Download - CIC
CIC-1(E+H)
CERTIFICATE IN COMPUTING (CIC)
Term-End Examination
June, 20OG
GIG- I : THE CONTEXT
Time : 2 hours Maximum Marhs : 100Note :
(il Do not start answering until the inuigilator ashs you to start.ftil Question paper contains 700 questions. Student is required, to answer all the questions.
There is no choice.(iii) AU questions carry equal marhs.(iu) Each question must be giuen bne answer oruty. If rnore thqn one answer is mqrked, or
giuen, zero mqrh wilt be awarded, for that question.
A Multiple Choice (euestions number I to EO)
Note : Four choices are giuen for a question, oui of which one choice may be correct. Ma,rh correct&nswer in releuant colurnn of the answer sheet giuen to you. In cose.you feel that none ofthe choiees giuen in a question is comect, tnark, in column,0,.
l. In order to be called information, data must be
(1) factual
(2) relevant
(3) news
(4) All of the above
2. is an example of processing activities.
(1) Classifying
(2) Summarizing
(3) Performing calculations
(4) All of the above
C I C - 1 ( E + H ) ( 1 ) P.T .O.
3. Hypertext documents are linked through
(2) TELNET(1) DNS(4) Home Pages(3) Pointers
4. SNMP is a protocol for
(1) File transfer (2) www
(3) Virtual terminal @) Electronic mail
5. ' What does the URL need to access a document ?
(1) Path name
(2) Ilost comPuter
(3) Retrieval method
@) AII of the above
6. is used to build Dynamic Web documents'
(1) HTML
(3) ORACLE
(D CGI
@) All of the above
7. A user can move up and down a Web Page by
(1) !'raming
Q) Linking(3) Scrolling
@) All of the above
g. Which of the following statements is true with regard to distributed data processing
system ?
(1) It does not allow greater flexibility
(2) It is a Profrt earning sYstem
(g) It attempts to capture advantage of'both centralized and decentralized processing
(4) It allows access to data
9. Telnet is a -- which is uscd for logging on to remote computers on the Internet'
(1) Tool
(2) Software Package
(3) Ilardware
(4) Simulator
10. which of the following is an invalid character constant ?
(f) 'a' (D 'b'
(3) '\h' @) 'ln'
C I C - 1 ( E + H ) ( 2 )
11. In C++ the end of string is recognized by
(1) the null character (2) the new line character (\n)
(3) the $ sign (4) the / sign
12, It is rcquired to ovcrload a function in order to
(1) have the same return type(2) have the same number of parameters
(3) perform the same basic function(4) None of the above
13. The programming language f'eature that allows the same operation to be carried outdifferently depending on the object is
(1) Polymorphism (2) Inheritance
(3) Allocation (4) Mangling
14, The most common operation uscd in Constructors is
(1) Addition (D Overloading(3) Assignment (4) Polymorphism
15. Inheritance is a way to
(1) Make general class into more specifrc classes(2) Add features to existing classes without rewriting them(3) Both (1) and (2)
(4) Make specific classes into gencral classes
16. Precedencc determines which operator(1) is evaluated first(2) is not important(3) is fastest(4) operates on the largest number
17. The important consideration when a program is run on a computer is(1) Time complexity(2) Space complexity(3) Time and Space complexity(4) Execution time only
18. The complexity of the following program segment for i = 1 to n DO is
(1) o(n) (2) O(i)' (3)
o(nz) (4) o(iz)
C I C - 1 ( E + H ) ( 3 ) P . T . O .
19. f (n) = O(g(n)) iff there exist two constants C and no such that
( 1 ) l f ( n ) l < C l g ( n ) l f o r a l l n ) n o
( 2 ) l f ( n ) l > C l g ( n ) l f o r a l l r ) r o
( 3 ) l f ( n ) l = C l g ( n ) l f o r a l t r ) D o
(4) l f (n) | < C. lg(n) | for al l n ) no
20. The creditable value for pi (zr) was first computed by
21.
(1) Euclid
(3) Archimedes
greater tnat d4.3
(1) Jungis theorem
(3) Euler's theorem
22,, For every integer n greater than 2
(1) (n!)2 > nn
(3) (n!)2 > n'
(2) Euler
(4) Fermat
states that every finite set of points of span d has a spanning circle number
Q) Morley's theorem
(4) Pythagoras theorem
(2) (n!)2 < n^
(4) (n!)2 < n'
23. An integer number is said to be prime if it cannot be expressed(1) as the product of two (or more) factors each smaller than itself(2) as the sum of tWo (or more) factors each smaller than itself(3) as the product of two (or more) factors each larger than itself(4) as the sum of two (or more) factors each larger than itself
24. Which of the following is a complex problem ?
(1) Weather forecasting (D Generic defects(3) Earthquake prediction (4) All of the above
25. Morley's theorem deals with
(1) Spanning circles
Q) Irrational numbers(3) Intersection of angle trisectors of a triangle(4) Prim's numbers
26. Information differs from data as
(1) Information is processed data
Q) Information is collected data(3) Information is raw data(4\ All of the above
C I C - 1 ( E + H ; ( 4 )
27.Theda i Iyprocess ingofcor rec t ions tocus tomeraccounts is thebes texampIe for
(1) Batch processing (2) Real-time processing
(3) Time sharing @) Off-line processing
2g. which of the following types of processing produces output results immediately after input
data are entered into a computer system ?
(1) Time sharing
(2) Interactive
(3) Batch Processing(4) Real-timeProcessing
29. Time during which a job is processed by the computer is
(1) DelaY time (2) Execution time
(3) Real-time (4) Down time
30. includes E-mail, Voice mail' faxing and Web publishing'
(1) Electronic mail
(2) Electronic conferencing tools
(3) Electronic communication tools
(4) Discussion forms
31. CBIS stands for
(1) Common Business Information Systems
(2) Computer Based Information Systems
(3) Central Board of Information Systems
(4) All of the above
32. For browsing the Internet we make use of
(1) Navigator GoId Q) Linux
(3) Editor (4) Protocols
33. Which of the following is not a type of computer facility ?
(1) Decentralized Q) Centralized
(3) De-distributed G) Distributed
34, The advantages tlf Centralized Data Processing are
(1) the methods and equipment can be standardized
Q)serv icesofmorecompetentandtechn ica l l yqua l i f redpeop lecanbetaken
(3) duplication of activities can be avoided
(4) All of the above
c t c - 1 ( E + H ) ( 5 ) P ' T ' O '
35. The major advantage of data hiding is(1) Your programs can include more data(2) Your data will be used correctly(3) You no longer need functions(4) No one can ever use your data
A Constructor may be(1) Provided automatically by C++(2) Written by you(3) Either (1) or (2)(4) None of the above
is the key to(1) Reusability
(3) Abundance
(1) Train reservation(3) Seat booking
Which of the following is not a range of complexity ?(1) Organized simplicity(2) Disorganized.simplicity(3) Organizedcomplexity(4) Disorganized complexity
What is the sum of first 100 numbers ?( l + 2 + 8 . . . . . . + 9 9 + 1 0 0 )
(1) 5000(3) 5050
(3) n3
increasing productivity in the face of increasing complexity.(2) Flexibility
(4) None of the above
(2) Airline reservation
@) Batch processing
36.
37.
s8. which of the following is not an example of time shared rear-time processing ?
39.
.40,
(2) 4950
(4) 5500
4l' The largest prime divisor of a given integer n may be as large as(r) ffi e\ n2
(4) J;42. Example of Computer based fnformation Systems are
(1) Office Automation Systems (OAS)(2) Transaction processing Systems (TpS)(3) Management Information Systems (MIS)(4) All of the above
C I C - 1 ( E + H ) ( 6 )
4:g, is any device that requests services or resources from a server'
(1) Media
(3) Server
44. Inheritance is a prineiple in which
(1) classes with the same name must be derived from one another
(Z) Knowledge of a general category can be applied to more specific objects
(3) C++ functions may be used only if they have logical predecessors
(4) One function may invoke different rnethods
45, The Internet Protocol is responsible for
(1) Providing data to the users
(D Providing hardware to the users connected to the Internet
(3) Providing Internet signals to the user
(4) Providing addresses for computers on the Internet
48. Which of the following is a feature of a ClienVServer architecture ?
(1) The server provides processing and data in response to client requests
(Z) The server provides data to the client which processes the data locally
(B) The server provides processing power for data stored on the client
(4) None of the above
helps in creating higher-quality audio and video applications with very little
expertise.
(1) Authoring
(3) Image Q
47.
(2) Peripheral
(4) Client
(2) Icon Author
@\ Macromedia Director 4'04
4E. The activities of Transaction Processing System are
(1) Calculation and classifrcation
(2) Storage and retrieval
(3) Sorting and summarization
(4) All of the above
49. A Dialog tree
(1) Shows the paths that are possible in a design following a decision by the user
(2) Maps the static and dynamic messages that take place betwqen the comp'uter and user
(3) Shows various steps involved in designing a solution of a problem
(4) Represent the paths that are possible during broadcasting the information
60. what will be the decimal number of a ternary number "12021" ?
(1) t32 (2) 136
(3) 138 @) r42
CIC-1(E+H) ( 7 ) P . T . O .
B state whether True or False (euestions number El to r00)
Note : In th'e following 50 questions, mark 1, if the statement giuen is true and o if thestq,tetnent giuen is false.
51' The Information Centre is company's primary resource for the development of full-scaleinformation systems.
52. Batch Processing is quite useful when majority of records in a large database must bcprocessed at the same time.
Internet and Intranet are one and the same thing.53.
54.
DD.
Leased Iine does not permit online communication between a user and a computer system.
I{ypertext is a method for presenting text, i.i"gor, sound and video that are linked togetherin a non-sequential web of associations.
56. Early information was almost entirely discipline dependent.
57. A feasibility study contains a list of alternative solutions for a given problem.
58. A good report contains iess amount of information.
59. The terms "Program Flow Chart" and "system Flow Chart" can be used interchangeably.
60. An Online information system is not always a real-timc system, but a real-time systemmust consist of equipment with an Online capability.
61. Somc type of direct access storage device is necessary for transaction processing.
62. Both centralized' and decentralized data processing techniques are based on FunctionalApproach.
63. Gopher displays a set of resources on the Internet in the forrrr of menus or list of items.
64- Internet basically tries to connect various LAN's. It cannot connect WAN,s.
65. Hypertext combines hypermedia and multimedia.
66. Inheritance allows new objects to be built out of old objects.
67. Object-Orientcd Systems do not provide the performance flexibility and functionalityrequired for practical implementations.
68. The graph of the Konigsberg bridges has vertices of odd degree and cannot include anEulerian circuit.
c lc-1(E+H) ( 8 )
69. The sum of the frrst n cubes (where n is an integer) is always a perfect square.
70. Every positive whole number is the sum of not more than four squares.
71. IJnprocessed facts and figures are simply data, not information.
72. A step-by-step procedure used to solve a problem is called an Operating System.
73. Disorganized complexity is represented by small number of variables and high degree ofrandomness.
74. Catastrophe theory was developed by Rene Thom.
75. Inheritance makes it possible for different classes to share the same set of attributes andmethods.
76. A data dictionary does not provide information about the size of the disk storage device.
77. A stand-alone data dictionary is related to one DBMS.
78. Expert System is a part of Decision Support System.
79. If a programming language has the capability to produce new data types, it is said to beextcnsible.
80. An Inline function is one which gets textually inserted by the Compiler, much like a Macro.
81. Examples of Chaotic Systems are Flames, Eddies and Cloud formations.
82. It is possible to import and export bookmark frles.
83. MIS is not a computer bascd information system.
84. sum of squares of the frrst 'n' integers is given or lgAga++Iryz]L 2 4 l '
85. Sum of the cubes of frrst 'n' integers i, ["(tf+ s11'z.
L 2 l86. Signifrcant ranges of Complexity are distinguished as Disorganized Simplicity.
97. Netscape is a programming language.
88. Summary reports are used more extensively at higher management levels than lower.
89. In Message approach, the semantic content of a message is accepted as Information.
C I C - 1 ( E + H ) ( e ) P . T . O
90. The Industrial society was organised around agriculture. ,,,r , r ,
91. While dealing with Information, the other name of "The Effect Approach" is "The RecipientOriented Approach".
92. Information has value and utility only if it is communicated.
93. TCPAP stands for Transmission Control Protocol / Internet Protocol.
94. The general format of Internet address is [email protected].
95. WAIS stands for Wide Area Information Server.
96. Extended entry is a type of decision table displaying values to be tested in the conditionentry.
97. ln any computer network File Server is the central node that stores data files from whereall users can access them.
98. In Online processing transaction is processed as soon as it enters the system.
99. Railway ticket reservation system is an example of batch processing.
100. One of the drawbacks of distributed information system is that it does not eliminateduplication of activities and redundancy in maintaining frles.
C I C - 1 ( E + H ) ( 1 0 )
SPACE FOR ROUGH WORK
( 1 1 )CIC-1(E+H) P . T . O .
SPACE FOR ROUGH WORK
( 1 2 1C I C - 1 ( E + H )
fr.srrd.fr. - l(E+H)
Wlzf : Z q"t
q ts - :
l .
f5'
qlz
I
r'trfubd ga oqfu t$.err$.S.1
rrdid dan
E;I, 2006
S.gn$.S.-t : ridd
qfqqdq ai6 : too
ft.) vval w sat fusqr dd d?F arwt a at' w-q w frt+to gr *-ri + frq q 6A tfti) sw-w t rco vr+ d t Mtzif il) srf vr+ ari aIM d' I *ld Eqw afl d Iftii) srTT xrn # eid sqq d tf t . u ) vd6vww*qd qdd ra r { t qRWt a l f ,w ra0w f r vn+d r rqWd lq r
rar trq- rq d d ss s?4 qr eyz ai+ RqT qw t
{gF{q.fl (Tvr riqr r t ro rq)
: ffifud v{t'f vd a rw */"q aK E6s Eq rq d, A* C qqn sfr dl s6dld r rd rnrr *i rd{ wNzF w (iaifqd +anr d en6d qt r qR d{ ,t sar edT afrd, di wrri W 0 t etifu ql t
qq-aT a-ildn + fdq erfrg - ETi qrFq r
(l) deqFqcF
(2) {irkl (Rclevant)
(3) HTffiM
\4) .q€il qqi
, TiqTq;I ffi Or s+dtq t f
(1) Effs{ur (classifying)
(2) qR-{SqE (sumrnarizing)
(s) rnmq q-far
(4) Bqtm q'ri
C I C - 1 ( E + H ) ( 1 3 ) P . T . O .
6r{qt€ Ffuif +)(1) DNS
(3) Pointers
n+grq rcn t r(2) TELNET(4) Home Pages
sNMP + fdq q+ xffio t r(1) 1+fu{r €ttd{ul (2)
(4) fritrs tf, (plectronic mail)
6.qKr t I(1) HTML
(3) ORACLE (4) wg$ qeTr
(3) {em (virtual) efr{m
E. ffi jr&s ils qdqt + fdq uRL s) ffi sftrg+ffir *-fr t ?(1) gq qFI (Path name)(2) 6fg s.qZ{ (Host computer)(3) S-{ITk frRl G"trieval method)(4) sqfffi qrfi
q.l Ffrrr qftrs * y-frtil (Dynamic web Documents) d +qR q.ri t' ff,q f*qT
(2) CGr
q+mr i-+ gs (web page) v{ gq{-qti t qr v+ar t r(1) Framing
(2) Linking(3) Scrolling
(4) 3q{s qrli
ffif, (disrributed) 3fsgr €qrqr .ii + daiq fr FrqFdfua fr t q*+*t 6T{ qfr t(1) +6 efr+ FrseFq 3qtl-er rs wrar(2) qE drjT oTfdd qii qrer dr t(s) qE +frFn dqr RiF*Fn +if SqTTn t erq +J qrw *,G m dRRT +,raT t(4) q6 ef6.di ils Tiq r{rrq 6.cm t
Zffi|e (Telnet) qs t fr€.-{r qq)T gzq}-c rR KRq q;E{Tt q{ {Aq{(logging o') * tdq |*ur qnn t r(1) strFtute) rffiq{ q*q
(3) ?i1-qHql
(4) 3{Tfrrfs (Rufrfi)
d t qtqqT erdq rfr+ sffir t ?(2) ',b'
(4) ',ln',
10. Ftqfufua(1) ',a',
(3) '\h'
c r c -1 (E+H) ( 1 4 )
tt. c++ ti ffi rr< (string) t efifr qt qrqn t qT wfr t t
(1) Null {isfrfr Q) {i isr riffi+ (r"l. . .c-*
(3) $ fq6 (4) / 1-16
rz. + idq ffi ffiI{ q} gTfrw (overload) trqr qrar t r
(1) sS :mn + sffi qrq 6Ge) 3S {cqT b qrdm fffial nTR s{i(B) B{} {mR * wun*1r (Basic) {--fl{ {iw +.G(4) -q$s fr t qt$ q-S
ls. ntqrqq silqr 6T eTfirdqlur fr q+ Ei {ffiqT ql 3+|rr€qTul t er-avn Frf, *FR t 4ai q
v6rq.F etor t, qo t(1) qEtil-dr (potymorphism) Q) st'ttf-tr+n (Inheritance)
(3) Fqtr{ (Allocation) (4) trEr-gq (Mangling)
:'4. Constructor. tt nqm qqiiuf* q-qfFd-d {B-il (Operation) t
(1) qtq (Aaattio.r) (2) eHRq (Overloading)
(3) Fqil{ (Assignment) @) e-g6l-df (Polvmorphism)
rE. ffi{IfiffiIt (Inheritanc") tsr 6.qi mr qm n-fr{T t(1) qrqrq 4t (ctas") t 3Tfirs fqRTs +t e-{Hr(2) F." g*tr* + E-dqTq r'il i 3fE-dqTur n-sqT(B) (1) sil-r (2) +ii(4) frRTs q-'il t qFil-q qrt e-ar{r
16. Tf6 Gr".edence) qd frqitrd 6qf,r t fu t4qT {ST5+ (operator)
(1) q-{A {flifsn Ei--dT t(2) qnds qfr t(s) q-dfr i-$ t(4) sTfir+-dq €qr .rr q,rq star e
17. qqe{ q{ q}{ ffiRrT qert lrqq a1 q6-6Af Af,r t ?
