ITT Training Most Important 1500 Questions (1) PDF

Summary

This document contains 1500 questions on Tally, a software program for accounting.

Full Transcript

QUESTIONS A B C D ANS TALLY The ------ key can be used to None of select an existing company F1 ALT+F1 CTRL+F1 the A from list of companies....

QUESTIONS A B C D ANS TALLY The ------ key can be used to None of select an existing company F1 ALT+F1 CTRL+F1 the A from list of companies. above Import and Export of data None of between Tally and other Tally Tally IMP Tally INI the A programs is possible only ODBC above through----------- Program. The re-order point is the inventory quantity that TRUE false A trigger a stock replishment activity. A created company's detail None of can be modified through F3 ALT+F3 CTRL+F3 the B keys above A/An -------------- is the official notice that the firm None of sends to its customers to Invoice Bill A or B the C advise then to the amount of above money that is owed. In tally,all masters have Two Three Four Five B main options In tally,to create a new None of Alt+Ctrl+ column in balance sheet Ctrl+C Alt+C the B C press above In tally,the use of group behaves like a sub-ledger, option is that we can TRUE FALSE A summarize many ledger accounts into one line statements In tally, we can alter ledger details using either single or multiple modes but not TRUE FALSE A alble to delete a ledger from multiple modes. In tally,a group company is marked with an * $ & ^ A Puchasi ng, The systems that work Puchasing Accounts Puchasing Receivin together to order,receive, and payable and g and D and pay for replenishment of Accounts and Receiving Account stock are --------------- payable Receiving s payable Tally allows to delete a Mone of ledger from --------- Single Multiple A or B the A alteration mode. above - -------------------- is/are Fund Flow All of Cash Flow Ratio useful for management in Statement the D Statements Analysis the decision making. s above In tally,the group company must contain at least Two Three Four One A members To cancel a vourcher entry in Tally, short-cut key is ------ Alt+D Alt+X Ctrl+T Ctrl+D B ----- Create Alter Display All of The accounting masters and Informatio Informatio Informati the D inventory masters related to n n on above We press -------------- function key to display the age-wise F4 F5 F6 F7 C analysis of Bills Receivable or Bills Payable report None of In Tally, we press ------------ , Alt+P Ctrl+P Shift+P the A to print report. above In Tally, Types of Accounts and Types of Vouchers Journal passed during the period, Tally Audit Statistics Day Book B Book can be seen in ------------- report. In the Tally Software, the ----- None of - ------ directory stores all Bin Data Sub the B data entered by the user. above The Ledger Accounts are unique in Financial True False A Accounting Packages Customers can be permitted Enterprise Enterprise Electron to enter their own data into Data Data - ic Data All of the the firm’s computer using C Interchang Informatio Intercha above the firm’s wide area network e n nge. is an example of In Tally, we can customize the Vouchers as per our TRUE FALSE A requirements The number of steps in 2 3 4 5 C Accounts Compilation are Each action/transaction of a data data All of the firm is described by a --------- Field B element record above ------. Tally is based on mercantile FALSE TRUE B accounting system Display None of stock Open Change Ctrl + N is used to ----------- the B valuation Calculator Period above method - ------------ in Tally classify None of the accounts under different Ledgers Groups Journals the B heads so that summarised above information is possible. Revenue Account also None of known as -------------- Personal Nominal Real the B Account above All of Method of Voucher Manual Automatic None the D Numbering is/are above Accounts Receivable are Balance Profit & Journal All of the A displayed in Sheet Loss Book above To assemble a product from Physical Stock Reversin different items -------------- Journal Stock B Journal g Journal entry is used Transfer A ---------- purchase orders data flow is directed to the None of purchasing system for use in Filled Receipt Issue the A closing out the outstanding above purchase orders in the receiving system diagram. Tally provides at least --------- 11 16 18 21 B predefined voucher formats The value of the inventory is included in a ledger FALSE TRUE B " The buyers can follow up manageme managem electroni with the suppliers to All of the nt by ent by c data B determine the reasons " is an above objective exception analysis example of ----------------- From voucher entry mode , if we press then we F4 F5 F6 Alt+f5 B get payment voucher in tally Primary Default Cost Category in Main All of the Primary Cost C Tally is/are -------------- Location above Category A Group Company is simply a name and an identify given to the merged accounts True False A member companies of the group. A ------------ is a primary None of Voucher document for recording all Ledgers Reports the C s financial transactions. above The field can have a value between in FA 0 to 9 1 to 100 10 to 60 None A Package. The file maintains data that describes the All of the supplier past transaction Supplier Suspense Order A above with the firm in terms of material quality in AIS It is necessary to manipulate None of Informat data to transform it into ------ Report Output the C ion ---------- above In tally, to change the date of F2 F4 Ctrl+f2 Ctrl+f4 A the voucher press Net None of Tally can maintain budgets Closing Transactio A and B the C on ---------------- Balance ns above The value of the inventory is included as an asset on the True False A balance sheet In ratio analysis report of Tally FA packagewe we F6 Alt + f6 F7 None of press function function function function the A key to the display of bills key key key above receivable , bills payables report The accounts payable None of system is responsible for Sales