Sei sulla pagina 1di 116

QUESTION

Collection of instruction is called a


_____

procedure

batch

Combination of alphabetic and


numeric data is called _____ data

alpha numeric

alpha beta

Computers can be classified based


on ______,______and _______

space occupied, price, cost, performance


no. of users allowed
their ratio

_____________ is the Worlds largest


computer network .

Ethernet

Internet

_________ are used in large


organizations for large scale jobs

mini computers

microprocessors

_______ devices are responsible for


feeding data into the computer

input

output

_______ is the capability of the o/s to


run numerous applications
simultaneously
multiprocessing

multithreading

_______ involves conversion of raw


data into some meaningful
information

interpreter

compiler

_______ device is responsible for


obtaining the processed data from
the computer

input

processor

_______ printers use light to produce


the dots needed to form pages of
characters
impact printers

drum printers

control program,
interpreter,
Hardware components in a
operating system,
assembler,
computer are _____,____,_____,______ bootstrap, kernel, shell compiler
_______ software helps to do a
specific task for the user

operating system

application
software

_______ converts a high level


language into machine language

processor

compiler

_______is/are a popular front end tool visual basic

power builder

_______ translates assembly


language program into machine
language instructions

interpreter

compiler

The model through which the


relationship is diplayed between
data and information is called_______ processing model

model

____________looks like a ordinary


credit card but incorporate a
microprocessor and memory
chip____________

RAM

smart card

______ computers are used in large


organizations for large scale jobs
which have large storage capacities mainframes

super computers

_______ is responsible for all


calculations and logical operations
that have to be performed on the
data

control unit

arithmetic and
logic unit

______ printer use laser light

band printer

drum printer

______ software enhances the user to


enter ,store, manipulate and print
any text
data management

word processing

_______ is the temporary storage


place for deleted files

my computer

recycle bin

Processed data is called


___________________

data

datum

_____ language consists of strings of


binary numbers
assembly language

machine language

_________capability supports
concurrent users doing different
tasks

multiprocessing

multithreading

BBS stands for______


USENET is a BBS on ____ scale

business
broadcasting
bulletin board system system
small
large

Internet can be defined as _______

internal network

network of network

_________is a program that displays


information about a host connected
to the net
finger service

ping service

_______ is a program or a tool that


helps in locating a file anywhere on
the net
FTP

TELNET

URL stands for ____________

uniform research
locator

uniform resource
locator

A ______ always begins with a slash

message

scheme

The World Wide Web is referred to


shortly as the _______

net

web

______ is a program that helps us to


log on to other networks
Usenet

finger service

HTTP is the acronym for __________

Higher text transfer


protocol

Hyper text
transmission port

______is used to transfer and copy


files over the internet

iccp

ftp

_____ is a program that helps us to


log on to other networks

yahoo

ftp

TCP/IP stands for ________________

transfer control
protocol/internet

transmission
control
protocol/internet
protocol

HTTP stands for______

hotlink text transfer


protocol

hyper text transfer


protocol

Two of the important browsers


are_____ and_____

lynx,minx

netscape,ie

________ are defined as ways of


communication amongst networks

protocols

IP address

HTML stands for_____

higher text medium


language

hyper transfer
markup language

The system of interlinked


documents is known as_______

hot links

hyperlink

The small programmes that create


animation,multimedia,real-time
games and multi user games are
called______

images

applets

The information displayed on the


web page includes______,_____
and_____

programms,images
graphics,videos,audio ,text

The web pages that represent online


home of their author are
called______
first page

home page

_____ is the most popular internet


service

electronic mail

yahoo service

_______ is a program or a tool that


helps us find a file anywhere on the
net
newsgroup

telnet

Yahoo,lycos,excite and webcrawlers


are _____
search engines

web directories

GIF is the acronym for ____________

Graphical interpreter
formatting

Graphical
interchange
Format

JPEG is the acronym for ___________

Joint Pictures Expert


Group

Jumbled pictures
expert graph

The World Wide Web consists of


_________

information

web pages

A hyperlink can be on ___________

text only

image only

Web is a collection of ___________

web sites

images

The two major browsers used to surf MS Internet Explorer


the Internet are ________,_______
and Mosaic

Netscape
Navigator and
Mosaic

The internet is also called as


_______________

arpanet

the net

The internet is similar to


_________________

LAN

peer-to-peer
connectivity

The net transfers______ from one


place to another

data

parcel

The net provides interesting


services like______,______ and______

scripting,parsing and
compiling

news,cooking and
fine arts

________ is the ancestors of the


internet

dnet

arpanet

defensive
DARPA stands for
administrative rank
_____________________________________ administration
__________
network
DARPA is broken into ________ and
_______

dedicated and
registered projects
administration

milnet,smaller arpanet mailnet,inet

NSFNET is the united states provides


service to _____ and_____
education,research

music and dance

HTML stands for


_____________________________________ Higher text
Hotlink text
_
manipulation language markup language
The first international IP network
connections were established in
1973 with _____ and_____

united states and UK

england,norway

A_____ is a set of computers


interconnected by transmission
paths to exchange information in
internet

server

client

A computer that provides a service


usable by other computers is
called______

client

stand-alone

_____ can be owed by multiple


organisation

LAN

MAN

Data is transmitted in the form


of_____ signals

analog

digital

Modem stands for __________________ Moralize/demoralize

Modulation/demod
ulation

______ is the process of the digital


signals being converted into a form
suitable for analog transmission
Mapping

Modulation

________ and______ are two basic


ways of getting connected to the
internet

Satellite link and


digital signals

Dedicated access
and dial up access

SLIP stands for ________________

Standard long internet Stream line


protocol
internet protocol

PPP stands for _____

Prime prolonged
protocol

Point to point
protocol

Identify the need for controls and


auditing in a computerised
environment.

Absence of input
documents

Lack of visible
transaction trail

The organisational, management,


maintenance and access controls
are categories of

Application controls

General controls

The application controls are .

Input controls

Processing controls

Identify the field check - "If a set of


values is defined, is the input data
one of these defined values?"

List

Range

The field check that conforms if data


input for a field is in a particular
format.
Format mask

Data mask

The field check on a processed data


that fails if a field is not initialized to
zero or errors occur during
calculation is
Range

Sign

The validation checks applied to a


field depending on its logical
interrelationships with the other
fields in the record are called ..

Field checks

Record checks

A group of records or transactions


that are contiguous constitute ..

Physical batches

Logical batches

..is the type of batch check


(group of records) for all input
records of a particular type is done. Control totals

Serial number

Grand totals calculated for any code


on a document in the batch are
called..
Financial totals

Record totals

Control that checks if correct


sequence of commands and update
parameters are passed from the
application software to the
database.
Table level

Data Integrity

With respect to data integrity


control, when monetary transactions
are processed against master files
without a match, we should
maintain a .
Sequence account

Data account

The system test that tests the toplevel modules first and then the
lower modules are simulated with
dummy modules to check the
interfaces is called .

Bottom up test

Hybrid test

Identify the audit technique that


examines each transaction as it
passes through the system.

Embedded code

Program code

The Core Image Comparison audit


technique compares the.

Executable
Database with master program with
table
master copy

The technique used by an auditor to


list unused program instructions
is..
Modelling

Analyzing

The sample data created and used


for the purpose of testing the
application system is called.

Test data

Table data

The test data (dummy unit)


implemented in the normal
processing of the system over a
period of time is known as.

Black box Test


Integrated Test Facility Facility

The test data generated with


correctness proof, data flow analysis
and control flow analysis tools is
called.
Test item block

Test data pack

When a real-time system is


simulated to generate the same
output as the real-time system, the
technique is called.
Parallel trailing

Tracing parallel

When an auditor expands the extent


of substantive tests to determine
the impact of defects on the
attainment of program objectives,
the methodology is.
Cross reference lister

Formulate flaw
hypotheses

This is an important control in


systems that use digital signatures
for authentication purposes.

Public audit trails

Random audit trails

Selecting transactions based on a


sampling rate is called . method.

Transaction sampling

Systematic
sampling

The capability of the generalized


audit software to read different data
coding schemes, different record
formats and different file structures
is.
File size

File data

The audit software capability of


frequency analysis is to.

Sort and merge files

Sampling nth item

The audit functions of attributes


sampling, variables sampling,
stratified sampling are included in
. functions.

Stratification

Selection

Identify the functional limitation of a


generalized audit software that
enables evidence collection only on
the state of an application system
after the fact.
Ex Post Auditing Only

Analytical review
only

The purpose-written audit programs Sorting, creating, and Data retrieval,


are used for..
printing files
code comparison
Picture of a transaction as it flows
through the computer systems is
called..

Program

Track

Identify the type of audit when


auditors are members of the
systems development team.

General audit

Post audit

The processor uses this workspace


as a scratch pad during processing. Monitor

Processor

1024 Megabyte is equivalent to:

1 KB

1 MB

The software used for layout of


newsletters and magazines along
with text and images is called

Application software

Desktop publishing

The model used to describe the


relationship between data and
information is called

System model

Data model

A super computer uses a bus width


of

16 bits

256 bita

When a processor executes one


billion floating-point arithmetic
operations per second, is called..

Nanoflops

Tetraflops

The processor responsible for


communication to and from all the
remote terminals connected is
termed as

Front-end processor

Host processor

The processors used for speedcritical graphics applications are CISC

RISC

The plastic cards with embedded


microprocessor and memory are
called..

Credit card

Computer card

VLSI stands for..

Very large scale


Integration

Very limited silicon


integration

The data width of a Pentium 4


computer is

16 bits

8 bits

The unit which executes addition,


subtraction, multiplication and
division operations is

CPU

ALU

The instructions to be executed by


the processor are loaded from
memory into the

Instruction unit

Process register

The results of a process are stored


into

Accumulator

General-purpose
Register

The memory that stores data as a


series of memory cells that can be
accessed sequentially is

DRAM

SAM

The technology used to accelerate


the processing of a computer is

Processor bus

Cache memory

The memory used in a computer's


BIOS chip is..

Cache memory

SRAM

The process of swapping information


between the RAM and hard disk can
cause
Fragmentation

Disk full

The standard system bus was


replaced by frontside and backside
bus called.

Dynamic memory
Dual independent bus bus

The DSP,DAC,ADC,and ROM are


parts of the

Graphics card

Memory card

The bus whose widths are 32 or 64


bits is called

ISA

PCI

The maximum resolution of a


standard SVGA adapter is

1024*640

780*1024

. synthesis method uses


recordings of actual instruments.

Amplitude

Frequency

The instrument that can produce


continuous lines is..

Printer

Plotter

PPM , CPS are units used to measure


the printer's ..
Speed

Quality

The PCL and postscript are defacto


standards for

Page definition limit

Page description
languages

A laser printer has RAM for


downloading fonts called the.

Font catridges

Dynamic catridges

The characteristic which refers to


how sharply a pixel appears on the
monitor is called..

Convergence

Resolution

The faster the refresh rate, the


lesser the monitor..

Sharpness

Resolution

Size of image

Colors and shades


of gray that can be
displayed

The number of bits used to


represent a pixel in a monitor
decides the .

The input device that utilizes a lightsensitive detector to select objects


on a display screen is called..
Touch screen

Touch pad

The most commonly used scanner


technology is.

Optical character
Charge-coupled device recognition

Identify the type of mice that uses


optical sensors to detect motion of
the ball.

Mechanical

Optomechanical

Identify the input device that


consists the puck and the stylus.

Trackball

Joystick

Identify the disk which has an


access time of 30ms.

Zip disk

Floppy disk

A set of tracks across a set of


platters in a hard disk is called a Disk

Cylinder

The bus used to connect a CD-ROM


to your computer is..

SCSI

PCI

The digital audio tape with the


capacity of 24GB of data uses the
technology called ..

Hyper circles

Fero magnetic

The floppy disks that support 400k1.2 MB belong to


IBM

Macintosh

The backward compatible disk that


has high density-120MB is called. SuperDisk

Jaz disk

The maximum capacity of an optical


disk is
700 MB

6 GB

Which of the auxiliary storage


devices uses the constant angular
velocity access technology?

Super disk

DAT-ROM

The..is an auxiliary sequential


access non-volatile storage device.

Winchester disk

Zip disk

The portable device that optimizes


the features of the floppy and the
CD-ROM is.

Hard disk

Jaz disk

The important central module of an


operating system is the..
Memory module

Data module

Identify the function of the


operating system that manages the
tasks waiting to be processed.
Job management

I/O management

This function of the OS manages


allocation of a minimum main
memory to tasks.

Disk storage

Memory storage

Identify the multitasking type that


slices CPU time to each program.

Paralleling

Cooperative

The OS which allows different parts


of a single program to run
concurrently is..

Multithreading

Multiprocessing

The OS that monitors external


activities with timing constraints
is.

Multi-user

Real-time

The 32bit operating system for


desktop version that replaces Win
9x is..

Win 2000 server

Win 2000
datacenter

The high-level logical disk structure


which defines the way the entire
disk is organised is ..
Frame allocation table File allotted table
A collection of sectors on a hard disk
is a
Block sector

Cluster

The FAT system that provides long


filename support and was written
using protected-mode code .