(1) 4.fm qEfrdf (Time ComPlexitY)
)(2) q-a VFffiI (Space ComplexitY)
(3) sr?T dPIT plra VFmn
(4) *{f, FI{KT 4l?T (Execution time onlv)
18. FrrqFf,Fsd mqR{T dg i = 1 to n Do 41 qfa-d-dr t
(1) o(n) Q) o(i)
(3) o(n2) (4) o(i2)
C I C - 1 ( E + H ) ( 1 5 ) P . T . O .
f (n) = o(g(n)) qR silr fiq-d qR q) s{-q{ c eil-r ,ro €l v4( 1 ) l f ( n ) l < C l g ( n ) l H r I t n 2 n o * . f d q( 2 ) l f ( n ) l > c l s ( n ) l q $ n ) n o + l d q( 3 ) l f ( n ) l = C l s ( n ) l H S t r ) n o + l f l q( 4 ) l f ( n ) l < c . l * ( " l l * , f r ' ) r o * ' F d q
pi (n) 6I *'q qn qq$ TdA gRT 3TFrsftrd fuqt ,rfl eTr r
2r' E-drdr t rs ffi'd+ rq-€sit + x+s qRtrd vgqqsiu+ + sTfirs ffiilTd {wr et-fr t r(1) S "fuq
(Jung's theorem) (D qtd e*q (Morley,s theorem)(3) stfqd{ gqhq (f,-rt"r,s theorem ) (4) qlEfi+fq qttq fpytfragoras theorem)
22. 2 t q-g l-+s Wfis "t foq
(1) {ks (Euclid)(3) 3ilffi+q (Archimedes)
(1) (n!)2 > n"
(3) (n!)2 > n'
(2) 3il{ffl (Euler)
(4) l6'qf (Fermat)
(2) (n!)2 < n'
(4) (n!)2 < n"
qTfrr,Td Aqsq{s qEi
24.
d-$ Wfs {@T qR , Bdfirqs r-fi +-tr fr erqrq wdr-tr t(1) q) rqr sTFrs) $rcii + gqrw * w fr, + x+s evt qq €t(z) <) rqr e+flr+l q,rcqif + q)'Tq-d * qq t, q) rd-* s*t sq El(B) Q fqr oTfqs) T*i + Iqrqd * sq fr, S s-d-s ilro eTfirs €f(4) <) rqr e+fw*y HR-d + qt'rs-d * w fr, q) r+s $ss sTfrrs Etffitun fr t 61-6 qrrsr qk t ?
r \ a(1) qRIq 6I TqE{l" e)(B) tgin +r {qftqrq @)q)fr qtq (Morley,s theorem) 4.f {iaiE(1) fr'RR gt'i lspu.rning Circles)(z) siqR-iq €@rcr)
t t r
(s) frgq + s)"r + fiq-ss + slh&(4) Frq {wpii
26. qr{r Effidi t fiffi FFR Bic,rrr *-fi t z(1) fuffird q@ q-dn q'rdri t(2) {i{F{d sf+,e qfiT q,t-fl-i t(s) q..t # {fiT qgeTil t(4) Bq{ffi €qi
CIC-1(E+H) ( 1 6 )
27. qT-dsi t €Trii i g*rRi 6r tFr+ riqr*]q qr q-riftq sql6ruT $ I
(1) Yqq *iqr$rq(3) 4.rf, eTrtr{
28. FrqrdF€d t t fus nt6r-r q;r €qreH q'FQ[crriir it ea ffiqr qili w nGFrm qRurH 3qe@t
ormt z(1) S1?T qIGFT (fime sharing)
e) StreMmqlFqs (Interactive )
(3) }|-qq fiqFl;t (Batch Processing)(4) qg-3T{ffrqT {qfe1;I (Real-time processing)
zs. +'qc{ +\$ +lq s{i fi fr qqq trTrdT t, sR
trl fu{e q;l?T (Delay time) Q) ftETfr 6T€T (Execution time)
(3) qg{ff#qf (Real-time) (4) gE;I ef{q (Down time)
fr {-t-m, qf{€ tf,, +ffi dqT i-q $+rflq' fqtrd AA t t
(1) @iFrs i€(2) silftfq'T swF{rt(B) {aqiFs {}qur 3rfiq(4) qqf S{{ (Discussion forms)
31. cBrs t infld t
(2) {q-3qH.q'r {qi?fi
(4) eEtd{ {ql?Iq
(1)
(2)
(3)
(4)
Common Business Information Systems
Computer Based Information Systems
Central Board of Information Systems
sqts qS
32. dl-Jtrrr * rarq nq(1) Navigator Gold
(3) Editor
5e<ta 6r q'qhr oG t r(2) Linux
(4) Protocols
Bs. FmfuFsa i t +qqi o'qer gFow sT FrR Td? t ?
s4. +-frS-d m*.=T {qreffi } enr t(1) frfEr?ii dqT 3rr6{uii or qr++tq.tq f+-qr qr vq.dT t(2) sTfirs Hqrq f,qr a6fi-*i Fiq t q}q qRsdi qi w d qr v+-fr t
(3) fmqrsedi + +6{q (Dupricationl q} {qiqr qr vfidr t(4) wts qtfr
(1) frhfrSd (Decentralized)
(B) 3Tffid (De-distributed)
(D *fif( (Centralized)
@) ffid (Distributed)
C I C - 1 ( E + H ) ( 1 7 )P . T . O .
87.
qfiWr iqq (nrt" hidins) Hr g@ dFT B(1) silq+ nqrtvr fr sTfirs @ ld qr vo} t(2) oTrqt oiffi q.r ei.€d d{E t sqq}r fuqr qrEn(B) BTrrd T+lfr +1 e+rqvqrdr rfi Et-fi(4) 3TIq+ 3tT-6il dr +$ Rs{r sTpr ftiT* s{ RFilrConstructor ti W-Of t(1) C++ dRI {qd: SRfdI(2) emrh aru idfud(3) qI (1) q e\(4) =qfd fr t +ti +A
il.d-fi g$ qkdr + Hrqi {f,fi(1) g-{trlqdT (Reusability)(3) fgCdf (Abundance)
(1) sooo(3) 5050
(1) v;(3) n3
Q) 4e50(4) 5500
(2) n2
(4) J;
6,lqrt sTreTrRd qa4 dif + F{rdr"r t(1) Office Automation Systems (OAS)
(2) Transaction Processing Systems (TpS)
(3) Management Information Systems (MIS)
(4) sqds qs
g$ rmq*dr mi gfr t r(2) ftlRIItrT (Flexibility)(4)
"q{ffi t e +$ q-fr
4r. f+,gi Wrfs n 6T srfiffioq oTqrq guns-d fuilfl qEr A €6iTr t ?
ffifuH d t +* srf, *fud (rime shared) Trq{th* {iqr.r{ 6T sEr6wT af t z(1) t-e eTRqfi e) Eqr$ sTReTur-(3) {qH sTRqTq G) yqq {g1t5{
fuTfdfuH q t +t+* qkrifi qi qRqtfi (Range) adl t Z(1) StrFdd vredr(2) sTri'rFdd v{mdr(s) d'Ttrd qhdr(4) 3Tfr'rtrd qkrdr
gqq 100 t iwBt G+2+8 . . . . . . . .+9e+100)q , r + rme Hr t ?
CIG-1(E+H) ( 1 8 )
43. F gtu t q] €-dr (qR${s) t w qr €qrfi qroil ffi t t(2) qR+{f, (Peripheral)
(4) Wliiz (Client)(1) frtsqr (Media)(3) qdl (Servet)
44, fiRrfersn (rnheritance) Vs fuqid d Rqi
(1) W E1 qrq + qff (cl^".""1 d {s {gt t ffi ffiqr * s+m t
(zD HIrTrq dtr + {1;1 41 3rfldq 3TFffi fqR1g 3{F{freSr (objects) * ff,q frq qr sF'tTI
t(s) 6** rsrd 6T sqqlr itrf, dm fu'qr qr qmil A, qq s{+ ?r4frq-d Ef-dtr d
(4) q+ wr{ 6-i fqitld t f6qr qT q+
ffic ffin * ldq fs+fl dar t t(1) nffi + ldq q@ BRr*I q-tli(zD sj t {icifqd qqM3ii 61 ,h-qmfr src*T q-{rl
(B) FiFT-ff,i3ii ?ir Sc riire sqsidl q-rn(4) 6qaii * fdq se qr qt sqf,el o.G
ffiFg-d fr t qt+o wrizlvdr (inenvserver) TPII(|eFSf,l (architecture) or eTfTf,enur
t u(1) q*{ RTRie + 3r{tq qr {qrsTq sft 3ffi sRldT srrdr t'rrl,
-ft *.'F. s) "fo
Bk,eI qrrm t q) 3-Q rqrtrq 3lTt111 qt {qTfsrd 6ffr t
(B) Ffr wr{c q{ risrtrd sffi t fdq {qiqq qrft Fffi ocor d(4) w$-s fr t ftt$ €
47. {gd 6q ffiqffiT +1 ftqfr ii $,q-rrqqff t 3fffi nqr FH eIEsd-IT
sRrer 6,uar i r(1) Authoring e) Icon Author
(4) Macromedia Director 4'04(3) Image Q48. frqroflq €qren fi s1 qRfqFrqf t
(1) r1uFIT dqT Trtrfiq(2) rR"T nw 5+Ioui 15+f|R)(3) {f,Zi (Sorting) HelT qqtquT (Summarization)
(4) sq$ffi qtfr49. {-dfq 9H (Dialog tree)
, (1) qd-I.n.at + FTUtq t ergeit fs-ffEq fr {Eq qdf 4} E{lkT e(2) q.qer 31ti qqM + tr" qFft REt dqr rrfrTs {M 4} rqa qccr i'(s) ffi wRT t qq-m + fssTqq t f{trd FFrq qruii qi Rlidr t(4) g+ b {qRuT + d{-{ $rq qei 61 fasqur +car t
b0. *fi (ternary) {ql 'r2o2L' fr wrrrcq ricqr wr t}tft U(1) L32(3) 138
CIC-1(E+H)
(2) 136(4) 142
( 1 e ) P . T . O .
ET
7h
51.
52,
6rdr{q trfi t ?il qFrit (y*q +i. sr t roo rq,): q? l 50nrr t r rydrqA fEqrr rqr6er4w\ddr e i fud+l , aar wrrsF/ /T
w o eifud ql, qE 6Ea ,Tdd dl t , ' '
wi-Tilfiq q-{dr ilii + ks-rq + r€q 6qii *r qa4 :iE ge $s*r rhr t rqGr \rs frflTd stfi*:Fr ritrdr (Database) fr sTf[r+T-q eTFrftd sr q-s fi eqq €qFrq fr-qrqFn eqRi-d fi w x+q *iqrr{ srsi sqqlrfr dror i rie+c (Internet) avr igrle Ontranet) qs El nlt t rets mgq (q-giFrd dr{{) t q+'Tsnf $fu +.qgt dr + dtq gqqd (online) €iquT liqqiA E)-dT t
d
ETqq€R (Hvpertext) tq Tt 3tmfus sq t qwn Tidfiid {ra, fu{, ffi nq1 qiBq} 6}x q o w l d f f u t 'wd, qaal WidqT f{rqrqTfr t}-fi ql r3T)fus (feasibility) daiql e{Erq-q it ffi srrgtT + Mfls vqreTFit *i q.qi A-fi t Iqs 3r6i Rqtj fr {fir 4i qr*- qq +-fi t I
"Program Flow chart" tfsrT "system Flow chart,, or rqlq qs. {R t r+nq qr fuqJ qT RF.1It rEqn q-{dT ?i1 (Ontine information system) 6iTTf qU-s]-{eqf dT (Real_time system) Tf,aln wg €u-efiBqr dr q N ws{'T A+ qrFq Frt.g,* qr*, d l--lqq-rf,T $qlq{ (T}ansaction Processinsl * 6q g+ rtFR q1 req qdq ,igRUT (direcr,access storage) gfu eff+f++ t)-fi t f+ftsd dPfi fqiFqt-sd qH sri*sT €qrqT d+ats rflqfcq--s sqrrq (Functional Approach)q{ 3TrETrR'f, t Itilmr 16oo1rer) F-{te vt river+i } vgqq s} Fqffi (menus) qr q-ql (items) qi {*q sq fr rffiTd olor t rF-q gcqdqT F.|- r"aN d +f,dT t r q-o weN q) =rfr fr *Fdr Id-{qfu, wqrftfrqr rur q€*fiBqr d qtgdr t rs+{rF]t5li (Inheritance) gut smrcq.?if (objects) t rq 3{irdqlif 61 faqful sd Ei gfuwr++ oror t' rqFffiil-3qci dT (ouject-oriented systems) eTqdfrs q,HFqq{ + fdq BTERTn trqKT
53.
54.
oD.
oo.
o t .
58.
59.
61 .
64.65.66.
F+om+ silr r*rddr warer qfi srrt I68. fiFrqq{ trfuq (Konigsberg bridges) * nm * {fr{ effiq ffi + E}t t 3it{ B-{t
3rffiRT{ TIffid tEulcrian circuitl f6l A V+-Oi I
C I C - 1 ( E + H ) ( 2 0 )
6e. wttT n eqit or q)'r ({dr n {6 WIfu tl onvrr !S Wt qd qqT d-fr t
70. x-d* srqnqs Wt {iwr m'r d-fr t, + qr ssi qq q'il +i I
7r. iq-rierfqd nrq et)r eiq, qH # E\il t, Wn +& r
72. FnS qq{qr + qqt-rq + frq }Fg$ q{uwq (step-by-step) {B-qr FileFT .ir o-eerni d r
7s. B{dqtrf, qfrffidr q-d s1 qrl €gr 3ih qTEFE-sTr (randomness) 61 sq ql:NT dKr
FTFfrd d-fr t I
74. 3TTqkT fu-qid (Catastrophe theory) q.r fusrq ti sfq (Rene Thom) t ft-qr qr t
75. s-diTferqR (rnheritance) frFrr +T ilr yil nur frfsTdi $ qqm q5"qd q.r qfrrr {qEq+nr f r
76. slfs.gr qrfl (outu dicrionary) fgw. qgKur gFm tni"t storage Device) : sfi4'l-{ + qTt E
{-d{r sqc|er rfr oncn t
77. Eih qfc;gt q)fl (stund-alone data dictionary) 4't ti.iq g+ DBMS t Etdr t
78. ffi{ dT @xperr system) Fruh vOr++ cir qr qrtr ttcr t r
7s. qR d{ fr'lTqq qrqr qq # FFr{ (Data type) * B-€rfi +1 qqdr {sfr t,' n} sS fudTq(extensible) 56f VfOf t f
80. {i-f,rfl trqt{ (I.rtirre function) qE E}-dr t n e-Enm (compiler) gRT qld-FARrd (Insert)
n) qldr t aiq,rtr Macro q1 aro I
81. s{-qqRfd dii (Chaotic systems) t e-qfd{tT t '
Flames, Eddies d{T Cloud formations.
Bz. E+-qrS' (Bookmark) {fufiriJit 4T sTqd-FTqtd {qq t r
83. nlrs s%er 3TrqrRd {q4r iir q-fr t I
84. q6dt'wt+i * q,il 6r frrr l@g+g3'2.l * Rqurqr t r
Bb. q6d t'Wf+i + q-ii sr +rr [tTr]' t r
86. qETdT + q-d-dtui qRnii (Ranges) +l sT{i.rfud v{frTII t sq ti Vqt ffqr qrdl t r
87. Netscape q* xlqfr|{ qrqr t f
88. {iRTq qfu}Eii 6r trfrq frE{ R{ di BTEqTT s.q r.iqq wii q{ srFr* qFf{ oq t isqr
wcrt r
C I C - 1 ( E + H ) ( 2 1 ) P . T . O .
