Professional Documents
Culture Documents
QUESTIONS A
TALLY
The ------ key can be used to select an existing company
from list of companies. F1
Import and Export of data between Tally and other
programs is possible only through ---------- Program. Tally ODBC
The re-order point is the inventory quantity that trigger
a stock replishment activity. TRUE
A created company's detail can be modified through
keys F3
A/An ------------- is the official notice that the firm sends
to its customers to advise then to the amount of money
that is owed. Invoice
In tally,all masters have ________main options Two
In tally,to create a new column in balance sheet press
_______ Ctrl+C
In tally,the use of group behaves like a sub-ledger,
option is that we can summarize many ledger accounts
into one line statements TRUE
In tally, we can alter ledger details using either single or
multiple modes but not alble to delete a ledger from
multiple modes. TRUE
In tally,a group company is marked with an
______________ *
data to be transferred
The memory address register is used to store to memory
FUNDAMENTALS OF COMPUTER
Inefficient usage of excess computer equipment can be
controlled by Contingency Planning
DATABASES
consecutive nos. or
Hierarchical code means _________ alphabets to entities
The validation checks applied to a field depend on the
field's logical inter relationships with other fields in the
record TRUE
The contents of a field could determine _______ sign for a
______ field valid, numeric
Batch is the process of ______ together _____ that bear grouping,
some type of relationship to one another transaction
Hash totals means meaningless totals true
With OLRT where interactive data entry is available, the
master file associated with a transaction may be
searched for confirming data true
provides detailed
information of machine
Program code analysis involves _____________ uses
__________ is a software of CAAT IDEA
Snapshot is software which takes a picture of a file or
data or a transaction passing though the system true
fictitious data
applied against the
Base case system evaluation includes____________ client program
While base testing forces on finding if there are any
defective execution policies in a program TRUE
Black box testing seeks to determine whether
application output is what it is supposed to be true
In integrated test facility approach the auditor should
ensure that the impact of test transaction is
subsequently eliminated from the computer files true
Black box testing is _______ based and white box testing specification,
is _______ based program
identifying erroneous
Source code review means__________ code
In formula in flow hypothesis the auditor should expand
the extent of substantive tests to determine how the
defects may impact the attainment of the program
objectives true
All material application oriented events that occur within
the boundary subsystem should be recorded in the
accounting audit trail true
In examination of audit trail the following data
associated with an event may be ___________- start and finish time
package computer
p[program for
performing a variety
of data processing
Generalized audit software consists ___________ function
prepared by the
Specializes audit program may be___________ auditor
Generalised audit software could be used by the
following in consistencies or significant fluctuations TRUE
file
Generalized audit software function include____________ access/organizations
In the file reorganization merging capabilities are
needed in data from separate file is to be combined on a
separate work file TRUE
Auditors cannot use generalised audit software to
extract the data needed for audit purpose true
Auditors can combine functional capabilities of
generalized audit software to accomplish the task of examining the quality
__________________ of system process
Wide access to various
Which of the following is not the feature of GAPs data base
Which is the example of CAATs ACL
A sample of
In audit procedures, test data is transactions
Tests of details of
Which of the following is not the use of CAATs transactions
Which of the following are called explicitly by another
procedure? Macros
_________ data type is generally used for fields assigned
as primary keys in a table integer
MS access objects can be published in the web true
In code-builder, got_focuse, click,dbl_click,enter are
examples of _______ actions
_______can be used to automate certain actions in
response to events report
In the macro sheet the macro is selected in the
_____field macro
_______is selected from the toolbar to add an OLE object unbound object
Changes from a master table can be reflected on to the cascade delete related
child table by selecting _____option records
To see more than one record at a time in a form we use
_______ columnar
Information about
What does a record contain? certain programs
Information about
What does a record contain? certain programs
Reports allow users
to extract
information as hard
copy (printed
What is a report? output)
Extracting and
What is the best way to analyse and change data analysing data
What are some popular office orientated software Compilers,
applications? interpreters, editors
records in a dynaset
are consistent with the
Referential integrity ensures that the: underlying tables.
