8/6/2019 Cs Aptech Questions
1/164
8/6/2019 Cs Aptech Questions
2/164
TRUE FALSE
The number of steps in Accounts Compilation are 2 3
data element data record
Tally is based on mercantile accounting system FALSE TRUE
Ctrl + N is used to -----------
Ledgers Groups
Revenue Account also known as -------------- Account Personal NominalMethod of Voucher Numbering is/are Manual Automatic
Accounts Receivable are displayed in Balance Sheet Profit & Loss
Journal Stock Journal
Filled Receipt
11 16
FALSE TRUE
F4 F5
Default Cost Category in Tally is/are -------------- Main Location Primary
True False
Ledgers Reports
0 to 9 1 to 100
Supplier Suspense
Customers can be permitted to enter their own datainto the firms computer using the firms wide areanetwork is an example of
Enterprise DataInterchange
Enterprise Data -Information
In Tally, we can customize the Vouchers as per ourrequirements
Each action/transaction of a firm is described by a----------------.
Display stockvaluation method
OpenCalculator
------------- in Tally classify the accounts underdifferent heads so that summarised information ispossible.
To assemble a product from different items-------------- entry is usedA --------- purchase orders data flow is directed tothe purchasing system for use in closing out theoutstanding purchase orders in the receivingsystem diagram.
Tally provides at least --------- predefined voucherformats
The value of the inventory is included in a ledgeraccounts as an asset on the balance sheet" The buyers can follow up with the suppliers todetermine the reasons " is an example of -----------------
management byobjective
managementby exception
From voucher entry mode , if we press __________ then we get payment voucher in tally
A Group Company is simply a name and an identifygiven to the merged accounts member companiesof the group.A ----------- is a primary document for recording allfinancial transactions.
The field can have a value between ________________ in FA Package.
The _______ file maintains data that describes thesupplier past transaction with the firm in terms of material quality in AIS
8/6/2019 Cs Aptech Questions
3/164
Report Output
F2 F4
Tally can maintain budgets on ---------------- Net Transactions Closing Balance
True False
F6 function key
Sales Purchases
True False
Horizontal Vertical
Default ledger accounts in tally are ______
Default 'godown' name in tally is ____________ Primary Main location
'Tally vault' is a _________________ Ledger a/c
F5 F7
a name an identity
Sales return Purchase return
Stock items units
Trial Balance Daybook
F7 Alt + F7
In tally, types of users are _______________ 2 3
F9 F10
Balance sheet Profit & loss a/c
It is necessary to manipulate data to transform itinto ----------------In tally, to change the date of the voucher press
______
The value of the inventory is included as an asseton the balance sheet
In ratio analysis report of Tally FA packagewe wepress ________________ function key to the display of bills receivable , bills payables report
Alt + f6 functionkey
The accounts payable system is responsible forpaying the suppliers for the -----------------What is the default financial year in Tally6.3
_________________ 1-4-1995 to 31-3-1996
1-4-1996 to31-3-1997
Tally encrypts and stores TALLY DATA at the datadirectory
The Profit & Loss statement can be displayed in---------------- format(s).
Balance sheet &profit & loss profit& loss and trialbalance
Profit & loss andtrial balance
Securitymechanism
To create a sales voucher in tally , you have topress _______
A Group Company is ------------------------- given to themerged accounts of member companies of thegroup.In tally,"credit note" voucher type records entry for
________________ In tally you get currency symbol option from _______ menu
Companycreation
------------------ gives the balance for each day for thevoucher type has been selected.For 'stock journal' entry we press ______________ intally
Tally provides the capability to the
administrator/auditor to track changes in the areasis/are
Changes in
transactions orvouchers
Changes inLedger Masters
By pressing -------- key, a list of inventory reportscan be displayed straightaway from the balacesheet reportProjected approximation of income or expenses iscalled ______________ .
8/6/2019 Cs Aptech Questions
4/164
TRUE FALSE
F3 Ctrl+F3
TRUE FALSE
Default stock category in tally is ______ Main location Primary
Tally.imp Tally.ini
Stock summary Stock journal
TRUE FALSE
Default number of groups in tally are ________ 128 228
During voucher entry ------------- are used. Groups
User designated as --------------- can view audit list. Administrator Owner
Tally supports Importing of data from ----------------
The memory address register is used to store
FUNDAMENTALS OF COMPUTER
NIC Card VSAT
Record Count
"Administrator" type user is also called 'Auditor' of acompany in Tally
You will get company information , if you press __________ from gateway of tallyA constituent(member) company can be a memberof more than one group.
To create a log of the import activity in a file_____________ is located in the same directoryas an executable program in tallyIn Tally,inventory valuation method option isavailable from _______
Tally audit feature is available in a company __________________
By pressing F11function key
During thecreation of acompany
In tally, a group company can also be aconstituent(member) of another group company
LedgerAccounts
One company toanother companycreated withon
Tally Package
Other programs -a spreadsheet ora database file.
In an accounting information system, which of thefollowing types of computer files most likely would
be a master file?
Inventory
subsidiary.
Cash
disbursements.
Which of the following is an advantage of acomputer-based system for transaction processingover a manual system? A computer-based system:
Does not requireas stringent a setof internalcontrols.
Will produce amore accurateset of financialstatements.
data to betransferred tomemory
data that hasbeen transferredfrom memory
Inefficient usage of excess computer equipment canbe controlled by
ContingencyPlanning
Systemfeasibility report
Which of the following is not the component of aCPUA trailer label is used on a magnetic tape file, it isthe last record and summarises the file. Thefollowing is an information not found in the trailerlabel
IdentificationNumber
8/6/2019 Cs Aptech Questions
5/164
Hard copy is a term used to describe...? Printed output
What do the abbreviations VAB stand for
Validity check
Coloured spots Pixels
File Name
A daisy wheel is a type of...? Printer Storage device
System Logs
An impact printer creates characters by using...? An ink pen
What would you NOT use with a flatbed plotter? A pen PaperWhat do you need for an ink jet printer? A cartridge A drum
A laser printer does NOT use? A print head A laser beam
Volume Size
You can ________ protect a floppy disk. Read Write
Magnetic tape PAN drive
Magnetic tape is a...?
1.44MB 20 GB
A CD-ROM A floppy disk
Which storage device cannot be erased? A CD-ROM A floppy disk
Where should floppy disks be stored?
ROM chips RAM chips
RAM chips ROM chips
Writing on a hardboardVoice activatedbroadcasting
Voice answerback
What control would prevent the accidental erasureof customer information from a magnetic tape
Boundaryprotection
What are the individual dots which make up apicture on the monitor screen called?Header label normally include all the followingexcept the
Identificationnumber
Which approach or technique is a control usuallyassociated with microcomputers
PhysicalSecurity
Electrically
charged ink
The best security control in a microcomputerenvironment is to
Restrictphysical access
Use onlyunremovablemedia
The greatest control exposure in a microcomputerenvironment is the lack of
Separation of duties
Centralisedfunction for PCacquisition
The amount of data that a disk may contain is
known as the disks...?
Information on a hard disk is usually backed-upusing a...?
Serial accessmedium
Random accessmedium
Hard disks can have a storage capacity in the regionof...?Which storage device has the largest capacity inMb?
By a sunnywindow
By magnetobjects
The contents of these chips are lost when thecomputer is switched off?What are responsible for storing permanent dataand instructions?
8/6/2019 Cs Aptech Questions
6/164
ALU Registers
CPUs Registers
0 bits 1 bit
What type of computer chips are said to be volatile? RAM chips ROM chips
Software can be divided into two areas:
Supercomputer
Vacuum tube based electronic computers are...?
First generation
Third generation
Third generation
Third generation
DATABASES
_______ is used for CAAT as database Oracle ACL
TRUE FALSE
TRUE FALSE
TRUE FALSE
yes no
TRUE FALSE
Which parts of the computer perform arithmeticcalculations?What are small high speed memory units used forstoring temporary results?How many bits of information can each memory cellin a computer chip hold?
Network softwareand securitysoftware
Systemssoftware andapplicationsoftware
Travel agents use this computer system whenreserving flights
Personalcomputer
Which computers are used in the weatherforecasting industry?
