cs online test sify 1500 questions mcq

of 110/110
QUESTIONS A B C D ANS TALLY The ------ key can be used to select an existing company from list of companies. F1 ALT+F1 CTRL+F1 None of the above A Import and Export of data between Tally and other programs is possible only through ---------- Program. Tally ODBC Tally IMP Tally INI None of the above A The re-order point is the inventory quantity that trigger a stock replishment activity. TRUE false A A created company's detail can be modified through keys F3 ALT+F3 CTRL+F3 None of the above B A/An ------------- is the official notice that the firm sends to its customers to advise then to the amount of money that is owed. Invoice Bill A or B None of the above C In tally,all masters have ________main options Two Three Four Five B In tally,to create a new column in balance sheet press _______ Ctrl+C Alt+C Alt+Ctrl+C None of the above B In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger accounts into one line statements TRUE FALSE A In tally, we can alter ledger details using either single or multiple modes but not alble to delete a ledger from multiple modes. TRUE FALSE A In tally,a group company is marked with an ______________ * $ & ^ A The systems that work together to order,receive, and pay for replenishment of stock are --------------- Puchasing and Accounts payable Puchasing and Receiving Accounts payable and Receiving Puchasing, Receiving and Accounts payable D Tally allows to delete a ledger from --------- alteration mode. Single Multiple A or B Mone of the above A --------------------- is/are useful for management in the decision making. Cash Flow Statements Fund Flow Statements Ratio Analysis All of the above D In tally,the group company must contain at least _____________ members Two Three Four One A To cancel a vourcher entry in Tally, short-cut key is ------- ---- Alt+D Alt+X Ctrl+T Ctrl+D B 1

Post on 28-Oct-2014

32.482 views

Category:

Documents

2 download

Embed Size (px)

DESCRIPTION

Contains 1500 MCQ questions that will help students of ICSI to prepare for the CS Online Test conducted by Sify

TRANSCRIPT

OPTIONS QUESTIONS TALLY The ------ key can be used to select an existing company from list of companies. Import and Export of data between Tally and other programs is possible only through ---------- Program. The re-order point is the inventory quantity that trigger a stock replishment activity. A created company's detail can be modified through keys A/An ------------- is the official notice that the firm sends to its customers to advise then to the amount of money that is owed. In tally,all masters have ________main options In tally,to create a new column in balance sheet press _______ In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger accounts into one line statements In tally, we can alter ledger details using either single or multiple modes but not alble to delete a ledger from multiple modes. In tally,a group company is marked with an ______________ A B C D ANS

F1 Tally ODBC TRUE F3

ALT+F1 Tally IMP false ALT+F3

CTRL+F1 Tally INI

None of the above None of the above

A A A

CTRL+F3

None of the above

B

Invoice Two Ctrl+C

Bill Three Alt+C

A or B Four Alt+Ctrl+C

None of the above Five None of the above

C B B

TRUE

FALSE

A

TRUE *

FALSE $ & Accounts payable and Receiving A or B Ratio Analysis Four Ctrl+T ^ Puchasing, Receiving and Accounts payable Mone of the above All of the above One Ctrl+D

A A

Puchasing and The systems that work together to order,receive, and Accounts pay for replenishment of stock are --------------payable Tally allows to delete a ledger from --------- alteration mode. Single --------------------- is/are useful for management in the Cash Flow decision making. Statements In tally,the group company must contain at least _____________ members Two To cancel a vourcher entry in Tally, short-cut key is ---------Alt+D

Puchasing and Receiving Multiple Fund Flow Statements Three Alt+X

D A D A B

1

The accounting masters and inventory masters related to We press ------------- function key to display the age-wise analysis of Bills Receivable or Bills Payable report In Tally, we press ------------, to print report . In Tally, Types of Accounts and Types of Vouchers passed during the period, can be seen in ------------report. In the Tally Software, the ------------ directory stores all data entered by the user. The Ledger Accounts are unique in Financial Accounting Packages Customers can be permitted to enter their own data into the firms computer using the firms wide area network is an example of In Tally, we can customize the Vouchers as per our requirements The number of steps in Accounts Compilation are Each action/transaction of a firm is described by a ---------------. Tally is based on mercantile accounting system

Create Information

Display Alter Information Information

All of the above

D

F4 Alt+P

F5 Ctrl+P

F6 Shift+P

F7 None of the above

C A

Tally Audit Bin True Enterprise Data Interchange TRUE 2 data element FALSE

Statistics Data False

Day Book Sub

Journal Book None of the above

B B A

Enterprise Data - Electronic Data Information All of the above Interchange. FALSE 3 data record TRUE Field 4 All of the above

C A 5C B B

Ctrl + N is used to ----------------------- in Tally classify the accounts under different heads so that summarised information is possible. Revenue Account also known as -------------- Account Method of Voucher Numbering is/are

Open Display stock valuation method Calculator

Change Period

None of the above

B

Ledgers Personal Manual

Groups Nominal Automatic Profit & Loss Stock Journal

Journals Real None Journal Book Physical Stock Transfer

None of the above None of the above All of the above All of the above Reversing Journal

B B D A B

Accounts Receivable are displayed in Balance Sheet To assemble a product from different items -------------entry is used Journal

2

A --------- purchase orders data flow is directed to the purchasing system for use in closing out the outstanding purchase orders in the receiving system diagram. Filled Tally provides at least --------- predefined voucher formats The value of the inventory is included in a ledger accounts as an asset on the balance sheet " The buyers can follow up with the suppliers to determine the reasons " is an example of ----------------From voucher entry mode , if we press __________ then we get payment voucher in tally FALSE

Receipt 11 TRUE 16

Issue 18

None of the above

A 21 B B

management by management objective by exception F4 F5 Primary

electronic data analysis F6 Primary Cost Category

All of the above Alt+f5 All of the above

B B C

Default Cost Category in Tally is/are -------------Main Location A Group Company is simply a name and an identify given to the merged accounts member companies of the group. True A ----------- is a primary document for recording all financial transactions. Ledgers The field can have a value between ________________ in FA Package. 0 to 9 The _______ file maintains data that describes the supplier past transaction with the firm in terms of material quality in AIS Supplier It is necessary to manipulate data to transform it into --------------Report In tally, to change the date of the voucher press ______ F2 Tally can maintain budgets on ---------------Net Transactions The value of the inventory is included as an asset on the balance sheet True In ratio analysis report of Tally FA packagewe we press ________________ function key to the display of bills receivable , bills payables report F6 function key

False Reports 1 to 100 Vouchers 10 to 60 None of the above None

A C A

Suspense Output F4

Order Information Ctrl+f2

All of the above None of the above Ctrl+f4 None of the above

A C A C A

Closing Balance A and B False Alt + f6 function key F7 function key

None of the above

A

3

The accounts payable system is responsible for paying the suppliers for the ----------------Sales What is the default financial year in Tally6.3 1-4-1995 to 31-3_________________ 1996 Tally encrypts and stores TALLY DATA at the data directory True The Profit & Loss statement can be displayed in --------------- format(s). Horizontal Balance sheet & profit & loss profit & loss and trial Default ledger accounts in tally are ______ balance Default 'godown' name in tally is ____________ 'Tally vault' is a _________________ To create a sales voucher in tally , you have to press _______ A Group Company is ------------------------- given to the merged accounts of member companies of the group. In tally,"credit note" voucher type records entry for ________________ In tally you get currency symbol option from _______ menu ------------------ gives the balance for each day for the voucher type has been selected. For 'stock journal' entry we press ______________ in tally Primary Security mechanism F5

A or B None of the above Purchases 1-4-1996 to 31- 1-4-1997 to 31-31998 None of the above 3-1997 False Vertical A or B None of the above

B B A C

Profit & loss and Cash and profit trial balance Cash and bank & loss Main location Ledger a/c F7 A or b Cost category F8 None of the above None of the above F9

C B A C

a name Sales return Company creation Trial Balance

an identity

A and B

None of the above

C A A B B

Purchase return a or b None of the above Stock items units Regional setting None of the above Daybook Balance Sheet None of the above

F7 F10 F11 Alt + F7 Changes in Tally provides the capability to the administrator/auditor transactions or Changes in to track changes in the areas is/are vouchers Ledger Masters Both A and B None of the above In tally, types of users are _______________ 2 4 3 By pressing -------- key, a list of inventory reports can be displayed straightaway from the balace sheet report F9

C 1B

F10

F11

F12

A

4

Projected approximation of income or expenses is called ______________ . "Administrator" type user is also called 'Auditor' of a company in Tally You will get company information , if you press __________ from gateway of tally A constituent(member) company can be a member of more than one group. Default stock category in tally is ______ To create a log of the import activity in a file _____________ is located in the same directory as an executable program in tally In Tally,inventory valuation method option is available from _______ Tally audit feature is available in a company __________________ In tally, a group company can also be a constituent(member) of another group company Default number of groups in tally are ________ During voucher entry ------------- are used. User designated as --------------- can view audit list.

