Computer Science Practice 1 Multiple Choice Questions
Computer Science Practice 1 Multiple Choice Questions
Dr.V.Nagaradjane
Author: Dr.V.Nagaradjane
Contents
1 Javascript 1
1.1 Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Flowcharts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.3 Web servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Features of web servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5 Programming languages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5.1 Compiler based programming languages . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5.2 Interpreter based programming languages . . . . . . . . . . . . . . . . . . . . . . . 4
1.6 Introduction to JavaScript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.7 JavaScript Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.8 JavaScript data types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.9 Special characters in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.10 Strings in JavaScript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.11 Operators in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.12 Math functions in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.13 Control statements in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.14 Loops in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.15 Functions in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.16 Objects in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.17 Array and data objects in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.18 Browser Object Model (BOM) in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.19 Document Object Model (DOM) in Javascript . . . . . . . . . . . . . . . . . . . . . . . . 15
1.19.1 Cookies in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
iii
iv CONTENTS
3 Smart accounting 37
3.1 Basics of accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
3.2 Methods of accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
3.3 Accounting concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
3.4 Golden rules of double entry system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
3.5 Accounting termonologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
3.6 Voucher entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
3.7 Preparation of final accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.8 Cash book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.9 Ratio analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3.10 Depreciation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.11 Stock management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.12 VAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.13 Cash & fund flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.14 Tally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.15 Accounting in Tally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.16 Shortcuts in Tally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
3.17 Double entry system in Tally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.18 Budgeting system in Tally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.19 Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.20 Variance & ratio analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.21 Analysis of financial statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.22 Inventory basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.23 POS Invoicing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.24 Taxation in Tally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.25 Languages in Tally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
4 E-Commerce 51
4.1 Introduction to E-Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
4.2 Types of E-Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
4.3 Scope of E-Commerce platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
4.4 Benefits of E-Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
4.5 Capabilities required for E-Commerce platform . . . . . . . . . . . . . . . . . . . . . . . . 52
4.6 Differences between E-Commerce and traditional commerce . . . . . . . . . . . . . . . . . 53
4.7 Types of E-Commerce websites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
4.8 Modes of payment for E-Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.9 Payment gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
4.10 General questions on E-Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Author: Dr.V.Nagaradjane
CONTENTS v
5 Cyber security 59
5.1 Introduction to cyber security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
5.2 Threats to information security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
5.3 Vulnerability and risk management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.4 Directory service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.5 Access control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.6 Software development security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
5.7 Privacy protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
5.8 Information security audit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
5.9 Information Technology (IT) Act . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Author: Dr.V.Nagaradjane
vi CONTENTS
Author: Dr.V.Nagaradjane
Chapter 1
Javascript
1
2 1.3. WEB SERVERS
(d) HTML documents
(b) 2. HTML stands for .
(c) - (a) Higher Text Markup Language
(b) Hyper Text Markup Language
(d)
(c) Hyper Transfer Markup Language
11. symbol in flowchart denotes (d) Hyper Text Manipulation Language
input/ output.
3. HTTP stands for .
(a) (a) Hyper Text Transfer Protocol
(b) Hyper Transmission Transfer Protocol
(c) Hyper Text Transfer Procedure
(b)
(d) Hiker Text Transfer Protocol
@
@
@
4. Port number handles HTTP
(c) @
communications.
(a) 80 (b) 443
(d) (c) 25 (d) 20
12. symbol in flowchart denotes 5. HTTPS stands for .
processing. (a) Hyper Text Transfer Protocol Secure
(a) (b) Hyper Transmission Transfer Protocol Secure
(c) Hyper Text Transfer Procedure Secure
(d) Hiker Text Transfer Protocol Secure
(b)
6. Port number handles HTTPS
communications.
@
@
(c)
@
@ (a) 80 (b) 443
(c) 25 (d) 20
(d) 7. When HTTPS protocol is used, browser
13. symbol in flowchart denotes shows a icon near the address
decision making. bar.
(a) open lock
(a) (b) lock with cross mark (×)
(c) danger icon
(b) (d) green lock
@
@ 8. SSL stands for .
