Professional Documents
Culture Documents
Question Answer
No
1 XML stands for_________ Extensible Markup Language
2 XML is a ___________ Recommendation. W3C
3 XML is a language that is very similar to which language ? HTML
4 DTD stands for ___________, which is called XML Schema. Document Type Definition
5 The extension of a XML document is ______________. (.xml)
To create a XML Map from XML schema, Go to which Tab in Excel
6 Developer
____________.
7 XML is case-sensitive ? TRUE
8 Excel works primarily with ________ types of XML files. 2
9 What is the file extension of Schema file which contain schema tags ? (.xsd)
10 VBA stands for_______________ . Visual Basic for Applications
11 Macro enabled workbook file extension is _______________ .xlsm
12 There are _________ ways to open a Macro enabled workbook. 3
13 ANOVA stands for___________ Analysis of Variance
14 A function doesn’t require an argument is___________. TODAY()
15 In Excel, there are __________ functions for calculation of depreciation. 5
For calculation of depreciation as per
16 SLN function used to calculate depreciation as per_________________.
Straight Line Method.
For calculation of depreciation as per
17 SYD function used to calculate depreciation as per_________________.
Sum of Years Digit Method.
For calculation of depreciation as per
18 DB function used to calculate depreciation as per_________________.
Declining Balance Method.
For calculation of depreciation as per
19 DDB function used to calculate depreciation as per_________________.
Double Declining Balance Method
Popular methods of capital budgeting include _________ and payback discounted cash flow,internal rate of
89
period. return,net present value
_________ is the value of all future cash inflows less future cash outflows
90 Net present value
as on today.
___________is the process of defining and analyzing the dangers to
91 individuals, businesses and government agencies posed by potential Risk analysis
natural and human-caused adverse events.
__________ which is used more often, does not involve numerical
92 Qualitative risk analysis
probabilities or predictions of loss.
________ are generally used to present information in a simple and better
93 Charts
way and also be used to analyse the risk in a better way.
It is a technique used to determine how different values of an independent
94 variable will impact a particular dependent variable under a given set of Sensitivity analysis
assumptions.
_______ involves computing different reinvestment rates for expected
95 Scenario analysis
returns that are reinvested during the investment horizon.
96 NPER stands for______________________________ Number of Periods
Which function that is used to calculate the payment for specific loan terms
97 PMT
____________
98 ________helps to break down the Return on Equity Du Point Analysis
_______ is a common method for financing property, facilities, and
99 Leasing
equipment.
Structure, store, and transport
100 Find the correct sequence in case of XML file, are
information.
101 Programming of Macros is done in programming Language ___________. VBA
As Bank auditors,Many Banking applications generate text files in
102 Txt format,Csv format
____________.
In CBS, the Accounts Management module deals with Creation of Savings Account,Creation
159
_____________________ of Current Account,Overdraft
160 Soft copy of the ATM journal rolls is called_____________ Electronic Journal
161 The ATM switch consists of a _____________________ computer,server
_______________testing should be done to check the unauthorised
162 Penetration
access to the network in CBS.
_________enables transfer of money from one bank to another in "Real
163 RTGS
time" and on "Gross" basis.
In _______system money transfers are done on a one to one basis while in
164 RTGS,NEFT
_______system transfer is done in batches.
165 All the money transfers take place in the books of the _________________ Central bank(RBI)
166 EFT and NEFT work on _______________basis DNS
167 ________system of money transfer is primarily used for large transactions. RTGS
In RTGS, the STP generates an ___________for every outbound RTGS
168 UTR
transaction.
169 UTR full form _________________________________ in terms of CBS. Unique Transaction Reference
170 STP stands for ________________________________ in terms of CBS. Straight Through Processing
171 CMS stands for ______________________________ in terms of CBS. Cash Management System
Systems audit are important for the
172 Which of the following statements is true?
verification of the internal controls
173 The Management Controls does not include ___________ Managing of Assets
_______is supported by advanced technology infrastructure and has high
174 Core Banking Solution
standards of business functionality.
