Advance Itt Question

Download as pdf or txt
Download as pdf or txt
You are on page 1of 88

S.

No
1

10
11
12

13

14

15

16
17

18

19

20

21

22

23

24

25

26

27

28

29

30

31
32

33

34

35

36

37

38

39

40

41

42

43

44

45

46
47

48

49

50

51

52

53

54

55

56

57

58

59

60

61
62

63

64

65

66
67

68

69

70

71

72

73

74

75

76

77

78

79

80

81
82

83

84

85

86

87

88

89
90

91

92

93

94

95

96

97

98

99

100

101
102

103

104

105

106

107

108

109

110

111

112

113

114

115

116
117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132
133

134

135

136

137

138

139

140

141

142

143

144

145

147

148

149
150

151

152

153

154

155

156

157

158

159

160

161

162
163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178
179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195
196

197

198

199

200

201

202

203

204

205

206

207

208

209

210
211

212

213

214

215

216

217

218
219

220

221

222

223

224
225

226

227

228

229

230
231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246
247

248

249

250

251

252

253

254

255

256

257

258

259

260

261
262

263

264

265

266

267

268

269

270

271

272
273

274

275

276

277

278

279

280

281

282

283

284

285

286

287
288

289

290

291

292

293

294

295

297

298

299

300

301

302
303

304

305

306

307

308

309

310

311
312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328
329

330

331

332

333

334

335

336

337

338

339
Questions
This Is The Stage In Database Design Where One Gathers And List All The
Necessary Fields For The Database Project.
What are the different views to display a Table ?

Which of the following ETDS forms are available in Tally.ERP 9?

In Tally.ERP 9 __________________ provides the user with administrator rights


and the capability to check the entries made by the authorised users and alter
these entries, if necessary.

FEMA Stands for _______________.

In Permanent Audit file _______ is not the key data documented.

The process of identifying an individual, usually based on user id and password


in an organization is called______________.
_____________________is the simplest method of comparing different stocks
at a point of time to make investment decisions.

________ are generally used to present information in a simple and better way
and also be used to analyse the risk in a better way.
In Ms-Excel 2010, ______ is Last Column Name?
SUBtotal option is in __________ group of Data tab in Excel 2010.
Excel 2010 offers up to____________sort levels.
The Core Image Comparison audit technique compares the__________

Picture of a transaction as it flows through the computer systems is


called________
__________ software serves as the Intermediary between the user and the
database
DDL Stands for -.
The feature in Tally to analyze accounts of a company is________

This is an important control in systems that use digital signatures for


authentication purposes.
Which of the following is not an advantage of using a DBMS?

Employee Information Portal feature in Payroll Application provide employee to


view their________________.

In DBMS, view level data abstraction is known as __________

In DBMS, Normalization concept responsible for _______________

The ___________ type of data cannot be collected using Collect data through
email messages.
The exported eTDS file from Tally.ERP 9 can be validated through NSDL "s
freely downloadable utility called __________________

Customer Relationship Management is a ________________ level strategy.

___________ can be defined as the process of setting the procedures in the


organization for achieving the predefined goals.

The INT function________

The _________key does not accept Duplicate and Null values in Field.

In MS-Access 2010, which type of query extracts the data from one or more
existing tables and puts them into separate table?

SQL is considered to be a _______

SQL is considered to as an ideal Language for _______


__________ data type field can "t be updated

A Record is also commonly called as a _________

Which of these is/are the standard email program used in an organization?

The extent and level of _________ would depend on the nature of information.

Popular methods of capital budgeting include _________ and payback period.

___________is the process of defining and analyzing the dangers to individuals,


businesses and government agencies posed by potential natural and human-
caused adverse events.
__________ which is used more often, does not involve numerical probabilities
or predictions of loss.
Which of the follwing is not a/an functionality provided by PMS?

___________automates the calculation of salary for taking inputs from the


timesheet application, leaves from Leave Management System and salary
details from the HR master data.
Which of the follwing is not a control in Leave Management System?

Permanent Audit File are obtained once but updated on __________basis.

In some cases, trainee is supposed to appear for the examination/test at the end
of the training is____________.
________ are the hardware/infrastructure equipments used in a CA firm.

_____________means information available in the organization should not be


altered or modified by unauthorized personnel.
Grand totals calculated for any code on a document in the batch are
called________
Control that checks if correct sequence of commands and update parameters
are passed from the application software to the database.
With respect to data integrity control, when monetary transactions are processed
against master files without a match, we should maintain a _________

The system test that tests the top-level modules first and then the lower modules
are simulated with dummy modules to check the interfaces is called _________

Identify the audit technique that examines each transaction as it passes through
the system.
Which query should be used to retrieve the following information from table of
databases "Which employees earn more than Rs.30,000 a month?"

Queries in MS-Access 2010 can be used as ________________________.

What is a form in MS-Access?

Which of the following degree of relationship cannot be applied in MS-Access


2010?
In an ER model, a/an ___________ is any object, place, person, event or
concept about which an enterprise records data.
The process of arranging data in a logical sequence is called ____________.

If some chunk of data is stored at two places in a database, then ___________.

In MS-Access, what data type can be used for a phone number field in a
database?
E-R Diagram is ________________ Model.
Which of the following can be a primary key in an employee database?

