell?
It is
surrounded
by a heavy
border.
By clicking in
a different
cell
EX77
EX78
array.
The Standard
toolbar
the New
command on
the File
menu.
EX79
Which of the following would you use to change the font size of a cell in Excel?
EX80
EX84
The command that will save the current workbook with a different file type is:
The command that will print an Excel workbook is found on the ____________
menu.
In the Save As and Open dialog boxes, the ___________ view shows the file size
as well as the date and time a file was last modified.
Which of the following commands will automatically adjust cell references in
formulas?
Which of the following commands will remove cells, rows, or columns from a
worksheet?
EX85
Which of the following options is NOT controlled through the Page Setup
command?
Clear
Orientation
(portrait or
landscape)
EX86
EX87
EX88
Which command enables you to change the margins for a printed worksheet?
All commands are carried out on a rectangular groups of cells known as a:
Which of the following is a valid cell range?
Options
worksheet.
6
EX89
In a copy operation, the cell(s) you are copying from is called the:
copy range.
EX90
paste range.
The Duplicate
command
absolute
B4
EX95
EX96
Which of the following commands is needed to transfer the contents of one cell
range to another?
The Move
command
EX97
copy and
paste cells.
EX98
Which of the following quickly copies the formatting of a selected cell to other
cells?
the Fill
Handle
EX81
EX82
EX83
EX91
EX92
EX93
EX94
File
Preview
Insert
#DIV/0!
#DIV/0!
Select the
Insert
Hyperlink
command
from the File
menu.
EX100
whether the
cell has a
formula or a
value in it.
EX101
If you enter a date into a cell, Excel stores the date as:
text with a
two-digit year.
EX102
You created a worksheet on July 30 and entered the =Today() function in cell
E17. You opened that worksheet again on August 31. What will be displayed in
cell E17 on August 31?
EX103
EX104
The number of days between two cells containing dates can be calculated by:
The function key that is used to quickly edit the contents of a cell is:
Jul-30
subtracting
the earlier
date from
the later
one.
the F4 key.
EX105
03-Apr
EX106
EX99
EX107
EX108
EX109
a cell on a
worksheet.
B1-G10
AVERAGE
Combination
EX110
Once a bar
chart is
chosen it
cannot be
changed to a
column chart.
hold down
the CTRL
key
EX114
To select several cells or ranges that are not touching each other, you would
_____ while selecting.
Your Institute teachers have set an assignment on Studies. You are required to
use a spreadsheet to record all that you study on each day for four weeks. You
decide to show each weeks data with an accompanying graph. What is the best
way of doing this
Use tables
What would be the best method to quickly copy the formula from the active cell to
each cell below it?
Paste
To arrange rows in alphabetical order based on column A, you need to use the
command _____.
Tools | Sort
EX115
EX116
To print just part of a sheet, you would select what you want to print and _____ .
EX117
EX118
EX119
EX120
portrait
EX121
AD213
EX111
EX112
EX113
Analyse data
op2
op3
convert text to
columns
wizard
tip wizard
column
row reference reference
quattropro or
Lotus 1-2-3
xbase files
domain
values
range values
=currentdate(
=date()
)
op4
function
wizard
none of the
above
ans
A
A
class files
reference
values
none of the
above
none of the
above
none of the
above
none of the
above
Boolean
none of the
above
pmt
count
convert text to
columns
tip wizard
chart wizard wizard
none of the
countif
above
pmt
sum
sumif
print area
print
none of the
above
# sign
function
wizard
arguments
parameters
logical
numeric
pmt
merge
vlookup
AutoFill
countif
none of the
above
D
A
A
C
B
B
B
A
A
formatting
print area
shading
print
searching
sorting
none of the
above
print preview
none of the
above
blanks
2
all blanks
3
none
4
filtered table
chart wizard
index table
pivot table
convert text to
columns
wizard
tip wizard
category
legend
data marker
category
legend
data marker
B
B
A
A
B
category
legend
data marker
category
bar chart
bar chart
legend
pie chart
pie chart
data marker
surface chart
surface chart
D
C
B
bar chart
pie chart
surface chart D
bar chart
wild card
characters
internet
explorer
pie chart
surface chart
none of the
above
chart wizard
bar chart
symbols
Netscape
word 2000
convert text to
columns
wizard
tip wizard
stock chart pie chart
A
A
A
A
C
false
or
Multi4-dimensions dimensions
false
A
A
Pivot table
It shows
trends over
time
It is often
used to
display share
market prices
over a period
of time
It is also used
for indicating
fluctuations in
temperature
changes
B
Scenario
manager
Solver
Data table.
Scenario
manager
Pivot table
Data table.
Pivot table
Solver
Data table.
none of the
Spreadsheet above
Performing
All of the
text
formatting.
above
Source table Pivot table
item.
name.
N
Worksheet
Performing
database
operations
Row field.
three
false
D
C
B
B
Multi4-dimensions dimensions
Pivot table
It is useful
when several
components
are changing
and the user
is interested
in the sum of
the
components.
It can be
represented
in 3dimensions
Scenario
manager
Solver
Data table
Pivot table
Data table
SumIf
tables
worksheets
A
D
Scenario
manager
Standard
deviation
records
It is a tool that
provides a
way to view
and compare
the results of
all the
different
variations
together on
the worksheet
Scenario
manager
convert text
to columns
wizard
workbook
document
window
A dotted
border
2,4,2
It summarizes
the data by
using
analytical
functions.
solver
tip wizard
tables
modal
window
A
Pivot table
function
wizard
database
B
A
C
No border
A blinking
border
2,2,2
6,8,10
the column
the row is too is too
short to show narrow to
the number at show all the
digits of the
the current
font size
either b or c
C
number
flexibility of
cost of initial
speed of
moving
calculation
entries
D
set-up
graphical
Address
database
Gap
Drawing
Writing letters pictures
drag from the
top cell in the
column to the click the
last cell in the column
column
heading
CTRL +
ENTER
TAB
function.
(201)5551212.
constant.
Functions
/
#VALUE!
Numeric
constants
*
C3/D4
D4^2
spreadsheet
Rows
Document
filing
D
A
A
click the
column label
INSERT
formula.
Tom
McKenzie.
Text
constants
\
B
C
D
D
It is impossible
to determine. C
G7*SUM(H9:H
SUM(H9:H11) 11)
B
It is blinking.
The phrase
It is displayed active cell
in reverse
appears in the
video.
Status bar.
A
By either
clicking in a
different cell
By using the or using the
arrow keys to arrow keys
to move to a
move to a
different cell different cell
By typing the
reference of
the cell you
want to move
to in the
formula bar
The Cell
Format
command on
the Edit menu
the Save As
command on
the Save
command on the File
the File menu. menu.
Edit
View
Window
Details
Properties
Clear
Delete
List
Both Insert
and Delete
Both Clear
and Delete
Remove
Headers and
footers
Fonts
Margins
Page Setup
range.
D12, G25
destination
range.
destination
range.
View
group.
D12:G25
Edit
cell group.
D
B
B
C
clipboard.
source range. D
clipboard.
The Copy
command
relative
$B4
The Paste
command
mixed
B$4
source range.
Both the
Copy and
Paste
commands
constant
$B$4
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
The Cut
command
The Paste
command
#DIV/0!
C
Both the Cut
and Paste
D
commands
The
Formatting
toolbar
Delete
edit cells.
the Format
Painter
cycle
through
absolute,
relative, and
mixed cell
references.
the
Formatting
toolbar
D
A
D
cycle through
open
applications.
Conditional
formatting
Click the
Insert
Hyperlink
button on
the Standard
toolbar.
the cell
address.
Right-click a
cell and click
the Edit
Hyperlink
command.
whether the
cell has an
absolute or a
relative cell
reference.
Double-click a
cell and click
the Insert
Hyperlink
command.
B
the value in
the cell
text with a
four-digit year. an integer.
Aug-31
29/03/2008
It is impossible
to determine
from the
information
given.
B
adding the
earlier date to
the later one.
the F2 key.
subtracting
the later date
from the
earlier one.
the Esc key.
adding the
later date to
the earlier
one.
the F1 key.
0.75
March 4 of
the current
year
Either 3/4 or
.75, depending
on the cell
formatting
C
a variable.
a constant.
either a cell
on a
worksheet or
D
a variable.
B1.G10
B1;G10
B1:G10
COUNT
Line
MAX
Pie
SUM
Scatter
C
C
A
B
Once a line
chart has
been chosen
it can be
changed to a
D
pie chart.
hold down
hold down the hold down the CTRL +
SHIFT key
ALT key
SHIFT
A
Once a
column chart
is chosen it
cannot be
changed to a
bar chart.
Once a pie
chart has
been chosen
it cannot be
changed to
line chart.
Transfer
Create four
information to Use multiple
separate files a database
sheets
Paste Special
none of the
choices
Data | Sort
None of the
Calculate data Create forms above
select Print
select Print
selection on selection in
press the
Page Setup | the Print
dialog and
PRINT
Sheet and
SCREEN key then print
then print
drawing
None of the
writing letters pictures
above
Fill Down
Fill Right
Edit | Data |
Sort
D4+C2*B2
#VALUE!
=A3SUM:B3S
UM:C3SUM REF!
whatever was
landscape
last used
ZA1
A0
D
B
B
C
D
A
=(B2*(D4+C2) C
None of the
above
B
vertical
None of the
above
A
C
q_id
DB62
q_desc
In MS-Access, while using form design view, for creating a command button for adding
a new record, we should select the _______ category from the command button
wizard
DB63
DB64
DB65
DB66
DB67
DB68
In MS-Access, user may specify criteria for filter in form view using _________
___wildcard character represents any single character
Records cannot be sorted by a primary key
DB69
DB70
DB71
DB72
DB73
DB74
DB75
DB76
DB77
DB78
DB79
DB80
DB81
DB82
DB83
DB84
DB85
DB86
DB87
DB88
_____option from the new object toolbar gives the easiest way of generating a report
______ represents data in a pictorial format
Changes of one table can be carried over to another related table
Hyperlinks are used to jump to any kind of information or data from a file
The memo field can have text upto_____ characters in length
In MS-Access, columnar layout can be used to view multiple records in a form
In MS-Access, alter command may be used in adding a primary key to a table
Update query is used to add records from one or more tables to the end of an existing
table
DB89
DB90
DB91
DB92
DB93
In ms-access, to protect a database file from illegal access, we may set database
password. The option of setting database password is available in _______ menu
DB94
DB95
Foreign key is a field that uniquely identifies each record and accept no null values
Data definition queries are used to create or change database objects
DB96
DB97
DB98
DB99
DB100
DB101
DB102
DB103
DB104
DB105
DB106
We can switch from datasheet view to form view by selecting view -> form view option
In MS-Access long integer is a datatype
In MS-Access, while designing a table for a particular field, the Required parameter is
set to yes. This validates the field as _______
Sorting is applied to select only some particular records
Filter by form can be created from a forms shortcut menu
Advanced filter uses a filter similar to the query design window to create a filter
? Wildcard character represents any number of characters
DB107
DB108
DB109
DB110
DB111
DB112
DB113
DB114
DB115
DB116
DB117
DB118
DB119
DB120
DB121
DB122
DB123
DB124
DB125
DB126
DB127
DB128
DB129
DB130
DB131
DB132
DB133
DB134
DB135
DB1
DB2
_________ data type is generally used for fields assigned as primary keys in a table
MS access objects can be published in the web
DB3
DB4
DB5
DB6
DB7
The three list boxes present at the bottom of the expression builder are called_____
DB8
DB9
DB10
DB11
________option is selected from the view menu to create macros with conditions
_______report can be created with minimum user input
_______layout of a form displays one record at a time
The table or query name on which we are going to build our report is selected from the
____ dialogue box
DB12
DB13
DB14
DB15
In ms-access, while using SQL, references constraint is used for creating _______
DB16
DB17
DB18
DB19
DB20
DB21
DB22
_______query is used to add records from one or more tables into an existing table
DB23
DB24
DB25
DB26
DB27
DB28
DB29
DB30
DB31
DB32
DB33
_______ option in publish to web wizard produces a page that is static in nature
DB34
DB35
DB36
DB37
DB38
DB40
DB41
_______option from the file menu is selected to run 'publish to the web wizard'
_____page in an web application is used to navigate to the rest of the pages in the
application
______ is fired when an event is triggered is the concept based on a Visual Basic
language
Ms access is a ___________
DB42
DB43
DB44
DB45
DB46
DB47
If two tables having same values for the fields are joined it is called an ______
DB48
Duplication of records in a field won't be allowed if the fields are declared a________
DB49
Changes from a master table can be reflected on to the child table by selecting
_____option
DB50
DB51
DB52
DB53
DB39
DB54
DB55
DB56
DB57
DB58
DB59
Which of the following dialog box is/are used in the creation of form ________
_______ query wizards are used to generate summary calculations for a table
DB60
DB61
DB136
DB137
DB138
DB139
DB140
DB141
DB142
DB143
DB144
DB145
DB146
DB147
DB148
DB149
DB150
DB151
DB152
DB153
DB154
A ________ sheet lists all the properties that pertain to the form or the controls
Textboxes can also be an example of unbound control
In MS-Access, we may design command buttons for navigating records
DB155
DB156
DB157
DB158
DB159
_______ are employed to select only some particular records from a database object
DB160
DB161
DB162
MS access is a DBMS
DB163
A form can be bind to a record source using _____ property of the form
DB164
DB165
______ forms are usually used for tables with one to many relationship
DB166
DB167
DB168
_______is the form that can be created with minimum input from the user
DB169
______option from the tool menu is selected for setting relationships between tables
DB170
DB171
DB172
DB173
________is a database object which displays data but cannot be used to edit data
What term applies to a collection of related records in a database?
DB174
All of the following terms are related to computerized databases except which one?
DB175
What is a database?
DB176
DB177
An RDBMS is a
DB178
DB179
DB180
What is a database?
DB181
DB182
What is a report?
DB183
DB184
DB185
Which of the following constraints can be used to enforce the uniqueness of rows in a
table?
DB186
DB187
An RDBMS is a
DB188
DB189
DB190
DB192
DB193
DB194
This database holds personal information. The user can help to keep it confidential by
If the database holds customer names and addresses, personalised letters can be
created automatically using
Application software suited to storing the survey information obtained in the table
would be
The characters * and ? are sometimes used in search criteria as
Which of the following field types will generate the primary key automatically?
DB195
DB191
DB196
DB197
DB198
DB199
You are creating a banking database to track customer loans. The bank will, of course,
have many customers, each of whom may take out one or more loans, while each loan
may be associated with only one customer (there are no joint accounts). What is the re
In a one-to-many relationship between Companies and Employees, which field is found
in both tables?
DB200
Which of the following ensures that records in related tables are consistent with one
another? For example, it ensures that you cannot add a record with an invalid foreign
key.
DB201
How would you delete a relationship between tables in the Relationships window?
DB202
In a Customers tables, what does a plus sign next to the CustomerID field mean?
DB203
DB204
Assume a one-to-many relationship between the Customers table and the Loans table,
with referential integrity in effect. What happens when you attempt to delete a
customer ID from the Customer table that still has entries in the Loans table?
DB205
Which of the following is true when viewing a main form and its associated subform in
the Form Design view?
DB207
DB208
DB209
The correct order of the arguments for the MsgBox statement is:
DB210
DB211
DB212
A text field:
DB213
DB214
DB215
A database stores:
A database records:
DB206
DB216
DB217
DB218
The industry standard supported by all major DBMSs that allows tables to be joined
together is called __________.
DB219
DB220
A program whose job is to create, process and administer databases is called the
_____
Microsoft Access may use which of the following DBMS engines?
DB221
DB222
DB223
DB224
DB225
DB226
DB227
DB228
DB229
DB230
DB231
DB232
DB233
DB234
DB235
DB236
DB237
In a relation __________________________ .
An attribute is also known as a(n)
DB238
DB239
DB240
DB242
DB243
When you are given a set of tables and asked to create a database to store their data,
the first step is to ____ .
DB244
DB245
DB241
DB246
DB247
We have obtained access to the company's operational data. We have been asked to
produce a report with an item by item analysis of sales, but the only sales figure
available is the total sale value for each order. This is example of_____
DB248
DB249
DB250
DB251
You are developing an Access application that you expect to upgrade periodically.
Which of the following statements is TRUE?
DB252
DB253
DB254
DB255
What is the Access tool that is used to create the user interface?
DB256
op1
Record
Navigation
op2
op3
Record
Operations
op4
Form
Operations
hierarchical
columnar form tabular form form
None of the
above
one to many
form
filtering
querying
ordering
sorts
filter by
filter by form selection
*
$
true
false
unbound
bound control control
option
button group group
filter
database
form
sorting
pipes
gateways
None of the
filter by menu above
@
?
data less
control
bound
unbound
CURRDATE() TODAY()
text box
list box
columnar
form
tabular form
pivot table
data sheet
filter
filter by input filter by form
option
control
control
button wizard wizard
wizard
two of the
ram*
above
ram??
true
false
form
table
report
autoreport
chart
true
true
60,000
true
true
report
label
false
false
255
false
false
true
false
table
table
true
true
query
form
false
false
data control
ans
B
B
C
A
A
D
B
B
B
A
C
C
B
main form
none of the
above
tool wizard
none of the
above
module
bitmap
ledger
none of the
above
report
25,000
64,000
form
report
all of the
above
hyperlink
B
B
A
A
A
A
A
D
B
A
B
D
D
A
A
Insert
Records
Tools
none of the
above
true
true
false
false
composite
alternate keys keys
false
true
true
false
false
true
B
A
candidate
keys
primary key
true
true
false
false
null
true
true
true
true
not null
false
false
false
false
pie
true
true
true
bar
false
false
false
update query
true
true
inner join
true
true
true
freestanding
true
true
true
true
the first field
of the table
forms
true
select query
false
false
outer join
false
false
false
embedded
false
false
false
false
the last field
of the table
reports
false
delete query
delete
true
true
freestanding
insert
false
false
embedded
append
add
stand alone
sub chart
C
A
B
A
A
B
zero
none of the
above
none of the
both 1 and 2 above
self join
stand alone
primary key
field
attributes
B
B
B
A
B
C
A
A
B
append query B
B
A
table join
C
B
A
B
D
sub chart
B
B
B
A
none of the
above
C
D
entities
A
use datasheet
in forms
use export
A
A
B
B
D
B
B
true
true
true
false
false
false
integer
true
number
false
actions
report
events
form
expression
elements
macro
B
A
A
primary
number
procedures
chart
auto number D
A
none of the
above
B
macros
D
action list
comments
expression
code builder builder
expression
elements list
macro list
box
conditions
tabular
tabular
action
columnar
columnar
create report
columnar and
tabular
true
create fields
link report
stable and
unstable
false
add chart
primary key
label wizard
chart wizard
start header
report footer
page footer
for ordering
records
for updating
records
condition
VB Modules
group
reports
group footer
for specifying
conditions
with group by none of the
clause
above
none of the
macro names above
forms
macros
add
append
insert
report
true
RAD
RAP
RAID
SysCmd
MsgBox
message
OLE
DDE
CME
calculator
insert
auto report
datasheet
embedded
report
dynamic and
static
chart
mail wizard
action
expression
elements
none of the
above
none of the
above
embedded
justified
new report
none of the
above
insert chart
none of the
above
none of the
above
D
C
C
A
C
B
D
A
B
C
C
A
report header D
none of the
above
B
delete
none of the
above
none of the
above
none of the
above
none of the
above
C
C
D
B
C
A
A
B
A
object linking
and
embedding
on line
execution
OLE object
OLE client
none of the
on line editing above
A
OLE
communicato
OLE server
r
C
linked
exe
embedded
DLL
connected
BMP
form wizard
static file
static html
append
dollars
unbound
object
display as
icon
add
rupees
dynamic file
edited
html
publish to
web wizard
none of the
above
A
D
D
B
insert
pesos
command
bound object button
data definition D
yen
A
list box
display
link
create html
new
save as html
startup
home
end
bullet
DBMS
command
RDBMS
data
collection
new blank
database
dialog box
64000
procedure
front end
create icon
none of the
above
none of the
above
none of the
above
language
database
data storage
data group
new dialog
box
255
automatic
number
true
C
B
C
A
A
A
B
B
A
A
C
B
C
true
false
property field
Dynaset field
field property properties
properties
crosstab
queries
row/column
queries
row/column
action queries queries
inner join
self join
true
false
new form
form create
dialog box
dialog box
summary
sum
change
properties
properties
included form sub form
select queries
change/delete
queries
no match join
update
queries
update
queries
outer join
form wizard
dialog
append
form
properties
new form
both 1 and 3
simple
new
properties
child form
A
A
D
A
D
D
B
B
true
false
true
false
&
true
page
true
#
false
detail
false
true
false
true
true
true
relational
true
false
false
false
list
false
A
B
A
C
B
action
language
structured
query
language
report
true
group
group
topic
range
logical
event procedural
based
language
none of the
above
form
false
record
query
table
session
data
true
true
property
false
false
both a and b
detail
none of the
above
sub forms
graphs
number
child forms
chart
primary key
inner form
labels
index
pivot
create
form
filters
queries
sorts
form
list box
bound
combo box
unbound
button
none of the
above
report
identifier
none of the
above
D
A
C
A
C
B
B
D
B
A
A
A
B
B
A
forms
A
none of the
above
C
option button B
true
false
form name
control
tabular form
chart form
sub forms
tabular form
calculated
calculated
bound
unbound
sub form
auto form
set relation
connect
A
none of the
record source above
data sheet
none of the
form
above
columnar
none of the
form
above
none of the
unbound
above
bound
static
columnar
tabular form form
none of the
relationships above
C
A
A
A
C
B
C
command
option, toggle button, check
and command and list
list, check and
buttons
boxes
combo boxes
filter by
filter by form report
filter by record
option button,
toggle button
and check
boxes
D
filter by input
form
clipboard
report
file
macro
field
table
layout
B
B
search
sort
field names
record grab
A way to
analyse and
manipulate
numerical
information
An organised
A tool to
way of storing
produce high information
A way of
quality
about a set of maintaining a
documents
similar things log
It contains all
Information
the data
A document
about certain about one
which
A collection of
programs
specific item contains text files
relative
Relational
Reliable
remote DBMS DBMS
DBMS
DBMS
storing data
uses tape as
offline at a
backing up
is related to
opposed to
separate site data regularly data mining
disk
Computer
Database
Key
sequence
Computer
access
verification
checks
matching
controls
A way to
analyse and
manipulate
numerical
information
A tool to
produce high
qualitydocum
ents
An organised
way of storing
information
about a set of None of the
similar things above
B
C
It contains all
the data
about one
specific item
Reports
provide a
very flexible
way of
creating and
editing
documents
Spreadsheet
s make data
Extracting and easy to
analysing data analyse
Information
about certain
programs
Reports allow
users to
extract
information as
hard copy
(printed
output)
Compilers,
interpreters,
editors
DEFAULT
and NOT
NULL
constraints
CHANGE
TABLE
Network
software,
backup
systems
A document
which
contains text
None of the
above
A tool which
allows text
and graphics
to be placed None of the
in documents above
None of the
above
None of the
above
Using queries
Word
processors,
spreadsheets,
databases,
DTP
PRIMARY
KEY and
UNIQUE
constraints
ALTER
TABLE
Relational
DBMS
FOREIGN
KEY
constraints
MODIFY
TABLE
relative
remote DBMS DBMS
storing data
offline at a
backing up
is related to
separate site data regularly data mining
IDENTITY
columns
UPDATE
TABLE
Reliable
DBMS
uses tape as
opposed to
disk
Number
Description
Source
using a
password
the product
code
keeping the
keeping a
original paper
backup copy copy
the primary
key
mail merge
A database
bookmarks
Auto Primary
Graphics
operators
Auto ID
e-mail
engines
Auto Key
A
C
C
reports are
consistent
with the
underlying
tables or
queries.
records in a
dynaset are
consistent
with the
underlying
tables.
Component
browser
wildcards
AutoNumber
forms in a
related tables database are
in a database consistent
are
with the
consistent
underlying
with one
tables or
another.
queries.
C
C
C
foreign key.
main form
and a
subform.
the primary
the primary a field from an not a primary
key of both
key of the
unrelated
key of either
related tables. related table. table.
related table. B
One-to-one
EmployeeID
The Tools
menu,
Relationship
window
Referential
integrity
Right-click
the
Relationship
line, then
select Delete
from the
shortcut
menu
Double click
the
Relationship
line
That there are
several
customers
That some of
associated
the data is
with that ID
not viewable
They must
both be
numbers
Nothing,
Access
ignores the
attempted
command.
The one-tomany
relationship
Select Undo
in the
Relationships
pull-down
menu
Click the
Delete
Relationships
button on the
toolbar
B
That records
can be added
by clicking on
the plus sign C
They must be
the same
data type
D
An error
message is
displayed.
The subform
is not visible.
A one-tomany
relationship
between
teams and
players
The subform
is an object
on the form
The subform
and can be
is displayed The subform moved or
in Datasheet is displayed in sized like any
view.
Form view.
other object. D
A one-toA one-toA many-tomany
many
many
relationship relationship
relationship
between
between
between
teams and
coaches and players and
coaches
teams
teams
C
M
The
Customers
table only
when there
are Loan
records
associated
Either table at with that
any time
customer
The Loans
table at any
time
Neither table C
prompt, title
bar text, icon.
Dim
CreateList.
prompt, icon,
title bar text.
Sub
CreateList.
A text field
A check box enables the
enables the
form user to
form user to choose from
choose from one of
one of several several
existing
existing
entries.
entries.
must be set
must be set
for multiple
for one word. words.
CreateList.
Sub.
A drop-down
list enables
the user to
choose from
one of several
existing
entries.
A drop-down
list enables
the user to
enter text.
C
help people
keep track of
things.
create tables
store data in of rows and
tables.
columns.
data.
facts.
relationships. metadata.
figures.
information.
maintain data
on different
things in
different
tables.
A
all of the
above
D
a and b
D
single-user
database
application
single-user
database
application
Sequential
Query
Language
(SQL)
multiuser
database
application
multiuser
database
application
Structured
Question
Language
(SQL)
e-commerce
database
application
e-commerce
database
application
Structured
Query
Language
(SQL)
Database
Modeling
System
Jet
Database
Management
System
SQL Server
Data
Business
Model System
Oracle
The database
management
system
(DBMS)
The user
the database
application(s)
interact(s)
with the
DBMS
creates
queries
The
database
application
the DBMS
accesses the
database
None of
data
above
creates
creates form reports
the database
management
the database system
the user
application
(DBMS)
it contains a
all the users' it reduces
description of
data is in one data
its own
place
duplication
structure
holds user
holds
data
metadata
holds indexes
stored
tables
metadata
procedures
as a new
systems
as a redesign
from existing development of an existing
data
project
database
as a new
from existing systems
as a redesign
non-database development of an existing
data
project
database
as a new
systems
as a redesign
from existing development of an existing
data
project
database
a or b
None of
above
Relational
Question
Language
(RQL)
Relational
Model
Manager
a and b
B
D
All of the
above.
All of above
b and c
the database B
All of the
above.
All of the
above.
All of the
above.
C
D
D
a and b
a and b
a and b
data marts
data marts
data marts
entityrelationship
data modeling A
entityrelationship
data modeling B
entityrelationship
data modeling D
entityrelationship
data marts
normalization data modeling
hierarchical network
file managers models
models
data
migration
relational data
model
more than
one column
can use the
same name
field
D
A
entities in a
column vary
as to kind
table
the order of
the columns
is important
relation
the order of
the rows is
unimportant
row
record
field
tuple
record
field
key
composite
key
foreign key
record
field
foreign key
candidate key D
composite key
Insertion
anomaly
assess the
existing
tables'
structure and
content
primary key
Update
anomaly
foreign key
Deletion
anomaly
surrogate key B
design the
database
structure
are supplied
by several
wellestablished
manufacturers
were
essentially
killed off by
MS Access
Their report
delivery is
more difficult
They use
than report
sophisticated delivery for
mathematical reporting
techniques.
systems.
All of above
C
D
dirty data
inconsistent
data
a "wrong
nonintegrated format"
data
problem
dirty data
inconsistent
data
a "wrong
nonintegrated format"
data
problem
data
warehouse
data are not
stored in
tables.
Form
Forms and
reports
data
warehouse
databases do
not have
metadata.
Table
Queries and
tables
data
warehouse
data are often
denormalized. b and c
Report
Query
C
A
The Link
Tables
command can
be used to
associate the
tables in one
database with
the objects in
another
database.
An
application
may consist
of multiple
databases,
each with
multiple
objects,
linked to yet
another
database
containing
only tables.
Spreadsheets D
Regardless of
how the
objects and
It will be
tables are
It will be
easier for the
stored, the
easier for the user to
user will have
user to
upgrade it if It is advisable to reenter the
upgrade it if
the objects
to put each
data in the
the objects
are in one
object and
tables when
and tables are database and table into a
the
in one
the tables in separate
application is
database.
another.
database.
upgraded.
B
Import
It contains
more than
one table
Link
It contains
tables,
reports,
queries, and
forms
Macros
All objects in
an
application,
including the
tables, must
reside within
the same
database.
An application
can be
created in
such a way
that it objects
such as forms
and reports
can be
changed
without
disturbing the
existing data. C
Merge
Join
It contains a
user interface,
or
It contains
switchboard macros
create
backups for
mission
critical
corporate
data.
Interface
Design
Wizard
put key
business
information
centralize the into the hands
manageabilit or more
y of data
decision
collection.
makers.
Switchboard
Manager
store all
corporate
transaction
data in one
single
location.
q_id
CA1
CA2
q_desc
Using generalized audit software packages can add a
lot of value _______
_______ is used for CAAT as database
op1
to an audit
department's
products & services
Oracle
CA8
CA9
true
CA10
true
CA3
CA4
CA5
CA6
CA7
CA11
CA12
CA13
True
True
True
yes
true
true
true
true
to determine the audit
objective
can bring the data
directly
CA16
CA17
CA14
CA15
CA18
CA19
CA20
CA21
CA22
CA23
true
the source of data
Important knowledge needed to begin planning the use available to the audit
of CAAT is _________
organization
The move towards paperless EDI would eliminate much
of the traditional audit trail, radically changing the nature
of audit evidence
true
CA25
CA26
CA27
CA28
CA29
CA24
CA30
CA31
CA32
CA33
CA34
CA35
CA36
CA37
CA38
CA39
CA40
CA41
CA42
true
natural/man-made
true
scheduled jobs
true
true
with audit
departments
true
true
true
true
true
databases
true
true
reference files
CA43
CA44
CA45
CA46
CA47
CA48
CA49
CA50
CA51
CA52
CA53
CA54
CA55
CA56
CA57
CA58
CA59
CA60
CA61
CA62
CA63
CA64
CA65
filex
to have a complete
picture of a system
true
true
back-ups
true
Benfish
true
consecutive nos. or
alphabets to entities
TRUE
valid, numeric
grouping, transaction
true
true
true
true
true
CA68
CA69
CA66
CA67
CA70
CA71
CA72
CA73
CA74
CA75
CA76
CA77
CA78
CA79
CA80
CA81
CA82
CA83
CA84
CA85
CA86
true
e-brain
bottom up tests
yes
CA87
CA88
CA89
CA90
CA91
CA92
CA93
CA94
CA95
CA96
CA97
CA98
CA99
CA100
provides detailed
information of machine
uses
IDEA
true
fictitious data applied
against the client
program
true
true
true
specification,
program
identifying erroneous
code
CA103
CA104
CA101
CA102
CA109
CA110
CA111
CA112
CA113
CA105
CA106
CA107
CA108
CA114
true
file
access/organizations
true
true
examining the quality of
system process
Wide access to various
data base
ACL
A sample of
transactions
Tests of details of
transactions
Macros
op2
to add customers
ACL
op3
op4
none of these
none the above
ans
A
A
False
False
False
no
false
false
false
false
false
false
review and evaluate the to obtain a record
types of data
layout
can bring the data
indirectly
all the above
A
extract data from file
False
False
use of accounting
codes
false
false
source of data for
material planing
false
providing access to
computer to all
organization personnel use of any programs
false
open/closed
false
conceptual/physical
none of these
all of them
A
D
A
false
false
manage hardware &
software resources
A
A
enable multiple user
resource sharing
false
false
with production
departments
B
all the above
none of these
false
false
false
false
false
planning language
model base
false
false
table files
report files
B
D
file-o-man
file manager
decentralized picture of
a system
all the above
filepet
false
false
retrieval
deletion
addition
false
false
false
false
immediately
false
on quarterly basis
B
B
A
Benford
Benjamin
false
blocks of nos. to the
primary attribute of the
the entity
B
random placement of
component
false
invalid, alphabetic
regrouping, events
false
A
A
false
false
false
false
interactive data
extraction and
analysis
interactive data
innumerable analysis
false
false
false
false
bouncing ball
top-down tests
big-bang
hybrid tests
stub
all the above
C
D
B
no
provide information to
the audit
re-perform procedures
carried out by the
clients programs
deleted, hard
none of these
false
system advanced
software
A
all the above
false
no
B
A
false
false
create, false
false
no
can enable the auditor
to execute provisions
on a number of
different bases
no
none of these
A
A
A
D
A
examination of source
code of a program
identifies program code with advice to
which may be there for following the logic of
fraudulent reason
none of the above
a program
ALC
ACLL
ACL
false
comparison of source
version of a
programmed
C
B
A
false
false
false
file, hardware
identifying ineffective
code
A
D
false
false
authentication of
information support
job connectivity
language
A
resource requested
no
false
false
mathematical concept
master list of
transactions
administered
questionnaire
prepared by an outside
programmer engaged
by the auditor
all the above
false
statistical/arithmetic
operation
A
stratification and
frequency analysis
false
false
carrying analytical
review
Can extract and
analyse data
IDEA
A utility software
programme
Analytical review
procedures
Action Procedures
Event Procedures
General Procedures
D
D
Field0
Field1
CA114 Internal tables are stored tables from which certain values are
extracted for further processing and storing
CA115 Log analysers are _______ required by the auditor
CA116 Log analyzers is ________
CA12
CA15
CA150 Super computer are the largest and fastest and is very
suitablefor commercial applicationincluding audit work
CA151 System development control, apart from others,include
authorisation,approval,testing,implementation and
documentation of new systems software and system software
modification
CA152 System privilege can be checked by auditor
CA153 System security audit is an on site inspection ,which identifies
potential securityvulnerabilities within an organization
CA156 The contents of a field could determine _______ sign for ______
field
CA157 The move towards paperless edi would eliminate much of the
traditional audit trail,radically changing the nature of audit
evidence
CA158 The stream of data that are generated by these tools is called
as the __________
CA159 The transition from manual system to cis environment bring
dramatic changes including
CA16
Ar=ir*cr*dr
CA19
CA2
CA20
CA21
CA22
CA23
CA24
CA25
CA26
CA27
CA28
CA29
CA3
CA30
CA31
CA32
CA33
CA34
CA35
CA36
Black box testing is ______ based and white box testing is _____
based
CA37
CA38
CA39
Caat's are computer program and data the auditor uses as part
of audit procedures to process data of audit significance
contained in an entity's information system
CA4
CA40
CA41
Case-is ________
CA42
CA43
CA44
CA45
CA46
CA47
CA48
CA49
CA5
CA50
CA51
CA52
CA53
CA54
CA55
CA56
CA57
CA58
CA59
CA6
CA60
CA61
CA62
CA63
CA64
CA65
CA66
CA67
CA68
CA69
CA7
CA70
CA71
CA72
CA73
CA74
CA75
CA76
CA77
CA78
CA79
CA8
CA80
CA81
CA82
CA83
CA84
CA85
CA86
CA87
CA88
CA89
CA9
CA90
CA91
CA92
CA93
CA94
CA95
CA96
CA97
CA98
Field2
Field3
Field4
Field5
Field6
TRUE
FALSE
TRUE
FALSE
BOTTOM UP
TOP DOWN
HYBRID
ALL THE
TESTS
TESTS
TESTS
ABOVE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
PARALLEL
SOURCE
TEST DATA
NONE OF
PROCESSING
CODE
APPROACH
THESE
REVIEW
TRUE
FALSE
HARDWARE
SOFTWARE
A
NETWORK
NONE OF
THESE
AUDIT TOOL
SOFTWARE
MACHINE
SOFTWARE D
ACTIVITY
USED TO
READ AND
ANALYZE
RECORDS
OF
MACHINE
ACTIVITY
TRUE
FALSE
TRUE
FALSE
REFERENCE FILE
TABLE
REPORT
NONE OF
FILES
FILE
THE
ABOVE
TRUE
FALSE
TRUE
FALSE
APPROACH TO
APPROACH
IT IS DATA
ALL THE
THE SYSTEM
TO THE
ABOUT
ABOVE
DATA ONLY
APPLICATIO SOME
N DATA
OTHER DATA
ONLY
CAN BE VERY
CAN
CAN
POWERFUL
ANALYTICAL
AUDITOR TO THE
TOOL
EXAMINE
AUDITOR
PROVISION
WITH
ON A
USEFUL
ALL THE
ABOVE
NUMBER OF INFORMATIO
DIFFERENT
N ON
BASES
TRENDS AND
PATTERN
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
SCHEDULE JOBS
MANAGE
ENABLE
ALL THE
HARDWARE
AND
RESOURCE
SOFTWARE
SHARING
RESOURCES
OS AND RAM
NONE OF
MICROPROC THE
REEL SYSTEM
FUNCTION
COMPLETENESS
ESSOR
ABOVE
REAL
BOTH (A)
DATABASE B
SYSTEM
AND (B)
SYSTEM
ROLE
BOTH (A)
NONE OF
AND (B)
THESE
ACCURACY
ABOVE
TRADITIONAL
LATEST
BOTH (A)
NONE OF
APPROACH
APPROACH
AND (B)
THE
B
D
A
ABOVE
TRUE
FALSE
PROVIDES
IDENTIFIES
EXAMINATIO NONE OF
DETAILED
PROGRAM
N OF
THE
SOURCE
ABOVE
INFORMATION ON CODES
MACHINE USAGE
PROGRAM
FOR
WITH A VIEW
FRAUDULEN TO
T REASON
FOLLOWING
THE LOGIC
OF A
PROGRAM
COMPANY
DATABASE
AUDITOR
AUDITOR
ADMINISTRA
USING
TOR
COMPUTE
RS
PUBLIC KEY
PRIVATE
DIGITAL
NONE OF
KEY
SIGNATURE
THESE
TRUE
FALSE
TRUE
FALSE
TYPE OF RECORD
TYPE OF
TYPE OF
NONE OF
CHECK
RANGE
SIGN TEST
THESE
CHECKS
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
AUDIT
AUDIT
ALL THE
NONE OF
THROUGH
ABOVE
THE
D
A
COMPUTERS
ABOVE
TRUE
FALSE
TRUE
FALSE
RISK AVOIDANCE
DETERRENC PREVENTIO
ALL THE
ABOVE
TRUE
FALSE
D
A
TRUE
FALSE
AUDIT ROUTINE
AUDIT
A
AUDITING
TECHNIQUE
IDENTIFYING
IDENTIFYIN
ENORMOUS CODE G
NONE OF
THESE
IDENTIFYIN
ALL THE
G NON-
ABOVE
INEFFECTIV STANDARD
E CODE
CODE
PREPARED BY
PREPARED
PREPARED
ALL THE
THE AUDITOR
BY THE
BY AN
ABOVE
ENTITY
OUTSIDE
PROGRAMM
ER
ENGAGED
BY THE
TWO GROUPS
THREE
AUDITOR
FOUR
ALL THE
GROUPS
GROUPS
ABOVE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
SAMPLE OF DATA
SAMPLE OF
SAMPLE OF
ALL THE
DATA USED
DATA USED
ABOVE
PURPOSE OF
FOR THE
FOR
TESTING THE
PURPOSE OF TESTING
SYSTEM
CHECKING
THE
SOFTWARE
LOG FILES
APPLICATIO
N
PROGRAMM
E
PROGARMM
STREAM OF DATA STREAM OF
DATA THAT
E
BOTH (A)
NONE OF
AND (B)
THESE
ARE
GENERATED
BY TEST
DATA
TECHNIQUE
INVALID
TOOLS
BOTH C & D VALID
TRUE
FALSE
TEST DATA
TEST DATA
TEST DATA
NONE OF
APPROACH
PACK
THE
NUMERIC
B
A
ABOVE
CHANGE IN THE
USE OF
METHOD OF
RECORDING
G CODES
ACCOUNTING
TRUE
FALSE
TRUE
FALSE
ONE
TWO
THREE
FOUR
THREE
FOUR
TWO
ONE
FIVE
THREE
FOUR
ONE
TRUE
FALSE
TRUE
FALSE
INTER TABLE
SYSTEM
TABLE
NONE OF
TEST
TEST
LEVEL
THESE
TESTS
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
BLACK BOX
WHITE BOX
BOTH (A)
NONE OF
APPROACH
APPROACH
AND (B)
THESE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
READ DATA ON
PROVIDE
CLIENT'S FILES
N TO THE
S CARRIED
AUDIT
OUT BY THE
CLIENT'S
PROGRAMS
TWO
FOUR
THREE
NONE OF
THESE
TRUE
FALSE
TRUE
FALSE
WHITE BOX
BLACK BOX
ALL THE
NONE OF
APPROACH
APPROACH
ABOVE
THE
ABOVE
TRUE
FALSE
TRUE
FALSE
EXAMINING
ANALYSING THE
ALL THE
ABOVE
QUALITY OF
DATA
FILE
FILE-O-MAN
THE FILE
FILEPET
MANAGER
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
ALL THE
APPLIED AGAINST N OF
THE
ABOVE
THE CLIENT
SOURCE
PICTURE OF
PROGRAM
VERSION OF A FILE OR
A PROGRAM DATA
TRUE
FALSE
BOTH C & D
HARDWARE
A
SPECIFICATI PROGRAM
ON
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
COMPUTER
NONE OF
SOFTWARE
AIDED
AIDED
THESE
EDITOR
SOFTWARE
SOFTWARE
EMBEDDED
ENGINEERIN
G
TRUE
FALSE
TRUE
FALSE
FIELD CHECKS
RECORD
BOTH (A)
NONE OF
CHECKS
AND (B)
THESE
TRUE
FALSE
TRUE
FALSE
THE USE OF
PROVIDING
COMPUTERS BY
ACCESS TO
PROGRAMS
ALL CONCERNED
COMPUTER
THE
ABOVE
TO ALL
ORGANIZATI
ON
TRUE
PERSONEL
FALSE
TRUE
FALSE
TRUE
FALSE
PREVIOUS DATA
CURRENT
ALL THE
NONE OF
DATA
ABOVE
THESE
NONE OF
THESE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TYPE OF
TYPE OF
TYPE OF
NONE OF
NETWORK
SOFTWARE
HARDWARE
THESE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
NATURAL/MAN
MADE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
L/PHYSICAL
ABOVE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
THREAT
BROADCAST NETWORK
NONE OF
ING
THESE
TRUE
FALSE
DATABASE
PLANNING
A
A
LANGUAGE
ABOVE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
NONE OF
QUARTERLY THE
BASIS
ABOVE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
AUDIT TASK OF
THE AUDITOR
OF THE
OF THE
AUDITORS
GENERALIZE
USING
D AUDIT
COMPUTERS SOFTWARE
ABOVE
TRUE
FALSE
TRUE
FALSE
GENERALIZED
SPECIALIZE UTILITY
NONE OF
AUDIT
D AUDIT
THESE
TRUE
FALSE
TRUE
FALSE
BACKUPS
RETRIEVAL
TRUE
FALSE
TRUE
FALSE
C-BRAIN
BIG BANG
PROGRAM
DELETION
STUB
ADDITION
BOUNCING B
BALL
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
FILE
ICAL
ABOVE
FREQUENCY
OPERATION ANALYSES
TRUE
FALSE
PACKAGE
MATHEMATI A MASTER
ADMINISTE A
COMPUTER
CAL
LIST
RED
PROGRAM FOR
CONCEPTS
TRANSACTI
QUESTION
ON
NAIRE
PERFORMING A
VARIETY OF DATA
PROCESSING
FUNCTION
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
CONTROL TOTAL
TRANSACTI
BATCH
SEQUENCE A
ON TYPE
SERIAL
CHECK
NUMBER
TRUE
FALSE
q_desc
The ------ key can be used to select an existing company from list of
AC1 companies.
Import and Export of data between Tally and other programs is possible only
AC2 through ---------- Program.
The re-order point is the inventory quantity that trigger a stock replishment
AC3 activity.
AC4 A created company's detail can be modified through keys
A/An ------------- is the official notice that the firm sends to its customers to
AC5 advise then to the amount of money that is owed.
AC6 In tally,all masters have ________main options
AC7 In tally,to create a new column in balance sheet press _______
In tally,the use of group behaves like a sub-ledger, option is that we can
AC8 summarize many ledger accounts into one line statements
In tally, we can alter ledger details using either single or multiple modes but
AC9 not alble to delete a ledger from multiple modes.
AC10 In tally,a group company is marked with an ______________
q_id
op1
F1
Tally ODBC
TRUE
F3
Invoice
Two
Ctrl+C
TRUE
TRUE
*
The systems that work together to order,receive, and pay for replenishment of Puchasing and
AC11 stock are --------------Accounts payable
AC12 Tally allows to delete a ledger from --------- alteration mode.
