Advance ITT Questions
Advance ITT Questions
in/
S. No.
1 Combination of alphabetic and numeric data is called _____ data alpha numeric
2 _______ devices are responsible for feeding data into the computer input
3 ____________looks like a ordinary credit card but incorporate a microprocessor and memory chip____________ smart card
4 ______ computers are used in large organizations for large scale jobs which have large storage capacities mainframes
5 _____________ is the Worlds largest computer network . Internet
6 _______ software helps to do a specific task for the user application software
7 _______ converts a high level language into machine language compiler
8 _______ is responsible for all calculations and logical operations that have to be performed on the data arithmetic and logic unit
9 ______ software enhances the user to enter ,store, manipulate and print any text word processing
10 _______ is the temporary storage place for deleted files recycle bin
11 _____ language consists of strings of binary numbers machine language
12 Computers can be classified based on ______,______and _______ size, performance, cost
13 _______ printers use light to produce the dots needed to form pages of characters non-impact desktop printers
14 _______ translates assembly language program into machine language instructions assembler
15 The model through which the relationship is diplayed between data and information is called_______ system model
16 ______ printer use laser light non impact printer
17 Processed data is called ___________________ information
18 Collection of instruction is called a _____ program
19 _________ are used in large organizations for large scale jobs mainframes
20 _______ is the capability of the o/s to run numerous applications simultaneously multitasking
21 _______ involves conversion of raw data into some meaningful information process
22 _______ device is responsible for obtaining the processed data from the computer output
23 Hardware components in a computer are _____,____,_____,______ CPU, memory, input device, output device
24 BBS stands for______ bulletin board system
25 _________is a program that displays information about a host connected to the net finger service
26 URL stands for ____________ uniform research locator
27 ________ are defined as ways of communication amongst networks protocols
28 The information displayed on the web page includes______,_____ and_____ graphics,videos,audio
29 JPEG is the acronym for ___________ Joint Pictures Expert Group
30 Web is a collection of ___________ web sites
31 The net transfers______ from one place to another data
32 DARPA is broken into ________ and _______ milnet,smaller arpanet
33 NSFNET is the united states provides service to _____ and_____ education,research
34 USENET is a BBS on ____ scale large
35 Internet can be defined as _______ network of network
36 The World Wide Web is referred to shortly as the _______ web
37 TCP/IP stands for ________________ transmission control protocol/internet protocol
38 HTTP stands for______ hyper text transfer protocol
39 Two of the important browsers are_____ and_____ netscape,ie
40 The system of interlinked documents is known as_______ hyperlink
41 The small programmes that create animation,multimedia,real-time games and multi user games are called______ applets
42 The web pages that represent online home of their author are called______ home page
43 _____ is the most popular internet service electronic mail
44 Yahoo,lycos,excite and webcrawlers are _____ web directories
45 GIF is the acronym for ____________ Graphical interchange Format
46 The World Wide Web consists of _________ web pages
47 The internet is also called as _______________ the net
48 The internet is similar to _________________ peer-to-peer connectivity
49 ________ is the ancestors of the internet arpanet
50 The first international IP network connections were established in 1973 with _____ and_____ england,norway
51 Data is transmitted in the form of_____ signals digital
52 Modem stands for __________________ Modulation/demodulation
53 ______ is the process of the digital signals being converted into a form suitable for analog transmission Modulation
54 ________ and______ are two basic ways of getting connected to the internet Dedicated access and dial up access
55 PPP stands for _____ Point to point protocol
56 _______ is a program or a tool that helps in locating a file anywhere on the net ARCHIE
57 A ______ always begins with a slash command line
58 HTTP is the acronym for __________ Hyper text transfer protocol
59 ______is used to transfer and copy files over the internet uucp
60 _____ is a program that helps us to log on to other networks telnet
61 HTML stands for_____ hyper text markup language
62 A hyperlink can be on ___________ text or image
63 The two major browsers used to surf the Internet are ________,_______ MS Internet Explorer and Netscape Navigator
64 The net provides interesting services like______,______ and______ email,file retrived,internet tools
65 DARPA stands for _______________________________________________ defensive advanced research projects administration net
66 A_____ is a set of computers interconnected by transmission paths to exchange information in internet network
67 A computer that provides a service usable by other computers is called______ servers
68 _____ can be owed by multiple organisation WAN
69 SLIP stands for ________________ Serial line protocol
70 ______ is a program that helps us to log on to other networks telnet
71 _______ is a program or a tool that helps us find a file anywhere on the net archive
72 HTML stands for ______________________________________ Hyper text markup Language
73 The field check that conforms if data input for a field is in a particular format. Format mask
74 A group of records or transactions that are contiguous constitute ….. Physical batches
75 Identify the audit technique that examines each transaction as it passes through the system. Embedded code
76 The sample data created and used for the purpose of testing the application system is called…. Test data
77 The test data (dummy unit) implemented in the normal processing of the system over a period of time is known asIntegrated Test Facility
78 This is an important control in systems that use digital signatures for authentication purposes. Public audit trails
79 Identify the functional limitation of a generalized audit software that enables evidence collection only on the state oEx Post Auditing Only
80 The organisational, management, maintenance and access controls are categories of …… General controls
81 The validation checks applied to a field depending on its logical interrelationships with the other fields in the recorRecord checks
82 Control that checks if correct sequence of commands and update parameters are passed from the application softwar Data Integrity
83 The Core Image Comparison audit technique compares the…. Executable program with master copy
84 The test data generated with correctness proof, data flow analysis and control flow analysis tools is called…. Test data pack
85 When an auditor expands the extent of substantive tests to determine the impact of defects on the attainment of p Formulate flaw hypotheses
86 Selecting transactions based on a sampling rate is called …. method. Systematic sampling
87 Identify the field check - "If a set of values is defined, is the input data one of these defined values?" Slab
88 The field check on a processed data that fails if a field is not initialized to zero or errors occur during calculation i Overflow
89 …………..is the type of batch check (group of records) for all input records of a particular type is done. Transaction type
90 With respect to data integrity control, when monetary transactions are processed against master files without a ma Suspense account
91 The technique used by an auditor to list unused program instructions is….. Mapping
92 The capability of the generalized audit software to read different data coding schemes, different record formats and dif File access
93 The audit functions of attributes sampling, variables sampling, stratified sampling are included in …. functions. Statistical
94 Picture of a transaction as it flows through the computer systems is called….. Snapshot
95 Grand totals calculated for any code on a document in the batch are called….. Hash totals
96 The system test that tests the top-level modules first and then the lower modules are simulated with dummy modules Top down test
97 When a real-time system is simulated to generate the same output as the real-time system, the technique is called….Parallel simulation
98 The audit software capability of frequency analysis is to…. Classify data on a criteria
99 The purpose-written audit programs are used for….. Specific tasks with original or modified programs
100 Identify the type of audit when auditors are members of the systems development team. Concurrent audit
101 DB2 is an example of __________ DBMS
102 DB2 is an example of __________ DBMS
103 DDL Stands for -. Data Definition Language
104 Which one is the Second Level of Data Abstraction? Logical Level
105 The _________key does not accept Duplicate and Null values in Field. Primary key
106 E-R Diagram is ________________ Model. Conceptual Model
107 _________ is used to insert values in Table directly. Query
108 In SQL, having clause is used for _________ specifying conditions with group by clause
109 The model used to describe the relationship between data and information is called System model
110 The processor responsible for communication to and from all the remote terminals connected is termed as ……… Front-end processor
111 VLSI stands for….. Very large scale Integration
112 The results of a process are stored into ……… Accumulator
113 The standard system bus was replaced by frontside and backside bus called……. Dual independent bus
114 PPM , CPS are units used to measure the printer's ….. Speed
115 The characteristic which refers to how sharply a pixel appears on the monitor is called….. Convergence
116 The most commonly used scanner technology is…. Charge-coupled device
117 The bus used to connect a CD-ROM to your computer is….. SCSI
118 The backward compatible disk that has high density-120MB is called…. SuperDisk
119 Identify the function of the operating system that manages the tasks waiting to be processed. Job management
120 The OS which allows different parts of a single program to run concurrently is….. Multithreading
121 The logical directory structure has a base of the tree called the…… Root directory
122 Identify the window screen part that indicates the name of the window, application or document. Title bar
123 If you want the recycle bin capacity to be distributed across partitions, you must use the option …… Configure drives independently
124 A file with the pdf extension can be viewed with the application….. Adobe Acrobat Reader
125 Identify the windows feature that allows more than one person to use a single PC with his own desktop. Log off
126 The Internet is a network similar to ….. Peer-to-Peer connectivity
127 The costs of Internet implementation are….. Connection cost, cost of telephone line
128 The Windows Internet application functions were developed based on the UNIX programs called….. Sockets
129 % telnet archie.ans.net is the command used by the Archie client to…. Login to Archie server
130 The email address has two parts one is the username while the other is the …. Domain
131 This Net tool provides a stimulating on-line discussion environment. Internet Relay Chat
132 These servers help in searching for words from a list of databases or documents. WINWAIS and WAISMAN
133 Unix shell provides mailing programs called …. Pine and Elm
134 …………..directories deliver information on all the topics on the Internet. Web maps
135 The Mosaic browser stores information about the configuration in a/an …. Ini file
136 This is an indexer that crawls around the web cataloging. Webcrawler
137 This download tool provides multi-server connection, can search for mirror sites and provides a file leecher. Download Accelerator Plus
138 The method of presenting information on the web through highlighted items is called…… Hypertext
139 A …… electronic mailbox stores EDI transactions for later retrieval. Value Added Networks
140 The mutual satisfaction of price, terms and conditions, delivery and evaluation criteria in a marketplace is…. Negotiation and Bargaining
141 The software components that integrates different hardware devices with the operating system….. Device drivers
142 The expenditure for running the business for a period is ….. Expense
143 The methods LIFO, FIFO, Moving Average are used to …. Value closing stock
144 The option to delete a sub-group is admissible through the menu…… Alter
145 The credit note voucher can hold account types: …….. Sales account, Sales tax account
146 Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10 monitors by credit. Credit Purchases
147 The feature in Tally to analyze accounts of a company is….. Ratio analysis
148 The ratio analysis of receivables can be done based on…… Bill date
149 Choose the budget type to be used where bank accounts balances are to be monitored. On closing balance
150 Tally can import data from other programs and creates a log about the activity in the file….. Tally.imp
151 The Tally audit trail tracks changes made to vouchers that are ….. more than 30 Days old
152 The software used for layout of newsletters and magazines along with text and images is called…… Desktop publishing
153 The processors used for speed-critical graphics applications are…… RISC
154 The unit which executes addition, subtraction, multiplication and division operations is …… ALU
155 The memory that stores data as a series of memory cells that can be accessed sequentially is…… SAM
156 The technology used to accelerate the processing of a computer is ……… Cache memory
157 The bus whose widths are 32 or 64 bits is called…… PCI
158 The instrument that can produce continuous lines is….. Plotter
159 The PCL and postscript are defacto standards for…… Page description languages
160 The number of bits used to represent a pixel in a monitor decides the ……. Colors and shades of gray that can be displayed
