Sunteți pe pagina 1din 16

Sl.

Question Answer
No
1 XML stands for_________ Extensible Markup Language
2 XML is a ___________ Recommendation. W3C
3 XML is a language that is very similar to which language ? HTML
4 DTD stands for ___________, which is called XML Schema. Document Type Definition
5 The extension of a XML document is ______________. (.xml)
To create a XML Map from XML schema, Go to which Tab in Excel Developer
6
____________.
7 XML is case-sensitive ? TRUE
8 Excel works primarily with ________ types of XML files. 2
9 What is the file extension of Schema file which contain schema tags ? (.xsd)
10 VBA stands for_______________ . Visual Basic for Applications
11 Macro enabled workbook file extension is _______________ .xlsm
12 There are _________ ways to open a Macro enabled workbook. 3
13 ANOVA stands for___________ Analysis of Variance
14 A function doesn’t require an argument is___________. TODAY()
15 In Excel, there are __________ functions for calculation of depreciation. 5

For calculation of depreciation as per


16 SLN function used to calculate depreciation as per_________________. Straight Line Method.
For calculation of depreciation as per
17 SYD function used to calculate depreciation as per_________________. Sum of Years Digit Method.
For calculation of depreciation as per
18 DB function used to calculate depreciation as per_________________. Declining Balance Method.

For calculation of depreciation as per


19 DDB function used to calculate depreciation as per_________________. Double Declining Balance Method

For calculation of depreciation as per


20 VDB function used to calculate depreciation as per_________________. Variable Declining Balance Method.

21 PV Ratio stands for _____________________. Profit Volume Ratio


22 BEP stands for __________________________ Break Even Point
23 Data Validation available in which Tab? Data
___________function returns value from a given data range based on row INDEX()
24
and column.
25 Which function categories are not available in Excel. Arts
26 PMT Function is belongs to which categories of Excel function ? Financial
27 NPV stands for_______________________________ Net Present Value
28 _______function uses a fixed rate to calculate depreciation DB
29 Which of them is not a Conditional Operators symbols? </
Strings are to be always enclosed in double quotes when used in a TRUE
30
formula.
31 Parentheses are used to change the order of calculation. TRUE
32 In Excel the function =Abs(-4) returns __________. 4
_______ function returns the remainder after a number is divided by a MOD()
33
divisor.
If User want to display the formulas rather than the results of the formulas Formulas > Formula Auditing > Show
34 Formulas.
then choose______________.
_______________ reveal about the current and future financial condition Financial statements
35
of the company.
36 Which of them is a Intangible assets? Goodwill and Patents.
37 CR stands for___________________. Current Ratio
38 QR stands for___________________. Quick Ratio
39 Debt – Equity Ratio =Long term debt / Shareholders funds. TRUE
40 ACP stands for _____________. Average collection period
41 FATR stands for _____________. Fixed assets turnover ratio
42 A _________ can be a numerical fact. Statistic
43 __________ stands for reduction in value of fixed assets. Depreciation
Value of fixed assets is generally reduced over the period of time due to Wear & Tear,Change in taste of
44 people,Change in technology
__________.
45 Profit equals to __________. Sales - Total Cost
Salary of administrative staff,office
46 Examples of fixed cost are __________. rent
Cash budget is prepared for planning for future as far as movement of TRUE
47
cash is concerned.
Discounting is not the process of determining the present value of a
48 FALSE
payment or a stream of payments that is to be received in the future.
49 PAN must have ________ characters only. 10
Sample means the units or items selected for study or consideration and TRUE
50
population means the total set of data used for selection of samples.

_______________ analysis relates items in the financial statements in a Financial ratio


51
manner that drives out performance information about the company.
Hold down the SHIFT key during start
52 How to restrict to run a macro automatically when starting Microsoft Excel? up.

Which option allows you to Bold all the negative values within the selected Conditional Formatting
53
cell range?
_____________ allow us to perform calculations or operations that would Worksheet functions
54
otherwise be too cumbersome or impossible altogether.
55 Statistical functions in Excel help to calculate __________________ Arithmetic Mean,Median,Mode
56 Discounting Factor formula is ___________________ = 1 / (1+r) ^ n
________________ is considered as non cash expenditure and occupies Depreciation
57
a prominent place in Profit & Loss Account.
The value which can be realized at the end of life of fixed asset by selling it Salvage Value
58
is called _________________
____________ is prepared for planning for future as far as movement of Cash budget
59
cash is concerned.
____________ is the process of determining the present value of a
60 Discounting
payment or a stream of payments that is to be received in the future.
____________ is one of the core principals of finance and is the primary
61 factor used in pricing a stream of cash flows, such as those found in a Discounting
traditional bond or annuity.
62 XML schemas in Excel are called XML _____________. Elements
Financial analysis,Equity
Excel allows us to use various functions and even simple mathematical analysis,Leasing decisions and the list
63
calculations which can be used for _____________. goes on
Which cell reference show the reference to other sheet or reference to Sheet2!C4
64
other workbook in excel ?
65 Which of them is not a Range References? A1, A2 , A3, A4
66 Interest Coverage Ratio equals to _________. EBIT / Debt interest
If particular workbook have to open each time Excel started, where the XLSTART folder
67
workbook should be placed?
There is an absolute reference to cell
68 If the cell B1 contains the formula=$A$1, which of the statement is true ? A1.