Balance sheet TRUE F3 TRUE Main location

Profit & loss a/c Budget FALSE Ctrl+F3 FALSE Primary Alt+F3

None

C A

None of the above

C A B

Symbol

None of them

Tally.imp

Tally.ini

A or b Stock analysis In 'comp info -> security control' option

None None of the above

A A

Stock summary Stock journal During the By pressing F11 creation of a function key company TRUE 128 Ledger Accounts Administrator One company to another company created withon Tally Package Inventory subsidiary. Groups Owner FALSE 228

None

B A 16 C

28 Sub-Groups Data Entry B or C TallyVault

A A

Tally supports Importing of data from ---------------In an accounting information system, which of the following types of computer files most likely would be a master file?

Other programs a spreadsheet or a database file. Both A and B

None of the above

C

Cash disbursements. Cash receipts. Will be more Does not require Will produce a efficient at Which of the following is an advantage of a computeras stringent a set more accurate producing based system for transaction processing over a manual of internal set of financial financial system? A computer-based system: controls. statements. statements.

Payroll transactions. Eliminates the need to reconcile control accounts and subsidiary ledgers.

A

C

5

The memory address register is used to store FUNDAMENTALS OF COMPUTER

data to be transferred to memory

the address of data that has been transferred a memory from memory location

an instruction that has been transferred from memory C

Inefficient usage of excess computer equipment can be Contingency controlled by Planning Which of the following is not the component of a CPU NIC Card

Capacity System feasibility report Planning VSAT RAM

Exception reporting AGP Card

C B

A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The following is an information not found in the trailer label Record Count

Hard copy is a term used to describe...? What do the abbreviations VAB stand for

Control totals for one or more fields Storing Writing on a hard information on board Printed output the hard disk Visual audio Voice activated Voice answer broadcasting back board Identification Number Boundary protection Pixels Identification number Storage device Physical Security File protection ring Pixies Reel Number Pointing device Console Log

End-of-file and end-ofreel code B

None of above None of above

B C

What control would prevent the accidental erasure of customer information from a magnetic tape Validity check What are the individual dots which make up a picture on the monitor screen called? Coloured spots Header label normally include all the following except the File Name A daisy wheel is a type of...? Which approach or technique is a control usually associated with microcomputers Printer System Logs Electrically charged ink

Limited access files None of above Batch Total None of above Data Dictionary

C B D A B

An impact printer creates characters by using...? The best security control in a microcomputer environment is to

An ink pen Use only Restrict unremovable physical access media

An inked ribbon and print head None of above Require user passwords Make duplicate copies of files

C

A

6

What would you NOT use with a flatbed plotter? What do you need for an ink jet printer? The greatest control exposure in a microcomputer environment is the lack of

A pen A cartridge Separation of duties

Paper A drum Centralised function for PC acquisition A laser beam Size Write PAN drive

Eraser A ribbon Centralised function for PC Disposition

None of above A cassette

C A

Distributed policies or procedures A C C B A

A laser printer does NOT use? A print head The amount of data that a disk may contain is known as the disks...? Volume You can ________ protect a floppy disk. Information on a hard disk is usually backed-up using a...? Read Magnetic tape Serial access medium 1.44MB A CD-ROM A CD-ROM By a sunny window ROM chips RAM chips ALU CPUs 0 bits RAM chips

An INK RIBBON None of above Storage None of above capacity Read and Write Floppy disk None of above None of above

Magnetic tape is a...? Hard disks can have a storage capacity in the region of...? Which storage device has the largest capacity in Mb? Which storage device cannot be erased? Where should floppy disks be stored? The contents of these chips are lost when the computer is switched off? What are responsible for storing permanent data and instructions? Which parts of the computer perform arithmetic calculations? What are small high speed memory units used for storing temporary results? How many bits of information can each memory cell in a computer chip hold? What type of computer chips are said to be volatile?

Random access A parallel access medium medium None of above 20 GB A floppy disk A floppy disk By magnet objects RAM chips ROM chips Registers Registers 1 bit ROM chips 700MB Magnetic tape storage Magnetic tape storage In a drawer CDROM chips DRAM chips Logic bus Control unit 8 bits CACHE None of above None of above None of above None of above None of above None of above None of above None of above None of above None of above

A B C A C B B A B B A

7

Systems Network software software and application and security Software can be divided into two areas: software software Personal Travel agents use this computer system when reserving flights Supercomputer computer Which computers are used in the weather forecasting industry? Vacuum tube based electronic computers are...? Which generation of computer was developed from microchips? Which generation of computer uses more than one microprocessor? Which generation of computer developed using integrated circuits? Which generation of computer developed using solid state components? DATABASES Specification, Name three steps involved in developing an information Design, and system Testing _______ is used for CAAT as database Oracle Generalized audit software perform auditors to undertake any past records and not concurrent auditing Generalized audit software is a file whose capabilities for verifying processing is logic CAAT's are computer program and data that auditor uses as part of the audit procedures to process data if audit significance contained in an entity information system

Business software and games software Mainframe computer Jon Von Supercomputer Neumann Notebook computers computers s Second Hoover generation First generation generation Fourth Second generation First generation generation Second generation Third generation Fifth generation Second Third generation Fifth generation generation Second Third generation Fifth generation generation

None of the above None of above

B B

None of above None of above None of above None of above None of above None of above

B A C C B A

Programming, Design, and Testing ACL

Analysis, System Design, and Implementation None of above JCL none the above

A A

TRUE TRUE

FALSE FALSE

A B

TRUE

FALSE

A

8

CAAT do not contains package programs, purpose written program, utility programs or system management programs Embedded audit routines are sometimes built into an entity's computer system to provide data for later user by the auditor SCARF involves embedding audit software modules within an application system to provide continuous monitoring Concurrent use auditors as the member of the system Regular cross system verification may minimize frauds Computer security is frequently associated with confidentiality, integrity and authentication Data reserve engineering process metadata to document system and abstract business rules and relationship

yes

no

B

TRUE

FALSE

A

TRUE TRUE true true false false false

FALSE

A A A A

The first step for developing CAAT is_________ Using the open database connectivity feature in ACL is ______________ Computer Assisted Audited Technique involves the use of computers through "Black Box Approach" True White Box Approach necessary involves expert knowledge on the part of Auditor True change in the method of recording The transition from manual system to CIS environment accounting bring dramatic changes including ________________ transaction

false review and to determine the evaluate the audit objective types of data can bring the can bring the data indirectly data directly true False False