The day book contains transactions relating to ________


The Bills Receivable details are maintained in a _____

Creditors ledger has details of your dues to ________


The sundry debtors are placed in the Balance sheet on the

The first step in Tally before any transaction is entered or saved is creating a
_____________…
To configure country specific details use the function key
Identify the security mechanism used in Tally.
The basic document where transactions are entered chronologically is

After selecting a company in Tally, you will be in the

The Direct expenses, Purchase account, Direct income are primary groups of
________
The option to delete a SUB-group is admissible through the
menu_____________
The behavioural attributes of this group cannot be changed.
Credit limits for personal accounts and branches can be done in the ledger
mode_____________
We are not allowed to delete a ledger from this mode.
All account heads except Cash and Bank are placed in the_____________

These are the basis for analysis by potential investors, banks etc.

Identify the primary group of capital nature that has the SUB-groups: Bank OD
Account, Bank OCC Account.
The age-wise statement is displayed based on_____________
The ratio analysis of receivables can be done based on_____________

Name the statement that helps the management in the decision making process.

Identify the budget type which is chosen where transaction amounts are to be
monitored.
Default value option in field property use for ________

Value of Report Header exist on ___________ page of report

__________ is an action or set of actions that you can use to automate tasks

SQL is a _________ Language

Which one is the Second Level of Data Abstraction?

Memo data type store _________ number of characters.


Most database operations that we do manually can be automated by using

_________ are what we use to summarize and present data in the table
The default pivot chart type in Excel 2010 is a ________ chart.
To consolidate Excel data, ________________________ is used when
worksheet data does not have a consistent layout or pattern.

In Excel 2010, the __________ function is used to generate a forecast.


______function calculates the payment for a loan (installment) based on
constant payments and a constant interest rate.
__________ are easy-to-use filtering components that enable the user to quickly
filter the data in a PivotTable report in MS-Excel 2010.
In Excel 2010, range C3:C6 indicates _______________.

Keyboard shortcut to show a shortcut menu in MS Excel 2010 is


_______________.
To select multiple non-adjacent cells in an Excel 2010 worksheet, click them
holding _________ key.
___________________ technology is the process of creating and utilizing the
company "s historical data.

Which of the following will not appear in the home page of K-doc?

To change an email header so that the message appears to have originated


from someone or somewhere other than the actual source is known
as___________.
To playfully satirize a website is known as_____________.
_________is the complete package to manage the billing requirements of a CA
firm on cash system of accounting.

Which of the following is not a/an feature of eSecretary?

Annual return preparation can be done using ________.

Which application helps the management to allocate the revenue to the credit of
the right employee who identified the opportunity?

Who has full privileges in the financial accounting application?

_________is the centre point of the financial accounting application as any


transactions having financial impact carried out in any other module will reflect in
this module.
Which of the functionalities is not provided in the purchasing module of Financial
Accounting Application.

In Financial Accounting Application,automatic sequence number of documents


control is not required in which of the following module?
Which module of Financial Accounting Application can be used for assigning
credit limit to customers?
Which of these will trigger/alert for timely payment ?

A Data Access Page is a special type of _________ that allows users to


interface with database using Internet Explorer.
OLAP systems use concept of OLAP cube called a ______________ cube

The data which is to be exported from Tally.ERP 9 can be in ________ format.

In Tally ERP-9 Remote Access is also known as __________.

Accessing data store on a remote location using Internet in Tally.ERP9 is


called____________.
Tally.ERP9 can be classified user in two categories are___________.

The system ____________ process will address issues such as software


configuration, hardware acquisition and software testing.
A __________________ review is recommended to ensure that all business
objectives established during the planning phase are achieved.

In _________________ stages, auditors have access to rudimentary ERP tools


and capabilities for auditing security configurations.
Immediate posting and updation of books of accounts as soon as the
transactions are entered. This is called as __________

In the following list which is a audit function?


Which is the following step involved in a source code review methodology ?

__________ are capable of being connected only when devices are connected
to a switch.
_____________refers to the process of developing software which would
produce the required output from the input provided of course, using the
necessary hardware and communication systems.
The______________is essential to ensure that computer security records are
stored in sufficient detail for appropriate period of time.
All the various servers in the central data centre are seggregated through
_______
The __________ is a complete process in the computer so that it ensures that
data that is fed in conforms to certain prerequisite conditions.

DDL stands for ____________

A___________used to compare multiple values of categories or differences over


a period of time.
A________used to compare trends over a period of time.

To create a read-only copy of the database, which of the following file format can
be used?
The database administrator created a split database and created a front-end
database and back-end database file.Which of the file should be stored on the
server ?
In which formats can the Collect Data through email message feature can send
the data entry form?
An .ACCDE file is a ___________ version of the original .ACCDB file.

Which type of the query is used to accept the value from the user while
executing the query and fetch records accordingly
To encrypt the databse in Access 2010 must be opened in the
__________________.

To extract the records based on date field, which of the symbol should be used

FIX( ) is a kind of ____ function in MS-Access 2010.

MS-Access 2010 has added new features of ______ to eliminate the need of
VBA code
Encrypting a database does not restrict access to database objects, but to
__________ the database.
To create a split database in MS Access 2010 go to which tab?

After spliting database,frontend database holds_________________.

After spliting database,backend database holds_________________.


When an Access database is split, it creates two files_________________.

Operational CRM provides support to ___________ business processes.

Collaborative ______ ultimate goal is to use information collected by all


departments to improve the quality of services provided by the company.

Tally.ERP 9 follows the DES __________ method to safeguard the data.


Immediate posting and updation of books of accounts as soon as the
transactions are entered. This is called as __________

Business Intelligence Systems are data-driven ___________________.

_______ involves computing different reinvestment rates for expected returns


that are reinvested during the investment horizon.
Which function that is used to calculate the payment for specific loan terms
____________
________helps to break down the Return on Equity

_______ is a common method for financing property, facilities, and equipment.

Which option can be used to split windows into four in ms excel 2010?

