Sie sind auf Seite 1von 76

Download From http http://ca

S. No
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22

23
24

25
26
27
28
29
30
31

32
33
34
35

36
37
38
39
40
41
42
43
44
45
46

47
48
49
50
51

52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68

69

70
71
72

73
74
75
76
77

78
79
80
81
82
83

84

85
86
87

88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114

115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137

138
139
140
141
142
143
144
145
146
147
148
149
150

151
152
153
154
155
156

157
158

159
160
161
162
163

164
165
166
167

168
169
170
171
172
173

174
175
176
177
178
179
180

181
182
183
184
185
186
187
188

189
190
191
192
193
194
195
196
197
198
199
200
201
202

203
204
205
206
207
208
209

210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226

227
228
229
230
231
232
233
234

235
236
237
238
239

240

241

242
243
244
245

246

247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265

266

267
268
269

270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301

302
303
304
305
306
307
308
309
310
311
312
313
314

315
316
317
318

319
320
321
322
323
324
325
326
327
328
329

330
331
332

333
334
335
336

337
338
339
340
341
342
343
344
345
346
347
348
349
350

351
352
353
354
355
356

357
358

359
360
361
362
363
364
365
366
367
368
369
370
371

372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404

405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432

433
434
435
436
437
438
439
440

441

442
443
444
445
446

Download From http http://caknowl


Questions
In IDEA, Statistics functions can be applied on_________.
In IDEA, increment value in Stratification function can be fixed or free interval.
In IDEA, Stratified Random functions is a part of which menu.
Which of the following is not an Audit Software
Using which functions to perform more complex calculations and exception testing in IDEA?
Which of the following are categories of computer audit function ?
In the following list which is a audit function?
Which is the following step involved in a source code review methodology ?
In IDEA which functions should be used to find repeated values ?
In IDEA, Stratification functions can be applied on which type of data ?
In IDEA,Summarization accumulates the values of Numeric fields for each____________.

In which sampling,selecting sampling units using a fixed interval between selections is_________

Ensures that all combinations of sampling units in the population have an equal chance of selectio
Input Control method is a part of Application Control Group.
Which is the following type of check that can be run when data is input through terminal ?

In _______system money transfers are done on a one to one basis while in _______system transfe
All the money transfers take place in the books of the _________________
________system of money transfer is primarily used for large transactions.
In RTGS, the STP generates an ___________for every outbound RTGS transaction.
STP stands for ________________________________ in terms of CBS.
________ is a method of creating virtual networks within a physical network.
CMS stands for ______________________________ in terms of CBS.

Which of the following statements is true?


The Management Controls does not include ___________

_______is supported by advanced technology infrastructure and has high standards of business fu
CBS Software resides in a Central application server which is located in the ___________

A________ that runs the core banking solutions (CBS) and is centrally accessed by the branches

The _________of the application is capable of only entering the data at the end point that is branc
The application server would be placed in a trusted inside zone in a separate ____________
Application software would access the ________
__________ are capable of being connected only when devices are connected to a switch.

_____________refers to the process of developing software which would produce the required ou
course, using the necessary hardware and communication systems.

The______________is essential to ensure that computer security records are stored in sufficient d
All the various servers in the central data centre are seggregated through _______

The __________ is a complete process in the computer so that it ensures that data that is fed in co
conditions.

When the central Data base is busy with central end of day activities or for any other reason, the f
the customer is sent to the ATM switch. Such a file is called __________
The IBDS is located in a ____________
The main components of Internet Banking system consist of __________

Copy of the Anti Virus Software was updated promptly and regularly at the Data Centre and push
systems in the branches by ________

The __________which is also residing in the server at the branch actually does the banking opera

In Core Banking concept all the systems of the bank are connected to the Central office by means
a _________ or a dial up line.

The ________ is generated by the software and directly sent to equipment for printed the Pin Mai

____________would also include the existence of built in controls in the system to ensure proper
provide the required output.

____________refers to an arrangement wherein the issuing bank acts on the request and instructio

_______________ is a process by which the bank ensures the maintenance and recovery of opera
At which phase of testing the version of software is called beta version?

Finacle developed by _________


The number that is stored in the ATM switch is the difference of which of the following number?

The information retrieval of transactions taking place at ATM located at remote locations is throug

The number that is generated as soon as the customer inserts the card in the ATM machine is ____
The tab in Expression Builder in which we write expressions is known as _____________.

The criteria expression LIKE?B*.

__________ queries are useful for summarizing information, and are somewhat similar to pivot ta
While entering record in Datasheet view, in which order the records can be entered
When you delete the record in form, it deletes the record from__________.
Having clause is used in the aggregate query in MS Access 2010

The controls that are not linked to any field of the table or query on the form are known as _____
Which property of the form can be used to insert a background image in MS Access 2010?
___________ is a report that is inserted in another report in MS Access 2010.

A bound main report is based on a ______________ and its _____________ contain realted infor
DDL stands for ____________

A___________used to compare multiple values of categories or differences over a period of time


A________used to compare trends over a period of time.
To create a read-only copy of the database, which of the following file format can be used?

The database administrator created a split database and created a front-end database and back-end
be stored on the server ?

In which formats can the Collect Data through email message feature can send the data entry form

Once a mail is sent using the collect data through email message feature in Access 2010. The mail
using________________.
The ___________ type of data cannot be collected using Collect data through email messages.

What is the memo data type field used for?

The filter By selection feature allows you to filter:


DML stands for _____________
Which editor was provided for use with Access Basic?

How do you update Pivot Table report data after changes are made to the source data?
What are the different views to display a Table ?
Which Of The Following Creates A Drop Down List Of Values To Choose From?
A __________ Enables You To View Data From A Table Based On A Specific Criterion
The Database Language That Allows You To Access Or Maintain Data In A Database

DCL Provides Commands To Perform Actions Like


Which is not a Database Model ?
Which Of The Field Has Width 8 Bytes?

This Is The Stage In Database Design Where One Gathers And List All The Necessary Fields For
Whenever a tables gets update, the dependent query will

The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Cre

What is the purpose of the Switchboard Manager in Microsoft Access 2010?

How does a query-based report differ in design to a report based on just one table?
How would you include some plain text into a mailing label report?
In a Microsoft Access 2010 report, the page numbering would most likely be placed into the:

If you wished to present a professionally looking form on screen that would show all the necessar
form design tools would you most likely use?
An .ACCDE file is a ___________ version of the original .ACCDB file.

Which type of the query is used to accept the value from the user while executing the query and f
To encrypt the databse in Access 2010 must be opened in the __________________.
To extract the records based on date field, which of the symbol should be used
FIX() is a kind of ____ function in MS-Access 2010.
MS-Access 2010 has added new features of ______ to eliminate the need of VBA code

Encrypting a database does not restrict access to database objects, but to __________ the database

Third Party Encryption Technology can also be applied to the database of Microsoft Access 2010.
To create a split database in MS Access 2010 go to which tab?
After spliting database,frontend database holds_________________.
After spliting database,backend database holds_________________.
When an Access database is split, it creates two files_________________.