FAT16

VFAT

Identify the file system that provides


networking,security,compression,
large file support.
FAT16

VFAT

The logical directory structure has a


base of the tree called the
Root directory

Main directory

The process used to optimize the


disk space by arranging files
contiguously is ..

Defragmentation

Formatting

Choose the level of RAID that offers


disk mirroring for fault tolerance.
Level 0

Level 2

Identify the archive formats found


on Unix-based Internet sites.

Exe, zp, tz

Zip, LZH, ARJ

Identify the window screen part that


indicates the name of the window,
application or document.
Title bar

Menu bar

The button on the title bar of a


window that displays the menu to
control the size of the window is.. Scroll box

Control box

The mouse operation that is used to


move windows and icons to different
locations is ..
Click

Double click

The start button,tray and shortcuts


are important features of the .

Control panel

Title bar

The start menu option that keeps


track of your important websites is
..

Documents

Programs

If you want the recycle bin capacity


to be distributed across partitions,
Configure drives
you must use the option
independently

Configure capacity
independently

The feature to retrieve deleted files


from the recycle bin is ..
Re-paste

De-link

The feature which enables to


synchronize files between a floppy
and disk is ..

My Briefcase

My Documents

A file with the pdf extension can be


viewed with the application..
Adobe Acrobat Reader Adobe Viewer
The remote administration access to
view shared resources on the
network is..
Net Neighbourhood

Net Tracer

The utility used to access the


directory structure, create files and
folders etc is.

Windows Explorer

Windows Tools

The font, color, background settings


are saved in the ..
Control panel

My computer

The Notepad utility saves files in the


format.
Binary

Unicode

Identify the windows feature that


allows more than one person to use
a single PC with his own desktop.
Log off

Run

You can quickly access the recently


worked on files from this start menu
option.
Favorites

Accessories

The Internet is a network similar to


..

Peer-to-Peer
connectivity

Point-to-Point link

When a computer is connected to


the internet through a LAN

Dial-up access

Dedicated access

PPP stands for:

Protocol to Protocol
Points

Point to Point
Protocol

SLIP stands for:

Serial Limited Internet Serial Lock InterProtocol


Protocol

When a user connects to Internet


with a shell account it is called . Direct access

Dedicated access

The launch of DARPA's Internet


Protocol (IP) facilitated the term.. Network

Consortium

The costs of Internet


implementation are..

Computer cost,
network card cost

Connection cost, cost


of telephone line

This software enables a host to work


as a terminal on the network.
Terminal embedded

Terminal emulator

The Windows Internet application


functions were developed based on
the UNIX programs called..
Sockets

Package

Each computer on the Internet is


identified with a.

24-bit address

16-bit address

A mail server robot can


automatically.

Check mails

Read mails

This protocol is used to check


reliability, sequencing and flow
control.

Transmit
Communication
Protocol

Transmission
Control Protocol

To check that data reaches the


destination in a proper order, the
data packets are assigned.

Order numbers

Packet numbers

The computer which provides FTP,


WWW, Mail services on a network is
called.
Client

Server

The method of accessing files


through publicly accessible server
that gives free access to the files is
called

Server FTP

Public FTP

This file is transferred verbatim with


FTP service.
ASCII file

BIT file

We can access the Archie server


by

Tunnel

WWW

The types of Archie servers are ..

Straight Archie

Windows Archie

% telnet archie.ans.net is the


command used by the Archie client
Program the Archie
to.
Login to Archie server Server
This tool helps us to locate a file
anywhere on the Internet.

FTP

Remote

The computer that maps the


Internet domain name to the
Internet numeric address is the ..

Network translator
server

Address Naming
server

.is the format of Internet


Address.

Aaa-bbb-ccc-ddd

Aaa.bbb.ccc.ddd

The email address has two parts one


is the username while the other is
the .
Domain

Net

The resources on the World Wide


Web are linked with the naming
format ..

Universal Resource
Locator

Universal Resource
Location

This Net tool provides a stimulating


on-line discussion environment.
Internet Relay Chat

Relay packet
transmission

The IRC II client program command


begins with a .

Slash

Percent

The IRC conversations are organized


into.
Chats

Packets

Identify the output of the IRC


command " /list -min 10" .

Display chats with


Display channels with the maximum 10
at least four users
users

Lynx text browser is a web client in


which users can login with ..

Self accounts

Terminal ping

A web browser provides this hotlist


for a user.

Book-keeping

Bookmarking

The tool to obtain information on the


web by menus and more flexible
than Archie is.
Lynx

Juggler

These servers help in searching for


words from a list of databases or
documents.

WIIS and NETWAIS

WINWAIS and
WAISMAN

This scripting language is an object


based language and is developed by
Netscape.
SGMLScript

VbScript

The one-way broadcast of live


events is called.

Cybercast

Netcast

This is a system of thousands of


distributed bulletin boards and read
by a newsreader.
Bulletinreader

Newsgroup

Unix shell provides mailing


programs called .

Pile and Elem

Pine and Elm

The Unix to Unix copy mail system


separates parts of the mail address
with the symbol.....
@

The Netlauncher (TCP/IP) software


consists of these programs that can
run under Windows.
Spy Mosaic

Image View

The parts of the WSIRC server (net


tool) window are..

Server message,
command line and
channels

Server
message,command
line and channels

These are small java programs that


create games, multimedia etc.
These are downloaded over the Net
and executed by a web browser.
Java scripts

Java exe

The World Wide Web is a collection


of..

Web windows

Net pages

It is a link which helps in retrieving


information from the WWW easily.

Netlink

Sitelink

..directories deliver
information on all the topics on the
Internet.

Web maps

Net ports

This browser does not display links


in color.

Netshark

Cello

The Mosaic browser stores


information about the configuration
in a/an .
Ini file

Exe file

This is an indexer that crawls around


the web cataloging.
Webcrawler

Web sites

The option by which the browser


window in Navigator Gold 2.0 can be
shifted to editor window is .
Edit/New file

Edit/Save Window

This toolbar button displays


information about web creation.

Web page starter

Printer

This window in Navigator Gold does


not support frame display.
Script window

Browser window

The different ways of


communication on the Web are..

Interpersonal

Group

This download tool provides multiserver connection, can search for


mirror sites and provides a file
leecher.

Download Accelerator
Plus
Fresh Download

Thebutton provides HTML


tags for font style, alignments, and
colour options.

Edit Format

Character Format

Identify the search engine that helps


in concept based searching.
Lycos
This is a text only browser.
Lycos

Yahoo
Lynx

The multithreading feature of


Netscape is facilitated with a
storage space named..

Archive

Cache

The distributed uploading of web


pages through Navigator Gold is
called..

Web loading

Web updation

The method of presenting


information on the web through
highlighted items is called

Hypertext

Webtext

The a2z directory is an alphabetical


list of pages used by the search
engine..
Netleecher

Webindexer

Netscape browser can display


context links on an image called.. Image webs

Image maps

Name the download tool which


highlights an area of a page and
gets all the links that are within the
highlighted area.
Webcrawler

Webcow

...helps in business
transactions, generating revenue
and demand on the information
highway.

E-Marketplace

E-commerce

The transfer of structured data for


processing from computer to
computer using agreed formats and Electronic Document
protocols is called..
Intercahnge

Electronic Data
Interchange

This system involves electronic


transfer of funds between financial
institutions.

Efficient Format
Transactions

Electronic Financial
Transmission

A electronic mailbox stores EDI


Very Advanced
transactions for later retrieval.
Value Added Networks Networks
The mutual satisfaction of price,
terms and conditions, delivery and
evaluation criteria in a marketplace Negotiation and
is.
Bargaining

Networking and
Buying

The type of advertising, the


Broadcast and Junk Mail models are
of..
Passive

Push

Identify the models of passive


advertising.

Billboard

Portal

This layer is responsible for


transmitting data as frames.

Network Layer

Data Link Layer

This layer is responsible for


encoding of data.

Link Layer

Network Layer

This layer of the TCP/IP suite


includes the device driver and
network interface card.

Application Layer

Link Layer

This protocol is used for flow control, Simple Mail Transfer


echo and flow redirection.
Protocol

Internet Control
Message Protocol

The software components that


integrates different hardware
devices with the operating
system..

Device drivers

Device modules

This is the basic component that


connects the computer to the
network.

Cable Interface Card

Netlink Interface
Card

The dumb terminal/node in a


network depends on this computer
for their basic functioning.

Personal computer

Client computer

This has an embedded microchip


which can both manipulate data and
execute applications.
Data card

Security card

To ensure a reliable communication


between the buyer and seller, the
Session Socket Layer
protocol used is.
Protocol

Secure Sockets
Layer Protocol

The financial transactions are to be


. leading to different steps in Collected and
Accounts Compilation.
computed

Sampled and
stratified

The basic document where


transactions are entered
chronologically is.

Ledger

Journal

These are the basis for analysis by


potential investors, banks etc.

Journal and Ledger

P & L Account and


Journal

The accounts that the business


owns is called .

Liability

Income

The expenditure for running the


business for a period is ..

Expense

Example

Identify the account type by the


rule: "Debit the receiver and credit
the giver".

Real accounts

Personal accounts

The first document where the


transaction is entered is called a .. Ledger

Liability

The document used for posting of


accounting transactions is ....

Ledger and trial


balance

Voucher and journal

When the debit total is greater than


credit total, the amount appears in
the .. column.
Income

Debit

The methods LIFO, FIFO, Moving


Average are used to .

Value clearing
stock

Value closing stock

The report prepared taking the asset


and liability type accounts from the
Trial Balance is called.
P & L statement

Income statement

The report that depicts operating


profit/loss for a period is ..

Trading account

Trial balance

The day book contains transactions


relating to
Income or expenditure Sales or purchase

The Bills Receivable details are


maintained in a ..

Journal sheet

Voucher debtors

Creditors ledger has details of your


dues to ..

Customers

Assets

The sundry debtors are placed in the


Balance sheet on the
Income side

Assets side

The first step in Tally before any


transaction is entered or saved is
creating a

Company

File

To configure country specific details


use the function key
F10

F2

Identify the security mechanism


used in Tally.

Tally Secure

Tally Pack

After selecting a company in Tally,


you will be in the

Accounts of Tally

Gateway of Tally

Tally software is based on


accounting system.

Sales

Production

Identify the primary group of capital


nature that uses bank account and
cash in hand as sub groups.
Fixed assets

Current assets

All financial entries in Tally are done


using.
Vouchers

Groups

The Direct expenses, Purchase


account, Direct income are primary
groups of ..

Expense nature

Capital nature

The option to delete a sub-group is


admissible through the menu
Alter

Delete

The behavioural attributes of this


group cannot be changed.

Sub-group

Ledger-group

Credit limits for personal accounts


and branches can be done in the
ledger mode

Single

Multiple

We are not allowed to delete a


ledger from this mode.

Single

Sub-group

All account heads except Cash and


Bank are placed in the

Sub Ledger master

Group Ledger
master

Identify the primary group of capital


nature that has the sub-groups:
Bank OD Account, Bank OCC
Account.
Expenses

Income

The primary document for recording


all financial transactions in Tally is
the
Journal

Trial sheet

You can customize the voucher entry


screen using the function key.
F13

F12

Identify the voucher type that


records fund transfers between cash
and bank accounts.
Credit Note

Payment

This voucher type records


adjustments between ledgers.

Receipt

Sales

The use of classes for payment,


receipt and contra vouchers enables
data input in
Double entry mode

List entry mode

The details of a voucher entry can


be given in the .

Comment

Memo

The credit note voucher can hold


account types: ..

Sales account, Sales


tax account

Ledger account,
Bank account

The suffix and prefix details for the


voucher type can be made
applicable only from the .

End of a month

First of a year

The voucher used to record all bank


and cash payments is ..
Credit Note

Contra

Tally's age-wise analysis considers


the voucher's

Effective date

Previous date

Arrange the steps in generating the


books of accounts.
1. Create Trial balance
2. Create new ledgers
3. Generate Day Books
4. Update journals for financial
transactions
1, 2, 3, 4

1, 3, 4, 2

For day-to-day transactions the


voucher types used are

Cash purchase

Credit purchase

Say for example a payment is made


to a creditor ABC - Rs.10000 by
cash, it can be entered into the
voucher type..
Loan

Payment

Identify the purchase voucher type,


the transaction for purchase of 10
CPUs,10 monitors by credit.
Credit Purchases

Cash Purchases

Identify the voucher type to be


chosen for the sale of computers to
Anand by cash @ Rs.210000 per
unit.
Cash Ledger

Sale Sheet

A bank overdraft repaid by cheque


at Rs.25000 can be made in the
voucher..

Payment

Receipt

Balance sheet

Profit & Loss


statement

The financial statement that


consolidates ledger balances is ..

The F9 function key in the left side


of the Gateway of Tally screen
displays the

Accounting reports

Inventory reports

The option on the Gateway of Tally


that will generate the P&L account
statement is..

Net Loss

Net Income

This displays the balance daywise


for a selected voucher type.

Record book

Ledger book

The feature in Tally to analyze


accounts of a company is..

Ratio analysis

Account analysis

The age-wise statement is displayed


based on
Income

Payables

The ratio analysis of receivables can


be done based on
Bill date

Effective date

Name the statement that helps the


management in the decision making
process.
Data flow

Funds flow

Identify the budget type which is


chosen where transaction amounts
are to be monitored.

