You are on page 1of 17

Sl.

Question Answer
No
1 XML stands for_________ Extensible Markup Language
2 XML is a ___________ Recommendation. W3C
3 XML is a language that is very similar to which language ? HTML
4 DTD stands for ___________, which is called XML Schema. Document Type Definition
5 The extension of a XML document is ______________. (.xml)
To create a XML Map from XML schema, Go to which Tab in Excel
6 Developer
____________.
7 XML is case-sensitive ? TRUE
8 Excel works primarily with ________ types of XML files. 2
9 What is the file extension of Schema file which contain schema tags ? (.xsd)
10 VBA stands for_______________ . Visual Basic for Applications
11 Macro enabled workbook file extension is _______________ .xlsm
12 There are _________ ways to open a Macro enabled workbook. 3
13 ANOVA stands for___________ Analysis of Variance
14 A function doesn’t require an argument is___________. TODAY()
15 In Excel, there are __________ functions for calculation of depreciation. 5
For calculation of depreciation as per
16 SLN function used to calculate depreciation as per_________________.
Straight Line Method.
For calculation of depreciation as per
17 SYD function used to calculate depreciation as per_________________.
Sum of Years Digit Method.
For calculation of depreciation as per
18 DB function used to calculate depreciation as per_________________.
Declining Balance Method.
For calculation of depreciation as per
19 DDB function used to calculate depreciation as per_________________.
Double Declining Balance Method

For calculation of depreciation as per


20 VDB function used to calculate depreciation as per_________________.
Variable Declining Balance Method.
21 PV Ratio stands for _____________________. Profit Volume Ratio
22 BEP stands for __________________________ Break Even Point
23 Data Validation available in which Tab? Data
___________function returns value from a given data range based on row
24 INDEX()
and column.
25 Which function categories are not available in Excel. Arts
26 PMT Function is belongs to which categories of Excel function ? Financial
27 NPV stands for_______________________________ Net Present Value
28 _______function uses a fixed rate to calculate depreciation DB
29 Which of them is not a Conditional Operators symbols? </
30 Strings are to be always enclosed in double quotes when used in a formula. TRUE
31 Parentheses are used to change the order of calculation. TRUE
32 In Excel the function =Abs(-4) returns __________. 4
_______ function returns the remainder after a number is divided by a
33 MOD()
divisor.
If User want to display the formulas rather than the results of the formulas Formulas > Formula Auditing > Show
34
then choose______________. Formulas.
_______________ reveal about the current and future financial condition of
35 Financial statements
the company.
36 Which of them is a Intangible assets? Goodwill and Patents.
37 CR stands for___________________. Current Ratio
38 QR stands for___________________. Quick Ratio
39 Debt – Equity Ratio =Long term debt / Shareholders funds. TRUE
40 ACP stands for _____________. Average collection period
41 FATR stands for _____________. Fixed assets turnover ratio
42 A _________ can be a numerical fact. Statistic
43 __________ stands for reduction in value of fixed assets. Depreciation
Value of fixed assets is generally reduced over the period of time due to Wear & Tear,Change in taste of
44
__________. people,Change in technology
45 Profit equals to __________. Sales - Total Cost
Salary of administrative staff,office
46 Examples of fixed cost are __________.
rent
Cash budget is prepared for planning for future as far as movement of cash
47 TRUE
is concerned.
Discounting is not the process of determining the present value of a
48 FALSE
payment or a stream of payments that is to be received in the future.
49 PAN must have ________ characters only. 10
Sample means the units or items selected for study or consideration and
50 TRUE
population means the total set of data used for selection of samples.

_______________ analysis relates items in the financial statements in a


51 Financial ratio
manner that drives out performance information about the company.
Hold down the SHIFT key during start
52 How to restrict to run a macro automatically when starting Microsoft Excel?
up.
Which option allows you to Bold all the negative values within the selected
53 Conditional Formatting
cell range?
_____________ allow us to perform calculations or operations that would
54 Worksheet functions
otherwise be too cumbersome or impossible altogether.
55 Statistical functions in Excel help to calculate __________________ Arithmetic Mean,Median,Mode
56 Discounting Factor formula is ___________________ = 1 / (1+r) ^ n
________________ is considered as non cash expenditure and occupies a
57 Depreciation
prominent place in Profit & Loss Account.
The value which can be realized at the end of life of fixed asset by selling it
58 Salvage Value
is called _________________
____________ is prepared for planning for future as far as movement of
59 Cash budget
cash is concerned.
____________ is the process of determining the present value of a
60 Discounting
payment or a stream of payments that is to be received in the future.
____________ is one of the core principals of finance and is the primary
61 factor used in pricing a stream of cash flows, such as those found in a Discounting
traditional bond or annuity.
62 XML schemas in Excel are called XML _____________. Elements
Financial analysis,Equity
Excel allows us to use various functions and even simple mathematical
63 analysis,Leasing decisions and the list
calculations which can be used for _____________.
goes on
Which cell reference show the reference to other sheet or reference to
64 Sheet2!C4
other workbook in excel ?
65 Which of them is not a Range References? A1, A2 , A3, A4
66 Interest Coverage Ratio equals to _________. EBIT / Debt interest
If particular workbook have to open each time Excel started, where the
67 XLSTART folder
workbook should be placed?
There is an absolute reference to cell
68 If the cell B1 contains the formula=$A$1, which of the statement is true ?
A1.
__________ is a computerized mathematical technique that allows people
69 Monte Carlo Simulation
to account for risk in quantitative analysis and decision making.
________ is the process of meeting the financial goals through the proper
70 Financial planning
management of finances.
___________ can be defined as the process of setting the procedures in
71 Corporate Planning
the organization for achieving the predefined goals.
________ shows ability of company to pay back long term loans along with
72 Interest Coverage Ratio
interest or other charges from generation of profit from its operations.
_____________________is the simplest method of comparing different
73 Price Earnings Multiple
stocks at a point of time to make investment decisions.
<?xml version="1.0" encoding="ISO-
74 The very first line of code of XML file is_____________.
8859-1"?>
75 Every bit of data has to start and end with an identical tag <TagName>Data</TagName>
76 The exact syntax of PMT function is________________. PMT(rate, nper, pv, [fv], [type])
77 The exact syntax of IPMT function is__________________. IPMT(rate, per, nper, pv, [fv], [type])
78 To see the XML Map user must go ______________. Developer>XML> Source
79 Deletion of XML Map is done through __________. XML Maps Dialog Box
80 Method of tax calculations shall change according to _________. Annual Income,DOB,status of assess
81 EMI stands for ______________. Equated monthly installment
Which function is used to calculate the principal portion in every installment
82 PPMT
?
________ is a process used in statistical analysis in which a predetermined
83 Sampling
number of observations will be taken from a larger population.
In __________, Individuals are selected at regular intervals from a list of
84 Systematic sampling
the whole population.
In ______________ each individual is chosen entirely by chance and each
85 member of the population has an equal chance, or probability, of being Simple random sampling
selected.
Which method is commonly used in social sciences when investigating
86 Snowball sampling
hard to reach groups?
__________ are useful for quick reading and easy understanding,
87 Summary reports
particularly for top management.
It is a process in which a business determines whether projects such as
88 Capital Budgeting
building a new plant or investing in a long-term venture are worth pursuing.

Popular methods of capital budgeting include _________ and payback discounted cash flow,internal rate of
89
period. return,net present value
_________ is the value of all future cash inflows less future cash outflows
90 Net present value
as on today.
___________is the process of defining and analyzing the dangers to
91 individuals, businesses and government agencies posed by potential Risk analysis
natural and human-caused adverse events.
__________ which is used more often, does not involve numerical
92 Qualitative risk analysis
probabilities or predictions of loss.
________ are generally used to present information in a simple and better
93 Charts
way and also be used to analyse the risk in a better way.
It is a technique used to determine how different values of an independent
94 variable will impact a particular dependent variable under a given set of Sensitivity analysis
assumptions.
_______ involves computing different reinvestment rates for expected
95 Scenario analysis
returns that are reinvested during the investment horizon.
96 NPER stands for______________________________ Number of Periods
Which function that is used to calculate the payment for specific loan terms
97 PMT
____________
98 ________helps to break down the Return on Equity Du Point Analysis
_______ is a common method for financing property, facilities, and
99 Leasing
equipment.
Structure, store, and transport
100 Find the correct sequence in case of XML file, are
information.
101 Programming of Macros is done in programming Language ___________. VBA
As Bank auditors,Many Banking applications generate text files in
102 Txt format,Csv format
____________.

103 Macro security is enabling through __________. Developer tab>Code>Macro Security


104 In Excel, Sampling option is available in ___________ . Data Analysis
105 Requirements for preparation of cash budget in Excel. Knowledge of all of the above.
106 ROE stands for __________. Return on Equity
___________ is a statistical procedure that uses sample evidence and
107 probability theory to determine whether a statement about the value of a Hypothesis
population parameter should be rejected or should not be rejected.
108 ____________ is a statistical tool used to create predictive models. Multiple Regression
__________ shows the ability of a company to pay its current financial
109 Liquidity Ratio
obligations.
110 ___________ shows dependency of a firm on outside long term finance. Leverage Ratio
To record a Macro in relative mode,"Üse Realtive References" available in
111 Developer Tab,View Tab
which tab of excel ?
An _____________ is a group of people with a common goal, having
112 Enterprise
certain resources at its disposal to achieve the common goal.
________________ include money, manpower, materials, machines,
113 Resources
technologies etc.
___________ is a collection of activities that make one or more kinds of
114 Business Process
input and creates an output that is of value to the customer.
Information systems can be designed so that accurate and timely data are
115 shared between functional areas. These systems are called Integrated Information Systems
_______________________________.
The approach to ERP is to first develop a ______________ comprising the
116 Business Model
business processes or activities that are the essence of a business.
117 OLAP stands for _________________. Online Analytical Processing
________________ is a tool that refers to skills, processes, technologies,
118 applications and practices used to facilitate better, accurate and quicker Business Intelligence
decision making.
119 Business Intelligence Systems are data-driven ___________________. Decision Support Systems
120 Finacle developed by _________ Infosys
121 Flexcube developed by ________ I-Flex
122 Quarz developed by ____ TCS
The server is a sophisticated computer that accepts service requests from
123 Clients
different machines which are called__________
__________ server has to be a powerful and robust system as it has to
124 Application Server
perform all the core banking operations.
125 ATMS stands for_________ Automated Teller Machine Server
126 IBAS stands for ___________ Internet Banking Application Server
127 PBF stands for________ Positive Balance File
Internet banking refers to a banking transactions routed through the
128 Internet
________
Computer Planning and Policy
129 CPPD Stands for ______________.
Department
The _________ is generally a hardware and it plays the role of preventing
130 Firewall
unauthorized access.
131 ________enable data transmission over different networks. Routers
_________have many ports that are connected to different systems and it
132 Switches
facilitates data transmission with the network.
133 A Proxy server always acts in conjunction with a _________. Firewall
The ________ provides network security by preventing malicious data from
134 Proxy Server
entering the network.
135 _________is used for authentication. Domain Controller
136 Access to a set of servers is controlled by the ________. Domain Controller
137 ________is a process of unauthorized entering a network. Hacking
____________ facility provides a customer to access financial transactions
138 Automated Teller Machine
in a public place.
Cash Withdrawal,Balance
139 Which is the Function of ATM? Inquiry,Registering requests for
Cheque book
140 Every bank branch should madatorily have a security policy. TRUE
Physical Access,Logical
141 The Operational Controls include controls on ___________
Access,Environmental Controls
Input Controls,Output
142 Application Controls are broadly classified into __________________
Controls,Processing Controls
143 __________controls check that the data entered is complete and correct. Input Controls
144 Reasonableness check is a _________. Input Controls
145 Which of the following is not a module of the CBS? Equity Share management
Performance Guarantee,Deferred
146 Bank guarantees can be __________________________
Payment Guarantee
147 SLR stands for ________________________________ Statutory Liquidity Ratio
________are record of activities that have taken place in the system
148 Logs
irrespective of the modules.
Activity performed,User details,Date
149 The contents of a log includes _____________________
and Time
E-mail policy,Firewall security
150 Communication and Operations management must include which policies?
policy,Internet policy
Logs of the various activities in CBS can be deleted immediately and also
151 FALSE
be accessed by anybody.
152 CRR stands for _________________________ in terms of CBS. Cash Reserve Ratio
Does the IS Audit also include audit of the outsourcing activites carried out
153 Yes
in the CBS system?
154 DRP stands for ___________________________ in terms of CBS. Disaster Recovery Planning
_____________are soultions applied when any kind of vulnerabilities
155 Patches
discovered in networks in the CBS system.
156 __________can be viewed only by the DBA of an organisation. Database Log
Is performing periodic vulnerability assessment of the networks is
157 Yes
necessary?
158 KYC stands for _________________________________ in terms banking. Know Your Customer

In CBS, the Accounts Management module deals with Creation of Savings Account,Creation
159
_____________________ of Current Account,Overdraft
160 Soft copy of the ATM journal rolls is called_____________ Electronic Journal
161 The ATM switch consists of a _____________________ computer,server
_______________testing should be done to check the unauthorised
162 Penetration
access to the network in CBS.
_________enables transfer of money from one bank to another in "Real
163 RTGS
time" and on "Gross" basis.
In _______system money transfers are done on a one to one basis while in
164 RTGS,NEFT
_______system transfer is done in batches.
165 All the money transfers take place in the books of the _________________ Central bank(RBI)
166 EFT and NEFT work on _______________basis DNS
167 ________system of money transfer is primarily used for large transactions. RTGS
In RTGS, the STP generates an ___________for every outbound RTGS
168 UTR
transaction.
169 UTR full form _________________________________ in terms of CBS. Unique Transaction Reference

170 STP stands for ________________________________ in terms of CBS. Straight Through Processing
171 CMS stands for ______________________________ in terms of CBS. Cash Management System
Systems audit are important for the
172 Which of the following statements is true?
verification of the internal controls
173 The Management Controls does not include ___________ Managing of Assets
_______is supported by advanced technology infrastructure and has high
174 Core Banking Solution
standards of business functionality.
175 Which type of joins not available in Access 2010? Full join
A join returns only those rows from both tables that match on the joining
176 Inner join
field is___________ in MS Access 2010.
The query returns all of the rows from left table, and also those rows from
177 Left outer join
the right table that is known as____________.
The query using ___________ returns all the rows from right table, and
178 also those rows from the left table that share a common value on both Right outer join
sides of join.
179 How can we add a table to the Query Design window_________? Select Design -> Show Table
180 ___________can be considered a questions in a data base. Queries
181 Operands can be_________ in MS Access 2010. Literals,Identifiers,Function
182 In example "Hello"+" " +" everyone" ,hello is _____ Text Literal
183 Length("Ms Access") will return the count of charcters is __________. 9
184 AND ,OR is a kind of ________ in MS-Access 2010. Logical
185 Comparision operators is also known as_______ in MS-Access 2010. Relational
186 LIKE operator works with______in MS Access 2010. Text,Date
187 IN operator is used __________ in MS Access 2010. To match the value to a set of values
Operator precedence is similar to _____ that is follwed in Algebra in MS-
188 BODMAS
Access 2010.
___________________ technology is the process of creating and utilizing
189 Data Warehousing
the company's historical data.
______________ can be defined as subject-oriented, integrated, time-
190 variant, non-volatile collections of data used to support analytical decision Data Warehouses
making.
________________ databases contain detailed data that is needed to
191 satisfy processing requirements but which has no relevance to Operational
management or analysis.
192 Data in the Data Warehouse is ______________ , not ____________. Static, Dynamic
____________ data contains an historical perspective that is not generally
193 Informational, Operational
used by the _____________ systems.
The definition of data elements in the data warehouse and in the data
194 sources and the transformation rules that relate them, are referred to as Metadata
___________.
195 Data warehouses are not the optimal environment for ____________ data. Unstructured
196 Maintenance Costs are high for Data Warehousing. TRUE
Credit Card Churn Analysis,Insurance
197 Data Warehousing can be used for ___________________.
Fraud Analysis,Logistics Management
198 _________________ is the process of extracting patterns from data. Data Mining
___________________ is an approach to quickly answer multi-dimensional
199 Online Analytical Processing
analytical queries.
The Output of an OLAP query is typically displayed in a ___________
200 Matrix
format.
______________ companies is planning to support tens of millions of
201 B2C
customers with just hundreds of employees.
Increased Complexities,Legal
202 Which of the following is the limitation of Open Source ERP? Complexities,Unsuitable for
conventional applications
203 Which of the following is not an Open ERP software? Open-Project
_____ is the process of integrating all the business functions and
204 ERP
processes in an organization to achieve numerous benefits.
________ must consider the fundamental issues of system integration by
205 Manager
analyzing the organization's vision and corporate objectives.

206 The more the number of __________, the longer the implementation time. units
Customization of ERP systems is one of the major challenges in auditing
207 TRUE
ERP security.
Tally.ERP 9 provides graphical analysis of data which helps the user to
208 TRUE
perform deeper analysis.
The user can ________ the company data into multiple companies as per
209 Split
financial periods required.
E-Filing of Returns refers to the process of electronically filing your tax
210 Internet
returns through the ___________.
Tally.ERP 9 does not allows you to export the ETDS forms in NSDL
211 compliant formats as well as facilitates printing of TDS Forms in Physical FALSE
Form.
212 Tally.ERP 9 offers a data encryption option called _______________. Tally Vault
___________________ is the process of exchanging Tally.ERP 9 data
213 Synchronization
between two or more locations.
The Tally website offers _______________, by which a user can
214 Tally Chat
communicate with a Tally representative and get required information.
215 Tally.NET use _______________ for centralised Account Management. Control Centre
The data is transferred between the remote location and the server using a
216 Encryption
secured mechanism called __________________.
217 Sales Tax Ledger falls under which Group? Duties and Taxes
218 Alias represents ___________ in Tally.ERP9. Short name,Nickname,Code name

219 If we purchase any Fixed asset in credit, we can pass it from _________. Journal mode
220 To save entry without any amount, we have to use _____________. Allow 0 value entry
Transfer of materials from one godown to another godown, use
221 Stock Journal
______________.
222 While exporting Ledgers from Tally to Web Page, we use _________. HTML Format
223 Budget represents _______________________. Estimation,Forecasting,Assumption
224 In Service tax Credit Adjustment (%) should be either ____________. 0.2,1
225 Service Tax Report can be seen from _________________. Display > Statutory Reports
226 Can we allow Expenses/Fixed Assets in Purchase vouchers? Yes
Transfer from Main Cash to Petty Cash we require to pass _______
227 Contra
voucher.
228 Income Tax number of the Company will appear in which report? None of these
229 A business model is not a ___________ model. mathematical
230 OLAP systems use concept of OLAP cube called a ______________ cube multi dimensional
The data which is to be exported from Tally.ERP 9 can be in ________
231 XML,HTML,ASCII
format.
232 In Tally ERP-9 Remote Access is also known as __________. Tally.Net
Accessing data store on a remote location using Internet in Tally.ERP9 is
233 Remote Data
called____________.
234 Tally.ERP9 can be classified user in two categories are___________. Local User,Remote User
Which of the following is not a predefined security level provided by
235 Public User
Tally.ERP 9?
The business model is represented in the graphical form using
236 flowcharts, flow diagrams
______________ and ________________
Identifying and prioritizing subject
areas to be included in the Data
Warehouse,Defining the correct level
of summarization to support business
237 Which of the following is/are the data warehousing activity?
decision making,Establishing a data
warehouse help desk and training
users to effectively utilize the desktop
tools

___________________ is the succession of strategies used by


238 Product Life Cycle Management
management as a product goes through its life cycle.
_______ integrates supply and demand mangement within and across
239 SCM
companies.
240 __________ includes transportation from Suppliers and receiving inventory. Inbound Operations
241 Which of the following is not the service area of SCM? CRM
Which step of the ERP implementation involves, educating and recruiting
242 Step 2
end users throughtout the implementation process?
The system ____________ process will address issues such as software
243 installation
configuration, hardware acquisition and software testing.
A __________________ review is recommended to ensure that all
244 post implementation
business objectives established during the planning phase are achieved.
In _________________ stages, auditors have access to rudimentary ERP
245 post implementation
tools and capabilities for auditing security configurations.
Immediate posting and updation of books of accounts as soon as the
246 Real Time Processing
transactions are entered. This is called as __________
Form 26, Annexure to 26,Form 27,
247 Which of the following ETDS forms are available in Tally.ERP 9? Annexure to 27,Form 26Q, Annexure
to 26Q
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's
248 File Validation Utility
freely downloadable utility called __________________
249 ERP systems provide an access to the__________ data integrated
250 Business intelligence systems are ________ Decision Support Systems. data-driven
Data warehousing technology is the process of creating and utilizing the
251 historical data
company’s __________
The data in the Warehouse comes from the _________ environment and
252 operational
external sources.
In essence, SCM integrates ___________ management within and across
253 supply and demand
companies.
_____________ including all fulfillment activities, warehousing and
254 outbound operations
transportation to customers.
255 Customer Relationship Management is a ________________ level strategy. corporate

256 Operational CRM provides support to ___________ business processes. front office

Collaborative ______ ultimate goal is to use information collected by all


257 CRM's
departments to improve the quality of services provided by the company.

258 Tally.ERP 9 follows the DES __________ method to safeguard the data. encryption
Immediate posting and updation of books of accounts as soon as the
259 Real Time Processing
transactions are entered. This is called as __________
Form 26, Annexure to 26,Form 27,
260 Which of the following ETDS forms are available in Tally.ERP 9? Annexure to 27,Form 26Q, Annexure
to 26Q
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's
261 File Validation Utility
freely downloadable utility called __________________
With ______________ technology the characters are reduced in breadth
262 and user is allowed to input additional characters which would make the Tally Fit
account name, entity complete and readable.
In Tally.ERP 9 __________________ provides the user with administrator
263 rights and the capability to check the entries made by the authorised users Audit Feature
and alter these entries, if necessary.
__________________ is an enabling framework which establishes a
264 connection through which the remote user can access the Client's data Tally.NET
without copying/transferring the data.
If we want the company to be connected automatically for remote access
265 Contact On Load
on load, the property __________ needs to be set it as Yes.
266 _______ is centralized Banking Application Software. Core Banking Solution
_________has several components which have been designed to meet the
267 CBS
demands of the banking industry.
Core Banking Solutions is a combination of an application software and
268 Network devices
________
______ is a large data housing infrastructure that provides high band width
269 Data Centre
access to its clients.
Application servers,Data Base
270 Data centre servers are known as_____________.
Servers,Web server
271 ________ is a method of creating virtual networks within a physical network. VLAN
Data communication between ______ VLANs can be controlled as per
272 2
business requirements.
273 Bank mate is developed by the _______ HCL Technologies
CBS Software resides in a Central application server which is located in the
274 Central Office Data Centre.
___________
A________ that runs the core banking solutions (CBS) and is centrally
275 Central Application Server
accessed by the branches.
The _________of the application is capable of only entering the data at the
276 Client version
end point that is branches.
The application server would be placed in a trusted inside zone in a
277 Virtual Local Area Network
separate ____________
278 Application software would access the ________ Data base server
__________ are capable of being connected only when devices are
279 Virtual Networks
connected to a switch.
A special feature of STP is that _____________ number for any outbound
280 Uniform Transaction Reference
RTGS transaction is generated by the STP System.
_____________refers to the process of developing software which would
281 produce the required output from the input provided of course, using the System Development
necessary hardware and communication systems.
The______________is essential to ensure that computer security records
282 Log management
are stored in sufficient detail for appropriate period of time.
Which of the following is “False“ in case of penetration testing in an IT Ensure recoverability of data in case
283
environment of CBS? of system failure.
It is important that correct latest
Which of the following is erroneous statement in case of Change
284 version of programe is used but
Management Control?
version number need not be changed.

With respect to the customer changing the Pin at the ATM which procedure Old offset value used to derive new
285
is the ”false“ procedure? PIN.
IN CBS, changes to the application server are not made directly to it,
286 Test Server
instead done first on a __________
All the various servers in the central data centre are seggregated through
287 VLANs
_______
The __________ is a complete process in the computer so that it ensures
288 Validation
that data that is fed in conforms to certain prerequisite conditions.
When the central Data base is busy with central end of day activities or for
289 any other reason, the file containing the account balance of the customer is Positive Balance File
sent to the ATM switch. Such a file is called __________
290 The IBDS is located in a ____________ demilitarised zone
291 The main components of Internet Banking system consist of __________ Web server,IBAS,IBDS
Copy of the Anti Virus Software was updated promptly and regularly at the
292 Data Centre and pushed into all of the servers and in all the systems in the Push-pull method
branches by ________
The __________which is also residing in the server at the branch actually
293 Application Software
does the banking operations.
In Core Banking concept all the systems of the bank are connected to the
294 Central office by means of a connectivity which may be either a _________ Leased line
or a dial up line.
The ________ is generated by the software and directly sent to equipment
295 Personal Identification Number
for printed the Pin Mailer.
____________would also include the existence of built in controls in the
296 system to ensure proper processing of input data so as to provide the Process Control
required output.
____________refers to an arrangement wherein the issuing bank acts on
297 Letter of Credit
the request and instructions of a customer.
_______________ is a process by which the bank ensures the
298 Business Continuity Planning
maintenance and recovery of operations.
299 At which phase of testing the version of software is called “ beta version”? Programmer testing,User testing
In an Organization structure of IT Department which of the following Network administrator and Database
300
function is incompatible? Administrator.
The number that is stored in the ATM switch is the difference of which of
301 Pin No - Natural Pin
the following number?
The information retrieval of transactions taking place at ATM located at
302 Soft copy of Electronic journal
remote locations is through _________
The number that is generated as soon as the customer inserts the card in
303 Natural Pin
the ATM machine is __________
304 Which is not a Database management system. Unix
305 The _________ operator is used to find the null records in a table. IS NULL
When you create relationship between two tables, the Common field's data
306 Same data type
type should be
307 SQL stands for____________________. Structured Query Language
MS Acces 2010 reads and writes to the .accdb file format in chunks also
308 Pages
known as_____________.
309 DDL stands for ____________ Data Definition Language
310 DML stands for _____________ Data Manipulation Language
311 Whenever a tables gets update, the dependent query will update automatically
To extract the records based on date field, which of the symbol should be
312 #
used
313 The data can be entered into a table in the ____________ view. Datasheet
314 In a Query the data can be sorted based Single column,Multiple columns
When you create a field using text data type in MS Access 2010, by default
315 255
field will have ____ character.
If we are using the same table for main query and sub-query,we need to Alternate names to the tables,Aliases
316
provide___________. name to the tables
317 Update Query can be used to update_________ in MS Access 2010. Single Record,More than 1 record
318 Delete Query can be used to delete Single Record,More than 1 record
319 How many Primary key constraints can create in a table______. Only one
Unmatched Query can help to find records that have no corresponding
320 TRUE
reord in other tables.
MS Access 2010 provides queries that can be used for obtaining the
321 Sum(),Count(),Avg()
aggregated results instead of individual records are____________.
A function that Counts the set of values that satisfy the given criteria in MS
322 Count()
Access 2010 is___________.
323 Aggreagate Query also known as___________. Group By queries,Total query
324 Which Query wizard is used to find repeated records in a table? Duplicate Query Wizard
325 Append Query is used to ______________ in a table in MS Access. Add Records
How does a query-based report differ in design to a report based on just
326 It doesn’t
one table?
Use the Mailing label wizard text
327 How would you include some plain text into a mailing label report?
option.
In a Microsoft Access 2010 report, the page numbering would most likely
328 Page Footer
be placed into the:
If you wished to present a professionally looking form on screen that would
All The tools of the form design
329 show all the necessary information, which of the following form design tools
would you most likely use? control gallery.

Reduces the size of the


database,Optimizes memory usage
What are the benefits of an ACCDE file__________________________ in
330 and improves performance.,Protects
Access
the VBA code from being viewed or
edited while still allowing it to run.

331 An .ACCDE file is a ___________ version of the original .ACCDB file. Locked-down
Which type of the query is used to accept the value from the user while
332 Parameter Query
executing the query and fetch records accordingly
To encrypt the databse in Access 2010 must be opened in the
333 Open Exclusive mode
__________________.
334 FIX() is a kind of ____ function in MS-Access 2010. Math
MS-Access 2010 has added new features of ______ to eliminate the need
335 Macro
of VBA code
Encrypting a database does not restrict access to database objects, but to
336 Open
__________ the database.
File Tab ->Access Options, and
The setting for the Security option can be handled
337 selecting the Trust Centre tab from
using_______________________ in Access 2010.
the Access Option window
Third Party Encryption Technology can also be applied to the database of
338 TRUE
Microsoft Access 2010.
339 To create a split database in MS Access 2010 go to which tab? Database Tools
340 After spliting database,frontend database holds_________________. Forms,Query,Report
341 After spliting database,backend database holds_________________. Tables
A back-end database & front-end
342 When an Access database is split, it creates two files_________________.
database
A Data Access Page is a special type of _________ that allows users to
343 Web page
interface with database using Internet Explorer.
MS Access provide__________ datatype to create link to a web page,file,or
344 Hyperlink
email address.
Set as Switchboard startup Option in
345 To make a switchboard appear while opening the database.
Access Option
To add or delete buttons to Switchboard, which option is used in
346 Edit Option
Switchboard Manager is used.
The Switchboard Manager is a dialog box that allows creating a
347 TRUE
switchboard for an Access database.
348 A macro can automate data entry in Access 2010. TRUE
349 Which of the following data-type is not available in MS-ACCESS AlphaNumeric
350 The validation can be defined at____________ level in Access 2010 Table,Form
A macro can be attached to an event of a
351 A form,A report,A button
control_________________________.
Click->File tab->Option Button->Quick
Access Toolbar->Command not in
352 How to add switchboard in Access 2010?
Ribbon->Switchboard Manager->Add-
>OK
The command Design Application performed action____________ on
353 Opens the Switchboard Manager.
switchboard.
Switchboard Manager only allows a maximum of __________command
354 Eight
buttons on a switchboard
MS Access 2010 provides a __________pane that contained large list of
355 actions to be chosen,enabling a wide range of commands that can be Action Catalog
performed
356 SQL is considered to be a __________ 4GL
Which action in MS Access macro applies a fliter or query to a table,form or
357 ApplyFilter
report.
Opens a query in the Datasheet view, Design view, or Print Preview which
358 OpenQuery
macro action used in MS Access.
Among +, <>, MOD, AND, <= operator which operator has the highest
359 MOD
priority.
360 The Strcomp() function is a__________type function. Text
361 The SGN() function is a ____________ type function Math
362 Which of the following symbol is used to write a sub query ()
For the Non-Aggregate Total field, the criteria can only be specified using
363 TRUE
the Where clause.
To export an access table to an XML File, which of the below steps must be Right-click the table and select Export -
364
followed? >XML
365 In IDEA, import Assistant wizard is used to import data from____________. Excel,Access,XML
File->Import Assistant-> Import to
366 What is the procedure for importing data into IDEA ?
IDEA
text,database,spreadsheet and mail
367 IDEA exports data in a number of _______________________.
merge format
In IDEA,Data Extraction select data form a file for further___________ for
368 Investigation
creating a new file of logically selected records.
369 What is step by step procedure for using Bendford's law function in IDEA ? Analysis->Benford's Law

Comprised of similar sized values for


similar phenomena.,Without built-in
minimum and maximum
370 A Benford's Law analysis is most effective on data________________.
values.,Without assigned numbers,
such as bank accounts numbers and
zip codes and with four or more digits.

371 In IDEA, blank value data can be extracted by using_________. @isblank()


In IDEA, Summarization, Pivot Table, Stratify, Duplicate Key functions
372 Analysis
comes under which menu.
In IDEA, Extraction, Sort, Indices, Search functions comes under which
373 Data
menu.
Text files that are organized properly fall into one of two types
374 Delimited files,Fixed-width files
are__________
To create an unmatched Query using wizard, minimum required number of
375 two
table or fields is_________.
Only one,More than One Field,As
376 While creating the query, the criteria can be set in
many field
In MS Access query which logical operator returns True if both the
377 AND
expressions compared are true.
In MS Access query which logical operator returns True if either of the
378 OR
expressions compared are true.
379 Enfore Referencial Integrity option is used to restrict enerting data in Child Table
380 In MS Access left("Access",3) function will return__________. Acc
Which function is used to converts the text to lower case in MS Access
381 Lcase()
2010.
Which function is used to remove leading or trailing spaces in a text in MS
382 Trim()
Access 2010.
_____________ is contains a set of predefined functions in MS Acccess
383 Expression Builder
and helps build complex expression.
384 Which of the following is a Database Software Oracle
Each column has a specific range of
385 Which of the following is not the characteristics of a Relational Table?
values known as the Tuple domain
386 Which record will be retrieved if the query criteria is < #1/1/11#? Records with date before 2011
The tab in Expression Builder in which we write expressions is known as
387 Expression Box
_____________.
388 The criteria expression LIKE?B*. Will match all text starting from B
__________ queries are useful for summarizing information, and are
389 Crosstab query
somewhat similar to pivot tables in MS-Excel.
While entering record in Datasheet view, in which order the records can be
390 At the end of the table
entered
391 When you delete the record in form, it deletes the record from__________. Form & Table
392 Having clause is used in the aggregate query in MS Access 2010 TRUE
The controls that are not linked to any field of the table or query on the form
393 Unbounded Controls
are known as ________.
Which property of the form can be used to insert a background image in
394 Picture
MS Access 2010?
___________ is a report that is inserted in another report in MS Access
395 Inside-Report
2010.
A bound main report is based on a ______________ and its
396 Table or query,Sub-Report
_____________ contain realted information.
A___________used to compare multiple values of categories or
397 Column Chart
differences over a period of time.
398 A________used to compare trends over a period of time. Line Chart
To create a read-only copy of the database, which of the following file
399 .ACCDE
format can be used?
The database administrator created a split database and created a front-
400 end database and back-end database file.Which of the file should be Back-end database
stored on the server ?
To make database package and digitally sign using which option in Access File->Save&Publish->Save Database
401
2010 ? as->Package and sign
In which formats can the Collect Data through email message feature can
402 HTML and InfoPath
send the data entry form?
Once a mail is sent using the collect data through email message feature in
403 Manage replies
Access 2010. The mail status can be checked using________________.
The ___________ type of data cannot be collected using Collect data
404 AutoNumber
through email messages.
405 What is the memo data type field used for? For long text entries
Those records that match an entity in
406 The filter By selection feature allows you to filter:
a field
407 Which editor was provided for use with Access Basic? Notepad
Click the report, and on the Pivot
How do you update Pivot Table report data after changes are made to the
408 Table toolbar, click the refresh data
source data?
button
Datasheet View,Design View,Pivote
409 What are the different views to display a Table ?
Table & Pivot Chart View
Which Of The Following Creates A Drop Down List Of Values To Choose
410 Lookup Wizard
From?
A __________ Enables You To View Data From A Table Based On A
411 Query
Specific Criterion
The Database Language That Allows You To Access Or Maintain Data In A
412 DCL
Database
Authorizing Access And Other Control
413 DCL Provides Commands To Perform Actions Like
Over Database
414 Which is not a Database Model ? Structureed Database Model
415 Which Of The Field Has Width 8 Bytes? Date/time
This Is The Stage In Database Design Where One Gathers And List All The
416 Data Definition
Necessary Fields For The Database Project.
The Third Stage In Designing A Database Is When We Analyze Our Tables
417 Relationship
More Closely And Create A ___________ Between Tables

To build a main switchboard form that


418 What is the purpose of the Switchboard Manager in Microsoft Access 2010?
controls all other forms.
Identify an audit finding w.r.t.
419 Which of the following is a benefit of using CAATs?
materiality in an IT environment
420 Is there a fixed qualification for internal auditor_________. FALSE
__________________ refers to use software/applications to automatically
perform tasks such as accounting,preparing trial balance, financial
421 Office automation
statements etc. and electronically transmit data or information using
internet..
________,___________,__________ are commonly referred to as CIA in Confidentiality,Integrity and
422
information security parlance. Availability
_____________means information available in the organization should not
423 Integrity
be altered or modified by unauthorized personnel.
The process of identifying an individual, usually based on user id and
424 Authentication
password in an organization is called______________.
425 Which of the following is not a software equipment required in a CA's office? None of the Above
426 Which of the following is not an application arranged by ICAI? ICAI-TOC
427 How many stages are there in the sales cycle? 3
428 PBX stands for ________ Private Branch exchange
429 Which of the following will not appear in the home page of K-Doc? Paste Document
To change an email header so that the message appears to have
430 originated from someone or somewhere other than the actual source is Email Spoofing.
known as___________.
431 To playfully satirize a website is known as_____________. Web spoofing
_________is the complete package to manage the billing requirements of a
432 Billing and Accounting software
CA firm on cash system of accounting.
433 Which of the following is not a/an feature of eSecretary? Share certificate printing
434 Annual return preparation can be done using ________. ICAI-ROC application
________is correspondence automation & management software that is
435 eSecretary
seamlessly integrated with Microsoft Office.
________ is an independent,objective assurance and consulting activity
436 Internal auditiing
designed to add value and improve an organization's operations.
Financial reporting,Operations of the
437 Which of the following is/are the main purpose of the internal audit?
organization
As per _____________of the Income tax Act,every person carrying on
438 business or profession is requires to get his accounts audited by a CA Section 44AB
before the "specified date".

439 FEMA Stands for _______________. Foreign Exchange Managament Act


Which application helps the management to allocate the revenue to the
440 Client management
credit of the right employee who identified the opportunity?
441 Who has full privileges in the financial accounting application? System administrator
_________is the centre point of the financial accounting application as any
442 transactions having financial impact carried out in any other module will GL module
reflect in this module.
In Financial Accounting Application,the transactions flow from GL (General
443 FALSE
ledger) to other modules.
Which of the functionalities is not provided in the purchasing module of
444 Comparison with budgets
Financial Accounting Application.
In Financial Accounting Application,automatic sequence number of
445 Expense Management
documents control is not required in which of the following module?
Which module of Financial Accounting Application can be used for
446 Sales
assigning credit limit to customers?
447 Which of these will trigger/alert for timely payment ? Expense Management
We can manage interviews,offers and job vacancies by using which of the
448 HR and Payroll applications
application?
___________provides information about updation of project cost based on
449 Timesheet application
time spent by employees on various projects.
Employee designation and reporting
450 Which of the follwing is not a/an functionality provided by PMS?
structure
___________automates the calculation of salary for taking inputs from the
451 timesheet application, leaves from Leave Management System and salary Payroll System
details from the HR master data.
452 Which of the follwing is not a control in Leave Management System? Error free capture of leave details
453 Permanent Audit File are obtained once but updated on __________basis. yearly
Copies of clients’ incorporation
454 In Permanent Audit file, _______ is not the key data documented.
documents like MoC

Role based access,Complete audit


455 The Document Management Sytem offers the features___________. trail,Cost effective to maintain the
documents in soft copy
________is a type of training in which user logon on the training server with
456 E-Learning
a user ID and password.
In some cases, trainee is supposed to appear for the examination/test at
457 E-Learning
the end of the training is____________.
458 ________ are the hardware/infrastructure equipments used in a CA firm. PC,Application Server,WAN

459 Which of these is/are the standard email program used in an organization? Microsoft Exchange,Lotus Notes
Compared to LAN, its transmission
460 Which of the following is not a characteristics of WAN?
speed is low
_________is protection of information assets from threats to preserve their
461 Information Security
value.

462 Which types of information assets need to be secured in a CA Office? Client data,Own data,Own documents
The extent and level of _________ would depend on the nature of
463 Confidentiality
information.
__________ of information might be affected due to denial of service attack
464 Availability
or some other reasons.
__________means the sender cannot deny having sent a message and
465 Non-Repudiation
receiver cannot deny receiving the message.
466 Risk may not be _______ in nature. vulnerable
467 In IDEA, Append functions can be used to_________. Add data at the end
468 In IDEA, Statistics functions can be applied on_________. Numeric Data,Date Data
In IDEA, increment value in Stratification function can be fixed or free
469 TRUE
interval.
470 In IDEA, Stratified Random functions is a part of which menu. Sampling
471 Which of the following is not an Audit Software Unix
Using which functions to perform more complex calculations and exception
472 Equation Editor
testing in IDEA?

File->Print->Create Report,Click on
473 Which is the step by step procedure for reporting in IDEA. Create Report button on the
Operation toolbars->Report Assistant.
Items of audit interest,Data
474 Which of the following are categories of computer audit function ?
Analysis,System validation
475 In the following list which is not an audit function ? Export
476 In the following list which is a audit function? Stratification
Review Programming
standards,Understand program
477 Which is the following step involved in a source code review methodology ?
specifications,Formulate flaw
hypotheses
478 In IDEA which functions should be used to find repeated values ? Detection
Numeric Data,Date Data,Character
479 In IDEA, Stratification functions can be applied on which type of data ?
Data
In IDEA,Summarization accumulates the values of Numeric fields for
480 Unique Key
each____________.
In which sampling,selecting sampling units using a fixed interval between
481 Systematic
selections is_______________.
Ensures that all combinations of sampling units in the population have an
482 Random
equal chance of selection is____________.
In Audit tool, to built relation between two tables, both table should
483 Common Field
have_____________.
484 Input Control method is a part of Application Control Group. TRUE
Which is the following type of check that can be run when data is input
485 Field check
through terminal ?
Which is the following is the correct types of Field checks on processed
486 Overflow,Range,Sign Test
data ?
487 Which is the following is the correct types of Record checks on input data ? Resonableness
488 Which is the correct types of Batch Checks ? Control Totals
Data Integrity,Controls are required
489 Which is the need for table level tests ?
for authorization
This may make the entire child tables
referenced by the master field in the
490 Which is the following is the major points with respect to inter table tests ? main table un-available,Their Master
& Child relationship reference the
table from one another

Which is the software used by the auditor to take a view of a file of data or
491 Snapshots
transaction passing through the system at a particular point of time ?
Which is the software used by the auditor to compare the source version of
492 Souce comparison
a program with a secure master copy ?
Which is the techniques whereby the auditor arranges or manipulates data
493 either real or fictitious, in order to see that a specific program or screen edit On-line Testing
test is doing its work ?
Which is the software used by the auditor to list un-used program
494 Mapping
instruction ?
Which is the software used by auditor to read and analyze records of
495 Log Analyzers Software
machine activity ?
Lack of Visible Transaction
496 Which of the following reason strongly call for Control & Audit Function ?
Trail,Absence of Input Document
497 Which is the correct types of Field checks on input data ? Both type
To ensure the input data is valid
498 Which is the major points to be consider with respect to System tests ?
before entering the value
In Data analysis techniques, which law is used to idenfity statistical report
499 Benford Law
on numeric data ?
500 Which is not a feature of File reorganization with an auditor perspective? Filtering
Identify data, which are not in
501 What do you understand by the term, “Data Consistency” in using CAATs?
agreement with the regular format.

Functions involving use of arithmetic operators, which enable performing re-


502 Arithmetic function
computations and re-performance of results is an example of?

You might also like