A Data Access Page is a special type of _________ that allows users to interface with database us
OLAP systems use concept of OLAP cube called a ______________ cube
The data which is to be exported from Tally.ERP 9 can be in ________ format.
In Tally ERP-9 Remote Access is also known as __________.
Accessing data store on a remote location using Internet in Tally.ERP9 is called____________.
Tally.ERP9 can be classified user in two categories are___________.
Which of the following is not a predefined security level provided by Tally.ERP 9?

The business model is represented in the graphical form using ______________ and __________
_______ integrates supply and demand mangement within and across companies.
OLAP stands for _________________.
__________ includes transportation from Suppliers and receiving inventory.
Which of the following is not the service area of SCM?

Which step of the ERP implementation involves, educating and recruiting end users throughtout t

The system ____________ process will address issues such as software configuration, hardware a

A __________________ review is recommended to ensure that all business objectives established


achieved.

In _________________ stages, auditors have access to rudimentary ERP tools and capabilities fo

Immediate posting and updation of books of accounts as soon as the transactions are entered. Thi
Which of the following ETDS forms are available in Tally.ERP 9?
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable
ERP systems provide an access to the__________ data

________________ is a tool that refers to skills, processes, technologies, applications and practic
quicker decision making.
Business intelligence systems are ________ Decision Support Systems.
Data warehousing technology is the process of creating and utilizing the companys __________
The data in the Warehouse comes from the _________ environment and external sources.
In essence, SCM integrates ___________ management within and across companies.
_____________ including all fulfillment activities, warehousing and transportation to customers.
Customer Relationship Management is a ________________ level strategy.
Operational CRM provides support to ___________ business processes.
Collaborative ______ ultimate goal is to use information collected by all departments to improve
company.
Tally.ERP 9 follows the DES __________ method to safeguard the data.

Immediate posting and updation of books of accounts as soon as the transactions are entered. Thi
Business Intelligence Systems are data-driven ___________________.
Which of the following ETDS forms are available in Tally.ERP 9?
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable

With ______________ technology the characters are reduced in breadth and user is allowed to inp
make the account name, entity complete and readable.

In Tally.ERP 9 __________________ provides the user with administrator rights and the capabili
authorised users and alter these entries, if necessary.

__________________ is an enabling framework which establishes a connection through which th


data without copying/transferring the data.

If we want the company to be connected automatically for remote access on load, the property __

___________________ technology is the process of creating and utilizing the company's historic
Is there a fixed qualification for internal auditor_________.
Which of the following will not appear in the home page of K-Doc?

To change an email header so that the message appears to have originated from someone or somew
known as___________.
To playfully satirize a website is known as_____________.

_________is the complete package to manage the billing requirements of a CA firm on cash syste
Which of the following is not a/an feature of eSecretary?
Annual return preparation can be done using ________.

________is correspondence automation & management software that is seamlessly integrated wit

________ is an independent,objective assurance and consulting activity designed to add value and
Which of the following is/are the main purpose of the internal audit?

As per _____________of the Income tax Act,every person carrying on business or profession is r
CA before the "specified date".

__________________ refers to use software/applications to automatically perform tasks such as a


financial statements etc. and electronically transmit data or information using internet..
FEMA Stands for _______________.

Which application helps the management to allocate the revenue to the credit of the right employe
Who has full privileges in the financial accounting application?

_________is the centre point of the financial accounting application as any transactions having fi
module will reflect in this module.

In Financial Accounting Application,the transactions flow from GL (General ledger) to other mod

Which of the functionalities is not provided in the purchasing module of Financial Accounting Ap

In Financial Accounting Application,automatic sequence number of documents control is not requ


module?

Which module of Financial Accounting Application can be used for assigning credit limit to cust
Which of these will trigger/alert for timely payment ?
We can manage interviews,offers and job vacancies by using which of the application?

________,___________,__________ are commonly referred to as CIA in information security pa

___________provides information about updation of project cost based on time spent by employe

Which of the follwing is not a/an functionality provided by PMS?

___________automates the calculation of salary for taking inputs from the timesheet application,
System and salary details from the HR master data.
Which of the follwing is not a control in Leave Management System?
Permanent Audit File are obtained once but updated on __________basis.

In Permanent Audit file, _______ is not the key data documented.

________is a type of training in which user logon on the training server with a user ID and passw

In some cases, trainee is supposed to appear for the examination/test at the end of the training is__
________ are the hardware/infrastructure equipments used in a CA firm.

_____________means information available in the organization should not be altered or modified


Which of these is/are the standard email program used in an organization?

Which of the following is not a characteristics of WAN?


_________is protection of information assets from threats to preserve their value.
Which types of information assets need to be secured in a CA Office?
The extent and level of _________ would depend on the nature of information.

__________ of information might be affected due to denial of service attack or some other reason

__________means the sender cannot deny having sent a message and receiver cannot deny receiv
Risk may not be _______ in nature.

The process of identifying an individual, usually based on user id and password in an organization
Which of the following is not a software equipment required in a CA's office?
Which of the following is not an application arranged by ICAI?
PBX stands for ________

________ is the process of meeting the financial goals through the proper management of finance

___________ can be defined as the process of setting the procedures in the organization for achie

________ shows ability of company to pay back long term loans along with interest or other char
operations.

_____________________is the simplest method of comparing different stocks at a point of time t

The very first line of code of XML file is_____________.


Every bit of data has to start and end with an identical tag
Deletion of XML Map is done through __________.
Excel works primarily with ________ types of XML files.
Method of tax calculations shall change according to _________.

________ is a process used in statistical analysis in which a predetermined number of observation


population.
In __________, Individuals are selected at regular intervals from a list of the whole population.

In ______________ each individual is chosen entirely by chance and each member of the popula
probability, of being selected.
Which method is commonly used in social sciences when investigating hard to reach groups?

__________ are useful for quick reading and easy understanding, particularly for top managemen
Popular methods of capital budgeting include _________ and payback period.
_________ is the value of all future cash inflows less future cash outflows as on today.

___________is the process of defining and analyzing the dangers to individuals, businesses and g
natural and human-caused adverse events.
__________ which is used more often, does not involve numerical probabilities or predictions of

________ are generally used to present information in a simple and better way and also be used to

It is a technique used to determine how different values of an independent variable will impact a p
given set of assumptions.
_______ involves computing different reinvestment rates for expected returns that are reinvested
Which function that is used to calculate the payment for specific loan terms ____________
________helps to break down the Return on Equity
_______ is a common method for financing property, facilities, and equipment.
Which option can be used to split windows into four in ms excel 2010?

How to restrict the values of a cell so that only a list can be entered in a cell?
What does the COUNTA() function do in MS Excel 2010 ?

If the value in A1 is "ITT" and in B1 is "ICAI ", which function in Excel will return " ITT @ ICA
Which of the following function will return a value of 7?

A tiny chart embedded in a worksheet cell that provides a visual representation of data is a _____

_________is a graphical equivalent of a pivot table, which is used to visualise PivotTable report s
To frequently print a specific range of cells on a worksheet , the option used is
Non-excel files can be opened in MS Excel using the
_____is a text concatenation operator.
Which of the following is correct?
___ function in MS-Excel returns the remainder after number is divided by divisor.
EXCEL Work in ________ Mode
In Ms-Excel 2010, ______ is Last Column Name?
In Excel 2010, the default criteria setting for AutoFilter in each field is __________.
Subtotal option is in __________ group of Data tab in Excel 2010.

