ICAI ITT Questions
June 15, 2016 | Author: DINESH GOYAL | Category: N/A
Short Description
ITT Questions...
Description
QUESTION
A
B
Collection of instruction is called a _____
procedure
batch
Combination of alphabetic and numeric data is called _____ data
alpha numeric
alpha beta
Computers can be classified based on ______,______and _______
space occupied, price, cost, performance no. of users allowed their ratio
_____________ is the Worlds largest computer network .
Ethernet
Internet
_________ are used in large organizations for large scale jobs
mini computers
microprocessors
_______ devices are responsible for feeding data into the computer
input
output
_______ is the capability of the o/s to run numerous applications simultaneously multiprocessing
multithreading
_______ involves conversion of raw data into some meaningful information
interpreter
compiler
_______ device is responsible for obtaining the processed data from the computer
input
processor
_______ printers use light to produce the dots needed to form pages of characters impact printers
drum printers
control program, interpreter, Hardware components in a operating system, assembler, computer are _____,____,_____,______ bootstrap, kernel, shell compiler _______ software helps to do a specific task for the user
operating system
application software
_______ converts a high level language into machine language
processor
compiler
_______is/are a popular front end tool visual basic
power builder
_______ translates assembly language program into machine language instructions
interpreter
compiler
The model through which the relationship is diplayed between data and information is called_______ processing model
model
____________looks like a ordinary credit card but incorporate a microprocessor and memory chip____________
RAM
smart card
______ computers are used in large organizations for large scale jobs which have large storage capacities mainframes
super computers
_______ is responsible for all calculations and logical operations that have to be performed on the data
control unit
arithmetic and logic unit
______ printer use laser light
band printer
drum printer
______ software enhances the user to enter ,store, manipulate and print any text data management
word processing
_______ is the temporary storage place for deleted files
my computer
recycle bin
Processed data is called ___________________
data
datum
_____ language consists of strings of binary numbers assembly language
machine language
_________capability supports concurrent users doing different tasks
multiprocessing
multithreading
BBS stands for______ USENET is a BBS on ____ scale
business broadcasting bulletin board system system small large
Internet can be defined as _______
internal network
network of network
_________is a program that displays information about a host connected to the net finger service
ping service
_______ is a program or a tool that helps in locating a file anywhere on the net FTP
TELNET
URL stands for ____________
uniform research locator
uniform resource locator
A ______ always begins with a slash
message
scheme
The World Wide Web is referred to shortly as the _______
net
web
______ is a program that helps us to log on to other networks Usenet
finger service
HTTP is the acronym for __________
Higher text transfer protocol
Hyper text transmission port
______is used to transfer and copy files over the internet
iccp
ftp
_____ is a program that helps us to log on to other networks
yahoo
ftp
TCP/IP stands for ________________
transfer control protocol/internet
transmission control protocol/internet protocol
HTTP stands for______
hotlink text transfer protocol
hyper text transfer protocol
Two of the important browsers are_____ and_____
lynx,minx
netscape,ie
________ are defined as ways of communication amongst networks
protocols
IP address
HTML stands for_____
higher text medium language
hyper transfer markup language
The system of interlinked documents is known as_______
hot links
hyperlink
The small programmes that create animation,multimedia,real-time games and multi user games are called______
images
applets
The information displayed on the web page includes______,_____ and_____
programms,images graphics,videos,audio ,text
The web pages that represent online home of their author are called______ first page
home page
_____ is the most popular internet service
electronic mail
yahoo service
_______ is a program or a tool that helps us find a file anywhere on the net newsgroup
telnet
Yahoo,lycos,excite and webcrawlers are _____ search engines
web directories
GIF is the acronym for ____________
Graphical interpreter formatting
Graphical interchange Format
JPEG is the acronym for ___________
Joint Pictures Expert Group
Jumbled pictures expert graph
The World Wide Web consists of _________
information
web pages
A hyperlink can be on ___________
text only
image only
Web is a collection of ___________
web sites
images
The two major browsers used to surf MS Internet Explorer the Internet are ________,_______ and Mosaic
Netscape Navigator and Mosaic
The internet is also called as _______________
arpanet
the net
The internet is similar to _________________
LAN
peer-to-peer connectivity
The net transfers______ from one place to another
data
parcel
The net provides interesting services like______,______ and______
scripting,parsing and compiling
news,cooking and fine arts
________ is the ancestors of the internet
dnet
arpanet
defensive DARPA stands for administrative rank _____________________________________ administration __________ network DARPA is broken into ________ and _______
dedicated and registered projects administration
milnet,smaller arpanet mailnet,inet
NSFNET is the united states provides service to _____ and_____ education,research
music and dance
HTML stands for _____________________________________ Higher text Hotlink text _ manipulation language markup language The first international IP network connections were established in 1973 with _____ and_____
united states and UK
england,norway
A_____ is a set of computers interconnected by transmission paths to exchange information in internet
server
client
A computer that provides a service usable by other computers is called______
client
stand-alone
_____ can be owed by multiple organisation
LAN
MAN
Data is transmitted in the form of_____ signals
analog
digital
Modem stands for __________________ Moralize/demoralize
Modulation/demod ulation
______ is the process of the digital signals being converted into a form suitable for analog transmission Mapping
Modulation
________ and______ are two basic ways of getting connected to the internet
Satellite link and digital signals
Dedicated access and dial up access
SLIP stands for ________________
Standard long internet Stream line protocol internet protocol
PPP stands for _____
Prime prolonged protocol
Point to point protocol
Identify the need for controls and auditing in a computerised environment.
Absence of input documents
Lack of visible transaction trail
The organisational, management, maintenance and access controls are categories of ……
Application controls
General controls
The application controls are ….
Input controls
Processing controls
Identify the field check - "If a set of values is defined, is the input data one of these defined values?"
List
Range
The field check that conforms if data input for a field is in a particular format. Format mask
Data mask
The field check on a processed data that fails if a field is not initialized to zero or errors occur during calculation is…… Range
Sign
The validation checks applied to a field depending on its logical interrelationships with the other fields in the record are called …..
Field checks
Record checks
A group of records or transactions that are contiguous constitute …..
Physical batches
Logical batches
…………..is the type of batch check (group of records) for all input records of a particular type is done. Control totals
Serial number
Grand totals calculated for any code on a document in the batch are called….. Financial totals
Record totals
Control that checks if correct sequence of commands and update parameters are passed from the application software to the database. Table level
Data Integrity
With respect to data integrity control, when monetary transactions are processed against master files without a match, we should maintain a …. Sequence account
Data account
The system test that tests the toplevel modules first and then the lower modules are simulated with dummy modules to check the interfaces is called ….
Bottom up test
Hybrid test
Identify the audit technique that examines each transaction as it passes through the system.
Embedded code
Program code
The Core Image Comparison audit technique compares the….
Executable Database with master program with table master copy
The technique used by an auditor to list unused program instructions is….. Modelling
Analyzing
The sample data created and used for the purpose of testing the application system is called….
Test data
Table data
The test data (dummy unit) implemented in the normal processing of the system over a period of time is known as….
Black box Test Integrated Test Facility Facility
The test data generated with correctness proof, data flow analysis and control flow analysis tools is called…. Test item block
Test data pack
When a real-time system is simulated to generate the same output as the real-time system, the technique is called…. Parallel trailing
Tracing parallel
When an auditor expands the extent of substantive tests to determine the impact of defects on the attainment of program objectives, the methodology is…. Cross reference lister
Formulate flaw hypotheses
This is an important control in systems that use digital signatures for authentication purposes.
Public audit trails
Random audit trails
Selecting transactions based on a sampling rate is called …. method.
Transaction sampling
Systematic sampling
The capability of the generalized audit software to read different data coding schemes, different record formats and different file structures is…. File size
File data
The audit software capability of frequency analysis is to….
Sort and merge files
Sampling nth item
The audit functions of attributes sampling, variables sampling, stratified sampling are included in …. functions.
Stratification
Selection
Identify the functional limitation of a generalized audit software that enables evidence collection only on the state of an application system after the fact. Ex Post Auditing Only
Analytical review only
The purpose-written audit programs Sorting, creating, and Data retrieval, are used for….. printing files code comparison Picture of a transaction as it flows through the computer systems is called…..
Program
Track
Identify the type of audit when auditors are members of the systems development team.
General audit
Post audit
The processor uses this workspace as a scratch pad during processing. Monitor
Processor
1024 Megabyte is equivalent to:
1 KB
1 MB
The software used for layout of newsletters and magazines along with text and images is called……
Application software
Desktop publishing
The model used to describe the relationship between data and information is called
System model
Data model
A super computer uses a bus width of……
16 bits
256 bita
When a processor executes one billion floating-point arithmetic operations per second, is called…..
Nanoflops
Tetraflops
The processor responsible for communication to and from all the remote terminals connected is termed as ………
Front-end processor
Host processor
The processors used for speedcritical graphics applications are…… CISC
RISC
The plastic cards with embedded microprocessor and memory are called…..
Credit card
Computer card
VLSI stands for…..
Very large scale Integration
Very limited silicon integration
The data width of a Pentium 4 computer is ……
16 bits
8 bits
The unit which executes addition, subtraction, multiplication and division operations is ……
CPU
ALU
The instructions to be executed by the processor are loaded from memory into the
Instruction unit
Process register
The results of a process are stored into ………
Accumulator
General-purpose Register
The memory that stores data as a series of memory cells that can be accessed sequentially is……
DRAM
SAM
The technology used to accelerate the processing of a computer is ………
Processor bus
Cache memory
The memory used in a computer's BIOS chip is……..
Cache memory
SRAM
The process of swapping information between the RAM and hard disk can cause Fragmentation
Disk full
The standard system bus was replaced by frontside and backside bus called…….
Dynamic memory Dual independent bus bus
The DSP,DAC,ADC,and ROM are parts of the ……
Graphics card
Memory card
The bus whose widths are 32 or 64 bits is called……
ISA
PCI
The maximum resolution of a standard SVGA adapter is ……
1024*640
780*1024
…………. synthesis method uses recordings of actual instruments.
Amplitude
Frequency
The instrument that can produce continuous lines is…..
Printer
Plotter
PPM , CPS are units used to measure the printer's ….. Speed
Quality
The PCL and postscript are defacto standards for……
Page definition limit
Page description languages
A laser printer has RAM for downloading fonts called the…….
Font catridges
Dynamic catridges
The characteristic which refers to how sharply a pixel appears on the monitor is called…..
Convergence
Resolution
The faster the refresh rate, the lesser the monitor…..
Sharpness
Resolution
Size of image
Colors and shades of gray that can be displayed
The number of bits used to represent a pixel in a monitor decides the …….
The input device that utilizes a lightsensitive detector to select objects on a display screen is called….. Touch screen
Touch pad
The most commonly used scanner technology is….
Optical character Charge-coupled device recognition
Identify the type of mice that uses optical sensors to detect motion of the ball.
Mechanical
Optomechanical
Identify the input device that consists the puck and the stylus.
Trackball
Joystick
Identify the disk which has an access time of 30ms.
Zip disk
Floppy disk
A set of tracks across a set of platters in a hard disk is called a…… Disk
Cylinder
The bus used to connect a CD-ROM to your computer is…..
SCSI
PCI
The digital audio tape with the capacity of 24GB of data uses the technology called …..
Hyper circles
Fero magnetic
The floppy disks that support 400k1.2 MB belong to…… IBM
Macintosh
The backward compatible disk that has high density-120MB is called…. SuperDisk
Jaz disk
The maximum capacity of an optical disk is …… 700 MB
6 GB
Which of the auxiliary storage devices uses the constant angular velocity access technology?
Super disk
DAT-ROM
The……..is an auxiliary sequential access non-volatile storage device.
Winchester disk
Zip disk
The portable device that optimizes the features of the floppy and the CD-ROM is….
Hard disk
Jaz disk
The important central module of an operating system is the….. Memory module
Data module
Identify the function of the operating system that manages the tasks waiting to be processed. Job management
I/O management
This function of the OS manages allocation of a minimum main memory to tasks.
Disk storage
Memory storage
Identify the multitasking type that slices CPU time to each program.
Paralleling
Cooperative
The OS which allows different parts of a single program to run concurrently is…..
Multithreading
Multiprocessing
The OS that monitors external activities with timing constraints is….
Multi-user
Real-time
The 32bit operating system for desktop version that replaces Win 9x is…..
Win 2000 server
Win 2000 datacenter
The high-level logical disk structure which defines the way the entire disk is organised is ….. Frame allocation table File allotted table A collection of sectors on a hard disk is a Block sector
Cluster
The FAT system that provides long filename support and was written using protected-mode code .
FAT16
VFAT
Identify the file system that provides networking,security,compression, large file support…. FAT16
VFAT
The logical directory structure has a base of the tree called the…… Root directory
Main directory
The process used to optimize the disk space by arranging files contiguously is …..