161 Identify the type of mice that uses optical sensors to detect motion of the ball. Optomechanical
162 A set of tracks across a set of platters in a hard disk is called a…… Cylinder
163 The floppy disks that support 400k-1.2 MB belong to…… Macintosh
164 The maximum capacity of an optical disk is …… 6 GB
165 The OS that monitors external activities with timing constraints is…. Real-time
166 A collection of sectors on a hard disk is a Cluster
167 The FAT system that provides long filename support and was written using protected-mode code . VFAT
168 The process used to optimize the disk space by arranging files contiguously is ….. Defragmentation
169 The button on the title bar of a window that displays the menu to control the size of the window is….. Control box
170 The feature which enables to synchronize files between a floppy and disk is ….. My Briefcase
171 The utility used to access the directory structure, create files and folders etc is…. Windows Explorer
172 When a computer is connected to the internet through a LAN Dedicated access
173 PPP stands for: Point to Point Protocol
174 This software enables a host to work as a terminal on the network. Terminal emulator
175 This protocol is used to check reliability, sequencing and flow control. Transmission Control Protocol
176 The computer which provides FTP, WWW, Mail services on a network is called…. Server
177 ………….is the format of Internet Address. Aaa.bbb.ccc.ddd
178 The IRC II client program command begins with a …. Slash
179 The one-way broadcast of live events is called…. Cybercast
180 This is a system of thousands of distributed bulletin boards and read by a newsreader. Newsgroup
181 The Unix to Unix copy mail system separates parts of the mail address with the symbol...….. !
182 This browser does not display links in color. Cello
183 This toolbar button displays information about web creation. Web page starter
184 The…………button provides HTML tags for font style, alignments, and colour options. Character Format
185 This is a text only browser. Lynx
186 The multithreading feature of Netscape is facilitated with a storage space named….. Cache
187 Netscape browser can display context links on an image called….. Image maps
188 Name the download tool which highlights an area of a page and gets all the links that are within the highlighted areWebcow
189 The transfer of structured data for processing from computer to computer using agreed formats and protocols is cal Electronic Data Interchange
190 The type of advertising, the Broadcast and Junk Mail models are of….. Push
191 This layer is responsible for transmitting data as frames. Data Link Layer
192 This layer of the TCP/IP suite includes the device driver and network interface card. Link Layer
193 This protocol is used for flow control, echo and flow redirection. Internet Control Message Protocol
194 To ensure a reliable communication between the buyer and seller, the protocol used is…. Secure Sockets Layer Protocol
195 The basic document where transactions are entered chronologically is…. Journal
196 Identify the account type by the rule: "Debit the receiver and credit the giver". Personal accounts
197 When the debit total is greater than credit total, the amount appears in the …….. column. Debit
198 The day book contains transactions relating to ……… Sales or purchase
199 The sundry debtors are placed in the Balance sheet on the …… Assets side
200 The first step in Tally before any transaction is entered or saved is creating a ……… Company
201 After selecting a company in Tally, you will be in the…… Gateway of Tally
202 Identify the primary group of capital nature that uses bank account and cash in hand as sub groups. Current assets
203 Credit limits for personal accounts and branches can be done in the ledger mode…… Multiple
204 You can customize the voucher entry screen using the function key……. F12
205 The use of classes for payment, receipt and contra vouchers enables data input in …… List entry mode
206 Tally's age-wise analysis considers the voucher's …… Effective date
207 Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be entered into the voucher type…..Payment
208 The F9 function key in the left side of the Gateway of Tally screen displays the…… Inventory reports
209 The age-wise statement is displayed based on…… Payables
210 Name the statement that helps the management in the decision making process. Funds flow
211 The management that needs to consolidate the accounts of its various enterprises uses ……. in Tally. Group company
212 The tracking of changes in vouchers and ledger masters is done by….. Tally Audit
213 The manual option of voucher numbering leads to….. Duplicate number
214 1024 Megabyte is equivalent to: 1 GB
215 A super computer uses a bus width of…… 64 bits
216 The data width of a Pentium 4 computer is …… 32 bits
217 The process of swapping information between the RAM and hard disk can cause Thrashing
218 The DSP,DAC,ADC,and ROM are parts of the …… Sound card
219 The maximum resolution of a standard SVGA adapter is …… 1280*1024
220 A laser printer has RAM for downloading fonts called the……. Soft fonts
221 The faster the refresh rate, the lesser the monitor….. Flickers
222 Identify the input device that consists the puck and the stylus. Tablet
223 Identify the disk which has an access time of 30ms. Winchester disk
224 Which of the auxiliary storage devices uses the constant angular velocity access technology? CD-ROM
225 The……..is an auxiliary sequential access non-volatile storage device. Magnetic tape
226 The important central module of an operating system is the….. Kernel module
227 This function of the OS manages allocation of a minimum main memory to tasks. Virtual memory storage
228 The 32bit operating system for desktop version that replaces Win 9x is….. Win 2000 professional
229 Identify the file system that provides networking,security,compression, large file support…. NTFS
230 Choose the level of RAID that offers disk mirroring for fault tolerance. Level 1
231 The mouse operation that is used to move windows and icons to different locations is ….. Dragging
232 The start button,tray and shortcuts are important features of the ……. Task bar
233 The feature to retrieve deleted files from the recycle bin is ….. Restore
234 The font, color, background settings are saved in the ….. Desktop themes
235 You can quickly access the recently worked on files from this start menu option. Documents
236 SLIP stands for: Serial Line Internet Protocol
237 The launch of DARPA's Internet Protocol (IP) facilitated the term….. Internet
238 A mail server robot can automatically…. Respond to mails
239 To check that data reaches the destination in a proper order, the data packets are assigned…. Sequence numbers
240 This file is transferred verbatim with FTP service. Binary File
241 We can access the Archie server by…… Telnet
242 This tool helps us to locate a file anywhere on the Internet. Archie