AC13 --------------------- is/are useful for management in the decision making.
Single
Cash Flow
Statements
Two
Alt+D
Create Information
AC27 Ctrl + N is used to ----------------------- in Tally classify the accounts under different heads so that
AC28 summarised information is possible.
AC29 Revenue Account also known as -------------- Account
AC30 Method of Voucher Numbering is/are
AC31 Accounts Receivable are displayed in
F4
Alt+P
Tally Audit
Bin
True
Enterprise Data
Interchange
TRUE
2
data element
FALSE
Display stock
valuation method
Ledgers
Personal
Manual
Balance Sheet
Journal
AC38 Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged
AC39 accounts member companies of the group.
AC40 A ----------- is a primary document for recording all financial transactions.
AC41 The field can have a value between ________________ in FA Package.
The _______ file maintains data that describes the supplier past transaction
AC42 with the firm in terms of material quality in AIS
AC43 It is necessary to manipulate data to transform it into ---------------AC44 In tally, to change the date of the voucher press ______
AC45 Tally can maintain budgets on ---------------AC46 The value of the inventory is included as an asset on the balance sheet
Main Location
Filled
11
FALSE
management by
objective
F4
True
Ledgers
0 to 9
Supplier
Report
F2
Net Transactions
True
Balance sheet
TRUE
TRUE
Main location
F9
F3
Tally.imp
Stock summary
By pressing F11
AC71 Tally audit feature is available in a company __________________
function key
In tally, a group company can also be a constituent(member) of another group
AC72 company
TRUE
AC73 Default number of groups in tally are ________
128
AC74 During voucher entry ------------- are used.
AC75 User designated as --------------- can view audit list.
Ledger Accounts
Administrator
One company to
another company
created withon
AC76 Tally supports Importing of data from ---------------Tally Package
In an accounting information system, which of the following types of computer Inventory
AC77 files most likely would be a master file?
subsidiary.
op2
op3
op4
ans
ALT+F1
CTRL+F1
Tally IMP
Tally INI
false
ALT+F3
CTRL+F3
A
None of the above B
Bill
Three
Alt+C
A or B
Four
Alt+Ctrl+C
FALSE
FALSE
$
&
Puchasing and
Receiving
Accounts payable
and Receiving
^
Puchasing,
Receiving and
Accounts
payable
A
A
Multiple
Fund Flow
Statements
A or B
Ratio Analysis
Three
Alt+X
One
Ctrl+D
A
B
Alter Information
Four
Ctrl+T
Display
Information
F5
Ctrl+P
F6
Shift+P
F7
C
None of the above A
Statistics
Day Book
Journal Book
Data
False
Enterprise Data Information
FALSE
3
data record
TRUE
Sub
Electronic Data
Interchange.
4
Field
5
All of the above
Open Calculator
Change Period
Groups
Nominal
Automatic
Profit & Loss
Journals
Real
None
Journal Book
C
A
C
B
B
B
B
B
A
Stock Journal
Physical Stock
Transfer
Reversing Journal B
Receipt
16
Issue
18
TRUE
management by
exception
electronic data
analysis
B
All of the above
Alt+f5
Primary
F6
Primary Cost
Category
False
Reports
1 to 100
Vouchers
10 to 60
A
None of the above C
None
A
Order
Information
Ctrl+f2
A and B
F7 function key
Purchases
1-4-1996 to 31-31997
False
Vertical
A or B
1-4-1997 to 31-31998
Ledger a/c
F7
Cost category
F8
an identity
Purchase return
A and B
a or b
Regional setting
Daybook
Alt + F7
Balance Sheet
F10
Changes in Ledger
Masters
Both A and B
F5
Suspense
Output
F4
Closing Balance
False
Alt + f6 function
key
A or B
A
C
A
C
A
F10
F11
F12
Budget
None
C
A
Ctrl+F3
Alt+F3
FALSE
Primary
Symbol
None of them
Tally.ini
Stock journal
During the
creation of a
company
A or b
Stock analysis
In 'comp info ->
security control'
option
None
A
None of the above A
None
FALSE
228
28
16
A
C
Groups
Owner
Sub-Groups
Data Entry
B or C
TallyVault
A
A
Other programs - a
spreadsheet or a
database file.
Both A and B
Cash
disbursements.
Cash receipts.
Will be more
efficient at
Will produce a
more accurate set producing
financial
of financial
statements.
statements.
A
B
q_id
VB1
q_desc
Microsoft visual basic project file has _______ file extension.
VB2
VB3
VB4
In visual basic, to populate a drive list box with a directory list box __________
statement is used
VB5
VB6
VB7
VB8
VB9
VB10
VB11
VB12
VB13
VB14
VB15
VB16
VB17
VB18
In visual basic, to display a message in the run time _________ function is used
In visual basic, to populate a directory list box with a file list box ________ statement is
used
In visual basic, ________ is a property of a recordset object which counts the number of
rows in a recordsourse object
In visual basic, using a data control, a record can only be added from the last record.
Adding a new record is only possible using _______ method of a recordset object.
In visual basic, using a data control, a record is saved to a recordsource object using
_______ method of a recordset object.
In visual basic, using a data control, to navigate to the previous record ________
method of a recordset object is used.
In visual basic, when a record pointer reaches to the last record, _______ property of a
recordset object is automatically set to ______
In visual basic, the explorer view of a project is displayed in ___________
In visual basic, when a record pointer reaches to the first record, _______ property of a
recordset object is automatically set to ______
In visual basic, _______ is a method to convert a string into integer.
In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type
of shape should we get?
In visual basic, a timer event is only available in timer control.
In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any
object
VB19
VB20
In visual basic, _______ property of a textbox control is used to change the size of text.
VB21
VB22
In visual basic, _______ property of listbox control counts the number of items in the list
VB23
In visual basic, the properties of various controls can be set using __________
In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a
messagebox function.
In visual basic, ________ is a function which displays a message and it also allows the
user to enter values in a form object
VB24
VB25
VB28
VB29
VB30
In visual basic, using a data control, ________ is a recordset type which allows to add a
new record and also to update existing record in a recordsourse object
In visual basic, while closing a form _______ event of a form object is triggered earlier to
terminate event.
In visual basic, to give a backcolor or to bring in a picture to a command button can only
be done if we set the style property to ______
In visual basic, a method RGB(255,0,0) will generate _______ color
In visual basic, a method RGB(255,255,255) will generate _______ color
VB31
In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible.
VB32
VB33
In visual basic, when a textbox control receives the focus ________ event is triggered.
VB34
VB35
VB36
In visual basic, when a form object appears on the screen _________ event is triggered.
VB37
VB26
VB27
VB38
VB39
VB40
VB41
VB42
Which event of a text box would you use for validating the data entered by the user?
VB43
VB44
VB45
To deactivate the Form UnLoad event, you make the following change in the function
definiton:
VB46
VB47
VB48
Procedures declared in a _____ are local whereas procedures declared in a ______ are
available to the whole application.
VB49
VB50
How can you keep the user from exiting a form by clicking the Close button?
The _______ property enables Visual Basic to draw complete images in memory before
displaying them on the Screen.
VB51
You want to display the code and the description of an error. What would be the correct
syntax?
VB52
VB53
VB54
VB55
VB56
Which of the following can be shown to the user using the Common Dialog control in
VB?
Which of the following are not properties of Command Button:
VB57
Which events enable you to determine which key was pressed by the user?
VB58
In order to access a file in Non-textual format, you have to open file in:
VB63
Visual Basic displays information depending upon the current value of two properties of
the form, called:
Which of the following procedure types will execute when you assign a value to a
property of an object?
In order to overlap the controls (say a command button) during design time, we use the
Send To Back or Bring To Front option from the Edit menu. To change it dynamically
(i.e.during program execution) we need to change:
Which property of the ProgressBar determines how much of the bar is filled?
The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual
Basic program.
VB64
VB65
You try to initialize a new Object variable with the following line but receive an error.
What could be the possible cause? Set MyVar = New Classname
VB66
VB59
VB60
VB61
VB62
VB67
VB68
VB69
VB70
The primary difference between the MsgBox statement and the InputBox function is the:
Which of the following is TRUE about a protected form (i.e., a form where the Protect
Form button on the Forms toolbar is toggled on and is assumed to remain in that
position)?
VB71
Which event is triggered when the user moves to another open form?
VB72
To deactivate the Form UnLoad event, you make the following change in the function
definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To
prevent the Form from closing, you will set the:
op1
op3
op2
op4
.frx
none of the
above
none of the
above
ans
.vbg
.vbp
.frm
add
additem
loaditem
load
loadpicture addpicture
Drive1.Drive=
Dir1.Path
messagebox(
)
Dir1.Path=Fil
e1.Path
openrecordse
t
Dir1.Path = File1.Path =
Drive1.Drive Dir1.Path
message()
Dir1.Path =
Drive1.Drive
opendatabas
e
msgbox()
File1.Path =
Dir1.Path
none of the
above
B
none of the
above
C
File1.pattern=
Dir1.path
C
recordcount
count
update
append
addnew
additem
append
update
additem
addnew
movenext
moveprevious
movefirst
movelast,false
toolbox
eof,true
project
explorer
bof,false
value()
movelast
movelast,tru
e
form layout
window
movefirst,tru
e
int()
movefirst,false
number()
bof,true
val()
D
D
circle
true
rectangle
false
square
oval
D
A
true
false
eof,false
properties
window
B
B
B
fontcolor
color
forecolor
fontunderlin
underline,true e,true
textunderline,true
textsize
none of the
above
none of the
above
C
B
size
foresize
oneone- millionth hundredth of one-thousandth of a
of a second a second
second
D
fontsize
one-ten
thousandth of
a second
C
count
form layout
window
recordcount itemcount
prperties
project explorer
window
listcount
D
B
title
prompt
vbmsgboxstyle
toolbox
none of the
above
msgbox()
textbox
label
inputbox()
opensnapsh
opendynaset ot
dbopensnapshot
dbopendyna
D
set
load
activate
unload
initialze
standard
blue
red
opaque
red
green
transparent
green
blue
D
B
D
properties
window
form layout
window
toolbox
properties
window
form layout
window
toolbox
graphical
black
white
project
explorer
window
project
explorer
window
change
lostfocus
text
child
true
parent
false
container
gotfocus
none of the
above
load
unload
initialize
activate
none of the
above
none of the
above
C
A
text
name
opendatabas
e
dbengine
caption
enabled
visible
value
dime
dim
var
style
none of the
above
.ctx
.ctl
.ctr
.ocx
Validate
On Error
GoTo
linelabel
UpdateContr
ols
Cancel
parameter to
a non-zero
value
Validation
Check
Audit
On Error
GoTo Inline
On Error Stop
On Error
Resume Next D
1
Consists of
several
Programs
2
Consists of
several
Applications
openrecordset
PaintPicture Refresh
Resize
Cancel
UnloadMode
parameter to parameter to a non0
zero value
UnloadMode
parameter to
a zero value
None of the
above
Consists of
several
Projects
3
Consists of Various
Forms And Code
Modules
Form
window,
Project
standard or window, view Class module, code
code module code window module
None of the
above
C
B
A
D
Place code in
the Terminate
event
AutoRedraw
= True
Place code
in the
Unload
Place code in the
Deactivate event
event
AutoRedraw
= False
Refresh
None of the
above
GetFileNum GetFile
GetProperty
Get
GetBytes
Value
PaintPicture A
Msgbox
error.number
&
Msgbox
Msgbox
err.no &
err.number & Msgbox error.number error.descrip
err.text
err.text
& error.text
D
tion
To provide a
repository
for images
used by
To display
To help in
images to the creating a
To allow the editing of other
user
ToolBar
icons
D
controls
FreeFile
Retrieve
Common
messages
passed to
Windows
Caption
Open dialog
box
Visible
Click, KeyUp
Click and
and
KeyPress
KeyDown
Binary
Ascii Format Format
CurrentX
ScaleLeft
and
and
ScaleTop
CurrentY
Property
Property Get Assign
Background Caption
color property property
Min
Max
Shell
Are one and
the same
You do not
need to use
the Set
command
here
The Open
method
Substr
Can be
different at
times
You do not
have the
permission
to access
the class
The Exec
method
Windows explorer
Multi-Line
A
B
Input box
Font
KeyPress,
KeyUp and
KeyUp and KeyDown KeyDown
D
C
Input Mode
Output mode
ScaleHeight and
ScaleTop
x and y
Property Let
Property Set
ZOrder property
Value
AutoRedraw
property
CurrentVal
C
B
SetAttr
CStr
None of the
above
None of the
above
None of the
above
C
D
A warning
query icon
A critical
message
icon
None of the
above
built-in
statement.
variable.
intrinsic constant. procedure.
MsgBox
statement can
be created
InputBox
MsgBox
with the
function
statement
macro
returns a
returns a
InputBox function can recorder,
value, while value, while be created with the
while the
the InputBox the MsgBox macro recorder, while InputBox
function does statement
the MsgBox
function
not.
statement cannot.
cannot.
does not.
Data cannot The form
A new check
Data can be
be entered
can be
box can be
into the form. modified.
added.
entered.
Unload
Cancel
parameter to
a non-zero
value
An exclamation icon
B
C
QueryUnload Deactivate
Terminate
Cancel
UnloadMode
parameter to parameter to a non0
zero value
UnloadMode
parameter to
a zero value
q_id
q_desc
IN90
The two major browsers used to surf the Internet are ________,_______
IN91
IN93
IN94
IN95
IN96
IN92
op1
MS Internet
Explorer and
Mosaic
text
hyperlink
in random order
first
.bmp and .gif
Service, hostname
and directory path
mail servers,mail
clients and
alternate services
IN98
The mail we send has a mailing address and most of them correspond
to_____,_____ and
Which of the following is not supported by internet explorer
_______________
IN99
IN100
IN101
<center>
communication
generated
information
Server
arpanet
IN102
IN103
IN1
LAN
data
CERN
IN2
IN3
news groups,yahoo
and infoseek
IN4
IN5
IN6
IN7
bulletin board
system
small
windows socks
Mosaic
IN8
IN9
IN10
buffer
www.ency.in
URL
IN11
IN12
internal network
application layer
IN97
IN15
IN16
IN17
IN18
IN19
host computer
message
Delphi
net
IN20
IN21
browser
CompuServe
internet dialer
IN22
gophering
IN23
Alta vista
IN24
IN25
The directories that come with built-in engines are yahoo,lycos and ______
To use the finger command,SLIP users must run a programme
called______
The web maps are called _______
IN26
IN27
IN28
IN29
IN30
no
middle
hotlist
directory
search,index
search
infoseek
IN31
IN32
IN33
IN34
Mosaic displays links in color whereas _____ does not display links in color
______ supports one button publish
SPY MOSAIC is distributed by_______
______ is a program that helps us to log on to other networks
IN35
IN36
IN37
IN13
IN14
IN38
IN39
IN40
IN41
IN42
IN43
finger server
list
netshark
lynx
Microsoft
Usenet
Higher text transfer
protocol
iccp
yahoo
transfer control
TCP/IP stands for ________________
protocol/internet
Archie servers can be accessed in_______ different ways in internet
one
_______is the computer on the internet that translates between the internet
domain names and the internet numeric address
ftp servers
the internet
TIA stands for_____ in internet
adapter
Service indicates the name of the ________ used to access data, present
on the other end of the link.
browser
hotlink text transfer
HTTP stands for______
protocol
universal resource
locator
frequent asked
query
IN44
IN45
IN46
IN47
IN48
IN49
IN50
IN51
IN52
IN53
IN54
IN55
IN56
IN57
IN58
IN59
IN60
IN61
IN62
IN63
IN64
The web pages that represent online home of their author are called______ first page
global network
GNN stands for______
news
_____ is the most popular internet service
yahoo service
IN65
The online service offered by navigator gold 2.0 are _______ and_____
IN66
_______ is a program or a tool that helps us find a file anywhere on the net
newsgroup
IN67
IN68
Lycos catalog
apple link
IN69
computer related
abbreviations and
acronym
encyclopedia
Britannica
search engines
Graphical
interpreter
formatting
IN70
IN71
IN72
IN73
IN74
IN75
IN76
information
Communication
gateway interface
Network
IN80
IN81
IN82
Browser/user
Unknown
resonance
language
IN83
IN84
IN85
text only
SQL
alphalanguage
IN86
IN87
IN88
IN89
Internet equipment
training faculty
IN104
scripting,parsing
and compiling
nt,windows95,ie,wi
nzip
dnet
IN77
IN78
IN79
IN105
IN106
Joint Pictures
Expert Group
mails
yahoo,infoseek,alta
vista
BACKGROUND
IN115
defensive
administrative rank
DARPA stands for
administration
_______________________________________________
network
The uuencode files start with a _______
start
milnet,smaller
DARPA is broken into ________ and _______
arpanet
education,researc
NSFNET is the united states provides service to _____ and_____
h
Higher text
manipulation
HTML stands for ______________________________________
language
The first international IP network connections were established in 1973 with united states and
_____ and_____
UK
A_____ is a set of computers interconnected by transmission paths to
exchange information in internet
server
A computer that provides a service usable by other computers is
called______
client
A_______ is the representation of physical connectivity of the computers in
internet
network card
IN116
IN117
IN118
IN119
detailed transaction
explanation
application layer
point to point
network and
broadcast channel
network
file access
IN120
IN121
IN122
IN123
PAN,NAN,AAN
VAN
LAN
analog
IN124
IN125
IN126
IN127
IN128
IN129
storing data on a
disk drive
IN107
IN108
IN109
IN110
IN111
IN112
IN113
IN114
IN130
Mapping
IN131
IN132
IN133
IN134
IN135
IN136
IN137
IN138
IN139
IN140
IN141
IN142
IN143
IN144
Bandwidth
Find
Photography
Key
User-id
Penetration
Acts
Spoofing
Loss
Sales - tax
authorities
Utility
Tim Berner Lee
Etrade.com
Automated Tailor
Machine
IN147
IN148
IN149
A NIC is considered as
LAN
hyper terminal
tracing program
National
Informatics Center
IN150
Only Computers
IN151
IN152
IN153
IN154
IN145
IN146
IN155
IN156
Acts
Router
Concentrates
connectivity
Bridges and
Repeaters.
bits
firewall
IN157
IN158
When creating a network from just two PCs, what kind of cable would be
used to connect them?
IN159
An IP address is a
To construct a simple LAN of 4 computers, you would connect them with
______connect them
IN160
IN161
IN162
IN163
IN164
Bluetooth is
Which is not one of the recognized IEEE sub layers?
The most preferred number system to represent a IP address is
A MAC address is of
IN165
Protocol is
A ............... is a LAN-based computer with software that acts as a
controlling device for controlling access to at least part, if not all, of a local
area network and its available resources.
IN166
IN167
RG7U
Physical address
A cable
Data return to the
sender
Wireless
technology
Physical Layer
Binary
48 Bits
software that
facilitates
connection to the
internet
Novell PC
IN175
IN176
IN177
IN178
IN179
What are the most common LAN technologies used in networking today?
Modem speeds are measured in
LAN speeds are measured in
Ring
Network Layer
Ethernet, token
ring, DecNET
bps
bps
IN180
IN181
IN182
IN168
IN169
IN170
IN171
IN172
IN173
IN174
IN183
The worldwide web server uses the following standard interface to act as
the middleware:
IN184
IN185
IN186
An NIC
Accessing the Internet from a typical home PC requires the use of
The most widely used network operating system on PC LANs is
IN187
a Novell Interface
Controller
CD-ROM drive
Linux
have to do with
compression of
graphics and
video
IN188
IN189
A multiplexer is a form of
IN190
An ISP
Printer
provides access
to the Internet
IN191
FTP is
used to send
email
IN192
Telnet
IN193
IN194
A firewall is
A proxy server is
IN195
IN197
A search engine is
hardware
To look for information about interest areas on the internet, the user should
use a
scanner
provides access
An ISP
to the Internet
IN198
FTP is
IN199
Telnet
Which of the following is a true statement about the OSI model layers?
IN196
IN200
key gateway
interface
used to send
email
used to protect a
computer room
from fires and
floods
a backup server
IN201
IN202
IN203
IN204
IN205
IN206
IN207
It is one large
Which of the following is NOT true about the Internet?
network.
The traditional intent and impact of this common type of attack is to prevent
or impair the legitimate use of network resources.
Password cracking
used to protect a
computer room
from fires and
A firewall is
floods
Which of the following is NOT an example of a DoS attack that is popular
among hackers?
A ____________ attack is when a hacker sends a continuous flow of
packets to a system.
One defense option on a large network is to configure a ____________ to
disallow any external traffic.
IP flood
hack
firewall
IN208
A proxy server is
Which of the following would be performed on a network server and not
normally on individual workstations?
a backup server
Apply security
patches
IN209
IN210
Use of identifiers
IN211
IN214
IN215
The two most common tools used to help with extracting information are:
IN216
IN217
IN218
Which of the following is a likely target of a cyber terrorist that would cause
considerable loss of life?
IN212
IN213
by attaching to an
e-mail.
Phone
A Trojan horse
Modems
cookies and Trojan
horses.
An attack on a
system for
personal gain
Economic damage
Crashing the stock
market, as in the
1930s
IN219
IN220
IN221
IN222
IN223
IN224
An organisation is upgrading its telecommunication lines. Which is the least To carry more
important objective while upgradation
network capacity
A company posts a price list of its products on its website. The advantage to set its prices very
the customer is that the company can
high
Which of the following is an easy-to-use service to get information on
someone?
People Search
Name of your
Which of the following pieces of information would NOT be found online?
bank
Which of the following is the most common danger on the Internet?
Virus
IN227
The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in
order to obtain sensitive information is called _________________.
Using the Internet to pursue, harass, or contact another in an unsolicited
fashion is called:
Setting your privacy settings in Internet Explorer to medium is one way to
block:
IN228
IN225
IN226
buy stocks.
Shill bidding
Internet stalking.
pop-ups.
Use a fake e-mail
address.
IN231
IN232
IN233
HTML
IN234
A Web page is another name for ----------Domain names must contain a description of the type of organisation that
the domain represents. A very common abbreviation used include:
Web query.
.com is used for
company
IN229
IN230
IN235
IN236
IN237
Encryption
I only
irc
XML.
IN238
IN239
IN240
IN241
IN242
IN243
IN244
IN245
IN246
IN247
IN248
IN249
using Internet
Explorer to view a
Web page that is
stored on the hard
drive on your
Which of the following requires an Internet connection?
computer
Click on the Back
arrow until the
Mr Rao wants to find a website that he briefly browsed over yesterday. After desired site is
turning on his computer how would he do this?
found
the Refresh
Which of the following is used to update a Web query?
command
You download from the internet, a screensaver, a ten-second sound file and
a ten-second music video clip. You also add a hyperlink. Which of the media
elements has the greatest effect on the file size?
Hyperlink
When saving a photograph for use on a website, which format should you
choose?
BMP
While researching the Direct taxes assignment, you find a useful website.
Save it to a floppy
What is the most efficient way to access the site at a later time?
disk.
A system that uses the Internet for business-to-business interaction is called
a(n):
extranet.
A block of text automatically added to the end of an outgoing email is called an attachment.
_________ refers to the use of Internet technologies for placing telephone
calls.
VoIP
Desktop client,
application, and
Most client/server applications operate on a three-tiered architecture
consisting of which of the following layers?
database.
Which do you NOT need to connect to the Internet?
Modem
File Transfer
What does FTP stand for?
Program
So computers
can be referenced
by a name
IN250
IN251
IN252
IN253
193.1.2.3
paul .trigg @
domain. org. uk
The US
government
IN254
Internet Relay
Chat
IN255
It will be deleted
IN256
IN257
Hyper Textual
Mark-up Lingo
Receiving
messages
automatically from
anyone in the
group
op2
op3
MS Internet
Explorer and
Netscape
Navigator
symbols
video
hotword
in user-defined
order
home
.gif and .jpeg
hotlink
B
C
C
service,port and
directory path
service,hostname
and port
mail vendors,mail
identification and
password
mailing lists,mail
server robots and
gateways to other
none of the above
services
<font size=n>
<hr size=n>
<l1 type=shape>
common gateway
interface
Client
the net
peer-to-peer
connectivity
parcel
ECRN
classified general
instructions
Browser
intranet
B
A
B
B
A
A
A
B
B
A
B
B
B
B
D
Netscape
Navigator and
Mosaic
data from a
database
hypertext
in sequential
order
start
.bmp and .jpeg
service,hostname
,port,directorypath
wan
packets
CARN
newsgroups and
search engines
mailto and files
bulletin
application
boards,mails call servers,proxy
and wireless
servers and web
servers
system
business
bulletin
broadcasting
broadcasting
system
system
very small
large
windows sockets windows stocks
Yahoo
PINE
cache
www.eb.com
DNS
network of
network
transport layer
built-in
www.encybrit.com
FTP
intermediate
network
physical layer
op4
ans
ping service
ftp service
TELNET
uniform resource
locator
name of the
resource
scheme
Microsoft
web
read the Usenet
news
ARCHIE
unlimited restore
locator
C
C
C
B
spy mosaic
scheme
command line
sears
browser
search for
database
wincim or
maccim
gopherspace
cyberspace
open text
excite
ftp server
directories
web server
image list
A
C
maximum of five
lower
directory
one
top
index
many
middle and lower
glossary
B
D
C
C
D
cello
mosaic
internet
finger service
Hyper text
transmission port
ftp
ftp
transmission
control
protocol/internet
protocol
two
domain name
servers
the internet
administration
lynx
Lycos
IBM
ftp
Hyper text
transfer protocol
uucp
telnet
transfer
communication
protocol/internet
protocol
three
C
C
D
D
B
C
web servers
protocol
hyper text
transfer protocol
site
organization
higher type transfer
protocol
none of the above
C
C
C
uniform resource
locator
frequently asked
question
uniform resource
label
frantically asked
question
TCP,IP
IP,UDP
response
windows sockets
internets relay
chat
netscape,ie
world wide web
client
index
very organised
network integration
and
communication
application
university of
cleveland,clevela
nd freenet
IP address
request
world search for
information and
research council
mosaic,gopher
close
B
B
interface
hotwords
B
B
verification on
network integration
and
communication
none of the above
university of
California net
dns
B
A
A
B
B
C
B
animation
none of the above
applets
programms,images animation,scripts,e
,text
xecutables
none of the above
hyper transfer
hyper text markup
markup language language
books marks
hyper text
home page
global networks
navigator
electronic mail
Netscape page
starter
site,netscape
page wizard
welcome page
grand network
news
search engines
B
B
telnet
ftp
archive
point review
bitnet
biographical
information
on-line reference
works
web directories
Graphical
interchange
Format
Jumbled pictures
expert graph
documents
bookstores
more information
database
galenet
channel
A
B
web pages
Joint pictures
expert graph
net
eudora,netscape
and pine
network
connections
COLOR
FCOLOR
netscape,ie,lynx
mails
FONTCOLOR
Common
Common graphical Communication
Interface
graphical interface Gateway Interface D
Communication
Connection
B
Interface
Browser
Client
Server
Web
Channel
Uniform resource
United relay limited None of the above
locator
neither text nor
image only
image
text or image
PLSQL
CGI
SGML
betalanguage
none of the above
metalanguage
pancake is not
edible
none of the above
palm is not elm
SGML
Preprocessor
SGML Composer
SGML Parser
images
applets
documents
Internet
International
Engineering Task
Engineering
trainers and faculty Force
email,file
news,cooking and retrived,internet
fine arts
tools
mosaic,gopher,eu communicator,ie,ly
nx,winsock
dora,trumpnet
ARPANET
arpanet
B
C
C
C
B
C
A
B
B
defensive
advanced
research projects
dedicated and
registered projects administration
administration
none of the above
net
first
none of the above
begin
C
B
mailnet,inet
intranet,extranet
Hyper text
markup Language D
none of the above
client
network
stand-alone
servers
data terminal
equipment
physical layer
packet
switching,store
and forward
network
anonymous ftp
data target
equipment
network layer
B
B
B
B
KAN,RAN,VAN
MAN
MAN
digital
C
B
C
B
Manipulation
LAN,WAN,MAN
TAN
WAN
non-digital
Document type
Define type of data definition
Modulation/demo Manipulate/demani
pulate
dulation
Modulation
Dedicated access
and dial up
access
Stream line internet
protocol
Point to point
protocol
sending
information to a
host computer
Speed
Size
Channel
Save
Browse
Retrieve
Digital Signature
Cryptography
Message Digest
Lock
Hash Function
Formula
Password
Retrieval
Name
Cryptography
Address
B
Password Cracker A
Regulations
Address
Protocols
Imposting
Threat
Unauthorising
Exposure
Approving
Hacking
A
B
Income - tax
authorities
Pirated software
Hoffman
Amazon .com
Police officer of
IPS rank.
Cracker
Howard Aiken
Msn .com
B
C
A
B
Judge of a civil
court
Virus
Charles Bubbage
Dell .com
Asynchronous
Transmission
mode
None of above
Regulations
Gateway
Address
Port
Protocols
Pin
C
B
WAN
hypertext tracing
program
Network Interface
card
CAN
hypertext transfer
protocol
New Information
Card
PAN
hypertext tracing
protocol
Only printers
Two
Data-Link Layer
Four
Network Layer
Coaxial cable
Fiber
Twisted pair
Logical address
Router
It continue on to
It gets destroyed target device with
corrupt data
bit by bit.
Ultra violet
Wired Technology technology
Data Link Layer
Network Layer
ASCII
Octal
48 Bytes
48 KB
A
D
A
A
software that
allows file copying
a gateway calling
program for
internet bridging
Server
If the hub goes
down, it brings
down all of the
nodes on that
section
Network PC
C
If the hub goes
down, it brings
down all of the
nodes on all of the
rings
B
Topology
Star
Parallel
Circular
Both A and B
Ring
Both A and B
Linear
B
D
A
B
Bus
Star
Mesh
Bus
Bus
Star
Linear
Mesh
Ring
B
C
Mesh
Data Link Layer
Ethernet, token
ring, ARCnet
mips
Mips
A
D
Hub
Client
Bus
Transport Layer
Ethernet, token
ring, FDDI
kbps
Kbps
Star
Physical Layer
Ethernet, DecNET,
FDDI
mbps
Mbps
depend on the
measured in bytes transmission
per second
medium
Windows 95
a modem
must use electronic must have a LAN
mail
account
B
B
C
limited by modem
speeds
Netscape
C
B
used to control a
printer
a modem
Novell Netware
common gateway
interface
interfaces a
modem to a
computer
Windows package
Windows NT
have to do with
Web pages
the Internet
uniform resource
locator
application protocol
interface
connects a
computer to a
network
Netscape
None of the above
none of the
previous
use appropriate
communications
software
none of the
previous
is a CPU register
bridge
is a CPU
functional unit
used to browse
the Web
uses wireless
communication
medium
None of the
is part of Netscape above
a form of virus
an email server
IR system for the
Internet
D
B
C
A
D
make of processor A
is a protocol for
the transfer of
files between
is part of Netscape computers
D
a screen saver
program
a poor file server
browser
CD-ROM
none of the
previous
none
none of the
previous
clip-art file
search engine
is a CPU functional
is a CPU register unit
make of processor
is a protocol for
the transfer of
files between
used to browse the
Web
is part of Netscape computers
is a protocol that
allows for remote
uses telephone
lines
is part of Netscape login
D
D
C
D
A
It is made up of
many networks
connected into
transmission lines
called backbones.
System intrusion
a screen saver
program
none of the
previous
UDP flood
packet
flood
traffic
router
switch
hub
a form of virus
Flood a Web
server with
requests
an email server
Update virus
definitions
Individual
computers can
connect to it using
an ISP.
A
Use of passwords
Use of logical
access methods
through an FTP
port.
by attaching itself
to a document.
Web traffic
Use of encryption
D
methods
by scanning the
computer for a
connection.
B
Application
D
updates
Adware
A worm
Spyware
Protocols
Trojan horses and
key loggers.
An attack with the
purpose of gaining
publicity
Disruption in
communication
Shutdown of
military security
systems
Multiplexors
cookies and key
loggers.
LAN
key loggers and
worms.
Changing the
content of a Web
page
All of the above
are correct.
Shutdown of
nuclear plant
safety systems
Giving out
disinformation
Disruption in
supply lines
Contaminating
water systems
D
D
To improve
network services
limit access to
computer owners
only
Yahoo People
Search
To obtain an
accurate
inventory of
network related
equipment and
To improve system parts and network
response time
D
nodes
update its prices
stop its competitors as soon as they
seeing their prices are changed
D
USA People
Search
Lycos Search
B
Date of birth
Fraud
Personal assets
Adware
Criminal records
Spyware
A
B
make large
amounts of
money by parking
purchase off-shore funds in their
invest without risk. property.
D
bank account.
Phishing
Siphoning
Hoaxing
cyber stalking.
virtual stalking.
Web stalking.
viruses.
Use anti-spyware
Use a proxy server. software.
Message
Physical Security sequence number Logical access
checking
controls
controls
II only
Neither I or II
Both I & II
ftp
www
Verifies integrity
of files
Increases boot up
time
telnet
Misleads a
program
recompilation
both HTML and
Internet Explorer
Web browser.
cookies.
Never use your
real identity.
spam.
Microsoft Excel
round trip HTML
HTML document. document.
.co in used for
.con is used for
company
companies
the World Wide
Web Consortium
HTML.
Internet Explorer
HTML.
DHTML.
B
C
B
B
MHTML
clicking a hyperlink
that references a
updating the
document that is
values that are
stored in the floppy
obtained through drive on your
computer
a Web query
Click on Go to or
Search in the
browser
viewing an Excel
worksheet that you
have saved as a
Web page.
B
Screensaver
Sound
Video
GIF
JPEG
TIFF
Add it to
Write it down on a Favourites or
piece of paper.
Bookmarks.
intranet.
a signature.
a footer.
an encryption.
IPT
Desktop client,
software, and
hardware.
CD-ROM
File Transmission
Protocol
IPP
Desktop server,
application, and
database.
Telephone line
File Transfer
Protocol
PoIP
A
Desktop server,
software, and
hardware.
A
None of the above B
So IP addresses
can be shorter
So email is
delivered faster
45.1.1.1
143.215.12.19
paul.trigg@domai
paul.domain.uk
n.org.uk
Scientists in
Switzerland
No-one
International Relay Internet Remote
of Characters
Conversations
People discussing
a topic of interest High volumes of
globally
email
q_id
EC1
q_desc
EC8
EC9
EC2
EC3
EC4
EC5
EC6
EC7
EC10
EC11
EC12
EC13
EC14
EC15
EC16
EC17
EC18
EC19
EC20
EC21
op1
Business-toBusiness
Billboard
Customer
Endorsements
Intermediaries
Order Placement
Post purchase
interaction
Billboard model of
marketing
Online Catalog
EDI For
Administration,
Commerce and
Transaction
Business-to-Business
Emergency Cash
Communication
Perspective
Microcash
Decryption
Internal Format File
ANSI
batch files
Smart Card
E-cash
Global Network
Active or push based
advertising
EC29
EC30
EC22
EC23
EC24
EC25
EC26
EC27
EC28
EC31
True
Login_Id and
Password
Broadcast
E-mail
EC32
EC33
A list of competitors
What would you NOT be looking for when spying on a competitor? clients
EC34
EC35
EC36
Error checking
Competitive
espionage
single-user database
application
Replying promptly
Removable drives
that can be locked up
at night provide
adequate security
when the
confidentiality of data
is the primary risk.
op2
op3
op4
ans
Endorsements
Broadcast
Billboard
Catalog
Broadcast
portals
.COM
Search and
discovery
Domains
Service
Purchase
consummation
Online catalog
Pre-purchase
preparation
Endorsement model
of marketing
Shopping cart
EDI For
Administration,
Consumer and
Transport
Billboard
EDI For
Administration,
Commerce and
Transport
Pulling cart
TCP/IP
EFT
Gateway
Interpreter
Assembler
EDI
Business-toConsumer
Electronic Cash
Consumer-toBusiness
Euro Cash
Customer-toCompany
Endorsed Cash
B
B
Business Process
Perspective
Micro Transactions
SSL
Encryption
Subscription
Transmission File
UN/EBCDIC
UNESCO
UN/EDIFACT
interchange sets
functions
functional groups
Embedded cards
SET
Digital Cash
Smart Cards
Electronic cheques
C
A
False
Primary Key and
Private Key
C
D
B
Junk mail
Billboard
Endorsements
Bulk-mail
Direct-mail
Junk mail
Endorsement
Billboard
Broadcast
Data Integration
Contact numbers of
the management
Research data
group
A competitors new
project
e-commerce
C
database application None of above
Using all capital
Including the Subject letters
D
Encryption
performed by a
Message
Security at the
authentication in EDI physically secure
transaction phase in
systems performs the hardware device is EDI systems is not
more secure than
same function as
necessary because
segregation of duties encryption
problems at that level
performed by
in other information
will be identified by
systems.
the service provider. C
software.
multi-user database
application
Keeping messages
short
q_id
DS3
q_desc
___________ means the result of applying to specific information certain
specific technical processes.
__________ is an algorithm which creates a digital representation or
"fingerprint" in the form of a "hash result".
__________ is of standard length which is usually much smaller than the
message but nevertheless substantially unique to it.
DS4
DS5
DS6
DS8
DS9
True
Server
Certificate
Server
Certificate
Private
Certificate
DS1
DS2
DS7
DS10
DS11
DS12
DS13
DS14
op1
Digital Sign
Hash Function
Hash Function
Digital Signature
creation
Institutional
Overhead and
Subscriber
Relying Party
Cost
Certification
Authority
True
Evidence,
Ceremony,
Approval
True
True
DS16
Certificate
Revocation List
Private Key,
Subscriber
DS17
Recipient Party
DS15
DS18
DS19
DS20
The Relying Party can use the ___________ listed in the certificate to verify
that the digital signature was created with the corresponding _________
Digital Signatures are used for a variety of Electronic Transactions like
________________________
To associate with a key pair with a prospective signer, a Certification Authority
issues Digital Certificate
Public Key
E-mail
Not False
DS21
DS22
DS23
DS24
DS25
DS26
DS27
DS28
DS29
Closed
System,Formal
Legal
requirements
Affirmative Act
Signer
Authentication
Not True
Nonrepudiation
Service
Affirmative Act
DS31
_______ is known only to the signer and is used to create the digital signature. Private Key
_______ is ordinarily more widely known and is used by a relying party to verify
the digital signature.
Private Key
____________ is the art of protecting information by transforming it into an
unreadable format.
Decryption
DS32
DS33
DS34
Unaltered in
transmission.
Both sender
and receiver
must have the
private key
before this
encryption
method will
work.
DS35
Collision.
DS30
Using data
encryption.
op2
op3
Digital
Digital Certificate Signature
op4
None of the
above
Hash Value
Both B and A
Digital Signature
Verification
Both A and B
Either A or B
Subscriber
Relying Party
Cost
Certified
Authority
None of the
above
None of the
above
Hash Result
Institutional
Overhead
Certificate
Authority
False
False
Developer
Certificate
Developer
Certificate
Repositories
Approval,
Evidence
ans
A
A
A
B
Personal Digital
Certificate
None of the
above
False
C
B
D
A
False
Certificate
Resource List
Public key,
Recipient
certificate
Revocation
Letter
Private Key,
Recipient
None Of The
Above
None Of The
Above
Relying Party
Either A or B
Neither A nor B
Private Key
Electronic
Commerce
Both A and B
Electronic Fund
Transfers
Both B and A
Not True
A
A
Formal Legal
Requirements
Efficiency
Document
Authentication
Not False
Open System
Formal Legal
Requirements,
Open System
Signer
authentication
None of the
above
Both A and B
Neither A nor B
C
B
Either A or B
Neither A nor B. A
Public Key
Private Key
None of the
above
Public Key
Both A and B
Either A or B
Public Key
Both A and B
Either A or B
Public Key
Both A and B
Either A or B
Cipher
Cryptography
C
Encryption
Conducting fraud- Reviewing the
systems-access
awareness
training.
D
log.
Received by the
intended
Sent to the
recipient.
correct address. A
Performing
validity checks.
