7/29/2019 Module-1 Question Paper to Pondy
1/12
S.No NAME Option 1 Option 2 Option 3 Option 4 Answe
1 A ________ is not a part of substance of a transaction, but
rather of its representation or form.
Signature Authentication Approval Cryptography A
2 __________ is used in both creating and verifying a digitalsignature.
Signer Authentication Hash Function DocumentAuthentication
SignerAuthorisation
B
3 _____________ is the process of checking the digital
signature by reference to the original message.
DS Creation DC Creation DS Verification DC Verification C
4 ____________ is to prove your identity or your right to
access information or services online electronically.
Digital Signature Digital Document Server Certificate Digital Certificate D
5 A _________ identifies and authenticates your server and
encrypts any information passed between the server and aweb browser.
Document Certificate Personal Digital
Certificate
Server Certificate Secure Mode
Certificate
C
6 A Digital Certificate is issued by a Certification Authority. TRUE FALSE A
7 ___________ technology can be applied as a robust
computer based alternative to traditional signature.
Digital signature Digital certificate Software Computer A
8 ___________ is a tool used to exclude impersonators and
forgers.
Document
Authentication
Signer authentication Document Certificate Digital Certificate B
9 ___________ key is used to create the Digital signature and
only known to the signer.
Public Foreign Private Secret C
10 _____________ is used for a veriety of electronic
transactions.
Digital signature Server Certificate Digital certificate Digital Document E
11 ______________ are used by individuals when they
exchange messages with other users.
Document Certificate Personal Digital
Certificate
Server Certificate Secure Mode
Certificate
B
12 Rule to design and use the database is called people Data Information Procedure D
13 _________ manages the interaction between the database
and end user
RDBMS DBMS Database Data Abstraction B
Module - 1
7/29/2019 Module-1 Question Paper to Pondy
2/12
S.No NAME Option 1 Option 2 Option 3 Option 4 Answe
14 DBMS stores the definitions of data and their relationships in
a _________
Data storage Database server Data dictionary Database client C
15 _______ describes the structure and constraints for the
whole database
Internal Schema External Schema Conceptual Schema View Level C
16 Data modelling under conceptual model is achieved in
________ levels
one two three six B
17 ___________ are data elements that describes an entity Attributes category
Relationship
Entity A
18 ________ is the process of refining the data model built by
an entity-relationship diagram
Normal Form Relationship Normalization Abstraction C
19 The degree of relationship is also called as _________ Cardinality Logical Level physical Level View Level A
20 _________ structure is possible in a network structure N:1 M:N None of the above Both A and B D
21 In which structure we have parent-child/children relationship
amongst the different modules.
Hierarchy Network Relational Object-oriented A
22 _______ describes a single location in a record in which a
particular te of data is stored.
Record Table Tuple Fields D
23 SQL stands for Standard Query
Language
Standard Query List Structured Query
Language
Structured Query
List
C
24 Maximum Character for Memo Datatype is 255 char 64000 char 4 bytes 2 bytes B
25 In an ________, records in the joined tables must have the
same values for fields that are joined.
Outer joins Inner joins Self-Joins Cross Joins B
26 ___________ is a representation of facts, concepts or
instructions in a formalized manner suitable for
communication, interpretation or processing by users.
people Information Data Procedure C
27 Processed data is called __________ people Procedure Data Information D
7/29/2019 Module-1 Question Paper to Pondy
3/12
S.No NAME Option 1 Option 2 Option 3 Option 4 Answe
28 A __________ can consist of one or more tables of
information that are related in some way.
Table Record Database Tuples C
29 ___________ manages the database within the database
system.
RDBMS software DBMS Software VB software Object-oriented
software
B
30 __________ are most commonly used to access and
manipulate the data found within the database.
Application program Object-oriented program Development program Utility Program A
31 ___________ is the software tool which is used to manage
the database system's components.
Development software Utility Software Application software Object-oriented
software
B
32 A DBMS that supports a database distributed across several
different sites is called _______________.
Centralized DBMS Networking Distributed DBMS LAN C
33 Logical level is also called as Internal Schema. TRUE FALSE B
34 _____________ level describes data storage structure and
access paths.
Logical View Conceptual Physical D
35 A technique for analysis and logical modeling of a system's
data requirement is known as ___________.
