Friday, March 27, 2009

Business Process Re-Engineering (BPR) - 10

LIST OF ATTEMPTED QUESTIONS AND ANSWERS


Multiple Choice Single Answer
Question Who identify the manner in which the organisation will carry out mission?
Correct Answer Value and beliefs
Your Answer Vision


Multiple Choice Single Answer
Question The Behaviour of Critic is :-
Correct Answer Open
Your Answer Destructive


Multiple Choice Multiple Answer
Question Types of Resisting Behaviour are :-
Correct Answer Terrorist , Critic , Skeptic
Your Answer Terrorist , Critic , Skeptic


Multiple Choice Multiple Answer
Question Areas of Productivity Increase are :-
Correct Answer Quality , Quantity , Rejection Level
Your Answer Quality , IT , Quantity


Select The Blank
Question High success potentials flip side is called as ________.
Correct Answer High project risk
Your Answer High project risk


Select The Blank
Question ________ weigh the efficiency and productivity by characteristics of a process.
Correct Answer PCM
Your Answer CTS


True/False
Question During implementation of re-engineered processes, top management should provide a support.
Correct Answer False
Your Answer True


Match The Following
Question Correct Answer Your Answer

MIS Management Information System Management Information System

Role A Strong Facilitator Strong Facilitator

Role B Team Member Team Member

Role C Subject Expert Subject Expert



True/False
Question For successful implementation of ERP, it is necessary to carry out business process re-engineering in the organization to derive full advantage from the ERP system.
Correct Answer True
Your Answer True


Select The Blank
Question A strong facilitator & experienced practitioner who brings the methodology with him is ________.
Correct Answer Role A
Your Answer Role A


Multiple Choice Multiple Answer
Question Various Types of Risks are :-
Correct Answer Technical , Financial , Functional
Your Answer Technical , Financial , Functional


True/False
Question The skeptic demonstrates a similar behaviour to the critic.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question A business process re-engineering model has main activities as :-
Correct Answer Business Definition , Process Identification , Process Evaluation
Your Answer Business Definition , Process Identification , Process Evaluation


Match The Following
Question Correct Answer Your Answer

Saboteur Behaviour Extremely Negative Extremely Negative

Critic Behaviour Open Communication Open Communication

Skeptic Brhaviour Similar to Critic Similar to Critic

Terrorist Behaviour Warns Everybody Warns Everybody



True/False
Question The Terrorists seems to constantly warn everybody regarding a negative outcome of the project.
Correct Answer True
Your Answer True


True/False
Question Business Processes are set of activities that transform a set of inputs into set of outputs using people & tool.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question IT applications to improve business process are :-
Correct Answer In supporting product development process , In supporting order fulfillment process , In supporting logistical process
Your Answer In supporting product development process , In supporting order fulfillment process , In supporting logistical process


Multiple Choice Multiple Answer
Question BPR is required for which type of company?
Correct Answer Manufacturing , IT , Process
Your Answer Manufacturing , IT , All Departments


Multiple Choice Multiple Answer
Question Which of the following points are considered for similarities between re-engineering and continuous improvement?
Correct Answer Time investment , Organizational change
Your Answer Time investment , Organizational change


Select The Blank
Question ________ is considered as point of similarity between re-engineering & continuous improvement project.
Correct Answer Organizational Change
Your Answer Organizational Change


Multiple Choice Single Answer
Question Surveys, annual report, interviews are potential sources for identifying :-
Correct Answer Future vision
Your Answer Market research


True/False
Question Empowered employees can take decisions with speed.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Who governs the conduct in an organization?
Correct Answer Beliefs , Values
Your Answer Values , Beliefs


Multiple Choice Single Answer
Question Integrated Information Systems built to meet the Information & Decision needs of all the functional units of an enterprise is referred as :-
Correct Answer ERP
Your Answer ERP


Select The Blank
Question In a Re-engineering project the Third phase is ________.
Correct Answer Creating vision for new process
Your Answer Creating vision for new process


True/False
Question The software selection process may not involve errors of project content & project management.
Correct Answer False
Your Answer True


Select The Blank
Question Research activity is a ________ process.
Correct Answer Knowledge based
Your Answer Knowledge based


Multiple Choice Single Answer
Question Who are located within the organisation?
Correct Answer Internal customers
Your Answer Internal customers


Select The Blank
Question Financial Year in India ends on ________.
Correct Answer 31st March
Your Answer 31st March


Select The Blank
Question ________ is the starting point for process reengineering efforts.
Correct Answer Customer identification
Your Answer Customer identification


Multiple Choice Single Answer
Question The BPR activities are used in conjunction with :-
Correct Answer Workflow Analysis
Your Answer Workflow Analysis


True/False
Question A completely new computer application system need not be tested thoroughly.
Correct Answer False
Your Answer False


True/False
Question Based on the feedback from the prototype, the business process is not redefined & the instantiated within a business system.
Correct Answer False
Your Answer False


Select The Blank
Question In BPR, you can manage E-Processes through ________.
Correct Answer E-Commerce
Your Answer E-Commerce


Multiple Choice Single Answer
Question Vision statement is a :-
Correct Answer Framework that guides to choice that determine the nature & direction of an organisation.
Your Answer Statement that defines the cause of existence of an organisation


True/False
Question Work should be broadened without sacrificing depth of expertise in strategic areas.
Correct Answer False
Your Answer True


True/False
Question The Information Technology cannot be faulty at all.
Correct Answer False
Your Answer True


Multiple Choice Multiple Answer
Question Continuous improvement process consists of :-
Correct Answer Documentation of existing process , Establishing the measures , Carrying the process
Your Answer Establishing the measures , Carrying the process , Learning from others


Multiple Choice Multiple Answer
Question Critical Success factor in business are :-
Correct Answer Cost reduction , Quality enhancement , Service improvement
Your Answer Cost reduction , Quality enhancement , Service improvement


Multiple Choice Multiple Answer
Question Managing E-Processes consists of :-
Correct Answer ERP , E-Commerce , E-Governance
Your Answer ERP , E-Commerce , E-Governance


Multiple Choice Single Answer
Question Critical questions are to be answered while formulating the :-
Correct Answer Vision statement
Your Answer Mission statement


True/False
Question Process orientation organize companies around their processes.
Correct Answer True
Your Answer True


Select The Blank
Question Internal Resistance is ________
Correct Answer Manager
Your Answer Manager


Multiple Choice Single Answer
Question Incremental change in the process is:-
Correct Answer Process Simplification
Your Answer Continuous improvement


Multiple Choice Single Answer
Question Which process is not dominant in Business Process Re-engineering?
Correct Answer Product development
Your Answer Delivery of goods


Multiple Choice Single Answer
Question The Barriers which are related People Problems are called as :-
Correct Answer Soft Barriers
Your Answer Soft Barriers


Multiple Choice Single Answer
Question QMS means :-
Correct Answer Quality Management System
Your Answer Quality Management System

Database Management System (DBMS) - 6

Multiple Choice Multiple Answer
Question In a two tier architecture, the software components are distributed over which two systems
Correct Answer Client , Server
Your Answer Client , Server

True/False
Question Temporal constraints can be used to limit the value of a particular attribute to be in a range
Correct Answer False
Your Answer True

Multiple Choice Multiple Answer
Question Write the attributes of entity "book"
Correct Answer book_no , Book_name , Price
Your Answer book_no , Book_name , Price

Multiple Choice Multiple Answer
Question Set operators are as follows
Correct Answer MINUS , UNION , INTERSECT
Your Answer UNION , INTERSECT , MINUS

Multiple Choice Multiple Answer
Question Three levels of database service
Correct Answer External level , Conceptual level , Physical level
Your Answer External level , Conceptual level , Internal level

Match The Following
Question Correct Answer Your Answer

Data model must know entities,relation,attributes database characteristics

shareability optimal data model's characteristics used in physical modeling

E-R model widely used conceptual model widely used conceptual model

Database design conversion into computer usable form must know entities,relation,attributes

True/False
Question Codd developed E-R model
Correct Answer False
Your Answer False

Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity

Multiple Choice Single Answer
Question Write output of following example SELECT LOWER('JOHN') FROM DUAL;
Correct Answer john
Your Answer john

Multiple Choice Multiple Answer
Question The levels of abstraction of data are
Correct Answer Physical level , Logical level , View level
Your Answer Physical level , Logical level

Multiple Choice Single Answer
Question What operation is used to protect data from corruption and deletion .
Correct Answer Data integrity
Your Answer Data integrity

Select The Blank
Question ________is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer Access control
Your Answer Access control

Multiple Choice Single Answer
Question An example of non-volatile storage is :
Correct Answer Magnetic Tapes
Your Answer Magnetic Tapes

Multiple Choice Single Answer
Question Security issues become more complex in which environment
Correct Answer Network
Your Answer Network

Multiple Choice Multiple Answer
Question Functions at the server end are
Correct Answer Query , Transaction
Your Answer Query , Transaction , Application Program

True/False
Question In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access.
Correct Answer False
Your Answer False

Multiple Choice Multiple Answer
Question Attributes are classified as
Correct Answer Simple , Composite , Multivalued
Your Answer Simple , Composite , Multivalued

Multiple Choice Single Answer
Question What is UML models(E-R models entities)
Correct Answer Objects
Your Answer Objects

Multiple Choice Single Answer
Question Write command "to grant update authority on price column of catalogue to user "Smita"
Correct Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
Your Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA

True/False
Question In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access.
Correct Answer False
Your Answer False

Multiple Choice Multiple Answer
Question The functions of Database adminstrator are
Correct Answer Authorization for data access , Schema definition , Maintenance of Database
Your Answer Authorization for data access , Maintenance of Database

Multiple Choice Single Answer
Question What expresses the specific number of entity occurances associated with one occurance of related entity?
Correct Answer Cardinality
Your Answer Cardinality

Multiple Choice Multiple Answer
Question Write examples of dbms
Correct Answer Foxbase , foxpro
Your Answer Foxbase , foxpro

Select The Blank
Question ________is a process by which the user's privileges are ascertained
Correct Answer Authorisation
Your Answer Authorisation

Multiple Choice Single Answer
Question What operation is used to protect data from corruption and deletion .
Correct Answer Data integrity
Your Answer Data integrity

Multiple Choice Multiple Answer
Question What can be used to manage databases data integrity rule
Correct Answer Integrity constraints , Database triggers
Your Answer Integrity constraints , Database triggers

Multiple Choice Single Answer
Question The set of all entities of the same type called as
Correct Answer entity set
Your Answer entity set

Select The Blank
Question Enitity name is written in ________in E-R diagram
Correct Answer upper case
Your Answer upper case

Select The Blank
Question The first commercial RDBMS was ________from Relational Software Inc.
Correct Answer ORACLE
Your Answer ORACLE

Select The Blank
Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object
Correct Answer functions
Your Answer functions

True/False
Question You cannot grant or revoke system privileges to users and roles.
Correct Answer False
Your Answer True

Multiple Choice Single Answer
Question Write SQL statement, which will show contents of table book, where 2nd character of bookname is 'm'
Correct Answer select * from book where bookname like '_m%'
Your Answer select * from book where bookname like '_m%'

Select The Blank
Question In________there is no security of data
Correct Answer DBMS
Your Answer DBMS

Select The Blank
Question File is collection of ________
Correct Answer records
Your Answer records

Multiple Choice Single Answer
Question The set of all relationships of the same type called as
Correct Answer Relationship set
Your Answer Relationship set

Select The Blank
Question ________are collection of instructions for manipulating data
Correct Answer program
Your Answer program

Multiple Choice Multiple Answer
Question Which of the following are valid SQL commands.
Correct Answer ALTER , UPDATE
Your Answer ALTER , UPDATE

Multiple Choice Single Answer
Question DDL stands for
Correct Answer Data definition language
Your Answer Data definition language

Multiple Choice Single Answer
Question A person who has control over system is called as
Correct Answer Database administrator
Your Answer Database administrator

Multiple Choice Multiple Answer
Question What are secured using authorisation and access control.
Correct Answer The intranet , local clients , opearators
Your Answer The intranet , local clients , opearators

Multiple Choice Single Answer
Question What is nothing but refined data
Correct Answer Information
Your Answer Information

True/False
Question A database may include varieties of data that are interrelated in many ways.
Correct Answer True
Your Answer True

Multiple Choice Multiple Answer
Question Which of the following are functions of DBA
Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support

Select The Blank
Question SQL as a language is________of the way it is implemented internally.
Correct Answer independent
Your Answer independent

Multiple Choice Multiple Answer
Question Attributes are classified as
Correct Answer Simple , Composite , Multivalued
Your Answer Simple , Composite , Multivalued

Match The Following
Question Correct Answer Your Answer

select * from
order by
Views all columns in sorting ording by specified column_name Views all columns in sorting ording by specified column_name

Select * from View all data from table. View all data from table.

select , from

Views 2 specified column from table Views 2 specified column from table

select * from where Views all column satisfying condition in where clause Views all column satisfying condition in where clause

Select The Blank
Question Each attribute is associted with set of values called as________
Correct Answer Domain
Your Answer Domain

Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL
Correct Answer lower(char) , initcap(char) , upper(char)
Your Answer lower(char) , initcap(char) , upper(char)

Multiple Choice Single Answer
Question To enter new field city in the table 'branch_master' following command is used
Correct Answer alter table branch_master add(city varchar2(25))
Your Answer alter table branch_master add(city varchar2(25))

Multiple Choice Single Answer
Question Malfunctioning of the hardware, or bug in the database software or operating system is called as
Correct Answer System Crash
Your Answer System Crash

Select The Blank
Question ________are binary computer representations of stored logical entities
Correct Answer Data
Your Answer Data

Multiple Choice Multiple Answer
Question Advantages of Database Management System
Correct Answer Reduced redundancy , Sharing of data , Security
Your Answer Reduced redundancy , Sharing of data , Work Space required for execution and storage is less

Multiple Choice Single Answer
Question When two entities are associated then the relationship exists is called :
Correct Answer binary relationship
Your Answer binary relationship

True/False
Question The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security
Correct Answer False
Your Answer True

Multiple Choice Single Answer
Question Grant the SELECT authority on catalog table to user "Reema" with capability to grant those privileges to other users on catalog table
Correct Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
Your Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION

Select The Blank
Question ________published the paper "Relational Model of Data for Large Shared Data Banks "
Correct Answer F.Codd
Your Answer F.Codd

Select The Blank
Question Entities are represented in ________in E-R diagram
Correct Answer Rectangular box
Your Answer Rectangular box

Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity

Match The Following
Question Correct Answer Your Answer

Data files Stores the database itself Stores the database itself

Person who design and implement Database management system modules Database Management system designers and implementers Database Management system designers and implementers

Person who design and implement tools Tool developers Tool developers

Person responsible for running and maintenance of Hardware and Software in a Database Operators and maintenance personal Operators and maintenance personal

True/False
Question Encryption alone is sufficient to secure the data.
Correct Answer False
Your Answer False

Multiple Choice Single Answer
Question Write command "to grant update authority on price column of catalogue to user "Smita"
Correct Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
Your Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA

Select The Blank
Question ________provides a graphical means of modeling various components of software system
Correct Answer UML
Your Answer UML

Select The Blank
Question ________regulates all user access to named objects through privileges
Correct Answer Discretionary access control
Your Answer Discretionary access control

Multiple Choice Single Answer
Question What is many-to-one relationship between two sets of attributes of a given relation
Correct Answer Functional dependency
Your Answer Functional dependency

True/False
Question physical design is tailored to a specific DBMS system
Correct Answer True
Your Answer False

True/False
Question A relational model relates records by the value that they contain.
Correct Answer True
Your Answer True

Database Management System (DBMS) - 5

DATABASE MANAGEMENT SYSTEMS

Multiple Choice Multiple Answer
Question Following date formats used in oracle
Correct Answer TO_CHAR() , TO_DATE()
Your Answer TO_DATE()

Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity

Multiple Choice Multiple Answer
Question To be able to successfully design and maintain databases we have to do following
Correct Answer Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary
Your Answer Identify relationship between objects , Data dictionary

True/False
Question The data in the database cannot be shared
Correct Answer False
Your Answer False

Multiple Choice Single Answer
Question What is many-to-one relationship between two sets of attributes of a given relation
Correct Answer Functional dependency
Your Answer Functional dependency

Multiple Choice Single Answer
Question When an attribute composed of multiple components, each with an independent existence is called as
Correct Answer composite attribute
Your Answer composite attribute

Multiple Choice Single Answer
Question Which of the following term means the ability to represent a model using esily understood diagrammatic notation
Correct Answer Diagrammatic representation
Your Answer Diagrammatic representation

True/False
Question physical design is tailored to a specific DBMS system
Correct Answer True
Your Answer True

Match The Following
Question Correct Answer Your Answer

Person responsible for running and maintenance of Hardware and Software in a Database Operators and maintenance personal Operators and maintenance personal

Data files Stores the database itself Stores the database itself

Person who design and implement Database management system modules Database Management system designers and implementers Database Management system designers and implementers

Person who design and implement tools Tool developers Tool box developers


Multiple Choice Multiple Answer
Question Which of the following are functions of DBA
Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support

Multiple Choice Single Answer
Question Which of the following term means the ability to represent a model using esily understood diagrammatic notation
Correct Answer Diagrammatic representation
Your Answer Diagrammatic representation

Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL
Correct Answer lower(char) , initcap(char) , upper(char)
Your Answer lower(char) , initcap(char) , upper(char)

Multiple Choice Single Answer
Question One method of protecting the privacy and integrity of a system is to place a firewall between internet and
Correct Answer Public network
Your Answer intranet

True/False
Question Availability is often thoutht of as continuity of service, ensuring that database is available 24 hours a day, 7 days a week
Correct Answer True
Your Answer True

Select The Blank
Question The most widely used conceptual model is________
Correct Answer E-R model
Your Answer E-R model

True/False
Question The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security
Correct Answer False
Your Answer False

True/False
Question The shadow page table is never changed over the duration of the transaction
Correct Answer True
Your Answer True

True/False
Question The Database administrator cannot grant or revoke privileges to users.
Correct Answer False
Your Answer False

Multiple Choice Single Answer
Question Write a command to grant all privileges on BOOK TABLE to user "Mathews"
Correct Answer GRANT ALL ON BOOK TO MATHEWS
Your Answer GRANT ALL ON BOOK TO MATHEWS

Multiple Choice Single Answer
Question Write output of following example SELECT LOWER('JOHN') FROM DUAL;
Correct Answer john
Your Answer john

Select The Blank
Question ________is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer Access control
Your Answer Access control

