0% found this document useful (0 votes)
226 views129 pages

Audit and Banking Quiz Questions

ADV ITT EXAM PDF

Uploaded by

kenebec769
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
226 views129 pages

Audit and Banking Quiz Questions

ADV ITT EXAM PDF

Uploaded by

kenebec769
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 129

S.

No Questions Option A Option B Option C Option D Answe answer1


In IDEA, Statistics functions can be applied Numeric Data Date Data Both A and B None of the C Both A and B
1
on . above
In IDEA, increment value in Stratification FALSE TRUE B TRUE
2
function can be fixed or free interval.
In IDEA, Stratified Random functions is a part of Analysis Data Relation Sampling D Sampling
3
which menu.
ACL IDEA Unix SOFTCAAT C Unix
4 Which of the following is not an Audit Software

Using which functions to perform more complex


calculations and exception testing in Equation Editor function Editor Calculation Editor Testing Editor A Equation Editor
IDEA?
5
Which of the following are categories of Items of audit Data Analysis System validation All of the above D All of the above
6
computer audit function ? interest
File Definition Stratification Print Preiview Append B Stratification
7 In the following list which is a audit function?

Which is the following step involved in a source code Review Programming Understand program Formulate flaw
review methodology ? standards specifications hypotheses All of the above D All of the above
8
In IDEA which functions should be used to find Detection Exclude Sequence checking Filter A Detection
9
repeated values ?
In IDEA, Stratification functions can be applied Numeric Data Date Data Character Data All of the above D All of the above
10
on which type of data ?
In IDEA,Summarization accumulates the values of
Numeric fields for each . Primary Key Unique Key Secondary Key Composite Key B Unique Key
11
In which sampling,selecting sampling units using a fixed None of the above
interval between selections Random Systematic All of the above B Systematic
is .
12
Ensures that all combinations of sampling units in the None of the above
population have an equal chance of Random Systematic All of the above A Random
selection is .
13
Input Control method is a part of Application TRUE FALSE A TRUE
14
Control Group.
Which is the following type of check that can be run
when data is input through terminal ? Field check Filter check Compare check Data check A Field check
15
In system money transfers are done on a one NEFT, RTGS RTGS,NEFT EFT,RTGS None of the above B RTGS,NEFT
to one basis while in system transfer is done in
batches.

16
All the money transfers take place in the books Beneficiary bank Central bank(RBI) Remitting bank None of the B Central bank(RBI)
17
of the above
system of money transfer is primarily NEFT RTGS EFT All of the above B RTGS
18
used for large transactions.
In RTGS, the STP generates an for every
outbound RTGS transaction. UTN UTE UTR UTS C UTR
19
STP stands for Straight Through Straight Temporary Strict Through None of the above Straight Through
in terms of Processing Processing Processing A Processing
CBS.
20
is a method of creating virtual VLAN LAN WAN MAN A VLAN
21
networks within a physical network.
CMS stands for Control Cash Management Core Management Centre Cash Management
in terms of CBS. Management System System System Management System B System
22
Audit of internal Systems audit are Audit of controls in any Systems audit are
controls is not important for the banking environment is important for the
needed at all verification of the performed using verification of the
internal controls software audit None of the above B internal controls

23 Which of the following statements is true?


Managing of Assets Formulating a security Developing a business Laying down A Managing of Assets
policy continuity planning procedures for
The Management Controls does not include system
development
24
is supported by advanced technology Core Banking Solution Core Banking Solution
infrastructure and has high standards of business Firewall Internet banking Web centre C
functionality.
25
CBS Software resides in a Central application server Central Office Data Central Office Data
which is located in the ATM Data centre Middleware Web centre Centre. D Centre.
26
A that runs the core banking solutions (CBS) Central Application Domain Name Server Central Application
and is centrally accessed by the branches. ATM Server Server Database Server B Server
27
The of the application is capable of only
entering the data at the end point that is System version Application Version Client version Firewall C Client version
branches.
28
The application server would be placed in a trusted Virtual Local Area Wide Area Network Personnal Area Virtual Local Area
inside zone in a separate Network Local Area Network Network A Network
29
Application software would access the Data base server ATM DATA Server Domain Name Application A Data base server
30
Server Server
are capable of being connected only when
devices are connected to a switch. LAN Virtual Networks MAN WAN B Virtual Networks
31
refers to the process of developing
software which would produce the required output
from the input provided of course, using the necessary
Application
hardware and communication systems. Software Development Server Development System Development D System Development
Development

32
The is essential to ensure that Review Management RTGS Log management Authorized C Log management
computer security records are stored in sufficient detail Controller
for appropriate period of time.

33
All the various servers in the central data centre LANs VLANs WANs MANs B VLANs
34
are seggregated through
The is a complete process in the computer Consalidation Password Policy protection Validation D Validation
so that it ensures that data that is fed in conforms to
certain prerequisite conditions.

35
When the central Data base is busy with central end of
day activities or for any other reason, the file containing
the account balance of the customer is sent to the ATM
Centralised Data base Central Office Data
switch. Such a file Positive Balance File Application Server A Positive Balance File
security Centre.
is called

36
Militarised zone City Zone State zone demilitarised D demilitarised zone
37 The IBDS is located in a zone
The main components of Internet Banking Web server IBAS IBDS All the above D All the above
38
system consist of
Copy of the Anti Virus Software was updated promptly None of the Above
and regularly at the Data Centre and pushed into all of
the servers and in all the
Hacking Method Push-pull method Both A &B B Push-pull method
systems in the branches by

39
The which is also residing in the server at Application Software Application Server Application Software
the branch actually does the banking Sytem software utility software C
operations.
40
In Core Banking concept all the systems of the bank are
connected to the Central office by means of a
connectivity which may be either a
local line Leased line Broadband None B Leased line
or a dial up line.

41
The is generated by the software and Personal Identification Net transaction ID NO Personal Identification
directly sent to equipment for printed the Pin Mailer. 16 digit number Number ATM No B Number
42
would also include the existence of built
in controls in the system to ensure proper processing of
input data so as to provide
Output Control Input control Process Control Data Control C Process Control
the required output.

43
refers to an arrangement wherein the
issuing bank acts on the request Letter of Credit Letter of Tax Letter of Payable Letter of Receible A Letter of Credit
and instructions of a customer.
44
is a process by which the bank Business Recovery Business Continuity Disaster Recovery Business Continuity
ensures the maintenance and recovery of Planning Planning Planning None B Planning
operations.
45
At which phase of testing the version of Programmer User testing (a) & (b) both None of above C (a) & (b) both
46
software is called “ beta version”? testing
47 Finacle developed by Infosys HCL Technologies TCS I-Flex A Infosys
The number that is stored in the ATM switch is Pin No - offset value Offset Value - Pin No - Natural Pin
the difference of which of the following number? Offset value - Pin No Pin No - Natural Pin Natural Pin C
48
The information retrieval of transactions taking place at Soft copy of Hard copy of Electronic Soft copy of Electronic
ATM located at remote locations is Electronic Journal Cash register (a) and (b) both A journal
through journal
49
The number that is generated as soon as the customer
inserts the card in the ATM machine Offset value Pin sent to customer Natural Pin Card Number C Natural Pin
is
50
The tab in Expression Builder in which we write Expression Elements Expression Builder
expressions is known as . Operator Button Expression Box window C Expression Box
51
Will match all text Will match all text Will match all text Will match all text A Will match all text
starting from B ending from B having second starting with a digit starting from B
character as B

52 The criteria expression LIKE?B*.


queries are useful for summarizing Select query Crosstab query Action query Parameter query B Crosstab query
information, and are somewhat similar to pivot tables in
MS-Excel.

53
While entering record in Datasheet view, in Alphabetical At the end of the Any where in the Beginning of the B At the end of the
54
which order the records can be entered Order table table table table
When you delete the record in form, it deletes Form only Form but not in table Table but not in Form & Table D Form & Table
55
the record from . Form
Having clause is used in the aggregate query in FALSE TRUE B TRUE
56
MS Access 2010
The controls that are not linked to any field of the table Unbounded Controls
or query on the form are known as ActiveX control Unbounded Controls Graphics Control Bound Controls B
.
57
Which property of the form can be used to insert a
background image in MS Access 2010? Caption Background Record Source Picture D Picture
58
is a report that is inserted in Inner-Report Sub-Report Inside-Report Insert-Report C Inside-Report
59
another report in MS Access 2010.
A bound main report is based on a Table or query,Inner- Table or query,Main- Table or query,Sub- None of the above Table or query,Sub-
and its contain Report Report Report C Report
realted information.
60
Data Definition Data Defined Language Detailed Definition Data Detailed Data Definition
Language Language Language A Language

61 DDL stands for


A used to compare multiple values of
categories or differences over a period of Pie Chart Area Chart Bar Chart Column Chart D Column Chart
time.
62
A used to compare trends over a Pie Chart Line Chart Bar Chart Column Chart B Line Chart
63
period of time.
To create a read-only copy of the database, which of the
following file format can be used? .ACCDB .ACCDE .MDW .ACCDT B .ACCDE
64
The database administrator created a split database and Front-end database
created a front-end database and back-end database
file.Which of the file should be stored on the server ?
Back-end database Both of them None of them B Back-end database

65
In which formats can the Collect Data through HTML and InfoPath Visual Basic Application
email message feature can send the data entry form? Access Forms Excel attachment A HTML and InfoPath
66
Once a mail is sent using the collect data through email Export to Outlook Options in Tool menu Manage replies All of the above C Manage replies
message feature in Access 2010. of Access
The mail status can be checked
using .
67
The type of data cannot be
collected using Collect data through email messages. Text Number Date/time AutoNumber D AutoNumber
68
To add table To store objects For long text entries For shout text entries C For long text entries
created in other of no more than 255
programs characters

69 What is the memo data type field used for?


Those records that Records based on a Records that meet any All of above A Those records that
match an entity in a criterion you specify of several criteria you match an entity in a
The filter By selection feature allows you to filter: field specify field

70
Detailed Maintaining Data Maintaining Data Manipulation Detailed Data Manipulation
Language Language Language Manipulation C Language
Language
71 DML stands for
Which editor was provided for use with Access The Visual Basic Notepad The QuickBasic All of above B Notepad
72
Basic? 1.0 editor editor
Save your changes, Select the Pivot Table Click the report, and on Click the report, and
close the workbook, worksheet and press F9 the Pivot Table toolbar, on the Pivot Table
How do you update Pivot Table report data after and then reopen on the keyboard click the refresh data toolbar, click the
All of the above C
changes are made to the source data? it. button refresh data
button
73
What are the different views to display a Table Datasheet View Design View Pivote Table & All Of Above D All Of Above
74
? Pivot Chart View
Which Of The Following Creates A Drop Down Ole Object Hyperlink Memo Lookup Wizard D Lookup Wizard
75
List Of Values To Choose From?
A Enables You To View Data From A Table
Based On A Specific Criterion Form Query Macro Report B Query
76
The Database Language That Allows You To DCL DML DDL None Of Above A DCL
77
Access Or Maintain Data In A Database
Change The Insert, Update Or Authorizing Access And None Of Above C Authorizing Access
Structure Of Tables Delete Records And Other Control Over And Other Control
DCL Provides Commands To Perform Actions Like Data Values Database Over Database

78
Network Database Relational Database Object Oriented Structureed Structureed Database
Model Model Database Model Database Model D Model

79 Which is not a Database Model ?


80 Which Of The Field Has Width 8 Bytes? Memo Number Date/time Hyperlink C Date/time
This Is The Stage In Database Design Where One Data Definition Data Refinement Establishing None Of The Above A Data Definition
Gathers And List All The Necessary Fields For The Relationship
Database Project.

81
Whenever a tables gets update, the dependent Not update update automatically have to update never update B update
82
query will manually automatically
The Third Stage In Designing A Database Is When We Relationship Join Query None Of These A Relationship
Analyze Our Tables More Closely And Create A
Between Tables

83
To build a main Creates the macros To allow the user to To allow changing To build a main
switchboard form used to program an switch from one from one report to switchboard form that
What is the purpose of the Switchboard Manager in that controls all automatic application. database file to another. controls all other
A
Microsoft Access 2010? other another. forms.
forms.
84
The reports are It doesn’t It doesn't have as many The only report type B It doesn’t
How does a query-based report differ in design to a restricted in size. design options. available is the
report based on just one table? Design
Report.
85
How would you include some plain text into a mailing Type the text Use the Mailing Use the >> button. Use the Mailing
label report? directly into the Use the > button. label wizard text C label wizard text
label. option. option.
86
In a Microsoft Access 2010 report, the page
numbering would most likely be placed into the: Report Footer Section Header Page Footer Page Header C Page Footer
87
If you wished to present a professionally looking form All The tools of the Form Wizard All The tools of the
on screen that would show all the necessary form design control Columnar form design control
information, which of the following gallery. gallery.
Pivot Table Pivot Chart C
form design tools would you most likely use?

88
An .ACCDE file is a version of the Fixed-down Locked-down Open-down None of the B Locked-down
89
original .ACCDB file. above
Which type of the query is used to accept the Make Table Query
value from the user while executing the query and fetch Update Query Delete Query Parameter Query D Parameter Query
records accordingly
90
To encrypt the databse in Access 2010 must be opened Open Secure mode Open Exclusive mode Open Exclusive mode
in the . Open Inclusive mode Open Read Mode C
91
To extract the records based on date field, $ # () "" B #
92
which of the symbol should be used
FIX() is a kind of function in MS-Access Math Date Text None of the A Math
93
2010. above
None of the above
MS-Access 2010 has added new features of
Macro Form Report A Macro
to eliminate the need of VBA code
94
Encrypting a database does not restrict access
to database objects, but to the database. Open Modify Read Write A Open
95
Third Party Encryption Technology can also be
applied to the database of Microsoft Access 2010. TRUE FALSE A TRUE
96
To create a split database in MS Access 2010 go Create Tab External Tab File tab Database Tools D Database Tools
97
to which tab?
After spliting database,frontend database Forms Query Report All of the above D All of the above
98
holds .
After spliting database,backend database Tables Forms Query Report A Tables
99
holds .
A back-end database A new database & Old primary database & None of the above A A back-end database
When an Access database is split, it creates two & front- end database. secondary database & front- end database
files . database

100
A Data Access Page is a special type of None of the above
that allows users to interface with database XML page HTML Page Web page C Web page
using Internet Explorer.
101
OLAP systems use concept of OLAP cube called single hyper dimensional multi dimensional none C multi dimensional
102
a cube dimensional
The data which is to be exported from Tally.ERP XML HTML ASCII ALL D ALL
103
9 can be in format.
In Tally ERP-9 Remote Access is also known as Networking VB.Net Tally.Net None of the C Tally.Net
104
. above
Accessing data store on a remote location using Internet None of the above
in Tally.ERP9 is called . Local Data Remote Data Internet Data B Remote Data
105
Tally.ERP9 can be classified user in two Local User Remote User Both A & B None of the C Both A & B
106
categories are . above
Which of the following is not a predefined security level
provided by Tally.ERP 9? Owner Public User Data Entry Tally.NET User B Public User
107
The business model is represented in the graphical form flowcharts, flow flowcharts, flow
using and charts, pictures smart art, clip art diagrams graphs, shapes C diagrams
108
integrates supply and demand BPM SCM PLM CRM B SCM
109
mangement within and across companies.
Online Analysis Online Analytical Online Analytical None of the above Online Analytical
Processing Processing Programming B Processing

110 OLAP stands for .


includes transportation from Inbound Outbound Sourcing planning Production A Inbound
111
Suppliers and receiving inventory. Operations Operations planning Operations
Which of the following is not the service area of Logistics Asset Management PLM CRM D CRM
112
SCM?
Which step of the ERP implementation involves, Step 1 Step 2 Step 3 Step 4 B Step 2
educating and recruiting end users throughtout the
implementation process?

113
The system process will address issues implementation upgradation installation migration C installation
such as software configuration, hardware acquisition
and software testing.

114
A review is recommended to pre implementation under process review post implementation None of the above C post implementation
ensure that all business objectives established during
the planning
phase are achieved.
115
In stages, auditors have access to post implementation pre implementation Both A & B Either A Or B A post implementation
rudimentary ERP tools and capabilities for auditing
security configurations.

116
Immediate posting and updation of books of accounts Interactive Immediate Processing Real Time Processing Business Processing Real Time Processing
as soon as the transactions are Processing C
entered. This is called as
117
Which of the following ETDS forms are available Form 26, Form 27, Annexure Form 26Q, All of the above D All of the above
118
in Tally.ERP 9? Annexure to 26 to 27 Annexure to 26Q
The exported eTDS file from Tally.ERP 9 can be validated File Validation File Validation Utility File Valuation Program File Valuation Utility B File Validation Utility
through NSDL's freely downloadable utility called Program

119
ERP systems provide an access to integrated distributed isolated de-centralized A integrated
120
the data
is a tool that refers to skills, Data Warehousing Business Intelligence Business Intelligence
processes, technologies, applications and practices used
to facilitate better, accurate and quicker decision
Data Modeling Business Modeling D
making.

121
Business intelligence systems are data-driven information driven resource driven none A data-driven
122
Decision Support Systems.
Data warehousing technology is the process of creating
and utilizing the company’s general data historical data operational data none B historical data
123
The data in the Warehouse comes from the
environment and external sources. operational backup data none A operational
124
In essence, SCM integrates management supply and demand supply and demand
within and across companies. supply and chain supply and sortage none A
125
including all fulfillment Inbound operations hybridbound outbound operations
activities, warehousing and transportation to customers. outbound operations operations none B
126
Customer Relationship Management is a business corporate strategic none B corporate
127
level strategy.
Operational CRM provides support to front office back office staff none A front office
128
business processes.
Collaborative ultimate goal is to use information CRM's ERP SCM none A CRM's
collected by all departments to improve the quality of
services provided by the
company.
129
Tally.ERP 9 follows the DES encryption decryption cryptography none A encryption
130
method to safeguard the data.
Immediate posting and updation of books of Interactive Immediate Processing Real Time Processing Business Processing Real Time Processing
accounts as soon as the transactions are entered. This Processing C
is called as
131
Information Systems Integrated Information Decision Support Non-Isolated Decision Support
Business Intelligence Systems are data-driven Systems Systems Information Systems
C
. Systems
132
Which of the following ETDS forms are available Form 26, Form 27, Annexure Form 26Q, All of the above D All of the above
133
in Tally.ERP 9? Annexure to 26 to 27 Annexure to 26Q
The exported eTDS file from Tally.ERP 9 can be validated File Validation File Validation Utility File Valuation Program File Valuation Utility B File Validation Utility
through NSDL's freely downloadable Program
utility called

134
With technology the characters are
reduced in breadth and user is allowed to input
additional characters which would make the account
Tally Fix Tally Adjust Tally Fit Tally AutoFit C Tally Fit
name, entity complete
and readable.
135
In Tally.ERP 9 provides the user User-defined HTTP-XML based data Unlimited multi- user
with administrator rights and the capability to check the Security interchange support
entries made by the authorised users and alter these
Audit Feature D Audit Feature
entries, if
necessary.
136
is an enabling framework which Direct Web Browser
establishes a connection through which the remote user Access
can access the Client's data without
Web Publishing Tally.NET Email facility C Tally.NET
copying/transferring the data.

137
If we want the company to be connected Allow to Connect Contact On Load Either A or B None of the above B Contact On Load
automatically for remote access on load, the property Company
needs to be set it as Yes.

138
technology is the Data Warehousing Business Intelligence
process of creating and utilizing the company's historical Data Modeling Business Modeling A Data Warehousing
data.
139
Is there a fixed qualification for internal TRUE FALSE B FALSE
140
auditor .
Which of the following will not appear in the Powerpoint Word Paste Document My Templates C Paste Document
141
home page of K-Doc?
To change an email header so that the message appears Email middle attack. Email Spoofing. Email hacking. Email tracking B Email Spoofing.
to have originated from someone or somewhere other
than the actual source is
known as .
142
To playfully satirize a website is known Web tapping Web Interception Web spoofing Web threating C Web spoofing
143
as .
is the complete package to manage the Billing and Accounting Billing and Accounting
billing requirements of a CA firm on cash Payroll eSecretary software K-DOC application C software
system of accounting.
144
Which of the following is not a/an feature of Contact Greeting Management Share certificate Share certificate
eSecretary? Management Email Management printing D printing
145
Annual return preparation can be done using ICAI-ROC K-DOC application ICAI XBRL Software Payroll A ICAI-ROC
146
. application application
is correspondence automation & K-DOC ICAI-ROC
management software that is seamlessly integrated application eSecretary ICAI XBRL Software application B eSecretary
with Microsoft Office.
147
is an independent,objective assurance and Statutory audit Tax audit Internal auditiing None of the Above C Internal auditiing
consulting activity designed to add value and improve
an organization's
operations.
148
Which of the following is/are the main purpose Financial Operations of the Both A and B Either A or B C Both A and B
149
of the internal audit? reporting organization
As per of the Income tax Act,every
person carrying on business or profession is requires to
get his accounts audited by a CA before the "specified
Section 45 Section 44AD Section 43B Section 44AB D Section 44AB
date".

150
refers to use
software/applications to automatically perform tasks
such as accounting,preparing trial balance, financial
statements etc. and electronically transmit data or
information using internet.. ERP Office automation Either A or B None of the Above B Office automation

151
Foreign Exports Financial Enterprise Foreign Exchange None of the Above C Foreign Exchange
Management Act Management Act Managament Act Managament Act

152 FEMA Stands for .


Which application helps the management to allocate Resource allocation Knowledge Document Client management D Client management
the revenue to the credit of the right employee who and scheduling management Management Systems
identified the opportunity?

153
Who has full privileges in the financial Database Account System User C System
154
accounting application? administrator administrator administrator Administrator administrator
is the centre point of the financial
accounting application as any transactions having
financial impact carried out in any other module will
AP module GL module AR module FA module B GL module
reflect in this module.

155
In Financial Accounting Application,the transactions
flow from GL (General ledger) to TRUE FALSE B FALSE
other modules.
156
Which of the functionalities is not provided in the Evaluation of Receipts of goods or Invite and analyze Comparison with D Comparison with
purchasing module of Financial Accounting Application. Vendors service quotations from budgets budgets
vendors

157
In Financial Accounting Application,automatic sequence Purchasing Accounts Payable Expense Management Fixed assets C Expense Management
number of documents control is not required in which
of the following module?

158
Which module of Financial Accounting Application can Accounts Receivable
be used for assigning credit Purchasing Sales Accounts Payable B Sales
limit to customers?
159
Which of these will trigger/alert for timely Accounts Accounts Receivable Expense Bank C Expense
160
payment ? Payable Management Reconcilations Management
We can manage interviews,offers and job vacancies by Resource allocation HR and Payroll Knowledge None of the Above HR and Payroll
using which of the application? and applications management B applications
scheduling
161
, , are commonly Confidentiality,In Confidentiality,Integr Confidentiality,Inte Confidentiality,Int Confidentiality,Inte
referred to as CIA in information tegrity and ity and grity and Access egration and A grity and
security parlance. Availability Authentication rights Authentication Availability
162
provides information about updation of Performance HR management Timesheet Timesheet application
project cost based on time spent by management system Payroll application D
employees on various projects. system
163
Capture the Key Employee designation Automated alerts for Prepare summary or Employee designation
Performance and reporting structure pending appraisals bell curve analysis of and reporting
Which of the follwing is not a/an functionality provided Indicators all employees structure
B
by PMS?

164
automates the calculation of salary for Timesheet System HR management Knowledge
taking inputs from the timesheet application, leaves System management System
from Leave Management System and salary details from
Payroll System C Payroll System
the HR master
data.
165
Which of the follwing is not a control in Leave Reduce Error free capture of Approval workflow Error free capture of
Management System? administrative Excess leave leave details C leave details
burden on HR
166
Permanent Audit File are obtained once but half-yearly yearly monthy quarterly B yearly
167
updated on basis.
Organization chart Client’s accounting Copies of clients’ Copies of important Copies of clients’
manual incorporation contracts or long incorporation
In Permanent Audit file, is not the key data documents like MoC term lease documents like MoC
C
documented. agreements

168
is a type of training in which user
logon on the training server with a user ID and Internal Training E-Learning Classroom Training E-Training B E-Learning
password.
169
In some cases, trainee is supposed to appear for the Classroom Training
examination/test at the end of the training E-Learning Virtual Learning All the Above B E-Learning
is .
170
are the hardware/infrastructure PC Application Server WAN All the Above D All the Above
171
equipments used in a CA firm.
means information available in the Confidentiality Integrity Availability Authentication B Integrity
organization should not be altered or modified by
unauthorized personnel.