How would you delete a relationship between tables in Double click the
the Relationships window? Relationship line
Which of the following is true when viewing a main form The subform is not
and its associated subform in the Form Design view? visible.
entities in a column
In a relation __________________________ . vary as to kind
An attribute is also known as a(n)
. table
A combination of one or more columns used to identify
particular rows in a is___ . record
A combination of two or more columns used to identify
particular rows in a relation is________ . record
A determinant that determines all the other columns in
a relation is______ . record
When designing a database, one of the candidate keys
in a relation is selected as the _________ . composite key
Normalization is a process used to deal with which of the
following modification anomalies? Insertion anomaly
assess the existing
When you are given a set of tables and asked to create tables' structure and
a database to store their data, the first step is to ____ . content
Institutional
Overhead and
The Costs of Digital Signature consists mainly of the Subscriber Relying
following Party Cost
Certification
CA stands for ________________ Authority
A Digital Certificate is issued by a Certification Authority
and is signed with the CA's Private Key True
A Digital Certificate does contain Owner's Public Key,
Owner's name, Expiration date of the Private Key, Serial
number of the digital certificate True
______________ enable web servers to operate in a secure
mode. Server Certificate
The advertising strategies emerging in the on-line world Active or push based
are ____________ advertising
What would you NOT be looking for when spying on a A list of competitor’s
competitor? clients
IN an URL the word before the color refers to _______ host computer
A ______ always begins with a slash message
Prodigy is run by IBM and ______ Delphi
The _____ level gives the broadcast overview of the net middle
The huge list of keywords from important items is called
______ hotlist
directory search,index
The two types of search in veronica are _____ and ______ search
_______ searches by keywords infoseek
Mosaic displays links in color whereas _____ does not
display links in color netshark
______ supports one button publish lynx
SPY MOSAIC is distributed by_______ Microsoft
______ is a program that helps us to log on to other
networks Usenet
______is used to transfer and copy files over the internet iccp
_____ is a program that helps us to log on to other
networks yahoo
transfer control
TCP/IP stands for ________________ protocol/internet
Archie servers can be accessed in_______ different ways
in internet one
_______is the computer on the internet that translates
between the internet domain names and the internet
numeric address ftp servers
TIA stands for_____ in internet the internet adapter
Service indicates the name of the ________ used to
access data, present on the other end of the link. browser
hotlink text transfer
HTTP stands for______ protocol
universal resource
________ is used to link pages in the world wide web locator
Lynx is a _______ programme that works with terminals world wide web server
The huge list of keywords from important items is called
an_____ glossary
very easy and
rodent oriented net
wide index to
computerized
VERONICA is an acronym for _______________ archives
university of
The first freenet is created at the_____ and is berkeley,berkeley
called______ freenet
________ are defined as ways of communication amongst
networks protocols
search
______and_____ are web searching features engines,directories
The online service offered by navigator gold 2.0 are email and net
_______ and_____ conference
_______ is a program or a tool that helps us find a file
anywhere on the net newsgroup
The databases to enable keyword search using Lycos
are a2z,_______ Lycos catalog
______ is a large worldwide bulletin board service
network apple link
computer related
abbreviations and
BABEL consists a glossary of _____ acronym
Dictionaries,encyclopaedias,government and other encyclopedia
references are found in ______ Britannica
Yahoo,lycos,excite and webcrawlers are _____ search engines
Graphical interpreter
GIF is the acronym for ____________ formatting
Joint Pictures Expert
JPEG is the acronym for ___________ Group
The Web aids users to explore the ________ mails
yahoo,infoseek,altavist
The three most popular mailer are_____,_____ and______ a
The two major browsers used to surf the Internet are MS Internet Explorer
________,_______ and Mosaic
Special characters allow browsers to display
_________________ text
The keyword for providing links within or across
documents is____________ hyperlink
Stringing pages together using hypertext technology
helps view pages _______________ in random order
The initial web pages present in a web site is the
________ page. first
The image format supported by most browsers
is________________. .bmp and .gif
mail servers,mail
The mail we send has a mailing address and most of clients and alternate
them correspond to_____,_____ and services
Which of the following is not supported by internet
explorer _______________ <center>
communication
CGI stands for ____________ generated information
Host name indicates the domain name of the web
________ Server
The internet is also called as _______________ arpanet
defensive
DARPA stands for administrative rank
_______________________________________________ administration network
The uuencode files start with a _______ start
milnet,smaller
DARPA is broken into ________ and _______ arpanet
NSFNET is the united states provides service to _____
and_____ education,research
Higher text
HTML stands for ______________________________________ manipulation language
The first international IP network connections were
established in 1973 with _____ and_____ united states and UK
________ and______ are two basic ways of getting Satellite link and digital
connected to the internet signals
Standard long internet
SLIP stands for ________________ protocol
Prime prolonged
PPP stands for _____ protocol
The ________ allow companies to bypass the need for Billboard model of
costly printed catalogs marketing
A ________________ is a basket on the Net that is used to
place the items that are being purchased Online Catalog
The wizard that is used to suggest hints for doing a task pivot table wizard
In a chart Y-axis is known as_________ series or rank
In a chart X-axis is known as_______________ series or rank
_________ is a set of tables that describe each of the data
series series or rank
________ is used to differentiate one data series from
another series or rank
The chart that contains only one data series is _________ column chart
The chart that holds the column chart is _________ column chart
The chart that display two or more data series on a
surface is _________ column chart
The chart that is used to display discrete data column chart
_________ are not allowed in a macro name spaces
Which of the following tool cannot be used to view the
excel web page_______ excel97
The wizard that used to build an interactive table from
data existing on sheets pivot table wizard
The chart that is used for displaying stock market
information line chart
In excel, the subtotal command also generates grand
total after the last group subtotal_________ true
In advanced filter , the criteria occupying multiple
columns but more than one row, is considered as an
________ criteria. and
A pie chart can represent only one data series at a time true
The ______ generates a summarized report in tabular
form in an interactive manner Data table
Which one of the following statements related to stock It is also called as high-
chart is NOT TRUE ? low-close chart
The state government needs to finalize a five years plan
to implement 100% literacy in the state. Which one of
the following will be the best tool that should be used to
work out the plan ? Pivot table
Performing
Spreadsheets are useful for _______________ calculations.
