You are on page 1of 181

q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

q_desc op1 The ------ key can be used to select an existing company from list of companies. F1 Import and Export of data between Tally and other programs is possible only through ---------- Program. Tally ODBC The re-order point is the inventory quantity that trigger a stock replishment activity. TRUE A created company's detail can be modified through keys F3 A/An ------------- is the official notice that the firm sends to its customers to advise then to the amount of money that is owe Invoice In tally,all masters have ________main options Two In tally,to create a new column in balance sheet press _______ Ctrl+C In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger accounts into one line st TRUE In tally, we can alter ledger details using either single or multiple modes but not alble to delete a ledger from multiple mod TRUE In tally,a group company is marked with an ______________ * The systems that workand Accounts payable Puchasing together to order,receive, and pay for replenishment of stock are --------------Tally allowsSingle to delete a ledger from --------- alteration mode. --------------------- is/are useful for management in the decision making. Cash Flow Statements In tally,the group company must contain at least _____________ members Two To cancel a Alt+D vourcher entry in Tally, short-cut key is ----------The accounting masters and inventory masters related to Create Information We press ------------- function key to display the age-wise analysis of Bills Receivable or Bills Payable report F4 In Tally, we Alt+P ------------, to print report . press In Tally, Types ofAudit Tally Accounts and Types of Vouchers passed during the period, can be seen in ------------- report. In the Tally Software, the ------------ directory stores all data entered by the user. Bin The Ledger True Accounts are unique in Financial Accounting Packages Customers can be permittedInterchange own data into the firms computer using the firms wide area network is an exam Enterprise Data to enter their In Tally, we TRUE can customize the Vouchers as per our requirements The number2of steps in Accounts Compilation are Each action/transaction of a firm is described by a ----------------. data element Tally is based on mercantile accounting system FALSE Ctrl + N is used to ----------Display stock valuation method ------------- in Tally classify the accounts under different heads so that summarised information is possible. Ledgers Revenue Account also known as -------------- Account Personal Method of Voucher Numbering is/are Manual Accounts Receivable are displayed in Balance Sheet To assemble a product from different items -------------- entry is used Journal A --------- purchase orders data flow is directed to the purchasing system for use in closing out the outstanding purchase o Filled Tally provides at least --------- predefined voucher formats 11 The value of the inventory is included in a ledger accounts as an asset on the balance sheet FALSE " The buyers can follow up with the suppliers to determine the reasons " is an example of ----------------management by objective From voucher entry mode , if we press __________ then we get payment voucher in tally F4 Default Cost Category in Tally is/are -------------Main Location A Group Company is simply a name and an identify given to the merged accounts member companies of the group. True A ----------- is a primary document for recording all financial transactions. Ledgers The field can have a value between ________________ in FA Package. 0 to 9 The _______ file maintains data that describes the supplier past transaction with the firm in terms of material quality in AI Supplier It is necessary to manipulate data to transform it into ---------------Report In tally, to change the date of the voucher press ______ F2 Tally can maintain budgets on ---------------Net Transactions The value of the inventory is included as an asset on the balance sheet True In ratio analysis report of Tally FA packagewe we press ________________ function key to the display of bills receivable F6 function key The accounts payable system is responsible for paying the suppliers for the ----------------Sales What is the 1-4-1995 to 31-3-1996 Tally6.3 _________________ default financial year in Tally encrypts and stores TALLY DATA at the data directory True The Profit &Horizontal Loss statement can be displayed in ---------------- format(s).

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

Default ledger accounts in& profit &______ Balance sheet tally are loss profit & loss and trial balance Default 'godown' name in tally is ____________ Primary 'Tally vault' is a _________________ Security mechanism To create a F5 sales voucher in tally , you have to press _______ A Group Company is ------------------------- given to the merged accounts of member companies of the group. a name In tally,"credit note" voucher type records entry for ________________ Sales return In tally you get currency symbol option from _______ menu Company creation ------------------ gives the balance for each day for the voucher type has been selected. Trial Balance For 'stock journal' entry we press ______________ in tally F7 Tally provides the capability to the administrator/auditor to track changes in the areas is/are Changes in transactions or vouchers In tally, types of users are _______________ 2 By pressing F9 -------- key, a list of inventory reports can be displayed straightaway from the balace sheet report Projected approximation of income or expenses is called ______________ . Balance sheet "Administrator" type user is also called 'Auditor' of a company in Tally TRUE You will get F3 company information , if you press __________ from gateway of tally A constituent(member) company can be a member of more than one group. TRUE Default stock category in tally is ______ Main location To create a Tally.imp import activity in a file _____________ is located in the same directory as an executable program i log of the In Tally,inventory valuation method option is available from _______ Stock summary Tally audit feature is available in a company __________________ By pressing F11 function key In tally, a group company can also be a constituent(member) of another group company TRUE Default number of groups in tally are ________ 128 During voucher entry ------------- are used. Ledger Accounts User designated as --------------- can view audit list. Administrator Tally supports Importing ofto another company created withon Tally Package One company data from ---------------In an accounting information system, which of the following types of computer files most likely would be a master file? Inventory subsidiary. Which of the following is an advantage of a set of internal controls. for transaction processing over a manual system? A Does not require as stringent a computer-based system

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

op2 ALT+F1 Tally IMP false ALT+F3 Bill Three Alt+C FALSE FALSE $ Puchasing and Receiving Multiple Fund Flow Statements Three Alt+X Alter Information F5 Ctrl+P Statistics Data False Enterprise Data - Information FALSE 3 data record TRUE Open Calculator Groups Nominal Automatic Profit & Loss Stock Journal Receipt 16 TRUE management by exception F5 Primary False Reports 1 to 100 Suspense Output F4 Closing Balance False Alt + f6 function key Purchases 1-4-1996 to 31-3-1997 False Vertical

Profit & loss and trial balance Main location Ledger a/c F7 an identity Purchase return Stock items units Daybook Alt + F7 Changes in Ledger Masters 3 F10 Profit & loss a/c FALSE Ctrl+F3 FALSE Primary Tally.ini Stock journal During the creation of a company FALSE 228 Groups Owner Other programs - a spreadsheet or a database file. Cash disbursements. Will produce a more accurate set of financial statements.

op3 CTRL+F1 Tally INI CTRL+F3 A or B Four Alt+Ctrl+C None of the above None of the above None of the above None of the above Five None of the above

op4

& Accounts payable and Receiving A or B Ratio Analysis Four Ctrl+T Display Information F6 Shift+P Day Book Sub Electronic Data Interchange. 4 Field Change Period Journals Real None Journal Book Physical Stock Transfer Issue 18 electronic data analysis F6 Primary Cost Category Vouchers 10 to 60 Order Information Ctrl+f2 A and B F7 function key A or B 1-4-1997 to 31-3-1998 A or B

^ Puchasing, Receiving and Accounts payable Mone of the above All of the above One Ctrl+D All of the above F7 None of the above Journal Book None of the above All of the above 5 All of the above None of the above None of the above None of the above All of the above All of the above Reversing Journal None of the above 21 All of the above Alt+f5 All of the above None of the above None All of the above None of the above Ctrl+f4 None of the above None of the above None of the above None of the above None of the above

ans A A A B C B B A A A D A D A B D C A B B A C A C B B B B B D A B A B B B B C A C A A C A C A A B B A C

Cash and profit & loss A or b Cost category F8 A and B a or b Regional setting Balance Sheet F10 Both A and B 4 F11 Budget Alt+F3 Symbol A or b Stock analysis In 'comp info -> security control' option 28 Sub-Groups Data Entry Both A and B Cash receipts. Will be more efficient at producing financial statements.

Cash and bank None of the above None of the above F9 None of the above None of the above None of the above None of the above F11 None of the above 1 F12 None

C B A D C A A B B C B A C A None of the above C A None of them B None A None of the above A None B A 16 C B or C A TallyVault A None of the above C Payroll transactions. A Eliminates the need to reconcile control accountsC and subsidiary le

Q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

Q_desc Op1 Op2 Op3 Op4 Ans The memory address be transferred to memory an instructionmemory been transferred from memory data to register is usedthestoretransferred from that has data that has been to address of a memory location C Inefficient usage of excess computer equipment can be controlled by Contingency Planning Capacity Planning System feasibility report Exception reporting C Which of the following is not the component of a CPU Card B NIC Card VSAT RAM AGP A trailer label is used on aIdentification NumberisEnd-of-fileor more fields code the file. The following is an inform Record Count magnetic tape file, totals for one and end-of-reel Control it the last record and summarises B Hard copy is a Writing on a hard board term used to describe...? Printed output Storing information on the hard disk None of above B What do the abbreviationsVoice standVisual audio board above Voice activated broadcasting VAB answer back for None of C What control would prevent the accidentalprotection ring access files Validity check Boundary protection Limited File erasure of customer information from a magnetic tape C What are the individual dots which make up a picture on the B Coloured spots Pixels Pixies None of above monitor screen called? Header label normally include all the following except the File Name Identification number Batch TotalD Reel Number A daisy wheel is a type of...? Printer Storage device Pointing device of above None A Which approach or technique is a control usually Data Dictionary microcomputers System Logs Physical Security Log Console associated B with An impact printer creates characters by using...? None of abovehead Electrically charged inkAn inked ribbon and print An ink pen C The best security control in a microcomputer environment is A copies of files Restrict physicalonly unremovable Make duplicate Use access Require user passwords media to What would you pen use Paper flatbed plotter? None of above A NOT with a Eraser C What do you need for an inkdrum A cartridge A jet printer?ribbon A cassette A A The greatest control exposure in a microcomputerPC acquisition Disposition Separation CentralisedCentralisedDistributed policies or procedures of duties function for function forA is the lack of environment PC What do you need for an inkdrum A cartridge A jet printer?ribbon None of above A A A laser printer A print head laser beamn INK RIBBON of above does NOT use? A A None C The amount ofVolume aSize may contain is capacity ofthe disks...? data that disk Storage known as above None C You can ________ protect a floppy disk. and Write of above Read Write Read None B Information onMagnetic tape usually backed-up using a...? A a hard diskPAN drive Floppy disk None of above is Magnetic tape Serial access medium A parallel access of above is a...? Random access medium None medium A Hard disks can have a storage capacity in the region of...? B 1.44MB 20 GB 700MB None of above Which storageA CD-ROMA floppy disk agneticin None of above device has the largest M capacity tape storage C Mb? Which storageA CD-ROMA floppy disk agnetic tape storage A device cannot be erased? M None of above You can ________ protect a floppy disk Read Write Read and Write Not B Where should By a sunny By magnet objects floppy diskswindow be stored?In a drawer None of above C The contents of these chips arechips CDROM computer isabove ROM chips RAM lost when the chips of switched off? None B What are responsible for storingchips DRAM data None of above RAM chips ROM permanent chips and instructions? B Which parts ofALU computer perform Logic bus calculations? the Registers arithmetic None of above A What are small high speed memory units used for storing above CPUs Registers Control unitNone of temporary results? B How many bits0of information can each bits bits 1 bit 8 memory cell in a computer chip hold? None of above B What type of computer chips are saidCACHE RAM chips ROM chips to be volatile? of above None A Magnetic tape Serial access medium A parallel access medium is a...? Random access medium selective A A access medium Software can be divided into two and securityand application software Network software areas: Systems software software ofand B Business software the games software None above Travel agents use this computer system when reserving flights Supercomputer Personal computer Mainframe computer B None of above Which computers are used in the weatherVon Neumann computers Notebook computers Jon forecasting industry? Supercomputers None of above B Vacuum tube based electronic computers are...? None of above First generation Second generation generation Hoover A Which generation of computer was developed from microchips? Second generation First generation generationof above Fourth None C Which generation of computer uses more than one microprocessor? Second generation Third generationgeneration of above Fifth None C Which generation of computer developed using integrated circuits? Second generation Third generationgeneration of above Fifth None B Which generation of computer developed using solid state components? Second generation Third generationgeneration of above Fifth None A Name three steps involved in developing Design, None of aboveand Implementation Specification, Design, and Testing and Testing Programming, an informationDesign, Analysis, System system A How do you define analysis of an information system? of abovesystem androutines outcontrol peripheralis being han Analysis translates programinvolves a high level language to machine code information devices Analysis is the loading of looking atCthat perform finding to how This code of programs a None What areas need tohardware andoutputs,SOFTWARE of aboveand software Only be considered in Maintenance, reliability, and upgradeability Inputs, software design hardware, the file None design process? B What is the function of systems software? programs of theD To collect dataexecute To maintainNone To any security above Formatting a disk results in all thefrom the disk the disk Deleted from the disk Saved to TransferredA Copied data being...? from the disk What is Direct Users operate theoperate theoperate the manualsystem at the same time Implementation? manual system None system from a given date Users Users computer of above system and computer B What is parallel running? The new system is alongside ofand A the old system The new system is introducedcontinue operating Users introduced above None the existing start operating it users system What documents are producedtechnical documentation ofabovedocumentation InstructionsLog files andthe developmentof a system? and during temporaryand technical User GuideNone files C What are UserFor technicalused for? any printer to cover howC run the network enter data, save, print, etc. Guides areTo enable User guides be connected to the system, support None of above to

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

Systems software can besystems andDatabase systems andA services Operating categorised into: and communication Network systems services of the backup services system None above Which storageMagnetic tape storage floppy disk Hard disk B device cannot be erased? CD-ROM Application software are programsparticularwritten informationapplying for employment To maintainTo backup copy of task.None of theis a do a that are all the To help someone who B above Which bus carries information between processorsontrolperipherals? Data bus Auto bus Address bus and BusA C Convert the decimal number 2989 to Hexadecimal FDDI BAD TED MAD B Which bus controls the sequencing ofAddress bus ontrol BusD Data bus Auto bus read/write operations? C What are utilities? Peripherals Operating system routines thatcompilersin supervisor mode. that are connected to a computer.Dpart of the kernel of an operating system. Data structures that execute and other useful system programs. Shells, are Numbers are stored and transmitted inside a computer in A form binary form ASCII codedecimal form form alphanumeric The original ASCII codes 8 bits were 7 bits represented 256 characters characters represented 127 A A Nibble corresponds to 8 bits 4 bits 16 bits 32 bits A A gigabyte represents More than 1000 mega bytes 1000 kilobytes bytes 1024 bytes A 230 A 32-bit processor has 32 registers32 I/O devices Mb of RAM 32 a 32-bit busD 32-bit registers or A parity bit is used to indicate uppercase letters is in a last bit in a byte used to detectthe first bit the byte B is errors he contents of ROM chipsRAMlost when the computer is switched off? these are DRAM CROM A Clock speed isbits per second measured baud in bytes Hertz D Cache memory enhances memory access time storage capacity access time memory capacity secondary secondary storage B CISC machines have fewer use more RAM than RISCclock speeds instructions instructionshave medium machines than RISC use variable size machines D Which parts ofALU computer perform Variables calculations? the Registers arithmetic Logic Bus A Every data from the primary memoryis improperly shut the above Power is switched off will be erased if down D computer is shut down Computer Data is not saved before All of An RS-232 interface is interface interface interface a parallel a serial printer a modem interface B For print quality you woulddot matrix printer printer line printer expect best results from ink-jet laser printer. D ROM is faster to access thanstores more information than memory is non-volatile RAM is used for B cache RAM A UPS increased the storagethe process a computer system event of a power cut increases capacity of speedpowerC the provides backup of the previous none in smart card is a form of has more storage capacity than aaCATM card ATM card is an access card foran security system contains microprocessor Laptop computers use CRT displays displays LCD SSGA displays of the previous none B Multiprogramming refers to programs in RAM at the sameAprevious having several multitasking writing programs of the time languages none in multiple Multitasking refers to several softwares running at the sameD concurrently having the ability to run 2 or more programs languages writing programs of the time none in multiple previous What are small high speed memory units used for storing temporary results? ALU Registers Variables Logic Bus B A good way to brochures information that changes rapidly is through exchange magazines CD-ROM e-mail D Multiprogramming is a prerequisite for tosystem none of the above at the same time multitasking operating run more than one program an C Timesharing is multitasking the same as multiprogramming multiuser none of the previous C Virtual memoryrelated to virtual reality a form of VRAM of the previous is a form of ROM none D Multiprocessing is as multitasking multiuser involves using more than one processor at the same time same same as multiprogramming D To help keep sensitive computer-based information confidential, the user should save the file up a password backup a virus B set make a use copy protection program What is the function of a disk drive? to print sheetsdisplay toB floppy diskpictures on a screen to calculateto read from or write information information or numbers to of paper a A 4GL is Uses Coboluses Java uses C++ none of the previous. D A nanosecond106 sec is 103 sec 1012 sec 109 sec D What small, hand-held device is useda frog a keypad a mouse to move the cursor to a specific location on the screen? a message B pad The memory address register isthat has memory an instructionmemory been transferred from memory. data to be transferred to been transferred from that has data used to store the address of a memory location C The memory data registertransferred storeaddressan instruction that has been transferred from memory data to be is used be transferred toof a memory location data to to to or from memory the the stackA The instruction an instruction that has been decodedthat has Dof the memory register storesinstruction that has been fetched from next instruction to be executed an an instruction address the been executed Which of the following is used to indicate thepen a magicthe A a cursor a scroll bar a light location on marker computer monitor? A mathematical procedure that can be explicitly coded in a set of computer language instructions that manipulate da Formula Algorithm Program Data B Which of the following translates a program written in high-level language into machine language for execution? Assembler Compiler Artificial Intelligence B Parity Checker Detecting errors in real protection a function checking Memory memory Checking of Validation B Parity is Range To find where a filethe directory search filethethe user find and replace use has been saved on tools turn use facility A search each disk, backup should use in A series of instructions telling the computer how to process data or files is defined as a Network Program System Modem B To ensure thatsave copiesusethe file with thesystem nameto aD failures data is not lost different filenames backupsystem system of if a computer record of computer should keep a same fails, the the on the on user medium secure Having a single CPU alternatively process tasks entered from multiple terminals is called Multiprocessing sharing Time Multiprogramming MultiplexingD The place in the CPU where the data Floppy DiskMagnetic Disk ROM RAM and programs are temporarily stored during processing is called the B All are examples of computer software except modem Firmware Word Processor Telephone Shareware C Computer manufactures are now installing software programs permanently inside the computer. It is known as Firmware Word Processor Telephone modem Shareware A

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

Which of the following file Hashed Sequential organisation forms most efficientlyC Indexed Random allows access to a record The part of theOperating System controlling data Primary Storagecalled the computer system ALU CPU manipulation is B For direct access storage Blocks and Files and Tracks dividedsubschema Tracks and devices the Sectors area is and into Sectors recording Schema A The data hierarchy from the largest toFile, smallestfield Character, field, database record, is Database, character, record the Element, field, file C Which of the following hardware or software system controls C Valid character check Systems logs Maintenance diagnostic program provides a detailed record of all activities performed by Parity check Which one of the following parts of a computer isSerial interface Sound card. D-ROM MIDI interface C necessary A enable it to play music? to An educationalText CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15 minutes of sound and Pictures Sound Video D Which one of the following printers is Ink-jet for Drum sprocket fed carbon copies? Laser Dot matrix suitable printing B Multimedia software can be most productively used order for A viewing an encyclopaedia CD-ROM. for creating thepresentingaan plans for recordingdesign. stock in a supermarket and answering customer building current to a warehouse. stock To be effectivereplacedchecker should be a virus regularlyupdated never updated regularly once a year updated C Which one of the following software applications would be the MOST appropriate for performing numerical and stati Database Document processor package Graphics Spreadsheet D Passwords enableinto theto get users make efficient use of time system quickly confidentialityfile C retain simplify of files structures 12. How many512 do 4 1024 bytes Kilobytes represent? 8192 4096 C Back up of theloss of confidentiality prevent data files will help to of data duplication virus infection of dataD loss Which one of the following is the MOST commonNetBEUI protocol? TCP/IP HTML IPX/SPX internet A The advantage of a PC network is thatshared access to the internet is quicker do 1000s ofB systemday files can beprinter can the operating pages a is easy to use The term A:\ refers to a file name a subdirectory root directory the the hard drive D UPS stands for niversal port serial uninterruptable power supply u up-line provider serviceuniform page source C The main problem associatedprogramon the system systemnetwork requires a re-boot and defrag afterwards orphan filesthe withleft the system the notthat it toadministrator to uninstall it can be uninstalling software is aallow executable may requires A always be uninstalled You are conducting research for a Income Tax assignment. The raw facts you collect are called data. documents. information.text. A A flow chart is Graphical representation of logic NoneanytheA the Rules writteLogical Steps in of language in procedural languageabove A voucher entry in Tally issales, receipt, is mandatory in of theA Purchase, To fill for log register None tally bove done the It payments etc. Passwords are applied maintenanceaccess unauthorised access assist in to files in up prevent speed order to allow encryption C Each of the following executive support for lacks leadership. except: senior is anIT management IT. None of business enabler of IT understands the theB IT-business alignment above The basic systems model output. to describe virtually all information systems and it consists of the following elemen input. is used processing.All of the above D What is a computer-aidedcomputers to designdo None of theA innovated designs and artistic patterns. The use of Using computers to state-of-the-art, high-quality products. design system? Software that generatesabove architecture. A(n) __________ offers a Application enterprisean entire industry. specialist orsolution package for local functional Service Provider B File extensions are used fileorder to filename is not lost the file type name the in ensure the identify the identify file D Information systems controls include all of the following EXCEPT:are parts of IS controls. preventive controls. controls. detective corrective controls. above All of the D Hashing for disk files ishashing hashing external called static dynamic hashing extensible hashing A Components of expert(b), (d)(a) include: a) inference(b), (c), (d) user interface; c) knowledge base; d) fuzzy logic A: (a) , systems to (d)C: (a), (b), (c) engine; C B: D: b) Black box testing and white box testing are partcontrols controls corrective controls preventive controls of: detective general C What is the term used to describe theSettings interaction between a computer and any other entity, such as a printe ComponentInterface point of Control B The advantages of(c), (d) (b), (c), (d) (a) to (d) (a), maintainability; c) portability; d) flexibility (a), CASE tools are: a) reusability; b) (b), (c) C Which of the following is reset button. Select to shuttheDown C cord from the back of the computer. Press the an acceptable way the Shutthe power Turn the computer off at down theoption from a menu. Pull power computer? point. Yesterday, in your music classagain. Use nextFind oryour hand up and askToday, you cannot remember where you Create the files the person your to Put SearchC MP3 files. the teacher Ask you saved the compositions as you. feature. Components of an(c), (d) (a), (b), (c) (a) to (d) (b), applications architecture; b) functional architecture; c) technolo (a), information system model are: a) (c), (d) C Benchmarks form part of: organisational controlscontrols controls detective controls preventive corrective C Continuity controls(c), (d) (a), (b), (c) counts; b) date checks;C label checks; d) run-to-run totals (a), include: a) record (a) to (d) (b), (c), (d) c) Which is not part of help desk lights program change requests problem loggingdocumentation: resolution procedures call C Testing of individual modules istestingthread testing testingA unit testing data known as: loop Design phase of CASE tools includes: a) data(c) (a) to (d) b) decision architecture; c) interface architecture; d) pres (b), (c), (d) (a), (b), (d) (a), (b), architecture; D Which is part of installation testing: parallel operations walkthroughs benchmark specifications matching testing system B The computer Multiplexer.Peripheral processors. Job control D allocation, and data retrieval functions based on a se operating system performs scheduling, resource Concentrator. language. Which of the following falls under multimedia data: a)(c), (d) A (a) to (d) (b), (c), (d) (a), (b), (c) (a), text; b) images; c) video; d) audio Which of the following procedures should critical applications. of operating personnel. Information Technology de Replacement personal Physical securityin the disaster recovery plan for an Identification of be included of warehouse facilities. computers Cross-training for user departments. B Designing relationships among components is part of: designA architectural design design interface procedural design data Several Computers connected together is called: Hub Client-server Client Computer network C Which networkStar topology uses a Hub? Mesh Bus Ring A Which of the following topologies is used for Ethernet? the above Star Bus Ring All of D Application software are programsparticular job suchStore datainformation employment To maintainTo backup copy of are written who is applying for a do a To help someone all the in an organised manner To as editing, storing information B Which type of file search method requires a computer first read all locations preceding the desired one Direct Sequential Binary Indexed B

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

Which of the following areas of communications systems andC software. systems programmer in a computer system Systems analysisresponsibility arehardware assigned to a Data and applications Computer operations. Operating normally and programming. compilers. Which of the following is recommended direct a tape searches disk on a tape A sequential file on a diskwhen access file on a for file are required A sequential file on many A A direct access data C It is unlikely that a magnetic tapeerrors by the machine recordCblocked records can architectures machines of diffe Tapes can only be containing several thousandcan never be blocked be used on two Parity read will result Data on commonly varywritten Information formats which they are between together Which component of the part hasUnitAmost influence on its cost versus performance Data path CPU Control the ddress calculation partchannel Input outputA Which of the following terms applies to network used to connect computers with other computers, peripherals and w Distributed systems network network Local Area Wide area Protocol B Intelligent terminalssend data to a computer andrequire adata from a microprocessor all processing operations proce Can differ from the Use dumb terminals which required with a computer andwhich permits some data Generallyinreceive keyboard for data entry to Are they are connected to perform a CRT for display that they D A computer is to be linkedModem Mixer to 8 terminals using a singlesharing computer Multiplexor Time communication link. To permit simultaneous terminal operat C A modem is a Allows computerin back-up bedata Speeds up online printing device that Aids signals to procedures disktelephone line Packs send over a file in a A A LAN includes 20 PCs, network Planetary each directlyLoop Network the central shared pool of disk drives and printers. This type of n Ring Network connected Star Network to D A computer based systemExecutor systems Office Automation for sending, forwarding, receivingC Electronic mailing post-office Instant and storing messages is called an If a workstation contains aAn intelligent workstation mainframe PC device, printer, storage and communication cap A dumb workstation A personal computer B processor, monitor, screen manipulation A Terminal hardware controls include algorithms All of them C Time of dayEncryption Parity checks control locks RS-232 is a Type of cable Terminal Standard Communication protocol Device interconnect standard D What is a compiler? A compiler does a conversion line iswholeas the program isprogram code into machine code in one st A compiler converts the a generalB A compiler by lineofof a purpose language providing very efficient execution None the higher level run above What are the stages in the compilation process? None CONVERSION, and code generation Feasibility study, system design,documentationabove Implementation and and testing D Lexical analysis, of the Which of the following is not a data transmission EBCDIC A CRC Baudot ASCII coding scheme What is the definition of an interpreter? is a representation ofabove program is run providing very efficient execution An interpreter does theAn interpreter is bygeneral the An interpreter conversionNoneaofline A the systemlanguage line the as purpose being designed A device used Modem communications to divide a transmission Multiplexor several sub-bands is known as a in data Demodulator Frequency division multiplexor into Time Division signal C Third generation languages such as COBOL, C,languages C are referred to as High-level languages Low-level and FORTRAN Middle-level languagesNone of the above Serial Communication is than parallel It is less prone to onlyitone path It is faster used less error prone Uses attenuation It is over long distance because D communication In what areas is the COBOL programmingand education theC Financial sector anddesign language used?commercial sector Graphic engineering None of Accounting systems, above The primary function of a front-endtheRelieve the Reduce a virtual environment the input/output devices Communicate with the console function in competition between Manage processor is to paging operator CPU of repetitive communication tasks main C What is the first stage in program development? None of theB Specification and design System Analysis Testing above Which of the following is not used Cable transmission within a local area network Fiber Optics Coaxial for Common carrier data Telephone Lines C What is System Analysis?System Analysis defines the involves creatingof data the program will use The design of the screen the user will see andCandto enter or display data the problem to be solved System Analysis formatuse type a formal model of None of the above A device to device hardware communication link is called protocol A cache An interface buffer A An online B What will a good software Testing of network toerrors before the system is introduced The different types to check for be used theB size of program. provider consider? Hardware, Software and None of above The topology of a networkPacket each of the following except Star can be Ring Bus B What is the 8-bit binary value of the decimal number 85? theC 10101010 1100101 1010101 None of above Which is the most common data transmission error checkingA Parity Retransmission Redundancy Cyclic Hash Count method What is the decimal value 4 the binary number 1111? of theA 15 of 64 None above Which of the following devices merges communication signals onto a single line Port Modem Multiplexor Acoustic coupler C What is the decimal value of the octal number 215? of theB 327 141 97 None above Which tool is used to help Data Mining tools Data warehouse an organization build and of them B Data management business intelligence? All use systems Cache memory enhances memory access time storage capacity access time memory capacity secondary secondary storage B What is the decimal value 255 hexadecimal number FF? B 30 of the 256 None of the above Numbers are stored and transmitted inside a computer in A form binary form ASCII codedecimal form form alphanumeric What is the hexadecimal value of the 5C4 4C5 1B7 decimal number 1476?A None of the above A byte corresponds to 4 bits 8 bits 16 bits 32 bits B What does EBCDIC Coding of numbers mean?Design of theD Basic coding Description Decimal None Binary Coded Code Bit above A Kb corresponds tobits 1000 bytes 210 bits 1024 210 bytes A What is the binary sum of 1112 and 1110 10000 01011 00101? None of theA above Information is stored and transmitted inside a computer in A form binary form ASCII codedecimal form form alphanumeric Where would you find the Keyboard Numeric Keypad of theA Mouse letters QWERTY? None above A parity bit is used to indicate uppercase letters is in a last bit in a byte used to detectthe first bit the byte B is errors How did the computer mousemoves likehas ears None of theD Because it squeaksits name? Its get when a mouse It moved above Clock speed isbits per second measured baud in bytes Hertz D What are you most likely to usepen Joystick a computer theC Touch screen Light when playing None of game? above CPU performance may beMIPS BPS measured MHz in VLSI B A digitising tablet can be used for?diagrams bar codes theB Printing letters Tracing Reading None of above In processing cheques which of the following I/O voice recognition banks traditionally used OCR MICR barcode scanning techniques B have Which of the following is aHard diskdevice useddrive of theA Touch screen pointing CD-ROM for computer above None input?

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

A UPS increased the storagethe process a computer system event of a power cut increases capacity of speedpowerC the provides backup of the previous none in What does a light pen contain? lead Light sensitive elementsabove Refillable ink encil P None of theC The capacity of a 3.5 floppy is Mb 5 Mb 100K 1.44 around 1 Gb B What general term describes the physical equipment of a computer system, such as its video screen, keyboard, and hardware software output input A Where would you find the Keyboard Numeric Keypad Mouse letters QUERTY? Printer B What are you most likely to usepen Joystick a computer game? Touch screen Light when playing Scanner C A digitising tablet can be used for?Diagrams Bar Codes B Printing letters Tracing Reading Digital Signatures Which of the following is aHard diskdevice used for computerA Touch screen pointing Keyboard CD ROM Drive input? What input device could tell you the reader amark reader B Mouse Bar code price of product Optical Keyboard Where would you find a magnetic strip? Credit card Mouse Speakers Printer A Hard copy is a Writing on a hard board term used to describe...? Printed output Storing information on theCartridge Back-up onB hard disk a What are the individual dots which make up a picture on the B Coloured spots Pixels Pixies Pickers monitor screen Called A daisy wheel is a type of...? Printer Storage device Pointing device CD-ROM A What input device can be Bar codemarking a mark reader the test? Mouse used for reader multiple-choice above Optical None of Laptop computers use CRT displays displays LCD SSGA displays of the B none previous QWERTY is used with reference to keyboard layout processing software screen layout mouse button layout word C What input device could tell you the reader amarkof chocolate? Mouse Bar code price of barNone of theB Optical reader above A GUI is hardware language interpreter interface software an operating system C Where would you find a magnetic strip? Credit card Speakers Smart card None of theA above Multiprogramming refers to programs in RAM at the same time languages having several multitasking writing programs of the A none in multiple previous Multitasking refers to several programs runRAM more programs concurrently having The ability to in 2 programssame time languages writing or at the of the B none in multiple previous Multiprogramming is a prerequisite for system none of theprogram at the same time multitasking operating run more than one C an To above UNIVAC Computer - generation computers.- generationgeneration computers. First belongs to the - generation computers. A Second Third Fifth - computers. Timesharing ismultitasking the same as multiprogramming Multi-user none of the A previous Name the first Vishwajeet Deep Blue Param Indian Super Computer? Arjun C Disk fragmentation is caused by wear by overuse bad diskof the C caused is due to none blocks previous The technology which is Reader Technology sheets of multiple-choice questions in civil services or similar examin Bar code used to check answer Ink CharacterBRecognition Technology Optical Mark Reader Technology Magnetic Image Scanning Technology A compiler is a fast interpreter thanconverts a program themachine code slower an interpreter of to C none previous Which printer amongPrinter - MatrixDesk - jet Printer Drum the following is fastest Dot Printer Thermal Printer A Zipping a file encrypting it ecrypting it ompressing it means d c transmittingC it What does acronymimportant reader user sequence under siege user system Very VIRUS stands for Vital information resource of above& Virtual information reader None B An impact printer creates characters by using...? An inked ribbon and print head Electrically charged inkAn ink pen Thermal Paper D A client-server mainframebasedtechnology technologyoperating system system is technology WAN LAN on Unix B A nanosecond10-6 sec 10-3 sec 10-12 sec 10-9 sec D is A procedural controlchecks ontrol figures possibility of data or program file destruction through operator error is the Limit used C minimizeExternal fileCross footing tests to the labels C _______ software enables users to send and receive data to/from remote computers application system operating system communication D A _____ is a running instance of an application project model pilot projectprocess D Splitting of CPU's time for multithreading _______ prevents D slicing multiprocessing different tasks multiplexing multitasking time ______ computers are used in large organizations for large scale jobs which have large storage capacities mainframessuper computers computers of the A micro none above _______ is responsible for all calculations andunit control unit arithmetic and logic logical operations that have to be performed on the data central processing unit B none of the above ______ printerbandlaser light printer on impact none of the C use printer rum d n printer above ______ software enhances the processing ,store, manipulate and print any text data management word user to enter electronic spreadsheet B none of the above ______ software enablessoftware send and receive data the B remote computers integrated users to communication software idea processor of to/from none above _______ is themy computer temporary recycle bin Microsoft exchangethe B storage place for deleted files none of above _____ is a collection of related fields record field file none of the C above _____ language consistslanguage language numbers of the B assembly of strings of high level language machine binary none above ______ symbol is used tosymbol terminator processedprocesses like assigning symbol to a variable or adding a number represent symbol connector symbol input/outputBa value _______ is an PC-at example for micro computer vp200 series B hp vectra system fazitsu IBM-PC _________capability supports concurrent users doing different tasks multiprocessing multithreading multiplexing none of the D above The ______ do not have processing power of terminals and has only a screen, keyboard and the necessary hardwa "dumb terminals" servers dumb dummy their own servers dummy A A______is nothing but a PC with a network operating system wan distributed computing system windows NT LAN D _____system is responsible for handling the screen and user I/O processing host server back end front end D

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

The______ handles data processing and disk access in a Client/Server architecture host server back end front end C Both the DBMS and the application resides on the same component in a ____system PC LAN distributed computing A centralized When all the processing is done by the mainframe itself, the B server processing host processing processing dumb data processing of processing is sometimes called as type DBMS modelsfour be grouped under____ categories can one two many A ______is the most advantageous database system file management system hierarchicalnetwork database system database system relational database system D A new user initiates a newmultithreading multiprocessing process of multiplexing the background,while the user can continue his query process as execution at none of the B above The process of data beingredo logging written to a duplicate database is called______ repairing automatically defragmentation D disk disk mirroring Modem standsCode/De-code . for __________ Modulation/Demodulation of theB Module/De-module None above Multiple changes to the same record or a field are prevented B the DBMS through______ fixes locks constraints traps by _________allows an application to multitask within itself the B multiprocessing multithreading multiplexing none of above LAN stands for __________ . area networks None of theB Linear areaLocal networks Local array of networks.above New process of executionprocess task is referred to as______ thread client-server C ISDN stands for _______.Integrated Symbolic Digital networks. network. Integrated system dynamic networks. of theC Integrated Services Digital None above. _____________ is the Worlds largestARPANET network .theB Ethernet Internet computer None of above. _______is/are visual basicpower builder * plus all of the above a popular front end tool SQL D When LAN connected together ,it is called __________of theB MAN WAN GAN None . above. TCP/IP standsTransfer control.protocol/Internet protocol theC for _________ Transfer communication protocol/Internet protocolprotocol Transmission control protocol/Internet None of above. Data is brokenCellssmall unit called __________ None of theC into Bits Packets . above. SMTP stands for __________ . transfer protocol protocolabove. System modulation Mail transmission of theC Software Simple MailNone transfer protocol The __________ protocol Transmissionprotocol to be builttheC World Wide Web . Transfer Protocol is a network protocol None of for above. Hyper text the ATM stands for __________ . Aggregate transfer mode transferNone of theB Asynchronous transfer mode Area mode above. The computer File server receive dataReceiver None of theB the network and print it is _______ which can Printer server from other computers on above. The hardware platformsoftware requirements together form the_____ and the configurationackage system p A ATM, Asynchronous transfer modeWAN__________ technology. MAN and WAN and isLAN and MAN WAN and MAN LAN a LAN B __________ isISDN designed telephone system ATM Internet Intranet A Expansion of ISDN is ________Digital Network Services theC Network Internal Services Services Design Network above. Internal Integrated None of Digital Expansion of WBT is ______________ Web basedWeb basedWeb basedWeb basedA Training TechnologyTransport Transaction _________ connects LANs. Bridges Routers Protocol Repeaters B Collection of instruction is batch a _____ procedure called command program D Combination of alphabeticalphanumeric data is called _____ Aalpha alpha numeric and beta numerous alpha number and data Computers can be classified based on ______,______and _______ space occupied, performanceusers ratio output, performance ratios cost, price, size, performance, cost no. of theirinput, allowed C _________ are used in large organizations for large scale jobs mini computers microprocessors PCs mainframesD _______ is responsible for feeding data into the computer A input output feed write _______ is themultiprocessing o/s to multiplexing applications simultaneously capability of the multithreading numerous run multitasking D _______ involves conversion of raw data into some meaningful information interpreter compiler converter process D _______ is responsible for obtaining the processed data from the computer input processor ram output D _______ printers use printersproduce non-impact thermal printers impact lightdrum printers dots needed to form pages of characters to the desktop printers C Hardware components in a computer monitor, program,memory, input, output operating system, bootstrap, interpreter, assembler, compiler control program, kernel, shell keyboard, bus are _____,____,_____,______ CPU, D _______ software are programs that are complex and can be developed or purchased operating system application software 95interpreter B windows _______ is a set of special instructions used to communicate effectively with the computer batch protocols software's proceduresC _______ converts a high level language into machine language processor compiler assembler coder B _______ translates assembly language program processor C language instructions compiler interpreter assembler into machine

Question Options Correct A B

_______ is responsible for feeding data into the computer

input output

C D Question No.

feed write

Answer

q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

q_desc op1 op2 op3 op4 ans ISDN stands for _______. Integrated system dynamic networks. networks. network. Integrated Symbolic Digital of theC Integrated Services Digital None above. The computer which can receive data from other computers on the network and print it is _______ File server Printer server Receiver None of theB above. The hardware and the software requirements together form the_____ platform configurationackage system p A ATM, Asynchronous WAN and WAN aand MAN WAN and MAN MAN and transfer mode is __________ technology. LAN LAN LAN B __________ is designed telephone system Intranet ISDN ATM Internet A Expansion of ISDN Services Digital Network Services theC Network Internal is ________ Integrated None of Digital Internal Services Design Network above. Expansion of WBT is ______________ basedWeb basedA Web basedWeb basedWeb Training TechnologyTransport Transaction _________ Bridges LANs. connects Routers Protocol Repeaters B Collection of instructionbatch procedure is called a command program D _____ Combination of alphabetic and numeric data is called _____ data alpha numeric alpha beta numerous alpha number and alpha A Computers space occupied, performanceusers ratio output, _______ can be classifiedprice, size,______,______and performance ratios cost, based onof theirinput, cost no. performance, allowed C _____________ is the Worlds largest computer network .B Ethernet Internet ARPANET None of the above. _________ mini used inmicroprocessors are computers organizations formainframesD large PCs large scale jobs _______ is input responsibleoutput for feedingfeed into the computerA data write _______ is multiprocessing the o/smultiplexing the capability of multithreading run numerous applications simultaneously to multitasking D _______ involves conversion of raw data into some meaningful information interpreter compiler converter process D _______ is input responsibleprocessor ram processed data from the computer for obtaining the output D _______ printers use light to printers the dotsthermal printers pages of characters impact printers produce drum non-impact desktop to form needed printers C Hardware components control bootstrap, interpreter, assembler, compiler operating system, program, kernel, shell keyboard, bus output in a computer are _____,____,_____,______ monitor, program,memory, input, CPU, D _______ software aresystem operating programs that are complex and can be developed or purchased application software 95interpreter B windows _______ is batch of special instructions used to communicate effectively with the computer a set protocols software's proceduresC _______ converts a high level language into machine language processor compiler assembler coder B _______is/are a popular front builder * plus all of the above visual basicpower end SQL tool D _______ translates assembly language program into machine language instructions compiler interpreter assembler processor C _______ software enables users to send and receive data to/from remote computers application system operating system communication D A _____ is a running instance of an application project model pilot projectprocess D Splitting of CPU's time multithreading multiprocessing for differentmultiplexing tasks _______ prevents time slicing multitasking D ______ computers are used in large organizations for the A scale jobs which have large storage capacities mainframessuper computers computers of large micro none above _______ is control unit arithmetic and logicandnone ofunit B responsible for all calculationsprocessing operations that have to be performed on the data central unit logical the above ______ printer use laserrum printer on impact none of the C band printer light d n printer above ______ softwaremanagement user to enter spreadsheet B data enhances the word processing electronic ,store, of the above none manipulate and print any text ______ software enables users to idea software integrated software communication processor of the to/from remote computers send and receive data B none above _______ is my computer storage place for deleted of the B the temporary recycle bin Microsoft exchange none files above When LAN MAN connected together ,it is called __________ . B WAN GAN None of the above. _____ is a collection offile field related fields record none of the C above _____ language consists of stringshigh level language the B assembly language language numbers machine of binary none of above ______ symbol is usedprocessed symbol terminator symbol to represent processes like assigning a value to a variable or adding a number connector symbol input/outputB symbol _______ is PC-at an examplehp vectra system vp200 series B for micro computer IBM-PC fazitsu _________capability supports concurrent users doing the D multiprocessing multithreading multiplexing none of different tasks above The ______ do notterminals" serverspowerterminals servers only a screen, keyboard and the necessary hardwa "dumb have processing dumb dummy of dummy and has their own A A______is nothing but distributedawindows NT wan a PC with computing system system network operating LAN D _____system is responsible for handlingend screenend user I/O processing host server back the front and D The______host handles data processing and disk front end aC server back end access in Client/Server architecture Both the DBMS and the application resides oncentralizedcomponent in a ____system PC LAN distributed computing A the same TCP/IP stands for _________ . communication protocol/Internet protocolprotocol Transfer control protocol/Internet protocol theC Transfer Transmission control protocol/Internet None of above. When all the processing is done by the mainframe itself, the type of processing is sometimes called as server processing host processing processing dumb data processing B DBMS models can be grouped under____ categories four one two many A ______is the most advantageous databasedatabase system file management system hierarchicalnetwork system database system relational database system D A new user multiprocessingprocessmultiplexing at the the B initiates a new multithreading execution of none of background,while the user can continue his query process as above The process of data being automatically written to a duplicate database is called______ repairing redo logging disk defragmentation D disk mirroring Modem stands for __________ . Module/De-module theB Code/De-code Modulation/Demodulation of None above

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

Multiple changes to thelocks record or a field traps fixes same constraints are prevented by the DBMS through______ B _________allows an application tomultiplexing multiprocessing multithreading multitask within itself B none of the above LAN standsLinear areaLocal .area networks None of theB for __________ networks Local array of networks.above New process of execution is referred to as______ task process thread client-server C Data is broken into small unit called __________ . of theC Cells Bits Packets None above. SMTP stands for __________ .transfer protocol protocolabove. System modulation Mail transmission of theC Software Simple MailNone transfer protocol The __________ protocol is a network protocol to be builtC the World Wide Web . Transfer Protocol Transmission protocol None of the for Hyper text above. ATM stands for __________ . mode transferNone of theB Aggregate transfer Asynchronous transfer mode Area mode above.

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

q_desc op1 Using generalized audit software packages can add a lot of value _______ to an audit department's products & _______ is used for CAAT as database Oracle Generalized audit software perform auditors to undertake any past records and not concurrent auditing True Generalized audit software is a file whose capabilities for verifying processing isTrue logic CAAT's are computer program and data that auditor uses as part of the audit procedures to process data if audit sig True CAAT do not contains package programs, purpose written program, utility programs or system management progra yes Embedded audit routines are sometimes built into an entity's computer system to provide data for later user by the a true SCARF involves embedding audit software modules within an application system to provide continuous monitoring true Concurrent use auditors as the member of the system true Regular cross system verification may minimize frauds true Computer security is frequently associated with confidentiality, integrity and authentication true Data reserve engineering process metadata to document system and abstract business rules and relationship true The first step for developing CAAT is_________ to determine the audit objective Using the open database connectivity feature in ACL is ______________ can bring the data directly Computer Assisted Audited Technique involves the use of computers through "Black Box Approach" True White Box Approach necessary involves expert knowledge on the part of Auditor True The transition from manual system to CIS environment bring dramatic changes including ________________ change in the method of recording Auditing with computer necessarily supports the documents driven approach CAAT involves an Auditors' appreciation of __________ hardware and software configuratio Widespread end use computing result in unlimited errors creeping into system going to accept handling, thereby inc true For computerized auditing usage of sophisticated audit software would be a necessity true Important knowledge needed to begin planning the use of CAAT is _________ the source of data available to the a The move towards paperless EDI would eliminate much of the traditional audit trail, radically changing the nature of true Computer operation controls are designed to provide ________________ the of by all concerned Systems development control, apart from others, include authorization, approval, testing, implementation and docum true A system could be _________ natural/man-made A system exhibits 'entropy' true Super computer are the largest and fastest and is very suitable for commercial application including audit work true Assembler language uses Mnemonic symbols true Operating systems are devised to optimize the machine capabilities, the functionscheduled jobs include_______________ General purpose software provides a framework for highly complex scientific operation true In batch processing, transactions are processed one after another true The use of computer assisted audit techniques is not gaining popularity not only with audit departments ________________ On-line processing refers to grouping of transaction and processing the same in true go from start to finish one Real time refers to the technique of updating files with transaction data immediately after the occurrence of the even true In OLRT the CPU should process the capability of program interruption true Time sharing system allow access to a CPU from remote terminals true DSS is defined as a system that provides tools to managers to assist them in solving structured problems true DSS has the following components _________________ databases Master files contains current records for identification and summarizing true Transaction files contain relatively permanent records take product profile, customer profile, employee profile etc true Master file configuration includes ____________ reference files ______ is a file management software package that lets users and programmers organize data into files and then p filex CAATS provide added value to the clients because _______________ to have a complete picture of a sys File volatility refers to the number of addition and deletions to the file in a given period of time true File activity is the proportion of transaction file records that are actually used andtrue accessed in a given processing ru File interrogation refers to the _____ of information from a file back-ups One -to-one relationship means a single entity to a single entity in a monogamous structure true RDBMS is structured to a series of 2 dimensional tables true SADB stands for ____________ seriously affected database Controls are present over many aspects of the computer system and its surrounding social environment true

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

In framed checking the data entry is checked against an expected picture or format true Errors are correlated_________ at the year end Field check is exclusive to a field true _________ law basically states that there is a specific probability of the first digit Benfish being 1,2,3 etc of a no. Check digit is a group of nos. added to a code for determining the accuracy of other digits in the code true Hierarchical code means _________ consecutive nos. or alphabets to en The validation checks applied to a field depend on the field's logical inter relationships with other fields in the record true The contents of a field could determine _______ sign for a ______ field valid, numeric Batch is the process of ______ together _____ that bear some type of relationship to one another grouping, transaction Hash totals means meaningless totals true With OLRT where interactive data entry is available, the master file associated with a transaction may be searched true Controls are required for authorization to ensure data integrity and detect possible breaches in security true Data from client application are not stored in the organization's database through auditables events and function true All input records in a batch are normally of different types true IDEA stands for _________________________________ incremental design and enlarge act A transaction file is sorted prior to the update of master file true A sequence check on the transaction or master files by an update program is not required true Whenever monetary transactions are processed against master files, the updatetrue program should maintain a correla Internal tables are stored tables from which certain values are extracted for further processing and storing true For small to medium sized systems, individual modules are coded and individually tested and then assembled to be e-brain In systems testing, test involves_________________ bottom up tests Recording transactions in a controlled manner may amount to loss of stored data yes Audit software is used by the auditor to _________ read data on client's file Core image comparison is a software used by the auditor to compare _______ version of a program with a secure _ executables, master Database analyzer is a software which provides detailed information concerning true operation of the database the SAS stands for ______________ system analysis software Embedded code is a software used by the auditor to examine backup data true Embedded code performs wide variety of audit task yes Core image comparison is particularly useful where only executable versions are distributed true Log analysis is a software used by auditor to detect virus true On line testing techniques the auditor ______ data either _______ or fictitious inmanipulates, that a specific program order to see real Mapping software is used by the auditor to list unused program instructions true Mapping software has very objectives yes Modeling is a variety of software which ________________ can be very powerful analytical tool On line testing can be targeted for specific functions carried out by programs yes Program code analysis involves _____________ provides detailed information of ma __________ is a software of CAAT IDEA Snapshot is software which takes a picture of a file or data or a transaction passing though the system true Base case system evaluation includes____________ fictitious data applied against the cl While base testing forces on finding if there are any defective execution policies true program in a Black box testing seeks to determine whether application output is what it is supposed to be true In integrated test facility approach the auditor should ensure that the impact of test transaction is subsequently elimi true Black box testing is _______ based and white box testing is _______ based specification, program Source code review means__________ identifying erroneous code In formula in flow hypothesis the auditor should expand the extent of substantive tests to determine how the defect true All material application oriented events that occur within the boundary subsystem should be recorded in the accoun true In examination of audit trail the following data associated with an event may be ___________- time start and finish JCL means_________________ job control language Audit should be periodically analyzed to detect any control weakness of the system yes In an accounting audit trail, intrusion detection system might monitor the amounttrue of processor time consumed by the A sample size calculator program assists auditors in determining RAND() function true Generalized audit software consists ___________ package computer p[program for p

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

Specializes audit program may be___________ prepared by the auditor Generalised audit software could be used by the following in consistencies or significant fluctuations true Generalized audit software function include____________ file access/organizations In the file reorganization merging capabilities are needed in data from separate file is to be combined on a separate true Auditors cannot use generalised audit software to extract the data needed for audit purpose true Auditors can combine functional capabilities of generalized audit software to accomplish the task of _____________ examining the quality of system pro Which of the following is not the feature of GAPs Wide access to various data base Which is the example of CAATs ACL In audit procedures, test data is A sample of transactions Which of the following is not the use of CAATs Tests of details of transactions Which of the following are called explicitly by another procedure? Macros

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

op2 op3 op4 ans to add customers aboveone of these all the n A ACL JCL none the above A False A False B False A no B false A false A false A false A false A false A review and to obtain the typeslayoutfrom file evaluate a record of data extract dataA can bring the dataaboveone of the A all the indirectly n above False B False A use of accounting codes thetrails D absence of all audit above risk driven approach none of the B unique approach above processing checks andall thestructure options, file controls D data above false A false A source of datathe aboveone of these all for material planing A n false A providing access to computer to allD use of any programs above none of the organization personnel false A open/closed conceptual/physical D all of them false A false A false A manage hardware & softwareabove enable multiple user resource sharing all the resources D false B false B with production departments of these all the aboveone n A false A false A false A false A false B planning languagebaseall the above model D false B false B table files report files none of the D above file-o-man file manager filepet C decentralized picture ofna system A all the aboveone of the above false A false B retrieval deletion addition B false A false A subject area database safety and database software and database B false A

false B immediately quarterlynone of the B on basis above false A Benford Benjamin none of the B above false B blocks of nos. to theplacement of component entity random primary of the D of the the none attribute above false A invalid, alphabetic the all the above none of above A regrouping,none of the all the above events above A false A false A false A false B false B interactive data extraction and analysis analysis interactive data innumerable none of the B above false A false A false B false A bouncing ball big-bang stub C top-down tests hybrid testsall the above D no B provide information to the the above re-perform procedures D all audit carried out by the clients programs deleted, hard none of these the above all A false A system advanced aboveone of the A all the software n above false B no A false A false B create, false none of these the above all A false A no A can enable can auditor to execute provisions on information with trend bases patterns the provideall ofauditors with useful a number of different s and the the above D no A identifies program code which mayC there program with advice to following the logic of a program examination of source code of a for fraudulent reason none of the above be ACL ALC ACLL B false A comparisonanalyzing the picture ofA file or data of source versionabove all the of a programmed a false A false A false A file, hardware none of the all the above above A identifying ineffective code above code identifying non-standard all the D false A false A authentication of information support resource requested all the above D job connectivity language of the A all the aboveone n above no A false A false B mathematical concept of transactions master list administered questionnaire A

prepared by the entity all the above prepared by an outsideD programmer engaged by the auditor false A statistical/arithmetic operationabove analysis stratification and frequency all the D false B false B carrying analytical review the abovedata examining the quality of all D Can extractCan aid in simple selectionaudit objectives and analyse data Can define D the IDEA High End CAATsthe above All of D A utility software programme of theA program A special purpose written None above Analytical review proceduresthe general EDP controls Compliance tests of above All of D Action Procedures Event Procedures Procedures General D

q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

q_desc op1 op2 op3 op4 ans Sequence Check is a --------------- level controlNone of theA Field Record Both check. above Analyse data over two or more periods B called ----------------------- analysis Horizontal Vertical A or is None of theA Above We use Hash Total toValue ------------ withinAll series above there is a definite relation between items Duplicate identify Combined Value Gaps a of the where C Analyse fields by arranging them into rows and columns is above Cross Tabulate Filter Merge None of theAcalled --------------------- function searchesHLOOKUP() the of theB column of a table and then returns a value in the same RAND() VLOOKUP()for a value None leftmost in above To import data from Access to Excel ,it is not possible to A between Access and Excel sheet TRUE FALSE link The GAP detection options can be used to test for completeness of data. TRUE FALSE A Exception testing can be used to identify ----------------- theC Unusual Strange A or B None of items above Data validity test represents exception testing comparisonduplicates testingthe above of data All of D Year end ledger, inventory files or transaction files can beA True False tested for cut-off , to ensure that the data has been provid In Range Check , the data may not be in proper sequence but should be within a predetermined range True False A In ---------------- Check data entry follow a particular sequence and also a predetermined range. Limit Sequence Range Both B & C B 'Set mapping' Check control that follows a text-type of theB Excel Access Both None validation, we use ----------------- application for data analysis. above Excel can import data from other databases for the data analysis. True False A A System Auditor can uses CAAT tools to analyze data B False True In the case Valid Signs TransactionLimit CheckReasonablenesscombination with other fields are reasonable as per s of the ---------- control, ittype is ensured that the data in D ---------------HLOOKUP VLOOKUPa value in the leftmost column of a table and then returns a value in the same row function searches for A or B None of theB above Most of the DDE use inOLE Analysis depends on the above tools Data ODBC All of C