Which of the following cannot store connection information of an external data source in Excel 2
The default pivot chart type in Excel 2010 is a ________ chart.

To consolidate Excel data, ________________________ is used when worksheet data does not ha
In Excel 2010, the __________ function is used to generate a forecast.

______function calculates the payment for a loan (installment) based on constant payments and a
__________ are easy-to-use filtering components that enable the user to quickly filter the data in
In Excel 2010, range C3:C6 indicates _______________.
Keyboard shortcut to show a shortcut menu in MS Excel 2010 is _______________.
To select multiple non-adjacent cells in an Excel 2010 worksheet, click them holding _________

A quick way to return to a specific area of a worksheet in Excel 2010 is to type the cell address or

In MS-Excel 2010, the Name Box shows the ________________________.

In Excel 2010, what is represented by the small black square in the lower-right corner of an active

Suppose we accidentally erased a record in an Excel worksheet. Which command can be used to r
Excel 2010 offers up to____________sort levels.

Which feature in Excel 2010 enables us to find the input values needed to achieve a goal or objec

The INT function________

Which of the following statements about scenarios is not true?

What is a scenario summary report?


What does Solver uses in its dialog box?
What term describes a feature that gives Excel enhanced capability?
What dialog box allows you to change a field name in a PivotTable?

Why are PivotTables considered interactive?

Identify the need for controls and auditing in a computerised environment.


Grand totals calculated for any code on a document in the batch are called..

Control that checks if correct sequence of commands and update parameters are passed from the a

With respect to data integrity control, when monetary transactions are processed against master fi
maintain a .

The system test that tests the top-level modules first and then the lower modules are simulated wi
interfaces is called .
Identify the audit technique that examines each transaction as it passes through the system.
The Core Image Comparison audit technique compares the.
The technique used by an auditor to list unused program instructions is..
The sample data created and used for the purpose of testing the application system is called.

The test data (dummy unit) implemented in the normal processing of the system over a period of t
The test data generated with correctness proof, data flow analysis and control flow analysis tools
The organisational, management, maintenance and access controls are categories of

When a real-time system is simulated to generate the same output as the real-time system, the tech
When an auditor expands the extent of substantive tests to determine the impact of defects on the
methodology is.
This is an important control in systems that use digital signatures for authentication purposes.
Selecting transactions based on a sampling rate is called . method.

The capability of the generalized audit software to read different data coding schemes, different re
structures is.
The audit software capability of frequency analysis is to.

The audit functions of attributes sampling, variables sampling, stratified sampling are included in
Identify the functional limitation of a generalized audit software that enables evidence collection
system after the fact.

The purpose-written audit programs are used for..


Picture of a transaction as it flows through the computer systems is called..
The application controls are .

Identify the type of audit when auditors are members of the systems development team.

Identify the field check - "If a set of values is defined, is the input data one of these defined value
The field check that conforms if data input for a field is in a particular format.

The field check on a processed data that fails if a field is not initialized to zero or errors occur dur

The validation checks applied to a field depending on its logical interrelationships with the other f
A group of records or transactions that are contiguous constitute ..

..is the type of batch check (group of records) for all input records of a particular type is
DB2 is an example of __________
____________is used to Modify/Change Data in Table
MS-Access is _________________
Which of the following is not a data type in MS-Access?
To make changes in MS-Access form should be opened in __________________
_______layout of a form displays one record at a time
In SQL, DML stands for _________
To see more than one record at a time in a form we use _______
The default query invoked by ms-access is
__________ software serves as the Intermediary between the user and the database
Distributed database have now come to know as a __________ database
DDL Stands for -.
In DBMS, view level data abstraction is known as __________
In DBMS, Normalization concept responsible for _______________
one 2 one, one 2 many and many 2 many Relationship exist in _________ model
Record is also known as ________ in a Relational data base
____________ is extention of ACCESS DATABASE
Default length of numeric data type is ____________
Default value option in field property use for ________
Value of Report Header exist on ___________ page of report
__________ is an action or set of actions that you can use to automate tasks
SQL is a _________ Language
Which one is the Second Level of Data Abstraction?
Memo data type store _________ number of characters.
__________ data type field can't be updated

A Record is also commonly called as a _________


Most database operations that we do manually can be automated by using
_________ are what we use to summarize and present data in the table
A database tabel is similar in appearance to a _______
SQL is considered to be a _______
SQL is considered to as an ideal Language for _______
DBMS that supports a database located at a single site is called a _____
DBMS that supports a database distributed across several different site is called a _____
The _________key does not accept Duplicate and Null values in Field.
______ is often implemented as an array of records
In MS-Access 2010,the ________ control in the form lets the user insert a picture into it.

Which query should be used to retrieve the following information from table of databases "Which
a month?"
Queries in MS-Access 2010 can be used as ________________________.

What is a form in MS-Access?


Which of the following degree of relationship cannot be applied in MS-Access 2010?
In an ER model, a/an ___________ is any object, place, person, event or concept about which an
The process of arranging data in a logical sequence is called ____________.

If some chunk of data is stored at two places in a database, then ___________.


In MS-Access, what data type can be used for a phone number field in a database?
E-R Diagram is ________________ Model.
Which of the following can be a primary key in an employee database?
Which of the following is a Database Management System?
Which of the following is not a data type in MS-Access 2010?
Which of the following is a New data type in MS-Access 2010?

In MS-Access 2010, __________ queries are best suitable to summarize information and looking
Which of the following is not a section in Report Design view in MS-Access 2010?
Which of the following is not an action query in MS-Access 2010?
In MS-Access 2010, which data type is best suitable for storing the price of a commodity?

In MS-Access 2010, which of the following data type creates a field that allows the user to choos
list of values by using a list box or combo box?
In a table, _____________ uniquely identifies each record that is stored in the table.
_________ is used to insert values in Table directly.

DCL provides commands to perform actions like _________.

A database _______ presents summarized information retrieved from a table in a preformatted, at

In MS-Access 2010, which type of query extracts the data from one or more existing tables and p

In an MS-Access report, in which section we can keep the count[Sales] to calculate the total sales

What is the first step in creating a form or report using the Form Wizard or the Report Wizard in M
Which of the following is not an advantage of using a DBMS?
___________ provides in Access 2010 is used to convert database tables to the normalized form.
Which Ribbon command tab includes the Table Analyzer Wizard in MS Access 2010 ?
A Junction Table creates a _______________ relationship between two tables.

The Primary key of one table and the matching column in another table is known as ___________
In SQL, having clause is used for _________
To compact the database in MS Access 2010, the database must be opened in the ___________.

In MS Access 2010,_________ help protect a database from system failures and against mistakes
Improving the performance of a database in MS Access 2010 used______________ tool.

The _________ can be used to create reports on database objects for planning and modifying data
Use _____________ to grant or revoke permissions or to change the owner of database objects.

_____________ commands are used to enforce database security in a multiple user database envi
Which SQL clause is used to retrieve data from database?

The __________clause is used to filter records in database.


DCL(Data Control Language) used for
__________is Example of DBMS
What are the features of the Payroll Software provide by the ICAI.
Which are the transaction supported by the Billing and Accounting software ?

The software provide creating,printing and sending bulk individual mail is___________________

The feature Archive is available in K-DOC application for the purpose of____________.

