ITT Training Most Important 1500 Questions PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 202

OPTIONS

QUESTIONS A B C D ANS
TALLY
The ------ key can be used to None of
select an existing company F1 ALT+F1 CTRL+F1 the A
from list of companies. above
Import and Export of data
None of
between Tally and other Tally
Tally IMP Tally INI the A
programs is possible only ODBC
above
through ---------- Program.
The re-order point is the
inventory quantity that
TRUE false A
trigger a stock replishment
activity.
A created company's detail None of
can be modified through F3 ALT+F3 CTRL+F3 the B
keys above
A/An ------------- is the
official notice that the firm None of
sends to its customers to Invoice Bill A or B the C
advise then to the amount of above
money that is owed.
In tally,all masters have
Two Three Four Five B
________main options
In tally,to create a new None of
Alt+Ctrl+
column in balance sheet Ctrl+C Alt+C the B
C
press _______ above
In tally,the use of group
behaves like a sub-ledger,
option is that we can
TRUE FALSE A
summarize many ledger
accounts into one line
statements
In tally, we can alter ledger
details using either single or
multiple modes but not TRUE FALSE A
alble to delete a ledger from
multiple modes.
In tally,a group company is
* $ & ^ A
marked with an ______________
Puchasi
ng,
The systems that work Puchasing Accounts
Puchasing Receivin
together to order,receive, and payable
and g and D
and pay for replenishment of Accounts and
Receiving Account
stock are --------------- payable Receiving
s
payable
Tally allows to delete a Mone of
ledger from --------- Single Multiple A or B the A
alteration mode. above
--------------------- is/are Fund Flow All of
Cash Flow Ratio
useful for management in Statement the D
Statements Analysis
the decision making. s above
In tally,the group company
must contain at least Two Three Four One A
_____________ members
To cancel a vourcher entry
in Tally, short-cut key is ------ Alt+D Alt+X Ctrl+T Ctrl+D B
-----
Create Alter Display All of
The accounting masters and
Informatio Informatio Informati the D
inventory masters related to
n n on above
We press ------------- function
key to display the age-wise
F4 F5 F6 F7 C
analysis of Bills Receivable
or Bills Payable report
None of
In Tally, we press ------------,
Alt+P Ctrl+P Shift+P the A
to print report .
above
In Tally, Types of Accounts
and Types of Vouchers
Journal
passed during the period, Tally Audit Statistics Day Book B
Book
can be seen in -------------
report.
In the Tally Software, the ----- None of
------- directory stores all Bin Data Sub the B
data entered by the user. above
The Ledger Accounts are
unique in Financial True False A
Accounting Packages
Customers can be permitted
Enterprise Enterprise Electron
to enter their own data into
Data Data - ic Data All of the
the firm’s computer using C
Interchang Informatio Intercha above
the firm’s wide area network
e n nge.
is an example of
In Tally, we can customize
the Vouchers as per our TRUE FALSE A
requirements
The number of steps in
2 3 4 5 C
Accounts Compilation are
Each action/transaction of a
data data All of the
firm is described by a ---------- Field B
element record above
------.
Tally is based on mercantile
FALSE TRUE B
accounting system
Display
None of
stock Open Change
Ctrl + N is used to ----------- the B
valuation Calculator Period
above
method
------------- in Tally classify
None of
the accounts under different
Ledgers Groups Journals the B
heads so that summarised
above
information is possible.
Revenue Account also None of
known as -------------- Personal Nominal Real the B
Account above
All of
Method of Voucher
Manual Automatic None the D
Numbering is/are
above
Accounts Receivable are Balance Profit & Journal All of the
A
displayed in Sheet Loss Book above
To assemble a product from Physical
Stock Reversin
different items -------------- Journal Stock B
Journal g Journal
entry is used Transfer
A --------- purchase orders
data flow is directed to the
None of
purchasing system for use in
Filled Receipt Issue the A
closing out the outstanding
above
purchase orders in the
receiving system diagram.

Tally provides at least ---------


11 16 18 21 B
predefined voucher formats
The value of the inventory is
FALSE TRUE B
included in a ledger
" The buyers can follow up
manageme managem electroni
with the suppliers to All of the
nt by ent by c data B
determine the reasons " is an above
objective exception analysis
example of -----------------
From voucher entry mode , if
we press __________ then we F4 F5 F6 Alt+f5 B
get payment voucher in tally
Primary
Default Cost Category in Main All of the
Primary Cost C
Tally is/are -------------- Location above
Category
A Group Company is simply
a name and an identify given
to the merged accounts True False A
member companies of the
group.
A ----------- is a primary None of
Voucher
document for recording all Ledgers Reports the C
s
financial transactions. above
The field can have a value
between ________________ in FA 0 to 9 1 to 100 10 to 60 None A
Package.
The _______ file maintains
data that describes the
All of the
supplier past transaction Supplier Suspense Order A
above
with the firm in terms of
material quality in AIS
It is necessary to manipulate None of
Informat
data to transform it into ------ Report Output the C
ion
---------- above
In tally, to change the date of
F2 F4 Ctrl+f2 Ctrl+f4 A
the voucher press ______
Net None of
Tally can maintain budgets Closing
Transactio A and B the C
on ---------------- Balance
ns above
The value of the inventory is
included as an asset on the True False A
balance sheet
In ratio analysis report of
Tally FA packagewe we
F6 Alt + f6 F7 None of
press ________________ function
function function function the A
key to the display of bills
key key key above
receivable , bills payables
report
The accounts payable
None of
system is responsible for
Sales Purchases A or B the B
paying the suppliers for the --
above
---------------
What is the default financial 1-4-1996 1-4-1997 None of
1-4-1995 to
year in Tally6.3 to 31-3- to 31-3- the B
31-3-1996
_________________ 1997 1998 above
Tally encrypts and stores
TALLY DATA at the data True False A
directory
The Profit & Loss statement None of
can be displayed in ------------- Horizontal Vertical A or B the C
--- format(s). above
Balance
sheet &
Profit &
profit & Cash and
Default ledger accounts in loss and Cash and
loss profit profit & C
tally are ______ trial bank
& loss and loss
balance
trial
balance
None of
Default 'godown' name in Main
Primary A or b the B
tally is ____________ location
above
Security None of
'Tally vault' is a Cost
mechanis Ledger a/c the A
_________________ category
m above
To create a sales voucher in
tally , you have to press F5 F7 F8 F9 C
_______
A Group Company is -----------
None of
-------------- given to the
a name an identity A and B the C
merged accounts of member
above
companies of the group.
In tally,"credit note" voucher None of
Sales Purchase
type records entry for a or b the A
return return
________________ above
In tally you get currency None of
Company Stock Regional
symbol option from _______ the A
creation items units setting
menu above
------------------ gives the
None of
balance for each day for the Trial Balance
Daybook the B
voucher type has been Balance Sheet
above
selected.
For 'stock journal' entry we
F7 Alt + F7 F10 F11 B
press ______________ in tally

Tally provides the capability Changes in


Changes in None of
to the administrator/auditor transaction Both A
Ledger the C
to track changes in the areas s or and B
Masters above
is/are vouchers
In tally, types of users are
2 3 4 1 B
_______________
By pressing -------- key, a list
of inventory reports can be
F9 F10 F11 F12 A
displayed straightaway from
the balace sheet report
Projected approximation of
Balance Profit &
income or expenses is called Budget None C
sheet loss a/c
______________ .
"Administrator" type user is
also called 'Auditor' of a TRUE FALSE A
company in Tally
You will get company
None of
information , if you press
F3 Ctrl+F3 Alt+F3 the C
__________ from gateway of
above
tally
A constituent(member)
company can be a member TRUE FALSE A
of more than one group.
Default stock category in Main None of
Primary Symbol B
tally is ______ location them
To create a log of the
import activity in a file
_____________ is located in
Tally.imp Tally.ini A or b None A
the same directory as an
executable program in
tally
In Tally,inventory valuation None of
Stock Stock Stock
method option is available the A
summary journal analysis
from _______ above
During In 'comp
By pressing
Tally audit feature is the info ->
F11
available in a company creation security None B
function
__________________ of a control'
key
company option
In tally, a group company
can also be a
TRUE FALSE A
constituent(member) of
another group company
Default number of groups in
128 228 28 16 C
tally are ________
During voucher entry ---------- Ledger Sub-
Groups B or C A
--- are used. Accounts Groups
User designated as ------------- Administr Data TallyVau
Owner A
-- can view audit list. ator Entry lt
One
Other
company to
programs -
another
a None of
Tally supports Importing of company Both A
spreadshe the C
data from ---------------- created and B
et or a above
withon
database
Tally
file.
Package
In an accounting information
system, which of the Inventory Cash Payroll
Cash
following types of computer subsidiary disbursem transacti A
receipts.
files most likely would be a . ents. ons.
master file?

Eliminat
Will be
Will es the
more
Which of the following is an Does not produce a need to
efficient
advantage of a computer- require as more reconcile
at
based system for transaction stringent a accurate control
produci C
processing over a manual set of set of accounts
ng
system? A computer-based internal financial and
financial
system: controls. statements subsidiar
stateme
. y
nts.
ledgers.

an
data that the instructi
data to be has been address on that
The memory address
transferred transferre of a has been C
register is used to store
to memory d from memory transferr
memory location ed from
memory
FUNDAMENTALS OF
COMPUTER
Exceptio
Inefficient usage of excess System
Contingenc Capacity n
computer equipment can be feasibility C
y Planning Planning reportin
controlled by report
g
Which of the following is not AGP
NIC Card VSAT RAM B
the component of a CPU Card

A trailer label is used on a


Control
magnetic tape file, it is the End-of-
Identifica totals for
last record and summarises Record file and
tion one or B
the file. The following is an Count end-of-
Number more
information not found in the reel code
fields
trailer label

Storing
Writing on
Hard copy is a term used to Printed informati None of
a hard B
describe...? output on on the above
board
hard disk
Voice
Voice Visual
What do the abbreviations activated None of
answer audio C
VAB stand for broadcastin above
back board
g
What control would prevent
File Limited
the accidental erasure of Validity Boundary
protecti access C
customer information from a check protection
on ring files
magnetic tape

What are the individual dots


Coloured None of
which make up a picture on Pixels Pixies B
spots above
the monitor screen called?
Header label normally
Identificati Reel Batch
include all the following File Name D
on number Number Total
except the
Storage Pointing None of
A daisy wheel is a type of...? Printer A
device device above
Which approach or
Data
technique is a control System Physical Console
Dictiona B
usually associated with Logs Security Log
ry
microcomputers
An inked
ribbon
An impact printer creates Electrically None of
An ink pen and C
characters by using...? charged ink above
print
head
Require Make
The best security control in a Restrict Use only
user duplicate
microcomputer environment physical unremova A
password copies of
is to access ble media
s files
What would you NOT use None of
A pen Paper Eraser C
with a flatbed plotter? above
What do you need for an ink A A
A drum A ribbon A
jet printer? cartridge cassette
Centralis Distribut
The greatest control Centralise ed ed
exposure in a Separation d function function policies
A
microcomputer environment of duties for PC for PC or
is the lack of acquisition Dispositi procedur
on es
A laser printer does NOT A print A laser An INK None of
C
use? head beam RIBBON above
The amount of data that a
Storage None of
disk may contain is known Volume Size C
capacity above
as the disks...?
You can ________ protect a Read and None of
Read Write B
floppy disk. Write above

Information on a hard disk is Magnetic Floppy None of


PAN drive A
usually backed-up using a...? tape disk above
Serial Random A parallel
None of
Magnetic tape is a...? access access access A
above
medium medium medium
Hard disks can have a
None of
storage capacity in the 1.44MB 20 GB 700MB B
above
region of...?
Magneti
Which storage device has A floppy None of
A CD-ROM c tape C
the largest capacity in Mb? disk above
storage
Magnetic
Which storage device cannot A floppy None of
A CD-ROM tape A
be erased? disk above
storage
Where should floppy disks By a sunny By magnet In a None of
C
be stored? window objects drawer above
The contents of these chips
RAM CDROM None of
are lost when the computer ROM chips B
chips chips above
is switched off?
What are responsible for
ROM DRAM None of
storing permanent data and RAM chips B
chips chips above
instructions?
Which parts of the computer
None of
perform arithmetic ALU Registers Logic bus A
above
calculations?
What are small high speed
Control None of
memory units used for CPUs Registers B
unit above
storing temporary results?
How many bits of
information can each None of
0 bits 1 bit 8 bits B
memory cell in a computer above
chip hold?
What type of computer chips None of
RAM chips ROM chips CACHE A
are said to be volatile? above
Systems
Network Business
software
software software None of
Software can be divided into and
and and the B
two areas: applicatio
security games above
n
software software
software
Travel agents use this Mainfram
Supercomp Personal None of
computer system when e B
uter computer above
reserving flights computer

Jon Von
Which computers are used
Notebook Supercom Neumann None of
in the weather forecasting B
computers puters computer above
industry?
s
Hoover
Vacuum tube based First Second None of
generatio A
electronic computers are...? generation generation above
n
Which generation of Fourth
Second First None of
computer was developed generati C
generation generation above
from microchips? on
Which generation of Fifth
Second Third None of
computer uses more than generati C
generation generation above
one microprocessor? on
Which generation of Fifth
Second Third None of
computer developed using generatio B
generation generation above
integrated circuits? n
Which generation of Fifth
Second Third None of
computer developed using generatio A
generation generation above
solid state components? n

DATABASES
Analysis,
Programm
Specificati System
Name three steps involved ing,
on, Design, Design, None of
in developing an information Design, A
and and above
system and
Testing Impleme
Testing
ntation
_______ is used for CAAT as none the
Oracle ACL JCL A
database above

Generalized audit software


perform auditors to
TRUE FALSE A
undertake any past records
and not concurrent auditing
Generalized audit software
is a file whose capabilities
TRUE FALSE B
for verifying processing is
logic
CAAT's are computer
program and data that
auditor uses as part of the
audit procedures to process TRUE FALSE A
data if audit significance
contained in an entity
information system

CAAT do not contains


package programs, purpose
written program, utility yes no B
programs or system
management programs
Embedded audit routines
are sometimes built into an
entity's computer system to TRUE FALSE A
provide data for later user
by the auditor
SCARF involves embedding
audit software modules
within an application system TRUE FALSE A
to provide continuous
monitoring

Concurrent use auditors as


TRUE false A
the member of the system
Regular cross system
verification may minimize true false A
frauds
Computer security is
frequently associated with
true false A
confidentiality, integrity and
authentication
Data reserve engineering
process metadata to
document system and true false A
abstract business rules and
relationship
to review and
to obtain extract
The first step for developing determine evaluate
a record data A
CAAT is_________ the audit the types
layout from file
objective of data
Using the open database can bring can bring none of
all the
connectivity feature in ACL the data the data the A
above
is ______________ directly indirectly above
Computer Assisted Audited
Technique involves the use
True False B
of computers through "Black
Box Approach"
White Box Approach
necessary involves expert
True False A
knowledge on the part of
Auditor

change in
The transition from manual the method
use of absence
system to CIS environment of all the
accounting of audit D
bring dramatic changes recording above
codes trails
including ________________ accounting
transaction

documents risk none of


Auditing with computer unique
driven driven the B
necessarily supports the approach
approach approach above
hardware
processing
and checks
CAAT involves an Auditors' options, all the
software and D
appreciation of __________ file data above
configurati controls
structure
on
Widespread end use
computing result in
unlimited errors creeping
true false A
into system going to accept
handling, thereby increasing
audit risks
For computerized auditing
usage of sophisticated audit
true false A
software would be a
necessity
the source
of data
source of
Important knowledge available
data for all the none of
needed to begin planning the to the A
material above these
use of CAAT is _________ audit
planing
organizati
on

The move towards paperless


EDI would eliminate much of
the traditional audit trail, true false A
radically changing the
nature of audit evidence
providing
access to
Computer operation controls computer use of none of
the of by all
are designed to provide to all any the D
concerned
________________ organizati programs above
on
personnel
Systems development
control, apart from others,
include authorization,
approval, testing,
implementation and true false A
documentation of new
systems software and
system software
modification
conceptu
natural/ma open/clos all of
A system could be _________ al/physic D
n-made ed them
al
A system exhibits 'entropy' true false A
Super computer are the
largest and fastest and is
very suitable for commercial true false A
application including audit
work
Assembler language uses
true false A
Mnemonic symbols
Operating systems are enable
manage
devised to optimize the multiple
scheduled hardware all the
machine capabilities, the user D
jobs & software above
function resource
resources
include_______________ sharing
General purpose software
provides a framework for
true false B
highly complex scientific
operation
In batch processing,
transactions are processed true false B
one after another

The use of computer assisted with


with audit
audit techniques is not production all the none of
departme A
gaining popularity not only departmen above these
nts
________________ ts

On-line processing refers to


grouping of transaction and
true false A
processing the same in one
go from start to finish
Real time refers to the
technique of updating files
with transaction data
true false A
immediately after the
occurrence of the event to
which it relates
In OLRT the CPU should
process the capability of true false A
program interruption
Time sharing system allow
access to a CPU from remote true false A
terminals
DSS is defined as a system
that provides tools to
true false B
managers to assist them in
solving structured problems

DSS has the following planning model all the


databases D
components _________________ language base above

Master files contains current


records for identification true false B
and summarizing
Transaction files contain
relatively permanent
records take product profile, true false B
customer profile, employee
profile etc
none of
Master file configuration reference report
table files the D
includes ____________ files files
above
______ is a file management
software package that lets
file
users and programmers filex file-o-man filepet C
manager
organize data into files and
then process those files
to have a decentrali
CAATS provide added value none of
complete zed all the
to the clients because the A
picture of picture of above
_______________ above
a system a system
File volatility refers to the
number of addition and
true false A
deletions to the file in a
given period of time
File activity is the
proportion of transaction file
records that are actually true false B
used and accessed in a given
processing run:
File interrogation refers to
the _____ of information from back-ups retrieval deletion addition B
a file
One -to-one relationship
means a single entity to a
true false A
single entity in a
monogamous structure
RDBMS is structured to a
series of 2 dimensional true false A
tables
seriously subject software safety
SADB stands for ____________ affected area and and B
database database database database
Controls are present over
many aspects of the
computer system and its true false A
surrounding social
environment
In framed checking the data
entry is checked against an true false B
expected picture or format
on none of
at the year immediat
Errors are correlated_________ quarterly the B
end ely
basis above
Field check is exclusive to a
true false A
field
_________ law basically states
none of
that there is a specific
Benfish Benford Benjamin the B
probability of the first digit
above
of a no. being 1,2,3 etc
Check digit is a group of nos.
added to a code for
true false B
determining the accuracy of
other digits in the code
blocks of
random
consecutive nos. to the
placemen none of
Hierarchical code means nos. or primary
t of the D
_________ alphabets attribute
compone above
to entities of the the
nt
entity
The validation checks
applied to a field depend on
the field's logical inter TRUE false A
relationships with other
fields in the record
The contents of a field could
valid, invalid, none of all the
determine _______ sign for a A
numeric alphabetic the above above
______ field
Batch is the process of ______
grouping,
together _____ that bear some regroupin none of all the
transactio A
type of relationship to one g, events the above above
n
another
Hash totals means
true false A
meaningless totals
With OLRT where
interactive data entry is
available, the master file
true false A
associated with a
transaction may be searched
for confirming data

Controls are required for


authorization to ensure data
true false A
integrity and detect possible
breaches in security

Data from client application


are not stored in the
organization's database true false B
through auditables events
and function
All input records in a batch
are normally of different true false B
types
interactiv interactiv
incrementa
e data e data none of
IDEA stands for l design
extraction innumera the B
_________________________________ and enlarge
and ble above
activity
analysis analysis
A transaction file is sorted
prior to the update of master true false A
file
A sequence check on the
transaction or master files
true false A
by an update program is not
required
Whenever monetary
transactions are processed
against master files, the
update program should
maintain a correlation true false B
account to record such
transaction that does not
have a matching master file
record
Internal tables are stored
tables from which certain
values are extracted for true false A
further processing and
storing
For small to medium sized
systems, individual modules
are coded and individually
bouncing
tested and then assembled e-brain big-bang stub C
ball
to be tested as a whole-the
testing strategy is referred
to as ___________________
In systems testing, test bottom up top-down hybrid all the
D
involves_________________ tests tests tests above
Recording transactions in a
controlled manner may yes no B
amount to loss of stored data
re-
perform
procedur
provide
read data es
Audit software is used by the informatio all the
on client's carried D
auditor to _________ n to the above
file out by
audit
the
clients
programs
Core image comparison is a
software used by the auditor
executable deleted, none of all the
to compare _______ version of A
s, master hard these above
a program with a secure
________ copy
Database analyzer is a
software which provides
detailed information true false A
concerning the operation of
the database
system system none of
all the
SAS stands for ______________ analysis advanced the A
above
software software above
Embedded code is a
software used by the auditor true false B
to examine backup data
Embedded code performs
yes no A
wide variety of audit task
Core image comparison is
particularly useful where
true false A
only executable versions are
distributed
Log analysis is a software
used by auditor to detect true false B
virus
On line testing techniques
the auditor ______ data either
_______ or fictitious in order manipulat create, none of all the
A
to see that a specific es, real false these above
program or sever edit test is
doing its work
Mapping software is used by
the auditor to list unused true false A
program instructions
Mapping software has very
yes no A
objectives
can
provide
can enable
the
the auditor
auditors
can be very to execute
Modeling is a variety of with all of
powerful provisions
software which useful the D
analytical on a
________________ informati above
tool number of
on with
different
trend s
bases
and
patterns
On line testing can be
targeted for specific
yes no A
functions carried out by
programs
examina
tion of
identifies
source
program
provides code of a
code
detailed program none of
Program code analysis which may
information with the C
involves _____________ be there
of machine advice to above
for
uses followin
fraudulent
g the
reason
logic of a
program