Multiple Choice Single Answer
Question Write SQL statement, which shows contents of table book, whose price is less than 4000 and more than 1000
Correct Answer select * from book where price>1000 and price<4000
Your Answer select * from book where price>1000 and price<4000

Multiple Choice Multiple Answer
Question There are two kinds of tables -
Correct Answer base tables , views
Your Answer base tables , system

Match The Following
Question Correct Answer Your Answer

Integrity hallmark of data security hallmark of data security

Authorisation permission given to user Provide authority

Previlege Permission for accessing objects permission given to user

Role Provide authority Permission for accessing objects

True/False
Question To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY';
Correct Answer True
Your Answer True

Multiple Choice Multiple Answer
Question Specify any 2 forms of insert command
Correct Answer INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE
Your Answer INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE

Multiple Choice Multiple Answer
Question Following are properties of roles allowed for easier privilege management
Correct Answer Reduced privilege administration , Dynamic privilege administration , application awareness
Your Answer Dynamic privilege administration , Deletion of information

Multiple Choice Multiple Answer
Question Strong entities are also called as
Correct Answer dominant , Parent , owner
Your Answer Parent

True/False
Question A user can grant any object privilege on any object he or she owns to any other user or role
Correct Answer True
Your Answer True

Multiple Choice Multiple Answer
Question Security considerations apply to
Correct Answer data, database , dbms , users and applications
Your Answer data, database , dbms , users and applications

Select The Blank
Question ________regulates all user access to named objects through privileges
Correct Answer Discretionary access control
Your Answer Discretionary access control

True/False
Question Distinct clause in select command eliminates rows that have exactly same contents in each column.
Correct Answer True
Your Answer True

Multiple Choice Single Answer
Question Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
Correct Answer CURE
Your Answer RE

True/False
Question A relational model relates records by the value that they contain.
Correct Answer True
Your Answer False

Select The Blank
Question In________there is no security of data
Correct Answer DBMS
Your Answer DBMS

Multiple Choice Multiple Answer
Question A Database Management System has several subsystems
Correct Answer Transaction Manager Subsystem , Query Manager Subsystem , Storage Manager Subsystem
Your Answer Transaction Manager Subsystem , Data Manager Subsystem , Query Manager Subsystem

Select The Blank
Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object
Correct Answer functions
Your Answer functions

Select The Blank
Question In 1978 the________approved the SQL database language project which led to the formulation of the initial SQL standard language
Correct Answer ANSI American national std institute
Your Answer ANSI American national std institute

Multiple Choice Multiple Answer
Question The different types of database users
Correct Answer Security officers , Database administrators , Network administrators
Your Answer Database administrators , Database operators

Select The Blank
Question Each attribute is associted with set of values called as________
Correct Answer Domain
Your Answer Relation

Multiple Choice Single Answer
Question Access to a database can be controlled using
Correct Answer Access Privilages
Your Answer Access control

Select The Blank
Question Structctural validity in data modeling means ________
Correct Answer consistency
Your Answer consistency

Select The Blank
Question ________ is tailored to specific DBMS system
Correct Answer Physical design
Your Answer Physical design

Multiple Choice Single Answer
Question In an Entity relationship diagram total participation of an entity in a relationship set is indicated by :
Correct Answer Double line
Your Answer Double ellipse

Multiple Choice Multiple Answer
Question The ICAM studies created lot of graphical methods for defining
Correct Answer Functions , Data structures
Your Answer Data structures

Select The Blank
Question Enitity name is written in ________in E-R diagram
Correct Answer upper case
Your Answer upper case

Multiple Choice Single Answer
Question Write the use of UPDATE command
Correct Answer To change or to modify data values in table
Your Answer To change or to modify data values in table

Select The Blank
Question ________published the paper "Relational Model of Data for Large Shared Data Banks "
Correct Answer F.Codd
Your Answer F.Codd

Select The Blank
Question Database design model helps in improving________
Correct Answer maintainability
Your Answer maintainability

Multiple Choice Multiple Answer
Question SSL protocol provides
Correct Answer authorisation , data encryption , data integrity
Your Answer authorisation , data encryption , security

True/False
Question To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY';
Correct Answer True
Your Answer False

Multiple Choice Single Answer
Question Class room entity has single value for room_no attribute so room_no attriute is reffered to as
Correct Answer Single valued
Your Answer Single valued

Multiple Choice Single Answer
Question Which type of attribute represents a value that is derivable from the value of related attribute
Correct Answer derived attribute
Your Answer derived attribute

Multiple Choice Multiple Answer
Question Some clauses of Revoke command are as follows
Correct Answer FROM , ON
Your Answer FROM , ON , ANY

Select The Blank
Question A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization
Correct Answer Threat
Your Answer Threat

Multiple Choice Single Answer
Question In an Entity relationship diagram, what is used to link attributes to entity sets and entity sets to relationships?
Correct Answer Line
Your Answer Line

Select The Blank
Question ________are binary computer representations of stored logical entities
Correct Answer Data
Your Answer Data

Select The Blank
Question Enitity name is written in ________in E-R diagram
Correct Answer upper case
Your Answer upper case

Multiple Choice Single Answer
Question (%) stands for
Correct Answer Sequence of n characters in character string
Your Answer Sequence of n characters in character string

Select The Blank
Question ________are collection of instructions for manipulating data
Correct Answer program
Your Answer program

Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity

Match The Following
Question Correct Answer Your Answer

Menu driven interface Stand alone user Stand alone user

Query language interface Casual user Casual user

Programming language interface Application user DBA

Forms and command code Parametric user Parametric user

Select The Blank
Question In________there is no security of data
Correct Answer DBMS
Your Answer DML

Multiple Choice Multiple Answer
Question Which of the following are valid SQL commands.
Correct Answer ALTER , UPDATE
Your Answer ALTER , UPDATE

Select The Blank
Question ________is a process by which user's identity is checked
Correct Answer Authentication
Your Answer Authentication

Select The Blank
Question Entities are represented in ________in E-R diagram
Correct Answer Rectangular box
Your Answer square box

Select The Blank
Question File is collection of ________
Correct Answer records
Your Answer Data

Multiple Choice Single Answer
Question WWW stands for
Correct Answer World wide web
Your Answer World wide web

Select The Blank
Question The most widely used conceptual model is________
Correct Answer E-R model
Your Answer E-R model

Select The Blank
Question ________provides a graphical means of modeling various components of software system
Correct Answer UML
Your Answer ERD

True/False
Question SQL is low level language
Correct Answer False
Your Answer False

Multiple Choice Single Answer
Question What operation is used to protect data from corruption and deletion .
Correct Answer Data integrity
Your Answer Data integrity

True/False
Question Centralised Database Management cannot support multiple users.
Correct Answer False
Your Answer False

Multiple Choice Multiple Answer
Question What can be used to manage databases data integrity rule
Correct Answer Integrity constraints , Database triggers
Your Answer security , Integrity constraints , Database triggers

True/False
Question Unary operator operates only on one operand.
Correct Answer True
Your Answer True

