cs aptech questions

Upload: amaranathreddy-yg

Post on 07-Apr-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 Cs Aptech Questions

    1/164

  • 8/6/2019 Cs Aptech Questions

    2/164

    TRUE FALSE

    The number of steps in Accounts Compilation are 2 3

    data element data record

    Tally is based on mercantile accounting system FALSE TRUE

    Ctrl + N is used to -----------

    Ledgers Groups

    Revenue Account also known as -------------- Account Personal NominalMethod of Voucher Numbering is/are Manual Automatic

    Accounts Receivable are displayed in Balance Sheet Profit & Loss

    Journal Stock Journal

    Filled Receipt

    11 16

    FALSE TRUE

    F4 F5

    Default Cost Category in Tally is/are -------------- Main Location Primary

    True False

    Ledgers Reports

    0 to 9 1 to 100

    Supplier Suspense

    Customers can be permitted to enter their own datainto the firms computer using the firms wide areanetwork is an example of

    Enterprise DataInterchange

    Enterprise Data -Information

    In Tally, we can customize the Vouchers as per ourrequirements

    Each action/transaction of a firm is described by a----------------.

    Display stockvaluation method

    OpenCalculator

    ------------- in Tally classify the accounts underdifferent heads so that summarised information ispossible.

    To assemble a product from different items-------------- entry is usedA --------- purchase orders data flow is directed tothe purchasing system for use in closing out theoutstanding purchase orders in the receivingsystem diagram.

    Tally provides at least --------- predefined voucherformats

    The value of the inventory is included in a ledgeraccounts as an asset on the balance sheet" The buyers can follow up with the suppliers todetermine the reasons " is an example of -----------------

    management byobjective

    managementby exception

    From voucher entry mode , if we press __________ then we get payment voucher in tally

    A Group Company is simply a name and an identifygiven to the merged accounts member companiesof the group.A ----------- is a primary document for recording allfinancial transactions.

    The field can have a value between ________________ in FA Package.

    The _______ file maintains data that describes thesupplier past transaction with the firm in terms of material quality in AIS

  • 8/6/2019 Cs Aptech Questions

    3/164

    Report Output

    F2 F4

    Tally can maintain budgets on ---------------- Net Transactions Closing Balance

    True False

    F6 function key

    Sales Purchases

    True False

    Horizontal Vertical

    Default ledger accounts in tally are ______

    Default 'godown' name in tally is ____________ Primary Main location

    'Tally vault' is a _________________ Ledger a/c

    F5 F7

    a name an identity

    Sales return Purchase return

    Stock items units

    Trial Balance Daybook

    F7 Alt + F7

    In tally, types of users are _______________ 2 3

    F9 F10

    Balance sheet Profit & loss a/c

    It is necessary to manipulate data to transform itinto ----------------In tally, to change the date of the voucher press

    ______

    The value of the inventory is included as an asseton the balance sheet

    In ratio analysis report of Tally FA packagewe wepress ________________ function key to the display of bills receivable , bills payables report

    Alt + f6 functionkey

    The accounts payable system is responsible forpaying the suppliers for the -----------------What is the default financial year in Tally6.3

    _________________ 1-4-1995 to 31-3-1996

    1-4-1996 to31-3-1997

    Tally encrypts and stores TALLY DATA at the datadirectory

    The Profit & Loss statement can be displayed in---------------- format(s).

    Balance sheet &profit & loss profit& loss and trialbalance

    Profit & loss andtrial balance

    Securitymechanism

    To create a sales voucher in tally , you have topress _______

    A Group Company is ------------------------- given to themerged accounts of member companies of thegroup.In tally,"credit note" voucher type records entry for

    ________________ In tally you get currency symbol option from _______ menu

    Companycreation

    ------------------ gives the balance for each day for thevoucher type has been selected.For 'stock journal' entry we press ______________ intally

    Tally provides the capability to the

    administrator/auditor to track changes in the areasis/are

    Changes in

    transactions orvouchers

    Changes inLedger Masters

    By pressing -------- key, a list of inventory reportscan be displayed straightaway from the balacesheet reportProjected approximation of income or expenses iscalled ______________ .

  • 8/6/2019 Cs Aptech Questions

    4/164

    TRUE FALSE

    F3 Ctrl+F3

    TRUE FALSE

    Default stock category in tally is ______ Main location Primary

    Tally.imp Tally.ini

    Stock summary Stock journal

    TRUE FALSE

    Default number of groups in tally are ________ 128 228

    During voucher entry ------------- are used. Groups

    User designated as --------------- can view audit list. Administrator Owner

    Tally supports Importing of data from ----------------

    The memory address register is used to store

    FUNDAMENTALS OF COMPUTER

    NIC Card VSAT

    Record Count

    "Administrator" type user is also called 'Auditor' of acompany in Tally

    You will get company information , if you press __________ from gateway of tallyA constituent(member) company can be a memberof more than one group.

    To create a log of the import activity in a file_____________ is located in the same directoryas an executable program in tallyIn Tally,inventory valuation method option isavailable from _______

    Tally audit feature is available in a company __________________

    By pressing F11function key

    During thecreation of acompany

    In tally, a group company can also be aconstituent(member) of another group company

    LedgerAccounts

    One company toanother companycreated withon

    Tally Package

    Other programs -a spreadsheet ora database file.

    In an accounting information system, which of thefollowing types of computer files most likely would

    be a master file?

    Inventory

    subsidiary.

    Cash

    disbursements.

    Which of the following is an advantage of acomputer-based system for transaction processingover a manual system? A computer-based system:

    Does not requireas stringent a setof internalcontrols.

    Will produce amore accurateset of financialstatements.

    data to betransferred tomemory

    data that hasbeen transferredfrom memory

    Inefficient usage of excess computer equipment canbe controlled by

    ContingencyPlanning

    Systemfeasibility report

    Which of the following is not the component of aCPUA trailer label is used on a magnetic tape file, it isthe last record and summarises the file. Thefollowing is an information not found in the trailerlabel

    IdentificationNumber

  • 8/6/2019 Cs Aptech Questions

    5/164

    Hard copy is a term used to describe...? Printed output

    What do the abbreviations VAB stand for

    Validity check

    Coloured spots Pixels

    File Name

    A daisy wheel is a type of...? Printer Storage device

    System Logs

    An impact printer creates characters by using...? An ink pen

    What would you NOT use with a flatbed plotter? A pen PaperWhat do you need for an ink jet printer? A cartridge A drum

    A laser printer does NOT use? A print head A laser beam

    Volume Size

    You can ________ protect a floppy disk. Read Write

    Magnetic tape PAN drive

    Magnetic tape is a...?

    1.44MB 20 GB

    A CD-ROM A floppy disk

    Which storage device cannot be erased? A CD-ROM A floppy disk

    Where should floppy disks be stored?

    ROM chips RAM chips

    RAM chips ROM chips

    Writing on a hardboardVoice activatedbroadcasting

    Voice answerback

    What control would prevent the accidental erasureof customer information from a magnetic tape

    Boundaryprotection

    What are the individual dots which make up apicture on the monitor screen called?Header label normally include all the followingexcept the

    Identificationnumber

    Which approach or technique is a control usuallyassociated with microcomputers

    PhysicalSecurity

    Electrically

    charged ink

    The best security control in a microcomputerenvironment is to

    Restrictphysical access

    Use onlyunremovablemedia

    The greatest control exposure in a microcomputerenvironment is the lack of

    Separation of duties

    Centralisedfunction for PCacquisition

    The amount of data that a disk may contain is

    known as the disks...?

    Information on a hard disk is usually backed-upusing a...?

    Serial accessmedium

    Random accessmedium

    Hard disks can have a storage capacity in the regionof...?Which storage device has the largest capacity inMb?

    By a sunnywindow

    By magnetobjects

    The contents of these chips are lost when thecomputer is switched off?What are responsible for storing permanent dataand instructions?

  • 8/6/2019 Cs Aptech Questions

    6/164

    ALU Registers

    CPUs Registers

    0 bits 1 bit

    What type of computer chips are said to be volatile? RAM chips ROM chips

    Software can be divided into two areas:

    Supercomputer

    Vacuum tube based electronic computers are...?

    First generation

    Third generation

    Third generation

    Third generation

    DATABASES

    _______ is used for CAAT as database Oracle ACL

    TRUE FALSE

    TRUE FALSE

    TRUE FALSE

    yes no

    TRUE FALSE

    Which parts of the computer perform arithmeticcalculations?What are small high speed memory units used forstoring temporary results?How many bits of information can each memory cellin a computer chip hold?

    Network softwareand securitysoftware

    Systemssoftware andapplicationsoftware

    Travel agents use this computer system whenreserving flights

    Personalcomputer

    Which computers are used in the weatherforecasting industry?