243 The computer that maps the Internet domain name to the Internet numeric address is the ….. Domain name server
244 The resources on the World Wide Web are linked with the naming format ….. Uniform Resource Locator
245 Identify the output of the IRC command " /list -min 10" . Display channels with at least ten users
246 Lynx text browser is a web client in which users can login with ….. Shell accounts
247 The tool to obtain information on the web by menus and more flexible than Archie is…. Gopher
248 The parts of the WSIRC server (net tool) window are….. Server message,command line and channels
249 These are small java programs that create games, multimedia etc. These are downloaded over the Net and executed Java applets
250 It is a link which helps in retrieving information from the WWW easily. Hyperlink
251 This window in Navigator Gold does not support frame display. Editor window
252 Identify the search engine that helps in concept based searching. Excite
253 The distributed uploading of web pages through Navigator Gold is called….. Web publish
254 This layer is responsible for encoding of data. Presentation Layer
255 The dumb terminal/node in a network depends on this computer for their basic functioning. Server computer
256 This has an embedded microchip which can both manipulate data and execute applications. Combi card
257 The financial transactions are to be …………. leading to different steps in Accounts Compilation. Grouped and summarized
258 These are the basis for analysis by potential investors, banks etc. P & L Account and Balance Sheet
259 The first document where the transaction is entered is called a ….. Voucher
260 The report prepared taking the asset and liability type accounts from the Trial Balance is called…. Balance sheet
261 The report that depicts operating profit/loss for a period is ….. P & L statement
262 The Bills Receivable details are maintained in a …….. Sundry debtors
263 To configure country specific details use the function key…… F12
264 Tally software is based on ……… accounting system. Mercantile
265 The Direct expenses, Purchase account, Direct income are primary groups of ….. Revenue nature
266 The behavioural attributes of this group cannot be changed. Primary-group
267 All account heads except Cash and Bank are placed in the…… General Ledger master
268 The primary document for recording all financial transactions in Tally is the…… Voucher
269 The suffix and prefix details for the voucher type can be made applicable only from the ……. First of a month
270 2, 4, 3, 1
271 Identify the voucher type to be chosen for the sale of computers to Anand by cash @ Rs.210000 per unit. Stock Journal
272 The financial statement that consolidates ledger balances is ….. Trial balance
273 The option on the Gateway of Tally that will generate the P&L account statement is….. Net Profit
274 Identify the budget type which is chosen where transaction amounts are to be monitored. On net transactions
275 Identify the accounting feature in tally that facilitates splitting financial years for a company data. Period-less accounting
276 Import and export of data between Tally and other programs is possible with the help of….. ODBC
277 The processor uses this workspace as a scratch pad during processing. Memory
278 When a processor executes one billion floating-point arithmetic operations per second, is called….. Gigaflops
279 The plastic cards with embedded microprocessor and memory are called….. Smart card
280 The instructions to be executed by the processor are loaded from memory into the Instruction register
281 The memory used in a computer's BIOS chip is…….. Flash memory
282 …………. synthesis method uses recordings of actual instruments. Wavetable
283 The input device that utilizes a light-sensitive detector to select objects on a display screen is called….. Light pen
284 The digital audio tape with the capacity of 24GB of data uses the technology called ….. Helical scan
285 The portable device that optimizes the features of the floppy and the CD-ROM is…. MO drives
286 Identify the multitasking type that slices CPU time to each program. Preemptive
287 The high-level logical disk structure which defines the way the entire disk is organised is ….. File allocation table
288 Identify the archive formats found on Unix-based Internet sites. Tar, gz, taz
289 The start menu option that keeps track of your important websites is ….. Favorites
290 The remote administration access to view shared resources on the network is….. Net Watcher
291 The Notepad utility saves files in the …… format. ASCII
292 When a user connects to Internet with a shell account it is called ……. Dial-up access
293 Each computer on the Internet is identified with a…. 32-bit address
294 The method of accessing files through publicly accessible server that gives free access to the files is called …… Anonymous FTP
295 The IRC conversations are organized into…. Channels
296 A web browser provides this hotlist for a user. Bookmarks
297 This scripting language is an object based language and is developed by Netscape. JavaScript
298 The World Wide Web is a collection of….. Web pages
299 The option by which the browser window in Navigator Gold 2.0 can be shifted to editor window is …. New/Edit Document
300 The a2z directory is an alphabetical list of pages used by the search engine….. Lycos
301 This system involves electronic transfer of funds between financial institutions. Electronic Fund Transfer
302 This is the basic component that connects the computer to the network. Network Interface Card
303 The accounts that the business owns is called …. Asset
304 The document used for posting of accounting transactions is …….... Journal and ledger
305 Creditors ledger has details of your dues to …….. Suppliers
306 Identify the security mechanism used in Tally. Tally Vault
307 All financial entries in Tally are done using……. Ledgers
308 We are not allowed to delete a ledger from this mode. Multiple
309 Identify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank OCC Account. Loans
310 Identify the voucher type that records fund transfers between cash and bank accounts. Contra
311 This voucher type records adjustments between ledgers. Journals
312 The details of a voucher entry can be given in the ……. Narration
313 The voucher used to record all bank and cash payments is ….. Payment
314 A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher….. Contra
315 This displays the balance daywise for a selected voucher type. Day book
316 Identify the user who can access audit trails in Tally. Administrator
317 The ratio analysis of Bills Receivables or Bills Payables can be displayed with the function key….. F6
318 XML is a ___________ Recommendation. W3C
319 XML is case-sensitive ? TRUE
320 VBA stands for_______________ . Visual Basic for Applications
321 There are _________ ways to open a Macro enabled workbook. 3
322 SYD function used to calculate depreciation as per_________________. For calculation of depreciation as per Sum of Years Digit Method.