Normalization Implementation E-R modeling Hierarchy C
36 _____________ focuses on the logical nature of the data
representation
Implementation model Conceptual model Network model Relational model B
37 ___________ is the default datatype for primary key field. Autonumber Text Number Memo A
38 We can set primary key for more than one field in a single
table.
TRUE FALSE B
39 Forms included in other forms are called _____________ Subdirectory Subdatasheet Subforms Subwindows C
40 Using datasheet view, we can see only one record at a time. TRUE FALSE B
41 _____________ functions calculates statistics on a group of
records in the current table.
Aggregate Statistical Logical Database A
7/29/2019 Module-1 Question Paper to Pondy
4/12
S.No NAME Option 1 Option 2 Option 3 Option 4 Answe
42 _________________ is the process of arranging
information in a specific meaningful order.
Sorting Filtering Indent Alignment B
43 ___________ performs certain action that has been
assigned to it when clicked.
Checkbox Button Command Lablebox C
44 Records in a table can be deleted even if they have
relationship with other tables.
TRUE FALSE B
45 OLE is a method used to sharing data between applications. TRUE FALSE A
46 ___________ performs basic tasks, such as recognizing
input from the keyboard and keeping track of files and
directories on the disk.
Operating system Control Unit ALU CPU A
47 In __________ data are processed instantaneously. Batch processing On-line processing Line processing Data processing B
48 _________ allows more than one program to run
concurrently
Multi processing Multithreading Multitasking Real time C
49 The hard disk is instead broken into large pieces called
________
Sector Track Clusters Disk C
50 Unix/Linux file system was specially created for Windows
New Technology File System
TRUE FALSE B
51 NTFS stands for New Training File
System
New Technology File
System
New Technology
Forcasting System
New Transmitting
File System
B
52 NTFS is built for networking and with the goal of security,
_______ and efficiency
Reliability Sequencing Flow control Expandability A
53 Every file on the hard disk is stored in a ________ Path Directory Folder RAM B
54 __________ is a process of optimizing the disks by
rearranging the files.
Format Backup defragmentation compression C
55 The base of the directory tree is called Base Directory Root Directory Subdirectory External Directory B
7/29/2019 Module-1 Question Paper to Pondy
5/12
S.No NAME Option 1 Option 2 Option 3 Option 4 Answe
56 _______ is the act of dividing the harddisk into pieces Fragmentation Formatting Restore Partitioning D
57 _______ provides real time data recovery when a hard drive
fails and also protect against loss of data.
Tape Cd Drive RAID UPS C
58 Damage caused by a virus is called the ________ Uninfected file Payload Scanners Formload B
59 Virus have been found on shrinkwrapped software straight
from the manufacturer
TRUE FALSE A
60 ___________ are files that contains other files. Folders Archive File Container Archie B
61 The ________ is located across the bottom of desktop andoffers an easy way to access programs
Formatted Toolbar Menubar Taskbar Standard Toolbar C
62 USB stands for Uniform Serial Bus Universal Serial Bus Unix Serial Bus Unilex Serial Bus B
63 ___________ is used to remove unneeded files. Delete Cookies Format Defragmenter Disk cleanup D
64 Which file system was created for windows NT File Allocation Table UNIX/LINUX File
System
New Technology File
System
Virtual File Syatem C
65 RAID stands for Redundant Array of
Inexpensive Data
Reduntant Array of
Inexpensive Disks
Redundancy Array of
Inexpensive Data
Redundancy Array
of Inexpensive
Disk
B
66 An operating system manages and coordinate the functions
performed by the _____________
Computer hardware Software End user People A
67 ______________ is used to controlling peripheral devices
such as disk drives and printers.
Hardware Operating system Control Unit ALU B
68 Which one is the operating system for minicomputer from
the following options.
DOS Windows UNIX MAC C
69 ______________ determine weather the appropriate main
memory and secondary storage capability what the user
require is available.
Data management Virtual storage Memory management Job management D
7/29/2019 Module-1 Question Paper to Pondy
6/12
S.No NAME Option 1 Option 2 Option 3 Option 4 Answe
70 ______________ manages the storage and retrieval of
data.
Job management Data management Virtual storage Memory
management
B
71 _______________ manages the allocation of main memory
to specific jobs.
Operating system Control Unit ALU CPU A
72 _______________ operating system enable several
processes to run concurrently.