Employee Information Portal feature in Payroll Application provide employee to view their_____

Which is not a feature of ICAI-ROC application ?


The Payroll application supports three methods of salary disbursement are________________.
Which Tools and Utilities is not supported by Payroll Application ?

The software provide the facility to generate bills,receipts,vouchers and clients outstanding etc is_

A software which provide the structured file management and knowledge mamnagement is______

The software provides a complete package to manage secretarial requirements & generates forms
The ICAI-ROC provides the facility to prepare________________.

The software which provide the Contact Management,Correspondence Management, simplified M


Correspondence feature of eSecretary application provide facilities are______________.
To create New Contact and access Contact features are available in which application ?

_____________________ is comprehensive package that combines Income Tax,Service Tax,e-TD

The financial transactions are to be . leading to different steps in Accounts Compilation


The methods LIFO, FIFO, Moving Average are used to .

The report prepared taking the asset and liability type accounts from the Trial Balance is called
The report that depicts operating profit/loss for a period is ..
The day book contains transactions relating to
The Bills Receivable details are maintained in a ..
Creditors ledger has details of your dues to ..
The sundry debtors are placed in the Balance sheet on the
The first step in Tally before any transaction is entered or saved is creating a
To configure country specific details use the function key
Identify the security mechanism used in Tally.
The basic document where transactions are entered chronologically is.
After selecting a company in Tally, you will be in the
Tally software is based on accounting system.

Identify the primary group of capital nature that uses bank account and cash in hand as sub group
All financial entries in Tally are done using.
The Direct expenses, Purchase account, Direct income are primary groups of ..
The option to delete a sub-group is admissible through the menu
The behavioural attributes of this group cannot be changed.
Credit limits for personal accounts and branches can be done in the ledger mode
We are not allowed to delete a ledger from this mode.
All account heads except Cash and Bank are placed in the
These are the basis for analysis by potential investors, banks etc.

Identify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank OC
The primary document for recording all financial transactions in Tally is the
You can customize the voucher entry screen using the function key.
Identify the voucher type that records fund transfers between cash and bank accounts.
This voucher type records adjustments between ledgers.
The use of classes for payment, receipt and contra vouchers enables data input in
The details of a voucher entry can be given in the .
The credit note voucher can hold account types: ..
The suffix and prefix details for the voucher type can be made applicable only from the .
The voucher used to record all bank and cash payments is ..
The accounts that the business owns is called .
Tally's age-wise analysis considers the voucher's

Arrange the steps in generating the books of accounts.


1. Create Trial balance
2. Create new ledgers
3. Generate Day Books
4. Update journals for financial transactions
For day-to-day transactions the voucher types used are

Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be entered into t

Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10 monitors by credi

Identify the voucher type to be chosen for the sale of computers to Anand by cash @ Rs.210000 p
A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher..
The financial statement that consolidates ledger balances is ..
The F9 function key in the left side of the Gateway of Tally screen displays the
The option on the Gateway of Tally that will generate the P&L account statement is..
The expenditure for running the business for a period is ..
This displays the balance daywise for a selected voucher type.
The feature in Tally to analyze accounts of a company is..
The age-wise statement is displayed based on
The ratio analysis of receivables can be done based on
Name the statement that helps the management in the decision making process.
Identify the budget type which is chosen where transaction amounts are to be monitored.
Choose the budget type to be used where bank accounts balances are to be monitored.

The management that needs to consolidate the accounts of its various enterprises uses . in Ta
Identify the user who can access audit trails in Tally.

Identify the accounting feature in tally that facilitates splitting financial years for a company data.
Identify the account type by the rule: "Debit the receiver and credit the giver".
The tracking of changes in vouchers and ledger masters is done by..
Tally can import data from other programs and creates a log about the activity in the file..
Import and export of data between Tally and other programs is possible with the help of..
The manual option of voucher numbering leads to..
The Tally audit trail tracks changes made to vouchers that are ..
The ratio analysis of Bills Receivables or Bills Payables can be displayed with the function key
The test data generated with correctness proof, data flow analysis and control flow analysis tools

When a real-time system is simulated to generate the same output as the real-time system, the tech
When an auditor expands the extent of substantive tests to determine the impact of defects on the
methodology is.
This is an important control in systems that use digital signatures for authentication purposes.
The first document where the transaction is entered is called a ..
Selecting transactions based on a sampling rate is called . method.

The capability of the generalized audit software to read different data coding schemes, different re
structures is.
The audit software capability of frequency analysis is to.

The audit functions of attributes sampling, variables sampling, stratified sampling are included in
Identify the functional limitation of a generalized audit software that enables evidence collection
system after the fact.

The purpose-written audit programs are used for..


Picture of a transaction as it flows through the computer systems is called..
Identify the type of audit when auditors are members of the systems development team.
The document used for posting of accounting transactions is ....
When the debit total is greater than credit total, the amount appears in the .. column.

estion at http://caknowledge.in/itt-question-bank-ca-students/
Option A
Numeric Data
FALSE
Analysis
ACL
Equation Editor
Items of audit interest
File Definition

Option B
Date Data
TRUE
Data
IDEA
function Editor
Data Analysis
Stratification

Review Programming
standards
Detection
Numeric Data
Primary Key

Understand program
specifications
Exclude
Date Data
Unique Key

Random

Systematic

Random
TRUE
Field check

Systematic
FALSE
Filter check

NEFT, RTGS
Beneficiary bank
NEFT
UTN

RTGS,NEFT
Central bank(RBI)
RTGS
UTE

Straight Through Processing Straight Temporary Processing


VLAN
LAN
Control Management System Cash Management System

Audit of internal controls is


not needed at all

Systems audit are important


for the verification of the
internal controls

Managing of Assets

Formulating a security policy

Firewall

Internet banking

ATM Data centre

Middleware

ATM Server

Central Application Server

System version
Virtual Local Area Network
Data base server
LAN

Application Version
Local Area Network
ATM DATA Server
Virtual Networks

Application Development

Software Development

Review Management
LANs

RTGS
VLANs

Consalidation

Password Policy

Positive Balance File


Militarised zone
Web server

Application Server
City Zone
IBAS

Hacking Method

Push-pull method

Sytem software

utility software

local line

Leased line

16 digit number

Personal Identification
Number

Output Control

Input control

Letter of Credit

Letter of Tax

Business Recovery Planning Business Continuity Planning


Programmer testing
User testing

Infosys
Pin No - offset value

HCL Technologies
Offset value - Pin No

Soft copy of Electronic


journal

Hard copy of Electronic


Journal

Offset value

Pin sent to customer

Expression Elements

Operator Button

Will match all text starting


from B

Will match all text ending


from B

Select query
Alphabetical Order
Form only
FALSE

Crosstab query
At the end of the table
Form but not in table
TRUE

ActiveX control
Caption
Inner-Report

Unbounded Controls
Background
Sub-Report

Table or query,Inner-Report

Table or query,Main-Report

Data Definition Language

Data Defined Language

Pie Chart
Pie Chart
.ACCDB

Area Chart
Line Chart
.ACCDE

Front-end database

Back-end database

HTML and InfoPath

Access Forms

Export to Outlook
Text

Options in Tool menu of


Access
Number

To add table

To store objects created in


other programs

Those records that match an


entity in a field

Records based on a criterion


you specify

Detailed Maintaining
Language
The Visual Basic 1.0 editor

Data Maintaining Language


Notepad

Select the Pivot Table


Save your changes, close the worksheet and press F9 on the
workbook, and then reopen it. keyboard
Datasheet View
Ole Object
Form
DCL

Design View
Hyperlink
Query
DML

Change The Structure Of


Tables

Insert, Update Or Delete


Records And Data Values

Network Database Model


Memo

Relational Database Model


Number

Data Definition

Data Refinement

Not update

update automatically

Relationship

Join

To build a main switchboard Creates the macros used to


form that controls all other
program an automatic
forms.
application.
The reports are restricted in
size.

It doesnt

Type the text directly into the


label.
Use the > button.
Report Footer
Section Header

Pivot Table
Fixed-down

Pivot Chart
Locked-down

Make Table Query


Open Secure mode
$
Math
Macro

Update Query
Open Inclusive mode
#
Date
Form

Open

Modify

TRUE
Create Tab
Forms
Tables

FALSE
External Tab
Query
Forms

A back-end database & front- A new database & Old


end database
database.
XML page
single dimensional
XML
Networking
Local Data
Local User
Owner

HTML Page
hyper dimensional
HTML
VB.Net
Remote Data
Remote User
Public User

charts, pictures
BPM

smart art, clip art


SCM

Online Analysis Processing


Inbound Operations
Logistics

Online Analytical Processing


Outbound Operations
Asset Management

Step 1

Step 2

implementation

upgradation

pre implementation

under process review

post implementation

pre implementation

Interactive Processing

Immediate Processing

Form 26, Annexure to 26

Form 27, Annexure to 27

File Validation Program


integrated

File Validation Utility


distributed

Data Warehousing
data-driven
general data
operational
supply and demand

Data Modeling
information driven
historical data
backup
supply and chain

Inbound operations
business
front office

outbound operations
corporate
back office

CRM's
encryption

ERP
decryption

Interactive Processing

Immediate Processing

Information Systems

Integrated Information
Systems

Form 26, Annexure to 26

Form 27, Annexure to 27

File Validation Program

File Validation Utility

Tally Fix

Tally Adjust

User-defined Security

HTTP-XML based data


interchange

Direct Web Browser Access

Web Publishing

Allow to Connect Company

Contact On Load

Data Warehousing
TRUE
Powerpoint

Data Modeling
FALSE
Word

Email middle attack.


Web tapping

Email Spoofing.
Web Interception

Payroll
Contact Management
ICAI-ROC application

eSecretary
Greeting Management
K-DOC application

K-DOC application

eSecretary

Statutory audit

Tax audit

Financial reporting

Operations of the organization

Section 45

Section 44AD

ERP

Office automation

Foreign Exports Management Financial Enterprise


Act
Management Act
Resource allocation and
scheduling

Knowledge management

Database administrator

Account administrator

AP module

GL module

TRUE

FALSE

Evaluation of Vendors

Receipts of goods or service

Purchasing

Accounts Payable

Purchasing
Accounts Payable

Sales
Accounts Receivable

Resource allocation and


scheduling

HR and Payroll applications

Confidentiality,Integrity and Confidentiality,Integrity and


Availability
Authentication
Performance management
system

HR management system

Capture the Key Performance Employee designation and


Indicators
reporting structure
Timesheet System

HR management System

Reduce administrative burden


on HR
Excess leave
half-yearly
yearly

Organization chart

Clients accounting manual

Internal Training

E-Learning

Classroom Training
PC

E-Learning
Application Server

Confidentiality
Microsoft Exchange

Integrity
Lotus Notes

Most WANs are owned by


only one organization.
Confidentiality
Client data
Availability

Compared to LAN, its


transmission speed is low
Integrity
Own data
Confidentiality

Integrity

Authentication

Non-Repudiation
reputational

Integrity
financial

Availability

Authentication

Resource allocation and


scheduling
ICAI-XBRL suite

Client management
K-DOC

Private Exchange Branch

Public Exchange Branch

Corporate planning

Monte Carlo simulation

Monte Carlo Simulation

Corporate Planning

Debt Assets Ratio

Interest Coverage Ratio

Earnings Per share

Fixed Asset Over ratio

<?xml version="3.0"
encoding="ISO-8859-1"?>

<?xml version="2.0"
encoding="ISO-8859-1"?>

<TagName>Data</TagName> </TagName>Data<TagName>
Directally Delete Command
3
Annual Income

Delete Button
2
DOB

Snowball sampling
Clustered sampling

Sampling
Sampling

Snowball sampling
Quota Sampling

Convenience sampling
Sampling

Balance sheet
discounted cash flow
Net present value

Summary reports
internal rate of return
Working capital

Sensitivity analysis

Risk analysis

Sensitivity analysis

Risk analysis

Graphs

Sparklines

Decision Tree analysis

Sensitivity analysis

Scenario analysis
SUMIF()
Du Point Analysis
Mortagage

Sensitivity analysis
PMT
Return on Investment
Leasing

Format -> Window

Window -> Split

Settings Tab under the Tab


Format -> Cells

Settings Tab under the tab


Data -> Validation

Counts cells having alphabets Counts empty cells


A1+ "@" + B1

A1 # "@" # B1

ROUNDUP(7.4999,0)

ROUNDDOWN(7.4999,0)

Bar Chart

Sparkline

Bar Chart

Pivot Chart

Pagelayout -> Page Setup ->


Print Area
Pagelayout -> Print Area
Add Ins
Developer Tab
#
$
AVERAGE(4,5,6,7)
MOD()
3
XWE
Top10
Sort & Filter

AVERAGE(A1,B1,C1)
INT()
5
XFD
Bottom10
Outline

Workbook
Column

.odc file
Line

Consolidation by position
TREND

Consolidation by category
STANDARDIZE

PV

NPV

Sparklines
Cells C3 through C6
Shift + F10

Slicers
Cell C3 and Cell C6
Shift + F1

Ctrl

Alt

Name Box

Formula Bar

Name of the workbook


currently working on

Name of the worksheet


currently working on

Copy handle

Fill handle

Insert
32

Replace
64

Goal Seek

Consolidate

Rounds a number to a desired Rounds a number down to the


multiple
nearest integer

A scenario is a set of values


saved with the workbook.

A workbook can have one


scenario per sheet.

A formatted description of
each scenario on a separate
worksheet
Arguments
Trendlining
Field Options

A formatted defined range of


Solver and Goal Seek
solutions
Limitations
Enhancement bit
Field Pane

They allow you to add


dynamic data.

They allow you to rearrange


row and column data.

Absence of input documents Lack of visible transaction trail


Financial totals
Record totals
Table level

Data Integrity

Sequence account

Data account

Bottom up test
Embedded code

Hybrid test
Program code

Database with master table


Modelling
Test data

Executable program with


master copy
Analyzing
Table data

Integrated Test Facility

Black box Test Facility

Test item block


Application controls

Test data pack


General controls

Parallel trailing

Tracing parallel

Cross reference lister


Public audit trails
Transaction sampling

Formulate flaw hypotheses


Random audit trails
Systematic sampling

File size
Sort and merge files

File data
Sampling nth item

Stratification

Selection

Ex Post Auditing Only

Analytical review only

Sorting, creating, and printing Data retrieval, code


files
comparison
Program
Track
Input controls
Processing controls

General audit

Post audit

List
Format mask

Range
Data mask

Range

Sign

Field checks
Physical batches

Record checks
Logical batches

Control totals
ODBMS
Update Query
DBMS
Number
Form view
Tabular

Serial number
RDBMS
Process Query
RDBMS
Character
Form Design
columnar

Data manipulation language


Tabular
Update Query
DATABASE
Client data base

Data mathematical language


columnar
Select Query
DBMS
Server data base

Data Design Language


Internal Schema
Increase data duplication

Define Data Language


Conceptual Schema
Reduce Redundancy

Hierachical
Attribute
.mdb
255 char
enter a value automatically
every
program
Programming
Physical level
256
YES/NO

FLAT FILE SYSTEM


Entity
.dbf
16 chra
for checking
first
check
Non-Procedural
Logical Level
1000
HYPERLINK

column
Program
Report
MS-WORD
3 GL
Java
Multiuser DBMS
Client-Server database
key field
Record
Title

field
query
Query
Excel/spreadsheet
4GL
Internet
Distributed DBMS
Distributed DBMS
Primary key
Tuple
Logo

Search Query

Make Table Query

View, change and analyze


data in different ways

A source of records for forms


and reports

It is a printed page where


users will enter data
One-to-One

It is a Data Entry Screen to


make viewing, entering and
editing data in the database
table
One-to-Many

Entity
Classifying

Attribute
Filtering

Storage space is wasted


Number
Conceptual Model
Employee Code
Java
Memo
Memo

Changing the data at one place


only will cause data
inconsistency
Text
Structural Model
Employee Name
Oracle
Yes/No
Yes/No

Crosstab
Report Header Section
Select
Text

Parameter
Page Header Section
Delete
Number

OLE Object
Unique Key
Query

Memo
Foreign Key
Report

Changing the structure of


tables

Creating views and indexes

Form

Query

Parameter query

Update query

In the Report Header Section In the Report Footer Section

Selecting the fields that we Selecting the underlying table


want to appear in the form or or query on which we want to
report
base the form or report
Data independence

Data integrity and security

Table Analyzer Wizard


Create
One-to-One

Database Analyzer Wizard


External Data
One-to-Many

Matching Key

Foreign Key

For ordering records


Inclusive Mode

specifying conditions with


group by clause
Exclusive Mode

Backups
Performance Analyzer

Save Database
Hi-tech Analyzer

Table Documenter

Database Documenter

User and Group Accounts

User-level Security Wizard

Security
SELECT

Grant and revoke


WHERE

SELECT

WHERE

Entering Data
Word
Recruitment Management

Defining Data
Excel
salary Process

Billing

Previous years pending bills

eSecretary software

Contact Management software

To create new file

To save file

Personal profile

PAN Number

Generation of forms as per


formats and requirement of
MCA

Maintain Minutes Book

Salary Paid in Cash

Salar paid by Cheque/DD

MIS

Export Journal Voucher

Billing & Accounting


softwatre

Payroll Software

ICAI-File management
application

K-DOC application

Billing & Accounting


softwatre

Payroll Software

Auto filing of eForms

Shares Records/Certificates

eSecretary software
Templates

Contact Management software


Blank document

eSecretary software

Contact Management software

Tax Application

K-DOC application

Collected and computed


Value closing stock

Sampled and stratified


Value clearing stock

P & L statement
Trial balance
Income or expenditure
Journal sheet
Customers
Income side
File
F10
Tally Secure
Ledger
Accounts of Tally
Sales

Income statement
Trading account
Sales or purchase
Voucher debtors
Assets
Assets side
Company
F2
Tally Pack
Journal
Gateway of Tally
Production

Fixed assets
Vouchers
Capital nature
Alter
Sub-group
Single
Single
Sub Ledger master

Current assets
Groups
Expense nature
Delete
Ledger-group
Multiple
Sub-group
Group Ledger master

Journal and Ledger

P & L Account and Journal

Expenses
Journal
F13
Credit Note
Sales
Double entry mode
Comment

Income
Trial sheet
F12
Payment
Receipt
List entry mode
Memo

Sales account, Sales tax


account
End of a month
Credit Note
Liability
Previous date

Ledger account, Bank account


First of a year
Contra
Income
Effective date

1, 2, 3, 4
Credit purchase

1, 3, 4, 2
Cash purchase

Loan

Payment

Credit Purchases

Cash Purchases

Cash Ledger
Payment

Sale Sheet
Receipt

Balance sheet
Accounting reports
Net Loss
Expense
Record book
Ratio analysis
Income
Bill date
Data flow
On closing balance
On closing balance

Profit & Loss statement


Inventory reports
Net Income
Example
Ledger book
Account analysis
Payables
Effective date
Funds flow
On net credit flow
On net credit flow

Consolidate company
Owner

Group company
Data Entry operator

Month-less accounting
Real accounts
Tally Vault
Tally.imp
OLE
Auto numbers
more than 30 Days old
F5

Yearly-entry accounting
Personal accounts
Tally Audit
Tally.cfg
DBMS
Duplicate number
less than 30 Days old
F8

Test item block

Test data pack

Parallel trailing

Tracing parallel

Cross reference lister


Public audit trails
Ledger
Transaction sampling

Formulate flaw hypotheses


Random audit trails
Liability
Systematic sampling

File size
Sort and merge files

File data
Sampling nth item

Stratification

Selection

Ex Post Auditing Only

Analytical review only

Sorting, creating, and printing Data retrieval, code


files
comparison
Program
Track
General audit
Post audit
Voucher and journal
Income

Ledger and trial balance


Debit

on-bank-ca-students/
Option C
Both A and B

Option D
None of the above

Relation
Unix
Calculation Editor
System validation
Print Preiview

Sampling
SOFTCAAT
Testing Editor
All of the above
Append

Answer
C
B
D
C
A
D
B

Formulate flaw hypotheses


Sequence checking
Character Data
Secondary Key

All of the above


Filter
All of the above
Composite Key

D
A
D
B

All of the above

None of the above

All of the above

None of the above

Compare check

Data check

A
A
A

EFT,RTGS
Remitting bank
EFT
UTR

None of the above


None of the above
All of the above
UTS

B
B
B
C

Strict Through Processing


WAN

None of the above


MAN

A
A

Core Management System

Centre Management System B

Audit of controls in any banking


environment is performed using
software audit
None of the above
Developing a business
continuity planning

Laying down procedures for


system development
A

Core Banking Solution

Web centre

Web centre

Central Office Data Centre. D

Database Server

Domain Name Server

Client version
Wide Area Network
Domain Name Server
MAN

Firewall
Personnal Area Network
Application Server
WAN

C
A
A
B

Server Development

System Development

Log management
WANs

Authorized Controller
MANs

C
B

protection

Validation

Centralised Data base security


State zone
IBDS

Central Office Data Centre. A


demilitarised zone
D
All the above
D

Both A &B

None of the Above

Application Software

Application Server

Broadband

None

Net transaction ID NO

ATM No

Process Control

Data Control

Letter of Payable

Letter of Receible

Disaster Recovery Planning


(a) & (b) both

None
None of above

B
C

TCS
Pin No - Natural Pin

I-Flex
Offset Value - Natural Pin

A
C

Cash register

(a) and (b) both

Natural Pin

Card Number

Expression Box

Expression Builder window C

Will match all text having


second character as B

Will match all text starting


with a digit

Action query
Any where in the table
Table but not in Form

Parameter query
Beginning of the table
Form & Table

B
B
D
B

Graphics Control
Record Source
Inside-Report

Bound Controls
Picture
Insert-Report

B
D
C

Table or query,Sub-Report

None of the above

Detailed Definition Language

Data Detailed Language

Bar Chart
Bar Chart
.MDW

Column Chart
Column Chart
.ACCDT

D
B
B

Both of them

None of them

Visual Basic Application

Excel attachment

Manage replies
Date/time

All of the above


AutoNumber

C
D

For long text entries

For shout text entries of no


more than 255 characters

Records that meet any of several


criteria you specify
All of above

Data Manipulation Language


The QuickBasic editor

Detailed Manipulation
Language
All of above

C
B

Click the report, and on the


Pivot Table toolbar, click the
refresh data button

All of the above

Pivote Table & Pivot Chart


View
Memo
Macro
DDL

All Of Above
Lookup Wizard
Report
None Of Above

D
D
B
A

Authorizing Access And Other


Control Over Database
None Of Above

Object Oriented Database


Model
Date/time

Structureed Database Model D


Hyperlink
C

Establishing Relationship

None Of The Above

have to update manually

never update

Query

None Of These

To allow the user to switch from To allow changing from one


one database file to another.
report to another.
A
It doesn't have as many design
options.

The only report type


available is the Design
Report.

Use the Mailing label wizard


text option.
Page Footer

Use the >> button.


Page Header

C
C

All The tools of the form design


control gallery.
Form Wizard Columnar
Open-down
None of the above

C
B

Delete Query
Open Exclusive mode
()
Text
Report

Parameter Query
Open Read Mode
""
None of the above
None of the above

D
C
B
A
A

Read

Write

File tab
Report
Query

Database Tools
All of the above
Report

A
D
D
A

primary database & secondary


database

None of the above

Web page
multi dimensional
ASCII
Tally.Net
Internet Data
Both A & B
Data Entry

None of the above


none
ALL
None of the above
None of the above
None of the above
Tally.NET User

C
C
D
C
B
C
B

flowcharts, flow diagrams


PLM

graphs, shapes
CRM

C
B

Online Analytical Programming None of the above


Sourcing planning
Production planning
PLM
CRM

B
A
D

Step 3

Step 4

installation

migration

post implementation

None of the above

Both A & B

Either A Or B

Real Time Processing

Business Processing

Form 26Q, Annexure to 26Q

All of the above

File Valuation Program


isolated

File Valuation Utility


de-centralized

B
A

Business Modeling
resource driven
operational data
data
supply and sortage

Business Intelligence
none
none
none
none

D
A
B
A
A

hybridbound operations
strategic
staff

none
none
none

B
B
A

SCM
cryptography

none
none

A
A

Real Time Processing

Business Processing

Decision Support Systems

Non-Isolated Information
Systems

Form 26Q, Annexure to 26Q

All of the above

File Valuation Program

File Valuation Utility

Tally Fit

Tally AutoFit

Unlimited multi-user support

Audit Feature

Tally.NET

Email facility

Either A or B

None of the above

Business Modeling

Business Intelligence

Paste Document

My Templates

A
B
C

Email hacking.
Web spoofing

Email tracking
Web threating

B
C

Billing and Accounting software K-DOC application


Email Management
Share certificate printing
ICAI XBRL Software
Payroll

C
D
A

ICAI XBRL Software

ICAI-ROC application

Internal auditiing

None of the Above

Both A and B

Either A or B

Section 43B

Section 44AB

Either A or B

None of the Above

Foreign Exchange Managament


Act
None of the Above

Document Management
Systems

Client management

System administrator

User Administrator

AR module

FA module

B
B

Invite and analyze quotations


from vendors

Comparison with budgets

Expense Management

Fixed assets

Accounts Payable
Expense Management

Accounts Receivable
Bank Reconcilations

B
C

Knowledge management

None of the Above

Confidentiality,Integrity and
Access rights

Confidentiality,Integration
and Authentication

Payroll

Timesheet application

Automated alerts for pending


appraisals

Prepare summary or bell


curve analysis of all
employees

Payroll System

Knowledge management
System

Error free capture of leave


details
monthy

Approval workflow
quarterly

C
B

Copies of important
Copies of clients incorporation contracts or long term lease
documents like MoC
agreements
C
Classroom Training

E-Training

Virtual Learning
WAN

All the Above


All the Above

B
D

Availability
Both A and B

Authentication
None of the Above

B
C

WAN uses only private


networks.
Information Security
Own documents
Integrity

Switches are used to connect


LAN and WAN
None of the above
All the above
Authentication

B
C
D
B

Confidentiality

Availability

Authentication
operational

Confidentiality
vulnerable

A
D

Confidentiality

Integrity

HR and Payroll
Billing and Accounting

None of the Above


ICAI-TOC

D
D

Private Branch exchange

Public Branch exchange

Financial planning

Personal Finance planning

Decision Tree Analysis

Corporate Planning &


Analysis

Total Fund Ration

None of the above

Price Earnings Multiple

Gross Profit Ratio

<?xml version="1.0"
encoding="ISO-8859-1"?>

<?xml version="0.0"
encoding="ISO-8859-1"?>

<TagName>Data<TagName
</TagName>Data</TagName> >
A
XML Maps Dialog Box
1
status of assess

None of the above


4
All of the above.

C
B
D

Systematic sampling
Systematic sampling

Simple random sampling


Simple random sampling

B
C

Systematic sampling
Snowball sampling

Simple random sampling


Simple random sampling

D
C

IRR
net present value
IRR

NPV
All the above
PMT

B
D
A

Qualitative risk analysis

Scenario analysis

Qualitative risk analysis

Scenario analysis

Both A& B

Charts

Both A& B

Neither A &B

Decision Tree Analysis


COUNTIF()
Profitability Ration
Rent

None
None of the above
None of the above
All the above

A
B
A
B

View -> Window -> Split

View -> Split

Settings Tab under the tab Data


-> Filter ->Advanced Filter
All of the above

Counts cells having number

Counts non-empty cells

A1 & "@" & B1

A1 $ "@" $ B1

ROUND(7.4999,0)

Only B & C

Pivot Chart

Pie Chart

Sparklines

None of the above

Page Setup -> Print Area


Text Import wizard
&

Print Area
Analysis Tool Pak
*

A
C
C

AVERAGE(A1:A6,B1:B6)
DIV()
7
XAA
Top half
Data Tools

All of the above


REMAINDER()
11
AAA
All
Calculation

D
A
A
B
D
B

.htm file
Scatter

.udcx file
Bubble

C
A

Consolidation using 3-D


formulas
CORREL

Any of the above


GROWTH

C
A

IRR

PMT

Macros
Cell C4 and Cell C5
Shift + F11

Data Forms
None of the above
Shift + F12

B
A
A

Shift

Ctrl + Shift

Zoom Box

Sheet Tab

Name of the cell or range


currently working on

Formula in the cell currently


working on
C

Insert handle

Border

Paste
60

Undo
80

D
B

Data Validation

Subtotal

Rounds a number up

Calculates interest

Scenarios provide a way to see


different solutions for worksheet Scenarios help to perform
formulas.
what-if analysis.