Purchases A or B the B paying the suppliers for the -- above --------------- What is the default financial 1-4-1996 1-4-1997 None of 1-4-1995 to year in Tally6.3 to 31-3- to 31-3- the B 31-3-1996 1997 1998 above Tally encrypts and stores TALLY DATA at the data True False A directory The Profit & Loss statement None of can be displayed in ------------ Horizontal Vertical A or B the C --- format(s). above Balance sheet & Profit & profit & Cash and Default ledger accounts in loss and Cash and loss profit profit & C tally are trial bank & loss and loss balance trial balance None of Default 'godown' name in Main Primary A or b the B tally is location above Security None of 'Tally vault' is a Cost mechanis Ledger a/c the A category m above To create a sales voucher in tally , you have to press F5 F7 F8 F9 C A Group Company is ----------- None of - ------------- given to the a name an identity A and B the C merged accounts of member above companies of the group. In tally,"credit note" voucher None of Sales Purchase type records entry for a or b the A return return above In tally you get currency None of Company Stock Regional symbol option from the A creation items units setting menu above - ----------------- gives the None of balance for each day for the Trial Balance Daybook the B voucher type has been Balance Sheet above selected. For 'stock journal' entry we F7 Alt + F7 F10 F11 B press in tally Tally provides the capability Changes in Changes in None of to the administrator/auditor transaction Both A Ledger the C to track changes in the areas s or and B Masters above is/are vouchers In tally, types of users are 2 3 4 1 B By pressing --------- key, a list of inventory reports can be F9 F10 F11 F12 A displayed straightaway from the balace sheet report Projected approximation of Balance Profit & income or expenses is called Budget None C sheet loss a/c. "Administrator" type user is also called 'Auditor' of a TRUE FALSE A company in Tally You will get company None of information , if you press F3 Ctrl+F3 Alt+F3 the C from gateway of above tally A constituent(member) company can be a member TRUE FALSE A of more than one group. Default stock category in Main None of Primary Symbol B tally is location them To create a log of the import activity in a file _ ____________ is located in Tally.imp Tally.ini A or b None A the same directory as an executable program in tally In Tally,inventory valuation None of Stock Stock Stock method option is available the A summary journal analysis from above During In 'comp By pressing Tally audit feature is the info -> F11 available in a company creation security None B function of a control' key company option In tally, a group company can also be a TRUE FALSE A constituent(member) of another group company Default number of groups in 128 228 28 16 C tally are During voucher entry --------- Ledger Sub- Groups B or C A --- are used. Accounts Groups User designated as ------------- Administr Data TallyVau Owner A -- can view audit list. ator Entry lt One Other company to programs - another a None of Tally supports Importing of company Both A spreadshe the C data from ---------------- created and B et or a above withon database Tally file. Package In an accounting information system, which of the Inventory Cash Payroll Cash following types of computer subsidiary disbursem transacti A receipts. files most likely would be a. ents. ons. master file? Eliminat Will be Will es the more Which of the following is an Does not produce a need to efficient advantage of a computer- require as more reconcile at based system for transaction stringent a accurate control produci C processing over a manual set of set of accounts ng system? A computer-based internal financial and financial system: controls. statements subsidiar stateme. y nts. ledgers. an data that the instructi data to be has been address on that The memory address transferred transferre of a has been C register is used to store to memory d from memory transferr memory location ed from memory FUNDAMENTALS OF COMPUTER Exceptio Inefficient usage of excess System Contingenc Capacity n computer equipment can be feasibility C y Planning Planning reportin controlled by report g Which of the following is not AGP NIC Card VSAT RAM B the component of a CPU Card A trailer label is used on a Control magnetic tape file, it is the End-of- Identifica totals for last record and summarises Record file and tion one or B the file. The following is an Count end-of- Number more information not found in the reel code fields trailer label Storing Writing on Hard copy is a term used to Printed informati None of a hard B describe...? output on on the above board hard disk Voice Voice Visual What do the abbreviations activated None of answer audio C VAB stand for broadcastin above back board g What control would prevent File Limited the accidental erasure of Validity Boundary protecti access C customer information from a check protection on ring files magnetic tape What are the individual dots Coloured None of which make up a picture on Pixels Pixies B spots above the monitor screen called? Header label normally Identificati Reel Batch include all the following File Name D on number Number Total except the Storage Pointing None of A daisy wheel is a type of...? Printer A device device above Which approach or Data technique is a control System Physical Console Dictiona B usually associated with Logs Security Log ry microcomputers An inked ribbon An impact printer creates Electrically None of An ink pen and print C characters by using...? charged ink above head Require Make The best security control in a Restrict Use only user duplicate microcomputer environment physical unremova A password copies of is to access ble media s files What would you NOT use None of A pen Paper Eraser C with a flatbed plotter? above What do you need for an ink A A A drum A ribbon A jet printer? cartridge cassette Centralis Distribut The greatest control Centralise