Combination of alphabetic and
numeric data is called _____ data
alpha numeric
alpha beta
Computers can be classified based
on ______,______and _______
space occupied, price, cost, performance
no. of users allowed
their ratio
_____________ is the Worlds largest
computer network .
Ethernet
Internet
_________ are used in large
organizations for large scale jobs
mini computers
microprocessors
_______ devices are responsible for
feeding data into the computer
input
output
_______ is the capability of the o/s to
run numerous applications
simultaneously
multiprocessing
multithreading
_______ involves conversion of raw
data into some meaningful
information
interpreter
compiler
_______ device is responsible for
obtaining the processed data from
the computer
input
processor
_______ printers use light to produce
the dots needed to form pages of
characters
impact printers
drum printers
control program,
interpreter,
Hardware components in a
operating system,
assembler,
computer are _____,____,_____,______ bootstrap, kernel, shell compiler
_______ software helps to do a
specific task for the user
operating system
application
software
_______ converts a high level
language into machine language
processor
compiler
_______is/are a popular front end tool visual basic
power builder
_______ translates assembly
language program into machine
language instructions
interpreter
compiler
The model through which the
relationship is diplayed between
data and information is called_______ processing model
model
____________looks like a ordinary
credit card but incorporate a
microprocessor and memory
chip____________
RAM
smart card
______ computers are used in large
organizations for large scale jobs
which have large storage capacities mainframes
super computers
_______ is responsible for all
calculations and logical operations
that have to be performed on the
data
control unit
arithmetic and
logic unit
______ printer use laser light
band printer
drum printer
______ software enhances the user to
enter ,store, manipulate and print
any text
data management
word processing
_______ is the temporary storage
place for deleted files
my computer
recycle bin
Processed data is called
___________________
data
datum
_____ language consists of strings of
binary numbers
assembly language
machine language
_________capability supports
concurrent users doing different
tasks
multiprocessing
multithreading
BBS stands for______
USENET is a BBS on ____ scale
business
broadcasting
bulletin board system system
small
large
Internet can be defined as _______
internal network
network of network
_________is a program that displays
information about a host connected
to the net
finger service
ping service
_______ is a program or a tool that
helps in locating a file anywhere on
the net
FTP
TELNET
URL stands for ____________
uniform research
locator
uniform resource
locator
A ______ always begins with a slash
message
scheme
The World Wide Web is referred to
shortly as the _______
net
web
______ is a program that helps us to
log on to other networks
Usenet
finger service
HTTP is the acronym for __________
Higher text transfer
protocol
Hyper text
transmission port
______is used to transfer and copy
files over the internet
iccp
ftp
_____ is a program that helps us to
log on to other networks
yahoo
ftp
TCP/IP stands for ________________
transfer control
protocol/internet
transmission
control
protocol/internet
protocol
HTTP stands for______
hotlink text transfer
protocol
hyper text transfer
protocol
Two of the important browsers
are_____ and_____
lynx,minx
netscape,ie
________ are defined as ways of
communication amongst networks
protocols
IP address
HTML stands for_____
higher text medium
language
hyper transfer
markup language
The system of interlinked
documents is known as_______
hot links
hyperlink
The small programmes that create
animation,multimedia,real-time
games and multi user games are
called______
images
applets
The information displayed on the
web page includes______,_____
and_____
programms,images
graphics,videos,audio ,text
The web pages that represent online
home of their author are
called______
first page
home page
_____ is the most popular internet
service
electronic mail
yahoo service
_______ is a program or a tool that
helps us find a file anywhere on the
net
newsgroup
telnet
Yahoo,lycos,excite and webcrawlers
are _____
search engines
web directories
GIF is the acronym for ____________
Graphical interpreter
formatting
Graphical
interchange
Format
JPEG is the acronym for ___________
Joint Pictures Expert
Group
Jumbled pictures
expert graph
The World Wide Web consists of
_________
information
web pages
A hyperlink can be on ___________
text only
image only
Web is a collection of ___________
web sites
images
The two major browsers used to surf MS Internet Explorer
the Internet are ________,_______
and Mosaic
Netscape
Navigator and
Mosaic
The internet is also called as
_______________
arpanet
the net
The internet is similar to
_________________
LAN
peer-to-peer
connectivity
The net transfers______ from one
place to another
data
parcel
The net provides interesting
services like______,______ and______
scripting,parsing and
compiling
news,cooking and
fine arts
________ is the ancestors of the
internet
dnet
arpanet
defensive
DARPA stands for
administrative rank
_____________________________________ administration
__________
network
DARPA is broken into ________ and
_______
dedicated and
registered projects
administration
milnet,smaller arpanet mailnet,inet
NSFNET is the united states provides
service to _____ and_____
education,research
music and dance
HTML stands for
_____________________________________ Higher text
Hotlink text
_
manipulation language markup language
The first international IP network
connections were established in
1973 with _____ and_____
united states and UK
england,norway
A_____ is a set of computers
interconnected by transmission
paths to exchange information in
internet
server
client
A computer that provides a service
usable by other computers is
called______
client
stand-alone
_____ can be owed by multiple
organisation
LAN
MAN
Data is transmitted in the form
of_____ signals
analog
digital
Modem stands for __________________ Moralize/demoralize
Modulation/demod
ulation
______ is the process of the digital
signals being converted into a form
suitable for analog transmission
Mapping
Modulation
________ and______ are two basic
ways of getting connected to the
internet
Satellite link and
digital signals
Dedicated access
and dial up access
SLIP stands for ________________
Standard long internet Stream line
protocol
internet protocol
PPP stands for _____
Prime prolonged
protocol
Point to point
protocol
Identify the need for controls and
auditing in a computerised
environment.
Absence of input
documents
Lack of visible
transaction trail
The organisational, management,
maintenance and access controls
are categories of ……
Application controls
General controls
The application controls are ….
Input controls
Processing controls
Identify the field check - "If a set of
values is defined, is the input data
one of these defined values?"
List
Range
The field check that conforms if data
input for a field is in a particular
format.
Format mask
Data mask
The field check on a processed data
that fails if a field is not initialized to
zero or errors occur during
calculation is……
Range
Sign
The validation checks applied to a
field depending on its logical
interrelationships with the other
fields in the record are called …..
Field checks
Record checks
A group of records or transactions
that are contiguous constitute …..
Physical batches
Logical batches
…………..is the type of batch check
(group of records) for all input
records of a particular type is done. Control totals
Serial number
Grand totals calculated for any code
on a document in the batch are
called…..
Financial totals
Record totals
Control that checks if correct
sequence of commands and update
parameters are passed from the
application software to the
database.
Table level
Data Integrity
With respect to data integrity
control, when monetary transactions
are processed against master files
without a match, we should
maintain a ….
Sequence account
Data account
The system test that tests the toplevel modules first and then the
lower modules are simulated with
dummy modules to check the
interfaces is called ….
Bottom up test
Hybrid test
Identify the audit technique that
examines each transaction as it
passes through the system.
Embedded code
Program code
The Core Image Comparison audit
technique compares the….
Executable
Database with master program with
table
master copy
The technique used by an auditor to
list unused program instructions
is…..
Modelling
Analyzing
The sample data created and used
for the purpose of testing the
application system is called….
Test data
Table data
The test data (dummy unit)
implemented in the normal
processing of the system over a
period of time is known as….
Black box Test
Integrated Test Facility Facility
The test data generated with
correctness proof, data flow analysis
and control flow analysis tools is
called….
Test item block
Test data pack
When a real-time system is
simulated to generate the same
output as the real-time system, the
technique is called….
Parallel trailing
Tracing parallel
When an auditor expands the extent
of substantive tests to determine
the impact of defects on the
attainment of program objectives,
the methodology is….
Cross reference lister
Formulate flaw
hypotheses
This is an important control in
systems that use digital signatures
for authentication purposes.
Public audit trails
Random audit trails
Selecting transactions based on a
sampling rate is called …. method.
Transaction sampling
Systematic
sampling
The capability of the generalized
audit software to read different data
coding schemes, different record
formats and different file structures
is….
File size
File data
The audit software capability of
frequency analysis is to….
Sort and merge files
Sampling nth item
The audit functions of attributes
sampling, variables sampling,
stratified sampling are included in
…. functions.
Stratification
Selection
Identify the functional limitation of a
generalized audit software that
enables evidence collection only on
the state of an application system
after the fact.
Ex Post Auditing Only
Analytical review
only
The purpose-written audit programs Sorting, creating, and Data retrieval,
are used for…..
printing files
code comparison
Picture of a transaction as it flows
through the computer systems is
called…..
Program
Track
Identify the type of audit when
auditors are members of the
systems development team.
General audit
Post audit
The processor uses this workspace
as a scratch pad during processing. Monitor
Processor
1024 Megabyte is equivalent to:
1 KB
1 MB
The software used for layout of
newsletters and magazines along
with text and images is called……
Application software
Desktop publishing
The model used to describe the
relationship between data and
information is called
System model
Data model
A super computer uses a bus width
of……
16 bits
256 bita
When a processor executes one
billion floating-point arithmetic
operations per second, is called…..
Nanoflops
Tetraflops
The processor responsible for
communication to and from all the
remote terminals connected is
termed as ………
Front-end processor
Host processor
The processors used for speedcritical graphics applications are…… CISC
RISC
The plastic cards with embedded
microprocessor and memory are
called…..
Credit card
Computer card
VLSI stands for…..
Very large scale
Integration
Very limited silicon
integration
The data width of a Pentium 4
computer is ……
16 bits
8 bits
The unit which executes addition,
subtraction, multiplication and
division operations is ……
CPU
ALU
The instructions to be executed by
the processor are loaded from
memory into the
Instruction unit
Process register
The results of a process are stored
into ………
Accumulator
General-purpose
Register
The memory that stores data as a
series of memory cells that can be
accessed sequentially is……
DRAM
SAM
The technology used to accelerate
the processing of a computer is
………
Processor bus
Cache memory
The memory used in a computer's
BIOS chip is……..
Cache memory
SRAM
The process of swapping information
between the RAM and hard disk can
cause
Fragmentation
Disk full
The standard system bus was
replaced by frontside and backside
bus called…….
Dynamic memory
Dual independent bus bus
The DSP,DAC,ADC,and ROM are
parts of the ……
Graphics card
Memory card
The bus whose widths are 32 or 64
bits is called……
ISA
PCI
The maximum resolution of a
standard SVGA adapter is ……
1024*640
780*1024
…………. synthesis method uses
recordings of actual instruments.
Amplitude
Frequency
The instrument that can produce
continuous lines is…..
Printer
Plotter
PPM , CPS are units used to measure
the printer's …..
Speed
Quality
The PCL and postscript are defacto
standards for……
Page definition limit
Page description
languages
A laser printer has RAM for
downloading fonts called the…….
Font catridges
Dynamic catridges
The characteristic which refers to
how sharply a pixel appears on the
monitor is called…..
Convergence
Resolution
The faster the refresh rate, the
lesser the monitor…..
Sharpness
Resolution
Size of image
Colors and shades
of gray that can be
displayed
The number of bits used to
represent a pixel in a monitor
decides the …….
The input device that utilizes a lightsensitive detector to select objects
on a display screen is called…..
Touch screen
Touch pad
The most commonly used scanner
technology is….
Optical character
Charge-coupled device recognition
Identify the type of mice that uses
optical sensors to detect motion of
the ball.
Mechanical
Optomechanical
Identify the input device that
consists the puck and the stylus.
Trackball
Joystick
Identify the disk which has an
access time of 30ms.
Zip disk
Floppy disk
A set of tracks across a set of
platters in a hard disk is called a…… Disk
Cylinder
The bus used to connect a CD-ROM
to your computer is…..
SCSI
PCI
The digital audio tape with the
capacity of 24GB of data uses the
technology called …..
Hyper circles
Fero magnetic
The floppy disks that support 400k1.2 MB belong to……
IBM
Macintosh
The backward compatible disk that
has high density-120MB is called…. SuperDisk
Jaz disk
The maximum capacity of an optical
disk is ……
700 MB
6 GB
Which of the auxiliary storage
devices uses the constant angular
velocity access technology?
Super disk
DAT-ROM
The……..is an auxiliary sequential
access non-volatile storage device.
Winchester disk
Zip disk
The portable device that optimizes
the features of the floppy and the
CD-ROM is….
Hard disk
Jaz disk
The important central module of an
operating system is the…..
Memory module
Data module
Identify the function of the
operating system that manages the
tasks waiting to be processed.