A to obtain a record layout all the above

extract data from file none of the above

A A B A

use of accounting codes

absence of audit trails all the above

D

Auditing with computer necessarily supports the

risk driven documents driven approach approach

unique approach none of the above

B

9

hardware and software CAAT involves an Auditors' appreciation of __________ configuration Widespread end use computing result in unlimited errors creeping into system going to accept handling, thereby increasing audit risks true For computerized auditing usage of sophisticated audit software would be a necessity true

processing options, file data checks and structure controls

all the above

D

false false

A A

Important knowledge needed to begin planning the use of CAAT is _________ The move towards paperless EDI would eliminate much of the traditional audit trail, radically changing the nature of audit evidence true

the source of data available to source of data the audit for material planing organization

all the above

none of these

A

Computer operation controls are designed to provide ________________ Systems development control, apart from others, include authorization, approval, testing, implementation and documentation of new systems software and system software modification A system could be _________ A system exhibits 'entropy'

the of by all concerned

false providing access to computer to all organization personnel

A

use of any programs

none of the above

D

true natural/manmade true

false open/closed false conceptual/physi cal all of them

A D A

Super computer are the largest and fastest and is very suitable for commercial application including audit work true Assembler language uses Mnemonic symbols true

Operating systems are devised to optimize the machine capabilities, the function include_______________ scheduled jobs

false false manage hardware & software resources

A A enable multiple user resource sharing

all the above

D

10

General purpose software provides a framework for highly complex scientific operation In batch processing, transactions are processed one after another The use of computer assisted audit techniques is not gaining popularity not only ________________ On-line processing refers to grouping of transaction and processing the same in one go from start to finish Real time refers to the technique of updating files with transaction data immediately after the occurrence of the event to which it relates In OLRT the CPU should process the capability of program interruption Time sharing system allow access to a CPU from remote terminals DSS is defined as a system that provides tools to managers to assist them in solving structured problems DSS has the following components _________________ Master files contains current records for identification and summarizing Transaction files contain relatively permanent records take product profile, customer profile, employee profile etc

true true with audit departments

false false with production departments

B B all the above none of these A

true

false

A

true true true

false false false

A A A

true databases true

false planning language false

B model base all the above D B

true

false table files report files none of the above

B D

Master file configuration includes ____________ reference files ______ is a file management software package that lets users and programmers organize data into files and then process those files filex to have a complete picture of a CAATS provide added value to the clients because _______________ system File volatility refers to the number of addition and deletions to the file in a given period of time true

file-o-man decentralized picture of a system false

file manager

filepet

C

all the above

none of the above

A A

11

File activity is the proportion of transaction file records that are actually used and accessed in a given processing run: true File interrogation refers to the _____ of information from a file back-ups One -to-one relationship means a single entity to a single entity in a monogamous structure true RDBMS is structured to a series of 2 dimensional tables true

false retrieval false false software and database deletion addition

B B A A

SADB stands for ____________

seriously affected subject area database database

safety and database

B

Controls are present over many aspects of the computer system and its surrounding social environment true In framed checking the data entry is checked against an expected picture or format true Errors are correlated_________ Field check is exclusive to a field _________ law basically states that there is a specific probability of the first digit of a no. being 1,2,3 etc Check digit is a group of nos. added to a code for determining the accuracy of other digits in the code at the year end true

false false immediately false on quarterly basis none of the above

A B B A

Benfish true

Benford

Benjamin

none of the above

B B

Hierarchical code means _________ The validation checks applied to a field depend on the field's logical inter relationships with other fields in the record The contents of a field could determine _______ sign for a ______ field Batch is the process of ______ together _____ that bear some type of relationship to one another Hash totals means meaningless totals

false blocks of nos. to consecutive nos. the primary random or alphabets to attribute of the placement of entities the entity component

none of the above

D

TRUE valid, numeric grouping, transaction true

false invalid, alphabetic regrouping, events false

A none of the above none of the above all the above all the above A A A

12

With OLRT where interactive data entry is available, the master file associated with a transaction may be searched for confirming data true Controls are required for authorization to ensure data integrity and detect possible breaches in security Data from client application are not stored in the organization's database through auditables events and function All input records in a batch are normally of different types

false

A

true

false

A

true true incremental design and enlarge activity true true

false false interactive data interactive data extraction and innumerable analysis analysis false false

B B

IDEA stands for _________________________________ A transaction file is sorted prior to the update of master file A sequence check on the transaction or master files by an update program is not required

none of the above

B A A

Whenever monetary transactions are processed against master files, the update program should maintain a correlation account to record such transaction that does not have a matching master file record true Internal tables are stored tables from which certain values are extracted for further processing and storing For small to medium sized systems, individual modules are coded and individually tested and then assembled to be tested as a whole-the testing strategy is referred to as ___________________ In systems testing, test involves_________________ Recording transactions in a controlled manner may amount to loss of stored data

false

B

true

false

A

e-brain bottom up tests yes

bouncing ball top-down tests no

big-bang hybrid tests

stub all the above

C D B

13

Audit software is used by the auditor to _________ Core image comparison is a software used by the auditor to compare _______ version of a program with a executables, secure ________ copy master Database analyzer is a software which provides detailed information concerning the operation of the database true

read data on client's file

provide information to the audit

re-perform procedures carried out by the clients programs

all the above

D

deleted, hard

none of these

all the above

A

SAS stands for ______________ Embedded code is a software used by the auditor to examine backup data

false system system analysis advanced software software true false no false false

A

all the above

none of the above

A B A A B

Embedded code performs wide variety of audit task yes Core image comparison is particularly useful where only executable versions are distributed true Log analysis is a software used by auditor to detect virus On line testing techniques the auditor ______ data either _______ or fictitious in order to see that a specific program or sever edit test is doing its work Mapping software is used by the auditor to list unused program instructions Mapping software has very objectives true manipulates, real true yes

create, false false no can enable the auditor to execute provisions on a number of different bases no

none of these

all the above

A A A

Modeling is a variety of software which ________________ On line testing can be targeted for specific functions carried out by programs

can be very powerful analytical tool yes

can provide the auditors with useful information with trend s and patterns all of the above

D A

14

Program code analysis involves _____________ __________ is a software of CAAT Snapshot is software which takes a picture of a file or data or a transaction passing though the system

identifies program code which may be provides detailed there for information of fraudulent machine uses reason IDEA ACL true fictitious data applied against the client program true true false comparison of source version of a programmed false false

examination of source code of a program with advice to following the logic of a none of the above program ALC ACLL

C B A

Base case system evaluation includes____________ While base testing forces on finding if there are any defective execution policies in a program Black box testing seeks to determine whether application output is what it is supposed to be In integrated test facility approach the auditor should ensure that the impact of test transaction is subsequently eliminated from the computer files Black box testing is _______ based and white box testing is _______ based

analyzing the picture of a file or data

all the above

A A A

true specification, program

false file, hardware none of the above all the above

A A

identifying Source code review means__________ erroneous code In formula in flow hypothesis the auditor should expand the extent of substantive tests to determine how the defects may impact the attainment of the program objectives true All material application oriented events that occur within the boundary subsystem should be recorded in the accounting audit trail true

identifying identifying nonineffective code standard code

all the above

D

false

A

false

A

15

In examination of audit trail the following data associated with an event may be ___________-

start and finish time job control language yes

authentication of information resource support requested job connectivity language all the above no

all the above

D

JCL means_________________ Audit should be periodically analyzed to detect any control weakness of the system

none of the above

A A

In an accounting audit trail, intrusion detection system might monitor the amount of processor time consumed by the user to detect unusual deviation from the amount processor time requested by the user in the past true A sample size calculator program assists auditors in determining RAND() function true package computer p[program for performing a variety of data processing function

false false

A B

Generalized audit software consists ___________

mathematical concept

Specializes audit program may be___________ Generalised audit software could be used by the following in consistencies or significant fluctuations

prepared by the auditor

master list of transactions prepared by an outside programmer prepared by the engaged by the entity auditor

administered questionnaire

A

all the above

D A

Generalized audit software function include____________ In the file reorganization merging capabilities are needed in data from separate file is to be combined on a separate work file true

false true file stratification and access/organizati statistical/arithm frequency ons etic operation analysis all the above

D

false

B

16

Auditors cannot use generalised audit software to extract the data needed for audit purpose Auditors can combine functional capabilities of generalized audit software to accomplish the task of __________________

