ICAI ITT Questions

June 15, 2016 | Author: DINESH GOYAL | Category: N/A
Share Embed Donate


Short Description

ITT Questions...

Description

QUESTION

A

B

Collection of instruction is called a _____

procedure

batch

Combination of alphabetic and numeric data is called _____ data

alpha numeric

alpha beta

Computers can be classified based on ______,______and _______

space occupied, price, cost, performance no. of users allowed their ratio

_____________ is the Worlds largest computer network .

Ethernet

Internet

_________ are used in large organizations for large scale jobs

mini computers

microprocessors

_______ devices are responsible for feeding data into the computer

input

output

_______ is the capability of the o/s to run numerous applications simultaneously multiprocessing

multithreading

_______ involves conversion of raw data into some meaningful information

interpreter

compiler

_______ device is responsible for obtaining the processed data from the computer

input

processor

_______ printers use light to produce the dots needed to form pages of characters impact printers

drum printers

control program, interpreter, Hardware components in a operating system, assembler, computer are _____,____,_____,______ bootstrap, kernel, shell compiler _______ software helps to do a specific task for the user

operating system

application software

_______ converts a high level language into machine language

processor

compiler

_______is/are a popular front end tool visual basic

power builder

_______ translates assembly language program into machine language instructions

interpreter

compiler

The model through which the relationship is diplayed between data and information is called_______ processing model

model

____________looks like a ordinary credit card but incorporate a microprocessor and memory chip____________

RAM

smart card

______ computers are used in large organizations for large scale jobs which have large storage capacities mainframes

super computers

_______ is responsible for all calculations and logical operations that have to be performed on the data

control unit

arithmetic and logic unit

______ printer use laser light

band printer

drum printer

______ software enhances the user to enter ,store, manipulate and print any text data management

word processing

_______ is the temporary storage place for deleted files

my computer

recycle bin

Processed data is called ___________________

data

datum

_____ language consists of strings of binary numbers assembly language

machine language

_________capability supports concurrent users doing different tasks

multiprocessing

multithreading

BBS stands for______ USENET is a BBS on ____ scale

business broadcasting bulletin board system system small large

Internet can be defined as _______

internal network

network of network

_________is a program that displays information about a host connected to the net finger service

ping service

_______ is a program or a tool that helps in locating a file anywhere on the net FTP

TELNET

URL stands for ____________

uniform research locator

uniform resource locator

A ______ always begins with a slash

message

scheme

The World Wide Web is referred to shortly as the _______

net

web

______ is a program that helps us to log on to other networks Usenet

finger service

HTTP is the acronym for __________

Higher text transfer protocol

Hyper text transmission port

______is used to transfer and copy files over the internet

iccp

ftp

_____ is a program that helps us to log on to other networks

yahoo

ftp

TCP/IP stands for ________________

transfer control protocol/internet

transmission control protocol/internet protocol

HTTP stands for______

hotlink text transfer protocol

hyper text transfer protocol

Two of the important browsers are_____ and_____

lynx,minx

netscape,ie

________ are defined as ways of communication amongst networks

protocols

IP address

HTML stands for_____

higher text medium language

hyper transfer markup language

The system of interlinked documents is known as_______

hot links

hyperlink

The small programmes that create animation,multimedia,real-time games and multi user games are called______

images

applets

The information displayed on the web page includes______,_____ and_____

programms,images graphics,videos,audio ,text

The web pages that represent online home of their author are called______ first page

home page

_____ is the most popular internet service

electronic mail

yahoo service

_______ is a program or a tool that helps us find a file anywhere on the net newsgroup

telnet

Yahoo,lycos,excite and webcrawlers are _____ search engines

web directories

GIF is the acronym for ____________

Graphical interpreter formatting

Graphical interchange Format

JPEG is the acronym for ___________

Joint Pictures Expert Group

Jumbled pictures expert graph

The World Wide Web consists of _________

information

web pages

A hyperlink can be on ___________

text only

image only

Web is a collection of ___________

web sites

images

The two major browsers used to surf MS Internet Explorer the Internet are ________,_______ and Mosaic

Netscape Navigator and Mosaic

The internet is also called as _______________

arpanet

the net

The internet is similar to _________________

LAN

peer-to-peer connectivity

The net transfers______ from one place to another

data

parcel

The net provides interesting services like______,______ and______

scripting,parsing and compiling

news,cooking and fine arts

________ is the ancestors of the internet

dnet

arpanet

defensive DARPA stands for administrative rank _____________________________________ administration __________ network DARPA is broken into ________ and _______

dedicated and registered projects administration

milnet,smaller arpanet mailnet,inet

NSFNET is the united states provides service to _____ and_____ education,research

music and dance

HTML stands for _____________________________________ Higher text Hotlink text _ manipulation language markup language The first international IP network connections were established in 1973 with _____ and_____

united states and UK

england,norway

A_____ is a set of computers interconnected by transmission paths to exchange information in internet

server

client

A computer that provides a service usable by other computers is called______

client

stand-alone

_____ can be owed by multiple organisation

LAN

MAN

Data is transmitted in the form of_____ signals

analog

digital

Modem stands for __________________ Moralize/demoralize

Modulation/demod ulation

______ is the process of the digital signals being converted into a form suitable for analog transmission Mapping

Modulation

________ and______ are two basic ways of getting connected to the internet

Satellite link and digital signals

Dedicated access and dial up access

SLIP stands for ________________

Standard long internet Stream line protocol internet protocol

PPP stands for _____

Prime prolonged protocol

Point to point protocol

Identify the need for controls and auditing in a computerised environment.

Absence of input documents

Lack of visible transaction trail

The organisational, management, maintenance and access controls are categories of ……

Application controls

General controls

The application controls are ….

Input controls

Processing controls

Identify the field check - "If a set of values is defined, is the input data one of these defined values?"

List

Range

The field check that conforms if data input for a field is in a particular format. Format mask

Data mask

The field check on a processed data that fails if a field is not initialized to zero or errors occur during calculation is…… Range

Sign

The validation checks applied to a field depending on its logical interrelationships with the other fields in the record are called …..

Field checks

Record checks

A group of records or transactions that are contiguous constitute …..

Physical batches

Logical batches

…………..is the type of batch check (group of records) for all input records of a particular type is done. Control totals

Serial number

Grand totals calculated for any code on a document in the batch are called….. Financial totals

Record totals

Control that checks if correct sequence of commands and update parameters are passed from the application software to the database. Table level

Data Integrity

With respect to data integrity control, when monetary transactions are processed against master files without a match, we should maintain a …. Sequence account

Data account

The system test that tests the toplevel modules first and then the lower modules are simulated with dummy modules to check the interfaces is called ….

Bottom up test

Hybrid test

Identify the audit technique that examines each transaction as it passes through the system.

Embedded code

Program code

The Core Image Comparison audit technique compares the….

Executable Database with master program with table master copy

The technique used by an auditor to list unused program instructions is….. Modelling

Analyzing

The sample data created and used for the purpose of testing the application system is called….

Test data

Table data

The test data (dummy unit) implemented in the normal processing of the system over a period of time is known as….

Black box Test Integrated Test Facility Facility

The test data generated with correctness proof, data flow analysis and control flow analysis tools is called…. Test item block

Test data pack

When a real-time system is simulated to generate the same output as the real-time system, the technique is called…. Parallel trailing

Tracing parallel

When an auditor expands the extent of substantive tests to determine the impact of defects on the attainment of program objectives, the methodology is…. Cross reference lister

Formulate flaw hypotheses

This is an important control in systems that use digital signatures for authentication purposes.

Public audit trails

Random audit trails

Selecting transactions based on a sampling rate is called …. method.

Transaction sampling

Systematic sampling

The capability of the generalized audit software to read different data coding schemes, different record formats and different file structures is…. File size

File data

The audit software capability of frequency analysis is to….

Sort and merge files

Sampling nth item

The audit functions of attributes sampling, variables sampling, stratified sampling are included in …. functions.

Stratification

Selection

Identify the functional limitation of a generalized audit software that enables evidence collection only on the state of an application system after the fact. Ex Post Auditing Only

Analytical review only

The purpose-written audit programs Sorting, creating, and Data retrieval, are used for….. printing files code comparison Picture of a transaction as it flows through the computer systems is called…..

Program

Track

Identify the type of audit when auditors are members of the systems development team.

General audit

Post audit

The processor uses this workspace as a scratch pad during processing. Monitor

Processor

1024 Megabyte is equivalent to:

1 KB

1 MB

The software used for layout of newsletters and magazines along with text and images is called……

Application software

Desktop publishing

The model used to describe the relationship between data and information is called

System model

Data model

A super computer uses a bus width of……

16 bits

256 bita

When a processor executes one billion floating-point arithmetic operations per second, is called…..

Nanoflops

Tetraflops

The processor responsible for communication to and from all the remote terminals connected is termed as ………

Front-end processor

Host processor

The processors used for speedcritical graphics applications are…… CISC

RISC

The plastic cards with embedded microprocessor and memory are called…..

Credit card

Computer card

VLSI stands for…..

Very large scale Integration

Very limited silicon integration

The data width of a Pentium 4 computer is ……

16 bits

8 bits

The unit which executes addition, subtraction, multiplication and division operations is ……

CPU

ALU

The instructions to be executed by the processor are loaded from memory into the

Instruction unit

Process register

The results of a process are stored into ………

Accumulator

General-purpose Register

The memory that stores data as a series of memory cells that can be accessed sequentially is……

DRAM

SAM

The technology used to accelerate the processing of a computer is ………

Processor bus

Cache memory

The memory used in a computer's BIOS chip is……..

Cache memory

SRAM

The process of swapping information between the RAM and hard disk can cause Fragmentation

Disk full

The standard system bus was replaced by frontside and backside bus called…….

Dynamic memory Dual independent bus bus

The DSP,DAC,ADC,and ROM are parts of the ……

Graphics card

Memory card

The bus whose widths are 32 or 64 bits is called……

ISA

PCI

The maximum resolution of a standard SVGA adapter is ……

1024*640

780*1024

…………. synthesis method uses recordings of actual instruments.

Amplitude

Frequency

The instrument that can produce continuous lines is…..

Printer

Plotter

PPM , CPS are units used to measure the printer's ….. Speed

Quality

The PCL and postscript are defacto standards for……

Page definition limit

Page description languages

A laser printer has RAM for downloading fonts called the…….

Font catridges

Dynamic catridges

The characteristic which refers to how sharply a pixel appears on the monitor is called…..

Convergence

Resolution

The faster the refresh rate, the lesser the monitor…..

Sharpness

Resolution

Size of image

Colors and shades of gray that can be displayed

The number of bits used to represent a pixel in a monitor decides the …….

The input device that utilizes a lightsensitive detector to select objects on a display screen is called….. Touch screen

Touch pad

The most commonly used scanner technology is….

Optical character Charge-coupled device recognition

Identify the type of mice that uses optical sensors to detect motion of the ball.

Mechanical

Optomechanical

Identify the input device that consists the puck and the stylus.

Trackball

Joystick

Identify the disk which has an access time of 30ms.

Zip disk

Floppy disk

A set of tracks across a set of platters in a hard disk is called a…… Disk

Cylinder

The bus used to connect a CD-ROM to your computer is…..

SCSI

PCI

The digital audio tape with the capacity of 24GB of data uses the technology called …..

Hyper circles

Fero magnetic

The floppy disks that support 400k1.2 MB belong to…… IBM

Macintosh

The backward compatible disk that has high density-120MB is called…. SuperDisk

Jaz disk

The maximum capacity of an optical disk is …… 700 MB

6 GB

Which of the auxiliary storage devices uses the constant angular velocity access technology?

Super disk

DAT-ROM

The……..is an auxiliary sequential access non-volatile storage device.

Winchester disk

Zip disk

The portable device that optimizes the features of the floppy and the CD-ROM is….

Hard disk

Jaz disk

The important central module of an operating system is the….. Memory module

Data module

Identify the function of the operating system that manages the tasks waiting to be processed. Job management

I/O management

This function of the OS manages allocation of a minimum main memory to tasks.

Disk storage

Memory storage

Identify the multitasking type that slices CPU time to each program.

Paralleling

Cooperative

The OS which allows different parts of a single program to run concurrently is…..

Multithreading

Multiprocessing

The OS that monitors external activities with timing constraints is….

Multi-user

Real-time

The 32bit operating system for desktop version that replaces Win 9x is…..

Win 2000 server

Win 2000 datacenter

The high-level logical disk structure which defines the way the entire disk is organised is ….. Frame allocation table File allotted table A collection of sectors on a hard disk is a Block sector

Cluster

The FAT system that provides long filename support and was written using protected-mode code .

FAT16

VFAT

Identify the file system that provides networking,security,compression, large file support…. FAT16

VFAT

The logical directory structure has a base of the tree called the…… Root directory

Main directory

The process used to optimize the disk space by arranging files contiguously is …..

