CIC
CIC
CIC
Term-End Examination
June, 20OG
(1) factual
(2) relevant
(3) news
(4) All of the above
CIC-1(E+H) ( 1 ) P.T.O.
3. Hypertext documents are linked through
(1) DNS (2) TELNET
(3) Pointers (4) Home Pages
'
5. What does the URL need to access a document ?
(1) Path name
(2) Ilost comPuter
(3) Retrieval method
@) AII of the above
g. Which of the following statements is true with regard to distributed data processing
system ?
(1) It does not allow greater flexibility
(2) It is a Profrt earning sYstem
processing
(g) It attempts to capture advantage of'both centralized and decentralized
(4) It allows accessto data
CIC-1(E+H) (2)
11. In C++ the end of string is recognizedby
(1) the null character (2) the new line character (\n)
(3) the $ sign (4) the / sign
13. The programming language f'eature that allows the same operation to be carried out
differently depending on the object is
(1) Polymorphism (2) Inheritance
(3) Allocation (4) Mangling
21. states that every finite set of points of span d has a spanning circle number
CIC-1(E+H; ( 4 )
27.ThedaiIyprocessingofcorrectionstocustomeraccountsisthebestexampIefor
(1) Batch processing (2) Real-time processing
publishing'
30. includes E-mail, Voice mail' faxing and Web
facility ?
33. Which of the following is not a type of computer
(1) Decentralized Q) Centralized
(3) De-distributed G) Distributed
Q)servicesofmorecompetentandtechnicallyqualifredpeoplecanbetaken
(3) duplication of activities can be avoided
(4) All of the above
P'T'O'
(5)
ctc-1(E+H)
35. The major advantage of data hiding is
(1) Your programs can include
more data
(2) Your data will be used
correctly
(3) You no longer need functions
(4) No one can ever use your
data
.40, What is
the sum of first 100 numbers ?
( l + 2 + 8 . . . . . .+ 9 9 + 1 0 0 )
(1) 5000 (2) 4950
(3) 5050 (4) 5500
4l' The largest prime divisor of a given integer
n may be as large as
(r) ffi
e\ n2
(3) n3 (4) J;
42. Example of Computer based fnformation
Systems are
(1) Office Automation Systems (OAS)
(2) Transaction processing Systems (TpS)
(3) Management Information Systems (MIS)
(4) All of the above
CIC-1(E+H)
( 6 )
4:g, is any device that requests services or resources from a server'
(1) Media (2) Peripheral
(3) Server (4) Client
47. helps in creating higher-quality audio and video applications with very little
expertise.
(1) Authoring (2) Icon Author
(3) Image Q @\ Macromedia Director 4'04
( 7 ) P.T.O.
CIC-1(E+H)
B state whether True or False (euestions number El to r00)
Note : In th'e following 50 questions, mark 1, if the statement giuen is true and o if the
stq,tetnentgiuen is false.
51' The Information Centre is company's primary resource for the development of full-scale
information systems.
52. Batch Processing is quite useful when majority of records in a large database must
bc
processedat the same time.
53. Internet and Intranet are one and the same thing.
54. Leased Iine does not permit online communication between a user and a computer system.
DD. I{ypertext is a method for presenting text, i.i"gor, sound and video that are linked together
in a non-sequential web of associations.
57. A feasibility study contains a list of alternative solutions for a given problem.
59. The terms "Program Flow Chart" and "system Flow Chart" can be used interchangeably.
60. An Online information system is not always a real-timc system, but a real-time system
must consist of equipment with an Online capability.
62. Both centralized' and decentralized data processing techniques are based on Functional
Approach.
63. Gopher displays a set of resources on the Internet in the forrrr of menus or list of items.
64- Internet basically tries to connect various LAN's. It cannot connect WAN,s.
67. Object-Orientcd Systems do not provide the performance flexibility and functionality
required for practical implementations.
68. The graph of the Konigsberg bridges has vertices of odd degree and cannot include an
Eulerian circuit.
clc-1(E+H) ( 8 )
69. The sum of the frrst n cubes (where n is an integer) is always a perfect square.
70. Every positive whole number is the sum of not more than four squares.
71. IJnprocessed facts and figures are simply data, not information.
73. Disorganized complexity is represented by small number of variables and high degree of
randomness.
75. Inheritance makes it possible for different classesto share the same set of attributes and
methods.
76. A data dictionary does not provide information about the size of the disk storage device.
79. If a programming language has the capability to produce new data types, it is said to be
extcnsible.
80. An Inline function is one which gets textually inserted by the Compiler, much like a Macro.
81. Examples of Chaotic Systems are Flames, Eddies and Cloud formations.
s11'z.
85. Sum of the cubes of frrst 'n' integers i, ["(tf+
L 2 l
86. Signifrcant ranges of Complexity are distinguished as Disorganized Simplicity.
88. Summary reports are used more extensively at higher management levels than lower.
91. While dealing with Information, the other name of "The Effect Approach" is "The Recipient
Oriented Approach".
96. Extended entry is a type of decision table displaying values to be tested in the condition
entry.
97. ln any computer network File Server is the central node that stores data files from where
all users can access them.
100. One of the drawbacks of distributed information system is that it does not eliminate
duplication of activities and redundancy in maintaining frles.
CIC-1(E+H) ( 1 0)
SPACE FOR ROUGH WORK
( 1 1) P.T.O.
CIC-1(E+H)
SPACE FOR ROUGH WORK
CIC-1(E+H) ( 121
- l(E+H)
fr.srrd.fr.
E;I, 2006
S.gn$.S.-t: ridd
Wlzf : Z q"t qfqqdq ai6 : too
qts-:
ft.) vval w sat fusqr dd d?Farwt a at' w-qw frt+to gr *-ri + frq q 6A t
fti) sw-w t rco vr+ d t Mtzif il) srf vr+ ari aIM d' I *ld Eqw afl d I
ftii) srTTxrn # eid sqq d t
f t . uv) d 6 v w w * q d q d d r a r { t q R W t a l f , wr a 0 w f r v n + d r r q W d l q r
rar trq- rq d d ss s?4 qr eyz ai+ RqTqw t
f5' {gF{q.fl (Tvr riqr r t ro rq)
qlz : ffifud v{t'f vd a rw */"q aK E6s Eq rq d, A* C qqnsfr dl s6dl
d r rd rnrr *i rd{ wNzFw (iaifqd+anrd en6d qt r qR d{ ,t sar edTafr
d, di wrri W 0 t etifu ql t
l. qq-aTa-ildn + fdq erfrg - ETiqrFq r
(l) deqFqcF
I
(3) HTffiM
, TiqTq;Iffi Or s+dtq t f
(1) Effs{ur (classifying)
(2) qR-{SqE (sumrnarizing)
(s) rnmq q-far
(4) Bqtm q'ri
CIC-1(E+H) ( 1 3) P.T.O.
6r{qt€ Ffuif +) n + g r q r c nr t
(1) DNS (2) TELNET
(3) Pointers (4) HomePages
crc-1(E+H) (14)
tt. c++ti ffi rr< (string)t efifrqt qrqn t qTwfr t t
(1) Null {isfrfr Q) {i isr riffi+ (r"l
. ..c-*
(3) $ fq6 (4) / 1-16
rz. + idq ffi ffiI{ q} gTfrw (overload)trqr qrar t r
(1) sS :mn + sffi qrq 6G
e) 3S {cqT b qrdmfffial nTRs{i
(B) B{} {mR * wun*1r (Basic)
{--fl{ {iw +.G
(4) -q$s fr t qt$ q-S
ls. t er-avnFrf, *FR t 4ai q
ntqrqqsilqr 6T eTfirdqlurfr q+ Ei {ffiqT ql 3+|rr€qTul
etort, qo t
v6rq.F
(1) qEtil-dr (potymorphism) Q) st'ttf-tr+n (Inheritance)
(3) Fqtr{ (Allocation) (4) trEr-gq (Mangling)
( 1 5) P.T.O.