How to restrict the values of a cell so that only a list can be entered in a cell?

To frequently print a specific range of cells on a worksheet , the option used is

Non-excel files can be opened in MS Excel using the

_____is a text concatenation operator.


Which of the following is correct?

___ function in MS-Excel returns the remainder after number is divided by


divisor.
What is a scenario summary report?

What does Solver uses in its dialog box?

What term describes a feature that gives Excel enhanced capability?


What dialog box allows you to change a field name in a PivotTable?

The organisational, management, maintenance and access controls are


categories of __________
When a real-time system is simulated to generate the same output as the real-
time system, the technique is called__________
When an auditor expands the extent of SUBstantive tests to determine the
impact of defects on the attainment of program objectives, the methodology
is__________

This is an important control in systems that use digital signatures for


authentication purposes.
To make changes in MS-Access form should be opened in
__________________
_______layout of a form displays one record at a time

In SQL, DML stands for _________

To see more than one record at a time in a form we use _______

The default query invoked by ms-access is

The application controls are __________

Identify the type of audit when auditors are members of the systems
development team.
Identify the field check - "If a set of values is defined, is the input data one of
these defined values?
The field check that conforms if data input for a field is in a particular format.

The field check on a processed data that fails if a field is not initialized to zero or
errors occur during calculation is__________
The validation checks applied to a field depending on its logical
interrelationships with the other fields in the record are called ________
A group of records or transactions that are contiguous constitute ________

In MS-Access 2010, __________ queries are best suitable to summarize


information and looking for trends.
Which of the following is not a section in Report Design view in MS-Access
2010?
Which of the following is not an action query in MS-Access 2010?
In MS-Access 2010, which data type is best suitable for storing the price of a
commodity?
In MS-Access 2010, which of the following data type creates a field that allows
the user to choose a value from another table or from a list of values by using a
list box or combo box?
In a table, _____________ uniquely identifies each record that is stored in the
table.
_________ is used to insert values in Table directly.

DCL provides commands to perform actions like _________.

In SQL, having clause is used for _________

To compact the database in MS Access 2010, the database must be opened in


the ___________.
In MS Access 2010,_________ help protect a database from system failures
and against mistakes that the Undo command cannot fix.
Improving the performance of a database in MS Access 2010
used______________ tool.
The _________ can be used to create reports on database objects for planning
and modifying database design.
Use _____________ to grant or revoke permissions or to change the owner of
database objects.

_____________ commands are used to enforce database security in a multiple


user database environment.
The methods LIFO, FIFO, Moving Average are used to __________

The report prepared taking the asset and liability type accounts from the Trial
Balance is called__________
The report that depicts operating profit/loss for a period is ________

Which Tools and Utilities is not supported by Payroll Application ?

The software provide the facility to generate bills,receipts,vouchers and clients


outstanding etc is______________.
A software which provide the structured file management and knowledge
mamnagement is_____________________.

The software provides a complete package to manage secretarial requirements


AND generates forms as per MCA21 requirements
The ICAI-ROC provides the facility to prepare________________.

The software which provide the Contact Management,Correspondence


Management, simplified Mail/Email etc.

Correspondence feature of eSecretary application provide facilities


are______________.

To create New Contact and access Contact features are available in which
application ?

_____________________ is comprehensive package that combines Income


Tax,Service Tax,e-TDS.e-AIR etc.

The primary document for recording all financial transactions in Tally is


the__________
You can customize the voucher entry screen using the function
key…__________
Identify the voucher type that records fund transfers between cash and bank
accounts.
This voucher type records adjustments between ledgers.
The use of classes for payment, receipt and contra vouchers enables data input
in __________
The details of a voucher entry can be given in the …__________
The credit note voucher can hold account types: …________

The suffix and prefix details for the voucher type can be made applicable only
from the …__________
The voucher used to record all bank and cash payments is ________
The accounts that the business owns is called __________
Tally "s age-wise analysis considers the voucher "s __________

The financial statement that consolidates ledger balances is ________

The F9 function key in the left side of the Gateway of Tally screen displays
the__________
The option on the Gateway of Tally that will generate the PANDL account
statement is________
The expenditure for running the business for a period is ________
This displays the balance daywise for a selected voucher type.
The technique used by an auditor to list unused program instructions
is________
The sample data created and used for the purpose of testing the application
system is called__________
The test data (dummy unit) implemented in the normal processing of the system
over a period of time is known as__________
The test data generated with correctness proof, data flow analysis and control
flow analysis tools is called__________

________ is a process used in statistical analysis in which a predetermined


number of observations will be taken from a larger population.
In __________, Individuals are selected at regular intervals from a list of the
whole population.

In ______________ each individual is chosen entirely by chance and each


member of the population has an equal chance, or probability, of being selected.

Which method is commonly used in social sciences when investigating hard to


reach groups?

__________ are useful for quick reading and easy understanding, particularly for
top management.
__________________ is an enabling framework which establishes a connection
through which the remote user can access the Client "s data without
copying/transferring the data.
If we want the company to be connected automatically for remote access on
load, the property __________ needs to be set it as Yes.
The exported eTDS file from Tally.ERP 9 can be validated through NSDL "s
freely downloadable utility called __________________

ERP systems provide an access to the__________ data

________________ is a tool that refers to skills, processes, technologies,


applications and practices used to facilitate better, accurate and quicker decision
making.
Business intelligence systems are ________ Decision Support Systems.