172
Which of these is/are the standard email Microsoft Lotus Notes Both A and B None of the C Both A and B
173
program used in an organization? Exchange Above
Most WANs are Compared to LAN, its WAN uses only private Switches are used to B Compared to LAN, its
owned by only one transmission speed is networks. connect LAN and transmission speed is
Which of the following is not a characteristics of WAN? organization. low WAN low

174
is protection of information assets from Information Security None of the above Information Security
threats to preserve their value. Confidentiality Integrity C
175
Which types of information assets need to be Client data Own data Own documents All the above D All the above
176
secured in a CA Office?
The extent and level of would Availability Confidentiality Integrity Authentication B Confidentiality
177
depend on the nature of information.
of information might be affected
due to denial of service attack or some other reasons. Integrity Authentication Confidentiality Availability D Availability
178
means the sender cannot deny
having sent a message and receiver cannot deny Non-Repudiation Integrity Authentication Confidentiality A Non-Repudiation
receiving the message.
179
180 Risk may not be in nature. reputational financial operational vulnerable D vulnerable
The process of identifying an individual, usually based
on user id and password in an Availability Authentication Confidentiality Integrity B Authentication
organization is called .
181
Which of the following is not a software equipment Resource None of the Above
required in a CA's office? allocation and Client management HR and Payroll D None of the Above
scheduling
182
Which of the following is not an application ICAI-XBRL suite K-DOC Billing and ICAI-TOC D ICAI-TOC
183
arranged by ICAI? Accounting
Private Exchange Public Exchange Branch Private Branch Public Branch Private Branch
Branch exchange exchange C exchange

184 PBX stands for


is the process of meeting the financial goals Corporate planning Monte Carlo simulation Personal Finance
through the proper management Financial planning planning C Financial planning
of finances.
185
can be defined as the process of setting Monte Carlo Corporate Planning Decision Tree Analysis Corporate Planning B Corporate Planning
the procedures in the organization for achieving the Simulation & Analysis
predefined goals.

186
shows ability of company to pay back long Debt Assets Ratio Interest Coverage Ratio Total Fund Ration None of the above B Interest Coverage
term loans along with interest or other charges from Ratio
generation of profit from its
operations.
187
is the simplest method of Earnings Per share Fixed Asset Over ratio Price Earnings Multiple Gross Profit Ratio C Price Earnings
comparing different stocks at a point of time to make Multiple
investment decisions.

188
<?xml version="3.0" <?xml version="2.0" <?xml version="1.0" <?xml version="0.0" C <?xml version="1.0"
encoding="ISO- encoding="ISO-8859- encoding="ISO- encoding="ISO- encoding="ISO-
The very first line of code of XML file is . 8859-1"?> 1"?> 8859-1"?> 8859-1"?> 8859-1"?>

189
Every bit of data has to start and end with an <TagName>Data </TagName>Data<Ta </TagName>Data< <TagName>Data< A <TagName>Data</
190
identical tag </TagName> gName> /TagName> TagName> TagName>
Directally Delete XML Maps Dialog Box None of the above XML Maps Dialog Box
Deletion of XML Map is done through Command Delete Button C
.
191
Excel works primarily with types of 3 2 1 4 B 2
192
XML files.
Method of tax calculations shall change Annual Income DOB status of assess All of the above. D All of the above.
193
according to .
is a process used in statistical analysis in Snowball sampling Sampling Systematic sampling Simple random B Sampling
which a predetermined number of observations will be sampling
taken from a larger
population.
194
In , Individuals are selected at Clustered sampling Systematic sampling Simple random Systematic sampling
regular intervals from a list of the whole population. Sampling sampling C
195
In each individual is chosen entirely by Snowball sampling Convenience sampling Systematic sampling Simple random D Simple random
chance and each member of the population has an sampling sampling
equal chance, or probability,
of being selected.
196
Which method is commonly used in social Simple random
sciences when investigating hard to reach groups? Quota Sampling Sampling Snowball sampling sampling C Snowball sampling
197
are useful for quick reading and
easy understanding, particularly for top management. Balance sheet Summary reports IRR NPV B Summary reports
198
Popular methods of capital budgeting include discounted cash internal rate of net present value All the above D All the above
199
and payback period. flow return
is the value of all future cash inflows less Net present value
future cash outflows as on today. Working capital IRR PMT A Net present value
200
is the process of defining and analyzing Sensitivity analysis Qualitative risk analysis
the dangers to individuals, businesses and government
agencies posed by potential natural and human-caused
Risk analysis Scenario analysis B Risk analysis
adverse events.

201
which is used more often, does not involve Sensitivity analysis Qualitative risk analysis Qualitative risk
numerical probabilities or predictions of Risk analysis Scenario analysis C analysis
loss.
202
are generally used to present information in a Graphs Sparklines Both A& B Charts D Charts
simple and better way and also be used to analyse the
risk in a better way.

203
It is a technique used to determine how different values Decision Tree
of an independent variable will impact a particular analysis
dependent variable under a
Sensitivity analysis Both A& B Neither A &B B Sensitivity analysis
given set of assumptions.

204
involves computing different reinvestment Scenario analysis Sensitivity analysis Decision Tree Analysis None A Scenario analysis
rates for expected returns that are reinvested during
the investment horizon.

205
Which function that is used to calculate the payment for None of the above
specific loan terms SUMIF() PMT COUNTIF() B PMT
206
helps to break down the Return on Du Point Analysis Return on Profitability Ration None of the A Du Point Analysis
207
Equity Investment above
is a common method for financing property,
facilities, and equipment. Mortagage Leasing Rent All the above B Leasing
208
Which option can be used to split windows into Format -> Window -> Split View -> Window -> View -> Split B Window -> Split
209
four in ms excel 2010? Window Split
Settings Tab under Settings Tab under the Settings Tab under the All of the above B Settings Tab under
How to restrict the values of a cell so that only a list can the Tab Format -> tab Data -> Validation tab Data -> Filter - the tab Data ->
be entered in a cell? Cells >Advanced Validation
Filter
210
What does the COUNTA() function do in MS Excel 2010 Counts cells having Counts cells having Counts non- empty Counts non-empty
? alphabets Counts empty cells number cells D cells
211
If the value in A1 is "ITT" and in B1 is "ICAI ", which
function in Excel will return " ITT @ ICAI " A1+ "@" + B1 A1 # "@" # B1 A1 & "@" & B1 A1 $ "@" $ B1 C A1 & "@" & B1
in cell C1?
212
Which of the following function will return a ROUNDUP(7.499 ROUNDDOWN(7.499 ROUND(7.4999,0) Only B & C D Only B & C
213
value of 7? 9,0) 9,0)
A tiny chart embedded in a worksheet cell that provides
a visual representation of data is a Bar Chart Sparkline Pivot Chart Pie Chart B Sparkline
214
is a graphical equivalent of a pivot None of the above
table, which is used to visualise PivotTable report Bar Chart Pivot Chart Sparklines B Pivot Chart
215 summary data
To frequently print a specific range of cells on a Pagelayout -> Pagelayout -> Print Page Setup -> Print Pagelayout -> Page
worksheet , the option used is Page Setup -> Print Area Area Print Area A Setup -> Print Area
Area
216
Non-excel files can be opened in MS Excel using Add Ins Developer Tab Text Import wizard Analysis Tool Pak C Text Import wizard
217
the
218 is a text concatenation operator. # $ & * C &
AVERAGE(4,5,6,7 AVERAGE(A1,B1,C1) AVERAGE(A1:A6,B1 All of the above D All of the above
219 Which of the following is correct? ) :B6)
function in MS-Excel returns the remainder after
number is divided by divisor. MOD() INT() DIV() REMAINDER() A MOD()
220
221 EXCEL Work in Mode 3 5 7 11 A 3
XWE XFD XAA AAA B XFD
222 In Ms-Excel 2010, is Last Column Name?

In Excel 2010, the default criteria setting for Top10 Bottom10 Top half All D All
223
AutoFilter in each field is .
Subtotal option is in group of Data Sort & Filter Outline Data Tools Calculation B Outline
224
tab in Excel 2010.
Which of the following cannot store connection
information of an external data source in Excel 2010? Workbook .odc file .htm file .udcx file C .htm file
225
The default pivot chart type in Excel 2010 is a Column Line Scatter Bubble A Column
226
chart.
To consolidate Excel data, Consolidation by Consolidation by Consolidation using 3-D Any of the above C Consolidation using 3-
is used when worksheet position category formulas D formulas
data does not have a consistent layout or pattern.

227
In Excel 2010, the function is used TREND STANDARDIZE CORREL GROWTH A TREND
228
to generate a forecast.
function calculates the payment for a
loan (installment) based on constant payments and a PV NPV IRR PMT D PMT
constant interest rate.
229
are easy-to-use filtering components that Sparklines Slicers Macros Data Forms B Slicers
enable the user to quickly filter the data in a PivotTable
report in MS-Excel
2010.
230
In Excel 2010, range C3:C6 indicates Cells C3 through Cell C3 and Cell C6 Cell C4 and Cell C5 None of the A Cells C3 through
231
. C6 above C6
Keyboard shortcut to show a shortcut menu in MS Excel
2010 is . Shift + F10 Shift + F1 Shift + F11 Shift + F12 A Shift + F10
232
To select multiple non-adjacent cells in an Excel
2010 worksheet, click them holding key. Ctrl Alt Shift Ctrl + Shift A Ctrl
233
A quick way to return to a specific area of a Name Box Formula Bar Zoom Box Sheet Tab A Name Box
worksheet in Excel 2010 is to type the cell address or
range name in the .

234
Name of the Name of the worksheet Name of the cell or Formula in the cell C Name of the cell or
In MS-Excel 2010, the Name Box shows the workbook currently currently working on range currently working currently working on range currently
. working on on working on

235
In Excel 2010, what is represented by the small black
square in the lower-right corner of an Copy handle Fill handle Insert handle Border B Fill handle
active cell or range?
236
Suppose we accidentally erased a record in an Excel
worksheet. Which command can be used Insert Replace Paste Undo D Undo
to restore it immediately?
237
Excel 2010 offers up to sort 32 64 60 80 B 64
238
levels.
Which feature in Excel 2010 enables us to find the input
values needed to achieve a goal or Goal Seek Consolidate Data Validation Subtotal A Goal Seek
objective?
239
Rounds a number to Rounds a number down Rounds a number up Calculates interest B Rounds a number
a desired multiple to the nearest integer down to the nearest
integer

240 The INT function


A scenario is a set of A workbook can have Scenarios provide a Scenarios help to A workbook can have
values saved with one scenario per sheet. way to see different perform what-if one scenario per
the workbook. solutions for worksheet analysis. sheet.
Which of the following statements about scenarios is
formulas. B
not true?

241
A formatted A formatted defined A worksheet with a A worksheet with A formatted
description of each range of Solver and separate thumbnail for separate macros for description of each
scenario on a Goal Seek solutions each formula each scenario scenario on a separate
A
separate worksheet
worksheet
242 What is a scenario summary report?
243 What does Solver uses in its dialog box? Arguments Limitations Constraints Parameters D Parameters
What term describes a feature that gives Excel Trendlining Enhancement bit Thumbnail Add-in D Add-in
244
enhanced capability?
What dialog box allows you to change a field Field Options Field Pane Field Settings Field Structure C Field Settings
245
name in a PivotTable?
They allow you to They allow you to They allow you to They allow you to They allow you to
add dynamic data. rearrange row and generate e-mail print the reports rearrange row and
column data. enabled reports. with various settings. column data.
B

246 Why are PivotTables considered interactive?


Absence of input Lack of visible Accessibility of data All of the above D All of the above
Identify the need for controls and auditing in a documents transaction trail and computer
computerised environment. programs

247
Grand totals calculated for any code on a Financial totals Record totals Document totals Hash totals D Hash totals
248
document in the batch are called…..
Control that checks if correct sequence of commands Table level Data Integrity Batch check System test B Data Integrity
and update parameters are passed from the application
software to the database.

249
With respect to data integrity control, when monetary Sequence account Data account Suspense account Update account C Suspense account
transactions are processed against master files without
a match, we should
maintain a ….
250
The system test that tests the top-level modules first
and then the lower modules are simulated with dummy
modules to check the interfaces is called ….
Bottom up test Hybrid test Stub test Top down test D Top down test

251
Identify the audit technique that examines each
transaction as it passes through the system. Embedded code Program code Database Analyzers Database code A Embedded code
252
The Core Image Comparison audit technique compares Database with Executable program Transaction data with Module programs Executable program
the…. master table with master copy master with snapshots B with
transaction master copy
253
The technique used by an auditor to list unused Modelling Analyzing Mapping Tracing C Mapping
254
program instructions is…..
The sample data created and used for the purpose of
testing the application system is Test data Table data Item data Record data A Test data
called….
255
The test data (dummy unit) implemented in the normal Integrated Test Black box Test Facility Integrated Test
processing of the system over a period Facility Graph testing Whitebox testing A Facility
of time is known as….
256
The test data generated with correctness proof, data
flow analysis and control flow analysis Test item block Test data pack Test program pack Test record pack B Test data pack
tools is called….
257
The organisational, management, maintenance and Application controls
access controls are categories of …… General controls Check controls Input controls B General controls
258
When a real-time system is simulated to generate the Parallel simulation
same output as the real-time Parallel trailing Tracing parallel Parallel coding D Parallel simulation
system, the technique is called….
259
When an auditor expands the extent of substantive Cross reference lister Formulate flaw Correct lister Formulate correct B Formulate flaw
tests to determine the impact of defects on the hypotheses hypotheses hypotheses
attainment of program
objectives, the methodology is….
260
This is an important control in systems that use digital
signatures for authentication purposes. Public audit trails Random audit trails Sample audit trails Data audit trails A Public audit trails
261
Selecting transactions based on a sampling rate Transaction Systematic sampling Simple sampling Demographic B Systematic
262
is called …. method. sampling sampling sampling
The capability of the generalized audit software to read File size File data File access File reorganisation C File access
different data coding schemes, different record formats
and different file structures is….

263
The audit software capability of frequency Sort and merge Sampling nth item Formatting output Classify data on a D Classify data on a
264
analysis is to…. files criteria criteria
The audit functions of attributes sampling, variables
sampling, stratified sampling are Stratification Selection Statistical Reporting C Statistical
included in …. functions.
265
Identify the functional limitation of a generalized audit Ex Post Auditing Only Analytical review only Limited ability to Limited ability to A Ex Post Auditing Only
software that enables evidence collection only on the determine Propensity Verify Processing
state of an for logic
application system after the fact. Error
266
Sorting, creating, and Data retrieval, code Reading data, selecting Specific tasks with D Specific tasks with
printing files comparison and analyzing original or modified original or modified
The purpose-written audit programs are used for….. information programs programs

267
Picture of a transaction as it flows through the Program Track Snapshot Picture C Snapshot
268
computer systems is called…..
Input controls Processing controls Both A and B Neither A nor B C Both A and B
269 The application controls are ….

Identify the type of audit when auditors are members of


the systems development team. General audit Post audit System audit Concurrent audit D Concurrent audit
270
Identify the field check - "If a set of values is defined, is
the input data one of these defined List Range Slab Digit C Slab
values?"
271
The field check that conforms if data input for a Format mask Data mask Field mask Input mask A Format mask
272
field is in a particular format.
The field check on a processed data that fails if
a field is not initialized to zero or errors occur during Range Sign Overflow Serial C Overflow
calculation is……
273
The validation checks applied to a field depending on its Field checks Record checks Batch checks File checks B Record checks
logical interrelationships with the other fields in the
record are called …..

274
A group of records or transactions that are Physical batches Logical batches Block batches Transact batches A Physical batches
275
contiguous constitute …..
… is the type of batch check (group of
records) for all input records of a particular type Control totals Serial number Transaction type Sequence check C Transaction type
is done.
276
277 DB2 is an example of ODBMS RDBMS DBMS None C DBMS
is used to Modify/Change Data in Update Query Process Query Insert Query None A Update Query
278
Table
279 MS-Access is DBMS RDBMS ODBMS None A DBMS
Which of the following is not a data type in MS- Number Character Memo Date B Character
280
Access?
To make changes in MS-Access form should be Form view Form Design Change Form None B Form Design
281
opened in
layout of a form displays one record at Tabular columnar Datasheet None B columnar
282
a time
Data manipulation Data mathematical Data manipulation
language language both a and b None A language
283 In SQL, DML stands for
To see more than one record at a time in a form Tabular columnar both a and b None A Tabular
284
we use
285 The default query invoked by ms-access is Update Query Select Query Delete Query None B Select Query
software serves as the
Intermediary between the user and the database DATABASE DBMS O.S None B DBMS
286
Distributed database have now come to know Client data base Server data base Client-Server None C Client-Server
287
as a database database database
Data Design Define Data Data Definition None C Data Definition
288 DDL Stands for -. Language Language Language Language
In DBMS, view level data abstraction is known Internal Schema Conceptual Schema External Schema None C External Schema
289
as
In DBMS, Normalization concept responsible for Increase data Reduce Redundancy Increase Efficiency All B Reduce
290
duplication Redundancy
one 2 one, one 2 many and many 2 many Hierachical FLAT FILE SYSTEM Relational model None C Relational model
291
Relationship exist in model
Record is also known as in a Attribute Entity Tuple None C Tuple
292
Relational data base
is extention of ACCESS .mdb .dbf .accdb None C .accdb
293
DATABASE
Default length of numeric data type is 255 char 16 chra text long Integer D long Integer
294

Default value option in field property use for enter a value for checking for validation check None A enter a value
295
automatically automatically
Value of Report Header exist on every first last None B first
296
page of report
is an action or set of actions that program check macro All C macro
297
you can use to automate tasks
298 SQL is a Language Programming Non-Procedural Application None B Non-Procedural
Which one is the Second Level of Data Physical level Logical Level View Level None B Logical Level
299
Abstraction?
Memo data type store number of 256 1000 16536 63999 D 63999
300
characters.
YES/NO HYPERLINK MEMO AUTONUMBER D AUTONUMBER
301 data type field can't be updated

A Record is also commonly called as a column field tuple None C tuple


302

Most database operations that we do manually Program query form macro D macro
303
can be automated by using
are what we use to summarize and Report Query Form Macro A Report
304
present data in the table
A database tabel is similar in appearance to a MS-WORD Excel/spreadsheet Powerpoint None B Excel/spreadsheet
305

306 SQL is considered to be a 3 GL 4GL 5GL None B 4GL


SQL is considered to as an ideal Language for Java Internet Database Visual Basic C Database
307

DBMS that supports a database located at a Multiuser DBMS Distributed DBMS Centralized DBMS Database C Centralized DBMS
308
single site is called a
DBMS that supports a database distributed across Client-Server
several different site is called a database Distributed DBMS Multiuser DBMS Centralized DBMS B Distributed DBMS
309
The key does not accept Duplicate key field Primary key Reference Key None B Primary key
310
and Null values in Field.
is often implemented as an array of
311
records Record Tuple Tabel Attribute B Tuple
In MS-Access 2010,the control in the form
lets the user insert a picture into it. Title Logo Picture Graphic B Logo
312
Which query should be used to retrieve the following Search Query Make Table Query Aggregate Query Select Query D Select Query
information from table of databases "Which employees
earn more than Rs.30,000 a
month?"
313
View, change and A source of records for Both A and B Neither A nor B C Both A and B
Queries in MS-Access 2010 can be used as analyze data in forms and reports
. different ways

314
It is a printed page It is a Data Entry Screen It is a part of database It is a Data Entry
where users will to make viewing, used by the analysts to Screen to make
enter data entering and editing draw conclusions viewing, entering and
data in the database editing data in the
table None of the above B database table

315 What is a form in MS-Access?


Which of the following degree of relationship cannot be
applied in MS-Access 2010? One-to-One One-to-Many Many-to-Many Many-to-One D Many-to-One
316
In an ER model, a/an is any None of the above
object, place, person, event or concept about which an Entity Attribute Relationship A Entity
enterprise records data.
317
The process of arranging data in a logical Classifying Filtering Sorting Summarizing C Sorting
318
sequence is called .
Storage space is Changing the data at It can be more easily Both A and B D Both A and B
If some chunk of data is stored at two places in a wasted one place only will accessed
database, then . cause data
inconsistency
319
In MS-Access, what data type can be used for a Number Text Memo Any of the above B Text
320
phone number field in a database?
Conceptual Structural Model Object Model Interface A Conceptual Model
321 E-R Diagram is Model.
Model
Which of the following can be a primary key in Employee Code Employee Name Date of Birth Joining Date A Employee Code
322
an employee database?
Which of the following is a Database Java Oracle Lotus 1-2-3 MS-Outlook B Oracle
323
Management System?
Which of the following is not a data type in MS- Memo Yes/No Image AutoNumber C Image
324
Access 2010?
Which of the following is a New data type in MS- Memo Yes/No Calculated Field AutoNumber C Calculated Field
325
Access 2010?
In MS-Access 2010, queries are None of the above
best suitable to summarize information and looking for Crosstab Parameter Action A Crosstab
trends.
326
Which of the following is not a section in Report Report Header Page Header Section Detail Section Summary Section D Summary Section
327
Design view in MS-Access 2010? Section
Which of the following is not an action query in Select Delete Make Table Update A Select
328
MS-Access 2010?
In MS-Access 2010, which data type is best suitable for
storing the price of a commodity? Text Number Currency AutoNumber C Currency
329
In MS-Access 2010, which of the following data type
creates a field that allows the user to choose a value
from another table or from a list
OLE Object Memo Hyperlink Lookup Wizard D Lookup Wizard
of values by using a list box or combo box?

330
In a table, uniquely identifies each
record that is stored in the table. Unique Key Foreign Key Primary Key Record Key C Primary Key
331
is used to insert values in Table Query Report Form None A Query
332
directly.
Changing the Creating views and Authorizing access and Inserting, updating C Authorizing access
DCL provides commands to perform actions like structure of tables indexes other control over or deleting records and other control over
. database database

333
A database presents summarized information
retrieved from a table in a Form Query Macro Report D Report
preformatted, attractive manner.
334
In MS-Access 2010, which type of query extracts the Parameter query Update query Crosstab query Make Table query D Make Table query
data from one or more existing tables and puts them
into separate table?

335
In an MS-Access report, in which section we can In the Report Header In the Report Footer In the Page Footer In the Month Group In the Month Group
keep the count[Sales] to calculate the total sales for Section Section Section Footer D Footer
each month? Section Section
336
Selecting the fields Selecting the Reading several screens Selecting how the Selecting the
that we want to underlying table or of mostly useless form or report underlying table or
What is the first step in creating a form or report using appear in the form or query on which we information and should be formatted query on which we
the Form Wizard or the Report Wizard in MS-Access report want to base the form clicking next B want to base the form
2010? or report or report

337
Data independence Data integrity and Decentralized data Reduced application C Decentralized data
Which of the following is not an advantage of using a security development
DBMS? time

338
provides in Access 2010 is used to convert Table Analyzer Database Analyzer Form Analyzer Wizard None of the above Table Analyzer Wizard
database tables to the normalized Wizard Wizard A
form.
339
Which Ribbon command tab includes the Table Create External Data Home Database Tools D Database Tools
340
Analyzer Wizard in MS Access 2010 ?
A Junction Table creates a None of the above
relationship between two tables. One-to-One One-to-Many Many-to-Many C Many-to-Many
341
The Primary key of one table and the matching column None of the above
in another table is known as Matching Key Foreign Key Index key B Foreign Key
.
342
For ordering records specifying conditions specifying conditions
with group by clause updating records None B with
group by clause
343 In SQL, having clause is used for
To compact the database in MS Access 2010, the
database must be opened in the Inclusive Mode Exclusive Mode Normal Mode Save Mode B Exclusive Mode
.
344
In MS Access 2010, help protect a database Backups Save Database Save As Databse None of the above A Backups
from system failures and against mistakes that the Undo
command cannot fix.

345
Improving the performance of a database in MS Access Performance None of the above Performance Analyzer
2010 used tool. Analyzer Hi-tech Analyzer Online Analyzer A
346
The can be used to create reports Table Documenter Database Documenter Query & Report None of the above Database Documenter
on database objects for planning and modifying Documenter B
database design.
347
Use to grant or revoke User and Group User-level Security User and Group None of the above User and Group
permissions or to change the owner of database Accounts Wizard Permissions C Permissions
objects.
348
commands are used to enforce
database security in a multiple user database Security Grant and revoke Select Create B Grant and revoke
environment.
349
Which SQL clause is used to retrieve data from SELECT WHERE FROM INSERT A SELECT
350
database?
The clause is used to filter records SELECT WHERE FROM INSERT B WHERE
351
in database.
Entering Data Defining Data Controlling/Accessi All C Controlling/Accessi
352 DCL(Data Control Language) used for ng Data ng Data
353 is Example of DBMS Word Excel Access None C Access
What are the features of the Payroll Software Recruitment salary Process Time & attendance All of the above D All of the above
354
provide by the ICAI. Management
Which are the transaction supported by the Billing Previous years Cash receipt All of the above D All of the above
355
Billing and Accounting software ? pending bills
The software provide creating,printing and sending bulk eSecretary software Contact Template eSecretary software
individual mail Management software Management software All of the above A
is .
356
To create new file To save file To cut & paste the None of the above C To cut & paste the
The feature Archive is available in K-DOC application for completed and old completed and old
the purpose of . document. document.