    Notebookcomputers

    Supercomputers

    First

    generation

    Second

    generationWhich generation of computer was developed frommicrochips?

    Secondgeneration

    Which generation of computer uses more than onemicroprocessor?

    Secondgeneration

    Which generation of computer developed usingintegrated circuits?

    Secondgeneration

    Which generation of computer developed using solidstate components?

    Secondgeneration

    Name three steps involved in developing aninformation system

    Specification,Design, andTesting

    Programming,Design, and

    Testing

    Generalized audit software perform auditors toundertake any past records and not concurrentauditingGeneralized audit software is a file whosecapabilities for verifying processing is logicCAAT's are computer program and data that auditoruses as part of the audit procedures to process dataif audit significance contained in an entity

    information systemCAAT do not contains package programs, purposewritten program, utility programs or systemmanagement programsEmbedded audit routines are sometimes built intoan entity's computer system to provide data forlater user by the auditor

  • 8/6/2019 Cs Aptech Questions

    7/164

    TRUE FALSE

    TRUE false

    true false

    true false

    true false

    The first step for developing CAAT is_________

    True False

    True False

    Auditing with computer necessarily supports the

    true false

    true false

    true false

    SCARF involves embedding audit software moduleswithin an application system to provide continuousmonitoringConcurrent use auditors as the member of thesystemRegular cross system verification may minimize

    fraudsComputer security is frequently associated withconfidentiality, integrity and authenticationData reserve engineering process metadata todocument system and abstract business rules andrelationship

    to determinethe auditobjective

    review andevaluate thetypes of data

    Using the open database connectivity feature in ACLis ______________

    can bring thedata directly

    can bring thedata indirectly

    Computer Assisted Audited Technique involves theuse of computers through "Black Box Approach"White Box Approach necessary involves expertknowledge on the part of Auditor

    The transition from manual system to CISenvironment bring dramatic changes including

    ________________

    change in themethod of recordingaccountingtransaction

    use of accountingcodes

    documents drivenapproach

    risk drivenapproach

    CAAT involves an Auditors' appreciation of __________

    hardware andsoftwareconfiguration

    processingoptions, file datastructure

    Widespread end use computing result in unlimitederrors creeping into system going to accepthandling, thereby increasing audit risks

    For computerized auditing usage of sophisticatedaudit software would be a necessity

    Important knowledge needed to begin planning theuse of CAAT is _________

    the source of data available

    to the auditorganization

    source of data

    for materialplaning

    The move towards paperless EDI would eliminatemuch of the traditional audit trail, radically changingthe nature of audit evidence

  • 8/6/2019 Cs Aptech Questions

    8/164

    true false

    A system could be _________ open/closedA system exhibits 'entropy' true false

    true falseAssembler language uses Mnemonic symbols true false

    scheduled jobs

    true false

    true false

    true false

    true false

    true false

    true false

    true false

    DSS has the following components _________________ databases

    true false

    true false

    Master file configuration includes ____________ reference files table files

    Computer operation controls are designed toprovide ________________

    the of by allconcerned

    providing accessto computer toall organizationpersonnel

    Systems development control, apart from others,include authorization, approval, testing,implementation and documentation of new systemssoftware and system software modification

    natural/man-made

    Super computer are the largest and fastest and isvery suitable for commercial application includingaudit work

    Operating systems are devised to optimize themachine capabilities, the functioninclude_______________

    managehardware &softwareresources

    General purpose software provides a framework forhighly complex scientific operationIn batch processing, transactions are processed oneafter another

    The use of computer assisted audit techniques isnot gaining popularity not only ________________

    with auditdepartments

    with productiondepartments

    On-line processing refers to grouping of transaction

    and processing the same in one go from start tofinishReal time refers to the technique of updating fileswith transaction data immediately after theoccurrence of the event to which it relatesIn OLRT the CPU should process the capability of program interruption

    Time sharing system allow access to a CPU fromremote terminalsDSS is defined as a system that provides tools tomanagers to assist them in solving structuredproblems

    planninglanguage

    Master files contains current records foridentification and summarizing

    Transaction files contain relatively permanentrecords take product profile, customer profile,employee profile etc

  • 8/6/2019 Cs Aptech Questions

    9/164

    filex file-o-man

    true false

    true false

    back-ups retrieval

    true false

    true false

    SADB stands for ____________

    true false

    true false

    Errors are correlated_________ at the year end immediatelyField check is exclusive to a field true false

    Benfish Benford

    true false

    Hierarchical code means _________

    TRUE false

    valid, numeric

    Hash totals means meaningless totals true false

    ______ is a file management software package thatlets users and programmers organize data into filesand then process those files

    CAATS provide added value to the clients because

    _______________

    to have acompletepicture of a

    system

    decentralizedpicture of a

    systemFile volatility refers to the number of addition anddeletions to the file in a given period of timeFile activity is the proportion of transaction filerecords that are actually used and accessed in agiven processing run:File interrogation refers to the _____ of informationfrom a fileOne -to-one relationship means a single entity to asingle entity in a monogamous structureRDBMS is structured to a series of 2 dimensionaltables

    seriously affecteddatabase

    subject areadatabase

    Controls are present over many aspects of thecomputer system and its surrounding socialenvironmentIn framed checking the data entry is checkedagainst an expected picture or format

    _________ law basically states that there is a specificprobability of the first digit of a no. being 1,2,3 etc

    Check digit is a group of nos. added to a code fordetermining the accuracy of other digits in the code

    consecutive nos.or alphabets toentities

    blocks of nos. tothe primaryattribute of thethe entity

    The validation checks applied to a field depend onthe field's logical inter relationships with other fieldsin the record

    The contents of a field could determine _______ signfor a ______ field

    invalid,alphabetic

    Batch is the process of ______ together _____ thatbear some type of relationship to one another

    grouping,transaction

    regrouping,events

  • 8/6/2019 Cs Aptech Questions

    10/164

    true false

    true false

    true false

    true false

    IDEA stands for _________________________________

    true false

    true false

    true false

    true false

    e-brain bouncing ball

    In systems testing, test involves_________________ bottom up tests top-down tests

    yes no

    Audit software is used by the auditor to _________

    deleted, hard

    true false

    SAS stands for ______________

    With OLRT where interactive data entry is available,the master file associated with a transaction may besearched for confirming dataControls are required for authorization to ensuredata integrity and detect possible breaches in

    securityData from client application are not stored in theorganization's database through auditables eventsand functionAll input records in a batch are normally of differenttypes

    incrementaldesign andenlarge activity

    interactivedataextraction andanalysis

    A transaction file is sorted prior to the update of master file

    A sequence check on the transaction or master filesby an update program is not required

    Whenever monetary transactions are processedagainst master files, the update program shouldmaintain a correlation account to record suchtransaction that does not have a matching masterfile recordInternal tables are stored tables from which certainvalues are extracted for further processing andstoring

    For small to medium sized systems, individualmodules are coded and individually tested and thenassembled to be tested as a whole-the testingstrategy is referred to as ___________________

    Recording transactions in a controlled manner mayamount to loss of stored data

    read data onclient's file

    provideinformation tothe audit

    Core image comparison is a software used by theauditor to compare _______ version of a programwith a secure ________ copy

    executables,master

    Database analyzer is a software which providesdetailed information concerning the operation of thedatabase

    system analysissoftware

    systemadvancedsoftware

  • 8/6/2019 Cs Aptech Questions

    11/164

    true false

    Embedded code performs wide variety of audit task yes no

    true false

    true false

    create, false

    true falseMapping software has very objectives yes no

    yes no

    Program code analysis involves _____________ __________ is a software of CAAT IDEA ACL

    true false

    Base case system evaluation includes____________

    true false

    true false

    true false

    file, hardware

    Embedded code is a software used by the auditor toexamine backup data

    Core image comparison is particularly useful whereonly executable versions are distributed

    Log analysis is a software used by auditor to detectvirus

    On line testing techniques the auditor ______ dataeither _______ or fictitious in order to see that aspecific program or sever edit test is doing its work

    manipulates,real

    Mapping software is used by the auditor to listunused program instructions

    Modeling is a variety of software which ________________

    can be verypowerfulanalytical tool

    can enable theauditor toexecuteprovisions on anumber of different bases

    On line testing can be targeted for specific functionscarried out by programs

    provides detailedinformation of

    machine uses

    identifiesprogram codewhich may bethere forfraudulent

    reason

    Snapshot is software which takes a picture of a fileor data or a transaction passing though the system

    fictitious dataapplied againstthe clientprogram

    comparison of source version of a programmed

    While base testing forces on finding if there are anydefective execution policies in a program