On closing balance

On net credit flow

Choose the budget type to be used


where bank accounts balances are
to be monitored.

On closing balance

On net credit flow

The management that needs to


consolidate the accounts of its
various enterprises uses . in
Tally.

Consolidate company

Group company

Identify the user who can access


audit trails in Tally.

Owner

Data Entry
operator

Identify the accounting feature in


tally that facilitates splitting
financial years for a company data.

Yearly-entry
Month-less accounting accounting

The tracking of changes in vouchers


and ledger masters is done by..
Tally Vault

Tally Audit

Tally can import data from other


programs and creates a log about
the activity in the file..

Tally.cfg

Tally.imp

Import and export of data between


Tally and other programs is possible
with the help of..
OLE

DBMS

The manual option of voucher


numbering leads to..

Duplicate number

Auto numbers

The Tally audit trail tracks changes


made to vouchers that are ..

less than 30 Days


more than 30 Days old old

The ratio analysis of Bills


Receivables or Bills Payables can be
displayed with the function key.. F5

F8

In IDEA, import Assistant wizard is


used to import data
from____________.

Excel

Access

In IDEA, Append functions can be


used to_________.

Import data

Add data at the


end

In IDEA, Statistics functions can be


applied on_________.

Numeric Data

Date Data

In IDEA, increment value in


Stratification function can be fixed
or free interval.

FALSE

TRUE

In IDEA, Stratified Random functions


is a part of which menu.
Analysis

Data

Which of the following is not an


Audit Software

ACL

IDEA

Using which functions to perform


more complex calculations and
exception testing in IDEA?

Equation Editor

function Editor

Which is the step by step procedure File->Print->Create


for reporting in IDEA.
Report

Click on Create
Report button on
the Operation
toolbars->Report
Assistant.

Which of the following are


categories of computer audit
function ?

Items of audit interest Data Analysis

In the following list which is not an


audit function ?

Sorting

Filtering

In the following list which is a audit


function?

File Definition

Stratification

What is the procedure for importing File->Import Assistant- File->Import ->


data into IDEA ?
> Import to IDEA
Import to IDEA
Which is the following step involved
in a source code review
Review Programming
methodology ?
standards

Understand
program
specifications

In IDEA which functions should be


used to find repeated values ?

Exclude

Detection

In IDEA, Stratification functions can


be applied on which type of data ?

Numeric Data

Date Data

In IDEA,Summarization accumulates
the values of Numeric fields for
each____________.
Primary Key

Unique Key

In which sampling,selecting
sampling units using a fixed interval
between selections
is_______________.
Random

Systematic

Ensures that all combinations of


sampling units in the population
have an equal chance of selection
is____________.

Random

Systematic

In Audit tool, to built relation


between two tables, both table
should have_____________.

Common Table

Common Field

Input Control method is a part of


Application Control Group.

TRUE

FALSE

Which is the following type of check


that can be run when data is input
through terminal ?
Field check

Filter check

Which is the following is the correct


types of Field checks on processed
data ?
Overflow

Range

IDEA exports data in a number of


_______________________.

database

text

Which is the following is the correct


types of Record checks on input
data ?
Resonableness

Compare

Which is the correct types of Batch


Checks ?

Control Totals

Outdated checks

Which is the need for table level


tests ?

Data Integrity

Controls are
required for
authorization

Which is the following is the major


points with respect to inter table
tests ?

This may make the


entire child tables
referenced by the
master field in the
main table unavailable

Their Master &


Child relationship
reference the table
from one another

Which is the software used by the


auditor to take a view of a file of
data or transaction passing through
the system at a particular point of
time ?
Mapping

Snapshots

Which is the software used by the


auditor to compare the source
version of a program with a secure
master copy ?

Souce comparison

Code compasion

Which is the techniques whereby


the auditor arranges or manipulates
data either real or fictitious, in order
to see that a specific program or
screen edit test is doing its work ?
Debug Testing

Logic Testing

Which is the software used by the


auditor to list un-used program
instruction ?

Mapping

Log Analysis

Which is the software used by


auditor to read and analyze records
of machine activity ?
Machine level

Executable level

Which of the following reason


strongly call for Control & Audit
Function ?

Absence of Input
Document

Lack of Visible
Transaction Trail

In IDEA,Data Extraction select data


form a file for further___________ for
creating a new file of logically
selected records.
Extraction

Recording

Which is the correct types of Field


checks on input data ?

Missing data

Blank data

Which is the major points to be


consider with respect to System
tests ?

To ensure the input


data is valid before
entering the value

Test whether the


overall system
meet the
requirement
specifications

In Data analysis techniques, which


law is used to idenfity statistical
report on numeric data ?

Bend Law

Benjamin law

Which is not a feature of File


reorganization with an auditor
perspective?

Filtering

Sorting

What do you understand by the


term, Data Consistency in using
CAATs?

Establish relationship
between two or more
tables as required.

Identify fields,
which have null
values.

Functions involving use of arithmetic


operators, which enable performing
re-computations and re-performance
of results is an example of?
Statistical function

Arithmetic function

Which of the following is a benefit of File an FIR based on


using CAATs?
audit finding

Identify an audit
finding w.r.t.
materiality in an IT
environment

What is step by step procedure for


using Bendford's law function in
IDEA ?

Data->Benford's Law

Analysis>Benford's Law

A Benford's Law analysis is most


effective on data________________.

Comprised of similar Without built-in


sized values for similar minimum and
phenomena.
maximum values.

In IDEA, blank value data can be


extracted by using_________.

@isblank()

as Null

In IDEA, Summarization, Pivot Table,


Stratify, Duplicate Key functions
comes under which menu.
Data

Analysis

In IDEA, Extraction, Sort, Indices,


Search functions comes under which
menu.
Analysis

View

_______ is centralized Banking


Application Software.

Core Banking System

Core Banking
Solution

Flexcube developed by ________

Infosys

HCL Technologies

Quarz developed by ____

Infosys

HCL Technologies

The server is a sophisticated


computer that accepts service
requests from different machines
which are called__________

Clients

Customers

__________ server has to be a


powerful and robust system as it has
to perform all the core banking
operations.
Antivirus Server

ATMS stands for_________

Automatic Telephone
Machine

Application Server
Automated Teller
Machine Server

IBAS stands for ___________

Internet Business
Application Server

Internet Banking
Application Server

PBF stands for________

Positive Balance File

Post Balance File

Internet banking refers to a banking


transactions routed through the
________
Bank

Internet

CPPD Stands for ______________.

Computerized
Computer Planning
Planning and Policy
and plant department Department

The _________ is generally a


hardware and it plays the role of
preventing unauthorized access.

Date base Server

Web server

_________has several components


which have been designed to meet
the demands of the banking
industry.

CBS

CSB

________enable data transmission


over different networks.

Switches

Firewall

_________have many ports that are


connected to different systems and
it facilitates data transmission with
the network.
Router

Switches

A Proxy server always acts in


conjunction with a _________.

Firewall

Internet

The ________ provides network


security by preventing malicious
data from entering the network.

ATM Server

Proxy Server

_________is used for authentication.

System audit

system
administration

Access to a set of servers is


controlled by the ________.

System audit

system
administration

________is a process of unauthorized Data base


entering a network.
administration

Hacking

____________ facility provides a


customer to access financial
transactions in a public place.

Automatic tele
Machine

Automated Teller
Machine

Which is the Function of ATM?

Cash Withdrawal

Balance Inquiry

Every bank branch should


madatorily have a security policy.

FALSE

TRUE

Core Banking Solutions is a


combination of an application
software and ________

Network devices

Firewall

The Operational Controls include


controls on ___________

Physical Access

Logical Access

Application Controls are broadly


classified into __________________

Input Controls

Output Controls

__________controls check that the


data entered is complete and
correct.

Input Controls

Output Controls

Reasonableness check is a _________. Processing Controls

Input Controls

Which of the following is not a


module of the CBS?

Customer ID
generation

Accounts
management

Bank guarantees can be


__________________________

Performance
Guarantee

Deferred Payment
Guarantee

SLR stands for


________________________________

Statutory Liquidified
Ratio

Statutory Liquidity
Ratio

________are record of activities that


have taken place in the system
irrespective of the modules.

Logs

Index

The contents of a log includes


_____________________

Activity performed

User details

Communication and Operations


management must include which
policies?

E-mail policy

Firewall security
policy

______ is a large data housing


infrastructure that provides high
band width access to its clients.

ATM Server

Data Centre

Logs of the various activities in CBS


can be deleted immediately and
also be accessed by anybody.
TRUE

FALSE

CRR stands for


_________________________ in terms of
CBS.
Cash Reserve Ratio

Community
Reserve Ratio

Does the IS Audit also include audit


of the outsourcing activites carried
out in the CBS system?
Yes

No

DRP stands for


___________________________ in terms Disaster Recovery
of CBS.
Planning

Discovered
Resources Planning

_____________are soultions applied


when any kind of vulnerabilities
discovered in networks in the CBS
system.

Logs

Patches

__________can be viewed only by the


DBA of an organisation.
Access Rights Logs

Database Log

Is performing periodic vulnerability


assessment of the networks is
necessary?

No

Yes

KYC stands for


_________________________________ in
terms banking.
Know Your Customer

Know Your
Company

In CBS, the Accounts Management


module deals with
_____________________

Creation of Savings
Account

Creation of Current
Account

Soft copy of the ATM journal rolls is


called_____________

Stock Journal

Journal Report

Data centre servers are known


as_____________.

Application servers

Data Base Servers

The ATM switch consists of a


_____________________

computer

server

_______________testing should be
done to check the unauthorised
access to the network in CBS.

Penetration

Hierarchical

_________enables transfer of money


from one bank to another in "Real
time" and on "Gross" basis.

EFT

NEFT

In _______system money transfers


are done on a one to one basis while
in _______system transfer is done in
batches.
NEFT, RTGS

RTGS,NEFT

All the money transfers take place in


the books of the _________________
Beneficiary bank

Central bank(RBI)

EFT and NEFT work on


_______________basis

HSM

DNS

________system of money transfer is


primarily used for large transactions. NEFT

RTGS

In RTGS, the STP generates an


___________for every outbound RTGS
transaction.
UTN

UTE

UTR full form


_________________________________ in Unique Transaction
terms of CBS.
Reference

Unidentified
Transaction
Reference

STP stands for


________________________________ in
terms of CBS.

Straight Through
Processing

Straight Temporary
Processing

________ is a method of creating


virtual networks within a physical
network.

VLAN

LAN

CMS stands for


______________________________ in
terms of CBS.

Control Management
System

Cash Management
System

Systems audit are


Audit of internal
important for the
Which of the following statements is controls is not needed verification of the
true?
at all
internal controls

The Management Controls does not


include ___________
Managing of Assets

Formulating a
security policy

_______is supported by advanced


technology infrastructure and has
high standards of business
functionality.

Firewall

Internet banking

CBS Software resides in a Central


application server which is located
in the ___________

ATM Data centre

Middleware

A________ that runs the core banking


solutions (CBS) and is centrally
accessed by the branches.
ATM Server

Central Application
Server

The _________of the application is


capable of only entering the data at
the end point that is branches.
System version

Application Version

The application server would be


placed in a trusted inside zone in a
separate ____________

Virtual Local Area


Network

Local Area Network

Application software would access


the ________

Data base server

ATM DATA Server

__________ are capable of being


connected only when devices are
connected to a switch.

LAN

Virtual Networks

Data communication between ______


VLANs can be controlled as per
business requirements.
1

A special feature of STP is that


_____________ number for any
outbound RTGS transaction is
generated by the STP System.

PIN NO

Unique Transation
Referrence

_____________refers to the process of


developing software which would
produce the required output from
the input provided of course, using
the necessary hardware and
Application
communication systems.
Development

Software
Development

The______________is essential to
ensure that computer security
records are stored in sufficient detail
for appropriate period of time.
Review Management

RTGS

is a legal attempt at
Which of the following is False in gaining access to
case of penetration testing in an IT protected computer
environment of CBS?
systems or networks.

Ensure
recoverability of
data in case of
system failure.

Which of the following is erroneous


statement in case of Change
Management Control?

Well documented
Unit test, system test, process should be
integration test all
there incorporating
should be carried out. all the changes.

With respect to the customer


changing the Pin at the ATM which Old offset value used
procedure is the false procedure? to derive new PIN.

Old Pin verified


using HSM/SSM.

IN CBS, changes to the application


server are not made directly to it,
instead done first on a __________

Validate server

Trail server

All the various servers in the central


data centre are seggregated
through _______
LANs

VLANs

The __________ is a complete process


in the computer so that it ensures
that data that is fed in conforms to
certain prerequisite conditions.
Consalidation

Password Policy

When the central Data base is busy


with central end of day activities or
for any other reason, the file
containing the account balance of
the customer is sent to the ATM
switch. Such a file is called
__________
Positive Balance File

Application Server

Bank mate is developed by the


_______

HCL Technologies

Infosys

The IBDS is located in a ____________ Militarised zone

City Zone

The main components of Internet


Banking system consist of __________ Web server

IBAS

Copy of the Anti Virus Software was


updated promptly and regularly at
the Data Centre and pushed into all
of the servers and in all the systems
in the branches by ________
Hacking Method

Push-pull method

The __________which is also residing


in the server at the branch actually
does the banking operations.
Sytem software

utility software

In Core Banking concept all the


systems of the bank are connected
to the Central office by means of a
connectivity which may be either a
_________ or a dial up line.