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

q_desc op1 op2 op3 op4 ans In MS-Access, while using form design view, for creating aabove Record Navigation Operations Record Form Operations of theB command button for adding a new record, we should sel None _______ form displays tabular form columnar form in a single horizontal to many form fields hierarchicalone row B form The process of arranging the data sorting filtering ordering in a meaningful order is known as ___________ querying C ______ arefilter to select only some particular records from the table or any other database objects used sorts pipes gateways A In MS-Access, userform specify criteriaby menu in form view using _________ filter by may by selection for filter filter filter None of theA above ___wildcard character represents any single character D * $ @ ? Records cannot be sorted by a primary key true false B A control without acontrol bound data source is known as ___________ unbound control less controlcontrolB data data Set of related option buttons, check ontrols and togglegroup is known as _____________ button groupption group boxes group o c record buttons B The collection of related data and objects is called aof the A database form collection none ____________ above Which of the following is control types ____________ above bound unbound controlled all of the C In MS-Access, the function that gives the current date is _____________ CURRDATE() TODAY() DATE() DAY() C _____is a control that lists box of data text box list set combo box static text B ______is a pivot table columnar form amountmain form A form that summarize large tabular form of data ______allows to sheet filter by by typingby form inof the C sheet data createfilter a filter input filter the value a data none above Wizards forbutton wizard toolbox controls are called a __________ control wizard option control wizard C tool wizard The wild card representation for any 5 letter word that starts with ram is ________________ ram* ram?? two of the above of the B none above Look up fields slow up data entry true false B ____is an access object that displays un-editable data A report form table ledger _____option from the new object toolbar givesnoneeasiestA autoreport report module the of the above generating a report way of ______ represents data in a pictorial format report chart label bitmap A Changes oftrue table can be carried over to another related table one false A Hyperlinks are used to false to any kind of information or data from a file true jump A The memo 60,000 have text upto_____ characters in length field can 255 25,000 64,000 D In MS-Access, columnar layout can be used to view multiple records in a form true false B In MS-Access, alter command may be used in adding a primary key to a table true false A Update query is used to add records from one or more tables to the end of an existing table true false B In ms-access, datasheet view is available in ___________ table query form all of the above D ______are used to jump to any kind of information from aD table form report hyperlink datasheet or a form Home pagetrue always false will be present as a first page of an application A Make table true queries create a new table from the records of another table false A In ms-access, to protect a database file from illegal of the C we may set database password. The option of setting d Insert Records Tools none access, above Foreign keytrue field that uniquely identifies each record and accept no null values is a false B Data definition queries false true are used to create or change database objects A The attributes of a composite key keys alternate keys composite are known keys candidate as ________ primary keyC OLE object true data type in access is a false A Data displayed in forms cannot be edited true false B A sub form true is used to display one to many relationship between tables false A We can switch from datasheet view to form view by selecting view -> form view option true false A In MS-Access long integer is a datatype true false B In MS-Access, while designing a table for a particular field, the Required parameter is set to yes. This validates the null not null zero none of the B above Sorting is applied to select only some particular records B true false Filter by form can be created from a forms shortcut menu B true false Advanced filter uses a filter similar to the query design window to create a filter true false A ? Wildcard character represents any number of characters true false B _________ piethe following is/are a type1of chart of bar both and 2 one of the C n above A bound control is tied to a underlying query or table true false A A calculated control uses expression as a source of data A true false Text boxes true cannot be bound controls false B The default updateinvoked by query query query select ms-access is append query delete query B A control can be bind to a record using row source property true false B

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

List box is a control that offers a list of choices true false A If a table is inner join itself it is called a ________________ joined to outer join self join table join C A picture box combines the activities of both a text box or B list box true false a Line is a tool box control true false A Text boxes true be partfalse option group can of a B _____ chartfreestandingseparate object alonesub chart D exists as aembedded stand Filtering data is a way of arranging data in a meaning full order true false B Wild card characters are used for sorting records true false B Pivot tablestrue used to navigate to the other tables in a database are false B Reports aretrue to represent un-editable data used false A In MS -Access,first field of lasta table are sorted based onC the the recordsthe table of the tablefield of the above the in field primary keynone _________ Relationship is an association between _________ forms reports attributes entities D Summary options dialog box is used to summarize data A true false ______ queries can beinsert to delete a groupadd delete used append of records A meet some specific records that Charts can true convert numerical data in a easily understandable format false A Embedded true existfalse charts separately B The chart which cannotembeddedastand alonesub chart B freestandingexists as separate entity are _______________ From ms - access, if we want to view the records in formsDa table in ms - excel worksheet, we need to use hyperlink import use datasheet stored in use use export Page header is presentfalse beginning of each record B true at the Detail section has a header and footer true false B A macro is performed only when the user initiates an event true false B The macro true is selected from the action field of a macro sheet false A A macro can be made to execute before the starting of a database true false A _________ integer isnumber used for fields assignedD primary keys in a table data type generally primary number number auto as MS access true objects canfalse be published in the web A In code-builder, got_focuse, click,dbl_click,enter areof the B actions events proceduresnone examples of _______ above _______can be used to automate certain actions in response to events report form chart macros D In the macro sheet the expression comments action macro macro is selected in the _____field elements D To build complex expressions_____is used expression C calculator code builder xpression builder e elements The three list boxes present at the expression none of the C box action list macro list bottom of the expression builder are called_____ elements list above ________option is selected from the view menu to create A conditions action insert none of the above with conditions macros _______report can be created withauto reportuser input C tabular columnar minimum embedded _______layout of a form displays one record at a time tabular columnar datasheet justified B The table or queryreport on which embedded report create name report we are going to reportour report is selected from the ____ dialogue box link new build D ______and_____are the two typesdynamicreports available columnar and tabular unstable and static the A stable and of auto none of above There are no wizards for creating a database in access B true false ______option fromfieldsinsert menu option is chosenchart C an embedded chart create the add chart chart insert to add In ms-access, whilekeyalternate references constraint is used for creating _______ primary using SQL, key foreign key none of the C above _______is used to create a mailing label label wizardchart wizard mail wizardnone of the A above ______header isheader roup header start present at the beginning of the report D g page header report header ______is present at the age footergrouppage inone of the B report footer bottom of each footer a report above p n In SQL, havingorderingis used for _________ none of the C with group by clause for clause for updating records records for specifying conditions above ______fieldcondition togroup is added the macro macrowhennone of thegrouping option from the view menu sheet names select C we above ______can VB used to reportstoolbars be Modules create forms macros D _______query is used to add records from one or more tables into an existing table add append insert delete B _______window is used to write VB code in access of the C report macro sheet module none application above Values for other tables,false true queries are maintained in look up A fields data type Visual Basic language is a _____ tool RAD RAP RAID none of the A above ______ function is used to display message none of the B SysCmd MsgBox a message box above Other ms-office applications can be accessed none of the A OLE DDE CME from ms-access using a concept called ________ above OLE standsobject linking and embedding editing of the A for_____ on line execution on line none above The application that supplies data in OLE is called an _________ OLE object OLE client OLE serverOLE communicator C

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

If any change made onembedded from the client side is reflected on the server then the object is said to be _____ linked the object connected edited A _______is the file format that works on internet exe DLL BMP html D ______ is used to convert any ms-access object into htmlD wizard form wizardreport wizard query wizardublish to web p format _______ option in publish to web wizard produces aof the B static file static html dynamic filenone page above static in nature that is _______query is used to create or insert database objects in a current database append add change data definition D Currency fields express the amount in _________ dollars rupees pesos yen A _______is selected from the toolbar to add anlist box unbound object object bound command button objectB OLE To display an OLE as iconin the form of an icon ____ icon A is selected from insert object dialogue box display object display link create option _______option from the file menu is selected to run of the C to the web wizard' create html new save as html none 'publish above _____page startup in an web application is used to navigate to the rest of the pages in the application home end none of the B above ______ is fired when an event is triggered is the concept based on a Visual Basic language bullet command procedure none of the C above Ms access is a ___________ DBMS RDBMS front end language A A collectiondata group data collection objects is known asC _________ of data stored in different database data storagea A blank database can be created using database dialog box box new dialog box blank database dialog box dialog new new __________ database A Text type data can be of _____ characters in ACCESS A 255 64000 235 63500 ______is a automaticthat assigns values automatically field datatype number AutoNumber number automatic B Tables cannot be imported from other databases true false B If two tables having same values for the fields none of theitabove an ______ inner join outer join explicit join are joined Ais called Duplication primary keynot null won't be allowed if the fields are declared a________ of records in a field candidate key duplicate key no A Changes from a master table can be reflectedchange allchild table by selecting _____option cascade delete related cascade update related fields records cascade change relatedon to the related records records C To see more than one record at a time in and b one of the B columnar tabular both a a form we use _______ n above In SQL, delete command is used to remove recordsof the C table or tables query or queries or _________ above record none In MS-Access, filter excluding selection will display only those record(s) which meet the criteria. true false B Properties of the fields fieldmanaged by _____properties B property field property are Dynaset field properties in Dynaset ______queries allows us to view data in row by column manner crosstab queries row/columnselect queries queries update queries A The type of action queries updatequeries record(s) in A table(s) are called __________ queries that can row/columnchange/delete queries a or delete update queries Joining tables without any matching values in the fields is D inner join self join no match join outer join called ____________ Primary key uniquely identifies each record true false A Which of the following dialog box is/are wizardboth 1 and 3 of form ________ new form dialog box form used indialog form create dialog box the creation D _______ query wizardssum used to generate summary calculations for a table summary are append simple D Properties of a formproperties change can be changed byproperties______from view menu options properties form selecting properties new B Forms that included form other forms are called ______________ are included ub form new form child form B s in In MS-Access. While appending records, the source and the target table must have similar structure and fields true false A We can add our own functions to the expression elements list box of the expression builder true false A _______is the wildcard# & character which represents the presence of any number of characters ? * D Macros cantrue used tofalse a menu to a database object A be add _____ header is a unique feature of reports topic page detail group C Chart can either be a form or a report true false A Group header will be present at the design view of a report even if the report is not grouped true false B We can change from the design view to the form view without being prompted for saving the changes made true false A Charts can true be produced without the wizard false B Macros cantrue used tofalse user defined error messages be create A Between and Not Between is ______ type of operators C relational list range logical The default true type of VB is integer data false B Visual Basic is based on __________ language ofbased language action language structured query - procedural the C event none above _______is the name offormdatabase object that displays data and can be used to edit data report the query table B In access OLE objects false be linked true cannot B _____ section is present for each record in the report group record session detail D A ________ sheet lists property both athat pertain to the form or the controls data all the properties and b one of the B n above Textboxes can also be false true an example of unbound control A In MS-Access, we mayfalse command buttons for navigating records true design A _______are forms that childincluded in other forms of the A sub forms are forms inner form none above

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

_______ are used to represent ourlabels in graphical format graphs chart data report B A field with number a _______ uniquelykeyindex eachidentifier B primary identifies record Large amount of data can be summarized using ______ tables pivot create form none of the A above _______ are employedqueries only some particular records from a database object filters to select sorts forms A ______ control need not have a data source none of the C form bound unbound above ______ controlbox list combines the functionality of both a text box and a drop down list combo box button option button B MS access true DBMS false is a A A form can form namea record source using _____ property of the form be bind to control record source of the C none above ______ forms displays chartin single row tabular formfield form data sheet form of the A none above ______ forms are usually usedformtables with none of the A relationship sub forms tabular for columnar form to many one above _______ control uses an expression as a source of of the A calculated bound unbound none control above _______ control is tied unbound bound calculated to field static C _______is the form that canform tabular form sub form auto be created with minimum input from the user columnar form B ______option from the connect is selected for setting relationships between tables set relation tool menu relationships one of the C n above ______,______and_____are the buttonsbuttonsand to theD togglegroup and check boxes option, toggle and command check combo boxes command button, belonging list boxes list, check and option button, options button _________allows us tofilter by a filter from record short cut menu filter by formcreate report by a field by input filter filter D ________isform a database object which displays data but cannot be used to edit data report macro table B What term applies to a file clipboard collection of related records in a database? field layout B All of the following terms are related to computerized grabD search sort field namesrecord databases except which one? What is a database?analyse and manipulate numerical maintaining a log about a set of similar things A way to A tool to produce high quality documents An organised way of storing information A way of information C What does Information It contains all document which contains text a record contain? certain the data about one specific item about A programs collectionB files A of An RDBMSremote DBMS is a relative DBMS Relational DBMS DBMS Reliable C Data Warehousingdatabackingat a is related touses tape as opposed to disk storing refers to offline up data regularly separate site data mining C Unauthorised alterationComputer sequence checks Key verificationon-line records can Database accessemploying of Computer matching D by controls be prevented What is a database?analyse and manipulate numerical storing information about a set of similar things A way to A tool to produce high qualitydocuments An organised wayof theC None of information above What does Information It contains all document which contains text a record contain? certain the data about one specific item about A programs None of theB above What is a report? allow users provide awhichflexible as hardcreating and editing documents Reports Reports to A tool very None ofway above (printed output) in documents extract information textA copy allows the and graphics to be placed of What is theExtractingtoSpreadsheetsdataqueries easy to analyse best way and analysing changedata analyse and make data of theC Using None above What are some popular office orientated processors,of theC Compilers, Network software,software systems above interpreters, editors Word backup applications? None spreadsheets, databases, DTP Which of the following and NOT NULL be used to enforcecolumns DEFAULT constraints KEY constraints and UNIQUE constraints rows in a table? FOREIGN can constraints PRIMARY KEY IDENTITY C uniqueness of the Which of the followingTABLE TABLE to change theTABLE of table? CHANGE commands ALTER TABLE MODIFY is used UPDATE structure C An RDBMSremote DBMS is a relative DBMS Relational DBMS DBMS Reliable C Data Warehousing refers to storing databackingat a is related touses tape as opposed to disk offline up data regularly separate site data mining C You are creating a client application that calls ActiveX DLLs. Which of the following properties of the Err object prov Number Description ComponentSource D This database holds personal information. The original paperwithkeep it confidential by using a password a backup copysavingcan help copy keeping keeping the user the file to different filenames A If the database product the primary mail and addresses, personalised letters can be created automatically using the holds customer names mergee-mail code key C Application A databaseGraphics browser software suited to storing the survey information obtained in the table would be e-mail A The characters * and ?operators wildcards in search criteria as bookmarks are sometimes used engines C Which of the following field types will generateAutoprimary key automatically? Auto Primary Auto ID AutoNumber the Key C Referential records in arelated tablesconsistent with are are consistent with the underlying tables or queries. integrity ensures thatare in ain a database consistent with one another. dynaset the: forms database the underlying tables.the underlying tables or queries. reports are B consistent with Tables are related to one another and a subform. foreign key.main form through a: its associated dynaset. query and report and its related query. A A foreign key is: the primary the primary a field fromrelated table. table. either related table. key of both key of the not unrelated key of related tables. a primary an B You are creating a banking database to track customer loans. The bank will, of course, have many customers, each One-to-oneOne-to-many Many-to-many Many-to-one B In a one-to-many relationship between Companies and Employees, which field is found in both tables? EmployeeID CompanyIDEmployeeLastName A CompanyAddress Which of the following menu, Relationship window one-to-many relationshipwith one another? For example, it ensur The Tools ensures that recordslinerelated tables are consistent Referential The join in The integrity B How would Double click the Relationship line tablesthe the Relationships window? shortcut menu you delete a relationship between Clickline, Delete Relationships button on the toolbar Right-click the Relationship in then select Delete from the Select Undo in the Relationships pull-down menu B In a Customers tables,are several a plus data associated CustomerID table mean? on the plus sign That there That some customers are recordswith that ID fieldby clicking what does of thethere next to the C can be added That sign is notrecords a related That viewable in What is required must both be numbers cannot be AutoNumber data types type They of the They cannot be text fields must be the same data fields that join two tables? They They D Assume a one-to-many relationship betweendeleted from D table and the Loans table, with referentialrelated loans Nothing, Accesscustomers customers ID ismessagefrom the Customers table, and all the integrity in ef The ignores the attempted command.Customers table. The ID is the Customers An error deleted is displayed. the Which of the following is is not visible. displayedis displayedisitsForm view. the form and can be moved or sized like The subform true whenThe subform insubform inan object on subform in the Form Design view? The subformviewing a main form and view. is The Datasheet associated D Which of the following relationships does not belong in and playersand coaches and playerssports league such as f A one-to-many relationshiprelationshiprelationship between coaches A one-to-many between many-to-many relationship between teams and teams A one-to-many between teams based on a professional A teams a database C Which symbol is used at the end of the join line in a related table to signify the many side of a one-to-many relation # M * C

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

You have created table The Customers Loans withwhen there integrity between a Customers table and a Loans table Either a one-to-many relationshiponly referential are Loan records associated with that customer at any timeThe table table at anyC Neither table time The correctprompt, titleprompt, icon,for bar text, prompt, icon. is:prompt. order of the bar text, icon. the MsgBox statement arguments title bar text. bar text, icon, title title B The first statement in aSub CreateList. Dim CreateList. procedure CreateList. Sub. is: B named CreateList Which of the following is enables the drop-downfields? to choose ofto choose from one text. entries. A check box TRUE related to formAto choose C list one fromthe userseveral existing A text field enablesuserform enables theenables one of to enter of several existing entries. A form the list user from user several existing entries. drop-down A text field: must be setmust be word. multiple words. setC two words. for one setdoes not have to be set.for for must be The purpose of a database istrack create tables of rowsdata on different things in different tables. help peoplestore data in tables. maintain and columns. keep to: of things. A A databasedata. stores: relationships. metadata. all of the above D A databasefacts. records: figures. information.a and b D A sales contact manager used byapplication a database A single-user multiuser database application example of _______________ database a salespersonor b e-commerce is an application A Customer Resource Management (CRM) system is an example of_________ single-user multiuser database application above database application None of e-commerce database B application The industry standard supported by all major DBMSs thatC Sequential Query Language (SQL)Relational Question Language (RQL) together is called __________. Structured Question Language (SQL) (SQL) to be joined Structured Query Language tables allows A program whose job Modeling System Business Model System Database is to create,Management System Model Manager Database process and administerB Data Relational databases is called the _____ Microsoft Access may use which of the following DBMS engines? Jet SQL ServerOracle a and b D Which of the following are basic components of an enterprise-class database system? The user The database application management system (DBMS) The database of the above. All D In an enterprise-class database systeminteract(s)of. aboveA the database application(s) ________with thedata the DBMS accessesabove None of the database DBMS All In an enterprise-class database system, the database application ___ . creates queries creates form creates reports c b and D In an enterprise-class database system, reports management system (DBMS) the user the database application are created by ____________________ . the database database the B A databaseall considered "self-describing" because the above. own structure is the users' reduces data duplicationof _______ its it data is in one place a description of . it contains All C In an enterprise-class database system, indexes of the_________ . holds user data metadata the database above. holds holds All D A databasetables may contain _________________________ .D metadata stored procedures above. All of the A databasefrom existing data systems developmentexisting databasea database being designed _____________ designed using spreadsheets from the Sales department is as a new as a redesignandan project a of b A A databasefrom existingimplementas a redesignandan existing database designed to non-database data a of b reporting application needed by the Sales department is a da as a new systems development project requirements for a B A databasefrom existingcombinesystems developmentby the Sales department is a database being designed _____ designed to data as a new two a redesignandan existing database as databases of b project a used C Database professionals use ________________ as specific data sources for studies and analyses. data marts normalization models data entity-relationship data modeling A Database professionals use a set of principlesentity-relationship data modeling data marts normalization modelscalled ________________ to guide and assess database design. data B A very popular development technique used by database D data marts normalization models data entity-relationship data modeling professionals for database design is known as _________ A very popular development technique used by database D data marts normalization entity-relationship data professionals to adopt a database design to new or chang data migration modeling The predecessor(s) of database processing was (were) data model . file managers hierarchicalnetwork models models relational __________ A In a relationentities in a the order ofthe order of.more thanisC column can use the same name __________________________ the important column vary as columns is rows one the to kind unimportant An attributetable known as a(n) row is also relation field . D A combination of one or more columns used to identify particular rows in a is___ . record field key tuple C A combination of two or more columns used to identify particular rows in a relation is________ . record field composite key foreign key C A determinant that determines all the other columns in a key record field foreign key candidate relation is______ . D When designing a database, one of the candidate keys inB relation is selected as the _________ . composite key primary keyforeign key surrogate key a Normalization is a process used toDeletion anomalyaboveD Insertion anomaly anomaly with which of the following modification anomalies? Update deal All of When you are given a set of tablescreate one orand the data into the new database assess the existingthe database structure new tables to store their data, the first step is to ____ . design tables' structure more a A and askedmove content to create database Modern microcomputerwere essentially killed response time are supplied personal DBMS poor off by MS Access products by severalhave products______. B well-established manufacturers are not true DBMS Which of the following are true about data mining data theA than report delivery for reporting systems. They use sophisticatedNonintegrated techniques. Their report mathematical applications? delivery is more difficult None of above We have obtained access to the company's operationalformat"We examine 50 records for customers with phone nu dirty data inconsistentnonintegrated"wrong data. problem data a data B We have obtained access to the company's operationalformat"We have been asked to produce a report with an item dirty data inconsistentnonintegrated"wrong data. problem data a data D A data warehouse databasewarehouse warehousetables. C often because: data warehouse data are not an operational database denormalized. data differs from stored in do not have metadata. data databases data are b and c Which of the following objects is used to display a menu? A Form Table Report Query Which of the following objects are NOT found Spreadsheetsapplication? Forms and Queries and tables reports Macros in an Access D You are developing an It will beapplicationupgrade itputthe B how the objects are inWhich of stored, thethestatement It will be easier for the userfor the user toifupgrade it if the objects and in one database. and user will hav Access easier advisable to expectobjects and periodically.tables database It is to thatRegardless of object and table are a separatethe following tables in you each upgrade tables into one are database. to Which of the following statements regarding Accessto associate theNOT the tables, multiplethat itwithin the same dat The Link Tables command canconsistapplication can be created in with must reside the linked to yet an An application objects in anof applications is tables in one database objects, objects in as fo All may be An application, including true? such a way with objects such anoth used multiple databases, each C Which of the following brings a copy of the table into the current database and does not maintain a tie to the origina Import Link Merge Join A What makes contains more than one table a user interface, or switchboard It a database contains tables, reports, queries,C It an application? It contains It contains macros and forms What is theMenu Wizard Access tool that Menu Interface Design Wizard Manager Build is used to create the user interface? Switchboard D The purpose of a data warehouse put key business of data collection. hands or more decision makers. create backups for mission critical store all corporateinto the centralize the to: is manageability information transaction data in one single location. corporate data. C

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

q_desc op1 op2 op3 op4 ans ___________ means the result of applying to specific information certain specific technical processes. Digital SignDigital Certificate Signature of theC Digital None above __________ is an algorithm which Digital Certificaterepresentation or "fingerprint" in the form of a "hash result". Hash Function Digital Signature creates a digital KeyA Private __________ is of Function length which Result ither B orsmaller than the message but nevertheless substantially un Hash standard ValueHash is usually much C Hash E D Digital Signature involves two Signature A TheyB ___________ and __________. Digital Signature creation Digital processes. and Either A or B Both Verification are C The Costs of Digital Signature consistsSubscribertheof theA Institutional Subscriber and mainlyNone following Cost Overhead Relying Party Cost Institutional Overhead Party of Relying above CA stands for ________________Certificate Authority theA Certification Authority Certified Authority None of above A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private Key True False A A Digital Certificate does contain Owner's Public Key, Owner's name, Expiration date of the Private Key, Serial num True False B ______________ enable web servers to operate inCertificatemode. Server Certificate Developer CertificateDigital a secure Personal None of theA above ______________ are used by individuals when theyof theC Server Certificate Developer CertificateDigital certificate messages with other users or online services. Personal None exchange above ______________ are on-line databases of certificates the Bother information available for retrieval and use in verifyi Private Certificate Repositories ublic Key none of andabove P Signing Writings serve Approval, Evidence purposes______,_______,_______ and _______ Evidence, Ceremony, Approval and logistics,D the following general Evidence, Ceremony, Approval, Efficiency and Logistics Efficiency Evidence The most widely accepted format for Digital Certificate is defined by the CCITT X.509 True False A A certificateTrue proveFalse unreliable, such as in situations where the subscriber misrepresents his identity to the may to be A CRL standsCertificate Revocation Resource List for Certificate List certificate Revocation Letter None Of The Above A The prospective signer Public key, Private Key, Recipientholds the_________ and is called the ___________ Private Key,identified inRecipient certificate A Above Subscriber the digital None Of The A "recipient" of the certificate desiring to rely upon a Digital Signature created by the subscriber named in the certific Recipient Party Relying Party Either A or B either A nor B N B The Relying Party Key use the KeyBoth A andlisted in and certificate to verify that the digital signature was created w Public can Private ___________ Both B the C B A Digital Signatures are used for a variety of Electronic Transactions like ________________________ E-mail Electronic Commerce Fund Transfers Electronic All The Above D To associate with a key pair with a prospective signer, a Certification Authority issues Digital Certificate Not False Not True A Digital Signatures, if properly implemented and utilized offer Requirements, Open System Closed System,FormalOpen System Formal Legal Requirements Legal promising solutions to the problems of Imposters, Mes Legal requirements D Formal In, Digital Signature, _____________ perform None of theA Affirmative Act Efficiency Signer authentication above the "ceremonial" function of alerting the signer to the fact that the sign A Digital SignatureAuthentication Authentication Signer must have the following attributes ________________ and _____________ Document Both A and Neither A nor B B C "Hash Function" is used in both creating and verifying Digital Signature Not True Not False B ___________ provides assuranceDigital certificate KeyAof data in order to protect the sender against false denial Nonrepudiation Service of the origin or delivery Digital signature Private ___________ serves the ceremonial andA or B either A nor B. a signature and establishes the sense of having lega Affirmative Act Efficiency Either approval functions of N A ________ is a branch of applied mathematics concerns itself with transforming messages into seemingly unintelligib Cryptography Public Key Private KeyNone of theA above The complementary keys of an asymmetric cryptosystem B Digital Signatures are arbitarily termed as _________, Private KeyPublic Key Both A and Either A or C B for _______ is Private only to the Key Both Ais used to createB digital signature. known KeyPublic signer and and Either A or A B the _______ is Private KeyPublic Key known and isB ordinarily more widely Both A andEither A oraB used by relying party to verify the digital signature. ____________ is the art of protecting information by transforming it into an unreadable format. Decryption Cipher Encryption Cryptography C Which of the following activities would most likely detect computer-related fraud? Using data encryption. ConductingReviewing the systems-access log. Performing validity checks. fraud-awareness training. D A digital signature is used primarilyReceived by the intended recipient. Unaltered in transmission. determine that a message is: Not intercepted en route. to the A to Sent correct address. What is a major disadvantage to using private Thebroken into theused byandencryptionmethod receiver. not by for de Both sender and receiver must have key private keydata? this encryptionforto the will the receiver the s The private The cannot key private A fragments for receiver but not by work. key a private the to encryptis before the distributed decryption but be is used key by sender Which of the following risks can beFailure of server duplicating function. accessing the information system to use p Collision. Data entry errors. minimized Firewall vulnerability. by requiring all employees D

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

q_desc op1 op2 op3 op4 ans The acronym for B2B is ___________ Business-to- Business Backend-to-Business to-Billboard Business-to-Backend Business- A The _____________ model is the least intrusive model but requires active search on the part of the customer Billboard On-line Catalog Endorsements Broadcast B __________ is / are a Endorsements Customer form of advertisement where people relate their experience with products and services Billboard Catalog Broadcast A The _________ are software agents who communicate with the business merchants on behalf of the customers Intermediaries portals .COM Domains A The Pre-purchasePlacement phase includesNone of theC Order preparation Service Search and _______________ for a set of products discovery above The _________ phase Purchasecustomer service andandA Post purchase interaction includes consummation preparation to address customer complaints , product returns an Pre-purchase Search support discovery The ________ allow model of catalog Billboard companies toEndorsement modeltheB printed catalogs Online marketing theNone of of marketing bypass need for costly above A ________________ is a basket on the Net that is used B place the items that are being purchased Online Catalog Shopping cart Billboard Pulling cart to EDIFACT is an abbreviation of ________ Administration,C EDI For Administration,EDI For EDI For Administration,None Transaction Commerce Consumer and Transport Transport and of the above Commerce and The __________ allows for protocol conversion and communicates with the bank using the banks private network o EDI TCP/IP EFT Gateway D In Ecommerce, data extraction, transforming the data intoD Compiler Interpreter Assembler EDI transmittable form, transmitting the data and downloading The _________ commerce assistsConsumer-to-BusinessB Business-to-Business in integrating the customers and suppliers of the company directly into the organ Business-to-ConsumerCustomer-to-Company E-cash means______________________ EmergencyElectronic Cash Cash Endorsed Cash Cash Euro B E-commerce is a tool that addresses the desire of firms to above Communication Perspective Perspective theCcut services cost and improving the quality of goods. It is Business Process Perspective Service None of The small denomination digital tokens are called _________ Microcash Micro Transactions token) TT(Tiny E-token A The ____________ is the process Encryption Subscription to prevent it from being read by unauthorized parties Decryption SSL of encoding information C In EDI interface, theFormat File service receives _________ as incoming files from the communication service Internal translation Format File None of theC External Transmission File above The EDI standardisation for International Trade and Commerce is introduced by __________ ANSI UN/EBCDIC UNESCO UN/EDIFACT D In EDI, the transmission files are composed offunctional sets of external format files which are grouped into multiple batch files interchangefunctions different groups sets D The ________________ are pre-paid credit cards that theA Smart CardEmbedded SET cards None of include an embedded cards above ________________ are another form of creditElectronic that lets customers use digital online cheques to pay Web m E-cash Digital Cash Smart Cardspayment cheques D In Active advertisement, there Catalog and Billboards Catalog are _____ and Endorsements Billboards and Junk Mail types of models. Mail and Customer ________ Online are two Broadcast and Junk They Online C The network based technology is/are ____________ above EDI E-mail EFT All of the D Decryption is a process employed for scrambling of plain text for web based transactions True False B AsymmetricLogin_Id and Password on __________ and ____________ cryptosystem is basedPublicPrivate Key Key and Private Key Primary Key and Key and Password Public D Value Added Network is an example of _________ of theB Global Network Private Network Satellite Area Network above None The advertising strategies based advertising or hoardingare ____________ Active or push emerging in the on-line worldabove Passive or pull-based advertising strategies Glow sign All of the D The _________ model Junkdirect mail, spot television or cable television, in active based advertisement. Broadcast use mail Billboard Endorsements A The ________ is a form of mail that is not targeted to a specific audience E-mail Bulk-mail Direct-mail Junk mail D The __________ model refers to information that is placed at a point where it will be noticed by customers in the co Catalog Endorsement Billboard Broadcast C The most beneficial advantage of ERP cost ofQuality management Error checking Integration system operation B Data Low is What is theCompetitive espionageIndustrial espionage espionage term that describes spying on ones business C Corporate espionage Economic rivals to gain a competitive advantage? What wouldA list NOT be lookingclients ofspying on a competitor? you of competitorsnumbers the management new project Contact for when data Research A competitors group B An online drugstore such as Drugstore.comapplication above single-user multi-user application is None of database database e-commerce database Cof_______ an example application Which of the following is an example of unacceptable online netiquette? Replying promptly messages short Keeping Including the Subjectcapital letters Using all D Which of the following statements is correct concerning the atransactionsecuresecuritysystemssegregation of duties RemovableMessage authentication inup atsystems performs phase hardware device is more secure tha drives that Encryption performed by security of messages in an when the confidentiality of da can be locked EDI at theprovide adequate in EDI electronic not necessary bec Security night physically the same function as is data interchange C

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

q_desc op1 op2 op3 op4 ans The wizard text import wizard texttip wizard function wizard that is usedconvert text files is_________________ to import to columns wizard A The alphabet indicatingrow reference cell reference column followed by the row number is known an__________ the column referenceof the A none above Which of the following files could not be opened xbase files text files Lotus 1-2-3quattropro or in excel _______________ class files D In excel, the dates that domain valuessequential numbers D serial values stored as are range values reference values as ________________known The command to display the current date in a none of the A =today() =date() =currentdate() is _________________ cell above In excel, absolutesign ' = ' sign represented none________ before the column and row addresses dollar references are # sign by a of the A above The ________ can be used to select the function and assemble the arguments correctly AutoSum AutoFill function wizard of the C none above Specific parts of information required by functions to perform certain tasks are called as___________ variables arguments parametersnone of the B above Which of the following do not belong to the formula category in excel environment__________ text logical numeric Boolean D The function that in used to join cell values together of the A concatenate pmt merge none in a single cell ________ above The function that is used to count all the values that meet A countif vlookup pmt count specific criteria _________ The wizard pivotis usedchart wizard edit charts _______________ that table wizard to create and convert texttip wizard B to columns wizard The function that is used to calculate the payment for specific loan terms ____________ sumif pmt countif none of the B above The function that is used to add together all values that meet specific criteria is known as ____________ average sum sumif countif C The __________setup print area inprintfile menu options isabove to specify major facts of the page to be printed page option present the none of the Aused The command that is used to apply a format automatically __________ autoformat AutoFill none of the above A The ____________ makes the information in a worksheetB bordering formatting shading none of the above meaningful and easy to understand A particular pageof a work sheet can be printed by setting B _________ part setup print area print print preview the The process of finding or selectingsorting filtering searching informationnone of the A ____________ is known as above The option that is used blanks all option to cancel the filter process for a specific column and display all the records is ________ all blanks none A There are _________ types of data tables 1 2 3 4 B The tables that allows the usertable data table filtered to change or rearrange the data, summarize the data and evaluate the data using ch index table pivot table D The wizard pivotis usedchart wizardhints for doingwizard D that table wizard to suggest convert texttip columns wizard to a task In a chart Y-axis isor rank as_________ series known category legend data marker A In a chart X-axis is known as_______________ marker series or rank category legend data B _________ series or rank is a set of tables that describe each of the data series category legend data marker C ________ is used or rank series to differentiate one data series from another category legend data marker D The chart that containsbar chart data series issurface chart column chart only one pie chart _________ C The chart that holds the column chart is _________ chart column chart chart pie chart surface bar B The chart that display two or more pie chart surface chart is _________ column chart chart data series on a surface bar D The chart that is used to display discrete data surface chart column chart chart pie chart bar A _________ spaces allowed card macro name none of the A are not wild in a characters symbols above Which of the following tool cannot be used to view the excel web page_______ excel97 internet explorer Netscape word 2000 A The wizard pivotused to buildwizard that table wizard an interactivetexttip wizard A existing on sheets chart convert table from datawizard to columns The chart that is used for displaying stock market chart C line chart bar chart stock chart pie information In excel, the subtotal command also generates grand total after the last group subtotal_________ true false A In advanced filter , the criteria occupying multiple columns but more than one row, is considered as an ________ cr and or B The stacked bar graphs can be represented in __________ 3-dimensions 4-dimensions Multi-dimensions A A pie chart can represent only one data series at a time A true false The ______Data table Pivot table generates a summarized report in tabular form in an interactive manner B Which one ofis also called as high-low-closeusedstock chartshare market prices over a period of timechanges It the following statements often timeis to display forNOT TRUE ? It shows trends over chartalso used is indicating fluctuations in temperature It is related It to B The state government needs to finalize a five years table.to implement 100% literacy in the state. Which one of the f Pivot table Scenario manager Solver Data plan C Forecast'99Goal group working on Pivot table wants table. A how many seat ABC party needs to won in totality to ob is a seek Scenario manager It Data to know exit poll. Which one of theseek Pivot table the tool that Data table. way to view and compare the results of all the different va Goal following will be Solver provides a D A ___________ is an excel file where the usernone of his data Workbook Worksheet Spreadsheetstores the A above Spreadsheets are useful for _______________ offormatting. Performing Performing Performing All the above calculations. database operations D text Which one of the following is NOT Source table name. pivot table ? Column field field. the component of the item. Row Pivot table C Excel allows upto ______ levels ofN two three sorting B Filtering rearranges a list to display the required records B true false The stacked bar graphs can be represented in _____________ 3-dimensions 4-dimensions Multi-dimensions A The ______ generates Pivot table Data table a summarised report in tabular form in an interactive manner B

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

Which one ofdisplays theis statements related to of the other.are changing and the user is interested in the sum of th It the following useful when several components chart is NOT TRUE ? It data series one on top stackedin 3-dimensions It can be represented bar B The state government needs to finalize a five years table to implement 100% literacy in the state. Which one of the f Pivot table. Scenario manager Solver Data plan C Forecast'99Goal group working on Pivot table wants table A how many seat ABC party needs to won in totality to ob is a seek Scenario manager It Data to know exit poll. Which following function is used inSumIf option ?______________ Count. Standard deviation subtotal A A workbookdatabases records consists of many ________ tables worksheetsD Which two of is a following statementsprovidesto pivottheview and compare the results of all the different variations to It the tool for is a tool that and analyzing dataA are TRUE in an interactive manner. It summarizing related a way to datausing analytical functions. It summarizes the table records ? by Which one of theseek. Scenario manager analysis tool D Goal following is NOT solver a What-if Pivot table ? The _________import wizard texttip wizard awizard wizard text wizardconvert separates contents in function different cells to columns cell into B A spreadsheet is a gridworkbook tables worksheet of rows and columns and is calledA a ________ database as Pick out theapplication window a form of excel ___________ window that is not window window document modal C On an Excel sheet wideactive cell is indicated by A dark the A dotted border border No border A blinking border A Cell A4 =2 and A5 = 4. 2,4,2select both cells and drag the D handle down to A8. The contents of cells A6, A7, and A 8,16,32 You 2,2,2 6,8,10 fill If a cell shows ####### has a syntaxshort to show theor cC to show all the digits of the number your formula , it meansthe error either narrow the row is too column is too b number at the current font size that _____. Which is not an advantage of of calculation of costspreadsheets? ability to generate tablescomputerized of initial set-up speed using flexibility moving entries D The gym teacherprocessing program to calculate physicalD word has agraphical database spreadsheetfitness in terms of weight and exercise. The use inputs di new The difference between the highest and the lowest values. Range Address Gap Rows A Spreadsheets can be used for... Drawing pictures Producing graphs letters Writing Document filing A To select a double-clickdrag fromin clickcolumn click the column label cell in the column column the easiest method iscell the column to the last any cell the top tocolumn heading the the in C If you pressENTER theCTRL + ENTER typing as its contents. _____, cell accepts your TAB INSERT A The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as array. function. constant. formula. B All of the following are considered constants EXCEPT: C 100 (201)555-1212. #VALUE! Tom McKenzie. Which of the following may NOT be included in a formula? Cell references Functions Numeric constants Text constants D Which of the following is NOT a valid mathematical operator in Excel? ^ / * \ D Given the formula =B5*B6+C3/D4^2, which expression would to determine. first? B5*B6 C3/D4 D4^2 It is impossible be evaluated C Which part E12 formula +E12/6+(G7*SUM(H9:H11) is considered a constant? of the 6 SUM(H9:H11) G7*SUM(H9:H11) B How can you is surroundedblinking. is displayed inphraseA video. cell appears in the Status bar. It tell which It is in a worksheet is the active cell? cell by a heavy border.The reverse It active How can you change the ausing cell? either clicking in a thea different or using the arrow keysmove to in thedifferent By clicking in active the cell keys totyping to reference cell cell you want to to move to a formula By different arrow By By move different cell of the C Which of the following would you use to change thecommandof a the Edit menu The Standard toolbar The toolbarThe Font Size command on the Tools menu. The Formatting Cell Format font size on cell in Excel? B The command that will the Save current workbookFile Type commandtypethe File menu. the New command on the File menu. File menu. the File menu. save the command on the with a different file on is: the Save Asthe command C on The command that will Edit an Excel workbook is found on the ____________ menu. File print View Window A In the Save Preview Open dialog boxes, the ___________ B As and Details List Properties view shows the file size as well as the date and time a file Which of the following commands Both Insert Clear adjust cell references in formulas? Insert Delete will automatically and Delete C Which of the following commands Both Clear and Delete B columns from a worksheet? Clear Delete will remove Remove cells, rows, or Which of the following options isand footers Margins the Page Setup command? Orientation Headersor landscape) (portrait NOT controlled through C Fonts Which command enables you to change the margins for a printed worksheet? Options Page SetupView Edit B All commands are carried out on agroup. worksheet. range. rectangular groups of cells known as a: cell group. B Which of the following is a valid cell range? D 6 D12, G25 D12:G25 C In a copy operation, the cell(s) youclipboard. sourceis called the: copy range.destination range. are copying from range. D In a copy operation, the cell(s) youclipboard. source range. paste range. destination range. are copying to is called the: B Which of the following commands The Paste to duplicate the and Paste commands The Duplicate command needed command D contents of a cell in another? The Copy command Both the Copy is A cell reference that does not change during aconstant A is known as absolute relative mixed copy operation Which of the following is considered an absolute cell reference? B4 $B4 B$4 $B$4 D Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, what will be the co #DIV/0! #DIV/0! #DIV/0! #DIV/0! B Cell E3 contains the function =AVERAGE($A$3:$D$3). IfC contents of cell E3 are copied to cell E4, what will be #DIV/0! #DIV/0! #DIV/0! #DIV/0! the Which of the following command The Paste to transferCut and Paste commands The Move commands is needed command the contents of one cell range to another? The Cut command Both the D The F4 key copy and paste cells. cycle through absolute,C open applications.cell references. is used to: edit cycle through relative, and mixed Which of the following quickly copies the formatting of a selected cell to other cells? the Fill Handle Format the Formatting toolbar B the Painter Conditional formatting Which of the followingInsert Hyperlink commandan and onworksheet?Hyperlink command. Select the will insert Insert Hyperlink button click cell Edit click the Insert Hyperlink command. Click the a Right-click a cell Excel Bthe menu. hyperlink into from the File Standard toolbar. Double-click a the and Conditional whether thethe cell formatting to thethe basedinD cell or a relative cell reference. formatting applies address. or a value in an the cell has a formula a cell value it. absolute whether cell has on: If you enter text with a two-digit year. integer. text with either a two-digit or four-digit year, depending on the format. a date into text with a four-digitthe date as: C a cell, Excel stores year. an You created a worksheet on July 30 and entered the =Today() function in cell E17. You openedgiven. Jul-30 Aug-31 29/03/2008It is impossible to determine from the information that worksheet aga B The number of days between two date from the later latercanfrom the earlier one.one. subtracting adding the cells containing later date be calculatedearlier the earlier earlier date adding one.later date to the by: subtracting to the the one. the dates A

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

The function key that isthe F2to quickly editkey.he F1 key. B a cell is: the F4 key. used key. the Esc the contents of t What will be stored in a cell if 3/4 is enteredof the currentor .75, depending on the cell formatting 03-Apr 0.75 March 4 inEither 3/4 year it? C A users response toa worksheet. a constant. either a cellD a worksheet or a variable. a cell on the variable. function can be stored in: a InputBox on The cell reference for aB1.G10of cells that starts in cell B1D B1-G10 range B1;G10 B1:G10 and goes over to column G and down to row 10 is _____ The teacherAVERAGE COUNT showing all Year 10 students and their marks in one Mathematics test. To find the s has a spreadsheet MAX SUM C Which chartCombination type best shows proportions of a whole? Line Pie Scatter C Which of the following is TRUEcolumn chart isOnce changed to a column chart.be it can be changed to a pie chart. Once a bar Once is chosen it a chartchosenlineD chosen it cannot a bar chart. to line chart. chart a regardingcannottypes? it been haschanged to Once pie chart has cannot be been chosen changed be a chart To select several cells theranges key are not key ALT keyA other,SHIFT hold down or CTRL that SHIFT touching each hold down the down the down CTRL + you would _____ while selecting. hold hold Your Institute teachers Create four Transfer information to Dsheetsare required to use a spreadsheet to record all tha Use tables have set anseparate files multiplea database assignment on Studies. You Use What wouldPaste best method toFill Right Pasteformula from the active cell to each cell below it? be the Fill Down quickly copy the Special B To arrange Tools inSortData | Sort Editbased on column A,choices to use the command _____. rows | alphabetical order | Data |none of the Byou need Sort What can you NOT do Calculate data Analyse data a spreadsheet? None of theC with Create forms above To print justclick thea sheet, you would select what key wantPage Setup _____ dialog and then print part of Print button PRINT SCREEN you on to printin the| Print . and then print press the select Print select Print D selection selection and Sheet Spreadsheets can be used for... drawing pictures of theA producing graphs letters writing None above The formula that will add the value#VALUE! to the value of C2 and then multiply by the value in B2 is _____. (D4+C2)*B2 D4+C2*B2 of cell D4 =(B2*(D4+C2) C Which of the functions =A3SUM:B3SUM:C3SUM addition B 0 is not valid for performing REF! None of the above The default portrait orientation landscape whateveris _____. used for the printed page was last vertical A Which is not a valid cell address? A0 AD213 ZA1 None of theC above

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

q_desc op1 op2 op3 op4 ans The two major browsersExplorer and Mosaic None of theC Netscape Navigator MS InternetNetscape surf the Internet are ________,_______ used to Navigator and Mosaic and MS Internet Explorer above Special characters allow browsers symbols _________________ text data from a to display video database C The keyword for providing links within or across documents is____________ hyperlink hypertext hotword hotlink B Stringing pages together using hypertext technologyof the Bview pages _______________ in random order in sequential order in user-defined order above none helps The initial web pages present in a web site is the ________ page. first start home none of the C above The image format supported andmost browserswmf and .bmp .bmp and .gif .bmp by .jpeg and .jpeg is________________. .gif . C The components of a URL are andservice,portservice,hostname and port Service, hostname ___________path directory path service,hostname,port,directory-path directory and B The mail we send has a mailing address alternate servicesabove and gateways to other services mail servers,mail clients and and most of themrobots mail vendors,mail identification the Cpassword to_____,_____ and mailing lists,mail server correspond none of and Which of the following is not size=n> size=n><l1 type=shape> <center> <font supported by internet explorer _______________ <hr D CGI stands communication generated information of the B for ____________ gateway interface instructions common classified general none above Host name Server the domain name of the web ________ indicates Client Browser User A The internet is also called as _______________ arpanet the net intranet none of the B above The internet is similar to _________________none of the B LAN peer-to-peer connectivity wan above The net drivers______ parcel data from one place to another of the A packets none above The World Wide Web was devisedCARN CERN ECRN by _________ NET A The useful URL schemes are_____ and______and of the B engines yahoo and infoseek files mailto and newsgroups none search above The other ways of getting connectedinfoseekcall andof the B servers and web servers news groups,yahooboards,mailsnet are_____ above bulletin and to the servers,proxy system application none wireless BBS standsbulletin board systembroadcasting none of the A for______ business bulletin broadcasting system system above USENET is a BBS on ____ scale very small none of the B small large above WINSOCKS is expanded as______ windows socks windows sockets windows stocks of the B none above IETF Level Mosaic DTD supports PINE 2 HTML Yahoo graphical browsers like _______ Lynx A The space used by Netscape to store the retrieved page is called______ buffer cache built-in none of the B above The URL for encyclopedia Britannica is_________ of the B www.ency.in ww.eb.com w www.encybrit.com none above _______ maps IP addresses with the domain names of the sites URL DNS FTP none of the B above Internet can be definednetwork of network internal network as _______ intermediate network B none of the above The most important service of the ______ is to manage traffic control application layer transport layer physical layer session layer D _________is a program thatservice service none of the A finger service ping displays information about a host connected to the net ftp above _______ is FTP a program or a tool that helps in locatingof the C TELNET ARCHIE none a file above anywhere on the net URL stands for ____________resource locator uniform research locator uniform unlimited restore of the A none locator above IN an URL the word before the color refers to _______the C host computer name of the resource none of scheme above A ______ always begins with a slash message scheme command line of the C none above Prodigy is run by IBM and ______ sears Delphi Microsoft general electric C The World Wide Web is referred to shortly as editor net web browser the _______ B Gopher and WAIS enables the user to ______ browser read the Usenet news databasethe C search for none of above ______ is the program spy mosaicwincim or maccim the C CompuServe internet dialer used to run CompuServe's regular above none of services Navigating through the gopherspace gophering menu of gopher is called moving around _______ cyberspacenone of the C above The directories that come with built-in enginesnoneyahoo,lycos and ______ Alta vista open text excite are of the B above To use the finger command,SLIP usersserver run a programme called______ server server web must none of the A ftp above The web maps are called _______image list none of the C list directories above Directories consists of _______ levels no maximum of five one many B The _____ level gives the broadcast overview middle net D middle lower top of the and lower The huge list of keywords from important items is called ______ hotlist directory index glossary C The two types of search in veronica are _____item search,index search directory search,index searchsearch,item search index search,menu search ______ menu and C _______ searches by keywords lycos infoseek excite all the above D Mosaic displays links in color whereas _____ does not display links in color netshark cello lynx all the above C ______ supports one button publish lynx mosaic Lycos navigator gold 2.0 C SPY MOSAIC is distributed by_______ Microsoft internet IBM CompuServe D ______ is aUsenet that helps us ftp log on totelnet networks program finger service to other D HTTP is the acronym for __________ text transfer protocol Higher text Hyper text transmission port text transfer port transfer protocol Hyper Hyper C ______is used to transfer and copy files over the internet C iccp ftp uucp none of the above _____ is a program that helps us to log on to other networks yahoo ftp telnet none of the C above

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

TCP/IP stands for ________________ transfer control protocol/internet protocol/internet protocol transmission controlcommunicationabove transfer none of the Bprotocol/internet protocol Archie servers can be accessed in_______ different waysC internet one two three none of the above in _______is the servers domain name serverstranslatesthe B ftp computer on the internetservers web that none of between the internet domain names and the internet numeric above TIA stands for_____ in the internet the internet none of the A the internet adapter internet administration access above Service indicates the name of the ________ used to access data, present on the other end of the link. browser protocol site organization B HTTP stands for______ hotlink text transfer protocol type none of the B hyper text transfer protocol higher transfer protocol above ________ is used to link pagesresource locator web the above universal resource locator world wide uniform in the uniform resource label B name of FAQ stands for ______frequently asked question question frequent asked query frantically asked of the B none above The internet adapter is TCP,IP SLIP,PPP a programme that makes our connection act like a _____or a ____ account IP,UDP none of the A above The step involved in Communicating between close connection response request the web clients and servers is ______________ A WSIRC stands for______ information and research the B wide search for windows sockets search for information and research council world internets relay chat none of above Two of the important browsers are_____ and_____ of the B lynx,minx netscape,iemosaic,gopher none above Lynx is a _______ programme that works withnone of the B world wide web server web client terminals above world wide interface The huge list of keywords from important items is called an_____ glossary index hotwords none of the B above VERONICAvery easy and rodent oriented net wide index to computerized communication is an acronym for _______________network A very organised networkon of the integration and archives verification none integration above and communication application The first freenet is created at the_____ and is none of thenet university of berkeley,berkeley freenet university of cleveland,cleveland freenet university ofcalled______ California B above ________ are defined as ways of communication amongst networks protocols IP address dns none of the A above ______and_____ are weband finger features none of the A search engines,directories and ftp ftp searching telnet above WINWAIS allsrc,winsocks lists namely____ and______ B has two source wais,allsrc wais,winsocks of the above none ________ is also called as WAIS manager none of the B allsrc waisman winsock above HTML stands for_____medium languagetext markup language higher text hyper transfer markup language C hyper none of the above The systemhot interlinked documents is knownnone of the B of links hyper text books marksas_______above The small programmesapplets images that createanimation none of the B animation,multimedia,real-time games and multi user games are called______ above The information displayed on the web page includes______,_____ and_____ graphics,videos,audio animation,scripts,executables programms,images,text none of the A above The web pages pagerepresent online home of none authorB called______ first that home pagewelcome page of the above their are GNN stands for______ news grand network news B global network global networks navigator of the above none _____ is the most service internet search engines of the B yahoo popular electronic mail service none above The online service offeredconference starter altavista the B page wizard email and net by navigator gold 2.0 are of Netscape page and site,netscape and_____ yahoo none _______ above _______ is newsgroup or a tool that helps us find a file anywhere on the net a program telnet ftp archive D The databases to catalog keyword all the aboveone of the D Lycos enable point review search using Lycos are above n a2z,_______ ______ is aapple link bitnet bulletin board service network large worldwide Delphi fidonet A BABEL consists a glossary of _____ computer related abbreviations and acronym D biographical information bookstores none the above Dictionaries,encyclopaedias,governmentinformationreferences are found in ______ encyclopedia Britannica on-line reference works more and other galenet A Yahoo,lycos,excite engines directories _____ search andweb webcrawlers are database channel B GIF is the acronym for Graphicalformatting interface format Graphical interpreter interchange Format Interface format ____________ Graphical Graphical B JPEG is the acronym for ___________ picturesgraph graph Joint Pictures Expertpictures expert expert A experimental group Jumbled Group Joint Joint pictures The Web aids users to documents net mails explore the ________ browsers C The three most popular mailer are_____,_____ and______ yahoo,infoseek,altavista netscape,ie,lynx eudora,netscape of the C none and pine above The World Wide Web consists of _________ mails information web pages network connections B In MicrosoftBACKGROUND the color of the text can be B Internet Explorer, COLOR FCOLOR FONTCOLOR specified using _________ attribute of the font tag. The interface that provides effective communication betweeninterface browsers and servers is _________ Communication gateway interface Common Gateway Interface Common graphical Interface Communication graphical the web D CGI is the _________ between web browsers ConnectionB Network Interface Communication servers and CGI programs are invoked based on the informationof theB by the _________ Current web page Browser Client None provided above A CGI program is usually called after a request made by the _________ Browser/user Server Web Channel A URL standsUnknown resonance languagerelay limited theB for ________ Uniform resource locator United None of above A hyperlink text only ___________ or image can be on image only text neither text C image nor HTML was derived from _________ SQL PLSQL SGML CGI C SGML is a _________ betalanguage alphalanguage metalanguage of the C none above PINE stands for _____________ pancake is not edible B palm is not palm is not elm eatable none of the above The application that confirms whether a document is Composerto its DTD is _________ SGML Processor Preprocessor SGML compliant SGML SGML Parser C Web is a collection of ___________ web sites images applets documents A IETF stands for ________ Internet equipment training faculty None of theC Force International Engineering trainers and faculty Internet Engineering Task above