    Black box testing seeks to determine whetherapplication output is what it is supposed to be

    In integrated test facility approach the auditorshould ensure that the impact of test transaction issubsequently eliminated from the computer filesBlack box testing is _______ based and white boxtesting is _______ based

    specification,program

  • 8/6/2019 Cs Aptech Questions

    12/164

    Source code review means__________

    true false

    true false

    JCL means_________________

    yes no

    true false

    true false

    Generalized audit software consists ___________

    Specializes audit program may be___________

    true false

    true false

    true false

    identifyingerroneous code

    identifyingineffective code

    In formula in flow hypothesis the auditor shouldexpand the extent of substantive tests todetermine how the defects may impact the

    attainment of the program objectivesAll material application oriented events that occurwithin the boundary subsystem should be recordedin the accounting audit trail

    In examination of audit trail the following dataassociated with an event may be ___________-

    start and finishtime

    authentication of informationsupport

    job controllanguage

    job connectivitylanguage

    Audit should be periodically analyzed to detect anycontrol weakness of the system

    In an accounting audit trail, intrusion detectionsystem might monitor the amount of processor timeconsumed by the user to detect unusual deviationfrom the amount processor time requested by theuser in the pastA sample size calculator program assists auditors indetermining RAND() function

    packagecomputerp[program forperforming avariety of dataprocessingfunction

    mathematicalconcept

    prepared by theauditor

    prepared by theentity

    Generalised audit software could be used by thefollowing in consistencies or significant fluctuations

    Generalized audit software functioninclude____________

    file

    access/organizations

    statistical/arithmetic operation

    In the file reorganization merging capabilities areneeded in data from separate file is to be combinedon a separate work fileAuditors cannot use generalised audit software toextract the data needed for audit purpose

  • 8/6/2019 Cs Aptech Questions

    13/164

    Which of the following is not the feature of GAPs

    Which is the example of CAATs ACL IDEA

    In audit procedures, test data is

    Which of the following is not the use of CAATs

    Macros

    integer number

    MS access objects can be published in the web true false

    actions events

    report form

    macro

    To build complex expressions_____is used calculator code builder

    action list macro list

    conditions action

    tabular columnar

    _______layout of a form displays one record at a time tabular columnar

    create report link report

    true false

    create fields add chart

    primary key alternate key _______is used to create a mailing label label wizard chart wizard

    start header group header

    Auditors can combine functional capabilities of generalized audit software to accomplish the task of

    __________________

    examining thequality of systemprocess

    carryinganalytical review

    Wide access tovarious data base

    Can extract andanalyse data

    A sample of transactions

    A utility softwareprogramme

    Tests of details of transactions

    Analytical reviewprocedures

    Which of the following are called explicitly byanother procedure?

    ActionProcedures

    _________ data type is generally used for fieldsassigned as primary keys in a table

    In code-builder, got_focuse, click,dbl_click,enter areexamples of _______

    _______can be used to automate certain actions inresponse to eventsIn the macro sheet the macro is selected in the

    _____fieldexpressionelements

    The three list boxes present at the bottom of the

    expression builder are called_____ ________option is selected from the view menu tocreate macros with conditions

    _______report can be created with minimum userinput

    The table or query name on which we are going tobuild our report is selected from the ____ dialoguebox

    ______and_____are the two types of auto reportsavailable

    columnar andtabular

    stable andunstable

    There are no wizards for creating a database inaccess

    ______option from the insert menu option is chosento add an embedded chartIn ms-access, while using SQL, references constraintis used for creating _______

    ______header is present at the beginning of thereport

  • 8/6/2019 Cs Aptech Questions

    14/164

    report footer page footer

    In SQL, having clause is used for _________

    condition group ______can be used to create toolbars VB Modules reports

    add append

    report macro sheet

    true falseVisual Basic language is a _____ tool RAD RAP

    ______ function is used to display a message box SysCmd MsgBox

    OLE DDE

    OLE stands for_____ on line execution

    OLE object OLE client

    linked embedded

    _______is the file format that works on internet exe DLL

    form wizard report wizard

    static file static html

    append add

    Currency fields express the amount in _________ dollars rupees

    unbound object bound object

    display as icon display

    create html new

    startup home

    bullet command

    ______is present at the bottom of each page in areport

    for ordering

    records

    for updating

    records ______field is added to the macro sheet when weselect grouping option from the view menu

    _______query is used to add records from one ormore tables into an existing table

    _______window is used to write VB code in accessapplicationValues for other tables, queries are maintained inlook up fields data type

    Other ms-office applications can be accessed fromms-access using a concept called ________

    object linkingand embedding

    The application that supplies data in OLE is calledan _________ If any change made on the object from the clientside is reflected on the server then the object is saidto be _____

    ______ is used to convert any ms-access object intohtml format

    _______ option in publish to web wizard produces apage that is static in nature

    _______query is used to create or change databaseobjects in a current database

    _______is selected from the toolbar to add an OLEobject

    To display an OLE object in the form of an icon ____ option is selected from insert object dialogue box

    _______option from the file menu is selected to run'publish to the web wizard'

    _____page in an web application is used to navigateto the rest of the pages in the application

    ______ is fired when an event is triggered is theconcept based on a Visual Basic language

  • 8/6/2019 Cs Aptech Questions

    15/164

    Ms access is a ___________ DBMS RDBMS

    data group data collection

    A blank database can be created using __________ new dialog box

    Text type data can be of _____ characters in ACCESS 255 64000

    AutoNumber

    Tables cannot be imported from other databases true false

    inner join outer join

    primary key not null

    columnar tabular

    In SQL, delete command is used to remove _________ table or tables query or queries

    true false

    property field field property

    action queries

    inner join self joinPrimary key uniquely identifies each record true false

    summary sum

    properties

    included form sub form

    _______ form displays fields in a single horizontal row columnar form tabular form

    filtering ordering

    A collection of data stored in different objects isknown as a _________

    new blankdatabase dialogbox

    ______is a datatype that assigns valuesautomatically

    automaticnumber

    If two tables having same values for the fields are joined it is called an ______ Duplication of records in a field won't be allowed if the fields are declared a________

    Changes from a master table can be reflected on to

    the child table by selecting _____option

    cascade delete

    related records

    cascade change

    related records To see more than one record at a time in a form weuse _______

    In MS-Access, filter excluding selection will displayonly those record(s) which meet the criteria.Properties of the fields are managed by _____ inDynaset

    ______queries allows us to view data in row bycolumn manner

    crosstabqueries

    row/columnqueries

    The type of queries that can update or deleterecord(s) in a table(s) are called __________

    row/columnqueries

    Joining tables without any matching values in thefields is called ____________

    Which of the following dialog box is/are used in thecreation of form ________

    new form dialogbox

    form createdialog box

    _______ query wizards are used to generatesummary calculations for a tableProperties of a form can be changed by selecting

    ______from view menu optionschangeproperties

    Forms that are included in other forms are called

    ______________ In MS-Access, while using form design view, forcreating a command button for adding a newrecord, we should select the _______ category fromthe command button wizard

    RecordNavigation

    RecordOperations

    The process of arranging the data in a meaningfulorder is known as ___________

  • 8/6/2019 Cs Aptech Questions

    16/164

    filter sorts

    filter by form

    * $Records cannot be sorted by a primary key true false

    bound control

    button group option group

    Which of the following is control types ____________ bound unbound

    CURRDATE() TODAY() _____is a control that lists set of data text box list box

    ______is a form that summarize large amount of data pivot table columnar form

    data sheet filter filter by input

    Wizards for toolbox controls are called a __________ button wizard control wizard

    ram* ram??Look up fields slow up data entry true false

    report form

    autoreport report ______ represents data in a pictorial format chart label

    true false

    true false

    60,000 255

    true false

    true false

    true false

    table query

    table form

    true false

    ______ are used to select only some particularrecords from the table or any other databaseobjectsIn MS-Access, user may specify criteria for filter inform view using _________

    filter byselection

    ___wildcard character represents any single

    character

    A control without a data source is known as ___________

    unboundcontrol

    Set of related option buttons, check boxes andtoggle buttons is known as _____________

    In MS-Access, the function that gives the currentdate is _____________

    ______allows to create a filter by typing the value ina data sheet

    The wild card representation for any 5 letter wordthat starts with ram is ________________

    ____is an access object that displays un-editabledata

    _____option from the new object toolbar gives the

    easiest way of generating a report

    Changes of one table can be carried over to anotherrelated tableHyperlinks are used to jump to any kind of information or data from a file

    The memo field can have text upto_____ charactersin lengthIn MS-Access, columnar layout can be used to viewmultiple records in a formIn MS-Access, alter command may be used inadding a primary key to a table

