Audit and Banking Quiz Questions
Audit and Banking Quiz Questions
Which is the following step involved in a source code Review Programming Understand program Formulate flaw
review methodology ? standards specifications hypotheses All of the above D All of the above
8
In IDEA which functions should be used to find Detection Exclude Sequence checking Filter A Detection
9
repeated values ?
In IDEA, Stratification functions can be applied Numeric Data Date Data Character Data All of the above D All of the above
10
on which type of data ?
In IDEA,Summarization accumulates the values of
Numeric fields for each . Primary Key Unique Key Secondary Key Composite Key B Unique Key
11
In which sampling,selecting sampling units using a fixed None of the above
interval between selections Random Systematic All of the above B Systematic
is .
12
Ensures that all combinations of sampling units in the None of the above
population have an equal chance of Random Systematic All of the above A Random
selection is .
13
Input Control method is a part of Application TRUE FALSE A TRUE
14
Control Group.
Which is the following type of check that can be run
when data is input through terminal ? Field check Filter check Compare check Data check A Field check
15
In system money transfers are done on a one NEFT, RTGS RTGS,NEFT EFT,RTGS None of the above B RTGS,NEFT
to one basis while in system transfer is done in
batches.
16
All the money transfers take place in the books Beneficiary bank Central bank(RBI) Remitting bank None of the B Central bank(RBI)
17
of the above
system of money transfer is primarily NEFT RTGS EFT All of the above B RTGS
18
used for large transactions.
In RTGS, the STP generates an for every
outbound RTGS transaction. UTN UTE UTR UTS C UTR
19
STP stands for Straight Through Straight Temporary Strict Through None of the above Straight Through
in terms of Processing Processing Processing A Processing
CBS.
20
is a method of creating virtual VLAN LAN WAN MAN A VLAN
21
networks within a physical network.
CMS stands for Control Cash Management Core Management Centre Cash Management
in terms of CBS. Management System System System Management System B System
22
Audit of internal Systems audit are Audit of controls in any Systems audit are
controls is not important for the banking environment is important for the
needed at all verification of the performed using verification of the
internal controls software audit None of the above B internal controls
32
The is essential to ensure that Review Management RTGS Log management Authorized C Log management
computer security records are stored in sufficient detail Controller
for appropriate period of time.
33
All the various servers in the central data centre LANs VLANs WANs MANs B VLANs
34
are seggregated through
The is a complete process in the computer Consalidation Password Policy protection Validation D Validation
so that it ensures that data that is fed in conforms to
certain prerequisite conditions.
35
When the central Data base is busy with central end of
day activities or for any other reason, the file containing
the account balance of the customer is sent to the ATM
Centralised Data base Central Office Data
switch. Such a file Positive Balance File Application Server A Positive Balance File
security Centre.
is called
36
Militarised zone City Zone State zone demilitarised D demilitarised zone
37 The IBDS is located in a zone
The main components of Internet Banking Web server IBAS IBDS All the above D All the above
38
system consist of
Copy of the Anti Virus Software was updated promptly None of the Above
and regularly at the Data Centre and pushed into all of
the servers and in all the
Hacking Method Push-pull method Both A &B B Push-pull method
systems in the branches by
39
The which is also residing in the server at Application Software Application Server Application Software
the branch actually does the banking Sytem software utility software C
operations.
40
In Core Banking concept all the systems of the bank are
connected to the Central office by means of a
connectivity which may be either a
local line Leased line Broadband None B Leased line
or a dial up line.
41
The is generated by the software and Personal Identification Net transaction ID NO Personal Identification
directly sent to equipment for printed the Pin Mailer. 16 digit number Number ATM No B Number
42
would also include the existence of built
in controls in the system to ensure proper processing of
input data so as to provide
Output Control Input control Process Control Data Control C Process Control
the required output.
43
refers to an arrangement wherein the
issuing bank acts on the request Letter of Credit Letter of Tax Letter of Payable Letter of Receible A Letter of Credit
and instructions of a customer.
44
is a process by which the bank Business Recovery Business Continuity Disaster Recovery Business Continuity
ensures the maintenance and recovery of Planning Planning Planning None B Planning
operations.
45
At which phase of testing the version of Programmer User testing (a) & (b) both None of above C (a) & (b) both
46
software is called “ beta version”? testing
47 Finacle developed by Infosys HCL Technologies TCS I-Flex A Infosys
The number that is stored in the ATM switch is Pin No - offset value Offset Value - Pin No - Natural Pin
the difference of which of the following number? Offset value - Pin No Pin No - Natural Pin Natural Pin C
48
The information retrieval of transactions taking place at Soft copy of Hard copy of Electronic Soft copy of Electronic
ATM located at remote locations is Electronic Journal Cash register (a) and (b) both A journal
through journal
49
The number that is generated as soon as the customer
inserts the card in the ATM machine Offset value Pin sent to customer Natural Pin Card Number C Natural Pin
is
50
The tab in Expression Builder in which we write Expression Elements Expression Builder
expressions is known as . Operator Button Expression Box window C Expression Box
51
Will match all text Will match all text Will match all text Will match all text A Will match all text
starting from B ending from B having second starting with a digit starting from B
character as B
53
While entering record in Datasheet view, in Alphabetical At the end of the Any where in the Beginning of the B At the end of the
54
which order the records can be entered Order table table table table
When you delete the record in form, it deletes Form only Form but not in table Table but not in Form & Table D Form & Table
55
the record from . Form
Having clause is used in the aggregate query in FALSE TRUE B TRUE
56
MS Access 2010
The controls that are not linked to any field of the table Unbounded Controls
or query on the form are known as ActiveX control Unbounded Controls Graphics Control Bound Controls B
.
57
Which property of the form can be used to insert a
background image in MS Access 2010? Caption Background Record Source Picture D Picture
58
is a report that is inserted in Inner-Report Sub-Report Inside-Report Insert-Report C Inside-Report
59
another report in MS Access 2010.
A bound main report is based on a Table or query,Inner- Table or query,Main- Table or query,Sub- None of the above Table or query,Sub-
and its contain Report Report Report C Report
realted information.
60
Data Definition Data Defined Language Detailed Definition Data Detailed Data Definition
Language Language Language A Language
65
In which formats can the Collect Data through HTML and InfoPath Visual Basic Application
email message feature can send the data entry form? Access Forms Excel attachment A HTML and InfoPath
66
Once a mail is sent using the collect data through email Export to Outlook Options in Tool menu Manage replies All of the above C Manage replies
message feature in Access 2010. of Access
The mail status can be checked
using .
67
The type of data cannot be
collected using Collect data through email messages. Text Number Date/time AutoNumber D AutoNumber
68
To add table To store objects For long text entries For shout text entries C For long text entries
created in other of no more than 255
programs characters
70
Detailed Maintaining Data Maintaining Data Manipulation Detailed Data Manipulation
Language Language Language Manipulation C Language
Language
71 DML stands for
Which editor was provided for use with Access The Visual Basic Notepad The QuickBasic All of above B Notepad
72
Basic? 1.0 editor editor
Save your changes, Select the Pivot Table Click the report, and on Click the report, and
close the workbook, worksheet and press F9 the Pivot Table toolbar, on the Pivot Table
How do you update Pivot Table report data after and then reopen on the keyboard click the refresh data toolbar, click the
All of the above C
changes are made to the source data? it. button refresh data
button
73
What are the different views to display a Table Datasheet View Design View Pivote Table & All Of Above D All Of Above
74
? Pivot Chart View
Which Of The Following Creates A Drop Down Ole Object Hyperlink Memo Lookup Wizard D Lookup Wizard
75
List Of Values To Choose From?
A Enables You To View Data From A Table
Based On A Specific Criterion Form Query Macro Report B Query
76
The Database Language That Allows You To DCL DML DDL None Of Above A DCL
77
Access Or Maintain Data In A Database
Change The Insert, Update Or Authorizing Access And None Of Above C Authorizing Access
Structure Of Tables Delete Records And Other Control Over And Other Control
DCL Provides Commands To Perform Actions Like Data Values Database Over Database
78
Network Database Relational Database Object Oriented Structureed Structureed Database
Model Model Database Model Database Model D Model
81
Whenever a tables gets update, the dependent Not update update automatically have to update never update B update
82
query will manually automatically
The Third Stage In Designing A Database Is When We Relationship Join Query None Of These A Relationship
Analyze Our Tables More Closely And Create A
Between Tables
83
To build a main Creates the macros To allow the user to To allow changing To build a main
switchboard form used to program an switch from one from one report to switchboard form that
What is the purpose of the Switchboard Manager in that controls all automatic application. database file to another. controls all other
A
Microsoft Access 2010? other another. forms.
forms.
84
The reports are It doesn’t It doesn't have as many The only report type B It doesn’t
How does a query-based report differ in design to a restricted in size. design options. available is the
report based on just one table? Design
Report.
85
How would you include some plain text into a mailing Type the text Use the Mailing Use the >> button. Use the Mailing
label report? directly into the Use the > button. label wizard text C label wizard text
label. option. option.
86
In a Microsoft Access 2010 report, the page
numbering would most likely be placed into the: Report Footer Section Header Page Footer Page Header C Page Footer
87
If you wished to present a professionally looking form All The tools of the Form Wizard All The tools of the
on screen that would show all the necessary form design control Columnar form design control
information, which of the following gallery. gallery.
Pivot Table Pivot Chart C
form design tools would you most likely use?
88
An .ACCDE file is a version of the Fixed-down Locked-down Open-down None of the B Locked-down
89
original .ACCDB file. above
Which type of the query is used to accept the Make Table Query
value from the user while executing the query and fetch Update Query Delete Query Parameter Query D Parameter Query
records accordingly
90
To encrypt the databse in Access 2010 must be opened Open Secure mode Open Exclusive mode Open Exclusive mode
in the . Open Inclusive mode Open Read Mode C
91
To extract the records based on date field, $ # () "" B #
92
which of the symbol should be used
FIX() is a kind of function in MS-Access Math Date Text None of the A Math
93
2010. above
None of the above
MS-Access 2010 has added new features of
Macro Form Report A Macro
to eliminate the need of VBA code
94
Encrypting a database does not restrict access
to database objects, but to the database. Open Modify Read Write A Open
95
Third Party Encryption Technology can also be
applied to the database of Microsoft Access 2010. TRUE FALSE A TRUE
96
To create a split database in MS Access 2010 go Create Tab External Tab File tab Database Tools D Database Tools
97
to which tab?
After spliting database,frontend database Forms Query Report All of the above D All of the above
98
holds .
After spliting database,backend database Tables Forms Query Report A Tables
99
holds .
A back-end database A new database & Old primary database & None of the above A A back-end database
When an Access database is split, it creates two & front- end database. secondary database & front- end database
files . database
100
A Data Access Page is a special type of None of the above
that allows users to interface with database XML page HTML Page Web page C Web page
using Internet Explorer.
101
OLAP systems use concept of OLAP cube called single hyper dimensional multi dimensional none C multi dimensional
102
a cube dimensional
The data which is to be exported from Tally.ERP XML HTML ASCII ALL D ALL
103
9 can be in format.
In Tally ERP-9 Remote Access is also known as Networking VB.Net Tally.Net None of the C Tally.Net
104
. above
Accessing data store on a remote location using Internet None of the above
in Tally.ERP9 is called . Local Data Remote Data Internet Data B Remote Data
105
Tally.ERP9 can be classified user in two Local User Remote User Both A & B None of the C Both A & B
106
categories are . above
Which of the following is not a predefined security level
provided by Tally.ERP 9? Owner Public User Data Entry Tally.NET User B Public User
107
The business model is represented in the graphical form flowcharts, flow flowcharts, flow
using and charts, pictures smart art, clip art diagrams graphs, shapes C diagrams
108
integrates supply and demand BPM SCM PLM CRM B SCM
109
mangement within and across companies.
Online Analysis Online Analytical Online Analytical None of the above Online Analytical
Processing Processing Programming B Processing
113
The system process will address issues implementation upgradation installation migration C installation
such as software configuration, hardware acquisition
and software testing.
114
A review is recommended to pre implementation under process review post implementation None of the above C post implementation
ensure that all business objectives established during
the planning
phase are achieved.
115
In stages, auditors have access to post implementation pre implementation Both A & B Either A Or B A post implementation
rudimentary ERP tools and capabilities for auditing
security configurations.
116
Immediate posting and updation of books of accounts Interactive Immediate Processing Real Time Processing Business Processing Real Time Processing
as soon as the transactions are Processing C
entered. This is called as
117
Which of the following ETDS forms are available Form 26, Form 27, Annexure Form 26Q, All of the above D All of the above
118
in Tally.ERP 9? Annexure to 26 to 27 Annexure to 26Q
The exported eTDS file from Tally.ERP 9 can be validated File Validation File Validation Utility File Valuation Program File Valuation Utility B File Validation Utility
through NSDL's freely downloadable utility called Program
119
ERP systems provide an access to integrated distributed isolated de-centralized A integrated
120
the data
is a tool that refers to skills, Data Warehousing Business Intelligence Business Intelligence
processes, technologies, applications and practices used
to facilitate better, accurate and quicker decision
Data Modeling Business Modeling D
making.
121
Business intelligence systems are data-driven information driven resource driven none A data-driven
122
Decision Support Systems.
Data warehousing technology is the process of creating
and utilizing the company’s general data historical data operational data none B historical data
123
The data in the Warehouse comes from the
environment and external sources. operational backup data none A operational
124
In essence, SCM integrates management supply and demand supply and demand
within and across companies. supply and chain supply and sortage none A
125
including all fulfillment Inbound operations hybridbound outbound operations
activities, warehousing and transportation to customers. outbound operations operations none B
126
Customer Relationship Management is a business corporate strategic none B corporate
127
level strategy.
Operational CRM provides support to front office back office staff none A front office
128
business processes.
Collaborative ultimate goal is to use information CRM's ERP SCM none A CRM's
collected by all departments to improve the quality of
services provided by the
company.
129
Tally.ERP 9 follows the DES encryption decryption cryptography none A encryption
130
method to safeguard the data.
Immediate posting and updation of books of Interactive Immediate Processing Real Time Processing Business Processing Real Time Processing
accounts as soon as the transactions are entered. This Processing C
is called as
131
Information Systems Integrated Information Decision Support Non-Isolated Decision Support
Business Intelligence Systems are data-driven Systems Systems Information Systems
C
. Systems
132
Which of the following ETDS forms are available Form 26, Form 27, Annexure Form 26Q, All of the above D All of the above
133
in Tally.ERP 9? Annexure to 26 to 27 Annexure to 26Q
The exported eTDS file from Tally.ERP 9 can be validated File Validation File Validation Utility File Valuation Program File Valuation Utility B File Validation Utility
through NSDL's freely downloadable Program
utility called
134
With technology the characters are
reduced in breadth and user is allowed to input
additional characters which would make the account
Tally Fix Tally Adjust Tally Fit Tally AutoFit C Tally Fit
name, entity complete
and readable.
135
In Tally.ERP 9 provides the user User-defined HTTP-XML based data Unlimited multi- user
with administrator rights and the capability to check the Security interchange support
entries made by the authorised users and alter these
Audit Feature D Audit Feature
entries, if
necessary.
136
is an enabling framework which Direct Web Browser
establishes a connection through which the remote user Access
can access the Client's data without
Web Publishing Tally.NET Email facility C Tally.NET
copying/transferring the data.
137
If we want the company to be connected Allow to Connect Contact On Load Either A or B None of the above B Contact On Load
automatically for remote access on load, the property Company
needs to be set it as Yes.
138
technology is the Data Warehousing Business Intelligence
process of creating and utilizing the company's historical Data Modeling Business Modeling A Data Warehousing
data.
139
Is there a fixed qualification for internal TRUE FALSE B FALSE
140
auditor .
Which of the following will not appear in the Powerpoint Word Paste Document My Templates C Paste Document
141
home page of K-Doc?
To change an email header so that the message appears Email middle attack. Email Spoofing. Email hacking. Email tracking B Email Spoofing.
to have originated from someone or somewhere other
than the actual source is
known as .
142
To playfully satirize a website is known Web tapping Web Interception Web spoofing Web threating C Web spoofing
143
as .
is the complete package to manage the Billing and Accounting Billing and Accounting
billing requirements of a CA firm on cash Payroll eSecretary software K-DOC application C software
system of accounting.
144
Which of the following is not a/an feature of Contact Greeting Management Share certificate Share certificate
eSecretary? Management Email Management printing D printing
145
Annual return preparation can be done using ICAI-ROC K-DOC application ICAI XBRL Software Payroll A ICAI-ROC
146
. application application
is correspondence automation & K-DOC ICAI-ROC
management software that is seamlessly integrated application eSecretary ICAI XBRL Software application B eSecretary
with Microsoft Office.
147
is an independent,objective assurance and Statutory audit Tax audit Internal auditiing None of the Above C Internal auditiing
consulting activity designed to add value and improve
an organization's
operations.
148
Which of the following is/are the main purpose Financial Operations of the Both A and B Either A or B C Both A and B
149
of the internal audit? reporting organization
As per of the Income tax Act,every
person carrying on business or profession is requires to
get his accounts audited by a CA before the "specified
Section 45 Section 44AD Section 43B Section 44AB D Section 44AB
date".
150
refers to use
software/applications to automatically perform tasks
such as accounting,preparing trial balance, financial
statements etc. and electronically transmit data or
information using internet.. ERP Office automation Either A or B None of the Above B Office automation
151
Foreign Exports Financial Enterprise Foreign Exchange None of the Above C Foreign Exchange
Management Act Management Act Managament Act Managament Act
153
Who has full privileges in the financial Database Account System User C System
154
accounting application? administrator administrator administrator Administrator administrator
is the centre point of the financial
accounting application as any transactions having
financial impact carried out in any other module will
AP module GL module AR module FA module B GL module
reflect in this module.
155
In Financial Accounting Application,the transactions
flow from GL (General ledger) to TRUE FALSE B FALSE
other modules.
156
Which of the functionalities is not provided in the Evaluation of Receipts of goods or Invite and analyze Comparison with D Comparison with
purchasing module of Financial Accounting Application. Vendors service quotations from budgets budgets
vendors
157
In Financial Accounting Application,automatic sequence Purchasing Accounts Payable Expense Management Fixed assets C Expense Management
number of documents control is not required in which
of the following module?
158
Which module of Financial Accounting Application can Accounts Receivable
be used for assigning credit Purchasing Sales Accounts Payable B Sales
limit to customers?
159
Which of these will trigger/alert for timely Accounts Accounts Receivable Expense Bank C Expense
160
payment ? Payable Management Reconcilations Management
We can manage interviews,offers and job vacancies by Resource allocation HR and Payroll Knowledge None of the Above HR and Payroll
using which of the application? and applications management B applications
scheduling
161
, , are commonly Confidentiality,In Confidentiality,Integr Confidentiality,Inte Confidentiality,Int Confidentiality,Inte
referred to as CIA in information tegrity and ity and grity and Access egration and A grity and
security parlance. Availability Authentication rights Authentication Availability
162
provides information about updation of Performance HR management Timesheet Timesheet application
project cost based on time spent by management system Payroll application D
employees on various projects. system
163
Capture the Key Employee designation Automated alerts for Prepare summary or Employee designation
Performance and reporting structure pending appraisals bell curve analysis of and reporting
Which of the follwing is not a/an functionality provided Indicators all employees structure
B
by PMS?
164
automates the calculation of salary for Timesheet System HR management Knowledge
taking inputs from the timesheet application, leaves System management System
from Leave Management System and salary details from
Payroll System C Payroll System
the HR master
data.
165
Which of the follwing is not a control in Leave Reduce Error free capture of Approval workflow Error free capture of
Management System? administrative Excess leave leave details C leave details
burden on HR
166
Permanent Audit File are obtained once but half-yearly yearly monthy quarterly B yearly
167
updated on basis.
Organization chart Client’s accounting Copies of clients’ Copies of important Copies of clients’
manual incorporation contracts or long incorporation
In Permanent Audit file, is not the key data documents like MoC term lease documents like MoC
C
documented. agreements
168
is a type of training in which user
logon on the training server with a user ID and Internal Training E-Learning Classroom Training E-Training B E-Learning
password.
169
In some cases, trainee is supposed to appear for the Classroom Training
examination/test at the end of the training E-Learning Virtual Learning All the Above B E-Learning
is .
170
are the hardware/infrastructure PC Application Server WAN All the Above D All the Above
171
equipments used in a CA firm.
means information available in the Confidentiality Integrity Availability Authentication B Integrity
organization should not be altered or modified by
unauthorized personnel.
172
Which of these is/are the standard email Microsoft Lotus Notes Both A and B None of the C Both A and B
173
program used in an organization? Exchange Above
Most WANs are Compared to LAN, its WAN uses only private Switches are used to B Compared to LAN, its
owned by only one transmission speed is networks. connect LAN and transmission speed is
Which of the following is not a characteristics of WAN? organization. low WAN low
174
is protection of information assets from Information Security None of the above Information Security
threats to preserve their value. Confidentiality Integrity C
175
Which types of information assets need to be Client data Own data Own documents All the above D All the above
176
secured in a CA Office?
The extent and level of would Availability Confidentiality Integrity Authentication B Confidentiality
177
depend on the nature of information.
of information might be affected
due to denial of service attack or some other reasons. Integrity Authentication Confidentiality Availability D Availability
178
means the sender cannot deny
having sent a message and receiver cannot deny Non-Repudiation Integrity Authentication Confidentiality A Non-Repudiation
receiving the message.
179
180 Risk may not be in nature. reputational financial operational vulnerable D vulnerable
The process of identifying an individual, usually based
on user id and password in an Availability Authentication Confidentiality Integrity B Authentication
organization is called .
