CIC

96
CIC-1(E+H) CERTIFICATE IN COMPUTING (CIC) Term-End Examination June, 20OG GIG-I : THE CONTEXT Time : 2 hours Maximum Marhs : 100 Note : (il Do not start answering until the inuigilator ashs you to start. ftil Question paper contains 700 questions. Student is required, to answer all the questions. There is no choice. (iii) AU questions carry equal marhs. (iu) Each question must be giuen bne answer oruty. If rnore thqn one answer is mqrked,or giuen, zero mqrh wilt be awarded, for that question. A Multiple Choice (euestions number I to EO) Note : Four choices are giuen for a question, oui of which one choice may be correct. Ma,rh correct &nswer in releuant colurnn of the answer sheet giuen to you. In cose.you feel that none of the choiees giuen in a question is comect, tnark, in column,0,. l. In order to be called information, data must be (1) factual (2) relevant (3) news (4) All of the above 2. is an example of processing activities. (1) Classifying (2) Summarizing (3) Performing calculations (4) All of the above CIC-1(E+H) (1) P.T.O.

Transcript of CIC

Page 1: CIC

CIC-1(E+H)

CERTIFICATE IN COMPUTING (CIC)

Term-End Examination

June, 20OG

GIG- I : THE CONTEXT

Time : 2 hours Maximum Marhs : 100Note :

(il Do not start answering until the inuigilator ashs you to start.ftil Question paper contains 700 questions. Student is required, to answer all the questions.

There is no choice.(iii) AU questions carry equal marhs.(iu) Each question must be giuen bne answer oruty. If rnore thqn one answer is mqrked, or

giuen, zero mqrh wilt be awarded, for that question.

A Multiple Choice (euestions number I to EO)

Note : Four choices are giuen for a question, oui of which one choice may be correct. Ma,rh correct&nswer in releuant colurnn of the answer sheet giuen to you. In cose.you feel that none ofthe choiees giuen in a question is comect, tnark, in column,0,.

l. In order to be called information, data must be

(1) factual

(2) relevant

(3) news

(4) All of the above

2. is an example of processing activities.

(1) Classifying

(2) Summarizing

(3) Performing calculations

(4) All of the above

C I C - 1 ( E + H ) ( 1 ) P.T .O.

Page 2: CIC

3. Hypertext documents are linked through

(2) TELNET(1) DNS(4) Home Pages(3) Pointers

4. SNMP is a protocol for

(1) File transfer (2) www

(3) Virtual terminal @) Electronic mail

5. ' What does the URL need to access a document ?

(1) Path name

(2) Ilost comPuter

(3) Retrieval method

@) AII of the above

6. is used to build Dynamic Web documents'

(1) HTML

(3) ORACLE

(D CGI

@) All of the above

7. A user can move up and down a Web Page by

(1) !'raming

Q) Linking(3) Scrolling

@) All of the above

g. Which of the following statements is true with regard to distributed data processing

system ?

(1) It does not allow greater flexibility

(2) It is a Profrt earning sYstem

(g) It attempts to capture advantage of'both centralized and decentralized processing

(4) It allows access to data

9. Telnet is a -- which is uscd for logging on to remote computers on the Internet'

(1) Tool

(2) Software Package

(3) Ilardware

(4) Simulator

10. which of the following is an invalid character constant ?

(f) 'a' (D 'b'

(3) '\h' @) 'ln'

C I C - 1 ( E + H ) ( 2 )

Page 3: CIC

11. In C++ the end of string is recognized by

(1) the null character (2) the new line character (\n)

(3) the $ sign (4) the / sign

12, It is rcquired to ovcrload a function in order to

(1) have the same return type(2) have the same number of parameters

(3) perform the same basic function(4) None of the above

13. The programming language f'eature that allows the same operation to be carried outdifferently depending on the object is

(1) Polymorphism (2) Inheritance

(3) Allocation (4) Mangling

14, The most common operation uscd in Constructors is

(1) Addition (D Overloading(3) Assignment (4) Polymorphism

15. Inheritance is a way to

(1) Make general class into more specifrc classes(2) Add features to existing classes without rewriting them(3) Both (1) and (2)

(4) Make specific classes into gencral classes

16. Precedencc determines which operator(1) is evaluated first(2) is not important(3) is fastest(4) operates on the largest number

17. The important consideration when a program is run on a computer is(1) Time complexity(2) Space complexity(3) Time and Space complexity(4) Execution time only

18. The complexity of the following program segment for i = 1 to n DO is

(1) o(n) (2) O(i)' (3)

o(nz) (4) o(iz)

C I C - 1 ( E + H ) ( 3 ) P . T . O .

Page 4: CIC

19. f (n) = O(g(n)) iff there exist two constants C and no such that

( 1 ) l f ( n ) l < C l g ( n ) l f o r a l l n ) n o

( 2 ) l f ( n ) l > C l g ( n ) l f o r a l l r ) r o

( 3 ) l f ( n ) l = C l g ( n ) l f o r a l t r ) D o

(4) l f (n) | < C. lg(n) | for al l n ) no

20. The creditable value for pi (zr) was first computed by

21.

(1) Euclid

(3) Archimedes

greater tnat d4.3

(1) Jungis theorem

(3) Euler's theorem

22,, For every integer n greater than 2

(1) (n!)2 > nn

(3) (n!)2 > n'

(2) Euler

(4) Fermat

states that every finite set of points of span d has a spanning circle number

Q) Morley's theorem

(4) Pythagoras theorem

(2) (n!)2 < n^

(4) (n!)2 < n'

23. An integer number is said to be prime if it cannot be expressed(1) as the product of two (or more) factors each smaller than itself(2) as the sum of tWo (or more) factors each smaller than itself(3) as the product of two (or more) factors each larger than itself(4) as the sum of two (or more) factors each larger than itself

24. Which of the following is a complex problem ?

(1) Weather forecasting (D Generic defects(3) Earthquake prediction (4) All of the above

25. Morley's theorem deals with

(1) Spanning circles

Q) Irrational numbers(3) Intersection of angle trisectors of a triangle(4) Prim's numbers

26. Information differs from data as

(1) Information is processed data

Q) Information is collected data(3) Information is raw data(4\ All of the above

C I C - 1 ( E + H ; ( 4 )

Page 5: CIC

27.Theda i Iyprocess ingofcor rec t ions tocus tomeraccounts is thebes texampIe for

(1) Batch processing (2) Real-time processing

(3) Time sharing @) Off-line processing

2g. which of the following types of processing produces output results immediately after input

data are entered into a computer system ?

(1) Time sharing

(2) Interactive

(3) Batch Processing(4) Real-timeProcessing

29. Time during which a job is processed by the computer is

(1) DelaY time (2) Execution time

(3) Real-time (4) Down time

30. includes E-mail, Voice mail' faxing and Web publishing'

(1) Electronic mail

(2) Electronic conferencing tools

(3) Electronic communication tools

(4) Discussion forms

31. CBIS stands for

(1) Common Business Information Systems

(2) Computer Based Information Systems

(3) Central Board of Information Systems

(4) All of the above

32. For browsing the Internet we make use of

(1) Navigator GoId Q) Linux

(3) Editor (4) Protocols

33. Which of the following is not a type of computer facility ?

(1) Decentralized Q) Centralized

(3) De-distributed G) Distributed

34, The advantages tlf Centralized Data Processing are

(1) the methods and equipment can be standardized

Q)serv icesofmorecompetentandtechn ica l l yqua l i f redpeop lecanbetaken

(3) duplication of activities can be avoided

(4) All of the above

c t c - 1 ( E + H ) ( 5 ) P ' T ' O '

Page 6: CIC

35. The major advantage of data hiding is(1) Your programs can include more data(2) Your data will be used correctly(3) You no longer need functions(4) No one can ever use your data

A Constructor may be(1) Provided automatically by C++(2) Written by you(3) Either (1) or (2)(4) None of the above

is the key to(1) Reusability

(3) Abundance

(1) Train reservation(3) Seat booking

Which of the following is not a range of complexity ?(1) Organized simplicity(2) Disorganized.simplicity(3) Organizedcomplexity(4) Disorganized complexity

What is the sum of first 100 numbers ?( l + 2 + 8 . . . . . . + 9 9 + 1 0 0 )

(1) 5000(3) 5050

(3) n3

increasing productivity in the face of increasing complexity.(2) Flexibility

(4) None of the above

(2) Airline reservation

@) Batch processing

36.

37.

s8. which of the following is not an example of time shared rear-time processing ?

39.

.40,

(2) 4950

(4) 5500

4l' The largest prime divisor of a given integer n may be as large as(r) ffi e\ n2

(4) J;42. Example of Computer based fnformation Systems are

(1) Office Automation Systems (OAS)(2) Transaction processing Systems (TpS)(3) Management Information Systems (MIS)(4) All of the above

C I C - 1 ( E + H ) ( 6 )

Page 7: CIC

4:g, is any device that requests services or resources from a server'

(1) Media

(3) Server

44. Inheritance is a prineiple in which

(1) classes with the same name must be derived from one another

(Z) Knowledge of a general category can be applied to more specific objects

(3) C++ functions may be used only if they have logical predecessors

(4) One function may invoke different rnethods

45, The Internet Protocol is responsible for

(1) Providing data to the users

(D Providing hardware to the users connected to the Internet

(3) Providing Internet signals to the user

(4) Providing addresses for computers on the Internet

48. Which of the following is a feature of a ClienVServer architecture ?

(1) The server provides processing and data in response to client requests

(Z) The server provides data to the client which processes the data locally

(B) The server provides processing power for data stored on the client

(4) None of the above

helps in creating higher-quality audio and video applications with very little

expertise.

(1) Authoring

(3) Image Q

47.

(2) Peripheral

(4) Client

(2) Icon Author

@\ Macromedia Director 4'04

4E. The activities of Transaction Processing System are

(1) Calculation and classifrcation

(2) Storage and retrieval

(3) Sorting and summarization

(4) All of the above

49. A Dialog tree

(1) Shows the paths that are possible in a design following a decision by the user

(2) Maps the static and dynamic messages that take place betwqen the comp'uter and user

(3) Shows various steps involved in designing a solution of a problem

(4) Represent the paths that are possible during broadcasting the information

60. what will be the decimal number of a ternary number "12021" ?

(1) t32 (2) 136

(3) 138 @) r42

CIC-1(E+H) ( 7 ) P . T . O .

Page 8: CIC

B state whether True or False (euestions number El to r00)

Note : In th'e following 50 questions, mark 1, if the statement giuen is true and o if thestq,tetnent giuen is false.

51' The Information Centre is company's primary resource for the development of full-scaleinformation systems.

52. Batch Processing is quite useful when majority of records in a large database must bcprocessed at the same time.

Internet and Intranet are one and the same thing.53.

54.

DD.

Leased Iine does not permit online communication between a user and a computer system.

I{ypertext is a method for presenting text, i.i"gor, sound and video that are linked togetherin a non-sequential web of associations.

56. Early information was almost entirely discipline dependent.

57. A feasibility study contains a list of alternative solutions for a given problem.

58. A good report contains iess amount of information.

59. The terms "Program Flow Chart" and "system Flow Chart" can be used interchangeably.

60. An Online information system is not always a real-timc system, but a real-time systemmust consist of equipment with an Online capability.

61. Somc type of direct access storage device is necessary for transaction processing.

62. Both centralized' and decentralized data processing techniques are based on FunctionalApproach.

63. Gopher displays a set of resources on the Internet in the forrrr of menus or list of items.

64- Internet basically tries to connect various LAN's. It cannot connect WAN,s.

65. Hypertext combines hypermedia and multimedia.

66. Inheritance allows new objects to be built out of old objects.

67. Object-Orientcd Systems do not provide the performance flexibility and functionalityrequired for practical implementations.

68. The graph of the Konigsberg bridges has vertices of odd degree and cannot include anEulerian circuit.

c lc-1(E+H) ( 8 )

Page 9: CIC

69. The sum of the frrst n cubes (where n is an integer) is always a perfect square.

70. Every positive whole number is the sum of not more than four squares.

71. IJnprocessed facts and figures are simply data, not information.

72. A step-by-step procedure used to solve a problem is called an Operating System.

73. Disorganized complexity is represented by small number of variables and high degree ofrandomness.

74. Catastrophe theory was developed by Rene Thom.

75. Inheritance makes it possible for different classes to share the same set of attributes andmethods.

76. A data dictionary does not provide information about the size of the disk storage device.

77. A stand-alone data dictionary is related to one DBMS.

78. Expert System is a part of Decision Support System.

79. If a programming language has the capability to produce new data types, it is said to beextcnsible.

80. An Inline function is one which gets textually inserted by the Compiler, much like a Macro.

81. Examples of Chaotic Systems are Flames, Eddies and Cloud formations.

82. It is possible to import and export bookmark frles.

83. MIS is not a computer bascd information system.

84. sum of squares of the frrst 'n' integers is given or lgAga++Iryz]L 2 4 l '

85. Sum of the cubes of frrst 'n' integers i, ["(tf+ s11'z.

L 2 l86. Signifrcant ranges of Complexity are distinguished as Disorganized Simplicity.

97. Netscape is a programming language.

88. Summary reports are used more extensively at higher management levels than lower.

89. In Message approach, the semantic content of a message is accepted as Information.

C I C - 1 ( E + H ) ( e ) P . T . O

Page 10: CIC

90. The Industrial society was organised around agriculture. ,,,r , r ,

91. While dealing with Information, the other name of "The Effect Approach" is "The RecipientOriented Approach".

92. Information has value and utility only if it is communicated.

93. TCPAP stands for Transmission Control Protocol / Internet Protocol.

94. The general format of Internet address is [email protected].

95. WAIS stands for Wide Area Information Server.

96. Extended entry is a type of decision table displaying values to be tested in the conditionentry.

97. ln any computer network File Server is the central node that stores data files from whereall users can access them.

98. In Online processing transaction is processed as soon as it enters the system.

99. Railway ticket reservation system is an example of batch processing.

100. One of the drawbacks of distributed information system is that it does not eliminateduplication of activities and redundancy in maintaining frles.

C I C - 1 ( E + H ) ( 1 0 )

Page 11: CIC

SPACE FOR ROUGH WORK

( 1 1 )CIC-1(E+H) P . T . O .

Page 12: CIC

SPACE FOR ROUGH WORK

( 1 2 1C I C - 1 ( E + H )

Page 13: CIC

fr.srrd.fr. - l(E+H)

Wlzf : Z q"t

q ts - :

l .

f5'

qlz

I

r'trfubd ga oqfu t$.err$.S.1

rrdid dan

E;I, 2006

S.gn$.S.-t : ridd

qfqqdq ai6 : too

ft.) vval w sat fusqr dd d?F arwt a at' w-q w frt+to gr *-ri + frq q 6A tfti) sw-w t rco vr+ d t Mtzif il) srf vr+ ari aIM d' I *ld Eqw afl d Iftii) srTT xrn # eid sqq d tf t . u ) vd6vww*qd qdd ra r { t qRWt a l f ,w ra0w f r vn+d r rqWd lq r

rar trq- rq d d ss s?4 qr eyz ai+ RqT qw t

{gF{q.fl (Tvr riqr r t ro rq)

: ffifud v{t'f vd a rw */"q aK E6s Eq rq d, A* C qqn sfr dl s6dld r rd rnrr *i rd{ wNzF w (iaifqd +anr d en6d qt r qR d{ ,t sar edT afrd, di wrri W 0 t etifu ql t

qq-aT a-ildn + fdq erfrg - ETi qrFq r

(l) deqFqcF

(2) {irkl (Rclevant)

(3) HTffiM

\4) .q€il qqi

, TiqTq;I ffi Or s+dtq t f

(1) Effs{ur (classifying)

(2) qR-{SqE (sumrnarizing)

(s) rnmq q-far

(4) Bqtm q'ri

C I C - 1 ( E + H ) ( 1 3 ) P . T . O .