@ (a) Secure Surfing Layer
(c) @
(b) Second Socket Layer
(d) (c) Secure Socket Layer
(d) Secure Socket Link
9. Scripting languages like PHP, Perl,
Answers (2 - 14) Python, ASP.NET, etc., executed by a
web server are called side
1. (b) 2. (a) 3. (b) 4. (d)
scripts.
5. (c) 6. (b) 7. (c) 8. (a) (a) server (b) client
9. (b) 10. (c) 11. (d) 12. (a) (c) way (d) unrelated
13. (c)
10. Scripting languages like Javascript, VB-
Script, etc., executed by a browser are
1.3 Web servers called side scripts.
(a) server (b) client
Web servers send pages in re- (c) way (d) unrelated
1.
sponse to client request. 11. is a popular open source web
(a) Word documents server available free of cost.
(b) LATEX documents (a) Apache
(c) Powerpoint documents (b) Microsoft Internet Information Server
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 3
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 5
Author: Dr.V.Nagaradjane
6 1.8. JAVASCRIPT DATA TYPES
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 7
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 9
Author: Dr.V.Nagaradjane
10 1.12. MATH FUNCTIONS IN JAVASCRIPT
Author: Dr.V.Nagaradjane
12 1.14. LOOPS IN JAVASCRIPT
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 13
Author: Dr.V.Nagaradjane
14 1.16. OBJECTS IN JAVASCRIPT
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 15
Author: Dr.V.Nagaradjane
16 1.19. DOCUMENT OBJECT MODEL (DOM) IN JAVASCRIPT
Author: Dr.V.Nagaradjane
Chapter 2
17
18 2.1. VBA SHORTCUTS
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 19
3. In VBA, the function AscW converts 12. In VBA, CByte function converts String
given character value to numeric code in to type.
system. (a) number (b) byte
(a) American Standard Code for Information Inter- (c) Currency (d) Decimal
change (ASCII) 13. In VBA, CCur function converts String
(b) Double Byte Character Set (DBCS) to type.
(c) Unicode (a) number (b) byte
(d) none of them (c) Currency (d) Decimal
4. In VBA, the function Chr converts given 14. In VBA, CLng function converts String
numeric value to character value in to type.
system. (a) Long (b) byte
(a) American Standard Code for Information Inter- (c) Currency (d) Decimal
change (ASCII)
(b) Double Byte Character Set (DBCS) 15. In VBA, CDec function converts String
to type.
(c) Unicode (a) number (b) byte
(d) none of them (c) Currency (d) Decimal
5. In VBA, the function ChrB converts
16. function in VBA creates a cus-
given numeric value to character value in
tom error message.
system. (a) Format (b) CVErr
(a) American Standard Code for Information Inter-
(c) InputBox (d) MsgBox
change (ASCII)
(b) Double Byte Character Set (DBCS) 17. function in VBA formats a num-
(c) Unicode ber according to given text strings con-
(d) none of them taining 0, # and comma (,).
(a) Format (b) CVErr
6. In VBA, the function ChrW converts
(c) InputBox (d) MsgBox
given numeric value to character value in
system. 18. function in VBA displays a mes-
(a) American Standard Code for Information Inter- sage.
change (ASCII) (a) Format (b) CVErr
(b) Double Byte Character Set (DBCS) (c) InputBox (d) MsgBox
(c) Unicode System 19. function in VBA displays an in-
(d) none of them put box.
7. In VBA, Cstr function converts any data (a) Format (b) CVErr
to type. (c) InputBox (d) MsgBox
(a) Integer (b) Double
(c) Single (d) String
CDbl function converts String to
Answers (261 - 279)
8.
type. 1. (a) 2. (b) 3. (c) 4. (a)
(a) Integer (b) Double
5. (b) 6. (c) 7. (d) 8. (b)
(c) Single (d) String
9. (a) 10. (c) 11. (a) 12. (b)
9. In VBA, CInt function converts String to 13. (c) 14. (a) 15. (d) 16. (b)
type. 17. (a) 18. (d) 19. (c)
(a) Integer (b) Double
(c) Single (d) String
10. In VBA, Csng function converts String 2.3 Data types in VBA
to type.