89. IU ry (Message approach) fr TitqT 6t gTrrj-T ftqq.qq (semantic content) d g+tr't sq if rqtsn F*'qr qrm d r
e0. 3iuiFm qqFq FR + qrfr Brh $tBr F*-qrrq q r
el. qqiT * €aiFT t fuqn qqi vrrq, "srlrE 3g5r1q" *.t {Fir q;-q "q1qffi Wui 3sp1q"(Recipient Oriented Approach) fuffif d I
s2. {q4l sl ISq dqr sqq}FrdT dEi t sr s{Ffir €}q"r (communicated) tsrr qrdr d r
93. TCP/IP cb-f dfCfd d T"ansmission Control protocol / Internet protocol.
94. iTf}c gt (kttutrret Address) 4'I qlqfq 516r[ [email protected] *-of t f
95. WAIS s'f 3Td d Wiau Area Information Server.
e6. f{€dRd qFE @*tended entry) t drfld t - lis yqn q1 ppfq qKUfr ffi qfuisftqfdE + q{qTur f+.q qri ffi Tdr 41 }rffird frqr vror t I
s7. ffi +qar i-S fr qrq-d vdr Gl" server) adq qts E)-dr t q) sri-*-.sr €F-dpif61 tigRur qrnr t q-dT qtTI xqi{6idf (users) si q{ qg" *s.i t, I
e8. gTq-d {iqren ii, f*-qr+crq q.r dr fr t{+{r At fr €srq{ |oqr qror t I
ee. te fr+e 3TRqTnr ciz wrq (Batch) {srqq ql sEt-d{uT d I
100. ffid qqrl dT (Distributed Information system) +1 q* ofr qo t fm qo {fu-dFBift rworq fr tmqmertit + +{nq (Duplicationy qqr qefTr (Redundancy) s} ({ rfi mtFnnr r
crc -1(E+H) ( 2 2 )
rq, 6'rd b fts dq6
C I C - 1 ( E + H ) ( 2 3 ) P . T . O .
tq'6rd b frs drr6
crc -1(E+H) 124 ) 5,000
CIC-2(E+H)
CERTIFICATE IN COMPUTING (CIC)
Term-End Examination
June, 2006
CIC-2 : THE TECI {NOLOGY
Time :2 hours Moximurn Marhs : 100
I r : :Note:
(i) Do not stq,rt q,nswering until the inuigilator ashs you to start.
(iil euestion paper contains 100 questions. Stud.ent is required' to answer all the questions'
There is no choice.
(iii) All questions carty equal marhs.
(iu) Each question rnust be giuen one arLswer only' If more than one gnswer is rnarhed or
giuen', zero m'arh wiII be a,warded for that question'
A Multiple Choice (Questions number 1 to 50)
. Note: Four choices are giuen for a question, out of which one choice may be correct' Mq'rh
correct qnswer in releuant column of the answer sheet giuen to:you' In case you feel that'
none of the ch,oices giuen in a question is correct, marh in coluntn '0'.
1. Who is called as the Father of Computers ?
(1) Blaise Pascal
(2) Charles Babbage
(3) John Von Neumann
(4) Howard Aikens
2, One kilobY[e is equal to
(1) 1000 bYtes
(2) 1012 bYtes
(3) 1024 bYtes
(4) 10000 bYtes
CIC-2(E+H) ( 1 ) P r ' o '
3. ENIAC stands for(1) Electronic Numerical Integration and Computing(2) Electronic Number Integrator and Calculator(3) Electronic Numerical Intermixing and Combing(4) Electronic Numerical Integrator and Calculator
4. DEC is the example of(1) Micro computer e) Mini computer(3) Mainframe @) Super computer
5. is used in the fetch cycle in a typical CpU.(1) Storagc unit e) InpuyOutput(3) Accumulator (4) program Counter
6. Following is not a valid register :(1) Memory Address Register(2) Program Register(3) Instruction Register(4) Program Counter
7. Which is the optical storage medium ?(1) Floppy disk e) CD_ROM(3) Magnetic Disk @) Magnetic Tape
8. DIP is
(1) Digitat Impact program
(2) Dual Impact processing
(3) Digital In-line package
(4) Dual In-Iine package
9. The capacity of a typical Winchester disk is(1) from 500 to 1000 MB e) from 10 to 600 MB(3) from 100 to 600 MB @) from t to 60 MB
10. Motorola 68000 is a bit microprocessor.(1 ) 8 Q) 16
(4) 64(3) 32
11. Which of the following is a pointing device ?(1) Keyboard e) Light pen(3) LCD (q Printer
c l c - 2 ( E + H ) ( 2 )
l,2. device is used to grade tests through reading the marked alternatives.
(1) MICR(3) OCR
,, (2) OMR
, (4) Keyboard.
13. The speed of T.aser printer is measured in
(1) Lines per second (2) Pages per minute
(3) Characters per second (4) Lines per minute
14. RISC is
(1) Redundant Instruction Set Cornputer
(2) Reduced Instruction Set Compiler
(3) Reduced Instruction Set Computer
(4) Redundant Instruction Set Compiler
15. Which of the following organizations uses N processor units ?
(2) MIMD(1) MISD
(3) Both (1) and (2) (q SISD
16. The performance of pipeline in parallel organisation depends on
(1) Data dependency(2) Barriers in the program
(3) Encoding
(4) Both (1) and (2)
17. Which of the following is correct about non pipelined processor ?
(1) so = Tr, /Tn Q) so = T,, + Tn
( 3 ) S k = T r , - T p ( 4 ) S p = T ' x T n
18. Which of the following Ianguages is widely used in scientifrc applications ?
(1) LOTUS Q) COBOL
(3) JAVA (4) FORTRAN
19. Database Management is also considered as(1) zGL Q) 3cL(3) 4GL @) scl
20. Mnemonics are used with which language ?(1) Assembly Q) Machine(3) Pascal (4) COBOL
GIC-2(E+H) ( 3 ) P.T.O.
21. A group of characters used to access values in programming language is(1) Array (2) Constant(3) Data type (4) Variable
22. Which of the following is the logical operator ?(1)
(3) + (4)
23. SPOOLING is
(1) Simultaneous Peripheral Operations On Line(2) Simultaneous Printer Operations On Line(3) Simple Peripheral Operations On Line(4) Simultaneous Printer Operators On Line
24. The major concept in case of Distributed OS (Operating System) is(1) Coordination (2) Cooperation
(3) Transparency (4) Storage Control
25. Which is the benefrt of Windows ?
(1) Multitasking
(2) Memory Management(3) Device Management(4) AII of these
26. The second era of computcr systems evolution introduced the following concept :
(1) Distributed Systems(2) Objcct-Oriented Technology(3) Batch Processing
(4) Multiprogramming
27. CASE tools are generally related with
(1) Assembly Language (2) SDLC(3) CPU (4) RrSC
28. The transfer of data between spreadsheets and word processors could be done by
(1) Compiler
(2) Interpreter
(3) CASE tools
@) Dynamic Data Exchange
clc-2(E+H) ( 4 , )
29. Which is not a part of 4GL category ?
(1) Compilcr
(2) Application generator
(3) Report gencrator
(4) Decision Support System
30. Human Access Language GIAL) is the examplc of generation language.
(1) 2
(3) 4
(1 ) 8
(3) 16
(2) 3
(4) 5
31. Number of bits used in ASCII standards for data communication is
(2) 7
(4) 32
32. Simplex mode of communication channel allows the data transfer in
(1) one direction(2) one direction at a time
(3) Both dircctions at same time(4) None of these
33. The maximum distance between 2 nodes connected to same channel in LAN is
(1) 100 m (2) 1 km
(3) 5 km (4) 10000 km
34. Token Ring is I , , ,(1) LAN topology
(2) LAN access method
(3) CommunicationArchitecture
(4) LAN Hardware
35. Which is not a valid step for circuit switching ?
(1) Network Access password
(2) Circuit establishment
(3) Data transfer
@) Circuit termination
36. EDIFACT is
(1) Communication standard
(2) Retail industry standard
(3) Standard for administration and trade
(4) Transmission standard
crc-2(E+H) ( 5 ) P.T.O.
37. The frrst Packet Switching Public Data Network owned by Deptt. of Telecommunications is
(1) NICNET (D BITNET
(3) USENET (4) I-NET
38. Which of the following is a part of single crypto system ?
(1) Transposition (2) Substitution
(3) Both (1) and (2) (4) RSAAlgorithm
39. The process of getting data access by intercepting the traffic on the circuit is called
(1) Data trapping
(2) Cryptanalysis
(3) Cryptography
(4) Leakage
40. Who first gave the concept of self replicating programs ?
(1) Ronald Rivest
(2) Leonard Adelman
(3) Adi Shamir
(4) John Von Neumann
4]^. Power on SeIf Test (POST) is a part of
(1) Booting
(D Networking
(3) Cryptography
(4) DisasterManagement
42. BOOT infected virus affects which frle ?
(2) IBMDOS,COM(4) AUTOEXEC.BAT
43. Lehigh Virus
(1) frrst came into being in Pakistan
(2) is prevalent in Macintosh Machine
(3) affects only .EXE files
@) affects only COMMAND.COM frle
44. Data Encryption Standards (DES) algorithni specifies a method for' encr)ryting a/anblock.
(1) COMMAND.COM
(3) GENERAL.EXE
(1) 8 bit
(3) 32 bit
CIC-2(E+H)
(2) 16 bit
(4) 64 bit
( 6 )
45. Identifying risk in various alternatives is part of(1) Definition phase
Q) Design phase
(3) Functionalrequirement
(4) Implementation
46. Vaccination is a part of(1) Cryptography
(2) Anti-Virus program
(3) Disaster Recovery
(4) SecurityAlgorithms
47. Gravity virus is also called(1) Stoned
(2) Happy Birthday Joshi
(3) Dark Avenger
(4) Raindrops
48' which of the following viruses increases the size of .EXE and .coM files ?(1) Marijuana
(Z) Raindrops
(3) Jerusalem
(4) Brain
49. Disaster Recovery deals with(1) the tasks in planning
(2) the implementation of recoverv(3) Both (1) and (2)
(4) None of these
50. The objective of contingencyplan is(1) Discover which application is most critical(2) Remove viruses(3) , 11*6oot the computer(4) Determine the person responsible for disaster
CIC-2(E+fl)( 7 ) P .T .O.
B State whether True or False (Questions number 51 to 1O0)
Note : In the fo l low ingS0quest ions , tnarh l , i f th 'es ta , tementg iven is t rueond0 i f thes ta te ruentgiuen is false.
51. In Von Neumann architecture each bit of memory can be accessed independently'
52. In computer, for di.fferential engine the output could be directed to a card punch device'
53. ENIAC is a second generation computer'
54, 8080 microprocessor was developed by Motorola'
55. MC 68020 chip is part of super computei'
56. Memory parity error is an example of hardware failure'
57. CPU register directly interacts with secondary memory
5g. The memories which lose their content on failure of power are termed as volatile'
59. PROM can be written onlY once'
60. FIoPPY disk is a Primary memory'
61. The concentric circles in case of floppy are called Sectors'
6 2 . S e e k t i m e i s t h e t i m e t o p o s i t i o n t h e h e a d o n a s p e c i f r c t r a c k .
63. Winchester disk is made up of magnetic oxide'
I Un. S
! incfr optical disk can store around 650 MB of data'
l *
I uu. Optical Bar Code Readers are used with library books'
| . r - - r h ^ ^ i r
I uu. CAD is Computer Assisted Design'
I
I ut. Inkjet printer is a non impact printer'
III
c tc -2 (E+H) (8 )
I
6g. Parallel interfaces are comlnonly used for conrrecting printers to a computer'
69. Data flow architectures are SISD architectures'
70. Memory buses transfer data between memory anil CPU'
7L. Tightly coupled systems have shared memory'
72. Pipelining processing improves the system's throughput'
78. RISC machine should not execute 2 instructions in a cycle'
74. Application software is a part of system software'
75. Ventura is a DTP Package'
76. FRAMEWORK combines word-processing, spreadsheet' database and graphics functions'
17 .C++programexecutes fas ter thanmach ine languageprogram.
78. Interpreter is good for fast debugging in comparison to Compiler'
79. SQL is first generation language'
S 0 . X o R i s T R U E i f b o t h o f t h c a d j o i n i n g e x p r e s s i o n s a r e t r u e .
81. If-then-else structure is a looping statement'
82. For X(Y), X is a variable and Y is function name'
83. Resident monitor is used with batch processing'
84. Pop-down menu is also called dialog box'
g5. Application Program Interface (API) is a part of development environment for most GUIs'
36 . .Programst ruc tureDiagramisa lsoca l ledDataF lowDiagram.
87. Ingress is a relational database'
P . T . O .CIC-2(E+H)
( e )
88. '0' indicates the presenge of electronic current. . ;
89. Digital is one that is continuous with respect to time.
90. Modem is also called modulator_demodulator.
91. EDIFACT for shipping bills are known as CUSDEC.
92. Cryptography was frrst introduced in 1900 BC.
93. RSA was developed at Massachusetts Institute of Technolory.
94. Access Control Cards are used for programming.
95. Query views are created in database for security.
96' Back-up is needed to dear with vandalism, sabotage or storms.
97. Contingency plan is designed to limit losses.
98. The plain text is also called cipher text.
99. Malicious damage is always done by the outsiders.
100. Interrupt Service Routines are located. in memorv.
ctC-2(E+H) ( 10 )
-
SPACE FOR ROUGH WORK
CIC-2(E+H) ( 1 1 ) P .T .O.
SPACE FOR ROUGH WORK
CIC-2(E+H) ( 1 2 )
fr.qr$.fr.-2(E+H)
qEftiba gt onqfrrr ffi.sn$.fr.1
ffiifrdqilr
qF. 2006
S.nr$.*.-2 z trtFrotWlzl : Z qri qf?rqaq ei6 : loo
ii e :(t) vvql w aar fusar &r d6 rrrcEv+ a at wq ds frW Eo a'ci * ftq a ad rf t i ) wrwi l rcovs+d rMdzi t * )wf rv-+o6r i qM dr *H fu a f dr(iii) sql swl + ri6 aqta d t(iu) vdo vw w *ad W d rar t t qR q6 d .ner+ sa? rr fr?Tn trTq qq dJ ql
err Rq rq'Fi d ss wr w tp ena Eer wE7 1
ifi' {gf{drq (rgq {qr r t so ra)qh : ffifqd raai C s-dq, yw */Aq an fuqw Rq qq d, re-+'C qF ga? d H6d/
d I sd, rar *) rat wzn w riaiftn m:n7 fr elffu qt t qR 4)d cI? ra-r ed add, 6) +ary W rol d ei6a *t I
1. nqa * w++ * w q ffi Sflqr qrcn t ?(1) frE qrwd (Blaise Pascal)(2) qd +Aq (Charles Babbage)(3) sfq Efq dq ("Iohtt Von Neumann)(4) Efrdd gIE+R (Howard Aikens)
z. q6 t*Til "tl-{d (Kilo byte) d{-fl {
(1) 1000 Erfe
(2) 1012 qrqz
(3) 1024 q|{e
(4) 10000 qr{e
crc-2(E+H) ( 1 3 ) P.T.O.