Notebookcomputers
Supercomputers
First
generation
Second
generationWhich generation of computer was developed frommicrochips?
Secondgeneration
Which generation of computer uses more than onemicroprocessor?
Secondgeneration
Which generation of computer developed usingintegrated circuits?
Secondgeneration
Which generation of computer developed using solidstate components?
Secondgeneration
Name three steps involved in developing aninformation system
Specification,Design, andTesting
Programming,Design, and
Testing
Generalized audit software perform auditors toundertake any past records and not concurrentauditingGeneralized audit software is a file whosecapabilities for verifying processing is logicCAAT's are computer program and data that auditoruses as part of the audit procedures to process dataif audit significance contained in an entity
information systemCAAT do not contains package programs, purposewritten program, utility programs or systemmanagement programsEmbedded audit routines are sometimes built intoan entity's computer system to provide data forlater user by the auditor
8/6/2019 Cs Aptech Questions
7/164
TRUE FALSE
TRUE false
true false
true false
true false
The first step for developing CAAT is_________
True False
True False
Auditing with computer necessarily supports the
true false
true false
true false
SCARF involves embedding audit software moduleswithin an application system to provide continuousmonitoringConcurrent use auditors as the member of thesystemRegular cross system verification may minimize
fraudsComputer security is frequently associated withconfidentiality, integrity and authenticationData reserve engineering process metadata todocument system and abstract business rules andrelationship
to determinethe auditobjective
review andevaluate thetypes of data
Using the open database connectivity feature in ACLis ______________
can bring thedata directly
can bring thedata indirectly
Computer Assisted Audited Technique involves theuse of computers through "Black Box Approach"White Box Approach necessary involves expertknowledge on the part of Auditor
The transition from manual system to CISenvironment bring dramatic changes including
________________
change in themethod of recordingaccountingtransaction
use of accountingcodes
documents drivenapproach
risk drivenapproach
CAAT involves an Auditors' appreciation of __________
hardware andsoftwareconfiguration
processingoptions, file datastructure
Widespread end use computing result in unlimitederrors creeping into system going to accepthandling, thereby increasing audit risks
For computerized auditing usage of sophisticatedaudit software would be a necessity
Important knowledge needed to begin planning theuse of CAAT is _________
the source of data available
to the auditorganization
source of data
for materialplaning
The move towards paperless EDI would eliminatemuch of the traditional audit trail, radically changingthe nature of audit evidence
8/6/2019 Cs Aptech Questions
8/164
true false
A system could be _________ open/closedA system exhibits 'entropy' true false
true falseAssembler language uses Mnemonic symbols true false
scheduled jobs
true false
true false
true false
true false
true false
true false
true false
DSS has the following components _________________ databases
true false
true false
Master file configuration includes ____________ reference files table files
Computer operation controls are designed toprovide ________________
the of by allconcerned
providing accessto computer toall organizationpersonnel
Systems development control, apart from others,include authorization, approval, testing,implementation and documentation of new systemssoftware and system software modification
natural/man-made
Super computer are the largest and fastest and isvery suitable for commercial application includingaudit work
Operating systems are devised to optimize themachine capabilities, the functioninclude_______________
managehardware &softwareresources
General purpose software provides a framework forhighly complex scientific operationIn batch processing, transactions are processed oneafter another
The use of computer assisted audit techniques isnot gaining popularity not only ________________
with auditdepartments
with productiondepartments
On-line processing refers to grouping of transaction
and processing the same in one go from start tofinishReal time refers to the technique of updating fileswith transaction data immediately after theoccurrence of the event to which it relatesIn OLRT the CPU should process the capability of program interruption
Time sharing system allow access to a CPU fromremote terminalsDSS is defined as a system that provides tools tomanagers to assist them in solving structuredproblems
planninglanguage
Master files contains current records foridentification and summarizing
Transaction files contain relatively permanentrecords take product profile, customer profile,employee profile etc
8/6/2019 Cs Aptech Questions
9/164
filex file-o-man
true false
true false
back-ups retrieval
true false
true false
SADB stands for ____________
true false
true false
Errors are correlated_________ at the year end immediatelyField check is exclusive to a field true false
Benfish Benford
true false
Hierarchical code means _________
TRUE false
valid, numeric
Hash totals means meaningless totals true false
______ is a file management software package thatlets users and programmers organize data into filesand then process those files
CAATS provide added value to the clients because
_______________
to have acompletepicture of a
system
decentralizedpicture of a
systemFile volatility refers to the number of addition anddeletions to the file in a given period of timeFile activity is the proportion of transaction filerecords that are actually used and accessed in agiven processing run:File interrogation refers to the _____ of informationfrom a fileOne -to-one relationship means a single entity to asingle entity in a monogamous structureRDBMS is structured to a series of 2 dimensionaltables
seriously affecteddatabase
subject areadatabase
Controls are present over many aspects of thecomputer system and its surrounding socialenvironmentIn framed checking the data entry is checkedagainst an expected picture or format
_________ law basically states that there is a specificprobability of the first digit of a no. being 1,2,3 etc
Check digit is a group of nos. added to a code fordetermining the accuracy of other digits in the code
consecutive nos.or alphabets toentities
blocks of nos. tothe primaryattribute of thethe entity
The validation checks applied to a field depend onthe field's logical inter relationships with other fieldsin the record
The contents of a field could determine _______ signfor a ______ field
invalid,alphabetic
Batch is the process of ______ together _____ thatbear some type of relationship to one another
grouping,transaction
regrouping,events
8/6/2019 Cs Aptech Questions
10/164
true false
true false
true false
true false
IDEA stands for _________________________________
true false
true false
true false
true false
e-brain bouncing ball
In systems testing, test involves_________________ bottom up tests top-down tests
yes no
Audit software is used by the auditor to _________
deleted, hard
true false
SAS stands for ______________
With OLRT where interactive data entry is available,the master file associated with a transaction may besearched for confirming dataControls are required for authorization to ensuredata integrity and detect possible breaches in
securityData from client application are not stored in theorganization's database through auditables eventsand functionAll input records in a batch are normally of differenttypes
incrementaldesign andenlarge activity
interactivedataextraction andanalysis
A transaction file is sorted prior to the update of master file
A sequence check on the transaction or master filesby an update program is not required
Whenever monetary transactions are processedagainst master files, the update program shouldmaintain a correlation account to record suchtransaction that does not have a matching masterfile recordInternal tables are stored tables from which certainvalues are extracted for further processing andstoring
For small to medium sized systems, individualmodules are coded and individually tested and thenassembled to be tested as a whole-the testingstrategy is referred to as ___________________
Recording transactions in a controlled manner mayamount to loss of stored data
read data onclient's file
provideinformation tothe audit
Core image comparison is a software used by theauditor to compare _______ version of a programwith a secure ________ copy
executables,master
Database analyzer is a software which providesdetailed information concerning the operation of thedatabase
system analysissoftware
systemadvancedsoftware
8/6/2019 Cs Aptech Questions
11/164
true false
Embedded code performs wide variety of audit task yes no
true false
true false
create, false
true falseMapping software has very objectives yes no
yes no
Program code analysis involves _____________ __________ is a software of CAAT IDEA ACL
true false
Base case system evaluation includes____________
true false
true false
true false
file, hardware
Embedded code is a software used by the auditor toexamine backup data
Core image comparison is particularly useful whereonly executable versions are distributed
Log analysis is a software used by auditor to detectvirus
On line testing techniques the auditor ______ dataeither _______ or fictitious in order to see that aspecific program or sever edit test is doing its work
manipulates,real
Mapping software is used by the auditor to listunused program instructions
Modeling is a variety of software which ________________
can be verypowerfulanalytical tool
can enable theauditor toexecuteprovisions on anumber of different bases
On line testing can be targeted for specific functionscarried out by programs
provides detailedinformation of
machine uses
identifiesprogram codewhich may bethere forfraudulent
reason
Snapshot is software which takes a picture of a fileor data or a transaction passing though the system
fictitious dataapplied againstthe clientprogram
comparison of source version of a programmed
While base testing forces on finding if there are anydefective execution policies in a program
Black box testing seeks to determine whetherapplication output is what it is supposed to be
