You are on page 1of 14

S/no.

Questionare A B C D A
1 The application controls are …. Input controls Processing controls Both A and B Neither A nor B C
2 Identify the field check - "If a set of values is defined, is the List Range Slab Digit C
input data one of these defined values?"

3 The field check that conforms if data input for a field is in a Format mask Data mask Field mask Input mask A
particular format.
4 The field check on a processed data that fails if a field is not Range Sign Overflow Serial C
initialized to zero or errors occur during calculation is……

5 The validation checks applied to a field depending on its Field checks Record checks Batch checks File checks B
logical interrelationships with the other fields in the record
are called …..
6 A group of records or transactions that are contiguous Physical batches Logical batches Block batches Transact batches A
constitute …..
7 …………..is the type of batch check (group of records) for Control totals Serial number Transaction type Sequence check C
all input records of a particular type is done.

8 This has an embedded microchip which can both manipulate Data card Security card Combi card Meta card C
data and execute applications.
9 To ensure a reliable communication between the buyer and Session Socket Layer Protocol Secure Sockets Layer Protocol Electronic Socket Layer Cyber Socket Layer B
seller, the protocol used is…. Protocol Protocol
10 In IDEA, import Assistant wizard is used to import data Excel Access XML All of the above D
from____________.
11 In IDEA, Append functions can be used to_________. Import data Add data at the end Sort Filter B

12 Which is the step by step procedure for reporting in IDEA. File->Print->Create Report Click on Create Report button Both A and B File->Select Export -> C
on the Operation toolbars- Print Report.
>Report Assistant.

13 In the following list which is not an audit function ? Sorting Filtering Sampling Export D
14 What is the procedure for importing data into IDEA ? File->Import Assistant-> File->Import -> Import to File->Import as -> File->Select Import -> A
Import to IDEA IDEA Import to IDEA Import to IDEA
15 In Audit tool, to built relation between two tables, both table Common Table Common Field Common record None of the above B
should have_____________.
16 Which is the following is the correct types of Field checks on Overflow Range Sign Test All of the above D
processed data ?
17 IDEA exports data in a number of text database spreadsheet and mail All of the above D
_______________________. merge format
18 Which is the following is the correct types of Record checks Resonableness Compare Un-compare Randomness A
on input data ?
19 Which is the correct types of Batch Checks ? Control Totals Outdated checks On-line dated checked Mixed dated checks A
20 Which is the need for table level tests ? Data Integrity Controls are required for Both A and B None of the above C
authorization
21 Which is the following is the major points with respect to This may make the entire child Their Master & Child Both A and B None of the above C
inter table tests ? tables referenced by the master relationship reference the
field in the main table un- table from one another
available
22 Which is the software used by the auditor to take a view of a Mapping Snapshots Modelling Source comparison B
file of data or transaction passing through the system at a
particular point of time ?
23 Which is the software used by the auditor to compare the Souce comparison Code compasion Model comparison Exe comparison A
source version of a program with a secure master copy ?

24 Which is the techniques whereby the auditor arranges or Debug Testing Logic Testing Off-line Testing On-line Testing D
manipulates data either real or fictitious, in order to see that
a specific program or screen edit test is doing its work ?

25 Which is the software used by the auditor to list un-used Log Analysis Mapping Program Library All of the above B
program instruction ?
26 Which is the software used by auditor to read and analyze Machine level Executable level Log Analyzers Software Systax level C
records of machine activity ?
27 Which of the following reason strongly call for Control & Lack of Visible Transaction Absence of Input Document All of the above None of the above C
Audit Function ? Trail
28 In IDEA,Data Extraction select data form a file for Extraction Recording Investigation Sorting C
further___________ for creating a new file of logically
selected records.
29 Which is the correct types of Field checks on input data ? Missing data Blank data Both type None of the above C

30 Which is the major points to be consider with respect to To ensure the input data is valid Test whether the overall To ensure the entered All of the above A
System tests ? before entering the value system meet the requirement data is saved without fail
specifications
31 In Data analysis techniques, which law is used to idenfity Bend Law Benjamin law Benford Law British Law C
statistical report on numeric data ?
32 Which is not a feature of File reorganization with an auditor Filtering Sorting Indexing Linking the identified A
perspective? files
33 What do you understand by the term, “Data Consistency” Establish relationship between Identify fields, which have Identify data, which are Identify whether all C
in using CAATs? two or more tables as required. null values. not in agreement with the fields have valid data.
regular format.

34 Functions involving use of arithmetic operators, which Statistical function Arithmetic function Logical function Relational function B
enable performing re-computations and re-performance of
results is an example of?
35 Which of the following is a benefit of using CAATs? File an FIR based on audit Identify an audit finding w.r.t. Investigation of fraud in To give assurance to B
finding materiality in an IT audit area customers about the
environment performance of the
company
36 What is step by step procedure for using Bendford's law Data->Benford's Law Analysis->Benford's Law Sampling-> Benford's Tools->Benford's Law B
function in IDEA ? Law
37 A Benford's Law analysis is most effective on Comprised of similar sized Without built-in minimum Without assigned All of the above D
data________________. values for similar phenomena. and maximum values. numbers, such as bank
accounts numbers and
zip codes and with four
or more digits.
38 In IDEA, blank value data can be extracted by @isblank() as Null Null Is Null A
using_________.
39 In IDEA, Summarization, Pivot Table, Stratify, Duplicate Data Analysis Sampling Relation B
Key functions comes under which menu.
40 In IDEA, Extraction, Sort, Indices, Search functions comes Analysis View Relation Data D
under which menu.
41 _______ is centralized Banking Application Software. Core Banking System Core Banking Solution Complete Banking Centralized Banking B
Solution Solution
42 Flexcube developed by ________ Infosys HCL Technologies TCS I-Flex D
43 Quarz developed by ____ Infosys HCL Technologies TCS I-Flex C
44 The server is a sophisticated computer that accepts service Clients Customers Party IP A
requests from different machines which are
called__________
45 __________ server has to be a powerful and robust system Antivirus Server Application Server Web server Clients Server B
as it has to perform all the core banking operations.

46 ATMS stands for_________ Automatic Telephone Machine Automated Teller Machine Auto Machanic Allow to Machine B
Server
47 IBAS stands for ___________ Internet Business Application Internet Banking Application Internet Banking Internet Business B
Server Server Application software Authenticatin server
48 PBF stands for________ Positive Balance File Post Balance File Positive Balance File Positive Balance Flex C
49 Internet banking refers to a banking transactions routed Bank Internet Intranet Net banking B
through the ________
50 CPPD Stands for ______________. Computer Planning and plant Computerized Planning and Both A &B Computer Planning and D
department Policy Department Policy Department

51 The _________ is generally a hardware and it plays the role Date base Server Web server Proxy Firewall D
of preventing unauthorized access.
52 _________has several components which have been CBS CSB NEFT None A
designed to meet the demands of the banking industry.

53 ________enable data transmission over different networks. Switches Firewall Routers Middleware C

54 _________have many ports that are connected to different Router Switches Firewall Middleware B
systems and it facilitates data transmission with the network.

55 A Proxy server always acts in conjunction with a Firewall Internet Antivirus None A
_________.
56 The ________ provides network security by preventing ATM Server Proxy Server Date base Server Web server B
malicious data from entering the network.
57 _________is used for authentication. System audit system administration Domain Controller Network security C
58 Access to a set of servers is controlled by the ________. System audit system administration Librarian Domain Controller D

59 ________is a process of unauthorized entering a network. Data base administration Hacking Routors Thrashing B

60 ____________ facility provides a customer to access Automatic tele Machine Automated Teller Machine Automated Technical Accelereated Teller B
financial transactions in a public place. Machine machine
61 Which is the Function of ATM? Cash Withdrawal Balance Inquiry Registering requests for All the above D
Cheque book
62 Every bank branch should madatorily have a security policy. FALSE TRUE B

63 Core Banking Solutions is a combination of an application Network devices Firewall IBAS IBDS A
software and ________
64 The Operational Controls include controls on ___________ Physical Access Logical Access Environmental Controls All of the above D

65 Application Controls are broadly classified into Input Controls Output Controls Processing Controls All of the above D
__________________
66 __________controls check that the data entered is complete Input Controls Output Controls Processing Controls All of the above A
and correct.
67 Reasonableness check is a _________. Processing Controls Input Controls Output Controls Management Control B
68 Which of the following is not a module of the CBS? Customer ID generation Accounts management Equity Share Clearing Module C
management
69 Bank guarantees can be __________________________ Performance Guarantee Deferred Payment Guarantee Both A & B None of the above C

70 SLR stands for ________________________________ Statutory Liquidified Ratio Statutory Liquidity Ratio Standard Liquidity Ratio Stable Liquidity Ratio B

71 ________are record of activities that have taken place in the Logs Index Activity Logs None of the above A
system irrespective of the modules.
72 The contents of a log includes _____________________ Activity performed User details Date and Time All of the above D

73 Communication and Operations management must include E-mail policy Firewall security policy Internet policy All of the above D
which policies?
74 ______ is a large data housing infrastructure that provides ATM Server Data Centre IT EDP B
high band width access to its clients.
75 Logs of the various activities in CBS can be deleted TRUE FALSE B
immediately and also be accessed by anybody.
76 CRR stands for _________________________ in terms of Cash Reserve Ratio Community Reserve Ratio Cash Reversal Ratio Cash Reimbursed Ratio A
CBS.
77 Does the IS Audit also include audit of the outsourcing Yes No A
activites carried out in the CBS system?
78 DRP stands for ___________________________ in terms Disaster Recovery Planning Discovered Resources Disastrous Recovery Disaster Recording A
of CBS. Planning Planning Planning
79 _____________are soultions applied when any kind of Patches Logs Access Rights None of the above A
vulnerabilities discovered in networks in the CBS system.

80 __________can be viewed only by the DBA of an Access Rights Logs Database Log Operating System Log Activity Log B
organisation.
81 Is performing periodic vulnerability assessment of the Yes No A
networks is necessary?
82 KYC stands for _________________________________ Know Your Customer Know Your Company Know Your Connection Know Your Centre A
in terms banking.

83 In CBS, the Accounts Management module deals with Creation of Savings Account Creation of Current Account Overdraft All of the above D
_____________________
84 Soft copy of the ATM journal rolls is called_____________ Stock Journal Journal Report Electronic Journal All of the above C

85 Data centre servers are known as_____________. Application servers Data Base Servers Web server All the above D
86 The ATM switch consists of a _____________________ computer server Both A & B None of the above C

87 _______________testing should be done to check the Penetration Hierarchical Top down Bottom up A
unauthorised access to the network in CBS.
88 _________enables transfer of money from one bank to EFT NEFT RTGS None of the above C
another in "Real time" and on "Gross" basis.
89 In _______system money transfers are done on a one to NEFT, RTGS RTGS,NEFT EFT,RTGS None of the above B
one basis while in _______system transfer is done in
batches.
90 All the money transfers take place in the books of the Beneficiary bank Central bank(RBI) Remitting bank None of the above B
_________________
91 EFT and NEFT work on _______________basis DNS HSM SSM All of the above A
92 ________system of money transfer is primarily used for NEFT RTGS EFT All of the above B
large transactions.
93 In RTGS, the STP generates an ___________for every UTN UTE UTR UTS C
outbound RTGS transaction.
94 UTR full form _________________________________ Unique Transaction Reference Unidentified Transaction Unique Transmission None of the above A
in terms of CBS. Reference Reference

95 STP stands for ________________________________ in Straight Through Processing Straight Temporary Strict Through None of the above A
terms of CBS. Processing Processing

96 ________ is a method of creating virtual networks within a VLAN LAN WAN MAN A
physical network.
97 CMS stands for ______________________________ in Control Management System Cash Management System Core Management Centre Management B
terms of CBS. System System

98 Which of the following statements is true? Audit of internal controls is not Systems audit are important Audit of controls in any None of the above B
needed at all for the verification of the banking environment is
internal controls performed using software
audit

99 The Management Controls does not include ___________ Managing of Assets Formulating a security policy Developing a business Laying down procedures A
continuity planning for system development
100 _______is supported by advanced technology infrastructure Firewall Internet banking Core Banking Solution Web centre C
and has high standards of business functionality.

101 CBS Software resides in a Central application server which is ATM Data centre Middleware Web centre Central Office Data D
located in the ___________ Centre.
102 A________ that runs the core banking solutions (CBS) and ATM Server Central Application Server Database Server Domain Name Server B
is centrally accessed by the branches.
103 The _________of the application is capable of only entering System version Application Version Client version Firewall C
the data at the end point that is branches.
104 The application server would be placed in a trusted inside Virtual Local Area Network Local Area Network Wide Area Network Personnal Area Network A
zone in a separate ____________
105 Application software would access the ________ Data base server ATM DATA Server Domain Name Server Application Server A
106 __________ are capable of being connected only when LAN Virtual Networks MAN WAN B
devices are connected to a switch.
107 Data communication between ______ VLANs can be 1 2 3 4 B
controlled as per business requirements.
108 A special feature of STP is that _____________ number for Unique Transation Referrence PIN NO Uniform Transaction None C
any outbound RTGS transaction is generated by the STP Reference
System.
109 _____________refers to the process of developing software Application Development Software Development Server Development System Development D
which would produce the required output from the input
provided of course, using the necessary hardware and
communication systems.
110 The______________is essential to ensure that computer Review Management RTGS Log management Authorized Controller C
security records are stored in sufficient detail for appropriate
period of time.
111 Which of the following is “False“ in case of penetration is a legal attempt at gaining Ensure recoverability of data The purpose of the test is This is often the most B
testing in an IT environment of CBS? access to protected computer in case of system failure. to identify security preferred test as it is an
systems or networks. vulnerabilities and then accurate simulation of
attempt to successfully how an outsider/hacker
exploit them. would see the network
and attempt to break
into it.

112 Which of the following is erroneous statement in case of Unit test, system test, Well documented process Implement new/ It is important that D
Change Management Control? integration test – all should be should be there incorporating changed programme as correct latest version of
carried out. all the changes. per schedule. programe is used but
version number need not
be changed.
113 With respect to the customer changing the Pin at the ATM Old offset value used to derive Old Pin verified using Natural Pin remains the Old offset value erased A
which procedure is the ”false“ procedure? new PIN. HSM/SSM. same. and new offset value
generated.
114 IN CBS, changes to the application server are not made Trail server Validate server Test Server None of the above C
directly to it, instead done first on a __________

115 All the various servers in the central data centre are LANs VLANs WANs MANs B
seggregated through _______
116 The __________ is a complete process in the computer so Consalidation Password Policy protection Validation D
that it ensures that data that is fed in conforms to certain
prerequisite conditions.
117 When the central Data base is busy with central end of day Positive Balance File Application Server Centralised Data base Central Office Data A
activities or for any other reason, the file containing the security Centre.
account balance of the customer is sent to the ATM switch.
Such a file is called __________

118 Bank mate is developed by the _______ Infosys HCL Technologies TCS I-Flex B
119 The IBDS is located in a ____________ Militarised zone City Zone State zone demilitarised zone D
120 The main components of Internet Banking system consist of Web server IBAS IBDS All the above D
__________
121 Copy of the Anti Virus Software was updated promptly and Hacking Method Push-pull method Both A &B None of the Above B
regularly at the Data Centre and pushed into all of the
servers and in all the systems in the branches by ________

122 The __________which is also residing in the server at the Sytem software utility software Application Software Application Server C
branch actually does the banking operations.
123 In Core Banking concept all the systems of the bank are local line Leased line Broadband None B
connected to the Central office by means of a connectivity
which may be either a _________ or a dial up line.

124 The ________ is generated by the software and directly sent 16 digit number Personal Identification Net transaction ID NO ATM No B
to equipment for printed the Pin Mailer. Number
125 ____________would also include the existence of built in Output Control Input control Process Control Data Control C
controls in the system to ensure proper processing of input
data so as to provide the required output.
126 ____________refers to an arrangement wherein the issuing Letter of Credit Letter of Tax Letter of Payable Letter of Receible A
bank acts on the request and instructions of a customer.

127 _______________ is a process by which the bank ensures Business Recovery Planning Business Continuity Planning Disaster Recovery None B
the maintenance and recovery of operations. Planning
128 At which phase of testing the version of software is called “ Programmer testing User testing (a) & (b) both None of above C
beta version”?
129 Finacle developed by _________ Infosys HCL Technologies TCS I-Flex A
130 In an Organization structure of IT Department which of the Database Administrator and Network administrator and Network Administrator Tape Librarian and B
following function is incompatible? Security Administrator. Database Administrator. and Security database administrator.
Administrator.

131 The number that is stored in the ATM switch is the Pin No - offset value Offset value - Pin No Pin No - Natural Pin Offset Value - Natural C
difference of which of the following number? Pin
132 The information retrieval of transactions taking place at Soft copy of Electronic journal Hard copy of Electronic Cash register (a) and (b) both A
ATM located at remote locations is through _________ Journal

133 The number that is generated as soon as the customer Offset value Pin sent to customer Natural Pin Card Number C
inserts the card in the ATM machine is __________
134 Which is not a Database management system. Unix Oracle Sybase Foxpro A
135 The data can be entered into a table in the ____________ Design Datasheet Dataview All of the Above B
view.
136 MS Access provide__________ datatype to create link to a Link Hyperlink Insert Attached B
web page,file,or email address.
137 To make a switchboard appear while opening the database. Set as database startup Option Set as Form startup Option in Set as Switchboard None of the above C
in Access Option Access Option startup Option in Access
Option
138 To add or delete buttons to Switchboard, which option is Add Option Edit Option Modify Option Build Option B
used in Switchboard Manager is used.
139 The Switchboard Manager is a dialog box that allows TRUE FALSE A
creating a switchboard for an Access database.
140 A macro can automate data entry in Access 2010. FALSE TRUE B
141 Which of the following data-type is not available in MS- Text Number AlphaNumeric Date C
ACCESS
142 The validation can be defined at____________ level in Table Form Both A and B Report C
Access 2010
143 A macro can be attached to an event of a A form A report A button All of the above D
control_________________________.
144 How to add switchboard in Access 2010? Click->File tab->Option Click->File tab->Option Click->File tab->Option Click->File tab- A
Button->Quick Access Toolbar- Button->Command not in Button->Quick Access >>Quick Access
>Command not in Ribbon- Ribbon->Switchboard Toolbar->Switchboard Toolbar->Command not
>Switchboard Manager->Add- Manager->Add->OK Manager->Add->OK in Ribbon->Switchboard
>OK Manager->Add->OK

145 The command Design Application performed Close the current database Opens a secondary Opens the Switchboard Opens a report in Print C
action____________ on switchboard. switchboard. Manager. Preview.
146 In a Query the data can be sorted based Single column Multiple columns Both A and B None of the above C
147 Switchboard Manager only allows a maximum of Nine Eight Seven Six B
__________command buttons on a switchboard
148 MS Access 2010 provides a __________pane that contained Action List Action Catalog Action query Action Box B
large list of actions to be chosen,enabling a wide range of
commands that can be performed
149 SQL is considered to be a __________ 2GL 3GL 4GL None of the above C
150 Which action in MS Access macro applies a fliter or query to DoFilter FindFilter ApplyFilter UseFilter C
a table,form or report.
151 Opens a query in the Datasheet view, Design view, or Print OpenQuery ShowQuery RunQuery FindQuery A
Preview which macro action used in MS Access.

152 Among +, <>, MOD, AND, <= operator which operator + MOD AND <> B
has the highest priority.
153 The Strcomp() function is a__________type function. Math Financial Text Date & Time C

154 The SGN() function is a ____________ type function Math Financial Text Date & Time A

155 Which of the following symbol is used to write a sub query [] () {} # B

156 For the Non-Aggregate Total field, the criteria can only be TRUE FALSE A
specified using the Where clause.
157 When you create a field using text data type in MS Access 255 256 258 128 A
2010, by default field will have ____ character.

158 To export an access table to an XML File, which of the Right-click the table and select Go to External Data - Right-click the table and Both A and B A
below steps must be followed? Export ->XML >Export, click on More and select send as XML
select XML
159 If we are using the same table for main query and sub- Alternate names to the tables No need to alternate name to Aliases name to the tables Both A and C. D
query,we need to provide___________. the tables
160 Update Query can be used to update_________ in MS Single Record More than 1 record Both A and B None of the above C
Access 2010.
161 Delete Query can be used to delete Single Record More than 1 record Both A and B None of the above C
162 How many Primary key constraints can create in a Only one Two As many All of the Above A
table______.
163 Unmatched Query can help to find records that have no FALSE TRUE B
corresponding reord in other tables.
164 MS Access 2010 provides queries that can be used for Sum() Count() Avg() All of the above D
obtaining the aggregated results instead of individual records
are____________.
165 A function that Counts the set of values that satisfy the given CountA() Count() Countif() All of the above B
criteria in MS Access 2010 is___________.
166 The _________ operator is used to find the null records in "= NULL" NULL IS NULL All of the Above C
a table.
167 Aggreagate Query also known as___________. Group By queries Total query Action query Both A and B D
168 Which Query wizard is used to find repeated records in a Simple Query Wizard Duplicate Query Wizard Cross table Query Wizard All of the Above B
table?
169 Append Query is used to ______________ in a table in MS Add Records Delete Records View Records Update Records A
Access.
170 Which type of joins not available in Access 2010? Inner join Left outer join Right outer join Full join D
171 A join returns only those rows from both tables that match Inner join Left outer join Right outer join Full join A
on the joining field is___________ in MS Access 2010.

172 The query returns all of the rows from left table, and also Right outer join Left outer join Inner join None of the above B
those rows from the right table that is known
as____________.
173 The query using ___________ returns all the rows from Right outer join Left outer join Inner join None of the above A
right table, and also those rows from the left table that share
a common value on both sides of join.

174 How can we add a table to the Query Design Select Create-> Add Table Select Database Tools-> Add Select Design -> Show Select the table from C
window_________? Table Table navigation Pane.
175 ___________can be considered a questions in a data base. Queries Form Reprt Macro A

176 Operands can be_________ in MS Access 2010. Literals Identifiers Function All D
177 When you create relationship between two tables, the Text & Number Number & Text different data type Same data type D
Common field's data type should be
178 In example "Hello"+" " +" everyone" ,hello is _____ Text Literal Date Literal Number Literal None of the above A

179 Length("Ms Access") will return the count of charcters is 9 8 7 6 A


__________.
180 AND ,OR is a kind of ________ in MS-Access 2010. Arithmetic Logical Comparision None of the above B
181 Comparision operators is also known as_______ in MS- Arithmetic Logical Relational None of the above C
Access 2010.
182 LIKE operator works with______in MS Access 2010. Text Date Both A and B None of the above C

183 IN operator is used __________ in MS Access 2010. To match the value to a set of To find the null records of returns true or false None of the above A
values given table
184 Operator precedence is similar to _____ that is follwed in BODMAS BOMDAS BODSAM None of the above A
Algebra in MS-Access 2010.
185 Text files that are organized properly fall into one of two Delimited files Fixed-width files Both A and B None of the above C
types are__________
186 To create an unmatched Query using wizard, minimum one two three four B
required number of table or fields is_________.

187 While creating the query, the criteria can be set in Only one More than One Field As many field All of the Above D
188 SQL stands for____________________. Sub Query Language Structured Query Language Structured Question System Query Language B
Language
189 In MS Access query which logical operator returns True if IF AND AND Both AND LIKE AND B
both the expressions compared are true.
190 In MS Access query which logical operator returns True if OR IF OR IS OR LIKE OR A
either of the expressions compared are true.
191 Enfore Referencial Integrity option is used to restrict Parent Table Child Table Any one table All of the Above B
enerting data in
192 In MS Access left("Access",3) function will Acc3 Acc 3Acc ess B
return__________.
193 Which function is used to converts the text to lower case in Lcase() Lowercase() Lower() None of the above A
MS Access 2010.
194 Which function is used to remove leading or trailing spaces Remove() Removetext() Trim() None of the above C
in a text in MS Access 2010.
195 _____________ is contains a set of predefined functions in Expression Design Expression Builder Expression Box Expression elements B
MS Acccess and helps build complex expression.

196 Which of the following is a Database Software Excel Outlook Oracle C++ C
197 Which of the following is not the characteristics of a Each Table row represents a Each row/column The order of the rows Each column has a D
Relational Table? two-dimensional structure intersection represents a single and columns is specific range of values
composed of rows and columns data value immaterial to the DBMS known as the Tuple
domain
198 Which record will be retrieved if the query criteria is < All values less or more than Value less than 95 characters Records with date before All of above C
#1/1/11#? 1,195 2011
199 MS Acces 2010 reads and writes to the .accdb file format in Pages Encrypt pages Base Database None of the above A
chunks also known as_____________.
200 The tab in Expression Builder in which we write expressions Expression Elements Operator Button Expression Box Expression Builder C
is known as _____________. window
201 The criteria expression LIKE?B*. Will match all text starting from Will match all text ending Will match all text having Will match all text A
B from B second character as B starting with a digit

202 __________ queries are useful for summarizing Select query Crosstab query Action query Parameter query B
information, and are somewhat similar to pivot tables in MS-
Excel.
203 While entering record in Datasheet view, in which order the Alphabetical Order At the end of the table Any where in the table Beginning of the table B
records can be entered
204 When you delete the record in form, it deletes the record Form only Form but not in table Table but not in Form Form & Table D
from__________.
205 Having clause is used in the aggregate query in MS Access FALSE TRUE B
2010
206 The controls that are not linked to any field of the table or ActiveX control Unbounded Controls Graphics Control Bound Controls B
query on the form are known as ________.
207 Which property of the form can be used to insert a Caption Background Record Source Picture D
background image in MS Access 2010?
208 ___________ is a report that is inserted in another report in Inner-Report Sub-Report Inside-Report Insert-Report C
MS Access 2010.
209 A bound main report is based on a ______________ and Table or query,Inner-Report Table or query,Main-Report Table or query,Sub- None of the above C
its _____________ contain realted information. Report
210 DDL stands for ____________ Data Definition Language Data Defined Language Detailed Definition Data Detailed Language A
Language
211 A___________used to compare multiple values of Pie Chart Area Chart Bar Chart Column Chart D
categories or differences over a period of time.
212 A________used to compare trends over a period of time. Pie Chart Line Chart Bar Chart Column Chart B

213 To create a read-only copy of the database, which of the .ACCDB .ACCDE .MDW .ACCDT B
following file format can be used?
214 The database administrator created a split database and Front-end database Back-end database Both of them None of them B
created a front-end database and back-end database
file.Which of the file should be stored on the server ?

215 To make database package and digitally sign using which File->Save&Publish->Save File->New->Save Database File->Save as->Save File->Save&Publish- A
option in Access 2010 ? Database as->Package and sign as->Package and sign Database as->Package >Save Object as-
and sign >Package and sign
216 In which formats can the Collect Data through email HTML and InfoPath Access Forms Visual Basic Application Excel attachment A
message feature can send the data entry form?
217 Once a mail is sent using the collect data through email Export to Outlook Options in Tool menu of Manage replies All of the above C
message feature in Access 2010. The mail status can be Access
checked using________________.
218 The ___________ type of data cannot be collected using Text Number Date/time AutoNumber D
Collect data through email messages.
219 What is the memo data type field used for? To add table To store objects created in For long text entries For shout text entries of C
other programs no more than 255
characters
220 The filter By selection feature allows you to filter: Those records that match an Records based on a criterion Records that meet any of All of above A
entity in a field you specify several criteria you
specify
221 DML stands for _____________ Detailed Maintaining Language Data Maintaining Language Data Manipulation Detailed Manipulation C
Language Language

222 Which editor was provided for use with Access Basic? The Visual Basic 1.0 editor Notepad The QuickBasic editor All of above B

223 How do you update Pivot Table report data after changes Save your changes, close the Select the Pivot Table Click the report, and on All of the above C
are made to the source data? workbook, and then reopen it. worksheet and press F9 on the Pivot Table toolbar,
the keyboard click the refresh data
button
224 What are the different views to display a Table ? Datasheet View Design View Pivote Table & Pivot All Of Above D
Chart View
225 Which Of The Following Creates A Drop Down List Of Ole Object Hyperlink Memo Lookup Wizard D
Values To Choose From?
226 A __________ Enables You To View Data From A Table Form Query Macro Report B
Based On A Specific Criterion
227 The Database Language That Allows You To Access Or DCL DML DDL None Of Above A
Maintain Data In A Database
228 DCL Provides Commands To Perform Actions Like Change The Structure Of Insert, Update Or Delete Authorizing Access And None Of Above C
Tables Records And Data Values Other Control Over
Database
229 Which is not a Database Model ? Network Database Model Relational Database Model Object Oriented Structureed Database D
Database Model Model
230 Which Of The Field Has Width 8 Bytes? Memo Number Date/time Hyperlink C
231 This Is The Stage In Database Design Where One Gathers Data Definition Data Refinement Establishing Relationship None Of The Above A
And List All The Necessary Fields For The Database
Project.
232 Whenever a tables gets update, the dependent query will Not update update automatically have to update manually never update B

233 The Third Stage In Designing A Database Is When We Relationship Join Query None Of These A
Analyze Our Tables More Closely And Create A
___________ Between Tables
234 What is the purpose of the Switchboard Manager in To build a main switchboard Creates the macros used to To allow the user to To allow changing from A
Microsoft Access 2010? form that controls all other program an automatic switch from one database one report to another.
forms. application. file to another.

235 How does a query-based report differ in design to a report The reports are restricted in It doesn’t It doesn't have as many The only report type B
based on just one table? size. design options. available is the Design
Report.
236 How would you include some plain text into a mailing label Type the text directly into the Use the > button. Use the Mailing label Use the >> button. C
report? label. wizard text option.
237 In a Microsoft Access 2010 report, the page numbering Report Footer Section Header Page Footer Page Header C
would most likely be placed into the:
238 If you wished to present a professionally looking form on Pivot Table Pivot Chart All The tools of the form Form Wizard Columnar C
screen that would show all the necessary information, which design control gallery.
of the following form design tools would you most likely
use?
239 What are the benefits of an ACCDE Reduces the size of the Optimizes memory usage and Protects the VBA code All of the above D
file__________________________ in Access database improves performance. from being viewed or
edited while still allowing
it to run.

240 An .ACCDE file is a ___________ version of the original Fixed-down Locked-down Open-down None of the above B
.ACCDB file.
241 Which type of the query is used to accept the value from the Make Table Query Update Query Delete Query Parameter Query D
user while executing the query and fetch records accordingly

242 To encrypt the databse in Access 2010 must be opened in Open Secure mode Open Inclusive mode Open Exclusive mode Open Read Mode C
the __________________.
243 To extract the records based on date field, which of the $ # () "" B
symbol should be used
244 FIX() is a kind of ____ function in MS-Access 2010. Math Date Text None of the above A
245 MS-Access 2010 has added new features of ______ to Macro Form Report None of the above A
eliminate the need of VBA code
246 Encrypting a database does not restrict access to database Open Modify Read Write A
objects, but to __________ the database.
247 The setting for the Security option can be handled File Tab ->New Options, and File Tab ->Access Options, File Tab ->Security None of the above B
using_______________________ in Access 2010. selecting the Trust Centre tab and selecting the Trust Centre Options, and selecting
from the Access Option tab from the Access Option the Trust Centre tab
window window from the Access Option
window
248 Third Party Encryption Technology can also be applied to TRUE FALSE A
the database of Microsoft Access 2010.
249 To create a split database in MS Access 2010 go to which Create Tab External Tab File tab Database Tools D
tab?
250 After spliting database,frontend database Forms Query Report All of the above D
holds_________________.
251 After spliting database,backend database Tables Forms Query Report A
holds_________________.
252 When an Access database is split, it creates two A back-end database & front- A new database & Old primary database & None of the above A
files_________________. end database database. secondary database
253 A Data Access Page is a special type of _________ that XML page HTML Page Web page None of the above C
allows users to interface with database using Internet
Explorer.
254 An _____________ is a group of people with a common Company Enterprise Organization Concern B
goal, having certain resources at its disposal to achieve the
common goal.
255 ______________ can be defined as subject-oriented, Data Models Data Warehouses Data Mines Operational Data B
integrated, time-variant, non-volatile collections of data used
to support analytical decision making.

256 ________________ databases contain detailed data that is Operational Non-Operational Subject-Oriented Informational A
needed to satisfy processing requirements but which has no
relevance to management or analysis.
257 Data in the Data Warehouse is ______________ , not Dynamic, Static Non-Volatile, Static Volatile, Static Static, Dynamic D
____________.
258 ____________ data contains an historical perspective that is Operational, Informational Operational, Static Informational, Static Informational, D
not generally used by the _____________ systems. Operational

259 The definition of data elements in the data warehouse and in Masterdata Detaileddata Metadata Basedata C
the data sources and the transformation rules that relate
them, are referred to as ___________.

260 Data warehouses are not the optimal environment for Structured Unstructured Informational Operational B
____________ data.
261 Maintenance Costs are high for Data Warehousing. TRUE FALSE A
262 Data Warehousing can be used for ___________________. Credit Card Churn Analysis Insurance Fraud Analysis Logistics Management All of the above D

263 _________________ is the process of extracting patterns Data Analysis Data Warehousing Data Mining Data Modeling C
from data.
264 ___________________ is an approach to quickly answer Business Processing Online Analytical Processing Product Life Cycle Supply Chain B
multi-dimensional analytical queries. Management Management Management
265 ________________ include money, manpower, materials, Costing Production Sales Resources D
machines, technologies etc.
266 The Output of an OLAP query is typically displayed in a Matrix Columnar Stepped Outline A
___________ format.
267 ______________ companies is planning to support tens of B2B B2C C2B C2C B
millions of customers with just hundreds of employees.

268 Which of the following is the limitation of Open Source Increased Complexities Legal Complexities Unsuitable for All of the above D
ERP? conventional applications

269 Which of the following is not an Open ERP software? Openbravo SQL-Ledger Open-Project ERP5ERP C

270 _____ is the process of integrating all the business functions EDI ERP BPM None of the above B
and processes in an organization to achieve numerous
benefits.
271 ________ must consider the fundamental issues of system Manager Auditor Top Management Either A or B or C A
integration by analyzing the organization's vision and Commitment
corporate objectives.
272 The more the number of __________, the longer the modules process package units D
implementation time.
273 Customization of ERP systems is one of the major TRUE FALSE A
challenges in auditing ERP security.
274 Tally.ERP 9 provides graphical analysis of data which helps TRUE FALSE A
the user to perform deeper analysis.
275 The user can ________ the company data into multiple Import Export Split Backup C
companies as per financial periods required.
276 ___________ is a collection of activities that make one or Business Model Business Function Business Process Business Operation C
more kinds of input and creates an output that is of value to
the customer.
277 E-Filing of Returns refers to the process of electronically Intranet Internet Extranet Any of the above B
filing your tax returns through the ___________.

278 Tally.ERP 9 does not allows you to export the ETDS forms TRUE FALSE B
in NSDL compliant formats as well as facilitates printing of
TDS Forms in Physical Form.
279 Tally.ERP 9 offers a data encryption option called Tally Data Encryption Tally Data Encoding Tally Vault Tally Data Conversion C
_______________.
280 ___________________ is the process of exchanging Serialization Randomization Synchronization Asynchronization C
Tally.ERP 9 data between two or more locations.
281 The Tally website offers _______________, by which a Tally Forum Tally FAQ Tally Support Tally Chat D
user can communicate with a Tally representative and get
required information.
282 Tally.NET use _______________ for centralised Account Data Centre Control Centre Cloud Centre Administration Centre B
Management.
283 The data is transferred between the remote location and the Encoding Decoding Encryption Decryption C
server using a secured mechanism called
__________________.
284 Sales Tax Ledger falls under which Group? Indirect Expenses Duties and Taxes Sales Purchases B
285 Alias represents ___________ in Tally.ERP9. Short name Nickname Code name All of these D
286 If we purchase any Fixed asset in credit, we can pass it from Payment mode Receipt mode Journal mode Contra mode C
_________.
287 Information systems can be designed so that accurate and Integrated Information Systems Isolated Information Systems Non-Integrated Non-Isolated A
timely data are shared between functional areas. These Information Systems Information Systems
systems are called _______________________________.

288 To save entry without any amount, we have to use Cost Center Maintain Multiple godown Allow 0 value entry Use Rej Notes C
_____________.
289 Transfer of materials from one godown to another godown, Manufacturing Journal Stock Journal Purchase Journal Both A & B B
use ______________.
290 While exporting Ledgers from Tally to Web Page, we use XML Format ASCII Format SDF Format HTML Format D
_________.
291 Budget represents _______________________. Estimation Forecasting Assumption All of these D
292 In Service tax Credit Adjustment (%) should be either 0.2 1 Both A & B Neither A &B C
____________.
293 Service Tax Report can be seen from _________________. Display > Day Book Display > Account Books Display > Statutory Display > Statutory D
Masters Reports
294 Can we allow Expenses/Fixed Assets in Purchase vouchers? Yes No A

295 Transfer from Main Cash to Petty Cash we require to pass Payment Contra Receipt None of these B
_______ voucher.
296 Income Tax number of the Company will appear in which Cash/Bank Book Profit and Loss A/c Reminder Letter None of these D
report?
297 A business model is not a ___________ model. system mathematical Conceptual Logical B
298 The approach to ERP is to first develop a ______________ Business Model Business Function Business Process Business Operation A
comprising the business processes or activities that are the
essence of a business.
299 Which of the following is/are the data warehousing activity? Identifying and prioritizing Defining the correct level of Establishing a data All of the above D
subject areas to be included in summarization to support warehouse help desk and
the Data Warehouse business decision making training users to
effectively utilize the
desktop tools
300 ___________________ is the succession of strategies used Business Processing Online Analytical Processing Product Life Cycle Supply Chain C
by management as a product goes through its life cycle. Management Management Management

301 Is there a fixed qualification for internal auditor_________. TRUE FALSE B

302 Which of the following will not appear in the home page of Powerpoint Word Paste Document My Templates C
K-Doc?
303 To change an email header so that the message appears to Email middle attack. Email Spoofing. Email hacking. Email tracking B
have originated from someone or somewhere other than the
actual source is known as___________.

304 To playfully satirize a website is known as_____________. Web tapping Web Interception Web spoofing Web threating C

305 _________is the complete package to manage the billing Payroll eSecretary Billing and Accounting K-DOC application C
requirements of a CA firm on cash system of accounting. software

306 Which of the following is not a/an feature of eSecretary? Contact Management Greeting Management Email Management Share certificate printing D

307 Annual return preparation can be done using ________. ICAI-ROC application K-DOC application ICAI XBRL Software Payroll A

308 ________is correspondence automation & management K-DOC application eSecretary ICAI XBRL Software ICAI-ROC application B
software that is seamlessly integrated with Microsoft Office.

309 ________ is an independent,objective assurance and Statutory audit Tax audit Internal auditiing None of the Above C
consulting activity designed to add value and improve an
organization's operations.
310 Which of the following is/are the main purpose of the Financial reporting Operations of the Both A and B Either A or B C
internal audit? organization
311 As per _____________of the Income tax Act,every person Section 45 Section 44AD Section 43B Section 44AB D
carrying on business or profession is requires to get his
accounts audited by a CA before the "specified date".

312 __________________ refers to use software/applications ERP Office automation Either A or B None of the Above B
to automatically perform tasks such as accounting,preparing
trial balance, financial statements etc. and electronically
transmit data or information using internet..

313 FEMA Stands for _______________. Foreign Exports Management Financial Enterprise Foreign Exchange None of the Above C
Act Management Act Managament Act
314 Which application helps the management to allocate the Resource allocation and Knowledge management Document Management Client management D
revenue to the credit of the right employee who identified scheduling Systems
the opportunity?
315 Who has full privileges in the financial accounting Database administrator Account administrator System administrator User Administrator C
application?
316 _________is the centre point of the financial accounting AP module GL module AR module FA module B
application as any transactions having financial impact
carried out in any other module will reflect in this module.

317 In Financial Accounting Application,the transactions flow TRUE FALSE B


from GL (General ledger) to other modules.
318 Which of the functionalities is not provided in the Evaluation of Vendors Receipts of goods or service Invite and analyze Comparison with D
purchasing module of Financial Accounting Application. quotations from vendors budgets

319 In Financial Accounting Application,automatic sequence Purchasing Accounts Payable Expense Management Fixed assets C
number of documents control is not required in which of the
following module?
320 Which module of Financial Accounting Application can be Purchasing Sales Accounts Payable Accounts Receivable B
used for assigning credit limit to customers?
321 Which of these will trigger/alert for timely payment ? Accounts Payable Accounts Receivable Expense Management Bank Reconcilations C
322 We can manage interviews,offers and job vacancies by using Resource allocation and HR and Payroll applications Knowledge management None of the Above B
which of the application? scheduling
323 ________,___________,__________ are commonly Confidentiality,Integrity and Confidentiality,Integrity and Confidentiality,Integrity Confidentiality,Integratio A
referred to as CIA in information security parlance. Availability Authentication and Access rights n and Authentication

324 ___________provides information about updation of Performance management HR management system Payroll Timesheet application D
project cost based on time spent by employees on various system
projects.
325 Which of the follwing is not a/an functionality provided by Capture the Key Performance Employee designation and Automated alerts for Prepare summary or bell B
PMS? Indicators reporting structure pending appraisals curve analysis of all
employees
326 ___________automates the calculation of salary for taking Timesheet System HR management System Payroll System Knowledge management C
inputs from the timesheet application, leaves from Leave System
Management System and salary details from the HR master
data.
327 Which of the follwing is not a control in Leave Management Reduce administrative burden Excess leave Error free capture of Approval workflow C
System? on HR leave details
328 Permanent Audit File are obtained once but updated on half-yearly yearly monthy quarterly B
__________basis.
329 In Permanent Audit file, _______ is not the key data Organization chart Client’s accounting manual Copies of clients’ Copies of important C
documented. incorporation documents contracts or long term
like MoC lease agreements
330 The Document Management Sytem offers the Role based access Complete audit trail Cost effective to maintain All the Above D
features___________. the documents in soft
copy

331 ________is a type of training in which user logon on the Internal Training E-Learning Classroom Training E-Training B
training server with a user ID and password.
332 In some cases, trainee is supposed to appear for the Classroom Training E-Learning Virtual Learning All the Above B
examination/test at the end of the training is____________.

333 ________ are the hardware/infrastructure equipments used PC Application Server WAN All the Above D
in a CA firm.
334 _____________means information available in the Confidentiality Integrity Availability Authentication B
organization should not be altered or modified by
unauthorized personnel.
335 Which of these is/are the standard email program used in an Microsoft Exchange Lotus Notes Both A and B None of the Above C
organization?
336 Which of the following is not a characteristics of WAN? Most WANs are owned by only Compared to LAN, its WAN uses only private Switches are used to B
one organization. transmission speed is low networks. connect LAN and WAN

337 _________is protection of information assets from threats Confidentiality Integrity Information Security None of the above C
to preserve their value.
338 Which types of information assets need to be secured in a Client data Own data Own documents All the above D
CA Office?
339 The extent and level of _________ would depend on the Availability Confidentiality Integrity Authentication B
nature of information.
340 __________ of information might be affected due to denial Integrity Authentication Confidentiality Availability D
of service attack or some other reasons.
341 __________means the sender cannot deny having sent a Non-Repudiation Integrity Authentication Confidentiality A
message and receiver cannot deny receiving the message.

342 Risk may not be _______ in nature. reputational financial operational vulnerable D
343 The process of identifying an individual, usually based on Availability Authentication Confidentiality Integrity B
user id and password in an organization is
called______________.
344 Which of the following is not a software equipment required Resource allocation and Client management HR and Payroll None of the Above D
in a CA's office? scheduling
345 Which of the following is not an application arranged by ICAI-XBRL suite K-DOC Billing and Accounting ICAI-TOC D
ICAI?
346 How many stages are there in the sales cycle? 2 3 4 5 B
347 PBX stands for ________ Private Exchange Branch Public Exchange Branch Private Branch exchange Public Branch exchange C

348 XML stands for_________ Expansion Markup Language Expansion Makeup Language Extensible Markup EXtensible Makeup C
Language Language
349 VBA stands for_______________ . Visual Basic for Applications Visual Basic for Applets Visual Basic for Apple None of the above A
350 Find the correct sequence in case of XML file, are Structure, store, and transport Store, structure, and transport Structure and store Store and transport A
information. information. information. information.
351 Programming of Macros is done in programming Language VBA ASP.Net Java C++ A
___________.
352 As Bank auditors,Many Banking applications generate text Txt format Csv format Both A and B Nither A Nor B C
files in ____________.
353 Macro security is enabling through __________. Not Required Developer tab>Code>Macro Developer Developer B
Security tab>Modify>Macro tab>Controls>Macro
Security Security
354 In Excel, Sampling option is available in ___________ . Insert Data Analysis View None B

355 Requirements for preparation of cash budget in Excel. Knowledge of accounting Knowledge of formatting an Knowledge of cell linking Knowledge of all of the D
excel sheet & basic formulae above.

356 ROE stands for __________. Recall on Equity Return on Equity Return on Enquary Return of Equalisation B

357 ___________ is a statistical procedure that uses sample Confidence Interval Hypothesis ANOVA None of the above B
evidence and probability theory to determine whether a
statement about the value of a population parameter should
be rejected or should not be rejected.

358 ____________ is a statistical tool used to create predictive Regression equation Regression Multiple Regression Single Regression C
models.
359 __________ shows the ability of a company to pay its Quick Ratio Current Ratio Liquidity Ratio Solvency Ratio C
current financial obligations.
360 Macro enabled workbook file extension is .xlsx .xlsm .xlsv .xlsw B
_______________
361 ___________ shows dependency of a firm on outside long Quick Ratio Leverage Ratio Liquidity Ratio Solvency Ratio B
term finance.
362 To record a Macro in relative mode,"Üse Realtive Developer Tab View Tab Both A and B Nither A Nor B C
References" available in which tab of excel ?
363 There are _________ ways to open a Macro enabled 3 2 4 1 A
workbook.
364 ANOVA stands for___________ Analysis of Value Analysis of Varity Analog of Variance Analysis of Variance D
365 A function doesn’t require an argument is___________. DATE() TODAY() MONTH() YEAR() B

366 In Excel, there are __________ functions for calculation of 4 5 6 3 B


depreciation.
367 SLN function used to calculate depreciation as For calculation of depreciation For calculation of For calculation of For calculation of B
per_________________. as per Sum of Years Digit depreciation as per Straight depreciation as per depreciation as per
Method. Line Method. Variable Declining Double Declining
Balance Method. Balance Method.
368 SYD function used to calculate depreciation as For calculation of depreciation For calculation of For calculation of For calculation of A
per_________________. as per Sum of Years Digit depreciation as per Straight depreciation as per depreciation as per
Method. Line Method. Variable Declining Double Declining
Balance Method. Balance Method.
369 DB function used to calculate depreciation as For calculation of depreciation For calculation of For calculation of For calculation of C
per_________________. as per Sum of Years’ Digit depreciation as per Straight depreciation as per depreciation as per
Method. Line Method. Declining Balance Double Declining
Method. Balance Method.
370 DDB function used to calculate depreciation as For calculation of depreciation For calculation of For calculation of For calculation of D
per_________________. as per Sum of Years’ Digit depreciation as per Straight depreciation as per depreciation as per
Method. Line Method. Declining Balance Double Declining
Method. Balance Method
371 XML is a ___________ Recommendation. W3C W1C W2C W4C A
372 VDB function used to calculate depreciation as For calculation of depreciation For calculation of For calculation of For calculation of A
per_________________. as per Variable Declining depreciation as per Straight depreciation as per depreciation as per
Balance Method. Line Method. Declining Balance Double Declining
Method. Balance Method.
373 PV Ratio stands for _____________________. Point Volume Ratio Point Varaiance Ratio Profit Volume Ratio Profit Variance Ratio C
374 BEP stands for __________________________ Break Easy Point Break Even Point Balance Equal Point Break Equal Point B
375 Data Validation available in which Tab? Formulas Insert Data Developer C
376 ___________function returns value from a given data range VLOOKUP() HLOOKUP() INDEX() LOOKUP() C
based on row and column.
377 Which function categories are not available in Excel. Statistical Engineering Math & Trig Arts D
378 PMT Function is belongs to which categories of Excel Text Logical Financial Math & Trig C
function ?
379 NPV stands for_______________________________ Net Present Value Net Proper Value Net Present Variance Negative Present Value A

380 _______function uses a fixed rate to calculate depreciation DB VDB SYD SLN A

381 Which of them is not a Conditional Operators symbols? < </ <= <> B

382 XML is a language that is very similar to which language ? C HTML C++ JAVA B
383 Strings are to be always enclosed in double quotes when TRUE FALSE A
used in a formula.
384 Parentheses are used to change the order of calculation. TRUE FALSE A

385 In Excel the function =Abs(-4) returns __________. -4 2^2 4 None C


386 _______ function returns the remainder after a number is DIVISOR() MOD() MODE() REMAINDER() B
divided by a divisor.
387 If User want to display the formulas rather than the results Formulas > Formula > Show Formulas > Formula Auditing Formulas > Function > Formulas > Formula B
of the formulas then choose______________. Formulas. > Show Formulas. Show Formulas. Auditing > Function >
Show Formulas.
388 _______________ reveal about the current and future Report Data Financial statements None C
financial condition of the company.
389 Which of them is a Intangible assets? Goodwill and Patents. Cash and Property. investment and securities. None of the above A

390 CR stands for___________________. Current Ratio Clear Ratio Current Rate Clear Rate A
391 QR stands for___________________. Quick Rate Quality Ratio Quality Rate Quick Ratio D
392 Debt – Equity Ratio =Long term debt / Shareholders funds. TRUE FALSE A

393 DTD stands for ___________, which is called XML Direct to Direct Document Type Definition Data Type Definition Data to Data B
Schema.
394 ACP stands for _____________. Average collection price Average collection payment Average collection period None of the above C

395 FATR stands for _____________. Fixed all turnover ratio Fixed assets test ratio Fair assets turnover ratio Fixed assets turnover D
ratio
396 A _________ can be a numerical fact. Statistic Sale Salary Number A
397 __________ stands for reduction in value of fixed assets. Depreciation Data Document Detail A

398 Value of fixed assets is generally reduced over the period of Wear & Tear Change in taste of people Change in technology All of the Above D
time due to __________.
399 Profit equals to __________. Purchase - Total Cost Sales - Total Cost Product - Total Cost Manufacturing - Total B
Cost
400 Examples of fixed cost are __________. Salary of administrative staff office rent Both A and B None C

401 Cash budget is prepared for planning for future as far as TRUE FALSE A
movement of cash is concerned.
402 Discounting is not the process of determining the present TRUE FALSE B
value of a payment or a stream of payments that is to be
received in the future.
403 PAN must have ________ characters only. 8 10 11 12 B
404 The extension of a XML document is ______________. (.xsd) (.xml) (.mlx) (.xlm) B

405 Sample means the units or items selected for study or TRUE FALSE A
consideration and population means the total set of data
used for selection of samples.
406 _______________ analysis relates items in the financial Financial ratio Price Perodic Report A
statements in a manner that drives out performance
information about the company.
407 How to restrict to run a macro automatically when starting Hold down the SHIFT key Hold down the CTRL key Hold down the ESC key Hold down the ALT key A
Microsoft Excel? during start up. during start up. during start up. during start up.
408 Which option allows you to Bold all the negative values Zero Formatting Conditional Formatting Bold Formatting Negative Formatting B
within the selected cell range?
409 _____________ allow us to perform calculations or Cell referencing functions Absolute functions Worksheet functions Round( ) functions C
operations that would otherwise be too cumbersome or
impossible altogether.
410 Statistical functions in Excel help to calculate Arithmetic Mean Median Mode All of the above. D
__________________
411 Discounting Factor formula is ___________________ = n / (1+a) - r = 1 + (1/r) * n = 1 / (1+a) ^ 2 = 1 / (1+r) ^ n D

412 ________________ is considered as non cash expenditure Cash Flow Depreciation Fund flow Expenditure B
and occupies a prominent place in Profit & Loss Account.

413 The value which can be realized at the end of life of fixed Salvage Value cost life Factor A
asset by selling it is called _________________
414 ____________ is prepared for planning for future as far as Capital Budgeting Cash budget Both A& B Actual Budget B
movement of cash is concerned.
415 To create a XML Map from XML schema, Go to which Review Add-Ins Developer Data C
Tab in Excel ____________.
416 ____________ is the process of determining the present Marginal costing Capital Budgeting Discounting None C
value of a payment or a stream of payments that is to be
received in the future.
417 ____________ is one of the core principals of finance and Marginal costing Discounting PMT None B
is the primary factor used in pricing a stream of cash flows,
such as those found in a traditional bond or annuity.

418 XML schemas in Excel are called XML _____________. Schemas Maps Elements Markups C
419 Excel allows us to use various functions and even simple Financial analysis Equity analysis Leasing decisions and the All of Above D
mathematical calculations which can be used for list goes on
_____________.
420 Which cell reference show the reference to other sheet or Sheet2!C4 Sheet2{C4} Sheet2(C4) Sheet2<C4> A
reference to other workbook in excel ?
421 Which of them is not a Range References? A1:A4 $A$1:A4 A1, A2 , A3, A4 A$1:A$4 C
422 Interest Coverage Ratio equals to _________. EBIT / Debt interest EIBT / Debt interest ETIB / Debt interest EBTI / Debt interest A
423 If particular workbook have to open each time Excel AUTOEXEC folder AUTOSTART folder EXCELSTART folder XLSTART folder D
started, where the workbook should be placed?

424 If the cell B1 contains the formula=$A$1, which of the There is a relative reference to There is an absolute reference Further changes in value Further changes in value B
statement is true ? cell A1 to cell A1. of A1 will not affect B1. of B1 will not affect A1.

425 __________ is a computerized mathematical technique that Finanical Planning Monte Carlo Simulation Corporate Planning Personal Finance B
allows people to account for risk in quantitative analysis and Planning
decision making.
426 XML is case-sensitive ? TRUE FALSE A
427 The exact syntax of PMT function is________________. PMT(nper, rate, pv, [fv], [type]) PMT(rate, nper, pv, [fv], PMT(rate, pv, nper, [fv], PMT(pv, rate, nper, [fv], B
[type]) [type]) [type])
428 The exact syntax of IPMT function IPMT(rate, nper, pv, [fv], IPMT(pv, rate, per, nper, [fv], IPMT(per, rate, nper, pv, IPMT(rate, per, nper, pv, D
is__________________. [type]) [type]) [fv], [type]) [fv], [type])
429 To see the XML Map user must go ______________. Developer>XML> Source Developer> Source File None of the above. A
Menu>Options>Add
in>Excel Add In>XML

430 EMI stands for ______________. Easy Monthly Installment Equating Monthly Income Equal Monthly Equated monthly D
Installement installment
431 Which function is used to calculate the principal portion in IPMT PPMT PMT None of the above B
every installment ?
432 It is a process in which a business determines whether Business Investment Capital Budgeting Capital Investment Investment management B
projects such as building a new plant or investing in a long-
term venture are worth pursuing.
433 What is the file extension of Schema file which contain (.xml) (.xsd) (.xlm) (.mlx) B
schema tags ?
434 NPER stands for______________________________ Total Principal Value Net Per value Total Interest Value Number of Periods D

You might also like