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

The net provides interesting services and fine none of theand______ scripting,parsing and compiling retrived,internet tools news,cooking like______,______ C email,file arts above The windows internet software available are______,_______,________ and______ nt,windows95,ie,winzip communicator,ie,lynx,winsock mosaic,gopher,eudora,trumpnetabove all of the B ________ is the ancestors of the internet dnet arpanet ARPANET none of the B above DARPA stands for _______________________________________________ defensive administrative rank administrationresearch projects administration net dedicated and registered projectsnetwork defensive advancedtheadministration none of C above The uuencode files start with a _______ start begin first none of the B above DARPA is broken into ________ and _______none of the A milnet,smaller arpanet mailnet,inetintranet,extranet above NSFNET is education,research dance and dining the A the united states provides service none of and_____ music and cooking to _____ above HTML stands for ______________________________________Language Higher text Hotlink text Hyper transfer meta language manipulation language Hyper text markup markup language D The first international IP network connections were established in 1973 with _____ and_____ united states and UK united states & Russia B england,norway none of the above A_____ is aserver computers interconnected by transmission paths to exchange information in internet set of client network none of the C above A computerclientprovides a service usable by other computers is called______ that stand-aloneservers none of the C above A_______ is the representation topology redirectors the B computers in internet network card network of network connectivity of above physical none of the DTE standsdetailed transaction explanation equipment B for ____________________ data terminal equipment data target none of the above The basic function of the ______ is transmitting the of the B a channel application layer physical layer network layer none bits over above The point to point channel networksmart networkchannel network point to point network and also called as of dumb network packet switching,store andand the Band_____ is broadcast forward above none _____ network Accessing filesaccessFTP servers filecalled_____ of the B file using anonymousis transfer none ftp above The three most commonly used networks are______,______ and______ PAN,NAN,AAN KAN,RAN,VAN LAN,WAN,MAN of the C none above ________ is in between LAN and WAN VAN MAN TAN none of t he above B _____ can be owed by MAN LAN multiple organisation none of the C WAN above Data is transmitted in the form of_____ signals analog digital non-digital none of the B above DTD stands for __________ type Document type definition data Data type definition Define of data Document type C Modem stands for __________________ Moralize/demoralize Manipulate/demanipulate Modulation/demodulation of the B none above ______ is the process of the digital signals being converted into a form suitable for analog transmission Mapping Modulation Manipulationone of the B n above ________ and______ are two basic waysand wires ofaccess to the internet Satellite link and digitalCable andgetting connected Dedicated access of dial up the B signals none above SLIP stands for ________________ Standard long internet protocol protocol of the C Stream lineSerial line protocol internet none above PPP stands for _____ Point protocolprotocol none of the B Prime prolonged to point Pillar to pillar protocol above Which of the following best a disk drive dataaon the hard drive storing datasending information to receiving information from a host computer on describes uploadinghost computer storing information? B A characteristic of a communication channel that is the amount of information that can be passed through it in a giv Bandwidth Speed Size Channel A The act of searching through storage to locateRetrieve Cwithout necessarily knowing of the existence of the inform Find Save Browse information The principles, means and methods for rendering information unintelligible and for restoring encrypted information t Photography igital Signature D Cryptography Message Digest C A long string of seemingly random Hash Functioncryptographic algorithms to create or verify digital signatures and e Key Lock bits used with Formula A Protected/private character string used to authenticate anB User-id Password Name Address identity or to authorize access to data. The successful act of bypassing security mechanisms of Cracker PenetrationRetrieval Cryptography Password the system. A A set of rules and formats, semantic and syntactic, that permits entities to exchange information. Acts RegulationsAddress Protocols D An attempt Spoofing Imposting Unauthorisingto be an authorised person. to get access to a system by posing Approving A An action or event that Threatprejudice security. Loss might Exposure Hacking B According to information Technology Act,of a civil court B of IPS rank. Sales - tax authorities Judge 2000, To investigate contraventions the controller of certifying authority s Income - tax authorities Police officer Malicious software. Utility Pirated software Virus Cracker C None the person who isLee Tim Berner Hoffmanas Charles Bubbage Aiken known father of Internet Howard A This website is the biggest bookstore on the earth. .com B Etrade.comAmazon .com .com Msn Dell When we talk of Data Transmission modes, then Transmission mode Automated Any Time Money Tailor Machine Asynchronous ATM above for None of stands C A sequence of bits or characters that identifies the destination and the source of a transmission. Acts RegulationsAddress Protocols C The means Router of communicating between networks Gateway Port Pin B A group of computers and other devices dispersed over aA LAN WAN CAN PAN relatively limited area and connected by communication li The term HTTP standshypertext tracing program hyper terminal tracing program transfer protocol protocol for hypertext hypertext tracing C A NIC is considered Informatics Interface card None Card B National asNetwork Center Information of the above New A hub is a device that can connectOnly printers one of theD Only Computersnot computers Can N above Which of the following is true concerning thedata a hubincomingtraffic regulation of a bridge Concentrates connectivity Combines connectivity All of Aboveswitch? Switches function ofwith the ports to outgoing ports. of from a B What do routers connect? or more networks Hubs and nodes Bridges and Repeaters. Two Bridges and Hubs B What does bits a router route? frames Packets None of theC above Software which prevents external access to a virus checker firewall gateway router system is termed A If four computers are connected toFour and then to the internet, how many IP addresses are required for these 5 One Two a hub None of theC above

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

Which of the following in an OSI layer Physical Layer Data-Link Layer Network Layerof the above All D When creating a network from justFiberPCs, what kindpair RG7U Coaxial cable two Twisted of B cable would be used to connect them? An IP address is a address address Physical Logical A memory address theB None of above To construct a simple LAN of 4 computers, you would connect them with ______connect them A cable Hub Router None of theB above What happens toreturnthat is ruined continue on to target B Data data It gets senderbefore by None of thedevice with corrupt data to the destroyed bit reaching to receiver It bit. above Bluetooth isWireless technology Ultra violet technology A Wired Technology None of the above Which is not one of theData Link Layer sub layers? above Physical Layer recognizedNetwork Layerof the D IEEE All The most preferred number system to represent a IP address is Binary ASCII Octal None of theA above A MAC address is of 48 Bytes 48 KB 48 Bits 48 MB A Protocol is software that list of rules for transferring data over a network for internet bridging a facilitatessoftware that gateway calling program connectiona allows fileB to the internet copying A ...............Novell PC Client is a LAN-based computer with software that acts as a controlling device for controlling access to at leas Server Network PC C What is theThere isn't one nodeof the hub goes down,goes down, it brings the nodes on that sectionall of the rings biggest disadvantage If If one goes Ring topology? down the down all of down all of the nodes on down, itthe hub itB If brings brings entire ring The .............. of the network concerns how network devices are physically (or optically) interconnected. Physiology Topology Both A and None of theB B above The principal topologies used with Ring are: All of aboveD Bus Star LANs What are the various types of bus architecture? Linear Parallel Both A and None B A What are the various types of ring Linear Parallel Circular architecture? Both A and B B In a ................., each workstation attaches to a common backplane via its own physical cable that terminates at the Ring Bus Star Mesh C In a ............... , each work station is directly connected to B common communications channel Ring Bus Star Mesh a Which one of the following is NOT Linear Star Bus a network topology? C Ring In a .............. , the cable system forms a loop with workstations attached at various intervals around the loop Ring Bus Star Mesh A The Media Access Control (MAC)Layersub layer of the: Layer Network Layer Transport is a Physical Layer Link D Data What are the most common LANtoken ring, FDDI inFDDI ring, today? Ethernet, token ring, DecNET DecNET, networking ARCnet Ethernet, technologiesEthernet, token Ethernet, used B Modem speeds are measured in mbps bps kbps mips B LAN speeds are measured in bps Kbps Mbps Mips C WAN speeds are higher than LAN speeds the transmission medium usually measured in bytes per limited by modem speeds depend on second C Accessing the Internet a modem WindowsPC requires the use of CD-ROM drive a typical home 95 from Netscape B To use the Internet, you World Wide Web mail LANthe above must use the must use electronic a of account must have All A The worldwide web server usesresource locator key gateway interface common gateway interface tointerface middleware: uniform the following standard interface act as the application protocol C An NIC a Novell Interface Controller printer modem toD computer a network used to control a interfaces aconnects a computer to a Accessing the Internet a modem WindowsPC requires the use of CD-ROM drive a typical home package from Netscape B The most widely used network operating system on of theC is Linux Novell Netware Windows NT one PC LANs N above JPEG and MPEGto do with compression of graphicsof thevideo have have to do with Internetnone and Aprevious the Web pages To use the Internet youmust useWide Web mail LAN account communications software must use the World electronic a must have use appropriate A A multiplexer is a form of Printer modem bridge none of the previous D An ISP provides access to the is a CPU functional unit is a CPU register Internet make of processor A FTP is used to send email browse the Web a protocol for the transfer of files between computers used to is part of Netscape is D Telnet used to send email uses wireless part of Netscapemedium is communication the above None of D A firewall is used to protect a computer roomsaver program floods a form of virus a screen from firesthe previous none of and D A proxy server is a backup server an email server file server a poor none D A search engine is hardware IR system for the Internet of the C browser none previous To look for information CD-ROM clip-art file search engine user should use a scanner about interest areas on the internet, the D An ISP provides access to the is a CPU functional unit is a CPU register Internet make of processor A FTP is used to send email browse the Web a protocol for the transfer of files between computers used to is part of Netscape is D Telnet used to send email uses telephone lines Netscape is part of is a protocol that allows for remote login D Which of the following cannot communicate withthedirectly withonly with the layer directly above or below it. The layers is a true statement about communicate layers? layer.with the layer above it. Any layer can communicatelayer can communicate only Any layer can one another. any other Any OSI model C Which of the following is is made up works theIndividual computers can connect to itlines called backbones. It is one largeNOT true It of many Internet? connected into transmission using an ISP. It network. about the networks A a local network. same way as The traditional intent and impact ofDenial of Service of attack is to prevent or impair the legitimate use of network r Password cracking intrusioncommon type System this Port sniffing C A firewall isused to protect a computer roomsaver program floods a form of virus a screen from firesthe D none of and previous Which of the following is NOT an example ofinitiatesattack that is popular among hackers? IP flood Flood a Web server withDoSflood A flood Virus that a requests UDP a ping A ____________ attack is when a flood sends a continuous flow of packets to a system. hack packet hacker traffic C One defense option on router network is to configure a ____________ to disallow any external traffic. firewall a large switch hub B A proxy server is a backup server an email server file server of the D a poor none above

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

Which of the following would be performeddata on a dailyserver and not normally on individual workstations? Apply security patches Backup on Limit logging on access Update virus definitionsa network C basis What can be said aboutsafe safety Only large name-recognizable sites are safe. All sites areThereand reliable. Internet? sites. B the are safethe unsafe of and ActiveX-enabled sites are safe. To secure communication networkUse of logical access the most effective control is Use of identifiers passwords wire-tapping methods Use of against Use of encryption methods D One way that a virus CANNOT an FTP throughout a network is: by attaching to an e-mail. attaching itself to a document. through spread port. by scanning the computer for a connection. by B Which of the following is NOT a means of monitoring employee use of company technology? Phone E-mail Web traffic Application D updates ____________ would be used by parents to monitor their D A Trojan horse Adware A worm Spyware children on their home system. The formal Modems parameters which are established toB rules and Protocols Multiplexors LAN permit a microcomputer to communicate with the mainfra The two most commonTrojanused cookieskey key loggersinformation are: cookies andtools horses help withloggers. C Trojan horses. to and andextracting and worms. key loggers. Which of the following would NOT for the purposean example of cyber terrorism? An attack on a attack with personalChanging the content of a Web page An system Giving out disinformation publicity be considered of gaining gain D Which of the followingdamage a in communication thelines are correct. Economic would be form of cyber supply above Disruption Disruption in terrorism? All of D Which of the following is stock market, of a cyber1930s systems plant safety systems loss of life? Crashing the a likely target as insecurity systems would cause considerable Shutdown of military the terrorist Dnuclear Contaminating water of Shutdown that An organisation is upgrading its telecommunication lines. D accurate inventory of network related equipment and pa To carry more network To improve To obtain an To improve capacity services response time least important objective while upgradation network system Which is the A company set its a priceveryof its products onupdate its only theirsoon as to theare changed that the company can posts prices list high stop its competitors seeing advantage they customer is limit access to computer owners prices as prices its website.D The Which of the following is an easy-to-usePeople Searchinformation on someone? People Search Yahoo People Search Lycos Search USA service to get B Which of the following pieces of information assets NOT be found online? Name of your bank birth Date of Personal would Criminal records A Which of the following is the most common danger on theB Virus Fraud Adware Spyware Internet? The famous Nigerian Fraud scam offered victims the opportunity to: money by parking funds in their bank account buy stocks.invest without risk. off-shore property. purchase make large D amounts of The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is cal Shill bidding Phishing Siphoning Hoaxing B Using the Internet to pursue, stalking.or contact another inB unsolicited fashion is called: Internet stalking. harass, cyber virtual stalking. stalking. Web an Setting your privacy settings in Internet Explorer to medium is one way to block: pop-ups. cookies. spam. viruses. B What is theUse a fake Never use your real cyber stalking?B best means of protection from identity.anti-spyware software. e-mail address. a proxy server. Use Use Which of the following is not an appropriate control over telecommunications software Encryption Physical Security controls Message sequenceaccess controls Logical number checking B Encryption techniques can be implementedII Neither I or C I only II only Both I & in Hardware-Software II Which protocol would be used to download a free anti-virus program from the Internet? irc ftp www telnet C The major advantage of the checksum program isup timeprogram recompilation Adds more Verifies integrity of filesMisleads aitB bytes to programs Increases boot when Which of the following is a WebExplorer HTML Internet browser? Excel HTML B Internet Explorer Microsoft both and A Web page is another name document. trip HTML browser. Web query.HTML for ----------round Web document. B Domain names must contain used .con is used for companies .com is used for company company type of organisation that the domain represents. A very common a .co in a description of the for None of theA above A standard round trip for creating Wide Web Consortium C language HTML. the World and formatting Web documents is: HTML. one way HTML. The Web page format in which all elements ofMHTMLpage are saved as one file is called: XML. HTML. DHTML. a Web D Which of the following requires an clicking a Web page that is stored on document that onstoredas a Web page. o using Internet Explorer Internet connection? Excel worksheet that you have saved computer updating the values that are obtained through a Web hard drive is your in the floppy drive to view hyperlink thatB viewing an references a the query Mr Rao wants to on theClick on that toto the History pageis found for the site page his computer how would he Click find a website Go he or Searchto the Bookmarks or Favorites Back arrow until Go briefly browsed over yesterday. After turning on desired site browser Go in the C look and Which of the following is used to update a Web query? AData command the Refreshthe Insert Hyperlink command command the Update the External command You download from the Screensaver Hyperlink internet, a Sound screensaver, a ten-second sound file and a ten-second music video clip. You als Video C When saving a photograph for useJPEGwebsite, which format should you choose? BMP GIF on a TIFF C While researchingitthe a Write taxesAdd it a piece you findorC it to a word processorthe most efficient way to access Save to Direct itdisk.assignment, ofand paste floppy down on to Favourites a Bookmarks. What is document. Cut paper. useful website. A system that uses the intranet. forprivileged network. topology extranet. Internet business-to-business interaction is called a(n): network A A block of text automatically added to the end an an outgoing email is called an attachment. a signature. footer. a of encryption. B _________ VoIP to the use of Internet technologies for placing telephone calls. refers IPT IPP PoIP A Most client/server applications operatesoftware, and hardware.software, and hardware. of the following layers? Desktop client, application, andadatabase. server, and database. of which Desktop client, on server, application, Desktop three-tiered architecture consisting Desktop A Which do you NOT need to connect to the Internet? of theB Modem CD-ROM Telephone line None above What does File Transfer Program File Transfer Protocol B FTP stand for? Transmission Protocol of the above File None What is theSo computers can be referenced be shortertheA purpose of So IP addresses canis None of faster DNS? So email by a name above delivered Which of the following is NOT a properly formatted IP address? 193.1.2.3 45.1.1.1 143.215.12.19 of theD None above Which of the following@ domain. org. uk paul .trigg is a properly formatted email address? paul.trigg@domain.org.uk of theB paul.domain.uk None above The Internet is controlled by whom?Switzerland The US government in Scientists No-one None of theC above What does Internet Relay Chat IRC stand for? International Relay of Characters A Internet Remote Conversations None of the above If you do not pickbe deleted be waiting for will None of to itA in the post It will up yourwill It email forA letter yoube sent the above a week...? to collect you What does Hyper Textual Mark-upHyper Text None of theC HTML stand for? Hyperlink Text MarkingMark-up Language Lingo Language above What is a disadvantage of joiningautomaticallyNoneemail C globally Receiving messages a mailing list? of interest in the group People discussing a topic of of the above High volumes from anyone

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

q_desc op1 op2 op3 op4 ans Which of the following computer software is designed tomanagement system execution of application programs Application Utility Programs Software Operating system Database direct and assist the C Formatting a disk results the disk data being...?disk of above Deleted from in all the Saved to the Copied from the disk None A Which bus carries information between processors and peripherals? Data bus Auto bus Address bus None of above A Which bus controls theAddress bus of read/write operations? Data bus sequencing ontrol busNone of above C C Which computers use single chip processors?None of above Personal computers Super computers Parallel computers A CPU performance mayMIPS BPS be measured in MHz VLSI B In processing cheques MICR of the following I/O techniques have banks traditionally used OCR which barcode scanning voice recognition B Disk fragmentation by wear by overuse bad diskof the previous is caused caused is due to none blocks B A compiler is fast interpreter thanconverts a program theassembly code a slower an interpreter of to Bprevious none An interpreter is than a compiler and executes programsBpreviouscodestatement faster translates converts a program themachine by none of to statement Zipping a file means it encrypting decrypting it compressing it transmitting it C An assembly language program is translated to machine code by an assemblercompiler an interpreterlinker a a A Which of the following is not part ofthe power cord of the above the ALU the CU the processor None C If the Cancel Error Propertycanthetimeiferroruser executes Acarrytrue conditional compilation A runtime error of result program clicks theset to out then which of the following statement is true: A compile CommonDialog needis without button The the occurs Box to cancel any error You __________ controlBox List BoxDrive List Box in the current directory: File List defaults to displaying the Combo BoxA Dir files A ____________ occurs any time a program writes more D memory overflow overloadoverflow systems RAM buffer overflow information into the temporary space it has allocated in th Assessing a system requires certain common NetBIOS D of the following is NOT a tool used to assess a system? Netcop NetBrute Netcraft tools. Which The ____________________ Web site has a www.netstat.com you what software and operating system a Web serv www.nettools.com www.WhoIs.com www.netcraft.com utility that will tell C When software vendors discover flaws in theirupgrades. they usually will write corrections to their code, known as: code correct. patches. updates. software, B All ____________ have the option hubs firewalls switches of blocking scanners A ports. Which of the following is hides a characteristic It is aboth. is packet filtering. It can consist NOT your network. techniques B between your network and the rest of the Internet. It of hardware, software, or firewall? One of its of a barrier Before shutting aany openon an individualotherThat youtheB shutfollowing would you always check? That service applicationson machine, on also the down associated services Dependencies be exited which of That you areservices Internet not At a minimum, whichsoftware Antivirus of the following should be implemented under the protection phase? Intrusion-detection software Firewall Router C Attacks on your systemantivirus software. or prevention system. use of: an intrusion-detection system. may be prevented trapped through system. a network a proxy filtering the A Setting restrictions as to the number of uniquehistory. cycle. renewal. age. passwordsD use before a user can recycle them is called a passwo to Which of the following is NOTandand to currentabilityallareD anti-spyware programs. Make sure all updatestep security patches incoming traffic on a network. Install a keep take in securingconfigure the workstation. Limit usersBlock to and antivirus a workstation? applied. To prevent a hacker from the systemchange the what anotheryou do with a power user account. the hacker. Delete it from unauthorized access, built-in guest account user account with administrator rights. Delete it and and use thecreate a C administrator account to confuse Disable it and guest account. Create should nondescript to the administrator account? What should be done withusedbackup tapesbeGive CDs shouldthe trash. Tapes can be old and CDs can and bethem to and be kept forever. Tapes over and over, and melted a recycle broken. Tapes should CDs?away in CDs shop. thrown C Which of the following is irus an example of malware? C Trojan horse NOT V IP spoofingSpyware One step you cana router reduce theto your being fromsystem.aWeb sites. place take add spyware risk of system.your programming skills. to betweendownload and your reliable virus is to: your ISP files infectedC hone by Which of the following is abnormal Printing problems infectedyour wireless mouse System acts NOT a missing a virus has Files are sign that Problems with your system? D Which of the following is the software. off protect yourself an e-mail attachment unless you know what it is and who Update antivirus safestTurn to theNever openD in your e-mail client. Do not propagate hoax viruses. way auto-launchfrom e-mail viruses? A ____________ attack causes too pyware buffer overflow virus Trojan horse much information to be placed into temporary memory space. s D ____________ gathersA Trojan horse with thebuffer overflow A virus user information Spyware A users knowledge. C Which of the following is the most common function of spyware? and passwords Obtain system IP addresses for open ports D Obtain cookies Check Obtain usernames Which of the following is NOT a virus-scanning technique? E-mail and attachment File scanning Download scanning Backup file D scanning scanning Which of the following would NOT Avoidway toUse encryptione-mails Use your browsers security settings and toolbarssoftware spyware? Do not open attachments in unknown download be a skins protect your system from D For which of the following positions wouldaccountant administrator an extensive background check? Administrative assistant to the it beNetwork to conduct Cook Junior president advisable D Which of the following would you use to opencommand on the Edit on the File menu The Standard toolbar The toolbaran existingcommand menu The Formatting Open The Save file? A The ability to have multiple applications open at the same time is known as: multitasking. tiling. cascading. minimizing.A Which of the following file location the numberthewindowsA the printed DOCUMENT the default can be changed using the Options command? whether theof new files prints in landscape or open orientation worksheet of margins you have portrait on Which of the following leaves an application open but shrinks the window to a button on the Windows taskbar? shrinking multitasking minimizing cascading C Which of the following actions woulddrag. and title cannot C drag.a floating toolbar. place? Click on any border and corner theYou bar and to dock it in a different Click on any move a floating toolbar Click on drag. move To display a missing orright mouseleft mouse the: mouse toolbar,anywhere on the missing toolbar.from the context-s right mouse neededanywhere on the Word window, choose the Customize commandchoose the Custom button toolbar, click any visibleany visible toolbar, and click on window, button on button on button and click left B Word the missing toolbar. Which of the following is NOT automatically saved with protectedpassword. sevenitcharacters long. without that p All documents are a true statement regarding default up protection? The password is case-sensitive. a A be by topassword, cannot be opened Once a document is password a only Passwords can The Linux operating systems is an protectiveof: public domain software.example open software. nonprotective open source sourcesoftware proprietary C software. The Windows operating systems is: open source software. public domain software. nonprotective protective open sourcesoftware. proprietary D software. Application on-demandon-demandutility computing. software. service providers offer: software. utility computing. B A(n) _________ offers software providerservice an as-needed basis to its clients over the web. best-cost provider on-demandWeb software on provider service provider application D _________ OperationalInformational systems customers and run a business in real time. are systemssystems interact with query systems used to Structured Office automation A The most common cause(s) of disaster is (are): of the above. power outages. hardware failures. floods. All D

52 A _______ hot backup sitecold is backup facility consisting of an empty warehouse with all necessary connections for powe empty dormant B 53 To destroy an object and free the memory space occupied by it, the keyword used is: Delete Kill Nothing New C 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

Field0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

Field1 Field2 Field3 Field4 Field5 Field6 Q_desc op1 op2 op3 op4 ans In integrated test facility approach the auditor should ensure that the impact of test transaction is subsequently elimi TRUE FALSE A In olrt the cpu should posses the capability of program interrupt interrupts TRUE FALSE A In system testing,test involves _______ BOTTOM UP TESTS HYBRID TESTSTHE ABOVE TOP DOWN TESTS ALL D All input records in a batch are normally of different types B TRUE FALSE In the planning phase gathering information and risk assessment will be done TRUE FALSE A Information TRUE collection encompasses logging the selected auditable events FALSE A Input controls are designed to ensure processing safety B TRUE FALSE Integrated test facility is a facility CODE REVIEW PARALLEL SOURCE of ________NONE OF THESE PROCESSING DATA APPROACH TEST C Internal tables are stored tables from which certain values are extracted for further processing and storing TRUE FALSE A Log analysers are _______ requiredETWORKNONE OF THESE HARDWARE SOFTWARE by the auditor N B Log analyzers is ________ AUDIT TOOL SOFTWARE ACHINE ACTIVITY D USED TO READ AND ANALYZE RECORDS OF MACH M SOFTWARE Log analyzer is a software used by auditor to detect virus B TRUE FALSE Mapping software is used by the auditor to list unused program instruction has veryspecific objectives TRUE FALSE A Master file configuration includes ______ REFERENCE FILEFILES TABLE REPORT FILE NONE OF THE ABOVE D All material TRUE application FALSE events that occur within the boundary sub-system should be recorded in the accou -oriented A Master file contains current records for identification and summarising TRUE FALSE B Metadata approach is _______ SYSTEM DATA ONLY C DATA ONLY APPROACH TO THE ITTO DATAALL THESOME OTHER DATA APPROACH IS THE APPLICATION ABOUT ABOVE Modeling is CAN BE VERY POWERFULPROVIDE THE TOOL a variety ofCAN ENABLE THE AUDITOR TO D software which _________ CAN ANALYTICAL ABOVE WITH USEFULON A NUMBER OF DIFFERENT ALL AUDITOR PROVISION INFORMATION ON TRENDS A EXAMINE One-to-oneTRUE relationship means a single entity to a single entity in a monogenus structure FALSE A On-line processing refers to grouping of transaction processing the same in one go from start to finish TRUE FALSE B On-line testing can be targeted for specific function carried out by programs TRUE FALSE A Operating systems are MANAGE HARDWARE machineABOVE RESOURCESinclude: SCHEDULEdevised to optimise the AND SOFTWARE JOBS ENABLE MULTITHE capabilities-the SHARING ALL USERD RESOURCE function Parallel processing is aOS AND ROM AND MICROPROCESSOR OS AND RAM concept associated with _______ and ________ OS NONE OF THE ABOVE C Parallelsimulation SYSTEM authenticate (A) AND (B) system REEL is there to SYSTEM the _______ BSYSTEM REAL BOTH DATABASE Prevention,detection,investigation and reaction are(B)OF THESE an auditor FUNCTIONROLE BOTH (A) AND the ______ of NONE B Any audit enable software may include _______ THE ABOVE COMPLETENESS ACCURACY AVAILABILITY ALL D Procedure driven approachAPPROACH __________ THE ABOVE TRADITIONAL of auditing is (A) AND (B)OF A LATEST APPROACH NONE BOTH Processing TRUE can be grouped into general controls B controls FALSE Program code analysisIDENTIFIESINFORMATION ON MACHINE USAGETHERE FOR FRAUDULENT REASON PROVIDES involves ______ DETAILEDEXAMINATION OF SOURCE CODEBE A PROGRAM WITH A VIEW TO FOLL PROGRAM CODES THE ABOVE OF NONE OF WHICH MAY C ProgrammeCOMPANYDATABASE implemented by the _________ code analysis is beingAUDITOR AUDITOR USING COMPUTERS ADMINISTRATOR D Public auditPUBLIC KEY trail is an important control in system thatOF THESE PRIVATE KEY DIGITAL SIGNATURE C NONE use __________ for authentication purposes Rdbms is a TRUE structured into a series of 2-dimensional table FALSE A Real time refers to the technique of updating files with transaction data immediately after the occurrence of the even TRUE FALSE A Reasonableness checking is OFCHECK OF SIGN TEST THESE TYPE OF RECORD RANGE CHECKS OF A TYPE TYPE NONE Recording transactionsFALSE TRUE in a controlled manner may amount to loss of stored data B Regular cross-system validation may minimise frauds TRUE FALSE A Application 4 controls can be categorized into _______ types 2 5 3 D Risk assessment is a phase of an audit TRUE FALSE A Risk assessment is theAUDIT THROUGH COMPUTERSTHE ABOVE AUDIT phase of ______ ABOVE OF B ALL THE NONE Scarf involves embedding audit software modules within an application system to provide continuous monitoring TRUE FALSE A Security audit can be done through oracle database TRUE FALSE A Security can be brokenDETERRENCEareas ALL THE ABOVE RISK AVOIDANCE into ________ PREVENTION D Sign test is TRUE of field checks on processed data a type FALSE A Snapshot isTRUE a software FALSEtakes a "picture" of a file or data or a transaction processing through the system which A Snapshot isAUDIT ROUTINE TECHNIQUE NONE OFof audit software a technique of __________ which is a part THESE AUDIT AUDITING A Source code review means _______ INEFFECTIVE CODE IDENTIFYING ENORMOUS CODE NON-STANDARD CODE IDENTIFYING IDENTIFYING THE ABOVE ALL D SpecialisedPREPARED BY may be _______ ENTITY OUTSIDE PROGRAMMER ENGAGED BY THE AUDITOR audit programs THE AUDITOR ALL THE ABOVE PREPARED BY THE BY AN D PREPARED Application TWO GROUPS into FOUR GROUPS controls grouped GROUPS THREE ALL THE ABOVE B Super computer are the largest and fastest and is very suitablefor commercial applicationincluding audit work TRUE FALSE A System development control, apart from others,include authorisation,approval,testing,implementation and documen TRUE FALSE A

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

System privilege can be checked by auditor TRUE FALSE A System security audit is an on site inspection ,which identifies potential securityvulnerabilities within an organization TRUE FALSE A Test data can be defined DATA USED FORUSEDPURPOSE PURPOSE OFTHE SYSTEM SOFTWARE SAMPLE OF as __________ THE FORUSEDOF TESTING CHECKING LOG FILES SAMPLE OF DATA OF DATA THE FOR TESTING THE APPLICATION PROGRAMME P SAMPLE ALL THE ABOVE C Test data pack is ________ STREAM OF DATA OF DATA THAT ARE GENERATED BY TEST DATA TECHNIQUE TOOLS STREAM BOTH (A) AND (B)OF THESE NONE B The contents of a field could determine _______ sign for ______ field INVALID BOTH C & DALID V NUMERIC B The move towards paperless edi would eliminate much ofA traditional audit trail,radically changing the nature of a TRUE FALSE the The streamTEST DATA are generated byDATA PACK called as the __________ of data that TEST DATA APPROACH TEST these tools OF THE ABOVE NONE is C The transition from manual systemABSENCE OF AUDIT TRAIL CHANGE IN THE METHOD OF RECORDING ACCOUNTING TRANSACTION USE OF ACCOUNTING CODESABOVE to cis environment bring dramatic changes including ALL THE D Ar=ir*cr*dr TRUE FALSE A The validation checks applied to a field depend on the fields logical interrelationships with other fields in the record TRUE FALSE A There are ______ types of approaches of test FOUR ONE TWO THREE data techniques B There are ______ types of control 3 2 4 totals 5 B There are _______ types of auditsTWO systems development process THREE FOUR of the ONE A There are ________ types of checks that can ONE FIVE THREE FOUR run when data is input through a terminal C There are _____types of checks frequently used in validating the data 4 2 5 3 A There are 13 system development phases while audit of the system development processes TRUE FALSE A There are four type of audit risks TRUE FALSE B Top down tests,bottom SYSTEMand hybridLEVEL TESTSTHESE INTER TABLE tests TEST up TEST TABLE tests are under the _______ category NONE OF B Tracing helps to analyse the change caused by viruses A TRUE FALSE Assembler language uses mnemonic symbols TRUE FALSE A TransactionTRUE file containFALSE permanent records take B relatively product profile,customer profile,employee profile etc. Transactions are not lost ,added,duplicated or improperly A TRUE FALSE changed is called as control over input Validation checks is applied to a field depend on the field's logical interrelationships with other fields in the records TRUE FALSE A Whenever monetary transaction are processed against master files,the update program should maintain a correlatio TRUE FALSE B White box testing focuses on finding if there are any defective execution paths in a program TRUE FALSE A White box approach is FALSE based TRUE program B With olrt where interactive data entry is available ,the master file associated with a transaction may be searched for TRUE FALSE A Audit around the computer is called APPROACH (B)OF THESE BLACK BOX APPROACH WHITE BOX BOTH (A) AND NONE A Audit risk cannot be viewed as a joint probability of inherent risk,control risk and detection risk TRUE FALSE B White box approach necessarily involves expert knowledge on the part of auditor TRUE FALSE A Audit software is a typeFALSE technique TRUE of audit A Audit software is used byON CLIENT'S ________PROCEDURES CARRIED OUT BY THE CLIENT'S PROGRAMS READ DATA the auditor to FILESALL TO THE AUDIT PROVIDE INFORMATION THE ABOVE REPERFORM D Audit software can be categorized 5 2 4 under ______ heads D 3 Audit software can be divided into ________ categories THESE TWO FOUR THREE NONE OF C Audit through can be done using simulation TRUE FALSE A Audit trail should be periodically analysed to detect any control weaknesses of the system TRUE FALSE A Audit with networking and database help is called _______ ABOVE WHITE BOX APPROACH THE ABOVE OF THE BLACK BOX APPROACH ALL NONE A Auditing is a form of attestation TRUE FALSE A Auditor canTRUE also check FALSE roles in oracle database software default A Auditor canEXAMINEfunctional capabilities of generalizedPROCESS combine THE THE QUALITY OF SYSTEM D CARRYINGEXAMINING THE QUALITY OF DATAto accomplish the task of ________ ANALYSING REVIEW audit software ALL THE ABOVE _________ FILE file managementTsoftware package thatC users and programmers organise data into files and Is the FILE-O-MANHE FILE MANAGER lets FILEPET Auditors can issue the sql commands to audit TRUE FALSE A Auditors can use profiles in their white-box approach of auditing TRUE FALSE A Auditors cannot use generalised audit software to extract B data needed for audit purposes TRUE FALSE the Auditors has to take care of the fact to link between multiple databases with one application TRUE FALSE A Base case system evaluation includes _______ THETHE CLIENT PROGRAM DATA FICTITIOUS DATA APPLIED AGAINST VERSION OF A FILE OR COMPARISON OF SOURCE PICTURE ANALYSING THE ABOVE ALL A PROGRAM Black box approach is specification based TRUE FALSE A Black box testing is ______ based and white box testing is _____ based BOTH C & D ARDWARE H SPECIFICATION PROGRAMA Black box testing seeks to determine whether application A TRUE FALSE output is what it is supposed to be Caat do notTRUE package programs, purpose written programmes,utility program or system management progra contain FALSE B Caat's are computer program and data the auditor uses as part of audit procedures to process data of audit signific TRUE FALSE A A sample size calculator program assists auditors in determining rand() function TRUE FALSE B

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

Caat's are computer programs and data the auditor uses as a part of the audit procedures TRUE FALSE A Case-is ________ COMPUTER AIDED SOFTWARE NONE OF THESE COMPUTER AIDED SOFTWARE C COMPUTER AIDED SOFTWARE ENGINEERING EDITOR EMBEDDED Check digit TRUE is a group of numbers added to a code for determining the accuracy of other digits with code FALSE B Check digit TRUE under field checks is a tool FALSE A Check digit FIELD CHECKS is a type of RECORD CHECKS AND (B)OF THESE ___________ BOTH (A) NONE A Codd's rule TRUE are being implemented on database FALSE B Computer assisted audit technique involves the use of computer through "black box " approach TRUE FALSE B Computer operation controls are designed toALL PROGRAMS ABOVE ORGANIZATION PERSONEL THE USE OF COMPUTERS BYANY CONCERNEDTO ALL PROVIDING ACCESSprovide OF THE USE OF NONE ________ TO COMPUTER D Computer security is frequently associated with confidentiality ,integrity and authentication TRUE FALSE A Concurrent TRUEinclude auditors as members of s.d team audit FALSE A A sequence check on the transaction or master file by anA TRUE FALSE update program is not required Concurrent PREVIOUSCURRENTthe ______ data that is THESE audit is taking care of ALL THE ABOVE NONE OF transacted DATA DATA NONE OF B being THESE Confidentiality,integrity FALSE TRUE and availability are the major security attributes to the auditor A Control total is under batch checks TRUE FALSE A Controls are present over many aspects of the computer system and its surrounding social environments TRUE FALSE A Controls are required for authorisation,to ensure data integration and to detect possible breachesin security TRUE FALSE A Conventional data entry giving way to scanner,digitised image processors etc. For auditing in cis environment TRUE FALSE A Core imageTYPE OF NETWORKSOFTWARENONE OF THESE comparison is a ________ used HARDWARE TYPE OF TYPE OF by the auditor B Core imageTRUE comparison is a type of audit technique FALSE A Core imageTRUE comparison is particularly useful where only executable versions are distributed FALSE A Critical review of the system of book-keeping,accountingand internal organizational controls. TRUE FALSE A A system could be ________ NATURAL/MAN MADECONCEPTUAL/PHYSICAL OPEN/CLOSED ALL THE ABOVE D Cryptographic techniques are the part of security audit A TRUE FALSE Data communication and networking would introduce newA TRUE FALSE audit risk Data from client application are not stored in the organisations database through auditable events and functions TRUE FALSE B Data integrity can be imposed on the database through dbms TRUE FALSE A Data reverse engineering process metadata to document A TRUE FALSE system and abstract business rules and relationships Data security in audit techniques can be done through three ways TRUE FALSE A Database analyser is aFALSE which provides detailed information concerning the operation of the database TRUE software A Databases are a key element in most business-related information systems TRUE FALSE A Ddl,dml,dcl-statementsFALSE exercised in rdbms TRUE can be A Deterrenece meance _______ THREAT BROADCASTING NETWORKNONE OF THESE A A system ehibit entropy TRUE FALSE A Dss has the following components MODEL BASE THE ABOVE DATABASE PLANNING LANGUAGE ALL D Dss is defined as a system that provides tools to managers to assist them in solving structural problem TRUE FALSE B Embedded TRUE audit routines are sometimes built into an entity's computer system to provide data for later use by the a FALSE A Embedded TRUE a software used by the auditor to examine backup code is FALSE B Embedded TRUE code performs a wide variety of audit tasks A FALSE Errors are correctedYEAR END ON QUARTERLY BASIS ABOVE AT THE :_______ IMMEDIATELY NONE OF THE B Event detection is an audit procedure TRUE FALSE A Event detection is the audit procedures TRUE FALSE A Examine the quality of data is not the task of generalized B TRUE FALSE audit software Examine the quality of system TASK OF THE AUDITORSGENERALIZED AUDIT SOFTWARE AUDIT TASK OF THE AUDITOR ALL THE ABOVE COMPUTERS AUDIT processes is _________ C AUDIT TASK OF THE USING A system means -totality TRUE FALSE A Field checkTRUE is exclusive to a field FALSE A File access GENERALIZED_________AUDIT NONE OF THESE is a function of AUDITUTILITY PROGRAM A SPECIALIZED software File access TRUE the functional capabilities of generalized audit software will be FALSE A File activity TRUEproportion of transaction file records that are actually used or accssed in a given processing run is the FALSE B File integration refers to the ________ of information fromB file BACKUPS RETRIEVAL ELETIONADDITION a D File volatility refers to the number of additions and deletions to the file in a given period of time TRUE FALSE A For computerised auditing,usage of sophisticated audit software would be a necessity TRUE FALSE A For small toC-BRAIN sized systems,individual BOUNCING BALL and individually tested and then assembled to be medium BIG BANG STUB modules are coded B

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

General purpose software provides a framework for highly complex scientific operations TRUE FALSE B Generalised audit software could be used by the auditor for identifying inconsistencies or significant fluctuations TRUE FALSE A A transaction file is sorted prior to the update of master file TRUE FALSE A Generalised audit software function include _______ AND FREQUENCY ANALYSES FILE ACCESS/ORGANIZATION ALL THE OPERATION STATISTICAL/ARITHMETICAL ABOVE STRATIFICATION D Generalised audit software never allow several files to be B TRUE FALSE read simultaneously _______ Generalized audit software consists _______ ADMINISTERED QUESTIONNAIRE OF DATA PROCESSING FUNC PACKAGE MATHEMATICAL CONCEPTSPERFORMING A VARIETY COMPUTER MASTER LIST TRANSACTION A PROGRAM FOR A Generalized audit software has infile capabilities for verifying processing logic TRUE FALSE A Generalized audit software has only limited capabilities for verifying processing logic TRUE FALSE A Generalized audit software permits auditors to undertake A expost auditing and not concurrent auditing TRUE FALSE only Generalized audit software provides the full set of arithmetic operators TRUE FALSE A Hash total is a type of _________ BATCH SERIAL NUMBER CONTROL TRANSACTION TYPE SEQUENCE CHECK TOTAL A Hash totals TRUE falls under FALSE totals control A

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

q_desc op1 op2 op3 op4 ans In Powerpoint2000 ,theautolayoutsslide presentationof the B are clipart & auto shapes and viewdesign elements built-in professional &none templates outline view above Selection handles are the 8 small ___________ that appear around the object, when an object is selected circles points squares icons C The _______ is an invisible matrix grid square image of vertical and horizontal lines that covers the entire slide workspace guide C _______ are drop-down menus that appear when the right mouse button is clicked on the screen element tool bars short cut menus shapes the above auto all B ________ and ______ & word art & view add a lot of visual impact into the PowerPoint presentation clip gallery slide show fonts &show have the ability to images the above none A _______ is wave file picture or any.video file file the above a motion media clip animation all B The user can use ______ to remove the undesirable part A thetool clipping toolcropping tool cutting tool scribble drawing image of The power presentation has box color scheme compatible colors color palette color a _____ for a set color guide C of The set three colors used for graphs and for secondary slide items is called as ascent tricolor scheme palette color primary color scheme A There are ______ types of charts available in PowerPoint C 10 28 18 36 _______ charts are useful while showing variations over a period of time column bar pie linear A _______ are the individual pages oftext images images andslides a presentation sorter C slide views A PIE Chartcircular is a ____ diagram that depicts the relationship between a whole and its parts radar doughnut all the above A Each individual piece of data in a series is called a/an entity data point data stream B PowerPointMicrosoft organization chart shapes launches an OLE-compatible application called clip art auto track changes A When the user organization chart isorganization chart editing in PowerPoint template the double-clicks on anthe chart window of object the chart is made available for the Cdisplaying a chart expandednone opensabove The _____ are used for selecting, editing and standard drawing tools box tools general purpose tools viewing objects in the chart custom drawing tools C Manager box toolto mange organizationalwindow is manager box for an existing box used in organizationalused tochart a to store the other tools of the organizational chart accessed only by manager chart create used C The customturned ontools are off not available in the toolB tool bar drawing turned _______ by default available in the bar Click on theonce tool ______ to draw three boxes of the above box twice thrice any C There are ____ defaultfour available in all boxes of the organizational chart two fields five eight B The _____ tool is used draw tool standard weall the above draw a table native tool in the same way as tool use a pen B to A/An _______ consists of smaller printed version ofof these autolayoutshandlayouts slide view none the slides B The size of zoom the object can be changed using the ______ tool reduce/enlarge preview none of the B above _______ is importing exportingwhich the slides in the current presentation are included in another presentation or the process through copying moving B ________ can be usedauto shapes art well as worksheets Microsoft excel to create charts as clip drawing tools A PowerPoint.ppt(PowerPoint) text .doc(document) can import .rtf(rich that have been saved in ______ format text files format) .html(hypertext format) B PowerPointnine outlines can have _____ outline levels only one six twelve C When a file.rtf(rich text .wmf(windows metafile) graphics and text are also saved along with the slide is saved with _____ extension, the format) .txt(plain text) .doc(document) B The hidden not displayed during the slide show slide showview slide is displayed only during only in of the A displayed the none outlineabove ____ effect DTS(digital 3D(3 dimension)during bransition D is used to introduce a slide a and ta slide show track sound) both A _____ is a special effect that determines how theshow A appear on the slide build transition slide show view objects The notes page ismaster notes formattedmaster on the slide slide based aster m master notes A Pick the odd man out of the following show slide sorter C outline viewslide view view view When a new presentation inches,7.5 ,powerpoint creates slides that have a width of _____ and a height of ______ w 15 inches,10 inches 7.5 inches,5 inches above 10 is opened inches none the B The default portrait orientation landscape a or b and outlines isA for notes ,handouts none of the aboveorientation ____ Build effect animation view show transition b or c is also called as ______ A Graphics for web pages are automatically stored in ____ format gif jpeg png none of the D above A _______ hyperlink jump to any slide inbuttonll the above is used to hypertext action the presentation a D The ______ language has been incorporated into PowerPoint visual c++ visual basicMicrosoft visual interdev for application above all the B In PowerPoint _____ isbatch file of templates add-ins executed in sequence macro a series commands that are A The macro while creating a .exe filetransitionslide show is C will be activated slidewhen the none of the run during above Developers virus easily add ____ toheader filesall the above the programming interface can checkers checkers spell PowerPoint 2000 by using A ______ determines thecustom show order inbwhich the slides will be displayed during the show slide show order in which a and none of the B both above _______ is slide pane notes and develop the pane pane presentation used to organize pane properties contents of a outline D If we save the presentation file as pro shop itpower pointD internet explorer shop a metafile, pro be opened using paint paint can 2000 With reference to autocontent wizard for creating a newsuggested for can addofof topics pictures PowerPointit is the quickest waysample presentations content and design creates a sample presentationatopresentation,awhich words and contains toprovides presentation variety the following statements are not true create which user D Which of the following statementinsert only pre-drawn, pre-coloreda separatewhichto the reflectedclipall thein thethe s user can insert objects userclip-arts, pictures stored in graphic images reflected in a reflected toslides us user can islike TRUE userpicture to the master slide files gets slides in arts not can insert can insert picture to the title slide which gets B all slide With reference to changingdrag ordernotes dragwhichview,C athe slidestatementnew location in outline view, thesorter view, pages view,location thelocation to a a newtrue in slide the slideslides,I slideslidethe following icon to is not location in of icon to the of drag new slide icon a new to drag Which of the following definitionsmeans applying special effects to the crossover between background items that us the slide that holds the designtrueplaceholdersD holds the formatted placeholders for the title and sub-titl transition are not templates is the template whose formatand any the slides user applies to formatted the slide thatfor the titles, main text and color scheme Which of the following pages view useruser canselect thecan be reordered in the outline view with notes statements are not truethe slides miniatures and handouts a to the slide complete with text in outline view, can prepare speaker notes of all slides text presentation, user should see the slide view to add the in B

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

Which of the following definitionsmeans applying special effects to whose format and colorbackground items thatto a the slide that holds the designtrueplaceholdersD holds the formatted placeholders for theuser and subtitle transition are not template is the templatetitles,crossover between the slides title applies us formatted the slide thatfor the the main text and any scheme The optionsslide layout customize new slide set up show include available in the common task toolbar does not B With reference to chart, which of the following user can addwindow onand gridlines to datasheet data to be graphed resides in a datasheet chartare notlabels the data in the the chart by default, doughnut chart in a window based data is plotted is displayed statementsB data true The format thethe text entered inmaster subtitle, orformat slide object is determined by the format settings in a spec of master slide the slide a the header slidebulleted-list title, the B PowerPointoffice assistant checker searches the entire presentation i.e., all the text objects in all the slides, outl provides a spell _________grammar checker the B that none of above PowerPoint's drawing toolbar contains _______ drawing tools 10 12 102 22 B Click _______ on the rectangle drawing tools enables us to draw multiple rectangles once twice three four times B An example text, graphics and email multimedia presentation could include video and sound. of the components of a address.digitalhypertext, Power Point, text, hypertext and Power Point. D and sound. CD-ROM, text, camera Which of the following formatting elements can be applied to a PowerPoint diagram using the AutoFormat tool? the Line style Line color Font and thestyle,alignment text font, and text alignment the the Line text Line color, D Which of the following formatting elements can be applied tocolor, and Linediagram using the Format AutoShape co Fill color Line color Line thickness color, Line a PowerPoint thickness Fill D What happens when you popup box promptsGraphaisan existing Excelis deleted. presentation? Excel is started so that Microsoftcreatefor chart.C so that you canto insert. graph. A double click acan you graph placeholder PowerPoint you blank graph placeholder in a chart create a The started The legend always taken from the first rowthe datafirst columnuser. the data in the datasheet, depending on whethe in a Microsoft Graph chart is:from first columnthe datarow of datasheet. always taken from of the in the datasheet. taken entered by C or in of Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best chart type if you Side-by-side columncolumn Stacked Pie chart Line chart B Which of the followingthe Insert menu andyoubutton on a the Insertselect the appropriate Object. the Insert Chart but Pull down actions will enable selectinsert the Standard toolbar. select Chart, click Click the Insert Chart the Insert menu and menu and Pull down to Chart. graph into a PowerPoint presentation? Pull down D If you are editing a slide containingPullobject, the Edit menu,View Datasheet button on the datasheet?slide is finished It automatically displays a Microsoft Graph, how do you display the underlying Standard toolbar. Click the chart Slide view. click the then select Object. datasheet once the in down then cannot B You display the underlying How do youSingle click Double click the chart. Change to Slide Sorter view. after you have finished creating the char deselect a chart that has been placed onto a C the chart. Click outside the chart. PowerPoint slide What happens whenbox is displayedis displayed allowing you windowof the Excelof the Excel that should thatlinked tob A dialog you dialog box allowing button savedDMicrosoft Graph toolbar? closed to open (or be should t A click the Datasheet you is on thetheto separate file. from The datasheet to enter as a enter is toggled worksheet worksheet from open The datasheet name the name What happens ifchart single chart a The chart isThe application that created the chart is started. The you isThe click ischart that doubled in A active? selected. deleted. not currently size. What happens ifchart double click isThe chart isMicrosoft in D active? The you isThe chart a deleted. isdoubled Graph will restart. selected. chart that not currently size. Using customslide one bullet itemsat a time. atone word at a time. at a time, build bullet items a letter at a time, an a animation effects, you canitemsa a time. D item bulletletter slide one bullet item one build: Which of the following animation effects can be added to a slide? Exciting Subtle Moderate Exciting Subtle, Moderate, or D Which of the followingexit in from top orenter andadded toCfly inexit; neither fly in from top nor bottom Enter and animations effects can be exit,enter nor from top or bottom Fly Both bottom Neither anda slide? Which keyboard key is Shift to select more than one picture on a slide? Enter used Alt Ctrl B Custom animation can whatappearaffect slide. Custom animation can be used to affect the way objects appear on a the way objects objectson way objects exit a slide. slide. be used to the aafter they appear on a do ONLY: D Which of the following best advanced timelinesequence inC timelinethe effect applied toobjects will appear objectssw The advanced timeline Thethe information the durationobjects will neither the the slide. in which on the The describes advanced timeline shows the sequence in which sequence shows the The advanced shows that appearsof shows appear on each object. which on the advanced timeline? Which of the following objects can Text Clips Organization charts custom animation effects? contain Clips, organization charts, and text D What type of program allows an object within an image toA edited without affecting other objects? Paint program program Draw Filtering program Animation program be Which of the following animation effects can be added to atop, and Dissolve in Fly in From top Dissolve in Fly in, FromD slide? Which of the following is entered itis entered itchanged. no Binto Datasheet.Datasheet. Once data Once data Data cannotcan enteredsuch thing as a TRUE regarding the Datasheet? cannot be There ischanged. be be Graphical software tools that provide complex OLIP. OLTP. OLAP. OLST. analysis of B stored data are: Which of the following statements is TRUE regarding PowerPointbut not diagram and thein ofOrganization chart. diag You can changecan changecannot You cannot B of of whole individualboxes an a diagram. of a You the appearance ofchange the change diagrams? the lines in individual shapes chart. You both the appearance a the color of a whole diagram, style connecting shapes an Organization Which keyboard key combination is used to undo the previous command(s)? [Enter+A] [Shift+Z] [Alt+Z] [Ctrl+Z] D

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

q_desc op1 op2 op3 op4 ans Microsoft visual basic project file has _______.frx extension. .vbg .vbp .frm file B In visual basic, _______ method isloaditem add an item inB combobox add additem used to none of the above a In visual basic, _______ method isaddpicture none of the B load loadpicture used to load picture during runtime in an image control above In visual basic, to populate a drive list box with=aDir1.Path B box __________ statement is used Drive1.Drive=Dir1.Path Drive1.Drive directory above Dir1.Path = File1.Path none of the list In visual basic, to display a message in the run timeof the C messagebox() message() msgbox() none _________ function is used above In visual basic, to populate a directory list box= Dir1.Path C box ________ statement is used Dir1.Path=File1.Path = File1.Path File1.pattern=Dir1.path Dir1.Path Drive1.Drive a file list with In visual basic, ________ is a property of a recordset object which counts the number of rows in a recordsourse obj openrecordset opendatabase recordcount ount c C In visual basic, using a append update data control, a record can only be C addnew additem added from the last record. Adding a new record is only po In visual basic, using a update append data control, a record is saved to a recordsource object using _______ method of a records additem addnew B In visual basic, using a movelast moveprevious the previous record ________ method of a recordset object is us movenext data control, to navigate to movefirst C In visual basic, when a movelast,true reacheseof,true record, _______ property of a recordset object is automati eof,false record pointer movelast,false the last D to In visual basic, the explorer view ofwindow is displayed in ___________ properties window form layout toolbox a project project explorer D In visual basic, when a movefirst,true reachesbof,true bof,false record pointer movefirst,falsethe first record, _______ property of a recordset object is automati to D In visual basic, _______ is a method to convert a string into integer. value() int() number() val() D In visual basic, in a shape control, square circle rectangle a vb statement gives Shape1.Shape = 2. What type of shape should we get? oval D In visual basic, a timer false is only available in timer control. true event A In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any object true false A In visual basic, _______ is a property of a textbox control C set a color of a text. fontcolor color forecolor none of the to above In visual basic, _______ property of a textbox none ofis set to _______ to underline a text underline,true fontunderline,true textunderline,true the B control above In visual basic, _______ property of a textbox fontsizeis used to change the size of text. textsize size foresize control D In visual basic, the interval property of of timer one-tenathousandth of a second one- millionth of a second a a second of is second ________ one-hundredth one-thousandth control given in C In visual basic, _______ property of listbox control counts D number of items in the list count recordcounttemcount listcount i the In visual basic, the properties of window controls can be set using __________ form layout prperties various explorer window project toolbox B In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a messagebox function. title prompt vbmsgboxstyle of the C none above In visual basic, ________ is a function which displays a message and it also allows the user to enter values in a form msgbox() textbox label inputbox() D In visual basic, using a opensnapshot________ is a recordset type which allows to add a new record and also to upd opendynaset data control, dbopensnapshot dbopendynaset D In visual basic, while closing a form _______ event of a form object is triggered earlier to terminate event. load activate unload initialze C In visual basic, to give a backcolor transparentgraphical to a command button can only be done if we set the style standard opaque or to bring in a picture D In visual basic, a method RGB(255,0,0) will generate _______ color blue red green black B In visual basic, a method RGB(255,255,255) will generateD red green blue white _______ color In visual basic, if a user uses a shortcut key ctrl+R _________ window visible. properties window form layout toolbox window project explorer becomes D In visual basic, if a user uses a function key F4 _________ becomes visible. properties window form layout toolbox window project explorer window A In visual basic, when a lostfocus text receives the focus D change textbox control gotfocus ________ event is triggered. In visual basic, a form is a ________ object. none of the C child parent container above Microsoft visual basic is a Rapid Application DevelopmentA true false tool. In visual basic, when a unload load form objectinitialize on the screenD appears activate _________ event is triggered. In visual basic, to display text on a caption text name label objectnone of the Cproperty is used _________above In visual basic, _______ object is used to access the database and also to manage the data in the database. opendatabase dbengine openrecordset of the B none above In visual basic, when a visible enabled checkbox control is checked _______ property is automatically assigned with 1. value style C In visual basic, _______ keyword is used to declareof variable dime dim var none a the B above What is the.ctx extension of the Visual.ctr .ctl Basic project file that stores the design of a user control. .ocx B Which event of a text box would you use for validating theA Validate Validation Check Audit data entered by the user? Which of the following statements forces inline error handling? Next On Error GoTo Error GoTo Error Stop Error Resume On linelabel Inline On On D The _______ method resets the contents of bound controls to their original values when the user clicks on the canc UpdateControls PaintPicture Refresh Resize A To deactivate the FormCancel to event, you make the following change to value value definiton: Cancel parameter parameter to value UnLoad a UnloadMode parameter to a non-zero a zero non-zero 0 UnloadMode parameter in the function A How many root nodes can a TreeView control None of theD 1 2 3 have? above A project group is a Project which: ConsistsApplicationsForms AndProjects Consists of ConsistsPrograms of Consists of D several of several Various several Code Modules ProceduresForm window, _____ areor code moduleprocedures declared in a ______ are available to the whole appl declared inProject window, view codecode theA a standard local whereaswindow above Class module, of module None How can you keep the user from exiting event None of theB Close button? Place code Place code Place a form by clicking above in the Terminate code in the Deactivate event in the Unload event the The _______ property enables Visual False toPaintPicture AutoRedraw = True Refresh AutoRedraw = Basic draw complete images in memory before displaying them on the Scr A You want toMsgbox err.no & err.text description of anerror.numberwould be the correct syntax? display theMsgbox err.number error.number & error.text & error.description code and the Msgbox & err.text error. What Msgbox D

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

What is theTo display images to the user athe editing of icons purpose of To help in creating ToolBar the Image List allow To provide a repository for images used by other controls To Control? D Which method would you use to get a free or unused File A FreeFile GetFileNum GetFile GetBytes identifier while opening any file: Which property procedure is used GetProperty value of B property? Retrieve Get to retrieve the Value a Which of the following can bedialog box theWindows theD Common messages passed to user using Open shown to Windows explorer Input box Common Dialog control in VB? Which of the following are not properties of Command Button: Caption Visible Multi-Line Font C Which events enable KeyPress Click and you to determine which key was pressed by the user? Click, KeyUp and KeyDown KeyUp and KeyPress, KeyUp and KeyDown KeyDown D In order to access a fileBinary Format format, Output mode Ascii Formatin Non-textual Mode you have to open file in: Input B Visual Basic displays and CurrentYScaleHeight and ScaleTop value of two properties of the form, called: CurrentX information and ScaleTop and y current ScaleLeft depending upon the x A Which of the following procedure types will execute when C assign a value to a property of an object? Property Get Property Assign Property Let Property Set you In order to overlap the controls (say a command button) during design time, we use the Send To Back or Bring To Background color property Caption property property ZOrder AutoRedraw property C Which property of the ProgressBarValue Min Max determines how muchB the bar is filled? CurrentVal of The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program. Shell Substr SetAttr CStr A The captionAre one and the be different at times properties and the name properties of the command theB Can same Are actuallyNone of button: not above You try to initialize a new Object variable with the followingaccess the class an error. What could be the possible cau You do not You do not MyVar has not beentheCline but receive need to usehaveSet command hereabove the the permission declared None of to Which of the following method The Open will perform The ExecProceduretheD The Exec method execution ofmethod a direct None of a Command object? above The vb Critical symbolquery iconmessage iconNone of theB A warning displays: An exclamation icon A critical above vbYesNo is statement. variable. intrinsic constant. procedure. an example of a(n): built-in C The primary difference InputBox the MsgBoxfunction can InputBoxcan be thestatementthe macro recorder, while stat MsgBox statement returns a value, while theand created with creatednot. the: between function returns a value, be thethefunction does with does not. InputBox statementstatement MsgBox macro recorder, while the MsgBox the MsgBox while InputBox function is B Which of the following isbe entered into can form. form (i.e.,box canwhere the Protect Form button on the Forms too Data cannot TRUE aboutbe protected The form can a the be entered. C a form be added. Data modified. A new check Which event is triggered when the Deactivate Terminate C Unload QueryUnload user moves to another open form? To deactivate the FormCancel to event, you make the following change to value value definiton:Private Sub Query_U Cancel parameter parameter to value UnLoad a UnloadMode parameter to a non-zero a zero non-zero 0 UnloadMode parameter in the function A

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

q_id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51

q_desc op1 op2 op3 op4 ans _______ is Word 2000 Office 2000Office 97 Backthe office 2000 family a word processing that is a member of OfficeA The featureclick-n-typedouble to type anywhere in a of the A that enables user clickdrag & dropnone document without pressing or tab above The______office clipboardthe userselect and paste uptoabove feature allows cut to copy none of the A12 items at the same time in an application ______ andshift+end and shift+homeshift+rightnone selection by one character on the left and right _____ keyshift+left and will extend ctr+home B combination ctr+end and the of the above _____and_____layout, normal layout, in layout, 2000 of the A web are improved layout web layout printlayout web Word none layoutabove page The easiestwizard create a document in wordnone of the A MSWord from the task menu way to templates click from start program, is above In Office2000 environment the tooldocument assistant the A for us is_____ office assistant assistant makesnone of inbox that work easier above A short description Tip Tool Tip button called the ______ Tip Screen of a tool bar Icon Tip Document is displayed when the mouse pointer is allowed to stay for A The _____ helps us to marginal stop the margin of thethe B tab stop keep track of ruler none of page above The keys that are usedpage up keys onlyandheaders and D arroware up arrow keys navigatehome to only between end and down up keys only footers Pick out theleft element from the following that dose not formD type of tabs for the Word 2000 center decimal rotation the _______are blueprints model template or patterns dialogs/alerts of of certain type for documents a the B none above The______increasefor decrease indent A and none of the Cusing the mouse is used indent quickly setting paragraph indentionabove both B Word art is special effect text with control tool design wizard box pictures A AutoShapes in wordtoolbar created by accessing the _____ drawing can be box database forms control A By default, a document2 1 consists of_____ section 0 11 A The dialog box that is used to setup from the documents margins is page setup printer determine the filefromof the above from the file print preview menu file none the A ________ is a box surrounding a page on all slides of the A that sets off a paragraph on one or more slides border shading style box none or a line above The key that is used to Del ctrl+a perform a task to select all t he text in the documents is ctrl+f ctrl+m A The key that is used to Del ctrl+a indent a paragraph is ctrl+m ctrl+f D The key that is used to CTRL+O CTRL+SHIFT+S CTRL+SHIFT+F change the font from the current positioned in a document is CTRL+SHIFT+P A The key that is used to ctrl+o thectrl+shift+s ctrl+shift+p that is from that normal to heading1 or heading1 to other d ctrl+shift+f change style of the document C ______ is the default view in WordPAGELAYOUT EditingA NORMAL ONLINE LAYOUTfor typing used ONLINE DOCUMENT and Formatting the Text The short-cut-key that is used to indent a paragraph spacing in the documents is ctrl+m ctrl+2 ctrl+end ctrl+home B The short-cut-keyor insctrl+c or insctrl+x or selected text A ctrl+v that is used to paste the insctrl+v or Del The short-cut-key that is used for paragraph spacing(1.5) B ctrl+2 ctrl+5 ctrl+1 none of the above The box that separate text from the documentBorder Text Box Frame AutoShape and allows A to behave like an independent object is known as it The object that is used Screen Tips Header and to provide information like the title A the book, name of the chapter, page number etc. Footer Page Layout none of the of above The object that helps us analyzing Auto Shapes Chart WordArt data statistically is known as File A To highlightBorders parts of a pageWordArt apart from theD certain Shading to set it Bullets rest of the page we make use of the following features To clear all clear the tabs in a documentremove remove all the option that isall clear clicked from the tabs dialog D The dialog box thatbullets dialog box picture is used tobulletcircle bullet none dialogA our documents or web pages is arrow incorporate box dialog boxinto dialog picture bullets box The object that composes of set ofAutoShapes helps to create and work on different shapes like rectangles, circles, charts WordArt tools which files C When worddoc1 is opened a new documentdocument document1 new called_____ is displayed, where the user starts typing the content right way default document B ______ is an online dictionary maintained by word to obtain synonyms for words thesaurus hyphenation mail mergenone of t he above A The thesaurus is invoked by pressing_______tools+spelling menu shift+f7 thesaurus menu shift+f8 A When a new table is created the insertion point flashes inAtheable first second first row last cell of the t _____ By pressingtab _____ end inserts enter rownone of the A row in the table the key a blank after the last above The ______ option enables us data to table format of the A convert textconvert to convert text into a table format to table table auto none optionabove A table consists of ______ thatcolumns text or none of the B row rows & contain records graphics above The _______ option in AutoFormatstyle user to automatically correct misspell words as and when they are typed AutoCorrect word allows the gallerynone of the A above ______ is aMail Merging acro recording andnone of the Ba sequence of keystroke facility thatM enables Data Source replaying ofabove In Word Macros are written inbasicvj++ basic visual _____ visual FoxPro B In Word 2000 the macro dialog box is activated with the help of ____ key combination shift+f8 shift+f7 alt+f8 alt+f5 A ________showslayoutaview layout view look like when published on the web or on an intranet web how online document would browser none of the A above ______ is aemail clientoutlook express soft outlook messages software for sending and receiving e-mail micro hotmail A ________ishtml coding xml the system used to create vb script A sgml web pages The network that makes information easily accessible across various networks is _______ internet intranet arpanet LAN A Which of the following must be listed in namesthethe header source must match headernot beformustsource samein field name statements are falsein a inreferenceof fields names headerany merge the data paragraph a the field separators same ordersource and the data source can source a you'vethe field the with numberBthe correspondingthe row source set as bemerge header as to the use of a in information in fields mail inserted With reference TO possibleWHICHby default FOLLOWINGoption allows of ARE falsethe selectedor a column or of a ta it is not TABLE format option appliesheight and weight option a table to all the rows rowscolumns shift auto to change the height of onlyentire table andto appliesthe entire row and or columns of OF THE cell to the selected rows not only to delete cells CSTATEMENT delete The alignment available for tabs does not include left decimal justified top A

52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

Which of the following statements type headertoSectionthe in thepage of asection of columns certain pageapplicable t A new sectionorder to related to a ischangeBreakportion of number then thesectionheader is inserted afte In is created a a header section properties like the document a same break is formatting If in order A insertedisthird second document in which from D are True a The user can set a spelling checker to skip the marked part of the next true false A New option true the file menu of word creates a new blank document that is based on the normal templates under false A The user can split the screen only into two parts true false A The features that enables the userDouble Clickgraphics tables anywhere in the document without pressing enter or drag & dropclick -n-type to type textnone of the B above The user can modify the picture from the clip art true false A With reference to auto prohibits the user from with t he capsauto are false errors turned on reverses the case of the automatically corrects common following statements correct entry correct which of the typing, spelling errors key accidentally automatically correctsan lock renaming the grammatically B With the reference to password protected documents which of the following statements as read only password can not include spacesare not case B be upto 15 characters long are false password protected document can sensitive without password password password can opened be The alignment available for tabs does not include left justified hanging top A Which of the following statements are False documents files can in the current document document the current doc a .ppt file candocumentafile can be an .xls dataB current inserted in at specified position a not not be inserted atinserted in position be document the single position in multiple specified the not be inserted at specified can Drop Cap tool does notfalse for the contents in the table format true work A The user can split the screen only into two parts in MS-Word true false A The specialtrue symbols that are inserted using "insert symbol" option of the word can not be printed by the printer as th false B The "formattrue columns" option allows to create columnar text up 12 columns only. false A The document that Document user to organize and of the A a long document, such as multipart report or a book co Master makes the Child Document Hyperlink Document above none maintain The view that enables us to view how objects will beof the B Print Layout ViewLayout Page Outline Layout none positioned on the page when it is printed above The mode that is initialized or toggled to if the none is in a A Insert Mode Type Over mode Remove user of the position to overwrite the text in the word above Veena is entering the return key tab key the escape keytyping When the cursor gets to the end of a line, what is the press a paragraph in apress processing program. press the word just keep D How are data organized in aand spaces and width and columns layers and planesspreadsheet? lines height rows D Which key moves the cursor to the beginning of the next line of text? tab enter/returnbackspace/shift delete B Veena typed the following sentence: "The girl was very beautiful." In which word processing utility could she find a s grammar checker spell checker thesaurus outliner C Using an electronicpublic messagesend a frienddo all of theone topicfriend which one? send a bulletin board, Seema cansend a package to a except send pictures to private messagesDfollowing to friends interested in to a friend Aryan has created a ten-page story, but only wants previewthe first two pages. What printer command should he se Print all From ___ To ____ Page setupPrint to print B What process should be used to recall a document savedC Enter Copy Retrieve Save previously? Which is used to indent text within spacing closing tabbing a document? sorting B Desktop publishing is agraphing word processing which C the following types of software? database more sophisticated form of spreadsheet of What is a Word Processor usedand editing documentstheB To analyse Creating for? figures Storing information None of above What is a picture that is saved on a diskette and can be pasted into a document? subscript annotation clip art clipboard C What is a Word Processor usedand editing documents B To analyse Creating for? figures Storing information Calculations Making What basic Clear,wouldSpelling, grammar and Font, and clear Bullet and Numbering tools replace and select Edit menu of Paragraph, you find in Cut, copy, paste a word processor the autocorrectC What is a header in a document?every page appear at the top on every page Text at the bottom of which appearDesignatedC Numbers Text which on every page of the document area What hardware is essential for processingmonitor and printer Mouse, printer and a word? system keyboard? Keyboard, Mouse, keyboard and B Monitor, None of themouse above The user could take a picture frommicrophonedigitalinsert D into the document by using a Browser clip-art file a magazine and scanner it What basic Clear,wouldSpelling, grammar and Noneand clear tools replace and Toolbarscopy, paste of theC you find in Cut,Edit the autocorrect above Assume you are creating a two-column newsletter. WhichB 6 point 10 point 15 point 25 point type size is the most reasonable for the text in the column Given the default left and right margins, and -inch spacing determine. 2 inches. 2 inches. 3 inches. impossible to between columns, the width of each column in a two-co B Assume you have made all have not insertednotcolumn section break.. boxduring editing;cannot see any columns You are notYou appropriatehave a specified A displaydialog in Print Layout view. Word cannot You selections in the Columns columns in Word, but you will see them only w continuous section breaks. While word to store a fileinstore ahardon following leave an Dwould the originaltext in placeanother location copy elsew processing, on the ofto move a section of text from Tom use the "Copy"to while pasting a to which file drivediskette the a to situations original section of location command? What does Data about Mainly text A set of different graphics a documentacontain? set of similar things None of theB above Before submitting your Spell Checker to find Checker Replace Thesaurus work you want Grammar any words spelt incorrectly. Which of the following would you use? Find and B What command in a word-processing program can be used to change the word him to her, and also the word he Paste Replace Select all AutoCorrect B What edit commands wouldthen paste insert a paste then Afrom one document into another document, while still kee Copy, then Cut, you use to then paragraphpaste paste Delete, Insert, Which of the following statements wouldchance toaaccept Cforprocesschanges fromrevisions into spend document wit To give the To give the To complicate the revision reject suggested on one documentWord morethe revi original author a NOT To allow multiple peopleandwork changes from thein collaboration wi original author reason to showing to to force the author a person who enter be chance suggested suggested the person who entered time m Which statement is NOT red underline appears beneathinD left margin in added.box at the has been made at that po A line appears through A verticalis to be deleted. Word document? a change right of the document. A true regardingthat line outside the that is to be a text text revisions made text enclosed signifies Comments are a How are suggested changes menuThrough toolson an ChangesTools menu and the Reviewing toolbar Through the Edit entered for review Track initial the command command Through theby choosing by through Word document? Tools menu onchoosing Track toolbar Both the Reviewing Changes D Which of the following is TRUE about saving a documentyou toallow you toallow document,versiontwoa including any The Versions command willVersionswillVersionswill the Versions command? a document,versions of ath The Versions command command command will onea you toof including any changeswit The allow you toallow A The save multiple versions of versionone only of document d using save only save only save What happensversionsThe latest document and second versions usingopened automatically. All when you open a version is that has automatically. is the Versions command? are opened automatically. previous version opened automatically. The first opened been B The saved are You have used the word discover Spelltimes in an English essay you have created using a word processing progra Dictionary Grammar check checkThesaurus A four When opening and workingmost multiple will and will appear at the tellsaved.yourecent version ofmost recent version? Word displays a with recent version timesname filethebottom most saved each version. The list of the dates show ofis notA of to how canwho tell which is the a document. Word versions the each Word a document, personof the list. able was the Various fields are added to a regular document to create a special document called a form through the __________ Fields Tools Forms Insert C Which of the following types ofbutton CANNOT be inserted into a form? Check boxes Toggle fields fields A drop-down list Text B Which of the following is TRUE related to editing comments inbe Word document? by left clicking the highlighted tex Comments Commentsedited. be deleted. edited or a editedby right clicking the highlighted text. cannot be Comments Comments C cannot can be can deleted or deleted

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155

What is a header in a document?every page appear at the top of every page Text at the bottom of which appearNone of theC Numbers Text which on every page above In your English essay you notice that theand paste. at theD Press tab. Press Return. Copy paragraph page break. of page 1 continues on to page 2. You would like Insert bottom Tables in a text. document help you to easily arrange all of the C graphics. forms. numbers. following EXCEPT: To identify a document, it is helpfulfind/search.macro.name on each page as a header/footer. bibliography.to include the file A Which of the following tools will copy the formattingaction C not text to other places? Copy button Paste button ormat Painter button is F This of selected possible. What is theFault Finding process of determining the cause of errors in a macro? name of the Bug Squashing Injecting Error Debugging D Drop caps are added to a Word document using the ___________ menu. Insert Tools Format Edit C A reverse in a newslettersection ofthe guidelines used letter of each sentence beginning of a of the newsletter will go a section ofa is: text on a black background.establishletter at different elements paragraph. are upperca white text where an enlargedAcapital where the is lowercase and the rest the first to A pull quotesetting itemphasized by: capital letters. is best in larger type or font size. changing the color. typing it all in underlining the text of the pull quote. A Which of the following definitions is is a quotation dark wordon (pulled)background. document.when it should have a The reverse technique ACORRECT?grid a textD thathorizontal andlowercase letter determine the place A pull quotemeans to add takenafromof light from another lines that dropped cap is is set a starts with a vertical A Pertaining to newsletters, which ofof each column columns changed using the Columns command dialog box? The width of each column followingof tab spacing within each column The height The number cannot be the The D As related to type size, 10 many points are there to the inch? 6 how 12 72 D Assume you are working on a newsletter in which the masthead extends across the top of the entire first page. The One Two Three Four B Which of the following is NOTCtrl+Shift+Enter break. Shift+Enter tobreak. section breaks? Press Ctrl+Enter tocorrect with respect to page, column, and a line break. Press create a page Press Press Enterto create aacolumn break. to create C section force Which of the following wouldpointsA most font pointspointsD a at 45 pointsheadline? A serif font at sans serif font atappropriate serif for newsletter A 10 be the serif 10 at sans font font A 20 Which of the following is the default Word column width? on the left and right margins, and how many columns are s 2 inches 3 inches 4 inches It depends D

156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

Question Options A B

0 0

C D Question No.

0 0

Answer

Q_id AC64 AC65 BC 113 BC 114 BC 114 BC 115 BC 116 BC 116 BC 117 BC 117 BC 118 BC 118 BC 119 BC 119 BC 12 BC 120 BC 120 BC 121 BC 122 BC 123 BC 124 BC 125 BC 126 BC 128 BC 129 BC 13 BC 130 BC 133 BC 134 BC 135 BC 136 BC 137 BC 138 BC 14 BC 14 BC 140 BC 141 BC 142 BC 143 BC 144 BC 145 BC 146 BC 147 BC 148 BC 149 BC 15 BC 15 BC 151 BC 152 BC 153 BC 154

Q_desc Op1 Op2 Op3 Op4 Ans In an accounting information disbursements.of Payroll transactions. computer files most likely would be a master file Inventory subsidiary. Cash receipts. following types of Cash system, which the A Which of the following is anproduce a moresetEliminatesat producingstatements. Does not requireadvantage beamore efficient of financial for transaction processing over a manual syste Will as stringent a computer-based system reconcile statements. Will of accurate set the need to financial control accounts and subsidiary ledg of internal controls. C Which of the following is not the component ofAGP Card B NIC Card VSAT RAM a CPU A trailer label is used on a magnetic Number it is the lastand end-of-reel code Record Count Identification tape file, End-of-fileor more fields Control totals for one B record and summarises the file. The following is an inform Hard copy is a termon a hard board Writing used to describe...? information on the hard disk Printed output Storing None of above B What do the abbreviations VAB stand for audio board above Voice activated broadcasting Voice answer back Visual None of C What control wouldcheck the accidental erasure of customer information from a magnetic tape Validity prevent Boundary protection Limited access files File protection ring C What are the individualPixelswhich Pixies up a None ofon the monitor screen called? Coloured spots dots make picture above B Header label normally include all thenumber Batch TotalD File Name Identification following except the Reel Number A daisy wheel is a type Storage device Printer of...? Pointing device of above None A Which approach or Logs System technique is Security usually associated with microcomputers Physical a control Log ata Dictionary Console D B An impact printer creates characters by using...? andabovehead Electrically charged inkAn inked ribbon of print An ink pen None C The best security control in aaccess Restrict physicalonly unremovableenvironmentA to Use microcomputer Make duplicate copies of files Require user passwords media is What wouldA pen you NOT use with a flatbed plotter? Paper Eraser None of above C What do you need for an drum printer? A cartridge A ink jet A ribbon A cassette A The greatest control exposure in a CentralisedDistributed policies or procedures Separation Centralised microcomputer acquisition Disposition of of duties function for function forA PC environment is the lack PC What do you need for an drum printer? A cartridge A ink jet A ribbon None of above A A laser printerprint head laser beamn INK RIBBON of above A does NOT use? A A None C The amount of data that a disk may containcapacity ofas the disks...? Volume Size Storage is None above known C You can ________ protect a floppy disk. and Write of above Read Write Read None B Information Magnetic tape isdrive Floppy disk None of a...? on a hard disk usually backed-up using above PAN A Magnetic tape is a...? Random access medium Serial access medium A parallel access of above None medium A Hard disks can have a 20 GB capacity in the None of above 1.44MB storage 700MB region of...? B Which storage device has the largest capacityNone of above A CD-ROMA floppy disk agnetic tape Mb? M in storage C Which storage device cannot be erased? tape storage A A CD-ROMA floppy disk agnetic None of above M You can ________ protect a floppy disk and Write Read Write Read Not B Where should a sunny By magnet objects By floppy disks be stored? drawer None of above window In a C The contents of these chips are lost when the None of above ROM chips RAM chips CDROM chips computer is switched off? B What are responsible for storing permanent data and instructions? RAM chips ROM chips DRAM chips None of above B Which parts of the computer perform arithmetic calculations? ALU Registers Logic bus None of above A What are small high speed memory units used for storingB CPUs Registers Control unitNone of above temporary results? How many bits of information can each memory cell of above 0 bits 1 bit 8 bits None in a computer chip hold? B What type of computer ROM chips CACHE volatile?of above RAM chips chips are said to be None A Magnetic tape is a...? Random access medium selective A Serial access medium A parallel access medium A access medium Software can be divided into twosoftware and application software Network software andareas: software ofand B Systems security software the games software Business None above Travel agents use this computer computer Supercomputer Personal system whencomputer flights Mainframe None of above reserving B Which computers are computers weather forecasting computers Notebook used in the Jon Von Neumann industry? Supercomputers None of above B Vacuum tube based electronic computers are...? of above First generation Second generation generation Hoover None A Which generation ofgeneration was developedNone microchips? Second computer First generation generationof above Fourth from C Which generation ofgeneration uses more than one microprocessor? Second computer Third generationgeneration of above Fifth None C Which generation ofgeneration developed using integrated circuits? Second computer Third generationgeneration of above Fifth None B Which generation ofgeneration developed using solid state components? Second computer Third generationgeneration of above Fifth None A Name threeSpecification, Design, and Design, None of aboveand Implementation steps involved in developing an System Design, Programming, Testing and Testing Analysis, information system A How do youAnalysis translates an information system? abovesystem androutines outcontrol peripheralis being handle define analysis of programinvolves a high level language to machine code information devices Analysis is the loading of looking atCthat perform finding to how This code of programs a None of What areasOnly hardware andoutputs, file design hardware, and software need to beInputs, software SOFTWARE above process? consideredMaintenance, reliability, and upgradeability in the None of design B What is theTo collect dataexecute To maintainNone of theD function of To systems software? any programs security above Formatting a disk results the disk data being...?disk Deleted from in all the Saved to the Copied from the disk TransferredA from the disk What is Direct Implementation? Users operate the manualsystem at the same time Users operate theoperate the computer system from a given date Users manual system None of above system and computer B What is parallel new systemnew system is alongside ofand A the old system The running? The is introducedcontinue operating Users introduced above None the existing start operating it users system What documents are produced duringdocumentation abovesystem? InstructionsLog files and temporaryand technical documentation and technical the development ofC User GuideNone of files a What are User Guides To enable any printer to cover howC run the network enter data, save, print, etc. For technical supportfor? guides be connected to the system, are used User None of above to

BC 16 BC 16 BC 17 BC 17 BC 170 BC 18 BC 183 BC 184 BC 185 BC 186 BC 187 BC 188 BC 189 BC 19 BC 190 BC 191 BC 192 BC 20 BC 200 BC 201 BC 202 BC 203 BC 204 BC 206 BC 207 BC 208 BC 209 BC 21 BC 21 BC 210 BC 211 BC 212 BC 213 BC 22 BC 22 BC 228 BC 229 BC 23 BC 230 BC 231 BC 232 BC 24 BC 25 BC 26 BC 27 BC 28 BC 28 BC 29 BC 29 BC 30 BC 31 BC 32

Systems software cansystems andDatabase systems andA services Operating be categorised into: services of the backup services Network systems and communication system None above Which storage device cannot be erased?disk Hard disk B Magnetic tape storage floppy CD-ROM Application To maintainTo backup copy of task.None of theis applying for employment software area do a particular all the information programs To help someone who B that are written above Which bus carries information between processors and peripherals? Data bus Auto bus Address bus ontrol BusA C Convert theFDDI decimal number 2989 TED BAD to Hexadecimal MAD B Which bus controls theAuto bus Address bus ontrol BusD Data bus sequencing of read/write operations? C What are utilities? Peripherals Operating system routines thatcompilersin supervisor mode. that are connected to a computer.Dpart of the kernel of an operating system. Data structures that execute and other useful system programs. Shells, are Numbers are stored and transmitted inside form binary form ASCII codedecimal a computer in A form form alphanumeric The originalwere 7 bits 8 bits ASCII codes represented 256 characters characters represented 127 A A Nibble corresponds to bits 4 bits 8 16 bits 32 bits A A gigabyte represents 1000 mega bytes More than 1000 kilobytes bytes 1024 bytes A 230 A 32-bit processor has 32 registers32 I/O devices Mb of RAM 32 a 32-bit busD 32-bit registers or A parity bit is used to indicate uppercase letters is in a last bit in a byte used to detectthe first bit the byte B is errors he contentsROM of these chips are lost DRAMthe computer is switched off? RAM when CROM A Clock speed is measured in bits per second baud bytes Hertz D Cache memory enhances memory capacity access time storage capacity access time memory secondary secondary storage B CISC machines fewer use more RAM than RISCclock speeds instructions have instructionshave medium machines than RISC use variable size machines D Which parts of the computer perform arithmetic calculations? ALU Registers Variables Logic Bus A Every data from the primary memory will be erased the above Power is switched off is improperly shut ifbefore computer is shut down Computer Data is not saveddown D All of An RS-232 a parallel is a serial interface interface interface interface printer a modem interface B For print qualityprinter dot matrix printer printer line you would expect best results laser printer. ink-jet from D ROM is faster to access thanstores more information than memory is non-volatile RAM is used for B cache RAM A UPS increased the storagethe process a computer system event of a power cut increases capacity of speedpowerC the provides backup of the previous none in smart card is a form of has more storage capacity than aaCATM card ATM card is an access card foran security system contains microprocessor Laptop computers use LCD displays CRT displays SSGA displays of the previous none B Multiprogramming refers to programs in RAM at the sameAprevious having several multitasking writing programs of the time languages none in multiple Multitasking having to the softwares running at the sameD concurrently refers several ability to run 2 or more programs languages writing programs of the time none in multiple previous What are small high speed memory units used for storingB ALU Registers Variables Logic Bus temporary results? A good waybrochures magazines CD-ROM e-mail to exchange information that changes rapidly D through is Multiprogramming is a prerequisite tosystem none of the above at the same time multitasking operating run more than one program an for C Timesharingmultitasking as is the same multiprogramming multiuser none of the previous C Virtual memory is to virtual reality a form of VRAM of the previous related a form of ROM none D Multiprocessing isas multitasking multiuser involves using more than one processor at the same time same same as multiprogramming D To help keep sensitive set up a password backup a confidential, the program save the filecomputer-based information virus B make a use copy protection user should What is theto calculateto disk drive?or write information toB floppy diskpictures on a screen function of a read from print sheetsdisplay information or numbers to to of paper a A 4GL is Uses Coboluses Java uses C++ none of the previous. D A nanosecond is 106 sec 103 sec 1012 sec 109 sec D What small, hand-held a mouse used to moveathe cursor B a specific location on the screen? a keypad device is a frog message to pad The memory address register is usedbeen transferred from memory been transferred from memory. data to be transferred to memory an instruction that has data that has to store of a memory location the address C The memory data register is to be transferred toof instruction that has been transferred from memory data to be transferred to store memory data used the addressan a memory location or from the stackA The instruction instruction that has been decodedthat has Dof the memory an register an instruction that has been fetched from next instruction to be executed stores an instruction address the been executed Which of the following is scroll to indicate pen location on the computer monitor? a cursor a used bar a light the a magic marker A A mathematical procedure that can be explicitly coded in a set of computer language instructions that manipulate da Formula Algorithm Program Data B Which of the following translates aArtificial Intelligence B Assembler Compiler program written in high-level language into machine language for execution? Parity Checker Detecting errors in real Parity Checking checking Memory protection is Range memory a function of Validation B To find where a the directory search filetheturn use findshould use file hassearchsaved tools backup facility Areplace been each on disk, the user and use in A series of instructions Program computer how to process data or files is defined as a Network telling the System Modem B To ensure that data is not lost file with the record nameto athe user medium save copiesusethe if a computer system computer failures of different filenames backupsystem system keep a same of fails, D on the on the secure should Having a single CPU alternatively process tasks entered from multiple terminals is called Multiprocessing sharing Time Multiprogramming MultiplexingD The place in the CPU where the data and DiskMagnetic Disk ROM RAM Floppy programs are temporarily stored during processing is called the B All are examples of computerProcessorexceptmodem Firmware Word software Telephone Shareware C Computer manufactures are now installing software programs permanently inside the computer. It is known as Firmware Word Processor Telephone modem Shareware A

BC 32 BC 33 BC 34 BC 35 BC 36 BC 37 BC 37 BC 38 BC 38 BC 39 BC 40 BC 41 BC 42 BC 43 BC 44 BC 45 BC 46 BC 47 BC 48 BC 48 BC 484 BC 485 BC 49 BC 491 BC 492 BC 494 BC 499 BC 50 BC 506 BC 51 BC 52 BC 53 BC 53 BC 54 BC 54 BC 55 BC 555 BC 56 BC 57 BC 58 BC 59 BC 60 BC 60 BC 60 BC 61 BC 61 BC 62 BC 63 BC 64 BC 65 BC 66 BC 67

Which of the following file organisation forms most efficiently allows access to a record Sequential Hashed Indexed Random C The part of Operating System the computer system controlling data manipulation is called the ALU CPU Primary Storage B For direct access storage devices the recording area isand subschema Tracks and Blocks and Files and Tracks Sectors Sectors Schema divided into A The data hierarchy from the database the smallest is field, file Character, field, largest to record, field Database, character, record File, Element, C Which of the following hardware orSystems logs Valid character check software system check provides a detailed record of all activities performed by Maintenance diagnostic program C Parity controls Which one of the following parts ofMIDI interface necessary to enable it to play music? Sound card. D-ROM a computer is C Serial interface A An educational CD-ROM on IndianSound contains 1000 pages of text, 500 colour pictures, 15 minutes of sound and Text Pictures Poets Video D Which one of the following printersInk-jet Laser Dot matrix is suitable Drum for printing sprocket fed carbon copies? B Multimedia viewing an encyclopaedia CD-ROM. order forA software can be most productivelyan creating thepresentingarecordingdesign. stock in a supermarket and answering customer qu plans for used for current to a warehouse. building stock To be effective a virus checker should be regularly once a year replaced regularlyupdated never updated updated C Which one of the following software applications would beD MOST appropriate for performing numerical and stati Database Document processor package Graphics Spreadsheetthe Passwords get into users to efficient use of time enable the make quickly confidentialityfile C system retain simplify of files structures 12. How many bytes do 4 Kilobytes represent? 512 1024 4096 8192 C Back up of the data files will help to prevent loss of dataD loss of confidentiality of data duplication virus infection Which one of the following is the MOST common internet A TCP/IP HTML IPX/SPX NetBEUI protocol? The advantage of ato the internet isshared access PCfiles can beprinter can do 1000s ofB systemday network is that quicker the operating pages a is easy to use The term A:\ refers to a subdirectory root directory a file name the the hard drive D UPS standsuniversal port serial uninterruptable power supply for up-line provider serviceuniform page source C The main problem associated with the the system systemnetwork requires a re-boot and defrag afterwards orphan filesthe programon system the not allow it toadministrator to uninstall it can be left uninstallingrequires aisA executable software always be uninstalled may that You are conducting research for a information.text. data. documents. Income Tax assignment. The raw facts you collect are called A A flow chartGraphical representation of logic NoneanytheA is the Rules writteLogical Steps in of language in procedural languageabove A voucher entry in Tally is fill receipt, is mandatory in of theA Purchase, sales, theforIt register None tally bove To done log payments etc. Passwords assist in maintenanceaccess unauthorised access are applied speed up order to to files in prevent allow encryption C Each of thesenior executive support for lacks leadership. B except: following isIT management IT. None of business an enabler IT understands alignment of IT-business the the above The basic systems model is used to describe virtually all information systems and it consists of the following elemen input. output. processing.All of the above D What is a computer-aided design system? do None of theA innovated designs and artistic patterns. The use of computers to design state-of-the-art, high-quality products. Using computers to that generatesabove Software architecture. A(n) __________ offers functional enterprise localentire industry. specialist orApplication Service Provider a solution package for an B File extensions are used in order to name the file ensure the filename is not lost the D type identify the identify file file Information preventive controls. controls. the All of the above are parts of IS controls. systems controls include all of controls. EXCEPT: detective corrective following D Hashing forexternal hashing hashing disk files isstatic called dynamic hashing extensible hashing A Components of expert (d)(a) to (d)C: (a), (b), (c) (b), (c), (d) b) user interface; c) knowledge base; d) fuzzy logic A: (a) , (b), systems include: a) inference engine; B: D: C Black box testing and controls testing are part of: corrective white box controls controls controls preventive detective general C What is the term used to describe Settings of Control ComponentInterface the point interaction between a computer and any other entity, such as a printe B The advantages of CASE tools(d) (a) to (d) (a), (b), (c) C (a), (c), (d) (b), (c), are: a) reusability; b) maintainability; c) portability; d) flexibility Which of the followingreset button. Select thetoPull the power cord from the back of the computer. Press the is an acceptable way Shut Down C computer? Turn the computer off at the powerthe shut down option from a menu. point. Yesterday, in your music class youUse nextFindcompositions up and ask the teacher cannot remember where you Create the files again. saved yourPut your hand as MP3 files. Today, you Ask the person the to you. SearchC or feature. Components of (c), information systemto (d) are: (c), (d) C (a), an (d) (a), (b), (c) (a) model (b), a) applications architecture; b) functional architecture; c) technolo Benchmarks form part organisational controlscontrols controls detective controls of: preventive corrective C Continuity controls include: (b),record counts; b) date checks; c) label checks; d) run-to-run totals (a), (c), (d) (a), a) (c) (a) to (d) (b), (c), (d) C Which is not part of help desk documentation:resolution procedures problem logging call lights program change requests C Testing of individual modules is known as: unit testing data testingthread testing testingA loop Design phase of CASE(a), (b), (d) (a), (b), (c) (a) to (d) D b) decision architecture; c) interface architecture; d) pre (b), (c), (d) tools includes: a) data architecture; Which is part of installation testing:parallel operations walkthroughs benchmark specifications matching testing system B The computer operating system performs scheduling, resource allocation, and data retrieval functions based on a s Multiplexer.Peripheral processors. Job control D Concentrator. language. Which of the following falls (c), (d) multimedia data:(c), text; b) images; c) video; d) audio (a) to (d) (b), under (a), (b), (c) (a), a) (d) A Which of the following procedures Physical security of in the disaster recovery plan for an Information Technology d Replacement personal should be included warehouse facilities. Identification of critical applications. of operating personnel. computers Cross-training for user departments. B Designing relationshipsinterfacecomponents isdesign architectural among design design procedural data designA part of: Several Computers connected together is called: Client-server Client Computer network Hub C Which network topology uses a Hub? Star Bus Mesh Ring A Which of the following topologies is used for Ethernet? above Star Bus Ring All of the D Application To maintainTo backup copy of job suchStore datainformation employment software area do a particular are written who is applying for programs To help someone all the in an organised manner To as editing, storing information B Which type Direct search method requires a computer first read all locations preceding the desired one of file Sequential Binary Indexed B

BC 67 BC 68 BC 69 BC 70 BC 71 BC 72 BC 73 BC 74 BC 75 BC 76 BC 77 BC 78 BC 79 BC 79 BC 80 BC 80 BC 81 BC 81 BC 82 BC 82 BC 83 BC 83 BC 84 BC 84 BC 85 BC 85 BC 86 BC 86 BC 87 BC 87 BC 88 BC 88 BC 89 BC 89 BC 9 BC 90 BC 90 BC 91 BC 91 BC 92 BC 92 BC 93 BC 93 BC 94 BC 94 BC 95 BC 95 BC 96 BC 96 BC 97 BC 97 BC 98

Which of the following areascommunications systems andC software. a systems programmer in a computer system Systems analysis of responsibility are normally assigned to Data and applicationshardware and Operating Computer operations. programming. compilers. Which of the following is file on a disk on a tape file on a disk data are required A sequential recommended when A direct access file on a tape A sequential file A direct access searches for many C It is unlikelyTapes can only be read by the machine recordC they varywritten can be used on two machines of diff that a magnetic tape containing severalon commonly arebe blockedarchitectures Parity errors will result Data thousand blocked between together Information formats which never records can Which component of the CPU has Address calculationon its cost versus performance Data path part Control Unitthe most influence partchannel Input outputA Which of the following terms Area network network to connect computers with other computers, peripherals and Distributed systems Wide network used Local applies to area Protocol B Intelligent terminals differ from dumb terminals in that data from a microprocessor all processing operations process Can send data to a computer andrequire a they with a computer andwhich permits some data Use the Generallywhich required connected to entry to receive keyboard for data perform a CRT for display Are they are D A computerMixerbe linked to 8 terminals usingTime sharing computer link. To permit simultaneous terminal operat is to Modem Multiplexor a single communication C A modem is a device that in back-up bedata Speeds up online printing Allows computer signals to procedures disktelephone line Aids Packs send over a file in a A A LAN includes 20 PCs, each directly connected toNetwork Planetary network Ring Network Loop Network the central shared pool of disk drives and printers. This type of n Star D A computerOffice Automation sending, forwarding, receiving and storing messages is called an based system for Executor systems Electronic mailing post-office Instant C If a workstation contains a intelligent workstation mainframe PC A dumb workstation A personal computer B An processor, monitor,A screen manipulation device, printer, storage and communication cap Terminal hardware controls include Time of dayEncryption algorithms All of them C control locks Parity checks RS-232 is aType of cable Terminal Standard Communication protocol Device interconnect standard D What is a compiler? does a conversion line iswholeas the program isprogram code into machine code in one step A compiler A compiler converts the a generalB A compiler by lineofof a purpose language providing very efficient execution None the higher level run above What are the stages in Implementation and documentationabove Feasibility study, system design, and testing D the compilation process? CONVERSION, and code generation Lexical analysis, of the None Which of the following is not a data transmission coding scheme CRC Baudot ASCII EBCDIC A What is theAn interpreter does theAnis a representation ofabove program is run providing very efficient execution definition of aninterpreter interpreter is bygeneral the An interpreter? conversionNoneaofline A the systemlanguage line the as purpose being designed A device used in data communications to divide a transmission signal into several sub-bands is known as a Modem Demodulator Frequency division multiplexor Time Division Multiplexor C Third generation languages such aslanguagesC, and FORTRAN are referred to as High-level languages Low-level languages C Middle-level COBOL, None of the above Serial Communicationthan parallel Itlong distance because it path It is faster is is less erroris less prone to only one It used overcommunication attenuation prone Uses D In what areas is the COBOLanddesign and languageof theC Financial sector programming educationused? Graphic engineering None Accounting systems, commercial sector above The primary function ofManagethe Relieve the Reduce a virtual environment the input/output devices Communicate front-endconsole function in competition between a with the processor is to CPU of repetitive communication tasks paging operator main C What is theSpecification program development? first stage in and design System Analysis Testing None of theB above Which of the following is not used for data transmission within a local area network Fiber Optics Coaxial Cable Common carrier Telephone Lines C What is System design System Analysis defines the involves creatingof data the program will use The Analysis?the screen the user will see andCandto enter or display data the problem to be solved of System Analysis formatuse type a formal model of None of the above A device to A cache An interface buffer link is called B device hardware communication An online protocol A What will a The different types of network toerrors before the system is introduced good software providerHardware,be used theB size of program. Testing to check for Software and consider? None of above The topology of a network can be each of the following except Star Packet Ring Bus B What is the10101010 1100101 the decimal numberof theC 8-bit binary value of 1010101 None 85? above Which is the most common data transmission Hash checking method Parity Retransmission Redundancy Cyclic error Count A What is the15 decimal value of the binary number 1111? theA 4 64 None of above Which of the following devices merges communication coupler onto a single line Port Modem Multiplexor Acoustic signals C What is the decimal value of the octal number 215?of theB 327 141 97 None above Which tool is used to help an organization build andthembusiness intelligence? Data warehouse Mining tools Data Data management systems All of use B Cache memory enhances memory capacity access time storage capacity access time memory secondary secondary storage B What is the30 decimal value of the hexadecimal None of FF?above 255 256 number theB Numbers are stored and transmitted inside form binary form ASCII codedecimal a computer in A form form alphanumeric What is the4C5 hexadecimal value of the decimal None of 1476? 1B7 5C4 number theA above A byte corresponds to 8 bits 4 bits 16 bits 32 bits B What does Basic Coding Description Decimal None of theD EBCDIC coding ofCoded Code Design Binary numbers mean? Bit above A Kb corresponds to 1000 bytes 210 bits 1024 bits 210 bytes A What is the10000 sum1112 binary of 01011 and 00101? None of theA 1110 above Information binary form ASCII codedecimal form is stored and transmitted inside a computer inA form form alphanumeric Where would you find the letters QWERTY? None of theA Mouse Keyboard Numeric Keypad above A parity bit issed to indicate uppercase letters is in a last bit in a byte u used to detectthe first bit the byte B is errors How did theBecause it mouse get likehas ears None of theD computer squeaks whenname? Its moves its a mouse It moved above Clock speed is measured in bits per second baud bytes Hertz D What are you most likely to use when playing a computer C Touch screen pen Joystick Light None of the game? above CPU performance mayMIPS BPS be measured in MHz VLSI B A digitising Printing letters tablet can be used for?Reading bar codes theB Tracing diagrams None of above In processing cheques MICR of the following I/O techniques have banks traditionally used OCR which barcode scanning voice recognition B Which of the following is a pointingCD-ROM drive computer input? Touch screen disk device used for of theA Hard None above

BC 98 BC 99 BC 99 BC01 BC02 BC03 BC04 BC05 BC06 BC07 BC08 BC09 BC10 BC100 BC100 BC101 BC101 BC102 BC102 BC103 BC104 BC105 BC105 BC106 BC106 BC107 BC107 BC108 BC108 BC109 BC109 BC11 BC110 BC111 BC112 BC113 BC115 BS 319 CA 486 CA 487 CA 488 CA 489 CA 490 DB 01 DB 02 DB 03 DB 04 DB 05 DB 06 DB 07 DB 10 DB 11

A UPS increased the storagethe process a computer system event of a power cut increases capacity of speedpowerC the provides backup of the previous none in What does Refillable ink encil lead Light sensitive elementsabove a light pen contain? P None of theC The capacity of a 3.5 floppyMb around 100K 1.44 is 5 Mb 1 Gb B What general term describes the physical equipment of a A hardware software output input computer system, such as its video screen, keyboard, and Where would you find the letters QUERTY?Keypad Mouse Keyboard Numeric Printer B What are you most likely to use when playing a computer C Touch screen pen Joystick Light Scanner game? A digitising Printing letters tablet can be used for?Reading Bar Codes B Tracing Diagrams Digital Signatures Which of the following is a pointingKeyboard CD ROM Drive input? Touch screen disk device used for computer Hard A What input Mouse could tell you the price of a Keyboard B device Bar code reader mark reader Optical product Where would you find a magnetic strip? Credit card Mouse Speakers Printer A Hard copy is a termon a hard board Writing used to describe...? information on theCartridge Printed output Storing Back-up onB hard disk a What are the individualPixelswhich Pixies up a Pickers on the monitor screen Called Coloured spots dots make picture B A daisy wheel is a type Storage device Printer of...? Pointing device CD-ROM A What input Mouse can be used for Optical mark reader the above device Bar code reader marking a multiple-choice test? None of Laptop computers use LCD displays CRT displays SSGA displays of the B none previous QWERTY is used with mouse button layout layout processing software screen layout reference to keyboard word C What input Mouse could tell you the price of a None of theB device Bar code reader mark reader Optical bar of chocolate? above A GUI is hardware language interpreter interface software an operating system C Where would you find a magnetic strip? card None of theA Credit card Speakers Smart above Multiprogramming several programs in RAM at the same time languages having refers to multitasking writing programs of the A none in multiple previous Multitasking refers several programs runRAM more programs concurrently having to The ability to in 2 programssame time languages writing or at the of the B none in multiple previous Multiprogramming is a prerequisiteTo run more thanof theprogram at the same time multitasking operatingfor an system none one C above UNIVAC Computer belongs to the Third - generationgeneration computers. First - generation computers. Second - generation computers. A Fifth - computers. Timesharing is the same as multitasking multiprogramming Multi-user none of the A previous Name the first Indian Super Computer? Vishwajeet Deep Blue Param Arjun C Disk fragmentation by wear by overuse bad diskof the C is caused caused is due to none blocks previous The technology code Reader Technology Inksheets of multiple-choice questions in civil services or similar examin Bar which is used to check answer CharacterBRecognition Technology Optical Mark Reader Technology Magnetic Image Scanning Technology A compiler is fast interpreter thanconverts a program themachine code a slower an interpreter of to C none previous Which printer among the following Desk - jet Printer Drum Printer - Matrix is fastest Thermal Printer Dot Printer A Zipping a file means it ecrypting it ompressing it encrypting d c transmittingC it What does Very important reader user sequence under siege user system acronym VIRUS information resource of above& Vital stands for information reader Virtual None B An impact printer creates characters by using...? inked ribbon and print head Electrically charged inkAn ink pen An Thermal Paper D A client-server system is based onWAN technologyoperating system mainframe technology LAN technology Unix B A nanosecond issec 10-3 sec 10-12 sec 10-9 sec D 10-6 The memory address register is has memory an instructionmemory been transferred from memory data to be transferred to been transferred from that has data that used to store of a memory location the address C Inefficient usage of excess computer equipment can be controlled by Contingency Planning Capacity Planning System feasibility report Exception reporting C A procedural control used to minimize the possibility footing tests Limit checks ontrol figures C External fileCross of data or program file destruction through operator error is the labels C A predefined computational task isfunction. to formula. C array. constant. referred as a(n): Which of the following is notextractCan aid GAPs define D audit objectives Wide access to various and analyse data selection Can the feature of in simple data base Can the Which is the example of CAATs High End CAATsthe above ACL IDEA All of D In audit procedures, testtransactions special purpose written program A sample of data is A A utility software programme of theA None above Which of the following is not the use of CAATs teststhe general EDP controls Tests of details of transactions Analytical review procedures of above Compliance of All D Which of the following are called explicitly by another procedure? Macros Action Procedures Event Procedures Procedures General D What term applies to a file clipboard collection of related records in a database? field layout B All of the following terms are related to computerized grabD search sort field namesrecord databases except which one? What is a database?analyse and manipulate numerical maintaining a log about a set of similar things A way to A tool to produce high quality documents An organised way of storing information A way of information C What does Information It contains all document which contains text a record contain? certain the data about one specific item about A programs collectionB files A of An RDBMSremote DBMS is a relative DBMS Relational DBMS DBMS Reliable C Data Warehousingdatabackingat a is related touses tape as opposed to disk storing refers to offline up data regularly separate site data mining C Unauthorised alterationComputer sequence checks Key verificationon-line records can Database accessemploying of Computer matching D by controls be prevented What is a database?analyse and manipulate numerical storing information about a set of similar things A way to A tool to produce high qualitydocuments An organised wayof theC None of information above What does Information It contains all document which contains text a record contain? certain the data about one specific item about A programs None of theB above

DB 12 DB 13 DB 18 DB 19 DB 20 DB 226 DB 227 DB 235 DB 24 DB 26 DB 27 DB 30 DB 365 DB 366 DB 367 DB 368 DB 369 DB 370 DB 371 DB 372 DB 373 DB 374 DB 375 DB 376 DB 377 DB 378 DB 379 DB 380 DB 381 DB 393 DB 394 DB 401 DB 402 DB 403 DB 404 DB 405 DB 407 DB 408 DB 409 DB 410 DB 411 DB 412 DB 413 DB 414 DB 415 DB 416 DB 417 DB 418 DB 419 DB 420 DB 421 DB 422

What is a report? allow users provide awhichflexible as hardcreating and editing documents Reports Reports to A tool very None ofway above (printed output) in documents extract information textA copy allows the and graphics to be placed of What is theExtractingtoSpreadsheetsdataqueries easy to analyse best way and analysing changedata analyse and make data of theC Using None above What are some popular office orientated processors,of theC Compilers, Network software,software systems above interpreters, editors Word backup applications? None spreadsheets, databases, DTP Which of the following and NOT NULL be used to enforcecolumns DEFAULT constraints KEY constraints and UNIQUE constraints rows in a table? FOREIGN can constraints PRIMARY KEY IDENTITY C uniqueness of the Which of the followingTABLE TABLE to change theTABLE of table? CHANGE commands ALTER TABLE MODIFY is used UPDATE structure C An RDBMSremote DBMS is a relative DBMS Relational DBMS DBMS Reliable C Data Warehousing refers to storing databackingat a is related touses tape as opposed to disk offline up data regularly separate site data mining C You are creating a client application that calls ActiveX DLLs. Which of the following properties of the Err object prov Number Description ComponentSource D This database holds personal information. The original paperwithkeep it confidential by using a password a backup copysavingcan help copy keeping keeping the user the file to different filenames A If the database product the primary mail and addresses, personalised letters can be created automatically using the holds customer names mergee-mail code key C Application A databaseGraphics browser software suited to storing the survey information obtained in the table would be e-mail A The characters * and ?operators wildcards in search criteria as bookmarks are sometimes used engines C Which of the following field types will generateAutoprimary key automatically? Auto Primary Auto ID AutoNumber the Key C Referential records in arelated tablesconsistent with are are consistent with the underlying tables or queries. integrity ensures thatare in ain a database consistent with one another. dynaset the: forms database the underlying tables.the underlying tables or queries. reports are B consistent with Tables are related to one another and a subform. foreign key.main form through a: its associated dynaset. query and report and its related query. A A foreign key is: the primary the primary a field fromrelated table. table. either related table. key of both key of the not unrelated key of related tables. a primary an B You are creating a banking database to track customer loans. The bank will, of course, have many customers, each One-to-oneOne-to-many Many-to-many Many-to-one B In a one-to-many relationship between Companies and Employees, which field is found in both tables? EmployeeID CompanyIDEmployeeLastName A CompanyAddress Which of the following menu, Relationship window one-to-many relationshipwith one another? For example, it ensur The Tools ensures that recordslinerelated tables are consistent Referential The join in The integrity B How would Double click the Relationship line tablesthe the Relationships window? shortcut menu you delete a relationship between Clickline, Delete Relationships button on the toolbar Right-click the Relationship in then select Delete from the Select Undo in the Relationships pull-down menu B In a Customers tables,are several a plus data associated CustomerID table mean? on the plus sign That there That some customers are recordswith that ID fieldby clicking what does of thethere next to the C can be added That sign is notrecords a related That viewable in What is required must both be numbers cannot be AutoNumber data types type They of the They cannot be text fields must be the same data fields that join two tables? They They D Assume a one-to-many relationship betweendeleted from D table and the Loans table, with referentialrelated loans Nothing, Accesscustomers customers ID ismessagefrom the Customers table, and all the integrity in ef The ignores the attempted command.Customers table. The ID is the Customers An error deleted is displayed. the Which of the following is is not visible. displayedis displayedisitsForm view. the form and can be moved or sized like The subform true whenThe subform insubform inan object on subform in the Form Design view? The subformviewing a main form and view. is The Datasheet associated D Which of the following relationships does not belong in and playersand coaches and playerssports league such as f A one-to-many relationshiprelationshiprelationship between coaches A one-to-many between many-to-many relationship between teams and teams A one-to-many between teams based on a professional A teams a database C Which symbol is used at the end of the join line in a related table to signify the many side of a one-to-many relation # M * C You have created table The Customers Loans withwhen there integrity between a Customers table and a Loans table Either a one-to-many relationshiponly referential are Loan records associated with that customer at any timeThe table table at anyC Neither table time The correctprompt, titleprompt, icon,for bar text, prompt, icon. is:prompt. order of the bar text, icon. the MsgBox statement arguments title bar text. bar text, icon, title title B The first statement in aSub CreateList. Dim CreateList. procedure CreateList. Sub. is: B named CreateList Which of the following is enables the drop-downfields? to choose ofto choose from one text. entries. A check box TRUE related to formAto choose C list one fromthe userseveral existing A text field enablesuserform enables theenables one of to enter of several existing entries. A form the list user from user several existing entries. drop-down A text field: must be setmust be word. multiple words. setC two words. for one setdoes not have to be set.for for must be The purpose of a database istrack create tables of rowsdata on different things in different tables. help peoplestore data in tables. maintain and columns. keep to: of things. A A databasedata. stores: relationships. metadata. all of the above D A databasefacts. records: figures. information.a and b D A sales contact manager used byapplication a database A single-user multiuser database application example of _______________ database a salespersonor b e-commerce is an application A Customer Resource Management (CRM) system is an example of_________ single-user multiuser database application above database application None of e-commerce database B application The industry standard supported by all major DBMSs thatC Sequential Query Language (SQL)Relational Question Language (RQL) together is called __________. Structured Question Language (SQL) (SQL) to be joined Structured Query Language tables allows A program whose job Modeling System Business Model System Database is to create,Management System Model Manager Database process and administerB Data Relational databases is called the _____ Microsoft Access may use which of the following DBMS engines? Jet SQL ServerOracle a and b D Which of the following are basic components of an enterprise-class database system? The user The database application management system (DBMS) The database of the above. All D In an enterprise-class database systeminteract(s)of. aboveA the database application(s) ________with thedata the DBMS accessesabove None of the database DBMS All In an enterprise-class database system, the database application ___ . creates queries creates form creates reports c b and D In an enterprise-class database system, reports management system (DBMS) the user the database application are created by ____________________ . the database database the B A databaseall considered "self-describing" because the above. own structure is the users' reduces data duplicationof _______ its it data is in one place a description of . it contains All C In an enterprise-class database system, indexes of the_________ . holds user data metadata the database above. holds holds All D A databasetables may contain _________________________ .D metadata stored procedures above. All of the A databasefrom existing data systems developmentexisting databasea database being designed _____________ designed using spreadsheets from the Sales department is as a new as a redesignandan project a of b A A databasefrom existingimplementas a redesignandan existing database designed to non-database data a of b reporting application needed by the Sales department is a da as a new systems development project requirements for a B A databasefrom existingcombinesystems developmentby the Sales department is a database being designed _____ designed to data as a new two a redesignandan existing database as databases of b project a used C Database professionals use ________________ as specific data sources for studies and analyses. data marts normalization models data entity-relationship data modeling A Database professionals use a set of principlesentity-relationship data modeling data marts normalization modelscalled ________________ to guide and assess database design. data B A very popular development technique used by database D data marts normalization models data entity-relationship data modeling professionals for database design is known as _________

DB 423 DB 424 DB 425 DB 426 DB 427 DB 428 DB 429 DB 430 DB 431 DB 432 DB 433 DB 434 DB 435 DB 436 DB 437 DB 463 DB 464 DB 465 DB 466 DB 467 DB 469 DB 470 DB 503 DS 279 DS 59 DS 62 DS 63 DS 66 EC 103 EC 301 EC 302 EC 406 EC 51 EC 58 EX 1 EX 10 EX 11 EX 12 EX 13 EX 14 EX 15 EX 2 EX 3 EX 320 EX 321 EX 322 EX 323 EX 324 EX 325 EX 326 EX 327 EX 328

A very popular development technique used by database D data marts normalization entity-relationship data professionals to adopt a database design to new or chang data migration modeling The predecessor(s) of database processing was (were) data model . file managers hierarchicalnetwork models models relational __________ A In a relationentities in a the order ofthe order of.more thanisC column can use the same name __________________________ the important column vary as columns is rows one the to kind unimportant An attributetable known as a(n) row is also relation field . D A combination of one or more columns used to identify particular rows in a is___ . record field key tuple C A combination of two or more columns used to identify particular rows in a relation is________ . record field composite key foreign key C A determinant that determines all the other columns in a key record field foreign key candidate relation is______ . D When designing a database, one of the candidate keys inB relation is selected as the _________ . composite key primary keyforeign key surrogate key a Normalization is a process used toDeletion anomalyaboveD Insertion anomaly anomaly with which of the following modification anomalies? Update deal All of When you are given a set of tablescreate one orand the data into the new database assess the existingthe database structure new tables to store their data, the first step is to ____ . design tables' structure more a A and askedmove content to create database Modern microcomputerwere essentially killed response time are supplied personal DBMS poor off by MS Access products by severalhave products______. B well-established manufacturers are not true DBMS Which of the following are true about data mining data theA than report delivery for reporting systems. They use sophisticatedNonintegrated techniques. Their report mathematical applications? delivery is more difficult None of above We have obtained access to the company's operationalformat"We examine 50 records for customers with phone nu dirty data inconsistentnonintegrated"wrong data. problem data a data B We have obtained access to the company's operationalformat"We have been asked to produce a report with an item dirty data inconsistentnonintegrated"wrong data. problem data a data D A data warehouse databasewarehouse warehousetables. C often because: data warehouse data are not an operational database denormalized. data differs from stored in do not have metadata. data databases data are b and c Which of the following objects is used to display a menu? A Form Table Report Query Which of the following objects are NOT found Spreadsheetsapplication? Forms and Queries and tables reports Macros in an Access D You are developing an It will beapplicationupgrade itputthe B how the objects are inWhich of stored, thethestatement It will be easier for the userfor the user toifupgrade it if the objects and in one database. and user will hav Access easier advisable to expectobjects and periodically.tables database It is to thatRegardless of object and table are a separatethe following tables in you each upgrade tables into one are database. to Which of the following statements regarding Accessto associate theNOT the tables, multiplethat itwithin the same dat The Link Tables command canconsistapplication can be created in with must reside the linked to yet an An application objects in anof applications is tables in one database objects, objects in as fo All may be An application, including true? such a way with objects such anoth used multiple databases, each C Which of the following brings a copy of the table into the current database and does not maintain a tie to the origina Import Link Merge Join A What makes contains more than one table a user interface, or switchboard It a database contains tables, reports, queries,C It an application? It contains It contains macros and forms What is theMenu Wizard Access tool that Menu Interface Design Wizard Manager Build is used to create the user interface? Switchboard D The purpose of a data warehouse put key business of data collection. hands or more decision makers. create backups for mission critical store all corporateinto the centralize the to: is manageability information transaction data in one single location. corporate data. C ____________ is the art of protecting information by transforming it into an unreadable format. Decryption Cipher Encryption Cryptography C Which of the following activities would most likely detect computer-related fraud? Using data encryption. ConductingReviewing the systems-access log. Performing validity checks. fraud-awareness training. D A digital signature is used primarilyReceived by the intended recipient. Unaltered in transmission. determine that a message is: Not intercepted en route. to the A to Sent correct address. What is a major disadvantage to using private Thebroken into theused byandencryptionmethod receiver. not by for de Both sender and receiver must have key private keydata? this encryptionforto the will the receiver the s The private The cannot key private A fragments for receiver but not by work. key a private the to encryptis before the distributed decryption but be is used key by sender Which of the following risks can beFailure of server duplicating function. accessing the information system to use p Collision. Data entry errors. minimized Firewall vulnerability. by requiring all employees D The most beneficial advantage of ERP cost ofQuality management Error checking Integration system operation B Data Low is What is theCompetitive espionageIndustrial espionage espionage term that describes spying on ones business C Corporate espionage Economic rivals to gain a competitive advantage? What wouldA list NOT be lookingclients ofspying on a competitor? you of competitorsnumbers the management new project Contact for when data Research A competitors group B An online drugstore such as Drugstore.comapplication above single-user multi-user application is None of database database e-commerce database Cof_______ an example application Which of the following is an example of unacceptable online netiquette? Replying promptly messages short Keeping Including the Subjectcapital letters Using all D Which of the following statements is correct concerning the atransactionsecuresecuritysystemssegregation of duties RemovableMessage authentication inup atsystems performs phase hardware device is more secure tha drives that Encryption performed by security of messages in an when the confidentiality of da can be locked EDI at theprovide adequate in EDI electronic not necessary bec Security night physically the same function as is data interchange C On an Excel sheet wideactive cell is indicated by A dark the A dotted border border No border A blinking border A Cell A4 =2 and A5 = 4. 2,4,2select both cells and drag the D handle down to A8. The contents of cells A6, A7, and A 8,16,32 You 2,2,2 6,8,10 fill If a cell shows ####### has a syntaxshort to show theor cC to show all the digits of the number your formula , it meansthe error either narrow the row is too column is too b number at the current font size that _____. Which is not an advantage of of calculation of costspreadsheets? ability to generate tablescomputerized of initial set-up speed using flexibility moving entries D The gym teacherprocessing program to calculate physicalD word has agraphical database spreadsheetfitness in terms of weight and exercise. The use inputs di new The difference between the highest and the lowest values. Range Address Gap Rows A Spreadsheets can be used for... Drawing pictures Producing graphs letters Writing Document filing A To select a double-clickdrag fromin clickcolumn click the column label cell in the column column the easiest method iscell the column to the last any cell the top tocolumn heading the the in C If you pressENTER theCTRL + ENTER typing as its contents. _____, cell accepts your TAB INSERT A The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as array. function. constant. formula. B All of the following are considered constants EXCEPT: C 100 (201)555-1212. #VALUE! Tom McKenzie. Which of the following may NOT be included in a formula? Cell references Functions Numeric constants Text constants D Which of the following is NOT a valid mathematical operator in Excel? ^ / * \ D Given the formula =B5*B6+C3/D4^2, which expression would to determine. first? B5*B6 C3/D4 D4^2 It is impossible be evaluated C Which part E12 formula +E12/6+(G7*SUM(H9:H11) is considered a constant? of the 6 SUM(H9:H11) G7*SUM(H9:H11) B How can you is surroundedblinking. is displayed inphraseA video. cell appears in the Status bar. It tell which It is in a worksheet is the active cell? cell by a heavy border.The reverse It active How can you change the ausing cell? either clicking in a thea different or using the arrow keysmove to in thedifferent By clicking in active the cell keys totyping to reference cell cell you want to to move to a formula By different arrow By By move different cell of the C Which of the following would you use to change thecommandof a the Edit menu The Standard toolbar The toolbarThe Font Size command on the Tools menu. The Formatting Cell Format font size on cell in Excel? B

EX 330 EX 331 EX 332 EX 333 EX 334 EX 335 EX 336 EX 337 EX 338 EX 339 EX 340 EX 341 EX 342 EX 343 EX 344 EX 345 EX 346 EX 347 EX 352 EX 353 EX 354 EX 358 EX 361 EX 362 EX 363 EX 364 EX 384 EX 4 EX 42 EX 43 EX 462 EX 5 EX 52 EX 57 EX 6 EX 6 EX 7 EX 7 EX 8 EX 8 EX 9 EX9. IN 01 IN 02 IN 03 IN 04 IN 05 IN 06 IN 07 IN 08 IN 09 IN 10

The command that will the Save current workbookFile Type commandtypethe File menu. the New command on the File menu. File menu. the File menu. save the command on the with a different file on is: the Save Asthe command C on The command that will Edit an Excel workbook is found on the ____________ menu. File print View Window A In the Save Preview Open dialog boxes, the ___________ B As and Details List Properties view shows the file size as well as the date and time a file Which of the following commands Both Insert Clear adjust cell references in formulas? Insert Delete will automatically and Delete C Which of the following commands Both Clear and Delete B columns from a worksheet? Clear Delete will remove Remove cells, rows, or Which of the following options isand footers Margins the Page Setup command? Orientation Headersor landscape) (portrait NOT controlled through C Fonts Which command enables you to change the margins for a printed worksheet? Options Page SetupView Edit B All commands are carried out on agroup. worksheet. range. rectangular groups of cells known as a: cell group. B Which of the following is a valid cell range? D 6 D12, G25 D12:G25 C In a copy operation, the cell(s) youclipboard. sourceis called the: copy range.destination range. are copying from range. D In a copy operation, the cell(s) youclipboard. source range. paste range. destination range. are copying to is called the: B Which of the following commands The Paste to duplicate the and Paste commands The Duplicate command needed command D contents of a cell in another? The Copy command Both the Copy is A cell reference that does not change during aconstant A is known as absolute relative mixed copy operation Which of the following is considered an absolute cell reference? B4 $B4 B$4 $B$4 D Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, what will be the co #DIV/0! #DIV/0! #DIV/0! #DIV/0! B Cell E3 contains the function =AVERAGE($A$3:$D$3). IfC contents of cell E3 are copied to cell E4, what will be #DIV/0! #DIV/0! #DIV/0! #DIV/0! the Which of the following command The Paste to transferCut and Paste commands The Move commands is needed command the contents of one cell range to another? The Cut command Both the D The F4 key copy and paste cells. cycle through absolute,C open applications.cell references. is used to: edit cycle through relative, and mixed Which of the following quickly copies the formatting of a selected cell to other cells? the Fill Handle Format the Formatting toolbar B the Painter Conditional formatting Which of the followingInsert Hyperlink commandan and onworksheet?Hyperlink command. Select the will insert Insert Hyperlink button click cell Edit click the Insert Hyperlink command. Click the a Right-click a cell Excel Bthe menu. hyperlink into from the File Standard toolbar. Double-click a the and Conditional whether thethe cell formatting to thethe basedinD cell or a relative cell reference. formatting applies address. or a value in an the cell has a formula a cell value it. absolute whether cell has on: If you enter text with a two-digit year. integer. text with either a two-digit or four-digit year, depending on the format. a date into text with a four-digitthe date as: C a cell, Excel stores year. an You created a worksheet on July 30 and entered the =Today() function in cell E17. You openedgiven. Jul-30 Aug-31 29/03/2008It is impossible to determine from the information that worksheet aga B The number of days between two date from the later latercanfrom the earlier one.one. subtracting adding the cells containing later date be calculatedearlier the earlier earlier date adding one.later date to the by: subtracting to the the one. the dates A The function key that isthe F2to quickly editkey.he F1 key. B a cell is: the F4 key. used key. the Esc the contents of t What will be stored in a cell if 3/4 is enteredof the currentor .75, depending on the cell formatting 03-Apr 0.75 March 4 inEither 3/4 year it? C A users response toa worksheet. a constant. either a cellD a worksheet or a variable. a cell on the variable. function can be stored in: a InputBox on The cell reference for aB1.G10of cells that starts in cell B1D B1-G10 range B1;G10 B1:G10 and goes over to column G and down to row 10 is _____ The teacherAVERAGE COUNT showing all Year 10 students and their marks in one Mathematics test. To find the s has a spreadsheet MAX SUM C Which chartCombination type best shows proportions of a whole? Line Pie Scatter C Which of the following is TRUEcolumn chart isOnce changed to a column chart.be it can be changed to a pie chart. Once a bar Once is chosen it a chartchosenlineD chosen it cannot a bar chart. to line chart. chart a regardingcannottypes? it been haschanged to Once pie chart has cannot be been chosen changed be a chart To select several cells theranges key are not key ALT keyA other,SHIFT hold down or CTRL that SHIFT touching each hold down the down the down CTRL + you would _____ while selecting. hold hold Your Institute teachers Create four Transfer information to Dsheetsare required to use a spreadsheet to record all tha Use tables have set anseparate files multiplea database assignment on Studies. You Use What wouldPaste best method toFill Right Pasteformula from the active cell to each cell below it? be the Fill Down quickly copy the Special B To arrange Tools inSortData | Sort Editbased on column A,choices to use the command _____. rows | alphabetical order | Data |none of the Byou need Sort What can you NOT do Calculate data Analyse data a spreadsheet? None of theC with Create forms above To print justclick thea sheet, you would select what key wantPage Setup _____ dialog and then print part of Print button PRINT SCREEN you on to printin the| Print . and then print press the select Print select Print D selection selection and Sheet Spreadsheets can be used for... drawing pictures of theA producing graphs letters writing None above The formula that will add the value#VALUE! to the value of C2 and then multiply by the value in B2 is _____. (D4+C2)*B2 D4+C2*B2 of cell D4 =(B2*(D4+C2) C Which of the functions =A3SUM:B3SUM:C3SUM addition B 0 is not valid for performing REF! None of the above The default portrait orientation landscape whateveris _____. used for the printed page was last vertical A Which is not a valid cell address? A0 AD213 ZA1 None of theC above Which of the following best a disk drive dataaon the hard drive storing datasending information to receiving information from a host computer on describes uploadinghost computer storing information? B A characteristic of a communication channel that is the amount of information that can be passed through it in a giv Bandwidth Speed Size Channel A The act of searching through storage to locateRetrieve Cwithout necessarily knowing of the existence of the inform Find Save Browse information The principles, means and methods for rendering information unintelligible and for restoring encrypted information t Photography igital Signature D Cryptography Message Digest C A long string of seemingly random Hash Functioncryptographic algorithms to create or verify digital signatures and e Key Lock bits used with Formula A Protected/private character string used to authenticate anB User-id Password Name Address identity or to authorize access to data. The successful act of bypassing security mechanisms of Cracker PenetrationRetrieval Cryptography Password the system. A A set of rules and formats, semantic and syntactic, that permits entities to exchange information. Acts RegulationsAddress Protocols D An attempt Spoofing Imposting Unauthorisingto be an authorised person. to get access to a system by posing Approving A An action or event that Threatprejudice security. Loss might Exposure Hacking B

IN 104 IN 11 IN 110 IN 111 IN 112 IN 12 IN 13 IN 14 IN 15 IN 155 IN 156 IN 157 IN 158 IN 159 IN 16 IN 160 IN 161 IN 162 IN 163 IN 164 IN 165 IN 166 IN 167 IN 168 IN 169 IN 17 IN 172 IN 173 IN 174 IN 175 IN 176 IN 177 IN 178 IN 179 IN 18 IN 180 IN 181 IN 182 IN 194 IN 195 IN 196 IN 197 IN 198 IN 20 IN 205 IN 21 IN 214 IN 218 IN 22 IN 220 IN 221 IN 222

According to information Technology Act,of a civil court B of IPS rank. Sales - tax authorities Judge 2000, To investigate contraventions the controller of certifying authority s Income - tax authorities Police officer Malicious software. Utility Pirated software Virus Cracker C None the person who isLee Tim Berner Hoffmanas Charles Bubbage Aiken known father of Internet Howard A This website is the biggest bookstore on the earth. .com B Etrade.comAmazon .com .com Msn Dell When we talk of Data Transmission modes, then Transmission mode Automated Any Time Money Tailor Machine Asynchronous ATM above for None of stands C A sequence of bits or characters that identifies the destination and the source of a transmission. Acts RegulationsAddress Protocols C The means Router of communicating between networks Gateway Port Pin B A group of computers and other devices dispersed over aA LAN WAN CAN PAN relatively limited area and connected by communication li The term HTTP standshypertext tracing program hyper terminal tracing program transfer protocol protocol for hypertext hypertext tracing C A NIC is considered Informatics Interface card None Card B National asNetwork Center Information of the above New A hub is a device that can connectOnly printers one of theD Only Computersnot computers Can N above Which of the following is true concerning thedata a hubincomingtraffic regulation of a bridge Concentrates connectivity Combines connectivity All of Aboveswitch? Switches function ofwith the ports to outgoing ports. of from a B What do routers connect? or more networks Hubs and nodes Bridges and Repeaters. Two Bridges and Hubs B What does bits a router route? frames Packets None of theC above Software which prevents external access to a virus checker firewall gateway router system is termed A If four computers are connected toFour and then to the internet, how many IP addresses are required for these 5 One Two a hub None of theC above Which of the following in an OSI layer Physical Layer Data-Link Layer Network Layerof the above All D When creating a network from justFiberPCs, what kindpair RG7U Coaxial cable two Twisted of B cable would be used to connect them? An IP address is a address address Physical Logical A memory address theB None of above To construct a simple LAN of 4 computers, you would connect them with ______connect them A cable Hub Router None of theB above What happens toreturnthat is ruined continue on to target B Data data It gets senderbefore by None of thedevice with corrupt data to the destroyed bit reaching to receiver It bit. above Bluetooth isWireless technology Ultra violet technology A Wired Technology None of the above Which is not one of theData Link Layer sub layers? above Physical Layer recognizedNetwork Layerof the D IEEE All The most preferred number system to represent a IP address is Binary ASCII Octal None of theA above A MAC address is of 48 Bytes 48 KB 48 Bits 48 MB A Protocol is software that list of rules for transferring data over a network for internet bridging a facilitatessoftware that gateway calling program connectiona allows fileB to the internet copying A ...............Novell PC Client is a LAN-based computer with software that acts as a controlling device for controlling access to at leas Server Network PC C What is theThere isn't one nodeof the hub goes down,goes down, it brings the nodes on that sectionall of the rings biggest disadvantage If If one goes Ring topology? down the down all of down all of the nodes on down, itthe hub itB If brings brings entire ring The .............. of the network concerns how network devices are physically (or optically) interconnected. Physiology Topology Both A and None of theB B above The principal topologies used with Ring are: All of aboveD Bus Star LANs What are the various types of bus architecture? Linear Parallel Both A and None B A What are the various types of ring Linear Parallel Circular architecture? Both A and B B In a ................., each workstation attaches to a common backplane via its own physical cable that terminates at the Ring Bus Star Mesh C In a ............... , each work station is directly connected to B common communications channel Ring Bus Star Mesh a Which one of the following is NOT Linear Star Bus a network topology? C Ring In a .............. , the cable system forms a loop with workstations attached at various intervals around the loop Ring Bus Star Mesh A The Media Access Control (MAC)Layersub layer of the: Layer Network Layer Transport is a Physical Layer Link D Data What are the most common LANtoken ring, FDDI inFDDI ring, today? Ethernet, token ring, DecNET DecNET, networking ARCnet Ethernet, technologiesEthernet, token Ethernet, used B Modem speeds are measured in mbps bps kbps mips B LAN speeds are measured in bps Kbps Mbps Mips C WAN speeds are higher than LAN speeds the transmission medium usually measured in bytes per limited by modem speeds depend on second C Accessing the Internet a modem WindowsPC requires the use of CD-ROM drive a typical home 95 from Netscape B To use the Internet, you World Wide Web mail LANthe above must use the must use electronic a of account must have All A The worldwide web server usesresource locator key gateway interface common gateway interface tointerface middleware: uniform the following standard interface act as the application protocol C An NIC a Novell Interface Controller printer modem toD computer a network used to control a interfaces aconnects a computer to a Accessing the Internet a modem WindowsPC requires the use of CD-ROM drive a typical home package from Netscape B The most widely used network operating system on of theC is Linux Novell Netware Windows NT one PC LANs N above JPEG and MPEGto do with compression of graphicsof thevideo have have to do with Internetnone and Aprevious the Web pages To use the Internet youmust useWide Web mail LAN account communications software must use the World electronic a must have use appropriate A A multiplexer is a form of Printer modem bridge none of the previous D An ISP provides access to the is a CPU functional unit is a CPU register Internet make of processor A FTP is used to send email browse the Web a protocol for the transfer of files between computers used to is part of Netscape is D

IN 223 IN 224 IN 225 IN 23 IN 23 IN 24 IN 25 IN 26 IN 267 IN 268 IN 269 IN 27 IN 270 IN 272 IN 273 IN 28 IN 285 IN 288 IN 29 IN 290 IN 297 IN 298 IN 30 IN 304 IN 306 IN 307 IN 308 IN 31 IN 31 IN 310 IN 312 IN 313 IN 314 IN 315 IN 316 IN 317 IN 318 IN 32 IN 33 IN 33 IN 34 IN 348 IN 349 IN 35 IN 350 IN 351 IN 359 IN 36 IN 360 IN 45 IN 47 IN 49

Telnet used to send email uses wireless part of Netscapemedium is communication the above None of D A firewall is used to protect a computer roomsaver program floods a form of virus a screen from firesthe previous none of and D A proxy server is a backup server an email server file server a poor none D A search engine is hardware IR system for the Internet of the C browser none previous To look for information CD-ROM clip-art file search engine user should use a scanner about interest areas on the internet, the D An ISP provides access to the is a CPU functional unit is a CPU register Internet make of processor A FTP is used to send email browse the Web a protocol for the transfer of files between computers used to is part of Netscape is D Telnet used to send email uses telephone lines Netscape is part of is a protocol that allows for remote login D Which of the following cannot communicate withthedirectly withonly with the layer directly above or below it. The layers is a true statement about communicate layers? layer.with the layer above it. Any layer can communicatelayer can communicate only Any layer can one another. any other Any OSI model C Which of the following is is made up works theIndividual computers can connect to itlines called backbones. It is one largeNOT true It of many Internet? connected into transmission using an ISP. It network. about the networks A a local network. same way as The traditional intent and impact ofDenial of Service of attack is to prevent or impair the legitimate use of network r Password cracking intrusioncommon type System this Port sniffing C A firewall isused to protect a computer roomsaver program floods a form of virus a screen from firesthe D none of and previous Which of the following is NOT an example ofinitiatesattack that is popular among hackers? IP flood Flood a Web server withDoSflood A flood Virus that a requests UDP a ping A ____________ attack is when a flood sends a continuous flow of packets to a system. hack packet hacker traffic C One defense option on router network is to configure a ____________ to disallow any external traffic. firewall a large switch hub B A proxy server is a backup server an email server file server of the D a poor none above Which of the following would be performeddata on a dailyserver and not normally on individual workstations? Apply security patches Backup on Limit logging on access Update virus definitionsa network C basis What can be said aboutsafe safety Only large name-recognizable sites are safe. All sites areThereand reliable. Internet? sites. B the are safethe unsafe of and ActiveX-enabled sites are safe. To secure communication networkUse of logical access the most effective control is Use of identifiers passwords wire-tapping methods Use of against Use of encryption methods D One way that a virus CANNOT an FTP throughout a network is: by attaching to an e-mail. attaching itself to a document. through spread port. by scanning the computer for a connection. by B Which of the following is NOT a means of monitoring employee use of company technology? Phone E-mail Web traffic Application D updates ____________ would be used by parents to monitor their D A Trojan horse Adware A worm Spyware children on their home system. The formal Modems parameters which are established toB rules and Protocols Multiplexors LAN permit a microcomputer to communicate with the mainfra The two most commonTrojanused cookieskey key loggersinformation are: cookies andtools horses help withloggers. C Trojan horses. to and andextracting and worms. key loggers. Which of the following would NOT for the purposean example of cyber terrorism? An attack on a attack with personalChanging the content of a Web page An system Giving out disinformation publicity be considered of gaining gain D Which of the followingdamage a in communication thelines are correct. Economic would be form of cyber supply above Disruption Disruption in terrorism? All of D Which of the following is stock market, of a cyber1930s systems plant safety systems loss of life? Crashing the a likely target as insecurity systems would cause considerable Shutdown of military the terrorist Dnuclear Contaminating water of Shutdown that An organisation is upgrading its telecommunication lines. D accurate inventory of network related equipment and pa To carry more network To improve To obtain an To improve capacity services response time least important objective while upgradation network system Which is the A company set its a priceveryof its products onupdate its only theirsoon as to theare changed that the company can posts prices list high stop its competitors seeing advantage they customer is limit access to computer owners prices as prices its website.D The Which of the following is an easy-to-usePeople Searchinformation on someone? People Search Yahoo People Search Lycos Search USA service to get B Which of the following pieces of information assets NOT be found online? Name of your bank birth Date of Personal would Criminal records A Which of the following is the most common danger on theB Virus Fraud Adware Spyware Internet? The famous Nigerian Fraud scam offered victims the opportunity to: money by parking funds in their bank account buy stocks.invest without risk. off-shore property. purchase make large D amounts of The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is cal Shill bidding Phishing Siphoning Hoaxing B Using the Internet to pursue, stalking.or contact another inB unsolicited fashion is called: Internet stalking. harass, cyber virtual stalking. stalking. Web an Setting your privacy settings in Internet Explorer to medium is one way to block: pop-ups. cookies. spam. viruses. B What is theUse a fake Never use your real cyber stalking?B best means of protection from identity.anti-spyware software. e-mail address. a proxy server. Use Use Which of the following is not an appropriate control over telecommunications software Encryption Physical Security controls Message sequenceaccess controls Logical number checking B Encryption techniques can be implementedII Neither I or C I only II only Both I & in Hardware-Software II Which protocol would be used to download a free anti-virus program from the Internet? irc ftp www telnet C The major advantage of the checksum program isup timeprogram recompilation Adds more Verifies integrity of filesMisleads aitB bytes to programs Increases boot when Which of the following is a WebExplorer HTML Internet browser? Excel HTML B Internet Explorer Microsoft both and A Web page is another name document. trip HTML browser. Web query.HTML for ----------round Web document. B Domain names must contain used .con is used for companies .com is used for company company type of organisation that the domain represents. A very common a .co in a description of the for None of theA above A standard round trip for creating Wide Web Consortium C language HTML. the World and formatting Web documents is: HTML. one way HTML. The Web page format in which all elements ofMHTMLpage are saved as one file is called: XML. HTML. DHTML. a Web D Which of the following requires an clicking a Web page that is stored on document that onstoredas a Web page. o using Internet Explorer Internet connection? Excel worksheet that you have saved computer updating the values that are obtained through a Web hard drive is your in the floppy drive to view hyperlink thatB viewing an references a the query Mr Rao wants to on theClick on that toto the History pageis found for the site page his computer how would he Click find a website Go he or Searchto the Bookmarks or Favorites Back arrow until Go briefly browsed over yesterday. After turning on desired site browser Go in the C look and Which of the following is used to update a Web query? AData command the Refreshthe Insert Hyperlink command command the Update the External command You download from the Screensaver Hyperlink internet, a Sound screensaver, a ten-second sound file and a ten-second music video clip. You als Video C When saving a photograph for useJPEGwebsite, which format should you choose? BMP GIF on a TIFF C While researchingitthe a Write taxesAdd it a piece you findorC it to a word processorthe most efficient way to access Save to Direct itdisk.assignment, ofand paste floppy down on to Favourites a Bookmarks. What is document. Cut paper. useful website.

IN 493 IN 50 IN 501 IN 68 IN 69 IN 70 IN 71 IN 72. IN 73. IN 74. IN 75. IN 76 IN 77 IN 78 OS 01 OS 127 OS 131 OS 132 OS 139 OS 193 OS 199 OS 215 OS 216 OS 217 OS 219 OS 233 OS 234 OS 236 OS 238 OS 271 OS 274 OS 275 OS 276 OS 277 OS 278 OS 280 OS 281 OS 282 OS 283 OS 284 OS 286 OS 287 OS 289 OS 291 OS 292 OS 293 OS 294 OS 295 OS 296 OS 299 OS 300 OS 309

A system that uses the intranet. forprivileged network. topology extranet. Internet business-to-business interaction is called a(n): network A A block of text automatically added to the end an an outgoing email is called an attachment. a signature. footer. a of encryption. B _________ VoIP to the use of Internet technologies for placing telephone calls. refers IPT IPP PoIP A Most client/server applications operatesoftware, and hardware.software, and hardware. of the following layers? Desktop client, application, andadatabase. server, and database. of which Desktop client, on server, application, Desktop three-tiered architecture consisting Desktop A Which do you NOT need to connect to the Internet? of theB Modem CD-ROM Telephone line None above What does File Transfer Program File Transfer Protocol B FTP stand for? Transmission Protocol of the above File None What is theSo computers can be referenced be shortertheA purpose of So IP addresses canis None of faster DNS? So email by a name above delivered Which of the following is NOT a properly formatted IP address? 193.1.2.3 45.1.1.1 143.215.12.19 of theD None above Which of the following@ domain. org. uk paul .trigg is a properly formatted email address? paul.trigg@domain.org.uk of theB paul.domain.uk None above The Internet is controlled by whom?Switzerland The US government in Scientists No-one None of theC above What does Internet Relay Chat IRC stand for? International Relay of Characters A Internet Remote Conversations None of the above If you do not pickbe deleted be waiting for will None of to itA in the post It will up yourwill It email forA letter yoube sent the above a week...? to collect you What does Hyper Textual Mark-upHyper Text None of theC HTML stand for? Hyperlink Text MarkingMark-up Language Lingo Language above What is a disadvantage of joiningautomaticallyNoneemail C globally Receiving messages a mailing list? of interest in the group People discussing a topic of of the above High volumes from anyone Which of the following computer software is designed tomanagement system execution of application programs Application Utility Programs Software Operating system Database direct and assist the C Formatting a disk results the disk data being...?disk of above Deleted from in all the Saved to the Copied from the disk None A Which bus carries information between processors and peripherals? Data bus Auto bus Address bus None of above A Which bus controls theAddress bus of read/write operations? Data bus sequencing ontrol busNone of above C C Which computers use single chip processors?None of above Personal computers Super computers Parallel computers A CPU performance mayMIPS BPS be measured in MHz VLSI B In processing cheques MICR of the following I/O techniques have banks traditionally used OCR which barcode scanning voice recognition B Disk fragmentation by wear by overuse bad diskof the previous is caused caused is due to none blocks B A compiler is fast interpreter thanconverts a program theassembly code a slower an interpreter of to Bprevious none An interpreter is than a compiler and executes programsBpreviouscodestatement faster translates converts a program themachine by none of to statement Zipping a file means it encrypting decrypting it compressing it transmitting it C An assembly language program is translated to machine code by an assemblercompiler an interpreterlinker a a A Which of the following is not part ofthe power cord of the above the ALU the CU the processor None C If the Cancel Error Propertycanthetimeiferroruser executes Acarrytrue conditional compilation A runtime error of result program clicks theset to out then which of the following statement is true: A compile CommonDialog needis without button The the occurs Box to cancel any error You __________ controlBox List BoxDrive List Box in the current directory: File List defaults to displaying the Combo BoxA Dir files A ____________ occurs any time a program writes more D memory overflow overloadoverflow systems RAM buffer overflow information into the temporary space it has allocated in th Assessing a system requires certain common NetBIOS D of the following is NOT a tool used to assess a system? Netcop NetBrute Netcraft tools. Which The ____________________ Web site has a www.netstat.com you what software and operating system a Web serv www.nettools.com www.WhoIs.com www.netcraft.com utility that will tell C When software vendors discover flaws in theirupgrades. they usually will write corrections to their code, known as: code correct. patches. updates. software, B All ____________ have the option hubs firewalls switches of blocking scanners A ports. Which of the following is hides a characteristic It is aboth. is packet filtering. It can consist NOT your network. techniques B between your network and the rest of the Internet. It of hardware, software, or firewall? One of its of a barrier Before shutting aany openon an individualotherThat youtheB shutfollowing would you always check? That service applicationson machine, on also the down associated services Dependencies be exited which of That you areservices Internet not At a minimum, whichsoftware Antivirus of the following should be implemented under the protection phase? Intrusion-detection software Firewall Router C Attacks on your systemantivirus software. or prevention system. use of: an intrusion-detection system. may be prevented trapped through system. a network a proxy filtering the A Setting restrictions as to the number of uniquehistory. cycle. renewal. age. passwordsD use before a user can recycle them is called a passwo to Which of the following is NOTandand to currentabilityallareD anti-spyware programs. Make sure all updatestep security patches incoming traffic on a network. Install a keep take in securingconfigure the workstation. Limit usersBlock to and antivirus a workstation? applied. To prevent a hacker from the systemchange the what anotheryou do with a power user account. the hacker. Delete it from unauthorized access, built-in guest account user account with administrator rights. Delete it and and use thecreate a C administrator account to confuse Disable it and guest account. Create should nondescript to the administrator account? What should be done withusedbackup tapesbeGive CDs shouldthe trash. Tapes can be old and CDs can and bethem to and be kept forever. Tapes over and over, and melted a recycle broken. Tapes should CDs?away in CDs shop. thrown C Which of the following is irus an example of malware? C Trojan horse NOT V IP spoofingSpyware One step you cana router reduce theto your being fromsystem.aWeb sites. place take add spyware risk of system.your programming skills. to betweendownload and your reliable virus is to: your ISP files infectedC hone by Which of the following is abnormal Printing problems infectedyour wireless mouse System acts NOT a missing a virus has Files are sign that Problems with your system? D Which of the following is the software. off protect yourself an e-mail attachment unless you know what it is and who Update antivirus safestTurn to theNever openD in your e-mail client. Do not propagate hoax viruses. way auto-launchfrom e-mail viruses? A ____________ attack causes too pyware buffer overflow virus Trojan horse much information to be placed into temporary memory space. s D ____________ gathersA Trojan horse with thebuffer overflow A virus user information Spyware A users knowledge. C Which of the following is the most common function of spyware? and passwords Obtain system IP addresses for open ports D Obtain cookies Check Obtain usernames Which of the following is NOT a virus-scanning technique? E-mail and attachment File scanning Download scanning Backup file D scanning scanning Which of the following would NOT Avoidway toUse encryptione-mails Use your browsers security settings and toolbarssoftware spyware? Do not open attachments in unknown download be a skins protect your system from D For which of the following positions wouldaccountant administrator an extensive background check? Administrative assistant to the it beNetwork to conduct Cook Junior president advisable D

OS 329 OS 355 OS 356 OS 357 OS 396 OS 397 OS 399 OS 495 OS 496 OS 497 OS 498 OS 502 OS 504 OS 505 OS239 PP 44 PP 442 PP 443 PP 444 PP 445 PP 446 PP 447 PP 448 PP 449 PP 450 PP 451 PP 452 PP 453 PP 454 PP 455 PP 456 PP 457 PP 458 PP 459 PP 46 PP 460 PP 461 PP 500 PP438 PP439 VB 237 VB 240 VB 241 VB 242 VB 243 VB 243 VB 244 VB 245 VB 246 VB 247 VB 248 VB 249

Which of the following would you use to opencommand on the Edit on the File menu The Standard toolbar The toolbaran existingcommand menu The Formatting Open The Save file? A The ability to have multiple applications open at the same time is known as: multitasking. tiling. cascading. minimizing.A Which of the following file location the numberthewindowsA the printed DOCUMENT the default can be changed using the Options command? whether theof new files prints in landscape or open orientation worksheet of margins you have portrait on Which of the following leaves an application open but shrinks the window to a button on the Windows taskbar? shrinking multitasking minimizing cascading C Which of the following actions woulddrag. and title cannot C drag.a floating toolbar. place? Click on any border and corner theYou bar and to dock it in a different Click on any move a floating toolbar Click on drag. move To display a missing orright mouseleft mouse the: mouse toolbar,anywhere on the missing toolbar.from the context-s right mouse neededanywhere on the Word window, choose the Customize commandchoose the Custom button toolbar, click any visibleany visible toolbar, and click on window, button on button on button and click left B Word the missing toolbar. Which of the following is NOT automatically saved with protectedpassword. sevenitcharacters long. without that p All documents are a true statement regarding default up protection? The password is case-sensitive. a A be by topassword, cannot be opened Once a document is password a only Passwords can The Linux operating systems is an protectiveof: public domain software.example open software. nonprotective open source sourcesoftware proprietary C software. The Windows operating systems is: open source software. public domain software. nonprotective protective open sourcesoftware. proprietary D software. Application on-demandon-demandutility computing. software. service providers offer: software. utility computing. B A(n) _________ offers software providerservice an as-needed basis to its clients over the web. best-cost provider on-demandWeb software on provider service provider application D _________ OperationalInformational systems customers and run a business in real time. are systemssystems interact with query systems used to Structured Office automation A The most common cause(s) of disaster is (are): of the above. power outages. hardware failures. floods. All D A _______ hot backup sitecold is backup facility consisting of an empty warehouse with all necessary connections for powe empty dormant B To destroy an object and free the memory space occupied by it, the keyword used is: Delete Kill Nothing New C An example text, graphics and email multimedia presentation could include video and sound. of the components of a address.digitalhypertext, Power Point, text, hypertext and Power Point. D and sound. CD-ROM, text, camera Which of the following formatting elements can be applied to a PowerPoint diagram using the AutoFormat tool? the Line style Line color Font and thestyle,alignment text font, and text alignment the the Line text Line color, D Which of the following formatting elements can be applied tocolor, and Linediagram using the Format AutoShape co Fill color Line color Line thickness color, Line a PowerPoint thickness Fill D What happens when you popup box promptsGraphaisan existing Excelis deleted. presentation? Excel is started so that Microsoftcreatefor chart.C so that you canto insert. graph. A double click acan you graph placeholder PowerPoint you blank graph placeholder in a chart create a The started The legend always taken from the first rowthe datafirst columnuser. the data in the datasheet, depending on whethe in a Microsoft Graph chart is:from first columnthe datarow of datasheet. always taken from of the in the datasheet. taken entered by C or in of Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best chart type if you Side-by-side columncolumn Stacked Pie chart Line chart B Which of the followingthe Insert menu andyoubutton on a the Insertselect the appropriate Object. the Insert Chart but Pull down actions will enable selectinsert the Standard toolbar. select Chart, click Click the Insert Chart the Insert menu and menu and Pull down to Chart. graph into a PowerPoint presentation? Pull down D If you are editing a slide containingPullobject, the Edit menu,View Datasheet button on the datasheet?slide is finished It automatically displays a Microsoft Graph, how do you display the underlying Standard toolbar. Click the chart Slide view. click the then select Object. datasheet once the in down then cannot B You display the underlying How do youSingle click Double click the chart. Change to Slide Sorter view. after you have finished creating the char deselect a chart that has been placed onto a C the chart. Click outside the chart. PowerPoint slide What happens whenbox is displayedis displayed allowing you windowof the Excelof the Excel that should thatlinked tob A dialog you dialog box allowing button savedDMicrosoft Graph toolbar? closed to open (or be should t A click the Datasheet you is on thetheto separate file. from The datasheet to enter as a enter is toggled worksheet worksheet from open The datasheet name the name What happens ifchart single chart a The chart isThe application that created the chart is started. The you isThe click ischart that doubled in A active? selected. deleted. not currently size. What happens ifchart double click isThe chart isMicrosoft in D active? The you isThe chart a deleted. isdoubled Graph will restart. selected. chart that not currently size. Using customslide one bullet itemsat a time. atone word at a time. at a time, build bullet items a letter at a time, an a animation effects, you canitemsa a time. D item bulletletter slide one bullet item one build: Which of the following animation effects can be added to a slide? Exciting Subtle Moderate Exciting Subtle, Moderate, or D Which of the followingexit in from top orenter andadded toCfly inexit; neither fly in from top nor bottom Enter and animations effects can be exit,enter nor from top or bottom Fly Both bottom Neither anda slide? Which keyboard key is Shift to select more than one picture on a slide? Enter used Alt Ctrl B Custom animation can whatappearaffect slide. Custom animation can be used to affect the way objects appear on a the way objects objectson way objects exit a slide. slide. be used to the aafter they appear on a do ONLY: D Which of the following best advanced timelinesequence inC timelinethe effect applied toobjects will appear objectssw The advanced timeline Thethe information the durationobjects will neither the the slide. in which on the The describes advanced timeline shows the sequence in which sequence shows the The advanced shows that appearsof shows appear on each object. which on the advanced timeline? Which of the following objects can Text Clips Organization charts custom animation effects? contain Clips, organization charts, and text D What type of program allows an object within an image toA edited without affecting other objects? Paint program program Draw Filtering program Animation program be Which of the following animation effects can be added to atop, and Dissolve in Fly in From top Dissolve in Fly in, FromD slide? Which of the following is entered itis entered itchanged. no Binto Datasheet.Datasheet. Once data Once data Data cannotcan enteredsuch thing as a TRUE regarding the Datasheet? cannot be There ischanged. be be Graphical software tools that provide complex OLIP. OLTP. OLAP. OLST. analysis of B stored data are: Which of the following statements is TRUE regarding PowerPointbut not diagram and thein ofOrganization chart. diag You can changecan changecannot You cannot B of of whole individualboxes an a diagram. of a You the appearance ofchange the change diagrams? the lines in individual shapes chart. You both the appearance a the color of a whole diagram, style connecting shapes an Organization Which keyboard key combination is used to undo the previous command(s)? [Enter+A] [Shift+Z] [Alt+Z] [Ctrl+Z] D What is the.ctx extension of the Visual.ctr .ctl Basic project file that stores the design of a user control. .ocx B Which event of a text box would you use for validating theA Validate Validation Check Audit data entered by the user? Which of the following statements forces inline error handling? Next On Error GoTo Error GoTo Error Stop Error Resume On linelabel Inline On On D The _______ method resets the contents of bound controls to their original values when the user clicks on the canc UpdateControls PaintPicture Refresh Resize A To deactivate the FormCancel to event, you make the following change to value value definiton: Cancel parameter parameter to value UnLoad a UnloadMode parameter to a non-zero a zero non-zero 0 UnloadMode parameter in the function A To deactivate the FormCancel to event, you make the following change to value value definiton:Private Sub Query_U Cancel parameter parameter to value UnLoad a UnloadMode parameter to a non-zero a zero non-zero 0 UnloadMode parameter in the function A How many root nodes can a TreeView control None of theD 1 2 3 have? above A project group is a Project which: ConsistsApplicationsForms AndProjects Consists of ConsistsPrograms of Consists of D several of several Various several Code Modules ProceduresForm window, _____ areor code moduleprocedures declared in a ______ are available to the whole appl declared inProject window, view codecode theA a standard local whereaswindow above Class module, of module None How can you keep the user from exiting event None of theB Close button? Place code Place code Place a form by clicking above in the Terminate code in the Deactivate event in the Unload event the The _______ property enables Visual False toPaintPicture AutoRedraw = True Refresh AutoRedraw = Basic draw complete images in memory before displaying them on the Scr A You want toMsgbox err.no & err.text description of anerror.numberwould be the correct syntax? display theMsgbox err.number error.number & error.text & error.description code and the Msgbox & err.text error. What Msgbox D

VB 250 VB 251 VB 252 VB 253 VB 255 VB 256 VB 257 VB 258 VB 259 VB 260 VB 261 VB 262 VB 263 VB 264 VB 265 VB 266 VB 382 VB 383 VB 395 VB254 WO 01 WO 02 WO 03 WO 04 WO 05 WO 06 WO 07 WO 08 WO 09 WO 1 WO 10 WO 11 WO 12 WO 13 WO 2 WO 25 WO 3 WO 32 WO 34 WO 385 WO 386 WO 387 WO 388 WO 389 WO 39 WO 390 WO 391 WO 392 WO 398 WO 4 WO 40 WO 400

What is theTo display images to the user athe editing of icons purpose of To help in creating ToolBar the Image List allow To provide a repository for images used by other controls To Control? D Which method would you use to get a free or unused File A FreeFile GetFileNum GetFile GetBytes identifier while opening any file: Which property procedure is used GetProperty value of B property? Retrieve Get to retrieve the Value a Which of the following can bedialog box theWindows theD Common messages passed to user using Open shown to Windows explorer Input box Common Dialog control in VB? Which of the following are not properties of Command Button: Caption Visible Multi-Line Font C Which events enable KeyPress Click and you to determine which key was pressed by the user? Click, KeyUp and KeyDown KeyUp and KeyPress, KeyUp and KeyDown KeyDown D In order to access a fileBinary Format format, Output mode Ascii Formatin Non-textual Mode you have to open file in: Input B Visual Basic displays and CurrentYScaleHeight and ScaleTop value of two properties of the form, called: CurrentX information and ScaleTop and y current ScaleLeft depending upon the x A Which of the following procedure types will execute when C assign a value to a property of an object? Property Get Property Assign Property Let Property Set you In order to overlap the controls (say a command button) during design time, we use the Send To Back or Bring To Background color property Caption property property ZOrder AutoRedraw property C Which property of the ProgressBarValue Min Max determines how muchB the bar is filled? CurrentVal of The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program. Shell Substr SetAttr CStr A The captionAre one and the be different at times properties and the name properties of the command theB Can same Are actuallyNone of button: not above You try to initialize a new Object variable with the followingaccess the class an error. What could be the possible cau You do not You do not MyVar has not beentheCline but receive need to usehaveSet command hereabove the the permission declared None of to Which of the following method The Open will perform The ExecProceduretheD The Exec method execution ofmethod a direct None of a Command object? above The vb Critical symbolquery iconmessage iconNone of theB A warning displays: An exclamation icon A critical above vbYesNo is statement. variable. intrinsic constant. procedure. an example of a(n): built-in C The primary difference InputBox the MsgBoxfunction can InputBoxcan be thestatementthe macro recorder, while stat MsgBox statement returns a value, while theand created with creatednot. the: between function returns a value, be thethefunction does with does not. InputBox statementstatement MsgBox macro recorder, while the MsgBox the MsgBox while InputBox function is B Which of the following isbe entered into can form. form (i.e.,box canwhere the Protect Form button on the Forms too Data cannot TRUE aboutbe protected The form can a the be entered. C a form be added. Data modified. A new check Which event is triggered when the Deactivate Terminate C Unload QueryUnload user moves to another open form? Veena is entering the return key tab key the escape keytyping When the cursor gets to the end of a line, what is the press a paragraph in apress processing program. press the word just keep D How are data organized in aand spaces and width and columns layers and planesspreadsheet? lines height rows D Which key moves the cursor to the beginning of the next line of text? tab enter/returnbackspace/shift delete B Veena typed the following sentence: "The girl was very beautiful." In which word processing utility could she find a s grammar checker spell checker thesaurus outliner C Using an electronicpublic messagesend a frienddo all of theone topicfriend which one? send a bulletin board, Seema cansend a package to a except send pictures to private messagesDfollowing to friends interested in to a friend Aryan has created a ten-page story, but only wants previewthe first two pages. What printer command should he se Print all From ___ To ____ Page setupPrint to print B What process should be used to recall a document savedC Enter Copy Retrieve Save previously? Which is used to indent text within spacing closing tabbing a document? sorting B Desktop publishing is agraphing word processing which C the following types of software? database more sophisticated form of spreadsheet of What is a Word Processor usedand editing documentstheB To analyse Creating for? figures Storing information None of above What is a picture that is saved on a diskette and can be pasted into a document? subscript annotation clip art clipboard C What is a Word Processor usedand editing documents B To analyse Creating for? figures Storing information Calculations Making What basic Clear,wouldSpelling, grammar and Font, and clear Bullet and Numbering tools replace and select Edit menu of Paragraph, you find in Cut, copy, paste a word processor the autocorrectC What is a header in a document?every page appear at the top on every page Text at the bottom of which appearDesignatedC Numbers Text which on every page of the document area What hardware is essential for processingmonitor and printer Mouse, printer and a word? system keyboard? Keyboard, Mouse, keyboard and B Monitor, None of themouse above The user could take a picture frommicrophonedigitalinsert D into the document by using a Browser clip-art file a magazine and scanner it What basic Clear,wouldSpelling, grammar and Noneand clear tools replace and Toolbarscopy, paste of theC you find in Cut,Edit the autocorrect above What command in a word-processing program can be used to change the word him to her, and also the word he Paste Replace Select all AutoCorrect B What edit commands wouldthen paste insert a paste then Afrom one document into another document, while still kee Copy, then Cut, you use to then paragraphpaste paste Delete, Insert, Which of the following statements wouldchance toaaccept Cforprocesschanges fromrevisions into spend document wit To give the To give the To complicate the revision reject suggested on one documentWord morethe revi original author a NOT To allow multiple peopleandwork changes from thein collaboration wi original author reason to showing to to force the author a person who enter be chance suggested suggested the person who entered time m Which statement is NOT red underline appears beneathinD left margin in added.box at the has been made at that po A line appears through A verticalis to be deleted. Word document? a change right of the document. A true regardingthat line outside the that is to be a text text revisions made text enclosed signifies Comments are a How are suggested changes menuThrough toolson an ChangesTools menu and the Reviewing toolbar Through the Edit entered for review Track initial the command command Through theby choosing by through Word document? Tools menu onchoosing Track toolbar Both the Reviewing Changes D Which of the following is TRUE about saving a documentyou toallow you toallow document,versiontwoa including any The Versions command willVersionswillVersionswill the Versions command? a document,versions of ath The Versions command command command will onea you toof including any changeswit The allow you toallow A The save multiple versions of versionone only of document d using save only save only save What happensversionsThe latest document and second versions usingopened automatically. All when you open a version is that has automatically. is the Versions command? are opened automatically. previous version opened automatically. The first opened been B The saved are You have used the word discover Spelltimes in an English essay you have created using a word processing progra Dictionary Grammar check checkThesaurus A four When opening and workingmost multiple will and will appear at the tellsaved.yourecent version ofmost recent version? Word displays a with recent version timesname filethebottom most saved each version. The list of the dates show ofis notA of to how canwho tell which is the a document. Word versions the each Word a document, personof the list. able was the Various fields are added to a regular document to create a special document called a form through the __________ Fields Tools Forms Insert C Which of the following types ofbutton CANNOT be inserted into a form? Check boxes Toggle fields fields A drop-down list Text B Which of the following is TRUE related to editing comments inbe Word document? by left clicking the highlighted tex Comments Commentsedited. be deleted. edited or a editedby right clicking the highlighted text. cannot be Comments Comments C cannot can be can deleted or deleted What is a header in a document?every page appear at the top of every page Text at the bottom of which appearNone of theC Numbers Text which on every page above In your English essay you notice that theand paste. at theD Press tab. Press Return. Copy paragraph page break. of page 1 continues on to page 2. You would like Insert bottom Tables in a text. document help you to easily arrange all of the C graphics. forms. numbers. following EXCEPT:

WO 41 WO 440 WO 468 WO 471 WO 472 WO 473 WO 474 WO 475 WO 476 WO 477 WO 478 WO 479 WO 480 WO 481 WO 482 WO 483 WO 484 WO 5 WO 56

To identify a document, it is helpfulfind/search.macro.name on each page as a header/footer. bibliography.to include the file A Which of the following tools will copy the formattingaction C not text to other places? Copy button Paste button ormat Painter button is F This of selected possible. What is theFault Finding process of determining the cause of errors in a macro? name of the Bug Squashing Injecting Error Debugging D Drop caps are added to a Word document using the ___________ menu. Insert Tools Format Edit C A reverse in a newslettersection ofthe guidelines used letter of each sentence beginning of a of the newsletter will go a section ofa is: text on a black background.establishletter at different elements paragraph. are upperca white text where an enlargedAcapital where the is lowercase and the rest the first to A pull quotesetting itemphasized by: capital letters. is best in larger type or font size. changing the color. typing it all in underlining the text of the pull quote. A Which of the following definitions is is a quotation dark wordon (pulled)background. document.when it should have a The reverse technique ACORRECT?grid a textD thathorizontal andlowercase letter determine the place A pull quotemeans to add takenafromof light from another lines that dropped cap is is set a starts with a vertical A Pertaining to newsletters, which ofof each column columns changed using the Columns command dialog box? The width of each column followingof tab spacing within each column The height The number cannot be the The D As related to type size, 10 many points are there to the inch? 6 how 12 72 D Assume you are working on a newsletter in which the masthead extends across the top of the entire first page. The One Two Three Four B Which of the following is NOTCtrl+Shift+Enter break. Shift+Enter tobreak. section breaks? Press Ctrl+Enter tocorrect with respect to page, column, and a line break. Press create a page Press Press Enterto create aacolumn break. to create C section force Which of the following wouldpointsA most font pointspointsD a at 45 pointsheadline? A serif font at sans serif font atappropriate serif for newsletter A 10 be the serif 10 at sans font font A 20 Which of the following is the default Word column width? on the left and right margins, and how many columns are s 2 inches 3 inches 4 inches It depends D Assume you are creating a two-column newsletter. WhichB 6 point 10 point 15 point 25 point type size is the most reasonable for the text in the column Given the default left and right margins, and -inch spacing determine. 2 inches. 2 inches. 3 inches. impossible to between columns, the width of each column in a two-co B Assume you have made all have not insertednotcolumn section break.. boxduring editing;cannot see any columns You are notYou appropriatehave a specified A displaydialog in Print Layout view. Word cannot You selections in the Columns columns in Word, but you will see them only w continuous section breaks. While word to store a fileinstore ahardon following leave an Dwould the originaltext in placeanother location copy elsew processing, on the ofto move a section of text from Tom use the "Copy"to while pasting a to which file drivediskette the a to situations original section of location command? What does Data about Mainly text A set of different graphics a documentacontain? set of similar things None of theB above Before submitting your Spell Checker to find Checker Replace Thesaurus work you want Grammar any words spelt incorrectly. Which of the following would you use? Find and B

q_id AC1 AC2 AC3 AC4 AC5 AC6 AC7 AC8 AC9 AC10 AC11 AC12 AC13 AC14 AC15 AC16 AC17 AC18 AC19 AC20 AC21 AC22 AC23 AC24 AC25 AC26 AC27 AC28 AC29 AC30 AC31 AC32 AC33 AC34 AC35 AC36 AC37 AC38 AC39 AC40 AC41 AC42 AC43 AC44 AC45 AC46 AC47 AC48 AC49 AC50 AC51

q_desc op1 op2 op3 op4 ans The ------ key can be used to select an existing company from list of companies. F1 ALT+F1 CTRL+F1 None of theA above Import and Export of data betweenTally INI other programs is possible only through ---------- Program. Tally ODBCTally IMP Tally and None of theA above The re-order point is the inventory quantity that trigger a stock replishment activity. TRUE false A A created company's detail can beCTRL+F3throughof theB F3 ALT+F3 modified None keys above A/An ------------- is the official notice thatB firm sends theC customers to advise then to the amount of money that Invoice Bill A or the None of to its above In tally,all masters have ________main options Two Three Four Five B In tally,to create a new Alt+C in balance sheet press _______ Ctrl+C column Alt+Ctrl+C None of theB above In tally,the use of group behaves like a sub-ledger, option A that we can summarize many ledger accounts into one TRUE FALSE is In tally, we can alter ledger details using either single or multiple modes but not alble to delete a ledger from multipl TRUE FALSE A In tally,a group company is marked with an ______________ * $ & ^ A The systems that workPuchasing and Receiving and payD replenishment of stock are --------------Puchasing and Accounts payablepayable and Receiving and Accounts payable together toAccounts Puchasing, Receiving order,receive, for Tally allows to delete aMultiple from --------- alteration mode. Single ledger A or B Mone of the above A --------------------- is/are StatementsStatements All of the above making. Cash Flow usefulFlow Ratio Analysis the decision Fund for management in D In tally,the group company must contain at least _____________ members Two Three Four One A To cancel aAlt+D vourcher entry in Tally, short-cut key is ----------Alt+X Ctrl+T Ctrl+D B The accounting masters andInformation Information to D Create Information Alter inventory masters related above Display All of the We press ------------- function key to display the age-wise analysis of Bills Receivable or Bills Payable report F4 F5 F6 F7 C In Tally, we Alt+P ------------, to print report . None of theA press Ctrl+P Shift+P above In Tally, Types ofAudit Statistics Types of Vouchers passed during the period, can be seen in ------------- report. Tally Accounts and Day Book Journal Book B In the Tally Bin Software, the ------------Sub Data directory stores all dataabove by the user. None of theB entered The LedgerTrue Accounts are unique in Financial Accounting Packages False A Customers Enterprise Data Interchange Information into the firms computer using the firms wide area network is a can be permitted to enter their own datathe above Enterprise Data Electronic Data Interchange. All of C In Tally, we TRUE can customize the Vouchers as per our requirements FALSE A The number of steps in3Accounts Compilation 5 2 4 are C Each action/transaction of arecordField data element data firm is described by a ----------------. All of the above B Tally is based on mercantile accounting system FALSE TRUE B Ctrl + N is used to ----------- Calculator Display stock valuationChange Period of theB Open method None above ------------- in Tally classify the accounts under None of theB so that summarised information is possible. Ledgers Groups Journals different heads above Revenue Account also Nominal -------------- Account theB Personal known as Real None of above Method of Voucher Numbering is/are Manual Automatic None All of the above D Accounts Receivable are displayed ournal Book of the above Balance Sheet & Lossin Profit J All A To assemble a product from Journal itemsStock Transfer is used Journal Stock different Physical -------------- entry Reversing Journal B A --------- purchase orders data flow is directed to the purchasing system for use in closing out the outstanding purc Filled Receipt Issue None of theA above Tally provides at least --------- predefined voucher formatsB 11 16 18 21 The value of the inventory is included in a ledger accounts as an asset on the balance sheet FALSE TRUE B " The buyers can followmanagement by exceptionof the above reasons " is an example of ----------------management by objective up with theelectronic data analysisB suppliers to determine the All From voucher entry mode , if we press __________ then B get payment voucher in tally F4 F5 F6 Alt+f5 we Default Cost Category in Tally is/are -------------- Category C Main Location Primary Primary Cost of the above All A Group Company is simply a name and an identify givenA the merged accounts member companies of the group True False to A ----------- is a primary Reports for recording all financialabove Ledgers document Vouchers None of theC transactions. The field can to 9 a value between ________________ in FA Package. 0 have 1 to 100 10 to 60 None A The _______ file maintains data that describes the supplier past transaction with the firm in terms of material quality Supplier Suspense Order All of the above A It is necessary to manipulate data to transform it into ---------------Report Output InformationNone of theC above In tally, to change the date of the voucher press ______ A F2 F4 Ctrl+f2 Ctrl+f4 Tally can maintain budgets on ---------------- None of theC Net Transactions Balance B Closing A and above The value of the inventory is included as an asset on the balance sheet True False A In ratio analysis report of Tally FA packagewe None of theA F6 function Alt + f6 function key key F7 function we press ________________ function key to the display of bills recei key above The accounts payable system is responsible for payingtheB suppliers for the ----------------Sales Purchases A or B None of theabove What is the1-4-1995 to1-4-1996 to1-4-1997 toNone of theB default financial year in 31-3-1997 31-3-1998 above 31-3-1996 Tally6.3 _________________ Tally encrypts and stores TALLY DATA at the data directory True False A The Profit & Loss statement can be displayed None of theC format(s). Horizontal Vertical A or B in ---------------above