357
Employee Information Portal feature in Payroll PF No,online
Application provide employee to view Personal profile PAN Number submission of loan etc All of the above D All of the above
their .
358
Generation of forms Maintain Minutes Book Calculate the filing fee
as per formats and
requirement of
Bank Receipt D Bank Receipt
MCA

359 Which is not a feature of ICAI-ROC application ?


The Payroll application supports three methods of salary Salary Paid in Cash Salar paid by Salary credited to Bank
disbursement are . Cheque/DD All of the above D All of the above
360
Which Tools and Utilities is not supported by MIS Export Journal TCS Backup utilities C TCS
361
Payroll Application ? Voucher
The software provide the facility to generate Billing & ICAI-ROC Billing &
bills,receipts,vouchers and clients outstanding etc Accounting softwatre Payroll Software K-DOC application application A Accounting softwatre
is .
362
A software which provide the structured file ICAI-File Knowledge None of the above
management and knowledge mamnagement management K-DOC application Management B K-DOC application
is . application Software
363
The software provides a complete package to manage Billing & Accounting Payroll Software K-DOC application ICAI-ROC D ICAI-ROC
secretarial requirements & generates forms as per softwatre application application
MCA21 requirements

364
The ICAI-ROC provides the facility to Auto filing of eForms Shares Annual Returs forms
prepare . Records/Certificates All of the above D All of the above
365
The software which provide the Contact eSecretary software Contact Template eSecretary software
Management,Correspondence Management, simplified Management software Management software All of the above A
Mail/Email etc.
366
Correspondence feature of eSecretary application
provide facilities Templates Blank document Outside document All of the above D All of the above
are .
367
To create New Contact and access Contact features are eSecretary software Contact Management Template Management eSecretary software
available in which application ? software software All of the above A
368
is comprehensive package Tax Suite Application Tax Suite Application
that combines Income Tax,Service Tax Application K-DOC application All of the above C
Tax,e-TDS.e-AIR etc.
369
The financial transactions are to be …………. leading to Collected and Sampled and stratified Grouped and Assets and liability Grouped and
different steps in Accounts computed summarized C summarized
Compilation.
370
The methods LIFO, FIFO, Moving Average are Value closing Value clearing stock Value expense Value income A Value closing stock
371
used to …. stock stock stock
The report prepared taking the asset and liability type
accounts from the Trial Balance is P & L statement Income statement Balance sheet Asset sheet C Balance sheet
called….
372
The report that depicts operating profit/loss for Trial balance Trading account P & L statement Suspense C P & L statement
373
a period is ….. accounts
The day book contains transactions relating to Income or Sales or purchase Asset or liability Profit or loss B Sales or purchase
374
……… expenditure
The Bills Receivable details are maintained in a Journal sheet Voucher debtors Sundry debtors Original entry C Sundry debtors
375
……..
Customers Assets Liabilities Suppliers D Suppliers
376 Creditors ledger has details of your dues to ……..

The sundry debtors are placed in the Balance Income side Assets side Expense side Payable side B Assets side
377
sheet on the ……
The first step in Tally before any transaction is entered
or saved is creating a ……… File Company Project Application B Company
378
To configure country specific details use the F10 F2 F12 F11 C F12
379
function key……
Tally Secure Tally Pack Tally Group Tally Vault D Tally Vault
380 Identify the security mechanism used in Tally.

The basic document where transactions are Ledger Journal Voucher Trial Balance B Journal
381
entered chronologically is….
After selecting a company in Tally, you will be in Accounts of Tally Gateway of Tally Entry of Tally Groups of Tally B Gateway of Tally
382
the……
Tally software is based on ……… accounting Sales Production Mercantile Manufacture C Mercantile
383
system.
Identify the primary group of capital nature that uses
bank account and cash in hand as sub Fixed assets Current assets Loan assets Capital assets B Current assets
groups.
384
Vouchers Groups Journal Ledgers D Ledgers
385 All financial entries in Tally are done using…….
The Direct expenses, Purchase account, Direct Capital nature Expense nature Revenue nature Income nature C Revenue nature
386
income are primary groups of …..
The option to delete a sub-group is admissible Alter Delete Display Shift A Alter
387
through the menu……
The behavioural attributes of this group cannot Sub-group Ledger-group Primary-group Alter-group C Primary-group
388
be changed.

Credit limits for personal accounts and


Single Multiple Sub-group Alter-group B Multiple
branches can be done in the ledger mode……
389
We are not allowed to delete a ledger from this Single Sub-group Alter-group Multiple D Multiple
390
mode.
All account heads except Cash and Bank are Sub Ledger Group Ledger master General Ledger Journal Ledger C General Ledger
391
placed in the…… master master master master
These are the basis for analysis by potential investors, Journal and Ledger P & L Account and P & L Account and Voucher Account and P & L Account and
banks etc. Journal Balance Sheet Balance C Balance Sheet
Sheet
392
Identify the primary group of capital nature that has the
sub-groups: Bank OD Account, Bank Expenses Income Assets Loans D Loans
OCC Account.
393
The primary document for recording all Journal Trial sheet Voucher File C Voucher
394
financial transactions in Tally is the……
You can customize the voucher entry screen F13 F12 F10 F11 B F12
395
using the function key…….
Identify the voucher type that records fund transfers
between cash and bank accounts. Credit Note Payment Receipt Contra D Contra
396
This voucher type records adjustments between Sales Receipt Payment Journals D Journals
397
ledgers.
The use of classes for payment, receipt and contra Double entry mode
vouchers enables data input in …… List entry mode Choice entry mode File entry mode B List entry mode
398
The details of a voucher entry can be given in Comment Memo File Narration D Narration
399
the …….
Sales account, Sales Ledger account, Bank Suppliers account, Buyer's account, A Sales account, Sales
tax account account Purchases account Cash account tax account
The credit note voucher can hold account types: ……..

400

The suffix and prefix details for the voucher


End of a month First of a year First of a month End of a month C First of a month
type can be made applicable only from the …….
401
The voucher used to record all bank and cash Credit Note Contra Sales Note Payment D Payment
402
payments is …..
Liability Income Sales Asset D Asset
403 The accounts that the business owns is called ….

Tally's age-wise analysis considers the voucher's Previous date Effective date Current year Configured date B Effective date
404
……
Arrange the steps in generating the books of accounts.
1. Create Trial balance
2. Create new ledgers
3. Generate Day Books
4. Update journals for financial transactions 1, 2, 3, 4 1, 3, 4, 2 2, 4, 3, 1 3, 4, 2, 1 C 2, 4, 3, 1

405
For day-to-day transactions the voucher types Credit purchase Cash purchase Both A and B Contra purchase C Both A and B
406
used are
Say for example a payment is made to a creditor ABC -
Rs.10000 by cash, it can be Loan Payment Receipt Sales B Payment
entered into the voucher type…..
407
Identify the purchase voucher type, the
transaction for purchase of 10 CPUs,10 monitors by Credit Purchases Cash Purchases Expense Purchases Debit Purchases A Credit Purchases
credit.
408
Identify the voucher type to be chosen for the
sale of computers to Anand by cash @ Rs.210000 per Cash Ledger Sale Sheet Stock Journal Purchase Voucher C Stock Journal
unit.
409
A bank overdraft repaid by cheque at Rs.25000 Payment Receipt Debit Contra D Contra
410
can be made in the voucher…..
The financial statement that consolidates ledger Balance sheet Profit & Loss Trial balance Journal C Trial balance
411
balances is ….. statement
The F9 function key in the left side of the Accounting Inventory reports P & L reports Expense reports B Inventory reports
412
Gateway of Tally screen displays the…… reports
The option on the Gateway of Tally that will generate
the P&L account statement is….. Net Loss Net Income Net Profit Net Account C Net Profit
413
The expenditure for running the business for a Expense Example Taxes Income A Expense
414
period is …..
This displays the balance daywise for a selected Record book Ledger book Journal book Day book D Day book
415
voucher type.
The feature in Tally to analyze accounts of a Ratio analysis Account analysis Data analysis Transaction A Ratio analysis
416
company is….. analysis
The age-wise statement is displayed based Income Payables Expenses Loans B Payables
417
on……
The ratio analysis of receivables can be done Bill date Effective date Voucher date Previous date A Bill date
418
based on……
Name the statement that helps the management in the
decision making process. Data flow Funds flow Stock flow Cheque flow B Funds flow
419
Identify the budget type which is chosen where On closing balance On net transactions
transaction amounts are to be monitored. On net credit flow On net transactions On net cash flow C
420
Choose the budget type to be used where bank On closing balance
accounts balances are to be monitored. On net credit flow On net transactions On net cash flow A On closing balance
421
The management that needs to consolidate the Consolidate
accounts of its various enterprises uses ……. in company Group company Set company Alter company B Group company
Tally.
422
Identify the user who can access audit trails in Owner Data Entry operator Accountant Administrator D Administrator
423
Tally.
Identify the accounting feature in tally that facilitates Month-less Yearly-entry accounting Period-less accounting Transaction- number Period-less accounting
splitting financial years for a company accounting accounting C
data.
424
Identify the account type by the rule: "Debit the Real accounts Personal accounts Nominal accounts Expense accounts B Personal accounts
425
receiver and credit the giver".
The tracking of changes in vouchers and ledger Tally Vault Tally Audit Tally Report Tally Group B Tally Audit
426
masters is done by…..
Tally can import data from other programs and creates a
log about the activity in the file….. Tally.imp Tally.cfg Tally.exp Tally.ole A Tally.imp
427
Import and export of data between Tally and other
programs is possible with the help of….. OLE DBMS ODBC MS-XLS C ODBC
428
The manual option of voucher numbering leads Auto numbers Duplicate number Sequence number Range number B Duplicate number
429
to…..
The Tally audit trail tracks changes made to more than 30 less than 30 Days old more than a day more than a week A more than 30 Days
430
vouchers that are ….. Days old old old old
The ratio analysis of Bills Receivables or Bills
Payables can be displayed with the function key….. F5 F8 F12 F6 D F6
431
The test data generated with correctness proof, data
flow analysis and control flow analysis Test item block Test data pack Test program pack Test record pack B Test data pack
tools is called….
432
When a real-time system is simulated to generate the Parallel simulation
same output as the real-time Parallel trailing Tracing parallel Parallel coding D Parallel simulation
system, the technique is called….
433
When an auditor expands the extent of substantive Cross reference lister Formulate flaw Correct lister Formulate correct B Formulate flaw
tests to determine the impact of defects on the hypotheses hypotheses hypotheses
attainment of program
objectives, the methodology is….
434
This is an important control in systems that use digital
signatures for authentication purposes. Public audit trails Random audit trails Sample audit trails Data audit trails A Public audit trails
435
The first document where the transaction is Ledger Liability Voucher Expense C Voucher
436
entered is called a …..
Selecting transactions based on a sampling rate Transaction Systematic sampling Simple sampling Demographic B Systematic
437
is called …. method. sampling sampling sampling
The capability of the generalized audit software to read File size File data File access File reorganisation C File access
different data coding schemes, different record formats
and different file structures is….

438
The audit software capability of frequency Sort and merge Sampling nth item Formatting output Classify data on a D Classify data on a
439
analysis is to…. files criteria criteria
The audit functions of attributes sampling,
variables sampling, stratified sampling are included in …. Stratification Selection Statistical Reporting C Statistical
functions.
440
Identify the functional limitation of a generalized audit Ex Post Auditing Only Analytical review only Limited ability to Limited ability to A Ex Post Auditing Only
software that enables evidence collection only on the determine Propensity Verify Processing
state of an for logic
application system after the fact. Error
441
Sorting, creating, and Data retrieval, code Reading data, selecting Specific tasks with D Specific tasks with
printing files comparison and analyzing original or modified original or modified
The purpose-written audit programs are used for….. information programs programs

442
Picture of a transaction as it flows through the Program Track Snapshot Picture C Snapshot
443
computer systems is called…..
Identify the type of audit when auditors are members of
the systems development team. General audit Post audit System audit Concurrent audit D Concurrent audit
444
The document used for posting of accounting Voucher and Ledger and trial Balance sheet and Journal and D Journal and ledger
445
transactions is …….... journal balance trial balance ledger

When the debit total is greater than credit


Income Debit Credit Expense B Debit
total, the amount appears in the column.
446
447 Collection of instruction is called a procedure batch command program D program
The processor uses this workspace as a scratch Monitor Processor Keyboard Memory D Memory
448
pad during processing.
printers use light to produce the dots impact printers drum printers non-impact thermal printers C non-impact
449
needed to form pages of characters desktop printers desktop printers
VLSI stands for….. Very large scale Very limited silicon Value limited scale ic Very large silicon Very large scale
Integration integration integration A Integration
450
Hardware components in a computer are operating system, control program, monitor, program, CPU, memory, input D CPU, memory, input
, , , bootstrap, interpreter, assembler, keyboard, bus device, output device device, output device
kernel, shell compiler

451
The data width of a Pentium 4 computer is …… 16 bits 8 bits 32 bits 1 k bits C 32 bits
452

software helps to do a specific task for operating system application software windows 95 interpreter B application
453
the user software
The unit which executes addition, subtraction,
multiplication and division operations is …… CPU ALU MU CU B ALU
454
converts a high level language into processor compiler assembler coder B compiler
455
machine language
The instructions to be executed by the processor are Instruction register
loaded from memory into the Instruction unit Process register Program counter D Instruction register
456
457 is/are a popular front end tool visual basic power builder SQL * plus all of the above D all of the above
The results of a process are stored into ……… Accumulator General-purpose Process register Instruction A Accumulator
458
Register register
translates assembly language program into
machine language instructions compiler interpreter assembler processor C assembler
459
The memory that stores data as a series of memory cells
that can be accessed sequentially DRAM SAM SRAM ROM B SAM
is……
460
computers are used in large organizations for none of the above
large scale jobs which have mainframes super computers micro computers A mainframes
large storage capacities
461
The technology used to accelerate the Processor bus Cache memory BIOS memory ROM memeory B Cache memory
462
processing of a computer is ………
is responsible for all calculations and logical arithmetic and logic central processing unit none of the above arithmetic and logic
operations that have to be performed on control unit unit B unit
the data
463
The memory used in a computer's BIOS chip Cache memory SRAM Optical memory Flash memory D Flash memory
464
is……..
printer use laser light band printer drum printer non impact printer none of the C non impact printer
465
above
The process of swapping information between Fragmentation Disk full Thrashing Paging C Thrashing
466
the RAM and hard disk can cause
software enhances the user to enter data management electronic spreadsheet none of the above
,store, manipulate and print any text word processing B word processing
467
The standard system bus was replaced by frontside and Dual independent Dynamic memory bus Dual independent bus
backside bus called……. bus Cache memory bus Dual interface bus A
468
Combination of alphabetic and numeric data is alpha numeric alpha beta numerous alpha number and A alpha numeric
469
called data alpha
is the temporary storage place for my computer recycle bin Microsoft none of the B recycle bin
470
deleted files exchange above
The DSP,DAC,ADC,and ROM are parts of the …… Graphics card Memory card Sound card Media card C Sound card
471

Processed data is called data datum information none of the C information


472
above
The bus whose widths are 32 or 64 bits is ISA PCI AGP MCA B PCI
473
called……
language consists of strings of binary assembly machine language high level language none of the B machine language
474
numbers language above
The maximum resolution of a standard SVGA 1024*640 780*1024 1280*1024 1280*680 C 1280*1024
475
adapter is ……
capability supports concurrent users multiprocessing multithreading multiplexing none of the D none of the above
476
doing different tasks above
… synthesis method uses recordings of Amplitude Frequency Pulse Wavetable D Wavetable
477
actual instruments.
The model through which the relationship is diplayed processing model none of the above
between data and information is model system model C system model
called
478
The instrument that can produce continuous Printer Plotter Scanner Pen B Plotter
479
lines is…..
looks like a ordinary credit card but
incorporate a microprocessor and memory smart card RAM ROM Firmware A smart card
chip
480
PPM , CPS are units used to measure the Speed Quality Resolution Lines A Speed
481
printer's …..
The PCL and postscript are defacto standards Page definition Page description Pixel definition Page definition B Page description
482
for…… limit languages languages lines languages
A laser printer has RAM for downloading fonts Font catridges Dynamic catridges Soft fonts Soft settings C Soft fonts
483
called the…….
The characteristic which refers to how sharply a pixel
appears on the monitor is called….. Convergence Resolution Dot-pitch Size A Convergence
484
The faster the refresh rate, the lesser the Sharpness Resolution Flickers Size C Flickers
485
monitor…..
Computers can be classified based on space occupied, cost, performance their size, performance, cost input, output, C size, performance,
, and price, no. of users ratio performance ratios cost
allowed

486
The software used for layout of newsletters and Application software Application
magazines along with text and images is Desktop publishing development Data modelling B Desktop publishing
called……
487
The number of bits used to represent a pixel in a Size of image Colors and shades of Resolution and Signal and refresh B Colors and shades of
monitor decides the ……. gray that can be sharpness rate gray that can be
displayed displayed

488
The input device that utilizes a light-sensitive detector
to select objects on a display screen is Touch screen Touch pad Light scan Light pen D Light pen
called…..
489
The most commonly used scanner technology Charge-coupled Optical character Photo-multiplier Optical sensitive A Charge-coupled
490
is…. device recognition tube tube device
Identify the type of mice that uses optical Mechanical Optomechanical Optical Joystick B Optomechanical
491
sensors to detect motion of the ball.
Identify the input device that consists the puck Trackball Joystick Tablet Pen C Tablet
492
and the stylus.
Identify the disk which has an access time of Zip disk Floppy disk Winchester disk Jaz disk C Winchester disk
493
30ms.
A set of tracks across a set of platters in a hard Disk Cylinder Spiral Block B Cylinder
494
disk is called a……
The bus used to connect a CD-ROM to your SCSI PCI MCA DAT A SCSI
495
computer is…..
The digital audio tape with the capacity of 24GB of data
uses the technology called ….. Hyper circles Fero magnetic Linear velocity Helical scan D Helical scan
496
is the Worlds largest computer Ethernet Internet ARPANET None of the B Internet
497
network . above.
The model used to describe the relationship between
data and information is called System model Data model Information model Logical model A System model
498
The backward compatible disk that has high SuperDisk Jaz disk Zip disk Hard disk A SuperDisk
499
density-120MB is called….
The maximum capacity of an optical disk is …… 700 MB 6 GB 630 MB 2GB B 6 GB
500

Which of the auxiliary storage devices uses the constant


angular velocity access technology? Super disk DAT-ROM CD-ROM MO drives C CD-ROM
501
The… is an auxiliary sequential access non- Winchester disk Zip disk Magnetic tape Magneto-optical C Magnetic tape
502
volatile storage device. drive
The portable device that optimizes the features of the
floppy and the CD-ROM is…. Hard disk Jaz disk DAT drives MO drives D MO drives
503
The important central module of an operating Memory module Data module Kernel module I/O module C Kernel module
504
system is the…..
Identify the function of the operating system that Data management
manages the tasks waiting to be processed. Job management I/O management Batch management A Job management
505
This function of the OS manages allocation of a Virtual memory storage Virtual memory
minimum main memory to tasks. Disk storage Memory storage Extended storage C storage
506
Identify the multitasking type that slices CPU Paralleling Cooperative Dividing Preemptive D Preemptive
507
time to each program.
The OS which allows different parts of a single Multithreading Multiprocessing Multitasking Multiprogrammin A Multithreading
508
program to run concurrently is….. g
are used in large organizations for mini computers microprocessors PCs mainframes D mainframes
509
large scale jobs
510 A super computer uses a bus width of…… 16 bits 256 bita 64 bits 8 bits C 64 bits
The OS that monitors external activities with Multi-user Real-time Multitasking Multithreading B Real-time
511
timing constraints is….
The 32bit operating system for desktop version that Win 2000 Win 2000 Win 2000
replaces Win 9x is….. Win 2000 server Win 2000 datacenter professional advanced server C professional
512
The high-level logical disk structure which defines the Frame allocation Format allocation type File allocation table File allocation table
way the entire disk is organised is table File allotted table D
…..
513
514 A collection of sectors on a hard disk is a Block sector Cluster Block Table B Cluster
The FAT system that provides long filename support and
was written using protected-mode FAT16 VFAT NTFS FAT32 B VFAT
code .
515
Identify the file system that provides
networking,security,compression, large file FAT16 VFAT NTFS FAT32 C NTFS
support….
516
The logical directory structure has a base of the Root directory Main directory Start directory Tree directory A Root directory
517
tree called the……
The process used to optimize the disk space by
arranging files contiguously is ….. Formatting Defragmentation Allocation Partition B Defragmentation
518
Choose the level of RAID that offers disk Level 0 Level 2 Level 1 Level 3 C Level 1
519
mirroring for fault tolerance.
Identify the archive formats found on Unix- Zip, LZH, ARJ Exe, zp, tz Doc, xls, wzp Tar, gz, taz D Tar, gz, taz
520
based Internet sites.
devices are responsible for feeding input output feed write A input
521
data into the computer
When a processor executes one billion floating- point
arithmetic operations per second, is Nanoflops Tetraflops Megaflops Gigaflops D Gigaflops
called…..
522
Identify the window screen part that indicates the name
of the window, application or Title bar Menu bar Vertical bar Control bar A Title bar
document.
523
The button on the title bar of a window that
displays the menu to control the size of the window Scroll box Control box Minimize box Maximize box B Control box
is…..
524
The mouse operation that is used to move
windows and icons to different locations is ….. Click Double click Dragging Scrolling C Dragging
525
The start button,tray and shortcuts are Control panel Title bar Task bar Command menu C Task bar
526
important features of the …….
The start menu option that keeps track of your Documents Programs Accessories Favorites D Favorites
527
important websites is …..
If you want the recycle bin capacity to be distributed Configure drives Configure capacity Configure drive Confirm partition Configure drives
across partitions, you must use the independently independently partitions capacity A independently
option …… independently
528
The feature to retrieve deleted files from the Re-paste De-link Restore Re-copy C Restore
529
recycle bin is …..
The feature which enables to synchronize files My Documents My Briefcase My Folder My Directory B My Briefcase
530
between a floppy and disk is …..
A file with the pdf extension can be viewed with Adobe Acrobat Adobe Viewer Notepad Wordpad A Adobe Acrobat
531
the application….. Reader Reader
The remote administration access to view shared Net Neighbourhood
resources on the network is….. Net Tracer Net Drive Net Watcher D Net Watcher
532
is the capability of the o/s to run multiprocessing multithreading multiplexing multitasking D multitasking
533
numerous applications simultaneously
The processor responsible for communication to and Front-end processor Host processor Backend processor Terminal processor A Front-end processor
from all the remote terminals connected is termed as
………

534
Which is the following is the correct types of Resonableness Compare Un-compare Randomness A Resonableness
535
Record checks on input data ?
Which is the correct types of Batch Checks ? Control Totals Outdated checks On-line dated Mixed dated A Control Totals
536
checked checks
Which is the need for table level tests ? Controls are required None of the above
Data Integrity for Both A and B C Both A and B
authorization
537
Which is the following is the major points with respect This may make the Their Master & Child
to inter table tests ? entire child tables relationship reference
referenced by the the table from one
master field in the another
main table un- Both A and B None of the above C Both A and B
available

538
Which is the software used by the auditor to take a view Mapping Snapshots Modelling Source comparison B Snapshots
of a file of data or transaction passing through the
system at a particular point
of time ?
539
Which is the software used by the auditor to compare Souce comparison
the source version of a program with a Code compasion Model comparison Exe comparison A Souce comparison
secure master copy ?
540
Which is the techniques whereby the auditor arranges
or manipulates data either real or fictitious, in order to
see that a specific program or screen edit test is doing
Debug Testing Logic Testing Off-line Testing On-line Testing D On-line Testing
its work ?

541
Which is the software used by the auditor to list Log Analysis Mapping Program Library All of the above B Mapping
542
un-used program instruction ?
Which is the software used by auditor to read and Log Analyzers Software Log Analyzers
analyze records of machine activity ? Machine level Executable level Systax level C Software
543
Which of the following reason strongly call for Control & Lack of Visible Absence of Input None of the above
Audit Function ? Transaction Trail Document All of the above C All of the above
544
In IDEA,Data Extraction select data form a file
for further for creating a new file of Extraction Recording Investigation Sorting C Investigation
logically selected records.
545
Identify the field check - "If a set of values is
defined, is the input data one of these defined values?" List Range Slab Digit C Slab
546
Which is the correct types of Field checks on Missing data Blank data Both type None of the C Both type
547
input data ? above
Which is the major points to be consider with respect to To ensure the input Test whether the To ensure the entered To ensure the input
System tests ? data is valid before overall system meet data is saved without data is valid before
entering the the requirement fail entering the value
All of the above A
value specifications

548
In Data analysis techniques, which law is used to
idenfity statistical report on numeric data ? Bend Law Benjamin law Benford Law British Law C Benford Law
549
Which is not a feature of File reorganization with an Linking the identified
auditor perspective? Filtering Sorting Indexing files A Filtering
550
What do you understand by the term, “Data Establish relationship Identify fields, which Identify data, which are Identify whether all Identify data, which
Consistency” in using CAATs? between two or have null values. not in agreement with fields have valid are not in agreement
more tables as the regular format. data. with the regular
C
required. format.

551
Functions involving use of arithmetic operators, which Statistical function Arithmetic function Logical function Relational function B Arithmetic function
enable performing re-computations and re-performance
of results is an example of?

552
Which of the following is a benefit of using CAATs? Identify an audit finding To give assurance to Identify an audit
w.r.t. materiality in an customers about the finding w.r.t.
IT environment performance of the materiality in an IT
File an FIR based on Investigation of fraud in
company B environment
audit finding audit area

553
What is step by step procedure for using Data->Benford's Analysis->Benford's Sampling-> Tools->Benford's B Analysis-
554
Bendford's law function in IDEA ? Law Law Benford's Law Law >Benford's Law
The field check that conforms if data input for a Format mask Data mask Field mask Input mask A Format mask
555
field is in a particular format.
A Benford's Law analysis is most effective on Comprised of similar Without built-in Without assigned
data . sized values for minimum and numbers, such as bank
similar phenomena. maximum values. accounts numbers and
zip codes and with four
or more digits. All of the above D All of the above

556
The field check on a processed data that fails if a field is
not initialized to zero or errors occur Range Sign Overflow Serial C Overflow
during calculation is……
557
In IDEA, blank value data can be extracted by @isblank() as Null Null Is Null A @isblank()
558
using .
The validation checks applied to a field depending on its Field checks Record checks Batch checks File checks B Record checks
logical interrelationships with the other fields in the
record are called …..