175 Which type of joins not available in Access 2010? Full join
A join returns only those rows from both tables that match on the joining
176 Inner join
field is___________ in MS Access 2010.
The query returns all of the rows from left table, and also those rows from
177 Left outer join
the right table that is known as____________.
The query using ___________ returns all the rows from right table, and
178 also those rows from the left table that share a common value on both Right outer join
sides of join.
179 How can we add a table to the Query Design window_________? Select Design -> Show Table
180 ___________can be considered a questions in a data base. Queries
181 Operands can be_________ in MS Access 2010. Literals,Identifiers,Function
182 In example "Hello"+" " +" everyone" ,hello is _____ Text Literal
183 Length("Ms Access") will return the count of charcters is __________. 9
184 AND ,OR is a kind of ________ in MS-Access 2010. Logical
185 Comparision operators is also known as_______ in MS-Access 2010. Relational
186 LIKE operator works with______in MS Access 2010. Text,Date
187 IN operator is used __________ in MS Access 2010. To match the value to a set of values
Operator precedence is similar to _____ that is follwed in Algebra in MS-
188 BODMAS
Access 2010.
___________________ technology is the process of creating and utilizing
189 Data Warehousing
the company's historical data.
______________ can be defined as subject-oriented, integrated, time-
190 variant, non-volatile collections of data used to support analytical decision Data Warehouses
making.
________________ databases contain detailed data that is needed to
191 satisfy processing requirements but which has no relevance to Operational
management or analysis.
192 Data in the Data Warehouse is ______________ , not ____________. Static, Dynamic
____________ data contains an historical perspective that is not generally
193 Informational, Operational
used by the _____________ systems.
The definition of data elements in the data warehouse and in the data
194 sources and the transformation rules that relate them, are referred to as Metadata
___________.
195 Data warehouses are not the optimal environment for ____________ data. Unstructured
196 Maintenance Costs are high for Data Warehousing. TRUE
Credit Card Churn Analysis,Insurance
197 Data Warehousing can be used for ___________________.
Fraud Analysis,Logistics Management
198 _________________ is the process of extracting patterns from data. Data Mining
___________________ is an approach to quickly answer multi-dimensional
199 Online Analytical Processing
analytical queries.
The Output of an OLAP query is typically displayed in a ___________
200 Matrix
format.
______________ companies is planning to support tens of millions of
201 B2C
customers with just hundreds of employees.
Increased Complexities,Legal
202 Which of the following is the limitation of Open Source ERP? Complexities,Unsuitable for
conventional applications
203 Which of the following is not an Open ERP software? Open-Project
_____ is the process of integrating all the business functions and
204 ERP
processes in an organization to achieve numerous benefits.
________ must consider the fundamental issues of system integration by
205 Manager
analyzing the organization's vision and corporate objectives.
206 The more the number of __________, the longer the implementation time. units
Customization of ERP systems is one of the major challenges in auditing
207 TRUE
ERP security.
Tally.ERP 9 provides graphical analysis of data which helps the user to
208 TRUE
perform deeper analysis.
The user can ________ the company data into multiple companies as per
209 Split
financial periods required.
E-Filing of Returns refers to the process of electronically filing your tax
210 Internet
returns through the ___________.
Tally.ERP 9 does not allows you to export the ETDS forms in NSDL
211 compliant formats as well as facilitates printing of TDS Forms in Physical FALSE
Form.
212 Tally.ERP 9 offers a data encryption option called _______________. Tally Vault
___________________ is the process of exchanging Tally.ERP 9 data
213 Synchronization
between two or more locations.
The Tally website offers _______________, by which a user can
214 Tally Chat
communicate with a Tally representative and get required information.
215 Tally.NET use _______________ for centralised Account Management. Control Centre
The data is transferred between the remote location and the server using a
216 Encryption
secured mechanism called __________________.