    Update query is used to add records from one ormore tables to the end of an existing tableIn ms-access, datasheet view is available in

    ___________ ______are used to jump to any kind of informationfrom a datasheet or a formHome page will always be present as a first page of an application

  • 8/6/2019 Cs Aptech Questions

    17/164

    true false

    Insert Records

    true false

    true false

    alternate keys composite keysOLE object is a data type in access true falseData displayed in forms cannot be edited true false

    true false

    true false

    In MS-Access long integer is a datatype true false

    null not null

    true false

    true false

    true false

    true false

    _________ of the following is/are a type of chart pie bar

    true false

    true false Text boxes cannot be bound controls true false The default query invoked by ms-access is update query select query

    true falseList box is a control that offers a list of choices true false

    inner join outer join

    true falseLine is a tool box control true false

    Text boxes can be part of a option group true false _____ chart exists as a separate object freestanding embedded

    true false

    Wild card characters are used for sorting records true false

    Make table queries create a new table from therecords of another tableIn ms-access, to protect a database file from illegalaccess, we may set database password. The optionof setting database password is available in _______ menu

    Foreign key is a field that uniquely identifies eachrecord and accept no null valuesData definition queries are used to create or changedatabase objects

    The attributes of a composite key are known as ________

    A sub form is used to display one to manyrelationship between tablesWe can switch from datasheet view to form view byselecting view -> form view option

    In MS-Access, while designing a table for aparticular field, the Required parameter is set toyes. This validates the field as _______ Sorting is applied to select only some particularrecordsFilter by form can be created from a forms shortcutmenuAdvanced filter uses a filter similar to the querydesign window to create a filter? Wildcard character represents any number of characters

    A bound control is tied to a underlying query ortableA calculated control uses expression as a source of data

    A control can be bind to a record using row sourceproperty

    If a table is joined to itself it is called a ________________

    A picture box combines the activities of both a textbox or a list box

    Filtering data is a way of arranging data in ameaning full order

  • 8/6/2019 Cs Aptech Questions

    18/164

    true falseReports are used to represent un-editable data true false

    Relationship is an association between _________ forms reports

    true false

    delete insert

    true falseEmbedded charts exist separately true false

    use hyperlink use import

    true falseDetail section has a header and footer true false

    true false

    true false

    true false

    true false

    true false

    & #

    true false _____ header is a unique feature of reports page detailChart can either be a form or a report true false

    true false

    true falseCharts can be produced without the wizard true false

    true false

    relational list The default data type of VB is integer true false

    Pivot tables are used to navigate to the other tablesin a database

    In MS -Access, the records in a table are sortedbased on _________

    the first field of the table

    the last field of the table

    Summary options dialog box is used to summarizedata

    ______ queries can be used to delete a group of records that meet some specific recordsCharts can convert numerical data in a easilyunderstandable format

    From ms - access, if we want to view the recordsstored in a table in ms - excel worksheet, we needtoPage header is present at the beginning of each

    record

    A macro is performed only when the user initiatesan event

    The macro is selected from the action field of amacro sheetA macro can be made to execute before the startingof a databaseIn MS-Access. While appending records, the sourceand the target table must have similar structure andfields

    We can add our own functions to the expressionelements list box of the expression builder

    _______is the wildcard character which representsthe presence of any number of charactersMacros can be used to add a menu to a databaseobject

    Group header will be present at the design view of areport even if the report is not groupedWe can change from the design view to the form

    view without being prompted for saving the changesmade

    Macros can be used to create user defined errormessagesBetween and Not Between is ______ type of operators

  • 8/6/2019 Cs Aptech Questions

    19/164

    Visual Basic is based on __________ action language

    report form

    In access OLE objects cannot be linked true false

    _____ section is present for each record in the report group record

    data property

    true false

    true false

    _______are forms that are included in other forms sub forms child forms

    graphs chart

    A field with a _______ uniquely identifies each record number primary key

    pivot create

    filters queries ______ control need not have a data source form bound

    list box combo boxMS access is a DBMS true false

    form name control ______ forms displays field in single row tabular form chart form

    sub forms tabular form

    calculated bound _______ control is tied to field calculated unbound

    sub form auto form

    set relation connect

    filter by form filter by report

    form report

    clipboard file

    structured querylanguage

    _______is the name of the database object thatdisplays data and can be used to edit data

    A ________ sheet lists all the properties that pertainto the form or the controls

    Textboxes can also be an example of unboundcontrolIn MS-Access, we may design command buttons fornavigating records

    _______ are used to represent our data in graphical

    format

    Large amount of data can be summarized using ______ tables _______ are employed to select only some particularrecords from a database object

    ______ control combines the functionality of both atext box and a drop down list

    A form can be bind to a record source using _____

    property of the form

    ______ forms are usually used for tables with one tomany relationship

    _______ control uses an expression as a source of control

    _______is the form that can be created withminimum input from the user

    ______option from the tool menu is selected forsetting relationships between tables

    ______,______and_____are the buttons belonging tothe options group

    option, toggle

    and commandbuttons

    command

    button, checkand list boxes

    _________allows us to create a filter from a fieldshort cut menu

    ________is a database object which displays data butcannot be used to edit dataWhat term applies to a collection of related recordsin a database?

  • 8/6/2019 Cs Aptech Questions

    20/164

    search sort

    What is a database?

    What does a record contain?

    An RDBMS is a remote DBMS relative DBMS

    Data Warehousing refers to

    Key verification

    What is a report?

    What is the best way to analyse and change data

    CHANGE TABLE MODIFY TABLE

    Number Description

    using a password

    the product code the primary key

    All of the following terms are related tocomputerized databases except which one?

    A way to analyseand manipulatenumerical

    information

    A tool to producehigh quality

    documents

    Information aboutcertain programs

    It contains allthe data aboutone specific item

    storing dataoffline at aseparate site

    backing up dataregularly

    Unauthorised alteration of on-line records can be

    prevented by employing

    Computer

    sequence checks

    Reports allowusers to extractinformation ashard copy(printed output)

    Reports providea very flexibleway of creatingand editingdocuments

    Extracting andanalysing data

    Spreadsheetsmake data easyto analyse

    What are some popular office orientated softwareapplications?

    Compilers,interpreters,editors

    Networksoftware, backupsystems

    Which of the following constraints can be used toenforce the uniqueness of rows in a table?

    DEFAULT andNOT NULLconstraints

    FOREIGN KEYconstraints

    Which of the following commands is used to changethe structure of table?

    You are creating a client application that callsActiveX DLLs. Which of the following properties of

    the Err object provides the name of a componentthat sends an error back to the client application?

    This database holds personal information. The usercan help to keep it confidential by

    keeping abackup copy

    If the database holds customer names andaddresses, personalised letters can be createdautomatically using

  • 8/6/2019 Cs Aptech Questions

    21/164

    A database Graphics

    bookmarks operators

    Auto Primary Auto ID

    Referential integrity ensures that the:

    Tables are related to one another through a: foreign key.

    A foreign key is:

    One-to-one One-to-many

    EmployeeID CompanyID

    What is required of the fields that join two tables?

    Application software suited to storing the surveyinformation obtained in the table would be

    The characters * and ? are sometimes used insearch criteria asWhich of the following field types will generate theprimary key automatically?

    records in adynaset areconsistent withthe underlyingtables.

    related tables ina database areconsistent withone another.

    main form and asubform.

    the primary keyof both relatedtables.

    the primary keyof the relatedtable.

    You are creating a banking database to trackcustomer loans. The bank will, of course, have manycustomers, each of whom may take out one or moreloans, while each loan may be associated with onlyone customer (there are no joint accounts). What isthe re

    In a one-to-many relationship between Companiesand Employees, which field is found in both tables?Which of the following ensures that records inrelated tables are consistent with one another? Forexample, it ensures that you cannot add a record

    with an invalid foreign key.

    The Tools menu,Relationship

    window

    Referential

    integrity

    How would you delete a relationship between tablesin the Relationships window?

    Double click theRelationship line

    Right-click theRelationship line,then selectDelete from theshortcut menu

    In a Customers tables, what does a plus sign next tothe CustomerID field mean?

    That there areseveralcustomersassociated withthat ID

    That some of thedata is notviewable

    They must bothbe numbers

    They cannot betext fields

  • 8/6/2019 Cs Aptech Questions

    22/164

    # M

    Dim CreateList. Sub CreateList.

    A text field:

    The purpose of a database is to:A database stores: data. relationships.A database records: facts. figures.

    Assume a one-to-many relationship between theCustomers table and the Loans table, withreferential integrity in effect. What happens whenyou attempt to delete a customer ID from theCustomer table that still has entries in the Loanstable?

    Nothing, Accessignores theattemptedcommand.