559
In IDEA, Summarization, Pivot Table, Stratify, Duplicate
Key functions comes under which Data Analysis Sampling Relation B Analysis
menu.
560
A group of records or transactions that are Physical batches Logical batches Block batches Transact batches A Physical batches
561
contiguous constitute …..
In IDEA, Extraction, Sort, Indices, Search Analysis View Relation Data D Data
562
functions comes under which menu.
… is the type of batch check (group of
records) for all input records of a particular type is done. Control totals Serial number Transaction type Sequence check C Transaction type
563
is centralized Banking Application Software. Core Banking System Core Banking Solution Complete Banking Centralized Banking Core Banking Solution
Solution Solution B
564
565 Flexcube developed by Infosys HCL Technologies TCS I-Flex D I-Flex
566 Quarz developed by Infosys HCL Technologies TCS I-Flex C TCS
The server is a sophisticated computer that accepts Clients Customers Party IP A Clients
service requests from different machines which are
called

567
server has to be a powerful and robust
system as it has to perform all the core Antivirus Server Application Server Web server Clients Server B Application Server
banking operations.
568
IBAS stands for Internet Business Internet Banking Internet Banking Internet Business B Internet Banking
Application Server Application Server Application software Authenticatin server Application Server

569
PBF stands for Positive Balance Post Balance File Positive Balance Positive Balance C Positive Balance
570
File File Flex File
Internet banking refers to a banking Bank Internet Intranet Net banking B Internet
571
transactions routed through the
CPPD Stands for . Computer Planning Computerized Planning Both A &B Computer Planning D Computer Planning
and plant and Policy Department and Policy and Policy
department Department Department

572
The is generally a hardware and it
plays the role of preventing unauthorized access. Date base Server Web server Proxy Firewall D Firewall
573
has several components which have been
designed to meet the demands of the CBS CSB NEFT None A CBS
banking industry.
574
enable data transmission over Switches Firewall Routers Middleware C Routers
575
different networks.
have many ports that are connected to Router Switches Firewall Middleware B Switches
different systems and it facilitates data transmission
with the network.

576
A Proxy server always acts in conjunction with a Firewall Internet Antivirus None A Firewall
577
.
The provides network security by preventing
malicious data from entering the ATM Server Proxy Server Date base Server Web server B Proxy Server
network.
578
is used for authentication. System audit system Domain Controller Network security C Domain Controller
579
administration
Access to a set of servers is controlled by the System audit system Librarian Domain D Domain Controller
580
. administration Controller
is a process of unauthorized entering Data base Hacking Routors Thrashing B Hacking
581
a network. administration
facility provides a customer to access Automatic tele Automated Teller Automated Technical Accelereated Teller Automated Teller
financial transactions in a public place. Machine Machine Machine machine B Machine
582
Core Banking Solutions is a combination of an Network devices Firewall IBAS IBDS A Network devices
583
application software and
The Operational Controls include controls on Physical Access Logical Access Environmental All of the above D All of the above
584
Controls
Application Controls are broadly classified into Input Controls Output Controls Processing Controls All of the above D All of the above
585

controls check that the data Input Controls Output Controls Processing Controls All of the above A Input Controls
586
entered is complete and correct.
Reasonableness check is a . Processing Input Controls Output Controls Management B Input Controls
587
Controls Control
Which of the following is not a module of the Customer ID Accounts Equity Share Clearing Module C Equity Share
588
CBS? generation management management management
Bank guarantees can be Performance Deferred Payment Both A & B None of the C Both A & B
589
Guarantee Guarantee above
SLR stands for Statutory Liquidified Statutory Liquidity Standard Liquidity Ratio Stable Liquidity Ratio Statutory Liquidity
Ratio Ratio B Ratio
590
are record of activities that have taken place None of the above
in the system irrespective of the Logs Index Activity Logs A Logs
modules.
591
The contents of a log includes Activity User details Date and Time All of the above D All of the above
592
performed
Communication and Operations management Firewall security policy
must include which policies? E-mail policy Internet policy All of the above D All of the above
593
is a large data housing infrastructure that
provides high band width access to its ATM Server Data Centre IT EDP B Data Centre
clients.
594
CRR stands for in terms Cash Reserve Ratio Community Reserve Cash Reimbursed
of CBS. Ratio Cash Reversal Ratio Ratio A Cash Reserve Ratio
595
DRP stands for Disaster Recovery Discovered Resources Disastrous Recovery Disaster Recording Disaster Recovery
in terms of Planning Planning Planning Planning A Planning
CBS.
596
are soultions applied when any kind of None of the above
vulnerabilities discovered in networks in Patches Logs Access Rights A Patches
the CBS system.
597
can be viewed only by the DBA of Access Rights Database Log Operating System Activity Log B Database Log
598
an organisation. Logs Log
KYC stands for Know Your Customer Know Your Connection Know Your Customer
in terms Know Your Company Know Your Centre A
banking.
599
In CBS, the Accounts Management module deals with Creation of Savings Creation of Current
Account Account Overdraft All of the above D All of the above
600
Soft copy of the ATM journal rolls is Stock Journal Journal Report Electronic Journal All of the above C Electronic Journal
601
called
Data centre servers are known Application Data Base Servers Web server All the above D All the above
602
as . servers
The ATM switch consists of a computer server Both A & B None of the C Both A & B
603
above
testing should be done to
check the unauthorised access to the network in CBS. Penetration Hierarchical Top down Bottom up A Penetration
604
enables transfer of money from one bank to None of the above
another in "Real time" and on "Gross" EFT NEFT RTGS C RTGS
basis.
605
In system money transfers are done on a one NEFT, RTGS RTGS,NEFT EFT,RTGS None of the above B RTGS,NEFT
to one basis while in system transfer is done in
batches.

606
All the money transfers take place in the books Beneficiary bank Central bank(RBI) Remitting bank None of the B Central bank(RBI)
607
of the above
EFT and NEFT work on basis DNS HSM SSM All of the above A DNS
608

system of money transfer is primarily NEFT RTGS EFT All of the above B RTGS
609
used for large transactions.
In RTGS, the STP generates an for every
outbound RTGS transaction. UTN UTE UTR UTS C UTR
610
UTR full form Unique Transaction Unidentified Unique Transmission None of the above Unique Transaction
in Reference Transaction Reference A Reference
terms of CBS. Reference
611
STP stands for Straight Through Straight Temporary Strict Through None of the above Straight Through
in terms of Processing Processing Processing A Processing
CBS.
612
is a method of creating virtual VLAN LAN WAN MAN A VLAN
613
networks within a physical network.
CMS stands for Control Management Cash Management Core Management Centre Management Cash Management
in terms System System System System B System
of CBS.
614
Which of the following statements is true? Audit of internal Systems audit are Audit of controls in any None of the above Systems audit are
controls is not important for the banking environment is important for the
needed at all verification of the performed using verification of the
internal controls software audit B internal controls

615
The Management Controls does not include Managing of Assets Formulating a security Developing a business Laying down A Managing of Assets
policy continuity planning procedures for
system
development
616
is supported by advanced technology Core Banking Solution Core Banking Solution
infrastructure and has high standards of Firewall Internet banking Web centre C
business functionality.
617
CBS Software resides in a Central application server Central Office Data Central Office Data
which is located in the ATM Data centre Middleware Web centre Centre. D Centre.
618
A that runs the core banking solutions (CBS) Central Application Domain Name Server Central Application
and is centrally accessed by the branches. ATM Server Server Database Server B Server
619
The of the application is capable of only
entering the data at the end point that is System version Application Version Client version Firewall C Client version
branches.
620
The application server would be placed in a trusted Virtual Local Area Wide Area Network Personnal Area Virtual Local Area
inside zone in a separate Network Local Area Network Network A Network
621
Application software would access the Data base server ATM DATA Server Domain Name Application A Data base server
622
Server Server
are capable of being connected only when
devices are connected to a switch. LAN Virtual Networks MAN WAN B Virtual Networks
623
Data communication between VLANs can be
controlled as per business requirements. 1 2 3 4B 2
624
A special feature of STP is that number Unique Transation PIN NO Uniform Transaction None C Uniform Transaction
for any outbound RTGS transaction is generated by the Referrence Reference Reference
STP System.

625
refers to the process of developing Application Software Development Server Development System Development System Development
software which would produce the required output Development
from the input provided of course, using the necessary
hardware and communication systems. D

626
The is essential to ensure that Review Management RTGS Log management Authorized C Log management
computer security records are stored in sufficient detail Controller
for appropriate period of time.

627
Which of the following is erroneous statement in case Unit test, system Well documented Implement new/ It is important that It is important that
of Change Management Control? test, integration test process should be changed programme as correct latest version correct latest version
– all should be there incorporating all per schedule. of programe is used of programe is used
carried out. the changes. but version number but version number
need not be D need not be changed.
changed.

628
With respect to the customer changing the Pin at the Old offset value used Old Pin verified using Natural Pin remains the Old offset value Old offset value used
ATM which procedure is the ”false“ procedure? to derive new PIN. HSM/SSM. same. erased and new to derive new PIN.
offset value
A
generated.

629
IN CBS, changes to the application server are not made None of the above
directly to it, instead done first on a Trail server Validate server Test Server C Test Server
630
All the various servers in the central data centre LANs VLANs WANs MANs B VLANs
631
are seggregated through
The is a complete process in the computer Consalidation Password Policy protection Validation D Validation
so that it ensures that data that is fed in conforms to
certain prerequisite conditions.

632
When the central Data base is busy with central end of
day activities or for any other reason, the file containing
the account balance of the customer is sent to the ATM
Centralised Data base Central Office Data
switch. Such a file is called Positive Balance File Application Server A Positive Balance File
security Centre.

633
Bank mate is developed by the Infosys HCL Technologies TCS I-Flex B HCL Technologies
634

The IBDS is located in a Militarised zone City Zone State zone demilitarised D demilitarised zone
635
zone
The main components of Internet Banking Web server IBAS IBDS All the above D All the above
636
system consist of
Copy of the Anti Virus Software was updated promptly None of the Above
and regularly at the Data Centre and pushed into all of
the servers and in all the systems in the branches by
Hacking Method Push-pull method Both A &B B Push-pull method

637
The which is also residing in the server at Application Software Application Server Application Software
the branch actually does the banking Sytem software utility software C
operations.
638
In Core Banking concept all the systems of the bank are
connected to the Central office by means of a
connectivity which may be either a
local line Leased line Broadband None B Leased line
or a dial up line.

639
The is generated by the software and directly Personal Identification Net transaction ID NO Personal Identification
sent to equipment for printed the Pin 16 digit number Number ATM No B Number
Mailer.
640
would also include the existence of built
in controls in the system to ensure proper processing of
input data so as to provide the required output.
Output Control Input control Process Control Data Control C Process Control

641
refers to an arrangement wherein the
issuing bank acts on the request Letter of Credit Letter of Tax Letter of Payable Letter of Receible A Letter of Credit
and instructions of a customer.
642
is a process by which the bank Business Recovery Business Continuity Disaster Recovery Business Continuity
ensures the maintenance and recovery of Planning Planning Planning None B Planning
operations.
643
At which phase of testing the version of Programmer User testing (a) & (b) both None of above C (a) & (b) both
644
software is called “ beta version”? testing
645 Finacle developed by Infosys HCL Technologies TCS I-Flex A Infosys
In an Organization structure of IT Department which of Database Network administrator Network Administrator Tape Librarian and B Network
the following function is incompatible? Administrator and and Database and Security database administrator and
Security Administrator. Administrator. administrator. Database
Administrator. Administrator.
646
The number that is stored in the ATM switch is Pin No - offset value Offset Value - Pin No - Natural Pin
the difference of which of the following number? Offset value - Pin No Pin No - Natural Pin Natural Pin C
647
The information retrieval of transactions taking place at Soft copy of Hard copy of Electronic Soft copy of Electronic
ATM located at remote locations is Electronic Journal Cash register (a) and (b) both A journal
through journal
648
The number that is generated as soon as the customer
inserts the card in the ATM machine Offset value Pin sent to customer Natural Pin Card Number C Natural Pin
is
649
Which is not a Database management system. Unix Oracle Sybase Foxpro A Unix
650

The data can be entered into a table in the Design Datasheet Dataview All of the Above B Datasheet
651
view.
MS Access provide datatype to create link
to a web page,file,or email address. Link Hyperlink Insert Attached B Hyperlink
652
To make a switchboard appear while opening the Set as database Set as Form startup Set as Switchboard None of the above Set as Switchboard
database. startup Option in Option in Access startup Option in startup Option in
Access Option Option Access Option Access Option
C

653
To add or delete buttons to Switchboard, which option
is used in Switchboard Manager is used. Add Option Edit Option Modify Option Build Option B Edit Option
654
Which of the following data-type is not Text Number AlphaNumeric Date C AlphaNumeric
655
available in MS-ACCESS
The validation can be defined at Table Form Both A and B Report C Both A and B
656
level in Access 2010
A macro can be attached to an event of a A form A report A button All of the above D All of the above
657
control .
The command Design Application performed Close the current Opens a secondary Opens the Switchboard Opens a report in Opens the
action on switchboard. database switchboard. Manager. Print Preview. C Switchboard
Manager.
658
In a Query the data can be sorted based Single column Multiple columns Both A and B None of the C Both A and B
659
above
Switchboard Manager only allows a maximum of
command buttons on a Nine Eight Seven Six B Eight
switchboard
660
MS Access 2010 provides a pane that
contained large list of actions to be chosen,enabling a
wide range of commands that can be performed
Action List Action Catalog Action query Action Box B Action Catalog

661
SQL is considered to be a 2GL 3GL 4GL None of the C 4GL
662
above
Which action in MS Access macro applies a fliter DoFilter FindFilter ApplyFilter UseFilter C ApplyFilter
663
or query to a table,form or report.
Opens a query in the Datasheet view, Design view, or
Print Preview which macro action used OpenQuery ShowQuery RunQuery FindQuery A OpenQuery
in MS Access.
664
Among +, <>, MOD, AND, <= operator which + MOD AND <> B MOD
665
operator has the highest priority.
The Strcomp() function is a type Math Financial Text Date & Time C Text
666
function.
The SGN() function is a type Math Financial Text Date & Time A Math
667
function
Which of the following symbol is used to write a [] () {} # B ()
668
sub query
When you create a field using text data type in
MS Access 2010, by default field will have 255 256 258 128 A 255
character.
669
To export an access table to an XML File, which of the Right-click the table Go to External Data - Right-click the table Both A and B A Right-click the table
below steps must be followed? and select Export - >Export, click on More and select send as XML and select Export -
>XML and select XML >XML

670
If we are using the same table for main query and sub- Alternate names to No need to alternate Aliases name to the
query,we need to the tables name to the tables tables Both A and C. D Both A and C.
provide .
671
Update Query can be used to update Single Record More than 1 record Both A and B None of the C Both A and B
672
in MS Access 2010. above
Delete Query can be used to delete Single Record More than 1 record Both A and B None of the C Both A and B
673
above
How many Primary key constraints can create in Only one Two As many All of the Above A Only one
674
a table .
MS Access 2010 provides queries that can be used for Sum() Count() Avg() All of the above D All of the above
obtaining the aggregated results instead of individual
records are .

675
A function that Counts the set of values that
satisfy the given criteria in MS Access 2010 CountA() Count() Countif() All of the above B Count()
is .
676
The operator is used to find the null "= NULL" NULL IS NULL All of the Above C IS NULL
677
records in a table.
DDL Stands for -. Data Design Define Data Data Definition None C Data Definition
678
Language Language Language Language
Aggreagate Query also known as . Group By queries Total query Action query Both A and B D Both A and B
679

Which Query wizard is used to find repeated Simple Query Duplicate Query Cross table Query All of the Above B Duplicate Query
680
records in a table? Wizard Wizard Wizard Wizard
Append Query is used to in a Add Records Delete Records View Records Update Records A Add Records
681
table in MS Access.
Which type of joins not available in Access Inner join Left outer join Right outer join Full join D Full join
682
2010?
A join returns only those rows from both tables that
match on the joining field is Inner join Left outer join Right outer join Full join A Inner join
in MS Access 2010.
683
The query returns all of the rows from left table, and None of the above
also those rows from the right table Right outer join Left outer join Inner join B Left outer join
that is known as .
684
The query using returns all the rows from Right outer join Left outer join Inner join None of the above A Right outer join
right table, and also those rows from the left table that
share a common value on
both sides of join.
685
How can we add a table to the Query Design Select Create-> Add Select Database Tools-> Select Design -> Show Select the table from Select Design -> Show
window ? Table Add Table Table navigation C Table
Pane.
686
can be considered a questions in a Queries Form Reprt Macro A Queries
687
data base.
Operands can be in MS Access 2010. Literals Identifiers Function All D All
688

When you create relationship between two tables, the


Common field's data type should be Text & Number Number & Text different data type Same data type D Same data type
689
Which one is the Second Level of Data Physical level Logical Level View Level None B Logical Level
690
Abstraction?
In example "Hello"+" " +" everyone" ,hello is Text Literal Date Literal Number Literal None of the A Text Literal
691
above
Length("Ms Access") will return the count of 9 8 7 6A 9
692
charcters is .
AND ,OR is a kind of in MS-Access Arithmetic Logical Comparision None of the B Logical
693
2010. above
Comparision operators is also known Arithmetic Logical Relational None of the C Relational
694
as in MS-Access 2010. above
LIKE operator works with in MS Access Text Date Both A and B None of the C Both A and B
695
2010. above
IN operator is used in MS Access 2010. To match the value To find the null records returns true or false None of the above To match the value to
to a set of of given A a set of values
values table
696
Operator precedence is similar to that is follwed None of the above
in Algebra in MS-Access 2010. BODMAS BOMDAS BODSAM A BODMAS
697
Text files that are organized properly fall into Delimited files Fixed-width files Both A and B None of the C Both A and B
698
one of two types are above
To create an unmatched Query using wizard, minimum
required number of table or fields one two three four B two
is .
699
While creating the query, the criteria can be set Only one More than One Field As many field All of the Above D All of the Above
700
in
The key does not accept Duplicate key field Primary key Reference Key None B Primary key
701
and Null values in Field.
In MS Access query which logical operator returns True
if both the expressions compared IF AND AND Both AND LIKE AND B AND
are true.
702
In MS Access query which logical operator returns True
if either of the expressions OR IF OR IS OR LIKE OR A OR
compared are true.
703
Enfore Referencial Integrity option is used to Parent Table Child Table Any one table All of the Above B Child Table
704
restrict enerting data in
In MS Access left("Access",3) function will Acc3 Acc 3Acc ess B Acc
705
return .
Which function is used to converts the text to Lcase() Lowercase() Lower() None of the A Lcase()
706
lower case in MS Access 2010. above
Which function is used to remove leading or trailing None of the above
spaces in a text in MS Access 2010. Remove() Removetext() Trim() C Trim()
707
is contains a set of predefined Expression Design Expression elements
functions in MS Acccess and helps build complex Expression Builder Expression Box B Expression Builder
expression.
708
Which of the following is not the characteristics of a Each Table row Each row/column The order of the rows Each column has a Each column has a
Relational Table? represents a two- intersection represents and columns is specific range of specific range of
dimensional a single data value immaterial to the values known as the values known as the
structure composed DBMS Tuple domain Tuple domain
of rows and columns D

709
Which record will be retrieved if the query criteria is < All values less or Value less than 95 Records with date Records with date
#1/1/11#? more than 1,195 characters before 2011 All of above C before 2011
710
MS Acces 2010 reads and writes to the .accdb file None of the above
format in chunks also known Pages Encrypt pages Base Database A Pages
as .
711
E-R Diagram is Model. Conceptual Structural Model Object Model Interface A Conceptual Model
712
Model
The tab in Expression Builder in which we write Expression Elements Expression Builder
expressions is known as . Operator Button Expression Box window C Expression Box
713
The criteria expression LIKE?B*. Will match all text Will match all text Will match all text Will match all text A Will match all text
starting from B ending from B having second starting with a digit starting from B
character as B

714
queries are useful for summarizing Select query Crosstab query Action query Parameter query B Crosstab query
information, and are somewhat similar to pivot tables in
MS-Excel.

715
While entering record in Datasheet view, in Alphabetical At the end of the Any where in the Beginning of the B At the end of the
716
which order the records can be entered Order table table table table
When you delete the record in form, it deletes Form only Form but not in table Table but not in Form & Table D Form & Table
717
the record from . Form
The controls that are not linked to any field of the table Unbounded Controls
or query on the form are known as ActiveX control Unbounded Controls Graphics Control Bound Controls B
.
718
Which property of the form can be used to insert a
background image in MS Access 2010? Caption Background Record Source Picture D Picture
719
is a report that is inserted in Inner-Report Sub-Report Inside-Report Insert-Report C Inside-Report
720
another report in MS Access 2010.
A bound main report is based on a Table or query,Inner- Table or query,Main- Table or query,Sub- None of the above Table or query,Sub-
and its contain Report Report Report C Report
realted information.
721
DDL stands for Data Definition Data Defined Language Detailed Definition Data Detailed Data Definition
Language Language Language A Language
722
is used to insert values in Table Query Report Form None A Query
723
directly.
A used to compare multiple values of
categories or differences over a period of Pie Chart Area Chart Bar Chart Column Chart D Column Chart
time.
724
A used to compare trends over a Pie Chart Line Chart Bar Chart Column Chart B Line Chart
725
period of time.
To create a read-only copy of the database, which of the
following file format can be used? .ACCDB .ACCDE .MDW .ACCDT B .ACCDE
726
The database administrator created a split database and Front-end database
created a front-end database and back-end database
file.Which of the file should be stored on the server ?
Back-end database Both of them None of them B Back-end database

727
To make database package and digitally sign using which File- File->New->Save File->Save as->Save File- File->Save&Publish-
option in Access 2010 ? >Save&Publish- Database as- Database as- >Save&Publish- >Save Database as-
>Save Database as- >Package and sign >Package and sign >Save Object as- >Package and sign
>Package and sign >Package and sign A

728
In which formats can the Collect Data through HTML and InfoPath Visual Basic Application
email message feature can send the data entry form? Access Forms Excel attachment A HTML and InfoPath
729
Once a mail is sent using the collect data through email Export to Outlook Options in Tool menu Manage replies All of the above C Manage replies
message feature in Access 2010. of Access
The mail status can be checked
using .
730
The type of data cannot be collected using
Collect data through email Text Number Date/time AutoNumber D AutoNumber
messages.
731
What is the memo data type field used for? To add table To store objects For long text entries For shout text entries C For long text entries
created in other of no more than 255
programs characters

732
The filter By selection feature allows you to filter: Those records that Records based on a Records that meet any All of above A Those records that
match an entity in a criterion you specify of several criteria you match an entity in a
field specify field

733
DML stands for Detailed Maintaining Data Maintaining Data Manipulation Detailed Data Manipulation
Language Language Language Manipulation C Language
Language
734
In SQL, having clause is used for For ordering records specifying conditions specifying
with group by clause updating records None B conditions with group
by clause
735
Which editor was provided for use with Access The Visual Basic Notepad The QuickBasic All of above B Notepad
736
Basic? 1.0 editor editor
How do you update Pivot Table report data after Save your changes, Select the Pivot Table Click the report, and on Click the report, and
changes are made to the source data? close the workbook, worksheet and press F9 the Pivot Table toolbar, on the Pivot Table
and then reopen on the keyboard click the refresh data toolbar, click the
All of the above C
it. button refresh data
button
737
What are the different views to display a Table Datasheet View Design View Pivote Table & All Of Above D All Of Above
738
? Pivot Chart View
Which Of The Following Creates A Drop Down Ole Object Hyperlink Memo Lookup Wizard D Lookup Wizard
739
List Of Values To Choose From?
A Enables You To View Data From A Table
Based On A Specific Criterion Form Query Macro Report B Query
740
The Database Language That Allows You To DCL DML DDL None Of Above A DCL
741
Access Or Maintain Data In A Database
DCL Provides Commands To Perform Actions Like Change The Insert, Update Or Authorizing Access And None Of Above C Authorizing Access
Structure Of Tables Delete Records And Other Control Over And Other Control
Data Values Database Over Database

742
Which is not a Database Model ? Network Database Relational Database Object Oriented Structureed Structureed Database
Model Model Database Model Database Model D Model
743
744 Which Of The Field Has Width 8 Bytes? Memo Number Date/time Hyperlink C Date/time
This Is The Stage In Database Design Where One Data Definition Data Refinement Establishing None Of The Above A Data Definition
Gathers And List All The Necessary Fields For The Relationship
Database Project.