181
Which of the following is not a software equipment Resource None of the Above
required in a CA's office? allocation and Client management HR and Payroll D None of the Above
scheduling
182
Which of the following is not an application ICAI-XBRL suite K-DOC Billing and ICAI-TOC D ICAI-TOC
183
arranged by ICAI? Accounting
Private Exchange Public Exchange Branch Private Branch Public Branch Private Branch
Branch exchange exchange C exchange
186
shows ability of company to pay back long Debt Assets Ratio Interest Coverage Ratio Total Fund Ration None of the above B Interest Coverage
term loans along with interest or other charges from Ratio
generation of profit from its
operations.
187
is the simplest method of Earnings Per share Fixed Asset Over ratio Price Earnings Multiple Gross Profit Ratio C Price Earnings
comparing different stocks at a point of time to make Multiple
investment decisions.
188
<?xml version="3.0" <?xml version="2.0" <?xml version="1.0" <?xml version="0.0" C <?xml version="1.0"
encoding="ISO- encoding="ISO-8859- encoding="ISO- encoding="ISO- encoding="ISO-
The very first line of code of XML file is . 8859-1"?> 1"?> 8859-1"?> 8859-1"?> 8859-1"?>
189
Every bit of data has to start and end with an <TagName>Data </TagName>Data<Ta </TagName>Data< <TagName>Data< A <TagName>Data</
190
identical tag </TagName> gName> /TagName> TagName> TagName>
Directally Delete XML Maps Dialog Box None of the above XML Maps Dialog Box
Deletion of XML Map is done through Command Delete Button C
.
191
Excel works primarily with types of 3 2 1 4 B 2
192
XML files.
Method of tax calculations shall change Annual Income DOB status of assess All of the above. D All of the above.
193
according to .
is a process used in statistical analysis in Snowball sampling Sampling Systematic sampling Simple random B Sampling
which a predetermined number of observations will be sampling
taken from a larger
population.
194
In , Individuals are selected at Clustered sampling Systematic sampling Simple random Systematic sampling
regular intervals from a list of the whole population. Sampling sampling C
195
In each individual is chosen entirely by Snowball sampling Convenience sampling Systematic sampling Simple random D Simple random
chance and each member of the population has an sampling sampling
equal chance, or probability,
of being selected.
196
Which method is commonly used in social Simple random
sciences when investigating hard to reach groups? Quota Sampling Sampling Snowball sampling sampling C Snowball sampling
197
are useful for quick reading and
easy understanding, particularly for top management. Balance sheet Summary reports IRR NPV B Summary reports
198
Popular methods of capital budgeting include discounted cash internal rate of net present value All the above D All the above
199
and payback period. flow return
is the value of all future cash inflows less Net present value
future cash outflows as on today. Working capital IRR PMT A Net present value
200
is the process of defining and analyzing Sensitivity analysis Qualitative risk analysis
the dangers to individuals, businesses and government
agencies posed by potential natural and human-caused
Risk analysis Scenario analysis B Risk analysis
adverse events.
201
which is used more often, does not involve Sensitivity analysis Qualitative risk analysis Qualitative risk
numerical probabilities or predictions of Risk analysis Scenario analysis C analysis
loss.
202
are generally used to present information in a Graphs Sparklines Both A& B Charts D Charts
simple and better way and also be used to analyse the
risk in a better way.
203
It is a technique used to determine how different values Decision Tree
of an independent variable will impact a particular analysis
dependent variable under a
Sensitivity analysis Both A& B Neither A &B B Sensitivity analysis
given set of assumptions.
204
involves computing different reinvestment Scenario analysis Sensitivity analysis Decision Tree Analysis None A Scenario analysis
rates for expected returns that are reinvested during
the investment horizon.
205
Which function that is used to calculate the payment for None of the above
specific loan terms SUMIF() PMT COUNTIF() B PMT
206
helps to break down the Return on Du Point Analysis Return on Profitability Ration None of the A Du Point Analysis
207
Equity Investment above
is a common method for financing property,
facilities, and equipment. Mortagage Leasing Rent All the above B Leasing
208
Which option can be used to split windows into Format -> Window -> Split View -> Window -> View -> Split B Window -> Split
209
four in ms excel 2010? Window Split
Settings Tab under Settings Tab under the Settings Tab under the All of the above B Settings Tab under
How to restrict the values of a cell so that only a list can the Tab Format -> tab Data -> Validation tab Data -> Filter - the tab Data ->
be entered in a cell? Cells >Advanced Validation
Filter
210
What does the COUNTA() function do in MS Excel 2010 Counts cells having Counts cells having Counts non- empty Counts non-empty
? alphabets Counts empty cells number cells D cells
211
If the value in A1 is "ITT" and in B1 is "ICAI ", which
function in Excel will return " ITT @ ICAI " A1+ "@" + B1 A1 # "@" # B1 A1 & "@" & B1 A1 $ "@" $ B1 C A1 & "@" & B1
in cell C1?
212
Which of the following function will return a ROUNDUP(7.499 ROUNDDOWN(7.499 ROUND(7.4999,0) Only B & C D Only B & C
213
value of 7? 9,0) 9,0)
A tiny chart embedded in a worksheet cell that provides
a visual representation of data is a Bar Chart Sparkline Pivot Chart Pie Chart B Sparkline
214
is a graphical equivalent of a pivot None of the above
table, which is used to visualise PivotTable report Bar Chart Pivot Chart Sparklines B Pivot Chart
215 summary data
To frequently print a specific range of cells on a Pagelayout -> Pagelayout -> Print Page Setup -> Print Pagelayout -> Page
worksheet , the option used is Page Setup -> Print Area Area Print Area A Setup -> Print Area
Area
216
Non-excel files can be opened in MS Excel using Add Ins Developer Tab Text Import wizard Analysis Tool Pak C Text Import wizard
217
the
218 is a text concatenation operator. # $ & * C &
AVERAGE(4,5,6,7 AVERAGE(A1,B1,C1) AVERAGE(A1:A6,B1 All of the above D All of the above
219 Which of the following is correct? ) :B6)
function in MS-Excel returns the remainder after
number is divided by divisor. MOD() INT() DIV() REMAINDER() A MOD()
220
221 EXCEL Work in Mode 3 5 7 11 A 3
XWE XFD XAA AAA B XFD
222 In Ms-Excel 2010, is Last Column Name?
In Excel 2010, the default criteria setting for Top10 Bottom10 Top half All D All
223
AutoFilter in each field is .
Subtotal option is in group of Data Sort & Filter Outline Data Tools Calculation B Outline
224
tab in Excel 2010.
Which of the following cannot store connection
information of an external data source in Excel 2010? Workbook .odc file .htm file .udcx file C .htm file
225
The default pivot chart type in Excel 2010 is a Column Line Scatter Bubble A Column
226
chart.
To consolidate Excel data, Consolidation by Consolidation by Consolidation using 3-D Any of the above C Consolidation using 3-
is used when worksheet position category formulas D formulas
data does not have a consistent layout or pattern.
227
In Excel 2010, the function is used TREND STANDARDIZE CORREL GROWTH A TREND
228
to generate a forecast.
function calculates the payment for a
loan (installment) based on constant payments and a PV NPV IRR PMT D PMT
constant interest rate.
229
are easy-to-use filtering components that Sparklines Slicers Macros Data Forms B Slicers
enable the user to quickly filter the data in a PivotTable
report in MS-Excel
2010.
230
In Excel 2010, range C3:C6 indicates Cells C3 through Cell C3 and Cell C6 Cell C4 and Cell C5 None of the A Cells C3 through
231
. C6 above C6
Keyboard shortcut to show a shortcut menu in MS Excel
2010 is . Shift + F10 Shift + F1 Shift + F11 Shift + F12 A Shift + F10
232
To select multiple non-adjacent cells in an Excel
2010 worksheet, click them holding key. Ctrl Alt Shift Ctrl + Shift A Ctrl
233
A quick way to return to a specific area of a Name Box Formula Bar Zoom Box Sheet Tab A Name Box
worksheet in Excel 2010 is to type the cell address or
range name in the .
234
Name of the Name of the worksheet Name of the cell or Formula in the cell C Name of the cell or
In MS-Excel 2010, the Name Box shows the workbook currently currently working on range currently working currently working on range currently
. working on on working on
235
In Excel 2010, what is represented by the small black
square in the lower-right corner of an Copy handle Fill handle Insert handle Border B Fill handle
active cell or range?
236
Suppose we accidentally erased a record in an Excel
worksheet. Which command can be used Insert Replace Paste Undo D Undo
to restore it immediately?
237
Excel 2010 offers up to sort 32 64 60 80 B 64
238
levels.
Which feature in Excel 2010 enables us to find the input
values needed to achieve a goal or Goal Seek Consolidate Data Validation Subtotal A Goal Seek
objective?
239
Rounds a number to Rounds a number down Rounds a number up Calculates interest B Rounds a number
a desired multiple to the nearest integer down to the nearest
integer
241
A formatted A formatted defined A worksheet with a A worksheet with A formatted
description of each range of Solver and separate thumbnail for separate macros for description of each
scenario on a Goal Seek solutions each formula each scenario scenario on a separate
A
separate worksheet
worksheet
242 What is a scenario summary report?
243 What does Solver uses in its dialog box? Arguments Limitations Constraints Parameters D Parameters
What term describes a feature that gives Excel Trendlining Enhancement bit Thumbnail Add-in D Add-in
244
enhanced capability?
What dialog box allows you to change a field Field Options Field Pane Field Settings Field Structure C Field Settings
245
name in a PivotTable?
They allow you to They allow you to They allow you to They allow you to They allow you to
add dynamic data. rearrange row and generate e-mail print the reports rearrange row and
column data. enabled reports. with various settings. column data.
B
247
Grand totals calculated for any code on a Financial totals Record totals Document totals Hash totals D Hash totals
248
document in the batch are called…..
Control that checks if correct sequence of commands Table level Data Integrity Batch check System test B Data Integrity
and update parameters are passed from the application
software to the database.
249
With respect to data integrity control, when monetary Sequence account Data account Suspense account Update account C Suspense account
transactions are processed against master files without
a match, we should
maintain a ….
250
The system test that tests the top-level modules first
and then the lower modules are simulated with dummy
modules to check the interfaces is called ….
Bottom up test Hybrid test Stub test Top down test D Top down test
251
Identify the audit technique that examines each
transaction as it passes through the system. Embedded code Program code Database Analyzers Database code A Embedded code
252
The Core Image Comparison audit technique compares Database with Executable program Transaction data with Module programs Executable program
the…. master table with master copy master with snapshots B with
transaction master copy
253
The technique used by an auditor to list unused Modelling Analyzing Mapping Tracing C Mapping
254
program instructions is…..
The sample data created and used for the purpose of
testing the application system is Test data Table data Item data Record data A Test data
called….
255
The test data (dummy unit) implemented in the normal Integrated Test Black box Test Facility Integrated Test
processing of the system over a period Facility Graph testing Whitebox testing A Facility
of time is known as….
256
The test data generated with correctness proof, data
flow analysis and control flow analysis Test item block Test data pack Test program pack Test record pack B Test data pack
tools is called….
257
The organisational, management, maintenance and Application controls
access controls are categories of …… General controls Check controls Input controls B General controls
258
When a real-time system is simulated to generate the Parallel simulation
same output as the real-time Parallel trailing Tracing parallel Parallel coding D Parallel simulation
system, the technique is called….
259
When an auditor expands the extent of substantive Cross reference lister Formulate flaw Correct lister Formulate correct B Formulate flaw
tests to determine the impact of defects on the hypotheses hypotheses hypotheses
attainment of program
objectives, the methodology is….
260
This is an important control in systems that use digital
signatures for authentication purposes. Public audit trails Random audit trails Sample audit trails Data audit trails A Public audit trails
261
Selecting transactions based on a sampling rate Transaction Systematic sampling Simple sampling Demographic B Systematic
262
is called …. method. sampling sampling sampling
The capability of the generalized audit software to read File size File data File access File reorganisation C File access
different data coding schemes, different record formats
and different file structures is….
263
The audit software capability of frequency Sort and merge Sampling nth item Formatting output Classify data on a D Classify data on a
264
analysis is to…. files criteria criteria
The audit functions of attributes sampling, variables
sampling, stratified sampling are Stratification Selection Statistical Reporting C Statistical
included in …. functions.
265
Identify the functional limitation of a generalized audit Ex Post Auditing Only Analytical review only Limited ability to Limited ability to A Ex Post Auditing Only
software that enables evidence collection only on the determine Propensity Verify Processing
state of an for logic
application system after the fact. Error
266
Sorting, creating, and Data retrieval, code Reading data, selecting Specific tasks with D Specific tasks with
printing files comparison and analyzing original or modified original or modified
The purpose-written audit programs are used for….. information programs programs
267
Picture of a transaction as it flows through the Program Track Snapshot Picture C Snapshot
268
computer systems is called…..
Input controls Processing controls Both A and B Neither A nor B C Both A and B
269 The application controls are ….
274
A group of records or transactions that are Physical batches Logical batches Block batches Transact batches A Physical batches
275
contiguous constitute …..
… is the type of batch check (group of
records) for all input records of a particular type Control totals Serial number Transaction type Sequence check C Transaction type
is done.
276
277 DB2 is an example of ODBMS RDBMS DBMS None C DBMS
is used to Modify/Change Data in Update Query Process Query Insert Query None A Update Query
278
Table
279 MS-Access is DBMS RDBMS ODBMS None A DBMS
Which of the following is not a data type in MS- Number Character Memo Date B Character
280
Access?
To make changes in MS-Access form should be Form view Form Design Change Form None B Form Design
281
opened in
layout of a form displays one record at Tabular columnar Datasheet None B columnar
282
a time
Data manipulation Data mathematical Data manipulation
language language both a and b None A language
283 In SQL, DML stands for
To see more than one record at a time in a form Tabular columnar both a and b None A Tabular
284
we use
285 The default query invoked by ms-access is Update Query Select Query Delete Query None B Select Query
software serves as the
Intermediary between the user and the database DATABASE DBMS O.S None B DBMS
286
Distributed database have now come to know Client data base Server data base Client-Server None C Client-Server
287
as a database database database
Data Design Define Data Data Definition None C Data Definition
288 DDL Stands for -. Language Language Language Language
In DBMS, view level data abstraction is known Internal Schema Conceptual Schema External Schema None C External Schema
289
as
In DBMS, Normalization concept responsible for Increase data Reduce Redundancy Increase Efficiency All B Reduce
290
duplication Redundancy
one 2 one, one 2 many and many 2 many Hierachical FLAT FILE SYSTEM Relational model None C Relational model
291
Relationship exist in model
Record is also known as in a Attribute Entity Tuple None C Tuple
292
Relational data base
is extention of ACCESS .mdb .dbf .accdb None C .accdb
293
DATABASE
Default length of numeric data type is 255 char 16 chra text long Integer D long Integer
294
Default value option in field property use for enter a value for checking for validation check None A enter a value
295
automatically automatically
Value of Report Header exist on every first last None B first
296
page of report
is an action or set of actions that program check macro All C macro
297
you can use to automate tasks
298 SQL is a Language Programming Non-Procedural Application None B Non-Procedural
Which one is the Second Level of Data Physical level Logical Level View Level None B Logical Level
299
Abstraction?
Memo data type store number of 256 1000 16536 63999 D 63999
300
characters.
YES/NO HYPERLINK MEMO AUTONUMBER D AUTONUMBER
301 data type field can't be updated
Most database operations that we do manually Program query form macro D macro
303
can be automated by using
are what we use to summarize and Report Query Form Macro A Report
304
present data in the table
A database tabel is similar in appearance to a MS-WORD Excel/spreadsheet Powerpoint None B Excel/spreadsheet
305
DBMS that supports a database located at a Multiuser DBMS Distributed DBMS Centralized DBMS Database C Centralized DBMS
308
single site is called a
DBMS that supports a database distributed across Client-Server
several different site is called a database Distributed DBMS Multiuser DBMS Centralized DBMS B Distributed DBMS
309
The key does not accept Duplicate key field Primary key Reference Key None B Primary key
310
and Null values in Field.
is often implemented as an array of
311
records Record Tuple Tabel Attribute B Tuple
In MS-Access 2010,the control in the form
lets the user insert a picture into it. Title Logo Picture Graphic B Logo
312
Which query should be used to retrieve the following Search Query Make Table Query Aggregate Query Select Query D Select Query
information from table of databases "Which employees
earn more than Rs.30,000 a
month?"
313
View, change and A source of records for Both A and B Neither A nor B C Both A and B
Queries in MS-Access 2010 can be used as analyze data in forms and reports
. different ways
314
It is a printed page It is a Data Entry Screen It is a part of database It is a Data Entry
where users will to make viewing, used by the analysts to Screen to make
enter data entering and editing draw conclusions viewing, entering and
data in the database editing data in the
table None of the above B database table
330
In a table, uniquely identifies each
record that is stored in the table. Unique Key Foreign Key Primary Key Record Key C Primary Key
331
is used to insert values in Table Query Report Form None A Query
332
directly.
Changing the Creating views and Authorizing access and Inserting, updating C Authorizing access
DCL provides commands to perform actions like structure of tables indexes other control over or deleting records and other control over
. database database
333
A database presents summarized information
retrieved from a table in a Form Query Macro Report D Report
preformatted, attractive manner.
334
In MS-Access 2010, which type of query extracts the Parameter query Update query Crosstab query Make Table query D Make Table query
data from one or more existing tables and puts them
into separate table?
335
In an MS-Access report, in which section we can In the Report Header In the Report Footer In the Page Footer In the Month Group In the Month Group
keep the count[Sales] to calculate the total sales for Section Section Section Footer D Footer
each month? Section Section
336
Selecting the fields Selecting the Reading several screens Selecting how the Selecting the
that we want to underlying table or of mostly useless form or report underlying table or
What is the first step in creating a form or report using appear in the form or query on which we information and should be formatted query on which we
the Form Wizard or the Report Wizard in MS-Access report want to base the form clicking next B want to base the form
2010? or report or report
337
Data independence Data integrity and Decentralized data Reduced application C Decentralized data
Which of the following is not an advantage of using a security development
DBMS? time
338
provides in Access 2010 is used to convert Table Analyzer Database Analyzer Form Analyzer Wizard None of the above Table Analyzer Wizard
database tables to the normalized Wizard Wizard A
form.
339
Which Ribbon command tab includes the Table Create External Data Home Database Tools D Database Tools
340
Analyzer Wizard in MS Access 2010 ?
A Junction Table creates a None of the above
relationship between two tables. One-to-One One-to-Many Many-to-Many C Many-to-Many
341
The Primary key of one table and the matching column None of the above
in another table is known as Matching Key Foreign Key Index key B Foreign Key
.
342
For ordering records specifying conditions specifying conditions
with group by clause updating records None B with
group by clause
343 In SQL, having clause is used for
To compact the database in MS Access 2010, the
database must be opened in the Inclusive Mode Exclusive Mode Normal Mode Save Mode B Exclusive Mode
.
344
In MS Access 2010, help protect a database Backups Save Database Save As Databse None of the above A Backups
from system failures and against mistakes that the Undo
command cannot fix.
345
Improving the performance of a database in MS Access Performance None of the above Performance Analyzer
2010 used tool. Analyzer Hi-tech Analyzer Online Analyzer A
346
The can be used to create reports Table Documenter Database Documenter Query & Report None of the above Database Documenter
on database objects for planning and modifying Documenter B
database design.
347
Use to grant or revoke User and Group User-level Security User and Group None of the above User and Group
permissions or to change the owner of database Accounts Wizard Permissions C Permissions
objects.
348
commands are used to enforce
database security in a multiple user database Security Grant and revoke Select Create B Grant and revoke
environment.
349
Which SQL clause is used to retrieve data from SELECT WHERE FROM INSERT A SELECT
350
database?
The clause is used to filter records SELECT WHERE FROM INSERT B WHERE
351
in database.
Entering Data Defining Data Controlling/Accessi All C Controlling/Accessi
352 DCL(Data Control Language) used for ng Data ng Data
353 is Example of DBMS Word Excel Access None C Access
What are the features of the Payroll Software Recruitment salary Process Time & attendance All of the above D All of the above
354
provide by the ICAI. Management
Which are the transaction supported by the Billing Previous years Cash receipt All of the above D All of the above
355
Billing and Accounting software ? pending bills
The software provide creating,printing and sending bulk eSecretary software Contact Template eSecretary software
individual mail Management software Management software All of the above A
is .
356
To create new file To save file To cut & paste the None of the above C To cut & paste the
The feature Archive is available in K-DOC application for completed and old completed and old
the purpose of . document. document.
357
Employee Information Portal feature in Payroll PF No,online
Application provide employee to view Personal profile PAN Number submission of loan etc All of the above D All of the above
their .
358
Generation of forms Maintain Minutes Book Calculate the filing fee
as per formats and
requirement of
Bank Receipt D Bank Receipt
MCA
364
The ICAI-ROC provides the facility to Auto filing of eForms Shares Annual Returs forms
prepare . Records/Certificates All of the above D All of the above
365
The software which provide the Contact eSecretary software Contact Template eSecretary software
Management,Correspondence Management, simplified Management software Management software All of the above A
Mail/Email etc.
366
Correspondence feature of eSecretary application
provide facilities Templates Blank document Outside document All of the above D All of the above
are .
367
To create New Contact and access Contact features are eSecretary software Contact Management Template Management eSecretary software
available in which application ? software software All of the above A
368
is comprehensive package Tax Suite Application Tax Suite Application
that combines Income Tax,Service Tax Application K-DOC application All of the above C
Tax,e-TDS.e-AIR etc.
369
The financial transactions are to be …………. leading to Collected and Sampled and stratified Grouped and Assets and liability Grouped and
different steps in Accounts computed summarized C summarized
Compilation.
370
The methods LIFO, FIFO, Moving Average are Value closing Value clearing stock Value expense Value income A Value closing stock
371
used to …. stock stock stock
The report prepared taking the asset and liability type
accounts from the Trial Balance is P & L statement Income statement Balance sheet Asset sheet C Balance sheet
called….