    The customersID is deletedfrom theCustomers table.

    Which of the following is true when viewing a mainform and its associated subform in the Form Designview?

    The subform isnot visible.

    The subform isdisplayed inDatasheet view.

    Which of the following relationships does not belongin a database based on a professional sports leaguesuch as football or basketball?

    A one-to-manyrelationshipbetween teamsand players

    A one-to-manyrelationshipbetween teamsand coaches

    Which symbol is used at the end of the join line in arelated table to signify the many side of a one-to-many relationship?

    You have created a one-to-many relationship withreferential integrity between a Customers table anda Loans table. From which table can you delete a

    record?

    Either table at

    any time

    The Customerstable only whenthere are Loanrecordsassociated with

    that customer The correct order of the arguments for the MsgBoxstatement is:

    prompt, title bartext, icon.

    prompt, icon,title bar text.

    The first statement in a procedure named CreateListis:

    Which of the following is TRUE related to formfields?

    A check boxenables the formuser to choosefrom one of several existingentries.

    A text fieldenables the formuser to choosefrom one of several existingentries.

    must be set forone word.

    must be set formultiple words.

    help people keeptrack of things.

    store data intables.

  • 8/6/2019 Cs Aptech Questions

    23/164

    Jet SQL Server

    The user

    In an enterprise-class database system ________ .

    creates queries creates form

    the user

    holds user data holds metadata

    data marts normalization

    data marts normalization

    A sales contact manager used by a salesperson isan example of _______________

    single-userdatabaseapplication

    multiuserdatabaseapplication

    A Customer Resource Management (CRM) system isan example of_________

    single-userdatabaseapplication

    multiuserdatabaseapplication

    The industry standard supported by all major DBMSsthat allows tables to be joined together is called

    __________.Sequential QueryLanguage (SQL)

    StructuredQuestionLanguage (SQL)

    A program whose job is to create, process andadminister databases is called the _____

    DatabaseModeling System

    DatabaseManagementSystem

    Microsoft Access may use which of the followingDBMS engines?

    Which of the following are basic components of anenterprise-class database system?

    The databaseapplication

    the databaseapplication(s)interact(s) withthe DBMS

    the DBMSaccesses thedatabase data

    In an enterprise-class database system, thedatabase application ___ .

    In an enterprise-class database system, reports arecreated by ____________________ .

    the databaseapplication

    A database is considered "self-describing" because _______ .

    all the users' datais in one place

    it reduces dataduplication

    In an enterprise-class database system, thedatabase _________ .

    A database designed using spreadsheets from theSales department is a database being designed

    _________________________ .from existingdata

    as a newsystemsdevelopmentproject

    A database designed to implement requirements fora reporting application needed by the Salesdepartment is a database being designed _______ .

    from existingnon-databasedata

    as a newsystemsdevelopmentproject

    A database designed to combine two databases

    used by the Sales department is a database beingdesigned _________________________ .

    from existingdata

    as a newsystems

    developmentproject

    Database professionals use ________________ asspecific data sources for studies and analyses.Database professionals use a set of principles called

    ________________ to guide and assess databasedesign.

  • 8/6/2019 Cs Aptech Questions

    24/164

    data marts normalization

    data marts normalization

    file managers

    In a relation __________________________ .

    table relation

    record field

    record field

    record field

    composite key primary key

    Insertion anomaly Update anomaly

    dirty data inconsistent data

    A very popular development technique used bydatabase professionals for database design isknown as _______________________ .

    A very popular development technique used bydatabase professionals to adopt a database designto new or changing requirement is known as _____ .

    The predecessor(s) of database processing was(were) __________ .

    hierarchicalmodels

    entities in acolumn vary as tokind

    the order of thecolumns isimportant

    An attribute is also known as a(n).

    A combination of one or more columns used toidentify particular rows in a is___ .A combination of two or more columns used to

    identify particular rows in a relation is________ .A determinant that determines all the othercolumns in a relation is______ .

    When designing a database, one of the candidatekeys in a relation is selected as the _________ .Normalization is a process used to deal with whichof the following modification anomalies?

    When you are given a set of tables and asked tocreate a database to store their data, the first stepis to ____ .

    assess theexisting tables'structure andcontent

    design thedatabasestructure

    Modern microcomputer personal DBMSproducts______.

    are supplied byseveral well-establishedmanufacturers

    were essentiallykilled off by MSAccess

    Which of the following are true about data miningapplications?

    They usesophisticatedmathematicaltechniques.

    Their reportdelivery is moredifficult thanreport deliveryfor reportingsystems.

    We have obtained access to the company'soperational data. We examine 50 records forcustomers with phone numbers that should use thecurrent area code of 345. Of these 50 records, wefind 10 that still use an older area code of 567. Thisis an example

  • 8/6/2019 Cs Aptech Questions

    25/164

    dirty data inconsistent data

    Form Table

    Import Link

    What makes a database an application?

    Menu Wizard Build Menu

    The purpose of a data warehouse is to:

    We have obtained access to the company'soperational data. We have been asked to produce areport with an item by item analysis of sales, butthe only sales figure available is the total sale valuefor each order. This is example of_____

    A data warehouse database differs from anoperational database because:

    data warehousedata are notstored in tables.

    data warehousedatabases do nothave metadata.

    Which of the following objects is used to display amenu?Which of the following objects are NOT found in anAccess application?

    Forms andreports

    Queries andtables

    You are developing an Access application that youexpect to upgrade periodically. Which of thefollowing statements is TRUE?

    It will be easierfor the user toupgrade it if theobjects andtables are in onedatabase.

    It will be easierfor the user toupgrade it if theobjects are inone databaseand the tables inanother.

    Which of the following statements regarding Accessapplications is NOT true?

    The Link Tablescommand can beused to associatethe tables in onedatabase with theobjects in anotherdatabase.

    An applicationmay consist of multipledatabases, eachwith multipleobjects, linked toyet anotherdatabasecontaining onlytables.

    Which of the following brings a copy of the tableinto the current database and does not maintain atie to the original table?

    It contains morethan one table

    It containstables, reports,queries, andforms

    What is the Access tool that is used to create the

    user interface?

    create backupsfor missioncritical corporatedata.

    centralize themanageability of data collection.

  • 8/6/2019 Cs Aptech Questions

    26/164

    Digital Sign

    Hash Function Digital Signature

    Hash Function Hash Value

    CA stands for ________________

    True False

    True False

    Server Certificate

    Server Certificate

    Private Certificate Repositories

    True False

    True False

    CRL stands for

    ___________ means the result of applying to specificinformation certain specific technical processes.

    DigitalCertificate

    __________ is an algorithm which creates a digitalrepresentation or "fingerprint" in the form of a "hashresult".

    __________ is of standard length which is usuallymuch smaller than the message but neverthelesssubstantially unique to it.

    Digital Signature involves two processes. They are ___________ and __________.

    Digital Signaturecreation

    Digital SignatureVerification

    The Costs of Digital Signature consists mainly of thefollowing

    InstitutionalOverhead andSubscriberRelying PartyCost

    SubscriberRelying PartyCost

    Certification

    Authority

    Certified

    Authority

    A Digital Certificate is issued by a CertificationAuthority and is signed with the CA's Private Key

    A Digital Certificate does contain Owner's PublicKey, Owner's name, Expiration date of the PrivateKey, Serial number of the digital certificate

    ______________ enable web servers to operate in asecure mode.

    DeveloperCertificate

    ______________ are used by individuals when they

    exchange messages with other users or onlineservices.

    DeveloperCertificate

    ______________ are on-line databases of certificatesand other information available for retrieval and usein verifying digital signatures.

    Signing Writings serve the following generalpurposes______,_______,_______ and _______

    Evidence,Ceremony,Approval

    Approval,Evidence

    The most widely accepted format for DigitalCertificate is defined by the CCITT X.509

    A certificate may prove to be unreliable, such as insituations where the subscriber misrepresents hisidentity to the certification authority

    CertificateRevocation List

    CertificateResource List

    The prospective signer identified in the digitalcertificate holds the_________ and is called the

    ___________ Private Key,Subscriber

    Public key,Recipient

  • 8/6/2019 Cs Aptech Questions

    27/164

    ANSI UN/EBCDIC

    batch files interchange sets

    Smart Card Embedded cards

    E-cash Digital Cash

    The network based technology is/are ____________ EDI E-mail

    True False

    Value Added Network is an example of _________ Global Network Private Network

    Broadcast Junk mail

    E-mail Bulk-mail

    Catalog Endorsement

    The most beneficial advantage of ERP system is Error checking Data Integration

    In EDI interface, the translation service receives _________ as incoming files from the communicationservice

    Internal FormatFile

    External FormatFile

    The EDI standardisation for International Trade andCommerce is introduced by __________ In EDI, the transmission files are composed of different sets of external format files which aregrouped into multiple sets under the name of

    ________ The ________________ are pre-paid credit cards thatinclude an embedded cards

    ________________ are another form of credit paymentthat lets customers use digital online cheques topay Web merchants directly

    In Active advertisement, there are two types of models. They are _____ and ________

    Billboards and Junk Mail

    Online Catalogand Billboards

    Decryption is a process employed for scrambling of plain text for web based transactions

    Asymmetric cryptosystem is based on __________ and ____________

    Login_Id andPassword

    Primary Key andPrivate Key

    The advertising strategies emerging in the on-lineworld are ____________

    Active or pushbased advertising

    Passive or pull-basedadvertising

    The _________ model use direct mail, spot televisionor cable television, in active based advertisement.