745
Whenever a tables gets update, the dependent Not update update automatically have to update never update B update
746
query will manually automatically
The Third Stage In Designing A Database Is When We Relationship Join Query None Of These A Relationship
Analyze Our Tables More Closely And Create A
Between Tables

747
How does a query-based report differ in design to a The reports are It doesn’t It doesn't have as many The only report type B It doesn’t
report based on just one table? restricted in size. design options. available is the
Design
Report.
748
How would you include some plain text into a mailing Type the text Use the Mailing Use the >> button. Use the Mailing
label report? directly into the Use the > button. label wizard text C label wizard text
label. option. option.
749
In a Microsoft Access 2010 report, the page numbering
would most likely be placed into Report Footer Section Header Page Footer Page Header C Page Footer
the:
750
If you wished to present a professionally looking form All The tools of the Form Wizard All The tools of the
on screen that would show all the necessary form design control Columnar form design control
information, which of the following form design tools gallery. gallery.
Pivot Table Pivot Chart C
would you most likely use?

751
What are the benefits of an ACCDE Optimizes memory Protects the VBA code
file in Access usage and improves from being viewed or
performance. edited while still
Reduces the size of
allowing it to run. All of the above D All of the above
the database

752
An .ACCDE file is a version of the Fixed-down Locked-down Open-down None of the B Locked-down
753
original .ACCDB file. above
Which type of the query is used to accept the value Make Table Query
from the user while executing the query Update Query Delete Query Parameter Query D Parameter Query
and fetch records accordingly
754
To encrypt the databse in Access 2010 must be opened Open Secure mode Open Exclusive mode Open Exclusive mode
in the . Open Inclusive mode Open Read Mode C
755
To extract the records based on date field, $ # () "" B #
756
which of the symbol should be used
FIX() is a kind of function in MS-Access Math Date Text None of the A Math
757
2010. above
MS-Access 2010 has added new features of None of the above
to eliminate the need of VBA code Macro Form Report A Macro
758
Encrypting a database does not restrict access to
database objects, but to the Open Modify Read Write A Open
database.
759
The setting for the Security option can be handled File Tab ->New File Tab ->Access File Tab ->Security File Tab ->Access
using in Access 2010. Options, and Options, and selecting Options, and selecting Options, and selecting
selecting the Trust the Trust Centre tab the Trust Centre tab the Trust Centre tab
Centre tab from the from the Access Option from the Access Option from the Access
Access Option window window None of the above B Option window
window

760
To create a split database in MS Access 2010 go Create Tab External Tab File tab Database Tools D Database Tools
761
to which tab?
After spliting database,frontend database Forms Query Report All of the above D All of the above
762
holds .
After spliting database,backend database Tables Forms Query Report A Tables
763
holds .
When an Access database is split, it creates two A back-end database A new database & Old primary database & None of the above A A back-end database
files . & front- end database. secondary database & front- end database
database

764
A Data Access Page is a special type of None of the above
that allows users to interface with database XML page HTML Page Web page C Web page
using Internet Explorer.
765
An is a group of people with a common Company Enterprise Organization Concern B Enterprise
goal, having certain resources at its disposal to achieve
the common goal.

766
can be defined as subject- oriented, Data Models Data Warehouses Data Mines Operational Data B Data Warehouses
integrated, time-variant, non-volatile collections of data
used to support analytical
decision making.
767
databases contain detailed data Operational Non-Operational Subject-Oriented Informational A Operational
that is needed to satisfy processing requirements but
which has no relevance to
management or analysis.
768
Data in the Data Warehouse is Dynamic, Static Non-Volatile, Static Volatile, Static Static, Dynamic D Static, Dynamic
769
, not .
data contains an historical perspective Operational, Informational, Static Informational, Informational,
that is not generally used by the Informational Operational, Static Operational D Operational
systems.
770
The definition of data elements in the data warehouse Masterdata Detaileddata Metadata Basedata C Metadata
and in the data sources and the transformation rules
that relate them, are
referred to as .
771
Data warehouses are not the optimal Structured Unstructured Informational Operational B Unstructured
772
environment for data.
Data Warehousing can be used for Credit Card Insurance Fraud Logistics All of the above D All of the above
773
. Churn Analysis Analysis Management
is the process of Data Analysis Data Warehousing Data Mining Data Modeling C Data Mining
774
extracting patterns from data.
is an approach to quickly Business Processing Online Analytical Product Life Cycle Supply Chain Online Analytical
answer multi-dimensional analytical Management Processing Management Management B Processing
queries.
775
include money, manpower,
materials, machines, technologies etc. Costing Production Sales Resources D Resources
776
The Output of an OLAP query is typically Matrix Columnar Stepped Outline A Matrix
777
displayed in a format.
companies is planning to support tens
of millions of customers with just B2B B2C C2B C2C B B2C
hundreds of employees.
778
Which of the following is the limitation of Open Source Increased Unsuitable for
ERP? Complexities Legal Complexities conventional All of the above D All of the above
applications
779
Which of the following is not an Open ERP Openbravo SQL-Ledger Open-Project ERP5ERP C Open-Project
780
software?
is the process of integrating all the business EDI ERP BPM None of the above B ERP
functions and processes in an organization to achieve
numerous benefits.

781
must consider the fundamental issues of Manager Auditor Top Management Either A or B or C A Manager
system integration by analyzing the organization's vision Commitment
and corporate objectives.

782
The more the number of , the modules process package units D units
783
longer the implementation time.
The user can the company data into multiple
companies as per financial periods Import Export Split Backup C Split
required.
784
is a collection of activities that make one Business Model Business Function Business Process Business Operation C Business Process
or more kinds of input and creates an output that is of
value to the customer.

785
E-Filing of Returns refers to the process of electronically
filing your tax returns through the Intranet Internet Extranet Any of the above B Internet
.
786
Tally.ERP 9 offers a data encryption option Tally Data Tally Data Encoding Tally Vault Tally Data C Tally Vault
787
called . Encryption Conversion
is the process of
exchanging Tally.ERP 9 data between two or more Serialization Randomization Synchronization Asynchronization C Synchronization
locations.
788
The Tally website offers , by which a Tally Forum Tally FAQ Tally Support Tally Chat D Tally Chat
user can communicate with a Tally representative and
get required information.

789
Tally.NET use for centralised Data Centre Control Centre Cloud Centre Administration B Control Centre
790
Account Management. Centre
The data is transferred between the remote location Encoding Decoding Encryption Decryption C Encryption
and the server using a secured mechanism called
.

791
Alias represents in Tally.ERP9. Short name Nickname Code name All of these D All of these
792

If we purchase any Fixed asset in credit, we can Payment mode Receipt mode Journal mode Contra mode C Journal mode
793
pass it from .
Information systems can be designed so that accurate Integrated Isolated Information Non-Integrated Non-Isolated Integrated
and timely data are shared between functional areas. Information Systems Systems Information Systems Information Systems Information Systems
These systems are called
A
.

794
To save entry without any amount, we have to Cost Center Maintain Multiple Allow 0 value entry Use Rej Notes C Allow 0 value entry
795
use . godown
Transfer of materials from one godown to Manufacturing Stock Journal Purchase Journal Both A & B B Stock Journal
796
another godown, use . Journal
While exporting Ledgers from Tally to Web XML Format ASCII Format SDF Format HTML Format D HTML Format
797
Page, we use .
In Service tax Credit Adjustment (%) should be 0.2 1 Both A & B Neither A &B C Both A & B
798
either .
Service Tax Report can be seen from Display > Day Book Display > Account Display > Statutory Display > Statutory Display > Statutory
. Books Masters Reports D Reports
799
Income Tax number of the Company will appear Cash/Bank Book Profit and Loss A/c Reminder Letter None of these D None of these
800
in which report?
A business model is not a model. system mathematical Conceptual Logical B mathematical
801

The approach to ERP is to first develop a Business Model Business Function Business Process Business Operation A Business Model
comprising the business processes or
activities that are the essence of a
business.
802
OLAP systems use concept of OLAP cube called single hyper dimensional multi dimensional none C multi dimensional
803
a cube dimensional
In Tally ERP-9 Remote Access is also known as Networking VB.Net Tally.Net None of the C Tally.Net
804
. above
Accessing data store on a remote location using Internet None of the above
in Tally.ERP9 is called . Local Data Remote Data Internet Data B Remote Data
805
Tally.ERP9 can be classified user in two Local User Remote User Both A & B None of the C Both A & B
806
categories are . above
Which of the following is not a predefined security level
provided by Tally.ERP 9? Owner Public User Data Entry Tally.NET User B Public User
807
The business model is represented in the graphical form flowcharts, flow flowcharts, flow
using and charts, pictures smart art, clip art diagrams graphs, shapes C diagrams
808
Which of the following is/are the data warehousing Identifying and Defining the correct Establishing a data
activity? prioritizing subject level of summarization warehouse help desk
areas to be included to support business and training users to
in the Data decision making effectively utilize the
Warehouse desktop tools All of the above D All of the above

809
is the succession of Business Online Analytical Product Life Cycle Supply Chain Product Life Cycle
strategies used by management as a product goes Processing Processing Management Management C Management
through its life cycle. Management
810
integrates supply and demand BPM SCM PLM CRM B SCM
811
mangement within and across companies.
OLAP stands for . Online Analysis Online Analytical Online Analytical None of the above Online Analytical
Processing Processing Programming B Processing
812
includes transportation from Inbound Outbound Sourcing planning Production A Inbound
813
Suppliers and receiving inventory. Operations Operations planning Operations
Which of the following is not the service area of Logistics Asset Management PLM CRM D CRM
814
SCM?
Which step of the ERP implementation involves, Step 1 Step 2 Step 3 Step 4 B Step 2
educating and recruiting end users throughtout the
implementation process?

815
The system process will address issues implementation upgradation installation migration C installation
such as software configuration, hardware acquisition
and software testing.

816
A review is recommended to pre implementation under process review post implementation None of the above C post implementation
ensure that all business objectives established during
the planning
phase are achieved.
817
In stages, auditors have access to post implementation pre implementation Both A & B Either A Or B A post implementation
rudimentary ERP tools and capabilities for auditing
security configurations.

818
ERP systems provide an access to integrated distributed isolated de-centralized A integrated
819
the data
is a tool that refers to skills, Data Warehousing Business Intelligence Business Intelligence
processes, technologies, applications and practices used
to facilitate better, accurate and quicker decision
Data Modeling Business Modeling D
making.

820
Business intelligence systems are data-driven information driven resource driven none A data-driven
821
Decision Support Systems.
Data warehousing technology is the process of creating
and utilizing the company’s general data historical data operational data none B historical data
822
The data in the Warehouse comes from the
environment and external sources. operational backup data none A operational
823
In essence, SCM integrates management supply and demand supply and demand
within and across companies. supply and chain supply and sortage none A
824
including all fulfillment Inbound operations hybridbound outbound operations
activities, warehousing and transportation to customers. outbound operations operations none B
825
Customer Relationship Management is a business corporate strategic none B corporate
826
level strategy.
Operational CRM provides support to front office back office staff none A front office
827
business processes.
Collaborative ultimate goal is to use CRM's ERP SCM none A CRM's
information collected by all departments to improve the
quality of services provided by the company.

828
Tally.ERP 9 follows the DES encryption decryption cryptography none A encryption
829
method to safeguard the data.
Business Intelligence Systems are data-driven Information Systems Integrated Information Decision Support Non-Isolated Decision Support
. Systems Systems Information C Systems
Systems
830
With technology the characters are
reduced in breadth and user is allowed to input
additional characters which would make the account
Tally Fix Tally Adjust Tally Fit Tally AutoFit C Tally Fit
name, entity complete
and readable.
831
In Tally.ERP 9 provides the user User-defined HTTP-XML based data Unlimited multi- user
with administrator rights and the capability to check the Security interchange support
entries made by the authorised users and alter these
Audit Feature D Audit Feature
entries, if
necessary.
832
is an enabling framework which Direct Web Browser
establishes a connection through which the remote user Access
can access the Client's data without
Web Publishing Tally.NET Email facility C Tally.NET
copying/transferring the data.

833
If we want the company to be connected automatically Allow to Connect Contact On Load Either A or B None of the above B Contact On Load
for remote access on load, the property Company
needs to be set it as Yes.

834
technology is the Data Warehousing Business Intelligence
process of creating and utilizing the company's historical Data Modeling Business Modeling A Data Warehousing
data.
835
BBS stands for bulletin board business broadcasting bulletin none of the above bulletin board system
system system broadcasting system A
836
The Internet is a network similar to ….. Peer-to-Peer Point-to-Point link Port-to-Port Peer-to-Peer A Peer-to-Peer
837
connectivity connection talking connectivity
Each computer on the Internet is identified with 24-bit address 16-bit address 30-bit address 32-bit address D 32-bit address
838
a….
is used to transfer and copy files over iccp ftp uucp none of the C uucp
839
the internet above
A mail server robot can automatically…. Check mails Read mails Respond to mails Delete mails C Respond to mails
840

is a program that helps us to log on to yahoo ftp telnet none of the C telnet
841
other networks above
This protocol is used to check reliability, sequencing and Transmit Transmission Control Communication Transmission Control
flow control. Communication Protocol Telnet Control Port Control Protocol B Protocol
Protocol
842
To check that data reaches the destination in a proper
order, the data packets are assigned…. Order numbers Packet numbers Sequence numbers Data numbers C Sequence numbers
843
The computer which provides FTP, WWW, Mail Client Server Host PC B Server
844
services on a network is called….
Two of the important browsers are lynx,minx netscape,ie mosaic,gopher none of the B netscape,ie
845
and above
The method of accessing files through publicly
accessible server that gives free access to the Public FTP Server FTP Available FTP Anonymous FTP D Anonymous FTP
files is called ……
846
are defined as ways of protocols IP address dns none of the A protocols
847
communication amongst networks above
This file is transferred verbatim with FTP ASCII file BIT file Binary File TEXT file C Binary File
848
service.
849 We can access the Archie server by…… Tunnel WWW Telnet Message C Telnet
The system of interlinked documents is known hot links hyperlink books marks none of the B hyperlink
850
as above
851 The types of Archie servers are ….. Straight Archie Windows Archie Both A and B Neither A nor B C Both A and B
The small programmes that create none of the above
animation,multimedia,real-time games and images applets animation B applets
multi user games are called
852
% telnet archie.ans.net is the command used by Login to Archie Program the Archie Request the Archie Protocol the A Login to Archie
853
the Archie client to…. server Server server Archie server server
USENET is a BBS on scale small large very small none of the B large
854
above
When a computer is connected to the internet Dial-up access Dedicated access Deployed access Service access B Dedicated access
855
through a LAN
The information displayed on the web page graphics,videos,a programms,images,t animation,scripts,e none of the A graphics,videos,au
856
includes , and udio ext xecutables above dio
This tool helps us to locate a file anywhere on FTP Remote Archie Archives C Archie
857
the Internet.
The web pages that represent online home of first page home page welcome page none of the B home page
858
their author are called above
The computer that maps the Internet domain name to Network translator Address Naming server Domain name server Domain relation Domain name server
the Internet numeric address is the ….. server server C
859
is the most popular internet service yahoo service electronic mail search engines none of the B electronic mail
860
above
… is the format of Internet Address. Aaa-bbb-ccc-ddd Aaa.bbb.ccc.ddd Aaa/bbb/ccc/ddd Aaa*bbb*ccc*dd B Aaa.bbb.ccc.ddd
861
d
is a program or a tool that helps us newsgroup telnet ftp archive D archive
862
find a file anywhere on the net
The email address has two parts one is the Domain Net Web Mail A Domain
863
username while the other is the ….
Yahoo,lycos,excite and webcrawlers are search engines web directories database channel B web directories
864

The resources on the World Wide Web are linked with Universal Resource Universal Resource Uniform Resource Uniform Reserved Uniform Resource
the naming format ….. Location Locator Locator Link C Locator
865
GIF is the acronym for Graphical interpreter Graphical interchange Graphical interface Graphical Interface Graphical interchange
formatting Format format format B Format
866
This Net tool provides a stimulating on-line Internet Relay Relay packet Chat messaging Information A Internet Relay Chat
867
discussion environment. Chat transmission chatting
JPEG is the acronym for Joint Pictures Expert Jumbled pictures Joint pictures expert Joint pictures Joint Pictures Expert
Group expert graph graph experimental group A Group
868
The IRC II client program command begins with Percent Slash Line Dot B Slash
869
a ….
The World Wide Web consists of information web pages network mails B web pages
870
connections
The IRC conversations are organized into…. Chats Packets Lines Channels D Channels
871

A hyperlink can be on text only image only text or image neither text nor C text or image
872
image
Identify the output of the IRC command " /list - min 10" Display channels Display chats with the Display channels with Display line with 10 C Display channels with
. with at least four maximum 10 users at least ten users removed channels at least ten users
users

873
Lynx text browser is a web client in which users Self accounts Terminal ping Shell accounts Shell programs C Shell accounts
874
can login with …..
Internet can be defined as internal network network of network intermediate none of the B network of
875
network above network
PPP stands for: Protocol to Point to Point Pin to Pin Port to Port B Point to Point
876
Protocol Points Protocol communication Protocol Protocol
The two major browsers used to surf the Internet are MS Internet Explorer Netscape Navigator and MS Internet Explorer None of the above C MS Internet Explorer
, and Mosaic Mosaic and Netscape Navigator and Netscape
Navigator

877
A web browser provides this hotlist for a user. Book-keeping Bookmarking Menu Bookmarks D Bookmarks
878

The internet is also called as arpanet the net intranet none of the B the net
879
above
The tool to obtain information on the web by menus
and more flexible than Archie is…. Lynx Juggler Gopher Gateway C Gopher
880
The internet is similar to LAN peer-to-peer wan none of the B peer-to-peer
881
connectivity above connectivity
These servers help in searching for words from WINWAIS and WIIS and NETWAIS WINNET and WINSRC and A WINWAIS and
882
a list of databases or documents. WAISMAN WAISLINK FTPWAIS WAISMAN
The net transfers from one place to data parcel packets none of the A data
883
another above
This scripting language is an object based SGMLScript VbScript SunScript JavaScript D JavaScript
884
language and is developed by Netscape.
The net provides interesting services like , scripting,parsing and news,cooking and fine email,file none of the above email,file
and compiling arts retrived,internet C retrived,internet
tools tools
885
The one-way broadcast of live events is called…. Netcast Cybercast Eventcast Livemessaging B Cybercast
886

is the ancestors of the internet dnet arpanet ARPANET none of the B arpanet
887
above
This is a system of thousands of distributed bulletin
boards and read by a newsreader. Bulletinreader Newsgroup Newsletter Networkboard B Newsgroup
888
DARPA stands for defensive dedicated and defensive advanced defensive advanced
administrative rank registered projects research projects research projects
administration administration administration net administration net
none of the above C
network

889
Unix shell provides mailing programs called …. Pine and Elm Pile and Elem Pine and Embedd Port and Elm A Pine and Elm
890

DARPA is broken into and milnet,smaller mailnet,inet intranet,extranet none of the A milnet,smaller
891
arpanet above arpanet
The Unix to Unix copy mail system separates parts of
the mail address with the symbol...….. @ ! # () B !
892
NSFNET is the united states provides service to education,resear music and dance cooking and dining none of the A education,research
893
and ch above
The Netlauncher (TCP/IP) software consists of these
programs that can run under Windows. Spy Mosaic Image View Both A and B Neither A nor B C Both A and B
894
The parts of the WSIRC server (net tool) window are….. Server message, Server Server Server C Server
command line and message,command line message,command line message,comman d message,comman d
channels and channels and channels line and line and channels
channels
895
is a program that displays information about none of the above
a host connected to the net finger service ping service ftp service A finger service
896
SLIP stands for: Serial Limited Serial Lock Inter- Serial Line Internet Setting Link Inter Serial Line Internet
Internet Protocol Protocol Protocol Protocol C Protocol
897
The first international IP network connections were united states and UK united states & Russia none of the above
established in 1973 with and england,norway B england,norway
898
These are small java programs that create games, Java scripts Java exe Java applets Java objects C Java applets
multimedia etc. These are downloaded over the Net and
executed by a web browser.

899
A is a set of computers interconnected by none of the above
transmission paths to exchange information in server client network C network
internet
900
901 The World Wide Web is a collection of….. Web windows Net pages Net addresses Web pages D Web pages
A computer that provides a service usable by client stand-alone servers none of the C servers
902
other computers is called above
It is a link which helps in retrieving information Netlink Sitelink Hyperlink Hypernet C Hyperlink
903
from the WWW easily.
can be owed by multiple organisation LAN MAN WAN none of the C WAN
904
above
… directories deliver information on all Web maps Net ports Wide maps Web infos A Web maps
905
the topics on the Internet.
Data is transmitted in the form of signals analog digital non-digital none of the B digital
906
above
This browser does not display links in color. Netshark Cello Lynx Mosaic B Cello
907

Modem stands for Moralize/demor Modulation/demodu Manipulate/deman none of the B Modulation/demo


908
alize lation ipulate above dulation
The Mosaic browser stores information about Ini file Exe file Web file Txt file A Ini file
909
the configuration in a/an ….
is the process of the digital signals being none of the above
converted into a form suitable for analog transmission Mapping Modulation Manipulation B Modulation
910
This is an indexer that crawls around the web Webcrawler Web sites Web creators Web ports A Webcrawler
911
cataloging.
and are two basic ways of getting Satellite link and Dedicated access and none of the above Dedicated access and
connected to the internet digital signals dial up access Cable and wires B dial up access
912
The option by which the browser window in Navigator New/Edit Document New/Edit Document
Gold 2.0 can be shifted to editor Edit/New file Edit/Save Window New/Edit page D
window is ….
913
This toolbar button displays information about Printer Web page starter Pager Document B Web page starter
914
web creation.
This window in Navigator Gold does not Script window Browser window Editor window Form window C Editor window
915
support frame display.
is a program or a tool that helps in FTP TELNET ARCHIE none of the C ARCHIE
916
locating a file anywhere on the net above
When a user connects to Internet with a shell Direct access Dedicated access Indirect access Dial-up access D Dial-up access
917
account it is called …….
The different ways of communication on the Interpersonal Group Both A and B Neither A nor B C Both A and B
918
Web are…..
This download tool provides multi-server connection, Download Download Accelerator
can search for mirror sites and Accelerator Plus Fresh Download WinZip Plus Webcow A Plus
provides a file leecher.
919
The… button provides HTML tags for font
style, alignments, and colour options. Edit Format Character Format File Format Window Format B Character Format
920
Identify the search engine that helps in concept Lycos Yahoo Excite Infoseek C Excite
921
based searching.
922 This is a text only browser. Lycos Lynx Links Netshark B Lynx
The multithreading feature of Netscape is Archive Cache Thread Retriever B Cache
923
facilitated with a storage space named…..
The distributed uploading of web pages through Web loading Web updation Web publish Page publish C Web publish
924
Navigator Gold is called…..
The method of presenting information on the web
through highlighted items is called…… Hypertext Webtext Nettext Hyperlimit A Hypertext
925
The a2z directory is an alphabetical list of pages Netleecher Webindexer Lynx Lycos D Lycos
926
used by the search engine…..
Netscape browser can display context links on Image webs Image maps Image graphs Image texts B Image maps
927
an image called…..
The launch of DARPA's Internet Protocol (IP) Network Consortium Internet Topography C Internet
928
facilitated the term…..
Name the download tool which highlights an
area of a page and gets all the links that are within the Webcrawler Webcow Weblinker Webcaster B Webcow
highlighted area.
929
… helps in business transactions,
generating revenue and demand on the information E-commerce E-Marketplace Both A and B Neither A nor B C Both A and B
highway.
930
The transfer of structured data for processing from Electronic Document Electronic Data Electronic Data Efficient Data B Electronic Data
computer to computer using agreed Intercahnge Interchange Internetworking Interchange Interchange
formats and protocols is called…..