Page 14: CIC

6r{qt€ Ffuif +)(1) DNS

(3) Pointers

n+grq rcn t r(2) TELNET(4) Home Pages

sNMP + fdq q+ xffio t r(1) 1+fu{r €ttd{ul (2)

(4) fritrs tf, (plectronic mail)

6.qKr t I(1) HTML

(3) ORACLE (4) wg$ qeTr

(3) {em (virtual) efr{m

E. ffi jr&s ils qdqt + fdq uRL s) ffi sftrg+ffir *-fr t ?(1) gq qFI (Path name)(2) 6fg s.qZ{ (Host computer)(3) S-{ITk frRl G"trieval method)(4) sqfffi qrfi

q.l Ffrrr qftrs * y-frtil (Dynamic web Documents) d +qR q.ri t' ff,q f*qT

(2) CGr

q+mr i-+ gs (web page) v{ gq{-qti t qr v+ar t r(1) Framing

(2) Linking(3) Scrolling

(4) 3q{s qrli

ffif, (disrributed) 3fsgr €qrqr .ii + daiq fr FrqFdfua fr t q*+*t 6T{ qfr t(1) +6 efr+ FrseFq 3qtl-er rs wrar(2) qE drjT oTfdd qii qrer dr t(s) qE +frFn dqr RiF*Fn +if SqTTn t erq +J qrw *,G m dRRT +,raT t(4) q6 ef6.di ils Tiq r{rrq 6.cm t

Zffi|e (Telnet) qs t fr€.-{r qq)T gzq}-c rR KRq q;E{Tt q{ {Aq{(logging o') * tdq |*ur qnn t r(1) strFtute) rffiq{ q*q

(3) ?i1-qHql

(4) 3{Tfrrfs (Rufrfi)

d t qtqqT erdq rfr+ sffir t ?(2) ',b'

(4) ',ln',

10. Ftqfufua(1) ',a',

(3) '\h'

c r c -1 (E+H) ( 1 4 )

Page 15: CIC

tt. c++ ti ffi rr< (string) t efifr qt qrqn t qT wfr t t

(1) Null {isfrfr Q) {i isr riffi+ (r"l. . .c-*

(3) $ fq6 (4) / 1-16

rz. + idq ffi ffiI{ q} gTfrw (overload) trqr qrar t r

(1) sS :mn + sffi qrq 6Ge) 3S {cqT b qrdm fffial nTR s{i(B) B{} {mR * wun*1r (Basic) {--fl{ {iw +.G(4) -q$s fr t qt$ q-S

ls. ntqrqq silqr 6T eTfirdqlur fr q+ Ei {ffiqT ql 3+|rr€qTul t er-avn Frf, *FR t 4ai q

v6rq.F etor t, qo t(1) qEtil-dr (potymorphism) Q) st'ttf-tr+n (Inheritance)

(3) Fqtr{ (Allocation) (4) trEr-gq (Mangling)

:'4. Constructor. tt nqm qqiiuf* q-qfFd-d {B-il (Operation) t

(1) qtq (Aaattio.r) (2) eHRq (Overloading)

(3) Fqil{ (Assignment) @) e-g6l-df (Polvmorphism)

rE. ffi{IfiffiIt (Inheritanc") tsr 6.qi mr qm n-fr{T t(1) qrqrq 4t (ctas") t 3Tfirs fqRTs +t e-{Hr(2) F." g*tr* + E-dqTq r'il i 3fE-dqTur n-sqT(B) (1) sil-r (2) +ii(4) frRTs q-'il t qFil-q qrt e-ar{r

16. Tf6 Gr".edence) qd frqitrd 6qf,r t fu t4qT {ST5+ (operator)

(1) q-{A {flifsn Ei--dT t(2) qnds qfr t(s) q-dfr i-$ t(4) sTfir+-dq €qr .rr q,rq star e

17. qqe{ q{ q}{ ffiRrT qert lrqq a1 q6-6Af Af,r t ?

(1) 4.fm qEfrdf (Time ComPlexitY)

)(2) q-a VFffiI (Space ComplexitY)

(3) sr?T dPIT plra VFmn

(4) *{f, FI{KT 4l?T (Execution time onlv)

18. FrrqFf,Fsd mqR{T dg i = 1 to n Do 41 qfa-d-dr t

(1) o(n) Q) o(i)

(3) o(n2) (4) o(i2)

C I C - 1 ( E + H ) ( 1 5 ) P . T . O .

Page 16: CIC

f (n) = o(g(n)) qR silr fiq-d qR q) s{-q{ c eil-r ,ro €l v4( 1 ) l f ( n ) l < C l g ( n ) l H r I t n 2 n o * . f d q( 2 ) l f ( n ) l > c l s ( n ) l q $ n ) n o + l d q( 3 ) l f ( n ) l = C l s ( n ) l H S t r ) n o + l f l q( 4 ) l f ( n ) l < c . l * ( " l l * , f r ' ) r o * ' F d q

pi (n) 6I *'q qn qq$ TdA gRT 3TFrsftrd fuqt ,rfl eTr r

2r' E-drdr t rs ffi'd+ rq-€sit + x+s qRtrd vgqqsiu+ + sTfirs ffiilTd {wr et-fr t r(1) S "fuq

(Jung's theorem) (D qtd e*q (Morley,s theorem)(3) stfqd{ gqhq (f,-rt"r,s theorem ) (4) qlEfi+fq qttq fpytfragoras theorem)

22. 2 t q-g l-+s Wfis "t foq

(1) {ks (Euclid)(3) 3ilffi+q (Archimedes)

(1) (n!)2 > n"

(3) (n!)2 > n'

(2) 3il{ffl (Euler)

(4) l6'qf (Fermat)

(2) (n!)2 < n'

(4) (n!)2 < n"

qTfrr,Td Aqsq{s qEi

24.

d-$ Wfs {@T qR , Bdfirqs r-fi +-tr fr erqrq wdr-tr t(1) q) rqr sTFrs) $rcii + gqrw * w fr, + x+s evt qq €t(z) <) rqr e+flr+l q,rcqif + q)'Tq-d * qq t, q) rd-* s*t sq El(B) Q fqr oTfqs) T*i + Iqrqd * sq fr, S s-d-s ilro eTfirs €f(4) <) rqr e+fw*y HR-d + qt'rs-d * w fr, q) r+s $ss sTfrrs Etffitun fr t 61-6 qrrsr qk t ?

r \ a(1) qRIq 6I TqE{l" e)(B) tgin +r {qftqrq @)q)fr qtq (Morley,s theorem) 4.f {iaiE(1) fr'RR gt'i lspu.rning Circles)(z) siqR-iq €@rcr)

t t r

(s) frgq + s)"r + fiq-ss + slh&(4) Frq {wpii

26. qr{r Effidi t fiffi FFR Bic,rrr *-fi t z(1) fuffird q@ q-dn q'rdri t(2) {i{F{d sf+,e qfiT q,t-fl-i t(s) q..t # {fiT qgeTil t(4) Bq{ffi €qi

CIC-1(E+H) ( 1 6 )

Page 17: CIC

27. qT-dsi t €Trii i g*rRi 6r tFr+ riqr*]q qr q-riftq sql6ruT $ I

(1) Yqq *iqr$rq(3) 4.rf, eTrtr{

28. FrqrdF€d t t fus nt6r-r q;r €qreH q'FQ[crriir it ea ffiqr qili w nGFrm qRurH 3qe@t

ormt z(1) S1?T qIGFT (fime sharing)

e) StreMmqlFqs (Interactive )

(3) }|-qq fiqFl;t (Batch Processing)(4) qg-3T{ffrqT {qfe1;I (Real-time processing)

zs. +'qc{ +\$ +lq s{i fi fr qqq trTrdT t, sR

trl fu{e q;l?T (Delay time) Q) ftETfr 6T€T (Execution time)

(3) qg{ff#qf (Real-time) (4) gE;I ef{q (Down time)

fr {-t-m, qf{€ tf,, +ffi dqT i-q $+rflq' fqtrd AA t t

(1) @iFrs i€(2) silftfq'T swF{rt(B) {aqiFs {}qur 3rfiq(4) qqf S{{ (Discussion forms)

31. cBrs t infld t

(2) {q-3qH.q'r {qi?fi

(4) eEtd{ {ql?Iq

(1)

(2)

(3)

(4)

Common Business Information Systems

Computer Based Information Systems

Central Board of Information Systems

sqts qS

32. dl-Jtrrr * rarq nq(1) Navigator Gold

(3) Editor

5e<ta 6r q'qhr oG t r(2) Linux

(4) Protocols

Bs. FmfuFsa i t +qqi o'qer gFow sT FrR Td? t ?

s4. +-frS-d m*.=T {qreffi } enr t(1) frfEr?ii dqT 3rr6{uii or qr++tq.tq f+-qr qr vq.dT t(2) sTfirs Hqrq f,qr a6fi-*i Fiq t q}q qRsdi qi w d qr v+-fr t

(3) fmqrsedi + +6{q (Dupricationl q} {qiqr qr vfidr t(4) wts qtfr

(1) frhfrSd (Decentralized)

(B) 3Tffid (De-distributed)

(D *fif( (Centralized)

@) ffid (Distributed)

C I C - 1 ( E + H ) ( 1 7 )P . T . O .

Page 18: CIC

87.

qfiWr iqq (nrt" hidins) Hr g@ dFT B(1) silq+ nqrtvr fr sTfirs @ ld qr vo} t(2) oTrqt oiffi q.r ei.€d d{E t sqq}r fuqr qrEn(B) BTrrd T+lfr +1 e+rqvqrdr rfi Et-fi(4) 3TIq+ 3tT-6il dr +$ Rs{r sTpr ftiT* s{ RFilrConstructor ti W-Of t(1) C++ dRI {qd: SRfdI(2) emrh aru idfud(3) qI (1) q e\(4) =qfd fr t +ti +A

il.d-fi g$ qkdr + Hrqi {f,fi(1) g-{trlqdT (Reusability)(3) fgCdf (Abundance)

(1) sooo(3) 5050

(1) v;(3) n3

Q) 4e50(4) 5500

(2) n2

(4) J;

6,lqrt sTreTrRd qa4 dif + F{rdr"r t(1) Office Automation Systems (OAS)

(2) Transaction Processing Systems (TpS)

(3) Management Information Systems (MIS)

(4) sqds qs

g$ rmq*dr mi gfr t r(2) ftlRIItrT (Flexibility)(4)

"q{ffi t e +$ q-fr

4r. f+,gi Wrfs n 6T srfiffioq oTqrq guns-d fuilfl qEr A €6iTr t ?

ffifuH d t +* srf, *fud (rime shared) Trq{th* {iqr.r{ 6T sEr6wT af t z(1) t-e eTRqfi e) Eqr$ sTReTur-(3) {qH sTRqTq G) yqq {g1t5{

fuTfdfuH q t +t+* qkrifi qi qRqtfi (Range) adl t Z(1) StrFdd vredr(2) sTri'rFdd v{mdr(s) d'Ttrd qhdr(4) 3Tfr'rtrd qkrdr

gqq 100 t iwBt G+2+8 . . . . . . . .+9e+100)q , r + rme Hr t ?

CIG-1(E+H) ( 1 8 )

Page 19: CIC

43. F gtu t q] €-dr (qR${s) t w qr €qrfi qroil ffi t t(2) qR+{f, (Peripheral)

(4) Wliiz (Client)(1) frtsqr (Media)(3) qdl (Servet)

44, fiRrfersn (rnheritance) Vs fuqid d Rqi

(1) W E1 qrq + qff (cl^".""1 d {s {gt t ffi ffiqr * s+m t

(zD HIrTrq dtr + {1;1 41 3rfldq 3TFffi fqR1g 3{F{freSr (objects) * ff,q frq qr sF'tTI

t(s) 6** rsrd 6T sqqlr itrf, dm fu'qr qr qmil A, qq s{+ ?r4frq-d Ef-dtr d

(4) q+ wr{ 6-i fqitld t f6qr qT q+

ffic ffin * ldq fs+fl dar t t(1) nffi + ldq q@ BRr*I q-tli(zD sj t {icifqd qqM3ii 61 ,h-qmfr src*T q-{rl

(B) FiFT-ff,i3ii ?ir Sc riire sqsidl q-rn(4) 6qaii * fdq se qr qt sqf,el o.G

ffiFg-d fr t qt+o wrizlvdr (inenvserver) TPII(|eFSf,l (architecture) or eTfTf,enur

t u(1) q*{ RTRie + 3r{tq qr {qrsTq sft 3ffi sRldT srrdr t'rrl,

-ft *.'F. s) "fo

Bk,eI qrrm t q) 3-Q rqrtrq 3lTt111 qt {qTfsrd 6ffr t

(B) Ffr wr{c q{ risrtrd sffi t fdq {qiqq qrft Fffi ocor d(4) w$-s fr t ftt$ €

47. {gd 6q ffiqffiT +1 ftqfr ii $,q-rrqqff t 3fffi nqr FH eIEsd-IT

sRrer 6,uar i r(1) Authoring e) Icon Author

(4) Macromedia Director 4'04(3) Image Q48. frqroflq €qren fi s1 qRfqFrqf t

(1) r1uFIT dqT Trtrfiq(2) rR"T nw 5+Ioui 15+f|R)(3) {f,Zi (Sorting) HelT qqtquT (Summarization)

(4) sq$ffi qtfr49. {-dfq 9H (Dialog tree)

, (1) qd-I.n.at + FTUtq t ergeit fs-ffEq fr {Eq qdf 4} E{lkT e(2) q.qer 31ti qqM + tr" qFft REt dqr rrfrTs {M 4} rqa qccr i'(s) ffi wRT t qq-m + fssTqq t f{trd FFrq qruii qi Rlidr t(4) g+ b {qRuT + d{-{ $rq qei 61 fasqur +car t

b0. *fi (ternary) {ql 'r2o2L' fr wrrrcq ricqr wr t}tft U(1) L32(3) 138

CIC-1(E+H)

(2) 136(4) 142

( 1 e ) P . T . O .

Page 20: CIC

ET

7h

51.

52,

6rdr{q trfi t ?il qFrit (y*q +i. sr t roo rq,): q? l 50nrr t r rydrqA fEqrr rqr6er4w\ddr e i fud+l , aar wrrsF/ /T

w o eifud ql, qE 6Ea ,Tdd dl t , ' '

wi-Tilfiq q-{dr ilii + ks-rq + r€q 6qii *r qa4 :iE ge $s*r rhr t rqGr \rs frflTd stfi*:Fr ritrdr (Database) fr sTf[r+T-q eTFrftd sr q-s fi eqq €qFrq fr-qrqFn eqRi-d fi w x+q *iqrr{ srsi sqqlrfr dror i rie+c (Internet) avr igrle Ontranet) qs El nlt t rets mgq (q-giFrd dr{{) t q+'Tsnf $fu +.qgt dr + dtq gqqd (online) €iquT liqqiA E)-dT t

d

ETqq€R (Hvpertext) tq Tt 3tmfus sq t qwn Tidfiid {ra, fu{, ffi nq1 qiBq} 6}x q o w l d f f u t 'wd, qaal WidqT f{rqrqTfr t}-fi ql r3T)fus (feasibility) daiql e{Erq-q it ffi srrgtT + Mfls vqreTFit *i q.qi A-fi t Iqs 3r6i Rqtj fr {fir 4i qr*- qq +-fi t I

"Program Flow chart" tfsrT "system Flow chart,, or rqlq qs. {R t r+nq qr fuqJ qT RF.1It rEqn q-{dT ?i1 (Ontine information system) 6iTTf qU-s]-{eqf dT (Real_time system) Tf,aln wg €u-efiBqr dr q N ws{'T A+ qrFq Frt.g,* qr*, d l--lqq-rf,T $qlq{ (T}ansaction Processinsl * 6q g+ rtFR q1 req qdq ,igRUT (direcr,access storage) gfu eff+f++ t)-fi t f+ftsd dPfi fqiFqt-sd qH sri*sT €qrqT d+ats rflqfcq--s sqrrq (Functional Approach)q{ 3TrETrR'f, t Itilmr 16oo1rer) F-{te vt river+i } vgqq s} Fqffi (menus) qr q-ql (items) qi {*q sq fr rffiTd olor t rF-q gcqdqT F.|- r"aN d +f,dT t r q-o weN q) =rfr fr *Fdr Id-{qfu, wqrftfrqr rur q€*fiBqr d qtgdr t rs+{rF]t5li (Inheritance) gut smrcq.?if (objects) t rq 3{irdqlif 61 faqful sd Ei gfuwr++ oror t' rqFffiil-3qci dT (ouject-oriented systems) eTqdfrs q,HFqq{ + fdq BTERTn trqKT

53.

54.

oD.

oo.

o t .

58.

59.

61 .

64.65.66.

F+om+ silr r*rddr warer qfi srrt I68. fiFrqq{ trfuq (Konigsberg bridges) * nm * {fr{ effiq ffi + E}t t 3it{ B-{t

3rffiRT{ TIffid tEulcrian circuitl f6l A V+-Oi I

C I C - 1 ( E + H ) ( 2 0 )

Page 21: CIC

6e. wttT n eqit or q)'r ({dr n {6 WIfu tl onvrr !S Wt qd qqT d-fr t

70. x-d* srqnqs Wt {iwr m'r d-fr t, + qr ssi qq q'il +i I

7r. iq-rierfqd nrq et)r eiq, qH # E\il t, Wn +& r

72. FnS qq{qr + qqt-rq + frq }Fg$ q{uwq (step-by-step) {B-qr FileFT .ir o-eerni d r

7s. B{dqtrf, qfrffidr q-d s1 qrl €gr 3ih qTEFE-sTr (randomness) 61 sq ql:NT dKr

FTFfrd d-fr t I

74. 3TTqkT fu-qid (Catastrophe theory) q.r fusrq ti sfq (Rene Thom) t ft-qr qr t

75. s-diTferqR (rnheritance) frFrr +T ilr yil nur frfsTdi $ qqm q5"qd q.r qfrrr {qEq+nr f r

76. slfs.gr qrfl (outu dicrionary) fgw. qgKur gFm tni"t storage Device) : sfi4'l-{ + qTt E

{-d{r sqc|er rfr oncn t

77. Eih qfc;gt q)fl (stund-alone data dictionary) 4't ti.iq g+ DBMS t Etdr t

78. ffi{ dT @xperr system) Fruh vOr++ cir qr qrtr ttcr t r

7s. qR d{ fr'lTqq qrqr qq # FFr{ (Data type) * B-€rfi +1 qqdr {sfr t,' n} sS fudTq(extensible) 56f VfOf t f

80. {i-f,rfl trqt{ (I.rtirre function) qE E}-dr t n e-Enm (compiler) gRT qld-FARrd (Insert)

n) qldr t aiq,rtr Macro q1 aro I

81. s{-qqRfd dii (Chaotic systems) t e-qfd{tT t '

Flames, Eddies d{T Cloud formations.

