Sie sind auf Seite 1von 80

S.No.

1
2
3
4
5

6
7
8

9
10
11
12

13

14
15
16

17
18
19
20

21
22

23
24

25

26

27

28

29

30
31
32

33

34
35

36

37
38
39

40

41

42

43
44

45

46
47
48

49

50

51

52

53

54

55

56
57

58
59
60

61

62

63
64
65

66
67

68
69

70

71

72

73

74

75
76
77
78

79

80
81

82

83

84
85

86

87

88

89
90

91

92
93
94
95

96

97
98
99
100

101

102
103
104
105
106
107
108

109
110
111

112
113

114

115

116

117

118

119

120
121

122
123

124
125
126

127
128
129

130
131

132

133
134

135

136

137

138

139

140
141
142

143
144

145

146
147

148

149

150

151

152

153
154

155

156

157

158

159

160

161

162

163

164

165

166

167
168

169

170

171
172

173
174

175
176
177
178

179

180
181

182

183

184

185

186

187

188

189

190

191

192
193
194

195

196

197

198

199

200
201

202

203

204

205

206
207

208
209

210

211

212

213

214
215

216

217
218
219

220
221
222
223
224
225

226
227

228
229

230

231
232
233

234

235

236

237

238
239
240

241

242

243
244
245
246

247

248
249

250

251

252
253

254
255

256

257

258
259
260

261

262
263

264

265

266

267

268
269
270
271

272
273

274

275
276

277
278
279
280
281
282
283

284
285
286
287

288

289
290

291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313

314
315

316
317

318
319

320
321
322
323
324
325
326

327
328
329
330

331
332
333

334

335

336
337

338

339

340
341
342

343

344
345

346
347

348

349

350
351
352

353
354
355

356

357
358

359

360

361

362

363

364

365

366

367
368

369

370

371
372

373
374
375
376
377
378
379
380
381
382
383
384

385
386
387
388
389
390
391

392

393

394
395
396
397
398
399
400

401
402
403
404
405

406
407

408
409

410
411

412
413
414
415
416
417
418
419
420
421
422

423
424

425
426
427
428
429
430

431

432

433

434

435

436
437
438

439

440

441

442

443
444
445

446
Advanced ITT QUESTION BANK
Questions

In IDEA, Statistics functions can be applied on_________.


In IDEA, increment value in Stratification function can be fixed or free interval.
In IDEA, Stratified Random functions is a part of which menu.
Which of the following is not an Audit Software
Using which functions to perform more complex calculations and exception testing in IDEA?

Which of the following are categories of computer audit function ?


In the following list which is a audit function?
Which is the following step involved in a source code review methodology ?

In IDEA which functions should be used to find repeated values ?


In IDEA, Stratification functions can be applied on which type of data ?
In IDEA,Summarization accumulates the values of Numeric fields for each____________.
In which sampling,selecting sampling units using a fixed interval between selections is______

Ensures that all combinations of sampling units in the population have an equal chance of se
is____________.
Input Control method is a part of Application Control Group.
Which is the following type of check that can be run when data is input through terminal ?
In _______system money transfers are done on a one to one basis while in _______system transf
done in batches.
All the money transfers take place in the books of the _________________
________system of money transfer is primarily used for large transactions.
In RTGS, the STP generates an ___________for every outbound RTGS transaction.
STP stands for ________________________________ in terms of CBS.

________ is a method of creating virtual networks within a physical network.


CMS stands for ______________________________ in terms of CBS.

Which of the following statements is true?


The Management Controls does not include ___________

_______is supported by advanced technology infrastructure and has high standards of busines
functionality.
CBS Software resides in a Central application server which is located in the ___________

A________ that runs the core banking solutions (CBS) and is centrally accessed by the branche

The _________of the application is capable of only entering the data at the end point that is bra

The application server would be placed in a trusted inside zone in a separate ____________

Application software would access the ________


__________ are capable of being connected only when devices are connected to a switch.
_____________refers to the process of developing software which would produce the required o
from the input provided of course, using the necessary hardware and communication system

The______________is essential to ensure that computer security records are stored in sufficient
for appropriate period of time.
All the various servers in the central data centre are seggregated through _______
The __________ is a complete process in the computer so that it ensures that data that is fed in
conforms to certain prerequisite conditions.
When the central Data base is busy with central end of day activities or for any other reason
containing the account balance of the customer is sent to the ATM switch. Such a file is called
__________
The IBDS is located in a ____________
The main components of Internet Banking system consist of __________
Copy of the Anti Virus Software was updated promptly and regularly at the Data Centre and
into all of the servers and in all the systems in the branches by ________
The __________which is also residing in the server at the branch actually does the banking ope

In Core Banking concept all the systems of the bank are connected to the Central office by m
connectivity which may be either a _________ or a dial up line.
The ________ is generated by the software and directly sent to equipment for printed the Pin M

____________would also include the existence of built in controls in the system to ensure prope
processing of input data so as to provide the required output.
____________refers to an arrangement wherein the issuing bank acts on the request and instruc
a customer.
_______________ is a process by which the bank ensures the maintenance and recovery of opera

At which phase of testing the version of software is called “ beta version”?


Finacle developed by _________
The number that is stored in the ATM switch is the difference of which of the following numb

The information retrieval of transactions taking place at ATM located at remote locations is t
_________
The number that is generated as soon as the customer inserts the card in the ATM machine i
__________
The tab in Expression Builder in which we write expressions is known as _____________.

The criteria expression LIKE?B*.

__________ queries are useful for summarizing information, and are somewhat similar to pivot
MS-Excel.
While entering record in Datasheet view, in which order the records can be entered

When you delete the record in form, it deletes the record from__________.

Having clause is used in the aggregate query in MS Access 2010


The controls that are not linked to any field of the table or query on the form are known as _

Which property of the form can be used to insert a background image in MS Access 2010?
___________ is a report that is inserted in another report in MS Access 2010.
A bound main report is based on a ______________ and its _____________ contain realted informati

DDL stands for ____________

A___________used to compare multiple values of categories or differences over a period of time

A________used to compare trends over a period of time.


To create a read-only copy of the database, which of the following file format can be used?
The database administrator created a split database and created a front-end database and b
database file.Which of the file should be stored on the server ?
In which formats can the Collect Data through email message feature can send the data entry
Once a mail is sent using the collect data through email message feature in Access 2010. The
status can be checked using________________.
The ___________ type of data cannot be collected using Collect data through email messages.
What is the memo data type field used for?

The filter By selection feature allows you to filter:

DML stands for _____________

Which editor was provided for use with Access Basic?

How do you update Pivot Table report data after changes are made to the source data?

What are the different views to display a Table ?

Which Of The Following Creates A Drop Down List Of Values To Choose From?
A __________ Enables You To View Data From A Table Based On A Specific Criterion
The Database Language That Allows You To Access Or Maintain Data In A Database
DCL Provides Commands To Perform Actions Like

Which is not a Database Model ?

Which Of The Field Has Width 8 Bytes?


This Is The Stage In Database Design Where One Gathers And List All The Necessary Fields F
Database Project.
Whenever a tables gets update, the dependent query will

The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And C
___________ Between Tables
What is the purpose of the Switchboard Manager in Microsoft Access 2010?
How does a query-based report differ in design to a report based on just one table?

How would you include some plain text into a mailing label report?

In a Microsoft Access 2010 report, the page numbering would most likely be placed into the:

If you wished to present a professionally looking form on screen that would show all the nec
information, which of the following form design tools would you most likely use?

An .ACCDE file is a ___________ version of the original .ACCDB file.


Which type of the query is used to accept the value from the user while executing the query
records accordingly
To encrypt the databse in Access 2010 must be opened in the __________________.

To extract the records based on date field, which of the symbol should be used
FIX() is a kind of ____ function in MS-Access 2010.
MS-Access 2010 has added new features of ______ to eliminate the need of VBA code
Encrypting a database does not restrict access to database objects, but to __________ the datab

Third Party Encryption Technology can also be applied to the database of Microsoft Access 2

To create a split database in MS Access 2010 go to which tab?


After spliting database,frontend database holds_________________.
After spliting database,backend database holds_________________.
When an Access database is split, it creates two files_________________.

A Data Access Page is a special type of _________ that allows users to interface with database u
Internet Explorer.
OLAP systems use concept of OLAP cube called a ______________ cube
The data which is to be exported from Tally.ERP 9 can be in ________ format.
In Tally ERP-9 Remote Access is also known as __________.
Accessing data store on a remote location using Internet in Tally.ERP9 is called____________.
Tally.ERP9 can be classified user in two categories are___________.
Which of the following is not a predefined security level provided by Tally.ERP 9?
The business model is represented in the graphical form using ______________ and ______________

_______ integrates supply and demand mangement within and across companies.
OLAP stands for _________________.
__________ includes transportation from Suppliers and receiving inventory.

Which of the following is not the service area of SCM?


Which step of the ERP implementation involves, educating and recruiting end users through
implementation process?
The system ____________ process will address issues such as software configuration, hardware
acquisition and software testing.
A __________________ review is recommended to ensure that all business objectives established
the planning phase are achieved.
In _________________ stages, auditors have access to rudimentary ERP tools and capabilities for
security configurations.
Immediate posting and updation of books of accounts as soon as the transactions are entere
called as __________
Which of the following ETDS forms are available in Tally.ERP 9?

The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadab
called __________________
ERP systems provide an access to the__________ data
________________ is a tool that refers to skills, processes, technologies, applications and practice
facilitate better, accurate and quicker decision making.
Business intelligence systems are ________ Decision Support Systems.
Data warehousing technology is the process of creating and utilizing the company’s __________

The data in the Warehouse comes from the _________ environment and external sources.
In essence, SCM integrates ___________ management within and across companies.
_____________ including all fulfillment activities, warehousing and transportation to customers

Customer Relationship Management is a ________________ level strategy.


Operational CRM provides support to ___________ business processes.
Collaborative ______ ultimate goal is to use information collected by all departments to impro
quality of services provided by the company.
Tally.ERP 9 follows the DES __________ method to safeguard the data.
Immediate posting and updation of books of accounts as soon as the transactions are entere
called as __________
Business Intelligence Systems are data-driven ___________________.

Which of the following ETDS forms are available in Tally.ERP 9?


The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadab
called __________________
With ______________ technology the characters are reduced in breadth and user is allowed to in
additional characters which would make the account name, entity complete and readable.

In Tally.ERP 9 __________________ provides the user with administrator rights and the capability
check the entries made by the authorised users and alter these entries, if necessary.

__________________ is an enabling framework which establishes a connection through which the


user can access the Client's data without copying/transferring the data.
If we want the company to be connected automatically for remote access on load, the proper
__________ needs to be set it as Yes.
___________________ technology is the process of creating and utilizing the company's historical

Is there a fixed qualification for internal auditor_________.


Which of the following will not appear in the home page of K-Doc?
To change an email header so that the message appears to have originated from someone or
somewhere other than the actual source is known as___________.
To playfully satirize a website is known as_____________.
_________is the complete package to manage the billing requirements of a CA firm on cash syst
accounting.
Which of the following is not a/an feature of eSecretary?

Annual return preparation can be done using ________.


________is correspondence automation & management software that is seamlessly integrated
Microsoft Office.
________ is an independent,objective assurance and consulting activity designed to add value
improve an organization's operations.
Which of the following is/are the main purpose of the internal audit?

As per _____________of the Income tax Act,every person carrying on business or profession is r
to get his accounts audited by a CA before the "specified date".
__________________ refers to use software/applications to automatically perform tasks such as
accounting,preparing trial balance, financial statements etc. and electronically transmit data
information using internet..
FEMA Stands for _______________.

Which application helps the management to allocate the revenue to the credit of the right em
who identified the opportunity?
Who has full privileges in the financial accounting application?

_________is the centre point of the financial accounting application as any transactions having
impact carried out in any other module will reflect in this module.
In Financial Accounting Application,the transactions flow from GL (General ledger) to other

Which of the functionalities is not provided in the purchasing module of Financial Accountin
Application.

In Financial Accounting Application,automatic sequence number of documents control is no


required in which of the following module?
Which module of Financial Accounting Application can be used for assigning credit limit to
customers?
Which of these will trigger/alert for timely payment ?

We can manage interviews,offers and job vacancies by using which of the application?

________,___________,__________ are commonly referred to as CIA in information security parlance

___________provides information about updation of project cost based on time spent by emplo
various projects.
Which of the follwing is not a/an functionality provided by PMS?

___________automates the calculation of salary for taking inputs from the timesheet applicatio
from Leave Management System and salary details from the HR master data.

Which of the follwing is not a control in Leave Management System?

Permanent Audit File are obtained once but updated on __________basis.


In Permanent Audit file, _______ is not the key data documented.

________is a type of training in which user logon on the training server with a user ID and pass

In some cases, trainee is supposed to appear for the examination/test at the end of the train
is____________.
________ are the hardware/infrastructure equipments used in a CA firm.
_____________means information available in the organization should not be altered or modifie
unauthorized personnel.
Which of these is/are the standard email program used in an organization?
Which of the following is not a characteristics of WAN?

_________is protection of information assets from threats to preserve their value.


Which types of information assets need to be secured in a CA Office?
The extent and level of _________ would depend on the nature of information.
__________ of information might be affected due to denial of service attack or some other reaso

__________means the sender cannot deny having sent a message and receiver cannot deny rece
the message.
Risk may not be _______ in nature.
The process of identifying an individual, usually based on user id and password in an organi
called______________.
Which of the following is not a software equipment required in a CA's office?

Which of the following is not an application arranged by ICAI?

PBX stands for ________

________ is the process of meeting the financial goals through the proper management of finan

___________ can be defined as the process of setting the procedures in the organization for ach
the predefined goals.
________ shows ability of company to pay back long term loans along with interest or other ch
from generation of profit from its operations.
_____________________is the simplest method of comparing different stocks at a point of time to m
investment decisions.
The very first line of code of XML file is_____________.

Every bit of data has to start and end with an identical tag

Deletion of XML Map is done through __________.

Excel works primarily with ________ types of XML files.


Method of tax calculations shall change according to _________.
________ is a process used in statistical analysis in which a predetermined number of observat
be taken from a larger population.
In __________, Individuals are selected at regular intervals from a list of the whole population.

In ______________ each individual is chosen entirely by chance and each member of the popula
an equal chance, or probability, of being selected.
Which method is commonly used in social sciences when investigating hard to reach groups

__________ are useful for quick reading and easy understanding, particularly for top managem

Popular methods of capital budgeting include _________ and payback period.

_________ is the value of all future cash inflows less future cash outflows as on today.
___________is the process of defining and analyzing the dangers to individuals, businesses and
government agencies posed by potential natural and human-caused adverse events.
__________ which is used more often, does not involve numerical probabilities or predictions o

________ are generally used to present information in a simple and better way and also be use
analyse the risk in a better way.
It is a technique used to determine how different values of an independent variable will imp
particular dependent variable under a given set of assumptions.
_______ involves computing different reinvestment rates for expected returns that are reinves
during the investment horizon.
Which function that is used to calculate the payment for specific loan terms ____________
________helps to break down the Return on Equity

_______ is a common method for financing property, facilities, and equipment.


Which option can be used to split windows into four in ms excel 2010?

How to restrict the values of a cell so that only a list can be entered in a cell?

What does the COUNTA() function do in MS Excel 2010 ?

If the value in A1 is "ITT" and in B1 is "ICAI ", which function in Excel will return " ITT @ ICA
C1?
Which of the following function will return a value of 7?

A tiny chart embedded in a worksheet cell that provides a visual representation of data is a _
_________is a graphical equivalent of a pivot table, which is used to visualise PivotTable report
summary data
To frequently print a specific range of cells on a worksheet , the option used is

Non-excel files can be opened in MS Excel using the


_____is a text concatenation operator.
Which of the following is correct?

___ function in MS-Excel returns the remainder after number is divided by divisor.
EXCEL Work in ________ Mode
In Ms-Excel 2010, ______ is Last Column Name?
In Excel 2010, the default criteria setting for AutoFilter in each field is __________.
Subtotal option is in __________ group of Data tab in Excel 2010.
Which of the following cannot store connection information of an external data source in Exc
2010?
The default pivot chart type in Excel 2010 is a ________ chart.
To consolidate Excel data, ________________________ is used when worksheet data does not have
consistent layout or pattern.
In Excel 2010, the __________ function is used to generate a forecast.
______function calculates the payment for a loan (installment) based on constant payments an
constant interest rate.
__________ are easy-to-use filtering components that enable the user to quickly filter the data i
PivotTable report in MS-Excel 2010.
In Excel 2010, range C3:C6 indicates _______________.
Keyboard shortcut to show a shortcut menu in MS Excel 2010 is _______________.
To select multiple non-adjacent cells in an Excel 2010 worksheet, click them holding ________

A quick way to return to a specific area of a worksheet in Excel 2010 is to type the cell addre
range name in the ____________.
In MS-Excel 2010, the Name Box shows the ________________________.

In Excel 2010, what is represented by the small black square in the lower-right corner of an
cell or range?
Suppose we accidentally erased a record in an Excel worksheet. Which command can be use
restore it immediately?
Excel 2010 offers up to____________sort levels.
Which feature in Excel 2010 enables us to find the input values needed to achieve a goal or o
The INT function________

Which of the following statements about scenarios is not true?

What is a scenario summary report?

What does Solver uses in its dialog box?


What term describes a feature that gives Excel enhanced capability?
What dialog box allows you to change a field name in a PivotTable?
Why are PivotTables considered interactive?

Identify the need for controls and auditing in a computerised environment.

Grand totals calculated for any code on a document in the batch are called…..
Control that checks if correct sequence of commands and update parameters are passed from
application software to the database.
With respect to data integrity control, when monetary transactions are processed against m
files without a match, we should maintain a ….
The system test that tests the top-level modules first and then the lower modules are simula
dummy modules to check the interfaces is called ….
Identify the audit technique that examines each transaction as it passes through the system.
The Core Image Comparison audit technique compares the….

The technique used by an auditor to list unused program instructions is…..


The sample data created and used for the purpose of testing the application system is called

The test data (dummy unit) implemented in the normal processing of the system over a peri
time is known as….
The test data generated with correctness proof, data flow analysis and control flow analysis
called….
The organisational, management, maintenance and access controls are categories of ……
When a real-time system is simulated to generate the same output as the real-time system, t
technique is called….
When an auditor expands the extent of substantive tests to determine the impact of defects o
attainment of program objectives, the methodology is….
This is an important control in systems that use digital signatures for authentication purpos

Selecting transactions based on a sampling rate is called …. method.


The capability of the generalized audit software to read different data coding schemes, differ
record formats and different file structures is….
The audit software capability of frequency analysis is to….

The audit functions of attributes sampling, variables sampling, stratified sampling are includ
functions.
Identify the functional limitation of a generalized audit software that enables evidence collec
only on the state of an application system after the fact.

The purpose-written audit programs are used for…..

Picture of a transaction as it flows through the computer systems is called…..


The application controls are ….
Identify the type of audit when auditors are members of the systems development team.
Identify the field check - "If a set of values is defined, is the input data one of these defined v

The field check that conforms if data input for a field is in a particular format.
The field check on a processed data that fails if a field is not initialized to zero or errors occu
calculation is……
The validation checks applied to a field depending on its logical interrelationships with the o
fields in the record are called …..
A group of records or transactions that are contiguous constitute …..
…………..is the type of batch check (group of records) for all input records of a particular type

DB2 is an example of __________


____________is used to Modify/Change Data in Table
MS-Access is _________________
Which of the following is not a data type in MS-Access?
To make changes in MS-Access form should be opened in __________________
_______layout of a form displays one record at a time
In SQL, DML stands for _________

To see more than one record at a time in a form we use _______


The default query invoked by ms-access is
__________ software serves as the Intermediary between the user and the database
Distributed database have now come to know as a __________ database

DDL Stands for -.

In DBMS, view level data abstraction is known as __________


In DBMS, Normalization concept responsible for _______________

one 2 one, one 2 many and many 2 many Relationship exist in _________ model
Record is also known as ________ in a Relational data base
____________ is extention of ACCESS DATABASE
Default length of numeric data type is ____________
Default value option in field property use for ________
Value of Report Header exist on ___________ page of report
__________ is an action or set of actions that you can use to automate tasks
SQL is a _________ Language
Which one is the Second Level of Data Abstraction?
Memo data type store _________ number of characters.
__________ data type field can't be updated
A Record is also commonly called as a _________
Most database operations that we do manually can be automated by using
_________ are what we use to summarize and present data in the table
A database tabel is similar in appearance to a _______
SQL is considered to be a _______
SQL is considered to as an ideal Language for _______
DBMS that supports a database located at a single site is called a _____
DBMS that supports a database distributed across several different site is called a _____
The _________key does not accept Duplicate and Null values in Field.
______ is often implemented as an array of records
In MS-Access 2010,the ________ control in the form lets the user insert a picture into it.
Which query should be used to retrieve the following information from table of databases "W
employees earn more than Rs.30,000 a month?"
Queries in MS-Access 2010 can be used as ________________________.
What is a form in MS-Access?

Which of the following degree of relationship cannot be applied in MS-Access 2010?


In an ER model, a/an ___________ is any object, place, person, event or concept about which an
enterprise records data.
The process of arranging data in a logical sequence is called ____________.
If some chunk of data is stored at two places in a database, then ___________.

In MS-Access, what data type can be used for a phone number field in a database?
E-R Diagram is ________________ Model.
Which of the following can be a primary key in an employee database?
Which of the following is a Database Management System?
Which of the following is not a data type in MS-Access 2010?
Which of the following is a New data type in MS-Access 2010?
In MS-Access 2010, __________ queries are best suitable to summarize information and lookin
trends.
Which of the following is not a section in Report Design view in MS-Access 2010?
Which of the following is not an action query in MS-Access 2010?
In MS-Access 2010, which data type is best suitable for storing the price of a commodity?
In MS-Access 2010, which of the following data type creates a field that allows the user to ch
value from another table or from a list of values by using a list box or combo box?
In a table, _____________ uniquely identifies each record that is stored in the table.
_________ is used to insert values in Table directly.
DCL provides commands to perform actions like _________.

A database _______ presents summarized information retrieved from a table in a preformatted


attractive manner.
In MS-Access 2010, which type of query extracts the data from one or more existing tables a
them into separate table?
In an MS-Access report, in which section we can keep the count[Sales] to calculate the total s
each month?
What is the first step in creating a form or report using the Form Wizard or the Report Wiza
Access 2010?

Which of the following is not an advantage of using a DBMS?

___________ provides in Access 2010 is used to convert database tables to the normalized form

Which Ribbon command tab includes the Table Analyzer Wizard in MS Access 2010 ?
A Junction Table creates a _______________ relationship between two tables.
The Primary key of one table and the matching column in another table is known as _________

In SQL, having clause is used for _________

To compact the database in MS Access 2010, the database must be opened in the ___________.
In MS Access 2010,_________ help protect a database from system failures and against mistake
the Undo command cannot fix.
Improving the performance of a database in MS Access 2010 used______________ tool.
The _________ can be used to create reports on database objects for planning and modifying d
design.
Use _____________ to grant or revoke permissions or to change the owner of database objects.

_____________ commands are used to enforce database security in a multiple user database
environment.
Which SQL clause is used to retrieve data from database?
The __________clause is used to filter records in database.
DCL(Data Control Language) used for

__________is Example of DBMS


What are the features of the Payroll Software provide by the ICAI.
Which are the transaction supported by the Billing and Accounting software ?

The software provide creating,printing and sending bulk individual mail is____________________

The feature Archive is available in K-DOC application for the purpose of____________.
Employee Information Portal feature in Payroll Application provide employee to view
their________________.

Which is not a feature of ICAI-ROC application ?

The Payroll application supports three methods of salary disbursement are________________.

Which Tools and Utilities is not supported by Payroll Application ?

The software provide the facility to generate bills,receipts,vouchers and clients outstanding
is______________.
A software which provide the structured file management and knowledge mamnagement
is_____________________.

The software provides a complete package to manage secretarial requirements & generates
per MCA21 requirements
The ICAI-ROC provides the facility to prepare________________.

The software which provide the Contact Management,Correspondence Management, simplif


Mail/Email etc.

Correspondence feature of eSecretary application provide facilities are______________.


To create New Contact and access Contact features are available in which application ?

_____________________ is comprehensive package that combines Income Tax,Service Tax,e-TDS.e-

The financial transactions are to be …………. leading to different steps in Accounts Compilatio

The methods LIFO, FIFO, Moving Average are used to ….


The report prepared taking the asset and liability type accounts from the Trial Balance is cal

The report that depicts operating profit/loss for a period is …..


The day book contains transactions relating to ………
The Bills Receivable details are maintained in a ……..
Creditors ledger has details of your dues to ……..
The sundry debtors are placed in the Balance sheet on the ……
The first step in Tally before any transaction is entered or saved is creating a ………
To configure country specific details use the function key……
Identify the security mechanism used in Tally.
The basic document where transactions are entered chronologically is….
After selecting a company in Tally, you will be in the……
Tally software is based on ……… accounting system.
Identify the primary group of capital nature that uses bank account and cash in hand as sub

All financial entries in Tally are done using…….


The Direct expenses, Purchase account, Direct income are primary groups of …..
The option to delete a sub-group is admissible through the menu……
The behavioural attributes of this group cannot be changed.
Credit limits for personal accounts and branches can be done in the ledger mode……
We are not allowed to delete a ledger from this mode.
All account heads except Cash and Bank are placed in the……

These are the basis for analysis by potential investors, banks etc.

Identify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank
Account.
The primary document for recording all financial transactions in Tally is the……
You can customize the voucher entry screen using the function key…….
Identify the voucher type that records fund transfers between cash and bank accounts.
This voucher type records adjustments between ledgers.
The use of classes for payment, receipt and contra vouchers enables data input in ……
The details of a voucher entry can be given in the …….
The credit note voucher can hold account types: ……..

The suffix and prefix details for the voucher type can be made applicable only from the …….
The voucher used to record all bank and cash payments is …..
The accounts that the business owns is called ….
Tally's age-wise analysis considers the voucher's ……
Arrange the steps in generating the books of accounts.
1. Create Trial balance
2. Create new ledgers
3. Generate Day Books
4. Update journals for financial transactions

For day-to-day transactions the voucher types used are


Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be entered in
voucher type…..
Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10 monitors by
Identify the voucher type to be chosen for the sale of computers to Anand by cash @ Rs.2100
unit.
A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher…..
The financial statement that consolidates ledger balances is …..

The F9 function key in the left side of the Gateway of Tally screen displays the……
The option on the Gateway of Tally that will generate the P&L account statement is…..
The expenditure for running the business for a period is …..
This displays the balance daywise for a selected voucher type.
The feature in Tally to analyze accounts of a company is…..
The age-wise statement is displayed based on……
The ratio analysis of receivables can be done based on……
Name the statement that helps the management in the decision making process.
Identify the budget type which is chosen where transaction amounts are to be monitored.
Choose the budget type to be used where bank accounts balances are to be monitored.
The management that needs to consolidate the accounts of its various enterprises uses …….

Identify the user who can access audit trails in Tally.


Identify the accounting feature in tally that facilitates splitting financial years for a company

Identify the account type by the rule: "Debit the receiver and credit the giver".
The tracking of changes in vouchers and ledger masters is done by…..
Tally can import data from other programs and creates a log about the activity in the file…..
Import and export of data between Tally and other programs is possible with the help of…..
The manual option of voucher numbering leads to…..
The Tally audit trail tracks changes made to vouchers that are …..

The ratio analysis of Bills Receivables or Bills Payables can be displayed with the function ke

The test data generated with correctness proof, data flow analysis and control flow analysis
called….
When a real-time system is simulated to generate the same output as the real-time system, t
technique is called….
When an auditor expands the extent of substantive tests to determine the impact of defects o
attainment of program objectives, the methodology is….
This is an important control in systems that use digital signatures for authentication purpos

The first document where the transaction is entered is called a …..


Selecting transactions based on a sampling rate is called …. method.
The capability of the generalized audit software to read different data coding schemes, differ
record formats and different file structures is….
The audit software capability of frequency analysis is to….

The audit functions of attributes sampling, variables sampling, stratified sampling are includ
functions.
Identify the functional limitation of a generalized audit software that enables evidence collec
only on the state of an application system after the fact.

The purpose-written audit programs are used for…..

Picture of a transaction as it flows through the computer systems is called…..


Identify the type of audit when auditors are members of the systems development team.
The document used for posting of accounting transactions is ……....

When the debit total is greater than credit total, the amount appears in the …….. column.
A B C

Numeric Data Date Data Both A and B


FALSE TRUE
Analysis Data Relation
ACL IDEA Unix
Equation Editor function Editor Calculation Editor

Items of audit interest Data Analysis System validation


File Definition Stratification Print Preiview
Review Programming Understand program Formulate flaw
standards specifications hypotheses

Detection Exclude Sequence checking


Numeric Data Date Data Character Data
Primary Key Unique Key Secondary Key
Random Systematic All of the above

Random Systematic All of the above

TRUE FALSE
Field check Filter check Compare check
NEFT, RTGS RTGS,NEFT EFT,RTGS

Beneficiary bank Central bank(RBI) Remitting bank


NEFT RTGS EFT
UTN UTE UTR
Straight Through Processing Straight Temporary Strict Through
Processing Processing
VLAN LAN WAN
Control Management System Cash Management Core Management
System System
Audit of internal controls is Systems audit are Audit of controls in any
not needed at all important for the banking environment is
verification of the performed using
internal controls software audit
Managing of Assets Formulating a security Developing a business
policy continuity planning

Firewall Internet banking Core Banking Solution

ATM Data centre Middleware Web centre

ATM Server Central Application Database Server


Server
System version Application Version Client version

Virtual Local Area Network Local Area Network Wide Area Network

Data base server ATM DATA Server Domain Name Server


LAN Virtual Networks MAN
Application Development Software Development Server Development

Review Management RTGS Log management

LANs VLANs WANs


Consalidation Password Policy protection

Positive Balance File Application Server Centralised Data base


security

Militarised zone City Zone State zone


Web server IBAS IBDS
Hacking Method Push-pull method Both A &B

Sytem software utility software Application Software

local line Leased line Broadband

16 digit number Personal Identification Net transaction ID NO


Number

Output Control Input control Process Control


Letter of Credit Letter of Tax Letter of Payable

Business Recovery Planning Business Continuity Disaster Recovery


Planning Planning
Programmer testing User testing (a) & (b) both
Infosys HCL Technologies TCS
Pin No - offset value Offset value - Pin No Pin No - Natural Pin

Soft copy of Electronic journal Hard copy of Cash register


Electronic Journal
Offset value Pin sent to customer Natural Pin

Expression Elements Operator Button Expression Box

Will match all text starting Will match all text Will match all text
from B ending from B having second
character as B
Select query Crosstab query Action query

Alphabetical Order At the end of the table Any where in the table

Form only Form but not in table Table but not in Form

FALSE TRUE
ActiveX control Unbounded Controls Graphics Control

Caption Background Record Source


Inner-Report Sub-Report Inside-Report
Table or query,Inner-Report Table or query,Main- Table or query,Sub-
Report Report
Data Definition Language Data Defined Detailed Definition
Language Language
Pie Chart Area Chart Bar Chart

Pie Chart Line Chart Bar Chart


.ACCDB .ACCDE .MDW
Front-end database Back-end database Both of them

HTML and InfoPath Access Forms Visual Basic Application


Export to Outlook Options in Tool menu Manage replies
of Access
Text Number Date/time
To add table To store objects For long text entries
created in other
programs
Those records that match an Records based on a Records that meet any
entity in a field criterion you specify of several criteria you
specify
Detailed Maintaining Data Maintaining Data Manipulation
Language Language Language
The Visual Basic 1.0 editor Notepad The QuickBasic editor

Save your changes, close the Select the Pivot Table Click the report, and on
workbook, and then reopen it. worksheet and press the Pivot Table toolbar,
F9 on the keyboard click the refresh data
button

Datasheet View Design View Pivote Table & Pivot


Chart View
Ole Object Hyperlink Memo
Form Query Macro
DCL DML DDL
Change The Structure Of Insert, Update Or Authorizing Access And
Tables Delete Records And Other Control Over
Data Values Database
Network Database Model Relational Database Object Oriented
Model Database Model
Memo Number Date/time
Data Definition Data Refinement Establishing
Relationship
Not update update automatically have to update
manually
Relationship Join Query

To build a main switchboard Creates the macros To allow the user to


form that controls all other used to program an switch from one
forms. automatic application. database file to another.
The reports are restricted in It doesn’t It doesn't have as many
size. design options.

Type the text directly into the Use the > button. Use the Mailing label
label. wizard text option.
Report Footer Section Header Page Footer

Pivot Table Pivot Chart All The tools of the form


design control gallery.

Fixed-down Locked-down Open-down


Make Table Query Update Query Delete Query

Open Secure mode Open Inclusive mode Open Exclusive mode

$ # ()
Math Date Text
Macro Form Report
Open Modify Read

TRUE FALSE

Create Tab External Tab File tab


Forms Query Report
Tables Forms Query
A back-end database & front- A new database & Old primary database &
end database database. secondary database
XML page HTML Page Web page

single dimensional hyper dimensional multi dimensional


XML HTML ASCII
Networking VB.Net Tally.Net
Local Data Remote Data Internet Data
Local User Remote User Both A & B
Owner Public User Data Entry
charts, pictures smart art, clip art flowcharts, flow
diagrams
BPM SCM PLM
Online Analysis Processing Online Analytical Online Analytical
Processing Programming
Inbound Operations Outbound Operations Sourcing planning

Logistics Asset Management PLM


Step 1 Step 2 Step 3

implementation upgradation installation

pre implementation under process review post implementation

post implementation pre implementation Both A & B

Interactive Processing Immediate Processing Real Time Processing

Form 26, Annexure to 26 Form 27, Annexure to Form 26Q, Annexure to


27 26Q
File Validation Program File Validation Utility File Valuation Program

integrated distributed isolated


Data Warehousing Data Modeling Business Modeling

data-driven information driven resource driven


general data historical data operational data

operational backup data


supply and demand supply and chain supply and sortage
Inbound operations outbound operations hybridbound
operations
business corporate strategic
front office back office staff
CRM's ERP SCM

encryption decryption cryptography


Interactive Processing Immediate Processing Real Time Processing

Information Systems Integrated Information Decision Support


Systems Systems

Form 26, Annexure to 26 Form 27, Annexure to Form 26Q, Annexure to


27 26Q
File Validation Program File Validation Utility File Valuation Program

Tally Fix Tally Adjust Tally Fit

User-defined Security HTTP-XML based data Unlimited multi-user


interchange support

Direct Web Browser Access Web Publishing Tally.NET

Allow to Connect Company Contact On Load Either A or B

Data Warehousing Data Modeling Business Modeling

TRUE FALSE
Powerpoint Word Paste Document
Email middle attack. Email Spoofing. Email hacking.

Web tapping Web Interception Web spoofing


Payroll eSecretary Billing and Accounting
software
Contact Management Greeting Management Email Management

ICAI-ROC application K-DOC application ICAI XBRL Software


K-DOC application eSecretary ICAI XBRL Software

Statutory audit Tax audit Internal auditiing

Financial reporting Operations of the Both A and B


organization
Section 45 Section 44AD Section 43B

ERP Office automation Either A or B

Foreign Exports Management Financial Enterprise Foreign Exchange


Act Management Act Managament Act
Resource allocation and Knowledge Document Management
scheduling management Systems
Database administrator Account administrator System administrator

AP module GL module AR module

TRUE FALSE

Evaluation of Vendors Receipts of goods or Invite and analyze


service quotations from
vendors
Purchasing Accounts Payable Expense Management

Purchasing Sales Accounts Payable

Accounts Payable Accounts Receivable Expense Management

Resource allocation and HR and Payroll Knowledge


scheduling applications management
Confidentiality,Integrity and Confidentiality,Integrit Confidentiality,Integrity
Availability y and Authentication and Access rights

Performance management HR management Payroll


system system
Capture the Key Performance Employee designation Automated alerts for
Indicators and reporting pending appraisals
structure
Timesheet System HR management Payroll System
System

Reduce administrative burden Excess leave Error free capture of


on HR leave details
half-yearly yearly monthy
Organization chart Client’s accounting Copies of clients’
manual incorporation
documents like MoC
Internal Training E-Learning Classroom Training

Classroom Training E-Learning Virtual Learning

PC Application Server WAN


Confidentiality Integrity Availability

Microsoft Exchange Lotus Notes Both A and B


Most WANs are owned by only Compared to LAN, its WAN uses only private
one organization. transmission speed is networks.
low
Confidentiality Integrity Information Security
Client data Own data Own documents
Availability Confidentiality Integrity
Integrity Authentication Confidentiality

Non-Repudiation Integrity Authentication

reputational financial operational


Availability Authentication Confidentiality

Resource allocation and Client management HR and Payroll


scheduling
ICAI-XBRL suite K-DOC Billing and Accounting

Private Exchange Branch Public Exchange Private Branch


Branch exchange
Corporate planning Monte Carlo Financial planning
simulation
Monte Carlo Simulation Corporate Planning Decision Tree Analysis

Debt Assets Ratio Interest Coverage Total Fund Ration


Ratio
Earnings Per share Fixed Asset Over ratio Price Earnings Multiple

<?xml version="3.0" <?xml version="2.0" <?xml version="1.0"


encoding="ISO-8859-1"?> encoding="ISO-8859- encoding="ISO-8859-
1"?> 1"?>
<TagName>Data</TagName> </TagName>Data<Tag </TagName>Data</Tag
Name> Name>
Directally Delete Command Delete Button XML Maps Dialog Box

3 2 1
Annual Income DOB status of assess
Snowball sampling Sampling Systematic sampling

Clustered sampling Sampling Systematic sampling

Snowball sampling Convenience sampling Systematic sampling

Quota Sampling Sampling Snowball sampling

Balance sheet Summary reports IRR

discounted cash flow internal rate of return net present value

Net present value Working capital IRR


Sensitivity analysis Risk analysis Qualitative risk analysis

Sensitivity analysis Risk analysis Qualitative risk analysis

Graphs Sparklines Both A& B

Decision Tree analysis Sensitivity analysis Both A& B

Scenario analysis Sensitivity analysis Decision Tree Analysis

SUMIF() PMT COUNTIF()


Du Point Analysis Return on Investment Profitability Ration

Mortagage Leasing Rent


Format -> Window Window -> Split View -> Window ->
Split
Settings Tab under the Tab Settings Tab under the Settings Tab under the
Format -> Cells tab Data -> Validation tab Data -> Filter
->Advanced Filter
Counts cells having alphabets Counts empty cells Counts cells having
number
A1+ "@" + B1 A1 # "@" # B1 A1 & "@" & B1

ROUNDUP(7.4999,0) ROUNDDOWN(7.4999, ROUND(7.4999,0)


0)
Bar Chart Sparkline Pivot Chart
Bar Chart Pivot Chart Sparklines

Pagelayout -> Page Setup -> Pagelayout -> Print Page Setup -> Print
Print Area Area Area
Add Ins Developer Tab Text Import wizard
# $ &
AVERAGE(4,5,6,7) AVERAGE(A1,B1,C1) AVERAGE(A1:A6,B1:B6
)
MOD() INT() DIV()
3 5 7
XWE XFD XAA
Top10 Bottom10 Top half
Sort & Filter Outline Data Tools
Workbook .odc file .htm file

Column Line Scatter


Consolidation by position Consolidation by Consolidation using 3-D
category formulas
TREND STANDARDIZE CORREL
PV NPV IRR

Sparklines Slicers Macros

Cells C3 through C6 Cell C3 and Cell C6 Cell C4 and Cell C5


Shift + F10 Shift + F1 Shift + F11
Ctrl Alt Shift

Name Box Formula Bar Zoom Box

Name of the workbook Name of the Name of the cell or


currently working on worksheet currently range currently
working on working on
Copy handle Fill handle Insert handle

Insert Replace Paste

32 64 60
Goal Seek Consolidate Data Validation
Rounds a number to a desired Rounds a number Rounds a number up
multiple down to the nearest
integer
A scenario is a set of values A workbook can have Scenarios provide a
saved with the workbook. one scenario per way to see different
sheet. solutions for worksheet
formulas.

A formatted description of A formatted defined A worksheet with a


each scenario on a separate range of Solver and separate thumbnail for
worksheet Goal Seek solutions each formula
Arguments Limitations Constraints
Trendlining Enhancement bit Thumbnail
Field Options Field Pane Field Settings
They allow you to add They allow you to They allow you to
dynamic data. rearrange row and generate e-mail enabled
column data. reports.
Absence of input documents Lack of visible Accessibility of data
transaction trail and computer
programs
Financial totals Record totals Document totals
Table level Data Integrity Batch check

Sequence account Data account Suspense account

Bottom up test Hybrid test Stub test

Embedded code Program code Database Analyzers


Database with master table Executable program Transaction data with
with master copy master transaction

Modelling Analyzing Mapping


Test data Table data Item data

Integrated Test Facility Black box Test Facility Graph testing

Test item block Test data pack Test program pack

Application controls General controls Check controls


Parallel trailing Tracing parallel Parallel coding
Cross reference lister Formulate flaw Correct lister
hypotheses
Public audit trails Random audit trails Sample audit trails

Transaction sampling Systematic sampling Simple sampling


File size File data File access

Sort and merge files Sampling nth item Formatting output

Stratification Selection Statistical

Ex Post Auditing Only Analytical review only Limited ability to


determine Propensity
for Error
Sorting, creating, and printing Data retrieval, code Reading data, selecting
files comparison and analyzing
information

Program Track Snapshot


Input controls Processing controls Both A and B
General audit Post audit System audit
List Range Slab

Format mask Data mask Field mask


Range Sign Overflow

Field checks Record checks Batch checks

Physical batches Logical batches Block batches


Control totals Serial number Transaction type

ODBMS RDBMS DBMS


Update Query Process Query Insert Query
DBMS RDBMS ODBMS
Number Character Memo
Form view Form Design Change Form
Tabular columnar Datasheet
Data manipulation language Data mathematical both a and b
language
Tabular columnar both a and b
Update Query Select Query Delete Query
DATABASE DBMS O.S
Client data base Server data base Client-Server database

Data Design Language Define Data Language Data Definition


Language
Internal Schema Conceptual Schema External Schema
Increase data duplication Reduce Redundancy Increase Efficiency

Hierachical FLAT FILE SYSTEM Relational model


Attribute Entity Tuple
.mdb .dbf .accdb
255 char 16 chra text
enter a value automatically for checking for validation check
every first last
program check macro
Programming Non-Procedural Application
Physical level Logical Level View Level
256 1000 16536
YES/NO HYPERLINK MEMO
column field tuple
Program query form
Report Query Form
MS-WORD Excel/spreadsheet Powerpoint
3 GL 4GL 5GL
Java Internet Database
Multiuser DBMS Distributed DBMS Centralized DBMS
Client-Server database Distributed DBMS Multiuser DBMS
key field Primary key Reference Key
Record Tuple Tabel
Title Logo Picture
Search Query Make Table Query Aggregate Query

View, change and analyze data A source of records for Both A and B
in different ways forms and reports
It is a printed page where It is a Data Entry It is a part of database
users will enter data Screen to make used by the analysts to
viewing, entering and draw conclusions
editing data in the
database table

One-to-One One-to-Many Many-to-Many


Entity Attribute Relationship

Classifying Filtering Sorting


Storage space is wasted Changing the data at It can be more easily
one place only will accessed
cause data
inconsistency

Number Text Memo


Conceptual Model Structural Model Object Model
Employee Code Employee Name Date of Birth
Java Oracle Lotus 1-2-3
Memo Yes/No Image
Memo Yes/No Calculated Field
Crosstab Parameter Action

Report Header Section Page Header Section Detail Section


Select Delete Make Table
Text Number Currency
OLE Object Memo Hyperlink

Unique Key Foreign Key Primary Key


Query Report Form
Changing the structure of Creating views and Authorizing access and
tables indexes other control over
database
Form Query Macro

Parameter query Update query Crosstab query

In the Report Header Section In the Report Footer In the Page Footer
Section Section
Selecting the fields that we Selecting the Reading several screens
want to appear in the form or underlying table or of mostly useless
report query on which we information and
want to base the form clicking next
or report

Data independence Data integrity and Decentralized data


security
Table Analyzer Wizard Database Analyzer Form Analyzer Wizard
Wizard
Create External Data Home
One-to-One One-to-Many Many-to-Many
Matching Key Foreign Key Index key

For ordering records specifying conditions updating records


with group by clause

Inclusive Mode Exclusive Mode Normal Mode


Backups Save Database Save As Databse

Performance Analyzer Hi-tech Analyzer Online Analyzer


Table Documenter Database Documenter Query & Report
Documenter
User and Group Accounts User-level Security User and Group
Wizard Permissions
Security Grant and revoke Select

SELECT WHERE FROM


SELECT WHERE FROM
Entering Data Defining Data Controlling/Accessing
Data
Word Excel Access
Recruitment Management salary Process Time & attendance
Billing Previous years Cash receipt
pending bills
eSecretary software Contact Management Template Management
software software

To create new file To save file To cut & paste the


completed and old
document.
Personal profile PAN Number PF No,online
submission of loan etc

Generation of forms as per Maintain Minutes Calculate the filing fee


formats and requirement of Book
MCA
Salary Paid in Cash Salar paid by Salary credited to Bank
Cheque/DD
MIS Export Journal TCS
Voucher
Billing & Accounting softwatre Payroll Software K-DOC application

ICAI-File management K-DOC application Knowledge


application Management Software

Billing & Accounting softwatre Payroll Software K-DOC application

Auto filing of eForms Shares Annual Returs forms


Records/Certificates
eSecretary software Contact Management Template Management
software software

Templates Blank document Outside document


eSecretary software Contact Management Template Management
software software

Tax Application K-DOC application Tax Suite Application

Collected and computed Sampled and stratified Grouped and


summarized
Value closing stock Value clearing stock Value expense stock
P & L statement Income statement Balance sheet

Trial balance Trading account P & L statement


Income or expenditure Sales or purchase Asset or liability
Journal sheet Voucher debtors Sundry debtors
Customers Assets Liabilities
Income side Assets side Expense side
File Company Project
F10 F2 F12
Tally Secure Tally Pack Tally Group
Ledger Journal Voucher
Accounts of Tally Gateway of Tally Entry of Tally
Sales Production Mercantile
Fixed assets Current assets Loan assets

Vouchers Groups Journal


Capital nature Expense nature Revenue nature
Alter Delete Display
Sub-group Ledger-group Primary-group
Single Multiple Sub-group
Single Sub-group Alter-group
Sub Ledger master Group Ledger master General Ledger master

Journal and Ledger P & L Account and P & L Account and


Journal Balance Sheet
Expenses Income Assets

Journal Trial sheet Voucher


F13 F12 F10
Credit Note Payment Receipt
Sales Receipt Payment
Double entry mode List entry mode Choice entry mode
Comment Memo File
Sales account, Sales tax Ledger account, Bank Suppliers account,
account account Purchases account
End of a month First of a year First of a month
Credit Note Contra Sales Note
Liability Income Sales
Previous date Effective date Current year
1, 2, 3, 4 1, 3, 4, 2 2, 4, 3, 1

Credit purchase Cash purchase Both A and B


Loan Payment Receipt

Credit Purchases Cash Purchases Expense Purchases


Cash Ledger Sale Sheet Stock Journal

Payment Receipt Debit


Balance sheet Profit & Loss Trial balance
statement
Accounting reports Inventory reports P & L reports
Net Loss Net Income Net Profit
Expense Example Taxes
Record book Ledger book Journal book
Ratio analysis Account analysis Data analysis
Income Payables Expenses
Bill date Effective date Voucher date
Data flow Funds flow Stock flow
On closing balance On net credit flow On net transactions
On closing balance On net credit flow On net transactions
Consolidate company Group company Set company

Owner Data Entry operator Accountant


Month-less accounting Yearly-entry Period-less accounting
accounting
Real accounts Personal accounts Nominal accounts
Tally Vault Tally Audit Tally Report
Tally.imp Tally.cfg Tally.exp
OLE DBMS ODBC
Auto numbers Duplicate number Sequence number
more than 30 Days old less than 30 Days old more than a day old

F5 F8 F12

Test item block Test data pack Test program pack

Parallel trailing Tracing parallel Parallel coding

Cross reference lister Formulate flaw Correct lister


hypotheses
Public audit trails Random audit trails Sample audit trails

Ledger Liability Voucher


Transaction sampling Systematic sampling Simple sampling
File size File data File access

Sort and merge files Sampling nth item Formatting output

Stratification Selection Statistical

Ex Post Auditing Only Analytical review only Limited ability to


determine Propensity
for Error
Sorting, creating, and printing Data retrieval, code Reading data, selecting
files comparison and analyzing
information

Program Track Snapshot


General audit Post audit System audit
Voucher and journal Ledger and trial Balance sheet and trial
balance balance
Income Debit Credit
D Answer

None of the above C


B
Sampling D
SOFTCAAT C
Testing Editor A

All of the above D


Append B
All of the above D

Filter A
All of the above D
Composite Key B
None of the above B

None of the above A

A
Data check A
None of the above B

None of the above B


All of the above B
UTS C
None of the above A

MAN A
Centre Management B
System
None of the above B
Laying down procedures A
for system development

Web centre C

Central Office Data Centre. D

Domain Name Server B

Firewall C

Personnal Area Network A

Application Server A
WAN B
System Development D

Authorized Controller C

MANs B
Validation D

Central Office Data Centre. A

demilitarised zone D
All the above D
None of the Above B

Application Server C

None B

ATM No B

Data Control C
Letter of Receible A

None B

None of above C
I-Flex A
Offset Value - Natural Pin C

(a) and (b) both A

Card Number C

Expression Builder C
window
Will match all text starting A
with a digit

Parameter query B

Beginning of the table B

Form & Table D

B
Bound Controls B

Picture D
Insert-Report C
None of the above C

Data Detailed Language A

Column Chart D

Column Chart B
.ACCDT B
None of them B

Excel attachment A
All of the above C

AutoNumber D
For shout text entries of C
no more than 255
characters
All of above A

Detailed Manipulation C
Language
All of above B

All of the above C

All Of Above D

Lookup Wizard D
Report B
None Of Above A
None Of Above C

Structureed Database D
Model
Hyperlink C
None Of The Above A

never update B

None Of These A

To allow changing from A


one report to another.
The only report type B
available is the Design
Report.
Use the >> button. C

Page Header C

Form Wizard Columnar C

None of the above B


Parameter Query D

Open Read Mode C

"" B
None of the above A
None of the above A
Write A

Database Tools D
All of the above D
Report A
None of the above A

None of the above C

none C
ALL D
None of the above C
None of the above B
None of the above C
Tally.NET User B
graphs, shapes C

CRM B
None of the above B
Production planning A

CRM D
Step 4 B

migration C

None of the above C

Either A Or B A

Business Processing C

All of the above D

File Valuation Utility B

de-centralized A
Business Intelligence D

none A
none B

none A
none A
none B

none B
none A
none A

none A
Business Processing C

Non-Isolated Information C
Systems

All of the above D


File Valuation Utility B

Tally AutoFit C

Audit Feature D

Email facility C

None of the above B

Business Intelligence A

B
My Templates C
Email tracking B

Web threating C
K-DOC application C

Share certificate printing D

Payroll A
ICAI-ROC application B

None of the Above C

Either A or B C

Section 44AB D

None of the Above B

None of the Above C

Client management D
User Administrator C

FA module B

Comparison with budgets D

Fixed assets C

Accounts Receivable B

Bank Reconcilations C

None of the Above B

Confidentiality,Integration A
and Authentication

Timesheet application D

Prepare summary or bell B


curve analysis of all
employees
Knowledge management C
System

Approval workflow C

quarterly B
Copies of important C
contracts or long term
lease agreements
E-Training B

All the Above B

All the Above D


Authentication B

None of the Above C


Switches are used to B
connect LAN and WAN

None of the above C


All the above D
Authentication B
Availability D

Confidentiality A

vulnerable D
Integrity B

None of the Above D

ICAI-TOC D

Public Branch exchange C

Personal Finance planning C

Corporate Planning & B


Analysis
None of the above B

Gross Profit Ratio C

<?xml version="0.0" C
encoding="ISO-8859-1"?>

<TagName>Data<TagNam A
e>
None of the above C

4 B
All of the above. D
Simple random sampling B

Simple random sampling C

Simple random sampling D

Simple random sampling C

NPV B

All the above D

PMT A
Scenario analysis B

Scenario analysis C

Charts D

Neither A &B B

None A

None of the above B


None of the above A

All the above B


View -> Split B

All of the above B

Counts non-empty cells D

A1 $ "@" $ B1 C

Only B & C D

Pie Chart B
None of the above B

Print Area A

Analysis Tool Pak C


* C
All of the above D

REMAINDER() A
11 A
AAA B
All D
Calculation B
.udcx file C

Bubble A
Any of the above C

GROWTH A
PMT D

Data Forms B

None of the above A


Shift + F12 A
Ctrl + Shift A

Sheet Tab A

Formula in the cell C


currently working on

Border B

Undo D

80 B
Subtotal A
Calculates interest B

Scenarios help to perform B


what-if analysis.

A worksheet with A
separate macros for each
scenario
Parameters D
Add-in D
Field Structure C
They allow you to print B
the reports with various
settings.
All of the above D

Hash totals D
System test B

Update account C

Top down test D

Database code A
Module programs with B
snapshots

Tracing C
Record data A

Whitebox testing A

Test record pack B

Input controls B
Parallel simulation D
Formulate correct B
hypotheses
Data audit trails A

Demographic sampling B
File reorganisation C

Classify data on a criteria D

Reporting C

Limited ability to Verify A


Processing logic

Specific tasks with D


original or modified
programs

Picture C
Neither A nor B C
Concurrent audit D
Digit C

Input mask A
Serial C

File checks B

Transact batches A
Sequence check C

None C
None A
None A
Date B
None B
None B
None A

None A
None B
None B
None C

None C

None C
All B

None C
None C
None C
long Integer D
None A
None B
All C
None B
None B
63999 D
AUTONUMBER D
None C
macro D
Macro A
None B
None B
Visual Basic C
Database C
Centralized DBMS B
None B
Attribute B
Graphic B
Select Query D

Neither A nor B C
None of the above B

Many-to-One D
None of the above A

Summarizing C
Both A and B D

Any of the above B


Interface A
Joining Date A
MS-Outlook B
AutoNumber C
AutoNumber C
None of the above A

Summary Section D
Update A
AutoNumber C
Lookup Wizard D

Record Key C
None A
Inserting, updating or C
deleting records

Report D

Make Table query D

In the Month Group D


Footer Section
Selecting how the form or B
report should be
formatted

Reduced application C
development time
None of the above A

Database Tools D
None of the above C
None of the above B

None B

Save Mode B
None of the above A

None of the above A


None of the above B

None of the above C

Create B

INSERT A
INSERT B
All C

None C
All of the above D
All of the above D

All of the above A

None of the above C


All of the above D

Bank Receipt D

All of the above D

Backup utilities C

ICAI-ROC application A

None of the above B

ICAI-ROC application D

All of the above D

All of the above A

All of the above D


All of the above A

All of the above C

Assets and liability C

Value income stock A


Asset sheet C

Suspense accounts C
Profit or loss B
Original entry C
Suppliers D
Payable side B
Application B
F11 C
Tally Vault D
Trial Balance B
Groups of Tally B
Manufacture C
Capital assets B

Ledgers D
Income nature C
Shift A
Alter-group C
Alter-group B
Multiple D
Journal Ledger master C

Voucher Account and C


Balance Sheet
Loans D

File C
F11 B
Contra D
Journals D
File entry mode B
Narration D
Buyer's account, Cash A
account
End of a month C
Payment D
Asset D
Configured date B
3, 4, 2, 1 C

Contra purchase C
Sales B

Debit Purchases A
Purchase Voucher C

Contra D
Journal C

Expense reports B
Net Account C
Income A
Day book D
Transaction analysis A
Loans B
Previous date A
Cheque flow B
On net cash flow C
On net cash flow A
Alter company B

Administrator D
Transaction-number C
accounting
Expense accounts B
Tally Group B
Tally.ole A
MS-XLS C
Range number B
more than a week old A

F6 D

Test record pack B

Parallel simulation D

Formulate correct B
hypotheses
Data audit trails A

Expense C
Demographic sampling B
File reorganisation C

Classify data on a criteria D

Reporting C

Limited ability to Verify A


Processing logic

Specific tasks with D


original or modified
programs

Picture C
Concurrent audit D
Journal and ledger D

Expense B