In integrated test facility approach the auditorshould ensure that the impact of test transaction issubsequently eliminated from the computer filesBlack box testing is _______ based and white boxtesting is _______ based
specification,program
8/6/2019 Cs Aptech Questions
12/164
Source code review means__________
true false
true false
JCL means_________________
yes no
true false
true false
Generalized audit software consists ___________
Specializes audit program may be___________
true false
true false
true false
identifyingerroneous code
identifyingineffective code
In formula in flow hypothesis the auditor shouldexpand the extent of substantive tests todetermine how the defects may impact the
attainment of the program objectivesAll material application oriented events that occurwithin the boundary subsystem should be recordedin the accounting audit trail
In examination of audit trail the following dataassociated with an event may be ___________-
start and finishtime
authentication of informationsupport
job controllanguage
job connectivitylanguage
Audit should be periodically analyzed to detect anycontrol weakness of the system
In an accounting audit trail, intrusion detectionsystem might monitor the amount of processor timeconsumed by the user to detect unusual deviationfrom the amount processor time requested by theuser in the pastA sample size calculator program assists auditors indetermining RAND() function
packagecomputerp[program forperforming avariety of dataprocessingfunction
mathematicalconcept
prepared by theauditor
prepared by theentity
Generalised audit software could be used by thefollowing in consistencies or significant fluctuations
Generalized audit software functioninclude____________
file
access/organizations
statistical/arithmetic operation
In the file reorganization merging capabilities areneeded in data from separate file is to be combinedon a separate work fileAuditors cannot use generalised audit software toextract the data needed for audit purpose
8/6/2019 Cs Aptech Questions
13/164
Which of the following is not the feature of GAPs
Which is the example of CAATs ACL IDEA
In audit procedures, test data is
Which of the following is not the use of CAATs
Macros
integer number
MS access objects can be published in the web true false
actions events
report form
macro
To build complex expressions_____is used calculator code builder
action list macro list
conditions action
tabular columnar
_______layout of a form displays one record at a time tabular columnar
create report link report
true false
create fields add chart
primary key alternate key _______is used to create a mailing label label wizard chart wizard
start header group header
Auditors can combine functional capabilities of generalized audit software to accomplish the task of
__________________
examining thequality of systemprocess
carryinganalytical review
Wide access tovarious data base
Can extract andanalyse data
A sample of transactions
A utility softwareprogramme
Tests of details of transactions
Analytical reviewprocedures
Which of the following are called explicitly byanother procedure?
ActionProcedures
_________ data type is generally used for fieldsassigned as primary keys in a table
In code-builder, got_focuse, click,dbl_click,enter areexamples of _______
_______can be used to automate certain actions inresponse to eventsIn the macro sheet the macro is selected in the
_____fieldexpressionelements
The three list boxes present at the bottom of the
expression builder are called_____ ________option is selected from the view menu tocreate macros with conditions
_______report can be created with minimum userinput
The table or query name on which we are going tobuild our report is selected from the ____ dialoguebox
______and_____are the two types of auto reportsavailable
columnar andtabular
stable andunstable
There are no wizards for creating a database inaccess
______option from the insert menu option is chosento add an embedded chartIn ms-access, while using SQL, references constraintis used for creating _______
______header is present at the beginning of thereport
8/6/2019 Cs Aptech Questions
14/164
report footer page footer
In SQL, having clause is used for _________
condition group ______can be used to create toolbars VB Modules reports
add append
report macro sheet
true falseVisual Basic language is a _____ tool RAD RAP
______ function is used to display a message box SysCmd MsgBox
OLE DDE
OLE stands for_____ on line execution
OLE object OLE client
linked embedded
_______is the file format that works on internet exe DLL
form wizard report wizard
static file static html
append add
Currency fields express the amount in _________ dollars rupees
unbound object bound object
display as icon display
create html new
startup home
bullet command
______is present at the bottom of each page in areport
for ordering
records
for updating
records ______field is added to the macro sheet when weselect grouping option from the view menu
_______query is used to add records from one ormore tables into an existing table
_______window is used to write VB code in accessapplicationValues for other tables, queries are maintained inlook up fields data type
Other ms-office applications can be accessed fromms-access using a concept called ________
object linkingand embedding
The application that supplies data in OLE is calledan _________ If any change made on the object from the clientside is reflected on the server then the object is saidto be _____
______ is used to convert any ms-access object intohtml format
_______ option in publish to web wizard produces apage that is static in nature
_______query is used to create or change databaseobjects in a current database
_______is selected from the toolbar to add an OLEobject
To display an OLE object in the form of an icon ____ option is selected from insert object dialogue box
_______option from the file menu is selected to run'publish to the web wizard'
_____page in an web application is used to navigateto the rest of the pages in the application
______ is fired when an event is triggered is theconcept based on a Visual Basic language
8/6/2019 Cs Aptech Questions
15/164
Ms access is a ___________ DBMS RDBMS
data group data collection
A blank database can be created using __________ new dialog box
Text type data can be of _____ characters in ACCESS 255 64000
AutoNumber
Tables cannot be imported from other databases true false
inner join outer join
primary key not null
columnar tabular
In SQL, delete command is used to remove _________ table or tables query or queries
true false
property field field property
action queries
inner join self joinPrimary key uniquely identifies each record true false
summary sum
properties
included form sub form
_______ form displays fields in a single horizontal row columnar form tabular form
filtering ordering
A collection of data stored in different objects isknown as a _________
new blankdatabase dialogbox
______is a datatype that assigns valuesautomatically
automaticnumber
If two tables having same values for the fields are joined it is called an ______ Duplication of records in a field won't be allowed if the fields are declared a________
Changes from a master table can be reflected on to
the child table by selecting _____option
cascade delete
related records
cascade change
related records To see more than one record at a time in a form weuse _______
In MS-Access, filter excluding selection will displayonly those record(s) which meet the criteria.Properties of the fields are managed by _____ inDynaset
______queries allows us to view data in row bycolumn manner
crosstabqueries
row/columnqueries
The type of queries that can update or deleterecord(s) in a table(s) are called __________
row/columnqueries
Joining tables without any matching values in thefields is called ____________
Which of the following dialog box is/are used in thecreation of form ________
new form dialogbox
form createdialog box
_______ query wizards are used to generatesummary calculations for a tableProperties of a form can be changed by selecting
______from view menu optionschangeproperties
Forms that are included in other forms are called
______________ In MS-Access, while using form design view, forcreating a command button for adding a newrecord, we should select the _______ category fromthe command button wizard
RecordNavigation
RecordOperations
The process of arranging the data in a meaningfulorder is known as ___________
8/6/2019 Cs Aptech Questions
16/164
filter sorts
filter by form
* $Records cannot be sorted by a primary key true false
bound control
button group option group
Which of the following is control types ____________ bound unbound
CURRDATE() TODAY() _____is a control that lists set of data text box list box
______is a form that summarize large amount of data pivot table columnar form
data sheet filter filter by input
Wizards for toolbox controls are called a __________ button wizard control wizard
ram* ram??Look up fields slow up data entry true false
report form
autoreport report ______ represents data in a pictorial format chart label
true false
true false
60,000 255
true false
true false
true false
table query
table form
true false
______ are used to select only some particularrecords from the table or any other databaseobjectsIn MS-Access, user may specify criteria for filter inform view using _________
filter byselection
___wildcard character represents any single
character
A control without a data source is known as ___________
unboundcontrol
Set of related option buttons, check boxes andtoggle buttons is known as _____________
In MS-Access, the function that gives the currentdate is _____________
______allows to create a filter by typing the value ina data sheet
The wild card representation for any 5 letter wordthat starts with ram is ________________
____is an access object that displays un-editabledata
_____option from the new object toolbar gives the
easiest way of generating a report
Changes of one table can be carried over to anotherrelated tableHyperlinks are used to jump to any kind of information or data from a file
The memo field can have text upto_____ charactersin lengthIn MS-Access, columnar layout can be used to viewmultiple records in a formIn MS-Access, alter command may be used inadding a primary key to a table
Update query is used to add records from one ormore tables to the end of an existing tableIn ms-access, datasheet view is available in
