You are on page 1of 5

The trading and profit and loss account is also called —

A ) Balance sheet B) Cash flow statement


C ) Income statement D) Trial balance

23. Tally package is developed by —


A ) Peutronics B) Tally solutions
C ) Coral software D) Vedika software

24. Which of the following describes eUcommerce?


A ) Doing business electronically B) Doing business
C ) Sale of goods D) All of these

25. Which segment do eBay, Amazon.com belong?


A ) B2Bs B ) B2Cs
c ) C2Bs D ) C2Cs

26. Which segment is eBay an example?


A ) B2B B) C2B
C ) C2C D) None of these

27. Which type deals with auction?


A ) fi2B B) B2C
C ) C2B D) C2C

28. Which products are people most likely to be more uncomfortable buying on the Internet?
A ) Books B) Furniture
C ) Movies D) All of these

29. Which products are people most likely to be comfortable buying on the Internet?
A ) Books B) PCs
C ) CDs D) AU of these

30. Which of the following malicious program do not replicate automatically?


A ) Trojan Horse B) Virus
C ) Worm D) Zombie

Which one is a statement of Accounts?


A Cash book
B Journals
C Balance sheet
D Ledger

Which one is not a direct expense?


A Wages
B Octroiduty
C Packing charges
D Office expenses
Which one is a correct equation of balance sheet?
A Liabilities = Assets + Capital
B Liabilities = Assets - Capital
C Liabilities = Assets + Capital
D Liabilities = Assets x Capital

Cash received or expended as a result of company's internal business activities is called


A operational cash flows
B investment cash flows
C financial cash flow
D net cash flow

Assets like "Good will", "Patent" etc come under


A Intangible Assets
B Tangible Assets
C Fictitious Assets
D Floating Assets

Which one of the following do NOT come under FBT (Fringe Benefits Tax)?
A ESOPs
B Super annuation fund
C Rent allowance
D Employers expense on travel

The process of buying and selling product or services and transfer of fund electronically is .....
A E - book
B E - mail
C E learning
D E – commerce

Which one is not a protocol for carrying authentication, Authorization and Accounting formation between
Network Access servers?

A TACACS+
B Diameter
C RADIUS
D MAC

Book keeping mainly concerns with which part of accounting process?


A Analysis
B Preparing financial statements
C Recording financial statement
D Auditing the books of accounts

Which one is an accounting software?


A SQL
B Tally
C VBA
D Java
A budget which is prepared for a very short period say a month or a quarter is termed as
A current budget
B rolling budget
long term budget
short term budget

Which ratio measures the availability of cash to pay the debt?


A Debit ratio
B Activity ratio
Liquidity ratio
Financial ratio

Expansion of TDS is
A Total Deduction of Surplus
B Tax Deducted at Sources
C Tax Deducted at Surplus Total Deduction on Sales

Liabilities which will be redeemed after a long period of time say 10 to 15 years are called
A long term liabilities
B short term liabilities
C contingent liabilities
D current liabilities

What does "CIA" stands for in information security?


A Concrete, Integral and Available
B Confidentiality, Integrity and Availability
C Combined, Information and Availability
D Confidentiality, Information and Authentication

In SDLC (Software Development Life Cycle), What comes after "Design" phase?
Release phase
Requirement phase
Implementation phase
D Verification phase

Q. How many type of companies can be created in Tally?


A) 2 B) 3 C) 4 D) 5

Q. Which menu is used to create new ledgers, groups and voucher types in Tally?
A) Reports B) Import C) Transactions D) Masters

Q. Which submenu is used to for voucher entry in Tally?


A) Vouchers B) Account Vouchers C) Accounts Info D) None of these

Q.A trial balance is a --------------


A) Ledger B) Journal C) Account D) List

Q.Which of the following shows daily balance for a selected voucher type?
A) Daybook B) trial Balance C) Balance Sheet D) None of these

Q.TDS deduction entry can be made through-------------------


A) Payment Voucher B) Journal Voucher C) Receipt Voucher D) All of these
Q.Which of the following describe e-commerce?
A) Doing business electronically B) Doing business
C) Sales of goods D) All of these

Q.Which segment do eBay, amazon.com belong?


A) B2Bs B) B2Cs C) C2Bs D) C2Cs

Q.The best product to sell in B2C e-commerce are--------


A) Small products B) Digital products C) Specially products D) Fresh product

Q.Which is not a function of E-commerce?


A) Marketing B) Advertising C) Warehousing D) None of these

Q.How the transactions occur in e-commerce?


A) Using e-medias B) Using computers only
C) Using mobile phones only D) none of these

Q. Which of the following is uded in B2B to pay for purchase?


A E-commerce B) Financial electronic data interchange
C) Electronic data exchange D) Electronic checks

Q. In a typical indormation security program, what is the primary responsibility of information(data) owner?
A. Ensure the validity and accuracy of data
B. Determine the information sensitivity or classification level
C. Monitor and audit system users
D. Ensure availability of data

Q. A system security engineer is evaluation methods to store user passwords in an information system, so
what may be the best method to store user passwords and meeting the confidentiality security objective?
A. Password –protected file B. File restricted to one individual
C. One –way encrypted file D Two way encrypted file

Q. what is the inverse of confidentiality , integrity, and availability(C.I.A) triad in risk management?
A Misuse ,exposure ,destruction
B Authorization, non –repudiation, integrity
C Disclosure, alteration, destruction
D Confidentiality , integrity, availability

Q An Information security program should include the following elements


A. Disaster recovery and business continuity planning and definition of access control requirements and
human resource policies
B Business impact ,threat and vulnerability analysis, delivery of an information security awareness program,
physical security of key installations
C Security policy implementation, assignment of roles and responsibilities and information asset
classification
D Senior management organizational structure ,message distribution standards and procedures for the
operation of security management systems

Q. Security of an automated information system is most effective and economical if the system is
………….
A. Optimized prior to addition of security
B Customized to meet the specific security threat
C Subjected to intense security testing
D Designed originally to meet the information protection needs

Q Why is computer crime difficult to investigate?


A Privacy law protect people from being investigated
B Computer crime investigations require techniques and tools
C Criminal can spoof their address
D The police have no Jurisdiction over the internet

You might also like