Bz. E+-qrS' (Bookmark) {fufiriJit 4T sTqd-FTqtd {qq t r

83. nlrs s%er 3TrqrRd {q4r iir q-fr t I

84. q6dt'wt+i * q,il 6r frrr l@g+g3'2.l * Rqurqr t r

Bb. q6d t'Wf+i + q-ii sr +rr [tTr]' t r

86. qETdT + q-d-dtui qRnii (Ranges) +l sT{i.rfud v{frTII t sq ti Vqt ffqr qrdl t r

87. Netscape q* xlqfr|{ qrqr t f

88. {iRTq qfu}Eii 6r trfrq frE{ R{ di BTEqTT s.q r.iqq wii q{ srFr* qFf{ oq t isqr

wcrt r

C I C - 1 ( E + H ) ( 2 1 ) P . T . O .

Page 22: CIC

89. IU ry (Message approach) fr TitqT 6t gTrrj-T ftqq.qq (semantic content) d g+tr't sq if rqtsn F*'qr qrm d r

e0. 3iuiFm qqFq FR + qrfr Brh $tBr F*-qrrq q r

el. qqiT * €aiFT t fuqn qqi vrrq, "srlrE 3g5r1q" *.t {Fir q;-q "q1qffi Wui 3sp1q"(Recipient Oriented Approach) fuffif d I

s2. {q4l sl ISq dqr sqq}FrdT dEi t sr s{Ffir €}q"r (communicated) tsrr qrdr d r

93. TCP/IP cb-f dfCfd d T"ansmission Control protocol / Internet protocol.

94. iTf}c gt (kttutrret Address) 4'I qlqfq 516r[ [email protected] *-of t f

95. WAIS s'f 3Td d Wiau Area Information Server.

e6. f{€dRd qFE @*tended entry) t drfld t - lis yqn q1 ppfq qKUfr ffi qfuisftqfdE + q{qTur f+.q qri ffi Tdr 41 }rffird frqr vror t I

s7. ffi +qar i-S fr qrq-d vdr Gl" server) adq qts E)-dr t q) sri-*-.sr €F-dpif61 tigRur qrnr t q-dT qtTI xqi{6idf (users) si q{ qg" *s.i t, I

e8. gTq-d {iqren ii, f*-qr+crq q.r dr fr t{+{r At fr €srq{ |oqr qror t I

ee. te fr+e 3TRqTnr ciz wrq (Batch) {srqq ql sEt-d{uT d I

100. ffid qqrl dT (Distributed Information system) +1 q* ofr qo t fm qo {fu-dFBift rworq fr tmqmertit + +{nq (Duplicationy qqr qefTr (Redundancy) s} ({ rfi mtFnnr r

crc -1(E+H) ( 2 2 )

Page 23: CIC

rq, 6'rd b fts dq6

C I C - 1 ( E + H ) ( 2 3 ) P . T . O .

Page 24: CIC

tq'6rd b frs drr6

crc -1(E+H) 124 ) 5,000

Page 25: CIC

CIC-2(E+H)

CERTIFICATE IN COMPUTING (CIC)

Term-End Examination

June, 2006

CIC-2 : THE TECI {NOLOGY

Time :2 hours Moximurn Marhs : 100

I r : :Note:

(i) Do not stq,rt q,nswering until the inuigilator ashs you to start.

(iil euestion paper contains 100 questions. Stud.ent is required' to answer all the questions'

There is no choice.

(iii) All questions carty equal marhs.

(iu) Each question rnust be giuen one arLswer only' If more than one gnswer is rnarhed or

giuen', zero m'arh wiII be a,warded for that question'

A Multiple Choice (Questions number 1 to 50)

. Note: Four choices are giuen for a question, out of which one choice may be correct' Mq'rh

correct qnswer in releuant column of the answer sheet giuen to:you' In case you feel that'

none of the ch,oices giuen in a question is correct, marh in coluntn '0'.

1. Who is called as the Father of Computers ?

(1) Blaise Pascal

(2) Charles Babbage

(3) John Von Neumann

(4) Howard Aikens

2, One kilobY[e is equal to

(1) 1000 bYtes

(2) 1012 bYtes

(3) 1024 bYtes

(4) 10000 bYtes

CIC-2(E+H) ( 1 ) P r ' o '

Page 26: CIC

3. ENIAC stands for(1) Electronic Numerical Integration and Computing(2) Electronic Number Integrator and Calculator(3) Electronic Numerical Intermixing and Combing(4) Electronic Numerical Integrator and Calculator

4. DEC is the example of(1) Micro computer e) Mini computer(3) Mainframe @) Super computer

5. is used in the fetch cycle in a typical CpU.(1) Storagc unit e) InpuyOutput(3) Accumulator (4) program Counter

6. Following is not a valid register :(1) Memory Address Register(2) Program Register(3) Instruction Register(4) Program Counter

7. Which is the optical storage medium ?(1) Floppy disk e) CD_ROM(3) Magnetic Disk @) Magnetic Tape

8. DIP is

(1) Digitat Impact program

(2) Dual Impact processing

(3) Digital In-line package

(4) Dual In-Iine package

9. The capacity of a typical Winchester disk is(1) from 500 to 1000 MB e) from 10 to 600 MB(3) from 100 to 600 MB @) from t to 60 MB

10. Motorola 68000 is a bit microprocessor.(1 ) 8 Q) 16

(4) 64(3) 32

11. Which of the following is a pointing device ?(1) Keyboard e) Light pen(3) LCD (q Printer

c l c - 2 ( E + H ) ( 2 )

Page 27: CIC

l,2. device is used to grade tests through reading the marked alternatives.

(1) MICR(3) OCR

,, (2) OMR

, (4) Keyboard.

13. The speed of T.aser printer is measured in

(1) Lines per second (2) Pages per minute

(3) Characters per second (4) Lines per minute

14. RISC is

(1) Redundant Instruction Set Cornputer

(2) Reduced Instruction Set Compiler

(3) Reduced Instruction Set Computer

(4) Redundant Instruction Set Compiler

15. Which of the following organizations uses N processor units ?

(2) MIMD(1) MISD

(3) Both (1) and (2) (q SISD

16. The performance of pipeline in parallel organisation depends on

(1) Data dependency(2) Barriers in the program

(3) Encoding

(4) Both (1) and (2)

17. Which of the following is correct about non pipelined processor ?

(1) so = Tr, /Tn Q) so = T,, + Tn

( 3 ) S k = T r , - T p ( 4 ) S p = T ' x T n

18. Which of the following Ianguages is widely used in scientifrc applications ?

(1) LOTUS Q) COBOL

(3) JAVA (4) FORTRAN

19. Database Management is also considered as(1) zGL Q) 3cL(3) 4GL @) scl

20. Mnemonics are used with which language ?(1) Assembly Q) Machine(3) Pascal (4) COBOL

GIC-2(E+H) ( 3 ) P.T.O.

Page 28: CIC

21. A group of characters used to access values in programming language is(1) Array (2) Constant(3) Data type (4) Variable

22. Which of the following is the logical operator ?(1)

(3) + (4)

23. SPOOLING is

(1) Simultaneous Peripheral Operations On Line(2) Simultaneous Printer Operations On Line(3) Simple Peripheral Operations On Line(4) Simultaneous Printer Operators On Line

24. The major concept in case of Distributed OS (Operating System) is(1) Coordination (2) Cooperation

(3) Transparency (4) Storage Control

25. Which is the benefrt of Windows ?

(1) Multitasking

(2) Memory Management(3) Device Management(4) AII of these

26. The second era of computcr systems evolution introduced the following concept :

(1) Distributed Systems(2) Objcct-Oriented Technology(3) Batch Processing

(4) Multiprogramming

27. CASE tools are generally related with

(1) Assembly Language (2) SDLC(3) CPU (4) RrSC

28. The transfer of data between spreadsheets and word processors could be done by

(1) Compiler

(2) Interpreter

(3) CASE tools

@) Dynamic Data Exchange

clc-2(E+H) ( 4 , )

Page 29: CIC

29. Which is not a part of 4GL category ?

(1) Compilcr

(2) Application generator

(3) Report gencrator

(4) Decision Support System

30. Human Access Language GIAL) is the examplc of generation language.

(1) 2

(3) 4

(1 ) 8

(3) 16

(2) 3

(4) 5

31. Number of bits used in ASCII standards for data communication is

(2) 7

(4) 32

32. Simplex mode of communication channel allows the data transfer in

(1) one direction(2) one direction at a time

(3) Both dircctions at same time(4) None of these

33. The maximum distance between 2 nodes connected to same channel in LAN is

(1) 100 m (2) 1 km

(3) 5 km (4) 10000 km

34. Token Ring is I , , ,(1) LAN topology

(2) LAN access method

(3) CommunicationArchitecture

(4) LAN Hardware

35. Which is not a valid step for circuit switching ?

(1) Network Access password

(2) Circuit establishment

(3) Data transfer

@) Circuit termination

36. EDIFACT is

(1) Communication standard

(2) Retail industry standard

(3) Standard for administration and trade

(4) Transmission standard

crc-2(E+H) ( 5 ) P.T.O.

Page 30: CIC

37. The frrst Packet Switching Public Data Network owned by Deptt. of Telecommunications is

(1) NICNET (D BITNET

(3) USENET (4) I-NET

38. Which of the following is a part of single crypto system ?

(1) Transposition (2) Substitution

(3) Both (1) and (2) (4) RSAAlgorithm

39. The process of getting data access by intercepting the traffic on the circuit is called

(1) Data trapping

(2) Cryptanalysis

(3) Cryptography

(4) Leakage

40. Who first gave the concept of self replicating programs ?

(1) Ronald Rivest

(2) Leonard Adelman

(3) Adi Shamir

(4) John Von Neumann

4]^. Power on SeIf Test (POST) is a part of

(1) Booting

(D Networking

(3) Cryptography

(4) DisasterManagement

42. BOOT infected virus affects which frle ?

(2) IBMDOS,COM(4) AUTOEXEC.BAT

43. Lehigh Virus

(1) frrst came into being in Pakistan

(2) is prevalent in Macintosh Machine

(3) affects only .EXE files

@) affects only COMMAND.COM frle

44. Data Encryption Standards (DES) algorithni specifies a method for' encr)ryting a/anblock.

(1) COMMAND.COM

(3) GENERAL.EXE

(1) 8 bit

(3) 32 bit

CIC-2(E+H)

(2) 16 bit

(4) 64 bit

( 6 )

Page 31: CIC

45. Identifying risk in various alternatives is part of(1) Definition phase

Q) Design phase

(3) Functionalrequirement

(4) Implementation

46. Vaccination is a part of(1) Cryptography

(2) Anti-Virus program

(3) Disaster Recovery

(4) SecurityAlgorithms

47. Gravity virus is also called(1) Stoned

(2) Happy Birthday Joshi

(3) Dark Avenger

(4) Raindrops

48' which of the following viruses increases the size of .EXE and .coM files ?(1) Marijuana

(Z) Raindrops

(3) Jerusalem

(4) Brain

49. Disaster Recovery deals with(1) the tasks in planning

(2) the implementation of recoverv(3) Both (1) and (2)

(4) None of these

50. The objective of contingencyplan is(1) Discover which application is most critical(2) Remove viruses(3) , 11*6oot the computer(4) Determine the person responsible for disaster

CIC-2(E+fl)( 7 ) P .T .O.

Page 32: CIC

B State whether True or False (Questions number 51 to 1O0)

Note : In the fo l low ingS0quest ions , tnarh l , i f th 'es ta , tementg iven is t rueond0 i f thes ta te ruentgiuen is false.

51. In Von Neumann architecture each bit of memory can be accessed independently'

52. In computer, for di.fferential engine the output could be directed to a card punch device'

53. ENIAC is a second generation computer'

54, 8080 microprocessor was developed by Motorola'

55. MC 68020 chip is part of super computei'

56. Memory parity error is an example of hardware failure'

57. CPU register directly interacts with secondary memory

5g. The memories which lose their content on failure of power are termed as volatile'

59. PROM can be written onlY once'

60. FIoPPY disk is a Primary memory'

61. The concentric circles in case of floppy are called Sectors'

6 2 . S e e k t i m e i s t h e t i m e t o p o s i t i o n t h e h e a d o n a s p e c i f r c t r a c k .

63. Winchester disk is made up of magnetic oxide'

I Un. S

! incfr optical disk can store around 650 MB of data'

l *

I uu. Optical Bar Code Readers are used with library books'

| . r - - r h ^ ^ i r

I uu. CAD is Computer Assisted Design'

I

I ut. Inkjet printer is a non impact printer'

III

c tc -2 (E+H) (8 )

I

Page 33: CIC

6g. Parallel interfaces are comlnonly used for conrrecting printers to a computer'

69. Data flow architectures are SISD architectures'

70. Memory buses transfer data between memory anil CPU'

7L. Tightly coupled systems have shared memory'

72. Pipelining processing improves the system's throughput'

78. RISC machine should not execute 2 instructions in a cycle'

74. Application software is a part of system software'

75. Ventura is a DTP Package'

76. FRAMEWORK combines word-processing, spreadsheet' database and graphics functions'

17 .C++programexecutes fas ter thanmach ine languageprogram.

78. Interpreter is good for fast debugging in comparison to Compiler'

79. SQL is first generation language'

S 0 . X o R i s T R U E i f b o t h o f t h c a d j o i n i n g e x p r e s s i o n s a r e t r u e .

81. If-then-else structure is a looping statement'

82. For X(Y), X is a variable and Y is function name'

83. Resident monitor is used with batch processing'

84. Pop-down menu is also called dialog box'

g5. Application Program Interface (API) is a part of development environment for most GUIs'

36 . .Programst ruc tureDiagramisa lsoca l ledDataF lowDiagram.

87. Ingress is a relational database'

P . T . O .CIC-2(E+H)

( e )

Page 34: CIC

88. '0' indicates the presenge of electronic current. . ;

89. Digital is one that is continuous with respect to time.

90. Modem is also called modulator_demodulator.

91. EDIFACT for shipping bills are known as CUSDEC.

92. Cryptography was frrst introduced in 1900 BC.

93. RSA was developed at Massachusetts Institute of Technolory.

94. Access Control Cards are used for programming.

95. Query views are created in database for security.

96' Back-up is needed to dear with vandalism, sabotage or storms.

97. Contingency plan is designed to limit losses.

98. The plain text is also called cipher text.

99. Malicious damage is always done by the outsiders.

100. Interrupt Service Routines are located. in memorv.

ctC-2(E+H) ( 10 )

-

Page 35: CIC

SPACE FOR ROUGH WORK

CIC-2(E+H) ( 1 1 ) P .T .O.

Page 36: CIC

SPACE FOR ROUGH WORK

CIC-2(E+H) ( 1 2 )

Page 37: CIC

fr.qr$.fr.-2(E+H)

qEftiba gt onqfrrr ffi.sn$.fr.1

ffiifrdqilr

qF. 2006

S.nr$.*.-2 z trtFrotWlzl : Z qri qf?rqaq ei6 : loo

ii e :(t) vvql w aar fusar &r d6 rrrcEv+ a at wq ds frW Eo a'ci * ftq a ad rf t i ) wrwi l rcovs+d rMdzi t * )wf rv-+o6r i qM dr *H fu a f dr(iii) sql swl + ri6 aqta d t(iu) vdo vw w *ad W d rar t t qR q6 d .ner+ sa? rr fr?Tn trTq qq dJ ql

err Rq rq'Fi d ss wr w tp ena Eer wE7 1

ifi' {gf{drq (rgq {qr r t so ra)qh : ffifqd raai C s-dq, yw */Aq an fuqw Rq qq d, re-+'C qF ga? d H6d/

d I sd, rar *) rat wzn w riaiftn m:n7 fr elffu qt t qR 4)d cI? ra-r ed add, 6) +ary W rol d ei6a *t I

1. nqa * w++ * w q ffi Sflqr qrcn t ?(1) frE qrwd (Blaise Pascal)(2) qd +Aq (Charles Babbage)(3) sfq Efq dq ("Iohtt Von Neumann)(4) Efrdd gIE+R (Howard Aikens)

z. q6 t*Til "tl-{d (Kilo byte) d{-fl {

(1) 1000 Erfe

(2) 1012 qrqz

(3) 1024 q|{e

(4) 10000 qr{e

crc-2(E+H) ( 1 3 ) P.T.O.