217 Sales Tax Ledger falls under which Group? Duties and Taxes
218 Alias represents ___________ in Tally.ERP9. Short name,Nickname,Code name
219 If we purchase any Fixed asset in credit, we can pass it from _________. Journal mode
220 To save entry without any amount, we have to use _____________. Allow 0 value entry
Transfer of materials from one godown to another godown, use
221 Stock Journal
______________.
222 While exporting Ledgers from Tally to Web Page, we use _________. HTML Format
223 Budget represents _______________________. Estimation,Forecasting,Assumption
224 In Service tax Credit Adjustment (%) should be either ____________. 0.2,1
225 Service Tax Report can be seen from _________________. Display > Statutory Reports
226 Can we allow Expenses/Fixed Assets in Purchase vouchers? Yes
Transfer from Main Cash to Petty Cash we require to pass _______
227 Contra
voucher.
228 Income Tax number of the Company will appear in which report? None of these
229 A business model is not a ___________ model. mathematical
230 OLAP systems use concept of OLAP cube called a ______________ cube multi dimensional
The data which is to be exported from Tally.ERP 9 can be in ________
231 XML,HTML,ASCII
format.
232 In Tally ERP-9 Remote Access is also known as __________. Tally.Net
Accessing data store on a remote location using Internet in Tally.ERP9 is
233 Remote Data
called____________.
234 Tally.ERP9 can be classified user in two categories are___________. Local User,Remote User
Which of the following is not a predefined security level provided by
235 Public User
Tally.ERP 9?
The business model is represented in the graphical form using
236 flowcharts, flow diagrams
______________ and ________________
Identifying and prioritizing subject
areas to be included in the Data
Warehouse,Defining the correct level
of summarization to support business
237 Which of the following is/are the data warehousing activity?
decision making,Establishing a data
warehouse help desk and training
users to effectively utilize the desktop
tools
256 Operational CRM provides support to ___________ business processes. front office
258 Tally.ERP 9 follows the DES __________ method to safeguard the data. encryption
Immediate posting and updation of books of accounts as soon as the
259 Real Time Processing
transactions are entered. This is called as __________
Form 26, Annexure to 26,Form 27,
260 Which of the following ETDS forms are available in Tally.ERP 9? Annexure to 27,Form 26Q, Annexure
to 26Q
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's
261 File Validation Utility
freely downloadable utility called __________________
With ______________ technology the characters are reduced in breadth
262 and user is allowed to input additional characters which would make the Tally Fit
account name, entity complete and readable.
In Tally.ERP 9 __________________ provides the user with administrator
263 rights and the capability to check the entries made by the authorised users Audit Feature
and alter these entries, if necessary.
__________________ is an enabling framework which establishes a
264 connection through which the remote user can access the Client's data Tally.NET
without copying/transferring the data.
If we want the company to be connected automatically for remote access
265 Contact On Load
on load, the property __________ needs to be set it as Yes.
266 _______ is centralized Banking Application Software. Core Banking Solution
_________has several components which have been designed to meet the
267 CBS
demands of the banking industry.
Core Banking Solutions is a combination of an application software and
268 Network devices
________
______ is a large data housing infrastructure that provides high band width
269 Data Centre
access to its clients.
Application servers,Data Base
270 Data centre servers are known as_____________.
Servers,Web server
271 ________ is a method of creating virtual networks within a physical network. VLAN
Data communication between ______ VLANs can be controlled as per
272 2
business requirements.
273 Bank mate is developed by the _______ HCL Technologies
CBS Software resides in a Central application server which is located in the
274 Central Office Data Centre.
___________
A________ that runs the core banking solutions (CBS) and is centrally
275 Central Application Server
accessed by the branches.
The _________of the application is capable of only entering the data at the
276 Client version
end point that is branches.
The application server would be placed in a trusted inside zone in a
277 Virtual Local Area Network
separate ____________
278 Application software would access the ________ Data base server
__________ are capable of being connected only when devices are
279 Virtual Networks
connected to a switch.
A special feature of STP is that _____________ number for any outbound
280 Uniform Transaction Reference
RTGS transaction is generated by the STP System.
_____________refers to the process of developing software which would
281 produce the required output from the input provided of course, using the System Development
necessary hardware and communication systems.
The______________is essential to ensure that computer security records
282 Log management
are stored in sufficient detail for appropriate period of time.
Which of the following is “False“ in case of penetration testing in an IT Ensure recoverability of data in case
283
environment of CBS? of system failure.
It is important that correct latest
Which of the following is erroneous statement in case of Change
284 version of programe is used but
Management Control?
version number need not be changed.
With respect to the customer changing the Pin at the ATM which procedure Old offset value used to derive new
285
is the ”false“ procedure? PIN.
IN CBS, changes to the application server are not made directly to it,
286 Test Server
instead done first on a __________
All the various servers in the central data centre are seggregated through
287 VLANs
_______
The __________ is a complete process in the computer so that it ensures
288 Validation
that data that is fed in conforms to certain prerequisite conditions.
When the central Data base is busy with central end of day activities or for
289 any other reason, the file containing the account balance of the customer is Positive Balance File
sent to the ATM switch. Such a file is called __________
290 The IBDS is located in a ____________ demilitarised zone
291 The main components of Internet Banking system consist of __________ Web server,IBAS,IBDS
Copy of the Anti Virus Software was updated promptly and regularly at the
292 Data Centre and pushed into all of the servers and in all the systems in the Push-pull method
branches by ________
The __________which is also residing in the server at the branch actually
293 Application Software
does the banking operations.
In Core Banking concept all the systems of the bank are connected to the
294 Central office by means of a connectivity which may be either a _________ Leased line
or a dial up line.
The ________ is generated by the software and directly sent to equipment
295 Personal Identification Number
for printed the Pin Mailer.
____________would also include the existence of built in controls in the
296 system to ensure proper processing of input data so as to provide the Process Control
required output.
____________refers to an arrangement wherein the issuing bank acts on
297 Letter of Credit
the request and instructions of a customer.
_______________ is a process by which the bank ensures the
298 Business Continuity Planning
maintenance and recovery of operations.
299 At which phase of testing the version of software is called “ beta version”? Programmer testing,User testing
In an Organization structure of IT Department which of the following Network administrator and Database
300
function is incompatible? Administrator.
The number that is stored in the ATM switch is the difference of which of
301 Pin No - Natural Pin
the following number?
The information retrieval of transactions taking place at ATM located at
302 Soft copy of Electronic journal
remote locations is through _________
The number that is generated as soon as the customer inserts the card in
303 Natural Pin
the ATM machine is __________
304 Which is not a Database management system. Unix
305 The _________ operator is used to find the null records in a table. IS NULL
When you create relationship between two tables, the Common field's data
306 Same data type
type should be
307 SQL stands for____________________. Structured Query Language
MS Acces 2010 reads and writes to the .accdb file format in chunks also
308 Pages
known as_____________.
309 DDL stands for ____________ Data Definition Language
310 DML stands for _____________ Data Manipulation Language
311 Whenever a tables gets update, the dependent query will update automatically
To extract the records based on date field, which of the symbol should be
312 #
used
313 The data can be entered into a table in the ____________ view. Datasheet
314 In a Query the data can be sorted based Single column,Multiple columns
When you create a field using text data type in MS Access 2010, by default
315 255
field will have ____ character.
If we are using the same table for main query and sub-query,we need to Alternate names to the tables,Aliases
316
provide___________. name to the tables
317 Update Query can be used to update_________ in MS Access 2010. Single Record,More than 1 record
318 Delete Query can be used to delete Single Record,More than 1 record
319 How many Primary key constraints can create in a table______. Only one
Unmatched Query can help to find records that have no corresponding
320 TRUE
reord in other tables.
MS Access 2010 provides queries that can be used for obtaining the
321 Sum(),Count(),Avg()
aggregated results instead of individual records are____________.
A function that Counts the set of values that satisfy the given criteria in MS
322 Count()
Access 2010 is___________.
323 Aggreagate Query also known as___________. Group By queries,Total query
324 Which Query wizard is used to find repeated records in a table? Duplicate Query Wizard
325 Append Query is used to ______________ in a table in MS Access. Add Records
How does a query-based report differ in design to a report based on just
326 It doesn’t
one table?
Use the Mailing label wizard text
327 How would you include some plain text into a mailing label report?
option.
In a Microsoft Access 2010 report, the page numbering would most likely
328 Page Footer
be placed into the:
If you wished to present a professionally looking form on screen that would
All The tools of the form design
329 show all the necessary information, which of the following form design tools
would you most likely use? control gallery.
331 An .ACCDE file is a ___________ version of the original .ACCDB file. Locked-down
Which type of the query is used to accept the value from the user while
332 Parameter Query
executing the query and fetch records accordingly
To encrypt the databse in Access 2010 must be opened in the
333 Open Exclusive mode
__________________.
334 FIX() is a kind of ____ function in MS-Access 2010. Math
MS-Access 2010 has added new features of ______ to eliminate the need
335 Macro
of VBA code
Encrypting a database does not restrict access to database objects, but to
336 Open
__________ the database.
File Tab ->Access Options, and
The setting for the Security option can be handled
337 selecting the Trust Centre tab from
using_______________________ in Access 2010.
the Access Option window
Third Party Encryption Technology can also be applied to the database of
338 TRUE
Microsoft Access 2010.
339 To create a split database in MS Access 2010 go to which tab? Database Tools
340 After spliting database,frontend database holds_________________. Forms,Query,Report
341 After spliting database,backend database holds_________________. Tables
A back-end database & front-end
342 When an Access database is split, it creates two files_________________.
database
A Data Access Page is a special type of _________ that allows users to
343 Web page
interface with database using Internet Explorer.
MS Access provide__________ datatype to create link to a web page,file,or
344 Hyperlink
email address.
Set as Switchboard startup Option in
345 To make a switchboard appear while opening the database.
Access Option
To add or delete buttons to Switchboard, which option is used in
346 Edit Option
Switchboard Manager is used.
The Switchboard Manager is a dialog box that allows creating a
347 TRUE
switchboard for an Access database.
348 A macro can automate data entry in Access 2010. TRUE
349 Which of the following data-type is not available in MS-ACCESS AlphaNumeric
350 The validation can be defined at____________ level in Access 2010 Table,Form
A macro can be attached to an event of a
351 A form,A report,A button
control_________________________.
Click->File tab->Option Button->Quick
Access Toolbar->Command not in
352 How to add switchboard in Access 2010?
Ribbon->Switchboard Manager->Add-
>OK
The command Design Application performed action____________ on
353 Opens the Switchboard Manager.
switchboard.
Switchboard Manager only allows a maximum of __________command
354 Eight
buttons on a switchboard
MS Access 2010 provides a __________pane that contained large list of
355 actions to be chosen,enabling a wide range of commands that can be Action Catalog
performed
356 SQL is considered to be a __________ 4GL
Which action in MS Access macro applies a fliter or query to a table,form or
357 ApplyFilter
report.
Opens a query in the Datasheet view, Design view, or Print Preview which
358 OpenQuery
macro action used in MS Access.
Among +, <>, MOD, AND, <= operator which operator has the highest
359 MOD
priority.
360 The Strcomp() function is a__________type function. Text
361 The SGN() function is a ____________ type function Math
362 Which of the following symbol is used to write a sub query ()
For the Non-Aggregate Total field, the criteria can only be specified using
363 TRUE
the Where clause.
To export an access table to an XML File, which of the below steps must be Right-click the table and select Export -
364
followed? >XML
365 In IDEA, import Assistant wizard is used to import data from____________. Excel,Access,XML
File->Import Assistant-> Import to
366 What is the procedure for importing data into IDEA ?
IDEA
text,database,spreadsheet and mail
367 IDEA exports data in a number of _______________________.
merge format
In IDEA,Data Extraction select data form a file for further___________ for
368 Investigation
creating a new file of logically selected records.
369 What is step by step procedure for using Bendford's law function in IDEA ? Analysis->Benford's Law
459 Which of these is/are the standard email program used in an organization? Microsoft Exchange,Lotus Notes
Compared to LAN, its transmission
460 Which of the following is not a characteristics of WAN?
speed is low
_________is protection of information assets from threats to preserve their
461 Information Security
value.
462 Which types of information assets need to be secured in a CA Office? Client data,Own data,Own documents
The extent and level of _________ would depend on the nature of
463 Confidentiality
information.
__________ of information might be affected due to denial of service attack
464 Availability
or some other reasons.
__________means the sender cannot deny having sent a message and
465 Non-Repudiation
receiver cannot deny receiving the message.
466 Risk may not be _______ in nature. vulnerable
467 In IDEA, Append functions can be used to_________. Add data at the end
468 In IDEA, Statistics functions can be applied on_________. Numeric Data,Date Data
In IDEA, increment value in Stratification function can be fixed or free
469 TRUE
interval.
470 In IDEA, Stratified Random functions is a part of which menu. Sampling
471 Which of the following is not an Audit Software Unix
Using which functions to perform more complex calculations and exception
472 Equation Editor
testing in IDEA?
File->Print->Create Report,Click on
473 Which is the step by step procedure for reporting in IDEA. Create Report button on the
Operation toolbars->Report Assistant.
Items of audit interest,Data
474 Which of the following are categories of computer audit function ?
Analysis,System validation
475 In the following list which is not an audit function ? Export
476 In the following list which is a audit function? Stratification
Review Programming
standards,Understand program
477 Which is the following step involved in a source code review methodology ?
specifications,Formulate flaw
hypotheses
478 In IDEA which functions should be used to find repeated values ? Detection
Numeric Data,Date Data,Character
479 In IDEA, Stratification functions can be applied on which type of data ?
Data
In IDEA,Summarization accumulates the values of Numeric fields for
480 Unique Key
each____________.
In which sampling,selecting sampling units using a fixed interval between
481 Systematic
selections is_______________.
Ensures that all combinations of sampling units in the population have an
482 Random
equal chance of selection is____________.
In Audit tool, to built relation between two tables, both table should
483 Common Field
have_____________.
484 Input Control method is a part of Application Control Group. TRUE
Which is the following type of check that can be run when data is input
485 Field check
through terminal ?
Which is the following is the correct types of Field checks on processed
486 Overflow,Range,Sign Test
data ?
487 Which is the following is the correct types of Record checks on input data ? Resonableness
488 Which is the correct types of Batch Checks ? Control Totals
Data Integrity,Controls are required
489 Which is the need for table level tests ?
for authorization
This may make the entire child tables
referenced by the master field in the
490 Which is the following is the major points with respect to inter table tests ? main table un-available,Their Master
& Child relationship reference the
table from one another
Which is the software used by the auditor to take a view of a file of data or
491 Snapshots
transaction passing through the system at a particular point of time ?
Which is the software used by the auditor to compare the source version of
492 Souce comparison
a program with a secure master copy ?
Which is the techniques whereby the auditor arranges or manipulates data
493 either real or fictitious, in order to see that a specific program or screen edit On-line Testing
test is doing its work ?
Which is the software used by the auditor to list un-used program
494 Mapping
instruction ?
Which is the software used by auditor to read and analyze records of
495 Log Analyzers Software
machine activity ?
Lack of Visible Transaction
496 Which of the following reason strongly call for Control & Audit Function ?
Trail,Absence of Input Document
497 Which is the correct types of Field checks on input data ? Both type
To ensure the input data is valid
498 Which is the major points to be consider with respect to System tests ?
before entering the value
In Data analysis techniques, which law is used to idenfity statistical report
499 Benford Law
on numeric data ?
500 Which is not a feature of File reorganization with an auditor perspective? Filtering
Identify data, which are not in
501 What do you understand by the term, “Data Consistency” in using CAATs?
agreement with the regular format.