Not intercepted
en route.
q_id
AC1
AC2
AC3
AC4
AC5
AC6
AC7
AC8
AC9
AC10
AC11
AC12
AC13
AC14
AC15
AC16
AC17
AC18
AC19
AC20
AC21
AC22
AC23
AC24
AC25
AC26
AC27
AC28
AC29
AC30
AC31
AC32
AC33
AC34
AC35
AC36
AC37
AC38
AC39
AC40
AC41
AC42
AC43
AC44
AC45
AC46
AC47
AC48
AC49
AC50
AC51
AC52
AC53
AC54
AC55
AC56
AC57
AC58
AC59
AC60
AC61
AC62
AC63
AC64
AC65
AC66
AC67
AC68
AC69
AC70
AC71
AC72
AC73
AC74
AC75
AC76
AC77
AC78
BC1
BC2
BC3
BC4
BC5
BC6
BC7
BC8
BC9
BC10
BC11
BC12
BC13
BC14
BC15
BC16
BC17
BC18
BC19
BC20
BC21
CA1
CA2
CA3
CA4
BC22
BC23
BC24
BC25
BC26
BC27
BC28
BC29
BC30
BC31
BC32
BC33
BC34
BC35
BC36
BC37
BC38
BC39
BC40
BC41
BC42
BC43
CA5
CA6
CA7
CA8
CA9
CA10
CA11
CA12
CA13
CA14
CA15
CA16
CA17
CA18
CA19
CA20
CA21
CA22
CA23
CA24
CA25
CA26
CA27
CA28
CA29
CA30
CA31
CA32
CA33
CA34
CA35
CA36
CA37
CA38
CA39
CA40
CA41
CA42
CA43
CA44
CA45
CA46
CA47
CA48
CA49
CA50
CA51
CA52
CA53
CA54
CA55
CA56
CA57
CA58
CA59
CA60
CA61
CA62
CA63
CA64
CA65
CA66
CA67
CA68
CA69
CA70
CA71
CA72
CA73
CA74
CA75
CA76
CA77
CA78
CA79
CA80
CA81
CA82
CA83
CA84
CA85
CA86
CA87
CA88
CA89
CA90
CA91
CA92
CA93
CA94
CA95
CA96
CA97
CA98
CA99
CA100
CA101
CA102
CA103
CA104
CA105
CA106
CA107
CA108
CA109
CA110
CA111
CA112
CA113
CA114
DB1
DB2
DB3
DB4
DB5
DB6
DB7
DB8
DB9
DB10
DB11
DB12
DB13
DB14
DB15
DB16
DB17
DB18
DB19
DB20
DB21
DB22
DB23
DB24
DB25
DB26
DB27
DB28
DB29
DB30
DB31
DB32
DB33
DB34
DB35
DB36
DB37
DB38
DB39
DB40
DB41
DB42
DB43
DB44
DB45
DB46
DB47
DB48
DB49
DB50
DB51
DB52
DB53
DB54
DB55
DB56
DB57
DB58
DB59
DB60
DB61
DB62
DB63
DB64
DB65
DB66
DB67
DB68
DB69
DB70
DB71
DB72
DB73
DB74
DB75
DB76
DB77
DB78
DB79
DB80
DB81
DB82
DB83
DB84
DB85
DB86
DB87
DB88
DB89
DB90
DB91
DB92
DB93
DB94
DB95
DB96
DB97
DB98
DB99
DB100
DB101
DB102
DB103
DB104
DB105
DB106
DB107
DB108
DB109
DB110
DB111
DB112
DB113
DB114
DB115
DB116
DB117
DB118
DB119
DB120
DB121
DB122
DB123
DB124
DB125
DB126
DB127
DB128
DB129
DB130
DB131
DB132
DB133
DB134
DB135
DB136
DB137
DB138
DB139
DB140
DB141
DB142
DB143
DB144
DB145
DB146
DB147
DB148
DB149
DB150
DB151
DB152
DB153
DB154
DB155
DB156
DB157
DB158
DB159
DB160
DB161
DB162
DB163
DB164
DB165
DB166
DB167
DB168
DB169
DB170
DB171
DB172
DB173
DB174
DB175
DB176
DB177
DB178
DB179
DB180
DB181
DB182
DB183
DB184
DB185
DB186
DB187
DB188
DB189
DB190
DB191
DB192
DB193
DB194
DB195
DB196
DB197
DB198
DB199
DB200
DB201
DB202
DB203
DB204
DB205
DB206
DB207
DB208
DB209
DB210
DB211
DB212
DB213
DB214
DB215
DB216
DB217
DB218
DB219
DB220
DB221
DB222
DB223
DB224
DB225
DB226
DB227
DB228
DB229
DB230
DB231
DB232
DB233
DB234
DB235
DB236
DB237
DB238
DB239
DB240
DB241
DB242
DB243
DB244
DB245
DB246
DB247
DB248
DB249
DB250
DB251
DB252
DB253
DB254
DB255
DB256
DS1
DS2
DS3
DS4
DS5
DS6
DS7
DS8
DS9
DS10
DS11
DS12
DS13
DS14
DS15
DS16
EC17
EC18
EC19
EC20
EC21
EC22
EC23
EC24
EC25
EC26
EC27
EC28
EC29
EC30
EC31
EC32
EC33
EC34
EC35
EC36
EX1
EX2
EX3
EX4
EX5
EX6
EX7
EX8
EX9
EX10
EX11
EX12
EX13
EX14
EX15
EX16
EX17
EX18
EX19
EX20
IN9
IN10
IN11
IN12
IN13
IN14
IN15
IN16
IN17
IN18
IN19
IN20
IN21
IN22
IN23
IN24
IN25
IN26
IN27
IN28
IN29
IN30
IN31
IN32
IN33
IN34
IN35
IN36
IN37
IN38
IN39
IN40
IN41
IN42
IN43
IN44
IN45
IN46
IN47
IN48
IN49
IN50
IN51
IN52
IN53
IN54
IN55
IN56
IN57
IN58
IN59
IN60
IN61
IN62
IN63
IN64
IN65
IN66
IN67
IN68
IN69
IN70
IN71
IN72
IN73
IN74
IN75
IN76
IN77
IN78
IN79
IN80
IN81
IN82
IN83
IN84
IN85
IN86
IN87
IN88
IN89
IN90
IN91
IN92
IN93
IN94
IN95
IN96
IN97
IN98
IN99
IN100
IN101
IN102
IN103
IN104
IN105
IN106
IN107
IN108
IN109
IN110
IN111
IN112
IN113
IN114
IN115
IN116
IN117
IN118
IN119
IN120
IN121
IN122
IN123
IN124
IN125
IN126
IN127
IN128
IN129
IN130
IN131
IN132
DS17
DS18
DS19
DS20
DS21
DS22
DS23
DS24
DS25
DS26
DS27
DS28
DS29
DS30
DS31
DS32
DS33
DS34
DS35
EC1
EC2
EC3
EC4
EC5
EC6
EC7
EC8
EC9
EC10
EC11
EC12
EC13
EC14
EC15
EC16
EX21
EX22
EX23
EX24
EX25
EX26
EX27
EX28
EX29
EX30
EX31
EX32
EX33
EX34
EX35
EX36
EX37
EX38
EX39
EX40
EX41
EX42
EX43
EX44
EX45
EX46
EX47
EX48
EX49
EX50
EX51
EX52
EX53
EX54
EX55
EX56
EX57
EX58
EX59
EX60
EX61
EX62
EX63
EX64
EX65
EX66
EX67
EX68
EX69
EX70
EX71
EX72
EX73
EX74
EX75
EX76
EX77
EX78
EX79
EX80
EX81
EX82
EX83
EX84
EX85
EX86
EX87
EX88
EX89
EX90
EX91
EX92
EX93
EX94
EX95
EX96
EX97
EX98
EX99
EX100
EX101
EX102
EX103
EX104
EX105
EX106
EX107
EX108
EX109
EX110
EX111
EX112
EX113
EX114
EX115
EX116
EX117
EX118
EX119
EX120
EX121
IN1
IN2
IN3
IN4
IN5
IN6
IN7
IN8
IN133
IN134
IN135
IN136
IN137
IN138
IN139
IN140
IN141
IN142
IN143
IN144
IN145
IN146
IN147
IN148
IN149
IN150
IN151
IN152
IN153
IN154
IN155
IN156
IN157
IN158
IN159
IN160
IN161
IN162
IN163
IN164
IN165
IN166
IN167
IN168
IN169
IN170
IN171
IN172
IN173
IN174
IN175
IN176
IN177
IN178
IN179
IN180
IN181
IN182
IN183
IN184
IN185
IN186
IN187
IN188
IN189
IN190
IN191
IN192
IN193
IN194
IN195
IN196
IN197
IN198
IN199
IN200
IN201
IN202
IN203
IN204
IN205
IN206
IN207
IN208
IN209
IN210
IN211
IN212
IN213
IN214
IN215
IN216
IN217
IN218
IN219
IN220
IN221
IN222
IN223
IN224
IN225
IN226
IN227
IN228
IN229
IN230
IN231
IN232
IN233
IN234
IN235
IN236
IN237
IN238
IN239
IN240
IN241
IN242
IN243
IN244
IN245
IN246
IN247
IN248
IN249
IN250
IN251
IN252
IN253
IN254
IN255
IN256
IN257
PP1
PP2
PP3
PP4
PP5
PP6
VB11
VB12
VB13
VB14
VB15
VB16
VB17
VB18
VB19
VB20
VB21
VB22
VB23
VB24
VB25
VB26
VB27
VB28
VB29
VB30
VB31
VB32
VB33
VB34
VB35
VB36
VB37
VB38
VB39
VB40
VB41
VB42
VB43
VB44
VB45
VB46
VB47
VB48
VB49
VB50
VB51
VB52
VB53
VB54
VB55
VB56
VB57
VB58
VB59
VB60
VB61
VB62
VB63
VB64
VB65
VB66
VB67
VB68
VB69
VB70
VB71
PP7
PP8
PP9
PP10
PP11
PP12
PP13
PP14
PP15
PP16
PP17
PP18
PP19
PP20
PP21
PP22
PP23
PP24
PP25
PP26
PP27
PP28
PP29
PP30
PP31
PP32
PP33
PP34
PP35
PP36
PP37
PP38
PP39
PP40
PP41
PP42
PP43
PP44
PP45
PP46
PP47
PP48
PP49
PP50
PP51
PP52
PP53
PP54
PP55
PP56
PP57
PP58
PP59
PP60
PP61
PP62
PP63
PP64
PP65
PP66
PP67
PP68
PP69
PP70
PP71
PP72
PP73
PP74
PP75
PP76
PP77
PP78
PP79
PP80
PP81
PP82
PP83
VB1
VB2
VB3
VB4
VB5
VB6
VB7
VB8
VB9
VB10
VB72
WO1
WO2
WO3
WO4
WO5
WO6
WO7
WO8
WO9
WO10
WO11
WO12
WO13
WO14
WO15
WO16
WO17
WO18
WO19
WO20
WO21
WO22
DA13
DA14
DA15
DA16
DA17
DA18
BC44
BC45
BC46
BC47
BC48
BC49
BC50
BC51
BC52
BC53
BC54
BC55
BC56
BC57
BC58
BC59
BC60
BC61
BC62
BC63
BC64
BC65
BC66
BC67
BC68
BC69
BC70
BC71
BC72
BC73
BC74
BC75
BC76
BC77
BC78
BC79
BC80
BC81
BC82
WO23
WO24
WO25
WO26
WO27
WO28
WO29
WO30
WO31
WO32
WO33
WO34
WO35
WO36
WO37
WO38
WO39
WO40
WO41
WO42
WO43
WO44
WO45
WO46
WO47
WO48
WO49
WO50
WO51
WO52
WO53
WO54
WO55
WO56
WO57
WO58
WO59
WO60
WO61
WO62
WO63
WO64
WO65
WO66
WO67
WO68
WO69
WO70
WO71
WO72
WO73
WO74
WO75
WO76
WO77
WO78
WO79
WO80
WO81
WO82
WO83
WO84
WO85
WO86
WO87
WO88
WO89
WO90
WO91
WO92
WO93
WO94
WO95
WO96
WO97
WO98
WO99
WO100
WO101
WO102
WO103
WO104
WO105
WO106
WO107
WO108
WO109
WO110
WO111
WO112
WO113
WO114
WO115
WO116
WO117
WO118
WO119
DA1
DA2
DA3
DA4
DA5
DA6
DA7
DA8
DA9
DA10
DA11
DA12
BC83
BC84
BC85
BC86
BC87
BC88
BC89
BC90
BC91
BC92
BC93
BC94
BC95
BC96
BC97
BC98
BC99
BC100
BC101
BC102
BC103
BC104
BC105
BC106
BC107
BC108
BC109
BC110
BC111
BC112
BC113
BC114
BC115
BC116
BC117
BC118
BC119
BC120
BC121
BC122
BC123
BC124
BC125
BC126
BC127
BC128
BC129
BC130
BC131
BC132
BC133
BC134
BC135
BC136
BC137
BC138
BC139
BC140
BC141
BC142
BC143
BC144
BC145
BC146
BC147
BC148
BC149
BC150
BC151
BC152
BC153
BC154
BC155
BC156
BC157
BC158
BC159
BC160
BC161
BC162
BC163
BC164
BC165
BC166
BC167
BC168
BC169
BC170
BC171
BC172
BC173
BC174
BC175
BC176
BC177
BC178
BC179
BC180
BC181
BC182
BC183
BC184
BC185
BC186
BC187
BC188
BC189
BC190
BC191
BC192
BC193
BC194
BC195
BC196
BC197
BC198
BC199
BC200
BC201
BC202
BC203
BC204
BC205
BC206
BC207
BC208
BC209
BC210
BC211
BC212
BC213
BC214
BC215
BC216
BC217
BC218
BC219
BC220
BC221
BC222
BC223
BC224
BC225
BC226
BC227
BC228
BC229
BC230
BC231
BC232
BC233
BC234
BC235
BC236
BC237
BC238
BC239
BC240
BC241
BC242
BC243
BC244
BC245
BC246
BC247
BC248
BC249
BC250
BC251
BC252
BC253
BC254
BC255
BC256
BC257
BC258
BC259
BC260
BC261
BC262
BC263
BC264
BC265
BC266
BC267
BC268
BC269
BC270
BC271
BC272
BC273
BC274
BC275
BC276
BC277
BC278
BC279
BC280
BC281
BC282
BC283
BC284
BC285
BC286
BC287
BC288
BC289
BC290
BC291
BC292
BC293
BC294
BC295
BC296
BC297
BC298
BC299
BC300
BC301
q_desc
The ------ key can be used to select an existing company from list of companies.
Import and Export of data between Tally and other programs is possible only through ---------Program.
The re-order point is the inventory quantity that trigger a stock replishment activity.
A created company's detail can be modified through keys
A/An ------------- is the official notice that the firm sends to its customers to advise then to the amount
of money that is owed.
In tally,all masters have ________main options
In tally,to create a new column in balance sheet press _______
In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger
accounts into one line statements
In tally, we can alter ledger details using either single or multiple modes but not alble to delete a
ledger from multiple modes.
In tally,a group company is marked with an ______________
The systems that work together to order,receive, and pay for replenishment of stock are --------------Tally allows to delete a ledger from --------- alteration mode.
Customers can be permitted to enter their own data into the firms computer using the firms wide area
network is an example of
In Tally, we can customize the Vouchers as per our requirements
The number of steps in Accounts Compilation are
Each action/transaction of a firm is described by a ----------------.
Ctrl + N is used to ----------------------- in Tally classify the accounts under different heads so that summarised information is
possible.
Revenue Account also known as -------------- Account
Method of Voucher Numbering is/are
Accounts Receivable are displayed in
" The buyers can follow up with the suppliers to determine the reasons " is an example of ----------------From voucher entry mode , if we press __________ then we get payment voucher in tally
Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged accounts member companies
of the group.
A ----------- is a primary document for recording all financial transactions.
The field can have a value between ________________ in FA Package.
The _______ file maintains data that describes the supplier past transaction with the firm in terms of
material quality in AIS
It is necessary to manipulate data to transform it into ---------------In tally, to change the date of the voucher press ______
Tally can maintain budgets on ---------------The value of the inventory is included as an asset on the balance sheet
In ratio analysis report of Tally FA packagewe we press ________________ function key to the display
of bills receivable , bills payables report
The accounts payable system is responsible for paying the suppliers for the -----------------
Tally provides the capability to the administrator/auditor to track changes in the areas is/are
In tally, types of users are _______________
By pressing -------- key, a list of inventory reports can be displayed straightaway from the balace sheet
report
Projected approximation of income or expenses is called ______________ .
"Administrator" type user is also called 'Auditor' of a company in Tally
You will get company information , if you press __________ from gateway of tally
A constituent(member) company can be a member of more than one group.
Default stock category in tally is ______
To create a log of the import activity in a file _____________ is located in the same directory as an
executable program in tally
In Tally,inventory valuation method option is available from _______
Tally supports Importing of data from ---------------In an accounting information system, which of the following types of computer files most likely would
be a master file?
Which of the following is an advantage of a computer-based system for transaction processing over a
manual system? A computer-based system:
A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The
following is an information not found in the trailer label
What control would prevent the accidental erasure of customer information from a magnetic tape
What are the individual dots which make up a picture on the monitor screen called?
Using generalized audit software packages can add a lot of value _______
_______ is used for CAAT as database
Generalized audit software perform auditors to undertake any past records and not concurrent auditing
Generalized audit software is a file whose capabilities for verifying processing is logic
The transition from manual system to CIS environment bring dramatic changes including
________________
Operating systems are devised to optimize the machine capabilities, the function
include_______________
General purpose software provides a framework for highly complex scientific operation
In batch processing, transactions are processed one after another
The use of computer assisted audit techniques is not gaining popularity not only ________________
On-line processing refers to grouping of transaction and processing the same in one go from start to
finish
Real time refers to the technique of updating files with transaction data immediately after the
occurrence of the event to which it relates
In OLRT the CPU should process the capability of program interruption
Time sharing system allow access to a CPU from remote terminals
DSS is defined as a system that provides tools to managers to assist them in solving structured
problems
DSS has the following components _________________
Master files contains current records for identification and summarizing
Transaction files contain relatively permanent records take product profile, customer profile, employee
profile etc
Master file configuration includes ____________
______ is a file management software package that lets users and programmers organize data into
files and then process those files
The contents of a field could determine _______ sign for a ______ field
Batch is the process of ______ together _____ that bear some type of relationship to one another
Hash totals means meaningless totals
With OLRT where interactive data entry is available, the master file associated with a transaction may
be searched for confirming data
Controls are required for authorization to ensure data integrity and detect possible breaches in security
Data from client application are not stored in the organization's database through auditables events
and function
All input records in a batch are normally of different types
Black box testing is _______ based and white box testing is _______ based
In examination of audit trail the following data associated with an event may be ___________-
JCL means_________________
Audit should be periodically analyzed to detect any control weakness of the system
In an accounting audit trail, intrusion detection system might monitor the amount of processor time
consumed by the user to detect unusual deviation from the amount processor time requested by the
user in the past
A sample size calculator program assists auditors in determining RAND() function
Auditors can combine functional capabilities of generalized audit software to accomplish the task of
__________________
The three list boxes present at the bottom of the expression builder are called_____
________option is selected from the view menu to create macros with conditions
_______report can be created with minimum user input
_______layout of a form displays one record at a time
The table or query name on which we are going to build our report is selected from the ____ dialogue
box
______field is added to the macro sheet when we select grouping option from the view menu
______can be used to create toolbars
_______query is used to add records from one or more tables into an existing table
_______window is used to write VB code in access application
Values for other tables, queries are maintained in look up fields data type
Visual Basic language is a _____ tool
______ function is used to display a message box
Other ms-office applications can be accessed from ms-access using a concept called ________
Duplication of records in a field won't be allowed if the fields are declared a________
Changes from a master table can be reflected on to the child table by selecting _____option
To see more than one record at a time in a form we use _______
In SQL, delete command is used to remove _________
In MS-Access, filter excluding selection will display only those record(s) which meet the criteria.
The type of queries that can update or delete record(s) in a table(s) are called __________
Joining tables without any matching values in the fields is called ____________
Primary key uniquely identifies each record
Which of the following dialog box is/are used in the creation of form ________
_______ query wizards are used to generate summary calculations for a table
Properties of a form can be changed by selecting ______from view menu options
Forms that are included in other forms are called ______________
In MS-Access, while using form design view, for creating a command button for adding a new record,
we should select the _______ category from the command button wizard
All of the following terms are related to computerized databases except which one?
What is a database?
What is a database?
What is a report?
Which of the following constraints can be used to enforce the uniqueness of rows in a table?
Which of the following commands is used to change the structure of table?
An RDBMS is a
This database holds personal information. The user can help to keep it confidential by
If the database holds customer names and addresses, personalised letters can be created
automatically using
Application software suited to storing the survey information obtained in the table would be
In a one-to-many relationship between Companies and Employees, which field is found in both tables?
Which of the following ensures that records in related tables are consistent with one another? For
example, it ensures that you cannot add a record with an invalid foreign key.
How would you delete a relationship between tables in the Relationships window?
In a Customers tables, what does a plus sign next to the CustomerID field mean?
Assume a one-to-many relationship between the Customers table and the Loans table, with referential
integrity in effect. What happens when you attempt to delete a customer ID from the Customer table
that still has entries in the Loans table?
Which of the following is true when viewing a main form and its associated subform in the Form
Design view?
Which of the following relationships does not belong in a database based on a professional sports
league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the many side of a one-tomany relationship?
You have created a one-to-many relationship with referential integrity between a Customers table and
a Loans table. From which table can you delete a record?
The correct order of the arguments for the MsgBox statement is:
A text field:
The industry standard supported by all major DBMSs that allows tables to be joined together is called
__________.
A program whose job is to create, process and administer databases is called the _____
Microsoft Access may use which of the following DBMS engines?
A database designed using spreadsheets from the Sales department is a database being designed
_________________________ .
A database designed to implement requirements for a reporting application needed by the Sales
department is a database being designed _______ .
A database designed to combine two databases used by the Sales department is a database being
designed _________________________ .
Database professionals use ________________ as specific data sources for studies and analyses.
Database professionals use a set of principles called ________________ to guide and assess
database design.
A very popular development technique used by database professionals for database design is known
as _______________________ .
A very popular development technique used by database professionals to adopt a database design to
new or changing requirement is known as _____ .
In a relation __________________________ .
An attribute is also known as a(n)
.
A combination of one or more columns used to identify particular rows in a is___ .
A combination of two or more columns used to identify particular rows in a relation is________ .
A determinant that determines all the other columns in a relation is______ .
When designing a database, one of the candidate keys in a relation is selected as the _________ .
Normalization is a process used to deal with which of the following modification anomalies?
When you are given a set of tables and asked to create a database to store their data, the first step is
to ____ .
You are developing an Access application that you expect to upgrade periodically. Which of the
following statements is TRUE?
What is the Access tool that is used to create the user interface?
___________ means the result of applying to specific information certain specific technical processes.
__________ is an algorithm which creates a digital representation or "fingerprint" in the form of a
"hash result".
__________ is of standard length which is usually much smaller than the message but nevertheless
substantially unique to it.
Digital Signature involves two processes. They are ___________ and __________.
The prospective signer identified in the digital certificate holds the_________ and is called the
___________
In EDI interface, the translation service receives _________ as incoming files from the communication
service
The EDI standardisation for International Trade and Commerce is introduced by __________
In EDI, the transmission files are composed of different sets of external format files which are grouped
into multiple sets under the name of ________
The ________________ are pre-paid credit cards that include an embedded cards
________________ are another form of credit payment that lets customers use digital online cheques
to pay Web merchants directly
In Active advertisement, there are two types of models. They are _____ and ________
The network based technology is/are ____________
Decryption is a process employed for scrambling of plain text for web based transactions
The _________ model use direct mail, spot television or cable television, in active based
advertisement.
The ________ is a form of mail that is not targeted to a specific audience
The __________ model refers to information that is placed at a point where it will be noticed by
customers in the course of other activities and does not require active search
What is the term that describes spying on ones business rivals to gain a competitive advantage?
Which of the following statements is correct concerning the security of messages in an electronic data
interchange (EDI) system?
The online service offered by navigator gold 2.0 are _______ and_____
_______ is a program or a tool that helps us find a file anywhere on the net
The databases to enable keyword search using Lycos are a2z,_______
The interface that provides effective communication between the web browsers and servers is
_________
CGI is the _________ between web browsers and servers
CGI programs are invoked based on the information provided by the _________
A CGI program is usually called after a request made by the _________
The application that confirms whether a document is compliant to its DTD is _________
Web is a collection of ___________
The two major browsers used to surf the Internet are ________,_______
Stringing pages together using hypertext technology helps view pages _______________
The initial web pages present in a web site is the ________ page.
The image format supported by most browsers is________________.
The mail we send has a mailing address and most of them correspond to_____,_____ and
The first international IP network connections were established in 1973 with _____ and_____
A_____ is a set of computers interconnected by transmission paths to exchange information in
internet
A computer that provides a service usable by other computers is called______
________ and______ are two basic ways of getting connected to the internet
A characteristic of a communication channel that is the amount of information that can be passed
through it in a given amount of time, expressed in bits per second.
The act of searching through storage to locate information without necessarily knowing of the
existence of the information being sought.
A "recipient" of the certificate desiring to rely upon a Digital Signature created by the subscriber named
in the certificate is called the ____________
The Relying Party can use the ___________ listed in the certificate to verify that the digital signature
was created with the corresponding _________
Digital Signatures are used for a variety of Electronic Transactions like ________________________
To associate with a key pair with a prospective signer, a Certification Authority issues Digital
Certificate
Digital Signatures, if properly implemented and utilized offer promising solutions to the problems of
Imposters, Message Integrity, __________ and _____________
In, Digital Signature, _____________ perform the "ceremonial" function of alerting the signer to the
fact that the signer is consummating a transaction with legal consequences
A Digital Signature must have the following attributes ________________ and _____________
"Hash Function" is used in both creating and verifying Digital Signature
___________ provides assurance of the origin or delivery of data in order to protect the sender
against false denial by the recipient that the data has been received, or to protect the recipient against
false denial by the sender that the data was sent.
___________ serves the ceremonial and approval functions of a signature and establishes the sense
of having legally consummated a transaction.
________ is a branch of applied mathematics concerns itself with transforming messages into
seemingly unintelligible forms and back again.
The complementary keys of an asymmetric cryptosystem for Digital Signatures are arbitarily termed as
_________, and ____________
_______ is known only to the signer and is used to create the digital signature.
_______ is ordinarily more widely known and is used by a relying party to verify the digital signature.
____________ is the art of protecting information by transforming it into an unreadable format.
Which of the following activities would most likely detect computer-related fraud?
Which of the following risks can be minimized by requiring all employees accessing the information
system to use passwords?
The _________ phase includes customer service and support to address customer complaints ,
product returns and products defects
The ________ allow companies to bypass the need for costly printed catalogs
A ________________ is a basket on the Net that is used to place the items that are being purchased
The _________ commerce assists in integrating the customers and suppliers of the company directly
into the organisation
E-cash means______________________
E-commerce is a tool that addresses the desire of firms to cut services cost and improving the quality
of goods. It is a definition of e-commerce from _________
The wizard that used to build an interactive table from data existing on sheets
The chart that is used for displaying stock market information
In excel, the subtotal command also generates grand total after the last group subtotal_________
In advanced filter , the criteria occupying multiple columns but more than one row, is considered as an
________ criteria.
Which one of the following statements related to stock chart is NOT TRUE ?
The state government needs to finalize a five years plan to implement 100% literacy in the state.
Which one of the following will be the best tool that should be used to work out the plan ?
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won
in totality to obtain majority to form the government. Which one of the following will be the tool that will
help the team ?
Which one of the following will be the tool that provides a way to view and compare the results of all
the different variations together on the worksheet ?
A ___________ is an excel file where the user stores his data
Which one of the following is NOT the component of the pivot table ?
Excel allows upto ______ levels of sorting
Filtering rearranges a list to display the required records
Which one of the following statements related to stacked bar chart is NOT TRUE ?
The state government needs to finalize a five years plan to implement 100% literacy in the state.
Which one of the following will be the best tool that should be used to work out the plan ?
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won
in totality to obtain majority to form the government. Which one of the following will be the tool that will
help the team ?
Which following function is used in subtotal option ?______________
A workbook consists of many ________
Which two of the following statements related to pivot table are TRUE ?
Which one of the following is NOT a What-if analysis tool ?
Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of cells
A6, A7, and A8 are _____.
How can you tell which cell in a worksheet is the active cell?
Which of the following would you use to change the font size of a cell in Excel?
The command that will save the current workbook with a different file type is:
The command that will print an Excel workbook is found on the ____________ menu.
In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the date
and time a file was last modified.
Which of the following commands will automatically adjust cell references in formulas?
Which of the following commands will remove cells, rows, or columns from a worksheet?
Which of the following options is NOT controlled through the Page Setup command?
Which command enables you to change the margins for a printed worksheet?
All commands are carried out on a rectangular groups of cells known as a:
Which of the following is a valid cell range?
In a copy operation, the cell(s) you are copying from is called the:
In a copy operation, the cell(s) you are copying to is called the:
Which of the following commands is needed to duplicate the contents of a cell in another?
A cell reference that does not change during a copy operation is known as
Which of the following commands is needed to transfer the contents of one cell range to another?
Which of the following quickly copies the formatting of a selected cell to other cells?
If you enter a date into a cell, Excel stores the date as:
You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened that
worksheet again on August 31. What will be displayed in cell E17 on August 31?
The number of days between two cells containing dates can be calculated by:
The function key that is used to quickly edit the contents of a cell is:
To select several cells or ranges that are not touching each other, you would _____ while selecting.
Your Institute teachers have set an assignment on Studies. You are required to use a spreadsheet to
record all that you study on each day for four weeks. You decide to show each weeks data with an
accompanying graph. What is the best way of doing this
What would be the best method to quickly copy the formula from the active cell to each cell below it?
To arrange rows in alphabetical order based on column A, you need to use the command _____.
What can you NOT do with a spreadsheet?
To print just part of a sheet, you would select what you want to print and _____ .
Spreadsheets can be used for...
The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in B2 is
_____.
A long string of seemingly random bits used with cryptographic algorithms to create or verify digital
signatures and encrypt an decrypt messages and conversations.
Protected/private character string used to authenticate an identity or to authorize access to data.
The successful act of bypassing security mechanisms of the system.
A set of rules and formats, semantic and syntactic, that permits entities to exchange information.
An attempt to get access to a system by posing to be an authorised person.
An action or event that might prejudice security.
A NIC is considered as
An IP address is a
To construct a simple LAN of 4 computers, you would connect them with ______connect them
Bluetooth is
Which is not one of the recognized IEEE sub layers?
The most preferred number system to represent a IP address is
A MAC address is of
Protocol is
A ............... is a LAN-based computer with software that acts as a controlling device for controlling
access to at least part, if not all, of a local area network and its available resources.
What are the most common LAN technologies used in networking today?
Modem speeds are measured in
LAN speeds are measured in
The worldwide web server uses the following standard interface to act as the middleware:
An NIC
Accessing the Internet from a typical home PC requires the use of
A multiplexer is a form of
An ISP
FTP is
Telnet
A firewall is
A proxy server is
A search engine is
To look for information about interest areas on the internet, the user should use a
An ISP
FTP is
Telnet
Which of the following is a true statement about the OSI model layers?
A firewall is
Which of the following is NOT an example of a DoS attack that is popular among hackers?
Which of the following would be performed on a network server and not normally on individual
workstations?
The two most common tools used to help with extracting information are:
Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life?
An organisation is upgrading its telecommunication lines. Which is the least important objective while
upgradation
A company posts a price list of its products on its website. The advantage to the customer is that the
company can
The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive
information is called _________________.
Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called:
Setting your privacy settings in Internet Explorer to medium is one way to block:
Domain names must contain a description of the type of organisation that the domain represents. A
very common abbreviation used include:
Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his computer
how would he do this?
While researching the Direct taxes assignment, you find a useful website. What is the most efficient
way to access the site at a later time?
A system that uses the Internet for business-to-business interaction is called a(n):
________ and ______ have the ability to add a lot of visual impact into the PowerPoint presentation
_______ is a motion picture or any animation file
In visual basic, when a record pointer reaches to the last record, _______ property of a recordset
object is automatically set to ______
In visual basic, the properties of various controls can be set using __________
In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a messagebox
function.
In visual basic, ________ is a function which displays a message and it also allows the user to enter
values in a form object
In visual basic, using a data control, ________ is a recordset type which allows to add a new record
and also to update existing record in a recordsourse object
In visual basic, while closing a form _______ event of a form object is triggered earlier to terminate
event.
In visual basic, to give a backcolor or to bring in a picture to a command button can only be done if we
set the style property to ______
In visual basic, a method RGB(255,0,0) will generate _______ color
In visual basic, a method RGB(255,255,255) will generate _______ color
In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible.
To deactivate the Form UnLoad event, you make the following change in the function definiton:
How many root nodes can a TreeView control have?
Procedures declared in a _____ are local whereas procedures declared in a ______ are available to
the whole application.
How can you keep the user from exiting a form by clicking the Close button?
The _______ property enables Visual Basic to draw complete images in memory before displaying
them on the Screen.
You want to display the code and the description of an error. What would be the correct syntax?
Which of the following can be shown to the user using the Common Dialog control in VB?
Which of the following are not properties of Command Button:
Which events enable you to determine which key was pressed by the user?
In order to access a file in Non-textual format, you have to open file in:
Visual Basic displays information depending upon the current value of two properties of the form,
called:
Which of the following procedure types will execute when you assign a value to a property of an
object?
In order to overlap the controls (say a command button) during design time, we use the Send To
Back or Bring To Front option from the Edit menu. To change it dynamically (i.e.during program
execution) we need to change:
Which property of the ProgressBar determines how much of the bar is filled?
The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program.
You try to initialize a new Object variable with the following line but receive an error. What could be the
possible cause? Set MyVar = New Classname
The primary difference between the MsgBox statement and the InputBox function is the:
Which of the following is TRUE about a protected form (i.e., a form where the Protect Form button on
the Forms toolbar is toggled on and is assumed to remain in that position)?
Which event is triggered when the user moves to another open form?
The user can use ______ to remove the undesirable part of the image
The set three colors used for graphs and for secondary slide items is called as
There are ______ types of charts available in PowerPoint
_______ charts are useful while showing variations over a period of time
The _____ are used for selecting, editing and viewing objects in the chart
PowerPoint can import text files that have been saved in ______ format
When a file is saved with _____ extension, the graphics and text are also saved along with the slide
With reference to autocontent wizard for creating a new presentation, which of the following
statements are not true
With reference to changing the order of slides, which of the following statement is not true
With reference to chart, which of the following statements are not true
The format of the text entered in a title, subtitle, or bulleted-list object is determined by the format
settings in a special slide called -------PowerPoint provides a _________ that searches the entire presentation i.e., all the text objects in all
the slides, outlines, notes and handouts for spelling errors
PowerPoint's drawing toolbar contains _______ drawing tools
Click _______ on the rectangle drawing tools enables us to draw multiple rectangles
Which of the following formatting elements can be applied to a PowerPoint diagram using the
AutoFormat tool?
Which of the following formatting elements can be applied to a PowerPoint diagram using the Format
AutoShape command?
What happens when you double click a blank graph placeholder in a PowerPoint presentation?
Which of the following actions will enable you to insert a graph into a PowerPoint presentation?
If you are editing a slide containing a Microsoft Graph, how do you display the underlying datasheet?
How do you deselect a chart that has been placed onto a PowerPoint slide after you have finished
creating the chart?
What happens when you click the Datasheet button on the Microsoft Graph toolbar?
What happens if you single click a chart that is not currently active?
What happens if you double click a chart that is not currently active?
Which of the following best describes the information that appears on the advanced timeline?
What type of program allows an object within an image to be edited without affecting other objects?
In visual basic, to populate a drive list box with a directory list box __________ statement is used
In visual basic, to display a message in the run time _________ function is used
In visual basic, to populate a directory list box with a file list box ________ statement is used
In visual basic, ________ is a property of a recordset object which counts the number of rows in a
recordsourse object
In visual basic, using a data control, a record can only be added from the last record. Adding a new
record is only possible using _______ method of a recordset object.
In visual basic, using a data control, a record is saved to a recordsource object using _______ method
of a recordset object.
In visual basic, using a data control, to navigate to the previous record ________ method of a
recordset object is used.
To deactivate the Form UnLoad event, you make the following change in the function definiton:Private
Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To prevent the Form from closing, you
will set the:
_______ is a word processing that is a member of the office 2000 family
The feature that enables user to type anywhere in a document without pressing or tab
The______ feature allows the user to copy and paste upto 12 items at the same time in an application
______ and _____ key combination will extend the selection by one character on the left and right
The keys that are used to navigate between headers and footers are
Pick out the element from the following that dose not form the type of tabs for the Word 2000
_______are blueprints or patterns for documents of a certain type
The______ is used for quickly setting paragraph indention using the mouse
Word art is text with
AutoShapes in word can be created by accessing the _____
By default, a document consists of_____ section
Excel can import data from other databases for the data analysis.
A System Auditor can uses CAAT tools to analyze data
In the case of the ---------- control, it is ensured that the data in combination with other fields are
reasonable as per standard set by an organisation.
--------------- function searches for a value in the leftmost column of a table and then returns a value in
the same row from a column that we specify in a table
Most of the tools use in Data Analysis depends on
A gigabyte represents
A parity bit is
he contents of these chips are lost when the computer is switched off?
Clock speed is measured in
CISC machines
Which parts of the computer perform arithmetic calculations?
ROM
A UPS
smart card
Multiprogramming refers to
Multitasking refers to
What are small high speed memory units used for storing temporary results?
A good way to exchange information that changes rapidly is through
______ is the default view in Word used for typing Editing and Formatting the Text
The short-cut-key that is used to indent a paragraph spacing in the documents is
The short-cut-key that is used to paste the selected text
The short-cut-key that is used for paragraph spacing(1.5)
The box that separate text from the document and allows it to behave like an independent object is
known as
The object that is used to provide information like the title of the book, name of the chapter, page
number etc.
The dialog box that is used to incorporate picture bullets into our documents or web pages is
The object that composes of set of tools which helps to create and work on different shapes like
rectangles, circles, flowcharts etc.
When word is opened a new document called_____ is displayed, where the user starts typing the
content right way
______ is an online dictionary maintained by word to obtain synonyms for words
When a new table is created the insertion point flashes in the _____
By pressing the _____ key inserts a blank row after the last row in the table
________shows how a document would look like when published on the web or on an intranet
______ is a software for sending and receiving e-mail messages
________is the coding system used to create web pages
The network that makes information easily accessible across various networks is _______
Which of the following statements are false with reference to the use of a header row source for a mail
merge
With reference to auto correct which of the following statements are false
With the reference to password protected documents which of the following statements are false
The alignment available for tabs does not include
The view that enables us to view how objects will be positioned on the page when it is printed
The mode that is initialized or toggled to if the user is in a position to overwrite the text in the word
Veena is entering a paragraph in a word processing program. When the cursor gets to the end of a
line, what is the best way to get the cursor to the next line?
Using an electronic bulletin board, Seema can do all of the following except which one?
Aryan has created a ten-page story, but only wants to print the first two pages. What printer command
should he select?
What process should be used to recall a document saved previously?
Which is used to indent text within a document?
Desktop publishing is a more sophisticated form of which of the following types of software?
What basic tools would you find in the Edit menu of a word processor
Given the default left and right margins, and -inch spacing between columns, the width of each
column in a two-column document will be:
Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot see
any columns on the screen. What is the most likely cause?
While word processing, in which of the following situations would Tom use the "Copy" command?
What command in a word-processing program can be used to change the word him to her, and also
the word he to she in the given phrase? On a cold and still night, the only sound that could be heard
was the owl that had ade its home in the nest outs
What edit commands would you use to insert a paragraph from one document into another document,
while still keeping the paragraph in the first document?
Which of the following statements would NOT be a reason for showing suggested revisions in a Word
document without changing the original document?
How are suggested changes entered for review on an initial Word document?
Which of the following is TRUE about saving a document using the Versions command?
What happens when you open a document that has been saved using the Versions command?
You have used the word discover four times in an English essay you have created using a word
processing program. You would like to find another word of similar meaning to use instead of
discover. Which of the following would you use to do this?
When opening and working with multiple versions of a document, how can you tell which is the most
recent version?
Various fields are added to a regular document to create a special document called a form through the
____________ toolbar.
Which of the following types of fields CANNOT be inserted into a form?
Which of the following tools will copy the formatting of selected text to other places?
What is the name of the process of determining the cause of errors in a macro?
Drop caps are added to a Word document using the ___________ menu.
Pertaining to newsletters, which of the following cannot be changed using the Columns command
dialog box?
As related to type size, how many points are there to the inch?
Assume you are working on a newsletter in which the masthead extends across the top of the entire
first page. The rest of the newsletter has two columns. What is the minimum number of sections in the
newsletter?
Which of the following is NOT correct with respect to page, column, and section breaks?
Which of the following would be the most appropriate font for a newsletter headline?
Virtual memory is
Multiprocessing is
A 4GL is
A nanosecond is
What small, hand-held device is used to move the cursor to a specific location on the screen?
To find where a file has been saved on disk, the user should
A series of instructions telling the computer how to process data or files is defined as a
To ensure that data is not lost if a computer system fails, the user should
Having a single CPU alternatively process tasks entered from multiple terminals is called
The place in the CPU where the data and programs are temporarily stored during processing is called
the
Computer manufactures are now installing software programs permanently inside the computer. It is
known as
Which of the following file organisation forms most efficiently allows access to a record
The part of the computer system controlling data manipulation is called the
For direct access storage devices the recording area is divided into
Which of the following hardware or software system controls provides a detailed record of all activities
performed by a computer system
Which one of the following parts of a computer is necessary to enable it to play music?
An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15 minutes
of sound and 1 minute of video. Which of the four different media listed takes up most space on the
CD-ROM?
Which one of the following printers is suitable for printing sprocket fed carbon copies?
You are conducting research for a Income Tax assignment. The raw facts you collect are called
Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best way to locate the files?
Components of an information system model are: a) applications architecture; b) functional
architecture; c) technology architecture; d) information architecture
The computer operating system performs scheduling, resource allocation, and data retrieval functions
based on a set of instructions provided by the:
Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio
Which of the following procedures should be included in the disaster recovery plan for an Information
Technology department?
Designing relationships among components is part of:
Several Computers connected together is called:
Which network topology uses a Hub?
Which of the following topologies is used for Ethernet?
Which of the following areas of responsibility are normally assigned to a systems programmer in a
computer system environment?
Which of the following is recommended when many searches for data are required
It is unlikely that a magnetic tape containing several thousand blocked records can be used on two
machines of different architecture directly because
Which component of the CPU has the most influence on its cost versus performance
Which of the following terms applies to network used to connect computers with other computers,
peripherals and workstations that are in fairly close proximity
A computer based system for sending, forwarding, receiving and storing messages is called an
If a workstation contains a processor, monitor, screen manipulation device, printer, storage and
communication capabilities, it is said to be
RS-232 is a
What is a compiler?
A device used in data communications to divide a transmission signal into several sub-bands is known
as a
Which tool is used to help an organization build and use business intelligence?
A parity bit is
In processing cheques which of the following I/O techniques have banks traditionally used
Which of the following is a pointing device used for computer input?
A UPS
What general term describes the physical equipment of a computer system, such as its video screen,
keyboard, and storage devices?
Where would you find the letters QUERTY?
What are you most likely to use when playing a computer game?
What input device could tell you the price of a bar of chocolate?
A GUI is
Where would you find a magnetic strip?
Multiprogramming refers to
Multitasking refers to
Disk fragmentation
The technology which is used to check answer sheets of multiple-choice questions in civil services or
similar examinations is: -
A compiler is
______ software enhances the user to enter ,store, manipulate and print any text
______ software enables users to send and receive data to/from remote computers
_______ is the temporary storage place for deleted files
_____ is a collection of related fields
_____ language consists of strings of binary numbers
______ symbol is used to represent processes like assigning a value to a variable or adding a number
Both the DBMS and the application resides on the same component in a ____system
When all the processing is done by the mainframe itself, the type of processing is sometimes called as
DBMS models can be grouped under____ categories
The __________ protocol is a network protocol to be built for the World Wide Web .
The computer which can receive data from other computers on the network and print it is _______
The hardware and the software requirements together form the_____
_______ printers use light to produce the dots needed to form pages of characters
_______ software are programs that are complex and can be developed or purchased
_______ is a set of special instructions used to communicate effectively with the computer
_______ converts a high level language into machine language
_______ translates assembly language program into machine language instructions
op1
Ctrl+C
op4
ans
None of
ALT+F1 CTRL+F1 the above A
None of
Tally IMP Tally INI the above A
false
A
None of
ALT+F3 CTRL+F3 the above B
None of
Bill
A or B
the above C
Three
Four
Five
B
None of
Alt+C
Alt+Ctrl+C the above B
TRUE
FALSE
TRUE
*
FALSE
$
&
Cash Flow
Statement
s
Two
Alt+D
Create
Informatio
n
Fund Flow
Statement
s
Three
Alt+X
Alter
Informatio
n
Ratio
Analysis
Four
Ctrl+T
Display
Informatio
n
F4
F5
F6
Alt+P
Ctrl+P
F1
Tally
ODBC
TRUE
F3
Invoice
Two
op2
op3
A
^
A
Puchasing
,
Puchasing
Accounts Receiving
and
Puchasing payable
and
Accounts and
and
Accounts
payable
Receiving Receiving payable
D
Mone of
Single
Multiple
A or B
the above A
Data
False
Enterprise
Data Informatio
n
FALSE
3
data
record
All of the
above
One
Ctrl+D
D
A
B
All of the
above
F7
None of
Shift+P
the above
Journal
Day Book Book
None of
Sub
the above
Electronic
Data
Interchan All of the
ge.
above
4
Field
5
All of the
above
C
A
B
B
A
C
A
C
B
FALSE
Display
stock
valuation
method
TRUE
Ledgers
Groups
Journals
Personal
Nominal
Real
Manual
Balance
Sheet
Journal
Automatic None
Profit &
Journal
Loss
Book
Physical
Stock
Stock
Journal
Transfer
Filled
11
FALSE
managem
ent by
objective
F4
Receipt
16
TRUE
managem
ent by
exception
F5
Main
Location
Primary
True
False
Ledgers
0 to 9
Reports
1 to 100
Supplier
Report
F2
Net
Transactio
ns
True
F6
function
key
Sales
1-4-1995
to 31-31996
True
Open
Change
Calculator Period
Issue
18
electronic
data
analysis
F6
Primary
Cost
Category
None of
the above
None of
the above
None of
the above
All of the
above
All of the
above
Horizontal Vertical
B
B
D
A
Reversing
Journal
B
None of
the above A
21
B
B
All of the
above
Alt+f5
B
B
All of the
above
C
A
None of
Vouchers the above
10 to 60 None
All of the
Suspense Order
above
Informatio None of
Output
n
the above
F4
Ctrl+f2
Ctrl+f4
Closing
Balance
False
Alt + f6
function
key
Purchase
s
1-4-1996
to 31-31997
False
A and B
F7
function
key
A or B
1-4-1997
to 31-31998
A or B
C
A
A
C
A
None of
the above C
A
None of
the above A
None of
the above B
None of
the above B
A
None of
the above C
Balance
sheet &
profit &
loss profit
& loss and
trial
balance
Profit &
loss and
trial
balance
Main
location
Primary
Security
mechanis Ledger
m
a/c
F5
F7
Cash and
profit &
Cash and
loss
bank
C
None of
A or b
the above B
a or b
None of
the above
F9
None of
the above
None of
the above
Regional
setting
Balance
Sheet
F10
None of
the above A
None of
the above B
F11
B
Both A
and B
4
None of
the above C
1
B
F10
Profit &
loss a/c
FALSE
F11
F12
Budget
None
C
A
F3
TRUE
Main
location
Ctrl+F3
FALSE
Alt+F3
Primary
Symbol
Tally.imp
Stock
summary
By
pressing
F11
function
key
TRUE
128
Ledger
Accounts
Tally.ini
Stock
journal
a name
Sales
return
Cost
category
F8
an identity
Purchase
return
Stock
Company items
creation
units
Trial
Balance Daybook
F7
Alt + F7
Changes
in
transactio Changes
ns or
in Ledger
vouchers Masters
2
3
A and B
F9
Balance
sheet
TRUE
A or b
Stock
analysis
In 'comp
During the info ->
creation of security
a
control'
company option
FALSE
228
28
SubGroups
Groups
A
D
C
A
None of
the above C
A
None of
them
B
None
A
None of
the above A
None
16
B
A
C
B or C
Administr
ator
Owner
One
company
to another
company
created
withon
Tally
Package
Inventory
subsidiary
.
Other
programs a
spreadshe
et or a
database Both A
file.
and B
Cash
disbursem Cash
ents.
receipts.
Will
produce a
Does not more
require as accurate
stringent a set of
set of
financial
internal
statement
controls. s.
data to be
transferre
d to
memory
Contingen
cy
Planning
data that
has been
transferre
d from
memory
System
feasibility
report
the
address of
a memory
location
None of
the above
Payroll
transactio
ns.
Eliminates
the need
to
reconcile
control
accounts
and
subsidiary
ledgers.
an
instruction
that has
been
transferre
d from
memory
Capacity
Planning
Exception
reporting C
Will be
more
efficient at
producing
financial
statement
s.