Page 38: CIC

3. ENIAC ST 3T{ I(1) &ifrs ;eliRsd qFuhrq qrg q.qEq(2) {Aeifus iqr qftfrex qqs *egd.gt :(B) {@rtrs =$Rder f;ilfrCsrr grrs dfur(4) {AqiFrs qtRqer sffie{ qre +egrna

4. nnc (s rqrdrq t(1) qrr*l q-qa or e) ffi qqal 61(s) ffiq sT g) Eq{ q.qr{ 6r

5. qs ssf 1trFr+-e) cpu it 3ilqffi qm (tq *t6*o) fr lgm fuqr qrflT t(1) ,ig[{q f+r$ fOis qf{cl (z) F{ge/sTrscge(s) {qrs 1{ryftx) e) q}'qrq H1ga-r

6. t+E{ fi q6 qs qrq rH+eq rd t ,(1) ffi q* {Frste) fi'ltq {fu€{(s) t+tvr (qqFflq) {trq€i(4) q)qTq flrizr

7. qt{qT T*.Rfrq rtsi$rr (3rfF?He dtel qrqq fl :

(1) kfql Bs e) cD-RoM(B) trtfss Fw @) fl-riP+ 5 ::

8. upt(1) fs|q-m {d€ m{rq(2) s.{a gd€ x}efrFr(B) trfur {r-eF4 Q}q@) s.{n r+-mg t*-e

9. *S+f tfeff*O) f{qgf IgS (Winchester disk) 4.t qTrlf,f 6(1) soo t looo MB dfi (D ro t ooo MB tr€F(s) roo t 600 MB dtn (4) r t oo MB dfr

10. qHtdr 68000 (Motorota 68000), qs - fEa ftio qrgdrlQm t-r(1) 8 (D 16(3) 32 (4) 64

(2) dl{c +{(4) Fra{

( 1 4 )

rr. F+qfeba fr t qlq qi q€trIT (pointing) gfu (FsqFq) A ?(1) $dT.n (qft-itd)(3) LCD

clc-2(E+H)

Page 39: CIC

rz. fqr6d F-+eq d wi * anr qfirnuil + is strq + rou - gfr 5Rqrf, tltr t t

(1) MICR

(3) ocR

tqt nrat (Laser Printer) 41 trfr q] qrqr qrar i

(1) errq qfr tsrs t(B) qt€i HR t-srs i'

msc €(1) G.z {W{1-q ve E6'tr{t{

(z) fiqs Fq+{H fu mqrE-ct(B) fig.{€ $e q.qet

(4) ns+z {tr{H t-a oqqot

FTqfufuf, t n *{ qr {i'rd{ CeTr,tTr{iflq) N ftQst {srcd or gRqre otar t Z

*-fftrt $frt{t-g{H (para'el organisatio.l it rffi (qrflmffl) qr Frqfq frt{t qt6r t

(1) sri*gr f+fudl lsra EH{) vt l

e) qtqlq * u-{rdcr frtnqdl qt

(3) R-{fr€q (Encodirrg) {{(4) (1) 31h tzl tii qt

ft {fmi fr+q{ (nonpipelinedprocesso'l* d fr p4q666 fr t frt4 qr € t ?

18. FltTrf,Fild fr t +4 s qrqr q-fldt ii qrqs sq i {dqrd fr-fr t z

(1) LOTUS

(3) JAVA

Le. g12'-rA€ Fr*Fr 1Sffi;e) 41 rfr q-a qrar t r

(1) zGL(3) 4GL

20. q4t t q;t{ qi r{M (+r+q) + qrq qFo v6rq+ (Mnemonic,l qtrqro t+q qfr t I

(1) €HA]qffi (Assemblv)

(3) q-FFd (Pascal)

clc-2(E+H)

(2)

(4)

OMR

S$qzq

r.3.

\4.

15.

16.

(1) MISD

(s) (1) 3I\ (2) +it

(1) Sp = Tr, / Tn

(3) Sk = Tr, - To

e) tq qfr fi541 g

G) flrfi qfr Fffc i

(2) MIMD

(4) SISD

(2) So = Tr, + Tn

(4) So = Tr, * Tn

(2) coBol,(4) FORTRAN

L7.

(2) 3GL

(4) 5GL

(2) qgfr4 lYtachine)

(4) dd€ (coBol)

( 1 5 )P.T.O.

Page 40: CIC

2r. S

* qs q{6 q} nbrtr'T +-}-q fr Tdr ffi qg+} (access values) + fdq F*qld dnT(1) tt (a'"uy;(3) grel ef{q (Data T}pe)

Fqfufua fr t +{ qr d-*$qd(1 )

(3) +

SPOOLING d(1) wfrolFeru qRhrq $5AR1q qfq ergq(z) HEqdh€HH e-€{ eiqte|R *f, -,E-(s) fuqd ER+w sfrqtflR qTa ersq(4) M{rd}fftrq e--€{ qTqH et+ er{+ffid qqftrq dT (oi.t.ibuted operating system) + qrrd fr gw sr{tTRuTr t(1) ft{tr+{Tq (Coordination) fzl

"+i*fQfn (Cooperation)

(3) F-dgi-hfi (T[ansparencv) (q wrg** rfiquT (storage control)F{i t +t+ wzt windows + Hqe td z(1) qg-sT{ (Multiraskins)(2) Efd IdET (Memory Management)(3) gfu nEiqq (Device Management)(4) vql fri] '

(2) EIiR (Constant)

(4) Tt (Variables)

rtsrcs (effqn-d efqtfil t z(2) NOT(4)

23.

finst (word processors; *'I

Etq sTiq-s) (Data) sr 3JTITUI

2G' 6qc{ R€q fusrq (evolution) fr (R sl?I (second era) d qq66o stqemutT 6r lqdqg B l T t

c \ - ' - r - r \ r \ D v v v t l v E t a ) r r r - l l ( l l ( g f l \ : r l l

(1) hdR-d dl (ni"t.ituted Systems)e) 3TflffiH-B-{rgi Str}ftqfr (Object oriented Technotoey)(s) FfrI (Batchl tiqTe];I(4) qg-nldrFl

27. s-q qw (cASE Tools) 3ilq-d{ Tr HqRrd to) sM +'+q + e) so"c t(3) cPU t G) nrsc t

29. Ffg{ite (Spreadsheets) eil{ TdERr fuqr qr RF-dr d

(1) tF.trTl-td{ (Compiler)

Q) frtru-s (qartr {)(3) tv e-w (CA5E Tools)(4) B|.{iTfus grfl qtriq (Dynamic Data Exchange)

CIC-2(E+6;

-

( 1 6 )

Page 41: CIC

zs. gqi t dq w +cr *oft qr lewr rd t z(1) 4.qf{fl (Compiler)

(2) qF+{Tf, +qtd{ (Application generator)(B) Rqd +fta(4) f+fu vorq iir (kktr{ qqtC fu*zql

80. Q{{ q*s ++q (rrAL) ffi 1g"r,u'ation) de q,l g-fldruT t I(1) 2 (2) 3(3) 4 (4) 5

(2) 7

@) 32

sl. 3risgr {qR (srer *uF+{H) + fuq Ascrr qndi fr {Rqrd di ErA ffil oit'l ql €@T\

7a

(1) 8

(3) 18

sz. {q-q 1*-qFrt{H) iTd qT fud'fi (simplex) qts ffii + stn.rr 61 si-Jqfr tdl B(1) q{ Rvrr ii(2) qs {Trffi qt !:s 8 R{n fr(s) qs fr qrrq qtfr Fflreii fr(4 ) r+ f r t f f i t iA

BB. I,aN ii qs A dq-d t z ftf (Nodes) + qtq cqKr t qrEr {fr fr-fr t(1) 100 m (D 1 km

(4) 10000 km(3) 5 km\ ^ ' \

34. ZltF;T I$t (Token Ring) € 9S(1) uN zlqt*$(2) LaN ft*'q iqg (a.."ss method)(3) fr.'{FT+{H sTfH++qT (Communication architecture)

@) LAN 6rd+{i

sE. qffiic ffiflr (Circuit switchins) + fdq elq qr gr;zl q{q (step) ?6? t ?(1) ffi q*S qf$-{d (Network Access Password)(2) qBz dffi€ (Circuit Estabtishment)(3) 3|Zf qiqs'{ (Data T}ansfer)(4) HffiZ Zffi+flq (Circuit termination)

36. EDIFACT T(1) sqtr*flq TH (Communication Standard)(2) {2d E!-sqi €<of (Retail Industry Standard)(3) c€d qft qgFfF{*|4 !tr tr (Standard for Administration and Trade)(4) gFSfrW4 +€d (Tlansmission Standard)

CIC-2(E+H) ( 1 7 ) P .T ,O.

Page 42: CIC

s7. Tildr tte ffirr qks srfl fuq$ q) K-{tqR 1@r+vn) Fqrrr qr t, qO t(1) NICNET (D BITNET(3) USENET (4) I.NET

sB. frIqfrfuf, fr t qt4 qT qsd p tix (sinele crypto system) 6,r f6Fqr t ?(1) gfumH{H e) qqRzz.WTi(s) ru eil-r tzl tif @) nsa ttrtRq

se. qffie qt +F5-s if qrq lqarfrFzn) trRr srcT qq+q q) qrq s.{i qi qFffir t(1) sraf *fr{ (Data tapping)

(z) ffiekq (Cryptanalysis)

(3) ffi+Si (Cryptography)

(4) d}-q (Leakase)

40. 6 6q*f*r +'Jrq 6i 3iqqnw qq$ rdA ffi * pfr ?(1) til€ Rn€ (Ronald Rivest)(z) fuM qtrf,iq (Leonard Adelman)(3) sTrR Yrft (Adi shamir)(4) sf4 Efq qfu (.tott" Von Neumann)

4r. q1-q1 ffi t-ffi )€ (posr) qd fdwr A(1) qfut Gootine) ST(z) lafrh'r 6r(s) f*'dlq1 6r(4) fdKfl miqq (Disaster Management) EFT

42. Boor {frfrd qrfls fd,q s,r{fi 6 qrnFdd s'{frr i ?(1) COMMAND.COM (2) IBMDOS.COM

(3) GENERAL.EXE (4) AUTOEXEC.BAT

4g. fu 0,"r,igh) qr{w .(1) v{0 qdd qTFbSr+ t qk€ ii eTrqr(z) C+zi{r q{fr{ t xqfd-d d(s) *-+o .nxn sEdi s) A qqrFqf, +-wr t(4) iqe conaMAND.coM q,r{f, d 6 ${Hd orar t

44. grcr EFfrc{rq rH (DES) QgtRq (Aborithm) encrypt 6{i * ftTqrt-s dfr-*.l carar i r(1) 8 bit Q) 16 bit

(3) 32 bit (4) 64 bit

C IC-2(E+H) ( 1 8 )

Page 43: CIC

45. trFffi f{crdf ii ffi Risk * q6qm{r frq fr t f+-r6r q+ Fwr t z(1) ffFFT{TT tg (o"nnition phase)

(2) fSTfl tq (nesien phase-)

(3) riwrid ffi€ (Functional requirement)

(4) EFWt*flq (Implementation)

46, aR+rfTIq (Vaccination) frrT t t ffs6r qs fdwr t ?(1) ffi+Si (Cryptography)

(2) td-qfqfq frfl-q fAnti-Virus program)

(g) ffrqfg{ ffi (Disaster Recovery)

(4) ffiRz1 tgtRq (Security Atgorithms)

47. iFE (cruvity) qt-fl€ d qO q} o-O qr-dr t(1) €t€ (Stoned)(2) tfr qdt ff (uuppy Birthday Joshi)(B) gT* q+G{ (Dark Avenger)(4)' tndq (Raindrops)

48. FrqRrfuT fr n dq qr qrflq .ExE silr .coM qr{d + sTrfiR +1 q.aror t u(1) +NsIHr (Marijuana)(z) tTff (Raindrops)(3) i{,,-q-Aq (Jerusalem)(4) *I (Brain)

49. kqr€{ ffi (Disaster Recovery) {ioifqq .

(1) qlqqT fr 6ET t(2) ffi +1 or+n* o.ri t(s) (1) e*t (2) Ait(4) r+n t fr.$ qfr

50. *fr+$r ?iq-{r or seTq i(1) mtq eT \'ffiH vq0 wiqr fmFcisd t sA €js{r(2) Erflqr sT @-FrT(3) 6.ttc-{ Sl R-{c (Reboot) tF-trtT

(4) R-qret + ldq ffiqR qfu +) gFrR+a mw

CIC-2(E+H1 ( 1 e ) P.T.O.

Page 44: CIC

Er rdr{q Ffr t ril qtrfi (ss{ ri. n t roo rq')

qlz : a?A sosel'Rq qq d t qE fqqr rqr qqa s& d d l eifu al, qaw ss +PII7w o eifu rt, qR qr+ ,rdd dl t

bl. {{ {dq (von Neumann) etffimt q fufr or yd.+ Re fqiT ffi +t voqf,I tq*s fqqr qr v+m t I

52. ffiF{prd Ek{ (Differentiar ensine) t fdq qcT fr ersrE (output) q} q4, fldqq gfu (card punch device) 61 tr qTT f*qr qr vqc'r t I

53. ENrAC qs rffrq qlEl oqa t r

84. 8080 qrg*Jfr+gt qHtf,r (Motorola) arir fudfud f+,fl 'rqt elr t

Eb. Mc 68020 Fq tcr'ip) Sq{ +.qei qr Rwr t r

b6. ffi qRd (Memory parity) lE luoo',6d4{r 61 frsra-dpi 6r qs r+aruT d r

57. cpu rfugt (Register) |f,fiffi (Secondary) ffi + Hfq fr+ sTqHfrqT q-Cm d I

b8. ffi (vr"-ory) S qr+r (ffi) * w qri qr srer rfr qqr qrfr sQ derarw eotqror t I

5e. PRoM qS qR a rmsr qr ssf,r t I

60. .Filq1 kg q* Nqkq ffi Gti*ary -o-ory) t I

Gt. Rfqi }. qqA fr {+Fqd qSt (.or,."ntric cycles) d fr+-s (sectors) 4-6i qror t r

62,. 5s R@ qq (is) qr A-s s1 qiR{q oG fo'nt) qT srrq €r+ ar{q (seek time) ddT€ l

6s. ffirzT (Winchester) BFh, +iEH $fffiT{g (Masnetic oxide) H'I E{t ehr t t

84. s I sq q.r Ske kw errsflr 6b0 MB sl-cl 6T qsnq q-q irq,ar t r4

6b. s,fF-+-d qR ts sr&6 (Readers), eir{*fr fs-ffit * wq qTfr E}i t t

66. cAD qs q.qdr +1 eErirdr t q-{r.Rsr{q t r

67. S"-ie (Inkjet) fier qs rh-Fd€ (non-impactl Fjat t r

CIC-2(E+H) ( 2 0 )

Page 45: CIC

I

I

II

68. qr{t<R 3n-<{ITs (ParaIIeI interfaces) €rilqd\ {t qq5t t F|--if qi frEi + l-dq x3tr

t6q qrt t t

69. qzT d qTfii-+qi (Data flow architcctures) stso eTfit+q{ dil t t

20. ffi es (Memorv Buses) tHfi 31h cPU + fiq ercr 6 erf,{ul oifr t t

7r. zT{c-s 6,qq€ (Tishtly coupred) d-i t {tqd (sr,ured) tq-fr (memory) d|fr t r

72. qlqq-dT{fu frfrfHq R€q 6r W-d (throushputl StTRf,T t r

73. Rrsc q{fr{ q1 q* {fr (cycle) if z fttqii q]1 FIETr{f, q-fr q;{qT qrFoq t

74. qFd*ql-{ ffi fusq ffi 6r qs fowr t r

75. tg{ ry"r,tura) (s o'P tts t r

76. FRAMEwonK qd-fttR{, ffie' qzr+.q tp }35dru !-drm +l q}-'s-dr t r

77. sa1 ii{l-tt, q{fra d?+q fr'Jrq t qr<t qd e.rrT 6{dT t l

78 .6qr { f , {+1ge-+ i { f i rd .T iEM{(debuggrng)4Gt rdqw{ f i z Ie rwr t r

7e. sQL HqrT qd si qrqr t&ql t r

80. xon qfr t qf( {TtI gB +ii aif,s q-fr t r

8r. If-then-else €r{4r \rs qqfrq (qfr'T) ffi t t

Bz. xm * fetq, x q6 q{ (variable) t 3i{ v q* rqrd 6r qrq e' I

8s. t6i*€ EfF€{ (Resident Monitor) y-qq riqfe' (Batch processing) * qrq qW Etdr t t

s4. frq-qs4 (Pop-down) t1 +1 tr+K dw (Dialog Box) fi 4-6r ql?n t l

85. qKrf,r cur * fdq qfi.1+{{ m4tq €z{hs (API) }q-f,qi-a qqErq{f-{ (Development

environment) 6l qS 3tqT t I

86. iq.1q q+q{ gFnflq (Program Structure Diagram) d g.fa W} gfqfq|{ (Data Flow

Diagram) fr o-O qrdr t

87. gl$ tksress)(S qmf*f{ gfdi{g i r

( 2 1 1 P ' T ' O '

Clc-2(E+H)

Page 46: CIC

88. 'o'F&ETfrs qtc qi sqR fd +) qffdr d r

8e. EfueT (Disital) {d t q} vqq * w}qT sild t r

e0' {)tt 6aoa"-) +} r@E{ fr@z{ (Modulator-Demodulator) s q-or qrdr t rer. fufu'r fuw +' leg pnmncr +) cusDEC * sq fr qrfl qrlmr t rs2. FfreDqi q) s{S .r5d rgoo S.t fr rqa fu+r rpn qi Ie3. oto, $sq@v Ef€e.T. e:fs &ilffi ffrr) q ffid fu-q,'rfl en rs4' qqiq

"tr srd 14"""rs contror cards) 'T + rmq Fdq,- dt t r

eE. stzT+q fr qo""y views +r ftrrlur g{ffi t ldq fu+r rqT d Ie6'

*t,(Back-ur)+1 $FTd 3r{Eltfidl, trtoie q eriql dqi eilqFFif sr Hrrtr oc t req

e7' 3-6sH d qifud Ri + liTq sffi (contingencyl qlqfl (plan) +) rsTgq fuqr rrqrEIT I

e8. qlelRur (plain) qqqivr +) E-afubd qi{qivr (cipher text) rfi o6r qror t. ree. F*qti T+.qH 6tvr qr{fr trdl ERr fuq qrdT t I

100. 3T<Rrq tqr ftos Hffiq) 6A{, irrft 0vr",,'o"y) fr qrq sni t, r

CIC-2(E+H)

-

( 2 2 )

Page 47: CIC

<s ord b fre s{6

clc-2(E+H) ( 2 3 )P . T . O .