Data warehousing technology is the process of creating and utilizing the


company"s __________
The data in the Warehouse comes from the _________ environment and
external sources.
In essence, SCM integrates ___________ management within and across
companies.
_____________ including all fulfillment activities, warehousing and
transportation to customers.
Copy of the Anti Virus Software was updated promptly and regularly at the Data
Centre and pushed into all of the servers and in all the systems in the branches
by ________
The __________which is also residing in the server at the branch actually does
the banking operations.
In Core Banking concept all the systems of the bank are connected to the
Central office by means of a connectivity which may be EITHER a _________ or
a dial up line.
____________would also include the existence of built in controls in the system
to ensure proper processing of input data so as to provide the required output.

____________refers to an arrangement wherein the issuing bank acts on the


request and instructions of a customer.
_______________ is a process by which the bank ensures the maintenance and
recovery of operations.

At which phase of testing the version of software is called “ beta version”?

Finacle developed by _________

The number that is stored in the ATM switch is the difference of which of the
following number?

The information retrieval of transactions taking place at ATM located at remote


locations is through _________
The number that is generated as soon as the customer inserts the card in the
ATM machine is __________
The tab in Expression Builder in which we write expressions is known as
_____________.

The criteria expression LIKE?B*.

__________ queries are useful for summarizing information, and are somewhat
similar to pivot tables in MS-Excel.
While entering record in Datasheet view, in which order the records can be
entered
When you delete the record in form, it deletes the record from__________.

Which is the following type of check that can be run when data is input through
terminal ?
In _______system money transfers are done on a one to one basis while in
_______system transfer is done in batches.
All the money transfers take place in the books of the _________________

________system of money transfer is primarily used for large transactions.

In RTGS, the STP generates an ___________for every outbound RTGS


transaction.
STP stands for ________________________________ in terms of CBS.

________ is a method of creating virtual networks within a physical network.

Which of the following are categories of computer audit function ?

Which of the following statements is true?

The Management Controls does not include ___________

_______is supported by advanced technology infrastructure and has high


standards of business functionality.
CBS Software resides in a Central application server which is located in the
___________
A________ that runs the core banking solutions (CBS) and is centrally
accessed by the branches.

The _________of the application is capable of only entering the data at the end
point that is branches.
What are the features of the Payroll Software provide by the ICAI.

The application server would be placed in a trusted inside zone in a separate


____________

CMS stands for ______________________________ in terms of CBS.

Which of the following is not an Audit Software

Using which functions to perform more complex calculations and exception


testing in IDEA?
The main components of Internet Banking system consist of __________

The controls that are not linked to any field of the table or query on the form are
known as ________.
Which property of the form can be used to insert a background image in MS
Access 2010?
___________ is a report that is inserted in another report in MS Access 2010.

A bound main report is based on a ______________ and its _____________


contain realted information.

________ is an independent,objective assurance and consulting activity


designed to add value and improve an organization "s operations.
Which of the following is/are the main purpose of the internal audit?

As per _____________of the Income tax Act,every person carrying on business


or profession is requires to get his accounts audited by a CA before the
"specified date".
__________________ refers to use software/applications to automatically
perform tasks such as accounting,preparing trial balance, financial statements
etc. and electronically transmit data or information using internet..

Which of the following is not a characteristics of WAN?

_________is protection of information assets from threats to preserve their


value.
Which types of information assets need to be secured in a CA Office?

Which of the following is not a software equipment required in a CA "s office?

Which of the following is not an application arranged by ICAI?

PBX stands for ________

________ is the process of meeting the financial goals through the proper
management of finances.

________ shows ability of company to pay back long term loans along with
interest or other charges from generation of profit from its operations.

A quick way to return to a specific area of a worksheet in Excel 2010 is to type


the cell address or range name in the ____________.
In MS-Excel 2010, the Name Box shows the ________________________.

In Excel 2010, what is represented by the small black square in the lower-right
corner of an active cell or range?
Suppose we accidentally erased a record in an Excel worksheet. Which
command can be used to restore it immediately?
The capability of the generalized audit software to read different data coding
schemes, different record formats and different file structures is__________
The audit software capability of frequency analysis is to__________

The audit functions of attributes sampling, variables sampling, stratified sampling


are included in __________ functions.
Identify the functional limitation of a generalized audit software that enables
evidence collection only on the state of an application system after the fact.

The purpose-written audit programs are used for________

In an MS-Access report, in which section we can keep the count[Sales] to


calculate the total sales for each month?

What is the first step in creating a form or report using the Form Wizard or the
Report Wizard in MS-Access 2010?

Which are the transaction supported by the Billing and Accounting software ?

The software provide creating,printing and sending bulk individual mail


is_______________________.

The feature Archive is available in K-doc application for the purpose


of____________.
Identify the account type by the rule: "Debit the receiver and credit the giver".

The tracking of changes in vouchers and ledger masters is done by________

Tally can import data from other programs and creates a log about the activity in
the file________
Import and export of data between Tally and other programs is possible with the
help of________
The manual option of voucher numbering leads to________

The Tally audit trail tracks changes made to vouchers that are ________

The ratio analysis of Bills Receivables or Bills Payables can be displayed with
the function key________
The test data generated with correctness proof, data flow analysis and control
flow analysis tools is called__________

When a real-time system is simulated to generate the same output as the real-
time system, the technique is called__________
When an auditor expands the extent of SUBstantive tests to determine the
impact of defects on the attainment of program objectives, the methodology
is__________

Picture of a transaction as it flows through the computer systems is


called________
Identify the type of audit when auditors are members of the systems
development team.
The document used for posting of accounting transactions is …________..