Which of the following is not the feature of GAPs Which is the example of CAATs

true examining the quality of system process Wide access to various data base ACL A sample of transactions Tests of details of transactions Macros integer true actions report macro calculator

false carrying examining the analytical review quality of data

B

all the above

D

Can define the audit Can extract and Can aid in analyse data simple selection objectives D IDEA High End CAATs A special A utility software purpose written programme program Compliance Analytical review tests of general procedures EDP controls Action Event Procedures Procedures number false events form expression elements code builder All of the above D

In audit procedures, test data is

None of the above

A

Which of the following is not the use of CAATs Which of the following are called explicitly by another procedure? _________ data type is generally used for fields assigned as primary keys in a table MS access objects can be published in the web In code-builder, got_focuse, click,dbl_click,enter are examples of _______ _______can be used to automate certain actions in response to events In the macro sheet the macro is selected in the _____field To build complex expressions_____is used The three list boxes present at the bottom of the expression builder are called_____ ________option is selected from the view menu to create macros with conditions

All of the above

D

General Procedures D D A B D D

primary number auto number

procedures chart comments expression builder expression elements list box insert auto report

none of the above macros action

expression elements C

action list conditions

macro list action columnar

none of the above none of the above embedded

C A C

_______report can be created with minimum user input tabular

17

_______layout of a form displays one record at a time

tabular

columnar

datasheet

justified

B

The table or query name on which we are going to build our report is selected from the ____ dialogue box create report columnar and ______and_____are the two types of auto reports available tabular There are no wizards for creating a database in access ______option from the insert menu option is chosen to add an embedded chart In ms-access, while using SQL, references constraint is used for creating _______ _______is used to create a mailing label ______header is present at the beginning of the report true create fields primary key label wizard start header

link report stable and unstable false add chart alternate key chart wizard group header page footer

embedded report new report dynamic and static none of the above

D A B

chart foreign key mail wizard page header group footer

insert chart none of the above none of the above report header none of the above

C C A D B

______is present at the bottom of each page in a report report footer

In SQL, having clause is used for _________ ______field is added to the macro sheet when we select grouping option from the view menu ______can be used to create toolbars _______query is used to add records from one or more tables into an existing table _______window is used to write VB code in access application Values for other tables, queries are maintained in look up fields data type Visual Basic language is a _____ tool ______ function is used to display a message box Other ms-office applications can be accessed from msaccess using a concept called ________

for ordering records condition VB Modules add report true RAD SysCmd OLE

for updating records group reports append macro sheet false RAP MsgBox DDE

for specifying conditions with group by none of the above clause macro names forms insert module none of the above macros delete none of the above

C C D B C A A B A

RAID message CME

none of the above none of the above none of the above

18

OLE stands for_____ The application that supplies data in OLE is called an _________ If any change made on the object from the client side is reflected on the server then the object is said to be _____ _______is the file format that works on internet ______ is used to convert any ms-access object into html format _______ option in publish to web wizard produces a page that is static in nature _______query is used to create or change database objects in a current database Currency fields express the amount in _________ _______is selected from the toolbar to add an OLE object To display an OLE object in the form of an icon ____ option is selected from insert object dialogue box _______option from the file menu is selected to run 'publish to the web wizard' _____page in an web application is used to navigate to the rest of the pages in the application ______ is fired when an event is triggered is the concept based on a Visual Basic language Ms access is a ___________ A collection of data stored in different objects is known as a _________

object linking on line and embedding execution OLE object OLE client

on line editing OLE server

none of the above OLE communicator

A C

linked exe form wizard static file append dollars unbound object display as icon create html startup bullet DBMS data group

embedded DLL report wizard static html add rupees bound object display new home command RDBMS

connected BMP query wizard dynamic file insert pesos

edited html publish to web wizard none of the above data definition yen

A D D B D A B A C B C A C

command button list box link save as html end procedure front end create icon none of the above none of the above none of the above language data storage

A blank database can be created using __________ Text type data can be of _____ characters in ACCESS ______is a datatype that assigns values automatically Tables cannot be imported from other databases

data collection database new blank database dialog new database dialog box new dialog box box 255 automatic number true 64000 AutoNumber false number 235

database dialog box

A

63500 A automatic field B B

19

If two tables having same values for the fields are joined it is called an ______ inner join Duplication of records in a field won't be allowed if the fields are declared a________ primary key Changes from a master table can be reflected on to the cascade delete child table by selecting _____option related records To see more than one record at a time in a form we use _______ columnar In SQL, delete command is used to remove _________ In MS-Access, filter excluding selection will display only those record(s) which meet the criteria. Properties of the fields are managed by _____ in Dynaset ______queries allows us to view data in row by column manner The type of queries that can update or delete record(s) in a table(s) are called __________ Joining tables without any matching values in the fields is called ____________ Primary key uniquely identifies each record Which of the following dialog box is/are used in the creation of form ________ _______ query wizards are used to generate summary calculations for a table Properties of a form can be changed by selecting ______from view menu options Forms that are included in other forms are called ______________ In MS-Access, while using form design view, for creating a command button for adding a new record, we should select the _______ category from the command button wizard _______ form displays fields in a single horizontal row table or tables true property field crosstab queries action queries inner join true new form dialog box summary change properties included form

outer join not null

explicit join candidate key

none of the above no duplicate key

A A

cascade change cascade update change all related related records related fields records both a and b record or query or queries records tabular false field property row/column queries row/column queries self join false form create dialog box sum properties sub form Dynaset field properties select queries change/delete queries no match join form wizard dialog append form properties new form properties update queries update queries outer join none of the above none of the above

C B C B B A A D A D D B B

both 1 and 3 simple new properties child form

Record Navigation columnar form

Record Operations tabular form

Form Operations None of the above hierarchical form one to many form

B B

20

The process of arranging the data in a meaningful order is known as ___________ filtering ______ are used to select only some particular records from the table or any other database objects filter In MS-Access, user may specify criteria for filter in form view using _________ filter by form ___wildcard character represents any single character Records cannot be sorted by a primary key A control without a data source is known as ___________ Set of related option buttons, check boxes and toggle buttons is known as _____________ * true bound control button group

ordering

sorting

querying

C

sorts filter by selection $ false unbound control option group unbound TODAY() list box columnar form filter by input

pipes filter by menu @

gateways None of the above ?

A A D B B B C C B A C

data less control data control controls group controlled DATE() combo box tabular form filter by form option control wizard record group all of the above DAY() static text main form none of the above

Which of the following is control types ____________ bound In MS-Access, the function that gives the current date is _____________ CURRDATE() _____is a control that lists set of data text box ______is a form that summarize large amount of data ______allows to create a filter by typing the value in a data sheet pivot table data sheet filter

Wizards for toolbox controls are called a __________ The wild card representation for any 5 letter word that starts with ram is ________________ Look up fields slow up data entry ____is an access object that displays un-editable data _____option from the new object toolbar gives the easiest way of generating a report ______ represents data in a pictorial format Changes of one table can be carried over to another related table

button wizard ram* true report autoreport chart true

control wizard ram?? false form report label false

tool wizard

C B B A A A A

two of the above none of the above

table module bitmap

ledger none of the above report

21

Hyperlinks are used to jump to any kind of information or data from a file The memo field can have text upto_____ characters in length In MS-Access, columnar layout can be used to view multiple records in a form In MS-Access, alter command may be used in adding a primary key to a table Update query is used to add records from one or more tables to the end of an existing table In ms-access, datasheet view is available in ___________ ______are used to jump to any kind of information from a datasheet or a form Home page will always be present as a first page of an application Make table queries create a new table from the records of another table In ms-access, to protect a database file from illegal access, we may set database password. The option of setting database password is available in _______ menu Foreign key is a field that uniquely identifies each record and accept no null values Data definition queries are used to create or change database objects The attributes of a composite key are known as ________ OLE object is a data type in access Data displayed in forms cannot be edited A sub form is used to display one to many relationship between tables We can switch from datasheet view to form view by selecting view -> form view option In MS-Access long integer is a datatype

true 60,000 true true true table table true true

false 255 false false false query form false false form report all of the above hyperlink 25,000