Which one of the following is NOT the component of the
pivot table ? Column field
Excel allows upto ______ levels of sorting two
On an Excel sheet the active cell is indicated by… A dark wide border
Cell A4 =2 and A5 = 4. You select both cells and drag
the fill handle down to A8. The contents of cells A6, A7,
and A8 are _____. 8,16,32
How can you tell which cell in a worksheet is the active It is surrounded by a
cell? heavy border.
By clicking in a
How can you change the active cell? different cell
The command that will save the current workbook with a the New command on
different file type is: the File menu.
The command that will print an Excel workbook is found
on the ____________ menu. File
In the Save As and Open dialog boxes, the ___________
view shows the file size as well as the date and time a
file was last modified. Preview
Which of the following commands will automatically
adjust cell references in formulas? Insert
Which of the following commands will remove cells,
rows, or columns from a worksheet? Clear
Which of the following options is NOT controlled through Orientation (portrait or
the Page Setup command? landscape)
Which command enables you to change the margins for
a printed worksheet? Options
All commands are carried out on a rectangular groups of
cells known as a: worksheet.
Which of the following is a valid cell range? 6
In a copy operation, the cell(s) you are copying from is
called the: copy range.
In a copy operation, the cell(s) you are copying to is
called the: paste range.
Which of the following commands is needed to duplicate The Duplicate
the contents of a cell in another? command
A cell reference that does not change during a copy
operation is known as absolute
Which of the following is considered an absolute cell
reference? B4
Cell E3 contains the function =AVERAGE(A3:D3). If the
contents of cell E3 are copied to cell E4, what will be the
contents of cell E4? #DIV/0!
Cell E3 contains the function =AVERAGE($A$3:$D$3). If
the contents of cell E3 are copied to cell E4, what will be
the contents of cell E4? #DIV/0!
Which of the following commands is needed to transfer
the contents of one cell range to another? The Move command
Conditional formatting applies formatting to a cell based whether the cell has a
on: formula or a value in it.
To select several cells or ranges that are not touching hold down the CTRL
each other, you would _____ while selecting. key
bulletin board
BBS stands for______ system
USENET is a BBS on ____ scale small
WINSOCKS is expanded as______ windows socks
IETF Level 2 HTML DTD supports graphical browsers like
_______ Mosaic
The space used by Netscape to store the retrieved page
is called______ buffer
The principles, means and methods for rendering
information unintelligible and for restoring encrypted
information to intelligible form. Photography
A long string of seemingly random bits used with
cryptographic algorithms to create or verify digital
signatures and encrypt an decrypt messages and
conversations. Key
What happens to data that is ruined before reaching to Data return to the
receiver sender
Which is not one of the recognized IEEE sub layers? Physical Layer
The most preferred number system to represent a IP
address is Binary
A MAC address is of 48 Bits
software that facilitates
connection to the
Protocol is internet
A ............... is a LAN-based computer with software that
acts as a controlling device for controlling access to at
least part, if not all, of a local area network and its
available resources. Novell PC
What is the biggest disadvantage of the Ring topology? There isn't one
The .............. of the network concerns how network
devices are physically (or optically) interconnected. Physiology
The principal topologies used with LANs are: Bus
What are the various types of bus architecture? Linear
What are the various types of ring architecture? Parallel
In a ................., each workstation attaches to a common
backplane via its own physical cable that terminates at
the hub Ring
In a ............... , each work station is directly connected
to a common communications channel Ring
The Media Access Control (MAC) is a sub layer of the: Network Layer
What are the most common LAN technologies used in Ethernet, token ring,
networking today? DecNET
Modem speeds are measured in bps
LAN speeds are measured in bps
a Novell Interface
An NIC Controller
Accessing the Internet from a typical home PC requires
the use of CD-ROM drive
The most widely used network operating system on PC
LANs is Linux
have to do with
compression of
JPEG and MPEG graphics and video
It is one large
Which of the following is NOT true about the Internet? network.
