BCA

MS Office MCQ :- Part Five

  1. To start Microsoft PowerPoint application

A) Click on Start >> Programs >> All Programs >> Microsoft PowerPoint
B) Hit Ctrl + R then type ppoint.exe and Enter
C) Click Start >> Run then type powerpoint then press Enter
D) All of above

Correct Answer: (C) Click Start >> Run then type power point then press Enter

2. Which menu provides you options like Animation Scheme, custom Animation, Slide Transition?

A) Insert Menu
B) Format Menu
C) Tools Menu
D) Slide Show Menu

Correct Answer: (D) Slide Show Menu

3. In which menu can you find features like Slide Design, Slide Layout etc.?

A) Insert Menu
B) Format Menu
C) Tools Menu
D) Slide Show Menu

Correct Answer: (B) Format Menu

4. The selected design template can be applied

A) To current slide only
B) To all the slides
C) To all the new presentation you create
D) All of above

Correct Answer: (D) All of above

5. What feature will you use to apply motion effects in between a slide exits and another enters?

A) Slide Transition
B) Slide Design
C) Animation Objects
D) Animation Scheme

Correct Answer: (A) Slide Transition

6. What PowerPoint feature will you use to apply motion effects to different objects of a slide?

A) Slide Transition
B) Slide Design
C) Animation Objects
D) Animation Scheme

Correct Answer: (D) Animation Scheme

7. Which command will you use in PowerPoint if you need to change the color of different objects without changing content?

A) Design Template
B) Color Scheme
C) Font Color
D) Object Color

Correct Answer: (B) Color Scheme

8. Which short cut key inserts a new slide in current presentation

A) Ctrl+N
B) Ctrl+M
C) Ctrl+S
D) All of above

Correct Answer: (B) Ctrl+M

9. To start slide show of a presentation

A) Hit F5 key
B) From Slide Show menu choose View Show option
C) From Slide Show menu choose Rehearse timing
D) Both a & b

Correct Answer: (D) Both a & b

10. If you select Insert >> Picture >> From File

A) You can insert pictures and clip Arts
B) You can insert clip Arts only
C) You can insert pictures only
D) None of above

Correct Answer: (C) You can insert pictures only

11. Which of the following font effect is not available in PowerPoint Font dialog box?

A) Underline
B) Shadow
C) Emboss
D) Strikethrough

Correct Answer: (D) Strikethrough

12. To insert a hyperlink in a slide

A) Choose Insert >> Hyperlink
B) Press Ctrl + K
C) Hyperlinks can’t be inserted in slides
D) Both a & b

Correct Answer: (D) Both a & b

13. In a PowerPoint presentation

A) Sound clips can be inserted but not movie clips
B) Movie clips can be inserted but not sound clips
C) Both cannot be inserted
D) Both can be inserted

Correct Answer: (D) Both can be inserted

14. To insert slide numbers

A) Insert a text box and select Insert >> Page Number
B) Insert a textbox and select Insert >> Number >> Page Number
C) Choose Insert >> Slide Number
D) Insert a new text box and select Insert >> slide Number

Correct Answer: (D) Insert a new text box and select Insert >> slide Number

15. What are the three options available in Insert >> Picture menu?

A) Clipart, Pictures, Shapes
B) Clipart, From File, Shapes
C) Clipart, From Files, AutoShapes
D) Clipart, Pictures, AutoShapes

Correct Answer: (C) Clipart, From Files, AutoShape

16. From which menu you can access Picture, Test Box, Chart etc.?

A) File
B) Edit
C) Insert
D) View

Correct Answer: (C) Insert

17. Which of the following is not a part of Slide Design ?

A) Design Template
B) Color Scheme
C) Animation Scheme
D) Slide Layout

Correct Answer: (D) Slide Layout

18. What is the term used when a clip art image changes the direction of faces?

A) Group
B) Flip
C) Rotate
D) All of the above

Correct Answer: (C) Rotate

19. The slide that is used to introduce a topic and set the tone for the presentation is called the

A) table slide
B) graph slide
C) bullet slide
D) title slide

Correct Answer: (D) title slide

20. Which of the following features should you use when typing in the notes text box?

A) Slide show
B) Insert
C) Slide maser
D) Zoom

Correct Answer: (D) Zoom

21. Which command brings you to the first slide in your presentation?

A) Next slide button
B) Page up
C) Ctrl + Home
D) Ctrl + End

Correct Answer: (C) Ctrl + Home

22. You can show the shortcut menu during the slide show by

A) Clicking the shortcut button on the formatting toolbar
B) Right clicking the current slide
C) Clicking an icon on the current slide
D) a and b

Correct Answer: (B) Right clicking the current slide

23. Auto clipart is a feature that

A) Automatically places clipart in your presentation
B) Scans your presentation for incorrect spelling in your words on each slide
C) Scans your presentation for incorrect spelling in Word Arts objects
D) All of above

Correct Answer: (D) All of above

24. The view that displays the slides on a presentation as miniature representations of the slides is called

A) slide show
B) slide sorter view
C) notes page view
D) outline view

Correct Answer: (B) slide sorter view

25. Which of the following provides a printed copy of your presentation?

A) Outline
B) Speaker notes
C) Audience handouts
D) All of the above

Correct Answer: (C) Audience handouts

26. When using PowerPoint, to play a PowerPoint show for previewing the show, select

A) View, slide sorter
B) View, slide
C) View, slide show
D) View outline

Correct Answer: (C) View, slide show

27. To select all the boxes of an organization chart

A) Click edit, select all
B) Right click the chart background click select all
C) Press and hold the shift key and click each box
D) All of the above

Correct Answer: (D) All of the above

28. Which of the following should e used when you want to add a slide to an existing presentation?

A) File, add a new slide
B) Insert, new slide
C) File, open
D) File, new

Correct Answer: (D) File, new

29. Which key deletes text before, or the left of, the insertion point?

A) Backspace
B) Page up
C) Delete
D) Page down

Correct Answer: (A) Backspace

30. Microsoft PowerPoint is a

A) Database program
B) Spreadsheet program
C) Presentation program
D) Word processing program

Correct Answer: (C) Presentation program

MS Office MCQ :- Part Four

  1. To edit in an embedded excel worksheet object in a word document

a. Use the excel menu bar and toolbars inside the word application
b. Edit the hyperlink
c. Edit the data in a excel source application
d. Use the word menu bar and toolbars

