Você está na página 1de 9

1.

2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.

BBS stands for______(bulletin board system)


USENET is a BBS on ____ scale(large)
Internet can be defined as _______(network of network)
_________is a program that displays information about a host connected to the net(finger service)
_______ is a program or a tool that helps in locating a file anywhere on the net(ARCHIE)
URL stands for ____________(uniform research locator)
A ______ always begins with a slash(command line)
The World Wide Web is referred to shortly as the _______(web)
______ is a program that helps us to log on to other networks(telnet)
HTTP is the acronym for __________(Hyper text transfer protocol)
______is used to transfer and copy files over the internet(uucp)
_____ is a program that helps us to log on to other networks(telnet)
TCP/IP stands for ________________(transmission control protocol/internet protocol)
HTTP stands for______(hyper text transfer protocol)
Two of the important browsers are_____ and_____(netscape,ie)
________ are defined as ways of communication amongst networks(protocols)
HTML stands for_____(hyper textmarkup language)
The system of interlinked documents is known as_______(hyperlink)
The small programmes that create animation,multimedia,real-time games and multi user games are
called______(applets)
The information displayed on the web page includes______,_____ and_____(graphics,videos,audio)
The web pages that represent online home of their author are called______(home page)
_____ is the most popular internet service(electronic mail)
_______ is a program or a tool that helps us find a file anywhere on the net(archive)
Yahoo,lycos,excite and webcrawlers are _____(web directories)
GIF is the acronym for ____________(Graphical interchange Format)
JPEG is the acronym for ___________(Joint Pictures Expert Group)
The World Wide Web consists of _________(web pages)
A hyperlink can be on ___________(text or image)
Web is a collection of ___________(web sites)
The two major browsers used to surf the Internet are ________,_______(MS Internet Explorer and Netscape
Navigator)
The internet is also called as _______________(the net)
The internet is similar to _________________(peer-to-peer connectivity)
The net transfers______ from one place to another(data)
The net provides interesting services like______,______ and______(email,fileretrived,internet tools)
________ is the ancestors of the internet(arpanet)
DARPA stands for _______________________________________________(defensive advanced research projects
administration net)
DARPA is broken into ________ and _______(milnet,smallerarpanet)
NSFNET is the united states provides service to _____ and_____(education,research)
HTML stands for ______________________________________(Hyper textmarkup Language)
The first international IP network connections were established in 1973 with _____ and_____(england,norway)
A_____ is a set of computers interconnected by transmission paths to exchange information in internet(network)
A computer that provides a service usable by other computers is called______(servers)
_____ can be owed by multiple organisation(WAN)
Data is transmitted in the form of_____ signals(digital)
Modem stands for __________________(Modulation/demodulation)
______ is the process of the digital signals being converted into a form suitable for analog transmission(Modulation)
________ and______ are two basic ways of getting connected to the internet(Dedicated access and dial up access)
SLIP stands for ________________(Serial line protocol)
PPP stands for _____(Point to point protocol)
Identify the need for controls and auditing in a computerised environment.(All of the above)

BASIC FUNDAMENTAL
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.