Page 48: CIC

tq'irrd s. fts d{r6

CIC-2(E+H) ( 2 4 ) 5,000

Page 49: CIC

CIC-4(E+H)

CERTIFICATE IN COMPUTING (CIC)

Term-End Examination

June, 2006

C I C - 4 : T H E A P P L I C A T I O N S

Time : 2 hours Maximum Marhs : 100

Note:

(L) Do not start a.nswering until the inuigilator asks you to start'

(ii) Question paper contains 100 questions. Stud,ent is required to answer all the questions-

There is no choice.

(iiil AU qwestions carry equal marhs'

(iu) Each question must be giuen one qrlswer only. If more tlt'an one answer is marked or

giuen, zero rnarh will be awarded for that question-

A Multiple Choice (Questions number 1 to 50)

Note : Four choices are giuen fbr a question, out of which one choice may be correct. Mqrh

correct ansu)er- in releuant column of the answer sheet gi;uen to you. In case you feel that

none of the choices giuen.in a question is conect, marh in, column '0'.

l. Which of the following DOS commands deletes a directory and aII the frles and

subdirectories contained in it ?

(1) del

(2) rd

(3) del tree

(4) removc

2. EGA and VGA are the names of

(1) Network adapters

(2) Graphics adapters

(3) Sound adaPters

(4) Motion adapters

CIC-4(E+H) ( 1 ) r P.T.O.

Page 50: CIC

3. Which of the following is not an operating system ?(1) UNTX(3) LINIIX

(2) XENIX

(4) ZENITH

.EXE file

.CPP file

4. MIS uses which of the following department(s) ?(1) Information Reporting System(2) Decision Support System

(3) Executive Information Svstem(q AI the above

which of the following applications can be seen as accessories in windows ?(1) Notepad e) Calculator(3) MS Paint (4) AII of the above

PIF stands for

(1) Program Internet Files(2) Program Information Files(3) Picture Information Files(4) Picture Internet Files

which of the following is a main feature of authoring software ?(1) Integrated Multimcdia Elcment(2) Script Language Programs(3) Supporting Video for Windows(4) Al1 the above

o.

6.

t .

8.

9.

The following is not an executable frle :(1) .BAT file e)(3) .COM file @)

API stands for

(1) Applied Programmer Interface(2) Application Programmer Interface(3) Applied Proccdural Interface(4) Application Procedural Interface

10. EDP stands for

(1) Electronic Data Programming(D Electronic Digital Processing(3) Elcctronic Data Processing(4) Electronic Digital Programming

C I C - 4 ( E + H ) , ( 2 )

Page 51: CIC

).i

t;:, 11. The ISO-OSI model of networking contains

(1) 6 layers e) Z layers

(3) 9 layers @) g layers

12' Thc nctwork in which the existencc of multiple autonomous computers is transparent (notvisible) to the user is

(1) I"AN (D Distributed system

(3) wAN e) None of the above

13' The governrnent users have the following choice to connect to other networks :(1) VSNL e) Ernet

(3) SATYAIVI (4) NOW INDrA

14' is a pr-oduct developed by Microsoft Corporation that enables groups toteleconference using Internet as transmission medium.

(1) Net Meeting e) Video Confcrencing

(3) Cool Talk (q Internet phone

15. EDI system has a mdih,cornponent as

(1) Application Servicc (Z) File Service

(3) Mail Service (4) Wcb Scrvice

16. which of the following graphics frle formats is not supported by web ?(1) JPEG Q) PNG

(3) GIF @) None of the above

17. PNG stands for

(1) Portable Nctwork Graphics

(2) Picture Network Graphics

(3) Perfect Network Graphics

@) Picture New Graphics

18. which of the following is not a part in powerpoint,s Insert option ?

(1) Language e) Chart

(3) Comment (4) picture

crc-4(E+H) ( 3 ) P.T .O.

Page 52: CIC

lg. To enter a formula in a particular cell of the worksheet in MS-Excel, you have to frrst :li

type :

(1) $

/'a \

20. Cylinder/Cone/Pyramid chart in MS-Excel creates a chart with

Cylinder/ConelPyramid shape.

(1) Column

(3) 3D

2L. Payroll System includes

(1) Generation of Pay-slips

(D Calculation of PaY

(3) Calculation of Overtime

(4) All of the above

22. A database system includes the following components :

(1) Data and Users

(2) I{ardware and Software

(3) Data, Hardware and Software

(4) Data, Hardware, Sofbware and Users

(2) #

(4) &

(2) Bar

(4) Surface

(2) 600 MB

(4) 100 GB

23. A CD-ROM can store upto

(1) 1 TR

(3) 200 KB

24. Corel Draw is a

(1) Graphics Package

(2) Database Package

(3) Multimedia Package

(4) Word Processing Package

25. EDI creates the following fiIes as a document passes through the system :

(1) Integrated format frle

e) External format frle

(3) Transmission file

@) All of the above

CIC-4(E+H) ( 4 )

Page 53: CIC

26. MS.Excel is known for

(1) SPreadshects

(2) Spreadsheets and GraPhs

(3) Spreadsheets, Graphs and Databases

(4) SPreadsheets and Databases

2 7 . T o c h a n g e t h e f o n t s i z e o f t h e s e l e c t e d t e x t u s e t h e k e y _ i n E i c e l '

(1) ctrl+shift+P Q) shift+P

(3) CtrI+P (4) Shift+DeI+P

28. Intel is a company that manufactures

(1) Software Q) Processors

(4) Network EquiPment(3) Cables t+) r\eLwurr'

zg, What is the name of the latest Server Operating System developed by Microsoft ?

(1) Windows NT Q) Windows 2000

(3) Windows XP @) Windows 2003

30. Applications of Hypertext are used in

(1) Computer Applications (2) IJusiness Applications

(3) Educational Applications (4) AII of the above

31. what is the address given to a computer connected to a network called ?

(1) System Address Q) SYrid

(3) Process ID (4) IP address

32. DireclX is a

(1) Graphics Package Q) Word Processing Package

(3) Uscr Interface (4) Programming Language

33. OpcnGL is a

(1) ComPuter Part

Q) User Interface

(3) ProgrammingLanguagc

(4) Software that drives graphics hardware

g4. Which frle in MS-DOS contains internal commands that are loaded during booting

process ?

(1) Io'sYS Q) MSDos'sYS

(3) CoMMAND.COM @) CONFIG'SYS

c t c - 4 ( E + H ) ( 5 ) P ' T ' o '

Page 54: CIC

s5' which of the following is a database management toor developed by Microsoft ?(1) dBase e) Access(3) Personal Oracle @) Sybase

36. IISAM stands for

(1) Ilierarchical Sequential Access Method

Q) Hierarchical Standard Access Method(3) I{ierarchical Sequential and Method(4) Ilierarchical Standard and Method

37' is not formal enough to bc implcmcnted directly in a programming languagc.(1) Analysis model

(2) ER model

(3) Object-Orientedmodcl

(4) Object-Oriented Data model

38. Size of a database is usually measured in terms of(1) Terabytes

(3) Databytes

39' what is the name of the 64-bit microprocessor deveroped by AMD ?

40, While using Excel, a workbook can have -- worksheets hy default.(1) 15

(3) 10

(1) Opteron

(3) iMac

(1) 82 and 36

(3) 80 and 36

(2) Megabytes

(4) Gigabytes

(2) RISC-2000(4) Athlon

Q) 16

(4) 2

(2) 90 and 30

(4) 80 and 30

41. A I.44 MB floppy drive has tracks per side an{ sectors Ber track.

42, The public key crypto systems make use of(1) Encryption and Decryption

(2) Replication

(3) Duplication

(4) All of the above

clc-4(E+H) ( 6 )

Page 55: CIC

l

43. HTTP stands for

(1) llypermedia Text Transfer Protocol

(2) Flypermedia Text TYansmission Protocol

(3) Hypertext Transfer Protocol

(4) HypertextTlansmissionProtocol

44. A protocol is

(1) A set of rules

Q) A set of data

(3) A set of information

(4) All of the ahove

46, A file which contains readymade styles that can be used for presentation is called

(1) AutoStyle

(2) Template

(3) Wizard

(4) Pre-formatting

46. PowerPoint 2000 has number of views'

(1) 3 (2) 4

(3) 5 (4) 6

47. Animation schemes can be applied to _-- in a presentation.

(1) All slides Q) Select slides

(3) Current slide (4) All of the above

4t. In Microsoft Excel, the intersection of 3td column and 8th row refers to'the cell

(1) F,iz Q) D8

(3) CE G) E8

49. Which of the following is an oldest spreadsheet package ?

(1) VisiOale Q) Lotus l-2-3

(3) Excel (4) StarCalc

60, How many characters can be typed in a single cell in Excel ?

(1) 256 Q) ro24

(3) 32,ooo (4) 65,535

c tc -4(E+H) (7 ) P 'T 'O '

Page 56: CIC

B state whcther Truc or False (euestions number Er to 100)

Note : 'In the following 50 questions, marh 1, if the statement giuenis true and.0 if the statementgiuen is false.

5r. E-mail is considered to be a safc mcchanism for data transfer.

52. DLL stands for Data Dictionary Link.

53. Dumb terminals are tcrminals without CD-ROM drive.

54. Microsoft Publisher helps in preparing documents.

55. Data can be stored only on one side in a CD_ROM.

56. Coaxial cable has fastcr data rates than fibre optics.

57' For communicating through EDI, the source frle should be conlerted to EDI standardformat.

58. MIDI stands for Musical Instrument Digitar Interface.

59. Microsol't Access is an example of RDBMS.

60. A CD-ROM can storc maximum tgO MB of data.

61. ATI\{ stands for Automatic Transport Machine.

62' SLIP and PPP are TCPAP protocols used. for connecting to Internet through modem.

63. Telnet is used for transferring file from client to server.

64. Outlook Express can be used for sending mails.

65' The Text field can be used to store alphanumeric characters of length upto 25b bytes.

66' QuickTime is a multimedia software suited for synchronizing sound tracks and video tracks.

67' An example of a program that has a built-in programming language is knowledge program.

68. DSS stands for Dynamic Soft,ware System.

CIC-4(E+H) ( 8 )

Page 57: CIC

69. A floppy disk comes only in one size of 1'44 inches'

70. A LAN means creating network covering large geographical area'

71. The limit of speed up is defrned by Amdahl's law'

72. Forecasting problem is a natural candidate for parallel computing'

7g. MIS is designed to provide MaiI exchange service on Internet'

74. To provide accurate, timely and relevant information support Information system is

needed.

75. Like CD-ROM, a laser disc uses the same recording media'

76. SVGA card stands for ..Super Video Graphics Arrays,,'

TT.Twogenera lschedu l ing techn iquesareGant tchar tsandBarchar ts .

78. Graphs is not a section in Lotus Organizer'

79. CTRL+J is used to align left and right margins of a page'

80. vsNL now offers Gateway Electronic Data Interchange service - GEDIS Trade Net to

Indian Subscribers'

81. PERT stands for Program Evaluation Review Techniques'

82, Application service sends the document in the internal format file to the Translation

service.

83. EDI services are Application service, Translation service and communication servicc'

84. DOS system frles include AUTOEXEC'BAT and CONFIG'BAT'

85. MIDI stands for 'My Indian Digital Interface '

86. Animation makes the presentation light and attractive'

87. The transport network provides a powerful electronic message service to support EDI

services.

c l c - 4 ( E + H ) ( 9 ) P ' T ' O '

Page 58: CIC

88. Gopher is a menu-dnven search engine. , , :,,, ,: : ,

89. Hypernet is a Hypertext browser for FTp accessible sites.

90. Mosaic and Cellar are browsers for Internet.

91. VPN stands for Virtual public Network.

92' Two networks having different network operating systems can be ljnked to each other.

93. Internet is based on client_server technolory.

94' Integrity refers to unauthorised modification of information.

95' Primary key identifies each record uniquery in a database.

96' swIFT stands for society for worldwide Inter-bank Financial relecommunication.

97' The linking abilities of Hypertext are ideal for the learning of foreign languages.

98' :rfiJr*tt""Jr.

has two main forms : scenarios based simulations and telephone based

99: Fax provides an interactive interface to the user.

100' video confcrencing is used for online mectings and conferences.

crc-4(E+H) ( 10 )

Page 59: CIC

SPACE FOR ROUGH WORK

( 1 1 )CIC-4(E+H) P . T . O .

Page 60: CIC

SPACE FOR ROUGH WORK

CIC-4(E+H) ( 1 2 )

Page 61: CIC

fr.sTr{.fr. -4(E+H)

nEfube rq 6,'qfdTl ffi.3n$.fr.1

srid qfien

ET, 2006

S.flr$.ff.-4 z srgquiFr

WIzl : Z qot qftrffiq ai6 : loo

i e :(i) wif qr wt fuwr d6r d6 qz{rry z ol qq dq frfleffi gqF ar? + frq a ryd I( i i ) w tw t r co rwd rM f f i d l s ' , f ' swq r l q f f i d r+ l d f f i ad ' d r(iiil sfi wif + oim sqn d 1(iu) xd+. yw w *qe qa drar fr rqR \q t etfqo sil0 T{ fqwq alnq w at qr

rar Pq 4q di a) rs wr w Ea eia Eqr qgqr rtr q6k+.fl (vw {qt r t so ro)qb : ffifu7 srd) C xto yv+ +rfo qn @ pe 4q d; ma 0 C*' €d F) v6Flr

d I v-d rar +) rf,r vtzs w riaiftn 6n7 f oifui of r qR *ld * vrt +rd rd6), 6) wry W rot t iifu ql t

r. FTq it t slq qT qd oos qqis q+ grqMr sftr ss+i v*sniEefr s1 €sfr srE-d +)Fa<ar t ?(1) del

(2D rd

(3) del tree

(4) remove

z. rca qh vce qrq t(1) @ ts.Tt +(z) iffi-ffi tsqt +

' (B) Hds tgq{ +(4) igrq (Nlotiorr; {get *

clc-4(E+H) ( 1 3 ) P.T:O.

Page 62: CIC

B. ffifuq fr t +{ qr gs FrRFr ilq (s:fqtEr fuemy ild?' t ?

4. nrm frqfuka q t 6tq w f+rFr (Mta) gdqrd ocor t Z(r) $qfi{rq RqiE r fuRF(2) fsffiil{ eqtj fugq131 qffit+{E-q qqTil{lq fugq (Executive Information System)(4) sq{i6 qS

E. ftrr fr + dq eT qFd*ITq, mq (windows) q qffi-q (accessoriesl * os tf tor qrv+nr * z(1) ibqs(3) MS t€

G. PIF .FI BTtf t(1) n)'ltq F€{iz r6r$iq(2) fr{'u gesTsqq w{w(3) fu+q{ f+i*flq r6r{w(4) fr+qr F"{tc r6r{eq

7. iiq q v q;qt frea tSqfr,Tl ffiqr 6r g€q eeTur t I(1) qFuDs qfteqlR-qr qffi€(2) |wq +raq x)'Jrq(s) ffis + feq sdr+s qiH(4) sq$-s q$

8. ffifun fr t +{ el !$ ffi (executable) r6r{m rd t Z

(1) UND((3) LrNrX

(1) .BAr q'r{f,(3) .COM Er{f,

E) XENIX(4) ZENITH

(2)

(4)

(2) .EXE ql{f,

(4) .CPP Sr{m

t€St-ersqdffi q$

9. API .F'T 3ftf t(1) qqr{s nt{rq{ F€Gq(2) qlqtflq *fl-qt E-.Tr+q(a) qqr{s }ikqrd Fathq(4) qffiH mkqw Eurhs

lo. EDP iFT erei 'F

(1) fufrs sra qbrtr'T(2) {WFrs lsfwct e}fifr,7(s) fuks sra frqfr,T(4) {Wfr6 fufsa-d nrqTfr,T

CIC-4(E+H) ( 1 4 )

Page 63: CIC

11. teqffi-T *(1) o iqt(3) 9 c|qt

rso-osl *s€ fr(z) z iiqr(4) e A{r

(1) JPEG

(3) GIF

17. pNc t q-coq d

(1) q\fdd ffi nFFN

(z) Fr+q{ W }ffiw

(a) q{+€ ffi nfrw(4) tr-+q{ q ifiFffi

(1) dr+-q (Lansuase)

(3) 4fq 1go-ment)

CIC-4(E+H)

@) -qt-s fr t +ti q-fr

(2) Ernet

(4) NOW INDIA

(2) qfd (ctrart)

(4) FI+q{ (Picture)

( 1 5 )

12. e-r ffi Fqn E€qrd q-{i eT-a * rdq q)-$ Elqf, 4qeit dt 3qRqfr qrK{fr (r{€-dr

r8 t) a-fr t, t(1) LAN

(3) wAN

(z) ffifl dT

r3. s{fl-fr 3qq}mFii * qm 3nq qffifrit 1M) t dgf + ftq Fffifdpild it t nr gE-*r \ ^

€ /

(1) vsNL(3) SATYAM

14. q11dpiw sTqfuI+ (Microsoft Corporation) $I ft{ln qs s-flrq q) q+ qTI ({q) 4}'

{€{+c d €qR qrrqr{ fr nre ffi";+ g erwr*t+ (rereconferer'.") s-G frq

q{rar t, {6 t(1) fu qlETI (Net Meetins) Q) ditr{ii q;T4iF{Trr (video conferencing)

( 3 ) { ' f , d - S ( C o o l T a l k ) G ) E c f i z f r q l r n t e r n e t P h o n e )

rb. pu fsgq ii qd gq Er-s * sq fr t

(1) qFdailrq tqT Q) ql-{d iel

io srs (t€) tqT (4) tq twuul t*

16. frEq it: t qt{ qr }Fn+tq qr-{ qtk tq ffuu) mr qqfta rd t ?(2) PNG

(4) *€tr fr t 4\$ Tfr

18. f{qqi u,}q q1 qqq-5a(powerPoinU* *g-J 3{IqH (Insertoption)6lfdfqr rd t Z

P.T.O.