The traditional intent and impact of this common type of
attack is to prevent or impair the legitimate use of
network resources. Password cracking
used to protect a
computer room from
A firewall is fires and floods
Which of the following is NOT an example of a DoS
attack that is popular among hackers? IP flood
A ____________ attack is when a hacker sends a
continuous flow of packets to a system. hack
Mr Rao wants to find a website that he briefly browsed Click on the Back arrow
over yesterday. After turning on his computer how until the desired site is
would he do this? found
the Refresh
Which of the following is used to update a Web query? command
Receiving messages
automatically from
What is a disadvantage of joining a mailing list? anyone in the group
To deactivate the Form UnLoad event, you make the Cancel parameter to
following change in the function definiton: a non-zero value
Consists of several
A project group is a Project which: Programs
Procedures declared in a _____ are local whereas Form window,
procedures declared in a ______ are available to the standard or code
whole application. module
How can you keep the user from exiting a form by Place code in the
clicking the Close button? Terminate event
The _______ property enables Visual Basic to draw
complete images in memory before displaying them on
the Screen. AutoRedraw = True
You want to display the code and the description of an Msgbox err.no &
error. What would be the correct syntax? err.text
To display images to
What is the purpose of the Image List Control? the user
Which method would you use to get a free or unused
File identifier while opening any file: FreeFile
Which property procedure is used to retrieve the value
of a property? Retrieve
Which of the following can be shown to the user using Common messages
the Common Dialog control in VB? passed to Windows
Which of the following are not properties of Command
Button: Caption
Which events enable you to determine which key was
pressed by the user? Click and KeyPress
In order to access a file in Non-textual format, you have
to open file in: Ascii Format
MsgBox statement
returns a value, while
The primary difference between the MsgBox statement the InputBox function
and the InputBox function is the: does not.
Which of the following is TRUE about a protected form
(i.e., a form where the Protect Form button on the Forms
toolbar is toggled on and is assumed to remain in that Data cannot be
position)? entered into the form.
Which event is triggered when the user moves to
another open form? Unload
The user can use ______ to remove the undesirable part
of the image clipping tool
used to mange
Manager box tool in organizational chart window is organizational chart
PowerPoint creates a
With reference to autocontent wizard for creating a new sample presentation to
presentation, which of the following statements are not which user can add
true words and pictures
data to be graphed
With reference to chart, which of the following resides in a datasheet
statements are not true window
The format of the text entered in a title, subtitle, or
bulleted-list object is determined by the format settings
in a special slide called -------- the master slide
What happens when you double click a blank graph Excel is started so that
placeholder in a PowerPoint presentation? you can create a chart.
Which of the following actions will enable you to insert a Pull down the Insert
graph into a PowerPoint presentation? menu and select Chart.
A dialog box is
displayed allowing you
to enter the name of
the Excel worksheet
that should be linked to
What happens when you click the Datasheet button on the PowerPoint
the Microsoft Graph toolbar? presentation.
What happens if you single click a chart that is not The chart is
currently active? selected.
What happens if you double click a chart that is not
currently active? The chart is selected.
Analysis translates
program code of a high
level language to
How do you define analysis of an information system? machine code
What are User Guides are used for? For technical support
Operating systems
Systems software can be categorised into: and system services
Every data from the primary memory will be erased if Power is switched off
An RS-232 interface is a parallel interface
For print quality you would expect best results from line printer
The short-cut-key that is used to paste the selected text ctrl+v or ins
The short-cut-key that is used for paragraph
spacing(1.5) ctrl+2
The box that separate text from the document and
allows it to behave like an independent object is known
as Text Box
The object that is used to provide information like the
title of the book, name of the chapter, page number etc. Header and Footer
The object that helps us analyzing data statistically is
known as Chart
To highlight certain parts of a page to set it apart from
the rest of the page we make use of the following
features Borders
To clear all the tabs in a document the option that is
clicked from the tabs dialog clear
The dialog box that is used to incorporate picture bullets picture bullets
into our documents or web pages is dialog box
The object that composes of set of tools which helps to
create and work on different shapes like rectangles,
circles, flowcharts etc. charts
When word is opened a new document called_____ is
displayed, where the user starts typing the content right
way doc1
______ is an online dictionary maintained by word to
obtain synonyms for words thesaurus
The thesaurus is invoked by pressing_______ shift+f7
When a new table is created the insertion point flashes
in the _____ first
By pressing the _____ key inserts a blank row after the
last row in the table tab
The ______ option enables us to convert text into a table
format convert text to table
it is not possible to
change the height of
With reference TO TABLE WHICH OF THE FOLLOWING only selected rows of a
STATEMENT ARE false table
The alignment available for tabs does not include left
A new section is
created in order to
Which of the following statements related to a Section change properties like
Break are True number of columns
The user can set a spelling checker to skip the marked
part of the next true
automatically corrects
With reference to auto correct which of the following common typing,
statements are false spelling errors
The Versions
command will allow
you to save multiple
versions of a
document, including
any changes that
may have been
Which of the following is TRUE about saving a document made to that
using the Versions command? document.
