Operating System is the software that controls all the other software programs and allows to perform basic tasks.
Description : In the DBMS approach, application programs perform the (A) storage function (B) processing functions (C) access control (D) all of these
Last Answer : In the DBMS approach, application programs perform the (A) storage function (B) processing functions (C) access control (D) all of these
Description : ____ is a set of instructions, also called a program that tells a computer how to perform tasks. a) Hardware b) Software c) Both (a) and (b) d) None of the above
Last Answer : a and b because you need a keyboard or something that's hardware to get code flowing which is software
Description : An auditor is required to obtain a basic understanding of the client's internal control to plan the audit. The auditor may then decide to perform tests of controls on all internal control ... to be strengths for which the auditor desires further reduction in the assessed level of control risk.
Last Answer : Considered to be strengths for which the auditor desires further reduction in the assessed level of control risk.
Description : Of the following, ____ is not a computer language. a) MS-Word b) C++ c) COBOL d) BASIC
Last Answer : Of the following, ____ is not a computer language. a) MS-Word b) C++ c) COBOL d) BASIC
Description : The set of programs designed to perform user specific tasks is called application software. -Technology
Last Answer : TrueApplication software refers to the programs that perform operations for a specified task of a user.
Description : Programs designed to perform specific tasks is known as A) system software B) application software C) utility programs D) operating system
Last Answer : Answer : B
Description : programs designed to perform specific tasks is known as a. system software b. application software c. utility programs d. operating system
Last Answer : application software
Last Answer : c. utility programs
Last Answer : b. application software
Description : Software refers to ____ A. firmware B. physical components that a computer is made of C. programs D. None of the above
Last Answer : C. programs
Description : ____ software creates a mirror image of the entire hard disk, including the operating system, applications, files and data. a) Operating system b) Backup software c) Utility programs d) Driver imaging e) None of these
Last Answer : b) Backup software
Description : In the planning stage of an audit engagement, the auditor is required to perform audit procedures to obtain an understanding of the entity and its environment, including its internal control. These ... a. Substantive tests b. Tests of controls c. Risk assessment procedures d. Dual-purpose tests
Last Answer : Risk assessment procedures
Description : A 20-bit address bus allows access to a memory of capacity (1) 1 Mb (2) 2 Mb (3) 32 Mb (4) 64 Mb
Last Answer : 1MB
Description : Choose the correct remarks. (1) C++ allows any operator to be overloaded (2) Some of the existing operators can’t be overloaded (3) Operator precedence can be changed (4) All of these
Last Answer : D
Description : Insulators perform which of the following functions? a) Conduction b) Convection c) Provide electrical insulation d) Allows current leakage at interfaces
Last Answer : c) Provide electrical insulation
Description : Which of the following statements is a standard applicable to financial statement audits in accordance with Government Auditing Standards? a. An auditor should briefly describe in the auditor's ... whether the entity has reportable measures of economy and efficiency that are valid and reliable.
Last Answer : An auditor should report on the scope of the auditor's testing of internal control.
Description : Active X controls are Pentium binary programs that can be embedded in ............... (A) Word pages (B) URL pages (C) Script pages (D) Web pages
Last Answer : (D) Web pages
Description : A combination of equipment and controls which handles, stores and retrieves materials withprecision,accuracy and speed under a defined degree of automation is known as ____ a.Automated storage and retrieval system (AS/RS) b.Flexible manufacturing system c.Automated guided vehicle d.None of the above
Last Answer : a.Automated storage and retrieval system (AS/RS)
Description : ____ sensor is used for automatic door controls, automatic parking system, automated sinks, automated toilet flushers, hand dryers. A. Smoke Sensor B. Temperature Sensor C. IR Sensor D. Motion Sensor
Last Answer : D. Motion Sensor
Description : The time_sharing operating system allows multiple programs share the computer resources simultaneously. -Technology
Last Answer : TrueIn time-sharing OS, a small amount of time is allocated for the processing simultaneously.
Description : The use of spooler programs and/or “. Hardware allows personal computer operators to do the processing work at the same time a printing operation is in progress a. Registered mails b. Memory c. CPU d. Buffer
Last Answer : Buffer
Description : The use of spooler programs and/or …. Hardware allows personal computer operators to do the processing work at the same time a printing operation is in progress a. Registered mails b. Memory c. CPU d. Buffer
Last Answer : d. Buffer
Description : ____ is known as a computer network in which one centralized, powerful computer is a hub to which many less powerful personal computers or workstations are connected. The clients run programs and access data that ... server. a) Client-Server network b) Extranet c) Internet d) None of the above.
Last Answer : Client-Server network is known as a computer network in which one centralized, powerful computer is a hub to which many less powerful personal computers or workstations are connected. The clients run programs and access data that stored on the server.
Description : Of the following, ____ would be considered as a way through which a computer virus can enter into a computer system. a) E-mail with attachments b) Downloading the data from sites c) Operating the system without antivirus software d) All of the above
Last Answer : Of the following, ____ would be considered as a way through which a computer virus can enter into a computer system. a) E-mail with attachments b) Downloading the data from sites c) Operating the system without antivirus software d) All of the above
Description : Nano Second is the ____. a) Millionths of a second b) Billionths of a second c) Trillionth of a second d) Thousands of a second
Last Answer : Nano Second is the Billionths of a second
Description : The device that is used to read bar codes is ____. a) OMR b) Barcode c) MICR d) OCR
Last Answer : The device that is used to read bar codes is Barcode
Description : ____ are the examples of pointing devices. a) Electronic Mouse b) Pointing Stick c)Track ball d) All of the above
Last Answer : ____ are the examples of pointing devices. a) Electronic Mouse b) Pointing Stick c)Track ball d) All of the above
Description : ____ is known as unauthorized access to the system. a) Decryption b) Encryption c) Hacking d) None of the above
Last Answer : Hacking is known as unauthorized access to the system.
Description : ____ is known as allowing the authorized access to information. a) Decryption b) Encryption c) Hacking d) None of the above
Last Answer : Decryption is known as allowing the authorized access to information.
Description : ____ is known as restricting the access to information. a) Decryption b) Encryption c) Hacking d) None of the above
Last Answer : Encryption is known as restricting the access to information.
Description : A collection of related records in a database ____. a) Field b) File c) Both (a) and (b) d) None of the above
Last Answer : A collection of related records in a database File
Description : Of the following, ____ is different from the group. a) Windows b) MS-Word c) MS-Excel d) MS-PowerPoint
Last Answer : Of the following, ____ is different from the group. a) Windows b) MS-Word c) MS-Excel d) MS-PowerPoint
Description : The computer code for interchange of information between terminals is ____. a) ASCII b) ACSII c) ASICI d) ASIIC
Last Answer : The computer code for interchange of information between terminals is ASCII.
Description : Web address is a unique address to identify ____ on web. a) Browser b) Website c) Link d) All of the above
Last Answer : Web address is a unique address to identify Website on web.
Description : False () function ____. a) Returns the logical value of false b) Returns the logical value of true c) Returns the actual value d) None of the above
Last Answer : False () function ____. a) Returns the logical value of false b) Returns the logical value of true c) Returns the actual value d) None of the above
Description : Without the symbol '=' excel will treat the data as ____. a) Number b) Formula c) Text d) None of the above
Last Answer : Without the symbol '=' excel will treat the data as Text.
Description : Which of the following is correct ____. a) Frequency (data-array, bins array) b) Frequency (data, bins) c) Frequency (data, bins array) d) Frequency (array, bins array)
Last Answer : Which of the following is correct ____. a) Frequency (data-array, bins array) b) Frequency (data, bins) c) Frequency (data, bins array) d) Frequency (array, bins array)
Description : Of the following is correct syntax in excel ____? a) REPLACE (old-text, num-chars, Start-num, New-text) b) REPLACE (old-text, Start-num, num-chars, New-text) c) REPLACE (old-text, New-text, num-chars, Start-num) d) REPLACE (num-chars, Start-num, old-text, New-text)
Last Answer : Of the following is correct syntax in excel REPLACE (old-text, Start-num, num-chars, New-text)
Description : Among the following ____ is a logical function. a) Average b) Count c) ABS d) AND
Last Answer : Among the following AND is a logical function.
Description : What is the shortcut key to display the 'save as' dialog box ____. a) F8 b) F12 c) F11 d) F9
Last Answer : What is the shortcut key to display the 'save as' dialog box F12.
Description : To find text, formatting and special items ____ is the keyboard short key. a) Ctrl+g b) Ctrl+h c) Ctrl+f d) Ctrl+a
Last Answer : To find text, formatting and special items Ctrl+f is the keyboard short key.
Description : In a table to move to the first cell in a row, ____ is the keyboard shortcut key. a) Alt+Tab b) Alt+Shift c) Alt+Ctrl d) Alt+Home
Last Answer : In a table to move to the first cell in a row, Alt+Home is the keyboard shortcut key.
Description : What is the keyboard shortcut key to merge a document ____. a) Alt+Shift+N b) Alt+Shift+O c) Alt+Shift+P d) Alt+Shift+Q
Last Answer : What is the keyboard shortcut key to merge a document Alt+Shift+N.
Description : After copying the content, how many times can you paste ____. a) Only one time b) Two times c) Three times d) Many times
Last Answer : After copying the content, how many times can you paste Many times.
Description : The smallest unit of computerized data is referred as ____. a) Bit b) Byte c) Both (a) and (b) d) None of the above
Last Answer : The smallest unit of computerized data is referred as Bit.
Description : Information that a computer produces and delivers back to the user is known as ____. a) Input b) Output c) Both (a) and (b) d) None of the above
Last Answer : Information that a computer produces and delivers back to the user is known as Output.
Description : Information that is entered into a computer is called as ____. a) Input b) Output c) Both (a) and (b) d) None of the above
Last Answer : Information that is entered into a computer is called as Input.
Description : The following ____ is termed as permanent memory. a) Random Access Memory b) Read Only Memory c) Flash Memory d) Cache Memory
Last Answer : The following Read Only Memory is termed as permanent memory.