Monday, March 16, 2009

Strategic Finance - 10

LIST OF ATTEMPTED QUESTIONS AND ANSWERS
True/False
Question Value based approach of HRA tracking can be divided into 2
categories - Non - monetary & monetary.
Correct Answer True
Your Answer False
True/False
Question The activity model is normally created by an activity Accountant.
Correct Answer False
Your Answer False
Multiple Choice Multiple Answer
Question Organisations have various records and reports from past
actions such as :-
Correct Answer Logs to record workflow , Specific costs , External and internal
audit reports
Your Answer Logs to record workflow , Specific costs , General studies and
processes
Select The Blank
Question In today's fast moving world, the quickest way to get information
on a firm is through ________.
Correct Answer Internet
Your Answer Internet
Select The Blank
Question The cost of facilities is usually included & distributed as
________.
Correct Answer Depreciation
Your Answer Fringe benefits
Multiple Choice Multiple Answer
Question The existence of significant influence by an investor is usually
evidenced in the following ways :-
Correct Answer Participation in policy making processes , Material transactions
between the investor & the investee , Interchange of managerial
personnel
Your Answer Participation in policy making processes , Material transactions
between the investor & the investee , Interchange of managerial
personnel
Multiple Choice Multiple Answer
Question The direct costs tier normally only includes the following :-
Correct Answer The personnel payroll , Supplies , Individual rental equipment
Your Answer The personnel payroll , Support costs , Supplies
Multiple Choice Multiple Answer
Question While accounting for human assets, the following data is to be
considered :-
Correct Answer Full time equivalent staff , Revenues , Expenses
Your Answer Full time equivalent staff , Expenses , Good will
Multiple Choice Multiple Answer
Question Accrued expenses represent :-
Correct Answer Costless financing , An interest free source of financing
Your Answer Costless financing , An interest free source of financing , Truly
discretionary financing
True/False
Question The accounting records serve as the major source of cost data.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Conservative policy for determining the requirements of current
assets is also known as :-
Correct Answer Flexible policy
Your Answer Aggressive policy
Multiple Choice Single Answer
Question When the working capital is less than its peak level :-
Correct Answer The surplus is invested in liquid assets
Your Answer The surplus is invested in liquid assets
True/False
Question optimum cash balance under certainty i.e. Baumul`s model
allows the cash flow to fluctuate.
Correct Answer False
Your Answer True
Multiple Choice Single Answer
Question open account credit appears on the buyer's balance sheet as :-
Correct Answer Accounts payable
Your Answer Accounts receivables
Select The Blank
Question According to Altman (1984) total costs in percentage of the
market value of a firm range between ________
Correct Answer 12.1 % & 16.7 %
Your Answer less than 10 %
Multiple Choice Single Answer
Question According to a survey for reasons for share purchase, what is
the percentage of cash distribution to cash holders ?
Correct Answer 0.28
Your Answer 0.28
Select The Blank
Question ________ is not a characteristic of financial conglomerates.
Correct Answer Provide ineffective competitive process
Your Answer Provide ineffective competitive process
Multiple Choice Multiple Answer
Question The important steps involved in the analysis of mergers &
acquisitions are:-
Correct Answer Planning , Searching & screening , Financial evaluation
Your Answer Consultation with shareholders , Planning , Searching &
screening
Multiple Choice Multiple Answer
Question Trade credits are of the following types:-
Correct Answer Notes payable , Trade acceptances , Open accounts
Your Answer Notes payable , Trade acceptances , Commercial paper
True/False
Question The statute governing an enterprise may provide the basis for
computation of the depreciation.
Correct Answer True
Your Answer True
Select The Blank
Question The clean up period is usually ________ months.
Correct Answer 1 to 2 months
Your Answer 3 months
Multiple Choice Single Answer
Question Any addition or extension to an existing asset which retains a
separate identify & is capable of being used after the existing
asset is disposed of :-
Correct Answer Is depreciated independently
Your Answer Is depreciated along with the existing asset
Match The Following
Question Correct Answer Your Answer
Amount involved in buy
back
Not to exceed 25 % of the
total paid up capital
Authorize buy back of
securities
Articles of Association Authorize buy back of
securities
Not to exceed 25 % of the
total paid up capital
Board of Directors Resolution permitting the
buy back of shares
The ratio of debt to total
capital & free reserves
should be 1 : 1
Shares to be bought back Fully paid up Resolution permitting the
buy back of shares
Multiple Choice Single Answer
Question Acceptable audit requirements cannot be overlooked even under
the pressure of :-
Correct Answer Timeliness & turnaround
Your Answer Timeliness & turnaround
True/False
Question A long term investment is an investment other than a current
investment.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question Book value of the assets is directly dependent on the accounting
policies followed by the company which is used in the following
areas :-
Correct Answer Booking depreciation , Methods of provisions , Inventory
valuation
Your Answer Booking depreciation , Methods of provisions , Inventory
valuation
Select The Blank
Question Identify disclosure on human resources as a societal concern &
prepare international regulations comes under ________
Correct Answer The compulsory method
Your Answer The voluntary market based method
Multiple Choice Multiple Answer
Question Walter's model on dividend relevance is based on the following
assumptions :-
Correct Answer Internal financing , Constant return and cost of capital , 100 Per
cent payout or retention
Your Answer Internal financing , Constant return and cost of capital , Perfect
markets
Multiple Choice Single Answer
Question When competition is high in the market, it is :-
Correct Answer Essential to maintain a larger inventory of finished goods
Your Answer Necessary that firms should have less working capital
requirement
Multiple Choice Single Answer
Question A manufacturing concern like a machine tool has :-
Correct Answer A long operating cycle
Your Answer Sells largely on cash basis
True/False
Question Decisions related to working capital are repetitive & frequent.
Correct Answer True
Your Answer True
Select The Blank
Question In many companies, there is no formal record of________.
Correct Answer Investment in employees
Your Answer Investment in employees
Select The Blank
Question Depreciation is ________ of an asset.
Correct Answer Loss of value
Your Answer Loss of value
Match The Following
Question Correct Answer Your Answer
Mortgage Pertains to immovable
properties
Duty of the bank to take
care of movable goods
Lien The bank has a right to
retain the goods belonging
to the company until the
debts due to the bank are
paid
The bank has a right to
retain the goods belonging
to the company until the
debts due to the bank are
paid
Hypothecation A charge against property
for an amount of debt
A lender does not keep
track of individual accounts
Pledge Duty of the bank to take
care of movable goods
Have high costs of
processing the collateral &
risk of fraud
Multiple Choice Multiple Answer
Question Significant influence is the power to :-
Correct Answer Participate in the financial decisions , Participate in the operating
policy decisions
Your Answer Participate in the financial decisions , Participate in the operating
policy decisions , Growth & diversify
Select The Blank
Question Stock repurchases ________ the debt / equity ratio.
Correct Answer Increases
Your Answer Increases
True/False
Question Organisational changes are similar to mission changes.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Where the management's estimate of the useful life of an asset
of the enterprise is shorter than that envisaged under the
provisions of the relevant statute, the depreciation provision is
approximately computed :-
Correct Answer By applying a higher rate
Your Answer By applying a lower rate
Select The Blank
Question An asset is included in segment assets, if and only if the related
depreciation or amortisation is included in ________.
Correct Answer Segment expense
Your Answer Segment revenue
Multiple Choice Multiple Answer
Question The support elements consists of important functions such as :-
Correct Answer Payroll , Accounting , Automatic data processing
Your Answer Payroll , Co-ordination , Accounting
Multiple Choice Single Answer
Question Cost benefit analysis is the simplest form of comparison between
:-
Correct Answer Ideas to determine which is faster, better or cheaper
Your Answer Value added & non value added activities
Multiple Choice Multiple Answer
Question Valuation methods are highly specific to the following for doing
the valuation :-
Correct Answer To the person , To the firm , To the Consultant
Your Answer To the person , To the firm , To the Consultant
Multiple Choice Single Answer
Question Arbitrage means :-
Correct Answer Securities cannot sell at different prices
Your Answer Selling a security
Select The Blank
Question Credit standards should be relaxed upon the point where
incremental returns ________ incremental costs.
Correct Answer Equals
Your Answer Have no correlation with
Multiple Choice Single Answer
Question Modigliani - Miller Theoram is based on :-
Correct Answer Perfect Capital Markets
Your Answer Perfect Capital Markets
True/False
Question Dividends increase the current returns for shareholders.
Correct Answer True
Your Answer False
True/False
Question When a company is able to assess an individual's worth, it helps
in increasing its own worth.
Correct Answer True
Your Answer True