    The ________ is a form of mail that is not targeted toa specific audience

    The __________ model refers to information that isplaced at a point where it will be noticed bycustomers in the course of other activities and doesnot require active search

    What is the term that describes spying on onesbusiness rivals to gain a competitive advantage?

    Competitiveespionage

    Corporateespionage

    What would you NOT be looking for when spying ona competitor?

    A list of competitorsclients

    Contact numbersof themanagementgroup

    An online drugstore such as Drugstore.com is anexample of_______

    single-userdatabaseapplication

    multi-userdatabaseapplication

  • 8/6/2019 Cs Aptech Questions

    28/164

    cell reference row reference

    text files Lotus 1-2-3

    serial values domain values

    =today() =date()

    dollar sign ' = ' sign

    AutoSum AutoFill

    variables arguments

    text logical

    concatenate pmt

    countif vlookup

    pivot table wizard chart wizard

    sumif pmt

    average sum

    page setup print area

    autoformat AutoFill

    Which of the following is an example of unacceptable online netiquette?

    Replyingpromptly

    Keepingmessages short

    Which of the following statements is correctconcerning the security of messages in anelectronic data interchange (EDI) system?

    Removable drivesthat can belocked up at nightprovide adequatesecurity when theconfidentiality of data is theprimary risk.

    Messageauthentication inEDI systemsperforms thesame function assegregation of duties in otherinformationsystems.

    The wizard that is used to import text filesis_________________

    text importwizard

    convert text tocolumns wizard

    The alphabet indicating the column followed by therow number is known an__________

    Which of the following files could not be opened inexcel _______________ In excel, the dates that are stored as sequentialnumbers known as ________________-

    The command to display the current date in a cell is _________________

    In excel, absolute references are represented by a ________ before the column and row addresses The ________ can be used to select the function andassemble the arguments correctly

    Specific parts of information required by functionsto perform certain tasks are called as___________

    Which of the following do not belong to the formulacategory in excel environment__________

    The function that in used to join cell values togetherin a single cell ________

    The function that is used to count all the values thatmeet specific criteria _________

    The wizard that is used to create and edit charts _______________ The function that is used to calculate the payment

    for specific loan terms ____________

    The function that is used to add together all valuesthat meet specific criteria is known as ____________

    The __________ option present in the file menuoptions is used to specify major facts of the page tobe printed

    The command that is used to apply a formatautomatically __________

  • 8/6/2019 Cs Aptech Questions

    29/164

    bordering formatting

    page setup print area

    filtering searching

    all option blanks

    The URL for encyclopedia Britannica is_________ www.ency.in www.eb.com

    URL DNS

    Internet can be defined as _______ internal network

    application layer transport layer

    finger service ping service

    FTP TELNET

    URL stands for ____________

    IN an URL the word before the color refers to _______ host computerA ______ always begins with a slash message schemeProdigy is run by IBM and ______ Delphi Microsoft

    net web

    Gopher and WAIS enables the user to ______ browser

    spy mosaic

    gophering gopherspace

    Alta vista open text

    finger server ftp server The web maps are called _______ list directories

    Directories consists of _______ levels no maximum of five

    middle lower

    hotlist directory

    _______ searches by keywords infoseek excite

    The ____________ makes the information in aworksheet meaningful and easy to understandA particular part of a work sheet can be printed bysetting the _________

    The process of finding or selecting information isknown as ____________

    The option that is used to cancel the filter processfor a specific column and display all the records is

    ________

    _______ maps IP addresses with the domain namesof the sites

    network of network

    The most important service of the ______ is tomanage traffic control

    _________is a program that displays information

    about a host connected to the net _______ is a program or a tool that helps in locating afile anywhere on the net

    uniform researchlocator

    uniform resourcelocatorname of theresource

    The World Wide Web is referred to shortly as the _______

    read the Usenetnews

    ______ is the program used to run CompuServe'sregular services

    CompuServeinternet dialer

    Navigating through the menu of gopher is calledmoving around _______

    The directories that come with built-in engines areyahoo,lycos and ______

    To use the finger command,SLIP users must run aprogramme called______

    The _____ level gives the broadcast overview of thenet

    The huge list of keywords from important items iscalled ______

    The two types of search in veronica are _____ and ______

    directorysearch,indexsearch

    indexsearch,menusearch

  • 8/6/2019 Cs Aptech Questions

    30/164

    netshark cello ______ supports one button publish lynx mosaicSPY MOSAIC is distributed by_______ Microsoft internet

    Usenet finger service

    HTTP is the acronym for __________

    iccp ftp

    yahoo ftp

    TCP/IP stands for ________________

    one two

    ftp servers

    TIA stands for_____ in internet

    browser protocol

    ________ is used to link pages in the world wide web

    FAQ stands for ______

    SLIP,PPP TCP,IP

    connection response

    WSIRC stands for______

    Two of the important browsers are_____ and_____ lynx,minx netscape,ie

    glossary index

    Mosaic displays links in color whereas _____ does notdisplay links in color

    ______ is a program that helps us to log on to othernetworks

    Higher texttransfer protocol

    Hyper texttransmissionport

    ______is used to transfer and copy files over theinternet

    _____ is a program that helps us to log on to othernetworks

    transfer controlprotocol/internet

    transmissioncontrolprotocol/internetprotocol

    Archie servers can be accessed in_______ different

    ways in internet _______is the computer on the internet thattranslates between the internet domain names andthe internet numeric address

    domain nameservers

    the internetadapter

    the internetadministration

    Service indicates the name of the ________ used toaccess data, present on the other end of the link.

    universalresource locator

    uniform resourcelocator

    frequent askedquery

    frequently askedquestion

    The internet adapter is a programme that makesour connection act like a _____or a ____ account

    The step involved in Communicating between theweb clients and servers is ______________

    wide search forinformation andresearch

    windows socketsinternets relaychat

    Lynx is a _______ programme that works withterminals

    world wide webserver

    world wide webclient

    The huge list of keywords from important items iscalled an_____

  • 8/6/2019 Cs Aptech Questions

    31/164

    VERONICA is an acronym for _______________

    protocols IP address

    ______and_____ are web searching features ftp and finger

    WINWAIS has two source lists namely____ and______ allsrc,winsocks wais,allsrc ________ is also called as WAIS manager allsrc waisman

    hot links hyper text

    images applets

    first page home page

    GNN stands for______ _____ is the most popular internet service yahoo service electronic mail

    newsgroup telnet

    Lycos catalog point review

    apple link bitnet

    BABEL consists a glossary of _____

    Yahoo,lycos,excite and webcrawlers are _____ search engines web directories

    GIF is the acronym for ____________

    very easy androdent orientednet wide index tocomputerizedarchives

    very organisednetworkintegration andcommunicationapplication

    The first freenet is created at the_____ and iscalled______

    university of berkeley,berkeleyfreenet

    university of cleveland,cleveland freenet

    ________ are defined as ways of communicationamongst networks

    searchengines,directories

    The system of interlinked documents is knownas_______

    The small programmes that createanimation,multimedia,real-time games and multiuser games are called______

    The information displayed on the web pageincludes______,_____ and_____

    graphics,videos,audio

    programms,images,text

    The web pages that represent online home of theirauthor are called______

    global networknews

    global networksnavigator

    The online service offered by navigator gold 2.0 are _______ and_____

    email and netconference

    Netscape pagestartersite,netscapepage wizard

    _______ is a program or a tool that helps us find a fileanywhere on the net

    The databases to enable keyword search usingLycos are a2z,_______

    ______ is a large worldwide bulletin board servicenetwork

    computer relatedabbreviations and

    acronym

    biographical

    information

    Dictionaries,encyclopaedias,government and otherreferences are found in ______

    encyclopediaBritannica

    on-line referenceworks

    Graphicalinterpreterformatting

    GraphicalinterchangeFormat

  • 8/6/2019 Cs Aptech Questions

    32/164

    JPEG is the acronym for ___________ The Web aids users to explore the ________ mails documents

    netscape,ie,lynx

    The World Wide Web consists of _________ information web pages

    BACKGROUND COLOR

    Network Interface

    Current web page Browser

    Browser/user Server

    A hyperlink can be on ___________ text only image onlyHTML was derived from _________ SQL PLSQLSGML is a _________ alphalanguage betalanguage

    PINE stands for _____________ palm is not elm

    SGML ProcessorWeb is a collection of ___________ web sites images

    IETF stands for ________

    text

    hyperlink hypertext

    in random order

    first start

    .bmp and .gif .bmp and .jpeg

    The components of a URL are ___________

    Joint PicturesExpert Group

    Jumbled picturesexpert graph

    The three most popular mailer are_____,_____ and______

    yahoo,infoseek,altavista

    In Microsoft Internet Explorer, the color of the textcan be specified using _________ attribute of the fonttag.

