Adv IIT - Question bank q_id q_desc op2 op3 op4 Expansion Markup Language W3C Expansion Makeup Language W1C Extensible Markup Language W2C EXtensible Makeup Language W4C C++ Data Type Definition (.mlx) JAVA Data to Data B (.xsd) HTML Document Type Definition (.xml) A B (.xlm) B Review Add-Ins Developer Data C TRUE FALSE 3 2 1 4 A B (.xml) (.xsd) (.xlm) (.mlx) B Visual Basic for Applications .xlsx Visual Basic for Applets .xlsm Visual Basic for Apple .xlsv None of the above .xlsw 3 2 4 1 Analysis of Variance YEAR() 3 AXL1 XML stands for_________ AXL2 XML is a ___________ Recommendation. AXL3 XML is a language that is very similar to which language ? C AXL4 DTD stands for ___________, which is called XML Schema. Direct to Direct AXL5 The extension of a XML document is ______________. To create a XML Map from XML schema, Go to which Tab in Excel ____________. XML is case-sensitive ? AXL6 AXL7 AXL8 AXL9 Excel works primarily with ________ types of XML files. What is the file extension of Schema file which contain schema tags ? AXL10 VBA stands for_______________ . AXL11 Macro enabled workbook file extension is _______________ AXL12 There are _________ ways to open a Macro enabled workbook. AXL13 ANOVA stands for___________ AXL14 A function doesn’t require an argument is___________. In Excel, there are __________ functions for calculation of AXL15 depreciation. AXL16 SLN function used to calculate depreciation as per_________________. ans op1 DATE() TODAY() Analog of Variance MONTH() 4 5 6 Analysis of Value Analysis of Varity For calculation of For calculation of For calculation of For calculation of depreciation as depreciation as depreciation as depreciation as per Variable per Double per Sum of Years per Straight Line Declining Balance Declining Balance Digit Method. Method. Method. Method. C A B A D B B B Adv IIT - Question bank AXL17 AXL18 AXL19 AXL20 SYD function used to calculate depreciation as per_________________. For calculation of For calculation of For calculation of For calculation of depreciation as depreciation as depreciation as depreciation as per Variable per Double per Sum of Years per Straight Line Declining Balance Declining Balance Digit Method. Method. Method. Method. A DB function used to calculate depreciation as per_________________. For calculation of For calculation of For calculation of For calculation of depreciation as depreciation as depreciation as depreciation as per Double per Sum of Years’ per Straight Line per Declining Declining Balance Digit Method. Method. Balance Method. Method. C DDB function used to calculate depreciation as per_________________. For calculation of For calculation of For calculation of For calculation of depreciation as depreciation as depreciation as depreciation as per Double per Sum of Years’ per Straight Line per Declining Declining Balance Digit Method. Method. Balance Method. Method D VDB function used to calculate depreciation as per_________________. For calculation of For calculation of For calculation of For calculation of depreciation as depreciation as depreciation as depreciation as per Variable per Double per Straight Line per Declining Declining Balance Declining Balance Method. Balance Method. Method. Method. A AXL21 PV Ratio stands for _____________________. AXL22 BEP stands for __________________________ AXL23 Data Validation available in which Tab? ___________function returns value from a given data range AXL24 based on row and column. AXL25 Which function categories are not available in Excel. AXL26 PMT Function is belongs to which categories of Excel function ? AXL27 NPV stands for_______________________________ Point Volume Ratio Point Varaiance Ratio Formulas Insert Profit Volume Ratio Balance Equal Point Data VLOOKUP() HLOOKUP() INDEX() LOOKUP() C Statistical Engineering Math & Trig Arts D Text Logical Financial Math & Trig C Net Present Value Net Proper Value Net Present Variance Negative Present Value A Break Easy Point Break Even Point Profit Variance Ratio C Break Equal Point B Developer C Adv IIT - Question bank AXL28 _______function uses a fixed rate to calculate depreciation AXL29 Which of them is not a Conditional Operators symbols? Strings are to be always enclosed in double quotes when used in AXL30 a formula. AXL31 Parentheses are used to change the order of calculation. AXL32 In Excel the function =Abs(-4) returns __________. _______ function returns the remainder after a number is AXL33 divided by a divisor. VDB SYD SLN < </ <= <> TRUE FALSE A TRUE FALSE -4 2^2 4 None A C DIVISOR() MOD() MODE() REMAINDER() B Formulas > Formulas > Formulas > Formulas > If User want to display the formulas rather than the results of the Formula Auditing Formula Auditing AXL34 Formula > Show Function > Show formulas then choose______________. > Show > Function > Formulas. Formulas. Formulas. Show Formulas. AXL35 _______________ reveal about the current and future financial condition of the company. Cash and Property. Clear Ratio None of the above Clear Rate Quality Ratio Quality Rate Quick Ratio A D A None of the above C Data AXL37 CR stands for___________________. Goodwill and Patents. Current Ratio AXL38 QR stands for___________________. Quick Rate AXL39 Debt – Equity Ratio =Long term debt / Shareholders funds. AXL40 ACP stands for _____________. AXL41 FATR stands for _____________. AXL42 A _________ can be a numerical fact. AXL43 __________ stands for reduction in value of fixed assets. Value of fixed assets is generally reduced over the period of time AXL44 due to __________. AXL45 Profit equals to __________. FALSE Average Average Average collection collection price collection period payment Fixed all turnover Fixed assets test Fair assets ratio ratio turnover ratio Statistic Sale Salary None TRUE Depreciation Wear & Tear B Financial statements investment and securities. Current Rate Report AXL36 Which of them is a Intangible assets? A B DB Data Change in taste of people Purchase - Total Sales - Total Cost Cost Document Change in technology Product - Total Cost Fixed assets turnover ratio Number C A D Detail A A All of the Above D Manufacturing Total Cost B Adv IIT - Question bank AXL46 Examples of fixed cost are __________. AXL47 AXL48 AXL49 AXL50 AXL51 Cash budget is prepared for planning for future as far as movement of cash is concerned. Discounting is not the process of determining the present value of a payment or a stream of payments that is to be received in the future. PAN must have ________ characters only. Sample means the units or items selected for study or consideration and population means the total set of data used for selection of samples. _______________ analysis relates items in the financial statements in a manner that drives out performance information about the company. How to restrict to run a macro automatically when starting AXL52 Microsoft Excel? AXL53 AXL54 AXL55 AXL56 AXL57 AXL58 AXL59 AXL60 Which option allows you to Bold all the negative values within the selected cell range? _____________ allow us to perform calculations or operations that would otherwise be too cumbersome or impossible altogether. Statistical functions in Excel help to calculate __________________ Discounting Factor formula is ___________________ ________________ is considered as non cash expenditure and occupies a prominent place in Profit & Loss Account. The value which can be realized at the end of life of fixed asset by selling it is called _________________ ____________ is prepared for planning for future as far as movement of cash is concerned. ____________ is the process of determining the present value of a payment or a stream of payments that is to be received in the future. Salary of administrative staff office rent TRUE FALSE A TRUE FALSE B 8 10 TRUE FALSE Financial ratio Price Both A and B 11 None 12 C B A Perodic Hold down the Hold down the Hold down the SHIFT key during CTRL key during ESC key during start up. start up. start up. Conditional Zero Formatting Bold Formatting Formatting Report Hold down the ALT key during start up. Negative Formatting A A B Cell referencing functions Absolute functions Worksheet functions Round( ) functions C Arithmetic Mean Median Mode All of the above. D = n / (1+a) - r = 1 + (1/r) * n = 1 / (1+a) ^ 2 = 1 / (1+r) ^ n D Cash Flow Depreciation Fund flow Expenditure B Salvage Value cost life Factor A Capital Budgeting Cash budget Both A& B Actual Budget B Discounting None C Marginal costing Capital Budgeting Adv IIT - Question bank AXL61 AXL62 AXL63 AXL64 AXL65 AXL66 AXL67 AXL68 AXL69 AXL70 AXL71 AXL72 AXL73 ____________ is one of the core principals of finance and is the primary factor used in pricing a stream of cash flows, such as those found in a traditional bond or annuity. XML schemas in Excel are called XML _____________. Excel allows us to use various functions and even simple mathematical calculations which can be used for _____________. Which cell reference show the reference to other sheet or reference to other workbook in excel ? Which of them is not a Range References? Marginal costing Discounting PMT None B Schemas Maps Markups C Financial analysis Equity analysis Elements Leasing decisions and the list goes on All of Above D Sheet2!C4 Sheet2{C4} Sheet2<C4> A Sheet2(C4) $A$1:A4 A1, A2 , A3, A4 A$1:A$4 EIBT / Debt ETIB / Debt EBTI / Debt Interest Coverage Ratio equals to _________. interest interest interest If particular workbook have to open each time Excel started, AUTOSTART EXCELSTART AUTOEXEC folder XLSTART folder where the workbook should be placed? folder folder There is a There is an Further changes Further changes If the cell B1 contains the formula=$A$1, which of the statement relative absolute in value of A1 will in value of B1 will is true ? reference to cell reference to cell not affect B1. not affect A1. A1 A1. __________ is a computerized mathematical technique that Finanical Monte Carlo Corporate Personal Finance allows people to account for risk in quantitative analysis and Planning Simulation Planning Planning decision making. ________ is the process of meeting the financial goals through Corporate Monte Carlo Financial Personal Finance the proper management of finances. planning simulation planning planning ___________ can be defined as the process of setting the Corporate Monte Carlo Corporate Decision Tree procedures in the organization for achieving the predefined Planning & Simulation Planning Analysis goals. Analysis ________ shows ability of company to pay back long term loans Interest Total Fund None of the along with interest or other charges from generation of profit Debt Assets Ratio Coverage Ratio Ration above from its operations. _____________________is the simplest method of comparing different stocks at a point of time to make investment decisions. A1:A4 EBIT / Debt interest Earnings Per share Fixed Asset Over ratio Price Earnings Multiple Gross Profit Ratio C A D B B C B B C Adv IIT - Question bank <?xml <?xml <?xml <?xml version="3.0" version="2.0" version="1.0" version="0.0" encoding="ISO- encoding="ISO- encoding="ISO- encoding="ISO8859-1"?> 8859-1"?> 8859-1"?> 8859-1"?> <TagName>Data </TagName>Data </TagName>Data <TagName>Data </TagName> <TagName> </TagName> <TagName> A AXL76 The exact syntax of PMT function is________________. PMT(nper, rate, pv, [fv], [type]) B AXL77 The exact syntax of IPMT function is__________________. IPMT(rate, nper, pv, [fv], [type]) IPMT(pv, rate, per, nper, [fv], [type]) AXL78 To see the XML Map user must go ______________. Developer>XML> Source Developer> Source AXL79 Deletion of XML Map is done through __________. Directally Delete Command Delete Button Annual Income DOB status of assess All of the above. D Easy Monthly Installment Equating Monthly Income Equal Monthly Installement Equated monthly installment D IPMT PPMT PMT None of the above B Snowball sampling Sampling Systematic sampling Simple random sampling B Clustered sampling Sampling Systematic sampling Simple random sampling C Snowball sampling Convenience sampling Systematic sampling Simple random sampling D Quota Sampling Sampling Snowball sampling Simple random sampling C AXL74 The very first line of code of XML file is_____________. AXL75 Every bit of data has to start and end with an identical tag AXL80 Method of tax calculations shall change according to _________. AXL81 EMI stands for ______________. AXL82 AXL83 AXL84 AXL85 AXL86 Which function is used to calculate the principal portion in every installment ? ________ is a process used in statistical analysis in which a predetermined number of observations will be taken from a larger population. In __________, Individuals are selected at regular intervals from a list of the whole population. In ______________ each individual is chosen entirely by chance and each member of the population has an equal chance, or probability, of being selected. Which method is commonly used in social sciences when investigating hard to reach groups? PMT(rate, nper, PMT(rate, pv, PMT(pv, rate, pv, [fv], [type]) nper, [fv], [type]) nper, [fv], [type]) IPMT(per, rate, IPMT(rate, per, nper, pv, [fv], nper, pv, [fv], [type]) [type]) File Menu>Options>A None of the dd in>Excel Add above. In>XML XML Maps Dialog None of the Box above C D A C Adv IIT - Question bank AXL87 AXL88 AXL89 AXL90 AXL91 AXL92 AXL93 AXL94 AXL95 AXL96 AXL97 __________ are useful for quick reading and easy understanding, Balance sheet particularly for top management. It is a process in which a business determines whether projects Business such as building a new plant or investing in a long-term venture Investment are worth pursuing. Popular methods of capital budgeting include _________ and discounted cash payback period. flow _________ is the value of all future cash inflows less future cash Net present outflows as on today. value ___________is the process of defining and analyzing the dangers Sensitivity to individuals, businesses and government agencies posed by analysis potential natural and human-caused adverse events. __________ which is used more often, does not involve Sensitivity numerical probabilities or predictions of loss. analysis ________ are generally used to present information in a simple and better way and also be used to analyse the risk in a better Graphs way. It is a technique used to determine how different values of an Decision Tree independent variable will impact a particular dependent variable analysis under a given set of assumptions. _______ involves computing different reinvestment rates for expected returns that are reinvested during the investment Scenario analysis horizon. Total Principal NPER stands for______________________________ Value Which function that is used to calculate the payment for specific SUMIF() loan terms ____________ AXL98 ________helps to break down the Return on Equity AXL99 _______ is a common method for financing property, facilities, and equipment. AXL100 Find the correct sequence in case of XML file, are Summary reports IRR NPV B Capital Budgeting Capital Investment Investment management B All the above D PMT A internal rate of net present value return Working capital IRR Risk analysis Qualitative risk Scenario analysis analysis B Risk analysis Qualitative risk Scenario analysis analysis C Sparklines Both A& B Charts D Sensitivity analysis Both A& B Neither A &B B Sensitivity analysis Decision Tree Analysis None A Net Per value Total Interest Value PMT COUNTIF() Du Point Analysis Return on Investment Profitability Ration Number of Periods None of the above None of the above Mortagage Leasing Rent All the above B Structure and store information. Store and transport information. A Structure, store, Store, structure, and transport and transport information. information. D B A Adv IIT - Question bank Programming of Macros is done in programming Language ___________. As Bank auditors,Many Banking applications generate text files in AXL102 ____________. AXL101 AXL103 Macro security is enabling through __________. AXL104 In Excel, Sampling option is available in ___________ . AXL105 Requirements for preparation of cash budget in Excel. AXL106 ROE stands for __________. AXL107 AXL108 AXL109 AXL110 AXL111 AER1 AER2 AER3 VBA ASP.Net Java C++ A Txt format Csv format Both A and B Nither A Nor B C Developer Developer Developer Not Required tab>Code>Macro tab>Modify>Mac tab>Controls>Ma Security ro Security cro Security Insert Data Analysis View None Knowledge of Knowledge of Knowledge of Knowledge of all formatting an cell linking & accounting of the above. excel sheet basic formulae Return on Return of Recall on Equity Return on Equity Enquary Equalisation ___________ is a statistical procedure that uses sample evidence and probability theory to determine whether a statement about Confidence the value of a population parameter should be rejected or should Interval not be rejected. ____________ is a statistical tool used to create predictive Regression models. equation __________ shows the ability of a company to pay its current Quick Ratio financial obligations. ___________ shows dependency of a firm on outside long term Quick Ratio finance. To record a Macro in relative mode,"Üse Realtive References" Developer Tab available in which tab of excel ? An _____________ is a group of people with a common goal, having certain resources at its disposal to achieve the common Company goal. ________________ include money, manpower, materials, Costing machines, technologies etc. ___________ is a collection of activities that make one or more kinds of input and creates an output that is of value to the Business Model customer. B B D B Hypothesis ANOVA None of the above B Regression Multiple Regression Single Regression C Current Ratio Liquidity Ratio Solvency Ratio C Leverage Ratio Liquidity Ratio Solvency Ratio B View Tab Both A and B Nither A Nor B C Enterprise Organization Concern B Production Sales Resources D Business Function Business Process Business Operation C Adv IIT - Question bank AER4 AER5 AER6 AER7 AER8 Information systems can be designed so that accurate and timely Integrated Isolated data are shared between functional areas. These systems are Information Information called _______________________________. Systems Systems The approach to ERP is to first develop a ______________ Business comprising the business processes or activities that are the Business Model Function essence of a business. Online Analysis Online Analytical OLAP stands for _________________. Processing Processing ________________ is a tool that refers to skills, processes, Data technologies, applications and practices used to facilitate better, Data Modeling Warehousing accurate and quicker decision making. Integrated Business Intelligence Systems are data-driven Information Information ___________________. Systems Systems Non-Integrated Information Systems Non-Isolated Information Systems A Business Process Business Operation A Online Analytical Programming None of the above B Business Modeling Business Intelligence D Decision Support Systems Non-Isolated Information Systems C Finacle developed by _________ Infosys HCL Technologies TCS I-Flex A ACS10 Flexcube developed by ________ Infosys HCL Technologies TCS I-Flex D ACS11 Quarz developed by ____ Infosys HCL Technologies TCS I-Flex C Clients Customers Party IP A Antivirus Server Application Server Web server Clients Server B ACS9 The server is a sophisticated computer that accepts service requests from different machines which are called__________ __________ server has to be a powerful and robust system as it ACS13 has to perform all the core banking operations. ACS12 Automatic Telephone Machine Automated Teller Auto Machanic Allow to Machine Machine Server B ACS15 IBAS stands for ___________ Internet Business Internet Banking Internet Banking Internet Business Application Application Application Authenticatin Server Server software server B ACS16 PBF stands for________ Positive Balance Positive Balance Positive Balance Post Balance File File File Flex C ACS14 ATMS stands for_________ ACS17 Internet banking refers to a banking transactions routed through the ________ Bank Internet Intranet Net banking B Adv IIT - Question bank ACS18 CPPD Stands for ______________. ACS19 ACS20 ACS21 ACS22 ACS23 Computer Planning and plant department The _________ is generally a hardware and it plays the role of Date base Server preventing unauthorized access. ________enable data transmission over different networks. Switches _________have many ports that are connected to different Router systems and it facilitates data transmission with the network. A Proxy server always acts in conjunction with a _________. Firewall The ________ provides network security by preventing malicious ATM Server data from entering the network. ACS24 _________is used for authentication. System audit ACS25 Access to a set of servers is controlled by the ________. System audit Computerized Planning and Policy Department Both A &B Computer Planning and Policy Department D Web server Proxy Firewall D Firewall Routers Middleware C Switches Firewall Middleware B Internet Antivirus None A Proxy Server Date base Server Web server B system administration system administration Domain Controller Network security C Librarian Domain Controller D Hacking Routors Thrashing B Accelereated Teller machine B All the above D ACS26 ________is a process of unauthorized entering a network. Data base administration ____________ facility provides a customer to access financial ACS27 transactions in a public place. Automatic tele Automated Teller Machine Machine ACS28 Which is the Function of ATM? ACS29 Every bank branch should madatorily have a security policy. ACS30 The Operational Controls include controls on ___________ Application Controls are broadly classified into __________________ __________controls check that the data entered is complete and ACS32 correct. ACS31 ACS33 Reasonableness check is a _________. ACS34 Which of the following is not a module of the CBS? Cash Withdrawal Balance Inquiry FALSE B TRUE Physical Access Logical Access Input Controls Output Controls Input Controls Output Controls Processing Controls Customer ID generation Automated Technical Machine Registering requests for Cheque book Environmental Controls Processing Controls Processing Controls All of the above D All of the above D All of the above A Input Controls Output Controls Management Control B Accounts management Equity Share management Clearing Module C Adv IIT - Question bank Statutory Liquidified Ratio Deferred Payment Guarantee Statutory Liquidity Ratio Standard Liquidity Ratio Logs Index Activity Logs Activity performed User details E-mail policy Firewall security policy TRUE FALSE Cash Reserve Ratio Community Reserve Ratio Yes No ACS43 DRP stands for ___________________________ in terms of CBS. Disaster Recovery Planning Discovered Resources Planning Disastrous Recovery Planning _____________are soultions applied when any kind of vulnerabilities discovered in networks in the CBS system. Patches Logs Access Rights Access Rights Logs Database Log Operating System Log Yes No ACS35 Bank guarantees can be __________________________ ACS36 SLR stands for ________________________________ ACS37 ________are record of activities that have taken place in the system irrespective of the modules. ACS38 The contents of a log includes _____________________ Communication and Operations management must include which policies? Logs of the various activities in CBS can be deleted immediately ACS40 and also be accessed by anybody. ACS39 ACS41 CRR stands for _________________________ in terms of CBS. ACS42 ACS44 Does the IS Audit also include audit of the outsourcing activites carried out in the CBS system? ACS45 __________can be viewed only by the DBA of an organisation. Is performing periodic vulnerability assessment of the networks is necessary? KYC stands for _________________________________ in terms ACS47 banking. In CBS, the Accounts Management module deals with ACS48 _____________________ ACS46 ACS49 Soft copy of the ATM journal rolls is called_____________ ACS50 The ATM switch consists of a _____________________ Performance Guarantee Know Your Know Your Customer Company Creation of Creation of Savings Account Current Account Both A & B None of the above C Stable Liquidity Ratio None of the above A Date and Time All of the above D Internet policy All of the above D B B Cash Reversal Ratio Cash Reimbursed Ratio A A Disaster Recording Planning None of the above Activity Log A A B A Know Your Connection Know Your Centre A Overdraft All of the above D Stock Journal Journal Report Electronic Journal All of the above C computer server Both A & B None of the above C Adv IIT - Question bank ACS51 ACS52 ACS53 ACS54 ACS55 ACS56 ACS57 _______________testing should be done to check the unauthorised access to the network in CBS. _________enables transfer of money from one bank to another in "Real time" and on "Gross" basis. In _______system money transfers are done on a one to one basis while in _______system transfer is done in batches. All the money transfers take place in the books of the _________________ EFT and NEFT work on _______________basis ________system of money transfer is primarily used for large transactions. In RTGS, the STP generates an ___________for every outbound RTGS transaction. UTR full form _________________________________ in terms ACS58 of CBS. Penetration Hierarchical Top down EFT NEFT RTGS NEFT, RTGS RTGS,NEFT EFT,RTGS DNS HSM SSM NEFT RTGS EFT All of the above B UTN UTE UTR UTS C Unique Transaction Reference Unidentified Transaction Reference Straight Temporary Processing Cash Management System Unique Transmission Reference None of the above A Strict Through Processing None of the above A Core Management System Centre Management System B Audit of controls in any banking environment is performed using software audit None of the above B Laying down procedures for system development A Web centre C Full join D Beneficiary bank Central bank(RBI) Remitting bank STP stands for ________________________________ in terms of Straight Through CBS. Processing ACS60 CMS stands for ______________________________ in terms of CBS. ACS62 The Management Controls does not include ___________ _______is supported by advanced technology infrastructure and has high standards of business functionality. ADB23 Which type of joins not available in Access 2010? ACS63 A None of the above None of the above None of the above All of the above ACS59 ACS61 Which of the following statements is true? Bottom up Control Management System Systems audit Audit of internal are important for controls is not the verification needed at all of the internal controls Managing of Assets Firewall Inner join Developing a Formulating a business security policy continuity planning Core Banking Internet banking Solution Left outer join Right outer join C B B A Adv IIT - Question bank ADB24 A join returns only those rows from both tables that match on the joining field is___________ in MS Access 2010. Inner join Left outer join Right outer join Full join A ADB25 The query returns all of the rows from left table, and also those rows from the right table that is known as____________. Right outer join Left outer join Inner join None of the above B Right outer join Left outer join Inner join None of the above A The query using ___________ returns all the rows from right ADB26 table, and also those rows from the left table that share a common value on both sides of join. ADB28 ___________can be considered a questions in a data base. Queries Select Database Tools-> Add Table Form ADB29 Operands can be_________ in MS Access 2010. Literals Identifiers Function Text Literal Date Literal Number Literal 9 8 7 Arithmetic Logical Comparision Arithmetic Logical Relational Text Date Both A and B Select Create-> ADB27 How can we add a table to the Query Design window_________? Add Table ADB30 In example "Hello"+" " +" everyone" ,hello is _____ ADB31 Length("Ms Access") will return the count of charcters is __________. ADB32 AND ,OR is a kind of ________ in MS-Access 2010. ADB33 Comparision operators is also known as_______ in MS-Access 2010. ADB34 LIKE operator works with______in MS Access 2010. ADB35 IN operator is used __________ in MS Access 2010. Operator precedence is similar to _____ that is follwed in Algebra in MS-Access 2010. ___________________ technology is the process of creating and AER9 utilizing the company's historical data. ______________ can be defined as subject-oriented, integrated, AER10 time-variant, non-volatile collections of data used to support analytical decision making. ADB36 To match the To find the null value to a set of records of given values table Select Design -> Show Table Reprt returns true or false Select the table from navigation Pane. Macro All None of the above 6 None of the above None of the above None of the above None of the above BODMAS BOMDAS BODSAM Data Warehousing Data Modeling Business Modeling None of the above Business Intelligence Data Models Data Warehouses Data Mines Operational Data C A D A A B C C A A A B Adv IIT - Question bank AER11 AER12 AER13 AER14 AER15 AER16 AER17 AER18 AER19 AER20 AER21 AER22 AER23 AER24 ________________ databases contain detailed data that is needed to satisfy processing requirements but which has no Operational Non-Operational Subject-Oriented Informational relevance to management or analysis. Data in the Data Warehouse is ______________ , not Non-Volatile, Dynamic, Static Volatile, Static Static, Dynamic ____________. Static ____________ data contains an historical perspective that is not Operational, Operational, Informational, Informational, generally used by the _____________ systems. Informational Static Static Operational The definition of data elements in the data warehouse and in the data sources and the transformation rules that relate them, are Masterdata Detaileddata Metadata Basedata referred to as ___________. Data warehouses are not the optimal environment for Structured Unstructured Informational Operational ____________ data. Maintenance Costs are high for Data Warehousing. TRUE FALSE Credit Card Insurance Fraud Logistics Data Warehousing can be used for ___________________. All of the above Churn Analysis Analysis Management _________________ is the process of extracting patterns from Data Data Analysis Data Mining Data Modeling data. Warehousing Business Product Life ___________________ is an approach to quickly answer multiOnline Analytical Supply Chain Processing Cycle dimensional analytical queries. Processing Management Management Management The Output of an OLAP query is typically displayed in a Matrix Columnar Stepped Outline ___________ format. ______________ companies is planning to support tens of B2B B2C C2B C2C millions of customers with just hundreds of employees. Unsuitable for Increased Legal Which of the following is the limitation of Open Source ERP? conventional All of the above Complexities Complexities applications Which of the following is not an Open ERP software? Openbravo SQL-Ledger Open-Project ERP5ERP _____ is the process of integrating all the business functions and processes in an organization to achieve numerous benefits. ________ must consider the fundamental issues of system AER25 integration by analyzing the organization's vision and corporate objectives. EDI Manager A D D C B A D C B A B D C ERP BPM None of the above B Auditor Top Management Commitment Either A or B or C A Adv IIT - Question bank AER26 AER27 AER28 AER29 AER30 AER31 AER32 AER33 AER34 AER35 AER36 The more the number of __________, the longer the implementation time. Customization of ERP systems is one of the major challenges in auditing ERP security. Tally.ERP 9 provides graphical analysis of data which helps the user to perform deeper analysis. The user can ________ the company data into multiple companies as per financial periods required. E-Filing of Returns refers to the process of electronically filing your tax returns through the ___________. Tally.ERP 9 does not allows you to export the ETDS forms in NSDL compliant formats as well as facilitates printing of TDS Forms in Physical Form. Tally.ERP 9 offers a data encryption option called _______________. ___________________ is the process of exchanging Tally.ERP 9 data between two or more locations. The Tally website offers _______________, by which a user can communicate with a Tally representative and get required information. Tally.NET use _______________ for centralised Account Management. The data is transferred between the remote location and the server using a secured mechanism called __________________. AER37 Sales Tax Ledger falls under which Group? AER38 Alias represents ___________ in Tally.ERP9. If we purchase any Fixed asset in credit, we can pass it from AER39 _________. AER40 To save entry without any amount, we have to use _____________. AER41 Transfer of materials from one godown to another godown, use ______________. process TRUE FALSE A TRUE FALSE A Import Export Split Backup C Intranet Internet Extranet Any of the above B TRUE FALSE Tally Data Encryption Tally Data Encoding Serialization Randomization Tally Forum Tally FAQ Tally Support Tally Chat D Data Centre Control Centre Cloud Centre Administration Centre B Encoding Decoding Encryption Decryption C Sales Purchases B Indirect Expenses Duties and Taxes package units D modules B Tally Vault Tally Data Conversion Synchronization Asynchronization C C Short name Nickname Code name All of these D Payment mode Receipt mode Journal mode Contra mode C Cost Center Maintain Multiple godown Allow 0 value entry Use Rej Notes C Manufacturing Journal Stock Journal Purchase Journal Both A & B B Adv IIT - Question bank While exporting Ledgers from Tally to Web Page, we use _________. AER43 Budget represents _______________________. In Service tax Credit Adjustment (%) should be either AER44 ____________. AER42 AER45 Service Tax Report can be seen from _________________. AER46 Can we allow Expenses/Fixed Assets in Purchase vouchers? Transfer from Main Cash to Petty Cash we require to pass AER47 _______ voucher. XML Format ASCII Format SDF Format HTML Format D Estimation Forecasting Assumption All of these D 0.2 1 Both A & B Neither A &B C Display > Day Book Display > Account Books Display > Statutory Masters Display > Statutory Reports D Yes No Payment Contra A Receipt None of these B Reminder Letter None of these D Conceptual multi dimensional Logical B none C ALL D AER49 A business model is not a ___________ model. OLAP systems use concept of OLAP cube called a AER50 ______________ cube The data which is to be exported from Tally.ERP 9 can be in AER51 ________ format. system single dimensional Profit and Loss A/c mathematical hyper dimensional XML HTML ASCII AER52 In Tally ERP-9 Remote Access is also known as __________. Networking VB.Net Tally.Net AER48 Income Tax number of the Company will appear in which report? Cash/Bank Book None of the above None of the above None of the above B Tally.NET User B graphs, shapes C Establishing a data warehouse help desk and All of the above training users to effectively utilize the desktop tools D Accessing data store on a remote location using Internet in Local Data Remote Data Internet Data Tally.ERP9 is called____________. Tally.ERP9 can be classified user in two categories AER54 Local User Remote User Both A & B are___________. Which of the following is not a predefined security level provided AER55 Owner Public User Data Entry by Tally.ERP 9? The business model is represented in the graphical form using flowcharts, flow AER56 charts, pictures smart art, clip art ______________ and ________________ diagrams AER53 AER57 Which of the following is/are the data warehousing activity? Identifying and Defining the prioritizing correct level of subject areas to summarization to be included in support business the Data decision making Warehouse C C Adv IIT - Question bank ___________________ is the succession of strategies used by AER58 management as a product goes through its life cycle. _______ integrates supply and demand mangement within and across companies. __________ includes transportation from Suppliers and receiving AER60 inventory. AER59 AER61 Which of the following is not the service area of SCM? AER62 AER63 AER64 AER65 AER66 Online Analytical Processing Product Life Cycle Management Supply Chain Management C BPM SCM PLM CRM B Inbound Operations Outbound Operations Asset Management Sourcing planning Production planning A PLM CRM D Step 4 B migration C None of the above C Either A Or B A Business Processing C Logistics Which step of the ERP implementation involves, educating and Step 1 Step 2 Step 3 recruiting end users throughtout the implementation process? The system ____________ process will address issues such as software configuration, hardware acquisition and software implementation upgradation installation testing. A __________________ review is recommended to ensure that pre under process post all business objectives established during the planning phase are implementation review implementation achieved. In _________________ stages, auditors have access to post pre rudimentary ERP tools and capabilities for auditing security Both A & B implementation implementation configurations. Immediate posting and updation of books of accounts as soon as Interactive Immediate Real Time the transactions are entered. This is called as __________ Processing Processing Processing AER67 Which of the following ETDS forms are available in Tally.ERP 9? AER68 Business Processing Management The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility called __________________ AER69 ERP systems provide an access to the__________ data Business intelligence systems are ________ Decision Support AER70 Systems. Data warehousing technology is the process of creating and AER71 utilizing the company’s __________ The data in the Warehouse comes from the _________ AER72 environment and external sources. Form 26, Annexure to 26 Form 27, Form 26Q, All of the above Annexure to 27 Annexure to 26Q D File Validation Program File Validation Utility File Valuation Program File Valuation Utility B integrated distributed information driven isolated de-centralized A resource driven none A data-driven general data historical data operational data none B operational backup data none A Adv IIT - Question bank AER73 AER74 AER75 AER76 AER77 AER78 AER79 In essence, SCM integrates ___________ management within and across companies. _____________ including all fulfillment activities, warehousing and transportation to customers. Customer Relationship Management is a ________________ level strategy. Operational CRM provides support to ___________ business processes. Collaborative ______ ultimate goal is to use information collected by all departments to improve the quality of services provided by the company. Tally.ERP 9 follows the DES __________ method to safeguard the data. Immediate posting and updation of books of accounts as soon as the transactions are entered. This is called as __________ supply and demand Inbound operations outbound operations supply and sortage hybridbound operations business corporate strategic none B front office back office staff none A CRM's ERP SCM none A encryption decryption cryptography none A Interactive Processing Immediate Processing Real Time Processing Business Processing C supply and chain none A none B Form 26, Annexure to 26 Form 27, Form 26Q, All of the above Annexure to 27 Annexure to 26Q D File Validation Program File Validation Utility File Valuation Program File Valuation Utility B With ______________ technology the characters are reduced in AER82 breadth and user is allowed to input additional characters which would make the account name, entity complete and readable. Tally Fix Tally Adjust Tally Fit Tally AutoFit C In Tally.ERP 9 __________________ provides the user with AER83 administrator rights and the capability to check the entries made by the authorised users and alter these entries, if necessary. User-defined Security Audit Feature D Tally.NET Email facility C Either A or B None of the above B AER80 Which of the following ETDS forms are available in Tally.ERP 9? AER81 The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility called __________________ HTTP-XML based Unlimited multidata interchange user support __________________ is an enabling framework which Direct Web AER84 establishes a connection through which the remote user can Web Publishing Browser Access access the Client's data without copying/transferring the data. If we want the company to be connected automatically for Allow to Connect AER85 remote access on load, the property __________ needs to be set Contact On Load Company it as Yes. Adv IIT - Question bank ACS1 ACS2 ACS3 ACS4 ACS5 ACS6 ACS7 _______ is centralized Banking Application Software. Core Banking System _________has several components which have been designed to CBS meet the demands of the banking industry. Core Banking Solutions is a combination of an application Network devices software and ________ ______ is a large data housing infrastructure that provides high ATM Server band width access to its clients. Application Data centre servers are known as_____________. servers ________ is a method of creating virtual networks within a VLAN physical network. Data communication between ______ VLANs can be controlled 1 as per business requirements. ACS8 Bank mate is developed by the _______ ACS64 CBS Software resides in a Central application server which is located in the ___________ A________ that runs the core banking solutions (CBS) and is ACS65 centrally accessed by the branches. __________ are capable of being connected only when devices are connected to a switch. A special feature of STP is that _____________ number for any ACS70 outbound RTGS transaction is generated by the STP System. B NEFT None A Firewall IBAS IBDS A Data Centre IT EDP B Data Base Servers Web server All the above D LAN WAN MAN A 2 3 4 B Infosys HCL Technologies TCS I-Flex B ATM Data centre Middleware Web centre Central Office Data Centre. D Database Server Domain Name Server B Client version Firewall C Wide Area Network Domain Name Server Personnal Area Network Application Server Virtual Networks MAN WAN B PIN NO Uniform Transaction Reference None C ATM Server The _________of the application is capable of only entering the System version data at the end point that is branches. The application server would be placed in a trusted inside zone in Virtual Local Area ACS67 a separate ____________ Network ACS69 Complete Centralized Banking Solution Banking Solution CSB ACS66 ACS68 Application software would access the ________ Core Banking Solution Data base server LAN Unique Transation Referrence Central Application Server Application Version Local Area Network ATM DATA Server A A Adv IIT - Question bank _____________refers to the process of developing software which would produce the required output from the input ACS71 provided of course, using the necessary hardware and communication systems. The______________is essential to ensure that computer security ACS72 records are stored in sufficient detail for appropriate period of time. Application Development Software Development Server Development System Development D Review Management RTGS Log management Authorized Controller C The purpose of is a legal attempt the test is to at gaining access Ensure identify security Which of the following is “False“ in case of penetration testing in to protected recoverability of ACS73 vulnerabilities an IT environment of CBS? computer data in case of and then attempt systems or system failure. to successfully networks. exploit them. Well Unit test, system documented Implement new/ Which of the following is erroneous statement in case of Change test, integration process should changed ACS74 Management Control? test – all should be there programme as be carried out. incorporating all per schedule. the changes. With respect to the customer changing the Pin at the ATM which ACS75 procedure is the ”false“ procedure? IN CBS, changes to the application server are not made directly to it, instead done first on a __________ All the various servers in the central data centre are seggregated ACS77 through _______ ACS76 Old offset value Old Pin verified used to derive using HSM/SSM. new PIN. Natural Pin remains the same. Trail server Validate server Test Server LANs VLANs WANs This is often the most preferred test as it is an accurate simulation of how an outsider/hacker would see the network and attempt to break into it. It is important that correct latest version of programe is used but version number need not be changed. Old offset value erased and new offset value generated. None of the above MANs B D A C B Adv IIT - Question bank The __________ is a complete process in the computer so that it ACS78 ensures that data that is fed in conforms to certain prerequisite Consalidation Password Policy protection conditions. When the central Data base is busy with central end of day activities or for any other reason, the file containing the account Positive Balance Application Centralised Data ACS79 balance of the customer is sent to the ATM switch. Such a file is File Server base security called __________ ACS80 The IBDS is located in a ____________ Militarised zone The main components of Internet Banking system consist of Web server __________ Copy of the Anti Virus Software was updated promptly and ACS82 regularly at the Data Centre and pushed into all of the servers Hacking Method and in all the systems in the branches by ________ The __________which is also residing in the server at the branch ACS83 Sytem software actually does the banking operations. In Core Banking concept all the systems of the bank are ACS84 connected to the Central office by means of a connectivity which local line may be either a _________ or a dial up line. ACS81 The ________ is generated by the software and directly sent to ACS85 equipment for printed the Pin Mailer. 16 digit number ____________would also include the existence of built in ACS86 controls in the system to ensure proper processing of input data Output Control so as to provide the required output. ____________refers to an arrangement wherein the issuing bank ACS87 Letter of Credit acts on the request and instructions of a customer. Business _______________ is a process by which the bank ensures the ACS88 Recovery maintenance and recovery of operations. Planning At which phase of testing the version of software is called “ beta Programmer ACS89 version”? testing Validation D Central Office Data Centre. A City Zone State zone demilitarised zone D IBAS IBDS All the above D Push-pull method Both A &B None of the Above B utility software Application Software Application Server C Leased line Broadband None B Personal Identification Number Net transaction ID NO ATM No B Input control Process Control Data Control C Letter of Tax Letter of Payable Letter of Receible A Business Continuity Planning Disaster Recovery Planning None B User testing (a) & (b) both None of above C Adv IIT - Question bank ACS90 ACS91 ACS92 ACS93 ADB1 ADB2 ADB3 ADB4 ADB5 ADB6 ADB7 ADB8 ADB9 Network Network In an Organization structure of IT Department which of the administrator Administrator following function is incompatible? and Database and Security Administrator. Administrator. The number that is stored in the ATM switch is the difference of Offset value - Pin Pin No - Natural which of the following number? No Pin Hard copy of The information retrieval of transactions taking place at ATM Soft copy of Electronic Cash register located at remote locations is through _________ Electronic journal Journal The number that is generated as soon as the customer inserts Pin sent to Offset value Natural Pin the card in the ATM machine is __________ customer Which is not a Database management system. Unix Oracle Sybase The _________ operator is used to find the null records in a "= NULL" NULL IS NULL table. When you create relationship between two tables, the Common different data Text & Number Number & Text field's data type should be type Structured Sub Query Structured Query SQL stands for____________________. Question Language Language Language MS Acces 2010 reads and writes to the .accdb file format in Pages Encrypt pages Base Database chunks also known as_____________. Detailed Data Definition Data Defined DDL stands for ____________ Definition Language Language Language Detailed Data Data Maintaining DML stands for _____________ Maintaining Manipulation Language Language Language update have to update Whenever a tables gets update, the dependent query will Not update automatically manually To extract the records based on date field, which of the symbol $ # () should be used ADB10 The data can be entered into a table in the ____________ view. ADB11 In a Query the data can be sorted based Database Administrator and Security Administrator. Pin No - offset value Tape Librarian and database administrator. B Offset Value Natural Pin C (a) and (b) both A Card Number C Foxpro A All of the Above C Same data type D System Query Language B None of the above A Data Detailed Language A Detailed Manipulation Language C never update B "" B Design Datasheet Dataview All of the Above B Single column Multiple columns Both A and B None of the above C Adv IIT - Question bank ADB12 When you create a field using text data type in MS Access 2010, by default field will have ____ character. If we are using the same table for main query and sub-query,we ADB13 need to provide___________. ADB14 Update Query can be used to update_________ in MS Access 2010. ADB15 Delete Query can be used to delete ADB16 How many Primary key constraints can create in a table______. Unmatched Query can help to find records that have no corresponding reord in other tables. MS Access 2010 provides queries that can be used for obtaining ADB18 the aggregated results instead of individual records are____________. A function that Counts the set of values that satisfy the given ADB19 criteria in MS Access 2010 is___________. ADB17 ADB20 Aggreagate Query also known as___________. ADB21 Which Query wizard is used to find repeated records in a table? ADB22 Append Query is used to ______________ in a table in MS Access. 255 256 No need to Alternate names alternate name to the tables to the tables More than 1 Single Record record More than 1 Single Record record 258 128 A Aliases name to the tables Both A and C. D Both A and B Both A and B As many None of the above None of the above All of the Above C C A Only one Two FALSE TRUE Sum() Count() Avg() All of the above D CountA() Count() Countif() All of the above B Group By queries Total query Action query Both A and B D Simple Query Wizard Duplicate Query Wizard Cross table Query Wizard All of the Above B Add Records Delete Records View Records Update Records A B The only report It doesn't have as How does a query-based report differ in design to a report based The reports are type available is ADB82 It doesn’t many design on just one table? restricted in size. the Design options. Report. Type the text Use the Mailing How would you include some plain text into a mailing label Use the >> ADB83 directly into the Use the > button. label wizard text report? button. label. option. In a Microsoft Access 2010 report, the page numbering would ADB84 Report Footer Section Header Page Footer Page Header most likely be placed into the: B C C Adv IIT - Question bank If you wished to present a professionally looking form on screen ADB85 that would show all the necessary information, which of the following form design tools would you most likely use? ADB86 What are the benefits of an ACCDE file__________________________ in Access An .ACCDE file is a ___________ version of the original .ACCDB file. Which type of the query is used to accept the value from the ADB88 user while executing the query and fetch records accordingly To encrypt the databse in Access 2010 must be opened in the ADB89 __________________. ADB87 ADB90 FIX() is a kind of ____ function in MS-Access 2010. MS-Access 2010 has added new features of ______ to eliminate the need of VBA code Encrypting a database does not restrict access to database ADB92 objects, but to __________ the database. ADB91 ADB93 The setting for the Security option can be handled using_______________________ in Access 2010. Third Party Encryption Technology can also be applied to the database of Microsoft Access 2010. ADB95 To create a split database in MS Access 2010 go to which tab? After spliting database,frontend database ADB96 holds_________________. After spliting database,backend database ADB97 holds_________________. ADB94 All The tools of the form design control gallery. Form Wizard Columnar C Pivot Table Pivot Chart Reduces the size of the database Optimizes memory usage and improves performance. Fixed-down Locked-down Open-down None of the above B Update Query Delete Query Parameter Query D Make Table Query Open Secure mode Open Inclusive mode Math Date Macro Form Open Modify Protects the VBA code from being viewed or edited All of the above while still allowing it to run. Open Exclusive Open Read Mode mode None of the Text above None of the Report above Read File Tab File Tab ->New File Tab ->Access >Security Options, and Options, and Options, and selecting the selecting the selecting the Trust Centre tab Trust Centre tab Trust Centre tab from the Access from the Access from the Access Option window Option window Option window D C A A Write A None of the above B A TRUE FALSE Create Tab External Tab File tab Database Tools D Forms Query Report All of the above D Tables Forms Query Report A Adv IIT - Question bank ADB98 When an Access database is split, it creates two files_________________. A Data Access Page is a special type of _________ that allows users to interface with database using Internet Explorer. MS Access provide__________ datatype to create link to a web ADB100 page,file,or email address. ADB99 ADB101 To make a switchboard appear while opening the database. To add or delete buttons to Switchboard, which option is used in Switchboard Manager is used. The Switchboard Manager is a dialog box that allows creating a ADB103 switchboard for an Access database. ADB104 A macro can automate data entry in Access 2010. ADB102 ADB105 Which of the following data-type is not available in MS-ACCESS The validation can be defined at____________ level in Access 2010 A macro can be attached to an event of a ADB107 control_________________________. ADB106 ADB108 How to add switchboard in Access 2010? ADB109 The command Design Application performed action____________ on switchboard. A back-end primary database A new database database & front& secondary & Old database. end database database None of the above A XML page HTML Page Web page None of the above C Link Hyperlink Insert Attached B None of the above C Build Option B Set as Set as database Set as Form Switchboard startup Option in startup Option in startup Option in Access Option Access Option Access Option Add Option Edit Option Modify Option TRUE FALSE A FALSE TRUE B Text Number AlphaNumeric Date C Table Form Both A and B Report C A form A report A button All of the above D Click->File tabClick->File tab>Option Button- Click->File tabClick->File tab>>Quick Access >Quick Access >Option Button- >Option ButtonToolbarToolbar>Command not >Quick Access >Command not >Command not in RibbonToolbarin Ribbonin Ribbon>Switchboard >Switchboard >Switchboard >Switchboard Manager->Add- Manager->AddManager->AddManager->Add>OK >OK >OK >OK Opens a Opens the Close the current Opens a report in secondary Switchboard database Print Preview. switchboard. Manager. A C Adv IIT - Question bank Switchboard Manager only allows a maximum of __________command buttons on a switchboard MS Access 2010 provides a __________pane that contained large ADB111 list of actions to be chosen,enabling a wide range of commands that can be performed ADB110 ADB112 SQL is considered to be a __________ Which action in MS Access macro applies a fliter or query to a table,form or report. Opens a query in the Datasheet view, Design view, or Print ADB114 Preview which macro action used in MS Access. Among +, <>, MOD, AND, <= operator which operator has the ADB115 highest priority. ADB116 The Strcomp() function is a__________type function. ADB113 ADB117 The SGN() function is a ____________ type function ADB118 Which of the following symbol is used to write a sub query For the Non-Aggregate Total field, the criteria can only be ADB119 specified using the Where clause. ADB120 ACA1 To export an access table to an XML File, which of the below steps must be followed? In IDEA, import Assistant wizard is used to import data from____________. ACA2 What is the procedure for importing data into IDEA ? ACA3 IDEA exports data in a number of _______________________. Nine Eight Seven Six B Action List Action Catalog Action query Action Box B 2GL 3GL 4GL None of the above C DoFilter FindFilter ApplyFilter UseFilter C OpenQuery ShowQuery RunQuery FindQuery A + MOD AND <> B Math Financial Text Date & Time Math Financial Text Date & Time [] () {} # C A B TRUE FALSE Right-click the table and select Export ->XML Go to External Data ->Export, click on More and select XML Right-click the table and select send as XML Both A and B A Excel Access XML All of the above D File->Import Assistant-> Import to IDEA text In IDEA,Data Extraction select data form a file for ACA4 further___________ for creating a new file of logically selected Extraction records. What is step by step procedure for using Bendford's law function Data->Benford's ACA5 in IDEA ? Law A File->Select File->Import -> File->Import as -> Import -> Import Import to IDEA Import to IDEA to IDEA spreadsheet and database mail merge All of the above format A D Recording Investigation Sorting C Analysis>Benford's Law Sampling-> Benford's Law Tools->Benford's Law B Adv IIT - Question bank ACA6 A Benford's Law analysis is most effective on data________________. ACA7 In IDEA, blank value data can be extracted by using_________. In IDEA, Summarization, Pivot Table, Stratify, Duplicate Key ACA8 functions comes under which menu. In IDEA, Extraction, Sort, Indices, Search functions comes under ACA9 which menu. Text files that are organized properly fall into one of two types ADB37 are__________ To create an unmatched Query using wizard, minimum required ADB38 number of table or fields is_________. ADB39 While creating the query, the criteria can be set in ADB40 ADB41 ADB42 ADB43 ADB44 ADB45 ADB46 ADB47 In MS Access query which logical operator returns True if both the expressions compared are true. In MS Access query which logical operator returns True if either of the expressions compared are true. Enfore Referencial Integrity option is used to restrict enerting data in In MS Access left("Access",3) function will return__________. Which function is used to converts the text to lower case in MS Access 2010. Which function is used to remove leading or trailing spaces in a text in MS Access 2010. _____________ is contains a set of predefined functions in MS Acccess and helps build complex expression. Which of the following is a Database Software Without assigned numbers, such as Comprised of Without built-in bank accounts similar sized minimum and numbers and zip All of the above values for similar maximum values. codes and with phenomena. four or more digits. D @isblank() as Null Null Is Null A Data Analysis Sampling Relation B Analysis View Relation Data D Delimited files Fixed-width files Both A and B None of the above C one two three four B Only one More than One Field As many field All of the Above D IF AND AND Both AND LIKE AND B OR IF OR IS OR LIKE OR A Parent Table Child Table Any one table All of the Above B Acc3 Acc 3Acc B Lcase() Lowercase() Lower() Remove() Removetext() Trim() Expression Design Excel Expression Builder Outlook ess None of the above None of the above Expression elements C++ Expression Box Oracle A C B C Adv IIT - Question bank ADB48 Which of the following is not the characteristics of a Relational Table? ADB49 Which record will be retrieved if the query criteria is < #1/1/11#? ADB50 The tab in Expression Builder in which we write expressions is known as _____________. ADB51 The criteria expression LIKE?B*. ADB52 ADB53 ADB54 ADB55 ADB56 ADB57 ADB58 __________ queries are useful for summarizing information, and are somewhat similar to pivot tables in MS-Excel. While entering record in Datasheet view, in which order the records can be entered When you delete the record in form, it deletes the record from__________. Having clause is used in the aggregate query in MS Access 2010 The controls that are not linked to any field of the table or query on the form are known as ________. Which property of the form can be used to insert a background image in MS Access 2010? ___________ is a report that is inserted in another report in MS Access 2010. ADB59 A bound main report is based on a ______________ and its _____________ contain realted information. ADB60 A___________used to compare multiple values of categories or differences over a period of time. Each Table row represents a twoThe order of the Each column has Each row/column dimensional rows and a specific range intersection structure columns is of values known represents a composed of immaterial to the as the Tuple single data value rows and DBMS domain columns D All values less or more than 1,195 All of above C Expression Builder window C Expression Elements Value less than Records with 95 characters date before 2011 Operator Button Expression Box Will match all Will match all Will match all Will match all text having text starting from text ending from text starting with second character B B a digit as B Select query Crosstab query Action query Parameter query Alphabetical Order At the end of the Any where in the Beginning of the table table table Form but not in Table but not in Form only Form & Table table Form FALSE TRUE Unbounded ActiveX control Graphics Control Bound Controls Controls A B B D B B Caption Background Record Source Picture D Inner-Report Sub-Report Inside-Report Insert-Report C Table or query,InnerReport Table or query,MainReport Table or query,SubReport None of the above C Pie Chart Area Chart Bar Chart Column Chart D Adv IIT - Question bank ADB61 A________used to compare trends over a period of time. To create a read-only copy of the database, which of the ADB62 following file format can be used? The database administrator created a split database and created ADB63 a front-end database and back-end database file.Which of the file should be stored on the server ? ADB64 To make database package and digitally sign using which option in Access 2010 ? In which formats can the Collect Data through email message feature can send the data entry form? Once a mail is sent using the collect data through email message ADB66 feature in Access 2010. The mail status can be checked using________________. The ___________ type of data cannot be collected using Collect ADB67 data through email messages. ADB65 ADB68 What is the memo data type field used for? ADB69 The filter By selection feature allows you to filter: ADB70 Which editor was provided for use with Access Basic? ADB71 How do you update Pivot Table report data after changes are made to the source data? ADB72 What are the different views to display a Table ? Pie Chart Line Chart Bar Chart Column Chart B .ACCDB .ACCDE .MDW .ACCDT B Front-end database Back-end database Both of them None of them B FileFileFile->New->Save File->Save as>Save&Publish>Save&PublishDatabase as>Save Database >Save Database >Save Object as>Package and as->Package and as->Package and >Package and sign sign sign sign HTML and Visual Basic Access Forms Excel attachment InfoPath Application A A Export to Outlook Options in Tool menu of Access Manage replies All of the above C Text Number Date/time AutoNumber D To add table To store objects created in other programs For long text entries For shout text entries of no more than 255 characters C Records that meet any of All of above several criteria you specify The Visual Basic The QuickBasic Notepad All of above 1.0 editor editor Save your Click the report, Select the Pivot changes, close and on the Pivot Table worksheet the workbook, Table toolbar, All of the above and press F9 on and then reopen click the refresh the keyboard it. data button Pivote Table & Datasheet View Design View All Of Above Pivot Chart View Those records that match an entity in a field Records based on a criterion you specify A B C D Adv IIT - Question bank Which Of The Following Creates A Drop Down List Of Values To Choose From? A __________ Enables You To View Data From A Table Based On ADB74 A Specific Criterion The Database Language That Allows You To Access Or Maintain ADB75 Data In A Database ADB73 ADB76 ADB77 ADB78 ADB79 ADB80 ADB81 Ole Object Hyperlink Memo Lookup Wizard D Form Query Macro Report B DCL DML DDL None Of Above A Authorizing Insert, Update Or Access And Other DCL Provides Commands To Perform Actions Like Delete Records None Of Above Control Over And Data Values Database Network Relational Object Oriented Structureed Which is not a Database Model ? Database Model Database Model Database Model Database Model Which Of The Field Has Width 8 Bytes? Memo Number Date/time Hyperlink This Is The Stage In Database Design Where One Gathers And List Establishing None Of The Data Definition Data Refinement All The Necessary Fields For The Database Project. Relationship Above Change The Structure Of Tables The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A ___________ Between Tables What is the purpose of the Switchboard Manager in Microsoft Access 2010? ACA46 Which of the following is a benefit of using CAATs? AOA1 Is there a fixed qualification for internal auditor_________. __________________ refers to use software/applications to automatically perform tasks such as accounting,preparing trial AOA2 balance, financial statements etc. and electronically transmit data or information using internet.. Relationship Join Query To build a main Creates the To allow the user switchboard macros used to to switch from form that program an one database file controls all other automatic to another. forms. application. Identify an audit File an FIR based finding w.r.t. on audit finding materiality in an IT environment TRUE FALSE ERP Office automation C D C A None Of These A To allow changing from one report to another. A To give Investigation of assurance to fraud in audit customers about area the performance of the company B B Either A or B None of the Above B Adv IIT - Question bank ________,___________,__________ are commonly referred to AOA3 as CIA in information security parlance. Confidentiality,In Confidentiality,In Confidentiality,In Confidentiality,In tegrity and tegrity and tegrity and tegration and Availability Authentication Access rights Authentication A AOA4 _____________means information available in the organization should not be altered or modified by unauthorized personnel. Confidentiality Integrity Availability Authentication B AOA5 The process of identifying an individual, usually based on user id and password in an organization is called______________. Availability Authentication Confidentiality Integrity B Which of the following is not a software equipment required in a AOA6 CA's office? Resource allocation and scheduling Client management HR and Payroll None of the Above D AOA7 Which of the following is not an application arranged by ICAI? ICAI-XBRL suite K-DOC ICAI-TOC D 2 3 5 B Private Branch exchange Public Branch exchange C AOA8 How many stages are there in the sales cycle? AOA9 PBX stands for ________ Which of the following will not appear in the home page of KDoc? To change an email header so that the message appears to have AOA11 originated from someone or somewhere other than the actual source is known as___________. AOA10 AOA12 To playfully satirize a website is known as_____________. _________is the complete package to manage the billing AOA13 requirements of a CA firm on cash system of accounting. AOA14 Which of the following is not a/an feature of eSecretary? AOA15 Annual return preparation can be done using ________. AOA16 ________is correspondence automation & management software that is seamlessly integrated with Microsoft Office. Private Exchange Public Exchange Branch Branch Billing and Accounting 4 Powerpoint Word Paste Document My Templates C Email middle attack. Email Spoofing. Email hacking. Email tracking B Web tapping Web Interception Web spoofing Web threating C K-DOC application C Share certificate printing D Payroll A ICAI-ROC application B Payroll eSecretary Contact Management ICAI-ROC application K-DOC application Greeting Management K-DOC application eSecretary Billing and Accounting software Email Management ICAI XBRL Software ICAI XBRL Software Adv IIT - Question bank ________ is an independent,objective assurance and consulting AOA17 activity designed to add value and improve an organization's operations. Which of the following is/are the main purpose of the internal AOA18 audit? As per _____________of the Income tax Act,every person AOA19 carrying on business or profession is requires to get his accounts audited by a CA before the "specified date". AOA20 FEMA Stands for _______________. Which application helps the management to allocate the revenue AOA21 to the credit of the right employee who identified the opportunity? AOA22 Who has full privileges in the financial accounting application? _________is the centre point of the financial accounting AOA23 application as any transactions having financial impact carried out in any other module will reflect in this module. In Financial Accounting Application,the transactions flow from GL AOA24 (General ledger) to other modules. Which of the functionalities is not provided in the purchasing AOA25 module of Financial Accounting Application. In Financial Accounting Application,automatic sequence number AOA26 of documents control is not required in which of the following module? Which module of Financial Accounting Application can be used AOA27 for assigning credit limit to customers? AOA28 Which of these will trigger/alert for timely payment ? Statutory audit Tax audit Internal auditiing None of the Above C Financial reporting Operations of the organization Both A and B Either A or B C Section 45 Section 44AD Section 43B Section 44AB D None of the Above C Foreign Exports Management Act Resource allocation and scheduling Database administrator Financial Foreign Exchange Enterprise Managament Act Management Act Client management D Account administrator Document Management Systems System administrator User Administrator C AP module GL module AR module FA module B TRUE FALSE Evaluation of Vendors Knowledge management B Invite and Receipts of analyze Comparison with goods or service quotations from budgets vendors D C Purchasing Accounts Payable Expense Management Purchasing Sales Accounts Payable Accounts Payable Accounts Receivable Expense Management Fixed assets Accounts Receivable Bank Reconcilations B C Adv IIT - Question bank We can manage interviews,offers and job vacancies by using AOA29 which of the application? AOA30 ___________provides information about updation of project cost based on time spent by employees on various projects. AOA31 Which of the follwing is not a/an functionality provided by PMS? ___________automates the calculation of salary for taking inputs AOA32 from the timesheet application, leaves from Leave Management System and salary details from the HR master data. AOA33 Which of the follwing is not a control in Leave Management System? AOA34 Permanent Audit File are obtained once but updated on __________basis. AOA35 In Permanent Audit file, _______ is not the key data documented. AOA36 The Document Management Sytem offers the features___________. ________is a type of training in which user logon on the training server with a user ID and password. In some cases, trainee is supposed to appear for the AOA38 examination/test at the end of the training is____________. ________ are the hardware/infrastructure equipments used in a AOA39 CA firm. AOA37 Resource allocation and scheduling Performance management system HR and Payroll applications Knowledge management None of the Above B HR management system Payroll Timesheet application D Employee Prepare Capture the Key Automated alerts designation and summary or bell Performance for pending reporting curve analysis of Indicators appraisals structure all employees B Payroll System Knowledge management System C Excess leave Error free capture of leave details Approval workflow C yearly monthy quarterly B Timesheet System HR management System Reduce administrative burden on HR half-yearly Copies of Copies of clients’ Client’s important Organization incorporation accounting contracts or long chart documents like manual term lease MoC agreements Cost effective to Role based Complete audit maintain the All the Above access trail documents in soft copy Classroom Internal Training E-Learning E-Training Training Classroom E-Learning Virtual Learning All the Above Training Application PC WAN All the Above Server C D B B D Adv IIT - Question bank AOA40 Which of these is/are the standard email program used in an organization? AOA41 Which of the following is not a characteristics of WAN? AOA42 AOA43 AOA44 AOA45 AOA46 AOA47 _________is protection of information assets from threats to preserve their value. Which types of information assets need to be secured in a CA Office? The extent and level of _________ would depend on the nature of information. __________ of information might be affected due to denial of service attack or some other reasons. __________means the sender cannot deny having sent a message and receiver cannot deny receiving the message. Risk may not be _______ in nature. ACA10 In IDEA, Append functions can be used to_________. ACA11 In IDEA, Statistics functions can be applied on_________. In IDEA, increment value in Stratification function can be fixed or free interval. ACA13 In IDEA, Stratified Random functions is a part of which menu. ACA12 Microsoft Exchange Lotus Notes Most WANs are owned by only one organization. Compared to LAN, its transmission speed is low Confidentiality Integrity Information Security None of the above C Client data Own data Own documents All the above D Availability Confidentiality Integrity Authentication B Integrity Authentication Confidentiality Availability D Non-Repudiation Integrity Authentication Confidentiality A reputational financial Add data at the end operational vulnerable D Sort Filter B Numeric Data Date Data Both A and B None of the above C FALSE TRUE Analysis Data Relation Sampling IDEA Unix Calculation Editor SOFTCAAT D C Testing Editor A File->Select Export -> Print Report. C Import data ACA14 Which of the following is not an Audit Software ACL Using which functions to perform more complex calculations and ACA15 Equation Editor exception testing in IDEA? ACA16 Which is the step by step procedure for reporting in IDEA. function Editor Click on Create Report button on File->Printthe Operation >Create Report toolbars->Report Assistant. Both A and B None of the Above Switches are WAN uses only used to connect private networks. LAN and WAN C B B Both A and B Adv IIT - Question bank Which of the following are categories of computer audit function ? ACA18 In the following list which is not an audit function ? Items of audit interest Sorting ACA19 In the following list which is a audit function? File Definition Review Programming standards Stratification Understand program specifications Detection ACA17 ACA20 Which is the following step involved in a source code review methodology ? ACA21 In IDEA which functions should be used to find repeated values ? In IDEA, Stratification functions can be applied on which type of data ? In IDEA,Summarization accumulates the values of Numeric fields ACA23 for each____________. In which sampling,selecting sampling units using a fixed interval ACA24 between selections is_______________. ACA22 ACA25 ACA26 ACA27 ACA28 ACA29 ACA30 Ensures that all combinations of sampling units in the population have an equal chance of selection is____________. In Audit tool, to built relation between two tables, both table should have_____________. Input Control method is a part of Application Control Group. Which is the following type of check that can be run when data is input through terminal ? Which is the following is the correct types of Field checks on processed data ? Which is the following is the correct types of Record checks on input data ? ACA31 Which is the correct types of Batch Checks ? ACA32 Which is the need for table level tests ? Data Analysis System validation Sampling All of the above D Export Print Preiview Append D B Formulate flaw hypotheses All of the above D Exclude Sequence checking Filter A Numeric Data Date Data Character Data All of the above D Primary Key Unique Key Secondary Key Composite Key B Random Systematic All of the above None of the above B Random Systematic All of the above None of the above A Common Table Common Field Common record None of the above B TRUE FALSE Field check Filter check Compare check Data check A Overflow Range Sign Test All of the above D Resonableness Compare Un-compare Randomness A Control Totals Outdated checks On-line dated checked Mixed dated checks A Data Integrity Controls are required for authorization Both A and B None of the above C Filtering A Adv IIT - Question bank ACA33 ACA34 ACA35 ACA36 ACA37 ACA38 ACA39 Which is the following is the major points with respect to inter table tests ? This may make the entire child Their Master & tables referenced Child relationship by the master reference the field in the main table from one table unanother available Both A and B Which is the software used by the auditor to take a view of a file of data or transaction passing through the system at a particular Mapping Snapshots Modelling point of time ? Which is the software used by the auditor to compare the source Souce Model Code compasion version of a program with a secure master copy ? comparison comparison Which is the techniques whereby the auditor arranges or manipulates data either real or fictitious, in order to see that a Debug Testing Logic Testing Off-line Testing specific program or screen edit test is doing its work ? Which is the software used by the auditor to list un-used Log Analysis Mapping Program Library program instruction ? Which is the software used by auditor to read and analyze Log Analyzers Machine level Executable level records of machine activity ? Software Which of the following reason strongly call for Control & Audit Lack of Visible Absence of Input All of the above Function ? Transaction Trail Document ACA40 Which is the correct types of Field checks on input data ? Missing data Blank data Both type Test whether the To ensure the To ensure the overall system Which is the major points to be consider with respect to System input data is valid entered data is ACA41 meet the tests ? before entering saved without requirement the value fail specifications In Data analysis techniques, which law is used to idenfity ACA42 Bend Law Benjamin law Benford Law statistical report on numeric data ? Which is not a feature of File reorganization with an auditor ACA43 Filtering Sorting Indexing perspective? None of the above C Source comparison B Exe comparison A On-line Testing D All of the above B Systax level C None of the above None of the above C C All of the above A British Law C Linking the identified files A Adv IIT - Question bank ACA44 What do you understand by the term, “Data Consistency” in using CAATs? Functions involving use of arithmetic operators, which enable ACA45 performing re-computations and re-performance of results is an example of? Establish relationship between two or more tables as required. Identify fields, which have null values. Statistical function Arithmetic function Identify data, which are not in Identify whether agreement with all fields have the regular valid data. format. Logical function Relational function C B