___________ ______are used to jump to any kind of informationfrom a datasheet or a formHome page will always be present as a first page of an application
8/6/2019 Cs Aptech Questions
17/164
true false
Insert Records
true false
true false
alternate keys composite keysOLE object is a data type in access true falseData displayed in forms cannot be edited true false
true false
true false
In MS-Access long integer is a datatype true false
null not null
true false
true false
true false
true false
_________ of the following is/are a type of chart pie bar
true false
true false Text boxes cannot be bound controls true false The default query invoked by ms-access is update query select query
true falseList box is a control that offers a list of choices true false
inner join outer join
true falseLine is a tool box control true false
Text boxes can be part of a option group true false _____ chart exists as a separate object freestanding embedded
true false
Wild card characters are used for sorting records true false
Make table queries create a new table from therecords of another tableIn ms-access, to protect a database file from illegalaccess, we may set database password. The optionof setting database password is available in _______ menu
Foreign key is a field that uniquely identifies eachrecord and accept no null valuesData definition queries are used to create or changedatabase objects
The attributes of a composite key are known as ________
A sub form is used to display one to manyrelationship between tablesWe can switch from datasheet view to form view byselecting view -> form view option
In MS-Access, while designing a table for aparticular field, the Required parameter is set toyes. This validates the field as _______ Sorting is applied to select only some particularrecordsFilter by form can be created from a forms shortcutmenuAdvanced filter uses a filter similar to the querydesign window to create a filter? Wildcard character represents any number of characters
A bound control is tied to a underlying query ortableA calculated control uses expression as a source of data
A control can be bind to a record using row sourceproperty
If a table is joined to itself it is called a ________________
A picture box combines the activities of both a textbox or a list box
Filtering data is a way of arranging data in ameaning full order
8/6/2019 Cs Aptech Questions
18/164
true falseReports are used to represent un-editable data true false
Relationship is an association between _________ forms reports
true false
delete insert
true falseEmbedded charts exist separately true false
use hyperlink use import
true falseDetail section has a header and footer true false
true false
true false
true false
true false
true false
& #
true false _____ header is a unique feature of reports page detailChart can either be a form or a report true false
true false
true falseCharts can be produced without the wizard true false
true false
relational list The default data type of VB is integer true false
Pivot tables are used to navigate to the other tablesin a database
In MS -Access, the records in a table are sortedbased on _________
the first field of the table
the last field of the table
Summary options dialog box is used to summarizedata
______ queries can be used to delete a group of records that meet some specific recordsCharts can convert numerical data in a easilyunderstandable format
From ms - access, if we want to view the recordsstored in a table in ms - excel worksheet, we needtoPage header is present at the beginning of each
record
A macro is performed only when the user initiatesan event
The macro is selected from the action field of amacro sheetA macro can be made to execute before the startingof a databaseIn MS-Access. While appending records, the sourceand the target table must have similar structure andfields
We can add our own functions to the expressionelements list box of the expression builder
_______is the wildcard character which representsthe presence of any number of charactersMacros can be used to add a menu to a databaseobject
Group header will be present at the design view of areport even if the report is not groupedWe can change from the design view to the form
view without being prompted for saving the changesmade
Macros can be used to create user defined errormessagesBetween and Not Between is ______ type of operators
8/6/2019 Cs Aptech Questions
19/164
Visual Basic is based on __________ action language
report form
In access OLE objects cannot be linked true false
_____ section is present for each record in the report group record
data property
true false
true false
_______are forms that are included in other forms sub forms child forms
graphs chart
A field with a _______ uniquely identifies each record number primary key
pivot create
filters queries ______ control need not have a data source form bound
list box combo boxMS access is a DBMS true false
form name control ______ forms displays field in single row tabular form chart form
sub forms tabular form
calculated bound _______ control is tied to field calculated unbound
sub form auto form
set relation connect
filter by form filter by report
form report
clipboard file
structured querylanguage
_______is the name of the database object thatdisplays data and can be used to edit data
A ________ sheet lists all the properties that pertainto the form or the controls
Textboxes can also be an example of unboundcontrolIn MS-Access, we may design command buttons fornavigating records
_______ are used to represent our data in graphical
format
Large amount of data can be summarized using ______ tables _______ are employed to select only some particularrecords from a database object
______ control combines the functionality of both atext box and a drop down list
A form can be bind to a record source using _____
property of the form
______ forms are usually used for tables with one tomany relationship
_______ control uses an expression as a source of control
_______is the form that can be created withminimum input from the user
______option from the tool menu is selected forsetting relationships between tables
______,______and_____are the buttons belonging tothe options group
option, toggle
and commandbuttons
command
button, checkand list boxes
_________allows us to create a filter from a fieldshort cut menu
________is a database object which displays data butcannot be used to edit dataWhat term applies to a collection of related recordsin a database?
8/6/2019 Cs Aptech Questions
20/164
search sort
What is a database?
What does a record contain?
An RDBMS is a remote DBMS relative DBMS
Data Warehousing refers to
Key verification
What is a report?
What is the best way to analyse and change data
CHANGE TABLE MODIFY TABLE
Number Description
using a password
the product code the primary key
All of the following terms are related tocomputerized databases except which one?
A way to analyseand manipulatenumerical
information
A tool to producehigh quality
documents
Information aboutcertain programs
It contains allthe data aboutone specific item
storing dataoffline at aseparate site
backing up dataregularly
Unauthorised alteration of on-line records can be
prevented by employing
Computer
sequence checks
Reports allowusers to extractinformation ashard copy(printed output)
Reports providea very flexibleway of creatingand editingdocuments
Extracting andanalysing data
Spreadsheetsmake data easyto analyse
What are some popular office orientated softwareapplications?
Compilers,interpreters,editors
Networksoftware, backupsystems
Which of the following constraints can be used toenforce the uniqueness of rows in a table?
DEFAULT andNOT NULLconstraints
FOREIGN KEYconstraints
Which of the following commands is used to changethe structure of table?
You are creating a client application that callsActiveX DLLs. Which of the following properties of
the Err object provides the name of a componentthat sends an error back to the client application?
This database holds personal information. The usercan help to keep it confidential by
keeping abackup copy
If the database holds customer names andaddresses, personalised letters can be createdautomatically using
8/6/2019 Cs Aptech Questions
21/164
A database Graphics
bookmarks operators
Auto Primary Auto ID
Referential integrity ensures that the:
Tables are related to one another through a: foreign key.
A foreign key is:
One-to-one One-to-many
EmployeeID CompanyID
What is required of the fields that join two tables?
Application software suited to storing the surveyinformation obtained in the table would be
The characters * and ? are sometimes used insearch criteria asWhich of the following field types will generate theprimary key automatically?
records in adynaset areconsistent withthe underlyingtables.
related tables ina database areconsistent withone another.
main form and asubform.
the primary keyof both relatedtables.
the primary keyof the relatedtable.
You are creating a banking database to trackcustomer loans. The bank will, of course, have manycustomers, each of whom may take out one or moreloans, while each loan may be associated with onlyone customer (there are no joint accounts). What isthe re
In a one-to-many relationship between Companiesand Employees, which field is found in both tables?Which of the following ensures that records inrelated tables are consistent with one another? Forexample, it ensures that you cannot add a record
with an invalid foreign key.
The Tools menu,Relationship
window
Referential
integrity
How would you delete a relationship between tablesin the Relationships window?
Double click theRelationship line
Right-click theRelationship line,then selectDelete from theshortcut menu
In a Customers tables, what does a plus sign next tothe CustomerID field mean?
That there areseveralcustomersassociated withthat ID
That some of thedata is notviewable
They must bothbe numbers
They cannot betext fields
8/6/2019 Cs Aptech Questions
22/164
# M
Dim CreateList. Sub CreateList.
A text field:
The purpose of a database is to:A database stores: data. relationships.A database records: facts. figures.
Assume a one-to-many relationship between theCustomers table and the Loans table, withreferential integrity in effect. What happens whenyou attempt to delete a customer ID from theCustomer table that still has entries in the Loanstable?
Nothing, Accessignores theattemptedcommand.
The customersID is deletedfrom theCustomers table.