RAM
Control
totals for
Identificati one or
Record
on
more
Count
Number
fields
Storing
Writing on
informatio
a hard
Printed
n on the
board
output
hard disk
Voice
activated Voice
Visual
broadcasti answer
audio
ng
back
board
File
Validity
Boundary protection
check
protection ring
AGP Card B
End-of-file
and endof-reel
code
B
None of
above
None of
above
Limited
access
files
Coloured
spots
Pixels
Identificati
on
File Name number
Storage
Printer
device
Pixies
None of
above
Reel
Number
Pointing
device
Batch
Total
None of
above
System
Logs
Console
Log
Data
Dictionary B
Physical
Security
Electricall
y charged An ink
ink
pen
Restrict
physical
access
A pen
A
cartridge
An inked
ribbon and
print head
Require
Use only user
unremova password
ble media s
Read
Magnetic
tape
D
A
Paper
Eraser
None of
above
Make
duplicate
copies of
files
None of
above
A drum
A ribbon
A cassette A
Distribute
d policies
or
procedure
s
None of
A ribbon above
An INK
None of
RIBBON above
Storage
None of
Size
capacity above
Read and None of
Write
Write
above
Floppy
None of
PAN drive disk
above
Centralise
d function
Separatio for PC
n of duties acquisition
A
cartridge A drum
A print
A laser
head
beam
Volume
Centralise
d function
for PC
Dispositio
n
to an audit
departme
nt's
products to add
all the
& services customers above
Oracle
ACL
True
True
False
False
JCL
none of
these
none the
above
A
C
A
A
C
C
B
A
A
A
A
B
Serial
access
medium
Random
access
medium
1.44MB
20 GB
A CDROM
A floppy
disk
A CDROM
A floppy
disk
Read
By a
sunny
window
ROM
chips
RAM
chips
Write
By
magnet
objects
RAM
chips
ROM
chips
A parallel
access
None of
medium
above
None of
700MB
above
Magnetic
tape
None of
storage
above
Magnetic
tape
None of
storage
above
Read and
Write
Not
Serial
access
medium
None of
above
None of
above
None of
above
None of
Registers Logic bus above
Control
None of
Registers unit
above
None of
1 bit
8 bits
above
ROM
None of
chips
CACHE
above
A
Random A parallel selective
access
access
access
medium
medium
medium
Network
software
and
security
software
Systems
software
and
applicatio
n software
ALU
CPUs
0 bits
RAM
chips
In a
drawer
CDROM
chips
DRAM
chips
Business
software
and
games
software
Mainfram
Supercom Personal e
puter
computer computer
A
B
A
B
C
B
B
A
B
B
A
None of
the above B
None of
above
Jon Von
Notebook Supercom Neumann None of
computers puters
computers above
First
Second
Hoover
None of
generation generation generation above
Second
First
Fourth
None of
generation generation generation above
Second
Third
Fifth
None of
generation generation generation above
Second
Third
Fifth
None of
generation generation generation above
Second
Third
Fifth
generation generation generation
Analysis,
Specificati Programm System
on,
ing,
Design,
Design,
Design,
and
and
and
Implement
Testing
Testing
ation
None of
above
None of
above
True
False
yes
no
true
false
true
true
true
true
false
false
false
false
A
A
A
A
true
false
review
to
and
determine evaluate
the audit the types
objective of data
can bring can bring
the data the data
directly
indirectly
True
True
change in
the
method of
recording
accountin
g
transactio
n
document
s driven
approach
to obtain a extract
record
data from
layout
file
A
all the
above
none of
the above A
False
False
use of
absence
accountin of audit
g codes
trails
B
A
all the
above
hardware
and
software
configurati
on
processin
g options, checks
file data
and
structure controls
true
true
false
false
the source
of data
available
to the
audit
organizati
on
source of
data for
material
all the
planing
above
all the
above
D
A
A
none of
these
true
false
A
providing
access to
computer
to all
the of by organizati
all
on
use of any none of
concerned personnel programs the above D
true
false
false
false
manage
hardware
&
scheduled software
jobs
resources
true
false
true
false
A
A
enable
multiple
user
resource
sharing
with
with audit production
departme departme all the
nts
nts
above
all the
above
none of
these
D
B
B
true
false
true
true
true
false
false
false
A
A
A
true
false
planning model
databases language base
true
false
true
false
reference
files
table files report files
file
filex
file-o-man manager
to have a decentrali
complete zed
picture of picture of all the
a system a system above
true
false
true
back-ups
true
true
seriously
affected
database
false
retrieval
false
false
subject
area
database
true
true
false
false
deletion
B
all the
above
D
B
B
none of
the above D
filepet
none of
the above A
A
addition
B
B
A
A
software
and
safety and
database database B
A
B
on
at the year immediate quarterly
end
ly
basis
true
false
none of
the above B
A
none of
Benjamin the above B
Benfish
Benford
true
false
consecuti
ve nos. or
alphabets
to entities
blocks of
nos. to the
primary
attribute
of the the
entity
true
false
valid,
numeric
grouping,
transactio
n
true
invalid,
none of
all the
alphabetic the above above
regroupin none of
all the
g, events the above above
false
A
A
random
placement
of
componen none of
t
the above D
true
false
true
false
true
true
increment
al design
and
enlarge
activity
true
true
false
false
interactive
data
extraction
and
analysis
false
false
B
B
true
false
true
false
e-brain
bottom up
tests
yes
bouncing
ball
big-bang
top-down hybrid
tests
tests
no
interactive
data
innumera
ble
none of
analysis
the above B
A
A
stub
all the
above
C
D
B
re-perform
procedure
provide
s carried
read data informatio out by the
on client's n to the
clients
all the
file
audit
programs above
executabl deleted,
es, master hard
true
system
analysis
software
true
yes
true
true
manipulat
es, real
true
yes
false
system
advanced
software
false
no
false
false
create,
false
false
no
none of
these
all the
above
A
all the
above
none of
these
none of
the above A
B
A
A
B
all the
above
A
A
A
can
enable the
auditor to
execute
can be
provisions
very
on a
powerful number of
analytical different
tool
bases
yes
no
can
provide
the
auditors
with useful
informatio
n with
trend s
and
all of the
patterns above
D
A
examinati
on of
source
identifies code of a
program program
provides code
with
detailed
which may advice to
informatio be there following
n of
for
the logic
machine fraudulent of a
none of
uses
reason
program the above C
IDEA
ACL
ALC
ACLL
B
true
fictitious
data
applied
against
the client
program
true
true
false
compariso
n of
source
version of
a
programm
ed
false
false
analyzing
the picture
of a file or all the
data
above
true
false
specificati
on,
file,
none of
program hardware the above
identifying
identifying identifying nonerroneous ineffective standard
code
code
code
true
true
A
A
A
A
all the
above
all the
above
false
false
authentica
tion of
start and informatio resource all the
finish time n support requested above
A
A
job
connectivit
job control y
all the
language language above
yes
no
true
true
none of
the above A
A
false
false
A
B
package
computer
p[program
for
performin
g a variety
master list administer
of data
mathemati of
ed
processin cal
transactio questionn
g function concept
ns
aire
A
prepared
by an
outside
programm
er
prepared prepared engaged
by the
by the
by the
all the
auditor
entity
auditor
above
D
true
file
access/or
ganization
s
false
stratificati
statistical/ on and
arithmetic frequency all the
operation analysis
above
true
true
false
false
B
B
examining
the quality carrying
of system analytical
process
review
Can
Wide
extract
access to and
various
analyse
data base data
examining
the quality all the
of data
above
Can aid in
simple
selection
High End
ACL
IDEA
CAATs
A sample A utility
A special
of
software purpose
transactio programm written
ns
e
program
Can
define the
audit
objectives D
All of the
above
D
None of
the above A
Tests of
details of
transactio
ns
Macros
Analytical
review
procedure
s
Action
Procedure
s
integer
true
number
false
actions
report
Complian
ce tests of
general
EDP
controls
Event
Procedure
s
primary
number
All of the
above
D
General
Procedure
s
D
auto
number
D
A
procedure none of
s
the above B
chart
macros
D
events
form
expressio
n
macro
elements comments action
expressio
code
expressio n
calculator builder
n builder elements
expressio
n
elements none of
action list macro list list box
the above
none of
conditions action
insert
the above
auto
embedde
tabular
columnar report
d
tabular
columnar datasheet justified
create
embedde
report
link report d report
new report
columnar
and
stable and dynamic none of
tabular
unstable and static the above
true
false
create
insert
fields
add chart chart
chart
primary
alternate foreign
none of
key
key
key
the above
label
chart
mail
none of
wizard
wizard
wizard
the above
start
group
page
report
header
header
header
header
report
page
group
none of
footer
footer
footer
the above
for
ordering
records
for
updating
records
C
A
C
B
D
A
B
C
C
A
D
B
for
specifying
conditions
with group none of
by clause the above C
condition
VB
Modules
add
group
report
true
reports
append
macro
sheet
false
RAD
RAP
SysCmd
MsgBox
macro
names
forms
insert
macros
D
delete
B
none of
module
the above C
A
none of
RAID
the above A
none of
message the above B
none of
CME
the above A
OLE
DDE
object
linking
and
embeddin on line
on line
g
execution editing
OLE
object
none of
the above C
none of
the above A
OLE
communic
ator
C
OLE
OLE client server
embedde
linked
d
connected edited
exe
DLL
BMP
html
publish to
form
report
query
web
wizard
wizard
wizard
wizard
dynamic none of
static file static html file
the above
data
append
add
insert
definition
dollars
rupees
pesos
yen
unbound bound
command
object
object
button
list box
display as
create
icon
display
link
icon
create
save as
none of
html
new
html
the above
none of
startup
home
end
the above
none of
bullet
command procedure the above
DBMS
RDBMS front end language
data
data
data
group
collection database storage
A
D
D
B
D
A
B
A
C
B
C
A
C
automatic AutoNum
number
ber
number
true
false
explicit
inner join outer join join
primary
key
cascade
delete
related
records
not null
cascade
change
related
records
columnar tabular
table or
query or
tables
queries
automatic
field
B
B
none of
the above A
no
candidate duplicate
key
key
A
cascade
update
change all
related
related
fields
records
C
both a and none of
b
the above B
record or none of
records
the above C
true
false
property
field
field
property
crosstab
queries
row/colum select
n queries queries
change/de
row/colum lete
n queries queries
no match
self join
join
false
action
queries
inner join
true
new form
dialog box
summary
change
properties
included
form
Dynaset
field
properties properties B
form
create
dialog box
sum
form
wizard
dialog
append
form
properties properties
sub form
Record
Record
Operation
Navigation s
columnar tabular
form
form
filtering
ordering
filter
filter by
form
*
true
sorts
filter by
selection
$
false
update
queries
update
queries
outer join D
A
both 1 and
3
D
simple
D
new
properties B
B
C
gateways A
None of
the above A
?
D
B
bound
control
button
group
unbound
control
option
group
database form
data less
control
controls
group
data
control
record
group
none of
collection the above
all of the
controlled above
bound
unbound
CURRDA
TE()
TODAY() DATE()
combo
text box
list box
box
columnar tabular
pivot table form
form
data sheet filter by
filter
input
button
wizard
control
wizard
filter by
form
option
control
wizard
two of the
above
DAY()
B
B
A
C
C
static text B
main form A
none of
the above C
tool
wizard
C
none of
ram*
ram??
the above B
true
false
B
report
form
table
ledger
A
none of
autoreport report
module
the above A
chart
label
bitmap
report
A
true
false
A
true
false
A
60,000
255
25,000
64,000
D
true
false
B
true
false
A
true
false
B
all of the
table
query
form
above
D
table
form
report
hyperlink D
true
false
A
true
false
A
none of
Insert
Records Tools
the above C
true
false
B
true
false
A
alternate composite candidate primary
keys
keys
keys
key
C
true
false
A
true
false
B
true
false
A
true
false
A
true
false
B
none of
null
not null
zero
the above B
true
false
B
true
true
true
false
false
false
pie
true
true
true
update
query
true
true
inner join
true
true
true
freestandi
ng
true
true
true
true
the first
field of the
table
forms
true
delete
true
true
freestandi
ng
bar
false
false
false
select
query
false
false
outer join
false
false
false
embedde
d
false
false
false
false
the last
field of the
table
reports
false
insert
false
false
embedde
d
B
A
B
both 1 and none of
2
the above C
A
A
B
delete
append
query
query
B
B
A
self join
table join C
B
A
B
stand
alone
sub chart D
B
B
B
A
use
hyperlink
true
true
true
true
true
primary
none of
key field the above C
attributes entities
D
A
append
add
A
A
B
stand
alone
sub chart B
use
datasheet
use import in forms use export D
false
B
false
B
false
B
false
A
false
A
true
true
&
true
page
true
true
false
false
#
false
detail
false
false
true
true
true
false
false
false
group
topic
A
A
D
A
C
A
B
A
B
A
relational
true
list
false
structured
action
query
language language
report
form
true
false
group
record
data
true
true
property
false
false
child
sub forms forms
graphs
chart
primary
number
key
range
index
button
identifier
none of
the above
forms
none of
the above
option
button
record
source
none of
the above C
create
queries
form
sorts
form
bound
combo
box
false
unbound
control
tabular
form
data sheet
chart form form
tabular
columnar
sub forms form
form
calculated bound
calculated unbound
sub form
set
relation
C
B
event procedura
l based
none of
language the above C
query
table
B
B
session
detail
D
both a and none of
b
the above B
A
A
none of
inner form the above A
labels
report
B
pivot
filters
list box
true
form
name
logical
unbound
bound
tabular
auto form form
relationshi
connect
ps
B
A
A
C
B
A
none of
the above A
none of
the above A
none of
the above A
static
C
columnar
form
B
none of
the above C
option
button,
option,
command list, check toggle
toggle and button,
and
button and
command check and combo
check
buttons
list boxes boxes
boxes
filter by
filter by
filter by
filter by
form
report
record
input
form
report
macro
table
clipboard file
field
layout
D
D
B
B
field
names
An
A way to
organised
analyse
way of
and
A tool to storing
manipulat produce informatio
e
high
n about a
numerical quality
set of
informatio document similar
n
s
things
search
sort
It contains
all the
Informatio data about
n about
one
certain
specific
programs item
remote
relative
DBMS
DBMS
storing
data
offline at a
separate
site
Key
verificatio
n
A
document
which
contains
text
Relational
DBMS
record
grab
A way of
maintainin
g a log
C
A
collection
of files
B
Reliable
DBMS
C
uses tape
as
opposed
to disk
C
Database
Computer access
matching controls
D
An
A way to
organised
analyse
way of
and
storing
manipulat A tool to informatio
e
produce n about a
numerical high
set of
informatio qualitydoc similar
None of
n
uments
things
the above C
backing
up data
regularly
Computer
sequence
checks
It contains
all the
Informatio data about
n about
one
certain
specific
programs item
is related
to data
mining
A
document
which
contains None of
text
the above B
Reports
allow
users to
extract
informatio
n as hard
copy
(printed
output)
Reports
provide a
very
flexible
way of
creating
and
editing
document
s
A tool
which
allows text
and
graphics
to be
placed in
document None of
s
the above A
Extracting
and
analysing
data
Spreadsh
eets make
data easy Using
to analyse queries
Word
processor
s,
Compilers Network spreadshe
,
software, ets,
interpreter backup
databases
s, editors systems , DTP
DEFAULT
and NOT
NULL
constraint
s
CHANGE
TABLE
remote
DBMS
FOREIGN
KEY
constraint
s
MODIFY
TABLE
relative
DBMS
storing
data
offline at a backing
separate up data
site
regularly
PRIMARY
KEY and
UNIQUE
constraint
s
ALTER
TABLE
Relational
DBMS
None of
the above C
None of
the above C
IDENTITY
columns C
UPDATE
TABLE
C
Reliable
DBMS
C
uses tape
is related as
to data
opposed
mining
to disk
C
Descriptio Compone
n
nt
Source
D
keeping
the
saving the
keeping a original
file with
using a
backup
paper
different
password copy
copy
filenames A
the
the
product
primary
mail
code
key
merge
e-mail
C
A
database Graphics browser
e-mail
A
Number
bookmark
s
operators wildcards engines
Auto
AutoNum
Primary
Auto ID
ber
Auto Key
forms in a
database
are
consistent
with the
underlying
tables or
queries.
C
C
records in
a dynaset
are
consistent
with the
underlying
tables.
related
tables in a
database
are
consistent
with one
another.
foreign
key.
the
primary
key of
both
related
tables.
query and
main form its
report and
and a
associate its related
subform. d dynaset. query.
A
not a
the
primary
primary
a field
key of
key of the from an
either
related
unrelated related
table.
table.
table.
B
One-toone
One-tomany
Many-tomany
reports
are
consistent
with the
underlying
tables or
queries.
B
Many-toone
The oneto-many
relationshi
p
B
Click the
Delete
Relationsh
ips button
on the
toolbar
B
That there
are
several
customers
associate
d with that
ID
That
records
That
That there can be
some of are
added by
the data is records in clicking on
not
a related the plus
viewable table
sign
C
They
cannot be They must
They must They
AutoNum be the
both be
cannot be ber data same data
numbers text fields types
type
D
The
customer
s ID is
deleted
from the
Customer
s table,
The
and all the
Nothing, customer related
Access
s ID is
loans are
ignores
deleted
deleted
the
from the from the
attempted Customer Loans
command. s table.
table.
An error
message
is
displayed. D
The
subform is
an object
on the
The
form and
subform is The
can be
displayed subform is moved or
The
in
displayed sized like
subform is Datasheet in Form
any other
not visible. view.
view.
object.
D
A one-tomany
relationshi
p between
teams and
players
A one-tomany
relationshi
p between
teams and
coaches
A one-tomany
relationshi
p between
coaches
and teams
A many-tomany
relationshi
p between
players
and teams C
Either
table at
any time
prompt,
title bar
text, icon.
Dim
CreateList
.
A check
box
enables
the form
user to
choose
from one
of several
existing
entries.
The
Customer
s table
only when
there are
Loan
records
associate
d with that
customer
The
Loans
table at
any time
title bar
text,
prompt,
icon.
Neither
table
prompt,
title bar
icon, title
text, icon,
bar text.
prompt.
B
Sub
CreateList CreateList
.
.
Sub.
B
A text field
enables
the form
user to
choose
from one
of several
existing
entries.
must be
must be set for
set for
multiple
one word. words.
help
people
keep track store data
of things. in tables.
relationshi
data.
ps.
facts.
figures.
singleuser
database
applicatio
n
multiuser
database
applicatio
n
A dropdown list
enables
the user
to choose
from one
of several
existing
entries.
A dropdown list
enables
the user
to enter
text.
singleuser
database
applicatio
n
ecommerc
multiuser e
database database
applicatio applicatio None of
n
n
above
Sequential
Query
Language
(SQL)
Structured
Question
Language
(SQL)
Database
Database Managem
Modeling ent
System
System
SQL
Jet
Server
The user
the
database
applicatio
n(s)
interact(s)
with the
DBMS
creates
queries
the user
Structured
Query
Language
(SQL)
Data
Business
Model
System
Relational
Question
Language
(RQL)
C
Relational
Model
Manager B
Oracle
a and b
The
database
The
managem
database ent
applicatio system
All of the
n
(DBMS)
above.
the DBMS
accesses
the
database
data
creates
form
None of
above
creates
reports
the
database
the
managem
database ent
applicatio system
n
(DBMS)
all the
users'
data is in
one place
holds user
data
it reduces
data
duplicatio
n
holds
metadata
tables
metadata
it contains
a
descriptio
n of its
own
structure
holds
indexes
stored
procedure
s
All of
above
b and c
the
database B
All of the
above.
All of the
above.
All of the
above.
C
D
from
existing
data
from
existing
nondatabase
data
as a new
systems
developm
ent project
as a new
systems
developm
ent project
from
existing
data
as a new
systems
developm
ent project
data
marts
normalizat
ion
data
marts
normalizat
ion
data
marts
normalizat
ion
data
marts
normalizat
ion
file
hierarchic
managers al models
entities in
a column
vary as to
kind
table
record
the order
of the
columns
is
important
relation
field
record
field
record
composite
key
Insertion
anomaly
field
primary
key
Update
anomaly
as a
redesign
of an
existing
database a and b
as a
redesign
of an
existing
database a and b
as a
redesign
of an
existing
database a and b
entityrelationshi
data
p data
models
modeling
entityrelationshi
data
p data
models
modeling
entityrelationshi
data
p data
models
modeling
entityrelationshi
p data
data
modeling migration
relational
network
data
models
model
more than
the order one
of the
column
rows is
can use
unimporta the same
nt
name
row
field
key
tuple
composite foreign
key
key
foreign
candidate
key
key
foreign
surrogate
key
key
Deletion All of
anomaly above
C
D
C
C
D
B
D
assess
the
existing
tables'
structure
and
content
are
supplied
by several
wellestablishe
d
manufactu
rers
They use
sophistica
ted
mathemati
cal
technique
s.
create
move the
design the one or
data into
database more new the new
structure tables
database A
were
essentially
killed off
by MS
Access
Their
report
delivery is
more
difficult
than
report
delivery
for
reporting
systems.
are not
have poor true
response DBMS
time
products
Nonintegr None of
ated data the above A
a "wrong
inconsiste nonintegra format"
dirty data nt data
ted data problem B
a "wrong
inconsiste nonintegra format"
dirty data nt data
ted data problem D
data
warehous
data
e
warehous databases
e data are do not
not stored have
in tables. metadata.
Form
Table
Forms
and
Queries
reports
and tables
data
warehous
e data are
often
denormali
zed.
b and c
Report
Query
Macros
C
A
Spreadsh
eets
D
The Link
Tables
command
can be
used to
associate
the tables
in one
database
with the
objects in
another
database.
It will be
easier for
the user
to
upgrade it
if the
objects
are in one
database
and the
tables in
another.
An
applicatio
n may
consist of
multiple
databases
, each
with
multiple
objects,
linked to
yet
another
database
containing
only
tables.
Import
Link
It will be
easier for
the user
to
upgrade it
if the
objects
and tables
are in one
database.
It contains
tables,
It contains reports,
more than queries,
one table and forms
Menu
Wizard
Build
Menu
All objects
in an
applicatio
n,
including
the tables,
must
reside
within the
same
database.
Regardles
s of how
the
objects
and tables
are
stored,
the user
will have
to reenter
the data in
the tables
when the
applicatio
n is
upgraded. B
An
applicatio
n can be
created in
such a
way that it
objects
such as
forms and
reports
can be
changed
without
disturbing
the
existing
data.
C
Merge
Join
It contains
a user
interface,
or
switchboa
rd
Interface
Design
Wizard
It contains
macros
C
Switchboa
rd
Manager D
It is
advisable
to put
each
object and
table into
a
separate
database.
create
backups
for
mission
critical
corporate
data.
put key
business
centralize informatio
the
n into the
managea hands or
bility of
more
data
decision
collection. makers.
Digital
Sign
Digital
Digital
None of
Certificate Signature the above C
Hash
Function
Hash
Function
Digital
Signature
Hash
Value
Digital
Digital
Signature
Signature Verificatio
creation
n
Institution
al
Overhead
and
Subscribe
r Relying
Party Cost
Certificati
on
Authority
store all
corporate
transactio
n data in
one single
location. C
Digital
Certificate
Hash
Result
Private
Key
A
Either B or
C
D
Both A
and B
Either A or
B
C
Subscribe Institution
r Relying al
None of
Party Cost Overhead the above A
Certified
Authority
Certificate None of
Authority the above A
True
False
True
False
Personal
Server
Developer Digital
Certificate Certificate Certificate
Personal
Server
Developer Digital
Certificate Certificate certificate
None of
the above A
None of
the above C
Private
Repositori
none of
Certificate es
Public Key the above B
Evidence,
Ceremony
,
Efficiency Approval,
Evidence,
and
Efficiency
Ceremony Approval, logistics, and
, Approval Evidence Evidence Logistics D
True
False
A
True
False
Certificate
Revocatio
n List
Private
Key,
Subscribe
r
Internal
Format
File
Public
key,
Recipient
External
Format
File
UN/EBCD
ANSI
IC
interchang
batch files e sets
Smart
Embedde
Card
d cards
Digital
Cash
Private
None Of
Key,
The
Recipient Above
Transmiss None of
ion File
the above
UN/EDIFA
UNESCO CT
functional
functions groups
None of
SET
the above
Smart
Cards
C
D
D
A
Electronic
E-cash
cheques D
Online
Catalog
Online
and
Billboards Catalog
Broadcast Customer
and Junk and
and Junk Endorsem
Mail
Billboards Mail
ents
C
All of the
EDI
E-mail
EFT
above
D
True
False
B
Primary
Public Key
Login_Id Key and Public Key and
and
Private
and
Private
Password Key
Password Key
D
Satellite
Global
Private
Area
None of
Network Network Network the above B
Active or
push
Passive or Glow sign
based
pull-based or
advertisin advertisin hoarding All of the
g
g
strategies above
D
Removabl
e drives
that can
be locked
up at night
provide
adequate
security
when the
confidenti
ality of
data is the
primary
risk.
Message
authentica
tion in EDI
systems
performs
the same
function
as
segregatio
n of duties
in other
informatio
n
systems.
convert
text to
text import columns
wizard
wizard
cell
row
reference reference
Encryption
performed
by a
physically
secure
hardware
device is
more
secure
than
encryption
performed
by
software.
Endorsem
ents
A
Junk mail D
Broadcast C
Quality
managem
ent
B
Economic
espionage C
A
competitor
s new
project
B
None of
above
Using all
capital
letters
Security at
the
transactio
n phase in
EDI
systems is
not
necessary
because
problems
at that
level will
be
identified
by the
service
provider. C
function
tip wizard wizard
A
column
none of
reference the above A
text files
serial
values
Lotus 1-23
domain
values
quattropro
or xbase
files
range
values
=currentd
ate()
class files
reference
values
none of
=today() =date()
the above
none of
dollar sign ' = ' sign # sign
the above
function
none of
AutoSum AutoFill
wizard
the above
argument parameter none of
variables s
s
the above
text
logical
numeric Boolean
concatena
none of
te
pmt
merge
the above
countif
vlookup
pmt
count
convert
text to
pivot table chart
columns
wizard
wizard
wizard
tip wizard
none of
sumif
pmt
countif
the above
average sum
sumif
countif
page
none of
setup
print area print
the above
autoforma
none of
t
AutoFill
the above
none of
bordering formatting shading
the above
page
print
setup
print area print
preview
none of
filtering
searching sorting
the above
D
A
A
C
B
D
A
A
B
B
A
A
B
B
A
network of
network
transport
layer
ping
service
FTP
TELNET
intermedia
te network
physical
layer
none of
the above
session
layer
none of
ftp service the above
none of
ARCHIE the above
B
D
A
C
uniform
research
locator
uniform
resource
locator
name of
host
the
computer resource
unlimited
restore
locator
message scheme
none of
scheme
the above
command none of
line
the above
general
sears
electric
browser
editor
Delphi
net
Microsoft
web
read the
Usenet
news
browser
CompuSe
rve
internet
spy
dialer
mosaic
gophersp
gophering ace
Alta vista
finger
server
list
no
middle
hotlist
none of
the above A
C
C
C
B
wincim or
maccim
cyberspac
e
none of
the above
none of
the above
none of
open text excite
the above
web
none of
ftp server server
the above
none of
directories image list the above
maximum
of five
one
many
middle
lower
top
and lower
directory index
glossary
directory index
menu
item
search,ind search,me search,ite search,ind
ex search nu search m search ex search
all the
infoseek excite
lycos
above
all the
netshark cello
lynx
above
navigator
lynx
mosaic
Lycos
gold 2.0
CompuSe
Microsoft internet
IBM
rve
finger
Usenet
service
ftp
telnet
Higher
text
Hyper text Hyper text Hyper text
transfer
transmissi transfer
transfer
protocol
on port
protocol
port
none of
iccp
ftp
uucp
the above
C
C
B
A
C
B
D
C
C
D
C
C
D
D
C
C
none of
telnet
the above
transfer
transmissi communic
transfer
on control ation
control
protocol/in protocol/in
protocol/in ternet
ternet
none of
ternet
protocol
protocol
the above
none of
one
two
three
the above
domain
name
web
none of
ftp servers servers
servers
the above
the
the
internet
the
internet
administra internet
none of
adapter
tion
access
the above
organizati
browser
protocol
site
on
hotlink
higher
text
hyper text type
transfer
transfer
transfer
none of
protocol
protocol
protocol
the above
universal uniform
uniform
resource resource resource name of
locator
locator
label
the above
frequent frequently frantically
asked
asked
asked
none of
query
question question the above
none of
SLIP,PPP TCP,IP
IP,UDP
the above
connectio
n
response request
close
world
wide
search for
search for windows informatio
informatio sockets
n and
n and
internets research none of
research relay chat council
the above
netscape,i mosaic,go none of
lynx,minx e
pher
the above
world wide
web
world wide
none of
server
web client interface the above
none of
glossary index
hotwords the above
yahoo
ftp
B
C
A
B
B
A
A
B
B
B
B
very easy
and
rodent
oriented
net wide
index to
computeri
zed
archives
university
of
berkeley,b
erkeley
freenet
very
organised
network
integration
and
communic
ation
applicatio
n
university
of
cleveland,
cleveland
freenet
IP
address
protocols
search
engines,di ftp and
rectories finger
allsrc,wins
ocks
wais,allsrc
allsrc
waisman
hyper
higher text transfer
medium
markup
language language
verificatio
n on
network
integration
and
communic none of
ation
the above A
university
of
California none of
net
the above B
none of
dns
the above A
telnet and
ftp
wais,wins
ocks
winsock
hot links
hyper text
markup
language
books
hyper text marks
images
applets
none of
the above A
none of
the above B
none of
the above B
none of
the above C
none of
the above B
none of
animation the above B
A
B
B
B
B
D
D
apple link
computer
related
abbreviati
ons and
acronym
bitnet
Delphi
fidonet
biographic
al
informatio bookstore none the
n
s
above
encyclope on-line
more
dia
reference informatio
Britannica works
n
galenet
search
engines
web
directories database channel
Graphical
interpreter
formatting
Joint
Pictures
Expert
Group
Graphical
interchang
e Format
Jumbled
pictures
expert
graph
document
s
Graphical
interface
format
Joint
pictures
expert
graph
mails
net
yahoo,info
eudora,ne
seek,altav netscape,i tscape
ista
e,lynx
and pine
network
informatio web
connectio
n
pages
ns
BACKGR
OUND
COLOR
FCOLOR
Communi
Communi
cation
Common cation
gateway graphical graphical
interface Interface interface
Communi
Network Interface cation
Current
web page Browser Client
Browser/u
ser
Server
Web
Unknown Uniform
resonance resource
language locator
United
relay
limited
Graphical
Interface
format
B
Joint
pictures
experimen
tal group A
browsers
none of
the above C
mails
B
FONTCO
LOR
B
Common
Gateway
Interface D
Connectio
n
B
None of
the above B
Channel
None of
the above
neither
image
text or
text nor
text only only
image
image
SQL
PLSQL
SGML
CGI
alphalang betalangu metalangu none of
uage
age
age
the above
C
C
C
palm is
not
eatable
palm is
not elm
SGML
SGML
Preproces
Processor sor
web sites images
Internation
al
Engineeri
Internet
ng
equipment trainers
training
and
faculty
faculty
pancake
is not
edible
SGML
Parser
applets
Internet
Engineeri
ng Task
Force
MS
MS
Internet
Internet
Netscape Explorer
Explorer Navigator and
and
and
Netscape
Mosaic
Mosaic
Navigator
data from
a
text
database symbols
hyperlink hypertext hotword
in
in userin random sequential defined
order
order
order
first
.bmp and
.gif
Service,
hostname
and
directory
path
start
home
.bmp and .gif and
.jpeg
.jpeg
service,ho service,po
stname,po rt and
rt,directory- directory
path
path
mailing
lists,mail
mail
mail
server
servers,m vendors,m robots
ail clients ail
and
and
identificati gateways
alternate on and
to other
services password services
<center>
<font
size=n>
<hr
size=n>
none of
the above B
SGML
Composer C
document
s
A
None of
the above C
None of
the above C
video
hotlink
C
B
none of
the above B
none of
the above C
.wmf and
.bmp
C
service,ho
stname
and port B
none of
the above C
<l1
type=shap
e>
D
communic
ation
generated
informatio
n
Server
arpanet
common
gateway
interface
Client
classified
general
instruction none of
s
the above B
Browser User
A
none of
intranet
the above B
LAN
the net
peer-topeer
connectivit
y
wan
data
parcel
packets
none of
the above B
none of
the above A
B
B
C
B
education,
research
Higher
text
manipulati
on
language
united
states and
UK
Hyper text
markup
Language D
server
client
standalone
none of
the above B
none of
the above C
none of
the above C
client
Hyper
transfer
meta
language
united
england,n states &
orway
Russia
network
servers
network
topology
network
redirector none of
s
the above B
data
terminal
equipment
physical
layer
data
target
equipment
network
layer
packet
switching,
store and
forward
network
anonymou
file access s ftp
PAN,NAN, KAN,RAN,
AAN
VAN
smart
network
and dumb
network
file
transfer
LAN,WAN
,MAN
network
card
detailed
transactio
n
explanatio
n
applicatio
n layer
point to
point
network
and
broadcast
channel
network
none of
the above B
none of
the above B
none of
the above
none of
the above
none of
the above
none of t
VAN
MAN
TAN
he above
none of
LAN
MAN
WAN
the above
none of
analog
digital
non-digital the above
Define
Document
Data type type of
type
Document
definition data
definition type data
Modulatio Manipulat
Moralize/d n/demodul e/demanip none of
emoralize ation
ulate
the above
Modulatio Manipulati none of
Mapping n
on
the above
Satellite
link and
digital
signals
Standard
long
internet
protocol
Prime
prolonged
protocol
Dedicated
access
and dial
up access
Stream
line
internet
protocol
Point to
point
protocol
B
B
C
B
C
B
B
B
Serial line
protocol
Pillar to
pillar
protocol
sending
storing
storing
informatio data on
data on a n to a host the hard
disk drive computer drive
none of
the above C
none of
the above B
receiving
informatio
n from a
host
computer B
Bandwidth Speed
Size
Channel
Find
Save
Recipient Relying
Party
Party
Private
Public Key Key
Browse
Either A or
B
Both A
and B
Retrieve C
Neither A
nor B
B
Both B
and A
C
Electronic Electronic
Commerc Fund
All The
e
Transfers Above
Not False
Closed
System,F
ormal
Legal
requireme
nts
Not True
Signer
Authentica
tion
Not True
Nonrepudi
ation
Service
Affirmativ
e Act
Cryptogra
phy
Private
Key
Private
Key
Private
Key
Decryptio
n
Document
Authentica Both A
tion
and B
Not False
A
Formal
Legal
Requirem
ents,
Open
System
D
Formal
Legal
Requirem Open
ents
System
Signer
Affirmativ
authentica None of
e Act
Efficiency tion
the above A
Using
data
encryption
.
Unaltered
in
transmissi
on.
Digital
Digital
signature certificate
Either A or
Efficiency B
Private
Public Key Key
Both A
Public Key and B
Both A
Public Key and B
Both A
Public Key and B
Cipher
Encryption
Performin
g validity
checks.
Not
intercepte
d en
route.
Conductin
g fraudawarenes
s training.
Received
by the
intended
recipient.
Neither A
nor B
C
B
Private
Key
Neither A
nor B.
None of
the above
Either A or
B
Either A or
B
Either A or
B
Cryptogra
phy
Reviewing
the
systemsaccess
log.
Sent to
the
correct
address.
A
A
A
C
A
B
C
The
private
Both
The
key is
sender
private
used by
and
key
the
receiver
cannot be sender for
must have broken
encryption
the private into
but not by
key before fragments the
this
and
receiver
encryption distributed for
method
to the
decryption
will work. receiver. .
Failure of
server
Data entry duplicatin
Collision. errors.
g function.
Business- Business- BackendtototoBusiness Backend Business
On-line
Endorsem
Billboard Catalog
ents
Customer
Endorsem
ents
Billboard Catalog
Intermedi
aries
portals
.COM
Order
Search
Placemen
and
t
Service
discovery
PrePost
Purchase purchase
purchase consumm preparatio
interaction ation
n
Endorsem
Billboard
ent model
model of Online
of
marketing catalog
marketing
Online
Shopping
Catalog
cart
Billboard
EDI For
Administr EDI For
EDI For
ation,
Administr Administr
Commerc ation,
ation,
e and
Consumer Commerc
Transactio and
e and
n
Transport Transport
EDI
Compiler
TCP/IP
The
private
key is
used by
the
receiver
for
decryption
but not by
the
sender for
encryption
.
A
Firewall
vulnerabili
ty.
D
BusinesstoBillboard A
Broadcast B
Broadcast A
Domains
None of
the above C
Search
and
discovery A
None of
the above B
Pulling
cart
B
None of
the above C
EFT
Gateway
Assemble
Interpreter r
EDI
D
D
BusinesstoBusiness
Emergenc
y Cash
Communi
cation
Perspectiv
e
BusinesstoConsumer
Electronic
Cash
Business
Process
Perspectiv
e
Micro
Transactio
Microcash ns
Decryptio
n
SSL
1
2
filtered
data table table
pivot table
wizard
series or
rank
series or
rank
series or
rank
series or
rank
column
chart
column
chart
column
chart
column
chart
chart
wizard
category
category
category
category
bar chart
bar chart
bar chart
bar chart
E-token
A
Subscripti
Encryption on
C
3
4
B
index
table
pivot table D
convert
text to
columns
wizard
tip wizard D
data
legend
marker
A
data
legend
marker
B
data
legend
marker
C
data
legend
marker
D
surface
pie chart chart
C
surface
pie chart chart
B
surface
pie chart chart
D
surface
pie chart chart
A
wild card
spaces
characters symbols
internet
excel97
explorer Netscape
convert
text to
pivot table chart
columns
wizard
wizard
wizard
stock
line chart bar chart chart
true
false
none of
the above A
word 2000 A
tip wizard A
pie chart
C
A
and
3dimension
s
true
Data
table
or
4Multidimension dimension
s
s
false
Pivot table
It is often
used to
display
share
It is also
market
called as
prices
high-low- It shows over a
close
trends
period of
chart
over time time
Scenario
Pivot table manager Solver
A
A
It is also
used for
indicating
fluctuation
s in
temperatu
re
changes B
Data
table.
C
Scenario
Goal seek manager
Data
Pivot table table.
A
Data
Goal seek Pivot table Solver
table.
D
Workshee Spreadsh none of
Workbook t
eet
the above A
Performin
g
calculation
s.
Performin
g
database
operations
Performin
g text
formatting
.
Source
Column
table
field
Row field. name.
two
three
N
true
false
34Multidimension dimension dimension
s
s
s
Data table Pivot table
All of the
above
Pivot table
item.
C
B
B
A
B
It is useful
when
several
componen
ts are
changing
and the
user is
It displays interested
the data in the sum
series one of the
on top of componen
the other. ts.
Pivot
Scenario
table.
manager
Scenario
Goal seek manager
Standard
Count.
deviation
databases records
It is a tool
for
summarizi
ng and
analyzing
the data
records in
an
interactive
manner.
Goal
seek.
text import
wizard
worksheet
applicatio
n window
A dark
wide
border
It is a tool
that
provides a
way to
view and
compare
the results
of all the
different
variations
together
on the
worksheet
Scenario
manager
convert
text to
columns
wizard
It can be
represent
ed in 3dimension
s
Solver
Data table C
A
worksheet
s
D
It
summariz
es the
data by
using
analytical
functions.
solver
A
Pivot
table
function
tip wizard wizard
workbook tables
document modal
window
window
A dotted
border
database A
C
A blinking
No border border
A
8,16,32
your
formula
has a
syntax
error
ability to
generate
tables
word
processin
g
Range
Producing
graphs
2,4,2
the row is
too short
to show
the
number at
the
current
font size
2,2,2
the
column is
too narrow
to show all
the digits
of the
number
flexibility
speed of of moving
calculation entries
6,8,10
either b or
c
C
cost of
initial setup
D
graphical
Address
Writing
letters
drag from
the top
cell in the
doublecolumn to
click any the last
cell in the cell in the
column
column
CTRL +
ENTER
ENTER
array.
function.
database
Gap
Drawing
pictures
spreadshe
et
D
Rows
A
Document
filing
A
click the
column
heading
click the
column
label
TAB
constant.
INSERT
formula.
A
B
(201)555100
1212.
Cell
reference
s
Functions
^
/
Tom
#VALUE! McKenzie. C
B5*B6
C3/D4
E12
It is
surrounde
d by a
heavy
It is
border.
blinking.
Numeric Text
constants constants
*
\
It is
impossibl
e to
determine
D4^2
.
SUM(H9: G7*SUM(
H11)
H9:H11)
D
D
C
B
The
phrase
active
It is
cell
displayed appears in
in reverse the Status
video.
bar.
A
By either
clicking in
a different
cell or
By using using the
the arrow arrow
By clicking keys to
keys to
in a
move to a move to a
different different different
cell
cell
cell
The
Standard
toolbar
By typing
the
reference
of the cell
you want
to move to
in the
formula
bar
C
The Font
The Cell Size
Format
command
The
command on the
Formattin on the
Tools
g toolbar Edit menu menu.
B
the New
command
on the File
menu.
File
the Save
command
on the File
menu.
Edit
Preview
Details
Insert
Delete
Clear
Orientatio
n (portrait
or
landscape
)
Delete
Options
worksheet
.
6
copy
range.
paste
range.
Headers
and
footers
Page
Setup
range.
D12, G25
destinatio
n range.
destinatio
n range.
the Save
As
command
on the File
menu.
View
the File
Type
command
on the File
menu.
C
Window A
List
Properties B
Both
Insert and
Delete
Clear
C
Both Clear
and
Delete
Remove B
Fonts
Margins
View
Edit
group.
D12:G25
cell group.
D
source
range.
source
range.
Both the
Copy and
Paste
command
s
constant
B
C
clipboard.
clipboard.
The
Duplicate The Copy The Paste
command command command
absolute relative
mixed
D
B
D
A
B4
$B4
B$4
$B$4
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
C
Both the
Cut and
Paste
The Move The Cut
The Paste command
command command command s
D
the Fill
Handle
cycle
through
absolute,
relative,
and mixed
cell
reference
edit cells. s.
the
the
Format
Formattin
Painter
g toolbar
cycle
through
open
applicatio
ns.
C
Condition
al
formatting B
Select the
Insert
Hyperlink
command
from the
File menu.
Click the
Insert
Hyperlink
button on
the
Standard
toolbar.
Doubleclick a cell
and click
the Insert
Hyperlink
command. B
copy and
paste
cells.
whether
the cell
has a
formula or
a value in the cell
it.
address.
Right-click
a cell and
click the
Edit
Hyperlink
command.
whether
the cell
has an
absolute
or a
relative
cell
reference.
the value
in the cell D
text with
either a
two-digit
or fourdigit year,
text with a text with a
depending
two-digit four-digit
on the
year.
year.
an integer. format.
C
Jul-30
subtractin
g the
earlier
date from
the later
one.
the F4
key.
Aug-31
It is
impossibl
e to
determine
from the
29/03/200 informatio
8
n given.
B
adding the
earlier
date to the
later one.
the F2
key.
subtractin
g the later
date from
the earlier
one.
the Esc
key.
0.75
March 4
of the
current
year
adding the
later date
to the
earlier
one.
A
the F1
key.
B
a cell on a
worksheet
a
.
a variable. constant.
Either 3/4
or .75,
depending
on the cell
formatting C
either a
cell on a
worksheet
or a
variable. D
B1-G10
B1.G10
B1;G10
B1:G10
AVERAG
E
COUNT
MAX
SUM
Line
Pie
Scatter
Once a
column
chart is
chosen it
cannot be
changed
to a bar
chart.
Once a
pie chart
has been
chosen it
cannot be
changed
to line
chart.
Once a
line chart
has been
chosen it
can be
changed
to a pie
chart.
D
hold down
the ALT
key
Transfer
informatio
n to a
database
hold down
CTRL +
SHIFT
A
03-Apr
Combinati
on
Once a
bar chart
is chosen
it cannot
be
changed
to a
column
chart.
Use
multiple
sheets
Paste
Special
B
none of
Edit | Data the
| Sort
choices
B
Create
None of
forms
the above C
select
Print
select
selection Print
on Page selection
Setup |
in the
Sheet
Print
and then dialog and
print
then print D
drawing
None of
pictures
the above A
=(B2*(D4+
#VALUE! C2)
C
Paste
Tools |
Sort
Analyse
data
Data |
Sort
Calculate
data
portrait
press the
PRINT
SCREEN
key
writing
letters
D4+C2*B
2
=A3SUM:
B3SUM:C
3SUM
REF!
whatever
was last
landscape used
AD213
CERN
ZA1
ECRN
click the
Print
button
producing
graphs
(D4+C2)*
B2
A0
CARN
newsgrou
ps and
yahoo and mailto and search
infoseek files
engines
applicatio
bulletin
n
boards,m servers,pr
news
ails call
oxy
groups,ya and
servers
hoo and wireless and web
infoseek system
servers
bulletin
board
system
None of
the above B
vertical
A
None of
the above C
NET
A
none of
the above B
none of
the above B
business bulletin
broadcasti broadcasti none of
ng system ng system the above
none of
small
large
very small the above
windows windows windows none of
socks
sockets
stocks
the above
Mosaic
Yahoo
PINE
Lynx
none of
buffer
cache
built-in
the above
Photograp Digital
Cryptogra Message
hy
Signature phy
Digest
A
B
B
A
B
C
Key
Lock
Hash
Function
Formula
User-id
Password Name
Address
Penetratio
Cryptogra Password
n
Retrieval phy
Cracker
Regulatio
Acts
ns
Address Protocols
Unauthori
Spoofing Imposting sing
Approving
Loss
Threat
Exposure Hacking
Sales Income tax
tax
authorities authorities
Pirated
Utility
software
Tim
Berner
Lee
Hoffman
Etrade.co Amazon
m
.com
Automate
d Tailor
Any Time
Machine Money
Regulatio
Acts
ns
Router
Gateway
LAN
hyper
terminal
tracing
program
National
Informatic
s Center
Only
Computer
s
A
B
A
D
A
B
Police
Judge of a officer of
civil court IPS rank. B
Virus
Cracker
Charles
Bubbage
Howard
Aiken
Address
Port
Protocols C
Pin
B
WAN
CAN
PAN
hypertext
tracing
program
Network
Interface
card
hypertext
transfer
protocol
New
Informatio
n Card
hypertext
tracing
protocol
C
Can not
Only
computers printers
Combines
connectivit
y of a hub
with the
Concentra traffic
tes
regulation
connectivit of a
y
bridge
None of
the above B
None of
the above D
Switches
data from
incoming
ports to
outgoing All of
ports.