Defragmentation
Formatting
Choose the level of RAID that offers disk mirroring for fault tolerance. Level 0
Level 2
Identify the archive formats found on Unix-based Internet sites.
Exe, zp, tz
Zip, LZH, ARJ
Identify the window screen part that indicates the name of the window, application or document. Title bar
Menu bar
The button on the title bar of a window that displays the menu to control the size of the window is….. Scroll box
Control box
The mouse operation that is used to move windows and icons to different locations is ….. Click
Double click
The start button,tray and shortcuts are important features of the …….
Control panel
Title bar
The start menu option that keeps track of your important websites is …..
Documents
Programs
If you want the recycle bin capacity to be distributed across partitions, Configure drives you must use the option …… independently
Configure capacity independently
The feature to retrieve deleted files from the recycle bin is ….. Re-paste
De-link
The feature which enables to synchronize files between a floppy and disk is …..
My Briefcase
My Documents
A file with the pdf extension can be viewed with the application….. Adobe Acrobat Reader Adobe Viewer The remote administration access to view shared resources on the network is….. Net Neighbourhood
Net Tracer
The utility used to access the directory structure, create files and folders etc is….
Windows Explorer
Windows Tools
The font, color, background settings are saved in the ….. Control panel
My computer
The Notepad utility saves files in the …… format. Binary
Unicode
Identify the windows feature that allows more than one person to use a single PC with his own desktop. Log off
Run
You can quickly access the recently worked on files from this start menu option. Favorites
Accessories
The Internet is a network similar to …..
Peer-to-Peer connectivity
Point-to-Point link
When a computer is connected to the internet through a LAN
Dial-up access
Dedicated access
PPP stands for:
Protocol to Protocol Points
Point to Point Protocol
SLIP stands for:
Serial Limited Internet Serial Lock InterProtocol Protocol
When a user connects to Internet with a shell account it is called ……. Direct access
Dedicated access
The launch of DARPA's Internet Protocol (IP) facilitated the term….. Network
Consortium
The costs of Internet implementation are…..
Computer cost, network card cost
Connection cost, cost of telephone line
This software enables a host to work as a terminal on the network. Terminal embedded
Terminal emulator
The Windows Internet application functions were developed based on the UNIX programs called….. Sockets
Package
Each computer on the Internet is identified with a….
24-bit address
16-bit address
A mail server robot can automatically….
Check mails
Read mails
This protocol is used to check reliability, sequencing and flow control.
Transmit Communication Protocol
Transmission Control Protocol
To check that data reaches the destination in a proper order, the data packets are assigned….
Order numbers
Packet numbers
The computer which provides FTP, WWW, Mail services on a network is called…. Client
Server
The method of accessing files through publicly accessible server that gives free access to the files is called ……
Server FTP
Public FTP
This file is transferred verbatim with FTP service. ASCII file
BIT file
We can access the Archie server by……
Tunnel
WWW
The types of Archie servers are …..
Straight Archie
Windows Archie
% telnet archie.ans.net is the command used by the Archie client Program the Archie to…. Login to Archie server Server This tool helps us to locate a file anywhere on the Internet.
FTP
Remote
The computer that maps the Internet domain name to the Internet numeric address is the …..
Network translator server
Address Naming server
………….is the format of Internet Address.
Aaa-bbb-ccc-ddd
Aaa.bbb.ccc.ddd
The email address has two parts one is the username while the other is the …. Domain
Net
The resources on the World Wide Web are linked with the naming format …..
Universal Resource Locator
Universal Resource Location
This Net tool provides a stimulating on-line discussion environment. Internet Relay Chat
Relay packet transmission
The IRC II client program command begins with a ….
Slash
Percent
The IRC conversations are organized into…. Chats
Packets
Identify the output of the IRC command " /list -min 10" .
Display chats with Display channels with the maximum 10 at least four users users
Lynx text browser is a web client in which users can login with …..
Self accounts
Terminal ping
A web browser provides this hotlist for a user.
Book-keeping
Bookmarking
The tool to obtain information on the web by menus and more flexible than Archie is…. Lynx
Juggler
These servers help in searching for words from a list of databases or documents.
WIIS and NETWAIS
WINWAIS and WAISMAN
This scripting language is an object based language and is developed by Netscape. SGMLScript
VbScript
The one-way broadcast of live events is called….
Cybercast
Netcast
This is a system of thousands of distributed bulletin boards and read by a newsreader. Bulletinreader
Newsgroup
Unix shell provides mailing programs called ….
Pile and Elem
Pine and Elm
The Unix to Unix copy mail system separates parts of the mail address with the symbol...….. @
!
The Netlauncher (TCP/IP) software consists of these programs that can run under Windows. Spy Mosaic
Image View
The parts of the WSIRC server (net tool) window are…..
Server message, command line and channels
Server message,command line and channels
These are small java programs that create games, multimedia etc. These are downloaded over the Net and executed by a web browser. Java scripts
Java exe
The World Wide Web is a collection of…..
Web windows
Net pages
It is a link which helps in retrieving information from the WWW easily.
Netlink
Sitelink
…………..directories deliver information on all the topics on the Internet.
Web maps
Net ports
This browser does not display links in color.
Netshark
Cello
The Mosaic browser stores information about the configuration in a/an …. Ini file
Exe file
This is an indexer that crawls around the web cataloging. Webcrawler
Web sites
The option by which the browser window in Navigator Gold 2.0 can be shifted to editor window is …. Edit/New file
Edit/Save Window
This toolbar button displays information about web creation.
Web page starter
Printer
This window in Navigator Gold does not support frame display. Script window
Browser window
The different ways of communication on the Web are…..
Interpersonal
Group
This download tool provides multiserver connection, can search for mirror sites and provides a file leecher.
Download Accelerator Plus Fresh Download
The…………button provides HTML tags for font style, alignments, and colour options.
Edit Format
Character Format
Identify the search engine that helps in concept based searching. Lycos This is a text only browser. Lycos
Yahoo Lynx
The multithreading feature of Netscape is facilitated with a storage space named…..
Archive
Cache
The distributed uploading of web pages through Navigator Gold is called…..
Web loading
Web updation
The method of presenting information on the web through highlighted items is called……
Hypertext
Webtext
The a2z directory is an alphabetical list of pages used by the search engine….. Netleecher
Webindexer
Netscape browser can display context links on an image called….. Image webs
Image maps
Name the download tool which highlights an area of a page and gets all the links that are within the highlighted area. Webcrawler
Webcow
………...helps in business transactions, generating revenue and demand on the information highway.
E-Marketplace
E-commerce
The transfer of structured data for processing from computer to computer using agreed formats and Electronic Document protocols is called….. Intercahnge
Electronic Data Interchange
This system involves electronic transfer of funds between financial institutions.
Efficient Format Transactions
Electronic Financial Transmission
A …… electronic mailbox stores EDI Very Advanced transactions for later retrieval. Value Added Networks Networks The mutual satisfaction of price, terms and conditions, delivery and evaluation criteria in a marketplace Negotiation and is…. Bargaining
Networking and Buying
The type of advertising, the Broadcast and Junk Mail models are of….. Passive
Push
Identify the models of passive advertising.
Billboard
Portal
This layer is responsible for transmitting data as frames.
Network Layer
Data Link Layer
This layer is responsible for encoding of data.
Link Layer
Network Layer
This layer of the TCP/IP suite includes the device driver and network interface card.
Application Layer
Link Layer
This protocol is used for flow control, Simple Mail Transfer echo and flow redirection. Protocol
Internet Control Message Protocol
The software components that integrates different hardware devices with the operating system…..
Device drivers
Device modules
This is the basic component that connects the computer to the network.
Cable Interface Card
Netlink Interface Card
The dumb terminal/node in a network depends on this computer for their basic functioning.
Personal computer
Client computer
This has an embedded microchip which can both manipulate data and execute applications. Data card
Security card
To ensure a reliable communication between the buyer and seller, the Session Socket Layer protocol used is…. Protocol
Secure Sockets Layer Protocol
The financial transactions are to be …………. leading to different steps in Collected and Accounts Compilation. computed
Sampled and stratified
The basic document where transactions are entered chronologically is….
Ledger
Journal
These are the basis for analysis by potential investors, banks etc.
Journal and Ledger
P & L Account and Journal
The accounts that the business owns is called ….
Liability
Income
The expenditure for running the business for a period is …..
Expense
Example
Identify the account type by the rule: "Debit the receiver and credit the giver".
Real accounts
Personal accounts
The first document where the transaction is entered is called a ….. Ledger
Liability
The document used for posting of accounting transactions is ……....
Ledger and trial balance
Voucher and journal
When the debit total is greater than credit total, the amount appears in the …….. column. Income
Debit
The methods LIFO, FIFO, Moving Average are used to ….
Value clearing stock
Value closing stock
The report prepared taking the asset and liability type accounts from the Trial Balance is called…. P & L statement
Income statement
The report that depicts operating profit/loss for a period is …..
Trading account
Trial balance
The day book contains transactions relating to ……… Income or expenditure Sales or purchase
The Bills Receivable details are maintained in a ……..
Journal sheet
Voucher debtors
Creditors ledger has details of your dues to ……..
Customers
Assets
The sundry debtors are placed in the Balance sheet on the …… Income side
Assets side
The first step in Tally before any transaction is entered or saved is creating a ………
Company
File
To configure country specific details use the function key…… F10
F2
Identify the security mechanism used in Tally.
Tally Secure
Tally Pack
After selecting a company in Tally, you will be in the……
Accounts of Tally
Gateway of Tally
Tally software is based on ……… accounting system.
Sales
Production
Identify the primary group of capital nature that uses bank account and cash in hand as sub groups. Fixed assets
Current assets
All financial entries in Tally are done using……. Vouchers
Groups
The Direct expenses, Purchase account, Direct income are primary groups of …..
Expense nature
Capital nature
The option to delete a sub-group is admissible through the menu…… Alter
Delete
The behavioural attributes of this group cannot be changed.
Sub-group
Ledger-group
Credit limits for personal accounts and branches can be done in the ledger mode……
Single
Multiple
We are not allowed to delete a ledger from this mode.
Single
Sub-group
All account heads except Cash and Bank are placed in the……
Sub Ledger master
Group Ledger master
Identify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank OCC Account. Expenses
Income
The primary document for recording all financial transactions in Tally is the…… Journal
Trial sheet
You can customize the voucher entry screen using the function key……. F13
F12
Identify the voucher type that records fund transfers between cash and bank accounts. Credit Note
Payment
This voucher type records adjustments between ledgers.
Receipt
Sales
The use of classes for payment, receipt and contra vouchers enables data input in …… Double entry mode
List entry mode
The details of a voucher entry can be given in the …….
Comment
Memo
The credit note voucher can hold account types: ……..
Sales account, Sales tax account
Ledger account, Bank account
The suffix and prefix details for the voucher type can be made applicable only from the …….
End of a month
First of a year
The voucher used to record all bank and cash payments is ….. Credit Note
Contra
Tally's age-wise analysis considers the voucher's ……
Effective date
Previous date
Arrange the steps in generating the books of accounts. 1. Create Trial balance 2. Create new ledgers 3. Generate Day Books 4. Update journals for financial transactions 1, 2, 3, 4
1, 3, 4, 2
For day-to-day transactions the voucher types used are
Cash purchase
Credit purchase
Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be entered into the voucher type….. Loan
Payment
Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10 monitors by credit. Credit Purchases
Cash Purchases
Identify the voucher type to be chosen for the sale of computers to Anand by cash @ Rs.210000 per unit. Cash Ledger
Sale Sheet
A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher…..
Payment
Receipt
Balance sheet
Profit & Loss statement
The financial statement that consolidates ledger balances is …..
The F9 function key in the left side of the Gateway of Tally screen displays the……
Accounting reports
Inventory reports
The option on the Gateway of Tally that will generate the P&L account statement is…..
Net Loss
Net Income
This displays the balance daywise for a selected voucher type.
Record book
Ledger book
The feature in Tally to analyze accounts of a company is…..
Ratio analysis
Account analysis
The age-wise statement is displayed based on…… Income
Payables
The ratio analysis of receivables can be done based on…… Bill date
Effective date
Name the statement that helps the management in the decision making process. Data flow
Funds flow
Identify the budget type which is chosen where transaction amounts are to be monitored.
On closing balance
On net credit flow
Choose the budget type to be used where bank accounts balances are to be monitored.
On closing balance
On net credit flow
The management that needs to consolidate the accounts of its various enterprises uses ……. in Tally.
Consolidate company
Group company
Identify the user who can access audit trails in Tally.
Owner
Data Entry operator
Identify the accounting feature in tally that facilitates splitting financial years for a company data.