3. ENIAC ST 3T{ I(1) &ifrs ;eliRsd qFuhrq qrg q.qEq(2) {Aeifus iqr qftfrex qqs *egd.gt :(B) {@rtrs =$Rder f;ilfrCsrr grrs dfur(4) {AqiFrs qtRqer sffie{ qre +egrna
4. nnc (s rqrdrq t(1) qrr*l q-qa or e) ffi qqal 61(s) ffiq sT g) Eq{ q.qr{ 6r
5. qs ssf 1trFr+-e) cpu it 3ilqffi qm (tq *t6*o) fr lgm fuqr qrflT t(1) ,ig[{q f+r$ fOis qf{cl (z) F{ge/sTrscge(s) {qrs 1{ryftx) e) q}'qrq H1ga-r
6. t+E{ fi q6 qs qrq rH+eq rd t ,(1) ffi q* {Frste) fi'ltq {fu€{(s) t+tvr (qqFflq) {trq€i(4) q)qTq flrizr
7. qt{qT T*.Rfrq rtsi$rr (3rfF?He dtel qrqq fl :
(1) kfql Bs e) cD-RoM(B) trtfss Fw @) fl-riP+ 5 ::
8. upt(1) fs|q-m {d€ m{rq(2) s.{a gd€ x}efrFr(B) trfur {r-eF4 Q}q@) s.{n r+-mg t*-e
9. *S+f tfeff*O) f{qgf IgS (Winchester disk) 4.t qTrlf,f 6(1) soo t looo MB dfi (D ro t ooo MB tr€F(s) roo t 600 MB dtn (4) r t oo MB dfr
10. qHtdr 68000 (Motorota 68000), qs - fEa ftio qrgdrlQm t-r(1) 8 (D 16(3) 32 (4) 64
(2) dl{c +{(4) Fra{
( 1 4 )
rr. F+qfeba fr t qlq qi q€trIT (pointing) gfu (FsqFq) A ?(1) $dT.n (qft-itd)(3) LCD
clc-2(E+H)
rz. fqr6d F-+eq d wi * anr qfirnuil + is strq + rou - gfr 5Rqrf, tltr t t
(1) MICR
(3) ocR
tqt nrat (Laser Printer) 41 trfr q] qrqr qrar i
(1) errq qfr tsrs t(B) qt€i HR t-srs i'
msc €(1) G.z {W{1-q ve E6'tr{t{
(z) fiqs Fq+{H fu mqrE-ct(B) fig.{€ $e q.qet
(4) ns+z {tr{H t-a oqqot
FTqfufuf, t n *{ qr {i'rd{ CeTr,tTr{iflq) N ftQst {srcd or gRqre otar t Z
*-fftrt $frt{t-g{H (para'el organisatio.l it rffi (qrflmffl) qr Frqfq frt{t qt6r t
(1) sri*gr f+fudl lsra EH{) vt l
e) qtqlq * u-{rdcr frtnqdl qt
(3) R-{fr€q (Encodirrg) {{(4) (1) 31h tzl tii qt
ft {fmi fr+q{ (nonpipelinedprocesso'l* d fr p4q666 fr t frt4 qr € t ?
18. FltTrf,Fild fr t +4 s qrqr q-fldt ii qrqs sq i {dqrd fr-fr t z
(1) LOTUS
(3) JAVA
Le. g12'-rA€ Fr*Fr 1Sffi;e) 41 rfr q-a qrar t r
(1) zGL(3) 4GL
20. q4t t q;t{ qi r{M (+r+q) + qrq qFo v6rq+ (Mnemonic,l qtrqro t+q qfr t I
(1) €HA]qffi (Assemblv)
(3) q-FFd (Pascal)
clc-2(E+H)
(2)
(4)
OMR
S$qzq
r.3.
\4.
15.
16.
(1) MISD
(s) (1) 3I\ (2) +it
(1) Sp = Tr, / Tn
(3) Sk = Tr, - To
e) tq qfr fi541 g
G) flrfi qfr Fffc i
(2) MIMD
(4) SISD
(2) So = Tr, + Tn
(4) So = Tr, * Tn
(2) coBol,(4) FORTRAN
L7.
(2) 3GL
(4) 5GL
(2) qgfr4 lYtachine)
(4) dd€ (coBol)
( 1 5 )P.T.O.
2r. S
* qs q{6 q} nbrtr'T +-}-q fr Tdr ffi qg+} (access values) + fdq F*qld dnT(1) tt (a'"uy;(3) grel ef{q (Data T}pe)
Fqfufua fr t +{ qr d-*$qd(1 )
(3) +
SPOOLING d(1) wfrolFeru qRhrq $5AR1q qfq ergq(z) HEqdh€HH e-€{ eiqte|R *f, -,E-(s) fuqd ER+w sfrqtflR qTa ersq(4) M{rd}fftrq e--€{ qTqH et+ er{+ffid qqftrq dT (oi.t.ibuted operating system) + qrrd fr gw sr{tTRuTr t(1) ft{tr+{Tq (Coordination) fzl
"+i*fQfn (Cooperation)
(3) F-dgi-hfi (T[ansparencv) (q wrg** rfiquT (storage control)F{i t +t+ wzt windows + Hqe td z(1) qg-sT{ (Multiraskins)(2) Efd IdET (Memory Management)(3) gfu nEiqq (Device Management)(4) vql fri] '
(2) EIiR (Constant)
(4) Tt (Variables)
rtsrcs (effqn-d efqtfil t z(2) NOT(4)
23.
finst (word processors; *'I
Etq sTiq-s) (Data) sr 3JTITUI
2G' 6qc{ R€q fusrq (evolution) fr (R sl?I (second era) d qq66o stqemutT 6r lqdqg B l T t
c \ - ' - r - r \ r \ D v v v t l v E t a ) r r r - l l ( l l ( g f l \ : r l l
(1) hdR-d dl (ni"t.ituted Systems)e) 3TflffiH-B-{rgi Str}ftqfr (Object oriented Technotoey)(s) FfrI (Batchl tiqTe];I(4) qg-nldrFl
27. s-q qw (cASE Tools) 3ilq-d{ Tr HqRrd to) sM +'+q + e) so"c t(3) cPU t G) nrsc t
29. Ffg{ite (Spreadsheets) eil{ TdERr fuqr qr RF-dr d
(1) tF.trTl-td{ (Compiler)
Q) frtru-s (qartr {)(3) tv e-w (CA5E Tools)(4) B|.{iTfus grfl qtriq (Dynamic Data Exchange)
CIC-2(E+6;
-
( 1 6 )
zs. gqi t dq w +cr *oft qr lewr rd t z(1) 4.qf{fl (Compiler)
(2) qF+{Tf, +qtd{ (Application generator)(B) Rqd +fta(4) f+fu vorq iir (kktr{ qqtC fu*zql
80. Q{{ q*s ++q (rrAL) ffi 1g"r,u'ation) de q,l g-fldruT t I(1) 2 (2) 3(3) 4 (4) 5
(2) 7
@) 32
sl. 3risgr {qR (srer *uF+{H) + fuq Ascrr qndi fr {Rqrd di ErA ffil oit'l ql €@T\
7a
(1) 8
(3) 18
sz. {q-q 1*-qFrt{H) iTd qT fud'fi (simplex) qts ffii + stn.rr 61 si-Jqfr tdl B(1) q{ Rvrr ii(2) qs {Trffi qt !:s 8 R{n fr(s) qs fr qrrq qtfr Fflreii fr(4 ) r+ f r t f f i t iA
BB. I,aN ii qs A dq-d t z ftf (Nodes) + qtq cqKr t qrEr {fr fr-fr t(1) 100 m (D 1 km
(4) 10000 km(3) 5 km\ ^ ' \
34. ZltF;T I$t (Token Ring) € 9S(1) uN zlqt*$(2) LaN ft*'q iqg (a.."ss method)(3) fr.'{FT+{H sTfH++qT (Communication architecture)
@) LAN 6rd+{i
sE. qffiic ffiflr (Circuit switchins) + fdq elq qr gr;zl q{q (step) ?6? t ?(1) ffi q*S qf$-{d (Network Access Password)(2) qBz dffi€ (Circuit Estabtishment)(3) 3|Zf qiqs'{ (Data T}ansfer)(4) HffiZ Zffi+flq (Circuit termination)
36. EDIFACT T(1) sqtr*flq TH (Communication Standard)(2) {2d E!-sqi €<of (Retail Industry Standard)(3) c€d qft qgFfF{*|4 !tr tr (Standard for Administration and Trade)(4) gFSfrW4 +€d (Tlansmission Standard)
CIC-2(E+H) ( 1 7 ) P .T ,O.
s7. Tildr tte ffirr qks srfl fuq$ q) K-{tqR 1@r+vn) Fqrrr qr t, qO t(1) NICNET (D BITNET(3) USENET (4) I.NET
sB. frIqfrfuf, fr t qt4 qT qsd p tix (sinele crypto system) 6,r f6Fqr t ?(1) gfumH{H e) qqRzz.WTi(s) ru eil-r tzl tif @) nsa ttrtRq
se. qffie qt +F5-s if qrq lqarfrFzn) trRr srcT qq+q q) qrq s.{i qi qFffir t(1) sraf *fr{ (Data tapping)
(z) ffiekq (Cryptanalysis)
(3) ffi+Si (Cryptography)
(4) d}-q (Leakase)
40. 6 6q*f*r +'Jrq 6i 3iqqnw qq$ rdA ffi * pfr ?(1) til€ Rn€ (Ronald Rivest)(z) fuM qtrf,iq (Leonard Adelman)(3) sTrR Yrft (Adi shamir)(4) sf4 Efq qfu (.tott" Von Neumann)
4r. q1-q1 ffi t-ffi )€ (posr) qd fdwr A(1) qfut Gootine) ST(z) lafrh'r 6r(s) f*'dlq1 6r(4) fdKfl miqq (Disaster Management) EFT
42. Boor {frfrd qrfls fd,q s,r{fi 6 qrnFdd s'{frr i ?(1) COMMAND.COM (2) IBMDOS.COM
(3) GENERAL.EXE (4) AUTOEXEC.BAT
4g. fu 0,"r,igh) qr{w .(1) v{0 qdd qTFbSr+ t qk€ ii eTrqr(z) C+zi{r q{fr{ t xqfd-d d(s) *-+o .nxn sEdi s) A qqrFqf, +-wr t(4) iqe conaMAND.coM q,r{f, d 6 ${Hd orar t
44. grcr EFfrc{rq rH (DES) QgtRq (Aborithm) encrypt 6{i * ftTqrt-s dfr-*.l carar i r(1) 8 bit Q) 16 bit
(3) 32 bit (4) 64 bit
C IC-2(E+H) ( 1 8 )
45. trFffi f{crdf ii ffi Risk * q6qm{r frq fr t f+-r6r q+ Fwr t z(1) ffFFT{TT tg (o"nnition phase)
(2) fSTfl tq (nesien phase-)
(3) riwrid ffi€ (Functional requirement)
(4) EFWt*flq (Implementation)
46, aR+rfTIq (Vaccination) frrT t t ffs6r qs fdwr t ?(1) ffi+Si (Cryptography)
(2) td-qfqfq frfl-q fAnti-Virus program)
(g) ffrqfg{ ffi (Disaster Recovery)
(4) ffiRz1 tgtRq (Security Atgorithms)
47. iFE (cruvity) qt-fl€ d qO q} o-O qr-dr t(1) €t€ (Stoned)(2) tfr qdt ff (uuppy Birthday Joshi)(B) gT* q+G{ (Dark Avenger)(4)' tndq (Raindrops)
48. FrqRrfuT fr n dq qr qrflq .ExE silr .coM qr{d + sTrfiR +1 q.aror t u(1) +NsIHr (Marijuana)(z) tTff (Raindrops)(3) i{,,-q-Aq (Jerusalem)(4) *I (Brain)
49. kqr€{ ffi (Disaster Recovery) {ioifqq .
(1) qlqqT fr 6ET t(2) ffi +1 or+n* o.ri t(s) (1) e*t (2) Ait(4) r+n t fr.$ qfr
50. *fr+$r ?iq-{r or seTq i(1) mtq eT \'ffiH vq0 wiqr fmFcisd t sA €js{r(2) Erflqr sT @-FrT(3) 6.ttc-{ Sl R-{c (Reboot) tF-trtT
(4) R-qret + ldq ffiqR qfu +) gFrR+a mw
CIC-2(E+H1 ( 1 e ) P.T.O.
Er rdr{q Ffr t ril qtrfi (ss{ ri. n t roo rq')
qlz : a?A sosel'Rq qq d t qE fqqr rqr qqa s& d d l eifu al, qaw ss +PII7w o eifu rt, qR qr+ ,rdd dl t
bl. {{ {dq (von Neumann) etffimt q fufr or yd.+ Re fqiT ffi +t voqf,I tq*s fqqr qr v+m t I
52. ffiF{prd Ek{ (Differentiar ensine) t fdq qcT fr ersrE (output) q} q4, fldqq gfu (card punch device) 61 tr qTT f*qr qr vqc'r t I
53. ENrAC qs rffrq qlEl oqa t r
84. 8080 qrg*Jfr+gt qHtf,r (Motorola) arir fudfud f+,fl 'rqt elr t
Eb. Mc 68020 Fq tcr'ip) Sq{ +.qei qr Rwr t r
b6. ffi qRd (Memory parity) lE luoo',6d4{r 61 frsra-dpi 6r qs r+aruT d r
57. cpu rfugt (Register) |f,fiffi (Secondary) ffi + Hfq fr+ sTqHfrqT q-Cm d I
b8. ffi (vr"-ory) S qr+r (ffi) * w qri qr srer rfr qqr qrfr sQ derarw eotqror t I
5e. PRoM qS qR a rmsr qr ssf,r t I
60. .Filq1 kg q* Nqkq ffi Gti*ary -o-ory) t I
Gt. Rfqi }. qqA fr {+Fqd qSt (.or,."ntric cycles) d fr+-s (sectors) 4-6i qror t r
62,. 5s R@ qq (is) qr A-s s1 qiR{q oG fo'nt) qT srrq €r+ ar{q (seek time) ddT€ l
6s. ffirzT (Winchester) BFh, +iEH $fffiT{g (Masnetic oxide) H'I E{t ehr t t
84. s I sq q.r Ske kw errsflr 6b0 MB sl-cl 6T qsnq q-q irq,ar t r4
6b. s,fF-+-d qR ts sr&6 (Readers), eir{*fr fs-ffit * wq qTfr E}i t t
66. cAD qs q.qdr +1 eErirdr t q-{r.Rsr{q t r
67. S"-ie (Inkjet) fier qs rh-Fd€ (non-impactl Fjat t r
CIC-2(E+H) ( 2 0 )
I
I
II
68. qr{t<R 3n-<{ITs (ParaIIeI interfaces) €rilqd\ {t qq5t t F|--if qi frEi + l-dq x3tr
t6q qrt t t
69. qzT d qTfii-+qi (Data flow architcctures) stso eTfit+q{ dil t t
20. ffi es (Memorv Buses) tHfi 31h cPU + fiq ercr 6 erf,{ul oifr t t
7r. zT{c-s 6,qq€ (Tishtly coupred) d-i t {tqd (sr,ured) tq-fr (memory) d|fr t r
72. qlqq-dT{fu frfrfHq R€q 6r W-d (throushputl StTRf,T t r
73. Rrsc q{fr{ q1 q* {fr (cycle) if z fttqii q]1 FIETr{f, q-fr q;{qT qrFoq t
74. qFd*ql-{ ffi fusq ffi 6r qs fowr t r
75. tg{ ry"r,tura) (s o'P tts t r
76. FRAMEwonK qd-fttR{, ffie' qzr+.q tp }35dru !-drm +l q}-'s-dr t r
77. sa1 ii{l-tt, q{fra d?+q fr'Jrq t qr<t qd e.rrT 6{dT t l
78 .6qr { f , {+1ge-+ i { f i rd .T iEM{(debuggrng)4Gt rdqw{ f i z Ie rwr t r
7e. sQL HqrT qd si qrqr t&ql t r
80. xon qfr t qf( {TtI gB +ii aif,s q-fr t r
8r. If-then-else €r{4r \rs qqfrq (qfr'T) ffi t t
Bz. xm * fetq, x q6 q{ (variable) t 3i{ v q* rqrd 6r qrq e' I
8s. t6i*€ EfF€{ (Resident Monitor) y-qq riqfe' (Batch processing) * qrq qW Etdr t t
s4. frq-qs4 (Pop-down) t1 +1 tr+K dw (Dialog Box) fi 4-6r ql?n t l
85. qKrf,r cur * fdq qfi.1+{{ m4tq €z{hs (API) }q-f,qi-a qqErq{f-{ (Development
environment) 6l qS 3tqT t I
86. iq.1q q+q{ gFnflq (Program Structure Diagram) d g.fa W} gfqfq|{ (Data Flow
Diagram) fr o-O qrdr t
87. gl$ tksress)(S qmf*f{ gfdi{g i r
( 2 1 1 P ' T ' O '
Clc-2(E+H)
88. 'o'F&ETfrs qtc qi sqR fd +) qffdr d r
8e. EfueT (Disital) {d t q} vqq * w}qT sild t r
e0' {)tt 6aoa"-) +} r@E{ fr@z{ (Modulator-Demodulator) s q-or qrdr t rer. fufu'r fuw +' leg pnmncr +) cusDEC * sq fr qrfl qrlmr t rs2. FfreDqi q) s{S .r5d rgoo S.t fr rqa fu+r rpn qi Ie3. oto, $sq@v Ef€e.T. e:fs &ilffi ffrr) q ffid fu-q,'rfl en rs4' qqiq
"tr srd 14"""rs contror cards) 'T + rmq Fdq,- dt t r
eE. stzT+q fr qo""y views +r ftrrlur g{ffi t ldq fu+r rqT d Ie6'
*t,(Back-ur)+1 $FTd 3r{Eltfidl, trtoie q eriql dqi eilqFFif sr Hrrtr oc t req
e7' 3-6sH d qifud Ri + liTq sffi (contingencyl qlqfl (plan) +) rsTgq fuqr rrqrEIT I
e8. qlelRur (plain) qqqivr +) E-afubd qi{qivr (cipher text) rfi o6r qror t. ree. F*qti T+.qH 6tvr qr{fr trdl ERr fuq qrdT t I
100. 3T<Rrq tqr ftos Hffiq) 6A{, irrft 0vr",,'o"y) fr qrq sni t, r
CIC-2(E+H)
-
( 2 2 )
<s ord b fre s{6
clc-2(E+H) ( 2 3 )P . T . O .
tq'irrd s. fts d{r6
CIC-2(E+H) ( 2 4 ) 5,000
CIC-4(E+H)
CERTIFICATE IN COMPUTING (CIC)
Term-End Examination
June, 2006
C I C - 4 : T H E A P P L I C A T I O N S
Time : 2 hours Maximum Marhs : 100
Note:
(L) Do not start a.nswering until the inuigilator asks you to start'
(ii) Question paper contains 100 questions. Stud,ent is required to answer all the questions-
There is no choice.