Page 64: CIC

le. Ms-Excel q q-ffie + ffi fqfus +d t w sTtdr +) srdt + fdq q]d_S qdA orTr+)Frr e6q +-cqr fr elqr U(1) * , r , #(3) =

@) &

20. MS-Excel fr Fsftrsrz+t+zfrtfrs qrd, frfufi/+tqrfttfus erTFfd Erml qs _ qd(1) 4ff,q e) qR(3) 3D @) v6q

zr. tte e.yroll) frw fr ITrfud t(1) y-cr+zt-at +i {#q s.r firdre) y-onzt-ra 6l Tulqrr3.r 3nE€TSq ;f[ rfu;qf

, : (4) sq{ffi Hq

22' qs glerilq Rsq frq q t +h qTzt T-s yrFrd q.rar t ?(1) era eil-t sq+sT

e) drslq{ sil{ ffi{l r

(3) wa, 5rd*+t silr ffiqi(4) sra, 6rd|+1, Tfq-+€R s,N sqqtfrT

23. qs CD-RoM --- n-* sisruur fsdll q-t qqar t, r( 1 ) 1 T R(B) 2oo KB

Q) 600 MB(4) 1oo cB

24. *)te gf (Corel Draw) (S.(1) ituw q+q d(2) qerAq tt-q e(3) qffitrqr q}q A(4) yr< €ffier{ (Td q}Sfur) q*q t

zE' f-q q t +{ qi qrre +} EDr q;r.r t vq q-s ERr+q fusq fr t ycor t z(1) Ffu},}s qfilz srFf,(2) qw-6id sTqe sr{d(s) pivfrvn w{d(4) Bq{il qqi

ClC.4(E+H)( 1 6 )

Page 65: CIC

2,6. MS-Excel ql qF{r qrar t(1) dern-4s + feq(2) +i={t6 3Ih lrsl + lf,q

- (B) ffiry, nTsT 3+r <rzr+q t lf,q(4) rlsriqq sTh sredq + fuq

27. Excel ri ffi qqp* q-{qieT s eqr{ q sTrq'R ,n q-qf,i + ldqq*nqrd od t r(1) Ctrl+Shift+P

(3) Ctrl+P

28. sle w 6qii t n Ftqiur qrfr t(1) *fwdqr or(s) *etii 6r

{si w

(2) Shift+P(4) Shift+Del+P

(2) {igffifif (Processors) i5l

(4) qRrFrI gffiql +l

2s. q{drqTE (Microsoft) gRI Tqfrffrd {rd1 (s"*"r) FItFT ciT (operating System) q.r HI TIqr \ ^

E !(2) Windows 2000(4) Windows 2003

Bo. 6rqqr}€ + 3r{qq}il 6r {frft{ fr-dr t(1) 6.qc{ rurq}il t e) qrqR srgq+il fi(B) dtfiTs q5q+,t fr @) sq$r H$

sr. fs qrcmq f#l n E.3 q,q5 6i qi Td'r (q^+s) fflr qrdr t, sfr 666T qmr t(1) REq q* e) q]qfrs (syTid)(3) qY+H ln @) rp gls

32. DirectX t s.(1) nFFw qhq e) Td nl$fg'r q+"d :(3) qs TR Fzrt:s G) qs qffiiT d"ilq

sB. str4cl, t q*(1) 6.tr{.t 6r siYr(2) qs srqlffi F.{hs(3) q* ffitt rTlqt

.,(4) trs {ffiqr qi +Fn-+iq ETdaq{ +l =rerar t :

s4. MS-Dos s1 slr S qr{n fr sridfus 6qis dA t qi {trT qfuqT + d{H lde t qI cils(Load) th t Z . :(1) IO.SYS Q) MSDOS.SYS(3) COMMAND.COM (q coNFrc.sYS

(1) Windows NT(3) Windows XP

CIC-4(E+H) ( 1 7 ) P.T.o.

Page 66: CIC

86. Frq fr t qh qr qr{*t{f€ fl{I ffifr qd srcdq Fit1{ (dM€) Ef, t ?(1) dBase (2) Access

(3) Personal Oracle (4) Sybase

86. HSAM t R-e-q t(1) q-il-{ffiFrs %{frtrs sTFTrrq q"nfr (ETrffi{m kdt{qq q+t* ttr*l

(2) q-{Tmlqs qr+q e+Frrrq Turcfl' 165affiro g<i q*q qglsl

(3) qqTE-mfs 3T-{ffiFffi 31h stnei (Er{rffiq-d @Rrtm gs tqg)

(4) qqTfrtrs qr++ ei{ qundl filqGrd N lgs isrs)

s7. ffi xffir +rF fr Sq fi ant di + feq srrgm sffid qil t r(1) tq|IRR|q Ef-w

Q) ER {gf,(g) sTF]-dqq-3TfqlRf, (object.oriented) dRT

(4) sTFreH-3TrqrR'f, srer dsf,

38. qTrmur nt{ qr glul+q 6r qrfi qrqr qdr t(1) 2{tni'erq (Terabytes) it Q) trT|qr$€ (Meeabytes) li

(B) sffqr{€ (Databytes) tt (4) FTTTHE-{{ (Gisabytes) i[

Be. AMD sm ffid 64-bit + qr{*)frSw 6T FtT rrq t ?(1) Opteron Q) RISC-2000

(3) iMac @) Athlon

40. Excel {trrfl?T +rt gU qfffiq (Eqt-iz) * enr q6 6r4-5ftr6r t srdqr6a v + a e r(1) 15 Q) 16

(3) 10 @) 2

4r. q{ 1.44 MB fr wfq1 Gloppy) gr{q q trd Yfd ql-{s ffir Qted

x r d e s d i t t(1) sz 3ilt so Q) go *t ao(B) so 3ilt so e) ao s+t eo

42. s{ :iffi ffi dr 1qffi+-fr-F*e} meq) SRqq qtwr t(1) Wd€a nqr FTtt (lFffiqn qrs df*wn) ut

(2) Rffififlq (Replication) EFT

(3) gFf,+TTT (Duplication) tFT

(4) 3q$ifi qlfr

clc-4(E+H) ( 1 8 )

Page 67: CIC

-

48. HTTPEI ffi E

(1) 6tqq{mfgqr }w qiqs-{ idisi€

e) 65ffifur 2w ?iqFffi{ ieH-d

(3) ETqqr}€ ?iqqr melqf-d

(4) Elqqrlw ?tqFNTq ffid

qs ffiafd t(1) ffif 6s g+ {q-q

e) sffi 61 q6 riw

(B) Wileit 6,r qs {iwr

(4) w$6 qS

46.qssr{€ge.itq{r-qarqr(tsts)€r{daff irt ,RTqfi-6{gr+frqF€Hf,|+qrqt

"*t t, sil 6Er qrdr t

(1) 3frztgr{d (AutostYle)(2) tdc (TemPlate)

(3) ffi (wizard)

(4) fr-qt{ftlrr (Pre-formattins)

4&, qT6rqqt*z 2000 (PowerPoint 2000) it {(views) dit t t

(1) 3(2) 4

(3) 5 (4) 6

47.q+$Etrf irurfrqr4i{qtqqd(Animationschemes)ET[aq{frt. (1) q$ wr*ii fr Q) gfi g{ KT{iii t

(s) {ftq Kr{s it (4) gq{F qs

48" qr$** \,"Rq (Excel) q Tfr efdq (Column) 3*{ 3il-fi t Gow) t E-fff*{q qr riqti

(1) E2

(3) c8

4s. Flq it t qh qr v+t sn-{r d€rfc q*q t ?

(1) VisiCalc Q) Lotus 1-2-3

(3) Excel (4) StarCalc

so .Exce l i tmsq f i -d t ,d+e i l< i f f i 3d tT { (cha rac te r )Z l - {9 r6qqrv+ t tu

(D D8

(4) E8

(1) 256

(3) 32,ooo

CIG-4(E+H)

(2) ro24(4) 65,535

( 1 e )P . T . O .

Page 68: CIC

Er {i|IFT qifr t qr rtrfi (qs{ d. sr t roo ra)qh :

Pr::#,## I*T#w 6rt vE7 d' at t ai6 a1, qryErw pr7

$-+m s) *ikil reri*sT er<rpr) * sr*vs-ffi + fuq qs g{R-d irs{ts o,-+ qrdr d rDLL il 3TS t srcT R-+qrit fu* r

{d (Dumb) eft{d cD-RoM FEq + frrr + {-g r}il t r

{|EdmE qfs{R (Microsoft publisher) (wr}q dqT{ q,ti fr vOr_rar o_tnr t rcD-RoM + +{d qs fi a** fr 3Ti6d 61 rfsrqq, frqr w q6* e Islqfuqf, *qe (cou*iar cable) sr r'r{{r qffu+s + q* fr' srdr .* +* t rEDr d*r RElqur t fuq, els qr$-iT (source file) +) EDr q'.fi sT+c fr {R* u,Fq r

s8. MrDr,w ed d qFq+E Fg+* Efuao r+quq I59. 4lFSitrE qtr (Microsoft Access), RDBMS q.f \r+, sq6qrf $ 160' gs cD-ROnn efirqrq 180 MB srel S',r $is'{q q. v+.ar d r6r. ArM Br q{ d S-i}+trs FisqtJ qqfl_{ r62' sr,p ailr ppR rcp/rp fizlEil-o t q) qtlq ERr {arie t g-si + m F**d frq ETat r

\ - r r - r re r t l l \ l l ' c

63' Crient t su"'u" ils w$-d d qffi + frq Tehet or tdqro t)-or d r64' sltF (Mailsl +) ts + fdq qFqs q-wls (outrook Express) qT {dqrd d v*m d r65. )4g 515 (rext field) 25b Er{e dwr$ 66 saq1qi-slq sf€T * cisnur + fdq {frl-€E) qsdr t |

-'1'\ ' "'r r'\\t..\ .r) .15,l(ul

66' f€"zT$q (euickrimel qs fufsqT FH.m d qi eqfr qq eft E{q qq (vue 2qgo-s dfuq} i"l + Eq+Ttr{ (synchronizirs) t fee uvgs B I6tt' fre-tq (Built-in) ffit +tilq ET-d q)'{q w qs r{flq frfrg krrowredse) qt;rq d I68. oss t qeFFI d erq-+rfus Rfwt.fi Rw r

51.

52.

53.

54.

oo.

56.

57.

CIC-4(E+H)

-

( 2 0 )

Page 69: CIC

Ge. qs qdfi (Floppy) EH aiie 1.44 {i[ ] nm fr q|{q ii sTrdr ,$ 1 ,'.

To. qs LANffi qdc,FrtWd *+'ilfus fu ttr+s ryffiqs{{r | :

7r. 'rfr +1 trcdr +1 eETi +i fr{r, A-dahl * f+qq il{r qRqrfua t r

72. Tqfgrtq-{Hsr vrrt<R sTFr*,tt+ + firq qs xTFfufi dr t I

7s. E-{ffc qr g|.5 3{KFT-EFT q-qT SdqT s.fq|t + fdq urs +1 q-aq q-q1 | |

74. fr-q;q qq{, qqq Q aqr qrciFrs T4{r gtqT scqTi * ldq qid gqTfflq R'gq a1

T*E) f r t I

75. cD-RoM +1 ecd, qd tqr kg ql qE1 fisTfr q1Bqr or g*qre oror t I

26. svcA qrd qr sT{ d "gqq frffi +# Ot"" I

77. fr grqnoT f+iq-s il+frfi (scheduling techniques) t +c qd sftr qR qrd , ,

78. dlzq sfrhrgff (Lotus organizer) if qrs q5 RRr rfi e

7s. !t=s tq + Erfdi 3iT ilq flft.N * nen (Alignment) + liTq crRL+{ aAT t}6r d r

80. ,tltfr'q fldf d vsNr. srq H FWtrs g|zt Fer+^d qffis . cEDrs is fu s,rs t n r t r o r d I

81. pERr q riltrq t rir;rq {+q!${ ftE trR I

Bz. ,rEs+,T t-qr wrw sTffe sr{d fr E*araq d ewrc iqT + frq tffr t | :

8s. por tqreil fr s€Fqlr tEr, sr{flq t-qr s+{ {qR t-qr Et-fi t I

84. nos fueq sr{ej if auronxnc.BAr eilr coNrrc.BAr yrrfu€' Ela't r

85. umr t qa-cnq t 'qd {fsq-a fsfuzr Fil}q' I

86. qf{+$T (Animation) T'q-frs{q 3l}{ sfl-sfs firdT t | ,

87. Fffid W snl tqrilii qi vorqar + fdq qs drn-trq{ FAeifrs €1ur n-* gt*orekn i I

crc-4(E+H) ( 2 1 ) P.T.O.

Page 70: CIC

88. .rlul 16oo1rer) !F U-iiqrFdd trd r-** d ,

8e. r'rp erFrrrfrq qr€i (sit""l t fd( Ergwtc qs 6r$qr}€ qrsw t r

90. Mosaic ailt Collu, quft + ldq ffiS$ (Browsers) t I

91. wN t fiffiEt t u€oe qfus ffi (virtual Public Network) |

sz. siri-rT-s{enr ffi s{qttr{ Rsq qrfi A ffi g* (qt t il-t qr v+t t r

es. guttc qt-{s-qdT (client-server) dq}ffi rR sTrqrRf, t I

s4. Eftfi8 (rntegrity) ql dEtf qqn + 3TeTfirsa qRgdq t t r

eb. {s srzr+s it qrqkm S-S fis q6i:d d f+num$" (uniquely) frfdril ocfr B t

e6. swrFr i qcrcq t M qfr {dqrlg Eei-t sqiF{rq-d }Rr+,qf{*,vrq r

e7. fqkfr qTqr€lif 41 ffi + fdq il{.R*€ + qq-$ +i qrffid q'rq1 F{ilrn t I

e8. R€A{H (simulation) + A qcq e+r*Tt t , ffiqi (scenarios) 3TrEIRf, Rrg-ATT{ 3+{

lddq (telephone) 3TrsTrfrd RUAyi{ |

9e. *w tn'.xl Ftrgtd tR-G ErA +) q-* sleH*qffi sidnfs (interactive interface).$${T

6-rqror t I

r00. *gq} qffiFffi qrq dr{q qr fiET sTt{ qie6tq + idq SfrqTd fr-cr t r

CIC-4(E+H) ( 2 2 )

Page 71: CIC

t

i 1

<w, o'rd b fts srrd

( 2 3 )CIC-4(E+H)P . T . O .

Page 72: CIC

tw'6rd b frs drrd

CIC-4(E+H) ( 2 4 ) 5,000

Page 73: CIC

CIC.5(E+H)

CERTIFICATE IN COMPUTING (CIC)

Term-End Examination

June, 2006

GIC-S : M IGROSOFT OFFIGE

Time : 2 hours Maximum Marks : 100

Note :

(i) Do not start answering unril the inuigilator asks you to start'

(ii) euestion paper contains 7a0 questions. Stud,ent is required to unswer all the questions'

There is no choire.

(iii) AIt questions carry equal marh*

(iu) Each question must be giuen one answer only. If m'ore than one answer is mqrlzed or

giuen, zero marh witl be awarded for that question'

A Multipte Choice (Questions number 1 to 50)

Note : Four choices anv giuen for a question, out of uhich one clwice may be correct' Mq'rk

correet aruswer in releuant "oli*n

of ti" ons*er sheet giuen to lou. |ry-cdse you feel thut

norue of the choices giuen in a question is correct, murh in colunt'n '0'.

l. The window which shows icons fur the mouse, sound and display is

(1) MY ComPuter

Q) ExPlorer

. (3) Control Panel

(4) Task bar

2. On the Task bar the time is shown in the

(1) Starb Menu

(2) Scroll bar

(3) DesktoP

\4) Tray

GIC-5(E+H) ( 1 ) P.T .O.