A worksheet with a separate


thumbnail for each formula
Constraints
Thumbnail
Field Settings

A worksheet with separate


macros for each scenario
Parameters
Add-in
Field Structure

A
D
D
C

They allow you to generate email enabled reports.

They allow you to print the


reports with various settings. B

Accessibility of data and


computer programs
Document totals

All of the above


Hash totals

D
D

Batch check

System test

Suspense account

Update account

Stub test
Database Analyzers

Top down test


Database code

D
A

Transaction data with master


transaction
Mapping
Item data

Module programs with


snapshots
Tracing
Record data

B
C
A

Graph testing

Whitebox testing

Test program pack


Check controls

Test record pack


Input controls

B
B

Parallel coding

Parallel simulation

Correct lister
Sample audit trails
Simple sampling

Formulate correct
hypotheses
Data audit trails
Demographic sampling

B
A
B

File access
Formatting output

File reorganisation
Classify data on a criteria

C
D

Statistical

Reporting

Limited ability to determine


Propensity for Error

Limited ability to Verify


Processing logic

Reading data, selecting and


analyzing information
Snapshot
Both A and B

Specific tasks with original


or modified programs
Picture
Neither A nor B

D
C
C

System audit

Concurrent audit

Slab
Field mask

Digit
Input mask

C
A

Overflow

Serial

Batch checks
Block batches

File checks
Transact batches

B
A

Transaction type
DBMS
Insert Query
ODBMS
Memo
Change Form
Datasheet

Sequence check
None
None
None
Date
None
None

C
C
A
A
B
B
B

both a and b
both a and b
Delete Query
O.S
Client-Server database

None
None
None
None
None

A
A
B
B
C

Data Definition Language


External Schema
Increase Efficiency

None
None
All

C
C
B

Relational model
Tuple
.accdb
text
for validation check
last
macro
Application
View Level
16536
MEMO

None
None
None
long Integer
None
None
All
None
None
63999
AUTONUMBER

C
C
C
D
A
B
C
B
B
D
D

tuple
form
Form
Powerpoint
5GL
Database
Centralized DBMS
Multiuser DBMS
Reference Key
Tabel
Picture

None
macro
Macro
None
None
Visual Basic
Database
Centralized DBMS
None
Attribute
Graphic

C
D
A
B
B
C
C
B
B
B
B

Aggregate Query

Select Query

Both A and B

Neither A nor B

It is a part of database used by


the analysts to draw conclusions None of the above
Many-to-Many
Many-to-One

B
D

Relationship
Sorting

None of the above


Summarizing

A
C

It can be more easily accessed


Memo
Object Model
Date of Birth
Lotus 1-2-3
Image
Calculated Field

Both A and B
Any of the above
Interface
Joining Date
MS-Outlook
AutoNumber
AutoNumber

D
B
A
A
B
C
C

Action
Detail Section
Make Table
Currency

None of the above


Summary Section
Update
AutoNumber

A
D
A
C

Hyperlink
Primary Key
Form

Lookup Wizard
Record Key
None

D
C
A

Authorizing access and other


control over database

Inserting, updating or
deleting records

Macro

Report

Crosstab query

Make Table query

In the Page Footer Section

In the Month Group Footer


Section

Reading several screens of


mostly useless information and Selecting how the form or
clicking next
report should be formatted

Decentralized data

Reduced application
development time

Form Analyzer Wizard


Home
Many-to-Many

None of the above


Database Tools
None of the above

A
D
C

Index key

None of the above

updating records
Normal Mode

None
Save Mode

B
B

Save As Databse
Online Analyzer

None of the above


None of the above

A
A

Query & Report Documenter

None of the above

User and Group Permissions

None of the above

Select
FROM

Create
INSERT

B
A

FROM

INSERT

Controlling/Accessing Data
Access
Time & attendance

All
None
All of the above

C
C
D

Cash receipt

All of the above

Template Management software All of the above

To cut & paste the completed


and old document.

None of the above

PF No,online submission of loan


etc
All of the above

Calculate the filing fee

Bank Receipt

Salary credited to Bank

All of the above

TCS

Backup utilities

K-DOC application

ICAI-ROC application

Knowledge Management
Software

None of the above

K-DOC application

ICAI-ROC application

Annual Returs forms

All of the above

Template Management software All of the above


Outside document
All of the above

A
D

Template Management software All of the above

Tax Suite Application

All of the above

Grouped and summarized


Value expense stock

Assets and liability


Value income stock

C
A

Balance sheet
P & L statement
Asset or liability
Sundry debtors
Liabilities
Expense side
Project
F12
Tally Group
Voucher
Entry of Tally
Mercantile

Asset sheet
Suspense accounts
Profit or loss
Original entry
Suppliers
Payable side
Application
F11
Tally Vault
Trial Balance
Groups of Tally
Manufacture

C
C
B
C
D
B
B
C
D
B
B
C

Loan assets
Journal
Revenue nature
Display
Primary-group
Sub-group
Alter-group
General Ledger master

Capital assets
Ledgers
Income nature
Shift
Alter-group
Alter-group
Multiple
Journal Ledger master

B
D
C
A
C
B
D
C

P & L Account and Balance


Sheet

Voucher Account and


Balance Sheet

Assets
Voucher
F10
Receipt
Payment
Choice entry mode
File

Loans
File
F11
Contra
Journals
File entry mode
Narration

D
C
B
D
D
B
D

Suppliers account, Purchases


account
First of a month
Sales Note
Sales
Current year

Buyer's account, Cash


account
End of a month
Payment
Asset
Configured date

A
C
D
D
B

2, 4, 3, 1
Both A and B

3, 4, 2, 1
Contra purchase

C
C

Receipt

Sales

Expense Purchases

Debit Purchases

Stock Journal
Debit

Purchase Voucher
Contra

C
D

Trial balance
P & L reports
Net Profit
Taxes
Journal book
Data analysis
Expenses
Voucher date
Stock flow
On net transactions
On net transactions

Journal
Expense reports
Net Account
Income
Day book
Transaction analysis
Loans
Previous date
Cheque flow
On net cash flow
On net cash flow

C
B
C
A
D
A
B
A
B
C
A

Set company
Accountant

Alter company
Administrator

B
D

Period-less accounting
Nominal accounts
Tally Report
Tally.exp
ODBC
Sequence number
more than a day old
F12

Transaction-number
accounting
Expense accounts
Tally Group
Tally.ole
MS-XLS
Range number
more than a week old
F6

C
B
B
A
C
B
A
D

Test program pack

Test record pack

Parallel coding

Parallel simulation

Correct lister
Sample audit trails
Voucher
Simple sampling

Formulate correct
hypotheses
Data audit trails
Expense
Demographic sampling

B
A
C
B

File access
Formatting output

File reorganisation
Classify data on a criteria

C
D

Statistical

Reporting

Limited ability to determine


Propensity for Error

Limited ability to Verify


Processing logic

Reading data, selecting and


analyzing information
Snapshot
System audit

Specific tasks with original


or modified programs
Picture
Concurrent audit

D
C
D

Balance sheet and trial balance Journal and ledger


Credit
Expense

D
B