Job management
I/O management
This function of the OS manages
allocation of a minimum main
memory to tasks.
Disk storage
Memory storage
Identify the multitasking type that
slices CPU time to each program.
Paralleling
Cooperative
The OS which allows different parts
of a single program to run
concurrently is…..
Multithreading
Multiprocessing
The OS that monitors external
activities with timing constraints
is….
Multi-user
Real-time
The 32bit operating system for
desktop version that replaces Win
9x is…..
Win 2000 server
Win 2000
datacenter
The high-level logical disk structure
which defines the way the entire
disk is organised is …..
Frame allocation table File allotted table
A collection of sectors on a hard disk
is a
Block sector
Cluster
The FAT system that provides long
filename support and was written
using protected-mode code .
FAT16
VFAT
Identify the file system that provides
networking,security,compression,
large file support….
FAT16
VFAT
The logical directory structure has a
base of the tree called the……
Root directory
Main directory
The process used to optimize the
disk space by arranging files
contiguously is …..
Defragmentation
Formatting
Choose the level of RAID that offers
disk mirroring for fault tolerance.
Level 0
Level 2
Identify the archive formats found
on Unix-based Internet sites.
Exe, zp, tz
Zip, LZH, ARJ
Identify the window screen part that
indicates the name of the window,
application or document.
Title bar
Menu bar
The button on the title bar of a
window that displays the menu to
control the size of the window is….. Scroll box
Control box
The mouse operation that is used to
move windows and icons to different
locations is …..
Click
Double click
The start button,tray and shortcuts
are important features of the …….
Control panel
Title bar
The start menu option that keeps
track of your important websites is
…..
Documents
Programs
If you want the recycle bin capacity
to be distributed across partitions,
Configure drives
you must use the option ……
independently
Configure capacity
independently
The feature to retrieve deleted files
from the recycle bin is …..
Re-paste
De-link
The feature which enables to
synchronize files between a floppy
and disk is …..
My Briefcase
My Documents
A file with the pdf extension can be
viewed with the application…..
Adobe Acrobat Reader Adobe Viewer
The remote administration access to
view shared resources on the
network is…..
Net Neighbourhood
Net Tracer
The utility used to access the
directory structure, create files and
folders etc is….
Windows Explorer
Windows Tools
The font, color, background settings
are saved in the …..
Control panel
My computer
The Notepad utility saves files in the
…… format.
Binary
Unicode
Identify the windows feature that
allows more than one person to use
a single PC with his own desktop.
Log off
Run
You can quickly access the recently
worked on files from this start menu
option.
Favorites
Accessories
The Internet is a network similar to
…..
Peer-to-Peer
connectivity
Point-to-Point link
When a computer is connected to
the internet through a LAN
Dial-up access
Dedicated access
PPP stands for:
Protocol to Protocol
Points
Point to Point
Protocol
SLIP stands for:
Serial Limited Internet Serial Lock InterProtocol
Protocol
When a user connects to Internet
with a shell account it is called ……. Direct access
Dedicated access
The launch of DARPA's Internet
Protocol (IP) facilitated the term….. Network
Consortium
The costs of Internet
implementation are…..
Computer cost,
network card cost
Connection cost, cost
of telephone line
This software enables a host to work
as a terminal on the network.
Terminal embedded
Terminal emulator
The Windows Internet application
functions were developed based on
the UNIX programs called…..
Sockets
Package
Each computer on the Internet is
identified with a….
24-bit address
16-bit address
A mail server robot can
automatically….
Check mails
Read mails
This protocol is used to check
reliability, sequencing and flow
control.
Transmit
Communication
Protocol
Transmission
Control Protocol
To check that data reaches the
destination in a proper order, the
data packets are assigned….
Order numbers
Packet numbers
The computer which provides FTP,
WWW, Mail services on a network is
called….
Client
Server
The method of accessing files
through publicly accessible server
that gives free access to the files is
called ……
Server FTP
Public FTP
This file is transferred verbatim with
FTP service.
ASCII file
BIT file
We can access the Archie server
by……
Tunnel
WWW
The types of Archie servers are …..
Straight Archie
Windows Archie
% telnet archie.ans.net is the
command used by the Archie client
Program the Archie
to….
Login to Archie server Server
This tool helps us to locate a file
anywhere on the Internet.
FTP
Remote
The computer that maps the
Internet domain name to the
Internet numeric address is the …..
Network translator
server
Address Naming
server
………….is the format of Internet
Address.
Aaa-bbb-ccc-ddd
Aaa.bbb.ccc.ddd
The email address has two parts one
is the username while the other is
the ….
Domain
Net
The resources on the World Wide
Web are linked with the naming
format …..
Universal Resource
Locator
Universal Resource
Location
This Net tool provides a stimulating
on-line discussion environment.
Internet Relay Chat
Relay packet
transmission
The IRC II client program command
begins with a ….
Slash
Percent
The IRC conversations are organized
into….
Chats
Packets
Identify the output of the IRC
command " /list -min 10" .
Display chats with
Display channels with the maximum 10
at least four users
users
Lynx text browser is a web client in
which users can login with …..
Self accounts
Terminal ping
A web browser provides this hotlist
for a user.
Book-keeping
Bookmarking
The tool to obtain information on the
web by menus and more flexible
than Archie is….
Lynx
Juggler
These servers help in searching for
words from a list of databases or
documents.
WIIS and NETWAIS
WINWAIS and
WAISMAN
This scripting language is an object
based language and is developed by
Netscape.
SGMLScript
VbScript
The one-way broadcast of live
events is called….
Cybercast
Netcast
This is a system of thousands of
distributed bulletin boards and read
by a newsreader.
Bulletinreader
Newsgroup
Unix shell provides mailing
programs called ….
Pile and Elem
Pine and Elm
The Unix to Unix copy mail system
separates parts of the mail address
with the symbol...…..
@
!
The Netlauncher (TCP/IP) software
consists of these programs that can
run under Windows.
Spy Mosaic
Image View
The parts of the WSIRC server (net
tool) window are…..
Server message,
command line and
channels
Server
message,command
line and channels
These are small java programs that
create games, multimedia etc.
These are downloaded over the Net
and executed by a web browser.
Java scripts
Java exe
The World Wide Web is a collection
of…..
Web windows
Net pages
It is a link which helps in retrieving
information from the WWW easily.
Netlink
Sitelink
…………..directories deliver
information on all the topics on the
Internet.
Web maps
Net ports
This browser does not display links
in color.
Netshark
Cello
The Mosaic browser stores
information about the configuration
in a/an ….
Ini file
Exe file
This is an indexer that crawls around
the web cataloging.
Webcrawler
Web sites
The option by which the browser
window in Navigator Gold 2.0 can be
shifted to editor window is ….
Edit/New file
Edit/Save Window
This toolbar button displays
information about web creation.
Web page starter
Printer
This window in Navigator Gold does
not support frame display.
Script window
Browser window
The different ways of
communication on the Web are…..
Interpersonal
Group
This download tool provides multiserver connection, can search for
mirror sites and provides a file
leecher.
Download Accelerator
Plus
Fresh Download
The…………button provides HTML
tags for font style, alignments, and
colour options.
Edit Format
Character Format
Identify the search engine that helps
in concept based searching.
Lycos
This is a text only browser.
Lycos
Yahoo
Lynx
The multithreading feature of
Netscape is facilitated with a
storage space named…..
Archive
Cache
The distributed uploading of web
pages through Navigator Gold is
called…..
Web loading
Web updation
The method of presenting
information on the web through
highlighted items is called……
Hypertext
Webtext
The a2z directory is an alphabetical
list of pages used by the search
engine…..
Netleecher
Webindexer
Netscape browser can display
context links on an image called….. Image webs
Image maps
Name the download tool which
highlights an area of a page and
gets all the links that are within the
highlighted area.
Webcrawler
Webcow
………...helps in business
transactions, generating revenue
and demand on the information
highway.
E-Marketplace
E-commerce
The transfer of structured data for
processing from computer to
computer using agreed formats and Electronic Document
protocols is called…..
Intercahnge
Electronic Data
Interchange
This system involves electronic
transfer of funds between financial
institutions.
Efficient Format
Transactions
Electronic Financial
Transmission
A …… electronic mailbox stores EDI
Very Advanced
transactions for later retrieval.
Value Added Networks Networks
The mutual satisfaction of price,
terms and conditions, delivery and
evaluation criteria in a marketplace Negotiation and
is….
Bargaining
Networking and
Buying
The type of advertising, the
Broadcast and Junk Mail models are
of…..
Passive
Push
Identify the models of passive
advertising.
Billboard
Portal
This layer is responsible for
transmitting data as frames.
Network Layer
Data Link Layer
This layer is responsible for
encoding of data.
Link Layer
Network Layer
This layer of the TCP/IP suite
includes the device driver and
network interface card.
Application Layer
Link Layer
This protocol is used for flow control, Simple Mail Transfer
echo and flow redirection.
Protocol
Internet Control
Message Protocol
The software components that
integrates different hardware
devices with the operating
system…..
Device drivers
Device modules
This is the basic component that
connects the computer to the
network.
Cable Interface Card
Netlink Interface
Card
The dumb terminal/node in a
network depends on this computer
for their basic functioning.
Personal computer
Client computer
This has an embedded microchip
which can both manipulate data and
execute applications.
Data card
Security card
To ensure a reliable communication
between the buyer and seller, the
Session Socket Layer
protocol used is….
Protocol
Secure Sockets
Layer Protocol
The financial transactions are to be
…………. leading to different steps in Collected and
Accounts Compilation.
computed
Sampled and
stratified
The basic document where
transactions are entered
chronologically is….
Ledger
Journal
These are the basis for analysis by
potential investors, banks etc.
Journal and Ledger
P & L Account and
Journal
The accounts that the business
owns is called ….
Liability
Income
The expenditure for running the
business for a period is …..
Expense
Example
Identify the account type by the
rule: "Debit the receiver and credit
the giver".
Real accounts
Personal accounts
The first document where the
transaction is entered is called a ….. Ledger
Liability
The document used for posting of
accounting transactions is ……....
Ledger and trial
balance
Voucher and journal
When the debit total is greater than
credit total, the amount appears in
the …….. column.
Income
Debit
The methods LIFO, FIFO, Moving
Average are used to ….
Value clearing
stock
Value closing stock
The report prepared taking the asset
and liability type accounts from the
Trial Balance is called….
P & L statement
Income statement
The report that depicts operating
profit/loss for a period is …..
Trading account
Trial balance
The day book contains transactions
relating to ………
Income or expenditure Sales or purchase
The Bills Receivable details are
maintained in a ……..
Journal sheet
Voucher debtors
Creditors ledger has details of your
dues to ……..
Customers
Assets
The sundry debtors are placed in the
Balance sheet on the ……
Income side
Assets side
The first step in Tally before any
transaction is entered or saved is
creating a ………
Company
File
To configure country specific details
use the function key……
F10
F2
Identify the security mechanism
used in Tally.
Tally Secure
Tally Pack
After selecting a company in Tally,
you will be in the……
Accounts of Tally
Gateway of Tally
Tally software is based on ………
accounting system.
Sales
Production
Identify the primary group of capital
nature that uses bank account and
cash in hand as sub groups.
Fixed assets
Current assets
All financial entries in Tally are done
using…….
Vouchers
Groups
The Direct expenses, Purchase
account, Direct income are primary
groups of …..
Expense nature
Capital nature
The option to delete a sub-group is
admissible through the menu……
Alter
Delete
The behavioural attributes of this
group cannot be changed.
Sub-group
Ledger-group
Credit limits for personal accounts
and branches can be done in the
ledger mode……
Single
Multiple
We are not allowed to delete a
ledger from this mode.
Single
Sub-group
All account heads except Cash and
Bank are placed in the……
Sub Ledger master
Group Ledger
master
Identify the primary group of capital
nature that has the sub-groups:
Bank OD Account, Bank OCC
Account.
Expenses
Income
The primary document for recording
all financial transactions in Tally is
the……
Journal
Trial sheet
You can customize the voucher entry
screen using the function key…….
F13
F12
Identify the voucher type that
records fund transfers between cash
and bank accounts.
Credit Note
Payment
This voucher type records
adjustments between ledgers.
Receipt
Sales
The use of classes for payment,
receipt and contra vouchers enables
data input in ……
Double entry mode
List entry mode
The details of a voucher entry can
be given in the …….
Comment
Memo
The credit note voucher can hold
account types: ……..
Sales account, Sales
tax account
Ledger account,
Bank account
The suffix and prefix details for the
voucher type can be made
applicable only from the …….