Correct Answer: (a) Use the excel menu bar and toolbars inside the word application

2. To create a formula, you can use:

a. Values but not cell references
b. C ell references but not values
c. Values or cell references although not both at the same time
d. Value and cell references

Correct Answer: (d) Value and cell references

3. Status indicators are located on the

a. Vertical scroll bar
b. Horizontal scroll bar
c. Formula bar
d. Standard to

Correct Answer: (c) Formula bar

4. An excel workbook is a collection of

a. Workbooks
b. Worksheets
c. Charts
d. Worksheets and charts

Correct Answer: (d) Worksheets and charts

5 Excel files have a default extension of

a. Xls
b. Xlw
c. Wk1
d. 123

Correct Answer: (a) Xls

6. Except for the …… function, a formula with a logical function shows the word “TRUE” or “FALSE” as a result

a. IF
b. AND
c. OR
d. NOT

Correct Answer: (a) IF

7. Macros are “run” or executed from the ….. menu

a. Insert
b. Format
c. Tools
d. Data

Correct Answer: (c) Tools

8. You can open the consolidate dialog box byt choosing Consolidate from the ….. menu

a. Insert
b. Format
c. Tools
d. Data

Correct Answer: (d) Data

9. How are data organized in a spreadsheet?

a. Lines and spaces
b. Layers and planes
c. Rows and columns
d. Height and width

Correct Answer: (c) Rows and columns

10. Gridlines

a. May be turned off for display but turned on for printing
b. May be turned on or off for printing
c. The be turned off for display and printing
d. a, b and c

Correct Answer: (d) a, b and c

11. A function inside another function is called a ….. function

a. Nested
b. Round
c. Sum
d. Text

Correct Answer: (a) Nested

12. Which function calculates your monthly mortgage payment?

a. PMT (payments)
b. NPER (number of periods)
c. PV (present value)
d. All of above

Correct Answer: (a) PMT (payments)

13. To drag a selected range of data to another worksheet in the same workbook, use the

a. Tab key
b. Alt key
c. Shift key
d. Ctrl key

Correct Answer: (d) Ctrl key

14. When the formula bar is activated, you can see

a. The Edit Formula button
b. The Cancel button
c. The Enter button
d. All of above

Correct Answer: (d) All of above

15. Which file format can be added to a PowerPoint show?

a. .jpg
b. .giv
c. .wav
d. All of the above

Correct Answer: (d) All of the above

Material consisting of text and numbers is best presented as

a. A table slide
b. A bullet slide
c. A title slide
d. All of the above

Correct Answer: (a) A table slide

17. In order to edit a chart, you can

a. Triple click the chart object
b. Click and drag the chart object
c. Double click the chart object
d. Click the chart object

Correct Answer: (c) Double click the chart object

18. to exit the PowerPoint

a. click the application minimize button
b. click the document close button
c. double click the applications control menu icon
d. double click the document control menu icon

Correct Answer: (c) double click the applications control menu icon

19. To select one hyperlink after another during a slide presentation, what do you press?

a. Tab
b. Ctrl + K
c. Ctrl + h
d. All of above

Correct Answer: (a) Tab

20. special effects used to introduce slides in a presentation are called

a. effects
b. custom animations
c. transitions
d. present animations

Correct Answer: (c) transitions

21. What is the term used when you press and hold the left mouse key and more the mouse around the slide?

a. Highlighting
b. Dragging
c. Selecting
d. Moving

Correct Answer: (b) Dragging

22. To give a PowerPoint presentation to a large audience, you:

a. Set up your computer in a large auditorium, and click large, auditorium, OK
b. Click the slide you wish the audience to see in normal view, then click the next slide, and so on.
c. Choose either view, slide show or slide show, view show
d. Slick slide show, OK

Correct Answer: (c) Choose either view, slide show or slide show, view show

23. Which of the following can you use to add times to the slides in a presentation

a. Slice Show menu
b. Rehearse timing button
c. Slide transition button
d. All of the above

Correct Answer: (b) Rehearse timing button

24. Which of the following is not one of PowerPoint’s views?

a. Slide show view
b. Slide view
c. Presentation view
d. Outline view

Correct Answer: (c) Presentation view

25. Which PowerPoint view works best for adding slide transitions?

a. Slide show view
b. Slide sorter view
c. Slide view
d. Notes view

Correct Answer: (b) Slide sorter view

26. Which of the following views is the best view to use when setting transition effects for all slides in a presentation

a. Slide sorter view
b. Notes page view
c. Slide view
d. Outline view

Correct Answer: (a) Slide sorter view

27. Which option can be used to set custom timings for slides in a presentation?

a. Slider Timings
b. Slider Timer
c. Rehearsal
d. Slide Show Setup

Correct Answer: (c) Rehearsal

28. Which of the following will not advance the slides in a slide show view?

a. The esc key
b. The space bar
c. The enter key
d. The mouse button

Correct Answer: (a) The esc key

29. The quickest way to create a PowerPoint presentation is to use the

a. Word for windows templates
b. Auto creation wizard
c. Auto content wizard
d. Presentation wizard

Correct Answer: (c) Auto content wizard

30. Which of the following can you format using buttons on the formatting toolbar?

a. Your hard drive
b. Format painting
c. Font color
d. Underlining

Correct Answer: (d) Underlining

MS Office MCQ:- Part Three

  1. When working in the page break preview, you can

A) view exactly where each page break occurs
B) add or remove page breaks
C) change the print area
D) all of above

Correct Answer: (D) all of above

2. Which of the following is not a valid Zoom percentage in Excel?

A) 10
B) 100
C) 300
D) 500

Correct Answer: (D) 500

3. The spelling tool is placed on __ toolbar

A) Standard
B) Formatting
C) Drawing
D) Reviewing

Correct Answer: (A) Standard

4. Formatting a cell in Currency, you can specify

A) Decimal Places
B) Currency Symbol
C) Both of above
D) None of above

Correct Answer: (C) Both of above

4a. Formatting a cell in Number format you can’t set

A) Decimal Places
B) Use 1000 separator
C) Negative numbers
D) Currency Symbol

Correct Answer: (D) Currency Symbol

5. What is entered by the function =today()

A) The date value for the day according to system clock
B) The time value according to system clock
C) Today’s date as Text format
D) All of above