323 VDB function used to calculate depreciation as per_________________. For calculation of depreciation as per Variable Declining Balance Method.
324 NPV stands for_______________________________ Net Present Value
325 _______function uses a fixed rate to calculate depreciation DB
326 Strings are to be always enclosed in double quotes when used in a formula. TRUE
327 Parentheses are used to change the order of calculation. TRUE
328 Which of them is a Intangible assets? Goodwill and Patents.
329 CR stands for___________________. Current Ratio
330 Debt – Equity Ratio =Long term debt / Shareholders funds. TRUE
331 A _________ can be a numerical fact. Statistic
332 __________ stands for reduction in value of fixed assets. Depreciation
333 Cash budget is prepared for planning for future as far as movement of cash is concerned. TRUE
334 Sample means the units or items selected for study or consideration and population means the total set of data useTRUE
335 _______________ analysis relates items in the financial statements in a manner that drives out performance informa Financial ratio
336 How to restrict to run a macro automatically when starting Microsoft Excel? Hold down the SHIFT key during start up.
337 The value which can be realized at the end of life of fixed asset by selling it is called _________________ Salvage Value
338 Which cell reference show the reference to other sheet or reference to other workbook in excel ? Sheet2!C4
339 Interest Coverage Ratio equals to _________. EBIT / Debt interest
340 Every bit of data has to start and end with an identical tag <TagName>Data</TagName>
341 To see the XML Map user must go ______________. Developer>XML> Source
342 _________ is the value of all future cash inflows less future cash outflows as on today. Net present value
343 _______ involves computing different reinvestment rates for expected returns that are reinvested during the investme Scenario analysis
344 ________helps to break down the Return on Equity Du Point Analysis
345 Find the correct sequence in case of XML file, are Structure, store, and transport information.
346 Programming of Macros is done in programming Language ___________. VBA
347 Information systems can be designed so that accurate and timely data are shared between functional areas. These syIntegrated Information Systems
348 The approach to ERP is to first develop a ______________ comprising the business processes or activities that are theBusiness Model
349 Finacle developed by _________ Infosys
350 The server is a sophisticated computer that accepts service requests from different machines which are called_______Clients
351 A Proxy server always acts in conjunction with a _________. Firewall
352 __________controls check that the data entered is complete and correct. Input Controls
353 ________are record of activities that have taken place in the system irrespective of the modules. Logs
354 CRR stands for _________________________ in terms of CBS. Cash Reserve Ratio
355 Does the IS Audit also include audit of the outsourcing activites carried out in the CBS system? Yes
356 DRP stands for ___________________________ in terms of CBS. Disaster Recovery Planning
357 _____________are soultions applied when any kind of vulnerabilities discovered in networks in the CBS system. Patches
358 Is performing periodic vulnerability assessment of the networks is necessary? Yes
359 KYC stands for _________________________________ in terms banking. Know Your Customer
360 _______________testing should be done to check the unauthorised access to the network in CBS. Penetration
361 EFT and NEFT work on _______________basis DNS
362 UTR full form _________________________________ in terms of CBS. Unique Transaction Reference
363 STP stands for ________________________________ in terms of CBS. Straight Through Processing
364 The Management Controls does not include ___________ Managing of Assets
365 A join returns only those rows from both tables that match on the joining field is___________ in MS Access 2010. Inner join
366 The query using ___________ returns all the rows from right table, and also those rows from the left table that sha Right outer join
367 ___________can be considered a questions in a data base. Queries
368 In example "Hello"+" " +" everyone" ,hello is _____ Text Literal
369 Length("Ms Access") will return the count of charcters is __________. 9
370 IN operator is used __________ in MS Access 2010. To match the value to a set of values
371 Operator precedence is similar to _____ that is follwed in Algebra in MS-Access 2010. BODMAS
372 ___________________ technology is the process of creating and utilizing the company's historical data. Data Warehousing
373 ________________ databases contain detailed data that is needed to satisfy processing requirements but which has n Operational
374 Maintenance Costs are high for Data Warehousing. TRUE
375 The Output of an OLAP query is typically displayed in a ___________ format. Matrix
376 ________ must consider the fundamental issues of system integration by analyzing the organization's vision and corManager
377 Customization of ERP systems is one of the major challenges in auditing ERP security. TRUE
378 Tally.ERP 9 provides graphical analysis of data which helps the user to perform deeper analysis. TRUE
379 Can we allow Expenses/Fixed Assets in Purchase vouchers? Yes
380 __________ includes transportation from Suppliers and receiving inventory. Inbound Operations
381 In _________________ stages, auditors have access to rudimentary ERP tools and capabilities for auditing security conpost implementation
382 ERP systems provide an access to the__________ data integrated
383 Business intelligence systems are ________ Decision Support Systems. data-driven
384 The data in the Warehouse comes from the _________ environment and external sources. operational
385 In essence, SCM integrates ___________ management within and across companies. supply and demand
386 Operational CRM provides support to ___________ business processes. front office
387 Collaborative ______ ultimate goal is to use information collected by all departments to improve the quality of ser CRM's
388 Tally.ERP 9 follows the DES __________ method to safeguard the data. encryption
389 _________has several components which have been designed to meet the demands of the banking industry. CBS
390 Core Banking Solutions is a combination of an application software and ________ Network devices
391 ________ is a method of creating virtual networks within a physical network. VLAN
392 The application server would be placed in a trusted inside zone in a separate ____________ Virtual Local Area Network
393 Application software would access the ________ Data base server
394 With respect to the customer changing the Pin at the ATM which procedure is the ”false“ procedure? Old offset value used to derive new PIN.