372
The report that depicts operating profit/loss for Trial balance Trading account P & L statement Suspense C P & L statement
373
a period is ….. accounts
The day book contains transactions relating to Income or Sales or purchase Asset or liability Profit or loss B Sales or purchase
374
……… expenditure
The Bills Receivable details are maintained in a Journal sheet Voucher debtors Sundry debtors Original entry C Sundry debtors
375
……..
Customers Assets Liabilities Suppliers D Suppliers
376 Creditors ledger has details of your dues to ……..
The sundry debtors are placed in the Balance Income side Assets side Expense side Payable side B Assets side
377
sheet on the ……
The first step in Tally before any transaction is entered
or saved is creating a ……… File Company Project Application B Company
378
To configure country specific details use the F10 F2 F12 F11 C F12
379
function key……
Tally Secure Tally Pack Tally Group Tally Vault D Tally Vault
380 Identify the security mechanism used in Tally.
The basic document where transactions are Ledger Journal Voucher Trial Balance B Journal
381
entered chronologically is….
After selecting a company in Tally, you will be in Accounts of Tally Gateway of Tally Entry of Tally Groups of Tally B Gateway of Tally
382
the……
Tally software is based on ……… accounting Sales Production Mercantile Manufacture C Mercantile
383
system.
Identify the primary group of capital nature that uses
bank account and cash in hand as sub Fixed assets Current assets Loan assets Capital assets B Current assets
groups.
384
Vouchers Groups Journal Ledgers D Ledgers
385 All financial entries in Tally are done using…….
The Direct expenses, Purchase account, Direct Capital nature Expense nature Revenue nature Income nature C Revenue nature
386
income are primary groups of …..
The option to delete a sub-group is admissible Alter Delete Display Shift A Alter
387
through the menu……
The behavioural attributes of this group cannot Sub-group Ledger-group Primary-group Alter-group C Primary-group
388
be changed.
400
Tally's age-wise analysis considers the voucher's Previous date Effective date Current year Configured date B Effective date
404
……
Arrange the steps in generating the books of accounts.
1. Create Trial balance
2. Create new ledgers
3. Generate Day Books
4. Update journals for financial transactions 1, 2, 3, 4 1, 3, 4, 2 2, 4, 3, 1 3, 4, 2, 1 C 2, 4, 3, 1
405
For day-to-day transactions the voucher types Credit purchase Cash purchase Both A and B Contra purchase C Both A and B
406
used are
Say for example a payment is made to a creditor ABC -
Rs.10000 by cash, it can be Loan Payment Receipt Sales B Payment
entered into the voucher type…..
407
Identify the purchase voucher type, the
transaction for purchase of 10 CPUs,10 monitors by Credit Purchases Cash Purchases Expense Purchases Debit Purchases A Credit Purchases
credit.
408
Identify the voucher type to be chosen for the
sale of computers to Anand by cash @ Rs.210000 per Cash Ledger Sale Sheet Stock Journal Purchase Voucher C Stock Journal
unit.
409
A bank overdraft repaid by cheque at Rs.25000 Payment Receipt Debit Contra D Contra
410
can be made in the voucher…..
The financial statement that consolidates ledger Balance sheet Profit & Loss Trial balance Journal C Trial balance
411
balances is ….. statement
The F9 function key in the left side of the Accounting Inventory reports P & L reports Expense reports B Inventory reports
412
Gateway of Tally screen displays the…… reports
The option on the Gateway of Tally that will generate
the P&L account statement is….. Net Loss Net Income Net Profit Net Account C Net Profit
413
The expenditure for running the business for a Expense Example Taxes Income A Expense
414
period is …..
This displays the balance daywise for a selected Record book Ledger book Journal book Day book D Day book
415
voucher type.
The feature in Tally to analyze accounts of a Ratio analysis Account analysis Data analysis Transaction A Ratio analysis
416
company is….. analysis
The age-wise statement is displayed based Income Payables Expenses Loans B Payables
417
on……
The ratio analysis of receivables can be done Bill date Effective date Voucher date Previous date A Bill date
418
based on……
Name the statement that helps the management in the
decision making process. Data flow Funds flow Stock flow Cheque flow B Funds flow
419
Identify the budget type which is chosen where On closing balance On net transactions
transaction amounts are to be monitored. On net credit flow On net transactions On net cash flow C
420
Choose the budget type to be used where bank On closing balance
accounts balances are to be monitored. On net credit flow On net transactions On net cash flow A On closing balance
421
The management that needs to consolidate the Consolidate
accounts of its various enterprises uses ……. in company Group company Set company Alter company B Group company
Tally.
422
Identify the user who can access audit trails in Owner Data Entry operator Accountant Administrator D Administrator
423
Tally.
Identify the accounting feature in tally that facilitates Month-less Yearly-entry accounting Period-less accounting Transaction- number Period-less accounting
splitting financial years for a company accounting accounting C
data.
424
Identify the account type by the rule: "Debit the Real accounts Personal accounts Nominal accounts Expense accounts B Personal accounts
425
receiver and credit the giver".
The tracking of changes in vouchers and ledger Tally Vault Tally Audit Tally Report Tally Group B Tally Audit
426
masters is done by…..
Tally can import data from other programs and creates a
log about the activity in the file….. Tally.imp Tally.cfg Tally.exp Tally.ole A Tally.imp
427
Import and export of data between Tally and other
programs is possible with the help of….. OLE DBMS ODBC MS-XLS C ODBC
428
The manual option of voucher numbering leads Auto numbers Duplicate number Sequence number Range number B Duplicate number
429
to…..
The Tally audit trail tracks changes made to more than 30 less than 30 Days old more than a day more than a week A more than 30 Days
430
vouchers that are ….. Days old old old old
The ratio analysis of Bills Receivables or Bills
Payables can be displayed with the function key….. F5 F8 F12 F6 D F6
431
The test data generated with correctness proof, data
flow analysis and control flow analysis Test item block Test data pack Test program pack Test record pack B Test data pack
tools is called….
432
When a real-time system is simulated to generate the Parallel simulation
same output as the real-time Parallel trailing Tracing parallel Parallel coding D Parallel simulation
system, the technique is called….
433
When an auditor expands the extent of substantive Cross reference lister Formulate flaw Correct lister Formulate correct B Formulate flaw
tests to determine the impact of defects on the hypotheses hypotheses hypotheses
attainment of program
objectives, the methodology is….
434
This is an important control in systems that use digital
signatures for authentication purposes. Public audit trails Random audit trails Sample audit trails Data audit trails A Public audit trails
435
The first document where the transaction is Ledger Liability Voucher Expense C Voucher
436
entered is called a …..
Selecting transactions based on a sampling rate Transaction Systematic sampling Simple sampling Demographic B Systematic
437
is called …. method. sampling sampling sampling
The capability of the generalized audit software to read File size File data File access File reorganisation C File access
different data coding schemes, different record formats
and different file structures is….
438
The audit software capability of frequency Sort and merge Sampling nth item Formatting output Classify data on a D Classify data on a
439
analysis is to…. files criteria criteria
The audit functions of attributes sampling,
variables sampling, stratified sampling are included in …. Stratification Selection Statistical Reporting C Statistical
functions.
440
Identify the functional limitation of a generalized audit Ex Post Auditing Only Analytical review only Limited ability to Limited ability to A Ex Post Auditing Only
software that enables evidence collection only on the determine Propensity Verify Processing
state of an for logic
application system after the fact. Error
441
Sorting, creating, and Data retrieval, code Reading data, selecting Specific tasks with D Specific tasks with
printing files comparison and analyzing original or modified original or modified
The purpose-written audit programs are used for….. information programs programs
442
Picture of a transaction as it flows through the Program Track Snapshot Picture C Snapshot
443
computer systems is called…..
Identify the type of audit when auditors are members of
the systems development team. General audit Post audit System audit Concurrent audit D Concurrent audit
444
The document used for posting of accounting Voucher and Ledger and trial Balance sheet and Journal and D Journal and ledger
445
transactions is …….... journal balance trial balance ledger
451
The data width of a Pentium 4 computer is …… 16 bits 8 bits 32 bits 1 k bits C 32 bits
452
software helps to do a specific task for operating system application software windows 95 interpreter B application
453
the user software
The unit which executes addition, subtraction,
multiplication and division operations is …… CPU ALU MU CU B ALU
454
converts a high level language into processor compiler assembler coder B compiler
455
machine language
The instructions to be executed by the processor are Instruction register
loaded from memory into the Instruction unit Process register Program counter D Instruction register
456
457 is/are a popular front end tool visual basic power builder SQL * plus all of the above D all of the above
The results of a process are stored into ……… Accumulator General-purpose Process register Instruction A Accumulator
458
Register register
translates assembly language program into
machine language instructions compiler interpreter assembler processor C assembler
459
The memory that stores data as a series of memory cells
that can be accessed sequentially DRAM SAM SRAM ROM B SAM
is……
460
computers are used in large organizations for none of the above
large scale jobs which have mainframes super computers micro computers A mainframes
large storage capacities
461
The technology used to accelerate the Processor bus Cache memory BIOS memory ROM memeory B Cache memory
462
processing of a computer is ………
is responsible for all calculations and logical arithmetic and logic central processing unit none of the above arithmetic and logic
operations that have to be performed on control unit unit B unit
the data
463
The memory used in a computer's BIOS chip Cache memory SRAM Optical memory Flash memory D Flash memory
464
is……..
printer use laser light band printer drum printer non impact printer none of the C non impact printer
465
above
The process of swapping information between Fragmentation Disk full Thrashing Paging C Thrashing
466
the RAM and hard disk can cause
software enhances the user to enter data management electronic spreadsheet none of the above
,store, manipulate and print any text word processing B word processing
467
The standard system bus was replaced by frontside and Dual independent Dynamic memory bus Dual independent bus
backside bus called……. bus Cache memory bus Dual interface bus A
468
Combination of alphabetic and numeric data is alpha numeric alpha beta numerous alpha number and A alpha numeric
469
called data alpha
is the temporary storage place for my computer recycle bin Microsoft none of the B recycle bin
470
deleted files exchange above
The DSP,DAC,ADC,and ROM are parts of the …… Graphics card Memory card Sound card Media card C Sound card
471
486
The software used for layout of newsletters and Application software Application
magazines along with text and images is Desktop publishing development Data modelling B Desktop publishing
called……
487
The number of bits used to represent a pixel in a Size of image Colors and shades of Resolution and Signal and refresh B Colors and shades of
monitor decides the ……. gray that can be sharpness rate gray that can be
displayed displayed
488
The input device that utilizes a light-sensitive detector
to select objects on a display screen is Touch screen Touch pad Light scan Light pen D Light pen
called…..
489
The most commonly used scanner technology Charge-coupled Optical character Photo-multiplier Optical sensitive A Charge-coupled
490
is…. device recognition tube tube device
Identify the type of mice that uses optical Mechanical Optomechanical Optical Joystick B Optomechanical
491
sensors to detect motion of the ball.
Identify the input device that consists the puck Trackball Joystick Tablet Pen C Tablet
492
and the stylus.
Identify the disk which has an access time of Zip disk Floppy disk Winchester disk Jaz disk C Winchester disk
493
30ms.
A set of tracks across a set of platters in a hard Disk Cylinder Spiral Block B Cylinder
494
disk is called a……
The bus used to connect a CD-ROM to your SCSI PCI MCA DAT A SCSI
495
computer is…..
The digital audio tape with the capacity of 24GB of data
uses the technology called ….. Hyper circles Fero magnetic Linear velocity Helical scan D Helical scan
496
is the Worlds largest computer Ethernet Internet ARPANET None of the B Internet
497
network . above.
The model used to describe the relationship between
data and information is called System model Data model Information model Logical model A System model
498
The backward compatible disk that has high SuperDisk Jaz disk Zip disk Hard disk A SuperDisk
499
density-120MB is called….
The maximum capacity of an optical disk is …… 700 MB 6 GB 630 MB 2GB B 6 GB
500
534
Which is the following is the correct types of Resonableness Compare Un-compare Randomness A Resonableness
535
Record checks on input data ?
Which is the correct types of Batch Checks ? Control Totals Outdated checks On-line dated Mixed dated A Control Totals
536
checked checks
Which is the need for table level tests ? Controls are required None of the above
Data Integrity for Both A and B C Both A and B
authorization
537
Which is the following is the major points with respect This may make the Their Master & Child
to inter table tests ? entire child tables relationship reference
referenced by the the table from one
master field in the another
main table un- Both A and B None of the above C Both A and B
available
538
Which is the software used by the auditor to take a view Mapping Snapshots Modelling Source comparison B Snapshots
of a file of data or transaction passing through the
system at a particular point
of time ?
539
Which is the software used by the auditor to compare Souce comparison
the source version of a program with a Code compasion Model comparison Exe comparison A Souce comparison
secure master copy ?
540
Which is the techniques whereby the auditor arranges
or manipulates data either real or fictitious, in order to
see that a specific program or screen edit test is doing
Debug Testing Logic Testing Off-line Testing On-line Testing D On-line Testing
its work ?
541
Which is the software used by the auditor to list Log Analysis Mapping Program Library All of the above B Mapping
542
un-used program instruction ?
Which is the software used by auditor to read and Log Analyzers Software Log Analyzers
analyze records of machine activity ? Machine level Executable level Systax level C Software
543
Which of the following reason strongly call for Control & Lack of Visible Absence of Input None of the above
Audit Function ? Transaction Trail Document All of the above C All of the above
544
In IDEA,Data Extraction select data form a file
for further for creating a new file of Extraction Recording Investigation Sorting C Investigation
logically selected records.
545
Identify the field check - "If a set of values is
defined, is the input data one of these defined values?" List Range Slab Digit C Slab
546
Which is the correct types of Field checks on Missing data Blank data Both type None of the C Both type
547
input data ? above
Which is the major points to be consider with respect to To ensure the input Test whether the To ensure the entered To ensure the input
System tests ? data is valid before overall system meet data is saved without data is valid before
entering the the requirement fail entering the value
All of the above A
value specifications
548
In Data analysis techniques, which law is used to
idenfity statistical report on numeric data ? Bend Law Benjamin law Benford Law British Law C Benford Law
549
Which is not a feature of File reorganization with an Linking the identified
auditor perspective? Filtering Sorting Indexing files A Filtering
550
What do you understand by the term, “Data Establish relationship Identify fields, which Identify data, which are Identify whether all Identify data, which
Consistency” in using CAATs? between two or have null values. not in agreement with fields have valid are not in agreement
more tables as the regular format. data. with the regular
C
required. format.
551
Functions involving use of arithmetic operators, which Statistical function Arithmetic function Logical function Relational function B Arithmetic function
enable performing re-computations and re-performance
of results is an example of?
552
Which of the following is a benefit of using CAATs? Identify an audit finding To give assurance to Identify an audit
w.r.t. materiality in an customers about the finding w.r.t.
IT environment performance of the materiality in an IT
File an FIR based on Investigation of fraud in
company B environment
audit finding audit area
553
What is step by step procedure for using Data->Benford's Analysis->Benford's Sampling-> Tools->Benford's B Analysis-
554
Bendford's law function in IDEA ? Law Law Benford's Law Law >Benford's Law
The field check that conforms if data input for a Format mask Data mask Field mask Input mask A Format mask
555
field is in a particular format.
A Benford's Law analysis is most effective on Comprised of similar Without built-in Without assigned
data . sized values for minimum and numbers, such as bank
similar phenomena. maximum values. accounts numbers and
zip codes and with four
or more digits. All of the above D All of the above
556
The field check on a processed data that fails if a field is
not initialized to zero or errors occur Range Sign Overflow Serial C Overflow
during calculation is……
557
In IDEA, blank value data can be extracted by @isblank() as Null Null Is Null A @isblank()
558
using .
The validation checks applied to a field depending on its Field checks Record checks Batch checks File checks B Record checks
logical interrelationships with the other fields in the
record are called …..
559
In IDEA, Summarization, Pivot Table, Stratify, Duplicate
Key functions comes under which Data Analysis Sampling Relation B Analysis
menu.
560
A group of records or transactions that are Physical batches Logical batches Block batches Transact batches A Physical batches
561
contiguous constitute …..
In IDEA, Extraction, Sort, Indices, Search Analysis View Relation Data D Data
562
functions comes under which menu.
… is the type of batch check (group of
records) for all input records of a particular type is done. Control totals Serial number Transaction type Sequence check C Transaction type
563
is centralized Banking Application Software. Core Banking System Core Banking Solution Complete Banking Centralized Banking Core Banking Solution
Solution Solution B
564
565 Flexcube developed by Infosys HCL Technologies TCS I-Flex D I-Flex
566 Quarz developed by Infosys HCL Technologies TCS I-Flex C TCS
The server is a sophisticated computer that accepts Clients Customers Party IP A Clients
service requests from different machines which are
called
567
server has to be a powerful and robust
system as it has to perform all the core Antivirus Server Application Server Web server Clients Server B Application Server
banking operations.
568
IBAS stands for Internet Business Internet Banking Internet Banking Internet Business B Internet Banking
Application Server Application Server Application software Authenticatin server Application Server
569
PBF stands for Positive Balance Post Balance File Positive Balance Positive Balance C Positive Balance
570
File File Flex File
Internet banking refers to a banking Bank Internet Intranet Net banking B Internet
571
transactions routed through the
CPPD Stands for . Computer Planning Computerized Planning Both A &B Computer Planning D Computer Planning
and plant and Policy Department and Policy and Policy
department Department Department
572
The is generally a hardware and it
plays the role of preventing unauthorized access. Date base Server Web server Proxy Firewall D Firewall
573
has several components which have been
designed to meet the demands of the CBS CSB NEFT None A CBS
banking industry.
574
enable data transmission over Switches Firewall Routers Middleware C Routers
575
different networks.
have many ports that are connected to Router Switches Firewall Middleware B Switches
different systems and it facilitates data transmission
with the network.
576
A Proxy server always acts in conjunction with a Firewall Internet Antivirus None A Firewall
577
.
The provides network security by preventing
malicious data from entering the ATM Server Proxy Server Date base Server Web server B Proxy Server
network.
578
is used for authentication. System audit system Domain Controller Network security C Domain Controller
579
administration
Access to a set of servers is controlled by the System audit system Librarian Domain D Domain Controller
580
. administration Controller
is a process of unauthorized entering Data base Hacking Routors Thrashing B Hacking
581
a network. administration
facility provides a customer to access Automatic tele Automated Teller Automated Technical Accelereated Teller Automated Teller
financial transactions in a public place. Machine Machine Machine machine B Machine
582
Core Banking Solutions is a combination of an Network devices Firewall IBAS IBDS A Network devices
583
application software and
The Operational Controls include controls on Physical Access Logical Access Environmental All of the above D All of the above
584
Controls
Application Controls are broadly classified into Input Controls Output Controls Processing Controls All of the above D All of the above
585
controls check that the data Input Controls Output Controls Processing Controls All of the above A Input Controls
586
entered is complete and correct.
Reasonableness check is a . Processing Input Controls Output Controls Management B Input Controls
587
Controls Control
Which of the following is not a module of the Customer ID Accounts Equity Share Clearing Module C Equity Share
588
CBS? generation management management management
Bank guarantees can be Performance Deferred Payment Both A & B None of the C Both A & B
589
Guarantee Guarantee above
SLR stands for Statutory Liquidified Statutory Liquidity Standard Liquidity Ratio Stable Liquidity Ratio Statutory Liquidity
Ratio Ratio B Ratio
590
are record of activities that have taken place None of the above
in the system irrespective of the Logs Index Activity Logs A Logs
modules.
591
The contents of a log includes Activity User details Date and Time All of the above D All of the above
592
performed
Communication and Operations management Firewall security policy
must include which policies? E-mail policy Internet policy All of the above D All of the above
593
is a large data housing infrastructure that
provides high band width access to its ATM Server Data Centre IT EDP B Data Centre
clients.
594
CRR stands for in terms Cash Reserve Ratio Community Reserve Cash Reimbursed
of CBS. Ratio Cash Reversal Ratio Ratio A Cash Reserve Ratio
595
DRP stands for Disaster Recovery Discovered Resources Disastrous Recovery Disaster Recording Disaster Recovery
in terms of Planning Planning Planning Planning A Planning
CBS.
596
are soultions applied when any kind of None of the above
vulnerabilities discovered in networks in Patches Logs Access Rights A Patches
the CBS system.
597
can be viewed only by the DBA of Access Rights Database Log Operating System Activity Log B Database Log
598
an organisation. Logs Log
KYC stands for Know Your Customer Know Your Connection Know Your Customer
in terms Know Your Company Know Your Centre A
banking.
599
In CBS, the Accounts Management module deals with Creation of Savings Creation of Current
Account Account Overdraft All of the above D All of the above
600
Soft copy of the ATM journal rolls is Stock Journal Journal Report Electronic Journal All of the above C Electronic Journal
601
called
Data centre servers are known Application Data Base Servers Web server All the above D All the above
602
as . servers
The ATM switch consists of a computer server Both A & B None of the C Both A & B
603
above
testing should be done to
check the unauthorised access to the network in CBS. Penetration Hierarchical Top down Bottom up A Penetration
604
enables transfer of money from one bank to None of the above
another in "Real time" and on "Gross" EFT NEFT RTGS C RTGS
basis.
605
In system money transfers are done on a one NEFT, RTGS RTGS,NEFT EFT,RTGS None of the above B RTGS,NEFT
to one basis while in system transfer is done in
batches.
606
All the money transfers take place in the books Beneficiary bank Central bank(RBI) Remitting bank None of the B Central bank(RBI)
607
of the above
EFT and NEFT work on basis DNS HSM SSM All of the above A DNS
608
system of money transfer is primarily NEFT RTGS EFT All of the above B RTGS
609
used for large transactions.
In RTGS, the STP generates an for every
outbound RTGS transaction. UTN UTE UTR UTS C UTR
610
UTR full form Unique Transaction Unidentified Unique Transmission None of the above Unique Transaction
in Reference Transaction Reference A Reference
terms of CBS. Reference
611
STP stands for Straight Through Straight Temporary Strict Through None of the above Straight Through
in terms of Processing Processing Processing A Processing
CBS.
612
is a method of creating virtual VLAN LAN WAN MAN A VLAN
613
networks within a physical network.
CMS stands for Control Management Cash Management Core Management Centre Management Cash Management
in terms System System System System B System
of CBS.
614
Which of the following statements is true? Audit of internal Systems audit are Audit of controls in any None of the above Systems audit are
controls is not important for the banking environment is important for the
needed at all verification of the performed using verification of the
internal controls software audit B internal controls
615
The Management Controls does not include Managing of Assets Formulating a security Developing a business Laying down A Managing of Assets
policy continuity planning procedures for
system
development
616
is supported by advanced technology Core Banking Solution Core Banking Solution
infrastructure and has high standards of Firewall Internet banking Web centre C
business functionality.
617
CBS Software resides in a Central application server Central Office Data Central Office Data
which is located in the ATM Data centre Middleware Web centre Centre. D Centre.
618
A that runs the core banking solutions (CBS) Central Application Domain Name Server Central Application
and is centrally accessed by the branches. ATM Server Server Database Server B Server
619
The of the application is capable of only
entering the data at the end point that is System version Application Version Client version Firewall C Client version
branches.
620
The application server would be placed in a trusted Virtual Local Area Wide Area Network Personnal Area Virtual Local Area
inside zone in a separate Network Local Area Network Network A Network
621
Application software would access the Data base server ATM DATA Server Domain Name Application A Data base server
622
Server Server
are capable of being connected only when
devices are connected to a switch. LAN Virtual Networks MAN WAN B Virtual Networks
623
Data communication between VLANs can be
controlled as per business requirements. 1 2 3 4B 2
624
A special feature of STP is that number Unique Transation PIN NO Uniform Transaction None C Uniform Transaction
for any outbound RTGS transaction is generated by the Referrence Reference Reference
STP System.
625
refers to the process of developing Application Software Development Server Development System Development System Development
software which would produce the required output Development
from the input provided of course, using the necessary
hardware and communication systems. D
626
The is essential to ensure that Review Management RTGS Log management Authorized C Log management
computer security records are stored in sufficient detail Controller
for appropriate period of time.
627
Which of the following is erroneous statement in case Unit test, system Well documented Implement new/ It is important that It is important that
of Change Management Control? test, integration test process should be changed programme as correct latest version correct latest version
– all should be there incorporating all per schedule. of programe is used of programe is used
carried out. the changes. but version number but version number
need not be D need not be changed.
changed.
628
With respect to the customer changing the Pin at the Old offset value used Old Pin verified using Natural Pin remains the Old offset value Old offset value used
ATM which procedure is the ”false“ procedure? to derive new PIN. HSM/SSM. same. erased and new to derive new PIN.
offset value
A
generated.
629
IN CBS, changes to the application server are not made None of the above
directly to it, instead done first on a Trail server Validate server Test Server C Test Server
630
All the various servers in the central data centre LANs VLANs WANs MANs B VLANs
631
are seggregated through
The is a complete process in the computer Consalidation Password Policy protection Validation D Validation
so that it ensures that data that is fed in conforms to
certain prerequisite conditions.
632
When the central Data base is busy with central end of
day activities or for any other reason, the file containing
the account balance of the customer is sent to the ATM
Centralised Data base Central Office Data
switch. Such a file is called Positive Balance File Application Server A Positive Balance File
security Centre.
633
Bank mate is developed by the Infosys HCL Technologies TCS I-Flex B HCL Technologies
634
The IBDS is located in a Militarised zone City Zone State zone demilitarised D demilitarised zone
635
zone
The main components of Internet Banking Web server IBAS IBDS All the above D All the above
636
system consist of
Copy of the Anti Virus Software was updated promptly None of the Above
and regularly at the Data Centre and pushed into all of
the servers and in all the systems in the branches by
Hacking Method Push-pull method Both A &B B Push-pull method
637
The which is also residing in the server at Application Software Application Server Application Software
the branch actually does the banking Sytem software utility software C
operations.
638
In Core Banking concept all the systems of the bank are
connected to the Central office by means of a
connectivity which may be either a
local line Leased line Broadband None B Leased line
or a dial up line.
639
The is generated by the software and directly Personal Identification Net transaction ID NO Personal Identification
sent to equipment for printed the Pin 16 digit number Number ATM No B Number
Mailer.
640
would also include the existence of built
in controls in the system to ensure proper processing of
input data so as to provide the required output.
Output Control Input control Process Control Data Control C Process Control
641
refers to an arrangement wherein the
issuing bank acts on the request Letter of Credit Letter of Tax Letter of Payable Letter of Receible A Letter of Credit
and instructions of a customer.
642
is a process by which the bank Business Recovery Business Continuity Disaster Recovery Business Continuity
ensures the maintenance and recovery of Planning Planning Planning None B Planning
operations.
643
At which phase of testing the version of Programmer User testing (a) & (b) both None of above C (a) & (b) both
644
software is called “ beta version”? testing
645 Finacle developed by Infosys HCL Technologies TCS I-Flex A Infosys
In an Organization structure of IT Department which of Database Network administrator Network Administrator Tape Librarian and B Network
the following function is incompatible? Administrator and and Database and Security database administrator and
Security Administrator. Administrator. administrator. Database
Administrator. Administrator.
646
The number that is stored in the ATM switch is Pin No - offset value Offset Value - Pin No - Natural Pin
the difference of which of the following number? Offset value - Pin No Pin No - Natural Pin Natural Pin C
647
The information retrieval of transactions taking place at Soft copy of Hard copy of Electronic Soft copy of Electronic
ATM located at remote locations is Electronic Journal Cash register (a) and (b) both A journal
through journal
648
The number that is generated as soon as the customer
inserts the card in the ATM machine Offset value Pin sent to customer Natural Pin Card Number C Natural Pin
is
649
Which is not a Database management system. Unix Oracle Sybase Foxpro A Unix
650
The data can be entered into a table in the Design Datasheet Dataview All of the Above B Datasheet
651
view.
MS Access provide datatype to create link
to a web page,file,or email address. Link Hyperlink Insert Attached B Hyperlink
652
To make a switchboard appear while opening the Set as database Set as Form startup Set as Switchboard None of the above Set as Switchboard
database. startup Option in Option in Access startup Option in startup Option in
Access Option Option Access Option Access Option
C
653
To add or delete buttons to Switchboard, which option
is used in Switchboard Manager is used. Add Option Edit Option Modify Option Build Option B Edit Option
654
Which of the following data-type is not Text Number AlphaNumeric Date C AlphaNumeric
655
available in MS-ACCESS
The validation can be defined at Table Form Both A and B Report C Both A and B
656
level in Access 2010
A macro can be attached to an event of a A form A report A button All of the above D All of the above
657
control .
The command Design Application performed Close the current Opens a secondary Opens the Switchboard Opens a report in Opens the
action on switchboard. database switchboard. Manager. Print Preview. C Switchboard
Manager.
658
In a Query the data can be sorted based Single column Multiple columns Both A and B None of the C Both A and B
659
above
Switchboard Manager only allows a maximum of
command buttons on a Nine Eight Seven Six B Eight
switchboard
660
MS Access 2010 provides a pane that
contained large list of actions to be chosen,enabling a
wide range of commands that can be performed
Action List Action Catalog Action query Action Box B Action Catalog
661
SQL is considered to be a 2GL 3GL 4GL None of the C 4GL
662
above
Which action in MS Access macro applies a fliter DoFilter FindFilter ApplyFilter UseFilter C ApplyFilter
663
or query to a table,form or report.
Opens a query in the Datasheet view, Design view, or
Print Preview which macro action used OpenQuery ShowQuery RunQuery FindQuery A OpenQuery
in MS Access.
664
Among +, <>, MOD, AND, <= operator which + MOD AND <> B MOD
665
operator has the highest priority.
The Strcomp() function is a type Math Financial Text Date & Time C Text
666
function.
The SGN() function is a type Math Financial Text Date & Time A Math
667
function
Which of the following symbol is used to write a [] () {} # B ()
668
sub query
When you create a field using text data type in
MS Access 2010, by default field will have 255 256 258 128 A 255
character.
669
To export an access table to an XML File, which of the Right-click the table Go to External Data - Right-click the table Both A and B A Right-click the table
below steps must be followed? and select Export - >Export, click on More and select send as XML and select Export -
>XML and select XML >XML
670
If we are using the same table for main query and sub- Alternate names to No need to alternate Aliases name to the
query,we need to the tables name to the tables tables Both A and C. D Both A and C.
provide .
671
Update Query can be used to update Single Record More than 1 record Both A and B None of the C Both A and B
672
in MS Access 2010. above
Delete Query can be used to delete Single Record More than 1 record Both A and B None of the C Both A and B
673
above
How many Primary key constraints can create in Only one Two As many All of the Above A Only one
674
a table .
MS Access 2010 provides queries that can be used for Sum() Count() Avg() All of the above D All of the above
obtaining the aggregated results instead of individual
records are .
675
A function that Counts the set of values that
satisfy the given criteria in MS Access 2010 CountA() Count() Countif() All of the above B Count()
is .
676
The operator is used to find the null "= NULL" NULL IS NULL All of the Above C IS NULL
677
records in a table.
DDL Stands for -. Data Design Define Data Data Definition None C Data Definition
678
Language Language Language Language
Aggreagate Query also known as . Group By queries Total query Action query Both A and B D Both A and B
679
Which Query wizard is used to find repeated Simple Query Duplicate Query Cross table Query All of the Above B Duplicate Query
680
records in a table? Wizard Wizard Wizard Wizard
Append Query is used to in a Add Records Delete Records View Records Update Records A Add Records
681
table in MS Access.
Which type of joins not available in Access Inner join Left outer join Right outer join Full join D Full join
682
2010?
A join returns only those rows from both tables that
match on the joining field is Inner join Left outer join Right outer join Full join A Inner join
in MS Access 2010.
683
The query returns all of the rows from left table, and None of the above
also those rows from the right table Right outer join Left outer join Inner join B Left outer join
that is known as .
684
The query using returns all the rows from Right outer join Left outer join Inner join None of the above A Right outer join
right table, and also those rows from the left table that
share a common value on
both sides of join.
685
How can we add a table to the Query Design Select Create-> Add Select Database Tools-> Select Design -> Show Select the table from Select Design -> Show
window ? Table Add Table Table navigation C Table
Pane.
686
can be considered a questions in a Queries Form Reprt Macro A Queries
687
data base.
Operands can be in MS Access 2010. Literals Identifiers Function All D All
688
709
Which record will be retrieved if the query criteria is < All values less or Value less than 95 Records with date Records with date
#1/1/11#? more than 1,195 characters before 2011 All of above C before 2011
710
MS Acces 2010 reads and writes to the .accdb file None of the above
format in chunks also known Pages Encrypt pages Base Database A Pages
as .
711
E-R Diagram is Model. Conceptual Structural Model Object Model Interface A Conceptual Model
712
Model
The tab in Expression Builder in which we write Expression Elements Expression Builder
expressions is known as . Operator Button Expression Box window C Expression Box
713
The criteria expression LIKE?B*. Will match all text Will match all text Will match all text Will match all text A Will match all text
starting from B ending from B having second starting with a digit starting from B
character as B
714
queries are useful for summarizing Select query Crosstab query Action query Parameter query B Crosstab query
information, and are somewhat similar to pivot tables in
MS-Excel.
715
While entering record in Datasheet view, in Alphabetical At the end of the Any where in the Beginning of the B At the end of the
716
which order the records can be entered Order table table table table
When you delete the record in form, it deletes Form only Form but not in table Table but not in Form & Table D Form & Table
717
the record from . Form
The controls that are not linked to any field of the table Unbounded Controls
or query on the form are known as ActiveX control Unbounded Controls Graphics Control Bound Controls B
.
718
Which property of the form can be used to insert a
background image in MS Access 2010? Caption Background Record Source Picture D Picture
719
is a report that is inserted in Inner-Report Sub-Report Inside-Report Insert-Report C Inside-Report
720
another report in MS Access 2010.
A bound main report is based on a Table or query,Inner- Table or query,Main- Table or query,Sub- None of the above Table or query,Sub-
and its contain Report Report Report C Report
realted information.
721
DDL stands for Data Definition Data Defined Language Detailed Definition Data Detailed Data Definition
Language Language Language A Language
722
is used to insert values in Table Query Report Form None A Query
723
directly.
A used to compare multiple values of
categories or differences over a period of Pie Chart Area Chart Bar Chart Column Chart D Column Chart
time.
724
A used to compare trends over a Pie Chart Line Chart Bar Chart Column Chart B Line Chart
725
period of time.
To create a read-only copy of the database, which of the
following file format can be used? .ACCDB .ACCDE .MDW .ACCDT B .ACCDE
726
The database administrator created a split database and Front-end database
created a front-end database and back-end database
file.Which of the file should be stored on the server ?
Back-end database Both of them None of them B Back-end database
727
To make database package and digitally sign using which File- File->New->Save File->Save as->Save File- File->Save&Publish-
option in Access 2010 ? >Save&Publish- Database as- Database as- >Save&Publish- >Save Database as-
>Save Database as- >Package and sign >Package and sign >Save Object as- >Package and sign
>Package and sign >Package and sign A
728
In which formats can the Collect Data through HTML and InfoPath Visual Basic Application
email message feature can send the data entry form? Access Forms Excel attachment A HTML and InfoPath
729
Once a mail is sent using the collect data through email Export to Outlook Options in Tool menu Manage replies All of the above C Manage replies
message feature in Access 2010. of Access
The mail status can be checked
using .
730
The type of data cannot be collected using
Collect data through email Text Number Date/time AutoNumber D AutoNumber
messages.
731
What is the memo data type field used for? To add table To store objects For long text entries For shout text entries C For long text entries
created in other of no more than 255
programs characters
732
The filter By selection feature allows you to filter: Those records that Records based on a Records that meet any All of above A Those records that
match an entity in a criterion you specify of several criteria you match an entity in a
field specify field
733
DML stands for Detailed Maintaining Data Maintaining Data Manipulation Detailed Data Manipulation
Language Language Language Manipulation C Language
Language
734
In SQL, having clause is used for For ordering records specifying conditions specifying
with group by clause updating records None B conditions with group
by clause
735
Which editor was provided for use with Access The Visual Basic Notepad The QuickBasic All of above B Notepad
736
Basic? 1.0 editor editor
How do you update Pivot Table report data after Save your changes, Select the Pivot Table Click the report, and on Click the report, and
changes are made to the source data? close the workbook, worksheet and press F9 the Pivot Table toolbar, on the Pivot Table
and then reopen on the keyboard click the refresh data toolbar, click the
All of the above C
it. button refresh data
button
737
What are the different views to display a Table Datasheet View Design View Pivote Table & All Of Above D All Of Above
738
? Pivot Chart View
Which Of The Following Creates A Drop Down Ole Object Hyperlink Memo Lookup Wizard D Lookup Wizard
739
List Of Values To Choose From?
A Enables You To View Data From A Table
Based On A Specific Criterion Form Query Macro Report B Query
740
The Database Language That Allows You To DCL DML DDL None Of Above A DCL
741
Access Or Maintain Data In A Database
DCL Provides Commands To Perform Actions Like Change The Insert, Update Or Authorizing Access And None Of Above C Authorizing Access
Structure Of Tables Delete Records And Other Control Over And Other Control
Data Values Database Over Database
742
Which is not a Database Model ? Network Database Relational Database Object Oriented Structureed Structureed Database
Model Model Database Model Database Model D Model
743
744 Which Of The Field Has Width 8 Bytes? Memo Number Date/time Hyperlink C Date/time
This Is The Stage In Database Design Where One Data Definition Data Refinement Establishing None Of The Above A Data Definition
Gathers And List All The Necessary Fields For The Relationship
Database Project.
745
Whenever a tables gets update, the dependent Not update update automatically have to update never update B update
746
query will manually automatically
The Third Stage In Designing A Database Is When We Relationship Join Query None Of These A Relationship
Analyze Our Tables More Closely And Create A
Between Tables
747
How does a query-based report differ in design to a The reports are It doesn’t It doesn't have as many The only report type B It doesn’t
report based on just one table? restricted in size. design options. available is the
Design
Report.
748
How would you include some plain text into a mailing Type the text Use the Mailing Use the >> button. Use the Mailing
label report? directly into the Use the > button. label wizard text C label wizard text
label. option. option.
749
In a Microsoft Access 2010 report, the page numbering
would most likely be placed into Report Footer Section Header Page Footer Page Header C Page Footer
the:
750
If you wished to present a professionally looking form All The tools of the Form Wizard All The tools of the
on screen that would show all the necessary form design control Columnar form design control
information, which of the following form design tools gallery. gallery.
Pivot Table Pivot Chart C
would you most likely use?
751
What are the benefits of an ACCDE Optimizes memory Protects the VBA code
file in Access usage and improves from being viewed or
performance. edited while still
Reduces the size of
allowing it to run. All of the above D All of the above
the database
752
An .ACCDE file is a version of the Fixed-down Locked-down Open-down None of the B Locked-down
753
original .ACCDB file. above
Which type of the query is used to accept the value Make Table Query
from the user while executing the query Update Query Delete Query Parameter Query D Parameter Query
and fetch records accordingly
754
To encrypt the databse in Access 2010 must be opened Open Secure mode Open Exclusive mode Open Exclusive mode
in the . Open Inclusive mode Open Read Mode C
755
To extract the records based on date field, $ # () "" B #
756
which of the symbol should be used
FIX() is a kind of function in MS-Access Math Date Text None of the A Math
757
2010. above
MS-Access 2010 has added new features of None of the above
to eliminate the need of VBA code Macro Form Report A Macro
758
Encrypting a database does not restrict access to
database objects, but to the Open Modify Read Write A Open
database.
759
The setting for the Security option can be handled File Tab ->New File Tab ->Access File Tab ->Security File Tab ->Access
using in Access 2010. Options, and Options, and selecting Options, and selecting Options, and selecting
selecting the Trust the Trust Centre tab the Trust Centre tab the Trust Centre tab
Centre tab from the from the Access Option from the Access Option from the Access
Access Option window window None of the above B Option window
window
760
To create a split database in MS Access 2010 go Create Tab External Tab File tab Database Tools D Database Tools
761
to which tab?
After spliting database,frontend database Forms Query Report All of the above D All of the above
762
holds .
After spliting database,backend database Tables Forms Query Report A Tables
763
holds .
When an Access database is split, it creates two A back-end database A new database & Old primary database & None of the above A A back-end database
files . & front- end database. secondary database & front- end database
database
764
A Data Access Page is a special type of None of the above
that allows users to interface with database XML page HTML Page Web page C Web page
using Internet Explorer.
765
An is a group of people with a common Company Enterprise Organization Concern B Enterprise
goal, having certain resources at its disposal to achieve
the common goal.
766
can be defined as subject- oriented, Data Models Data Warehouses Data Mines Operational Data B Data Warehouses
integrated, time-variant, non-volatile collections of data
used to support analytical
decision making.
767
databases contain detailed data Operational Non-Operational Subject-Oriented Informational A Operational
that is needed to satisfy processing requirements but
which has no relevance to
management or analysis.
768
Data in the Data Warehouse is Dynamic, Static Non-Volatile, Static Volatile, Static Static, Dynamic D Static, Dynamic
769
, not .
data contains an historical perspective Operational, Informational, Static Informational, Informational,
that is not generally used by the Informational Operational, Static Operational D Operational
systems.
770
The definition of data elements in the data warehouse Masterdata Detaileddata Metadata Basedata C Metadata
and in the data sources and the transformation rules
that relate them, are
referred to as .
771
Data warehouses are not the optimal Structured Unstructured Informational Operational B Unstructured
772
environment for data.
Data Warehousing can be used for Credit Card Insurance Fraud Logistics All of the above D All of the above
773
. Churn Analysis Analysis Management
is the process of Data Analysis Data Warehousing Data Mining Data Modeling C Data Mining
774
extracting patterns from data.
is an approach to quickly Business Processing Online Analytical Product Life Cycle Supply Chain Online Analytical
answer multi-dimensional analytical Management Processing Management Management B Processing
queries.
775
include money, manpower,
materials, machines, technologies etc. Costing Production Sales Resources D Resources
776
The Output of an OLAP query is typically Matrix Columnar Stepped Outline A Matrix
777
displayed in a format.
companies is planning to support tens
of millions of customers with just B2B B2C C2B C2C B B2C
hundreds of employees.
778
Which of the following is the limitation of Open Source Increased Unsuitable for
ERP? Complexities Legal Complexities conventional All of the above D All of the above
applications
779
Which of the following is not an Open ERP Openbravo SQL-Ledger Open-Project ERP5ERP C Open-Project
780
software?
is the process of integrating all the business EDI ERP BPM None of the above B ERP
functions and processes in an organization to achieve
numerous benefits.
781
must consider the fundamental issues of Manager Auditor Top Management Either A or B or C A Manager
system integration by analyzing the organization's vision Commitment
and corporate objectives.
782
The more the number of , the modules process package units D units
783
longer the implementation time.
The user can the company data into multiple
companies as per financial periods Import Export Split Backup C Split
required.
784
is a collection of activities that make one Business Model Business Function Business Process Business Operation C Business Process
or more kinds of input and creates an output that is of
value to the customer.
785
E-Filing of Returns refers to the process of electronically
filing your tax returns through the Intranet Internet Extranet Any of the above B Internet
.
786
Tally.ERP 9 offers a data encryption option Tally Data Tally Data Encoding Tally Vault Tally Data C Tally Vault
787
called . Encryption Conversion
is the process of
exchanging Tally.ERP 9 data between two or more Serialization Randomization Synchronization Asynchronization C Synchronization
locations.
788
The Tally website offers , by which a Tally Forum Tally FAQ Tally Support Tally Chat D Tally Chat
user can communicate with a Tally representative and
get required information.
789
Tally.NET use for centralised Data Centre Control Centre Cloud Centre Administration B Control Centre
790
Account Management. Centre
The data is transferred between the remote location Encoding Decoding Encryption Decryption C Encryption
and the server using a secured mechanism called
.
791
Alias represents in Tally.ERP9. Short name Nickname Code name All of these D All of these
792
If we purchase any Fixed asset in credit, we can Payment mode Receipt mode Journal mode Contra mode C Journal mode
793
pass it from .
Information systems can be designed so that accurate Integrated Isolated Information Non-Integrated Non-Isolated Integrated
and timely data are shared between functional areas. Information Systems Systems Information Systems Information Systems Information Systems
These systems are called
A
.
794
To save entry without any amount, we have to Cost Center Maintain Multiple Allow 0 value entry Use Rej Notes C Allow 0 value entry
795
use . godown
Transfer of materials from one godown to Manufacturing Stock Journal Purchase Journal Both A & B B Stock Journal
796
another godown, use . Journal
While exporting Ledgers from Tally to Web XML Format ASCII Format SDF Format HTML Format D HTML Format
797
Page, we use .
In Service tax Credit Adjustment (%) should be 0.2 1 Both A & B Neither A &B C Both A & B
798
either .
Service Tax Report can be seen from Display > Day Book Display > Account Display > Statutory Display > Statutory Display > Statutory
. Books Masters Reports D Reports
799
Income Tax number of the Company will appear Cash/Bank Book Profit and Loss A/c Reminder Letter None of these D None of these
800
in which report?
A business model is not a model. system mathematical Conceptual Logical B mathematical
801
The approach to ERP is to first develop a Business Model Business Function Business Process Business Operation A Business Model
comprising the business processes or
activities that are the essence of a
business.
802
OLAP systems use concept of OLAP cube called single hyper dimensional multi dimensional none C multi dimensional
803
a cube dimensional
In Tally ERP-9 Remote Access is also known as Networking VB.Net Tally.Net None of the C Tally.Net
804
. above
Accessing data store on a remote location using Internet None of the above
in Tally.ERP9 is called . Local Data Remote Data Internet Data B Remote Data
805
Tally.ERP9 can be classified user in two Local User Remote User Both A & B None of the C Both A & B
806
categories are . above
Which of the following is not a predefined security level
provided by Tally.ERP 9? Owner Public User Data Entry Tally.NET User B Public User
807
The business model is represented in the graphical form flowcharts, flow flowcharts, flow
using and charts, pictures smart art, clip art diagrams graphs, shapes C diagrams
808
Which of the following is/are the data warehousing Identifying and Defining the correct Establishing a data
activity? prioritizing subject level of summarization warehouse help desk
areas to be included to support business and training users to
in the Data decision making effectively utilize the
Warehouse desktop tools All of the above D All of the above
809
is the succession of Business Online Analytical Product Life Cycle Supply Chain Product Life Cycle
strategies used by management as a product goes Processing Processing Management Management C Management
through its life cycle. Management
810
integrates supply and demand BPM SCM PLM CRM B SCM
811
mangement within and across companies.
OLAP stands for . Online Analysis Online Analytical Online Analytical None of the above Online Analytical
Processing Processing Programming B Processing
812
includes transportation from Inbound Outbound Sourcing planning Production A Inbound
813
Suppliers and receiving inventory. Operations Operations planning Operations
Which of the following is not the service area of Logistics Asset Management PLM CRM D CRM
814
SCM?
Which step of the ERP implementation involves, Step 1 Step 2 Step 3 Step 4 B Step 2
educating and recruiting end users throughtout the
implementation process?
815
The system process will address issues implementation upgradation installation migration C installation
such as software configuration, hardware acquisition
and software testing.
816
A review is recommended to pre implementation under process review post implementation None of the above C post implementation
ensure that all business objectives established during
the planning
phase are achieved.
817
In stages, auditors have access to post implementation pre implementation Both A & B Either A Or B A post implementation
rudimentary ERP tools and capabilities for auditing
security configurations.
818
ERP systems provide an access to integrated distributed isolated de-centralized A integrated
819
the data
is a tool that refers to skills, Data Warehousing Business Intelligence Business Intelligence
processes, technologies, applications and practices used
to facilitate better, accurate and quicker decision
Data Modeling Business Modeling D
making.
820
Business intelligence systems are data-driven information driven resource driven none A data-driven
821
Decision Support Systems.
Data warehousing technology is the process of creating
and utilizing the company’s general data historical data operational data none B historical data
822
The data in the Warehouse comes from the
environment and external sources. operational backup data none A operational
823
In essence, SCM integrates management supply and demand supply and demand
within and across companies. supply and chain supply and sortage none A
824
including all fulfillment Inbound operations hybridbound outbound operations
activities, warehousing and transportation to customers. outbound operations operations none B
825
Customer Relationship Management is a business corporate strategic none B corporate
826
level strategy.
Operational CRM provides support to front office back office staff none A front office
827
business processes.
Collaborative ultimate goal is to use CRM's ERP SCM none A CRM's
information collected by all departments to improve the
quality of services provided by the company.
828
Tally.ERP 9 follows the DES encryption decryption cryptography none A encryption
829
method to safeguard the data.
Business Intelligence Systems are data-driven Information Systems Integrated Information Decision Support Non-Isolated Decision Support
. Systems Systems Information C Systems
Systems
830
With technology the characters are
reduced in breadth and user is allowed to input
additional characters which would make the account
Tally Fix Tally Adjust Tally Fit Tally AutoFit C Tally Fit
name, entity complete
and readable.
831
In Tally.ERP 9 provides the user User-defined HTTP-XML based data Unlimited multi- user
with administrator rights and the capability to check the Security interchange support
entries made by the authorised users and alter these
Audit Feature D Audit Feature
entries, if
necessary.
832
is an enabling framework which Direct Web Browser
establishes a connection through which the remote user Access
can access the Client's data without
Web Publishing Tally.NET Email facility C Tally.NET
copying/transferring the data.
833
If we want the company to be connected automatically Allow to Connect Contact On Load Either A or B None of the above B Contact On Load
for remote access on load, the property Company
needs to be set it as Yes.
834
technology is the Data Warehousing Business Intelligence
process of creating and utilizing the company's historical Data Modeling Business Modeling A Data Warehousing
data.
835
BBS stands for bulletin board business broadcasting bulletin none of the above bulletin board system
system system broadcasting system A
836
The Internet is a network similar to ….. Peer-to-Peer Point-to-Point link Port-to-Port Peer-to-Peer A Peer-to-Peer
837
connectivity connection talking connectivity
Each computer on the Internet is identified with 24-bit address 16-bit address 30-bit address 32-bit address D 32-bit address
838
a….
is used to transfer and copy files over iccp ftp uucp none of the C uucp
839
the internet above
A mail server robot can automatically…. Check mails Read mails Respond to mails Delete mails C Respond to mails
840
is a program that helps us to log on to yahoo ftp telnet none of the C telnet
841
other networks above
This protocol is used to check reliability, sequencing and Transmit Transmission Control Communication Transmission Control
flow control. Communication Protocol Telnet Control Port Control Protocol B Protocol
Protocol
842
To check that data reaches the destination in a proper
order, the data packets are assigned…. Order numbers Packet numbers Sequence numbers Data numbers C Sequence numbers
843
The computer which provides FTP, WWW, Mail Client Server Host PC B Server
844
services on a network is called….
Two of the important browsers are lynx,minx netscape,ie mosaic,gopher none of the B netscape,ie
845
and above
The method of accessing files through publicly
accessible server that gives free access to the Public FTP Server FTP Available FTP Anonymous FTP D Anonymous FTP
files is called ……
846
are defined as ways of protocols IP address dns none of the A protocols
847
communication amongst networks above
This file is transferred verbatim with FTP ASCII file BIT file Binary File TEXT file C Binary File
848
service.
849 We can access the Archie server by…… Tunnel WWW Telnet Message C Telnet
The system of interlinked documents is known hot links hyperlink books marks none of the B hyperlink
850
as above
851 The types of Archie servers are ….. Straight Archie Windows Archie Both A and B Neither A nor B C Both A and B
The small programmes that create none of the above
animation,multimedia,real-time games and images applets animation B applets
multi user games are called
852
% telnet archie.ans.net is the command used by Login to Archie Program the Archie Request the Archie Protocol the A Login to Archie
853
the Archie client to…. server Server server Archie server server
USENET is a BBS on scale small large very small none of the B large
854
above
When a computer is connected to the internet Dial-up access Dedicated access Deployed access Service access B Dedicated access
855
through a LAN
The information displayed on the web page graphics,videos,a programms,images,t animation,scripts,e none of the A graphics,videos,au
856
includes , and udio ext xecutables above dio
This tool helps us to locate a file anywhere on FTP Remote Archie Archives C Archie
857
the Internet.
The web pages that represent online home of first page home page welcome page none of the B home page
858
their author are called above
The computer that maps the Internet domain name to Network translator Address Naming server Domain name server Domain relation Domain name server
the Internet numeric address is the ….. server server C
859
is the most popular internet service yahoo service electronic mail search engines none of the B electronic mail
860
above
… is the format of Internet Address. Aaa-bbb-ccc-ddd Aaa.bbb.ccc.ddd Aaa/bbb/ccc/ddd Aaa*bbb*ccc*dd B Aaa.bbb.ccc.ddd
861
d
is a program or a tool that helps us newsgroup telnet ftp archive D archive
862
find a file anywhere on the net
The email address has two parts one is the Domain Net Web Mail A Domain
863
username while the other is the ….
Yahoo,lycos,excite and webcrawlers are search engines web directories database channel B web directories
864
The resources on the World Wide Web are linked with Universal Resource Universal Resource Uniform Resource Uniform Reserved Uniform Resource
the naming format ….. Location Locator Locator Link C Locator
865
GIF is the acronym for Graphical interpreter Graphical interchange Graphical interface Graphical Interface Graphical interchange
formatting Format format format B Format
866
This Net tool provides a stimulating on-line Internet Relay Relay packet Chat messaging Information A Internet Relay Chat
867
discussion environment. Chat transmission chatting
JPEG is the acronym for Joint Pictures Expert Jumbled pictures Joint pictures expert Joint pictures Joint Pictures Expert
Group expert graph graph experimental group A Group
868
The IRC II client program command begins with Percent Slash Line Dot B Slash
869
a ….
The World Wide Web consists of information web pages network mails B web pages
870
connections
The IRC conversations are organized into…. Chats Packets Lines Channels D Channels
871
A hyperlink can be on text only image only text or image neither text nor C text or image
872
image
Identify the output of the IRC command " /list - min 10" Display channels Display chats with the Display channels with Display line with 10 C Display channels with
. with at least four maximum 10 users at least ten users removed channels at least ten users
users
873
Lynx text browser is a web client in which users Self accounts Terminal ping Shell accounts Shell programs C Shell accounts
874
can login with …..
Internet can be defined as internal network network of network intermediate none of the B network of
875
network above network
PPP stands for: Protocol to Point to Point Pin to Pin Port to Port B Point to Point
876
Protocol Points Protocol communication Protocol Protocol
The two major browsers used to surf the Internet are MS Internet Explorer Netscape Navigator and MS Internet Explorer None of the above C MS Internet Explorer
, and Mosaic Mosaic and Netscape Navigator and Netscape
Navigator
877
A web browser provides this hotlist for a user. Book-keeping Bookmarking Menu Bookmarks D Bookmarks
878
The internet is also called as arpanet the net intranet none of the B the net
879
above
The tool to obtain information on the web by menus
and more flexible than Archie is…. Lynx Juggler Gopher Gateway C Gopher
880
The internet is similar to LAN peer-to-peer wan none of the B peer-to-peer
881
connectivity above connectivity
These servers help in searching for words from WINWAIS and WIIS and NETWAIS WINNET and WINSRC and A WINWAIS and
882
a list of databases or documents. WAISMAN WAISLINK FTPWAIS WAISMAN
The net transfers from one place to data parcel packets none of the A data
883
another above
This scripting language is an object based SGMLScript VbScript SunScript JavaScript D JavaScript
884
language and is developed by Netscape.
The net provides interesting services like , scripting,parsing and news,cooking and fine email,file none of the above email,file
and compiling arts retrived,internet C retrived,internet
tools tools
885
The one-way broadcast of live events is called…. Netcast Cybercast Eventcast Livemessaging B Cybercast
886
is the ancestors of the internet dnet arpanet ARPANET none of the B arpanet
887
above
This is a system of thousands of distributed bulletin
boards and read by a newsreader. Bulletinreader Newsgroup Newsletter Networkboard B Newsgroup
888
DARPA stands for defensive dedicated and defensive advanced defensive advanced
administrative rank registered projects research projects research projects
administration administration administration net administration net
none of the above C
network
889
Unix shell provides mailing programs called …. Pine and Elm Pile and Elem Pine and Embedd Port and Elm A Pine and Elm
890
DARPA is broken into and milnet,smaller mailnet,inet intranet,extranet none of the A milnet,smaller
891
arpanet above arpanet
The Unix to Unix copy mail system separates parts of
the mail address with the symbol...….. @ ! # () B !
892
NSFNET is the united states provides service to education,resear music and dance cooking and dining none of the A education,research
893
and ch above
The Netlauncher (TCP/IP) software consists of these
programs that can run under Windows. Spy Mosaic Image View Both A and B Neither A nor B C Both A and B
894
The parts of the WSIRC server (net tool) window are….. Server message, Server Server Server C Server
command line and message,command line message,command line message,comman d message,comman d
channels and channels and channels line and line and channels
channels
895
is a program that displays information about none of the above
a host connected to the net finger service ping service ftp service A finger service
896
SLIP stands for: Serial Limited Serial Lock Inter- Serial Line Internet Setting Link Inter Serial Line Internet
Internet Protocol Protocol Protocol Protocol C Protocol
897
The first international IP network connections were united states and UK united states & Russia none of the above
established in 1973 with and england,norway B england,norway
898
These are small java programs that create games, Java scripts Java exe Java applets Java objects C Java applets
multimedia etc. These are downloaded over the Net and
executed by a web browser.
899
A is a set of computers interconnected by none of the above
transmission paths to exchange information in server client network C network
internet
900
901 The World Wide Web is a collection of….. Web windows Net pages Net addresses Web pages D Web pages
A computer that provides a service usable by client stand-alone servers none of the C servers
902
other computers is called above
It is a link which helps in retrieving information Netlink Sitelink Hyperlink Hypernet C Hyperlink
903
from the WWW easily.
can be owed by multiple organisation LAN MAN WAN none of the C WAN
904
above
… directories deliver information on all Web maps Net ports Wide maps Web infos A Web maps
905
the topics on the Internet.
Data is transmitted in the form of signals analog digital non-digital none of the B digital
906
above
This browser does not display links in color. Netshark Cello Lynx Mosaic B Cello
907
931
This system involves electronic transfer of funds Electronic Financial Efficient Format Electronic Format Electronic Fund Electronic Fund
between financial institutions. Transmission Transactions Transfer Transfer D Transfer
932
A …… electronic mailbox stores EDI transactions for later Value Added Very Advanced Value Aided Networks Value Enhanced Value Added
retrieval. Networks Networks Networks A Networks
933
The mutual satisfaction of price, terms and Negotiation and Networking and Buying Negotiation and Negotiation and
conditions, delivery and evaluation criteria in a Bargaining servicing Critical buying A Bargaining
marketplace is….
934
The type of advertising, the Broadcast and Junk Passive Push Portal Smart B Push
935
Mail models are of…..
Identify the models of passive advertising. Billboard Portal Both A and B Neither A nor B C Both A and B
936
This layer is responsible for transmitting data as Network Layer Data Link Layer Presentation Layer Transport Layer B Data Link Layer
937
frames.
This layer is responsible for encoding of data. Link Layer Network Layer Presentation Layer Physical Layer C Presentation Layer
938
A always begins with a slash message scheme command line none of the C command line
939
above
The costs of Internet implementation are….. Connection cost, cost Computer cost, IC board cost, cable Connection company A Connection cost, cost
of telephone line network card cost cost cost, connection data of telephone line
cost
940
This layer of the TCP/IP suite includes the Application Layer Link Layer Transport Layer Network Layer B Link Layer
941
device driver and network interface card.
This protocol is used for flow control, echo and flow Simple Mail Transfer Internet Control Internet Control Data Single Control Internet Control
redirection. Protocol Message Protocol Protocol Message Protocol B Message Protocol
942
The software components that integrates different
hardware devices with the operating Device drivers Device modules Device programs Software devices A Device drivers
system…..
943
This is the basic component that connects the Cable Interface Netlink Interface Device Interface Network D Network Interface
944
computer to the network. Card Card Card Interface Card Card
The dumb terminal/node in a network depends on this Personal computer
computer for their basic functioning. Client computer Server computer Data computer C Server computer
945
This has an embedded microchip which can both
manipulate data and execute applications. Data card Security card Combi card Meta card C Combi card
946
To ensure a reliable communication between the buyer Session Socket Layer Secure Sockets Layer Electronic Socket Layer Cyber Socket Layer Secure Sockets Layer
and seller, the protocol used is…. Protocol Protocol Protocol Protocol B Protocol
947
This software enables a host to work as a Terminal Terminal emulator Indirect software Terminal B Terminal emulator
948
terminal on the network. embedded communicator
is a program that helps us to log on to Usenet finger service ftp telnet D telnet
949
other networks
The Windows Internet application functions were
developed based on the UNIX programs Sockets Package Protocol Simulators A Sockets
called…..
950
Which of the following will not appear in the Powerpoint Word Paste Document My Templates C Paste Document
951
home page of K-Doc?
To change an email header so that the message appears Email middle attack. Email Spoofing. Email hacking. Email tracking B Email Spoofing.
to have originated from someone or somewhere other
than the actual source is
known as .
952
To playfully satirize a website is known Web tapping Web Interception Web spoofing Web threating C Web spoofing
953
as .
is the complete package to manage the Billing and Accounting Billing and Accounting
billing requirements of a CA firm on cash Payroll eSecretary software K-DOC application C software
system of accounting.
954
Which of the following is not a/an feature of Contact Greeting Management Share certificate Share certificate
eSecretary? Management Email Management printing D printing
955
Annual return preparation can be done using ICAI-ROC K-DOC application ICAI XBRL Software Payroll A ICAI-ROC
956
. application application
is correspondence automation & K-DOC ICAI-ROC
management software that is seamlessly application eSecretary ICAI XBRL Software application B eSecretary
integrated with Microsoft Office.
957
is an independent,objective assurance and Statutory audit Tax audit Internal auditiing None of the Above C Internal auditiing
consulting activity designed to add value and improve
an organization's
operations.
958
Which of the following is/are the main purpose Financial Operations of the Both A and B Either A or B C Both A and B
959
of the internal audit? reporting organization
As per of the Income tax Act,every
person carrying on business or profession is requires to
get his accounts audited by a CA before the "specified
Section 45 Section 44AD Section 43B Section 44AB D Section 44AB
date".
960
refers to use
software/applications to automatically perform tasks
such as accounting,preparing trial balance, financial
statements etc. and electronically transmit data or
information using internet.. ERP Office automation Either A or B None of the Above B Office automation
961
FEMA Stands for . Foreign Exports Financial Enterprise Foreign Exchange None of the Above C Foreign Exchange
Management Act Management Act Managament Act Managament Act
962
Which application helps the management to allocate Resource allocation Knowledge Document Client management D Client management
the revenue to the credit of the right employee who and scheduling management Management Systems
identified the opportunity?
963
Who has full privileges in the financial Database Account System User C System
964
accounting application? administrator administrator administrator Administrator administrator
is the centre point of the financial
accounting application as any transactions having
financial impact carried out in any other module will
AP module GL module AR module FA module B GL module
reflect in this module.
965
Which of the functionalities is not provided in the Evaluation of Receipts of goods or Invite and analyze Comparison with D Comparison with
purchasing module of Financial Accounting Application. Vendors service quotations from budgets budgets
vendors
966
In Financial Accounting Application,automatic sequence Purchasing Accounts Payable Expense Management Fixed assets C Expense Management
number of documents control is not required in which
of the following module?
967
Which module of Financial Accounting Accounts Receivable
Application can be used for assigning credit limit to Purchasing Sales Accounts Payable B Sales
customers?
968
Which of these will trigger/alert for timely Accounts Accounts Receivable Expense Bank C Expense
969
payment ? Payable Management Reconcilations Management
We can manage interviews,offers and job vacancies by Resource allocation HR and Payroll Knowledge None of the Above HR and Payroll
using which of the application? and applications management B applications
scheduling
970
, , are commonly Confidentiality,In Confidentiality,Integr Confidentiality,Inte Confidentiality,Int Confidentiality,Inte
referred to as CIA in information tegrity and ity and grity and Access egration and A grity and
security parlance. Availability Authentication rights Authentication Availability
971
provides information about updation of Performance HR management Timesheet Timesheet application
project cost based on time spent by management system Payroll application D
employees on various projects. system
972
Which of the follwing is not a/an functionality provided Capture the Key Employee designation Automated alerts for Prepare summary or Employee designation
by PMS? Performance and reporting structure pending appraisals bell curve analysis of and reporting
Indicators all employees structure
B
973
automates the calculation of salary for Timesheet System HR management Knowledge
taking inputs from the timesheet application, leaves System management System
from Leave Management System and salary details from
Payroll System C Payroll System
the HR master
data.
974
Which of the follwing is not a control in Leave Reduce Error free capture of Approval workflow Error free capture of
Management System? administrative Excess leave leave details C leave details
burden on HR
975
Permanent Audit File are obtained once but half-yearly yearly monthy quarterly B yearly
976
updated on basis.
In Permanent Audit file, is not the key data Organization chart Client’s accounting Copies of clients’ Copies of important Copies of clients’
documented. manual incorporation contracts or long incorporation
documents like MoC term lease documents like MoC
C
agreements
977
The Document Management Sytem offers the Role based access Complete audit trail Cost effective to All the Above D All the Above
features . maintain the
documents in soft
copy
978
is a type of training in which user
logon on the training server with a user ID and Internal Training E-Learning Classroom Training E-Training B E-Learning
password.
979
In some cases, trainee is supposed to appear for the Classroom Training
examination/test at the end of the training E-Learning Virtual Learning All the Above B E-Learning
is .
980
are the hardware/infrastructure PC Application Server WAN All the Above D All the Above
981
equipments used in a CA firm.
means information available in the Confidentiality Integrity Availability Authentication B Integrity
organization should not be altered or modified by
unauthorized personnel.
982
Which of these is/are the standard email Microsoft Lotus Notes Both A and B None of the C Both A and B
983
program used in an organization? Exchange Above
Which of the following is not a characteristics of WAN? Most WANs are Compared to LAN, its WAN uses only private Switches are used to B Compared to LAN, its
owned by only one transmission speed is networks. connect LAN and transmission speed is
organization. low WAN low
984
is protection of information assets from Information Security None of the above Information Security
threats to preserve their value. Confidentiality Integrity C
985
Which types of information assets need to be Client data Own data Own documents All the above D All the above
986
secured in a CA Office?
The extent and level of would Availability Confidentiality Integrity Authentication B Confidentiality
987
depend on the nature of information.
of information might be affected due to
denial of service attack or some other Integrity Authentication Confidentiality Availability D Availability
reasons.
988
means the sender cannot deny having sent
a message and receiver cannot Non-Repudiation Integrity Authentication Confidentiality A Non-Repudiation
deny receiving the message.
989
990 Risk may not be in nature. reputational financial operational vulnerable D vulnerable
The process of identifying an individual, usually
based on user id and password in an organization is Availability Authentication Confidentiality Integrity B Authentication
called .
991
Which of the following is not a software equipment Resource allocation None of the Above
required in a CA's office? and Client management HR and Payroll D None of the Above
scheduling
992
Which of the following is not an application ICAI-XBRL suite K-DOC Billing and ICAI-TOC D ICAI-TOC
993
arranged by ICAI? Accounting
How many stages are there in the sales cycle? 2 3 4 5B 3
994
PBX stands for Private Exchange Public Exchange Branch Private Branch Public Branch Private Branch
Branch exchange exchange C exchange
995
Find the correct sequence in case of XML file, are Structure, store, and Store, structure, and Structure and store Store and transport A Structure, store, and
transport transport information. information. information. transport information.
information.
996
As Bank auditors,Many Banking applications generate
text files in . Txt format Csv format Both A and B Nither A Nor B C Both A and B
997
Macro security is enabling through . Developer Developer Developer Developer
Not Required tab>Code>Macro tab>Modify>Macro tab>Controls>Ma B tab>Code>Macro
Security Security cro Security Security
998
Requirements for preparation of cash budget in Excel. Knowledge of Knowledge of Knowledge of cell Knowledge of all of Knowledge of all of
accounting formatting an excel linking & basic the above. D the above.
sheet formulae
999
ROE stands for . Recall on Equity Return on Equity Return on Enquary Return of B Return on Equity
1,000
Equalisation
is a statistical procedure that uses sample
evidence and probability theory to determine whether a
statement about the value of a population parameter
should be rejected or should not be rejected. Confidence Interval Hypothesis ANOVA None of the above B Hypothesis
1,001
is a statistical tool used to create Regression Regression Multiple Single Regression C Multiple
1,002
predictive models. equation Regression Regression
shows the ability of a company to pay its
current financial obligations. Quick Ratio Current Ratio Liquidity Ratio Solvency Ratio C Liquidity Ratio
1,003
shows dependency of a firm on Quick Ratio Leverage Ratio Liquidity Ratio Solvency Ratio B Leverage Ratio
1,004
outside long term finance.
To record a Macro in relative mode,"Üse Realtive
References" available in which tab of Developer Tab View Tab Both A and B Nither A Nor B C Both A and B
excel ?
1,005
There are ways to open a Macro 3 2 4 1A 3
1,006
enabled workbook.
In Excel, there are functions for 4 5 6 3B 5
1,007
calculation of depreciation.
1,008 XML is a Recommendation. W3C W1C W2C W4C A W3C
VDB function used to calculate depreciation as For calculation of For calculation of For calculation of For calculation of For calculation of
per . depreciation as per depreciation as per depreciation as per depreciation as per depreciation as per
Variable Declining Straight Line Method. Declining Balance Double Declining Variable Declining
Balance Method. Method. Balance Method. Balance Method.
A
1,009
PV Ratio stands for . Point Volume Point Varaiance Profit Volume Profit Variance C Profit Volume
1,010
Ratio Ratio Ratio Ratio Ratio
BEP stands for Break Easy Point Break Even Point Balance Equal Break Equal Point B Break Even Point
1,011
Point
function returns value from a given data
range based on row and column. VLOOKUP() HLOOKUP() INDEX() LOOKUP() C INDEX()
1,012
Which function categories are not available in Statistical Engineering Math & Trig Arts D Arts
1,013
Excel.
function uses a fixed rate to calculate DB VDB SYD SLN A DB
1,014
depreciation
Which of them is not a Conditional Operators < </ <= <> B </
1,015
symbols?
XML is a language that is very similar to which C HTML C++ JAVA B HTML
1,016
language ?
In Excel the function =Abs(-4) returns -4 2^2 4 None C 4
1,017
.
If User want to display the formulas rather than the Formulas > Formula Formulas > Formula Formulas > Function > Formulas > Formula Formulas > Formula
results of the formulas then > Show Formulas. Auditing > Show Show Formulas. Auditing Auditing > Show
choose . Formulas. > Function > Show Formulas.
B
Formulas.
1,018
reveal about the current and future Financial statements Financial statements
financial condition of the company. Report Data None C
1,019
Which of them is a Intangible assets? Goodwill and Cash and Property. investment and None of the A Goodwill and
1,020
Patents. securities. above Patents.
1,021 CR stands for . Current Ratio Clear Ratio Current Rate Clear Rate A Current Ratio
1,022 QR stands for . Quick Rate Quality Ratio Quality Rate Quick Ratio D Quick Ratio
DTD stands for , which is called Direct to Direct Document Type Data Type Data to Data B Document Type
1,023
XML Schema. Definition Definition Definition
ACP stands for . Average collection Average collection Average collection None of the above Average collection
price payment period C period
1,024
FATR stands for . Fixed all turnover Fixed assets test Fair assets Fixed assets D Fixed assets
1,025
ratio ratio turnover ratio turnover ratio turnover ratio
1,026 A can be a numerical fact. Statistic Sale Salary Number A Statistic
stands for reduction in value of Depreciation Data Document Detail A Depreciation
1,027
fixed assets.
Value of fixed assets is generally reduced over the Change in taste of Change in technology
period of time due to . Wear & Tear people All of the Above D All of the Above
1,028
Examples of fixed cost are . Salary of
administrative office rent Both A and B None C Both A and B
staff
1,029
The extension of a XML document is (.xsd) (.xml) (.mlx) (.xlm) B (.xml)
1,030
.
analysis relates items in the financial Financial ratio Price Perodic Report A Financial ratio
statements in a manner that drives out performance
information about the company.
1,031
How to restrict to run a macro automatically when Hold down the Hold down the CTRL Hold down the ESC key Hold down the Hold down the
starting Microsoft Excel? SHIFT key during key during start up. during start up. ALT key during start A SHIFT key during start
start up. up. up.
1,032
Which option allows you to Bold all the negative values Conditional Formatting Negative Formatting Conditional
within the selected cell range? Zero Formatting Bold Formatting B Formatting
1,033
allow us to perform calculations or Cell referencing Absolute functions Worksheet functions Round( ) functions C Worksheet functions
operations that would otherwise be too cumbersome or functions
impossible altogether.
1,034
Statistical functions in Excel help to calculate Arithmetic Mean Median Mode All of the above. D All of the above.
1,035
1,041
is one of the core principals of finance
and is the primary factor used in pricing a stream of
cash flows, such as those found in a traditional bond or
Marginal costing Discounting PMT None B Discounting
annuity.
1,042
XML schemas in Excel are called XML Schemas Maps Elements Markups C Elements
1,043
.
Excel allows us to use various functions and even simple Financial analysis Equity analysis Leasing decisions and All of Above D All of Above
mathematical calculations which can be used for the list goes on
.
1,044
Which cell reference show the reference to other sheet
or reference to other workbook in Sheet2!C4 Sheet2{C4} Sheet2(C4) Sheet2<C4> A Sheet2!C4
excel ?
1,045
1,046 Which of them is not a Range References? A1:A4 $A$1:A4 A1, A2 , A3, A4 A$1:A$4 C A1, A2 , A3, A4
Interest Coverage Ratio equals to . EBIT / Debt EIBT / Debt interest ETIB / Debt interest EBTI / Debt A EBIT / Debt
1,047
interest interest interest
If particular workbook have to open each time Excel
started, where the workbook should be AUTOEXEC folder AUTOSTART folder EXCELSTART folder XLSTART folder D XLSTART folder
placed?
1,048
is a computerized mathematical technique Finanical Planning Monte Carlo Simulation Corporate Planning Personal Finance B Monte Carlo
that allows people to account for risk in quantitative Planning Simulation
analysis and decision making.
1,049
is the process of meeting the Corporate planning Monte Carlo simulation Personal Finance
financial goals through the proper management of Financial planning planning C Financial planning
finances.
1,050
can be defined as the process of setting Monte Carlo Corporate Planning Decision Tree Analysis Corporate Planning B Corporate Planning
the procedures in the organization for achieving the Simulation & Analysis
predefined goals.
1,051
shows ability of company to pay back long Debt Assets Ratio Interest Coverage Ratio Total Fund Ration None of the above B Interest Coverage
term loans along with interest or other charges from Ratio
generation of profit from its
operations.
1,052
is the simplest method of Earnings Per share Fixed Asset Over ratio Price Earnings Multiple Gross Profit Ratio C Price Earnings
comparing different stocks at a point of time to make Multiple
investment decisions.
1,053
The very first line of code of XML file is . <?xml version="3.0" <?xml version="2.0" <?xml version="1.0" <?xml version="0.0" C <?xml version="1.0"
encoding="ISO- encoding="ISO-8859- encoding="ISO- encoding="ISO- encoding="ISO-
8859-1"?> 1"?> 8859-1"?> 8859-1"?> 8859-1"?>
1,054
Every bit of data has to start and end with an <TagName>Data </TagName>Data<Ta </TagName>Data< <TagName>Data< A <TagName>Data</
1,055
identical tag </TagName> gName> /TagName> TagName> TagName>
The exact syntax of PMT function is . PMT(nper, rate, pv, PMT(rate, nper, pv, [fv], PMT(rate, pv, nper, [fv], PMT(pv, rate, nper, PMT(rate, nper, pv,
[fv], [type]) [type]) [type]) [fv], [type]) B [fv], [type])
1,056
The exact syntax of IPMT function IPMT(rate, nper, pv, IPMT(pv, rate, per, IPMT(per, rate, IPMT(rate, per, IPMT(rate, per,
is . [fv], [type]) nper, [fv], [type]) nper, pv, [fv], [type]) nper, pv, [fv], [type]) D nper, pv, [fv], [type])
1,057
To see the XML Map user must go Developer>XML> Developer> Source File Menu>Options>Ad None of the above. A Developer>XML>
. Source d in>Excel Add Source
In>XML
1,058
Deletion of XML Map is done through Directally Delete XML Maps Dialog Box None of the above XML Maps Dialog Box
. Command Delete Button C
1,059
Excel works primarily with types of 3 2 1 4B 2
1,060
XML files.
Method of tax calculations shall change Annual Income DOB status of assess All of the above. D All of the above.
1,061
according to .
Which function is used to calculate the principal IPMT PPMT PMT None of the B PPMT
1,062
portion in every installment ? above
is a process used in statistical analysis in Snowball sampling Sampling Systematic sampling Simple random B Sampling
which a predetermined number of observations will be sampling
taken from a larger
population.
1,063
In , Individuals are selected at Clustered sampling Systematic sampling Simple random Systematic sampling
regular intervals from a list of the whole population. Sampling sampling C
1,064
In each individual is chosen entirely by Snowball sampling Convenience sampling Systematic sampling Simple random D Simple random
chance and each member of the population has an sampling sampling
equal chance, or probability,
of being selected.
1,065
Which method is commonly used in social sciences Simple random
when investigating hard to reach Quota Sampling Sampling Snowball sampling sampling C Snowball sampling
groups?
1,066
are useful for quick reading and
easy understanding, particularly for top management. Balance sheet Summary reports IRR NPV B Summary reports
1,067
It is a process in which a business determines whether Business Investment Capital Budgeting Capital Investment Investment B Capital Budgeting
projects such as building a new plant or investing in a management
long-term venture are worth
pursuing.
1,068
Popular methods of capital budgeting include discounted cash internal rate of net present value All the above D All the above
1,069
and payback period. flow return
What is the file extension of Schema file which (.xml) (.xsd) (.xlm) (.mlx) B (.xsd)
1,070
contain schema tags ?
is the value of all future cash inflows less Net present value
future cash outflows as on today. Working capital IRR PMT A Net present value
1,071
is the process of defining and analyzing Sensitivity analysis Qualitative risk analysis
the dangers to individuals, businesses and government
agencies posed by potential natural and human-caused
Risk analysis Scenario analysis B Risk analysis
adverse events.
1,072
which is used more often, does not involve Sensitivity analysis Qualitative risk analysis Qualitative risk
numerical probabilities or predictions of Risk analysis Scenario analysis C analysis
loss.
1,073
It is a technique used to determine how different values Decision Tree
of an independent variable will impact a particular analysis
dependent variable under a given set of assumptions.
Sensitivity analysis Both A& B Neither A &B B Sensitivity analysis
1,074
involves computing different reinvestment Scenario analysis Sensitivity analysis Decision Tree Analysis None A Scenario analysis
rates for expected returns that are reinvested during
the investment horizon.
1,075
NPER stands Total Principal Net Per value Total Interest Number of D Number of Periods
1,076
for Value Value Periods
helps to break down the Return on Du Point Analysis Return on Profitability Ration None of the A Du Point Analysis
1,077
Equity Investment above
is a common method for financing property,
facilities, and equipment. Mortagage Leasing Rent All the above B Leasing
1,078
The application controls are …. Input controls Processing controls Both A and B Neither A nor B C Both A and B
1,079
1,083
A group of records or transactions that are Physical batches Logical batches Block batches Transact batches A Physical batches
1,084
contiguous constitute …..
… is the type of batch check (group of
records) for all input records of a particular type is done. Control totals Serial number Transaction type Sequence check C Transaction type
1,085
This has an embedded microchip which can both
manipulate data and execute applications. Data card Security card Combi card Meta card C Combi card
1,086
To ensure a reliable communication between the buyer Session Socket Layer Secure Sockets Layer Electronic Socket Layer Cyber Socket Layer Secure Sockets Layer
and seller, the protocol used is…. Protocol Protocol Protocol Protocol B Protocol
1,087
In IDEA, import Assistant wizard is used to Excel Access XML All of the above D All of the above
1,088
import data from .
In IDEA, Append functions can be used Import data Add data at the end Sort Filter B Add data at the
1,089
to . end
Which is the step by step procedure for reporting in File->Print- Click on Create Report File->Select Export ->
IDEA. >Create Report button on the Print Report.
Operation toolbars-
Both A and B C Both A and B
>Report Assistant.
1,090
In the following list which is not an audit Sorting Filtering Sampling Export D Export
1,091
function ?
What is the procedure for importing data into IDEA ? File->Import File->Import -> Import File->Import as -> File->Select Import -> File->Import Assistant-
Assistant-> to IDEA Import to IDEA Import A > Import
Import to IDEA to IDEA to IDEA
1,092
In Audit tool, to built relation between two tables, both None of the above
table should have . Common Table Common Field Common record B Common Field
1,093
Which is the following is the correct types of Overflow Range Sign Test All of the above D All of the above
1,094
Field checks on processed data ?
IDEA exports data in a number of spreadsheet and mail
. text database merge format All of the above D All of the above
1,095
Which is the following is the correct types of Resonableness Compare Un-compare Randomness A Resonableness
1,096
Record checks on input data ?
Which is the correct types of Batch Checks ? Control Totals Outdated checks On-line dated Mixed dated A Control Totals
1,097
checked checks
Which is the need for table level tests ? Controls are required None of the above
Data Integrity for Both A and B C Both A and B
authorization
1,098
Which is the following is the major points with respect This may make the Their Master & Child
to inter table tests ? entire child tables relationship reference
referenced by the the table from one
master field in the another
main table un- Both A and B None of the above C Both A and B
available
1,099
Which is the software used by the auditor to take a view Mapping Snapshots Modelling Source comparison B Snapshots
of a file of data or transaction passing through the
system at a particular point
of time ?
1,100
Which is the software used by the auditor to Souce comparison
compare the source version of a program with a secure Code compasion Model comparison Exe comparison A Souce comparison
master copy ?
1,101
Which is the techniques whereby the auditor arranges
or manipulates data either real or fictitious, in order to
see that a specific program or screen edit test is doing
Debug Testing Logic Testing Off-line Testing On-line Testing D On-line Testing
its work ?
1,102
Which is the software used by the auditor to list Log Analysis Mapping Program Library All of the above B Mapping
1,103
un-used program instruction ?
Which is the software used by auditor to read and Log Analyzers Software Log Analyzers
analyze records of machine activity ? Machine level Executable level Systax level C Software
1,104
Which of the following reason strongly call for Control & Lack of Visible Absence of Input None of the above
Audit Function ? Transaction Trail Document All of the above C All of the above
1,105
In IDEA,Data Extraction select data form a file for
further for creating a new file Extraction Recording Investigation Sorting C Investigation
of logically selected records.
1,106
Which is the correct types of Field checks on Missing data Blank data Both type None of the C Both type
1,107
input data ? above
Which is the major points to be consider with respect to To ensure the input Test whether the To ensure the entered To ensure the input
System tests ? data is valid before overall system meet data is saved without data is valid before
entering the the requirement fail entering the value
All of the above A
value specifications
1,108
In Data analysis techniques, which law is used to
idenfity statistical report on numeric data ? Bend Law Benjamin law Benford Law British Law C Benford Law
1,109
Which is not a feature of File reorganization with an Linking the identified
auditor perspective? Filtering Sorting Indexing files A Filtering
1,110
What do you understand by the term, “Data Establish relationship Identify fields, which Identify data, which are Identify whether all Identify data, which
Consistency” in using CAATs? between two or have null values. not in agreement with fields have valid are not in agreement
more tables as the regular format. data. with the regular
C
required. format.
1,111
Functions involving use of arithmetic operators, which Statistical function Arithmetic function Logical function Relational function B Arithmetic function
enable performing re-computations and re-performance
of results is an example of?
1,112
Which of the following is a benefit of using CAATs? Identify an audit finding To give assurance to Identify an audit
w.r.t. materiality in an customers about the finding w.r.t.
IT environment performance of the materiality in an IT
File an FIR based on Investigation of fraud in
company B environment
audit finding audit area
1,113
What is step by step procedure for using Data->Benford's Analysis->Benford's Sampling-> Tools->Benford's B Analysis-
1,114
Bendford's law function in IDEA ? Law Law Benford's Law Law >Benford's Law
A Benford's Law analysis is most effective on Comprised of similar Without built-in Without assigned
data . sized values for minimum and numbers, such as bank
similar phenomena. maximum values. accounts numbers and
zip codes and with four
or more digits. All of the above D All of the above
1,115
In IDEA, blank value data can be extracted by @isblank() as Null Null Is Null A @isblank()
1,116
using .
In IDEA, Summarization, Pivot Table, Stratify,
Duplicate Key functions comes under which menu. Data Analysis Sampling Relation B Analysis
1,117
In IDEA, Extraction, Sort, Indices, Search Analysis View Relation Data D Data
1,118
functions comes under which menu.
is centralized Banking Application Software. Core Banking System Core Banking Solution Complete Banking Centralized Banking Core Banking Solution
Solution Solution B
1,119
1,120 Flexcube developed by Infosys HCL Technologies TCS I-Flex D I-Flex
1,121 Quarz developed by Infosys HCL Technologies TCS I-Flex C TCS
The server is a sophisticated computer that accepts Clients Customers Party IP A Clients
service requests from different machines which are
called
1,122
server has to be a powerful and robust
system as it has to perform all the core Antivirus Server Application Server Web server Clients Server B Application Server
banking operations.
1,123
ATMS stands for Automatic Automated Teller Automated Teller
Telephone Machine Machine Server Auto Machanic Allow to Machine B Machine Server
1,124
IBAS stands for Internet Business Internet Banking Internet Banking Internet Business B Internet Banking
Application Server Application Server Application software Authenticatin server Application Server
1,125
PBF stands for Positive Balance Post Balance File Positive Balance Positive Balance C Positive Balance
1,126
File File Flex File
Internet banking refers to a banking Bank Internet Intranet Net banking B Internet
1,127
transactions routed through the
CPPD Stands for . Computer Planning Computerized Planning Both A &B Computer Planning D Computer Planning
and plant and Policy Department and Policy and Policy
department Department Department
1,128
The is generally a hardware and it plays the
role of preventing unauthorized Date base Server Web server Proxy Firewall D Firewall
access.
1,129
has several components which have been
designed to meet the demands of the CBS CSB NEFT None A CBS
banking industry.
1,130
enable data transmission over Switches Firewall Routers Middleware C Routers
1,131
different networks.
have many ports that are connected to Router Switches Firewall Middleware B Switches
different systems and it facilitates data transmission
with the network.
1,132
A Proxy server always acts in conjunction with a Firewall Internet Antivirus None A Firewall
1,133
.
The provides network security by preventing
malicious data from entering the ATM Server Proxy Server Date base Server Web server B Proxy Server
network.
1,134
is used for authentication. System audit system Domain Controller Network security C Domain Controller
1,135
administration
Access to a set of servers is controlled by the System audit system Librarian Domain D Domain Controller
1,136
. administration Controller
is a process of unauthorized entering Data base Hacking Routors Thrashing B Hacking
1,137
a network. administration
facility provides a customer to access Automatic tele Automated Teller Automated Technical Accelereated Teller Automated Teller
financial transactions in a public place. Machine Machine Machine machine B Machine
1,138
Which is the Function of ATM? Registering requests for
Cash Withdrawal Balance Inquiry Cheque book All the above D All the above
1,139
Core Banking Solutions is a combination of an Network devices Firewall IBAS IBDS A Network devices
1,140
application software and
The Operational Controls include controls on Physical Access Logical Access Environmental All of the above D All of the above
1,141
Controls
Application Controls are broadly classified into Input Controls Output Controls Processing Controls All of the above D All of the above
1,142
controls check that the data Input Controls Output Controls Processing Controls All of the above A Input Controls
1,143
entered is complete and correct.
Reasonableness check is a . Processing Input Controls Output Controls Management B Input Controls
1,144
Controls Control
Which of the following is not a module of the Customer ID Accounts Equity Share Clearing Module C Equity Share
1,145
CBS? generation management management management
Bank guarantees can be Performance Deferred Payment Both A & B None of the C Both A & B
1,146
Guarantee Guarantee above
SLR stands for Statutory Liquidified Statutory Liquidity Standard Liquidity Ratio Stable Liquidity Ratio Statutory Liquidity
Ratio Ratio B Ratio
1,147
are record of activities that have taken place None of the above
in the system irrespective of the Logs Index Activity Logs A Logs
modules.
1,148
The contents of a log includes Activity User details Date and Time All of the above D All of the above
1,149
performed
Communication and Operations management must Firewall security policy
include which policies? E-mail policy Internet policy All of the above D All of the above
1,150
is a large data housing infrastructure that
provides high band width access to its ATM Server Data Centre IT EDP B Data Centre
clients.
1,151
CRR stands for in terms Cash Reserve Ratio Community Reserve Cash Reimbursed
of CBS. Ratio Cash Reversal Ratio Ratio A Cash Reserve Ratio
1,152
DRP stands for Disaster Discovered Resources Disastrous Recovery Disaster Disaster Recovery
in terms of CBS. Recovery Planning Planning Planning Recording Planning A Planning
1,153
are soultions applied when any None of the above
kind of vulnerabilities discovered in networks in the CBS Patches Logs Access Rights A Patches
system.
1,154
can be viewed only by the DBA of Access Rights Database Log Operating System Activity Log B Database Log
1,155
an organisation. Logs Log
KYC stands for Know Your Customer Know Your Connection Know Your Customer
in terms Know Your Company Know Your Centre A
banking.
1,156
In CBS, the Accounts Management module deals with Creation of Savings Creation of Current
Account Account Overdraft All of the above D All of the above
1,157
Soft copy of the ATM journal rolls is Stock Journal Journal Report Electronic Journal All of the above C Electronic Journal
1,158
called
Data centre servers are known Application Data Base Servers Web server All the above D All the above
1,159
as . servers
The ATM switch consists of a computer server Both A & B None of the C Both A & B
1,160
above
testing should be done to
check the unauthorised access to the network in CBS. Penetration Hierarchical Top down Bottom up A Penetration
1,161
enables transfer of money from one bank to None of the above
another in "Real time" and on "Gross" EFT NEFT RTGS C RTGS
basis.
1,162
In system money transfers are done on a one NEFT, RTGS RTGS,NEFT EFT,RTGS None of the above B RTGS,NEFT
to one basis while in system transfer is done in
batches.
1,163
All the money transfers take place in the books Beneficiary bank Central bank(RBI) Remitting bank None of the B Central bank(RBI)
1,164
of the above
EFT and NEFT work on basis DNS HSM SSM All of the above A DNS
1,165
system of money transfer is primarily NEFT RTGS EFT All of the above B RTGS
1,166
used for large transactions.
In RTGS, the STP generates an for every
outbound RTGS transaction. UTN UTE UTR UTS C UTR
1,167
UTR full form Unique Transaction Unidentified Unique Transmission None of the above Unique Transaction
in terms of Reference Transaction Reference A Reference
CBS. Reference
1,168
STP stands for Straight Through Straight Temporary Strict Through None of the above Straight Through
in terms Processing Processing Processing A Processing
of CBS.
1,169
is a method of creating virtual VLAN LAN WAN MAN A VLAN
1,170
networks within a physical network.
CMS stands for Control Management Cash Management Core Management Centre Management Cash Management
in terms of CBS. System System System System B System
1,171
Which of the following statements is true? Audit of internal Systems audit are Audit of controls in any Systems audit are
controls is not important for the banking environment is important for the
needed at all verification of the performed using verification of the
internal controls software audit None of the above B internal controls
1,172
The Management Controls does not include Managing of Assets Formulating a security Developing a business Laying down A Managing of Assets
policy continuity planning procedures for
system
development
1,173
is supported by advanced technology Core Banking Solution Core Banking Solution
infrastructure and has high standards of business Firewall Internet banking Web centre C
functionality.
1,174
CBS Software resides in a Central application server Central Office Data Central Office Data
which is located in the ATM Data centre Middleware Web centre Centre. D Centre.
1,175
A that runs the core banking solutions (CBS) Central Application Domain Name Server Central Application
and is centrally accessed by the branches. ATM Server Server Database Server B Server
1,176
The of the application is capable of
only entering the data at the end point that is branches. System version Application Version Client version Firewall C Client version
1,177
The application server would be placed in a trusted Virtual Local Area Wide Area Network Personnal Area Virtual Local Area
inside zone in a separate Network Local Area Network Network A Network
1,178
Application software would access the Data base server ATM DATA Server Domain Name Application A Data base server
1,179
Server Server
are capable of being connected only when
devices are connected to a switch. LAN Virtual Networks MAN WAN B Virtual Networks
1,180
Data communication between VLANs can be
controlled as per business requirements. 1 2 3 4B 2
1,181
A special feature of STP is that number Unique Transation PIN NO Uniform Transaction None C Uniform Transaction
for any outbound RTGS transaction is generated by the Referrence Reference Reference
STP System.
1,182
refers to the process of developing
software which would produce the required output
from the input provided of course, using the necessary
Application
hardware and communication systems. Software Development Server Development System Development D System Development
Development
1,183
The is essential to ensure that Review Management RTGS Log management Authorized C Log management
computer security records are stored in sufficient detail Controller
for appropriate period of time.
1,184
Which of the following is “False“ in case of penetration is a legal attempt at The purpose of the test This is often the Ensure recoverability
testing in an IT environment of CBS? gaining access to is to identify security most preferred test of data in case of
protected computer vulnerabilities and then as it is an accurate system failure.
systems or networks. attempt to successfully simulation of how an
exploit them. outsider/hacker
would see the
Ensure recoverability of
network and attempt
data in case of system B
to break into it.
failure.
1,185
Which of the following is erroneous statement in case Unit test, system Well documented Implement new/ It is important that It is important that
of Change Management Control? test, integration test process should be changed programme as correct latest version correct latest version
– all should be there incorporating all per schedule. of programe is used of programe is used
carried out. the changes. but version number but version number
need not be need not be changed.
D
changed.
1,186
With respect to the customer changing the Pin at the Old offset value used Old Pin verified using Natural Pin remains the Old offset value Old offset value used
ATM which procedure is the ”false“ procedure? to derive new PIN. HSM/SSM. same. erased and new to derive new PIN.
offset value
A
generated.
1,187
IN CBS, changes to the application server are not made None of the above
directly to it, instead done first on a Trail server Validate server Test Server C Test Server
1,188
All the various servers in the central data centre LANs VLANs WANs MANs B VLANs
1,189
are seggregated through
The is a complete process in the computer Consalidation Password Policy protection Validation D Validation
so that it ensures that data that is fed in conforms to
certain prerequisite conditions.
1,190
When the central Data base is busy with central end of
day activities or for any other reason, the file containing
the account balance of the customer is sent to the ATM
Centralised Data base Central Office Data
switch. Such a file is called Positive Balance File Application Server A Positive Balance File
security Centre.
1,191
Bank mate is developed by the Infosys HCL Technologies TCS I-Flex B HCL Technologies
1,192
The IBDS is located in a Militarised zone City Zone State zone demilitarised D demilitarised zone
1,193
zone
The main components of Internet Banking Web server IBAS IBDS All the above D All the above
1,194
system consist of
Copy of the Anti Virus Software was updated promptly None of the Above
and regularly at the Data Centre and pushed into all of
the servers and in all the systems in the branches by
Hacking Method Push-pull method Both A &B B Push-pull method
1,195
The which is also residing in the Application Software Application Server Application Software
server at the branch actually does the banking Sytem software utility software C
operations.
1,196
In Core Banking concept all the systems of the bank are
connected to the Central office by means of a
connectivity which may be either a
local line Leased line Broadband None B Leased line
or a dial up line.
1,197
The is generated by the software and directly Personal Identification Net transaction ID NO Personal Identification
sent to equipment for printed the Pin 16 digit number Number ATM No B Number
Mailer.
1,198
would also include the existence of built
in controls in the system to ensure proper processing of
input data so as to provide the required output.
Output Control Input control Process Control Data Control C Process Control
1,199
Update Query can be used to update Single Record More than 1 record Both A and B None of the C Both A and B
1,200
in MS Access 2010. above
Delete Query can be used to delete Single Record More than 1 record Both A and B None of the C Both A and B
1,201
above
How many Primary key constraints can create in Only one Two As many All of the Above A Only one
1,202
a table .
MS Access 2010 provides queries that can be used for Sum() Count() Avg() All of the above D All of the above
obtaining the aggregated results instead of individual
records are .
1,203
A function that Counts the set of values that satisfy the
given criteria in MS Access 2010 CountA() Count() Countif() All of the above B Count()
is .
1,204
The operator is used to find the null "= NULL" NULL IS NULL All of the Above C IS NULL
1,205
records in a table.
Aggreagate Query also known as . Group By queries Total query Action query Both A and B D Both A and B
1,206
Which Query wizard is used to find repeated Simple Query Duplicate Query Cross table Query All of the Above B Duplicate Query
1,207
records in a table? Wizard Wizard Wizard Wizard
Append Query is used to in a Add Records Delete Records View Records Update Records A Add Records
1,208
table in MS Access.
Which type of joins not available in Access Inner join Left outer join Right outer join Full join D Full join
1,209
2010?
A join returns only those rows from both tables
that match on the joining field is in MS Inner join Left outer join Right outer join Full join A Inner join
Access 2010.
1,210
The query returns all of the rows from left table, and None of the above
also those rows from the right table Right outer join Left outer join Inner join B Left outer join
that is known as .
1,211
The query using returns all the rows from Right outer join Left outer join Inner join None of the above A Right outer join
right table, and also those rows from the left table that
share a common value on
both sides of join.
1,212
How can we add a table to the Query Design Select Create-> Add Select Database Tools-> Select Design -> Show Select the table from Select Design -> Show
window ? Table Add Table Table navigation C Table
Pane.
1,213
can be considered a questions in a Queries Form Reprt Macro A Queries
1,214
data base.
Operands can be in MS Access 2010. Literals Identifiers Function All D All
1,215
Which of the following is not the characteristics of a Each Table row Each row/column The order of the rows Each column has a Each column has a
Relational Table? represents a two- intersection represents and columns is specific range of specific range of
dimensional a single data value immaterial to the values known as the values known as the
structure composed DBMS Tuple domain Tuple domain
of rows and columns D
1,236
Which record will be retrieved if the query criteria is < All values less or Value less than 95 Records with date Records with date
#1/1/11#? more than 1,195 characters before 2011 All of above C before 2011
1,237
MS Acces 2010 reads and writes to the .accdb file None of the above
format in chunks also known Pages Encrypt pages Base Database A Pages
as .
1,238
The tab in Expression Builder in which we write Expression Elements Expression Builder
expressions is known as . Operator Button Expression Box window C Expression Box
1,239
The criteria expression LIKE?B*. Will match all text Will match all text Will match all text Will match all text A Will match all text
starting from B ending from B having second starting with a digit starting from B
character as B
1,240
queries are useful for summarizing Select query Crosstab query Action query Parameter query B Crosstab query
information, and are somewhat similar to pivot tables in
MS-Excel.
1,241
While entering record in Datasheet view, in Alphabetical At the end of the Any where in the Beginning of the B At the end of the
1,242
which order the records can be entered Order table table table table
When you delete the record in form, it deletes Form only Form but not in table Table but not in Form & Table D Form & Table
1,243
the record from . Form
The controls that are not linked to any field of the table Unbounded Controls
or query on the form are known as ActiveX control Unbounded Controls Graphics Control Bound Controls B
.
1,244
Which property of the form can be used to insert a
background image in MS Access 2010? Caption Background Record Source Picture D Picture
1,245
is a report that is inserted in Inner-Report Sub-Report Inside-Report Insert-Report C Inside-Report
1,246
another report in MS Access 2010.
A bound main report is based on a Table or query,Inner- Table or query,Main- Table or query,Sub- None of the above Table or query,Sub-
and its contain Report Report Report C Report
realted information.
1,247
DDL stands for Data Definition Data Defined Language Detailed Definition Data Detailed Data Definition
Language Language Language A Language
1,248
A used to compare multiple values of
categories or differences over a period of Pie Chart Area Chart Bar Chart Column Chart D Column Chart
time.
1,249
A used to compare trends over a Pie Chart Line Chart Bar Chart Column Chart B Line Chart
1,250
period of time.
To create a read-only copy of the database, which of the
following file format can be used? .ACCDB .ACCDE .MDW .ACCDT B .ACCDE
1,251
The database administrator created a split database and Front-end database
created a front-end database and back-end database
file.Which of the file should be stored on the server ?
Back-end database Both of them None of them B Back-end database
1,252
To make database package and digitally sign using which File- File->New->Save File->Save as->Save File- File->Save&Publish-
option in Access 2010 ? >Save&Publish- Database as- Database as- >Save&Publish- >Save Database as-
>Save Database as- >Package and sign >Package and sign >Save Object as- >Package and sign
>Package and sign >Package and sign A
1,253
In which formats can the Collect Data through HTML and InfoPath Visual Basic Application
email message feature can send the data entry form? Access Forms Excel attachment A HTML and InfoPath
1,254
Once a mail is sent using the collect data through email Export to Outlook Options in Tool menu Manage replies All of the above C Manage replies
message feature in Access 2010. of Access
The mail status can be checked
using .
1,255
The type of data cannot be
collected using Collect data through email messages. Text Number Date/time AutoNumber D AutoNumber
1,256
What is the memo data type field used for? To add table To store objects For long text entries For shout text entries C For long text entries
created in other of no more than 255
programs characters
1,257
The filter By selection feature allows you to filter: Those records that Records based on a Records that meet any All of above A Those records that
match an entity in a criterion you specify of several criteria you match an entity in a
field specify field
1,258
DML stands for Detailed Maintaining Data Maintaining Data Manipulation Detailed Data Manipulation
Language Language Language Manipulation C Language
Language
1,259
Which editor was provided for use with Access The Visual Basic Notepad The QuickBasic All of above B Notepad
1,260
Basic? 1.0 editor editor
How do you update Pivot Table report data after Save your changes, Select the Pivot Table Click the report, and on Click the report, and
changes are made to the source data? close the workbook, worksheet and press F9 the Pivot Table toolbar, on the Pivot Table
and then reopen on the keyboard click the refresh data toolbar, click the
All of the above C
it. button refresh data
button
1,261
What are the different views to display a Table Datasheet View Design View Pivote Table & All Of Above D All Of Above
1,262
? Pivot Chart View
Which Of The Following Creates A Drop Down Ole Object Hyperlink Memo Lookup Wizard D Lookup Wizard
1,263
List Of Values To Choose From?
A Enables You To View Data From A Table
Based On A Specific Criterion Form Query Macro Report B Query
1,264
The Database Language That Allows You To DCL DML DDL None Of Above A DCL
1,265
Access Or Maintain Data In A Database
DCL Provides Commands To Perform Actions Like Change The Insert, Update Or Authorizing Access And None Of Above C Authorizing Access
Structure Of Tables Delete Records And Other Control Over And Other Control
Data Values Database Over Database
1,266
Which is not a Database Model ? Network Database Relational Database Object Oriented Structureed Structureed Database
Model Model Database Model Database Model D Model
1,267
1,268 Which Of The Field Has Width 8 Bytes? Memo Number Date/time Hyperlink C Date/time
This Is The Stage In Database Design Where One Data Definition Data Refinement Establishing None Of The Above A Data Definition
Gathers And List All The Necessary Fields For The Relationship
Database Project.
1,269
Whenever a tables gets update, the dependent Not update update automatically have to update never update B update
1,270
query will manually automatically
The Third Stage In Designing A Database Is When We Relationship Join Query None Of These A Relationship
Analyze Our Tables More Closely And Create A
Between Tables
1,271
What is the purpose of the Switchboard Manager in To build a main Creates the macros To allow the user to To allow changing To build a main
Microsoft Access 2010? switchboard form used to program an switch from one from one report to switchboard form that
that controls all automatic application. database file to another. controls all other
A
other another. forms.
forms.
1,272
How does a query-based report differ in design to a The reports are It doesn’t It doesn't have as many The only report type B It doesn’t
report based on just one table? restricted in size. design options. available is the
Design
Report.
1,273
How would you include some plain text into a mailing Type the text directly Use the Mailing label Use the >> button. Use the Mailing label
label report? into the Use the > button. wizard text C wizard text
label. option. option.
1,274
In a Microsoft Access 2010 report, the page numbering
would most likely be placed into Report Footer Section Header Page Footer Page Header C Page Footer
the:
1,275
If you wished to present a professionally looking form All The tools of the Form Wizard All The tools of the
on screen that would show all the necessary form design control Columnar form design control
information, which of the following form design tools gallery. gallery.
Pivot Table Pivot Chart C
would you most likely use?
1,276
What are the benefits of an ACCDE Optimizes memory Protects the VBA code
file in Access usage and improves from being viewed or
performance. edited while still
Reduces the size of
allowing it to run. All of the above D All of the above
the database
1,277
An .ACCDE file is a version of the Fixed-down Locked-down Open-down None of the B Locked-down
1,278
original .ACCDB file. above
Which type of the query is used to accept the value Make Table Query
from the user while executing the query Update Query Delete Query Parameter Query D Parameter Query
and fetch records accordingly
1,279
To encrypt the databse in Access 2010 must be opened Open Secure mode Open Exclusive mode Open Exclusive mode
in the . Open Inclusive mode Open Read Mode C
1,280
To extract the records based on date field, $ # () "" B #
1,281
which of the symbol should be used
FIX() is a kind of function in MS-Access Math Date Text None of the A Math
1,282
2010. above
MS-Access 2010 has added new features of None of the above
to eliminate the need of VBA code Macro Form Report A Macro
1,283
Encrypting a database does not restrict access to
database objects, but to the Open Modify Read Write A Open
database.
1,284
The setting for the Security option can be handled File Tab ->New File Tab ->Access File Tab ->Security File Tab ->Access
using in Access 2010. Options, and Options, and selecting Options, and selecting Options, and selecting
selecting the Trust the Trust Centre tab the Trust Centre tab the Trust Centre tab
Centre tab from the from the Access Option from the Access Option from the Access
Access Option window window None of the above B Option window
window
1,285
To create a split database in MS Access 2010 go Create Tab External Tab File tab Database Tools D Database Tools
1,286
to which tab?
After spliting database,frontend database Forms Query Report All of the above D All of the above
1,287
holds .
After spliting database,backend database Tables Forms Query Report A Tables
1,288
holds .
When an Access database is split, it creates two A back-end database A new database & Old primary database & None of the above A A back-end database
files . & front- end database. secondary database & front- end database
database
1,289
A Data Access Page is a special type of None of the above
that allows users to interface with database XML page HTML Page Web page C Web page
using Internet Explorer.
1,290
An is a group of people with a common Company Enterprise Organization Concern B Enterprise
goal, having certain resources at its disposal to achieve
the common goal.
1,291
can be defined as subject- oriented, Data Models Data Warehouses Data Mines Operational Data B Data Warehouses
integrated, time-variant, non-volatile collections of data
used to support analytical
decision making.
1,292
databases contain detailed data Operational Non-Operational Subject-Oriented Informational A Operational
that is needed to satisfy processing requirements but
which has no relevance to
management or analysis.
1,293
Data in the Data Warehouse is Dynamic, Static Non-Volatile, Static Volatile, Static Static, Dynamic D Static, Dynamic
1,294
, not .
data contains an historical perspective Operational, Informational, Static Informational, Informational,
that is not generally used by the Informational Operational, Static Operational D Operational
systems.
1,295
The definition of data elements in the data warehouse Masterdata Detaileddata Metadata Basedata C Metadata
and in the data sources and the transformation rules
that relate them, are
referred to as .
1,296
Data warehouses are not the optimal Structured Unstructured Informational Operational B Unstructured
1,297
environment for data.
Data Warehousing can be used for Credit Card Insurance Fraud Logistics All of the above D All of the above
1,298
. Churn Analysis Analysis Management
is the process of Data Analysis Data Warehousing Data Mining Data Modeling C Data Mining
1,299
extracting patterns from data.
is an approach to quickly Business Processing Online Analytical Product Life Cycle Supply Chain Online Analytical
answer multi-dimensional analytical Management Processing Management Management B Processing
queries.
1,300
include money, manpower,
materials, machines, technologies etc. Costing Production Sales Resources D Resources
1,301
The Output of an OLAP query is typically Matrix Columnar Stepped Outline A Matrix
1,302
displayed in a format.
companies is planning to support tens
of millions of customers with just B2B B2C C2B C2C B B2C
hundreds of employees.
1,303
Which of the following is the limitation of Open Source Increased Unsuitable for
ERP? Complexities Legal Complexities conventional All of the above D All of the above
applications
1,304
Which of the following is not an Open ERP Openbravo SQL-Ledger Open-Project ERP5ERP C Open-Project
1,305
software?
is the process of integrating all the business EDI ERP BPM None of the above B ERP
functions and processes in an organization to achieve
numerous benefits.
1,306
must consider the fundamental issues of Manager Auditor Top Management Either A or B or C A Manager
system integration by analyzing the organization's vision Commitment
and corporate objectives.
1,307
The more the number of , the modules process package units D units
1,308
longer the implementation time.
The user can the company data into multiple
companies as per financial periods Import Export Split Backup C Split
required.
1,309
is a collection of activities that make one Business Model Business Function Business Process Business Operation C Business Process
or more kinds of input and creates an output that is of
value to the customer.
1,310
E-Filing of Returns refers to the process of electronically
filing your tax returns through the Intranet Internet Extranet Any of the above B Internet
.
1,311
Tally.ERP 9 offers a data encryption option Tally Data Tally Data Encoding Tally Vault Tally Data C Tally Vault
1,312
called . Encryption Conversion
is the process of exchanging
Tally.ERP 9 data between two or Serialization Randomization Synchronization Asynchronization C Synchronization
more locations.
1,313
The Tally website offers , by which a Tally Forum Tally FAQ Tally Support Tally Chat D Tally Chat
user can communicate with a Tally representative and
get required information.
1,314
Tally.NET use for centralised Data Centre Control Centre Cloud Centre Administration B Control Centre
1,315
Account Management. Centre
The data is transferred between the remote location Encoding Decoding Encryption Decryption C Encryption
and the server using a secured mechanism called
.
1,316
Sales Tax Ledger falls under which Group? Indirect Expenses Duties and Taxes Sales Purchases B Duties and Taxes
1,317
Alias represents in Tally.ERP9. Short name Nickname Code name All of these D All of these
1,318
If we purchase any Fixed asset in credit, we can Payment mode Receipt mode Journal mode Contra mode C Journal mode
1,319
pass it from .
Information systems can be designed so that accurate Integrated Isolated Information Non-Integrated Non-Isolated Integrated
and timely data are shared between functional areas. Information Systems Systems Information Systems Information Systems Information Systems
These systems are called
A
.
1,320
To save entry without any amount, we have to Cost Center Maintain Multiple Allow 0 value entry Use Rej Notes C Allow 0 value entry
1,321
use . godown
Transfer of materials from one godown to Manufacturing Stock Journal Purchase Journal Both A & B B Stock Journal
1,322
another godown, use . Journal
While exporting Ledgers from Tally to Web XML Format ASCII Format SDF Format HTML Format D HTML Format
1,323
Page, we use .
Budget represents . Estimation Forecasting Assumption All of these D All of these
1,324
In Service tax Credit Adjustment (%) should be 0.2 1 Both A & B Neither A &B C Both A & B
1,325
either .
Service Tax Report can be seen from Display > Day Book Display > Account Display > Statutory Display > Statutory Display > Statutory
. Books Masters Reports D Reports
1,326
Transfer from Main Cash to Petty Cash we Payment Contra Receipt None of these B Contra
1,327
require to pass voucher.
Income Tax number of the Company will appear Cash/Bank Book Profit and Loss A/c Reminder Letter None of these D None of these
1,328
in which report?
A business model is not a model. system mathematical Conceptual Logical B mathematical
1,329
The approach to ERP is to first develop a Business Model Business Function Business Process Business Operation A Business Model
comprising the business processes or
activities that are the essence of a
business.
1,330
Which of the following is/are the data warehousing Identifying and Defining the correct Establishing a data
activity? prioritizing subject level of summarization warehouse help desk
areas to be included to support business and training users to
in the Data decision making effectively utilize the
Warehouse desktop tools All of the above D All of the above
1,331
is the succession of strategies Business Processing Online Analytical Product Life Cycle Supply Chain Product Life Cycle
used by management as a product Management Processing Management Management C Management
goes through its life cycle.
1,332
Which of the following will not appear in the Powerpoint Word Paste Document My Templates C Paste Document
1,333
home page of K-Doc?
To change an email header so that the message appears Email middle attack. Email Spoofing. Email hacking. Email tracking B Email Spoofing.
to have originated from someone or somewhere other
than the actual source is
known as .
1,334
To playfully satirize a website is known Web tapping Web Interception Web spoofing Web threating C Web spoofing
1,335
as .
is the complete package to manage the Billing and Accounting Billing and Accounting
billing requirements of a CA firm on cash Payroll eSecretary software K-DOC application C software
system of accounting.
1,336
Which of the following is not a/an feature of Contact Greeting Management Share certificate Share certificate
eSecretary? Management Email Management printing D printing
1,337
Annual return preparation can be done using ICAI-ROC K-DOC application ICAI XBRL Software Payroll A ICAI-ROC
1,338
. application application
is correspondence automation & K-DOC ICAI-ROC
management software that is seamlessly application eSecretary ICAI XBRL Software application B eSecretary
integrated with Microsoft Office.
1,339
is an independent,objective assurance and Statutory audit Tax audit Internal auditiing None of the Above C Internal auditiing
consulting activity designed to add value and improve
an organization's
operations.
1,340
Which of the following is/are the main purpose Financial Operations of the Both A and B Either A or B C Both A and B
1,341
of the internal audit? reporting organization
As per of the Income tax Act,every
person carrying on business or profession is requires to
get his accounts audited by a CA before the "specified
Section 45 Section 44AD Section 43B Section 44AB D Section 44AB
date".
1,342
refers to use
software/applications to automatically perform tasks
such as accounting,preparing trial balance, financial
statements etc. and electronically transmit data or
information using internet.. ERP Office automation Either A or B None of the Above B Office automation
1,343
FEMA Stands for . Foreign Exports Financial Enterprise Foreign Exchange None of the Above C Foreign Exchange
Management Act Management Act Managament Act Managament Act
1,344
Which application helps the management to allocate Resource allocation Knowledge Document Client management D Client management
the revenue to the credit of the right employee who and scheduling management Management Systems
identified the opportunity?
1,345
Who has full privileges in the financial Database Account System User C System
1,346
accounting application? administrator administrator administrator Administrator administrator
is the centre point of the financial
accounting application as any transactions having
financial impact carried out in any other module will
AP module GL module AR module FA module B GL module
reflect in this module.
1,347
Which of the functionalities is not provided in the Evaluation of Receipts of goods or Invite and analyze Comparison with D Comparison with
purchasing module of Financial Accounting Application. Vendors service quotations from budgets budgets
vendors
1,348
In Financial Accounting Application,automatic sequence Purchasing Accounts Payable Expense Management Fixed assets C Expense Management
number of documents control is not required in which
of the following module?
1,349
Which module of Financial Accounting Application can Accounts Receivable
be used for assigning credit Purchasing Sales Accounts Payable B Sales
limit to customers?
1,350
Which of these will trigger/alert for timely Accounts Accounts Receivable Expense Bank C Expense
1,351
payment ? Payable Management Reconcilations Management
We can manage interviews,offers and job vacancies by Resource allocation HR and Payroll Knowledge None of the Above HR and Payroll
using which of the application? and applications management B applications
scheduling
1,352
, , are Confidentiality,In Confidentiality,Integr Confidentiality,Inte Confidentiality,Int Confidentiality,Inte
commonly referred to as CIA in information security tegrity and ity and Authentication grity and Access rights egration and A grity and Availability
parlance. Availability Authentication
1,353
provides information about updation of Performance HR management Timesheet Timesheet application
project cost based on time spent by management system Payroll application D
employees on various projects. system
1,354
Which of the follwing is not a/an functionality provided Capture the Key Employee designation Automated alerts for Prepare summary or Employee designation
by PMS? Performance and reporting structure pending appraisals bell curve analysis of and reporting
Indicators all employees structure
B
1,355
automates the calculation of salary for Timesheet System HR management Knowledge
taking inputs from the timesheet application, leaves System management System
from Leave Management System and salary details from
Payroll System C Payroll System
the HR master
data.
1,356
Which of the follwing is not a control in Leave Reduce Error free capture of Approval workflow Error free capture of
Management System? administrative Excess leave leave details C leave details
burden on HR
1,357
Permanent Audit File are obtained once but half-yearly yearly monthy quarterly B yearly
1,358
updated on basis.
In Permanent Audit file, is not the key data Organization chart Client’s accounting Copies of clients’ Copies of important Copies of clients’
documented. manual incorporation contracts or long incorporation
documents like MoC term lease documents like MoC
C
agreements
1,359
The Document Management Sytem offers the Role based access Complete audit trail Cost effective to All the Above D All the Above
features . maintain the
documents in soft
copy
1,360
is a type of training in which user logon on the
training server with a user ID and Internal Training E-Learning Classroom Training E-Training B E-Learning
password.
1,361
In some cases, trainee is supposed to appear for the Classroom Training
examination/test at the end of the training E-Learning Virtual Learning All the Above B E-Learning
is .
1,362
are the hardware/infrastructure PC Application Server WAN All the Above D All the Above
1,363
equipments used in a CA firm.
means information available in the Confidentiality Integrity Availability Authentication B Integrity
organization should not be altered or modified by
unauthorized personnel.
1,364
Which of these is/are the standard email Microsoft Lotus Notes Both A and B None of the C Both A and B
1,365
program used in an organization? Exchange Above
Which of the following is not a characteristics of WAN? Most WANs are Compared to LAN, its WAN uses only private Switches are used to B Compared to LAN, its
owned by only one transmission speed is networks. connect LAN and transmission speed is
organization. low WAN low
1,366
is protection of information assets from Information Security None of the above Information Security
threats to preserve their value. Confidentiality Integrity C
1,367
Which types of information assets need to be Client data Own data Own documents All the above D All the above
1,368
secured in a CA Office?
The extent and level of would Availability Confidentiality Integrity Authentication B Confidentiality
1,369
depend on the nature of information.
of information might be affected due to
denial of service attack or some other Integrity Authentication Confidentiality Availability D Availability
reasons.
1,370
means the sender cannot deny
having sent a message and receiver cannot deny Non-Repudiation Integrity Authentication Confidentiality A Non-Repudiation
receiving the message.
1,371
1,372 Risk may not be in nature. reputational financial operational vulnerable D vulnerable
The process of identifying an individual, usually based
on user id and password in an Availability Authentication Confidentiality Integrity B Authentication
organization is called .
1,373
Which of the following is not a software equipment Resource None of the Above
required in a CA's office? allocation and Client management HR and Payroll D None of the Above
scheduling
1,374
Which of the following is not an application ICAI-XBRL suite K-DOC Billing and ICAI-TOC D ICAI-TOC
1,375
arranged by ICAI? Accounting
How many stages are there in the sales cycle? 2 3 4 5B 3
1,376
PBX stands for Private Exchange Public Exchange Branch Private Branch Public Branch Private Branch
Branch exchange exchange C exchange
1,377
XML stands for Expansion Markup Expansion Makeup Extensible Markup EXtensible Makeup Extensible Markup
Language Language Language Language C Language
1,378
VBA stands for . Visual Basic for Visual Basic for Visual Basic for None of the A Visual Basic for
1,379
Applications Applets Apple above Applications
Find the correct sequence in case of XML file, are Structure, store, and Store, structure, and Structure and store Store and transport A Structure, store, and
transport transport information. information. information. transport information.
information.
1,380
Programming of Macros is done in VBA ASP.Net Java C++ A VBA
1,381
programming Language .
As Bank auditors,Many Banking applications generate
text files in . Txt format Csv format Both A and B Nither A Nor B C Both A and B
1,382
Macro security is enabling through . Developer Developer Developer Developer
Not Required tab>Code>Macro tab>Modify>Macro tab>Controls>Ma cro B tab>Code>Macro
Security Security Security Security
1,383
In Excel, Sampling option is available in Insert Data Analysis View None B Data Analysis
1,384
.
Requirements for preparation of cash budget in Excel. Knowledge of Knowledge of Knowledge of cell Knowledge of all of Knowledge of all of
accounting formatting an excel linking & basic the above. D the above.
sheet formulae
1,385
ROE stands for . Recall on Equity Return on Equity Return on Enquary Return of B Return on Equity
1,386
Equalisation
is a statistical procedure that uses sample
evidence and probability theory to determine whether a
statement about the value of a population parameter
should be rejected or should not be rejected. Confidence Interval Hypothesis ANOVA None of the above B Hypothesis
1,387
is a statistical tool used to create Regression Regression Multiple Single Regression C Multiple
1,388
predictive models. equation Regression Regression
shows the ability of a company to pay its
current financial obligations. Quick Ratio Current Ratio Liquidity Ratio Solvency Ratio C Liquidity Ratio
1,389
Macro enabled workbook file extension is .xlsx .xlsm .xlsv .xlsw B .xlsm
1,390
shows dependency of a firm on Quick Ratio Leverage Ratio Liquidity Ratio Solvency Ratio B Leverage Ratio
1,391
outside long term finance.
To record a Macro in relative mode,"Üse Realtive
References" available in which tab of Developer Tab View Tab Both A and B Nither A Nor B C Both A and B
excel ?
1,392
There are ways to open a Macro 3 2 4 1A 3
1,393
enabled workbook.
ANOVA stands for Analysis of Value Analysis of Varity Analog of Variance Analysis of D Analysis of
1,394
Variance Variance
A function doesn’t require an argument DATE() TODAY() MONTH() YEAR() B TODAY()
1,395
is .
In Excel, there are functions for 4 5 6 3B 5
1,396
calculation of depreciation.
SLN function used to calculate depreciation as For calculation of For calculation of For calculation of For calculation of For calculation of
per . depreciation as per depreciation as per depreciation as per depreciation as per depreciation as per
Sum of Years Digit Straight Line Method. Variable Declining Double Declining Straight Line Method.
Method. Balance Method. Balance Method. B
1,397
SYD function used to calculate depreciation as For calculation of For calculation of For calculation of For calculation of For calculation of
per . depreciation as per depreciation as per depreciation as per depreciation as per depreciation as per
Sum of Years Digit Straight Line Method. Variable Declining Double Declining Sum of Years Digit
Method. Balance Method. Balance Method. A Method.
1,398
DB function used to calculate depreciation as For calculation of For calculation of For calculation of For calculation of For calculation of
per . depreciation as per depreciation as per depreciation as per depreciation as per depreciation as per
Sum of Years’ Digit Straight Line Method. Declining Balance Double Declining Declining Balance
Method. Method. Balance Method. C Method.
1,399
DDB function used to calculate depreciation as For calculation of For calculation of For calculation of For calculation of For calculation of
per . depreciation as per depreciation as per depreciation as per depreciation as per depreciation as per
Sum of Years’ Digit Straight Line Method. Declining Balance Double Declining Double Declining
Method. Method. Balance Method D Balance Method
1,400
1,401 XML is a Recommendation. W3C W1C W2C W4C A W3C
VDB function used to calculate depreciation as For calculation of For calculation of For calculation of For calculation of For calculation of
per . depreciation as per depreciation as per depreciation as per depreciation as per depreciation as per
Variable Declining Straight Line Method. Declining Balance Double Declining Variable Declining
Balance Method. Method. Balance Method. Balance Method.
A
1,402
PV Ratio stands for . Point Volume Point Varaiance Profit Volume Profit Variance C Profit Volume
1,403
Ratio Ratio Ratio Ratio Ratio
BEP stands for Break Easy Point Break Even Point Balance Equal Break Equal Point B Break Even Point
1,404
Point
1,405 Data Validation available in which Tab? Formulas Insert Data Developer C Data
function returns value from a given data
range based on row and column. VLOOKUP() HLOOKUP() INDEX() LOOKUP() C INDEX()
1,406
Which function categories are not available in Statistical Engineering Math & Trig Arts D Arts
1,407
Excel.
PMT Function is belongs to which categories of Text Logical Financial Math & Trig C Financial
1,408
Excel function ?
NPV stands Net Present Net Proper Value Net Present Negative Present A Net Present Value
1,409
for Value Variance Value
function uses a fixed rate to calculate DB VDB SYD SLN A DB
1,410
depreciation
Which of them is not a Conditional Operators < </ <= <> B </
1,411
symbols?
XML is a language that is very similar to which C HTML C++ JAVA B HTML
1,412
language ?
In Excel the function =Abs(-4) returns -4 2^2 4 None C 4
1,413
.
function returns the remainder after a DIVISOR() MOD() MODE() REMAINDER() B MOD()
1,414
number is divided by a divisor.
If User want to display the formulas rather than the Formulas > Formula Formulas > Formula Formulas > Function > Formulas > Formula Formulas > Formula
results of the formulas then > Show Formulas. Auditing > Show Show Formulas. Auditing Auditing > Show
choose . Formulas. > Function > Show Formulas.
B
Formulas.
1,415
reveal about the current and future Financial statements Financial statements
financial condition of the company. Report Data None C
1,416
Which of them is a Intangible assets? Goodwill and Cash and Property. investment and None of the A Goodwill and
1,417
Patents. securities. above Patents.
1,418 CR stands for . Current Ratio Clear Ratio Current Rate Clear Rate A Current Ratio
1,419 QR stands for . Quick Rate Quality Ratio Quality Rate Quick Ratio D Quick Ratio
DTD stands for , which is called Direct to Direct Document Type Data Type Data to Data B Document Type
1,420
XML Schema. Definition Definition Definition
ACP stands for . Average collection Average collection Average collection None of the above Average collection
price payment period C period
1,421
FATR stands for . Fixed all turnover Fixed assets test Fair assets Fixed assets D Fixed assets
1,422
ratio ratio turnover ratio turnover ratio turnover ratio
1,423 A can be a numerical fact. Statistic Sale Salary Number A Statistic
stands for reduction in value of Depreciation Data Document Detail A Depreciation
1,424
fixed assets.
Value of fixed assets is generally reduced over the Change in taste of Change in technology
period of time due to . Wear & Tear people All of the Above D All of the Above
1,425
Profit equals to . Purchase - Total Sales - Total Cost Product - Total Manufacturing - B Sales - Total Cost
1,426
Cost Cost Total Cost
Examples of fixed cost are . Salary of
administrative office rent Both A and B None C Both A and B
staff
1,427
1,428 PAN must have characters only. 8 10 11 12 B 10
The extension of a XML document is (.xsd) (.xml) (.mlx) (.xlm) B (.xml)
1,429
.
analysis relates items in the financial Financial ratio Price Perodic Report A Financial ratio
statements in a manner that drives out performance
information about the company.
1,430
How to restrict to run a macro automatically when Hold down the Hold down the CTRL Hold down the ESC key Hold down the Hold down the
starting Microsoft Excel? SHIFT key during key during start up. during start up. ALT key during start A SHIFT key during start
start up. up. up.
1,431
Which option allows you to Bold all the negative values Conditional Formatting Negative Formatting Conditional
within the selected cell range? Zero Formatting Bold Formatting B Formatting
1,432
allow us to perform calculations or Cell referencing Absolute functions Worksheet functions Round( ) functions C Worksheet functions
operations that would otherwise be too cumbersome or functions
impossible altogether.
1,433
Statistical functions in Excel help to calculate Arithmetic Mean Median Mode All of the above. D All of the above.
1,434
1,440
is one of the core principals of finance
and is the primary factor used in pricing a stream of
cash flows, such as those found in a traditional bond or
Marginal costing Discounting PMT None B Discounting
annuity.
1,441
XML schemas in Excel are called XML Schemas Maps Elements Markups C Elements
1,442
.
Excel allows us to use various functions and Financial analysis Equity analysis Leasing decisions and All of Above D All of Above
even simple mathematical calculations which can be the list goes on
used for .
1,443
Which cell reference show the reference to other sheet
or reference to other workbook in Sheet2!C4 Sheet2{C4} Sheet2(C4) Sheet2<C4> A Sheet2!C4
excel ?
1,444
1,445 Which of them is not a Range References? A1:A4 $A$1:A4 A1, A2 , A3, A4 A$1:A$4 C A1, A2 , A3, A4
Interest Coverage Ratio equals to . EBIT / Debt EIBT / Debt interest ETIB / Debt interest EBTI / Debt A EBIT / Debt
1,446
interest interest interest
If particular workbook have to open each time Excel
started, where the workbook should be AUTOEXEC folder AUTOSTART folder EXCELSTART folder XLSTART folder D XLSTART folder
placed?
1,447
If the cell B1 contains the formula=$A$1, which of the There is a relative There is an absolute Further changes in Further changes in B There is an absolute
statement is true ? reference to cell reference to cell A1. value of A1 will not value of B1 will not reference to cell A1.
A1 affect B1. affect A1.
1,448
is a computerized mathematical technique Finanical Planning Monte Carlo Simulation Corporate Planning Personal Finance B Monte Carlo
that allows people to account for risk in quantitative Planning Simulation
analysis and decision making.
1,449
The exact syntax of PMT function is . PMT(nper, rate, pv, PMT(rate, nper, pv, [fv], PMT(rate, pv, nper, [fv], PMT(pv, rate, nper, PMT(rate, nper, pv,
[fv], [type]) [type]) [type]) [fv], [type]) B [fv], [type])
1,450
The exact syntax of IPMT function IPMT(rate, nper, pv, IPMT(pv, rate, per, IPMT(per, rate, IPMT(rate, per, IPMT(rate, per,
is . [fv], [type]) nper, [fv], [type]) nper, pv, [fv], [type]) nper, pv, [fv], [type]) D nper, pv, [fv], [type])
1,451
To see the XML Map user must go Developer>XML> Developer> Source File Menu>Options>Ad None of the above. A Developer>XML>
. Source d in>Excel Add Source
In>XML
1,452
EMI stands for . Easy Monthly Equating Monthly Equal Monthly Equated monthly Equated monthly
Installment Income Installement installment D installment
1,453
Which function is used to calculate the principal IPMT PPMT PMT None of the B PPMT
1,454
portion in every installment ? above
It is a process in which a business determines whether Business Investment Capital Budgeting Capital Investment Investment B Capital Budgeting
projects such as building a new plant or investing in a management
long-term venture are worth
pursuing.
1,455
What is the file extension of Schema file which (.xml) (.xsd) (.xlm) (.mlx) B (.xsd)
1,456
contain schema tags ?
NPER stands Total Principal Net Per value Total Interest Number of D Number of Periods
1,457
for Value Value Periods