Correct Answer: (A) The date value for the day according to system clock

6. Which function will you use to enter current time in a worksheet cell?

A) =today()
B) =now()
C) =time()
D) =current Time()

Correct Answer: (B) =now()

7. Merge cells option can be applied from

A) Format Cells dialog box Alignment Tab
B) Formatting toolbar
C) Both of above
D) None of above

Correct Answer: (A) ) Format Cells dialog box Alignment Tab

8. Which of the following format you can decide to apply or not in AutoFormat dialog box?

A) Number format
B) Border format
C)
Font format
D) All of above

Correct Answer: (D) All of above

9. How can you remove borders applied in cells?

A) Choose None on Border tab of Format cells
B) Open the list on Border tool in Formatting toolbar then choose first tool (no border)
C) Both of above
D) None of above

Correct Answer: (C) Both of above

10. You can set Page Border in Excel from

A) From Border tab in Format Cells dialog box
B) From Border tool in Formatting toolbar
C) From Line Style tool in Drawing toolbar
D) You can not set page border in Excel

Correct Answer: (D) You can not set page border in Excel

11. You can check the conditions against __ when applying conditional formatting

A) Cell value
B) Formula
C) Both of above
D) None of above

Correct Answer: (C) Both of above

12. When a range is selected, how can you activate the previous cell?

A) Press the Alt key
B) Press Tab
C) Press Enter
D) None of above

Correct Answer: (D) None of above

13. Each excel file is a workbook that contains different sheets. Which of the following can not be a sheet in workbook?

A) work sheet
B) chart sheet
C) module sheet
D) data sheet

Correct Answer: (D) data sheet

14. Which of the following Excel screen components can NOT be turned on or off?

A) Formula Bar
B) Status Bar
C) Tool Bar
D) None of above

Correct Answer: (D) None of above

15. Which of the following option is not available in Paste Special dialog box?

A) Add
B) Subtract
C) Divide
D) SQRT

Correct Answer: (D) SQRT

16. Which of the cell pointer indicates that you can fill series?

A) Doctor’s symbol (Big Plus)
B) small thin plus icon
C) Mouse Pointer with anchor at the tip
D) None of above

Correct Answer: (C) Mouse Pointer with anchor at the tip

17. Which of the following is an absolute cell reference?

A) !A!1
B) $A$1
C) #a#1
D) A1

Correct Answer: (B) $A$1

18. Which symbol must all formula begin with?

A) =
B) +
C) (
D) @

Correct Answer: (A) =

19. Which of the following formulas is not entered correctly?

A) =10+50
B) =B7*B1
C) =B7+14
D) 10+50

Correct Answer: (D) 10+50

20. Which of the following formulas will Excel Not be able to calculate?

A) =SUM(Sales)-A3
B) =SUM(A1:A5)*.5
C) =SUM(A1:A5)/(10-10)
D) =SUM(A1:A5)-10

Correct Answer: (A) =SUM(Sales)-A3

21. ,A worksheet range is a

A) A command used for data modeling
B) A range of values such as from 23 to 234
C) A group of cells
D) A group of worksheets

Correct Answer: (C) A group of cells

22. The auto calculate feature

A) Can only add values in a range of cells
B) Provides a quick way to view the result of an arithmetic operation on a range of cells
C)
Automatically creates formulas and adds them to a worksheet
D) A and c

Correct Answer: (B) Provides a quick way to view the result of an arithmetic operation on a range of cells

23. Excel uniquely identifies cells within a worksheet with a cell name

A) Cell names
B) Column numbers and row letters
C) Column letters and row numbers
D) Cell locator coordinates

Correct Answer: (C) Column letters and row numbers

24. To drag a selected range of data to another worksheet in the same workbook, use the

A) Tab key
B) Alt key
C) Shift key
D) Ctrl key

Correct Answer: (D) Ctrl key

25. Hyperlinks can be

A) Text
B) Drawing objects
C) Pictures
D) All of above

Correct Answer: (D) All of above

26. To activate the previous cell in a pre-selected range, press

A) The Alt key
B) The Tab key
C) The Enter key
D) None of the above

Correct Answer: (D) None of the above

27. Which button do you click to add up a series of numbers?

A) The autosome button
B) The Formula button
C) The quick total button
D) The total button

Correct Answer: (A) The autosome button

28. When the formula bar is active, you can see

A) The edit formula button
B) The cancel button
C) The enter button
D) All of the above

Correct Answer: (D) All of the above

29. In a worksheet you can select

A) The entire worksheet
B) Rows
C) Columns
D) All of the above

Correct Answer: (B) Rows

30. Which area in an excel window allows entering values and formulas

A) Title bar
B) Menu bar
C) Formula bar
D) Standard toolbar

Correct Answer: (C) Formula bar

MS Office MCQ:- Part Two

  1. Which of the following is not a type of page margin?

A) Left
B) Right
C) Center
D) Top

Correct Answer: (C) Center

2. What is the default left margin in Word 2003 document?

A) 1″
B) 1.25″
C) 1.5″
D) 2″

Correct Answer: (B) 1.25″

3. Portrait and Landscape are

A) Page Orientation
B) Paper Size
C) Page Layout
D) All of above

Correct Answer: (A) Page Orientation

4. If you need to change the typeface of a document, which menu will you choose?

A) Edit
B) View
C) Format
D) Tools

Correct Answer: (C) Format

5. Which of the following is not a font style?

A) Bold
B) Italics
C) Regular
D) Superscript

Correct Answer: (D) Superscript

6. What happens when you click on Insert >> Picture >> Clip Art

A) It inserts a clipart picture into document
B) It lets you choose clipart to insert into document
C) It opens Clip Art taskbar
D) None of above

Correct Answer: (C) It opens Clip Art taskbar

7. Which option is not available in Insert Table Autofit behavior?

A) Fixed Column Width
B) AutoFit to Contents
C) Autofit to Window
D) Autofit to Column

Correct Answer: (D) Autofit to Column

8. To autofit the width of column

A) Double click the right border of column
B) Double click the left border of column
C)
Double click the column header
D) All of above

Correct Answer: (A) Double click the right border of column

9. Which of the following statement is false?

A) You can set different header footer for even and odd pages
B) You can set different page number formats for different sections
C) You can set different header footer for first page of a section
D) You can set different header and footer for last page of a section

Correct Answer: (D)You can set different header and footer for last page of a section