__________ is a computerized mathematical technique that allows people Monte Carlo Simulation
69
to account for risk in quantitative analysis and decision making.

________ is the process of meeting the financial goals through the proper Financial planning
70
management of finances.
___________ can be defined as the process of setting the procedures in Corporate Planning
71
the organization for achieving the predefined goals.

________ shows ability of company to pay back long term loans along Interest Coverage Ratio
72
with interest or other charges from generation of profit from its operations.

_____________________is the simplest method of comparing different Price Earnings Multiple


73
stocks at a point of time to make investment decisions.
<?xml version="1.0" encoding="ISO-
74 The very first line of code of XML file is_____________. 8859-1"?>
75 Every bit of data has to start and end with an identical tag <TagName>Data</TagName>
76 The exact syntax of PMT function is________________. PMT(rate, nper, pv, [fv], [type])

77 The exact syntax of IPMT function is__________________. IPMT(rate, per, nper, pv, [fv], [type])

78 To see the XML Map user must go ______________. Developer>XML> Source


79 Deletion of XML Map is done through __________. XML Maps Dialog Box

80 Method of tax calculations shall change according to _________. Annual Income,DOB,status of assess

81 EMI stands for ______________. Equated monthly installment


Which function is used to calculate the principal portion in every PPMT
82
installment ?
________ is a process used in statistical analysis in which a
83 predetermined number of observations will be taken from a larger Sampling
population.
In __________, Individuals are selected at regular intervals from a list of Systematic sampling
84
the whole population.
In ______________ each individual is chosen entirely by chance and each
85 member of the population has an equal chance, or probability, of being Simple random sampling
selected.
Which method is commonly used in social sciences when investigating Snowball sampling
86
hard to reach groups?
__________ are useful for quick reading and easy understanding, Summary reports
87
particularly for top management.

It is a process in which a business determines whether projects such as Capital Budgeting


88
building a new plant or investing in a long-term venture are worth pursuing.

Popular methods of capital budgeting include _________ and payback discounted cash flow,internal rate of
89 return,net present value
period.
_________ is the value of all future cash inflows less future cash outflows Net present value
90
as on today.
___________is the process of defining and analyzing the dangers to
91 individuals, businesses and government agencies posed by potential Risk analysis
natural and human-caused adverse events.
__________ which is used more often, does not involve numerical Qualitative risk analysis
92
probabilities or predictions of loss.
________ are generally used to present information in a simple and better Charts
93
way and also be used to analyse the risk in a better way.
It is a technique used to determine how different values of an independent
94 variable will impact a particular dependent variable under a given set of Sensitivity analysis
assumptions.
_______ involves computing different reinvestment rates for expected Scenario analysis
95
returns that are reinvested during the investment horizon.
96 NPER stands for______________________________ Number of Periods
Which function that is used to calculate the payment for specific loan terms PMT
97
____________
98 ________helps to break down the Return on Equity Du Point Analysis
_______ is a common method for financing property, facilities, and Leasing
99
equipment.
Structure, store, and transport
100 Find the correct sequence in case of XML file, are information.

101 Programming of Macros is done in programming Language ___________. VBA


As Bank auditors,Many Banking applications generate text files in Txt format,Csv format
102
____________.

103 Macro security is enabling through __________. Developer tab>Code>Macro Security

104 In Excel, Sampling option is available in ___________ . Data Analysis


105 Requirements for preparation of cash budget in Excel. Knowledge of all of the above.
106 ROE stands for __________. Return on Equity
___________ is a statistical procedure that uses sample evidence and
107 probability theory to determine whether a statement about the value of a Hypothesis
population parameter should be rejected or should not be rejected.
108 ____________ is a statistical tool used to create predictive models. Multiple Regression
__________ shows the ability of a company to pay its current financial Liquidity Ratio
109
obligations.
110 ___________ shows dependency of a firm on outside long term finance. Leverage Ratio
To record a Macro in relative mode,"Üse Realtive References" available in Developer Tab,View Tab
111
which tab of excel ?
An _____________ is a group of people with a common goal, having Enterprise
112
certain resources at its disposal to achieve the common goal.
________________ include money, manpower, materials, machines, Resources
113
technologies etc.
___________ is a collection of activities that make one or more kinds of Business Process
114
input and creates an output that is of value to the customer.
Information systems can be designed so that accurate and timely data are
115 shared between functional areas. These systems are called Integrated Information Systems
_______________________________.

The approach to ERP is to first develop a ______________ comprising the Business Model
116
business processes or activities that are the essence of a business.

117 OLAP stands for _________________. Online Analytical Processing


________________ is a tool that refers to skills, processes, technologies,
118 applications and practices used to facilitate better, accurate and quicker Business Intelligence
decision making.