(iiil AU qwestions carry equal marhs'
(iu) Each question must be giuen one qrlswer only. If more tlt'an one answer is marked or
giuen, zero rnarh will be awarded for that question-
A Multiple Choice (Questions number 1 to 50)
Note : Four choices are giuen fbr a question, out of which one choice may be correct. Mqrh
correct ansu)er- in releuant column of the answer sheet gi;uen to you. In case you feel that
none of the choices giuen.in a question is conect, marh in, column '0'.
l. Which of the following DOS commands deletes a directory and aII the frles and
subdirectories contained in it ?
(1) del
(2) rd
(3) del tree
(4) removc
2. EGA and VGA are the names of
(1) Network adapters
(2) Graphics adapters
(3) Sound adaPters
(4) Motion adapters
CIC-4(E+H) ( 1 ) r P.T.O.
3. Which of the following is not an operating system ?(1) UNTX(3) LINIIX
(2) XENIX
(4) ZENITH
.EXE file
.CPP file
4. MIS uses which of the following department(s) ?(1) Information Reporting System(2) Decision Support System
(3) Executive Information Svstem(q AI the above
which of the following applications can be seen as accessories in windows ?(1) Notepad e) Calculator(3) MS Paint (4) AII of the above
PIF stands for
(1) Program Internet Files(2) Program Information Files(3) Picture Information Files(4) Picture Internet Files
which of the following is a main feature of authoring software ?(1) Integrated Multimcdia Elcment(2) Script Language Programs(3) Supporting Video for Windows(4) Al1 the above
o.
6.
t .
8.
9.
The following is not an executable frle :(1) .BAT file e)(3) .COM file @)
API stands for
(1) Applied Programmer Interface(2) Application Programmer Interface(3) Applied Proccdural Interface(4) Application Procedural Interface
10. EDP stands for
(1) Electronic Data Programming(D Electronic Digital Processing(3) Elcctronic Data Processing(4) Electronic Digital Programming
C I C - 4 ( E + H ) , ( 2 )
).i
t;:, 11. The ISO-OSI model of networking contains
(1) 6 layers e) Z layers
(3) 9 layers @) g layers
12' Thc nctwork in which the existencc of multiple autonomous computers is transparent (notvisible) to the user is
(1) I"AN (D Distributed system
(3) wAN e) None of the above
13' The governrnent users have the following choice to connect to other networks :(1) VSNL e) Ernet
(3) SATYAIVI (4) NOW INDrA
14' is a pr-oduct developed by Microsoft Corporation that enables groups toteleconference using Internet as transmission medium.
(1) Net Meeting e) Video Confcrencing
(3) Cool Talk (q Internet phone
15. EDI system has a mdih,cornponent as
(1) Application Servicc (Z) File Service
(3) Mail Service (4) Wcb Scrvice
16. which of the following graphics frle formats is not supported by web ?(1) JPEG Q) PNG
(3) GIF @) None of the above
17. PNG stands for
(1) Portable Nctwork Graphics
(2) Picture Network Graphics
(3) Perfect Network Graphics
@) Picture New Graphics
18. which of the following is not a part in powerpoint,s Insert option ?
(1) Language e) Chart
(3) Comment (4) picture
crc-4(E+H) ( 3 ) P.T .O.
lg. To enter a formula in a particular cell of the worksheet in MS-Excel, you have to frrst :li
type :
(1) $
/'a \
20. Cylinder/Cone/Pyramid chart in MS-Excel creates a chart with
Cylinder/ConelPyramid shape.
(1) Column
(3) 3D
2L. Payroll System includes
(1) Generation of Pay-slips
(D Calculation of PaY
(3) Calculation of Overtime
(4) All of the above
22. A database system includes the following components :
(1) Data and Users
(2) I{ardware and Software
(3) Data, Hardware and Software
(4) Data, Hardware, Sofbware and Users
(2) #
(4) &
(2) Bar
(4) Surface
(2) 600 MB
(4) 100 GB
23. A CD-ROM can store upto
(1) 1 TR
(3) 200 KB
24. Corel Draw is a
(1) Graphics Package
(2) Database Package
(3) Multimedia Package
(4) Word Processing Package
25. EDI creates the following fiIes as a document passes through the system :
(1) Integrated format frle
e) External format frle
(3) Transmission file
@) All of the above
CIC-4(E+H) ( 4 )
26. MS.Excel is known for
(1) SPreadshects
(2) Spreadsheets and GraPhs
(3) Spreadsheets, Graphs and Databases
(4) SPreadsheets and Databases
2 7 . T o c h a n g e t h e f o n t s i z e o f t h e s e l e c t e d t e x t u s e t h e k e y _ i n E i c e l '
(1) ctrl+shift+P Q) shift+P
(3) CtrI+P (4) Shift+DeI+P
28. Intel is a company that manufactures
(1) Software Q) Processors
(4) Network EquiPment(3) Cables t+) r\eLwurr'
zg, What is the name of the latest Server Operating System developed by Microsoft ?
(1) Windows NT Q) Windows 2000
(3) Windows XP @) Windows 2003
30. Applications of Hypertext are used in
(1) Computer Applications (2) IJusiness Applications
(3) Educational Applications (4) AII of the above
31. what is the address given to a computer connected to a network called ?
(1) System Address Q) SYrid
(3) Process ID (4) IP address
32. DireclX is a
(1) Graphics Package Q) Word Processing Package
(3) Uscr Interface (4) Programming Language
33. OpcnGL is a
(1) ComPuter Part
Q) User Interface
(3) ProgrammingLanguagc
(4) Software that drives graphics hardware
g4. Which frle in MS-DOS contains internal commands that are loaded during booting
process ?
(1) Io'sYS Q) MSDos'sYS
(3) CoMMAND.COM @) CONFIG'SYS
c t c - 4 ( E + H ) ( 5 ) P ' T ' o '
s5' which of the following is a database management toor developed by Microsoft ?(1) dBase e) Access(3) Personal Oracle @) Sybase
36. IISAM stands for
(1) Ilierarchical Sequential Access Method
Q) Hierarchical Standard Access Method(3) I{ierarchical Sequential and Method(4) Ilierarchical Standard and Method
37' is not formal enough to bc implcmcnted directly in a programming languagc.(1) Analysis model
(2) ER model
(3) Object-Orientedmodcl
(4) Object-Oriented Data model
38. Size of a database is usually measured in terms of(1) Terabytes
(3) Databytes
39' what is the name of the 64-bit microprocessor deveroped by AMD ?
40, While using Excel, a workbook can have -- worksheets hy default.(1) 15
(3) 10
(1) Opteron
(3) iMac
(1) 82 and 36
(3) 80 and 36
(2) Megabytes
(4) Gigabytes
(2) RISC-2000(4) Athlon
Q) 16
(4) 2
(2) 90 and 30
(4) 80 and 30
41. A I.44 MB floppy drive has tracks per side an{ sectors Ber track.
42, The public key crypto systems make use of(1) Encryption and Decryption
(2) Replication
(3) Duplication
(4) All of the above
clc-4(E+H) ( 6 )
l
43. HTTP stands for
(1) llypermedia Text Transfer Protocol
(2) Flypermedia Text TYansmission Protocol
(3) Hypertext Transfer Protocol
(4) HypertextTlansmissionProtocol
44. A protocol is
(1) A set of rules
Q) A set of data
(3) A set of information
(4) All of the ahove
46, A file which contains readymade styles that can be used for presentation is called
(1) AutoStyle
(2) Template
(3) Wizard
(4) Pre-formatting
46. PowerPoint 2000 has number of views'
(1) 3 (2) 4
(3) 5 (4) 6
47. Animation schemes can be applied to _-- in a presentation.
(1) All slides Q) Select slides
(3) Current slide (4) All of the above
4t. In Microsoft Excel, the intersection of 3td column and 8th row refers to'the cell
(1) F,iz Q) D8
(3) CE G) E8
49. Which of the following is an oldest spreadsheet package ?
(1) VisiOale Q) Lotus l-2-3
(3) Excel (4) StarCalc
60, How many characters can be typed in a single cell in Excel ?
(1) 256 Q) ro24
(3) 32,ooo (4) 65,535
c tc -4(E+H) (7 ) P 'T 'O '
B state whcther Truc or False (euestions number Er to 100)
Note : 'In the following 50 questions, marh 1, if the statement giuenis true and.0 if the statementgiuen is false.
5r. E-mail is considered to be a safc mcchanism for data transfer.
52. DLL stands for Data Dictionary Link.
53. Dumb terminals are tcrminals without CD-ROM drive.
54. Microsoft Publisher helps in preparing documents.
55. Data can be stored only on one side in a CD_ROM.
56. Coaxial cable has fastcr data rates than fibre optics.
57' For communicating through EDI, the source frle should be conlerted to EDI standardformat.
58. MIDI stands for Musical Instrument Digitar Interface.
59. Microsol't Access is an example of RDBMS.
60. A CD-ROM can storc maximum tgO MB of data.
61. ATI\{ stands for Automatic Transport Machine.
62' SLIP and PPP are TCPAP protocols used. for connecting to Internet through modem.
63. Telnet is used for transferring file from client to server.
64. Outlook Express can be used for sending mails.
65' The Text field can be used to store alphanumeric characters of length upto 25b bytes.
66' QuickTime is a multimedia software suited for synchronizing sound tracks and video tracks.
67' An example of a program that has a built-in programming language is knowledge program.
68. DSS stands for Dynamic Soft,ware System.
CIC-4(E+H) ( 8 )
69. A floppy disk comes only in one size of 1'44 inches'
70. A LAN means creating network covering large geographical area'
71. The limit of speed up is defrned by Amdahl's law'
72. Forecasting problem is a natural candidate for parallel computing'
7g. MIS is designed to provide MaiI exchange service on Internet'
74. To provide accurate, timely and relevant information support Information system is
needed.
75. Like CD-ROM, a laser disc uses the same recording media'
76. SVGA card stands for ..Super Video Graphics Arrays,,'
TT.Twogenera lschedu l ing techn iquesareGant tchar tsandBarchar ts .
78. Graphs is not a section in Lotus Organizer'
79. CTRL+J is used to align left and right margins of a page'
80. vsNL now offers Gateway Electronic Data Interchange service - GEDIS Trade Net to
Indian Subscribers'
81. PERT stands for Program Evaluation Review Techniques'
82, Application service sends the document in the internal format file to the Translation
service.
83. EDI services are Application service, Translation service and communication servicc'
84. DOS system frles include AUTOEXEC'BAT and CONFIG'BAT'
85. MIDI stands for 'My Indian Digital Interface '
86. Animation makes the presentation light and attractive'
87. The transport network provides a powerful electronic message service to support EDI
services.
c l c - 4 ( E + H ) ( 9 ) P ' T ' O '
88. Gopher is a menu-dnven search engine. , , :,,, ,: : ,
89. Hypernet is a Hypertext browser for FTp accessible sites.
90. Mosaic and Cellar are browsers for Internet.
91. VPN stands for Virtual public Network.
92' Two networks having different network operating systems can be ljnked to each other.
93. Internet is based on client_server technolory.
94' Integrity refers to unauthorised modification of information.
95' Primary key identifies each record uniquery in a database.
96' swIFT stands for society for worldwide Inter-bank Financial relecommunication.
97' The linking abilities of Hypertext are ideal for the learning of foreign languages.
98' :rfiJr*tt""Jr.
has two main forms : scenarios based simulations and telephone based
99: Fax provides an interactive interface to the user.
100' video confcrencing is used for online mectings and conferences.
crc-4(E+H) ( 10 )
SPACE FOR ROUGH WORK
( 1 1 )CIC-4(E+H) P . T . O .
SPACE FOR ROUGH WORK
CIC-4(E+H) ( 1 2 )
fr.sTr{.fr. -4(E+H)
nEfube rq 6,'qfdTl ffi.3n$.fr.1
srid qfien
ET, 2006
S.flr$.ff.-4 z srgquiFr
WIzl : Z qot qftrffiq ai6 : loo
i e :(i) wif qr wt fuwr d6r d6 qz{rry z ol qq dq frfleffi gqF ar? + frq a ryd I( i i ) w tw t r co rwd rM f f i d l s ' , f ' swq r l q f f i d r+ l d f f i ad ' d r(iiil sfi wif + oim sqn d 1(iu) xd+. yw w *qe qa drar fr rqR \q t etfqo sil0 T{ fqwq alnq w at qr
rar Pq 4q di a) rs wr w Ea eia Eqr qgqr rtr q6k+.fl (vw {qt r t so ro)qb : ffifu7 srd) C xto yv+ +rfo qn @ pe 4q d; ma 0 C*' €d F) v6Flr
d I v-d rar +) rf,r vtzs w riaiftn 6n7 f oifui of r qR *ld * vrt +rd rd6), 6) wry W rot t iifu ql t
r. FTq it t slq qT qd oos qqis q+ grqMr sftr ss+i v*sniEefr s1 €sfr srE-d +)Fa<ar t ?(1) del
(2D rd
(3) del tree
(4) remove
z. rca qh vce qrq t(1) @ ts.Tt +(z) iffi-ffi tsqt +
' (B) Hds tgq{ +(4) igrq (Nlotiorr; {get *
clc-4(E+H) ( 1 3 ) P.T:O.
B. ffifuq fr t +{ qr gs FrRFr ilq (s:fqtEr fuemy ild?' t ?
4. nrm frqfuka q t 6tq w f+rFr (Mta) gdqrd ocor t Z(r) $qfi{rq RqiE r fuRF(2) fsffiil{ eqtj fugq131 qffit+{E-q qqTil{lq fugq (Executive Information System)(4) sq{i6 qS
E. ftrr fr + dq eT qFd*ITq, mq (windows) q qffi-q (accessoriesl * os tf tor qrv+nr * z(1) ibqs(3) MS t€
G. PIF .FI BTtf t(1) n)'ltq F€{iz r6r$iq(2) fr{'u gesTsqq w{w(3) fu+q{ f+i*flq r6r{w(4) fr+qr F"{tc r6r{eq
7. iiq q v q;qt frea tSqfr,Tl ffiqr 6r g€q eeTur t I(1) qFuDs qfteqlR-qr qffi€(2) |wq +raq x)'Jrq(s) ffis + feq sdr+s qiH(4) sq$-s q$
8. ffifun fr t +{ el !$ ffi (executable) r6r{m rd t Z
(1) UND((3) LrNrX
(1) .BAr q'r{f,(3) .COM Er{f,
E) XENIX(4) ZENITH
(2)
(4)
(2) .EXE ql{f,
(4) .CPP Sr{m
t€St-ersqdffi q$
9. API .F'T 3ftf t(1) qqr{s nt{rq{ F€Gq(2) qlqtflq *fl-qt E-.Tr+q(a) qqr{s }ikqrd Fathq(4) qffiH mkqw Eurhs
lo. EDP iFT erei 'F
(1) fufrs sra qbrtr'T(2) {WFrs lsfwct e}fifr,7(s) fuks sra frqfr,T(4) {Wfr6 fufsa-d nrqTfr,T
CIC-4(E+H) ( 1 4 )
11. teqffi-T *(1) o iqt(3) 9 c|qt
rso-osl *s€ fr(z) z iiqr(4) e A{r
(1) JPEG
(3) GIF
17. pNc t q-coq d
(1) q\fdd ffi nFFN
(z) Fr+q{ W }ffiw
(a) q{+€ ffi nfrw(4) tr-+q{ q ifiFffi
(1) dr+-q (Lansuase)
(3) 4fq 1go-ment)
CIC-4(E+H)
@) -qt-s fr t +ti q-fr
(2) Ernet
(4) NOW INDIA
(2) qfd (ctrart)
(4) FI+q{ (Picture)
( 1 5 )
12. e-r ffi Fqn E€qrd q-{i eT-a * rdq q)-$ Elqf, 4qeit dt 3qRqfr qrK{fr (r{€-dr
r8 t) a-fr t, t(1) LAN
(3) wAN
(z) ffifl dT
r3. s{fl-fr 3qq}mFii * qm 3nq qffifrit 1M) t dgf + ftq Fffifdpild it t nr gE-*r \ ^
€ /
(1) vsNL(3) SATYAM
14. q11dpiw sTqfuI+ (Microsoft Corporation) $I ft{ln qs s-flrq q) q+ qTI ({q) 4}'
{€{+c d €qR qrrqr{ fr nre ffi";+ g erwr*t+ (rereconferer'.") s-G frq
q{rar t, {6 t(1) fu qlETI (Net Meetins) Q) ditr{ii q;T4iF{Trr (video conferencing)
( 3 ) { ' f , d - S ( C o o l T a l k ) G ) E c f i z f r q l r n t e r n e t P h o n e )
rb. pu fsgq ii qd gq Er-s * sq fr t
(1) qFdailrq tqT Q) ql-{d iel
io srs (t€) tqT (4) tq twuul t*
16. frEq it: t qt{ qr }Fn+tq qr-{ qtk tq ffuu) mr qqfta rd t ?(2) PNG
(4) *€tr fr t 4\$ Tfr
18. f{qqi u,}q q1 qqq-5a(powerPoinU* *g-J 3{IqH (Insertoption)6lfdfqr rd t Z
P.T.O.