10. Where can you change the vertical alignment?

A) Formatting toolbar
B) Paragraph dialog box
C) Page Setup dialog box
D) Standard toolbar

Correct Answer: (C) Page Setup dialog box

11. AutoCorrect was originally designed to replace _ words as you type

A) Short, repetitive
B) Grammatically incorrect
C) Misspelled
D) None of the above

Correct Answer: (C) Misspelled

12. Which of the following is the second step in creating a macro?

A) Start recording
B) Using your mouse or keyboard, perform the task you want to automate
C) Assign a keyboard shortcut to the macro
D) Give the macro a name

Correct Answer: (C) Assign a keyboard shortcut to the macro

13. In Word, the mailing list is known as the __.

A) Data sheet
B) Source
C) Data source
D) Sheet

Correct Answer: (C) Data source

14. Which of the following is not one of the three ‘Mail Merge Helper’ steps?

A) Merge the two files
B) Create the main document
C)
Set the mailing list parameters
D) Create the data source

Correct Answer: (C) Set the mailing list parameters

15. Which of the following button will allow you to add, delete, or change records in your Data Source?

A) ‘Data Source’ button
B) ‘Edit’ button
C) ‘Edit Data Source’ button
D) ‘Data editing’ button

Correct Answer: (C) ‘Edit Data Source’ button

16. It is possible to _ a data source before performing a merge

A) Create
B) Modify
C) Sort
D) all of the above

Correct Answer: (D) all of the above

17. Comments can be added to cells using …..

A) Edit -> Comments
B) Insert -> Comment
C) File -> Comments
D) View –> Comments

Correct Answer: (B) Insert -> Comment

18. Which of the following is not a valid Zoom percentage in Excel?

A) 10
B) 100
C) 300
D) 500

Correct Answer: (D) 500

19. The spelling tool is placed on __ toolbar

A) Standard
B) Formatting
C) Drawing
D) Reviewing

Correct Answer: (A) Standard

20. Which of the following is not a valid data type in Excel?

A) Number
B) Character
C) Label
D) Date/Time

Correct Answer: (B) Character

21. Comments put in cells are called …..

A) Smart Tip
B) Cell Tip
C) Web Tip
D) Soft Tip

Correct Answer: (B) Cell Tip

22. Which menu option can be used to split windows into two?

A) Format -> Window
B) View -> Window-> Split
C) Window -> Split
D) View –> Split

Correct Answer: (C) Window -> Split

23. You can activate a cell by

A) Pressing the Tab key
B) Clicking the cell
C) Pressing an arrow key
D) All of above

Correct Answer: (D) All of above

24. When you use the fill effects in the format data series dialog box, you can not

A) rotate text on the chart
B) select a fore ground color
C) select a pattern
D) select a background color

Correct Answer: (A) rotate text on the chart

25. To insert three columns between columns D and E you would

A) Select column D
B) Select column E
C) Select columns E, F and G
D) Select columns D, E, and F.

Correct Answer: (B) Select column E

26. Hyperlinks cannot be

A) Special shapes like stars and banners
B) Drawing objects like rectangles ovals
C) Pictures
D) All can be hyperlinks

Correct Answer: (D) All can be hyperlinks

27. You can add an image to a template by clicking the Insert Picture From File button on the …. Toolbar

A) Standard
B) Formatting
C) Drawing
D) Picture

Correct Answer: (D) Picture

28. To drag a selected range of data to another worksheet in the same workbook, use the

A) Tab key
B) Alt key
C) Shift key
D) Ctrl key

Correct Answer: (D) Ctrl key

29. When you print preview a worksheet

A) the entire worksheet is displayed
B) the selected range is displayed
C) the active portion of the worksheet is displayed
D) a, b and c

Correct Answer: (D)a, b and c

30. You can open the Sort dialog box by choosing Sort from the ….. menu

A) View
B) Format
C) Tools
D) Data

Correct Answer: (D) Data

MS Office MCQ:- Part One

  1. From which menu you can insert Header and Footer?

A) Insert Menu
B) View Menu
C) Format menu
D) Tools Menu

Correct Answer: A. Insert Menu

2. To get to the ‘Symbol’ dialog box, click on the __ menu and choose ‘Symbol’.

A) Insert
B) Format
C) Tools
D) Table

Correct Answer: A. Insert

3. _______ option from clipboard is used to move data from one place to another in a document

A) Copy & Paste
B) Cut & Paste
C) Bold
D) Justify

Correct Answer: B. Cut & Paste

4. _____ is an option in Font Group.

A) Strikethrough
B) Find
C) Replace
D) Change Styles

Correct Answer: A. Strikethrough

5. Name the button in the picture?

A) Font Color
B) Fill Color
C) Page Color
D) Highlighter tool

Correct Answer: D. Highlighter tool

6. Shortcut for document views toolbar is situated in __ bar

A) Task bar
B) Status bar
C) Tool bar
D) Title bar

Correct Answer: B. Status bar

7. Bullets and Numbering is in _ tab.

A) Home tab
B) Insert tab
C) Page layout tab
D) View tab

Correct Answer: A. Home tab

8. To open a existing document, click on the __ and then select Open

A) MS Office button
B) Quick Access Toolbar
C) Document Views
D) Ribbon

Correct Answer: A. MS Office button

9. Cut, Copy and Paste is in __ Group in the Home tab.

A) Font
B) Page Setup
C) Clipboard
D) Editing

Correct Answer: C. Clipboard

10. ____ is used to covert from upper case to lower case and vice versa

A) Toggle case
B) Sentence case
C) Lower case
D) Upper case

Correct Answer: A. Toggle case

11. Pressing F8 key for three times selects

A) A word
B) A sentence
C) A paragraph
D) Entire document

Correct Answer: B. A sentence

12. What is the shortcut key you can press to create a copyright symbol?

A) Alt+Ctrl+C
B) Alt + C
C) Ctrl + C
D) Ctrl + Shift + C

Correct Answer: A. Alt+Ctrl+C

13. What is the smallest and largest font size available in Font Size tool on formatting toolbar?

A) 8 and 72
B) 8 and 64
C) 12 and 72
D) None of above

Correct Answer: A. 8 and 72

14. Which of the following is graphics solution for Word Processors?

A) Clipart
B) WordArt
C) Drop Cap
D) All of above

Correct Answer: A. Clipart

15. The keystrokes Ctrl + I is used to

A) Increase font size
B) Inserts a line break
C) Indicate the text should be bold
D) Applies italic format to selected text

Correct Answer: D. Applies italic format to selected text

16. A character that is raised and smaller above the baseline is known as

A) Outlined
B) Raised
C) Superscript
D) Subscript

Correct Answer: C. Superscript

17. Thesaurus tool in MS Word is used for

A) Spelling suggestions
B) Grammar options
C) Synonyms and Antonyms words
D) All of above

Correct Answer: C. Synonyms and Antonyms words

18, Why Drop Caps are used in document?