End of a month
First of a year
The voucher used to record all bank
and cash payments is …..
Credit Note
Contra
Tally's age-wise analysis considers
the voucher's ……
Effective date
Previous date
Arrange the steps in generating the
books of accounts.
1. Create Trial balance
2. Create new ledgers
3. Generate Day Books
4. Update journals for financial
transactions
1, 2, 3, 4
1, 3, 4, 2
For day-to-day transactions the
voucher types used are
Cash purchase
Credit purchase
Say for example a payment is made
to a creditor ABC - Rs.10000 by
cash, it can be entered into the
voucher type…..
Loan
Payment
Identify the purchase voucher type,
the transaction for purchase of 10
CPUs,10 monitors by credit.
Credit Purchases
Cash Purchases
Identify the voucher type to be
chosen for the sale of computers to
Anand by cash @ Rs.210000 per
unit.
Cash Ledger
Sale Sheet
A bank overdraft repaid by cheque
at Rs.25000 can be made in the
voucher…..
Payment
Receipt
Balance sheet
Profit & Loss
statement
The financial statement that
consolidates ledger balances is …..
The F9 function key in the left side
of the Gateway of Tally screen
displays the……
Accounting reports
Inventory reports
The option on the Gateway of Tally
that will generate the P&L account
statement is…..
Net Loss
Net Income
This displays the balance daywise
for a selected voucher type.
Record book
Ledger book
The feature in Tally to analyze
accounts of a company is…..
Ratio analysis
Account analysis
The age-wise statement is displayed
based on……
Income
Payables
The ratio analysis of receivables can
be done based on……
Bill date
Effective date
Name the statement that helps the
management in the decision making
process.
Data flow
Funds flow
Identify the budget type which is
chosen where transaction amounts
are to be monitored.
On closing balance
On net credit flow
Choose the budget type to be used
where bank accounts balances are
to be monitored.
On closing balance
On net credit flow
The management that needs to
consolidate the accounts of its
various enterprises uses ……. in
Tally.
Consolidate company
Group company
Identify the user who can access
audit trails in Tally.
Owner
Data Entry
operator
Identify the accounting feature in
tally that facilitates splitting
financial years for a company data.
Yearly-entry
Month-less accounting accounting
The tracking of changes in vouchers
and ledger masters is done by…..
Tally Vault
Tally Audit
Tally can import data from other
programs and creates a log about
the activity in the file…..
Tally.cfg
Tally.imp
Import and export of data between
Tally and other programs is possible
with the help of…..
OLE
DBMS
The manual option of voucher
numbering leads to…..
Duplicate number
Auto numbers
The Tally audit trail tracks changes
made to vouchers that are …..
less than 30 Days
more than 30 Days old old
The ratio analysis of Bills
Receivables or Bills Payables can be
displayed with the function key….. F5
F8
In IDEA, import Assistant wizard is
used to import data
from____________.
Excel
Access
In IDEA, Append functions can be
used to_________.
Import data
Add data at the
end
In IDEA, Statistics functions can be
applied on_________.
Numeric Data
Date Data
In IDEA, increment value in
Stratification function can be fixed
or free interval.
FALSE
TRUE
In IDEA, Stratified Random functions
is a part of which menu.
Analysis
Data
Which of the following is not an
Audit Software
ACL
IDEA
Using which functions to perform
more complex calculations and
exception testing in IDEA?
Equation Editor
function Editor
Which is the step by step procedure File->Print->Create
for reporting in IDEA.
Report
Click on Create
Report button on
the Operation
toolbars->Report
Assistant.
Which of the following are
categories of computer audit
function ?
Items of audit interest Data Analysis
In the following list which is not an
audit function ?
Sorting
Filtering
In the following list which is a audit
function?
File Definition
Stratification
What is the procedure for importing File->Import Assistant- File->Import ->
data into IDEA ?
> Import to IDEA
Import to IDEA
Which is the following step involved
in a source code review
Review Programming
methodology ?
standards
Understand
program
specifications
In IDEA which functions should be
used to find repeated values ?
Exclude
Detection
In IDEA, Stratification functions can
be applied on which type of data ?
Numeric Data
Date Data
In IDEA,Summarization accumulates
the values of Numeric fields for
each____________.
Primary Key
Unique Key
In which sampling,selecting
sampling units using a fixed interval
between selections
is_______________.
Random
Systematic
Ensures that all combinations of
sampling units in the population
have an equal chance of selection
is____________.
Random
Systematic
In Audit tool, to built relation
between two tables, both table
should have_____________.
Common Table
Common Field
Input Control method is a part of
Application Control Group.
TRUE
FALSE
Which is the following type of check
that can be run when data is input
through terminal ?
Field check
Filter check
Which is the following is the correct
types of Field checks on processed
data ?
Overflow
Range
IDEA exports data in a number of
_______________________.
database
text
Which is the following is the correct
types of Record checks on input
data ?
Resonableness
Compare
Which is the correct types of Batch
Checks ?
Control Totals
Outdated checks
Which is the need for table level
tests ?
Data Integrity
Controls are
required for
authorization
Which is the following is the major
points with respect to inter table
tests ?
This may make the
entire child tables
referenced by the
master field in the
main table unavailable
Their Master &
Child relationship
reference the table
from one another
Which is the software used by the
auditor to take a view of a file of
data or transaction passing through
the system at a particular point of
time ?
Mapping
Snapshots
Which is the software used by the
auditor to compare the source
version of a program with a secure
master copy ?
Souce comparison
Code compasion
Which is the techniques whereby
the auditor arranges or manipulates
data either real or fictitious, in order
to see that a specific program or
screen edit test is doing its work ?
Debug Testing
Logic Testing
Which is the software used by the
auditor to list un-used program
instruction ?
Mapping
Log Analysis
Which is the software used by
auditor to read and analyze records
of machine activity ?
Machine level
Executable level
Which of the following reason
strongly call for Control & Audit
Function ?
Absence of Input
Document
Lack of Visible
Transaction Trail
In IDEA,Data Extraction select data
form a file for further___________ for
creating a new file of logically
selected records.
Extraction
Recording
Which is the correct types of Field
checks on input data ?
Missing data
Blank data
Which is the major points to be
consider with respect to System
tests ?
To ensure the input
data is valid before
entering the value
Test whether the
overall system
meet the
requirement
specifications
In Data analysis techniques, which
law is used to idenfity statistical
report on numeric data ?
Bend Law
Benjamin law
Which is not a feature of File
reorganization with an auditor
perspective?
Filtering
Sorting
What do you understand by the
term, “Data Consistency” in using
CAATs?
Establish relationship
between two or more
tables as required.
Identify fields,
which have null
values.
Functions involving use of arithmetic
operators, which enable performing
re-computations and re-performance
of results is an example of?
Statistical function
Arithmetic function
Which of the following is a benefit of File an FIR based on
using CAATs?
audit finding
Identify an audit
finding w.r.t.
materiality in an IT
environment
What is step by step procedure for
using Bendford's law function in
IDEA ?
Data->Benford's Law
Analysis>Benford's Law
A Benford's Law analysis is most
effective on data________________.
Comprised of similar Without built-in
sized values for similar minimum and
phenomena.
maximum values.
In IDEA, blank value data can be
extracted by using_________.
@isblank()
as Null
In IDEA, Summarization, Pivot Table,
Stratify, Duplicate Key functions
comes under which menu.
Data
Analysis
In IDEA, Extraction, Sort, Indices,
Search functions comes under which
menu.
Analysis
View
_______ is centralized Banking
Application Software.
Core Banking System
Core Banking
Solution
Flexcube developed by ________
Infosys
HCL Technologies
Quarz developed by ____
Infosys
HCL Technologies
The server is a sophisticated
computer that accepts service
requests from different machines
which are called__________
Clients
Customers
__________ server has to be a
powerful and robust system as it has
to perform all the core banking
operations.
Antivirus Server
ATMS stands for_________
Automatic Telephone
Machine
Application Server
Automated Teller
Machine Server
IBAS stands for ___________
Internet Business
Application Server
Internet Banking
Application Server
PBF stands for________
Positive Balance File
Post Balance File
Internet banking refers to a banking
transactions routed through the
________
Bank
Internet
CPPD Stands for ______________.
Computerized
Computer Planning
Planning and Policy
and plant department Department
The _________ is generally a
hardware and it plays the role of
preventing unauthorized access.
Date base Server
Web server
_________has several components
which have been designed to meet
the demands of the banking
industry.
CBS
CSB
________enable data transmission
over different networks.
Switches
Firewall
_________have many ports that are
connected to different systems and
it facilitates data transmission with
the network.
Router
Switches
A Proxy server always acts in
conjunction with a _________.
Firewall
Internet
The ________ provides network
security by preventing malicious
data from entering the network.
ATM Server
Proxy Server
_________is used for authentication.
System audit
system
administration
Access to a set of servers is
controlled by the ________.
System audit
system
administration
________is a process of unauthorized Data base
entering a network.
administration
Hacking
____________ facility provides a
customer to access financial
transactions in a public place.
Automatic tele
Machine
Automated Teller
Machine
Which is the Function of ATM?
Cash Withdrawal
Balance Inquiry
Every bank branch should
madatorily have a security policy.
FALSE
TRUE
Core Banking Solutions is a
combination of an application
software and ________
Network devices
Firewall
The Operational Controls include
controls on ___________
Physical Access
Logical Access
Application Controls are broadly
classified into __________________
Input Controls
Output Controls
__________controls check that the
data entered is complete and
correct.
Input Controls
Output Controls
Reasonableness check is a _________. Processing Controls
Input Controls
Which of the following is not a
module of the CBS?
Customer ID
generation
Accounts
management
Bank guarantees can be
__________________________
Performance
Guarantee
Deferred Payment
Guarantee
SLR stands for
________________________________
Statutory Liquidified
Ratio
Statutory Liquidity
Ratio
________are record of activities that
have taken place in the system
irrespective of the modules.
Logs
Index
The contents of a log includes
_____________________
Activity performed
User details
Communication and Operations
management must include which
policies?
E-mail policy
Firewall security
policy
______ is a large data housing
infrastructure that provides high
band width access to its clients.
ATM Server
Data Centre
Logs of the various activities in CBS
can be deleted immediately and
also be accessed by anybody.
TRUE
FALSE
CRR stands for
_________________________ in terms of
CBS.
Cash Reserve Ratio
Community
Reserve Ratio
Does the IS Audit also include audit
of the outsourcing activites carried
out in the CBS system?
Yes
No
DRP stands for
___________________________ in terms Disaster Recovery
of CBS.
Planning
Discovered
Resources Planning
_____________are soultions applied
when any kind of vulnerabilities
discovered in networks in the CBS
system.
Logs
Patches
__________can be viewed only by the
DBA of an organisation.
Access Rights Logs
Database Log
Is performing periodic vulnerability
assessment of the networks is
necessary?
No
Yes
KYC stands for
_________________________________ in
terms banking.
Know Your Customer
Know Your
Company
In CBS, the Accounts Management
module deals with
_____________________
Creation of Savings
Account
Creation of Current
Account
Soft copy of the ATM journal rolls is
called_____________
Stock Journal
Journal Report
Data centre servers are known
as_____________.
Application servers
Data Base Servers
The ATM switch consists of a
_____________________
computer
server
_______________testing should be
done to check the unauthorised
access to the network in CBS.
Penetration
Hierarchical
_________enables transfer of money
from one bank to another in "Real
time" and on "Gross" basis.
EFT
NEFT
In _______system money transfers
are done on a one to one basis while
in _______system transfer is done in
batches.
NEFT, RTGS
RTGS,NEFT
All the money transfers take place in
the books of the _________________
Beneficiary bank
Central bank(RBI)
EFT and NEFT work on
_______________basis
HSM
DNS
________system of money transfer is
primarily used for large transactions. NEFT
RTGS
In RTGS, the STP generates an
___________for every outbound RTGS
transaction.
UTN
UTE
UTR full form
_________________________________ in Unique Transaction
terms of CBS.
Reference
Unidentified
Transaction
Reference
STP stands for
________________________________ in
terms of CBS.
Straight Through
Processing
Straight Temporary
Processing
________ is a method of creating
virtual networks within a physical
network.
VLAN
LAN
CMS stands for
______________________________ in
terms of CBS.
Control Management
System
Cash Management
System
Systems audit are
Audit of internal
important for the
Which of the following statements is controls is not needed verification of the
true?
at all
internal controls
The Management Controls does not
include ___________
Managing of Assets
Formulating a
security policy
_______is supported by advanced
technology infrastructure and has
high standards of business
functionality.