Page 74: CIC

3. What is the keyboard short-cut for ,cut' ?(1) Ctrl+C e) Ctrl+V(3) Ctrl+X @) Ctrl+p

4' If I want to make a word'Prominent', in the MS-WORD d.ocument, which word would bestdescribe this ?(1) Prompt e) Delete(3) Bold @) print

5' If a paragraph is rcquired to be shifted. from one place to another in the MS-WORDdocumcnt, it is described as(1) Rotate (D Relocate(3) Copy (q Move

6. Which of the following is the example of a software ?(1) ROM Q) CPU(3) Motherboard (4) Hard Disk Driver

7. which key moves your cursor from one ceil to the next in a table ?(1) Tab e) Shift(3) Enter @) Ctrl+Enter

8. In order to e-mail a document within MS-woRD, the sreps are(1) Go to File / Send to / Mail Recipient

(2) Save file as an e-mail attachment

(3) Start'Outlook' and attach file while open in WORD(4) This is an impossible operation

9' To check for alternative spellings for a misspelled word the suitable option will be(1) Choose'ToolsTSpelling

Q) Press F7

(3) Click the right mouse button on the word

@) All of the above

10. The option to align text on right margin is(1) FormaUAlign Right

(2) Press Ctrl+R

(3) Click on Tools/Align Right

(4) Right click on text you wish to align

CIC-5(E+H) ( 2 )

Page 75: CIC

11. To change margins on a page users have to click(1) File/?age Setup(2) Tools/IVlargins

(3) Edit/l\{argins(4) Place Tabs

l2;. How do you change your default frle location ?(1) Choose File / page Setup(2) Choose Tools / Options(3) Choose File / properties

(4) Choose Edit / Files

13. To add an additional row to an existing.table(1) Choose Table/Insert/Rows Above or Rows Below(2) Use right mouse button(3) Press Tab at the end of the last row(4\ click'Tables And Borders'button on standard roolbar

14. Where do you frnd MailMcrge command ?(1) Format/MailMergc

Q) FilelPage Setup/1\{ailMerge

(3) Tools/lVlailMerge

(4) Insert/lVlailMerge

15. PaintBrush belongs to the(1) Accessories group

Q) Application group.(3)

Main group

(4) Sctup group

16. The difference between Save and Save As is(1) not worth mentioning

(2) one is Ctrl+S, other is Ctrl+A

(3) Save lets you save frle with same name and location and Save As lets you change both(4) Save lets you change the frle name, Save As lets you change the location

17. Changing the appearance of cells in context of EXCEL is(1) Edit e) Format(3) Align @) Change

CIC-5(E+H) ( 3 ) P . T . O .

Page 76: CIC

18. Putting data alphabetically, numerically or chronologically is called

(1) Sorting Q) Filtering

(3) Formating (4) Searching :

fg. A type of application program which manipulates numerical and string data in the form of

rows and columns of cells is a

(1) Cell Q) SPreadsheet

(3) Worksheet G) Database

20. A present formula to perform specifrc calculation is a

(1) Formula Q) Function

(3) Formula bar (4) Autosum

21. Intersection of row and column is called

(1) Formula bar Q) CelI

(3) Intersection Point (4) Cross ,

22. The formula that will add the value of cell D4 to the value of C2 and then multiply by 82

is

(1) (D4+C2)gB2 Q) 94aQl*82

(3) =(D4+C2)*B2 @) =(B2g(D4+C2)

23. If a cell shows ##### it means that

(1) formula has a sYntax error

Q) the row is too short to show the number at the current font size

(3) the column is too narrow to show all digits of the number

@\ None of the above

24. A cell labelled F5 refers to'l'"

(1) row F column 5

(2) column F row 5

(3) function key F5

@) functions available in the cells

25. Which of the following is a valid arithmetic operator ?

(1)

(3) >= (4) =

26. Printing handouts instead of slides

(1) is mandatorY

(D is not an oPtion

(3) saves time and PaPer(q is difficult to do

crc-5(E+H) ( 4 )

Page 77: CIC

27. You can change the wall paper on your computer by cricking(1) DisplayAMall paper(2) Display/Appearance

(3) DisplaylSettings(4) DisplaylBackground

28. If a dialog box has 4 radio buttons in the same group, one can choose(1) Exactly one of them(2) Any number of them(3) Exactly two if they ar:e grouped in different columns(4) None of the above

29' If you right click mouse over the blank area of the desktop, what will happen ?(1) New background is selected(2) The task bar changes(3) A menu appears(4) Microsofb program is launched

30. How do you set up columns on a WORD page ?(1) Select text / Press TOOLS / COLUMNS(2) Select text / Press TAIILES / COLUMNS(3) Select text / Press INSERT / COLUMNS(4) Select text / Press FORMAT / COLUMNS

31. Which one is an absolute cell reference in EXCEL ?(1) (A1) Q) &A1(3) #A#1 @) $A$1

32. Handouts are =-.-..- of presentation.(1) Slides(2) Compressed slides(3) Slide show(4) Worksheer

33. In PowerPoint we cannot create(1) Graphs e) Texr slides(3) Database " @) Tables

34. Pie charts can bc viewed as(1) Single dimension (2) Two dimcnsions(3) single and two dimensions (4) Two and three dimensions

Clc-5(E+H) ( 5 ) P . T . O .

Page 78: CIC

35. Selecting text means selecting

(1) a word

(2) a complete line

(3) an entire sentence or whole document

(4) Any of the above

36. MS-EXCEL can be used to automate

(1) Financial Statements, Business Forecasting

(2) Drawn objects, shaPes

(3) Clipart, drawn art, visual

@) Any of the above

g7. 'To

return the remainder after a number is divided by a divisor in EXCEL, we use the

function

(1) ROTJNDO Q) REMAINDERO

(4) Drv( )(3) MOD( )

38. Which one is the correct formula ?

(1) =$5+$10

(3) A5+A10

Q) $5+$10

($ =$A$5+$A$l-0

39. Which symbol is used to change a number as a label ?

(1) Underscore Q) APostroPhe

(4) None of the above(3) Equal

40. Which one is not cotrectfor Paste Special command ?

(1) MULTIPLY Q) TRANSPOSE

(3) COMMENTS @) LINK

41. A new PowerPoint presentation could not be created with the following method :

(1) Create a blank Presentation

(2) Using AutoContent Wizard

(3) Using Presentation TemPlate

(4) Using scanner to scan slides in compute" -

42. Which of the following is not a type of Autolayout for PowerPoint ?

(1) Slide (D Chart

(3) Bulleted List (4) Table

c lc-5(E+H) ( 6 )

Page 79: CIC

43. Which of the following is not a feature of PowerPoint ?

(1) Custom Animation

(2) Slide Transition

(3) Graphic Transformation

(4) Customise a S]ide Show

44, Format Painter is used for

(1) copying a graphic

(2) copying and paste formating

(3) changing background colour

(4) editing a picture

45. You cannof use the Slide Master to

(1) customise Animation to all slides

(2) add Footer to all slides

(3) set Slide Transition to all slides

(4) set a custom background to all slides

46. What is the DOS command that displays the contents of the disk drive ?

(1) DIR (2) VER

(3) FrLES (4) A :

47. Which command can you use to run an application which is not present in Start menu ?

(1) Run (2) Browse

(3) Command (4) MS-DOS Prompt

4E. Which key would you hold down if you wanted to create a horizontal line with the Linetool ?

(1) Ctrl key (2) Alt key

(3) Shift key (4) Enter key

49. Individual computers in a network are called

(1) Workgroups (2) File Servers

(3) Workstations (4) LAN's

'60. Which desktop icon works to display the computers in your Workgroup ?

(1) My Computer (2) Network Neighbourhood

(3) Recycle Bin (4) My Documents

CIC-5(E+H) ( 7 ) P . T . O .

Page 80: CIC

B State whcther True or False (Questions number 5l to 100)

Note : In the following 50 questions, marh 1, if the statement giuen is true 'and. 0 if the statementgiuen is false.

51. 'Ctrl+O'is used to open a frle in MS-WORD

52. You can call a slide, a good slide, if it successfully communicates the complete message.

53. The term for a predefrned computational task in a spreadsheet program is a 'formula'.

54. By default Tab stops are set a 1.0 inch interval from the left margin.

55. It is not possible to select a tabular form on a slide.

5 6 . T h e k e y b o a r d s h o r t . c u t t o p r i n t a d ' o c u m e n t i s C t r l + P .

57. The'Thesaurus'lists both the synonyms and antonyms for selected words.

58. A file with an extension of .EXE, .COM or .BAT is probably a document file.

59. The characters you type at DOS prompts are called command line. .

60, Desktop icons open into Windows, if you double click them.

61. 'Paint is used to create bitmap frles.

62. To insert a new slide press Ctrl+M.

63. When you use calculator, you have to always use keyboard to enter numbers.

64. A double-click in Wordpad is used to select a paragraph.

65. Notepad and Wordpad both create mainly text documents.

66. A Read Only file can be both viewed and'edited.

67. The default number of worksheets present in a workbook is 5.

CIC-5(E+H) ( 8 )

Page 81: CIC

68. In EXCEL formulas have to begin with an =

69. The intersection of row and column is called a Box'

70. The mathematical operations that are given last priority are exponents'

7L. The result of the formula = (12 - 4)12 is 4.

72. when you cut a selection in EXCEL it is marked on screen by a green border'

73. You can.modify a template colour scheme according to your needs'

74. If a slide has b bullets and no sub-bullets, promoting third bullet produces a second slide

with two bullets.

75. You can create slides only in Slide view.

76. F12 key is pressed to start 'Help'in Windows'

77. print Manager enables one to send more than one document to the printer simultaneously'

78. On screen, you can suppress,the display of Grid lines in MS-WORD'

7g. .l'he Page orientation that displays a page horizontally is Lengthwise'

8 0 . F r e e z e P a n e s c o m ' m a n d i s p r e s e n t i n W i n d o w M e n u .

g1. when you use copy command, the cells to be copied are highlighted by a thick border'

82. To start Spell Checker F7 is pressed.

83. When you enter a number, EXCEL rounds it according to cell's format.

g4. The default format for numbers is Right aligned in MS-EXCEL'

85. Zero values can be suppressed in a worksheet'

86. Number formats can be applied to all columns'

CIC-5(E+H) ( e ) P.T.O.

Page 82: CIC

87. Borders in EXCEL cannot,be'coloured. , , . :. I : :

' 88. You cannot use your own pictures in powerpoint.

89' A quick way to make a presentation is to use the Autocontent wizard.

90' when you save some file as a web page, the fire extension is .doc.

91. Normal view contains an outrine pane, a slide pane and a Notes pane.

92. The currency format is the only format availabre for numbers.

93. Editing text in powerpoint is similar to editing text in word processor.

94. The new worksheet is named ,worksheetl,by default.

95. Legal paper sizc is g] * 14 inches.

96' web Layout view of document is used to display headers and footers, also to see how textis positioned on the printed page.

97. The colour scheme that is chosen is applied to the whore presentation.

98' MS-woRD is the only MS-office product that has Internet support.

99. A directory in Windows 95 is called a folder.

100. DLL stands for Disk Language Library.

CIC-5(E+H) ( 1 0 )

Page 83: CIC

SPACE FOR ROUGH WORK

Clc-5(E+H) ( 1 1 ) P . T . O .

Page 84: CIC

SPACE FOR ROUGH WORK

CIC-5(E+H) ( 1 2 )

Page 85: CIC

fr.sTr$.fr. -s(E+H)

qEfube F{ o,qErr (m.sn$.fr.1

rrdid qten

qfq, 2006

+.3n$.S.-b : qrnslttrrc oilfuH

€rl4 : 2 qae qftrqaq ei6 : Loo

i a :(t) wif w att feoaT dat n6 rrz{Eer a at qq ao fiflqrq go- *r-i # ftq + ql t( i i ) l r z rw t r coysad r f f iW d l s , # wqq r l q f f i d r * i d f f i add rGiil scTT wit + rid sqa d 1(iu) xdo yw 6r tEd q-fr d rar f r qR W 0 ril?r6 ra0 w frqrl artq qq di qr

rrn Eq rq d a) rs w{ w ep aia Rqr wqrn rin qSffi (vgr {iqr r t eo ro)

ie : ffifua sp"i C ydo xw +frq an fuq@ Fg rq d, Ara 0 qn ufi al somd r *rd rar *) l{il{ wNeF w riaiftn +irn7 fr enfu ql r qR dd * rar g-d ada), pi sn7 W @ # erEra ai r

l. qo ffi fr qsq (Mouse), ffi 6qr ffi (Display) t oil{qf{ (Icon) ql fqsnT t, E}-dT t

(1) qe 4lqlf (My Computer)

(2) qaRdR{ (Explorer)

(3) 6trYd ftRT (control Panel)

(4) Z|FF ER (Task bar)

2. et-FF ER (Task bar) rI{ er{q (vr+) RcTqT qror t\ \ .

(1) €d t-t (Start Menu) it

(2) glo qR (Scrol bar) if

(3) tffizTq @esktop) i[

(4) ? tr'avl il

c r c -s (E+H) (13 ) P - r -o -

Page 86: CIC

3. 'Cut't foq Ssilqdd (Keyboard) Vff-qa wr t ?(1) Ctrl+C (D Ctrl+V(3) Ctrl+X Q) Ctrl+P

4. qR us-woRD + Emrnq q q-s {rE d[ Bqrc{T (prominent) d, d, qiTqT rrq sqd, sdfr3161 qftqffi qt'n I(1) Prompt (2) ffiC (Delete)(3) Fil"= Gota) (4) fiz @ri't)

E. qR us-wolD + qtdr+q fr qo +{'ns +1 qs cFrd t Ee-fr qqE qr RrE (A qT+) s1qs-{n €, fr q6 fuqr +t qR'{Tfrd r}-fr t U(1) t}a 1po1"1"; (z) FFt+a (Relocate)(B) ffi (copy) (4) {e (Move)

6. Fq if t qh w effiqr qr rqrarur t z(1) ROM Q) CPU(3) qRq)-d (Motherboard) (4) ud g*+ gr{-{r (Hard Disk Driver)

7. !S {T{ufr (rabre) fr sflq* q,ft d !S +f, t s+TA q 6tq Ei 6S A qrfr t ?(1) & ouul (2) fvne (sr'inl(3) (dt (Enter) (4) Ctrl+Enter

8. !F qq-{d (MS-woRDl t q+ ffi-+q sl t-td q.{i + tcq qr"r t(1) $]-{FT (File) ii qrs-t/ +-s zo (Send to)/tf, (Mail)tRnftz (Recipient)(2) t-te +o'+ feT*el * sq it qrfo sl t-q (save) q;G

@) qd qrtdr$ siqEltq t

e. q-66 SFFI (spelting) qrfi vt-< + q-{A sTeriitrq dfrT m sfq 6{t } toq sugm f{driqErrlr(1) '6q'

lToolsl +) ga6q7$fttT (Spelling)

Q) rz q) wr((3) {r< qt qrsq qFT q) rnz-fu* qt(4) w{ffi qsli

r0. ErFi ("iehr) qftrq qr vtqqivr + fr-iTtr *, tdq f{ftq t(1) qffe/qtri fudlq (FormaVAlign Right)(2) Ctrl+R s) (dI(

(3) Tools/Align Right t|t fffiS 4t(4) fqq qTEqivl 6T oirq fdn wil qrdA t ss vt ks at

(B) qd wonu s) gA qs-t gq 'sT[scEs' (outlook) q] slRErT (€d) st sil{ w-q-m s}{6r{ st

CIC-5(E+H) ( 1 4 )

Page 87: CIC

t l .

12.

r3.

14,

lfs +q q{ qTffi'{ (Margins) q} q-{d} + fdq sqq}mT fu6 strn(1) FilelPage Setup

Q) Tools/I\{argins

(3) Edit/Margins

@) Place Tabs

ffite s.rtf, + 9i (locationl *.t enq *g c<if;f Z(1) 3i rl" I tq +caTq (page setup)(2) {i Toots / Options(3) gi rlu / xfTflq (properties)@) gi nait / Files

!F +{< qrurfr (table) if qs oTfrkF .ifu Go*) d q\gf * fdq(1) Table $;lt5{/qtrJ ltrrs"rtlRows Above II Rows Below(2) <TF{ t{-{c) qrsq {eT st EFd-qrd 4Ts(s) sTr€'fr qfu + ei<T qt rau q] eqr((4) &d {irqR qt '}sw qt.s d-$s' (Tables and Borders) TZ;r s} fuffi sitf,{$ (MaitMergel oqis sTrrd qd qt ffirn :(1) qT+c/tf,Erd(2) s't-{f, (Filelrhq +d3Tquteqd(3) qN/+mqd (Tools/IVlailMerse)(4) {{-ttdqd r(Inserr/VlailMerse)

15. I-{${t (paintBrush) +dI t(1) q+Sfr-q (Accessories) +t{€ fr(2) qR}t{r4 (Application) H{d fr(B) tq Wruirr) q{d t(4) tEe+q (Setup) qTd fr

lG. tq (sarr") s*{ +q !F (save As) C ar<-{ e(1) sddri HFT.F qEmwf Tfr e(2) (S ctrt+s, EF{l ctrl+A B(3) tq (s",,") Bilq-+} cS qrq t sft sel q'r6 qt rifudr (qr$-el d +q Sd tflT t nqrt-q es (save As) iHTr+) +it' +) r""+ t" t(4) frq (Sav") '3Trrd Hr{f, 61 q|q q-qd} frr e, tq q-g (Save As) 3rTqd q.td q-{d}

t-dr t '

17. EXCEL + {r+f fr t-f, + nE-fr-dwT fr q-con t(1) @a 1Ba11;(3) 3i-flEq (Alignl

CIC-5(E+H)

(2) sTSz (Format)(4) iq (cnang")

( 1 s ) P.T.O.