A) To drop all the capital letters
B) To automatically begin each paragraph with capital letter
C) To begin a paragraph with a large dropped initial capital letter
D) None of above

Correct Answer: C. To begin a paragraph with a large dropped initial capital letter

19. A bookmark is an item or location in document that you identify as a name for future reference. Which of the following task is accomplished by using bookmarks?

A) To add anchors in web page
B) To mark the ending of a paragraph of document
C) To quickly jump to specific location in document
D) To add hyperlinks in webpage

Correct Answer: C. To quickly jump to specific location in document

20. Which of the following is not valid version of MS Office?

A) Office XP
B) Office Vista
C) Office 2007
D) None of above

Correct Answer: B. Office Vista

21. You cannot close MS Word application by

A) Choosing File menu then Exit submenu
B) Press Alt+F4
C) Click X button on title bar
D) From File menu choose Close submenu

Correct Answer: D. From File menu choose Close submenu

22. The key F12 opens a

A) Save As dialog box
B) Open dialog box
C) Save dialog box
D) Close dialog box

Correct Answer: A. Save As dialog box

23. What is the short cut key to open the Open dialog box?

A) F12
B) Shift F12
C) Alt + F12
D) Ctrl + F12

Correct Answer: D. Ctrl + F12

24. A feature of MS Word that saves the document automatically after certain interval is available on

A) Save tab on Options dialog box
B) Save As dialog box
C) Both of above
D) None of above

Correct Answer: A. Save tab on Options dialog box

25. Which of the following is not available on the Ruler of MS Word screen?

A) Tab stop box
B) Left Indent
C) Right Indent
D) Center Indent
E) All of them are available on ruler

Correct Answer: D. Center Indent

26. Which file starts MS Word?

A) Winword.exe
B) Word.exe
C) Msword.exe
D) Word2003.exe

Correct Answer: A. Winword.exe

27. If you want to keep track of different editions of a document which features will you use?

A) Editions
B) Versions
C) Track Change
D) All of above

Correct Answer: B. Versions

28. Background color or effects applied on a document is not visible in

A) Web layout view
B) Print Layout view
C) Reading View
D) Print Preview

Correct Answer: D. Print Preview

29. What is a portion of a document in which you set certain page formatting options?

A) Page
B) Document
C) Section
D) Page Setup

Correct Answer: C. Section

30. Borders can be applied to

A) Cells
B) Paragraph
C) Text
D) All of above

Correct Answer: D. All of above

E‐Commerce MCQ:- Part Seven

  1. Which one is not an offline payment mode?

a. Cash on delivery
b. Cash before delivery
c. Demand drafts
d. e‐cheque

Answer: (d) e‐cheque

2. Which one is an offline payment mode?

a. Cash on delivery
b. Cash before delivery
c. Credit card
d. Both a and b

Answer: (d) Both a and b

3. Which one is not an online payment mode?

a. Cash on delivery
b. Debit card
c. Credit card
d. e‐cheque

Answer: (a) Cash on delivery

4. Which one is an online payment mode?

a. Cash on delivery
b. Cash before delivery
c. Demand drafts
d. e‐cheque

Answer: (d) e‐cheque

5. which one is not an E‐payment method used in India

a. Debit card
b. Credit card
c. e‐cheque
d. none

Answer: (d) none

6. OTP stands for

a. One Time Password
b. One Time processing
c. One time processor
d. None

Answer: (a) One Time Password

7. Which one is not a threat for E‐commerce

a. Trojan horse
b. Viruses
c. Worm
d. None

Answer: (d) None

8. Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography

a. Public key
b. Symmetric
c. Asymmetric
d. None

Answer: (b) Symmetric

9. Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography

a. Private key
b. Symmetric
c. Asymmetric
d. None

Answer: (c) Asymmetric

10. What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?

a. Ethics
b. Intellectual property
c. Copyright
d. Fair Use Doctrine

Answer: (c) Copyright

11. Cyber slacking consists of what activities?

a. Visiting “inappropriate” web sites
b. Visiting news sites
c. Chatting online with others about non‐work topics
d. All of the above

Answer: (d) All of the above

12. What is an arrangement made between e‐commerce sites that direct users from one site to the other?

a. Spam
b. Viral marketing
c. Affiliate programs
d. None of the above

Answer: (c) Affiliate programs

13. Which type deals with auction?

a. B2B
b. B2C
c. C2B
d. C2C

Answer: (d) C2C

14. Which one is not a layer of E‐commerce infrastructure

a. Physical layer
b. Product layer
c. Service layer
d. None

Answer: (d) None

15. Which will harm computer resources

a. Worm
b. Virus
c. Trojan horse
d. All the above

Answer: (d) All the above

16. The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐

a. Decryption
b. Cryptography
c. Firewall
d. All the above

Answer: (b) Cryptography

17. During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐

a. Integrity
b. Security
c. Confidentiality
d. All the above

Answer: (d) All the above

18. The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐

a. Macro
b. Trojan horse
c. Script virus
d. None of the above

Answer: (a) Macro

19. The virus that are attached with vb and java files are called

a. Macro
b. Trojan horse
c. Script virus
d. None of the above

Answer: (c) Script virus

20. The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐

a. Mails
b. Pen drives and cds
c. Websites
d. All the above

Answer: (d) All the above

E‐Commerce MCQ:- Part Six

  1. The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.

a. Memory
b. Microchip
c. E‐cash
d. None of the above

Answer: (b) Microchip

2. The smart card which use antenna for reading and writing data

a. Contact smart card
b. Contactless smart card
c. Proximity smart card
d. Both B and C

Answer: (d) Both B and C

3. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ card is read only.

a. Contact smart card
b. Contactless smart card
c. Proximity smart card
d. Both B and C

Answer: (c) Proximity smart card

4. Which of the smart card uses a sim like structure for reading and writing data

a. Contact smart card
b. Contactless smart card
c. Proximity smart card
d. Both B and C