931
This system involves electronic transfer of funds Electronic Financial Efficient Format Electronic Format Electronic Fund Electronic Fund
between financial institutions. Transmission Transactions Transfer Transfer D Transfer
932
A …… electronic mailbox stores EDI transactions for later Value Added Very Advanced Value Aided Networks Value Enhanced Value Added
retrieval. Networks Networks Networks A Networks
933
The mutual satisfaction of price, terms and Negotiation and Networking and Buying Negotiation and Negotiation and
conditions, delivery and evaluation criteria in a Bargaining servicing Critical buying A Bargaining
marketplace is….
934
The type of advertising, the Broadcast and Junk Passive Push Portal Smart B Push
935
Mail models are of…..
Identify the models of passive advertising. Billboard Portal Both A and B Neither A nor B C Both A and B
936

This layer is responsible for transmitting data as Network Layer Data Link Layer Presentation Layer Transport Layer B Data Link Layer
937
frames.
This layer is responsible for encoding of data. Link Layer Network Layer Presentation Layer Physical Layer C Presentation Layer
938

A always begins with a slash message scheme command line none of the C command line
939
above
The costs of Internet implementation are….. Connection cost, cost Computer cost, IC board cost, cable Connection company A Connection cost, cost
of telephone line network card cost cost cost, connection data of telephone line
cost

940
This layer of the TCP/IP suite includes the Application Layer Link Layer Transport Layer Network Layer B Link Layer
941
device driver and network interface card.
This protocol is used for flow control, echo and flow Simple Mail Transfer Internet Control Internet Control Data Single Control Internet Control
redirection. Protocol Message Protocol Protocol Message Protocol B Message Protocol
942
The software components that integrates different
hardware devices with the operating Device drivers Device modules Device programs Software devices A Device drivers
system…..
943
This is the basic component that connects the Cable Interface Netlink Interface Device Interface Network D Network Interface
944
computer to the network. Card Card Card Interface Card Card
The dumb terminal/node in a network depends on this Personal computer
computer for their basic functioning. Client computer Server computer Data computer C Server computer
945
This has an embedded microchip which can both
manipulate data and execute applications. Data card Security card Combi card Meta card C Combi card
946
To ensure a reliable communication between the buyer Session Socket Layer Secure Sockets Layer Electronic Socket Layer Cyber Socket Layer Secure Sockets Layer
and seller, the protocol used is…. Protocol Protocol Protocol Protocol B Protocol
947
This software enables a host to work as a Terminal Terminal emulator Indirect software Terminal B Terminal emulator
948
terminal on the network. embedded communicator
is a program that helps us to log on to Usenet finger service ftp telnet D telnet
949
other networks
The Windows Internet application functions were
developed based on the UNIX programs Sockets Package Protocol Simulators A Sockets
called…..
950
Which of the following will not appear in the Powerpoint Word Paste Document My Templates C Paste Document
951
home page of K-Doc?
To change an email header so that the message appears Email middle attack. Email Spoofing. Email hacking. Email tracking B Email Spoofing.
to have originated from someone or somewhere other
than the actual source is
known as .
952
To playfully satirize a website is known Web tapping Web Interception Web spoofing Web threating C Web spoofing
953
as .
is the complete package to manage the Billing and Accounting Billing and Accounting
billing requirements of a CA firm on cash Payroll eSecretary software K-DOC application C software
system of accounting.
954
Which of the following is not a/an feature of Contact Greeting Management Share certificate Share certificate
eSecretary? Management Email Management printing D printing
955
Annual return preparation can be done using ICAI-ROC K-DOC application ICAI XBRL Software Payroll A ICAI-ROC
956
. application application
is correspondence automation & K-DOC ICAI-ROC
management software that is seamlessly application eSecretary ICAI XBRL Software application B eSecretary
integrated with Microsoft Office.
957
is an independent,objective assurance and Statutory audit Tax audit Internal auditiing None of the Above C Internal auditiing
consulting activity designed to add value and improve
an organization's
operations.
958
Which of the following is/are the main purpose Financial Operations of the Both A and B Either A or B C Both A and B
959
of the internal audit? reporting organization
As per of the Income tax Act,every
person carrying on business or profession is requires to
get his accounts audited by a CA before the "specified
Section 45 Section 44AD Section 43B Section 44AB D Section 44AB
date".

960
refers to use
software/applications to automatically perform tasks
such as accounting,preparing trial balance, financial
statements etc. and electronically transmit data or
information using internet.. ERP Office automation Either A or B None of the Above B Office automation

961
FEMA Stands for . Foreign Exports Financial Enterprise Foreign Exchange None of the Above C Foreign Exchange
Management Act Management Act Managament Act Managament Act

962
Which application helps the management to allocate Resource allocation Knowledge Document Client management D Client management
the revenue to the credit of the right employee who and scheduling management Management Systems
identified the opportunity?

963
Who has full privileges in the financial Database Account System User C System
964
accounting application? administrator administrator administrator Administrator administrator
is the centre point of the financial
accounting application as any transactions having
financial impact carried out in any other module will
AP module GL module AR module FA module B GL module
reflect in this module.

965
Which of the functionalities is not provided in the Evaluation of Receipts of goods or Invite and analyze Comparison with D Comparison with
purchasing module of Financial Accounting Application. Vendors service quotations from budgets budgets
vendors

966
In Financial Accounting Application,automatic sequence Purchasing Accounts Payable Expense Management Fixed assets C Expense Management
number of documents control is not required in which
of the following module?

967
Which module of Financial Accounting Accounts Receivable
Application can be used for assigning credit limit to Purchasing Sales Accounts Payable B Sales
customers?
968
Which of these will trigger/alert for timely Accounts Accounts Receivable Expense Bank C Expense
969
payment ? Payable Management Reconcilations Management
We can manage interviews,offers and job vacancies by Resource allocation HR and Payroll Knowledge None of the Above HR and Payroll
using which of the application? and applications management B applications
scheduling
970
, , are commonly Confidentiality,In Confidentiality,Integr Confidentiality,Inte Confidentiality,Int Confidentiality,Inte
referred to as CIA in information tegrity and ity and grity and Access egration and A grity and
security parlance. Availability Authentication rights Authentication Availability
971
provides information about updation of Performance HR management Timesheet Timesheet application
project cost based on time spent by management system Payroll application D
employees on various projects. system
972
Which of the follwing is not a/an functionality provided Capture the Key Employee designation Automated alerts for Prepare summary or Employee designation
by PMS? Performance and reporting structure pending appraisals bell curve analysis of and reporting
Indicators all employees structure
B

973
automates the calculation of salary for Timesheet System HR management Knowledge
taking inputs from the timesheet application, leaves System management System
from Leave Management System and salary details from
Payroll System C Payroll System
the HR master
data.
974
Which of the follwing is not a control in Leave Reduce Error free capture of Approval workflow Error free capture of
Management System? administrative Excess leave leave details C leave details
burden on HR
975
Permanent Audit File are obtained once but half-yearly yearly monthy quarterly B yearly
976
updated on basis.
In Permanent Audit file, is not the key data Organization chart Client’s accounting Copies of clients’ Copies of important Copies of clients’
documented. manual incorporation contracts or long incorporation
documents like MoC term lease documents like MoC
C
agreements

977
The Document Management Sytem offers the Role based access Complete audit trail Cost effective to All the Above D All the Above
features . maintain the
documents in soft
copy
978
is a type of training in which user
logon on the training server with a user ID and Internal Training E-Learning Classroom Training E-Training B E-Learning
password.
979
In some cases, trainee is supposed to appear for the Classroom Training
examination/test at the end of the training E-Learning Virtual Learning All the Above B E-Learning
is .
980
are the hardware/infrastructure PC Application Server WAN All the Above D All the Above
981
equipments used in a CA firm.
means information available in the Confidentiality Integrity Availability Authentication B Integrity
organization should not be altered or modified by
unauthorized personnel.

982
Which of these is/are the standard email Microsoft Lotus Notes Both A and B None of the C Both A and B
983
program used in an organization? Exchange Above
Which of the following is not a characteristics of WAN? Most WANs are Compared to LAN, its WAN uses only private Switches are used to B Compared to LAN, its
owned by only one transmission speed is networks. connect LAN and transmission speed is
organization. low WAN low

984
is protection of information assets from Information Security None of the above Information Security
threats to preserve their value. Confidentiality Integrity C
985
Which types of information assets need to be Client data Own data Own documents All the above D All the above
986
secured in a CA Office?
The extent and level of would Availability Confidentiality Integrity Authentication B Confidentiality
987
depend on the nature of information.
of information might be affected due to
denial of service attack or some other Integrity Authentication Confidentiality Availability D Availability
reasons.
988
means the sender cannot deny having sent
a message and receiver cannot Non-Repudiation Integrity Authentication Confidentiality A Non-Repudiation
deny receiving the message.
989
990 Risk may not be in nature. reputational financial operational vulnerable D vulnerable
The process of identifying an individual, usually
based on user id and password in an organization is Availability Authentication Confidentiality Integrity B Authentication
called .
991
Which of the following is not a software equipment Resource allocation None of the Above
required in a CA's office? and Client management HR and Payroll D None of the Above
scheduling
992
Which of the following is not an application ICAI-XBRL suite K-DOC Billing and ICAI-TOC D ICAI-TOC
993
arranged by ICAI? Accounting
How many stages are there in the sales cycle? 2 3 4 5B 3
994

PBX stands for Private Exchange Public Exchange Branch Private Branch Public Branch Private Branch
Branch exchange exchange C exchange
995
Find the correct sequence in case of XML file, are Structure, store, and Store, structure, and Structure and store Store and transport A Structure, store, and
transport transport information. information. information. transport information.
information.

996
As Bank auditors,Many Banking applications generate
text files in . Txt format Csv format Both A and B Nither A Nor B C Both A and B
997
Macro security is enabling through . Developer Developer Developer Developer
Not Required tab>Code>Macro tab>Modify>Macro tab>Controls>Ma B tab>Code>Macro
Security Security cro Security Security
998
Requirements for preparation of cash budget in Excel. Knowledge of Knowledge of Knowledge of cell Knowledge of all of Knowledge of all of
accounting formatting an excel linking & basic the above. D the above.
sheet formulae
999
ROE stands for . Recall on Equity Return on Equity Return on Enquary Return of B Return on Equity
1,000
Equalisation
is a statistical procedure that uses sample
evidence and probability theory to determine whether a
statement about the value of a population parameter
should be rejected or should not be rejected. Confidence Interval Hypothesis ANOVA None of the above B Hypothesis

1,001
is a statistical tool used to create Regression Regression Multiple Single Regression C Multiple
1,002
predictive models. equation Regression Regression
shows the ability of a company to pay its
current financial obligations. Quick Ratio Current Ratio Liquidity Ratio Solvency Ratio C Liquidity Ratio
1,003
shows dependency of a firm on Quick Ratio Leverage Ratio Liquidity Ratio Solvency Ratio B Leverage Ratio
1,004
outside long term finance.
To record a Macro in relative mode,"Üse Realtive
References" available in which tab of Developer Tab View Tab Both A and B Nither A Nor B C Both A and B
excel ?
1,005
There are ways to open a Macro 3 2 4 1A 3
1,006
enabled workbook.
In Excel, there are functions for 4 5 6 3B 5
1,007
calculation of depreciation.
1,008 XML is a Recommendation. W3C W1C W2C W4C A W3C
VDB function used to calculate depreciation as For calculation of For calculation of For calculation of For calculation of For calculation of
per . depreciation as per depreciation as per depreciation as per depreciation as per depreciation as per
Variable Declining Straight Line Method. Declining Balance Double Declining Variable Declining
Balance Method. Method. Balance Method. Balance Method.
A

1,009
PV Ratio stands for . Point Volume Point Varaiance Profit Volume Profit Variance C Profit Volume
1,010
Ratio Ratio Ratio Ratio Ratio
BEP stands for Break Easy Point Break Even Point Balance Equal Break Equal Point B Break Even Point
1,011
Point
function returns value from a given data
range based on row and column. VLOOKUP() HLOOKUP() INDEX() LOOKUP() C INDEX()
1,012
Which function categories are not available in Statistical Engineering Math & Trig Arts D Arts
1,013
Excel.
function uses a fixed rate to calculate DB VDB SYD SLN A DB
1,014
depreciation
Which of them is not a Conditional Operators < </ <= <> B </
1,015
symbols?
XML is a language that is very similar to which C HTML C++ JAVA B HTML
1,016
language ?
In Excel the function =Abs(-4) returns -4 2^2 4 None C 4
1,017
.
If User want to display the formulas rather than the Formulas > Formula Formulas > Formula Formulas > Function > Formulas > Formula Formulas > Formula
results of the formulas then > Show Formulas. Auditing > Show Show Formulas. Auditing Auditing > Show
choose . Formulas. > Function > Show Formulas.
B
Formulas.

1,018
reveal about the current and future Financial statements Financial statements
financial condition of the company. Report Data None C
1,019
Which of them is a Intangible assets? Goodwill and Cash and Property. investment and None of the A Goodwill and
1,020
Patents. securities. above Patents.
1,021 CR stands for . Current Ratio Clear Ratio Current Rate Clear Rate A Current Ratio
1,022 QR stands for . Quick Rate Quality Ratio Quality Rate Quick Ratio D Quick Ratio
DTD stands for , which is called Direct to Direct Document Type Data Type Data to Data B Document Type
1,023
XML Schema. Definition Definition Definition
ACP stands for . Average collection Average collection Average collection None of the above Average collection
price payment period C period
1,024
FATR stands for . Fixed all turnover Fixed assets test Fair assets Fixed assets D Fixed assets
1,025
ratio ratio turnover ratio turnover ratio turnover ratio
1,026 A can be a numerical fact. Statistic Sale Salary Number A Statistic
stands for reduction in value of Depreciation Data Document Detail A Depreciation
1,027
fixed assets.
Value of fixed assets is generally reduced over the Change in taste of Change in technology
period of time due to . Wear & Tear people All of the Above D All of the Above
1,028
Examples of fixed cost are . Salary of
administrative office rent Both A and B None C Both A and B
staff
1,029
The extension of a XML document is (.xsd) (.xml) (.mlx) (.xlm) B (.xml)
1,030
.
analysis relates items in the financial Financial ratio Price Perodic Report A Financial ratio
statements in a manner that drives out performance
information about the company.

1,031
How to restrict to run a macro automatically when Hold down the Hold down the CTRL Hold down the ESC key Hold down the Hold down the
starting Microsoft Excel? SHIFT key during key during start up. during start up. ALT key during start A SHIFT key during start
start up. up. up.
1,032
Which option allows you to Bold all the negative values Conditional Formatting Negative Formatting Conditional
within the selected cell range? Zero Formatting Bold Formatting B Formatting
1,033
allow us to perform calculations or Cell referencing Absolute functions Worksheet functions Round( ) functions C Worksheet functions
operations that would otherwise be too cumbersome or functions
impossible altogether.

1,034
Statistical functions in Excel help to calculate Arithmetic Mean Median Mode All of the above. D All of the above.
1,035

Discounting Factor formula is = n / (1+a) - r = 1 + (1/r) * n #NAME? = 1 / (1+r) ^ n D = 1 / (1+r) ^ n


1,036

is considered as non cash


expenditure and occupies a prominent place in Profit & Cash Flow Depreciation Fund flow Expenditure B Depreciation
Loss Account.
1,037
The value which can be realized at the end of life of
fixed asset by selling it is called Salvage Value cost life Factor A Salvage Value
1,038
is prepared for planning for Capital Budgeting
future as far as movement of cash is concerned. Cash budget Both A& B Actual Budget B Cash budget
1,039
To create a XML Map from XML schema, Go to Review Add-Ins Developer Data C Developer
1,040
which Tab in Excel .
is the process of determining the Marginal costing Capital Budgeting Discounting None C Discounting
present value of a payment or a stream of payments
that is to be received in the future.

1,041
is one of the core principals of finance
and is the primary factor used in pricing a stream of
cash flows, such as those found in a traditional bond or
Marginal costing Discounting PMT None B Discounting
annuity.

1,042
XML schemas in Excel are called XML Schemas Maps Elements Markups C Elements
1,043
.
Excel allows us to use various functions and even simple Financial analysis Equity analysis Leasing decisions and All of Above D All of Above
mathematical calculations which can be used for the list goes on
.

1,044
Which cell reference show the reference to other sheet
or reference to other workbook in Sheet2!C4 Sheet2{C4} Sheet2(C4) Sheet2<C4> A Sheet2!C4
excel ?
1,045
1,046 Which of them is not a Range References? A1:A4 $A$1:A4 A1, A2 , A3, A4 A$1:A$4 C A1, A2 , A3, A4
Interest Coverage Ratio equals to . EBIT / Debt EIBT / Debt interest ETIB / Debt interest EBTI / Debt A EBIT / Debt
1,047
interest interest interest
If particular workbook have to open each time Excel
started, where the workbook should be AUTOEXEC folder AUTOSTART folder EXCELSTART folder XLSTART folder D XLSTART folder
placed?
1,048
is a computerized mathematical technique Finanical Planning Monte Carlo Simulation Corporate Planning Personal Finance B Monte Carlo
that allows people to account for risk in quantitative Planning Simulation
analysis and decision making.

1,049
is the process of meeting the Corporate planning Monte Carlo simulation Personal Finance
financial goals through the proper management of Financial planning planning C Financial planning
finances.
1,050
can be defined as the process of setting Monte Carlo Corporate Planning Decision Tree Analysis Corporate Planning B Corporate Planning
the procedures in the organization for achieving the Simulation & Analysis
predefined goals.

1,051
shows ability of company to pay back long Debt Assets Ratio Interest Coverage Ratio Total Fund Ration None of the above B Interest Coverage
term loans along with interest or other charges from Ratio
generation of profit from its
operations.
1,052
is the simplest method of Earnings Per share Fixed Asset Over ratio Price Earnings Multiple Gross Profit Ratio C Price Earnings
comparing different stocks at a point of time to make Multiple
investment decisions.

1,053
The very first line of code of XML file is . <?xml version="3.0" <?xml version="2.0" <?xml version="1.0" <?xml version="0.0" C <?xml version="1.0"
encoding="ISO- encoding="ISO-8859- encoding="ISO- encoding="ISO- encoding="ISO-
8859-1"?> 1"?> 8859-1"?> 8859-1"?> 8859-1"?>

1,054
Every bit of data has to start and end with an <TagName>Data </TagName>Data<Ta </TagName>Data< <TagName>Data< A <TagName>Data</
1,055
identical tag </TagName> gName> /TagName> TagName> TagName>
The exact syntax of PMT function is . PMT(nper, rate, pv, PMT(rate, nper, pv, [fv], PMT(rate, pv, nper, [fv], PMT(pv, rate, nper, PMT(rate, nper, pv,
[fv], [type]) [type]) [type]) [fv], [type]) B [fv], [type])
1,056
The exact syntax of IPMT function IPMT(rate, nper, pv, IPMT(pv, rate, per, IPMT(per, rate, IPMT(rate, per, IPMT(rate, per,
is . [fv], [type]) nper, [fv], [type]) nper, pv, [fv], [type]) nper, pv, [fv], [type]) D nper, pv, [fv], [type])
1,057
To see the XML Map user must go Developer>XML> Developer> Source File Menu>Options>Ad None of the above. A Developer>XML>
. Source d in>Excel Add Source
In>XML

1,058
Deletion of XML Map is done through Directally Delete XML Maps Dialog Box None of the above XML Maps Dialog Box
. Command Delete Button C
1,059
Excel works primarily with types of 3 2 1 4B 2
1,060
XML files.
Method of tax calculations shall change Annual Income DOB status of assess All of the above. D All of the above.
1,061
according to .
Which function is used to calculate the principal IPMT PPMT PMT None of the B PPMT
1,062
portion in every installment ? above
is a process used in statistical analysis in Snowball sampling Sampling Systematic sampling Simple random B Sampling
which a predetermined number of observations will be sampling
taken from a larger
population.
1,063
In , Individuals are selected at Clustered sampling Systematic sampling Simple random Systematic sampling
regular intervals from a list of the whole population. Sampling sampling C
1,064
In each individual is chosen entirely by Snowball sampling Convenience sampling Systematic sampling Simple random D Simple random
chance and each member of the population has an sampling sampling
equal chance, or probability,
of being selected.
1,065
Which method is commonly used in social sciences Simple random
when investigating hard to reach Quota Sampling Sampling Snowball sampling sampling C Snowball sampling
groups?
1,066
are useful for quick reading and
easy understanding, particularly for top management. Balance sheet Summary reports IRR NPV B Summary reports
1,067
It is a process in which a business determines whether Business Investment Capital Budgeting Capital Investment Investment B Capital Budgeting
projects such as building a new plant or investing in a management
long-term venture are worth
pursuing.
1,068
Popular methods of capital budgeting include discounted cash internal rate of net present value All the above D All the above
1,069
and payback period. flow return
What is the file extension of Schema file which (.xml) (.xsd) (.xlm) (.mlx) B (.xsd)
1,070
contain schema tags ?
is the value of all future cash inflows less Net present value
future cash outflows as on today. Working capital IRR PMT A Net present value
1,071
is the process of defining and analyzing Sensitivity analysis Qualitative risk analysis
the dangers to individuals, businesses and government
agencies posed by potential natural and human-caused
Risk analysis Scenario analysis B Risk analysis
adverse events.

1,072
which is used more often, does not involve Sensitivity analysis Qualitative risk analysis Qualitative risk
numerical probabilities or predictions of Risk analysis Scenario analysis C analysis
loss.
1,073
It is a technique used to determine how different values Decision Tree
of an independent variable will impact a particular analysis
dependent variable under a given set of assumptions.
Sensitivity analysis Both A& B Neither A &B B Sensitivity analysis

1,074
involves computing different reinvestment Scenario analysis Sensitivity analysis Decision Tree Analysis None A Scenario analysis
rates for expected returns that are reinvested during
the investment horizon.

1,075
NPER stands Total Principal Net Per value Total Interest Number of D Number of Periods
1,076
for Value Value Periods
helps to break down the Return on Du Point Analysis Return on Profitability Ration None of the A Du Point Analysis
1,077
Equity Investment above
is a common method for financing property,
facilities, and equipment. Mortagage Leasing Rent All the above B Leasing
1,078
The application controls are …. Input controls Processing controls Both A and B Neither A nor B C Both A and B
1,079

Identify the field check - "If a set of values is defined, is


the input data one of these defined List Range Slab Digit C Slab
values?"
1,080
The field check that conforms if data input for a Format mask Data mask Field mask Input mask A Format mask
1,081
field is in a particular format.
The field check on a processed data that fails if a field is
not initialized to zero or errors occur Range Sign Overflow Serial C Overflow
during calculation is……
1,082
The validation checks applied to a field depending on its Field checks Record checks Batch checks File checks B Record checks
logical interrelationships with the other fields in the
record are called …..

1,083
A group of records or transactions that are Physical batches Logical batches Block batches Transact batches A Physical batches
1,084
contiguous constitute …..
… is the type of batch check (group of
records) for all input records of a particular type is done. Control totals Serial number Transaction type Sequence check C Transaction type
1,085
This has an embedded microchip which can both
manipulate data and execute applications. Data card Security card Combi card Meta card C Combi card
1,086
To ensure a reliable communication between the buyer Session Socket Layer Secure Sockets Layer Electronic Socket Layer Cyber Socket Layer Secure Sockets Layer
and seller, the protocol used is…. Protocol Protocol Protocol Protocol B Protocol
1,087
In IDEA, import Assistant wizard is used to Excel Access XML All of the above D All of the above
1,088
import data from .
In IDEA, Append functions can be used Import data Add data at the end Sort Filter B Add data at the
1,089
to . end
Which is the step by step procedure for reporting in File->Print- Click on Create Report File->Select Export ->
IDEA. >Create Report button on the Print Report.
Operation toolbars-
Both A and B C Both A and B
>Report Assistant.

1,090
In the following list which is not an audit Sorting Filtering Sampling Export D Export
1,091
function ?
What is the procedure for importing data into IDEA ? File->Import File->Import -> Import File->Import as -> File->Select Import -> File->Import Assistant-
Assistant-> to IDEA Import to IDEA Import A > Import
Import to IDEA to IDEA to IDEA
1,092
In Audit tool, to built relation between two tables, both None of the above
table should have . Common Table Common Field Common record B Common Field
1,093
Which is the following is the correct types of Overflow Range Sign Test All of the above D All of the above
1,094
Field checks on processed data ?
IDEA exports data in a number of spreadsheet and mail
. text database merge format All of the above D All of the above
1,095
Which is the following is the correct types of Resonableness Compare Un-compare Randomness A Resonableness
1,096
Record checks on input data ?
Which is the correct types of Batch Checks ? Control Totals Outdated checks On-line dated Mixed dated A Control Totals
1,097
checked checks
Which is the need for table level tests ? Controls are required None of the above
Data Integrity for Both A and B C Both A and B
authorization
1,098
Which is the following is the major points with respect This may make the Their Master & Child
to inter table tests ? entire child tables relationship reference
referenced by the the table from one
master field in the another
main table un- Both A and B None of the above C Both A and B
available

1,099
Which is the software used by the auditor to take a view Mapping Snapshots Modelling Source comparison B Snapshots
of a file of data or transaction passing through the
system at a particular point
of time ?
1,100
Which is the software used by the auditor to Souce comparison
compare the source version of a program with a secure Code compasion Model comparison Exe comparison A Souce comparison
master copy ?
1,101
Which is the techniques whereby the auditor arranges
or manipulates data either real or fictitious, in order to
see that a specific program or screen edit test is doing
Debug Testing Logic Testing Off-line Testing On-line Testing D On-line Testing
its work ?

1,102
Which is the software used by the auditor to list Log Analysis Mapping Program Library All of the above B Mapping
1,103
un-used program instruction ?
Which is the software used by auditor to read and Log Analyzers Software Log Analyzers
analyze records of machine activity ? Machine level Executable level Systax level C Software
1,104
Which of the following reason strongly call for Control & Lack of Visible Absence of Input None of the above
Audit Function ? Transaction Trail Document All of the above C All of the above
1,105
In IDEA,Data Extraction select data form a file for
further for creating a new file Extraction Recording Investigation Sorting C Investigation
of logically selected records.
1,106
Which is the correct types of Field checks on Missing data Blank data Both type None of the C Both type
1,107
input data ? above
Which is the major points to be consider with respect to To ensure the input Test whether the To ensure the entered To ensure the input
System tests ? data is valid before overall system meet data is saved without data is valid before
entering the the requirement fail entering the value
All of the above A
value specifications

1,108
In Data analysis techniques, which law is used to
idenfity statistical report on numeric data ? Bend Law Benjamin law Benford Law British Law C Benford Law
1,109
Which is not a feature of File reorganization with an Linking the identified
auditor perspective? Filtering Sorting Indexing files A Filtering
1,110
What do you understand by the term, “Data Establish relationship Identify fields, which Identify data, which are Identify whether all Identify data, which
Consistency” in using CAATs? between two or have null values. not in agreement with fields have valid are not in agreement
more tables as the regular format. data. with the regular
C
required. format.