Page 88: CIC

18. 31iq$ (data) d' eiq1t"* frq ii, 3ffi'+ ffiq ii qT qrr{T t mq t isi +i 4€i t

le. qiq+{ 6qRIT (qdteri nhq) ff qs ffiIi $ eiaii + W 3+{ Yrdt * qffi-i d

t* + t tno'rl'sil{ Efrdq (columns) * sq ii qR-qlffi q-{f,l t' t '

(1) dtrlT (sortins)(B) qffrftlrr (Formatins)

(1) to (c"ttl(3) T4ilfre (Worksheet)

(1) qitdr(3) qTtf,r qR

(1) (D4+C2)'IB2

(3) =(D4+C2)rB2

e) FFeeRq (Filtering)

(4) gffiq lsearching)

(2) ffie (Spreadsheet)

(4) glilAq (Database)

(2) r#qT4

(4) 3{Aqq (Autosum)

e\ 94aQl*82

@) =(B2I(D4+C2)

(2), t'

(4) =

20. qs mq wFT (A-dgA{H) s1 q-{i + fdq Td-f{-riRd (firiu) W t

2r. t (no*) eilr 4iq-q (column) t q<d:< ({€G-+{Hl q;} q-or qTdT t

(1) qqET qR (2) td

(s) 3r<dq ({;rG-+{q) ftE (4) *fs

zz. q6 W (qnfdT) q) o+fr-m t qrq d c2+ qr{ t Sg'Tr 31h n6r szt 1w qt'n' qdr\=e

zs. qR qs te *+*++ q{tdr t, fr sq-dr Fdffi t(1) W (qru-er) fr t{qru (Htr) +1 'rd-fr t

-----'-'-s- of- ".E*

+ {q{ fr1 @ + ldq t rnow) q-gn A d-e tQ) cr."hrcili # s'Jft; +mot t"(3) qq{ t sfr i'tqii d RsTt + fmq Eff,q qg-n I

(4) *S6 fr t +ti Tfr

24. Fb EFd qq +f, q-drdr t

(1) t (now) r eT-em (column) 5

e) *ioq ni s(3) ritre-rq tTsl "u@) ftii n srf,d{ s-srd

25. fi.q fr t qlq qr qret 3i6TFr-frq q+rr* t u

26. RT-€i (slides) * qqrrq ts3lcqg (Handouts) Fre qrqr

(1) enf{qd A(2) q+ tr+-w q-fr e(3) qqq 3+{ 6.rrq +1 qm't(4) s.c+ etrq t

glg:5(f +H) ( 1 6 )

Page 89: CIC

27. qTG q'qz{ * qre qq{ s} slTq q(m e-se t m} ga61 1(1) ffilef€ tqt (nisptayAVatl paper)(2) ffi/qqhts (Display/Appearance)

(3) ffi/tfarg (Display/Settings)

(4) RTd/deqfsg (Display/Background)

28. qR q+ qq"flT dr.RT (Dialos box) * qrq qs E1 q{d (gq) ii + tffi Er{ t, ni d€ g{qs,dT i(1) 3qt t *qe q+(2) s{n t rq-d-ir qra(s) qR a 3iqFr-3ftl{ Et-flq q t di }ic-d A(4) .!ts t t qt$ .rfr

zs. qn tszTq q1 urdi qrrd q{ rnsq t {Ez fus qt, n} wr EIITI ?(1) aqr *+.qts-B qq qrwfl

(2) efFF qR orffi qIW[

(3") i1 qgf, t] qTq'Ir

(+) ql{frTfw (Microsoft) qhlq 3lTrn1 6} qt\qT

80. q* woRD * ye' qt 3ITs EfdtT (cotumn) $fr qa(| I

(1) q-{qt{T (rext) 4l ffi-€ (Setect) s-{ / qN Z qieq q} qqrs-t

(2) qqqi{ q1 R€ fil / }+f, / 6idq q} q++r(B) qEqRT qi, ffi€ 6{ / {{d 7 *ior ql eqr-*r@) qqqi$ q1 ffi-€ q-q 7 qT*e / 6iHq q) qqrs{

Br. Fq fr t qh qT EXCEL fr FREqT te fdB-*r) {E f t ?(1) (A1) (2) &A1(3) #A#1 (4) $A$1

sz. |swsry qE-fi-d{uT +(1) wl-{s(2) 4d{g fdf{S (Compressed slides)

(3) Tf,|q-s ril(4) TSTfre

BB. q-{{qre (PowerPoint) if 6q Filtrr ad.m €-64 t(1) ndf (Cr.phs) 4'I (2) qqqi{T WI-{et (Text slides) 4'T(3) SlzTtq (Database) SI (4) ffi 0"Utes) 4]'

s+. qli qd (pie chart) q) _ Fq ti tor qr v+or t r(1) q+-o emrl e) A 3tTqrqi(s) lst eir A qtqni (4) A sth d1q sil-qTql

C I C - s ( E + H ) ( 1 7 ) P . T . O .

r\.

6 l

Page 90: CIC

85. qrEqt{T q} frrA€ o.C fg{il mr ed e' +] R€ qcqr (gr{') r(1) qs $q(z) * 6t erfl(s) qs qqlf qrfi qT rrgld E{draq(4)

"q{il t t +t$ S

s6. MS-EXcEL ql strqrd(1) ffiq fu{tuit, qrqn TriEqn +)(z) sifr-f, dE), sTrfffii 6)(s) €fud +--dr7fd (fuw{rJ), stfrfr +effi, Erq q}(4) w$-s t n +)$ S

87. q+ {sr qd qrq anr f++rfo qt} + erq q} ,+r'r tq qqar t sS Fileri + idq ExcELt - ssld 16rr.1ion) q,I {Sffi oG t r(1) ROUNDO (2) REMAINDERO(3) MOD( ) (4) DrV( )

Be. A{d + sq if q+ {sr 6} qdm+ + fdq +h qr Ffrs F*qe f+qr qTdr t ?, . (2) Apostrophe

r+r eqtm fr t 6t$ Tfr

40. paste special H'rIiB + RTq F{t t +h w vfr rA? t Z(1) qffi (MULrrpLy) (z) F;q+s oRANSposE)(3)

"iw (coMMENrS) (4) ftr+ tlnvx)

4r. lfs ;HI qrE{qF;e (powerpoino s{Strfipr FlqfufuT tr.0+ t zt? qqrqr w v+'m t ,(1) q+ srcil fq*l Fqtfrq.ruT srr s"r(z) *f-i +Ce ffi (autoContent Wizard) qr Vdqro 6-{*(s) nq-fifioT ffic or sqre oth(4) Rr*if d qqa fr *q s-rt + ldq dtfi qi gfrqre oG

42. qrqrqr{€ (PowerPoint) + ftTq efz} fuTrse (Autolayou1l61 fiq fr t 4h qf TsR 13?t z(1) wr{s

Br. F{t t qh qT vfr q{ 1qf{er) t z(1) =$5+$L0

(3) A5+A10

(1) Underscore

(3) Equal

(2) ' $5+$10(4) =$A$5+$A$10

(2) qrJ

(4) fqm

( 1 8 )

(B) S02s fd€

clc-5(E+H)

Page 91: CIC

frq fr t sh qT qrflqr{€ 6I dqlq 7d t ? '

(1) tFgq tF{iTH (Custom Animation)

(2) wr{s ?iHflq(B) nFn#q sq<Kq (?iqqfiiYn)

@) 6,grTf{S q Wf{g ii (C"rtomise a Slide Show)

qTte +5r (Format Painter) 4T {dqrd t+,qr qIdI t

(1) qs qTFr-d fr qFdfrfr t feqe) si{z (For*at) fs( gq 41 qifi (copv) 3ft t€ (Paste) s-G * ffl

(s) dq.'Jrs€ (Background) + trr d q-q€i + fdq

(4) qfr frr d qBtrT (vrq-qF) fii + ff,q

3ITq wr{s qtst (slide Master) s,r {Sqrf, d 4,i sd,A t

(1) q.fi 61rEEii (Slides) Or tlqtq1-q q;q1lq1-g-q (Customise Animation) q;G + ftq

(2) qS weii t 5at (qq+tq) @ * f*q

i31 q,fr wr$st (slies) tf wr-fs qifr{H (slide transition) - nf t fdq

(4) qrfi RTS+i q qs 6sri'i6fl3-€ etrn q teq

qs Ew gr{q (Disk Drive) q'r qRiYr ffi qff,I Dos 6qig qqr $ r

(1) DIR

(3) FILES

(2) vER( 4 ) A :

(D Browse

(4) MS-DOS PromPt

(2) Alt

(4) En

gisrcrfi

6& snTq* {*{q (worksroup) + wdit qt qfi + fdq Mq +,r +t{ qr err+il{ (Icon)

flq q.{dr t ?(1) My ComPuter

(3) RecYcle Bin

CtC*5(E+H)

47. \rs tgr qFdh{Tq TdTt + fdq qi €d tt (start Menu); 3qft+a Tfr t, 31q +t+vr

6qts g*qrd fi sdFe t ?(1) Run

(3) Command

4& qR sTrq Hrfl E€ (Line Tool) t q* sTg5q (Horizontar) f,rfl 6T FHfur 5"€r q6a t, fr

qlE u1 Sfr d frA (cffi{ rc}i z(1) ctrl $-S(s) snirt $'fr

4s. q{ q|ersql(ffi) ii Fiql 6'qet q1 6-6r qldT t I

(1) q#.cq Qt sr{€ sdc(3) {ffi{Fq @) LAN'S

(2) Network Neighbourhood

(4) My Documents

( 1 e ) P.T.O.

Page 92: CIC

EI qf,r{q FS t ril q1ril (qgq ri. sr t roo rq.)

qh : a?l so y-er Rg' zzq' d t qtr fmr rqT 6Tt €-d d al t eifu al, BrqET s€ enqw o aifu *,l, qR qrq qad al t

51. MS-woRD ii 'ct"l*o's.r qqlq ffi qrro (fite) d ffi + fdq foqr qr v*ar t r

52. uq K* Frss dl siEdi wtEs H€ €q,t t, qR qo qq,-iTdrfds sryf €fur +] sTfirdrfrq-rqf f i t r

53. qs ftEfre fiJrq fr V* $-vpqgo srFrser+q st-4 @rederrned computational rask) {g'qr 16{m)' t r

54. Hee 6q it *q o'ul eTq qrq qrfr{ t r;o Fq + s4-cxrc,T q{ t r

: 5b. qs wr{s (slide) .l-t qs fu* (Tabular) srFFR s} giiT ""*q

rfi t I

86. w qkil+q fr-c fi-ri + ff,q ctrl+p $Srdf, vf-J-qa t r

57. g+ q vqit t fdq 'fW{q' lrhesau'usy vrr+r*+ $ilr ffi-drpfs +n vteii q} q-fRE

orar i r

58. .ExE, .CoM qT .BAT + fqRR (extension) qrfr qrfe sr{q-r+dr q,s ffir+-q qrfe t r

5e. nos frt€S (Prompts) q{ 3{TtT fs{ sRTii q} argq q-G t r€ q.qe FIr{;I (command line)o6r vrar t r

60. tseTq (Desktop) il .+rrqr{ (rcon) s} qR stTrl sffiT n} q6 q* ffi" (windows)i t gemt r

6r. Mq (Bitmap) dfu*Bii + Ffitur t lqq t'e eri't) {sqrf, fuqr qtdr t r

Gz. F Tq RF{s qn Fqc q-ri s fdq"ct"r+u cqtq r

6s. st e1q qffir 1*-eE+al sI Ftqrf, s{i t, A enqd \ispif e1 sFfi (qerl tfdq ttw 5mre6 F*qTd qr+r dqr r

64. q-dfu t qs sEo Rr* sr sfrqr€ s +{rns m T{i + lf,q fuqr qrf,T t I65. ile+s sth Tets <tif gw wq t qrosivr q{dr+$i *r frqtrr *G t tGG. q+ 'ts 3m' (Read only) {ifuqr sl +i qqr sTh qqrRd fuqr qr v+-cir t r

67. !tr *+86 q fufrc (Default) ++ryitdi qi €qr s i r

c lc -s (E+H) (20 )

Page 93: CIC

68. EXcEL fr q* 1vffim) = t E1 sil-{Eq *m r : ;

6e. t Go*) sh qfm (column) + 3ltd.fi ({a{s.+qr+) q} q+ ffi Go"; o61 vrar t' r

70. €qt sTff,q qrqtrq,dr qrdi rFrfrq riffi q16 1q-*qlia) nt-fr t t

7r. w (q,fTf,T ) = (r2 - 4)/26I gf{ulIIT 4 E I

72. qGr stTrr EXcEL t qs Rrfr+flq fi sret t n) st+ q{ q6 'R i'r ei q-S ilr fqEd E}dr

t r7s. qrfi qs-{d t eqvn erm \s Hc (remplate) rrT qttrT +l sq-p* q-r esil t r

74. qF( qs wr{s fr s gilry (Buuets) sth +t$ vo-gdzg (sub-bullets) Tfr E}, fr ffi gizti qa q) gdc sFdd !s (qt wr{s q+rar t I

75. eirq *-*e Rn{s { (sride view) if fr wr{s q-qr v*.t t r

76. ffiq fi 't€s' (Help) q} RTJ q{i + leq prz $-fr dr (qrqr q-dT t l

77. fiz Ciqi (print Manager) ffi ql frar t l5s qlu w t sqru E€I}q M fr sqsl +-{t m t r

78. MS-woRD ii enq fuq .R Fi-s drFii t n-<qi q) t-s €-.Fe t | :

7s. qq 3ilRrq+{F (page orientationl q} q6 i-q d stEqreT (Ilorizontal) 6q ii E{fdT d, qd

dqr{ tt dar d r

80. ffi h (window Menu) q fi-q t{ (Fr."re Panes) qqis sqFPl-d E}-dr e

8r. sr BlTs +Tfr (copy) q.qis ET {dqriT s{t t n} ff,q t-€ ql qTql effir d-dr t {d gsq]d qgi * anr Er{dr{a ffuR-c) d-ar t r

Bz. +d +si (spell checker) +1 gF +-{i + fuq rz q} <erqr qrdr t r

83. wr 3TN q+ €cqr 41 sTda (qn{ s{t) t, fi ExcEL t-d + qTile t eqvn ss risro) qr+ e-{rdr t r

84. MS-EXCEL fr {srcil * feq fsqt-qz qTfa (o"ruult rormat)Erqf qtfu-d ntor t r

88. \rs {ffie fr dri roi * qn q} t-fi qr v{-dr t I

( 2 1 ) P . T . O .

Page 94: CIC

87. EXcEL d ffi Gfdr) qEi d {'rfrq r-fr f*qr qr v*or d r

88. qrqrlar{€ (powerpointt if ory qqi frr* or qftqrd +fr oq voi d r

89. {dF xtr--frsrul (Presentatior') q) qqri q.r ogd A-q ffisT 3,fA q'ee ffi (AurocontentWizard) sT S*qrf, fiqr t I

e0. vd enq ffi 1qfusr q) +q te ffi"u page) t Fq ii tq (sa.,,e) q-rt t, d qrs-o orqffi}ttT .ao" Elor t r

91. qfqTq EW (Nor-al vicw) ii q* 3ll-$ef,ffl tq (O,rttirre pane), q.F. Wl-{g t-q (Sha" pane)eil{ qs .q iq (Notes pane) E}-dT t I

sz. S@Fii + fuq Tn (qHy qffu 11 W'qlr glRrer qT+e t | ;

e3. qlq{ql{€ (PowerPointl if q+ q-{qi{T si ffid (<Ea) q-cqr ed x}+gt fr qTEqi{T +l$qGa (qbe) o.it + vqn al t r

s4. ffi iq re{fl-c 6T qrrT 'qi4qfre1' Eqfiz 6q t et'n r

eb. qt'rd tqr fir oq-* r; x 14 F{ etar t r

eG. ffi qwrnq t 'te-teilsc E{q' EFr sqq}'r tg1 aqr F-a-r +l Eqrt} deTr of gq yts qr

qr{qieT al qq€ir +) M + fdq fuqr qror t r

e7. kq r,T +s{T (qm t+h) d gdprqT t qe qryt rc-fifiuT + fuq eq t}fr r

e8. MS-WORD, MS-Office Sr g5q-1 $rqrq t REn E-a+c or qqtJ t r

99. ffi-q 9b (windows 9b) ii qs gr{kQ (Directory) +1 +"gr (Folder) o-O qrol d. r

r00. 'DLL tFT qteq d gF5, frA'q dlgit (Disk Language Library) |

CIC-5(E+H) ' ( 2 2 )

Page 95: CIC

{s o'Td b fts frq6

P . T . O .elC-5(E+H) ( 2 3 )

Page 96: CIC

CIC-5(E+H)

<w, o,rd b ftts d{6

( 2 4 )5,000