AC52 AC53 AC54 AC55 AC56 AC57 AC58 AC59 AC60 AC61 AC62 AC63 AC64 AC65 AC66 AC67 AC68 AC69 AC70 AC71 AC72 AC73 AC74 AC75 AC76 AC77 AC78 BC1 BC2 BC3 BC4 BC5 BC6 BC7 BC8 BC9 BC10 BC11 BC12 BC13 BC14 BC15 BC16 BC17 BC18 BC19 BC20 BC21 CA1 CA2 CA3 CA4

Default ledger accounts in& profit &and trial balanceand bank balance Balance sheet tallyloss ______ profit & loss C Profit & are lossand Cash and trial Cash profit & loss Default 'godown' name Main location or b Primary in tally is ____________ A None of theB above 'Tally vault' Security mechanism Cost category is a _________________ Ledger a/c None of theA above To create aF5 sales voucher in tally , F8 have to press _______ F7 you F9 D A Group Company is ------------------------- B a name an identity A and given to the merged accounts of member companies of the group. None of theC above In tally,"credit note" voucher type return b entry for ________________ Sales return Purchase records a or None of theA above In tally you get currency symbol option from setting ofmenu Company creation Stock itemsRegional _______ theA units None above ------------------ gives theDaybook for each day for theof theB type has been selected. Trial Balance balance Balance Sheet None voucher above For 'stock journal' entryAlt +press ______________ in tally F7 we F7 F10 F11 B Tally provides the capability to the Bothvouchers Changes inChanges in administrator/auditor toC transactions or A and None of the above Ledger Masters B track changes in the areas is/are In tally, types of users are _______________ 1 2 3 4 B By pressingF9 -------- key,F10 of inventory reports can be displayed straightaway from the balace sheet report a list F11 F12 A Projected approximation of income or expenses is called ______________ . Balance sheet & loss a/c Profit Budget None C "Administrator" type user is also called 'Auditor' of a company in Tally TRUE FALSE A You will getF3 company information , Alt+F3press __________ from gateway of tally Ctrl+F3 if you None of theC above A constituent(member)FALSE can be a member of more than one group. TRUE company A Default stock category Primaryis ______ Main location tally in Symbol None of them B To create aTally.imp import activity in a file _____________ is located in the same directory as an executable prog log of the Tally.ini A or b None A In Tally,inventory valuation methodStock analysis offromabove Stock summary journal Stock option is available theA _______ None Tally audit feature is available the creation of__________________option By pressingDuring in a In key infocompany Bcontrol' F11 function 'comp a -> security company None In tally, a group company can also be a constituent(member) of another group company TRUE FALSE A Default number of groups in tally are ________ 128 228 28 16 C During voucher entry ------------- are used. Ledger Accounts Groups Sub-Groups or C B A User designated as --------------- can view audit list. Administrator Owner Data Entry TallyVault A Tally supports Importing of data from companyNone of theC database file. One company to another ---------------Other programs - aand B Both A spreadsheetwithon Tally Package created or above a In an accounting information disbursements.of Payroll transactions. computer files most likely would be a master file Inventory subsidiary. Cash receipts. following types of Cash system, which the A Which of the following is anproduce a moresetEliminatesat producingstatements. Does not requireadvantage beamore efficient of financial for transaction processing over a manual syste Will as stringent a computer-based system reconcile statements. Will of accurate set the need to financial control accounts and subsidiary ledg of internal controls. C The memory address register is has memory an instructionmemory been transferred from memory data to be transferred to been transferred from that has data that used to store of a memory location the address C Inefficient usage of excess computer equipment can be controlled by Contingency Planning Capacity Planning System feasibility report Exception reporting C Which of the following is not the component ofAGP Card B NIC Card VSAT RAM a CPU A trailer label is used on a magnetic Number it is the lastand end-of-reel code Record Count Identification tape file, End-of-fileor more fields Control totals for one B record and summarises the file. The following is an inform Hard copy is a termon a hard board Writing used to describe...? information on the hard disk Printed output Storing None of above B What do the abbreviations VAB stand for audio board above Voice activated broadcasting Voice answer back Visual None of C What control wouldcheck the accidental erasure of customer information from a magnetic tape Validity prevent Boundary protection Limited access files File protection ring C What are the individualPixelswhich Pixies up a None ofon the monitor screen called? Coloured spots dots make picture above B Header label normally include all thenumber Batch TotalD File Name Identification following except the Reel Number A daisy wheel is a type Storage device Printer of...? Pointing device of above None A Which approach or Logs System technique is Security usually associated with microcomputers Physical a control Log ata Dictionary Console D B An impact printer creates characters by using...? andabovehead Electrically charged inkAn inked ribbon of print An ink pen None C The best security control in aaccess Restrict physicalonly unremovableenvironmentA to Use microcomputer Make duplicate copies of files Require user passwords media is What wouldA pen you NOT use with a flatbed plotter? Paper Eraser None of above C What do you need for an drum printer? A cartridge A ink jet A ribbon A cassette A The greatest control exposure in a CentralisedDistributed policies or procedures Separation Centralised microcomputer acquisition Disposition of of duties function for function forA PC environment is the lack PC What do you need for an drum printer? A cartridge A ink jet A ribbon None of above A A laser printerprint head laser beamn INK RIBBON of above A does NOT use? A A None C The amount of data that a disk may containcapacity ofas the disks...? Volume Size Storage is None above known C You can ________ protect a floppy disk. and Write of above Read Write Read None B Information Magnetic tape isdrive Floppy disk None of a...? on a hard disk usually backed-up using above PAN A Using generalized audit software packages canone of these value _______ to an audit department's products & services A to add customers above add a lot of all the n _______ is Oracle CAAT as database used for ACL JCL none the above A Generalized audit software perform auditors to undertake A past records and not concurrent auditing True False any Generalized audit software is a file whose capabilities for verifying processing is logic True False B

BC22 BC23 BC24 BC25 BC26 BC27 BC28 BC29 BC30 BC31 BC32 BC33 BC34 BC35 BC36 BC37 BC38 BC39 BC40 BC41 BC42 BC43 CA5 CA6 CA7 CA8 CA9 CA10 CA11 CA12 CA13 CA14 CA15 CA16 CA17 CA18 CA19 CA20 CA21 CA22 CA23 CA24 CA25 CA26 CA27 CA28 CA29 CA30 CA31 CA32 CA33 CA34

Magnetic tape is a...? Random access medium Serial access medium A parallel access of above None medium A Hard disks can have a 20 GB capacity in the None of above 1.44MB storage 700MB region of...? B Which storage device has the largest capacityNone of above A CD-ROMA floppy disk agnetic tape Mb? M in storage C Which storage device cannot be erased? tape storage A A CD-ROMA floppy disk agnetic None of above M You can ________ protect a floppy disk and Write Read Write Read Not B Where should a sunny By magnet objects By floppy disks be stored? drawer None of above window In a C The contents of these chips are lost when the None of above ROM chips RAM chips CDROM chips computer is switched off? B What are responsible for storing permanent data and instructions? RAM chips ROM chips DRAM chips None of above B Which parts of the computer perform arithmetic calculations? ALU Registers Logic bus None of above A What are small high speed memory units used for storingB CPUs Registers Control unitNone of above temporary results? How many bits of information can each memory cell of above 0 bits 1 bit 8 bits None in a computer chip hold? B What type of computer ROM chips CACHE volatile?of above RAM chips chips are said to be None A Magnetic tape is a...? Random access medium selective A Serial access medium A parallel access medium A access medium Software can be divided into twosoftware and application software Network software andareas: software ofand B Systems security software the games software Business None above Travel agents use this computer computer Supercomputer Personal system whencomputer flights Mainframe None of above reserving B Which computers are computers weather forecasting computers Notebook used in the Jon Von Neumann industry? Supercomputers None of above B Vacuum tube based electronic computers are...? of above First generation Second generation generation Hoover None A Which generation ofgeneration was developedNone microchips? Second computer First generation generationof above Fourth from C Which generation ofgeneration uses more than one microprocessor? Second computer Third generationgeneration of above Fifth None C Which generation ofgeneration developed using integrated circuits? Second computer Third generationgeneration of above Fifth None B Which generation ofgeneration developed using solid state components? Second computer Third generationgeneration of above Fifth None A Name threeSpecification, Design, and Design, None of aboveand Implementation steps involved in developing an System Design, Programming, Testing and Testing Analysis, information system A CAAT's areTrue computer program and data that auditor usesA part of the audit procedures to process data if audit sig False as CAAT do not contains package programs, purpose written program, utility programs or system management progra yes no B Embedded true routines are sometimes built into an entity's computer system to provide data for later user by the a audit false A SCARF involves embedding audit software modules within an application system to provide continuous monitoring true false A Concurrent true auditors as the member of the system use false A Regular cross system verification may minimize frauds A true false Computer security is frequently associated with confidentiality, integrity and authentication true false A Data reserve engineering process metadata to document A true false system and abstract business rules and relationship The first step for developing audit objective the typeslayoutfrom file to determine the CAATto obtain a record of data review and evaluate extract dataA is_________ Using the open bring the data directlythe aboveone ofis ______________ can database connectivity feature in ACL the A can bring the data indirectly all n above Computer Assisted Audited Technique involves the use of computers through "Black Box Approach" True False B White Box Approach necessary involves expert knowledge on the part of Auditor True False A The transition from in the method ofto CIScodes thetrails D dramatic changes including ________________ change manual of accounting environment bring use systemabsence of all recording audit above accounting transaction Auditing with computer risk driven approach the documents driven approach approach of the B necessarilyunique supports none above CAAT involves an Auditors' appreciation of fileall thestructure hardware and softwarechecks and controls D processing options, __________ configuration data above Widespread end use computing result in unlimited errors creeping into system going to accept handling, thereby inc true false A For computerized auditing usage of sophisticated audit software would be a necessity true false A Important knowledge needed to begin for aboveone use ofA the source of data available tomaterial planing CAAT is _________ source of datathe the n the organization all planning audit of these The move towards paperless EDI would eliminate much of the traditional audit trail, radically changing the nature of true false A Computer operation controls are access to to provide to allD the of by allproviding designed computer ________________ concerned use of any programs above none of the organization personnel Systems development control, apart from others, include authorization, approval, testing, implementation and docum true false A A system could be _________ natural/man-made open/closed conceptual/physical D all of them A system exhibits 'entropy' true false A Super computer are the largest and fastest and is very suitable for commercial application including audit work true false A Assembler language uses Mnemonic symbols true false A Operating systems arejobs scheduled manage to optimize the machineresource sharing function include_______________ devised hardware & softwareabove enable multiple user capabilities, the all the resources D General purpose software provides a framework for highly complex scientific operation true false B In batch processing, transactions are processed one afterB true false another The use of computer assisted audit techniques one ofgaining popularity not only ________________ with audit departments all the above is not these with production departments n A On-line processing refers to grouping of transaction and processing the same in one go from start to finish true false A

CA35 CA36 CA37 CA38 CA39 CA40 CA41 CA42 CA43 CA44 CA45 CA46 CA47 CA48 CA49 CA50 CA51 CA52 CA53 CA54 CA55 CA56 CA57 CA58 CA59 CA60 CA61 CA62 CA63 CA64 CA65 CA66 CA67 CA68 CA69 CA70 CA71 CA72 CA73 CA74 CA75 CA76 CA77 CA78 CA79 CA80 CA81 CA82 CA83 CA84 CA85 CA86

Real time refers to the technique of updating files with transaction data immediately after the occurrence of the even true false A In OLRT the CPU should process the capability of program interruption true false A Time sharing system allow access to a CPU from remote A true false terminals DSS is defined as a system that provides tools to managers to assist them in solving structured problems true false B DSS has the following components _________________ D databases planning languagebaseall the above model Master filestrue contains current records for identification andB false summarizing Transactiontrue contain relatively permanent records take product profile, customer profile, employee profile etc files false B Master file configuration includes ____________ of the D reference files files report files none table above ______ is afilex management softwaremanager that lets users and programmers organize data into files and then p file file-o-man file package filepet C CAATS provide added decentralized picture ofna system A to have a complete picture of aboveone of the above value to theall the abecause _______________ clients system File volatility refers to the number of addition and deletions to the file in a given period of time true false A File activity true proportion of transaction file records that are actually used and accessed in a given processing ru is the false B File interrogation refersretrieval back-ups to the _____ of information from a file deletion addition B One -to-one relationship means a single entity to a single A true false entity in a monogamous structure RDBMS is structured to a series of 2 dimensional tables A true false SADB stands for ____________ software and databasedatabase seriously affected database subject area database safety and B Controls are present over many aspects of the computer system and its surrounding social environment true false A In framed checking thefalse entry is checked against an expected picture or format true data B Errors are correlated_________ on quarterlynone of the B at the year end immediately basis above Field checktrue is exclusive to a field false A _________ Benfish law basically states that there is a none of the B Benford Benjamin specific probability of the first digit of a no. being 1,2,3 etc above Check digit true group of nos. added to a code for determining the accuracy of other digits in the code is a false B Hierarchical code means _________ to theplacement of component entity consecutive nos. or alphabets toprimary of the D of the the blocks of nos. random entities attribute none above The validation checks applied to a field depend on the field's logical inter relationships with other fields in the record true false A The contents of anumeric valid, field could determine _______ the above ______ field invalid, alphabetic the all sign for a none of above A Batch is thegrouping, ofregrouping, none of the all thebear some type of relationship to one another process transaction events ______ together _____ that above above A Hash totals true means meaningless totals false A With OLRT true interactive data entry is available, the master file associated with a transaction may be searched where false A Controls are required for authorization to ensure data integrity and detect possible breaches in security true false A Data from client application are not stored in the organization's database through auditables events and function true false B All input records in a batch are normally of different types B true false IDEA stands for _________________________________above incrementalinteractive data extraction and analysis analysis design andinteractive data innumerable enlarge activity of the B none A transaction file is sorted prior to the update of master file true false A A sequence check on the transaction or master files by an update program is not required true false A Whenever monetary transactions are processed against master files, the update program should maintain a correla true false B Internal tables are stored tables from which certain valuesA true false are extracted for further processing and storing For small toe-brain sized systems, individualstub medium bouncing ball big-bang modules are coded and individually tested and then assembled to be C In systems testing, up tests bottom testtop-down tests involves_________________ hybrid testsall the above D Recording transactionsno a controlled manner may amount to loss of stored data yes in B Audit software is data on client's file to _________ above read used by the auditor provide information to the the re-perform procedures D all audit carried out by the clients programs Core imageexecutables, is a software usedthese the above compare _______ version of a program with a secure _ comparison masterhard deleted, none of byall auditor A the to Database analyzer is a false true software which provides detailed information concerning the operation of the database A SAS standssystem analysis software the aboveone of the A for ______________ all system advanced software n above Embedded true is a software used by the auditor to examine backup data code false B Embedded yes performs wide variety of audit task code no A Core imagetrue comparison is particularly useful where only executable versions are distributed false A Log analysis is a software used by auditor to detect virus B true false On line testing techniques the auditor ______ all the above manipulates, real false create, none of these either _______ or fictitious in order to see that a specific program data A Mapping software is used by the auditor to list unused program instructions true false A Mapping software has very objectives yes no A Modeling is can be verycan enable can auditor to execute provisions on information with trend bases patterns a variety of software which provideall ofauditors with useful a number of different s and powerful analytical tool the the above the ________________ D On line testing can be targeted for specific functions carried out by programs yes no A

CA87 CA88 CA89 CA90 CA91 CA92 CA93 CA94 CA95 CA96 CA97 CA98 CA99 CA100 CA101 CA102 CA103 CA104 CA105 CA106 CA107 CA108 CA109 CA110 CA111 CA112 CA113 CA114 DB1 DB2 DB3 DB4 DB5 DB6 DB7 DB8 DB9 DB10 DB11 DB12 DB13 DB14 DB15 DB16 DB17 DB18 DB19 DB20 DB21 DB22 DB23 DB24

Program code analysisidentifies _____________ source code of a program with advice to following the logic of a pr provides detailed information of machine usesC there for fraudulent reason involves program code which mayabove examination of of the be none __________ is a software of CAAT IDEA ACL ALC ACLL B Snapshot istrue software which takes a picture of a file or data or a transaction passing though the system false A Base case system evaluation includes____________of ofA file or data fictitious data applied against the the picture a programmed comparisonanalyzing client program of source versionabove all the a While base true testing forces on finding if there are any defective execution policies in a program false A Black box testing seeks to determine whether application A true false output is what it is supposed to be In integrated test facility approach the auditor should ensure that the impact of test transaction is subsequently elimi true false A Black box testing is _______ based and whiteaboveaboveis _______ based specification, program none of the all the file, hardware box testing A Source code review means__________ identifying erroneous code identifying ineffective code above code identifying non-standard all the D In formula in flow hypothesis the auditor should expand the extent of substantive tests to determine how the defect true false A All material true application false oriented events that occur within the boundary subsystem should be recorded in the accoun A In examination of audit authentication of information support an event may be ___________start and finish time following data associated with trail the resource requested all the above D JCL means_________________ all the aboveone of the A job control language job connectivity language n above Audit should be periodically analyzed to detect any controlA yes no weakness of the system In an accounting audit trail, intrusion detection system might monitor the amount of processor time consumed by the true false A A sample size calculator program assists auditors in determining RAND() function true false B Generalized audit software consists ___________ package computer p[program for performing aA questionnaire processing function mathematical concept of transactions master list administeredvariety of data Specializes prepared by the auditorprepared by an outsideD audit program may be___________ the above prepared by the entity all programmer engaged by the auditor Generalised audit software could be used by the followingA consistencies or significant fluctuations true false in Generalized audit software function include____________ file access/organizations statistical/arithmetic operationabove analysis stratification and frequency all the D In the file reorganization merging capabilities are needed in data from separate file is to be combined on a separate true false B Auditors cannot use generalised audit software to extract B data needed for audit purpose true false the Auditors can combine functional capabilitiesprocess above data software to accomplish the task of _____________ examining the quality of system ofall the carrying analytical review quality of audit examining the generalized D Which of the following is notextractCan aid GAPs define D audit objectives Wide access to various and analyse data selection Can the feature of in simple data base Can the Which is the example of CAATs High End CAATsthe above ACL IDEA All of D In audit procedures, testtransactions special purpose written program A sample of data is A A utility software programme of theA None above Which of the following is not the use of CAATs teststhe general EDP controls Tests of details of transactions Analytical review procedures of above Compliance of All D Which of the following are called explicitly by another procedure? Macros Action Procedures Event Procedures Procedures General D _________ integer isnumber used for fields assignedD primary keys in a table data type generally primary number number auto as MS access true objects canfalse be published in the web A In code-builder, got_focuse, click,dbl_click,enter areof the B actions events proceduresnone examples of _______ above _______can be used to automate certain actions in response to events report form chart macros D In the macro sheet the expression comments action macro macro is selected in the _____field elements D To build complex expressions_____is used expression C calculator code builder xpression builder e elements The three list boxes present at the expression none of the C box action list macro list bottom of the expression builder are called_____ elements list above ________option is selected from the view menu to create A conditions action insert none of the above with conditions macros _______report can be created withauto reportuser input C tabular columnar minimum embedded _______layout of a form displays one record at a time tabular columnar datasheet justified B The table or queryreport on which embedded report create name report we are going to reportour report is selected from the ____ dialogue box link new build D ______and_____are the two typesdynamicreports available columnar and tabular unstable and static the A stable and of auto none of above There are no wizards for creating a database in access B true false ______option fromfieldsinsert menu option is chosenchart C an embedded chart create the add chart chart insert to add In ms-access, whilekeyalternate references constraint is used for creating _______ primary using SQL, key foreign key none of the C above _______is used to create a mailing label label wizardchart wizard mail wizardnone of the A above ______header isheader roup header start present at the beginning of the report D g page header report header ______is present at the age footergrouppage inone of the B report footer bottom of each footer a report above p n In SQL, havingorderingis used for _________ none of the C with group by clause for clause for updating records records for specifying conditions above ______fieldcondition togroup is added the macro macrowhennone of thegrouping option from the view menu sheet names select C we above ______can VB used to reportstoolbars be Modules create forms macros D _______query is used to add records from one or more tables into an existing table add append insert delete B _______window is used to write VB code in access of the C report macro sheet module none application above Values for other tables,false true queries are maintained in look up A fields data type

DB25 DB26 DB27 DB28 DB29 DB30 DB31 DB32 DB33 DB34 DB35 DB36 DB37 DB38 DB39 DB40 DB41 DB42 DB43 DB44 DB45 DB46 DB47 DB48 DB49 DB50 DB51 DB52 DB53 DB54 DB55 DB56 DB57 DB58 DB59 DB60 DB61 DB62 DB63 DB64 DB65 DB66 DB67 DB68 DB69 DB70 DB71 DB72 DB73 DB74 DB75 DB76

Visual Basic language is a _____ tool RAD RAP RAID none of the A above ______ function is used to display message none of the B SysCmd MsgBox a message box above Other ms-office applications can be accessed none of the A OLE DDE CME from ms-access using a concept called ________ above OLE standsobject linking and embedding editing of the A for_____ on line execution on line none above The application that supplies data in OLE is called an _________ OLE object OLE client OLE serverOLE communicator C If any change made onembedded from the client side is reflected on the server then the object is said to be _____ linked the object connected edited A _______is the file format that works on internet exe DLL BMP html D ______ is used to convert any ms-access object into htmlD wizard form wizardreport wizard query wizardublish to web p format _______ option in publish to web wizard produces aof the B static file static html dynamic filenone page above static in nature that is _______query is used to create or insert database objects in a current database append add change data definition D Currency fields express the amount in _________ dollars rupees pesos yen A _______is selected from the toolbar to add anlist box unbound object object bound command button objectB OLE To display an OLE as iconin the form of an icon ____ icon A is selected from insert object dialogue box display object display link create option _______option from the file menu is selected to run of the C to the web wizard' create html new save as html none 'publish above _____page startup in an web application is used to navigate to the rest of the pages in the application home end none of the B above ______ is fired when an event is triggered is the concept based on a Visual Basic language bullet command procedure none of the C above Ms access is a ___________ DBMS RDBMS front end language A A collectiondata group data collection objects is known asC _________ of data stored in different database data storagea A blank database can be created using database dialog box box new dialog box blank database dialog box dialog new new __________ database A Text type data can be of _____ characters in ACCESS A 255 64000 235 63500 ______is a automaticthat assigns values automatically field datatype number AutoNumber number automatic B Tables cannot be imported from other databases true false B If two tables having same values for the fields none of theitabove an ______ inner join outer join explicit join are joined Ais called Duplication primary keynot null won't be allowed if the fields are declared a________ of records in a field candidate key duplicate key no A Changes from a master table can be reflectedchange allchild table by selecting _____option cascade delete related cascade update related fields records cascade change relatedon to the related records records C To see more than one record at a time in and b one of the B columnar tabular both a a form we use _______ n above In SQL, delete command is used to remove recordsof the C table or tables query or queries or _________ above record none In MS-Access, filter excluding selection will display only those record(s) which meet the criteria. true false B Properties of the fields fieldmanaged by _____properties B property field property are Dynaset field properties in Dynaset ______queries allows us to view data in row by column manner crosstab queries row/columnselect queries queries update queries A The type of action queries updatequeries record(s) in A table(s) are called __________ queries that can row/columnchange/delete queries a or delete update queries Joining tables without any matching values in the fields is D inner join self join no match join outer join called ____________ Primary key uniquely identifies each record true false A Which of the following dialog box is/are wizardboth 1 and 3 of form ________ new form dialog box form used indialog form create dialog box the creation D _______ query wizardssum used to generate summary calculations for a table summary are append simple D Properties of a formproperties change can be changed byproperties______from view menu options properties form selecting properties new B Forms that included form other forms are called ______________ are included ub form new form child form B s in In MS-Access, while using form design view, for creating aabove Record Navigation Operations Record Form Operations of theB command button for adding a new record, we should sel None _______ form displays tabular form columnar form in a single horizontal to many form fields hierarchicalone row B form The process of arranging the data sorting filtering ordering in a meaningful order is known as ___________ querying C ______ arefilter to select only some particular records from the table or any other database objects used sorts pipes gateways A In MS-Access, userform specify criteriaby menu in form view using _________ filter by may by selection for filter filter filter None of theA above ___wildcard character represents any single character D * $ @ ? Records cannot be sorted by a primary key true false B A control without acontrol bound data source is known as ___________ unbound control less controlcontrolB data data Set of related option buttons, check ontrols and togglegroup is known as _____________ button groupption group boxes group o c record buttons B The collection of related data and objects is called aof the A database form collection none ____________ above Which of the following is control types ____________ above bound unbound controlled all of the C In MS-Access, the function that gives the current date is _____________ CURRDATE() TODAY() DATE() DAY() C _____is a control that lists box of data text box list set combo box static text B ______is a pivot table columnar form amountmain form A form that summarize large tabular form of data ______allows to sheet filter by by typingby form inof the C sheet data createfilter a filter input filter the value a data none above

DB77 DB78 DB79 DB80 DB81 DB82 DB83 DB84 DB85 DB86 DB87 DB88 DB89 DB90 DB91 DB92 DB93 DB94 DB95 DB96 DB97 DB98 DB99 DB100 DB101 DB102 DB103 DB104 DB105 DB106 DB107 DB108 DB109 DB110 DB111 DB112 DB113 DB114 DB115 DB116 DB117 DB118 DB119 DB120 DB121 DB122 DB123 DB124 DB125 DB126 DB127 DB128

Wizards forbutton wizard toolbox controls are called a __________ control wizard option control wizard C tool wizard The wild card representation for any 5 letter word that starts with ram is ________________ ram* ram?? two of the above of the B none above Look up fields slow up data entry true false B ____is an access object that displays un-editable data A report form table ledger _____option from the new object toolbar givesnoneeasiestA autoreport report module the of the above generating a report way of ______ represents data in a pictorial format report chart label bitmap A Changes oftrue table can be carried over to another related table one false A Hyperlinks are used to false to any kind of information or data from a file true jump A The memo 60,000 have text upto_____ characters in length field can 255 25,000 64,000 D In MS-Access, columnar layout can be used to view multiple records in a form true false B In MS-Access, alter command may be used in adding a primary key to a table true false A Update query is used to add records from one or more tables to the end of an existing table true false B In ms-access, datasheet view is available in ___________ table query form all of the above D ______are used to jump to any kind of information from aD table form report hyperlink datasheet or a form Home pagetrue always false will be present as a first page of an application A Make table true queries create a new table from the records of another table false A In ms-access, to protect a database file from illegal of the C we may set database password. The option of setting d Insert Records Tools none access, above Foreign keytrue field that uniquely identifies each record and accept no null values is a false B Data definition queries false true are used to create or change database objects A The attributes of a composite key keys alternate keys composite are known keys candidate as ________ primary keyC OLE object true data type in access is a false A Data displayed in forms cannot be edited true false B A sub form true is used to display one to many relationship between tables false A We can switch from datasheet view to form view by selecting view -> form view option true false A In MS-Access long integer is a datatype true false B In MS-Access, while designing a table for a particular field, the Required parameter is set to yes. This validates the null not null zero none of the B above Sorting is applied to select only some particular records B true false Filter by form can be created from a forms shortcut menu B true false Advanced filter uses a filter similar to the query design window to create a filter true false A ? Wildcard character represents any number of characters true false B _________ piethe following is/are a type1of chart of bar both and 2 one of the C n above A bound control is tied to a underlying query or table true false A A calculated control uses expression as a source of data A true false Text boxes true cannot be bound controls false B The default updateinvoked by query query query select ms-access is append query delete query B A control can be bind to a record using row source property true false B List box is a control that offers a list of choices true false A If a table is inner join itself it is called a ________________ joined to outer join self join table join C A picture box combines the activities of both a text box or B list box true false a Line is a tool box control true false A Text boxes true be partfalse option group can of a B _____ chartfreestandingseparate object alonesub chart D exists as aembedded stand Filtering data is a way of arranging data in a meaning full order true false B Wild card characters are used for sorting records true false B Pivot tablestrue used to navigate to the other tables in a database are false B Reports aretrue to represent un-editable data used false A In MS -Access,first field of lasta table are sorted based onC the the recordsthe table of the tablefield of the above the in field primary keynone _________ Relationship is an association between _________ forms reports attributes entities D Summary options dialog box is used to summarize data A true false ______ queries can beinsert to delete a groupadd delete used append of records A meet some specific records that Charts can true convert numerical data in a easily understandable format false A Embedded true existfalse charts separately B

DB129 DB130 DB131 DB132 DB133 DB134 DB135 DB136 DB137 DB138 DB139 DB140 DB141 DB142 DB143 DB144 DB145 DB146 DB147 DB148 DB149 DB150 DB151 DB152 DB153 DB154 DB155 DB156 DB157 DB158 DB159 DB160 DB161 DB162 DB163 DB164 DB165 DB166 DB167 DB168 DB169 DB170 DB171 DB172 DB173 DB174 DB175 DB176 DB177 DB178 DB179 DB180

The chart which cannotembeddedastand alonesub chart B freestandingexists as separate entity are _______________ From ms - access, if we want to view the records in formsDa table in ms - excel worksheet, we need to use hyperlink import use datasheet stored in use use export Page header is presentfalse beginning of each record B true at the Detail section has a header and footer true false B A macro is performed only when the user initiates an event true false B The macro true is selected from the action field of a macro sheet false A A macro can be made to execute before the starting of a database true false A In MS-Access. While appending records, the source and the target table must have similar structure and fields true false A We can add our own functions to the expression elements list box of the expression builder true false A _______is the wildcard# & character which represents the presence of any number of characters ? * D Macros cantrue used tofalse a menu to a database object A be add _____ header is a unique feature of reports topic page detail group C Chart can either be a form or a report true false A Group header will be present at the design view of a report even if the report is not grouped true false B We can change from the design view to the form view without being prompted for saving the changes made true false A Charts can true be produced without the wizard false B Macros cantrue used tofalse user defined error messages be create A Between and Not Between is ______ type of operators C relational list range logical The default true type of VB is integer data false B Visual Basic is based on __________ language ofbased language action language structured query - procedural the C event none above _______is the name offormdatabase object that displays data and can be used to edit data report the query table B In access OLE objects false be linked true cannot B _____ section is present for each record in the report group record session detail D A ________ sheet lists property both athat pertain to the form or the controls data all the properties and b one of the B n above Textboxes can also be false true an example of unbound control A In MS-Access, we mayfalse command buttons for navigating records true design A _______are forms that childincluded in other forms of the A sub forms are forms inner form none above _______ are used to represent ourlabels in graphical format graphs chart data report B A field with number a _______ uniquelykeyindex eachidentifier B primary identifies record Large amount of data can be summarized using ______ tables pivot create form none of the A above _______ are employedqueries only some particular records from a database object filters to select sorts forms A ______ control need not have a data source none of the C form bound unbound above ______ controlbox list combines the functionality of both a text box and a drop down list combo box button option button B MS access true DBMS false is a A A form can form namea record source using _____ property of the form be bind to control record source of the C none above ______ forms displays chartin single row tabular formfield form data sheet form of the A none above ______ forms are usually usedformtables with none of the A relationship sub forms tabular for columnar form to many one above _______ control uses an expression as a source of of the A calculated bound unbound none control above _______ control is tied unbound bound calculated to field static C _______is the form that canform tabular form sub form auto be created with minimum input from the user columnar form B ______option from the connect is selected for setting relationships between tables set relation tool menu relationships one of the C n above ______,______and_____are the buttonsbuttonsand to theD togglegroup and check boxes option, toggle and command check combo boxes command button, belonging list boxes list, check and option button, options button _________allows us tofilter by a filter from record short cut menu filter by formcreate report by a field by input filter filter D ________isform a database object which displays data but cannot be used to edit data report macro table B What term applies to a file clipboard collection of related records in a database? field layout B All of the following terms are related to computerized grabD search sort field namesrecord databases except which one? What is a database?analyse and manipulate numerical maintaining a log about a set of similar things A way to A tool to produce high quality documents An organised way of storing information A way of information C What does Information It contains all document which contains text a record contain? certain the data about one specific item about A programs collectionB files A of An RDBMSremote DBMS is a relative DBMS Relational DBMS DBMS Reliable C Data Warehousingdatabackingat a is related touses tape as opposed to disk storing refers to offline up data regularly separate site data mining C Unauthorised alterationComputer sequence checks Key verificationon-line records can Database accessemploying of Computer matching D by controls be prevented What is a database?analyse and manipulate numerical storing information about a set of similar things A way to A tool to produce high qualitydocuments An organised wayof theC None of information above

DB181 DB182 DB183 DB184 DB185 DB186 DB187 DB188 DB189 DB190 DB191 DB192 DB193 DB194 DB195 DB196 DB197 DB198 DB199 DB200 DB201 DB202 DB203 DB204 DB205 DB206 DB207 DB208 DB209 DB210 DB211 DB212 DB213 DB214 DB215 DB216 DB217 DB218 DB219 DB220 DB221 DB222 DB223 DB224 DB225 DB226 DB227 DB228 DB229 DB230 DB231 DB232

What does Information It contains all document which contains text a record contain? certain the data about one specific item about A programs None of theB above What is a report? allow users provide awhichflexible as hardcreating and editing documents Reports Reports to A tool very None ofway above (printed output) in documents extract information textA copy allows the and graphics to be placed of What is theExtractingtoSpreadsheetsdataqueries easy to analyse best way and analysing changedata analyse and make data of theC Using None above What are some popular office orientated processors,of theC Compilers, Network software,software systems above interpreters, editors Word backup applications? None spreadsheets, databases, DTP Which of the following and NOT NULL be used to enforcecolumns DEFAULT constraints KEY constraints and UNIQUE constraints rows in a table? FOREIGN can constraints PRIMARY KEY IDENTITY C uniqueness of the Which of the followingTABLE TABLE to change theTABLE of table? CHANGE commands ALTER TABLE MODIFY is used UPDATE structure C An RDBMSremote DBMS is a relative DBMS Relational DBMS DBMS Reliable C Data Warehousing refers to storing databackingat a is related touses tape as opposed to disk offline up data regularly separate site data mining C You are creating a client application that calls ActiveX DLLs. Which of the following properties of the Err object prov Number Description ComponentSource D This database holds personal information. The original paperwithkeep it confidential by using a password a backup copysavingcan help copy keeping keeping the user the file to different filenames A If the database product the primary mail and addresses, personalised letters can be created automatically using the holds customer names mergee-mail code key C Application A databaseGraphics browser software suited to storing the survey information obtained in the table would be e-mail A The characters * and ?operators wildcards in search criteria as bookmarks are sometimes used engines C Which of the following field types will generateAutoprimary key automatically? Auto Primary Auto ID AutoNumber the Key C Referential records in arelated tablesconsistent with are are consistent with the underlying tables or queries. integrity ensures thatare in ain a database consistent with one another. dynaset the: forms database the underlying tables.the underlying tables or queries. reports are B consistent with Tables are related to one another and a subform. foreign key.main form through a: its associated dynaset. query and report and its related query. A A foreign key is: the primary the primary a field fromrelated table. table. either related table. key of both key of the not unrelated key of related tables. a primary an B You are creating a banking database to track customer loans. The bank will, of course, have many customers, each One-to-oneOne-to-many Many-to-many Many-to-one B In a one-to-many relationship between Companies and Employees, which field is found in both tables? EmployeeID CompanyIDEmployeeLastName A CompanyAddress Which of the following menu, Relationship window one-to-many relationshipwith one another? For example, it ensur The Tools ensures that recordslinerelated tables are consistent Referential The join in The integrity B How would Double click the Relationship line tablesthe the Relationships window? shortcut menu you delete a relationship between Clickline, Delete Relationships button on the toolbar Right-click the Relationship in then select Delete from the Select Undo in the Relationships pull-down menu B In a Customers tables,are several a plus data associated CustomerID table mean? on the plus sign That there That some customers are recordswith that ID fieldby clicking what does of thethere next to the C can be added That sign is notrecords a related That viewable in What is required must both be numbers cannot be AutoNumber data types type They of the They cannot be text fields must be the same data fields that join two tables? They They D Assume a one-to-many relationship betweendeleted from D table and the Loans table, with referentialrelated loans Nothing, Accesscustomers customers ID ismessagefrom the Customers table, and all the integrity in ef The ignores the attempted command.Customers table. The ID is the Customers An error deleted is displayed. the Which of the following is is not visible. displayedis displayedisitsForm view. the form and can be moved or sized like The subform true whenThe subform insubform inan object on subform in the Form Design view? The subformviewing a main form and view. is The Datasheet associated D Which of the following relationships does not belong in and playersand coaches and playerssports league such as f A one-to-many relationshiprelationshiprelationship between coaches A one-to-many between many-to-many relationship between teams and teams A one-to-many between teams based on a professional A teams a database C Which symbol is used at the end of the join line in a related table to signify the many side of a one-to-many relation # M * C You have created table The Customers Loans withwhen there integrity between a Customers table and a Loans table Either a one-to-many relationshiponly referential are Loan records associated with that customer at any timeThe table table at anyC Neither table time The correctprompt, titleprompt, icon,for bar text, prompt, icon. is:prompt. order of the bar text, icon. the MsgBox statement arguments title bar text. bar text, icon, title title B The first statement in aSub CreateList. Dim CreateList. procedure CreateList. Sub. is: B named CreateList Which of the following is enables the drop-downfields? to choose ofto choose from one text. entries. A check box TRUE related to formAto choose C list one fromthe userseveral existing A text field enablesuserform enables theenables one of to enter of several existing entries. A form the list user from user several existing entries. drop-down A text field: must be setmust be word. multiple words. setC two words. for one setdoes not have to be set.for for must be The purpose of a database istrack create tables of rowsdata on different things in different tables. help peoplestore data in tables. maintain and columns. keep to: of things. A A databasedata. stores: relationships. metadata. all of the above D A databasefacts. records: figures. information.a and b D A sales contact manager used byapplication a database A single-user multiuser database application example of _______________ database a salespersonor b e-commerce is an application A Customer Resource Management (CRM) system is an example of_________ single-user multiuser database application above database application None of e-commerce database B application The industry standard supported by all major DBMSs thatC Sequential Query Language (SQL)Relational Question Language (RQL) together is called __________. Structured Question Language (SQL) (SQL) to be joined Structured Query Language tables allows A program whose job Modeling System Business Model System Database is to create,Management System Model Manager Database process and administerB Data Relational databases is called the _____ Microsoft Access may use which of the following DBMS engines? Jet SQL ServerOracle a and b D Which of the following are basic components of an enterprise-class database system? The user The database application management system (DBMS) The database of the above. All D In an enterprise-class database systeminteract(s)of. aboveA the database application(s) ________with thedata the DBMS accessesabove None of the database DBMS All In an enterprise-class database system, the database application ___ . creates queries creates form creates reports c b and D In an enterprise-class database system, reports management system (DBMS) the user the database application are created by ____________________ . the database database the B A databaseall considered "self-describing" because the above. own structure is the users' reduces data duplicationof _______ its it data is in one place a description of . it contains All C In an enterprise-class database system, indexes of the_________ . holds user data metadata the database above. holds holds All D A databasetables may contain _________________________ .D metadata stored procedures above. All of the A databasefrom existing data systems developmentexisting databasea database being designed _____________ designed using spreadsheets from the Sales department is as a new as a redesignandan project a of b A A databasefrom existingimplementas a redesignandan existing database designed to non-database data a of b reporting application needed by the Sales department is a da as a new systems development project requirements for a B A databasefrom existingcombinesystems developmentby the Sales department is a database being designed _____ designed to data as a new two a redesignandan existing database as databases of b project a used C Database professionals use ________________ as specific data sources for studies and analyses. data marts normalization models data entity-relationship data modeling A Database professionals use a set of principlesentity-relationship data modeling data marts normalization modelscalled ________________ to guide and assess database design. data B

DB233 DB234 DB235 DB236 DB237 DB238 DB239 DB240 DB241 DB242 DB243 DB244 DB245 DB246 DB247 DB248 DB249 DB250 DB251 DB252 DB253 DB254 DB255 DB256 DS1 DS2 DS3 DS4 DS5 DS6 DS7 DS8 DS9 DS10 DS11 DS12 DS13 DS14 DS15 DS16 EC17 EC18 EC19 EC20 EC21 EC22 EC23 EC24 EC25 EC26 EC27 EC28

A very popular development technique used by database D data marts normalization models data entity-relationship data modeling professionals for database design is known as _________ A very popular development technique used by database D data marts normalization entity-relationship data professionals to adopt a database design to new or chang data migration modeling The predecessor(s) of database processing was (were) data model . file managers hierarchicalnetwork models models relational __________ A In a relationentities in a the order ofthe order of.more thanisC column can use the same name __________________________ the important column vary as columns is rows one the to kind unimportant An attributetable known as a(n) row is also relation field . D A combination of one or more columns used to identify particular rows in a is___ . record field key tuple C A combination of two or more columns used to identify particular rows in a relation is________ . record field composite key foreign key C A determinant that determines all the other columns in a key record field foreign key candidate relation is______ . D When designing a database, one of the candidate keys inB relation is selected as the _________ . composite key primary keyforeign key surrogate key a Normalization is a process used toDeletion anomalyaboveD Insertion anomaly anomaly with which of the following modification anomalies? Update deal All of When you are given a set of tablescreate one orand the data into the new database assess the existingthe database structure new tables to store their data, the first step is to ____ . design tables' structure more a A and askedmove content to create database Modern microcomputerwere essentially killed response time are supplied personal DBMS poor off by MS Access products by severalhave products______. B well-established manufacturers are not true DBMS Which of the following are true about data mining data theA than report delivery for reporting systems. They use sophisticatedNonintegrated techniques. Their report mathematical applications? delivery is more difficult None of above We have obtained access to the company's operationalformat"We examine 50 records for customers with phone nu dirty data inconsistentnonintegrated"wrong data. problem data a data B We have obtained access to the company's operationalformat"We have been asked to produce a report with an item dirty data inconsistentnonintegrated"wrong data. problem data a data D A data warehouse databasewarehouse warehousetables. C often because: data warehouse data are not an operational database denormalized. data differs from stored in do not have metadata. data databases data are b and c Which of the following objects is used to display a menu? A Form Table Report Query Which of the following objects are NOT found Spreadsheetsapplication? Forms and Queries and tables reports Macros in an Access D You are developing an It will beapplicationupgrade itputthe B how the objects are inWhich of stored, thethestatement It will be easier for the userfor the user toifupgrade it if the objects and in one database. and user will hav Access easier advisable to expectobjects and periodically.tables database It is to thatRegardless of object and table are a separatethe following tables in you each upgrade tables into one are database. to Which of the following statements regarding Accessto associate theNOT the tables, multiplethat itwithin the same dat The Link Tables command canconsistapplication can be created in with must reside the linked to yet an An application objects in anof applications is tables in one database objects, objects in as fo All may be An application, including true? such a way with objects such anoth used multiple databases, each C Which of the following brings a copy of the table into the current database and does not maintain a tie to the origina Import Link Merge Join A What makes contains more than one table a user interface, or switchboard It a database contains tables, reports, queries,C It an application? It contains It contains macros and forms What is theMenu Wizard Access tool that Menu Interface Design Wizard Manager Build is used to create the user interface? Switchboard D The purpose of a data warehouse put key business of data collection. hands or more decision makers. create backups for mission critical store all corporateinto the centralize the to: is manageability information transaction data in one single location. corporate data. C ___________ means the result of applying to specific information certain specific technical processes. Digital SignDigital Certificate Signature of theC Digital None above __________ is an algorithm which Digital Certificaterepresentation or "fingerprint" in the form of a "hash result". Hash Function Digital Signature creates a digital KeyA Private __________ is of Function length which Result ither B orsmaller than the message but nevertheless substantially un Hash standard ValueHash is usually much C Hash E D Digital Signature involves two Signature A TheyB ___________ and __________. Digital Signature creation Digital processes. and Either A or B Both Verification are C The Costs of Digital Signature consistsSubscribertheof theA Institutional Subscriber and mainlyNone following Cost Overhead Relying Party Cost Institutional Overhead Party of Relying above CA stands for ________________Certificate Authority theA Certification Authority Certified Authority None of above A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private Key True False A A Digital Certificate does contain Owner's Public Key, Owner's name, Expiration date of the Private Key, Serial num True False B ______________ enable web servers to operate inCertificatemode. Server Certificate Developer CertificateDigital a secure Personal None of theA above ______________ are used by individuals when theyof theC Server Certificate Developer CertificateDigital certificate messages with other users or online services. Personal None exchange above ______________ are on-line databases of certificates the Bother information available for retrieval and use in verifyi Private Certificate Repositories ublic Key none of andabove P Signing Writings serve Approval, Evidence purposes______,_______,_______ and _______ Evidence, Ceremony, Approval and logistics,D the following general Evidence, Ceremony, Approval, Efficiency and Logistics Efficiency Evidence The most widely accepted format for Digital Certificate is defined by the CCITT X.509 True False A A certificateTrue proveFalse unreliable, such as in situations where the subscriber misrepresents his identity to the may to be A CRL standsCertificate Revocation Resource List for Certificate List certificate Revocation Letter None Of The Above A The prospective signer Public key, Private Key, Recipientholds the_________ and is called the ___________ Private Key,identified inRecipient certificate A Above Subscriber the digital None Of The In EDI interface, theFormat File service receives _________ as incoming files from the communication service Internal translation Format File None of theC External Transmission File above The EDI standardisation for International Trade and Commerce is introduced by __________ ANSI UN/EBCDIC UNESCO UN/EDIFACT D In EDI, the transmission files are composed offunctional sets of external format files which are grouped into multiple batch files interchangefunctions different groups sets D The ________________ are pre-paid credit cards that theA Smart CardEmbedded SET cards None of include an embedded cards above ________________ are another form of creditElectronic that lets customers use digital online cheques to pay Web m E-cash Digital Cash Smart Cardspayment cheques D In Active advertisement, there Catalog and Billboards Catalog are _____ and Endorsements Billboards and Junk Mail types of models. Mail and Customer ________ Online are two Broadcast and Junk They Online C The network based technology is/are ____________ above EDI E-mail EFT All of the D Decryption is a process employed for scrambling of plain text for web based transactions True False B AsymmetricLogin_Id and Password on __________ and ____________ cryptosystem is basedPublicPrivate Key Key and Private Key Primary Key and Key and Password Public D Value Added Network is an example of _________ of theB Global Network Private Network Satellite Area Network above None The advertising strategies based advertising or hoardingare ____________ Active or push emerging in the on-line worldabove Passive or pull-based advertising strategies Glow sign All of the D The _________ model Junkdirect mail, spot television or cable television, in active based advertisement. Broadcast use mail Billboard Endorsements A

EC29 EC30 EC31 EC32 EC33 EC34 EC35 EC36 EX1 EX2 EX3 EX4 EX5 EX6 EX7 EX8 EX9 EX10 EX11 EX12 EX13 EX14 EX15 EX16 EX17 EX18 EX19 EX20 IN9 IN10 IN11 IN12 IN13 IN14 IN15 IN16 IN17 IN18 IN19 IN20 IN21 IN22 IN23 IN24 IN25 IN26 IN27 IN28 IN29 IN30 IN31 IN32

The ________ is a form of mail that is not targeted to a specific audience E-mail Bulk-mail Direct-mail Junk mail D The __________ model refers to information that is placed at a point where it will be noticed by customers in the co Catalog Endorsement Billboard Broadcast C The most beneficial advantage of ERP cost ofQuality management Error checking Integration system operation B Data Low is What is theCompetitive espionageIndustrial espionage espionage term that describes spying on ones business C Corporate espionage Economic rivals to gain a competitive advantage? What wouldA list NOT be lookingclients ofspying on a competitor? you of competitorsnumbers the management new project Contact for when data Research A competitors group B An online drugstore such as Drugstore.comapplication above single-user multi-user application is None of database database e-commerce database Cof_______ an example application Which of the following is an example of unacceptable online netiquette? Replying promptly messages short Keeping Including the Subjectcapital letters Using all D Which of the following statements is correct concerning the atransactionsecuresecuritysystemssegregation of duties RemovableMessage authentication inup atsystems performs phase hardware device is more secure tha drives that Encryption performed by security of messages in an when the confidentiality of da can be locked EDI at theprovide adequate in EDI electronic not necessary bec Security night physically the same function as is data interchange C The wizard text import wizard texttip wizard function wizard that is usedconvert text files is_________________ to import to columns wizard A The alphabet indicatingrow reference cell reference column followed by the row number is known an__________ the column referenceof the A none above Which of the following files could not be opened xbase files text files Lotus 1-2-3quattropro or in excel _______________ class files D In excel, the dates that domain valuessequential numbers D serial values stored as are range values reference values as ________________known The command to display the current date in a none of the A =today() =date() =currentdate() is _________________ cell above In excel, absolutesign ' = ' sign represented none________ before the column and row addresses dollar references are # sign by a of the A above The ________ can be used to select the function and assemble the arguments correctly AutoSum AutoFill function wizard of the C none above Specific parts of information required by functions to perform certain tasks are called as___________ variables arguments parametersnone of the B above Which of the following do not belong to the formula category in excel environment__________ text logical numeric Boolean D The function that in used to join cell values together of the A concatenate pmt merge none in a single cell ________ above The function that is used to count all the values that meet A countif vlookup pmt count specific criteria _________ The wizard pivotis usedchart wizard edit charts _______________ that table wizard to create and convert texttip wizard B to columns wizard The function that is used to calculate the payment for specific loan terms ____________ sumif pmt countif none of the B above The function that is used to add together all values that meet specific criteria is known as ____________ average sum sumif countif C The __________setup print area inprintfile menu options isabove to specify major facts of the page to be printed page option present the none of the Aused The command that is used to apply a format automatically __________ autoformat AutoFill none of the above A The ____________ makes the information in a worksheetB bordering formatting shading none of the above meaningful and easy to understand A particular pageof a work sheet can be printed by setting B _________ part setup print area print print preview the The process of finding or selectingsorting filtering searching informationnone of the A ____________ is known as above The option that is used blanks all option to cancel the filter process for a specific column and display all the records is ________ all blanks none A The URL for encyclopedia Britannica is_________ of the B www.ency.in ww.eb.com w www.encybrit.com none above _______ maps IP addresses with the domain names of the sites URL DNS FTP none of the B above Internet can be definednetwork of network internal network as _______ intermediate network B none of the above The most important service of the ______ is to manage traffic control application layer transport layer physical layer session layer D _________is a program thatservice service none of the A finger service ping displays information about a host connected to the net ftp above _______ is FTP a program or a tool that helps in locatingof the C TELNET ARCHIE none a file above anywhere on the net URL stands for ____________resource locator uniform research locator uniform unlimited restore of the A none locator above IN an URL the word before the color refers to _______the C host computer name of the resource none of scheme above A ______ always begins with a slash message scheme command line of the C none above Prodigy is run by IBM and ______ sears Delphi Microsoft general electric C The World Wide Web is referred to shortly as editor net web browser the _______ B Gopher and WAIS enables the user to ______ browser read the Usenet news databasethe C search for none of above ______ is the program spy mosaicwincim or maccim the C CompuServe internet dialer used to run CompuServe's regular above none of services Navigating through the gopherspace gophering menu of gopher is called moving around _______ cyberspacenone of the C above The directories that come with built-in enginesnoneyahoo,lycos and ______ Alta vista open text excite are of the B above To use the finger command,SLIP usersserver run a programme called______ server server web must none of the A ftp above The web maps are called _______image list none of the C list directories above Directories consists of _______ levels no maximum of five one many B The _____ level gives the broadcast overview middle net D middle lower top of the and lower The huge list of keywords from important items is called ______ hotlist directory index glossary C The two types of search in veronica are _____item search,index search directory search,index searchsearch,item search index search,menu search ______ menu and C _______ searches by keywords lycos infoseek excite all the above D Mosaic displays links in color whereas _____ does not display links in color netshark cello lynx all the above C ______ supports one button publish lynx mosaic Lycos navigator gold 2.0 C

IN33 IN34 IN35 IN36 IN37 IN38 IN39 IN40 IN41 IN42 IN43 IN44 IN45 IN46 IN47 IN48 IN49 IN50 IN51 IN52 IN53 IN54 IN55 IN56 IN57 IN58 IN59 IN60 IN61 IN62 IN63 IN64 IN65 IN66 IN67 IN68 IN69 IN70 IN71 IN72 IN73 IN74 IN75 IN76 IN77 IN78 IN79 IN80 IN81 IN82 IN83 IN84

SPY MOSAIC is distributed by_______ Microsoft internet IBM CompuServe D ______ is aUsenet that helps us ftp log on totelnet networks program finger service to other D HTTP is the acronym for __________ text transfer protocol Higher text Hyper text transmission port text transfer port transfer protocol Hyper Hyper C ______is used to transfer and copy files over the internet C iccp ftp uucp none of the above _____ is a program that helps us to log on to other networks yahoo ftp telnet none of the C above TCP/IP stands for ________________ transfer control protocol/internet protocol/internet protocol transmission controlcommunicationabove transfer none of the Bprotocol/internet protocol Archie servers can be accessed in_______ different waysC internet one two three none of the above in _______is the servers domain name serverstranslatesthe B ftp computer on the internetservers web that none of between the internet domain names and the internet numeric above TIA stands for_____ in the internet the internet none of the A the internet adapter internet administration access above Service indicates the name of the ________ used to access data, present on the other end of the link. browser protocol site organization B HTTP stands for______ hotlink text transfer protocol type none of the B hyper text transfer protocol higher transfer protocol above ________ is used to link pagesresource locator web the above universal resource locator world wide uniform in the uniform resource label B name of FAQ stands for ______frequently asked question question frequent asked query frantically asked of the B none above The internet adapter is TCP,IP SLIP,PPP a programme that makes our connection act like a _____or a ____ account IP,UDP none of the A above The step involved in Communicating between close connection response request the web clients and servers is ______________ A WSIRC stands for______ information and research the B wide search for windows sockets search for information and research council world internets relay chat none of above Two of the important browsers are_____ and_____ of the B lynx,minx netscape,iemosaic,gopher none above Lynx is a _______ programme that works withnone of the B world wide web server web client terminals above world wide interface The huge list of keywords from important items is called an_____ glossary index hotwords none of the B above VERONICAvery easy and rodent oriented net wide index to computerized communication is an acronym for _______________network A very organised networkon of the integration and archives verification none integration above and communication application The first freenet is created at the_____ and is none of thenet university of berkeley,berkeley freenet university of cleveland,cleveland freenet university ofcalled______ California B above ________ are defined as ways of communication amongst networks protocols IP address dns none of the A above ______and_____ are weband finger features none of the A search engines,directories and ftp ftp searching telnet above WINWAIS allsrc,winsocks lists namely____ and______ B has two source wais,allsrc wais,winsocks of the above none ________ is also called as WAIS manager none of the B allsrc waisman winsock above HTML stands for_____medium languagetext markup language higher text hyper transfer markup language C hyper none of the above The systemhot interlinked documents is knownnone of the B of links hyper text books marksas_______above The small programmesapplets images that createanimation none of the B animation,multimedia,real-time games and multi user games are called______ above The information displayed on the web page includes______,_____ and_____ graphics,videos,audio animation,scripts,executables programms,images,text none of the A above The web pages pagerepresent online home of none authorB called______ first that home pagewelcome page of the above their are GNN stands for______ news grand network news B global network global networks navigator of the above none _____ is the most service internet search engines of the B yahoo popular electronic mail service none above The online service offeredconference starter altavista the B page wizard email and net by navigator gold 2.0 are of Netscape page and site,netscape and_____ yahoo none _______ above _______ is newsgroup or a tool that helps us find a file anywhere on the net a program telnet ftp archive D The databases to catalog keyword all the aboveone of the D Lycos enable point review search using Lycos are above n a2z,_______ ______ is aapple link bitnet bulletin board service network large worldwide Delphi fidonet A BABEL consists a glossary of _____ computer related abbreviations and acronym D biographical information bookstores none the above Dictionaries,encyclopaedias,governmentinformationreferences are found in ______ encyclopedia Britannica on-line reference works more and other galenet A Yahoo,lycos,excite engines directories _____ search andweb webcrawlers are database channel B GIF is the acronym for Graphicalformatting interface format Graphical interpreter interchange Format Interface format ____________ Graphical Graphical B JPEG is the acronym for ___________ picturesgraph graph Joint Pictures Expertpictures expert expert A experimental group Jumbled Group Joint Joint pictures The Web aids users to documents net mails explore the ________ browsers C The three most popular mailer are_____,_____ and______ yahoo,infoseek,altavista netscape,ie,lynx eudora,netscape of the C none and pine above The World Wide Web consists of _________ mails information web pages network connections B In MicrosoftBACKGROUND the color of the text can be B Internet Explorer, COLOR FCOLOR FONTCOLOR specified using _________ attribute of the font tag. The interface that provides effective communication betweeninterface browsers and servers is _________ Communication gateway interface Common Gateway Interface Common graphical Interface Communication graphical the web D CGI is the _________ between web browsers ConnectionB Network Interface Communication servers and CGI programs are invoked based on the informationof theB by the _________ Current web page Browser Client None provided above A CGI program is usually called after a request made by the _________ Browser/user Server Web Channel A URL standsUnknown resonance languagerelay limited theB for ________ Uniform resource locator United None of above A hyperlink text only ___________ or image can be on image only text neither text C image nor HTML was derived from _________ SQL PLSQL SGML CGI C

IN85 IN86 IN87 IN88 IN89 IN90 IN91 IN92 IN93 IN94 IN95 IN96 IN97 IN98 IN99 IN100 IN101 IN102 IN103 IN104 IN105 IN106 IN107 IN108 IN109 IN110 IN111 IN112 IN113 IN114 IN115 IN116 IN117 IN118 IN119 IN120 IN121 IN122 IN123 IN124 IN125 IN126 IN127 IN128 IN129 IN130 IN131 IN132 DS17 DS18 DS19 DS20

SGML is a _________ betalanguage alphalanguage metalanguage of the C none above PINE stands for _____________ pancake is not edible B palm is not palm is not elm eatable none of the above The application that confirms whether a document is Composerto its DTD is _________ SGML Processor Preprocessor SGML compliant SGML SGML Parser C Web is a collection of ___________ web sites images applets documents A IETF stands for ________ Internet equipment training faculty None of theC Force International Engineering trainers and faculty Internet Engineering Task above The two major browsersExplorer and Mosaic None of theC Netscape Navigator MS InternetNetscape surf the Internet are ________,_______ used to Navigator and Mosaic and MS Internet Explorer above Special characters allow browsers symbols _________________ text data from a to display video database C The keyword for providing links within or across documents is____________ hyperlink hypertext hotword hotlink B Stringing pages together using hypertext technologyof the Bview pages _______________ in random order in sequential order in user-defined order above none helps The initial web pages present in a web site is the ________ page. first start home none of the C above The image format supported andmost browserswmf and .bmp .bmp and .gif .bmp by .jpeg and .jpeg is________________. .gif . C The components of a URL are andservice,portservice,hostname and port Service, hostname ___________path directory path service,hostname,port,directory-path directory and B The mail we send has a mailing address alternate servicesabove and gateways to other services mail servers,mail clients and and most of themrobots mail vendors,mail identification the Cpassword to_____,_____ and mailing lists,mail server correspond none of and Which of the following is not size=n> size=n><l1 type=shape> <center> <font supported by internet explorer _______________ <hr D CGI stands communication generated information of the B for ____________ gateway interface instructions common classified general none above Host name Server the domain name of the web ________ indicates Client Browser User A The internet is also called as _______________ arpanet the net intranet none of the B above The internet is similar to _________________none of the B LAN peer-to-peer connectivity wan above The net drivers______ parcel data from one place to another of the A packets none above The net provides interesting services and fine none of theand______ scripting,parsing and compiling retrived,internet tools news,cooking like______,______ C email,file arts above The windows internet software available are______,_______,________ and______ nt,windows95,ie,winzip communicator,ie,lynx,winsock mosaic,gopher,eudora,trumpnetabove all of the B ________ is the ancestors of the internet dnet arpanet ARPANET none of the B above DARPA stands for _______________________________________________ defensive administrative rank administrationresearch projects administration net dedicated and registered projectsnetwork defensive advancedtheadministration none of C above The uuencode files start with a _______ start begin first none of the B above DARPA is broken into ________ and _______none of the A milnet,smaller arpanet mailnet,inetintranet,extranet above NSFNET is education,research dance and dining the A the united states provides service none of and_____ music and cooking to _____ above HTML stands for ______________________________________Language Higher text Hotlink text Hyper transfer meta language manipulation language Hyper text markup markup language D The first international IP network connections were established in 1973 with _____ and_____ united states and UK united states & Russia B england,norway none of the above A_____ is aserver computers interconnected by transmission paths to exchange information in internet set of client network none of the C above A computerclientprovides a service usable by other computers is called______ that stand-aloneservers none of the C above A_______ is the representation topology redirectors the B computers in internet network card network of network connectivity of above physical none of the DTE standsdetailed transaction explanation equipment B for ____________________ data terminal equipment data target none of the above The basic function of the ______ is transmitting the of the B a channel application layer physical layer network layer none bits over above The point to point channel networksmart networkchannel network point to point network and also called as of dumb network packet switching,store andand the Band_____ is broadcast forward above none _____ network Accessing filesaccessFTP servers filecalled_____ of the B file using anonymousis transfer none ftp above The three most commonly used networks are______,______ and______ PAN,NAN,AAN KAN,RAN,VAN LAN,WAN,MAN of the C none above ________ is in between LAN and WAN VAN MAN TAN none of t he above B _____ can be owed by MAN LAN multiple organisation none of the C WAN above Data is transmitted in the form of_____ signals analog digital non-digital none of the B above DTD stands for __________ type Document type definition data Data type definition Define of data Document type C Modem stands for __________________ Moralize/demoralize Manipulate/demanipulate Modulation/demodulation of the B none above ______ is the process of the digital signals being converted into a form suitable for analog transmission Mapping Modulation Manipulationone of the B n above ________ and______ are two basic waysand wires ofaccess to the internet Satellite link and digitalCable andgetting connected Dedicated access of dial up the B signals none above SLIP stands for ________________ Standard long internet protocol protocol of the C Stream lineSerial line protocol internet none above PPP stands for _____ Point protocolprotocol none of the B Prime prolonged to point Pillar to pillar protocol above Which of the following best a disk drive dataaon the hard drive storing datasending information to receiving information from a host computer on describes uploadinghost computer storing information? B A characteristic of a communication channel that is the amount of information that can be passed through it in a giv Bandwidth Speed Size Channel A The act of searching through storage to locateRetrieve Cwithout necessarily knowing of the existence of the inform Find Save Browse information A "recipient" of the certificate desiring to rely upon a Digital Signature created by the subscriber named in the certific Recipient Party Relying Party Either A or B either A nor B N B The Relying Party Key use the KeyBoth A andlisted in and certificate to verify that the digital signature was created w Public can Private ___________ Both B the C B A Digital Signatures are used for a variety of Electronic Transactions like ________________________ E-mail Electronic Commerce Fund Transfers Electronic All The Above D To associate with a key pair with a prospective signer, a Certification Authority issues Digital Certificate Not False Not True A

DS21 DS22 DS23 DS24 DS25 DS26 DS27 DS28 DS29 DS30 DS31 DS32 DS33 DS34 DS35 EC1 EC2 EC3 EC4 EC5 EC6 EC7 EC8 EC9 EC10 EC11 EC12 EC13 EC14 EC15 EC16 EX21 EX22 EX23 EX24 EX25 EX26 EX27 EX28 EX29 EX30 EX31 EX32 EX33 EX34 EX35 EX36 EX37 EX38 EX39 EX40 EX41

Digital Signatures, if properly implemented and utilized offer Requirements, Open System Closed System,FormalOpen System Formal Legal Requirements Legal promising solutions to the problems of Imposters, Mes Legal requirements D Formal In, Digital Signature, _____________ perform None of theA Affirmative Act Efficiency Signer authentication above the "ceremonial" function of alerting the signer to the fact that the sign A Digital SignatureAuthentication Authentication Signer must have the following attributes ________________ and _____________ Document Both A and Neither A nor B B C "Hash Function" is used in both creating and verifying Digital Signature Not True Not False B ___________ provides assuranceDigital certificate KeyAof data in order to protect the sender against false denial Nonrepudiation Service of the origin or delivery Digital signature Private ___________ serves the ceremonial andA or B either A nor B. a signature and establishes the sense of having lega Affirmative Act Efficiency Either approval functions of N A ________ is a branch of applied mathematics concerns itself with transforming messages into seemingly unintelligib Cryptography Public Key Private KeyNone of theA above The complementary keys of an asymmetric cryptosystem B Digital Signatures are arbitarily termed as _________, Private KeyPublic Key Both A and Either A or C B for _______ is Private only to the Key Both Ais used to createB digital signature. known KeyPublic signer and and Either A or A B the _______ is Private KeyPublic Key known and isB ordinarily more widely Both A andEither A oraB used by relying party to verify the digital signature. ____________ is the art of protecting information by transforming it into an unreadable format. Decryption Cipher Encryption Cryptography C Which of the following activities would most likely detect computer-related fraud? Using data encryption. ConductingReviewing the systems-access log. Performing validity checks. fraud-awareness training. D A digital signature is used primarilyReceived by the intended recipient. Unaltered in transmission. determine that a message is: Not intercepted en route. to the A to Sent correct address. What is a major disadvantage to using private Thebroken into theused byandencryptionmethod receiver. not by for de Both sender and receiver must have key private keydata? this encryptionforto the will the receiver the s The private The cannot key private A fragments for receiver but not by work. key a private the to encryptis before the distributed decryption but be is used key by sender Which of the following risks can beFailure of server duplicating function. accessing the information system to use p Collision. Data entry errors. minimized Firewall vulnerability. by requiring all employees D The acronym for B2B is ___________ Business-to- Business Backend-to-Business to-Billboard Business-to-Backend Business- A The _____________ model is the least intrusive model but requires active search on the part of the customer Billboard On-line Catalog Endorsements Broadcast B __________ is / are a Endorsements Customer form of advertisement where people relate their experience with products and services Billboard Catalog Broadcast A The _________ are software agents who communicate with the business merchants on behalf of the customers Intermediaries portals .COM Domains A The Pre-purchasePlacement phase includesNone of theC Order preparation Service Search and _______________ for a set of products discovery above The _________ phase Purchasecustomer service andandA Post purchase interaction includes consummation preparation to address customer complaints , product returns an Pre-purchase Search support discovery The ________ allow model of catalog Billboard companies toEndorsement modeltheB printed catalogs Online marketing theNone of of marketing bypass need for costly above A ________________ is a basket on the Net that is used B place the items that are being purchased Online Catalog Shopping cart Billboard Pulling cart to EDIFACT is an abbreviation of ________ Administration,C EDI For Administration,EDI For EDI For Administration,None Transaction Commerce Consumer and Transport Transport and of the above Commerce and The __________ allows for protocol conversion and communicates with the bank using the banks private network o EDI TCP/IP EFT Gateway D In Ecommerce, data extraction, transforming the data intoD Compiler Interpreter Assembler EDI transmittable form, transmitting the data and downloading The _________ commerce assistsConsumer-to-BusinessB Business-to-Business in integrating the customers and suppliers of the company directly into the organ Business-to-ConsumerCustomer-to-Company E-cash means______________________ EmergencyElectronic Cash Cash Endorsed Cash Cash Euro B E-commerce is a tool that addresses the desire of firms to above Communication Perspective Perspective theCcut services cost and improving the quality of goods. It is Business Process Perspective Service None of The small denomination digital tokens are called _________ Microcash Micro Transactions token) TT(Tiny E-token A The ____________ is the process Encryption Subscription to prevent it from being read by unauthorized parties Decryption SSL of encoding information C There are _________ types of data tables 1 2 3 4 B The tables that allows the usertable data table filtered to change or rearrange the data, summarize the data and evaluate the data using ch index table pivot table D The wizard pivotis usedchart wizardhints for doingwizard D that table wizard to suggest convert texttip columns wizard to a task In a chart Y-axis isor rank as_________ series known category legend data marker A In a chart X-axis is known as_______________ marker series or rank category legend data B _________ series or rank is a set of tables that describe each of the data series category legend data marker C ________ is used or rank series to differentiate one data series from another category legend data marker D The chart that containsbar chart data series issurface chart column chart only one pie chart _________ C The chart that holds the column chart is _________ chart column chart chart pie chart surface bar B The chart that display two or more pie chart surface chart is _________ column chart chart data series on a surface bar D The chart that is used to display discrete data surface chart column chart chart pie chart bar A _________ spaces allowed card macro name none of the A are not wild in a characters symbols above Which of the following tool cannot be used to view the excel web page_______ excel97 internet explorer Netscape word 2000 A The wizard pivotused to buildwizard that table wizard an interactivetexttip wizard A existing on sheets chart convert table from datawizard to columns The chart that is used for displaying stock market chart C line chart bar chart stock chart pie information In excel, the subtotal command also generates grand total after the last group subtotal_________ true false A In advanced filter , the criteria occupying multiple columns but more than one row, is considered as an ________ cr and or B The stacked bar graphs can be represented in __________ 3-dimensions 4-dimensions Multi-dimensions A A pie chart can represent only one data series at a time A true false The ______Data table Pivot table generates a summarized report in tabular form in an interactive manner B Which one ofis also called as high-low-closeusedstock chartshare market prices over a period of timechanges It the following statements often timeis to display forNOT TRUE ? It shows trends over chartalso used is indicating fluctuations in temperature It is related It to B

EX42 EX43 EX44 EX45 EX46 EX47 EX48 EX49 EX50 EX51 EX52 EX53 EX54 EX55 EX56 EX57 EX58 EX59 EX60 EX61 EX62 EX63 EX64 EX65 EX66 EX67 EX68 EX69 EX70 EX71 EX72 EX73 EX74 EX75 EX76 EX77 EX78 EX79 EX80 EX81 EX82 EX83 EX84 EX85 EX86 EX87 EX88 EX89 EX90 EX91 EX92 EX93

The state government needs to finalize a five years table.to implement 100% literacy in the state. Which one of the f Pivot table Scenario manager Solver Data plan C Forecast'99Goal group working on Pivot table wants table. A how many seat ABC party needs to won in totality to ob is a seek Scenario manager It Data to know exit poll. Which one of theseek Pivot table the tool that Data table. way to view and compare the results of all the different va Goal following will be Solver provides a D A ___________ is an excel file where the usernone of his data Workbook Worksheet Spreadsheetstores the A above Spreadsheets are useful for _______________ offormatting. Performing Performing Performing All the above calculations. database operations D text Which one of the following is NOT Source table name. pivot table ? Column field field. the component of the item. Row Pivot table C Excel allows upto ______ levels ofN two three sorting B Filtering rearranges a list to display the required records B true false The stacked bar graphs can be represented in _____________ 3-dimensions 4-dimensions Multi-dimensions A The ______ generates Pivot table Data table a summarised report in tabular form in an interactive manner B Which one ofdisplays theis statements related to of the other.are changing and the user is interested in the sum of th It the following useful when several components chart is NOT TRUE ? It data series one on top stackedin 3-dimensions It can be represented bar B The state government needs to finalize a five years table to implement 100% literacy in the state. Which one of the f Pivot table. Scenario manager Solver Data plan C Forecast'99Goal group working on Pivot table wants table A how many seat ABC party needs to won in totality to ob is a seek Scenario manager It Data to know exit poll. Which following function is used inSumIf option ?______________ Count. Standard deviation subtotal A A workbookdatabases records consists of many ________ tables worksheetsD Which two of is a following statementsprovidesto pivottheview and compare the results of all the different variations to It the tool for is a tool that and analyzing dataA are TRUE in an interactive manner. It summarizing related a way to datausing analytical functions. It summarizes the table records ? by Which one of theseek. Scenario manager analysis tool D Goal following is NOT solver a What-if Pivot table ? The _________import wizard texttip wizard awizard wizard text wizardconvert separates contents in function different cells to columns cell into B A spreadsheet is a gridworkbook tables worksheet of rows and columns and is calledA a ________ database as Pick out theapplication window a form of excel ___________ window that is not window window document modal C On an Excel sheet wideactive cell is indicated by A dark the A dotted border border No border A blinking border A Cell A4 =2 and A5 = 4. 2,4,2select both cells and drag the D handle down to A8. The contents of cells A6, A7, and A 8,16,32 You 2,2,2 6,8,10 fill If a cell shows ####### has a syntaxshort to show theor cC to show all the digits of the number your formula , it meansthe error either narrow the row is too column is too b number at the current font size that _____. Which is not an advantage of of calculation of costspreadsheets? ability to generate tablescomputerized of initial set-up speed using flexibility moving entries D The gym teacherprocessing program to calculate physicalD word has agraphical database spreadsheetfitness in terms of weight and exercise. The use inputs di new The difference between the highest and the lowest values. Range Address Gap Rows A Spreadsheets can be used for... Drawing pictures Producing graphs letters Writing Document filing A To select a double-clickdrag fromin clickcolumn click the column label cell in the column column the easiest method iscell the column to the last any cell the top tocolumn heading the the in C If you pressENTER theCTRL + ENTER typing as its contents. _____, cell accepts your TAB INSERT A The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as array. function. constant. formula. B All of the following are considered constants EXCEPT: C 100 (201)555-1212. #VALUE! Tom McKenzie. Which of the following may NOT be included in a formula? Cell references Functions Numeric constants Text constants D Which of the following is NOT a valid mathematical operator in Excel? ^ / * \ D Given the formula =B5*B6+C3/D4^2, which expression would to determine. first? B5*B6 C3/D4 D4^2 It is impossible be evaluated C Which part E12 formula +E12/6+(G7*SUM(H9:H11) is considered a constant? of the 6 SUM(H9:H11) G7*SUM(H9:H11) B How can you is surroundedblinking. is displayed inphraseA video. cell appears in the Status bar. It tell which It is in a worksheet is the active cell? cell by a heavy border.The reverse It active How can you change the ausing cell? either clicking in a thea different or using the arrow keysmove to in thedifferent By clicking in active the cell keys totyping to reference cell cell you want to to move to a formula By different arrow By By move different cell of the C Which of the following would you use to change thecommandof a the Edit menu The Standard toolbar The toolbarThe Font Size command on the Tools menu. The Formatting Cell Format font size on cell in Excel? B The command that will the Save current workbookFile Type commandtypethe File menu. the New command on the File menu. File menu. the File menu. save the command on the with a different file on is: the Save Asthe command C on The command that will Edit an Excel workbook is found on the ____________ menu. File print View Window A In the Save Preview Open dialog boxes, the ___________ B As and Details List Properties view shows the file size as well as the date and time a file Which of the following commands Both Insert Clear adjust cell references in formulas? Insert Delete will automatically and Delete C Which of the following commands Both Clear and Delete B columns from a worksheet? Clear Delete will remove Remove cells, rows, or Which of the following options isand footers Margins the Page Setup command? Orientation Headersor landscape) (portrait NOT controlled through C Fonts Which command enables you to change the margins for a printed worksheet? Options Page SetupView Edit B All commands are carried out on agroup. worksheet. range. rectangular groups of cells known as a: cell group. B Which of the following is a valid cell range? D 6 D12, G25 D12:G25 C In a copy operation, the cell(s) youclipboard. sourceis called the: copy range.destination range. are copying from range. D In a copy operation, the cell(s) youclipboard. source range. paste range. destination range. are copying to is called the: B Which of the following commands The Paste to duplicate the and Paste commands The Duplicate command needed command D contents of a cell in another? The Copy command Both the Copy is A cell reference that does not change during aconstant A is known as absolute relative mixed copy operation Which of the following is considered an absolute cell reference? B4 $B4 B$4 $B$4 D

EX94 EX95 EX96 EX97 EX98 EX99 EX100 EX101 EX102 EX103 EX104 EX105 EX106 EX107 EX108 EX109 EX110 EX111 EX112 EX113 EX114 EX115 EX116 EX117 EX118 EX119 EX120 EX121 IN1 IN2 IN3 IN4 IN5 IN6 IN7 IN8 IN133 IN134 IN135 IN136 IN137 IN138 IN139 IN140 IN141 IN142 IN143 IN144 IN145 IN146 IN147 IN148

Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, what will be the co #DIV/0! #DIV/0! #DIV/0! #DIV/0! B Cell E3 contains the function =AVERAGE($A$3:$D$3). IfC contents of cell E3 are copied to cell E4, what will be #DIV/0! #DIV/0! #DIV/0! #DIV/0! the Which of the following command The Paste to transferCut and Paste commands The Move commands is needed command the contents of one cell range to another? The Cut command Both the D The F4 key copy and paste cells. cycle through absolute,C open applications.cell references. is used to: edit cycle through relative, and mixed Which of the following quickly copies the formatting of a selected cell to other cells? the Fill Handle Format the Formatting toolbar B the Painter Conditional formatting Which of the followingInsert Hyperlink commandan and onworksheet?Hyperlink command. Select the will insert Insert Hyperlink button click cell Edit click the Insert Hyperlink command. Click the a Right-click a cell Excel Bthe menu. hyperlink into from the File Standard toolbar. Double-click a the and Conditional whether thethe cell formatting to thethe basedinD cell or a relative cell reference. formatting applies address. or a value in an the cell has a formula a cell value it. absolute whether cell has on: If you enter text with a two-digit year. integer. text with either a two-digit or four-digit year, depending on the format. a date into text with a four-digitthe date as: C a cell, Excel stores year. an You created a worksheet on July 30 and entered the =Today() function in cell E17. You openedgiven. Jul-30 Aug-31 29/03/2008It is impossible to determine from the information that worksheet aga B The number of days between two date from the later latercanfrom the earlier one.one. subtracting adding the cells containing later date be calculatedearlier the earlier earlier date adding one.later date to the by: subtracting to the the one. the dates A The function key that isthe F2to quickly editkey.he F1 key. B a cell is: the F4 key. used key. the Esc the contents of t What will be stored in a cell if 3/4 is enteredof the currentor .75, depending on the cell formatting 03-Apr 0.75 March 4 inEither 3/4 year it? C A users response toa worksheet. a constant. either a cellD a worksheet or a variable. a cell on the variable. function can be stored in: a InputBox on The cell reference for aB1.G10of cells that starts in cell B1D B1-G10 range B1;G10 B1:G10 and goes over to column G and down to row 10 is _____ The teacherAVERAGE COUNT showing all Year 10 students and their marks in one Mathematics test. To find the s has a spreadsheet MAX SUM C Which chartCombination type best shows proportions of a whole? Line Pie Scatter C Which of the following is TRUEcolumn chart isOnce changed to a column chart.be it can be changed to a pie chart. Once a bar Once is chosen it a chartchosenlineD chosen it cannot a bar chart. to line chart. chart a regardingcannottypes? it been haschanged to Once pie chart has cannot be been chosen changed be a chart To select several cells theranges key are not key ALT keyA other,SHIFT hold down or CTRL that SHIFT touching each hold down the down the down CTRL + you would _____ while selecting. hold hold Your Institute teachers Create four Transfer information to Dsheetsare required to use a spreadsheet to record all tha Use tables have set anseparate files multiplea database assignment on Studies. You Use What wouldPaste best method toFill Right Pasteformula from the active cell to each cell below it? be the Fill Down quickly copy the Special B To arrange Tools inSortData | Sort Editbased on column A,choices to use the command _____. rows | alphabetical order | Data |none of the Byou need Sort What can you NOT do Calculate data Analyse data a spreadsheet? None of theC with Create forms above To print justclick thea sheet, you would select what key wantPage Setup _____ dialog and then print part of Print button PRINT SCREEN you on to printin the| Print . and then print press the select Print select Print D selection selection and Sheet Spreadsheets can be used for... drawing pictures of theA producing graphs letters writing None above The formula that will add the value#VALUE! to the value of C2 and then multiply by the value in B2 is _____. (D4+C2)*B2 D4+C2*B2 of cell D4 =(B2*(D4+C2) C Which of the functions =A3SUM:B3SUM:C3SUM addition B 0 is not valid for performing REF! None of the above The default portrait orientation landscape whateveris _____. used for the printed page was last vertical A Which is not a valid cell address? A0 AD213 ZA1 None of theC above The World Wide Web was devisedCARN CERN ECRN by _________ NET A The useful URL schemes are_____ and______and of the B engines yahoo and infoseek files mailto and newsgroups none search above The other ways of getting connectedinfoseekcall andof the B servers and web servers news groups,yahooboards,mailsnet are_____ above bulletin and to the servers,proxy system application none wireless BBS standsbulletin board systembroadcasting none of the A for______ business bulletin broadcasting system system above USENET is a BBS on ____ scale very small none of the B small large above WINSOCKS is expanded as______ windows socks windows sockets windows stocks of the B none above IETF Level Mosaic DTD supports PINE 2 HTML Yahoo graphical browsers like _______ Lynx A The space used by Netscape to store the retrieved page is called______ buffer cache built-in none of the B above The principles, means and methods for rendering information unintelligible and for restoring encrypted information t Photography igital Signature D Cryptography Message Digest C A long string of seemingly random Hash Functioncryptographic algorithms to create or verify digital signatures and e Key Lock bits used with Formula A Protected/private character string used to authenticate anB User-id Password Name Address identity or to authorize access to data. The successful act of bypassing security mechanisms of Cracker PenetrationRetrieval Cryptography Password the system. A A set of rules and formats, semantic and syntactic, that permits entities to exchange information. Acts RegulationsAddress Protocols D An attempt Spoofing Imposting Unauthorisingto be an authorised person. to get access to a system by posing Approving A An action or event that Threatprejudice security. Loss might Exposure Hacking B According to information Technology Act,of a civil court B of IPS rank. Sales - tax authorities Judge 2000, To investigate contraventions the controller of certifying authority s Income - tax authorities Police officer Malicious software. Utility Pirated software Virus Cracker C None the person who isLee Tim Berner Hoffmanas Charles Bubbage Aiken known father of Internet Howard A This website is the biggest bookstore on the earth. .com B Etrade.comAmazon .com .com Msn Dell When we talk of Data Transmission modes, then Transmission mode Automated Any Time Money Tailor Machine Asynchronous ATM above for None of stands C A sequence of bits or characters that identifies the destination and the source of a transmission. Acts RegulationsAddress Protocols C The means Router of communicating between networks Gateway Port Pin B A group of computers and other devices dispersed over aA LAN WAN CAN PAN relatively limited area and connected by communication li The term HTTP standshypertext tracing program hyper terminal tracing program transfer protocol protocol for hypertext hypertext tracing C

IN149 IN150 IN151 IN152 IN153 IN154 IN155 IN156 IN157 IN158 IN159 IN160 IN161 IN162 IN163 IN164 IN165 IN166 IN167 IN168 IN169 IN170 IN171 IN172 IN173 IN174 IN175 IN176 IN177 IN178 IN179 IN180 IN181 IN182 IN183 IN184 IN185 IN186 IN187 IN188 IN189 IN190 IN191 IN192 IN193 IN194 IN195 IN196 IN197 IN198 IN199 IN200

A NIC is considered Informatics Interface card None Card B National asNetwork Center Information of the above New A hub is a device that can connectOnly printers one of theD Only Computersnot computers Can N above Which of the following is true concerning thedata a hubincomingtraffic regulation of a bridge Concentrates connectivity Combines connectivity All of Aboveswitch? Switches function ofwith the ports to outgoing ports. of from a B What do routers connect? or more networks Hubs and nodes Bridges and Repeaters. Two Bridges and Hubs B What does bits a router route? frames Packets None of theC above Software which prevents external access to a virus checker firewall gateway router system is termed A If four computers are connected toFour and then to the internet, how many IP addresses are required for these 5 One Two a hub None of theC above Which of the following in an OSI layer Physical Layer Data-Link Layer Network Layerof the above All D When creating a network from justFiberPCs, what kindpair RG7U Coaxial cable two Twisted of B cable would be used to connect them? An IP address is a address address Physical Logical A memory address theB None of above To construct a simple LAN of 4 computers, you would connect them with ______connect them A cable Hub Router None of theB above What happens toreturnthat is ruined continue on to target B Data data It gets senderbefore by None of thedevice with corrupt data to the destroyed bit reaching to receiver It bit. above Bluetooth isWireless technology Ultra violet technology A Wired Technology None of the above Which is not one of theData Link Layer sub layers? above Physical Layer recognizedNetwork Layerof the D IEEE All The most preferred number system to represent a IP address is Binary ASCII Octal None of theA above A MAC address is of 48 Bytes 48 KB 48 Bits 48 MB A Protocol is software that list of rules for transferring data over a network for internet bridging a facilitatessoftware that gateway calling program connectiona allows fileB to the internet copying A ...............Novell PC Client is a LAN-based computer with software that acts as a controlling device for controlling access to at leas Server Network PC C What is theThere isn't one nodeof the hub goes down,goes down, it brings the nodes on that sectionall of the rings biggest disadvantage If If one goes Ring topology? down the down all of down all of the nodes on down, itthe hub itB If brings brings entire ring The .............. of the network concerns how network devices are physically (or optically) interconnected. Physiology Topology Both A and None of theB B above The principal topologies used with Ring are: All of aboveD Bus Star LANs What are the various types of bus architecture? Linear Parallel Both A and None B A What are the various types of ring Linear Parallel Circular architecture? Both A and B B In a ................., each workstation attaches to a common backplane via its own physical cable that terminates at the Ring Bus Star Mesh C In a ............... , each work station is directly connected to B common communications channel Ring Bus Star Mesh a Which one of the following is NOT Linear Star Bus a network topology? C Ring In a .............. , the cable system forms a loop with workstations attached at various intervals around the loop Ring Bus Star Mesh A The Media Access Control (MAC)Layersub layer of the: Layer Network Layer Transport is a Physical Layer Link D Data What are the most common LANtoken ring, FDDI inFDDI ring, today? Ethernet, token ring, DecNET DecNET, networking ARCnet Ethernet, technologiesEthernet, token Ethernet, used B Modem speeds are measured in mbps bps kbps mips B LAN speeds are measured in bps Kbps Mbps Mips C WAN speeds are higher than LAN speeds the transmission medium usually measured in bytes per limited by modem speeds depend on second C Accessing the Internet a modem WindowsPC requires the use of CD-ROM drive a typical home 95 from Netscape B To use the Internet, you World Wide Web mail LANthe above must use the must use electronic a of account must have All A The worldwide web server usesresource locator key gateway interface common gateway interface tointerface middleware: uniform the following standard interface act as the application protocol C An NIC a Novell Interface Controller printer modem toD computer a network used to control a interfaces aconnects a computer to a Accessing the Internet a modem WindowsPC requires the use of CD-ROM drive a typical home package from Netscape B The most widely used network operating system on of theC is Linux Novell Netware Windows NT one PC LANs N above JPEG and MPEGto do with compression of graphicsof thevideo have have to do with Internetnone and Aprevious the Web pages To use the Internet youmust useWide Web mail LAN account communications software must use the World electronic a must have use appropriate A A multiplexer is a form of Printer modem bridge none of the previous D An ISP provides access to the is a CPU functional unit is a CPU register Internet make of processor A FTP is used to send email browse the Web a protocol for the transfer of files between computers used to is part of Netscape is D Telnet used to send email uses wireless part of Netscapemedium is communication the above None of D A firewall is used to protect a computer roomsaver program floods a form of virus a screen from firesthe previous none of and D A proxy server is a backup server an email server file server a poor none D A search engine is hardware IR system for the Internet of the C browser none previous To look for information CD-ROM clip-art file search engine user should use a scanner about interest areas on the internet, the D An ISP provides access to the is a CPU functional unit is a CPU register Internet make of processor A FTP is used to send email browse the Web a protocol for the transfer of files between computers used to is part of Netscape is D Telnet used to send email uses telephone lines Netscape is part of is a protocol that allows for remote login D Which of the following cannot communicate withthedirectly withonly with the layer directly above or below it. The layers is a true statement about communicate layers? layer.with the layer above it. Any layer can communicatelayer can communicate only Any layer can one another. any other Any OSI model C

IN201 IN202 IN203 IN204 IN205 IN206 IN207 IN208 IN209 IN210 IN211 IN212 IN213 IN214 IN215 IN216 IN217 IN218 IN219 IN220 IN221 IN222 IN223 IN224 IN225 IN226 IN227 IN228 IN229 IN230 IN231 IN232 IN233 IN234 IN235 IN236 IN237 IN238 IN239 IN240 IN241 IN242 IN243 IN244 IN245 IN246 IN247 IN248 IN249 IN250 IN251 IN252

Which of the following is is made up works theIndividual computers can connect to itlines called backbones. It is one largeNOT true It of many Internet? connected into transmission using an ISP. It network. about the networks A a local network. same way as The traditional intent and impact ofDenial of Service of attack is to prevent or impair the legitimate use of network r Password cracking intrusioncommon type System this Port sniffing C A firewall isused to protect a computer roomsaver program floods a form of virus a screen from firesthe D none of and previous Which of the following is NOT an example ofinitiatesattack that is popular among hackers? IP flood Flood a Web server withDoSflood A flood Virus that a requests UDP a ping A ____________ attack is when a flood sends a continuous flow of packets to a system. hack packet hacker traffic C One defense option on router network is to configure a ____________ to disallow any external traffic. firewall a large switch hub B A proxy server is a backup server an email server file server of the D a poor none above Which of the following would be performeddata on a dailyserver and not normally on individual workstations? Apply security patches Backup on Limit logging on access Update virus definitionsa network C basis What can be said aboutsafe safety Only large name-recognizable sites are safe. All sites areThereand reliable. Internet? sites. B the are safethe unsafe of and ActiveX-enabled sites are safe. To secure communication networkUse of logical access the most effective control is Use of identifiers passwords wire-tapping methods Use of against Use of encryption methods D One way that a virus CANNOT an FTP throughout a network is: by attaching to an e-mail. attaching itself to a document. through spread port. by scanning the computer for a connection. by B Which of the following is NOT a means of monitoring employee use of company technology? Phone E-mail Web traffic Application D updates ____________ would be used by parents to monitor their D A Trojan horse Adware A worm Spyware children on their home system. The formal Modems parameters which are established toB rules and Protocols Multiplexors LAN permit a microcomputer to communicate with the mainfra The two most commonTrojanused cookieskey key loggersinformation are: cookies andtools horses help withloggers. C Trojan horses. to and andextracting and worms. key loggers. Which of the following would NOT for the purposean example of cyber terrorism? An attack on a attack with personalChanging the content of a Web page An system Giving out disinformation publicity be considered of gaining gain D Which of the followingdamage a in communication thelines are correct. Economic would be form of cyber supply above Disruption Disruption in terrorism? All of D Which of the following is stock market, of a cyber1930s systems plant safety systems loss of life? Crashing the a likely target as insecurity systems would cause considerable Shutdown of military the terrorist Dnuclear Contaminating water of Shutdown that An organisation is upgrading its telecommunication lines. D accurate inventory of network related equipment and pa To carry more network To improve To obtain an To improve capacity services response time least important objective while upgradation network system Which is the A company set its a priceveryof its products onupdate its only theirsoon as to theare changed that the company can posts prices list high stop its competitors seeing advantage they customer is limit access to computer owners prices as prices its website.D The Which of the following is an easy-to-usePeople Searchinformation on someone? People Search Yahoo People Search Lycos Search USA service to get B Which of the following pieces of information assets NOT be found online? Name of your bank birth Date of Personal would Criminal records A Which of the following is the most common danger on theB Virus Fraud Adware Spyware Internet? The famous Nigerian Fraud scam offered victims the opportunity to: money by parking funds in their bank account buy stocks.invest without risk. off-shore property. purchase make large D amounts of The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is cal Shill bidding Phishing Siphoning Hoaxing B Using the Internet to pursue, stalking.or contact another inB unsolicited fashion is called: Internet stalking. harass, cyber virtual stalking. stalking. Web an Setting your privacy settings in Internet Explorer to medium is one way to block: pop-ups. cookies. spam. viruses. B What is theUse a fake Never use your real cyber stalking?B best means of protection from identity.anti-spyware software. e-mail address. a proxy server. Use Use Which of the following is not an appropriate control over telecommunications software Encryption Physical Security controls Message sequenceaccess controls Logical number checking B Encryption techniques can be implementedII Neither I or C I only II only Both I & in Hardware-Software II Which protocol would be used to download a free anti-virus program from the Internet? irc ftp www telnet C The major advantage of the checksum program isup timeprogram recompilation Adds more Verifies integrity of filesMisleads aitB bytes to programs Increases boot when Which of the following is a WebExplorer HTML Internet browser? Excel HTML B Internet Explorer Microsoft both and A Web page is another name document. trip HTML browser. Web query.HTML for ----------round Web document. B Domain names must contain used .con is used for companies .com is used for company company type of organisation that the domain represents. A very common a .co in a description of the for None of theA above A standard round trip for creating Wide Web Consortium C language HTML. the World and formatting Web documents is: HTML. one way HTML. The Web page format in which all elements ofMHTMLpage are saved as one file is called: XML. HTML. DHTML. a Web D Which of the following requires an clicking a Web page that is stored on document that onstoredas a Web page. o using Internet Explorer Internet connection? Excel worksheet that you have saved computer updating the values that are obtained through a Web hard drive is your in the floppy drive to view hyperlink thatB viewing an references a the query Mr Rao wants to on theClick on that toto the History pageis found for the site page his computer how would he Click find a website Go he or Searchto the Bookmarks or Favorites Back arrow until Go briefly browsed over yesterday. After turning on desired site browser Go in the C look and Which of the following is used to update a Web query? AData command the Refreshthe Insert Hyperlink command command the Update the External command You download from the Screensaver Hyperlink internet, a Sound screensaver, a ten-second sound file and a ten-second music video clip. You als Video C When saving a photograph for useJPEGwebsite, which format should you choose? BMP GIF on a TIFF C While researchingitthe a Write taxesAdd it a piece you findorC it to a word processorthe most efficient way to access Save to Direct itdisk.assignment, ofand paste floppy down on to Favourites a Bookmarks. What is document. Cut paper. useful website. A system that uses the intranet. forprivileged network. topology extranet. Internet business-to-business interaction is called a(n): network A A block of text automatically added to the end an an outgoing email is called an attachment. a signature. footer. a of encryption. B _________ VoIP to the use of Internet technologies for placing telephone calls. refers IPT IPP PoIP A Most client/server applications operatesoftware, and hardware.software, and hardware. of the following layers? Desktop client, application, andadatabase. server, and database. of which Desktop client, on server, application, Desktop three-tiered architecture consisting Desktop A Which do you NOT need to connect to the Internet? of theB Modem CD-ROM Telephone line None above What does File Transfer Program File Transfer Protocol B FTP stand for? Transmission Protocol of the above File None What is theSo computers can be referenced be shortertheA purpose of So IP addresses canis None of faster DNS? So email by a name above delivered Which of the following is NOT a properly formatted IP address? 193.1.2.3 45.1.1.1 143.215.12.19 of theD None above Which of the following@ domain. org. uk paul .trigg is a properly formatted email address? paul.trigg@domain.org.uk of theB paul.domain.uk None above

IN253 IN254 IN255 IN256 IN257 PP1 PP2 PP3 PP4 PP5 PP6 VB11 VB12 VB13 VB14 VB15 VB16 VB17 VB18 VB19 VB20 VB21 VB22 VB23 VB24 VB25 VB26 VB27 VB28 VB29 VB30 VB31 VB32 VB33 VB34 VB35 VB36 VB37 VB38 VB39 VB40 VB41 VB42 VB43 VB44 VB45 VB46 VB47 VB48 VB49 VB50 VB51

The Internet is controlled by whom?Switzerland The US government in Scientists No-one None of theC above What does Internet Relay Chat IRC stand for? International Relay of Characters A Internet Remote Conversations None of the above If you do not pickbe deleted be waiting for will None of to itA in the post It will up yourwill It email forA letter yoube sent the above a week...? to collect you What does Hyper Textual Mark-upHyper Text None of theC HTML stand for? Hyperlink Text MarkingMark-up Language Lingo Language above What is a disadvantage of joiningautomaticallyNoneemail C globally Receiving messages a mailing list? of interest in the group People discussing a topic of of the above High volumes from anyone In Powerpoint2000 ,theautolayoutsslide presentationof the B are clipart & auto shapes and viewdesign elements built-in professional &none templates outline view above Selection handles are the 8 small ___________ that appear around the object, when an object is selected circles points squares icons C The _______ is an invisible matrix grid square image of vertical and horizontal lines that covers the entire slide workspace guide C _______ are drop-down menus that appear when the right mouse button is clicked on the screen element tool bars short cut menus shapes the above auto all B ________ and ______ & word art & view add a lot of visual impact into the PowerPoint presentation clip gallery slide show fonts &show have the ability to images the above none A _______ is wave file picture or any.video file file the above a motion media clip animation all B In visual basic, when a movelast,true reacheseof,true record, _______ property of a recordset object is automati eof,false record pointer movelast,false the last D to In visual basic, the explorer view ofwindow is displayed in ___________ properties window form layout toolbox a project project explorer D In visual basic, when a movefirst,true reachesbof,true bof,false record pointer movefirst,falsethe first record, _______ property of a recordset object is automati to D In visual basic, _______ is a method to convert a string into integer. value() int() number() val() D In visual basic, in a shape control, square circle rectangle a vb statement gives Shape1.Shape = 2. What type of shape should we get? oval D In visual basic, a timer false is only available in timer control. true event A In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any object true false A In visual basic, _______ is a property of a textbox control C set a color of a text. fontcolor color forecolor none of the to above In visual basic, _______ property of a textbox none ofis set to _______ to underline a text underline,true fontunderline,true textunderline,true the B control above In visual basic, _______ property of a textbox fontsizeis used to change the size of text. textsize size foresize control D In visual basic, the interval property of of timer one-tenathousandth of a second one- millionth of a second a a second of is second ________ one-hundredth one-thousandth control given in C In visual basic, _______ property of listbox control counts D number of items in the list count recordcounttemcount listcount i the In visual basic, the properties of window controls can be set using __________ form layout prperties various explorer window project toolbox B In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a messagebox function. title prompt vbmsgboxstyle of the C none above In visual basic, ________ is a function which displays a message and it also allows the user to enter values in a form msgbox() textbox label inputbox() D In visual basic, using a opensnapshot________ is a recordset type which allows to add a new record and also to upd opendynaset data control, dbopensnapshot dbopendynaset D In visual basic, while closing a form _______ event of a form object is triggered earlier to terminate event. load activate unload initialze C In visual basic, to give a backcolor transparentgraphical to a command button can only be done if we set the style standard opaque or to bring in a picture D In visual basic, a method RGB(255,0,0) will generate _______ color blue red green black B In visual basic, a method RGB(255,255,255) will generateD red green blue white _______ color In visual basic, if a user uses a shortcut key ctrl+R _________ window visible. properties window form layout toolbox window project explorer becomes D In visual basic, if a user uses a function key F4 _________ becomes visible. properties window form layout toolbox window project explorer window A In visual basic, when a lostfocus text receives the focus D change textbox control gotfocus ________ event is triggered. In visual basic, a form is a ________ object. none of the C child parent container above Microsoft visual basic is a Rapid Application DevelopmentA true false tool. In visual basic, when a unload load form objectinitialize on the screenD appears activate _________ event is triggered. In visual basic, to display text on a caption text name label objectnone of the Cproperty is used _________above In visual basic, _______ object is used to access the database and also to manage the data in the database. opendatabase dbengine openrecordset of the B none above In visual basic, when a visible enabled checkbox control is checked _______ property is automatically assigned with 1. value style C In visual basic, _______ keyword is used to declareof variable dime dim var none a the B above What is the.ctx extension of the Visual.ctr .ctl Basic project file that stores the design of a user control. .ocx B Which event of a text box would you use for validating theA Validate Validation Check Audit data entered by the user? Which of the following statements forces inline error handling? Next On Error GoTo Error GoTo Error Stop Error Resume On linelabel Inline On On D The _______ method resets the contents of bound controls to their original values when the user clicks on the canc UpdateControls PaintPicture Refresh Resize A To deactivate the FormCancel to event, you make the following change to value value definiton: Cancel parameter parameter to value UnLoad a UnloadMode parameter to a non-zero a zero non-zero 0 UnloadMode parameter in the function A How many root nodes can a TreeView control None of theD 1 2 3 have? above A project group is a Project which: ConsistsApplicationsForms AndProjects Consists of ConsistsPrograms of Consists of D several of several Various several Code Modules ProceduresForm window, _____ areor code moduleprocedures declared in a ______ are available to the whole appl declared inProject window, view codecode theA a standard local whereaswindow above Class module, of module None How can you keep the user from exiting event None of theB Close button? Place code Place code Place a form by clicking above in the Terminate code in the Deactivate event in the Unload event the The _______ property enables Visual False toPaintPicture AutoRedraw = True Refresh AutoRedraw = Basic draw complete images in memory before displaying them on the Scr A You want toMsgbox err.no & err.text description of anerror.numberwould be the correct syntax? display theMsgbox err.number error.number & error.text & error.description code and the Msgbox & err.text error. What Msgbox D

VB52 VB53 VB54 VB55 VB56 VB57 VB58 VB59 VB60 VB61 VB62 VB63 VB64 VB65 VB66 VB67 VB68 VB69 VB70 VB71 PP7 PP8 PP9 PP10 PP11 PP12 PP13 PP14 PP15 PP16 PP17 PP18 PP19 PP20 PP21 PP22 PP23 PP24 PP25 PP26 PP27 PP28 PP29 PP30 PP31 PP32 PP33 PP34 PP35 PP36 PP37 PP38

What is theTo display images to the user athe editing of icons purpose of To help in creating ToolBar the Image List allow To provide a repository for images used by other controls To Control? D Which method would you use to get a free or unused File A FreeFile GetFileNum GetFile GetBytes identifier while opening any file: Which property procedure is used GetProperty value of B property? Retrieve Get to retrieve the Value a Which of the following can bedialog box theWindows theD Common messages passed to user using Open shown to Windows explorer Input box Common Dialog control in VB? Which of the following are not properties of Command Button: Caption Visible Multi-Line Font C Which events enable KeyPress Click and you to determine which key was pressed by the user? Click, KeyUp and KeyDown KeyUp and KeyPress, KeyUp and KeyDown KeyDown D In order to access a fileBinary Format format, Output mode Ascii Formatin Non-textual Mode you have to open file in: Input B Visual Basic displays and CurrentYScaleHeight and ScaleTop value of two properties of the form, called: CurrentX information and ScaleTop and y current ScaleLeft depending upon the x A Which of the following procedure types will execute when C assign a value to a property of an object? Property Get Property Assign Property Let Property Set you In order to overlap the controls (say a command button) during design time, we use the Send To Back or Bring To Background color property Caption property property ZOrder AutoRedraw property C Which property of the ProgressBarValue Min Max determines how muchB the bar is filled? CurrentVal of The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program. Shell Substr SetAttr CStr A The captionAre one and the be different at times properties and the name properties of the command theB Can same Are actuallyNone of button: not above You try to initialize a new Object variable with the followingaccess the class an error. What could be the possible cau You do not You do not MyVar has not beentheCline but receive need to usehaveSet command hereabove the the permission declared None of to Which of the following method The Open will perform The ExecProceduretheD The Exec method execution ofmethod a direct None of a Command object? above The vb Critical symbolquery iconmessage iconNone of theB A warning displays: An exclamation icon A critical above vbYesNo is statement. variable. intrinsic constant. procedure. an example of a(n): built-in C The primary difference InputBox the MsgBoxfunction can InputBoxcan be thestatementthe macro recorder, while stat MsgBox statement returns a value, while theand created with creatednot. the: between function returns a value, be thethefunction does with does not. InputBox statementstatement MsgBox macro recorder, while the MsgBox the MsgBox while InputBox function is B Which of the following isbe entered into can form. form (i.e.,box canwhere the Protect Form button on the Forms too Data cannot TRUE aboutbe protected The form can a the be entered. C a form be added. Data modified. A new check Which event is triggered when the Deactivate Terminate C Unload QueryUnload user moves to another open form? The user can use ______ to remove the undesirable part A thetool clipping toolcropping tool cutting tool scribble drawing image of The power presentation has box color scheme compatible colors color palette color a _____ for a set color guide C of The set three colors used for graphs and for secondary slide items is called as ascent tricolor scheme palette color primary color scheme A There are ______ types of charts available in PowerPoint C 10 28 18 36 _______ charts are useful while showing variations over a period of time column bar pie linear A _______ are the individual pages oftext images images andslides a presentation sorter C slide views A PIE Chartcircular is a ____ diagram that depicts the relationship between a whole and its parts radar doughnut all the above A Each individual piece of data in a series is called a/an entity data point data stream B PowerPointMicrosoft organization chart shapes launches an OLE-compatible application called clip art auto track changes A When the user organization chart isorganization chart editing in PowerPoint template the double-clicks on anthe chart window of object the chart is made available for the Cdisplaying a chart expandednone opensabove The _____ are used for selecting, editing and standard drawing tools box tools general purpose tools viewing objects in the chart custom drawing tools C Manager box toolto mange organizationalwindow is manager box for an existing box used in organizationalused tochart a to store the other tools of the organizational chart accessed only by manager chart create used C The customturned ontools are off not available in the toolB tool bar drawing turned _______ by default available in the bar Click on theonce tool ______ to draw three boxes of the above box twice thrice any C There are ____ defaultfour available in all boxes of the organizational chart two fields five eight B The _____ tool is used draw tool standard weall the above draw a table native tool in the same way as tool use a pen B to A/An _______ consists of smaller printed version ofof these autolayoutshandlayouts slide view none the slides B The size of zoom the object can be changed using the ______ tool reduce/enlarge preview none of the B above _______ is importing exportingwhich the slides in the current presentation are included in another presentation or the process through copying moving B ________ can be usedauto shapes art well as worksheets Microsoft excel to create charts as clip drawing tools A PowerPoint.ppt(PowerPoint) text .doc(document) can import .rtf(rich that have been saved in ______ format text files format) .html(hypertext format) B PowerPointnine outlines can have _____ outline levels only one six twelve C When a file.rtf(rich text .wmf(windows metafile) graphics and text are also saved along with the slide is saved with _____ extension, the format) .txt(plain text) .doc(document) B The hidden not displayed during the slide show slide showview slide is displayed only during only in of the A displayed the none outlineabove ____ effect DTS(digital 3D(3 dimension)during bransition D is used to introduce a slide a and ta slide show track sound) both A _____ is a special effect that determines how theshow A appear on the slide build transition slide show view objects The notes page ismaster notes formattedmaster on the slide slide based aster m master notes A Pick the odd man out of the following show slide sorter C outline viewslide view view view When a new presentation inches,7.5 ,powerpoint creates slides that have a width of _____ and a height of ______ w 15 inches,10 inches 7.5 inches,5 inches above 10 is opened inches none the B The default portrait orientation landscape a or b and outlines isA for notes ,handouts none of the aboveorientation ____ Build effect animation view show transition b or c is also called as ______ A Graphics for web pages are automatically stored in ____ format gif jpeg png none of the D above

PP39 PP40 PP41 PP42 PP43 PP44 PP45 PP46 PP47 PP48 PP49 PP50 PP51 PP52 PP53 PP54 PP55 PP56 PP57 PP58 PP59 PP60 PP61 PP62 PP63 PP64 PP65 PP66 PP67 PP68 PP69 PP70 PP71 PP72 PP73 PP74 PP75 PP76 PP77 PP78 PP79 PP80 PP81 PP82 PP83 VB1 VB2 VB3 VB4 VB5 VB6 VB7

A _______ hyperlink jump to any slide inbuttonll the above is used to hypertext action the presentation a D The ______ language has been incorporated into PowerPoint visual c++ visual basicMicrosoft visual interdev for application above all the B In PowerPoint _____ isbatch file of templates add-ins executed in sequence macro a series commands that are A The macro while creating a .exe filetransitionslide show is C will be activated slidewhen the none of the run during above Developers virus easily add ____ toheader filesall the above the programming interface can checkers checkers spell PowerPoint 2000 by using A ______ determines thecustom show order inbwhich the slides will be displayed during the show slide show order in which a and none of the B both above _______ is slide pane notes and develop the pane pane presentation used to organize pane properties contents of a outline D If we save the presentation file as pro shop itpower pointD internet explorer shop a metafile, pro be opened using paint paint can 2000 With reference to autocontent wizard for creating a newsuggested for can addofof topics pictures PowerPointit is the quickest waysample presentations content and design creates a sample presentationatopresentation,awhich words and contains toprovides presentation variety the following statements are not true create which user D Which of the following statementinsert only pre-drawn, pre-coloreda separatewhichto the reflectedclipall thein thethe s user can insert objects userclip-arts, pictures stored in graphic images reflected in a reflected toslides us user can islike TRUE userpicture to the master slide files gets slides in arts not can insert can insert picture to the title slide which gets B all slide With reference to changingdrag ordernotes dragwhichview,C athe slidestatementnew location in outline view, thesorter view, pages view,location thelocation to a a newtrue in slide the slideslides,I slideslidethe following icon to is not location in of icon to the of drag new slide icon a new to drag Which of the following definitionsmeans applying special effects to the crossover between background items that us the slide that holds the designtrueplaceholdersD holds the formatted placeholders for the title and sub-titl transition are not templates is the template whose formatand any the slides user applies to formatted the slide thatfor the titles, main text and color scheme Which of the following pages view useruser canselect thecan be reordered in the outline view with notes statements are not truethe slides miniatures and handouts a to the slide complete with text in outline view, can prepare speaker notes of all slides text presentation, user should see the slide view to add the in B Which of the following definitionsmeans applying special effects to whose format and colorbackground items thatto a the slide that holds the designtrueplaceholdersD holds the formatted placeholders for theuser and subtitle transition are not template is the templatetitles,crossover between the slides title applies us formatted the slide thatfor the the main text and any scheme The optionsslide layout customize new slide set up show include available in the common task toolbar does not B With reference to chart, which of the following user can addwindow onand gridlines to datasheet data to be graphed resides in a datasheet chartare notlabels the data in the the chart by default, doughnut chart in a window based data is plotted is displayed statementsB data true The format thethe text entered inmaster subtitle, orformat slide object is determined by the format settings in a spec of master slide the slide a the header slidebulleted-list title, the B PowerPointoffice assistant checker searches the entire presentation i.e., all the text objects in all the slides, outl provides a spell _________grammar checker the B that none of above PowerPoint's drawing toolbar contains _______ drawing tools 10 12 102 22 B Click _______ on the rectangle drawing tools enables us to draw multiple rectangles once twice three four times B An example text, graphics and email multimedia presentation could include video and sound. of the components of a address.digitalhypertext, Power Point, text, hypertext and Power Point. D and sound. CD-ROM, text, camera Which of the following formatting elements can be applied to a PowerPoint diagram using the AutoFormat tool? the Line style Line color Font and thestyle,alignment text font, and text alignment the the Line text Line color, D Which of the following formatting elements can be applied tocolor, and Linediagram using the Format AutoShape co Fill color Line color Line thickness color, Line a PowerPoint thickness Fill D What happens when you popup box promptsGraphaisan existing Excelis deleted. presentation? Excel is started so that Microsoftcreatefor chart.C so that you canto insert. graph. A double click acan you graph placeholder PowerPoint you blank graph placeholder in a chart create a The started The legend always taken from the first rowthe datafirst columnuser. the data in the datasheet, depending on whethe in a Microsoft Graph chart is:from first columnthe datarow of datasheet. always taken from of the in the datasheet. taken entered by C or in of Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best chart type if you Side-by-side columncolumn Stacked Pie chart Line chart B Which of the followingthe Insert menu andyoubutton on a the Insertselect the appropriate Object. the Insert Chart but Pull down actions will enable selectinsert the Standard toolbar. select Chart, click Click the Insert Chart the Insert menu and menu and Pull down to Chart. graph into a PowerPoint presentation? Pull down D If you are editing a slide containingPullobject, the Edit menu,View Datasheet button on the datasheet?slide is finished It automatically displays a Microsoft Graph, how do you display the underlying Standard toolbar. Click the chart Slide view. click the then select Object. datasheet once the in down then cannot B You display the underlying How do youSingle click Double click the chart. Change to Slide Sorter view. after you have finished creating the char deselect a chart that has been placed onto a C the chart. Click outside the chart. PowerPoint slide What happens whenbox is displayedis displayed allowing you windowof the Excelof the Excel that should thatlinked tob A dialog you dialog box allowing button savedDMicrosoft Graph toolbar? closed to open (or be should t A click the Datasheet you is on thetheto separate file. from The datasheet to enter as a enter is toggled worksheet worksheet from open The datasheet name the name What happens ifchart single chart a The chart isThe application that created the chart is started. The you isThe click ischart that doubled in A active? selected. deleted. not currently size. What happens ifchart double click isThe chart isMicrosoft in D active? The you isThe chart a deleted. isdoubled Graph will restart. selected. chart that not currently size. Using customslide one bullet itemsat a time. atone word at a time. at a time, build bullet items a letter at a time, an a animation effects, you canitemsa a time. D item bulletletter slide one bullet item one build: Which of the following animation effects can be added to a slide? Exciting Subtle Moderate Exciting Subtle, Moderate, or D Which of the followingexit in from top orenter andadded toCfly inexit; neither fly in from top nor bottom Enter and animations effects can be exit,enter nor from top or bottom Fly Both bottom Neither anda slide? Which keyboard key is Shift to select more than one picture on a slide? Enter used Alt Ctrl B Custom animation can whatappearaffect slide. Custom animation can be used to affect the way objects appear on a the way objects objectson way objects exit a slide. slide. be used to the aafter they appear on a do ONLY: D Which of the following best advanced timelinesequence inC timelinethe effect applied toobjects will appear objectssw The advanced timeline Thethe information the durationobjects will neither the the slide. in which on the The describes advanced timeline shows the sequence in which sequence shows the The advanced shows that appearsof shows appear on each object. which on the advanced timeline? Which of the following objects can Text Clips Organization charts custom animation effects? contain Clips, organization charts, and text D What type of program allows an object within an image toA edited without affecting other objects? Paint program program Draw Filtering program Animation program be Which of the following animation effects can be added to atop, and Dissolve in Fly in From top Dissolve in Fly in, FromD slide? Which of the following is entered itis entered itchanged. no Binto Datasheet.Datasheet. Once data Once data Data cannotcan enteredsuch thing as a TRUE regarding the Datasheet? cannot be There ischanged. be be Graphical software tools that provide complex OLIP. OLTP. OLAP. OLST. analysis of B stored data are: Which of the following statements is TRUE regarding PowerPointbut not diagram and thein ofOrganization chart. diag You can changecan changecannot You cannot B of of whole individualboxes an a diagram. of a You the appearance ofchange the change diagrams? the lines in individual shapes chart. You both the appearance a the color of a whole diagram, style connecting shapes an Organization Which keyboard key combination is used to undo the previous command(s)? [Enter+A] [Shift+Z] [Alt+Z] [Ctrl+Z] D Microsoft visual basic project file has _______.frx extension. .vbg .vbp .frm file B In visual basic, _______ method isloaditem add an item inB combobox add additem used to none of the above a In visual basic, _______ method isaddpicture none of the B load loadpicture used to load picture during runtime in an image control above In visual basic, to populate a drive list box with=aDir1.Path B box __________ statement is used Drive1.Drive=Dir1.Path Drive1.Drive directory above Dir1.Path = File1.Path none of the list In visual basic, to display a message in the run timeof the C messagebox() message() msgbox() none _________ function is used above In visual basic, to populate a directory list box= Dir1.Path C box ________ statement is used Dir1.Path=File1.Path = File1.Path File1.pattern=Dir1.path Dir1.Path Drive1.Drive a file list with In visual basic, ________ is a property of a recordset object which counts the number of rows in a recordsourse obj openrecordset opendatabase recordcount ount c C

VB8 VB9 VB10 VB72 WO1 WO2 WO3 WO4 WO5 WO6 WO7 WO8 WO9 WO10 WO11 WO12 WO13 WO14 WO15 WO16 WO17 WO18 WO19 WO20 WO21 WO22 DA13 DA14 DA15 DA16 DA17 DA18 BC44 BC45 BC46 BC47 BC48 BC49 BC50 BC51 BC52 BC53 BC54 BC55 BC56 BC57 BC58 BC59 BC60 BC61 BC62 BC63

In visual basic, using a append update data control, a record can only be C addnew additem added from the last record. Adding a new record is only po In visual basic, using a update append data control, a record is saved to a recordsource object using _______ method of a records additem addnew B In visual basic, using a movelast moveprevious the previous record ________ method of a recordset object is us movenext data control, to navigate to movefirst C To deactivate the FormCancel to event, you make the following change to value value definiton:Private Sub Query_U Cancel parameter parameter to value UnLoad a UnloadMode parameter to a non-zero a zero non-zero 0 UnloadMode parameter in the function A _______ is Word 2000 Office 2000Office 97 Backthe office 2000 family a word processing that is a member of OfficeA The featureclick-n-typedouble to type anywhere in a of the A that enables user clickdrag & dropnone document without pressing or tab above The______office clipboardthe userselect and paste uptoabove feature allows cut to copy none of the A12 items at the same time in an application ______ andshift+end and shift+homeshift+rightnone selection by one character on the left and right _____ keyshift+left and will extend ctr+home B combination ctr+end and the of the above _____and_____layout, normal layout, in layout, 2000 of the A web are improved layout web layout printlayout web Word none layoutabove page The easiestwizard create a document in wordnone of the A MSWord from the task menu way to templates click from start program, is above In Office2000 environment the tooldocument assistant the A for us is_____ office assistant assistant makesnone of inbox that work easier above A short description Tip Tool Tip button called the ______ Tip Screen of a tool bar Icon Tip Document is displayed when the mouse pointer is allowed to stay for A The _____ helps us to marginal stop the margin of thethe B tab stop keep track of ruler none of page above The keys that are usedpage up keys onlyandheaders and D arroware up arrow keys navigatehome to only between end and down up keys only footers Pick out theleft element from the following that dose not formD type of tabs for the Word 2000 center decimal rotation the _______are blueprints model template or patterns dialogs/alerts of of certain type for documents a the B none above The______increasefor decrease indent A and none of the Cusing the mouse is used indent quickly setting paragraph indentionabove both B Word art is special effect text with control tool design wizard box pictures A AutoShapes in wordtoolbar created by accessing the _____ drawing can be box database forms control A By default, a document2 1 consists of_____ section 0 11 A The dialog box that is used to setup from the documents margins is page setup printer determine the filefromof the above from the file print preview menu file none the A ________ is a box surrounding a page on all slides of the A that sets off a paragraph on one or more slides border shading style box none or a line above The key that is used to Del ctrl+a perform a task to select all t he text in the documents is ctrl+f ctrl+m A The key that is used to Del ctrl+a indent a paragraph is ctrl+m ctrl+f D The key that is used to CTRL+O CTRL+SHIFT+S CTRL+SHIFT+F change the font from the current positioned in a document is CTRL+SHIFT+P A The key that is used to ctrl+o thectrl+shift+s ctrl+shift+p that is from that normal to heading1 or heading1 to other d ctrl+shift+f change style of the document C 'Set mapping' Check control that follows a text-type of theB Excel Access Both None validation, we use ----------------- application for data analysis. above Excel can import data from other databases for the data analysis. True False A A System Auditor can uses CAAT tools to analyze data B False True In the case Valid Signs TransactionLimit CheckReasonablenesscombination with other fields are reasonable as per s of the ---------- control, ittype is ensured that the data in D ---------------HLOOKUP VLOOKUPa value in the leftmost column of a table and then returns a value in the same row function searches for A or B None of theB above Most of the DDE use inOLE Analysis depends on the above tools Data ODBC All of C How do youAnalysis translates an information system? abovesystem androutines outcontrol peripheralis being handle define analysis of programinvolves a high level language to machine code information devices Analysis is the loading of looking atCthat perform finding to how This code of programs a None of What areasOnly hardware andoutputs, file design hardware, and software need to beInputs, software SOFTWARE above process? consideredMaintenance, reliability, and upgradeability in the None of design B What is theTo collect dataexecute To maintainNone of theD function of To systems software? any programs security above Formatting a disk results the disk data being...?disk Deleted from in all the Saved to the Copied from the disk TransferredA from the disk What is Direct Implementation? Users operate the manualsystem at the same time Users operate theoperate the computer system from a given date Users manual system None of above system and computer B What is parallel new systemnew system is alongside ofand A the old system The running? The is introducedcontinue operating Users introduced above None the existing start operating it users system What documents are produced duringdocumentation abovesystem? InstructionsLog files and temporaryand technical documentation and technical the development ofC User GuideNone of files a What are User Guides To enable any printer to cover howC run the network enter data, save, print, etc. For technical supportfor? guides be connected to the system, are used User None of above to Systems software cansystems andDatabase systems andA services Operating be categorised into: services of the backup services Network systems and communication system None above Which storage device cannot be erased?disk Hard disk B Magnetic tape storage floppy CD-ROM Application To maintainTo backup copy of task.None of theis applying for employment software area do a particular all the information programs To help someone who B that are written above Which bus carries information between processors and peripherals? Data bus Auto bus Address bus ontrol BusA C Convert theFDDI decimal number 2989 TED BAD to Hexadecimal MAD B Which bus controls theAuto bus Address bus ontrol BusD Data bus sequencing of read/write operations? C What are utilities? Peripherals Operating system routines thatcompilersin supervisor mode. that are connected to a computer.Dpart of the kernel of an operating system. Data structures that execute and other useful system programs. Shells, are Numbers are stored and transmitted inside form binary form ASCII codedecimal a computer in A form form alphanumeric The originalwere 7 bits 8 bits ASCII codes represented 256 characters characters represented 127 A A Nibble corresponds to bits 4 bits 8 16 bits 32 bits A A gigabyte represents 1000 mega bytes More than 1000 kilobytes bytes 1024 bytes A 230 A 32-bit processor has 32 registers32 I/O devices Mb of RAM 32 a 32-bit busD 32-bit registers or

BC64 BC65 BC66 BC67 BC68 BC69 BC70 BC71 BC72 BC73 BC74 BC75 BC76 BC77 BC78 BC79 BC80 BC81 BC82 WO23 WO24 WO25 WO26 WO27 WO28 WO29 WO30 WO31 WO32 WO33 WO34 WO35 WO36 WO37 WO38 WO39 WO40 WO41 WO42 WO43 WO44 WO45 WO46 WO47 WO48 WO49 WO50 WO51 WO52 WO53 WO54 WO55

A parity bit is used to indicate uppercase letters is in a last bit in a byte used to detectthe first bit the byte B is errors he contentsROM of these chips are lost DRAMthe computer is switched off? RAM when CROM A Clock speed is measured in bits per second baud bytes Hertz D Cache memory enhances memory capacity access time storage capacity access time memory secondary secondary storage B CISC machines fewer use more RAM than RISCclock speeds instructions have instructionshave medium machines than RISC use variable size machines D Which parts of the computer perform arithmetic calculations? ALU Registers Variables Logic Bus A Every data from the primary memory will be erased the above Power is switched off is improperly shut ifbefore computer is shut down Computer Data is not saveddown D All of An RS-232 a parallel is a serial interface interface interface interface printer a modem interface B For print qualityprinter dot matrix printer printer line you would expect best results laser printer. ink-jet from D ROM is faster to access thanstores more information than memory is non-volatile RAM is used for B cache RAM A UPS increased the storagethe process a computer system event of a power cut increases capacity of speedpowerC the provides backup of the previous none in smart card is a form of has more storage capacity than aaCATM card ATM card is an access card foran security system contains microprocessor Laptop computers use LCD displays CRT displays SSGA displays of the previous none B Multiprogramming refers to programs in RAM at the sameAprevious having several multitasking writing programs of the time languages none in multiple Multitasking having to the softwares running at the sameD concurrently refers several ability to run 2 or more programs languages writing programs of the time none in multiple previous What are small high speed memory units used for storingB ALU Registers Variables Logic Bus temporary results? A good waybrochures magazines CD-ROM e-mail to exchange information that changes rapidly D through is Multiprogramming is a prerequisite tosystem none of the above at the same time multitasking operating run more than one program an for C Timesharingmultitasking as is the same multiprogramming multiuser none of the previous C ______ is the default view in WordPAGELAYOUT EditingA NORMAL ONLINE LAYOUTfor typing used ONLINE DOCUMENT and Formatting the Text The short-cut-key that is used to indent a paragraph spacing in the documents is ctrl+m ctrl+2 ctrl+end ctrl+home B The short-cut-keyor insctrl+c or insctrl+x or selected text A ctrl+v that is used to paste the insctrl+v or Del The short-cut-key that is used for paragraph spacing(1.5) B ctrl+2 ctrl+5 ctrl+1 none of the above The box that separate text from the documentBorder Text Box Frame AutoShape and allows A to behave like an independent object is known as it The object that is used Screen Tips Header and to provide information like the title A the book, name of the chapter, page number etc. Footer Page Layout none of the of above The object that helps us analyzing Auto Shapes Chart WordArt data statistically is known as File A To highlightBorders parts of a pageWordArt apart from theD certain Shading to set it Bullets rest of the page we make use of the following features To clear all clear the tabs in a documentremove remove all the option that isall clear clicked from the tabs dialog D The dialog box thatbullets dialog box picture is used tobulletcircle bullet none dialogA our documents or web pages is arrow incorporate box dialog boxinto dialog picture bullets box The object that composes of set ofAutoShapes helps to create and work on different shapes like rectangles, circles, charts WordArt tools which files C When worddoc1 is opened a new documentdocument document1 new called_____ is displayed, where the user starts typing the content right way default document B ______ is an online dictionary maintained by word to obtain synonyms for words thesaurus hyphenation mail mergenone of t he above A The thesaurus is invoked by pressing_______tools+spelling menu shift+f7 thesaurus menu shift+f8 A When a new table is created the insertion point flashes inAtheable first second first row last cell of the t _____ By pressingtab _____ end inserts enter rownone of the A row in the table the key a blank after the last above The ______ option enables us data to table format of the A convert textconvert to convert text into a table format to table table auto none optionabove A table consists of ______ thatcolumns text or none of the B row rows & contain records graphics above The _______ option in AutoFormatstyle user to automatically correct misspell words as and when they are typed AutoCorrect word allows the gallerynone of the A above ______ is aMail Merging acro recording andnone of the Ba sequence of keystroke facility thatM enables Data Source replaying ofabove In Word Macros are written inbasicvj++ basic visual _____ visual FoxPro B In Word 2000 the macro dialog box is activated with the help of ____ key combination shift+f8 shift+f7 alt+f8 alt+f5 A ________showslayoutaview layout view look like when published on the web or on an intranet web how online document would browser none of the A above ______ is aemail clientoutlook express soft outlook messages software for sending and receiving e-mail micro hotmail A ________ishtml coding xml the system used to create vb script A sgml web pages The network that makes information easily accessible across various networks is _______ internet intranet arpanet LAN A Which of the following must be listed in namesthethe header source must match headernot beformustsource samein field name statements are falsein a inreferenceof fields names headerany merge the data paragraph a the field separators same ordersource and the data source can source a you'vethe field the with numberBthe correspondingthe row source set as bemerge header as to the use of a in information in fields mail inserted With reference TO possibleWHICHby default FOLLOWINGoption allows of ARE falsethe selectedor a column or of a ta it is not TABLE format option appliesheight and weight option a table to all the rows rowscolumns shift auto to change the height of onlyentire table andto appliesthe entire row and or columns of OF THE cell to the selected rows not only to delete cells CSTATEMENT delete The alignment available for tabs does not include left decimal justified top A Which of the following statements type headertoSectionthe in thepage of asection of columns certain pageapplicable t A new sectionorder to related to a ischangeBreakportion of number then thesectionheader is inserted afte In is created a a header section properties like the document a same break is formatting If in order A insertedisthird second document in which from D are True a The user can set a spelling checker to skip the marked part of the next true false A New option true the file menu of word creates a new blank document that is based on the normal templates under false A The user can split the screen only into two parts true false A

WO56 WO57 WO58 WO59 WO60 WO61 WO62 WO63 WO64 WO65 WO66 WO67 WO68 WO69 WO70 WO71 WO72 WO73 WO74 WO75 WO76 WO77 WO78 WO79 WO80 WO81 WO82 WO83 WO84 WO85 WO86 WO87 WO88 WO89 WO90 WO91 WO92 WO93 WO94 WO95 WO96 WO97 WO98 WO99 WO100 WO101 WO102 WO103 WO104 WO105 WO106 WO107

The features that enables the userDouble Clickgraphics tables anywhere in the document without pressing enter or drag & dropclick -n-type to type textnone of the B above The user can modify the picture from the clip art true false A With reference to auto prohibits the user from with t he capsauto are false errors turned on reverses the case of the automatically corrects common following statements correct entry correct which of the typing, spelling errors key accidentally automatically correctsan lock renaming the grammatically B With the reference to password protected documents which of the following statements as read only password can not include spacesare not case B be upto 15 characters long are false password protected document can sensitive without password password password can opened be The alignment available for tabs does not include left justified hanging top A Which of the following statements are False documents files can in the current document document the current doc a .ppt file candocumentafile can be an .xls dataB current inserted in at specified position a not not be inserted atinserted in position be document the single position in multiple specified the not be inserted at specified can Drop Cap tool does notfalse for the contents in the table format true work A The user can split the screen only into two parts in MS-Word true false A The specialtrue symbols that are inserted using "insert symbol" option of the word can not be printed by the printer as th false B The "formattrue columns" option allows to create columnar text up 12 columns only. false A The document that Document user to organize and of the A a long document, such as multipart report or a book co Master makes the Child Document Hyperlink Document above none maintain The view that enables us to view how objects will beof the B Print Layout ViewLayout Page Outline Layout none positioned on the page when it is printed above The mode that is initialized or toggled to if the none is in a A Insert Mode Type Over mode Remove user of the position to overwrite the text in the word above Veena is entering the return key tab key the escape keytyping When the cursor gets to the end of a line, what is the press a paragraph in apress processing program. press the word just keep D How are data organized in aand spaces and width and columns layers and planesspreadsheet? lines height rows D Which key moves the cursor to the beginning of the next line of text? tab enter/returnbackspace/shift delete B Veena typed the following sentence: "The girl was very beautiful." In which word processing utility could she find a s grammar checker spell checker thesaurus outliner C Using an electronicpublic messagesend a frienddo all of theone topicfriend which one? send a bulletin board, Seema cansend a package to a except send pictures to private messagesDfollowing to friends interested in to a friend Aryan has created a ten-page story, but only wants previewthe first two pages. What printer command should he se Print all From ___ To ____ Page setupPrint to print B What process should be used to recall a document savedC Enter Copy Retrieve Save previously? Which is used to indent text within spacing closing tabbing a document? sorting B Desktop publishing is agraphing word processing which C the following types of software? database more sophisticated form of spreadsheet of What is a Word Processor usedand editing documentstheB To analyse Creating for? figures Storing information None of above What is a picture that is saved on a diskette and can be pasted into a document? subscript annotation clip art clipboard C What is a Word Processor usedand editing documents B To analyse Creating for? figures Storing information Calculations Making What basic Clear,wouldSpelling, grammar and Font, and clear Bullet and Numbering tools replace and select Edit menu of Paragraph, you find in Cut, copy, paste a word processor the autocorrectC What is a header in a document?every page appear at the top on every page Text at the bottom of which appearDesignatedC Numbers Text which on every page of the document area What hardware is essential for processingmonitor and printer Mouse, printer and a word? system keyboard? Keyboard, Mouse, keyboard and B Monitor, None of themouse above The user could take a picture frommicrophonedigitalinsert D into the document by using a Browser clip-art file a magazine and scanner it What basic Clear,wouldSpelling, grammar and Noneand clear tools replace and Toolbarscopy, paste of theC you find in Cut,Edit the autocorrect above Assume you are creating a two-column newsletter. WhichB 6 point 10 point 15 point 25 point type size is the most reasonable for the text in the column Given the default left and right margins, and -inch spacing determine. 2 inches. 2 inches. 3 inches. impossible to between columns, the width of each column in a two-co B Assume you have made all have not insertednotcolumn section break.. boxduring editing;cannot see any columns You are notYou appropriatehave a specified A displaydialog in Print Layout view. Word cannot You selections in the Columns columns in Word, but you will see them only w continuous section breaks. While word to store a fileinstore ahardon following leave an Dwould the originaltext in placeanother location copy elsew processing, on the ofto move a section of text from Tom use the "Copy"to while pasting a to which file drivediskette the a to situations original section of location command? What does Data about Mainly text A set of different graphics a documentacontain? set of similar things None of theB above Before submitting your Spell Checker to find Checker Replace Thesaurus work you want Grammar any words spelt incorrectly. Which of the following would you use? Find and B What command in a word-processing program can be used to change the word him to her, and also the word he Paste Replace Select all AutoCorrect B What edit commands wouldthen paste insert a paste then Afrom one document into another document, while still kee Copy, then Cut, you use to then paragraphpaste paste Delete, Insert, Which of the following statements wouldchance toaaccept Cforprocesschanges fromrevisions into spend document wit To give the To give the To complicate the revision reject suggested on one documentWord morethe revi original author a NOT To allow multiple peopleandwork changes from thein collaboration wi original author reason to showing to to force the author a person who enter be chance suggested suggested the person who entered time m Which statement is NOT red underline appears beneathinD left margin in added.box at the has been made at that po A line appears through A verticalis to be deleted. Word document? a change right of the document. A true regardingthat line outside the that is to be a text text revisions made text enclosed signifies Comments are a How are suggested changes menuThrough toolson an ChangesTools menu and the Reviewing toolbar Through the Edit entered for review Track initial the command command Through theby choosing by through Word document? Tools menu onchoosing Track toolbar Both the Reviewing Changes D Which of the following is TRUE about saving a documentyou toallow you toallow document,versiontwoa including any The Versions command willVersionswillVersionswill the Versions command? a document,versions of ath The Versions command command command will onea you toof including any changeswit The allow you toallow A The save multiple versions of versionone only of document d using save only save only save What happensversionsThe latest document and second versions usingopened automatically. All when you open a version is that has automatically. is the Versions command? are opened automatically. previous version opened automatically. The first opened been B The saved are You have used the word discover Spelltimes in an English essay you have created using a word processing progra Dictionary Grammar check checkThesaurus A four When opening and workingmost multiple will and will appear at the tellsaved.yourecent version ofmost recent version? Word displays a with recent version timesname filethebottom most saved each version. The list of the dates show ofis notA of to how canwho tell which is the a document. Word versions the each Word a document, personof the list. able was the Various fields are added to a regular document to create a special document called a form through the __________ Fields Tools Forms Insert C Which of the following types ofbutton CANNOT be inserted into a form? Check boxes Toggle fields fields A drop-down list Text B Which of the following is TRUE related to editing comments inbe Word document? by left clicking the highlighted tex Comments Commentsedited. be deleted. edited or a editedby right clicking the highlighted text. cannot be Comments Comments C cannot can be can deleted or deleted What is a header in a document?every page appear at the top of every page Text at the bottom of which appearNone of theC Numbers Text which on every page above In your English essay you notice that theand paste. at theD Press tab. Press Return. Copy paragraph page break. of page 1 continues on to page 2. You would like Insert bottom Tables in a text. document help you to easily arrange all of the C graphics. forms. numbers. following EXCEPT: To identify a document, it is helpfulfind/search.macro.name on each page as a header/footer. bibliography.to include the file A

WO108 WO109 WO110 WO111 WO112 WO113 WO114 WO115 WO116 WO117 WO118 WO119 DA1 DA2 DA3 DA4 DA5 DA6 DA7 DA8 DA9 DA10 DA11 DA12 BC83 BC84 BC85 BC86 BC87 BC88 BC89 BC90 BC91 BC92 BC93 BC94 BC95 BC96 BC97 BC98 BC99 BC100 BC101 BC102 BC103 BC104 BC105 BC106 BC107 BC108 BC109 BC110

Which of the following tools will copy the formattingaction C not text to other places? Copy button Paste button ormat Painter button is F This of selected possible. What is theFault Finding process of determining the cause of errors in a macro? name of the Bug Squashing Injecting Error Debugging D Drop caps are added to a Word document using the ___________ menu. Insert Tools Format Edit C A reverse in a newslettersection ofthe guidelines used letter of each sentence beginning of a of the newsletter will go a section ofa is: text on a black background.establishletter at different elements paragraph. are upperca white text where an enlargedAcapital where the is lowercase and the rest the first to A pull quotesetting itemphasized by: capital letters. is best in larger type or font size. changing the color. typing it all in underlining the text of the pull quote. A Which of the following definitions is is a quotation dark wordon (pulled)background. document.when it should have a The reverse technique ACORRECT?grid a textD thathorizontal andlowercase letter determine the place A pull quotemeans to add takenafromof light from another lines that dropped cap is is set a starts with a vertical A Pertaining to newsletters, which ofof each column columns changed using the Columns command dialog box? The width of each column followingof tab spacing within each column The height The number cannot be the The D As related to type size, 10 many points are there to the inch? 6 how 12 72 D Assume you are working on a newsletter in which the masthead extends across the top of the entire first page. The One Two Three Four B Which of the following is NOTCtrl+Shift+Enter break. Shift+Enter tobreak. section breaks? Press Ctrl+Enter tocorrect with respect to page, column, and a line break. Press create a page Press Press Enterto create aacolumn break. to create C section force Which of the following wouldpointsA most font pointspointsD a at 45 pointsheadline? A serif font at sans serif font atappropriate serif for newsletter A 10 be the serif 10 at sans font font A 20 Which of the following is the default Word column width? on the left and right margins, and how many columns are s 2 inches 3 inches 4 inches It depends D Sequence Check is a --------------- level controlNone of theA Field Record Both check. above Analyse data over two or more periods B called ----------------------- analysis Horizontal Vertical A or is None of theA Above We use Hash Total toValue ------------ withinAll series above there is a definite relation between items Duplicate identify Combined Value Gaps a of the where C Analyse fields by arranging them into rows and columns is above Cross Tabulate Filter Merge None of theAcalled --------------------- function searchesHLOOKUP() the of theB column of a table and then returns a value in the same RAND() VLOOKUP()for a value None leftmost in above To import data from Access to Excel ,it is not possible to A between Access and Excel sheet TRUE FALSE link The GAP detection options can be used to test for completeness of data. TRUE FALSE A Exception testing can be used to identify ----------------- theC Unusual Strange A or B None of items above Data validity test represents exception testing comparisonduplicates testingthe above of data All of D Year end ledger, inventory files or transaction files can beA True False tested for cut-off , to ensure that the data has been provid In Range Check , the data may not be in proper sequence but should be within a predetermined range True False A In ---------------- Check data entry follow a particular sequence and also a predetermined range. Limit Sequence Range Both B & C B Virtual memory is to virtual reality a form of VRAM of the previous related a form of ROM none D Multiprocessing isas multitasking multiuser involves using more than one processor at the same time same same as multiprogramming D To help keep sensitive set up a password backup a confidential, the program save the filecomputer-based information virus B make a use copy protection user should What is theto calculateto disk drive?or write information toB floppy diskpictures on a screen function of a read from print sheetsdisplay information or numbers to to of paper a A 4GL is Uses Coboluses Java uses C++ none of the previous. D A nanosecond is 106 sec 103 sec 1012 sec 109 sec D What small, hand-held a mouse used to moveathe cursor B a specific location on the screen? a keypad device is a frog message to pad The memory address register is usedbeen transferred from memory been transferred from memory. data to be transferred to memory an instruction that has data that has to store of a memory location the address C The memory data register is to be transferred toof instruction that has been transferred from memory data to be transferred to store memory data used the addressan a memory location or from the stackA The instruction instruction that has been decodedthat has Dof the memory an register an instruction that has been fetched from next instruction to be executed stores an instruction address the been executed Which of the following is scroll to indicate pen location on the computer monitor? a cursor a used bar a light the a magic marker A A mathematical procedure that can be explicitly coded in a set of computer language instructions that manipulate da Formula Algorithm Program Data B Which of the following translates aArtificial Intelligence B Assembler Compiler program written in high-level language into machine language for execution? Parity Checker Detecting errors in real Parity Checking checking Memory protection is Range memory a function of Validation B To find where a the directory search filetheturn use findshould use file hassearchsaved tools backup facility Areplace been each on disk, the user and use in A series of instructions Program computer how to process data or files is defined as a Network telling the System Modem B To ensure that data is not lost file with the record nameto athe user medium save copiesusethe if a computer system computer failures of different filenames backupsystem system keep a same of fails, D on the on the secure should Having a single CPU alternatively process tasks entered from multiple terminals is called Multiprocessing sharing Time Multiprogramming MultiplexingD The place in the CPU where the data and DiskMagnetic Disk ROM RAM Floppy programs are temporarily stored during processing is called the B All are examples of computerProcessorexceptmodem Firmware Word software Telephone Shareware C Computer manufactures are now installing software programs permanently inside the computer. It is known as Firmware Word Processor Telephone modem Shareware A Which of the following file organisation forms most efficiently allows access to a record Sequential Hashed Indexed Random C The part of Operating System the computer system controlling data manipulation is called the ALU CPU Primary Storage B For direct access storage devices the recording area isand subschema Tracks and Blocks and Files and Tracks Sectors Sectors Schema divided into A The data hierarchy from the database the smallest is field, file Character, field, largest to record, field Database, character, record File, Element, C Which of the following hardware orSystems logs Valid character check software system check provides a detailed record of all activities performed by Maintenance diagnostic program C Parity controls Which one of the following parts ofMIDI interface necessary to enable it to play music? Sound card. D-ROM a computer is C Serial interface A An educational CD-ROM on IndianSound contains 1000 pages of text, 500 colour pictures, 15 minutes of sound and Text Pictures Poets Video D

BC111 BC112 BC113 BC114 BC115 BC116 BC117 BC118 BC119 BC120 BC121 BC122 BC123 BC124 BC125 BC126 BC127 BC128 BC129 BC130 BC131 BC132 BC133 BC134 BC135 BC136 BC137 BC138 BC139 BC140 BC141 BC142 BC143 BC144 BC145 BC146 BC147 BC148 BC149 BC150 BC151 BC152 BC153 BC154 BC155 BC156 BC157 BC158 BC159 BC160 BC161 BC162

Which one of the following printersInk-jet Laser Dot matrix is suitable Drum for printing sprocket fed carbon copies? B Multimedia viewing an encyclopaedia CD-ROM. order forA software can be most productivelyan creating thepresentingarecordingdesign. stock in a supermarket and answering customer qu plans for used for current to a warehouse. building stock To be effective a virus checker should be regularly once a year replaced regularlyupdated never updated updated C Which one of the following software applications would beD MOST appropriate for performing numerical and stati Database Document processor package Graphics Spreadsheetthe Passwords get into users to efficient use of time enable the make quickly confidentialityfile C system retain simplify of files structures How many bytes do 4 Kilobytes represent? 8192 512 1024 4096 C Back up of the data files will help to prevent loss of dataD loss of confidentiality of data duplication virus infection Which one of the following is the MOST common internet A TCP/IP HTML IPX/SPX NetBEUI protocol? The advantage of ato the internet isshared access PCfiles can beprinter can do 1000s ofB systemday network is that quicker the operating pages a is easy to use The term A:\ refers to a subdirectory root directory a file name the the hard drive D UPS standsuniversal port serial uninterruptable power supply for up-line provider serviceuniform page source C The main problem associated with the the system systemnetwork requires a re-boot and defrag afterwards orphan filesthe programon system the not allow it toadministrator to uninstall it can be left uninstallingrequires aisA executable software always be uninstalled may that You are conducting research for a information.text. data. documents. Income Tax assignment. The raw facts you collect are called A A flow chartGraphical representation of logic NoneanytheA is the Rules writteLogical Steps in of language in procedural languageabove A voucher entry in Tally is fill receipt, is mandatory in of theA Purchase, sales, theforIt register None tally bove To done log payments etc. Passwords assist in maintenanceaccess unauthorised access are applied speed up order to to files in prevent allow encryption C Each of thesenior executive support for lacks leadership. B except: following isIT management IT. None of business an enabler IT understands alignment of IT-business the the above The basic systems model is used to describe virtually all information systems and it consists of the following elemen input. output. processing.All of the above D What is a computer-aided design system? do None of theA innovated designs and artistic patterns. The use of computers to design state-of-the-art, high-quality products. Using computers to that generatesabove Software architecture. A(n) __________ offers functional enterprise localentire industry. specialist orApplication Service Provider a solution package for an B File extensions are used in order to name the file ensure the filename is not lost the D type identify the identify file file Information preventive controls. controls. the All of the above are parts of IS controls. systems controls include all of controls. EXCEPT: detective corrective following D Hashing forexternal hashing hashing disk files isstatic called dynamic hashing extensible hashing A Components of expert (d)(a) to (d)C: (a), (b), (c) (b), (c), (d) b) user interface; c) knowledge base; d) fuzzy logic A: (a) , (b), systems include: a) inference engine; B: D: C Black box testing and controls testing are part of: corrective white box controls controls controls preventive detective general C What is the term used to describe Settings of Control ComponentInterface the point interaction between a computer and any other entity, such as a printe B The advantages of CASE tools(d) (a) to (d) (a), (b), (c) C (a), (c), (d) (b), (c), are: a) reusability; b) maintainability; c) portability; d) flexibility Which of the followingreset button. Select thetoPull the power cord from the back of the computer. Press the is an acceptable way Shut Down C computer? Turn the computer off at the powerthe shut down option from a menu. point. Yesterday, in your music class youUse nextFindcompositions up and ask the teacher cannot remember where you Create the files again. saved yourPut your hand as MP3 files. Today, you Ask the person the to you. SearchC or feature. Components of (c), information systemto (d) are: (c), (d) C (a), an (d) (a), (b), (c) (a) model (b), a) applications architecture; b) functional architecture; c) technolo Benchmarks form part organisational controlscontrols controls detective controls of: preventive corrective C Continuity controls include: (b),record counts; b) date checks; c) label checks; d) run-to-run totals (a), (c), (d) (a), a) (c) (a) to (d) (b), (c), (d) C Which is not part of help desk documentation:resolution procedures problem logging call lights program change requests C Testing of individual modules is known as: unit testing data testingthread testing testingA loop Design phase of CASE(a), (b), (d) (a), (b), (c) (a) to (d) D b) decision architecture; c) interface architecture; d) pre (b), (c), (d) tools includes: a) data architecture; Which is part of installation testing:parallel operations walkthroughs benchmark specifications matching testing system B The computer operating system performs scheduling, resource allocation, and data retrieval functions based on a s Multiplexer.Peripheral processors. Job control D Concentrator. language. Which of the following falls (c), (d) multimedia data:(c), text; b) images; c) video; d) audio (a) to (d) (b), under (a), (b), (c) (a), a) (d) A Which of the following procedures Physical security of in the disaster recovery plan for an Information Technology d Replacement personal should be included warehouse facilities. Identification of critical applications. of operating personnel. computers Cross-training for user departments. B Designing relationshipsinterfacecomponents isdesign architectural among design design procedural data designA part of: Several Computers connected together is called: Client-server Client Computer network Hub C Which network topology uses a Hub? Star Bus Mesh Ring A Which of the following topologies is used for Ethernet? above Star Bus Ring All of the D Application To maintainTo backup copy of job suchStore datainformation employment software area do a particular are written who is applying for programs To help someone all the in an organised manner To as editing, storing information B Which type Direct search method requires a computer first read all locations preceding the desired one of file Sequential Binary Indexed B Which of the following areascommunications systems andC software. a systems programmer in a computer system Systems analysis of responsibility are normally assigned to Data and applicationshardware and Operating Computer operations. programming. compilers. Which of the following is file on a disk on a tape file on a disk data are required A sequential recommended when A direct access file on a tape A sequential file A direct access searches for many C It is unlikelyTapes can only be read by the machine recordC they varywritten can be used on two machines of diff that a magnetic tape containing severalon commonly arebe blockedarchitectures Parity errors will result Data thousand blocked between together Information formats which never records can Which component of the CPU has Address calculationon its cost versus performance Data path part Control Unitthe most influence partchannel Input outputA Which of the following terms Area network network to connect computers with other computers, peripherals and Distributed systems Wide network used Local applies to area Protocol B Intelligent terminals differ from dumb terminals in that data from a microprocessor all processing operations process Can send data to a computer andrequire a they with a computer andwhich permits some data Use the Generallywhich required connected to entry to receive keyboard for data perform a CRT for display Are they are D A computerMixerbe linked to 8 terminals usingTime sharing computer link. To permit simultaneous terminal operat is to Modem Multiplexor a single communication C

BC163 BC164 BC165 BC166 BC167 BC168 BC169 BC170 BC171 BC172 BC173 BC174 BC175 BC176 BC177 BC178 BC179 BC180 BC181 BC182 BC183 BC184 BC185 BC186 BC187 BC188 BC189 BC190 BC191 BC192 BC193 BC194 BC195 BC196 BC197 BC198 BC199 BC200 BC201 BC202 BC203 BC204 BC205 BC206 BC207 BC208 BC209 BC210 BC211 BC212 BC213 BC214

A modem is a device that in back-up bedata Speeds up online printing Allows computer signals to procedures disktelephone line Aids Packs send over a file in a A A LAN includes 20 PCs, each directly connected toNetwork Planetary network Ring Network Loop Network the central shared pool of disk drives and printers. This type of n Star D A computerOffice Automation sending, forwarding, receiving and storing messages is called an based system for Executor systems Electronic mailing post-office Instant C If a workstation contains a intelligent workstation mainframe PC A dumb workstation A personal computer B An processor, monitor,A screen manipulation device, printer, storage and communication cap Terminal hardware controls include Time of dayEncryption algorithms All of them C control locks Parity checks RS-232 is aType of cable Terminal Standard Communication protocol Device interconnect standard D What is a compiler? does a conversion line iswholeas the program isprogram code into machine code in one step A compiler A compiler converts the a generalB A compiler by lineofof a purpose language providing very efficient execution None the higher level run above What are the stages in Implementation and documentationabove Feasibility study, system design, and testing D the compilation process? CONVERSION, and code generation Lexical analysis, of the None Which of the following is not a data transmission coding scheme CRC Baudot ASCII EBCDIC A What is theAn interpreter does theAnis a representation ofabove program is run providing very efficient execution definition of aninterpreter interpreter is bygeneral the An interpreter? conversionNoneaofline A the systemlanguage line the as purpose being designed A device used in data communications to divide a transmission signal into several sub-bands is known as a Modem Demodulator Frequency division multiplexor Time Division Multiplexor C Third generation languages such aslanguagesC, and FORTRAN are referred to as High-level languages Low-level languages C Middle-level COBOL, None of the above Serial Communicationthan parallel Itlong distance because it path It is faster is is less erroris less prone to only one It used overcommunication attenuation prone Uses D In what areas is the COBOLanddesign and languageof theC Financial sector programming educationused? Graphic engineering None Accounting systems, commercial sector above The primary function ofManagethe Relieve the Reduce a virtual environment the input/output devices Communicate front-endconsole function in competition between a with the processor is to CPU of repetitive communication tasks paging operator main C What is theSpecification program development? first stage in and design System Analysis Testing None of theB above Which of the following is not used for data transmission within a local area network Fiber Optics Coaxial Cable Common carrier Telephone Lines C What is System design System Analysis defines the involves creatingof data the program will use The Analysis?the screen the user will see andCandto enter or display data the problem to be solved of System Analysis formatuse type a formal model of None of the above A device to A cache An interface buffer link is called B device hardware communication An online protocol A What will a The different types of network toerrors before the system is introduced good software providerHardware,be used theB size of program. Testing to check for Software and consider? None of above The topology of a network can be each of the following except Star Packet Ring Bus B What is the10101010 1100101 the decimal numberof theC 8-bit binary value of 1010101 None 85? above Which is the most common data transmission Hash checking method Parity Retransmission Redundancy Cyclic error Count A What is the15 decimal value of the binary number 1111? theA 4 64 None of above Which of the following devices merges communication coupler onto a single line Port Modem Multiplexor Acoustic signals C What is the decimal value of the octal number 215?of theB 327 141 97 None above Which tool is used to help an organization build andthembusiness intelligence? Data warehouse Mining tools Data Data management systems All of use B Cache memory enhances memory capacity access time storage capacity access time memory secondary secondary storage B What is the30 decimal value of the hexadecimal None of FF?above 255 256 number theB Numbers are stored and transmitted inside form binary form ASCII codedecimal a computer in A form form alphanumeric What is the4C5 hexadecimal value of the decimal None of 1476? 1B7 5C4 number theA above A byte corresponds to 8 bits 4 bits 16 bits 32 bits B What does Basic Coding Description Decimal None of theD EBCDIC coding ofCoded Code Design Binary numbers mean? Bit above A Kb corresponds to 1000 bytes 210 bits 1024 bits 210 bytes A What is the10000 sum1112 binary of 01011 and 00101? None of theA 1110 above Information binary form ASCII codedecimal form is stored and transmitted inside a computer inA form form alphanumeric Where would you find the letters QWERTY? None of theA Mouse Keyboard Numeric Keypad above A parity bit issed to indicate uppercase letters is in a last bit in a byte u used to detectthe first bit the byte B is errors How did theBecause it mouse get likehas ears None of theD computer squeaks whenname? Its moves its a mouse It moved above Clock speed is measured in bits per second baud bytes Hertz D What are you most likely to use when playing a computer C Touch screen pen Joystick Light None of the game? above CPU performance mayMIPS BPS be measured in MHz VLSI B A digitising Printing letters tablet can be used for?Reading bar codes theB Tracing diagrams None of above In processing cheques MICR of the following I/O techniques have banks traditionally used OCR which barcode scanning voice recognition B Which of the following is a pointingCD-ROM drive computer input? Touch screen disk device used for of theA Hard None above A UPS increased the storagethe process a computer system event of a power cut increases capacity of speedpowerC the provides backup of the previous none in What does Refillable ink encil lead Light sensitive elementsabove a light pen contain? P None of theC The capacity of a 3.5 floppyMb around 100K 1.44 is 5 Mb 1 Gb B What general term describes the physical equipment of a A hardware software output input computer system, such as its video screen, keyboard, and Where would you find the letters QUERTY?Keypad Mouse Keyboard Numeric Printer B What are you most likely to use when playing a computer C Touch screen pen Joystick Light Scanner game? A digitising Printing letters tablet can be used for?Reading Bar Codes B Tracing Diagrams Digital Signatures

BC215 BC216 BC217 BC218 BC219 BC220 BC221 BC222 BC223 BC224 BC225 BC226 BC227 BC228 BC229 BC230 BC231 BC232 BC233 BC234 BC235 BC236 BC237 BC238 BC239 BC240 BC241 BC242 BC243 BC244 BC245 BC246 BC247 BC248 BC249 BC250 BC251 BC252 BC253 BC254 BC255 BC256 BC257 BC258 BC259 BC260 BC261 BC262 BC263 BC264 BC265 BC266

Which of the following is a pointingKeyboard CD ROM Drive input? Touch screen disk device used for computer Hard A What input Mouse could tell you the price of a Keyboard B device Bar code reader mark reader Optical product Where would you find a magnetic strip? Credit card Mouse Speakers Printer A Hard copy is a termon a hard board Writing used to describe...? information on theCartridge Printed output Storing Back-up onB hard disk a What are the individualPixelswhich Pixies up a Pickers on the monitor screen Called Coloured spots dots make picture B A daisy wheel is a type Storage device Printer of...? Pointing device CD-ROM A What input Mouse can be used for Optical mark reader the above device Bar code reader marking a multiple-choice test? None of Laptop computers use LCD displays CRT displays SSGA displays of the B none previous QWERTY is used with mouse button layout layout processing software screen layout reference to keyboard word C What input Mouse could tell you the price of a None of theB device Bar code reader mark reader Optical bar of chocolate? above A GUI is hardware language interpreter interface software an operating system C Where would you find a magnetic strip? card None of theA Credit card Speakers Smart above Multiprogramming several programs in RAM at the same time languages having refers to multitasking writing programs of the A none in multiple previous Multitasking refers several programs runRAM more programs concurrently having to The ability to in 2 programssame time languages writing or at the of the B none in multiple previous Multiprogramming is a prerequisiteTo run more thanof theprogram at the same time multitasking operatingfor an system none one C above UNIVAC Computer belongs to the Third - generationgeneration computers. First - generation computers. Second - generation computers. A Fifth - computers. Timesharing is the same as multitasking multiprogramming Multi-user none of the A previous Name the first Indian Super Computer? Vishwajeet Deep Blue Param Arjun C Disk fragmentation by wear by overuse bad diskof the C is caused caused is due to none blocks previous The technology code Reader Technology Inksheets of multiple-choice questions in civil services or similar examin Bar which is used to check answer CharacterBRecognition Technology Optical Mark Reader Technology Magnetic Image Scanning Technology A compiler is fast interpreter thanconverts a program themachine code a slower an interpreter of to C none previous Which printer among the following Desk - jet Printer Drum Printer - Matrix is fastest Thermal Printer Dot Printer A Zipping a file means it ecrypting it ompressing it encrypting d c transmittingC it What does Very important reader user sequence under siege user system acronym VIRUS information resource of above& Vital stands for information reader Virtual None B An impact printer creates characters by using...? inked ribbon and print head Electrically charged inkAn ink pen An Thermal Paper D A client-server system is based onWAN technologyoperating system mainframe technology LAN technology Unix B A nanosecond issec 10-3 sec 10-12 sec 10-9 sec D 10-6 A procedural control used to minimize the possibility footing tests Limit checks ontrol figures C External fileCross of data or program file destruction through operator error is the labels C _______ software enables users to send and receive data to/from remote computers application system operating system communication D A _____ is a running instance of an application project model pilot projectprocess D Splitting of CPU's time multithreading multiprocessing for differentmultiplexing tasks _______ prevents time slicing multitasking D ______ computers are used in large organizations for the A scale jobs which have large storage capacities mainframessuper computers computers of large micro none above _______ is control unit arithmetic and logicandnone ofunit B responsible for all calculationsprocessing operations that have to be performed on the data central unit logical the above ______ printer use laserrum printer on impact none of the C band printer light d n printer above ______ softwaremanagement user to enter spreadsheet B data enhances the word processing electronic ,store, of the above none manipulate and print any text ______ software enables users to idea software integrated software communication processor of the to/from remote computers send and receive data B none above _______ is my computer storage place for deleted of the B the temporary recycle bin Microsoft exchange none files above _____ is a collection offile field related fields record none of the C above _____ language consists of stringshigh level language the B assembly language language numbers machine of binary none of above ______ symbol is usedprocessed symbol terminator symbol to represent processes like assigning a value to a variable or adding a number connector symbol input/outputB symbol _______ is PC-at an examplehp vectra system vp200 series B for micro computer IBM-PC fazitsu _________capability supports concurrent users doing the D multiprocessing multithreading multiplexing none of different tasks above The ______ do notterminals" serverspowerterminals servers only a screen, keyboard and the necessary hardwa "dumb have processing dumb dummy of dummy and has their own A A______is nothing but distributedawindows NT wan a PC with computing system system network operating LAN D _____system is responsible for handlingend screenend user I/O processing host server back the front and D The______host handles data processing and disk front end aC server back end access in Client/Server architecture Both the DBMS and the application resides oncentralizedcomponent in a ____system PC LAN distributed computing A the same When all the processing is done by the mainframe itself, the type of processing is sometimes called as server processing host processing processing dumb data processing B DBMS models can be grouped under____ categories four one two many A ______is the most advantageous databasedatabase system file management system hierarchicalnetwork system database system relational database system D A new user multiprocessingprocessmultiplexing at the the B initiates a new multithreading execution of none of background,while the user can continue his query process as above The process of data being automatically written to a duplicate database is called______ repairing redo logging disk defragmentation D disk mirroring

BC267 BC268 BC269 BC270 BC271 BC272 BC273 BC274 BC275 BC276 BC277 BC278 BC279 BC280 BC281 BC282 BC283 BC284 BC285 BC286 BC287 BC288 BC289 BC290 BC291 BC292 BC293 BC294 BC295 BC296 BC297 BC298 BC299 BC300 BC301

Modem stands for __________ . Module/De-module theB Code/De-code Modulation/Demodulation of None above Multiple changes to thelocks record or a field traps fixes same constraints are prevented by the DBMS through______ B _________allows an application tomultiplexing multiprocessing multithreading multitask within itself B none of the above LAN standsLinear areaLocal .area networks None of theB for __________ networks Local array of networks.above New process of execution is referred to as______ task process thread client-server C ISDN stands for _______. Integrated system dynamic networks. networks. network. Integrated Symbolic Digital of theC Integrated Services Digital None above. _____________ is the Worlds largest computer network .B Ethernet Internet ARPANET None of the above. _______is/are a popular front builder * plus all of the above visual basicpower end SQL tool D When LAN MAN connected together ,it is called __________ . B WAN GAN None of the above. TCP/IP stands for _________ . communication protocol/Internet protocolprotocol Transfer control protocol/Internet protocol theC Transfer Transmission control protocol/Internet None of above. Data is broken into small unit called __________ . of theC Cells Bits Packets None above. SMTP stands for __________ .transfer protocol protocolabove. System modulation Mail transmission of theC Software Simple MailNone transfer protocol The __________ protocol is a network protocol to be builtC the World Wide Web . Transfer Protocol Transmission protocol None of the for Hyper text above. ATM stands for __________ . mode transferNone of theB Aggregate transfer Asynchronous transfer mode Area mode above. The computer which can receive data from other computers on the network and print it is _______ File server Printer server Receiver None of theB above. The hardware and the software requirements together form the_____ platform configurationackage system p A ATM, Asynchronous WAN and WAN aand MAN WAN and MAN MAN and transfer mode is __________ technology. LAN LAN LAN B __________ is designed telephone system Intranet ISDN ATM Internet A Expansion of ISDN Services Digital Network Services theC Network Internal is ________ Integrated None of Digital Internal Services Design Network above. Expansion of WBT is ______________ basedWeb basedA Web basedWeb basedWeb Training TechnologyTransport Transaction _________ Bridges LANs. connects Routers Protocol Repeaters B Collection of instructionbatch procedure is called a command program D _____ Combination of alphabetic and numeric data is called _____ data alpha numeric alpha beta numerous alpha number and alpha A Computers space occupied, performanceusers ratio output, _______ can be classifiedprice, size,______,______and performance ratios cost, based onof theirinput, cost no. performance, allowed C _________ mini used inmicroprocessors are computers organizations formainframesD large PCs large scale jobs _______ is input responsibleoutput for feedingfeed into the computerA data write _______ is multiprocessing the o/smultiplexing the capability of multithreading run numerous applications simultaneously to multitasking D _______ involves conversion of raw data into some meaningful information interpreter compiler converter process D _______ is input responsibleprocessor ram processed data from the computer for obtaining the output D _______ printers use light to printers the dotsthermal printers pages of characters impact printers produce drum non-impact desktop to form needed printers C Hardware components control bootstrap, interpreter, assembler, compiler operating system, program, kernel, shell keyboard, bus output in a computer are _____,____,_____,______ monitor, program,memory, input, CPU, D _______ software aresystem operating programs that are complex and can be developed or purchased application software 95interpreter B windows _______ is batch of special instructions used to communicate effectively with the computer a set protocols software's proceduresC _______ converts a high level language into machine language processor compiler assembler coder B _______ translates assembly language program into machine language instructions compiler interpreter assembler processor C

Question No.

292 Show/Hide 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 Show Hide

49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100

101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152

153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204

205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256

257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

You might also like