CIC-1(E+H)
f (n) = o(g(n))qR silr fiq-d qR q) s{-q{ c eil-r ,ro€l v4
( 1 ) l f ( n ) l < C l g ( n )H l r I tn 2 n o * . f d q
( 2 ) l f ( n ) l > c l s ( n )q l $ n)no+ldq
( 3 ) l f ( n ) l = C l s ( n ) lH S t r ) n o + l f l q
(4) lf(n)l<c.l*("ll *,fr')ro*' Fdq
pi (n) 6I *'q qn qq$ TdA gRT3TFrsftrdfuqt ,rfl eTrr
(1) {ks (Euclid) (2) 3il{ffl (Euler)
(3) 3ilffi+q (Archimedes) (4) l6'qf (Fermat)
2r' E-drdr t rs ffi'd+ + x+s qRtrdvgqqsiu+ + sTfirs
rq-€sit ffiil
Td{wr et-frt r
(1) S (Jung'stheorem) (D qtd e*q (Morley,stheorem)
"fuq
(3) stfqd{ gqhq (f,-rt"r,s theorem (4) qlEfi+fq qttq fpytfragorastheorem)
)
22. 2 t q-gl-+s Wfis foq
(1)
"t
(n!)2 > n" (2) (n!)2 < n'
(3) (n!)2 > n' (4) (n!)2 < n"
e) qTfrr,Td
Aq
(B) tgin +r {qftqrq @) sq{s qEi
q)fr qtq (Morley,stheorem)4.f {iaiE
tt r
(1) fr'RR gt'i lspu.rningCircles)
(z) siqR-iq €@rcr)
(s) frgq + s)"r + fiq-ss + slh&
(4) Frq{wpii
26. qr{r Effidi t fiffi FFRBic,rrr *-fi t z
(1) fuffird q@ q-dn q'rdri t
(2) {i{F{d sf+,e qfiT q,t-fl-i t
(s) q..t # {fiT qgeTilt
(4) Bq{ffi €qi
CIC-1(E+H) (16)
qr q-riftqsql6ruT
$ I
t €Triii g*rRi6r tFr+ riqr*]q
27. qT-dsi
(1) Yqq *iqr$rq (2) {q-3qH.q'r {qi?fi
(3) 4.rf, eTrtr{ (4) eEtd{ {ql?Iq
qRurH3qe@t
q;r€qreHq'FQ[crriirit ea ffiqr qili w nGFrm
28. FrqrdF€dt t fus nt6r-r
ormt z
(1) S1?TqIGFT(fime sharing)
e) StreMmqlFqs (Interactive)
(3) }|-qq fiqFl;t (Batch Processing)
(4) qg-3T{ffrqT {qfe1;I (Real-time processing)
m*.=T{qreffi} enr t
s4. +-frS-d
(1) frfEr?iidqT3rr6{uiior qr++tq.tqf+-qrqr vq.dTt
qr v+-fr t
(2) sTfirsHqrqf,qr a6fi-*i Fiq t q}q qRsdi qi w d
(3) fmqrsedi+ +6{q (Dupricationl q} {qiqr qr vfidr t
(4) wts qtfr
( 1 7) P.T.O.
CIC-1(E+H)
qfiWr iqq (nrt" hidins) Hr g@ dFT B
(1) silq+nqrtvrfr sTfirs@ ld qr vo}
t
(2) oTrqtoiffi q.rei.€dd{Et sqq}rfuqrqrEn
(B) BTrrdT+lfr +1e+rqvqrdr rfi Et-fi
(4) 3TIq+3tT-6ildr +$ Rs{rsTprftiT*s{ RFilr
Constructor
ti W-Of t
(1) C++ dRI {qd: SRfdI
(2) emrharuidfud
(3) qI (1) q e\
(4) =qfd fr t +ti +A
87. il.d-fig$ qkdr + Hrqi {f,fi g$rmq*drmigfr t r
(1) g-{trlqdT (Reusability) (2) ftlRIItrT (Flexibility)
(3) (4)
fgCdf (Abundance)
t e +$ q-fr
"q{ffi
ffifuH d t +* srf, *fud (rimeshared)
Trq{th* {iqr.r{ 6T sEr6wT
af t z
(1) t-e eTRqfi e) Eqr$sTReTur-
(3) {qH sTRqTq yqq {g1t5{
G)
6,lqrt sTreTrRd
qa4 dif + F{rdr"rt
(1) Office Automation Systems (OAS)
(2) Transaction Processing Systems (TpS)
(3) Management Information Systems (MIS)
(4) sqds qs
CIG-1(E+H) (18)
qr €qrfi qroilffi t t
43. F gtu t q] €-dr(qR${s)t w
(1) frtsqr (Media) (2) qR+{f, (Peripheral)
(3) qdl (Servet) (4) Wliiz (Client)
(1e) P.T.O.
CIC-1(E+H)
ET 6rdr{qtrfi t ?il qFrit(y*q +i. sr t roorq,)
7h : q ? l5 0 n r r t r r y d r q A f E q r r r q r 6 e r 4 w \ d der i f u d + l ,
ql,
a aw
r r r s F' /' / T
w o eifud qE 6Ea ,Tdddl t ,
51. wi-Tilfiqq-{drilii + ks-rq+ r€q 6qii *r qa4 :iE ge $s*r rhr t r
52, qGr\rs frflTd stfi*:Fr
ritrdr (Database)
fr sTf[r+T-q
eTFrftdsr q-sfi eqq €qFrqfr-qr
qFneqRi-dfi w x+q *iqrr{ srsi sqqlrfr
drori r
53. ie+c (Internet)avr igrle Ontranet)qs El nlt t r
54. ets mgq (q-giFrddr{{) t q+'Tsnf $fu +.qgt
d dr + dtq gqqd (online)€iquT liqq
iA E)-dTt
oD. ETqq€R (Hvpertext)
tq Tt 3tmfus sq t qwn Tidfiid {ra, fu{, ffi nq1qiBq} 6}
xqowldffut '
oo. wd, qaal WidqTf{rqrqTfrt}-fi ql r
ot. 3T)fus(feasibility) it ffi
daiql e{Erq-q srrgtT+ Mfls vqreTFit
*i q.qi A-fi t I
58. qs 3r6i Rqtj fr {fir 4i qr*- qq +-fi t I
59. "ProgramFlowchart" tfsrT"systemFlowchart,, or rqlq qs.