    The interface that provides effective communicationbetween the web browsers and servers is _________

    Communicationgateway interface

    CommongraphicalInterface

    CGI is the _________ between web browsers andserversCGI programs are invoked based on the informationprovided by the _________

    A CGI program is usually called after a requestmade by the _________

    palm is noteatable

    The application that confirms whether a documentis compliant to its DTD is _________

    SGMLPreprocessor

    Internetequipmenttraining faculty

    InternationalEngineeringtrainers andfaculty

    The two major browsers used to surf the Internetare ________,_______

    MS InternetExplorer andMosaic

    NetscapeNavigator andMosaic

    Special characters allow browsers to display _________________

    data from adatabase

    The keyword for providing links within or acrossdocuments is____________

    Stringing pages together using hypertexttechnology helps view pages _______________

    in sequentialorder

    The initial web pages present in a web site is the ________ page. The image format supported by most browsersis________________.

    Service,hostname anddirectory path

    service,hostname,port,directory-path

  • 8/6/2019 Cs Aptech Questions

    33/164

  • 8/6/2019 Cs Aptech Questions

    34/164

    Accessing files using FTP servers is called_____ file access anonymous ftp

    PAN,NAN,AAN KAN,RAN,VAN ________ is in between LAN and WAN VAN MAN _____ can be owed by multiple organisation LAN MANData is transmitted in the form of_____ signals analog digital

    DTD stands for __________

    Modem stands for __________________

    Mapping Modulation

    SLIP stands for ________________

    PPP stands for _____

    Bandwidth Speed

    Find Save

    Recipient Party Relying Party

    Public Key Private Key

    E-mail

    The point to point channel network is also called as _____ and_____

    point to pointnetwork andbroadcastchannel network

    packetswitching,storeand forwardnetwork

    The three most commonly used networksare______,______ and______

    Data typedefinition

    Define type of data

    Moralize/demoralize

    Modulation/demodulation

    ______ is the process of the digital signals beingconverted into a form suitable for analog

    transmission

    ________ and______ are two basic ways of gettingconnected to the internet

    Satellite link anddigital signals

    Dedicatedaccess and dialup access

    Standard longinternet protocol

    Stream lineinternet protocol

    Prime prolongedprotocol

    Point to pointprotocol

    Which of the following best describes uploading

    information?

    storing data on a

    disk drive

    sendinginformation to a

    host computerA characteristic of a communication channel that isthe amount of information that can be passedthrough it in a given amount of time, expressed inbits per second.

    The act of searching through storage to locateinformation without necessarily knowing of theexistence of the information being sought.

    A "recipient" of the certificate desiring to rely upona Digital Signature created by the subscriber namedin the certificate is called the ____________

    The Relying Party can use the ___________ listed inthe certificate to verify that the digital signaturewas created with the corresponding _________

    Digital Signatures are used for a variety of Electronic Transactions like ________________________

    ElectronicCommerce

  • 8/6/2019 Cs Aptech Questions

    35/164

  • 8/6/2019 Cs Aptech Questions

    36/164

  • 8/6/2019 Cs Aptech Questions

    37/164

    Decryption SSL There are _________ types of data tables 1 2

    data table filtered table

    pivot table wizard chart wizardIn a chart Y-axis is known as_________ series or rank categoryIn a chart X-axis is known as_______________ series or rank category

    series or rank category

    series or rank category

    column chart bar chart

    The chart that holds the column chart is _________ column chart bar chart

    column chart bar chart The chart that is used to display discrete data column chart bar chart

    _________ are not allowed in a macro name spaces

    excel97 internet explorer

    pivot table wizard chart wizard

    line chart bar chart

    true false

    and or

    3-dimensions 4-dimensions

    true false

    Data table Pivot table

    The ____________ is the process of encodinginformation to prevent it from being read byunauthorized parties

    The tables that allows the user to change orrearrange the data, summarize the data andevaluate the data using changing points of view isknown as

    The wizard that is used to suggest hints for doing atask

    _________ is a set of tables that describe each of thedata series

    ________ is used to differentiate one data series fromanother

    The chart that contains only one data series is _________

    The chart that display two or more data series on asurface is _________

    wild cardcharacters

    Which of the following tool cannot be used to viewthe excel web page_______

    The wizard that used to build an interactive tablefrom data existing on sheets

    The chart that is used for displaying stock market

    information

    In excel, the subtotal command also generatesgrand total after the last group subtotal_________ In advanced filter , the criteria occupying multiplecolumns but more than one row, is considered as an

    ________ criteria. The stacked bar graphs can be represented in __________ A pie chart can represent only one data series at atime

    The ______ generates a summarized report in

    tabular form in an interactive manner

    Which one of the following statements related tostock chart is NOT TRUE ?

    It is also called ashigh-low-closechart

    It shows trendsover time

  • 8/6/2019 Cs Aptech Questions

    38/164

    Pivot table

    Goal seek

    Goal seek Pivot table

    Workbook Worksheet

    Spreadsheets are useful for _______________

    Column field Row field.Excel allows upto ______ levels of sorting two three

    true false

    3-dimensions 4-dimensions

    Data table Pivot table

    Count.A workbook consists of many ________ databases records

    Goal seek.

    The state government needs to finalize a five yearsplan to implement 100% literacy in the state. Whichone of the following will be the best tool that shouldbe used to work out the plan ?

    Scenariomanager

    Forecast'99 is a group working on exit poll. It wantsto know how many seat ABC party needs to won intotality to obtain majority to form the government.Which one of the following will be the tool that willhelp the team ?

    Scenariomanager

    Which one of the following will be the tool thatprovides a way to view and compare the results of all the different variations together on theworksheet ?A ___________ is an excel file where the user storeshis data

    Performingcalculations.

    Performingdatabaseoperations

    Which one of the following is NOT the component of the pivot table ?

    Filtering rearranges a list to display the requiredrecords

    The stacked bar graphs can be represented in _____________ The ______ generates a summarised report intabular form in an interactive manner

    Which one of the following statements related tostacked bar chart is NOT TRUE ?

    It displays thedata series oneon top of theother.

    It is useful whenseveralcomponents arechanging andthe user isinterested in thesum of thecomponents.

    Which following function is used in subtotal option ? ______________

    Standarddeviation

    Which two of the following statements related topivot table are TRUE ?

    It is a tool forsummarizing andanalyzing thedata records in aninteractivemanner.

    It is a tool thatprovides a wayto view andcompare theresults of all thedifferentvariationstogether on theworksheet

    Which one of the following is NOT a What-if analysistool ?

    Scenariomanager

  • 8/6/2019 Cs Aptech Questions

    39/164

    worksheet workbook

    On an Excel sheet the active cell is indicated by A dotted border

    8,16,32 2,4,2

    word processing graphical

    Range Address

    Spreadsheets can be used for... Producing graphs Writing letters

    To select a column the easiest method is to

    ENTER CTRL + ENTER

    array. function.

    100 (201)555-1212.

    Cell references Functions

    ^ /

    B5*B6 C3/D4

    E12 6

    The _________ wizard separates contents in a cellinto different cells

    text importwizard

    convert text tocolumns wizard

    A spreadsheet is a grid of rows and columns and iscalled as a ________ Pick out the window that is not a form of excel

    ___________

    application

    window

    document

    windowA dark wideborder

    Cell A4 =2 and A5 = 4. You select both cells anddrag the fill handle down to A8. The contents of cellsA6, A7, and A8 are _____.

    If a cell shows ####### , it means that _____.your formula hasa syntax error

    the row is tooshort to showthe number atthe current fontsize

    Which is not an advantage of using computerized

    spreadsheets?

    ability to

    generate tables

    speed of

    calculation

    The gym teacher has a new program to calculatephysical fitness in terms of weight and exercise. Theuse inputs different weights or amounts of exerciseto determine the related physical fitness. This "Whatif" program is most likely which of the followin

    The difference between the highest and the lowestvalues.

    double-click anycell in the column

    drag from thetop cell in thecolumn to thelast cell in thecolumn

    If you press _____, the cell accepts your typing as itscontents.

    The contents of cell C15 is =AVERAGE(C3:C14).AVERAGE(C3:C14) is known asAll of the following are considered constantsEXCEPT:Which of the following may NOT be included in a

    formula?Which of the following is NOT a valid mathematicaloperator in Excel?Given the formula =B5*B6+C3/D4^2, whichexpression would be evaluated first?

    Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?

  • 8/6/2019 Cs Aptech Questions

    40/164

    It is blinking.

    How can you change the active cell?

    File Edit

    Preview Details

    Insert Delete

    Clear Delete

    Options Page Setup

    worksheet. range.Which of the following is a valid cell range? 6 D12, G25

    copy range.

    paste range.

    absolute relative

    B4 $B4

    #DIV/0! #DIV/0!

    How can you tell which cell in a worksheet is theactive cell?

    It is surroundedby a heavyborder.

    By clicking in adifferent cell

    By using thearrow keys tomove to adifferent cell

    Which of the following would you use to change thefont size of a cell in Excel?

    The Standardtoolbar

    The Formattingtoolbar

    The command that will save the current workbookwith a different file type is:

    the Newcommand on theFile menu.

    the Savecommand on theFile menu.

    The command that will print an Excel workbook is

    found on the ____________ menu.In the Save As and Open dialog boxes, the

    ___________ view shows the file size as well as thedate and time a file was last modified.

    Which of the following commands will automaticallyadjust cell references in formulas?Which of the following commands will remove cells,rows, or columns from a worksheet?

    Which of the following options is NOT controlledthrough the Page Setup command?

    Orientation(portrait orlandscape)

    Headers andfooters

    Which command enables you to change the marginsfor a printed worksheet?All commands are carried out on a rectangulargroups of cells known as a:

    In a copy operation, the cell(s) you are copying fromis called the:

    destinationrange.

    In a copy operation, the cell(s) you are copying to iscalled the:

    destinationrange.

    Which of the following commands is needed toduplicate the contents of a cell in another?

    The Duplicatecommand

    The Copycommand

    A cell reference that does not change during a copy

    operation is known asWhich of the following is considered an absolute cellreference?

    Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, whatwill be the contents of cell E4?

  • 8/6/2019 Cs Aptech Questions

    41/164

    #DIV/0! #DIV/0!

    The F4 key is used to: edit cells.

    the Fill Handle

    the cell address.

    Jul-30 Aug-31

    the F4 key. the F2 key.

    What will be stored in a cell if 3/4 is entered in it? 03-Apr 0.75

    a variable.

    B1-G10 B1.G10

    Cell E3 contains the function=AVERAGE($A$3:$D$3). If the contents of cell E3are copied to cell E4, what will be the contents of cell E4?

    Which of the following commands is needed to

    transfer the contents of one cell range to another?

    The Move

    command

    The Cut

    command

    copy and pastecells.

    Which of the following quickly copies the formattingof a selected cell to other cells?

    the FormatPainter

    Which of the following will insert a hyperlink into an

    Excel worksheet?

    Select the InsertHyperlinkcommand from

    the File menu.

    Click the InsertHyperlink buttonon the Standard

    toolbar.

    Conditional formatting applies formatting to a cellbased on:

    whether the cellhas a formula ora value in it.

    If you enter a date into a cell, Excel stores the dateas:

    text with a two-digit year.

    text with a four-digit year.

    You created a worksheet on July 30 and entered the=Today() function in cell E17. You opened thatworksheet again on August 31. What will bedisplayed in cell E17 on August 31?

    The number of days between two cells containingdates can be calculated by:

    subtracting theearlier date fromthe later one.

    adding theearlier date tothe later one.

    The function key that is used to quickly edit thecontents of a cell is:

    A users response to the InputBox function can bestored in:

    a cell on aworksheet.

    The cell reference for a range of cells that starts incell B1 and goes over to column G and down to row10 is _____.

  • 8/6/2019 Cs Aptech Questions

    42/164

    AVERAGE COUNT

    Combination Line

    Use tables

    Paste Fill Down

    Tools | Sort Data | SortWhat can you NOT do with a spreadsheet? Analyse data Calculate data

    (D4+C2)*B2 D4+C2*B2

    0

    The default orientation for the printed page is _____. portrait landscapeWhich is not a valid cell address? AD213 ZA1

    The World Wide Web was devised by _________ CERN ECRN

    The useful URL schemes are_____ and______ mailto and files

    The teacher has a spreadsheet showing all Year 10students and their marks in one Mathematics test.

    To find the student with the highest mark, which of the following functions should be used?Which chart type best shows proportions of a

    whole?

    Which of the following is TRUE regarding charttypes?

    Once a bar chartis chosen itcannot bechanged to acolumn chart.

    Once a columnchart is chosen itcannot bechanged to a barchart.

    To select several cells or ranges that are nottouching each other, you would _____ whileselecting.

    hold down theCTRL key

    hold down theSHIFT key

    Your Institute teachers have set an assignment onStudies. You are required to use a spreadsheet torecord all that you study on each day for fourweeks. You decide to show each weeks data withan accompanying graph. What is the best way of doing this

    Create fourseparate files

    What would be the best method to quickly copy theformula from the active cell to each cell below it?

    To arrange rows in alphabetical order based oncolumn A, you need to use the command _____.

    To print just part of a sheet, you would select whatyou want to print and _____ .

    click the Printbutton

    press the PRINTSCREEN key

    The formula that will add the value of cell D4 to thevalue of C2 and then multiply by the value in B2 is

    _____.Which of the functions is not valid for performingaddition

    =A3SUM:B3SUM:C3SUM

    yahoo andinfoseek

  • 8/6/2019 Cs Aptech Questions

    43/164

    BBS stands for______ USENET is a BBS on ____ scale small large

    WINSOCKS is expanded as______ windows socks windows sockets

    Mosaic Yahoo

    buffer cache

    Photography Digital Signature

    Key Lock

    User-id Password

    Penetration Retrieval

    Acts Regulations

    Spoofing ImpostingAn action or event that might prejudice security. Loss Threat

    Malicious software. Utility Pirated software

    None the person who is known as father of Internet Tim Berner Lee Hoffman

    This website is the biggest bookstore on the earth. Etrade.com Amazon .com

    Any Time Money

    Acts Regulations

    The other ways of getting connected to the netare_____

    newsgroups,yahoo andinfoseek

    bulletinboards,mails calland wirelesssystem

    bulletin boardsystem

    businessbroadcastingsystem

    IETF Level 2 HTML DTD supports graphical browserslike _______

    The space used by Netscape to store the retrievedpage is called______

    The principles, means and methods for renderinginformation unintelligible and for restoring

    encrypted information to intelligible form.A long string of seemingly random bits used withcryptographic algorithms to create or verify digitalsignatures and encrypt an decrypt messages andconversations.Protected/private character string used toauthenticate an identity or to authorize access todata.

    The successful act of bypassing securitymechanisms of the system.

    A set of rules and formats, semantic and syntactic,

    that permits entities to exchange information.An attempt to get access to a system by posing tobe an authorised person.

    According to information Technology Act, 2000, Toinvestigate contraventions the controller of certifying authority shall exercise the like powers tothat of

    Sales - taxauthorities

    Income - taxauthorities

    When we talk of Data Transmission modes, thenATM stands for

    Automated TailorMachine

    A sequence of bits or characters that identifies thedestination and the source of a transmission.

  • 8/6/2019 Cs Aptech Questions

    44/164

    The means of communicating between networks Router Gateway

    LAN WAN

    The term HTTP stands for

    A NIC is considered as

    A hub is a device that can connect Only Computers

    What do routers connect?What does a router route? bits frames

    firewall gateway

    One Two

    Which of the following in an OSI layer Physical Layer Data-Link Layer

    RG7U Coaxial cable

    An IP address is a Physical address Logical address

    A cable Hub

    Bluetooth is

    Which is not one of the recognized IEEE sub layers? Physical Layer Data Link Layer

    Binary ASCIIA MAC address is of 48 Bits 48 Bytes

    A group of computers and other devices dispersedover a relatively limited area and connected bycommunication links that enable a device to interact

    with any other on the network.

    hyper terminaltracing program

    hypertexttracing program

    NationalInformaticsCenter

    NetworkInterface cardCan notcomputers

    Which of the following is true concerning thefunction of a switch?

    Concentratesconnectivity

    Combinesconnectivity of ah