Above
Bridges
and
Two or
Repeaters more
.
networks
bits
RG7U
Bridges
Hubs and
and Hubs nodes
None of
frames
Packets the above
virus
gateway router
checker
None of
Two
Four
the above
Data-Link Network All of the
Layer
Layer
above
Coaxial
Twisted
cable
Fiber
pair
Physical
address
Logical
address
A cable
Hub
Data
return to
the
sender
It continue
on to
target
device
It gets
with
destroyed corrupt
None of
bit by bit. data
the above B
Wireless
technolog
y
Physical
Layer
Wired
Technolog
y
Data Link
Layer
Ultra violet
technolog
y
Network
Layer
Binary
48 Bits
ASCII
48 Bytes
Octal
48 KB
software
that
facilitates
connectio
n to the
internet
a list of
rules for
transferrin
g data
over a
network
a gateway
calling
software program
that allows for
file
internet
copying
bridging
B
Network
Server
PC
C
firewall
One
Physical
Layer
Novell PC Client
A
C
D
B
A memory None of
address
the above B
None of
Router
the above B
None of
the above
All of the
above
None of
the above
48 MB
A
D
A
A
If the hub
goes
down, it
If one
brings
node goes down all
down, it
of the
brings
nodes on
There isn't down the that
one
entire ring section
Physiolog
Both A
y
Topology and B
If the hub
goes
down, it
brings
down all
of the
nodes on
all of the
rings
B
None of
the above B
All of
above
D
Bus
Star
Linear
Parallel
Ring
Both A
and B
Parallel
Circular
Ring
Ring
Star
Bus
Bus
Bus
Ring
Network
Layer
Bus
Star
Transport Physical
Layer
Layer
Mesh
A
Data Link
Layer
D
Ethernet,
token ring,
DecNET
bps
bps
Ethernet,
token ring,
FDDI
kbps
Kbps
Ethernet,
token ring,
ARCnet
B
mips
B
Mips
C
Linear
None
Both A
and B
Star
Star
Linear
Mesh
Mesh
Ring
C
B
C
Ethernet,
DecNET,
FDDI
mbps
Mbps
depend on
usually
measured the
higher
in bytes
transmissi
than LAN per
on
speeds
second
medium
CD-ROM
Windows
drive
a modem 95
must use
the World
Wide Web
key
gateway
interface
must use
electronic
mail
uniform
resource
locator
must have
a LAN
account
common
gateway
interface
limited by
modem
speeds
C
Netscape B
All of the
above
A
applicatio
n protocol
interface C
connects
interfaces a
a Novell used to
a modem computer
Interface control a to a
to a
Controller printer
computer network
D
CD-ROM
Windows
drive
a modem package Netscape B
Linux
have to
do with
compressi
on of
graphics
and video
Novell
Netware
Windows None of
NT
the above C
have to
do with
Web
pages
the
Internet
none of
the
previous A
use
appropriat
e
must use must use must have communic
the World electronic a LAN
ations
Wide Web mail
account
software A
none of
the
Printer
modem
bridge
previous D
provides
access to
is a CPU
the
is a CPU functional make of
Internet
register
unit
processor A
used to
send
email
is a
protocol
for the
transfer of
files
is part of between
Netscape computers D
used to
send
email
used to
browse
the Web
uses
wireless
communic
ation
is part of None of
medium
Netscape the above D
used to
protect a
computer
room from
fires and
floods
a backup
server
a screen none of
a form of saver
the
virus
program previous
an email a poor file
server
server
none
none of
the
previous
search
CD-ROM clip-art file engine
D
D
IR system
for the
hardware Internet
browser
scanner
provides
access to
the
is a CPU
Internet
register
is a CPU
functional make of
unit
processor A
used to
send
email
is a
protocol
for the
transfer of
files
is part of between
Netscape computers D
used to
browse
the Web
is a
protocol
used to
uses
that allows
send
telephone is part of for remote
email
lines
Netscape login
D
Any layer
Any layer can
can
communic Any layer
The layers communic ate only
can
cannot
ate
with the
communic
communic directly
layer
ate only
ate with
with any directly
with the
one
other
above or layer
another. layer.
below it. above it. C
It is made
up of
many
networks
connected
into
Individual
transmissi It works
computers
on lines
the same can
It is one
called
way as a connect to
large
backbone local
it using an
network. s.
network. ISP.
A
Password System
Denial of Port
cracking intrusion Service
sniffing
C
used to
protect a
computer
room from
fires and a form of
floods
virus
Flood a
Web
server
with
IP flood
requests
a screen
saver
program
none of
the
previous
Virus that
initiates a
ping flood UDP flood A
hack
packet
firewall
router
a backup an email
server
server
Apply
security
patches
flood
switch
hub
B
a poor file none of
server
the above D
Update
Backup
Limit
virus
data on a logging on
definitions daily basis access
C
Only large
namerecogniza
ble sites
are safe.
Use of
Use of
logical
Use of
password access
identifiers s
methods
All sites
are safe
and
reliable.
traffic
There are
safe and
unsafe
sites.
ActiveXenabled
sites are
safe.
Phone
A Trojan
horse
Use of
encryption
methods D
by
scanning
the
by
computer
attaching for a
itself to a connectio
document. n.
B
Web
Applicatio
traffic
n updates D
Adware
A worm
Modems
cookies
and
Trojan
horses.
Protocols
Trojan
horses
and key
loggers.
Multiplexo
rs
LAN
key
cookies
loggers
and key
and
loggers.
worms.
by
attaching
to an email.
An attack
on a
system for
personal
gain
through
an FTP
port.
An attack
with the
purpose
of gaining
publicity
Disruption
in
Economic communic
damage ation
Crashing
the stock Shutdown
market, as of military
in the
security
1930s
systems
Spyware
Changing
the
Giving out content of
disinforma a Web
tion
page
D
Disruption All of the
in supply above are
lines
correct.
D
Shutdown
Contamin of nuclear
ating
plant
water
safety
systems systems D
To obtain
an
accurate
inventory
of network
related
To
equipment
To carry To
improve
and parts
more
improve
system
and
network
network
response network
capacity services time
nodes
D
limit
stop its
update its
access to competitor prices as
set its
computer s seeing soon as
prices
owners
their
they are
very high only
prices
changed D
Yahoo
USA
People
People
People
Lycos
Search
Search
Search
Search
B
Name of Date of
Personal Criminal
your bank birth
assets
records
A
Virus
Fraud
Adware
Spyware B
buy
stocks.
Shill
bidding
Internet
stalking.
pop-ups.
Use a
fake email
address.
invest
without
risk.
make
large
amounts
of money
by parking
purchase funds in
off-shore their bank
property. account. D
Phishing
cyber
stalking.
cookies.
Siphoning
virtual
stalking.
spam.
II only
ftp
Hoaxing
Web
stalking.
viruses.
Use antispyware
software.
Logical
access
controls
Neither I
Both I & II or II
www
telnet
B
B
B
B
C
C
Adds
more
Verifies
Increases
bytes to
integrity of boot up
programs files
time
HTML
Internet
Explorer
Microsoft
Excel
round trip
HTML
HTML
document. document.
.con is
.com is
.co in
used for
used for used for companie
company company s
Web
query.
the World
Wide Web
round trip Consortiu
HTML.
m
HTML.
XML.
HTML.
DHTML.
clicking a
using
hyperlink
Internet
that
Explorer
reference
to view a
sa
Web page updating document
that is
the values that is
stored on that are
stored in
the hard obtained the floppy
drive on
through a drive on
your
Web
your
computer query
computer
Click on
the Back
arrow until Click on
Go to the
the
Go to or History
desired
Search in page and
site is
the
look for
found
browser
the site
Misleads
a program
recompilat
ion
B
both
HTML and
Internet
Explorer B
Web
browser.
None of
the above A
one way
HTML.
MHTML
C
D
viewing an
Excel
worksheet
that you
have
saved as
a Web
page.
B
Go to the
Bookmark
s or
Favorites
page
C
the
the
the Insert the
External
Refresh
Hyperlink Update
Data
command command command command A
Screensa
Hyperlink ver
Sound
BMP
GIF
JPEG
Video
TIFF
C
C
Cut and
paste it to
a word
processor
document.
network
extranet. intranet.
topology
an
an
attachmen a
encryption
t.
signature. a footer. .
VoIP
IPT
IPP
PoIP
Desktop Desktop Desktop Desktop
client,
client,
server,
server,
applicatio software, applicatio software,
n, and
and
n, and
and
database. hardware. database. hardware.
Telephon None of
Modem
CD-ROM e line
the above
File
File
Transmiss File
Transfer ion
Transfer None of
Program Protocol Protocol the above
So
computers
can be
So IP
So email
reference addresses is
d by a
can be
delivered None of
name
shorter
faster
the above
143.215.1 None of
193.1.2.3 45.1.1.1 2.19
the above
paul .trigg
@
paul.trigg
domain.
@domain. paul.doma None of
org. uk
org.uk
in.uk
the above
Scientists
The US
in
governme Switzerlan
None of
nt
d
No-one
the above
Write it
Save it to down on a
a floppy
piece of
disk.
paper.
Internet
Relay
Chat
It will be
deleted
Internation
al Relay of
Character
s
Add it to
Favourite
s or
Bookmar
ks.
privileged
network.
Internet
Remote
Conversat
ions
A letter
It will be will be
waiting for sent to
you to
you in the
collect it post
C
A
B
A
A
B
A
D
None of
the above A
None of
the above A
Hyper
Textual
Mark-up
Lingo
Receiving
messages
automatic
ally from
anyone in
the group
Hyperlink
Text
Marking
Language
Hyper
Text Markup
None of
Language the above C
clipart &
auto
shapes
People
discussing
a topic of
interest
globally
autolayout
s and
presentati
on
templates
circles
points
squares
icons
square
image
short cut
menus
grid
auto
shapes
guide
all the
above
tool bars
High
volumes
of email
None of
the above C
slide view
& outline none of
view
the above B
slide show
clip gallery & view
fonts &
& word art show
images
none the
above
all the
wave file media clip .video file above
movelast,t movelast,f
eof,false rue
alse
eof,true
form
properties layout
project
window
window
toolbox
explorer
movefirst,t movefirst,f
bof,false rue
alse
bof,true
value()
int()
number() val()
circle
true
true
rectangle square
false
false
fontcolor
underline,t
rue
textsize
onemillionth
of a
second
color
fontunderli
ne,true
size
onehundredth
of a
second
recordcou
nt
count
forecolor
textunderli
ne,true
foresize
onethousandt
h of a
second
oval
none of
the above
none of
the above
fontsize
one-ten
thousandt
h of a
second
itemcount listcount
A
B
D
D
D
D
D
A
A
C
B
D
C
D
form
layout
window
prperties
window
title
prompt
project
explorer toolbox
B
vbmsgbox none of
style
the above C
msgbox() textbox
label
inputbox() D
opendyna opensnap dbopensn dbopendy
set
shot
apshot
naset
D
load
activate
standard
blue
red
opaque
red
green
form
properties layout
window
window
form
properties layout
window
window
change
lostfocus
unload
transpare
nt
green
blue
initialze
graphical
black
white
project
explorer
toolbox
window
project
explorer
toolbox
window
text
gotfocus
none of
container the above
child
true
load
parent
false
unload
enabled
visible
value
dime
.ctx
Validate
On Error
GoTo
linelabel
UpdateCo
ntrols
dim
.ctl
Validation
On Error
GoTo
Inline
PaintPictu
re
var
.ctr
Check
initialize
C
D
B
D
A
D
C
A
D
activate
none of
text
name
caption
the above C
opendatab
openrecor none of
ase
dbengine dset
the above B
C
On Error
Stop
style
none of
the above
.ocx
Audit
On Error
Resume
Next
Refresh
Resize
Cancel
parameter Cancel
to a non- parameter
zero value to 0
UnloadMo
de
parameter
to a nonzero value
UnloadMo
de
parameter
to a zero
value
A
None of
the above D
B
B
A
Consists
Consists of several
of several Applicatio
Programs ns
Form
window, Project
standard window,
or code
view code
module
window
Place
Place
code in
code in
the
the
Terminate Unload
event
event
AutoRedr
AutoRedr aw =
aw = True False
Msgbox
err.no &
err.text
Consists
of Various
Forms
Consists
And Code of several
Modules Projects D
Class
module,
code
module
Place
code in
the
Deactivate
event
None of
the above A
None of
the above B
PaintPictu
Refresh
re
A
Msgbox
Msgbox
error.num
Msgbox
error.num ber &
err.numbe ber &
error.desc
r & err.text error.text ription
D
To
provide a
repository
for images
To display To help in To allow used by
images to creating a the editing other
the user ToolBar
of icons
controls
D
GetFileNu
FreeFile m
GetFile
GetBytes A
GetProper
Retrieve Get
ty
Value
B
Common
messages
passed to Open
Windows
Windows dialog box explorer
Caption
Visible
Multi-Line
Click,
KeyUp
KeyUp
Click and and
and
KeyPress KeyDown KeyDown
Ascii
Binary
Input
Format
Format
Mode
CurrentX ScaleLeft ScaleHeig
and
and
ht and
CurrentY ScaleTop ScaleTop
Input box
Font
KeyPress,
KeyUp
and
KeyDown
Output
mode
D
C
x and y
D
B
Property
Get
Backgrou
nd color
property
Property
Assign
Property
Let
Caption
property
ZOrder
property
Min
Max
Value
Shell
Substr
SetAttr
CStr
A
Are
actually
not
None of
properties the above B
Are one
and the
same
Can be
different
at times
You do
You do
not have
not need the
to use the permissio
Set
n to
command access
here
the class
MyVar
has not
been
declared
The
ExecProc
The Open The Exec edure
method
method
method
A critical An
A warning message exclamati
query icon icon
on icon
Property
Set
C
AutoRedr
aw
property C
CurrentVa
l
B
None of
the above C
None of
the above D
None of
the above B
built-in
intrinsic
procedure
statement. variable. constant. .
C
InputBox MsgBox
function
statement
can be
can be
MsgBox InputBox created
created
statement function
with the
with the
returns a returns a macro
macro
value,
value,
recorder, recorder,
while the while the while the while the
InputBox MsgBox MsgBox InputBox
function
statement statement function
does not. does not. cannot.
cannot.
B
Data
cannot be
A new
entered
The form Data can check box
into the
can be
be
can be
form.
modified. entered. added.
C
QueryUnl
Unload
oad
Deactivate Terminate C
scribble
clipping
cropping cutting
drawing
tool
tool
tool
tool
A
color
palette
ascent
10
column
images
color
guide
primary
tricolor
color
color
scheme
palette
scheme
28
18
36
bar
pie
linear
slide
images
sorter
and text
slides
views
all the
radar
doughnut above
data point data
stream
color box
color
scheme
circular
entity
Microsoft
organizati
on chart clip art
A
C
A
C
A
B
auto
shapes
the chart
window
the
the chart opens
organizati is made
displaying
on chart is available a chart
expanded for editing template
general
custom
purpose drawing
box tools tools
tools
track
changes
used to
create a
used to
manager
mange
accessed box for an
organizati only by
existing
onal chart manager box
not
available
in the tool
turned on turned off bar
used to
store the
other tools
of the
organizati
onal chart C
none of
the above C
standard
drawing
tools
C
available
in the tool
bar
any of the
once
twice
thrice
above
two
four
five
eight
standard all the
native tool draw tool tool
above
autolayout handlayou
none of
s
ts
slide view these
reduce/enl
none of
zoom
arge
preview
the above
importing exporting copying
Microsoft auto
excel
shapes
clip art
.rtf(rich
.ppt(Powe text
.doc(docu
rPoint)
format)
ment)
B
C
B
B
B
B
moving
B
drawing
tools
A
.html(hype
rtext
format)
B
nine
.rtf(rich
text
format)
not
displayed
during the
slide show
DTS(digit
al track
sound)
displayed
only
during the
slide show
3D(3
dimension
)
build
notes
master
transition
slide
master
twelve
.doc(docu
ment)
B
displayed
only in
outline
none of
view
the above A
both a and
b
transition
jpeg
during
slide
transition
spell
checkers
custom
slide show show
notes
slide pane pane
internet
explorer
when the
slide show
is run
header
files
both a and
b
properties
pane
D
A
A
B
A
b or c
A
none of
the above D
all the
above
D
png
action
hyperlink hypertext button
visual
basic for Microsoft
applicatio visual
all the
visual c++ n
interdev
above
macro
batch file templates add-ins
while
creating a
.exe file
virus
checkers
none of
the above
all the
above
none of
the above
outline
pane
B
A
C
A
B
D
PowerPoi
nt creates
a sample
presentati
on to
which
user can
add words
and
pictures
it is the
quickest
way to
create a
presentati
on
contains
sample
presentati
ons for a
variety of
topics
user can
insert
user can picture to
user can insert only the
insert
premaster
objects
drawn, pre- slide
like clip- colored
which gets
arts,
graphic
reflected
pictures
images
in all the
stored in a reflected slides
separate in a clip
using that
files to the arts to the master
slides
slides
slide
in notes
in outline in slide
pages
view, drag sorter
view, drag
the slide view, drag the slide
icon to a the slide icon to a
new
to a new new
location
location
location
the slide
that holds
the
formatted
placehold
ers for the
design
titles,
templates
main text
is the
and any
template
backgroun transition whose
d items
means
format
that user applying and color
wants to special
scheme
appear on effects to user
the slides the
applies to
is called a crossover a
master
between presentati
templates the slides on
provides
suggested
content
and
design
D
user can
insert
picture to
the title
slide
which gets
reflected
in all the
slides
using that
title slide B
I slide
view, drag
the slide
icon to a
new
location
C
the slide
that holds
the
formatted
placehold
ers for the
title and
sub-title
for the
presentati
on is
called a
title
template D
with notes
pages
view user
can
prepare
speaker
notes and
handouts
the slide
that holds
the
formatted
placehold
ers for the
titles,
main text
and any
backgroun
d items
that user
wants to
appear on
the slides
is called a
master
template
slide
layout
in outline
view, user
can see
the
miniatures
of all
slides in a
presentati
on,
complete
with text
and
graphics
user
should
select the
slide view
to add the
text to the
slide
the slides
can be
reordered
in the
outline
view
B
the slide
that holds
the
formatted
placehold
ers for the
title and
subtitle for
the
presentati
on is
called a
title
template D
set up
customize new slide show
B
design
template
is the
template
transition whose
means
format
applying and color
special
scheme
effects to user
the
applies to
crossover a
between presentati
the slides on
by default,
doughnut
data to be chart is
graphed displayed
resides in based on
a
the data in
datasheet the
window
datasheet
the
master
the slide
slide
master
office
spell
assistant checker
10
12
once
twice
data is
plotted in
a chart
window
the
header
slide
grammar
checker
102
three
user can
add data
labels and
gridlines
to the
chart
B
the format
slide
none of
the above
22
four times
B
B
B
B
text,
text,
hypertext
graphics and
and email Power
address. Point.
CD-ROM,
digital
camera
and
sound.
text,
hypertext,
Power
Point,
video and
sound.
D
the Line
style
the Font
and the
text
alignment
Line style,
Line color,
text font,
and text
alignment D
the Line
color
Fill color,
Line color,
Line
and Line
Fill color Line color thickness thickness D
A popup
box
prompts Microsoft
Excel is
you for an Graph is
started so existing
started so The graph
that you
Excel
that you
placehold
can create chart to
can create er is
a chart.
insert.
a graph. deleted.
C
taken
from the
first
column or
row of
data in the
datasheet,
always
depending
always
taken
on
taken
from the whether
from the first
the data
first row of column of series are
data in the data in the in rows or entered by
datasheet. datasheet. columns. the user. C
Side-byside
Stacked
column
column
Pie chart Line chart B
It
automatic
ally
displays in
Slide
view.
Click the
Insert
Chart
button on
the
Standard
toolbar.
Click the
chart
object,
then click
the View
Datasheet
button on
the
Standard
toolbar.
Single
click the
chart.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
linked to
the
PowerPoi
nt
presentati
on.
Double
click the
chart.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
embedde
d in the
PowerPoi
nt
presentati
on.
Pull down
the Insert
menu and
select
Chart.
Pull down
the Insert
menu and
select the
appropriat
e Object.
Pull down
the Insert
menu and
select
Chart,
click the
Insert
Chart
button on
the
Standard
toolbar, or
pull down
the Insert
menu and
select the
appropriat
e Object. D
You
cannot
display
Pull down the
the Edit
underlying
menu,
datasheet
then
once the
select
slide is
Object.
finished. B
Change to
Click
Slide
outside
Sorter
the chart. view.
C
The
datasheet
window is
The
toggled
datasheet from
is saved closed to
as a
open (or
separate from open
file.
to closed). D
The
applicatio
n that
The chart
The chart created
is
The chart is doubled the chart
selected. is deleted. in size.
is started. A
The chart
The chart Microsoft
is
The chart is doubled Graph will
selected. is deleted. in size.
restart.
D
a slide
one bullet
item at a
time, build
bullet
items a
letter at a
time, and
build
a slide
bullet
bullet
bullet
one bullet items one items one items a
item at a letter at a word at a word at a
time.
time.
time.
time.
D
Subtle,
Moderate,
Subtle
Moderate Exciting
or Exciting D
Neither
enter nor
Both enter exit;
and exit, neither fly
Fly in from and fly in in from
Enter and top or
from top top nor
exit
bottom
or bottom bottom
C
Enter
Shift
Alt
Ctrl
B
the way
objects
appear on
a slide.
what
objects do
after they
appear on
a slide.
the way
objects
exit a
slide.
The
advanced
timeline
shows the
sequence
in which
objects
The
The
will
advanced advanced appear on
timeline
timeline
the slide
shows the shows the and the
sequence duration duration
in which of the
of the
objects
effect
effect
will
applied to applied to
appear on each
each
the slide. object.
object.
Clips
Organizati
on charts Text
Paint
program
Draw
program
Filtering
program
From top
Dissolve
in
Fly in
Custom
animation
can be
used to
affect the
way
objects
appear on
a slide, to
what
objects do
after they
appear on
a slide,
and to the
way
objects
exit a
slide.
D
The
advanced
timeline
shows
neither the
sequence
in which
objects
will
appear on
the slide,
nor the
duration
of the
effect
applied to
each
object.
C
Clips,
organizati
on charts,
and text
D
Animation
program A
Fly in,
From top,
and
Dissolve
in
D
Once data
is entered
it cannot
be
changed.
OLTP.
You can
change
the
appearan
ce of a
whole
diagram,
but not
individual
shapes of
a
diagram.
[Enter+A]
.vbg
Data
cannot be
Once data entered
is entered into
it can be Datasheet
changed. .
OLAP.
OLST.
You can
change
both the You
appearan cannot
ce of a
change
whole
the style
diagram of the
and the
connectin
individual g lines in
shapes of an
a
Organizati
diagram. on chart.
[Shift+Z] [Alt+Z]
.vbp
.frm
There is
no such
thing as a
Datasheet
.
B
OLIP.
B
Dir1.Path
=File1.Pat
h
openrecor
dset
You
cannot
change
the color
of the
boxes in
an
Organizati
on chart.
[Ctrl+Z]
.frx
none of
additem
loaditem the above
loadpictur
none of
e
addpicture the above
Dir1.Path
=
File1.Path
Drive1.Dri =
none of
ve
Dir1.Path the above
message(
none of
)
msgbox() the above
Dir1.Path
=
File1.Path File1.patte
Drive1.Dri =
rn=Dir1.pa
ve
Dir1.Path th
opendatab recordcou
ase
nt
count
update
append
addnew
append
update
additem
addnew
B
moveprevi
ous
movefirst C
add
load
Drive1.Dri
ve=Dir1.P
ath
messageb
ox()
movenext movelast
Cancel
parameter
to a nonzero value
Word
2000
UnloadMo
de
Cancel
parameter
parameter to a nonto 0
zero value
Office
2000
Office 97
additem
B
D
B
B
B
B
C
C
C
C
UnloadMo
de
parameter
to a zero
value
A
Back
Office
A
click-ntype
office
clipboard
shift+end
and
shift+hom
e
double
click
drag &
drop
cut
select
shift+left
and
shift+right
normal
web
layout,
layout,
web
printlayout layout
ctr+end
and
ctr+home
web
layout,
page
layout
click from
start
program,
MSWord
from the
templates task menu
inbox
document
assistant assistant
none of
the above A
none of
the above A
none of
the above B
none of
the above A
none of
wizard
the above
office
none of
assistant
the above
Screen
Document
Tip
Tool Tip Icon Tip
Tip
marginal
none of
tab stop
stop
ruler
the above
home and up and
up arrow page up end keys down
keys only keys only only
arrow
left
center
decimal
rotation
dialogs/al none of
template model
erts
the above
increase decrease both A
none of
indent
indent
and B
the above
special
control
design
effect
tool box
wizard
pictures
drawing
control
toolbar
box
database forms
1
2
0
11
page
printer
print
setup
setup
preview
from the from the from the
none of
file
file menu file
the above
none of
border
shading
style box the above
ctrl+a
Del
ctrl+f
ctrl+m
ctrl+a
Del
ctrl+f
ctrl+m
CTRL+SH
CTRL+SH CTRL+SH
IFT+F
CTRL+O IFT+S
IFT+P
ctrl+shift+ ctrl+shift+
ctrl+shift+f ctrl+o
s
p
None of
Excel
Access
Both
the above
A
A
A
B
D
D
B
C
A
A
A
A
A
A
D
A
C
B
True
False
Valid
Signs
HLOOKU
P
False
True
Transactio Limit
n type
Check
VLOOKU
P
A or B
DDE
OLE
Analysis is
the
loading of
programs
that
perform
routines to
control
peripheral
devices
ODBC
This
involves
looking at
a system
and
finding out
how
informatio
n is being None of
handled
above
Inputs,
outputs,
Only
file design
hardware hardware,
and
and
software software
To
execute
To collect any
data
programs
Deleted
Copied
from the from the
disk
disk
Maintenan
ce,
reliability,
and
upgradea None of
bility
above
Analysis
translates
program
code of a
high level
language
to
machine
code
To
maintain
security
A
B
Reasonab
leness
D
None of
the above B
All of the
above
C
Saved to
the disk
None of
the above D
Transferre
d from the
disk
A
Users
operate
the
manual
system
and
computer
system at
the same
time
Users
operate
the
computer
system
from a
given date
Users
operate
the
manual
system
None of
above
The new
system is
introduced
alongside
the
existing
system
The new
system is
introduced
and users
start
operating
it
Users
continue
operating
the old
None of
system
above
Instruction
s and
technical
document
ation
User
Guide and
technical
document
ation
User
guides
cover how
To enable to run the
any printer system,
to be
enter
For
connected data,
technical to the
save,
support
network
print, etc.
Network
Operating systems Database
systems and
systems
and
communic and
system
ation
backup
services services services
Magnetic
tape
storage
CD-ROM floppy disk
To
To help
maintain a
someone
backup
who is
copy of all
applying
the
To do a
for
informatio particular employme
n
task.
nt
Address
Data bus Auto bus bus
FDDI
BAD
TED
Address
Data bus Auto bus bus
Data
Operating structures
system
that are
Peripheral routines
part of the
s that are that
kernel of
connected execute in an
to a
supervisor operating
computer. mode.
system.
binary
ASCII
decimal
form
code form form
were 7
bits
4 bits
Log files
and
temporary
files
8 bits
8 bits
represent
ed 256
characters
16 bits
None of
above
None of
above
None of
the above A
Hard disk B
None of
the above
Control
Bus
MAD
Control
Bus
B
A
B
D
Shells,
compilers
and other
useful
system
programs. D
alphanum
eric form A
represent
ed 127
characters A
32 bits
A
More than
1000
mega
1000
bytes
kilobytes
32
registers
used to
indicate
uppercase
letters
ROM
bits per
second
memory
capacity
have
fewer
instruction
s than
RISC
machines
ALU
Power is
switched
off
a parallel
interface
32 I/O
devices
1024
230 bytes bytes
A
a 32-bit
bus or 3232 Mb of bit
RAM
registers D
used to
detect
errors
RAM
is the first
bit in a
byte
DRAM
baud
bytes
is the last
bit in a
byte
B
CROM
A
memory
access
time
Hertz
D
secondary
secondary storage
storage
access
capacity time
B
use more
RAM than
RISC
machines
have
medium
clock
speeds
Registers Variables
Data is
not saved
Computer before
is
computer
improperly is shut
shut down down
a serial
printer
interface interface
use
variable
size
instruction
s
D
Logic Bus A
All of the
above
D
a modem
interface B
laser
printer.
is used
for cache
memory B
none of
the
previous
has more
storage
is a form capacity
of ATM
than an
card
ATM card
CRT
displays
LCD
displays
is an
access
contains
card for a a
security
microproc
system
essor
C
none of
SSGA
the
displays
previous B
having
several
programs
writing
in RAM at
programs none of
the same multitaski in multiple the
time
ng
languages previous
having
several
softwares
running at
the same
time
the ability
to run 2 or
more
programs
concurren
tly
writing
programs none of
in multiple the
languages previous
ALU
ctrl+2
ctrl+c or
ins
ctrl+end
ctrl+x or
ins
ctrl+home B
ctrl+v or
Del
A
none of
the above B
ctrl+2
ctrl+5
Text Box
Header
and
Footer
Frame
ctrl+1
AutoShap
e
Border
Screen
Tips
Page
Layout
none of
the above A
Chart
WordArt
Auto
Shapes
File
Borders
Shading
WordArt
Bullets
clear
clear all
picture
arrow
circle
bullets
bullet
bullet
dialog box dialog box dialog box
AutoShap
charts
WordArt es
document new
doc1
1
document
hyphenati mail
thesaurus on
merge
shift+f7
thesaurus
menu
shift+f8
first
second
tab
convert
text to
table
end
convert
data to
table
rows &
row
columns
AutoCorre AutoForm
ct
at
Mail
Merging Macro
visual
basic
basic
shift+f8
shift+f7
web
online
layout
layout
view
view
email
outlook
client
express
html
xml
internet
intranet
first row
none
dialog box A
files
C
default
document B
none of t
he above A
tools+spel
ling menu A
last cell of
the t able A
none of
the above A
enter
table auto
format
none of
option
the above
none of
records
the above
style
none of
gallery
the above
Data
none of
Source
the above
visual
vj++
FoxPro
alt+f8
alt+f5
browser
micro soft
outlook
sgml
arpanet
A
B
A
B
B
A
none of
the above A
hotmail
vb script
LAN
A
A
A
field
field name
names in
must be the field
the
listed in
separator header
the same s in a
source
order as header
must
the
source
match any
correspon and the
merge
ding
data
fields
informatio source
you've
n in the
can not be inserted in
data
set as
the main
source
paragraph document
auto
format
option
by default
applies to cell height
it is not
the entire and
possible table and weight
to change not only to option
the height the
applies to
of only
selected all the
selected rows or
rows and
rows of a columns columns
table
of a table of a table
left
decimal
justified
the
number of
fields
names in
the
header
source
must be
the same
as the
number of
data fields
in the data
source
B
delete
cells
option
allows to
delete the
entire row
or a
column or
shift cells
up or
shifts cells
left
C
top
A
A new
section is
created in
order to
change
properties
like
number of
columns
true
In order to
type a
header
from the
third page
of the
document
a section
break is
inserted
after t he
third page
false
A section
is a
portion of
a
document
in which
certain
page
formatting
option can
be set
D
A
true
true
drag &
drop
true
false
false
click -ntype
false
If a
header is
inserted in
the
second
section
then the
same
header is
applicable
to the first
section
A
A
Double
Click
none of
the above B
A
with t he
caps lock
key
accidentall
y turned
on
reverses
the case
of the
letters that
automatic prohibits
were
ally
the user automatic capitalized
corrects
from
ally
incorrectly
common renaming corrects
and then
typing,
an auto
the
turns off
spelling
correct
grammatic the caps
errors
entry
ally errors lock
B
password
protected
document
can be
opened
password
password without
password can be
can not
password are not
upto 15
include
as read
case
characters
spaces
only
sensitive long
B
left
justified
hanging
top
A
a .ppt file
can not
not be
inserted at
specified
position in
the
current
document
true
true
a
document
file can be
inserted in
the
current
document
at
specified
position
false
false
true
true
false
false
Master
Document
Print
Layout
View
Child
Hyperlink none of
Document Document the above A
Page
Layout
a multiple
document
s files can
be
inserted in
the single
document
an .xls
data can
not be
inserted at
specified
position in
the
current
document B
A
A
B
A
Outline
Layout
none of
the above B
Insert
Mode
Type Over
mode
Remove
press the
press the press the escape
return key tab key
key
layers and lines and
planes
spaces
enter/retur
tab
n
grammar spell
checker
checker
send a
public
message
to friends
interested send
in one
pictures to
topic
a friend
From ___
Print all
To ____
Enter
Copy
closing
tabbing
none of
the above A
just keep
typing
send
private
messages
to a friend
Page
setup
Retrieve
spacing
word
processin
g
send a
package
to a friend
Print
preview
Save
sorting
D
B
C
D
B
C
B
spreadshe
database graphing
et
C
Creating
and
To
editing
Storing
analyse
document informatio None of
figures
s
n
the above B
subscript
To
analyse
figures
annotation
Creating
and
editing
document
s
clip art
clipboard
Storing
Making
informatio Calculatio
n
ns
B
Font,
Spelling,
Paragraph
grammar
, Bullet
Clear,
and
Cut, copy, and
replace
autocorre paste and Numberin
and select ct
clear
g
C
Text
Text at
Numbers which
the
which
appear at Designate
bottom of appear on the top of d area on
every
every
every
the
page
page
page
document C
Mouse,
printer
and
processin
g system
keyboard?
Keyboard,
Mouse,
monitor
and
printer
Clear,
replace
and
Toolbars
Monitor,
keyboard
and
mouse
microphon
clip-art file e
Spelling,
grammar
and
Cut, copy,
autocorre paste and
ct
clear
6 point
10 point
15 point
2
inches.
2
inches.
3 inches.
You are
not in
Print
Layout
view.
Word
cannot
display
columns
during
editing;
You have You have you will
not
not
see them
inserted a specified only when
column
continuou you print
section
s section the
break..
breaks.
document. A
Browser
to move a
section of
text from
the
original
to store a to store a location to
file on the file on a
another
hard drive diskette
location
Data
about a
set of
A set of
similar
Mainly
different
things
text
graphics
Thesauru Spell
Grammar
s
Checker Checker
None of
the above B
digital
scanner
D
None of
the above C
25 point
B
impossibl
e to
determine
.
B
to leave
an original
section of
text in
place
while
pasting a
copy
elsewhere D
None of
the above B
Find and
Replace B
Paste
Replace
Select all
AutoCorre
ct
B
Copy,
Cut, then
then paste paste
Delete,
Insert,
then paste then paste A
To give
the
original
author a
chance to
accept
suggested
changes
from the
person
who
entered
the
revisions
To
complicat
e the
revision
process
and to
force the
author to
spend
more time
making
correction
s
To allow
multiple
people to
work on
one
document
in
collaborati
on with
one
another
C
A vertical
line
outside
the left
margin
A red
signifies a
A line
underline change
appears appears has been
through
beneath made at
text that is text that is that point
to be
to be
in the
deleted.
added.
document.
Through Through
the Edit
the Tools
menu by menu by Through
choosing choosing tools on
Track
Track
the
Changes Changes Reviewing
command command toolbar
Comment
s are
enclosed
in a text
box at the
right of
the
document. D
Both
through
the Tools
menu and
the
Reviewing
toolbar
D
To give
the
original
author a
chance to
reject
suggested
changes
from the
person
who
entered
the
revisions
The
Versions
command
will allow
you to
save
multiple
versions
of a
document,
including
any
changes
that may
have been
made to
that
document.
The
Versions
command
will allow
you to
save only
one
version of
a
document,
including
any
changes
that may
have been
made to
that
document.
The
Versions
command
will allow
you to
save only
one
version of
a
document
without
any
changes
that were
just made
to the
document.
The first
and
All
second
versions The latest versions
are
version is are
opened
opened
opened
automatic automatic automatic
ally.
ally.
ally.
Grammar Spell
Dictionary check
check
Word will
Word
The most show the
displays a recent
name of
list of the version
the
dates and will
person
times
appear at who
each file the
saved
was
bottom of each
saved.
the list.
version.
Fields
Check
boxes
Tools
Toggle
button
Forms
The
Versions
command
will allow
you to
save only
two
versions
of a
document:
one
version of
the
original
and one
version of
any
changes
made to
the
document. A
The
previous
version is
opened
automatic
ally.
B
Thesauru
s
A
Word is
not able to
tell the
most
recent
version of
a
document. A
Insert
A dropText fields down list
C
B
Comment
s can be
edited or
deleted by
right
Comment clicking
Comment s cannot the
s cannot be
highlighte
be edited. deleted.
d text.
Text
Text at
Numbers which
the
which
appear at
bottom of appear on the top of
every
every
every
page
page
page
Comment
s can be
edited or
deleted by
left
clicking
the
highlighte
d text.
C
Fault
Finding
Insert
Debuggin
g
D
Edit
C
None of
the above C
Insert
Press
Copy and page
Press tab. Return.
paste.
break.
D
text.
graphics. forms.
numbers. C
header/fo bibliograp find/searc
oter.
hy.
h.
macro.
A
This
Format
action is
Copy
Paste
Painter
not
button
button
button
possible. C
Bug
Squashing
Tools
a section
of text
where the
first letter
of each
sentence
a section is
of white
lowercase
text on a and the
black
rest are
backgroun uppercase
d.
.
setting it
in larger typing it all
type or
in capital
font size. letters.
Error
Injecting
Format
the
guidelines
used to
establish
where
different
elements
of the
newsletter
will go.
underlinin
g the text
of the pull
quote.
an
enlarged
capital
letter at
the
beginning
of a
paragraph
.
A
changing
the color. A
The
The width height of
of each
each
column
column
6
10
The
number of
columns
12
A grid is a
set of
horizontal
and
vertical
lines that
determine
the
placement
of
elements
in a
newsletter
or other
document. D
The tab
spacing
within
each
column
D
72
D
One
Three
Four
A dropped
cap is a
word that
The
A pull
starts with
reverse
quote is a a
technique quotation lowercase
means to taken
letter
add dark from
when it
text on a (pulled)
should
light
from
have a
backgroun another
capital
d.
document. letter.
Two
Press
Press
Ctrl+Shift+
Ctrl+Enter Enter to
to create create a
a page
column
break.
break.
A sans
A serif
serif font
font at 10 at 10
points
points
Press
Enter to
create a
section
break.
Press
Shift+Ente
r to force
a line
break.
C
A sans
A serif
serif font
font at 20 at 45
points
points
D
2 inches
3 inches 4 inches
Field
Record
Both
Horizontal Vertical
A or B
Duplicate Combined
Value
Value
Gaps
It depends
on the left
and right
margins,
and how
many
columns
are
specified.
None of
the above
None of
the Above
All of the
above
D
A
A
C
Cross
Tabulate
RAND()
None of
Filter
Merge
the above A
VLOOKU HLOOKU None of
P()
P()
the above B
TRUE
TRUE
FALSE
FALSE
A
A
None of
Unusual Strange
A or B
the above C
exception compariso duplicates All of the
testing
n of data testing
above
D
True
False
True
False
Both B &
Limit
Sequence Range
C
related to
none of
virtual
a form of a form of the
reality
ROM
VRAM
previous
same as same as
multitaski multiprogr
ng
amming multiuser
involves
using
more than
one
processor
at the
same time D
use a
virus
protection
program B
save the
file
make a
set up a
backup
password copy
to
calculate
numbers
to read
from or
write
informatio to print
n to a
sheets of
floppy disk paper
Uses
Cobol
106 sec
uses
Java
103 sec
D
D
a keypad
a mouse
to display
informatio
n or
pictures
on a
screen
none of
the
uses C++ previous.
1012 sec 109 sec
a
message
a frog
pad
data to be
transferre
d to
memory
data that
has been the
transferre address of
d from
a memory
memory location
data to be
transferre
d to or
from
memory
the
address of
a memory
location
data to be
transferre
d to the
stack
an
instruction
an
that has
instruction been
that has
fetched
been
from
decoded memory
a scroll
a cursor bar
Formula
an
instruction
that has
been
transferre
d from
memory. C
an
instruction
that has
been
transferre
d from
memory A
the
address of
the next
instruction
to be
executed D
a magic
a light pen marker
A
an
instruction
that has
been
executed
Algorithm Program
Artificial
Assemble
Intelligenc
r
Compiler e
Memory Parity
Range
protection Checking checking
use the
directory search
use the
search
each file backup
tools
in turn
facility
Network Program System
save
copies of
the file
with the
use
same
different keep a
name on filenames record of
the
on the
computer
system
system
failures
Multiproce Time
Multiprogr
ssing
sharing
amming
Floppy
ROM
RAM
Disk
Data
Parity
Checker
Validation B
use find
and
replace
Modem
A
B
backup to
a secure
medium
D
Multiplexin
g
D
Magnetic
Disk
B
Word
Telephon Sharewar
Firmware Processor e modem e
C
Word
Telephon Sharewar
Firmware Processor e modem e
A
Sequential Hashed
Operating
System
ALU
Tracks
and
Sectors
Blocks
and
Sectors
Indexed
CPU
Files and
Tracks
Random C
Primary
Storage
B
Schema
and
subschem
a
A
Element,
field, file
Valid
character
check
Sound
card.
Maintenan
ce
diagnostic Systems
program logs
MIDI
CD-ROM interface
Parity
check
Serial
interface
Text
Pictures
Sound
Video
Laser
Drum
C
A
viewing an
encyclopa
edia CDROM.
creating
the plans
for a
building
design.
replaced
regularly
never
updated
recording
current
presenting stock in a
an order supermar
for stock ket and
to a
answering
warehous customer
e.
queries.
A
updated
updated once a
regularly year
C
Document
processor
make
efficient
use of
time
1024
Graphics
package
retain
confidenti
ality of
files
4096
Database
get into
the
system
quickly
512
loss of
confidenti
ality
TCP/IP
duplicatio virus
n of data infection
HTML
IPX/SPX
Spreadsh
eet
D
simplify
file
structures C
8192
C
loss of
data
NetBEUI
D
A
printer
can do
1000s of
pages a
day
the
operating
system is
easy to
use
B
the hard
drive
up-line
universal provider
port serial service
the root
directory
uninterrup
table
power
supply
uniform
page
source
the
program
executabl
orphan
e may not
files can allow it to
be left on be
the
uninstalle
system
d
the
system
requires a
network
administra
tor to
uninstall it
access to
the
internet is files can
quicker
be shared
a
a file
subdirecto
name
ry
data.
Graphical
represent
ation of
logic
Purchase,
sales,
receipt,
payments
etc.
document informatio
s.
n.
text.
Rules
writte in
procedura
l language
Logical
Steps in
any
None of
language the above A
To fill the
log
register
It is
mandatory None of
in tally
the bove
assist in
maintenan speed up
ce
access
IT
senior
managem
executive ent lacks
support
leadership
for IT.
.
input.
the
system
always
requires a
re-boot
and
defrag
afterwards A
output.
prevent
unauthoris allow
ed access encryption C
IT
understan
ds the
business
processin
g.
None of
the above B
All of the
above
D
The use
of
computers
to design
state-ofthe-art,
highquality
products.
specialist
or
functional
Software
that
generates
Using
innovated
computers designs
to do
and
architectur artistic
None of
e.
patterns. the above A
Applicatio
n Service
Provider enterprise local
B
ensure
the
identify
name the filename identify
the file
file
is not lost the file
type
D
All of the
above are
preventive detective corrective parts of IS
controls. controls. controls. controls.
external
static
dynamic extensible
hashing
hashing
hashing
hashing
A: (a) ,
B: (a) to
C: (a), (b), D: (b), (c),
(b), (d)
(d)
(c)
(d)
corrective preventive detective general
controls
controls
controls
controls
Compone
nt
Interface Settings
(a), (c),
(b), (c),
(d)
(d)
(a) to (d)
Turn the
computer
Press the off at the
reset
power
button.
point.
Create the
files
again.
(a), (c),
(d)
detective
controls
(a), (c),
(d)
Ask the
person
next to
you.
(a), (b),
(c)
organisati
onal
controls
(a), (b),
(c)
Select the
Shut
Down
option
from a
menu.
Use the
Find or
Search
feature.
(a) to (d)
Control
(a), (b),
(c)
D
A
C
C
B
C
Pull the
power
cord from
the back
of the
computer. C
Put your
hand up
and ask
the
teacher
C
(b), (c),
(d)
C
preventive corrective
controls
controls
C
(b), (c),
(a) to (d) (d)
C
program
change
call lights requests
data
thread
testing
testing
(a), (b),
(a), (b),
(d)
(c)
specificati
benchmar ons
parallel
k testing matching operations
resolution
procedure
s
C
loop
testing
A
Peripheral
Multiplexe processor Concentra
r.
s.
tor.