Firewall
Internet banking
CBS Software resides in a Central
application server which is located
in the ___________
ATM Data centre
Middleware
A________ that runs the core banking
solutions (CBS) and is centrally
accessed by the branches.
ATM Server
Central Application
Server
The _________of the application is
capable of only entering the data at
the end point that is branches.
System version
Application Version
The application server would be
placed in a trusted inside zone in a
separate ____________
Virtual Local Area
Network
Local Area Network
Application software would access
the ________
Data base server
ATM DATA Server
__________ are capable of being
connected only when devices are
connected to a switch.
LAN
Virtual Networks
Data communication between ______
VLANs can be controlled as per
business requirements.
1
2
A special feature of STP is that
_____________ number for any
outbound RTGS transaction is
generated by the STP System.
PIN NO
Unique Transation
Referrence
_____________refers to the process of
developing software which would
produce the required output from
the input provided of course, using
the necessary hardware and
Application
communication systems.
Development
Software
Development
The______________is essential to
ensure that computer security
records are stored in sufficient detail
for appropriate period of time.
Review Management
RTGS
is a legal attempt at
Which of the following is “False“ in gaining access to
case of penetration testing in an IT protected computer
environment of CBS?
systems or networks.
Ensure
recoverability of
data in case of
system failure.
Which of the following is erroneous
statement in case of Change
Management Control?
Well documented
Unit test, system test, process should be
integration test – all
there incorporating
should be carried out. all the changes.
With respect to the customer
changing the Pin at the ATM which Old offset value used
procedure is the ”false“ procedure? to derive new PIN.
Old Pin verified
using HSM/SSM.
IN CBS, changes to the application
server are not made directly to it,
instead done first on a __________
Validate server
Trail server
All the various servers in the central
data centre are seggregated
through _______
LANs
VLANs
The __________ is a complete process
in the computer so that it ensures
that data that is fed in conforms to
certain prerequisite conditions.
Consalidation
Password Policy
When the central Data base is busy
with central end of day activities or
for any other reason, the file
containing the account balance of
the customer is sent to the ATM
switch. Such a file is called
__________
Positive Balance File
Application Server
Bank mate is developed by the
_______
HCL Technologies
Infosys
The IBDS is located in a ____________ Militarised zone
City Zone
The main components of Internet
Banking system consist of __________ Web server
IBAS
Copy of the Anti Virus Software was
updated promptly and regularly at
the Data Centre and pushed into all
of the servers and in all the systems
in the branches by ________
Hacking Method
Push-pull method
The __________which is also residing
in the server at the branch actually
does the banking operations.
Sytem software
utility software
In Core Banking concept all the
systems of the bank are connected
to the Central office by means of a
connectivity which may be either a
_________ or a dial up line.
Leased line
local line
The ________ is generated by the
software and directly sent to
equipment for printed the Pin Mailer. 16 digit number
Personal
Identification
Number
____________would also include the
existence of built in controls in the
system to ensure proper processing
of input data so as to provide the
required output.
Output Control
Input control
____________refers to an
arrangement wherein the issuing
bank acts on the request and
instructions of a customer.
Letter of Tax
Letter of Credit
_______________ is a process by which
the bank ensures the maintenance Business Recovery
and recovery of operations.
Planning
Business
Continuity Planning
At which phase of testing the
version of software is called “ beta
version”?
Programmer testing
User testing
Finacle developed by _________
Infosys
HCL Technologies
In an Organization structure of IT
Department which of the following
function is incompatible?
Network
Database
administrator and
Administrator and
Database
Security Administrator. Administrator.
The number that is stored in the
ATM switch is the difference of which
of the following number?
Pin No - offset value
The information retrieval of
transactions taking place at ATM
located at remote locations is
through _________
Offset value - Pin
No
Soft copy of Electronic Hard copy of
journal
Electronic Journal
The number that is generated as
soon as the customer inserts the
card in the ATM machine is
__________
Offset value
Pin sent to
customer
Which is not a Database
management system.
Unix
Oracle
The data can be entered into a table
in the ____________ view.
Design
Datasheet
MS Access provide__________
datatype to create link to a web
page,file,or email address.
Hyperlink
Link
Set as database
To make a switchboard appear while startup Option in
opening the database.
Access Option
Set as Form
startup Option in
Access Option
To add or delete buttons to
Switchboard, which option is used
in Switchboard Manager is used.
Edit Option
Add Option
The Switchboard Manager is a dialog
box that allows creating a
switchboard for an Access database. TRUE
FALSE
A macro can automate data entry in
Access 2010.
FALSE
TRUE
Which of the following data-type is
not available in MS-ACCESS
Number
Text
The validation can be defined
at____________ level in Access 2010 Table
Form
A macro can be attached to an
event of a
control_________________________.
A form
A report
How to add switchboard in Access
2010?
Click->File tabClick->File tab>Option Button>Option Button>Command not in
>Quick Access Toolbar- Ribbon>Command not in
>Switchboard
Ribbon->Switchboard Manager->AddManager->Add->OK
>OK
The command Design Application
performed action____________ on
switchboard.
Close the current
database
Opens a secondary
switchboard.
In a Query the data can be sorted
based
Single column
Multiple columns
Switchboard Manager only allows a
maximum of __________command
buttons on a switchboard
Nine
Eight
MS Access 2010 provides a
__________pane that contained large
list of actions to be chosen,enabling
a wide range of commands that can
be performed
Action List
Action Catalog
SQL is considered to be a __________ 2GL
3GL
Which action in MS Access macro
applies a fliter or query to a
table,form or report.
DoFilter
FindFilter
Opens a query in the Datasheet
view, Design view, or Print Preview
which macro action used in MS
Access.
OpenQuery
ShowQuery
Among +, <>, MOD, AND, <=
operator which operator has the
highest priority.
+
MOD
The Strcomp() function is
a__________type function.
Math
Financial
The SGN() function is a ____________
type function
Math
Financial
Which of the following symbol is
used to write a sub query
()
[]
For the Non-Aggregate Total field,
the criteria can only be specified
using the Where clause.
TRUE
FALSE
When you create a field using text
data type in MS Access 2010, by
default field will have ____ character. 255
256
To export an access table to an XML Right-click the table
File, which of the below steps must and select Export
be followed?
->XML
Go to External
Data ->Export,
click on More and
select XML
If we are using the same table for
No need to
main query and sub-query,we need Alternate names to the alternate name to
to provide___________.
tables
the tables
Update Query can be used to
update_________ in MS Access 2010. Single Record
More than 1 record
Delete Query can be used to delete Single Record
More than 1 record
How many Primary key constraints
can create in a table______.
Two
Only one
Unmatched Query can help to find
records that have no corresponding
reord in other tables.
FALSE
TRUE
MS Access 2010 provides queries
that can be used for obtaining the
aggregated results instead of
individual records are____________.
Count()
Sum()
A function that Counts the set of
values that satisfy the given criteria
in MS Access 2010 is___________.
CountA()
Count()
The _________ operator is used to
find the null records in a table.
"= NULL"
NULL
Aggreagate Query also known
as___________.
Group By queries
Total query
Which Query wizard is used to find
repeated records in a table?
Simple Query Wizard
Duplicate Query
Wizard
Append Query is used to
______________ in a table in MS
Access.
Add Records
Delete Records
Which type of joins not available in
Access 2010?
Inner join
Left outer join
A join returns only those rows from
both tables that match on the
joining field is___________ in MS
Access 2010.
Inner join
Left outer join
The query returns all of the rows
from left table, and also those rows
from the right table that is known
as____________.
Right outer join
Left outer join
The query using ___________ returns
all the rows from right table, and
also those rows from the left table
that share a common value on both
sides of join.
Right outer join
Left outer join
How can we add a table to the
Query Design window_________?
Select Create-> Add
Table
Select Database
Tools-> Add Table
___________can be considered a
questions in a data base.
Queries
Form
Operands can be_________ in MS
Access 2010.
Literals
Identifiers
When you create relationship
between two tables, the Common
field's data type should be
Text & Number
Number & Text
In example "Hello"+" " +" everyone"
,hello is _____
Text Literal
Date Literal
Length("Ms Access") will return the
count of charcters is __________.
8
9
AND ,OR is a kind of ________ in MSAccess 2010.
Arithmetic
Logical
Comparision operators is also known
as_______ in MS-Access 2010.
Arithmetic
Logical
LIKE operator works with______in MS
Access 2010.
Text
Date
To find the null
IN operator is used __________ in MS To match the value to records of given
Access 2010.
a set of values
table
Operator precedence is similar to
_____ that is follwed in Algebra in
MS-Access 2010.
BODMAS
Text files that are organized properly
fall into one of two types
are__________
Delimited files
BOMDAS
Fixed-width files
To create an unmatched Query using
wizard, minimum required number
of table or fields is_________.
one
two
While creating the query, the
criteria can be set in
Only one
More than One
Field
SQL stands for____________________.
Sub Query Language
Structured Query
Language
In MS Access query which logical
operator returns True if both the
expressions compared are true.
IF AND
AND
In MS Access query which logical
operator returns True if either of the
expressions compared are true.
OR
IF OR
Enfore Referencial Integrity option is
used to restrict enerting data in
Parent Table
Child Table
In MS Access left("Access",3)
function will return__________.
Acc3
Acc
Which function is used to converts
the text to lower case in MS Access
2010.
Lcase()
Lowercase()
Which function is used to remove
leading or trailing spaces in a text in
MS Access 2010.
Remove()
Removetext()
_____________ is contains a set of
predefined functions in MS Acccess
and helps build complex expression. Expression Design
Expression Builder
Which of the following is a Database
Software
Excel
Outlook
Each Table row
represents a twodimensional structure
Which of the following is not the
composed of rows and
characteristics of a Relational Table? columns
Each row/column
intersection
represents a single
data value
Which record will be retrieved if the All values less or more Value less than 95
query criteria is < #1/1/11#?
than 1,195
characters
MS Acces 2010 reads and writes to
the .accdb file format in chunks also
known as_____________.
Pages
Encrypt pages
The tab in Expression Builder in
which we write expressions is known
as _____________.
Expression Elements
Operator Button
The criteria expression LIKE?B*.
Will match all text
starting from B
Will match all text
ending from B
__________ queries are useful for
summarizing information, and are
somewhat similar to pivot tables in
MS-Excel.
Select query
Crosstab query
While entering record in Datasheet
view, in which order the records can
be entered
Alphabetical Order
At the end of the
table
When you delete the record in form,
it deletes the record from__________. Form only
Form but not in
table
Having clause is used in the
aggregate query in MS Access 2010 FALSE
TRUE
The controls that are not linked to
any field of the table or query on the
form are known as ________.
ActiveX control
Unbounded
Controls
Which property of the form can be
used to insert a background image
in MS Access 2010?
Caption
Background
___________ is a report that is
inserted in another report in MS
Access 2010.
Inner-Report
Sub-Report
A bound main report is based on a
______________ and its _____________
contain realted information.
Table or query,InnerReport
Table or
query,Main-Report
DDL stands for ____________
Data Definition
Language
Data Defined
Language
A___________used to compare
multiple values of categories or
differences over a period of time.
Pie Chart
Area Chart
A________used to compare trends
over a period of time.
Pie Chart
Line Chart
To create a read-only copy of the
database, which of the following file
format can be used?
.ACCDB
.ACCDE
The database administrator created
a split database and created a frontend database and back-end
database file.Which of the file
should be stored on the server ?
Front-end database
Back-end database
To make database package and
digitally sign using which option in
Access 2010 ?
File->New->Save
Database as>Package and sign
File->Save&Publish>Save Database as>Package and sign
In which formats can the Collect
Data through email message feature
can send the data entry form?
HTML and InfoPath
Access Forms
Once a mail is sent using the collect
data through email message feature
in Access 2010. The mail status can
be checked using________________.
Export to Outlook
Options in Tool
menu of Access
The ___________ type of data cannot
be collected using Collect data
through email messages.
Text
Number
What is the memo data type field
used for?
To store objects
created in other
programs
To add table
Those records that
The filter By selection feature allows match an entity in a
you to filter:
field
Records based on a
criterion you
specify
DML stands for _____________
Detailed Maintaining
Language
Data Maintaining
Language
Which editor was provided for use
with Access Basic?
The Visual Basic 1.0
editor
Notepad
How do you update Pivot Table
Save your changes,
report data after changes are made close the workbook,
to the source data?
and then reopen it.