Yearly-entry Month-less accounting accounting
The tracking of changes in vouchers and ledger masters is done by….. Tally Vault
Tally Audit
Tally can import data from other programs and creates a log about the activity in the file…..
Tally.cfg
Tally.imp
Import and export of data between Tally and other programs is possible with the help of….. OLE
DBMS
The manual option of voucher numbering leads to…..
Duplicate number
Auto numbers
The Tally audit trail tracks changes made to vouchers that are …..
less than 30 Days more than 30 Days old old
The ratio analysis of Bills Receivables or Bills Payables can be displayed with the function key….. F5
F8
In IDEA, import Assistant wizard is used to import data from____________.
Excel
Access
In IDEA, Append functions can be used to_________.
Import data
Add data at the end
In IDEA, Statistics functions can be applied on_________.
Numeric Data
Date Data
In IDEA, increment value in Stratification function can be fixed or free interval.
FALSE
TRUE
In IDEA, Stratified Random functions is a part of which menu. Analysis
Data
Which of the following is not an Audit Software
ACL
IDEA
Using which functions to perform more complex calculations and exception testing in IDEA?
Equation Editor
function Editor
Which is the step by step procedure File->Print->Create for reporting in IDEA. Report
Click on Create Report button on the Operation toolbars->Report Assistant.
Which of the following are categories of computer audit function ?
Items of audit interest Data Analysis
In the following list which is not an audit function ?
Sorting
Filtering
In the following list which is a audit function?
File Definition
Stratification
What is the procedure for importing File->Import Assistant- File->Import -> data into IDEA ? > Import to IDEA Import to IDEA Which is the following step involved in a source code review Review Programming methodology ? standards
Understand program specifications
In IDEA which functions should be used to find repeated values ?
Exclude
Detection
In IDEA, Stratification functions can be applied on which type of data ?
Numeric Data
Date Data
In IDEA,Summarization accumulates the values of Numeric fields for each____________. Primary Key
Unique Key
In which sampling,selecting sampling units using a fixed interval between selections is_______________. Random
Systematic
Ensures that all combinations of sampling units in the population have an equal chance of selection is____________.
Random
Systematic
In Audit tool, to built relation between two tables, both table should have_____________.
Common Table
Common Field
Input Control method is a part of Application Control Group.
TRUE
FALSE
Which is the following type of check that can be run when data is input through terminal ? Field check
Filter check
Which is the following is the correct types of Field checks on processed data ? Overflow
Range
IDEA exports data in a number of _______________________.
database
text
Which is the following is the correct types of Record checks on input data ? Resonableness
Compare
Which is the correct types of Batch Checks ?
Control Totals
Outdated checks
Which is the need for table level tests ?
Data Integrity
Controls are required for authorization
Which is the following is the major points with respect to inter table tests ?
This may make the entire child tables referenced by the master field in the main table unavailable
Their Master & Child relationship reference the table from one another
Which is the software used by the auditor to take a view of a file of data or transaction passing through the system at a particular point of time ? Mapping
Snapshots
Which is the software used by the auditor to compare the source version of a program with a secure master copy ?
Souce comparison
Code compasion
Which is the techniques whereby the auditor arranges or manipulates data either real or fictitious, in order to see that a specific program or screen edit test is doing its work ? Debug Testing
Logic Testing
Which is the software used by the auditor to list un-used program instruction ?
Mapping
Log Analysis
Which is the software used by auditor to read and analyze records of machine activity ? Machine level
Executable level
Which of the following reason strongly call for Control & Audit Function ?
Absence of Input Document
Lack of Visible Transaction Trail
In IDEA,Data Extraction select data form a file for further___________ for creating a new file of logically selected records. Extraction
Recording
Which is the correct types of Field checks on input data ?
Missing data
Blank data
Which is the major points to be consider with respect to System tests ?
To ensure the input data is valid before entering the value
Test whether the overall system meet the requirement specifications
In Data analysis techniques, which law is used to idenfity statistical report on numeric data ?
Bend Law
Benjamin law
Which is not a feature of File reorganization with an auditor perspective?
Filtering
Sorting
What do you understand by the term, “Data Consistency” in using CAATs?
Establish relationship between two or more tables as required.
Identify fields, which have null values.
Functions involving use of arithmetic operators, which enable performing re-computations and re-performance of results is an example of? Statistical function
Arithmetic function
Which of the following is a benefit of File an FIR based on using CAATs? audit finding
Identify an audit finding w.r.t. materiality in an IT environment
What is step by step procedure for using Bendford's law function in IDEA ?
Data->Benford's Law
Analysis>Benford's Law
A Benford's Law analysis is most effective on data________________.
Comprised of similar Without built-in sized values for similar minimum and phenomena. maximum values.
In IDEA, blank value data can be extracted by using_________.
@isblank()
as Null
In IDEA, Summarization, Pivot Table, Stratify, Duplicate Key functions comes under which menu. Data
Analysis
In IDEA, Extraction, Sort, Indices, Search functions comes under which menu. Analysis
View
_______ is centralized Banking Application Software.
Core Banking System
Core Banking Solution
Flexcube developed by ________
Infosys
HCL Technologies
Quarz developed by ____
Infosys
HCL Technologies
The server is a sophisticated computer that accepts service requests from different machines which are called__________
Clients
Customers
__________ server has to be a powerful and robust system as it has to perform all the core banking operations. Antivirus Server
ATMS stands for_________
Automatic Telephone Machine
Application Server Automated Teller Machine Server
IBAS stands for ___________
Internet Business Application Server
Internet Banking Application Server
PBF stands for________
Positive Balance File
Post Balance File
Internet banking refers to a banking transactions routed through the ________ Bank
Internet
CPPD Stands for ______________.
Computerized Computer Planning Planning and Policy and plant department Department
The _________ is generally a hardware and it plays the role of preventing unauthorized access.
Date base Server
Web server
_________has several components which have been designed to meet the demands of the banking industry.
CBS
CSB
________enable data transmission over different networks.
Switches
Firewall
_________have many ports that are connected to different systems and it facilitates data transmission with the network. Router
Switches
A Proxy server always acts in conjunction with a _________.
Firewall
Internet
The ________ provides network security by preventing malicious data from entering the network.
ATM Server
Proxy Server
_________is used for authentication.
System audit
system administration
Access to a set of servers is controlled by the ________.
System audit
system administration
________is a process of unauthorized Data base entering a network. administration
Hacking
____________ facility provides a customer to access financial transactions in a public place.
Automatic tele Machine
Automated Teller Machine
Which is the Function of ATM?
Cash Withdrawal
Balance Inquiry
Every bank branch should madatorily have a security policy.
FALSE
TRUE
Core Banking Solutions is a combination of an application software and ________
Network devices
Firewall
The Operational Controls include controls on ___________
Physical Access
Logical Access
Application Controls are broadly classified into __________________
Input Controls
Output Controls
__________controls check that the data entered is complete and correct.
Input Controls
Output Controls
Reasonableness check is a _________. Processing Controls
Input Controls
Which of the following is not a module of the CBS?
Customer ID generation
Accounts management
Bank guarantees can be __________________________
Performance Guarantee
Deferred Payment Guarantee
SLR stands for ________________________________
Statutory Liquidified Ratio
Statutory Liquidity Ratio
________are record of activities that have taken place in the system irrespective of the modules.
Logs
Index
The contents of a log includes _____________________
Activity performed
User details
Communication and Operations management must include which policies?
E-mail policy
Firewall security policy
______ is a large data housing infrastructure that provides high band width access to its clients.
ATM Server
Data Centre
Logs of the various activities in CBS can be deleted immediately and also be accessed by anybody. TRUE
FALSE
CRR stands for _________________________ in terms of CBS. Cash Reserve Ratio
Community Reserve Ratio
Does the IS Audit also include audit of the outsourcing activites carried out in the CBS system? Yes
No
DRP stands for ___________________________ in terms Disaster Recovery of CBS. Planning
Discovered Resources Planning
_____________are soultions applied when any kind of vulnerabilities discovered in networks in the CBS system.
Logs
Patches
__________can be viewed only by the DBA of an organisation. Access Rights Logs
Database Log
Is performing periodic vulnerability assessment of the networks is necessary?
No
Yes
KYC stands for _________________________________ in terms banking. Know Your Customer
Know Your Company
In CBS, the Accounts Management module deals with _____________________
Creation of Savings Account
Creation of Current Account
Soft copy of the ATM journal rolls is called_____________
Stock Journal
Journal Report
Data centre servers are known as_____________.
Application servers
Data Base Servers
The ATM switch consists of a _____________________
computer
server
_______________testing should be done to check the unauthorised access to the network in CBS.
Penetration
Hierarchical
_________enables transfer of money from one bank to another in "Real time" and on "Gross" basis.
EFT
NEFT
In _______system money transfers are done on a one to one basis while in _______system transfer is done in batches. NEFT, RTGS
RTGS,NEFT
All the money transfers take place in the books of the _________________ Beneficiary bank
Central bank(RBI)
EFT and NEFT work on _______________basis
HSM
DNS
________system of money transfer is primarily used for large transactions. NEFT
RTGS
In RTGS, the STP generates an ___________for every outbound RTGS transaction. UTN
UTE
UTR full form _________________________________ in Unique Transaction terms of CBS. Reference
Unidentified Transaction Reference
STP stands for ________________________________ in terms of CBS.
Straight Through Processing
Straight Temporary Processing
________ is a method of creating virtual networks within a physical network.
VLAN
LAN
CMS stands for ______________________________ in terms of CBS.
Control Management System
Cash Management System
Systems audit are Audit of internal important for the Which of the following statements is controls is not needed verification of the true? at all internal controls
The Management Controls does not include ___________ Managing of Assets
Formulating a security policy
_______is supported by advanced technology infrastructure and has high standards of business functionality.
Firewall
Internet banking
CBS Software resides in a Central application server which is located in the ___________
ATM Data centre
Middleware
A________ that runs the core banking solutions (CBS) and is centrally accessed by the branches. ATM Server
Central Application Server
The _________of the application is capable of only entering the data at the end point that is branches. System version
Application Version
The application server would be placed in a trusted inside zone in a separate ____________
Virtual Local Area Network
Local Area Network
Application software would access the ________
Data base server
ATM DATA Server
__________ are capable of being connected only when devices are connected to a switch.
LAN
Virtual Networks
Data communication between ______ VLANs can be controlled as per business requirements. 1
2
A special feature of STP is that _____________ number for any outbound RTGS transaction is generated by the STP System.
PIN NO
Unique Transation Referrence
_____________refers to the process of developing software which would produce the required output from the input provided of course, using the necessary hardware and Application communication systems. Development
Software Development
The______________is essential to ensure that computer security records are stored in sufficient detail for appropriate period of time. Review Management
RTGS
is a legal attempt at Which of the following is “False“ in gaining access to case of penetration testing in an IT protected computer environment of CBS? systems or networks.
Ensure recoverability of data in case of system failure.
Which of the following is erroneous statement in case of Change Management Control?
Well documented Unit test, system test, process should be integration test – all there incorporating should be carried out. all the changes.
With respect to the customer changing the Pin at the ATM which Old offset value used procedure is the ”false“ procedure? to derive new PIN.
Old Pin verified using HSM/SSM.
IN CBS, changes to the application server are not made directly to it, instead done first on a __________
Validate server
Trail server
All the various servers in the central data centre are seggregated through _______ LANs
VLANs
The __________ is a complete process in the computer so that it ensures that data that is fed in conforms to certain prerequisite conditions. Consalidation
Password Policy
When the central Data base is busy with central end of day activities or for any other reason, the file containing the account balance of the customer is sent to the ATM switch. Such a file is called __________ Positive Balance File
Application Server
Bank mate is developed by the _______
HCL Technologies
Infosys
The IBDS is located in a ____________ Militarised zone
City Zone
The main components of Internet Banking system consist of __________ Web server
IBAS
Copy of the Anti Virus Software was updated promptly and regularly at the Data Centre and pushed into all of the servers and in all the systems in the branches by ________ Hacking Method
Push-pull method
The __________which is also residing in the server at the branch actually does the banking operations. Sytem software
utility software
In Core Banking concept all the systems of the bank are connected to the Central office by means of a connectivity which may be either a _________ or a dial up line.
Leased line
local line
The ________ is generated by the software and directly sent to equipment for printed the Pin Mailer. 16 digit number
Personal Identification Number
____________would also include the existence of built in controls in the system to ensure proper processing of input data so as to provide the required output. Output Control
Input control
____________refers to an arrangement wherein the issuing bank acts on the request and instructions of a customer.
Letter of Tax
Letter of Credit
_______________ is a process by which the bank ensures the maintenance Business Recovery and recovery of operations. Planning
Business Continuity Planning
At which phase of testing the version of software is called “ beta version”?
Programmer testing
User testing
Finacle developed by _________
Infosys
HCL Technologies
In an Organization structure of IT Department which of the following function is incompatible?
Network Database administrator and Administrator and Database Security Administrator. Administrator.
The number that is stored in the ATM switch is the difference of which of the following number? Pin No - offset value The information retrieval of transactions taking place at ATM located at remote locations is through _________
Offset value - Pin No
Soft copy of Electronic Hard copy of journal Electronic Journal
The number that is generated as soon as the customer inserts the card in the ATM machine is __________
Offset value
Pin sent to customer
Which is not a Database management system.
Unix
Oracle
The data can be entered into a table in the ____________ view. Design
Datasheet
MS Access provide__________ datatype to create link to a web page,file,or email address.
Hyperlink
Link
Set as database To make a switchboard appear while startup Option in opening the database. Access Option
Set as Form startup Option in Access Option
To add or delete buttons to Switchboard, which option is used in Switchboard Manager is used.
Edit Option
Add Option
The Switchboard Manager is a dialog box that allows creating a switchboard for an Access database. TRUE
FALSE
A macro can automate data entry in Access 2010. FALSE
TRUE
Which of the following data-type is not available in MS-ACCESS
Number
Text
The validation can be defined at____________ level in Access 2010 Table
Form
A macro can be attached to an event of a control_________________________.
A form
A report
How to add switchboard in Access 2010?
Click->File tabClick->File tab>Option Button>Option Button>Command not in >Quick Access Toolbar- Ribbon>Command not in >Switchboard Ribbon->Switchboard Manager->AddManager->Add->OK >OK
The command Design Application performed action____________ on switchboard.
Close the current database
Opens a secondary switchboard.
In a Query the data can be sorted based
Single column
Multiple columns
Switchboard Manager only allows a maximum of __________command buttons on a switchboard
Nine
Eight
MS Access 2010 provides a __________pane that contained large list of actions to be chosen,enabling a wide range of commands that can be performed Action List
Action Catalog
SQL is considered to be a __________ 2GL
3GL
Which action in MS Access macro applies a fliter or query to a table,form or report.
DoFilter
FindFilter
Opens a query in the Datasheet view, Design view, or Print Preview which macro action used in MS Access.
OpenQuery
ShowQuery
Among +, , MOD, AND, XML
Go to External Data ->Export, click on More and select XML
If we are using the same table for No need to main query and sub-query,we need Alternate names to the alternate name to to provide___________. tables the tables Update Query can be used to update_________ in MS Access 2010. Single Record
More than 1 record
Delete Query can be used to delete Single Record
More than 1 record
How many Primary key constraints can create in a table______.
Two
Only one
Unmatched Query can help to find records that have no corresponding reord in other tables. FALSE
TRUE
MS Access 2010 provides queries that can be used for obtaining the aggregated results instead of individual records are____________.
Count()
Sum()
A function that Counts the set of values that satisfy the given criteria in MS Access 2010 is___________. CountA()
Count()
The _________ operator is used to find the null records in a table.
"= NULL"
NULL
Aggreagate Query also known as___________.
Group By queries
Total query
Which Query wizard is used to find repeated records in a table?
Simple Query Wizard
Duplicate Query Wizard
Append Query is used to ______________ in a table in MS Access.
Add Records
Delete Records
Which type of joins not available in Access 2010? Inner join
Left outer join
A join returns only those rows from both tables that match on the joining field is___________ in MS Access 2010.
Inner join
Left outer join
The query returns all of the rows from left table, and also those rows from the right table that is known as____________.
Right outer join
Left outer join
The query using ___________ returns all the rows from right table, and also those rows from the left table that share a common value on both sides of join. Right outer join
Left outer join
How can we add a table to the Query Design window_________?
Select Create-> Add Table
Select Database Tools-> Add Table
___________can be considered a questions in a data base.
Queries
Form
Operands can be_________ in MS Access 2010.
Literals
Identifiers
When you create relationship between two tables, the Common field's data type should be
Text & Number
Number & Text
In example "Hello"+" " +" everyone" ,hello is _____ Text Literal
Date Literal
Length("Ms Access") will return the count of charcters is __________.
8
9
AND ,OR is a kind of ________ in MSAccess 2010. Arithmetic
Logical
Comparision operators is also known as_______ in MS-Access 2010. Arithmetic
Logical
LIKE operator works with______in MS Access 2010. Text
Date
To find the null IN operator is used __________ in MS To match the value to records of given Access 2010. a set of values table Operator precedence is similar to _____ that is follwed in Algebra in MS-Access 2010.
BODMAS
Text files that are organized properly fall into one of two types are__________ Delimited files
BOMDAS
Fixed-width files
To create an unmatched Query using wizard, minimum required number of table or fields is_________. one
two
While creating the query, the criteria can be set in
Only one
More than One Field
SQL stands for____________________.
Sub Query Language
Structured Query Language
In MS Access query which logical operator returns True if both the expressions compared are true.
IF AND
AND
In MS Access query which logical operator returns True if either of the expressions compared are true. OR
IF OR
Enfore Referencial Integrity option is used to restrict enerting data in Parent Table
Child Table
In MS Access left("Access",3) function will return__________.
Acc3
Acc
Which function is used to converts the text to lower case in MS Access 2010.
Lcase()
Lowercase()
Which function is used to remove leading or trailing spaces in a text in MS Access 2010. Remove()
Removetext()
_____________ is contains a set of predefined functions in MS Acccess and helps build complex expression. Expression Design
Expression Builder
Which of the following is a Database Software Excel
Outlook
Each Table row represents a twodimensional structure Which of the following is not the composed of rows and characteristics of a Relational Table? columns
Each row/column intersection represents a single data value
Which record will be retrieved if the All values less or more Value less than 95 query criteria is < #1/1/11#? than 1,195 characters MS Acces 2010 reads and writes to the .accdb file format in chunks also known as_____________. Pages
Encrypt pages
The tab in Expression Builder in which we write expressions is known as _____________. Expression Elements
Operator Button
The criteria expression LIKE?B*.
Will match all text starting from B
Will match all text ending from B
__________ queries are useful for summarizing information, and are somewhat similar to pivot tables in MS-Excel.
Select query
Crosstab query
While entering record in Datasheet view, in which order the records can be entered Alphabetical Order
At the end of the table
When you delete the record in form, it deletes the record from__________. Form only
Form but not in table
Having clause is used in the aggregate query in MS Access 2010 FALSE
TRUE
The controls that are not linked to any field of the table or query on the form are known as ________. ActiveX control
Unbounded Controls
Which property of the form can be used to insert a background image in MS Access 2010?
Caption
Background
___________ is a report that is inserted in another report in MS Access 2010.
Inner-Report
Sub-Report
A bound main report is based on a ______________ and its _____________ contain realted information.
Table or query,InnerReport
Table or query,Main-Report
DDL stands for ____________
Data Definition Language
Data Defined Language
A___________used to compare multiple values of categories or differences over a period of time.
Pie Chart
Area Chart
A________used to compare trends over a period of time.
Pie Chart
Line Chart
To create a read-only copy of the database, which of the following file format can be used? .ACCDB
.ACCDE
The database administrator created a split database and created a frontend database and back-end database file.Which of the file should be stored on the server ? Front-end database
Back-end database
To make database package and digitally sign using which option in Access 2010 ?
File->New->Save Database as>Package and sign
File->Save&Publish>Save Database as>Package and sign
In which formats can the Collect Data through email message feature can send the data entry form? HTML and InfoPath
Access Forms
Once a mail is sent using the collect data through email message feature in Access 2010. The mail status can be checked using________________. Export to Outlook
Options in Tool menu of Access
The ___________ type of data cannot be collected using Collect data through email messages. Text
Number
What is the memo data type field used for?
To store objects created in other programs
To add table
Those records that The filter By selection feature allows match an entity in a you to filter: field
Records based on a criterion you specify
DML stands for _____________
Detailed Maintaining Language
Data Maintaining Language
Which editor was provided for use with Access Basic?
The Visual Basic 1.0 editor
Notepad
How do you update Pivot Table Save your changes, report data after changes are made close the workbook, to the source data? and then reopen it.
Select the Pivot Table worksheet and press F9 on the keyboard
What are the different views to display a Table ?
Design View
Datasheet View
Which Of The Following Creates A Drop Down List Of Values To Choose From? Ole Object
Hyperlink
A __________ Enables You To View Data From A Table Based On A Specific Criterion
Query
Form
The Database Language That Allows You To Access Or Maintain Data In A Database DCL
DML
Insert, Update Or DCL Provides Commands To Perform Change The Structure Delete Records Actions Like Of Tables And Data Values Which is not a Database Model ?
Network Database Model
Relational Database Model
Which Of The Field Has Width 8 Bytes?
Memo
Number
This Is The Stage In Database Design Where One Gathers And List All The Necessary Fields For The Database Project. Data Definition
Data Refinement
Whenever a tables gets update, the dependent query will Not update
update automatically
The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A ___________ Between Tables
Relationship
Join
What is the purpose of the Switchboard Manager in Microsoft Access 2010?
To build a main Creates the macros switchboard form that used to program controls all other an automatic forms. application.
How does a query-based report differ in design to a report based on The reports are just one table? restricted in size.
It doesn’t
How would you include some plain text into a mailing label report?
Type the text directly into the label.
Use the > button.
In a Microsoft Access 2010 report, the page numbering would most likely be placed into the:
Report Footer
Section Header
If you wished to present a professionally looking form on screen that would show all the necessary information, which of the following form design tools would you most likely use? Pivot Table
Pivot Chart
What are the benefits of an ACCDE file__________________________ in Access
Reduces the size of the database
Optimizes memory usage and improves performance.
An .ACCDE file is a ___________ version of the original .ACCDB file.
Fixed-down
Locked-down
Which type of the query is used to accept the value from the user while executing the query and fetch records accordingly Make Table Query
Update Query
To encrypt the databse in Access 2010 must be opened in the __________________.
Open Inclusive mode
Open Secure mode
To extract the records based on date field, which of the symbol should be used $
#
FIX() is a kind of ____ function in MSAccess 2010. Math
Date
MS-Access 2010 has added new features of ______ to eliminate the need of VBA code
Macro
Form
Encrypting a database does not restrict access to database objects, but to __________ the database.
Open
Modify
The setting for the Security option can be handled using_______________________ in Access 2010.
File Tab ->New Options, and selecting the Trust Centre tab from the Access Option window
File Tab ->Access Options, and selecting the Trust Centre tab from the Access Option window
Third Party Encryption Technology can also be applied to the database of Microsoft Access 2010. TRUE
FALSE
To create a split database in MS Access 2010 go to which tab?
Create Tab
External Tab
After spliting database,frontend database holds_________________.
Forms
Query
After spliting database,backend database holds_________________.
Tables
Forms
When an Access database is split, it A back-end database creates two files_________________. & front-end database
A new database & Old database.
A Data Access Page is a special type of _________ that allows users to interface with database using Internet Explorer. XML page
HTML Page
An _____________ is a group of people with a common goal, having certain resources at its disposal to achieve the common goal. Company
Enterprise
______________ can be defined as subject-oriented, integrated, timevariant, non-volatile collections of data used to support analytical decision making.
Data Warehouses
Data Models
________________ databases contain detailed data that is needed to satisfy processing requirements but which has no relevance to management or analysis. Operational
Non-Operational
Data in the Data Warehouse is ______________ , not ____________.
Dynamic, Static
Non-Volatile, Static
____________ data contains an historical perspective that is not generally used by the _____________ systems.
Operational, Informational
Operational, Static
The definition of data elements in the data warehouse and in the data sources and the transformation rules that relate them, are referred to as ___________. Masterdata
Detaileddata
Data warehouses are not the optimal environment for ____________ data. Structured
Unstructured
Maintenance Costs are high for Data Warehousing. TRUE
FALSE
Data Warehousing can be used for ___________________.
Credit Card Churn Analysis
Insurance Fraud Analysis
_________________ is the process of extracting patterns from data.
Data Analysis
Data Warehousing
___________________ is an approach to quickly answer multi-dimensional Business Processing analytical queries. Management
Online Analytical Processing
________________ include money, manpower, materials, machines, technologies etc.
Costing
Production
The Output of an OLAP query is typically displayed in a ___________ format.
Matrix
Columnar
______________ companies is planning to support tens of millions of customers with just hundreds of employees. B2B
B2C
Which of the following is the limitation of Open Source ERP?
Increased Complexities
Legal Complexities
Which of the following is not an Open ERP software?
Openbravo
SQL-Ledger
_____ is the process of integrating all the business functions and processes in an organization to achieve numerous benefits. EDI
ERP
________ must consider the fundamental issues of system integration by analyzing the organization's vision and corporate objectives.
Manager
Auditor
The more the number of __________, the longer the implementation time. modules
process
Customization of ERP systems is one of the major challenges in auditing ERP security. TRUE
FALSE
Tally.ERP 9 provides graphical analysis of data which helps the user to perform deeper analysis.
FALSE
TRUE
The user can ________ the company data into multiple companies as per financial periods required. Import
Export
___________ is a collection of activities that make one or more kinds of input and creates an output that is of value to the customer. Business Model
Business Function
E-Filing of Returns refers to the process of electronically filing your tax returns through the ___________. Intranet
Internet
Tally.ERP 9 does not allows you to export the ETDS forms in NSDL compliant formats as well as facilitates printing of TDS Forms in Physical Form.
TRUE
FALSE
Tally.ERP 9 offers a data encryption option called _______________.
Tally Data Encryption
Tally Data Encoding
___________________ is the process of exchanging Tally.ERP 9 data between two or more locations. Serialization
Randomization
The Tally website offers _______________, by which a user can communicate with a Tally representative and get required information. Tally Forum
Tally FAQ
Tally.NET use _______________ for centralised Account Management.
Control Centre
Data Centre
The data is transferred between the remote location and the server using a secured mechanism called __________________. Encoding
Decoding
Sales Tax Ledger falls under which Group?
Indirect Expenses
Duties and Taxes
Alias represents ___________ in Tally.ERP9.
Short name
Nickname
If we purchase any Fixed asset in credit, we can pass it from _________. Payment mode
Receipt mode
Information systems can be designed so that accurate and timely data are shared between functional areas. These systems are Isolated called Integrated Information Information _______________________________. Systems Systems To save entry without any amount, we have to use _____________.
Cost Center
Maintain Multiple godown
Transfer of materials from one godown to another godown, use ______________.
Manufacturing Journal Stock Journal
While exporting Ledgers from Tally to Web Page, we use _________.
XML Format
ASCII Format
Budget represents _______________________.
Estimation
Forecasting
In Service tax Credit Adjustment (%) should be either ____________. 0.2
1
Service Tax Report can be seen from _________________. Display > Day Book
Display > Account Books
Can we allow Expenses/Fixed Assets in Purchase vouchers? Yes
No
Transfer from Main Cash to Petty Cash we require to pass _______ voucher.
Contra
Payment
Income Tax number of the Company will appear in which report? Cash/Bank Book
Profit and Loss A/c
A business model is not a ___________ model.
mathematical
system
The approach to ERP is to first develop a ______________ comprising the business processes or activities that are the essence of a business. Business Model
Business Function
OLAP systems use concept of OLAP cube called a ______________ cube
single dimensional
hyper dimensional
The data which is to be exported from Tally.ERP 9 can be in ________ format.
XML
HTML
In Tally ERP-9 Remote Access is also known as __________. Networking
VB.Net
Accessing data store on a remote location using Internet in Tally.ERP9 is called____________. Local Data
Remote Data
Tally.ERP9 can be classified user in two categories are___________.
Local User
Remote User
Which of the following is not a predefined security level provided by Tally.ERP 9?
Owner
Public User
The business model is represented in the graphical form using ______________ and ________________
charts, pictures
smart art, clip art
Which of the following is/are the data warehousing activity?
Defining the Identifying and correct level of prioritizing subject summarization to areas to be included in support business the Data Warehouse decision making
___________________ is the succession of strategies used by management as a product goes through its life Business Processing cycle. Management
Online Analytical Processing
_______ integrates supply and demand mangement within and across companies.
BPM
SCM
OLAP stands for _________________.
Online Analysis Processing
Online Analytical Processing
__________ includes transportation from Suppliers and receiving inventory.
Inbound Operations
Outbound Operations
Which of the following is not the service area of SCM?
Logistics
Asset Management
Which step of the ERP implementation involves, educating and recruiting end users throughtout the implementation process? Step 1
Step 2
The system ____________ process will address issues such as software configuration, hardware acquisition and software testing. implementation
upgradation
A __________________ review is recommended to ensure that all business objectives established during the planning phase are achieved.
under process review
pre implementation
In _________________ stages, auditors have access to rudimentary ERP tools and capabilities for auditing security configurations. post implementation Immediate posting and updation of books of accounts as soon as the transactions are entered. This is called as __________
pre implementation
Immediate Interactive Processing Processing
Which of the following ETDS forms are available in Tally.ERP 9?
Form 26, Annexure to Form 27, Annexure 26 to 27
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility File Validation called __________________ File Validation Program Utility ERP systems provide an access to the__________ data
integrated
distributed
________________ is a tool that refers to skills, processes, technologies, applications and practices used to facilitate better, accurate and quicker decision making. Data Warehousing
Data Modeling
Business intelligence systems are ________ Decision Support Systems.
information driven
data-driven
Data warehousing technology is the process of creating and utilizing the company’s __________ general data
historical data
The data in the Warehouse comes from the _________ environment and external sources. operational
backup
In essence, SCM integrates ___________ management within and across companies. supply and demand
supply and chain
_____________ including all fulfillment activities, warehousing and transportation to customers. Inbound operations
outbound operations
Customer Relationship Management is a ________________ level strategy. business
corporate
Operational CRM provides support to ___________ business processes. front office
back office
Collaborative ______ ultimate goal is to use information collected by all departments to improve the quality of services provided by the company. CRM's
ERP
Tally.ERP 9 follows the DES __________ method to safeguard the data. encryption
decryption
Business Intelligence Systems are data-driven ___________________.
Information Systems
Integrated Information Systems
With ______________ technology the characters are reduced in breadth and user is allowed to input additional characters which would make the account name, entity complete and readable.
Tally Fix
Tally Adjust
In Tally.ERP 9 __________________ provides the user with administrator rights and the capability to check the entries made by the authorised users and alter these entries, if necessary. User-defined Security
HTTP-XML based data interchange
__________________ is an enabling framework which establishes a connection through which the remote user can access the Client's data without copying/transferring Direct Web Browser the data. Access
Web Publishing
If we want the company to be connected automatically for remote access on load, the property Allow to Connect __________ needs to be set it as Yes. Company
Contact On Load
___________________ technology is the process of creating and utilizing the company's historical data. Data Warehousing
Data Modeling
Is there a fixed qualification for internal auditor_________.
TRUE
FALSE
Which of the following will not appear in the home page of K-Doc?
Powerpoint
Word
To change an email header so that the message appears to have originated from someone or somewhere other than the actual source is known as___________.
Email middle attack.
Email Spoofing.
To playfully satirize a website is known as_____________.
Web tapping
Web Interception
_________is the complete package to manage the billing requirements of a CA firm on cash system of accounting. Payroll
eSecretary
Which of the following is not a/an feature of eSecretary?
Contact Management
Greeting Management
Annual return preparation can be done using ________.
ICAI-ROC application
K-DOC application
________is correspondence automation & management software that is seamlessly integrated with Microsoft Office. K-DOC application
eSecretary
________ is an independent,objective assurance and consulting activity designed to add value and improve an organization's operations. Statutory audit
Tax audit
Which of the following is/are the main purpose of the internal audit?
Operations of the organization
Financial reporting
As per _____________of the Income tax Act,every person carrying on business or profession is requires to get his accounts audited by a CA before the "specified date". Section 45
Section 44AD
__________________ refers to use software/applications to automatically perform tasks such as accounting,preparing trial balance, financial statements etc. and electronically transmit data or information using internet.. ERP
Office automation
FEMA Stands for _______________.
Foreign Exports Management Act
Financial Enterprise Management Act
Which application helps the management to allocate the revenue to the credit of the right employee who identified the opportunity?
Resource allocation and scheduling
Knowledge management
Who has full privileges in the financial accounting application?
Database administrator
Account administrator
_________is the centre point of the financial accounting application as any transactions having financial impact carried out in any other module will reflect in this module.
AP module
GL module
In Financial Accounting Application,the transactions flow from GL (General ledger) to other modules.
TRUE
FALSE
Which of the functionalities is not provided in the purchasing module Receipts of goods of Financial Accounting Application. Evaluation of Vendors or service In Financial Accounting Application,automatic sequence number of documents control is not required in which of the following module? Purchasing
Accounts Payable
Which module of Financial Accounting Application can be used for assigning credit limit to customers? Purchasing
Sales
Which of these will trigger/alert for timely payment ?
Accounts Receivable
Accounts Payable
We can manage interviews,offers and job vacancies by using which of Resource allocation the application? and scheduling ________,___________,__________ are commonly referred to as CIA in information security parlance.
Confidentiality,Inte Confidentiality,Integrit grity and y and Availability Authentication
___________provides information about updation of project cost based on time spent by employees on Performance various projects. management system
Which of the follwing is not a/an functionality provided by PMS?
HR and Payroll applications
HR management system
Employee Capture the Key designation and Performance Indicators reporting structure
___________automates the calculation of salary for taking inputs from the timesheet application, leaves from Leave Management System and salary details from the HR master data.
Timesheet System
HR management System
Which of the follwing is not a control Reduce administrative in Leave Management System? burden on HR Excess leave Permanent Audit File are obtained once but updated on __________basis.
In Permanent Audit file, _______ is not the key data documented.
half-yearly
yearly
Organization chart
Client’s accounting manual
The Document Management Sytem offers the features___________. Role based access
Complete audit trail
________is a type of training in which user logon on the training server with a user ID and password. Internal Training
E-Learning
In some cases, trainee is supposed to appear for the examination/test at the end of the training is____________.
E-Learning
Classroom Training
________ are the hardware/infrastructure equipments used in a CA firm. PC
Application Server
_____________means information available in the organization should not be altered or modified by unauthorized personnel. Confidentiality
Integrity
Which of these is/are the standard email program used in an organization?
Microsoft Exchange
Lotus Notes
Which of the following is not a characteristics of WAN?
Most WANs are owned Compared to LAN, by only one its transmission organization. speed is low
_________is protection of information assets from threats to preserve their value. Confidentiality
Integrity
Which types of information assets need to be secured in a CA Office?
Client data
Own data
The extent and level of _________ would depend on the nature of information.
Availability
Confidentiality
__________ of information might be affected due to denial of service attack or some other reasons.
Integrity
Authentication
__________means the sender cannot deny having sent a message and receiver cannot deny receiving the message. Non-Repudiation
Integrity
Risk may not be _______ in nature.
reputational
financial
The process of identifying an individual, usually based on user id and password in an organization is called______________.
Availability
Authentication
Which of the following is not a software equipment required in a CA's office?
Resource allocation and scheduling
Client management
Which of the following is not an application arranged by ICAI?
ICAI-XBRL suite
K-DOC
How many stages are there in the sales cycle?
2
3
PBX stands for ________
Private Exchange Branch
Public Exchange Branch
XML stands for_________
Expansion Markup Language
Expansion Makeup Language
VBA stands for_______________ .
Visual Basic for Applications
Visual Basic for Applets
Store, structure, Find the correct sequence in case of Structure, store, and and transport XML file, are transport information. information. Programming of Macros is done in programming Language ___________. VBA
ASP.Net
As Bank auditors,Many Banking applications generate text files in ____________.
Txt format
Csv format
Not Required
Developer tab>Code>Macro Security
Macro security is enabling through __________.
In Excel, Sampling option is available in ___________ .
Insert
Data Analysis
Requirements for preparation of cash budget in Excel.
Knowledge of accounting
Knowledge of formatting an excel sheet
ROE stands for __________.
Recall on Equity
Return on Equity
___________ is a statistical procedure that uses sample evidence and probability theory to determine whether a statement about the value of a population parameter should be rejected or should not be rejected. Confidence Interval
Hypothesis
____________ is a statistical tool used to create predictive models. Regression equation
Regression
__________ shows the ability of a company to pay its current financial obligations. Quick Ratio
Current Ratio
Macro enabled workbook file extension is _______________
.xlsx
.xlsm
___________ shows dependency of a firm on outside long term finance.
Quick Ratio
Leverage Ratio
To record a Macro in relative mode,"Üse Realtive References" available in which tab of excel ?
Developer Tab
View Tab
There are _________ ways to open a Macro enabled workbook.
3
2
ANOVA stands for___________
Analysis of Value
Analysis of Varity
A function doesn’t require an argument is___________.
DATE()
TODAY()
In Excel, there are __________ functions for calculation of depreciation.
4
5
For calculation of depreciation as per SLN function used to calculate Sum of Years Digit depreciation as per_________________. Method.
For calculation of depreciation as per Straight Line Method.
For calculation of depreciation as per SYD function used to calculate Sum of Years Digit depreciation as per_________________. Method.
For calculation of depreciation as per Straight Line Method.
For calculation of depreciation as per DB function used to calculate Sum of Years’ Digit depreciation as per_________________. Method.
For calculation of depreciation as per Straight Line Method.
For calculation of depreciation as per DDB function used to calculate Sum of Years’ Digit depreciation as per_________________. Method.
For calculation of depreciation as per Straight Line Method.
XML is a ___________ Recommendation.
W1C
W3C
For calculation of depreciation as per VDB function used to calculate Variable Declining depreciation as per_________________. Balance Method.
For calculation of depreciation as per Straight Line Method.
PV Ratio stands for _____________________.
Point Volume Ratio
Point Varaiance Ratio
BEP stands for __________________________
Break Easy Point
Break Even Point
Data Validation available in which Tab?
Formulas
Insert
___________function returns value from a given data range based on row and column.
VLOOKUP()
HLOOKUP()
Which function categories are not available in Excel.
Statistical
Engineering
PMT Function is belongs to which categories of Excel function ?
Text
Logical
NPV stands for_______________________________
Net Present Value
Net Proper Value
_______function uses a fixed rate to calculate depreciation
DB
VDB
Which of them is not a Conditional Operators symbols?
<
rather than the results of the Formulas > Formula > Formula Auditing > formulas then choose______________. Show Formulas. Show Formulas. _______________ reveal about the current and future financial condition of the company.
Report
Which of them is a Intangible assets?
Goodwill and Patents. Cash and Property.
CR stands for___________________.
Current Ratio
Clear Ratio
QR stands for___________________.
Quick Rate
Quality Ratio
Data
Debt – Equity Ratio =Long term debt / Shareholders funds. TRUE
FALSE
DTD stands for ___________, which is called XML Schema. Direct to Direct
Document Type Definition
ACP stands for _____________.
Average collection price
Average collection payment
FATR stands for _____________.
Fixed assets test Fixed all turnover ratio ratio
A _________ can be a numerical fact. Statistic
Sale
__________ stands for reduction in value of fixed assets.
Data
Depreciation
Value of fixed assets is generally reduced over the period of time due to __________. Wear & Tear
Change in taste of people
Profit equals to __________.
Purchase - Total Cost
Sales - Total Cost
Examples of fixed cost are __________.
Salary of administrative staff
office rent
Cash budget is prepared for planning for future as far as movement of cash is concerned.
TRUE
FALSE
Discounting is not the process of determining the present value of a payment or a stream of payments that is to be received in the future.
TRUE
FALSE
PAN must have ________ characters only.
8
10
The extension of a XML document is ______________. (.xsd)
(.xml)
Sample means the units or items selected for study or consideration and population means the total set of data used for selection of samples.
TRUE
FALSE
_______________ analysis relates items in the financial statements in a manner that drives out performance information about the company.
Financial ratio
Price
How to restrict to run a macro automatically when starting Microsoft Excel?
Hold down the SHIFT key during start up.
Hold down the CTRL key during start up.
Which option allows you to Bold all the negative values within the selected cell range?
Zero Formatting
Conditional Formatting
_____________ allow us to perform calculations or operations that would otherwise be too cumbersome or impossible altogether.
Cell referencing functions
Absolute functions
Statistical functions in Excel help to calculate __________________ Arithmetic Mean
Median
Discounting Factor formula is ___________________
= 1 + (1/r) * n
= n / (1+a) - r
________________ is considered as non cash expenditure and occupies a prominent place in Profit & Loss Account. Cash Flow
Depreciation
The value which can be realized at the end of life of fixed asset by selling it is called _________________
cost
Salvage Value
____________ is prepared for planning for future as far as movement of cash is concerned. Capital Budgeting
Cash budget
To create a XML Map from XML schema, Go to which Tab in Excel ____________.
Add-Ins
Review
____________ is the process of determining the present value of a payment or a stream of payments that is to be received in the future.
Marginal costing
Capital Budgeting
____________ is one of the core principals of finance and is the primary factor used in pricing a stream of cash flows, such as those found in a traditional bond or annuity. Marginal costing
Discounting
XML schemas in Excel are called XML _____________.
Maps
Schemas
Excel allows us to use various functions and even simple mathematical calculations which can be used for _____________. Financial analysis
Equity analysis
Which cell reference show the reference to other sheet or reference to other workbook in excel ? Sheet2!C4
Sheet2{C4}
Which of them is not a Range References?
A1:A4
$A$1:A4
Interest Coverage Ratio equals to _________.
EBIT / Debt interest
EIBT / Debt interest
If particular workbook have to open each time Excel started, where the workbook should be placed? AUTOEXEC folder
AUTOSTART folder
If the cell B1 contains the formula=$A$1, which of the statement is true ?
There is an absolute reference to cell A1.
There is a relative reference to cell A1
__________ is a computerized mathematical technique that allows people to account for risk in quantitative analysis and decision making. Finanical Planning XML is case-sensitive ? TRUE
Monte Carlo Simulation FALSE
________ is the process of meeting the financial goals through the proper management of finances.
Monte Carlo simulation
Corporate planning
___________ can be defined as the process of setting the procedures in the organization for achieving the Monte Carlo predefined goals. Simulation
Corporate Planning
________ shows ability of company to pay back long term loans along with interest or other charges from generation of profit from its operations. Debt Assets Ratio
Interest Coverage Ratio
_____________________is the simplest method of comparing different stocks at a point of time to make investment decisions. Earnings Per share
Fixed Asset Over ratio
Every bit of data has to start and end with an identical tag
Data
The exact syntax of PMT function is________________.
PMT(nper, rate, pv, [fv], [type])
PMT(rate, nper, pv, [fv], [type])
The exact syntax of IPMT function is__________________.
IPMT(rate, nper, pv, [fv], [type])
IPMT(pv, rate, per, nper, [fv], [type])
To see the XML Map user must go ______________.
Developer>XML> Source
Developer> Source
Deletion of XML Map is done through __________.
Directally Delete Command
Delete Button
Excel works primarily with ________ types of XML files.
3
2
Method of tax calculations shall change according to _________.
Annual Income
DOB
EMI stands for ______________.
Easy Monthly Installment
Equating Monthly Income
Which function is used to calculate the principal portion in every installment ?
IPMT
PPMT
________ is a process used in statistical analysis in which a predetermined number of observations will be taken from a larger population.
Snowball sampling
Sampling
In __________, Individuals are selected at regular intervals from a list of the whole population.
Clustered sampling
Sampling
In ______________ each individual is chosen entirely by chance and each member of the population has an equal chance, or probability, of being selected. Snowball sampling
Convenience sampling
Which method is commonly used in social sciences when investigating hard to reach groups? Quota Sampling
Sampling
__________ are useful for quick reading and easy understanding, particularly for top management.
Summary reports
Balance sheet
It is a process in which a business determines whether projects such as building a new plant or investing in a long-term venture are worth pursuing. Business Investment
Capital Budgeting
Popular methods of capital budgeting include _________ and payback period.
internal rate of return
discounted cash flow
What is the file extension of Schema file which contain schema tags ? (.xml)
(.xsd)
_________ is the value of all future cash inflows less future cash outflows as on today.
Working capital
Net present value
___________is the process of defining and analyzing the dangers to individuals, businesses and government agencies posed by potential natural and human-caused adverse events. Sensitivity analysis
Risk analysis
__________ which is used more often, does not involve numerical probabilities or predictions of loss. Sensitivity analysis
Risk analysis
________ are generally used to present information in a simple and better way and also be used to analyse the risk in a better way. Graphs
Sparklines
It is a technique used to determine how different values of an independent variable will impact a particular dependent variable under a given set of assumptions. Decision Tree analysis Sensitivity analysis _______ involves computing different reinvestment rates for expected returns that are reinvested during the investment horizon. Scenario analysis
Sensitivity analysis
NPER stands for______________________________
Total Principal Value
Net Per value
Which function that is used to calculate the payment for specific loan terms ____________
SUMIF()
PMT
________helps to break down the Return on Equity
Du Point Analysis
Return on Investment
_______ is a common method for financing property, facilities, and equipment.
Mortagage
Leasing
These are the basis for analysis by potential investors, banks etc.
Journal and Ledger
P & L Account and Journal
The voucher used to record all bank and cash payments is ….. Credit Note
Contra
The manual option of voucher numbering leads to…..
Auto numbers
Duplicate number
The Tally audit trail tracks changes made to vouchers that are …..
less than 30 Days more than 30 Days old old
The audit functions of attributes sampling, variables sampling, stratified sampling are included in …. functions.
Stratification
Selection
C
D
ANS
command
program
D
numerous alpha
number and alpha
A
size, performance, cost
input, output, performance ratios
C
ARPANET
None of the above.
B
PCs
mainframes
D
feed
write
A
multiplexing
multitasking
D
converter
process
D
ram
output
D
non-impact desktop printers thermal printers
C
monitor, program, keyboard, bus
CPU, memory, input device, output device
D
windows 95
interpreter
B
assembler
coder
B
SQL * plus
all of the above
D
assembler
processor
C
system model
none of the above
C
ROM
Firmware
A
micro computers
none of the above
A
central processing unit
none of the above
B
non impact printer
none of the above
C
electronic spreadsheet
none of the above
B
Microsoft exchange none of the above
B
information
none of the above
C
high level language none of the above
B
multiplexing
none of the above
D
bulletin broadcasting system very small
none of the above none of the above
A B
intermediate network
none of the above
B
ftp service
none of the above
A
ARCHIE
none of the above
C
unlimited restore locator
none of the above
A
command line
none of the above
C
browser
editor
B
ftp
telnet
D
Hyper text transfer protocol Hyper text transfer port
C
uucp
none of the above
C
telnet
none of the above
C
transfer communication protocol/internet protocol
none of the above
B
higher type transfer protocol none of the above
B
mosaic,gopher
none of the above
B
dns
none of the above
A
hyper text markup language
none of the above
C
books marks
none of the above
B
animation
none of the above
B
animation,scripts,ex ecutables none of the above
A
welcome page
none of the above
B
search engines
none of the above
B
ftp
archive
D
database
channel
B
Graphical interface Graphical Interface format format
B
Joint pictures expert Joint pictures graph experimental group
A
network connections
mails
B
text or image
neither text nor image
C
applets
documents
A
MS Internet Explorer and Netscape Navigator None of the above
C
intranet
none of the above
B
wan
none of the above
B
packets
none of the above
A
email,file retrived,internet tools
none of the above
C
ARPANET
none of the above
B
defensive advanced research projects administration net none of the above
C
intranet,extranet
none of the above
A
cooking and dining none of the above
A
Hyper transfer meta language
Hyper text markup Language
D
united states & Russia
none of the above
B
network
none of the above
C
servers
none of the above
C
WAN
none of the above
C
non-digital
none of the above
B
Manipulate/demani pulate none of the above
B
Manipulation
none of the above
B
Cable and wires
none of the above
B
Serial line protocol
none of the above
C
Pillar to pillar protocol
none of the above
B
Accessibility of data and computer programs All of the above
D
Check controls
Input controls
B
Both A and B
Neither A nor B
C
Slab
Digit
C
Field mask
Input mask
A
Overflow
Serial
C
Batch checks
File checks
B
Block batches
Transact batches
A
Transaction type
Sequence check
C
Document totals
Hash totals
D
Batch check
System test
B
Suspense account
Update account
C
Stub test
Top down test
D
Database Analyzers Database code
A
Transaction data with master transaction
Module programs with snapshots
B
Mapping
Tracing
C
Item data
Record data
A
Graph testing
Whitebox testing
A
Test program pack
Test record pack
B
Parallel coding
Parallel simulation
D
Correct lister
Formulate correct hypotheses
B
Sample audit trails Data audit trails
A
Simple sampling
Demographic sampling
B
File access
File reorganisation
C
Formatting output
Classify data on a criteria D
Statistical
Reporting
C
Limited ability to determine Limited ability to Verify Propensity for Error Processing logic
A
Reading data, selecting and analyzing information
Specific tasks with original or modified programs
D
Snapshot
Picture
C
System audit
Concurrent audit
D
Keyboard
Memory
D
1 GB
100 MB
C
Application development
Data modelling
B
Information model
Logical model
A
64 bits
8 bits
C
Megaflops
Gigaflops
D
Backend processor Terminal processor
A
CAD
CCSIC
B
Memory card
Smart card
D
Value limited scale Very large silicon ic integration
A
32 bits
1 k bits
C
MU
CU
B
Program counter
Instruction register
D
Process register
Instruction register
A
SRAM
ROM
B
BIOS memory
ROM memeory
B
Optical memory
Flash memory
D
Thrashing
Paging
C
Cache memory bus Dual interface bus
A
Sound card
Media card
C
AGP
MCA
B
1280*1024
1280*680
C
Pulse
Wavetable
D
Scanner
Pen
B
Resolution
Lines
A
Pixel definition languages
Page definition lines
B
Soft fonts
Soft settings
C
Dot-pitch
Size
A
Flickers
Size
C
Resolution and sharpness
Signal and refresh rate
B
Light scan
Light pen
D
Photo-multiplier tube
Optical sensitive tube
A
Optical
Joystick
B
Tablet
Pen
C
Winchester disk
Jaz disk
C
Spiral
Block
B
MCA
DAT
A
Linear velocity
Helical scan
D
Lomega
Imation
B
Zip disk
Hard disk
A
630 MB
2GB
B
CD-ROM
MO drives
C
Magnetic tape
Magneto-optical drive
C
DAT drives
MO drives
D
Kernel module
I/O module
C
Batch management Data management
A
Virtual memory storage
Extended storage
C
Dividing
Preemptive
D
Multitasking
Multiprogramming
A
Multitasking
Multithreading
B
Win 2000 professional
Win 2000 advanced server
C
Format allocation type
File allocation table
D
Block
Table
B
NTFS
FAT32
B
NTFS
FAT32
C
Start directory
Tree directory
A
Allocation
Partition
B
Level 1
Level 3
C
Doc, xls, wzp
Tar, gz, taz
D
Vertical bar
Control bar
A
Minimize box
Maximize box
B
Dragging
Scrolling
C
Task bar
Command menu
C
Accessories
Favorites
D
Configure drive partitions independently
Confirm partition capacity
A
Restore
Re-copy
C
My Folder
My Directory
B
Notepad
Wordpad
A
Net Drive
Net Watcher
D
Windows Accessories
Internet Explorer
B
Desktop themes
Desktop icons
C
Hybrid
ASCII
D
Find
Restart
A
Documents
Settings
C
Port-to-Port connection
Peer-to-Peer talking
A
Deployed access
Service access
B
Pin to Pin communication
Port to Port Protocol
B
Serial Line Internet Protocol Setting Link Inter Protocol C
Indirect access
Dial-up access
D
Internet
Topography
C
Connection company IC board cost, cable cost, connection data cost cost
A
Indirect software
Terminal communicator
B
Protocol
Simulators
A
30-bit address
32-bit address
D
Respond to mails
Delete mails
C
Telnet Control Port
Communication Control Protocol
B
Sequence numbers Data numbers
C
Host
PC
B
Available FTP
Anonymous FTP
D
Binary File
TEXT file
C
Telnet
Message
C
Both A and B
Neither A nor B
C
Request the Archie server Protocol the Archie server A Archie
Archives
C
Domain name server
Domain relation server
C
Aaa/bbb/ccc/ddd
Aaa*bbb*ccc*ddd
B
Web
Mail
A
Uniform Resource Locator
Uniform Reserved Link
C
Chat messaging
Information chatting
A
Line
Dot
B
Lines
Channels
D
Display channels with at least ten users
Display line with 10 removed channels
C
Shell accounts
Shell programs
C
Menu
Bookmarks
D
Gopher
Gateway
C
WINNET and WAISLINK
WINSRC and FTPWAIS
A
SunScript
JavaScript
D
Eventcast
Livemessaging
B
Newsletter
Networkboard
B
Pine and Embedd
Port and Elm
A
#
()
B
Both A and B
Neither A nor B
C
Server Server message,command message,command line line and channels and channels
C
Java applets
Java objects
C
Net addresses
Web pages
D
Hyperlink
Hypernet
C
Wide maps
Web infos
A
Lynx
Mosaic
B
Web file
Txt file
A
Web creators
Web ports
A
New/Edit page
New/Edit Document
D
Pager
Document
B
Editor window
Form window
C
Both A and B
Neither A nor B
C
WinZip Plus
Webcow
A
File Format
Window Format
B
Excite Links
Infoseek Netshark
C B
Thread
Retriever
B
Web publish
Page publish
C
Nettext
Hyperlimit
A
Lynx
Lycos
D
Image graphs
Image texts
B
Weblinker
Webcaster
B
Both A and B
Neither A nor B
C
Electronic Data Internetworking
Efficient Data Interchange
B
Electronic Format Transfer
Electronic Fund Transfer
D
Value Aided Networks
Value Enhanced Networks
A
Negotiation and servicing
Critical buying
A
Portal
Smart
B
Both A and B
Neither A nor B
C
Presentation Layer Transport Layer
B
Presentation Layer Physical Layer
C
Transport Layer
Network Layer
B
Internet Control Data Protocol
Single Control Message Protocol
B
Device programs
Software devices
A
Device Interface Card
Network Interface Card
D
Server computer
Data computer
C
Combi card
Meta card
C
Electronic Socket Layer Protocol
Cyber Socket Layer Protocol
B
Grouped and summarized
Assets and liability
C
Voucher
Trial Balance
B
P & L Account and Balance Sheet
Voucher Account and Balance Sheet
C
Sales
Asset
D
Taxes
Income
A
Nominal accounts
Expense accounts
B
Voucher
Expense
C
Balance sheet and trial balance
Journal and ledger
D
Credit
Expense
B
Value expense stock
Value income stock
A
Balance sheet
Asset sheet
C
P & L statement
Suspense accounts
C
Asset or liability
Profit or loss
B
Sundry debtors
Original entry
C
Liabilities
Suppliers
D
Expense side
Payable side
B
Project
Application
B
F12
F11
C
Tally Group
Tally Vault
D
Entry of Tally
Groups of Tally
B
Mercantile
Manufacture
C
Loan assets
Capital assets
B
Journal
Ledgers
D
Revenue nature
Income nature
C
Display
Shift
A
Primary-group
Alter-group
C
Sub-group
Alter-group
B
Alter-group
Multiple
D
General Ledger master
Journal Ledger master
C
Assets
Loans
D
Voucher
File
C
F10
F11
B
Receipt
Contra
D
Payment
Journals
D
Choice entry mode File entry mode
B
File
Narration
D
Suppliers account, Purchases account
Buyer's account, Cash account
A
First of a month
End of a month
C
Sales Note
Payment
D
Current year
Configured date
B
2, 4, 3, 1
3, 4, 2, 1
C
Both A and B
Contra purchase
C
Receipt
Sales
B
Expense Purchases Debit Purchases
A
Stock Journal
Purchase Voucher
C
Debit
Contra
D
Trial balance
Journal
C
P & L reports
Expense reports
B
Net Profit
Net Account
C
Journal book
Day book
D
Data analysis
Transaction analysis
A
Expenses
Loans
B
Voucher date
Previous date
A
Stock flow
Cheque flow
B
On net transactions On net cash flow
C
On net transactions On net cash flow
A
Set company
Alter company
B
Accountant
Administrator
D
Period-less accounting
Transaction-number accounting
C
Tally Report
Tally Group
B
Tally.exp
Tally.ole
A
ODBC
MS-XLS
C
Sequence number
Range number
B
more than a day old more than a week old
A
F12
F6
D
XML
All of the above
D
Sort
Filter
B
Both A and B
None of the above
C
B
Relation
Sampling
D
Unix
SOFTCAAT
C
Calculation Editor
Testing Editor
A
Both A and B
File->Select Export -> Print Report.
C
System validation
All of the above
D
Sampling
Export
D
Print Preiview
Append
B
File->Import as -> Import to IDEA
File->Select Import -> Import to IDEA
A
Formulate flaw hypotheses
All of the above
D
Sequence checking Filter
A
Character Data
All of the above
D
Secondary Key
Composite Key
B
All of the above
None of the above
B
All of the above
None of the above
A
Common record
None of the above
B A
Compare check
Data check
A
Sign Test
All of the above
D
spreadsheet and mail merge format
All of the above
D
Un-compare
Randomness
A
On-line dated checked
Mixed dated checks
A
Both A and B
None of the above
C
Both A and B
None of the above
C
Modelling
Source comparison
B
Model comparison
Exe comparison
A
Off-line Testing
On-line Testing
D
Program Library
All of the above
B
Log Analyzers Software
Systax level
C
All of the above
None of the above
C
Investigation
Sorting
C
Both type
None of the above
C
To ensure the entered data is saved without fail
All of the above
A
Benford Law
British Law
C
Indexing
Linking the identified files A
Identify data, which are not in agreement with the Identify whether all fields regular format. have valid data. C
Logical function
Relational function
B
Investigation of fraud in audit area
To give assurance to customers about the performance of the company
B
Sampling-> Benford's Law
Tools->Benford's Law
B
Without assigned numbers, such as bank accounts numbers and zip codes and with four or more digits. All of the above
D
Null
Is Null
A
Sampling
Relation
B
Relation
Data
D
Complete Banking Solution
Centralized Banking Solution
B
TCS
I-Flex
D
TCS
I-Flex
C
Party
IP
A
Web server
Clients Server
B
Auto Machanic
Allow to Machine
B
Internet Banking Application software
Internet Business Authenticatin server
B
Positive Balance File Positive Balance Flex
C
Intranet
Net banking
B
Both A &B
Computer Planning and Policy Department
D
Proxy
Firewall
D
NEFT
None
A
Routers
Middleware
C
Firewall
Middleware
B
Antivirus
None
A
Date base Server
Web server
B
Domain Controller
Network security
C
Librarian
Domain Controller
D
Routors
Thrashing
B
Automated Technical Machine
Accelereated Teller machine
B
Registering requests for Cheque book All the above
D
B
IBAS
IBDS
A
Environmental Controls
All of the above
D
Processing Controls All of the above
D
Processing Controls All of the above
A
Output Controls
Management Control
B
Equity Share management
Clearing Module
C
Both A & B
None of the above
C
Standard Liquidity Ratio
Stable Liquidity Ratio
B
Activity Logs
None of the above
A
Date and Time
All of the above
D
Internet policy
All of the above
D
IT
EDP
B
B
Cash Reversal Ratio Cash Reimbursed Ratio
A
A
Disastrous Recovery Planning
Disaster Recording Planning
A
Access Rights
None of the above
A
Operating System Log
Activity Log
B
A Know Your Connection
Know Your Centre
A
Overdraft
All of the above
D
Electronic Journal
All of the above
C
Web server
All the above
D
Both A & B
None of the above
C
Top down
Bottom up
A
RTGS
None of the above
C
EFT,RTGS
None of the above
B
Remitting bank
None of the above
B
SSM
All of the above
A
EFT
All of the above
B
UTR
UTS
C
Unique Transmission Reference
None of the above
A
Strict Through Processing
None of the above
A
WAN
MAN
A
Core Management System
Centre Management System
B
Audit of controls in any banking environment is performed using software audit None of the above
B
Developing a business continuity Laying down procedures planning for system development A
Core Banking Solution
Web centre
C
Web centre
Central Office Data Centre.
D
Database Server
Domain Name Server
B
Client version
Firewall
C
Wide Area Network Personnal Area Network
A
Domain Name Server
Application Server
A
MAN
WAN
B
3
4
B
Uniform Transaction Reference None
C
Server Development
System Development
D
Log management
Authorized Controller
C
The purpose of the test is to identify security vulnerabilities and then attempt to successfully exploit them.
This is often the most preferred test as it is an accurate simulation of how an outsider/hacker would see the network and attempt to break into it. B
Implement new/ changed programme as per schedule.
It is important that correct latest version of programe is used but version number need not be changed. D
Old offset value erased Natural Pin remains and new offset value the same. generated.
A
Test Server
None of the above
C
WANs
MANs
B
protection
Validation
D
Centralised Data base security
Central Office Data Centre.
A
TCS
I-Flex
B
State zone
demilitarised zone
D
IBDS
All the above
D
Both A &B
None of the Above
B
Application Software
Application Server
C
Broadband
None
B
Net transaction ID NO
ATM No
B
Process Control
Data Control
C
Letter of Payable
Letter of Receible
A
Disaster Recovery Planning
None
B
(a) & (b) both
None of above
C
TCS
I-Flex
A
Network Administrator and Security Administrator.
Tape Librarian and database administrator.
B
Pin No - Natural Pin Offset Value - Natural Pin C
Cash register
(a) and (b) both
A
Natural Pin
Card Number
C
Sybase
Foxpro
A
Dataview
All of the Above
B
Insert
Attached
B
Set as Switchboard startup Option in Access Option None of the above
C
Modify Option
B
Build Option
A B
AlphaNumeric
Date
C
Both A and B
Report
C
A button
All of the above
D
Click->File tab>Option ButtonClick->File tab->>Quick >Quick Access Access ToolbarToolbar>Command not in >Switchboard Ribbon->Switchboard Manager->Add->OK Manager->Add->OK
A
Opens the Switchboard Manager.
Opens a report in Print Preview.
C
Both A and B
None of the above
C
Seven
Six
B
Action query
Action Box
B
4GL
None of the above
C
ApplyFilter
UseFilter
C
RunQuery
FindQuery
A
AND
B
Text
Date & Time
C
Text
Date & Time
A
{}
#
B
A
258
128
A
Right-click the table and select send as XML Both A and B
A
Aliases name to the tables Both A and C.
D
Both A and B
None of the above
C
Both A and B
None of the above
C
As many
All of the Above
A
B
Avg()
All of the above
D
Countif()
All of the above
B
IS NULL
All of the Above
C
Action query
Both A and B
D
Cross table Query Wizard
All of the Above
B
View Records
Update Records
A
Right outer join
Full join
D
Right outer join
Full join
A
Inner join
None of the above
B
Inner join
None of the above
A
Select Design -> Show Table
Select the table from navigation Pane.
C
Reprt
Macro
A
Function
All
D
different data type Same data type
D
Number Literal
None of the above
A
7
6
A
Comparision
None of the above
B
Relational
None of the above
C
Both A and B
None of the above
C
returns true or false None of the above
A
BODSAM
None of the above
A
Both A and B
None of the above
C
three
four
B
As many field
All of the Above
D
Structured Question Language System Query Language B
Both AND
LIKE AND
B
IS OR
LIKE OR
A
Any one table
All of the Above
B
3Acc
ess
B
Lower()
None of the above
A
Trim()
None of the above
C
Expression Box
Expression elements
B
Oracle
C++
C
The order of the Each column has a rows and columns is specific range of values immaterial to the known as the Tuple DBMS domain
D
Records with date before 2011
All of above
C
Base Database
None of the above
A
Expression Box
Expression Builder window
C
Will match all text having second character as B
Will match all text starting with a digit
A
Action query
Parameter query
B
Any where in the table
Beginning of the table
B
Table but not in Form
Form & Table
D
B
Graphics Control
Bound Controls
B
Record Source
Picture
D
Inside-Report
Insert-Report
C
Table or query,SubReport None of the above
C
Detailed Definition Language Data Detailed Language
A
Bar Chart
Column Chart
D
Bar Chart
Column Chart
B
.MDW
.ACCDT
B
Both of them
None of them
B
File->Save as>Save Database as->Package and sign
File->Save&Publish>Save Object as>Package and sign
A
Visual Basic Application
Excel attachment
A
Manage replies
All of the above
C
Date/time
AutoNumber
D
For shout text entries of no more than 255 For long text entries characters
C
Records that meet any of several criteria you specify All of above
A
Data Manipulation Language
Detailed Manipulation Language
C
The QuickBasic editor
All of above
B
Click the report, and on the Pivot Table toolbar, click the refresh data button
All of the above
C
Pivote Table & Pivot Chart View All Of Above
D
Memo
Lookup Wizard
D
Macro
Report
B
DDL
None Of Above
A
Authorizing Access And Other Control Over Database None Of Above
C
Object Oriented Database Model
Structureed Database Model
D
Date/time
Hyperlink
C
Establishing Relationship
None Of The Above
A
have to update manually
never update
B
Query
None Of These
A
To allow the user to switch from one database file to To allow changing from another. one report to another.
A
It doesn't have as many design options.
The only report type available is the Design Report.
B
Use the Mailing label wizard text option.
Use the >> button.
C
Page Footer
Page Header
C
All The tools of the form design control gallery. Form Wizard Columnar
C
Protects the VBA code from being viewed or edited while still allowing it to run. All of the above
D
Open-down
None of the above
B
Delete Query
Parameter Query
D
Open Exclusive mode
Open Read Mode
C
()
""
B
Text
None of the above
A
Report
None of the above
A
Read
Write
A
File Tab ->Security Options, and selecting the Trust Centre tab from the Access Option window None of the above
B
A File tab
Database Tools
D
Report
All of the above
D
Query
Report
A
primary database & secondary database None of the above
A
Web page
None of the above
C
Organization
Concern
B
Data Mines
Operational Data
B
Subject-Oriented
Informational
A
Volatile, Static
Static, Dynamic
D
Informational, Informational, Static Operational
D
Metadata
Basedata
C
Informational
Operational
B A
Logistics Management
All of the above
D
Data Mining
Data Modeling
C
Product Life Cycle Management
Supply Chain Management
B
Sales
Resources
D
Stepped
Outline
A
C2B
C2C
B
Unsuitable for conventional applications
All of the above
D
Open-Project
ERP5ERP
C
BPM
None of the above
B
Top Management Commitment
Either A or B or C
A
package
units
D
A
A
Split
Backup
C
Business Process
Business Operation
C
Extranet
Any of the above
B
B
Tally Vault
Tally Data Conversion
C
Synchronization
Asynchronization
C
Tally Support
Tally Chat
D
Cloud Centre
Administration Centre
B
Encryption
Decryption
C
Sales
Purchases
B
Code name
All of these
D
Journal mode
Contra mode
C
Non-Integrated Information Systems
Non-Isolated Information Systems A
Allow 0 value entry Use Rej Notes
C
Purchase Journal
B
Both A & B
SDF Format
HTML Format
D
Assumption
All of these
D
Both A & B
Neither A &B
C
Display > Statutory Display > Statutory Masters Reports
D A
Receipt
None of these
B
Reminder Letter
None of these
D
Conceptual
Logical
B
Business Process
Business Operation
A
multi dimensional
none
C
ASCII
ALL
D
Tally.Net
None of the above
C
Internet Data
None of the above
B
Both A & B
None of the above
C
Data Entry
Tally.NET User
B
flowcharts, flow diagrams
graphs, shapes
C
Establishing a data warehouse help desk and training users to effectively utilize the desktop tools All of the above
D
Product Life Cycle Management
Supply Chain Management
C
PLM
CRM
B
Online Analytical Programming
None of the above
B
Sourcing planning
Production planning
A
PLM
CRM
D
Step 3
Step 4
B
installation
migration
C
post implementation
None of the above
C
Both A & B
Either A Or B
A
Real Time Processing
Business Processing
C
Form 26Q, Annexure to 26Q
All of the above
D
File Valuation Program
File Valuation Utility
B
isolated
de-centralized
A
Business Modeling
Business Intelligence
D
resource driven
none
A
operational data
none
B
data
none
A
supply and sortage none
A
hybridbound operations
none
B
strategic
none
B
staff
none
A
SCM
none
A
cryptography
none
A
Decision Support Systems
Non-Isolated Information Systems C
Tally Fit
Tally AutoFit
C
Unlimited multiuser support
Audit Feature
D
Tally.NET
Email facility
C
Either A or B
None of the above
B
Business Modeling
Business Intelligence
A B
Paste Document
My Templates
C
Email hacking.
Email tracking
B
Web spoofing
Web threating
C
Billing and Accounting software
K-DOC application
C
Email Management Share certificate printing D ICAI XBRL Software Payroll
A
ICAI XBRL Software ICAI-ROC application
B
Internal auditiing
None of the Above
C
Both A and B
Either A or B
C
Section 43B
Section 44AB
D
Either A or B
None of the Above
B
Foreign Exchange Managament Act
None of the Above
C
Document Management Systems
Client management
D
System administrator
User Administrator
C
AR module
FA module
B
B Invite and analyze quotations from vendors
Comparison with budgets D
Expense Management
Fixed assets
C
Accounts Payable
Accounts Receivable
B
Expense Management
Bank Reconcilations
C
Knowledge management
None of the Above
B
Confidentiality,Inte grity and Access Confidentiality,Integratio rights n and Authentication A
Payroll
Timesheet application
D
Automated alerts for pending appraisals
Prepare summary or bell curve analysis of all employees B
Payroll System
Knowledge management System C
Error free capture of leave details Approval workflow
C
monthy
B
quarterly
Copies of clients’ Copies of important incorporation contracts or long term documents like MoC lease agreements
C
Cost effective to maintain the documents in soft copy
D
All the Above
Classroom Training E-Training
B
Virtual Learning
All the Above
B
WAN
All the Above
D
Availability
Authentication
B
Both A and B
None of the Above
C
WAN uses only private networks.
Switches are used to connect LAN and WAN
B
Information Security
None of the above
C
Own documents
All the above
D
Integrity
Authentication
B
Confidentiality
Availability
D
Authentication
Confidentiality
A
operational
vulnerable
D
Confidentiality
Integrity
B
HR and Payroll
None of the Above
D
Billing and Accounting
ICAI-TOC
D
4
5
B
Private Branch exchange
Public Branch exchange
C
Extensible Markup Language
EXtensible Makeup Language
C
Visual Basic for Apple
None of the above
A
Structure and store Store and transport information. information.
A
Java
C++
A
Both A and B
Nither A Nor B
C
Developer Developer tab>Modify>Macro tab>Controls>Macro Security Security
B
View
None
B
Knowledge of cell linking & basic formulae
Knowledge of all of the above.
D
Return on Enquary
Return of Equalisation
B
ANOVA
None of the above
B
Multiple Regression Single Regression
C
Liquidity Ratio
Solvency Ratio
C
.xlsv
.xlsw
B
Liquidity Ratio
Solvency Ratio
B
Both A and B
Nither A Nor B
C
4
1
A
Analog of Variance
Analysis of Variance
D
MONTH()
YEAR()
B
6
3
B
For calculation of depreciation as per Variable Declining Balance Method.
For calculation of depreciation as per Double Declining Balance Method. B
For calculation of depreciation as per Variable Declining Balance Method.
For calculation of depreciation as per Double Declining Balance Method. A
For calculation of depreciation as per Declining Balance Method.
For calculation of depreciation as per Double Declining Balance Method. C
For calculation of depreciation as per Declining Balance Method.
For calculation of depreciation as per Double Declining Balance Method D
W2C
W4C
For calculation of depreciation as per Declining Balance Method.
For calculation of depreciation as per Double Declining Balance Method. A
A
Profit Volume Ratio Profit Variance Ratio
C
Balance Equal Point Break Equal Point
B
Data
Developer
C
INDEX()
LOOKUP()
C
Math & Trig
Arts
D
Financial
Math & Trig
C
Net Present Variance
Negative Present Value
A
SYD
SLN
A
Function > Show Formulas.
Formulas > Formula Auditing > Function > Show Formulas.
B
Financial statements
None
C
investment and securities.
None of the above
A
Current Rate
Clear Rate
A
Quality Rate
Quick Ratio
D A
Data Type Definition Data to Data
B
Average collection period
C
None of the above
Fair assets turnover Fixed assets turnover ratio ratio
D
Salary
Number
A
Document
Detail
A
Change in technology
All of the Above
D
Manufacturing - Total Product - Total Cost Cost
B
Both A and B
C
None
A
B
11
12
B
(.mlx)
(.xlm)
B
A
Perodic
Report
A
Hold down the ESC Hold down the ALT key key during start up. during start up.
A
Bold Formatting
Negative Formatting
B
Worksheet functions
Round( ) functions
C
Mode
All of the above.
D
= 1 / (1+a) ^ 2
= 1 / (1+r) ^ n
D
Fund flow
Expenditure
B
life
Factor
A
Both A& B
Actual Budget
B
Developer
Data
C
Discounting
None
C
PMT
None
B
Elements
Markups
C
Leasing decisions and the list goes on All of Above
D
Sheet2(C4)
Sheet2
A
A1, A2 , A3, A4
A$1:A$4
C
ETIB / Debt interest EBTI / Debt interest
A
EXCELSTART folder XLSTART folder
D
Further changes in value of A1 will not Further changes in value affect B1. of B1 will not affect A1. B
Personal Finance Corporate Planning Planning
B A
Financial planning
Personal Finance planning
C
Decision Tree Analysis
Corporate Planning & Analysis
B
Total Fund Ration
None of the above
B
Price Earnings Multiple
Gross Profit Ratio
C
C
Data< Data me> A PMT(rate, pv, nper, PMT(pv, rate, nper, [fv], [fv], [type]) [type]) IPMT(per, rate, nper, pv, [fv], [type])
B
IPMT(rate, per, nper, pv, [fv], [type]) D
File Menu>Options>Ad d in>Excel Add In>XML None of the above.
A
XML Maps Dialog Box
None of the above
C
1
4
B
status of assess
All of the above.
D
Equal Monthly Installement
Equated monthly installment
D
PMT
None of the above
B
Systematic sampling
Simple random sampling B
Systematic sampling
Simple random sampling C
Systematic sampling
Simple random sampling D
Snowball sampling Simple random sampling C
IRR
NPV
B
Capital Investment Investment management B
net present value
All the above
D
(.xlm)
(.mlx)
B
IRR
PMT
A
Qualitative risk analysis
Scenario analysis
B
Qualitative risk analysis
Scenario analysis
C
Both A& B
Charts
D
Both A& B
Neither A &B
B
Decision Tree Analysis
None
A
Total Interest Value Number of Periods
D
COUNTIF()
None of the above
B
Profitability Ration
None of the above
A
Rent
All the above
B
P & L Account and Balance Sheet
Voucher Account and Balance Sheet
C
Sales Note
Payment
D
Sequence number
Range number
B
more than a day old more than a week old
A
Statistical
C
Reporting
View more...
Comments