Defragmentation

Formatting

Choose the level of RAID that offers disk mirroring for fault tolerance. Level 0

Level 2

Identify the archive formats found on Unix-based Internet sites.

Exe, zp, tz

Zip, LZH, ARJ

Identify the window screen part that indicates the name of the window, application or document. Title bar

Menu bar

The button on the title bar of a window that displays the menu to control the size of the window is….. Scroll box

Control box

The mouse operation that is used to move windows and icons to different locations is ….. Click

Double click

The start button,tray and shortcuts are important features of the …….

Control panel

Title bar

The start menu option that keeps track of your important websites is …..

Documents

Programs

If you want the recycle bin capacity to be distributed across partitions, Configure drives you must use the option …… independently

Configure capacity independently

The feature to retrieve deleted files from the recycle bin is ….. Re-paste

De-link

The feature which enables to synchronize files between a floppy and disk is …..

My Briefcase

My Documents

A file with the pdf extension can be viewed with the application….. Adobe Acrobat Reader Adobe Viewer The remote administration access to view shared resources on the network is….. Net Neighbourhood

Net Tracer

The utility used to access the directory structure, create files and folders etc is….

Windows Explorer

Windows Tools

The font, color, background settings are saved in the ….. Control panel

My computer

The Notepad utility saves files in the …… format. Binary

Unicode

Identify the windows feature that allows more than one person to use a single PC with his own desktop. Log off

Run

You can quickly access the recently worked on files from this start menu option. Favorites

Accessories

The Internet is a network similar to …..

Peer-to-Peer connectivity

Point-to-Point link

When a computer is connected to the internet through a LAN

Dial-up access

Dedicated access

PPP stands for:

Protocol to Protocol Points

Point to Point Protocol

SLIP stands for:

Serial Limited Internet Serial Lock InterProtocol Protocol

When a user connects to Internet with a shell account it is called ……. Direct access

Dedicated access

The launch of DARPA's Internet Protocol (IP) facilitated the term….. Network

Consortium

The costs of Internet implementation are…..

Computer cost, network card cost

Connection cost, cost of telephone line

This software enables a host to work as a terminal on the network. Terminal embedded

Terminal emulator

The Windows Internet application functions were developed based on the UNIX programs called….. Sockets

Package

Each computer on the Internet is identified with a….

24-bit address

16-bit address

A mail server robot can automatically….

Check mails

Read mails

This protocol is used to check reliability, sequencing and flow control.

Transmit Communication Protocol

Transmission Control Protocol

To check that data reaches the destination in a proper order, the data packets are assigned….

Order numbers

Packet numbers

The computer which provides FTP, WWW, Mail services on a network is called…. Client

Server

The method of accessing files through publicly accessible server that gives free access to the files is called ……

Server FTP

Public FTP

This file is transferred verbatim with FTP service. ASCII file

BIT file

We can access the Archie server by……

Tunnel

WWW

The types of Archie servers are …..

Straight Archie

Windows Archie

% telnet archie.ans.net is the command used by the Archie client Program the Archie to…. Login to Archie server Server This tool helps us to locate a file anywhere on the Internet.

FTP

Remote

The computer that maps the Internet domain name to the Internet numeric address is the …..

Network translator server

Address Naming server

………….is the format of Internet Address.

Aaa-bbb-ccc-ddd

Aaa.bbb.ccc.ddd

The email address has two parts one is the username while the other is the …. Domain

Net

The resources on the World Wide Web are linked with the naming format …..

Universal Resource Locator

Universal Resource Location

This Net tool provides a stimulating on-line discussion environment. Internet Relay Chat

Relay packet transmission

The IRC II client program command begins with a ….

Slash

Percent

The IRC conversations are organized into…. Chats

Packets

Identify the output of the IRC command " /list -min 10" .

Display chats with Display channels with the maximum 10 at least four users users

Lynx text browser is a web client in which users can login with …..

Self accounts

Terminal ping

A web browser provides this hotlist for a user.

Book-keeping

Bookmarking

The tool to obtain information on the web by menus and more flexible than Archie is…. Lynx

Juggler

These servers help in searching for words from a list of databases or documents.

WIIS and NETWAIS

WINWAIS and WAISMAN

This scripting language is an object based language and is developed by Netscape. SGMLScript

VbScript

The one-way broadcast of live events is called….

Cybercast

Netcast

This is a system of thousands of distributed bulletin boards and read by a newsreader. Bulletinreader

Newsgroup

Unix shell provides mailing programs called ….

Pile and Elem

Pine and Elm

The Unix to Unix copy mail system separates parts of the mail address with the symbol...….. @

!

The Netlauncher (TCP/IP) software consists of these programs that can run under Windows. Spy Mosaic

Image View

The parts of the WSIRC server (net tool) window are…..

Server message, command line and channels

Server message,command line and channels

These are small java programs that create games, multimedia etc. These are downloaded over the Net and executed by a web browser. Java scripts

Java exe

The World Wide Web is a collection of…..

Web windows

Net pages

It is a link which helps in retrieving information from the WWW easily.

Netlink

Sitelink

…………..directories deliver information on all the topics on the Internet.

Web maps

Net ports

This browser does not display links in color.

Netshark

Cello

The Mosaic browser stores information about the configuration in a/an …. Ini file

Exe file

This is an indexer that crawls around the web cataloging. Webcrawler

Web sites

The option by which the browser window in Navigator Gold 2.0 can be shifted to editor window is …. Edit/New file

Edit/Save Window

This toolbar button displays information about web creation.

Web page starter

Printer

This window in Navigator Gold does not support frame display. Script window

Browser window

The different ways of communication on the Web are…..

Interpersonal

Group

This download tool provides multiserver connection, can search for mirror sites and provides a file leecher.

Download Accelerator Plus Fresh Download

The…………button provides HTML tags for font style, alignments, and colour options.

Edit Format

Character Format

Identify the search engine that helps in concept based searching. Lycos This is a text only browser. Lycos

Yahoo Lynx

The multithreading feature of Netscape is facilitated with a storage space named…..

Archive

Cache

The distributed uploading of web pages through Navigator Gold is called…..

Web loading

Web updation

The method of presenting information on the web through highlighted items is called……

Hypertext

Webtext

The a2z directory is an alphabetical list of pages used by the search engine….. Netleecher

Webindexer

Netscape browser can display context links on an image called….. Image webs

Image maps

Name the download tool which highlights an area of a page and gets all the links that are within the highlighted area. Webcrawler

Webcow

………...helps in business transactions, generating revenue and demand on the information highway.

E-Marketplace

E-commerce

The transfer of structured data for processing from computer to computer using agreed formats and Electronic Document protocols is called….. Intercahnge

Electronic Data Interchange

This system involves electronic transfer of funds between financial institutions.

Efficient Format Transactions

Electronic Financial Transmission

A …… electronic mailbox stores EDI Very Advanced transactions for later retrieval. Value Added Networks Networks The mutual satisfaction of price, terms and conditions, delivery and evaluation criteria in a marketplace Negotiation and is…. Bargaining

Networking and Buying

The type of advertising, the Broadcast and Junk Mail models are of….. Passive

Push

Identify the models of passive advertising.

Billboard

Portal

This layer is responsible for transmitting data as frames.

Network Layer

Data Link Layer

This layer is responsible for encoding of data.

Link Layer

Network Layer

This layer of the TCP/IP suite includes the device driver and network interface card.

Application Layer

Link Layer

This protocol is used for flow control, Simple Mail Transfer echo and flow redirection. Protocol

Internet Control Message Protocol

The software components that integrates different hardware devices with the operating system…..

Device drivers

Device modules

This is the basic component that connects the computer to the network.

Cable Interface Card

Netlink Interface Card

The dumb terminal/node in a network depends on this computer for their basic functioning.

Personal computer

Client computer

This has an embedded microchip which can both manipulate data and execute applications. Data card

Security card

To ensure a reliable communication between the buyer and seller, the Session Socket Layer protocol used is…. Protocol

Secure Sockets Layer Protocol

The financial transactions are to be …………. leading to different steps in Collected and Accounts Compilation. computed

Sampled and stratified

The basic document where transactions are entered chronologically is….

Ledger

Journal

These are the basis for analysis by potential investors, banks etc.

Journal and Ledger

P & L Account and Journal

The accounts that the business owns is called ….

Liability

Income

The expenditure for running the business for a period is …..

Expense

Example

Identify the account type by the rule: "Debit the receiver and credit the giver".

Real accounts

Personal accounts

The first document where the transaction is entered is called a ….. Ledger

Liability

The document used for posting of accounting transactions is ……....

Ledger and trial balance

Voucher and journal

When the debit total is greater than credit total, the amount appears in the …….. column. Income

Debit

The methods LIFO, FIFO, Moving Average are used to ….

Value clearing stock

Value closing stock

The report prepared taking the asset and liability type accounts from the Trial Balance is called…. P & L statement

Income statement

The report that depicts operating profit/loss for a period is …..

Trading account

Trial balance

The day book contains transactions relating to ……… Income or expenditure Sales or purchase

The Bills Receivable details are maintained in a ……..

Journal sheet

Voucher debtors

Creditors ledger has details of your dues to ……..

Customers

Assets

The sundry debtors are placed in the Balance sheet on the …… Income side

Assets side

The first step in Tally before any transaction is entered or saved is creating a ………

Company

File

To configure country specific details use the function key…… F10

F2

Identify the security mechanism used in Tally.

Tally Secure

Tally Pack

After selecting a company in Tally, you will be in the……

Accounts of Tally

Gateway of Tally

Tally software is based on ……… accounting system.

Sales

Production

Identify the primary group of capital nature that uses bank account and cash in hand as sub groups. Fixed assets

Current assets

All financial entries in Tally are done using……. Vouchers

Groups

The Direct expenses, Purchase account, Direct income are primary groups of …..

Expense nature

Capital nature

The option to delete a sub-group is admissible through the menu…… Alter

Delete

The behavioural attributes of this group cannot be changed.

Sub-group

Ledger-group

Credit limits for personal accounts and branches can be done in the ledger mode……

Single

Multiple

We are not allowed to delete a ledger from this mode.

Single

Sub-group

All account heads except Cash and Bank are placed in the……

Sub Ledger master

Group Ledger master

Identify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank OCC Account. Expenses

Income

The primary document for recording all financial transactions in Tally is the…… Journal

Trial sheet

You can customize the voucher entry screen using the function key……. F13

F12

Identify the voucher type that records fund transfers between cash and bank accounts. Credit Note

Payment

This voucher type records adjustments between ledgers.

Receipt

Sales

The use of classes for payment, receipt and contra vouchers enables data input in …… Double entry mode

List entry mode

The details of a voucher entry can be given in the …….

Comment

Memo

The credit note voucher can hold account types: ……..

Sales account, Sales tax account

Ledger account, Bank account

The suffix and prefix details for the voucher type can be made applicable only from the …….

End of a month

First of a year

The voucher used to record all bank and cash payments is ….. Credit Note

Contra

Tally's age-wise analysis considers the voucher's ……

Effective date

Previous date

Arrange the steps in generating the books of accounts. 1. Create Trial balance 2. Create new ledgers 3. Generate Day Books 4. Update journals for financial transactions 1, 2, 3, 4

1, 3, 4, 2

For day-to-day transactions the voucher types used are

Cash purchase

Credit purchase

Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be entered into the voucher type….. Loan

Payment

Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10 monitors by credit. Credit Purchases

Cash Purchases

Identify the voucher type to be chosen for the sale of computers to Anand by cash @ Rs.210000 per unit. Cash Ledger

Sale Sheet

A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher…..

Payment

Receipt

Balance sheet

Profit & Loss statement

The financial statement that consolidates ledger balances is …..

The F9 function key in the left side of the Gateway of Tally screen displays the……

Accounting reports

Inventory reports

The option on the Gateway of Tally that will generate the P&L account statement is…..

Net Loss

Net Income

This displays the balance daywise for a selected voucher type.

Record book

Ledger book

The feature in Tally to analyze accounts of a company is…..

Ratio analysis

Account analysis

The age-wise statement is displayed based on…… Income

Payables

The ratio analysis of receivables can be done based on…… Bill date

Effective date

Name the statement that helps the management in the decision making process. Data flow

Funds flow

Identify the budget type which is chosen where transaction amounts are to be monitored.

On closing balance

On net credit flow

Choose the budget type to be used where bank accounts balances are to be monitored.

On closing balance

On net credit flow

The management that needs to consolidate the accounts of its various enterprises uses ……. in Tally.

Consolidate company

Group company

Identify the user who can access audit trails in Tally.

Owner

Data Entry operator

Identify the accounting feature in tally that facilitates splitting financial years for a company data.