{R t r+nq qr fuqJ qT RF.1I
t r
q-{dT ?i1 (Ontine information system)6iTTf qU-s]-{eqf
Eqn dT (Real_timesystem) Tf,
aln wg €u-efiBqrdr q N ws{'TA+ qrFqFrt.g,* qr*, d l--
61. lqq-rf,T$qlq{ (T}ansaction
Processinsl * 6q g+ rtFR q1 req qdq ,igRUT(direcr,
accessstorage)gfu eff+f++ t)-fi t f
+ftsd dPfifqiFqt-sdqH sri*sT €qrqT d+ats rflqfcq--ssqrrq (Functional
q{ 3TrETrR'f, Approach)
t I
tilmr 16oo1rer)
F-{te vt river+i } vgqq s} Fqffi (menus)qr q-ql (items)qi
q sq fr rffiTd olor t r {*
64. F-q gcqdqT F.|- r"aNd +f,dTt r q-oweNq) =rfrfr *Fdr I
65. d-{qfu, wqrftfrqr rur q€*fiBqr d qtgdrt r
66. s+{rF]t5li(Inheritance)
gut smrcq.?if(objects)t rq 3{irdqlif 61 faqful sd Ei gfuw
r++ orort' r
qFffiil-3qci dT (ouject-oriented eTqdfrs q,HFqq{ + fdq BTERTn
systems) trqKT
F+om+ silr r*rddr warer qfi srrt I
68. fiFrqq{ trfuq (Konigsberg
bridges)* nm * {fr{ effiq ffi + E}t t 3it{ B-{t
3rffiRT{ TIffid tEulcrian circuitl f6l A V+-Oi I
CIC-1(E+H) ( 2 0)
6e. wttTn eqit or q)'r ({dr n {6 WIfutl onvrr!S Wt qd qqT d-fr t
70. x-d* srqnqsWt {iwr m'r d-fr t, +qr ssi qq q'il +i I
7r. iq-rierfqdnrq et)reiq, qH # E\ilt, Wn +& r
72. FnS qq{qr + qqt-rq + frq }Fg$ q{uwq (step-by-step)
{B-qr FileFT.ir o-eernid r
7s. B{dqtrf, qfrffidr q-d s1 qrl €gr 3ih qTEFE-sTr
(randomness) 61 sq ql:NTdKr
FTFfrdd-fr t I
theory)q.r fusrq ti
fu-qid (Catastrophe
74. 3TTqkT sfq (ReneThom)t ft-qr qr t
75. s-diTferqR(rnheritance)frFrr +T ilr yil nur frfsTdi $ qqm q5"qd q.r qfrrr {qE
q+nrf r
:
76. slfs.gr qrfl (outu dicrionary)fgw. qgKur gFm tni"t storageDevice) sfi4'l-{+ qTt E
{-d{r sqc|errfr oncn t
77. Eih qfc;gt q)fl (stund-alone 4't ti.iq g+ DBMSt Etdrt
datadictionary)
78. ffi{ dT @xperrsystem)Fruh vOr++cir qr qrtr ttcr t r
7s. qR d{ fr'lTqq qrqrqq # FFr{ (Datatype)* B-€rfi +1 qqdr {sfr t,' n} sS fudTq
(extensible)
56f VfOf t f
{fufiriJit 4T sTqd-FTqtd{qq t r
Bz. E+-qrS'(Bookmark)
e6. f{€dRd qFE @*tendedentry)t drfld t - lis yqn q1 ppfq qKUfrffi qfuisft
qfdE + q{qTur
f+.qqri ffi Tdr 41 }rffird frqr vror t I
s7. ffi +qar i-S fr qrq-dvdr Gl" server) adq qts E)-dr t q) sri-*-.sr
€F-dpif
61 tigRur qrnr t q-dTqtTI xqi{6idf (users)si q{ qg" *s.i t, I
crc-1(E+H) ( 2 2)
rq, 6'rd b fts dq6
CIC-1(E+H) ( 2 3) P.T.O.
tq'6rd b frs drr6
Term-End Examination
June, 2006
r: :
Note: I
Mq'rh
. Note: Four choicesare giuen for a question,out of which one choice may be correct'
correct qnswer in releuant column of the answer sheetgiuen to:you' In caseyou feel that
' '0'.
none of the ch,oicesgiuen in a question is correct, marh in coluntn
(1) Pr'o'
CIC-2(E+H)
3. ENIAC stands for
(1) Electronic Numerical Integration
and Computing
(2) Electronic Number Integrator and
Calculator
(3) Electronic Numerical Intermixing
and Combing
(4) Electronic Numerical Integrator
and Calculator
4. DEC is the example of
(1) Micro computer
e) Mini computer
(3) Mainframe @) Super computer
8. DIP is
(1) Digitat Impact program
(2) Dual Impact processing
(3) Digital In-line package
(4) Dual In-Iine package
clc-2(E+H) (2 )
l,2. device is used to grade tests through reading the marked alternatives.
(1) MICR ,, (2) OMR
(3) OCR , (4) Keyboard.
14. RISC is
(1) Redundant Instruction Set Cornputer
(2) Reduced Instruction Set Compiler
(3) Reduced Instruction Set Computer
(4) Redundant Instruction Set Compiler
23. SPOOLING is
(1) Simultaneous Peripheral Operations On Line
(2) Simultaneous Printer Operations On Line
(3) Simple Peripheral Operations On Line
(4) Simultaneous Printer Operators On Line
26. The second era of computcr systems evolution introduced the following concept :
(1) Distributed Systems
(2) Objcct-Oriented Technology
(3) Batch Processing
(4) Multiprogramming
(1) Compiler
(2) Interpreter
(3) CASE tools
clc-2(E+H) ( 4,)
29. Which is not a part of 4GL category ?
(1) Compilcr
(2) Application generator
(3) Report gencrator
(4) Decision Support System
33. The maximum distance between 2 nodes connectedto same channel in LAN is
(1) 100 m (2) 1 km
(3) 5 km (4) 10000 km
36. EDIFACT is
(1) Communication standard
(2) Retail industry standard
(3) Standard for administration and trade
(4) Transmission standard
c r c - 2 ( E+ H ) (5) P.T.O.
37. The frrst Packet Switching Public Data Network owned by Deptt. of Telecommunications is
(1) NICNET (D BITNET
(3) USENET (4) I-NET
39. The process of getting data accessby intercepting the traffic on the circuit is called
(1) Data trapping
(2) Cryptanalysis
(3) Cryptography
(4) Leakage
44. Data Encryption Standards (DES) algorithni specifies a method for' encr)ryting a/an
block.
(1) 8 bit (2) 16 bit
(3) 32 bit (4) 64 bit
CIC-2(E+H) ( 6 )
45. Identifying risk in various alternatives
is part of
(1) Definition phase
Q) Design phase
(3) Functionalrequirement
(4) Implementation
CIC-2(E+fl)
( 7)
P.T.O.
True or False (Questions number 51 to 1O0)
B State whether
Note:InthefollowingS0questions,tnarhl,ifth'esta,tementgivenistrueond0ifthestateruent
giuen is false.
device'
could be directed to a card punch
52. In computer, for di.fferential engine the output
Motorola'
54, 8080 microprocessorwas developedby
failure'
56. Memory parity error is an example of hardware
memory
57. CPU register directly interacts with secondary
62.Seektimeisthetimetopositiontheheadonaspecifrctrack.
oxide'
63. Winchester disk is made up of magnetic
MB of data'
Un. S incfr optical disk can store around 650
I !
l *
library books'
I uu. Optical Bar CodeReadersare used with
.
CAD is ComputerAssistedDesign'
| r--r h^^ir
uu.
I
I
ut. Inkjet printer is a non impact printer'
I
I
I ctc-2(E+H) (8)
I
I
conrrecting printers to a computer'
6g. Parallel interfaces are comlnonly used for
anil CPU'
70. Memory buses transfer data between memory
in a cycle'
78. RISC machine should not execute 2 instructions
17.C++programexecutesfasterthanmachinelanguageprogram.
to Compiler'
78. Interpreter is good for fast debugging in comparison
S0.XoRisTRUEifbothofthcadjoiningexpressionsaretrue.
GUIs'
of development environment for most
g5. Application Program Interface (API) is a part
36..ProgramstructureDiagramisalsocalledDataFlowDiagram.
P.T.O.
CIC-2(E+H)
(e)
88. '0'
indicates the presenge of electronic . ;
current.
ctC-2(E+H)
( 1 0)
-
SPACE FOR ROUGH WORK
( 1 1) P.T.O.
CIC-2(E+H)
SPACE FOR ROUGH WORK
CIC-2(E+H) (12)
fr.qr$.fr.-2(E+H)
qEftiba gt onqfrrrffi.sn$.fr.1
ffiifrdqilr
qF. 2006
S.nr$.*.-2ztrtFrot
Wlzl : Z qri qf?rqaq ei6 : loo
i
ie:
(t) vvqlw aar fusar &r d6 rrrcEv+ a at wq ds frW Eo a'ci * ftq a ad r
f t i ) w r w i l r c o v s + d r M d z i t * ) w f r v - + o 6qr M
i dr *H fu af dr
(iii) sql swl + ri6 aqtad t
(iu) vdo vw w *ad W d rar t t qR q6 d .ner+sa? rr fr?TntrTq qq dJql
err Rq rq'Fi d ss wr w tp enaEer wE7 1
ifi' {gf{drq (rgq {qr r t so ra)
qh : ffifqd raai C s-dq,yw */Aq an fuqw Rq qq d, re-+'C qF ga?d H6d/
d I sd, rar *) rat wznw riaiftnm:n7fr elffu qt t qR 4)d cI?ra-r ed ad
d, 6) +aryW rold ei6a *t I
1. nqa * w++* w q ffi Sflqr qrcnt ?
(1) frE qrwd (BlaisePascal)
(2) qd +Aq (CharlesBabbage)
(3) sfq Efq dq ("IohttVonNeumann)
(4) EfrddgIE+R (HowardAikens)
q6 t*Til
z. "tl-{d (Kilo byte)d{-fl {
(1) 1000Erfe
(2) 1012qrqz
(3) 1024q|{e
(4) 10000qr{e
c rc- 2 ( E+ H ) ( 1 3) P.T.O.
3. ENIAC ST 3T{ I
(1) &ifrs ;eliRsd qFuhrq qrg q.qEq
(2) {Aeifus iqr qftfrex qqs *egd.gt :
(B) {@rtrs =$Rderf;ilfrCsrr grrs dfur
(4) {AqiFrs qtRqer sffie{ qre +egrna
4. nnc (s rqrdrqt
(1) qrr*l q-qa or e) ffi qqal 61
(s) ffiq sT g) Eq{ q.qr{ 6r
5. qs ssf 1trFr+-e)cpu it 3ilqffi qm (tq *t6*o) fr lgm fuqr qrflTt
(1) ,ig[{q f+r$ fOis qf{cl (z) F{ge/sTrscge
(s) {qrs 1{ryftx) e) q}'qrqH1ga-r
6. t+E{fi q6 qs qrq rH+eqrd t ,
(1) ffi q* {Frst
e) fi'ltq {fu€{
(s) t+tvr (qqFflq) {trq€i
(4) q)qTq flrizr
c l c - 2 ( E+ H ) (14)
+ is strq+ rou- gfr 5Rqrf,tltr t t
rz. fqr6dF-+eqd wi * anrqfirnuil
(1) MICR
(2) OMR
(3) ocR (4) S$qzq
\4. msc€
(1) G.z {W{1-q ve E6'tr{t{
(z) fiqs Fq+{H fu mqrE-ct
(B) fig.{€ $e q.qet
(4) ns+z {tr{H t-a oqqot
15.
N ftQst {srcd or gRqreotar t Z
FTqfufuf,t n *{ qr {i'rd{ CeTr,tTr{iflq)
(1) MISD (2) MIMD
(s) (1)3I\ (2)+it (4) SISD
d fr p4q666 fr t frt4 qr € t ?
L7. ft {fmi fr+q{ (nonpipelinedprocesso'l*
(1) = Tr, / Tn
Sp (2) So = Tr, + Tn
P.T.O.
clc-2(E+H) ( 1 5)
2r. * qs q{6 q} nbrtr'T+-}-q fr
Tdr ffi qg+} (access
values)
+ fdq F*qld dnT
S
(1) tt (a'"uy; (2) EIiR (Constant)
(3) grel ef{q (Data T}pe)
(4) Tt (Variables)
Fqfufuafr t +{ qr d-*$qdrtsrcs(effqn-defqtfil
(1)
t z
(2) NOT
(3) + (4)
23. SPOOLINGd
(1) wfrolFeru qRhrq $5AR1qqfq ergq
(z) HEqdh€HHe-€{ eiqte|R *f, -,E-
(s) fuqd ER+w sfrqtflR qTaersq
(4) M{rd}fftrq e--€{qTqH et+ er{+
ffid qqftrqdT (oi.t.ibutedoperating
system) + qrrd fr gw sr{tTRuTr
"+i*fQfn t
(1) ft{tr+{Tq (Coordination)
fzl (Cooperation)
(3) F-dgi-hfi (T[ansparencv) (q wrg** rfiquT (storagecontrol)
F{i t +t+ wzt windows
+ Hqe td z
(1) qg-sT{ (Multiraskins)
(2) Efd IdET (MemoryManagement)
(3) gfu nEiqq (DeviceManagement)
(4) vql fri] '
2G' 6qc{ R€q fusrq (evolution)fr (R sl?Ir - r \ r (second era)
ta) d qq66o stqemutT
gBlT
c\-'- \Dvvvtlv E r rr-ll(ll(gfl \:rll 6r lqdq
t
CIC-2(E+6;
(16)
-
zs. gqi t dq w +cr *oft qr lewr rd t z
(1) 4.qf{fl (Compiler)
(2) qF+{Tf, +qtd{ (Applicationgenerator)
(B) Rqd+fta
(4) f+fu vorqiir (kktr{ qqtCfu*zql
80. Q{{ q*s ++q (rrAL) ffi de
1g"r,u'ation) q,l g-fldruTt I
(1) 2 (2) 3
(3) 4 (4) 5
sl. 3risgr{qR (srer*uF+{H) + fuq Ascrrqndi fr {Rqrd di ErAffil oit'l ql €@T
\
7
a
(1) 8 (2) 7
(3) 18 @) 32
sz. {q-q 1*-qFrt{H) iTd qT fud'fi qts ffii
(simplex) + stn.rr 61 si-Jqfrtdl B
(1) q{ Rvrrii
(2) qs {Trffiqt !:s 8 R{n fr
(s) qs fr qrrq qtfr Fflreii fr
( 4 )r + f r t f f i t i A
+ qtq cqKrt qrEr {fr fr-fr t
BB. I,aNii qs A dq-dt z ftf (Nodes)
(1) 100m (D 1 km
(3) 5 km (4) 10000km
\ ^ ' \
34. ZltF;TI$t (Token Ring) € 9S
(1) uN zlqt*$
(2) LaN ft*'q iqg (a.."ss method)
(3) fr.'{FT+{H sTfH++qT (Communicationarchitecture)
@) LAN6rd+{i
sE. qffiic ffiflr (Circuitswitchins)+ fdq elq qr gr;zl q{q (step)?6? t ?
(1) ffi q*S qf$-{d (Network AccessPassword)
(2) qBz dffi€ (Circuit Estabtishment)
(3) 3|Zf qiqs'{ (Data T}ansfer)
(4) HffiZ Zffi+flq (Circuit termination)
36. EDIFACTT
(1) sqtr*flq TH (CommunicationStandard)
(2) {2d E!-sqi €<of (Retail Industry Standard)
(3) c€d qft qgFfF{*|4 !tr tr (Standardfor AdministrationandTrade)
(4) gFSfrW4 +€d (TlansmissionStandard)
CIC-2(E+H) ( 1 7) P.T,O.
s7. Tildrtte ffirr qks srfl fuq$ q) K-{tqR1@r+vn) Fqrrrqr t, qOt
(1) NICNET (D BITNET
(3) USENET (4) I.NET
4g. fu qr{w
0,"r,igh) .
(1) v{0 qdd qTFbSr+ t qk€ ii eTrqr
(z) C+zi{r q{fr{ t xqfd-dd
(s) *-+o .nxn sEdi s) A qqrFqf, +-wrt
(4) iqe conaMAND.coM q,r{f,d 6 ${Hd orar t
44. grcr EFfrc{rqrH (DES)QgtRq (Aborithm) encrypt6{i * ftTq
rt-sdfr-*.lcarari r
(1) 8 bit Q) 16 bit
(3) 32 bit (4) 64 bit
CIC-2(E+H) (18)
45. trFffi f{crdf ii ffi Risk* q6qm{rfrq fr t f+-r6r q+ Fwr t z
(1) ffFFT{TT tg (o"nnition phase)
(2) fSTfl tq (nesien phase-)
(3) riwrid ffi€ (Functionalrequirement)
(4) EFWt*flq (Implementation)
46, aR+rfTIq(Vaccination)
frrT t t ffs6r qs fdwr t ?
(1) ffi+Si (Cryptography)
(2) td-qfqfq frfl-q fAnti-Virus program)
(g) ffrqfg{ ffi (DisasterRecovery)
(4) ffiRz1 tgtRq (SecurityAtgorithms)
CIC-2(E+H1 ( 1 e) P.T.O.
Er rdr{q Ffr t ril qtrfi (ss{ ri. n t roorq')
52. ffiF{prd Ek{ (Differentiarensine)t fdq qcT fr ersrE (output) q} q4, fld
qq gfu (cardpunchdevice)
61 tr qTT f*qr qr vqc'r t I
CIC-2(E+H) (20)
€rilqd\ {t qq5t t F|--if qi frEi + l-dq x3tr
68. qr{t<R 3n-<{ITs (ParaIIeIinterfaces)
t6q qrt t t
stso eTfit+q{ dil t t
qTfii-+qi (Dataflowarchitcctures)
69. qzT d
erf,{ul oifr t t
20. ffi es (MemorvBuses)tHfi 31hcPU+ fiq ercr 6
d-i t {tqd (sr,ured) tq-fr (memory) d|fr t r
7r. zT{c-s6,qq€(Tishtlycoupred)
(throushputl t r
72. qlqq-dT{fufrfrfHq R€q 6r W-d StTRf,T
(s o'P tts t r
75. tg{ ry"r,tura)
qd-fttR{, ffie' qzr+.qtp }35dru!-drm+l q}-'s-dr
t r
76. FRAMEwonK
qr<t qd e.rrT6{dTt l
77. sa1ii{l-tt, q{fra d?+q fr'Jrqt
78.6qr{f,{+1ge-+i{fird.TiEM{(debuggrng)4Gtrdqw{fizIerwrtr
7e. sQLHqrTqd si qrqrt&ql t r
q-frt r
80. xon qfr t qf( {TtI gB +ii aif,s
€r{4r \rs qqfrq (qfr'T) ffi
8r. If-then-else t t
qrq e' I
t 3i{ v q* rqrd 6r
Bz. xm * fetq, x q6 q{ (variable)
qW Etdr t t
EfF€{ (ResidentMonitor) y-qq riqfe' (Batch processing)* qrq
8s. t6i*€
ql?nt l
t1 +1 tr+K dw (DialogBox)fi 4-6r
s4. frq-qs4 (Pop-down)
qKrf,r cur * fdq qfi.1+{{ m4tq €z{hs (API)}q-f,qi-a qqErq{f-{ (Development
85.
environment)6l qS 3tqT t I
I
P'T'O'
I (211
Clc-2(E+H)
I
I
88. 'o'F&ETfrs qtc qi sqRfd +) qffdr
d r
8e. EfueT (Disital){d t q} vqq * w}qT
sild t r
e0' {)tt 6aoa"-)+} r@E{ fr@z{ (Modulator-Demodulator)
s q-orqrdr t r
er. fufu'r fuw +' leg pnmncr +) cusDEC
* sq fr qrfl qrlmrt r
s2. FfreDqiq) s{S .r5d rgooS.t fr rqa
fu+r rpn qi I
e3. oto, $sq@v Ef€e.T. e:fs &ilffi
ffrr) q ffid fu-q,'rfl en r
s4' qqiq srd 14"""rscontrorcards) 'T + rmq
"tr Fdq,- dt t r
eE. stzT+qfr qo""yviews+r ftrrlurg{ffi t ldq
fu+r rqT d I
e6' $FTd3r{Eltfidl,
trtoie q eriqldqi eilqFFifsr Hrrtr oc t req
*t,(Back-ur)+1
e7' 3-6sHd qifud Ri + liTq sffi (contingencyl
qlqfl (plan)+) rsTgq fuqr rrqr
EIT I
e8. qlelRur(plain)qqqivr +)
E-afubd qi{qivr (ciphertext)rfi o6r qror t. r
ee. F*qti T+.qH 6tvr qr{fr trdl ERrfuq qrdT
t I
100. 3T<Rrqtqr ftos Hffiq) 6A{, irrft 0vr",,'o"y)
fr qrq sni t, r
CIC-2(E+H)
( 2 2)
-
<s ord b fre s{6
( 2 3) P.T.O.
c l c - 2 ( E+ H )
tq'irrd s. fts d{r6
Term-End Examination
June, 2006
Note:
(L) Do not start a.nswering until the inuigilator asks you to start'
all the questions-
(ii) Questionpaper contains 100 questions.Stud,entis required to answer
There is no choice.
(iiil AU qwestionscarry equal marhs'
(iu) Each question must be giuen one qrlswer only. If more tlt'an one answer is marked or
giuen, zero rnarh will be awarded for that question-
Note : Four choicesare giuen fbr a question, out of which one choice may be correct. Mqrh
correct ansu)er-in releuant column of the answer sheet gi;uento you. In caseyou feel that
'0'.
none of the choicesgiuen.in a question is conect, marh in, column
l. Which of the following DOS commands deletes a directory and aII the frles and
subdirectories contained in it ?
(1) del
(2) rd
(3) del tree
(4) removc
( 1 ) r P.T.O.
CIC-4(E+H)
3. Which of the following is not an operating system ?
(1) UNTX (2) XENIX
(3) LINIIX (4) ZENITH
4. MIS uses which of the following department(s) ?
(1) Information Reporting System
(2) Decision Support System
(3) Executive Information Svstem
(q AI the above
CIC-4(E+H) , (2)
).i
t;:, 11. The ISO-OSI model of networking contains
(1) 6 layers Z layers
e)
(3) 9 layers @) g layers
13' The governrnent users have the following choice to connect to other networks
:
(1) VSNL
e) Ernet
(3) SATYAIVI (4) NOW INDrA
16. which of the following graphics frle formats is not supported by web
?
(1) JPEG
Q) PNG
(3) GIF
@) None of the above
c rc - 4 ( E + H ) ( 3 ) P.T.O.
:li
lg. To enter a formula in a particular cell of the worksheet in MS-Excel, you have to frrst
type :
(1) $ (2) #
/'a\ (4) &
25. EDI creates the following fiIes as a document passes through the system :
(1) Integrated format frle
e) External format frle
(3) Transmission file
@) All of the above
CIC-4(E+H) ( 4 )
26. MS.Excel is known for
(1) SPreadshects
(2) Spreadsheetsand GraPhs
(3) Spreadsheets,Graphs and Databases
(4) SPreadsheetsand Databases
27.Tochangethefontsizeoftheselectedtextusethekey_inEicel'
(1) ctrl+shift+P Q) shift+P
(3) CtrI+P (4) Shift+DeI+P
by Microsoft ?
zg, What is the name of the latest Server Operating System developed
(1) Windows NT Q) Windows 2000
(3) Windows XP @) Windows 2003
called ?
31. what is the address given to a computer connectedto a network
(1) System Address Q) SYrid
(3) ProcessID (4) IP address
32. DireclX is a
(1) Graphics Package Q) Word ProcessingPackage
(3) Uscr Interface (4) Programming Language
33. OpcnGL is a
(1) ComPuter Part
Q) User Interface
(3) ProgrammingLanguagc
(4) Software that drives graphics hardware
during booting
g4. Which frle in MS-DOS contains internal commands that are loaded
process?
(1) Io'sYS Q) MSDos'sYS
(3) CoMMAND.COM @) CONFIG'SYS
(5) P'T'o'
ctc-4(E+H)
s5' which of the following is a database management
toor developed by Microsoft ?
(1) dBase
e) Access
(3) Personal Oracle
@) Sybase
clc-4(E+H)
(6)
l
44. A protocol is
(1) A set of rules
Q) A set of data
(3) A set of information
(4) All of the ahove
46, A file which contains readymade styles that can be used for presentation is called
(1) AutoStyle
(2) Template
(3) Wizard
(4) Pre-formatting
4t. In Microsoft Excel, the intersection of 3td column and 8th row refers to'the cell
(1) F,iz Q) D8
(3) CE G) E8
(7) P'T'O'
ctc-4(E+H)
B state whcther Truc or False (euestions number Er to 100)
56. Coaxial cable has fastcr data rates than fibre optics.
57' For communicating through EDI, the source frle should be conlerted
to EDI standard
format.
62' SLIP and PPP are TCPAP protocols used.for connecting to Internet through modem.
65' The Text field can be used to store alphanumeric characters of length upto 25b bytes.
66' QuickTime is a multimedia software suited for synchronizing sound tracks and video tracks.
67' An example of a program that has a built-in programming language is knowledge program.
CIC-4(E+H) ( 8 )
inches'
69. A floppy disk comes only in one size of 1'44
geographical area'
70. A LAN means creating network covering large
law'
71. The limit of speed up is defrned by Amdahl's
parallel computing'
72. Forecasting problem is a natural candidate for
on Internet'
7g. MIS is designed to provide MaiI exchange service
media'
75. Like CD-ROM, a laser disc uses the same recording
TT.TwogeneralschedulingtechniquesareGanttchartsandBarcharts.
of a page'
79. CTRL+J is used to align left and right margins
CONFIG'BAT'
84. DOS system frles include AUTOEXEC'BAT and
attractive'
86. Animation makes the presentation light and
EDI
electronic message service to support
87. The transport network provides a powerful
services.
P'T'O'
(9)
clc-4(E+H)
88. Gopher is a menu-dnven search
engine. , , :,,, ,: : ,
c rc -4( E + H )
( 10)
SPACE FOR ROUGH WORK
CIC-4(E+H) ( 1 1) P.T.O.
SPACE FOR ROUGH WORK
CIC-4(E+H) (12)
fr.sTr{.fr.-4(E+H)
nEfube rq 6,'qfdTlffi.3n$.fr.1
srid qfien
ET, 2006
S.flr$.ff.-4 z srgquiFr
WIzl : Z qot qftrffiq ai6 : loo
ie:
(i) wif qr wt fuwr d6rd6 qz{rryz ol qq dq frfleffi gqFar? + frq a ryd I
(ii) wtwtrcorwd rMffi dls',f'swqrlqffi dr+ldffi ad'dr
(iiil sfi wif + oim sqn d 1
(iu) xd+. yw w *qe qa drar fr rqR \q t etfqosil0 T{ fqwq alnq w at qr
rar Pq 4q di a) rs wr w Ea eia Eqr qgqr r
tr q6k+.fl (vw {qt r t soro)
qb : ffifu7 srd) C xto yv++rfo qn @ pe 4q d; ma 0 C*' €d F) v6Flr
d I v-d rar +) rf,r vtzsw riaiftn 6n7 f oifui of r qR *ld * vrt +rd rd
6), 6) wry W rot t iifu ql t
r. FTqit t slq qTqd oos qqis q+ grqMr sftr ss+i v*sniEefr s1 €sfrsrE-d+)
Fa<art?
(1) del
(2D rd
(3) del tree
(4) remove
9. API .F'T3ftf t
(1) qqr{s nt{rq{ F€Gq
(2) qlqtflq *fl-qt E-.Tr+q
(a) qqr{s }ikqrd Fathq
(4) qffiH mkqw Eurhs
lo. EDPiFTerei 'F
(1) fufrs sra qbrtr'T
(2) {WFrs lsfwct e}fifr,7
(s) fuks sra frqfr,T
(4) {Wfr6 fufsa-dnrqTfr,T
CIC-4(E+H) (14)
11. teqffi-T* rso-osl*s€ fr
(1) o iqt (z) z iiqr
(3) 9 c|qt
(4) eA{r
dt 3qRqfrqrK{fr (r{€-dr
12. e-r ffi Fqn E€qrd q-{i eT-a* rdq q)-$Elqf, 4qeit
r8 t) a-frt, t
(1) LAN
(z) ffifl dT
(3) wAN @)-qt-sfr t +ti q-fr
r3. s{fl-fr 3qq}mFii* qm 3nq
qffifrit 1M) t dgf + ftq Fffifdpild it t nr gE-*
r \ ^
€ /
(2) Ernet
(1) vsNL
(3) SATYAM (4) NOW INDIA
(3){'f,d-S(CoolTalk)G)EcfizfrqlrnternetPhone)
e) drslq{sil{ ffi{
l r
(3) wa, 5rd*+t silr ffiqi
(4) sra, 6rd|+1,Tfq-+€Rs,N sqqtfrT
23. qs CD-RoM
--- n-* sisruur
fsdll q-t qqar t, r
(1) 1TR
Q) 600 MB
(B) 2oo KB
(4) 1oocB
24. *)te gf (Corel Draw) (S.
(1) ituw q+q d
(2) qerAqtt-q e
(3) qffitrqr q}q A
(4) yr< €ffier{(Td q}Sfur)q*q
t
zE' f-q q t +{ qi qrre +} EDrq;r.r vq q-s
t ERr+qfusq fr t ycor t z
(1) Ffu},}sqfilz srFf,
(2) qw-6id sTqe sr{d
(s) pivfrvn w{d
(4) Bq{il qqi
ClC.4(E+H)
(16)
2,6. MS-Excelql qF{r qrar t
(1) dern-4s+ feq
(2) +i={t6 3Ih lrsl + lf,q
- (B) ffiry, nTsT3+r<rzr+qt lf,q
(4) rlsriqq sThsredq + fuq
27. Excelri ffi qqp* q-{qieTs eqr{ q sTrq'R,n q-qf,i + ldq
{si w
q*nqrdod t r
(1) Ctrl+Shift+P (2) Shift+P
(3) Ctrl+P (4) Shift+Del+P
CIC-4(E+H) ( 1 7) P.T.o.
86. Frq fr t qh qr qr{*t{f€ fl{I ffifr qd srcdq Fit1{ (dM€) Ef, t ?
(1) dBase (2) Access
(3) Personal Oracle (4) Sybase
clc-4(E+H) (18)
-
46.qssr{€ge.itq{r-qarqr(tsts)€r{daffirt,RTqfi-6{gr+frqF€Hf,|+qrqt
t, sil 6Er qrdr t
"*t
(1) 3frztgr{d(AutostYle)
(2) tdc (TemPlate)
(3) ffi (wizard)
(4) fr-qt{ftlrr (Pre-formattins)
t
2000)it {(views) dit t
4&, qT6rqqt*z2000(PowerPoint
(2) 4
(1) 3
(4) 6
(3) 5
47.q+$Etrfirurfrqr4i{qtqqd(Animationschemes)ET[aq{frt
(1) q$ wr*ii fr Q) gfi g{ KT{iii t
. (4) gq{F qs
(s) {ftq Kr{s it qr riqti
t
q
\,"Rq (Excel) Tfr efdq (Column)3*{ 3il-fi t Gow) E-fff*{q
48" qr$**
(D D8
(1) E2
(4) E8
(3) c8
q*q t ?
4s. Flq it t qh qr v+t sn-{rd€rfc
Q) Lotus 1-2-3
(1) VisiCalc
(4) StarCalc
(3) Excel
so.Excelitmsqfi-dt,d+eil<iffi3dtT{(character)Zl-{9r6qqrv+ttu
(2) ro24
(1) 256
(4) 65,535
(3) 32,ooo
P.T.O.
(1e)
CIG-4(E+H)
Er {i|IFT qifr t qr rtrfi (qs{ d. sr t roora)
qh:
Pr::#,## 6rt vE7
d'att ai6 a1,qryErw
pr7
I*T#w
51. $-+ms) *ikil reri*sTer<rpr)* sr*vs-ffi
+ fuq qs g{R-dirs{ts o,-+qrdr
dr
52. DLLil 3TSt srcTR-+qritfu* r
53. {d (Dumb)
eft{d cD-RoM
FEq+ frrr +
{-g r}il t r
54. {|EdmE qfs{R (Microsoft
publisher)(wr}q dqT{q,ti
fr vOr_raro_tnrt r
oo. cD-RoM + +{d qs fi a** fr 3Ti6d61 rfsrqq,
frqr w q6* e I
56. slqfuqf, *qe (cou*iar sr r'r{{r qffu+s + q* fr' srdr
cable)
.* +* t r
57. EDrd*r RElqurt fuq, els qr$-iT(source
file) +) EDrq'.fi sT+c fr {R* u,Fq r
s8. MrDr,wed d qFq+EFg+* Efuao
r+quq I
59. 4lFSitrE qtr (Microsoft
Access), q.f \r+, sq6qrf
RDBMS $ 1
60' gs cD-ROnn
efirqrq 180MB srel S',r$is'{q q.
v+.ar d r
6r. ArMBr q{ d S-i}+trs
FisqtJqqfl_{r
62' sr,p ailr ppRrcp/rpfizlEil-o q)
t\ - r r qtlq ERr{arie
-rrer tll\l
l'c t g-si + m F**d frq ETa
t r
-
Ge. qs qdfi (Floppy)
EH aiie 1.44{i[ ] nm fr q|{q ii sTrdr,$ 1 ,'.
74. fr-q;q qq{, qqq Q aqr qrciFrsT4{r gtqTscqTi * ldq qid gqTfflq R'gq a1
T*E)frt I
+1 ecd,qd tqr kg ql qE1fisTfr q1Bqror g*qre oror t I
75. cD-RoM
Bz. ,rEs+,T
t-qrwrw sTffesr{d fr E*araqd ewrc iqT + frq tffr t | :
8s. portqreil fr s€FqlrtEr, sr{flq t-qr s+{{qR t-qrEt-fit I
84. nosfueq sr{ej if auronxnc.BAr yrrfu€'
eilr coNrrc.BAr Ela't r
85. umr t qa-cnq 'qd
t {fsq-afsfuzr Fil}q' I
87. Fffid W snl tqrilii qi vorqar+ fdq qs drn-trq{FAeifrs €1ur n-* gt*
orekn i I
c rc -4 ( E+ H ) ( 2 1) P.T.O.
88. .rlul 16oo1rer)
!F U-iiqrFdd trd r-** d ,
CIC-4(E+H) ( 2 2)
t
i1
( 2 3) P.T.O.
CIC-4(E+H)
tw'6rd b frs drrd
CIC-4(E+H) ( 2 4) 5,000
CIC.5(E+H)
Term-End Examination
June, 2006
G I C - S: M I G R O S O F TO F F I G E
Note :
(i) Do not start answering unril the inuigilator asksyou to start'
is required to unswer all the questions'
(ii) euestion paper contains 7a0 questions.Stud,ent
There is no choire.
(iii) AIt questionscarry equal marh*
is mqrlzed or
(iu) Each question must be giuen one answer only. If m'ore than one answer
giuen, zero marh witl be awarded for that question'
l. The window which shows icons fur the mouse, sound and display is
(1) MY ComPuter
Q) ExPlorer
\4) Tray
( 1 ) P.T.O.
GIC-5(E+H)
3. What is the keyboard short-cut for ,cut' ?
(1) Ctrl+C e) Ctrl+V
(3) Ctrl+X Ctrl+p
@)
4' If I want to make a word'Prominent', in the MS-WORD d.ocument,which
word would best
describe this ?
(1) Prompt
e) Delete
(3) Bold
@) print
5' If a paragraph is rcquired to be shifted. from one place to another in the
MS-WORD
documcnt, it is described as
(1) Rotate (D Relocate
(3) Copy (q Move
7. which key moves your cursor from one ceil to the next in a table ?
(1) Tab e) Shift
(3) Enter
@) Ctrl+Enter
9' To check for alternative spellings for a misspelled word the suitable option will
be
(1) Choose'ToolsTSpelling
Q) Press F7
(3) Click the right mouse button on the word
@) All of the above
CIC-5(E+H) (2)
11. To change margins on a page users have to click
(1) File/?age Setup
(2) Tools/IVlargins
(3) Edit/l\{argins
(4) Place Tabs
Q) FilelPage Setup/1\{ailMerge
(3) Tools/lVlailMerge
(4) Insert/lVlailMerge
Q) Application group
.(3)
Main group
(4) Sctup group
form of
fg. A type of application program which manipulates numerical and string data in the
rows and columns of cells is a
(1) Cell Q) SPreadsheet
(3) Worksheet G) Database
c r c - 5 ( E+ H ) ( 4 )
27. You can change the wall paper on your computer by cricking
(1) DisplayAMall paper
(2) Display/Appearance
(3) DisplaylSettings
(4) DisplaylBackground
28. If a dialog box has 4 radio buttons in the same group, one can choose
(1) Exactly one of them
(2) Any number of them
(3) Exactly two if they ar:e grouped in different columns
(4) None of the above
29' If you right click mouse over the blank area of the desktop, what will happen
?
(1) New background is selected
(2) The task bar changes
(3) A menu appears
(4) Microsofb program is launched
Clc-5(E+H) ( 5 ) P.T.O.
35. Selecting text means selecting
(1) a word
(2) a complete line
(3) an entire sentence or whole document
(4) Any of the above
'To
g7. return the remainder after a number is divided by a divisor in EXCEL, we use the
function
(1) ROTJNDO Q) REMAINDERO
(3) MOD( ) (4) Drv( )
:
41. A new PowerPoint presentation could not be created with the following method
(1) Create a blank Presentation
(2) Using AutoContent Wizard
(3) Using Presentation TemPlate
(4) Using scanner to scan slides in compute" -
clc-5(E+H) ( 6 )
43. Which of the following is not a feature of PowerPoint ?
(1) Custom Animation
(2) Slide Transition
(3) Graphic Transformation
(4) Customisea S]ide Show
46. What is the DOS command that displays the contents of the disk drive ?
(1) DIR (2) VER
(3) FrLES (4) A :
47. Which command can you use to run an application which is not present in Start menu ?
(1) Run (2) Browse
(3) Command (4) MS-DOS Prompt
4E. Which key would you hold down if you wanted to create a horizontal line with the Line
tool ?
(1) Ctrl key (2) Alt key
(3) Shift key (4) Enter key
'60.
Which desktop icon works to display the computers in your Workgroup ?
(1) My Computer (2) Network Neighbourhood
(3) RecycleBin (4) My Documents
CIC-5(E+H) ( 7 ) P.T.O.
B State whcther True or False (Questions number 5l to 100)
Note : In the following 50 questions, marh 1, if the statement giuen is true 'and.0 if the statement
giuen is false.
52. You can call a slide, a good slide, if it successfullycommunicates the complete message.
53. The term for a predefrned computational task in a spreadsheet program is a 'formula'.
54. By default Tab stops are set a 1.0 inch interval from the left margin.
56.Thekeyboardshort.cuttoprintad'ocumentisCtrl+P.
57. The'Thesaurus'lists both the synonyms and antonyms for selected words.
58. A file with an extension of .EXE, .COM or .BAT is probably a document file.
59. The characters you type at DOS prompts are called command line. .
60, Desktop icons open into Windows, if you double click them.
63. When you use calculator, you have to always use keyboard to enter numbers.
CIC-5(E+H) (8)
68. In EXCEL formulas have to begin with an =
70. The mathematical operations that are given last priority are exponents'
green border'
72. when you cut a selection in EXCEL it is marked on screen by a
second slide
74. If a slide has b bullets and no sub-bullets, promoting third bullet produces a
with two bullets.
'Help'in Windows'
76. F12 key is pressed to start
77. print Manager enables one to send more than one document to the printer simultaneously'
80.FreezePanescom'mandispresentinWindowMenu.
thick border'
g1. when you use copy command, the cells to be copied are highlighted by a
83. When you enter a number, EXCEL rounds it according to cell's format.
(e) P.T.O.
CIC-5(E+H)
87. Borders in EXCEL cannot,be'coloured. , , . :. I : :
'
88. You cannot use your own pictures in powerpoint.
CIC-5(E+H) (10)
SPACE FOR ROUGH WORK
Clc-5(E+H) ( 1 1) P.T.O.
SPACE FOR ROUGH WORK
CIC-5(E+H) (12)
-s(E+H)
fr.sTr$.fr.
+.3n$.S.-b: qrnslttrrcoilfuH
€rl4 : 2 qae qftrqaq ei6 : Loo
ia:
wif w att feoaT datn6 rrz{Eer
(t) a at qq ao fiflqrq go- *r-i # ftq + ql t
(ii)
lrzrwtrcoysad rffiW dls,#wqqrlqffi dr*idffi addr
scTT
Giil wit + rid sqa d 1
xdo yw 6r tEd q-frd rar f r qR W 0 ril?r6 ra0 w frqrl artq qq di qr
(iu)
rrn Eq rq d a) rs w{ w ep aia Rqr wqrn r
in qSffi (vgr {iqr r t eoro)
ie : ffifua sp"i C ydo xw +frq an fuq@Fg rq d, Ara 0 qn ufi al som
d r *rd rar *) l{il{ wNeFw riaiftn +irn7fr enfu ql r qR dd * rar g-d ad
a), pi sn7 W @ # erEraai r
l. qo ffi fr qsq (Mouse), ffi 6qr ffi (Display) ql fqsnTt, E}-dT
t oil{qf{ (Icon) t
(1) qe 4lqlf (My Computer)
(2) qaRdR{ (Explorer)
(3) 6trYd ftRT (control Panel)
(4) Z|FF ER (Task bar)
8. !F qq-{d (MS-woRDl
t q+ ffi-+q sl t-td q.{i + tcq qr"r t
(1) $]-{FT(File)ii qrs-t/ +-s zo(Sendto)/tf, (Mail)tRnftz (Recipient)
(2) t-te +o'+ feT*el * sq it qrfo sl t-q (save)
q;G
(B) qd wonu s) gA qs-t gq 'sT[scEs' q] slRErT
(outlook) (€d) st sil{ w-q-m
s}
{6r{ st
@) qd qrtdr$ siqEltqt
e. q-66SFFI (spelting)qrfi vt-< + q-{A sTeriitrq dfrT m sfq 6{t } toq sugmf{driq
Errlr
'6q'
(1) lToolsl+) ga6q7$fttT (Spelling)
Q) rz q) wr(
(3) {r< qt qrsq qFT q) rnz-fu* qt
(4) w{ffi qsli
CIC-5(E+H) (14)
tl. lfs +q q{ qTffi'{(Margins)q} q-{d} + fdq sqq}mTfu6 strn
(1) FilelPage Setup
Q) Tools/I\{argins
(3) Edit/Margins
@) Place Tabs
CIC-5(E+H) ( 1 s) P.T.O.
ii qT qrr{Tt mq t isi +i 4€i t
18. 31iq$(data)d' eiq1t"* frq ii, 3ffi'+ ffiq
(1) dtrlT (sortins) e) FFeeRq(Filtering)
(B) qffrftlrr(Formatins) (4) gffiq lsearching)
3+{ Yrdt * qffi-i d
le. qiq+{ 6qRIT(qdteri nhq) ff qs ffiIi $ eiaii+ W
* sq ii qR-qlffiq-{f,lt' t '
t* + t tno'rl'sil{ Efrdq(columns)
(1) to (c"ttl (2) ffie (Spreadsheet)
(3) T4ilfre (Worksheet) (4) glilAq (Database)
(firiu) W t
20. qs mq wFT (A-dgA{H)s1 q-{i + fdq Td-f{-riRd
(1) qitdr (2) r#qT4
(3) qTtf,rqR (4) 3{Aqq (Autosum)
q;} q-orqTdTt
2r. t (no*) eilr 4iq-q (column)t q<d:< ({€G-+{Hl
(1) qqET qR (2) td
(s) 3r<dq ({;rG-+{q)ftE (4) *fs
qr{ t Sg'Tr31hn6rszt 1w qt'n' qd
zz. q6 W (qnfdT)q) o+fr-mt qrqd c2+
=
r\
e
(1) (D4+C2)'IB2 e\ 94aQl*82
(3) =(D4+C2)rB2 @) =(B2I(D4+C2)
(4) =
Fre qrqr
26. RT-€i (slides)* qqrrqts3lcqg (Handouts)
(1) enf{qd A
(2) q+ tr+-wq-fre
(3) qqq 3+{6.rrq+1qm't
(4) s.c+etrq t
glg:5(f +H) (16)
27. qTG q'qz{ * qre qq{ s} slTqq(m e-se t m} ga61 1
(1) ffilef€ tqt (nisptayAVatl
paper)
(2) ffi/qqhts (Display/Appearance)
(3) ffi/tfarg (Display/Settings)
(4) RTd/deqfsg (Display/Background)
clc-5(E+H) (18)
frq fr t sh qTqrflqr{€ 6I dqlq 7d t ? '
(1) tFgq tF{iTH (CustomAnimation)
(2) wr{s ?iHflq
(B) nFn#q sq<Kq (?iqqfiiYn)
@) 6,grTf{S q Wf{g ii (C"rtomisea SlideShow)
(1e) P.T.O.
CtC*5(E+H)
EI qf,r{q FS t ril q1ril (qgqri. sr t roorq.)
qh : a?l so y-erRg' zzq'd t qtr fmr rqT 6Tt €-d d al t eifu al, BrqETs€ enq
w o aifu *,l, qR qrq qad al t
ii 'ct"l*o's.r qqlqffi
51. MS-woRD qrro (fite)d ffi + fdq foqr qr v*ar t r
52. uq K* Frss dl siEdiwtEs H€ €q,t t, qR qo qq,-iTdrfds
sryf €fur +] sTfirdrfr
q-rqffit r
q{ 3{TtT
5e. nos frt€S (Prompts) fs{ sRTiiq} argqq-G t r€ q.qe FIr{;I (command
line)
o6rvrart r
il .+rrqr{ (rcon)s} qR stTrlsffiT
60. tseTq (Desktop) n} q6 q* ffi" (windows)
itgemt r
6r. Mq (Bitmap)
dfu*Bii + Ffiturt lqq t'e eri't) {sqrf, fuqr qtdrt r
Gz. F Tq RF{sqnFqc q-ri s fdq"ct"r+ucqtqr
6s. st e1qqffir 1*-eE+al sI Ftqrf, s{i t, A enqd \ispif e1 sFfi (qerl t
fdq ttw 5mre6 F*qTdqr+rdqr r
64. q-dfut qs sEo Rr* sr sfrqr€s +{rns m T{i + lf,q fuqrqrf,Tt I
65. ile+s sth Tets <tif gw wq t qrosivrq{dr+$i*r frqtrr *G t t
GG. q+ 'ts 3m' (Read only){ifuqrsl +i qqrsThqqrRdfuqrqr v+-cirt r
67. !tr *+86 q fufrc (Default) qi €qr s i r
++ryitdi
clc-s(E+H) (20)
68. EXcELfr q* 1vffim) = t E1sil-{Eq
*m r :;
8r. sr BlTs+Tfr (copy)q.qis ET {dqriT s{t t n} ff,q t-€ ql qTql effir d-dr t {d gs
q]d qgi * anrEr{dr{affuR-c)d-art r
( 2 1) P.T.O.
87. EXcELd ffi Gfdr) qEi d {'rfrqr-fr f*qr qr v*or d r
88. qrqrlar{€ (powerpointt
if ory qqi frr* or qftqrd +fr oq voi d r
eG. ffi qwrnq t 'te-teilsc E{q' EFrsqq}'rtg1 aqr F-a-r+l Eqrt}deTrof gq yts qr
qr{qieTal qq€ir +) M + fdq fuqr qror t r
elC-5(E+H)
( 2 3)
P.T.O.
<w,o,rdb ftts d{6
5,000
( 2 4)
CIC-5(E+H)