le. Ms-Excel q q-ffie + ffi fqfus +d t w sTtdr +) srdt + fdq q]d_S qdA orTr+)Frr e6q +-cqr fr elqr U(1) * , r , #(3) =
@) &
20. MS-Excel fr Fsftrsrz+t+zfrtfrs qrd, frfufi/+tqrfttfus erTFfd Erml qs _ qd(1) 4ff,q e) qR(3) 3D @) v6q
zr. tte e.yroll) frw fr ITrfud t(1) y-cr+zt-at +i {#q s.r firdre) y-onzt-ra 6l Tulqrr3.r 3nE€TSq ;f[ rfu;qf
, : (4) sq{ffi Hq
22' qs glerilq Rsq frq q t +h qTzt T-s yrFrd q.rar t ?(1) era eil-t sq+sT
e) drslq{ sil{ ffi{l r
(3) wa, 5rd*+t silr ffiqi(4) sra, 6rd|+1, Tfq-+€R s,N sqqtfrT
23. qs CD-RoM --- n-* sisruur fsdll q-t qqar t, r( 1 ) 1 T R(B) 2oo KB
Q) 600 MB(4) 1oo cB
24. *)te gf (Corel Draw) (S.(1) ituw q+q d(2) qerAq tt-q e(3) qffitrqr q}q A(4) yr< €ffier{ (Td q}Sfur) q*q t
zE' f-q q t +{ qi qrre +} EDr q;r.r t vq q-s ERr+q fusq fr t ycor t z(1) Ffu},}s qfilz srFf,(2) qw-6id sTqe sr{d(s) pivfrvn w{d(4) Bq{il qqi
ClC.4(E+H)( 1 6 )
2,6. MS-Excel ql qF{r qrar t(1) dern-4s + feq(2) +i={t6 3Ih lrsl + lf,q
- (B) ffiry, nTsT 3+r <rzr+q t lf,q(4) rlsriqq sTh sredq + fuq
27. Excel ri ffi qqp* q-{qieT s eqr{ q sTrq'R ,n q-qf,i + ldqq*nqrd od t r(1) Ctrl+Shift+P
(3) Ctrl+P
28. sle w 6qii t n Ftqiur qrfr t(1) *fwdqr or(s) *etii 6r
{si w
(2) Shift+P(4) Shift+Del+P
(2) {igffifif (Processors) i5l
(4) qRrFrI gffiql +l
2s. q{drqTE (Microsoft) gRI Tqfrffrd {rd1 (s"*"r) FItFT ciT (operating System) q.r HI TIqr \ ^
E !(2) Windows 2000(4) Windows 2003
Bo. 6rqqr}€ + 3r{qq}il 6r {frft{ fr-dr t(1) 6.qc{ rurq}il t e) qrqR srgq+il fi(B) dtfiTs q5q+,t fr @) sq$r H$
sr. fs qrcmq f#l n E.3 q,q5 6i qi Td'r (q^+s) fflr qrdr t, sfr 666T qmr t(1) REq q* e) q]qfrs (syTid)(3) qY+H ln @) rp gls
32. DirectX t s.(1) nFFw qhq e) Td nl$fg'r q+"d :(3) qs TR Fzrt:s G) qs qffiiT d"ilq
sB. str4cl, t q*(1) 6.tr{.t 6r siYr(2) qs srqlffi F.{hs(3) q* ffitt rTlqt
.,(4) trs {ffiqr qi +Fn-+iq ETdaq{ +l =rerar t :
s4. MS-Dos s1 slr S qr{n fr sridfus 6qis dA t qi {trT qfuqT + d{H lde t qI cils(Load) th t Z . :(1) IO.SYS Q) MSDOS.SYS(3) COMMAND.COM (q coNFrc.sYS
(1) Windows NT(3) Windows XP
CIC-4(E+H) ( 1 7 ) P.T.o.
86. Frq fr t qh qr qr{*t{f€ fl{I ffifr qd srcdq Fit1{ (dM€) Ef, t ?(1) dBase (2) Access
(3) Personal Oracle (4) Sybase
86. HSAM t R-e-q t(1) q-il-{ffiFrs %{frtrs sTFTrrq q"nfr (ETrffi{m kdt{qq q+t* ttr*l
(2) q-{Tmlqs qr+q e+Frrrq Turcfl' 165affiro g<i q*q qglsl
(3) qqTE-mfs 3T-{ffiFffi 31h stnei (Er{rffiq-d @Rrtm gs tqg)
(4) qqTfrtrs qr++ ei{ qundl filqGrd N lgs isrs)
s7. ffi xffir +rF fr Sq fi ant di + feq srrgm sffid qil t r(1) tq|IRR|q Ef-w
Q) ER {gf,(g) sTF]-dqq-3TfqlRf, (object.oriented) dRT
(4) sTFreH-3TrqrR'f, srer dsf,
38. qTrmur nt{ qr glul+q 6r qrfi qrqr qdr t(1) 2{tni'erq (Terabytes) it Q) trT|qr$€ (Meeabytes) li
(B) sffqr{€ (Databytes) tt (4) FTTTHE-{{ (Gisabytes) i[
Be. AMD sm ffid 64-bit + qr{*)frSw 6T FtT rrq t ?(1) Opteron Q) RISC-2000
(3) iMac @) Athlon
40. Excel {trrfl?T +rt gU qfffiq (Eqt-iz) * enr q6 6r4-5ftr6r t srdqr6a v + a e r(1) 15 Q) 16
(3) 10 @) 2
4r. q{ 1.44 MB fr wfq1 Gloppy) gr{q q trd Yfd ql-{s ffir Qted
x r d e s d i t t(1) sz 3ilt so Q) go *t ao(B) so 3ilt so e) ao s+t eo
42. s{ :iffi ffi dr 1qffi+-fr-F*e} meq) SRqq qtwr t(1) Wd€a nqr FTtt (lFffiqn qrs df*wn) ut
(2) Rffififlq (Replication) EFT
(3) gFf,+TTT (Duplication) tFT
(4) 3q$ifi qlfr
clc-4(E+H) ( 1 8 )
-
48. HTTPEI ffi E
(1) 6tqq{mfgqr }w qiqs-{ idisi€
e) 65ffifur 2w ?iqFffi{ ieH-d
(3) ETqqr}€ ?iqqr melqf-d
(4) Elqqrlw ?tqFNTq ffid
qs ffiafd t(1) ffif 6s g+ {q-q
e) sffi 61 q6 riw
(B) Wileit 6,r qs {iwr
(4) w$6 qS
46.qssr{€ge.itq{r-qarqr(tsts)€r{daff irt ,RTqfi-6{gr+frqF€Hf,|+qrqt
"*t t, sil 6Er qrdr t
(1) 3frztgr{d (AutostYle)(2) tdc (TemPlate)
(3) ffi (wizard)
(4) fr-qt{ftlrr (Pre-formattins)
4&, qT6rqqt*z 2000 (PowerPoint 2000) it {(views) dit t t
(1) 3(2) 4
(3) 5 (4) 6
47.q+$Etrf irurfrqr4i{qtqqd(Animationschemes)ET[aq{frt. (1) q$ wr*ii fr Q) gfi g{ KT{iii t
(s) {ftq Kr{s it (4) gq{F qs
48" qr$** \,"Rq (Excel) q Tfr efdq (Column) 3*{ 3il-fi t Gow) t E-fff*{q qr riqti
(1) E2
(3) c8
4s. Flq it t qh qr v+t sn-{r d€rfc q*q t ?
(1) VisiCalc Q) Lotus 1-2-3
(3) Excel (4) StarCalc
so .Exce l i tmsq f i -d t ,d+e i l< i f f i 3d tT { (cha rac te r )Z l - {9 r6qqrv+ t tu
(D D8
(4) E8
(1) 256
(3) 32,ooo
CIG-4(E+H)
(2) ro24(4) 65,535
( 1 e )P . T . O .
Er {i|IFT qifr t qr rtrfi (qs{ d. sr t roo ra)qh :
Pr::#,## I*T#w 6rt vE7 d' at t ai6 a1, qryErw pr7
$-+m s) *ikil reri*sT er<rpr) * sr*vs-ffi + fuq qs g{R-d irs{ts o,-+ qrdr d rDLL il 3TS t srcT R-+qrit fu* r
{d (Dumb) eft{d cD-RoM FEq + frrr + {-g r}il t r
{|EdmE qfs{R (Microsoft publisher) (wr}q dqT{ q,ti fr vOr_rar o_tnr t rcD-RoM + +{d qs fi a** fr 3Ti6d 61 rfsrqq, frqr w q6* e Islqfuqf, *qe (cou*iar cable) sr r'r{{r qffu+s + q* fr' srdr .* +* t rEDr d*r RElqur t fuq, els qr$-iT (source file) +) EDr q'.fi sT+c fr {R* u,Fq r
s8. MrDr,w ed d qFq+E Fg+* Efuao r+quq I59. 4lFSitrE qtr (Microsoft Access), RDBMS q.f \r+, sq6qrf $ 160' gs cD-ROnn efirqrq 180 MB srel S',r $is'{q q. v+.ar d r6r. ArM Br q{ d S-i}+trs FisqtJ qqfl_{ r62' sr,p ailr ppR rcp/rp fizlEil-o t q) qtlq ERr {arie t g-si + m F**d frq ETat r
\ - r r - r re r t l l \ l l ' c
63' Crient t su"'u" ils w$-d d qffi + frq Tehet or tdqro t)-or d r64' sltF (Mailsl +) ts + fdq qFqs q-wls (outrook Express) qT {dqrd d v*m d r65. )4g 515 (rext field) 25b Er{e dwr$ 66 saq1qi-slq sf€T * cisnur + fdq {frl-€E) qsdr t |
-'1'\ ' "'r r'\\t..\ .r) .15,l(ul
66' f€"zT$q (euickrimel qs fufsqT FH.m d qi eqfr qq eft E{q qq (vue 2qgo-s dfuq} i"l + Eq+Ttr{ (synchronizirs) t fee uvgs B I6tt' fre-tq (Built-in) ffit +tilq ET-d q)'{q w qs r{flq frfrg krrowredse) qt;rq d I68. oss t qeFFI d erq-+rfus Rfwt.fi Rw r
51.
52.
53.
54.
oo.
56.
57.
CIC-4(E+H)
-
( 2 0 )
Ge. qs qdfi (Floppy) EH aiie 1.44 {i[ ] nm fr q|{q ii sTrdr ,$ 1 ,'.
To. qs LANffi qdc,FrtWd *+'ilfus fu ttr+s ryffiqs{{r | :
7r. 'rfr +1 trcdr +1 eETi +i fr{r, A-dahl * f+qq il{r qRqrfua t r
72. Tqfgrtq-{Hsr vrrt<R sTFr*,tt+ + firq qs xTFfufi dr t I
7s. E-{ffc qr g|.5 3{KFT-EFT q-qT SdqT s.fq|t + fdq urs +1 q-aq q-q1 | |
74. fr-q;q qq{, qqq Q aqr qrciFrs T4{r gtqT scqTi * ldq qid gqTfflq R'gq a1
T*E) f r t I
75. cD-RoM +1 ecd, qd tqr kg ql qE1 fisTfr q1Bqr or g*qre oror t I
26. svcA qrd qr sT{ d "gqq frffi +# Ot"" I
77. fr grqnoT f+iq-s il+frfi (scheduling techniques) t +c qd sftr qR qrd , ,
78. dlzq sfrhrgff (Lotus organizer) if qrs q5 RRr rfi e
7s. !t=s tq + Erfdi 3iT ilq flft.N * nen (Alignment) + liTq crRL+{ aAT t}6r d r
80. ,tltfr'q fldf d vsNr. srq H FWtrs g|zt Fer+^d qffis . cEDrs is fu s,rs t n r t r o r d I
81. pERr q riltrq t rir;rq {+q!${ ftE trR I
Bz. ,rEs+,T t-qr wrw sTffe sr{d fr E*araq d ewrc iqT + frq tffr t | :
8s. por tqreil fr s€Fqlr tEr, sr{flq t-qr s+{ {qR t-qr Et-fi t I
84. nos fueq sr{ej if auronxnc.BAr eilr coNrrc.BAr yrrfu€' Ela't r
85. umr t qa-cnq t 'qd {fsq-a fsfuzr Fil}q' I
86. qf{+$T (Animation) T'q-frs{q 3l}{ sfl-sfs firdT t | ,
87. Fffid W snl tqrilii qi vorqar + fdq qs drn-trq{ FAeifrs €1ur n-* gt*orekn i I
crc-4(E+H) ( 2 1 ) P.T.O.
88. .rlul 16oo1rer) !F U-iiqrFdd trd r-** d ,
8e. r'rp erFrrrfrq qr€i (sit""l t fd( Ergwtc qs 6r$qr}€ qrsw t r
90. Mosaic ailt Collu, quft + ldq ffiS$ (Browsers) t I
91. wN t fiffiEt t u€oe qfus ffi (virtual Public Network) |
sz. siri-rT-s{enr ffi s{qttr{ Rsq qrfi A ffi g* (qt t il-t qr v+t t r
es. guttc qt-{s-qdT (client-server) dq}ffi rR sTrqrRf, t I
s4. Eftfi8 (rntegrity) ql dEtf qqn + 3TeTfirsa qRgdq t t r
eb. {s srzr+s it qrqkm S-S fis q6i:d d f+num$" (uniquely) frfdril ocfr B t
e6. swrFr i qcrcq t M qfr {dqrlg Eei-t sqiF{rq-d }Rr+,qf{*,vrq r
e7. fqkfr qTqr€lif 41 ffi + fdq il{.R*€ + qq-$ +i qrffid q'rq1 F{ilrn t I
e8. R€A{H (simulation) + A qcq e+r*Tt t , ffiqi (scenarios) 3TrEIRf, Rrg-ATT{ 3+{
lddq (telephone) 3TrsTrfrd RUAyi{ |
9e. *w tn'.xl Ftrgtd tR-G ErA +) q-* sleH*qffi sidnfs (interactive interface).$${T
6-rqror t I
r00. *gq} qffiFffi qrq dr{q qr fiET sTt{ qie6tq + idq SfrqTd fr-cr t r
CIC-4(E+H) ( 2 2 )
t
i 1
<w, o'rd b fts srrd
( 2 3 )CIC-4(E+H)P . T . O .
tw'6rd b frs drrd
CIC-4(E+H) ( 2 4 ) 5,000
CIC.5(E+H)
CERTIFICATE IN COMPUTING (CIC)
Term-End Examination
June, 2006
GIC-S : M IGROSOFT OFFIGE
Time : 2 hours Maximum Marks : 100
Note :
(i) Do not start answering unril the inuigilator asks you to start'
(ii) euestion paper contains 7a0 questions. Stud,ent is required to unswer all the questions'
There is no choire.
(iii) AIt questions carry equal marh*
(iu) Each question must be giuen one answer only. If m'ore than one answer is mqrlzed or
giuen, zero marh witl be awarded for that question'
A Multipte Choice (Questions number 1 to 50)
Note : Four choices anv giuen for a question, out of uhich one clwice may be correct' Mq'rk
correet aruswer in releuant "oli*n
of ti" ons*er sheet giuen to lou. |ry-cdse you feel thut
norue of the choices giuen in a question is correct, murh in colunt'n '0'.
l. The window which shows icons fur the mouse, sound and display is
(1) MY ComPuter
Q) ExPlorer
. (3) Control Panel
(4) Task bar
2. On the Task bar the time is shown in the
(1) Starb Menu
(2) Scroll bar
(3) DesktoP
\4) Tray
GIC-5(E+H) ( 1 ) P.T .O.
