Beruflich Dokumente
Kultur Dokumente
in/
S. No
1
2
3
4
5
6
7
Option B
Date Data
TRUE
Data
IDEA
function Editor
Data Analysis
Stratification
Understand program
specifications
Exclude
Date Data
Unique Key
Option C
Both A and B
Option D
None of the above
Relation
Unix
Calculation Editor
System validation
Print Preiview
Formulate flaw
hypotheses
Sequence checking
Character Data
Secondary Key
Sampling
SOFTCAAT
Testing Editor
All of the above
Append
Answer
C
B
D
C
A
D
B
D
A
D
B
Random
Systematic
Random
TRUE
Field check
Systematic
FALSE
Filter check
Compare check
Data check
A
A
A
B
B
B
C
A
A
Audit of internal
controls is not needed
at all
RTGS,NEFT
Central bank(RBI)
RTGS
UTE
Straight Temporary
Processing
LAN
Cash Management
System
Systems audit are
important for the
verification of the
internal controls
EFT,RTGS
Remitting bank
EFT
UTR
NEFT, RTGS
Beneficiary bank
NEFT
UTN
Straight Through
Processing
VLAN
Control Management
System
Managing of Assets
Formulating a security
policy
Developing a business
continuity planning
25 _______is supported by advanced technology infrastructure and has high standards of business functionality.
Firewall
Internet banking
26 CBS Software resides in a Central application server which is located in the ___________
Web centre
27 A________ that runs the core banking solutions (CBS) and is centrally accessed by the branches.
28 The _________of the application is capable of only entering the data at the end point that is branches.
ATM Server
System version
Virtual Local Area
Network
Data base server
LAN
Application
Development
Middleware
Central Application
Server
Application Version
Local Area Network
ATM DATA Server
Virtual Networks
8
9
10
11
Questions
In IDEA, Statistics functions can be applied on_________.
In IDEA, increment value in Stratification function can be fixed or free interval.
In IDEA, Stratified Random functions is a part of which menu.
Which of the following is not an Audit Software
Using which functions to perform more complex calculations and exception testing in IDEA?
Which of the following are categories of computer audit function ?
In the following list which is a audit function?
Which is the following step involved in a source code review methodology ?
In IDEA which functions should be used to find repeated values ?
In IDEA, Stratification functions can be applied on which type of data ?
In IDEA,Summarization accumulates the values of Numeric fields for each____________.
12 In which sampling,selecting sampling units using a fixed interval between selections is_______________.
Ensures that all combinations of sampling units in the population have an equal chance of selection
13 is____________.
14 Input Control method is a part of Application Control Group.
15 Which is the following type of check that can be run when data is input through terminal ?
In _______system money transfers are done on a one to one basis while in _______system transfer is done in
16 batches.
17 All the money transfers take place in the books of the _________________
18 ________system of money transfer is primarily used for large transactions.
19 In RTGS, the STP generates an ___________for every outbound RTGS transaction.
20 STP stands for ________________________________ in terms of CBS.
21 ________ is a method of creating virtual networks within a physical network.
29 The application server would be placed in a trusted inside zone in a separate ____________
30 Application software would access the ________
31 __________ are capable of being connected only when devices are connected to a switch.
_____________refers to the process of developing software which would produce the required output from
32 the input provided of course, using the necessary hardware and communication systems.
The______________is essential to ensure that computer security records are stored in sufficient detail for
33 appropriate period of time.
34 All the various servers in the central data centre are seggregated through _______
The __________ is a complete process in the computer so that it ensures that data that is fed in conforms to
35 certain prerequisite conditions.
36
37
38
39
When the central Data base is busy with central end of day activities or for any other reason, the file
containing the account balance of the customer is sent to the ATM switch. Such a file is called __________
The IBDS is located in a ____________
The main components of Internet Banking system consist of __________
Copy of the Anti Virus Software was updated promptly and regularly at the Data Centre and pushed into all of
the servers and in all the systems in the branches by ________
B
C
Database Server
Client version
A
A
B
Software Development
Server Development
System Development
Review Management
LANs
RTGS
VLANs
Log management
WANs
Authorized Controller C
MANs
B
Consalidation
Password Policy
protection
Validation
Application Server
City Zone
IBAS
A
D
D
Hacking Method
Push-pull method
Both A &B
40 The __________which is also residing in the server at the branch actually does the banking operations.
In Core Banking concept all the systems of the bank are connected to the Central office by means of a
41 connectivity which may be either a _________ or a dial up line.
Sytem software
utility software
Application Software
Application Server
local line
Broadband
None
42 The ________ is generated by the software and directly sent to equipment for printed the Pin Mailer.
____________would also include the existence of built in controls in the system to ensure proper processing
43 of input data so as to provide the required output.
____________refers to an arrangement wherein the issuing bank acts on the request and instructions of a
44 customer.
16 digit number
Leased line
Personal Identification
Number
Net transaction ID NO
ATM No
Output Control
Input control
Process Control
Data Control
Letter of Tax
Business Continuity
Planning
User testing
HCL Technologies
Letter of Payable
Disaster Recovery
Planning
(a) & (b) both
TCS
Letter of Receible
45 _______________ is a process by which the bank ensures the maintenance and recovery of operations.
46 At which phase of testing the version of software is called beta version?
47 Finacle developed by _________
Letter of Credit
Business Recovery
Planning
Programmer testing
Infosys
B
C
A
48 The number that is stored in the ATM switch is the difference of which of the following number?
The information retrieval of transactions taking place at ATM located at remote locations is through
49 _________
None
None of above
I-Flex
Offset Value - Natural
Pin
(a) and (b) both
50 The number that is generated as soon as the customer inserts the card in the ATM machine is __________
Offset value
Natural Pin
Expression Elements
Operator Button
Card Number
Expression Builder
window
Expression Box
Will match all text
having second character
as B
Crosstab query
54
55
56
57
58
59
Alphabetical Order
Form only
FALSE
ActiveX control
Caption
Inner-Report
Table or query,InnerReport
Data Definition
Language
Pie Chart
Pie Chart
.ACCDB
While entering record in Datasheet view, in which order the records can be entered
When you delete the record in form, it deletes the record from__________.
Having clause is used in the aggregate query in MS Access 2010
The controls that are not linked to any field of the table or query on the form are known as ________.
Which property of the form can be used to insert a background image in MS Access 2010?
___________ is a report that is inserted in another report in MS Access 2010.
60 A bound main report is based on a ______________ and its _____________ contain realted information.
61
62
63
64
Action query
Parameter query
Graphics Control
Record Source
Inside-Report
Table or query,SubReport
Detailed Definition
Data Defined Language Language
Area Chart
Bar Chart
Line Chart
Bar Chart
.ACCDE
.MDW
None of them
Back-end database
To add table
Those records that
match an entity in a
field
Access Forms
Visual Basic Application Excel attachment
Options in Tool menu of
Access
Manage replies
All of the above
Number
Date/time
AutoNumber
For shout text entries
To store objects created
of no more than 255
in other programs
For long text entries
characters
Records that meet any of
Records based on a
several criteria you
criterion you specify
specify
All of above
Detailed Maintaining
Language
The Visual Basic 1.0
editor
Both of them
Front-end database
66 In which formats can the Collect Data through email message feature can send the data entry form?
Once a mail is sent using the collect data through email message feature in Access 2010. The mail status can
67 be checked using________________.
68 The ___________ type of data cannot be collected using Collect data through email messages.
Export to Outlook
Text
A
D
B
B
A
C
D
Data Maintaining
Language
Data Manipulation
Language
Detailed Manipulation
Language
C
Notepad
All of above
Data Definition
Data Refinement
Not update
update automatically
never update
Relationship
Join
Query
None Of These
73 How do you update Pivot Table report data after changes are made to the source data?
74
75
76
77
Datasheet View
Ole Object
Form
DCL
85 How does a query-based report differ in design to a report based on just one table?
86 How would you include some plain text into a mailing label report?
87 In a Microsoft Access 2010 report, the page numbering would most likely be placed into the:
If you wished to present a professionally looking form on screen that would show all the necessary
88 information, which of the following form design tools would you most likely use?
89 An .ACCDE file is a ___________ version of the original .ACCDB file.
Which type of the query is used to accept the value from the user while executing the query and fetch records
90 accordingly
91 To encrypt the databse in Access 2010 must be opened in the __________________.
92 To extract the records based on date field, which of the symbol should be used
93 FIX() is a kind of ____ function in MS-Access 2010.
94 MS-Access 2010 has added new features of ______ to eliminate the need of VBA code
95 Encrypting a database does not restrict access to database objects, but to __________ the database.
96 Third Party Encryption Technology can also be applied to the database of Microsoft Access 2010.
97 To create a split database in MS Access 2010 go to which tab?
98 After spliting database,frontend database holds_________________.
99 After spliting database,backend database holds_________________.
100 When an Access database is split, it creates two files_________________.
A Data Access Page is a special type of _________ that allows users to interface with database using Internet
101 Explorer.
102 OLAP systems use concept of OLAP cube called a ______________ cube
103 The data which is to be exported from Tally.ERP 9 can be in ________ format.
104 In Tally ERP-9 Remote Access is also known as __________.
105 Accessing data store on a remote location using Internet in Tally.ERP9 is called____________.
106 Tally.ERP9 can be classified user in two categories are___________.
107 Which of the following is not a predefined security level provided by Tally.ERP 9?
108 The business model is represented in the graphical form using ______________ and ________________
109 _______ integrates supply and demand mangement within and across companies.
110 OLAP stands for _________________.
111 __________ includes transportation from Suppliers and receiving inventory.
112 Which of the following is not the service area of SCM?
Which step of the ERP implementation involves, educating and recruiting end users throughtout the
113 implementation process?
The system ____________ process will address issues such as software configuration, hardware acquisition
114 and software testing.
A __________________ review is recommended to ensure that all business objectives established during the
115 planning phase are achieved.
In _________________ stages, auditors have access to rudimentary ERP tools and capabilities for auditing
116 security configurations.
Immediate posting and updation of books of accounts as soon as the transactions are entered. This is called as
117 __________
118
119
120
121
122
123
124
125
126
127
128
129
130
131
134
135
136
137
138
All Of Above
Lookup Wizard
Report
None Of Above
D
D
B
A
None Of Above
Structureed Database
Model
Hyperlink
To build a main
Creates the macros used To allow the user to
To allow changing
switchboard form that to program an automatic switch from one database from one report to
controls all other forms. application.
file to another.
another.
The only report type
The reports are
It doesn't have as many
available is the Design
restricted in size.
It doesnt
design options.
Report.
Type the text directly
Use the Mailing label
into the label.
Use the > button.
wizard text option.
Use the >> button.
Report Footer
Section Header
Page Footer
Page Header
All The tools of the form Form Wizard
design control gallery.
Columnar
Open-down
None of the above
D
C
B
C
C
Pivot Table
Fixed-down
Pivot Chart
Locked-down
Update Query
Open Inclusive mode
#
Date
Form
Modify
FALSE
External Tab
Query
Forms
A new database & Old
database.
Delete Query
Open Exclusive mode
()
Text
Report
Read
Parameter Query
Open Read Mode
""
None of the above
None of the above
Write
File tab
Report
Query
primary database &
secondary database
Database Tools
All of the above
Report
D
C
B
A
A
A
A
D
D
A
XML page
single dimensional
XML
Networking
Local Data
Local User
Owner
HTML Page
hyper dimensional
HTML
VB.Net
Remote Data
Remote User
Public User
Web page
multi dimensional
ASCII
Tally.Net
Internet Data
Both A & B
Data Entry
C
C
D
C
B
C
B
charts, pictures
BPM
Online Analysis
Processing
Inbound Operations
Logistics
graphs, shapes
CRM
C
B
B
A
D
Step 1
Step 2
Step 3
Step 4
implementation
upgradation
installation
migration
pre implementation
post implementation
post implementation
pre implementation
Both A & B
Either A Or B
Immediate Processing
Form 27, Annexure to
27
Business Processing
B
A
Data Modeling
information driven
historical data
backup
supply and chain
outbound operations
corporate
back office
Business Modeling
resource driven
operational data
data
supply and sortage
hybridbound operations
strategic
staff
Business Intelligence
none
none
none
none
none
none
none
D
A
B
A
A
B
B
A
ERP
decryption
SCM
cryptography
none
none
A
A
Immediate Processing
Integrated Information
Systems
Form 27, Annexure to
27
Business Processing
Non-Isolated
Information Systems
Tally Adjust
Tally Fit
HTTP-XML based data Unlimited multi-user
interchange
support
Tally AutoFit
Audit Feature
Web Publishing
Tally.NET
Email facility
Contact On Load
Either A or B
Interactive Processing
Form 26, Annexure to
Which of the following ETDS forms are available in Tally.ERP 9?
26
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility called File Validation
__________________
Program
ERP systems provide an access to the__________ data
integrated
________________ is a tool that refers to skills, processes, technologies, applications and practices used to
facilitate better, accurate and quicker decision making.
Data Warehousing
Business intelligence systems are ________ Decision Support Systems.
data-driven
Data warehousing technology is the process of creating and utilizing the companys __________
general data
The data in the Warehouse comes from the _________ environment and external sources.
operational
In essence, SCM integrates ___________ management within and across companies.
supply and demand
_____________ including all fulfillment activities, warehousing and transportation to customers.
Inbound operations
Customer Relationship Management is a ________________ level strategy.
business
Operational CRM provides support to ___________ business processes.
front office
Collaborative ______ ultimate goal is to use information collected by all departments to improve the quality
of services provided by the company.
CRM's
Tally.ERP 9 follows the DES __________ method to safeguard the data.
encryption
Immediate posting and updation of books of accounts as soon as the transactions are entered. This is called as
__________
Interactive Processing
Information Systems
Form 26, Annexure to
Which of the following ETDS forms are available in Tally.ERP 9?
26
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility called File Validation
__________________
Program
With ______________ technology the characters are reduced in breadth and user is allowed to input
additional characters which would make the account name, entity complete and readable.
Tally Fix
In Tally.ERP 9 __________________ provides the user with administrator rights and the capability to check
the entries made by the authorised users and alter these entries, if necessary.
User-defined Security
__________________ is an enabling framework which establishes a connection through which the remote
Direct Web Browser
user can access the Client's data without copying/transferring the data.
Access
If we want the company to be connected automatically for remote access on load, the property __________
Allow to Connect
needs to be set it as Yes.
Company
C
B
139 ___________________ technology is the process of creating and utilizing the company's historical data.
140 Is there a fixed qualification for internal auditor_________.
141 Which of the following will not appear in the home page of K-Doc?
To change an email header so that the message appears to have originated from someone or somewhere other
142 than the actual source is known as___________.
143 To playfully satirize a website is known as_____________.
_________is the complete package to manage the billing requirements of a CA firm on cash system of
144 accounting.
Data Warehousing
TRUE
Powerpoint
Data Modeling
FALSE
Word
Business Modeling
Business Intelligence
Paste Document
My Templates
A
B
C
Email Spoofing.
Web Interception
Email tracking
Web threating
B
C
Payroll
eSecretary
Email hacking.
Web spoofing
Billing and Accounting
software
Contact Management
Greeting Management
Email Management
K-DOC application
Share certificate
printing
K-DOC application
Payroll
eSecretary
ICAI-ROC application B
Tax audit
Internal auditiing
149 Which of the following is/are the main purpose of the internal audit?
Financial reporting
As per _____________of the Income tax Act,every person carrying on business or profession is requires to get
150 his accounts audited by a CA before the "specified date".
Section 45
__________________ refers to use software/applications to automatically perform tasks such as
accounting,preparing trial balance, financial statements etc. and electronically transmit data or information
151 using internet..
ERP
Foreign Exports
152 FEMA Stands for _______________.
Management Act
Which application helps the management to allocate the revenue to the credit of the right employee who
Resource allocation and
153 identified the opportunity?
scheduling
Operations of the
organization
Both A and B
Either A or B
Section 44AD
Section 43B
Section 44AB
Client management
Office automation
Financial Enterprise
Management Act
Either A or B
Foreign Exchange
Managament Act
Document Management
Knowledge management Systems
System administrator
User Administrator
AP module
GL module
AR module
FA module
156 In Financial Accounting Application,the transactions flow from GL (General ledger) to other modules.
TRUE
FALSE
157 Which of the functionalities is not provided in the purchasing module of Financial Accounting Application.
In Financial Accounting Application,automatic sequence number of documents control is not required in
158 which of the following module?
Evaluation of Vendors
Receipts of goods or
service
Comparison with
budgets
Purchasing
Accounts Payable
Expense Management
Fixed assets
159 Which module of Financial Accounting Application can be used for assigning credit limit to customers?
160 Which of these will trigger/alert for timely payment ?
Sales
Accounts Receivable
HR and Payroll
applications
Accounts Payable
Expense Management
Accounts Receivable
Bank Reconcilations
B
C
161 We can manage interviews,offers and job vacancies by using which of the application?
Purchasing
Accounts Payable
Resource allocation and
scheduling
168 In Permanent Audit file, _______ is not the key data documented.
169 ________is a type of training in which user logon on the training server with a user ID and password.
In some cases, trainee is supposed to appear for the examination/test at the end of the training
170 is____________.
171 ________ are the hardware/infrastructure equipments used in a CA firm.
_____________means information available in the organization should not be altered or modified by
172 unauthorized personnel.
173 Which of these is/are the standard email program used in an organization?
174
175
176
177
178
190 Every bit of data has to start and end with an identical tag
191 Deletion of XML Map is done through __________.
192 Excel works primarily with ________ types of XML files.
193 Method of tax calculations shall change according to _________.
________ is a process used in statistical analysis in which a predetermined number of observations will be
194 taken from a larger population.
Timesheet application D
Prepare summary or
bell curve analysis of
all employees
B
Knowledge
management System C
Reduce administrative
burden on HR
half-yearly
Excess leave
yearly
Approval workflow
quarterly
Organization chart
Internal Training
Clients accounting
manual
E-Learning
Copies of clients
incorporation documents
like MoC
Classroom Training
Copies of important
contracts or long term
lease agreements
C
E-Training
B
Classroom Training
PC
E-Learning
Application Server
Virtual Learning
WAN
B
D
Confidentiality
Microsoft Exchange
Most WANs are owned
by only one
organization.
Confidentiality
Client data
Availability
Integrity
Integrity
Lotus Notes
Compared to LAN, its
transmission speed is
low
Integrity
Own data
Confidentiality
Authentication
Availability
Both A and B
B
C
Authentication
None of the Above
Switches are used to
connect LAN and
WAN
None of the above
All the above
Authentication
Availability
Non-Repudiation
reputational
Integrity
financial
Authentication
operational
Confidentiality
vulnerable
A
D
Availability
Resource allocation and
scheduling
ICAI-XBRL suite
Private Exchange
Branch
Authentication
Confidentiality
Integrity
Client management
K-DOC
HR and Payroll
Billing and Accounting
C
B
B
C
D
B
D
D
D
Corporate planning
Monte Carlo
Simulation
<TagName>Data</Tag
Name>
Directally Delete
Command
3
Annual Income
</TagName>Data<Tag
Name>
</TagName>Data</TagN <TagName>Data<Tag
ame>
Name>
A
Delete Button
2
DOB
C
C
B
Snowball sampling
Sampling
Systematic sampling
195 In __________, Individuals are selected at regular intervals from a list of the whole population.
In ______________ each individual is chosen entirely by chance and each member of the population has an
196 equal chance, or probability, of being selected.
Clustered sampling
Sampling
Systematic sampling
Snowball sampling
Convenience sampling
Systematic sampling
197
198
199
200
Which method is commonly used in social sciences when investigating hard to reach groups?
__________ are useful for quick reading and easy understanding, particularly for top management.
Popular methods of capital budgeting include _________ and payback period.
_________ is the value of all future cash inflows less future cash outflows as on today.
___________is the process of defining and analyzing the dangers to individuals, businesses and government
201 agencies posed by potential natural and human-caused adverse events.
Quota Sampling
Balance sheet
discounted cash flow
Net present value
Sampling
Summary reports
internal rate of return
Working capital
Snowball sampling
IRR
net present value
IRR
Sensitivity analysis
Risk analysis
Scenario analysis
202 __________ which is used more often, does not involve numerical probabilities or predictions of loss.
________ are generally used to present information in a simple and better way and also be used to analyse the
203 risk in a better way.
It is a technique used to determine how different values of an independent variable will impact a particular
204 dependent variable under a given set of assumptions.
_______ involves computing different reinvestment rates for expected returns that are reinvested during the
205 investment horizon.
206 Which function that is used to calculate the payment for specific loan terms ____________
207 ________helps to break down the Return on Equity
208 _______ is a common method for financing property, facilities, and equipment.
Sensitivity analysis
Risk analysis
Scenario analysis
Graphs
Sparklines
Both A& B
Charts
Both A& B
Neither A &B
Scenario analysis
SUMIF()
Du Point Analysis
Mortagage
Sensitivity analysis
PMT
Return on Investment
Leasing
None
None of the above
None of the above
All the above
A
B
A
B
209 Which option can be used to split windows into four in ms excel 2010?
A1 $ "@" $ B1
Only B & C
Pie Chart
210 How to restrict the values of a cell so that only a list can be entered in a cell?
211 What does the COUNTA() function do in MS Excel 2010 ?
If the value in A1 is "ITT" and in B1 is "ICAI ", which function in Excel will return " ITT @ ICAI " in cell
212 C1?
ROUNDUP(7.4999,0)
A1 # "@" # B1
A1 & "@" & B1
ROUNDDOWN(7.4999
,0)
ROUND(7.4999,0)
214 A tiny chart embedded in a worksheet cell that provides a visual representation of data is a _________
Bar Chart
Sparkline
Pivot Chart
C
B
D
B
C
D
C
B
D
A
_________is a graphical equivalent of a pivot table, which is used to visualise PivotTable report summary
215 data
216 To frequently print a specific range of cells on a worksheet , the option used is
217 Non-excel files can be opened in MS Excel using the
218 _____is a text concatenation operator.
Bar Chart
Pagelayout -> Page
Setup -> Print Area
Add Ins
#
219
220
221
222
223
224
225 Which of the following cannot store connection information of an external data source in Excel 2010?
226 The default pivot chart type in Excel 2010 is a ________ chart.
To consolidate Excel data, ________________________ is used when worksheet data does not have a
227 consistent layout or pattern.
228 In Excel 2010, the __________ function is used to generate a forecast.
______function calculates the payment for a loan (installment) based on constant payments and a constant
229 interest rate.
__________ are easy-to-use filtering components that enable the user to quickly filter the data in a PivotTable
230 report in MS-Excel 2010.
231 In Excel 2010, range C3:C6 indicates _______________.
232 Keyboard shortcut to show a shortcut menu in MS Excel 2010 is _______________.
233 To select multiple non-adjacent cells in an Excel 2010 worksheet, click them holding _________ key.
A quick way to return to a specific area of a worksheet in Excel 2010 is to type the cell address or range name
234 in the ____________.
Pivot Chart
Pagelayout -> Print
Area
Developer Tab
$
Sparklines
Print Area
Analysis Tool Pak
*
A
C
C
AVERAGE(4,5,6,7)
MOD()
3
XWE
Top10
Sort & Filter
D
A
A
B
D
B
Workbook
Column
Consolidation by
position
TREND
.odc file
Line
Consolidation by
category
STANDARDIZE
.htm file
Scatter
Consolidation using 3-D
formulas
CORREL
.udcx file
Bubble
C
A
C
A
PV
NPV
IRR
PMT
Sparklines
Cells C3 through C6
Shift + F10
Ctrl
Slicers
Cell C3 and Cell C6
Shift + F1
Alt
Macros
Cell C4 and Cell C5
Shift + F11
Shift
Data Forms
None of the above
Shift + F12
Ctrl + Shift
B
A
A
A
Name Box
Formula Bar
Zoom Box
Sheet Tab
Copy handle
Fill handle
Insert handle
Border
Insert
32
Replace
64
Paste
60
Undo
80
D
B
239 Which feature in Excel 2010 enables us to find the input values needed to achieve a goal or objective?
Goal Seek
Consolidate
Data Validation
Subtotal
Rounds a number to a
desired multiple
Calculates interest
A scenario is a set of
values saved with the
workbook.
242
243
244
245
A formatted description
of each scenario on a
separate worksheet
Arguments
Trendlining
Field Options
A worksheet with a
separate thumbnail for
each formula
Constraints
Thumbnail
Field Settings
They allow you to
generate e-mail enabled
reports.
Accessibility of data and
computer programs
Document totals
A worksheet with
separate macros for
each scenario
Parameters
Add-in
Field Structure
They allow you to
print the reports with
various settings.
A
D
D
C
A formatted defined
range of Solver and
Goal Seek solutions
Limitations
Enhancement bit
Field Pane
They allow you to
rearrange row and
column data.
Lack of visible
transaction trail
Record totals
D
D
Table level
Data Integrity
Batch check
System test
Sequence account
Data account
Suspense account
Update account
Bottom up test
Embedded code
Database with master
table
Modelling
Test data
Hybrid test
Program code
Executable program
with master copy
Analyzing
Table data
Stub test
Database Analyzers
Transaction data with
master transaction
Mapping
Item data
D
A
B
C
A
Whitebox testing
257 The test data generated with correctness proof, data flow analysis and control flow analysis tools is called.
258 The organisational, management, maintenance and access controls are categories of
When a real-time system is simulated to generate the same output as the real-time system, the technique is
259 called.
When an auditor expands the extent of substantive tests to determine the impact of defects on the attainment
260 of program objectives, the methodology is.
261 This is an important control in systems that use digital signatures for authentication purposes.
B
B
Parallel trailing
Tracing parallel
Formulate flaw
hypotheses
Random audit trails
Parallel coding
Correct lister
Sample audit trails
Parallel simulation
Formulate correct
hypotheses
Data audit trails
Transaction sampling
Systematic sampling
Simple sampling
Demographic sampling B
File size
File data
File access
Formatting output
File reorganisation
Classify data on a
criteria
Stratification
Selection
Reporting
Statistical
Limited ability to
determine Propensity for
Error
Reading data, selecting
and analyzing
information
Snapshot
Both A and B
System audit
Slab
Field mask
Sign
Overflow
Serial
Record checks
Logical batches
Batch checks
Block batches
File checks
Transact batches
B
A
Serial number
RDBMS
Process Query
RDBMS
Character
Form Design
columnar
Data mathematical
language
columnar
Select Query
DBMS
Server data base
Transaction type
DBMS
Insert Query
ODBMS
Memo
Change Form
Datasheet
Sequence check
None
None
None
Date
None
None
C
C
A
A
B
B
B
both a and b
both a and b
Delete Query
O.S
Client-Server database
None
None
None
None
None
A
A
B
B
C
Identify the functional limitation of a generalized audit software that enables evidence collection only on the
266 state of an application system after the fact.
276
277
278
279
280
281
282
..is the type of batch check (group of records) for all input records of a particular type is done.
DB2 is an example of __________
____________is used to Modify/Change Data in Table
MS-Access is _________________
Which of the following is not a data type in MS-Access?
To make changes in MS-Access form should be opened in __________________
_______layout of a form displays one record at a time
283
284
285
286
287
Control totals
ODBMS
Update Query
DBMS
Number
Form view
Tabular
Data manipulation
language
Tabular
Update Query
DATABASE
Client data base
Limited ability to
Verify Processing logic
Specific tasks with
original or modified
programs
Picture
Neither A nor B
Concurrent audit
Digit
Input mask
B
A
D
C
C
D
C
A
Internal Schema
Increase data
duplication
Hierachical
Attribute
.mdb
255 char
enter a value
automatically
every
program
Programming
Physical level
256
YES/NO
column
Program
Report
MS-WORD
3 GL
Java
Multiuser DBMS
Conceptual Schema
External Schema
None
Reduce Redundancy
FLAT FILE SYSTEM
Entity
.dbf
16 chra
Increase Efficiency
Relational model
Tuple
.accdb
text
All
None
None
None
long Integer
B
C
C
C
D
for checking
first
check
Non-Procedural
Logical Level
1000
HYPERLINK
field
query
Query
Excel/spreadsheet
4GL
Internet
Distributed DBMS
None
None
All
None
None
63999
AUTONUMBER
None
macro
Macro
None
None
Visual Basic
Database
A
B
C
B
B
D
D
C
D
A
B
B
C
C
309
310
311
312
Client-Server database
key field
Record
Title
Distributed DBMS
Primary key
Tuple
Logo
Multiuser DBMS
Reference Key
Tabel
Picture
Centralized DBMS
None
Attribute
Graphic
B
B
B
B
Aggregate Query
Select Query
Search Query
View, change and
analyze data in
different ways
Both A and B
Neither A nor B
It is a part of database
used by the analysts to
draw conclusions
Many-to-Many
B
D
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
DBMS that supports a database distributed across several different site is called a _____
The _________key does not accept Duplicate and Null values in Field.
______ is often implemented as an array of records
In MS-Access 2010,the ________ control in the form lets the user insert a picture into it.
Which query should be used to retrieve the following information from table of databases "Which employees
313 earn more than Rs.30,000 a month?"
It is a printed page
where users will enter
data
One-to-One
Entity
Classifying
Attribute
Filtering
Relationship
Sorting
A
C
Both A and B
Any of the above
Interface
Joining Date
MS-Outlook
AutoNumber
AutoNumber
D
B
A
A
B
C
C
326 In MS-Access 2010, __________ queries are best suitable to summarize information and looking for trends.
Crosstab
Parameter
Action
327 Which of the following is not a section in Report Design view in MS-Access 2010?
328 Which of the following is not an action query in MS-Access 2010?
329 In MS-Access 2010, which data type is best suitable for storing the price of a commodity?
In MS-Access 2010, which of the following data type creates a field that allows the user to choose a value
330 from another table or from a list of values by using a list box or combo box?
331 In a table, _____________ uniquely identifies each record that is stored in the table.
332 _________ is used to insert values in Table directly.
Detail Section
Make Table
Currency
Summary Section
Update
AutoNumber
D
A
C
OLE Object
Unique Key
Query
Lookup Wizard
Record Key
None
D
C
A
Hyperlink
Primary Key
Form
Authorizing access and
other control over
database
Inserting, updating or
deleting records
Form
Query
Macro
Report
Parameter query
In the Report Header
Section
Update query
In the Report Footer
Section
Crosstab query
In the Page Footer
Section
319
320
321
322
323
324
325
Memo
Foreign Key
Report
339 ___________ provides in Access 2010 is used to convert database tables to the normalized form.
340 Which Ribbon command tab includes the Table Analyzer Wizard in MS Access 2010 ?
341 A Junction Table creates a _______________ relationship between two tables.
A
D
C
342 The Primary key of one table and the matching column in another table is known as ______________.
Matching Key
Foreign Key
specifying conditions
with group by clause
Index key
updating records
None
344 To compact the database in MS Access 2010, the database must be opened in the ___________.
In MS Access 2010,_________ help protect a database from system failures and against mistakes that the
345 Undo command cannot fix.
Inclusive Mode
Exclusive Mode
Normal Mode
Save Mode
Backups
Save Database
Save As Databse
Performance Analyzer
Hi-tech Analyzer
Online Analyzer
Query & Report
Documenter
User and Group
Permissions
Select
FROM
FROM
Controlling/Accessing
Data
Access
Create
INSERT
INSERT
B
A
B
All
None
C
C
Cash receipt
Template Management
software
To cut & paste the
completed and old
document.
PF No,online submission
of loan etc
Bank Receipt
What is the first step in creating a form or report using the Form Wizard or the Report Wizard in MS-Access
337 2010?
338 Which of the following is not an advantage of using a DBMS?
347 The _________ can be used to create reports on database objects for planning and modifying database design. Table Documenter
User and Group
348 Use _____________ to grant or revoke permissions or to change the owner of database objects.
Accounts
Database Documenter
User-level Security
Wizard
349 _____________ commands are used to enforce database security in a multiple user database environment.
350 Which SQL clause is used to retrieve data from database?
351 The __________clause is used to filter records in database.
Security
SELECT
SELECT
Defining Data
Excel
354 What are the features of the Payroll Software provide by the ICAI.
Entering Data
Word
Recruitment
Management
355 Which are the transaction supported by the Billing and Accounting software ?
Billing
356 The software provide creating,printing and sending bulk individual mail is_______________________.
eSecretary software
salary Process
Previous years pending
bills
Contact Management
software
357 The feature Archive is available in K-DOC application for the purpose of____________.
Employee Information Portal feature in Payroll Application provide employee to view
358 their________________.
To save file
Personal profile
PAN Number
Generation of forms as
per formats and
requirement of MCA
Maintain Minutes Book Calculate the filing fee
Salar paid by
Cheque/DD
360 The Payroll application supports three methods of salary disbursement are________________.
MIS
Billing & Accounting
softwatre
A software which provide the structured file management and knowledge mamnagement
363 is_____________________.
The software provides a complete package to manage secretarial requirements & generates forms as per
364 MCA21 requirements
ICAI-File management
application
K-DOC application
Billing & Accounting
softwatre
Payroll Software
Shares
Auto filing of eForms Records/Certificates
Contact Management
eSecretary software
software
Templates
Blank document
Contact Management
eSecretary software
software
369 _____________________ is comprehensive package that combines Income Tax,Service Tax,e-TDS.e-AIR etc. Tax Application
Collected and
370 The financial transactions are to be . leading to different steps in Accounts Compilation.
computed
371 The methods LIFO, FIFO, Moving Average are used to .
Value closing stock
372 The report prepared taking the asset and liability type accounts from the Trial Balance is called.
P & L statement
373 The report that depicts operating profit/loss for a period is ..
Trial balance
Backup utilities
Payroll Software
ICAI-ROC application A
K-DOC application
Knowledge Management
Software
None of the above
K-DOC application
ICAI-ROC application D
A
D
K-DOC application
C
A
C
C
374
375
376
377
378
379
380
381
382
383
Income or expenditure
Journal sheet
Customers
Income side
File
F10
Tally Secure
Ledger
Accounts of Tally
Sales
Sales or purchase
Voucher debtors
Assets
Assets side
Company
F2
Tally Pack
Journal
Gateway of Tally
Production
Asset or liability
Sundry debtors
Liabilities
Expense side
Project
F12
Tally Group
Voucher
Entry of Tally
Mercantile
Profit or loss
Original entry
Suppliers
Payable side
Application
F11
Tally Vault
Trial Balance
Groups of Tally
Manufacture
B
C
D
B
B
C
D
B
B
C
384
385
386
387
388
389
390
Identify the primary group of capital nature that uses bank account and cash in hand as sub groups.
All financial entries in Tally are done using.
The Direct expenses, Purchase account, Direct income are primary groups of ..
The option to delete a sub-group is admissible through the menu
The behavioural attributes of this group cannot be changed.
Credit limits for personal accounts and branches can be done in the ledger mode
We are not allowed to delete a ledger from this mode.
Fixed assets
Vouchers
Capital nature
Alter
Sub-group
Single
Single
Current assets
Groups
Expense nature
Delete
Ledger-group
Multiple
Sub-group
Loan assets
Journal
Revenue nature
Display
Primary-group
Sub-group
Alter-group
Capital assets
Ledgers
Income nature
Shift
Alter-group
Alter-group
Multiple
B
D
C
A
C
B
D
391 All account heads except Cash and Bank are placed in the
392 These are the basis for analysis by potential investors, banks etc.
393
394
395
396
397
398
399
Expenses
Journal
F13
Credit Note
Sales
Double entry mode
Comment
Sales account, Sales tax
account
End of a month
Credit Note
Liability
Previous date
Income
Trial sheet
F12
Payment
Receipt
List entry mode
Memo
Ledger account, Bank
account
First of a year
Contra
Income
Effective date
Assets
Voucher
F10
Receipt
Payment
Choice entry mode
File
Suppliers account,
Purchases account
First of a month
Sales Note
Sales
Current year
Loans
File
F11
Contra
Journals
File entry mode
Narration
Buyer's account, Cash
account
End of a month
Payment
Asset
Configured date
D
C
B
D
D
B
D
1, 2, 3, 4
Credit purchase
1, 3, 4, 2
Cash purchase
2, 4, 3, 1
Both A and B
3, 4, 2, 1
Contra purchase
C
C
Identify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank OCC Account.
The primary document for recording all financial transactions in Tally is the
You can customize the voucher entry screen using the function key.
Identify the voucher type that records fund transfers between cash and bank accounts.
This voucher type records adjustments between ledgers.
The use of classes for payment, receipt and contra vouchers enables data input in
The details of a voucher entry can be given in the .
A
C
D
D
B
Loan
Payment
Receipt
Sales
408 Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10 monitors by credit.
Credit Purchases
Cash Purchases
Expense Purchases
Debit Purchases
409 Identify the voucher type to be chosen for the sale of computers to Anand by cash @ Rs.210000 per unit.
410 A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher..
Cash Ledger
Payment
Sale Sheet
Receipt
Stock Journal
Debit
Purchase Voucher
Contra
C
D
Balance sheet
Accounting reports
Net Loss
Expense
Record book
Ratio analysis
Income
Bill date
Data flow
On closing balance
On closing balance
Trial balance
P & L reports
Net Profit
Taxes
Journal book
Data analysis
Expenses
Voucher date
Stock flow
On net transactions
On net transactions
Journal
Expense reports
Net Account
Income
Day book
Transaction analysis
Loans
Previous date
Cheque flow
On net cash flow
On net cash flow
C
B
C
A
D
A
B
A
B
C
A
422 The management that needs to consolidate the accounts of its various enterprises uses . in Tally.
423 Identify the user who can access audit trails in Tally.
Consolidate company
Owner
Group company
Data Entry operator
Set company
Accountant
B
D
424
425
426
427
428
429
Month-less accounting
Real accounts
Tally Vault
Tally.imp
OLE
Auto numbers
Yearly-entry accounting
Personal accounts
Tally Audit
Tally.cfg
DBMS
Duplicate number
Period-less accounting
Nominal accounts
Tally Report
Tally.exp
ODBC
Sequence number
Alter company
Administrator
Transaction-number
accounting
Expense accounts
Tally Group
Tally.ole
MS-XLS
Range number
411
412
413
414
415
416
417
418
419
420
421
Identify the accounting feature in tally that facilitates splitting financial years for a company data.
Identify the account type by the rule: "Debit the receiver and credit the giver".
The tracking of changes in vouchers and ledger masters is done by..
Tally can import data from other programs and creates a log about the activity in the file..
Import and export of data between Tally and other programs is possible with the help of..
The manual option of voucher numbering leads to..
C
B
B
A
C
B
430 The Tally audit trail tracks changes made to vouchers that are ..
431 The ratio analysis of Bills Receivables or Bills Payables can be displayed with the function key..
A
D
432 The test data generated with correctness proof, data flow analysis and control flow analysis tools is called.
When a real-time system is simulated to generate the same output as the real-time system, the technique is
433 called.
When an auditor expands the extent of substantive tests to determine the impact of defects on the attainment
434 of program objectives, the methodology is.
435 This is an important control in systems that use digital signatures for authentication purposes.
436 The first document where the transaction is entered is called a ..
Parallel trailing
Parallel coding
Correct lister
Sample audit trails
Voucher
Parallel simulation
Formulate correct
hypotheses
Data audit trails
Expense
Tracing parallel
Formulate flaw
hypotheses
Random audit trails
Liability
Transaction sampling
Systematic sampling
Simple sampling
Demographic sampling B
File size
File data
File access
File reorganisation
B
A
C
Stratification
Selection
Formatting output
Statistical
Limited ability to
determine Propensity for
Ex Post Auditing Only Analytical review only Error
Reading data, selecting
Sorting, creating, and Data retrieval, code
and analyzing
printing files
comparison
information
Program
Track
Snapshot
General audit
Post audit
System audit
Balance sheet and trial
Voucher and journal
Ledger and trial balance balance
Income
Debit
Credit
Classify data on a
criteria
Reporting
Limited ability to
Verify Processing logic
Specific tasks with
original or modified
programs
Picture
Concurrent audit
Journal and ledger
Expense
D
C
D
D
B