A 64,000 D B A B D D A A

Insert true true alternate keys true true true true true

Records false false

Tools

none of the above

C B A C A B A A B

composite keys candidate keys primary key false false false false false

22

In MS-Access, while designing a table for a particular field, the Required parameter is set to yes. This validates the field as _______ Sorting is applied to select only some particular records Filter by form can be created from a forms shortcut menu Advanced filter uses a filter similar to the query design window to create a filter ? Wildcard character represents any number of characters _________ of the following is/are a type of chart A bound control is tied to a underlying query or table A calculated control uses expression as a source of data Text boxes cannot be bound controls The default query invoked by ms-access is A control can be bind to a record using row source property List box is a control that offers a list of choices If a table is joined to itself it is called a ________________ A picture box combines the activities of both a text box or a list box Line is a tool box control Text boxes can be part of a option group _____ chart exists as a separate object Filtering data is a way of arranging data in a meaning full order Wild card characters are used for sorting records Pivot tables are used to navigate to the other tables in a database Reports are used to represent un-editable data In MS -Access, the records in a table are sorted based on _________ Relationship is an association between _________

null true true true true pie true true true update query true true inner join true true true freestanding true true true true the first field of the table forms

not null false false false false bar false false false select query false false outer join false false false embedded false false false false the last field of the table reports

zero

none of the above

B B B A B C A A B B B A

both 1 and 2

none of the above

delete query

append query

self join

table join

C B A B D B B B A

stand alone

sub chart

primary key field none of the above attributes entities

C D

23

Summary options dialog box is used to summarize data ______ queries can be used to delete a group of records that meet some specific records Charts can convert numerical data in a easily understandable format Embedded charts exist separately

true delete true true

false insert false false use datasheet in forms use export append add

A A A B

From ms - access, if we want to view the records stored in a table in ms - excel worksheet, we need to use hyperlink Page header is present at the beginning of each record Detail section has a header and footer A macro is performed only when the user initiates an event The macro is selected from the action field of a macro sheet A macro can be made to execute before the starting of a database In MS-Access. While appending records, the source and the target table must have similar structure and fields We can add our own functions to the expression elements list box of the expression builder _______is the wildcard character which represents the presence of any number of characters Macros can be used to add a menu to a database object _____ header is a unique feature of reports Chart can either be a form or a report Group header will be present at the design view of a report even if the report is not grouped We can change from the design view to the form view without being prompted for saving the changes made Charts can be produced without the wizard true true true true true

use import false false false false false

D B B B A A

true true & true page true true

false false # false detail false false ? *

A A D A C A B

group

topic

true true

false false

A B

24

Macros can be used to create user defined error messages Between and Not Between is ______ type of operators The default data type of VB is integer

true relational true

false list false range logical

A C B

Visual Basic is based on __________ action language _______is the name of the database object that displays data and can be used to edit data report In access OLE objects cannot be linked true _____ section is present for each record in the report A ________ sheet lists all the properties that pertain to the form or the controls Textboxes can also be an example of unbound control In MS-Access, we may design command buttons for navigating records _______are forms that are included in other forms _______ are used to represent our data in graphical format A field with a _______ uniquely identifies each record Large amount of data can be summarized using ______ tables _______ are employed to select only some particular records from a database object ______ control need not have a data source ______ control combines the functionality of both a text box and a drop down list MS access is a DBMS A form can be bind to a record source using _____ property of the form ______ forms displays field in single row group data true true sub forms graphs number pivot filters form list box true form name tabular form

event structured query procedural language based language none of the above form false record property false false child forms chart primary key create queries bound combo box false control chart form query table

C B B D B A A A B B A A C B A C A

session both a and b

detail none of the above

inner form labels index form sorts unbound button

none of the above report identifier none of the above forms none of the above option button

record source data sheet form

none of the above none of the above

25

______ forms are usually used for tables with one to many relationship _______ control uses an expression as a source of control _______ control is tied to field _______is the form that can be created with minimum input from the user ______option from the tool menu is selected for setting relationships between tables ______,______and_____are the buttons belonging to the options group _________allows us to create a filter from a field short cut menu ________is a database object which displays data but cannot be used to edit data What term applies to a collection of related records in a database? All of the following terms are related to computerized databases except which one?

sub forms calculated calculated sub form set relation option, toggle and command buttons filter by form form clipboard search A way to analyse and manipulate numerical information

tabular form bound unbound auto form connect command button, check and list boxes filter by report report file sort

columnar form unbound bound tabular form relationships list, check and combo boxes filter by record macro field field names An organised way of storing information about a set of similar things A document which contains text

none of the above none of the above static columnar form none of the above option button, toggle button and check boxes filter by input table layout record grab

A A C B C

D D B B D

What is a database?

What does a record contain? An RDBMS is a

A tool to produce high quality documents It contains all the data about Information about one specific certain programs item remote DBMS storing data offline at a separate site relative DBMS backing up data regularly Computer sequence checks

A way of maintaining a log C

A collection of files

B C

Relational DBMS Reliable DBMS is related to data uses tape as mining opposed to disk Computer matching Database access controls

Data Warehousing refers to Unauthorised alteration of on-line records can be prevented by employing

C

Key verification

D

26

What is a report?

Reports allow users to extract information as hard copy (printed output)

Reports provide a very flexible way of creating and editing documents

A tool which allows text and graphics to be placed in documents

None of the above

A

What is the best way to analyse and change data

Extracting and analysing data

Spreadsheets make data easy to analyse Using queries

None of the above

C

What are some popular office orientated software applications?

Which of the following constraints can be used to enforce the uniqueness of rows in a table? Which of the following commands is used to change the structure of table? CHANGE TABLE MODIFY TABLE ALTER TABLE You are creating a client application that calls ActiveX DLLs. Which of the following properties of the Err object provides the name of a component that sends an error back to the client application? Number Description Component keeping the This database holds personal information. The user can keeping a original paper help to keep it confidential by using a password backup copy copy If the database holds customer names and addresses, personalised letters can be created automatically using Application software suited to storing the survey information obtained in the table would be The characters * and ? are sometimes used in search criteria as Which of the following field types will generate the primary key automatically?

Compilers, interpreters, editors DEFAULT and NOT NULL constraints

Word Network processors, software, spreadsheets, backup systems databases, DTP None of the above PRIMARY KEY FOREIGN KEY and UNIQUE constraints constraints IDENTITY columns UPDATE TABLE

C

C C

Source saving the file with different filenames

D

A

the product code the primary key mail merge A database bookmarks Auto Primary Graphics operators Auto ID browser wildcards AutoNumber

e-mail e-mail engines Auto Key

C A C C

27

Referential integrity ensures that the:

records in a dynaset are consistent with the underlying tables.

Tables are related to one another through a:

A foreign key is: You are creating a banking database to track customer loans. The bank will, of course, have many customers, each of whom may take out one or more loans, while each loan may be associated with only one customer (there are no joint accounts). What is the re In a one-to-many relationship between Companies and Employees, which field is found in both tables? Which of the following ensures that records in related tables are consistent with one another? For example, it ensures that you cannot add a record with an invalid foreign key.

foreign key. the primary key of both related tables.

forms in a database are related tables in consistent with a database are the underlying consistent with tables or one another. queries. query and its main form and a associated subform. dynaset. the primary key of the related a field from an table. unrelated table.

reports are consistent with the underlying tables or queries. B report and its related query. A not a primary key of either related table.

B

One-to-one EmployeeID

One-to-many CompanyID

Many-to-many Many-to-one EmployeeLastNa me CompanyAddress

B A

The Tools menu, Relationship Referential window integrity

The join line

The one-to-many relationship

B

Right-click the Relationship line, then select How would you delete a relationship between tables in Double click the Delete from the the Relationships window? Relationship line shortcut menu That there are several customers That some of In a Customers tables, what does a plus sign next to the associated with the data is not CustomerID field mean? that ID viewable

Select Undo in the Click the Delete Relationships Relationships button pull-down menu on the toolbar

B

That there are records in a related table

That records can be added by clicking on the plus sign

C

28

What is required of the fields that join two tables?