Select the Pivot
Table worksheet
and press F9 on
the keyboard
What are the different views to
display a Table ?
Design View
Datasheet View
Which Of The Following Creates A
Drop Down List Of Values To Choose
From?
Ole Object
Hyperlink
A __________ Enables You To View
Data From A Table Based On A
Specific Criterion
Query
Form
The Database Language That Allows
You To Access Or Maintain Data In A
Database
DCL
DML
Insert, Update Or
DCL Provides Commands To Perform Change The Structure Delete Records
Actions Like
Of Tables
And Data Values
Which is not a Database Model ?
Network Database
Model
Relational
Database Model
Which Of The Field Has Width 8
Bytes?
Memo
Number
This Is The Stage In Database
Design Where One Gathers And List
All The Necessary Fields For The
Database Project.
Data Definition
Data Refinement
Whenever a tables gets update, the
dependent query will
Not update
update
automatically
The Third Stage In Designing A
Database Is When We Analyze Our
Tables More Closely And Create A
___________ Between Tables
Relationship
Join
What is the purpose of the
Switchboard Manager in Microsoft
Access 2010?
To build a main
Creates the macros
switchboard form that used to program
controls all other
an automatic
forms.
application.
How does a query-based report
differ in design to a report based on The reports are
just one table?
restricted in size.
It doesn’t
How would you include some plain
text into a mailing label report?
Type the text directly
into the label.
Use the > button.
In a Microsoft Access 2010 report,
the page numbering would most
likely be placed into the:
Report Footer
Section Header
If you wished to present a
professionally looking form on
screen that would show all the
necessary information, which of the
following form design tools would
you most likely use?
Pivot Table
Pivot Chart
What are the benefits of an ACCDE
file__________________________ in
Access
Reduces the size of
the database
Optimizes memory
usage and
improves
performance.
An .ACCDE file is a ___________
version of the original .ACCDB file.
Fixed-down
Locked-down
Which type of the query is used to
accept the value from the user while
executing the query and fetch
records accordingly
Make Table Query
Update Query
To encrypt the databse in Access
2010 must be opened in the
__________________.
Open Inclusive
mode
Open Secure mode
To extract the records based on date
field, which of the symbol should be
used
$
#
FIX() is a kind of ____ function in MSAccess 2010.
Math
Date
MS-Access 2010 has added new
features of ______ to eliminate the
need of VBA code
Macro
Form
Encrypting a database does not
restrict access to database objects,
but to __________ the database.
Open
Modify
The setting for the Security option
can be handled
using_______________________ in
Access 2010.
File Tab ->New
Options, and selecting
the Trust Centre tab
from the Access
Option window
File Tab ->Access
Options, and
selecting the Trust
Centre tab from
the Access Option
window
Third Party Encryption Technology
can also be applied to the database
of Microsoft Access 2010.
TRUE
FALSE
To create a split database in MS
Access 2010 go to which tab?
Create Tab
External Tab
After spliting database,frontend
database holds_________________.
Forms
Query
After spliting database,backend
database holds_________________.
Tables
Forms
When an Access database is split, it A back-end database
creates two files_________________.
& front-end database
A new database &
Old database.
A Data Access Page is a special type
of _________ that allows users to
interface with database using
Internet Explorer.
XML page
HTML Page
An _____________ is a group of people
with a common goal, having certain
resources at its disposal to achieve
the common goal.
Company
Enterprise
______________ can be defined as
subject-oriented, integrated, timevariant, non-volatile collections of
data used to support analytical
decision making.
Data Warehouses
Data Models
________________ databases contain
detailed data that is needed to
satisfy processing requirements but
which has no relevance to
management or analysis.
Operational
Non-Operational
Data in the Data Warehouse is
______________ , not ____________.
Dynamic, Static
Non-Volatile, Static
____________ data contains an
historical perspective that is not
generally used by the _____________
systems.
Operational,
Informational
Operational, Static
The definition of data elements in
the data warehouse and in the data
sources and the transformation rules
that relate them, are referred to as
___________.
Masterdata
Detaileddata
Data warehouses are not the
optimal environment for ____________
data.
Structured
Unstructured
Maintenance Costs are high for Data
Warehousing.
TRUE
FALSE
Data Warehousing can be used for
___________________.
Credit Card Churn
Analysis
Insurance Fraud
Analysis
_________________ is the process of
extracting patterns from data.
Data Analysis
Data Warehousing
___________________ is an approach to
quickly answer multi-dimensional
Business Processing
analytical queries.
Management
Online Analytical
Processing
________________ include money,
manpower, materials, machines,
technologies etc.
Costing
Production
The Output of an OLAP query is
typically displayed in a ___________
format.
Matrix
Columnar
______________ companies is planning
to support tens of millions of
customers with just hundreds of
employees.
B2B
B2C
Which of the following is the
limitation of Open Source ERP?
Increased
Complexities
Legal Complexities
Which of the following is not an
Open ERP software?
Openbravo
SQL-Ledger
_____ is the process of integrating all
the business functions and
processes in an organization to
achieve numerous benefits.
EDI
ERP
________ must consider the
fundamental issues of system
integration by analyzing the
organization's vision and corporate
objectives.
Manager
Auditor
The more the number of __________,
the longer the implementation time. modules
process
Customization of ERP systems is one
of the major challenges in auditing
ERP security.
TRUE
FALSE
Tally.ERP 9 provides graphical
analysis of data which helps the
user to perform deeper analysis.
FALSE
TRUE
The user can ________ the company
data into multiple companies as per
financial periods required.
Import
Export
___________ is a collection of
activities that make one or more
kinds of input and creates an output
that is of value to the customer.
Business Model
Business Function
E-Filing of Returns refers to the
process of electronically filing your
tax returns through the ___________. Intranet
Internet
Tally.ERP 9 does not allows you to
export the ETDS forms in NSDL
compliant formats as well as
facilitates printing of TDS Forms in
Physical Form.
TRUE
FALSE
Tally.ERP 9 offers a data encryption
option called _______________.
Tally Data Encryption
Tally Data
Encoding
___________________ is the process of
exchanging Tally.ERP 9 data
between two or more locations.
Serialization
Randomization
The Tally website offers
_______________, by which a user can
communicate with a Tally
representative and get required
information.
Tally Forum
Tally FAQ
Tally.NET use _______________ for
centralised Account Management.
Control Centre
Data Centre
The data is transferred between the
remote location and the server
using a secured mechanism called
__________________.
Encoding
Decoding
Sales Tax Ledger falls under which
Group?
Indirect Expenses
Duties and Taxes
Alias represents ___________ in
Tally.ERP9.
Short name
Nickname
If we purchase any Fixed asset in
credit, we can pass it from _________. Payment mode
Receipt mode
Information systems can be
designed so that accurate and
timely data are shared between
functional areas. These systems are
Isolated
called
Integrated Information Information
_______________________________.
Systems
Systems
To save entry without any amount,
we have to use _____________.
Cost Center
Maintain Multiple
godown
Transfer of materials from one
godown to another godown, use
______________.
Manufacturing Journal Stock Journal
While exporting Ledgers from Tally
to Web Page, we use _________.
XML Format
ASCII Format
Budget represents
_______________________.
Estimation
Forecasting
In Service tax Credit Adjustment (%)
should be either ____________.
0.2
1
Service Tax Report can be seen from
_________________.
Display > Day Book
Display > Account
Books
Can we allow Expenses/Fixed Assets
in Purchase vouchers?
Yes
No
Transfer from Main Cash to Petty
Cash we require to pass _______
voucher.
Contra
Payment
Income Tax number of the Company
will appear in which report?
Cash/Bank Book
Profit and Loss A/c
A business model is not a
___________ model.
mathematical
system
The approach to ERP is to first
develop a ______________ comprising
the business processes or activities
that are the essence of a business. Business Model
Business Function
OLAP systems use concept of OLAP
cube called a ______________ cube
single dimensional
hyper dimensional
The data which is to be exported
from Tally.ERP 9 can be in ________
format.
XML
HTML
In Tally ERP-9 Remote Access is also
known as __________.
Networking
VB.Net
Accessing data store on a remote
location using Internet in Tally.ERP9
is called____________.
Local Data
Remote Data
Tally.ERP9 can be classified user in
two categories are___________.
Local User
Remote User
Which of the following is not a
predefined security level provided
by Tally.ERP 9?
Owner
Public User
The business model is represented
in the graphical form using
______________ and ________________
charts, pictures
smart art, clip art
Which of the following is/are the
data warehousing activity?
Defining the
Identifying and
correct level of
prioritizing subject
summarization to
areas to be included in support business
the Data Warehouse
decision making
___________________ is the succession
of strategies used by management
as a product goes through its life
Business Processing
cycle.
Management
Online Analytical
Processing
_______ integrates supply and
demand mangement within and
across companies.
BPM
SCM
OLAP stands for _________________.
Online Analysis
Processing
Online Analytical
Processing
__________ includes transportation
from Suppliers and receiving
inventory.
Inbound Operations
Outbound
Operations
Which of the following is not the
service area of SCM?
Logistics
Asset Management
Which step of the ERP
implementation involves, educating
and recruiting end users throughtout
the implementation process?
Step 1
Step 2
The system ____________ process will
address issues such as software
configuration, hardware acquisition
and software testing.
implementation
upgradation
A __________________ review is
recommended to ensure that all
business objectives established
during the planning phase are
achieved.
under process
review
pre implementation
In _________________ stages, auditors
have access to rudimentary ERP
tools and capabilities for auditing
security configurations.
post implementation
Immediate posting and updation of
books of accounts as soon as the
transactions are entered. This is
called as __________
pre
implementation
Immediate
Interactive Processing Processing
Which of the following ETDS forms
are available in Tally.ERP 9?
Form 26, Annexure to Form 27, Annexure
26
to 27
The exported eTDS file from
Tally.ERP 9 can be validated through
NSDL's freely downloadable utility
File Validation
called __________________
File Validation Program Utility
ERP systems provide an access to
the__________ data
integrated
distributed
________________ is a tool that refers
to skills, processes, technologies,
applications and practices used to
facilitate better, accurate and
quicker decision making.
Data Warehousing
Data Modeling
Business intelligence systems are
________ Decision Support Systems.
information driven
data-driven
Data warehousing technology is the
process of creating and utilizing the
company’s __________
general data
historical data
The data in the Warehouse comes
from the _________ environment and
external sources.
operational
backup
In essence, SCM integrates
___________ management within and
across companies.
supply and demand
supply and chain
_____________ including all fulfillment
activities, warehousing and
transportation to customers.
Inbound operations
outbound
operations
Customer Relationship Management
is a ________________ level strategy. business
corporate
Operational CRM provides support to
___________ business processes.
front office
back office
Collaborative ______ ultimate goal is
to use information collected by all
departments to improve the quality
of services provided by the
company.
CRM's
ERP
Tally.ERP 9 follows the DES
__________ method to safeguard the
data.
encryption
decryption
Business Intelligence Systems are
data-driven ___________________.
Information Systems
Integrated
Information
Systems
With ______________ technology the
characters are reduced in breadth
and user is allowed to input
additional characters which would
make the account name, entity
complete and readable.
Tally Fix
Tally Adjust
In Tally.ERP 9 __________________
provides the user with administrator
rights and the capability to check
the entries made by the authorised
users and alter these entries, if
necessary.
User-defined Security
HTTP-XML based
data interchange
__________________ is an enabling
framework which establishes a
connection through which the
remote user can access the Client's
data without copying/transferring
Direct Web Browser
the data.
Access
Web Publishing
If we want the company to be
connected automatically for remote
access on load, the property
Allow to Connect
__________ needs to be set it as Yes. Company
Contact On Load
___________________ technology is the
process of creating and utilizing the
company's historical data.
Data Warehousing
Data Modeling
Is there a fixed qualification for
internal auditor_________.
TRUE
FALSE
Which of the following will not
appear in the home page of K-Doc?
Powerpoint
Word
To change an email header so that
the message appears to have
originated from someone or
somewhere other than the actual
source is known as___________.
Email middle attack.
Email Spoofing.
To playfully satirize a website is
known as_____________.
Web tapping
Web Interception
_________is the complete package to
manage the billing requirements of
a CA firm on cash system of
accounting.
Payroll
eSecretary
Which of the following is not a/an
feature of eSecretary?
Contact Management
Greeting
Management
Annual return preparation can be
done using ________.
ICAI-ROC application
K-DOC application
________is correspondence
automation & management software
that is seamlessly integrated with
Microsoft Office.