1,111
Functions involving use of arithmetic operators, which Statistical function Arithmetic function Logical function Relational function B Arithmetic function
enable performing re-computations and re-performance
of results is an example of?

1,112
Which of the following is a benefit of using CAATs? Identify an audit finding To give assurance to Identify an audit
w.r.t. materiality in an customers about the finding w.r.t.
IT environment performance of the materiality in an IT
File an FIR based on Investigation of fraud in
company B environment
audit finding audit area

1,113
What is step by step procedure for using Data->Benford's Analysis->Benford's Sampling-> Tools->Benford's B Analysis-
1,114
Bendford's law function in IDEA ? Law Law Benford's Law Law >Benford's Law
A Benford's Law analysis is most effective on Comprised of similar Without built-in Without assigned
data . sized values for minimum and numbers, such as bank
similar phenomena. maximum values. accounts numbers and
zip codes and with four
or more digits. All of the above D All of the above

1,115
In IDEA, blank value data can be extracted by @isblank() as Null Null Is Null A @isblank()
1,116
using .
In IDEA, Summarization, Pivot Table, Stratify,
Duplicate Key functions comes under which menu. Data Analysis Sampling Relation B Analysis
1,117
In IDEA, Extraction, Sort, Indices, Search Analysis View Relation Data D Data
1,118
functions comes under which menu.
is centralized Banking Application Software. Core Banking System Core Banking Solution Complete Banking Centralized Banking Core Banking Solution
Solution Solution B
1,119
1,120 Flexcube developed by Infosys HCL Technologies TCS I-Flex D I-Flex
1,121 Quarz developed by Infosys HCL Technologies TCS I-Flex C TCS
The server is a sophisticated computer that accepts Clients Customers Party IP A Clients
service requests from different machines which are
called

1,122
server has to be a powerful and robust
system as it has to perform all the core Antivirus Server Application Server Web server Clients Server B Application Server
banking operations.
1,123
ATMS stands for Automatic Automated Teller Automated Teller
Telephone Machine Machine Server Auto Machanic Allow to Machine B Machine Server
1,124
IBAS stands for Internet Business Internet Banking Internet Banking Internet Business B Internet Banking
Application Server Application Server Application software Authenticatin server Application Server

1,125
PBF stands for Positive Balance Post Balance File Positive Balance Positive Balance C Positive Balance
1,126
File File Flex File
Internet banking refers to a banking Bank Internet Intranet Net banking B Internet
1,127
transactions routed through the
CPPD Stands for . Computer Planning Computerized Planning Both A &B Computer Planning D Computer Planning
and plant and Policy Department and Policy and Policy
department Department Department

1,128
The is generally a hardware and it plays the
role of preventing unauthorized Date base Server Web server Proxy Firewall D Firewall
access.
1,129
has several components which have been
designed to meet the demands of the CBS CSB NEFT None A CBS
banking industry.
1,130
enable data transmission over Switches Firewall Routers Middleware C Routers
1,131
different networks.
have many ports that are connected to Router Switches Firewall Middleware B Switches
different systems and it facilitates data transmission
with the network.

1,132
A Proxy server always acts in conjunction with a Firewall Internet Antivirus None A Firewall
1,133
.
The provides network security by preventing
malicious data from entering the ATM Server Proxy Server Date base Server Web server B Proxy Server
network.
1,134
is used for authentication. System audit system Domain Controller Network security C Domain Controller
1,135
administration
Access to a set of servers is controlled by the System audit system Librarian Domain D Domain Controller
1,136
. administration Controller
is a process of unauthorized entering Data base Hacking Routors Thrashing B Hacking
1,137
a network. administration
facility provides a customer to access Automatic tele Automated Teller Automated Technical Accelereated Teller Automated Teller
financial transactions in a public place. Machine Machine Machine machine B Machine
1,138
Which is the Function of ATM? Registering requests for
Cash Withdrawal Balance Inquiry Cheque book All the above D All the above
1,139
Core Banking Solutions is a combination of an Network devices Firewall IBAS IBDS A Network devices
1,140
application software and
The Operational Controls include controls on Physical Access Logical Access Environmental All of the above D All of the above
1,141
Controls
Application Controls are broadly classified into Input Controls Output Controls Processing Controls All of the above D All of the above
1,142

controls check that the data Input Controls Output Controls Processing Controls All of the above A Input Controls
1,143
entered is complete and correct.
Reasonableness check is a . Processing Input Controls Output Controls Management B Input Controls
1,144
Controls Control
Which of the following is not a module of the Customer ID Accounts Equity Share Clearing Module C Equity Share
1,145
CBS? generation management management management
Bank guarantees can be Performance Deferred Payment Both A & B None of the C Both A & B
1,146
Guarantee Guarantee above
SLR stands for Statutory Liquidified Statutory Liquidity Standard Liquidity Ratio Stable Liquidity Ratio Statutory Liquidity
Ratio Ratio B Ratio
1,147
are record of activities that have taken place None of the above
in the system irrespective of the Logs Index Activity Logs A Logs
modules.
1,148
The contents of a log includes Activity User details Date and Time All of the above D All of the above
1,149
performed
Communication and Operations management must Firewall security policy
include which policies? E-mail policy Internet policy All of the above D All of the above
1,150
is a large data housing infrastructure that
provides high band width access to its ATM Server Data Centre IT EDP B Data Centre
clients.
1,151
CRR stands for in terms Cash Reserve Ratio Community Reserve Cash Reimbursed
of CBS. Ratio Cash Reversal Ratio Ratio A Cash Reserve Ratio
1,152
DRP stands for Disaster Discovered Resources Disastrous Recovery Disaster Disaster Recovery
in terms of CBS. Recovery Planning Planning Planning Recording Planning A Planning
1,153
are soultions applied when any None of the above
kind of vulnerabilities discovered in networks in the CBS Patches Logs Access Rights A Patches
system.
1,154
can be viewed only by the DBA of Access Rights Database Log Operating System Activity Log B Database Log
1,155
an organisation. Logs Log
KYC stands for Know Your Customer Know Your Connection Know Your Customer
in terms Know Your Company Know Your Centre A
banking.
1,156
In CBS, the Accounts Management module deals with Creation of Savings Creation of Current
Account Account Overdraft All of the above D All of the above
1,157
Soft copy of the ATM journal rolls is Stock Journal Journal Report Electronic Journal All of the above C Electronic Journal
1,158
called
Data centre servers are known Application Data Base Servers Web server All the above D All the above
1,159
as . servers
The ATM switch consists of a computer server Both A & B None of the C Both A & B
1,160
above
testing should be done to
check the unauthorised access to the network in CBS. Penetration Hierarchical Top down Bottom up A Penetration
1,161
enables transfer of money from one bank to None of the above
another in "Real time" and on "Gross" EFT NEFT RTGS C RTGS
basis.
1,162
In system money transfers are done on a one NEFT, RTGS RTGS,NEFT EFT,RTGS None of the above B RTGS,NEFT
to one basis while in system transfer is done in
batches.

1,163
All the money transfers take place in the books Beneficiary bank Central bank(RBI) Remitting bank None of the B Central bank(RBI)
1,164
of the above
EFT and NEFT work on basis DNS HSM SSM All of the above A DNS
1,165

system of money transfer is primarily NEFT RTGS EFT All of the above B RTGS
1,166
used for large transactions.
In RTGS, the STP generates an for every
outbound RTGS transaction. UTN UTE UTR UTS C UTR
1,167
UTR full form Unique Transaction Unidentified Unique Transmission None of the above Unique Transaction
in terms of Reference Transaction Reference A Reference
CBS. Reference
1,168
STP stands for Straight Through Straight Temporary Strict Through None of the above Straight Through
in terms Processing Processing Processing A Processing
of CBS.
1,169
is a method of creating virtual VLAN LAN WAN MAN A VLAN
1,170
networks within a physical network.
CMS stands for Control Management Cash Management Core Management Centre Management Cash Management
in terms of CBS. System System System System B System
1,171
Which of the following statements is true? Audit of internal Systems audit are Audit of controls in any Systems audit are
controls is not important for the banking environment is important for the
needed at all verification of the performed using verification of the
internal controls software audit None of the above B internal controls

1,172
The Management Controls does not include Managing of Assets Formulating a security Developing a business Laying down A Managing of Assets
policy continuity planning procedures for
system
development
1,173
is supported by advanced technology Core Banking Solution Core Banking Solution
infrastructure and has high standards of business Firewall Internet banking Web centre C
functionality.
1,174
CBS Software resides in a Central application server Central Office Data Central Office Data
which is located in the ATM Data centre Middleware Web centre Centre. D Centre.
1,175
A that runs the core banking solutions (CBS) Central Application Domain Name Server Central Application
and is centrally accessed by the branches. ATM Server Server Database Server B Server
1,176
The of the application is capable of
only entering the data at the end point that is branches. System version Application Version Client version Firewall C Client version
1,177
The application server would be placed in a trusted Virtual Local Area Wide Area Network Personnal Area Virtual Local Area
inside zone in a separate Network Local Area Network Network A Network
1,178
Application software would access the Data base server ATM DATA Server Domain Name Application A Data base server
1,179
Server Server
are capable of being connected only when
devices are connected to a switch. LAN Virtual Networks MAN WAN B Virtual Networks
1,180
Data communication between VLANs can be
controlled as per business requirements. 1 2 3 4B 2
1,181
A special feature of STP is that number Unique Transation PIN NO Uniform Transaction None C Uniform Transaction
for any outbound RTGS transaction is generated by the Referrence Reference Reference
STP System.

1,182
refers to the process of developing
software which would produce the required output
from the input provided of course, using the necessary
Application
hardware and communication systems. Software Development Server Development System Development D System Development
Development

1,183
The is essential to ensure that Review Management RTGS Log management Authorized C Log management
computer security records are stored in sufficient detail Controller
for appropriate period of time.

1,184
Which of the following is “False“ in case of penetration is a legal attempt at The purpose of the test This is often the Ensure recoverability
testing in an IT environment of CBS? gaining access to is to identify security most preferred test of data in case of
protected computer vulnerabilities and then as it is an accurate system failure.
systems or networks. attempt to successfully simulation of how an
exploit them. outsider/hacker
would see the
Ensure recoverability of
network and attempt
data in case of system B
to break into it.
failure.

1,185
Which of the following is erroneous statement in case Unit test, system Well documented Implement new/ It is important that It is important that
of Change Management Control? test, integration test process should be changed programme as correct latest version correct latest version
– all should be there incorporating all per schedule. of programe is used of programe is used
carried out. the changes. but version number but version number
need not be need not be changed.
D
changed.

1,186
With respect to the customer changing the Pin at the Old offset value used Old Pin verified using Natural Pin remains the Old offset value Old offset value used
ATM which procedure is the ”false“ procedure? to derive new PIN. HSM/SSM. same. erased and new to derive new PIN.
offset value
A
generated.

1,187
IN CBS, changes to the application server are not made None of the above
directly to it, instead done first on a Trail server Validate server Test Server C Test Server
1,188
All the various servers in the central data centre LANs VLANs WANs MANs B VLANs
1,189
are seggregated through
The is a complete process in the computer Consalidation Password Policy protection Validation D Validation
so that it ensures that data that is fed in conforms to
certain prerequisite conditions.

1,190
When the central Data base is busy with central end of
day activities or for any other reason, the file containing
the account balance of the customer is sent to the ATM
Centralised Data base Central Office Data
switch. Such a file is called Positive Balance File Application Server A Positive Balance File
security Centre.

1,191
Bank mate is developed by the Infosys HCL Technologies TCS I-Flex B HCL Technologies
1,192

The IBDS is located in a Militarised zone City Zone State zone demilitarised D demilitarised zone
1,193
zone
The main components of Internet Banking Web server IBAS IBDS All the above D All the above
1,194
system consist of
Copy of the Anti Virus Software was updated promptly None of the Above
and regularly at the Data Centre and pushed into all of
the servers and in all the systems in the branches by
Hacking Method Push-pull method Both A &B B Push-pull method

1,195
The which is also residing in the Application Software Application Server Application Software
server at the branch actually does the banking Sytem software utility software C
operations.
1,196
In Core Banking concept all the systems of the bank are
connected to the Central office by means of a
connectivity which may be either a
local line Leased line Broadband None B Leased line
or a dial up line.

1,197
The is generated by the software and directly Personal Identification Net transaction ID NO Personal Identification
sent to equipment for printed the Pin 16 digit number Number ATM No B Number
Mailer.
1,198
would also include the existence of built
in controls in the system to ensure proper processing of
input data so as to provide the required output.
Output Control Input control Process Control Data Control C Process Control

1,199
Update Query can be used to update Single Record More than 1 record Both A and B None of the C Both A and B
1,200
in MS Access 2010. above
Delete Query can be used to delete Single Record More than 1 record Both A and B None of the C Both A and B
1,201
above
How many Primary key constraints can create in Only one Two As many All of the Above A Only one
1,202
a table .
MS Access 2010 provides queries that can be used for Sum() Count() Avg() All of the above D All of the above
obtaining the aggregated results instead of individual
records are .

1,203
A function that Counts the set of values that satisfy the
given criteria in MS Access 2010 CountA() Count() Countif() All of the above B Count()
is .
1,204
The operator is used to find the null "= NULL" NULL IS NULL All of the Above C IS NULL
1,205
records in a table.
Aggreagate Query also known as . Group By queries Total query Action query Both A and B D Both A and B
1,206

Which Query wizard is used to find repeated Simple Query Duplicate Query Cross table Query All of the Above B Duplicate Query
1,207
records in a table? Wizard Wizard Wizard Wizard
Append Query is used to in a Add Records Delete Records View Records Update Records A Add Records
1,208
table in MS Access.
Which type of joins not available in Access Inner join Left outer join Right outer join Full join D Full join
1,209
2010?
A join returns only those rows from both tables
that match on the joining field is in MS Inner join Left outer join Right outer join Full join A Inner join
Access 2010.
1,210
The query returns all of the rows from left table, and None of the above
also those rows from the right table Right outer join Left outer join Inner join B Left outer join
that is known as .
1,211
The query using returns all the rows from Right outer join Left outer join Inner join None of the above A Right outer join
right table, and also those rows from the left table that
share a common value on
both sides of join.
1,212
How can we add a table to the Query Design Select Create-> Add Select Database Tools-> Select Design -> Show Select the table from Select Design -> Show
window ? Table Add Table Table navigation C Table
Pane.
1,213
can be considered a questions in a Queries Form Reprt Macro A Queries
1,214
data base.
Operands can be in MS Access 2010. Literals Identifiers Function All D All
1,215

When you create relationship between two tables, the


Common field's data type should be Text & Number Number & Text different data type Same data type D Same data type
1,216
In example "Hello"+" " +" everyone" ,hello is Text Literal Date Literal Number Literal None of the A Text Literal
1,217
above
Length("Ms Access") will return the count of 9 8 7 6A 9
1,218
charcters is .
AND ,OR is a kind of in MS-Access Arithmetic Logical Comparision None of the B Logical
1,219
2010. above
Comparision operators is also known Arithmetic Logical Relational None of the C Relational
1,220
as in MS-Access 2010. above
LIKE operator works with in MS Access Text Date Both A and B None of the C Both A and B
1,221
2010. above
IN operator is used in MS Access 2010. To match the To find the null returns true or false None of the above To match the value to
value to a set of records of given table A a set of values
values
1,222
Operator precedence is similar to that is follwed None of the above
in Algebra in MS-Access 2010. BODMAS BOMDAS BODSAM A BODMAS
1,223
Text files that are organized properly fall into Delimited files Fixed-width files Both A and B None of the C Both A and B
1,224
one of two types are above
To create an unmatched Query using wizard, minimum
required number of table or fields one two three four B two
is .
1,225
While creating the query, the criteria can be set Only one More than One Field As many field All of the Above D All of the Above
1,226
in
SQL stands for . Sub Query Language Structured Query Structured Question System Query Structured Query
Language Language Language B Language
1,227
In MS Access query which logical operator returns True
if both the expressions compared IF AND AND Both AND LIKE AND B AND
are true.
1,228
In MS Access query which logical operator returns True
if either of the expressions OR IF OR IS OR LIKE OR A OR
compared are true.
1,229
Enfore Referencial Integrity option is used to Parent Table Child Table Any one table All of the Above B Child Table
1,230
restrict enerting data in
In MS Access left("Access",3) function will Acc3 Acc 3Acc ess B Acc
1,231
return .
Which function is used to converts the text to Lcase() Lowercase() Lower() None of the A Lcase()
1,232
lower case in MS Access 2010. above
Which function is used to remove leading or trailing None of the above
spaces in a text in MS Access 2010. Remove() Removetext() Trim() C Trim()
1,233
is contains a set of predefined Expression Design Expression elements
functions in MS Acccess and helps build complex Expression Builder Expression Box B Expression Builder
expression.
1,234
Which of the following is a Database Software Excel Outlook Oracle C++ C Oracle
1,235

Which of the following is not the characteristics of a Each Table row Each row/column The order of the rows Each column has a Each column has a
Relational Table? represents a two- intersection represents and columns is specific range of specific range of
dimensional a single data value immaterial to the values known as the values known as the
structure composed DBMS Tuple domain Tuple domain
of rows and columns D

1,236
Which record will be retrieved if the query criteria is < All values less or Value less than 95 Records with date Records with date
#1/1/11#? more than 1,195 characters before 2011 All of above C before 2011
1,237
MS Acces 2010 reads and writes to the .accdb file None of the above
format in chunks also known Pages Encrypt pages Base Database A Pages
as .
1,238
The tab in Expression Builder in which we write Expression Elements Expression Builder
expressions is known as . Operator Button Expression Box window C Expression Box
1,239
The criteria expression LIKE?B*. Will match all text Will match all text Will match all text Will match all text A Will match all text
starting from B ending from B having second starting with a digit starting from B
character as B

1,240
queries are useful for summarizing Select query Crosstab query Action query Parameter query B Crosstab query
information, and are somewhat similar to pivot tables in
MS-Excel.

1,241
While entering record in Datasheet view, in Alphabetical At the end of the Any where in the Beginning of the B At the end of the
1,242
which order the records can be entered Order table table table table
When you delete the record in form, it deletes Form only Form but not in table Table but not in Form & Table D Form & Table
1,243
the record from . Form
The controls that are not linked to any field of the table Unbounded Controls
or query on the form are known as ActiveX control Unbounded Controls Graphics Control Bound Controls B
.
1,244
Which property of the form can be used to insert a
background image in MS Access 2010? Caption Background Record Source Picture D Picture
1,245
is a report that is inserted in Inner-Report Sub-Report Inside-Report Insert-Report C Inside-Report
1,246
another report in MS Access 2010.
A bound main report is based on a Table or query,Inner- Table or query,Main- Table or query,Sub- None of the above Table or query,Sub-
and its contain Report Report Report C Report
realted information.
1,247
DDL stands for Data Definition Data Defined Language Detailed Definition Data Detailed Data Definition
Language Language Language A Language
1,248
A used to compare multiple values of
categories or differences over a period of Pie Chart Area Chart Bar Chart Column Chart D Column Chart
time.
1,249
A used to compare trends over a Pie Chart Line Chart Bar Chart Column Chart B Line Chart
1,250
period of time.
To create a read-only copy of the database, which of the
following file format can be used? .ACCDB .ACCDE .MDW .ACCDT B .ACCDE
1,251
The database administrator created a split database and Front-end database
created a front-end database and back-end database
file.Which of the file should be stored on the server ?
Back-end database Both of them None of them B Back-end database

1,252
To make database package and digitally sign using which File- File->New->Save File->Save as->Save File- File->Save&Publish-
option in Access 2010 ? >Save&Publish- Database as- Database as- >Save&Publish- >Save Database as-
>Save Database as- >Package and sign >Package and sign >Save Object as- >Package and sign
>Package and sign >Package and sign A

1,253
In which formats can the Collect Data through HTML and InfoPath Visual Basic Application
email message feature can send the data entry form? Access Forms Excel attachment A HTML and InfoPath
1,254
Once a mail is sent using the collect data through email Export to Outlook Options in Tool menu Manage replies All of the above C Manage replies
message feature in Access 2010. of Access
The mail status can be checked
using .
1,255
The type of data cannot be
collected using Collect data through email messages. Text Number Date/time AutoNumber D AutoNumber
1,256
What is the memo data type field used for? To add table To store objects For long text entries For shout text entries C For long text entries
created in other of no more than 255
programs characters

1,257
The filter By selection feature allows you to filter: Those records that Records based on a Records that meet any All of above A Those records that
match an entity in a criterion you specify of several criteria you match an entity in a
field specify field

1,258
DML stands for Detailed Maintaining Data Maintaining Data Manipulation Detailed Data Manipulation
Language Language Language Manipulation C Language
Language
1,259
Which editor was provided for use with Access The Visual Basic Notepad The QuickBasic All of above B Notepad
1,260
Basic? 1.0 editor editor
How do you update Pivot Table report data after Save your changes, Select the Pivot Table Click the report, and on Click the report, and
changes are made to the source data? close the workbook, worksheet and press F9 the Pivot Table toolbar, on the Pivot Table
and then reopen on the keyboard click the refresh data toolbar, click the
All of the above C
it. button refresh data
button
1,261
What are the different views to display a Table Datasheet View Design View Pivote Table & All Of Above D All Of Above
1,262
? Pivot Chart View
Which Of The Following Creates A Drop Down Ole Object Hyperlink Memo Lookup Wizard D Lookup Wizard
1,263
List Of Values To Choose From?
A Enables You To View Data From A Table
Based On A Specific Criterion Form Query Macro Report B Query
1,264
The Database Language That Allows You To DCL DML DDL None Of Above A DCL
1,265
Access Or Maintain Data In A Database
DCL Provides Commands To Perform Actions Like Change The Insert, Update Or Authorizing Access And None Of Above C Authorizing Access
Structure Of Tables Delete Records And Other Control Over And Other Control
Data Values Database Over Database

1,266
Which is not a Database Model ? Network Database Relational Database Object Oriented Structureed Structureed Database
Model Model Database Model Database Model D Model
1,267
1,268 Which Of The Field Has Width 8 Bytes? Memo Number Date/time Hyperlink C Date/time
This Is The Stage In Database Design Where One Data Definition Data Refinement Establishing None Of The Above A Data Definition
Gathers And List All The Necessary Fields For The Relationship
Database Project.

1,269
Whenever a tables gets update, the dependent Not update update automatically have to update never update B update
1,270
query will manually automatically
The Third Stage In Designing A Database Is When We Relationship Join Query None Of These A Relationship
Analyze Our Tables More Closely And Create A
Between Tables

1,271
What is the purpose of the Switchboard Manager in To build a main Creates the macros To allow the user to To allow changing To build a main
Microsoft Access 2010? switchboard form used to program an switch from one from one report to switchboard form that
that controls all automatic application. database file to another. controls all other
A
other another. forms.
forms.
1,272
How does a query-based report differ in design to a The reports are It doesn’t It doesn't have as many The only report type B It doesn’t
report based on just one table? restricted in size. design options. available is the
Design
Report.
1,273
How would you include some plain text into a mailing Type the text directly Use the Mailing label Use the >> button. Use the Mailing label
label report? into the Use the > button. wizard text C wizard text
label. option. option.
1,274
In a Microsoft Access 2010 report, the page numbering
would most likely be placed into Report Footer Section Header Page Footer Page Header C Page Footer
the:
1,275
If you wished to present a professionally looking form All The tools of the Form Wizard All The tools of the
on screen that would show all the necessary form design control Columnar form design control
information, which of the following form design tools gallery. gallery.
Pivot Table Pivot Chart C
would you most likely use?

1,276
What are the benefits of an ACCDE Optimizes memory Protects the VBA code
file in Access usage and improves from being viewed or
performance. edited while still
Reduces the size of
allowing it to run. All of the above D All of the above
the database

1,277
An .ACCDE file is a version of the Fixed-down Locked-down Open-down None of the B Locked-down
1,278
original .ACCDB file. above
Which type of the query is used to accept the value Make Table Query
from the user while executing the query Update Query Delete Query Parameter Query D Parameter Query
and fetch records accordingly
1,279
To encrypt the databse in Access 2010 must be opened Open Secure mode Open Exclusive mode Open Exclusive mode
in the . Open Inclusive mode Open Read Mode C
1,280
To extract the records based on date field, $ # () "" B #
1,281
which of the symbol should be used
FIX() is a kind of function in MS-Access Math Date Text None of the A Math
1,282
2010. above
MS-Access 2010 has added new features of None of the above
to eliminate the need of VBA code Macro Form Report A Macro
1,283
Encrypting a database does not restrict access to
database objects, but to the Open Modify Read Write A Open
database.
1,284
The setting for the Security option can be handled File Tab ->New File Tab ->Access File Tab ->Security File Tab ->Access
using in Access 2010. Options, and Options, and selecting Options, and selecting Options, and selecting
selecting the Trust the Trust Centre tab the Trust Centre tab the Trust Centre tab
Centre tab from the from the Access Option from the Access Option from the Access
Access Option window window None of the above B Option window
window

1,285
To create a split database in MS Access 2010 go Create Tab External Tab File tab Database Tools D Database Tools
1,286
to which tab?
After spliting database,frontend database Forms Query Report All of the above D All of the above
1,287
holds .
After spliting database,backend database Tables Forms Query Report A Tables
1,288
holds .
When an Access database is split, it creates two A back-end database A new database & Old primary database & None of the above A A back-end database
files . & front- end database. secondary database & front- end database
database

1,289
A Data Access Page is a special type of None of the above
that allows users to interface with database XML page HTML Page Web page C Web page
using Internet Explorer.
1,290
An is a group of people with a common Company Enterprise Organization Concern B Enterprise
goal, having certain resources at its disposal to achieve
the common goal.

1,291
can be defined as subject- oriented, Data Models Data Warehouses Data Mines Operational Data B Data Warehouses
integrated, time-variant, non-volatile collections of data
used to support analytical
decision making.
1,292
databases contain detailed data Operational Non-Operational Subject-Oriented Informational A Operational
that is needed to satisfy processing requirements but
which has no relevance to
management or analysis.
1,293
Data in the Data Warehouse is Dynamic, Static Non-Volatile, Static Volatile, Static Static, Dynamic D Static, Dynamic
1,294
, not .
data contains an historical perspective Operational, Informational, Static Informational, Informational,
that is not generally used by the Informational Operational, Static Operational D Operational
systems.
1,295
The definition of data elements in the data warehouse Masterdata Detaileddata Metadata Basedata C Metadata
and in the data sources and the transformation rules
that relate them, are
referred to as .
1,296
Data warehouses are not the optimal Structured Unstructured Informational Operational B Unstructured
1,297
environment for data.
Data Warehousing can be used for Credit Card Insurance Fraud Logistics All of the above D All of the above
1,298
. Churn Analysis Analysis Management
is the process of Data Analysis Data Warehousing Data Mining Data Modeling C Data Mining
1,299
extracting patterns from data.
is an approach to quickly Business Processing Online Analytical Product Life Cycle Supply Chain Online Analytical
answer multi-dimensional analytical Management Processing Management Management B Processing
queries.
1,300
include money, manpower,
materials, machines, technologies etc. Costing Production Sales Resources D Resources
1,301
The Output of an OLAP query is typically Matrix Columnar Stepped Outline A Matrix
1,302
displayed in a format.
companies is planning to support tens
of millions of customers with just B2B B2C C2B C2C B B2C
hundreds of employees.
1,303
Which of the following is the limitation of Open Source Increased Unsuitable for
ERP? Complexities Legal Complexities conventional All of the above D All of the above
applications
1,304
Which of the following is not an Open ERP Openbravo SQL-Ledger Open-Project ERP5ERP C Open-Project
1,305
software?
is the process of integrating all the business EDI ERP BPM None of the above B ERP
functions and processes in an organization to achieve
numerous benefits.

1,306
must consider the fundamental issues of Manager Auditor Top Management Either A or B or C A Manager
system integration by analyzing the organization's vision Commitment
and corporate objectives.

1,307
The more the number of , the modules process package units D units
1,308
longer the implementation time.
The user can the company data into multiple
companies as per financial periods Import Export Split Backup C Split
required.
1,309
is a collection of activities that make one Business Model Business Function Business Process Business Operation C Business Process
or more kinds of input and creates an output that is of
value to the customer.

1,310
E-Filing of Returns refers to the process of electronically
filing your tax returns through the Intranet Internet Extranet Any of the above B Internet
.
1,311
Tally.ERP 9 offers a data encryption option Tally Data Tally Data Encoding Tally Vault Tally Data C Tally Vault
1,312
called . Encryption Conversion
is the process of exchanging
Tally.ERP 9 data between two or Serialization Randomization Synchronization Asynchronization C Synchronization
more locations.
1,313
The Tally website offers , by which a Tally Forum Tally FAQ Tally Support Tally Chat D Tally Chat
user can communicate with a Tally representative and
get required information.

1,314
Tally.NET use for centralised Data Centre Control Centre Cloud Centre Administration B Control Centre
1,315
Account Management. Centre
The data is transferred between the remote location Encoding Decoding Encryption Decryption C Encryption
and the server using a secured mechanism called
.

1,316
Sales Tax Ledger falls under which Group? Indirect Expenses Duties and Taxes Sales Purchases B Duties and Taxes
1,317

Alias represents in Tally.ERP9. Short name Nickname Code name All of these D All of these
1,318

If we purchase any Fixed asset in credit, we can Payment mode Receipt mode Journal mode Contra mode C Journal mode
1,319
pass it from .
Information systems can be designed so that accurate Integrated Isolated Information Non-Integrated Non-Isolated Integrated
and timely data are shared between functional areas. Information Systems Systems Information Systems Information Systems Information Systems
These systems are called
A
.

1,320
To save entry without any amount, we have to Cost Center Maintain Multiple Allow 0 value entry Use Rej Notes C Allow 0 value entry
1,321
use . godown
Transfer of materials from one godown to Manufacturing Stock Journal Purchase Journal Both A & B B Stock Journal
1,322
another godown, use . Journal
While exporting Ledgers from Tally to Web XML Format ASCII Format SDF Format HTML Format D HTML Format
1,323
Page, we use .
Budget represents . Estimation Forecasting Assumption All of these D All of these
1,324
In Service tax Credit Adjustment (%) should be 0.2 1 Both A & B Neither A &B C Both A & B
1,325
either .
Service Tax Report can be seen from Display > Day Book Display > Account Display > Statutory Display > Statutory Display > Statutory
. Books Masters Reports D Reports
1,326
Transfer from Main Cash to Petty Cash we Payment Contra Receipt None of these B Contra
1,327
require to pass voucher.
Income Tax number of the Company will appear Cash/Bank Book Profit and Loss A/c Reminder Letter None of these D None of these
1,328
in which report?
A business model is not a model. system mathematical Conceptual Logical B mathematical
1,329

The approach to ERP is to first develop a Business Model Business Function Business Process Business Operation A Business Model
comprising the business processes or
activities that are the essence of a
business.
1,330
Which of the following is/are the data warehousing Identifying and Defining the correct Establishing a data
activity? prioritizing subject level of summarization warehouse help desk
areas to be included to support business and training users to
in the Data decision making effectively utilize the
Warehouse desktop tools All of the above D All of the above

1,331
is the succession of strategies Business Processing Online Analytical Product Life Cycle Supply Chain Product Life Cycle
used by management as a product Management Processing Management Management C Management
goes through its life cycle.
1,332
Which of the following will not appear in the Powerpoint Word Paste Document My Templates C Paste Document
1,333
home page of K-Doc?
To change an email header so that the message appears Email middle attack. Email Spoofing. Email hacking. Email tracking B Email Spoofing.
to have originated from someone or somewhere other
than the actual source is
known as .
1,334
To playfully satirize a website is known Web tapping Web Interception Web spoofing Web threating C Web spoofing
1,335
as .
is the complete package to manage the Billing and Accounting Billing and Accounting
billing requirements of a CA firm on cash Payroll eSecretary software K-DOC application C software
system of accounting.
1,336
Which of the following is not a/an feature of Contact Greeting Management Share certificate Share certificate
eSecretary? Management Email Management printing D printing
1,337
Annual return preparation can be done using ICAI-ROC K-DOC application ICAI XBRL Software Payroll A ICAI-ROC
1,338
. application application
is correspondence automation & K-DOC ICAI-ROC
management software that is seamlessly application eSecretary ICAI XBRL Software application B eSecretary
integrated with Microsoft Office.
1,339
is an independent,objective assurance and Statutory audit Tax audit Internal auditiing None of the Above C Internal auditiing
consulting activity designed to add value and improve
an organization's
operations.
1,340
Which of the following is/are the main purpose Financial Operations of the Both A and B Either A or B C Both A and B
1,341
of the internal audit? reporting organization
As per of the Income tax Act,every
person carrying on business or profession is requires to
get his accounts audited by a CA before the "specified
Section 45 Section 44AD Section 43B Section 44AB D Section 44AB
date".

1,342
refers to use
software/applications to automatically perform tasks
such as accounting,preparing trial balance, financial
statements etc. and electronically transmit data or
information using internet.. ERP Office automation Either A or B None of the Above B Office automation

1,343
FEMA Stands for . Foreign Exports Financial Enterprise Foreign Exchange None of the Above C Foreign Exchange
Management Act Management Act Managament Act Managament Act

1,344
Which application helps the management to allocate Resource allocation Knowledge Document Client management D Client management
the revenue to the credit of the right employee who and scheduling management Management Systems
identified the opportunity?

1,345
Who has full privileges in the financial Database Account System User C System
1,346
accounting application? administrator administrator administrator Administrator administrator
is the centre point of the financial
accounting application as any transactions having
financial impact carried out in any other module will
AP module GL module AR module FA module B GL module
reflect in this module.

1,347
Which of the functionalities is not provided in the Evaluation of Receipts of goods or Invite and analyze Comparison with D Comparison with
purchasing module of Financial Accounting Application. Vendors service quotations from budgets budgets
vendors

1,348
In Financial Accounting Application,automatic sequence Purchasing Accounts Payable Expense Management Fixed assets C Expense Management
number of documents control is not required in which
of the following module?

1,349
Which module of Financial Accounting Application can Accounts Receivable
be used for assigning credit Purchasing Sales Accounts Payable B Sales
limit to customers?
1,350
Which of these will trigger/alert for timely Accounts Accounts Receivable Expense Bank C Expense
1,351
payment ? Payable Management Reconcilations Management
We can manage interviews,offers and job vacancies by Resource allocation HR and Payroll Knowledge None of the Above HR and Payroll
using which of the application? and applications management B applications
scheduling
1,352
, , are Confidentiality,In Confidentiality,Integr Confidentiality,Inte Confidentiality,Int Confidentiality,Inte
commonly referred to as CIA in information security tegrity and ity and Authentication grity and Access rights egration and A grity and Availability
parlance. Availability Authentication
1,353
provides information about updation of Performance HR management Timesheet Timesheet application
project cost based on time spent by management system Payroll application D
employees on various projects. system
1,354
Which of the follwing is not a/an functionality provided Capture the Key Employee designation Automated alerts for Prepare summary or Employee designation
by PMS? Performance and reporting structure pending appraisals bell curve analysis of and reporting
Indicators all employees structure
B

1,355
automates the calculation of salary for Timesheet System HR management Knowledge
taking inputs from the timesheet application, leaves System management System
from Leave Management System and salary details from
Payroll System C Payroll System
the HR master
data.
1,356
Which of the follwing is not a control in Leave Reduce Error free capture of Approval workflow Error free capture of
Management System? administrative Excess leave leave details C leave details
burden on HR
1,357
Permanent Audit File are obtained once but half-yearly yearly monthy quarterly B yearly
1,358
updated on basis.
In Permanent Audit file, is not the key data Organization chart Client’s accounting Copies of clients’ Copies of important Copies of clients’
documented. manual incorporation contracts or long incorporation
documents like MoC term lease documents like MoC
C
agreements

1,359
The Document Management Sytem offers the Role based access Complete audit trail Cost effective to All the Above D All the Above
features . maintain the
documents in soft
copy
1,360
is a type of training in which user logon on the
training server with a user ID and Internal Training E-Learning Classroom Training E-Training B E-Learning
password.
1,361
In some cases, trainee is supposed to appear for the Classroom Training
examination/test at the end of the training E-Learning Virtual Learning All the Above B E-Learning
is .
1,362
are the hardware/infrastructure PC Application Server WAN All the Above D All the Above
1,363
equipments used in a CA firm.
means information available in the Confidentiality Integrity Availability Authentication B Integrity
organization should not be altered or modified by
unauthorized personnel.

1,364
Which of these is/are the standard email Microsoft Lotus Notes Both A and B None of the C Both A and B
1,365
program used in an organization? Exchange Above
Which of the following is not a characteristics of WAN? Most WANs are Compared to LAN, its WAN uses only private Switches are used to B Compared to LAN, its
owned by only one transmission speed is networks. connect LAN and transmission speed is
organization. low WAN low

1,366
is protection of information assets from Information Security None of the above Information Security
threats to preserve their value. Confidentiality Integrity C
1,367
Which types of information assets need to be Client data Own data Own documents All the above D All the above
1,368
secured in a CA Office?
The extent and level of would Availability Confidentiality Integrity Authentication B Confidentiality
1,369
depend on the nature of information.
of information might be affected due to
denial of service attack or some other Integrity Authentication Confidentiality Availability D Availability
reasons.
1,370
means the sender cannot deny
having sent a message and receiver cannot deny Non-Repudiation Integrity Authentication Confidentiality A Non-Repudiation
receiving the message.
1,371
1,372 Risk may not be in nature. reputational financial operational vulnerable D vulnerable
The process of identifying an individual, usually based
on user id and password in an Availability Authentication Confidentiality Integrity B Authentication
organization is called .
1,373
Which of the following is not a software equipment Resource None of the Above
required in a CA's office? allocation and Client management HR and Payroll D None of the Above
scheduling
1,374
Which of the following is not an application ICAI-XBRL suite K-DOC Billing and ICAI-TOC D ICAI-TOC
1,375
arranged by ICAI? Accounting
How many stages are there in the sales cycle? 2 3 4 5B 3
1,376
PBX stands for Private Exchange Public Exchange Branch Private Branch Public Branch Private Branch
Branch exchange exchange C exchange
1,377
XML stands for Expansion Markup Expansion Makeup Extensible Markup EXtensible Makeup Extensible Markup
Language Language Language Language C Language
1,378
VBA stands for . Visual Basic for Visual Basic for Visual Basic for None of the A Visual Basic for
1,379
Applications Applets Apple above Applications
Find the correct sequence in case of XML file, are Structure, store, and Store, structure, and Structure and store Store and transport A Structure, store, and
transport transport information. information. information. transport information.
information.

1,380
Programming of Macros is done in VBA ASP.Net Java C++ A VBA
1,381
programming Language .
As Bank auditors,Many Banking applications generate
text files in . Txt format Csv format Both A and B Nither A Nor B C Both A and B
1,382
Macro security is enabling through . Developer Developer Developer Developer
Not Required tab>Code>Macro tab>Modify>Macro tab>Controls>Ma cro B tab>Code>Macro
Security Security Security Security
1,383
In Excel, Sampling option is available in Insert Data Analysis View None B Data Analysis
1,384
.
Requirements for preparation of cash budget in Excel. Knowledge of Knowledge of Knowledge of cell Knowledge of all of Knowledge of all of
accounting formatting an excel linking & basic the above. D the above.
sheet formulae
1,385
ROE stands for . Recall on Equity Return on Equity Return on Enquary Return of B Return on Equity
1,386
Equalisation
is a statistical procedure that uses sample
evidence and probability theory to determine whether a
statement about the value of a population parameter
should be rejected or should not be rejected. Confidence Interval Hypothesis ANOVA None of the above B Hypothesis

1,387
is a statistical tool used to create Regression Regression Multiple Single Regression C Multiple
1,388
predictive models. equation Regression Regression
shows the ability of a company to pay its
current financial obligations. Quick Ratio Current Ratio Liquidity Ratio Solvency Ratio C Liquidity Ratio
1,389
Macro enabled workbook file extension is .xlsx .xlsm .xlsv .xlsw B .xlsm
1,390

shows dependency of a firm on Quick Ratio Leverage Ratio Liquidity Ratio Solvency Ratio B Leverage Ratio
1,391
outside long term finance.
To record a Macro in relative mode,"Üse Realtive
References" available in which tab of Developer Tab View Tab Both A and B Nither A Nor B C Both A and B
excel ?
1,392
There are ways to open a Macro 3 2 4 1A 3
1,393
enabled workbook.
ANOVA stands for Analysis of Value Analysis of Varity Analog of Variance Analysis of D Analysis of
1,394
Variance Variance
A function doesn’t require an argument DATE() TODAY() MONTH() YEAR() B TODAY()
1,395
is .
In Excel, there are functions for 4 5 6 3B 5
1,396
calculation of depreciation.
SLN function used to calculate depreciation as For calculation of For calculation of For calculation of For calculation of For calculation of
per . depreciation as per depreciation as per depreciation as per depreciation as per depreciation as per
Sum of Years Digit Straight Line Method. Variable Declining Double Declining Straight Line Method.
Method. Balance Method. Balance Method. B

1,397
SYD function used to calculate depreciation as For calculation of For calculation of For calculation of For calculation of For calculation of
per . depreciation as per depreciation as per depreciation as per depreciation as per depreciation as per
Sum of Years Digit Straight Line Method. Variable Declining Double Declining Sum of Years Digit
Method. Balance Method. Balance Method. A Method.

1,398
DB function used to calculate depreciation as For calculation of For calculation of For calculation of For calculation of For calculation of
per . depreciation as per depreciation as per depreciation as per depreciation as per depreciation as per
Sum of Years’ Digit Straight Line Method. Declining Balance Double Declining Declining Balance
Method. Method. Balance Method. C Method.

1,399
DDB function used to calculate depreciation as For calculation of For calculation of For calculation of For calculation of For calculation of
per . depreciation as per depreciation as per depreciation as per depreciation as per depreciation as per
Sum of Years’ Digit Straight Line Method. Declining Balance Double Declining Double Declining
Method. Method. Balance Method D Balance Method

1,400
1,401 XML is a Recommendation. W3C W1C W2C W4C A W3C
VDB function used to calculate depreciation as For calculation of For calculation of For calculation of For calculation of For calculation of
per . depreciation as per depreciation as per depreciation as per depreciation as per depreciation as per
Variable Declining Straight Line Method. Declining Balance Double Declining Variable Declining
Balance Method. Method. Balance Method. Balance Method.
A

1,402
PV Ratio stands for . Point Volume Point Varaiance Profit Volume Profit Variance C Profit Volume
1,403
Ratio Ratio Ratio Ratio Ratio
BEP stands for Break Easy Point Break Even Point Balance Equal Break Equal Point B Break Even Point
1,404
Point
1,405 Data Validation available in which Tab? Formulas Insert Data Developer C Data
function returns value from a given data
range based on row and column. VLOOKUP() HLOOKUP() INDEX() LOOKUP() C INDEX()
1,406
Which function categories are not available in Statistical Engineering Math & Trig Arts D Arts
1,407
Excel.
PMT Function is belongs to which categories of Text Logical Financial Math & Trig C Financial
1,408
Excel function ?
NPV stands Net Present Net Proper Value Net Present Negative Present A Net Present Value
1,409
for Value Variance Value
function uses a fixed rate to calculate DB VDB SYD SLN A DB
1,410
depreciation
Which of them is not a Conditional Operators < </ <= <> B </
1,411
symbols?
XML is a language that is very similar to which C HTML C++ JAVA B HTML
1,412
language ?
In Excel the function =Abs(-4) returns -4 2^2 4 None C 4
1,413
.
function returns the remainder after a DIVISOR() MOD() MODE() REMAINDER() B MOD()
1,414
number is divided by a divisor.
If User want to display the formulas rather than the Formulas > Formula Formulas > Formula Formulas > Function > Formulas > Formula Formulas > Formula
results of the formulas then > Show Formulas. Auditing > Show Show Formulas. Auditing Auditing > Show
choose . Formulas. > Function > Show Formulas.
B
Formulas.

1,415
reveal about the current and future Financial statements Financial statements
financial condition of the company. Report Data None C
1,416
Which of them is a Intangible assets? Goodwill and Cash and Property. investment and None of the A Goodwill and
1,417
Patents. securities. above Patents.
1,418 CR stands for . Current Ratio Clear Ratio Current Rate Clear Rate A Current Ratio
1,419 QR stands for . Quick Rate Quality Ratio Quality Rate Quick Ratio D Quick Ratio
DTD stands for , which is called Direct to Direct Document Type Data Type Data to Data B Document Type
1,420
XML Schema. Definition Definition Definition
ACP stands for . Average collection Average collection Average collection None of the above Average collection
price payment period C period
1,421
FATR stands for . Fixed all turnover Fixed assets test Fair assets Fixed assets D Fixed assets
1,422
ratio ratio turnover ratio turnover ratio turnover ratio
1,423 A can be a numerical fact. Statistic Sale Salary Number A Statistic
stands for reduction in value of Depreciation Data Document Detail A Depreciation
1,424
fixed assets.
Value of fixed assets is generally reduced over the Change in taste of Change in technology
period of time due to . Wear & Tear people All of the Above D All of the Above
1,425
Profit equals to . Purchase - Total Sales - Total Cost Product - Total Manufacturing - B Sales - Total Cost
1,426
Cost Cost Total Cost
Examples of fixed cost are . Salary of
administrative office rent Both A and B None C Both A and B
staff
1,427
1,428 PAN must have characters only. 8 10 11 12 B 10
The extension of a XML document is (.xsd) (.xml) (.mlx) (.xlm) B (.xml)
1,429
.
analysis relates items in the financial Financial ratio Price Perodic Report A Financial ratio
statements in a manner that drives out performance
information about the company.

1,430
How to restrict to run a macro automatically when Hold down the Hold down the CTRL Hold down the ESC key Hold down the Hold down the
starting Microsoft Excel? SHIFT key during key during start up. during start up. ALT key during start A SHIFT key during start
start up. up. up.
1,431
Which option allows you to Bold all the negative values Conditional Formatting Negative Formatting Conditional
within the selected cell range? Zero Formatting Bold Formatting B Formatting
1,432
allow us to perform calculations or Cell referencing Absolute functions Worksheet functions Round( ) functions C Worksheet functions
operations that would otherwise be too cumbersome or functions
impossible altogether.

1,433
Statistical functions in Excel help to calculate Arithmetic Mean Median Mode All of the above. D All of the above.
1,434

Discounting Factor formula is = n / (1+a) - r = 1 + (1/r) * n #NAME? = 1 / (1+r) ^ n D = 1 / (1+r) ^ n


1,435

is considered as non cash


expenditure and occupies a prominent place in Cash Flow Depreciation Fund flow Expenditure B Depreciation
Profit & Loss Account.
1,436
The value which can be realized at the end of life of
fixed asset by selling it is called Salvage Value cost life Factor A Salvage Value
1,437
is prepared for planning for future as far Capital Budgeting
as movement of cash is concerned. Cash budget Both A& B Actual Budget B Cash budget
1,438
To create a XML Map from XML schema, Go to Review Add-Ins Developer Data C Developer
1,439
which Tab in Excel .
is the process of determining the Marginal costing Capital Budgeting Discounting None C Discounting
present value of a payment or a stream of payments
that is to be received in the future.

1,440
is one of the core principals of finance
and is the primary factor used in pricing a stream of
cash flows, such as those found in a traditional bond or
Marginal costing Discounting PMT None B Discounting
annuity.

1,441
XML schemas in Excel are called XML Schemas Maps Elements Markups C Elements
1,442
.
Excel allows us to use various functions and Financial analysis Equity analysis Leasing decisions and All of Above D All of Above
even simple mathematical calculations which can be the list goes on
used for .

1,443
Which cell reference show the reference to other sheet
or reference to other workbook in Sheet2!C4 Sheet2{C4} Sheet2(C4) Sheet2<C4> A Sheet2!C4
excel ?
1,444
1,445 Which of them is not a Range References? A1:A4 $A$1:A4 A1, A2 , A3, A4 A$1:A$4 C A1, A2 , A3, A4
Interest Coverage Ratio equals to . EBIT / Debt EIBT / Debt interest ETIB / Debt interest EBTI / Debt A EBIT / Debt
1,446
interest interest interest
If particular workbook have to open each time Excel
started, where the workbook should be AUTOEXEC folder AUTOSTART folder EXCELSTART folder XLSTART folder D XLSTART folder
placed?
1,447
If the cell B1 contains the formula=$A$1, which of the There is a relative There is an absolute Further changes in Further changes in B There is an absolute
statement is true ? reference to cell reference to cell A1. value of A1 will not value of B1 will not reference to cell A1.
A1 affect B1. affect A1.

1,448
is a computerized mathematical technique Finanical Planning Monte Carlo Simulation Corporate Planning Personal Finance B Monte Carlo
that allows people to account for risk in quantitative Planning Simulation
analysis and decision making.

1,449
The exact syntax of PMT function is . PMT(nper, rate, pv, PMT(rate, nper, pv, [fv], PMT(rate, pv, nper, [fv], PMT(pv, rate, nper, PMT(rate, nper, pv,
[fv], [type]) [type]) [type]) [fv], [type]) B [fv], [type])
1,450
The exact syntax of IPMT function IPMT(rate, nper, pv, IPMT(pv, rate, per, IPMT(per, rate, IPMT(rate, per, IPMT(rate, per,
is . [fv], [type]) nper, [fv], [type]) nper, pv, [fv], [type]) nper, pv, [fv], [type]) D nper, pv, [fv], [type])
1,451
To see the XML Map user must go Developer>XML> Developer> Source File Menu>Options>Ad None of the above. A Developer>XML>
. Source d in>Excel Add Source
In>XML

1,452
EMI stands for . Easy Monthly Equating Monthly Equal Monthly Equated monthly Equated monthly
Installment Income Installement installment D installment
1,453
Which function is used to calculate the principal IPMT PPMT PMT None of the B PPMT
1,454
portion in every installment ? above
It is a process in which a business determines whether Business Investment Capital Budgeting Capital Investment Investment B Capital Budgeting
projects such as building a new plant or investing in a management
long-term venture are worth
pursuing.
1,455
What is the file extension of Schema file which (.xml) (.xsd) (.xlm) (.mlx) B (.xsd)
1,456
contain schema tags ?
NPER stands Total Principal Net Per value Total Interest Number of D Number of Periods
1,457
for Value Value Periods

You might also like