119 Business Intelligence Systems are data-driven ___________________. Decision Support Systems
120 Finacle developed by _________ Infosys
121 Flexcube developed by ________ I-Flex
122 Quarz developed by ____ TCS
The server is a sophisticated computer that accepts service requests from Clients
123
different machines which are called__________
__________ server has to be a powerful and robust system as it has to Application Server
124
perform all the core banking operations.
125 ATMS stands for_________ Automated Teller Machine Server

126 IBAS stands for ___________ Internet Banking Application Server

127 PBF stands for________ Positive Balance File


Internet banking refers to a banking transactions routed through the Internet
128
________
Computer Planning and Policy
129 CPPD Stands for ______________. Department
The _________ is generally a hardware and it plays the role of preventing Firewall
130
unauthorized access.
131 ________enable data transmission over different networks. Routers
_________have many ports that are connected to different systems and it Switches
132
facilitates data transmission with the network.
133 A Proxy server always acts in conjunction with a _________. Firewall
The ________ provides network security by preventing malicious data Proxy Server
134
from entering the network.
135 _________is used for authentication. Domain Controller
136 Access to a set of servers is controlled by the ________. Domain Controller
137 ________is a process of unauthorized entering a network. Hacking
____________ facility provides a customer to access financial Automated Teller Machine
138
transactions in a public place.
Cash Withdrawal,Balance
139 Which is the Function of ATM? Inquiry,Registering requests for
Cheque book
140 Every bank branch should madatorily have a security policy. TRUE
Physical Access,Logical
141 The Operational Controls include controls on ___________ Access,Environmental Controls
Input Controls,Output
142 Application Controls are broadly classified into __________________ Controls,Processing Controls

143 __________controls check that the data entered is complete and correct. Input Controls

144 Reasonableness check is a _________. Input Controls


145 Which of the following is not a module of the CBS? Equity Share management
Performance Guarantee,Deferred
146 Bank guarantees can be __________________________ Payment Guarantee
147 SLR stands for ________________________________ Statutory Liquidity Ratio
________are record of activities that have taken place in the system Logs
148
irrespective of the modules.
Activity performed,User details,Date
149 The contents of a log includes _____________________ and Time
E-mail policy,Firewall security
150 Communication and Operations management must include which policies? policy,Internet policy

Logs of the various activities in CBS can be deleted immediately and also FALSE
151
be accessed by anybody.
152 CRR stands for _________________________ in terms of CBS. Cash Reserve Ratio
Does the IS Audit also include audit of the outsourcing activites carried out Yes
153
in the CBS system?
154 DRP stands for ___________________________ in terms of CBS. Disaster Recovery Planning
_____________are soultions applied when any kind of vulnerabilities Patches
155
discovered in networks in the CBS system.
156 __________can be viewed only by the DBA of an organisation. Database Log
Is performing periodic vulnerability assessment of the networks is Yes
157
necessary?
KYC stands for _________________________________ in terms
158 Know Your Customer
banking.

In CBS, the Accounts Management module deals with Creation of Savings Account,Creation
159 of Current Account,Overdraf
_____________________

160 Soft copy of the ATM journal rolls is called_____________ Electronic Journal
161 The ATM switch consists of a _____________________ computer,server
_______________testing should be done to check the unauthorised Penetration
162
access to the network in CBS.
_________enables transfer of money from one bank to another in "Real RTGS
163
time" and on "Gross" basis.
In _______system money transfers are done on a one to one basis while RTGS,NEFT
164
in _______system transfer is done in batches.
All the money transfers take place in the books of the Central bank(RBI)
165
_________________
166 EFT and NEFT work on _______________basis DNS
167 ________system of money transfer is primarily used for large transactions. RTGS
In RTGS, the STP generates an ___________for every outbound RTGS UTR
168
transaction.
169 UTR full form _________________________________ in terms of CBS. Unique Transaction Reference

170 STP stands for ________________________________ in terms of CBS. Straight Through Processing
171 CMS stands for ______________________________ in terms of CBS. Cash Management System

Systems audit are important for the


172 Which of the following statements is true? verification of the internal controls

173 The Management Controls does not include ___________ Managing of Assets
_______is supported by advanced technology infrastructure and has high Core Banking Solution
174
standards of business functionality.
175 Which type of joins not available in Access 2010? Full join
A join returns only those rows from both tables that match on the joining Inner join
176
field is___________ in MS Access 2010.
The query returns all of the rows from left table, and also those rows from Lef outer join
177
the right table that is known as____________.
The query using ___________ returns all the rows from right table, and
178 also those rows from the left table that share a common value on both Right outer join
sides of join.
179 How can we add a table to the Query Design window_________? Select Design -> Show Table
180 ___________can be considered a questions in a data base. Queries
181 Operands can be_________ in MS Access 2010. Literals,Identifiers,Function
182 In example "Hello"+" " +" everyone" ,hello is _____ Text Literal
183 Length("Ms Access") will return the count of charcters is __________. 9
184 AND ,OR is a kind of ________ in MS-Access 2010. Logical
185 Comparision operators is also known as_______ in MS-Access 2010. Relational
186 LIKE operator works with______in MS Access 2010. Text,Date

187 IN operator is used __________ in MS Access 2010. To match the value to a set of values

Operator precedence is similar to _____ that is follwed in Algebra in MS- BODMAS


188
Access 2010.
___________________ technology is the process of creating and utilizing Data Warehousing
189
the company's historical data.
______________ can be defined as subject-oriented, integrated, time-
190 variant, non-volatile collections of data used to support analytical decision Data Warehouses
making.
________________ databases contain detailed data that is needed to
191 satisfy processing requirements but which has no relevance to Operational
management or analysis.
192 Data in the Data Warehouse is ______________ , not ____________. Static, Dynamic
____________ data contains an historical perspective that is not generally Informational, Operational
193
used by the _____________ systems.
The definition of data elements in the data warehouse and in the data
194 sources and the transformation rules that relate them, are referred to as Metadata
___________.