K-DOC application
eSecretary
________ is an independent,objective
assurance and consulting activity
designed to add value and improve
an organization's operations.
Statutory audit
Tax audit
Which of the following is/are the
main purpose of the internal audit?
Operations of the
organization
Financial reporting
As per _____________of the Income
tax Act,every person carrying on
business or profession is requires to
get his accounts audited by a CA
before the "specified date".
Section 45
Section 44AD
__________________ refers to use
software/applications to
automatically perform tasks such as
accounting,preparing trial balance,
financial statements etc. and
electronically transmit data or
information using internet..
ERP
Office automation
FEMA Stands for _______________.
Foreign Exports
Management Act
Financial
Enterprise
Management Act
Which application helps the
management to allocate the
revenue to the credit of the right
employee who identified the
opportunity?
Resource allocation
and scheduling
Knowledge
management
Who has full privileges in the
financial accounting application?
Database
administrator
Account
administrator
_________is the centre point of the
financial accounting application as
any transactions having financial
impact carried out in any other
module will reflect in this module.
AP module
GL module
In Financial Accounting
Application,the transactions flow
from GL (General ledger) to other
modules.
TRUE
FALSE
Which of the functionalities is not
provided in the purchasing module
Receipts of goods
of Financial Accounting Application. Evaluation of Vendors or service
In Financial Accounting
Application,automatic sequence
number of documents control is not
required in which of the following
module?
Purchasing
Accounts Payable
Which module of Financial
Accounting Application can be used
for assigning credit limit to
customers?
Purchasing
Sales
Which of these will trigger/alert for
timely payment ?
Accounts
Receivable
Accounts Payable
We can manage interviews,offers
and job vacancies by using which of Resource allocation
the application?
and scheduling
________,___________,__________ are
commonly referred to as CIA in
information security parlance.
Confidentiality,Inte
Confidentiality,Integrit grity and
y and Availability
Authentication
___________provides information
about updation of project cost based
on time spent by employees on
Performance
various projects.
management system
Which of the follwing is not a/an
functionality provided by PMS?
HR and Payroll
applications
HR management
system
Employee
Capture the Key
designation and
Performance Indicators reporting structure
___________automates the
calculation of salary for taking
inputs from the timesheet
application, leaves from Leave
Management System and salary
details from the HR master data.
Timesheet System
HR management
System
Which of the follwing is not a control Reduce administrative
in Leave Management System?
burden on HR
Excess leave
Permanent Audit File are obtained
once but updated on
__________basis.
In Permanent Audit file, _______ is
not the key data documented.
half-yearly
yearly
Organization chart
Client’s accounting
manual
The Document Management Sytem
offers the features___________.
Role based access
Complete audit
trail
________is a type of training in which
user logon on the training server
with a user ID and password.
Internal Training
E-Learning
In some cases, trainee is supposed
to appear for the examination/test
at the end of the training
is____________.
E-Learning
Classroom Training
________ are the
hardware/infrastructure equipments
used in a CA firm.
PC
Application Server
_____________means information
available in the organization should
not be altered or modified by
unauthorized personnel.
Confidentiality
Integrity
Which of these is/are the standard
email program used in an
organization?
Microsoft Exchange
Lotus Notes
Which of the following is not a
characteristics of WAN?
Most WANs are owned Compared to LAN,
by only one
its transmission
organization.
speed is low
_________is protection of information
assets from threats to preserve their
value.
Confidentiality
Integrity
Which types of information assets
need to be secured in a CA Office?
Client data
Own data
The extent and level of _________
would depend on the nature of
information.
Availability
Confidentiality
__________ of information might be
affected due to denial of service
attack or some other reasons.
Integrity
Authentication
__________means the sender cannot
deny having sent a message and
receiver cannot deny receiving the
message.
Non-Repudiation
Integrity
Risk may not be _______ in nature.
reputational
financial
The process of identifying an
individual, usually based on user id
and password in an organization is
called______________.
Availability
Authentication
Which of the following is not a
software equipment required in a
CA's office?
Resource allocation
and scheduling
Client
management
Which of the following is not an
application arranged by ICAI?
ICAI-XBRL suite
K-DOC
How many stages are there in the
sales cycle?
2
3
PBX stands for ________
Private Exchange
Branch
Public Exchange
Branch
XML stands for_________
Expansion Markup
Language
Expansion Makeup
Language
VBA stands for_______________ .
Visual Basic for
Applications
Visual Basic for
Applets
Store, structure,
Find the correct sequence in case of Structure, store, and
and transport
XML file, are
transport information. information.
Programming of Macros is done in
programming Language ___________. VBA
ASP.Net
As Bank auditors,Many Banking
applications generate text files in
____________.
Txt format
Csv format
Not Required
Developer
tab>Code>Macro
Security
Macro security is enabling through
__________.
In Excel, Sampling option is
available in ___________ .
Insert
Data Analysis
Requirements for preparation of
cash budget in Excel.
Knowledge of
accounting
Knowledge of
formatting an excel
sheet
ROE stands for __________.
Recall on Equity
Return on Equity
___________ is a statistical procedure
that uses sample evidence and
probability theory to determine
whether a statement about the
value of a population parameter
should be rejected or should not be
rejected.
Confidence Interval
Hypothesis
____________ is a statistical tool used
to create predictive models.
Regression equation
Regression
__________ shows the ability of a
company to pay its current financial
obligations.
Quick Ratio
Current Ratio
Macro enabled workbook file
extension is _______________
.xlsx
.xlsm
___________ shows dependency of a
firm on outside long term finance.
Quick Ratio
Leverage Ratio
To record a Macro in relative
mode,"Üse Realtive References"
available in which tab of excel ?
Developer Tab
View Tab
There are _________ ways to open a
Macro enabled workbook.
3
2
ANOVA stands for___________
Analysis of Value
Analysis of Varity
A function doesn’t require an
argument is___________.
DATE()
TODAY()
In Excel, there are __________
functions for calculation of
depreciation.
4
5
For calculation of
depreciation as per
SLN function used to calculate
Sum of Years Digit
depreciation as per_________________. Method.
For calculation of
depreciation as per
Straight Line
Method.
For calculation of
depreciation as per
SYD function used to calculate
Sum of Years Digit
depreciation as per_________________. Method.
For calculation of
depreciation as per
Straight Line
Method.
For calculation of
depreciation as per
DB function used to calculate
Sum of Years’ Digit
depreciation as per_________________. Method.
For calculation of
depreciation as per
Straight Line
Method.
For calculation of
depreciation as per
DDB function used to calculate
Sum of Years’ Digit
depreciation as per_________________. Method.
For calculation of
depreciation as per
Straight Line
Method.
XML is a ___________
Recommendation.
W1C
W3C
For calculation of
depreciation as per
VDB function used to calculate
Variable Declining
depreciation as per_________________. Balance Method.
For calculation of
depreciation as per
Straight Line
Method.
PV Ratio stands for
_____________________.
Point Volume Ratio
Point Varaiance
Ratio
BEP stands for
__________________________
Break Easy Point
Break Even Point
Data Validation available in which
Tab?
Formulas
Insert
___________function returns value
from a given data range based on
row and column.
VLOOKUP()
HLOOKUP()
Which function categories are not
available in Excel.
Statistical
Engineering
PMT Function is belongs to which
categories of Excel function ?
Text
Logical
NPV stands
for_______________________________
Net Present Value
Net Proper Value
_______function uses a fixed rate to
calculate depreciation
DB
VDB
Which of them is not a Conditional
Operators symbols?
<
</
XML is a language that is very
similar to which language ?
C
HTML
Strings are to be always enclosed in
double quotes when used in a
formula.
TRUE
FALSE
Parentheses are used to change the
order of calculation.
TRUE
FALSE
In Excel the function =Abs(-4)
returns __________.
-4
_______ function returns the
remainder after a number is divided
by a divisor.
DIVISOR()
2^2
MOD()
If User want to display the formulas
Formulas >
rather than the results of the
Formulas > Formula > Formula Auditing >
formulas then choose______________. Show Formulas.
Show Formulas.
_______________ reveal about the
current and future financial
condition of the company.
Report
Which of them is a Intangible
assets?
Goodwill and Patents. Cash and Property.
CR stands for___________________.
Current Ratio
Clear Ratio
QR stands for___________________.
Quick Rate
Quality Ratio
Data
Debt – Equity Ratio =Long term debt
/ Shareholders funds.
TRUE
FALSE
DTD stands for ___________, which is
called XML Schema.
Direct to Direct
Document Type
Definition
ACP stands for _____________.
Average collection
price
Average collection
payment
FATR stands for _____________.
Fixed assets test
Fixed all turnover ratio ratio
A _________ can be a numerical fact. Statistic
Sale
__________ stands for reduction in
value of fixed assets.
Data
Depreciation
Value of fixed assets is generally
reduced over the period of time due
to __________.
Wear & Tear
Change in taste of
people
Profit equals to __________.
Purchase - Total Cost
Sales - Total Cost
Examples of fixed cost are
__________.
Salary of
administrative staff
office rent
Cash budget is prepared for
planning for future as far as
movement of cash is concerned.
TRUE
FALSE
Discounting is not the process of
determining the present value of a
payment or a stream of payments
that is to be received in the future.
TRUE
FALSE
PAN must have ________ characters
only.
8
10
The extension of a XML document is
______________.
(.xsd)
(.xml)
Sample means the units or items
selected for study or consideration
and population means the total set
of data used for selection of
samples.
TRUE
FALSE
_______________ analysis relates
items in the financial statements in
a manner that drives out
performance information about the
company.
Financial ratio
Price
How to restrict to run a macro
automatically when starting
Microsoft Excel?
Hold down the SHIFT
key during start up.
Hold down the
CTRL key during
start up.
Which option allows you to Bold all
the negative values within the
selected cell range?
Zero Formatting
Conditional
Formatting
_____________ allow us to perform
calculations or operations that
would otherwise be too
cumbersome or impossible
altogether.
Cell referencing
functions
Absolute functions
Statistical functions in Excel help to
calculate __________________
Arithmetic Mean
Median
Discounting Factor formula is
___________________
= 1 + (1/r) * n
= n / (1+a) - r
________________ is considered as
non cash expenditure and occupies
a prominent place in Profit & Loss
Account.
Cash Flow
Depreciation
The value which can be realized at
the end of life of fixed asset by
selling it is called _________________
cost
Salvage Value
____________ is prepared for planning
for future as far as movement of
cash is concerned.
Capital Budgeting
Cash budget
To create a XML Map from XML
schema, Go to which Tab in Excel
____________.
Add-Ins
Review
____________ is the process of
determining the present value of a
payment or a stream of payments
that is to be received in the future.
Marginal costing
Capital Budgeting
____________ is one of the core
principals of finance and is the
primary factor used in pricing a
stream of cash flows, such as those
found in a traditional bond or
annuity.
Marginal costing
Discounting
XML schemas in Excel are called
XML _____________.
Maps
Schemas
Excel allows us to use various
functions and even simple
mathematical calculations which can
be used for _____________.
Financial analysis
Equity analysis
Which cell reference show the
reference to other sheet or
reference to other workbook in excel
?
Sheet2!C4
Sheet2{C4}
Which of them is not a Range
References?
A1:A4
$A$1:A4
Interest Coverage Ratio equals to
_________.
EBIT / Debt interest
EIBT / Debt interest
If particular workbook have to open
each time Excel started, where the
workbook should be placed?
AUTOEXEC folder
AUTOSTART folder
If the cell B1 contains the
formula=$A$1, which of the
statement is true ?
There is an
absolute reference
to cell A1.
There is a relative
reference to cell A1
__________ is a computerized
mathematical technique that allows
people to account for risk in
quantitative analysis and decision
making.
Finanical Planning
XML is case-sensitive ?
TRUE
Monte Carlo
Simulation
FALSE
________ is the process of meeting
the financial goals through the
proper management of finances.
Monte Carlo
simulation
Corporate planning
___________ can be defined as the
process of setting the procedures in
the organization for achieving the
Monte Carlo
predefined goals.
Simulation
Corporate Planning
________ shows ability of company to
pay back long term loans along with
interest or other charges from
generation of profit from its
operations.
Debt Assets Ratio
Interest Coverage
Ratio
_____________________is the simplest
method of comparing different
stocks at a point of time to make
investment decisions.
Earnings Per share
Fixed Asset Over
ratio
<?xml
<?xml version="3.0" version="2.0"
The very first line of code of XML file encoding="ISO-8859- encoding="ISOis_____________.