Strategic Finance - 9

LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Match The Following
Question Correct Answer Your Answer
Opportunity cost An asset value when they
are the target of an
alternative use.
Lost efficiency prior to
separation, Job vacancy
cost during the new search
& termination pay.
Exit cost Lost efficiency prior to
separation, Job vacancy
cost during the new
search & termination pay.
Exit costs of the leaving
employee & recruiting &
training of the replacement
Historical costs Sacrifice necessary to hire
& train people
An asset value when they
are the target of an
alternative use.
Substitution cost Exit costs of the leaving
employee & recruiting &
training of the
replacement
Sacrifice necessary to hire
& train people
Multiple Choice Single Answer
Question Book value is relevant to determine the firm's value because of
the following reasons except:-
Correct Answer It cannot be used as a starting point to be compared &
complimented by other analysis
Your Answer It is used as a starting point
True/False
Question For determining exchange ratio, the model developed by Conn &
Nielson is used.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Normally the basis for identifying an enterprise segments are :-
Correct Answer The organizational structure of an enterprise
Your Answer Location of its customers
Multiple Choice Single Answer
Question FEA is a technique to analyze & evaluate :-
Correct Answer Alternative process improvements
Your Answer Alternative process improvements
True/False
Question Arbitrage process implies that security cannot sell at different
prices.
Correct Answer True
Your Answer False
Select The Blank
Question ________ is not a characteristic of financial conglomerates.
Correct Answer Provide ineffective competitive process
Your Answer Provide ineffective competitive process
True/False
Question Retained earnings are the most important internal sources of
financing the growth of the firm.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question Significant influence is the power to :-
Correct Answer Participate in the financial decisions , Participate in the operating
policy decisions
Your Answer Participate in the financial decisions , Participate in the operating
policy decisions , Control over the policies
Multiple Choice Single Answer
Question For paying dividends, firms will have a given amount of :-
Correct Answer Cash available
Your Answer Cash available
Multiple Choice Multiple Answer
Question The characteristics of working capital are :-
Correct Answer It is continually required for a going concern , Quantum of
working capital fluctuates depending on the level of activity , It is
impacted by numerous transactions on a continuous basis
Your Answer The decisions related are one time decisions only , It is
continually required for a going concern , Quantum of working
capital fluctuates depending on the level of activity
Select The Blank
Question Earning power of the company approach tries to value the
________.
Correct Answer Current value of the assets
Your Answer Income / profit from the assets
Multiple Choice Multiple Answer
Question As per AS 13 Statement, the following are not considered as
investments:-
Correct Answer Shares , Debentures , Other securities held as stock in trade
Your Answer Land , Debentures
Multiple Choice Multiple Answer
Question Operating economies of scale are achieved through the following
mergers :-
Correct Answer Horizontal , Vertical , Conglomerate
Your Answer Vertical , Conglomerate , Financial
True/False
Question Usually only a single method is used for valuation of shares.
Correct Answer False
Your Answer False
Select The Blank
Question As per residual theory of dividends the focus is on ________.
Correct Answer Growth
Your Answer Growth
True/False
Question Management of working capital refers to the management of
total assets and liabilities of a company.
Correct Answer False
Your Answer False
Multiple Choice Multiple Answer
Question The important aspect of dividend policy is :-
Correct Answer To determine the amount of earnings to be distributed to
shareholders , Amount to be retained in the firm
Your Answer To determine the amount of earnings to be distributed to
shareholders , Amount to be retained in the firm
Multiple Choice Multiple Answer
Question The cost of an investment includes charges such as :-
Correct Answer Brokerage , Fees , Duties
Your Answer Brokerage , Fees , Duties
Select The Blank
Question Forfeiting is mostly used for ________.
Correct Answer Big ticket items & durable goods
Your Answer Big ticket items & durable goods
True/False
Question Planning helps an acquiring firm to identify the units it should
drop & it should add.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Segment information needs to be presented :-
Correct Answer Only on the basis of the consolidated financial statements
Your Answer As separate financial statements
Select The Blank
Question Postage is an example of ________ cost.
Correct Answer Non traceable cost
Your Answer Input cost
Match The Following
Question Correct Answer Your Answer
Earning per share Acquisition is considered
to be a function of the
impact of the merger on
Divide net worth by the
number of equity shares
outstanding
the EPS
Book value Divide net worth by the
number of equity shares
outstanding
Acquisition is considered to
be a function of the impact
of the merger on the EPS
Appraisal value Provides a list of the
reasonableness of results
obtained through methods
base upon the going
concern concept
Evaluate the impact of the
merger on EPS & price -
earning ratio
Market value Indicate the consensus of
the investors
Decide if the acquisition is
attractive on the basis if
NPV
Multiple Choice Multiple Answer
Question Book value of the assets is directly dependent on the accounting
policies followed by the company which is used in the following
areas :-
Correct Answer Booking depreciation , Methods of provisions , Inventory
valuation
Your Answer Booking depreciation , Methods of provisions , Inventory
valuation
Multiple Choice Multiple Answer
Question Every business requires funds on a continual basis for expenses
incurred on for :-
Correct Answer Purchase of raw material , Manufacturing costs , Administration
Your Answer Purchase of raw material , Manufacturing costs , Administration
Select The Blank
Question Forward or backward integration is a characteristic of ________.
Correct Answer Vertical Mergers
Your Answer Conglomerate mergers
True/False
Question According to NI Approach, decrease in leverage decreases the
overall cost of capital and increases the firm's value.
Correct Answer False
Your Answer True
Multiple Choice Multiple Answer
Question If a firm diversifies managerial teams formed can be shifted from
unproductive activities to productive ones which leads to :-
Correct Answer Improved profitability , Continuity , Growth of the firm
Your Answer Improved profitability , Growth of the firm , Better facilities and
work conditions
Multiple Choice Single Answer
Question Best practices, a tool for review process is similar to :-
Correct Answer Bench marking
Your Answer Value added analysis
Multiple Choice Single Answer
Question One of the important assumptions for capital structure theories is
:-
Correct Answer Debt and equity are the 2 kinds of funds used by the firm
Your Answer Debt and equity are the 2 kinds of funds used by the firm
True/False
Question If a company has resorted to buyback its shares, it cannot make
a further issue of the same kind of securities within a period of 1
year.
Correct Answer False
Your Answer True
True/False
Question The scope of the data required relates to the scope of the activity
model & processes under review.
Correct Answer True
Your Answer True
Select The Blank
Question The ________ cost tier has the advantage of being the simplest
to calculate and justify.
Correct Answer Direct
Your Answer Direct
Select The Blank
Question Stock repurchases ________ the debt / equity ratio.
Correct Answer Increases
Your Answer Decreases
Select The Blank
Question The resource theory considers that the competitive position of a
firm depends on its ________ Assets.
Correct Answer Specific
Your Answer General
Multiple Choice Single Answer
Question Many companies claim their main assets are their :-
Correct Answer People
Your Answer People
Multiple Choice Multiple Answer
Question The important steps involved in the analysis of mergers &
acquisitions are:-
Correct Answer Planning , Searching & screening , Financial evaluation
Your Answer Planning , Searching & screening , Financial evaluation
Select The Blank
Question ________ is not a example of segment liability.
Correct Answer Goodwill
Your Answer Product warranty provision
Select The Blank
Question If a segment is not designated as a ________ it should be
included as an unallocated reconciling item.
Correct Answer Reportable segment
Your Answer Business segment
Multiple Choice Multiple Answer
Question The main characteristics of CAPM are :-
Correct Answer It is an equilibrium Model , It describes the pricing of assets as
well as derivatives , Expected security return = Riskless return +
beta x (expected market risk premium)
Your Answer It is an equilibrium Model , It describes the pricing of assets as
well as derivatives , Expected security return = Riskless return +
beta x (expected market risk premium)
Multiple Choice Single Answer
Question Debt suppliers main concern is :-
Correct Answer Interest & debt repayment
Your Answer Interest & debt repayment
True/False
Question Organisational changes are similar to mission changes.
Correct Answer True
Your Answer False
Multiple Choice Single Answer
Question The difference between current assets & current liabilities is
known as :-
Correct Answer Net working capital
Your Answer Working capital cycle
Multiple Choice Multiple Answer
Question The 3 groups of participants in a firm are :-
Correct Answer Suppliers of equity , Debt suppliers , Firm Managers
Your Answer Suppliers of equity , Debt suppliers , Firm Managers
Multiple Choice Single Answer
Question When the working capital is less than its peak level :-
Correct Answer The surplus is invested in liquid assets
Your Answer The surplus is invested in liquid assets
Multiple Choice Single Answer
Question According to a survey for reasons for share purchase, what is
the percentage of cash distribution to cash holders ?
Correct Answer 0.28
Your Answer 0.28