A tiny chart embedded in a worksheet cell that provides a visual representation


of data is a _________
_________is a graphical equivalent of a pivot table, which is used to visualise
PivotTable report summary data
The business model is represented in the graphical form using ______________
and ________________
_______ integrates supply and demand mangement within and across
companies.
OLAP stands for _________________.

__________ includes transportation from Suppliers and receiving inventory.

Which of the following is not the service area of SCM?

Which Of The Following Creates A Drop Down List Of Values To Choose From?

A __________ Enables You To View Data From A Table Based On A Specific


Criterion
The Database Language That Allows You To Access Or Maintain Data In A
Database

DCL Provides Commands To Perform Actions Like

Which is not a Database Model ?

Which Of The Field Has Width 8 Bytes?


DML stands for _____________

The IBDS is located in a ____________


A B C D
Data Definition Establishing Data None of
Relationship Refinement these
Design View Datasheet View Pivote Table All Of Above
AND Pivot
Chart View
Form 26q , Annexure Form 27, Annexure Form 26, ALL OF
to 26q to 27 Annexure to 26 THE
User-defined Security Audit Feature Unlimited multi- HTTP-XML
user support based data
interchange

Foreign Exports Financial Enterprise Foreign None of


Management Act Management Act Exchange these
Organization chart Client"s accounting Managament
Copies of Copies of
manual clients" important
incorporation contracts or
documents like long term
Integrity Authentication MoC
Confidentiality lease
Availability

Earnings Per share Gross Profit Ratio Price Earnings Fixed Asset
Multiple Over ratio

Charts Sparklines Graphs Both


BANDC
ZWZ XFD ZZZ AZZ
Sort AND Filter Outline Calculation Data Tools
32 64 16 120
Database with master Executable program Module Transaction
table with master copy programs with data with
snapshots master
transaction
Program Track Snapshot Picture

Database DBMS O.S None of


these
Define Data Language Data Design Data Definition None of
Language Language these
Ratio analysis Data analysis Account Transaction
analysis analysis
Public audit trails Data audit trails Sample audit Random
trails audit trails
Data independence Data integrity and Decentralized Reduced
security data application
developmen
t time
PAN Number PF No,online Personal profile ALL OF
SUBmission of loan THE
etc ABOVE
Internal Schema Conceptual Schema External None of
Schema these
Increase data Reduce Increase All
duplication Redundancy Efficiency
Text Number Date/time AutoNumber

File Validation Program File Validation Utility File Valuation File


Program Valuation
Utility
business corporate strategic None of
these
Monte Carlo Simulation Corporate Planning Decision Tree Corporate
Analysis Planning
AND
Analysis
Rounds a number to a Rounds a number Rounds a Calculates
desired multiple down to the nearest number up interest
integer
key field Primary key Reference Key None of
these the
above
Parameter query Update query Crosstab query Make Table
query

6 GL 4GL 5GL None of


these
Java Internet Database Visual Basic
Yes OR No Hyperlink Memo Autonumber

Column Field Tuple None of


these
Microsoft Exchange Lotus Notes Both A and B None of
these
Integrity Confidentiality Availability Authenticati
on
discounted cash flow internal rate of net present ALL OF
return value THE
ABOVE
Sensitivity analysis Risk analysis Qualitative risk Scenario
analysis analysis

Sensitivity analysis Risk analysis Qualitative risk Scenario


analysis analysis
Capture the Key Employee Automated Prepare
Performance Indicators designation and alerts for summary or
reporting structure pending bell curve
appraisals analysis of
all
employees

Timesheet System HR management Payroll System Knowledge


System managemen
t System
Reduce administrative Excess leave Error free Approval
burden on HR capture of leave workflow
details
Half-yearly Yearly Monthly Quarterly

Classroom Training E-Learning Virtual Learning


All the
Above
PC Application Server WAN All the
Above
Confidentiality Integrity Availability Authenticati
on
Financial totals Record totals document totals Hash totals
Table level Data Integrity Batch check System test

Sequence account Data account Suspense Update


account account

Bottom up test Hybrid test Stub test Top down


test

Embedded code Program code Database Database


Analyzers code
Search Query Make Table Query Aggregate Select
Query Query

View, change and A source of records Both A and B NEITHER A


analyze data in different for forms and nor B
ways reports
It is a printed page It is a Data Entry It is a part of None of
where users will enter Screen to make database used these
data viewing, entering by the analysts
and editing data in to draw
the database table conclusions

One-to-One One-to-Many Many-to-Many Many-to-


One
Entity Attribute Relationship None of
these
Classifying Filtering Sorting Summarizin
g
Storage space is Changing the data It can be more Both A and
wasted at one place only easily accessed B
will cause data
inconsistency
Number Text Memo Any of the
above
Conceptual Model Structural Model Object Model Interface
Employee Code Employee Name Date of Birth Joining Date

Income or expenditure Sales or purchase Asset or liability Profit or loss


Journal sheet Voucher debtors Sundry debtors Original
entry
Customers Assets Liabilities Suppliers
Income side Assets side Expense side Payable
side
File Company Project Application

F10 F2 F12 F11


Tally Secure Tally Pack Tally group Tally Vault
Ledger Journal Voucher Trial
Balance
Accounts of Tally Gateway of Tally Entry of Tally groups of
Tally
Capital nature Expense nature Revenue nature Income
nature
Alter Delete Display Shift