1024 Megabyte is equivalent to:(1 GB)


The software used for layout of newsletters and magazines along with text and images is called(Desktop
publishing)
The model used to describe the relationship between data and information is called(System model)
A super computer uses a bus width of(64 bits)
When a processor executes one billion floating-point arithmetic operations per second, is called..(Gigaflops)
The processor responsible for communication to and from all the remote terminals connected is termed as
(Front-end processor)
The processors used for speed-critical graphics applications are(RISC)
The plastic cards with embedded microprocessor and memory are called..(Smart card)
VLSI stands for..(Very large scale Integration)
The data width of a Pentium 4 computer is (32 bits)
The unit which executes addition, subtraction, multiplication and division operations is (ALU)
The instructions to be executed by the processor are loaded from memory into the(Instruction register)
The results of a process are stored into (Accumulator)
The memory that stores data as a series of memory cells that can be accessed sequentially is(SAM)
The technology used to accelerate the processing of a computer is (Cache memory)
The memory used in a computer's BIOS chip is..(Flash memory)
The process of swapping information between the RAM and hard disk can cause(Thrashing)
The standard system bus was replaced by frontside and backside bus called.(Dual independent bus)
The DSP,DAC,ADC,and ROM are parts of the (Sound card)
The bus whose widths are 32 or 64 bits is called(PCI)
The maximum resolution of a standard SVGA adapter is (1280*1024)
. synthesis method uses recordings of actual instruments.(Wavetable)
The instrument that can produce continuous lines is..(Plotter)
PPM , CPS are units used to measure the printer's ..(Speed)
The PCL and postscript are defacto standards for(Page description languages)
A laser printer has RAM for downloading fonts called the.(Soft fonts)
The characteristic which refers to how sharply a pixel appears on the monitor is called..(Convergence)
The faster the refresh rate, the lesser the monitor..(Flickers)
The number of bits used to represent a pixel in a monitor decides the .(Colors and shades of gray that can be
displayed)
The input device that utilizes a light-sensitive detector to select objects on a display screen is called..(Light pen)
The most commonly used scanner technology is.(Charge-coupled device)
Identify the type of mice that uses optical sensors to detect motion of the ball.(Optomechanical)
Identify the input device that consists the puck and the stylus.(Tablet)
Identify the disk which has an access time of 30ms.(Winchester disk)
A set of tracks across a set of platters in a hard disk is called a(Cylinder)
The bus used to connect a CD-ROM to your computer is..(SCSI)
The digital audio tape with the capacity of 24GB of data uses the technology called ..(Helical scan)
The floppy disks that support 400k-1.2 MB belong to(Macintosh)
The backward compatible disk that has high density-120MB is called.(SuperDisk)
The maximum capacity of an optical disk is (6 GB)
Which of the auxiliary storage devices uses the constant angular velocity access technology?(CD-ROM)
The..is an auxiliary sequential access non-volatile storage device.(Magnetic tape)
The portable device that optimizes the features of the floppy and the CD-ROM is.(MO drives)
The important central module of an operating system is the..(Kernel module)
Identify the function of the operating system that manages the tasks waiting to be processed.(Job management)
This function of the OS manages allocation of a minimum main memory to tasks.(Virtual memory storage)
Identify the multitasking type that slices CPU time to each program.(Preemptive)
The OS which allows different parts of a single program to run concurrently is..(Multithreading)

49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
71.

1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.

The OS that monitors external activities with timing constraints is.(Real-time)


The 32bit operating system for desktop version that replaces Win 9x is..(Win 2000 professional)
The high-level logical disk structure which defines the way the entire disk is organised is ..(File allocation table)
A collection of sectors on a hard disk is a(Cluster)
The FAT system that provides long filename support and was written using protected-mode code .(VFAT)
Identify the file system that provides networking,security,compression, large file support.(NTFS)
The logical directory structure has a base of the tree called the(Root directory)
The process used to optimize the disk space by arranging files contiguously is ..(Defragmentation)
Choose the level of RAID that offers disk mirroring for fault tolerance.(Level 1)
Identify the archive formats found on Unix-based Internet sites.(Tar, gz, taz)
Identify the window screen part that indicates the name of the window, application or document.(Title bar)
The button on the title bar of a window that displays the menu to control the size of the window is..(Control box)
The mouse operation that is used to move windows and icons to different locations is ..(Dragging)
The start button,tray and shortcuts are important features of the .(Task bar)
The start menu option that keeps track of your important websites is ..(Favorites)
If you want the recycle bin capacity to be distributed across partitions, you must use the option (Configure drives
independently)
The feature to retrieve deleted files from the recycle bin is ..(Restore)
The feature which enables to synchronize files between a floppy and disk is ..(My Briefcase)
A file with the pdf extension can be viewed with the application..(Adobe Acrobat Reader)
The remote administration access to view shared resources on the network is..(Net Watcher)
The utility used to access the directory structure, create files and folders etc is.(Windows Explorer)
The font, color, background settings are saved in the ..(Desktop themes)
The Notepad utility saves files in the format.(ASCII)
INTERENT
The IRC II client program command begins with a .(Slash)
The IRC conversations are organized into.(Channels)
Identify the output of the IRC command " /list -min 10" .(Display channels with at least ten users)
Lynx text browser is a web client in which users can login with ..(Shell accounts)
A web browser provides this hotlist for a user.(Bookmarks)
The tool to obtain information on the web by menus and more flexible than Archie is.(Gopher)
These servers help in searching for words from a list of databases or documents.(WINWAIS and WAISMAN)
This scripting language is an object based language and is developed by Netscape.(JavaScript)
The one-way broadcast of live events is called.(Cybercast)
This is a system of thousands of distributed bulletin boards and read by a newsreader.(Newsgroup)
Unix shell provides mailing programs called .(Pine and Elm)
The Unix to Unix copy mail system separates parts of the mail address with the symbol.....(!)
The Netlauncher (TCP/IP) software consists of these programs that can run under Windows.(Both A and B)
The parts of the WSIRC server (net tool) window are..(Server message,command line and channels)
These are small java programs that create games, multimedia etc. These are downloaded over the Net and executed
by a web browser.(Java applets)
The World Wide Web is a collection of..(Web pages)
It is a link which helps in retrieving information from the WWW easily.(Hyperlink)
..directories deliver information on all the topics on the Internet.(Web maps)
This browser does not display links in color.(Cello)
The Mosaic browser stores information about the configuration in a/an .(Ini file)
This is an indexer that crawls around the web cataloging.(Webcrawler)
The option by which the browser window in Navigator Gold 2.0 can be shifted to editor window is .(New/Edit
Document)
This toolbar button displays information about web creation.(Web page starter)
This window in Navigator Gold does not support frame display.(Editor window)
The different ways of communication on the Web are..(Both A and B)

26. This download tool provides multi-server connection, can search for mirror sites and provides a file leecher.(Download
Accelerator Plus)
27. Thebutton provides HTML tags for font style, alignments, and colour options.(Character Format)
28. Identify the search engine that helps in concept based searching.(Excite)
29. This is a text only browser.(Lynx)
30. The multithreading feature of Netscape is facilitated with a storage space named..(Cache)
31. The distributed uploading of web pages through Navigator Gold is called..(Web publish)
32. The method of presenting information on the web through highlighted items is called(Hypertext)
33. The a2z directory is an alphabetical list of pages used by the search engine..(Lycos)
34. Netscape browser can display context links on an image called..(Image maps)
35. Name the download tool which highlights an area of a page and gets all the links that are within the highlighted
area.(Webcow)
36. ...helps in business transactions, generating revenue and demand on the information highway.(Both A and B)
37. The transfer of structured data for processing from computer to computer using agreed formats and protocols is
called..(Electronic Data Interchange)
38. This system involves electronic transfer of funds between financial institutions.(Electronic Fund Transfer)
39. A electronic mailbox stores EDI transactions for later retrieval.(Value Added Networks)
40. The mutual satisfaction of price, terms and conditions, delivery and evaluation criteria in a marketplace
is.(Negotiation and Bargaining)
41. The type of advertising, the Broadcast and Junk Mail models are of..(Push)
42. Identify the models of passive advertising.(Both A and B)
43. This layer is responsible for transmitting data as frames.(Data Link Layer)
44. This layer is responsible for encoding of data.(Presentation Layer)
45. This layer of the TCP/IP suite includes the device driver and network interface card.(Link Layer)
46. This protocol is used for flow control, echo and flow redirection.(Internet Control Message Protocol)
47. The software components that integrates different hardware devices with the operating system..(Device drivers)
48. This is the basic component that connects the computer to the network.(Network Interface Card)
49. The dumb terminal/node in a network depends on this computer for their basic functioning.(Server computer)
50. This has an embedded microchip which can both manipulate data and execute applications.(Combi card)
51. To ensure a reliable communication between the buyer and seller, the protocol used is.(Secure Sockets Layer
Protocol)
52. The financial transactions are to be . leading to different steps in Accounts Compilation.(Grouped and
summarized)
53. The basic document where transactions are entered chronologically is.(Journal)
54. These are the basis for analysis by potential investors, banks etc.(P & L Account and Balance Sheet)
55. The accounts that the business owns is called .(Asset)
56. The expenditure for running the business for a period is ..(Expense)
57. Identify the account type by the rule: "Debit the receiver and credit the giver".(Personal accounts)
58. The first document where the transaction is entered is called a ..(Voucher)
59. The document used for posting of accounting transactions is ....(Journal and ledger)
60. When the debit total is greater than credit total, the amount appears in the .. column.(Debit)
61. The methods LIFO, FIFO, Moving Average are used to .(Value closing stock)
62. The report prepared taking the asset and liability type accounts from the Trial Balance is called.(Balance sheet)
63. The report that depicts operating profit/loss for a period is ..(P & L statement)
64. The day book contains transactions relating to (Sales or purchase)
65. The Bills Receivable details are maintained in a ..(Sundry debtors)
66. Creditors ledger has details of your dues to ..(Suppliers)
67. The sundry debtors are placed in the Balance sheet on the (Assets side)
68. The first step in Tally before any transaction is entered or saved is creating a (Company)
69. To configure country specific details use the function key(F12)
70. Identify the security mechanism used in Tally.(Tally Vault)
71. After selecting a company in Tally, you will be in the(Gateway of Tally)
72. Tally software is based on accounting system.(Mercantile)

73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
91.
92.

Identify the primary group of capital nature that uses bank account and cash in hand as sub groups.(Current assets)
All financial entries in Tally are done using.(Ledgers)
The Direct expenses, Purchase account, Direct income are primary groups of ..(Revenue nature)
The option to delete a sub-group is admissible through the menu(Alter)
The behavioural attributes of this group cannot be changed.(Primary-group)
Credit limits for personal accounts and branches can be done in the ledger mode(Multiple)
We are not allowed to delete a ledger from this mode.(Multiple)
All account heads except Cash and Bank are placed in the(General Ledger master)
Identify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank OCC Account.(Loans)
The primary document for recording all financial transactions in Tally is the(Voucher)
You can customize the voucher entry screen using the function key.(F12)
Identify the voucher type that records fund transfers between cash and bank accounts.(Contra)
This voucher type records adjustments between ledgers.(Journals)
The use of classes for payment, receipt and contra vouchers enables data input in (List entry mode)
The details of a voucher entry can be given in the .(Narration)
The credit note voucher can hold account types: ..(Sales account, Sales tax account)
The suffix and prefix details for the voucher type can be made applicable only from the .(First of a month)
The voucher used to record all bank and cash payments is ..(Payment)
Tally's age-wise analysis considers the voucher's (Effective date)
Arrange the steps in generating the books of accounts.
1. Create Trial balance
2. Create new ledgers
3. Generate Day Books
4. Update journals for financial transactions(2, 4, 3, 1)
93. For day-to-day transactions the voucher types used are(Both A and B)
94. Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be entered into the voucher
type..(Payment)
95. Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10 monitors by credit.(Credit Purchases)
96. Identify the voucher type to be chosen for the sale of computers to Anand by cash @ Rs.210000 per unit.(Stock
Journal)
97. A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher..(Contra)
98. The financial statement that consolidates ledger balances is ..(Trial balance)
99. The F9 function key in the left side of the Gateway of Tally screen displays the(Inventory reports)
100. The option on the Gateway of Tally that will generate the P&L account statement is..(Net Profit)
101. This displays the balance daywise for a selected voucher type.(Day book)
102. The feature in Tally to analyze accounts of a company is..(Ratio analysis)
103. The age-wise statement is displayed based on(Payables)
104. The ratio analysis of receivables can be done based on(Bill date)
105. Name the statement that helps the management in the decision making process.(Funds flow)
106. Identify the budget type which is chosen where transaction amounts are to be monitored.(On net transactions)
107. Choose the budget type to be used where bank accounts balances are to be monitored.(On closing balance)
108. The management that needs to consolidate the accounts of its various enterprises uses . in Tally.(Group company)
109. Identify the user who can access audit trails in Tally.(Administrator)
110. Identify the accounting feature in tally that facilitates splitting financial years for a company data.(Period-less
accounting)
111. The tracking of changes in vouchers and ledger masters is done by..(Tally Audit)
112. Tally can import data from other programs and creates a log about the activity in the file..(Tally.imp)
113. Import and export of data between Tally and other programs is possible with the help of..(ODBC)
114. The manual option of voucher numbering leads to..(Duplicate number)
115. The Tally audit trail tracks changes made to vouchers that are ..(more than 30 Days old)
116. The ratio analysis of Bills Receivables or Bills Payables can be displayed with the function key..(F6)
117. A _____________ is a list of instructions for the computer.(Program)
118. Which of the following displays the output?(Monitor)

119. The term ______ refers to the physical parts of the computer.(Hardware)
120. How many bits form a character?(8)
121. System 7 is a/an ____________.(System software)
122. Which of the following is used to create newsletters and magazines?(Desktop publishing software)
123. A model to describe the relationship between data and information is called ______________.(System model)
124. ________ can customize an application program for a specific task using the advanced features of application
programs.(Power users)
125. Computers are _______________.(All of the above)
126. A _________ is one billion floating-point arithmetic operations per second.(Gigaflop)
127. The capability to process multiple programs concurrently for multiple users is called
___________.(Multiprogramming)
128. Which of these is a single-user computer?(Microcomputer)
129. RISC stands for _________________.(Reduced Instruction Set Computer)
130. Which of the following can be used as a server for LAN?(Workstation)
131. The full form of PIM is ______________.(Personal Information Manager)
132. First generation computers use _______________.(Vacuum tubes)
133. ________________ are also called semiconductors.(Integrated circuits)
134. Circuitry used in fourth generation computers is _____.(VLSI)
135. ____ of CPU sends command signals to the other components of the system.(Control Unit)
136. The opposite of RAM is ________________.(Serial Access Memory)
137. Which of the following is not a type of cache memory?(L4 cache)
138. When operating system has to constantly swap information back and forth between RAM and hard disk, it is called
_____________.(Thrashing)
139. ____ connects the microprocessor and the system memory.(Local bus)
140. The shared bus _________________.(Connects additional components to the computer)
141. The graphics card in a modern PC can connect in _________ way.(All of the above)
142. Full form of PCI is ______________________.(Peripheral Component Interconnect)
143. ______ carry signals and voltages across the motherboard.(Traces)
EXCEL
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.

In MS Excel, references to cells in other workbooks are called _____.(Links)


In Excel, when E$5 is copied down or across, the _________ reference can change.(Column)
Which of these is a valid range name in Excel?(___A.B)
How to name a range in Excel?(All of the above)
Which operator is used for exponentiation in Excel?(^)
In Excel, ____ are structured programs that calculate a specific result.(Functions)
In Excel, FACT(2.9) returns __________.(2)
In Excel, LOG function returns the ________________.(Logarithm of a number to the base specified)
In Excel, MROUND(1.3, 0.2) returns _______.(1.4)
In Excel, __________ returns the average of the absolute deviations of data points from their mean.(AVEDEV)
In Excel, ___ error message is given if the formula contains a blank cell.(#DIV/0!)
In Excel, _________ error message is given if the formula contains text that Excel doesn't recognize.(#NAME?)
To manually calculate all the formulas in a worksheet, press _______.(F9)
To have column and row headings visible while scrolling the worksheet, _______________ feature is used.(Freezing
Panes)
If a cell is formatted as Accounting in Excel, zero values are shown as ________.(Dashes)
By default, MS-Excel aligns error values in the ________.(Center)
If cells A2, A3, B2 and B3 in a worksheet are merged, the cell reference for the merged cell is _______.(A2)
Which of the following is not a chart type in Excel?(Row Chart)
In MS-Excel, a 3-D column chart uses three axes - a horizontal axis, a vertical axis, and a ________ axis.(Depth)
In which of the following situations, Excel's pie chart should be used?(There are no more than seven categories.)
In a clustered bar chart in Excel, the ___________ are typically organized along the vertical axis.(Categories)
E-FILING

1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.

1.
2.
3.
4.
5.
6.
7.

Gopher is a ________________________.(Distributed document search and retrieval network protocol)


Full form of WSIRC is _____________________.(Windows Sockets Internet Relay Chat)
OSI model contains _______ layers.(7)
Blog web sites are used to ____________________.(Post online diaries which may include discussion forums)
Which of the following is not a limitation of Navigator Gold?(Drag and drop capability is not supported.)
URL stands for ________________________.(Uniform Resource Locator)
_____________ is the basic component that will allow a computer to communicate over a network.(Network
Interface Card)
An API _____________________________.(Provides network I/O to remote file systems)
A search engine operates in the following order:(Web crawling, Indexing, Searching)
In case of a static website, __________________.(Web pages stored on the server are in the same form as the user
will view them)
Fresh Download is ______________________________.(A download manager that supports multiple connections,
scheduling as well as pausing and resuming of broken downloads)
EFT involves ________________________.(The electronic movement of funds and fund information between financial
institutions)
Which of the following is a disadvantage of the catalog model of passive advertising?(Lack of timeliness)
Full form of PDA is ____________________.(Personal Digital Assistant)
SET uses _______ to ensure the identities of all parties involved in a purchase.(Digital certificates)
_______________ require a smart card reader in order to work.(Contact cards)
In a network, clients that do not require the server for their basic functioning are called ________________.(Smart
terminals)
Which of the following is a protocol suite?(AppleTalk)
Which of these statements is false for OSI reference model?(Presentation layer provides the interface between the
applications and the computer network services.)
____________ is a private network implemented inside the enterprise to facilitate internal communication.(Intranet)
The two companies or groups which exchange information through EDI are called __________________.(Trading
partners)
A/An ________ contains one or more documents for the same trading partner.(Transmission File)
EDIFACT stands for _______________________.(EDI for Administration, Commerce and Transport)
Metamediary model of online purchase ______________________________.(Provides services like quality assurance)
To protect against merchant fraud while making payment online, use system from _____________.(Any of the above)
JEPI stands for ____________________.(Joint Electronic Payments Initiative)
_________________ is the transportation foundation that enables the transmission of content in the e-commerce
framework.(Information Superhighway)
EDI stands for _______________________.(Electronic Data Interchange)
A typical EDI system converts generic EDI messages in EDI format to ___________ format.(RDBMS)
Which of the following external document standards is not supported by an EDI system?(X10)
In EDI, ___________________ define the procedural format and data content requirements for specified business
transactions.(Transaction Set Standards)
ITR stands for ____________________.(Income Tax Return)
DATA BASE
In MS-Access, a view cannot be sorted on ______________ fields.(OLE Object)
___________ queries are useful for summarizing information, calculating statistics, spotting bad data and looking for
trends in a database.(Crosstab)
___________ form in MS-Access, lets the user see the datasheet in the upper section and a form in the lower section
for entering information about the record selected in the datasheet.(Split)
In MS-Access, _____________ controls are also known as memory variables.(Unbound)
In MS-Access, ____________ are used strictly for viewing data and not for entering data.(Columnar reports)
In MS-Access, _______ control lets the user to insert a picture into the form.(Logo)
The relationship between a school and students is _______________.(One-to-many)

8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.

Variance Analysis Report provides information on __________.(The difference between the actual vs the budgeted
figures)
__________ controls are designed to ensure that the integrity of the data entered into the computer system is
maintained.(Input)
Which of the following code type has the demerit of low mnemonic value?(Serial code)
_____________ is a record level check though applied for a field.(Sign test)
______________ are the grand totals calculated for any code on a document in the batch.(Hash totals)
__________ are required to check if correct sequence of commands and update parameters are passed from the
application software to the database.(Data integrity related controls)
___________ tables are stored tables from which certain values are extracted for further processing and
storing.(Internal)
In ____________ tests, top-level modules are tested first.(Top-down)
Which of the following technique is capable of identifying unusual transactions passing through the
system?(Embedded Code)
In ___________________ technique, care must be taken to ensure that live data does not impact actual results.(Online Testing)
_____________ testing is program-based.(White box)
TALLY

1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.

The methods LIFO, FIFO, Moving Average are used to .(Value closing stock)
The report prepared taking the asset and liability type accounts from the Trial Balance is called.(Balance sheet)
The report that depicts operating profit/loss for a period is ..(P & L statement)
The day book contains transactions relating to (Sales or purchase)
The Bills Receivable details are maintained in a ..(Sundry debtors)
Creditors ledger has details of your dues to ..(Suppliers)
The sundry debtors are placed in the Balance sheet on the (Assets side)
The first step in Tally before any transaction is entered or saved is creating a (Company)
To configure country specific details use the function key(F12)
Identify the security mechanism used in Tally.(Tally Vault)
After selecting a company in Tally, you will be in the(Gateway of Tally)
Tally software is based on accounting system.(Mercantile)
Identify the primary group of capital nature that uses bank account and cash in hand as sub groups.(Current assets)
All financial entries in Tally are done using.(Ledgers)
The Direct expenses, Purchase account, Direct income are primary groups of ..(Revenue nature)
The option to delete a sub-group is admissible through the menu(Alter)
The behavioural attributes of this group cannot be changed.(Primary-group)
Credit limits for personal accounts and branches can be done in the ledger mode(Multiple)
We are not allowed to delete a ledger from this mode.(Multiple)
All account heads except Cash and Bank are placed in the(General Ledger master)
Identify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank OCC Account.(Loans)
The primary document for recording all financial transactions in Tally is the(Voucher)
You can customize the voucher entry screen using the function key.(F12)
Identify the voucher type that records fund transfers between cash and bank accounts.(Contra)
This voucher type records adjustments between ledgers.(Journals)
DIGITAL SIGNATURE

1.
2.

Digital signatures use ________________.(Public key cryptography)


While sending signed and encrypted message using digital signatures; one-time symmetric key used for encryption, is
encrypted using ______________________.(Recipient's public key)
Certificates can be read or written by any application complying with _______.(X.509)
______________ are on-line databases of digital certificates.(Repositories)
A Digital Certificate is issued by a _______________.(Certification Authority)
Document authentication means ______________.(Identifying what is signed)

3.
4.
5.
6.

7.
8.
9.
10.
11.
12.
13.

_____________ is used to create the digital signature.(Private key)


ARPA stands for ______________________.(Advanced Research Projects Agency)
The device used for converting analog signal into digital representation is ______________.(Modem)
______________ is also known as shell accounts.(Dial up access)
Which of these is not a web browser?(E-Meleon)
Status bar ____________________.(Is the place which displays the progress of the loading page)
Mirror servers can be used to ____________________.(Ease the load of data transfer)
WORD

1.
2.
3.
4.
5.
6.
7.

In Word, ____ key is used to update the index.(F9)


The Research option is in _____ group of Review Ribbon in Word.(Proofing)
In Word, Thesaurus provides the user with a list of _________.(Synonyms for a selected word)
To see what changes have been made to a Word document, one can use ______________ utility.(Track Changes)
View Ribbon in MS-Word can be accessed using the keyboard shortcut ______________.(Alt + W)
To display our Word document in Draft view, which keyboard shortcut can be used?(Alt + W, E)
In Word, ______________ shows an outline of the document's headings on the left of the Word 2007
window.(Document Map)
In Word, a _________ is a shortcut for performing a series of actions and is useful for automating complex or
repetitive tasks.(Macro)
Which of these is a valid macro name in Word 2007?(A67S)
For macro to be available whenever we use Word, the macro should be saved as part of the _____________
template.(Normal.dotx)
The data in a ________ file cannot be changed.(PDF)
A ___________ is defined as a set of unified design elements that provides a look for Word document by using color,
fonts, and graphics.(Theme)
In Word, themes have a palette of _____ colors.(12)
In Word, a _________ margin setting adds extra space to the side margin or top margin of a document that we plan to
bind.(Gutter)
Which of the following is not a type of Section Break in Page Break options of Page Setup group in Word 2007?(Last
Page)
A watermark used in MS-Word, is ___________________________.(A translucent image that appears behind the
primary text in a document)
In Word, ____________ a shape is also referred to as Flipping.(Reversing)
Address Block option is present in _______________ group of Mailings ribbon in MS-Word.(Write & Insert Fields)
_______ file can be used as a data source in Mail Merge.(.csv)
While doing Mail Merge, a specific merged document can be previewed by clicking _______________.(Find Recipient)
In Word 2007, ___________ are the graphical equivalents of drop-down menus.(Galleries)
The default extension for Word 2007 document is _____.(.docx)
When all Office programs are exited and the computer is restarted, the Office Clipboard ______________.(Is cleared
of all items)
In Word, font effect _____________ draws a line through the selected text.(Strikethrough)
In Word, a __________ indent controls the left boundary of every line in a paragraph except the first one.(Hanging)
The Links group of Insert Ribbon in Word, contains options for _______________.(All of the above)
To create a linked object along with existing information in Word, click _____________.(Paste hyperlink)
Macros option is in ___________ Ribbon in MS-Word.(View)

8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.

Você também pode gostar