395 When the central Data base is busy with central end of day activities or for any other reason, the file containing the Positive Balance File
396 ____________refers to an arrangement wherein the issuing bank acts on the request and instructions of a customer. Letter of Credit
397 The information retrieval of transactions taking place at ATM located at remote locations is through _________ Soft copy of Electronic journal
398 Which is not a Database management system. Unix
399 MS Acces 2010 reads and writes to the .accdb file format in chunks also known as_____________. Pages
400 DDL stands for ____________ Data Definition Language
401 When you create a field using text data type in MS Access 2010, by default field will have ____ character. 255
402 How many Primary key constraints can create in a table______. Only one
403 Append Query is used to ______________ in a table in MS Access. Add Records
404 FIX() is a kind of ____ function in MS-Access 2010. Math
405 MS-Access 2010 has added new features of ______ to eliminate the need of VBA code Macro
406 Encrypting a database does not restrict access to database objects, but to __________ the database. Open
407 Third Party Encryption Technology can also be applied to the database of Microsoft Access 2010. TRUE
408 After spliting database,backend database holds_________________. Tables
409 When an Access database is split, it creates two files_________________. A back-end database & front-end database
410 The Switchboard Manager is a dialog box that allows creating a switchboard for an Access database. TRUE
411 How to add switchboard in Access 2010? Click->File tab->Option Button->Quick Access Toolbar->Command not in Ribbon->Switchboard Manager->Add->OK
412 Opens a query in the Datasheet view, Design view, or Print Preview which macro action used in MS Access. OpenQuery
413 The SGN() function is a ____________ type function Math
414 For the Non-Aggregate Total field, the criteria can only be specified using the Where clause. TRUE
415 To export an access table to an XML File, which of the below steps must be followed? Right-click the table and select Export ->XML
416 What is the procedure for importing data into IDEA ? File->Import Assistant-> Import to IDEA
417 In IDEA, blank value data can be extracted by using_________. @isblank()
418 In MS Access query which logical operator returns True if either of the expressions compared are true. OR
419 Which function is used to converts the text to lower case in MS Access 2010. Lcase()
420 The criteria expression LIKE?B*. Will match all text starting from B
421 To make database package and digitally sign using which option in Access 2010 ? File->Save&Publish->Save Database as->Package and sign
422 In which formats can the Collect Data through email message feature can send the data entry form? HTML and InfoPath
423 The filter By selection feature allows you to filter: Those records that match an entity in a field
424 The Database Language That Allows You To Access Or Maintain Data In A Database DCL
425 This Is The Stage In Database Design Where One Gathers And List All The Necessary Fields For The Database Project. Data Definition
426 The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A ___________ Bet Relationship
427 What is the purpose of the Switchboard Manager in Microsoft Access 2010? To build a main switchboard form that controls all other forms.
428 ________,___________,__________ are commonly referred to as CIA in information security parlance. Confidentiality,Integrity and Availability
429 Annual return preparation can be done using ________. ICAI-ROC application
430 __________means the sender cannot deny having sent a message and receiver cannot deny receiving the message. Non-Repudiation
431 Using which functions to perform more complex calculations and exception testing in IDEA? Equation Editor
432 In IDEA which functions should be used to find repeated values ? Detection
433 Ensures that all combinations of sampling units in the population have an equal chance of selection is____________Random
434 Input Control method is a part of Application Control Group. TRUE
435 Which is the following type of check that can be run when data is input through terminal ? Field check
436 Which is the following is the correct types of Record checks on input data ? Resonableness
437 Which is the correct types of Batch Checks ? Control Totals
438 Which is the software used by the auditor to compare the source version of a program with a secure master copy ? Souce comparison
439 Which is the major points to be consider with respect to System tests ? To ensure the input data is valid before entering the value
440 Which is not a feature of File reorganization with an auditor perspective? Filtering
441 XML is a language that is very similar to which language ? HTML
442 DTD stands for ___________, which is called XML Schema. Document Type Definition
443 The extension of a XML document is ______________. (.xml)
444 Excel works primarily with ________ types of XML files. 2
445 What is the file extension of Schema file which contain schema tags ? (.xsd)
446 Macro enabled workbook file extension is _______________ .xlsm
447 A function doesn’t require an argument is___________. TODAY()
448 In Excel, there are __________ functions for calculation of depreciation. 5
449 SLN function used to calculate depreciation as per_________________. For calculation of depreciation as per Straight Line Method.
450 BEP stands for __________________________ Break Even Point
451 Which of them is not a Conditional Operators symbols? </
452 _______ function returns the remainder after a number is divided by a divisor. MOD()
453 If User want to display the formulas rather than the results of the formulas then choose______________. Formulas > Formula Auditing > Show Formulas.
454 Profit equals to __________. Sales - Total Cost
455 Discounting is not the process of determining the present value of a payment or a stream of payments that is to be Fr ALSE
456 PAN must have ________ characters only. 10
457 Which option allows you to Bold all the negative values within the selected cell range? Conditional Formatting
458 ________________ is considered as non cash expenditure and occupies a prominent place in Profit & Loss Account. Depreciation
459 ____________ is prepared for planning for future as far as movement of cash is concerned. Cash budget
460 ____________ is one of the core principals of finance and is the primary factor used in pricing a stream of cash flow Discounting
461 If the cell B1 contains the formula=$A$1, which of the statement is true ? There is an absolute reference to cell A1.
462 __________ is a computerized mathematical technique that allows people to account for risk in quantitative analysi Monte Carlo Simulation
463 ___________ can be defined as the process of setting the procedures in the organization for achieving the predefined Corporate Planning
464 ________ shows ability of company to pay back long term loans along with interest or other charges from generationInterest Coverage Ratio
465 The exact syntax of PMT function is________________. PMT(rate, nper, pv, [fv], [type])
466 Which function is used to calculate the principal portion in every installment ? PPMT
467 ________ is a process used in statistical analysis in which a predetermined number of observations will be taken froSampling
468 __________ are useful for quick reading and easy understanding, particularly for top management. Summary reports
469 It is a process in which a business determines whether projects such as building a new plant or investing in a longCapital Budgeting
470 ___________is the process of defining and analyzing the dangers to individuals, businesses and government agenci Risk analysis
471 It is a technique used to determine how different values of an independent variable will impact a particular dependSensitivity analysis
472 Which function that is used to calculate the payment for specific loan terms ____________ PMT
473 _______ is a common method for financing property, facilities, and equipment. Leasing
474 Macro security is enabling through __________. Developer tab>Code>Macro Security
475 In Excel, Sampling option is available in ___________ . Data Analysis
476 ROE stands for __________. Return on Equity
477 ___________ is a statistical procedure that uses sample evidence and probability theory to determine whether a stat Hypothesis
478 ___________ shows dependency of a firm on outside long term finance. Leverage Ratio
479 An _____________ is a group of people with a common goal, having certain resources at its disposal to achieve the Enterprise
480 OLAP stands for _________________. Online Analytical Processing
481 __________ server has to be a powerful and robust system as it has to perform all the core banking operations. Application Server
482 ATMS stands for_________ Automated Teller Machine Server
483 IBAS stands for ___________ Internet Banking Application Server
484 Internet banking refers to a banking transactions routed through the ________ Internet
485 _________have many ports that are connected to different systems and it facilitates data transmission with the netwoSwitches
486 The ________ provides network security by preventing malicious data from entering the network. Proxy Server
487 ________is a process of unauthorized entering a network. Hacking
488 ____________ facility provides a customer to access financial transactions in a public place. Automated Teller Machine
489 Every bank branch should madatorily have a security policy. TRUE
490 Reasonableness check is a _________. Input Controls
491 SLR stands for ________________________________ Statutory Liquidity Ratio
492 Logs of the various activities in CBS can be deleted immediately and also be accessed by anybody. FALSE
493 __________can be viewed only by the DBA of an organisation. Database Log
494 In _______system money transfers are done on a one to one basis while in _______system transfer is done in batchesRTGS,NEFT
495 All the money transfers take place in the books of the _________________ Central bank(RBI)
496 ________system of money transfer is primarily used for large transactions. RTGS
497 CMS stands for ______________________________ in terms of CBS. Cash Management System
498 Which of the following statements is true? Systems audit are important for the verification of the internal controls
499 The query returns all of the rows from left table, and also those rows from the right table that is known as_________Left outer join
500 AND ,OR is a kind of ________ in MS-Access 2010. Logical
501 ______________ can be defined as subject-oriented, integrated, time-variant, non-volatile collections of data used t Data Warehouses
502 Data warehouses are not the optimal environment for ____________ data. Unstructured
503 ___________________ is an approach to quickly answer multi-dimensional analytical queries. Online Analytical Processing
504 ______________ companies is planning to support tens of millions of customers with just hundreds of employees. B2C
505 _____ is the process of integrating all the business functions and processes in an organization to achieve numerous ERP
506 E-Filing of Returns refers to the process of electronically filing your tax returns through the ___________. Internet
507 Tally.ERP 9 does not allows you to export the ETDS forms in NSDL compliant formats as well as facilitates printing FALSE
508 Tally.NET use _______________ for centralised Account Management. Control Centre
509 Sales Tax Ledger falls under which Group? Duties and Taxes
510 Transfer of materials from one godown to another godown, use ______________. Stock Journal
511 Transfer from Main Cash to Petty Cash we require to pass _______ voucher. Contra
512 A business model is not a ___________ model. mathematical
513 Accessing data store on a remote location using Internet in Tally.ERP9 is called____________. Remote Data
514 Which of the following is not a predefined security level provided by Tally.ERP 9? Public User
515 _______ integrates supply and demand mangement within and across companies. SCM
516 Which step of the ERP implementation involves, educating and recruiting end users throughtout the implementati Step 2
517 The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility called ________ File Validation Utility
518 Data warehousing technology is the process of creating and utilizing the company’s __________ historical data
519 _____________ including all fulfillment activities, warehousing and transportation to customers. outbound operations
520 Customer Relationship Management is a ________________ level strategy. corporate
521 The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility called ________ File Validation Utility
522 If we want the company to be connected automatically for remote access on load, the property __________ needs to Contact be On Load
523 _______ is centralized Banking Application Software. Core Banking Solution
524 ______ is a large data housing infrastructure that provides high band width access to its clients. Data Centre
525 Data communication between ______ VLANs can be controlled as per business requirements. 2
526 Bank mate is developed by the _______ HCL Technologies
527 A________ that runs the core banking solutions (CBS) and is centrally accessed by the branches. Central Application Server
528 __________ are capable of being connected only when devices are connected to a switch. Virtual Networks
529 Which of the following is “False“ in case of penetration testing in an IT environment of CBS? Ensure recoverability of data in case of system failure.
530 All the various servers in the central data centre are seggregated through _______ VLANs
531 Copy of the Anti Virus Software was updated promptly and regularly at the Data Centre and pushed into all of the sePush-pull method
532 In Core Banking concept all the systems of the bank are connected to the Central office by means of a connectivity wLeased line
533 The ________ is generated by the software and directly sent to equipment for printed the Pin Mailer. Personal Identification Number
534 _______________ is a process by which the bank ensures the maintenance and recovery of operations. Business Continuity Planning
535 In an Organization structure of IT Department which of the following function is incompatible? Network administrator and Database Administrator.
536 SQL stands for____________________. Structured Query Language
537 Whenever a tables gets update, the dependent query will update automatically
538 To extract the records based on date field, which of the symbol should be used #
539 The data can be entered into a table in the ____________ view. Datasheet
540 Unmatched Query can help to find records that have no corresponding reord in other tables. TRUE
541 A function that Counts the set of values that satisfy the given criteria in MS Access 2010 is___________. Count()
542 Which Query wizard is used to find repeated records in a table? Duplicate Query Wizard
543 How does a query-based report differ in design to a report based on just one table? It doesn’t
544 An .ACCDE file is a ___________ version of the original .ACCDB file. Locked-down
545 The setting for the Security option can be handled using_______________________ in Access 2010. File Tab ->Access Options, and selecting the Trust Centre tab from the Access Option window
546 MS Access provide__________ datatype to create link to a web page,file,or email address. Hyperlink
547 To add or delete buttons to Switchboard, which option is used in Switchboard Manager is used. Edit Option
548 A macro can automate data entry in Access 2010. TRUE
549 Switchboard Manager only allows a maximum of __________command buttons on a switchboard Eight
550 MS Access 2010 provides a __________pane that contained large list of actions to be chosen,enabling a wide rang Action Catalog
551 Among +, <>, MOD, AND, <= operator which operator has the highest priority. MOD
552 Which of the following symbol is used to write a sub query ()
553 What is step by step procedure for using Bendford's law function in IDEA ? Analysis->Benford's Law
554 In IDEA, Summarization, Pivot Table, Stratify, Duplicate Key functions comes under which menu. Analysis
555 To create an unmatched Query using wizard, minimum required number of table or fields is_________. two
556 In MS Access query which logical operator returns True if both the expressions compared are true. AND
557 Enfore Referencial Integrity option is used to restrict enerting data in Child Table
558 In MS Access left("Access",3) function will return__________. Acc
559 _____________ is contains a set of predefined functions in MS Acccess and helps build complex expression. Expression Builder
560 __________ queries are useful for summarizing information, and are somewhat similar to pivot tables in MS-Excel. Crosstab query
561 While entering recor
618 __________ shows the ability of a company to pay its current financial obligations. Liquidity Ratio
619 ___________ is a collection of activities that make one or more kinds of input and creates an output that is of value Business Process
620 Business Intelligence Systems are data-driven ___________________. Decision Support Systems
621 Quarz developed by ____ TCS
622 PBF stands for________ Positive Balance File
623 ________enable data transmission over different networks. Routers
624 _________is used for authentication. Domain Controller
625 Which of the following is not a module of the CBS? Equity Share management
626 Soft copy of the ATM journal rolls is called_____________ Electronic Journal
627 _________enables transfer of money from one bank to another in "Real time" and on "Gross" basis. RTGS
628 In RTGS, the STP generates an ___________for every outbound RTGS transaction. UTR
629 _______is supported by advanced technology infrastructure and has high standards of business functionality. Core Banking Solution
630 How can we add a table to the Query Design window_________? Select Design -> Show Table
631 Comparision operators is also known as_______ in MS-Access 2010. Relational
632 The definition of data elements in the data warehouse and in the data sources and the transformation rules that relatMetadata
633 _________________ is the process of extracting patterns from data. Data Mining
634 Which of the following is not an Open ERP software? Open-Project
635 The user can ________ the company data into multiple companies as per financial periods required. Split
636 Tally.ERP 9 offers a data encryption option called _______________. Tally Vault
637 ___________________ is the process of exchanging Tally.ERP 9 data between two or more locations. Synchronization
638 The data is transferred between the remote location and the server using a secured mechanism called ______________Encryption
639 If we purchase any Fixed asset in credit, we can pass it from _________. Journal mode
640 To save entry without any amount, we have to use _____________. Allow 0 value entry
641 OLAP systems use concept of OLAP cube called a ______________ cube multi dimensional
642 In Tally ERP-9 Remote Access is also known as __________. Tally.Net
643 The business model is represented in the graphical form using ______________ and ________________ flowcharts, flow diagrams
644 ___________________ is the succession of strategies used by management as a product goes through its life cycle. Product Life Cycle Management
645 The system ____________ process will address issues such as software configuration, hardware acquisition and softwa installation
646 A __________________ review is recommended to ensure that all business objectives established during the planningpost implementation
647 Immediate posting and updation of books of accounts as soon as the transactions are entered. This is called as __Real Time Processing
648 Immediate posting and updation of books of accounts as soon as the transactions are entered. This is called as __Real Time Processing
649 With ______________ technology the characters are reduced in breadth and user is allowed to input additional char Tally Fit
650 __________________ is an enabling framework which establishes a connection through which the remote user can acces Tally.NET
651 The _________of the application is capable of only entering the data at the end point that is branches. Client version
652 A special feature of STP is that _____________ number for any outbound RTGS transaction is generated by the STP SysUniform Transaction Reference
653 The______________is essential to ensure that computer security records are stored in sufficient detail for appropriate Log management
654 IN CBS, changes to the application server are not made directly to it, instead done first on a __________ Test Server
655 The __________which is also residing in the server at the branch actually does the banking operations. Application Software
656 ____________would also include the existence of built in controls in the system to ensure proper processing of inpuProcess Control
657 At which phase of testing the version of software is called “ beta version”? (a) & (b) both
658 The number that is stored in the ATM switch is the difference of which of the following number? Pin No - Natural Pin
659 The number that is generated as soon as the customer inserts the card in the ATM machine is __________ Natural Pin
660 The _________ operator is used to find the null records in a table. IS NULL
661 DML stands for _____________ Data Manipulation Language
662 How would you include some plain text into a mailing label report? Use the Mailing label wizard text option.
663 In a Microsoft Access 2010 report, the page numbering would most likely be placed into the: Page Footer
664 If you wished to present a professionally looking form on screen that would show all the necessary information, All The tools of the form design control gallery.
665 To encrypt the databse in Access 2010 must be opened in the __________________. Open Exclusive mode
666 A Data Access Page is a special type of _________ that allows users to interface with database using Internet Explorer. Web page
667 To make a switchboard appear while opening the database. Set as Switchboard startup Option in Access Option
668 Which of the following data-type is not available in MS-ACCESS AlphaNumeric
669 The command Design Application performed action____________ on switchboard. Opens the Switchboard Manager.
670 SQL is considered to be a __________ 4GL
671 Which action in MS Access macro applies a fliter or query to a table,form or report. ApplyFilter
672 The Strcomp() function is a__________type function. Text
673 In IDEA,Data Extraction select data form a file for further___________ for creating a new file of logically selected recor Investigation
674 Which function is used to remove leading or trailing spaces in a text in MS Access 2010. Trim()
675 Which of the following is a Database Software Oracle
676 Which record will be retrieved if the query criteria is < #1/1/11#? Records with date before 2011
677 The tab in Expression Builder in which we write expressions is known as _____________. Expression Box
678 ___________ is a report that is inserted in another report in MS Access 2010. Inside-Report
679 A bound main report is based on a ______________ and its _____________ contain realted information. Table or query,Sub-Report
680 Once a mail is sent using the collect data through email message feature in Access 2010. The mail status can be ch Manage replies
681 What is the memo data type field used for? For long text entries
682 How do you update Pivot Table report data after changes are made to the source data? Click the report, and on the Pivot Table toolbar, click the refresh data button
683 DCL Provides Commands To Perform Actions Like Authorizing Access And Other Control Over Database
684 Which Of The Field Has Width 8 Bytes? Date/time
685 PBX stands for ________ Private Branch exchange
686 Which of the following will not appear in the home page of K-Doc? Paste Document
687 To playfully satirize a website is known as_____________. Web spoofing
688 _________is the complete package to manage the billing requirements of a CA firm on cash system of accounting. Billing and Accounting software
689 ________ is an independent,objective assurance and consulting activity designed to add value and improve an organInternal auditiing
690 FEMA Stands for _______________. Foreign Exchange Managament Act
691 Who has full privileges in the financial accounting application? System administrator
692 In Financial Accounting Application,automatic sequence number of documents control is not required in which o Expense Management
693 Which of these will trigger/alert for timely payment ? Expense Management
694 ___________automates the calculation of salary for taking inputs from the timesheet application, leaves from Leave Payroll System
695 Which of the follwing is not a control in Leave Management System? Error free capture of leave details
696 In Permanent Audit file, _______ is not the key data documented. Copies of clients’ incorporation documents like MoC
697 _________is protection of information assets from threats to preserve their value. Information Security
698 Which of the following is not an Audit Software Unix
699 Which is the software used by auditor to read and analyze records of machine activity ? Log Analyzers Software
700 In Data analysis techniques, which law is used to idenfity statistical report on numeric data ? Benford Law
701 What do you understand by the term, “Data Consistency” in using CAATs? Identify data, which are not in agreement with the regular format.
702 ANOVA stands for___________ Analysis of Variance
703 DDB function used to calculate depreciation as per_________________. For calculation of depreciation as per Double Declining Balance Method
704 Which function categories are not available in Excel. Arts
705 QR stands for___________________. Quick Ratio
706 FATR stands for _____________. Fixed assets turnover ratio
707 Discounting Factor formula is ___________________ = 1 / (1+r) ^ n
708 If particular workbook have to open each time Excel started, where the workbook should be placed? XLSTART folder
709 The exact syntax of IPMT function is__________________. IPMT(rate, per, nper, pv, [fv], [type])
710 EMI stands for ______________. Equated monthly installment
711 In ______________ each individual is chosen entirely by chance and each member of the population has an equal chan Simple random sampling
712 ________ are generally used to present information in a simple and better way and also be used to analyse the risk inCharts
713 NPER stands for______________________________ Number of Periods
714 Requirements for preparation of cash budget in Excel. Knowledge of all of the above.
715 ________________ include money, manpower, materials, machines, technologies etc. Resources
716 ________________ is a tool that refers to skills, processes, technologies, applications and practices used to facilitate Business Intelligence
717 Flexcube developed by ________ I-Flex
718 CPPD Stands for ______________. Computer Planning and Policy Department
719 The _________ is generally a hardware and it plays the role of preventing unauthorized access. Firewall
720 Access to a set of servers is controlled by the ________. Domain Controller
721 Which type of joins not available in Access 2010? Full join
722 Data in the Data Warehouse is ______________ , not ____________. Static, Dynamic
723 ____________ data contains an historical perspective that is not generally used by the _____________ systems. Informational, Operational
724 The more the number of __________, the longer the implementation time. units
725 The Tally website offers _______________, by which a user can communicate with a Tally representative and get requi Tally Chat
726 While exporting Ledgers from Tally to Web Page, we use _________. HTML Format
727 Service Tax Report can be seen from _________________. Display > Statutory Reports
728 Which of the following is not the service area of SCM? CRM
729 In Tally.ERP 9 __________________ provides the user with administrator rights and the capability to check the entries Audit Feature
730 CBS Software resides in a Central application server which is located in the ___________ Central Office Data Centre.
731 _____________refers to the process of developing software which would produce the required output from the inpu System Development
732 Which of the following is erroneous statement in case of Change Management Control? It is important that correct latest version of programe is used but version number need not be changed.
733 The __________ is a complete process in the computer so that it ensures that data that is fed in conforms to certain Validation
734 The IBDS is located in a ____________ demilitarised zone
735 When you create relationship between two tables, the Common field's data type should be Same data type
736 Which type of the query is used to accept the value from the user while executing the query and fetch records accorParameter Query
737 To create a split database in MS Access 2010 go to which tab? Database Tools
738 In IDEA, Extraction, Sort, Indices, Search functions comes under which menu. Data
739 Which of the following is not the characteristics of a Relational Table? Each column has a specific range of values known as the Tuple domain
740 When you delete the record in form, it deletes the record from__________. Form & Table
741 Which property of the form can be used to insert a background image in MS Access 2010? Picture
742 A___________used to compare multiple values of categories or differences over a period of time. Column Chart
743 The ___________ type of data cannot be collected using Collect data through email messages. AutoNumber
744 Which Of The Following Creates A Drop Down List Of Values To Choose From? Lookup Wizard
745 Which is not a Database Model ? Structureed Database Model
746 Which of the following is not an application arranged by ICAI? ICAI-TOC
747 Which of the following is not a/an feature of eSecretary? Share certificate printing
748 As per _____________of the Income tax Act,every person carrying on business or profession is requires to get his acc Section 44AB
749 Which application helps the management to allocate the revenue to the credit of the right employee who identified Client management
750 Which of the functionalities is not provided in the purchasing module of Financial Accounting Application. Comparison with budgets
751 ___________provides information about updation of project cost based on time spent by employees on various projTimesheet application
752 __________ of information might be affected due to denial of service attack or some other reasons. Availability
753 Risk may not be _______ in nature. vulnerable
754 In IDEA, Stratified Random functions is a part of which menu. Sampling
755 In the following list which is not an audit function ? Export
756 Which is the techniques whereby the auditor arranges or manipulates data either real or fictitious, in order to see thaO n-line Testing
757 The expenditure for running the business for a period is ….. Expense
758 The methods LIFO, FIFO, Moving Average are used to …. Value closing stock
759 The option to delete a sub-group is admissible through the menu…… Alter
760 The credit note voucher can hold account types: …….. Sales account, Sales tax account
761 Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10 monitors by credit. Credit Purchases
762 The feature in Tally to analyze accounts of a company is….. Ratio analysis
763 The ratio analysis of receivables can be done based on…… Bill date
764 Choose the budget type to be used where bank accounts balances are to be monitored. On closing balance
765 Tally can import data from other programs and creates a log about the activity in the file….. Tally.imp
766 The Tally audit trail tracks changes made to vouchers that are ….. more than 30 Days old
767 This is an important control in systems that use digital signatures for authentication purposes. Public audit trails
768 Identify the functional limitation of a generalized audit software that enables evidence collection only on the state oEx Post Auditing Only
769 The basic document where transactions are entered chronologically is…. Journal
770 Identify the account type by the rule: "Debit the receiver and credit the giver". Personal accounts
771 When the debit total is greater than credit total, the amount appears in the …….. column. Debit
772 The day book contains transactions relating to ……… Sales or purchase
773 The sundry debtors are placed in the Balance sheet on the …… Assets side
774 The first step in Tally before any transaction is entered or saved is creating a ……… Company
775 After selecting a company in Tally, you will be in the…… Gateway of Tally
776 Identify the primary group of capital nature that uses bank account and cash in hand as sub groups. Current assets
777 Credit limits for personal accounts and branches can be done in the ledger mode…… Multiple
778 You can customize the voucher entry screen using the function key……. F12
779 The use of classes for payment, receipt and contra vouchers enables data input in …… List entry mode
780 Tally's age-wise analysis considers the voucher's …… Effective date
781 Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be entered into the voucher type…..Payment
782 The F9 function key in the left side of the Gateway of Tally screen displays the…… Inventory reports
783 The age-wise statement is displayed based on…… Payables
784 Name the statement that helps the management in the decision making process. Funds flow
785 The management that needs to consolidate the accounts of its various enterprises uses ……. in Tally. Group company
786 The tracking of changes in vouchers and ledger masters is done by….. Tally Audit
787 The manual option of voucher numbering leads to….. Duplicate number
788 The test data generated with correctness proof, data flow analysis and control flow analysis tools is called…. Test data pack
789 When an auditor expands the extent of substantive tests to determine the impact of defects on the attainment of p Formulate flaw hypotheses
790 Selecting transactions based on a sampling rate is called …. method. Systematic sampling
791 The financial transactions are to be …………. leading to different steps in Accounts Compilation. Grouped and summarized
792 These are the basis for analysis by potential investors, banks etc. P & L Account and Balance Sheet
793 The first document where the transaction is entered is called a ….. Voucher
794 The report prepared taking the asset and liability type accounts from the Trial Balance is called…. Balance sheet
795 The report that depicts operating profit/loss for a period is ….. P & L statement
796 The Bills Receivable details are maintained in a …….. Sundry debtors
797 To configure country specific details use the function key…… F12
798 Tally software is based on ……… accounting system. Mercantile
799 The Direct expenses, Purchase account, Direct income are primary groups of ….. Revenue nature
800 The behavioural attributes of this group cannot be changed. Primary-group
801 All account heads except Cash and Bank are placed in the…… General Ledger master
802 The primary document for recording all financial transactions in Tally is the…… Voucher
803 The
3. suffix and
Generate Dayprefix
Booksdetails for the voucher type can be made applicable only from the ……. First of a month
804 4. Update journals for financial transactions 2, 4, 3, 1
805 Identify the voucher type to be chosen for the sale of computers to Anand by cash @ Rs.210000 per unit. Stock Journal
806 The financial statement that consolidates ledger balances is ….. Trial balance
807 The option on the Gateway of Tally that will generate the P&L account statement is….. Net Profit
808 Identify the budget type which is chosen where transaction amounts are to be monitored. On net transactions
809 Identify the accounting feature in tally that facilitates splitting financial years for a company data. Period-less accounting
810 Import and export of data between Tally and other programs is possible with the help of….. ODBC
811 The capability of the generalized audit software to read different data coding schemes, different record formats and dif File access
812 The audit functions of attributes sampling, variables sampling, stratified sampling are included in …. functions. Statistical
813 Picture of a transaction as it flows through the computer systems is called….. Snapshot
814 The accounts that the business owns is called …. Asset
815 The document used for posting of accounting transactions is …….... Journal and ledger
816 Creditors ledger has details of your dues to …….. Suppliers
817 Identify the security mechanism used in Tally. Tally Vault
818 All financial entries in Tally are done using……. Ledgers
819 We are not allowed to delete a ledger from this mode. Multiple
820 Identify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank OCC Account. Loans
821 Identify the voucher type that records fund transfers between cash and bank accounts. Contra
822 This voucher type records adjustments between ledgers. Journals
823 The details of a voucher entry can be given in the ……. Narration
824 The voucher used to record all bank and cash payments is ….. Payment
825 A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher….. Contra
826 This displays the balance daywise for a selected voucher type. Day book
827 Identify the user who can access audit trails in Tally. Administrator
828 The ratio analysis of Bills Receivables or Bills Payables can be displayed with the function key….. F6
829 When a real-time system is simulated to generate the same output as the real-time system, the technique is called….Parallel simulation
830 The audit software capability of frequency analysis is to…. Classify data on a criteria
831 The purpose-written audit programs are used for….. Specific tasks with original or modified programs
832 Identify the type of audit when auditors are members of the systems development team. Concurrent audit