Which of the following is true when viewing a mainform and its associated subform in the Form Designview?
The subform isnot visible.
The subform isdisplayed inDatasheet view.
Which of the following relationships does not belongin a database based on a professional sports leaguesuch as football or basketball?
A one-to-manyrelationshipbetween teamsand players
A one-to-manyrelationshipbetween teamsand coaches
Which symbol is used at the end of the join line in arelated table to signify the many side of a one-to-many relationship?
You have created a one-to-many relationship withreferential integrity between a Customers table anda Loans table. From which table can you delete a
record?
Either table at
any time
The Customerstable only whenthere are Loanrecordsassociated with
that customer The correct order of the arguments for the MsgBoxstatement is:
prompt, title bartext, icon.
prompt, icon,title bar text.
The first statement in a procedure named CreateListis:
Which of the following is TRUE related to formfields?
A check boxenables the formuser to choosefrom one of several existingentries.
A text fieldenables the formuser to choosefrom one of several existingentries.
must be set forone word.
must be set formultiple words.
help people keeptrack of things.
store data intables.
8/6/2019 Cs Aptech Questions
23/164
Jet SQL Server
The user
In an enterprise-class database system ________ .
creates queries creates form
the user
holds user data holds metadata
data marts normalization
data marts normalization
A sales contact manager used by a salesperson isan example of _______________
single-userdatabaseapplication
multiuserdatabaseapplication
A Customer Resource Management (CRM) system isan example of_________
single-userdatabaseapplication
multiuserdatabaseapplication
The industry standard supported by all major DBMSsthat allows tables to be joined together is called
__________.Sequential QueryLanguage (SQL)
StructuredQuestionLanguage (SQL)
A program whose job is to create, process andadminister databases is called the _____
DatabaseModeling System
DatabaseManagementSystem
Microsoft Access may use which of the followingDBMS engines?
Which of the following are basic components of anenterprise-class database system?
The databaseapplication
the databaseapplication(s)interact(s) withthe DBMS
the DBMSaccesses thedatabase data
In an enterprise-class database system, thedatabase application ___ .
In an enterprise-class database system, reports arecreated by ____________________ .
the databaseapplication
A database is considered "self-describing" because _______ .
all the users' datais in one place
it reduces dataduplication
In an enterprise-class database system, thedatabase _________ .
A database designed using spreadsheets from theSales department is a database being designed
_________________________ .from existingdata
as a newsystemsdevelopmentproject
A database designed to implement requirements fora reporting application needed by the Salesdepartment is a database being designed _______ .
from existingnon-databasedata
as a newsystemsdevelopmentproject
A database designed to combine two databases
used by the Sales department is a database beingdesigned _________________________ .
from existingdata
as a newsystems
developmentproject
Database professionals use ________________ asspecific data sources for studies and analyses.Database professionals use a set of principles called
________________ to guide and assess databasedesign.
8/6/2019 Cs Aptech Questions
24/164
data marts normalization
data marts normalization
file managers
In a relation __________________________ .
table relation
record field
record field
record field
composite key primary key
Insertion anomaly Update anomaly
dirty data inconsistent data
A very popular development technique used bydatabase professionals for database design isknown as _______________________ .
A very popular development technique used bydatabase professionals to adopt a database designto new or changing requirement is known as _____ .
The predecessor(s) of database processing was(were) __________ .
hierarchicalmodels
entities in acolumn vary as tokind
the order of thecolumns isimportant
An attribute is also known as a(n).
A combination of one or more columns used toidentify particular rows in a is___ .A combination of two or more columns used to
identify particular rows in a relation is________ .A determinant that determines all the othercolumns in a relation is______ .
When designing a database, one of the candidatekeys in a relation is selected as the _________ .Normalization is a process used to deal with whichof the following modification anomalies?
When you are given a set of tables and asked tocreate a database to store their data, the first stepis to ____ .
assess theexisting tables'structure andcontent
design thedatabasestructure
Modern microcomputer personal DBMSproducts______.
are supplied byseveral well-establishedmanufacturers
were essentiallykilled off by MSAccess
Which of the following are true about data miningapplications?
They usesophisticatedmathematicaltechniques.
Their reportdelivery is moredifficult thanreport deliveryfor reportingsystems.
We have obtained access to the company'soperational data. We examine 50 records forcustomers with phone numbers that should use thecurrent area code of 345. Of these 50 records, wefind 10 that still use an older area code of 567. Thisis an example
8/6/2019 Cs Aptech Questions
25/164
dirty data inconsistent data
Form Table
Import Link
What makes a database an application?
Menu Wizard Build Menu
The purpose of a data warehouse is to:
We have obtained access to the company'soperational data. We have been asked to produce areport with an item by item analysis of sales, butthe only sales figure available is the total sale valuefor each order. This is example of_____
A data warehouse database differs from anoperational database because:
data warehousedata are notstored in tables.
data warehousedatabases do nothave metadata.
Which of the following objects is used to display amenu?Which of the following objects are NOT found in anAccess application?
Forms andreports
Queries andtables
You are developing an Access application that youexpect to upgrade periodically. Which of thefollowing statements is TRUE?
It will be easierfor the user toupgrade it if theobjects andtables are in onedatabase.
It will be easierfor the user toupgrade it if theobjects are inone databaseand the tables inanother.
Which of the following statements regarding Accessapplications is NOT true?
The Link Tablescommand can beused to associatethe tables in onedatabase with theobjects in anotherdatabase.
An applicationmay consist of multipledatabases, eachwith multipleobjects, linked toyet anotherdatabasecontaining onlytables.
Which of the following brings a copy of the tableinto the current database and does not maintain atie to the original table?
It contains morethan one table
It containstables, reports,queries, andforms
What is the Access tool that is used to create the
user interface?
create backupsfor missioncritical corporatedata.
centralize themanageability of data collection.
8/6/2019 Cs Aptech Questions
26/164
Digital Sign
Hash Function Digital Signature
Hash Function Hash Value
CA stands for ________________
True False
True False
Server Certificate
Server Certificate
Private Certificate Repositories
True False
True False
CRL stands for
___________ means the result of applying to specificinformation certain specific technical processes.
DigitalCertificate
__________ is an algorithm which creates a digitalrepresentation or "fingerprint" in the form of a "hashresult".
__________ is of standard length which is usuallymuch smaller than the message but neverthelesssubstantially unique to it.
Digital Signature involves two processes. They are ___________ and __________.
Digital Signaturecreation
Digital SignatureVerification
The Costs of Digital Signature consists mainly of thefollowing
InstitutionalOverhead andSubscriberRelying PartyCost
SubscriberRelying PartyCost
Certification
Authority
Certified
Authority
A Digital Certificate is issued by a CertificationAuthority and is signed with the CA's Private Key
A Digital Certificate does contain Owner's PublicKey, Owner's name, Expiration date of the PrivateKey, Serial number of the digital certificate
______________ enable web servers to operate in asecure mode.
DeveloperCertificate
______________ are used by individuals when they
exchange messages with other users or onlineservices.
DeveloperCertificate
______________ are on-line databases of certificatesand other information available for retrieval and usein verifying digital signatures.
Signing Writings serve the following generalpurposes______,_______,_______ and _______
Evidence,Ceremony,Approval
Approval,Evidence
The most widely accepted format for DigitalCertificate is defined by the CCITT X.509
A certificate may prove to be unreliable, such as insituations where the subscriber misrepresents hisidentity to the certification authority
CertificateRevocation List
CertificateResource List
The prospective signer identified in the digitalcertificate holds the_________ and is called the
___________ Private Key,Subscriber
Public key,Recipient
8/6/2019 Cs Aptech Questions
27/164
ANSI UN/EBCDIC
batch files interchange sets
Smart Card Embedded cards
E-cash Digital Cash
The network based technology is/are ____________ EDI E-mail
True False
Value Added Network is an example of _________ Global Network Private Network
Broadcast Junk mail
E-mail Bulk-mail
Catalog Endorsement
The most beneficial advantage of ERP system is Error checking Data Integration
In EDI interface, the translation service receives _________ as incoming files from the communicationservice
Internal FormatFile
External FormatFile
The EDI standardisation for International Trade andCommerce is introduced by __________ In EDI, the transmission files are composed of different sets of external format files which aregrouped into multiple sets under the name of
________ The ________________ are pre-paid credit cards thatinclude an embedded cards
________________ are another form of credit paymentthat lets customers use digital online cheques topay Web merchants directly
In Active advertisement, there are two types of models. They are _____ and ________
Billboards and Junk Mail
Online Catalogand Billboards
Decryption is a process employed for scrambling of plain text for web based transactions
Asymmetric cryptosystem is based on __________ and ____________
Login_Id andPassword
Primary Key andPrivate Key
The advertising strategies emerging in the on-lineworld are ____________
Active or pushbased advertising
Passive or pull-basedadvertising
The _________ model use direct mail, spot televisionor cable television, in active based advertisement.