Leased line

local line

The ________ is generated by the


software and directly sent to
equipment for printed the Pin Mailer. 16 digit number

Personal
Identification
Number

____________would also include the


existence of built in controls in the
system to ensure proper processing
of input data so as to provide the
required output.
Output Control

Input control

____________refers to an
arrangement wherein the issuing
bank acts on the request and
instructions of a customer.

Letter of Tax

Letter of Credit

_______________ is a process by which


the bank ensures the maintenance Business Recovery
and recovery of operations.
Planning

Business
Continuity Planning

At which phase of testing the


version of software is called beta
version?

Programmer testing

User testing

Finacle developed by _________

Infosys

HCL Technologies

In an Organization structure of IT
Department which of the following
function is incompatible?

Network
Database
administrator and
Administrator and
Database
Security Administrator. Administrator.

The number that is stored in the


ATM switch is the difference of which
of the following number?
Pin No - offset value
The information retrieval of
transactions taking place at ATM
located at remote locations is
through _________

Offset value - Pin


No

Soft copy of Electronic Hard copy of


journal
Electronic Journal

The number that is generated as


soon as the customer inserts the
card in the ATM machine is
__________

Offset value

Pin sent to
customer

Which is not a Database


management system.

Unix

Oracle

The data can be entered into a table


in the ____________ view.
Design

Datasheet

MS Access provide__________
datatype to create link to a web
page,file,or email address.

Hyperlink

Link

Set as database
To make a switchboard appear while startup Option in
opening the database.
Access Option

Set as Form
startup Option in
Access Option

To add or delete buttons to


Switchboard, which option is used
in Switchboard Manager is used.

Edit Option

Add Option

The Switchboard Manager is a dialog


box that allows creating a
switchboard for an Access database. TRUE

FALSE

A macro can automate data entry in


Access 2010.
FALSE

TRUE

Which of the following data-type is


not available in MS-ACCESS

Number

Text

The validation can be defined


at____________ level in Access 2010 Table

Form

A macro can be attached to an


event of a
control_________________________.

A form

A report

How to add switchboard in Access


2010?

Click->File tabClick->File tab>Option Button>Option Button>Command not in


>Quick Access Toolbar- Ribbon>Command not in
>Switchboard
Ribbon->Switchboard Manager->AddManager->Add->OK
>OK

The command Design Application


performed action____________ on
switchboard.

Close the current


database

Opens a secondary
switchboard.

In a Query the data can be sorted


based

Single column

Multiple columns

Switchboard Manager only allows a


maximum of __________command
buttons on a switchboard

Nine

Eight

MS Access 2010 provides a


__________pane that contained large
list of actions to be chosen,enabling
a wide range of commands that can
be performed
Action List

Action Catalog

SQL is considered to be a __________ 2GL

3GL

Which action in MS Access macro


applies a fliter or query to a
table,form or report.

DoFilter

FindFilter

Opens a query in the Datasheet


view, Design view, or Print Preview
which macro action used in MS
Access.

OpenQuery

ShowQuery

Among +, <>, MOD, AND, <=


operator which operator has the
highest priority.

MOD

The Strcomp() function is


a__________type function.

Math

Financial

The SGN() function is a ____________


type function
Math

Financial

Which of the following symbol is


used to write a sub query

()

[]

For the Non-Aggregate Total field,


the criteria can only be specified
using the Where clause.

TRUE

FALSE

When you create a field using text


data type in MS Access 2010, by
default field will have ____ character. 255

256

To export an access table to an XML Right-click the table


File, which of the below steps must and select Export
be followed?
->XML

Go to External
Data ->Export,
click on More and
select XML

If we are using the same table for


No need to
main query and sub-query,we need Alternate names to the alternate name to
to provide___________.
tables
the tables
Update Query can be used to
update_________ in MS Access 2010. Single Record

More than 1 record

Delete Query can be used to delete Single Record

More than 1 record

How many Primary key constraints


can create in a table______.

Two

Only one

Unmatched Query can help to find


records that have no corresponding
reord in other tables.
FALSE

TRUE

MS Access 2010 provides queries


that can be used for obtaining the
aggregated results instead of
individual records are____________.

Count()

Sum()

A function that Counts the set of


values that satisfy the given criteria
in MS Access 2010 is___________.
CountA()

Count()

The _________ operator is used to


find the null records in a table.

"= NULL"

NULL

Aggreagate Query also known


as___________.

Group By queries

Total query

Which Query wizard is used to find


repeated records in a table?

Simple Query Wizard

Duplicate Query
Wizard

Append Query is used to


______________ in a table in MS
Access.

Add Records

Delete Records

Which type of joins not available in


Access 2010?
Inner join

Left outer join

A join returns only those rows from


both tables that match on the
joining field is___________ in MS
Access 2010.

Inner join

Left outer join

The query returns all of the rows


from left table, and also those rows
from the right table that is known
as____________.

Right outer join

Left outer join

The query using ___________ returns


all the rows from right table, and
also those rows from the left table
that share a common value on both
sides of join.
Right outer join

Left outer join

How can we add a table to the


Query Design window_________?

Select Create-> Add


Table

Select Database
Tools-> Add Table

___________can be considered a
questions in a data base.

Queries

Form

Operands can be_________ in MS


Access 2010.

Literals

Identifiers

When you create relationship


between two tables, the Common
field's data type should be

Text & Number

Number & Text

In example "Hello"+" " +" everyone"


,hello is _____
Text Literal

Date Literal

Length("Ms Access") will return the


count of charcters is __________.

AND ,OR is a kind of ________ in MSAccess 2010.


Arithmetic

Logical

Comparision operators is also known


as_______ in MS-Access 2010.
Arithmetic

Logical

LIKE operator works with______in MS


Access 2010.
Text

Date

To find the null


IN operator is used __________ in MS To match the value to records of given
Access 2010.
a set of values
table
Operator precedence is similar to
_____ that is follwed in Algebra in
MS-Access 2010.

BODMAS

Text files that are organized properly


fall into one of two types
are__________
Delimited files

BOMDAS

Fixed-width files

To create an unmatched Query using


wizard, minimum required number
of table or fields is_________.
one

two

While creating the query, the


criteria can be set in

Only one

More than One


Field

SQL stands for____________________.

Sub Query Language

Structured Query
Language

In MS Access query which logical


operator returns True if both the
expressions compared are true.

IF AND

AND

In MS Access query which logical


operator returns True if either of the
expressions compared are true.
OR

IF OR

Enfore Referencial Integrity option is


used to restrict enerting data in
Parent Table

Child Table

In MS Access left("Access",3)
function will return__________.

Acc3

Acc

Which function is used to converts


the text to lower case in MS Access
2010.

Lcase()

Lowercase()

Which function is used to remove


leading or trailing spaces in a text in
MS Access 2010.
Remove()

Removetext()

_____________ is contains a set of


predefined functions in MS Acccess
and helps build complex expression. Expression Design

Expression Builder

Which of the following is a Database


Software
Excel

Outlook

Each Table row


represents a twodimensional structure
Which of the following is not the
composed of rows and
characteristics of a Relational Table? columns

Each row/column
intersection
represents a single
data value

Which record will be retrieved if the All values less or more Value less than 95
query criteria is < #1/1/11#?
than 1,195
characters
MS Acces 2010 reads and writes to
the .accdb file format in chunks also
known as_____________.
Pages

Encrypt pages

The tab in Expression Builder in


which we write expressions is known
as _____________.
Expression Elements

Operator Button

The criteria expression LIKE?B*.

Will match all text


starting from B

Will match all text


ending from B

__________ queries are useful for


summarizing information, and are
somewhat similar to pivot tables in
MS-Excel.

Select query

Crosstab query

While entering record in Datasheet


view, in which order the records can
be entered
Alphabetical Order

At the end of the


table

When you delete the record in form,


it deletes the record from__________. Form only

Form but not in


table

Having clause is used in the


aggregate query in MS Access 2010 FALSE

TRUE

The controls that are not linked to


any field of the table or query on the
form are known as ________.
ActiveX control

Unbounded
Controls

Which property of the form can be


used to insert a background image
in MS Access 2010?

Caption

Background

___________ is a report that is


inserted in another report in MS
Access 2010.

Inner-Report

Sub-Report

A bound main report is based on a


______________ and its _____________
contain realted information.

Table or query,InnerReport

Table or
query,Main-Report

DDL stands for ____________

Data Definition
Language

Data Defined
Language

A___________used to compare
multiple values of categories or
differences over a period of time.

Pie Chart

Area Chart

A________used to compare trends


over a period of time.

Pie Chart

Line Chart

To create a read-only copy of the


database, which of the following file
format can be used?
.ACCDB

.ACCDE

The database administrator created


a split database and created a frontend database and back-end
database file.Which of the file
should be stored on the server ?
Front-end database

Back-end database

To make database package and


digitally sign using which option in
Access 2010 ?

File->New->Save
Database as>Package and sign

File->Save&Publish>Save Database as>Package and sign

In which formats can the Collect


Data through email message feature
can send the data entry form?
HTML and InfoPath

Access Forms

Once a mail is sent using the collect


data through email message feature
in Access 2010. The mail status can
be checked using________________.
Export to Outlook

Options in Tool
menu of Access

The ___________ type of data cannot


be collected using Collect data
through email messages.
Text

Number

What is the memo data type field


used for?

To store objects
created in other
programs

To add table

Those records that


The filter By selection feature allows match an entity in a
you to filter:
field

Records based on a
criterion you
specify

DML stands for _____________

Detailed Maintaining
Language

Data Maintaining
Language

Which editor was provided for use


with Access Basic?

The Visual Basic 1.0


editor

Notepad

How do you update Pivot Table


Save your changes,
report data after changes are made close the workbook,
to the source data?
and then reopen it.

Select the Pivot


Table worksheet
and press F9 on
the keyboard

What are the different views to


display a Table ?

Design View

Datasheet View

Which Of The Following Creates A


Drop Down List Of Values To Choose
From?
Ole Object

Hyperlink

A __________ Enables You To View


Data From A Table Based On A
Specific Criterion

Query

Form

The Database Language That Allows


You To Access Or Maintain Data In A
Database
DCL

DML

Insert, Update Or
DCL Provides Commands To Perform Change The Structure Delete Records
Actions Like
Of Tables
And Data Values
Which is not a Database Model ?

Network Database
Model

Relational
Database Model

Which Of The Field Has Width 8


Bytes?

Memo

Number

This Is The Stage In Database


Design Where One Gathers And List
All The Necessary Fields For The
Database Project.
Data Definition

Data Refinement

Whenever a tables gets update, the


dependent query will
Not update

update
automatically

The Third Stage In Designing A


Database Is When We Analyze Our
Tables More Closely And Create A
___________ Between Tables

Relationship

Join

What is the purpose of the


Switchboard Manager in Microsoft
Access 2010?

To build a main
Creates the macros
switchboard form that used to program
controls all other
an automatic
forms.
application.

How does a query-based report


differ in design to a report based on The reports are
just one table?
restricted in size.

It doesnt

How would you include some plain


text into a mailing label report?

Type the text directly


into the label.

Use the > button.

In a Microsoft Access 2010 report,


the page numbering would most
likely be placed into the:

Report Footer

Section Header

If you wished to present a


professionally looking form on
screen that would show all the
necessary information, which of the
following form design tools would
you most likely use?
Pivot Table

Pivot Chart

What are the benefits of an ACCDE


file__________________________ in
Access

Reduces the size of


the database

Optimizes memory
usage and
improves
performance.

An .ACCDE file is a ___________


version of the original .ACCDB file.

Fixed-down

Locked-down

Which type of the query is used to


accept the value from the user while
executing the query and fetch
records accordingly
Make Table Query

Update Query

To encrypt the databse in Access


2010 must be opened in the
__________________.

Open Inclusive
mode

Open Secure mode

To extract the records based on date


field, which of the symbol should be
used
$

FIX() is a kind of ____ function in MSAccess 2010.


Math

Date

MS-Access 2010 has added new


features of ______ to eliminate the
need of VBA code

Macro

Form

Encrypting a database does not


restrict access to database objects,
but to __________ the database.

Open

Modify

The setting for the Security option


can be handled
using_______________________ in
Access 2010.

File Tab ->New


Options, and selecting
the Trust Centre tab
from the Access
Option window

File Tab ->Access


Options, and
selecting the Trust
Centre tab from
the Access Option
window

Third Party Encryption Technology


can also be applied to the database
of Microsoft Access 2010.
TRUE

FALSE

To create a split database in MS


Access 2010 go to which tab?

Create Tab

External Tab

After spliting database,frontend


database holds_________________.

Forms

Query

After spliting database,backend


database holds_________________.

Tables

Forms

When an Access database is split, it A back-end database


creates two files_________________.
& front-end database

A new database &


Old database.