SUB-group Ledger-group Primary-group Alter-group


Single Multiple SUB-group Alter-group

Single SUB-group Alter-group Multiple


group Ledger master SUB ledger master General Ledger Journal
master Ledger
master
Journal and Ledger PANDL Account PANDL Account Voucher
and Journal and Balance Account and
Sheet Balance
Sheet

Expenses Income Assets Loans

Income Payables Expenses Loans


Bill date Effective date Voucher date Previous
date
Data flow Funds flow Stock flow Cheque flow

On closing balance On net credit flow On net On net cash


transactions flow
enter a value for checking for validation None of
automatically check these
every first last None of
these
program check macro All Of these

Programming Non-Procedural Application None of


these
Physical level Logical Level View Level None of
these
256 1000 15538 67999
Program query form macro

Report Query Form Macro


Column Line Scatter Bubble
Consolidation by Consolidation by Consolidation Any of the
position category using 3-D above
formulas
Trend Standarize Correl Growth
IRR NPV PV PMT

Sparklines Slicers Macros Data Forms

Cells C3 through C6 Cell C3 and Cell C6 Cell C4 and Cell None of


C5 these
Shift + F10 Shift + F1 Shift + F11 Shift + F12

Ctrl Alt Shift Ctrl + Shift

Data Warehousing Data Modeling Business Business


Modeling Intelligence

Powerpoint Word Paste document My


Templates
Email middle attack. Email Spoofing. Email hacking. Email
tracking

Web tapping Web Interception Web spoofing Web


threating
Payroll E - Secretary Billing and K-doc
Accounting application
software
Contact Management Greeting Email Share
Management Management certificate
printing
ICAI-ROC application ICAI XBRL Software K-doc Payroll
application
Resource allocation Knowledge document Client
and scheduling management Management managemen
Systems t
Database administrator Account System User
administrator administrator Administrato
r
AP module GL module AR module FA module

Evaluation of Vendors Receipts of goods Invite and Comparison


or service analyze with budgets
quotations from
vendors
Purchasing Accounts Payable Expense Fixed assets
Management
Purchasing Sales Accounts Accounts
Payable Receivable
Accounts Payable Accounts Expense Bank
Receivable Management Reconcilatio
ns
XML Page HTML Page Web Page None of
these
single dimensional hyper dimensional multi None of
dimensional these
XML HTML ASCII ALL

Networking VB.Net Tally.Net None of


these
Local Data Remote Data Internet Data None of
these
Local User Remote User Both A AND B None of
these
implementation upgradation installation migration

pre implementation under process post None of


review implementation these

post implementation pre implementation Both A AND B EITHER A


Or B
Interactive Processing Immediate Real Time Business
Processing Processing Processing

File Definition Stratification Print Preiview Append


Review Programming Understand Formulate flaw ALL OF
standards program hypotheses THE
specifications ABOVE
LAN Virtual Networks MAN WAN

Application Software Server System


Development Development Development Developmen
t
Review Management Authorized Log RTGS
Controller management
LAN VLAN WAN MAN

Consalidation Password Policy protection Validation

Data Definition Data Defined Detailed Data


Language Language Definition Detailed
Language Language
Pie Chart Area Chart Bar Chart Column
Chart
Pie Chart Line Chart Bar Chart Column
Chart
.ACCDB .ACCDE .MDW .ACCDT
Front-end database Back-end database Both of them None of
these of
them
HTML and InfoPath Access Forms Visual Basic Excel
Application attachment
Fixed-down Locked-down Open-down None of
these
Make Table Query Update Query Delete Query Parameter
Query
Open Secure mode Open Inclusive Open Exclusive Open Read
mode mode Mode

$ # () ""

Math Date Text None of


these
Macro Form Report None of
these
Open Modify Read Write

Create Tab External Tab File tab Database


Tools
Forms Query Report ALL OF
THE
ABOVE
Tables Forms Query Report
A back-end database A new database primary None of
AND front-end AND Old database. database AND these
database secondary
database

front office back office staff None of


these
CRM "s ERP SCM None of
these

encryption decryption cryptography None of


these
Interactive Processing Immediate Real Time Business
Processing Processing Processing

Information Systems Integrated Decision Non-Isolated


Information Systems Support Information
Systems Systems

Scenario analysis Sensitivity analysis Decision Tree None of


Analysis these
SUMIF( ) PMT COUNTIF( ) None of
these
Du Point Analysis Return on Profitability None of
Investment Ration these
Mortagage Leasing Rent All the
above
Format > Window Window > Split View > Window View > Split
> Split

Settings Tab under the Settings Tab under Settings Tab ALL OF
Tab Format > Cells the tab Data > under the tab THE
Validation Data > Filter ABOVE
>Advanced
Filter
Pagelayout > Page Pagelayout > Print Page Setup > Print Area
Setup > Print Area Area Print Area
Add Ins Developer Tab Text Import Analysis
wizard Tool Pak
$ @ * AND
Average(4,5,6,7) Average(A1,B1,C1) Average(A1:A6, ALL OF
B1:B6) THE
ABOVE
MOD( ) INT( ) DIV( ) Remainder(
)
A formatted description A formatted defined A worksheet A worksheet
of each scenario on a range of Solver and with separate with a
separate worksheet Goal Seek solutions macros for each separate
scenario thumbnail
for each
formula

Arguments Limitations Constraints Parameters

Trendlining Enhancement bit Thumbnail Add-in


Field Options Field Pane Field Settings Field
Structure
Application controls General controls Check controls Input
controls
Parallel trailing Tracing parallel Parallel coding Parallel
simulation
Cross reference lister Formulate flaw Correct lister Formulate
hypotheses correct
hypotheses