(a) Integer (b) Double 1. data type in VBA stores true or
(c) Single (d) String false values.
11. In VBA, Val function converts String to (a) Boolean (b) Integer
type. (c) Byte (d) Long
(a) number (b) byte 2. Boolean data type in VBA has size of
(c) Currency (d) Decimal .
Author: Dr.V.Nagaradjane
20 2.3. DATA TYPES IN VBA
(a) 1 byte (b) 2 bytes 12. Double data type in VBA can store values
(c) 3 bytes (d) 4 bytes in the range of .
3. Byte data type in VBA has size of (a) ±1.79769313486232E308 to
. ±4.94065645841247E324
(a) 1 byte (b) 2 bytes (b) -32,768 to +32,767
(c) 3 bytes (d) 4 bytes (c) -2,147,483,648 to +2,147,483,647
(d) ±3.402823E38 to ±1.401298E45
4. Byte in VBA can store values in the range
of . 13. Integer data type in VBA has size of
(a) 0 to 255 .
(b) -922,337,203,685,477.5808 to +- (a) 14 bytes (b) 8 bytes
922,337,203,685,477.5807 (c) 4 bytes (d) 2 bytes
(c) 01-Jan-100 to 31-Dec-9999 14. Integer data type in VBA can store values
(d) ±79, 228, 162, 514, 264, 337, 593, 543, 950, 335 in the range of .
or ±7.9228162514264337593543950335 (a) ±1.79769313486232E308 to
5. Currency data type in VBA has size of ±4.94065645841247E324
. (b) -32,768 to +32,767
(a) 2 bytes (b) 3 bytes (c) -2,147,483,648 to +2,147,483,647
(c) 4 bytes (d) 8 bytes (d) ±3.402823E38 to ±1.401298E45
6. Currency data type in VBA can store val- 15. Long data type in VBA has size of
ues in the range of . .
(a) 0 to 255 (a) 14 bytes (b) 8 bytes
(b) -922,337,203,685,477.5808 to +- (c) 4 bytes (d) 2 bytes
922,337,203,685,477.5807 16. Long data type in VBA can store values
(c) 01-Jan-100 to 31-Dec-9999
in the range of .
(d) ±79, 228, 162, 514, 264, 337, 593, 543, 950, 335 (a) ±1.79769313486232E308 to
or ±7.9228162514264337593543950335 ±4.94065645841247E324
7. Date data type in VBA has size of (b) -32,768 to +32,767
. (c) -2,147,483,648 to +2,147,483,647
(a) 2 bytes (b) 3 bytes
(d) ±3.402823E38 to ±1.401298E45
(c) 4 bytes (d) 8 bytes
17. Single data type in VBA has size of
8. Date data type in VBA can store values
.
in the range of . (a) 14 bytes (b) 8 bytes
(a) 0 to 255 (c) 4 bytes (d) 2 bytes
(b) -922,337,203,685,477.5808 to +-
922,337,203,685,477.5807 18. Single data type in VBA can store values
(c) 01-Jan-100 to 31-Dec-9999 in the range of .
(d) ±79, 228, 162, 514, 264, 337, 593, 543, 950, 335 (a) ±1.79769313486232E308 to
or ±7.9228162514264337593543950335 ±4.94065645841247E324
(b) -32,768 to +32,767
9. Decimal data type in VBA has size of
(c) -2,147,483,648 to +2,147,483,647
.
(a) 14 bytes (b) 8 bytes (d) ±3.402823E38 to ±1.401298E45
(c) 4 bytes (d) 2 bytes 19. Object data type in VBA has size of
10. Decimal data type in VBA can store val- .
(a) 14 bytes (b) 8 bytes
ues in the range of .
(a) 0 to 255 (c) 4 bytes (d) 2 bytes
(b) -922,337,203,685,477.5808 to +- 20. String data type in VBA has size of
922,337,203,685,477.5807 .
(c) 01-Jan-100 to 31-Dec-9999 (a) 14 bytes
(d) ±79, 228, 162, 514, 264, 337, 593, 543, 950, 335 (b) 10+length of string bytes
or ±7.9228162514264337593543950335 (c) 4 bytes
11. Double data type in VBA has size of (d) 2 bytes
. 21. String data type in VBA can store a max-
(a) 14 bytes (b) 8 bytes
imum of characters.
(c) 4 bytes (d) 2 bytes (a) 65,400
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 21
Author: Dr.V.Nagaradjane
22 2.6. CONCATENATION OPERATORS IN VBA
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 23
Author: Dr.V.Nagaradjane
24 2.9. MATHEMATICAL FUNCTIONS IN VBA
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 25
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 27
4. From the following VBA code, select the (a) ISARRAY (b) FILTER
correct statement from given choices: (c) ERASE (d) none of them
Dim a(1) 14. function in VBA removes all ele-
a(0)=10 ments of an array.
a(1)=20 (a) ISARRAY (b) FILTER
REDIM PRESERVE a(2) (c) ERASE (d) none of them
a(2)=30
(a) declares an array a with 2 elements
(b) assigns 10 and 20 at indices 0 and 1 Answers (403 - 416)
(c) resizes the array to have 3 elements and assigns
30 to array index 2 1. (a) 2. (d) 3. (b) 4. (d)
(d) all of them 5. (b) 6. (b) 7. (c) 8. (a)
A matrix can be represented using a 9. (b) 10. (c) 11. (d) 12. (b)
5.
dimensional array in VBA. 13. (a) 14. (c)
(a) 1 (b) 2
(c) 3 (d) 4
The following VBA statement declares a
2.13 Conditions in VBA
6.
dimensional array.
1. and are the conditional
Dim a(3,4)
statements available in VBA.
(a) 1 (b) 2 (a) IF ... Then and Select Case
(c) 3 (d) 4 (b) For and While
7. keyword in VBA causes previ- (c) Do While and Do Until
ous elements of array to be kept in the (d) none of them
new array. 2. IF condition in VBA ends with
(a) NEW (b) DIM
statement.
(c) PRESERVE (d) NEXT (a) ElseIf (b) End If
8. function in VBA returns the (c) Else (d) Then
smallest index for given array. 3. The line containing IF ends with
(a) LBOUND (b) UBOUND keyword.
(c) SPLIT (d) JOIN (a) ElseIf (b) End If
9. function in VBA returns the (c) Else (d) Then
largest index for given array. 4. Several successive conditions may be
(a) LBOUND (b) UBOUND
checked using statement of IF
(c) SPLIT (d) JOIN
condition.
10. function in VBA divides a string (a) ElseIf (b) End If
into an array at the occurrence of speci- (c) Else (d) Then
fied substring. 5. In case none of the conditions in an IF
(a) LBOUND (b) UBOUND ladder is fulfilled, statements in
(c) SPLIT (d) JOIN block are executed.
11. function in VBA joins elements (a) ElseIf (b) End If
of an array and creates a string with spec- (c) Else (d) Then
ified separator. 6. In the following VBA code, find out the
(a) LBOUND (b) UBOUND possible bug/error:
(c) SPLIT (d) JOIN Dim x as Integer
12. function in VBA returns ele- x=5
ments which fulfill certrain search crite- If x < 5
rion. End If
(a) ISARRAY (b) FILTER (a) End If is missing
(c) ERASE (d) none of them (b) Then keyword is missing at the end of If
13. function in VBA returns true if (c) The condition in If statement is incorrect
the argument is an array. (d) none of them
Author: Dr.V.Nagaradjane
28 2.14. LOOPS IN VBA
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 29
Author: Dr.V.Nagaradjane
30 2.16. INPUT BOX IN VBA
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 31
Author: Dr.V.Nagaradjane
32 2.22. GUI COMPONENTS IN VBA
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 33
Author: Dr.V.Nagaradjane
34 2.25. ACTIVEX DATA OBJECTS IN VBA
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 35
8. After program stops due to error or break- (b) Choosing Run− >Break or pressing Ctrl+Break
point, execution can be moved to the (c) choosing Run− >Reset
start of a line by . (d) none of them
(a) choosing Debug− >Step Into
12. After program stops due to error or
(b) Pressing F8 breakpoint, one can break execution by
(c) both a & b .
(d) neither a nor b (a) choosing Run− >Continue
9. After program stops due to error or break- (b) Choosing Run− >Break or pressing Ctrl+Break
point, execution can be moved to the end (c) choosing Run− >Reset
of a lineby . (d) none of them
(a) choosing Debug− >Step Over 13. After program stops due to error or break-
(b) Pressing Shift+F8 point, one can reset the execution by
(c) both a & b .
(d) neither a nor b (a) choosing Run− >Continue
10. After program stops due to error or break- (b) Choosing Run− >Break or pressing Ctrl+Break
point, line by line execution may be ended (c) choosing Run− >Reset
by . (d) none of them
(a) choosing Debug− >Step Out
(b) Pressing Ctrl+Shift+F8
(c) both a & b Answers (526 - 538)
(d) neither a nor b
1. (c) 2. (c) 3. (c) 4. (b)
11. After program stops due to error or break-
5. (c) 6. (c) 7. (a) 8. (c)
point, one can continue execution by
9. (c) 10. (c) 11. (a) 12. (b)
.
(a) choosing Run− >Continue 13. (c)
Author: Dr.V.Nagaradjane
36 2.26. DEBUGGING TECHNIQUES IN VBA
Author: Dr.V.Nagaradjane
Chapter 3
Smart accounting
37
38 3.3. ACCOUNTING CONCEPT
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 39
Author: Dr.V.Nagaradjane
40 3.7. PREPARATION OF FINAL ACCOUNTS
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 41
Author: Dr.V.Nagaradjane
42 3.10. DEPRECIATION
4. Storing very low reserve stock resulting 3.13 Cash & fund flow
in disruption of production/sale is called
level. 1. Movement of money into and out of a
(a) stock business is called flow.
(b) overstocking (a) stock (b) cash
(c) understocking (c) rate (d) VAT
(d) reorder 2. Inflow and outflow of money in a business
is called flow.
(a) stock (b) cash
Answers (618 - 621) (c) rate (d) VAT
3. Inflow of money the strength of
1. (a) 2. (d) 3. (b) 4. (c)
business.
(a) increases
(b) decreases
3.12 VAT (c) does not affect
(d) none of them
1. VAT stands for in taxation.
(a) Value Added Tax 4. Outflow of money the strength
(b) Value Amount Tax of business.
(a) increases
(c) Visual Added Tax (b) decreases
(d) Value Asset Tax (c) does not affect
2. The difference between sales value and (d) none of them
purchase value of a product is called 5. Money held in the form of account bal-
. ance and cash is generally called .
(a) value addition (a) fund (b) liquid money
(b) rate (c) voucher (d) journal
(c) cost
6. Inflow and outflow of funds in the form
(d) sales
of currency and account balance is called
.
(a) stock flow (b) ledger
Answers (622 - 623) (c) voucher (d) fund flow
1. (a) 2. (a)
Author: Dr.V.Nagaradjane
44 3.14. TALLY
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 45
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 47
Author: Dr.V.Nagaradjane
48 3.20. VARIANCE & RATIO ANALYSIS
Author: Dr.V.Nagaradjane
50 3.25. LANGUAGES IN TALLY
Author: Dr.V.Nagaradjane
Chapter 4
E-Commerce
51
52 4.4. BENEFITS OF E-COMMERCE
Author: Dr.V.Nagaradjane
54 4.8. MODES OF PAYMENT FOR E-COMMERCE
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 55
Author: Dr.V.Nagaradjane
56 4.10. GENERAL QUESTIONS ON E-COMMERCE
12. In an on line marketplace, transactions 21. What is the full form of CSP in ecom-
are processed by . merce?
(a) marketplace operator (a) Card Service Provider
(b) customer (b) Customer Service Provider
(c) seller (c) central Service Provider
(d) none of them (d) none of them
13. Example of an online marketplace are 22. What is the full form of ACH in ecom-
. merce?
(a) eBay (b) Snapdeal (a) Association of Clearing Houses
(c) Flipkart (d) all of them (b) Anonymous Cleansing House
14. Which of the following ecommerce plat- (c) Automatic Clearing House
forms allows consumers to buy goods di- (d) none of them
rectly from seller over the Internet? 23. What is the full form of BITS in ecom-
(a) e-webshop (b) e-shopping merce?
(c) e-webstore (d) all of them (a) Bihartiya Institute of Technology & Society
Which software model allows accumula- (b) Banking Industry Technology Secretariat
15.
tion of a list of items before making the (c) Banking Institute of Technology & Society
online purchase? (d) none of them
(a) online shopping 24. Which system facilitates the adoption of
(b) e-shopping electronic payment for online transac-
(c) shopping cart tions?
(d) none of them (a) motivated electronic purchase system
(b) electronic payment system
16. What is the name of front page of a web
(c) online payment system
store accessed by visitors to the online
(d) none of them
shop?
(a) storefront (b) webfront 25. What is the fill form of CVN in ecom-
(c) e-store (d) none of them merce?
(a) Card Verification Number
17. If a company sends bills over the Internet (b) Commerce Verified Number
and consumers pay the bills online, it is (c) Consumer Verified Number
called . (d) none of them
(a) Internet billing
(b) web billing 26. In system, payment gateway al-
(c) electronic billing lows the consumer to specify the bank
(d) none of them from which payment should be made.
(a) e-pay banking
18. Which parties are involved in electronic
(b) e-commerce banking
billing?
(a) billers (c) net banking
(b) bankers (d) none of them
(c) consolidators 27. What can be used by a consumer and
(d) all of them accepted by a merchant for making pay-
19. What is the full form of BPP in ecom- ments?
(a) merchant card
merce?
(a) Biller Payment Provider (b) payment card
(b) Biller Provision Provider (c) visiting card
(c) Biller Payment Protector (d) none of them
(d) none of them 28. What is the size of payment card?
20. What is the full form of BSP in ecom- (a) 85.60 × 53.98cm
merce? (b) 85.60 × 53.98mm
(a) Biller Service Protector (c) 85.60 × 53.98m
(b) Biller Service Provider (d) none of them
(c) Biller Service Packer 29. The default period of loan for a credit
(d) none of them card holder is days.
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 57
Author: Dr.V.Nagaradjane
58 4.10. GENERAL QUESTIONS ON E-COMMERCE
Author: Dr.V.Nagaradjane
Chapter 5
Cyber security
59
60 5.3. VULNERABILITY AND RISK MANAGEMENT
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 61
Author: Dr.V.Nagaradjane
62 5.8. INFORMATION SECURITY AUDIT
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 63
Author: Dr.V.Nagaradjane
64 5.9. INFORMATION TECHNOLOGY (IT) ACT
Author: Dr.V.Nagaradjane
Chapter 6
65
66
(d) Macro instructions that direct the user applica- (a) function (b) sub
tion and provide help to the user (c) visual (d) sub macro
14. Which of the following VBA windows 17. Which of the following would you begin
shows the code of the active object? a comment line with?
(a) Explorer Window (a) Single quote (b) Double quote
(b) Properties window (c) Underscore (d) Equal sign
(c) Immediate window
(d) Code window
15. Which of the following would NOT be a Answers (888 - 904)
good use for a macro?
(a) Inserting a logo on all spreadsheets 1. (a) 2. (c) 3. (a) 4. (b)
(b) Creating a custom button 5. (b) 6. (d) 7. (b) 8. (c)
(c) Performing the same calculation on multiple 9. (a) 10. (d) 11. (a) 12. (c)
workbooks 13. (b) 14. (d) 15. (d) 16. (b)
(d) Computing statistical calculations on data 17. (a)
16. A piece of a macro that completes some
sub task is called a procedure.
Author: Dr.V.Nagaradjane