Answer: (a) Contact smart card

5. Which is not a feature of ecommerce

a. SCM
b. EDI
c. WWW
d. BPR

Answer: (d) BPR

6. What is I stands in CIA of smart card?

a. International
b. Integrity
c. Identity
d. None of the above

Answer: (b) Integrity

7. What is A stands in CIA of smart card?

a. auditing
b. authenticity
c. authorized
d. None of the above

Answer: (b) authenticity

8. What is C stands in CIA of smart card?

a. confidentiality
b. conference
c. congress
d. None of the above

Answer: (a) confidentiality

9. Which one is the third party payment providers who offer digital wallets for E‐merchants

a. Oxicash
b. PayMate
c. PayPass
d. All the above

Answer: (d) All the above

10. Which is used to identify mobile money

a. MCID
b. MMID
c. RSID
d. NONE OF THE ABOVE

Answer: (b) MMID

11. ‐‐‐‐‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets.

a. Threat
b. Danger
c. Error
d. None of the above

Answer: (a) Threat

12. Which one is not a encryption technique

a. RSA
b. DES
c. AES
d. NONE OF THE ABOVE

Answer: (d) NONE OF THE ABOVE

13. Which one is not used as a security mechanism?

a. Encryption
b. Cryptography
c. Wallets
d. Digital signature

Answer : (c) Wallets

14. Which e‐government arena is being used when governmental agencies send out and accept bids for work?

a. G2G
b. G2B
c. G2C
d. G2G

Answer: (b) G2B

15. Secret key is used for

a. Public key cryptography
b. Private key cryptography
c. Asymmetric key cryptography
d. None of these

Answer: (b) Private key cryptography

16. Which one is a communication channel threat?

a. Sniffer programs
b. Cyber vandalism
c. Integrity threats
d. All of the above

Answer: (d) All of the above

17. Which one is a communication channel security protocol?

a. SSL
b. S‐HTTP
c. SET
d. ALL OF THE ABOVE

Answer: (d) ALL OF THE ABOVE

18. The protocol which allows the file transfer between computers is

a. TCP/IP
b. FTP
c. HTTP
d. SOA

Answer: (b) FTP

19. E‐Banking is also known as

a. ATMs
b. Net banking
c. Traditional banking
d. None of these

Answer: (b) Net banking

20. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is backbone of all E‐payments in E‐commerce

a. EFT
b. EPS
c. PayPal
d. None of these

Answer: (b) EPS

21. Which one is a client level threat?

a. Malicious code
b. Viruses
c. Active contents
d. All the above

Answer: (d) All the above

22. Which one is not an encryption technique?

a. RSA
b. DES
c. AES
d. FTP

Answer: (d) FTP

23. Which one is an encryption technique?

a. RSA
b. DES
c. AES
d. All of the above

Answer: (d) All of the above

24. Which one is not a server level threat?

a. Malicious code
b. CGI threats
c. Database threats
d. Buffer overflows

Answer: (a) Malicious code

25. Which one is not a physical threat?

a. Hacking
b. Storm
c. Phishing
d. None of the above

Answer: (a) Hacking

26. Which one is a physical threat?

a. Phishing
b. Storm
c. Earthquake
d. All the above

Answer: (d) All the above

27. Which one is a logical threat?

a. Hacking
b. Storm
c. Phishing
d. None of the above

Answer: (a)Hacking

28. The basic elements of website is

a. Home page
b. Web pages
c. Links and banners
d. All the above

Answer: (d) All the above

29. Which one is a threat for E‐commerce

a. Trojan horse
b. firewall
c. encryption
d. None

Answer: (a) Trojan horse

30. Secure communication means

a. Protect transmission of credit card number
b. Guarantee privacy of customer
c. Unauthorized access of payment details
d. All the above

Answer: (d) All the above

E‐Commerce MCQ:- Part Five

  1. Which of the following records logons and deletions?

a. Key logger
b. Packet sniffer
c. Log analysis tools
d. Screen captures

Answer: (c) Log analysis tools

2. E‐mail messages may be stored on which of the following computers?

a. Sender’s computer
b. Sender’s server
c. Recipient’s server
d. All of the above

Answer: (d) All of the above

3. What might identity thieves do with your identity?

a. Apply for and use credit cards
b. Apply for a loan
c. Change their identity
d. All of the above

Answer: (d) All of the above

4. Which of the following is not a common approach to phishing?

a. Send an official‐looking e‐mail asking for confidential information
b. Ask people to fill out and return a fake letter using postal mail
c. Ask people to click a link in an e‐mail to open a submission form on a web page
d. All of the above are uncommon approaches to phishing

Answer: (b) Ask people to fill out and return a fake letter using postal mail

5. A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called?

a. Phishing
b. Carding
c. Brand spoofing
d. All of the above

Answer: (d) All of the above

6. Companies can gather information about employees and potential employees from which of the following places?

a. Job applications
b. Credit reports
c. Companies that track Web surfers
d. All of the above

Answer: (d) All of the above

7. Cyber slacking consists of what activities?

a. Visiting “inappropriate” web sites
b. Visiting news sites
c. Chatting online with others about non‐work topics
d. All of the above

Answer: (d) All of the above

8. Cookies are used to do which of the following?

a. Store your ID and password for subsequent logons to the site
b. Store contents of electronic shopping carts
c. To track web activity
d. All of the above and more

Answer: (d) All of the above and more

9. Unsolicited e‐mail is called what?

a. Junk mail
b. Spam
c. Extra mail
d. None of the above

Answer: (b) Spam

10. What is the name of the new anti‐Spam bill?

a. No‐Spam
b. CAN‐Spam
c. Spam‐Away
d. Stop Spam

Answer: (b) CAN‐Spam

11. What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?

a. Ethics
b. Intellectual property
c. Copyright
d. Fair Use Doctrine

Answer: (c) Copyright

12. What is the unauthorized use, duplication, distribution or sale of copyrighted software?

a. Fair Use Doctrine
b. Pirated software
c. Counterfeit software
d. Privacy

Answer: (b) . Pirated software

13. What is a program, when installed on a computer, records every keystroke and mouse click?

a. Key logger software
b. Hardware key logger
c. Cookie
d. Adware

Answer: (a) Key logger software

14. What is software you don’t want hidden inside software you do want?

a. Adware
b. Trojan‐horse software
c. Spyware
d. All of the above

Answer: (d) All of the above

15. What is an electronic representation of cash?

a. Digital cash
b. Electronic cash
c. E‐cash
d. All of the above

Answer: (d) All of the above

16. What is a fully‐equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt?

a. Wearable computer
b. GPS
c. Implant chip
d. None of the above

Answer: (a) Wearable computer

17. What is a technology‐enabled microchip implanted into the human body?

a. Wearable computer
b. GPS
c. Implant chip
d. None of the above

Answer: (c) Implant chip

18. Which of the following is not a reason why digital cash has turned out to be extremely difficult?

a. If your system crashes you lose your money
b. There is only one standard
c. Digital cash makes money laundering easy
d. Digital cash travels across the vast Internet and is susceptible to begin stolen