Public audit trails Random audit trails Sample audit Data audit
trails trails
Form view Form Design Change Form None of
these
Tabular columnar Datasheet None of
these
Data manipulation Data mathematical both a and b None of
language language these

Tabular columnar both a and b None of


these
Update Query Select Query Delete Query None of
these
Input controls Processing controls Both A and B NEITHER A
nor B
General audit Post audit System audit Concurrent
audit
List Range Slab Digit
Format mask Data mask Field mask Input mask

Range Sign Overflow Serial

Field checks Record checks Batch checks File checks

Physical batches Logical batches Block batches Transact


batches
Crosstab Parameter Action None of
these
Report Header Section Page Header Detail Section Summary
Section Section
Select Delete Make Table Update
Text Number Currency AutoNumber

OLE Object Memo Hyperlink Lookup


Wizard

Unique Key Foreign Key Primary Key Record Key

Query Report Form None of


these
Changing the structure Creating views and Authorizing Inserting,
of tables indexes access and updating or
other control deleting
over database records
For ordering records specifying updating None of
conditions with records these
group by clause
Inclusive Mode Exclusive Mode Normal Mode Save Mode

Backups Save Database Save As None of


Databse these
Performance Analyzer Hi-tech Analyzer Online Analyzer None of
these
Table documenter Database Query AND None of
documenter Report these
documenter
User and group User-level Security User and group None of
Accounts Wizard Permissions these

Security Grant and revoke Select Create

Value closing stock Value clearing stock Value expense Value


stock income
stock
PANDL statement Income statement Balance sheet Asset sheet

Trial balance Trading account PANDL Suspense


statement accounts
MIS Export Journal TCS Backup
Voucher utilities
Billing AND Accounting Payroll Software K-doc ICAI-ROC
softwatre application application
ICAI-File management K-doc application Knowledge None of
application Management these
Software
Billing AND Accounting Payroll Software K-doc ICAI-ROC
softwatre application application
Auto filing of eForms Shares Annual Returs ALL OF
Records/Certificates forms THE
ABOVE
eSecretary software Contact Template ALL OF
Management Management THE
software software ABOVE
Templates Blank document Outside ALL OF
document THE
ABOVE
eSecretary software Contact Template ALL OF
Management Management THE
software software ABOVE
Tax Application K-doc application Tax Suite ALL OF
Application THE
ABOVE
Journal Trial sheet Voucher File
F13 F12 F10 F11

Credit Note Payment Receipt Contra

Sales Receipt Payment Journals


Double entry mode List entry mode Choice entry File entry
mode mode
Comment Memo File Narration
Sales account, Sales Ledger account, Suppliers Buyer "s
tax account Bank account account, account,
Purchases Cash
account account
End of a month First of a year First of a month End of a
month
Credit Note Contra Sales Note Payment
Liability Income Sales Asset
Previous date Effective date Current year Configured
date
Balance sheet Profit AND Loss Trial balance Journal
statement
Accounting reports Inventory reports PANDL reports Expense
reports
Net Loss Net Income Net Profit Net Account

Expense Example Taxes Income


Record book Ledger book Journal book Day book
Modelling Analyzing Mapping Tracing

Test data Table data Item data Record data

Integrated Test Facility Black box Test Graph testing Whitebox


Facility testing
Test item block Test data pack Test program Test record
pack pack

Snowball sampling Sampling Systematic Simple


sampling random
sampling
Clustered sampling Sampling Systematic Simple
sampling random
sampling
Snowball sampling Convenience Systematic Simple
sampling sampling random
sampling
Quota Sampling Sampling Snowball Simple
sampling random
sampling
Balance sheet Summary reports IRR NPV

Direct Web Browser Web Publishing Tally.NET Email facility


Access

Allow to Connect Contact On Load EITHER A or B None of


Company these
File Validation Program File Validation Utility File Valuation File
Program Valuation
Utility
integrated distributed isolated de-
centralized
Data Warehousing Data Modeling Business Business
Modeling Intelligence

data-driven information driven resource driven None of


these
general data historical data operational data None of
these
operational backup data None of
these
supply and demand supply and chain supply and None of
sortage these
Inbound operations outbound hybridbound None of
operations operations these
Hacking Method Push-pull method Both A ANDB None of
these

Sytem software utility software Application Application


Software Server
local line Leased line Broadband None of
these

Output Control Input control Process Control Data Control

Letter of Credit Letter of Tax Letter of Letter of


Payable Receible
Business Recovery Business Continuity Disaster None of
Planning Planning Recovery these
Planning
Programmer testing User testing (a) AND (b) None of
both these of
above
Infosys HCL Technologies TCS I-Flex

Pin No - offset value Offset value - Pin Pin No - Natural Offset Value
No Pin - Natural Pin

Soft copy of Electronic Hard copy of Cash register (a) and (b)
journal Electronic Journal both
Offset value Pin sent to Natural Pin Card
customer Number
Expression Elements Operator Button Expression Box Expression
Builder
window
Will match all text Will match all text Will match all Will match
starting from B ending from B text having all text
second starting with
character as B a digit
Select query Crosstab query Action query Parameter
query
Alphabetical Order At the end of the Any where in Beginning of
table the table the table
Form only Form but not in Table but not in Form AND
table Form Table
Field check Filter check Compare check Data check
NEFT, RTGS RTGS,NEFT EFT,RTGS None of
these
Beneficiary bank Central bank(RBI) Remitting bank None of
these
NEFT RTGS EFT ALL OF
THE
ABOVE
UTN UTE UTR UTS