They must both be numbers

They cannot be They cannot be AutoNumber text fields data types

They must be the same data type

D

The customers ID is deleted from the Assume a one-to-many relationship between the The customers Customers table, Customers table and the Loans table, with referential Nothing, Access ID is deleted and all the integrity in effect. What happens when you attempt to ignores the from the related loans are delete a customer ID from the Customer table that still attempted Customers deleted from the An error message is has entries in the Loans table? command. table. Loans table. displayed. D The subform is an object on the form The subform is The subform is and can be moved or Which of the following is true when viewing a main form The subform is displayed in displayed in sized like any other and its associated subform in the Form Design view? not visible. Datasheet view. Form view. object. D A one-to-many A one-to-many A one-to-many relationship Which of the following relationships does not belong in a relationship relationship between A many-to-many database based on a professional sports league such between teams between teams coaches and relationship between as football or basketball? and players and coaches teams players and teams C Which symbol is used at the end of the join line in a related table to signify the many side of a one-to-many relationship? # M * C

You have created a one-to-many relationship with referential integrity between a Customers table and a Loans table. From which table can you delete a record? The correct order of the arguments for the MsgBox statement is:

Either table at any time prompt, title bar text, icon.

The Customers table only when there are Loan records associated with that customer prompt, icon, title bar text.

The Loans table at any time Neither table title bar text, title bar text, icon, prompt, icon. prompt.

C B

29

The first statement in a procedure named CreateList is: Dim CreateList. A check box enables the form user to choose from one of several existing entries. must be set for one word. help people keep track of things. data. facts. single-user database application single-user database application

Sub CreateList. CreateList. A text field enables the form user to choose from one of several existing entries. must be set for multiple words. store data in tables. relationships. figures. multiuser database application multiuser database application

Sub.

B

Which of the following is TRUE related to form fields? A text field:

The purpose of a database is to: A database stores: A database records: A sales contact manager used by a salesperson is an example of _______________ A Customer Resource Management (CRM) system is an example of_________ The industry standard supported by all major DBMSs that allows tables to be joined together is called __________.

A drop-down list enables the user to choose from one of several existing entries. does not have to be set. create tables of rows and columns. metadata. information. e-commerce database application e-commerce database application

A drop-down list enables the user to enter text. must be set for two words. maintain data on different things in different tables. all of the above a and b

C C

A D D

a or b

A

None of above

B

A program whose job is to create, process and administer databases is called the _____ Microsoft Access may use which of the following DBMS engines? Jet Which of the following are basic components of an enterprise-class database system?

Structured Sequential Query Question Language (SQL) Language (SQL) Database Database Management Modeling System System SQL Server The database application

Structured Query Relational Question Language (SQL) Language (RQL) Data Business Model System Oracle The database management system (DBMS) Relational Model Manager a and b

C

B D

The user

All of the above.

D

30

In an enterprise-class database system ________ . In an enterprise-class database system, the database application ___ . In an enterprise-class database system, reports are created by ____________________ . A database is considered "self-describing" because _______ . In an enterprise-class database system, the database _________ .

the database application(s) interact(s) with the DBMS creates queries

the DBMS accesses the database data creates form the database application

None of above

All of above

A D

the user

all the users' data it reduces data is in one place duplication holds user data

creates reports b and c the database management system (DBMS) the database it contains a description of its own structure All of the above. holds indexes All of the above.

B

C D

holds metadata as a new A database designed using spreadsheets from the systems Sales department is a database being designed from existing development _________________________ . data project as a new A database designed to implement requirements for a systems reporting application needed by the Sales department is from existing non- development a database being designed _______ . database data project as a new A database designed to combine two databases used systems by the Sales department is a database being designed from existing development _________________________ . data project Database professionals use ________________ as specific data sources for studies and analyses. data marts normalization Database professionals use a set of principles called ________________ to guide and assess database design. data marts normalization A very popular development technique used by database professionals for database design is known as _______________________ . data marts normalization

as a redesign of an existing database a and b as a redesign of an existing database a and b as a redesign of an existing database a and b entity-relationship data models data modeling entity-relationship data modeling entity-relationship data modeling

A

B

C A

data models

B

data models

D

31

A very popular development technique used by database professionals to adopt a database design to new or changing requirement is known as _____ . data marts The predecessor(s) of database processing was (were) __________ . file managers entities in a column vary as In a relation __________________________ . to kind An attribute is also known as a(n) . table A combination of one or more columns used to identify particular rows in a is___ . record A combination of two or more columns used to identify particular rows in a relation is________ . record A determinant that determines all the other columns in a relation is______ . record When designing a database, one of the candidate keys in a relation is selected as the _________ . composite key Normalization is a process used to deal with which of Insertion the following modification anomalies? anomaly assess the existing tables' When you are given a set of tables and asked to create structure and a database to store their data, the first step is to ____ . content are supplied by several wellModern microcomputer personal DBMS established products______. manufacturers

normalization hierarchical models the order of the columns is important relation field field field primary key

entityrelationship data modeling data migration network models the order of the rows is unimportant row key composite key foreign key

D

relational data model A more than one column can use the same name C field tuple foreign key candidate key surrogate key All of above D C C D B D

foreign key Deletion Update anomaly anomaly design the database structure

create one or move the data into more new tables the new database

A

were essentially killed off by MS have poor Access response time Their report delivery is more difficult than report delivery for reporting Nonintegrated systems. data

are not true DBMS products

B

Which of the following are true about data mining applications?

They use sophisticated mathematical techniques.

None of the above

A

32

We have obtained access to the company's operational data. We examine 50 records for customers with phone numbers that should use the current area code of 345. Of these 50 records, we find 10 that still use an older area code of 567. This is an example dirty data We have obtained access to the company's operational data. We have been asked to produce a report with an item by item analysis of sales, but the only sales figure available is the total sale value for each order. This is example of_____ dirty data

inconsistent data

nonintegrated data

a "wrong format" problem

B

inconsistent data

nonintegrated data

a "wrong format" problem

D

data warehouse A data warehouse database differs from an operational data are not database because: stored in tables. Which of the following objects is used to display a menu? Form Which of the following objects are NOT found in an Forms and Access application? reports

data warehouse databases do data warehouse not have data are often metadata. denormalized. b and c Table Queries and tables It will be easier for the user to upgrade it if the objects are in one database and the tables in another. Report Macros Query Spreadsheets

C A D

You are developing an Access application that you expect to upgrade periodically. Which of the following statements is TRUE?

It will be easier for the user to upgrade it if the objects and tables are in one database.

Regardless of how the objects and tables It is advisable to are stored, the user put each object will have to reenter and table into a the data in the tables separate when the application database. is upgraded. B

33

Which of the following statements regarding Access applications is NOT true? Which of the following brings a copy of the table into the current database and does not maintain a tie to the original table? Import

An application may consist of The Link Tables multiple command can be databases, each used to associate with multiple the tables in one objects, linked database with to yet another the objects in database another containing only database. tables.

All objects in an application, including the tables, must reside within the same database.

An application can be created in such a way that it objects such as forms and reports can be changed without disturbing the existing data. C

What makes a database an application? What is the Access tool that is used to create the user interface?

It contains more than one table Menu Wizard

Link It contains tables, reports, queries, and forms Build Menu

Merge

Join

A

It contains a user interface, or switchboard It contains macros C Interface Design Wizard Switchboard Manager D put key business information into the hands or store all corporate more decision transaction data in makers. one single location.

The purpose of a data warehouse is to:

create backups for mission centralize the critical corporate manageability of data. data collection. Digital Certificate

C

___________ means the result of applying to specific information certain specific technical processes. Digital Sign __________ is an algorithm which creates a digital representation or "fingerprint" in the form of a "hash result". Hash Function __________ is of standard length which is usually much smaller than the message but nevertheless substantially unique to it. Hash Function

Digital Signature None of the above

C

Digital Signature Digital Certificate Private Key

A

Hash Value

Hash Result

Either B or C

D

34

Digital Signature involves two processes. They are ___________ and __________.

The Costs of Digital Signature consists mainly of the following

CA stands for ________________ A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private Key True A Digital Certificate does contain Owner's Public Key, Owner's name, Expiration date of the Private Key, Serial number of the digital certificate True ______________ enable web servers to operate in a secure mode.

Digital Signature creation Institutional Overhead and Subscriber Relying Party Cost Certification Authority

Digital Signature Verification Both A and B

Either A or B

C

Subscriber Relying Party Cost Certified Authority False

Institutional Overhead Certificate Authority

None of the above None of the above

A A A

False Personal Digital Certificate Personal Digital certificate

B

Developer Server Certificate Certificate

None of the above

A

______________ are used by individuals when they Developer exchange messages with other users or online services. Server Certificate Certificate ______________ are on-line databases of certificates and other information available for retrieval and use in Private verifying digital signatures. Certificate Repositories Evidence, Ceremony, Approval True

None of the above

C

Public Key Efficiency and logistics, Evidence

none of the above

B

Signing Writings serve the following general purposes______,_______,_______ and _______ The most widely accepted format for Digital Certificate is defined by the CCITT X.509 A certificate may prove to be unreliable, such as in situations where the subscriber misrepresents his identity to the certification authority

Approval, Evidence False

Evidence, Ceremony, Approval, Efficiency and Logistics D A

True Certificate Revocation List

False Certificate Resource List certificate Revocation Letter

A

CRL stands for

None Of The Above

A

35

The prospective signer identified in the digital certificate holds the_________ and is called the ___________ In EDI interface, the translation service receives _________ as incoming files from the communication service The EDI standardisation for International Trade and Commerce is introduced by __________

Private Key, Subscriber Internal Format File ANSI

Public key, Recipient

Private Key, Recipient

None Of The Above

A

External Format Transmission File File UN/EBCDIC UNESCO

None of the above UN/EDIFACT

C D

In EDI, the transmission files are composed of different sets of external format files which are grouped into multiple sets under the name of ________ batch files The ________________ are pre-paid credit cards that include an embedded cards Smart Card ________________ are another form of credit payment that lets customers use digital online cheques to pay Web merchants directly E-cash In Active advertisement, there are two types of models. They are _____ and ________ The network based technology is/are ____________ Decryption is a process employed for scrambling of plain text for web based transactions Billboards and Junk Mail EDI True

interchange sets functions Embedded cards SET

functional groups None of the above

D A

Digital Cash Online Catalog and Billboards E-mail False

Smart Cards Broadcast and Junk Mail EFT

Electronic cheques Online Catalog and Customer Endorsements All of the above

D

C D B

Asymmetric cryptosystem is based on __________ and Login_Id and ____________ Password Value Added Network is an example of _________ Global Network Active or push The advertising strategies emerging in the on-line world based are ____________ advertising The _________ model use direct mail, spot television or cable television, in active based advertisement. Broadcast The ________ is a form of mail that is not targeted to a specific audience E-mail

Primary Key and Public Key and Private Key Password Satellite Area Private Network Network Passive or pull- Glow sign or based hoarding advertising strategies

Public Key and Private Key None of the above

D B

All of the above

D

Junk mail Bulk-mail

Billboard Direct-mail

Endorsements Junk mail

A D

36

The __________ model refers to information that is placed at a point where it will be noticed by customers in the course of other activities and does not require active search Catalog The most beneficial advantage of ERP system is What is the term that describes spying on ones business rivals to gain a competitive advantage? Error checking Competitive espionage A list of competitors clients single-user database application Replying promptly

Endorsement

What would you NOT be looking for when spying on a competitor? An online drugstore such as Drugstore.com is an example of_______ Which of the following is an example of unacceptable online netiquette?

Billboard Low cost of Data Integration operation Corporate Industrial espionage espionage Contact numbers of the management group Research data multi-user e-commerce database database application application Keeping Including the messages short Subject Message authentication in EDI systems performs the same function as segregation of duties in other information systems.

Broadcast

C

Quality management B Economic espionage C

A competitors new project

B

None of above Using all capital letters

C

D

Removable drives that can be locked up at night provide adequate security when the Which of the following statements is correct concerning confidentiality of the security of messages in an electronic data data is the interchange (EDI) system? primary risk. The wizard that is used to import text files is_________________ The alphabet indicating the column followed by the row number is known an__________ Which of the following files could not be opened in excel _______________ In excel, the dates that are stored as sequential numbers known as ________________text import wizard cell reference text files serial values

Encryption performed by a physically secure hardware device is more secure than encryption performed by software.

Security at the transaction phase in EDI systems is not necessary because problems at that level will be identified by the service provider. C

convert text to columns wizard tip wizard column row reference reference quattropro or Lotus 1-2-3 xbase files domain values range values

function wizard none of the above class files reference values

A A D D

37

The command to display the current date in a cell is _________________ In excel, absolute references are represented by a ________ before the column and row addresses The ________ can be used to select the function and assemble the arguments correctly Specific parts of information required by functions to perform certain tasks are called as___________ Which of the following do not belong to the formula category in excel environment__________ The function that in used to join cell values together in a single cell ________ The function that is used to count all the values that meet specific criteria _________ The wizard that is used to create and edit charts _______________ The function that is used to calculate the payment for specific loan terms ____________ The function that is used to add together all values that meet specific criteria is known as ____________ The __________ option present in the file menu options is used to specify major facts of the page to be printed The command that is used to apply a format automatically __________ The ____________ makes the information in a worksheet meaningful and easy to understand A particular part of a work sheet can be printed by setting the _________ The process of finding or selecting information is known as ____________

=today() dollar sign AutoSum variables text concatenate countif

=date() ' = ' sign AutoFill arguments logical pmt vlookup

=currentdate() # sign function wizard parameters numeric merge pmt convert text to columns wizard countif sumif

none of the above none of the above none of the above none of the above Boolean none of the above count tip wizard none of the above countif

A A C B D A A B B C

pivot table wizard chart wizard sumif average pmt sum

page setup autoformat bordering page setup filtering

print area AutoFill formatting print area searching

print none of the above shading print sorting

none of the above

A A

none of the above print preview none of the above

B B A

The option that is used to cancel the filter process for a specific column and display all the records is ________ all option The URL for encyclopedia Britannica is_________ www.ency.in

blanks www.eb.com

all blanks none www.encybrit.co m none of the above

A B

38

_______ maps IP addresses with the domain names of the sites URL Internet can be defined as _______ The most important service of the ______ is to manage traffic control _________is a program that displays information about a host connected to the net _______ is a program or a tool that helps in locating a file anywhere on the net internal network

DNS network of network

FTP intermediate network physical layer ftp service ARCHIE

none of the above none of the above session layer none of the above none of the above

B B D A C

application layer transport layer finger service FTP ping service TELNET

URL stands for ____________ IN an URL the word before the color refers to _______ A ______ always begins with a slash Prodigy is run by IBM and ______ The World Wide Web is referred to shortly as the _______ Gopher and WAIS enables the user to ______ ______ is the program used to run CompuServe's regular services Navigating through the menu of gopher is called moving around _______ The directories that come with built-in engines are yahoo,lycos and ______ To use the finger command,SLIP users must run a programme called______ The web maps are called _______ Directories consists of _______ levels

uniform research uniform locator resource locator name of the host computer resource message scheme Delphi Microsoft net browser CompuServe internet dialer gophering Alta vista finger server list no

unlimited restore locator none of the above scheme command line sears none of the above none of the above general electric editor none of the above none of the above none of the above none of the above none of the above none of the above many middle and lower glossary

A C C C B C C C B A C B D C

web browser read the Usenet search for news database wincim or spy mosaic maccim gopherspace open text ftp server directories cyberspace excite web server image list

maximum of five one lower directory top index

The _____ level gives the broadcast overview of the net middle The huge list of keywords from important items is called ______ hotlist