__________ is a software of
IDEA ACL ALC ACLL B
CAAT
Snapshot is software which
takes a picture of a file or
true false A
data or a transaction passing
though the system

fictitious compariso
analyzing
data n of source
the
Base case system evaluation applied version of all the
picture of A
includes____________ against the a above
a file or
client programm
data
program ed
While base testing forces on
finding if there are any
true false A
defective execution policies
in a program
Black box testing seeks to
determine whether
true false A
application output is what it
is supposed to be
In integrated test facility
approach the auditor should
ensure that the impact of
true false A
test transaction is
subsequently eliminated
from the computer files
Black box testing is _______ specificati
file, none of all the
based and white box testing on, A
hardware the above above
is _______ based program
identifyin
identifying identifying
Source code review g non- all the
erroneous ineffective D
means__________ standard above
code code
code
In formula in flow
hypothesis the auditor
should expand the extent of
substantive tests to true false A
determine how the defects
may impact the attainment
of the program objectives
All material application
oriented events that occur
within the boundary
true false A
subsystem should be
recorded in the accounting
audit trail
In examination of audit trail authentica
resource
the following data associated start and tion of all the
requeste D
with an event may be finish time informatio above
d
___________- n support

job none of
job control all the
JCL means_________________ connectivit the A
language above
y language above
Audit should be periodically
analyzed to detect any
yes no A
control weakness of the
system
In an accounting audit trail,
intrusion detection system
might monitor the amount of
processor time consumed by
true false A
the user to detect unusual
deviation from the amount
processor time requested by
the user in the past
A sample size calculator
program assists auditors in
true false B
determining RAND()
function
package
computer
p[program
master administ
for mathemati
Generalized audit software list of ered
performin cal A
consists ___________ transacti question
g a variety concept
ons naire
of data
processing
function
prepared
by an
outside
prepared prepared
Specializes audit program program all the
by the by the D
may be___________ mer above
auditor entity
engaged
by the
auditor
Generalised audit software
could be used by the
true false A
following in consistencies or
significant fluctuations

stratificat
file statistical/
Generalized audit software ion and all the
access/org arithmetic D
function include____________ frequenc above
anizations operation
y analysis
In the file reorganization
merging capabilities are
needed in data from
true false B
separate file is to be
combined on a separate
work file
Auditors cannot use
generalised audit software
true false B
to extract the data needed
for audit purpose
Auditors can combine
examining examinin
functional capabilities of carrying
the quality g the all the
generalized audit software analytical D
of system quality of above
to accomplish the task of review
process data
__________________
Can
Can
Wide define
extract Can aid
Which of the following is not access to the
and in simple D
the feature of GAPs various audit
analyse selection
data base objectiv
data
es
All of
Which is the example of High End
ACL IDEA the D
CAATs CAATs
above
A sample A utility A special
None of
In audit procedures, test of software purpose
the A
data is transactio programm written
above
ns e program
Complian
Tests of Analytical ce tests
All of
Which of the following is not details of review of
the D
the use of CAATs transaction procedure general
above
s s EDP
controls
Which of the following are Action Event General
called explicitly by another Macros Procedure Procedur Procedu D
procedure? s es res
_________ data type is
generally used for fields primary auto
integer number D
assigned as primary keys in number number
a table
MS access objects can be
true false A
published in the web
In code-builder, got_focuse, none of
procedur
click,dbl_click,enter are actions events the B
es
examples of _______ above
_______can be used to
automate certain actions in report form chart macros D
response to events
In the macro sheet the
expression comment
macro is selected in the macro action D
elements s
_____field
expressi expressi
To build complex code
calculator on on C
expressions_____is used builder
builder elements
The three list boxes present expressi
none of
at the bottom of the on
action list macro list the C
expression builder are element
above
called_____ s list box
________option is selected
none of
from the view menu to
conditions action insert the A
create macros with
above
conditions
_______report can be created auto embedde
tabular columnar C
with minimum user input report d

_______layout of a form
tabular columnar datasheet justified B
displays one record at a time

The table or query name on


which we are going to build create embedde new
link report D
our report is selected from report d report report
the ____ dialogue box
______and_____are the two columnar none of
stable and dynamic
types of auto reports and the A
unstable and static
available tabular above
There are no wizards for
true false B
creating a database in access

______option from the insert


create insert
menu option is chosen to add chart chart C
fields chart
add an embedded chart
In ms-access, while using none of
primary alternate foreign
SQL, references constraint is the C
key key key
used for creating _______ above
none of
_______is used to create a label chart mail
the A
mailing label wizard wizard wizard
above
______header is present at the start group page report
D
beginning of the report header header header header
none of
______is present at the bottom report page group
the B
of each page in a report footer footer footer
above
for
specifyin
for for g none of
In SQL, having clause is used
ordering updating conditio the C
for _________
records records ns with above
group by
clause
______field is added to the
none of
macro sheet when we select macro
condition group the C
grouping option from the names
above
view menu
______can be used to create
VB Modules reports forms macros D
toolbars
_______query is used to add
records from one or more add append insert delete B
tables into an existing table
_______window is used to none of
macro
write VB code in access report module the C
sheet
application above
Values for other tables,
queries are maintained in true false A
look up fields data type
none of
Visual Basic language is a
RAD RAP RAID the A
_____ tool
above
none of
______ function is used to
SysCmd MsgBox message the B
display a message box
above
Other ms-office applications
none of
can be accessed from ms-
OLE DDE CME the A
access using a concept called
above
________
object
linking none of
on line on line
OLE stands for_____ and the A
execution editing
embeddin above
g
The application that supplies OLE
OLE
data in OLE is called an OLE object OLE client commun C
server
_________ icator
If any change made on the
object from the client side is connecte
linked embedded edited A
reflected on the server then d
the object is said to be _____
_______is the file format that
exe DLL BMP html D
works on internet
______ is used to convert any publish
form report query
ms-access object into html to web D
wizard wizard wizard
format wizard
_______ option in publish to none of
static dynamic
web wizard produces a page static file the B
html file
that is static in nature above

_______query is used to create data


or change database objects append add insert definitio D
in a current database n
Currency fields express the
dollars rupees pesos yen A
amount in _________
_______is selected from the unbound bound comman
list box B
toolbar to add an OLE object object object d button
To display an OLE object in
the form of an icon ____ display as create
display link A
option is selected from icon icon
insert object dialogue box
_______option from the file none of
save as
menu is selected to run create html new the C
html
'publish to the web wizard' above
_____page in an web
none of
application is used to
startup home end the B
navigate to the rest of the
above
pages in the application
______ is fired when an event
none of
is triggered is the concept procedu
bullet command the C
based on a Visual Basic re
above
language
Ms access is a ___________ DBMS RDBMS front end language A
A collection of data stored in
data data
different objects is known as data group database C
collection storage
a _________
new
new blank database
A blank database can be new dialog database
database dialog A
created using __________ box dialog
dialog box box
box
Text type data can be of _____
255 64000 235 63500 A
characters in ACCESS
______is a datatype that automatic AutoNum automati
number B
assigns values automatically number ber c field

Tables cannot be imported


true false B
from other databases
If two tables having same none of
explicit
values for the fields are inner join outer join the A
join
joined it is called an ______ above
Duplication of records in a no
primary candidate
field won't be allowed if the not null duplicate A
key key
fields are declared a________ key
Changes from a master table cascade cascade cascade change
can be reflected on to the delete change update all
C
child table by selecting related related related related
_____option records records fields records
To see more than one record none of
both a
at a time in a form we use columnar tabular the B
and b
_______ above
record none of
In SQL, delete command is table or query or
or the C
used to remove _________ tables queries
records above
In MS-Access, filter
excluding selection will
true false B
display only those record(s)
which meet the criteria.
Dynaset
Properties of the fields are property field field properti
B
managed by _____ in Dynaset field property propertie es
s
______queries allows us to row/colu
crosstab select update
view data in row by column mn A
queries queries queries
manner queries
The type of queries that can row/colu change/d
action update
update or delete record(s) in mn elete A
queries queries
a table(s) are called __________ queries queries
Joining tables without any
no match outer
matching values in the fields inner join self join D
join join
is called ____________
Primary key uniquely
true false A
identifies each record
Which of the following form form
new form both 1
dialog box is/are used in the create wizard D
dialog box and 3
creation of form ________ dialog box dialog

_______ query wizards are


used to generate summary summary sum append simple D
calculations for a table
Properties of a form can be
form new
changed by selecting change propertie
propertie properti B
______from view menu properties s
s es
options
Forms that are included in
included child
other forms are called sub form new form B
form form
______________
In MS-Access, while using
form design view, for
creating a command button Record Form None of
Record
for adding a new record, we Operation Operatio the B
Navigation
should select the _______ s ns above
category from the command
button wizard
one to
_______ form displays fields in columnar tabular hierarchi
many B
a single horizontal row form form cal form
form
The process of arranging the
data in a meaningful order is filtering ordering sorting querying C
known as ___________
______ are used to select only
some particular records gateway
filter sorts pipes A
from the table or any other s
database objects
In MS-Access, user may None of
filter by filter by filter by
specify criteria for filter in the A
form selection menu
form view using _________ above
___wildcard character
represents any single * $ @ ? D
character
Records cannot be sorted by
true false B
a primary key
A control without a data bound unbound data less data
B
source is known as ___________ control control control control
Set of related option buttons,
check boxes and toggle button option controls record
B
buttons is known as group group group group
_____________
Which of the following is controll all of the
bound unbound C
control types ____________ ed above
In MS-Access, the function
CURRDATE
that gives the current date is TODAY() DATE() DAY() C
()
_____________
_____is a control that lists set combo static
text box list box B
of data box text
______is a form that
columnar tabular main
summarize large amount of pivot table A
form form form
data
______allows to create a filter none of
data sheet filter by filter by
by typing the value in a data the C
filter input form
sheet above
option
Wizards for toolbox controls button control tool
control C
are called a __________ wizard wizard wizard
wizard
The wild card
none of
representation for any 5 two of
ram* ram?? the B
letter word that starts with the above
above
ram is ________________
Look up fields slow up data
true false B
entry
____is an access object that
report form table ledger A
displays un-editable data
_____option from the new
none of
object toolbar gives the
autoreport report module the A
easiest way of generating a
above
report
______ represents data in a
chart label bitmap report A
pictorial format
Changes of one table can be
carried over to another true false A
related table
Hyperlinks are used to jump
to any kind of information or true false A
data from a file
The memo field can have
text upto_____ characters in 60,000 255 25,000 64,000 D
length
In MS-Access, columnar
layout can be used to view true false B
multiple records in a form
In MS-Access, alter
command may be used in
true false A
adding a primary key to a
table
Update query is used to add
records from one or more
true false B
tables to the end of an
existing table
all of
In ms-access, datasheet view
table query form the D
is available in ___________
above
______are used to jump to any
hyperlin
kind of information from a table form report D
k
datasheet or a form
Home page will always be
present as a first page of an true false A
application
Make table queries create a
new table from the records true false A
of another table
In ms-access, to protect a
database file from illegal
none of
access, we may set database
Insert Records Tools the C
password. The option of
above
setting database password is
available in _______ menu
Foreign key is a field that
uniquely identifies each
true false B
record and accept no null
values
Data definition queries are
used to create or change true false A
database objects
The attributes of a
alternate composite candidat primary
composite key are known as C
keys keys e keys key
________
OLE object is a data type in
true false A
access
Data displayed in forms
true false B
cannot be edited
A sub form is used to display
one to many relationship true false A
between tables
We can switch from
datasheet view to form view
true false A
by selecting view -> form
view option
In MS-Access long integer is
true false B
a datatype
In MS-Access, while
designing a table for a none of
particular field, the Required null not null zero the B
parameter is set to yes. This above
validates the field as _______

Sorting is applied to select


true false B
only some particular records

Filter by form can be created


true false B
from a forms shortcut menu

Advanced filter uses a filter


similar to the query design true false A
window to create a filter
? Wildcard character
represents any number of true false B
characters
none of
_________ of the following both 1
pie bar the C
is/are a type of chart and 2
above
A bound control is tied to a
true false A
underlying query or table
A calculated control uses
expression as a source of true false A
data
Text boxes cannot be bound
true false B
controls
The default query invoked update select delete append
B
by ms-access is query query query query
A control can be bind to a
record using row source true false B
property
List box is a control that
true false A
offers a list of choices
If a table is joined to itself it table
inner join outer join self join C
is called a ________________ join
A picture box combines the
activities of both a text box true false B
or a list box
Line is a tool box control true false A
Text boxes can be part of a
true false B
option group
_____ chart exists as a freestandin stand sub
embedded D
separate object g alone chart
Filtering data is a way of
arranging data in a meaning true false B
full order
Wild card characters are
true false B
used for sorting records
Pivot tables are used to
navigate to the other tables true false B
in a database
Reports are used to
true false A
represent un-editable data
In MS -Access, the records in the first the last none of
primary
a table are sorted based on field of the field of the the C
key field
_________ table table above
Relationship is an attribute
forms reports entities D
association between _________ s

Summary options dialog box


true false A
is used to summarize data
______ queries can be used to
delete a group of records
delete insert append add A
that meet some specific
records
Charts can convert
numerical data in a easily true false A
understandable format
Embedded charts exist
true false B
separately
From ms - access, if we want
use
to view the records stored in use use
use import datasheet D
a table in ms - excel hyperlink export
in forms
worksheet, we need to

Page header is present at the


true false B
beginning of each record
Detail section has a header
true false B
and footer
A macro is performed only
when the user initiates an true false B
event
The macro is selected from
the action field of a macro true false A
sheet
A macro can be made to
execute before the starting true false A
of a database
In MS-Access. While
appending records, the
source and the target table true false A
must have similar structure
and fields
We can add our own
functions to the expression
true false A
elements list box of the
expression builder
_______is the wildcard
character which represents
& # ? * D
the presence of any number
of characters
Macros can be used to add a
true false A
menu to a database object
_____ header is a unique
page detail group topic C
feature of reports
Chart can either be a form or
true false A
a report
Group header will be
present at the design view of
true false B
a report even if the report is
not grouped
We can change from the
design view to the form view
true false A
without being prompted for
saving the changes made
Charts can be produced
true false B
without the wizard
Macros can be used to create
true false A
user defined error messages

Between and Not Between is


relational list range logical C
______ type of operators
The default data type of VB
true false B
is integer
event -
structured none of
Visual Basic is based on action procedur
query the C
__________ language al based
language above
language
_______is the name of the
database object that displays
report form query table B
data and can be used to edit
data
In access OLE objects cannot
true false B
be linked
_____ section is present for
group record session detail D
each record in the report
A ________ sheet lists all the none of
both a
properties that pertain to data property the B
and b
the form or the controls above
Textboxes can also be an
true false A
example of unbound control
In MS-Access, we may design
command buttons for true false A
navigating records
none of
_______are forms that are child inner
sub forms the A
included in other forms forms form
above
_______ are used to represent
graphs chart labels report B
our data in graphical format

A field with a _______ uniquely primary


number index identifier B
identifies each record key
Large amount of data can be none of
summarized using ______ pivot create form the A
tables above
_______ are employed to select
only some particular records filters queries sorts forms A
from a database object
none of
______ control need not have
form bound unbound the C
a data source
above
______ control combines the
option
functionality of both a text list box combo box button B
button
box and a drop down list
MS access is a DBMS true false A
A form can be bind to a none of
record
record source using _____ form name control the C
source
property of the form above
data none of
______ forms displays field in tabular
chart form sheet the A
single row form
form above
______ forms are usually used none of
tabular columnar
for tables with one to many sub forms the A
form form
relationship above
_______ control uses an none of
expression as a source of calculated bound unbound the A
control above
_______ control is tied to field calculated unbound bound static C
_______is the form that can be
tabular columna
created with minimum input sub form auto form B
form r form
from the user
______option from the tool none of
relations
menu is selected for setting set relation connect the C
hips
relationships between tables above
option
button,
option, command list, check
______,______and_____are the toggle
toggle and button, and
buttons belonging to the button D
command check and combo
options group and
buttons list boxes boxes
check
boxes
_________allows us to create a
filter by filter by filter by filter by
filter from a field short cut D
form report record input
menu
________is a database object
which displays data but form report macro table B
cannot be used to edit data
What term applies to a
collection of related records clipboard file field layout B
in a database?
All of the following terms are
field record
related to computerized search sort D
names grab
databases except which one?

An
organise
A way to A tool to d way of
analyse and produce storing A way of
What is a database? manipulate high informati maintain C
numerical quality on about ing a log
information documents a set of
similar
things

It contains A
Informatio
all the data documen A
n about
What does a record contain? about one t which collectio B
certain
specific contains n of files
programs
item text

remote relative Relationa Reliable


An RDBMS is a C
DBMS DBMS l DBMS DBMS
storing
uses
data offline backing up is related
tape as
Data Warehousing refers to at a data to data C
opposed
separate regularly mining
to disk
site
Unauthorised alteration of Computer Compute Database
Key
on-line records can be sequence r access D
verification
prevented by employing checks matching controls
Reports A tool
Reports
provide a which
allow users
very allows
to extract
flexible text and None of
information
What is a report? way of graphics the A
as hard
creating to be above
copy
and placed in
(printed
editing documen
output)
documents ts
Extracting Spreadshe
None of
What is the best way to and ets make Using
the C
analyse and change data analysing data easy queries
above
data to analyse
Word
processo
Network
What are some popular Compilers, rs, None of
software,
office orientated software interpreter spreadsh the C
backup
applications? s, editors eets, above
systems
database
s, DTP
PRIMARY
Which of the following DEFAULT FOREIGN
KEY and IDENTIT
constraints can be used to and NOT KEY
UNIQUE Y C
enforce the uniqueness of NULL constraint
constrain columns
rows in a table? constraints s
ts

Which of the following


CHANGE MODIFY ALTER UPDATE
commands is used to change C
TABLE TABLE TABLE TABLE
the structure of table?
You are creating a client
application that calls ActiveX
DLLs. Which of the following
properties of the Err object Descriptio Compone
Number Source D
provides the name of a n nt
component that sends an
error back to the client
application?
saving
keeping
This database holds personal the file
keeping a the
information. The user can using a with
backup original A
help to keep it confidential password different
copy paper
by filename
copy
s
If the database holds
customer names and the
the product mail
addresses, personalised primary e-mail C
code merge
letters can be created key
automatically using
Application software suited
to storing the survey
A database Graphics browser e-mail A
information obtained in the
table would be
The characters * and ? are
wildcard
sometimes used in search bookmarks operators engines C
s
criteria as
Which of the following field
Auto AutoNum
types will generate the Auto ID Auto Key C
Primary ber
primary key automatically?
forms in
reports
a
related are
records in a database
tables in a consiste
dynaset are are
database nt with
Referential integrity ensures consistent consisten
are the B
that the: with the t with the
consistent underlyi
underlying underlyin
with one ng tables
tables. g tables
another. or
or
queries.
queries.
query
report
main form and its
Tables are related to one and its
foreign key. and a associate A
another through a: related
subform. d
query.
dynaset.
not a
the
the primary a field primary
primary
key of both from an key of
A foreign key is: key of the B
related unrelated either
related
tables. table. related
table.
table.
You are creating a banking
database to track customer
loans. The bank will, of
course, have many
customers, each of whom One-to- Many-to- Many-to-
One-to-one B
may take out one or more many many one
loans, while each loan may
be associated with only one
customer (there are no joint
accounts). What is the re
In a one-to-many
relationship between Employe Compan
EmployeeI CompanyI
Companies and Employees, eLastNa yAddres A
D D
which field is found in both me s
tables?
Which of the following
ensures that records in
The Tools The one-
related tables are consistent
menu, Referential The join to-many
with one another? For B
Relationshi integrity line relations
example, it ensures that you
p window hip
cannot add a record with an
invalid foreign key.

Right-click
the Select Click the
Relationsh Undo in Delete
How would you delete a Double
ip line, the Relation
relationship between tables click the
then select Relations ships B
in the Relationships Relationshi
Delete hips pull- button
window? p line
from the down on the
shortcut menu toolbar
menu

That
That there That
records
are several That some there are
In a Customers tables, what can be
customers of the data records
does a plus sign next to the added by C
associated is not in a
CustomerID field mean? clicking
with that viewable related
on the
ID table
plus sign
They
They
They must They cannot be
What is required of the fields must be
both be cannot be AutoNum D
that join two tables? the same
numbers text fields ber data
data type
types

The
customer
’s ID is
Assume a one-to-many
deleted
relationship between the
The from the
Customers table and the
Nothing, customer’s Customer An error
Loans table, with referential
Access ID is s table, message
integrity in effect. What
ignores the deleted and all is D
happens when you attempt
attempted from the the displaye
to delete a customer ID from
command. Customers related d.
the Customer table that still
table. loans are
has entries in the Loans
deleted
table?
from the
Loans
table.

The
subform
is an
The The object on
Which of the following is
subform is subform the form
true when viewing a main The
displayed is and can
form and its associated subform is D
in displayed be
subform in the Form Design not visible.
Datasheet in Form moved
view?
view. view. or sized
like any
other
object.
A one-to- A many-
Which of the following A one-to- A one-to- many to-many
relationships does not many many relations relations
belong in a database based relationshi relationshi hip hip
C
on a professional sports p between p between between between
league such as football or teams and teams and coaches players
basketball? players coaches and and
teams teams
Which symbol is used at the
end of the join line in a
related table to signify the # M ¥ * C
“many” side of a one-to-
many relationship?

The
Customers
You have created a one-to-
table only
many relationship with
when The
referential integrity between
Either table there are Loans Neither
a Customers table and a C
at any time Loan table at table
Loans table. From which
records any time
table can you delete a
associated
record?
with that
customer

title bar title bar


The correct order of the prompt, prompt,
text, text,
arguments for the MsgBox title bar icon, title B
prompt, icon,
statement is: text, icon. bar text.
icon. prompt.
The first statement in a
Dim Sub CreateLis
procedure named CreateList Sub. B
CreateList. CreateList. t.
is:
A text field A drop-
A check box
enables down list
enables the A drop-
the form enables
form user down list
user to the user
Which of the following is to choose enables
choose to choose C
TRUE related to form fields? from one of the user
from one from one
several to enter
of several of several
existing text.
existing existing
entries.
entries. entries.

must be must be
must be set does not
set for set for
A text field: for one have to C
multiple two
word. be set.
words. words.

maintain
create data on
help people
The purpose of a database is store data tables of different
keep track A
to: in tables. rows and things in
of things.
columns. different
tables.

relationshi metadata all of the


A database stores: data. D
ps. . above
informati
A database records: facts. figures. a and b D
on.
e-
multiuser commerc
A sales contact manager single-user
database e
used by a salesperson is an database a or b A
applicatio database
example of _______________ application
n applicati
on
e-
multiuser commerc
A Customer Resource single-user
database e None of
Management (CRM) system database B
applicatio database above
is an example of_________ application
n applicati
on
The industry standard Relation
Sequential Structured Structure
supported by all major al
Query Question d Query
DBMSs that allows tables to Question C
Language Language Language
be joined together is called Languag
(SQL) (SQL) (SQL)
__________. e (RQL)

A program whose job is to Data


Database Database Relation
create, process and Business
Modeling Manageme al Model B
administer databases is Model
System nt System Manager
called the _____ System
Microsoft Access may use
which of the following DBMS Jet SQL Server Oracle a and b D
engines?
The
Which of the following are The database
basic components of an database managem All of the
The user D
enterprise-class database applicatio ent above.
system? n system
(DBMS)
the
database the DBMS
application accesses
In an enterprise-class None of All of
(s) the A
database system ________ . above above
interact(s) database
with the data
DBMS
In an enterprise-class
creates creates creates
database system, the b and c D
queries form reports
database application ___ .
the
In an enterprise-class the database
database system, reports are database managem the
the user B
created by ____________________ applicatio ent database
. n system
(DBMS)
it
contains
all the it reduces
A database is considered a
users' data data All of the
"self-describing" because descripti C
is in one duplicatio above.
_______ . on of its
place n
own
structure
In an enterprise-class
holds user holds holds All of the
database system, the D
data metadata indexes above.
database _________ .
A database designed using as a
as a new
spreadsheets from the Sales from redesign
systems
department is a database existing of an a and b A
developme
being designed data existing
nt project
_________________________ . database
A database designed to
from as a
implement requirements for as a new
existing redesign
a reporting application systems
non- of an a and b B
needed by the Sales developme
database existing
department is a database nt project
data database
being designed _______ .
A database designed to as a
as a new
combine two databases used from redesign
systems
by the Sales department is a existing of an a and b C
developme
database being designed data existing
nt project
_________________________ . database
entity-
Database professionals use
relations
________________ as specific normalizat data
data marts hip data A
data sources for studies and ion models
modelin
analyses.
g

entity-
Database professionals use a
relations
set of principles called normalizat data
data marts hip data B
________________ to guide and ion models
modelin
assess database design.
g

A very popular development entity-


technique used by database relations
normalizat data
professionals for database data marts hip data D
ion models
design is known as modelin
_______________________ . g

A very popular development


technique used by database entity-
data
professionals to adopt a normalizat relations
data marts migratio D
database design to new or ion hip data
n
changing requirement is modeling
known as _____ .
The predecessor(s) of relationa
file hierarchic network
database processing was l data A
managers al models models
(were) __________ . model

more
the order
entities in a the order than one
of the
In a relation column of the column
rows is C
__________________________ . vary as to columns is can use
unimport
kind important the same
ant
name
An attribute is also known as
table relation row field D
a(n) .
A combination of one or
more columns used to
record field key tuple C
identify particular rows in a
is___ .
A combination of two or
more columns used to composit foreign
record field C
identify particular rows in a e key key
relation is________ .
A determinant that
determines all the other foreign candidat
record field D
columns in a relation is______ key e key
.
When designing a database,
one of the candidate keys in composite primary foreign surrogat
B
a relation is selected as the key key key e key
_________ .
Normalization is a process
used to deal with which of Insertion Update Deletion All of
D
the following modification anomaly anomaly anomaly above
anomalies?
assess the create
When you are given a set of move the
existing design the one or
tables and asked to create a data into
tables' database more A
database to store their data, the new
structure structure new
the first step is to ____ . database
and content tables

are
supplied by were
have are not
Modern microcomputer several essentially
poor true
personal DBMS well- killed off B
response DBMS
products______. established by MS
time products
manufactur Access
ers
Their
report
delivery is
They use
more
sophisticat
Which of the following are difficult Noninteg None of
ed
true about data mining than rated the A
mathematic
applications? report data above
al
delivery
techniques.
for
reporting
systems.
We have obtained access to
the company's operational
data. We examine 50
records for customers with
noninteg a "wrong
phone numbers that should inconsiste
dirty data rated format" B
use the current area code of nt data
data problem
345. Of these 50 records, we
find 10 that still use an older
area code of 567. This is an
example

We have obtained access to


the company's operational
data. We have been asked to
produce a report with an noninteg a "wrong
inconsiste
item by item analysis of dirty data rated format" D
nt data
sales, but the only sales data problem
figure available is the total
sale value for each order.
This is example of_____
data data
data
warehouse warehou
A data warehouse database warehouse
databases se data
differs from an operational data are b and c C
do not are often
database because: not stored
have denormal
in tables.
metadata. ized.
Which of the following
objects is used to display a Form Table Report Query A
menu?
Which of the following
Forms and Queries Spreadsh
objects are NOT found in an Macros D
reports and tables eets
Access application?
Regardle
ss of
how the
objects
and
It will be
tables
It will be easier for It is
are
easier for the user to advisable
You are developing an stored,
the user to upgrade it to put
Access application that you the user
upgrade it if the each
expect to upgrade will have
if the objects are object B
periodically. Which of the to
objects and in one and table
following statements is reenter
tables are database into a
TRUE? the data
in one and the separate
in the
database. tables in database.
tables
another.
when the
applicati
on is
upgrade
d.
An
applicati
An
on can
applicatio
All be
The Link n may
objects in created
Tables consist of
an in such a
command multiple
applicati way that
can be used databases,
on, it objects
to associate each with
Which of the following including such as
the tables multiple
statements regarding Access the forms C
in one objects,
applications is NOT true? tables, and
database linked to
must reports
with the yet
reside can be
objects in another
within changed
another database
the same without
database. containing
database. disturbin
only
g the
tables.
existing
data.
Which of the following
brings a copy of the table
into the current database Import Link Merge Join A
and does not maintain a tie
to the original table?
It
It contains contains
It contains tables, a user It
What makes a database an
more than reports, interface, contains C
application?
one table queries, or macros
and forms switchbo
ard
What is the Access tool that Interface Switchbo
Menu Build
is used to create the user Design ard D
Wizard Menu
interface? Wizard Manager
put key store all
create business corporat
centralize
backups for informati e
the
The purpose of a data mission on into transacti
manageabi C
warehouse is to: critical the hands on data
lity of data
corporate or more in one
collection.
data. decision single
makers. location.

___________ means the result


None of
of applying to specific Digital Digital
Digital Sign the C
information certain specific Certificate Signature
above
technical processes.
__________ is an algorithm
which creates a digital Digital
Hash Digital Private
representation or Certificat A
Function Signature Key
"fingerprint" in the form of a e
"hash result".
__________ is of standard
length which is usually much
Hash Hash Hash Either B
smaller than the message D
Function Value Result or C
but nevertheless
substantially unique to it.
Digital
Digital Signature involves Digital
Signature Both A Either A
two processes. They are Signature C
Verificatio and B or B
___________ and __________. creation
n
Institutiona
l Overhead
The Costs of Digital Subscriber Institutio None of
and
Signature consists mainly of Relying nal the A
Subscriber
the following Party Cost Overhead above
Relying
Party Cost
Certificat None of
Certificatio Certified
CA stands for ________________ e the A
n Authority Authority
Authority above
A Digital Certificate is issued
by a Certification Authority
True False A
and is signed with the CA's
Private Key
A Digital Certificate does
contain Owner's Public Key,
Owner's name, Expiration
True False B
date of the Private Key,
Serial number of the digital
certificate
Personal
______________ enable web None of
Server Developer Digital
servers to operate in a the A
Certificate Certificate Certificat
secure mode. above
e
______________ are used by
Personal
individuals when they None of
Server Developer Digital
exchange messages with the C
Certificate Certificate certificat
other users or online above
e
services.
______________ are on-line
databases of certificates and none of
Private Repositori Public
other information available the B
Certificate es Key
for retrieval and use in above
verifying digital signatures.
Evidence
,
Ceremon
Signing Writings serve the Efficiency
Evidence, y,
following general Approval, and
Ceremony, Approval D
purposes______,_______,_______ Evidence logistics,
Approval ,
and _______ Evidence
Efficienc
y and
Logistics
The most widely accepted
format for Digital Certificate
True False A
is defined by the CCITT
X.509
A certificate may prove to be
unreliable, such as in
situations where the
True False A
subscriber misrepresents his
identity to the certification
authority
certificat
Certificate Certificate None Of
e
CRL stands for Revocation Resource The A
Revocati
List List Above
on Letter

The prospective signer


Private Private None Of
identified in the digital Public key,
Key, Key, The A
certificate holds the_________ Recipient
Subscriber Recipient Above
and is called the ___________
In EDI interface, the
translation service receives External None of
Internal Transmis
_________ as incoming files Format the C
Format File sion File
from the communication File above
service
The EDI standardisation for
International Trade and UN/EBCDI UN/EDIF
ANSI UNESCO D
Commerce is introduced by C ACT
__________
In EDI, the transmission files
are composed of different
sets of external format files interchang function
batch files functions D
which are grouped into e sets al groups
multiple sets under the
name of ________
The ________________ are pre- None of
Embedded
paid credit cards that Smart Card SET the A
cards
include an embedded cards above

________________ are another


form of credit payment that Electroni
Digital Smart
lets customers use digital E-cash c D
Cash Cards
online cheques to pay Web cheques
merchants directly
Online
Catalog
In Active advertisement, Online
Billboards Broadcas and
there are two types of Catalog
and Junk t and Custome C
models. They are _____ and and
Mail Junk Mail r
________ Billboards
Endorse
ments
The network based All of the
EDI E-mail EFT D
technology is/are ____________ above
Decryption is a process
employed for scrambling of
True False B
plain text for web based
transactions
Primary Public
Asymmetric cryptosystem is Login_Id Public
Key and Key and
based on __________ and and Key and D
Private Private
____________ Password Password
Key Key
Satellite None of
Value Added Network is an Global Private
Area the B
example of _________ Network Network
Network above

Passive or Glow sign


The advertising strategies Active or
pull-based or All of the
emerging in the on-line push based D
advertisin hoarding above
world are ____________ advertising
g strategies

The _________ model use


direct mail, spot television Endorse
Broadcast Junk mail Billboard A
or cable television, in active ments
based advertisement.
The ________ is a form of mail
Direct- Junk
that is not targeted to a E-mail Bulk-mail D
mail mail
specific audience
The __________ model refers to
information that is placed at
a point where it will be
Endorsem Broadcas
noticed by customers in the Catalog Billboard C
ent t
course of other activities and
does not require active
search
Data Low cost Quality
The most beneficial Error
Integratio of manage B
advantage of ERP system is checking
n operation ment
What is the term that Industria Economi
describes spying on one’s Competitiv Corporate l c
C
business rivals to gain a e espionage espionage espionag espionag
competitive advantage? e e
Contact
A
What would you NOT be A list of numbers
Research competit
looking for when spying on a competitor’ of the B
data or’s new
competitor? s clients manageme
project
nt group
e-
multi-user commerc
An online drugstore such as single-user
database e None of
Drugstore.com is an example database C
applicatio database above
of_______ application
n applicati
on
Which of the following is an Keeping Including Using all
Replying
example of unacceptable messages the capital D
promptly
online ‘netiquette’? short Subject letters

Security
Encryptio at the
Removable n transacti
drives that Message performe on phase
can be authentica d by a in EDI
locked up tion in EDI physicall systems
Which of the following at night systems y secure is not
statements is correct provide performs hardware necessar
concerning the security of adequate the same device is y
C
messages in an electronic security function as more because
data interchange (EDI) when the segregatio secure problem
system? confidential n of duties than s at that
ity of data in other encryptio level will
is the informatio n be
primary n systems. performe identifie
risk. d by d by the
software. service
provider.
convert
The wizard that is used to
text import text to tip function
import text files A
wizard columns wizard wizard
is_________________
wizard
The alphabet indicating the
none of
column followed by the row cell row column
the A
number is known reference reference reference
above
an__________
quattropr
Which of the following files
Lotus 1-2- o or class
could not be opened in excel text files D
3 xbase files
_______________
files
In excel, the dates that are
stored as sequential serial domain range referenc
D
numbers known as values values values e values
________________-
The command to display the none of
=current
current date in a cell is =today() =date() the A
date()
_________________ above
In excel, absolute references
none of
are represented by a ________
dollar sign ' = ' sign # sign the A
before the column and row
above
addresses
The ________ can be used to
none of
select the function and function
AutoSum AutoFill the C
assemble the arguments wizard
above
correctly
Specific parts of information
none of
required by functions to paramete
variables arguments the B
perform certain tasks are rs
above
called as___________
Which of the following do
not belong to the formula
text logical numeric Boolean D
category in excel
environment__________
The function that in used to none of
concatenat
join cell values together in a pmt merge the A
e
single cell ________ above
The function that is used to
count all the values that
countif vlookup pmt count A
meet specific criteria
_________
convert
The wizard that is used to
pivot table chart text to tip
create and edit charts B
wizard wizard columns wizard
_______________
wizard
The function that is used to
none of
calculate the payment for
sumif pmt countif the B
specific loan terms
above
____________
The function that is used to
add together all values that
average sum sumif countif C
meet specific criteria is
known as ____________
The __________ option present
none of
in the file menu options is
page setup print area print the A
used to specify major facts of
above
the page to be printed
The command that is used to
none of
apply a format automatically autoformat AutoFill A
the above
__________
The ____________ makes the
none of
information in a worksheet
bordering formatting shading the B
meaningful and easy to
above
understand
A particular part of a work
print
sheet can be printed by page setup print area print B
preview
setting the _________
The process of finding or none of
selecting information is filtering searching sorting the A
known as ____________ above
The option that is used to
cancel the filter process for a
all option blanks all blanks none A
specific column and display
all the records is ________
none of
The URL for encyclopedia www.ency.i www.eb.co www.enc
the B
Britannica is_________ n m ybrit.com
above
_______ maps IP addresses none of
with the domain names of URL DNS FTP the B
the sites above
intermed none of
Internet can be defined as internal network of
iate the B
_______ network network
network above
The most important service
application transport physical session
of the ______ is to manage D
layer layer layer layer
traffic control
_________is a program that none of
finger ping ftp
displays information about a the A
service service service
host connected to the net above
_______ is a program or a tool none of
that helps in locating a file FTP TELNET ARCHIE the C
anywhere on the net above
uniform uniform unlimited none of
URL stands for ____________ research resource restore the A
locator locator locator above
name of none of
IN an URL the word before host
the scheme the C
the color refers to _______ computer
resource above
none of
A ______ always begins with a comman
message scheme the C
slash d line
above
Prodigy is run by IBM and general
Delphi Microsoft sears C
______ electric
The World Wide Web is
referred to shortly as the net web browser editor B
_______
read the search none of
Gopher and WAIS enables
browser Usenet for the C
the user to ______
news database above
______ is the program used to CompuServ wincim none of
run CompuServe's regular e internet spy mosaic or the C
services dialer maccim above
Navigating through the none of
gopherspa cyberspa
menu of gopher is called gophering the C
ce ce
moving around _______ above
The directories that come none of
with built-in engines are Alta vista open text excite the B
yahoo,lycos and ______ above
To use the finger
none of
command,SLIP users must finger web
ftp server the A
run a programme server server
above
called______
none of
The web maps are called
list directories image list the C
_______
above
Directories consists of _______ maximum
no one many B
levels of five
The _____ level gives the middle
broadcast overview of the middle lower top and D
net lower
The huge list of keywords
from important items is hotlist directory index glossary C
called ______
item
directory index menu
The two types of search in search,in
search,inde search,me search,ite C
veronica are _____ and ______ dex
x search nu search m search
search
all the
_______ searches by keywords infoseek excite lycos D
above
Mosaic displays links in
all the
color whereas _____ does not netshark cello lynx C
above
display links in color
navigato
______ supports one button
lynx mosaic Lycos r gold C
publish
2.0
SPY MOSAIC is distributed CompuS
Microsoft internet IBM D
by_______ erve
______ is a program that helps
finger
us to log on to other Usenet ftp telnet D
service
networks
Hyper Hyper
Higher text Hyper text
HTTP is the acronym for text text
transfer transmissi C
__________ transfer transfer
protocol on port
protocol port
none of
______is used to transfer and
iccp ftp uucp the C
copy files over the internet
above
_____ is a program that helps none of
us to log on to other yahoo ftp telnet the C
networks above
transfer
transmissi
transfer communi
on control none of
TCP/IP stands for control cation
protocol/i the B
________________ protocol/in protocol/
nternet above
ternet internet
protocol
protocol
Archie servers can be none of
accessed in_______ different one two three the C
ways in internet above
_______is the computer on the
internet that translates domain none of
web
between the internet ftp servers name the B
servers
domain names and the servers above
internet numeric address
the
the none of
TIA stands for_____ in the internet internet
internet the A
internet adapter administra
access above
tion
Service indicates the name
of the ________ used to access organiza
browser protocol site B
data, present on the other tion
end of the link.
universal uniform uniform name of
________ is used to link pages
resource resource resource the B
in the world wide web
locator locator label above
frequent frequently franticall none of
FAQ stands for ______ asked asked y asked the B
query question question above
The internet adapter is a
none of
programme that makes our
SLIP,PPP TCP,IP IP,UDP the A
connection act like a _____or
above
a ____ account
The step involved in
Communicating between the
connection response request close A
web clients and servers is
______________
world
wide search
windows
search for for none of
sockets
WSIRC stands for______ information informati the B
internets
and on and above
relay chat
research research
council
none of
Two of the important mosaic,g
lynx,minx netscape,ie the B
browsers are_____ and_____ opher
above
world none of
Lynx is a _______ programme world wide
wide web interface the B
that works with terminals web server
client above
The huge list of keywords none of
from important items is glossary index hotwords the B
called an_____ above
very
very easy organised verificati
and rodent network on on
oriented integration network none of
VERONICA is an acronym for
net wide and integrati the A
_______________
index to communic on and above
computeriz ation communi
ed archives applicatio cation
n
universityuniversity
universit
of of none of
The first freenet is created at y of
berkeley,be
cleveland,c the B
the_____ and is called______ California
rkeley leveland above
net
freenet freenet
________ are defined as ways none of
of communication amongst protocols IP address dns the A
networks above
search none of
______and_____ are web ftp and telnet
engines,dir the A
searching features finger and ftp
ectories above
none of
WINWAIS has two source allsrc,winso wais,win
wais,allsrc the B
lists namely____ and______ cks socks
above
none of
________ is also called as WAIS
allsrc waisman winsock the B
manager
above
The system of interlinked none of
books
documents is known hot links hyper text the B
marks
as_______ above
The small programmes that
create none of
animatio
animation,multimedia,real- images applets the B
n
time games and multi user above
games are called______
animatio
The information displayed programm none of
graphics,vi n,scripts,
on the web page s,images,te the A
deos,audio executabl
includes______,_____ and_____ xt above
es
The web pages that none of
welcome
represent online home of first page home page the B
page
their author are called______ above
global global grand none of
GNN stands for______ network networks network the B
news navigator news above
none of
_____ is the most popular yahoo electronic search
the B
internet service service mail engines
above
Netscape
page
The online service offered by email and yahoo none of
starter
navigator gold 2.0 are _______ net and the B
site,netsca
and_____ conference altavista above
pe page
wizard
_______ is a program or a tool
that helps us find a file newsgroup telnet ftp archive D
anywhere on the net
The databases to enable none of
Lycos point all the
keyword search using Lycos the D
catalog review above
are a2z,_______ above
______ is a large worldwide
bulletin board service apple link bitnet Delphi fidonet A
network
computer
biographic
related
BABEL consists a glossary of al bookstor none the
abbreviatio A
_____ informatio es above
ns and
n
acronym
Dictionaries,encyclopaedias, encycloped on-line more
government and other ia reference informati galenet A
references are found in ______ Britannica works on

Yahoo,lycos,excite and search web


database channel B
webcrawlers are _____ engines directories
Graphica
Graphical Graphical Graphical
GIF is the acronym for l
interpreter interchang interface B
____________ Interface
formatting e Format format
format
Joint
Joint Jumbled Joint
pictures
JPEG is the acronym for Pictures pictures pictures
experim A
___________ Expert expert expert
ental
Group graph graph
group
The Web aids users to browser
mails documents net C
explore the ________ s
yahoo,infos eudora,n none of
The three most popular netscape,ie
eek,altavist etscape the C
mailer are_____,_____ and______ ,lynx
a and pine above
network
The World Wide Web
information web pages connectio mails B
consists of _________
ns
In Microsoft Internet
Explorer, the color of the
BACKGROU FONTCO
text can be specified using COLOR FCOLOR B
ND LOR
_________ attribute of the font
tag.
The interface that provides Communica Communi
Common Common
effective communication tion cation
graphical Gateway D
between the web browsers gateway graphical
Interface Interface
and servers is _________ interface interface

CGI is the _________ between Communi Connecti


Network Interface B
web browsers and servers cation on
CGI programs are invoked None of
Current
based on the information Browser Client the B
web page
provided by the _________ above
A CGI program is usually
Browser/u
called after a request made Server Web Channel A
ser
by the _________
neither
A hyperlink can be on text or
text only image only text nor C
___________ image
image
HTML was derived from
SQL PLSQL SGML CGI C
_________
none of
alphalangu betalangua metalang
SGML is a _________ the C
age ge uage
above
pancake none of
palm is not palm is not
PINE stands for _____________ is not the B
eatable elm
edible above
The application that
SGML SGML
confirms whether a SGML SGML
Preprocess Compose C
document is compliant to its Processor Parser
or r
DTD is _________
Web is a collection of documen
web sites images applets A
___________ ts
Internatio
Internet Internet
nal None of
equipment Engineeri
IETF stands for ________ Engineerin the C
training ng Task
g trainers above
faculty Force
and faculty

MS
Internet
Netscape
The two major browsers MS Internet Explorer None of
Navigator
used to surf the Internet are Explorer and the C
and
________,_______ and Mosaic Netscape above
Mosaic
Navigato
r
Special characters allow
data from
browsers to display text symbols video C
a database
_________________
The keyword for providing
links within or across hyperlink hypertext hotword hotlink B
documents is____________
Stringing pages together
in in user- none of
using hypertext technology in random
sequential defined the B
helps view pages order
order order above
_______________
The initial web pages none of
present in a web site is the first start home the C
________ page. above
The image format supported
.bmp and .bmp and .gif and .wmf and
by most browsers C
.gif .jpeg .jpeg .bmp
is________________.
Service,
service,hos service,p
hostname service,h
The components of a URL tname,port ort and
and ostname B
are ___________ ,directory- directory
directory and port
path path
path
mailing
mail mail lists,mail
The mail we send has a servers,mai vendors,m server
none of
mailing address and most of l clients ail robots
the C
them correspond to_____,_____ and identificati and
above
and alternate on and gateways
services password to other
services
Which of the following is not <l1
<font <hr
supported by internet <center> type=sha D
size=n> size=n>
explorer _______________ pe>
communica classified
common none of
tion general
CGI stands for ____________ gateway the B
generated instructio
interface above
information ns
Host name indicates the
domain name of the web Server Client Browser User A
________
none of
The internet is also called as
arpanet the net intranet the B
_______________
above
peer-to-
none of
The internet is similar to peer
LAN wan the B
_________________ connectivit
above
y
none of
The net drivers______ from
data parcel packets the A
one place to another
above
email,file
The net provides interesting scripting,pa news,cooki none of
retrived,i
services like______,______ rsing and ng and fine the C
nternet
and______ compiling arts above
tools
The windows internet communi
nt,windows mosaic,go
software available cator,ie,ly all of the
95,ie,winzi pher,eudor B
are______,_______,________ nx,winso above
p a,trumpnet
and______ ck
none of
________ is the ancestors of ARPANE
dnet arpanet the B
the internet T
above

defensive dedicated defensive


administrat and advanced
DARPA stands for none of
ive rank registered research
_________________________________ the C
administrat projects projects
______________ above
ion administra administr
network tion ation net

none of
The uuencode files start
start begin first the B
with a _______
above
none of
DARPA is broken into ________ milnet,smal mailnet,in intranet,e
the A
and _______ ler arpanet et xtranet
above
NSFNET is the united states cooking none of
education,r music and
provides service to _____ and the A
esearch dance
and_____ dining above
The first international IP
united united none of
network connections were england,no
states and states & the B
established in 1973 with rway
UK Russia above
_____ and_____
A_____ is a set of computers
interconnected by none of
transmission paths to server client network the C
exchange information in above
internet
A computer that provides a none of
stand-
service usable by other client servers the C
alone
computers is called______ above
A_______ is the representation network none of
network network
of physical connectivity of redirecto the B
card topology
the computers in internet rs above

data
detailed data none of
DTE stands for target
transaction terminal the B
____________________ equipme
explanation equipment above
nt
The basic function of the none of
application physical network
______ is transmitting the bits the B
layer layer layer
over a channel above
point to
point packet smart
The point to point channel network switching, network none of
network is also called as and store and and the B
_____ and_____ broadcast forward dumb above
channel network network
network
none of
Accessing files using FTP anonymou file
file access the B
servers is called_____ s ftp transfer
above
The three most commonly none of
PAN,NAN,A KAN,RAN, LAN,WA
used networks the C
AN VAN N,MAN
are______,______ and______ above
________ is in between LAN none of t
VAN MAN TAN B
and WAN he above
none of
_____ can be owed by
LAN MAN WAN the C
multiple organisation
above
none of
Data is transmitted in the non-
analog digital the B
form of_____ signals digital
above
Define Documen Docume
Data type
DTD stands for __________ type of t type nt type C
definition
data definition data

Modulatio Manipula none of


Modem stands for Moralize/d
n/demodu te/dema the B
__________________ emoralize
lation nipulate above
______ is the process of the
digital signals being none of
Modulatio Manipula
converted into a form Mapping the B
n tion
suitable for analog above
transmission
Satellite Dedicated
________ and______ are two none of
link and access and Cable and
basic ways of getting the B
digital dial up wires
connected to the internet above
signals access
Standard Stream
Serial none of
SLIP stands for long line
line the C
________________ internet internet
protocol above
protocol protocol
Prime Point to Pillar to none of
PPP stands for _____ prolonged point pillar the B
protocol protocol protocol above

receiving
sending storing informat
Which of the following best storing
informatio data on ion from
describes uploading data on a B
n to a host the hard a host
information? disk drive
computer drive compute
r
A characteristic of a
communication channel that
is the amount of information
Bandwidth Speed Size Channel A
that can be passed through it
in a given amount of time,
expressed in bits per second.

The act of searching through


storage to locate information
without necessarily knowing Find Save Browse Retrieve C
of the existence of the
information being sought.
A "recipient" of the
certificate desiring to rely
upon a Digital Signature Recipient Relying Either A Neither
B
created by the subscriber Party Party or B A nor B
named in the certificate is
called the ____________
The Relying Party can use
the ___________ listed in the
certificate to verify that the Private Both A Both B
Public Key C
digital signature was created Key and B and A
with the corresponding
_________
Digital Signatures are used
Electroni
for a variety of Electronic Electronic All The
E-mail c Fund D
Transactions like Commerce Above
Transfers
________________________
To associate with a key pair
with a prospective signer, a
Not False Not True A
Certification Authority
issues Digital Certificate
Digital Signatures, if
Formal
properly implemented and Closed
Formal Legal
utilized offer promising System,For
Legal Open Require
solutions to the problems of mal Legal D
Requireme System ments,
Imposters, Message requiremen
nts Open
Integrity, __________ and ts
System
_____________
In, Digital Signature,
_____________ perform the
"ceremonial" function of Signer None of
Affirmative
alerting the signer to the fact Efficiency authentic the A
Act
that the signer is ation above
consummating a transaction
with legal consequences
A Digital Signature must
Signer Document
have the following attributes Both A Neither
Authenticat Authentica C
________________ and and B A nor B
ion tion
_____________
"Hash Function" is used in
both creating and verifying Not True Not False B
Digital Signature
___________ provides
assurance of the origin or
delivery of data in order to
protect the sender against
Digital
false denial by the recipient Nonrepudia Digital Private
certificat A
that the data has been tion Service signature Key
e
received, or to protect the
recipient against false denial
by the sender that the data
was sent.
________ is a branch of applied
mathematics concerns itself None of
Cryptograp Private
with transforming messages Public Key the A
hy Key
into seemingly unintelligible above
forms and back again.

The complementary keys of


an asymmetric cryptosystem
Both A Either A
for Digital Signatures are Private Key Public Key C
and B or B
arbitarily termed as _________,
and ____________

_______ is known only to the


Both A Either A
signer and is used to create Private Key Public Key A
and B or B
the digital signature.

_______ is ordinarily more


widely known and is used by Both A Either A
Private Key Public Key B
a relying party to verify the and B or B
digital signature.
____________ is the art of
protecting information by Encryptio Cryptogr
Decryption Cipher C
transforming it into an n aphy
unreadable format.
Conducti Reviewi
Which of the following
Performin ng fraud- ng the
activities would most likely Using data
g validity awarenes systems- D
detect computer-related encryption.
checks. s access
fraud?
training. log.
Unaltered Received Sent to
A digital signature is used Not
in by the the
primarily to determine that intercepte A
transmissio intended correct
a message is: d en route.
n. recipient. address.

The
The
private
private
key is
Both The key is
used by
sender and private used by
the
receiver key cannot the
receiver
must have be broken sender
What is a major for
the private into for
disadvantage to using a decrypti A
key before fragments encryptio
private key to encrypt data? on but
this and n but not
not by
encryption distribute by the
the
method d to the receiver
sender
will work. receiver. for
for
decryptio
encrypti
n.
on.
Which of the following risks Failure of
can be minimized by server Firewall
Data entry
requiring all employees Collision. duplicati vulnerab D
errors.
accessing the information ng ility.
system to use passwords? function.
Business- Backend- Business-
The acronym for B2B is Business-to-
to- to- to- A
___________ Business
Backend Business Billboard

The _____________ model is the


least intrusive model but On-line Endorse Broadcas
Billboard B
requires active search on the Catalog ments t
part of the customer
__________ is / are a form of
Customer
advertisement where people Broadcas
Endorseme Billboard Catalog A
relate their experience with t
nts
products and services

The _________ are software


agents who communicate Intermedia
portals .COM Domains A
with the business merchants ries
on behalf of the customers
The Pre-purchase
Search None of
preparation phase includes Order
Service and the C
_______________ for a set of Placement
discovery above
products
The _________ phase includes
Pre- Search
customer service and Post Purchase
purchase and
support to address customer purchase consumma A
preparati discover
complaints , product returns interaction tion
on y
and products defects
Endorse
The ________ allow companies Billboard ment None of
Online
to bypass the need for costly model of model of the B
catalog
printed catalogs marketing marketin above
g
A ________________ is a basket
on the Net that is used to Online Shopping Pulling
Billboard B
place the items that are Catalog cart cart
being purchased
EDI For EDI For
EDI For
Administra Administ
Administr
tion, ration, None of
EDIFACT is an abbreviation ation,
Commerce Commerc the C
of ________ Consumer
and e and above
and
Transactio Transpor
Transport
n t
The __________ allows for
protocol conversion and
communicates with the bank EDI TCP/IP EFT Gateway D
using the banks private
network or the Internet
In Ecommerce, data
extraction, transforming the
data into transmittable form,
Interprete Assemble
transmitting the data and Compiler EDI D
r r
downloading the data are
the operations employed in
_________
The _________ commerce
Custome
assists in integrating the Business- Consume
Business-to- r-to-
customers and suppliers of to- r-to- B
Business Compan
the company directly into Consumer Business
y
the organisation
E-cash Emergency Electronic Euro Endorse
B
means______________________ Cash Cash Cash d Cash
E-commerce is a tool that
addresses the desire of firms Business
Communica Service None of
to cut services cost and Process
tion Perspecti the C
improving the quality of Perspectiv
Perspective ve above
goods. It is a definition of e- e
commerce from _________
The small denomination Micro
TT(Tiny
digital tokens are called Microcash Transactio E-token A
token)
_________ ns
The ____________ is the process
of encoding information to Encryptio Subscrip
Decryption SSL C
prevent it from being read n tion
by unauthorized parties
There are _________ types of
1 2 3 4 B
data tables
The tables that allows the
user to change or rearrange
the data, summarize the data filtered index pivot
data table D
and evaluate the data using table table table
changing points of view is
known as
convert
The wizard that is used to
pivot table chart text to tip
suggest hints for doing a D
wizard wizard columns wizard
task
wizard
In a chart Y-axis is known series or data
category legend A
as_________ rank marker
In a chart X-axis is known series or data
category legend B
as_______________ rank marker
_________ is a set of tables that
series or data
describe each of the data category legend C
rank marker
series
________ is used to
series or data
differentiate one data series category legend D
rank marker
from another
The chart that contains only column surface
bar chart pie chart C
one data series is _________ chart chart
The chart that holds the column surface
bar chart pie chart B
column chart is _________ chart chart
The chart that display two or
column surface
more data series on a bar chart pie chart D
chart chart
surface is _________
The chart that is used to column surface
bar chart pie chart A
display discrete data chart chart
none of
_________ are not allowed in a wild card
spaces symbols the A
macro name characters
above
Which of the following tool
internet word
cannot be used to view the excel97 Netscape A
explorer 2000
excel web page_______
convert
The wizard that used to
pivot table chart text to tip
build an interactive table A
wizard wizard columns wizard
from data existing on sheets
wizard
The chart that is used for
stock
displaying stock market line chart bar chart pie chart C
chart
information
In excel, the subtotal
command also generates
true false A
grand total after the last
group subtotal_________
In advanced filter , the
criteria occupying multiple
columns but more than one and or B
row, is considered as an
________ criteria.
4- Multi-
The stacked bar graphs can 3-
dimension dimensio A
be represented in __________ dimensions
s ns
A pie chart can represent
only one data series at a true false A
time
The ______ generates a
summarized report in
Data table Pivot table B
tabular form in an
interactive manner
It is often It is also
used to used for
display indicatin
It is also
Which one of the following It shows share g
called as
statements related to stock trends market fluctuati B
high-low-
chart is NOT TRUE ? over time prices ons in
close chart
over a temperat
period of ure
time changes

The state government needs


to finalize a five years plan
to implement 100% literacy
Scenario Data
in the state. Which one of the Pivot table Solver C
manager table.
following will be the best
tool that should be used to
work out the plan ?

Forecast'99 is a group
working on exit poll. It
wants to know how many
seat ABC party needs to won
Scenario Pivot Data
in totality to obtain majority Goal seek A
manager table table.
to form the government.
Which one of the following
will be the tool that will help
the team ?

Which one of the following


will be the tool that provides
a way to view and compare Data
Goal seek Pivot table Solver D
the results of all the different table.
variations together on the
worksheet ?
A ___________ is an excel file none of
Spreadsh
where the user stores his Workbook Worksheet the A
eet
data above
Performi
Performing Performin
Spreadsheets are useful for ng text All of the
calculations g database D
_______________ formattin above
. operations
g.

Which one of the following is Source Pivot


Column
NOT the component of the Row field. table table C
field
pivot table ? name. item.
Excel allows upto ______
two three N B
levels of sorting
Filtering rearranges a list to
true false B
display the required records
The stacked bar graphs can 4- Multi-
3-
be represented in dimension dimensio A
dimensions
_____________ s ns
The ______ generates a
summarised report in
Data table Pivot table B
tabular form in an
interactive manner
It is useful
when
several
componen
It displays ts are It can be
Which one of the following
the data changing represent
statements related to
series one and the ed in 3- B
stacked bar chart is NOT
on top of user is dimensio
TRUE ?
the other. interested ns
in the sum
of the
componen
ts.

Which following function is


Standard
used in subtotal option Count. SumIf A
deviation
?______________
A workbook consists of workshe
databases records tables D
many ________ ets

It is a tool
that
It is a tool
provides a
for
way to It
summarizi
view and summari
ng and
Which two of the following compare zes the
analyzing
statements related to pivot the results data by A
the data
table are TRUE ? of all the using
records in
different analytical
an
variations functions.
interactive
together
manner.
on the
worksheet
Which one of the following is Scenario Pivot
Goal seek. solver D
NOT a What-if analysis tool ? manager table
convert
The _________ wizard
text import text to tip function
separates contents in a cell B
wizard columns wizard wizard
into different cells
wizard
A spreadsheet is a grid of
rows and columns and is worksheet workbook tables database A
called as a ________
Pick out the window that is application document modal
C
not a form of excel ___________ window window window
A dark A
On an Excel sheet the active A dotted No
wide blinking A
cell is indicated by… border border
border border
Cell A4 =2 and A5 = 4. You
select both cells and drag the
fill handle down to A8. The 8,16,32 2,4,2 2,2,2 6,8,10 D
contents of cells A6, A7, and
A8 are _____.
the
the row is
column is
too short
too
your to show
narrow
If a cell shows ####### , it formula has the either b
to show C
means that _____. a syntax number at or c
all the
error the
digits of
current
the
font size
number
flexibility
Which is not an advantage of ability to cost of
speed of of
using computerized generate initial set- D
calculation moving
spreadsheets? tables up
entries
The gym teacher has a new
program to calculate
physical fitness in terms of
weight and exercise. The use
inputs different weights or word spreadsh
graphical database D
amounts of exercise to processing eet
determine the related
physical fitness. This "What
if" program is most likely
which of the followin
The difference between the
highest and the lowest Range Address Gap Rows A
values.
Spreadsheets can be used Producing Writing Drawing Docume
A
for... graphs letters pictures nt filing
drag from
the top cell
double-
in the click the click the
To select a column the click any
column to column column C
easiest method is to … cell in the
the last heading label
column
cell in the
column
If you press _____, the cell
CTRL +
accepts your typing as its ENTER TAB INSERT A
ENTER
contents.
The contents of cell C15 is
=AVERAGE(C3:C14).
array. function. constant. formula. B
AVERAGE(C3:C14) is known
as
All of the following are Tom
(201)555-
considered constants 100 #VALUE! McKenzi C
1212.
EXCEPT: e.
Which of the following may Text
Cell Numeric
NOT be included in a Functions constant D
references constants
formula? s
Which of the following is
NOT a valid mathematical ^ / * \ D
operator in Excel?
It is
Given the formula
impossib
=B5*B6+C3/D4^2, which
B5*B6 C3/D4 D4^2 le to C
expression would be
determin
evaluated first?
e.
Which part of the formula
SUM(H9: G7*SUM(
+E12/6+(G7*SUM(H9:H11) E12 6 B
H11) H9:H11)
is considered a constant?
The
phrase
It is
It is “active
How can you tell which cell displayed
surrounded It is cell”
in a worksheet is the active in A
by a heavy blinking. appears
cell? reverse
border. in the
video.
Status
bar.

By either By
clicking typing
in a the
By using
different referenc
By clicking the arrow
cell or e of the
How can you change the in a keys to
using the cell you C
active cell? different move to a
arrow want to
cell different
keys to move to
cell
move to a in the
different formula
cell bar
The Cell The Font
Format Size
Which of the following The The
comman comman
would you use to change the Standard Formattin B
d on the d on the
font size of a cell in Excel? toolbar g toolbar
Edit Tools
menu menu.

the Save the File


the New the Save As Type
The command that will save
command command comman comman
the current workbook with a C
on the File on the File d on the d on the
different file type is:
menu. menu. File File
menu. menu.
The command that will print
an Excel workbook is found File Edit View Window A
on the ____________ menu.
In the Save As and Open
dialog boxes, the ___________
Properti
view shows the file size as Preview Details List B
es
well as the date and time a
file was last modified.
Which of the following Both
commands will Insert
Insert Delete Clear C
automatically adjust cell and
references in formulas? Delete
Which of the following
Both
commands will remove cells,
Clear Delete Clear and Remove B
rows, or columns from a
Delete
worksheet?
Which of the following
Orientation Headers
options is NOT controlled
(portrait or and Fonts Margins C
through the Page Setup
landscape) footers
command?
Which command enables
you to change the margins Options Page Setup View Edit B
for a printed worksheet?
All commands are carried
cell
out on a rectangular groups worksheet. range. group. B
group.
of cells known as a:
Which of the following is a
6 D12, G25 D12:G25 D C
valid cell range?
In a copy operation, the
destinatio clipboard source
cell(s) you are copying from copy range. D
n range. . range.
is called the:
In a copy operation, the
paste destinatio clipboard source
cell(s) you are copying to is B
range. n range. . range.
called the:
Both the
Which of the following
The The Paste Copy and
commands is needed to The Copy
Duplicate comman Paste D
duplicate the contents of a command
command d comman
cell in another?
ds
A cell reference that does
not change during a copy absolute relative mixed constant A
operation is known as
Which of the following is
considered an absolute cell B4 $B4 B$4 $B$4 D
reference?
Cell E3 contains the function
=AVERAGE(A3:D3). If the
contents of cell E3 are #DIV/0! #DIV/0! #DIV/0! #DIV/0! B
copied to cell E4, what will
be the contents of cell E4?
Cell E3 contains the function
=AVERAGE($A$3:$D$3). If
the contents of cell E3 are #DIV/0! #DIV/0! #DIV/0! #DIV/0! C
copied to cell E4, what will
be the contents of cell E4?

Both the
Which of the following
The Paste Cut and
commands is needed to The Move The Cut
comman Paste D
transfer the contents of one command command
d comman
cell range to another?
ds
cycle
through
absolute, cycle
relative, through
copy and
The F4 key is used to: edit cells. and open C
paste cells.
mixed applicati
cell ons.
reference
s.
Which of the following the Conditio
quickly copies the the Fill the Format Formatti nal
B
formatting of a selected cell Handle Painter ng formatti
to other cells? toolbar ng
Right- Double-
Click the click a click a
Select the
Insert cell and cell and
Insert
Which of the following will Hyperlink click the click the
Hyperlink
insert a hyperlink into an button on Edit Insert B
command
Excel worksheet? the Hyperlin Hyperlin
from the
Standard k k
File menu.
toolbar. comman comman
d. d.
whether
the cell
whether has an
Conditional formatting the cell has absolute the value
the cell
applies formatting to a cell a formula or a in the D
address.
based on: or a value relative cell
in it. cell
reference
.

text with
either a
two-digit
text with a text with a or four-
If you enter a date into a cell, an
two-digit four-digit digit C
Excel stores the date as: integer.
year. year. year,
dependi
ng on the
format.

It is
You created a worksheet on impossib
July 30 and entered the le to
=Today() function in cell determin
29/03/2
E17. You opened that Jul-30 Aug-31 e from B
008
worksheet again on August the
31. What will be displayed informat
in cell E17 on August 31? ion
given.
subtracti adding
subtracting
adding the ng the the later
The number of days between the earlier
earlier later date date to
two cells containing dates date from A
date to the from the the
can be calculated by: the later
later one. earlier earlier
one.
one. one.
The function key that is used
the Esc the F1
to quickly edit the contents the F4 key. the F2 key. B
key. key.
of a cell is:
Either
3/4 or
March 4 .75,
What will be stored in a cell of the dependi
03-Apr 0.75 C
if 3/4 is entered in it? current ng on the
year cell
formatti
ng
either a
A user’s response to the cell on a
a cell on a a
InputBox function can be a variable. workshe D
worksheet. constant.
stored in: et or a
variable.
The cell reference for a
range of cells that starts in
cell B1 and goes over to B1-G10 B1.G10 B1;G10 B1:G10 D
column G and down to row
10 is _____.
The teacher has a
spreadsheet showing all
Year 10 students and their
marks in one Mathematics
AVERAGE COUNT MAX SUM C
test. To find the student with
the highest mark, which of
the following functions
should be used?

Which chart type best shows Combinatio


Line Pie Scatter C
proportions of a whole? n
Once a
Once a Once a
Once a bar line
column pie chart
chart is chart has
chart is has been
chosen it been
Which of the following is chosen it chosen it
cannot be chosen it D
TRUE regarding chart types? cannot be cannot be
changed to can be
changed to changed
a column changed
a bar to line
chart. to a pie
chart. chart.
chart.

To select several cells or hold


hold down hold down hold
ranges that are not touching down
the CTRL the SHIFT down the A
each other, you would _____ CTRL +
key key ALT key
while selecting. SHIFT

Your Institute teachers have


set an assignment on
‘Studies’. You are required to
use a spreadsheet to record Create Transfer
Use
all that you study on each four informati
Use tables multiple D
day for four weeks. You separate on to a
sheets
decide to show each week’s files database
data with an accompanying
graph. What is the best way
of doing this

What would be the best


method to quickly copy the Paste
Paste Fill Down Fill Right B
formula from the active cell Special
to each cell below it?
To arrange rows in
Edit | none of
alphabetical order based on
Tools | Sort Data | Sort Data | the B
column A, you need to use
Sort choices
the command _____.
None of
What can you NOT do with a Analyse Calculate Create
the C
spreadsheet? data data forms
above
select select
Print Print
press the selection selection
To print just part of a sheet, click the
PRINT on Page in the
you would select what you Print D
SCREEN Setup | Print
want to print and _____ . button
key Sheet dialog
and then and then
print print
The formula that will add
the value of cell D4 to the
(D4+C2)*B =(B2*(D
value of C2 and then D4+C2*B2 #VALUE! C
2 4+C2)
multiply by the value in B2 is
_____.
Which of the functions is not =A3SUM:B None of
valid for performing 0 3SUM:C3S REF! the B
addition UM above
whatever
The default orientation for
portrait landscape was last vertical A
the printed page is _____.
used
None of
Which is not a valid cell
AD213 ZA1 A0 the C
address?
above
The World Wide Web was
CERN ECRN CARN NET A
devised by _________
newsgro
none of
The useful URL schemes yahoo and mailto and ups and
the B
are_____ and______ infoseek files search
above
engines
applicati
bulletin on
news
boards,mai servers,p none of
The other ways of getting groups,yah
ls call and roxy the B
connected to the net are_____ oo and
wireless servers above
infoseek
system and web
servers
bulletin
bulletin business none of
broadcas
BBS stands for______ board broadcasti the A
ting
system ng system above
system
none of
USENET is a BBS on ____ very
small large the B
scale small
above
none of
WINSOCKS is expanded windows windows windows
the B
as______ socks sockets stocks
above
IETF Level 2 HTML DTD
supports graphical browsers Mosaic Yahoo PINE Lynx A
like _______
The space used by Netscape none of
to store the retrieved page is buffer cache built-in the B
called______ above
The principles, means and
methods for rendering
information unintelligible Photograph Digital Cryptogr Message
C
and for restoring encrypted y Signature aphy Digest
information to intelligible
form.
A long string of seemingly
random bits used with
cryptographic algorithms to
Hash
create or verify digital Key Lock Formula A
Function
signatures and encrypt an
decrypt messages and
conversations.
Protected/private character
string used to authenticate
User-id Password Name Address B
an identity or to authorize
access to data.

The successful act of Passwor


Cryptogr
bypassing security Penetration Retrieval d A
aphy
mechanisms of the system. Cracker
A set of rules and formats,
semantic and syntactic, that Regulation Protocol
Acts Address D
permits entities to exchange s s
information.
An attempt to get access to a
Unauthor Approvi
system by posing to be an Spoofing Imposting A
ising ng
authorised person.
An action or event that
Loss Threat Exposure Hacking B
might prejudice security.
According to information
Technology Act, 2000, To
Income - Judge of a Police
investigate contraventions Sales - tax
tax civil officer of B
the controller of certifying authorities
authorities court IPS rank.
authority shall exercise the
like powers to that of
Pirated
Malicious software. Utility Virus Cracker C
software
None the person who is Tim Berner Charles Howard
Hoffman A
known as father of Internet Lee Bubbage Aiken
This website is the biggest Amazon Msn
Etrade.com Dell .com B
bookstore on the earth. .com .com
Asynchro
When we talk of Data Automated nous
Any Time None of
Transmission modes, then Tailor Transmis C
Money above
ATM stands for Machine sion
mode
A sequence of bits or
characters that identifies the Regulation Protocol
Acts Address C
destination and the source of s s
a transmission.
The means of
communicating between Router Gateway Port Pin B
networks
A group of computers and
other devices dispersed over
a relatively limited area and
connected by
LAN WAN CAN PAN A
communication links that
enable a device to interact
with any other on the
network.
hyper
hypertext hypertext hypertex
terminal
The term HTTP stands for tracing transfer t tracing C
tracing
program protocol protocol
program
National Network New None of
A NIC is considered as InformaticsInterface Informati the B
Center card on Card above
None of
A hub is a device that can Only Can not Only
the D
connect Computers computers printers
above
Combines
Switches
connectivit
Concentrat data from
Which of the following is y of a hub
es incoming All of
true concerning the function with the B
connectivit ports to Above
of a switch? traffic
y outgoing
regulation
ports.
of a bridge
Two or Hubs
Bridges and Bridges
What do routers connect? more and B
Repeaters. and Hubs
networks nodes
None of
What does a router route? bits frames Packets the C
above
Software which prevents
virus
external access to a system firewall gateway router A
checker
is termed
If four computers are
connected to a hub and then None of
to the internet, how many IP One Two Four the C
addresses are required for above
these 5 devices?

Which of the following in an Physical Data-Link Network All of the


D
OSI layer Layer Layer Layer above
When creating a network
from just two PCs, what kind Coaxial Twisted
RG7U Fiber B
of cable would be used to cable pair
connect them?
A None of
Physical Logical
An IP address is a memory the B
address address
address above
To construct a simple LAN of
None of
4 computers, you would
A cable Hub Router the B
connect them with
above
______connect them
It
continue
on to
What happens to data that is Data return It gets None of
target
ruined before reaching to to the destroyed the B
device
receiver sender bit by bit. above
with
corrupt
data
Ultra
Wired None of
Wireless violet
Bluetooth is Technolog the A
technology technolo
y above
gy
Which is not one of the Physical Data Link Network All of the
D
recognized IEEE sub layers? Layer Layer Layer above
The most preferred number None of
system to represent a IP Binary ASCII Octal the A
address is above
A MAC address is of 48 Bits 48 Bytes 48 KB 48 MB A
a
software
a list of software gateway
that
rules for that calling
facilitates
Protocol is transferrin allows program B
connection
g data over file for
to the
a network copying internet
internet
bridging
A ............... is a LAN-based
computer with software that
acts as a controlling device
Network
for controlling access to at Novell PC Client Server C
PC
least part, if not all, of a local
area network and its
available resources.

If the hub If the


goes hub goes
If one node
down, it down, it
goes
What is the biggest brings brings
There isn't down, it
disadvantage of the Ring down all down all B
one brings
topology? of the of the
down the
nodes on nodes on
entire ring
that all of the
section rings
The .............. of the network
None of
concerns how network Both A
Physiology Topology the B
devices are physically (or and B
above
optically) interconnected.
The principal topologies All of
Bus Star Ring D
used with LANs are: above
What are the various types Both A
Linear Parallel None A
of bus architecture? and B
What are the various types Both A
Parallel Circular Linear B
of ring architecture? and B
In a ................., each
workstation attaches to a
common backplane via its Ring Bus Star Mesh C
own physical cable that
terminates at the hub
In a ............... , each work
station is directly connected
Ring Bus Star Mesh B
to a common
communications channel
Which one of the following is
Star Bus Linear Ring C
NOT a network topology?
In a .............. , the cable
system forms a loop with
workstations attached at Ring Bus Star Mesh A
various intervals around the
loop
Data
The Media Access Control Network Transport Physical
Link D
(MAC) is a sub layer of the: Layer Layer Layer
Layer
Ethernet,
What are the most common Ethernet, Ethernet, Ethernet,
token
LAN technologies used in token ring, token ring, DecNET, B
ring,
networking today? DecNET FDDI FDDI
ARCnet
Modem speeds are
bps kbps mbps mips B
measured in
LAN speeds are measured in bps Kbps Mbps Mips C
depend
limited
usually measured on the
by
WAN speeds are higher than in bytes transmiss C
modem
LAN speeds per second ion
speeds
medium
Accessing the Internet from
CD-ROM Windows
a typical home PC requires a modem Netscape B
drive 95
the use of
must
must use must use
have a All of the
To use the Internet, you the World electronic A
LAN above
Wide Web mail
account
The worldwide web server applicati
key uniform common
uses the following standard on
gateway resource gateway C
interface to act as the protocol
interface locator interface
middleware: interface

interface connects
a Novell used to sa a
An NIC Interface control a modem compute D
Controller printer to a r to a
computer network
Accessing the Internet from
CD-ROM Windows
a typical home PC requires a modem Netscape B
drive package
the use of
The most widely used None of
Novell Windows
network operating system Linux the C
Netware NT
on PC LANs is above
have to do
with
have to do none of
compressio the
JPEG and MPEG with Web the A
n of Internet
pages previous
graphics
and video
none of
A multiplexer is a form of Printer modem bridge the D
previous
provides
is a CPU make of
access to is a CPU
An ISP functiona processo A
the register
l unit r
Internet
is a
protocol
for the
used to
used to is part of transfer
FTP is browse D
send email Netscape of files
the Web
between
compute
rs
uses
wireless None of
used to is part of
Telnet communic the D
send email Netscape
ation above
medium
used to
protect a
a screen none of
computer a form of
A firewall is saver the D
room from virus
program previous
fires and
floods
a poor
a backup an email
A proxy server is file none D
server server
server
IR system none of
A search engine is hardware for the browser the C
Internet previous
To look for information
about interest areas on the clip-art search
scanner CD-ROM D
internet, the user should use file engine
a
provides
is a CPU make of
access to is a CPU
An ISP functiona processo A
the register
l unit r
Internet
is a
protocol
for the
used to
used to is part of transfer
FTP is browse D
send email Netscape of files
the Web
between
compute
rs
is a
protocol
uses that
used to is part of
Telnet telephone allows D
send email Netscape
lines for
remote
login

Any layer
Any layer Any
can
can layer can
The layers communi
communic commun
Which of the following is a cannot cate only
ate icate
true statement about the OSI communica with the C
directly only
model layers? te with one layer
with any with the
another. directly
other layer
above or
layer. above it.
below it.
It is made
Individu
up of many
al
networks It works
compute
It is one connected the same
Which of the following is rs can
large into way as a A
NOT true about the Internet? connect
network. transmissi local
to it
on lines network.
using an
called
ISP.
backbones.

The traditional intent and


impact of this common type
Password System Denial of Port
of attack is to prevent or C
cracking intrusion Service sniffing
impair the legitimate use of
network resources.
Flood a Virus
Which of the following is
Web that
NOT an example of a DoS UDP
IP flood server initiates a A
attack that is popular among flood
with ping
hackers?
requests flood
A ____________ attack is when a
hacker sends a continuous hack packet flood traffic C
flow of packets to a system.

One defense option on a


large network is to configure
firewall router switch hub B
a ____________ to disallow any
external traffic.
a poor none of
a backup an email
A proxy server is file the D
server server
server above
Which of the following
Backup Limit
would be performed on a Apply Update
data on a logging
network server and not security virus C
daily on
normally on individual patches definitions
basis access
workstations?
Only
There are large ActiveX-
All sites are
What can be said about the safe and name- enabled
safe and B
safety of the Internet? unsafe recogniza sites are
reliable.
sites. ble sites safe.
are safe.

To secure communication Use of Use of


network against wire- Use of Use of logical encrypti
D
tapping the most effective identifiers passwords access on
control is methods methods
by
by scanning
One way that a virus by attaching the
through an
CANNOT spread throughout attaching to itself to a compute B
FTP port.
a network is: an e-mail. documen r for a
t. connecti
on.
Which of the following is
Applicati
NOT a means of monitoring Web
Phone E-mail on D
employee use of company traffic
updates
technology?
____________ would be used by
parents to monitor their A Trojan
Adware A worm Spyware D
children on their home horse
system.
The formal rules and
parameters which are
established to permit a
microcomputer to Multiplex
Modems Protocols LAN B
communicate with the ors
mainframe computer as
though it was a terminal of
the mainframe are called
Trojan key
The two most common tools cookies and cookies
horses and loggers
used to help with extracting Trojan and key C
key and
information are: horses. loggers.
loggers. worms.
An attack An attack Changin
Giving
Which of the following on a system with the g the
out
would NOT be considered an for purpose of content D
disinform
example of cyber terrorism? personal gaining of a Web
ation
gain publicity page

Disruption Disruptio All of the


Which of the following
Economic in n in above
would be a form of cyber D
damage communic supply are
terrorism?
ation lines correct.
Shutdow
Crashing
Which of the following is a Shutdown Contamin n of
the stock
likely target of a cyber of military ating nuclear
market, as D
terrorist that would cause security water plant
in the
considerable loss of life? systems systems safety
1930s
systems
To
obtain
an
accurate
inventor
To
An organisation is upgrading To carry To y of
improve
its telecommunication lines. more improve network
system D
Which is the least important network network related
response
objective while upgradation capacity services equipme
time
nt and
parts
and
network
nodes

stop its update


A company posts a price list limit
competit its prices
of its products on its set its access to
ors as soon
website. The advantage to prices very computer D
seeing as they
the customer is that the high owners
their are
company can only
prices changed

Which of the following is an Yahoo USA


People Lycos
easy-to-use service to get People People B
Search Search
information on someone? Search Search

Which of the following


Name of Date of Personal Criminal
pieces of information would A
your bank birth assets records
NOT be found online?
Which of the following is the
most common danger on the Virus Fraud Adware Spyware B
Internet?
make
large
amounts
of money
The famous Nigerian Fraud invest purchase
by
scam offered victims the buy stocks. without off-shore D
parking
opportunity to: risk. property.
funds in
their
bank
account.

The fraud type that sends e-


mails that claim to be from
Shill Siphonin
legitimate sites in order to Phishing Hoaxing B
bidding g
obtain sensitive information
is called _________________.
Using the Internet to pursue,
harass, or contact another in Internet cyber virtual Web
B
an unsolicited fashion is stalking. stalking. stalking. stalking.
called:
Setting your privacy settings
in Internet Explorer to pop-ups. cookies. spam. viruses. B
medium is one way to block:

What is the best means of Use a fake e- Never use Use a Use anti-
protection from cyber mail your real proxy spyware B
stalking? address. identity. server. software.

Which of the following is not Message


Physical Logical
an appropriate control over sequence
Encryption Security access B
telecommunications number
controls controls
software checking
Encryption techniques can
Both I & Neither I
be implemented in I only II only C
II or II
Hardware-Software
Which protocol would be
used to download a free anti-
irc ftp www telnet C
virus program from the
Internet?
Misleads
The major advantage of the Adds more Verifies Increases a
checksum program is when bytes to integrity of boot up program B
it programs files time recompil
ation

both
HTML
Which of the following is a Internet Microsoft
HTML and B
Web browser? Explorer Excel
Internet
Explorer
round
trip
A Web page is another name HTML Web
Web query. HTML B
for ----------- document. browser.
documen
t.

Domain names must contain


.con is
a description of the type of .com is .co in used None of
used for
organisation that the domain used for for the A
companie
represents. A very common company company above
s
abbreviation used include:

the World
A standard language for
round trip Wide Web one way
creating and formatting Web HTML. C
HTML. Consortiu HTML.
documents is:
m
The Web page format in
which all elements of a Web
XML. HTML. DHTML. MHTML D
page are saved as one file is
called:

clicking a
hyperlink
using
that
Internet viewing
reference
Explorer to updating an Excel
sa
view a Web the values workshe
Which of the following documen
page that is that are et that
requires an Internet t that is B
stored on obtained you have
connection? stored in
the hard through a saved as
the
drive on Web query a Web
floppy
your page.
drive on
computer
your
computer

Mr Rao wants to find a


Click on the Click on Go to the Go to the
website that he briefly
Back arrow ‘Go to’ or History Bookmar
browsed over yesterday.
until the ‘Search’ in page and ks or C
After turning on his
desired site the look for Favorite
computer how would he do
is found browser the site s page
this?
the
the
the Insert External
Which of the following is the Refresh Update
Hyperlink Data A
used to update a Web query? command comman
command comman
d
d
You download from the
internet, a screensaver, a ten-
second sound file and a ten-
second music video clip. You Screensav
Hyperlink Sound Video C
also add a hyperlink. Which er
of the media elements has
the greatest effect on the file
size?

When saving a photograph


for use on a website, which BMP GIF JPEG TIFF C
format should you choose?
Cut and
paste it
While researching the Direct Add it to
Write it to a
taxes assignment, you find a ‘Favourit
Save it to a down on a word
useful website. What is the es’ or C
floppy disk. piece of processo
most efficient way to access ‘Bookmar
paper. r
the site at a later time? ks’.
documen
t.
A system that uses the
privilege
Internet for business-to- network
extranet. intranet. d A
business interaction is called topology
network.
a(n):
A block of text automatically an
an a
added to the end of an a footer. encrypti B
attachment. signature.
outgoing email is called on.
_________ refers to the use of
Internet technologies for VoIP IPT IPP PoIP A
placing telephone calls.
Desktop
Most client/server Desktop Desktop Desktop
server,
applications operate on a client, client, server,
software,
three-tiered architectureapplication, software, applicati A
and
consisting of which of the and and on, and
hardwar
following layers? database. hardware. database.
e.
None of
Which do you NOT need to Telephon
Modem CD-ROM the B
connect to the Internet? e line
above
File
File File None of
Transmissi
What does FTP stand for? Transfer Transfer the B
on
Program Protocol above
Protocol
So
So IP So email
computers None of
addresses is
What is the purpose of DNS? can be the A
can be delivered
referenced above
shorter faster
by a name
Which of the following is None of
143.215.
NOT a properly formatted IP 193.1.2.3 45.1.1.1 the D
12.19
address? above
Which of the following is a paul .trigg paul.trigg None of
paul.dom
properly formatted email @ domain. @domain. the B
ain.uk
address? org. uk org.uk above
Scientists
The US None of
The Internet is controlled by in
governmen No-one the C
whom? Switzerlan
t above
d
Internatio Internet
None of
Internet nal Relay Remote
What does IRC stand for? the A
Relay Chat of Conversa
above
Characters tions
A letter
It will be
will be None of
If you do not pick up your It will be waiting for
sent to the A
email for a week...? deleted you to
you in above
collect it
the post
Receiving
People
messages
discussing High None of
What is a disadvantage of automatical
a topic of volumes the C
joining a mailing list? ly from
interest of email above
anyone in
globally
the group
autolayout
slide
In Powerpoint2000 ,the built- s and none of
clipart & view &
in professional design presentati the B
auto shapes outline
elements are on above
view
templates
Selection handles are the 8
small ___________ that appear
circles points squares icons C
around the object, when an
object is selected
The _______ is an invisible
matrix of vertical and
square image grid guide C
horizontal lines that covers
the entire slide workspace

_______ are drop-down menus


that appear when the right short cut auto all the
tool bars B
mouse button is clicked on menus shapes above
the screen element
________ and ______ have the
slide show
ability to add a lot of visual clip gallery fonts & none the
& view A
impact into the PowerPoint & word art images above
show
presentation
_______ is a motion picture or all the
wave file media clip .video file B
any animation file above
In visual basic, when a
record pointer reaches to
the last record, _______ movelast,t movelast,
eof,false eof,true D
property of a recordset rue false
object is automatically set to
______
In visual basic, the explorer form
properties project
view of a project is displayed layout toolbox D
window explorer
in ___________ window
In visual basic, when a
record pointer reaches to
the first record, _______ movefirst,t movefirst
bof,false bof,true D
property of a recordset rue ,false
object is automatically set to
______
In visual basic, _______ is a
method to convert a string value() int() number() val() D
into integer.
In visual basic, in a shape
control, a vb statement gives
circle rectangle square oval D
Shape1.Shape = 2. What type
of shape should we get?
In visual basic, a timer event
is only available in timer true false A
control.
In visual basic, vbred or
vbgreen or vbblue are the
true false A
property values of a
backcolor of any object
In visual basic, _______ is a none of
property of a textbox control fontcolor color forecolor the C
to set a color of a text. above
In visual basic, _______
none of
property of a textbox control underline,t fontunderl textunde
the B
is set to _______ to underline a rue ine,true rline,true
above
text
In visual basic, _______
property of a textbox control
textsize size foresize fontsize D
is used to change the size of
text.
one- one-ten
In visual basic, the interval one- one-
thousand thousan
property of a timer control is millionth of hundredth C
th of a dth of a
given in ________ a second of a second
second second
In visual basic, _______
property of listbox control recordcou itemcoun
count listcount D
counts the number of items nt t
in the list
In visual basic, the
properties of various form layout prperties project
toolbox B
controls can be set using window window explorer
__________
In visual basic,
vbinformation, vbcritical, none of
vbmsgbo
vbexclaimation are the title prompt the C
xstyle
values of _______ in a above
messagebox function.
In visual basic, ________ is a
function which displays a
inputbox
message and it also allows msgbox() textbox label D
()
the user to enter values in a
form object
In visual basic, using a data
control, ________ is a
recordset type which allows opendynas opensnaps dbopens dbopend
D
to add a new record and also et hot napshot ynaset
to update existing record in
a recordsourse object
In visual basic, while closing
a form _______ event of a form
load activate unload initialze C
object is triggered earlier to
terminate event.
In visual basic, to give a
backcolor or to bring in a
picture to a command transpare graphica
standard opaque D
button can only be done if nt l
we set the style property to
______
In visual basic, a method
RGB(255,0,0) will generate blue red green black B
_______ color
In visual basic, a method
RGB(255,255,255) will red green blue white D
generate _______ color
In visual basic, if a user uses form project
properties
a shortcut key ctrl+R layout toolbox explorer D
window
_________ becomes visible. window window

In visual basic, if a user uses form project


properties
a function key F4 _________ layout toolbox explorer A
window
becomes visible. window window
In visual basic, when a
textbox control receives the
change lostfocus text gotfocus D
focus ________ event is
triggered.
none of
In visual basic, a form is a
child parent container the C
________ object.
above
Microsoft visual basic is a
Rapid Application true false A
Development tool.
In visual basic, when a form
object appears on the screen load unload initialize activate D
_________ event is triggered.
In visual basic, to display none of
text on a label object _________ text name caption the C
property is used above
In visual basic, _______ object
none of
is used to access the opendataba openreco
dbengine the B
database and also to manage se rdset
above
the data in the database.
In visual basic, when a
checkbox control is checked
_______ property is enabled visible value style C
automatically assigned with
1.
In visual basic, _______ none of
keyword is used to declare a dime dim var the B
variable above
What is the extension of the
Visual Basic project file that
.ctx .ctl .ctr .ocx B
stores the design of a user
control.
Which event of a text box
would you use for validating
Validate Validation Check Audit A
the data entered by the
user?
Which of the following On Error On Error On Error
On Error
statements forces inline GoTo GoTo Resume D
Stop
error handling? linelabel Inline Next
The _______ method resets the
contents of bound controls
UpdateCont PaintPictu
to their original values when Refresh Resize A
rols re
the user clicks on the cancel
button.

UnloadM UnloadM
To deactivate the Form Cancel ode ode
Cancel
UnLoad event, you make the parameter paramete paramet
parameter A
following change in the to a non- r to a non- er to a
to 0
function definiton: zero value zero zero
value value
None of
How many root nodes can a
1 2 3 the D
TreeView control have?
above
Consists
Consists of of Consists
Consists of
A project group is a Project several Various of
several D
which: Applicatio Forms several
Programs
ns And Code Projects
Modules
Procedures declared in a Form
Project Class
_____ are local whereas window, None of
window, module,
procedures declared in a standard or the A
view code code
______ are available to the code above
window module
whole application. module
Place
Place code Place code
How can you keep the user code in None of
in the in the
from exiting a form by the the B
Terminate Unload
clicking the Close button? Deactivat above
event event
e event
The _______ property enables
Visual Basic to draw
AutoRedra AutoRedra PaintPict
complete images in memory Refresh A
w = True w = False ure
before displaying them on
the Screen.

Msgbox
You want to display the code Msgbox
Msgbox Msgbox error.nu
and the description of an error.nu
err.no & err.numbe mber & D
error. What would be the mber &
err.text r & err.text error.des
correct syntax? error.text
cription

To
provide
a
To allow
To display To help in repositor
What is the purpose of the the
images to creating a y for D
Image List Control? editing of
the user ToolBar images
icons
used by
other
controls
Which method would you
use to get a free or unused GetFileNu
FreeFile GetFile GetBytes A
File identifier while opening m
any file:
Which property procedure is
GetPrope
used to retrieve the value of Retrieve Get Value B
rty
a property?
Which of the following can Common
be shown to the user using messages Open Windows Input
D
the Common Dialog control passed to dialog box explorer box
in VB? Windows
Which of the following are
Multi-
not properties of Command Caption Visible Font C
Line
Button:
KeyPress
Which events enable you to Click, KeyUp , KeyUp
Click and
determine which key was KeyUp and and and D
KeyPress
pressed by the user? KeyDown KeyDown KeyDow
n
In order to access a file in
Ascii Binary Input Output
Non-textual format, you B
Format Format Mode mode
have to open file in:
Visual Basic displays
information depending upon CurrentX ScaleLeft ScaleHeig
the current value of two and and ht and x and y A
properties of the form, CurrentY ScaleTop ScaleTop
called:
Which of the following
procedure types will execute Property Property Property Property
C
when you assign a value to a Get Assign Let Set
property of an object?

In order to overlap the


controls (say a command
button) during design time,
we use the ‘Send To Back’ or Backgroun AutoRed
Caption ZOrder
‘Bring To Front’ option from d color raw C
property property
the Edit menu. To change it property property
dynamically (i.e.during
program execution) we need
to change:
Which property of the
ProgressBar determines CurrentV
Min Max Value B
how much of the bar is al
filled?
The ______ function can be
used to run any .com, .exe,
Shell Substr SetAttr CStr A
.bat or .pif file from a Visual
Basic program.
Are
The caption and the name Are one Can be actually None of
properties of the command and the different at not the B
button: same times propertie above
s
You try to initialize a new
You do not You do not
Object variable with the MyVar
need to use have the None of
following line but receive an has not
the Set permissio the C
error. What could be the been
command n to access above
possible cause? Set MyVar = declared
here the class
New Classname
The
Which of the following will None of
The Open The Exec ExecProc
perform a direct execution the D
method method edure
of a Command object? above
method
A critical An None of
The vb Critical symbol A warning
message exclamati the B
displays: query icon
icon on icon above
built-in
vbYesNo is an example of intrinsic
statement. variable. procedur C
a(n): constant.
e.

InputBox MsgBox
function statemen
MsgBox InputBox
can be t can be
statement function
created created
The primary difference returns a returns a
with the with the
between the MsgBox value, value,
macro macro B
statement and the InputBox while the while the
recorder, recorder,
function is the: InputBox MsgBox
while the while the
function statement
MsgBox InputBox
does not. does not.
statemen function
t cannot. cannot.
Which of the following is
TRUE about a protected Data A new
form (i.e., a form where the cannot be The form Data can check
Protect Form button on the entered can be be box can C
Forms toolbar is toggled on into the modified. entered. be
and is assumed to remain in form. added.
that position)?
Which event is triggered
QueryUnlo Deactivat Terminat
when the user moves to Unload C
ad e e
another open form?
The user can use ______ to scribble
clipping cropping cutting
remove the undesirable part drawing A
tool tool tool
of the image tool
The power presentation has
color color color
a _____ for a set of compatible color box C
palette scheme guide
colors
The set three colors used for primary
tricolor color
graphs and for secondary ascent color A
scheme palette
slide items is called as scheme
There are ______ types of
charts available in 10 28 18 36 C
PowerPoint
_______ charts are useful
while showing variations column bar pie linear A
over a period of time
slide
_______ are the individual images
images slides sorter C
pages of a presentation and text
views
A PIE Chart is a ____ diagram
that depicts the relationship all the
circular radar doughnut A
between a whole and its above
parts
Each individual piece of
data in a series is called entity data point data stream B
a/an
PowerPoint launches an OLE- Microsoft
auto track
compatible application organizatio clip art A
shapes changes
called n chart
the chart
the the chart window
When the user double-clicks none of
organizatio is made opens
on an organization chart the C
n chart is available displayin
object in PowerPoint above
expanded for editing g a chart
template

The _____ are used for general custom standard


selecting, editing and box tools purpose drawing drawing C
viewing objects in the chart tools tools tools

used to
used to
store the
create a
used to other
Manager box tool in accessed manager
mange tools of
organizational chart window only by box for C
organizatio the
is manager an
nal chart organiza
existing
tional
box
chart
not
available
The custom drawing tools available
turned on turned off in the B
are _______ by default in the
tool bar
tool bar
any of
Click on the box tool ______ to
once twice thrice the C
draw three boxes
above
There are ____ default fields
available in all boxes of the two four five eight B
organizational chart
The _____ tool is used in the
standard all the
same way as we use a pen to native tool draw tool B
tool above
draw a table
A/An _______ consists of
handlayou slide none of
smaller printed version of autolayouts B
ts view these
the slides
none of
The size of the object can be reduce/enl
zoom preview the B
changed using the ______ tool arge
above
_______ is the process through
which the slides in the
current presentation are importing exporting copying moving B
included in another
presentation or application

________ can be used to create Microsoft auto drawing


clip art A
charts as well as worksheets excel shapes tools
PowerPoint can import text .rtf(rich .html(hy
.ppt(Power .doc(docu
files that have been saved in text pertext B
Point) ment)
______ format format) format)
PowerPoint outlines can
nine only one six twelve C
have _____ outline levels
When a file is saved with
.rtf(rich .wmf(wind
_____ extension, the graphics .txt(plain .doc(doc
text ows B
and text are also saved along text) ument)
format) metafile)
with the slide
not displayed displayed
none of
displayed only only in
The hidden slide is the A
during the during the outline
above
slide show slide show view
____ effect is used to DTS(digital 3D(3
both a transitio
introduce a slide during a track dimension D
and b n
slide show sound) )
A _____ is a special effect that
slide view
determines how the objects build transition A
show show
appear on the slide
The notes page is formatted notes slide master master
A
based on the master master slide notes
slide
Pick the odd man out of the outline view
slide view sorter C
following view show
view
When a new presentation is
opened ,powerpoint creates
15 10 7.5
slides that have a width of none the
inches,10 inches,7.5 inches,5 B
_____ and a height of ______ above
inches inches inches
with the landscape
orientation
The default orientation for none of
notes ,handouts and outlines portrait landscape a or b the A
is ____ orientation above
Build effect is also called as transitio
animation view show b or c A
______ n
Graphics for web pages are none of
automatically stored in ____ gif jpeg png the D
format above
A _______ is used to jump to action all the
hyperlink hypertext D
any slide in the presentation button above
visual
The ______ language has been Microsoft
basic for all the
incorporated into visual c++ visual B
applicatio above
PowerPoint interdev
n
In PowerPoint _____ is a
template
series of commands that are macro batch file add-ins A
s
executed in sequence
when the
while during none of
slide
The macro will be activated creating a slide the C
show is
.exe file transition above
run
Developers can easily add
____ to PowerPoint 2000 by virus spell header all the
A
using the programming checkers checkers files above
interface
______ determines the order
none of
in which order in which the custom both a
slide show the B
slides will be displayed show and b
above
during the show
_______ is used to organize
propertie outline
and develop the contents of slide pane notes pane D
s pane pane
a presentation
If we save the presentation power
internet paint shop paint
file as a metafile, it can be point D
explorer pro shop pro
opened using 2000

PowerPoint
creates a
it is the contains provides
With reference to sample
quickest sample suggeste
autocontent wizard for presentatio
way to presentat d
creating a new presentation, n to which D
create a ions for a content
which of the following user can
presentati variety of and
statements are not true add words
on topics design
and
pictures
user can
insert user can
user can picture to insert
user can insert only the picture
insert pre- master to the
objects like drawn, pre- slide title slide
clip-arts, colored which which
Which of the following
pictures graphic gets gets B
statement is not TRUE
stored in a images reflected reflected
separate reflected in all the in all the
files to the in a clip slides slides
slides arts to the using using
slides that that title
master slide
slide
in notes I slide
in outline in slide
pages view,
With reference to changing view, drag sorter
view, drag the
the order of slides, which of the slide view, drag
drag the slide C
the following statement is icon to a the slide to
slide icon icon to a
not true new a new
to a new new
location location
location location
the slide
that holds the slide
the that
design
formatted holds the
template
placeholder formatte
transition s is the
s for the d
means template
titles, main placehol
applying whose
text and ders for
special format
Which of the following any the title
effects to and color D
definitions are not true background and sub-
the scheme
items that title for
crossover user
user wants the
between applies to
to appear presenta
the slides a
on the tion is
presentat
slides is called a
ion
called a title
master template
templates
in outline
view, user
can see the user
with notes the
miniatures should
pages view slides
of all slides select the
user can can be
Which of the following in a slide
prepare reordere B
statements are not true presentati view to
speaker d in the
on, add the
notes and outline
complete text to
handouts view
with text the slide
and
graphics
the slide
that holds the slide
the that
design
formatted holds the
template
placeholder formatte
transition is the
s for the d
means template
titles, main placehol
applying whose
text and ders for
special format
Which of the following any the title
effects to and color D
definitions are not true background and
the scheme
items that subtitle
crossover user
user wants for the
between applies to
to appear presenta
the slides a
on the tion is
presentat
slides is called a
ion
called a title
master template
template
The options available in the
set up
common task toolbar does slide layout customize new slide B
show
not include
by default,
user can
doughnut
data to be add data
chart is data is
With reference to chart, graphed labels
displayed plotted in
which of the following resides in a and B
based on a chart
statements are not true datasheet gridlines
the data in window
window to the
the
chart
datasheet
The format of the text
entered in a title, subtitle, or
the the
bulleted-list object is the master the slide
header format B
determined by the format slide master
slide slide
settings in a special slide
called --------
PowerPoint provides a
_________ that searches the
none of
entire presentation i.e., all office spell grammar
the B
the text objects in all the assistant checker checker
above
slides, outlines, notes and
handouts for spelling errors
PowerPoint's drawing
toolbar contains _______ 10 12 102 22 B
drawing tools
Click _______ on the rectangle
four
drawing tools enables us to once twice three B
times
draw multiple rectangles

text,
CD-ROM, hypertex
text, text,
An example of the digital t, Power
graphics hypertext
components of a multimedia camera Point, D
and email and Power
presentation could include and video
address. Point.
sound. and
sound.
Line
style,
Which of the following the Font
Line
formatting elements can be and the
the Line the Line color,
applied to a PowerPoint text D
style color text font,
diagram using the alignmen
and text
AutoFormat tool? t
alignmen
t

Fill color,
Which of the following
Line
formatting elements can be
Line color,
applied to a PowerPoint Fill color Line color D
thickness and Line
diagram using the Format
thicknes
AutoShape command?
s

A popup Microsoft
Excel is box Graph is The
What happens when you
started so prompts started graph
double click a blank graph
that you you for an so that placehol C
placeholder in a PowerPoint
can create a existing you can der is
presentation?
chart. Excel chart create a deleted.
to insert. graph.
taken
from the
first
column
or row of
data in
always always
the
taken from taken from
datasheet entered
The legend in a Microsoft the first the first
, by the C
Graph chart is: row of data column of
dependin user.
in the data in the
g on
datasheet. datasheet.
whether
the data
series are
in rows
or
columns.

Suppose you are creating a


Microsoft Graph of quarterly
Side-by-
sales by region. Which Stacked Line
side Pie chart B
would be the best chart type column chart
column
if you want to emphasize the
total sales of each region?
Pull
down
the
Insert
menu
and
select
Pull Chart,
Click the down the click the
Pull down Insert Insert Insert
Which of the following
the Insert Chart menu Chart
actions will enable you to
menu and button on and button D
insert a graph into a
select the select the on the
PowerPoint presentation?
Chart. Standard appropri Standard
toolbar. ate toolbar,
Object. or pull
down
the
Insert
menu
and
select
the
You
Click the
cannot
chart
Pull display
object,
It down the the
If you are editing a slide then click
automatical Edit underlyi
containing a Microsoft the View
ly displays menu, ng B
Graph, how do you display Datasheet
in Slide then datashee
the underlying datasheet? button on
view. select t once
the
Object. the slide
Standard
is
toolbar.
finished.
How do you deselect a chart
Change
that has been placed onto a Double Click
Single click to Slide
PowerPoint slide after you click the outside C
the chart. Sorter
have finished creating the chart. the chart.
view.
chart?
A dialog
A dialog box is
box is displayed
The
displayed allowing
datashee
allowing you to
t
you to enter the
The window
enter the name of
What happens when you datasheet is
name of the the Excel
click the Datasheet button is saved toggled
Excel worksheet D
on the Microsoft Graph as a from
worksheet that
toolbar? separate closed to
that should should be
file. open (or
be linked to embedded
from
the in the
open to
PowerPoint PowerPoin
closed).
presentatio t
n. presentati
on.
The
applicati
The chart
What happens if you single on that
The chart is The chart is
click a chart that is not created A
selected. is deleted. doubled
currently active? the chart
in size.
is
started.
The chart Microsof
What happens if you double
The chart is The chart is t Graph
click a chart that is not D
selected. is deleted. doubled will
currently active?
in size. restart.
a slide
one
bullet
item at a
time,
build
bullet bullet bullet
a slide one
Using custom animation items one items one items a
bullet item D
effects, you can build: letter at a word at a letter at
at a time.
time. time. a time,
and
build
bullet
items a
word at
a time.
Subtle,
Which of the following
Moderat
animation effects can be Subtle Moderate Exciting D
e, or
added to a slide?
Exciting
Neither
Both
enter
enter and
nor exit;
Which of the following Fly in from exit, and
Enter and neither
animations effects can be top or fly in C
exit fly in
added to a slide? bottom from top
from top
or
nor
bottom
bottom
Which keyboard key is used
to select more than one Enter Shift Alt Ctrl B
picture on a slide?
Custom
animatio
n can be
used to
affect the
way
objects
appear
on a
what
the way the way slide, to
objects do
Custom animation can be objects objects what
after they D
used to affect ONLY: appear on a exit a objects
appear on
slide. slide. do after
a slide.
they
appear
on a
slide,
and to
the way
objects
exit a
slide.
The
advance
The
d
advanced
timeline
timeline
shows
shows
neither
the
the
The The sequence
sequenc
advanced advanced in which
e in
timeline timeline objects
Which of the following best which
shows the shows the will
describes the information objects
sequence in duration of appear C
that appears on the will
which the effect on the
advanced timeline? appear
objects will applied to slide and
on the
appear on each the
slide, nor
the slide. object. duration
the
of the
duration
effect
of the
applied
effect
to each
applied
object.
to each
object.
Clips,
Which of the following organiza
Organizati
objects can contain custom Clips Text tion D
on charts
animation effects? charts,
and text
What type of program allows
Animatio
an object within an image to Paint Draw Filtering
n A
be edited without affecting program program program
program
other objects?
Fly in,
Which of the following From
Dissolve
animation effects can be Fly in From top top, and D
in
added to a slide? Dissolve
in
Data There is
Once data Once data cannot be no such
Which of the following is
is entered it is entered entered thing as
TRUE regarding the B
cannot be it can be into a
Datasheet?
changed. changed. Datashee Datashee
t. t.

Graphical software tools that


provide complex analysis of OLTP. OLAP. OLST. OLIP. B
stored data are:

You can
You You
You can change
cannot cannot
change the both the
change change
appearance appearanc
Which of the following the style the color
of a whole e of a
statements is TRUE of the of the
diagram, whole B
regarding PowerPoint connectin boxes in
but not diagram
diagrams? g lines in an
individual and the
an Organiza
shapes of a individual
Organizat tion
diagram. shapes of a
ion chart. chart.
diagram.

Which keyboard key


combination is used to undo [Enter+A] [Shift+Z] [Alt+Z] [Ctrl+Z] D
the previous command(s)?
Microsoft visual basic
project file has _______ file .vbg .vbp .frm .frx B
extension.
In visual basic, _______ none of
method is used to add an add additem loaditem the B
item in a combobox above
In visual basic, _______
none of
method is used to load loadpictur addpictur
load the B
picture during runtime in an e e
above
image control
In visual basic, to populate a Dir1.Path
File1.Pat none of
drive list box with a Drive1.Driv =
h= the B
directory list box __________ e=Dir1.Path Drive1.Dri
Dir1.Path above
statement is used ve
In visual basic, to display a none of
messagebo
message in the run time message() msgbox() the C
x()
_________ function is used above
In visual basic, to populate a Dir1.Path
File1.Pat File1.pat
directory list box with a file Dir1.Path= =
h= tern=Dir C
list box ________ statement is File1.Path Drive1.Dri
Dir1.Path 1.path
used ve
In visual basic, ________ is a
property of a recordset
openrecord opendatab recordco
object which counts the count C
set ase unt
number of rows in a
recordsourse object
In visual basic, using a data
control, a record can only be
added from the last record.
update append addnew additem C
Adding a new record is only
possible using _______ method
of a recordset object.

In visual basic, using a data


control, a record is saved to
a recordsource object using append update additem addnew B
_______ method of a recordset
object.
In visual basic, using a data
control, to navigate to the
movepre movefirs
previous record ________ movenext movelast C
vious t
method of a recordset object
is used.
To deactivate the Form
UnLoad event, you make the
UnloadM UnloadM
following change in the
Cancel ode ode
function definiton:Private Cancel
parameter paramete paramet
Sub Query_Unload(Cancel as parameter A
to a non- r to a non- er to a
Integer,UnloadMode as to 0
zero value zero zero
Integer) To prevent the
value value
Form from closing, you will
set the:

_______ is a word processing


Office Back
that is a member of the office Word 2000 Office 97 A
2000 Office
2000 family
The feature that enables
none of
user to type anywhere in a double drag &
click-n-type the A
document without pressing click drop
above
or tab
The______ feature allows the
none of
user to copy and paste upto office
cut select the A
12 items at the same time in clipboard
above
an application
______ and _____ key
shift+end shift+left ctr+end none of
combination will extend the
and and and the B
selection by one character
shift+home shift+right ctr+home above
on the left and right
web
normal none of
_____and_____ are improved web layout, layout,
layout, the A
layout in Word 2000 printlayout page
web layout above
layout
click
from
start
none of
The easiest way to create a program,
wizard templates the A
document in word is MSWord
above
from the
task
menu

In Office2000 environment documen none of


office inbox
the tool that makes work t the A
assistant assistant
easier for us is_____ assistant above

A short description of a tool


bar button called the ______ is
Docume
displayed when the mouse Screen Tip Tool Tip Icon Tip A
nt Tip
pointer is allowed to stay for
a second on the button
The _____ helps us to keep none of
marginal
track of the margin of the tab stop ruler the B
stop
page above
The keys that are used to home up and
up arrow page up
navigate between headers and end down D
keys only keys only
and footers are keys only arrow
Pick out the element from
the following that does not
left center decimal rotation D
form the type of tabs for the
Word 2000
_______are blueprints or none of
dialogs/a
patterns for documents of a template model the B
lerts
certain type above
The______ is used for quickly none of
increase decrease both A
setting paragraph indention the C
indent indent and B
using the mouse above
special control design
Word art is text with pictures A
effect tool box wizard
AutoShapes in word can be
drawing control
created by accessing the database forms A
toolbar box
_____
By default, a document
1 2 0 11 A
consists of_____ section
printer print
The dialog box that is used page setup none of
setup from preview
to determine the documents from the the A
the file from the
margins is file above
menu file
________ is a box surrounding
none of
a page on all slides or a line
border shading style box the A
that sets off a paragraph on
above
one or more slides

The key that is used to


perform a task to select all t ctrl+a Del ctrl+f ctrl+m A
he text in the documents is
The key that is used to
ctrl+a Del ctrl+f ctrl+m D
indent a paragraph is
The key that is used to
change the font from the CTRL+SHIF CTRL+SH CTRL+S
CTRL+O A
current positioned in a T+F IFT+S HIFT+P
document is
The key that is used to
change the style of the
document that is from that ctrl+shift ctrl+shift
ctrl+shift+f ctrl+o C
normal to heading1 or +s +p
heading1 to other document
styles.
Set mapping' Check control
that follows a text-type None of
validation, we use -------------- Excel Access Both the B
--- application for data above
analysis.
Excel can import data from
other databases for the data TRUE FALSE A
analysis.
A System Auditor can uses
FALSE TRUE B
CAAT tools to analyze data

In the case of the ----------


control, it is ensured that the
data in combination with Transactio Limit Reasona
Valid Signs D
other fields are reasonable n type Check bleness
as per standard set by an
organisation.

--------------- function
searches for a value in the
None of
leftmost column of a table
HLOOKUP VLOOKUP A or B the B
and then returns a value in
above
the same row from a column
that we specify in a table

Most of the tools use in Data All of the


DDE OLE ODBC C
Analysis depends on above
This
Analysis is involves
Analysis the looking
translates loading of at a
program programs system
How do you define analysis code of a that and None of
C
of an information system? high level perform finding above
language to routines to out how
machine control informati
code peripheral on is
devices being
handled
Inputs, Maintena
Only outputs, nce,
What areas need to be
hardware file design reliability None of
considered in the B
and hardware, , and above
SOFTWARE design process?
software and upgradea
software bility
To execute To None of
What is the function of To collect
any maintain the D
systems software? data
programs security above

Deleted Copied Transfer


Formatting a disk results in Saved to
from the from the red from A
all the data being...? the disk
disk disk the disk

Users
Users
operate the
operate Users
manual
the operate
What is Direct system and None of
computer the B
Implementation? computer above
system manual
system at
from a system
the same
given date
time

The new
The new
system is Users
system is
introduced continue
introduced None of
What is parallel running? and users operating A
alongside above
start the old
the existing
operating system
system
it
User
Instruction
Log files Guide
What documents are s and
and and None of
produced during the technical C
temporary technical above
development of a system? documenta
files documen
tion
tation
User
guides
To enable
cover
any
how to
For printer to
What are User Guides are run the None of
technical be C
used for? system, above
support connected
enter
to the
data,
network
save,
print, etc.
Network
Database
Operating systems
systems None of
Systems software can be systems and
and the A
categorised into: and system communic
backup above
services ation
services
services
Magnetic
Which storage device cannot floppy Hard
tape CD-ROM B
be erased? disk disk
storage
To help
To
someone
maintain a
To do a who is None of
Application software are backup
particular applying the B
programs that are written copy of all
task. for above
the
employm
information
ent
Which bus carries
Address Control
information between Data bus Auto bus A
bus Bus
processors and peripherals?
Convert the decimal number
FDDI BAD TED MAD B
2989 to Hexadecimal
Which bus controls the
Address Control
sequencing of read/write Data bus Auto bus D
bus Bus
operations?
Data
Shells,
Operating structure
compiler
Peripherals system s that are
s and
that are routines part of
other
What are utilities? connected that the D
useful
to a execute in kernel of
system
computer. supervisor an
program
mode. operating
s.
system.
Numbers are stored and alphanu
ASCII code decimal
transmitted inside a binary form meric A
form form
computer in form
represent represen
ed 256 ted 127
The original ASCII codes were 7 bits 8 bits A
character characte
s rs
A Nibble corresponds to 4 bits 8 bits 16 bits 32 bits A
More than
1000 1024
A gigabyte represents 1000 mega 230 bytes A
kilobytes bytes
bytes

a 32-bit
32 I/O 32 Mb of bus or
A 32-bit processor has 32 registers D
devices RAM 32-bit
registers
used to
used to is the is the
indicate
A parity bit is detect first bit last bit in B
uppercase
errors in a byte a byte
letters
the contents of these chips
are lost when the computer ROM RAM DRAM CROM A
is switched off?
bits per
Clock speed is measured in baud bytes Hertz D
second
secondar
memory secondar
memory y storage
Cache memory enhances access y storage B
capacity access
time capacity
time

use
have fewer use more have
variable
instruction RAM than medium
CISC machines size D
s than RISC RISC clock
instructi
machines machines speeds
ons

Data is
Computer
not saved
Power is is
Every data from the primary before All of the
switched improperl D
memory will be erased if computer above
off y shut
is shut
down
down

a parallel a serial printer a modem


An RS-232 interface is B
interface interface interface interface

For print quality you would dot matrix ink-jet laser


line printer D
expect best results from printer printer printer.
stores
is faster to more is used
is non-
ROM access than informati for cache B
volatile
RAM on than memory
RAM
provides
increased backup
increases
the storage power in none of
the
A UPS capacity of the event the C
process
a computer of a previous
speed
system power
cut
has more is an
contains
storage access
is a form of a
smart card capacity card for a C
ATM card micropr
than an security
ocessor
ATM card system

none of
CRT LCD SSGA
Laptop computers use the B
displays displays displays
previous
having writing
several programs
none of
programs multitaski in
Multiprogramming refers to the A
in RAM at ng multiple
previous
the same language
time s
having the ability writing
several to run 2 or programs
none of
softwares more in
Multitasking refers to the D
running at programs multiple
previous
the same concurrent language
time ly s
What are small high speed
Logic
memory units used for ALU Registers Variables B
Bus
storing temporary results?
A good way to exchange
information that changes brochures magazines CD-ROM e-mail D
rapidly is through
to run
more
an than one none of
Multiprogramming is a multitaskin
operating program the C
prerequisite for g
system at the above
same
time
none of
multitaskin multiprogr
Timesharing is the same as multiuser the C
g amming
previous

______ is the default view in ONLINE


ONLINE PAGELAY
Word used for typing Editing NORMAL DOCUME A
LAYOUT OUT
and Formatting the Text NT

The short-cut-key that is


ctrl+hom
used to indent a paragraph ctrl+m ctrl+2 ctrl+end B
e
spacing in the documents is
The short-cut-key that is
ctrl+v or ctrl+c or ctrl+x or ctrl+v or
used to paste the selected A
ins ins ins Del
text
The short-cut-key that is none of
used for paragraph ctrl+2 ctrl+5 ctrl+1 the B
spacing(1.5) above
The box that separate text
from the document and
AutoShap
allows it to behave like an Text Box Frame Border A
e
independent object is known
as
The object that is used to
none of
provide information like the Header and Screen Page
the A
title of the book, name of the Footer Tips Layout
above
chapter, page number etc.
The object that helps us
Auto
analyzing data statistically is Chart WordArt File A
Shapes
known as
To highlight certain parts of
a page to set it apart from
Borders Shading WordArt Bullets D
the rest of the page we make
use of the following features

To clear all the tabs in a


document the option that is clear remove all remove clear all D
clicked from the tabs dialog

The dialog box that is used circle


picture arrow none
to incorporate picture bullet
bullets bullet dialog A
bullets into our documents dialog
dialog box dialog box box
or web pages is box

The object that composes of


set of tools which helps to
AutoShap
create and work on different charts WordArt files C
es
shapes like rectangles,
circles, flowcharts etc.
When word is opened a new
document called_____ is new default
document
displayed, where the user doc1 documen documen B
1
starts typing the content t t
right way
______ is an online dictionary
hyphenati mail none of t
maintained by word to thesaurus A
on merge he above
obtain synonyms for words
tools+sp
The thesaurus is invoked by thesaurus
shift+f7 shift+f8 elling A
pressing_______ menu
menu
When a new table is created last cell
the insertion point flashes first second first row of the t A
in the _____ able
By pressing the _____ key none of
inserts a blank row after the tab end enter the A
last row in the table above
table
The ______ option enables us convert convert none of
auto
to convert text into a table text to data to the A
format
format table table above
option
none of
A table consists of ______ that rows &
row records the B
contain text or graphics columns
above
The _______ option in word
allows the user to none of
AutoCorrec AutoForm style
automatically correct the A
t at gallery
misspell words as and when above
they are typed
______ is a facility that
none of
enables recording and Mail Data
Macro the B
replaying of a sequence of Merging Source
above
keystroke
In Word Macros are written visual visual
basic vj++ B
in _____ basic FoxPro
In Word 2000 the macro
dialog box is activated with
shift+f8 shift+f7 alt+f8 alt+f5 A
the help of ____ key
combination
________shows how a
online none of
document would look like web layout
layout browser the A
when published on the web view
view above
or on an intranet
______ is a software for micro
outlook
sending and receiving e-mail email client soft hotmail A
express
messages outlook
________is the coding system
html xml sgml vb script A
used to create web pages
The network that makes
information easily accessible
internet intranet arpanet LAN A
across various networks is
_______
field
the
names in
number
the
of fields
field name header
the field names in
must be source
separators the
listed in the must
Which of the following in a header header
same order match
statements are false with source and source
as the any
reference to the use of a the data must be B
correspond merge
header row source for a mail source can the same
ing fields
merge not be set as the
information you've
as number
in the data inserted
paragraph of data
source in the
fields in
main
the data
documen
source
t
delete
auto by
cells
format default
option
it is not option cell
allows to
possible to applies to height
delete
change the the entire and
With reference TO TABLE the
height of table and weight
WHICH OF THE FOLLOWING entire C
only not only to option
STATEMENT ARE false row or a
selected the applies to
column
rows of a selected all the
or shift
table rows or rows and
cells up
columns of columns
or shifts
a table of a table
cells left
The alignment available for
left decimal justified top A
tabs does not include
A section
If a
In order to is a
header is
type a portion
A new inserted
header of a
section is in the
from the documen
created in second
third page t in
Which of the following order to section
of the which
statements related to a change then the D
document certain
Section Break are True properties same
a section page
like header is
break is formatti
number of applicabl
inserted ng
columns e to the
after t he option
first
third page can be
section
set
The user can set a spelling
checker to skip the marked true false A
part of the next
New option under the file
menu of word creates a new
blank document that is true false A
based on the normal
templates
The user can split the screen
true false A
only into two parts
The features that enables the
user to type text graphics none of
drag & click -n- Double
tables anywhere in the the B
drop type Click
document without pressing above
enter or tab
The user can modify the
true false A
picture from the clip art

with t he
caps lock
key
accident
ally
turned
on
prohibits automati reverses
automatical
the user cally the case
With reference to auto ly corrects
from corrects of the
correct which of the common
renaming the letters B
following statements are typing,
an auto grammati that
false spelling
correct cally were
errors
entry errors capitaliz
ed
incorrect
ly and
then
turns off
the caps
lock
password
protected
With the reference to document passwor
password password
password protected can be d can be
can not are not
documents which of the opened upto 15 B
include case
following statements are without characte
spaces sensitive
false password rs long
as read
only
The alignment available for
left justified hanging top A
tabs does not include
an .xls
a a
data can
document multiple
a .ppt file not be
file can be documen
can not not inserted
inserted in ts files
be inserted at
Which of the following the can be
at specified specified B
statements are False current inserted
position in position
document in the
the current in the
at single
document current
specified documen
documen
position t
t
Drop Cap tool does not work
for the contents in the table true false A
format
The special symbols that are
inserted using "insert
symbol" option of the word
true false B
can not be printed by the
printer as they are not
standard keyboard symbols

The "format columns" option


allows to create columnar true false A
text up 12 columns only.
The document that makes
Hyperlin
the user to organize and none of
Master Child k
maintain a long document, the A
Document Document Documen
such as multipart report or a above
t
book consisting of chapters
The view that enables us to
Print none of
view how objects will be Page Outline
Layout the B
positioned on the page when Layout Layout
View above
it is printed
The mode that is initialized
none of
or toggled to if the user is in Insert Type Over
Remove the A
a position to overwrite the Mode mode
above
text in the word
Veena is entering a
paragraph in a word
processing program. When press the
press the press the just keep
the cursor gets to the end of escape D
return key tab key typing
a line, what is the best way key
to get the cursor to the next
line?
height
How are data organized in a layers and lines and rows and
and D
spreadsheet? planes spaces columns
width
Which key moves the cursor
enter/retu backspac
to the beginning of the next tab shift B
rn e/ delete
line of text?
Veena typed the following
sentence: "The girl was very
beautiful." In which word grammar spell thesauru
outliner C
processing utility could she checker checker s
find a synonym for
"beautiful"?
send a
send
Using an electronic bulletin public send a
send private
board, Seema can do all of message to package
pictures to messages D
the following except which friends to a
a friend to a
one? interested friend
friend
in one topic

Aryan has created a ten-page


story, but only wants to
From ___ Page Print
print the first two pages. Print all B
To ____ setup preview
What printer command
should he select?
What process should be
used to recall a document Enter Copy Retrieve Save C
saved previously?
Which is used to indent text
closing tabbing spacing sorting B
within a document?
Desktop publishing is a more
word
sophisticated form of which spreadsh
database graphing processin C
of the following types of eet
g
software?
Creating
Storing None of
What is a Word Processor To analyse and
informati the B
used for? figures editing
on above
documents

What is a picture that is


clipboar
saved on a diskette and can subscript annotation clip art C
d
be pasted into a document?
Font,
Spelling,
Paragrap
What basic tools would you Clear, grammar Cut, copy,
h, Bullet
find in the Edit menu of a replace and and paste and C
and
word processor select autocorrec clear
Numberi
t
ng

Text
Designat
Numbers which
Text at the ed area
What is a header in a which appear at
bottom of on the C
document? appear on the top of
every page documen
every page every
t
page

Mouse, Keyboard,
Monitor,
printer and Mouse, None of
What hardware is essential keyboard
processing monitor the B
for a word? and
system and above
mouse
keyboard? printer
The user could take a picture
from a magazine and insert micropho digital
Browser clip-art file D
it into the document by ne scanner
using a
Assume you are creating a
two-column newsletter.
Which type size is the most 6 point 10 point 15 point 25 point B
reasonable for the text in the
columns?
Given the default left and
right margins, and ½-inch impossib
spacing between columns, le to
2½ inches. 2¾ inches. 3 inches. B
the width of each column in determin
a two-column document will e.
be:
Word
cannot
display
columns
You have
Assume you have made all You have during
not
appropriate selections in the You are not not editing;
specified
Columns dialog box in Word, in Print inserted a you will
continuo A
but cannot see any columns Layout column see them
us
on the screen. What is the view. section only
section
most likely cause? break.. when
breaks.
you print
the
documen
t.

to leave
to move a an
section of original
text from section
While word processing, in
to store a to store a the of text in
which of the following
file on the file on a original place D
situations would Tom use
hard drive diskette location while
the "Copy" command?
to pasting a
another copy
location elsewher
e
Data about
A set of None of
What does a document a set of Mainly
different the B
contain? similar text
graphics above
things
Before submitting your work
you want to find any words
Spell Grammar Find and
spelt incorrectly. Which of Thesaurus B
Checker Checker Replace
the following would you
use?
What command in a word-
processing program can be
used to change the word
‘him’ to ‘her’, and also the
word ‘he’ to ‘she’ in the AutoCorr
Paste Replace Select all B
given phrase? “On a cold and ect
still night, the only sound
that could be heard was the
owl that had ade its home in
the nest outs
What edit commands would
you use to insert a
paragraph from one Delete, Insert,
Copy, then Cut, then
document into another then then A
paste paste
document, while still paste paste
keeping the paragraph in the
first document?
To
To give the
complicat
To give the original To allow
e the
original author a multiple
revision
Which of the following author a chance to people to
process
statements would NOT be a chance to reject work on
and to
reason for showing accept suggested one
force the
suggested revisions in a suggested changes documen C
author to
Word document without changes from the t in
spend
changing the original from the person collabora
more
document? person who who tion with
time
entered the entered one
making
revisions the another
correctio
revisions
ns
A vertical
line
outside
Commen
the left
A red ts are
A line margin
underline enclosed
appears signifies
Which statement is NOT true appears in a text
through a change
regarding revisions made in beneath box at D
text that is has been
a Word document? text that is the right
to be made at
to be of the
deleted. that
added. documen
point in
t.
the
documen
t.

Both
Through Through
through
the Edit the Tools Through
the Tools
How are suggested changes menu by menu by tools on
menu
entered for review on an choosing choosing the D
and the
initial Word document? Track Track Reviewin
Reviewi
Changes Changes g toolbar
ng
command command
toolbar
The
Versions
comman
The The
The d will
Versions Versions
Versions allow
command comman
command you to
will allow d will
will allow save
you to allow you
you to save only two
save only to save
multiple versions
one only one
versions of of a
Which of the following is version of version
a documen
TRUE about saving a a of a
document, t: one A
document using the Versions document, documen
including version
command? including t without
any of the
any any
changes original
changes changes
that may and one
that may that were
have been version
have been just made
made to of any
made to to the
that changes
that documen
document. made to
document. t.
the
documen
t.
The first
The
and
The latest previous
What happens when you All versions second
version is version
open a document that has are opened versions
opened is B
been saved using the automatical are
automatic opened
Versions command? ly. opened
ally. automati
automati
cally.
cally.
You have used the word
‘discover’ four times in an
English essay you have
created using a word
processing program. You Grammar Spell Thesaur
Dictionary A
would like to find another check check us
word of similar meaning to
use instead of ‘discover’.
Which of the following
would you use to do this?

Word Word is
Word The most will show not able
When opening and working displays a recent the name to tell
with multiple versions of a list of the version of the the most
document, how can you tell dates and will person recent A
which is the most recent times each appear at who version
version? file was the bottom saved of a
saved. of the list. each documen
version. t.
Various fields are added to a
regular document to create a
special document called a Fields Tools Forms Insert C
form through the ____________
toolbar.
Which of the following types
Check Toggle Text A drop-
of fields CANNOT be B
boxes button fields down list
inserted into a form?
Comment Commen
s can be ts can be
edited or edited or
Which of the following is
Comments Comments deleted deleted
TRUE related to editing
cannot be cannot be by right by left C
comments in a Word
edited. deleted. clicking clicking
document?
the the
highlight highlight
ed text. ed text.

Text
Numbers which
Text at the None of
What is a header in a which appear at
bottom of the C
document? appear on the top of
every page above
every page every
page
In your English essay you
notice that the paragraph at
the bottom of page 1
Insert
continues on to page 2. You Press Copy and
Press tab. page D
would like to make this Return. paste.
break.
paragraph start on page
2.What would be the best
way to do this?
Tables in a document help
numbers
you to easily arrange all of text. graphics. forms. C
.
the following EXCEPT:
To identify a document, it is
header/foo bibliograp find/sear
helpful to include the file macro. A
ter. hy. ch.
name on each page as a
This
Which of the following tools Format
Copy Paste action is
will copy the formatting of Painter C
button button not
selected text to other places? button
possible.

What is the name of the


Fault Bug Error Debuggi
process of determining the D
Finding Squashing Injecting ng
cause of errors in a macro?
Drop caps are added to a
Word document using the Insert Tools Format Edit C
___________ menu.

a section the
an
of text guideline
enlarged
where the s used to
a section of capital
first letter establish
white text letter at
of each where
A reverse in a newsletter is: on a black the A
sentence is different
background beginnin
lowercase elements
. g of a
and the of the
paragrap
rest are newslette
h.
uppercase. r will go.

underlini
typing it
setting it in ng the changing
A pull quote is best all in
larger type text of the A
emphasized by: capital
or font size. the pull color.
letters.
quote.
A grid is
a set of
A
horizont
dropped
al and
cap is a
vertical
The reverse A pull word
lines that
technique quote is a that
determin
means to quotation starts
e the
Which of the following add dark taken from with a
placeme D
definitions is CORRECT? text on a (pulled) lowercas
nt of
light from e letter
elements
background another when it
in a
. document. should
newslett
have a
er or
capital
other
letter.
documen
t.
Pertaining to newsletters, The tab
The
which of the following The width The height spacing
number
cannot be changed using the of each of each within D
of
Columns command dialog column column each
columns
box? column
As related to type size, how
many points are there to the 6 10 12 72 D
inch?
Assume you are working on
a newsletter in which the
masthead extends across the
top of the entire first page.
One Two Three Four B
The rest of the newsletter
has two columns. What is
the minimum number of
sections in the newsletter?
Press Press
Press
Which of the following is Press Ctrl+Shift+ Shift+En
Enter to
NOT correct with respect to Ctrl+Enter Enter to ter to
create a C
page, column, and section to create a create a force a
section
breaks? page break. column line
break.
break. break.
Which of the following A sans A sans
A serif
would be the most A serif font serif font serif font
font at 20 D
appropriate font for a at 10 points at 10 at 45
points
newsletter headline? points points

It
depends
on the
left and
right
Which of the following is the margins,
2 inches 3½ inches 4 inches D
default Word column width? and how
many
columns
are
specified
.
None of
Sequence Check is a ------------
Field Record Both the A
--- level control check.
above
Analyse data over two or None of
more periods is called --------- Horizontal Vertical A or B the A
-------------- analysis Above
We use Hash Total to
identify ------------ within a
Duplicate Combined All of the
series where there is a Gaps C
Value Value above
definite relation between
items
Analyse fields by arranging None of
Cross
them into rows and columns Filter Merge the A
Tabulate
is called above
--------------------- function
searches for a value in the
None of
leftmost column of a table VLOOKUP( HLOOKU
RAND() the B
and then returns a value in ) P()
above
the same row from a column
that we specify in the table.
To import data from Access
to Excel ,it is not possible to
TRUE FALSE A
link between Access and
Excel sheet
The GAP detection options
can be used to test for TRUE FALSE A
completeness of data.
Exception testing can be None of
used to identify ----------------- Unusual Strange A or B the C
items above
exception compariso duplicate All of the
Data validity test represents D
testing n of data s testing above

Year end ledger, inventory


files or transaction files can
be tested for cut-off , to
True False A
ensure that the data has
been provided is for the
correct audit period
In Range Check , the data
may not be in proper
sequence but should be True False A
within a predetermined
range
In ---------------- Check data
entry follow a particular Both B &
Limit Sequence Range B
sequence and also a C
predetermined range.
related to none of
a form of a form of
Virtual memory is virtual the D
ROM VRAM
reality previous

involves
using
more
same as same as
than one
Multiprocessing is multitaskin multiprogr multiuser D
processo
g amming
r at the
same
time

use a
To help keep sensitive make a virus
set up a
computer-based information save the file backup protectio B
password
confidential, the user should copy n
program
to
to read
display
from or
to print informat
What is the function of a disk to calculate write
sheets of ion or B
drive? numbers informatio
paper pictures
n to a
on a
floppy disk
screen
none of
A 4GL is Uses Cobol uses Java uses C++ the D
previous.

A nanosecond is 106 sec 103 sec 1012 sec 109 sec D


What small, hand-held
a
device is used to move the
a keypad a mouse a frog message B
cursor to a specific location
pad
on the screen?

an
data that the instructi
data to be has been address on that
The memory address
transferred transferre of a has been C
register is used to store
to memory d from memory transferr
memory location ed from
memory.

an
the instructi
data to be data to be
address on that
The memory data register is transferred transferre
of a has been A
used to store to or from d to the
memory transferr
memory stack
location ed from
memory

an the
an instruction an address
instruction that has instructio of the
The instruction register
that has been n that has next D
stores
been fetched been instructi
decoded from executed on to be
memory executed

Which of the following is


a light a magic
used to indicate the location a cursor a scroll bar A
pen marker
on the computer monitor?
A mathematical procedure
that can be explicitly coded
in a set of computer Formula Algorithm Program Data B
language instructions that
manipulate data.
Which of the following
translates a program written Artificial
Parity
in high-level language into Assembler Compiler Intelligen B
Checker
machine language for ce
execution?
Detecting errors in real Memory Parity Range Validatio
B
memory is a function of protection Checking checking n
use the
To find where a file has been search use the use find
directory
saved on disk, the user each file in backup and A
search
should turn facility replace
tools
A series of instructions
telling the computer how to
Network Program System Modem B
process data or files is
defined as a
save copies
use
of the file keep a backup
To ensure that data is not different
with the record of to a
lost if a computer system filenames D
same name computer secure
fails, the user should on the
on the failures medium
system
system
Having a single CPU
Multipro
alternatively process tasks Multiproce Time Multiple
grammin D
entered from multiple ssing sharing xing
g
terminals is called
The place in the CPU where
the data and programs are Floppy Magnetic
ROM RAM B
temporarily stored during Disk Disk
processing is called the
All are examples of Word Telephon Sharewa
Firmware C
computer software except Processor e modem re
Computer manufactures are
now installing software
Word Telephon Sharewa
programs permanently Firmware A
Processor e modem re
inside the computer. It is
known as
Which of the following file
organisation forms most
Sequential Hashed Indexed Random C
efficiently allows access to a
record
The part of the computer
Operating Primary
system controlling data ALU CPU B
System Storage
manipulation is called the
Schema
For direct access storage
Tracks and Blocks and Files and and
devices the recording area is A
Sectors Sectors Tracks subsche
divided into
ma
Character, Database, File,
The data hierarchy from the Element,
field, character, record, C
largest to the smallest is field, file
database record field
Which of the following
hardware or software Maintenan
Valid
system controls provides a ce Systems Parity
character C
detailed record of all diagnostic logs check
check
activities performed by a program
computer system
Which one of the following
parts of a computer is MIDI Serial
Sound card. CD-ROM A
necessary to enable it to play interface interface
music?
An educational CD-ROM on
Indian Poets contains 1000
pages of text, 500 colour
pictures, 15 minutes of
Text Pictures Sound Video D
sound and 1 minute of video.
Which of the four different
media listed takes up most
space on the CD-ROM?

Which one of the following


printers is suitable for
Laser Dot matrix Ink-jet Drum B
printing sprocket fed carbon
copies?

recordin
g current
stock in
presentin
creating a
viewing an g an
the plans superma
Multimedia software can be encyclopae order for
for a rket and A
most productively used for dia CD- stock to a
building answerin
ROM. warehou
design. g
se.
custome
r
queries.

updated
To be effective a virus replaced never updated
once a C
checker should be regularly updated regularly
year

Which one of the following


software applications would
Document Graphics Spreadsh
be the MOST appropriate for Database D
processor package eet
performing numerical and
statistical calculations?
retain simplify
get into the make
confident file
Passwords enable users to system efficient C
iality of structure
quickly use of time
files s
How many bytes do 4
512 1024 4096 8192 C
Kilobytes represent?
loss of
Back up of the data files will duplicatio virus loss of
confidential D
help to prevent n of data infection data
ity
Which one of the following is
the MOST common internet TCP/IP HTML IPX/SPX NetBEUI A
protocol?

printer the
access to can do operatin
The advantage of a PC files can be
the internet 1000s of g system B
network is that shared
is quicker pages a is easy to
day use
a
the root the hard
The term A:\ refers to a file name subdirecto D
directory drive
ry
uninterru
up-line uniform
universal ptable
UPS stands for provider page C
port serial power
service source
supply
the the
the
system system
program
requires always
orphan files executable
The main problem a requires
can be left may not
associated with uninstalling network a re-boot A
on the allow it to
software is that administr and
system be
ator to defrag
uninstalle
uninstall afterwar
d
it ds
You are conducting research
for a Income Tax documents informati
data. text. A
assignment. The raw facts . on.
you collect are called
Rules Logical
Graphical None of
writte in Steps in
A flow chart is the representat the A
procedural any
ion of logic above
language language
Purchase,
sales, To fill the It is
A voucher entry in Tally is None of
receipt, log mandator A
done for the bove
payments register y in tally
etc.
prevent
assist in allow
Passwords are applied to speed up unauthor
maintenanc encrypti C
files in order to access ised
e on
access
senior IT IT
Each of the following is an None of
executive manageme understa
enabler of IT-business the B
support for nt lacks nds the
alignment except: above
IT. leadership. business
The basic systems model is
used to describe virtually all
processin All of the
information systems and it input. output. D
g. above
consists of the following
elements:
Software
The use of
that
computers Using
generates
to design computers None of
What is a computer-aided innovate
state-of-the- to do the A
design system? d designs
art, high- architectur above
and
quality e.
artistic
products.
patterns.

A(n) __________ offers a specialist Applicatio


enterpris
solution package for an or n Service local B
e
entire industry. functional Provider
ensure the identify
File extensions are used in name the identify
filename is the file D
order to file the file
not lost type

All of the
Information systems correctiv above
preventive detective
controls include all of the e are parts D
controls. controls.
following EXCEPT: controls. of IS
controls.

extensibl
Hashing for disk files is external static dynamic
e A
called hashing hashing hashing
hashing
Components of expert
systems include: a) inference
A: (a) , (b), B: (a) to C: (a), D: (b),
engine; b) user interface; c) C
(d) (d) (b), (c) (c), (d)
knowledge base; d) fuzzy
logic
Black box testing and white corrective preventive detective general
C
box testing are part of: controls controls controls controls
What is the term used to
describe the point of
interaction between a
Component Interface Settings Control B
computer and any other
entity, such as a printer or
human operator?
The advantages of CASE
tools are: a) reusability; b) (a), (b),
(a), (c), (d) (b), (c), (d) (a) to (d) C
maintainability; c) (c)
portability; d) flexibility
Pull the
Select the power
Turn the
‘Shut cord
Which of the following is an Press the computer
Down’ from the
acceptable way to shut down reset off at the C
option back of
the computer? button. power
from a the
point.
menu. compute
r.
Yesterday, in your music
class you saved your Put your
Ask the Use the
compositions as MP3 files. hand up
Create the person Find or
Today, you cannot and ask C
files again. next to Search
remember where you saved the
you. feature.
them. Which is the best way teacher
to locate the files?
Components of an
information system model
are: a) applications
(b), (c),
architecture; b) functional (a), (c), (d) (a), (b), (c) (a) to (d) C
(d)
architecture; c) technology
architecture; d) information
architecture
organisati preventiv correctiv
detective
Benchmarks form part of: onal e e C
controls
controls controls controls
Continuity controls include:
a) record counts; b) date (b), (c),
(a), (c), (d) (a), (b), (c) (a) to (d) C
checks; c) label checks; d) (d)
run-to-run totals
resolutio
program
Which is not part of help problem n
call lights change C
desk documentation: logging procedur
requests
es
Testing of individual data thread loop
unit testing A
modules is known as: testing testing testing
Design phase of CASE tools
includes: a) data
architecture; b) decision (a), (b),
(b), (c), (d) (a), (b), (d) (a) to (d) D
architecture; c) interface (c)
architecture; d) presentation
architecture
specificati parallel system
Which is part of installation benchmark
ons operation walkthro B
testing: testing
matching s ughs
The computer operating
system performs scheduling, Job
Peripheral
resource allocation, and data Multiplexer Concentr control
processors D
retrieval functions based on . ator. language
.
a set of instructions .
provided by the:
Which of the following falls
under multimedia data: a) (a), (b), (a), (c),
(a) to (d) (b), (c), (d) A
text; b) images; c) video; d) (c) (d)
audio
Cross-
Which of the following Replaceme Physical
Identificati training
procedures should be nt personal security
on of of
included in the disaster computers of
critical operatin B
recovery plan for an for user warehou
applicatio g
Information Technology department se
ns. personn
department? s. facilities.
el.
Designing relationships
architectur interface procedur data
among components is part A
al design design al design design
of:
Compute
Several Computers Client-
Client r Hub C
connected together is called: server
network
Which network topology
Star Bus Mesh Ring A
uses a Hub?
Which of the following
All of the
topologies is used for Star Bus Ring D
above
Ethernet?

To To do a To help
To Store
maintain a particular someone
data in
backup job such as who is
Application software are an
copy of are editing, applying B
programs organise
written all storing for
d
the informatio employm
manner
information n ent

Which type of file search


method requires a computer
Direct Sequential Binary Indexed B
first read all locations
preceding the desired one
Systems
Which of the following areas Data
analysis Operatin
of responsibility are communic Compute
and g systems
normally assigned to a ations r
application and C
systems programmer in a hardware operatio
s compiler
computer system and ns.
programmi s.
environment? software.
ng.
Which of the following is A A A direct A direct
recommended when many sequential sequential access access
C
searches for data are file on a file on a file on a file on a
required disk tape disk tape
Informati
It is unlikely that a magnetic
Tapes can on Data
tape containing several
only be formats record
thousand blocked records Parity
read by the commonl can
can be used on two errors will C
machine on y vary never be
machines of different result
which they between blocked
architecture directly
are written architect together
because
ures
Which component of the
Address Input
CPU has the most influence Data path Control
calculatio output A
on its cost versus part Unit
n part channel
performance
Which of the following terms
applies to network used to
connect computers with Wide
Distributed Local Area
other computers, area Protocol B
systems network
peripherals and network
workstations that are in
fairly close proximity
Are
required
with a
Use the
micropr
computer Generally
Can send ocessor
to which require a
data to a which
Intelligent terminals differ they are keyboard
computer permits
from dumb terminals in that connected for data D
and receive some
they to perform entry and
data from a data
all a CRT for
computer processi
processing display
ng such
operations
as input
validatio
n
A computer is to be linked to
8 terminals using a single
communication link. To Time
permit simultaneous Multiplex sharing
Mixer Modem C
terminal operations, or compute
communication path will r
require which of the
following
Allows
computer
Aids in Speeds
signals to Packs
back-up up
A modem is a device that be send data in a A
procedure online
over a disk file
s printing
telephone
line
A LAN includes 20 PCs, each
directly connected to the
Planetary Ring Loop Star
central shared pool of disk D
network Network Network Network
drives and printers. This
type of network is called a
A computer based system
Instant
for sending, forwarding, Office Executor Electroni
post- C
receiving and storing Automation systems c mailing
office
messages is called an
If a workstation contains a
An
processor, monitor, screen A dumb A A
intelligent
manipulation device, printer, workstatio personal mainfra B
workstatio
storage and communication n computer me PC
n
capabilities, it is said to be

Time of day
Terminal hardware controls Encryption Parity All of
control C
include algorithms checks them
locks

Device
Communi
Type of Terminal intercon
RS-232 is a cation D
cable Standard nect
protocol
standard

A compiler A
converts compiler
A compiler
the whole is a
does a
of a higher general
conversion None of
level purpose
What is a compiler? line by line the B
program language
as the above
code into providing
program is
machine very
run
code in efficient
one step execution
Lexical
Feasibility analysis,
Implement
study, CONVERS None of
What are the stages in the ation and
system ION, and the D
compilation process? document
design, and code above
ation
testing generatio
n
Which of the following is not
a data transmission coding CRC Baudot ASCII EBCDIC A
scheme
An
An An interpret
interpreter interpreter er is a
does the is a general
None of
What is the definition of an conversion representa purpose
the A
interpreter? line by line tion of the language
above
as the system providing
program is being very
run designed efficient
execution
A device used in data
Frequenc Time
communications to divide a
Demodulat y division Division
transmission signal into Modem C
or multiplex Multiple
several sub-bands is known
or xor
as a
Third generation languages Middle- Low-level None of
High-level
such as COBOL, C, and level language the C
languages
FORTRAN are referred to as languages s above
It is faster
It is less
Serial Communication is than It is less Uses
prone to
used over long distance parallel error only one D
attenuati
because it communica prone path
on
tion
Accounti
In what areas is the COBOL Financial Graphic ng None of
programming language sector and design and systems, the C
used? engineering education commerc above
ial sector
Reduce
Relieve
Manage competit
the main
Communica the paging ion
CPU of
The primary function of a te with the function in between
repetitive C
front-end processor is to console a virtual the
communi
operator environme input/ou
cation
nt tput
tasks
devices
Specificatio None of
What is the first stage in System
n and Testing the B
program development? Analysis
design above
Which of the following is not
Fiber Coaxial Common Telepho
used for data transmission C
Optics Cable carrier ne Lines
within a local area network
System
The design System Analysis
of the Analysis involves
screen the defines the creating
None of
user will format and a formal
What is System Analysis? the C
see and use type of model of
above
to enter or data the the
display program problem
data will use to be
solved
An
A device to device hardware An
A cache A buffer online B
communication link is called interface
protocol
Testing to Hardwar
The
check for e,
different None of
What will a good software errors Software
types of the B
provider consider? before the and size
network to above
system is of
be used
introduced program.
The topology of a network
can be each of the following Star Packet Ring Bus B
except
What is the 8-bit binary None of
value of the decimal number 10101010 1100101 1010101 the C
85? above
Which is the most common Cyclic
Retransmi Hash
data transmission error Parity Redunda A
ssion Count
checking method ncy
None of
What is the decimal value of
15 4 64 the A
the binary number 1111?
above
Which of the following
devices merges Multiplex Acoustic
Port Modem C
communication signals onto or coupler
a single line
None of
What is the decimal value of
327 141 97 the B
the octal number 215?
above
Data
Which tool is used to help an Data
Data managem All of
organization build and use Mining B
warehouse ent them
business intelligence? tools
systems
secondar
memory secondar
memory y storage
Cache memory enhances access y storage B
capacity access
time capacity
time
None of
What is the decimal value of
30 255 256 the B
the hexadecimal number FF?
above
Numbers are stored and alphanu
ASCII code decimal
transmitted inside a binary form meric A
form form
computer in form
What is the hexadecimal None of
value of the decimal number 4C5 1B7 5C4 the A
1476? above
A byte corresponds to 4 bits 8 bits 16 bits 32 bits B
Basic Binary None of
What does EBCDIC coding of Bit Code
Coding Coded the D
numbers mean? Design
Description Decimal above
210
A Kb corresponds to 1024 bits 1000 bytes 210 bits A
bytes
None of
What is the binary sum of
10000 1112 1110 the A
01011 and 00101?
above
Information is stored and alphanu
ASCII code decimal
transmitted inside a binary form meric A
form form
computer in form
used to
used to is the is the
indicate
A parity bit is detect first bit last bit in B
uppercase
errors in a byte a byte
letters
Because it
Its moves None of
How did the computer squeaks It has
like a the D
mouse get its name? when ears
mouse above
moved
What are you most likely to None of
Touch
use when playing a Light pen Joystick the C
screen
computer game? above
CPU performance may be
BPS MIPS MHz VLSI B
measured in
None of
A digitising tablet can be Printing Tracing Reading
the B
used for? letters diagrams bar codes
above
In processing cheques which
voice
of the following I/O barcode
OCR MICR recogniti B
techniques have banks scanning
on
traditionally used
Which of the following is a None of
Touch CD-ROM
pointing device used for Hard disk the A
screen drive
computer input? above
Light None of
What does a light pen Refillable
Pencil lead sensitive the C
contain? ink
elements above
The capacity of a 3.5” floppy
100K 1.44 Mb 5 Mb 1 Gb B
is around
What general term describes
the physical equipment of a
computer system, such as its hardware software output input A
video screen, keyboard, and
storage devices?
Where would you find the Numeric
Mouse Keyboard Printer B
letters QUERTY? Keypad
Optical
What input device could tell Bar code Keyboar
Mouse mark B
you the price of a product reader d
reader
Where would you find a
Credit card Mouse Speakers Printer A
magnetic strip?
What are the individual dots
Coloured
which make up a picture on Pixels Pixies Pickers B
spots
the monitor screen Called
What input device can be Optical None of
Bar code
used for marking a multiple- Mouse mark the C
reader
choice test? reader above
word
mouse
QWERTY is used with screen keyboard processi
button C
reference to layout layout ng
layout
software
What input device could tell Optical None of
Bar code
you the price of a bar of Mouse mark the B
reader
chocolate? reader above
an
language software
A GUI is hardware operatin C
interpreter interface
g system
Third - Fifth -
Second -
First - generatio generati
UNIVAC Computer belongs generation
generation n on A
to the computers
computers. computer compute
.
s. rs.
Name the first Indian Super
Vishwajeet Deep Blue Param Arjun C
Computer?
is due to none of
is caused caused by
Disk fragmentation bad disk the C
by wear overuse
blocks previous

Magnetic
The technology which is Optical Ink
Image
used to check answer sheets Bar code Mark Character
Scanning
of multiple-choice questions Reader Reader Recogniti B
Technolo
in civil services or similar Technology Technolog on
gy
examinations is: - y Technolo
gy
converts
a
slower none of
a fast program
A compiler is than an the C
interpreter to
interpreter previous
machine
code
Dot -
Which printer among the Drum Desk - jet Thermal
Matrix A
following is fastest Printer Printer Printer
Printer
encrypting decrypting compress transmit
“Zipping” a file means C
it it ing it ting it
Vital Virtual
Very
informatio informati
What does acronym VIRUS important None of
n resource on reader B
stands for reader user above
under & user
sequence
siege system

An inked
An impact printer creates Electrically Thermal An ink ribbon
D
characters by using...? charged ink Paper pen and print
head

WAN Unix
A client-server system is mainframe LAN
technolo operatin B
based on technology technology
gy g system

A nanosecond is 10-6 sec 10-3 sec 10-12 sec 10-9 sec D

A procedural control used to


minimize the possibility of Cross
Limit Control External
data or program file footing C
checks figures file labels
destruction through tests
operator error is the use of
_______ software enables
users to send and receive operating commun
application system D
data to/from remote system ication
computers
A _____ is a running instance pilot
project model process D
of an application project
Splitting of CPU's time for
multiproce multithrea multiplex multitas
different tasks _______ D
ssing ding ing king
prevents time slicing
______ computers are used in
micro none of
large organizations for large super
mainframes computer the A
scale jobs which have large computers
s above
storage capacities
_______ is responsible for all
arithmetic central none of
calculations and logical
control unit and logic processin the B
operations that have to be
unit g unit above
performed on the data
non none of
band drum
______ printer use laser light impact the C
printer printer
printer above
______ software enhances the electroni
data none of
user to enter ,store, word c
manageme the B
manipulate and print any processing spreadsh
nt above
text eet
______ software enables users communic idea none of
integrated
to send and receive data ation processo the B
software
to/from remote computers software r above

_______ is the temporary none of


my Microsoft
storage place for deleted recycle bin the B
computer exchange
files above
none of
_____ is a collection of related
field file record the C
fields
above
none of
_____ language consists of assembly machine high level
the B
strings of binary numbers language language language
above
______ symbol is used to
input/ou
represent processes like terminator processed connecto
tput B
assigning a value to a symbol symbol r symbol
symbol
variable or adding a number
fazitsu
_______ is an example for hp vectra
PC-at vp200 IBM-PC B
micro computer system
series
_________capability supports none of
multiproce multithrea multiplex
concurrent users doing the D
ssing ding ing
different tasks above

The ______ do not have


processing power of their
own and has only a screen,
keyboard and the necessary "dumb dumb dummy dummy
A
hardware to communicate terminals" servers terminals servers
with the host. For this
reason, the terminals are
referred as_______________
distribute
A______is nothing but a PC
d windows
with a network operating wan LAN D
computing NT
system
system
_____system is responsible
front
for handling the screen and host server back end D
end
user I/O processing
The______ handles data
processing and disk access
host server back end front end C
in a Client/Server
architecture
Both the DBMS and the distribut
application resides on the ed centraliz
PC LAN A
same component in a computin ed
____system g
When all the processing is
host dumb data
done by the mainframe server
processin processin processi B
itself, the type of processing processing
g g ng
is sometimes called as
DBMS models can be
grouped under____ four one two many A
categories
relation
hierarchic
______is the most file network al
al
advantageous database manageme database databas D
database
system nt system system e
system
system
A new user initiates a new
process of execution at the
background,while the user none of
multiproce multithre multiplex
can continue his query the B
ssing ading ing
process as usual in the above
foreground. This situation is
referred to as ______
The process of data being
disk disk
automatically written to a redo
repairing defragme mirrori D
duplicate database is logging
ntation ng
called______
Modulatio Module/ None of
Code/De-
Modem stands for __________ . n/Demod De- the B
code
ulation module above
Multiple changes to the same
record or a field are constrain
fixes locks traps B
prevented by the DBMS ts
through______
none of
_________allows an application multiproce multithre multiplex
the B
to multitask within itself ssing ading ing
above
Local
None of
Linear area Local area array of
LAN stands for __________ . the B
networks networks networks
above
.
New process of execution is client-
task process thread C
referred to as______ server
Integrat
Integrated Integrated
ed None of
system Symbolic
ISDN stands for _______. Services the C
dynamic Digital
Digital above.
networks. networks.
network.
None of
_____________ is the Worlds ARPANE
Ethernet Internet the B
largest computer network . T
above.
all of
_______is/are a popular front power SQL *
visual basic the D
end tool builder plus
above
When LAN connected None of
together ,it is called __________ MAN WAN GAN the B
. above.
None of
Data is broken into small
Cells Bits Packets the C
unit called __________ .
above.
Software
System Simple
Mail None of
modulation Mail
SMTP stands for __________ . transmissi the C
transfer transfer
on above.
protocol protocol
protocol
The __________ protocol is a Transmissi None of
Transfer Hyper
network protocol to be built on the C
Protocol text
for the World Wide Web . protocol above.
The computer which can
None of
receive data from other Printer
File server Receiver the B
computers on the network server
above.
and print it is _______
The hardware and the
configurati
software requirements platform package system A
on
together form the_____
ATM, Asynchronous transfer LAN
MAN and LAN and LAN and
mode is a __________ WAN B
WAN WAN MAN
technology. and MAN
__________ is designed
ISDN ATM Internet Intranet A
telephone system
Web Web
Web based
Expansion of WBT is Web based based based
Technolog A
______________ Training Transpor Transact
y
t ion
Repeater
_________ connects LANs. Bridges Routers Protocol B
s
Collection of instruction is comman progra
procedure batch D
called a _____ d m
Combination of alphabetic number
alpha numerou
and numeric data is called alpha beta and A
numeric s alpha
_____ data alpha
space input,
cost, size,
Computers can be classified occupied, output,
performan perform
based on ______,______and price, no. of perform C
ce their ance,
_______ users ance
ratio cost
allowed ratios
_______ is responsible for
feeding data into the input output feed write A
computer
_______ is the capability of the
multiproce multithrea multiplex multitas
o/s to run numerous D
ssing ding ing king
applications simultaneously
_______ involves conversion of
raw data into some interpreter compiler converter process D
meaningful information
_______ is responsible for
obtaining the processed data input processor ram output D
from the computer
non-
_______ printers use light to
impact drum impact thermal
produce the dots needed to C
printers printers desktop printers
form pages of characters
printers
control
operating
program, monitor, CPU,
Hardware components in a system,
interpreter program, memory
computer are bootstrap, D
, keyboard , input,
_____,____,_____,______ kernel,
assembler, , bus output
shell
compiler
_______ software are
applicatio
programs that are complex operating windows interpret
n B
and can be developed or system 95 er
software
purchased
_______ is a set of special
instructions used to software procedur
batch protocols C
communicate effectively 's es
with the computer
_______ converts a high level
assemble
language into machine processor compiler coder B
r
language
_______ translates assembly
language program into assembl processo
compiler interpreter C
machine language er r
instructions

You might also like