195 Data warehouses are not the optimal environment for ____________ data. Unstructured

196 Maintenance Costs are high for Data Warehousing. TRUE


Credit Card Churn Analysis,Insurance
197 Data Warehousing can be used for ___________________. Fraud Analysis,Logistics Management

198 _________________ is the process of extracting patterns from data. Data Mining
___________________ is an approach to quickly answer multi- Online Analytical Processing
199
dimensional analytical queries.
The Output of an OLAP query is typically displayed in a ___________ Matrix
200
format.
______________ companies is planning to support tens of millions of B2C
201
customers with just hundreds of employees.
Increased Complexities,Legal
202 Which of the following is the limitation of Open Source ERP? Complexities,Unsuitable for
conventional applications
203 Which of the following is not an Open ERP software? Open-Project
_____ is the process of integrating all the business functions and ERP
204
processes in an organization to achieve numerous benefits.
________ must consider the fundamental issues of system integration by Manager
205
analyzing the organization's vision and corporate objectives.
206 The more the number of __________, the longer the implementation time. units
Customization of ERP systems is one of the major challenges in auditing TRUE
207
ERP security.
Tally.ERP 9 provides graphical analysis of data which helps the user to TRUE
208
perform deeper analysis.
The user can ________ the company data into multiple companies as per Split
209
financial periods required.
E-Filing of Returns refers to the process of electronically filing your tax Internet
210
returns through the ___________.
Tally.ERP 9 does not allows you to export the ETDS forms in NSDL
211 compliant formats as well as facilitates printing of TDS Forms in Physical FALSE
Form.
212 Tally.ERP 9 offers a data encryption option called _______________. Tally Vault
___________________ is the process of exchanging Tally.ERP 9 data Synchronization
213
between two or more locations.
The Tally website offers _______________, by which a user can Tally Chat
214
communicate with a Tally representative and get required information.
215 Tally.NET use _______________ for centralised Account Management. Control Centre
The data is transferred between the remote location and the server using a Encryption
216
secured mechanism called __________________.
217 Sales Tax Ledger falls under which Group? Duties and Taxes

218 Alias represents ___________ in Tally.ERP9. Short name,Nickname,Code name

219 If we purchase any Fixed asset in credit, we can pass it from _________. Journal mode
220 To save entry without any amount, we have to use _____________. Allow 0 value entry
Transfer of materials from one godown to another godown, use Stock Journal
221
______________.
222 While exporting Ledgers from Tally to Web Page, we use _________. HTML Format

223 Budget represents _______________________. Estimation,Forecasting,Assumption

224 In Service tax Credit Adjustment (%) should be either ____________. 0.2,1
225 Service Tax Report can be seen from _________________. Display > Statutory Reports
226 Can we allow Expenses/Fixed Assets in Purchase vouchers? Yes
Transfer from Main Cash to Petty Cash we require to pass _______ Contra
227
voucher.
228 Income Tax number of the Company will appear in which report? None of these
229 A business model is not a ___________ model. mathematical
230 OLAP systems use concept of OLAP cube called a ______________ cube multi dimensional
The data which is to be exported from Tally.ERP 9 can be in ________ XML,HTML,ASCII
231
format.
232 In Tally ERP-9 Remote Access is also known as __________. Tally.Net
Accessing data store on a remote location using Internet in Tally.ERP9 is Remote Data
233
called____________.
234 Tally.ERP9 can be classified user in two categories are___________. Local User,Remote User
Which of the following is not a predefined security level provided by Public User
235
Tally.ERP 9?
The business model is represented in the graphical form using flowcharts, flow diagrams
236
______________ and ________________

Identifying and prioritizing subject


areas to be included in the Data
Warehouse,Defining the correct level
of summarization to support business
237 Which of the following is/are the data warehousing activity? decision making,Establishing a data
warehouse help desk and training
users to effectively utilize the desktop
tools

___________________ is the succession of strategies used by Product Life Cycle Management


238
management as a product goes through its life cycle.
_______ integrates supply and demand mangement within and across SCM
239
companies.
__________ includes transportation from Suppliers and receiving Inbound Operations
240
inventory.
241 Which of the following is not the service area of SCM? CRM
Which step of the ERP implementation involves, educating and recruiting
242 Step 2
end users throughtout the implementation process?
The system ____________ process will address issues such as software installation
243
configuration, hardware acquisition and software testing.

A __________________ review is recommended to ensure that all post implementation


244
business objectives established during the planning phase are achieved.

In _________________ stages, auditors have access to rudimentary ERP post implementation


245
tools and capabilities for auditing security configurations.
Immediate posting and updation of books of accounts as soon as the Real Time Processing
246
transactions are entered. This is called as __________
Form 26, Annexure to 26,Form 27,
247 Which of the following ETDS forms are available in Tally.ERP 9? Annexure to 27,Form 26Q, Annexure
to 26Q
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's File Validation Utility
248
freely downloadable utility called __________________
249 ERP systems provide an access to the__________ data integrated
250 Business intelligence systems are ________ Decision Support Systems. data-driven
Data warehousing technology is the process of creating and utilizing the historical data
251
company’s __________
The data in the Warehouse comes from the _________ environment and operational
252
external sources.
In essence, SCM integrates ___________ management within and across supply and demand
253
companies.
_____________ including all fulfillment activities, warehousing and outbound operations
254
transportation to customers.
Customer Relationship Management is a ________________ level corporate
255
strategy.
256 Operational CRM provides support to ___________ business processes. front office

Collaborative ______ ultimate goal is to use information collected by all CRM's


257
departments to improve the quality of services provided by the company.

258 Tally.ERP 9 follows the DES __________ method to safeguard the data. encryption
Immediate posting and updation of books of accounts as soon as the Real Time Processing
259
transactions are entered. This is called as __________
Form 26, Annexure to 26,Form 27,
260 Which of the following ETDS forms are available in Tally.ERP 9? Annexure to 27,Form 26Q, Annexure
to 26Q
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's File Validation Utility
261
freely downloadable utility called __________________
With ______________ technology the characters are reduced in breadth
262 and user is allowed to input additional characters which would make the Tally Fit
account name, entity complete and readable.
In Tally.ERP 9 __________________ provides the user with administrator
263 rights and the capability to check the entries made by the authorised users Audit Feature
and alter these entries, if necessary.
__________________ is an enabling framework which establishes a
264 connection through which the remote user can access the Client's data Tally.NET
without copying/transferring the data.
If we want the company to be connected automatically for remote access Contact On Load
265
on load, the property __________ needs to be set it as Yes.
266 _______ is centralized Banking Application Software. Core Banking Solution
_________has several components which have been designed to meet CBS
267
the demands of the banking industry.
Core Banking Solutions is a combination of an application software and
268 Network devices
________
______ is a large data housing infrastructure that provides high band width Data Centre
269
access to its clients.
Application servers,Data Base
270 Data centre servers are known as_____________. Servers,Web server
________ is a method of creating virtual networks within a physical VLAN
271
network.
Data communication between ______ VLANs can be controlled as per 2
272
business requirements.
273 Bank mate is developed by the _______ HCL Technologies
CBS Software resides in a Central application server which is located in Central Office Data Centre.
274
the ___________
A________ that runs the core banking solutions (CBS) and is centrally Central Application Server
275
accessed by the branches.
The _________of the application is capable of only entering the data at Client version
276
the end point that is branches.
The application server would be placed in a trusted inside zone in a Virtual Local Area Network
277
separate ____________
278 Application software would access the ________ Data base server
__________ are capable of being connected only when devices are Virtual Networks
279
connected to a switch.
A special feature of STP is that _____________ number for any outbound Uniform Transaction Reference
280
RTGS transaction is generated by the STP System.
_____________refers to the process of developing software which would
281 produce the required output from the input provided of course, using the System Development
necessary hardware and communication systems.
The______________is essential to ensure that computer security records Log management
282
are stored in sufficient detail for appropriate period of time.
Which of the following is “False“ in case of penetration testing in an IT Ensure recoverability of data in case
283 of system failure.
environment of CBS?
It is important that correct latest
Which of the following is erroneous statement in case of Change version of programe is used but
284
Management Control? version number need not be changed.

With respect to the customer changing the Pin at the ATM which procedure Old offset value used to derive new
285 PIN.
is the ”false“ procedure?
IN CBS, changes to the application server are not made directly to it, Test Server
286
instead done first on a __________
All the various servers in the central data centre are seggregated through VLANs
287
_______

The __________ is a complete process in the computer so that it ensures Validation


288
that data that is fed in conforms to certain prerequisite conditions.

When the central Data base is busy with central end of day activities or for
289 any other reason, the file containing the account balance of the customer Positive Balance File
is sent to the ATM switch. Such a file is called __________
290 The IBDS is located in a ____________ demilitarised zone
291 The main components of Internet Banking system consist of __________ Web server,IBAS,IBDS
Copy of the Anti Virus Software was updated promptly and regularly at the
292 Data Centre and pushed into all of the servers and in all the systems in the Push-pull method
branches by ________
The __________which is also residing in the server at the branch actually Application Sofware
293
does the banking operations.
In Core Banking concept all the systems of the bank are connected to the
294 Central office by means of a connectivity which may be either a Leased line
_________ or a dial up line.
The ________ is generated by the software and directly sent to equipment Personal Identification Number
295
for printed the Pin Mailer.
____________would also include the existence of built in controls in the
296 system to ensure proper processing of input data so as to provide the Process Control
required output.
____________refers to an arrangement wherein the issuing bank acts on Letter of Credit
297
the request and instructions of a customer.
_______________ is a process by which the bank ensures the Business Continuity Planning
298
maintenance and recovery of operations.
299 At which phase of testing the version of software is called “ beta version”? Programmer testing,User testing

In an Organization structure of IT Department which of the following Network administrator and Database
300 Administrator.
function is incompatible?
The number that is stored in the ATM switch is the difference of which of Pin No - Natural Pin
301
the following number?
The information retrieval of transactions taking place at ATM located at Sof copy of Electronic journal
302
remote locations is through _________
The number that is generated as soon as the customer inserts the card in Natural Pin
303
the ATM machine is __________
304 Which is not a Database management system. Unix
305 The _________ operator is used to find the null records in a table. IS NULL
When you create relationship between two tables, the Common field's data Same data type
306
type should be
307 SQL stands for____________________. Structured Query Language
MS Acces 2010 reads and writes to the .accdb file format in chunks also Pages
308
known as_____________.
309 DDL stands for ____________ Data Definition Language
310 DML stands for _____________ Data Manipulation Language
311 Whenever a tables gets update, the dependent query will update automatically
To extract the records based on date field, which of the symbol should be #
312
used
313 The data can be entered into a table in the ____________ view. Datasheet
314 In a Query the data can be sorted based Single column,Multiple columns
When you create a field using text data type in MS Access 2010, by 255
315
default field will have ____ character.
If we are using the same table for main query and sub-query,we need to Alternate names to the tables,Aliases
316 name to the tables
provide___________.
317 Update Query can be used to update_________ in MS Access 2010. Single Record,More than 1 record
318 Delete Query can be used to delete Single Record,More than 1 record
319 How many Primary key constraints can create in a table______. Only one
Unmatched Query can help to find records that have no corresponding TRUE
320
reord in other tables.
MS Access 2010 provides queries that can be used for obtaining the Sum(),Count(),Avg()
321
aggregated results instead of individual records are____________.
A function that Counts the set of values that satisfy the given criteria in MS Count()
322
Access 2010 is___________.
323 Aggreagate Query also known as___________. Group By queries,Total query
324 Which Query wizard is used to find repeated records in a table? Duplicate Query Wizard
325 Append Query is used to ______________ in a table in MS Access. Add Records
How does a query-based report differ in design to a report based on just It doesn’t
326
one table?
Use the Mailing label wizard text
327 How would you include some plain text into a mailing label report? option.
In a Microsoft Access 2010 report, the page numbering would most likely Page Footer
328
be placed into the:
If you wished to present a professionally looking form on screen that would All The tools of the form design
329 show all the necessary information, which of the following form design control gallery.
tools would you most likely use?

Reduces the size of the


database,Optimizes memory usage
What are the benefits of an ACCDE file__________________________ in and improves performance.,Protects
330
Access the VBA code from being viewed or
edited while still allowing it to run.

331 An .ACCDE file is a ___________ version of the original .ACCDB file. Locked-down
Which type of the query is used to accept the value from the user while Parameter Query
332
executing the query and fetch records accordingly
To encrypt the databse in Access 2010 must be opened in the Open Exclusive mode
333
__________________.
334 FIX() is a kind of ____ function in MS-Access 2010. Math
MS-Access 2010 has added new features of ______ to eliminate the need
335 Macro
of VBA code
Encrypting a database does not restrict access to database objects, but to Open
336
__________ the database.
File Tab ->Access Options, and
The setting for the Security option can be handled selecting the Trust Centre tab from
337
using_______________________ in Access 2010. the Access Option window
Third Party Encryption Technology can also be applied to the database of TRUE
338
Microsoft Access 2010.
339 To create a split database in MS Access 2010 go to which tab? Database Tools
340 After spliting database,frontend database holds_________________. Forms,Query,Report
341 After spliting database,backend database holds_________________. Tables
When an Access database is split, it creates two A back-end database & front-end
342 database
files_________________.
A Data Access Page is a special type of _________ that allows users to Web page
343
interface with database using Internet Explorer.
MS Access provide__________ datatype to create link to a web Hyperlink
344
page,file,or email address.
Set as Switchboard startup Option in
345 To make a switchboard appear while opening the database. Access Option
To add or delete buttons to Switchboard, which option is used in Edit Option
346
Switchboard Manager is used.
The Switchboard Manager is a dialog box that allows creating a TRUE
347
switchboard for an Access database.
348 A macro can automate data entry in Access 2010. TRUE
349 Which of the following data-type is not available in MS-ACCESS AlphaNumeric
350 The validation can be defined at____________ level in Access 2010 Table,Form
A macro can be attached to an event of a A form,A report,A button
351
control_________________________.

Click->File tab->Option Button->Quick


Access Toolbar->Command not in
352 How to add switchboard in Access 2010? Ribbon->Switchboard Manager->Add-
>OK
The command Design Application performed action____________ on Opens the Switchboard Manager.
353
switchboard.
Switchboard Manager only allows a maximum of __________command Eight
354
buttons on a switchboard
MS Access 2010 provides a __________pane that contained large list of
355 actions to be chosen,enabling a wide range of commands that can be Action Catalog
performed
356 SQL is considered to be a __________ 4GL
Which action in MS Access macro applies a fliter or query to a table,form ApplyFilter
357
or report.
Opens a query in the Datasheet view, Design view, or Print Preview which OpenQuery
358
macro action used in MS Access.
Among +, <>, MOD, AND, <= operator which operator has the highest MOD
359
priority.
360 The Strcomp() function is a__________type function. Text
361 The SGN() function is a ____________ type function Math
362 Which of the following symbol is used to write a sub query ()
For the Non-Aggregate Total field, the criteria can only be specified using TRUE
363
the Where clause.
To export an access table to an XML File, which of the below steps must Right-click the table and select Export
364 ->XML
be followed?
Text files that are organized properly fall into one of two types Delimited files,Fixed-width files
365
are__________
To create an unmatched Query using wizard, minimum required number of two
366
table or fields is_________.
Only one,More than One Field,As
367 While creating the query, the criteria can be set in many field
In MS Access query which logical operator returns True if both the AND
368
expressions compared are true.
In MS Access query which logical operator returns True if either of the OR
369
expressions compared are true.
370 Enfore Referencial Integrity option is used to restrict enerting data in Child Table
371 In MS Access left("Access",3) function will return__________. Acc
Which function is used to converts the text to lower case in MS Access Lcase()
372
2010.
Which function is used to remove leading or trailing spaces in a text in MS Trim()
373
Access 2010.
_____________ is contains a set of predefined functions in MS Acccess Expression Builder
374
and helps build complex expression.
375 Which of the following is a Database Software Oracle
Each column has a specific range of
376 Which of the following is not the characteristics of a Relational Table? values known as the Tuple domain

377 Which record will be retrieved if the query criteria is < #1/1/11#? Records with date before 2011
The tab in Expression Builder in which we write expressions is known as Expression Box
378
_____________.
379 The criteria expression LIKE?B*. Will match all text starting from B
__________ queries are useful for summarizing information, and are Crosstab query
380
somewhat similar to pivot tables in MS-Excel.
While entering record in Datasheet view, in which order the records can be At the end of the table
381
entered
382 When you delete the record in form, it deletes the record from__________. Form & Table

383 Having clause is used in the aggregate query in MS Access 2010 TRUE
The controls that are not linked to any field of the table or query on the Unbounded Controls
384
form are known as ________.
Which property of the form can be used to insert a background image in Picture
385
MS Access 2010?
___________ is a report that is inserted in another report in MS Access Inside-Report
386
2010.
A bound main report is based on a ______________ and its Table or query,Sub-Report
387
_____________ contain realted information.
A___________used to compare multiple values of categories or
388 Column Chart
differences over a period of time.
389 A________used to compare trends over a period of time. Line Chart
To create a read-only copy of the database, which of the following file .ACCDE
390
format can be used?
The database administrator created a split database and created a front-
391 end database and back-end database file.Which of the file should be Back-end database
stored on the server ?
To make database package and digitally sign using which option in Access File->Save&Publish->Save Database
392 as->Package and sign
2010 ?
In which formats can the Collect Data through email message feature can HTML and InfoPath
393
send the data entry form?
Once a mail is sent using the collect data through email message feature
394 in Access 2010. The mail status can be checked Manage replies
using________________.
The ___________ type of data cannot be collected using Collect data AutoNumber
395
through email messages.
396 What is the memo data type field used for? For long text entries
Those records that match an entity in
397 The filter By selection feature allows you to filter: a field
398 Which editor was provided for use with Access Basic? Notepad
Click the report, and on the Pivot
How do you update Pivot Table report data after changes are made to the Table toolbar, click the refresh data
399
source data? button

Datasheet View,Design View,Pivote


400 What are the different views to display a Table ? Table & Pivot Chart View

Which Of The Following Creates A Drop Down List Of Values To Choose Lookup Wizard
401
From?
A __________ Enables You To View Data From A Table Based On A Query
402
Specific Criterion
The Database Language That Allows You To Access Or Maintain Data In A DCL
403
Database
Authorizing Access And Other Control
404 DCL Provides Commands To Perform Actions Like Over Database
405 Which is not a Database Model ? Structureed Database Model
406 Which Of The Field Has Width 8 Bytes? Date/time
This Is The Stage In Database Design Where One Gathers And List All Data Definition
407
The Necessary Fields For The Database Project.
The Third Stage In Designing A Database Is When We Analyze Our Tables Relationship
408
More Closely And Create A ___________ Between Tables
What is the purpose of the Switchboard Manager in Microsoft Access To build a main switchboard form that
409 controls all other forms.
2010?
Identify an audit finding w.r.t.
410 Which of the following is a benefit of using CAATs? materiality in an IT environment
411 Is there a fixed qualification for internal auditor_________. FALSE
__________________ refers to use software/applications to automatically
perform tasks such as accounting,preparing trial balance, financial Office automation
412
statements etc. and electronically transmit data or information using
internet..
________,___________,__________ are commonly referred to as CIA in Confidentiality,Integrity and
413 Availability
information security parlance.
_____________means information available in the organization should not Integrity
414
be altered or modified by unauthorized personnel.
The process of identifying an individual, usually based on user id and Authentication
415
password in an organization is called______________.
Which of the following is not a software equipment required in a CA's None of the Above
416
office?
417 Which of the following is not an application arranged by ICAI? ICAI-TOC
418 How many stages are there in the sales cycle? 3
419 PBX stands for ________ Private Branch exchange
420 Which of the following will not appear in the home page of K-Doc? Paste Document
To change an email header so that the message appears to have
421 originated from someone or somewhere other than the actual source is Email Spoofing.
known as___________.
422 To playfully satirize a website is known as_____________. Web spoofing
_________is the complete package to manage the billing requirements of Billing and Accounting sofware
423
a CA firm on cash system of accounting.
424 Which of the following is not a/an feature of eSecretary? Share certificate printing
425 Annual return preparation can be done using ________. ICAI-ROC application
________is correspondence automation & management software that is eSecretary
426
seamlessly integrated with Microsoft Office.