3. What is the keyboard short-cut for ,cut' ?(1) Ctrl+C e) Ctrl+V(3) Ctrl+X @) Ctrl+p
4' If I want to make a word'Prominent', in the MS-WORD d.ocument, which word would bestdescribe this ?(1) Prompt e) Delete(3) Bold @) print
5' If a paragraph is rcquired to be shifted. from one place to another in the MS-WORDdocumcnt, it is described as(1) Rotate (D Relocate(3) Copy (q Move
6. Which of the following is the example of a software ?(1) ROM Q) CPU(3) Motherboard (4) Hard Disk Driver
7. which key moves your cursor from one ceil to the next in a table ?(1) Tab e) Shift(3) Enter @) Ctrl+Enter
8. In order to e-mail a document within MS-woRD, the sreps are(1) Go to File / Send to / Mail Recipient
(2) Save file as an e-mail attachment
(3) Start'Outlook' and attach file while open in WORD(4) This is an impossible operation
9' To check for alternative spellings for a misspelled word the suitable option will be(1) Choose'ToolsTSpelling
Q) Press F7
(3) Click the right mouse button on the word
@) All of the above
10. The option to align text on right margin is(1) FormaUAlign Right
(2) Press Ctrl+R
(3) Click on Tools/Align Right
(4) Right click on text you wish to align
CIC-5(E+H) ( 2 )
11. To change margins on a page users have to click(1) File/?age Setup(2) Tools/IVlargins
(3) Edit/l\{argins(4) Place Tabs
l2;. How do you change your default frle location ?(1) Choose File / page Setup(2) Choose Tools / Options(3) Choose File / properties
(4) Choose Edit / Files
13. To add an additional row to an existing.table(1) Choose Table/Insert/Rows Above or Rows Below(2) Use right mouse button(3) Press Tab at the end of the last row(4\ click'Tables And Borders'button on standard roolbar
14. Where do you frnd MailMcrge command ?(1) Format/MailMergc
Q) FilelPage Setup/1\{ailMerge
(3) Tools/lVlailMerge
(4) Insert/lVlailMerge
15. PaintBrush belongs to the(1) Accessories group
Q) Application group.(3)
Main group
(4) Sctup group
16. The difference between Save and Save As is(1) not worth mentioning
(2) one is Ctrl+S, other is Ctrl+A
(3) Save lets you save frle with same name and location and Save As lets you change both(4) Save lets you change the frle name, Save As lets you change the location
17. Changing the appearance of cells in context of EXCEL is(1) Edit e) Format(3) Align @) Change
CIC-5(E+H) ( 3 ) P . T . O .
18. Putting data alphabetically, numerically or chronologically is called
(1) Sorting Q) Filtering
(3) Formating (4) Searching :
fg. A type of application program which manipulates numerical and string data in the form of
rows and columns of cells is a
(1) Cell Q) SPreadsheet
(3) Worksheet G) Database
20. A present formula to perform specifrc calculation is a
(1) Formula Q) Function
(3) Formula bar (4) Autosum
21. Intersection of row and column is called
(1) Formula bar Q) CelI
(3) Intersection Point (4) Cross ,
22. The formula that will add the value of cell D4 to the value of C2 and then multiply by 82
is
(1) (D4+C2)gB2 Q) 94aQl*82
(3) =(D4+C2)*B2 @) =(B2g(D4+C2)
23. If a cell shows ##### it means that
(1) formula has a sYntax error
Q) the row is too short to show the number at the current font size
(3) the column is too narrow to show all digits of the number
@\ None of the above
24. A cell labelled F5 refers to'l'"
(1) row F column 5
(2) column F row 5
(3) function key F5
@) functions available in the cells
25. Which of the following is a valid arithmetic operator ?
(1)
(3) >= (4) =
26. Printing handouts instead of slides
(1) is mandatorY
(D is not an oPtion
(3) saves time and PaPer(q is difficult to do
crc-5(E+H) ( 4 )
27. You can change the wall paper on your computer by cricking(1) DisplayAMall paper(2) Display/Appearance
(3) DisplaylSettings(4) DisplaylBackground
28. If a dialog box has 4 radio buttons in the same group, one can choose(1) Exactly one of them(2) Any number of them(3) Exactly two if they ar:e grouped in different columns(4) None of the above
29' If you right click mouse over the blank area of the desktop, what will happen ?(1) New background is selected(2) The task bar changes(3) A menu appears(4) Microsofb program is launched
30. How do you set up columns on a WORD page ?(1) Select text / Press TOOLS / COLUMNS(2) Select text / Press TAIILES / COLUMNS(3) Select text / Press INSERT / COLUMNS(4) Select text / Press FORMAT / COLUMNS
31. Which one is an absolute cell reference in EXCEL ?(1) (A1) Q) &A1(3) #A#1 @) $A$1
32. Handouts are =-.-..- of presentation.(1) Slides(2) Compressed slides(3) Slide show(4) Worksheer
33. In PowerPoint we cannot create(1) Graphs e) Texr slides(3) Database " @) Tables
34. Pie charts can bc viewed as(1) Single dimension (2) Two dimcnsions(3) single and two dimensions (4) Two and three dimensions
Clc-5(E+H) ( 5 ) P . T . O .
35. Selecting text means selecting
(1) a word
(2) a complete line
(3) an entire sentence or whole document
(4) Any of the above
36. MS-EXCEL can be used to automate
(1) Financial Statements, Business Forecasting
(2) Drawn objects, shaPes
(3) Clipart, drawn art, visual
@) Any of the above
g7. 'To
return the remainder after a number is divided by a divisor in EXCEL, we use the
function
(1) ROTJNDO Q) REMAINDERO
(4) Drv( )(3) MOD( )
38. Which one is the correct formula ?
(1) =$5+$10
(3) A5+A10
Q) $5+$10
($ =$A$5+$A$l-0
39. Which symbol is used to change a number as a label ?
(1) Underscore Q) APostroPhe
(4) None of the above(3) Equal
40. Which one is not cotrectfor Paste Special command ?
(1) MULTIPLY Q) TRANSPOSE
(3) COMMENTS @) LINK
41. A new PowerPoint presentation could not be created with the following method :
(1) Create a blank Presentation
(2) Using AutoContent Wizard
(3) Using Presentation TemPlate
(4) Using scanner to scan slides in compute" -
42. Which of the following is not a type of Autolayout for PowerPoint ?
(1) Slide (D Chart
(3) Bulleted List (4) Table
c lc-5(E+H) ( 6 )
43. Which of the following is not a feature of PowerPoint ?
(1) Custom Animation
(2) Slide Transition
(3) Graphic Transformation
(4) Customise a S]ide Show
44, Format Painter is used for
(1) copying a graphic
(2) copying and paste formating
(3) changing background colour
(4) editing a picture
45. You cannof use the Slide Master to
(1) customise Animation to all slides
(2) add Footer to all slides
(3) set Slide Transition to all slides
(4) set a custom background to all slides
46. What is the DOS command that displays the contents of the disk drive ?
(1) DIR (2) VER
(3) FrLES (4) A :
47. Which command can you use to run an application which is not present in Start menu ?
(1) Run (2) Browse
(3) Command (4) MS-DOS Prompt
4E. Which key would you hold down if you wanted to create a horizontal line with the Linetool ?
(1) Ctrl key (2) Alt key
(3) Shift key (4) Enter key
49. Individual computers in a network are called
(1) Workgroups (2) File Servers
(3) Workstations (4) LAN's
'60. Which desktop icon works to display the computers in your Workgroup ?
(1) My Computer (2) Network Neighbourhood
(3) Recycle Bin (4) My Documents
CIC-5(E+H) ( 7 ) P . T . O .
B State whcther True or False (Questions number 5l to 100)
Note : In the following 50 questions, marh 1, if the statement giuen is true 'and. 0 if the statementgiuen is false.
51. 'Ctrl+O'is used to open a frle in MS-WORD
52. You can call a slide, a good slide, if it successfully communicates the complete message.
53. The term for a predefrned computational task in a spreadsheet program is a 'formula'.
54. By default Tab stops are set a 1.0 inch interval from the left margin.
55. It is not possible to select a tabular form on a slide.
5 6 . T h e k e y b o a r d s h o r t . c u t t o p r i n t a d ' o c u m e n t i s C t r l + P .
57. The'Thesaurus'lists both the synonyms and antonyms for selected words.
58. A file with an extension of .EXE, .COM or .BAT is probably a document file.
59. The characters you type at DOS prompts are called command line. .
60, Desktop icons open into Windows, if you double click them.
61. 'Paint is used to create bitmap frles.
62. To insert a new slide press Ctrl+M.
63. When you use calculator, you have to always use keyboard to enter numbers.
64. A double-click in Wordpad is used to select a paragraph.
65. Notepad and Wordpad both create mainly text documents.
66. A Read Only file can be both viewed and'edited.
67. The default number of worksheets present in a workbook is 5.
CIC-5(E+H) ( 8 )
68. In EXCEL formulas have to begin with an =
69. The intersection of row and column is called a Box'
70. The mathematical operations that are given last priority are exponents'
7L. The result of the formula = (12 - 4)12 is 4.
72. when you cut a selection in EXCEL it is marked on screen by a green border'
73. You can.modify a template colour scheme according to your needs'
74. If a slide has b bullets and no sub-bullets, promoting third bullet produces a second slide
with two bullets.
75. You can create slides only in Slide view.
76. F12 key is pressed to start 'Help'in Windows'
77. print Manager enables one to send more than one document to the printer simultaneously'
78. On screen, you can suppress,the display of Grid lines in MS-WORD'
7g. .l'he Page orientation that displays a page horizontally is Lengthwise'
8 0 . F r e e z e P a n e s c o m ' m a n d i s p r e s e n t i n W i n d o w M e n u .
g1. when you use copy command, the cells to be copied are highlighted by a thick border'
82. To start Spell Checker F7 is pressed.
83. When you enter a number, EXCEL rounds it according to cell's format.
g4. The default format for numbers is Right aligned in MS-EXCEL'
85. Zero values can be suppressed in a worksheet'
86. Number formats can be applied to all columns'
CIC-5(E+H) ( e ) P.T.O.
87. Borders in EXCEL cannot,be'coloured. , , . :. I : :
' 88. You cannot use your own pictures in powerpoint.
89' A quick way to make a presentation is to use the Autocontent wizard.
90' when you save some file as a web page, the fire extension is .doc.
91. Normal view contains an outrine pane, a slide pane and a Notes pane.
92. The currency format is the only format availabre for numbers.
93. Editing text in powerpoint is similar to editing text in word processor.
94. The new worksheet is named ,worksheetl,by default.
95. Legal paper sizc is g] * 14 inches.
96' web Layout view of document is used to display headers and footers, also to see how textis positioned on the printed page.
97. The colour scheme that is chosen is applied to the whore presentation.
98' MS-woRD is the only MS-office product that has Internet support.
99. A directory in Windows 95 is called a folder.
100. DLL stands for Disk Language Library.
CIC-5(E+H) ( 1 0 )
SPACE FOR ROUGH WORK
Clc-5(E+H) ( 1 1 ) P . T . O .
SPACE FOR ROUGH WORK
CIC-5(E+H) ( 1 2 )
fr.sTr$.fr. -s(E+H)
qEfube F{ o,qErr (m.sn$.fr.1
rrdid qten
qfq, 2006
+.3n$.S.-b : qrnslttrrc oilfuH
€rl4 : 2 qae qftrqaq ei6 : Loo
i a :(t) wif w att feoaT dat n6 rrz{Eer a at qq ao fiflqrq go- *r-i # ftq + ql t( i i ) l r z rw t r coysad r f f iW d l s , # wqq r l q f f i d r * i d f f i add rGiil scTT wit + rid sqa d 1(iu) xdo yw 6r tEd q-fr d rar f r qR W 0 ril?r6 ra0 w frqrl artq qq di qr
rrn Eq rq d a) rs w{ w ep aia Rqr wqrn rin qSffi (vgr {iqr r t eo ro)
ie : ffifua sp"i C ydo xw +frq an fuq@ Fg rq d, Ara 0 qn ufi al somd r *rd rar *) l{il{ wNeF w riaiftn +irn7 fr enfu ql r qR dd * rar g-d ada), pi sn7 W @ # erEra ai r
l. qo ffi fr qsq (Mouse), ffi 6qr ffi (Display) t oil{qf{ (Icon) ql fqsnT t, E}-dT t
(1) qe 4lqlf (My Computer)
(2) qaRdR{ (Explorer)
(3) 6trYd ftRT (control Panel)
(4) Z|FF ER (Task bar)
2. et-FF ER (Task bar) rI{ er{q (vr+) RcTqT qror t\ \ .
(1) €d t-t (Start Menu) it
(2) glo qR (Scrol bar) if
(3) tffizTq @esktop) i[
(4) ? tr'avl il
c r c -s (E+H) (13 ) P - r -o -
3. 'Cut't foq Ssilqdd (Keyboard) Vff-qa wr t ?(1) Ctrl+C (D Ctrl+V(3) Ctrl+X Q) Ctrl+P
4. qR us-woRD + Emrnq q q-s {rE d[ Bqrc{T (prominent) d, d, qiTqT rrq sqd, sdfr3161 qftqffi qt'n I(1) Prompt (2) ffiC (Delete)(3) Fil"= Gota) (4) fiz @ri't)
E. qR us-wolD + qtdr+q fr qo +{'ns +1 qs cFrd t Ee-fr qqE qr RrE (A qT+) s1qs-{n €, fr q6 fuqr +t qR'{Tfrd r}-fr t U(1) t}a 1po1"1"; (z) FFt+a (Relocate)(B) ffi (copy) (4) {e (Move)
6. Fq if t qh w effiqr qr rqrarur t z(1) ROM Q) CPU(3) qRq)-d (Motherboard) (4) ud g*+ gr{-{r (Hard Disk Driver)
7. !S {T{ufr (rabre) fr sflq* q,ft d !S +f, t s+TA q 6tq Ei 6S A qrfr t ?(1) & ouul (2) fvne (sr'inl(3) (dt (Enter) (4) Ctrl+Enter
8. !F qq-{d (MS-woRDl t q+ ffi-+q sl t-td q.{i + tcq qr"r t(1) $]-{FT (File) ii qrs-t/ +-s zo (Send to)/tf, (Mail)tRnftz (Recipient)(2) t-te +o'+ feT*el * sq it qrfo sl t-q (save) q;G
@) qd qrtdr$ siqEltq t
e. q-66 SFFI (spelting) qrfi vt-< + q-{A sTeriitrq dfrT m sfq 6{t } toq sugm f{driqErrlr(1) '6q'
lToolsl +) ga6q7$fttT (Spelling)
Q) rz q) wr((3) {r< qt qrsq qFT q) rnz-fu* qt(4) w{ffi qsli
r0. ErFi ("iehr) qftrq qr vtqqivr + fr-iTtr *, tdq f{ftq t(1) qffe/qtri fudlq (FormaVAlign Right)(2) Ctrl+R s) (dI(
(3) Tools/Align Right t|t fffiS 4t(4) fqq qTEqivl 6T oirq fdn wil qrdA t ss vt ks at
(B) qd wonu s) gA qs-t gq 'sT[scEs' (outlook) q] slRErT (€d) st sil{ w-q-m s}{6r{ st
CIC-5(E+H) ( 1 4 )
t l .
12.
r3.
14,
lfs +q q{ qTffi'{ (Margins) q} q-{d} + fdq sqq}mT fu6 strn(1) FilelPage Setup
Q) Tools/I\{argins
(3) Edit/Margins
@) Place Tabs
ffite s.rtf, + 9i (locationl *.t enq *g c<if;f Z(1) 3i rl" I tq +caTq (page setup)(2) {i Toots / Options(3) gi rlu / xfTflq (properties)@) gi nait / Files
!F +{< qrurfr (table) if qs oTfrkF .ifu Go*) d q\gf * fdq(1) Table $;lt5{/qtrJ ltrrs"rtlRows Above II Rows Below(2) <TF{ t{-{c) qrsq {eT st EFd-qrd 4Ts(s) sTr€'fr qfu + ei<T qt rau q] eqr((4) &d {irqR qt '}sw qt.s d-$s' (Tables and Borders) TZ;r s} fuffi sitf,{$ (MaitMergel oqis sTrrd qd qt ffirn :(1) qT+c/tf,Erd(2) s't-{f, (Filelrhq +d3Tquteqd(3) qN/+mqd (Tools/IVlailMerse)(4) {{-ttdqd r(Inserr/VlailMerse)
15. I-{${t (paintBrush) +dI t(1) q+Sfr-q (Accessories) +t{€ fr(2) qR}t{r4 (Application) H{d fr(B) tq Wruirr) q{d t(4) tEe+q (Setup) qTd fr
lG. tq (sarr") s*{ +q !F (save As) C ar<-{ e(1) sddri HFT.F qEmwf Tfr e(2) (S ctrt+s, EF{l ctrl+A B(3) tq (s",,") Bilq-+} cS qrq t sft sel q'r6 qt rifudr (qr$-el d +q Sd tflT t nqrt-q es (save As) iHTr+) +it' +) r""+ t" t(4) frq (Sav") '3Trrd Hr{f, 61 q|q q-qd} frr e, tq q-g (Save As) 3rTqd q.td q-{d}
t-dr t '
17. EXCEL + {r+f fr t-f, + nE-fr-dwT fr q-con t(1) @a 1Ba11;(3) 3i-flEq (Alignl
CIC-5(E+H)
(2) sTSz (Format)(4) iq (cnang")
( 1 s ) P.T.O.
18. 31iq$ (data) d' eiq1t"* frq ii, 3ffi'+ ffiq ii qT qrr{T t mq t isi +i 4€i t
le. qiq+{ 6qRIT (qdteri nhq) ff qs ffiIi $ eiaii + W 3+{ Yrdt * qffi-i d
t* + t tno'rl'sil{ Efrdq (columns) * sq ii qR-qlffi q-{f,l t' t '
(1) dtrlT (sortins)(B) qffrftlrr (Formatins)
(1) to (c"ttl(3) T4ilfre (Worksheet)
(1) qitdr(3) qTtf,r qR
(1) (D4+C2)'IB2
(3) =(D4+C2)rB2
e) FFeeRq (Filtering)
(4) gffiq lsearching)
(2) ffie (Spreadsheet)
(4) glilAq (Database)
(2) r#qT4
(4) 3{Aqq (Autosum)
e\ 94aQl*82
@) =(B2I(D4+C2)
(2), t'
(4) =
20. qs mq wFT (A-dgA{H) s1 q-{i + fdq Td-f{-riRd (firiu) W t
2r. t (no*) eilr 4iq-q (column) t q<d:< ({€G-+{Hl q;} q-or qTdT t
(1) qqET qR (2) td
(s) 3r<dq ({;rG-+{q) ftE (4) *fs
zz. q6 W (qnfdT) q) o+fr-m t qrq d c2+ qr{ t Sg'Tr 31h n6r szt 1w qt'n' qdr\=e
zs. qR qs te *+*++ q{tdr t, fr sq-dr Fdffi t(1) W (qru-er) fr t{qru (Htr) +1 'rd-fr t
-----'-'-s- of- ".E*
+ {q{ fr1 @ + ldq t rnow) q-gn A d-e tQ) cr."hrcili # s'Jft; +mot t"(3) qq{ t sfr i'tqii d RsTt + fmq Eff,q qg-n I
(4) *S6 fr t +ti Tfr
24. Fb EFd qq +f, q-drdr t
(1) t (now) r eT-em (column) 5
e) *ioq ni s(3) ritre-rq tTsl "u@) ftii n srf,d{ s-srd
25. fi.q fr t qlq qr qret 3i6TFr-frq q+rr* t u
26. RT-€i (slides) * qqrrq ts3lcqg (Handouts) Fre qrqr
(1) enf{qd A(2) q+ tr+-w q-fr e(3) qqq 3+{ 6.rrq +1 qm't(4) s.c+ etrq t
glg:5(f +H) ( 1 6 )
27. qTG q'qz{ * qre qq{ s} slTq q(m e-se t m} ga61 1(1) ffilef€ tqt (nisptayAVatl paper)(2) ffi/qqhts (Display/Appearance)
(3) ffi/tfarg (Display/Settings)
(4) RTd/deqfsg (Display/Background)
28. qR q+ qq"flT dr.RT (Dialos box) * qrq qs E1 q{d (gq) ii + tffi Er{ t, ni d€ g{qs,dT i(1) 3qt t *qe q+(2) s{n t rq-d-ir qra(s) qR a 3iqFr-3ftl{ Et-flq q t di }ic-d A(4) .!ts t t qt$ .rfr
zs. qn tszTq q1 urdi qrrd q{ rnsq t {Ez fus qt, n} wr EIITI ?(1) aqr *+.qts-B qq qrwfl
(2) efFF qR orffi qIW[
(3") i1 qgf, t] qTq'Ir
(+) ql{frTfw (Microsoft) qhlq 3lTrn1 6} qt\qT
80. q* woRD * ye' qt 3ITs EfdtT (cotumn) $fr qa(| I
(1) q-{qt{T (rext) 4l ffi-€ (Setect) s-{ / qN Z qieq q} qqrs-t
(2) qqqi{ q1 R€ fil / }+f, / 6idq q} q++r(B) qEqRT qi, ffi€ 6{ / {{d 7 *ior ql eqr-*r@) qqqi$ q1 ffi-€ q-q 7 qT*e / 6iHq q) qqrs{
Br. Fq fr t qh qT EXCEL fr FREqT te fdB-*r) {E f t ?(1) (A1) (2) &A1(3) #A#1 (4) $A$1
sz. |swsry qE-fi-d{uT +(1) wl-{s(2) 4d{g fdf{S (Compressed slides)
(3) Tf,|q-s ril(4) TSTfre
BB. q-{{qre (PowerPoint) if 6q Filtrr ad.m €-64 t(1) ndf (Cr.phs) 4'I (2) qqqi{T WI-{et (Text slides) 4'T(3) SlzTtq (Database) SI (4) ffi 0"Utes) 4]'
s+. qli qd (pie chart) q) _ Fq ti tor qr v+or t r(1) q+-o emrl e) A 3tTqrqi(s) lst eir A qtqni (4) A sth d1q sil-qTql
C I C - s ( E + H ) ( 1 7 ) P . T . O .
r\.
6 l
85. qrEqt{T q} frrA€ o.C fg{il mr ed e' +] R€ qcqr (gr{') r(1) qs $q(z) * 6t erfl(s) qs qqlf qrfi qT rrgld E{draq(4)
"q{il t t +t$ S
s6. MS-EXcEL ql strqrd(1) ffiq fu{tuit, qrqn TriEqn +)(z) sifr-f, dE), sTrfffii 6)(s) €fud +--dr7fd (fuw{rJ), stfrfr +effi, Erq q}(4) w$-s t n +)$ S
87. q+ {sr qd qrq anr f++rfo qt} + erq q} ,+r'r tq qqar t sS Fileri + idq ExcELt - ssld 16rr.1ion) q,I {Sffi oG t r(1) ROUNDO (2) REMAINDERO(3) MOD( ) (4) DrV( )
Be. A{d + sq if q+ {sr 6} qdm+ + fdq +h qr Ffrs F*qe f+qr qTdr t ?, . (2) Apostrophe
r+r eqtm fr t 6t$ Tfr
40. paste special H'rIiB + RTq F{t t +h w vfr rA? t Z(1) qffi (MULrrpLy) (z) F;q+s oRANSposE)(3)
"iw (coMMENrS) (4) ftr+ tlnvx)
4r. lfs ;HI qrE{qF;e (powerpoino s{Strfipr FlqfufuT tr.0+ t zt? qqrqr w v+'m t ,(1) q+ srcil fq*l Fqtfrq.ruT srr s"r(z) *f-i +Ce ffi (autoContent Wizard) qr Vdqro 6-{*(s) nq-fifioT ffic or sqre oth(4) Rr*if d qqa fr *q s-rt + ldq dtfi qi gfrqre oG
42. qrqrqr{€ (PowerPoint) + ftTq efz} fuTrse (Autolayou1l61 fiq fr t 4h qf TsR 13?t z(1) wr{s
Br. F{t t qh qT vfr q{ 1qf{er) t z(1) =$5+$L0
(3) A5+A10
(1) Underscore
(3) Equal
(2) ' $5+$10(4) =$A$5+$A$10
(2) qrJ
(4) fqm
( 1 8 )
(B) S02s fd€
clc-5(E+H)
frq fr t sh qT qrflqr{€ 6I dqlq 7d t ? '
(1) tFgq tF{iTH (Custom Animation)
(2) wr{s ?iHflq(B) nFn#q sq<Kq (?iqqfiiYn)
@) 6,grTf{S q Wf{g ii (C"rtomise a Slide Show)
qTte +5r (Format Painter) 4T {dqrd t+,qr qIdI t
(1) qs qTFr-d fr qFdfrfr t feqe) si{z (For*at) fs( gq 41 qifi (copv) 3ft t€ (Paste) s-G * ffl
(s) dq.'Jrs€ (Background) + trr d q-q€i + fdq
(4) qfr frr d qBtrT (vrq-qF) fii + ff,q
3ITq wr{s qtst (slide Master) s,r {Sqrf, d 4,i sd,A t
(1) q.fi 61rEEii (Slides) Or tlqtq1-q q;q1lq1-g-q (Customise Animation) q;G + ftq
(2) qS weii t 5at (qq+tq) @ * f*q
i31 q,fr wr$st (slies) tf wr-fs qifr{H (slide transition) - nf t fdq
(4) qrfi RTS+i q qs 6sri'i6fl3-€ etrn q teq
qs Ew gr{q (Disk Drive) q'r qRiYr ffi qff,I Dos 6qig qqr $ r
(1) DIR
(3) FILES
(2) vER( 4 ) A :
(D Browse
(4) MS-DOS PromPt
(2) Alt
(4) En
gisrcrfi
6& snTq* {*{q (worksroup) + wdit qt qfi + fdq Mq +,r +t{ qr err+il{ (Icon)
flq q.{dr t ?(1) My ComPuter
(3) RecYcle Bin
CtC*5(E+H)
47. \rs tgr qFdh{Tq TdTt + fdq qi €d tt (start Menu); 3qft+a Tfr t, 31q +t+vr
6qts g*qrd fi sdFe t ?(1) Run
(3) Command
4& qR sTrq Hrfl E€ (Line Tool) t q* sTg5q (Horizontar) f,rfl 6T FHfur 5"€r q6a t, fr
qlE u1 Sfr d frA (cffi{ rc}i z(1) ctrl $-S(s) snirt $'fr
4s. q{ q|ersql(ffi) ii Fiql 6'qet q1 6-6r qldT t I
(1) q#.cq Qt sr{€ sdc(3) {ffi{Fq @) LAN'S
(2) Network Neighbourhood
(4) My Documents
( 1 e ) P.T.O.
EI qf,r{q FS t ril q1ril (qgq ri. sr t roo rq.)
qh : a?l so y-er Rg' zzq' d t qtr fmr rqT 6Tt €-d d al t eifu al, BrqET s€ enqw o aifu *,l, qR qrq qad al t
51. MS-woRD ii 'ct"l*o's.r qqlq ffi qrro (fite) d ffi + fdq foqr qr v*ar t r
52. uq K* Frss dl siEdi wtEs H€ €q,t t, qR qo qq,-iTdrfds sryf €fur +] sTfirdrfrq-rqf f i t r
53. qs ftEfre fiJrq fr V* $-vpqgo srFrser+q st-4 @rederrned computational rask) {g'qr 16{m)' t r
54. Hee 6q it *q o'ul eTq qrq qrfr{ t r;o Fq + s4-cxrc,T q{ t r
: 5b. qs wr{s (slide) .l-t qs fu* (Tabular) srFFR s} giiT ""*q
rfi t I
86. w qkil+q fr-c fi-ri + ff,q ctrl+p $Srdf, vf-J-qa t r
57. g+ q vqit t fdq 'fW{q' lrhesau'usy vrr+r*+ $ilr ffi-drpfs +n vteii q} q-fRE
orar i r
58. .ExE, .CoM qT .BAT + fqRR (extension) qrfr qrfe sr{q-r+dr q,s ffir+-q qrfe t r
5e. nos frt€S (Prompts) q{ 3{TtT fs{ sRTii q} argq q-G t r€ q.qe FIr{;I (command line)o6r vrar t r
60. tseTq (Desktop) il .+rrqr{ (rcon) s} qR stTrl sffiT n} q6 q* ffi" (windows)i t gemt r
6r. Mq (Bitmap) dfu*Bii + Ffitur t lqq t'e eri't) {sqrf, fuqr qtdr t r
Gz. F Tq RF{s qn Fqc q-ri s fdq"ct"r+u cqtq r
6s. st e1q qffir 1*-eE+al sI Ftqrf, s{i t, A enqd \ispif e1 sFfi (qerl tfdq ttw 5mre6 F*qTd qr+r dqr r
64. q-dfu t qs sEo Rr* sr sfrqr€ s +{rns m T{i + lf,q fuqr qrf,T t I65. ile+s sth Tets <tif gw wq t qrosivr q{dr+$i *r frqtrr *G t tGG. q+ 'ts 3m' (Read only) {ifuqr sl +i qqr sTh qqrRd fuqr qr v+-cir t r
67. !tr *+86 q fufrc (Default) ++ryitdi qi €qr s i r
c lc -s (E+H) (20 )
68. EXcEL fr q* 1vffim) = t E1 sil-{Eq *m r : ;
6e. t Go*) sh qfm (column) + 3ltd.fi ({a{s.+qr+) q} q+ ffi Go"; o61 vrar t' r
70. €qt sTff,q qrqtrq,dr qrdi rFrfrq riffi q16 1q-*qlia) nt-fr t t
7r. w (q,fTf,T ) = (r2 - 4)/26I gf{ulIIT 4 E I
72. qGr stTrr EXcEL t qs Rrfr+flq fi sret t n) st+ q{ q6 'R i'r ei q-S ilr fqEd E}dr
t r7s. qrfi qs-{d t eqvn erm \s Hc (remplate) rrT qttrT +l sq-p* q-r esil t r
74. qF( qs wr{s fr s gilry (Buuets) sth +t$ vo-gdzg (sub-bullets) Tfr E}, fr ffi gizti qa q) gdc sFdd !s (qt wr{s q+rar t I
75. eirq *-*e Rn{s { (sride view) if fr wr{s q-qr v*.t t r
76. ffiq fi 't€s' (Help) q} RTJ q{i + leq prz $-fr dr (qrqr q-dT t l
77. fiz Ciqi (print Manager) ffi ql frar t l5s qlu w t sqru E€I}q M fr sqsl +-{t m t r
78. MS-woRD ii enq fuq .R Fi-s drFii t n-<qi q) t-s €-.Fe t | :
7s. qq 3ilRrq+{F (page orientationl q} q6 i-q d stEqreT (Ilorizontal) 6q ii E{fdT d, qd
dqr{ tt dar d r
80. ffi h (window Menu) q fi-q t{ (Fr."re Panes) qqis sqFPl-d E}-dr e
8r. sr BlTs +Tfr (copy) q.qis ET {dqriT s{t t n} ff,q t-€ ql qTql effir d-dr t {d gsq]d qgi * anr Er{dr{a ffuR-c) d-ar t r
Bz. +d +si (spell checker) +1 gF +-{i + fuq rz q} <erqr qrdr t r
83. wr 3TN q+ €cqr 41 sTda (qn{ s{t) t, fi ExcEL t-d + qTile t eqvn ss risro) qr+ e-{rdr t r
84. MS-EXCEL fr {srcil * feq fsqt-qz qTfa (o"ruult rormat)Erqf qtfu-d ntor t r
88. \rs {ffie fr dri roi * qn q} t-fi qr v{-dr t I
( 2 1 ) P . T . O .
87. EXcEL d ffi Gfdr) qEi d {'rfrq r-fr f*qr qr v*or d r
88. qrqrlar{€ (powerpointt if ory qqi frr* or qftqrd +fr oq voi d r
89. {dF xtr--frsrul (Presentatior') q) qqri q.r ogd A-q ffisT 3,fA q'ee ffi (AurocontentWizard) sT S*qrf, fiqr t I
e0. vd enq ffi 1qfusr q) +q te ffi"u page) t Fq ii tq (sa.,,e) q-rt t, d qrs-o orqffi}ttT .ao" Elor t r
91. qfqTq EW (Nor-al vicw) ii q* 3ll-$ef,ffl tq (O,rttirre pane), q.F. Wl-{g t-q (Sha" pane)eil{ qs .q iq (Notes pane) E}-dT t I
sz. S@Fii + fuq Tn (qHy qffu 11 W'qlr glRrer qT+e t | ;
e3. qlq{ql{€ (PowerPointl if q+ q-{qi{T si ffid (<Ea) q-cqr ed x}+gt fr qTEqi{T +l$qGa (qbe) o.it + vqn al t r
s4. ffi iq re{fl-c 6T qrrT 'qi4qfre1' Eqfiz 6q t et'n r
eb. qt'rd tqr fir oq-* r; x 14 F{ etar t r
eG. ffi qwrnq t 'te-teilsc E{q' EFr sqq}'r tg1 aqr F-a-r +l Eqrt} deTr of gq yts qr
qr{qieT al qq€ir +) M + fdq fuqr qror t r
e7. kq r,T +s{T (qm t+h) d gdprqT t qe qryt rc-fifiuT + fuq eq t}fr r
e8. MS-WORD, MS-Office Sr g5q-1 $rqrq t REn E-a+c or qqtJ t r
99. ffi-q 9b (windows 9b) ii qs gr{kQ (Directory) +1 +"gr (Folder) o-O qrol d. r
r00. 'DLL tFT qteq d gF5, frA'q dlgit (Disk Language Library) |
CIC-5(E+H) ' ( 2 2 )
{s o'Td b fts frq6
P . T . O .elC-5(E+H) ( 2 3 )
CIC-5(E+H)
<w, o,rd b ftts d{6
( 2 4 )5,000