What happens when you open a document that has All versions are opened
been saved using the Versions command? automatically.
You have used the word ‘discover’ four times in an
English essay you have created using a word processing
program. You would like to find another word of similar
meaning to use instead of ‘discover’. Which of the
following would you use to do this? Dictionary
Word displays a list
When opening and working with multiple versions of a of the dates and
document, how can you tell which is the most recent times each file was
version? saved.
Various fields are added to a regular document to create
a special document called a form through the
____________ toolbar. Fields
Which of the following types of fields CANNOT be
inserted into a form? Check boxes
a section of white
text on a black
A reverse in a newsletter is: background.
setting it in larger
A pull quote is best emphasized by: type or font size.
data to be transferred
The memory address register is used to store to memory
data to be transferred
The memory data register is used to store to or from memory
The place in the CPU where the data and programs are
temporarily stored during processing is called the ROM
viewing an
encyclopaedia CD-
Multimedia software can be most productively used for ROM.
To be effective a virus checker should be replaced regularly
Which one of the following software applications would
be the MOST appropriate for performing numerical and
statistical calculations? Database
The main problem associated with uninstalling software orphan files can be left
is that on the system
You are conducting research for a Income Tax
assignment. The raw facts you collect are called data.
Graphical
A flow chart is the representation of logic
Purchase, sales,
A voucher entry in Tally is done for receipt, payments etc.
To maintain a backup
copy of are written all
Application software are programs the information
It is unlikely that a magnetic tape containing several Tapes can only be read
thousand blocked records can be used on two machines by the machine on
of different architecture directly because which they are written
Which component of the CPU has the most influence on
its cost versus performance Data path part
Feasibility study,
system design, and
What are the stages in the compilation process? testing
Which of the following is not a data transmission coding
scheme CRC
What input device could tell you the price of a product Mouse
Where would you find a magnetic strip? Credit card
Writing on a hard
Hard copy is a term used to describe...? board
What are the individual dots which make up a picture on
the monitor screen Called Coloured spots
A daisy wheel is a type of...? Printer
What input device can be used for marking a multiple-
choice test? Mouse
Laptop computers use CRT displays
Integrated system
ISDN stands for _______. dynamic networks.
Transfer control
protocol/Internet
TCP/IP stands for _________ . protocol
Data is broken into small unit called __________ . Cells
System modulation
SMTP stands for __________ . transfer protocol
The __________ protocol is a network protocol to be built
for the World Wide Web . Transfer Protocol
Aggregate transfer
ATM stands for __________ . mode
The computer which can receive data from other
computers on the network and print it is _______ File server
The hardware and the software requirements together
form the_____ platform
ATM, Asynchronous transfer mode is a __________
technology. MAN and WAN
__________ is designed telephone system ISDN
Internal Services
Expansion of ISDN is ________ Digital Network
false A
FALSE A
FALSE A
$ & ^ A
F5 F6 F7 C
Ctrl+P Shift+P None of the above A
False A
Enterprise Data - Electronic Data
Information Interchange. All of the above C
FALSE A
3 4 5 C
16 18 21 B
TRUE B
F5 F6 Alt+f5 B
Primary Cost
Primary Category All of the above C
False A
1 to 100 10 to 60 None A
F4 Ctrl+f2 Ctrl+f4 A
Closing Balance A and B None of the above C
False A
False A
F7 F8 F9 C
Changes in Ledger
Masters Both A and B None of the above C
3 4 1 B
FALSE A
FALSE A
Primary Symbol None of them B
Tally.ini A or b None A
FALSE A
228 28 16 C
Groups Sub-Groups B or C A
Owner Data Entry TallyVault A
Other programs - a
spreadsheet or a
database file. Both A and B None of the above C
System feasibility
report Capacity Planning Exception reporting C
Analysis, System
Programming, Design, Design, and
and Testing Implementation None of above A
ACL JCL none the above A
False A
False B
False A
no B
false A
false A
false A
false A
false A
false A
review and evaluate to obtain a record
the types of data layout extract data from file A
can bring the data
indirectly all the above none of the above A
False B
FALSE A
false A
false A
false A
providing access to
computer to all
organization personnel use of any programs none of the above D
false A
false
false A
false B
false B
with production
departments all the above none of these A
false A
false A
false A
false A
false B
planning language model base all the above D
false B
false B
table files report files none of the above D
decentralized picture
of a system all the above none of the above A
false A
false B
false A
false A
subject area software and
database database safety and database B
false A