ed ed exposure in a Separation d function function policies A microcomputer environment of duties for PC for PC or is the lack of acquisition Dispositi procedur on es A laser printer does NOT A print A laser An INK None of C use? head beam RIBBON above The amount of data that a Storage None of disk may contain is known Volume Size C capacity above as the disks...? You can protect a Read and None of Read Write B floppy disk. Write above Information on a hard disk is Magnetic Floppy None of PAN drive A usually backed-up using a...? tape disk above Serial Random A parallel None of Magnetic tape is a...? access access access A above medium medium medium Hard disks can have a None of storage capacity in the 1.44MB 20 GB 700MB B above region of...? Magneti Which storage device has A floppy None of A CD-ROM c tape C the largest capacity in Mb? disk above storage Magnetic Which storage device cannot A floppy None of A CD-ROM tape A be erased? disk above storage Where should floppy disks By a sunny By magnet In a None of C be stored? window objects drawer above The contents of these chips RAM CDROM None of are lost when the computer ROM chips B chips chips above is switched off? What are responsible for ROM DRAM None of storing permanent data and RAM chips B chips chips above instructions? Which parts of the computer None of perform arithmetic ALU Registers Logic bus A above calculations? What are small high speed Control None of memory units used for CPUs Registers B unit above storing temporary results? How many bits of information can each None of 0 bits 1 bit 8 bits B memory cell in a computer above chip hold? What type of computer chips None of RAM chips ROM chips CACHE A are said to be volatile? above Systems Network Business software software software None of Software can be divided into and and and the B two areas: applicatio security games above n software software software Travel agents use this Mainfram Supercomp Personal None of computer system when e B uter computer above reserving flights computer Jon Von Which computers are used Notebook Supercom Neumann None of in the weather forecasting B computers puters computer above industry? s Hoover Vacuum tube based First Second None of generatio A electronic computers are...? generation generation above n Which generation of Fourth Second First None of computer was developed generati C generation generation above from microchips? on Which generation of Fifth Second Third None of computer uses more than generati C generation generation above one microprocessor? on Which generation of Fifth Second Third None of computer developed using generatio B generation generation above integrated circuits? n Which generation of Fifth Second Third None of computer developed using generatio A generation generation above solid state components? n DATABASES Analysis, Programm Specificati System Name three steps involved ing, on, Design, Design, None of in developing an information Design, A and Testing and above system and Impleme Testing ntation is used for CAAT as none the Oracle ACL JCL A database above Generalized audit software perform auditors to TRUE FALSE A undertake any past records and not concurrent auditing Generalized audit software is a file whose capabilities TRUE FALSE B for verifying processing is logic CAAT's are computer program and data that auditor uses as part of the audit procedures to process TRUE FALSE A data if audit significance contained in an entity information system CAAT do not contains package programs, purpose written program, utility yes no B programs or system management programs Embedded audit routines are sometimes built into an entity's computer system to TRUE FALSE A provide data for later user by the auditor SCARF involves embedding audit software modules within an application system TRUE FALSE A to provide continuous monitoring Concurrent use auditors as TRUE false A the member of the system Regular cross system verification may minimize true false A frauds Computer security is frequently associated with true false A confidentiality, integrity and authentication Data reserve engineering process metadata to document system and true false A abstract business rules and relationship to review and to obtain extract The first step for developing determine evaluate a record data A CAAT is the audit the types layout from file objective of data Using the open database can bring can bring none of all the connectivity feature in ACL the data the data the A above is directly indirectly above Computer Assisted Audited Technique involves the use True False B of computers through "Black Box Approach" White Box Approach necessary involves expert True False A knowledge on the part of Auditor change in The transition from manual the method use of absence system to CIS environment of all the accounting of audit D bring dramatic changes recording above codes trails including accounting transaction documents risk none of Auditing with computer unique driven driven the B necessarily supports the approach approach approach above hardware processing and checks CAAT involves an Auditors' options, all the software and D appreciation of file data above configurati controls structure on Widespread end use computing result in unlimited errors creeping true false A into system going to accept handling, thereby increasing audit risks For computerized auditing usage of sophisticated audit true false A software would be a necessity the source of data source of Important knowledge available data for all the none of needed to begin planning the to the A material above these use of CAAT is audit planing organizati on The move towards paperless EDI would eliminate much of the traditional audit trail, true false A radically changing the nature of audit evidence providing access to Computer operation controls computer use of none of the of by all are designed to provide to all any the D concerned organizati programs above on personnel Systems