(b), (c),
(a), (b),
(a) to (d) (d)
(c)
Replacem
ent
personal Identificati
computers on of
Physical
for user
critical
security of
departme applicatio warehous
nts.
ns.
e facilities.
architectur interface procedura
al design design
l design
ClientComputer
server
Client
network
Star
Bus
Mesh
Job
control
language. D
(a), (c),
(d)
A
problem
logging
unit
testing
(b), (c),
(d)
(a) to (d) D
system
walkthrou
ghs
B
Crosstraining of
operating
personnel. B
data
design
A
Star
Bus
Ring
Hub
Ring
All of the
above
To
maintain a
backup
copy of
are written
all the
informatio
n
To do a
particular
job such
as editing,
storing
informatio
n
To help
someone
who is
applying
for
employme
nt
To Store
data in an
organised
manner
B
Direct
Systems
analysis
and
applicatio
ns
programm
ing.
A
sequential
file on a
disk
Sequential Binary
Data
communic
ations
hardware
and
software.
A
sequential
file on a
tape
Indexed
C
A
D
Operating
systems Computer
and
operations
compilers. .
C
A direct
A direct
access file access file
on a disk on a tape C
Tapes can
only be
Informatio
read by
n formats
the
commonly
machine
vary
on which Parity
between
they are errors will architectur
written
result
es
Address
Data path Control
calculation
part
Unit
part
Local
Distribute Area
Wide area
d systems network
network
Can send
data to a
computer
and
receive
data from
a
computer
Mixer
Allows
computer
signals to
be send
over a
telephone
line
Planetary
network
Office
Automatio
n
Data
record
can never
be
blocked
together C
Input
output
channel
A
Protocol
Use the
computer
to which
they are
connected
to perform
all
processin
g
operations
Generally
require a
keyboard
for data
entry and
a CRT for
display
Modem
Multiplexo
r
Are
required
with a
microproc
essor
which
permits
some data
processin
g such as
input
validation D
Time
sharing
computer C
Aids in
back-up
procedure
s
Ring
Network
Packs
data in a
disk file
Loop
Network
Speeds
up online
printing
Star
Network
Executor
systems
An
A dumb
intelligent
workstatio workstatio
n
n
Time of
day
control
Encryption
locks
algorithms
A
D
Electronic Instant
mailing
post-office C
A
A
personal mainfram
computer e PC
B
Parity
checks
All of
them
Type of
cable
Terminal
Standard
A
compiler
converts
the whole
A
of a
compiler higher
does a
level
conversio program
n line by code into
line as the machine
program code in
is run
one step
Feasibility
study,
system
design,
and
testing
CRC
Implement
ation and
document
ation
Baudot
An
interpreter
does the
conversio
n line by
line as the
program
is run
An
interpreter
is a
represent
ation of
the
system
being
designed
Modem
Demodula
tor
Device
Communi interconne
cation
ct
protocol
standard D
A
compiler
is a
general
purpose
language
providing
very
efficient
None of
execution the above B
Lexical
analysis,
CONVER
SION, and
code
generation
ASCII
An
interpreter
is a
general
purpose
language
providing
very
efficient
execution
Frequency
division
multiplexo
r
None of
the above D
EBCDIC A
None of
the above A
Time
Division
Multiplexo
r
C
MiddleHigh-level level
Low-level None of
languages languages languages the above C
It is faster
than
It is less
parallel
It is less prone to
communic error
attenuatio Uses only
ation
prone
n
one path D
Accountin
Financial Graphic
g
sector and design
systems,
engineerin and
commerci None of
g
education al sector the above C
Manage
Communi the paging
cate with function in
the
a virtual
console
environme
operator nt
Specificati
on and
System
design
Analysis
Fiber
Coaxial
Optics
Cable
Relieve
the main
CPU of
repetitive
communic
ation
tasks
Testing
Common
carrier
System
The
System
Analysis
design of Analysis involves
the screen defines
creating a
the user the format formal
will see
and type model of
and use to of data
the
enter or
the
problem
display
program to be
data
will use
solved
An
A cache interface A buffer
The
different
types of
network to
be used
Star
Testing to
check for
errors
before the
system is
introduced
Packet
Reduce
competitio
n between
the
input/outp
ut devices C
None of
the above B
Telephon
e Lines
C
None of
the above C
An online
protocol
B
Hardware,
Software
and size
of
None of
program. the above
Ring
Bus
None of
10101010 1100101 1010101 the above
Cyclic
Retransmi Redundan Hash
Parity
ssion
cy
Count
None of
15
4
64
the above
Multiplexo Acoustic
Port
Modem
r
coupler
None of
327
141
97
the above
Data
Data
Data
managem
warehous Mining
ent
All of
e
tools
systems them
secondary
memory secondary storage
memory access
storage
access
capacity time
capacity time
B
B
C
A
A
C
B
5C4
16 bits
None of
the above
alphanum
eric form
None of
the above
32 bits
Bit Code
Design
None of
the above D
210 bits
210 bytes
None of
the above
alphanum
eric form
None of
the above
30
binary
form
255
256
ASCII
decimal
code form form
4C5
4 bits
Basic
Coding
Descriptio
n
1B7
8 bits
1024 bits
10000
binary
form
Binary
Coded
Decimal
1000
bytes
1112
1110
ASCII
decimal
code form form
Numeric
Keyboard Keypad
Mouse
used to
indicate
used to
uppercase detect
letters
errors
Because it
squeaks
when
moved
bits per
second
Touch
screen
BPS
Printing
letters
OCR
Touch
screen
increased
the
storage
capacity
of a
computer
system
B
A
A
B
A
A
A
A
Its moves
like a
None of
mouse
It has ears the above D
baud
bytes
Hertz
None of
Light pen Joystick
the above
MIPS
MHz
VLSI
Tracing
Reading None of
diagrams bar codes the above
voice
barcode recognitio
MICR
scanning n
CD-ROM None of
Hard disk drive
the above
provides
backup
increases power in
the
the event
process
of a power
speed
cut
Light
Refillable Pencil
sensitive
ink
lead
elements
100K
1.44 Mb 5 Mb
none of
the
previous
D
C
B
B
B
A
None of
the above C
1 Gb
B
hardware software
input
Mouse
Touch
screen
Printer
Printing
letters
Touch
screen
Mouse
Credit
card
output
Numeric
Keyboard Keypad
Light pen Joystick
Reading
Tracing
Bar
Diagrams Codes
Scanner C
Digital
Signature
s
B
CD ROM
Hard disk Keyboard Drive
A
Optical
Bar code mark
reader
reader
Keyboard B
Mouse
Writing on
a hard
Printed
board
output
Coloured
spots
Pixels
Storage
Printer
device
Speakers
Storing
informatio
n on the
hard disk
Printer
Pickers
Mouse
Bar code
reader
Pixies
Pointing
device
Optical
mark
reader
CRT
displays
LCD
displays
SSGA
displays
screen
layout
mouse
button
layout
Mouse
Bar code
reader
keyboard
layout
Optical
mark
reader
language software
hardware interpreter interface
Credit
Smart
card
Speakers card
Back-up
on a
Cartridge B
B
CD-ROM A
None of
the above
none of
the
previous B
word
processin
g software C
None of
the above B
an
operating
system
C
None of
the above A
having
several
programs
writing
in RAM at
programs none of
the same multitaski in multiple the
time
ng
languages previous
having
several
programs
in RAM at
the same
time
The ability
to run 2 or
more
programs
concurren
tly
writing
programs none of
in multiple the
languages previous
To run
more than
one
an
program
multitaski operating at the
none of
ng
system
same time the above C
First generation
computers
.
Fifth generation
computers
.
A
none of
multitaski multiprogr
the
ng
amming Multi-user previous A
Vishwajee
t
Deep Blue Param
Arjun
C
is due to none of
is caused caused by bad disk the
by wear
overuse
blocks
previous C
Magnetic
Ink
Optical
Character
Bar code Mark
Recognitio Image
Reader
Reader
n
Scanning
Technolog Technolog Technolog Technolog
y
y
y
y
B
a fast
interpreter
Drum
Printer
encrypting
it
Very
important
reader
user
sequence
Second generation
computers
.
Third generation
computers
.
converts a
program
slower
to
none of
than an
machine the
interpreter code
previous
Dot Matrix
Desk - jet Thermal
Printer
Printer
Printer
decrypting compressi transmittin
it
ng it
g it
Vital
informatio Virtual
n
informatio
resource n reader &
under
user
None of
siege
system
above
A
C
Electricall
y charged
ink
mainfram
e
technolog
y
10-6 sec
Thermal
Paper
An ink
pen
LAN
technolog
y
10-3 sec
WAN
technolog
y
10-12 sec
An inked
ribbon and
print head D
Unix
operating
system
10-9 sec
Cross
Limit
Control
External footing
checks
figures
file labels tests
applicatio
operating communic
n
system
system
ation
pilot
project
model
project
process
multiproce multithrea multiplexi multitaski
ssing
ding
ng
ng
mainfram super
es
computers
arithmetic
control
and logic
unit
unit
micro
computers
central
processin
g unit
non
band
drum
impact
printer
printer
printer
data
word
electronic
managem processin spreadshe
ent
g
et
communic
integrated ation
idea
software software processor
my
recycle
Microsoft
computer bin
exchange
D
D
D
none of
the above B
none of
the above C
none of
the above B
hp vectra
PC-at
system
multiproce multithrea
ssing
ding
"dumb
dumb
terminals" servers
dummy
terminals
file
machine
language
processed
symbol
none of
the above A
none of
the above
none of
the above
none of
record
the above
high level none of
language the above
connector input/outp
symbol
ut symbol
fazitsu
vp200
series
IBM-PC
multiplexi none of
ng
the above
field
assembly
language
terminator
symbol
B
D
dummy
servers
B
B
C
B
B
B
D
wan
host
host
distributed
computing
system
server
server
PC
server
processin
g
four
file
managem
ent
system
multiproce
ssing
LAN
host
processin
g
one
hierarchic
al
database
system
multithrea
ding
windows
NT
back end
back end
LAN
front end
front end
distributed
computing
dumb
processin
g
two
centralize
d
A
data
processin
g
B
many
A
network
database
system
multiplexi
ng
disk
defragme
ntation
relational
database
system
D
none of
the above B
redo
disk
logging
mirroring
Modulatio
Code/De- n/Demodu Module/D None of
code
lation
e-module the above
constraint
fixes
locks
s
traps
multiproce multithrea multiplexi none of
ssing
ding
ng
the above
Linear
Local
area
Local area array of
None of
networks networks networks. the above
clienttask
process
thread
server
Integrated Integrated Integrated
system
Symbolic Services
dynamic Digital
Digital
None of
networks. networks. network. the above.
repairing
D
D
C
B
B
B
B
C
Ethernet
visual
basic
Internet
power
builder
ARPANE
T
SQL *
plus
None of
the above. B
all of the
above
D
MAN
WAN
GAN
None of
the above. B
Transfer
control
protocol/In
ternet
protocol
Transfer
communic
ation
protocol/In
ternet
protocol
Cells
Bits
Software
System
Mail
modulatio transmissi
n transfer on
protocol
protocol
Transmiss
Transfer ion
Protocol protocol
Transmiss
ion control
protocol/In
ternet
None of
protocol
the above. C
Packets
None of
the above. C
Simple
Mail
transfer
protocol
None of
the above. C
None of
Hyper text the above. C
Asynchron
Aggregate ous
Area
transfer
transfer
transfer
mode
mode
mode
None of
the above. B
Printer
File server server
Receiver
configurati
platform on
package
None of
the above. B
MAN and
WAN
ISDN
Internal
Services
Digital
Network
LAN and
MAN
Internet
Integrated
Services
Digital
Network
LAN WAN
and MAN B
Intranet
A
Routers
batch
Protocol
command
numerous
alpha beta alpha
Repeaters B
program D
number
and alpha A
cost,
performan size,
ce their
performan
ratio
ce, cost
input,
output,
performan
ce ratios C
Web
based
Training
Bridges
procedure
alpha
numeric
space
occupied,
price, no.
of users
allowed
LAN and
WAN
ATM
Internal
Services
Design
Network
Web
based
Technolog
y
system
None of
the above. C
Web
Web
based
based
Transactio
Transport n
A
mini
microproc
computers essors
PCs
mainfram
es
D
input
output
feed
write
A
multiproce multithrea multiplexi multitaski
ssing
ding
ng
ng
D
interpreter compiler converter process
input
processor ram
output
nonimpact
impact
drum
desktop
thermal
printers
printers
printers
printers
operating
system,
bootstrap,
kernel,
shell
control
program,
interpreter
,
assembler
, compiler
monitor,
program,
keyboard,
bus
CPU,
memory,
input,
output
D
D
protocols
processor compiler
compiler
interpreter B
procedure
software's s
C
assembler coder
Q_desc
AC64
In an accounting information system, which of the following types of computer files most likely
would be a master file?
AC65
BC 113
BC 114
A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The
following is an information not found in the trailer label
BC 114
BC 115
BC 116
BC 116
What control would prevent the accidental erasure of customer information from a magnetic tape
What are the individual dots which make up a picture on the monitor screen called?
BC 117
BC 117
BC 118
BC 118
BC 119
BC 119
BC 12
BC 120
BC 120
BC 121
BC 122
The amount of data that a disk may contain is known as the disks...?
BC 123
BC 124
BC 125
BC 126
BC 128
BC 129
BC 13
BC 130
BC 133
BC 134
BC 135
BC 136
BC 137
BC 138
The contents of these chips are lost when the computer is switched off?
What are responsible for storing permanent data and instructions?
Which parts of the computer perform arithmetic calculations?
What are small high speed memory units used for storing temporary results?
How many bits of information can each memory cell in a computer chip hold?
What type of computer chips are said to be volatile?
BC 14
BC 14
BC 140
BC 141
BC 142
BC 143
BC 144
BC 145
BC 146
BC 147
BC 148
BC 149
BC 15
BC 15
BC 151
BC 152
BC 153
BC 154
BC 16
BC 16
BC 17
BC 17
BC 170
BC 18
BC 183
BC 184
BC 185
BC 186
BC 187
A gigabyte represents
BC 188
BC 189
BC 19
BC 190
A parity bit is
he contents of these chips are lost when the computer is switched off?
Clock speed is measured in
BC 191
BC 192
BC 20
CISC machines
Which parts of the computer perform arithmetic calculations?
BC 200
BC 201
An RS-232 interface is
BC 202
BC 203
ROM
BC 204
A UPS
BC 206
smart card
BC 207
BC 208
Multiprogramming refers to
BC 209
BC 21
BC 21
Multitasking refers to
What are small high speed memory units used for storing temporary results?
A good way to exchange information that changes rapidly is through
BC 210
BC 211
BC 212
Virtual memory is
BC 213
Multiprocessing is
BC 22
BC 22
BC 228
BC 229
A 4GL is
A nanosecond is
BC 23
What small, hand-held device is used to move the cursor to a specific location on the screen?
BC 230
BC 231
BC 232
BC 24
BC 26
A mathematical procedure that can be explicitly coded in a set of computer language instructions
that manipulate data.
Which of the following translates a program written in high-level language into machine language
for execution?
BC 27
BC 28
BC 28
To find where a file has been saved on disk, the user should
A series of instructions telling the computer how to process data or files is defined as a
BC 29
To ensure that data is not lost if a computer system fails, the user should
BC 29
Having a single CPU alternatively process tasks entered from multiple terminals is called
The place in the CPU where the data and programs are temporarily stored during processing is
called the
BC 25
BC 30
BC 31
BC 32
BC 32
BC 33
The part of the computer system controlling data manipulation is called the
BC 34
For direct access storage devices the recording area is divided into
BC 35
BC 36
Which of the following hardware or software system controls provides a detailed record of all
activities performed by a computer system
BC 37
BC 37
BC 38
Which one of the following parts of a computer is necessary to enable it to play music?
An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15
minutes of sound and 1 minute of video. Which of the four different media listed takes up most
space on the CD-ROM?
Which one of the following printers is suitable for printing sprocket fed carbon copies?
BC 38
BC 39
BC 40
BC 41
BC 42
BC 43
BC 44
BC 45
BC 46
BC 47
BC 48
BC 48
You are conducting research for a Income Tax assignment. The raw facts you collect are called
BC 484
BC 485
BC 49
BC 491
BC 492
BC 494
BC 499
BC 50
BC 506
BC 51
BC 52
BC 53
BC 53
Black box testing and white box testing are part of:
What is the term used to describe the point of interaction between a computer and any other
entity, such as a printer or human operator?
BC 54
BC 54
BC 555
Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best way to locate the files?
Components of an information system model are: a) applications architecture; b) functional
architecture; c) technology architecture; d) information architecture
BC 56
BC 57
Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run totals
BC 58
BC 59
BC 55
BC 60
BC 60
BC 60
BC 61
BC 61
Which of the following procedures should be included in the disaster recovery plan for an
Information Technology department?
BC 62
BC 63
BC 64
BC 65
BC 66
BC 67
BC 67
Which of the following areas of responsibility are normally assigned to a systems programmer in
a computer system environment?
BC 68
Which of the following is recommended when many searches for data are required
BC 69
It is unlikely that a magnetic tape containing several thousand blocked records can be used on
two machines of different architecture directly because
BC 70
BC 71
BC 72
BC 73
BC 74
BC 75
BC 76
Which component of the CPU has the most influence on its cost versus performance
Which of the following terms applies to network used to connect computers with other
computers, peripherals and workstations that are in fairly close proximity
BC 77
A computer based system for sending, forwarding, receiving and storing messages is called an
If a workstation contains a processor, monitor, screen manipulation device, printer, storage and
communication capabilities, it is said to be
BC 78
BC 79
RS-232 is a
BC 79
What is a compiler?
BC 80
BC 80
BC 81
BC 81
A device used in data communications to divide a transmission signal into several sub-bands is
known as a
BC 82
BC 82
BC 83
BC 83
BC 84
BC 84
Which of the following is not used for data transmission within a local area network
BC 85
BC 85
BC 86
BC 86
BC 87
BC 87
BC 88
BC 88
Which of the following devices merges communication signals onto a single line
BC 89
BC 89
Which tool is used to help an organization build and use business intelligence?
BC 9
BC 90
BC 90
BC 91
BC 91
BC 92
BC 92
BC 93
BC 93
BC 94
BC 94
A parity bit is
BC 95
BC 95
BC 96
BC 96
What are you most likely to use when playing a computer game?
CPU performance may be measured in
BC 97
BC 97
In processing cheques which of the following I/O techniques have banks traditionally used
BC 98
BC 98
A UPS
BC 99
BC 99
BC01
BC02
BC03
BC04
BC05
BC06
BC07
BC08
BC09
BC10
BC100
BC100
BC101
BC101
What input device could tell you the price of a bar of chocolate?
BC102
A GUI is
BC102
BC103
Multiprogramming refers to
BC104
Multitasking refers to
BC105
BC105
BC106
BC106
BC107
Disk fragmentation
BC107
The technology which is used to check answer sheets of multiple-choice questions in civil
services or similar examinations is: -
BC108
A compiler is
BC108
BC109
BC109
BC11
BC110
BC111
BC112
BC113
BC115
BS 319
CA 486
CA 487
CA 488
CA 489
CA 490
DB 01
DB 02
DB 03
What is a database?
DB 04
DB 05
An RDBMS is a
DB 06
DB 07
DB 10
What is a database?
DB 11
DB 12
What is a report?
DB 13
DB 18
DB 19
Which of the following constraints can be used to enforce the uniqueness of rows in a table?
DB 20
DB 226
An RDBMS is a
DB 227
DB 235
DB 24
DB 26
DB 27
DB 30
DB 365
This database holds personal information. The user can help to keep it confidential by
If the database holds customer names and addresses, personalised letters can be created
automatically using
Application software suited to storing the survey information obtained in the table would be
The characters * and ? are sometimes used in search criteria as
Which of the following field types will generate the primary key automatically?
DB 366
DB 367
DB 368
DB 370
DB 371
Which of the following ensures that records in related tables are consistent with one another?
For example, it ensures that you cannot add a record with an invalid foreign key.
DB 372
How would you delete a relationship between tables in the Relationships window?
DB 369
DB 373
In a Customers tables, what does a plus sign next to the CustomerID field mean?
DB 374
DB 375
Assume a one-to-many relationship between the Customers table and the Loans table, with
referential integrity in effect. What happens when you attempt to delete a customer ID from the
Customer table that still has entries in the Loans table?
DB 376
Which of the following is true when viewing a main form and its associated subform in the Form
Design view?
DB 378
Which of the following relationships does not belong in a database based on a professional
sports league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the many side of a
one-to-many relationship?
DB 379
You have created a one-to-many relationship with referential integrity between a Customers table
and a Loans table. From which table can you delete a record?
DB 380
The correct order of the arguments for the MsgBox statement is:
DB 381
DB 377
DB 393
DB 394
A text field:
DB 401
DB 402
DB 403
DB 404
DB 405
DB 407
The industry standard supported by all major DBMSs that allows tables to be joined together is
called __________.
DB 408
DB 409
A program whose job is to create, process and administer databases is called the _____
Microsoft Access may use which of the following DBMS engines?
DB 410
DB 411
DB 412
DB 413
DB 414
DB 415
DB 416
DB 417
A database designed using spreadsheets from the Sales department is a database being
designed _________________________ .
DB 418
A database designed to implement requirements for a reporting application needed by the Sales
department is a database being designed _______ .
DB 419
A database designed to combine two databases used by the Sales department is a database
being designed _________________________ .
DB 420
Database professionals use ________________ as specific data sources for studies and
analyses.
DB 421
Database professionals use a set of principles called ________________ to guide and assess
database design.
DB 422
A very popular development technique used by database professionals for database design is
known as _______________________ .
DB 423
DB 424
DB 425
DB 426
DB 427
In a relation __________________________ .
An attribute is also known as a(n)
.
A combination of one or more columns used to identify particular rows in a is___ .
DB 428
DB 429
DB 430
A combination of two or more columns used to identify particular rows in a relation is________ .
A determinant that determines all the other columns in a relation is______ .
When designing a database, one of the candidate keys in a relation is selected as the
_________ .
DB 431
Normalization is a process used to deal with which of the following modification anomalies?
DB 432
When you are given a set of tables and asked to create a database to store their data, the first
step is to ____ .
DB 433
DB 434
DB 436
DB 437
DB 463
DB 464
DB 465
You are developing an Access application that you expect to upgrade periodically. Which of the
following statements is TRUE?
DB 435
DB 466
DB 467
DB 469
DB 470
What is the Access tool that is used to create the user interface?
DB 503
DS 279
DS 59
Which of the following activities would most likely detect computer-related fraud?
DS 62
DS 63
DS 66
Which of the following risks can be minimized by requiring all employees accessing the
information system to use passwords?
EC 103
EC 301
What is the term that describes spying on ones business rivals to gain a competitive advantage?
EC 302
EC 406
EC 51
EC 58
Which of the following statements is correct concerning the security of messages in an electronic
data interchange (EDI) system?
EX 10
EX 11
EX 12
EX 13
EX 14
EX 15
EX 2
EX 3
EX 320
EX 321
If you press _____, the cell accepts your typing as its contents.
The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as
All of the following are considered constants EXCEPT:
EX 322
EX 323
EX 324
EX 325
EX 326
How can you tell which cell in a worksheet is the active cell?
EX 1
EX 327
EX 328
Which of the following would you use to change the font size of a cell in Excel?
EX 330
EX 331
EX 332
The command that will save the current workbook with a different file type is:
The command that will print an Excel workbook is found on the ____________ menu.
In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the
date and time a file was last modified.
EX 333
Which of the following commands will automatically adjust cell references in formulas?
EX 334
Which of the following commands will remove cells, rows, or columns from a worksheet?
EX 335
EX 336
EX 337
EX 338
Which of the following options is NOT controlled through the Page Setup command?
Which command enables you to change the margins for a printed worksheet?
All commands are carried out on a rectangular groups of cells known as a:
Which of the following is a valid cell range?
EX 339
In a copy operation, the cell(s) you are copying from is called the:
EX 340
EX 341
EX 342
EX 343
EX 345
Which of the following commands is needed to duplicate the contents of a cell in another?
A cell reference that does not change during a copy operation is known as
Which of the following is considered an absolute cell reference?
Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4,
what will be the contents of cell E4?
Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to
cell E4, what will be the contents of cell E4?
EX 346
Which of the following commands is needed to transfer the contents of one cell range to
another?
EX 347
EX 344
EX 352
Which of the following quickly copies the formatting of a selected cell to other cells?
EX 353
EX 354
EX 358
If you enter a date into a cell, Excel stores the date as:
EX 361
You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened
that worksheet again on August 31. What will be displayed in cell E17 on August 31?
EX 362
EX 363
The number of days between two cells containing dates can be calculated by:
The function key that is used to quickly edit the contents of a cell is:
EX 364
EX 384
EX 4
EX 42
EX 43
EX 462
EX 5
EX 57
Your Institute teachers have set an assignment on Studies. You are required to use a
spreadsheet to record all that you study on each day for four weeks. You decide to show each
weeks data with an accompanying graph. What is the best way of doing this
What would be the best method to quickly copy the formula from the active cell to each cell
below it?
EX 6
To arrange rows in alphabetical order based on column A, you need to use the command _____.
EX 6
EX 7
To print just part of a sheet, you would select what you want to print and _____ .
EX 7
EX 8
EX 8
EX 9
EX9.
IN 01
IN 05
IN 06
IN 07
IN 08
A set of rules and formats, semantic and syntactic, that permits entities to exchange information.
IN 09
IN 10
IN 104
IN 11
Malicious software.
EX 52
IN 02
IN 03
IN 04
IN 110
IN 111
IN 112
IN 12
IN 13
A sequence of bits or characters that identifies the destination and the source of a transmission.
The means of communicating between networks
IN 14
A group of computers and other devices dispersed over a relatively limited area and connected
by communication links that enable a device to interact with any other on the network.
IN 15
IN 155
A NIC is considered as
IN 156
IN 157
IN 158
IN 159
IN 16
IN 160
IN 161
IN 162
When creating a network from just two PCs, what kind of cable would be used to connect them?
IN 163
An IP address is a
IN 164
To construct a simple LAN of 4 computers, you would connect them with ______connect them
IN 165
IN 166
Bluetooth is
IN 167
IN 168
IN 169
A MAC address is of
IN 17
Protocol is
IN 172
A ............... is a LAN-based computer with software that acts as a controlling device for
controlling access to at least part, if not all, of a local area network and its available resources.
IN 173
IN 174
IN 175
IN 176
IN 177
IN 178
IN 179
IN 18
IN 180
IN 181
IN 182
IN 194
IN 195
What are the most common LAN technologies used in networking today?
Modem speeds are measured in
LAN speeds are measured in
IN 196
IN 197
IN 198
IN 20
The worldwide web server uses the following standard interface to act as the middleware:
IN 205
An NIC
IN 21
IN 214
IN 218
IN 22
IN 220
A multiplexer is a form of
IN 221
An ISP
IN 222
FTP is
IN 223
Telnet
IN 224
A firewall is
IN 225
A proxy server is
IN 23
IN 23
A search engine is
To look for information about interest areas on the internet, the user should use a
IN 24
An ISP
IN 25
FTP is
IN 26
Telnet
IN 267
Which of the following is a true statement about the OSI model layers?
IN 268
IN 269
IN 27
A firewall is
IN 270
IN 272
IN 273
Which of the following is NOT an example of a DoS attack that is popular among hackers?
A ____________ attack is when a hacker sends a continuous flow of packets to a system.
One defense option on a large network is to configure a ____________ to disallow any external
traffic.
IN 28
A proxy server is
IN 285
Which of the following would be performed on a network server and not normally on individual
workstations?
IN 288
IN 29
IN 290
IN 297
IN 298
IN 30
Which of the following is NOT a means of monitoring employee use of company technology?
____________ would be used by parents to monitor their children on their home system.
The formal rules and parameters which are established to permit a microcomputer to
communicate with the mainframe computer as though it was a terminal of the mainframe are
called
IN 304
The two most common tools used to help with extracting information are:
IN 306
IN 307
IN 308
Which of the following is a likely target of a cyber terrorist that would cause considerable loss of
life?
IN 31
An organisation is upgrading its telecommunication lines. Which is the least important objective
while upgradation
IN 31
A company posts a price list of its products on its website. The advantage to the customer is that
the company can
IN 310
IN 312
IN 313
IN 314
IN 315
The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain
sensitive information is called _________________.
IN 316
IN 317
Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called:
Setting your privacy settings in Internet Explorer to medium is one way to block:
IN 318
IN 32
IN 33
IN 33
IN 34
IN 348
IN 349
IN 35
Domain names must contain a description of the type of organisation that the domain represents.
A very common abbreviation used include:
IN 350
IN 351
IN 359
IN 36
Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his
computer how would he do this?
IN 360
IN 45
IN 47
IN 49
While researching the Direct taxes assignment, you find a useful website. What is the most
efficient way to access the site at a later time?
IN 493
IN 50
IN 501
A system that uses the Internet for business-to-business interaction is called a(n):
A block of text automatically added to the end of an outgoing email is called
_________ refers to the use of Internet technologies for placing telephone calls.
IN 68
IN 69
IN 70
IN 71
IN 72.
IN 73.
IN 74.
IN 75.
IN 76
IN 77
IN 78
OS 01
Which of the following computer software is designed to direct and assist the execution of
application programs
OS 127
OS 131
OS 132
OS 139
OS 193
OS 199
In processing cheques which of the following I/O techniques have banks traditionally used
OS 215
Disk fragmentation
OS 216
A compiler is
OS 217
An interpreter is
OS 219
OS 233
OS 234
OS 236
If the Cancel Error Property of the CommonDialog Box is set to true then which of the following
statement is true:
OS 238
OS 276
OS 277
OS 278
OS 280
Before shutting a service on an individual machine, which of the following would you always
check?
OS 281
At a minimum, which of the following should be implemented under the protection phase?
OS 282
OS 283
Attacks on your system may be prevented or trapped through the use of:
Setting restrictions as to the number of unique passwords to use before a user can recycle them
is called a password:
OS 284
OS 286
To prevent a hacker from unauthorized access, what should you do with the administrator
account?
OS 287
OS 289
OS 291
One step you can take to reduce the risk of being infected by a virus is to:
OS 271
OS 274
OS 275
OS 292
Which of the following is NOT a sign that a virus has infected your system?
OS 293
OS 294
OS 295
Which of the following is the safest way to protect yourself from e-mail viruses?
A ____________ attack causes too much information to be placed into temporary memory
space.
____________ gathers user information with the users knowledge.
OS 296
OS 299
OS 300
Which of the following would NOT be a way to protect your system from spyware?
OS 309
For which of the following positions would it be advisable to conduct an extensive background
check?
OS 329
OS 355
OS 356
OS 357
OS 396
Which of the following actions would move a floating toolbar to dock it in a different place?
OS 397
OS 399
OS 495
OS 496
OS 497
OS 498
A(n) _________ offers on-demand software on an as-needed basis to its clients over the web.
OS 502
_________ are systems used to interact with customers and run a business in real time.
OS 504
OS 505
OS239
PP 44
PP 442
Which of the following formatting elements can be applied to a PowerPoint diagram using the
AutoFormat tool?
PP 443
Which of the following formatting elements can be applied to a PowerPoint diagram using the
Format AutoShape command?
PP 444
What happens when you double click a blank graph placeholder in a PowerPoint presentation?
PP 445
PP 446
PP 447
Which of the following actions will enable you to insert a graph into a PowerPoint presentation?
PP 448
PP 449
If you are editing a slide containing a Microsoft Graph, how do you display the underlying
datasheet?
How do you deselect a chart that has been placed onto a PowerPoint slide after you have
finished creating the chart?
PP 450
What happens when you click the Datasheet button on the Microsoft Graph toolbar?
PP 451
What happens if you single click a chart that is not currently active?
PP 452
What happens if you double click a chart that is not currently active?
PP 453
PP 454
PP 455
PP 456
PP 457
PP 458
Which of the following best describes the information that appears on the advanced timeline?
PP 459
PP 46
PP 460
PP 461
PP 500
PP438
PP439
VB 237
VB 240
What is the extension of the Visual Basic project file that stores the design of a user control.
Which event of a text box would you use for validating the data entered by the user?
VB 241
VB 242
VB 243
To deactivate the Form UnLoad event, you make the following change in the function definiton:
VB 243
To deactivate the Form UnLoad event, you make the following change in the function
definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To prevent the
Form from closing, you will set the:
VB 244
VB 245
VB 246
Procedures declared in a _____ are local whereas procedures declared in a ______ are
available to the whole application.
VB 247
VB 248
How can you keep the user from exiting a form by clicking the Close button?
The _______ property enables Visual Basic to draw complete images in memory before
displaying them on the Screen.
VB 249
You want to display the code and the description of an error. What would be the correct syntax?
VB 250
VB 251
VB 252
VB 253
VB 255
Which of the following can be shown to the user using the Common Dialog control in VB?
Which of the following are not properties of Command Button:
VB 256
VB 257
Which events enable you to determine which key was pressed by the user?
In order to access a file in Non-textual format, you have to open file in:
VB 262
Visual Basic displays information depending upon the current value of two properties of the form,
called:
Which of the following procedure types will execute when you assign a value to a property of an
object?
In order to overlap the controls (say a command button) during design time, we use the Send To
Back or Bring To Front option from the Edit menu. To change it dynamically (i.e.during program
execution) we need to change:
Which property of the ProgressBar determines how much of the bar is filled?
The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic
program.
VB 263
VB 258
VB 259
VB 260
VB 261
VB 264
You try to initialize a new Object variable with the following line but receive an error. What could
be the possible cause? Set MyVar = New Classname
VB 265
VB 266
VB 382
VB 383
The primary difference between the MsgBox statement and the InputBox function is the:
WO 01
Which of the following is TRUE about a protected form (i.e., a form where the Protect Form
button on the Forms toolbar is toggled on and is assumed to remain in that position)?
Which event is triggered when the user moves to another open form?
Veena is entering a paragraph in a word processing program. When the cursor gets to the end of
a line, what is the best way to get the cursor to the next line?
WO 02
WO 03
Which key moves the cursor to the beginning of the next line of text?
Veena typed the following sentence: "The girl was very beautiful." In which word processing utility
could she find a synonym for "beautiful"?
VB 395
VB254
WO 04
WO 05
WO 06
WO 07
WO 08
Using an electronic bulletin board, Seema can do all of the following except which one?
Aryan has created a ten-page story, but only wants to print the first two pages. What printer
command should he select?
What process should be used to recall a document saved previously?
Which is used to indent text within a document?
WO 09
Desktop publishing is a more sophisticated form of which of the following types of software?
WO 1
WO 10
WO 11
WO 12
What basic tools would you find in the Edit menu of a word processor
WO 13
WO 2
WO 25
WO 3
WO 34
WO 385
Which of the following statements would NOT be a reason for showing suggested revisions in a
Word document without changing the original document?
WO 386
WO 387
How are suggested changes entered for review on an initial Word document?
WO 32
WO 388
Which of the following is TRUE about saving a document using the Versions command?
WO 389
What happens when you open a document that has been saved using the Versions command?
You have used the word discover four times in an English essay you have created using a word
processing program. You would like to find another word of similar meaning to use instead of
discover. Which of the following would you use to do this?
WO 39
WO 391
When opening and working with multiple versions of a document, how can you tell which is the
most recent version?
Various fields are added to a regular document to create a special document called a form
through the ____________ toolbar.
WO 392
WO 398
WO 4
WO 40
WO 400
WO 41
In your English essay you notice that the paragraph at the bottom of page 1 continues on to page
2. You would like to make this paragraph start on page 2.What would be the best way to do this?
Tables in a document help you to easily arrange all of the following EXCEPT:
To identify a document, it is helpful to include the file name on each page as a
WO 440
Which of the following tools will copy the formatting of selected text to other places?
WO 390
WO 468
WO 471
What is the name of the process of determining the cause of errors in a macro?
Drop caps are added to a Word document using the ___________ menu.
WO 472
WO 473
WO 474
WO 477
Pertaining to newsletters, which of the following cannot be changed using the Columns
command dialog box?
As related to type size, how many points are there to the inch?
Assume you are working on a newsletter in which the masthead extends across the top of the
entire first page. The rest of the newsletter has two columns. What is the minimum number of
sections in the newsletter?
WO 478
Which of the following is NOT correct with respect to page, column, and section breaks?
WO 479
Which of the following would be the most appropriate font for a newsletter headline?
WO 480
WO 475
WO 476
WO 481
WO 482
WO 483
Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot
see any columns on the screen. What is the most likely cause?
WO 484
While word processing, in which of the following situations would Tom use the "Copy"
command?
WO 5
WO 56
Op1
Inventory
subsidiary.
Op2
Cash
Cash
disbursements. receipts.
Will produce a
more accurate
set of financial
statements.
VSAT
Record Count
Identification
Number
Writing on a hard
board
Printed output
Voice activated Voice answer
broadcasting
back
Validity check
Coloured spots
File Name
Op3
Boundary
protection
Pixels
Identification
number
Will be more
efficient at
producing
financial
statements.
RAM
Control totals
for one or
more fields
Storing
information
on the hard
disk
Visual audio
board
File
protection
ring
Pixies
Op4
Payroll
transactions.
Ans
Eliminates the
need to reconcile
control accounts
and subsidiary
ledgers.
C
AGP Card
B
End-of-file and
end-of-reel code B
None of above
None of above
Limited access
files
None of above
C
B
D
A
B
A
C
A
A
A
C
C
B
A
A parallel
Random
access
access medium medium
20 GB
700MB
Magnetic
A CD-ROM
A floppy disk
tape storage
Magnetic
A CD-ROM
A floppy disk
tape storage
Read and
Read
Write
Write
By a sunny
By magnet
window
objects
In a drawer
CDROM
ROM chips
RAM chips
chips
RAM chips
ROM chips
DRAM chips
ALU
Registers
Logic bus
CPUs
Registers
Control unit
0 bits
1 bit
8 bits
RAM chips
ROM chips
CACHE
A parallel
Serial access
Random
access
medium
access medium medium
Systems
Business
Network
software and
software and
software and
application
games
security software software
software
Personal
Mainframe
Supercomputer computer
computer
Jon Von
Notebook
Supercomputer Neumann
computers
s
computers
Second
Hoover
First generation generation
generation
Second
Fourth
generation
First generation generation
Second
Third
Fifth
generation
generation
generation
Second
Third
Fifth
generation
generation
generation
Second
Third
Fifth
generation
generation
generation
Analysis,
System
Specification,
Programming, Design, and
Design, and
Design, and
Implementati
Testing
Testing
on
Serial access
medium
1.44MB
None of above
None of above
A
B
None of above
None of above
Not
None of above
None of above
None of above
None of above
None of above
None of above
None of above
B
B
A
B
B
A
A selective
access medium
None of the
above
None of above
None of above
None of above
None of above
None of above
None of above
None of above
None of above
Analysis is the
loading of
Analysis
programs that
translates
perform
program code of routines to
a high level
control
language to
peripheral
machine code
devices
This involves
looking at a
system and
finding out
how
information is
being
handled
None of above
Inputs, outputs,
file design
Only hardware
hardware, and
and software
software
To execute any
To collect data
programs
Deleted from the Copied from
disk
the disk
Maintenance,
reliability, and
upgradeability
To maintain
security
Saved to the
disk
None of above
B
None of the
above
D
Transferred from
the disk
A
Users operate
the manual
system and
computer system
at the same time
Users
operate the
manual
system
None of above
Users
continue
operating the
old system
None of above
User Guide
and technical
Log files and
documentatio
temporary files n
None of above
Users operate
the computer
system from a
given date
The new
The new system system is
is introduced
introduced and
alongside the
users start
existing system operating it
Instructions and
technical
documentation
User guides
cover how to
To enable any run the
printer to be
system, enter
For technical
connected to
data, save,
support
the network
print, etc.
None of above
Network
Database
Operating
systems and
systems and
systems and
communication backup
None of the
system services services
services
above
Magnetic tape
storage
CD-ROM
floppy disk
Hard disk
To help
To maintain a
someone
backup copy of
who is
all the
To do a
applying for None of the
information
particular task. employment above
Data bus
Auto bus
Address bus Control Bus
A
B
B
A
FDDI
Data bus
BAD
Auto bus
TED
Address bus
Data
structures
Operating
that are part
system routines of the kernel
Peripherals that that execute in of an
are connected to supervisor
operating
a computer.
mode.
system.
ASCII code
binary form
form
decimal form
represented
256
were 7 bits
8 bits
characters
4 bits
8 bits
16 bits
More than 1000
mega bytes
1000 kilobytes 230 bytes
32 Mb of
32 registers
32 I/O devices RAM
MAD
Control Bus
used to indicate
uppercase letters
ROM
bits per second
used to detect
errors
RAM
baud
B
D
Shells, compilers
and other useful
system
programs.
D
alphanumeric
form
A
represented 127
characters
A
32 bits
A
1024 bytes
a 32-bit bus or
32-bit registers
A
D
B
A
D
D
A
D
B
D
CRT displays
having several
programs in
RAM at the
same time
having several
softwares
running at the
same time
ALU
brochures
LCD displays
multitasking
the ability to
run 2 or more
programs
concurrently
Registers
magazines
multitasking
an operating
system
SSGA
displays
writing
programs in
multiple
languages
writing
programs in
multiple
languages
Variables
CD-ROM
to run more
than one
program at
the same
time
none of the
previous
none of the
previous
none of the
previous
Logic Bus
e-mail
D
B
D
none of the
above
multiprogrammi
multitasking
ng
multiuser
related to virtual
a form of
reality
a form of ROM VRAM
same as
multitasking
to calculate
numbers
Uses Cobol
106 sec
a keypad
data to be
transferred to
memory
none of the
previous
none of the
previous
involves using
same as
more than one
multiprogrammi
processor at the
ng
multiuser
same time
use a virus
set up a
make a
protection
password
backup copy program
to read from or
to display
write
to print
information or
information to a sheets of
pictures on a
floppy disk
paper
screen
none of the
uses Java
uses C++
previous.
103 sec
1012 sec
109 sec
a mouse
data that has
been
transferred
from memory
data to be
data to be
transferred to or transferred to
from memory
the stack
an instruction
that has been
decoded
a cursor
an instruction
that has been
fetched from
memory
a scroll bar
C
D
B
D
D
a frog
a message pad B
an instruction
the address that has been
of a memory transferred from
location
memory.
C
an instruction
the address that has been
of a memory transferred from
location
memory
A
an
instruction
that has been
executed
a light pen
the address of
the next
instruction to be
executed
a magic marker
D
A
Formula
Algorithm
Program
Artificial
Assembler
Compiler
Intelligence
Memory
Range
protection
Parity Checking checking
use the
use the directory search each file backup
search tools
in turn
facility
Network
Program
System
save copies of
the file with the use different
keep a record
same name on filenames on
of computer
the system
the system
failures
Multiprogram
Multiprocessing Time sharing
ming
Data
Parity Checker
Validation
A
B
backup to a
secure medium
Multiplexing
ROM
RAM
Word
Processor
Word
Processor
Hashed
Floppy Disk
Telephone
modem
Telephone
modem
Indexed
Magnetic Disk
Shareware
Shareware
Random
A
C
CPU
Files and
Tracks
Primary Storage B
Schema and
subschema
A
File, record,
field
Element, field,
file
Valid character
check
ALU
Blocks and
Sectors
Database,
character,
record
Maintenance
diagnostic
program
Sound card.
Text
Laser
Firmware
Firmware
Sequential
Operating
System
Tracks and
Sectors
Character, field,
database
viewing an
encyclopaedia
CD-ROM.
replaced
regularly
Database
get into the
system quickly
CD-ROM
Pictures
Dot matrix
Sound
Ink-jet
D
B
Video
Drum
recording current
stock in a
presenting an supermarket and
creating the
order for
answering
plans for a
stock to a
customer
building design. warehouse. queries.
updated
updated once a
never updated regularly
year
Document
Graphics
processor
package
Spreadsheet
retain
make efficient confidentiality simplify file
use of time
of files
structures
A
C
D
512
loss of
confidentiality
TCP/IP
access to the
internet is
quicker
1024
duplication of
data
HTML
4096
8192
virus infection
IPX/SPX
printer can do
files can be
1000s of
shared
pages a day
the root
a subdirectory directory
uninterruptabl
up-line provider e power
service
supply
the system
the program
requires a
executable may network
not allow it to
administrator
be uninstalled to uninstall it
loss of data
D
NetBEUI
A
the operating
system is easy to
use
B
data.
Graphical
representation of
logic
Purchase, sales,
receipt,
payments etc.
documents.
Rules writte in
procedural
language
text.
None of the
above
assist in
maintenance
speed up
access
a file name
universal port
serial
information.
Logical Steps
in any
language
It is
mandatory in
tally
prevent
unauthorised
access
allow encryption C
IT management IT
senior executive lacks
understands None of the
support for IT.
leadership.
the business above
input.
output.
D
A
B: (a) to (d)
preventive
controls
Component
Interface
Settings
Control
(a) to (d)
Select the
Turn the
Shut Down
computer off at option from a
the power point. menu.
Use the Find
Ask the person or Search
next to you.
feature.
(a) to (d)
preventive
controls
(a) to (d)
program
change
requests
resolution
procedures
unit testing
data testing
Multiplexer.