1"?>
8859-1"?>
Every bit of data has to start and
end with an identical tag
<TagName>Data</Tag </TagName>Data
Name>
<TagName>
The exact syntax of PMT function
is________________.
PMT(nper, rate, pv,
[fv], [type])
PMT(rate, nper, pv,
[fv], [type])
The exact syntax of IPMT function
is__________________.
IPMT(rate, nper, pv,
[fv], [type])
IPMT(pv, rate, per,
nper, [fv], [type])
To see the XML Map user must go
______________.
Developer>XML>
Source
Developer> Source
Deletion of XML Map is done
through __________.
Directally Delete
Command
Delete Button
Excel works primarily with ________
types of XML files.
3
2
Method of tax calculations shall
change according to _________.
Annual Income
DOB
EMI stands for ______________.
Easy Monthly
Installment
Equating Monthly
Income
Which function is used to calculate
the principal portion in every
installment ?
IPMT
PPMT
________ is a process used in
statistical analysis in which a
predetermined number of
observations will be taken from a
larger population.
Snowball sampling
Sampling
In __________, Individuals are
selected at regular intervals from a
list of the whole population.
Clustered sampling
Sampling
In ______________ each individual is
chosen entirely by chance and each
member of the population has an
equal chance, or probability, of
being selected.
Snowball sampling
Convenience
sampling
Which method is commonly used in
social sciences when investigating
hard to reach groups?
Quota Sampling
Sampling
__________ are useful for quick
reading and easy understanding,
particularly for top management.
Summary reports
Balance sheet
It is a process in which a business
determines whether projects such as
building a new plant or investing in
a long-term venture are worth
pursuing.
Business Investment
Capital Budgeting
Popular methods of capital
budgeting include _________ and
payback period.
internal rate of
return
discounted cash flow
What is the file extension of Schema
file which contain schema tags ?
(.xml)
(.xsd)
_________ is the value of all future
cash inflows less future cash
outflows as on today.
Working capital
Net present value
___________is the process of defining
and analyzing the dangers to
individuals, businesses and
government agencies posed by
potential natural and human-caused
adverse events.
Sensitivity analysis
Risk analysis
__________ which is used more often,
does not involve numerical
probabilities or predictions of loss.
Sensitivity analysis
Risk analysis
________ are generally used to
present information in a simple and
better way and also be used to
analyse the risk in a better way.
Graphs
Sparklines
It is a technique used to determine
how different values of an
independent variable will impact a
particular dependent variable under
a given set of assumptions.
Decision Tree analysis Sensitivity analysis
_______ involves computing different
reinvestment rates for expected
returns that are reinvested during
the investment horizon.
Scenario analysis
Sensitivity analysis
NPER stands
for______________________________
Total Principal Value
Net Per value
Which function that is used to
calculate the payment for specific
loan terms ____________
SUMIF()
PMT
________helps to break down the
Return on Equity
Du Point Analysis
Return on
Investment
_______ is a common method for
financing property, facilities, and
equipment.
Mortagage
Leasing
These are the basis for analysis by
potential investors, banks etc.
Journal and Ledger
P & L Account and
Journal
The voucher used to record all bank
and cash payments is …..
Credit Note
Contra
The manual option of voucher
numbering leads to…..
Auto numbers
Duplicate number
The Tally audit trail tracks changes
made to vouchers that are …..
less than 30 Days
more than 30 Days old old
The audit functions of attributes
sampling, variables sampling,
stratified sampling are included in
…. functions.
Stratification
Selection
C
D
ANS
command
program
D
numerous alpha
number and alpha
A
size, performance,
cost
input, output,
performance ratios
C
ARPANET
None of the above.
B
PCs
mainframes
D
feed
write
A
multiplexing
multitasking
D
converter
process
D
ram
output
D
non-impact desktop
printers
thermal printers
C
monitor, program,
keyboard, bus
CPU, memory, input
device, output device
D
windows 95
interpreter
B
assembler
coder
B
SQL * plus
all of the above
D
assembler
processor
C
system model
none of the above
C
ROM
Firmware
A
micro computers
none of the above
A
central processing
unit
none of the above
B
non impact printer
none of the above
C
electronic
spreadsheet
none of the above
B
Microsoft exchange none of the above
B
information
none of the above
C
high level language none of the above
B
multiplexing
none of the above
D
bulletin
broadcasting
system
very small
none of the above
none of the above
A
B
intermediate
network
none of the above
B
ftp service
none of the above
A
ARCHIE
none of the above
C
unlimited restore
locator
none of the above
A
command line
none of the above
C
browser
editor
B
ftp
telnet
D
Hyper text transfer
protocol
Hyper text transfer port
C
uucp
none of the above
C
telnet
none of the above
C
transfer
communication
protocol/internet
protocol
none of the above
B
higher type transfer
protocol
none of the above
B
mosaic,gopher
none of the above
B
dns
none of the above
A
hyper text markup
language
none of the above
C
books marks
none of the above
B
animation
none of the above
B
animation,scripts,ex
ecutables
none of the above
A
welcome page
none of the above
B
search engines
none of the above
B
ftp
archive
D
database
channel
B
Graphical interface Graphical Interface
format
format
B
Joint pictures expert Joint pictures
graph
experimental group
A
network
connections
mails
B
text or image
neither text nor image
C
applets
documents
A
MS Internet
Explorer and
Netscape Navigator None of the above
C
intranet
none of the above
B
wan
none of the above
B
packets
none of the above
A
email,file
retrived,internet
tools
none of the above
C
ARPANET
none of the above
B
defensive advanced
research projects
administration net none of the above
C
intranet,extranet
none of the above
A
cooking and dining none of the above
A
Hyper transfer
meta language
Hyper text markup
Language
D
united states &
Russia
none of the above
B
network
none of the above
C
servers
none of the above
C
WAN
none of the above
C
non-digital
none of the above
B
Manipulate/demani
pulate
none of the above
B
Manipulation
none of the above
B
Cable and wires
none of the above
B
Serial line protocol
none of the above
C
Pillar to pillar
protocol
none of the above
B
Accessibility of data
and computer
programs
All of the above
D
Check controls
Input controls
B
Both A and B
Neither A nor B
C
Slab
Digit
C
Field mask
Input mask
A
Overflow
Serial
C
Batch checks
File checks
B
Block batches
Transact batches
A
Transaction type
Sequence check
C
Document totals
Hash totals
D
Batch check
System test
B
Suspense account
Update account
C
Stub test
Top down test
D
Database Analyzers Database code
A
Transaction data
with master
transaction
Module programs with
snapshots
B
Mapping
Tracing
C
Item data
Record data
A
Graph testing
Whitebox testing
A
Test program pack
Test record pack
B
Parallel coding
Parallel simulation
D
Correct lister
Formulate correct
hypotheses
B
Sample audit trails Data audit trails
A
Simple sampling
Demographic sampling
B
File access
File reorganisation
C
Formatting output
Classify data on a criteria D
Statistical
Reporting
C
Limited ability to
determine
Limited ability to Verify
Propensity for Error Processing logic
A
Reading data,
selecting and
analyzing
information
Specific tasks with
original or modified
programs
D
Snapshot
Picture
C
System audit
Concurrent audit
D
Keyboard
Memory
D
1 GB
100 MB
C
Application
development
Data modelling
B
Information model
Logical model
A
64 bits
8 bits
C
Megaflops
Gigaflops
D
Backend processor Terminal processor
A
CAD
CCSIC
B
Memory card
Smart card
D
Value limited scale Very large silicon
ic
integration
A
32 bits
1 k bits
C
MU
CU
B
Program counter
Instruction register
D
Process register
Instruction register
A
SRAM
ROM
B
BIOS memory
ROM memeory
B
Optical memory
Flash memory
D
Thrashing
Paging
C
Cache memory bus Dual interface bus
A
Sound card
Media card
C
AGP
MCA
B
1280*1024
1280*680
C
Pulse
Wavetable
D
Scanner
Pen
B
Resolution
Lines
A
Pixel definition
languages
Page definition lines
B
Soft fonts
Soft settings
C
Dot-pitch
Size
A
Flickers
Size
C
Resolution and
sharpness
Signal and refresh rate
B
Light scan
Light pen
D
Photo-multiplier
tube
Optical sensitive tube
A
Optical
Joystick
B
Tablet
Pen
C
Winchester disk
Jaz disk
C
Spiral
Block
B
MCA
DAT
A
Linear velocity
Helical scan
D
Lomega
Imation
B
Zip disk
Hard disk
A
630 MB
2GB
B
CD-ROM
MO drives
C
Magnetic tape
Magneto-optical drive
C
DAT drives
MO drives
D
Kernel module
I/O module
C
Batch management Data management
A
Virtual memory
storage
Extended storage
C
Dividing
Preemptive
D
Multitasking
Multiprogramming
A
Multitasking
Multithreading
B
Win 2000
professional
Win 2000 advanced
server
C
Format allocation
type
File allocation table
D
Block
Table
B
NTFS
FAT32
B
NTFS
FAT32
C
Start directory
Tree directory
A
Allocation
Partition
B
Level 1
Level 3
C
Doc, xls, wzp
Tar, gz, taz
D
Vertical bar
Control bar
A
Minimize box
Maximize box
B
Dragging
Scrolling
C
Task bar
Command menu
C
Accessories
Favorites
D
Configure drive
partitions
independently
Confirm partition
capacity
A
Restore
Re-copy
C
My Folder
My Directory
B
Notepad
Wordpad
A
Net Drive
Net Watcher
D
Windows
Accessories
Internet Explorer
B
Desktop themes
Desktop icons
C
Hybrid
ASCII
D
Find
Restart
A
Documents
Settings
C
Port-to-Port
connection
Peer-to-Peer talking
A
Deployed access
Service access
B
Pin to Pin
communication
Port to Port Protocol
B
Serial Line Internet
Protocol
Setting Link Inter Protocol C
Indirect access
Dial-up access
D
Internet
Topography
C
Connection company
IC board cost, cable cost, connection data
cost
cost
A
Indirect software
Terminal communicator
B
Protocol
Simulators
A
30-bit address
32-bit address
D
Respond to mails
Delete mails
C
Telnet Control Port
Communication Control
Protocol
B
Sequence numbers Data numbers
C
Host
PC
B
Available FTP
Anonymous FTP
D
Binary File
TEXT file
C
Telnet
Message
C
Both A and B
Neither A nor B
C
Request the Archie
server
Protocol the Archie server A
Archie
Archives
C
Domain name
server
Domain relation server
C
Aaa/bbb/ccc/ddd
Aaa*bbb*ccc*ddd
B
Web
Mail
A
Uniform Resource
Locator
Uniform Reserved Link
C
Chat messaging
Information chatting
A
Line
Dot
B
Lines
Channels
D
Display channels
with at least ten
users
Display line with 10
removed channels
C
Shell accounts
Shell programs
C
Menu
Bookmarks
D
Gopher
Gateway
C
WINNET and
WAISLINK
WINSRC and FTPWAIS
A
SunScript
JavaScript
D
Eventcast
Livemessaging
B
Newsletter
Networkboard
B
Pine and Embedd
Port and Elm
A
#
()
B
Both A and B
Neither A nor B
C
Server
Server
message,command message,command line
line and channels
and channels
C
Java applets
Java objects
C
Net addresses
Web pages
D
Hyperlink
Hypernet
C
Wide maps
Web infos
A
Lynx
Mosaic
B
Web file
Txt file
A
Web creators
Web ports
A
New/Edit page
New/Edit Document
D
Pager
Document
B
Editor window
Form window
C
Both A and B
Neither A nor B
C
WinZip Plus
Webcow
A
File Format
Window Format
B
Excite
Links
Infoseek
Netshark
C
B
Thread
Retriever
B
Web publish
Page publish
C
Nettext
Hyperlimit
A
Lynx
Lycos
D
Image graphs
Image texts
B
Weblinker
Webcaster
B
Both A and B
Neither A nor B
C
Electronic Data
Internetworking
Efficient Data
Interchange
B
Electronic Format
Transfer
Electronic Fund Transfer
D
Value Aided
Networks
Value Enhanced
Networks
A
Negotiation and
servicing
Critical buying
A
Portal
Smart
B
Both A and B
Neither A nor B
C
Presentation Layer Transport Layer
B
Presentation Layer Physical Layer
C
Transport Layer
Network Layer
B
Internet Control
Data Protocol
Single Control Message
Protocol
B
Device programs
Software devices
A
Device Interface
Card
Network Interface Card
D
Server computer
Data computer
C
Combi card
Meta card
C
Electronic Socket
Layer Protocol
Cyber Socket Layer
Protocol
B
Grouped and
summarized
Assets and liability
C
Voucher
Trial Balance
B
P & L Account and
Balance Sheet
Voucher Account and
Balance Sheet
C
Sales
Asset
D
Taxes
Income
A
Nominal accounts
Expense accounts
B
Voucher
Expense
C
Balance sheet and
trial balance
Journal and ledger
D
Credit
Expense
B
Value expense
stock
Value income stock
A
Balance sheet
Asset sheet
C
P & L statement
Suspense accounts
C
Asset or liability
Profit or loss
B
Sundry debtors
Original entry
C
Liabilities
Suppliers
D
Expense side
Payable side
B
Project
Application
B
F12
F11
C
Tally Group
Tally Vault
D
Entry of Tally
Groups of Tally
B
Mercantile
Manufacture
C
Loan assets
Capital assets
B
Journal
Ledgers
D
Revenue nature
Income nature
C
Display
Shift
A
Primary-group
Alter-group
C
Sub-group
Alter-group
B
Alter-group
Multiple
D
General Ledger
master
Journal Ledger master
C
Assets
Loans
D
Voucher
File
C
F10
F11
B
Receipt
Contra
D
Payment
Journals
D
Choice entry mode File entry mode
B
File
Narration
D
Suppliers account,
Purchases account
Buyer's account, Cash
account
A
First of a month
End of a month
C
Sales Note
Payment
D
Current year
Configured date
B
2, 4, 3, 1
3, 4, 2, 1
C
Both A and B
Contra purchase
C
Receipt
Sales
B
Expense Purchases Debit Purchases
A
Stock Journal
Purchase Voucher
C
Debit
Contra
D
Trial balance
Journal
C
P & L reports
Expense reports
B
Net Profit
Net Account
C
Journal book
Day book
D
Data analysis
Transaction analysis
A
Expenses
Loans
B
Voucher date
Previous date
A
Stock flow
Cheque flow
B
On net transactions On net cash flow
C
On net transactions On net cash flow
A
Set company
Alter company
B
Accountant
Administrator
D
Period-less
accounting
Transaction-number
accounting
C
Tally Report
Tally Group
B
Tally.exp
Tally.ole
A
ODBC
MS-XLS
C
Sequence number
Range number
B
more than a day old more than a week old
A
F12
F6
D
XML
All of the above
D
Sort
Filter
B
Both A and B
None of the above
C
B
Relation
Sampling
D
Unix
SOFTCAAT
C
Calculation Editor
Testing Editor
A
Both A and B
File->Select Export ->
Print Report.