The ________ is a form of mail that is not targeted toa specific audience
The __________ model refers to information that isplaced at a point where it will be noticed bycustomers in the course of other activities and doesnot require active search
What is the term that describes spying on onesbusiness rivals to gain a competitive advantage?
Competitiveespionage
Corporateespionage
What would you NOT be looking for when spying ona competitor?
A list of competitorsclients
Contact numbersof themanagementgroup
An online drugstore such as Drugstore.com is anexample of_______
single-userdatabaseapplication
multi-userdatabaseapplication
8/6/2019 Cs Aptech Questions
28/164
cell reference row reference
text files Lotus 1-2-3
serial values domain values
=today() =date()
dollar sign ' = ' sign
AutoSum AutoFill
variables arguments
text logical
concatenate pmt
countif vlookup
pivot table wizard chart wizard
sumif pmt
average sum
page setup print area
autoformat AutoFill
Which of the following is an example of unacceptable online netiquette?
Replyingpromptly
Keepingmessages short
Which of the following statements is correctconcerning the security of messages in anelectronic data interchange (EDI) system?
Removable drivesthat can belocked up at nightprovide adequatesecurity when theconfidentiality of data is theprimary risk.
Messageauthentication inEDI systemsperforms thesame function assegregation of duties in otherinformationsystems.
The wizard that is used to import text filesis_________________
text importwizard
convert text tocolumns wizard
The alphabet indicating the column followed by therow number is known an__________
Which of the following files could not be opened inexcel _______________ In excel, the dates that are stored as sequentialnumbers known as ________________-
The command to display the current date in a cell is _________________
In excel, absolute references are represented by a ________ before the column and row addresses The ________ can be used to select the function andassemble the arguments correctly
Specific parts of information required by functionsto perform certain tasks are called as___________
Which of the following do not belong to the formulacategory in excel environment__________
The function that in used to join cell values togetherin a single cell ________
The function that is used to count all the values thatmeet specific criteria _________
The wizard that is used to create and edit charts _______________ The function that is used to calculate the payment
for specific loan terms ____________
The function that is used to add together all valuesthat meet specific criteria is known as ____________
The __________ option present in the file menuoptions is used to specify major facts of the page tobe printed
The command that is used to apply a formatautomatically __________
8/6/2019 Cs Aptech Questions
29/164
bordering formatting
page setup print area
filtering searching
all option blanks
The URL for encyclopedia Britannica is_________ www.ency.in www.eb.com
URL DNS
Internet can be defined as _______ internal network
application layer transport layer
finger service ping service
FTP TELNET
URL stands for ____________
IN an URL the word before the color refers to _______ host computerA ______ always begins with a slash message schemeProdigy is run by IBM and ______ Delphi Microsoft
net web
Gopher and WAIS enables the user to ______ browser
spy mosaic
gophering gopherspace
Alta vista open text
finger server ftp server The web maps are called _______ list directories
Directories consists of _______ levels no maximum of five
middle lower
hotlist directory
_______ searches by keywords infoseek excite
The ____________ makes the information in aworksheet meaningful and easy to understandA particular part of a work sheet can be printed bysetting the _________
The process of finding or selecting information isknown as ____________
The option that is used to cancel the filter processfor a specific column and display all the records is
________
_______ maps IP addresses with the domain namesof the sites
network of network
The most important service of the ______ is tomanage traffic control
_________is a program that displays information
about a host connected to the net _______ is a program or a tool that helps in locating afile anywhere on the net
uniform researchlocator
uniform resourcelocatorname of theresource
The World Wide Web is referred to shortly as the _______
read the Usenetnews
______ is the program used to run CompuServe'sregular services
CompuServeinternet dialer
Navigating through the menu of gopher is calledmoving around _______
The directories that come with built-in engines areyahoo,lycos and ______
To use the finger command,SLIP users must run aprogramme called______
The _____ level gives the broadcast overview of thenet
The huge list of keywords from important items iscalled ______
The two types of search in veronica are _____ and ______
directorysearch,indexsearch
indexsearch,menusearch
8/6/2019 Cs Aptech Questions
30/164
netshark cello ______ supports one button publish lynx mosaicSPY MOSAIC is distributed by_______ Microsoft internet
Usenet finger service
HTTP is the acronym for __________
iccp ftp
yahoo ftp
TCP/IP stands for ________________
one two
ftp servers
TIA stands for_____ in internet
browser protocol
________ is used to link pages in the world wide web
FAQ stands for ______
SLIP,PPP TCP,IP
connection response
WSIRC stands for______
Two of the important browsers are_____ and_____ lynx,minx netscape,ie
glossary index
Mosaic displays links in color whereas _____ does notdisplay links in color
______ is a program that helps us to log on to othernetworks
Higher texttransfer protocol
Hyper texttransmissionport
______is used to transfer and copy files over theinternet
_____ is a program that helps us to log on to othernetworks
transfer controlprotocol/internet
transmissioncontrolprotocol/internetprotocol
Archie servers can be accessed in_______ different
ways in internet _______is the computer on the internet thattranslates between the internet domain names andthe internet numeric address
domain nameservers
the internetadapter
the internetadministration
Service indicates the name of the ________ used toaccess data, present on the other end of the link.
universalresource locator
uniform resourcelocator
frequent askedquery
frequently askedquestion
The internet adapter is a programme that makesour connection act like a _____or a ____ account
The step involved in Communicating between theweb clients and servers is ______________
wide search forinformation andresearch
windows socketsinternets relaychat
Lynx is a _______ programme that works withterminals
world wide webserver
world wide webclient
The huge list of keywords from important items iscalled an_____
8/6/2019 Cs Aptech Questions
31/164
VERONICA is an acronym for _______________
protocols IP address
______and_____ are web searching features ftp and finger
WINWAIS has two source lists namely____ and______ allsrc,winsocks wais,allsrc ________ is also called as WAIS manager allsrc waisman
hot links hyper text
images applets
first page home page
GNN stands for______ _____ is the most popular internet service yahoo service electronic mail
newsgroup telnet
Lycos catalog point review
apple link bitnet
BABEL consists a glossary of _____
Yahoo,lycos,excite and webcrawlers are _____ search engines web directories
GIF is the acronym for ____________
very easy androdent orientednet wide index tocomputerizedarchives
very organisednetworkintegration andcommunicationapplication
The first freenet is created at the_____ and iscalled______
university of berkeley,berkeleyfreenet
university of cleveland,cleveland freenet
________ are defined as ways of communicationamongst networks
searchengines,directories
The system of interlinked documents is knownas_______
The small programmes that createanimation,multimedia,real-time games and multiuser games are called______
The information displayed on the web pageincludes______,_____ and_____
graphics,videos,audio
programms,images,text
The web pages that represent online home of theirauthor are called______
global networknews
global networksnavigator
The online service offered by navigator gold 2.0 are _______ and_____
email and netconference
Netscape pagestartersite,netscapepage wizard
_______ is a program or a tool that helps us find a fileanywhere on the net
The databases to enable keyword search usingLycos are a2z,_______
______ is a large worldwide bulletin board servicenetwork
computer relatedabbreviations and
acronym
biographical
information
Dictionaries,encyclopaedias,government and otherreferences are found in ______
encyclopediaBritannica
on-line referenceworks
Graphicalinterpreterformatting
GraphicalinterchangeFormat
8/6/2019 Cs Aptech Questions
32/164
JPEG is the acronym for ___________ The Web aids users to explore the ________ mails documents
netscape,ie,lynx
The World Wide Web consists of _________ information web pages
BACKGROUND COLOR
Network Interface
Current web page Browser
Browser/user Server
A hyperlink can be on ___________ text only image onlyHTML was derived from _________ SQL PLSQLSGML is a _________ alphalanguage betalanguage
PINE stands for _____________ palm is not elm
SGML ProcessorWeb is a collection of ___________ web sites images
IETF stands for ________
text
hyperlink hypertext
in random order
first start
.bmp and .gif .bmp and .jpeg
The components of a URL are ___________
Joint PicturesExpert Group
Jumbled picturesexpert graph
The three most popular mailer are_____,_____ and______
yahoo,infoseek,altavista
In Microsoft Internet Explorer, the color of the textcan be specified using _________ attribute of the fonttag.
The interface that provides effective communicationbetween the web browsers and servers is _________
Communicationgateway interface
CommongraphicalInterface
CGI is the _________ between web browsers andserversCGI programs are invoked based on the informationprovided by the _________
A CGI program is usually called after a requestmade by the _________
palm is noteatable
The application that confirms whether a documentis compliant to its DTD is _________
SGMLPreprocessor
Internetequipmenttraining faculty
InternationalEngineeringtrainers andfaculty
The two major browsers used to surf the Internetare ________,_______
MS InternetExplorer andMosaic
NetscapeNavigator andMosaic
Special characters allow browsers to display _________________
data from adatabase
The keyword for providing links within or acrossdocuments is____________
Stringing pages together using hypertexttechnology helps view pages _______________
in sequentialorder
The initial web pages present in a web site is the ________ page. The image format supported by most browsersis________________.
Service,hostname anddirectory path
service,hostname,port,directory-path
8/6/2019 Cs Aptech Questions
33/164
8/6/2019 Cs Aptech Questions
34/164
Accessing files using FTP servers is called_____ file access anonymous ftp
PAN,NAN,AAN KAN,RAN,VAN ________ is in between LAN and WAN VAN MAN _____ can be owed by multiple organisation LAN MANData is transmitted in the form of_____ signals analog digital
DTD stands for __________
Modem stands for __________________
Mapping Modulation
SLIP stands for ________________
PPP stands for _____
Bandwidth Speed
Find Save
Recipient Party Relying Party
Public Key Private Key
The point to point channel network is also called as _____ and_____
point to pointnetwork andbroadcastchannel network
packetswitching,storeand forwardnetwork
The three most commonly used networksare______,______ and______
Data typedefinition
Define type of data
Moralize/demoralize
Modulation/demodulation
______ is the process of the digital signals beingconverted into a form suitable for analog
transmission
________ and______ are two basic ways of gettingconnected to the internet
Satellite link anddigital signals
Dedicatedaccess and dialup access
Standard longinternet protocol
Stream lineinternet protocol
Prime prolongedprotocol
Point to pointprotocol
Which of the following best describes uploading
information?
storing data on a
disk drive
sendinginformation to a
host computerA characteristic of a communication channel that isthe amount of information that can be passedthrough it in a given amount of time, expressed inbits per second.
The act of searching through storage to locateinformation without necessarily knowing of theexistence of the information being sought.
A "recipient" of the certificate desiring to rely upona Digital Signature created by the subscriber namedin the certificate is called the ____________
The Relying Party can use the ___________ listed inthe certificate to verify that the digital signaturewas created with the corresponding _________
Digital Signatures are used for a variety of Electronic Transactions like ________________________
ElectronicCommerce
8/6/2019 Cs Aptech Questions
35/164
8/6/2019 Cs Aptech Questions
36/164
8/6/2019 Cs Aptech Questions
37/164
Decryption SSL There are _________ types of data tables 1 2
data table filtered table
pivot table wizard chart wizardIn a chart Y-axis is known as_________ series or rank categoryIn a chart X-axis is known as_______________ series or rank category
series or rank category
series or rank category
column chart bar chart
The chart that holds the column chart is _________ column chart bar chart
column chart bar chart The chart that is used to display discrete data column chart bar chart
_________ are not allowed in a macro name spaces
excel97 internet explorer
pivot table wizard chart wizard
line chart bar chart
true false
and or
3-dimensions 4-dimensions
true false
Data table Pivot table
The ____________ is the process of encodinginformation to prevent it from being read byunauthorized parties
The tables that allows the user to change orrearrange the data, summarize the data andevaluate the data using changing points of view isknown as
The wizard that is used to suggest hints for doing atask
_________ is a set of tables that describe each of thedata series
________ is used to differentiate one data series fromanother
The chart that contains only one data series is _________
The chart that display two or more data series on asurface is _________
wild cardcharacters
Which of the following tool cannot be used to viewthe excel web page_______
The wizard that used to build an interactive tablefrom data existing on sheets
The chart that is used for displaying stock market
information
In excel, the subtotal command also generatesgrand total after the last group subtotal_________ In advanced filter , the criteria occupying multiplecolumns but more than one row, is considered as an
________ criteria. The stacked bar graphs can be represented in __________ A pie chart can represent only one data series at atime
The ______ generates a summarized report in
tabular form in an interactive manner
Which one of the following statements related tostock chart is NOT TRUE ?
It is also called ashigh-low-closechart
It shows trendsover time
8/6/2019 Cs Aptech Questions
38/164
Pivot table
Goal seek
Goal seek Pivot table
Workbook Worksheet
Spreadsheets are useful for _______________
Column field Row field.Excel allows upto ______ levels of sorting two three
true false
3-dimensions 4-dimensions
Data table Pivot table
Count.A workbook consists of many ________ databases records
Goal seek.
The state government needs to finalize a five yearsplan to implement 100% literacy in the state. Whichone of the following will be the best tool that shouldbe used to work out the plan ?
Scenariomanager
Forecast'99 is a group working on exit poll. It wantsto know how many seat ABC party needs to won intotality to obtain majority to form the government.Which one of the following will be the tool that willhelp the team ?
Scenariomanager
Which one of the following will be the tool thatprovides a way to view and compare the results of all the different variations together on theworksheet ?A ___________ is an excel file where the user storeshis data
Performingcalculations.
Performingdatabaseoperations
Which one of the following is NOT the component of the pivot table ?
Filtering rearranges a list to display the requiredrecords
The stacked bar graphs can be represented in _____________ The ______ generates a summarised report intabular form in an interactive manner
Which one of the following statements related tostacked bar chart is NOT TRUE ?
It displays thedata series oneon top of theother.
It is useful whenseveralcomponents arechanging andthe user isinterested in thesum of thecomponents.
Which following function is used in subtotal option ? ______________
Standarddeviation
Which two of the following statements related topivot table are TRUE ?
It is a tool forsummarizing andanalyzing thedata records in aninteractivemanner.
It is a tool thatprovides a wayto view andcompare theresults of all thedifferentvariationstogether on theworksheet
Which one of the following is NOT a What-if analysistool ?
Scenariomanager
8/6/2019 Cs Aptech Questions
39/164
worksheet workbook
On an Excel sheet the active cell is indicated by A dotted border
8,16,32 2,4,2
word processing graphical
Range Address
Spreadsheets can be used for... Producing graphs Writing letters
To select a column the easiest method is to
ENTER CTRL + ENTER
array. function.
100 (201)555-1212.
Cell references Functions
^ /
B5*B6 C3/D4
E12 6
The _________ wizard separates contents in a cellinto different cells
text importwizard
convert text tocolumns wizard
A spreadsheet is a grid of rows and columns and iscalled as a ________ Pick out the window that is not a form of excel
___________
application
window
document
windowA dark wideborder
Cell A4 =2 and A5 = 4. You select both cells anddrag the fill handle down to A8. The contents of cellsA6, A7, and A8 are _____.
If a cell shows ####### , it means that _____.your formula hasa syntax error
the row is tooshort to showthe number atthe current fontsize
Which is not an advantage of using computerized
spreadsheets?
ability to
generate tables
speed of
calculation
The gym teacher has a new program to calculatephysical fitness in terms of weight and exercise. Theuse inputs different weights or amounts of exerciseto determine the related physical fitness. This "Whatif" program is most likely which of the followin
The difference between the highest and the lowestvalues.
double-click anycell in the column
drag from thetop cell in thecolumn to thelast cell in thecolumn
If you press _____, the cell accepts your typing as itscontents.
The contents of cell C15 is =AVERAGE(C3:C14).AVERAGE(C3:C14) is known asAll of the following are considered constantsEXCEPT:Which of the following may NOT be included in a
formula?Which of the following is NOT a valid mathematicaloperator in Excel?Given the formula =B5*B6+C3/D4^2, whichexpression would be evaluated first?
Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?
8/6/2019 Cs Aptech Questions
40/164
It is blinking.
How can you change the active cell?
File Edit
Preview Details
Insert Delete
Clear Delete
Options Page Setup
worksheet. range.Which of the following is a valid cell range? 6 D12, G25
copy range.
paste range.
absolute relative
B4 $B4
#DIV/0! #DIV/0!
How can you tell which cell in a worksheet is theactive cell?
It is surroundedby a heavyborder.
By clicking in adifferent cell
By using thearrow keys tomove to adifferent cell
Which of the following would you use to change thefont size of a cell in Excel?
The Standardtoolbar
The Formattingtoolbar
The command that will save the current workbookwith a different file type is:
the Newcommand on theFile menu.
the Savecommand on theFile menu.
The command that will print an Excel workbook is
found on the ____________ menu.In the Save As and Open dialog boxes, the
___________ view shows the file size as well as thedate and time a file was last modified.
Which of the following commands will automaticallyadjust cell references in formulas?Which of the following commands will remove cells,rows, or columns from a worksheet?
Which of the following options is NOT controlledthrough the Page Setup command?
Orientation(portrait orlandscape)
Headers andfooters
Which command enables you to change the marginsfor a printed worksheet?All commands are carried out on a rectangulargroups of cells known as a:
In a copy operation, the cell(s) you are copying fromis called the:
destinationrange.
In a copy operation, the cell(s) you are copying to iscalled the:
destinationrange.
Which of the following commands is needed toduplicate the contents of a cell in another?
The Duplicatecommand
The Copycommand
A cell reference that does not change during a copy
operation is known asWhich of the following is considered an absolute cellreference?
Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, whatwill be the contents of cell E4?
8/6/2019 Cs Aptech Questions
41/164
#DIV/0! #DIV/0!
The F4 key is used to: edit cells.
the Fill Handle
the cell address.
Jul-30 Aug-31
the F4 key. the F2 key.
What will be stored in a cell if 3/4 is entered in it? 03-Apr 0.75
a variable.
B1-G10 B1.G10
Cell E3 contains the function=AVERAGE($A$3:$D$3). If the contents of cell E3are copied to cell E4, what will be the contents of cell E4?
Which of the following commands is needed to
transfer the contents of one cell range to another?
The Move
command
The Cut
command
copy and pastecells.
Which of the following quickly copies the formattingof a selected cell to other cells?
the FormatPainter
Which of the following will insert a hyperlink into an
Excel worksheet?
Select the InsertHyperlinkcommand from
the File menu.
Click the InsertHyperlink buttonon the Standard
toolbar.
Conditional formatting applies formatting to a cellbased on:
whether the cellhas a formula ora value in it.
If you enter a date into a cell, Excel stores the dateas:
text with a two-digit year.
text with a four-digit year.
You created a worksheet on July 30 and entered the=Today() function in cell E17. You opened thatworksheet again on August 31. What will bedisplayed in cell E17 on August 31?
The number of days between two cells containingdates can be calculated by:
subtracting theearlier date fromthe later one.
adding theearlier date tothe later one.
The function key that is used to quickly edit thecontents of a cell is:
A users response to the InputBox function can bestored in:
a cell on aworksheet.
The cell reference for a range of cells that starts incell B1 and goes over to column G and down to row10 is _____.
8/6/2019 Cs Aptech Questions
42/164
AVERAGE COUNT
Combination Line
Use tables
Paste Fill Down
Tools | Sort Data | SortWhat can you NOT do with a spreadsheet? Analyse data Calculate data
(D4+C2)*B2 D4+C2*B2
0
The default orientation for the printed page is _____. portrait landscapeWhich is not a valid cell address? AD213 ZA1
The World Wide Web was devised by _________ CERN ECRN
The useful URL schemes are_____ and______ mailto and files
The teacher has a spreadsheet showing all Year 10students and their marks in one Mathematics test.
To find the student with the highest mark, which of the following functions should be used?Which chart type best shows proportions of a
whole?
Which of the following is TRUE regarding charttypes?
Once a bar chartis chosen itcannot bechanged to acolumn chart.
Once a columnchart is chosen itcannot bechanged to a barchart.
To select several cells or ranges that are nottouching each other, you would _____ whileselecting.
hold down theCTRL key
hold down theSHIFT key
Your Institute teachers have set an assignment onStudies. You are required to use a spreadsheet torecord all that you study on each day for fourweeks. You decide to show each weeks data withan accompanying graph. What is the best way of doing this
Create fourseparate files
What would be the best method to quickly copy theformula from the active cell to each cell below it?
To arrange rows in alphabetical order based oncolumn A, you need to use the command _____.
To print just part of a sheet, you would select whatyou want to print and _____ .
click the Printbutton
press the PRINTSCREEN key
The formula that will add the value of cell D4 to thevalue of C2 and then multiply by the value in B2 is
_____.Which of the functions is not valid for performingaddition
=A3SUM:B3SUM:C3SUM
yahoo andinfoseek
8/6/2019 Cs Aptech Questions
43/164
BBS stands for______ USENET is a BBS on ____ scale small large
WINSOCKS is expanded as______ windows socks windows sockets
Mosaic Yahoo
buffer cache
Photography Digital Signature
Key Lock
User-id Password
Penetration Retrieval
Acts Regulations
Spoofing ImpostingAn action or event that might prejudice security. Loss Threat
Malicious software. Utility Pirated software
None the person who is known as father of Internet Tim Berner Lee Hoffman
This website is the biggest bookstore on the earth. Etrade.com Amazon .com
Any Time Money
Acts Regulations
The other ways of getting connected to the netare_____
newsgroups,yahoo andinfoseek
bulletinboards,mails calland wirelesssystem
bulletin boardsystem
businessbroadcastingsystem
IETF Level 2 HTML DTD supports graphical browserslike _______
The space used by Netscape to store the retrievedpage is called______
The principles, means and methods for renderinginformation unintelligible and for restoring
encrypted information to intelligible form.A long string of seemingly random bits used withcryptographic algorithms to create or verify digitalsignatures and encrypt an decrypt messages andconversations.Protected/private character string used toauthenticate an identity or to authorize access todata.
The successful act of bypassing securitymechanisms of the system.
A set of rules and formats, semantic and syntactic,
that permits entities to exchange information.An attempt to get access to a system by posing tobe an authorised person.
According to information Technology Act, 2000, Toinvestigate contraventions the controller of certifying authority shall exercise the like powers tothat of
Sales - taxauthorities
Income - taxauthorities
When we talk of Data Transmission modes, thenATM stands for
Automated TailorMachine
A sequence of bits or characters that identifies thedestination and the source of a transmission.
8/6/2019 Cs Aptech Questions
44/164
The means of communicating between networks Router Gateway
LAN WAN
The term HTTP stands for
A NIC is considered as
A hub is a device that can connect Only Computers
What do routers connect?What does a router route? bits frames
firewall gateway
One Two
Which of the following in an OSI layer Physical Layer Data-Link Layer
RG7U Coaxial cable
An IP address is a Physical address Logical address
A cable Hub
Bluetooth is
Which is not one of the recognized IEEE sub layers? Physical Layer Data Link Layer
Binary ASCIIA MAC address is of 48 Bits 48 Bytes
A group of computers and other devices dispersedover a relatively limited area and connected bycommunication links that enable a device to interact
with any other on the network.
hyper terminaltracing program
hypertexttracing program
NationalInformaticsCenter
NetworkInterface cardCan notcomputers
Which of the following is true concerning thefunction of a switch?
Concentratesconnectivity
Combinesconnectivity of ah