Answer: (b) There is only one standard

19. Smart card is better protected than other cards using

a. Encryption
b. Firewall
c. Hub
d. All the above

Answer: (a) Encryption

20. Trust card is introduced by

a. BSNL and itzcash
b. BSNL and oxicash
c. BSNL only
d. None

Answer: (a) . BSNL and itzcash

21. PaisaPay is offered only by

a. Homeshop18.com
b. eBay.in
c. amazon.com
d. none

Answer: (b) eBay.in

22. The E‐payment mechanism widely used in B2B is

a. Credit card
b. Debit card
c. Master card
d. E‐cheque

Answer: (d) E‐cheque

23. Which type of technology will increase portability and mobility?

a. Implant chips
b. Micro‐payments
c. Internet phone calls
d. All of the above

Answer: (d) All of the above

24. Which of the following an accurate statement about internet phone calls?

a. They are possible but not yet free
b. They are not possible
c. They are currently standard practice
d. None of the above is an accurate statement about internet phone calls

Answer: (a) They are possible but not yet free

25. What are the most commonly used input devices today?

a. Keyboard
b. Mouse
c. All of the above
d. None of the above

Answer: (c) All of the above

26. Which of the following can be used to help identify people in a crowd?

a. Biochip
b. Implant chip
c. Facial recognition software
d. Vision chip

Answer: (c) Facial recognition software

27. Which one is also known as plastic money?

a. Credit card
b. Debit card
c. Paper cash
d. All of the above

Answer: (a) Credit card

28. E‐cheques are …………………

a. Prepaid
b. Postpaid
c. Both prepaid and postpaid

Answer: (a) Prepaid

29. Digital signature is a

a. Digital id,send as an attachment to a web page/e‐mail/message
b. Is used for verifying the attachments send using web
c. Both a and b
d. None of these

Answer: (c) Both a and b

30. Which one is the component of cybercash payment system

a. CC user software
b. CC merchant software
c. CC Server Software
d. All of the above

Answer: (d) All of the above

E‐Commerce MCQ:- Part Four

  1. What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer’s CPU and storage for some task you know nothing about?

a. Web log
b. Clickstream
c. Anonymous Web browsing service
d. None of the above

Answer: (d) None of the above

2. ERP stands for

a. Enterprise resolution planning
b. Enterprise reverse planning
c. Enterprise resource planning
d. None of the above

Answer: (c) Enterprise resource planning

3. Which is not a component of ERP?

a. Legacy systems
b. Bolt on applications
c. Operational database
d. Cybersoft

Answer: (d) Cybersoft

4. Which is not a function of ERP?

a. Human resource management
b. financial
c. warehousing
d. None of the above

Answer: (d) None of the above

5. What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic?

a. Computer virus
b. Worm
c. Denial‐of‐service attack
d. None of the above

Answer: (b) Worm

6. What floods a Web site with so many requests for service that it slows down or crashes?

a. Computer virus
b. Worm
c. Denial‐of‐service attack
d. None of the above

Answer: (c) Denial‐of‐service attack

7. What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?

a. Computer virus
b. Worm
c. Denial‐of‐service attack
d. None of the above

Answer: (d) None of the above

8. What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?

a. Risk management
b. Risk assessment
c. Security
d. None of the above

Answer (a) Risk management

9. What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?

a. Risk management
b. Risk assessment
c. Security
d. None of the above

Answer: (b) Risk assessment

10. What is the process of making a copy of the information stored on a computer?

a. Backup
b. Anti‐virus
c. Firewall
d. Biometrics

Answer: (a) Backup

11. What software detects and removes or quarantines computer viruses?

a. Backup
b. Anti‐virus
c. Firewall
d. Biometrics

Answer: (b) Anti‐virus

12. What is hardware and/or software that protects computers from intruders?

a. Backup
b. Anti‐virus
c. Firewall
d. Biometrics

Answer: (c) Firewall

13. What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification?

a. Backup
b. Anti‐virus
c. Firewall
d. Biometrics

Answer: (d) Biometrics

14. All of the following are considered biometrics, except:

a. Fingerprint
b. Retina
c. Password
d. Voice

Answer: (c) Password

15. What scrambles the contents of a file so you can’t read it without having the right decryption key?

a. Encryption
b. Intrusion‐detection software
c. Security‐auditing software
d. All of the above

Answer: (a) Encryption

16. What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?

a. Encryption
b. Public key encryption
c. Intrusion‐detection software
d. Security‐auditing software

Answer: (b) Public key encryption

17. What looks for people on the network who shouldn’t be there or who are acting suspiciously?

a. Encryption
b. Public key encryption
c. Intrusion‐detection software
d. Security‐auditing software

Answer: (c) Intrusion‐detection software

18. What checks out your computer or network for potential weaknesses?

a. Encryption
b. Public key encryption
c. Security‐auditing software
d. None of the above

Answer: (c)Security‐auditing software

19. Which of the following to viruses harm?

a. Your keyboard
b. Your monitor
c. Your processor
d. Viruses do not harm any of the above

Answer: (d) Viruses do not harm any of the above

20. Which of the following can a virus do?

a. Hurt your hardware
b. Hurt any files they weren’t designed to attack
c. Infect files on write‐protected disks
d. None of the above

Answer: (d) None of the above

21. In simple terms, what does risk assessment ask?

a. What can go wrong?
b. How likely is it to go wrong?
c. What are the possible consequences if it does go wrong?
d. All of the above

Answer: (d) All of the above

22. Which of the following is a characteristic of a firewall?

a. Examines each message as it seeks entrance to the network
b. Blocks messages without the correct markings from entering the network
c. Detects computers communicating with the Internet without approval
d. All of the above

Answer: (d) All of the above

23. Which of the following are ways to prove access rights?

a. What you know, like a password
b. What you have, like an ATM card
c. What you look like
d. All of the above

Answer: (d) All of the above

24. Which item can a password be used to protect?

a. Network
b. File
c. Folder
d. All of the above

Answer: (d) All of the above

25. Which is the most important component of IT?

a. Information
b. People
c. Information technology
d. Computers

Answer: (b) People

26. Which of the following applies to the implementation of an idea?

a. Copyright
b. Intellectual property
c. Patent
d. Denial‐of‐service attack

Answer: (c) Patent

27. When you purchase copyrighted software, what actually are you paying for?

a. The cost of the CDs, manuals, and development of the software
b. The cost of the CDs, manuals, and a share of the cost of the software development
c. A share of the cost of software development
d. All of the above

Answer: (d) All of the above

28. Which of the following is not a dimension of privacy?

a. Need for personal space
b. Need to feel in control of our possessions
c. Need to feel in control of our personal information
d. All of the above are dimensions of privacy

Answer: (d) All of the above are dimensions of privacy

29. Which of the following captures screen images?

a. Key logger
b. Packet sniffer
c. Log analysis tools
d. Screen capture software

Answer: (d) Screen capture software

30. Which of the following examines information passing through switches, hubs, or routers?

a. Key logger
b. Packet sniffer
c. Log analysis tools
d. Screen captures

Answer: (b) Packet sniffer

E‐Commerce MCQ:- Part Three

  1. When a transaction is processed online, how can the merchant verify the customer’s identity?

a. use secure sockets layers
b. use secure electronic transactions
c. use electronic data interchange
d. use financial electronic data interchange

Answer: (b) use secure electronic transactions

2. The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed?

a. hacking
b. cracking
c. dumpster diving
d. spoofing

Answer: (d) spoofing

3. What is a model of a proposed product, service, or system?

a. Prototyping
b. Prototype
c. Proof‐of‐concept prototype
d. Selling prototype

Answer: (b) Prototype

4. What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?

a. Client/server network
b. Intranet
c. Extranet
d. Thin client

Answer: (b) Intranet

5. What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?

a. Client/server network
b. Intranet
c. Extranet
d. Thin client

Answer: (c) Extranet

6. What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?

a. Disaster recovery plan
b. Hot site
c. Cold site
d. Disaster recovery cost curve

Answer: (a) Disaster recovery plan

7. What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?

a. Disaster recovery plan
b. Hot site
c. Cold site
d. Disaster recovery cost curve

Answer: (c) Cold site

8. What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?

a. Disaster recovery plan
b. Hot site
c. Cold site
d. Disaster recovery cost curve

Answer: (b) Hot site

9. What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?

a. Disaster recovery plan
b. Hot site
c. Cold site
d. Disaster recovery cost curve

Answer: (d) Disaster recovery cost curve

10. Which factor determines when your IT system will be available for knowledge workers to access?

a. Availability
b. Accessibility
c. Reliability
d. None of the above

Answer: (a) Availability

11. Which factor determines who has the right to access different types of IT systems and information?

a. Availability
b. Accessibility
c. Reliability
d. Scalability

Answer: (b) Accessibility

12. Which factor ensures your IT systems are functioning correctly and providing accurate information?

a. Availability
b. Accessibility
c. Reliability
d. Scalability

Answer: (c) Reliability

13. Which factor represents how well your system can adapt to increased demands?

a. Availability
b. Accessibility
c. Reliability
d. Scalability

Answer: (d) Scalability

14. Which factor represents a system’s ability to change quickly?

a. Flexibility
b. Performance
c. Capacity planning
d. Benchmark

Answer: (a) Flexibility

15. What is a set of conditions used to measure how well a product or system functions?

a. Flexibility
b. Performance
c. Capacity planning
d. Benchmark

Answer: (d) Benchmark

16. What determines the future IT infrastructure requirements for new equipment and additional network capacity?

a. Flexibility
b. Performance
c. Capacity planning
d. Benchmark

Answer: (c) Capacity planning

17. What automates business processes?

a. Workflow
b. ASP
c. Workflow system
d. EIP

Answer: (c) Workflow system

18. What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?

a. Workflow
b. EIP
c. Workflow system
d. SLA

Answer: (a) Workflow

19. What sends work assignments through an e‐mail system?

a. Database‐based enterprise information portal
b. Messaging‐based enterprise information portal
c. Database‐based workflow system
d. Messaging‐based workflow system

Answer: (d) Messaging‐based workflow system

20. Which will not harm computer resources

a. firewall
b. Virus
c. Trojan horse
d. None of the above

Answer: (a) firewall

21. Which is not a function of ERP?

a. Warehousing
b. sales
c. scheduling
d. None of the above

Answer: (d) None of the above

22. Which is a function of ERP?

a. Warehousing
b. sales
c. scheduling
d. all of the above

Answer: (d) all of the above

23. Which of the following is the primary characteristic of an intranet?

a. People outside the organization can access it
b. People inside the organization can’t access it
c. People outside the organization can’t access it
d. None of the above

Answer: (c) People outside the organization can’t access it

24. Which concept suggests that different applications and computer systems should be able to communicate with one another?

a. Integration
b. Web services
c. Scalability
d. Interoperability

Answer: (d) Interoperability

25. Which service encompasses all technologies used to transmit and process information on an across a network?

a. Interoperability
b. Scalability
c. Benchmarking
d. Web services

Answer: (d) Web services

26. Which process can prevent data from lose due to computer problems or human errors?

a. backup
b. recovery
c. benchmarking
d. data cleansing

Answer: (a) backup

27. Which process is used to reinstall data from a copy when the original data has been lost?

a. backup
b. recovery
c. benchmarking
d. data cleansing

Answer: (b) recovery

28. What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?

a. Performance
b. Capacity planning
c. Benchmarking
d. Data cleansing

Answer: (c) Benchmarking

29. Who protects system from external threats?

a. firewall
b. EDI
c. ERP
d. Script kiddies

Answer: (a) firewall

30. Who breaks into other people’s computer systems and steals and destroys information?

a. Hackers
b. software’s
c. Hacktivists
d. Script kiddies

Answer: (a) Hackers