Strategic Finance - 8

LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Single Answer
Question Any addition or extension to an existing asset which retains a separate
identify & is capable of being used after the existing asset is disposed of :-
CorrectAnswer Is depreciated independently
Your Answer Is depreciated along with the existing asset
True/False
Question In market value approach, interested parties never manipulate the stock
markets.
Correct Answer False
Your Answer True
Multiple Choice Multiple Answer
Question For accounting standard (AS) 27, Significant influence may be gained by
:-
Correct Answer Share ownership , Statute , Agreement
Your Answer Share ownership , Statute , Agreement
Multiple Choice Single Answer
Question Accounts payable is also known as :-
Correct Answer Trade credit from suppliers
Your Answer Trade credit from suppliers
Select The Blank
Question Earning power of the company approach tries to value the ________.
Correct Answer Current value of the assets
Your Answer Current value of the assets
Match The Following
Question Correct Answer Your Answer
Free cash flow theory Enormous conflicts of interest between Stakeholders and
shareholders Enormous conflicts of interest between Stakeholders and shareholders
Net income approach Cost of debt & equity do not change with a change in leverage
ratio Cost of debt & equity do not change with a change in leverage ratio
Net operating income approach The overall capitalization rate remains constant for
all levels of financial leverages The overall capitalization rate remains constant for
all levels of financial leverages
Modigliani - Miller Theory weighted average cost of capital does not change with a
change in the proportion of debt to equity in the capital structure weighted average cost
of capital does not change with a change in the proportion of debt to equity in the capital
structure
Multiple Choice Single Answer
Question Where the management's estimate of the useful life of an asset of the
enterprise is shorter than that envisaged under the provisions of the relevant statute, the
depreciation provision is approximately computed :-
Correct Answer By applying a higher rate
Your Answer By applying a lower rate
Multiple Choice Single Answer
Question What is a very important factor in any kind of merger?
Correct Answer Exchange ratio
Your Answer Post merger price
Select The Blank
Question Segment expense includes ________.
Correct Answer The relevant portion of enterprise revenue that can be allocated on
a reasonable basis to a segment
Your Answer General administrative expenses
Multiple Choice Single Answer
Question The depreciable assets are assets which are expected to be used :-
Correct Answer During more than 1 accounting period
Your Answer During more than 1 accounting period
True/False
Question Arbitrage process implies that security cannot sell at different prices.
CorrectAnswer True
Your Answer True
Multiple Choice Single Answer
Question Which is an example out of the following to which special consideration
apply for depreciation :-
Correct Answer Regenerative natural resources
Your Answer Regenerative natural resources
True/False
Question Baumul`s Model is similar to EOQ model in inventory management.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question Financial evaluation involves :-
Correct Answer Determining the earnings , Areas of risk , Best way to finance a
merger
Your Answer Determining the earnings , Areas of risk , Best way to finance a
merger
Multiple Choice Single Answer
Question The difference between current assets & current liabilities is known as :-
Correct Answer Net working capital
Your Answer Net working capital
Select The Blank
Question Stock repurchases ________ the debt / equity ratio.
Correct Answer Increases
Your Answer Increases
Multiple Choice Single Answer
Question Which of the following systems identifies each of the organizational
elements of the traditional bureaucratic structure and applies the identifiable costs of that
element accordingly?
Correct Answer Organization element accounting
Your Answer Organization element accounting
Multiple Choice Multiple Answer
Question The major conditions to be fulfilled for buyback of shares as per the legal
provisions include :-
Correct Answer Articles of association should authorize buyback of shares , The
shares which are sought to be bought back should be fully paid up , After the buy back
the ratio of debt to total capital and free reserves should not be more than 2 : 1
Your Answer After the buy back the ratio of debt to total capital and free
reserves should not be more than 2 : 1 , Articles of association should authorize buyback
of shares , The shares which are sought to be bought back should be fully paid up
True/False
Question Determination of residual value of an asset is normally a difficult matter.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Free Reserves is a component of :-
Correct Answer Equity
Your Answer Equity
Multiple Choice Single Answer
Question Short term sources of funds include :-
Correct Answer Current Liabilities
Your Answer Capital
True/False
Question To `gather costs', means capturing all relevant expenses that pertain to the
selected model and processes.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question When a company has resorted to buyback of its shares it cannot make a
further issue of the same kind of securities within a period of how many months?
Correct Answer 6 months
Your Answer 6 months
Select The Blank
Question At times managers invest in projects that improve the company's
________.
Correct Answer Prestige or power
Your Answer Value
Multiple Choice Multiple Answer
Question It is the activity accountant's job to do the following for the existing
organisational structure :-
Correct Answer To define the costs , To refine the costs , To document the costs
Your Answer To define the costs , To document the costs , Support the costing of
the activities
Multiple Choice Single Answer
Question One of the important assumptions for capital structure theories is :-
Correct Answer Debt and equity are the 2 kinds of funds used by the firm
Your Answer Debt and equity are the 2 kinds of funds used by the firm
True/False
Question Assets held as stock - in - trade are also investments.
Correct Answer False
Your Answer True
Select The Blank
Question As per residual theory of dividends the focus is on ________.
Correct Answer Growth
Your Answer Payout of dividends even if the funds are unavailable
Multiple Choice Single Answer
Question Profitability of a company depends upon :-
Correct Answer Cost of capital
Your Answer Earning per share
Select The Blank
Question HLL the largest FMCG company has a turnover of Rs. ________.
Correct Answer 118 Bn
Your Answer 1000 crores
Multiple Choice Multiple Answer
Question The characteristics of working capital are :-
Correct Answer It is continually required for a going concern , Quantum of
working capital fluctuates depending on the level of activity , It is impacted by numerous
transactions on a continuous basis
Your Answer It is continually required for a going concern , Quantum of
working capital fluctuates depending on the level of activity , It is impacted by numerous
transactions on a continuous basis
Multiple Choice Multiple Answer
Question If a firm diversifies managerial teams formed can be shifted from
unproductive activities to productive ones which leads to :-
Correct Answer Improved profitability , Continuity , Growth of the firm
Your Answer Improved profitability , Continuity , Growth of the firm
Multiple Choice Single Answer
Question In the tender offer, the purchaser approaches :-
Correct Answer The shareholder
Your Answer The shareholder
Multiple Choice Multiple Answer
Question To overcome the problems of matching data the actions can be taken as
follows :-
Correct Answer Keep extensive records of the process , Maintain detailed
procedures , Keep records of assumptions as an audit trail
Your Answer Keep extensive records of the process , Maintain detailed
procedures , Keep records of assumptions as an audit trail
Select The Blank
Question In the shareholding pattern of a company, the promoter's holding
includes________.
Correct Answer Foreign Promoters
Your Answer Foreign Promoters
Multiple Choice Multiple Answer
Question A current investment is an investment that is by nature :-
Correct Answer Readily realisable , Intended to be held for not more than 1year
from the date on which investment is made
Your Answer Readily realisable , Intended to be held for not more than 1year
from the date on which investment is made
True/False
Question Trade credit creates book debts which the firm is expected to collect in the
near future.
Correct Answer True
Your Answer True
True/False
Question The chance of bankruptcy is small when the leverage of a firm is small.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question The 3 groups of participants in a firm are :-
Correct Answer Suppliers of equity , Debt suppliers , Firm Managers
Your Answer Suppliers of equity , Debt suppliers , Firm Managers
Multiple Choice Multiple Answer
Question The financial managers of a company consume a great deal of their time in
activities like :-
Correct Answer Monitoring the investment in inventories , Negotiating favourable
credit terms , Administrating Accounts receivables
Your Answer Monitoring the investment in inventories , Negotiating favourable
credit terms , Defining a proper strategy for product promotion
True/False
Question Appraisal value of a firm can be acquired from an independent appraisal
agency.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question The following categories of personnel are taken into account to calculate
the actual manpower strength :-
Correct Answer Full time equivalents , Temporary staff , Part time personnel
Your Answer Full time equivalents , Temporary staff , Casual workers
Multiple Choice Multiple Answer
Question Accrued expenses represent :-
Correct Answer Costless financing , An interest free source of financing
Your Answer Costless financing , An interest free source of financing , Truly
discretionary financing
Select The Blank
Question There is a ________ relationship between the number of employees & the
use of operating supplies.
Correct Answer Natural
Your Answer Natural
Match The Following
Question Correct Answer Your Answer
Mechanisms Performs or provides energy to an activity Performs or provides energy
to an activity
Inputs Information or material used to produce the output of an activity Information or
material used to produce the output of an activity
Controls Information or material that constrains an activity Information or
material that constrains an activity
Outputs Information or material produced by an activity Information or
material produced by an activity
Multiple Choice Single Answer
Question Value added analysis :-
Correct Answer Helps to identify potential activities that may be omitted
immediately
Your Answer Does not assist the planners & project teams
True/False
Question Notes payable means the buyer signs a note that evidences a debt to the
seller.
Correct Answer True
Your Answer True

Sunday, March 15, 2009

Web Technologies - 15

LIST OF ATTEMPTED QUESTIONS AND ANSWERS (web(my))
Select The Blank
Question The ________ structure of web site is the most logical structure
for a publication of moderate complexity.
Correct Answer Hierarchical
Multiple Choice Multiple Answer
Question The some main reasons for developers making mistakes while
6
building a web site are :-
Correct Answer Lack of developer experience , Poorly defined process ,
Unrealistic schedules
True/False
Question The title, HTML, head, and body tags are all container tags. The
relevant text is present between the on and off tags.
Correct Answer True
Multiple Choice Multiple Answer
Question Check whether your website performs properly on the following
operating systems :-
Correct Answer UNIX , Macintosh , MS Windows
Multiple Choice Single Answer
Question The web address of position agent is as given below :-
Correct Answer www.positionagent.com
True/False
Question When you begin checking performance of your site , it is helpful
to have a spreadsheet or table containing information about
points to be checked.
Correct Answer True
Multiple Choice Multiple Answer
Question The valid example of SUBMIT are as follows :-
Correct Answer Submit Query
,
SEND IT IN!
,
GO
Multiple Choice Single Answer
Question With most Web server programs, the default page that is first
loaded is usually :-
Correct Answer Index.html
Multiple Choice Single Answer
Question When a binary document such as a graphics file is sent over the
Web, it's important that it has the appropriate :-
Correct Answer Extension
Multiple Choice Multiple Answer
Question These attributes let us control the coloring of link text :-
Correct Answer LINK , VLINK , ALINK
Select The Blank
Question ________ is a protocol used to communicate between your
HTML forms and your program so that your program can extract
the information from the form.
Correct Answer Common Gateway Interface
Multiple Choice Single Answer
Question User loads the page in the Navigator in the event called :-
7
Correct Answer load
Select The Blank
Question If you want to send graphics, games, WordPerfect documents,
or just about anything else, just put a ________ to that file on
your Web page.
Correct Answer Hypertext link
True/False
Question URL system of addressing makes every single document,
program, and file on the Internet a separately addressable
entity.
Correct Answer True
True/False
Question Nearly all graphical browsers have a View Source command.
Correct Answer True
Match The Following
Question Correct Answer Your Answer
Hybrid The best way to organize a
large site might be a hybrid of
various methods .
The best way to organize a
large site might be a hybrid of
various s methods .
Single-directory sites Smaller sites (with just a few
HTML pages and graphics)
can often get by with a single
directory on the Web server.
Smaller sites (with just a few
HTML pages and graphics) can
often get by with a single
directory on the Web server.
Directory by function One way to organize more
complicated sites is to put
each section of related Web
pages in the same directory.
One way to organize more
complicated sites is to put each
section of related Web pages in
the same directory.
Directory by file type Some people prefer to create
subdirectories according to the
type of file as opposed to the
content of the page.
Some people prefer to create
subdirectories according to the
type of file as opposed to the
content of the page.
Select The Blank
Question ________ is a text editor like notepad , WordPad , Writepad etc.
It is developed by ColdFusion specially to support the web page.
Correct Answer HomeSite
True/False
Question Building a good Web site often means being aware of other
offerings on the Web, and creating links to other people's pages
that coincide with or expand upon the information you're
presenting.
Correct Answer True
Select The Blank
8
Question COM objects are ________ binary components.
Correct Answer Reusable
Select The Blank
Question If you cannot access a page that you are sure should be
available, check the ________ of your links.
Correct Answer syntax
Select The Blank
Question Functions start by being "passed" a particular value; they work
with that value to make something else happen and then
________ a new value to the body of your program.
Correct Answer Return
Multiple Choice Single Answer
Question The Internet service that allows computers to transfer binary files
(programs and documents) across the Internet is called :-
Correct Answer File Transfer Protocol (FTP)
Match The Following
Question Correct Answer Your Answer
Web browser Software required for HTTP Software required for HTTP
Web Collection of electronic
documents or pages held on
computers around the world.
Collection of electronic
documents or pages held on
computers around the worl d.
Web Page A document written in HTML
that includes text, images,
sound and other digital
contents.
A document written in HTML
that includes text, images,
sound and other digital
contents.
Web site Collection of web pages Collection of web pages
Multiple Choice Single Answer
Question One of the factors considered in web site design is :-
Correct Answer Space utilization.
True/False
Question Now a days the best web design tools take graphical or DTP like
approach for creating web sites.
Correct Answer True
Multiple Choice Single Answer
Question Unlike any other Internet service or protocol, the World Wide
Web is based on a concept of information retrieval called :-
Correct Answer Hypertext
Multiple Choice Single Answer
Question The following service identify your website's performance in
9
terms of ranking and also explain how to improve ranking
Correct Answer Position Agent
Multiple Choice Multiple Answer
Question As a preventive measure take the following actions :-
Correct Answer check hit counters. , eliminate slale links , periodically check
hyperlinks
True/False
Question Understanding the tag might enable you to use
freeware/shareware Java applets on your own pages. By
passing your own parameters to general purpose applets, you
may find them useful for your particular Web site
Correct Answer True
Multiple Choice Single Answer
Question For Macintosh, the HTML editor is :-
Correct Answer SimpleText
Multiple Choice Multiple Answer
Question Various INPUT types are :-
Correct Answer CHECKBOX , RADIO , HIDDEN
Select The Blank
Question Prior to hiring outside testers , create a list of key________ to
accomplish on your site.
Correct Answer tasks
Select The Blank
Question ________ is the computer program that interprets HTML
commands to collect, arrange and display parts of web page.
Correct Answer Web Browser
Multiple Choice Multiple Answer
Question The commonly used text editors are :-
Correct Answer WordPad , Write pad , Notepad
Multiple Choice Multiple Answer
Question Some of the protocols that can be part of an URL are :-
Correct Answer http:// , ftp:// , gopher://
Multiple Choice Single Answer
Question An Internet service which is based on a common set of protocols
and allows a particularly configured server computer to distribute
documents across the Internet in a standard way is termed as :-
Correct Answer World Wide Web
Multiple Choice Multiple Answer
Question You can create HTML file using any text editor such as :-
10
Correct Answer Textpad , Notepad , Editpad
True/False
Question The web pages look same in different browsers.
Correct Answer False
Multiple Choice Single Answer
Question The MIME Equivalent of File OLE object for the Tag is :-
Correct Answer application/x-oleobject
True/False
Question HTML Tags are case-sensitive.
Correct Answer False
Multiple Choice Single Answer
Question This Web standard allows programs on many different computer
platforms to properly format and display the information served.
These programs are called :-
Correct Answer Web browsers.
Multiple Choice Multiple Answer
Question Users need to have forms-aware browsers, like the current
versions of :-
Correct Answer Microsoft Internet Explorer , NCSA Mosaic , Netscape Navigator
True/False
Question The text editors create an ASCII text file when extension .htm or
.html is given to a filename
Correct Answer True
Multiple Choice Single Answer
Question A collection of Web pages under the control of a particular
person or group is known as :-
Correct Answer Web site
Multiple Choice Multiple Answer
Question The three vertices of Web pyramid are :-
Correct Answer Form , Function , Purpose
Multiple Choice Single Answer
Question The web address of FrontPage is :-
Correct Answer www.microsoft.com