false B
immediately on quarterly basis none of the above B
false A
false B
blocks of nos. to the
primary attribute of random placement
the the entity of component none of the above D
false A
false A
false B
false B
interactive data interactive data
extraction and innumerable
analysis analysis none of the above B
false A
false A
false B
false A
no B
re-perform
procedures carried
provide information to out by the clients
the audit programs all the above D
false A
system advanced
software all the above none of the above A
false B
no A
false A
false B
false A
no A
no A
examination of
source code of a
identifies program program with
code which may be advice to
there for fraudulent following the logic
reason of a program none of the above C
ACL ALC ACLL B
false A
comparison of source analyzing the
version of a picture of a file or
programmed data all the above A
false A
false A
false A
false A
false A
authentication of
information support resource requested all the above D
job connectivity
language all the above none of the above A
no A
false A
false B
prepared by an
outside programmer
engaged by the
prepared by the entity auditor all the above D
false A
false B
false B
expression
macro list elements list box none of the above C
false B
for specifying
conditions with
for updating records group by clause none of the above C
false A
RAP RAID none of the above A
MsgBox message none of the above B
false B
Dynaset field
field property properties properties B
$ @ ? D
false B
false A
false A
false B
false A
false B
false A
false A
false 1B
false A
false A
false A
false B
false B
false B
false A
false B
bar both 1 and 2 none of the above C
false A
false A
false B
select query delete query append query B
false B
false A
false B
false A
false B
embedded stand alone sub chart D
false B
false B
false B
false A
the last field of the
table primary key field none of the above C
reports attributes entities D
false A
false A
false B
use datasheet in
use import forms use export D
false B
false B
false B
false A
false A
false A
false A
# ? * D
false A
detail group topic C
false A
false B
false A
false B
false A
false A
false A
child forms inner form none of the above A
Spreadsheets make
data easy to analyse Using queries None of the above C
Word processors,
Network software, spreadsheets,
backup systems databases, DTP None of the above C
PRIMARY KEY and
FOREIGN KEY UNIQUE
constraints constraints IDENTITY columns C
main form and a query and its report and its related
subform. associated dynaset. query. A
A one-to-many
A one-to-many relationship A many-to-many
relationship between between coaches relationship between
teams and coaches and teams players and teams C
M ¥ * C
The Customers table
only when there are
Loan records
associated with that The Loans table
customer at any time Neither table C
prompt, icon, title title bar text, title bar text, icon,
bar text. prompt, icon. prompt. B
A drop-down list
A text field enables the enables the user
form user to choose to choose from
from one of several one of several A drop-down list enables
existing entries. existing entries. the user to enter text. C
must be set for does not have to must be set for two
multiple words. be set. words. C
maintain data on
create tables of different things in
store data in tables. rows and columns. different tables. A
relationships. metadata. all of the above D
figures. information. a and b D
it contains a
it reduces data description of its
duplication own structure All of the above. C
as a new systems
development as a redesign of an
project existing database a and b B
as a redesign of
as a new systems an existing
development project database a and b C
entity-relationship
normalization data models data modeling A
entity-relationship data
normalization data models modeling B
entity-relationship
normalization data models data modeling D
entity-relationship
normalization data modeling data migration D
design the database create one or more move the data into the
structure new tables new database A
were essentially
killed off by MS have poor response are not true DBMS
Access time products B
Their report delivery is
more difficult than
report delivery for
reporting systems. Nonintegrated data None of the above A
a "wrong format"
inconsistent data nonintegrated data problem B
a "wrong format"
inconsistent data nonintegrated data problem D
False A
False B
Personal Digital
Developer Certificate Certificate None of the above A
Personal Digital
Developer Certificate certificate None of the above C
Evidence, Ceremony,
Efficiency and Approval, Efficiency
Approval, Evidence logistics, Evidence and Logistics D
False A
False A
Certificate Resource certificate
List Revocation Letter None Of The Above A
Private Key,
Public key, Recipient Recipient None Of The Above A
False B
Primary Key and Public Key and Public Key and
Private Key Password Private Key D
Satellite Area
Private Network Network None of the above B
Contact numbers of
the management A competitor’s new
group Research data project B
e-commerce
multi-user database database
application application None of above C
Keeping messages Including the Using all capital
short Subject letters D
Encryption
Message performed by a Security at the
authentication in EDI physically secure transaction phase in EDI
systems performs the hardware device systems is not necessary
same function as is more secure because problems at
segregation of duties than encryption that level will be
in other information performed by identified by the service
systems. software. provider. C
convert text to
columns wizard tip wizard function wizard A
domain name
servers web servers none of the above B
the internet
administration the internet access none of the above A
very organised
network integration verification on
and communication network integration
application and communication none of the above A
university of
cleveland,cleveland university of
freenet California net none of the above B
biographical
information bookstores none the above A
on-line reference
works more information galenet A
web directories database channel B
mailing lists,mail
mail vendors,mail server robots and
identification and gateways to other
password services none of the above C
defensive
advanced
dedicated and research projects
registered projects administration
administration net none of the above C
begin first none of the above B
packet
switching,store and smart network and
forward network dumb network none of the above B
anonymous ftp file transfer none of the above B
Dedicated access
and dial up access Cable and wires none of the above B
Stream line internet Serial line
protocol protocol none of the above C
Point to point Pillar to pillar
protocol protocol none of the above B
Electronic Fund
Electronic Commerce Transfers All The Above D
Not True A
Formal Legal
Formal Legal Requirements, Open
Requirements Open System System D
Signer
Efficiency authentication None of the above A
Document
Authentication Both A and B Neither A nor B C
Not False B
The private key cannot The private key is The private key is used
be broken into used by the sender by the receiver for
fragments and for encryption but decryption but not by
distributed to the not by the receiver the sender for
receiver. for decryption. encryption. A
Failure of server
Data entry errors. duplicating function. Firewall vulnerability. D
Purchase Pre-purchase
consummation preparation Search and discovery A
Endorsement model
Online catalog of marketing None of the above B
Business-to- Consumer-to-
Consumer Business Customer-to-Company B
Electronic Cash Euro Cash Endorsed Cash B
Business Process Service
Perspective Perspective None of the above C
false A
or B
4-dimensions Multi-dimensions A
false A
Pivot table B
It is often used to
display share It is also used for
It shows trends over market prices over a indicating fluctuations in
time period of time temperature changes B
false B
4-dimensions Multi-dimensions A
Pivot table B
It is useful when
several components
are changing and
the user is
interested in the It can be
sum of the represented in 3-
components. dimensions B
/ * \ D
It is impossible to
C3/D4 D4^2 determine. C
6 SUM(H9:H11) G7*SUM(H9:H11) B
The phrase “active cell”
It is displayed in appears in the Status
It is blinking. reverse video. bar. A
By either clicking
in a different cell By typing the reference
By using the arrow or using the arrow of the cell you want to
keys to move to a keys to move to a move to in the formula
different cell different cell bar C
The Cell Format
The Formatting command on the The Font Size command
toolbar Edit menu on the Tools menu. B
the Save As
the Save command on command on the the File Type command
the File menu. File menu. on the File menu. C
It is impossible to
determine from the
Aug-31 29/03/2008 information given. B
subtracting the later
adding the earlier date date from the earlier adding the later date to
to the later one. one. the earlier one. A
Income - tax
authorities Judge of a civil court Police officer of IPS rank. B
Pirated software Virus Cracker C
Hoffman Charles Bubbage Howard Aiken A
Amazon .com Dell .com Msn .com B
Asynchronous
Transmission
Any Time Money mode None of above C
depend on the
measured in bytes per transmission limited by modem
second medium speeds C
a screen saver
a form of virus program none of the previous D
an email server a poor file server none D
IR system for the
Internet browser none of the previous C
It is made up of many
networks connected It works the same Individual computers can
into transmission lines way as a local connect to it using an
called backbones. network. ISP. A
a screen saver
a form of virus program none of the previous D
Flood a Web server Virus that initiates a
with requests ping flood UDP flood A
To obtain an accurate
inventory of network
related equipment
To improve network To improve system and parts and
services response time network nodes D
update its prices as
limit access to stop its competitors soon as they are
computer owners only seeing their prices changed D
Yahoo People
Search USA People Search Lycos Search B
clicking a hyperlink
that references a
updating the values document that is
that are obtained stored in the floppy viewing an Excel
through a Web drive on your worksheet that you have
query computer saved as a Web page. B
Go to the History
Click on ‘Go to’ or page and look for Go to the Bookmarks or
‘Search’ in the browser the site Favorites page C
the Insert Hyperlink the Update the External Data
command command command A
People discussing a
topic of interest High volumes of
globally email None of the above C
autolayouts and
presentation slide view & outline
templates view none of the above B
false A
false A
false A
Consists of Various
Consists of several Forms And Code Consists of several
Applications Modules Projects D
ScaleHeight and
ScaleLeft and ScaleTop ScaleTop x and y A
The ExecProcedure
The Exec method method None of the above D
A critical message
icon An exclamation icon None of the above B
28 18 36 C
.wmf(windows
metafile) .txt(plain text) .doc(document) B
12 102 22 B
A dialog box is
displayed allowing you
to enter the name of
the Excel worksheet The datasheet
that should be window is toggled
embedded in the The datasheet is from closed to open
PowerPoint saved as a separate (or from open to
presentation. file. closed). D
The application that
The chart is doubled created the chart is
The chart is deleted. in size. started. A
The chart is doubled Microsoft Graph will
The chart is deleted. in size. restart. D
a slide one bullet
item at a time, build
bullet items a letter
at a time, and build
bullet items one letter bullet items one bullet items a word at
at a time. word at a time. a time. D
Subtle, Moderate, or
Moderate Exciting Exciting D
Both enter and
exit, and fly in Neither enter nor exit;
Fly in from top or from top or neither fly in from top
bottom bottom nor bottom C
Shift Alt Ctrl B
The advanced
timeline shows
the sequence in The advanced timeline
which objects will shows neither the
appear on the sequence in which
The advanced timeline slide and the objects will appear on
shows the duration of duration of the the slide, nor the
the effect applied to effect applied to duration of the effect
each object. each object. applied to each object. C
Clips, organization
Organization charts Text charts, and text D
UnloadMode
parameter to a non- UnloadMode parameter
Cancel parameter to 0 zero value to a zero value A
False A
True B
writing programs in
multitasking multiple languages none of the previous A
the ability to run 2 or
more programs writing programs in
concurrently multiple languages none of the previous D
false A
false A
false A
password protected
document can be
opened without
password as read password are not password can be upto 15
only case sensitive characters long B
justified hanging top A
a document file can a multiple an .xls data can not be
be inserted in the documents files can inserted at specified
current document at be inserted in the position in the current
specified position single document document B
false A
false A
false B
false A
send private
send pictures to a messages to a send a package to a
friend friend friend D
A grid is a set of
A dropped cap is a horizontal and vertical
A pull quote is a word that starts with lines that determine the
quotation taken from a lowercase letter placement of elements
(pulled) from another when it should have in a newsletter or other
document. a capital letter. document. D
10 12 72 D
FALSE A
FALSE A
False A
False A
Maintenance
diagnostic program Systems logs Parity check C
It is mandatory in
To fill the log register tally None of the bove A
prevent
speed up access unauthorised access allow encryption C
IT management lacks IT understands the
leadership. business None of the above B
Software that
generates innovated
Using computers to do designs and artistic
architecture. patterns. None of the above A
Application Service
Provider enterprise local B
ensure the filename is
not lost identify the file identify the file type D
All of the above are
detective controls. corrective controls. parts of IS controls. D
static hashing dynamic hashing extensible hashing A
Ask the person next to Use the Find or Put your hand up and
you. Search feature. ask the teacher C
Data communications
hardware and Operating systems
software. and compilers. Computer operations. C
A sequential file on a A direct access file A direct access file on a
tape on a disk tape C
Information formats
commonly vary
between Data record can never
Parity errors will result architectures be blocked together C
Address calculation
Control Unit part Input output channel A
An intelligent
workstation A personal computer A mainframe PC B
Lexical analysis,
Implementation and CONVERSION, and
documentation code generation None of the above D
It is less prone to
It is less error prone attenuation Uses only one path D
Data management
Data Mining tools systems All of them B
secondary storage secondary storage
memory access time capacity access time B
writing programs in
multitasking multiple languages none of the previous A
The ability to run 2 or
more programs writing programs in
concurrently multiple languages none of the previous B
To run more than
one program at the
an operating system same time none of the above C
Second - generation Third - generation Fifth - generation
computers. computers. computers. A
multiprogramming Multi-user none of the previous A
Deep Blue Param Arjun C
is due to bad disk
caused by overuse blocks none of the previous C
Magnetic Ink
Character
Optical Mark Reader Recognition Image Scanning
Technology Technology Technology B
LAN and WAN LAN and MAN LAN WAN and MAN B
ATM Internet Intranet A