________ is an independent,objective assurance and consulting activity Internal auditiing


427
designed to add value and improve an organization's operations.

Financial reporting,Operations of the


428 Which of the following is/are the main purpose of the internal audit? organization
As per _____________of the Income tax Act,every person carrying on
429 business or profession is requires to get his accounts audited by a CA Section 44AB
before the "specified date".

430 FEMA Stands for _______________. Foreign Exchange Managament Act

Which application helps the management to allocate the revenue to the Client management
431
credit of the right employee who identified the opportunity?
432 Who has full privileges in the financial accounting application? System administrator
_________is the centre point of the financial accounting application as any
433 transactions having financial impact carried out in any other module will GL module
reflect in this module.
In Financial Accounting Application,the transactions flow from GL (General FALSE
434
ledger) to other modules.
Which of the functionalities is not provided in the purchasing module of Comparison with budgets
435
Financial Accounting Application.
In Financial Accounting Application,automatic sequence number of Expense Management
436
documents control is not required in which of the following module?
Which module of Financial Accounting Application can be used for Sales
437
assigning credit limit to customers?
438 Which of these will trigger/alert for timely payment ? Expense Management
We can manage interviews,offers and job vacancies by using which of the HR and Payroll applications
439
application?
___________provides information about updation of project cost based on Timesheet application
440
time spent by employees on various projects.
Employee designation and reporting
441 Which of the follwing is not a/an functionality provided by PMS? structure
___________automates the calculation of salary for taking inputs from the
442 timesheet application, leaves from Leave Management System and salary Payroll System
details from the HR master data.
443 Which of the follwing is not a control in Leave Management System? Error free capture of leave details
444 Permanent Audit File are obtained once but updated on __________basis. yearly

Copies of clients’ incorporation


445 In Permanent Audit file, _______ is not the key data documented. documents like MoC

Role based access,Complete audit


446 The Document Management Sytem offers the features___________. trail,Cost effective to maintain the
documents in sof copy

________is a type of training in which user logon on the training server E-Learning
447
with a user ID and password.
In some cases, trainee is supposed to appear for the examination/test at E-Learning
448
the end of the training is____________.
449 ________ are the hardware/infrastructure equipments used in a CA firm. PC,Application Server,WAN

450 Which of these is/are the standard email program used in an organization? Microsof Exchange,Lotus Notes

Compared to LAN, its transmission


451 Which of the following is not a characteristics of WAN? speed is low
_________is protection of information assets from threats to preserve their Information Security
452
value.

453 Which types of information assets need to be secured in a CA Office? Client data,Own data,Own documents

The extent and level of _________ would depend on the nature of Confidentiality
454
information.
__________ of information might be affected due to denial of service Availability
455
attack or some other reasons.
__________means the sender cannot deny having sent a message and Non-Repudiation
456
receiver cannot deny receiving the message.
457 Risk may not be _______ in nature. vulnerable
Items of audit interest,Data
458 Which of the following are categories of computer audit function ? Analysis,System validation
459 In the following list which is not an audit function ? Export
460 In the following list which is a audit function? Stratification
Review Programming
Which is the following step involved in a source code review standards,Understand program
461 specifications,Formulate flaw
methodology ?
hypotheses
In which sampling,selecting sampling units using a fixed interval between Systematic
462
selections is_______________.
Ensures that all combinations of sampling units in the population have an Random
463
equal chance of selection is____________.
In Audit tool, to built relation between two tables, both table should Common Field
464
have_____________.
465 Input Control method is a part of Application Control Group. TRUE
Which is the following type of check that can be run when data is input Field check
466
through terminal ?
Which is the following is the correct types of Field checks on processed Overflow,Range,Sign Test
467
data ?
Which is the following is the correct types of Record checks on input Resonableness
468
data ?
469 Which is the correct types of Batch Checks ? Control Totals
Data Integrity,Controls are required
470 Which is the need for table level tests ? for authorization

This may make the entire child tables


referenced by the master field in the
471 Which is the following is the major points with respect to inter table tests ? main table un-available,Their Master
& Child relationship reference the
table from one another

Which is the software used by the auditor to take a view of a file of data or Snapshots
472
transaction passing through the system at a particular point of time ?

Which is the software used by the auditor to compare the source version Souce comparison
473
of a program with a secure master copy ?
Which is the techniques whereby the auditor arranges or manipulates data
474 either real or fictitious, in order to see that a specific program or screen On-line Testing
edit test is doing its work ?
Which is the software used by the auditor to list un-used program Mapping
475
instruction ?
Which is the software used by auditor to read and analyze records of Log Analyzers Sofware
476
machine activity ?
Lack of Visible Transaction
477 Which of the following reason strongly call for Control & Audit Function ? Trail,Absence of Input Document
478 Which is the correct types of Field checks on input data ? Both type
To ensure the input data is valid
479 Which is the major points to be consider with respect to System tests ? before entering the value
In Data analysis techniques, which law is used to idenfity statistical report Benford Law
480
on numeric data ?
481 Which is not a feature of File reorganization with an auditor perspective? Filtering

Identify data, which are not in


482 What do you understand by the term, “Data Consistency” in using CAATs? agreement with the regular format.

Functions involving use of arithmetic operators, which enable performing Arithmetic function
483
re-computations and re-performance of results is an example of?

S-ar putea să vă placă și