C
System validation
All of the above
D
Sampling
Export
D
Print Preiview
Append
B
File->Import as ->
Import to IDEA
File->Select Import ->
Import to IDEA
A
Formulate flaw
hypotheses
All of the above
D
Sequence checking Filter
A
Character Data
All of the above
D
Secondary Key
Composite Key
B
All of the above
None of the above
B
All of the above
None of the above
A
Common record
None of the above
B
A
Compare check
Data check
A
Sign Test
All of the above
D
spreadsheet and
mail merge format
All of the above
D
Un-compare
Randomness
A
On-line dated
checked
Mixed dated checks
A
Both A and B
None of the above
C
Both A and B
None of the above
C
Modelling
Source comparison
B
Model comparison
Exe comparison
A
Off-line Testing
On-line Testing
D
Program Library
All of the above
B
Log Analyzers
Software
Systax level
C
All of the above
None of the above
C
Investigation
Sorting
C
Both type
None of the above
C
To ensure the
entered data is
saved without fail
All of the above
A
Benford Law
British Law
C
Indexing
Linking the identified files A
Identify data, which
are not in
agreement with the Identify whether all fields
regular format.
have valid data.
C
Logical function
Relational function
B
Investigation of
fraud in audit area
To give assurance to
customers about the
performance of the
company
B
Sampling->
Benford's Law
Tools->Benford's Law
B
Without assigned
numbers, such as
bank accounts
numbers and zip
codes and with four
or more digits.
All of the above
D
Null
Is Null
A
Sampling
Relation
B
Relation
Data
D
Complete Banking
Solution
Centralized Banking
Solution
B
TCS
I-Flex
D
TCS
I-Flex
C
Party
IP
A
Web server
Clients Server
B
Auto Machanic
Allow to Machine
B
Internet Banking
Application
software
Internet Business
Authenticatin server
B
Positive Balance File Positive Balance Flex
C
Intranet
Net banking
B
Both A &B
Computer Planning and
Policy Department
D
Proxy
Firewall
D
NEFT
None
A
Routers
Middleware
C
Firewall
Middleware
B
Antivirus
None
A
Date base Server
Web server
B
Domain Controller
Network security
C
Librarian
Domain Controller
D
Routors
Thrashing
B
Automated
Technical Machine
Accelereated Teller
machine
B
Registering
requests for Cheque
book
All the above
D
B
IBAS
IBDS
A
Environmental
Controls
All of the above
D
Processing Controls All of the above
D
Processing Controls All of the above
A
Output Controls
Management Control
B
Equity Share
management
Clearing Module
C
Both A & B
None of the above
C
Standard Liquidity
Ratio
Stable Liquidity Ratio
B
Activity Logs
None of the above
A
Date and Time
All of the above
D
Internet policy
All of the above
D
IT
EDP
B
B
Cash Reversal Ratio Cash Reimbursed Ratio
A
A
Disastrous
Recovery Planning
Disaster Recording
Planning
A
Access Rights
None of the above
A
Operating System
Log
Activity Log
B
A
Know Your
Connection
Know Your Centre
A
Overdraft
All of the above
D
Electronic Journal
All of the above
C
Web server
All the above
D
Both A & B
None of the above
C
Top down
Bottom up
A
RTGS
None of the above
C
EFT,RTGS
None of the above
B
Remitting bank
None of the above
B
SSM
All of the above
A
EFT
All of the above
B
UTR
UTS
C
Unique
Transmission
Reference
None of the above
A
Strict Through
Processing
None of the above
A
WAN
MAN
A
Core Management
System
Centre Management
System
B
Audit of controls in
any banking
environment is
performed using
software audit
None of the above
B
Developing a
business continuity Laying down procedures
planning
for system development A
Core Banking
Solution
Web centre
C
Web centre
Central Office Data
Centre.
D
Database Server
Domain Name Server
B
Client version
Firewall
C
Wide Area Network Personnal Area Network
A
Domain Name
Server
Application Server
A
MAN
WAN
B
3
4
B
Uniform Transaction
Reference
None
C
Server
Development
System Development
D
Log management
Authorized Controller
C
The purpose of the
test is to identify
security
vulnerabilities and
then attempt to
successfully exploit
them.
This is often the most
preferred test as it is an
accurate simulation of
how an outsider/hacker
would see the network
and attempt to break into
it.
B
Implement new/
changed
programme as per
schedule.
It is important that
correct latest version of
programe is used but
version number need not
be changed.
D
Old offset value erased
Natural Pin remains and new offset value
the same.
generated.
A
Test Server
None of the above
C
WANs
MANs
B
protection
Validation
D
Centralised Data
base security
Central Office Data
Centre.
A
TCS
I-Flex
B
State zone
demilitarised zone
D
IBDS
All the above
D
Both A &B
None of the Above
B
Application
Software
Application Server
C
Broadband
None
B
Net transaction ID
NO
ATM No
B
Process Control
Data Control
C
Letter of Payable
Letter of Receible
A
Disaster Recovery
Planning
None
B
(a) & (b) both
None of above
C
TCS
I-Flex
A
Network
Administrator and
Security
Administrator.
Tape Librarian and
database administrator.
B
Pin No - Natural Pin Offset Value - Natural Pin C
Cash register
(a) and (b) both
A
Natural Pin
Card Number
C
Sybase
Foxpro
A
Dataview
All of the Above
B
Insert
Attached
B
Set as Switchboard
startup Option in
Access Option
None of the above
C
Modify Option
B
Build Option
A
B
AlphaNumeric
Date
C
Both A and B
Report
C
A button
All of the above
D
Click->File tab>Option ButtonClick->File tab->>Quick
>Quick Access
Access ToolbarToolbar>Command not in
>Switchboard
Ribbon->Switchboard
Manager->Add->OK Manager->Add->OK
A
Opens the
Switchboard
Manager.
Opens a report in Print
Preview.
C
Both A and B
None of the above
C
Seven
Six
B
Action query
Action Box
B
4GL
None of the above
C
ApplyFilter
UseFilter
C
RunQuery
FindQuery
A
AND
<>
B
Text
Date & Time
C
Text
Date & Time
A
{}
#
B
A
258
128
A
Right-click the table
and select send as
XML
Both A and B
A
Aliases name to the
tables
Both A and C.
D
Both A and B
None of the above
C
Both A and B
None of the above
C
As many
All of the Above
A
B
Avg()
All of the above
D
Countif()
All of the above
B
IS NULL
All of the Above
C
Action query
Both A and B
D
Cross table Query
Wizard
All of the Above
B
View Records
Update Records
A
Right outer join
Full join
D
Right outer join
Full join
A
Inner join
None of the above
B
Inner join
None of the above
A
Select Design ->
Show Table
Select the table from
navigation Pane.
C
Reprt
Macro
A
Function
All
D
different data type Same data type
D
Number Literal
None of the above
A
7
6
A
Comparision
None of the above
B
Relational
None of the above
C
Both A and B
None of the above
C
returns true or false None of the above
A
BODSAM
None of the above
A
Both A and B
None of the above
C
three
four
B
As many field
All of the Above
D
Structured Question
Language
System Query Language B
Both AND
LIKE AND
B
IS OR
LIKE OR
A
Any one table
All of the Above
B
3Acc
ess
B
Lower()
None of the above
A
Trim()
None of the above
C
Expression Box
Expression elements
B
Oracle
C++
C
The order of the
Each column has a
rows and columns is specific range of values
immaterial to the
known as the Tuple
DBMS
domain
D
Records with date
before 2011
All of above
C
Base Database
None of the above
A
Expression Box
Expression Builder
window
C
Will match all text
having second
character as B
Will match all text
starting with a digit
A
Action query
Parameter query
B
Any where in the
table
Beginning of the table
B
Table but not in
Form
Form & Table
D
B
Graphics Control
Bound Controls
B
Record Source
Picture
D
Inside-Report
Insert-Report
C
Table or query,SubReport
None of the above
C
Detailed Definition
Language
Data Detailed Language
A
Bar Chart
Column Chart
D
Bar Chart
Column Chart
B
.MDW
.ACCDT
B
Both of them
None of them
B
File->Save as>Save Database
as->Package and
sign
File->Save&Publish>Save Object as>Package and sign
A
Visual Basic
Application
Excel attachment
A
Manage replies
All of the above
C
Date/time
AutoNumber
D
For shout text entries of
no more than 255
For long text entries characters
C
Records that meet
any of several
criteria you specify All of above
A
Data Manipulation
Language
Detailed Manipulation
Language
C
The QuickBasic
editor
All of above
B
Click the report,
and on the Pivot
Table toolbar, click
the refresh data
button
All of the above
C
Pivote Table & Pivot
Chart View
All Of Above
D
Memo
Lookup Wizard
D
Macro
Report
B
DDL
None Of Above
A
Authorizing Access
And Other Control
Over Database
None Of Above
C
Object Oriented
Database Model
Structureed Database
Model
D
Date/time
Hyperlink
C
Establishing
Relationship
None Of The Above
A
have to update
manually
never update
B
Query
None Of These
A
To allow the user to
switch from one
database file to
To allow changing from
another.
one report to another.
A
It doesn't have as
many design
options.
The only report type
available is the Design
Report.
B
Use the Mailing
label wizard text
option.
Use the >> button.
C
Page Footer
Page Header
C
All The tools of the
form design control
gallery.
Form Wizard Columnar
C
Protects the VBA
code from being
viewed or edited
while still allowing it
to run.
All of the above
D
Open-down
None of the above
B
Delete Query
Parameter Query
D
Open Exclusive
mode
Open Read Mode
C
()
""
B
Text
None of the above
A
Report
None of the above
A
Read
Write
A
File Tab ->Security
Options, and
selecting the Trust
Centre tab from the
Access Option
window
None of the above
B
A
File tab
Database Tools
D
Report
All of the above
D
Query
Report
A
primary database &
secondary database None of the above