Straight Through Straight Temporary Strict Through None of


Processing Processing Processing these

VLAN LAN WAN MAN

Items of audit interest Data Analysis System ALL OF


validation THE
ABOVE
Audit of internal Systems audit are Audit of controls None of
controls is not needed important for the in any banking these
at all verification of the environment is
internal controls performed using
software audit

Managing of Assets Formulating a Developing a Laying down


security policy business procedures
continuity for system
planning developmen
t

Firewall Internet banking Core Banking Web centre


Solution
ATM Data centre Middleware Web centre Central
Office Data
Centre.
ATM Server Central Application Database Domain
Server Server Name
Server
System version Application Version Client version Firewall

Recruitment salary Process Time AND ALL OF


Management attendance THE
ABOVE
Virtual Local Area Local Area Network Wide Area Personnal
Network Network Area
Network
Control Management Core Management Cash Centre
System System Manangement Managemen
System t System
ACL IDEA Unix SOFTCAAT

Equation Editor function Editor Calculation Testing


Editor Editor
Web server IBDS IBAS All the
above
ActiveX control Unbounded Graphics Bound
Controls Control Controls
Caption Background Record Source Picture

Inner-Report SUB-Report Inside-Report Insert-


Report
Table or query,Inner- Table or query,Main- Table or None of
Report Report query,SUB- these
Report
Statutory audit Tax audit Internal None of
auditiing these
Financial reporting Operations of the Both A and B EITHER A
organization or B
Section 45 Section 44AD Section 43B Section
44AB
ERP Office automation EITHER A or B None of
these

Most WANs are owned Compared to LAN, WAN uses only Switches
by only one its transmission private are used to
organization. speed is low networks. connect
LAN and
WAN
Confidentiality Integrity Information None of
Security these
Client data Own data Own documents All the
above
Resource allocation Client management HR and Payroll None of
and scheduling these
ICAI-XBRL suite K-doc Billing and ICAI-TOC
Accounting
Private Exchange Public Exchange Private Branch Public
Branch Branch exchange Branch
exchange
Corporate planning Monte Carlo Financial Personal
simulation planning Finance
planning
Debt Assets Ratio Interest Coverage Total Fund None of
Ratio Ration these

Name Box Formula Bar Zoom Box Sheet Tab

Name of the workbook Name of the Name of the cell Formula in


currently working on worksheet currently or range the cell
working on currently currently
working on working on
Copy handle Fill handle Insert handle Border

Insert Replace Paste Undo

File size File data File access File


reorganisati
on
Sort and merge files Sampling nth item Formatting Classify
output data on a
criteria
Stratification Selection Statistical Reporting

Ex Post Auditing Only Analytical review Limited ability to Limited


only determine ability to
Propensity for Verify
Error Processing
logic
Sorting, creating, and Data retrieval, code Reading data, Specific
printing files comparison selecting and tasks with
analyzing original or
information modified
programs
In the Report Header In the Report Footer In the Page In the Month
Section Section Footer Section group
Footer
Section

Selecting the fields that Selecting the Reading several Selecting


we want to appear in underlying table or screens of how the
the form or report query on which we mostly useless form or
want to base the information and report
form or report clicking next should be
formatted

Billing Previous years Cash receipt ALL OF


pending bills THE
ABOVE
E - Secretary software Contact Template ALL OF
Management Management THE
software software ABOVE
To create new file To save file To cut AND None of
paste the these
completed and
old document.
Real accounts Personal accounts Nominal Expense
accounts accounts
Tally Vault Tally Audit Tally Report Tally group

Tally.imp Tally.cfg Tally.exp Tally.ole

OLE DBMS ODBC MS-XLS

Auto numbers Duplicate number Sequence Range


number number
more than 30 Days old less than 30 Days more than a day more than a
old old week old
F5 F8 F12 F6

Test item block Test data pack Test program Test record
pack pack

Parallel trailing Tracing parallel Parallel coding Parallel


simulation
Cross reference lister Formulate flaw Correct lister Formulate
hypotheses correct
hypotheses

Program Track Snapshot Picture

General audit Post audit System audit Concurrent


audit
Voucher and journal Ledger and trial Balance sheet Journal and
balance and trial ledger
balance
Bar Chart Sparkline Pivot Chart Pie Chart

Bar Chart Pivot Chart Sparklines None of


these
charts, pictures smart art, clip art flowcharts, flow graphs,
diagrams shapes
BPM SCM PLM CRM
Online Analysis Online Analytical Online None of
Processing Processing Analytical these
Programming
Inbound Operations Outbound Sourcing Production
Operations planning planning
Logistics Asset Management PLM CRM

Ole Object Hyperlink Memo Lookup


Wizard
Form Query Macro Report

DCL DML DDL None of


these Of
Above
Change The Structure Insert, Update Or Authorizing None of
Of Tables Delete Records And Access And these Of
Data Values Other Control Above
Network Database Relational Database Object Oriented Structureed
Model Model Database Model Database
Model

Memo Number Date/time Hyperlink


Detailed Maintaining Data Maintaining Data Detailed
Language Language Manipulation Manipulation
Militarised zone City Zone State zone demilitarised
zone
Answer
A

B
B
B
B

C
A

C
D

D
B

A
A

B
C

D
B

C
D
B

C
B

D
C

B
A

C
A

D
D

A
A
C

A
D

C
C

B
C

B
D

B
B

A
A

A
C

D
D

A
A

D
C

C
A

A
C

B
C

C
B

D
B

D
A

D
D
B

A
D
C

B
C

C
B

A
B

D
B

D
B

C
D

C
B

B
B

C
C

You might also like