Realtime Multiprocessing Multithreading Multitasking B
73 _______________ is the ability of an operating system to
execute different parts of a program simultaneously.
Realtime Multiprocessing Multithreading Multitasking C
74 _______________ operating system are the systems that
respond to input immediately.
Multiprocessing Multithreading Multitasking Realtime D
75 _______________ allows user to enter command bypointing and clicking at objects that appear on the screen.
CPU System software Graphical user interface System interface C
76 ______________ is used to manage your hard disk data. Memory management File system Operating system Data management B
77 Data is stored in ___________ on the hard disk. Sectors Path Memory Operating system A
78 We can allocate an individual sector to files. TRUE FALSE B
79 10GB disk partition has ___________ sectors 10,000,000 15,000,000 20,000,000 25,000,000 C
80 The information about clusters is stored in ________ . NTFS FTP Database FAT D
81 In NTFS we are having file-by-file compression. TRUE FALSE A
82 Files are stored virtually in every operating system is known
as ______________ .
Directory Directory tree Path Virtual storage B
83 The size of the file in __________. Mhertz Characters Bytes Integers C
7/29/2019 Module-1 Question Paper to Pondy
7/12
S.No NAME Option 1 Option 2 Option 3 Option 4 Answe
84 Maximum number of characters can be included for File
extension.
2 3 5 4 D
85 Within the root directory we can create more subdirectories. TRUE FALSE A
86 We cannot able to display partition information. TRUE FALSE B
87 To refresh your hard disk ___________ command we can
use.
Cleanup Compression Format Defragmentation C
88 When you are formatting your hard disk we must do
Partitioning.
TRUE FALSE A
89 The basic RAID levels includes ________ RAID levels. 5 4 7 6 D
90 ____________ is a computer program that is able to copy
all into other programs.
Computer hardware Computer viruses Archie Antivirus B
91 __________ are viruses which infect any executable
programs.
Boot sector infectors File system viruses File infectors cluster viruses C
92 Any files or systems that is executed and infected can be a
source of viruses
TRUE FALSE A
93 To decompress your files or folders, which command we
have to use from the following
decompress Compress Extract Add C
94 ____________ can convert a large file into a new one
containing brief descriptions of a original file's patterns.
Format Compression Converter Decompression B
95 ___________ format is the most common archive format. zip rar Archie pdf A
96 __________ consolidates fragmented files and folders on
your system's hard disk.
Compression Disk Defragmenter Formatting Restore B
7/29/2019 Module-1 Question Paper to Pondy
8/12
S.No NAME Option 1 Option 2 Option 3 Option 4 Answe
97 Acrobat reader software is used to open a ________ file
format.
htm pde pdf acr C
98 __________ file system is designed for security and
flexibility.
FAT NTFS Virtual File system UNIX/LINUX D
99 Which of the following files could not be opened in excel
____
text files Lotus 1-2-3 quattropro or xbase files class files D
100 In excel, the dates that are stored as sequential numbers
known as ___
serial values domain values range values reference values D
101 The command to display the current date in a cell is
_________________
=today() =date() =currentdate() none of the above A
102 In excel, absolute references are represented by a ________
before the column and row addresses
dollar sign ' = ' sign # sign none of the above A
103 The function that is used to calculate the payment for
specific loan terms ____________
sumif pmt countif none of the above B
104 The __________ option present in the file menu options is
used to specify major facts of the page to be printed
page setup print area print none of the above A
105 The process of finding or selecting information is known as
_________
filtering searching sorting none of the above A
106 In a chart X-axis is known as_______________ series or rank category legend data marker B
107 _________ are not allowed in a macro name spaces wild card characters symbols none of the above A
108 A ___________ is an excel file where the user stores his
data
Workbook Worksheet Spreadsheet none of the above A
109 Excel allows upto ______ levels of sorting two three N B
7/29/2019 Module-1 Question Paper to Pondy
9/12
S.No NAME Option 1 Option 2 Option 3 Option 4 Answe
110 If a cell shows #######, it means that _____. your formula has a
syntax error
the row is too short to
show the number at the
current font size
the column is too
narrow to show all the
di its of the number
either b or c C
111
A _________________ is one billionth of a second nanosecond picosecond gigasecond none of the above A112
______________ provides global connections for today's
computers LAN WAN MAN GAM B
113
ROM is also known as _____________ Samware Romware Firmware Germware C
114
The OS has to swap information back and forth between
RAM and the harddisk is called thrashing jumping shifting moving A
115
A pen is also called as ____________ in digitizing tablet. Light pen Mode Puck Stylus D
116
Another term for dot pitch is ______________ Phospher Pitch Bronze Pitch Metal Pitch None of the above A
117
Keyboard is also called as ___________ QWERTY ASDFGH ZXCVBN all the above A
118
_________ can be input into a computer using a digitalcamera Codes Images A or B A & B B
119
The _________ bar displays the name of the document. Name Status Title Tray icon C
120
A quick way to get to the page setup dialog box is to
__________ any gray portion of the ruler bar. Drag Triple click Click Double click D
121
In early word processor, we have to run ___________
program to print the document. Runner Formatter Editor Printer B122
A __________ is a single instruction that performs several
different commands in a sequence determined by the user. Mail Merge Template Macro None of the above C
7/29/2019 Module-1 Question Paper to Pondy
10/12
S.No NAME Option 1 Option 2 Option 3 Option 4 Answe
123 Microsoft visual basic project file has _______ file
extension.
.vbg .vbp .frm .frx B
124 In visual basic, _______ method is used to load picture
during runtime in an image control
load loadpicture addpicture none of the above B
125 In visual basic, using a data control, to navigate to the
previous record ________ method of a recordset object is
used.
movenext movelast moveprevious movefirst C
126 In visual basic, the explorer view of a project is displayed in
___________
properties window form layout window toolbox project explorer D
127 In visual basic, a timer event is only available in timer
control.
TRUE FALSE A
128
The "format columns" option allows to create columnar text
up 12 columns only. true false A
129
The user can split the screen only into two parts true false A
130
The feature that enables user to type anywhere in a
document without pressing or tab click-n-type double click drag & drop none of the above A
131 BBS stands for______ bulletin board system business broadcasting
system
bulletin broadcasting
system
none of the above A
132 WINSOCKS is expanded as______ windows socks windows sockets windows stocks none of the above B
133 The space used by Netscape to store the retrieved page is
called______
buffer cache built-in none of the above B
134 Internet can be defined as _______ internal network network of network intermediate network none of the above B
135 _______ maps IP addresses with the domain names of thesites
URL DNS FTP none of the above B
7/29/2019 Module-1 Question Paper to Pondy
11/12
S.No NAME Option 1 Option 2 Option 3 Option 4 Answe
136 URL stands for ____________ uniform research locator uniform resource locator unlimited restore locator none of the above A
137 USENET is a BBS on ____ scale small large very small none of the above B
138 The World Wide Web is referred to shortly as the _______ net web browser editor B
139 The web maps are called _______ list directories image list none of the above C
140 ________ is used to link pages in the world wide web universal resource
locator
uniform resource locator uniform resource label name of the above B
141 _____ is a program that helps us to log on to other networks yahoo ftp telnet none of the above C
142 WSIRC stands for______ wide search for
information and
research
windows sockets
internets relay chat
world search for
information and
research council
none of the above B
143 Web is a collection of ___________ web sites images applets documents A
144 _____ can be owed by multiple organisation LAN MAN WAN none of the above C
145 HTTP is the acronym for __________ Higher text transfer
protocol
Hyper text transmission
port
Hyper text transfer
protocol
Hyper text transfer
port
C
146 Which of the following statements is TRUE regarding
PowerPoint diagrams?
You can change the
appearance of a whole
diagram, but not
You can change both
the appearance of a
whole diagram and the
You cannot change the
style of the connecting
lines in an Organization
You cannot
change the color
of the boxes in an
B
147 Which of the following objects can contain custom animation
effects?
Clips Organization charts Text Clips, organization
charts, and text
D
148 PowerPoint's drawing toolbar contains _______ drawing
tools
10 12 102 22 B
7/29/2019 Module-1 Question Paper to Pondy
12/12
S.No NAME Option 1 Option 2 Option 3 Option 4 Answe
149 An example of the components of a multimedia presentation
could include
text, graphics and email
address.
text, hypertext and
Power Point.
CD-ROM, digital camera
and sound.
text, hypertext,
Power Point, video
and sound.
D
150 ______ determines the order in which order in which the
slides will be displayed during the show
slide show custom show both a and b none of the above B
Top Related