Web Technologies - 14

Match The Following
Question Correct Answer Your Answer
ALIGN attribute We can align other
elements to the top,
middle, or bottom of the
graphic.
We can align other
elements to the top, middle,
or bottom of the graphic.
, Term definition Term definition
, Street or e-mail address Address of memory
location
ALT attribute Accepts a text that
descriLibrarybes the
graphic, in case a particular
browser can't display the
graphic.
Accepts a text that
describes the graphic, in
case a particular browser
can't display the graphic.
True/False
Question Unlike printed letters, memos, and word-processing documents,
Web sites can be changed or updated even after they have been
published.
Correct Answer True
Match The Following
Question Correct Answer Your Answer
SIZE The size of the input field
(in number of characters)
for text or password types
The size of the input field
(in number of characters)
for text or password types
HIDDEN Is not displayed by the
browser
Is not displayed by the
browser
SUBMIT When this is clicked, it
submits the form.
When this is clicked, it
submits the form.
RESET Clears all input fields and
resets to the defaults
Clears all input fields and
resets to the defaults
Multiple Choice Single Answer
1
Question The Object value CENTER indicates that the Object is Aligned :-
Correct Answer Between browser borders and allows text wrap
Select The Blank
Question It takes 15 to 30 seconds (on average) for a ________ kilobyte
graphic file to be transmitted over a 28.8 kbps modem connection.
Correct Answer 25
Multiple Choice Multiple Answer
Question Here are few points for initially testing your web pages
Correct Answer use Dreamweaver which enables you to specify upto 13 browsers
with preview in browser feature, , Resize the page several times to
see how your layout is affected by different sizes. , Check various
browser commands.
Multiple Choice Single Answer
Question The Inline value TEXTTOP indicates :-
Correct Answer Top vertically aligned with top of text's font
Multiple Choice Single Answer
Question The Inline value BASELINE indicates :-
Correct Answer Bottom vertically aligned with baseline of text
Select The Blank
Question ________ tags allow the browser to choose, within limitations,
how the marked-up text will be displayed.
Correct Answer Implicit
Select The Blank
Question The ________ allows us to take photos that can be downloaded
directly from the camera to the computer. Such photographs can be
easily converted for use on the Web.
Correct Answer Digital Camera
Multiple Choice Single Answer
Question HTML tags are enclosed within :-
Correct Answer Angular brackets
Multiple Choice Single Answer
Question The web address of Dreamweaver is :-
Correct Answer www.macromedia.com
Question Building a good Web site often means being aware of other
offerings on the Web, and creating links to other people's pages
that coincide with or expand upon the information you're
presenting.
2
Correct Answer True
Select The Blank
Question ________, the first graphical browser for the Web, appeared in
1993.
Correct Answer Mosaic
True/False
Question Now a days the best web design tools take graphical or DTP like
approach for creating web sites.
Correct Answer True
Multiple Choice Multiple Answer
Question We should view your web page through different :-
Correct Answer Operating systems , Screen Sizes , resolutions
Multiple Choice Single Answer
Question We can create and edit web pages and manage entire Web sites
within one application. Such interface is called as :-
Correct Answer Integrated interface
Select The Blank
Question A ________ is simply a computer with an Internet connection that
runs software designed to send out HTML pages and other file
formats (such as multimedia files).
Correct Answer Web server
Select The Blank
Question The Web protocols were first created by ________ when he was
with the European Laboratory for Particle Physics (also know as
CERN).
Correct Answer Tim Berners-Lee
True/False
Question The W3C continues to be largely responsible for negotiating
standards and creating technology to enhance data transfer on the
Web.
Correct Answer True
Multiple Choice Single Answer
Question If the graphic file logo.bmp is incorrectly typed as Logo.bmp
Correct Answer image corresponding to logo.bmp would not be seen
Multiple Choice Multiple Answer
Question As a preventive measure take the following actions :-
Correct Answer eliminate slale links , periodically check hyperlinks , check hit
counters.
3
Multiple Choice Single Answer
Question An Internet service which is based on a common set of protocols
and allows a particularly configured server computer to distribute
documents across the Internet in a standard way is termed as :-
Correct Answer World Wide Web
Multiple Choice Multiple Answer
Question Following are some of parameters required for designing a web
site :
Correct Answer Date & time , Orientation , Navigation
Multiple Choice Single Answer
Question No matter how beautiful or spectacular your home page design , it
is not a web page unless viewed through :-
Correct Answer web browser
True/False
Question The tag body bgcolor is an empty tag which does not act on text.
Correct Answer True
Multiple Choice Multiple Answer
Question The three vertices of Web pyramid are :-
Correct Answer Function , Purpose , Form
Multiple Choice Single Answer
Question The special program that will visit your site and scan documents
for HTML errors if any is called
Correct Answer HTML validation services
Select The Blank
Question Each ________ displays HTML codes in slightly different ways
and some-like Netscape and MS Internet Explorer-even add their
own HTML-style commands.
Correct Answer Browser
Multiple Choice Single Answer
Question The SUBMIT type accepts only the attribute, which can be used to
rename the button, called :-
Correct Answer VALUE
True/False
Question The older browsers sometimes do not support new technologies
used by you in your web site, which adversely affects performance
of your website.
Correct Answer True
Your Answer True
4
Multiple Choice Multiple Answer
Question Most Web server scripts are written in shell scripts such as :-
Correct Answer Perl , C , UNIX
Select The Blank
Question ________ is the computer program that interprets HTML
commands to collect, arrange and display parts of web page.
Correct Answer Web Browser
True/False
Question Any program that generates ASCII text files will work perfectly as
an HTML editor even with a word processor like WordPerfect or
Microsoft Word.
Correct Answer True
Select The Blank
Question The World Wide Web is composed of millions of ________, each
of which is served to a browser (when requested) one at a time.
Correct Answer Web pages
Multiple Choice Multiple Answer
Question You have three options for WRAP attribute such as :-
Correct Answer OFF-No text wrap. , VIRTUAL , PHYSICAL
True/False
Question It is always beneficial to test web page created by us in more than
one type of Web browser before we publish our Web site.
Correct Answer True
Multiple Choice Single Answer
Question Maening of tag is :-
Correct Answer Input field
Select The Blank
Question The HTML does not remove the text documents created by a word
processing. It simply adds certain commands called ________, to
the text document to tell a Web browser how the document should
be displayed.
Correct Answer Tags
Multiple Choice Multiple Answer
Question All Web browsers are capable of certain basic tasks like :-
Correct Answer Finding Web pages , Loading Web pages , Displaying web pages
following HTML standards and conventions
Multiple Choice Single Answer
5
Question The Internet service that allows computers to transfer binary files
(programs and documents) across the Internet is called :-
Correct Answer File Transfer Protocol (FTP)
True/False
Question The Paragraph Tag is an empty tag .
Correct Answer False
True/False
Question Gopher is a system of menu items that link sites around the world
for the purpose of information retrieval.
Correct Answer True
Multiple Choice Single Answer
Question This Web standard allows programs on many different computer
platforms to properly format and display the information served.
These programs are called :-
Correct Answer Web browsers.
Multiple Choice Multiple Answer
Question The activities involved in a planning of web site are a follows :-
Correct Answer Prepare a rough layout of proposed web site on paper. , Prepare a
tree structure of various components of a web site , Prepare
attractive home page
Multiple Choice Multiple Answer
Question The following objects are all considered an ActiveX control :-
Correct Answer Existing OLE controls (OCX) , OLE objects that make use of
monikers , Java Applet with the support of COM
Multiple Choice Multiple Answer
Question The different ways of Creating Graphics for the Web are :-
Correct Answer Graphics packages , Digital cameras , Scanned photographs

Web Technologies - 13

LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple Answer
Question The process of orientation covers following activities :-
Correct Answer To make use of footers , To provide title to a web site , To make use of header
using word and symbols
Your Answer To provide title to a web site , To make use of header using word and symbols
Multiple Choice Single Answer
Question The Internet service that allows computers to transfer binary files (programs and
documents) across the Internet is called :-
Correct Answer File Transfer Protocol (FTP)
Your Answer File Transfer Protocol (FTP)
Multiple Choice Single Answer
Question Unlike any other Internet service or protocol, the World Wide Web is based on a
concept of information retrieval called :-
Correct Answer Hypertext
Your Answer Hypertext
Select The Blank
Question If you cannot access a page that you are sure should be available, check the
________ of your links.
Correct Answer Syntax
Your Answer Syntax
Select The Blank
Question RADIO requires that you use the VALUE attribute, and that the NAME attribute be
the same for all of ________ tags that are intended for the same group.
Correct Answer
Your Answer
Select The Blank
Question The ________ tag is used to offer additional parameters to the tag information like
how many times to play a movie clip.
Correct Answer
Your Answer
Match The Following
Question Correct Answer Your Answer
The checkbox Object Is created inside a form and
appears as a small box with or
Is created inside a form and
appears as a small box with or
without a mark (usually an x)
inside it.
without a mark (usually an x)
inside it.
HTML Form A part of web page that includes
areas where readers can enter
information to be sent back to
the publisher of web page.
A part of web page that includes
areas where readers can enter
information to be sent back to the
publisher of web page.
TEXTAREA tag These tags provide an area for a
user to enter multiple lines of
text.
These tags provide an area for a
user to enter multiple lines of text.
Radio Object This object allows a user to
make a choice of a single
selection from many.
This object allows a user to make
a choice of a single selection
from many.
Multiple Choice Multiple Answer
Question The hypertext concept of the Web was introduced to the world of multimedia,
resulting in the hypermedia links that are possible in HTML with graphical browsers
such as
Correct Answer NCSA Mosaic , Netscape Navigator , Internet Explorer
Your Answer NCSA Mosaic , Netscape Navigator , Internet Explorer
Multiple Choice Multiple Answer
Question Some of parameters required for designing a web site are as follows :-
Correct Answer Search engines , Hit counter , Metaphor
Your Answer Search engines , Hit counter , Metaphor
Multiple Choice Single Answer
Question This Web standard allows programs on many different computer platforms to
properly format and display the information served. These programs are called :-
Correct Answer Web browsers.
Your Answer Web browsers.
True/False
Question Library databases, academic phone books, and similar information are never kept in
WAIS systems.
Correct Answer False
Your Answer False
Multiple Choice Multiple Answer
Question A Web page is generally a single HTML document, which might include in addition
to text :-
Correct Answer Graphics , Sound files , Hypertext links
Your Answer Graphics , Sound files , Hypertext links
Multiple Choice Single Answer
Question
The tag has a type that automatically submits the data that's been
entered into the HTML form. This is called :-
Correct Answer SUBMIT
Your Answer SUBMIT
Multiple Choice Multiple Answer
Question The password object uses the following event handlers as methods :-
Correct Answer Focus , Blur , Select
Your Answer Focus , Blur
Match The Following
Question Correct Answer Your Answer
Webmaster by Coast Software
Ins
coast.com coast.com
WebTrends by Webtrends
Corporation
webtrends.com webtrends.com
Cyberspyder by Aman Software cyberspyder.com cyberspyder.com
Linkbot by Watchfire watchfire.com watchfire.com
Multiple Choice Single Answer
Question A collection of Web pages under the control of a particular person or group is known
as :-
Correct Answer Web site
Your Answer Web site
Multiple Choice Single Answer
Question The Object value LEFT indicates that the Object is Aligned :-
Correct Answer With left border and allows text wrap
Your Answer With left border and allows text wrap
Multiple Choice Multiple Answer
Question We should view your web page through different :-
Correct Answer Operating systems , Screen Sizes , resolutions
Your Answer Screen Sizes , resolutions
Multiple Choice Multiple Answer
Question The following HTML extensions are supported by Internet Explorer :-
Correct Answer TABLE: Fully compliant with HTML tables with cell shading and text wrapping. ,
StyleSheet: font size, intra-line space, margin, highlighting and other features
related with styles can be specified in the HTML by the user. , In-Line sound and
video
Your Answer TABLE: Fully compliant with HTML tables with cell shading and text wrapping. ,
StyleSheet: font size, intra-line space, margin, highlighting and other features
related with styles can be specified in the HTML by the user.
Multiple Choice Single Answer
Question There are two different types of files that can be sent over various Internet services.
These are ASCII text files (plain text) and :-
Correct Answer Binary files
Your Answer Binary files
Select The Blank
Question If an HTML page is created in a word processor, it is essential to use the ________
command to save it as an ASCII text file.
Correct Answer Save As
Your Answer Save As
Multiple Choice Single Answer
Question The Inline value TEXTTOP indicates :-
Correct Answer Top vertically aligned with top of text's font
Your Answer Top vertically aligned with top of text's font
True/False
Question In order to evaluate performance of a web site , Professional web design firms keep
a bank of computers of varying platforms and processors that run as many versions
of browsers as possible.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question The Web is fairly unique among Internet services which include :-
Correct Answer E-mail , Gopher , FTP
Your Answer E-mail , Gopher , FTP
True/False
Question ActiveX technologies enable content providers and application developers to create
powerful and dynamic Web content and Web server extensions quite easily.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question In order to create a text for an HTML page two resources are required, web browser
and :-
Correct Answer text editor
Your Answer text editor
True/False
Question To help determine the most important browsers and platforms for your testing
schemes , it is necessary to prioritize them according to which constitutes the
widest portion of your audience.
Correct Answer True
Your Answer True
Select The Blank
Question In a hypertext document, certain words within the text are marked as ________ to
other areas of the current document or to other documents.
Correct Answer Links
Your Answer Links
Multiple Choice Single Answer
Question VLINK stands for :-
Correct Answer Visited link
Your Answer Visited link
True/False
Question You can nest forms within one another without adding end tag.
Correct Answer False
Your Answer False
True/False
Question It is always beneficial to test web page created by us in more than one type of Web
browser before we publish our Web site.
Correct Answer True
Your Answer True
True/False
Question Now a days the best web design tools take graphical or DTP like approach for
creating web sites.
Correct Answer True
Your Answer True
Select The Blank
Question The HTML does not remove the text documents created by a word processing. It
simply adds certain commands called ________, to the text document to tell a Web
browser how the document should be displayed.
Correct Answer Tags
Your Answer Macros
Multiple Choice Multiple Answer
Question Check the grammar as follows :-
Correct Answer Focus on the look of the document and if you find formatting inconsistencies,
missing or misplaced items, correct them. , Check the logic and flow of ideas and
words. , Scrutinize all the text on the document and check syntax, spelling,
capitalization, and punctuation.
Your Answer Scrutinize all the text on the document and check syntax, spelling, capitalization,
and punctuation. , Divide the sentences into tokens and parse them.
True/False
Question The title, HTML, head, and body tags are all container tags. The relevant text is
present between the on and off tags.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question the Top of Form tag takes two attributes: METHOD and :-
Correct Answer ACTION.
Your Answer ACTION.
Select The Blank
Question ________, the first graphical browser for the Web, appeared in 1993.
Correct Answer Mosaic
Your Answer Mosaic
Multiple Choice Multiple Answer
Question A script is some executable block, such as :-
Correct Answer DOS batch file , Perl script , EXE file.
Your Answer DOS batch file , Perl script , EXE file.
True/False
Question HTML Tags are case-sensitive.
Correct Answer False
Your Answer False
Multiple Choice Multiple Answer
Question The three basic HTML document tags are :-
Correct Answer Head , Title , Body
Your Answer Head , Title , Body
Multiple Choice Single Answer
Question The MIME Equivalent of File Macromedia Director for the Tag is :-
Correct Answer application/x-director
Your Answer application/x-director
Multiple Choice Single Answer
Question The Inline value TEXTBOTTOM indicates :-
Correct Answer Bottom vertically aligned with lowest point in text
Your Answer Bottom vertically aligned with lowest point in text
Select The Blank
Question ________ is commonly used to gather feedback from your Web users.
Correct Answer: