You are on page 1of 7

Download From http http://caknowledge.in/ More Question at http://caknowledge.

in/itt-question-bank-ca-students/
S. No Questions Option A Option B Option C Option D Answer
1 In IDEA, Statistics functions can be applied on_________. Numeric Data Date Data Both A and B None of the above C
2 In IDEA, increment value in Stratification function can be fixed or free interval. FALSE TRUE B
3 In IDEA, Stratified Random functions is a part of which menu. Analysis Data Relation Sampling D
4 Which of the following is not an Audit Software ACL IDEA Unix SOFTCAAT C
5 Using which functions to perform more complex calculations and exception testing in IDEA? Equation Editor function Editor Calculation Editor Testing Editor A
6 Which of the following are categories of computer audit function ? Items of audit interest Data Analysis System validation All of the above D
7 In the following list which is a audit function? File Definition Stratification Print Preiview Append B
Review Programming Understand program Formulate flaw
8 Which is the following step involved in a source code review methodology ? standards specifications hypotheses All of the above D
9 In IDEA which functions should be used to find repeated values ? Detection Exclude Sequence checking Filter A
10 In IDEA, Stratification functions can be applied on which type of data ? Numeric Data Date Data Character Data All of the above D
11 In IDEA,Summarization accumulates the values of Numeric fields for each____________. Primary Key Unique Key Secondary Key Composite Key B
In which sampling,selecting sampling units using a fixed interval between selections
12 is_______________. Random Systematic All of the above None of the above B
Ensures that all combinations of sampling units in the population have an equal chance of selection
13 is____________. Random Systematic All of the above None of the above A
14 Input Control method is a part of Application Control Group. TRUE FALSE A
15 Which is the following type of check that can be run when data is input through terminal ? Field check Filter check Compare check Data check A
In _______system money transfers are done on a one to one basis while in _______system transfer is
16 done in batches. NEFT, RTGS RTGS,NEFT EFT,RTGS None of the above B
17 All the money transfers take place in the books of the _________________ Beneficiary bank Central bank(RBI) Remitting bank None of the above B
18 ________system of money transfer is primarily used for large transactions. NEFT RTGS EFT All of the above B
19 In RTGS, the STP generates an ___________for every outbound RTGS transaction. UTN UTE UTR UTS C
Straight Through Straight Temporary Strict Through
20 STP stands for ________________________________ in terms of CBS. Processing Processing Processing None of the above A
21 ________ is a method of creating virtual networks within a physical network. VLAN LAN WAN MAN A
Control Management Cash Management Core Management Centre Management
22 CMS stands for ______________________________ in terms of CBS. System System System System B

Systems audit are Audit of controls in any


Audit of internal important for the banking environment is
controls is not needed verification of the performed using
23 Which of the following statements is true? at all internal controls software audit None of the above B
Laying down
Formulating a security Developing a business procedures for system
24 The Management Controls does not include ___________ Managing of Assets policy continuity planning development A
_______is supported by advanced technology infrastructure and has high standards of business
25 functionality. Firewall Internet banking Core Banking Solution Web centre C
Central Office Data
26 CBS Software resides in a Central application server which is located in the ___________ ATM Data centre Middleware Web centre Centre. D
Central Application
27 A________ that runs the core banking solutions (CBS) and is centrally accessed by the branches. ATM Server Server Database Server Domain Name Server B

28 The _________of the application is capable of only entering the data at the end point that is branches. System version Application Version Client version Firewall C
Virtual Local Area Personnal Area
29 The application server would be placed in a trusted inside zone in a separate ____________ Network Local Area Network Wide Area Network Network A
30 Application software would access the ________ Data base server ATM DATA Server Domain Name Server Application Server A
31 __________ are capable of being connected only when devices are connected to a switch. LAN Virtual Networks MAN WAN B

_____________refers to the process of developing software which would produce the required output Application
32 from the input provided of course, using the necessary hardware and communication systems. Development Software Development Server Development System Development D
The______________is essential to ensure that computer security records are stored in sufficient detail
33 for appropriate period of time. Review Management RTGS Log management Authorized Controller C
34 All the various servers in the central data centre are seggregated through _______ LANs VLANs WANs MANs B
The __________ is a complete process in the computer so that it ensures that data that is fed in
35 conforms to certain prerequisite conditions. Consalidation Password Policy protection Validation D
When the central Data base is busy with central end of day activities or for any other reason, the file
containing the account balance of the customer is sent to the ATM switch. Such a file is called Centralised Data base Central Office Data
36 __________ Positive Balance File Application Server security Centre. A
37 The IBDS is located in a ____________ Militarised zone City Zone State zone demilitarised zone D
38 The main components of Internet Banking system consist of __________ Web server IBAS IBDS All the above D
Copy of the Anti Virus Software was updated promptly and regularly at the Data Centre and pushed into
39 all of the servers and in all the systems in the branches by ________ Hacking Method Push-pull method Both A &B None of the Above B

40 The __________which is also residing in the server at the branch actually does the banking operations. Sytem software utility software Application Software Application Server C
In Core Banking concept all the systems of the bank are connected to the Central office by means of a
41 connectivity which may be either a _________ or a dial up line. local line Leased line Broadband None B
Personal Identification
42 The ________ is generated by the software and directly sent to equipment for printed the Pin Mailer. 16 digit number Number Net transaction ID NO ATM No B
____________would also include the existence of built in controls in the system to ensure proper
43 processing of input data so as to provide the required output. Output Control Input control Process Control Data Control C
____________refers to an arrangement wherein the issuing bank acts on the request and instructions of
44 a customer. Letter of Credit Letter of Tax Letter of Payable Letter of Receible A
Business Recovery Business Continuity Disaster Recovery
45 _______________ is a process by which the bank ensures the maintenance and recovery of operations. Planning Planning Planning None B
46 At which phase of testing the version of software is called “ beta version”? Programmer testing User testing (a) & (b) both None of above C
47 Finacle developed by _________ Infosys HCL Technologies TCS I-Flex A
Offset Value -
48 The number that is stored in the ATM switch is the difference of which of the following number? Pin No - offset value Offset value - Pin No Pin No - Natural Pin Natural Pin C
The information retrieval of transactions taking place at ATM located at remote locations is through Soft copy of Hard copy of
49 _________ Electronic journal Electronic Journal Cash register (a) and (b) both A
The number that is generated as soon as the customer inserts the card in the ATM machine is
50 __________ Offset value Pin sent to customer Natural Pin Card Number C
Expression Builder
51 The tab in Expression Builder in which we write expressions is known as _____________. Expression Elements Operator Button Expression Box window C
Will match all text
Will match all text Will match all text having second character Will match all text
52 The criteria expression LIKE?B*. starting from B ending from B as B starting with a digit A
__________ queries are useful for summarizing information, and are somewhat similar to pivot tables in
53 MS-Excel. Select query Crosstab query Action query Parameter query B
Beginning of the
54 While entering record in Datasheet view, in which order the records can be entered Alphabetical Order At the end of the table Any where in the table table B
55 When you delete the record in form, it deletes the record from__________. Form only Form but not in table Table but not in Form Form & Table D
56 Having clause is used in the aggregate query in MS Access 2010 FALSE TRUE B

57 The controls that are not linked to any field of the table or query on the form are known as ________. ActiveX control Unbounded Controls Graphics Control Bound Controls B
58 Which property of the form can be used to insert a background image in MS Access 2010? Caption Background Record Source Picture D
59 ___________ is a report that is inserted in another report in MS Access 2010. Inner-Report Sub-Report Inside-Report Insert-Report C
A bound main report is based on a ______________ and its _____________ contain realted Table or query,Inner- Table or query,Main- Table or query,Sub-
60 information. Report Report Report None of the above C
Data Definition Data Defined Detailed Definition Data Detailed
61 DDL stands for ____________ Language Language Language Language A

62 A___________used to compare multiple values of categories or differences over a period of time. Pie Chart Area Chart Bar Chart Column Chart D
63 A________used to compare trends over a period of time. Pie Chart Line Chart Bar Chart Column Chart B
64 To create a read-only copy of the database, which of the following file format can be used? .ACCDB .ACCDE .MDW .ACCDT B
The database administrator created a split database and created a front-end database and back-end
65 database file.Which of the file should be stored on the server ? Front-end database Back-end database Both of them None of them B
Visual Basic
66 In which formats can the Collect Data through email message feature can send the data entry form? HTML and InfoPath Access Forms Application Excel attachment A
Once a mail is sent using the collect data through email message feature in Access 2010. The mail status Options in Tool menu
67 can be checked using________________. Export to Outlook of Access Manage replies All of the above C
68 The ___________ type of data cannot be collected using Collect data through email messages. Text Number Date/time AutoNumber D
To store objects For shout text entries
created in other of no more than 255
69 What is the memo data type field used for? To add table programs For long text entries characters C
Those records that Records that meet any of
match an entity in a Records based on a several criteria you
70 The filter By selection feature allows you to filter: field criterion you specify specify All of above A
Detailed
Detailed Maintaining Data Maintaining Data Manipulation Manipulation
71 DML stands for _____________ Language Language Language Language C
The Visual Basic 1.0
72 Which editor was provided for use with Access Basic? editor Notepad The QuickBasic editor All of above B
Click the report, and on
Save your changes, Select the Pivot Table the Pivot Table toolbar,
close the workbook, worksheet and press F9 click the refresh data
73 How do you update Pivot Table report data after changes are made to the source data? and then reopen it. on the keyboard button All of the above C
Pivote Table & Pivot
74 What are the different views to display a Table ? Datasheet View Design View Chart View All Of Above D
75 Which Of The Following Creates A Drop Down List Of Values To Choose From? Ole Object Hyperlink Memo Lookup Wizard D
76 A __________ Enables You To View Data From A Table Based On A Specific Criterion Form Query Macro Report B
77 The Database Language That Allows You To Access Or Maintain Data In A Database DCL DML DDL None Of Above A
Insert, Update Or Authorizing Access And
Change The Structure Delete Records And Other Control Over
78 DCL Provides Commands To Perform Actions Like Of Tables Data Values Database None Of Above C
Network Database Relational Database Object Oriented Structureed Database
79 Which is not a Database Model ? Model Model Database Model Model D
80 Which Of The Field Has Width 8 Bytes? Memo Number Date/time Hyperlink C
This Is The Stage In Database Design Where One Gathers And List All The Necessary Fields For The Establishing
81 Database Project. Data Definition Data Refinement Relationship None Of The Above A

82 Whenever a tables gets update, the dependent query will Not update update automatically have to update manually never update B
The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A
83 ___________ Between Tables Relationship Join Query None Of These A
To build a main
switchboard form that Creates the macros To allow the user to To allow changing
controls all other used to program an switch from one from one report to
84 What is the purpose of the Switchboard Manager in Microsoft Access 2010? forms. automatic application. database file to another. another. A
The only report type
The reports are It doesn't have as many available is the
85 How does a query-based report differ in design to a report based on just one table? restricted in size. It doesn’t design options. Design Report. B
Type the text directly Use the Mailing label
86 How would you include some plain text into a mailing label report? into the label. Use the > button. wizard text option. Use the >> button. C
87 In a Microsoft Access 2010 report, the page numbering would most likely be placed into the: Report Footer Section Header Page Footer Page Header C

If you wished to present a professionally looking form on screen that would show all the necessary All The tools of the form Form Wizard
88 information, which of the following form design tools would you most likely use? Pivot Table Pivot Chart design control gallery. Columnar C
89 An .ACCDE file is a ___________ version of the original .ACCDB file. Fixed-down Locked-down Open-down None of the above B
Which type of the query is used to accept the value from the user while executing the query and fetch
90 records accordingly Make Table Query Update Query Delete Query Parameter Query D
91 To encrypt the databse in Access 2010 must be opened in the __________________. Open Secure mode Open Inclusive mode Open Exclusive mode Open Read Mode C
92 To extract the records based on date field, which of the symbol should be used $ # () "" B
93 FIX() is a kind of ____ function in MS-Access 2010. Math Date Text None of the above A
94 MS-Access 2010 has added new features of ______ to eliminate the need of VBA code Macro Form Report None of the above A

95 Encrypting a database does not restrict access to database objects, but to __________ the database. Open Modify Read Write A

96 Third Party Encryption Technology can also be applied to the database of Microsoft Access 2010. TRUE FALSE A
97 To create a split database in MS Access 2010 go to which tab? Create Tab External Tab File tab Database Tools D
98 After spliting database,frontend database holds_________________. Forms Query Report All of the above D
99 After spliting database,backend database holds_________________. Tables Forms Query Report A
A back-end database A new database & Old primary database &
100 When an Access database is split, it creates two files_________________. & front-end database database. secondary database None of the above A
A Data Access Page is a special type of _________ that allows users to interface with database using
101 Internet Explorer. XML page HTML Page Web page None of the above C
102 OLAP systems use concept of OLAP cube called a ______________ cube single dimensional hyper dimensional multi dimensional none C
103 The data which is to be exported from Tally.ERP 9 can be in ________ format. XML HTML ASCII ALL D
104 In Tally ERP-9 Remote Access is also known as __________. Networking VB.Net Tally.Net None of the above C
105 Accessing data store on a remote location using Internet in Tally.ERP9 is called____________. Local Data Remote Data Internet Data None of the above B
106 Tally.ERP9 can be classified user in two categories are___________. Local User Remote User Both A & B None of the above C
107 Which of the following is not a predefined security level provided by Tally.ERP 9? Owner Public User Data Entry Tally.NET User B
The business model is represented in the graphical form using ______________ and flowcharts, flow
108 ________________ charts, pictures smart art, clip art diagrams graphs, shapes C
109 _______ integrates supply and demand mangement within and across companies. BPM SCM PLM CRM B
Online Analysis Online Analytical Online Analytical
110 OLAP stands for _________________. Processing Processing Programming None of the above B
111 __________ includes transportation from Suppliers and receiving inventory. Inbound Operations Outbound Operations Sourcing planning Production planning A
112 Which of the following is not the service area of SCM? Logistics Asset Management PLM CRM D
Which step of the ERP implementation involves, educating and recruiting end users throughtout the
113 implementation process? Step 1 Step 2 Step 3 Step 4 B
The system ____________ process will address issues such as software configuration, hardware
114 acquisition and software testing. implementation upgradation installation migration C
A __________________ review is recommended to ensure that all business objectives established
115 during the planning phase are achieved. pre implementation under process review post implementation None of the above C
In _________________ stages, auditors have access to rudimentary ERP tools and capabilities for
116 auditing security configurations. post implementation pre implementation Both A & B Either A Or B A
Immediate posting and updation of books of accounts as soon as the transactions are entered. This is
117 called as __________ Interactive Processing Immediate Processing Real Time Processing Business Processing C
Form 26, Annexure to Form 27, Annexure to Form 26Q, Annexure to
118 Which of the following ETDS forms are available in Tally.ERP 9? 26 27 26Q All of the above D
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility File Validation
119 called __________________ Program File Validation Utility File Valuation Program File Valuation Utility B
120 ERP systems provide an access to the__________ data integrated distributed isolated de-centralized A
________________ is a tool that refers to skills, processes, technologies, applications and practices
121 used to facilitate better, accurate and quicker decision making. Data Warehousing Data Modeling Business Modeling Business Intelligence D
122 Business intelligence systems are ________ Decision Support Systems. data-driven information driven resource driven none A
123 Data warehousing technology is the process of creating and utilizing the company’s __________ general data historical data operational data none B
124 The data in the Warehouse comes from the _________ environment and external sources. operational backup data none A
125 In essence, SCM integrates ___________ management within and across companies. supply and demand supply and chain supply and sortage none A

126 _____________ including all fulfillment activities, warehousing and transportation to customers. Inbound operations outbound operations hybridbound operations none B
127 Customer Relationship Management is a ________________ level strategy. business corporate strategic none B
128 Operational CRM provides support to ___________ business processes. front office back office staff none A
Collaborative ______ ultimate goal is to use information collected by all departments to improve the
129 quality of services provided by the company. CRM's ERP SCM none A
130 Tally.ERP 9 follows the DES __________ method to safeguard the data. encryption decryption cryptography none A
Immediate posting and updation of books of accounts as soon as the transactions are entered. This is
131 called as __________ Interactive Processing Immediate Processing Real Time Processing Business Processing C
Integrated Information Decision Support Non-Isolated
132 Business Intelligence Systems are data-driven ___________________. Information Systems Systems Systems Information Systems C
Form 26, Annexure to Form 27, Annexure to Form 26Q, Annexure to
133 Which of the following ETDS forms are available in Tally.ERP 9? 26 27 26Q All of the above D
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility File Validation
134 called __________________ Program File Validation Utility File Valuation Program File Valuation Utility B
With ______________ technology the characters are reduced in breadth and user is allowed to input
135 additional characters which would make the account name, entity complete and readable. Tally Fix Tally Adjust Tally Fit Tally AutoFit C
In Tally.ERP 9 __________________ provides the user with administrator rights and the capability to HTTP-XML based data Unlimited multi-user
136 check the entries made by the authorised users and alter these entries, if necessary. User-defined Security interchange support Audit Feature D
__________________ is an enabling framework which establishes a connection through which the Direct Web Browser
137 remote user can access the Client's data without copying/transferring the data. Access Web Publishing Tally.NET Email facility C
If we want the company to be connected automatically for remote access on load, the property Allow to Connect
138 __________ needs to be set it as Yes. Company Contact On Load Either A or B None of the above B

139 ___________________ technology is the process of creating and utilizing the company's historical data. Data Warehousing Data Modeling Business Modeling Business Intelligence A
140 Is there a fixed qualification for internal auditor_________. TRUE FALSE B
141 Which of the following will not appear in the home page of K-Doc? Powerpoint Word Paste Document My Templates C
To change an email header so that the message appears to have originated from someone or somewhere
142 other than the actual source is known as___________. Email middle attack. Email Spoofing.
Email hacking. Email tracking B
143 To playfully satirize a website is known as_____________. Web tapping Web Interception
Web spoofing Web threating C
_________is the complete package to manage the billing requirements of a CA firm on cash system of Billing and Accounting
144 accounting. Payroll eSecretary software K-DOC application C
Share certificate
145 Which of the following is not a/an feature of eSecretary? Contact Management Greeting Management Email Management printing D

146 Annual return preparation can be done using ________. ICAI-ROC application K-DOC application ICAI XBRL Software Payroll A
________is correspondence automation & management software that is seamlessly integrated with ICAI-ROC
147 Microsoft Office. K-DOC application eSecretary ICAI XBRL Software application B
________ is an independent,objective assurance and consulting activity designed to add value and
148 improve an organization's operations. Statutory audit Tax audit Internal auditiing None of the Above C
Operations of the
149 Which of the following is/are the main purpose of the internal audit? Financial reporting organization Both A and B Either A or B C
As per _____________of the Income tax Act,every person carrying on business or profession is requires
150 to get his accounts audited by a CA before the "specified date". Section 45 Section 44AD Section 43B Section 44AB D
__________________ refers to use software/applications to automatically perform tasks such as
accounting,preparing trial balance, financial statements etc. and electronically transmit data or
151 information using internet.. ERP Office automation Either A or B None of the Above B
Foreign Exports Financial Enterprise Foreign Exchange
152 FEMA Stands for _______________. Management Act Management Act Managament Act None of the Above C
Which application helps the management to allocate the revenue to the credit of the right employee who Resource allocation Knowledge Document Management
153 identified the opportunity? and scheduling management Systems Client management D
Database
154 Who has full privileges in the financial accounting application? administrator Account administrator System administrator User Administrator C
_________is the centre point of the financial accounting application as any transactions having financial
155 impact carried out in any other module will reflect in this module. AP module GL module AR module FA module B

156 In Financial Accounting Application,the transactions flow from GL (General ledger) to other modules. TRUE FALSE B

Which of the functionalities is not provided in the purchasing module of Financial Accounting Receipts of goods or Invite and analyze Comparison with
157 Application. Evaluation of Vendors service quotations from vendors budgets D
In Financial Accounting Application,automatic sequence number of documents control is not required in
158 which of the following module? Purchasing Accounts Payable Expense Management Fixed assets C

159 Which module of Financial Accounting Application can be used for assigning credit limit to customers? Purchasing Sales Accounts Payable Accounts Receivable B
160 Which of these will trigger/alert for timely payment ? Accounts Payable Accounts Receivable Expense Management Bank Reconcilations C
Resource allocation HR and Payroll
161 We can manage interviews,offers and job vacancies by using which of the application? and scheduling applications Knowledge management None of the Above B
Confidentiality,Integr
________,___________,__________ are commonly referred to as CIA in information security Confidentiality,Integri Confidentiality,Integrit Confidentiality,Integrity ation and
162 parlance. ty and Availability y and Authentication and Access rights Authentication A
___________provides information about updation of project cost based on time spent by employees on Performance HR management
163 various projects. management system system Payroll Timesheet application D
Capture the Key Prepare summary or
Performance Employee designation Automated alerts for bell curve analysis of
164 Which of the follwing is not a/an functionality provided by PMS? Indicators and reporting structure pending appraisals all employees B
___________automates the calculation of salary for taking inputs from the timesheet application, leaves HR management Knowledge
165 from Leave Management System and salary details from the HR master data. Timesheet System System Payroll System management System C

Reduce administrative Error free capture of


166 Which of the follwing is not a control in Leave Management System? burden on HR Excess leave leave details Approval workflow C
167 Permanent Audit File are obtained once but updated on __________basis. half-yearly yearly monthy quarterly B

Copies of clients’ Copies of important


Client’s accounting incorporation documents contracts or long term
168 In Permanent Audit file, _______ is not the key data documented. Organization chart manual like MoC lease agreements C

169 ________is a type of training in which user logon on the training server with a user ID and password. Internal Training E-Learning Classroom Training E-Training B
In some cases, trainee is supposed to appear for the examination/test at the end of the training
170 is____________. Classroom Training E-Learning Virtual Learning All the Above B
171 ________ are the hardware/infrastructure equipments used in a CA firm. PC Application Server WAN All the Above D
_____________means information available in the organization should not be altered or modified by
172 unauthorized personnel. Confidentiality Integrity Availability Authentication B
173 Which of these is/are the standard email program used in an organization? Microsoft Exchange Lotus Notes Both A and B None of the Above C
Most WANs are Compared to LAN, its Switches are used to
owned by only one transmission speed is WAN uses only private connect LAN and
174 Which of the following is not a characteristics of WAN? organization. low networks. WAN B
175 _________is protection of information assets from threats to preserve their value. Confidentiality Integrity Information Security None of the above C
176 Which types of information assets need to be secured in a CA Office? Client data Own data Own documents All the above D
177 The extent and level of _________ would depend on the nature of information. Availability Confidentiality Integrity Authentication B

178 __________ of information might be affected due to denial of service attack or some other reasons. Integrity Authentication Confidentiality Availability D
__________means the sender cannot deny having sent a message and receiver cannot deny receiving the
179 message. Non-Repudiation Integrity Authentication Confidentiality A
180 Risk may not be _______ in nature. reputational financial operational vulnerable D
The process of identifying an individual, usually based on user id and password in an organization is
181 called______________. Availability Authentication Confidentiality Integrity B
Resource allocation
182 Which of the following is not a software equipment required in a CA's office? and scheduling Client management HR and Payroll None of the Above D
183 Which of the following is not an application arranged by ICAI? ICAI-XBRL suite K-DOC Billing and Accounting ICAI-TOC D
Private Exchange Public Exchange Private Branch Public Branch
184 PBX stands for ________ Branch Branch exchange exchange C
Monte Carlo Personal Finance
185 ________ is the process of meeting the financial goals through the proper management of finances. Corporate planning simulation Financial planning planning C
___________ can be defined as the process of setting the procedures in the organization for achieving Monte Carlo Corporate Planning &
186 the predefined goals. Simulation Corporate Planning Decision Tree Analysis Analysis B
________ shows ability of company to pay back long term loans along with interest or other charges
187 from generation of profit from its operations. Debt Assets Ratio Interest Coverage Ratio Total Fund Ration None of the above B
_____________________is the simplest method of comparing different stocks at a point of time to
188 make investment decisions. Earnings Per share Fixed Asset Over ratio Price Earnings Multiple Gross Profit Ratio C
<?xml version="3.0" <?xml version="2.0" <?xml version="1.0" <?xml version="0.0"
encoding="ISO-8859- encoding="ISO-8859- encoding="ISO-8859- encoding="ISO-8859-
189 The very first line of code of XML file is_____________. 1"?> 1"?> 1"?> 1"?> C
<TagName>Data</Ta </TagName>Data<Tag </TagName>Data</Tag <TagName>Data<Ta
190 Every bit of data has to start and end with an identical tag gName> Name> Name> gName> A
Directally Delete
191 Deletion of XML Map is done through __________. Command Delete Button XML Maps Dialog Box None of the above C
192 Excel works primarily with ________ types of XML files. 3 2 1 4 B
193 Method of tax calculations shall change according to _________. Annual Income DOB status of assess All of the above. D
________ is a process used in statistical analysis in which a predetermined number of observations will Simple random
194 be taken from a larger population. Snowball sampling Sampling Systematic sampling sampling B
Simple random
195 In __________, Individuals are selected at regular intervals from a list of the whole population. Clustered sampling Sampling Systematic sampling sampling C
In ______________ each individual is chosen entirely by chance and each member of the population Simple random
196 has an equal chance, or probability, of being selected. Snowball sampling Convenience sampling Systematic sampling sampling D
Simple random
197 Which method is commonly used in social sciences when investigating hard to reach groups? Quota Sampling Sampling Snowball sampling sampling C

198 __________ are useful for quick reading and easy understanding, particularly for top management. Balance sheet Summary reports IRR NPV B
199 Popular methods of capital budgeting include _________ and payback period. discounted cash flow internal rate of return net present value All the above D
200 _________ is the value of all future cash inflows less future cash outflows as on today. Net present value Working capital IRR PMT A
___________is the process of defining and analyzing the dangers to individuals, businesses and
201 government agencies posed by potential natural and human-caused adverse events. Sensitivity analysis Risk analysis Qualitative risk analysis Scenario analysis B

202 __________ which is used more often, does not involve numerical probabilities or predictions of loss. Sensitivity analysis Risk analysis Qualitative risk analysis Scenario analysis C
________ are generally used to present information in a simple and better way and also be used to
203 analyse the risk in a better way. Graphs Sparklines Both A& B Charts D
It is a technique used to determine how different values of an independent variable will impact a
204 particular dependent variable under a given set of assumptions. Decision Tree analysis Sensitivity analysis Both A& B Neither A &B B
_______ involves computing different reinvestment rates for expected returns that are reinvested during
205 the investment horizon. Scenario analysis Sensitivity analysis Decision Tree Analysis None A
206 Which function that is used to calculate the payment for specific loan terms ____________ SUMIF() PMT COUNTIF() None of the above B
207 ________helps to break down the Return on Equity Du Point Analysis Return on Investment Profitability Ration None of the above A
208 _______ is a common method for financing property, facilities, and equipment. Mortagage Leasing Rent All the above B
View -> Window ->
209 Which option can be used to split windows into four in ms excel 2010? Format -> Window Window -> Split Split View -> Split B
Settings Tab under the
Settings Tab under the Settings Tab under the tab Data -> Filter -
210 How to restrict the values of a cell so that only a list can be entered in a cell? Tab Format -> Cells tab Data -> Validation >Advanced Filter All of the above B
Counts cells having Counts cells having Counts non-empty
211 What does the COUNTA() function do in MS Excel 2010 ? alphabets Counts empty cells number cells D
If the value in A1 is "ITT" and in B1 is "ICAI ", which function in Excel will return " ITT @ ICAI " in
212 cell C1? A1+ "@" + B1 A1 # "@" # B1 A1 & "@" & B1 A1 $ "@" $ B1 C
ROUNDDOWN(7.499
213 Which of the following function will return a value of 7? ROUNDUP(7.4999,0) 9,0) ROUND(7.4999,0) Only B & C D

214 A tiny chart embedded in a worksheet cell that provides a visual representation of data is a _________ Bar Chart Sparkline Pivot Chart Pie Chart B
_________is a graphical equivalent of a pivot table, which is used to visualise PivotTable report
215 summary data Bar Chart Pivot Chart Sparklines None of the above B
Pagelayout -> Page Pagelayout -> Print Page Setup -> Print
216 To frequently print a specific range of cells on a worksheet , the option used is Setup -> Print Area Area Area Print Area A
217 Non-excel files can be opened in MS Excel using the Add Ins Developer Tab Text Import wizard Analysis Tool Pak C
218 _____is a text concatenation operator. # $ & * C
AVERAGE(A1,B1,C1 AVERAGE(A1:A6,B1:
219 Which of the following is correct? AVERAGE(4,5,6,7) ) B6) All of the above D
220 ___ function in MS-Excel returns the remainder after number is divided by divisor. MOD() INT() DIV() REMAINDER() A
221 EXCEL Work in ________ Mode 3 5 7 11 A
222 In Ms-Excel 2010, ______ is Last Column Name? XWE XFD XAA AAA B
223 In Excel 2010, the default criteria setting for AutoFilter in each field is __________. Top10 Bottom10 Top half All D
224 Subtotal option is in __________ group of Data tab in Excel 2010. Sort & Filter Outline Data Tools Calculation B

225 Which of the following cannot store connection information of an external data source in Excel 2010? Workbook .odc file .htm file .udcx file C
226 The default pivot chart type in Excel 2010 is a ________ chart. Column Line Scatter Bubble A
To consolidate Excel data, ________________________ is used when worksheet data does not have a Consolidation by Consolidation by Consolidation using 3-D
227 consistent layout or pattern. position category formulas Any of the above C
228 In Excel 2010, the __________ function is used to generate a forecast. TREND STANDARDIZE CORREL GROWTH A
______function calculates the payment for a loan (installment) based on constant payments and a
229 constant interest rate. PV NPV IRR PMT D
__________ are easy-to-use filtering components that enable the user to quickly filter the data in a
230 PivotTable report in MS-Excel 2010. Sparklines Slicers Macros Data Forms B
231 In Excel 2010, range C3:C6 indicates _______________. Cells C3 through C6 Cell C3 and Cell C6 Cell C4 and Cell C5 None of the above A
232 Keyboard shortcut to show a shortcut menu in MS Excel 2010 is _______________. Shift + F10 Shift + F1 Shift + F11 Shift + F12 A

233 To select multiple non-adjacent cells in an Excel 2010 worksheet, click them holding _________ key. Ctrl Alt Shift Ctrl + Shift A
A quick way to return to a specific area of a worksheet in Excel 2010 is to type the cell address or range
234 name in the ____________. Name Box Formula Bar Zoom Box Sheet Tab A
Name of the cell or
Name of the workbook Name of the worksheet range currently working Formula in the cell
235 In MS-Excel 2010, the Name Box shows the ________________________. currently working on currently working on on currently working on C
In Excel 2010, what is represented by the small black square in the lower-right corner of an active cell or
236 range? Copy handle Fill handle Insert handle Border B
Suppose we accidentally erased a record in an Excel worksheet. Which command can be used to restore
237 it immediately? Insert Replace Paste Undo D
238 Excel 2010 offers up to____________sort levels. 32 64 60 80 B

239 Which feature in Excel 2010 enables us to find the input values needed to achieve a goal or objective? Goal Seek Consolidate Data Validation Subtotal A
Rounds a number
Rounds a number to a down to the nearest
240 The INT function________ desired multiple integer Rounds a number up Calculates interest B

A scenario is a set of Scenarios provide a way Scenarios help to


values saved with the A workbook can have to see different solutions perform what-if
241 Which of the following statements about scenarios is not true? workbook. one scenario per sheet. for worksheet formulas. analysis. B
A formatted
description of each A formatted defined A worksheet with a A worksheet with
scenario on a separaterange of Solver and separate thumbnail for separate macros for
242 What is a scenario summary report? worksheet Goal Seek solutions each formula each scenario A
243 What does Solver uses in its dialog box? Arguments Limitations Constraints Parameters D
244 What term describes a feature that gives Excel enhanced capability? Trendlining Enhancement bit Thumbnail Add-in D
245 What dialog box allows you to change a field name in a PivotTable? Field Options Field Pane Field Settings Field Structure C
They allow you to They allow you to They allow you to
They allow you to add rearrange row and generate e-mail enabled print the reports with
246 Why are PivotTables considered interactive? dynamic data. column data. reports. various settings. B

Absence of input Lack of visible Accessibility of data and


247 Identify the need for controls and auditing in a computerised environment. documents transaction trail computer programs All of the above D
248 Grand totals calculated for any code on a document in the batch are called….. Financial totals Record totals Document totals Hash totals D
Control that checks if correct sequence of commands and update parameters are passed from the
249 application software to the database. Table level Data Integrity Batch check System test B
With respect to data integrity control, when monetary transactions are processed against master files
250 without a match, we should maintain a …. Sequence account Data account Suspense account Update account C
The system test that tests the top-level modules first and then the lower modules are simulated with
251 dummy modules to check the interfaces is called …. Bottom up test Hybrid test Stub test Top down test D
252 Identify the audit technique that examines each transaction as it passes through the system. Embedded code Program code Database Analyzers Database code A
Database with master Executable program Transaction data with Module programs
253 The Core Image Comparison audit technique compares the…. table with master copy master transaction with snapshots B
254 The technique used by an auditor to list unused program instructions is….. Modelling Analyzing Mapping Tracing C
255 The sample data created and used for the purpose of testing the application system is called…. Test data Table data Item data Record data A
The test data (dummy unit) implemented in the normal processing of the system over a period of time is Integrated Test
256 known as…. Facility Black box Test Facility Graph testing Whitebox testing A
The test data generated with correctness proof, data flow analysis and control flow analysis tools is
257 called…. Test item block Test data pack Test program pack Test record pack B
258 The organisational, management, maintenance and access controls are categories of …… Application controls General controls Check controls Input controls B
When a real-time system is simulated to generate the same output as the real-time system, the technique
259 is called…. Parallel trailing Tracing parallel Parallel coding Parallel simulation D
When an auditor expands the extent of substantive tests to determine the impact of defects on the Formulate flaw Formulate correct
260 attainment of program objectives, the methodology is…. Cross reference lister hypotheses Correct lister hypotheses B
261 This is an important control in systems that use digital signatures for authentication purposes. Public audit trails Random audit trails Sample audit trails Data audit trails A
Demographic
262 Selecting transactions based on a sampling rate is called …. method. Transaction sampling Systematic sampling Simple sampling sampling B
The capability of the generalized audit software to read different data coding schemes, different record
263 formats and different file structures is…. File size File data File access File reorganisation C
Classify data on a
264 The audit software capability of frequency analysis is to…. Sort and merge files Sampling nth item Formatting output criteria D
The audit functions of attributes sampling, variables sampling, stratified sampling are included in ….
265 functions. Stratification Selection Statistical Reporting C
Limited ability to Limited ability to
Identify the functional limitation of a generalized audit software that enables evidence collection only on determine Propensity for Verify Processing
266 the state of an application system after the fact. Ex Post Auditing Only Analytical review only Error logic A
Reading data, selecting Specific tasks with
Sorting, creating, and Data retrieval, code and analyzing original or modified
267 The purpose-written audit programs are used for….. printing files comparison information programs D
268 Picture of a transaction as it flows through the computer systems is called….. Program Track Snapshot Picture C
269 The application controls are …. Input controls Processing controls Both A and B Neither A nor B C
270 Identify the type of audit when auditors are members of the systems development team. General audit Post audit System audit Concurrent audit D

271 Identify the field check - "If a set of values is defined, is the input data one of these defined values?" List Range Slab Digit C
272 The field check that conforms if data input for a field is in a particular format. Format mask Data mask Field mask Input mask A
The field check on a processed data that fails if a field is not initialized to zero or errors occur during
273 calculation is…… Range Sign Overflow Serial C
The validation checks applied to a field depending on its logical interrelationships with the other fields
274 in the record are called ….. Field checks Record checks Batch checks File checks B
275 A group of records or transactions that are contiguous constitute ….. Physical batches Logical batches Block batches Transact batches A

276 …………..is the type of batch check (group of records) for all input records of a particular type is done. Control totals Serial number Transaction type Sequence check C
277 DB2 is an example of __________ ODBMS RDBMS DBMS None C
278 ____________is used to Modify/Change Data in Table Update Query Process Query Insert Query None A
279 MS-Access is _________________ DBMS RDBMS ODBMS None A
280 Which of the following is not a data type in MS-Access? Number Character Memo Date B
281 To make changes in MS-Access form should be opened in __________________ Form view Form Design Change Form None B
282 _______layout of a form displays one record at a time Tabular columnar Datasheet None B
Data manipulation Data mathematical
283 In SQL, DML stands for _________ language language both a and b None A
284 To see more than one record at a time in a form we use _______ Tabular columnar both a and b None A
285 The default query invoked by ms-access is Update Query Select Query Delete Query None B
286 __________ software serves as the Intermediary between the user and the database DATABASE DBMS O.S None B
287 Distributed database have now come to know as a __________ database Client data base Server data base Client-Server database None C
Data Definition
288 DDL Stands for -. Data Design Language Define Data Language Language None C
289 In DBMS, view level data abstraction is known as __________ Internal Schema Conceptual Schema External Schema None C
Increase data
290 In DBMS, Normalization concept responsible for _______________ duplication Reduce Redundancy Increase Efficiency All B

291 one 2 one, one 2 many and many 2 many Relationship exist in _________ model Hierachical FLAT FILE SYSTEM Relational model None C
292 Record is also known as ________ in a Relational data base Attribute Entity Tuple None C
293 ____________ is extention of ACCESS DATABASE .mdb .dbf .accdb None C
294 Default length of numeric data type is ____________ 255 char 16 chra text long Integer D
enter a value
295 Default value option in field property use for ________ automatically for checking for validation check None A
296 Value of Report Header exist on ___________ page of report every first last None B
297 __________ is an action or set of actions that you can use to automate tasks program check macro All C
298 SQL is a _________ Language Programming Non-Procedural Application None B
299 Which one is the Second Level of Data Abstraction? Physical level Logical Level View Level None B
300 Memo data type store _________ number of characters. 256 1000 16536 63999 D
301 __________ data type field can't be updated YES/NO HYPERLINK MEMO AUTONUMBER D
302 A Record is also commonly called as a _________ column field tuple None C
303 Most database operations that we do manually can be automated by using Program query form macro D
304 _________ are what we use to summarize and present data in the table Report Query Form Macro A
305 A database tabel is similar in appearance to a _______ MS-WORD Excel/spreadsheet Powerpoint None B
306 SQL is considered to be a _______ 3 GL 4GL 5GL None B
307 SQL is considered to as an ideal Language for _______ Java Internet Database Visual Basic C
308 DBMS that supports a database located at a single site is called a _____ Multiuser DBMS Distributed DBMS Centralized DBMS Database C

309 DBMS that supports a database distributed across several different site is called a _____ Client-Server database Distributed DBMS Multiuser DBMS Centralized DBMS B
310 The _________key does not accept Duplicate and Null values in Field. key field Primary key Reference Key None B
311 ______ is often implemented as an array of records Record Tuple Tabel Attribute B
312 In MS-Access 2010,the ________ control in the form lets the user insert a picture into it. Title Logo Picture Graphic B
Which query should be used to retrieve the following information from table of databases "Which
313 employees earn more than Rs.30,000 a month?" Search Query Make Table Query Aggregate Query Select Query D
View, change and
analyze data in A source of records for
314 Queries in MS-Access 2010 can be used as ________________________. different ways forms and reports Both A and B Neither A nor B C
It is a Data Entry
Screen to make
It is a printed page viewing, entering and It is a part of database
where users will enter editing data in the used by the analysts to
315 What is a form in MS-Access? data database table draw conclusions None of the above B
316 Which of the following degree of relationship cannot be applied in MS-Access 2010? One-to-One One-to-Many Many-to-Many Many-to-One D
In an ER model, a/an ___________ is any object, place, person, event or concept about which an
317 enterprise records data. Entity Attribute Relationship None of the above A
318 The process of arranging data in a logical sequence is called ____________. Classifying Filtering Sorting Summarizing C
Changing the data at
one place only will
Storage space is cause data It can be more easily
319 If some chunk of data is stored at two places in a database, then ___________. wasted inconsistency accessed Both A and B D
320 In MS-Access, what data type can be used for a phone number field in a database? Number Text Memo Any of the above B
321 E-R Diagram is ________________ Model. Conceptual Model Structural Model Object Model Interface A
322 Which of the following can be a primary key in an employee database? Employee Code Employee Name Date of Birth Joining Date A
323 Which of the following is a Database Management System? Java Oracle Lotus 1-2-3 MS-Outlook B
324 Which of the following is not a data type in MS-Access 2010? Memo Yes/No Image AutoNumber C
325 Which of the following is a New data type in MS-Access 2010? Memo Yes/No Calculated Field AutoNumber C
In MS-Access 2010, __________ queries are best suitable to summarize information and looking for
326 trends. Crosstab Parameter Action None of the above A

327 Which of the following is not a section in Report Design view in MS-Access 2010? Report Header Section Page Header Section Detail Section Summary Section D
328 Which of the following is not an action query in MS-Access 2010? Select Delete Make Table Update A
329 In MS-Access 2010, which data type is best suitable for storing the price of a commodity? Text Number Currency AutoNumber C
In MS-Access 2010, which of the following data type creates a field that allows the user to choose a
330 value from another table or from a list of values by using a list box or combo box? OLE Object Memo Hyperlink Lookup Wizard D
331 In a table, _____________ uniquely identifies each record that is stored in the table. Unique Key Foreign Key Primary Key Record Key C
332 _________ is used to insert values in Table directly. Query Report Form None A
Authorizing access and
Changing the structure Creating views and other control over Inserting, updating or
333 DCL provides commands to perform actions like _________. of tables indexes database deleting records C
A database _______ presents summarized information retrieved from a table in a preformatted, attractive
334 manner. Form Query Macro Report D
In MS-Access 2010, which type of query extracts the data from one or more existing tables and puts
335 them into separate table? Parameter query Update query Crosstab query Make Table query D
In an MS-Access report, in which section we can keep the count[Sales] to calculate the total sales for In the Report Header In the Report Footer In the Page Footer In the Month Group
336 each month? Section Section Section Footer Section D
Selecting the
underlying table or Reading several screens
Selecting the fields query on which we of mostly useless Selecting how the
What is the first step in creating a form or report using the Form Wizard or the Report Wizard in MS- that we want to appear want to base the form information and clicking form or report should
337 Access 2010? in the form or report or report next be formatted B
Data integrity and Reduced application
338 Which of the following is not an advantage of using a DBMS? Data independence security Decentralized data development time C
Table Analyzer Database Analyzer
339 ___________ provides in Access 2010 is used to convert database tables to the normalized form. Wizard Wizard Form Analyzer Wizard None of the above A
340 Which Ribbon command tab includes the Table Analyzer Wizard in MS Access 2010 ? Create External Data Home Database Tools D
341 A Junction Table creates a _______________ relationship between two tables. One-to-One One-to-Many Many-to-Many None of the above C

342 The Primary key of one table and the matching column in another table is known as ______________. Matching Key Foreign Key Index key None of the above B
specifying conditions
343 In SQL, having clause is used for _________ For ordering records with group by clause updating records None B
344 To compact the database in MS Access 2010, the database must be opened in the ___________. Inclusive Mode Exclusive Mode Normal Mode Save Mode B
In MS Access 2010,_________ help protect a database from system failures and against mistakes that
345 the Undo command cannot fix. Backups Save Database Save As Databse None of the above A

346 Improving the performance of a database in MS Access 2010 used______________ tool. Performance Analyzer Hi-tech Analyzer Online Analyzer None of the above A
The _________ can be used to create reports on database objects for planning and modifying database Query & Report
347 design. Table Documenter Database Documenter Documenter None of the above B
User and Group User-level Security User and Group
348 Use _____________ to grant or revoke permissions or to change the owner of database objects. Accounts Wizard Permissions None of the above C
_____________ commands are used to enforce database security in a multiple user database
349 environment. Security Grant and revoke Select Create B
350 Which SQL clause is used to retrieve data from database? SELECT WHERE FROM INSERT A
351 The __________clause is used to filter records in database. SELECT WHERE FROM INSERT B
Controlling/Accessing
352 DCL(Data Control Language) used for Entering Data Defining Data Data All C
353 __________is Example of DBMS Word Excel Access None C
Recruitment
354 What are the features of the Payroll Software provide by the ICAI. Management salary Process Time & attendance All of the above D
Previous years pending
355 Which are the transaction supported by the Billing and Accounting software ? Billing bills Cash receipt All of the above D
Contact Management Template Management
356 The software provide creating,printing and sending bulk individual mail is_______________________. eSecretary software software software All of the above A
To cut & paste the
completed and old
357 The feature Archive is available in K-DOC application for the purpose of____________. To create new file To save file document. None of the above C
Employee Information Portal feature in Payroll Application provide employee to view PF No,online
358 their________________. Personal profile PAN Number submission of loan etc All of the above D
Generation of forms as
per formats and Maintain Minutes
359 Which is not a feature of ICAI-ROC application ? requirement of MCA Book Calculate the filing fee Bank Receipt D
Salar paid by
360 The Payroll application supports three methods of salary disbursement are________________. Salary Paid in Cash Cheque/DD Salary credited to Bank All of the above D
Export Journal
361 Which Tools and Utilities is not supported by Payroll Application ? MIS Voucher TCS Backup utilities C
The software provide the facility to generate bills,receipts,vouchers and clients outstanding etc Billing & Accounting ICAI-ROC
362 is______________. softwatre Payroll Software K-DOC application application A

A software which provide the structured file management and knowledge mamnagement ICAI-File management Knowledge
363 is_____________________. application K-DOC application Management Software None of the above B
The software provides a complete package to manage secretarial requirements & generates forms as per Billing & Accounting ICAI-ROC
364 MCA21 requirements softwatre Payroll Software K-DOC application application D
Shares
365 The ICAI-ROC provides the facility to prepare________________. Auto filing of eForms Records/Certificates Annual Returs forms All of the above D
The software which provide the Contact Management,Correspondence Management, simplified Contact Management Template Management
366 Mail/Email etc. eSecretary software software software All of the above A
367 Correspondence feature of eSecretary application provide facilities are______________. Templates Blank document Outside document All of the above D
Contact Management Template Management
368 To create New Contact and access Contact features are available in which application ? eSecretary software software software All of the above A
_____________________ is comprehensive package that combines Income Tax,Service Tax,e-TDS.e-
369 AIR etc. Tax Application K-DOC application Tax Suite Application All of the above C
Collected and Grouped and
370 The financial transactions are to be …………. leading to different steps in Accounts Compilation. computed Sampled and stratified summarized Assets and liability C
371 The methods LIFO, FIFO, Moving Average are used to …. Value closing stock Value clearing stock Value expense stock Value income stock A
372 The report prepared taking the asset and liability type accounts from the Trial Balance is called…. P & L statement Income statement Balance sheet Asset sheet C
373 The report that depicts operating profit/loss for a period is ….. Trial balance Trading account P & L statement Suspense accounts C

374 The day book contains transactions relating to ……… Income or expenditure Sales or purchase Asset or liability Profit or loss B
375 The Bills Receivable details are maintained in a …….. Journal sheet Voucher debtors Sundry debtors Original entry C
376 Creditors ledger has details of your dues to …….. Customers Assets Liabilities Suppliers D
377 The sundry debtors are placed in the Balance sheet on the …… Income side Assets side Expense side Payable side B
378 The first step in Tally before any transaction is entered or saved is creating a ……… File Company Project Application B
379 To configure country specific details use the function key…… F10 F2 F12 F11 C
380 Identify the security mechanism used in Tally. Tally Secure Tally Pack Tally Group Tally Vault D
381 The basic document where transactions are entered chronologically is…. Ledger Journal Voucher Trial Balance B
382 After selecting a company in Tally, you will be in the…… Accounts of Tally Gateway of Tally Entry of Tally Groups of Tally B
383 Tally software is based on ……… accounting system. Sales Production Mercantile Manufacture C

384 Identify the primary group of capital nature that uses bank account and cash in hand as sub groups. Fixed assets Current assets Loan assets Capital assets B
385 All financial entries in Tally are done using……. Vouchers Groups Journal Ledgers D
386 The Direct expenses, Purchase account, Direct income are primary groups of ….. Capital nature Expense nature Revenue nature Income nature C
387 The option to delete a sub-group is admissible through the menu…… Alter Delete Display Shift A
388 The behavioural attributes of this group cannot be changed. Sub-group Ledger-group Primary-group Alter-group C
389 Credit limits for personal accounts and branches can be done in the ledger mode…… Single Multiple Sub-group Alter-group B
390 We are not allowed to delete a ledger from this mode. Single Sub-group Alter-group Multiple D

391 All account heads except Cash and Bank are placed in the…… Sub Ledger master Group Ledger master General Ledger master Journal Ledger master C
P & L Account and P & L Account and Voucher Account and
392 These are the basis for analysis by potential investors, banks etc. Journal and Ledger Journal Balance Sheet Balance Sheet C
Identify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank OCC
393 Account. Expenses Income Assets Loans D
394 The primary document for recording all financial transactions in Tally is the…… Journal Trial sheet Voucher File C
395 You can customize the voucher entry screen using the function key……. F13 F12 F10 F11 B
396 Identify the voucher type that records fund transfers between cash and bank accounts. Credit Note Payment Receipt Contra D
397 This voucher type records adjustments between ledgers. Sales Receipt Payment Journals D
398 The use of classes for payment, receipt and contra vouchers enables data input in …… Double entry mode List entry mode Choice entry mode File entry mode B
399 The details of a voucher entry can be given in the ……. Comment Memo File Narration D
Sales account, Sales Ledger account, Bank Suppliers account, Buyer's account, Cash
400 The credit note voucher can hold account types: …….. tax account account Purchases account account A
401 The suffix and prefix details for the voucher type can be made applicable only from the ……. End of a month First of a year First of a month End of a month C
402 The voucher used to record all bank and cash payments is ….. Credit Note Contra Sales Note Payment D
403 The accounts that the business owns is called …. Liability Income Sales Asset D
404 Tally's age-wise analysis considers the voucher's …… Previous date Effective date Current year Configured date B
Arrange the steps in generating the books of accounts.
1. Create Trial balance
2. Create new ledgers
3. Generate Day Books
405 4. Update journals for financial transactions 1, 2, 3, 4 1, 3, 4, 2 2, 4, 3, 1 3, 4, 2, 1 C
406 For day-to-day transactions the voucher types used are Credit purchase Cash purchase Both A and B Contra purchase C
Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be entered into the
407 voucher type….. Loan Payment Receipt Sales B

408 Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10 monitors by credit. Credit Purchases Cash Purchases Expense Purchases Debit Purchases A
Identify the voucher type to be chosen for the sale of computers to Anand by cash @ Rs.210000 per
409 unit. Cash Ledger Sale Sheet Stock Journal Purchase Voucher C
410 A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher….. Payment Receipt Debit Contra D
Profit & Loss
411 The financial statement that consolidates ledger balances is ….. Balance sheet statement Trial balance Journal C
412 The F9 function key in the left side of the Gateway of Tally screen displays the…… Accounting reports Inventory reports P & L reports Expense reports B
413 The option on the Gateway of Tally that will generate the P&L account statement is….. Net Loss Net Income Net Profit Net Account C
414 The expenditure for running the business for a period is ….. Expense Example Taxes Income A
415 This displays the balance daywise for a selected voucher type. Record book Ledger book Journal book Day book D
416 The feature in Tally to analyze accounts of a company is….. Ratio analysis Account analysis Data analysis Transaction analysis A
417 The age-wise statement is displayed based on…… Income Payables Expenses Loans B
418 The ratio analysis of receivables can be done based on…… Bill date Effective date Voucher date Previous date A
419 Name the statement that helps the management in the decision making process. Data flow Funds flow Stock flow Cheque flow B
420 Identify the budget type which is chosen where transaction amounts are to be monitored. On closing balance On net credit flow On net transactions On net cash flow C
421 Choose the budget type to be used where bank accounts balances are to be monitored. On closing balance On net credit flow On net transactions On net cash flow A

422 The management that needs to consolidate the accounts of its various enterprises uses ……. in Tally. Consolidate company Group company Set company Alter company B
423 Identify the user who can access audit trails in Tally. Owner Data Entry operator Accountant Administrator D
Yearly-entry Transaction-number
424 Identify the accounting feature in tally that facilitates splitting financial years for a company data. Month-less accounting accounting Period-less accounting accounting C
425 Identify the account type by the rule: "Debit the receiver and credit the giver". Real accounts Personal accounts Nominal accounts Expense accounts B
426 The tracking of changes in vouchers and ledger masters is done by….. Tally Vault Tally Audit Tally Report Tally Group B
427 Tally can import data from other programs and creates a log about the activity in the file….. Tally.imp Tally.cfg Tally.exp Tally.ole A
428 Import and export of data between Tally and other programs is possible with the help of….. OLE DBMS ODBC MS-XLS C
429 The manual option of voucher numbering leads to….. Auto numbers Duplicate number Sequence number Range number B

430 The Tally audit trail tracks changes made to vouchers that are ….. more than 30 Days old less than 30 Days old more than a day old more than a week old A
431 The ratio analysis of Bills Receivables or Bills Payables can be displayed with the function key….. F5 F8 F12 F6 D
The test data generated with correctness proof, data flow analysis and control flow analysis tools is
432 called…. Test item block Test data pack Test program pack Test record pack B
When a real-time system is simulated to generate the same output as the real-time system, the technique
433 is called…. Parallel trailing Tracing parallel Parallel coding Parallel simulation D
When an auditor expands the extent of substantive tests to determine the impact of defects on the Formulate flaw Formulate correct
434 attainment of program objectives, the methodology is…. Cross reference lister hypotheses Correct lister hypotheses B
435 This is an important control in systems that use digital signatures for authentication purposes. Public audit trails Random audit trails Sample audit trails Data audit trails A
436 The first document where the transaction is entered is called a ….. Ledger Liability Voucher Expense C
Demographic
437 Selecting transactions based on a sampling rate is called …. method. Transaction sampling Systematic sampling Simple sampling sampling B
The capability of the generalized audit software to read different data coding schemes, different record
438 formats and different file structures is…. File size File data File access File reorganisation C
Classify data on a
439 The audit software capability of frequency analysis is to…. Sort and merge files Sampling nth item Formatting output criteria D
The audit functions of attributes sampling, variables sampling, stratified sampling are included in ….
440 functions. Stratification Selection Statistical Reporting C
Limited ability to Limited ability to
Identify the functional limitation of a generalized audit software that enables evidence collection only on determine Propensity for Verify Processing
441 the state of an application system after the fact. Ex Post Auditing Only Analytical review only Error logic A
Reading data, selecting Specific tasks with
Sorting, creating, and Data retrieval, code and analyzing original or modified
442 The purpose-written audit programs are used for….. printing files comparison information programs D
443 Picture of a transaction as it flows through the computer systems is called….. Program Track Snapshot Picture C
444 Identify the type of audit when auditors are members of the systems development team. General audit Post audit System audit Concurrent audit D
Ledger and trial Balance sheet and trial
445 The document used for posting of accounting transactions is …….... Voucher and journal balance balance Journal and ledger D
446 When the debit total is greater than credit total, the amount appears in the …….. column. Income Debit Credit Expense B

You might also like