development control, apart from others, include authorization, approval, testing, implementation and true false A documentation of new systems software and system software modification conceptu natural/ma open/clos all of A system could be al/physic D n-made ed them al A system exhibits 'entropy' true false A Super computer are the largest and fastest and is very suitable for commercial true false A application including audit work Assembler language uses true false A Mnemonic symbols Operating systems are enable manage devised to optimize the multiple scheduled hardware all the machine capabilities, the user D jobs & software above function resource resources include sharing General purpose software provides a framework for true false B highly complex scientific operation In batch processing, transactions are processed true false B one after another The use of computer assisted with with audit audit techniques is not production all the none of departme A gaining popularity not only departmen above these nts ts On-line processing refers to grouping of transaction and true false A processing the same in one go from start to finish Real time refers to the technique of updating files with transaction data true false A immediately after the occurrence of the event to which it relates In OLRT the CPU should process the capability of true false A program interruption Time sharing system allow access to a CPU from remote true false A terminals DSS is defined as a system that provides tools to true false B managers to assist them in solving structured problems DSS has the following planning model all the databases D components language base above Master files contains current records for identification true false B and summarizing Transaction files contain relatively permanent records take product profile, true false B customer profile, employee profile etc none of Master file configuration reference report table files the D includes files files above is a file management software package that lets file users and programmers filex file-o-man filepet C manager organize data into files and then process those files to have a decentrali CAATS provide added value none of complete zed all the to the clients because the A picture of picture of above above a system a system File volatility refers to the number of addition and true false A deletions to the file in a given period of time File activity is the proportion of transaction file records that are actually true false B used and accessed in a given processing run: File interrogation refers to the of information from back-ups retrieval deletion addition B a file One -to-one relationship means a single entity to a true false A single entity in a monogamous structure RDBMS is structured to a series of 2 dimensional true false A tables seriously subject software safety SADB stands for affected area and and B database database database database Controls are present over many aspects of the computer system and its true false A surrounding social environment In framed checking the data entry is checked against an true false B expected picture or format on none of at the year immediat Errors are correlated quarterly the B end ely basis above Field check is exclusive to a true false A field law basically states none of that there is a specific Benfish Benford Benjamin the B probability of the first digit above of a no. being 1,2,3 etc Check digit is a group of nos. added to a code for true false B determining the accuracy of other digits in the code blocks of random consecutive nos. to the placemen none of Hierarchical code means nos. or primary t of the D alphabets attribute compone above to entities of the the nt entity The validation checks applied to a field depend on the field's logical inter TRUE false A relationships with other fields in the record The contents of a field could valid, invalid, none of all the determine sign for a A numeric alphabetic the above above field Batch is the process of grouping, together that bear some regroupin none of all the transactio A type of relationship to one g, events the above above n another Hash totals means true false A meaningless totals With OLRT where interactive data entry is available, the master file true false A associated with a transaction may be searched for confirming data Controls are required for authorization to ensure data true false A integrity and detect possible breaches in security Data from client application are not stored in the organization's database true false B through auditables events and function All input records in a batch are normally of different true false B types interactiv e interactiv incrementa data e data none of IDEA stands for l design extraction innumera the B and enlarge and ble above activity analysis analysis A transaction file is sorted prior to the update of master true false A file A sequence check on the transaction or master files true false A by an update program is not required Whenever monetary transactions are processed against master files, the update program should maintain a correlation true false B account to record such transaction that does not have a matching master file record Internal tables are stored tables from which certain values are extracted for true false A further processing and storing For small to medium sized systems, individual modules are coded and individually bouncing tested and then assembled e-brain big-bang stub C ball to be tested as a whole-the testing strategy is referred to as In systems testing, test bottom up top-down hybrid all the D involves tests tests tests above Recording transactions in a controlled manner may yes no B amount to loss of stored data re- perform procedur provide read data es Audit software is used by the informatio all the on client's carried D auditor to n to the above file out by audit the clients programs Core image comparison is a software used by the auditor executable deleted, none of all the to compare version of A s, master hard these above a program with a secure copy Database analyzer is a software which provides detailed information true false A concerning the operation of the database system system none of all the SAS stands for analysis advanced the A above software software above Embedded code is a software used by the auditor true false B to examine backup data Embedded code performs yes no A wide variety of audit task Core image comparison is particularly useful where true false A only executable versions are distributed Log analysis is a software used by auditor to detect true false B virus On line testing techniques the auditor data either or fictitious in order manipulat create, none of all the A to see that a specific es, real false these above program or sever edit test is doing its work Mapping software is used by the auditor to list unused true false A program instructions Mapping software has very yes no A objectives can provide can enable the the auditor auditors can be very to execute Modeling is a variety of with all of powerful provisions software which useful the D analytical on a informati above tool number of on with different trend s bases and patterns On line testing can be targeted for specific yes no A functions carried out by programs examina tion of identifies source program provides code of a code detailed program none of Program code analysis which may information with the C involves be there of machine advice to above for uses followin fraudulent g the reason logic of a program is a software of IDEA ACL ALC ACLL B CAAT Snapshot is software which takes a picture of a file or true false A data or a transaction passing though the system fictitious compariso analyzing data n of source the Base case system evaluation applied version of all the picture of A includes against the a above a file or client programm data program ed While base testing forces on finding if there are any true false A defective execution policies in a program Black box testing seeks to determine whether true false A application output is what it is supposed to be In integrated test facility approach the auditor should ensure that the impact of true false A test transaction is subsequently eliminated from the computer files Black box testing is specificati file, none of all the based and white box testing on, A hardware the above above is based program identifyin identifying identifying Source code review g non- all the erroneous ineffective D means standard above code code code In formula in flow hypothesis the auditor should expand the extent of substantive tests to true false A determine how the defects may impact the attainment of the program objectives All material application oriented events that occur within the boundary true false A subsystem should be recorded in the accounting audit trail In examination of audit trail authentica resource the following data associated start and tion of all the requeste D with an event may be finish time informatio above d - n support job none of job control all the JCL means connectivit the A language above y language above Audit should be periodically analyzed to detect any yes no A control weakness of the system In an accounting audit trail, intrusion detection system might monitor the amount of processor time consumed by true false A the user to detect unusual deviation from the amount processor time requested by the user in the past A sample size calculator program assists auditors in true false B determining RAND() function package computer p[program master administ for mathemati Generalized audit software list of ered performin g cal A consists transacti question a variety of concept ons naire data processing function prepared by an outside prepared prepared Specializes audit program program all the by the by the D may be mer above auditor entity engaged by the auditor Generalised audit software could be used by the true false A following in consistencies or significant fluctuations stratificat file statistical/ Generalized audit software ion and all the access/org arithmetic D function include frequenc above anizations operation y analysis In the file reorganization merging capabilities are needed in data from true false B separate file is to be combined on a separate work file Auditors cannot use generalised audit software true false B to extract the data needed for audit purpose Auditors can combine examining examinin functional capabilities of carrying the quality g the all the generalized audit software analytical D of system quality of above to accomplish the task of review process data Can Can Wide define extract Can aid Which of the following is not access to the and in simple D the feature of GAPs various audit analyse selection data base objectiv data es All of Which is the example of High End ACL IDEA the D CAATs CAATs above A sample A utility A special None of In audit procedures, test of software purpose the A data is transactio programm written above ns e program Complian Tests of Analytical ce tests All of Which of the following is not details of review of the D the use of CAATs transaction procedure general above s s EDP controls Which of the following are Action Event General called explicitly by another Macros Procedure Procedur Procedu D procedure? s es res data type is generally used for fields primary auto integer number D assigned as primary keys in number number a table MS access objects can be true false A published in the web In code-builder, got_focuse, none of procedur click,dbl_click,enter are actions events the B es examples of above can be used to automate certain actions in report form chart macros D response to events In the macro sheet the expression comment macro is selected in the macro action D elements s field expressi expressi To build complex code calculator on on C expressions is used builder builder elements The three list boxes present expressi none of at the bottom of the on