(a) to (d)
Replacement
personal
computers for
user
departments.
architectural
design
(a) to (d)
system
walkthroughs
Job control
Concentrator. language.
(a), (b), (c)
(a), (c), (d)
Physical
Identification of security of
critical
warehouse
applications.
facilities.
procedural
interface design design
Computer
Client-server
Client
network
Star
Bus
Mesh
Star
Bus
Ring
To do a
To help
To maintain a
particular job
someone
backup copy of such as editing, who is
are written all the storing
applying for
information
information
employment
Direct
Sequential
Binary
B
D
A
Cross-training of
operating
personnel.
B
data design
Hub
Ring
All of the above
C
A
D
To Store data in
an organised
manner
B
Indexed
Data
Systems analysis communication Operating
and applications s hardware and systems and
programming.
software.
compilers.
A direct
A sequential file A sequential file access file on
on a disk
on a tape
a disk
Tapes can only
Information
be read by the
formats
machine on
commonly
which they are
Parity errors will vary between
written
result
architectures
Address
calculation
Data path part
Control Unit
part
Distributed
Local Area
Wide area
systems
network
network
Use the
computer to
which they are
Can send data to connected to
a computer and perform all
receive data
processing
from a computer operations
Generally
require a
keyboard for
data entry
and a CRT
for display
Mixer
Multiplexor
Allows computer
signals to be
send over a
telephone line
Planetary
network
Office
Automation
A dumb
workstation
Time of day
control locks
Modem
A direct access
file on a tape
Protocol
Terminal
Standard
A compiler
converts the
whole of a
higher level
A compiler does program code
a conversion line into machine
by line as the
code in one
program is run
step
Type of cable
Computer
operations.
Loop Network
Electronic
mailing
A personal
computer
Star Network
Instant postoffice
D
C
A mainframe PC B
Lexical
analysis,
Feasibility study, Implementation CONVERSIO
system design, and
N, and code None of the
and testing
documentation generation
above
CRC
Baudot
ASCII
EBCDIC
An interpreter
does the
conversion line
by line as the
program is run
An interpreter is
a
representation
of the system
being designed
Modem
High-level
languages
It is faster than
parallel
communication
Demodulator
Middle-level
languages
It is less error
prone
An interpreter
is a general
purpose
language
providing very
efficient
execution
Frequency
division
multiplexor
Low-level
languages
It is less
prone to
attenuation
Accounting
systems,
commercial
sector
Relieve the
main CPU of
repetitive
communicatio
n tasks
None of the
above
Time Division
Multiplexor
None of the
above
Uses only one
path
None of the
above
Reduce
competition
between the
input/output
devices
None of the
above
Manage the
Communicate
paging function
with the console in a virtual
operator
environment
Specification and System
design
Analysis
Testing
Common
Fiber Optics
Coaxial Cable carrier
Telephone Lines
System
System
Analysis
Analysis
involves
The design of
defines the
creating a
the screen the
format and type formal model
user will see and of data the
of the
use to enter or
program will
problem to be None of the
display data
use
solved
above
An online
A cache
An interface
A buffer
protocol
Testing to
check for errors Hardware,
The different
before the
Software and
types of network system is
size of
None of the
to be used
introduced
program.
above
Star
Packet
Ring
Bus
D
A
C
C
C
B
C
C
B
B
B
15
None of the
1010101
above
Cyclic
Retransmission Redundancy Hash Count
None of the
4
64
above
Port
Modem
327
141
10101010
Parity
1100101
Multiplexor
97
Data
Data Mining
management
Data warehouse tools
systems
secondary
memory access storage
memory capacity time
capacity
C
A
A
Acoustic coupler C
None of the
above
B
binary form
255
ASCII code
form
4C5
4 bits
Basic Coding
Description
1024 bits
1B7
8 bits
Binary Coded
Decimal
1000 bytes
10000
binary form
1112
ASCII code
form
Mouse
Keyboard
All of them
secondary
storage access
time
None of the
256
above
alphanumeric
decimal form form
None of the
5C4
above
16 bits
32 bits
Bit Code
None of the
Design
above
210 bits
210 bytes
None of the
1110
above
alphanumeric
decimal form form
Numeric
None of the
Keypad
above
used to indicate
uppercase letters
Because it
squeaks when
moved
bits per second
used to detect
errors
Touch screen
BPS
Printing letters
Light pen
MIPS
Tracing
diagrams
OCR
MICR
Touch screen
Hard disk
30
None of the
above
Hertz
None of the
above
VLSI
None of the
above
B
B
A
A
B
D
A
A
A
A
D
D
C
B
B
voice recognition B
None of the
above
A
increased the
storage capacity
of a computer
increases the
system
process speed
Refillable ink
100K
Pencil lead
1.44 Mb
hardware
software
provides
backup
power in the
event of a
power cut
Light
sensitive
elements
5 Mb
output
Numeric
Mouse
Keyboard
Keypad
Touch screen
Light pen
Joystick
Tracing
Reading Bar
Printing letters
Diagrams
Codes
Touch screen
Hard disk
Keyboard
Bar code
Optical mark
Mouse
reader
reader
Credit card
Mouse
Speakers
Storing
information
Writing on a hard
on the hard
board
Printed output disk
Coloured spots Pixels
Pixies
Pointing
Printer
Storage device device
Bar code
Optical mark
Mouse
reader
reader
SSGA
CRT displays
LCD displays
displays
mouse button keyboard
screen layout
layout
layout
Bar code
Optical mark
Mouse
reader
reader
language
software
hardware
interpreter
interface
Credit card
having several
programs in
RAM at the
same time
having several
programs in
RAM at the
same time
multitasking
Speakers
multitasking
The ability to
run 2 or more
programs
concurrently
an operating
system
Smart card
writing
programs in
multiple
languages
writing
programs in
multiple
languages
To run more
than one
program at
the same
time
none of the
previous
None of the
above
1 Gb
C
B
input
Printer
Scanner
Digital
Signatures
CD ROM Drive
B
C
Keyboard
Printer
B
A
Back-up on a
Cartridge
Pickers
B
B
CD-ROM
None of the
above
none of the
previous
word processing
software
None of the
above
an operating
system
None of the
above
B
A
B
C
B
C
A
none of the
previous
none of the
previous
none of the
above
slower than an
a fast interpreter interpreter
Dot - Matrix
Drum Printer
Printer
encrypting it
Very important
reader user
sequence
Electrically
charged ink
mainframe
technology
10-6 sec
data to be
transferred to
memory
Contingency
Planning
Limit checks
array.
Wide access to
various data
base
ACL
A sample of
transactions
Tests of details
of transactions
decrypting it
Vital
information
resource under
siege
Thermal Paper
LAN technology
10-3 sec
data that has
been
transferred
from memory
Third generation
computers.
Fifth - generation
computers.
none of the
Multi-user
previous
Param
Arjun
is due to bad none of the
disk blocks
previous
Magnetic Ink
Character
Recognition Image Scanning
Technology Technology
converts a
program to
machine
none of the
code
previous
Desk - jet
Printer
Thermal Printer
compressing
it
transmitting it
Virtual
information
reader & user
system
None of above
An inked ribbon
An ink pen
and print head
WAN
Unix operating
technology
system
10-12 sec
10-9 sec
an instruction
the address that has been
of a memory transferred from
location
memory
System
Capacity
feasibility report Planning
External file
Control figures labels
constant.
function.
Can aid in
Can extract and simple
analyse data
selection
High End
IDEA
CAATs
A special
A utility
purpose
software
written
programme
program
Compliance
Analytical
tests of
review
general EDP
procedures
controls
Exception
reporting
Cross footing
tests
formula.
A
A
C
C
C
A
C
B
D
B
D
C
C
C
None of the
above
Macros
clipboard
search
A way to analyse
and manipulate
numerical
information
Information
about certain
programs
remote DBMS
storing data
offline at a
separate site
Key verification
A way to analyse
and manipulate
numerical
information
Action
Procedures
file
sort
A tool to
produce high
quality
documents
It contains all
the data about
one specific
item
relative DBMS
backing up data
regularly
Computer
sequence
checks
Event
Procedures
field
field names
General
Procedures
layout
record grab
D
B
D
An organised
way of storing
information
about a set of A way of
similar things maintaining a log C
A document
which
A collection of
contains text files
Relational
DBMS
Reliable DBMS
B
C
is related to
data mining
uses tape as
opposed to disk
Computer
matching
Database access
controls
D
An organised
way of storing
information
about a set of None of the
similar things above
A document
which
None of the
contains text above
Information
about certain
programs
A tool to
produce high
qualitydocumen
ts
It contains all
the data about
one specific
item
Reports allow
users to extract
information as
hard copy
(printed output)
Reports provide
a very flexible
way of creating
and editing
documents
A tool which
allows text
and graphics
to be placed None of the
in documents above
Extracting and
analysing data
Spreadsheets
make data easy
None of the
to analyse
Using queries above
Compilers,
interpreters,
editors
Network
software,
backup
systems
Word
processors,
spreadsheets
, databases, None of the
DTP
above
DEFAULT and
NOT NULL
constraints
CHANGE
TABLE
remote DBMS
storing data
offline at a
separate site
PRIMARY
KEY and
FOREIGN KEY UNIQUE
constraints
constraints
MODIFY
ALTER
TABLE
TABLE
Relational
relative DBMS DBMS
IDENTITY
columns
UPDATE TABLE C
Reliable DBMS
backing up
data regularly
is related to
data mining
uses tape as
opposed to disk
Number
Description
keeping a
backup copy
Source
saving the file
with different
filenames
using a
password
Component
keeping the
original paper
copy
e-mail
e-mail
engines
Auto Key
C
A
C
C
records in a
dynaset are
consistent with
the underlying
tables.
related tables in
a database are
consistent with
one another.
foreign key.
the primary key
of both related
tables.
mail merge
browser
wildcards
AutoNumber
forms in a
database are
consistent
with the
underlying
tables or
queries.
query and its
associated
dynaset.
a field from
an unrelated
table.
One-to-one
One-to-many
EmployeeID
CompanyID
reports are
consistent with
the underlying
tables or queries. B
report and its
related query.
A
not a primary key
of either related
table.
B
Many-tomany
Many-to-one
B
EmployeeLas CompanyAddres
tName
s
A
The one-to-many
relationship
B
Right-click the
Relationship
line, then select
Double click the Delete from the
Relationship line shortcut menu
Select Undo
in the
Relationships
pull-down
menu
That there
are records in
a related
table
They cannot
be
They must both They cannot be AutoNumber
be numbers
text fields
data types
The
customers ID
is deleted
from the
Customers
table, and all
The customers the related
Nothing, Access ID is deleted
loans are
ignores the
from the
deleted from
attempted
Customers
the Loans
command.
table.
table.
That some of
the data is not
viewable
The subform is
not visible.
The subform is
displayed in
Datasheet view.
A one-to-many
relationship
between teams
and players
A one-to-many
relationship
between teams
and coaches
An error
message is
displayed.
D
The subform is
an object on the
form and can be
The subform moved or sized
is displayed like any other
in Form view. object.
D
A one-tomany
relationship A many-to-many
between
relationship
coaches and between players
teams
and teams
C
Either table at
any time
prompt, title bar
text, icon.
The Customers
table only when
there are Loan
records
associated with
that customer
prompt, icon,
title bar text.
The Loans
table at any
time
Neither table
title bar text, title bar text,
prompt, icon. icon, prompt.
Dim CreateList.
Sub.
C
B
B
A drop-down
list enables
A check box
A text field
the user to
enables the form enables the
choose from
user to choose
form user to
one of
from one of
choose from
several
several existing one of several existing
entries.
existing entries. entries.
does not
must be set for must be set for have to be
one word.
multiple words. set.
store data in
tables.
relationships.
figures.
multiuser
database
application
multiuser
database
application
Structured
Question
Sequential Query Language
Language (SQL) (SQL)
Database
Database
Management
Modeling System System
Jet
SQL Server
The user
the database
application(s)
interact(s) with
the DBMS
creates queries
the user
all the users'
data is in one
place
The database
application
the DBMS
accesses the
database data
create tables
of rows and
columns.
metadata.
information.
e-commerce
database
application
e-commerce
database
application
Structured
Query
Language
(SQL)
Data
Business
Model
System
Oracle
A drop-down list
enables the user
to enter text.
C
must be set for
two words.
maintain data on
different things in
different tables. A
all of the above D
a and b
D
a or b
None of above
Relational
Question
Language (RQL) C
Relational Model
Manager
B
a and b
D
The database
management
system
(DBMS)
All of the above. D
None of
above
creates
creates form
reports
the database
management
the database
system
application
(DBMS)
it contains a
description of
it reduces data its own
duplication
structure
All of above
b and c
the database
data marts
normalization
data models
data marts
normalization
data models
data marts
normalization
data marts
file managers
entities in a
column vary as
to kind
table
record
record
record
composite key
Insertion
anomaly
assess the
existing tables'
structure and
content
are supplied by
several wellestablished
manufacturers
data models
entityrelationship
data
normalization
modeling
hierarchical
network
models
models
the order of the the order of
columns is
the rows is
important
unimportant
relation
row
field
key
composite
field
key
field
foreign key
a and b
a and b
a and b
entityrelationship data
modeling
entityrelationship data
modeling
entityrelationship data
modeling
data migration
relational data
model
more than one
column can use
the same name
field
tuple
foreign key
candidate key
C
D
surrogate key
All of above
primary key
Update
anomaly
foreign key
Deletion
anomaly
design the
database
structure
C
D
C
They use
sophisticated
mathematical
techniques.
Their report
delivery is more
difficult than
report delivery
for reporting
Nonintegrate None of the
systems.
d data
above
dirty data
inconsistent
data
dirty data
inconsistent
data
data
warehouse
data warehouse databases do
data are not
not have
stored in tables. metadata.
Form
Table
Forms and
Queries and
reports
tables
data
warehouse
data are often
denormalized
.
b and c
Report
Query
Import
Merge
Join
It contains a
user
interface, or
switchboard
It contains
macros
C
A
Spreadsheets
D
Regardless of
how the objects
and tables are
It will be easier
stored, the user
It will be easier for the user to It is advisable will have to
for the user to
upgrade it if the to put each
reenter the data
upgrade it if the objects are in object and
in the tables
objects and
one database table into a
when the
tables are in one and the tables separate
application is
database.
in another.
database.
upgraded.
B
An application
may consist of
The Link Tables multiple
An application
command can be databases,
All objects in can be created in
used to
each with
an
such a way that it
associate the
multiple
application,
objects such as
tables in one
objects, linked including the forms and
database with
to yet another tables, must reports can be
the objects in
database
reside within changed without
another
containing only the same
disturbing the
database.
tables.
database.
existing data.
C
Link
It contains
tables, reports,
It contains more queries, and
than one table
forms
Macros
Menu Wizard
Build Menu
create backups
for mission
critical corporate
data.
centralize the
manageability
of data
collection.
Decryption
Cipher
Interface
Design
Wizard
put key
business
information
into the
hands or
more
decision
makers.
Unaltered in
transmission.
Encryption
Conducting
fraudPerforming
awareness
validity checks. training.
Received by
Not intercepted the intended
en route.
recipient.
Using data
encryption.
Collision.
Error checking
Competitive
espionage
A list of
competitors
clients
single-user
database
application
Replying
promptly
Data entry
errors.
Data
Integration
Corporate
espionage
Contact
numbers of the
management
group
multi-user
database
application
Keeping
messages
short
The private
key is used
by the sender
for encryption
but not by the
receiver for
decryption.
Failure of
server
duplicating
function.
Low cost of
operation
Industrial
espionage
Switchboard
Manager
store all
corporate
transaction data
in one single
location.
C
Cryptography
Reviewing the
systems-access
log.
D
Sent to the
correct address. A
Firewall
vulnerability.
Quality
management
Economic
espionage
Research
A competitors
data
new project
e-commerce
database
application
None of above
Including the Using all capital
Subject
letters
D
B
C
Encryption
performed by
a physically
secure
hardware
device is
more secure
than
encryption
performed by
software.
Security at the
transaction
phase in EDI
systems is not
necessary
because
problems at that
level will be
identified by the
service provider. C
No border
A blinking border A
2,2,2
the column is
too narrow to
show all the
digits of the
number
flexibility of
moving
entries
6,8,10
either b or c
database
Gap
Drawing
pictures
spreadsheet
Rows
D
A
Document filing
Cell references
^
Functions
/
B5*B6
C3/D4
E12
It is surrounded
by a heavy
border.
It is blinking.
Text constants
\
It is impossible to
D4^2
determine.
SUM(H9:H11 G7*SUM(H9:H11
)
)
The phrase
It is displayed active cell
in reverse
appears in the
video.
Status bar.
Message
Removable
authentication
drives that can
in EDI systems
be locked up at performs the
night provide
same function
adequate
as segregation
security when
of duties in
the confidentiality other
of data is the
information
primary risk.
systems.
A dark wide
border
A dotted border
8,16,32
2,4,2
the row is too
short to show
the number at
your formula has the current font
a syntax error
size
ability to
generate tables
speed of
calculation
click the
column
heading
TAB
constant.
#VALUE!
Numeric
constants
*
A
B
C
D
D
C
B
By clicking in a
different cell
By using the
arrow keys to
move to a
different cell
By either
clicking in a
different cell
or using the
arrow keys to
move to a
different cell
The Cell
Format
The Standard
The Formatting command on
toolbar
toolbar
the Edit menu
the Save As
the New
the Save
command on
command on the command on
the File
File menu.
the File menu. menu.
File
Edit
View
Preview
Details
Insert
Delete
Clear
Orientation
(portrait or
landscape)
Options
worksheet.
6
Delete
By typing the
reference of the
cell you want to
move to in the
formula bar
List
Both Insert
and Delete
Both Clear
and Delete
Properties
Clear
Remove
Fonts
View
group.
D12:G25
Margins
Edit
cell group.
D
C
B
B
C
clipboard.
source range.
clipboard.
paste range.
Headers and
footers
Page Setup
range.
D12, G25
destination
range.
destination
range.
The Duplicate
command
absolute
B4
The Copy
command
relative
$B4
The Paste
command
mixed
B$4
source range.
Both the Copy
and Paste
commands
constant
$B$4
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
The Move
command
The Cut
command
The Paste
command
#DIV/0!
C
Both the Cut and
Paste
commands
D
edit cells.
cycle through
absolute,
relative, and cycle through
mixed cell
open
references.
applications.
copy range.
D
A
D
the Format
Painter
the
Formatting
toolbar
Right-click a
cell and click
the Edit
Hyperlink
command.
whether the
cell has an
absolute or a
relative cell
reference.
Conditional
formatting
Double-click a
cell and click the
Insert Hyperlink
command.
B
Jul-30
Aug-31
subtracting the
earlier date from
the later one.
the F4 key.
adding the
earlier date to
the later one.
the F2 key.
29/03/2008
subtracting
the later date
from the
earlier one.
the Esc key.
It is impossible to
determine from
the information
given.
B
03-Apr
0.75
March 4 of
the current
year
a cell on a
worksheet.
a variable.
a constant.
B1-G10
B1.G10
B1;G10
B1:G10
AVERAGE
Combination
COUNT
Line
SUM
Scatter
C
C
MAX
Pie
Once a pie
Once a bar chart Once a column chart has
is chosen it
chart is chosen been chosen
cannot be
it cannot be
it cannot be
changed to a
changed to a
changed to
column chart.
bar chart.
line chart.
hold down the
hold down the hold down the
CTRL key
SHIFT key
ALT key
A
B
Use tables
Create four
separate files
Paste
Fill Down
Tools | Sort
Data | Sort
Analyse data
Calculate data
press the
PRINT
SCREEN key
writing letters
Transfer
information to Use multiple
a database
sheets
Fill Right
Edit | Data |
Sort
Paste Special
none of the
choices
None of the
Create forms above
select Print
selection on select Print
Page Setup selection in the
| Sheet and Print dialog and
then print
then print
drawing
None of the
pictures
above
D4+C2*B2
#VALUE!
=A3SUM:B3SU
M:C3SUM
REF!
portrait
landscape
AD213
ZA1
=(B2*(D4+C2)
None of the
above
whatever was
last used
vertical
None of the
A0
above
D
B
B
C
D
A
C
B
A
C
sending
storing data
storing data on a information to a on the hard
disk drive
host computer drive
receiving
information from
a host computer B
Bandwidth
Speed
Size
Channel
Find
Browse
Retrieve
Photography
Save
Digital
Signature
Key
Lock
User-id
Password
Name
Penetration
Retrieval
Address
Password
Cryptography Cracker
Acts
Regulations
Address
Protocols
Spoofing
Loss
Sales - tax
authorities
Imposting
Threat
Income - tax
authorities
Pirated
software
Unauthorising
Exposure
Judge of a
civil court
Approving
Hacking
Police officer of
IPS rank.
A
B
Virus
Cracker
Utility
Charles
Bubbage
Howard Aiken
Dell .com
Msn .com
Asynchronou
s
Transmission
mode
None of above
Acts
Router
Regulations
Gateway
Address
Port
LAN
WAN
Hoffman
Amazon .com
CAN
hypertext
hyper terminal
hypertext
transfer
tracing program tracing program protocol
National
New
Informatics
Network
Information
Center
Interface card Card
Can not
Only Computers computers
Only printers
Combines
Switches data
connectivity of from
a hub with the incoming
traffic
ports to
Concentrates
regulation of a outgoing
connectivity
bridge
ports.
Bridges and
Two or more
Bridges and
Repeaters.
networks
Hubs
bits
firewall
frames
gateway
One
Two
Packets
router
Physical Layer
Four
Network
Data-Link Layer Layer
RG7U
Coaxial cable
Fiber
A memory
Physical address Logical address address
A cable
Physical Layer
Router
It continue on
It gets
to target
destroyed bit by device with
bit.
corrupt data
Wired
Ultra violet
Technology
technology
Network
Data Link Layer Layer
Binary
ASCII
Data return to
the sender
Wireless
technology
Hub
Octal
A
B
Protocols
Pin
C
B
PAN
hypertext tracing
protocol
C
None of the
above
None of the
above
B
D
All of Above
Twisted pair
None of the
above
None of the
above
None of the
above
None of the
above
All of the above
None of the
above
C
A
C
B
B
B
A
D
A
48 Bits
software that
facilitates
connection to the
internet
48 Bytes
a list of rules for
transferring
data over a
network
Novell PC
Client
48 KB
48 MB
Server
If the hub
goes down, it
If one node
brings down
goes down, it
all of the
brings down the nodes on that
entire ring
section
Physiology
Bus
Topology
Star
Linear
Parallel
Parallel
Circular
A
B
Ring
Bus
Star
Mesh
Ring
Star
Bus
Bus
Star
Linear
Mesh
Ring
B
C
Ring
Bus
Mesh
Ethernet, token
ring, ARCnet
mips
Mips
B
B
C
limited by
modem speeds
Netscape
C
B
Star
Physical
Network Layer
Transport Layer Layer
Ethernet,
Ethernet, token Ethernet, token DecNET,
ring, DecNET
ring, FDDI
FDDI
bps
kbps
mbps
bps
Kbps
Mbps
depend on
measured in
the
usually higher
bytes per
transmission
than LAN speeds second
medium
CD-ROM drive
a modem
Windows 95
must use the
must use
World Wide Web electronic mail
uniform
key gateway
resource
interface
locator
a Novell
Interface
used to control
Controller
a printer
CD-ROM drive
Linux
a modem
must have a
LAN account
common
gateway
interface
interfaces a
modem to a
computer
Windows
package
Network PC
B
B
D
application
protocol interface C
connects a
computer to a
network
D
Netscape
None of the
Novell Netware Windows NT above
B
C
have to do with
compression of
graphics and
video
have to do with
Web pages
the Internet
modem
none of the
previous
A
use appropriate
must have a communications
LAN account software
A
none of the
bridge
previous
D
used to send
email
is a CPU
make of
functional unit processor
A
is a protocol for
the transfer of
used to browse is part of
files between
the Web
Netscape
computers
D
uses wireless
communication is part of
None of the
medium
Netscape
above
D
used to send
email
used to protect
a computer room
from fires and
floods
a form of virus
an email
a backup server server
IR system for
hardware
the Internet
scanner
CD-ROM
a screen
saver
program
a poor file
server
browser
clip-art file
none of the
previous
none
none of the
previous
search engine
D
D
C
D
used to send
email
used to send
email
is a CPU
make of
functional unit processor
A
is a protocol for
the transfer of
used to browse is part of
files between
the Web
Netscape
computers
D
is a protocol that
uses telephone is part of
allows for remote
lines
Netscape
login
D
It is made up of
many networks
connected into
transmission
lines called
backbones.
System
intrusion
It is one large
network.
Password
cracking
used to protect a
computer room
from fires and
floods
a form of virus
Flood a Web
server with
IP flood
requests
hack
packet
firewall
It works the
same way as
a local
network.
Denial of
Service
a screen
saver
program
Virus that
initiates a
ping flood
flood
router
switch
a poor file
a backup server an email server server
Backup data
Apply security
Update virus
on a daily
patches
definitions
basis
Only large
nameThere are safe recognizable
All sites are safe and unsafe
sites are
and reliable.
sites.
safe.
Individual
computers can
connect to it
using an ISP.
Port sniffing
none of the
previous
UDP flood
traffic
A
C
hub
none of the
above
Limit logging on
access
ActiveX-enabled
sites are safe.
B
by attaching to
an e-mail.
Use of logical
access
methods
by attaching
through an FTP itself to a
port.
document.
Phone
A Trojan horse
E-mail
Adware
Web traffic
A worm
Use of
encryption
methods
by scanning the
computer for a
connection.
Application
updates
Spyware
Modems
Multiplexors
LAN
cookies and
Trojan horses.
Protocols
Trojan horses
and key
loggers.
cookies and
key loggers.
An attack on a
system for
personal gain
Economic
damage
Disruption in
Disruption in
communication supply lines
Use of
Use of identifiers passwords
B
D
D
Crashing the
Shutdown of
Contaminatin Shutdown of
stock market, as military security g water
nuclear plant
in the 1930s
systems
systems
safety systems
To obtain an
accurate
inventory of
To improve
network related
To improve
system
equipment and
To carry more
network
response
parts and
network capacity services
time
network nodes
stop its
limit access to competitors update its prices
set its prices very computer
seeing their as soon as they
high
owners only
prices
are changed
Yahoo People USA People
People Search
Search
Search
Lycos Search
Name of your
Personal
bank
Date of birth
assets
Criminal records
Virus
Fraud
Adware
Spyware
make large
amounts of
money by
purchase off- parking funds in
invest without shore
their bank
buy stocks.
risk.
property.
account.
Shill bidding
Phishing
Encryption
I only
irc
Siphoning
virtual
stalking.
spam.
HTML
Internet
Explorer
Web query.
HTML
document.
Microsoft
Excel
round trip
HTML
document.
.con is used
for
companies
D
B
A
B
Hoaxing
Web stalking.
viruses.
B
B
Use anti-spyware
software.
B
Logical access
controls
Neither I or II
telnet
Misleads a
program
recompilation
B
C
C
Web browser.
None of the
above
Hyperlink
BMP
Save it to a
floppy disk.
extranet.
an attachment.
VoIP
Desktop client,
application, and
database.
Modem
File Transfer
Program
So computers
can be
referenced by a
name
193.1.2.3
paul .trigg @
domain. org. uk
The US
government
Screensaver
GIF
Sound
JPEG
Add it to
Write it down Favourites
on a piece of
or
paper.
Bookmarks.
privileged
intranet.
network.
a signature.
a footer.
IPT
IPP
Desktop
server,
Desktop client, application,
software, and and
hardware.
database.
Telephone
CD-ROM
line
File
Transmission File Transfer
Protocol
Protocol
So IP
So email is
addresses can delivered
be shorter
faster
143.215.12.1
45.1.1.1
9
paul.trigg@dom paul.domain.
ain.org.uk
uk
Scientists in
Switzerland
No-one
C
D
viewing an Excel
worksheet that
you have saved
as a Web page. B
Go to the
Bookmarks or
Favorites page
Video
TIFF
Cut and paste it
to a word
processor
document.
C
C
network topology A
an encryption.
B
PoIP
A
Desktop server,
software, and
hardware.
None of the
above
None of the
above
None of the
above
None of the
above
None of the
above
None of the
above
A
B
A
D
B
C
Internet Relay
Chat
International
Relay of
Characters
It will be waiting
for you to
It will be deleted collect it
Hyperlink Text
Hyper Textual
Marking
Mark-up Lingo
Language
Receiving
messages
People
automatically
discussing a
from anyone in topic of interest
the group
globally
Internet
Remote
Conversation None of the
s
above
A letter will be
sent to you in
the post
Hyper Text
Mark-up
Language
None of the
above
None of the
above
is due to bad
disk blocks
converts a
program to
slower than an assembly
a fast interpreter interpreter
code
translates and
executes
converts a
programs
program to
faster than a
statement by
machine
compiler
statement
code
encrypting it
an assembler
the ALU
A runtime error
can result if the
user clicks the
cancel button
caused by
overuse
compressing
it
an
a compiler
interpreter
the power
the CU
cord
The program
executes
A compile time without any
error occurs
error
decrypting it
C
A
A
C
A
B
B
none of the
previous
none of the
previous
none of the
previous
transmitting it
a linker
None of the
above
You need to
carry out
conditional
compilation
A
C
Netcop
NetBrute
Netcraft
NetBIOS
D
www.nettools.co www.WhoIs.co www.netcraft.
m
m
com
www.netstat.com C
code correct.
firewalls
patches.
switches
It can consist of
hardware,
software, or
both.
It hides your
network.
Dependencies
on other
services
Intrusiondetection
software
antivirus
software.
renewal.
Install and keep
Make sure all
current
update and
antivirus and
security patches anti-spyware
are applied.
programs.
updates.
hubs
upgrades.
scanners
It is a barrier
One of its
between your
techniques is network and the
packet
rest of the
filtering.
Internet.
That you also
That you are shut down
not on the
associated
Internet
services
B
A
Firewall
a network
prevention
system.
Router
a proxy filtering
system.
age.
history.
Block all
incoming traffic
on a network.
Create another
administrator
account to
confuse the
hacker.
Give them to a
recycle shop.
Spyware
C
C
hone your
programming
skills.
Limit users
ability to
configure the
workstation.
Disable it and
Delete it and
create a
change the built- nondescript
Delete it from the in guest
user account
system and use account to a
with
the guest
power user
administrator
account.
account.
rights.
Tapes can be
used over and
Tapes and CDs Tapes should
over, and CDs
can be thrown be melted
should be kept
away in the
and CDs
forever.
trash.
broken.
Trojan horse
Virus
IP spoofing
place a router
download
between your
files from
ISP and your
add spyware to reliable Web
system.
your system.
sites.
Problems with
your wireless
mouse
D
Never open an eTurn off the mail attachment
Do not
auto-launch unless you know
Update antivirus propagate hoax in your e-mail what it is and
software.
viruses.
client.
who sent it.
D
System acts
abnormal
Files are
missing
virus
A virus
Trojan horse
spyware
A Trojan horse Spyware
Obtain system IP
addresses
Obtain cookies
E-mail and
attachment
Download
scanning
scanning
Do not open
Use your
attachments in
browsers
unknown esecurity settings mails
Administrative
assistant to the
president
Cook
The Standard
toolbar
multitasking.
The Formatting
toolbar
tiling.
whether the
worksheet
prints in
landscape or
portrait
orientation
multitasking
Click on any
Click on any
corner and
border and drag. drag.
Printing
problems
Check for
open ports
buffer overflow D
A buffer overflow C
Obtain
usernames and
passwords
D
Backup file
File scanning scanning
Avoid skins
and toolbars Use encryption
download
software
Junior
accountant
Network
administrator
The Open
command on
the Edit menu
cascading.
The Save
command on the
File menu
A
minimizing.
A
cascading
You cannot
move a floating
toolbar.
A
C
right mouse
button anywhere
on the Word
window, choose
the Customize
command from
the contextsensitive menu,
and check the
box for the
missing toolbar
from the
Toolbars tab
dialog box.
cold
Kill
text, graphics
and email
address.
empty
Nothing
CD-ROM,
text, hypertext digital
and Power
camera and
Point.
sound.
Fill color
Line color
dormant
New
B
C
text, hypertext,
Power Point,
video and sound. D
Line style, Line
the Font and color, text font,
the text
and text
alignment
alignment
D
Fill color, Line
Line
color, and Line
thickness
thickness
D
Excel is started
so that you can
create a chart.
A popup box
prompts you for
an existing
Excel chart to
insert.
Microsoft
Graph is
started so
that you can
create a
graph.
The graph
placeholder is
deleted.
taken from
the first
column or
row of data in
the
datasheet,
always taken
depending on
always taken
from the first
whether the
from the first row column of data data series
of data in the
in the
are in rows or entered by the
datasheet.
datasheet.
columns.
user.
Side-by-side
Stacked
column
column
Pie chart
Line chart
C
B
A dialog box is
displayed
allowing you to
enter the name
of the Excel
worksheet that
should be linked
to the
PowerPoint
presentation.
A dialog box is
displayed
allowing you to
enter the name
of the Excel
worksheet that
should be
embedded in
the PowerPoint
presentation.
The chart is
selected.
The chart is
deleted.
The chart is
selected.
The chart is
deleted.
The datasheet
window is
The
toggled from
datasheet is closed to open
saved as a
(or from open to
separate file. closed).
D
The chart is The application
doubled in
that created the
size.
chart is started. A
The chart is
doubled in
Microsoft Graph
size.
will restart.
D
Custom
animation can be
used to affect the
way objects
appear on a
slide, to what
objects do after
what objects do
they appear on a
after they
the way
slide, and to the
appear on a
objects exit a way objects exit
slide.
slide.
a slide.
D
The
advanced
timeline
shows the
sequence in
which objects
The advanced
The advanced will appear on
timeline shows
timeline shows the slide and
the sequence in the duration of the duration
which objects will the effect
of the effect
appear on the
applied to each applied to
slide.
object.
each object.
Paint program
Text
Filtering
Draw program program
The advanced
timeline shows
neither the
sequence in
which objects will
appear on the
slide, nor the
duration of the
effect applied to
each object.
C
Clips,
organization
charts, and text D
Animation
program
A
Fly in
From top
Once data is
entered it cannot
be changed.
OLTP.
Once data is
entered it can
be changed.
OLAP.
Clips
Organization
charts
You can
change both
You can change the appearance
the appearance of a whole
of a whole
diagram and
diagram, but not the individual
individual shapes shapes of a
of a diagram.
diagram.
[Enter+A]
[Shift+Z]
Dissolve in
Data cannot
be entered
into
Datasheet.
OLST.
You cannot
change the
style of the
connecting
lines in an
Organization
chart.
[Alt+Z]
There is no such
thing as a
Datasheet.
B
OLIP.
B
You cannot
change the color
of the boxes in
an Organization
chart.
B
[Ctrl+Z]
D
.ctx
Validate
On Error GoTo
linelabel
.ctl
.ctr
Validation
Check
On Error GoTo
Inline
On Error Stop
.ocx
Audit
On Error
Resume Next
B
A
UpdateControls
PaintPicture
Resize
UnloadMode
parameter to a
zero value
UnloadMode
parameter to a
zero value
Cancel
parameter to a
non-zero value
Cancel
parameter to a
non-zero value
Refresh
UnloadMode
parameter to
Cancel
a non-zero
parameter to 0 value
UnloadMode
parameter to
Cancel
a non-zero
parameter to 0 value
3
Consists of
Various
Consists of
Consists of
Forms And
several
several
Code
Programs
Applications
Modules
Form window,
Project window, Class
standard or code view code
module, code
module
window
module
Place code in
Place code in the
Place code in the the Unload
Deactivate
Terminate event event
event
AutoRedraw =
AutoRedraw =
True
False
Refresh
Msgbox
Msgbox
Msgbox err.no & err.number &
error.number
err.text
err.text
& error.text
None of the
above
Consists of
several Projects D
None of the
above
None of the
above
PaintPicture
Msgbox
error.number &
error.description
To provide a
repository for
images used by
other controls
GetBytes
Value
Input box
Font
KeyPress,
KeyUp and
KeyDown
Output mode
D
C
To display
images to the
user
FreeFile
Retrieve
Common
messages
passed to
Windows
Caption
To help in
creating a
ToolBar
GetFileNum
Get
To allow the
editing of
icons
GetFile
GetProperty
Open dialog
box
Visible
Windows
explorer
Multi-Line
Click and
KeyPress
Ascii Format
Click, KeyUp
and KeyDown
Binary Format
KeyUp and
KeyDown
Input Mode
CurrentX and
CurrentY
ScaleLeft and
ScaleTop
ScaleHeight
and ScaleTop x and y
Property Get
Property Set
Background
color property
Min
Caption
property
Max
ZOrder
property
Value
AutoRedraw
property
CurrentVal
C
B
SetAttr
CStr
Shell
Substr
Can be
Are one and the different at
same
times
D
A
B
D
B
You do not
have the
You do not need permission to
to use the Set
access the
command here class
MyVar has
not been
declared
The
The Open
The Exec
ExecProcedu
method
method
re method
An
A warning query A critical
exclamation
icon
message icon icon
intrinsic
statement.
variable.
constant.
InputBox
function can
be created
MsgBox
with the
statement
InputBox
macro
returns a value, function returns recorder,
while the
a value, while while the
InputBox
the MsgBox
MsgBox
function does
statement does statement
not.
not.
cannot.
Data cannot be
entered into the The form can
Data can be
form.
be modified.
entered.
Unload
QueryUnload
Deactivate
press the return press the tab
press the
key
key
escape key
layers and
lines and
height and
planes
spaces
width
backspace/
tab
delete
enter/return
grammar
checker
spell checker
thesaurus
send a public
message to
friends interested send pictures to
in one topic
a friend
From ___ To
Print all
____
Enter
Copy
closing
tabbing
database
To analyse
figures
subscript
graphing
Creating and
editing
documents
annotation
None of the
above
None of the
above
None of the
above
built-in
procedure.
B
C
MsgBox
statement can be
created with the
macro recorder,
while the
InputBox
function cannot. B
A new check box
can be added.
C
Terminate
C
just keep typing
rows and
columns
shift
outliner
send private
messages to send a package
a friend
D
to a friend
Page setup
Retrieve
spacing
word
processing
Print preview
Save
sorting
B
C
B
spreadsheet
Storing
information
clip art
None of the
above
clipboard
B
C
To analyse
figures
Creating and
editing
documents
Clear, replace
and select
Spelling,
grammar and
autocorrect
Text at the
bottom of every
page
Mouse, printer
and processing
system
keyboard?
Browser
Clear, replace
and Toolbars
Paste
Copy, then
paste
Storing
information
Making
Calculations
Cut, copy,
paste and
clear
Text which
Numbers which appear at
the top of
appear on
every page
every page
Keyboard,
Mouse,
Monitor,
monitor and
keyboard and
mouse
printer
clip-art file
microphone
Cut, copy,
Spelling,
grammar and paste and
autocorrect
clear
Font, Paragraph,
Bullet and
Numbering
C
Select all
Delete, then
Cut, then paste paste
AutoCorrect
Insert, then
paste
Replace
To give the
To give the
original author
original author a a chance to
chance to accept reject
suggested
suggested
changes from
changes from
the person who the person who
entered the
entered the
revisions
revisions
To
complicate
the revision
process and
to force the
author to
spend more
time making
corrections
Designated area
on the document C
None of the
above
digital scanner
B
D
None of the
above
B
A
To allow multiple
people to work
on one
document in
collaboration with
one another
C
A vertical line
outside the
left margin
signifies a
A red underline change has
appears
been made at
A line appears
beneath text
that point in
through text that that is to be
the
is to be deleted. added.
document.
Comments are
enclosed in a
text box at the
right of the
document.
Both through
the Tools menu
and the
Reviewing
D
toolbar
Through the
Tools menu by
choosing Track
Changes
command
Through tools
on the
Reviewing
toolbar
The Versions
command will
allow you to
save multiple
versions of a
document,
including any
changes that
may have been
made to that
document.
The Versions
command will
allow you to
save only one
version of a
document,
including any
changes that
may have been
made to that
document.
The Versions
command will
allow you to
save only one
version of a
document
without any
changes that
were just
made to the
document.
The Versions
command will
allow you to save
only two versions
of a document:
one version of
the original and
one version of
any changes
made to the
document.
A
The latest
version is
opened
automatically.
The previous
version is
opened
automatically.
Dictionary
Grammar
check
Thesaurus
Word displays a
list of the dates
and times each
file was saved.
The most
recent version
will appear at
the bottom of
the list.
Spell check
Word will
show the
name of the
person who
saved each
version.
Fields
Tools
Forms
Insert
Check boxes
Press tab.
text.
header/footer.
Press Return.
graphics.
bibliography.
Copy button
Paste button
Copy and
paste.
forms.
find/search.
Format
Painter
button
A drop-down list B
Comments can
be edited or
deleted by left
clicking the
highlighted text.
None of the
above
Insert page
break.
numbers.
macro.
D
C
A
Fault Finding
Insert
Error
Bug Squashing Injecting
Tools
Format
a section of
white text on a
black
background.
a section of text
where the first
letter of each
sentence is
lowercase and
the rest are
uppercase.
setting it in
larger type or
font size.
typing it all in
capital letters.
the guidelines
used to
establish
where
different
elements of
the newsletter
will go.
Debugging
Edit
an enlarged
capital letter at
the beginning of
a paragraph.
A
underlining
the text of the changing the
pull quote.
color.
A grid is a set
of horizontal
and vertical
A dropped
cap is a word lines that
determine the
that starts
placement of
The reverse
A pull quote is a with a
elements in a
technique means quotation taken lowercase
to add dark text from (pulled)
letter when it newsletter or
on a light
from another
should have a other
background.
document.
capital letter. document.
The tab spacing
The width of
The height of
The number within each
each column
each column
of columns
column
6
10
12
72
One
2 inches
3 inches
Four
Press
Shift+Enter to
force a line
break.
A sans serif
A serif font at font at 45
20 points
points
It depends on
the left and
right margins,
and how many
columns are
4 inches
specified.
6 point
10 point
15 point
2 inches.
2 inches.
3 inches.
Two
Press
Press Ctrl+Enter Ctrl+Shift+Ente
to create a page r to create a
break.
column break.
A sans serif
A serif font at 10 font at 10
points
points
D
C
Three
Press Enter
to create a
section
break.
25 point
impossible to
determine.
D
D
Word cannot
display columns
You have not during editing;
You have not
specified
you will see them
You are not in inserted a
continuous
only when you
Print Layout
column section section
print the
break..
breaks.
document.
A
view.
to move a
section of text
to leave an
from the
original section
original
of text in place
location to
while pasting a
to store a file on to store a file
another
the hard drive
on a diskette
location
copy elsewhere D
A set of
Data about a set
different
None of the
of similar things Mainly text
graphics
above
B
Grammar
Find and
Thesaurus
Replace
B
Spell Checker Checker
Q_id
Q_desc
Op1
Op2
Op3
Op4
Ans
C
C
B
Printed output
None of above
None of above
Boundary protection
BC1
BC2
BC3
data to be transferred to
memory
Contingency Planning
NIC Card
BC4
A trailer label is used on a magnetic tape file, it is the last record and summarises the file.
The following is an information not found in the trailer label
Record Count
Identification Number
the address of a
memory location
Capacity Planning
RAM
BC5
BC6
BC7
BC8
BC9
BC10
What are the individual dots which make up a picture on the monitor screen called?
Header label normally include all the following except the
A daisy wheel is a type of...?
Coloured spots
File Name
Printer
Pixels
Identification number
Storage device
Pixies
Reel Number
Pointing device
None of above
Batch Total
None of above
B
D
A
BC11
System Logs
Physical Security
Data Dictionary
An ink pen
Console Log
An inked ribbon and
print head
Separation of duties
A cartridge
A print head
Volume
Read
Magnetic tape
None of above
Make duplicate copies
of files
None of above
A cassette
Distributed policies or
procedures
None of above
None of above
None of above
None of above
None of above
None of above
None of above
A
B
A CD-ROM
A CD-ROM
Read
By a sunny window
ROM chips
RAM chips
ALU
CPUs
0 bits
RAM chips
A floppy disk
A floppy disk
W rite
By magnet objects
RAM chips
ROM chips
Registers
Registers
1 bit
ROM chips
C
A
B
C
B
B
A
B
B
A
None of above
None of above
Not
None of above
None of above
None of above
None of above
None of above
None of above
None of above
A selective access
medium
None of the above
None of above
B
B
None of above
None of above
None of above
None of above
None of above
None of above
B
A
C
C
B
A
BC12
BC13
BC14
BC15
BC16
BC17
BC18
BC19
BC20
BC21
BC22
BC23
BC24
BC25
BC26
BC27
BC28
BC29
BC30
BC31
BC32
BC33
C
A
C
A
A
A
C
C
B
A
BC34
BC35
BC36
BC37
BC38
BC39
BC40
BC41
BC42
Notebook computers
First generation
Second generation
Second generation
Second generation
Second generation
Supercomputers
Second generation
First generation
Third generation
Third generation
Third generation
BC43
Specification, Design,
and Testing
None of above
BC44
Analysis translates
program code of a high
level language to
machine code
None of above
BC45
BC46
Maintenance, reliability,
and upgradeability
To maintain security
BC48
None of above
None of the above
Transferred from the
disk
B
D
BC47
None of above
None of above
Instructions and
technical documentation
None of above
None of above
A
B
B
A
B
D
B
A
D
BC49
BC50
BC51
BC52
BC53
BC54
BC55
BC56
BC57
BC58
BC59
BC60
BC61
BC62
A gigabyte represents
BC63
32 I/O devices
32 Mb of RAM
BC64
BC65
BC66
A parity bit is
he contents of these chips are lost when the computer is switched off?
Clock speed is measured in
32 registers
used to indicate
uppercase letters
ROM
bits per second
1024 bytes
a 32-bit bus or 32bit registers
BC67
memory capacity
BC68
BC69
CISC machines
Which parts of the computer perform arithmetic calculations?
BC70
BC71
BC72
BC73
ROM
BC74
A UPS
D
A
A
A
D
A
LCD displays
SSGA displays
multitasking
writing programs in
multiple languages
writing programs in
multiple languages
Variables
CD-ROM
to run more than one
program at the same
time
none of the
previous
Logic Bus
e-mail
D
B
D
is non-volatile
BC75
smart card
BC76
BC77
Multiprogramming refers to
BC78
BC79
BC80
Multitasking refers to
What are small high speed memory units used for storing temporary results?
A good way to exchange information that changes rapidly is through
CRT displays
having several
programs in RAM at
the same time
having several
softwares running at the
same time
ALU
brochures
BC81
multitasking
an operating system
D
B
D
BC82
multitasking
multiprogramming
multiuser
BC83
Virtual memory is
a form of ROM
a form of VRAM
BC84
Multiprocessing is
same as multitasking
same as multiprogramming
multiuser
BC85
set up a password
BC86
to calculate numbers
BC87
BC88
A 4GL is
A nanosecond is
What small, hand-held device is used to move the cursor to a specific location on the
screen?
Uses Cobol
106 sec
uses Java
103 sec
uses C++
1012 sec
to display information
or pictures on a
screen
none of the
previous.
109 sec
a keypad
a mouse
a frog
a message pad
BC89
C
D
D
B
B
D
D
BC90
data to be transferred to
memory
the address of a
memory location
an instruction that
has been transferred
from memory.
BC91
data to be transferred
to or from memory
an instruction that
has been transferred
from memory
BC92
BC93
a cursor
a scroll bar
a light pen
a magic marker
BC95
BC96
Which of the following is used to indicate the location on the computer monitor?
A mathematical procedure that can be explicitly coded in a set of computer language
instructions that manipulate data.
Which of the following translates a program written in high-level language into machine
language for execution?
Detecting errors in real memory is a function of
BC97
To find where a file has been saved on disk, the user should
BC98
A series of instructions telling the computer how to process data or files is defined as a
BC99
To ensure that data is not lost if a computer system fails, the user should
BC100
Multiprocessing
Time sharing
Multiprogramming
Multiplexing
ROM
Firmware
RAM
Word Processor
Floppy Disk
Telephone modem
Magnetic Disk
Shareware
B
C
BC103
Having a single CPU alternatively process tasks entered from multiple terminals is called
The place in the CPU where the data and programs are temporarily stored during
processing is called the
All are examples of computer software except
Computer manufactures are now installing software programs permanently inside the
computer. It is known as
Firmware
Word Processor
Telephone modem
Shareware
BC104
BC105
Which of the following file organisation forms most efficiently allows access to a record
The part of the computer system controlling data manipulation is called the
Sequential
Operating System
Hashed
ALU
Indexed
CPU
C
B
Random
Primary Storage
Schema and
subschema
BC94
BC101
BC102
BC106
For direct access storage devices the recording area is divided into
BC107
BC108
Which of the following hardware or software system controls provides a detailed record of
all activities performed by a computer system
Formula
Algorithm
Program
Data
Assembler
Memory protection
use the directory
search tools
Compiler
Parity Checking
Artificial Intelligence
Range checking
Parity Checker
Validation
B
B
Network
save copies of the file
with the same name on
the system
Program
System
Modem
backup to a secure
medium
Maintenance diagnostic
program
Systems logs
Parity check
Sound card.
CD-ROM
MIDI interface
Serial interface
BC110
Which one of the following parts of a computer is necessary to enable it to play music?
An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures,
15 minutes of sound and 1 minute of video. Which of the four different media listed takes up
most space on the CD-ROM?
Text
Pictures
Sound
Video
BC111
Which one of the following printers is suitable for printing sprocket fed carbon copies?
Laser
Dot matrix
Ink-jet
Drum
BC112
viewing an
encyclopaedia CDROM.
recording current
stock in a supermarket
and answering
customer queries.
BC113
replaced regularly
never updated
updated regularly
Document processor
Graphics package
retain confidentiality of
files
4096
virus infection
IPX/SPX
Spreadsheet
C
C
D
A
B
D
BC109
BC114
BC115
BC116
BC117
BC118
Database
get into the system
quickly
512
loss of confidentiality
TCP/IP
BC119
BC120
BC121
BC122
BC123
documents.
information.
text.
BC124
data.
Graphical
representation of
logic
Purchase, sales,
receipt, payments etc.
speed up access
IT management lacks
leadership.
It is mandatory in tally
prevent unauthorised
access
IT understands the
business
assist in maintenance
senior executive support
for IT.
allow encryption
BC125
BC126
BC127
BC128
BC130
input.
output.
The use of computers
to design state-of-theart, high-quality
Using computers to do
products.
architecture.
Application Service
specialist or functional
Provider
enterprise
local
BC131
BC132
BC133
preventive controls.
external hashing
detective controls.
static hashing
corrective controls.
dynamic hashing
D
A
B: (a) to (d)
preventive controls
C
C
Component
Interface
Settings
Control
B
C
BC129
BC134
BC135
BC136
BC137
(a) to (d)
BC139
BC143
BC144
BC145
BC146
BC147
BC148
Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio
BC149
BC150
BC151
BC152
BC153
Which of the following procedures should be included in the disaster recovery plan for an
Information Technology department?
Designing relationships among components is part of:
Several Computers connected together is called:
Which network topology uses a Hub?
Which of the following topologies is used for Ethernet?
BC154
BC142
Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best way to locate the files?
Create the files again.
Components of an information system model are: a) applications architecture; b) functional
architecture; c) technology architecture; d) information architecture
Benchmarks form part of:
Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run
totals
BC138
BC140
BC141
processing.
Software that generates
innovated designs and
artistic patterns.
(a) to (d)
preventive controls
C
C
problem logging
unit testing
call lights
data testing
(a) to (d)
program change
requests
thread testing
resolution procedures
loop testing
C
A
(a) to (d)
system walkthroughs
Job control
language.
benchmark testing
specifications matching
parallel operations
Multiplexer.
Peripheral processors.
Concentrator.
(a) to (d)
Replacement personal
computers for user
departments.
architectural design
Client-server
Star
Star
To maintain a backup
copy of are written all the
information
Identification of critical
applications.
interface design
Client
Bus
Bus
To do a particular job such
as editing, storing
information
Physical security of
warehouse facilities.
procedural design
Computer network
Mesh
Ring
Cross-training of
operating personnel.
data design
Hub
Ring
All of the above
B
A
C
A
D
To Store data in an
organised manner
BC155
BC156
BC157
Which of the following is recommended when many searches for data are required
Direct
Systems analysis and
applications
programming.
A sequential file on a
disk
BC158
It is unlikely that a magnetic tape containing several thousand blocked records can be used
on two machines of different architecture directly because
BC159
Which component of the CPU has the most influence on its cost versus performance
BC160
Which of the following terms applies to network used to connect computers with other
computers, peripherals and workstations that are in fairly close proximity
Sequential
Binary
Indexed
Data communications
hardware and software.
Computer operations.
A direct access file on
a tape
Information formats
commonly vary between
architectures
Control Unit
Distributed systems
Protocol
Generally require a
keyboard for data entry and
a CRT for display
BC161
BC162
Mixer
Modem
Multiplexor
Time sharing
computer
Allows computer
signals to be send
over a telephone line
Speeds up online
printing
BC163
BC166
BC167
BC164
BC165
BC168
RS-232 is a
BC169
What is a compiler?
BC170
BC171
BC172
BC173
BC174
Planetary network
Ring Network
Loop Network
Star Network
Office Automation
Executor systems
Electronic mailing
Instant post-office
A dumb workstation
An intelligent workstation
A personal computer
A mainframe PC
Encryption algorithms
Parity checks
All of them
Communication protocol
Device interconnect
standard
D
A
Type of cable
Terminal Standard
Modem
High-level languages
Middle-level languages
A compiler does a
conversion line by line as
the program is run
Feasibility study, system
design, and testing
CRC
An interpreter does
the conversion line by
line as the program is
run
Low-level languages
BC175
BC177
It is less prone to
attenuation
Accounting systems,
commercial sector
Relieve the main CPU
Manage the paging function in of repetitive
a virtual environment
communication tasks
BC176
BC178
System Analysis
Testing
BC179
Which of the following is not used for data transmission within a local area network
Fiber Optics
Coaxial Cable
Common carrier
System Analysis
involves creating a
formal model of the
problem to be solved
A buffer
Telephone Lines
C
B
B
B
C
A
A
Acoustic coupler
None of the above
C
B
All of them
secondary storage
access time
None of the above
alphanumeric form
None of the above
32 bits
BC180
BC181
BC182
BC183
BC184
BC185
BC186
BC187
BC188
Which of the following devices merges communication signals onto a single line
What is the decimal value of the octal number 215?
Port
327
Modem
141
BC189
Which tool is used to help an organization build and use business intelligence?
Data warehouse
BC190
BC191
BC192
BC193
BC194
BC195
BC196
BC197
BC198
BC199
D
A
A
A
A
BC200
A parity bit is
BC201
BC202
BC203
BC204
BC205
memory capacity
30
binary form
4C5
4 bits
Basic Coding
Description
1024 bits
10000
binary form
Mouse
used to indicate
uppercase letters
Because it squeaks
when moved
bits per second
Touch screen
BPS
Printing letters
Multiplexor
97
Data management
systems
secondary storage
capacity
256
decimal form
5C4
16 bits
It has ears
bytes
Joystick
MHz
Reading bar codes
D
D
C
B
B
BC206
BC207
In processing cheques which of the following I/O techniques have banks traditionally used
Which of the following is a pointing device used for computer input?
MICR
Hard disk
B
A
A UPS
BC209
BC210
Refillable ink
100K
Pencil lead
1.44 Mb
C
B
BC211
BC212
BC213
BC214
BC215
BC216
BC217
barcode scanning
CD-ROM drive
provides backup power
in the event of a power
cut
Light sensitive
elements
5 Mb
voice recognition
None of the above
BC208
OCR
Touch screen
increased the storage
capacity of a computer
system
hardware
Mouse
Touch screen
Printing letters
Touch screen
Mouse
Credit card
software
Keyboard
Light pen
Tracing Diagrams
Hard disk
Bar code reader
Mouse
Printed output
input
Printer
Scanner
Digital Signatures
CD ROM Drive
Keyboard
Printer
Back-up on a
Cartridge
A
B
C
B
A
B
A
BC218
output
Numeric Keypad
Joystick
Reading Bar Codes
Keyboard
Optical mark reader
Speakers
Storing information on the
hard disk
BC219
BC220
BC221
BC222
What are the individual dots which make up a picture on the monitor screen Called
A daisy wheel is a type of...?
What input device can be used for marking a multiple-choice test?
Laptop computers use
Coloured spots
Printer
Mouse
CRT displays
Pixels
Storage device
Bar code reader
LCD displays
Pixies
Pointing device
Optical mark reader
SSGA displays
screen layout
Mouse
keyboard layout
Optical mark reader
Pickers
CD-ROM
None of the above
none of the previous
word processing
software
None of the above
B
A
C
B
BC223
BC224
BC225
BC226
A GUI is
Where would you find a magnetic strip?
language interpreter
Speakers
software interface
Smart card
an operating system
None of the above
C
A
BC227
Multiprogramming refers to
hardware
Credit card
having several
programs in RAM at
the same time
multitasking
writing programs in
multiple languages
BC228
Multitasking refers to
BC229
an operating system
Second - generation
computers.
multiprogramming
Deep Blue
BC230
BC231
BC232
multitasking
First - generation
computers.
multitasking
Vishwajeet
BC233
is caused by wear
Bar code Reader
Technology
caused by overuse
Optical Mark Reader
Technology
BC234
Disk fragmentation
The technology which is used to check answer sheets of multiple-choice questions in civil
services or similar examinations is: -
BC235
BC236
BC237
A compiler is
Which printer among the following is fastest
Zipping a file means
C
A
C
BC238
a fast interpreter
Drum Printer
encrypting it
Very important reader
user sequence
writing programs in
multiple languages
To run more than one
program at the same
time
Third - generation
computers.
Multi-user
Param
is due to bad disk
blocks
Magnetic Ink Character
Recognition Technology
converts a program to
machine code
Desk - jet Printer
compressing it
Virtual information reader
& user system
BC239
Thermal Paper
An ink pen
None of above
An inked ribbon
and print head
BC240
BC241
mainframe technology
10-6 sec
LAN technology
10-3 sec
WAN technology
10-12 sec
B
D
Limit checks
Control figures
application
project
multiprocessing
system
model
multithreading
operating system
pilot project
multiplexing
communication
process
multitasking
D
D
D
mainframes
super computers
micro computers
BC247
BC248
_______ software enables users to send and receive data to/from remote computers
A _____ is a running instance of an application
Splitting of CPU's time for different tasks _______ prevents time slicing
______ computers are used in large organizations for large scale jobs which have large
storage capacities
_______ is responsible for all calculations and logical operations that have to be performed
on the data
______ printer use laser light
control unit
band printer
B
C
BC249
______ software enhances the user to enter ,store, manipulate and print any text
data management
word processing
electronic spreadsheet
BC250
BC251
BC252
BC253
integrated software
my computer
field
assembly language
communication software
recycle bin
file
machine language
idea processor
Microsoft exchange
record
high level language
B
B
C
B
terminator symbol
PC-at
multiprocessing
processed symbol
hp vectra system
multithreading
connector symbol
fazitsu vp200 series
multiplexing
input/output symbol
IBM-PC
none of the above
B
B
D
BC257
______ software enables users to send and receive data to/from remote computers
_______ is the temporary storage place for deleted files
_____ is a collection of related fields
_____ language consists of strings of binary numbers
______ symbol is used to represent processes like assigning a value to a variable or adding
a number
_______ is an example for micro computer
_________capability supports concurrent users doing different tasks
The ______ do not have processing power of their own and has only a screen, keyboard and
the necessary hardware to communicate with the host. For this reason, the terminals are
referred as_______________
"dumb terminals"
dumb servers
dummy terminals
dummy servers
BC258
BC259
wan
host
windows NT
back end
LAN
front end
D
D
BC260
host
server
back end
front end
BC261
Both the DBMS and the application resides on the same component in a ____system
When all the processing is done by the mainframe itself, the type of processing is
sometimes called as
DBMS models can be grouped under____ categories
PC
LAN
distributed computing
centralized
server processing
four
host processing
one
dumb processing
two
data processing
many
relational database
system
BC265
multiprocessing
multithreading
multiplexing
BC266
repairing
redo logging
disk defragmentation
disk mirroring
BC242
BC243
BC244
BC245
BC246
BC254
BC255
BC256
BC262
BC263
BC264
B
B
A
A
B
C
B
A
A
C
B
A
BC267
Code/De-code
Modulation/Demodulation
Module/De-module
BC268
BC269
BC270
BC271
Multiple changes to the same record or a field are prevented by the DBMS through______
_________allows an application to multitask within itself
LAN stands for __________ .
New process of execution is referred to as______
C
B
D
B
Transfer control
protocol/Internet protocol
Cells
System modulation
transfer protocol
Transfer communication
protocol/Internet protocol
Bits
Software Mail transmission
protocol
constraints
multiplexing
Local array of networks.
thread
Integrated Services
Digital network.
ARPANET
SQL * plus
GAN
Transmission control
protocol/Internet
protocol
Packets
Simple Mail transfer
protocol
B
B
B
C
locks
multithreading
Local area networks
process
Integrated Symbolic Digital
networks.
Internet
power builder
W AN
traps
none of the above
None of the above
client-server
BC272
BC273
BC274
BC275
fixes
multiprocessing
Linear area networks
task
Integrated system
dynamic networks.
Ethernet
visual basic
MAN
C
C
Transfer Protocol
Aggregate transfer
mode
Transmission protocol
Asynchronous transfer
mode
Hyper text
File server
platform
Printer server
configuration
Receiver
package
B
A
LAN and W AN
ATM
Internal Services Design
Network
B
A
C
BC276
BC277
BC278
BC279
The __________ protocol is a network protocol to be built for the World Wide Web .
BC280
BC281
BC282
BC283
BC284
BC285
BC286
BC287
BC288
BC289
W eb based Training
Bridges
procedure
alpha numeric
A
B
D
A
BC290
BC291
BC292
BC293
BC294
BC295
input, output,
performance ratios
mainframes
write
C
D
A
D
D
D
_______ printers use light to produce the dots needed to form pages of characters
impact printers
drum printers
multiplexing
converter
ram
non-impact desktop
printers
multitasking
process
output
BC296
BC297
multiprocessing
interpreter
input
operating system,
bootstrap, kernel, shell
multithreading
compiler
processor
monitor, program,
keyboard, bus
CPU, memory,
input, output
BC298
_______ software are programs that are complex and can be developed or purchased
operating system
application software
windows 95
interpreter
BC299
BC300
thermal printers
D
B
_______ is a set of special instructions used to communicate effectively with the computer
_______ converts a high level language into machine language
batch
processor
protocols
compiler
software's
assembler
procedures
coder
BC301
BC1
compiler
Integrated system
dynamic networks.
interpreter
Integrated Symbolic Digital
networks.
assembler
Integrated Services
Digital network.
BC10
BC11
File server
platform
Printer server
configuration
Receiver
package
B
A
BC12
BC13
LAN and W AN
ATM
Internal Services Design
Network
B
A
C
B
processor
BC14
BC15
BC16
BC17
BC18
W eb based Training
Bridges
procedure
alpha numeric
A
B
D
A
BC19
BC2
BC20
BC21
input, output,
performance ratios
None of the above.
mainframes
write
C
B
D
A
BC22
BC23
BC24
multiprocessing
interpreter
input
multithreading
compiler
processor
D
D
D
_______ printers use light to produce the dots needed to form pages of characters
impact printers
drum printers
multiplexing
converter
ram
non-impact desktop
printers
multitasking
process
output
BC25
thermal printers
BC26
operating system,
bootstrap, kernel, shell
monitor, program,
keyboard, bus
CPU, memory,
input, output
BC27
_______ software are programs that are complex and can be developed or purchased
operating system
application software
windows 95
interpreter
BC28
BC29
BC3
_______ is a set of special instructions used to communicate effectively with the computer
_______ converts a high level language into machine language
_______is/are a popular front end tool
batch
processor
visual basic
protocols
compiler
power builder
software's
assembler
SQL * plus
procedures
coder
all of the above
C
B
D
BC30
compiler
interpreter
assembler
processor
BC31
BC32
BC33
_______ software enables users to send and receive data to/from remote computers
A _____ is a running instance of an application
Splitting of CPU's time for different tasks _______ prevents time slicing
______ computers are used in large organizations for large scale jobs which have large
storage capacities
_______ is responsible for all calculations and logical operations that have to be performed
on the data
______ printer use laser light
application
project
multiprocessing
system
model
multithreading
operating system
pilot project
multiplexing
communication
process
multitasking
D
D
D
mainframes
super computers
micro computers
control unit
band printer
B
C
BC34
BC35
BC36
BC37
______ software enhances the user to enter ,store, manipulate and print any text
data management
word processing
electronic spreadsheet
BC38
BC39
BC4
BC40
BC41
integrated software
my computer
MAN
field
assembly language
communication software
recycle bin
W AN
file
machine language
idea processor
Microsoft exchange
GAN
record
high level language
B
B
B
C
B
terminator symbol
PC-at
multiprocessing
processed symbol
hp vectra system
multithreading
connector symbol
fazitsu vp200 series
multiplexing
input/output symbol
IBM-PC
none of the above
B
B
D
BC45
______ software enables users to send and receive data to/from remote computers
_______ is the temporary storage place for deleted files
When LAN connected together ,it is called __________ .
_____ is a collection of related fields
_____ language consists of strings of binary numbers
______ symbol is used to represent processes like assigning a value to a variable or adding
a number
_______ is an example for micro computer
_________capability supports concurrent users doing different tasks
The ______ do not have processing power of their own and has only a screen, keyboard and
the necessary hardware to communicate with the host. For this reason, the terminals are
referred as_______________
"dumb terminals"
dumb servers
dummy terminals
dummy servers
BC46
BC47
wan
host
windows NT
back end
LAN
front end
D
D
BC48
host
server
back end
front end
BC49
Both the DBMS and the application resides on the same component in a ____system
PC
LAN
Transfer control
protocol/Internet protocol
Transfer communication
protocol/Internet protocol
distributed computing
Transmission control
protocol/Internet
protocol
centralized
BC5
server processing
four
host processing
one
dumb processing
two
B
A
BC42
BC43
BC44
BC50
BC51
BC53
data processing
many
relational database
system
multiprocessing
multithreading
multiplexing
BC54
repairing
redo logging
disk defragmentation
disk mirroring
BC52
BC55
Code/De-code
Modulation/Demodulation
Module/De-module
BC56
BC57
BC58
BC59
BC6
Multiple changes to the same record or a field are prevented by the DBMS through______
_________allows an application to multitask within itself
LAN stands for __________ .
New process of execution is referred to as______
Data is broken into small unit called __________ .
constraints
multiplexing
Local array of networks.
thread
Packets
Simple Mail transfer
protocol
B
B
B
C
C
locks
multithreading
Local area networks
process
Bits
Software Mail transmission
protocol
traps
none of the above
None of the above
client-server
None of the above.
BC7
fixes
multiprocessing
Linear area networks
task
Cells
System modulation
transfer protocol
Transfer Protocol
Aggregate transfer
mode
Transmission protocol
Asynchronous transfer
mode
Hyper text
BC8
The __________ protocol is a network protocol to be built for the World Wide Web .
BC9
q_id
q_desc
OS 01
Which of the following computer software is designed to direct and assist the execution of
application programs
OS 127
OS 131
OS 132
OS 139
OS 193
OS 199
In processing cheques which of the following I/O techniques have banks traditionally used
OS 215
Disk fragmentation
OS 216
A compiler is
OS 217
An interpreter is
OS 219
OS 233
OS 234
OS 276
OS 277
If the Cancel Error Property of the CommonDialog Box is set to true then which of the
following statement is true:
__________ control defaults to displaying the files in the current directory:
A ____________ occurs any time a program writes more information into the temporary
space it has allocated in the memory.
Assessing a system requires certain common tools. Which of the following is NOT a tool
used to assess a system?
The ____________________ Web site has a utility that will tell you what software and
operating system a Web server is running.
When software vendors discover flaws in their software, they usually will write corrections
to their code, known as:
All ____________ have the option of blocking ports.
OS 278
OS 236
OS 238
OS 271
OS 274
OS 275
OS 280
Before shutting a service on an individual machine, which of the following would you
always check?
OS 281
At a minimum, which of the following should be implemented under the protection phase?
OS 282
OS 283
Attacks on your system may be prevented or trapped through the use of:
Setting restrictions as to the number of unique passwords to use before a user can
recycle them is called a password:
OS 284
OS 286
To prevent a hacker from unauthorized access, what should you do with the administrator
account?
OS 287
OS 289
OS 291
One step you can take to reduce the risk of being infected by a virus is to:
OS 292
Which of the following is NOT a sign that a virus has infected your system?
OS 293
OS 294
Which of the following is the safest way to protect yourself from e-mail viruses?
A ____________ attack causes too much information to be placed into temporary memory
space.
OS 295
OS 296
OS 299
OS 300
Which of the following would NOT be a way to protect your system from spyware?
OS 309
OS 329
OS 355
OS 356
OS 357
OS 396
Which of the following actions would move a floating toolbar to dock it in a different place?
OS 397
OS 399
OS 495
OS 496
OS 497
OS 498
A(n) _________ offers on-demand software on an as-needed basis to its clients over the
web.
OS 502
_________ are systems used to interact with customers and run a business in real time.
OS 504
OS 505
OS239
To destroy an object and free the memory space occupied by it, the keyword used is:
op1
op2
op3
Operating
system
Saved to the
disk
Address bus
Control bus
Super
computers
MHz
barcode
scanning
is due to bad
disk blocks
op4
Database
management
system
Application
Software
Deleted from
the disk
Data bus
Data bus
Personal
computers
BPS
Utility
Programs
Copied from
the disk
Auto bus
Address bus
Parallel
computers
MIPS
OCR
is caused by
wear
MICR
caused by
overuse
a fast
interpreter
converts a
slower than program to
none of the
an interpreter assembly code previous
faster than a
compiler
encrypting it
None of above A
None of above A
None of above C
None of above
VLSI
voice
recognition
none of the
previous
A
B
B
B
translates
and executes
programs
converts a
statement by program to
none of the
machine code previous
B
statement
compressing
decrypting it
transmitting it C
it
an assembler a compiler
the ALU
A runtime
error can
result if the
user clicks
the cancel
button
File List Box
memory
overflow
ans
the CU
an interpreter a linker
the power
None of the
above
cord
The program
executes
A compile time without any
error occurs
error
Dir List Box
Drive List Box
systems
overload
RAM overflow
You need to
carry out
conditional
compilation
Combo Box
buffer
overflow
A
C
A
A
D
Netcop
NetBrute
Netcraft
D
NetBIOS
www.nettools.c www.WhoIs.co www.netcraft.c www.netstat.co
om
m
om
m
C
code correct.
firewalls
patches.
switches
It can consist
of hardware,
software, or
both.
It hides your
network.
updates.
hubs
upgrades.
scanners
It is a barrier
between your
One of its
network and
techniques is the rest of the
packet filtering. Internet.
B
A
renewal.
Install and
keep current
antivirus and
anti-spyware
programs.
Delete it and
change the
Delete it from built-in guest
the system and account to a
use the guest power user
account.
account.
Tapes can be
used over and Tapes and
over, and CDs CDs can be
should be kept thrown away in
forever.
the trash.
Trojan horse
Virus
place a router
between your
ISP and your add spyware to
system.
your system.
System acts
abnormal
Update
antivirus
software.
virus
A virus
Router
a proxy filtering
system.
A
age.
history.
Limit users
ability to
configure the
workstation.
Disable it and
create a
nondescript
user account
with
administrator
rights.
Block all
incoming
traffic on a
network.
Tapes should
be melted and
CDs broken.
IP spoofing
download
files from
reliable Web
sites.
Create another
administrator
account to
confuse the
hacker.
C
Give them to a
recycle shop. C
Spyware
C
hone your
programming
skills.
Problems
with your
wireless
Files are
Printing
missing
problems
mouse
Never open
an e-mail
attachment
unless you
Turn off the
Do not
auto-launch in know what it
is and who
propagate
your e-mail
hoax viruses. client.
sent it.
buffer
Trojan horse
spyware
overflow
A buffer
A Trojan horse Spyware
overflow
D
D
C
Obtain
usernames
Obtain system
Check for open and
IP addresses Obtain cookies ports
passwords
E-mail and
Backup file
attachment
Download
scanning
scanning
File scanning scanning
Use your
Do not open
browsers
attachments in Avoid skins Use
security
unknown eand toolbars encryption
settings
mails
download
software
Administrative
Network
assistant to the
Junior
president
Cook
accountant
administrator
The Open
The Save
The Standard The Formatting command on command on
toolbar
the Edit menu the File menu
toolbar
tiling.
cascading.
minimizing.
multitasking.
whether the
worksheet
prints in
the default file landscape or the number of the margins on
location of
portrait
windows you
the printed
orientation
have open
DOCUMENT
new files
A
A
shrinking
multitasking
minimizing
cascading
Click on any
border and
drag.
Click on any
corner and
drag.
Click on the
title bar and
drag.
You cannot
move a floating
toolbar.
C
right mouse
button
anywhere on
the Word
window,
choose the
Customize
command from
the contextsensitive
menu, and
check the box
for the missing
toolbar from
the Toolbars
tab dialog box.
left mouse
button
anywhere on
the Word
window,
choose the
Customize
command from
the contextsensitive
right mouse
left mouse
menu, and
button on any button on any check the box
visible toolbar, visible toolbar, for the missing
and click on
and click on
toolbar from
the missing
the missing
the Toolbars
toolbar.
toolbar.
tab dialog box. B
All
documents
are
automatically
saved with a The password
default
is casesensitive.
password.
nonprotective
public domain open source
software.
software.
nonprotective
public domain open source
software.
software.
on-demand
on-demand
computing.
software.
Once a
document is
protected by a
password, it
cannot be
opened without
that password.
protective
open source
software.
protective open
source
software.
utility
computing.
best-cost
provider
Web service
provider
software
provider
Operational
systems
Passwords can
be up to only
seven
characters
long.
A
proprietary
software
proprietary
software.
utility software. B
application
service
D
provider
Informational
systems
hardware
power outages. failures.
Structured
Office
query systems automation
All of the
floods.
above.
hot
cold
empty
dormant
Delete
Kill
Nothing
New
A
D
q_id
DA1
DA2
DA3
DA4
DA5
DA6
DA7
DA8
DA9
DA10
q_desc
op1
Field
Horizonta
l
Duplicate
Value
Cross
Tabulate
op2
Record
op3
Both
Vertical
A or B
Combined
Value
Gaps
Filter
Merge
RAND()
VLOOKU HLOOKU
P()
P()
TRUE
FALSE
TRUE
FALSE
Unusual Strange
A or B
exception compariso duplicates
testing
n of data testing
True
False
True
Limit
False
Sequenc
Range
e
Excel
Access
True
False
False
True
Valid
Signs
Transactio Limit
n type
Check
DA17
DA18
DDE
DA11
DA12
DA13
DA14
DA15
DA16
Both
HLOOKU VLOOKU
P
A or B
P
OLE
ODBC
op4
None of
the above
None of
the Above
All of the
above
None of
the above
ans
A
A
C
A
None of
the above B
A
A
None of
the above C
All of the
D
above
A
A
Both B &
C
None of
the above B
A
B
Reasona
bleness D
None of
the above B
All of the
above
C
q_id
PP1
q_desc
op1
clipart &
auto
shapes
PP4
PP5
clip
________ and ______ have the ability to add a lot of visual impact into the PowerPoint gallery &
presentation
word art
PP6
PP7
The user can use ______ to remove the undesirable part of the image
PP8
clipping
tool
color
palette
PP9
PP10
PP11
The set three colors used for graphs and for secondary slide items is called as
There are ______ types of charts available in PowerPoint
_______ charts are useful while showing variations over a period of time
ascent
10
column
PP12
images
PP13
PP14
entity
Microsoft
organizat
ion chart
PP16
the
organizati
on chart is
expanded
PP17
The _____ are used for selecting, editing and viewing objects in the chart
box tools
PP2
PP3
PP15
wave file
circular
PP18
used to
mange
organizati
onal chart
PP19
turned on
PP20
PP21
once
two
PP22
The _____ tool is used in the same way as we use a pen to draw a table
PP23
native tool
autolayout
s
PP24
PP25
The size of the object can be changed using the ______ tool
_______ is the process through which the slides in the current presentation are
included in another presentation or application
PP26
PP27
PP28
PowerPoint can import text files that have been saved in ______ format
PowerPoint outlines can have _____ outline levels
zoom
importing
Microsoft
excel
PP31
.ppt(Powe
rPoint)
nine
.rtf(rich
When a file is saved with _____ extension, the graphics and text are also saved along text
with the slide
format)
not
displayed
during
the slide
The hidden slide is
show
DTS(digit
al track
____ effect is used to introduce a slide during a slide show
sound)
PP32
A _____ is a special effect that determines how the objects appear on the slide
PP33
PP34
PP35
When a new presentation is opened ,powerpoint creates slides that have a width of
_____ and a height of ______ with the landscape orientation
outline
view
15
inches,10
inches
PP36
The default orientation for notes ,handouts and outlines is ____ orientation
portrait
PP29
PP30
build
notes
master
PP37
animatio
n
PP38
gif
PP39
hyperlink
PP40
PP41
visual c++
macro
PP42
while
creating a
.exe file
virus
checkers
PP44
PP45
slide pane
PP46
internet
explorer
With reference to autocontent wizard for creating a new presentation, which of the
following statements are not true
PowerPoi
nt creates
a sample
presentati
on to
which
user can
add words
and
pictures
user can
insert
objects
like cliparts,
pictures
stored in a
separate
files to the
slides
PP43
PP47
PP48
PP49
With reference to changing the order of slides, which of the following statement is not
true
PP50
in outline
view, drag
the slide
icon to a
new
location
the slide
that holds
the
formatted
placehold
ers for the
titles,
main text
and any
backgroun
d items
that user
wants to
appear on
the slides
is called a
master
templates
with notes
pages
view user
can
prepare
speaker
notes and
handouts
PP51
PP52
PP53
The options available in the common task toolbar does not include
the slide
that holds
the
formatted
placehold
ers for the
titles,
main text
and any
backgroun
d items
that user
wants to
appear on
the slides
is called a
master
template
slide
layout
PP56
PP57
data to be
graphed
resides in
a
datasheet
With reference to chart, which of the following statements are not true
window
the
The format of the text entered in a title, subtitle, or bulleted-list object is determined by master
the format settings in a special slide called -------slide
PowerPoint provides a _________ that searches the entire presentation i.e., all the
office
text objects in all the slides, outlines, notes and handouts for spelling errors
assistant
PowerPoint's drawing toolbar contains _______ drawing tools
10
PP58
Click _______ on the rectangle drawing tools enables us to draw multiple rectangles
once
text,
graphics
and email
address.
PP54
PP55
PP59
PP60
the Line
style
PP61
Fill color
What happens when you double click a blank graph placeholder in a PowerPoint
presentation?
Excel is
started so
that you
can create
a chart.
PP62
PP63
PP64
always
taken
from the
first row of
data in the
The legend in a Microsoft Graph chart is:
datasheet.
Side-bySuppose you are creating a Microsoft Graph of quarterly sales by region. Which would side
be the best chart type if you want to emphasize the total sales of each region?
column
Which of the following actions will enable you to insert a graph into a PowerPoint
presentation?
Pull down
the Insert
menu and
select
Chart.
PP66
If you are editing a slide containing a Microsoft Graph, how do you display the
underlying datasheet?
It
automatic
ally
displays in
Slide
view.
PP67
How do you deselect a chart that has been placed onto a PowerPoint slide after you
have finished creating the chart?
Single
click the
chart.
PP65
What happens when you click the Datasheet button on the Microsoft Graph toolbar?
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
linked to
the
PowerPoi
nt
presentati
on.
What happens if you single click a chart that is not currently active?
The chart
is
selected.
What happens if you double click a chart that is not currently active?
The chart
is
selected.
PP71
a slide
one bullet
item at a
time.
PP72
Subtle
PP68
PP69
PP70
PP73
PP74
PP75
PP76
Enter and
exit
Enter
the way
objects
appear on
a slide.
Which of the following best describes the information that appears on the advanced
timeline?
The
advanced
timeline
shows the
sequence
in which
objects
will
appear on
the slide.
PP77
Clips
PP78
What type of program allows an object within an image to be edited without affecting
other objects?
Paint
program
PP79
Fly in
PP80
PP81
PP82
PP83
Once data
is entered
it cannot
be
changed.
OLTP.
You can
change
the
appearan
ce of a
whole
diagram,
but not
individual
shapes of
a
diagram.
[Enter+A]
op2
op3
op4
ans
autolayo
uts and
presentat slide view
ion
& outline none of
the above B
templates view
points
squares
image
grid
short cut auto
shapes
menus
icons
guide
all the
above
slide show
& view
fonts &
show
images
media
.video file
clip
cropping
tool
color box
tricolor
scheme
28
bar
images
and text
radar
data
point
none the
above
all the
above
scribble
cutting
drawing
tool
tool
color
color
scheme guide
primary
color
color
palette
scheme
36
18
pie
linear
slide
sorter
views
slides
all the
doughnut above
data
auto
shapes
the chart
window
the chart opens
displayin
is made
available g a chart
for editing template
custom
general
purpose drawing
tools
tools
clip art
A
B
A
C
A
C
A
C
A
stream
track
changes
none of
the above C
standard
drawing
tools
C
used to
create a
manager
box for
accessed an
existing
only by
manager box
not
available
in the tool
turned off bar
used to
store the
other tools
of the
organizati
onal chart C
available
in the tool
bar
any of the
twice
above
thrice
five
eight
four
standard all the
above
draw tool tool
handlayo
none of
slide
view
these
uts
reduce/e
none of
preview
the above
nlarge
C
B
B
B
B
exporting
auto
shapes
.rtf(rich
text
format)
only one
.wmf(win
dows
metafile)
copying
displayed
only
during the
slide show
3D(3
dimension
)
displayed
only in
outline
none of
view
the above A
transition
slide
master
moving
drawing
clip art
tools
.html(hype
.doc(docu rtext
ment)
format)
twelve
six
.txt(plain
text)
B
A
B
C
.doc(docu
ment)
B
both a and
b
transition D
A
A
B
A
jpeg
png
action
hypertext button
visual
basic for Microsoft
applicatio visual
interdev
n
batch file templates
when the
slide
during
show is
slide
transition run
spell
header
checkers files
custom
both a and
b
show
notes
properties
pane
pane
b or c
none of
the above D
all the
D
above
all the
above
add-ins
none of
the above
all the
above
none of
the above
outline
pane
power
paint shop paint shop point
pro
pro
2000
B
A
C
A
B
D
it is the
quickest
way to
create a
presentati
on
contains
sample
presentati
ons for a
variety of
topics
provides
suggeste
d content
and
D
design
user can
insert
only predrawn,
precolored
graphic
images
reflected
in a clip
arts to
the slides
user can
insert
picture to
the
master
slide
which gets
reflected
in all the
slides
using that
master
slide
user can
insert
picture to
the title
slide
which gets
reflected
in all the
slides
using that
title slide B
in notes
pages
in slide
view,
sorter
view, drag drag the
the slide slide icon
to a new to a new
location
location
I slide
view, drag
the slide
icon to a
new
location
C
design
templates
is the
template
transition whose
means
format
applying and color
special
scheme
effects to user
the
applies to
crossover a
between presentati
the slides on
the slide
that
holds the
formatted
placehold
ers for
the title
and subtitle for
the
presentat
ion is
called a
title
template D
in outline
view, user
can see
the
miniatures
of all
slides in a
presentati
on,
complete
with text
and
graphics
the slides
can be
reordered
in the
outline
view
B
user
should
select the
slide view
to add the
text to the
slide
design
template
is the
template
transition whose
means
format
applying and color
special
scheme
effects to user
the
applies to
crossover a
between presentati
the slides on
customiz
new slide
e
the slide
that holds
the
formatted
placehold
ers for the
title and
subtitle for
the
presentati
on is
called a
title
template D
set up
show
B
by
default,
doughnut
chart is
displayed
based on
the data
in the
datasheet
user can
add data
labels and
gridlines
to the
chart
B
the slide
master
spell
checker
12
data is
plotted in
a chart
window
the
header
slide
grammar
checker
102
twice
three
the format
slide
B
none of
the above B
22
B
four times B
text,
text,
CD-ROM, hypertext
, Power
hypertext digital
Point,
and
camera
video and
Power
and
Point.
sound.
D
sound.
the Line
color
Line
style,
Line
color,
the Font text font,
and text
and the
alignmen
text
alignment t
D
Fill color,
Line
color,
and Line
Line
Line color thickness thickness D
A popup
Microsoft
box
prompts Graph is
you for an started
so that
existing
The graph
you can placehold
Excel
create a er is
chart to
insert.
deleted.
C
graph.
taken
from the
first
column or
row of
data in the
datasheet,
always
depending
taken
on
from the whether
first
the data
column of series are
data in the in rows or entered by
datasheet. columns. the user. C
Stacked
column
Pie chart
Line chart B
Click the
Insert
Chart
button on
the
Standard
toolbar.
Click the
chart
object,
then click
the View
Datashee
t button
on the
Standard
toolbar.
Double
click the
chart.
Pull down
the Insert
menu and
select the
appropriat
e Object.
Pull
down the
Insert
menu
and
select
Chart,
click the
Insert
Chart
button on
the
Standard
toolbar,
or pull
down the
Insert
menu
and
select the
appropria
te Object. D
You
cannot
display
Pull down the
the Edit
underlying
menu,
datasheet
then
once the
select
slide is
Object.
finished. B
Change to
Click
Slide
outside
Sorter
C
the chart. view.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
embedde
d in the
PowerPoi
nt
presentati
on.
The
datasheet
window
is
toggled
from
The
datasheet closed to
is saved open (or
from
as a
separate open to
file.
closed). D
The chart
The chart is doubled
is deleted. in size.
The chart
The chart is doubled
is deleted. in size.
The
applicatio
n that
created
the chart
is started. A
Microsoft
Graph
will
D
restart.
a slide
one
bullet
item at a
time,
build
bullet
items a
letter at a
time, and
build
bullet
bullet
bullet
items one items one items a
letter at a word at a word at a
time.
time.
D
time.
Subtle,
Moderate
, or
Moderate Exciting
Exciting D
Both
enter and
exit, and
Fly in from fly in
from top
top or
bottom
or bottom
Alt
Shift
Neither
enter nor
exit;
neither fly
in from
top nor
bottom
C
Ctrl
B
Custom
what
objects do
after they
appear on
a slide.
animatio
n can be
used to
affect the
way
objects
appear
on a
slide, to
what
objects
do after
they
appear
on a
slide, and
to the
way
objects
exit a
D
slide.
the way
objects
exit a
slide.
The
advanced
timeline
shows
the
sequence
in which
objects
will
appear
The
advanced on the
slide and
timeline
shows the the
duration duration
of the
of the
effect
effect
applied to applied
to each
each
object.
object.
The
advanced
timeline
shows
neither the
sequence
in which
objects
will
appear on
the slide,
nor the
duration
of the
effect
applied to
each
object.
C
Organizati
on charts Text
Draw
program
Filtering
program
Dissolve
in
Data
Once
cannot be
data is
entered
entered it into
can be
Datasheet
changed. .
OLST.
OLAP.
You can
change
both the You
appearan cannot
ce of a
change
whole
the style
diagram of the
and the
connectin
individual g lines in
shapes of an
a
Organizati
diagram. on chart.
[Shift+Z] [Alt+Z]
From top
Clips,
organizat
ion
charts,
and text D
Animation
program A
Fly in,
From top,
and
Dissolve
D
in
There is
no such
thing as a
Datasheet
.
B
OLIP.
B
You
cannot
change
the color
of the
boxes in
an
Organizati
on chart. B
[Ctrl+Z] D
q_id
BC1
BC10
BC11
BC12
BC13
q_desc
BC26
BC27
BC28
BC29
BC3
BC30
BC31
BC32
op1
op2
Integrated
Integrated system Symbolic Digital
dynamic networks. networks.
File server
Printer server
platform
configuration
alpha numeric
space occupied,
price, no. of users
allowed
alpha beta
cost,
performance their
ratio
Ethernet
Internet
mini computers
microprocessors
input
output
multiprocessing
multithreading
interpreter
compiler
input
processor
impact printers
operating system
drum printers
control program,
interpreter,
assembler,
compiler
application
software
batch
protocols
processor
visual basic
compiler
power builder
compiler
interpreter
application
project
system
model
operating system,
bootstrap, kernel,
shell
multiprocessing
multithreading
super computers
arithmetic and
control unit
logic unit
band printer
drum printer
word
data management processing
communication
integrated software software
mainframes
BC39 _______ is the temporary storage place for deleted files my computer
recycle bin
WAN
file
machine
assembly language language
processed
terminator symbol symbol
hp vectra
PC-at
system
multiprocessing
multithreading
file management
system
hierarchical
database system
multiprocessing
multithreading
repairing
Code/De-code
redo logging
Modulation/Dem
odulation
fixes
locks
BC7
BC8
BC9
multithreading
Local area
networks
process
Bits
Software Mail
System modulation transmission
transfer protocol
protocol
Transmission
Transfer Protocol protocol
Aggregate transfer Asynchronous
mode
transfer mode
op3
op4
ans
Integrated Services
Digital network.
Receiver
package
system
numerous alpha
input, output,
performance ratios
ARPANET
PCs
mainframes
feed
write
multiplexing
multitasking
converter
process
ram
non-impact desktop
printers
output
thermal printers
monitor, program,
keyboard, bus
CPU, memory,
input, output
windows 95
interpreter
software's
procedures
assembler
SQL * plus
coder
all of the above
B
D
assembler
processor
operating system
pilot project
communication
process
D
D
A
B
D
multiplexing
multitasking
micro computers
B
C
electronic spreadsheet
idea processor
Microsoft exchange
GAN
record
B
C
connector symbol
input/output symbol
IBM-PC
multiplexing
dummy terminals
dummy servers
windows NT
LAN
back end
front end
back end
front end
distributed computing
centralized
Transmission control
protocol/Internet protocol None of the above.
dumb processing
two
data processing
many
B
A
relational database
system
D
multiplexing
disk defragmentation
disk mirroring
Module/De-module
constraints
traps
multiplexing
B
C
C
Hyper text
# of occurrences
1