Yearly-entry Month-less accounting accounting

The tracking of changes in vouchers and ledger masters is done by….. Tally Vault

Tally Audit

Tally can import data from other programs and creates a log about the activity in the file…..

Tally.cfg

Tally.imp

Import and export of data between Tally and other programs is possible with the help of….. OLE

DBMS

The manual option of voucher numbering leads to…..

Duplicate number

Auto numbers

The Tally audit trail tracks changes made to vouchers that are …..

less than 30 Days more than 30 Days old old

The ratio analysis of Bills Receivables or Bills Payables can be displayed with the function key….. F5

F8

In IDEA, import Assistant wizard is used to import data from____________.

Excel

Access

In IDEA, Append functions can be used to_________.

Import data

Add data at the end

In IDEA, Statistics functions can be applied on_________.

Numeric Data

Date Data

In IDEA, increment value in Stratification function can be fixed or free interval.

FALSE

TRUE

In IDEA, Stratified Random functions is a part of which menu. Analysis

Data

Which of the following is not an Audit Software

ACL

IDEA

Using which functions to perform more complex calculations and exception testing in IDEA?

Equation Editor

function Editor

Which is the step by step procedure File->Print->Create for reporting in IDEA. Report

Click on Create Report button on the Operation toolbars->Report Assistant.

Which of the following are categories of computer audit function ?

Items of audit interest Data Analysis

In the following list which is not an audit function ?

Sorting

Filtering

In the following list which is a audit function?

File Definition

Stratification

What is the procedure for importing File->Import Assistant- File->Import -> data into IDEA ? > Import to IDEA Import to IDEA Which is the following step involved in a source code review Review Programming methodology ? standards

Understand program specifications

In IDEA which functions should be used to find repeated values ?

Exclude

Detection

In IDEA, Stratification functions can be applied on which type of data ?

Numeric Data

Date Data

In IDEA,Summarization accumulates the values of Numeric fields for each____________. Primary Key

Unique Key

In which sampling,selecting sampling units using a fixed interval between selections is_______________. Random

Systematic

Ensures that all combinations of sampling units in the population have an equal chance of selection is____________.

Random

Systematic

In Audit tool, to built relation between two tables, both table should have_____________.

Common Table

Common Field

Input Control method is a part of Application Control Group.

TRUE

FALSE

Which is the following type of check that can be run when data is input through terminal ? Field check

Filter check

Which is the following is the correct types of Field checks on processed data ? Overflow

Range

IDEA exports data in a number of _______________________.

database

text

Which is the following is the correct types of Record checks on input data ? Resonableness

Compare

Which is the correct types of Batch Checks ?

Control Totals

Outdated checks

Which is the need for table level tests ?

Data Integrity

Controls are required for authorization

Which is the following is the major points with respect to inter table tests ?

This may make the entire child tables referenced by the master field in the main table unavailable

Their Master & Child relationship reference the table from one another

Which is the software used by the auditor to take a view of a file of data or transaction passing through the system at a particular point of time ? Mapping

Snapshots

Which is the software used by the auditor to compare the source version of a program with a secure master copy ?

Souce comparison

Code compasion

Which is the techniques whereby the auditor arranges or manipulates data either real or fictitious, in order to see that a specific program or screen edit test is doing its work ? Debug Testing

Logic Testing

Which is the software used by the auditor to list un-used program instruction ?

Mapping

Log Analysis

Which is the software used by auditor to read and analyze records of machine activity ? Machine level

Executable level

Which of the following reason strongly call for Control & Audit Function ?

Absence of Input Document

Lack of Visible Transaction Trail

In IDEA,Data Extraction select data form a file for further___________ for creating a new file of logically selected records. Extraction

Recording

Which is the correct types of Field checks on input data ?

Missing data

Blank data

Which is the major points to be consider with respect to System tests ?

To ensure the input data is valid before entering the value

Test whether the overall system meet the requirement specifications

In Data analysis techniques, which law is used to idenfity statistical report on numeric data ?

Bend Law

Benjamin law

Which is not a feature of File reorganization with an auditor perspective?

Filtering

Sorting

What do you understand by the term, “Data Consistency” in using CAATs?

Establish relationship between two or more tables as required.

Identify fields, which have null values.

Functions involving use of arithmetic operators, which enable performing re-computations and re-performance of results is an example of? Statistical function

Arithmetic function

Which of the following is a benefit of File an FIR based on using CAATs? audit finding

Identify an audit finding w.r.t. materiality in an IT environment

What is step by step procedure for using Bendford's law function in IDEA ?

Data->Benford's Law

Analysis>Benford's Law

A Benford's Law analysis is most effective on data________________.

Comprised of similar Without built-in sized values for similar minimum and phenomena. maximum values.

In IDEA, blank value data can be extracted by using_________.

@isblank()

as Null

In IDEA, Summarization, Pivot Table, Stratify, Duplicate Key functions comes under which menu. Data

Analysis

In IDEA, Extraction, Sort, Indices, Search functions comes under which menu. Analysis

View

_______ is centralized Banking Application Software.

Core Banking System

Core Banking Solution

Flexcube developed by ________

Infosys

HCL Technologies

Quarz developed by ____

Infosys

HCL Technologies

The server is a sophisticated computer that accepts service requests from different machines which are called__________

Clients

Customers

__________ server has to be a powerful and robust system as it has to perform all the core banking operations. Antivirus Server

ATMS stands for_________

Automatic Telephone Machine

Application Server Automated Teller Machine Server

IBAS stands for ___________

Internet Business Application Server

Internet Banking Application Server

PBF stands for________

Positive Balance File

Post Balance File

Internet banking refers to a banking transactions routed through the ________ Bank

Internet

CPPD Stands for ______________.

Computerized Computer Planning Planning and Policy and plant department Department

The _________ is generally a hardware and it plays the role of preventing unauthorized access.

Date base Server

Web server

_________has several components which have been designed to meet the demands of the banking industry.

CBS

CSB

________enable data transmission over different networks.

Switches

Firewall

_________have many ports that are connected to different systems and it facilitates data transmission with the network. Router

Switches

A Proxy server always acts in conjunction with a _________.

Firewall

Internet

The ________ provides network security by preventing malicious data from entering the network.

ATM Server

Proxy Server

_________is used for authentication.

System audit

system administration

Access to a set of servers is controlled by the ________.

System audit

system administration

________is a process of unauthorized Data base entering a network. administration

Hacking

____________ facility provides a customer to access financial transactions in a public place.

Automatic tele Machine

Automated Teller Machine

Which is the Function of ATM?

Cash Withdrawal

Balance Inquiry

Every bank branch should madatorily have a security policy.

FALSE

TRUE

Core Banking Solutions is a combination of an application software and ________

Network devices

Firewall

The Operational Controls include controls on ___________

Physical Access

Logical Access

Application Controls are broadly classified into __________________

Input Controls

Output Controls

__________controls check that the data entered is complete and correct.

Input Controls

Output Controls

Reasonableness check is a _________. Processing Controls

Input Controls

Which of the following is not a module of the CBS?

Customer ID generation

Accounts management

Bank guarantees can be __________________________

Performance Guarantee

Deferred Payment Guarantee

SLR stands for ________________________________

Statutory Liquidified Ratio

Statutory Liquidity Ratio

________are record of activities that have taken place in the system irrespective of the modules.

Logs

Index

The contents of a log includes _____________________

Activity performed

User details

Communication and Operations management must include which policies?

E-mail policy

Firewall security policy

______ is a large data housing infrastructure that provides high band width access to its clients.

ATM Server

Data Centre

Logs of the various activities in CBS can be deleted immediately and also be accessed by anybody. TRUE

FALSE

CRR stands for _________________________ in terms of CBS. Cash Reserve Ratio

Community Reserve Ratio

Does the IS Audit also include audit of the outsourcing activites carried out in the CBS system? Yes

No

DRP stands for ___________________________ in terms Disaster Recovery of CBS. Planning

Discovered Resources Planning

_____________are soultions applied when any kind of vulnerabilities discovered in networks in the CBS system.

Logs

Patches

__________can be viewed only by the DBA of an organisation. Access Rights Logs

Database Log

Is performing periodic vulnerability assessment of the networks is necessary?

No

Yes

KYC stands for _________________________________ in terms banking. Know Your Customer

Know Your Company

In CBS, the Accounts Management module deals with _____________________

Creation of Savings Account

Creation of Current Account

Soft copy of the ATM journal rolls is called_____________

Stock Journal

Journal Report

Data centre servers are known as_____________.

Application servers

Data Base Servers

The ATM switch consists of a _____________________

computer

server

_______________testing should be done to check the unauthorised access to the network in CBS.

Penetration

Hierarchical

_________enables transfer of money from one bank to another in "Real time" and on "Gross" basis.

EFT

NEFT

In _______system money transfers are done on a one to one basis while in _______system transfer is done in batches. NEFT, RTGS

RTGS,NEFT

All the money transfers take place in the books of the _________________ Beneficiary bank

Central bank(RBI)

EFT and NEFT work on _______________basis

HSM

DNS

________system of money transfer is primarily used for large transactions. NEFT

RTGS

In RTGS, the STP generates an ___________for every outbound RTGS transaction. UTN

UTE

UTR full form _________________________________ in Unique Transaction terms of CBS. Reference

Unidentified Transaction Reference

STP stands for ________________________________ in terms of CBS.

Straight Through Processing

Straight Temporary Processing

________ is a method of creating virtual networks within a physical network.

VLAN

LAN

CMS stands for ______________________________ in terms of CBS.

Control Management System

Cash Management System

Systems audit are Audit of internal important for the Which of the following statements is controls is not needed verification of the true? at all internal controls

The Management Controls does not include ___________ Managing of Assets

Formulating a security policy

_______is supported by advanced technology infrastructure and has high standards of business functionality.

Firewall

Internet banking

CBS Software resides in a Central application server which is located in the ___________

ATM Data centre

Middleware

A________ that runs the core banking solutions (CBS) and is centrally accessed by the branches. ATM Server

Central Application Server

The _________of the application is capable of only entering the data at the end point that is branches. System version

Application Version

The application server would be placed in a trusted inside zone in a separate ____________

Virtual Local Area Network

Local Area Network

Application software would access the ________

Data base server

ATM DATA Server

__________ are capable of being connected only when devices are connected to a switch.

LAN

Virtual Networks

Data communication between ______ VLANs can be controlled as per business requirements. 1

2

A special feature of STP is that _____________ number for any outbound RTGS transaction is generated by the STP System.

PIN NO

Unique Transation Referrence

_____________refers to the process of developing software which would produce the required output from the input provided of course, using the necessary hardware and Application communication systems. Development

Software Development

The______________is essential to ensure that computer security records are stored in sufficient detail for appropriate period of time. Review Management

RTGS

is a legal attempt at Which of the following is “False“ in gaining access to case of penetration testing in an IT protected computer environment of CBS? systems or networks.

Ensure recoverability of data in case of system failure.

Which of the following is erroneous statement in case of Change Management Control?

Well documented Unit test, system test, process should be integration test – all there incorporating should be carried out. all the changes.

With respect to the customer changing the Pin at the ATM which Old offset value used procedure is the ”false“ procedure? to derive new PIN.

Old Pin verified using HSM/SSM.

IN CBS, changes to the application server are not made directly to it, instead done first on a __________

Validate server

Trail server

All the various servers in the central data centre are seggregated through _______ LANs

VLANs

The __________ is a complete process in the computer so that it ensures that data that is fed in conforms to certain prerequisite conditions. Consalidation

Password Policy

When the central Data base is busy with central end of day activities or for any other reason, the file containing the account balance of the customer is sent to the ATM switch. Such a file is called __________ Positive Balance File

Application Server

Bank mate is developed by the _______

HCL Technologies

Infosys

The IBDS is located in a ____________ Militarised zone

City Zone

The main components of Internet Banking system consist of __________ Web server

IBAS

Copy of the Anti Virus Software was updated promptly and regularly at the Data Centre and pushed into all of the servers and in all the systems in the branches by ________ Hacking Method

Push-pull method

The __________which is also residing in the server at the branch actually does the banking operations. Sytem software

utility software

In Core Banking concept all the systems of the bank are connected to the Central office by means of a connectivity which may be either a _________ or a dial up line.

Leased line

local line

The ________ is generated by the software and directly sent to equipment for printed the Pin Mailer. 16 digit number

Personal Identification Number

____________would also include the existence of built in controls in the system to ensure proper processing of input data so as to provide the required output. Output Control

Input control

____________refers to an arrangement wherein the issuing bank acts on the request and instructions of a customer.

Letter of Tax

Letter of Credit

_______________ is a process by which the bank ensures the maintenance Business Recovery and recovery of operations. Planning

Business Continuity Planning

At which phase of testing the version of software is called “ beta version”?