action list macro list the C expression builder are element s above called list box option is selected none of from the view menu to conditions action insert the A create macros with above conditions report can be created auto embedde tabular columnar C with minimum user input report d layout of a form tabular columnar datasheet justified B displays one record at a time The table or query name on which we are going to build create embedde new link report D our report is selected from report d report report the dialogue box and are the two columnar none of stable and dynamic types of auto reports and the A unstable and static available tabular above There are no wizards for true false B creating a database in access option from the insert create insert menu option is chosen to add chart chart C fields chart add an embedded chart In ms-access, while using none of primary alternate foreign SQL, references constraint is the C key key key used for creating above none of is used to create a label chart mail the A mailing label wizard wizard wizard above header is present at the start group page report D beginning of the report header header header header none of is present at the bottom report page group the B of each page in a report footer footer footer above for specifyin for for g conditio none of In SQL, having clause is used ordering updating ns with the C for records records group by above clause field is added to the none of macro sheet when we select macro condition group the C grouping option from the names above view menu can be used to create VB Modules reports forms macros D toolbars query is used to add records from one or more add append insert delete B tables into an existing table window is used to none of macro write VB code in access report module the C sheet application above Values for other tables, queries are maintained in true false A look up fields data type none of Visual Basic language is a RAD RAP RAID the A tool above none of function is used to SysCmd MsgBox message the B display a message box above Other ms-office applications none of can be accessed from ms- OLE DDE CME the A access using a concept called above object linking none of on line on line OLE stands for and the A execution editing embeddin above g The application that supplies OLE OLE data in OLE is called an OLE object OLE client commun C server icator If any change made on the object from the client side is connecte linked embedded edited A reflected on the server then d the object is said to be is the file format that exe DLL BMP html D works on internet is used to convert any publish form report query ms-access object into html to web D wizard wizard wizard format wizard option in publish to none of static dynamic web wizard produces a page static file the B html file that is static in nature above query is used to create data or change database objects append add insert definitio D in a current database n Currency fields express the dollars rupees pesos yen A amount in is selected from the unbound bound comman list box B toolbar to add an OLE object object object d button To display an OLE object in the form of an icon display as create display link A option is selected from icon icon insert object dialogue box option from the file none of save as menu is selected to run create html new the C html 'publish to the web wizard' above page in an web none of application is used to startup home end the B navigate to the rest of the above pages in the application is fired when an event none of is triggered is the concept procedu bullet command the C based on a Visual Basic re above language Ms access is a DBMS RDBMS front end language A A collection of data stored in data data different objects is known as data group database C collection storage a new new blank database A blank database can be new dialog database database dialog A created using box dialog dialog box box box Text type data can be of 255 64000 235 63500 A characters in ACCESS is a datatype that automatic AutoNum automati number B assigns values automatically number ber c field Tables cannot be imported true false B from other databases If two tables having same none of explicit values for the fields are inner join outer join the A join joined it is called an above Duplication of records in a no primary candidate field won't be allowed if the not null duplicate A key key fields are declared a key Changes from a master table cascade cascade cascade change can be reflected on to the delete change update all C child table by selecting related related related related option records records fields records To see more than one record none of both a at a time in a form we use columnar tabular the B and b above record none of In SQL, delete command is table or query or or the C used to remove tables queries records above In MS-Access, filter excluding selection will true false B display only those record(s) which meet the criteria. Dynaset Properties of the fields are property field field properti B managed by in Dynaset field property propertie es s queries allows us to row/colu crosstab select update view data in row by column mn A queries queries queries manner queries The type of queries that can row/colu change/d action update update or delete record(s) in mn elete A queries queries a table(s) are called queries queries Joining tables without any no match outer matching values in the fields inner join self join D join join is called Primary key uniquely true false A identifies each record Which of the following form form new form both 1 dialog box is/are used in the create wizard D dialog box and 3 creation of form dialog box dialog query wizards are used to generate summary summary sum append simple D calculations for a table Properties of a form can be form new changed by selecting change propertie propertie properti B from view menu properties s s es options Forms that are included in included child other forms are called sub form new form B form form In MS-Access, while using form design view, for creating a command button Record Form None of Record for adding a new record, we Operation Operatio the B Navigation should select the s ns above category from the command button wizard one to form displays fields in columnar tabular hierarchi many B a single horizontal row form form cal form form The process of arranging the data in a meaningful order is filtering ordering sorting querying C known as are used to select only some particular records gateway filter sorts pipes A from the table or any other s database objects In MS-Access, user may None of filter by filter by filter by specify criteria for filter in the A form selection menu form view using above wildcard character represents any single * $ @ ? D character Records cannot be sorted by true false B a primary key A control without a data bound unbound data less data B source is known as control control control control Set of related option buttons, check boxes and toggle button option controls record B buttons is known as group group group group Which of the following is controll all of the bound unbound C control types ed above In MS-Access, the function CURRDATE that gives the current date is TODAY() DATE() DAY() C () is a control that lists set combo static text box list box B of data box text is a form that columnar tabular main summarize large amount of pivot table A form form form data allows to create a filter none of data sheet filter by filter by by typing the value in a data the C filter input form sheet above option Wizards for toolbox controls button control tool control C are called a wizard wizard wizard wizard The wild card none of representation for any 5 two of ram* ram?? the B letter word that starts with the above above ram is Look up fields slow up data true false B entry is an access object that report form table ledger A displays un-editable data option from the new none of object toolbar gives the autoreport report module the A easiest way of generating a above report represents data in a chart label bitmap report A pictorial format Changes of one table can be carried over to another true false A related table Hyperlinks are used to jump to any kind of information or true false A data from a file The memo field can have text upto characters in 60,000 255 25,000 64,000 D length In MS-Access, columnar layout can be used to view true false B multiple records in a form In MS-Access, alter command may be used in true false A adding a primary key to a table Update query is used to add records from one or more true false B tables to the end of an existing table all of In ms-access, datasheet view table query form the D is available in above are used to jump to any hyperlin kind of information from a table form report D k datasheet or a form Home page will always be present as a first page of an true false A application Make table queries create a new table from the records true false A of another table In ms-access, to protect a database file from illegal none of access, we may set database Insert Records Tools the C password. The option of above setting database password is available in menu Foreign key is a field that uniquely identifies each true false B record and accept no null values Data definition queries are used to create or change true false A database objects The attributes of a alternate composite candidat primary composite key are known as C keys keys e keys key OLE object is a data type in true false A access Data displayed in forms true false B cannot be edited A sub form is used to display one to many relationship true false A between tables We can switch from datasheet view to form view true false A by selecting view -> form view option In MS-Access long integer is true false B a datatype In MS-Access, while designing a table for a none of particular field, the Required null not null zero the B parameter is set to yes. This above validates the field as Sorting is applied to select true false B only some particular records Filter by form can be created true false B from a forms shortcut menu Advanced filter uses a filter similar to the query design true false A window to create a filter ? Wildcard character represents any number of true false B characters none of of the following both 1 pie bar the C is/are a type of chart and 2 above A bound control is tied to a true false A underlying query or table A calculated control uses expression as a source of true false A data Text boxes cannot be bound true false B controls The default query invoked update select delete append B by ms-access is query query query query A control can be bind to a record using row source true false B property List box is a control that true false A offers a list of choices If a table is joined to itself it table inner join outer join self join C is called a join A picture box combines the activities of both a text box true false B or a list box Line is a tool box control true false A Text boxes can be part of a true false B option group chart exists as a freestandin stand sub embedded D separate object g alone chart Filtering data is a way of arranging data in a meaning true false B full order Wild card characters are true false B used for sorting records Pivot tables are used to navigate to the other tables true false B in a database Reports are used to true false A represent un-editable data In MS -Access, the records in the first the last none of primary a table are sorted based on field of the field of the the C key field table table above Relationship is an attribute forms reports entities D association between s Summary options dialog box true false A is used to summarize data queries can be used to delete a group of records delete insert append add A that meet some specific records Charts can convert numerical data in a easily true false A understandable format Embedded charts exist true false B separately

Use Quizgecko on...
Browser
Browser