39

The two types of search in veronica are _____ and ______ _______ searches by keywords Mosaic displays links in color whereas _____ does not display links in color ______ supports one button publish SPY MOSAIC is distributed by_______ ______ is a program that helps us to log on to other networks

directory search,index search infoseek netshark lynx Microsoft Usenet

index search,menu search excite cello mosaic internet

menu search,item search lycos lynx Lycos IBM ftp

item search,index search all the above all the above navigator gold 2.0 CompuServe telnet

C D C C D D

HTTP is the acronym for __________ ______is used to transfer and copy files over the internet _____ is a program that helps us to log on to other networks

finger service Hyper text Higher text transmission transfer protocol port iccp yahoo ftp ftp transmission control protocol/internet protocol two domain name servers the internet administration protocol

Hyper text Hyper text transfer transfer protocol port uucp none of the above

C C C

TCP/IP stands for ________________ Archie servers can be accessed in_______ different ways in internet _______is the computer on the internet that translates between the internet domain names and the internet numeric address TIA stands for_____ in internet Service indicates the name of the ________ used to access data, present on the other end of the link.

transfer control protocol/internet one

telnet none of the above transfer communication protocol/internet protocol none of the above three none of the above

B C

ftp servers the internet adapter browser

web servers the internet access site

none of the above none of the above organization

B A B

________ is used to link pages in the world wide web

universal uniform uniform resource resource locator resource locator label name of the above frequent asked query frequently asked frantically asked question question none of the above

B

FAQ stands for ______

B

40

The internet adapter is a programme that makes our connection act like a _____or a ____ account The step involved in Communicating between the web clients and servers is ______________

SLIP,PPP connection

TCP,IP response windows sockets internets relay chat netscape,ie world wide web client index very organised network integration and communication application university of cleveland,clevel and freenet IP address

IP,UDP request

none of the above close

A A

wide search for information and WSIRC stands for______ research Two of the important browsers are_____ and_____ lynx,minx world wide web Lynx is a _______ programme that works with terminals server The huge list of keywords from important items is called an_____ glossary very easy and rodent oriented net wide index to computerized VERONICA is an acronym for _______________ archives university of The first freenet is created at the_____ and is berkeley,berkeley called______ freenet ________ are defined as ways of communication amongst networks protocols search engines,directori ______and_____ are web searching features es WINWAIS has two source lists namely____ and______ ________ is also called as WAIS manager The system of interlinked documents is known as_______ The small programmes that create animation,multimedia,real-time games and multi user games are called______ The information displayed on the web page includes______,_____ and_____ allsrc,winsocks allsrc hot links

world search for information and research council none of the above mosaic,gopher none of the above interface hotwords verification on network integration and communication university of California net dns none of the above none of the above

B B B B

none of the above

A

none of the above none of the above

B A

ftp and finger wais,allsrc waisman hyper text

telnet and ftp wais,winsocks winsock books marks

none of the above none of the above none of the above none of the above

A B B B

images applets animation none of the above graphics,videos,a programms,ima animation,scripts udio ges,text ,executables none of the above

B A

41

The web pages that represent online home of their author are called______

first page global network news yahoo service

home page global networks navigator electronic mail Netscape page starter site,netscape page wizard telnet point review bitnet

welcome page grand network news search engines

none of the above

B

GNN stands for______ _____ is the most popular internet service

none of the above none of the above

B B

The online service offered by navigator gold 2.0 are _______ and_____ _______ is a program or a tool that helps us find a file anywhere on the net The databases to enable keyword search using Lycos are a2z,_______ ______ is a large worldwide bulletin board service network

email and net conference newsgroup Lycos catalog apple link

yahoo and altavista ftp all the above Delphi

none of the above archive none of the above fidonet

B D D A

BABEL consists a glossary of _____ Dictionaries,encyclopaedias,government and other references are found in ______ Yahoo,lycos,excite and webcrawlers are _____

computer related abbreviations biographical and acronym information encyclopedia Britannica search engines Graphical interpreter formatting

bookstores

none the above

A

on-line reference works more information galenet web directories Graphical interchange Format Jumbled pictures expert graph documents database Graphical interface format Joint pictures expert graph net eudora,netscape and pine network connections channel Graphical Interface format Joint pictures experimental group browsers none of the above mails

A B

GIF is the acronym for ____________

B

JPEG is the acronym for ___________ The Web aids users to explore the ________ The three most popular mailer are_____,_____ and______ The World Wide Web consists of _________

Joint Pictures Expert Group mails yahoo,infoseek,al tavista netscape,ie,lynx information web pages

A C C B

42

In Microsoft Internet Explorer, the color of the text can be specified using _________ attribute of the font tag. The interface that provides effective communication between the web browsers and servers is _________ CGI is the _________ between web browsers and servers CGI programs are invoked based on the information provided by the _________ A CGI program is usually called after a request made by the _________ A hyperlink can be on ___________ HTML was derived from _________ SGML is a _________ PINE stands for _____________ The application that confirms whether a document is compliant to its DTD is _________ Web is a collection of ___________

BACKGROUND COLOR Common Communication graphical gateway interface Interface Network Current web page Browser/user text only SQL alphalanguage palm is not eatable Interface Browser Server image only PLSQL betalanguage

FCOLOR Communication graphical interface Communication Client Web text or image SGML metalanguage pancake is not edible SGML Parser applets Internet Engineering Task Force MS Internet Explorer and Netscape Navigator symbols hotword in user-defined order home

FONTCOLOR Common Gateway Interface Connection None of the above Channel

B

D B B A

neither text nor image C CGI C none of the above C none of the above SGML Composer documents B C A

IETF stands for ________

palm is not elm SGML SGML Processor Preprocessor web sites images International Internet Engineering equipment trainers and training faculty faculty MS Internet Explorer and Mosaic text hyperlink in random order first Netscape Navigator and Mosaic data from a database hypertext in sequential order start

None of the above

C

The two major browsers used to surf the Internet are ________,_______ Special characters allow browsers to display _________________ The keyword for providing links within or across documents is____________ Stringing pages together using hypertext technology helps view pages _______________ The initial web pages present in a web site is the ________ page.

None of the above video hotlink none of the above none of the above

C C B B C

43

The image format supported by most browsers is________________.

The components of a URL are ___________

.bmp and .gif Service, hostname and directory path mail servers,mail clients and alternate services communication generated information Server arpanet LAN data

.bmp and .jpeg .gif and .jpeg .wmf and .bmp service,hostnam e,port,directory- service,port and service,hostname path directory path and port mail vendors,mail identification and password common gateway interface Client the net peer-to-peer connectivity parcel mailing lists,mail server robots and gateways to other services none of the above classified general instructions Browser intranet wan packets email,file retrived,internet tools

C

B

The mail we send has a mailing address and most of them correspond to_____,_____ and Which of the following is not supported by internet explorer _______________

C D

CGI stands for ____________ Host name indicates the domain name of the web ________ The internet is also called as _______________ The internet is similar to _________________ The net drivers______ from one place to another The net provides interesting services like______,______ and______ The windows internet software available are______,_______,________ and______ ________ is the ancestors of the internet

none of the above User none of the above none of the above none of the above

B A B B A

scripting,parsing news,cooking and compiling and fine arts

none of the above

C

nt,windows95,ie, mosaic,gopher, communicator,ie winzip eudora,trumpnet ,lynx,winsock dnet arpanet ARPANET defensive defensive advanced administrative dedicated and research DARPA stands for rank registered projects _____________________________________________ administration projects administration __ network administration net The uuencode files start with a _______ start begin first milnet,smaller DARPA is broken into ________ and _______ arpanet mailnet,inet intranet,extranet

all of the above none of the above

B B

none of the above none of the above none of the above

C B A

44

NSFNET is the united states provides service to _____ and_____ The first international IP network connections were established in 1973 with _____ and_____ A_____ is a set of computers interconnected by transmission paths to exchange information in internet A computer that provides a service usable by other computers is called______ A_______ is the representation of physical c