Programmer testing

User testing

Finacle developed by _________

Infosys

HCL Technologies

In an Organization structure of IT Department which of the following function is incompatible?

Network Database administrator and Administrator and Database Security Administrator. Administrator.

The number that is stored in the ATM switch is the difference of which of the following number? Pin No - offset value The information retrieval of transactions taking place at ATM located at remote locations is through _________

Offset value - Pin No

Soft copy of Electronic Hard copy of journal Electronic Journal

The number that is generated as soon as the customer inserts the card in the ATM machine is __________

Offset value

Pin sent to customer

Which is not a Database management system.

Unix

Oracle

The data can be entered into a table in the ____________ view. Design

Datasheet

MS Access provide__________ datatype to create link to a web page,file,or email address.

Hyperlink

Link

Set as database To make a switchboard appear while startup Option in opening the database. Access Option

Set as Form startup Option in Access Option

To add or delete buttons to Switchboard, which option is used in Switchboard Manager is used.

Edit Option

Add Option

The Switchboard Manager is a dialog box that allows creating a switchboard for an Access database. TRUE

FALSE

A macro can automate data entry in Access 2010. FALSE

TRUE

Which of the following data-type is not available in MS-ACCESS

Number

Text

The validation can be defined at____________ level in Access 2010 Table

Form

A macro can be attached to an event of a control_________________________.

A form

A report

How to add switchboard in Access 2010?

Click->File tabClick->File tab>Option Button>Option Button>Command not in >Quick Access Toolbar- Ribbon>Command not in >Switchboard Ribbon->Switchboard Manager->AddManager->Add->OK >OK

The command Design Application performed action____________ on switchboard.

Close the current database

Opens a secondary switchboard.

In a Query the data can be sorted based

Single column

Multiple columns

Switchboard Manager only allows a maximum of __________command buttons on a switchboard

Nine

Eight

MS Access 2010 provides a __________pane that contained large list of actions to be chosen,enabling a wide range of commands that can be performed Action List

Action Catalog

SQL is considered to be a __________ 2GL

3GL

Which action in MS Access macro applies a fliter or query to a table,form or report.

DoFilter

FindFilter

Opens a query in the Datasheet view, Design view, or Print Preview which macro action used in MS Access.

OpenQuery

ShowQuery

Among +, , MOD, AND, XML

Go to External Data ->Export, click on More and select XML

If we are using the same table for No need to main query and sub-query,we need Alternate names to the alternate name to to provide___________. tables the tables Update Query can be used to update_________ in MS Access 2010. Single Record

More than 1 record

Delete Query can be used to delete Single Record

More than 1 record

How many Primary key constraints can create in a table______.

Two

Only one

Unmatched Query can help to find records that have no corresponding reord in other tables. FALSE

TRUE

MS Access 2010 provides queries that can be used for obtaining the aggregated results instead of individual records are____________.

Count()

Sum()

A function that Counts the set of values that satisfy the given criteria in MS Access 2010 is___________. CountA()

Count()

The _________ operator is used to find the null records in a table.

"= NULL"

NULL

Aggreagate Query also known as___________.

Group By queries

Total query

Which Query wizard is used to find repeated records in a table?

Simple Query Wizard

Duplicate Query Wizard

Append Query is used to ______________ in a table in MS Access.

Add Records

Delete Records

Which type of joins not available in Access 2010? Inner join

Left outer join

A join returns only those rows from both tables that match on the joining field is___________ in MS Access 2010.

Inner join

Left outer join

The query returns all of the rows from left table, and also those rows from the right table that is known as____________.

Right outer join

Left outer join

The query using ___________ returns all the rows from right table, and also those rows from the left table that share a common value on both sides of join. Right outer join

Left outer join

How can we add a table to the Query Design window_________?

Select Create-> Add Table

Select Database Tools-> Add Table

___________can be considered a questions in a data base.

Queries

Form

Operands can be_________ in MS Access 2010.

Literals

Identifiers

When you create relationship between two tables, the Common field's data type should be

Text & Number

Number & Text

In example "Hello"+" " +" everyone" ,hello is _____ Text Literal

Date Literal

Length("Ms Access") will return the count of charcters is __________.

8

9

AND ,OR is a kind of ________ in MSAccess 2010. Arithmetic

Logical

Comparision operators is also known as_______ in MS-Access 2010. Arithmetic

Logical

LIKE operator works with______in MS Access 2010. Text

Date

To find the null IN operator is used __________ in MS To match the value to records of given Access 2010. a set of values table Operator precedence is similar to _____ that is follwed in Algebra in MS-Access 2010.

BODMAS

Text files that are organized properly fall into one of two types are__________ Delimited files

BOMDAS

Fixed-width files

To create an unmatched Query using wizard, minimum required number of table or fields is_________. one

two

While creating the query, the criteria can be set in

Only one

More than One Field

SQL stands for____________________.

Sub Query Language

Structured Query Language

In MS Access query which logical operator returns True if both the expressions compared are true.

IF AND

AND

In MS Access query which logical operator returns True if either of the expressions compared are true. OR

IF OR

Enfore Referencial Integrity option is used to restrict enerting data in Parent Table

Child Table

In MS Access left("Access",3) function will return__________.

Acc3

Acc

Which function is used to converts the text to lower case in MS Access 2010.

Lcase()

Lowercase()

Which function is used to remove leading or trailing spaces in a text in MS Access 2010. Remove()

Removetext()

_____________ is contains a set of predefined functions in MS Acccess and helps build complex expression. Expression Design

Expression Builder

Which of the following is a Database Software Excel

Outlook

Each Table row represents a twodimensional structure Which of the following is not the composed of rows and characteristics of a Relational Table? columns

Each row/column intersection represents a single data value

Which record will be retrieved if the All values less or more Value less than 95 query criteria is < #1/1/11#? than 1,195 characters MS Acces 2010 reads and writes to the .accdb file format in chunks also known as_____________. Pages

Encrypt pages

The tab in Expression Builder in which we write expressions is known as _____________. Expression Elements

Operator Button

The criteria expression LIKE?B*.

Will match all text starting from B

Will match all text ending from B

__________ queries are useful for summarizing information, and are somewhat similar to pivot tables in MS-Excel.

Select query

Crosstab query

While entering record in Datasheet view, in which order the records can be entered Alphabetical Order

At the end of the table

When you delete the record in form, it deletes the record from__________. Form only

Form but not in table

Having clause is used in the aggregate query in MS Access 2010 FALSE

TRUE

The controls that are not linked to any field of the table or query on the form are known as ________. ActiveX control

Unbounded Controls

Which property of the form can be used to insert a background image in MS Access 2010?

Caption

Background

___________ is a report that is inserted in another report in MS Access 2010.

Inner-Report

Sub-Report

A bound main report is based on a ______________ and its _____________ contain realted information.

Table or query,InnerReport

Table or query,Main-Report

DDL stands for ____________

Data Definition Language

Data Defined Language

A___________used to compare multiple values of categories or differences over a period of time.

Pie Chart

Area Chart

A________used to compare trends over a period of time.

Pie Chart

Line Chart

To create a read-only copy of the database, which of the following file format can be used? .ACCDB

.ACCDE

The database administrator created a split database and created a frontend database and back-end database file.Which of the file should be stored on the server ? Front-end database

Back-end database

To make database package and digitally sign using which option in Access 2010 ?

File->New->Save Database as>Package and sign

File->Save&Publish>Save Database as>Package and sign

In which formats can the Collect Data through email message feature can send the data entry form? HTML and InfoPath

Access Forms

Once a mail is sent using the collect data through email message feature in Access 2010. The mail status can be checked using________________. Export to Outlook

Options in Tool menu of Access

The ___________ type of data cannot be collected using Collect data through email messages. Text

Number

What is the memo data type field used for?

To store objects created in other programs

To add table

Those records that The filter By selection feature allows match an entity in a you to filter: field

Records based on a criterion you specify

DML stands for _____________

Detailed Maintaining Language

Data Maintaining Language

Which editor was provided for use with Access Basic?

The Visual Basic 1.0 editor

Notepad

How do you update Pivot Table Save your changes, report data after changes are made close the workbook, to the source data? and then reopen it.

Select the Pivot Table worksheet and press F9 on the keyboard

What are the different views to display a Table ?

Design View

Datasheet View

Which Of The Following Creates A Drop Down List Of Values To Choose From? Ole Object

Hyperlink

A __________ Enables You To View Data From A Table Based On A Specific Criterion

Query

Form

The Database Language That Allows You To Access Or Maintain Data In A Database DCL

DML

Insert, Update Or DCL Provides Commands To Perform Change The Structure Delete Records Actions Like Of Tables And Data Values Which is not a Database Model ?

Network Database Model

Relational Database Model

Which Of The Field Has Width 8 Bytes?

Memo

Number

This Is The Stage In Database Design Where One Gathers And List All The Necessary Fields For The Database Project. Data Definition

Data Refinement

Whenever a tables gets update, the dependent query will Not update

update automatically

The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A ___________ Between Tables

Relationship

Join

What is the purpose of the Switchboard Manager in Microsoft Access 2010?

To build a main Creates the macros switchboard form that used to program controls all other an automatic forms. application.

How does a query-based report differ in design to a report based on The reports are just one table? restricted in size.

It doesn’t

How would you include some plain text into a mailing label report?

Type the text directly into the label.

Use the > button.

In a Microsoft Access 2010 report, the page numbering would most likely be placed into the:

Report Footer

Section Header

If you wished to present a professionally looking form on screen that would show all the necessary information, which of the following form design tools would you most likely use? Pivot Table

Pivot Chart

What are the benefits of an ACCDE file__________________________ in Access

Reduces the size of the database

Optimizes memory usage and improves performance.

An .ACCDE file is a ___________ version of the original .ACCDB file.

Fixed-down

Locked-down

Which type of the query is used to accept the value from the user while executing the query and fetch records accordingly Make Table Query

Update Query

To encrypt the databse in Access 2010 must be opened in the __________________.

Open Inclusive mode

Open Secure mode

To extract the records based on date field, which of the symbol should be used $

#

FIX() is a kind of ____ function in MSAccess 2010. Math

Date

MS-Access 2010 has added new features of ______ to eliminate the need of VBA code

Macro

Form

Encrypting a database does not restrict access to database objects, but to __________ the database.

Open

Modify

The setting for the Security option can be handled using_______________________ in Access 2010.

File Tab ->New Options, and selecting the Trust Centre tab from the Access Option window

File Tab ->Access Options, and selecting the Trust Centre tab from the Access Option window

Third Party Encryption Technology can also be applied to the database of Microsoft Access 2010. TRUE

FALSE

To create a split database in MS Access 2010 go to which tab?

Create Tab

External Tab

After spliting database,frontend database holds_________________.

Forms

Query

After spliting database,backend database holds_________________.

Tables

Forms

When an Access database is split, it A back-end database creates two files_________________. & front-end database

A new database & Old database.

A Data Access Page is a special type of _________ that allows users to interface with database using Internet Explorer. XML page

HTML Page

An _____________ is a group of people with a common goal, having certain resources at its disposal to achieve the common goal. Company

Enterprise

______________ can be defined as subject-oriented, integrated, timevariant, non-volatile collections of data used to support analytical decision making.

Data Warehouses

Data Models

________________ databases contain detailed data that is needed to satisfy processing requirements but which has no relevance to management or analysis. Operational

Non-Operational

Data in the Data Warehouse is ______________ , not ____________.

Dynamic, Static

Non-Volatile, Static

____________ data contains an historical perspective that is not generally used by the _____________ systems.

Operational, Informational

Operational, Static

The definition of data elements in the data warehouse and in the data sources and the transformation rules that relate them, are referred to as ___________. Masterdata

Detaileddata

Data warehouses are not the optimal environment for ____________ data. Structured

Unstructured

Maintenance Costs are high for Data Warehousing. TRUE

FALSE

Data Warehousing can be used for ___________________.

Credit Card Churn Analysis

Insurance Fraud Analysis

_________________ is the process of extracting patterns from data.

Data Analysis

Data Warehousing

___________________ is an approach to quickly answer multi-dimensional Business Processing analytical queries. Management

Online Analytical Processing

________________ include money, manpower, materials, machines, technologies etc.

Costing

Production

The Output of an OLAP query is typically displayed in a ___________ format.

Matrix

Columnar

______________ companies is planning to support tens of millions of customers with just hundreds of employees. B2B

B2C

Which of the following is the limitation of Open Source ERP?

Increased Complexities

Legal Complexities

Which of the following is not an Open ERP software?

Openbravo

SQL-Ledger

_____ is the process of integrating all the business functions and processes in an organization to achieve numerous benefits. EDI

ERP

________ must consider the fundamental issues of system integration by analyzing the organization's vision and corporate objectives.

Manager

Auditor

The more the number of __________, the longer the implementation time. modules

process

Customization of ERP systems is one of the major challenges in auditing ERP security. TRUE

FALSE

Tally.ERP 9 provides graphical analysis of data which helps the user to perform deeper analysis.

FALSE

TRUE

The user can ________ the company data into multiple companies as per financial periods required. Import

Export

___________ is a collection of activities that make one or more kinds of input and creates an output that is of value to the customer. Business Model

Business Function

E-Filing of Returns refers to the process of electronically filing your tax returns through the ___________. Intranet

Internet

Tally.ERP 9 does not allows you to export the ETDS forms in NSDL compliant formats as well as facilitates printing of TDS Forms in Physical Form.

TRUE

FALSE

Tally.ERP 9 offers a data encryption option called _______________.

Tally Data Encryption

Tally Data Encoding

___________________ is the process of exchanging Tally.ERP 9 data between two or more locations. Serialization

Randomization

The Tally website offers _______________, by which a user can communicate with a Tally representative and get required information. Tally Forum

Tally FAQ

Tally.NET use _______________ for centralised Account Management.

Control Centre

Data Centre

The data is transferred between the remote location and the server using a secured mechanism called __________________. Encoding

Decoding

Sales Tax Ledger falls under which Group?

Indirect Expenses

Duties and Taxes

Alias represents ___________ in Tally.ERP9.

Short name

Nickname

If we purchase any Fixed asset in credit, we can pass it from _________. Payment mode

Receipt mode

Information systems can be designed so that accurate and timely data are shared between functional areas. These systems are Isolated called Integrated Information Information _______________________________. Systems Systems To save entry without any amount, we have to use _____________.

Cost Center

Maintain Multiple godown

Transfer of materials from one godown to another godown, use ______________.

Manufacturing Journal Stock Journal

While exporting Ledgers from Tally to Web Page, we use _________.

XML Format

ASCII Format

Budget represents _______________________.

Estimation

Forecasting

In Service tax Credit Adjustment (%) should be either ____________. 0.2

1

Service Tax Report can be seen from _________________. Display > Day Book

Display > Account Books

Can we allow Expenses/Fixed Assets in Purchase vouchers? Yes

No

Transfer from Main Cash to Petty Cash we require to pass _______ voucher.

Contra

Payment

Income Tax number of the Company will appear in which report? Cash/Bank Book

Profit and Loss A/c

A business model is not a ___________ model.

mathematical

system

The approach to ERP is to first develop a ______________ comprising the business processes or activities that are the essence of a business. Business Model

Business Function

OLAP systems use concept of OLAP cube called a ______________ cube

single dimensional

hyper dimensional

The data which is to be exported from Tally.ERP 9 can be in ________ format.

XML

HTML

In Tally ERP-9 Remote Access is also known as __________. Networking

VB.Net

Accessing data store on a remote location using Internet in Tally.ERP9 is called____________. Local Data

Remote Data

Tally.ERP9 can be classified user in two categories are___________.

Local User

Remote User

Which of the following is not a predefined security level provided by Tally.ERP 9?

Owner

Public User

The business model is represented in the graphical form using ______________ and ________________

charts, pictures

smart art, clip art

Which of the following is/are the data warehousing activity?

Defining the Identifying and correct level of prioritizing subject summarization to areas to be included in support business the Data Warehouse decision making

___________________ is the succession of strategies used by management as a product goes through its life Business Processing cycle. Management

Online Analytical Processing

_______ integrates supply and demand mangement within and across companies.

BPM

SCM

OLAP stands for _________________.

Online Analysis Processing

Online Analytical Processing

__________ includes transportation from Suppliers and receiving inventory.

Inbound Operations

Outbound Operations

Which of the following is not the service area of SCM?

Logistics

Asset Management

Which step of the ERP implementation involves, educating and recruiting end users throughtout the implementation process? Step 1

Step 2

The system ____________ process will address issues such as software configuration, hardware acquisition and software testing. implementation

upgradation

A __________________ review is recommended to ensure that all business objectives established during the planning phase are achieved.

under process review

pre implementation

In _________________ stages, auditors have access to rudimentary ERP tools and capabilities for auditing security configurations. post implementation Immediate posting and updation of books of accounts as soon as the transactions are entered. This is called as __________

pre implementation

Immediate Interactive Processing Processing

Which of the following ETDS forms are available in Tally.ERP 9?

Form 26, Annexure to Form 27, Annexure 26 to 27

The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility File Validation called __________________ File Validation Program Utility ERP systems provide an access to the__________ data

integrated

distributed

________________ is a tool that refers to skills, processes, technologies, applications and practices used to facilitate better, accurate and quicker decision making. Data Warehousing

Data Modeling

Business intelligence systems are ________ Decision Support Systems.

information driven

data-driven

Data warehousing technology is the process of creating and utilizing the company’s __________ general data

historical data

The data in the Warehouse comes from the _________ environment and external sources. operational

backup

In essence, SCM integrates ___________ management within and across companies. supply and demand

supply and chain

_____________ including all fulfillment activities, warehousing and transportation to customers. Inbound operations

outbound operations

Customer Relationship Management is a ________________ level strategy. business

corporate

Operational CRM provides support to ___________ business processes. front office

back office

Collaborative ______ ultimate goal is to use information collected by all departments to improve the quality of services provided by the company. CRM's

ERP

Tally.ERP 9 follows the DES __________ method to safeguard the data. encryption

decryption

Business Intelligence Systems are data-driven ___________________.

Information Systems

Integrated Information Systems

With ______________ technology the characters are reduced in breadth and user is allowed to input additional characters which would make the account name, entity complete and readable.

Tally Fix

Tally Adjust

In Tally.ERP 9 __________________ provides the user with administrator rights and the capability to check the entries made by the authorised users and alter these entries, if necessary. User-defined Security

HTTP-XML based data interchange

__________________ is an enabling framework which establishes a connection through which the remote user can access the Client's data without copying/transferring Direct Web Browser the data. Access

Web Publishing

If we want the company to be connected automatically for remote access on load, the property Allow to Connect __________ needs to be set it as Yes. Company

Contact On Load

___________________ technology is the process of creating and utilizing the company's historical data. Data Warehousing

Data Modeling

Is there a fixed qualification for internal auditor_________.

TRUE

FALSE

Which of the following will not appear in the home page of K-Doc?

Powerpoint

Word

To change an email header so that the message appears to have originated from someone or somewhere other than the actual source is known as___________.

Email middle attack.

Email Spoofing.

To playfully satirize a website is known as_____________.

Web tapping

Web Interception

_________is the complete package to manage the billing requirements of a CA firm on cash system of accounting. Payroll

eSecretary

Which of the following is not a/an feature of eSecretary?

Contact Management

Greeting Management

Annual return preparation can be done using ________.

ICAI-ROC application

K-DOC application

________is correspondence automation & management software that is seamlessly integrated with Microsoft Office. K-DOC application

eSecretary

________ is an independent,objective assurance and consulting activity designed to add value and improve an organization's operations. Statutory audit

Tax audit

Which of the following is/are the main purpose of the internal audit?

Operations of the organization

Financial reporting

As per _____________of the Income tax Act,every person carrying on business or profession is requires to get his accounts audited by a CA before the "specified date". Section 45

Section 44AD

__________________ refers to use software/applications to automatically perform tasks such as accounting,preparing trial balance, financial statements etc. and electronically transmit data or information using internet.. ERP

Office automation

FEMA Stands for _______________.

Foreign Exports Management Act

Financial Enterprise Management Act

Which application helps the management to allocate the revenue to the credit of the right employee who identified the opportunity?

Resource allocation and scheduling

Knowledge management

Who has full privileges in the financial accounting application?

Database administrator

Account administrator

_________is the centre point of the financial accounting application as any transactions having financial impact carried out in any other module will reflect in this module.

AP module

GL module

In Financial Accounting Application,the transactions flow from GL (General ledger) to other modules.

TRUE

FALSE

Which of the functionalities is not provided in the purchasing module Receipts of goods of Financial Accounting Application. Evaluation of Vendors or service In Financial Accounting Application,automatic sequence number of documents control is not required in which of the following module? Purchasing

Accounts Payable

Which module of Financial Accounting Application can be used for assigning credit limit to customers? Purchasing

Sales

Which of these will trigger/alert for timely payment ?

Accounts Receivable

Accounts Payable

We can manage interviews,offers and job vacancies by using which of Resource allocation the application? and scheduling ________,___________,__________ are commonly referred to as CIA in information security parlance.

Confidentiality,Inte Confidentiality,Integrit grity and y and Availability Authentication

___________provides information about updation of project cost based on time spent by employees on Performance various projects. management system

Which of the follwing is not a/an functionality provided by PMS?

HR and Payroll applications

HR management system

Employee Capture the Key designation and Performance Indicators reporting structure

___________automates the calculation of salary for taking inputs from the timesheet application, leaves from Leave Management System and salary details from the HR master data.

Timesheet System

HR management System

Which of the follwing is not a control Reduce administrative in Leave Management System? burden on HR Excess leave Permanent Audit File are obtained once but updated on __________basis.

In Permanent Audit file, _______ is not the key data documented.

half-yearly

yearly

Organization chart

Client’s accounting manual

The Document Management Sytem offers the features___________. Role based access

Complete audit trail

________is a type of training in which user logon on the training server with a user ID and password. Internal Training

E-Learning

In some cases, trainee is supposed to appear for the examination/test at the end of the training is____________.

E-Learning

Classroom Training

________ are the hardware/infrastructure equipments used in a CA firm. PC

Application Server

_____________means information available in the organization should not be altered or modified by unauthorized personnel. Confidentiality

Integrity

Which of these is/are the standard email program used in an organization?

Microsoft Exchange

Lotus Notes

Which of the following is not a characteristics of WAN?

Most WANs are owned Compared to LAN, by only one its transmission organization. speed is low

_________is protection of information assets from threats to preserve their value. Confidentiality

Integrity

Which types of information assets need to be secured in a CA Office?

Client data

Own data

The extent and level of _________ would depend on the nature of information.

Availability

Confidentiality

__________ of information might be affected due to denial of service attack or some other reasons.

Integrity

Authentication

__________means the sender cannot deny having sent a message and receiver cannot deny receiving the message. Non-Repudiation

Integrity

Risk may not be _______ in nature.

reputational

financial

The process of identifying an individual, usually based on user id and password in an organization is called______________.

Availability

Authentication

Which of the following is not a software equipment required in a CA's office?

Resource allocation and scheduling

Client management

Which of the following is not an application arranged by ICAI?

ICAI-XBRL suite

K-DOC

How many stages are there in the sales cycle?

2

3

PBX stands for ________

Private Exchange Branch

Public Exchange Branch

XML stands for_________

Expansion Markup Language

Expansion Makeup Language

VBA stands for_______________ .

Visual Basic for Applications

Visual Basic for Applets

Store, structure, Find the correct sequence in case of Structure, store, and and transport XML file, are transport information. information. Programming of Macros is done in programming Language ___________. VBA

ASP.Net

As Bank auditors,Many Banking applications generate text files in ____________.

Txt format

Csv format

Not Required

Developer tab>Code>Macro Security

Macro security is enabling through __________.

In Excel, Sampling option is available in ___________ .

Insert

Data Analysis

Requirements for preparation of cash budget in Excel.

Knowledge of accounting

Knowledge of formatting an excel sheet

ROE stands for __________.

Recall on Equity

Return on Equity

___________ is a statistical procedure that uses sample evidence and probability theory to determine whether a statement about the value of a population parameter should be rejected or should not be rejected. Confidence Interval

Hypothesis

____________ is a statistical tool used to create predictive models. Regression equation

Regression

__________ shows the ability of a company to pay its current financial obligations. Quick Ratio

Current Ratio

Macro enabled workbook file extension is _______________

.xlsx

.xlsm

___________ shows dependency of a firm on outside long term finance.

Quick Ratio

Leverage Ratio

To record a Macro in relative mode,"Üse Realtive References" available in which tab of excel ?

Developer Tab

View Tab

There are _________ ways to open a Macro enabled workbook.

3

2

ANOVA stands for___________

Analysis of Value

Analysis of Varity

A function doesn’t require an argument is___________.

DATE()

TODAY()

In Excel, there are __________ functions for calculation of depreciation.

4

5

For calculation of depreciation as per SLN function used to calculate Sum of Years Digit depreciation as per_________________. Method.

For calculation of depreciation as per Straight Line Method.

For calculation of depreciation as per SYD function used to calculate Sum of Years Digit depreciation as per_________________. Method.

For calculation of depreciation as per Straight Line Method.

For calculation of depreciation as per DB function used to calculate Sum of Years’ Digit depreciation as per_________________. Method.

For calculation of depreciation as per Straight Line Method.

For calculation of depreciation as per DDB function used to calculate Sum of Years’ Digit depreciation as per_________________. Method.

For calculation of depreciation as per Straight Line Method.

XML is a ___________ Recommendation.

W1C

W3C

For calculation of depreciation as per VDB function used to calculate Variable Declining depreciation as per_________________. Balance Method.

For calculation of depreciation as per Straight Line Method.

PV Ratio stands for _____________________.

Point Volume Ratio

Point Varaiance Ratio

BEP stands for __________________________

Break Easy Point

Break Even Point

Data Validation available in which Tab?

Formulas

Insert

___________function returns value from a given data range based on row and column.

VLOOKUP()

HLOOKUP()

Which function categories are not available in Excel.

Statistical

Engineering

PMT Function is belongs to which categories of Excel function ?

Text

Logical

NPV stands for_______________________________

Net Present Value

Net Proper Value

_______function uses a fixed rate to calculate depreciation

DB

VDB

Which of them is not a Conditional Operators symbols?

<

rather than the results of the Formulas > Formula > Formula Auditing > formulas then choose______________. Show Formulas. Show Formulas. _______________ reveal about the current and future financial condition of the company.

Report

Which of them is a Intangible assets?

Goodwill and Patents. Cash and Property.

CR stands for___________________.

Current Ratio

Clear Ratio

QR stands for___________________.

Quick Rate

Quality Ratio

Data

Debt – Equity Ratio =Long term debt / Shareholders funds. TRUE

FALSE

DTD stands for ___________, which is called XML Schema. Direct to Direct

Document Type Definition

ACP stands for _____________.

Average collection price

Average collection payment

FATR stands for _____________.

Fixed assets test Fixed all turnover ratio ratio

A _________ can be a numerical fact. Statistic

Sale

__________ stands for reduction in value of fixed assets.

Data

Depreciation

Value of fixed assets is generally reduced over the period of time due to __________. Wear & Tear

Change in taste of people

Profit equals to __________.

Purchase - Total Cost

Sales - Total Cost

Examples of fixed cost are __________.

Salary of administrative staff

office rent

Cash budget is prepared for planning for future as far as movement of cash is concerned.

TRUE

FALSE

Discounting is not the process of determining the present value of a payment or a stream of payments that is to be received in the future.

TRUE

FALSE

PAN must have ________ characters only.

8

10

The extension of a XML document is ______________. (.xsd)

(.xml)

Sample means the units or items selected for study or consideration and population means the total set of data used for selection of samples.

TRUE

FALSE

_______________ analysis relates items in the financial statements in a manner that drives out performance information about the company.

Financial ratio

Price

How to restrict to run a macro automatically when starting Microsoft Excel?

Hold down the SHIFT key during start up.

Hold down the CTRL key during start up.

Which option allows you to Bold all the negative values within the selected cell range?

Zero Formatting

Conditional Formatting

_____________ allow us to perform calculations or operations that would otherwise be too cumbersome or impossible altogether.

Cell referencing functions

Absolute functions

Statistical functions in Excel help to calculate __________________ Arithmetic Mean

Median

Discounting Factor formula is ___________________

= 1 + (1/r) * n

= n / (1+a) - r

________________ is considered as non cash expenditure and occupies a prominent place in Profit & Loss Account. Cash Flow

Depreciation

The value which can be realized at the end of life of fixed asset by selling it is called _________________

cost

Salvage Value

____________ is prepared for planning for future as far as movement of cash is concerned. Capital Budgeting

Cash budget

To create a XML Map from XML schema, Go to which Tab in Excel ____________.

Add-Ins

Review

____________ is the process of determining the present value of a payment or a stream of payments that is to be received in the future.

Marginal costing

Capital Budgeting

____________ is one of the core principals of finance and is the primary factor used in pricing a stream of cash flows, such as those found in a traditional bond or annuity. Marginal costing

Discounting

XML schemas in Excel are called XML _____________.

Maps

Schemas

Excel allows us to use various functions and even simple mathematical calculations which can be used for _____________. Financial analysis

Equity analysis

Which cell reference show the reference to other sheet or reference to other workbook in excel ? Sheet2!C4

Sheet2{C4}

Which of them is not a Range References?

A1:A4

$A$1:A4

Interest Coverage Ratio equals to _________.

EBIT / Debt interest

EIBT / Debt interest

If particular workbook have to open each time Excel started, where the workbook should be placed? AUTOEXEC folder

AUTOSTART folder

If the cell B1 contains the formula=$A$1, which of the statement is true ?

There is an absolute reference to cell A1.

There is a relative reference to cell A1

__________ is a computerized mathematical technique that allows people to account for risk in quantitative analysis and decision making. Finanical Planning XML is case-sensitive ? TRUE

Monte Carlo Simulation FALSE

________ is the process of meeting the financial goals through the proper management of finances.

Monte Carlo simulation

Corporate planning

___________ can be defined as the process of setting the procedures in the organization for achieving the Monte Carlo predefined goals. Simulation

Corporate Planning

________ shows ability of company to pay back long term loans along with interest or other charges from generation of profit from its operations. Debt Assets Ratio

Interest Coverage Ratio

_____________________is the simplest method of comparing different stocks at a point of time to make investment decisions. Earnings Per share

Fixed Asset Over ratio

Every bit of data has to start and end with an identical tag

Data

The exact syntax of PMT function is________________.

PMT(nper, rate, pv, [fv], [type])

PMT(rate, nper, pv, [fv], [type])

The exact syntax of IPMT function is__________________.

IPMT(rate, nper, pv, [fv], [type])

IPMT(pv, rate, per, nper, [fv], [type])

To see the XML Map user must go ______________.

Developer>XML> Source

Developer> Source

Deletion of XML Map is done through __________.

Directally Delete Command

Delete Button

Excel works primarily with ________ types of XML files.

3

2

Method of tax calculations shall change according to _________.

Annual Income

DOB

EMI stands for ______________.

Easy Monthly Installment

Equating Monthly Income

Which function is used to calculate the principal portion in every installment ?

IPMT

PPMT

________ is a process used in statistical analysis in which a predetermined number of observations will be taken from a larger population.

Snowball sampling

Sampling

In __________, Individuals are selected at regular intervals from a list of the whole population.

Clustered sampling

Sampling

In ______________ each individual is chosen entirely by chance and each member of the population has an equal chance, or probability, of being selected. Snowball sampling

Convenience sampling

Which method is commonly used in social sciences when investigating hard to reach groups? Quota Sampling

Sampling

__________ are useful for quick reading and easy understanding, particularly for top management.

Summary reports

Balance sheet

It is a process in which a business determines whether projects such as building a new plant or investing in a long-term venture are worth pursuing. Business Investment

Capital Budgeting

Popular methods of capital budgeting include _________ and payback period.

internal rate of return

discounted cash flow

What is the file extension of Schema file which contain schema tags ? (.xml)

(.xsd)

_________ is the value of all future cash inflows less future cash outflows as on today.

Working capital

Net present value

___________is the process of defining and analyzing the dangers to individuals, businesses and government agencies posed by potential natural and human-caused adverse events. Sensitivity analysis

Risk analysis

__________ which is used more often, does not involve numerical probabilities or predictions of loss. Sensitivity analysis

Risk analysis

________ are generally used to present information in a simple and better way and also be used to analyse the risk in a better way. Graphs

Sparklines

It is a technique used to determine how different values of an independent variable will impact a particular dependent variable under a given set of assumptions. Decision Tree analysis Sensitivity analysis _______ involves computing different reinvestment rates for expected returns that are reinvested during the investment horizon. Scenario analysis

Sensitivity analysis

NPER stands for______________________________

Total Principal Value

Net Per value

Which function that is used to calculate the payment for specific loan terms ____________

SUMIF()

PMT

________helps to break down the Return on Equity

Du Point Analysis

Return on Investment

_______ is a common method for financing property, facilities, and equipment.

Mortagage

Leasing

These are the basis for analysis by potential investors, banks etc.

Journal and Ledger

P & L Account and Journal

The voucher used to record all bank and cash payments is ….. Credit Note

Contra

The manual option of voucher numbering leads to…..

Auto numbers

Duplicate number

The Tally audit trail tracks changes made to vouchers that are …..

less than 30 Days more than 30 Days old old

The audit functions of attributes sampling, variables sampling, stratified sampling are included in …. functions.

Stratification

Selection

C

D

ANS

command

program

D

numerous alpha

number and alpha

A

size, performance, cost

input, output, performance ratios

C

ARPANET

None of the above.

B

PCs

mainframes

D

feed

write

A

multiplexing

multitasking

D

converter

process

D

ram

output

D

non-impact desktop printers thermal printers

C

monitor, program, keyboard, bus

CPU, memory, input device, output device

D

windows 95

interpreter

B

assembler

coder

B

SQL * plus

all of the above

D

assembler

processor

C

system model

none of the above

C

ROM

Firmware

A

micro computers

none of the above

A

central processing unit

none of the above

B

non impact printer

none of the above

C

electronic spreadsheet

none of the above

B

Microsoft exchange none of the above

B

information

none of the above

C

high level language none of the above

B

multiplexing

none of the above

D

bulletin broadcasting system very small

none of the above none of the above

A B

intermediate network

none of the above

B

ftp service

none of the above

A

ARCHIE

none of the above

C

unlimited restore locator

none of the above

A

command line

none of the above

C

browser

editor

B

ftp

telnet

D

Hyper text transfer protocol Hyper text transfer port

C

uucp

none of the above

C

telnet

none of the above

C

transfer communication protocol/internet protocol

none of the above

B

higher type transfer protocol none of the above

B

mosaic,gopher

none of the above

B

dns

none of the above

A

hyper text markup language

none of the above

C

books marks

none of the above

B

animation

none of the above

B

animation,scripts,ex ecutables none of the above

A

welcome page

none of the above

B

search engines

none of the above

B

ftp

archive

D

database

channel

B

Graphical interface Graphical Interface format format

B

Joint pictures expert Joint pictures graph experimental group

A

network connections

mails

B

text or image

neither text nor image

C

applets

documents

A

MS Internet Explorer and Netscape Navigator None of the above

C

intranet

none of the above

B

wan

none of the above

B

packets

none of the above

A

email,file retrived,internet tools

none of the above

C

ARPANET

none of the above

B

defensive advanced research projects administration net none of the above

C

intranet,extranet

none of the above

A

cooking and dining none of the above

A

Hyper transfer meta language

Hyper text markup Language

D

united states & Russia

none of the above

B

network

none of the above

C

servers

none of the above

C

WAN

none of the above

C

non-digital

none of the above

B

Manipulate/demani pulate none of the above

B

Manipulation

none of the above

B

Cable and wires

none of the above

B

Serial line protocol

none of the above

C

Pillar to pillar protocol

none of the above

B

Accessibility of data and computer programs All of the above

D

Check controls

Input controls

B

Both A and B

Neither A nor B

C

Slab

Digit

C

Field mask

Input mask

A

Overflow

Serial

C

Batch checks

File checks

B

Block batches

Transact batches

A

Transaction type

Sequence check

C

Document totals

Hash totals

D

Batch check

System test

B

Suspense account

Update account

C

Stub test

Top down test

D

Database Analyzers Database code

A

Transaction data with master transaction

Module programs with snapshots

B

Mapping

Tracing

C

Item data

Record data

A

Graph testing

Whitebox testing

A

Test program pack

Test record pack

B

Parallel coding

Parallel simulation

D

Correct lister

Formulate correct hypotheses

B

Sample audit trails Data audit trails

A

Simple sampling

Demographic sampling

B

File access

File reorganisation

C

Formatting output

Classify data on a criteria D

Statistical

Reporting

C

Limited ability to determine Limited ability to Verify Propensity for Error Processing logic

A

Reading data, selecting and analyzing information

Specific tasks with original or modified programs

D

Snapshot

Picture

C

System audit

Concurrent audit

D

Keyboard

Memory

D

1 GB

100 MB

C

Application development

Data modelling

B

Information model

Logical model

A

64 bits

8 bits

C

Megaflops

Gigaflops

D

Backend processor Terminal processor

A

CAD

CCSIC

B

Memory card

Smart card

D

Value limited scale Very large silicon ic integration

A

32 bits

1 k bits

C

MU

CU

B

Program counter

Instruction register

D

Process register

Instruction register

A

SRAM

ROM

B

BIOS memory

ROM memeory

B

Optical memory

Flash memory

D

Thrashing

Paging

C

Cache memory bus Dual interface bus

A

Sound card

Media card

C

AGP

MCA

B

1280*1024

1280*680

C

Pulse

Wavetable

D

Scanner

Pen

B

Resolution

Lines

A

Pixel definition languages

Page definition lines

B

Soft fonts

Soft settings

C

Dot-pitch

Size

A

Flickers

Size

C

Resolution and sharpness

Signal and refresh rate

B

Light scan

Light pen

D

Photo-multiplier tube

Optical sensitive tube

A

Optical

Joystick

B

Tablet

Pen

C

Winchester disk

Jaz disk

C

Spiral

Block

B

MCA

DAT

A

Linear velocity

Helical scan

D

Lomega

Imation

B

Zip disk

Hard disk

A

630 MB

2GB

B

CD-ROM

MO drives

C

Magnetic tape

Magneto-optical drive

C

DAT drives

MO drives

D

Kernel module

I/O module

C

Batch management Data management

A

Virtual memory storage

Extended storage

C

Dividing

Preemptive

D

Multitasking

Multiprogramming

A

Multitasking

Multithreading

B

Win 2000 professional

Win 2000 advanced server

C

Format allocation type

File allocation table

D

Block

Table

B

NTFS

FAT32

B

NTFS

FAT32

C

Start directory

Tree directory

A

Allocation

Partition

B

Level 1

Level 3

C

Doc, xls, wzp

Tar, gz, taz

D

Vertical bar

Control bar

A

Minimize box

Maximize box

B

Dragging

Scrolling

C

Task bar

Command menu

C

Accessories

Favorites

D

Configure drive partitions independently

Confirm partition capacity

A

Restore

Re-copy

C

My Folder

My Directory

B

Notepad

Wordpad

A

Net Drive

Net Watcher

D

Windows Accessories

Internet Explorer

B

Desktop themes

Desktop icons

C

Hybrid

ASCII

D

Find

Restart

A

Documents

Settings

C

Port-to-Port connection

Peer-to-Peer talking

A

Deployed access

Service access

B

Pin to Pin communication

Port to Port Protocol

B

Serial Line Internet Protocol Setting Link Inter Protocol C

Indirect access

Dial-up access

D

Internet

Topography

C

Connection company IC board cost, cable cost, connection data cost cost

A

Indirect software

Terminal communicator

B

Protocol

Simulators

A

30-bit address

32-bit address

D

Respond to mails

Delete mails

C

Telnet Control Port

Communication Control Protocol

B

Sequence numbers Data numbers

C

Host

PC

B

Available FTP

Anonymous FTP

D

Binary File

TEXT file

C

Telnet

Message

C

Both A and B

Neither A nor B

C

Request the Archie server Protocol the Archie server A Archie

Archives

C

Domain name server

Domain relation server

C

Aaa/bbb/ccc/ddd

Aaa*bbb*ccc*ddd

B

Web

Mail

A

Uniform Resource Locator

Uniform Reserved Link

C

Chat messaging

Information chatting

A

Line

Dot

B

Lines

Channels

D

Display channels with at least ten users

Display line with 10 removed channels

C

Shell accounts

Shell programs

C

Menu

Bookmarks

D

Gopher

Gateway

C

WINNET and WAISLINK

WINSRC and FTPWAIS

A

SunScript

JavaScript

D

Eventcast

Livemessaging

B

Newsletter

Networkboard

B

Pine and Embedd

Port and Elm

A

#

()

B

Both A and B

Neither A nor B

C

Server Server message,command message,command line line and channels and channels

C

Java applets

Java objects

C

Net addresses

Web pages

D

Hyperlink

Hypernet

C

Wide maps

Web infos

A

Lynx

Mosaic

B

Web file

Txt file

A

Web creators

Web ports

A

New/Edit page

New/Edit Document

D

Pager

Document

B

Editor window

Form window

C

Both A and B

Neither A nor B

C

WinZip Plus

Webcow

A

File Format

Window Format

B

Excite Links

Infoseek Netshark

C B

Thread

Retriever

B

Web publish

Page publish

C

Nettext

Hyperlimit

A

Lynx

Lycos

D

Image graphs

Image texts

B

Weblinker

Webcaster

B

Both A and B

Neither A nor B

C

Electronic Data Internetworking

Efficient Data Interchange

B

Electronic Format Transfer

Electronic Fund Transfer

D

Value Aided Networks

Value Enhanced Networks

A

Negotiation and servicing

Critical buying

A

Portal

Smart

B

Both A and B

Neither A nor B

C

Presentation Layer Transport Layer

B

Presentation Layer Physical Layer

C

Transport Layer

Network Layer

B

Internet Control Data Protocol

Single Control Message Protocol

B

Device programs

Software devices

A

Device Interface Card

Network Interface Card

D

Server computer

Data computer

C

Combi card

Meta card

C

Electronic Socket Layer Protocol

Cyber Socket Layer Protocol

B

Grouped and summarized

Assets and liability

C

Voucher

Trial Balance

B

P & L Account and Balance Sheet

Voucher Account and Balance Sheet

C

Sales

Asset

D

Taxes

Income

A

Nominal accounts

Expense accounts

B

Voucher

Expense

C

Balance sheet and trial balance

Journal and ledger

D

Credit

Expense

B

Value expense stock

Value income stock

A

Balance sheet

Asset sheet

C

P & L statement

Suspense accounts

C

Asset or liability

Profit or loss

B

Sundry debtors

Original entry

C

Liabilities

Suppliers

D

Expense side

Payable side

B

Project

Application

B

F12

F11

C

Tally Group

Tally Vault

D

Entry of Tally

Groups of Tally

B

Mercantile

Manufacture

C

Loan assets

Capital assets

B

Journal

Ledgers

D

Revenue nature

Income nature

C

Display

Shift

A

Primary-group

Alter-group

C

Sub-group

Alter-group

B

Alter-group

Multiple

D

General Ledger master

Journal Ledger master

C

Assets

Loans

D

Voucher

File

C

F10

F11

B

Receipt

Contra

D

Payment

Journals

D

Choice entry mode File entry mode

B

File

Narration

D

Suppliers account, Purchases account

Buyer's account, Cash account

A

First of a month

End of a month

C

Sales Note

Payment

D

Current year

Configured date

B

2, 4, 3, 1

3, 4, 2, 1

C

Both A and B

Contra purchase

C

Receipt

Sales

B

Expense Purchases Debit Purchases

A

Stock Journal

Purchase Voucher

C

Debit

Contra

D

Trial balance

Journal

C

P & L reports

Expense reports

B

Net Profit

Net Account

C

Journal book

Day book

D

Data analysis

Transaction analysis

A

Expenses

Loans

B

Voucher date

Previous date

A

Stock flow

Cheque flow

B

On net transactions On net cash flow

C

On net transactions On net cash flow

A

Set company

Alter company

B

Accountant

Administrator

D

Period-less accounting

Transaction-number accounting

C

Tally Report

Tally Group

B

Tally.exp

Tally.ole

A

ODBC

MS-XLS

C

Sequence number

Range number

B

more than a day old more than a week old

A

F12

F6

D

XML

All of the above

D

Sort

Filter

B

Both A and B

None of the above

C

B

Relation

Sampling

D

Unix

SOFTCAAT

C

Calculation Editor

Testing Editor

A

Both A and B

File->Select Export -> Print Report.

C

System validation

All of the above

D

Sampling

Export

D

Print Preiview

Append

B

File->Import as -> Import to IDEA

File->Select Import -> Import to IDEA

A

Formulate flaw hypotheses

All of the above

D

Sequence checking Filter

A

Character Data

All of the above

D

Secondary Key

Composite Key

B

All of the above

None of the above

B

All of the above

None of the above

A

Common record

None of the above

B A

Compare check

Data check

A

Sign Test

All of the above

D

spreadsheet and mail merge format

All of the above

D

Un-compare

Randomness

A

On-line dated checked

Mixed dated checks

A

Both A and B

None of the above

C

Both A and B

None of the above

C

Modelling

Source comparison

B

Model comparison

Exe comparison

A

Off-line Testing

On-line Testing

D

Program Library

All of the above

B

Log Analyzers Software

Systax level

C

All of the above

None of the above

C

Investigation

Sorting

C

Both type

None of the above

C

To ensure the entered data is saved without fail

All of the above

A

Benford Law

British Law

C

Indexing

Linking the identified files A

Identify data, which are not in agreement with the Identify whether all fields regular format. have valid data. C

Logical function

Relational function

B

Investigation of fraud in audit area

To give assurance to customers about the performance of the company

B

Sampling-> Benford's Law

Tools->Benford's Law

B

Without assigned numbers, such as bank accounts numbers and zip codes and with four or more digits. All of the above

D

Null

Is Null

A

Sampling

Relation

B

Relation

Data

D

Complete Banking Solution

Centralized Banking Solution

B

TCS

I-Flex

D

TCS

I-Flex

C

Party

IP

A

Web server

Clients Server

B

Auto Machanic

Allow to Machine

B

Internet Banking Application software

Internet Business Authenticatin server

B

Positive Balance File Positive Balance Flex

C

Intranet

Net banking

B

Both A &B

Computer Planning and Policy Department

D

Proxy

Firewall

D

NEFT

None

A

Routers

Middleware

C

Firewall

Middleware

B

Antivirus

None

A

Date base Server

Web server

B

Domain Controller

Network security

C

Librarian

Domain Controller

D

Routors

Thrashing

B

Automated Technical Machine

Accelereated Teller machine

B

Registering requests for Cheque book All the above

D

B

IBAS

IBDS

A

Environmental Controls

All of the above

D

Processing Controls All of the above

D

Processing Controls All of the above

A

Output Controls

Management Control

B

Equity Share management

Clearing Module

C

Both A & B

None of the above

C

Standard Liquidity Ratio

Stable Liquidity Ratio

B

Activity Logs

None of the above

A

Date and Time

All of the above

D

Internet policy

All of the above

D

IT

EDP

B

B

Cash Reversal Ratio Cash Reimbursed Ratio

A

A

Disastrous Recovery Planning

Disaster Recording Planning

A

Access Rights

None of the above

A

Operating System Log

Activity Log

B

A Know Your Connection

Know Your Centre

A

Overdraft

All of the above

D

Electronic Journal

All of the above

C

Web server

All the above

D

Both A & B

None of the above

C

Top down

Bottom up

A

RTGS

None of the above

C

EFT,RTGS

None of the above

B

Remitting bank

None of the above

B

SSM

All of the above

A

EFT

All of the above

B

UTR

UTS

C

Unique Transmission Reference

None of the above

A

Strict Through Processing

None of the above

A

WAN

MAN

A

Core Management System

Centre Management System

B

Audit of controls in any banking environment is performed using software audit None of the above

B

Developing a business continuity Laying down procedures planning for system development A

Core Banking Solution

Web centre

C

Web centre

Central Office Data Centre.

D

Database Server

Domain Name Server

B

Client version

Firewall

C

Wide Area Network Personnal Area Network

A

Domain Name Server

Application Server

A

MAN

WAN

B

3

4

B

Uniform Transaction Reference None

C

Server Development

System Development

D

Log management

Authorized Controller

C

The purpose of the test is to identify security vulnerabilities and then attempt to successfully exploit them.

This is often the most preferred test as it is an accurate simulation of how an outsider/hacker would see the network and attempt to break into it. B

Implement new/ changed programme as per schedule.

It is important that correct latest version of programe is used but version number need not be changed. D

Old offset value erased Natural Pin remains and new offset value the same. generated.

A

Test Server

None of the above

C

WANs

MANs

B

protection

Validation

D

Centralised Data base security

Central Office Data Centre.

A

TCS

I-Flex

B

State zone

demilitarised zone

D

IBDS

All the above

D

Both A &B

None of the Above

B

Application Software

Application Server

C

Broadband

None

B

Net transaction ID NO

ATM No

B

Process Control

Data Control

C

Letter of Payable

Letter of Receible

A

Disaster Recovery Planning

None

B

(a) & (b) both

None of above

C

TCS

I-Flex

A

Network Administrator and Security Administrator.

Tape Librarian and database administrator.

B

Pin No - Natural Pin Offset Value - Natural Pin C

Cash register

(a) and (b) both

A

Natural Pin

Card Number

C

Sybase

Foxpro

A

Dataview

All of the Above

B

Insert

Attached

B

Set as Switchboard startup Option in Access Option None of the above

C

Modify Option

B

Build Option

A B

AlphaNumeric

Date

C

Both A and B

Report

C

A button

All of the above

D

Click->File tab>Option ButtonClick->File tab->>Quick >Quick Access Access ToolbarToolbar>Command not in >Switchboard Ribbon->Switchboard Manager->Add->OK Manager->Add->OK

A

Opens the Switchboard Manager.

Opens a report in Print Preview.

C

Both A and B

None of the above

C

Seven

Six

B

Action query

Action Box

B

4GL

None of the above

C

ApplyFilter

UseFilter

C

RunQuery

FindQuery

A

AND



B

Text

Date & Time

C

Text

Date & Time

A

{}

#

B

A

258

128

A

Right-click the table and select send as XML Both A and B

A

Aliases name to the tables Both A and C.

D

Both A and B

None of the above

C

Both A and B

None of the above

C

As many

All of the Above

A

B

Avg()

All of the above

D

Countif()

All of the above

B

IS NULL

All of the Above

C

Action query

Both A and B

D

Cross table Query Wizard

All of the Above

B

View Records

Update Records

A

Right outer join

Full join

D

Right outer join

Full join

A

Inner join

None of the above

B

Inner join

None of the above

A

Select Design -> Show Table

Select the table from navigation Pane.

C

Reprt

Macro

A

Function

All

D

different data type Same data type

D

Number Literal

None of the above

A

7

6

A

Comparision

None of the above

B

Relational

None of the above

C

Both A and B

None of the above

C

returns true or false None of the above

A

BODSAM

None of the above

A

Both A and B

None of the above

C

three

four

B

As many field

All of the Above

D

Structured Question Language System Query Language B

Both AND

LIKE AND

B

IS OR

LIKE OR

A

Any one table

All of the Above

B

3Acc

ess

B

Lower()

None of the above

A

Trim()

None of the above

C

Expression Box

Expression elements

B

Oracle

C++

C

The order of the Each column has a rows and columns is specific range of values immaterial to the known as the Tuple DBMS domain

D

Records with date before 2011

All of above

C

Base Database

None of the above

A

Expression Box

Expression Builder window

C

Will match all text having second character as B

Will match all text starting with a digit

A

Action query

Parameter query

B

Any where in the table

Beginning of the table

B

Table but not in Form

Form & Table

D

B

Graphics Control

Bound Controls

B

Record Source

Picture

D

Inside-Report

Insert-Report

C

Table or query,SubReport None of the above

C

Detailed Definition Language Data Detailed Language

A

Bar Chart

Column Chart

D

Bar Chart

Column Chart

B

.MDW

.ACCDT

B

Both of them

None of them

B

File->Save as>Save Database as->Package and sign

File->Save&Publish>Save Object as>Package and sign

A

Visual Basic Application

Excel attachment

A

Manage replies

All of the above

C

Date/time

AutoNumber

D

For shout text entries of no more than 255 For long text entries characters

C

Records that meet any of several criteria you specify All of above

A

Data Manipulation Language

Detailed Manipulation Language

C

The QuickBasic editor

All of above

B

Click the report, and on the Pivot Table toolbar, click the refresh data button

All of the above

C

Pivote Table & Pivot Chart View All Of Above

D

Memo

Lookup Wizard 

D

Macro

Report

B

DDL

None Of Above

A

Authorizing Access And Other Control Over Database None Of Above

C

Object Oriented Database Model

Structureed Database Model

D

Date/time

Hyperlink

C

Establishing Relationship

None Of The Above

A

have to update manually

never update

B

Query

None Of These

A

To allow the user to switch from one database file to To allow changing from another. one report to another.

A

It doesn't have as many design options.

The only report type available is the Design Report.

B

Use the Mailing label wizard text option.

Use the >> button.

C

Page Footer

Page Header

C

All The tools of the form design control gallery. Form Wizard Columnar

C

Protects the VBA code from being viewed or edited while still allowing it to run. All of the above

D

Open-down

None of the above

B

Delete Query

Parameter Query

D

Open Exclusive mode

Open Read Mode

C

()

""

B

Text

None of the above

A

Report

None of the above

A

Read

Write

A

File Tab ->Security Options, and selecting the Trust Centre tab from the Access Option window None of the above

B

A File tab

Database Tools

D

Report

All of the above

D

Query

Report

A

primary database & secondary database None of the above

A

Web page

None of the above

C

Organization

Concern

B

Data Mines

Operational Data

B

Subject-Oriented

Informational

A

Volatile, Static

Static, Dynamic

D

Informational, Informational, Static Operational

D

Metadata

Basedata

C

Informational

Operational

B A

Logistics Management

All of the above

D

Data Mining

Data Modeling

C

Product Life Cycle Management

Supply Chain Management

B

Sales

Resources

D

Stepped

Outline

A

C2B

C2C

B

Unsuitable for conventional applications

All of the above

D

Open-Project

ERP5ERP

C

BPM

None of the above

B

Top Management Commitment

Either A or B or C

A

package

units

D

A

A

Split

Backup

C

Business Process

Business Operation

C

Extranet

Any of the above

B

B

Tally Vault

Tally Data Conversion

C

Synchronization

Asynchronization

C

Tally Support

Tally Chat

D

Cloud Centre

Administration Centre

B

Encryption

Decryption

C

Sales

Purchases

B

Code name

All of these

D

Journal mode

Contra mode

C

Non-Integrated Information Systems

Non-Isolated Information Systems A

Allow 0 value entry Use Rej Notes

C

Purchase Journal

B

Both A & B

SDF Format

HTML Format

D

Assumption

All of these

D

Both A & B

Neither A &B

C

Display > Statutory Display > Statutory Masters Reports

D A

Receipt

None of these

B

Reminder Letter

None of these

D

Conceptual

Logical

B

Business Process

Business Operation

A

multi dimensional

none

C

ASCII

ALL

D

Tally.Net

None of the above

C

Internet Data

None of the above

B

Both A & B

None of the above

C

Data Entry

Tally.NET User

B

flowcharts, flow diagrams

graphs, shapes

C

Establishing a data warehouse help desk and training users to effectively utilize the desktop tools All of the above

D

Product Life Cycle Management

Supply Chain Management

C

PLM

CRM

B

Online Analytical Programming

None of the above

B

Sourcing planning

Production planning

A

PLM

CRM

D

Step 3

Step 4

B

installation

migration

C

post implementation

None of the above

C

Both A & B

Either A Or B

A

Real Time Processing

Business Processing

C

Form 26Q, Annexure to 26Q

All of the above

D

File Valuation Program

File Valuation Utility

B

isolated

de-centralized

A

Business Modeling

Business Intelligence

D

resource driven

none

A

operational data

none

B

data

none

A

supply and sortage none

A

hybridbound operations

none

B

strategic

none

B

staff

none

A

SCM

none

A

cryptography

none

A

Decision Support Systems

Non-Isolated Information Systems C

Tally Fit

Tally AutoFit

C

Unlimited multiuser support

Audit Feature

D

Tally.NET

Email facility

C

Either A or B

None of the above

B

Business Modeling

Business Intelligence

A B

Paste Document

My Templates

C

Email hacking.

Email tracking

B

Web spoofing

Web threating

C

Billing and Accounting software

K-DOC application

C

Email Management Share certificate printing D ICAI XBRL Software Payroll

A

ICAI XBRL Software ICAI-ROC application

B

Internal auditiing

None of the Above

C

Both A and B

Either A or B

C

Section 43B

Section 44AB

D

Either A or B

None of the Above

B

Foreign Exchange Managament Act

None of the Above

C

Document Management Systems

Client management

D

System administrator

User Administrator

C

AR module

FA module

B

B Invite and analyze quotations from vendors

Comparison with budgets D

Expense Management

Fixed assets

C

Accounts Payable

Accounts Receivable

B

Expense Management

Bank Reconcilations

C

Knowledge management

None of the Above

B

Confidentiality,Inte grity and Access Confidentiality,Integratio rights n and Authentication A

Payroll

Timesheet application

D

Automated alerts for pending appraisals

Prepare summary or bell curve analysis of all employees B

Payroll System

Knowledge management System C

Error free capture of leave details Approval workflow

C

monthy

B

quarterly

Copies of clients’ Copies of important incorporation contracts or long term documents like MoC lease agreements

C

Cost effective to maintain the documents in soft copy

D

All the Above

Classroom Training E-Training

B

Virtual Learning

All the Above

B

WAN

All the Above

D

Availability

Authentication

B

Both A and B

None of the Above

C

WAN uses only private networks.

Switches are used to connect LAN and WAN

B

Information Security

None of the above

C

Own documents

All the above

D

Integrity

Authentication

B

Confidentiality

Availability

D

Authentication

Confidentiality

A

operational

vulnerable

D

Confidentiality

Integrity

B

HR and Payroll

None of the Above

D

Billing and Accounting

ICAI-TOC

D

4

5

B

Private Branch exchange

Public Branch exchange

C

Extensible Markup Language

EXtensible Makeup Language

C

Visual Basic for Apple

None of the above

A

Structure and store Store and transport information. information.

A

Java

C++

A

Both A and B

Nither A Nor B

C

Developer Developer tab>Modify>Macro tab>Controls>Macro Security Security

B

View

None

B

Knowledge of cell linking & basic formulae

Knowledge of all of the above.

D

Return on Enquary

Return of Equalisation

B

ANOVA

None of the above

B

Multiple Regression Single Regression

C

Liquidity Ratio

Solvency Ratio

C

.xlsv

.xlsw

B

Liquidity Ratio

Solvency Ratio

B

Both A and B

Nither A Nor B

C

4

1

A

Analog of Variance

Analysis of Variance

D

MONTH()

YEAR()

B

6

3

B

For calculation of depreciation as per Variable Declining Balance Method.

For calculation of depreciation as per Double Declining Balance Method. B

For calculation of depreciation as per Variable Declining Balance Method.

For calculation of depreciation as per Double Declining Balance Method. A

For calculation of depreciation as per Declining Balance Method.

For calculation of depreciation as per Double Declining Balance Method. C

For calculation of depreciation as per Declining Balance Method.

For calculation of depreciation as per Double Declining Balance Method D

W2C

W4C

For calculation of depreciation as per Declining Balance Method.

For calculation of depreciation as per Double Declining Balance Method. A

A

Profit Volume Ratio Profit Variance Ratio

C

Balance Equal Point Break Equal Point

B

Data

Developer

C

INDEX()

LOOKUP()

C

Math & Trig

Arts

D

Financial

Math & Trig

C

Net Present Variance

Negative Present Value

A

SYD

SLN

A

Function > Show Formulas.

Formulas > Formula Auditing > Function > Show Formulas.

B

Financial statements

None

C

investment and securities.

None of the above

A

Current Rate

Clear Rate

A

Quality Rate

Quick Ratio

D A

Data Type Definition Data to Data

B

Average collection period

C

None of the above

Fair assets turnover Fixed assets turnover ratio ratio

D

Salary

Number

A

Document

Detail

A

Change in technology

All of the Above

D

Manufacturing - Total Product - Total Cost Cost

B

Both A and B

C

None

A

B

11

12

B

(.mlx)

(.xlm)

B

A

Perodic

Report

A

Hold down the ESC Hold down the ALT key key during start up. during start up.

A

Bold Formatting

Negative Formatting

B

Worksheet functions

Round( ) functions

C

Mode

All of the above.

D

= 1 / (1+a) ^ 2

= 1 / (1+r) ^ n

D

Fund flow

Expenditure

B

life

Factor

A

Both A& B

Actual Budget

B

Developer

Data

C

Discounting

None

C

PMT

None

B

Elements

Markups

C

Leasing decisions and the list goes on All of Above

D

Sheet2(C4)

Sheet2

A

A1, A2 , A3, A4

A$1:A$4

C

ETIB / Debt interest EBTI / Debt interest

A

EXCELSTART folder XLSTART folder

D

Further changes in value of A1 will not Further changes in value affect B1. of B1 will not affect A1. B

Personal Finance Corporate Planning Planning

B A

Financial planning

Personal Finance planning

C

Decision Tree Analysis

Corporate Planning & Analysis

B

Total Fund Ration

None of the above

B

Price Earnings Multiple

Gross Profit Ratio

C



C

Data< Data me> A PMT(rate, pv, nper, PMT(pv, rate, nper, [fv], [fv], [type]) [type]) IPMT(per, rate, nper, pv, [fv], [type])

B

IPMT(rate, per, nper, pv, [fv], [type]) D

File Menu>Options>Ad d in>Excel Add In>XML None of the above.

A

XML Maps Dialog Box

None of the above

C

1

4

B

status of assess

All of the above.

D

Equal Monthly Installement

Equated monthly installment

D

PMT

None of the above

B

Systematic sampling

Simple random sampling B

Systematic sampling

Simple random sampling C

Systematic sampling

Simple random sampling D

Snowball sampling Simple random sampling C

IRR

NPV

B

Capital Investment Investment management B

net present value

All the above

D

(.xlm)

(.mlx)

B

IRR

PMT

A

Qualitative risk analysis

Scenario analysis

B

Qualitative risk analysis

Scenario analysis

C

Both A& B

Charts

D

Both A& B

Neither A &B

B

Decision Tree Analysis

None

A

Total Interest Value Number of Periods

D

COUNTIF()

None of the above

B

Profitability Ration

None of the above

A

Rent

All the above

B

P & L Account and Balance Sheet

Voucher Account and Balance Sheet

C

Sales Note

Payment

D

Sequence number

Range number

B

more than a day old more than a week old

A

Statistical

C

Reporting

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF