Sie sind auf Seite 1von 7

Download From http http://caknowledge.

in/
S. No
1
2
3
4
5
6
7

More Question at http://caknowledge.in/itt-question-bank-ca-students/


Option A
Numeric Data
FALSE
Analysis
ACL
Equation Editor
Items of audit interest
File Definition
Review Programming
standards
Detection
Numeric Data
Primary Key

Option B
Date Data
TRUE
Data
IDEA
function Editor
Data Analysis
Stratification
Understand program
specifications
Exclude
Date Data
Unique Key

Option C
Both A and B

Option D
None of the above

Relation
Unix
Calculation Editor
System validation
Print Preiview
Formulate flaw
hypotheses
Sequence checking
Character Data
Secondary Key

Sampling
SOFTCAAT
Testing Editor
All of the above
Append

Answer
C
B
D
C
A
D
B

All of the above


Filter
All of the above
Composite Key

D
A
D
B

Random

Systematic

All of the above

None of the above

Random
TRUE
Field check

Systematic
FALSE
Filter check

All of the above

None of the above

Compare check

Data check

A
A
A

None of the above


None of the above
All of the above
UTS

B
B
B
C
A
A

23 Which of the following statements is true?

Strict Through Processing


WAN
Core Management
System
Audit of controls in any
banking environment is
performed using software
audit

None of the above


MAN
Centre Management
System

Audit of internal
controls is not needed
at all

RTGS,NEFT
Central bank(RBI)
RTGS
UTE
Straight Temporary
Processing
LAN
Cash Management
System
Systems audit are
important for the
verification of the
internal controls

EFT,RTGS
Remitting bank
EFT
UTR

22 CMS stands for ______________________________ in terms of CBS.

NEFT, RTGS
Beneficiary bank
NEFT
UTN
Straight Through
Processing
VLAN
Control Management
System

24 The Management Controls does not include ___________

Managing of Assets

Formulating a security
policy

Developing a business
continuity planning

25 _______is supported by advanced technology infrastructure and has high standards of business functionality.

Firewall

Internet banking

Core Banking Solution

26 CBS Software resides in a Central application server which is located in the ___________

ATM Data centre

Web centre

27 A________ that runs the core banking solutions (CBS) and is centrally accessed by the branches.
28 The _________of the application is capable of only entering the data at the end point that is branches.

ATM Server
System version
Virtual Local Area
Network
Data base server
LAN
Application
Development

Middleware
Central Application
Server
Application Version
Local Area Network
ATM DATA Server
Virtual Networks

8
9
10
11

Questions
In IDEA, Statistics functions can be applied on_________.
In IDEA, increment value in Stratification function can be fixed or free interval.
In IDEA, Stratified Random functions is a part of which menu.
Which of the following is not an Audit Software
Using which functions to perform more complex calculations and exception testing in IDEA?
Which of the following are categories of computer audit function ?
In the following list which is a audit function?
Which is the following step involved in a source code review methodology ?
In IDEA which functions should be used to find repeated values ?
In IDEA, Stratification functions can be applied on which type of data ?
In IDEA,Summarization accumulates the values of Numeric fields for each____________.

12 In which sampling,selecting sampling units using a fixed interval between selections is_______________.
Ensures that all combinations of sampling units in the population have an equal chance of selection
13 is____________.
14 Input Control method is a part of Application Control Group.
15 Which is the following type of check that can be run when data is input through terminal ?
In _______system money transfers are done on a one to one basis while in _______system transfer is done in
16 batches.
17 All the money transfers take place in the books of the _________________
18 ________system of money transfer is primarily used for large transactions.
19 In RTGS, the STP generates an ___________for every outbound RTGS transaction.
20 STP stands for ________________________________ in terms of CBS.
21 ________ is a method of creating virtual networks within a physical network.

29 The application server would be placed in a trusted inside zone in a separate ____________
30 Application software would access the ________
31 __________ are capable of being connected only when devices are connected to a switch.
_____________refers to the process of developing software which would produce the required output from
32 the input provided of course, using the necessary hardware and communication systems.
The______________is essential to ensure that computer security records are stored in sufficient detail for
33 appropriate period of time.
34 All the various servers in the central data centre are seggregated through _______
The __________ is a complete process in the computer so that it ensures that data that is fed in conforms to
35 certain prerequisite conditions.

36
37
38
39

When the central Data base is busy with central end of day activities or for any other reason, the file
containing the account balance of the customer is sent to the ATM switch. Such a file is called __________
The IBDS is located in a ____________
The main components of Internet Banking system consist of __________
Copy of the Anti Virus Software was updated promptly and regularly at the Data Centre and pushed into all of
the servers and in all the systems in the branches by ________

None of the above


B
Laying down
procedures for system
development
A
Web centre
Central Office Data
Centre.

B
C

Wide Area Network


Domain Name Server
MAN

Domain Name Server


Firewall
Personnal Area
Network
Application Server
WAN

Database Server
Client version

A
A
B

Software Development

Server Development

System Development

Review Management
LANs

RTGS
VLANs

Log management
WANs

Authorized Controller C
MANs
B

Consalidation

Password Policy

protection

Validation

Positive Balance File


Militarised zone
Web server

Application Server
City Zone
IBAS

Centralised Data base


security
State zone
IBDS

Central Office Data


Centre.
demilitarised zone
All the above

A
D
D

Hacking Method

Push-pull method

Both A &B

None of the Above

40 The __________which is also residing in the server at the branch actually does the banking operations.
In Core Banking concept all the systems of the bank are connected to the Central office by means of a
41 connectivity which may be either a _________ or a dial up line.

Sytem software

utility software

Application Software

Application Server

local line

Broadband

None

42 The ________ is generated by the software and directly sent to equipment for printed the Pin Mailer.
____________would also include the existence of built in controls in the system to ensure proper processing
43 of input data so as to provide the required output.
____________refers to an arrangement wherein the issuing bank acts on the request and instructions of a
44 customer.

16 digit number

Leased line
Personal Identification
Number

Net transaction ID NO

ATM No

Output Control

Input control

Process Control

Data Control

Letter of Tax
Business Continuity
Planning
User testing
HCL Technologies

Letter of Payable
Disaster Recovery
Planning
(a) & (b) both
TCS

Letter of Receible

45 _______________ is a process by which the bank ensures the maintenance and recovery of operations.
46 At which phase of testing the version of software is called beta version?
47 Finacle developed by _________

Letter of Credit
Business Recovery
Planning
Programmer testing
Infosys

B
C
A

48 The number that is stored in the ATM switch is the difference of which of the following number?
The information retrieval of transactions taking place at ATM located at remote locations is through
49 _________

Pin No - offset value


Offset value - Pin No
Pin No - Natural Pin
Soft copy of Electronic Hard copy of Electronic
journal
Journal
Cash register

None
None of above
I-Flex
Offset Value - Natural
Pin
(a) and (b) both

50 The number that is generated as soon as the customer inserts the card in the ATM machine is __________

Offset value

Pin sent to customer

Natural Pin

51 The tab in Expression Builder in which we write expressions is known as _____________.

Expression Elements

Operator Button

Card Number
Expression Builder
window

Will match all text


52 The criteria expression LIKE?B*.
starting from B
__________ queries are useful for summarizing information, and are somewhat similar to pivot tables in MS53 Excel.
Select query

Will match all text


ending from B

Expression Box
Will match all text
having second character
as B

Crosstab query

54
55
56
57
58
59

Alphabetical Order
Form only
FALSE
ActiveX control
Caption
Inner-Report
Table or query,InnerReport
Data Definition
Language
Pie Chart
Pie Chart
.ACCDB

At the end of the table


Form but not in table
TRUE
Unbounded Controls
Background
Sub-Report
Table or query,MainReport

While entering record in Datasheet view, in which order the records can be entered
When you delete the record in form, it deletes the record from__________.
Having clause is used in the aggregate query in MS Access 2010
The controls that are not linked to any field of the table or query on the form are known as ________.
Which property of the form can be used to insert a background image in MS Access 2010?
___________ is a report that is inserted in another report in MS Access 2010.

60 A bound main report is based on a ______________ and its _____________ contain realted information.
61
62
63
64

DDL stands for ____________


A___________used to compare multiple values of categories or differences over a period of time.
A________used to compare trends over a period of time.
To create a read-only copy of the database, which of the following file format can be used?
The database administrator created a split database and created a front-end database and back-end database
65 file.Which of the file should be stored on the server ?

Action query

Parameter query

Any where in the table


Table but not in Form

Beginning of the table B


Form & Table
D
B
Bound Controls
B
Picture
D
Insert-Report
C

Graphics Control
Record Source
Inside-Report
Table or query,SubReport
Detailed Definition
Data Defined Language Language
Area Chart
Bar Chart
Line Chart
Bar Chart
.ACCDE
.MDW

None of them

Back-end database

HTML and InfoPath

69 What is the memo data type field used for?

To add table
Those records that
match an entity in a
field

Access Forms
Visual Basic Application Excel attachment
Options in Tool menu of
Access
Manage replies
All of the above
Number
Date/time
AutoNumber
For shout text entries
To store objects created
of no more than 255
in other programs
For long text entries
characters
Records that meet any of
Records based on a
several criteria you
criterion you specify
specify
All of above

71 DML stands for _____________


72 Which editor was provided for use with Access Basic?

Detailed Maintaining
Language
The Visual Basic 1.0
editor

Both of them

None of the above


Data Detailed
Language
Column Chart
Column Chart
.ACCDT

Front-end database

70 The filter By selection feature allows you to filter:

Will match all text


starting with a digit

66 In which formats can the Collect Data through email message feature can send the data entry form?
Once a mail is sent using the collect data through email message feature in Access 2010. The mail status can
67 be checked using________________.
68 The ___________ type of data cannot be collected using Collect data through email messages.

Export to Outlook
Text

A
D
B
B

A
C
D

Data Maintaining
Language

Data Manipulation
Language

Detailed Manipulation
Language
C

Notepad

The QuickBasic editor

All of above

Change The Structure


Of Tables
Network Database
Model
Memo

Click the report, and on


Select the Pivot Table the Pivot Table toolbar,
worksheet and press F9 click the refresh data
on the keyboard
button
Pivote Table & Pivot
Design View
Chart View
Hyperlink
Memo
Query
Macro
DML
DDL
Insert, Update Or Delete Authorizing Access And
Records And Data
Other Control Over
Values
Database
Relational Database
Object Oriented Database
Model
Model
Number
Date/time

Data Definition

Data Refinement

Establishing Relationship None Of The Above

Not update

update automatically

have to update manually

never update

Relationship

Join

Query

None Of These

73 How do you update Pivot Table report data after changes are made to the source data?

Save your changes,


close the workbook,
and then reopen it.

74
75
76
77

Datasheet View
Ole Object
Form
DCL

What are the different views to display a Table ?


Which Of The Following Creates A Drop Down List Of Values To Choose From?
A __________ Enables You To View Data From A Table Based On A Specific Criterion
The Database Language That Allows You To Access Or Maintain Data In A Database

78 DCL Provides Commands To Perform Actions Like


79 Which is not a Database Model ?
80 Which Of The Field Has Width 8 Bytes?
This Is The Stage In Database Design Where One Gathers And List All The Necessary Fields For The
81 Database Project.
82 Whenever a tables gets update, the dependent query will
The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A
83 ___________ Between Tables

84 What is the purpose of the Switchboard Manager in Microsoft Access 2010?

85 How does a query-based report differ in design to a report based on just one table?
86 How would you include some plain text into a mailing label report?
87 In a Microsoft Access 2010 report, the page numbering would most likely be placed into the:
If you wished to present a professionally looking form on screen that would show all the necessary
88 information, which of the following form design tools would you most likely use?
89 An .ACCDE file is a ___________ version of the original .ACCDB file.
Which type of the query is used to accept the value from the user while executing the query and fetch records
90 accordingly
91 To encrypt the databse in Access 2010 must be opened in the __________________.
92 To extract the records based on date field, which of the symbol should be used
93 FIX() is a kind of ____ function in MS-Access 2010.
94 MS-Access 2010 has added new features of ______ to eliminate the need of VBA code
95 Encrypting a database does not restrict access to database objects, but to __________ the database.
96 Third Party Encryption Technology can also be applied to the database of Microsoft Access 2010.
97 To create a split database in MS Access 2010 go to which tab?
98 After spliting database,frontend database holds_________________.
99 After spliting database,backend database holds_________________.
100 When an Access database is split, it creates two files_________________.
A Data Access Page is a special type of _________ that allows users to interface with database using Internet
101 Explorer.
102 OLAP systems use concept of OLAP cube called a ______________ cube
103 The data which is to be exported from Tally.ERP 9 can be in ________ format.
104 In Tally ERP-9 Remote Access is also known as __________.
105 Accessing data store on a remote location using Internet in Tally.ERP9 is called____________.
106 Tally.ERP9 can be classified user in two categories are___________.
107 Which of the following is not a predefined security level provided by Tally.ERP 9?
108 The business model is represented in the graphical form using ______________ and ________________
109 _______ integrates supply and demand mangement within and across companies.
110 OLAP stands for _________________.
111 __________ includes transportation from Suppliers and receiving inventory.
112 Which of the following is not the service area of SCM?
Which step of the ERP implementation involves, educating and recruiting end users throughtout the
113 implementation process?
The system ____________ process will address issues such as software configuration, hardware acquisition
114 and software testing.
A __________________ review is recommended to ensure that all business objectives established during the
115 planning phase are achieved.
In _________________ stages, auditors have access to rudimentary ERP tools and capabilities for auditing
116 security configurations.
Immediate posting and updation of books of accounts as soon as the transactions are entered. This is called as
117 __________
118
119
120
121
122
123
124
125
126
127
128
129
130
131

134
135
136
137
138

All Of Above
Lookup Wizard
Report
None Of Above

D
D
B
A

None Of Above
Structureed Database
Model
Hyperlink

To build a main
Creates the macros used To allow the user to
To allow changing
switchboard form that to program an automatic switch from one database from one report to
controls all other forms. application.
file to another.
another.
The only report type
The reports are
It doesn't have as many
available is the Design
restricted in size.
It doesnt
design options.
Report.
Type the text directly
Use the Mailing label
into the label.
Use the > button.
wizard text option.
Use the >> button.
Report Footer
Section Header
Page Footer
Page Header
All The tools of the form Form Wizard
design control gallery.
Columnar
Open-down
None of the above

D
C

B
C
C

Pivot Table
Fixed-down

Pivot Chart
Locked-down

Make Table Query


Open Secure mode
$
Math
Macro
Open
TRUE
Create Tab
Forms
Tables
A back-end database &
front-end database

Update Query
Open Inclusive mode
#
Date
Form
Modify
FALSE
External Tab
Query
Forms
A new database & Old
database.

Delete Query
Open Exclusive mode
()
Text
Report
Read

Parameter Query
Open Read Mode
""
None of the above
None of the above
Write

File tab
Report
Query
primary database &
secondary database

Database Tools
All of the above
Report

D
C
B
A
A
A
A
D
D
A

None of the above

XML page
single dimensional
XML
Networking
Local Data
Local User
Owner

HTML Page
hyper dimensional
HTML
VB.Net
Remote Data
Remote User
Public User

Web page
multi dimensional
ASCII
Tally.Net
Internet Data
Both A & B
Data Entry

None of the above


none
ALL
None of the above
None of the above
None of the above
Tally.NET User

C
C
D
C
B
C
B

charts, pictures
BPM
Online Analysis
Processing
Inbound Operations
Logistics

smart art, clip art


SCM
Online Analytical
Processing
Outbound Operations
Asset Management

flowcharts, flow diagrams


PLM
Online Analytical
Programming
Sourcing planning
PLM

graphs, shapes
CRM

C
B

None of the above


Production planning
CRM

B
A
D

Step 1

Step 2

Step 3

Step 4

implementation

upgradation

installation

migration

pre implementation

under process review

post implementation

None of the above

post implementation

pre implementation

Both A & B

Either A Or B

Immediate Processing
Form 27, Annexure to
27

Real Time Processing


Form 26Q, Annexure to
26Q

Business Processing

All of the above

File Validation Utility


distributed

File Valuation Program


isolated

File Valuation Utility


de-centralized

B
A

Data Modeling
information driven
historical data
backup
supply and chain
outbound operations
corporate
back office

Business Modeling
resource driven
operational data
data
supply and sortage
hybridbound operations
strategic
staff

Business Intelligence
none
none
none
none
none
none
none

D
A
B
A
A
B
B
A

ERP
decryption

SCM
cryptography

none
none

A
A

Immediate Processing
Integrated Information
Systems
Form 27, Annexure to
27

Real Time Processing


Decision Support
Systems
Form 26Q, Annexure to
26Q

Business Processing
Non-Isolated
Information Systems

All of the above

File Validation Utility

File Valuation Program

File Valuation Utility

Tally Adjust
Tally Fit
HTTP-XML based data Unlimited multi-user
interchange
support

Tally AutoFit

Audit Feature

Web Publishing

Tally.NET

Email facility

Contact On Load

Either A or B

None of the above

Interactive Processing
Form 26, Annexure to
Which of the following ETDS forms are available in Tally.ERP 9?
26
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility called File Validation
__________________
Program
ERP systems provide an access to the__________ data
integrated
________________ is a tool that refers to skills, processes, technologies, applications and practices used to
facilitate better, accurate and quicker decision making.
Data Warehousing
Business intelligence systems are ________ Decision Support Systems.
data-driven
Data warehousing technology is the process of creating and utilizing the companys __________
general data
The data in the Warehouse comes from the _________ environment and external sources.
operational
In essence, SCM integrates ___________ management within and across companies.
supply and demand
_____________ including all fulfillment activities, warehousing and transportation to customers.
Inbound operations
Customer Relationship Management is a ________________ level strategy.
business
Operational CRM provides support to ___________ business processes.
front office
Collaborative ______ ultimate goal is to use information collected by all departments to improve the quality
of services provided by the company.
CRM's
Tally.ERP 9 follows the DES __________ method to safeguard the data.
encryption
Immediate posting and updation of books of accounts as soon as the transactions are entered. This is called as
__________
Interactive Processing

132 Business Intelligence Systems are data-driven ___________________.


133

All of the above

Information Systems
Form 26, Annexure to
Which of the following ETDS forms are available in Tally.ERP 9?
26
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility called File Validation
__________________
Program
With ______________ technology the characters are reduced in breadth and user is allowed to input
additional characters which would make the account name, entity complete and readable.
Tally Fix
In Tally.ERP 9 __________________ provides the user with administrator rights and the capability to check
the entries made by the authorised users and alter these entries, if necessary.
User-defined Security
__________________ is an enabling framework which establishes a connection through which the remote
Direct Web Browser
user can access the Client's data without copying/transferring the data.
Access
If we want the company to be connected automatically for remote access on load, the property __________
Allow to Connect
needs to be set it as Yes.
Company

C
B

139 ___________________ technology is the process of creating and utilizing the company's historical data.
140 Is there a fixed qualification for internal auditor_________.
141 Which of the following will not appear in the home page of K-Doc?
To change an email header so that the message appears to have originated from someone or somewhere other
142 than the actual source is known as___________.
143 To playfully satirize a website is known as_____________.
_________is the complete package to manage the billing requirements of a CA firm on cash system of
144 accounting.

Data Warehousing
TRUE
Powerpoint

Data Modeling
FALSE
Word

Business Modeling

Business Intelligence

Paste Document

My Templates

A
B
C

Email middle attack.


Web tapping

Email Spoofing.
Web Interception

Email tracking
Web threating

B
C

Payroll

eSecretary

Email hacking.
Web spoofing
Billing and Accounting
software

Contact Management

Greeting Management

Email Management

K-DOC application
Share certificate
printing

145 Which of the following is not a/an feature of eSecretary?

K-DOC application

ICAI XBRL Software

Payroll

eSecretary

ICAI XBRL Software

ICAI-ROC application B

Tax audit

Internal auditiing

None of the Above

146 Annual return preparation can be done using ________.


ICAI-ROC application
________is correspondence automation & management software that is seamlessly integrated with Microsoft
147 Office.
K-DOC application
________ is an independent,objective assurance and consulting activity designed to add value and improve an
148 organization's operations.
Statutory audit

149 Which of the following is/are the main purpose of the internal audit?
Financial reporting
As per _____________of the Income tax Act,every person carrying on business or profession is requires to get
150 his accounts audited by a CA before the "specified date".
Section 45
__________________ refers to use software/applications to automatically perform tasks such as
accounting,preparing trial balance, financial statements etc. and electronically transmit data or information
151 using internet..
ERP
Foreign Exports
152 FEMA Stands for _______________.
Management Act
Which application helps the management to allocate the revenue to the credit of the right employee who
Resource allocation and
153 identified the opportunity?
scheduling

Operations of the
organization

Both A and B

Either A or B

Section 44AD

Section 43B

Section 44AB

None of the Above

None of the Above

Client management

Office automation
Financial Enterprise
Management Act

Either A or B
Foreign Exchange
Managament Act
Document Management
Knowledge management Systems

154 Who has full privileges in the financial accounting application?


_________is the centre point of the financial accounting application as any transactions having financial
155 impact carried out in any other module will reflect in this module.

Database administrator Account administrator

System administrator

User Administrator

AP module

GL module

AR module

FA module

156 In Financial Accounting Application,the transactions flow from GL (General ledger) to other modules.

TRUE

FALSE

157 Which of the functionalities is not provided in the purchasing module of Financial Accounting Application.
In Financial Accounting Application,automatic sequence number of documents control is not required in
158 which of the following module?

Evaluation of Vendors

Receipts of goods or
service

Invite and analyze


quotations from vendors

Comparison with
budgets

Purchasing

Accounts Payable

Expense Management

Fixed assets

159 Which module of Financial Accounting Application can be used for assigning credit limit to customers?
160 Which of these will trigger/alert for timely payment ?

Sales
Accounts Receivable
HR and Payroll
applications

Accounts Payable
Expense Management

Accounts Receivable
Bank Reconcilations

B
C

161 We can manage interviews,offers and job vacancies by using which of the application?

Purchasing
Accounts Payable
Resource allocation and
scheduling

162 ________,___________,__________ are commonly referred to as CIA in information security parlance.


___________provides information about updation of project cost based on time spent by employees on
163 various projects.

Confidentiality,Integrit Confidentiality,Integrity Confidentiality,Integrity


y and Availability
and Authentication
and Access rights
Performance
management system
HR management system Payroll
Capture the Key
Employee designation
Performance Indicators and reporting structure

164 Which of the follwing is not a/an functionality provided by PMS?


___________automates the calculation of salary for taking inputs from the timesheet application, leaves from
165 Leave Management System and salary details from the HR master data.
Timesheet System

166 Which of the follwing is not a control in Leave Management System?


167 Permanent Audit File are obtained once but updated on __________basis.

168 In Permanent Audit file, _______ is not the key data documented.
169 ________is a type of training in which user logon on the training server with a user ID and password.
In some cases, trainee is supposed to appear for the examination/test at the end of the training
170 is____________.
171 ________ are the hardware/infrastructure equipments used in a CA firm.
_____________means information available in the organization should not be altered or modified by
172 unauthorized personnel.
173 Which of these is/are the standard email program used in an organization?

174
175
176
177
178

Which of the following is not a characteristics of WAN?


_________is protection of information assets from threats to preserve their value.
Which types of information assets need to be secured in a CA Office?
The extent and level of _________ would depend on the nature of information.
__________ of information might be affected due to denial of service attack or some other reasons.
__________means the sender cannot deny having sent a message and receiver cannot deny receiving the
179 message.
180 Risk may not be _______ in nature.
The process of identifying an individual, usually based on user id and password in an organization is
181 called______________.
182 Which of the following is not a software equipment required in a CA's office?
183 Which of the following is not an application arranged by ICAI?
184 PBX stands for ________
185 ________ is the process of meeting the financial goals through the proper management of finances.
___________ can be defined as the process of setting the procedures in the organization for achieving the
186 predefined goals.
________ shows ability of company to pay back long term loans along with interest or other charges from
187 generation of profit from its operations.
_____________________is the simplest method of comparing different stocks at a point of time to make
188 investment decisions.

189 The very first line of code of XML file is_____________.

190 Every bit of data has to start and end with an identical tag
191 Deletion of XML Map is done through __________.
192 Excel works primarily with ________ types of XML files.
193 Method of tax calculations shall change according to _________.
________ is a process used in statistical analysis in which a predetermined number of observations will be
194 taken from a larger population.

Knowledge management None of the Above


B
Confidentiality,Integra
tion and
Authentication
A

Automated alerts for


pending appraisals

HR management System Payroll System

Timesheet application D
Prepare summary or
bell curve analysis of
all employees
B
Knowledge
management System C

Reduce administrative
burden on HR
half-yearly

Excess leave
yearly

Error free capture of


leave details
monthy

Approval workflow
quarterly

Organization chart
Internal Training

Clients accounting
manual
E-Learning

Copies of clients
incorporation documents
like MoC
Classroom Training

Copies of important
contracts or long term
lease agreements
C
E-Training
B

Classroom Training
PC

E-Learning
Application Server

Virtual Learning
WAN

All the Above


All the Above

B
D

Confidentiality
Microsoft Exchange
Most WANs are owned
by only one
organization.
Confidentiality
Client data
Availability
Integrity

Integrity
Lotus Notes
Compared to LAN, its
transmission speed is
low
Integrity
Own data
Confidentiality
Authentication

Availability
Both A and B

B
C

WAN uses only private


networks.
Information Security
Own documents
Integrity
Confidentiality

Authentication
None of the Above
Switches are used to
connect LAN and
WAN
None of the above
All the above
Authentication
Availability

Non-Repudiation
reputational

Integrity
financial

Authentication
operational

Confidentiality
vulnerable

A
D

Availability
Resource allocation and
scheduling
ICAI-XBRL suite
Private Exchange
Branch

Authentication

Confidentiality

Integrity

Client management
K-DOC

HR and Payroll
Billing and Accounting

C
B

B
C
D
B
D

D
D

Corporate planning
Monte Carlo
Simulation

None of the Above


ICAI-TOC
Public Branch
Public Exchange Branch Private Branch exchange exchange
Personal Finance
Monte Carlo simulation Financial planning
planning
Corporate Planning &
Corporate Planning
Decision Tree Analysis
Analysis

Debt Assets Ratio

Interest Coverage Ratio Total Fund Ration

None of the above

Earnings Per share


<?xml version="3.0"
encoding="ISO-88591"?>

Fixed Asset Over ratio


<?xml version="2.0"
encoding="ISO-88591"?>

Price Earnings Multiple


<?xml version="1.0"
encoding="ISO-88591"?>

Gross Profit Ratio


C
<?xml version="0.0"
encoding="ISO-88591"?>
C

<TagName>Data</Tag
Name>
Directally Delete
Command
3
Annual Income

</TagName>Data<Tag
Name>

</TagName>Data</TagN <TagName>Data<Tag
ame>
Name>
A

Delete Button
2
DOB

XML Maps Dialog Box


1
status of assess

C
C
B

Snowball sampling

Sampling

Systematic sampling

195 In __________, Individuals are selected at regular intervals from a list of the whole population.
In ______________ each individual is chosen entirely by chance and each member of the population has an
196 equal chance, or probability, of being selected.

Clustered sampling

Sampling

Systematic sampling

Snowball sampling

Convenience sampling

Systematic sampling

197
198
199
200

Which method is commonly used in social sciences when investigating hard to reach groups?
__________ are useful for quick reading and easy understanding, particularly for top management.
Popular methods of capital budgeting include _________ and payback period.
_________ is the value of all future cash inflows less future cash outflows as on today.
___________is the process of defining and analyzing the dangers to individuals, businesses and government
201 agencies posed by potential natural and human-caused adverse events.

Quota Sampling
Balance sheet
discounted cash flow
Net present value

Sampling
Summary reports
internal rate of return
Working capital

Snowball sampling
IRR
net present value
IRR

None of the above


4
All of the above.
Simple random
sampling
Simple random
sampling
Simple random
sampling
Simple random
sampling
NPV
All the above
PMT

Sensitivity analysis

Risk analysis

Qualitative risk analysis

Scenario analysis

202 __________ which is used more often, does not involve numerical probabilities or predictions of loss.
________ are generally used to present information in a simple and better way and also be used to analyse the
203 risk in a better way.
It is a technique used to determine how different values of an independent variable will impact a particular
204 dependent variable under a given set of assumptions.
_______ involves computing different reinvestment rates for expected returns that are reinvested during the
205 investment horizon.
206 Which function that is used to calculate the payment for specific loan terms ____________
207 ________helps to break down the Return on Equity
208 _______ is a common method for financing property, facilities, and equipment.

Sensitivity analysis

Risk analysis

Qualitative risk analysis

Scenario analysis

Graphs

Sparklines

Both A& B

Charts

Decision Tree analysis Sensitivity analysis

Both A& B

Neither A &B

Scenario analysis
SUMIF()
Du Point Analysis
Mortagage

Sensitivity analysis
PMT
Return on Investment
Leasing

Decision Tree Analysis


COUNTIF()
Profitability Ration
Rent

None
None of the above
None of the above
All the above

A
B
A
B

209 Which option can be used to split windows into four in ms excel 2010?

Format -> Window

Window -> Split

View -> Window -> Split


Settings Tab under the
tab Data -> Filter >Advanced Filter
Counts cells having
number

View -> Split

All of the above


Counts non-empty
cells

A1 $ "@" $ B1

Only B & C

Pie Chart

210 How to restrict the values of a cell so that only a list can be entered in a cell?
211 What does the COUNTA() function do in MS Excel 2010 ?
If the value in A1 is "ITT" and in B1 is "ICAI ", which function in Excel will return " ITT @ ICAI " in cell
212 C1?

Settings Tab under the Settings Tab under the


Tab Format -> Cells
tab Data -> Validation
Counts cells having
alphabets
Counts empty cells
A1+ "@" + B1

213 Which of the following function will return a value of 7?

ROUNDUP(7.4999,0)

A1 # "@" # B1
A1 & "@" & B1
ROUNDDOWN(7.4999
,0)
ROUND(7.4999,0)

214 A tiny chart embedded in a worksheet cell that provides a visual representation of data is a _________

Bar Chart

Sparkline

Pivot Chart

C
B
D
B
C
D
C
B
D
A

_________is a graphical equivalent of a pivot table, which is used to visualise PivotTable report summary
215 data
216 To frequently print a specific range of cells on a worksheet , the option used is
217 Non-excel files can be opened in MS Excel using the
218 _____is a text concatenation operator.

Bar Chart
Pagelayout -> Page
Setup -> Print Area
Add Ins
#

219
220
221
222
223
224

Which of the following is correct?


___ function in MS-Excel returns the remainder after number is divided by divisor.
EXCEL Work in ________ Mode
In Ms-Excel 2010, ______ is Last Column Name?
In Excel 2010, the default criteria setting for AutoFilter in each field is __________.
Subtotal option is in __________ group of Data tab in Excel 2010.

225 Which of the following cannot store connection information of an external data source in Excel 2010?
226 The default pivot chart type in Excel 2010 is a ________ chart.
To consolidate Excel data, ________________________ is used when worksheet data does not have a
227 consistent layout or pattern.
228 In Excel 2010, the __________ function is used to generate a forecast.
______function calculates the payment for a loan (installment) based on constant payments and a constant
229 interest rate.
__________ are easy-to-use filtering components that enable the user to quickly filter the data in a PivotTable
230 report in MS-Excel 2010.
231 In Excel 2010, range C3:C6 indicates _______________.
232 Keyboard shortcut to show a shortcut menu in MS Excel 2010 is _______________.
233 To select multiple non-adjacent cells in an Excel 2010 worksheet, click them holding _________ key.
A quick way to return to a specific area of a worksheet in Excel 2010 is to type the cell address or range name
234 in the ____________.

Pivot Chart
Pagelayout -> Print
Area
Developer Tab
$

Sparklines

None of the above

Print Area
Analysis Tool Pak
*

A
C
C

AVERAGE(4,5,6,7)
MOD()
3
XWE
Top10
Sort & Filter

Page Setup -> Print Area


Text Import wizard
&
AVERAGE(A1:A6,B1:B6
AVERAGE(A1,B1,C1) )
INT()
DIV()
5
7
XFD
XAA
Bottom10
Top half
Outline
Data Tools

All of the above


REMAINDER()
11
AAA
All
Calculation

D
A
A
B
D
B

Workbook
Column
Consolidation by
position
TREND

.odc file
Line
Consolidation by
category
STANDARDIZE

.htm file
Scatter
Consolidation using 3-D
formulas
CORREL

.udcx file
Bubble

C
A

Any of the above


GROWTH

C
A

PV

NPV

IRR

PMT

Sparklines
Cells C3 through C6
Shift + F10
Ctrl

Slicers
Cell C3 and Cell C6
Shift + F1
Alt

Macros
Cell C4 and Cell C5
Shift + F11
Shift

Data Forms
None of the above
Shift + F12
Ctrl + Shift

B
A
A
A

Name Box

Formula Bar

Zoom Box

Sheet Tab

Name of the workbook Name of the worksheet


currently working on
currently working on

Name of the cell or range Formula in the cell


currently working on
currently working on

Copy handle

Fill handle

Insert handle

Border

Insert
32

Replace
64

Paste
60

Undo
80

D
B

239 Which feature in Excel 2010 enables us to find the input values needed to achieve a goal or objective?

Goal Seek

Consolidate

Data Validation

Subtotal

240 The INT function________

Rounds a number to a
desired multiple

Rounds a number down


to the nearest integer
Rounds a number up

Calculates interest

241 Which of the following statements about scenarios is not true?

A scenario is a set of
values saved with the
workbook.

A workbook can have


one scenario per sheet.

Scenarios provide a way Scenarios help to


to see different solutions perform what-if
for worksheet formulas. analysis.

242
243
244
245

A formatted description
of each scenario on a
separate worksheet
Arguments
Trendlining
Field Options

A worksheet with a
separate thumbnail for
each formula
Constraints
Thumbnail
Field Settings
They allow you to
generate e-mail enabled
reports.
Accessibility of data and
computer programs
Document totals

A worksheet with
separate macros for
each scenario
Parameters
Add-in
Field Structure
They allow you to
print the reports with
various settings.

A
D
D
C

They allow you to add


dynamic data.
Absence of input
documents
Financial totals

A formatted defined
range of Solver and
Goal Seek solutions
Limitations
Enhancement bit
Field Pane
They allow you to
rearrange row and
column data.
Lack of visible
transaction trail
Record totals

All of the above


Hash totals

D
D

Table level

Data Integrity

Batch check

System test

Sequence account

Data account

Suspense account

Update account

Bottom up test
Embedded code
Database with master
table
Modelling
Test data

Hybrid test
Program code
Executable program
with master copy
Analyzing
Table data

Stub test
Database Analyzers
Transaction data with
master transaction
Mapping
Item data

Top down test


Database code
Module programs with
snapshots
Tracing
Record data

D
A

235 In MS-Excel 2010, the Name Box shows the ________________________.


In Excel 2010, what is represented by the small black square in the lower-right corner of an active cell or
236 range?
Suppose we accidentally erased a record in an Excel worksheet. Which command can be used to restore it
237 immediately?
238 Excel 2010 offers up to____________sort levels.

What is a scenario summary report?


What does Solver uses in its dialog box?
What term describes a feature that gives Excel enhanced capability?
What dialog box allows you to change a field name in a PivotTable?

246 Why are PivotTables considered interactive?


247 Identify the need for controls and auditing in a computerised environment.
248 Grand totals calculated for any code on a document in the batch are called..
Control that checks if correct sequence of commands and update parameters are passed from the application
249 software to the database.
With respect to data integrity control, when monetary transactions are processed against master files without a
250 match, we should maintain a .
The system test that tests the top-level modules first and then the lower modules are simulated with dummy
251 modules to check the interfaces is called .
252 Identify the audit technique that examines each transaction as it passes through the system.
253 The Core Image Comparison audit technique compares the.
254 The technique used by an auditor to list unused program instructions is..
255 The sample data created and used for the purpose of testing the application system is called.
The test data (dummy unit) implemented in the normal processing of the system over a period of time is
256 known as.

B
C
A

Integrated Test Facility Black box Test Facility Graph testing

Whitebox testing

257 The test data generated with correctness proof, data flow analysis and control flow analysis tools is called.
258 The organisational, management, maintenance and access controls are categories of
When a real-time system is simulated to generate the same output as the real-time system, the technique is
259 called.
When an auditor expands the extent of substantive tests to determine the impact of defects on the attainment
260 of program objectives, the methodology is.
261 This is an important control in systems that use digital signatures for authentication purposes.

Test item block


Application controls

Test data pack


General controls

Test program pack


Check controls

Test record pack


Input controls

B
B

Parallel trailing

Tracing parallel
Formulate flaw
hypotheses
Random audit trails

Parallel coding
Correct lister
Sample audit trails

Parallel simulation
Formulate correct
hypotheses
Data audit trails

Cross reference lister


Public audit trails

262 Selecting transactions based on a sampling rate is called . method.


The capability of the generalized audit software to read different data coding schemes, different record
263 formats and different file structures is.

Transaction sampling

Systematic sampling

Simple sampling

Demographic sampling B

File size

File data

File access

Sort and merge files

Sampling nth item

Formatting output

File reorganisation
Classify data on a
criteria

264 The audit software capability of frequency analysis is to.


The audit functions of attributes sampling, variables sampling, stratified sampling are included in .
265 functions.

Stratification

Selection

Reporting

Data retrieval, code


comparison
Track
Processing controls
Post audit
Range
Data mask

Statistical
Limited ability to
determine Propensity for
Error
Reading data, selecting
and analyzing
information
Snapshot
Both A and B
System audit
Slab
Field mask

Sign

Overflow

Serial

Record checks
Logical batches

Batch checks
Block batches

File checks
Transact batches

B
A

Serial number
RDBMS
Process Query
RDBMS
Character
Form Design
columnar
Data mathematical
language
columnar
Select Query
DBMS
Server data base

Transaction type
DBMS
Insert Query
ODBMS
Memo
Change Form
Datasheet

Sequence check
None
None
None
Date
None
None

C
C
A
A
B
B
B

both a and b
both a and b
Delete Query
O.S
Client-Server database

None
None
None
None
None

A
A
B
B
C

Data Definition Language None

Identify the functional limitation of a generalized audit software that enables evidence collection only on the
266 state of an application system after the fact.

Ex Post Auditing Only Analytical review only


Sorting, creating, and
printing files
Program
Input controls
General audit
List
Format mask

The purpose-written audit programs are used for..


Picture of a transaction as it flows through the computer systems is called..
The application controls are .
Identify the type of audit when auditors are members of the systems development team.
Identify the field check - "If a set of values is defined, is the input data one of these defined values?"
The field check that conforms if data input for a field is in a particular format.
The field check on a processed data that fails if a field is not initialized to zero or errors occur during
273 calculation is
Range
The validation checks applied to a field depending on its logical interrelationships with the other fields in the
274 record are called ..
Field checks
275 A group of records or transactions that are contiguous constitute ..
Physical batches
267
268
269
270
271
272

276
277
278
279
280
281
282

..is the type of batch check (group of records) for all input records of a particular type is done.
DB2 is an example of __________
____________is used to Modify/Change Data in Table
MS-Access is _________________
Which of the following is not a data type in MS-Access?
To make changes in MS-Access form should be opened in __________________
_______layout of a form displays one record at a time

283
284
285
286
287

In SQL, DML stands for _________


To see more than one record at a time in a form we use _______
The default query invoked by ms-access is
__________ software serves as the Intermediary between the user and the database
Distributed database have now come to know as a __________ database

288 DDL Stands for -.

Control totals
ODBMS
Update Query
DBMS
Number
Form view
Tabular
Data manipulation
language
Tabular
Update Query
DATABASE
Client data base

Data Design Language Define Data Language

Limited ability to
Verify Processing logic
Specific tasks with
original or modified
programs
Picture
Neither A nor B
Concurrent audit
Digit
Input mask

B
A

D
C
C
D
C
A

289 In DBMS, view level data abstraction is known as __________

Internal Schema
Increase data
duplication
Hierachical
Attribute
.mdb
255 char
enter a value
automatically
every
program
Programming
Physical level
256
YES/NO
column
Program
Report
MS-WORD
3 GL
Java
Multiuser DBMS

Conceptual Schema

External Schema

None

Reduce Redundancy
FLAT FILE SYSTEM
Entity
.dbf
16 chra

Increase Efficiency
Relational model
Tuple
.accdb
text

All
None
None
None
long Integer

B
C
C
C
D

for checking
first
check
Non-Procedural
Logical Level
1000
HYPERLINK
field
query
Query
Excel/spreadsheet
4GL
Internet
Distributed DBMS

for validation check


last
macro
Application
View Level
16536
MEMO
tuple
form
Form
Powerpoint
5GL
Database
Centralized DBMS

None
None
All
None
None
63999
AUTONUMBER
None
macro
Macro
None
None
Visual Basic
Database

A
B
C
B
B
D
D
C
D
A
B
B
C
C

309
310
311
312

Client-Server database
key field
Record
Title

Distributed DBMS
Primary key
Tuple
Logo

Multiuser DBMS
Reference Key
Tabel
Picture

Centralized DBMS
None
Attribute
Graphic

B
B
B
B

Make Table Query

Aggregate Query

Select Query

314 Queries in MS-Access 2010 can be used as ________________________.

Search Query
View, change and
analyze data in
different ways

Both A and B

Neither A nor B

It is a part of database
used by the analysts to
draw conclusions
Many-to-Many

None of the above


Many-to-One

B
D

290
291
292
293
294

In DBMS, Normalization concept responsible for _______________


one 2 one, one 2 many and many 2 many Relationship exist in _________ model
Record is also known as ________ in a Relational data base
____________ is extention of ACCESS DATABASE
Default length of numeric data type is ____________

295
296
297
298
299
300
301
302
303
304
305
306
307
308

Default value option in field property use for ________


Value of Report Header exist on ___________ page of report
__________ is an action or set of actions that you can use to automate tasks
SQL is a _________ Language
Which one is the Second Level of Data Abstraction?
Memo data type store _________ number of characters.
__________ data type field can't be updated
A Record is also commonly called as a _________
Most database operations that we do manually can be automated by using
_________ are what we use to summarize and present data in the table
A database tabel is similar in appearance to a _______
SQL is considered to be a _______
SQL is considered to as an ideal Language for _______
DBMS that supports a database located at a single site is called a _____

DBMS that supports a database distributed across several different site is called a _____
The _________key does not accept Duplicate and Null values in Field.
______ is often implemented as an array of records
In MS-Access 2010,the ________ control in the form lets the user insert a picture into it.
Which query should be used to retrieve the following information from table of databases "Which employees
313 earn more than Rs.30,000 a month?"

It is a printed page
where users will enter
data
One-to-One

A source of records for


forms and reports
It is a Data Entry Screen
to make viewing,
entering and editing
data in the database
table
One-to-Many

Entity
Classifying

Attribute
Filtering

Relationship
Sorting

None of the above


Summarizing

A
C

Storage space is wasted


Number
Conceptual Model
Employee Code
Java
Memo
Memo

Changing the data at


one place only will
cause data inconsistency
Text
Structural Model
Employee Name
Oracle
Yes/No
Yes/No

It can be more easily


accessed
Memo
Object Model
Date of Birth
Lotus 1-2-3
Image
Calculated Field

Both A and B
Any of the above
Interface
Joining Date
MS-Outlook
AutoNumber
AutoNumber

D
B
A
A
B
C
C

326 In MS-Access 2010, __________ queries are best suitable to summarize information and looking for trends.

Crosstab

Parameter

Action

None of the above

327 Which of the following is not a section in Report Design view in MS-Access 2010?
328 Which of the following is not an action query in MS-Access 2010?
329 In MS-Access 2010, which data type is best suitable for storing the price of a commodity?
In MS-Access 2010, which of the following data type creates a field that allows the user to choose a value
330 from another table or from a list of values by using a list box or combo box?
331 In a table, _____________ uniquely identifies each record that is stored in the table.
332 _________ is used to insert values in Table directly.

Report Header Section Page Header Section


Select
Delete
Text
Number

Detail Section
Make Table
Currency

Summary Section
Update
AutoNumber

D
A
C

OLE Object
Unique Key
Query

Lookup Wizard
Record Key
None

D
C
A

Changing the structure Creating views and


of tables
indexes

Hyperlink
Primary Key
Form
Authorizing access and
other control over
database

Inserting, updating or
deleting records

Form

Query

Macro

Report

Parameter query
In the Report Header
Section

Update query
In the Report Footer
Section

Crosstab query
In the Page Footer
Section

Make Table query


In the Month Group
Footer Section

315 What is a form in MS-Access?


316 Which of the following degree of relationship cannot be applied in MS-Access 2010?
In an ER model, a/an ___________ is any object, place, person, event or concept about which an enterprise
317 records data.
318 The process of arranging data in a logical sequence is called ____________.

319
320
321
322
323
324
325

If some chunk of data is stored at two places in a database, then ___________.


In MS-Access, what data type can be used for a phone number field in a database?
E-R Diagram is ________________ Model.
Which of the following can be a primary key in an employee database?
Which of the following is a Database Management System?
Which of the following is not a data type in MS-Access 2010?
Which of the following is a New data type in MS-Access 2010?

333 DCL provides commands to perform actions like _________.


A database _______ presents summarized information retrieved from a table in a preformatted, attractive
334 manner.
In MS-Access 2010, which type of query extracts the data from one or more existing tables and puts them into
335 separate table?
In an MS-Access report, in which section we can keep the count[Sales] to calculate the total sales for each
336 month?

Memo
Foreign Key
Report

Reading several screens


of mostly useless
Selecting how the form
information and clicking or report should be
next
formatted
B
Reduced application
Decentralized data
development time
C

339 ___________ provides in Access 2010 is used to convert database tables to the normalized form.
340 Which Ribbon command tab includes the Table Analyzer Wizard in MS Access 2010 ?
341 A Junction Table creates a _______________ relationship between two tables.

Selecting the underlying


Selecting the fields that table or query on which
we want to appear in
we want to base the
the form or report
form or report
Data integrity and
Data independence
security
Database Analyzer
Table Analyzer Wizard Wizard
Create
External Data
One-to-One
One-to-Many

Form Analyzer Wizard


Home
Many-to-Many

None of the above


Database Tools
None of the above

A
D
C

342 The Primary key of one table and the matching column in another table is known as ______________.

Matching Key

None of the above

For ordering records

Foreign Key
specifying conditions
with group by clause

Index key

343 In SQL, having clause is used for _________

updating records

None

344 To compact the database in MS Access 2010, the database must be opened in the ___________.
In MS Access 2010,_________ help protect a database from system failures and against mistakes that the
345 Undo command cannot fix.

Inclusive Mode

Exclusive Mode

Normal Mode

Save Mode

Backups

Save Database

Save As Databse

None of the above

346 Improving the performance of a database in MS Access 2010 used______________ tool.

Performance Analyzer

Hi-tech Analyzer

Online Analyzer
Query & Report
Documenter
User and Group
Permissions

None of the above

None of the above

None of the above

Select
FROM
FROM
Controlling/Accessing
Data
Access

Create
INSERT
INSERT

B
A
B

All
None

C
C

Time & attendance

All of the above

Cash receipt
Template Management
software
To cut & paste the
completed and old
document.
PF No,online submission
of loan etc

All of the above

All of the above

None of the above

All of the above

Bank Receipt

What is the first step in creating a form or report using the Form Wizard or the Report Wizard in MS-Access
337 2010?
338 Which of the following is not an advantage of using a DBMS?

347 The _________ can be used to create reports on database objects for planning and modifying database design. Table Documenter
User and Group
348 Use _____________ to grant or revoke permissions or to change the owner of database objects.
Accounts

Database Documenter
User-level Security
Wizard

349 _____________ commands are used to enforce database security in a multiple user database environment.
350 Which SQL clause is used to retrieve data from database?
351 The __________clause is used to filter records in database.

Security
SELECT
SELECT

Grant and revoke


WHERE
WHERE

352 DCL(Data Control Language) used for


353 __________is Example of DBMS

Defining Data
Excel

354 What are the features of the Payroll Software provide by the ICAI.

Entering Data
Word
Recruitment
Management

355 Which are the transaction supported by the Billing and Accounting software ?

Billing

356 The software provide creating,printing and sending bulk individual mail is_______________________.

eSecretary software

salary Process
Previous years pending
bills
Contact Management
software

357 The feature Archive is available in K-DOC application for the purpose of____________.
Employee Information Portal feature in Payroll Application provide employee to view
358 their________________.

To create new file

To save file

359 Which is not a feature of ICAI-ROC application ?

Personal profile
PAN Number
Generation of forms as
per formats and
requirement of MCA
Maintain Minutes Book Calculate the filing fee

Salar paid by
Cheque/DD

360 The Payroll application supports three methods of salary disbursement are________________.

Salary Paid in Cash

361 Which Tools and Utilities is not supported by Payroll Application ?


The software provide the facility to generate bills,receipts,vouchers and clients outstanding etc
362 is______________.

MIS
Billing & Accounting
softwatre

A software which provide the structured file management and knowledge mamnagement
363 is_____________________.
The software provides a complete package to manage secretarial requirements & generates forms as per
364 MCA21 requirements

ICAI-File management
application
K-DOC application
Billing & Accounting
softwatre
Payroll Software
Shares
Auto filing of eForms Records/Certificates
Contact Management
eSecretary software
software
Templates
Blank document
Contact Management
eSecretary software
software

365 The ICAI-ROC provides the facility to prepare________________.


The software which provide the Contact Management,Correspondence Management, simplified Mail/Email
366 etc.
367 Correspondence feature of eSecretary application provide facilities are______________.
368 To create New Contact and access Contact features are available in which application ?

369 _____________________ is comprehensive package that combines Income Tax,Service Tax,e-TDS.e-AIR etc. Tax Application
Collected and
370 The financial transactions are to be . leading to different steps in Accounts Compilation.
computed
371 The methods LIFO, FIFO, Moving Average are used to .
Value closing stock
372 The report prepared taking the asset and liability type accounts from the Trial Balance is called.
P & L statement
373 The report that depicts operating profit/loss for a period is ..
Trial balance

All of the above

Export Journal Voucher TCS

Salary credited to Bank

Backup utilities

Payroll Software

ICAI-ROC application A

K-DOC application

Knowledge Management
Software
None of the above

K-DOC application

ICAI-ROC application D

Annual Returs forms


Template Management
software
Outside document
Template Management
software

All of the above

All of the above


All of the above

A
D

All of the above

K-DOC application

Tax Suite Application

All of the above

Sampled and stratified


Value clearing stock
Income statement
Trading account

Grouped and summarized


Value expense stock
Balance sheet
P & L statement

Assets and liability


Value income stock
Asset sheet
Suspense accounts

C
A
C
C

374
375
376
377
378
379
380
381
382
383

The day book contains transactions relating to


The Bills Receivable details are maintained in a ..
Creditors ledger has details of your dues to ..
The sundry debtors are placed in the Balance sheet on the
The first step in Tally before any transaction is entered or saved is creating a
To configure country specific details use the function key
Identify the security mechanism used in Tally.
The basic document where transactions are entered chronologically is.
After selecting a company in Tally, you will be in the
Tally software is based on accounting system.

Income or expenditure
Journal sheet
Customers
Income side
File
F10
Tally Secure
Ledger
Accounts of Tally
Sales

Sales or purchase
Voucher debtors
Assets
Assets side
Company
F2
Tally Pack
Journal
Gateway of Tally
Production

Asset or liability
Sundry debtors
Liabilities
Expense side
Project
F12
Tally Group
Voucher
Entry of Tally
Mercantile

Profit or loss
Original entry
Suppliers
Payable side
Application
F11
Tally Vault
Trial Balance
Groups of Tally
Manufacture

B
C
D
B
B
C
D
B
B
C

384
385
386
387
388
389
390

Identify the primary group of capital nature that uses bank account and cash in hand as sub groups.
All financial entries in Tally are done using.
The Direct expenses, Purchase account, Direct income are primary groups of ..
The option to delete a sub-group is admissible through the menu
The behavioural attributes of this group cannot be changed.
Credit limits for personal accounts and branches can be done in the ledger mode
We are not allowed to delete a ledger from this mode.

Fixed assets
Vouchers
Capital nature
Alter
Sub-group
Single
Single

Current assets
Groups
Expense nature
Delete
Ledger-group
Multiple
Sub-group

Loan assets
Journal
Revenue nature
Display
Primary-group
Sub-group
Alter-group

Capital assets
Ledgers
Income nature
Shift
Alter-group
Alter-group
Multiple

B
D
C
A
C
B
D

391 All account heads except Cash and Bank are placed in the

Sub Ledger master

392 These are the basis for analysis by potential investors, banks etc.

Journal and Ledger

Group Ledger master


P & L Account and
Journal

General Ledger master


P & L Account and
Balance Sheet

Journal Ledger master C


Voucher Account and
Balance Sheet
C

393
394
395
396
397
398
399

Expenses
Journal
F13
Credit Note
Sales
Double entry mode
Comment
Sales account, Sales tax
account
End of a month
Credit Note
Liability
Previous date

Income
Trial sheet
F12
Payment
Receipt
List entry mode
Memo
Ledger account, Bank
account
First of a year
Contra
Income
Effective date

Assets
Voucher
F10
Receipt
Payment
Choice entry mode
File
Suppliers account,
Purchases account
First of a month
Sales Note
Sales
Current year

Loans
File
F11
Contra
Journals
File entry mode
Narration
Buyer's account, Cash
account
End of a month
Payment
Asset
Configured date

D
C
B
D
D
B
D

1, 2, 3, 4
Credit purchase

1, 3, 4, 2
Cash purchase

2, 4, 3, 1
Both A and B

3, 4, 2, 1
Contra purchase

C
C

Identify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank OCC Account.
The primary document for recording all financial transactions in Tally is the
You can customize the voucher entry screen using the function key.
Identify the voucher type that records fund transfers between cash and bank accounts.
This voucher type records adjustments between ledgers.
The use of classes for payment, receipt and contra vouchers enables data input in
The details of a voucher entry can be given in the .

The credit note voucher can hold account types: ..


The suffix and prefix details for the voucher type can be made applicable only from the .
The voucher used to record all bank and cash payments is ..
The accounts that the business owns is called .
Tally's age-wise analysis considers the voucher's
Arrange the steps in generating the books of accounts.
1. Create Trial balance
2. Create new ledgers
3. Generate Day Books
405 4. Update journals for financial transactions
406 For day-to-day transactions the voucher types used are
Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be entered into the voucher
407 type..
400
401
402
403
404

A
C
D
D
B

Loan

Payment

Receipt

Sales

408 Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10 monitors by credit.

Credit Purchases

Cash Purchases

Expense Purchases

Debit Purchases

409 Identify the voucher type to be chosen for the sale of computers to Anand by cash @ Rs.210000 per unit.
410 A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher..

Cash Ledger
Payment

Sale Sheet
Receipt

Stock Journal
Debit

Purchase Voucher
Contra

C
D

Balance sheet
Accounting reports
Net Loss
Expense
Record book
Ratio analysis
Income
Bill date
Data flow
On closing balance
On closing balance

Profit & Loss statement


Inventory reports
Net Income
Example
Ledger book
Account analysis
Payables
Effective date
Funds flow
On net credit flow
On net credit flow

Trial balance
P & L reports
Net Profit
Taxes
Journal book
Data analysis
Expenses
Voucher date
Stock flow
On net transactions
On net transactions

Journal
Expense reports
Net Account
Income
Day book
Transaction analysis
Loans
Previous date
Cheque flow
On net cash flow
On net cash flow

C
B
C
A
D
A
B
A
B
C
A

422 The management that needs to consolidate the accounts of its various enterprises uses . in Tally.
423 Identify the user who can access audit trails in Tally.

Consolidate company
Owner

Group company
Data Entry operator

Set company
Accountant

B
D

424
425
426
427
428
429

Month-less accounting
Real accounts
Tally Vault
Tally.imp
OLE
Auto numbers

Yearly-entry accounting
Personal accounts
Tally Audit
Tally.cfg
DBMS
Duplicate number

Period-less accounting
Nominal accounts
Tally Report
Tally.exp
ODBC
Sequence number

Alter company
Administrator
Transaction-number
accounting
Expense accounts
Tally Group
Tally.ole
MS-XLS
Range number

411
412
413
414
415
416
417
418
419
420
421

The financial statement that consolidates ledger balances is ..


The F9 function key in the left side of the Gateway of Tally screen displays the
The option on the Gateway of Tally that will generate the P&L account statement is..
The expenditure for running the business for a period is ..
This displays the balance daywise for a selected voucher type.
The feature in Tally to analyze accounts of a company is..
The age-wise statement is displayed based on
The ratio analysis of receivables can be done based on
Name the statement that helps the management in the decision making process.
Identify the budget type which is chosen where transaction amounts are to be monitored.
Choose the budget type to be used where bank accounts balances are to be monitored.

Identify the accounting feature in tally that facilitates splitting financial years for a company data.
Identify the account type by the rule: "Debit the receiver and credit the giver".
The tracking of changes in vouchers and ledger masters is done by..
Tally can import data from other programs and creates a log about the activity in the file..
Import and export of data between Tally and other programs is possible with the help of..
The manual option of voucher numbering leads to..

C
B
B
A
C
B

430 The Tally audit trail tracks changes made to vouchers that are ..
431 The ratio analysis of Bills Receivables or Bills Payables can be displayed with the function key..

more than 30 Days old less than 30 Days old


F5
F8

more than a day old


F12

more than a week old


F6

A
D

432 The test data generated with correctness proof, data flow analysis and control flow analysis tools is called.
When a real-time system is simulated to generate the same output as the real-time system, the technique is
433 called.
When an auditor expands the extent of substantive tests to determine the impact of defects on the attainment
434 of program objectives, the methodology is.
435 This is an important control in systems that use digital signatures for authentication purposes.
436 The first document where the transaction is entered is called a ..

Test item block

Test data pack

Test program pack

Test record pack

Parallel trailing

Parallel coding
Correct lister
Sample audit trails
Voucher

Parallel simulation
Formulate correct
hypotheses
Data audit trails
Expense

Cross reference lister


Public audit trails
Ledger

Tracing parallel
Formulate flaw
hypotheses
Random audit trails
Liability

437 Selecting transactions based on a sampling rate is called . method.


The capability of the generalized audit software to read different data coding schemes, different record
438 formats and different file structures is.

Transaction sampling

Systematic sampling

Simple sampling

Demographic sampling B

File size

File data

File access

File reorganisation

B
A
C

439 The audit software capability of frequency analysis is to.


The audit functions of attributes sampling, variables sampling, stratified sampling are included in .
440 functions.
Identify the functional limitation of a generalized audit software that enables evidence collection only on the
441 state of an application system after the fact.

442 The purpose-written audit programs are used for..


443 Picture of a transaction as it flows through the computer systems is called..
444 Identify the type of audit when auditors are members of the systems development team.
445 The document used for posting of accounting transactions is ....
446 When the debit total is greater than credit total, the amount appears in the .. column.

Sort and merge files

Sampling nth item

Stratification

Selection

Formatting output

Statistical
Limited ability to
determine Propensity for
Ex Post Auditing Only Analytical review only Error
Reading data, selecting
Sorting, creating, and Data retrieval, code
and analyzing
printing files
comparison
information
Program
Track
Snapshot
General audit
Post audit
System audit
Balance sheet and trial
Voucher and journal
Ledger and trial balance balance
Income
Debit
Credit

Classify data on a
criteria

Reporting

Limited ability to
Verify Processing logic
Specific tasks with
original or modified
programs
Picture
Concurrent audit
Journal and ledger
Expense

D
C
D
D
B

Das könnte Ihnen auch gefallen