A Data Access Page is a special type


of _________ that allows users to
interface with database using
Internet Explorer.
XML page

HTML Page

An _____________ is a group of people


with a common goal, having certain
resources at its disposal to achieve
the common goal.
Company

Enterprise

______________ can be defined as


subject-oriented, integrated, timevariant, non-volatile collections of
data used to support analytical
decision making.

Data Warehouses

Data Models

________________ databases contain


detailed data that is needed to
satisfy processing requirements but
which has no relevance to
management or analysis.
Operational

Non-Operational

Data in the Data Warehouse is


______________ , not ____________.

Dynamic, Static

Non-Volatile, Static

____________ data contains an


historical perspective that is not
generally used by the _____________
systems.

Operational,
Informational

Operational, Static

The definition of data elements in


the data warehouse and in the data
sources and the transformation rules
that relate them, are referred to as
___________.
Masterdata

Detaileddata

Data warehouses are not the


optimal environment for ____________
data.
Structured

Unstructured

Maintenance Costs are high for Data


Warehousing.
TRUE

FALSE

Data Warehousing can be used for


___________________.

Credit Card Churn


Analysis

Insurance Fraud
Analysis

_________________ is the process of


extracting patterns from data.

Data Analysis

Data Warehousing

___________________ is an approach to
quickly answer multi-dimensional
Business Processing
analytical queries.
Management

Online Analytical
Processing

________________ include money,


manpower, materials, machines,
technologies etc.

Costing

Production

The Output of an OLAP query is


typically displayed in a ___________
format.

Matrix

Columnar

______________ companies is planning


to support tens of millions of
customers with just hundreds of
employees.
B2B

B2C

Which of the following is the


limitation of Open Source ERP?

Increased
Complexities

Legal Complexities

Which of the following is not an


Open ERP software?

Openbravo

SQL-Ledger

_____ is the process of integrating all


the business functions and
processes in an organization to
achieve numerous benefits.
EDI

ERP

________ must consider the


fundamental issues of system
integration by analyzing the
organization's vision and corporate
objectives.

Manager

Auditor

The more the number of __________,


the longer the implementation time. modules

process

Customization of ERP systems is one


of the major challenges in auditing
ERP security.
TRUE

FALSE

Tally.ERP 9 provides graphical


analysis of data which helps the
user to perform deeper analysis.

FALSE

TRUE

The user can ________ the company


data into multiple companies as per
financial periods required.
Import

Export

___________ is a collection of
activities that make one or more
kinds of input and creates an output
that is of value to the customer.
Business Model

Business Function

E-Filing of Returns refers to the


process of electronically filing your
tax returns through the ___________. Intranet

Internet

Tally.ERP 9 does not allows you to


export the ETDS forms in NSDL
compliant formats as well as
facilitates printing of TDS Forms in
Physical Form.

TRUE

FALSE

Tally.ERP 9 offers a data encryption


option called _______________.

Tally Data Encryption

Tally Data
Encoding

___________________ is the process of


exchanging Tally.ERP 9 data
between two or more locations.
Serialization

Randomization

The Tally website offers


_______________, by which a user can
communicate with a Tally
representative and get required
information.
Tally Forum

Tally FAQ

Tally.NET use _______________ for


centralised Account Management.

Control Centre

Data Centre

The data is transferred between the


remote location and the server
using a secured mechanism called
__________________.
Encoding

Decoding

Sales Tax Ledger falls under which


Group?

Indirect Expenses

Duties and Taxes

Alias represents ___________ in


Tally.ERP9.

Short name

Nickname

If we purchase any Fixed asset in


credit, we can pass it from _________. Payment mode

Receipt mode

Information systems can be


designed so that accurate and
timely data are shared between
functional areas. These systems are
Isolated
called
Integrated Information Information
_______________________________.
Systems
Systems
To save entry without any amount,
we have to use _____________.

Cost Center

Maintain Multiple
godown

Transfer of materials from one


godown to another godown, use
______________.

Manufacturing Journal Stock Journal

While exporting Ledgers from Tally


to Web Page, we use _________.

XML Format

ASCII Format

Budget represents
_______________________.

Estimation

Forecasting

In Service tax Credit Adjustment (%)


should be either ____________.
0.2

Service Tax Report can be seen from


_________________.
Display > Day Book

Display > Account


Books

Can we allow Expenses/Fixed Assets


in Purchase vouchers?
Yes

No

Transfer from Main Cash to Petty


Cash we require to pass _______
voucher.

Contra

Payment

Income Tax number of the Company


will appear in which report?
Cash/Bank Book

Profit and Loss A/c

A business model is not a


___________ model.

mathematical

system

The approach to ERP is to first


develop a ______________ comprising
the business processes or activities
that are the essence of a business. Business Model

Business Function

OLAP systems use concept of OLAP


cube called a ______________ cube

single dimensional

hyper dimensional

The data which is to be exported


from Tally.ERP 9 can be in ________
format.

XML

HTML

In Tally ERP-9 Remote Access is also


known as __________.
Networking

VB.Net

Accessing data store on a remote


location using Internet in Tally.ERP9
is called____________.
Local Data

Remote Data

Tally.ERP9 can be classified user in


two categories are___________.

Local User

Remote User

Which of the following is not a


predefined security level provided
by Tally.ERP 9?

Owner

Public User

The business model is represented


in the graphical form using
______________ and ________________

charts, pictures

smart art, clip art

Which of the following is/are the


data warehousing activity?

Defining the
Identifying and
correct level of
prioritizing subject
summarization to
areas to be included in support business
the Data Warehouse
decision making

___________________ is the succession


of strategies used by management
as a product goes through its life
Business Processing
cycle.
Management

Online Analytical
Processing

_______ integrates supply and


demand mangement within and
across companies.

BPM

SCM

OLAP stands for _________________.

Online Analysis
Processing

Online Analytical
Processing

__________ includes transportation


from Suppliers and receiving
inventory.

Inbound Operations

Outbound
Operations

Which of the following is not the


service area of SCM?

Logistics

Asset Management

Which step of the ERP


implementation involves, educating
and recruiting end users throughtout
the implementation process?
Step 1

Step 2

The system ____________ process will


address issues such as software
configuration, hardware acquisition
and software testing.
implementation

upgradation

A __________________ review is
recommended to ensure that all
business objectives established
during the planning phase are
achieved.

under process
review

pre implementation

In _________________ stages, auditors


have access to rudimentary ERP
tools and capabilities for auditing
security configurations.
post implementation
Immediate posting and updation of
books of accounts as soon as the
transactions are entered. This is
called as __________

pre
implementation

Immediate
Interactive Processing Processing

Which of the following ETDS forms


are available in Tally.ERP 9?

Form 26, Annexure to Form 27, Annexure


26
to 27

The exported eTDS file from


Tally.ERP 9 can be validated through
NSDL's freely downloadable utility
File Validation
called __________________
File Validation Program Utility
ERP systems provide an access to
the__________ data

integrated

distributed

________________ is a tool that refers


to skills, processes, technologies,
applications and practices used to
facilitate better, accurate and
quicker decision making.
Data Warehousing

Data Modeling

Business intelligence systems are


________ Decision Support Systems.

information driven

data-driven

Data warehousing technology is the


process of creating and utilizing the
companys __________
general data

historical data

The data in the Warehouse comes


from the _________ environment and
external sources.
operational

backup

In essence, SCM integrates


___________ management within and
across companies.
supply and demand

supply and chain

_____________ including all fulfillment


activities, warehousing and
transportation to customers.
Inbound operations

outbound
operations

Customer Relationship Management


is a ________________ level strategy. business

corporate

Operational CRM provides support to


___________ business processes.
front office

back office

Collaborative ______ ultimate goal is


to use information collected by all
departments to improve the quality
of services provided by the
company.
CRM's

ERP

Tally.ERP 9 follows the DES


__________ method to safeguard the
data.
encryption

decryption

Business Intelligence Systems are


data-driven ___________________.

Information Systems

Integrated
Information
Systems

With ______________ technology the


characters are reduced in breadth
and user is allowed to input
additional characters which would
make the account name, entity
complete and readable.

Tally Fix

Tally Adjust

In Tally.ERP 9 __________________
provides the user with administrator
rights and the capability to check
the entries made by the authorised
users and alter these entries, if
necessary.
User-defined Security

HTTP-XML based
data interchange

__________________ is an enabling
framework which establishes a
connection through which the
remote user can access the Client's
data without copying/transferring
Direct Web Browser
the data.
Access

Web Publishing

If we want the company to be


connected automatically for remote
access on load, the property
Allow to Connect
__________ needs to be set it as Yes. Company

Contact On Load

___________________ technology is the


process of creating and utilizing the
company's historical data.
Data Warehousing

Data Modeling

Is there a fixed qualification for


internal auditor_________.

TRUE

FALSE

Which of the following will not


appear in the home page of K-Doc?

Powerpoint

Word

To change an email header so that


the message appears to have
originated from someone or
somewhere other than the actual
source is known as___________.

Email middle attack.

Email Spoofing.

To playfully satirize a website is


known as_____________.

Web tapping

Web Interception

_________is the complete package to


manage the billing requirements of
a CA firm on cash system of
accounting.
Payroll

eSecretary

Which of the following is not a/an


feature of eSecretary?

Contact Management

Greeting
Management

Annual return preparation can be


done using ________.

ICAI-ROC application

K-DOC application

________is correspondence
automation & management software
that is seamlessly integrated with
Microsoft Office.
K-DOC application

eSecretary

________ is an independent,objective
assurance and consulting activity
designed to add value and improve
an organization's operations.
Statutory audit

Tax audit

Which of the following is/are the


main purpose of the internal audit?

Operations of the
organization

Financial reporting

As per _____________of the Income


tax Act,every person carrying on
business or profession is requires to
get his accounts audited by a CA
before the "specified date".
Section 45

Section 44AD

__________________ refers to use


software/applications to
automatically perform tasks such as
accounting,preparing trial balance,
financial statements etc. and
electronically transmit data or
information using internet..
ERP

Office automation

FEMA Stands for _______________.

Foreign Exports
Management Act

Financial
Enterprise
Management Act

Which application helps the


management to allocate the
revenue to the credit of the right
employee who identified the
opportunity?

Resource allocation
and scheduling

Knowledge
management

Who has full privileges in the


financial accounting application?

Database
administrator

Account
administrator

_________is the centre point of the


financial accounting application as
any transactions having financial
impact carried out in any other
module will reflect in this module.

AP module

GL module

In Financial Accounting
Application,the transactions flow
from GL (General ledger) to other
modules.

TRUE

FALSE

Which of the functionalities is not


provided in the purchasing module
Receipts of goods
of Financial Accounting Application. Evaluation of Vendors or service
In Financial Accounting
Application,automatic sequence
number of documents control is not
required in which of the following
module?
Purchasing

Accounts Payable

Which module of Financial


Accounting Application can be used
for assigning credit limit to
customers?
Purchasing

Sales

Which of these will trigger/alert for


timely payment ?

Accounts
Receivable

Accounts Payable

We can manage interviews,offers


and job vacancies by using which of Resource allocation
the application?
and scheduling
________,___________,__________ are
commonly referred to as CIA in
information security parlance.

Confidentiality,Inte
Confidentiality,Integrit grity and
y and Availability
Authentication

___________provides information
about updation of project cost based
on time spent by employees on
Performance
various projects.
management system

Which of the follwing is not a/an


functionality provided by PMS?

HR and Payroll
applications

HR management
system

Employee
Capture the Key
designation and
Performance Indicators reporting structure

___________automates the
calculation of salary for taking
inputs from the timesheet
application, leaves from Leave
Management System and salary
details from the HR master data.

Timesheet System

HR management
System

Which of the follwing is not a control Reduce administrative


in Leave Management System?
burden on HR
Excess leave
Permanent Audit File are obtained
once but updated on
__________basis.

In Permanent Audit file, _______ is


not the key data documented.

half-yearly

yearly

Organization chart

Clients accounting
manual

The Document Management Sytem


offers the features___________.
Role based access

Complete audit
trail

________is a type of training in which


user logon on the training server
with a user ID and password.
Internal Training

E-Learning

In some cases, trainee is supposed


to appear for the examination/test
at the end of the training
is____________.

E-Learning

Classroom Training

________ are the


hardware/infrastructure equipments
used in a CA firm.
PC

Application Server

_____________means information
available in the organization should
not be altered or modified by
unauthorized personnel.
Confidentiality

Integrity

Which of these is/are the standard


email program used in an
organization?

Microsoft Exchange

Lotus Notes

Which of the following is not a


characteristics of WAN?

Most WANs are owned Compared to LAN,


by only one
its transmission
organization.
speed is low

_________is protection of information


assets from threats to preserve their
value.
Confidentiality

Integrity

Which types of information assets


need to be secured in a CA Office?

Client data

Own data

The extent and level of _________


would depend on the nature of
information.

Availability

Confidentiality

__________ of information might be


affected due to denial of service
attack or some other reasons.

Integrity

Authentication

__________means the sender cannot


deny having sent a message and
receiver cannot deny receiving the
message.
Non-Repudiation

Integrity

Risk may not be _______ in nature.

reputational

financial

The process of identifying an


individual, usually based on user id
and password in an organization is
called______________.

Availability

Authentication

Which of the following is not a


software equipment required in a
CA's office?

Resource allocation
and scheduling

Client
management

Which of the following is not an


application arranged by ICAI?

ICAI-XBRL suite

K-DOC

How many stages are there in the


sales cycle?

PBX stands for ________

Private Exchange
Branch

Public Exchange
Branch

XML stands for_________

Expansion Markup
Language

Expansion Makeup
Language

VBA stands for_______________ .

Visual Basic for


Applications

Visual Basic for


Applets

Store, structure,
Find the correct sequence in case of Structure, store, and
and transport
XML file, are
transport information. information.
Programming of Macros is done in
programming Language ___________. VBA

ASP.Net

As Bank auditors,Many Banking


applications generate text files in
____________.

Txt format

Csv format

Not Required

Developer
tab>Code>Macro
Security

Macro security is enabling through


__________.

In Excel, Sampling option is


available in ___________ .

Insert

Data Analysis

Requirements for preparation of


cash budget in Excel.

Knowledge of
accounting

Knowledge of
formatting an excel
sheet

ROE stands for __________.

Recall on Equity

Return on Equity

___________ is a statistical procedure


that uses sample evidence and
probability theory to determine
whether a statement about the
value of a population parameter
should be rejected or should not be
rejected.
Confidence Interval

Hypothesis

____________ is a statistical tool used


to create predictive models.
Regression equation

Regression

__________ shows the ability of a


company to pay its current financial
obligations.
Quick Ratio

Current Ratio

Macro enabled workbook file


extension is _______________

.xlsx

.xlsm

___________ shows dependency of a


firm on outside long term finance.

Quick Ratio

Leverage Ratio

To record a Macro in relative


mode,"se Realtive References"
available in which tab of excel ?

Developer Tab

View Tab

There are _________ ways to open a


Macro enabled workbook.

ANOVA stands for___________

Analysis of Value

Analysis of Varity

A function doesnt require an


argument is___________.

DATE()

TODAY()

In Excel, there are __________


functions for calculation of
depreciation.

For calculation of
depreciation as per
SLN function used to calculate
Sum of Years Digit
depreciation as per_________________. Method.

For calculation of
depreciation as per
Straight Line
Method.

For calculation of
depreciation as per
SYD function used to calculate
Sum of Years Digit
depreciation as per_________________. Method.

For calculation of
depreciation as per
Straight Line
Method.

For calculation of
depreciation as per
DB function used to calculate
Sum of Years Digit
depreciation as per_________________. Method.

For calculation of
depreciation as per
Straight Line
Method.

For calculation of
depreciation as per
DDB function used to calculate
Sum of Years Digit
depreciation as per_________________. Method.

For calculation of
depreciation as per
Straight Line
Method.

XML is a ___________
Recommendation.

W1C

W3C

For calculation of
depreciation as per
VDB function used to calculate
Variable Declining
depreciation as per_________________. Balance Method.

For calculation of
depreciation as per
Straight Line
Method.

PV Ratio stands for


_____________________.

Point Volume Ratio

Point Varaiance
Ratio

BEP stands for


__________________________

Break Easy Point

Break Even Point

Data Validation available in which


Tab?

Formulas

Insert

___________function returns value


from a given data range based on
row and column.

VLOOKUP()

HLOOKUP()

Which function categories are not


available in Excel.

Statistical

Engineering

PMT Function is belongs to which


categories of Excel function ?

Text

Logical

NPV stands
for_______________________________

Net Present Value

Net Proper Value

_______function uses a fixed rate to


calculate depreciation

DB

VDB

Which of them is not a Conditional


Operators symbols?

<

</

XML is a language that is very


similar to which language ?

HTML

Strings are to be always enclosed in


double quotes when used in a
formula.
TRUE

FALSE

Parentheses are used to change the


order of calculation.
TRUE

FALSE

In Excel the function =Abs(-4)


returns __________.

-4

_______ function returns the


remainder after a number is divided
by a divisor.
DIVISOR()

2^2

MOD()

If User want to display the formulas


Formulas >
rather than the results of the
Formulas > Formula > Formula Auditing >
formulas then choose______________. Show Formulas.
Show Formulas.
_______________ reveal about the
current and future financial
condition of the company.

Report

Which of them is a Intangible


assets?

Goodwill and Patents. Cash and Property.

CR stands for___________________.

Current Ratio

Clear Ratio

QR stands for___________________.

Quick Rate

Quality Ratio

Data

Debt Equity Ratio =Long term debt


/ Shareholders funds.
TRUE

FALSE

DTD stands for ___________, which is


called XML Schema.
Direct to Direct

Document Type
Definition

ACP stands for _____________.

Average collection
price

Average collection
payment

FATR stands for _____________.

Fixed assets test


Fixed all turnover ratio ratio

A _________ can be a numerical fact. Statistic

Sale

__________ stands for reduction in


value of fixed assets.

Data

Depreciation

Value of fixed assets is generally


reduced over the period of time due
to __________.
Wear & Tear

Change in taste of
people

Profit equals to __________.

Purchase - Total Cost

Sales - Total Cost

Examples of fixed cost are


__________.

Salary of
administrative staff

office rent

Cash budget is prepared for


planning for future as far as
movement of cash is concerned.

TRUE

FALSE

Discounting is not the process of


determining the present value of a
payment or a stream of payments
that is to be received in the future.

TRUE

FALSE

PAN must have ________ characters


only.

10

The extension of a XML document is


______________.
(.xsd)

(.xml)

Sample means the units or items


selected for study or consideration
and population means the total set
of data used for selection of
samples.

TRUE

FALSE

_______________ analysis relates


items in the financial statements in
a manner that drives out
performance information about the
company.

Financial ratio

Price

How to restrict to run a macro


automatically when starting
Microsoft Excel?

Hold down the SHIFT


key during start up.

Hold down the


CTRL key during
start up.

Which option allows you to Bold all


the negative values within the
selected cell range?

Zero Formatting

Conditional
Formatting

_____________ allow us to perform


calculations or operations that
would otherwise be too
cumbersome or impossible
altogether.

Cell referencing
functions

Absolute functions

Statistical functions in Excel help to


calculate __________________
Arithmetic Mean

Median

Discounting Factor formula is


___________________

= 1 + (1/r) * n

= n / (1+a) - r

________________ is considered as
non cash expenditure and occupies
a prominent place in Profit & Loss
Account.
Cash Flow

Depreciation

The value which can be realized at


the end of life of fixed asset by
selling it is called _________________

cost

Salvage Value

____________ is prepared for planning


for future as far as movement of
cash is concerned.
Capital Budgeting

Cash budget

To create a XML Map from XML


schema, Go to which Tab in Excel
____________.

Add-Ins

Review

____________ is the process of


determining the present value of a
payment or a stream of payments
that is to be received in the future.

Marginal costing

Capital Budgeting

____________ is one of the core


principals of finance and is the
primary factor used in pricing a
stream of cash flows, such as those
found in a traditional bond or
annuity.
Marginal costing

Discounting

XML schemas in Excel are called


XML _____________.

Maps

Schemas

Excel allows us to use various


functions and even simple
mathematical calculations which can
be used for _____________.
Financial analysis

Equity analysis

Which cell reference show the


reference to other sheet or
reference to other workbook in excel
?
Sheet2!C4

Sheet2{C4}

Which of them is not a Range


References?

A1:A4

$A$1:A4

Interest Coverage Ratio equals to


_________.

EBIT / Debt interest

EIBT / Debt interest

If particular workbook have to open


each time Excel started, where the
workbook should be placed?
AUTOEXEC folder

AUTOSTART folder

If the cell B1 contains the


formula=$A$1, which of the
statement is true ?

There is an
absolute reference
to cell A1.

There is a relative
reference to cell A1

__________ is a computerized
mathematical technique that allows
people to account for risk in
quantitative analysis and decision
making.
Finanical Planning
XML is case-sensitive ?
TRUE

Monte Carlo
Simulation
FALSE

________ is the process of meeting


the financial goals through the
proper management of finances.

Monte Carlo
simulation

Corporate planning

___________ can be defined as the


process of setting the procedures in
the organization for achieving the
Monte Carlo
predefined goals.
Simulation

Corporate Planning

________ shows ability of company to


pay back long term loans along with
interest or other charges from
generation of profit from its
operations.
Debt Assets Ratio

Interest Coverage
Ratio

_____________________is the simplest


method of comparing different
stocks at a point of time to make
investment decisions.
Earnings Per share

Fixed Asset Over


ratio

<?xml
<?xml version="3.0" version="2.0"
The very first line of code of XML file encoding="ISO-8859- encoding="ISOis_____________.
1"?>
8859-1"?>
Every bit of data has to start and
end with an identical tag

<TagName>Data</Tag </TagName>Data
Name>
<TagName>

The exact syntax of PMT function


is________________.

PMT(nper, rate, pv,


[fv], [type])

PMT(rate, nper, pv,


[fv], [type])

The exact syntax of IPMT function


is__________________.

IPMT(rate, nper, pv,


[fv], [type])

IPMT(pv, rate, per,


nper, [fv], [type])

To see the XML Map user must go


______________.

Developer>XML>
Source

Developer> Source

Deletion of XML Map is done


through __________.

Directally Delete
Command

Delete Button

Excel works primarily with ________


types of XML files.

Method of tax calculations shall


change according to _________.

Annual Income

DOB

EMI stands for ______________.

Easy Monthly
Installment

Equating Monthly
Income

Which function is used to calculate


the principal portion in every
installment ?

IPMT

PPMT

________ is a process used in


statistical analysis in which a
predetermined number of
observations will be taken from a
larger population.

Snowball sampling

Sampling

In __________, Individuals are


selected at regular intervals from a
list of the whole population.

Clustered sampling

Sampling

In ______________ each individual is


chosen entirely by chance and each
member of the population has an
equal chance, or probability, of
being selected.
Snowball sampling

Convenience
sampling

Which method is commonly used in


social sciences when investigating
hard to reach groups?
Quota Sampling

Sampling

__________ are useful for quick


reading and easy understanding,
particularly for top management.

Summary reports

Balance sheet

It is a process in which a business


determines whether projects such as
building a new plant or investing in
a long-term venture are worth
pursuing.
Business Investment

Capital Budgeting

Popular methods of capital


budgeting include _________ and
payback period.

internal rate of
return

discounted cash flow

What is the file extension of Schema


file which contain schema tags ?
(.xml)

(.xsd)

_________ is the value of all future


cash inflows less future cash
outflows as on today.

Working capital

Net present value

___________is the process of defining


and analyzing the dangers to
individuals, businesses and
government agencies posed by
potential natural and human-caused
adverse events.
Sensitivity analysis

Risk analysis

__________ which is used more often,


does not involve numerical
probabilities or predictions of loss.
Sensitivity analysis

Risk analysis

________ are generally used to


present information in a simple and
better way and also be used to
analyse the risk in a better way.
Graphs

Sparklines

It is a technique used to determine


how different values of an
independent variable will impact a
particular dependent variable under
a given set of assumptions.
Decision Tree analysis Sensitivity analysis
_______ involves computing different
reinvestment rates for expected
returns that are reinvested during
the investment horizon.
Scenario analysis

Sensitivity analysis

NPER stands
for______________________________

Total Principal Value

Net Per value

Which function that is used to


calculate the payment for specific
loan terms ____________

SUMIF()

PMT

________helps to break down the


Return on Equity

Du Point Analysis

Return on
Investment

_______ is a common method for


financing property, facilities, and
equipment.

Mortagage

Leasing

These are the basis for analysis by


potential investors, banks etc.

Journal and Ledger

P & L Account and


Journal

The voucher used to record all bank


and cash payments is ..
Credit Note

Contra

The manual option of voucher


numbering leads to..

Auto numbers

Duplicate number

The Tally audit trail tracks changes


made to vouchers that are ..

less than 30 Days


more than 30 Days old old

The audit functions of attributes


sampling, variables sampling,
stratified sampling are included in
. functions.

Stratification

Selection

ANS

command

program

numerous alpha

number and alpha

size, performance,
cost

input, output,
performance ratios

ARPANET

None of the above.

PCs

mainframes

feed

write

multiplexing

multitasking

converter

process

ram

output

non-impact desktop
printers
thermal printers

monitor, program,
keyboard, bus

CPU, memory, input


device, output device

windows 95

interpreter

assembler

coder

SQL * plus

all of the above

assembler

processor

system model

none of the above

ROM

Firmware

micro computers

none of the above

central processing
unit

none of the above

non impact printer

none of the above

electronic
spreadsheet

none of the above

Microsoft exchange none of the above

information

none of the above

high level language none of the above

multiplexing

none of the above

bulletin
broadcasting
system
very small

none of the above


none of the above

A
B

intermediate
network

none of the above

ftp service

none of the above

ARCHIE

none of the above

unlimited restore
locator

none of the above

command line

none of the above

browser

editor

ftp

telnet

Hyper text transfer


protocol
Hyper text transfer port

uucp

none of the above

telnet

none of the above

transfer
communication
protocol/internet
protocol

none of the above

higher type transfer


protocol
none of the above

mosaic,gopher

none of the above

dns

none of the above

hyper text markup


language

none of the above

books marks

none of the above

animation

none of the above

animation,scripts,ex
ecutables
none of the above

welcome page

none of the above

search engines

none of the above

ftp

archive

database

channel

Graphical interface Graphical Interface


format
format

Joint pictures expert Joint pictures


graph
experimental group

network
connections

mails

text or image

neither text nor image

applets

documents

MS Internet
Explorer and
Netscape Navigator None of the above

intranet

none of the above

wan

none of the above

packets

none of the above

email,file
retrived,internet
tools

none of the above

ARPANET

none of the above

defensive advanced
research projects
administration net none of the above

intranet,extranet

none of the above

cooking and dining none of the above

Hyper transfer
meta language

Hyper text markup


Language

united states &


Russia

none of the above

network

none of the above

servers

none of the above

WAN

none of the above

non-digital

none of the above

Manipulate/demani
pulate
none of the above

Manipulation

none of the above

Cable and wires

none of the above

Serial line protocol

none of the above

Pillar to pillar
protocol

none of the above

Accessibility of data
and computer
programs
All of the above

Check controls

Input controls

Both A and B

Neither A nor B

Slab

Digit

Field mask

Input mask

Overflow

Serial

Batch checks

File checks

Block batches

Transact batches

Transaction type

Sequence check

Document totals

Hash totals

Batch check

System test

Suspense account

Update account

Stub test

Top down test

Database Analyzers Database code

Transaction data
with master
transaction

Module programs with


snapshots

Mapping

Tracing

Item data

Record data

Graph testing

Whitebox testing

Test program pack

Test record pack

Parallel coding

Parallel simulation

Correct lister

Formulate correct
hypotheses

Sample audit trails Data audit trails

Simple sampling

Demographic sampling

File access

File reorganisation

Formatting output

Classify data on a criteria D

Statistical

Reporting

Limited ability to
determine
Limited ability to Verify
Propensity for Error Processing logic

Reading data,
selecting and
analyzing
information

Specific tasks with


original or modified
programs

Snapshot

Picture

System audit

Concurrent audit

Keyboard

Memory

1 GB

100 MB

Application
development

Data modelling

Information model

Logical model

64 bits

8 bits

Megaflops

Gigaflops

Backend processor Terminal processor

CAD

CCSIC

Memory card

Smart card

Value limited scale Very large silicon


ic
integration

32 bits

1 k bits

MU

CU

Program counter

Instruction register

Process register

Instruction register

SRAM

ROM

BIOS memory

ROM memeory

Optical memory

Flash memory

Thrashing

Paging

Cache memory bus Dual interface bus

Sound card

Media card

AGP

MCA

1280*1024

1280*680

Pulse

Wavetable

Scanner

Pen

Resolution

Lines

Pixel definition
languages

Page definition lines

Soft fonts

Soft settings

Dot-pitch

Size

Flickers

Size

Resolution and
sharpness

Signal and refresh rate

Light scan

Light pen

Photo-multiplier
tube

Optical sensitive tube

Optical

Joystick

Tablet

Pen

Winchester disk

Jaz disk

Spiral

Block

MCA

DAT

Linear velocity

Helical scan

Lomega

Imation

Zip disk

Hard disk

630 MB

2GB

CD-ROM

MO drives

Magnetic tape

Magneto-optical drive

DAT drives

MO drives

Kernel module

I/O module

Batch management Data management

Virtual memory
storage

Extended storage

Dividing

Preemptive

Multitasking

Multiprogramming

Multitasking

Multithreading

Win 2000
professional

Win 2000 advanced


server

Format allocation
type

File allocation table

Block

Table

NTFS

FAT32

NTFS

FAT32

Start directory

Tree directory

Allocation

Partition

Level 1

Level 3

Doc, xls, wzp

Tar, gz, taz

Vertical bar

Control bar

Minimize box

Maximize box

Dragging

Scrolling

Task bar

Command menu

Accessories

Favorites

Configure drive
partitions
independently

Confirm partition
capacity

Restore

Re-copy

My Folder

My Directory

Notepad

Wordpad

Net Drive

Net Watcher

Windows
Accessories

Internet Explorer

Desktop themes

Desktop icons

Hybrid

ASCII

Find

Restart

Documents

Settings

Port-to-Port
connection

Peer-to-Peer talking

Deployed access

Service access

Pin to Pin
communication

Port to Port Protocol

Serial Line Internet


Protocol
Setting Link Inter Protocol C

Indirect access

Dial-up access

Internet

Topography

Connection company
IC board cost, cable cost, connection data
cost
cost

Indirect software

Terminal communicator

Protocol

Simulators

30-bit address

32-bit address

Respond to mails

Delete mails

Telnet Control Port

Communication Control
Protocol

Sequence numbers Data numbers

Host

PC

Available FTP

Anonymous FTP

Binary File

TEXT file

Telnet

Message

Both A and B

Neither A nor B

Request the Archie


server
Protocol the Archie server A
Archie

Archives

Domain name
server

Domain relation server

Aaa/bbb/ccc/ddd

Aaa*bbb*ccc*ddd

Web

Mail

Uniform Resource
Locator

Uniform Reserved Link

Chat messaging

Information chatting

Line

Dot

Lines

Channels

Display channels
with at least ten
users

Display line with 10


removed channels

Shell accounts

Shell programs

Menu

Bookmarks

Gopher

Gateway

WINNET and
WAISLINK

WINSRC and FTPWAIS

SunScript

JavaScript

Eventcast

Livemessaging

Newsletter

Networkboard

Pine and Embedd

Port and Elm

()

Both A and B

Neither A nor B

Server
Server
message,command message,command line
line and channels
and channels

Java applets

Java objects

Net addresses

Web pages

Hyperlink

Hypernet

Wide maps

Web infos

Lynx

Mosaic

Web file

Txt file

Web creators

Web ports

New/Edit page

New/Edit Document

Pager

Document

Editor window

Form window

Both A and B

Neither A nor B

WinZip Plus

Webcow

File Format

Window Format

Excite
Links

Infoseek
Netshark

C
B

Thread

Retriever

Web publish

Page publish

Nettext

Hyperlimit

Lynx

Lycos

Image graphs

Image texts

Weblinker

Webcaster

Both A and B

Neither A nor B

Electronic Data
Internetworking

Efficient Data
Interchange

Electronic Format
Transfer

Electronic Fund Transfer

Value Aided
Networks

Value Enhanced
Networks

Negotiation and
servicing

Critical buying

Portal

Smart

Both A and B

Neither A nor B

Presentation Layer Transport Layer

Presentation Layer Physical Layer

Transport Layer

Network Layer

Internet Control
Data Protocol

Single Control Message


Protocol

Device programs

Software devices

Device Interface
Card

Network Interface Card

Server computer

Data computer

Combi card

Meta card

Electronic Socket
Layer Protocol

Cyber Socket Layer


Protocol

Grouped and
summarized

Assets and liability

Voucher

Trial Balance

P & L Account and


Balance Sheet

Voucher Account and


Balance Sheet

Sales

Asset

Taxes

Income

Nominal accounts

Expense accounts

Voucher

Expense

Balance sheet and


trial balance

Journal and ledger

Credit

Expense

Value expense
stock

Value income stock

Balance sheet

Asset sheet

P & L statement

Suspense accounts

Asset or liability

Profit or loss

Sundry debtors

Original entry

Liabilities

Suppliers

Expense side

Payable side

Project

Application

F12

F11

Tally Group

Tally Vault

Entry of Tally

Groups of Tally

Mercantile

Manufacture

Loan assets

Capital assets

Journal

Ledgers

Revenue nature

Income nature

Display

Shift

Primary-group

Alter-group

Sub-group

Alter-group

Alter-group

Multiple

General Ledger
master

Journal Ledger master

Assets

Loans

Voucher

File

F10

F11

Receipt

Contra

Payment

Journals

Choice entry mode File entry mode

File

Narration

Suppliers account,
Purchases account

Buyer's account, Cash


account

First of a month

End of a month

Sales Note

Payment

Current year

Configured date

2, 4, 3, 1

3, 4, 2, 1

Both A and B

Contra purchase

Receipt

Sales

Expense Purchases Debit Purchases

Stock Journal

Purchase Voucher

Debit

Contra

Trial balance

Journal

P & L reports

Expense reports

Net Profit

Net Account

Journal book

Day book

Data analysis

Transaction analysis

Expenses

Loans

Voucher date

Previous date

Stock flow

Cheque flow

On net transactions On net cash flow

On net transactions On net cash flow

Set company

Alter company

Accountant

Administrator

Period-less
accounting

Transaction-number
accounting

Tally Report

Tally Group

Tally.exp

Tally.ole

ODBC

MS-XLS

Sequence number

Range number

more than a day old more than a week old

F12

F6

XML

All of the above

Sort

Filter

Both A and B

None of the above

Relation

Sampling

Unix

SOFTCAAT

Calculation Editor

Testing Editor

Both A and B

File->Select Export ->


Print Report.

System validation

All of the above

Sampling

Export

Print Preiview

Append

File->Import as ->
Import to IDEA

File->Select Import ->


Import to IDEA

Formulate flaw
hypotheses

All of the above

Sequence checking Filter

Character Data

All of the above

Secondary Key

Composite Key

All of the above

None of the above

All of the above

None of the above

Common record

None of the above

B
A

Compare check

Data check

Sign Test

All of the above

spreadsheet and
mail merge format

All of the above

Un-compare

Randomness

On-line dated
checked

Mixed dated checks

Both A and B

None of the above

Both A and B

None of the above

Modelling

Source comparison

Model comparison

Exe comparison

Off-line Testing

On-line Testing

Program Library

All of the above

Log Analyzers
Software

Systax level

All of the above

None of the above

Investigation

Sorting

Both type

None of the above

To ensure the
entered data is
saved without fail

All of the above

Benford Law

British Law

Indexing

Linking the identified files A

Identify data, which


are not in
agreement with the Identify whether all fields
regular format.
have valid data.
C

Logical function

Relational function

Investigation of
fraud in audit area

To give assurance to
customers about the
performance of the
company

Sampling->
Benford's Law

Tools->Benford's Law

Without assigned
numbers, such as
bank accounts
numbers and zip
codes and with four
or more digits.
All of the above

Null

Is Null

Sampling

Relation

Relation

Data

Complete Banking
Solution

Centralized Banking
Solution

TCS

I-Flex

TCS

I-Flex

Party

IP

Web server

Clients Server

Auto Machanic

Allow to Machine

Internet Banking
Application
software

Internet Business
Authenticatin server

Positive Balance File Positive Balance Flex

Intranet

Net banking

Both A &B

Computer Planning and


Policy Department

Proxy

Firewall

NEFT

None

Routers

Middleware

Firewall

Middleware

Antivirus

None

Date base Server

Web server

Domain Controller

Network security

Librarian

Domain Controller

Routors

Thrashing

Automated
Technical Machine

Accelereated Teller
machine

Registering
requests for Cheque
book
All the above

IBAS

IBDS

Environmental
Controls

All of the above

Processing Controls All of the above

Processing Controls All of the above

Output Controls

Management Control

Equity Share
management

Clearing Module

Both A & B

None of the above

Standard Liquidity
Ratio

Stable Liquidity Ratio

Activity Logs

None of the above

Date and Time

All of the above

Internet policy

All of the above

IT

EDP

Cash Reversal Ratio Cash Reimbursed Ratio

Disastrous
Recovery Planning

Disaster Recording
Planning

Access Rights

None of the above

Operating System
Log

Activity Log

A
Know Your
Connection

Know Your Centre

Overdraft

All of the above

Electronic Journal

All of the above

Web server

All the above

Both A & B

None of the above

Top down

Bottom up

RTGS

None of the above

EFT,RTGS

None of the above

Remitting bank

None of the above

SSM

All of the above

EFT

All of the above

UTR

UTS

Unique
Transmission
Reference

None of the above

Strict Through
Processing

None of the above

WAN

MAN

Core Management
System

Centre Management
System

Audit of controls in
any banking
environment is
performed using
software audit
None of the above

Developing a
business continuity Laying down procedures
planning
for system development A

Core Banking
Solution

Web centre

Web centre

Central Office Data


Centre.

Database Server

Domain Name Server

Client version

Firewall

Wide Area Network Personnal Area Network

Domain Name
Server

Application Server

MAN

WAN

Uniform Transaction
Reference
None

Server
Development

System Development

Log management

Authorized Controller

The purpose of the


test is to identify
security
vulnerabilities and
then attempt to
successfully exploit
them.

This is often the most


preferred test as it is an
accurate simulation of
how an outsider/hacker
would see the network
and attempt to break into
it.
B

Implement new/
changed
programme as per
schedule.

It is important that
correct latest version of
programe is used but
version number need not
be changed.
D

Old offset value erased


Natural Pin remains and new offset value
the same.
generated.

Test Server

None of the above

WANs

MANs

protection

Validation

Centralised Data
base security

Central Office Data


Centre.

TCS

I-Flex

State zone

demilitarised zone

IBDS

All the above

Both A &B

None of the Above

Application
Software

Application Server

Broadband

None

Net transaction ID
NO

ATM No

Process Control

Data Control

Letter of Payable

Letter of Receible

Disaster Recovery
Planning

None

(a) & (b) both

None of above

TCS

I-Flex

Network
Administrator and
Security
Administrator.

Tape Librarian and


database administrator.

Pin No - Natural Pin Offset Value - Natural Pin C

Cash register

(a) and (b) both

Natural Pin

Card Number

Sybase

Foxpro

Dataview

All of the Above

Insert

Attached

Set as Switchboard
startup Option in
Access Option
None of the above

Modify Option

Build Option

A
B

AlphaNumeric

Date

Both A and B

Report

A button

All of the above

Click->File tab>Option ButtonClick->File tab->>Quick


>Quick Access
Access ToolbarToolbar>Command not in
>Switchboard
Ribbon->Switchboard
Manager->Add->OK Manager->Add->OK

Opens the
Switchboard
Manager.

Opens a report in Print


Preview.

Both A and B

None of the above

Seven

Six

Action query

Action Box

4GL

None of the above

ApplyFilter

UseFilter

RunQuery

FindQuery

AND

<>

Text

Date & Time

Text

Date & Time

{}

258

128

Right-click the table


and select send as
XML
Both A and B

Aliases name to the


tables
Both A and C.

Both A and B

None of the above

Both A and B

None of the above

As many

All of the Above

Avg()

All of the above

Countif()

All of the above

IS NULL

All of the Above

Action query

Both A and B

Cross table Query


Wizard

All of the Above

View Records

Update Records

Right outer join

Full join

Right outer join

Full join

Inner join

None of the above

Inner join

None of the above

Select Design ->


Show Table

Select the table from


navigation Pane.

Reprt

Macro

Function

All

different data type Same data type

Number Literal

None of the above

Comparision

None of the above

Relational

None of the above

Both A and B

None of the above

returns true or false None of the above

BODSAM

None of the above

Both A and B

None of the above

three

four

As many field

All of the Above

Structured Question
Language
System Query Language B

Both AND

LIKE AND

IS OR

LIKE OR

Any one table

All of the Above

3Acc

ess

Lower()

None of the above

Trim()

None of the above

Expression Box

Expression elements

Oracle

C++

The order of the


Each column has a
rows and columns is specific range of values
immaterial to the
known as the Tuple
DBMS
domain

Records with date


before 2011

All of above

Base Database

None of the above

Expression Box

Expression Builder
window

Will match all text


having second
character as B

Will match all text


starting with a digit

Action query

Parameter query

Any where in the


table

Beginning of the table

Table but not in


Form

Form & Table

Graphics Control

Bound Controls

Record Source

Picture

Inside-Report

Insert-Report

Table or query,SubReport
None of the above

Detailed Definition
Language
Data Detailed Language

Bar Chart

Column Chart

Bar Chart

Column Chart

.MDW

.ACCDT

Both of them

None of them

File->Save as>Save Database


as->Package and
sign

File->Save&Publish>Save Object as>Package and sign

Visual Basic
Application

Excel attachment

Manage replies

All of the above

Date/time

AutoNumber

For shout text entries of


no more than 255
For long text entries characters

Records that meet


any of several
criteria you specify All of above

Data Manipulation
Language

Detailed Manipulation
Language

The QuickBasic
editor

All of above

Click the report,


and on the Pivot
Table toolbar, click
the refresh data
button

All of the above

Pivote Table & Pivot


Chart View
All Of Above

Memo

Lookup Wizard

Macro

Report

DDL

None Of Above

Authorizing Access
And Other Control
Over Database
None Of Above

Object Oriented
Database Model

Structureed Database
Model

Date/time

Hyperlink

Establishing
Relationship

None Of The Above

have to update
manually

never update

Query

None Of These

To allow the user to


switch from one
database file to
To allow changing from
another.
one report to another.

It doesn't have as
many design
options.

The only report type


available is the Design
Report.

Use the Mailing


label wizard text
option.

Use the >> button.

Page Footer

Page Header

All The tools of the


form design control
gallery.
Form Wizard Columnar

Protects the VBA


code from being
viewed or edited
while still allowing it
to run.
All of the above

Open-down

None of the above

Delete Query

Parameter Query

Open Exclusive
mode

Open Read Mode

()

""

Text

None of the above

Report

None of the above

Read

Write

File Tab ->Security


Options, and
selecting the Trust
Centre tab from the
Access Option
window
None of the above

A
File tab

Database Tools

Report

All of the above

Query

Report

primary database &


secondary database None of the above

Web page

None of the above

Organization

Concern

Data Mines

Operational Data

Subject-Oriented

Informational

Volatile, Static

Static, Dynamic

Informational,
Informational, Static Operational

Metadata

Basedata

Informational

Operational

B
A

Logistics
Management

All of the above

Data Mining

Data Modeling

Product Life Cycle


Management

Supply Chain
Management

Sales

Resources

Stepped

Outline

C2B

C2C

Unsuitable for
conventional
applications

All of the above

Open-Project

ERP5ERP

BPM

None of the above

Top Management
Commitment

Either A or B or C

package

units

Split

Backup

Business Process

Business Operation

Extranet

Any of the above

Tally Vault

Tally Data Conversion

Synchronization

Asynchronization

Tally Support

Tally Chat

Cloud Centre

Administration Centre

Encryption

Decryption

Sales

Purchases

Code name

All of these

Journal mode

Contra mode

Non-Integrated
Information
Systems

Non-Isolated Information
Systems
A

Allow 0 value entry Use Rej Notes

Purchase Journal

Both A & B

SDF Format

HTML Format

Assumption

All of these

Both A & B

Neither A &B

Display > Statutory Display > Statutory


Masters
Reports

D
A

Receipt

None of these

Reminder Letter

None of these

Conceptual

Logical

Business Process

Business Operation

multi dimensional

none

ASCII

ALL

Tally.Net

None of the above

Internet Data

None of the above

Both A & B

None of the above

Data Entry

Tally.NET User

flowcharts, flow
diagrams

graphs, shapes

Establishing a data
warehouse help
desk and training
users to effectively
utilize the desktop
tools
All of the above

Product Life Cycle


Management

Supply Chain
Management

PLM

CRM

Online Analytical
Programming

None of the above

Sourcing planning

Production planning

PLM

CRM

Step 3

Step 4

installation

migration

post
implementation

None of the above

Both A & B

Either A Or B

Real Time
Processing

Business Processing

Form 26Q,
Annexure to 26Q

All of the above

File Valuation
Program

File Valuation Utility

isolated

de-centralized

Business Modeling

Business Intelligence

resource driven

none

operational data

none

data

none

supply and sortage none

hybridbound
operations

none

strategic

none

staff

none

SCM

none

cryptography

none

Decision Support
Systems

Non-Isolated Information
Systems
C

Tally Fit

Tally AutoFit

Unlimited multiuser support

Audit Feature

Tally.NET

Email facility

Either A or B

None of the above

Business Modeling

Business Intelligence

A
B

Paste Document

My Templates

Email hacking.

Email tracking

Web spoofing

Web threating

Billing and
Accounting
software

K-DOC application

Email Management Share certificate printing D


ICAI XBRL Software Payroll

ICAI XBRL Software ICAI-ROC application

Internal auditiing

None of the Above

Both A and B

Either A or B

Section 43B

Section 44AB

Either A or B

None of the Above

Foreign Exchange
Managament Act

None of the Above

Document
Management
Systems

Client management

System
administrator

User Administrator

AR module

FA module

B
Invite and analyze
quotations from
vendors

Comparison with budgets D

Expense
Management

Fixed assets

Accounts Payable

Accounts Receivable

Expense
Management

Bank Reconcilations

Knowledge
management

None of the Above

Confidentiality,Inte
grity and Access
Confidentiality,Integratio
rights
n and Authentication
A

Payroll

Timesheet application

Automated alerts
for pending
appraisals

Prepare summary or bell


curve analysis of all
employees
B

Payroll System

Knowledge management
System
C

Error free capture of


leave details
Approval workflow

monthy

quarterly

Copies of clients
Copies of important
incorporation
contracts or long term
documents like MoC lease agreements

Cost effective to
maintain the
documents in soft
copy

All the Above

Classroom Training E-Training

Virtual Learning

All the Above

WAN

All the Above

Availability

Authentication

Both A and B

None of the Above

WAN uses only


private networks.

Switches are used to


connect LAN and WAN

Information
Security

None of the above

Own documents

All the above

Integrity

Authentication

Confidentiality

Availability

Authentication

Confidentiality

operational

vulnerable

Confidentiality

Integrity

HR and Payroll

None of the Above

Billing and
Accounting

ICAI-TOC

Private Branch
exchange

Public Branch exchange

Extensible Markup
Language

EXtensible Makeup
Language

Visual Basic for


Apple

None of the above

Structure and store Store and transport


information.
information.

Java

C++

Both A and B

Nither A Nor B

Developer
Developer
tab>Modify>Macro tab>Controls>Macro
Security
Security

View

None

Knowledge of cell
linking & basic
formulae

Knowledge of all of the


above.

Return on Enquary

Return of Equalisation

ANOVA

None of the above

Multiple Regression Single Regression

Liquidity Ratio

Solvency Ratio

.xlsv

.xlsw

Liquidity Ratio

Solvency Ratio

Both A and B

Nither A Nor B

Analog of Variance

Analysis of Variance

MONTH()

YEAR()

For calculation of
depreciation as per
Variable Declining
Balance Method.

For calculation of
depreciation as per
Double Declining Balance
Method.
B

For calculation of
depreciation as per
Variable Declining
Balance Method.

For calculation of
depreciation as per
Double Declining Balance
Method.
A

For calculation of
depreciation as per
Declining Balance
Method.

For calculation of
depreciation as per
Double Declining Balance
Method.
C

For calculation of
depreciation as per
Declining Balance
Method.

For calculation of
depreciation as per
Double Declining Balance
Method
D

W2C

W4C

For calculation of
depreciation as per
Declining Balance
Method.

For calculation of
depreciation as per
Double Declining Balance
Method.
A

Profit Volume Ratio Profit Variance Ratio

Balance Equal Point Break Equal Point

Data

Developer

INDEX()

LOOKUP()

Math & Trig

Arts

Financial

Math & Trig

Net Present
Variance

Negative Present Value

SYD

SLN

<=

<>

C++

JAVA

A
A

None

MODE()

REMAINDER()

Formulas >
Function > Show
Formulas.

Formulas > Formula


Auditing > Function >
Show Formulas.

Financial
statements

None

investment and
securities.

None of the above

Current Rate

Clear Rate

Quality Rate

Quick Ratio

D
A

Data Type Definition Data to Data

Average collection
period

None of the above

Fair assets turnover Fixed assets turnover


ratio
ratio

Salary

Number

Document

Detail

Change in
technology

All of the Above

Manufacturing - Total
Product - Total Cost Cost

Both A and B

None

11

12

(.mlx)

(.xlm)

Perodic

Report

Hold down the ESC Hold down the ALT key


key during start up. during start up.

Bold Formatting

Negative Formatting

Worksheet
functions

Round( ) functions

Mode

All of the above.

= 1 / (1+a) ^ 2

= 1 / (1+r) ^ n

Fund flow

Expenditure

life

Factor

Both A& B

Actual Budget

Developer

Data

Discounting

None

PMT

None

Elements

Markups

Leasing decisions
and the list goes on All of Above

Sheet2(C4)

Sheet2<C4>

A1, A2 , A3, A4

A$1:A$4

ETIB / Debt interest EBTI / Debt interest

EXCELSTART folder XLSTART folder

Further changes in
value of A1 will not Further changes in value
affect B1.
of B1 will not affect A1.
B

Personal Finance
Corporate Planning Planning

B
A

Financial planning

Personal Finance
planning

Decision Tree
Analysis

Corporate Planning &


Analysis

Total Fund Ration

None of the above

Price Earnings
Multiple

Gross Profit Ratio

<?xml
version="1.0"
encoding="ISO8859-1"?>

<?xml version="0.0"
encoding="ISO-8859-1"?
>
C

</TagName>Data< <TagName>Data<TagNa
/TagName>
me>
A
PMT(rate, pv, nper, PMT(pv, rate, nper, [fv],
[fv], [type])
[type])
IPMT(per, rate,
nper, pv, [fv],
[type])

IPMT(rate, per, nper, pv,


[fv], [type])
D

File
Menu>Options>Ad
d in>Excel Add
In>XML
None of the above.

XML Maps Dialog


Box

None of the above

status of assess

All of the above.

Equal Monthly
Installement

Equated monthly
installment

PMT

None of the above

Systematic
sampling

Simple random sampling B

Systematic
sampling

Simple random sampling C

Systematic
sampling

Simple random sampling D

Snowball sampling Simple random sampling C

IRR

NPV

Capital Investment Investment management B

net present value

All the above

(.xlm)

(.mlx)

IRR

PMT

Qualitative risk
analysis

Scenario analysis

Qualitative risk
analysis

Scenario analysis

Both A& B

Charts

Both A& B

Neither A &B

Decision Tree
Analysis

None

Total Interest Value Number of Periods

COUNTIF()

None of the above

Profitability Ration

None of the above

Rent

All the above

P & L Account and


Balance Sheet

Voucher Account and


Balance Sheet

Sales Note

Payment

Sequence number

Range number

more than a day old more than a week old

Statistical

Reporting

Potrebbero piacerti anche