Aptech Study Material Copy of 28 Model Qns
Aptech Study Material Copy of 28 Model Qns
Aptech Study Material Copy of 28 Model Qns
QUESTIONS A B C D ANS
TALLY
The ------ key can be used to select an existing company from list of companies. F1 ALT+F1 CTRL+F1 None of the above A
Import and Export of data between Tally and other programs is possible only
through ---------- Program. Tally ODBC Tally IMP Tally INI None of the above A
The re-order point is the inventory quantity that trigger a stock replishment
activity. TRUE false A
A created company's detail can be modified through keys F3 ALT+F3 CTRL+F3 None of the above B
A/An ------------- is the official notice that the firm sends to its customers to
advise then to the amount of money that is owed. Invoice Bill A or B None of the above C
In tally,all masters have ________main options Two Three Four Five B
In tally,to create a new column in balance sheet press _______ Ctrl+C Alt+C Alt+Ctrl+C None of the above B
In tally,the use of group behaves like a sub-ledger, option is that we can
summarize many ledger accounts into one line statements TRUE FALSE A
In tally, we can alter ledger details using either single or multiple modes but not
alble to delete a ledger from multiple modes. TRUE FALSE A
In tally,a group company is marked with an ______________ * $ & ^ A
Puchasing and Accounts
The systems that work together to order,receive, and pay for replenishment of Accounts Puchasing and payable and Puchasing, Receiving and
stock are --------------- payable Receiving Receiving Accounts payable D
Tally allows to delete a ledger from --------- alteration mode. Single Multiple A or B Mone of the above A
Cash Flow Fund Flow
--------------------- is/are useful for management in the decision making. Statements Statements Ratio Analysis All of the above D
In tally,the group company must contain at least _____________ members Two Three Four One A
To cancel a vourcher entry in Tally, short-cut key is ----------- Alt+D Alt+X Ctrl+T Ctrl+D B
Create Alter Display
The accounting masters and inventory masters related to Information Information Information All of the above D
We press ------------- function key to display the age-wise analysis of Bills
Receivable or Bills Payable report F4 F5 F6 F7 C
In Tally, we press ------------, to print report . Alt+P Ctrl+P Shift+P None of the above A
In Tally, Types of Accounts and Types of Vouchers passed during the period, can
be seen in ------------- report. Tally Audit Statistics Day Book Journal Book B
In the Tally Software, the ------------ directory stores all data entered by the user. Bin Data Sub None of the above B
The Ledger Accounts are unique in Financial Accounting Packages True False A
Customers can be permitted to enter their own data into the firm’s computer Enterprise Data Enterprise Data Electronic Data
using the firm’s wide area network is an example of Interchange - Information Interchange. All of the above C
In Tally, we can customize the Vouchers as per our requirements TRUE FALSE A
The number of steps in Accounts Compilation are 2 3 4 5 C
Each action/transaction of a firm is described by a ----------------. data element data record Field All of the above B
Tally is based on mercantile accounting system FALSE TRUE B
Display stock
valuation Open
Ctrl + N is used to ----------- method Calculator Change Period None of the above B
------------- in Tally classify the accounts under different heads so that
summarised information is possible. Ledgers Groups Journals None of the above B
Revenue Account also known as -------------- Account Personal Nominal Real None of the above B
Method of Voucher Numbering is/are Manual Automatic None All of the above D
Accounts Receivable are displayed in Balance Sheet Profit & Loss Journal Book All of the above A
Physical Stock
To assemble a product from different items -------------- entry is used Journal Stock Journal Transfer Reversing Journal B
A --------- purchase orders data flow is directed to the purchasing system for use
in closing out the outstanding purchase orders in the receiving system diagram. Filled Receipt Issue None of the above A
Tally provides at least --------- predefined voucher formats 11 16 18 21 B
The value of the inventory is included in a ledger accounts as an asset on the
balance sheet FALSE TRUE B
" The buyers can follow up with the suppliers to determine the reasons " is an management by management by electronic data
example of ----------------- objective exception analysis All of the above B
From voucher entry mode , if we press __________ then we get payment
voucher in tally F4 F5 F6 Alt+f5 B
Primary Cost
Default Cost Category in Tally is/are -------------- Main Location Primary Category All of the above C
A Group Company is simply a name and an identify given to the merged
accounts member companies of the group. True False A
A ----------- is a primary document for recording all financial transactions. Ledgers Reports Vouchers None of the above C
The field can have a value between ________________ in FA Package. 0 to 9 1 to 100 10 to 60 None A
The _______ file maintains data that describes the supplier past transaction with
the firm in terms of material quality in AIS Supplier Suspense Order All of the above A
It is necessary to manipulate data to transform it into ---------------- Report Output Information None of the above C
In tally, to change the date of the voucher press ______ F2 F4 Ctrl+f2 Ctrl+f4 A
Closing
Tally can maintain budgets on ---------------- Net Transactions Balance A and B None of the above C
The value of the inventory is included as an asset on the balance sheet True False A
In ratio analysis report of Tally FA packagewe we press ________________ Alt + f6
function key to the display of bills receivable , bills payables report F6 function key function key F7 function key None of the above A
The accounts payable system is responsible for paying the suppliers for the
----------------- Sales Purchases A or B None of the above B
1-4-1995 to 31- 1-4-1996 to 31- 1-4-1997 to 31-
What is the default financial year in Tally6.3 _________________ 3-1996 3-1997 3-1998 None of the above B
Tally encrypts and stores TALLY DATA at the data directory True False A
The Profit & Loss statement can be displayed in ---------------- format(s). Horizontal Vertical A or B None of the above C
Balance sheet &
profit & loss Profit & loss
profit & loss and and trial Cash and profit
Default ledger accounts in tally are ______ trial balance balance & loss Cash and bank C
Default 'godown' name in tally is ____________ Primary Main location A or b None of the above B
Security
'Tally vault' is a _________________ mechanism Ledger a/c Cost category None of the above A
To create a sales voucher in tally , you have to press _______ F5 F7 F8 F9 C
A Group Company is ------------------------- given to the merged accounts of
member companies of the group. a name an identity A and B None of the above C
In tally,"credit note" voucher type records entry for ________________ Sales return Purchase return a or b None of the above A
Company Stock items
In tally you get currency symbol option from _______ menu creation units Regional setting None of the above A
------------------ gives the balance for each day for the voucher type has been
selected. Trial Balance Daybook Balance Sheet None of the above B
For 'stock journal' entry we press ______________ in tally F7 Alt + F7 F10 F11 B
Changes in
Tally provides the capability to the administrator/auditor to track changes in the transactions or Changes in
areas is/are vouchers Ledger Masters Both A and B None of the above C
In tally, types of users are _______________ 2 3 4 1 B
By pressing -------- key, a list of inventory reports can be displayed straightaway
from the balace sheet report F9 F10 F11 F12 A
Profit & loss
Projected approximation of income or expenses is called ______________ . Balance sheet a/c Budget None C
"Administrator" type user is also called 'Auditor' of a company in Tally TRUE FALSE A
You will get company information , if you press __________ from gateway of
tally F3 Ctrl+F3 Alt+F3 None of the above C
A constituent(member) company can be a member of more than one group. TRUE FALSE A
Default stock category in tally is ______ Main location Primary Symbol None of them B
To create a log of the import activity in a file _____________ is located in the
same directory as an executable program in tally Tally.imp Tally.ini A or b None A
In Tally,inventory valuation method option is available from _______ Stock summary Stock journal Stock analysis None of the above A
During the In 'comp info ->
By pressing F11 creation of a security control'
Tally audit feature is available in a company __________________ function key company option None B
In tally, a group company can also be a constituent(member) of another group
company TRUE FALSE A
Default number of groups in tally are ________ 128 228 28 16 C
Ledger
During voucher entry ------------- are used. Accounts Groups Sub-Groups B or C A
User designated as --------------- can view audit list. Administrator Owner Data Entry TallyVault A
In an accounting information system, which of the following types of computer Inventory Cash
files most likely would be a master file? subsidiary. disbursements. Cash receipts. Payroll transactions. A
Will be more
Does not require Will produce a efficient at
as stringent a set more accurate producing Eliminates the need to
Which of the following is an advantage of a computer-based system for of internal set of financial financial reconcile control accounts
transaction processing over a manual system? A computer-based system: controls. statements. statements. and subsidiary ledgers. C
FUNDAMENTALS OF COMPUTER
System
Contingency feasibility Capacity
Inefficient usage of excess computer equipment can be controlled by Planning report Planning Exception reporting
Which of the following is not the component of a CPU NIC Card VSAT RAM AGP Card
Control totals
A trailer label is used on a magnetic tape file, it is the last record and summarises Identification for one or more End-of-file and end-of-reel
the file. The following is an information not found in the trailer label Record Count Number fields code
Storing
Writing on a information on
Hard copy is a term used to describe...? hard board Printed output the hard disk None of above
Voice activated Voice answer Visual audio
What do the abbreviations VAB stand for broadcasting back board None of above
What control would prevent the accidental erasure of customer information from Boundary File protection
a magnetic tape Validity check protection ring Limited access files
What are the individual dots which make up a picture on the monitor screen
called? Coloured spots Pixels Pixies None of above
Identification
Header label normally include all the following except the File Name number Reel Number Batch Total
A daisy wheel is a type of...? Printer Storage device Pointing device None of above
Physical
Which approach or technique is a control usually associated with microcomputers System Logs Security Console Log Data Dictionary
An inked
Electrically ribbon and
An impact printer creates characters by using...? charged ink An ink pen print head None of above C
Use only
Restrict unremovable Require user Make duplicate copies of
The best security control in a microcomputer environment is to physical access media passwords files A
What would you NOT use with a flatbed plotter? A pen Paper Eraser None of above C
What do you need for an ink jet printer? A cartridge A drum A ribbon A cassette A
Centralised Centralised
Separation of function for PC function for PC Distributed policies or
The greatest control exposure in a microcomputer environment is the lack of duties acquisition Disposition procedures A
What do you need for an ink jet printer? A cartridge A drum A ribbon None of above A
An INK
A laser printer does NOT use? A print head A laser beam RIBBON None of above C
Storage
The amount of data that a disk may contain is known as the disks...? Volume Size capacity None of above C
You can ________ protect a floppy disk. Read Write Read and Write None of above B
Information on a hard disk is usually backed-up using a...? Magnetic tape PAN drive Floppy disk None of above A
What are small high speed memory units used for storing temporary results? CPUs Registers Control unit None of above B
How many bits of information can each memory cell in a computer chip hold? 0 bits 1 bit 8 bits None of above B
What type of computer chips are said to be volatile? RAM chips ROM chips CACHE None of above A
Systems
Network software and Business
software and application software and
Software can be divided into two areas: security software software games software None of the above B
Personal Mainframe
Travel agents use this computer system when reserving flights Supercomputer computer computer None of above B
Jon Von
Notebook Supercompute Neumann
Which computers are used in the weather forecasting industry? computers rs computers None of above B
Second Hoover
Vacuum tube based electronic computers are...? First generation generation generation None of above A
Second Fourth
Which generation of computer was developed from microchips? generation First generation generation None of above C
Second Third Fifth
Which generation of computer uses more than one microprocessor? generation generation generation None of above C
Second Third
Which generation of computer developed using integrated circuits? generation generation Fifth generation None of above B
Second Third
Which generation of computer developed using solid state components? generation generation Fifth generation None of above A
DATABASES
Analysis,
Specification, Programming, System Design,
Design, and Design, and and
Name three steps involved in developing an information system Testing Testing Implementation None of above A
_______ is used for CAAT as database Oracle ACL JCL none the above A
Generalized audit software perform auditors to undertake any past records and
not concurrent auditing True False A
Generalized audit software is a file whose capabilities for verifying processing is
logic True False B
CAAT's are computer program and data that auditor uses as part of the audit
procedures to process data if audit significance contained in an entity information
system True False A
CAAT do not contains package programs, purpose written program, utility
programs or system management programs yes no B
Embedded audit routines are sometimes built into an entity's computer system to
provide data for later user by the auditor true false A
SCARF involves embedding audit software modules within an application system
to provide continuous monitoring true false A
Concurrent use auditors as the member of the system true false A
Regular cross system verification may minimize frauds true false A
Computer security is frequently associated with confidentiality, integrity and
authentication true false A
Data reserve engineering process metadata to document system and abstract
business rules and relationship true false A
to determine review and
the audit evaluate the to obtain a
The first step for developing CAAT is_________ objective types of data record layout extract data from file A
can bring the can bring the
Using the open database connectivity feature in ACL is ______________ data directly data indirectly all the above none of the above A
Computer Assisted Audited Technique involves the use of computers through
"Black Box Approach" True False B
White Box Approach necessary involves expert knowledge on the part of Auditor True False A
change in the
method of
recording use of
The transition from manual system to CIS environment bring dramatic changes accounting accounting absence of audit
including ________________ transaction codes trails all the above D
the source of
data available source of data
to the audit for material
Important knowledge needed to begin planning the use of CAAT is _________ organization planing all the above none of these A
The move towards paperless EDI would eliminate much of the traditional audit
trail, radically changing the nature of audit evidence true false A
providing
access to
computer to all
the of by all organization use of any
Computer operation controls are designed to provide ________________ concerned personnel programs none of the above D
Systems development control, apart from others, include authorization, approval,
testing, implementation and documentation of new systems software and system
software modification true false A
natural/man- conceptual/physi
A system could be _________ made open/closed cal all of them D
A system exhibits 'entropy' true false A
Super computer are the largest and fastest and is very suitable for commercial
application including audit work true false A
Assembler language uses Mnemonic symbols true false A
manage
hardware & enable multiple
Operating systems are devised to optimize the machine capabilities, the function software user resource
include_______________ scheduled jobs resources sharing all the above D
General purpose software provides a framework for highly complex scientific
operation true false B
In batch processing, transactions are processed one after another true false B
The use of computer assisted audit techniques is not gaining popularity not only with audit with production
________________ departments departments all the above none of these A
On-line processing refers to grouping of transaction and processing the same in
one go from start to finish true false A
Real time refers to the technique of updating files with transaction data
immediately after the occurrence of the event to which it relates true false A
In OLRT the CPU should process the capability of program interruption true false A
Time sharing system allow access to a CPU from remote terminals true false A
DSS is defined as a system that provides tools to managers to assist them in
solving structured problems true false B
planning
DSS has the following components _________________ databases language model base all the above D
Master files contains current records for identification and summarizing true false B
Transaction files contain relatively permanent records take product profile,
customer profile, employee profile etc true false B
Master file configuration includes ____________ reference files table files report files none of the above D
______ is a file management software package that lets users and programmers
organize data into files and then process those files filex file-o-man file manager filepet C
to have a decentralized
complete picture picture of a
CAATS provide added value to the clients because _______________ of a system system all the above none of the above A
File volatility refers to the number of addition and deletions to the file in a given
period of time true false A
File activity is the proportion of transaction file records that are actually used and
accessed in a given processing run: true false B
File interrogation refers to the _____ of information from a file back-ups retrieval deletion addition B
One -to-one relationship means a single entity to a single entity in a monogamous
structure true false A
RDBMS is structured to a series of 2 dimensional tables true false A
seriously subject area software and
SADB stands for ____________ affected database database database safety and database B
Controls are present over many aspects of the computer system and its
surrounding social environment true false A
In framed checking the data entry is checked against an expected picture or
format true false B
on quarterly
Errors are correlated_________ at the year end immediately basis none of the above B
Field check is exclusive to a field true false A
_________ law basically states that there is a specific probability of the first digit
of a no. being 1,2,3 etc Benfish Benford Benjamin none of the above B
Check digit is a group of nos. added to a code for determining the accuracy of
other digits in the code true false B
blocks of nos.
consecutive nos. to the primary random
or alphabets to attribute of the placement of
Hierarchical code means _________ entities the entity component none of the above D
The validation checks applied to a field depend on the field's logical inter
relationships with other fields in the record true false A
invalid, none of the
The contents of a field could determine _______ sign for a ______ field valid, numeric alphabetic above all the above A
Batch is the process of ______ together _____ that bear some type of relationship grouping, regrouping, none of the
to one another transaction events above all the above A
Hash totals means meaningless totals true false A
With OLRT where interactive data entry is available, the master file associated
with a transaction may be searched for confirming data true false A
Controls are required for authorization to ensure data integrity and detect possible
breaches in security true false A
Data from client application are not stored in the organization's database through
auditables events and function true false B
All input records in a batch are normally of different types true false B
incremental interactive data interactive data
design and extraction and innumerable
IDEA stands for _________________________________ enlarge activity analysis analysis none of the above B
A transaction file is sorted prior to the update of master file true false A
A sequence check on the transaction or master files by an update program is not
required true false A
Whenever monetary transactions are processed against master files, the update
program should maintain a correlation account to record such transaction that
does not have a matching master file record true false B
Internal tables are stored tables from which certain values are extracted for further
processing and storing true false A
For small to medium sized systems, individual modules are coded and
individually tested and then assembled to be tested as a whole-the testing strategy
is referred to as ___________________ e-brain bouncing ball big-bang stub C
In systems testing, test involves_________________ bottom up tests top-down tests hybrid tests all the above D
Recording transactions in a controlled manner may amount to loss of stored data yes no B
re-perform
procedures
provide carried out by
read data on information to the clients
Audit software is used by the auditor to _________ client's file the audit programs all the above D
Core image comparison is a software used by the auditor to compare _______ executables,
version of a program with a secure ________ copy master deleted, hard none of these all the above A
Database analyzer is a software which provides detailed information concerning
the operation of the database true false A
system
system analysis advanced
SAS stands for ______________ software software all the above none of the above A
Embedded code is a software used by the auditor to examine backup data true false B
Embedded code performs wide variety of audit task yes no A
Core image comparison is particularly useful where only executable versions are
distributed true false A
Log analysis is a software used by auditor to detect virus true false B
On line testing techniques the auditor ______ data either _______ or fictitious in
order to see that a specific program or sever edit test is doing its work manipulates, real create, false none of these all the above A
Mapping software is used by the auditor to list unused program instructions true false A
Mapping software has very objectives yes no A
On line testing can be targeted for specific functions carried out by programs yes no A
examination of
identifies source code of a
program code program with
which may be advice to
provides detailed there for following the
information of fraudulent logic of a
Program code analysis involves _____________ machine uses reason program none of the above C
__________ is a software of CAAT IDEA ACL ALC ACLL B
Snapshot is software which takes a picture of a file or data or a transaction
passing though the system true false A
fictitious data comparison of
applied against source version analyzing the
the client of a picture of a file
Base case system evaluation includes____________ program programmed or data all the above A
While base testing forces on finding if there are any defective execution policies
in a program true false A
Black box testing seeks to determine whether application output is what it is
supposed to be true false A
In integrated test facility approach the auditor should ensure that the impact of
test transaction is subsequently eliminated from the computer files true false A
specification, none of the
Black box testing is _______ based and white box testing is _______ based program file, hardware above all the above A
package
computer
p[program for
performing a
variety of data
processing mathematical master list of
Generalized audit software consists ___________ function concept transactions administered questionnaire A
prepared by an
outside
programmer
prepared by the prepared by the engaged by the
Specializes audit program may be___________ auditor entity auditor all the above D
Generalised audit software could be used by the following in consistencies or
significant fluctuations true false A
file stratification and
access/organizati statistical/arith frequency
Generalized audit software function include____________ ons metic operation analysis all the above D
In the file reorganization merging capabilities are needed in data from separate
file is to be combined on a separate work file true false B
Auditors cannot use generalised audit software to extract the data needed for
audit purpose true false B
examining the carrying
Auditors can combine functional capabilities of generalized audit software to quality of system analytical examining the
accomplish the task of __________________ process review quality of data all the above D
Wide access to Can extract and Can aid in Can define the audit
Which of the following is not the feature of GAPs various data base analyse data simple selection objectives D
High End
Which is the example of CAATs ACL IDEA CAATs All of the above D
A utility A special
A sample of software purpose written
In audit procedures, test data is transactions programme program None of the above A
Analytical Compliance
Tests of details review tests of general
Which of the following is not the use of CAATs of transactions procedures EDP controls All of the above D
Action Event
Which of the following are called explicitly by another procedure? Macros Procedures Procedures General Procedures D
_________ data type is generally used for fields assigned as primary keys in a
table integer number primary number auto number D
MS access objects can be published in the web true false A
In code-builder, got_focuse, click,dbl_click,enter are examples of _______ actions events procedures none of the above B
_______can be used to automate certain actions in response to events report form chart macros D
expression
In the macro sheet the macro is selected in the _____field macro elements comments action D
expression
To build complex expressions_____is used calculator code builder builder expression elements C
The three list boxes present at the bottom of the expression builder are expression
called_____ action list macro list elements list box none of the above C
________option is selected from the view menu to create macros with conditions conditions action insert none of the above A
_______report can be created with minimum user input tabular columnar auto report embedded C
_______layout of a form displays one record at a time tabular columnar datasheet justified B
The table or query name on which we are going to build our report is selected
from the ____ dialogue box create report link report embedded report new report D
columnar and stable and dynamic and
______and_____are the two types of auto reports available tabular unstable static none of the above A
There are no wizards for creating a database in access true false B
______option from the insert menu option is chosen to add an embedded chart create fields add chart chart insert chart C
In ms-access, while using SQL, references constraint is used for creating _______ primary key alternate key foreign key none of the above C
_______is used to create a mailing label label wizard chart wizard mail wizard none of the above A
______header is present at the beginning of the report start header group header page header report header D
______is present at the bottom of each page in a report report footer page footer group footer none of the above B
for specifying
for ordering for updating conditions with
In SQL, having clause is used for _________ records records group by clause none of the above C
______field is added to the macro sheet when we select grouping option from the
view menu condition group macro names none of the above C
______can be used to create toolbars VB Modules reports forms macros D
_______query is used to add records from one or more tables into an existing
table add append insert delete B
_______window is used to write VB code in access application report macro sheet module none of the above C
Values for other tables, queries are maintained in look up fields data type true false A
Visual Basic language is a _____ tool RAD RAP RAID none of the above A
______ function is used to display a message box SysCmd MsgBox message none of the above B
Other ms-office applications can be accessed from ms-access using a concept
called ________ OLE DDE CME none of the above A
object linking on line
OLE stands for_____ and embedding execution on line editing none of the above A
The application that supplies data in OLE is called an _________ OLE object OLE client OLE server OLE communicator C
If any change made on the object from the client side is reflected on the server
then the object is said to be _____ linked embedded connected edited A
_______is the file format that works on internet exe DLL BMP html D
______ is used to convert any ms-access object into html format form wizard report wizard query wizard publish to web wizard D
_______ option in publish to web wizard produces a page that is static in nature static file static html dynamic file none of the above B
_______query is used to create or change database objects in a current database append add insert data definition D
Currency fields express the amount in _________ dollars rupees pesos yen A
_______is selected from the toolbar to add an OLE object unbound object bound object command button list box B
To display an OLE object in the form of an icon ____ option is selected from
insert object dialogue box display as icon display link create icon A
_______option from the file menu is selected to run 'publish to the web wizard' create html new save as html none of the above C
_____page in an web application is used to navigate to the rest of the pages in the
application startup home end none of the above B
______ is fired when an event is triggered is the concept based on a Visual Basic
language bullet command procedure none of the above C
Ms access is a ___________ DBMS RDBMS front end language A
A collection of data stored in different objects is known as a _________ data group data collection database data storage C
new blank
database dialog new database
A blank database can be created using __________ new dialog box box dialog box database dialog box A
Text type data can be of _____ characters in ACCESS 255 64000 235 63500 A
automatic
______is a datatype that assigns values automatically number AutoNumber number automatic field B
Tables cannot be imported from other databases true false B
If two tables having same values for the fields are joined it is called an ______ inner join outer join explicit join none of the above A
Duplication of records in a field won't be allowed if the fields are declared
a________ primary key not null candidate key no duplicate key A
Changes from a master table can be reflected on to the child table by selecting cascade delete cascade change cascade update
_____option related records related records related fields change all related records C
To see more than one record at a time in a form we use _______ columnar tabular both a and b none of the above B
query or
In SQL, delete command is used to remove _________ table or tables queries record or records none of the above C
In MS-Access, filter excluding selection will display only those record(s) which
meet the criteria. true false B
Dynaset field
Properties of the fields are managed by _____ in Dynaset property field field property properties properties B
row/column
______queries allows us to view data in row by column manner crosstab queries queries select queries update queries A
The type of queries that can update or delete record(s) in a table(s) are called row/column change/delete
__________ action queries queries queries update queries A
Joining tables without any matching values in the fields is called ____________ inner join self join no match join outer join D
Primary key uniquely identifies each record true false A
new form dialog form create form wizard
Which of the following dialog box is/are used in the creation of form ________ box dialog box dialog both 1 and 3 D
_______ query wizards are used to generate summary calculations for a table summary sum append simple D
change
Properties of a form can be changed by selecting ______from view menu options properties properties form properties new properties B
Forms that are included in other forms are called ______________ included form sub form new form child form B
In MS-Access, while using form design view, for creating a command button for
adding a new record, we should select the _______ category from the command Record Record
button wizard Navigation Operations Form Operations None of the above B
hierarchical
_______ form displays fields in a single horizontal row columnar form tabular form form one to many form B
The process of arranging the data in a meaningful order is known as
___________ filtering ordering sorting querying C
______ are used to select only some particular records from the table or any other
database objects filter sorts pipes gateways A
filter by
In MS-Access, user may specify criteria for filter in form view using _________ filter by form selection filter by menu None of the above A
___wildcard character represents any single character * $ @ ? D
Records cannot be sorted by a primary key true false B
unbound
A control without a data source is known as ___________ bound control control data less control data control B
Set of related option buttons, check boxes and toggle buttons is known as
_____________ button group option group controls group record group B
The collection of related data and objects is called a ____________ database form collection none of the above A
Which of the following is control types ____________ bound unbound controlled all of the above C
In MS-Access, the function that gives the current date is _____________ CURRDATE() TODAY() DATE() DAY() C
_____is a control that lists set of data text box list box combo box static text B
______is a form that summarize large amount of data pivot table columnar form tabular form main form A
______allows to create a filter by typing the value in a data sheet data sheet filter filter by input filter by form none of the above C
option control
Wizards for toolbox controls are called a __________ button wizard control wizard wizard tool wizard C
The wild card representation for any 5 letter word that starts with ram is
________________ ram* ram?? two of the above none of the above B
Look up fields slow up data entry true false B
____is an access object that displays un-editable data report form table ledger A
_____option from the new object toolbar gives the easiest way of generating a
report autoreport report module none of the above A
______ represents data in a pictorial format chart label bitmap report A
Changes of one table can be carried over to another related table true false A
Hyperlinks are used to jump to any kind of information or data from a file true false A
The memo field can have text upto_____ characters in length 60,000 255 25,000 64,000 D
In MS-Access, columnar layout can be used to view multiple records in a form true false B
In MS-Access, alter command may be used in adding a primary key to a table true false A
Update query is used to add records from one or more tables to the end of an
existing table true false B
In ms-access, datasheet view is available in ___________ table query form all of the above D
______are used to jump to any kind of information from a datasheet or a form table form report hyperlink D
Home page will always be present as a first page of an application true false A
Make table queries create a new table from the records of another table true false A
In ms-access, to protect a database file from illegal access, we may set database
password. The option of setting database password is available in _______ menu Insert Records Tools none of the above C
Foreign key is a field that uniquely identifies each record and accept no null
values true false B
Data definition queries are used to create or change database objects true false A
The attributes of a composite key are known as ________ alternate keys composite keys candidate keys primary key C
OLE object is a data type in access true false A
Data displayed in forms cannot be edited true false B
A sub form is used to display one to many relationship between tables true false A
We can switch from datasheet view to form view by selecting view -> form view
option true false A
In MS-Access long integer is a datatype true false B
In MS-Access, while designing a table for a particular field, the Required
parameter is set to yes. This validates the field as _______ null not null zero none of the above B
Sorting is applied to select only some particular records true false B
Filter by form can be created from a forms shortcut menu true false B
Advanced filter uses a filter similar to the query design window to create a filter true false A
? Wildcard character represents any number of characters true false B
_________ of the following is/are a type of chart pie bar both 1 and 2 none of the above C
A bound control is tied to a underlying query or table true false A
A calculated control uses expression as a source of data true false A
Text boxes cannot be bound controls true false B
The default query invoked by ms-access is update query select query delete query append query B
A control can be bind to a record using row source property true false B
List box is a control that offers a list of choices true false A
If a table is joined to itself it is called a ________________ inner join outer join self join table join C
A picture box combines the activities of both a text box or a list box true false B
Line is a tool box control true false A
Text boxes can be part of a option group true false B
_____ chart exists as a separate object freestanding embedded stand alone sub chart D
Filtering data is a way of arranging data in a meaning full order true false B
Wild card characters are used for sorting records true false B
Pivot tables are used to navigate to the other tables in a database true false B
Reports are used to represent un-editable data true false A
the first field of the last field of primary key
In MS -Access, the records in a table are sorted based on _________ the table the table field none of the above C
Relationship is an association between _________ forms reports attributes entities D
Summary options dialog box is used to summarize data true false A
______ queries can be used to delete a group of records that meet some specific
records delete insert append add A
Charts can convert numerical data in a easily understandable format true false A
Embedded charts exist separately true false B
The chart which cannot exists as a separate entity are _______________ freestanding embedded stand alone sub chart B
From ms - access, if we want to view the records stored in a table in ms - excel use datasheet in
worksheet, we need to use hyperlink use import forms use export D
Page header is present at the beginning of each record true false B
Detail section has a header and footer true false B
A macro is performed only when the user initiates an event true false B
The macro is selected from the action field of a macro sheet true false A
A macro can be made to execute before the starting of a database true false A
In MS-Access. While appending records, the source and the target table must
have similar structure and fields true false A
We can add our own functions to the expression elements list box of the
expression builder true false A
_______is the wildcard character which represents the presence of any number of
characters & # ? * D
Macros can be used to add a menu to a database object true false A
_____ header is a unique feature of reports page detail group topic C
Chart can either be a form or a report true false A
Group header will be present at the design view of a report even if the report is
not grouped true false B
We can change from the design view to the form view without being prompted
for saving the changes made true false A
Charts can be produced without the wizard true false B
Macros can be used to create user defined error messages true false A
Between and Not Between is ______ type of operators relational list range logical C
The default data type of VB is integer true false B
event -
structured procedural based
Visual Basic is based on __________ action language query language language none of the above C
_______is the name of the database object that displays data and can be used to
edit data report form query table B
In access OLE objects cannot be linked true false B
_____ section is present for each record in the report group record session detail D
A ________ sheet lists all the properties that pertain to the form or the controls data property both a and b none of the above B
Textboxes can also be an example of unbound control true false A
In MS-Access, we may design command buttons for navigating records true false A
_______are forms that are included in other forms sub forms child forms inner form none of the above A
_______ are used to represent our data in graphical format graphs chart labels report B
A field with a _______ uniquely identifies each record number primary key index identifier B
Large amount of data can be summarized using ______ tables pivot create form none of the above A
_______ are employed to select only some particular records from a database
object filters queries sorts forms A
______ control need not have a data source form bound unbound none of the above C
______ control combines the functionality of both a text box and a drop down list list box combo box button option button B
MS access is a DBMS true false A
A form can be bind to a record source using _____ property of the form form name control record source none of the above C
______ forms displays field in single row tabular form chart form data sheet form none of the above A
______ forms are usually used for tables with one to many relationship sub forms tabular form columnar form none of the above A
_______ control uses an expression as a source of control calculated bound unbound none of the above A
_______ control is tied to field calculated unbound bound static C
_______is the form that can be created with minimum input from the user sub form auto form tabular form columnar form B
______option from the tool menu is selected for setting relationships between
tables set relation connect relationships none of the above C
option, toggle command
and command button, check list, check and option button, toggle button
______,______and_____are the buttons belonging to the options group buttons and list boxes combo boxes and check boxes D
_________allows us to create a filter from a field short cut menu filter by form filter by report filter by record filter by input D
________is a database object which displays data but cannot be used to edit data form report macro table B
What term applies to a collection of related records in a database? clipboard file field layout B
All of the following terms are related to computerized databases except which
one? search sort field names record grab D
An organised
A way to analyse A tool to way of storing
and manipulate produce high information
numerical quality about a set of
What is a database? information documents similar things A way of maintaining a log C
It contains all
Information the data aboutA document
about certain one specific which contains
What does a record contain? programs item text A collection of files B
Relational
An RDBMS is a remote DBMS relative DBMS DBMS Reliable DBMS C
storing data
offline at a backing up data is related to data
Data Warehousing refers to separate site regularly mining uses tape as opposed to disk C
Computer
sequence Computer
Unauthorised alteration of on-line records can be prevented by employing Key verification checks matching Database access controls D
An organised
A way to analyse A tool to way of storing
and manipulate produce high information
numerical qualitydocumen about a set of
What is a database? information ts similar things None of the above C
It contains all
Information the data about A document
about certain one specific which contains
What does a record contain? programs item text None of the above B
Spreadsheets
Extracting and make data easy
What is the best way to analyse and change data analysing data to analyse Using queries None of the above C
Word
Compilers, Network processors,
interpreters, software, spreadsheets,
What are some popular office orientated software applications? editors backup systems databases,
PRIMARYDTP None of the above C
DEFAULT and FOREIGN KEY and
Which of the following constraints can be used to enforce the uniqueness of rows NOT NULL KEY UNIQUE
in a table? constraints constraints constraints IDENTITY columns C
CHANGE MODIFY
Which of the following commands is used to change the structure of table? TABLE TABLE ALTER TABLE UPDATE TABLE C
Relational
An RDBMS is a remote DBMS relative DBMS DBMS Reliable DBMS C
storing data
offline at a backing up data is related to data
Data Warehousing refers to separate site regularly mining uses tape as opposed to disk C
You are creating a client application that calls ActiveX DLLs. Which of the
following properties of the Err object provides the name of a component that
sends an error back to the client application? Number Description Component Source D
keeping the
This database holds personal information. The user can help to keep it keeping a original paper saving the file with different
confidential by using a password backup copy copy filenames A
If the database holds customer names and addresses, personalised letters can be
created automatically using the product code the primary key mail merge e-mail C
Application software suited to storing the survey information obtained in the
table would be A database Graphics browser e-mail A
The characters * and ? are sometimes used in search criteria as bookmarks operators wildcards engines C
Which of the following field types will generate the primary key automatically? Auto Primary Auto ID AutoNumber Auto Key C
records in a forms in a
dynaset are related tables in database are
consistent with a database are consistent with reports are consistent with
the underlying consistent with the underlying the underlying tables or
Referential integrity ensures that the: tables. one another. tables or queries. queries. B
query and its
main form and associated
Tables are related to one another through a: foreign key. a subform. dynaset. report and its related query. A
the primary key the primary key
of both related of the related a field from an not a primary key of either
A foreign key is: tables. table. unrelated table. related table. B
You are creating a banking database to track customer loans. The bank will, of
course, have many customers, each of whom may take out one or more loans,
while each loan may be associated with only one customer (there are no joint
accounts). What is the re One-to-one One-to-many Many-to-many Many-to-one B
In a one-to-many relationship between Companies and Employees, which field is EmployeeLastN
found in both tables? EmployeeID CompanyID ame CompanyAddress A
Which of the following ensures that records in related tables are consistent with The Tools menu,
one another? For example, it ensures that you cannot add a record with an invalid Relationship Referential The one-to-many
foreign key. window integrity The join line relationship B
Right-click the
Relationship Select Undo in
line, then select the Click the Delete
How would you delete a relationship between tables in the Relationships Double click the Delete from the Relationships Relationships button on the
window? Relationship line shortcut menu pull-down menu toolbar B
That there are
several
customers That some of That there are
associated with the data is not records in a That records can be added
In a Customers tables, what does a plus sign next to the CustomerID field mean? that ID viewable related table by clicking on the plus sign C
They cannot be
They must both They cannot be AutoNumber They must be the same data
What is required of the fields that join two tables? be numbers text fields data types type D
The customer’s
ID is deleted
from the
The customer’s Customers table,
Assume a one-to-many relationship between the Customers table and the Loans Nothing, Access ID is deleted and all the
table, with referential integrity in effect. What happens when you attempt to ignores the from the related loans are
delete a customer ID from the Customer table that still has entries in the Loans attempted Customers deleted from the An error message is
table? command. table. Loans table. displayed. D
The subform is an object on
The subform is The subform is the form and can be moved
Which of the following is true when viewing a main form and its associated The subform is displayed in displayed in or sized like any other
subform in the Form Design view? not visible. Datasheet view. Form view. object. D
The Customers
table only when
there are Loan
records
You have created a one-to-many relationship with referential integrity between a Either table at associated with The Loans table
Customers table and a Loans table. From which table can you delete a record? any time that customer at any time Neither table C
prompt, title bar prompt, icon, title bar text,
The correct order of the arguments for the MsgBox statement is: text, icon. title bar text. prompt, icon. title bar text, icon, prompt. B
The first statement in a procedure named CreateList is: Dim CreateList. Sub CreateList. CreateList. Sub. B
In an enterprise-class database system, the database _________ . holds user data holds metadata holds indexes All of the above. D
stored
A database may contain _________________________ . tables metadata procedures All of the above. D
as a new
systems as a redesign of
A database designed using spreadsheets from the Sales department is a database from existing development an existing
being designed _________________________ . data project database a and b A
as a new
from existing systems as a redesign of
A database designed to implement requirements for a reporting application non-database development an existing
needed by the Sales department is a database being designed _______ . data project database a and b B
as a new
systems as a redesign of
A database designed to combine two databases used by the Sales department is a from existing development an existing
database being designed _________________________ . data project database a and b C
Database professionals use ________________ as specific data sources for entity-relationship data
studies and analyses. data marts normalization data models modeling A
Database professionals use a set of principles called ________________ to guide entity-relationship data
and assess database design. data marts normalization data models modeling B
A very popular development technique used by database professionals for entity-relationship data
database design is known as _______________________ . data marts normalization data models modeling D
entity-
A very popular development technique used by database professionals to adopt a relationship data
database design to new or changing requirement is known as _____ . data marts normalization modeling data migration D
hierarchical
The predecessor(s) of database processing was (were) __________ . file managers models network models relational data model A
entities in a the order of the the order of the
column vary as columns is rows is more than one column can
In a relation __________________________ . to kind important unimportant use the same name C
An attribute is also known as a(n) . table relation row field D
A combination of one or more columns used to identify particular rows in a is___
. record field key tuple C
A combination of two or more columns used to identify particular rows in a
relation is________ . record field composite key foreign key C
A determinant that determines all the other columns in a relation is______ . record field foreign key candidate key D
When designing a database, one of the candidate keys in a relation is selected as
the _________ . composite key primary key foreign key surrogate key B
Normalization is a process used to deal with which of the following modification Insertion Update Deletion
anomalies? anomaly anomaly anomaly All of above D
assess the
existing tables' design the
When you are given a set of tables and asked to create a database to store their structure and database create one or move the data into the new
data, the first step is to ____ . content structure more new tables database A
are supplied by
several well- were essentially
established killed off by have poor
Modern microcomputer personal DBMS products______. manufacturers MS Access response time are not true DBMS products B
Their report
delivery is
more difficult
They use than report
sophisticated delivery for
mathematical reporting Nonintegrated
Which of the following are true about data mining applications? techniques. systems. data None of the above A
We have obtained access to the company's operational data. We examine 50
records for customers with phone numbers that should use the current area code
of 345. Of these 50 records, we find 10 that still use an older area code of 567. inconsistent nonintegrated
This is an example dirty data data data a "wrong format" problem B
We have obtained access to the company's operational data. We have been asked
to produce a report with an item by item analysis of sales, but the only sales inconsistent nonintegrated
figure available is the total sale value for each order. This is example of_____ dirty data data data a "wrong format" problem D
data warehouse
data warehouse databases do data warehouse
data are not not have data are often
A data warehouse database differs from an operational database because: stored in tables. metadata. denormalized. b and c C
Which of the following objects is used to display a menu? Form Table Report Query A
Forms and Queries and
Which of the following objects are NOT found in an Access application? reports tables Macros Spreadsheets D
It will be easier
It will be easier for the user to
for the user to upgrade it if the It is advisable to Regardless of how the
upgrade it if the objects are in put each object objects and tables are stored,
objects and one database and table into a the user will have to reenter
You are developing an Access application that you expect to upgrade tables are in one and the tables separate the data in the tables when
periodically. Which of the following statements is TRUE? database. in another. database. the application is upgraded. B
An application
may consist of
multiple
The Link Tables databases, each
command can be with multiple All objects in an An application can be
used to associate objects, linked application, created in such a way that it
the tables in one to yet another including the objects such as forms and
database with the database tables, must reports can be changed
objects in containing only reside within the without disturbing the
Which of the following statements regarding Access applications is NOT true? another database. tables. same database. existing data. C
Which of the following brings a copy of the table into the current database and
does not maintain a tie to the original table? Import Link Merge Join A
It contains
tables, reports, It contains a user
It contains more queries, and interface, or
What makes a database an application? than one table forms switchboard It contains macros C
Interface Design
What is the Access tool that is used to create the user interface? Menu Wizard Build Menu Wizard Switchboard Manager D
______________ are used by individuals when they exchange messages with Server Developer Personal Digital
other users or online services. Certificate Certificate certificate None of the above C
______________ are on-line databases of certificates and other information Private
available for retrieval and use in verifying digital signatures. Certificate Repositories Public Key none of the above B
Evidence, Efficiency and Evidence, Ceremony,
Signing Writings serve the following general purposes______,_______,_______ Ceremony, Approval, logistics, Approval, Efficiency and
and _______ Approval Evidence Evidence Logistics D
The most widely accepted format for Digital Certificate is defined by the CCITT
X.509 True False A
A certificate may prove to be unreliable, such as in situations where the
subscriber misrepresents his identity to the certification authority True False A
certificate
Certificate Certificate Revocation
CRL stands for Revocation List Resource List Letter None Of The Above A
The prospective signer identified in the digital certificate holds the_________ and Private Key, Public key, Private Key,
is called the ___________ Subscriber Recipient Recipient None Of The Above A
In EDI interface, the translation service receives _________ as incoming files Internal Format External Transmission
from the communication service File Format File File None of the above C
The EDI standardisation for International Trade and Commerce is introduced by
__________ ANSI UN/EBCDIC UNESCO UN/EDIFACT D
In EDI, the transmission files are composed of different sets of external format
files which are grouped into multiple sets under the name of ________ batch files interchange sets functions functional groups D
Embedded
The ________________ are pre-paid credit cards that include an embedded cards Smart Card cards SET None of the above A
________________ are another form of credit payment that lets customers use
digital online cheques to pay Web merchants directly E-cash Digital Cash Smart Cards Electronic cheques D
In Active advertisement, there are two types of models. They are _____ and Billboards and Online Catalog Broadcast and Online Catalog and
________ Junk Mail and Billboards Junk Mail Customer Endorsements C
The network based technology is/are ____________ EDI E-mail EFT All of the above D
Decryption is a process employed for scrambling of plain text for web based
transactions True False B
Removable Message
drives that can authentication Encryption
be locked up at in EDI systems performed by a
night provide performs the physically
adequate same function secure hardware Security at the transaction
security when as segregation device is more phase in EDI systems is not
the of duties in secure than necessary because problems
confidentiality of other encryption at that level will be
Which of the following statements is correct concerning the security of messages data is the information performed by identified by the service
in an electronic data interchange (EDI) system? primary risk. systems. software. provider. C
The most important service of the ______ is to manage traffic control application layer transport layer physical layer session layer D
_________is a program that displays information about a host connected to the
net finger service ping service ftp service none of the above A
_______ is a program or a tool that helps in locating a file anywhere on the net FTP TELNET ARCHIE none of the above C
computer related
abbreviations biographical
BABEL consists a glossary of _____ and acronym information bookstores none the above D
Yahoo,lycos,excite and webcrawlers are _____ search engines web directories database channel B
Graphical Graphical
interpreter interchange Graphical
GIF is the acronym for ____________ formatting Format interface format Graphical Interface format B
Jumbled
Joint Pictures pictures expert Joint pictures Joint pictures experimental
JPEG is the acronym for ___________ Expert Group graph expert graph group A
The Web aids users to explore the ________ mails documents net browsers C
yahoo,infoseek,a eudora,netscape
The three most popular mailer are_____,_____ and______ ltavista netscape,ie,lynx and pine none of the above C
network
The World Wide Web consists of _________ information web pages connections mails B
In Microsoft Internet Explorer, the color of the text can be specified using BACKGROUN
_________ attribute of the font tag. D COLOR FCOLOR FONTCOLOR B
Communication Common Communication
The interface that provides effective communication between the web browsersgateway graphical graphical
and servers is _________ interface Interface interface Common Gateway Interface D
CGI is the _________ between web browsers and servers Network Interface Communication Connection B
Current web
CGI programs are invoked based on the information provided by the _________ page Browser Client None of the above B
A CGI program is usually called after a request made by the _________ Browser/user Server Web Channel A
Unknown
resonance Uniform United relay
URL stands for ________ language resource locator
limited None of the above B
A hyperlink can be on ___________ text only image only text or image neither text nor image C
HTML was derived from _________ SQL PLSQL SGML CGI C
SGML is a _________ alphalanguage betalanguagemetalanguage none of the above C
palm is not pancake is not
PINE stands for _____________ eatable palm is not elm edible none of the above B
The application that confirms whether a document is compliant to its DTD is SGML
_________ SGML Processor Preprocessor SGML Parser SGML Composer C
Web is a collection of ___________ web sites images applets documents A
International
Internet Engineering Internet
equipment trainers and Engineering
IETF stands for ________ training faculty faculty Task Force None of the above C
MS Internet
MS Internet Netscape Explorer and
Explorer and Navigator and Netscape
The two major browsers used to surf the Internet are ________,_______ Mosaic Mosaic Navigator None of the above C
data from a
Special characters allow browsers to display _________________ text database symbols video C
The keyword for providing links within or across documents is____________ hyperlink hypertext hotword hotlink B
Stringing pages together using hypertext technology helps view pages in sequential in user-defined
_______________ in random order order order none of the above B
The initial web pages present in a web site is the ________ page. first start home none of the above C
The image format supported by most browsers is________________. .bmp and .gif .bmp and .jpeg .gif and .jpeg .wmf and .bmp C
Service, service,hostna
hostname and me,port,director service,port and
The components of a URL are ___________ directory path y-path directory path service,hostname and port B
mailing
mail lists,mail server
mail servers,mail vendors,mail robots and
The mail we send has a mailing address and most of them correspond clients and identification gateways to
to_____,_____ and alternate services and password other services none of the above C
Which of the following is not supported by internet explorer _______________ <center> <font size=n> <hr size=n> <l1 type=shape> D
communication common classified
generated gateway general
CGI stands for ____________ information interface instructions none of the above B
Host name indicates the domain name of the web ________ Server Client Browser User A
The internet is also called as _______________ arpanet the net intranet none of the above B
peer-to-peer
The internet is similar to _________________ LAN connectivity wan none of the above B
The net drivers______ from one place to another data parcel packets none of the above A
email,file
scripting,parsing news,cooking retrived,internet
The net provides interesting services like______,______ and______ and compiling and fine arts tools none of the above C
mosaic,gopher,
The windows internet software available are______,_______,________ nt,windows95,ie, eudora,trumpne communicator,ie
and______ winzip t ,lynx,winsock all of the above B
________ is the ancestors of the internet dnet arpanet ARPANET none of the above B
defensive defensive
administrative dedicated and advanced
rank registered research projects
administration projects administration
DARPA stands for _______________________________________________ network administration net none of the above C
The uuencode files start with a _______ start begin first none of the above B
milnet,smaller
DARPA is broken into ________ and _______ arpanet mailnet,inet intranet,extranet none of the above A
education,researc music and cooking and
NSFNET is the united states provides service to _____ and_____ h dance dining none of the above A
Higher text Hotlink text
manipulation markup Hyper transfer Hyper text markup
HTML stands for ______________________________________ language language meta language Language D
The first international IP network connections were established in 1973 with united states and united states &
_____ and_____ UK england,norway Russia none of the above B
A_____ is a set of computers interconnected by transmission paths to exchange
information in internet server client network none of the above C
A computer that provides a service usable by other computers is called______ client stand-alone servers none of the above C
A_______ is the representation of physical connectivity of the computers in network network
internet network card topology redirectors none of the above B
detailed
transaction data terminal data target
DTE stands for ____________________ explanation equipment equipment none of the above B
The basic function of the ______ is transmitting the bits over a channel application layer physical layer network layer none of the above B
sending
storing data on a information to a storing data on receiving information from
Which of the following best describes uploading information? disk drive host computer the hard drive a host computer B
A characteristic of a communication channel that is the amount of information
that can be passed through it in a given amount of time, expressed in bits per
second. Bandwidth Speed Size Channel A
The act of searching through storage to locate information without necessarily
knowing of the existence of the information being sought. Find Save Browse Retrieve C
_______ is known only to the signer and is used to create the digital signature. Private Key Public Key Both A and B Either A or B A
_______ is ordinarily more widely known and is used by a relying party to verify
the digital signature. Private Key Public Key Both A and B Either A or B B
____________ is the art of protecting information by transforming it into an
unreadable format. Decryption Cipher Encryption Cryptography C
Conducting
Which of the following activities would most likely detect computer-related Using data Performing fraud-awareness Reviewing the systems-
fraud? encryption. validity checks. training. access log. D
Received by the
Unaltered in Not intercepted intended
A digital signature is used primarily to determine that a message is: transmission. en route. recipient. Sent to the correct address. A
Failure of server
Which of the following risks can be minimized by requiring all employees Data entry duplicating
accessing the information system to use passwords? Collision. errors. function. Firewall vulnerability. D
Business-to- Business-to- Backend-to-
The acronym for B2B is ___________ Business Backend Business Business- to-Billboard A
The _____________ model is the least intrusive model but requires active search
on the part of the customer Billboard On-line Catalog Endorsements Broadcast B
__________ is / are a form of advertisement where people relate their experience Customer
with products and services Endorsements Billboard Catalog Broadcast A
The _________ are software agents who communicate with the business
merchants on behalf of the customers Intermediaries portals .COM Domains A
The Pre-purchase preparation phase includes _______________ for a set of Search and
products Order Placement Service discovery None of the above C
The _________ phase includes customer service and support to address customer Post purchase Purchase Pre-purchase
complaints , product returns and products defects interaction consummation preparation Search and discovery A
Endorsement
Billboard model model of
The ________ allow companies to bypass the need for costly printed catalogs of marketing Online catalog marketing None of the above B
A ________________ is a basket on the Net that is used to place the items that
are being purchased Online Catalog Shopping cart Billboard Pulling cart B
EDI For EDI For EDI For
Administration, Administration, Administration,
Commerce and Consumer and Commerce and
EDIFACT is an abbreviation of ________ Transaction Transport Transport None of the above C
The __________ allows for protocol conversion and communicates with the bank
using the banks private network or the Internet EDI TCP/IP EFT Gateway D
In Ecommerce, data extraction, transforming the data into transmittable form,
transmitting the data and downloading the data are the operations employed in
_________ Compiler Interpreter Assembler EDI D
The _________ commerce assists in integrating the customers and suppliers of Business-to- Business-to- Consumer-to-
the company directly into the organisation Business Consumer Business Customer-to-Company B
E-cash means______________________ Emergency Cash Electronic Cash Euro Cash Endorsed Cash B
Business
E-commerce is a tool that addresses the desire of firms to cut services cost and Communication Process Service
improving the quality of goods. It is a definition of e-commerce from _________ Perspective Perspective Perspective None of the above C
Micro
The small denomination digital tokens are called _________ Microcash Transactions TT(Tiny token) E-token A
The ____________ is the process of encoding information to prevent it from
being read by unauthorized parties Decryption SSL Encryption Subscription C
There are _________ types of data tables 1 2 3 4 B
The tables that allows the user to change or rearrange the data, summarize the
data and evaluate the data using changing points of view is known as data table filtered table index table pivot table D
pivot table convert text to
The wizard that is used to suggest hints for doing a task wizard chart wizard columns wizard tip wizard D
In a chart Y-axis is known as_________ series or rank category legend data marker A
In a chart X-axis is known as_______________ series or rank category legend data marker B
_________ is a set of tables that describe each of the data series series or rank category legend data marker C
________ is used to differentiate one data series from another series or rank category legend data marker D
The chart that contains only one data series is _________ column chart bar chart pie chart surface chart C
The chart that holds the column chart is _________ column chart bar chart pie chart surface chart B
The chart that display two or more data series on a surface is _________ column chart bar chart pie chart surface chart D
The chart that is used to display discrete data column chart bar chart pie chart surface chart A
wild card
_________ are not allowed in a macro name spaces characters symbols none of the above A
internet
Which of the following tool cannot be used to view the excel web page_______ excel97 explorer Netscape word 2000 A
pivot table convert text to
The wizard that used to build an interactive table from data existing on sheets wizard chart wizard columns wizard tip wizard A
The chart that is used for displaying stock market information line chart bar chart stock chart pie chart C
In excel, the subtotal command also generates grand total after the last group
subtotal_________ true false A
In advanced filter , the criteria occupying multiple columns but more than one
row, is considered as an ________ criteria. and or B
Multi-
The stacked bar graphs can be represented in __________ 3-dimensions 4-dimensions dimensions A
A pie chart can represent only one data series at a time true false A
The ______ generates a summarized report in tabular form in an interactive
manner Data table Pivot table B
It is often used
to display share
It is also called market prices It is also used for indicating
as high-low- It shows trends over a period of fluctuations in temperature
Which one of the following statements related to stock chart is NOT TRUE ? close chart over time time changes B
The state government needs to finalize a five years plan to implement 100%
literacy in the state. Which one of the following will be the best tool that should Scenario
be used to work out the plan ? Pivot table manager Solver Data table. C
Forecast'99 is a group working on exit poll. It wants to know how many seat
ABC party needs to won in totality to obtain majority to form the government. Scenario
Which one of the following will be the tool that will help the team ? Goal seek manager Pivot table Data table. A
Which one of the following will be the tool that provides a way to view and
compare the results of all the different variations together on the worksheet ? Goal seek Pivot table Solver Data table. D
A ___________ is an excel file where the user stores his data Workbook Worksheet Spreadsheet none of the above A
Performing
Performing database Performing text
Spreadsheets are useful for _______________ calculations. operations formatting. All of the above D
Source table
Which one of the following is NOT the component of the pivot table ? Column field Row field. name. Pivot table item. C
Excel allows upto ______ levels of sorting two three N B
Filtering rearranges a list to display the required records true false B
Multi-
The stacked bar graphs can be represented in _____________ 3-dimensions 4-dimensions dimensions A
The ______ generates a summarised report in tabular form in an interactive
manner Data table Pivot table B
It is useful
when several
components are
changing and
It displays the the user is
data series one interested in the It can be
Which one of the following statements related to stacked bar chart is NOT TRUE on top of the sum of the represented in 3-
? other. components. dimensions B
The state government needs to finalize a five years plan to implement 100%
literacy in the state. Which one of the following will be the best tool that should Scenario
be used to work out the plan ? Pivot table. manager Solver Data table C
Forecast'99 is a group working on exit poll. It wants to know how many seat
ABC party needs to won in totality to obtain majority to form the government. Scenario
Which one of the following will be the tool that will help the team ? Goal seek manager Pivot table Data table A
Standard
Which following function is used in subtotal option ?______________ Count. deviation SumIf A
A workbook consists of many ________ databases records tables worksheets D
It is a tool that
provides a way
to view and
It is a tool for compare the
summarizing and results of all the
analyzing the different It summarizes
data records in variations the data by using
an interactive together on the analytical
Which two of the following statements related to pivot table are TRUE ? manner. worksheet functions. A
Scenario
Which one of the following is NOT a What-if analysis tool ? Goal seek. manager solver Pivot table D
Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant? E12 6 SUM(H9:H11) G7*SUM(H9:H11) B
It is surrounded
by a heavy It is displayed in The phrase “active cell”
How can you tell which cell in a worksheet is the active cell? border. It is blinking. reverse video. appears in the Status bar. A
By either
clicking in a
By using the different cell or
arrow keys to using the arrow By typing the reference of
By clicking in a move to a keys to move to the cell you want to move to
How can you change the active cell? different cell different cell a different cell in the formula bar C
Which command enables you to change the margins for a printed worksheet? Options Page Setup View Edit B
All commands are carried out on a rectangular groups of cells known as a: worksheet. range. group. cell group. B
Which of the following is a valid cell range? 6 D12, G25 D12:G25 D C
destination
In a copy operation, the cell(s) you are copying from is called the: copy range. range. clipboard. source range. D
destination
In a copy operation, the cell(s) you are copying to is called the: paste range. range. clipboard. source range. B
Which of the following commands is needed to duplicate the contents of a cell in The Duplicate The Copy The Paste Both the Copy and Paste
another? command command command commands D
A cell reference that does not change during a copy operation is known as absolute relative mixed constant A
Which of the following is considered an absolute cell reference? B4 $B4 B$4 $B$4 D
Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are
copied to cell E4, what will be the contents of cell E4? #DIV/0! #DIV/0! #DIV/0! #DIV/0! B
Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell
E3 are copied to cell E4, what will be the contents of cell E4? #DIV/0! #DIV/0! #DIV/0! #DIV/0! C
Which of the following commands is needed to transfer the contents of one cell The Move The Cut The Paste Both the Cut and Paste
range to another? command command command commands D
cycle through
absolute,
relative, and
copy and paste mixed cell cycle through open
The F4 key is used to: cells. edit cells. references. applications. C
Which of the following quickly copies the formatting of a selected cell to other the Format the Formatting
cells? the Fill Handle Painter toolbar Conditional formatting B
Click the Insert
Select the Insert Hyperlink Right-click a
Hyperlink button on the cell and click the Double-click a cell and click
command from Standard Edit Hyperlink the Insert Hyperlink
Which of the following will insert a hyperlink into an Excel worksheet? the File menu. toolbar. command. command. B
whether the cell
whether the cell has an absolute
has a formula or or a relative cell
Conditional formatting applies formatting to a cell based on: a value in it. the cell address. reference. the value in the cell D
text with either a two-digit
text with a two- text with a or four-digit year,
If you enter a date into a cell, Excel stores the date as: digit year. four-digit year. an integer. depending on the format. C
You created a worksheet on July 30 and entered the =Today() function in cell
E17. You opened that worksheet again on August 31. What will be displayed in It is impossible to determine
cell E17 on August 31? Jul-30 Aug-31 29/03/2008 from the information given. B
bulletin application
news boards,mails servers,proxy
groups,yahoo call and servers and web
The other ways of getting connected to the net are_____ and infoseek wireless system servers none of the above B
business bulletin
bulletin board broadcasting broadcasting
BBS stands for______ system system system none of the above A
USENET is a BBS on ____ scale small large very small none of the above B
windows
WINSOCKS is expanded as______ windows socks sockets windows stocks none of the above B
IETF Level 2 HTML DTD supports graphical browsers like _______ Mosaic Yahoo PINE Lynx A
The space used by Netscape to store the retrieved page is called______ buffer cache built-in none of the above B
The principles, means and methods for rendering information unintelligible and Digital
for restoring encrypted information to intelligible form. Photography Signature Cryptography Message Digest C
A long string of seemingly random bits used with cryptographic algorithms to
create or verify digital signatures and encrypt an decrypt messages and
conversations. Key Lock Hash Function Formula A
Protected/private character string used to authenticate an identity or to authorize
access to data. User-id Password Name Address B
The successful act of bypassing security mechanisms of the system. Penetration Retrieval Cryptography Password Cracker A
A set of rules and formats, semantic and syntactic, that permits entities to
exchange information. Acts Regulations Address Protocols D
An attempt to get access to a system by posing to be an authorised person. Spoofing Imposting Unauthorising Approving A
An action or event that might prejudice security. Loss Threat Exposure Hacking B
According to information Technology Act, 2000, To investigate contraventions Sales - tax Income - tax Judge of a civil
the controller of certifying authority shall exercise the like powers to that of authorities authorities court Police officer of IPS rank. B
Pirated
Malicious software. Utility software Virus Cracker C
Charles
None the person who is known as father of Internet Tim Berner Lee Hoffman Bubbage Howard Aiken A
This website is the biggest bookstore on the earth. Etrade.com Amazon .com Dell .com Msn .com B
Asynchronous
Automated Any Time Transmission
When we talk of Data Transmission modes, then ATM stands for Tailor Machine Money mode None of above C
A sequence of bits or characters that identifies the destination and the source of a
transmission. Acts Regulations Address Protocols C
The means of communicating between networks Router Gateway Port Pin B
A group of computers and other devices dispersed over a relatively limited area
and connected by communication links that enable a device to interact with any
other on the network. LAN WAN CAN PAN A
Combines
connectivity of
a hub with the Switches data
traffic from incoming
Concentrates regulation of a ports to
Which of the following is true concerning the function of a switch? connectivity bridge outgoing ports. All of Above B
Bridges and Two or more Bridges and
What do routers connect? Repeaters. networks Hubs Hubs and nodes B
What does a router route? bits frames Packets None of the above C
Software which prevents external access to a system is termed firewall gateway router virus checker A
If four computers are connected to a hub and then to the internet, how many IP
addresses are required for these 5 devices? One Two Four None of the above C
Data-Link
Which of the following in an OSI layer Physical Layer Layer Network Layer All of the above D
When creating a network from just two PCs, what kind of cable would be used to
connect them? RG7U Coaxial cable Fiber Twisted pair B
A memory
An IP address is a Physical address Logical address address None of the above B
To construct a simple LAN of 4 computers, you would connect them with
______connect them A cable Hub Router None of the above B
It continue on to
It gets target device
Data return to destroyed bit by with corrupt
What happens to data that is ruined before reaching to receiver the sender bit. data None of the above B
Wireless Wired Ultra violet
Bluetooth is technology Technology technology None of the above A
Data Link
Which is not one of the recognized IEEE sub layers? Physical Layer Layer Network Layer All of the above D
The most preferred number system to represent a IP address is Binary ASCII Octal None of the above A
A MAC address is of 48 Bits 48 Bytes 48 KB 48 MB A
software that a list of rules
facilitates for transferring software that
connection to the data over a allows file a gateway calling program
Protocol is internet network copying for internet bridging B
A ............... is a LAN-based computer with software that acts as a controlling
device for controlling access to at least part, if not all, of a local area network and
its available resources. Novell PC Client Server Network PC C
If the hub goes
If one node down, it brings
goes down, it down all of the If the hub goes down, it
brings down the nodes on that brings down all of the nodes
What is the biggest disadvantage of the Ring topology? There isn't one entire ring section on all of the rings B
The .............. of the network concerns how network devices are physically (or
optically) interconnected. Physiology Topology Both A and B None of the above B
The principal topologies used with LANs are: Bus Star Ring All of above D
What are the various types of bus architecture? Linear Parallel Both A and B None A
What are the various types of ring architecture? Parallel Circular Linear Both A and B B
In a ................., each workstation attaches to a common backplane via its own
physical cable that terminates at the hub Ring Bus Star Mesh C
In a ............... , each work station is directly connected to a common
communications channel Ring Bus Star Mesh B
Which one of the following is NOT a network topology? Star Bus Linear Ring C
In a .............. , the cable system forms a loop with workstations attached at
various intervals around the loop Ring Bus Star Mesh A
Transport
The Media Access Control (MAC) is a sub layer of the: Network Layer Layer Physical Layer Data Link Layer D
Ethernet, token Ethernet, token Ethernet, Ethernet, token ring,
What are the most common LAN technologies used in networking today? ring, DecNET ring, FDDI DecNET, FDDI ARCnet B
Modem speeds are measured in bps kbps mbps mips B
LAN speeds are measured in bps Kbps Mbps Mips C
measured in depend on the
usually higher bytes per transmission
WAN speeds are than LAN speeds second medium limited by modem speeds C
Accessing the Internet from a typical home PC requires the use of CD-ROM drive a modem Windows 95 Netscape B
must use the
World Wide must use must have a
To use the Internet, you Web electronic mail LAN account All of the above A
common
The worldwide web server uses the following standard interface to act as the key gateway uniform gateway application protocol
middleware: interface resource locator interface interface C
a Novell interfaces a
Interface used to control modem to a connects a computer to a
An NIC Controller a printer computer network D
Windows
Accessing the Internet from a typical home PC requires the use of CD-ROM drive a modem package Netscape B
The most widely used network operating system on PC LANs is Linux Novell Netware Windows NT None of the above C
have to do with
compression of
graphics and have to do with
JPEG and MPEG video Web pages the Internet none of the previous A
must use the
World Wide must use must have a use appropriate
To use the Internet you Web electronic mail LAN account communications software A
A multiplexer is a form of Printer modem bridge none of the previous D
A proxy server is a backup server an email server a poor file server none D
IR system for
A search engine is hardware the Internet browser none of the previous C
To look for information about interest areas on the internet, the user should use a scanner CD-ROM clip-art file search engine D
It is made up of
many networks
connected into
transmission It works the
It is one large lines called same way as a Individual computers can
Which of the following is NOT true about the Internet? network. backbones. local network. connect to it using an ISP. A
The traditional intent and impact of this common type of attack is to prevent or Password System Denial of
impair the legitimate use of network resources. cracking intrusion Service Port sniffing C
used to protect a
computer room
from fires and a screen saver
A firewall is floods a form of virus program none of the previous D
Flood a Web Virus that
Which of the following is NOT an example of a DoS attack that is popular among server with initiates a ping
hackers? IP flood requests flood UDP flood A
A ____________ attack is when a hacker sends a continuous flow of packets to a
system. hack packet flood traffic C
One defense option on a large network is to configure a ____________ to
disallow any external traffic. firewall router switch hub B
A proxy server is a backup server an email server a poor file server none of the above D
Which of the following would be performed on a network server and not Apply security Update virus Backup data on
normally on individual workstations? patches definitions a daily basis Limit logging on access C
Only large
There are safe name-
All sites are safe and unsafe recognizable ActiveX-enabled sites are
What can be said about the safety of the Internet? and reliable. sites. sites are safe. safe. B
To secure communication network against wire-tapping the most effective control Use of Use of logical
is Use of identifiers passwords access methods Use of encryption methods D
by attaching
by attaching to through an FTP itself to a by scanning the computer
One way that a virus CANNOT spread throughout a network is: an e-mail. port. document. for a connection. B
Which of the following is NOT a means of monitoring employee use of company
technology? Phone E-mail Web traffic Application updates D
____________ would be used by parents to monitor their children on their home
system. A Trojan horse Adware A worm Spyware D
The formal rules and parameters which are established to permit a microcomputer
to communicate with the mainframe computer as though it was a terminal of the
mainframe are called Modems Protocols Multiplexors LAN B
Trojan horses
cookies and and key cookies and key
The two most common tools used to help with extracting information are: Trojan horses. loggers. loggers. key loggers and worms. C
An attack with
An attack on a the purpose of
Which of the following would NOT be considered an example of cyber system for gaining Giving out Changing the content of a
terrorism? personal gain publicity disinformation Web page D
Setting your privacy settings in Internet Explorer to medium is one way to block: pop-ups. cookies. spam. viruses. B
clicking a
using Internet hyperlink that
Explorer to view updating the references a
a Web page that values that are document that is
is stored on the obtained stored in the viewing an Excel worksheet
hard drive on through a Web floppy drive on that you have saved as a
Which of the following requires an Internet connection? your computer query your computer Web page. B
Click on the Go to the
Back arrow until Click on ‘Go History page
Mr Rao wants to find a website that he briefly browsed over yesterday. After the desired site is to’ or ‘Search’ and look for the Go to the Bookmarks or
turning on his computer how would he do this? found in the browser site Favorites page C
the Insert
the Refresh Hyperlink the Update
Which of the following is used to update a Web query? command command command the External Data command A
You download from the internet, a screensaver, a ten-second sound file and a ten-
second music video clip. You also add a hyperlink. Which of the media elements
has the greatest effect on the file size? Hyperlink Screensaver Sound Video C
When saving a photograph for use on a website, which format should you
choose? BMP GIF JPEG TIFF C
Write it down Add it to
While researching the Direct taxes assignment, you find a useful website. What is Save it to a on a piece of ‘Favourites’ or Cut and paste it to a word
the most efficient way to access the site at a later time? floppy disk. paper. ‘Bookmarks’. processor document. C
privileged
A system that uses the Internet for business-to-business interaction is called a(n): extranet. intranet. network. network topology A
A block of text automatically added to the end of an outgoing email is called an attachment. a signature. a footer. an encryption. B
_________ refers to the use of Internet technologies for placing telephone calls. VoIP IPT IPP PoIP A
autolayouts and
clipart & auto presentation slide view &
In Powerpoint2000 ,the built-in professional design elements are shapes templates outline view none of the above B
Selection handles are the 8 small ___________ that appear around the object,
when an object is selected circles points squares icons C
The _______ is an invisible matrix of vertical and horizontal lines that covers the
entire slide workspace square image grid guide C
_______ are drop-down menus that appear when the right mouse button is
clicked on the screen element tool bars short cut menus auto shapes all the above B
________ and ______ have the ability to add a lot of visual impact into the clip gallery & slide show &
PowerPoint presentation word art view show fonts & images none the above A
_______ is a motion picture or any animation file wave file media clip .video file all the above B
In visual basic, when a record pointer reaches to the last record, _______ property
of a recordset object is automatically set to ______ eof,false movelast,true movelast,false eof,true D
properties form layout
In visual basic, the explorer view of a project is displayed in ___________ window window toolbox project explorer D
In visual basic, when a record pointer reaches to the first record, _______
property of a recordset object is automatically set to ______ bof,false movefirst,true movefirst,false bof,true D
In visual basic, _______ is a method to convert a string into integer. value() int() number() val() D
In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What
type of shape should we get? circle rectangle square oval D
In visual basic, a timer event is only available in timer control. true false A
In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor
of any object true false A
In visual basic, _______ is a property of a textbox control to set a color of a text. fontcolor color forecolor none of the above C
In visual basic, _______ property of a textbox control is set to _______ to fontunderline,tr textunderline,tru
underline a text underline,true ue e none of the above B
In visual basic, _______ property of a textbox control is used to change the size
of text. textsize size foresize fontsize D
one- millionth of one-hundredth one-thousandth one-ten thousandth of a
In visual basic, the interval property of a timer control is given in ________ a second of a second of a second second C
In visual basic, _______ property of listbox control counts the number of items in
the list count recordcount itemcount listcount D
form layout prperties
In visual basic, the properties of various controls can be set using __________ window window project explorer toolbox B
In visual basic, vbinformation, vbcritical, vbexclaimation are the values of
_______ in a messagebox function. title prompt vbmsgboxstyle none of the above C
In visual basic, ________ is a function which displays a message and it also
allows the user to enter values in a form object msgbox() textbox label inputbox() D
In visual basic, using a data control, ________ is a recordset type which allows
to add a new record and also to update existing record in a recordsourse object opendynaset opensnapshot dbopensnapshot dbopendynaset D
In visual basic, while closing a form _______ event of a form object is triggered
earlier to terminate event. load activate unload initialze C
In visual basic, to give a backcolor or to bring in a picture to a command button
can only be done if we set the style property to ______ standard opaque transparent graphical D
In visual basic, a method RGB(255,0,0) will generate _______ color blue red green black B
In visual basic, a method RGB(255,255,255) will generate _______ color red green blue white D
properties form layout
In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible. window window toolbox project explorer window D
properties form layout
In visual basic, if a user uses a function key F4 _________ becomes visible. window window toolbox project explorer window A
In visual basic, when a textbox control receives the focus ________ event is
triggered. change lostfocus text gotfocus D
In visual basic, a form is a ________ object. child parent container none of the above C
Microsoft visual basic is a Rapid Application Development tool. true false A
In visual basic, when a form object appears on the screen _________ event is
triggered. load unload initialize activate D
In visual basic, to display text on a label object _________ property is used text name caption none of the above C
In visual basic, _______ object is used to access the database and also to manage
the data in the database. opendatabase dbengine openrecordset none of the above B
In visual basic, when a checkbox control is checked _______ property is
automatically assigned with 1. enabled visible value style C
In visual basic, _______ keyword is used to declare a variable dime dim var none of the above B
What is the extension of the Visual Basic project file that stores the design of a
user control. .ctx .ctl .ctr .ocx B
Which event of a text box would you use for validating the data entered by the
user? Validate Validation Check Audit A
On Error GoTo On Error GoTo
Which of the following statements forces inline error handling? linelabel Inline On Error Stop On Error Resume Next D
The _______ method resets the contents of bound controls to their original values
when the user clicks on the cancel button. UpdateControls PaintPicture Refresh Resize A
Cancel UnloadMode
To deactivate the Form UnLoad event, you make the following change in the parameter to a Cancel parameter to a UnloadMode parameter to a
function definiton: non-zero value parameter to 0 non-zero value zero value A
How many root nodes can a TreeView control have? 1 2 3 None of the above D
Consists of
Consists of Various Forms
Consists of several And Code
A project group is a Project which: several Programs Applications Modules Consists of several Projects D
Form window, Project
Procedures declared in a _____ are local whereas procedures declared in a standard or code window, view Class module,
______ are available to the whole application. module code window code module None of the above A
Place code in
Place code in the the Unload Place code in the
How can you keep the user from exiting a form by clicking the Close button? Terminate event event Deactivate event None of the above B
The _______ property enables Visual Basic to draw complete images in memory AutoRedraw = AutoRedraw =
before displaying them on the Screen. True False Refresh PaintPicture A
Msgbox Msgbox
You want to display the code and the description of an error. What would be the Msgbox err.no & err.number & error.number & Msgbox error.number &
correct syntax? err.text err.text error.text error.description D
To display To help in To provide a repository for
images to the creating a To allow the images used by other
What is the purpose of the Image List Control? user ToolBar editing of icons controls D
Which method would you use to get a free or unused File identifier while opening
any file: FreeFile GetFileNum GetFile GetBytes A
Which property procedure is used to retrieve the value of a property? Retrieve Get GetProperty Value B
Common
Which of the following can be shown to the user using the Common Dialog messages passed Open dialog Windows
control in VB? to Windows box explorer Input box D
Which of the following are not properties of Command Button: Caption Visible Multi-Line Font C
Click and Click, KeyUp KeyUp and KeyPress, KeyUp and
Which events enable you to determine which key was pressed by the user? KeyPress and KeyDown KeyDown KeyDown D
In order to access a file in Non-textual format, you have to open file in: Ascii Format Binary Format Input Mode Output mode B
Visual Basic displays information depending upon the current value of two CurrentX and ScaleLeft and ScaleHeight and
properties of the form, called: CurrentY ScaleTop ScaleTop x and y A
Which of the following procedure types will execute when you assign a value to a Property
property of an object? Property Get Assign Property Let Property Set C
In order to overlap the controls (say a command button) during design time, we
use the ‘Send To Back’ or ‘Bring To Front’ option from the Edit menu. To Background Caption
change it dynamically (i.e.during program execution) we need to change: color property property ZOrder property AutoRedraw property C
Which property of the ProgressBar determines how much of the bar is filled? Min Max Value CurrentVal B
The ______ function can be used to run any .com, .exe, .bat or .pif file from a
Visual Basic program. Shell Substr SetAttr CStr A
Can be
Are one and the different at Are actually not
The caption and the name properties of the command button: same times properties None of the above B
You do not
You do not need have the
You try to initialize a new Object variable with the following line but receive an to use the Set permission to MyVar has not
error. What could be the possible cause? Set MyVar = New Classname command here access the class been declared None of the above C
The
The Open The Exec ExecProcedure
Which of the following will perform a direct execution of a Command object? method method method None of the above D
A warning query A critical An exclamation
The vb Critical symbol displays: icon message icon icon None of the above B
intrinsic
vbYesNo is an example of a(n): statement. variable. constant. built-in procedure. C
InputBox
function can be
MsgBox InputBox created with the
statement returns function returns macro recorder,
a value, while a value, while while the MsgBox statement can be
the InputBox the MsgBox MsgBox created with the macro
The primary difference between the MsgBox statement and the InputBox function does statement does statement recorder, while the
function is the: not. not. cannot. InputBox function cannot. B
Which of the following is TRUE about a protected form (i.e., a form where the Data cannot be
Protect Form button on the Forms toolbar is toggled on and is assumed to remain entered into the The form can Data can be A new check box can be
in that position)? form. be modified. entered. added. C
Which event is triggered when the user moves to another open form? Unload QueryUnload Deactivate Terminate C
The user can use ______ to remove the undesirable part of the image clipping tool cropping tool cutting tool scribble drawing tool A
The power presentation has a _____ for a set of compatible colors color palette color box color scheme color guide C
The set three colors used for graphs and for secondary slide items is called as ascent tricolor scheme color palette primary color scheme A
There are ______ types of charts available in PowerPoint 10 28 18 36 C
_______ charts are useful while showing variations over a period of time column bar pie linear A
_______ are the individual pages of a presentation images images and text slides slide sorter views C
A PIE Chart is a ____ diagram that depicts the relationship between a whole and
its parts circular radar doughnut all the above A
Each individual piece of data in a series is called a/an entity data point data stream B
Microsoft
organization
PowerPoint launches an OLE-compatible application called chart clip art auto shapes track changes A
the chart
the organization the chart is window opens
chart is made available displaying a
When the user double-clicks on an organization chart object in PowerPoint expanded for editing chart template none of the above C
general purpose custom drawing
The _____ are used for selecting, editing and viewing objects in the chart box tools tools tools standard drawing tools C
There are ____ default fields available in all boxes of the organizational chart two four five eight B
The _____ tool is used in the same way as we use a pen to draw a table native tool draw tool standard tool all the above B
A/An _______ consists of smaller printed version of the slides autolayouts handlayouts slide view none of these B
The size of the object can be changed using the ______ tool zoom reduce/enlarge preview none of the above B
_______ is the process through which the slides in the current presentation are
included in another presentation or application importing exporting copying moving B
________ can be used to create charts as well as worksheets Microsoft excel auto shapes clip art drawing tools A
.rtf(rich text
PowerPoint can import text files that have been saved in ______ format .ppt(PowerPoint) format) .doc(document) .html(hypertext format) B
PowerPoint outlines can have _____ outline levels nine only one six twelve C
When a file is saved with _____ extension, the graphics and text are also saved .rtf(rich text .wmf(windows
along with the slide format) metafile) .txt(plain text) .doc(document) B
not displayed displayed only
during the slide during the slide displayed only
The hidden slide is show show in outline view none of the above A
DTS(digital 3D(3
____ effect is used to introduce a slide during a slide show track sound) dimension) both a and b transition D
A _____ is a special effect that determines how the objects appear on the slide build transition slide show view show A
The notes page is formatted based on the notes master slide master master slide master notes A
Pick the odd man out of the following outline view slide view view show slide sorter view C
When a new presentation is opened ,powerpoint creates slides that have a width 15 inches,10 10 inches,7.5 7.5 inches,5
of _____ and a height of ______ with the landscape orientation inches inches inches none the above B
The default orientation for notes ,handouts and outlines is ____ orientation portrait landscape a or b none of the above A
Build effect is also called as ______ animation view show transition b or c A
Graphics for web pages are automatically stored in ____ format gif jpeg png none of the above D
A _______ is used to jump to any slide in the presentation hyperlink hypertext action button all the above D
visual basic for Microsoft visual
The ______ language has been incorporated into PowerPoint visual c++ application interdev all the above B
In PowerPoint _____ is a series of commands that are executed in sequence macro batch file templates add-ins A
while creating during slide when the slide
The macro will be activated a .exe file transition show is run none of the above C
Developers can easily add ____ to PowerPoint 2000 by using the programming
interface virus checkers spell checkers header files all the above A
______ determines the order in which order in which the slides will be displayed
during the show slide show custom show both a and b none of the above B
_______ is used to organize and develop the contents of a presentation slide pane notes pane properties pane outline pane D
If we save the presentation file as a metafile, it can be opened using internet explorer paint shop pro paint shop pro power point 2000 D
PowerPoint
creates a sample
presentation to it is the contains sample
which user can quickest way to presentations for
With reference to autocontent wizard for creating a new presentation, which of add words and create a a variety of provides suggested content
the following statements are not true pictures presentation topics and design D
by default,
doughnut chart
data to be is displayed
graphed resides based on the
in a datasheet data in the data is plotted in user can add data labels and
With reference to chart, which of the following statements are not true window datasheet a chart window gridlines to the chart B
The format of the text entered in a title, subtitle, or bulleted-list object is
determined by the format settings in a special slide called -------- the master slide the slide master the header slide the format slide B
PowerPoint provides a _________ that searches the entire presentation i.e., all the grammar
text objects in all the slides, outlines, notes and handouts for spelling errors office assistant spell checker checker none of the above B
PowerPoint's drawing toolbar contains _______ drawing tools 10 12 102 22 B
Click _______ on the rectangle drawing tools enables us to draw multiple
rectangles once twice three four times B
text, graphics text, hypertext CD-ROM,
and email and Power digital camera text, hypertext, Power Point,
An example of the components of a multimedia presentation could include address. Point. and sound. video and sound. D
Which of the following formatting elements can be applied to a PowerPoint the Font and the Line style, Line color, text
diagram using the AutoFormat tool? the Line style the Line color text alignment font, and text alignment D
Which of the following formatting elements can be applied to a PowerPoint Fill color, Line color, and
diagram using the Format AutoShape command? Fill color Line color Line thickness Line thickness D
A popup box
prompts you for Microsoft Graph
Excel is started an existing is started so that
What happens when you double click a blank graph placeholder in a PowerPoint so that you can Excel chart to you can create a The graph placeholder is
presentation? create a chart. insert. graph. deleted. C
The chart is The chart is The chart is The application that created
What happens if you single click a chart that is not currently active? selected. deleted. doubled in size. the chart is started. A
The chart is The chart is The chart is
What happens if you double click a chart that is not currently active? selected. deleted. doubled in size. Microsoft Graph will restart. D
a slide one bullet item at a
time, build bullet items a
letter at a time, and build
a slide one bullet bullet items one bullet items one bullet items a word at a
Using custom animation effects, you can build: item at a time. letter at a time. word at a time. time. D
Subtle, Moderate, or
Which of the following animation effects can be added to a slide? Subtle Moderate Exciting Exciting D
Both enter and
exit, and fly in Neither enter nor exit;
Fly in from top from top or neither fly in from top nor
Which of the following animations effects can be added to a slide? Enter and exit or bottom bottom bottom C
Which keyboard key is used to select more than one picture on a slide? Enter Shift Alt Ctrl B
Which keyboard key combination is used to undo the previous command(s)? [Enter+A] [Shift+Z] [Alt+Z] [Ctrl+Z] D
Microsoft visual basic project file has _______ file extension. .vbg .vbp .frm .frx B
In visual basic, _______ method is used to add an item in a combobox add additem loaditem none of the above B
In visual basic, _______ method is used to load picture during runtime in an
image control load loadpicture addpicture none of the above B
In visual basic, to populate a drive list box with a directory list box __________ Drive1.Drive=Di Dir1.Path = File1.Path =
statement is used r1.Path Drive1.Drive Dir1.Path none of the above B
In visual basic, to display a message in the run time _________ function is used messagebox() message() msgbox() none of the above C
In visual basic, to populate a directory list box with a file list box ________ Dir1.Path=File1. Dir1.Path = File1.Path =
statement is used Path Drive1.Drive Dir1.Path File1.pattern=Dir1.path C
In visual basic, ________ is a property of a recordset object which counts the
number of rows in a recordsourse object openrecordset opendatabase recordcount count C
In visual basic, using a data control, a record can only be added from the last
record. Adding a new record is only possible using _______ method of a
recordset object. update append addnew additem C
In visual basic, using a data control, a record is saved to a recordsource object
using _______ method of a recordset object. append update additem addnew B
In visual basic, using a data control, to navigate to the previous record ________
method of a recordset object is used. movenext movelast moveprevious movefirst C
To deactivate the Form UnLoad event, you make the following change in the Cancel UnloadMode
function definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as parameter to a Cancel parameter to a UnloadMode parameter to a
Integer) To prevent the Form from closing, you will set the: non-zero value parameter to 0 non-zero value zero value A
_______ is a word processing that is a member of the office 2000 family Word 2000 Office 2000 Office 97 Back Office A
The feature that enables user to type anywhere in a document without pressing or
tab click-n-type double click drag & drop none of the above A
The______ feature allows the user to copy and paste upto 12 items at the same
time in an application office clipboard cut select none of the above A
______ and _____ key combination will extend the selection by one character on shift+end and shift+left and ctr+end and
the left and right shift+home shift+right ctr+home none of the above B
web layout, normal layout, web layout, page
_____and_____ are improved layout in Word 2000 printlayout web layout layout none of the above A
click from start
program,
MSWord from
The easiest way to create a document in word is wizard templates the task menu none of the above A
document
In Office2000 environment the tool that makes work easier for us is_____ office assistant inbox assistant assistant none of the above A
A short description of a tool bar button called the ______ is displayed when the
mouse pointer is allowed to stay for a second on the button Screen Tip Tool Tip Icon Tip Document Tip A
The _____ helps us to keep track of the margin of the page tab stop marginal stop ruler none of the above B
up arrow keys page up keys home and end
The keys that are used to navigate between headers and footers are only only keys only up and down arrow D
Pick out the element from the following that dose not form the type of tabs for the
Word 2000 left center decimal rotation D
_______are blueprints or patterns for documents of a certain type template model dialogs/alerts none of the above B
The______ is used for quickly setting paragraph indention using the mouse increase indent decrease indent both A and B none of the above C
Word art is text with special effect control tool box design wizard pictures A
AutoShapes in word can be created by accessing the _____ drawing toolbar control box database forms A
By default, a document consists of_____ section 1 2 0 11 A
printer setup
page setup from from the file print preview
The dialog box that is used to determine the documents margins is the file menu from the file none of the above A
________ is a box surrounding a page on all slides or a line that sets off a
paragraph on one or more slides border shading style box none of the above A
The key that is used to perform a task to select all t he text in the documents is ctrl+a Del ctrl+f ctrl+m A
The key that is used to indent a paragraph is ctrl+a Del ctrl+f ctrl+m D
The key that is used to change the font from the current positioned in a document CTRL+SHIFT+ CTRL+SHIFT+
is F CTRL+O S CTRL+SHIFT+P A
The key that is used to change the style of the document that is from that normal
to heading1 or heading1 to other document styles. ctrl+shift+f ctrl+o ctrl+shift+s ctrl+shift+p C
'Set mapping' Check control that follows a text-type validation, we use
----------------- application for data analysis. Excel Access Both None of the above B
Excel can import data from other databases for the data analysis. True False A
A System Auditor can uses CAAT tools to analyze data False True B
In the case of the ---------- control, it is ensured that the data in combination with Transaction
other fields are reasonable as per standard set by an organisation. Valid Signs type Limit Check Reasonableness D
--------------- function searches for a value in the leftmost column of a table and
then returns a value in the same row from a column that we specify in a table HLOOKUP VLOOKUP A or B None of the above B
Most of the tools use in Data Analysis depends on DDE OLE ODBC All of the above C
Analysis is the
loading of
Analysis programs that This involves
translates perform looking at a
program code of routines to system and
a high level control finding out how
language to peripheral information is
How do you define analysis of an information system? machine code devices being handled None of above C
Inputs, outputs,
file design Maintenance,
Only hardware hardware, and reliability, and
What areas need to be considered in the SOFTWARE design process? and software software upgradeability None of above B
To execute any To maintain
What is the function of systems software? To collect data programs security None of the above D
Deleted from the Copied from Saved to the
Formatting a disk results in all the data being...? disk the disk disk Transferred from the disk A
The short-cut-key that is used to indent a paragraph spacing in the documents is ctrl+m ctrl+2 ctrl+end ctrl+home B
The short-cut-key that is used to paste the selected text ctrl+v or ins ctrl+c or ins ctrl+x or ins ctrl+v or Del A
The short-cut-key that is used for paragraph spacing(1.5) ctrl+2 ctrl+5 ctrl+1 none of the above B
The box that separate text from the document and allows it to behave like an
independent object is known as Text Box Frame AutoShape Border A
The object that is used to provide information like the title of the book, name of Header and
the chapter, page number etc. Footer Screen Tips Page Layout none of the above A
The object that helps us analyzing data statistically is known as Chart WordArt Auto Shapes File A
To highlight certain parts of a page to set it apart from the rest of the page we
make use of the following features Borders Shading WordArt Bullets D
To clear all the tabs in a document the option that is clicked from the tabs dialog clear remove all remove clear all D
The dialog box that is used to incorporate picture bullets into our documents or picture bullets arrow bullet circle bullet
web pages is dialog box dialog box dialog box none dialog box A
The object that composes of set of tools which helps to create and work on
different shapes like rectangles, circles, flowcharts etc. charts WordArt AutoShapes files C
When word is opened a new document called_____ is displayed, where the user
starts typing the content right way doc1 document1 new document default document B
______ is an online dictionary maintained by word to obtain synonyms for words thesaurus hyphenation mail merge none of t he above A
The thesaurus is invoked by pressing_______ shift+f7 thesaurus menu shift+f8 tools+spelling menu A
When a new table is created the insertion point flashes in the _____ first second first row last cell of the t able A
By pressing the _____ key inserts a blank row after the last row in the table tab end enter none of the above A
convert text to convert data to table auto
The ______ option enables us to convert text into a table format table table format option none of the above A
rows &
A table consists of ______ that contain text or graphics row columns records none of the above B
The _______ option in word allows the user to automatically correct misspell
words as and when they are typed AutoCorrect AutoFormat style gallery none of the above A
______ is a facility that enables recording and replaying of a sequence of
keystroke Mail Merging Macro Data Source none of the above B
In Word Macros are written in _____ basic visual basic vj++ visual FoxPro B
In Word 2000 the macro dialog box is activated with the help of ____ key
combination shift+f8 shift+f7 alt+f8 alt+f5 A
________shows how a document would look like when published on the web or online layout
on an intranet web layout view view browser none of the above A
micro soft
______ is a software for sending and receiving e-mail messages email client outlook express outlook hotmail A
________is the coding system used to create web pages html xml sgml vb script A
The network that makes information easily accessible across various networks is
_______ internet intranet arpanet LAN A
field names in
field name must the field the header
be listed in the separators in a source must
same order as header source match any
the and the data merge fields the number of fields names
corresponding source can not you've inserted in the header source must be
Which of the following statements are false with reference to the use of a header information in be set as in the main the same as the number of
row source for a mail merge the data source paragraph document data fields in the data source B
auto format
option applies by default cell
to the entire height and
it is not possible table and not weight option
to change the only to the applies to all the delete cells option allows to
height of only selected rows rows and delete the entire row or a
With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT selected rows of or columns of a columns of a column or shift cells up or
ARE false a table table table shifts cells left C
The alignment available for tabs does not include left decimal justified top A
In order to type
a header from If a header is
A new section is the third page inserted in the
created in order of the second section
to change document a then the same A section is a portion of a
properties like section break is header is document in which certain
number of inserted after t applicable to the page formatting option can
Which of the following statements related to a Section Break are True columns he third page first section be set D
The user can set a spelling checker to skip the marked part of the next true false A
New option under the file menu of word creates a new blank document that is
based on the normal templates true false A
The user can split the screen only into two parts true false A
The features that enables the user to type text graphics tables anywhere in the
document without pressing enter or tab drag & drop click -n-type Double Click none of the above B
The user can modify the picture from the clip art true false A
password
protected
document can
be opened
without
With the reference to password protected documents which of the following password can not password as password are not password can be upto 15
statements are false include spaces read only case sensitive characters long B
The alignment available for tabs does not include left justified hanging top A
The special symbols that are inserted using "insert symbol" option of the word
can not be printed by the printer as they are not standard keyboard symbols true false B
The "format columns" option allows to create columnar text up 12 columns only. true false A
The document that makes the user to organize and maintain a long document, Master Child Hyperlink
such as multipart report or a book consisting of chapters Document Document Document none of the above A
The view that enables us to view how objects will be positioned on the page Print Layout
when it is printed View Page Layout Outline Layout none of the above B
The mode that is initialized or toggled to if the user is in a position to overwrite Type Over
the text in the word Insert Mode mode Remove none of the above A
Veena is entering a paragraph in a word processing program. When the cursor press the return press the tab press the escape
gets to the end of a line, what is the best way to get the cursor to the next line? key key key just keep typing D
How are data organized in a spreadsheet? layers and planes lines and spaces height and width rows and columns D
backspace/
Which key moves the cursor to the beginning of the next line of text? tab enter/return delete shift B
Veena typed the following sentence: "The girl was very beautiful." In which word
processing utility could she find a synonym for "beautiful"? grammar checker spell checker thesaurus outliner C
send a public
message to send private
Using an electronic bulletin board, Seema can do all of the following except friends interested send pictures to messages to a
which one? in one topic a friend friend send a package to a friend D
Aryan has created a ten-page story, but only wants to print the first two pages. From ___ To
What printer command should he select? Print all ____ Page setup Print preview B
What process should be used to recall a document saved previously? Enter Copy Retrieve Save C
Which is used to indent text within a document? closing tabbing spacing sorting B
Desktop publishing is a more sophisticated form of which of the following types
of software? database graphing word processing spreadsheet C
Creating and
To analyse editing Storing
What is a Word Processor used for? figures documents information None of the above B
What is a picture that is saved on a diskette and can be pasted into a document? subscript annotation clip art clipboard C
Creating and
To analyse editing Storing
What is a Word Processor used for? figures documents information Making Calculations B
Spelling,
Clear, replace grammar and Cut, copy, paste Font, Paragraph, Bullet and
What basic tools would you find in the Edit menu of a word processor and select autocorrect and clear Numbering C
to move a
section of text
from the original to leave an original section
While word processing, in which of the following situations would Tom use the to store a file on to store a file location to of text in place while
"Copy" command? the hard drive on a diskette another location pasting a copy elsewhere D
A set of
Data about a set different
What does a document contain? of similar things Mainly text graphics None of the above B
Before submitting your work you want to find any words spelt incorrectly. Which Grammar
of the following would you use? Thesaurus Spell Checker Checker Find and Replace B
What command in a word-processing program can be used to change the word
‘him’ to ‘her’, and also the word ‘he’ to ‘she’ in the given phrase? “On a cold and
still night, the only sound that could be heard was the owl that had ade its home
in the nest outs Paste Replace Select all AutoCorrect B
What edit commands would you use to insert a paragraph from one document Delete, then
into another document, while still keeping the paragraph in the first document? Copy, then paste Cut, then paste paste Insert, then paste A
A vertical line
outside the left
margin signifies
A red underline a change has
A line appears appears beneath been made at Comments are enclosed in a
through text that text that is to be that point in the text box at the right of the
Which statement is NOT true regarding revisions made in a Word document? is to be deleted. added. document. document. D
Through the Edit Through the
menu by Tools menu by Through tools
choosing Track choosing Track on the Both through the Tools
Changes Changes Reviewing menu and the Reviewing
How are suggested changes entered for review on an initial Word document? command command toolbar toolbar D
Tables in a document help you to easily arrange all of the following EXCEPT: text. graphics. forms. numbers. C
To identify a document, it is helpful to include the file name on each page as a header/footer. bibliography. find/search. macro. A
Which of the following tools will copy the formatting of selected text to other Format Painter
places? Copy button Paste button button This action is not possible. C
What is the name of the process of determining the cause of errors in a macro? Fault Finding Bug Squashing Error Injecting Debugging D
Drop caps are added to a Word document using the ___________ menu. Insert Tools Format Edit C
a section of text
where the first the guidelines
letter of each used to establish
a section of sentence is where different
white text on a lowercase and elements of the an enlarged capital letter at
black the rest are newsletter will the beginning of a
A reverse in a newsletter is: background. uppercase. go. paragraph. A
setting it in underlining the
larger type or typing it all in text of the pull
A pull quote is best emphasized by: font size. capital letters. quote. changing the color. A
A dropped cap is
A pull quote is a word that
The reverse a quotation starts with a A grid is a set of horizontal
technique means taken from lowercase letter and vertical lines that
to add dark text (pulled) from when it should determine the placement of
on a light another have a capital elements in a newsletter or
Which of the following definitions is CORRECT? background. document. letter. other document. D
Pertaining to newsletters, which of the following cannot be changed using the The width of The height of The number of The tab spacing within each
Columns command dialog box? each column each column columns column D
As related to type size, how many points are there to the inch? 6 10 12 72 D
Assume you are working on a newsletter in which the masthead extends across
the top of the entire first page. The rest of the newsletter has two columns. What
is the minimum number of sections in the newsletter? One Two Three Four B
Press
Press Ctrl+Enter Ctrl+Shift+Ent Press Enter to
Which of the following is NOT correct with respect to page, column, and section to create a page er to create a create a section Press Shift+Enter to force a
breaks? break. column break. break. line break. C
A sans serif
Which of the following would be the most appropriate font for a newsletter A serif font at 10 font at 10 A serif font at
headline? points points 20 points A sans serif font at 45 points D
It depends on the left and
right margins, and how
Which of the following is the default Word column width? 2 inches 3½ inches 4 inches many columns are specified. D
Sequence Check is a --------------- level control check. Field Record Both None of the above A
Analyse data over two or more periods is called ----------------------- analysis Horizontal Vertical A or B None of the Above A
We use Hash Total to identify ------------ within a series where there is a definite Combined
relation between items Duplicate Value Value Gaps All of the above C
Analyse fields by arranging them into rows and columns is called Cross Tabulate Filter Merge None of the above A
--------------------- function searches for a value in the leftmost column of a table
and then returns a value in the same row from a column that we specify in the
table. RAND() VLOOKUP() HLOOKUP() None of the above B
To import data from Access to Excel ,it is not possible to link between Access
and Excel sheet TRUE FALSE A
The GAP detection options can be used to test for completeness of data. TRUE FALSE A
Exception testing can be used to identify ----------------- items Unusual Strange A or B None of the above C
comparison of duplicates
Data validity test represents exception testing data testing All of the above D
Year end ledger, inventory files or transaction files can be tested for cut-off , to
ensure that the data has been provided is for the correct audit period True False A
In Range Check , the data may not be in proper sequence but should be within a
predetermined range True False A
In ---------------- Check data entry follow a particular sequence and also a
predetermined range. Limit Sequence Range Both B & C B
related to virtual a form of
Virtual memory is reality a form of ROM VRAM none of the previous D
same as involves using more than
same as multiprogramm one processor at the same
Multiprocessing is multitasking ing multiuser time D
set up a make a backup use a virus protection
To help keep sensitive computer-based information confidential, the user should save the file password copy program B
to read from or
write
to calculate information to a to print sheets of to display information or
What is the function of a disk drive? numbers floppy disk paper pictures on a screen B
A 4GL is Uses Cobol uses Java uses C++ none of the previous. D
A nanosecond is 106 sec 103 sec 1012 sec 109 sec D
What small, hand-held device is used to move the cursor to a specific location on
the screen? a keypad a mouse a frog a message pad B
Which of the following is used to indicate the location on the computer monitor? a cursor a scroll bar a light pen a magic marker A
A mathematical procedure that can be explicitly coded in a set of computer
language instructions that manipulate data. Formula Algorithm Program Data B
Which of the following translates a program written in high-level language into Artificial
machine language for execution? Assembler Compiler Intelligence Parity Checker B
Memory Parity
Detecting errors in real memory is a function of protection Checking Range checking Validation B
IT management
senior executive lacks IT understands
Each of the following is an enabler of IT-business alignment except: support for IT. leadership. the business None of the above B
The basic systems model is used to describe virtually all information systems and
it consists of the following elements: input. output. processing. All of the above D
Hashing for disk files is called external hashing static hashing dynamic hashing extensible hashing A
Components of expert systems include: a) inference engine; b) user interface; c)
knowledge base; d) fuzzy logic A: (a) , (b), (d) B: (a) to (d) C: (a), (b), (c) D: (b), (c), (d) C
corrective preventive detective
Black box testing and white box testing are part of: controls controls controls general controls C
What is the term used to describe the point of interaction between a computer and
any other entity, such as a printer or human operator? Component Interface Settings Control B
The advantages of CASE tools are: a) reusability; b) maintainability; c)
portability; d) flexibility (a), (c), (d) (b), (c), (d) (a) to (d) (a), (b), (c) C
Turn the
computer off at Select the ‘Shut
Press the reset the power Down’ option Pull the power cord from the
Which of the following is an acceptable way to shut down the computer? button. point. from a menu. back of the computer. C
Yesterday, in your music class you saved your compositions as MP3 files. Today,
you cannot remember where you saved them. Which is the best way to locate the Create the files Ask the person Use the Find or Put your hand up and ask
files? again. next to you. Search feature. the teacher C
Components of an information system model are: a) applications architecture; b)
functional architecture; c) technology architecture; d) information architecture (a), (c), (d) (a), (b), (c) (a) to (d) (b), (c), (d) C
detective organisational preventive
Benchmarks form part of: controls controls controls corrective controls C
Continuity controls include: a) record counts; b) date checks; c) label checks; d)
run-to-run totals (a), (c), (d) (a), (b), (c) (a) to (d) (b), (c), (d) C
program change
Which is not part of help desk documentation: problem logging call lights requests resolution procedures C
Testing of individual modules is known as: unit testing data testing thread testing loop testing A
Design phase of CASE tools includes: a) data architecture; b) decision
architecture; c) interface architecture; d) presentation architecture (b), (c), (d) (a), (b), (d) (a), (b), (c) (a) to (d) D
benchmark specifications parallel
Which is part of installation testing: testing matching operations system walkthroughs B
The computer operating system performs scheduling, resource allocation, and Peripheral
data retrieval functions based on a set of instructions provided by the: Multiplexer. processors. Concentrator. Job control language. D
Which of the following falls under multimedia data: a) text; b) images; c) video;
d) audio (a) to (d) (b), (c), (d) (a), (b), (c) (a), (c), (d) A
Replacement
personal
computers for Identification Physical security
Which of the following procedures should be included in the disaster recovery user of critical of warehouse Cross-training of operating
plan for an Information Technology department? departments. applications. facilities. personnel. B
architectural procedural
Designing relationships among components is part of: design interface design design data design A
Computer
Several Computers connected together is called: Client-server Client network Hub C
Which network topology uses a Hub? Star Bus Mesh Ring A
Which of the following topologies is used for Ethernet? Star Bus Ring All of the above D
To do a
To maintain a particular job To help
backup copy of such as editing, someone who is
are written all storing applying for To Store data in an
Application software are programs the information information employment organised manner B
Which type of file search method requires a computer first read all locations
preceding the desired one Direct Sequential Binary Indexed B
Data
Systems analysis communication Operating
Which of the following areas of responsibility are normally assigned to a systems and applications s hardware and systems and
programmer in a computer system environment? programming. software. compilers. Computer operations. C
Which of the following is recommended when many searches for data are A sequential file A sequential A direct access
required on a disk file on a tape file on a disk A direct access file on a tape C
Tapes can only Information
be read by the formats
machine on commonly vary
It is unlikely that a magnetic tape containing several thousand blocked records which they are Parity errors between Data record can never be
can be used on two machines of different architecture directly because written will result architectures blocked together C
Which component of the CPU has the most influence on its cost versus Address
performance Data path part Control Unit calculation part Input output channel A
Which of the following terms applies to network used to connect computers with Distributed Local Area Wide area
other computers, peripherals and workstations that are in fairly close proximity systems network network Protocol B
Use the
computer to
which they are Generally Are required with a
Can send data to connected to require a microprocessor which
a computer and perform all keyboard for permits some data
receive data processing data entry and a processing such as input
Intelligent terminals differ from dumb terminals in that they from a computer operations CRT for display validation D
A computer is to be linked to 8 terminals using a single communication link. To
permit simultaneous terminal operations, communication path will require which
of the following Mixer Modem Multiplexor Time sharing computer C
Allows computer
signals to be
send over a Aids in back-up Packs data in a
A modem is a device that telephone line procedures disk file Speeds up online printing A
A LAN includes 20 PCs, each directly connected to the central shared pool of Planetary
disk drives and printers. This type of network is called a network Ring Network Loop Network Star Network D
A computer based system for sending, forwarding, receiving and storing Office Executor Electronic
messages is called an Automation systems mailing Instant post-office C
If a workstation contains a processor, monitor, screen manipulation device, A dumb An intelligent A personal
printer, storage and communication capabilities, it is said to be workstation workstation computer A mainframe PC B
Time of day Encryption
Terminal hardware controls include control locks algorithms Parity checks All of them C
Terminal Communication Device interconnect
RS-232 is a Type of cable Standard protocol standard D
A compiler
converts the
whole of a A compiler is a
higher level general purpose
A compiler does program code language
a conversion line into machine providing very
by line as the code in one efficient
What is a compiler? program is run step execution None of the above B
Lexical analysis,
Feasibility study, Implementation CONVERSION,
system design, and and code
What are the stages in the compilation process? and testing documentation generation None of the above D
Which of the following is not a data transmission coding scheme CRC Baudot ASCII EBCDIC A
An interpreter is
a general
An interpreter An interpreter purpose
does the is a language
conversion line representation providing very
by line as the of the system efficient
What is the definition of an interpreter? program is run being designed execution None of the above A
Frequency
A device used in data communications to divide a transmission signal into several division
sub-bands is known as a Modem Demodulator multiplexor Time Division Multiplexor C
High-level Middle-level Low-level
Third generation languages such as COBOL, C, and FORTRAN are referred to as languages languages languages None of the above C
It is faster than
parallel It is less error It is less prone
Serial Communication is used over long distance because it communication prone to attenuation Uses only one path D
Accounting
systems,
Financial sector Graphic design commercial
In what areas is the COBOL programming language used? and engineering and education sector None of the above C
Relieve the main
Manage the CPU of
Communicate paging function repetitive Reduce competition
with the console in a virtual communication between the input/output
The primary function of a front-end processor is to operator environment tasks devices C
Specification System
What is the first stage in program development? and design Analysis Testing None of the above B
Which of the following is not used for data transmission within a local area
network Fiber Optics Coaxial Cable Common carrier Telephone Lines C
System
Analysis System Analysis
The design of defines the involves
the screen the format and type creating a
user will see and of data the formal model of
use to enter or program will the problem to
What is System Analysis? display data use be solved None of the above C
A device to device hardware communication link is called A cache An interface A buffer An online protocol B
Testing to
check for errors
The different before the Hardware,
types of network system is Software and
What will a good software provider consider? to be used introduced size of program. None of the above B
The topology of a network can be each of the following except Star Packet Ring Bus B
What is the 8-bit binary value of the decimal number 85? 10101010 1100101 1010101 None of the above C
Cyclic
Which is the most common data transmission error checking method Parity Retransmission Redundancy Hash Count A
What is the decimal value of the binary number 1111? 15 4 64 None of the above A
Which of the following devices merges communication signals onto a single line Port Modem Multiplexor Acoustic coupler C
What is the decimal value of the octal number 215? 327 141 97 None of the above B
Data
Data Mining management
Which tool is used to help an organization build and use business intelligence? Data warehouse tools systems All of them B
A daisy wheel is a type of...? Printer Storage device Pointing device CD-ROM A
Optical mark
What input device can be used for marking a multiple-choice test? Mouse Bar code reader reader None of the above
Laptop computers use CRT displays LCD displays SSGA displays none of the previous B
mouse button
QWERTY is used with reference to screen layout layout keyboard layout word processing software C
Optical mark
What input device could tell you the price of a bar of chocolate? Mouse Bar code reader reader None of the above B
language software
A GUI is hardware interpreter interface an operating system C
Where would you find a magnetic strip? Credit card Speakers Smart card None of the above A
having several writing
programs in programs in
RAM at the multiple
Multiprogramming refers to same time multitasking languages none of the previous A
having several The ability to writing
programs in run 2 or more programs in
RAM at the programs multiple
Multitasking refers to same time concurrently languages none of the previous B
To run more
than one
an operating program at the
Multiprogramming is a prerequisite for multitasking system same time none of the above C
Second - Third -
First - generation generation generation Fifth - generation
UNIVAC Computer belongs to the computers. computers. computers. computers. A
multiprogramm
Timesharing is the same as multitasking ing Multi-user none of the previous A
Name the first Indian Super Computer? Vishwajeet Deep Blue Param Arjun C
is caused by caused by is due to bad
Disk fragmentation wear overuse disk blocks none of the previous C
Magnetic Ink
Optical Mark Character
The technology which is used to check answer sheets of multiple-choice Bar code Reader Reader Recognition
questions in civil services or similar examinations is: - Technology Technology Technology Image Scanning Technology B
converts a
slower than an program to
A compiler is a fast interpreter interpreter machine code none of the previous C
Dot - Matrix Desk - jet
Which printer among the following is fastest Drum Printer Printer Printer Thermal Printer A
“Zipping” a file means encrypting it decrypting it compressing it transmitting it C
Vital Virtual
Very important information information
reader user resource under reader & user
What does acronym VIRUS stands for sequence siege system None of above B
Electrically An inked ribbon and print
An impact printer creates characters by using...? charged ink Thermal Paper An ink pen head D
mainframe LAN WAN
A client-server system is based on technology technology technology Unix operating system B
A nanosecond is 10-6 sec 10-3 sec 10-12 sec 10-9 sec D
A procedural control used to minimize the possibility of data or program file External file
destruction through operator error is the use of Limit checks Control figures labels Cross footing tests C
_______ software enables users to send and receive data to/from remote
computers application system operating system communication D
A _____ is a running instance of an application project model pilot project process D
Splitting of CPU's time for different tasks _______ prevents time slicing multiprocessing multithreading multiplexing multitasking D
______ computers are used in large organizations for large scale jobs which have super
large storage capacities mainframes computers micro computers none of the above A
_______ is responsible for all calculations and logical operations that have to be arithmetic and central
performed on the data control unit logic unit processing unit none of the above B
non impact
______ printer use laser light band printer drum printer printer none of the above C
data word electronic
______ software enhances the user to enter ,store, manipulate and print any text management processing spreadsheet none of the above B
integrated communication
______ software enables users to send and receive data to/from remote computers software software idea processor none of the above B
Microsoft
_______ is the temporary storage place for deleted files my computer recycle bin exchange none of the above B
_____ is a collection of related fields field file record none of the above C
assembly machine high level
_____ language consists of strings of binary numbers language language language none of the above B
______ symbol is used to represent processes like assigning a value to a variable terminator processed connector
or adding a number symbol symbol symbol input/output symbol B
hp vectra fazitsu vp200
_______ is an example for micro computer PC-at system series IBM-PC B
_________capability supports concurrent users doing different tasks multiprocessing multithreading multiplexing none of the above D
The ______ do not have processing power of their own and has only a screen,
keyboard and the necessary hardware to communicate with the host. For this "dumb dummy
reason, the terminals are referred as_______________ terminals" dumb servers terminals dummy servers A
distributed
computing
A______is nothing but a PC with a network operating system wan system windows NT LAN D
_____system is responsible for handling the screen and user I/O processing host server back end front end D
The______ handles data processing and disk access in a Client/Server
architecture host server back end front end C
Both the DBMS and the application resides on the same component in a distributed
____system PC LAN computing centralized A
When all the processing is done by the mainframe itself, the type of processing is server
sometimes called as processing host processing dumb processing data processing B
DBMS models can be grouped under____ categories four one two many A
hierarchical
file management database network
______is the most advantageous database system system system database system relational database system D
A new user initiates a new process of execution at the background,while the user
can continue his query process as usual in the foreground. This situation is
referred to as ______ multiprocessing multithreading multiplexing none of the above B
Transfer Transmission
Transfer control communication control
protocol/Internet protocol/Interne protocol/Internet
TCP/IP stands for _________ . protocol t protocol protocol None of the above. C
Data is broken into small unit called __________ . Cells Bits Packets None of the above. C
_______ is the capability of the o/s to run numerous applications simultaneously multiprocessing multithreading multiplexing multitasking D
_______ involves conversion of raw data into some meaningful information interpreter compiler converter process D
_______ is responsible for obtaining the processed data from the computer input processor ram output D
non-impact
_______ printers use light to produce the dots needed to form pages of characters impact printers drum printers desktop printers thermal printers C
control
operating program,
system, interpreter, monitor,
bootstrap, assembler, program,
Hardware components in a computer are _____,____,_____,______ kernel, shell compiler keyboard, bus CPU, memory, input, output D
_______ software are programs that are complex and can be developed or application
purchased operating system software windows 95 interpreter B
_______ is a set of special instructions used to communicate effectively with the
computer batch protocols software's procedures C
_______ converts a high level language into machine language processor compiler assembler coder B
_______ translates assembly language program into machine language
instructions compiler interpreter assembler processor C