Uploaded by channalhanamant

Advanced ITT PDF 2

advertisement
Adv IIT - Question bank
q_id
q_desc
op2
op3
op4
Expansion
Markup
Language
W3C
Expansion
Makeup
Language
W1C
Extensible
Markup
Language
W2C
EXtensible
Makeup
Language
W4C
C++
Data Type
Definition
(.mlx)
JAVA
Data to Data
B
(.xsd)
HTML
Document Type
Definition
(.xml)
A
B
(.xlm)
B
Review
Add-Ins
Developer
Data
C
TRUE
FALSE
3
2
1
4
A
B
(.xml)
(.xsd)
(.xlm)
(.mlx)
B
Visual Basic for
Applications
.xlsx
Visual Basic for
Applets
.xlsm
Visual Basic for
Apple
.xlsv
None of the
above
.xlsw
3
2
4
1
Analysis of
Variance
YEAR()
3
AXL1
XML stands for_________
AXL2
XML is a ___________ Recommendation.
AXL3
XML is a language that is very similar to which language ?
C
AXL4
DTD stands for ___________, which is called XML Schema.
Direct to Direct
AXL5
The extension of a XML document is ______________.
To create a XML Map from XML schema, Go to which Tab in
Excel ____________.
XML is case-sensitive ?
AXL6
AXL7
AXL8
AXL9
Excel works primarily with ________ types of XML files.
What is the file extension of Schema file which contain schema
tags ?
AXL10 VBA stands for_______________ .
AXL11 Macro enabled workbook file extension is _______________
AXL12 There are _________ ways to open a Macro enabled workbook.
AXL13 ANOVA stands for___________
AXL14 A function doesn’t require an argument is___________.
In Excel, there are __________ functions for calculation of
AXL15
depreciation.
AXL16
SLN function used to calculate depreciation as
per_________________.
ans
op1
DATE()
TODAY()
Analog of
Variance
MONTH()
4
5
6
Analysis of Value Analysis of Varity
For calculation of For calculation of
For calculation of For calculation of
depreciation as depreciation as
depreciation as depreciation as
per Variable
per Double
per Sum of Years per Straight Line
Declining Balance Declining Balance
Digit Method.
Method.
Method.
Method.
C
A
B
A
D
B
B
B
Adv IIT - Question bank
AXL17
AXL18
AXL19
AXL20
SYD function used to calculate depreciation as
per_________________.
For calculation of For calculation of
For calculation of For calculation of
depreciation as depreciation as
depreciation as depreciation as
per Variable
per Double
per Sum of Years per Straight Line
Declining Balance Declining Balance
Digit Method.
Method.
Method.
Method.
A
DB function used to calculate depreciation as
per_________________.
For calculation of
For calculation of For calculation of For calculation of
depreciation as
depreciation as depreciation as depreciation as
per Double
per Sum of Years’ per Straight Line per Declining
Declining Balance
Digit Method.
Method.
Balance Method.
Method.
C
DDB function used to calculate depreciation as
per_________________.
For calculation of
For calculation of For calculation of For calculation of
depreciation as
depreciation as depreciation as depreciation as
per Double
per Sum of Years’ per Straight Line per Declining
Declining Balance
Digit Method.
Method.
Balance Method.
Method
D
VDB function used to calculate depreciation as
per_________________.
For calculation of
For calculation of
For calculation of For calculation of
depreciation as
depreciation as
depreciation as depreciation as
per Variable
per Double
per Straight Line per Declining
Declining Balance
Declining Balance
Method.
Balance Method.
Method.
Method.
A
AXL21 PV Ratio stands for _____________________.
AXL22 BEP stands for __________________________
AXL23 Data Validation available in which Tab?
___________function returns value from a given data range
AXL24
based on row and column.
AXL25 Which function categories are not available in Excel.
AXL26 PMT Function is belongs to which categories of Excel function ?
AXL27 NPV stands for_______________________________
Point Volume
Ratio
Point Varaiance
Ratio
Formulas
Insert
Profit Volume
Ratio
Balance Equal
Point
Data
VLOOKUP()
HLOOKUP()
INDEX()
LOOKUP()
C
Statistical
Engineering
Math & Trig
Arts
D
Text
Logical
Financial
Math & Trig
C
Net Present
Value
Net Proper Value
Net Present
Variance
Negative Present
Value
A
Break Easy Point Break Even Point
Profit Variance
Ratio
C
Break Equal Point
B
Developer
C
Adv IIT - Question bank
AXL28 _______function uses a fixed rate to calculate depreciation
AXL29 Which of them is not a Conditional Operators symbols?
Strings are to be always enclosed in double quotes when used in
AXL30
a formula.
AXL31 Parentheses are used to change the order of calculation.
AXL32 In Excel the function =Abs(-4) returns __________.
_______ function returns the remainder after a number is
AXL33
divided by a divisor.
VDB
SYD
SLN
<
</
<=
<>
TRUE
FALSE
A
TRUE
FALSE
-4
2^2
4
None
A
C
DIVISOR()
MOD()
MODE()
REMAINDER()
B
Formulas >
Formulas >
Formulas >
Formulas >
If User want to display the formulas rather than the results of the
Formula Auditing
Formula Auditing
AXL34
Formula > Show
Function > Show
formulas then choose______________.
> Show
> Function >
Formulas.
Formulas.
Formulas.
Show Formulas.
AXL35
_______________ reveal about the current and future financial
condition of the company.
Cash and
Property.
Clear Ratio
None of the
above
Clear Rate
Quality Ratio
Quality Rate
Quick Ratio
A
D
A
None of the
above
C
Data
AXL37 CR stands for___________________.
Goodwill and
Patents.
Current Ratio
AXL38 QR stands for___________________.
Quick Rate
AXL39 Debt – Equity Ratio =Long term debt / Shareholders funds.
AXL40 ACP stands for _____________.
AXL41 FATR stands for _____________.
AXL42 A _________ can be a numerical fact.
AXL43 __________ stands for reduction in value of fixed assets.
Value of fixed assets is generally reduced over the period of time
AXL44
due to __________.
AXL45 Profit equals to __________.
FALSE
Average
Average
Average
collection
collection price
collection period
payment
Fixed all turnover Fixed assets test
Fair assets
ratio
ratio
turnover ratio
Statistic
Sale
Salary
None
TRUE
Depreciation
Wear & Tear
B
Financial
statements
investment and
securities.
Current Rate
Report
AXL36 Which of them is a Intangible assets?
A
B
DB
Data
Change in taste
of people
Purchase - Total
Sales - Total Cost
Cost
Document
Change in
technology
Product - Total
Cost
Fixed assets
turnover ratio
Number
C
A
D
Detail
A
A
All of the Above
D
Manufacturing Total Cost
B
Adv IIT - Question bank
AXL46 Examples of fixed cost are __________.
AXL47
AXL48
AXL49
AXL50
AXL51
Cash budget is prepared for planning for future as far as
movement of cash is concerned.
Discounting is not the process of determining the present value
of a payment or a stream of payments that is to be received in
the future.
PAN must have ________ characters only.
Sample means the units or items selected for study or
consideration and population means the total set of data used
for selection of samples.
_______________ analysis relates items in the financial
statements in a manner that drives out performance information
about the company.
How to restrict to run a macro automatically when starting
AXL52
Microsoft Excel?
AXL53
AXL54
AXL55
AXL56
AXL57
AXL58
AXL59
AXL60
Which option allows you to Bold all the negative values within
the selected cell range?
_____________ allow us to perform calculations or operations
that would otherwise be too cumbersome or impossible
altogether.
Statistical functions in Excel help to calculate
__________________
Discounting Factor formula is ___________________
________________ is considered as non cash expenditure and
occupies a prominent place in Profit & Loss Account.
The value which can be realized at the end of life of fixed asset
by selling it is called _________________
____________ is prepared for planning for future as far as
movement of cash is concerned.
____________ is the process of determining the present value of
a payment or a stream of payments that is to be received in the
future.
Salary of
administrative
staff
office rent
TRUE
FALSE
A
TRUE
FALSE
B
8
10
TRUE
FALSE
Financial ratio
Price
Both A and B
11
None
12
C
B
A
Perodic
Hold down the Hold down the Hold down the
SHIFT key during CTRL key during ESC key during
start up.
start up.
start up.
Conditional
Zero Formatting
Bold Formatting
Formatting
Report
Hold down the
ALT key during
start up.
Negative
Formatting
A
A
B
Cell referencing
functions
Absolute
functions
Worksheet
functions
Round( )
functions
C
Arithmetic Mean
Median
Mode
All of the above.
D
= n / (1+a) - r
= 1 + (1/r) * n
= 1 / (1+a) ^ 2
= 1 / (1+r) ^ n
D
Cash Flow
Depreciation
Fund flow
Expenditure
B
Salvage Value
cost
life
Factor
A
Capital Budgeting
Cash budget
Both A& B
Actual Budget
B
Discounting
None
C
Marginal costing Capital Budgeting
Adv IIT - Question bank
AXL61
AXL62
AXL63
AXL64
AXL65
AXL66
AXL67
AXL68
AXL69
AXL70
AXL71
AXL72
AXL73
____________ is one of the core principals of finance and is the
primary factor used in pricing a stream of cash flows, such as
those found in a traditional bond or annuity.
XML schemas in Excel are called XML _____________.
Excel allows us to use various functions and even simple
mathematical calculations which can be used for
_____________.
Which cell reference show the reference to other sheet or
reference to other workbook in excel ?
Which of them is not a Range References?
Marginal costing
Discounting
PMT
None
B
Schemas
Maps
Markups
C
Financial analysis
Equity analysis
Elements
Leasing decisions
and the list goes
on
All of Above
D
Sheet2!C4
Sheet2{C4}
Sheet2<C4>
A
Sheet2(C4)
$A$1:A4
A1, A2 , A3, A4
A$1:A$4
EIBT / Debt
ETIB / Debt
EBTI / Debt
Interest Coverage Ratio equals to _________.
interest
interest
interest
If particular workbook have to open each time Excel started,
AUTOSTART
EXCELSTART
AUTOEXEC folder
XLSTART folder
where the workbook should be placed?
folder
folder
There is a
There is an
Further changes Further changes
If the cell B1 contains the formula=$A$1, which of the statement
relative
absolute
in value of A1 will in value of B1 will
is true ?
reference to cell reference to cell
not affect B1.
not affect A1.
A1
A1.
__________ is a computerized mathematical technique that
Finanical
Monte Carlo
Corporate
Personal Finance
allows people to account for risk in quantitative analysis and
Planning
Simulation
Planning
Planning
decision making.
________ is the process of meeting the financial goals through
Corporate
Monte Carlo
Financial
Personal Finance
the proper management of finances.
planning
simulation
planning
planning
___________ can be defined as the process of setting the
Corporate
Monte Carlo
Corporate
Decision Tree
procedures in the organization for achieving the predefined
Planning &
Simulation
Planning
Analysis
goals.
Analysis
________ shows ability of company to pay back long term loans
Interest
Total Fund
None of the
along with interest or other charges from generation of profit
Debt Assets Ratio
Coverage Ratio
Ration
above
from its operations.
_____________________is the simplest method of comparing
different stocks at a point of time to make investment decisions.
A1:A4
EBIT / Debt
interest
Earnings Per
share
Fixed Asset Over
ratio
Price Earnings
Multiple
Gross Profit Ratio
C
A
D
B
B
C
B
B
C
Adv IIT - Question bank
<?xml
<?xml
<?xml
<?xml
version="3.0"
version="2.0"
version="1.0"
version="0.0"
encoding="ISO- encoding="ISO- encoding="ISO- encoding="ISO8859-1"?>
8859-1"?>
8859-1"?>
8859-1"?>
<TagName>Data </TagName>Data </TagName>Data <TagName>Data
</TagName>
<TagName>
</TagName>
<TagName>
A
AXL76 The exact syntax of PMT function is________________.
PMT(nper, rate,
pv, [fv], [type])
B
AXL77 The exact syntax of IPMT function is__________________.
IPMT(rate, nper,
pv, [fv], [type])
IPMT(pv, rate,
per, nper, [fv],
[type])
AXL78 To see the XML Map user must go ______________.
Developer>XML>
Source
Developer>
Source
AXL79 Deletion of XML Map is done through __________.
Directally Delete
Command
Delete Button
Annual Income
DOB
status of assess
All of the above.
D
Easy Monthly
Installment
Equating
Monthly Income
Equal Monthly
Installement
Equated monthly
installment
D
IPMT
PPMT
PMT
None of the
above
B
Snowball
sampling
Sampling
Systematic
sampling
Simple random
sampling
B
Clustered
sampling
Sampling
Systematic
sampling
Simple random
sampling
C
Snowball
sampling
Convenience
sampling
Systematic
sampling
Simple random
sampling
D
Quota Sampling
Sampling
Snowball
sampling
Simple random
sampling
C
AXL74 The very first line of code of XML file is_____________.
AXL75 Every bit of data has to start and end with an identical tag
AXL80 Method of tax calculations shall change according to _________.
AXL81 EMI stands for ______________.
AXL82
AXL83
AXL84
AXL85
AXL86
Which function is used to calculate the principal portion in every
installment ?
________ is a process used in statistical analysis in which a
predetermined number of observations will be taken from a
larger population.
In __________, Individuals are selected at regular intervals from
a list of the whole population.
In ______________ each individual is chosen entirely by chance
and each member of the population has an equal chance, or
probability, of being selected.
Which method is commonly used in social sciences when
investigating hard to reach groups?
PMT(rate, nper, PMT(rate, pv,
PMT(pv, rate,
pv, [fv], [type]) nper, [fv], [type]) nper, [fv], [type])
IPMT(per, rate, IPMT(rate, per,
nper, pv, [fv],
nper, pv, [fv],
[type])
[type])
File
Menu>Options>A None of the
dd in>Excel Add
above.
In>XML
XML Maps Dialog
None of the
Box
above
C
D
A
C
Adv IIT - Question bank
AXL87
AXL88
AXL89
AXL90
AXL91
AXL92
AXL93
AXL94
AXL95
AXL96
AXL97
__________ are useful for quick reading and easy understanding,
Balance sheet
particularly for top management.
It is a process in which a business determines whether projects
Business
such as building a new plant or investing in a long-term venture
Investment
are worth pursuing.
Popular methods of capital budgeting include _________ and
discounted cash
payback period.
flow
_________ is the value of all future cash inflows less future cash
Net present
outflows as on today.
value
___________is the process of defining and analyzing the dangers
Sensitivity
to individuals, businesses and government agencies posed by
analysis
potential natural and human-caused adverse events.
__________ which is used more often, does not involve
Sensitivity
numerical probabilities or predictions of loss.
analysis
________ are generally used to present information in a simple
and better way and also be used to analyse the risk in a better
Graphs
way.
It is a technique used to determine how different values of an
Decision Tree
independent variable will impact a particular dependent variable
analysis
under a given set of assumptions.
_______ involves computing different reinvestment rates for
expected returns that are reinvested during the investment
Scenario analysis
horizon.
Total Principal
NPER stands for______________________________
Value
Which function that is used to calculate the payment for specific
SUMIF()
loan terms ____________
AXL98 ________helps to break down the Return on Equity
AXL99
_______ is a common method for financing property, facilities,
and equipment.
AXL100 Find the correct sequence in case of XML file, are
Summary reports
IRR
NPV
B
Capital Budgeting
Capital
Investment
Investment
management
B
All the above
D
PMT
A
internal rate of
net present value
return
Working capital
IRR
Risk analysis
Qualitative risk
Scenario analysis
analysis
B
Risk analysis
Qualitative risk
Scenario analysis
analysis
C
Sparklines
Both A& B
Charts
D
Sensitivity
analysis
Both A& B
Neither A &B
B
Sensitivity
analysis
Decision Tree
Analysis
None
A
Net Per value
Total Interest
Value
PMT
COUNTIF()
Du Point Analysis
Return on
Investment
Profitability
Ration
Number of
Periods
None of the
above
None of the
above
Mortagage
Leasing
Rent
All the above
B
Structure and
store
information.
Store and
transport
information.
A
Structure, store, Store, structure,
and transport
and transport
information.
information.
D
B
A
Adv IIT - Question bank
Programming of Macros is done in programming Language
___________.
As Bank auditors,Many Banking applications generate text files in
AXL102
____________.
AXL101
AXL103 Macro security is enabling through __________.
AXL104 In Excel, Sampling option is available in ___________ .
AXL105 Requirements for preparation of cash budget in Excel.
AXL106 ROE stands for __________.
AXL107
AXL108
AXL109
AXL110
AXL111
AER1
AER2
AER3
VBA
ASP.Net
Java
C++
A
Txt format
Csv format
Both A and B
Nither A Nor B
C
Developer
Developer
Developer
Not Required tab>Code>Macro tab>Modify>Mac tab>Controls>Ma
Security
ro Security
cro Security
Insert
Data Analysis
View
None
Knowledge of
Knowledge of
Knowledge of
Knowledge of all
formatting an
cell linking &
accounting
of the above.
excel sheet
basic formulae
Return on
Return of
Recall on Equity Return on Equity
Enquary
Equalisation
___________ is a statistical procedure that uses sample evidence
and probability theory to determine whether a statement about
Confidence
the value of a population parameter should be rejected or should
Interval
not be rejected.
____________ is a statistical tool used to create predictive
Regression
models.
equation
__________ shows the ability of a company to pay its current
Quick Ratio
financial obligations.
___________ shows dependency of a firm on outside long term
Quick Ratio
finance.
To record a Macro in relative mode,"Üse Realtive References"
Developer Tab
available in which tab of excel ?
An _____________ is a group of people with a common goal,
having certain resources at its disposal to achieve the common
Company
goal.
________________ include money, manpower, materials,
Costing
machines, technologies etc.
___________ is a collection of activities that make one or more
kinds of input and creates an output that is of value to the
Business Model
customer.
B
B
D
B
Hypothesis
ANOVA
None of the
above
B
Regression
Multiple
Regression
Single Regression
C
Current Ratio
Liquidity Ratio
Solvency Ratio
C
Leverage Ratio
Liquidity Ratio
Solvency Ratio
B
View Tab
Both A and B
Nither A Nor B
C
Enterprise
Organization
Concern
B
Production
Sales
Resources
D
Business
Function
Business Process
Business
Operation
C
Adv IIT - Question bank
AER4
AER5
AER6
AER7
AER8
Information systems can be designed so that accurate and timely
Integrated
Isolated
data are shared between functional areas. These systems are
Information
Information
called _______________________________.
Systems
Systems
The approach to ERP is to first develop a ______________
Business
comprising the business processes or activities that are the
Business Model
Function
essence of a business.
Online Analysis Online Analytical
OLAP stands for _________________.
Processing
Processing
________________ is a tool that refers to skills, processes,
Data
technologies, applications and practices used to facilitate better,
Data Modeling
Warehousing
accurate and quicker decision making.
Integrated
Business Intelligence Systems are data-driven
Information
Information
___________________.
Systems
Systems
Non-Integrated
Information
Systems
Non-Isolated
Information
Systems
A
Business Process
Business
Operation
A
Online Analytical
Programming
None of the
above
B
Business
Modeling
Business
Intelligence
D
Decision Support
Systems
Non-Isolated
Information
Systems
C
Finacle developed by _________
Infosys
HCL Technologies
TCS
I-Flex
A
ACS10 Flexcube developed by ________
Infosys
HCL Technologies
TCS
I-Flex
D
ACS11 Quarz developed by ____
Infosys
HCL Technologies
TCS
I-Flex
C
Clients
Customers
Party
IP
A
Antivirus Server
Application
Server
Web server
Clients Server
B
ACS9
The server is a sophisticated computer that accepts service
requests from different machines which are called__________
__________ server has to be a powerful and robust system as it
ACS13
has to perform all the core banking operations.
ACS12
Automatic
Telephone
Machine
Automated Teller
Auto Machanic Allow to Machine
Machine Server
B
ACS15 IBAS stands for ___________
Internet Business Internet Banking Internet Banking Internet Business
Application
Application
Application
Authenticatin
Server
Server
software
server
B
ACS16 PBF stands for________
Positive Balance
Positive Balance Positive Balance
Post Balance File
File
File
Flex
C
ACS14 ATMS stands for_________
ACS17
Internet banking refers to a banking transactions routed through
the ________
Bank
Internet
Intranet
Net banking
B
Adv IIT - Question bank
ACS18 CPPD Stands for ______________.
ACS19
ACS20
ACS21
ACS22
ACS23
Computer
Planning and
plant
department
The _________ is generally a hardware and it plays the role of
Date base Server
preventing unauthorized access.
________enable data transmission over different networks.
Switches
_________have many ports that are connected to different
Router
systems and it facilitates data transmission with the network.
A Proxy server always acts in conjunction with a _________.
Firewall
The ________ provides network security by preventing malicious
ATM Server
data from entering the network.
ACS24 _________is used for authentication.
System audit
ACS25 Access to a set of servers is controlled by the ________.
System audit
Computerized
Planning and
Policy
Department
Both A &B
Computer
Planning and
Policy
Department
D
Web server
Proxy
Firewall
D
Firewall
Routers
Middleware
C
Switches
Firewall
Middleware
B
Internet
Antivirus
None
A
Proxy Server
Date base Server
Web server
B
system
administration
system
administration
Domain
Controller
Network security
C
Librarian
Domain
Controller
D
Hacking
Routors
Thrashing
B
Accelereated
Teller machine
B
All the above
D
ACS26 ________is a process of unauthorized entering a network.
Data base
administration
____________ facility provides a customer to access financial
ACS27
transactions in a public place.
Automatic tele Automated Teller
Machine
Machine
ACS28 Which is the Function of ATM?
ACS29 Every bank branch should madatorily have a security policy.
ACS30 The Operational Controls include controls on ___________
Application Controls are broadly classified into
__________________
__________controls check that the data entered is complete and
ACS32
correct.
ACS31
ACS33 Reasonableness check is a _________.
ACS34 Which of the following is not a module of the CBS?
Cash Withdrawal Balance Inquiry
FALSE
B
TRUE
Physical Access
Logical Access
Input Controls
Output Controls
Input Controls
Output Controls
Processing
Controls
Customer ID
generation
Automated
Technical
Machine
Registering
requests for
Cheque book
Environmental
Controls
Processing
Controls
Processing
Controls
All of the above
D
All of the above
D
All of the above
A
Input Controls
Output Controls
Management
Control
B
Accounts
management
Equity Share
management
Clearing Module
C
Adv IIT - Question bank
Statutory
Liquidified Ratio
Deferred
Payment
Guarantee
Statutory
Liquidity Ratio
Standard
Liquidity Ratio
Logs
Index
Activity Logs
Activity
performed
User details
E-mail policy
Firewall security
policy
TRUE
FALSE
Cash Reserve
Ratio
Community
Reserve Ratio
Yes
No
ACS43 DRP stands for ___________________________ in terms of CBS.
Disaster
Recovery
Planning
Discovered
Resources
Planning
Disastrous
Recovery
Planning
_____________are soultions applied when any kind of
vulnerabilities discovered in networks in the CBS system.
Patches
Logs
Access Rights
Access Rights
Logs
Database Log
Operating
System Log
Yes
No
ACS35 Bank guarantees can be __________________________
ACS36 SLR stands for ________________________________
ACS37
________are record of activities that have taken place in the
system irrespective of the modules.
ACS38 The contents of a log includes _____________________
Communication and Operations management must include
which policies?
Logs of the various activities in CBS can be deleted immediately
ACS40
and also be accessed by anybody.
ACS39
ACS41 CRR stands for _________________________ in terms of CBS.
ACS42
ACS44
Does the IS Audit also include audit of the outsourcing activites
carried out in the CBS system?
ACS45 __________can be viewed only by the DBA of an organisation.
Is performing periodic vulnerability assessment of the networks
is necessary?
KYC stands for _________________________________ in terms
ACS47
banking.
In CBS, the Accounts Management module deals with
ACS48
_____________________
ACS46
ACS49 Soft copy of the ATM journal rolls is called_____________
ACS50 The ATM switch consists of a _____________________
Performance
Guarantee
Know Your
Know Your
Customer
Company
Creation of
Creation of
Savings Account Current Account
Both A & B
None of the
above
C
Stable Liquidity
Ratio
None of the
above
A
Date and Time
All of the above
D
Internet policy
All of the above
D
B
B
Cash Reversal
Ratio
Cash Reimbursed
Ratio
A
A
Disaster
Recording
Planning
None of the
above
Activity Log
A
A
B
A
Know Your
Connection
Know Your
Centre
A
Overdraft
All of the above
D
Stock Journal
Journal Report
Electronic
Journal
All of the above
C
computer
server
Both A & B
None of the
above
C
Adv IIT - Question bank
ACS51
ACS52
ACS53
ACS54
ACS55
ACS56
ACS57
_______________testing should be done to check the
unauthorised access to the network in CBS.
_________enables transfer of money from one bank to another
in "Real time" and on "Gross" basis.
In _______system money transfers are done on a one to one
basis while in _______system transfer is done in batches.
All the money transfers take place in the books of the
_________________
EFT and NEFT work on _______________basis
________system of money transfer is primarily used for large
transactions.
In RTGS, the STP generates an ___________for every outbound
RTGS transaction.
UTR full form _________________________________ in terms
ACS58
of CBS.
Penetration
Hierarchical
Top down
EFT
NEFT
RTGS
NEFT, RTGS
RTGS,NEFT
EFT,RTGS
DNS
HSM
SSM
NEFT
RTGS
EFT
All of the above
B
UTN
UTE
UTR
UTS
C
Unique
Transaction
Reference
Unidentified
Transaction
Reference
Straight
Temporary
Processing
Cash
Management
System
Unique
Transmission
Reference
None of the
above
A
Strict Through
Processing
None of the
above
A
Core
Management
System
Centre
Management
System
B
Audit of controls
in any banking
environment is
performed using
software audit
None of the
above
B
Laying down
procedures for
system
development
A
Web centre
C
Full join
D
Beneficiary bank Central bank(RBI) Remitting bank
STP stands for ________________________________ in terms of Straight Through
CBS.
Processing
ACS60
CMS stands for ______________________________ in terms of
CBS.
ACS62 The Management Controls does not include ___________
_______is supported by advanced technology infrastructure and
has high standards of business functionality.
ADB23 Which type of joins not available in Access 2010?
ACS63
A
None of the
above
None of the
above
None of the
above
All of the above
ACS59
ACS61 Which of the following statements is true?
Bottom up
Control
Management
System
Systems audit
Audit of internal are important for
controls is not
the verification
needed at all
of the internal
controls
Managing of
Assets
Firewall
Inner join
Developing a
Formulating a
business
security policy
continuity
planning
Core Banking
Internet banking
Solution
Left outer join Right outer join
C
B
B
A
Adv IIT - Question bank
ADB24
A join returns only those rows from both tables that match on
the joining field is___________ in MS Access 2010.
Inner join
Left outer join
Right outer join
Full join
A
ADB25
The query returns all of the rows from left table, and also those
rows from the right table that is known as____________.
Right outer join
Left outer join
Inner join
None of the
above
B
Right outer join
Left outer join
Inner join
None of the
above
A
The query using ___________ returns all the rows from right
ADB26 table, and also those rows from the left table that share a
common value on both sides of join.
ADB28 ___________can be considered a questions in a data base.
Queries
Select Database
Tools-> Add
Table
Form
ADB29 Operands can be_________ in MS Access 2010.
Literals
Identifiers
Function
Text Literal
Date Literal
Number Literal
9
8
7
Arithmetic
Logical
Comparision
Arithmetic
Logical
Relational
Text
Date
Both A and B
Select Create->
ADB27 How can we add a table to the Query Design window_________?
Add Table
ADB30 In example "Hello"+" " +" everyone" ,hello is _____
ADB31
Length("Ms Access") will return the count of charcters is
__________.
ADB32 AND ,OR is a kind of ________ in MS-Access 2010.
ADB33
Comparision operators is also known as_______ in MS-Access
2010.
ADB34 LIKE operator works with______in MS Access 2010.
ADB35 IN operator is used __________ in MS Access 2010.
Operator precedence is similar to _____ that is follwed in
Algebra in MS-Access 2010.
___________________ technology is the process of creating and
AER9
utilizing the company's historical data.
______________ can be defined as subject-oriented, integrated,
AER10 time-variant, non-volatile collections of data used to support
analytical decision making.
ADB36
To match the
To find the null
value to a set of records of given
values
table
Select Design ->
Show Table
Reprt
returns true or
false
Select the table
from navigation
Pane.
Macro
All
None of the
above
6
None of the
above
None of the
above
None of the
above
None of the
above
BODMAS
BOMDAS
BODSAM
Data
Warehousing
Data Modeling
Business
Modeling
None of the
above
Business
Intelligence
Data Models
Data
Warehouses
Data Mines
Operational Data
C
A
D
A
A
B
C
C
A
A
A
B
Adv IIT - Question bank
AER11
AER12
AER13
AER14
AER15
AER16
AER17
AER18
AER19
AER20
AER21
AER22
AER23
AER24
________________ databases contain detailed data that is
needed to satisfy processing requirements but which has no
Operational
Non-Operational Subject-Oriented Informational
relevance to management or analysis.
Data in the Data Warehouse is ______________ , not
Non-Volatile,
Dynamic, Static
Volatile, Static Static, Dynamic
____________.
Static
____________ data contains an historical perspective that is not
Operational,
Operational,
Informational,
Informational,
generally used by the _____________ systems.
Informational
Static
Static
Operational
The definition of data elements in the data warehouse and in the
data sources and the transformation rules that relate them, are
Masterdata
Detaileddata
Metadata
Basedata
referred to as ___________.
Data warehouses are not the optimal environment for
Structured
Unstructured
Informational
Operational
____________ data.
Maintenance Costs are high for Data Warehousing.
TRUE
FALSE
Credit Card
Insurance Fraud
Logistics
Data Warehousing can be used for ___________________.
All of the above
Churn Analysis
Analysis
Management
_________________ is the process of extracting patterns from
Data
Data Analysis
Data Mining
Data Modeling
data.
Warehousing
Business
Product Life
___________________ is an approach to quickly answer multiOnline Analytical
Supply Chain
Processing
Cycle
dimensional analytical queries.
Processing
Management
Management
Management
The Output of an OLAP query is typically displayed in a
Matrix
Columnar
Stepped
Outline
___________ format.
______________ companies is planning to support tens of
B2B
B2C
C2B
C2C
millions of customers with just hundreds of employees.
Unsuitable for
Increased
Legal
Which of the following is the limitation of Open Source ERP?
conventional
All of the above
Complexities
Complexities
applications
Which of the following is not an Open ERP software?
Openbravo
SQL-Ledger
Open-Project
ERP5ERP
_____ is the process of integrating all the business functions and
processes in an organization to achieve numerous benefits.
________ must consider the fundamental issues of system
AER25 integration by analyzing the organization's vision and corporate
objectives.
EDI
Manager
A
D
D
C
B
A
D
C
B
A
B
D
C
ERP
BPM
None of the
above
B
Auditor
Top
Management
Commitment
Either A or B or C
A
Adv IIT - Question bank
AER26
AER27
AER28
AER29
AER30
AER31
AER32
AER33
AER34
AER35
AER36
The more the number of __________, the longer the
implementation time.
Customization of ERP systems is one of the major challenges in
auditing ERP security.
Tally.ERP 9 provides graphical analysis of data which helps the
user to perform deeper analysis.
The user can ________ the company data into multiple
companies as per financial periods required.
E-Filing of Returns refers to the process of electronically filing
your tax returns through the ___________.
Tally.ERP 9 does not allows you to export the ETDS forms in NSDL
compliant formats as well as facilitates printing of TDS Forms in
Physical Form.
Tally.ERP 9 offers a data encryption option called
_______________.
___________________ is the process of exchanging Tally.ERP 9
data between two or more locations.
The Tally website offers _______________, by which a user can
communicate with a Tally representative and get required
information.
Tally.NET use _______________ for centralised Account
Management.
The data is transferred between the remote location and the
server using a secured mechanism called __________________.
AER37 Sales Tax Ledger falls under which Group?
AER38 Alias represents ___________ in Tally.ERP9.
If we purchase any Fixed asset in credit, we can pass it from
AER39
_________.
AER40
To save entry without any amount, we have to use
_____________.
AER41
Transfer of materials from one godown to another godown, use
______________.
process
TRUE
FALSE
A
TRUE
FALSE
A
Import
Export
Split
Backup
C
Intranet
Internet
Extranet
Any of the above
B
TRUE
FALSE
Tally Data
Encryption
Tally Data
Encoding
Serialization
Randomization
Tally Forum
Tally FAQ
Tally Support
Tally Chat
D
Data Centre
Control Centre
Cloud Centre
Administration
Centre
B
Encoding
Decoding
Encryption
Decryption
C
Sales
Purchases
B
Indirect Expenses Duties and Taxes
package
units
D
modules
B
Tally Vault
Tally Data
Conversion
Synchronization Asynchronization
C
C
Short name
Nickname
Code name
All of these
D
Payment mode
Receipt mode
Journal mode
Contra mode
C
Cost Center
Maintain
Multiple godown
Allow 0 value
entry
Use Rej Notes
C
Manufacturing
Journal
Stock Journal
Purchase Journal
Both A & B
B
Adv IIT - Question bank
While exporting Ledgers from Tally to Web Page, we use
_________.
AER43 Budget represents _______________________.
In Service tax Credit Adjustment (%) should be either
AER44
____________.
AER42
AER45 Service Tax Report can be seen from _________________.
AER46 Can we allow Expenses/Fixed Assets in Purchase vouchers?
Transfer from Main Cash to Petty Cash we require to pass
AER47
_______ voucher.
XML Format
ASCII Format
SDF Format
HTML Format
D
Estimation
Forecasting
Assumption
All of these
D
0.2
1
Both A & B
Neither A &B
C
Display > Day
Book
Display >
Account Books
Display >
Statutory
Masters
Display >
Statutory
Reports
D
Yes
No
Payment
Contra
A
Receipt
None of these
B
Reminder Letter
None of these
D
Conceptual
multi
dimensional
Logical
B
none
C
ALL
D
AER49 A business model is not a ___________ model.
OLAP systems use concept of OLAP cube called a
AER50
______________ cube
The data which is to be exported from Tally.ERP 9 can be in
AER51
________ format.
system
single
dimensional
Profit and Loss
A/c
mathematical
hyper
dimensional
XML
HTML
ASCII
AER52 In Tally ERP-9 Remote Access is also known as __________.
Networking
VB.Net
Tally.Net
AER48 Income Tax number of the Company will appear in which report? Cash/Bank Book
None of the
above
None of the
above
None of the
above
B
Tally.NET User
B
graphs, shapes
C
Establishing a
data warehouse
help desk and
All of the above
training users to
effectively utilize
the desktop tools
D
Accessing data store on a remote location using Internet in
Local Data
Remote Data
Internet Data
Tally.ERP9 is called____________.
Tally.ERP9 can be classified user in two categories
AER54
Local User
Remote User
Both A & B
are___________.
Which of the following is not a predefined security level provided
AER55
Owner
Public User
Data Entry
by Tally.ERP 9?
The business model is represented in the graphical form using
flowcharts, flow
AER56
charts, pictures smart art, clip art
______________ and ________________
diagrams
AER53
AER57 Which of the following is/are the data warehousing activity?
Identifying and
Defining the
prioritizing
correct level of
subject areas to
summarization to
be included in
support business
the Data
decision making
Warehouse
C
C
Adv IIT - Question bank
___________________ is the succession of strategies used by
AER58
management as a product goes through its life cycle.
_______ integrates supply and demand mangement within and
across companies.
__________ includes transportation from Suppliers and receiving
AER60
inventory.
AER59
AER61 Which of the following is not the service area of SCM?
AER62
AER63
AER64
AER65
AER66
Online Analytical
Processing
Product Life
Cycle
Management
Supply Chain
Management
C
BPM
SCM
PLM
CRM
B
Inbound
Operations
Outbound
Operations
Asset
Management
Sourcing
planning
Production
planning
A
PLM
CRM
D
Step 4
B
migration
C
None of the
above
C
Either A Or B
A
Business
Processing
C
Logistics
Which step of the ERP implementation involves, educating and
Step 1
Step 2
Step 3
recruiting end users throughtout the implementation process?
The system ____________ process will address issues such as
software configuration, hardware acquisition and software
implementation
upgradation
installation
testing.
A __________________ review is recommended to ensure that
pre
under process
post
all business objectives established during the planning phase are
implementation
review
implementation
achieved.
In _________________ stages, auditors have access to
post
pre
rudimentary ERP tools and capabilities for auditing security
Both A & B
implementation implementation
configurations.
Immediate posting and updation of books of accounts as soon as
Interactive
Immediate
Real Time
the transactions are entered. This is called as __________
Processing
Processing
Processing
AER67 Which of the following ETDS forms are available in Tally.ERP 9?
AER68
Business
Processing
Management
The exported eTDS file from Tally.ERP 9 can be validated through
NSDL's freely downloadable utility called __________________
AER69 ERP systems provide an access to the__________ data
Business intelligence systems are ________ Decision Support
AER70
Systems.
Data warehousing technology is the process of creating and
AER71
utilizing the company’s __________
The data in the Warehouse comes from the _________
AER72
environment and external sources.
Form 26,
Annexure to 26
Form 27,
Form 26Q,
All of the above
Annexure to 27 Annexure to 26Q
D
File Validation
Program
File Validation
Utility
File Valuation
Program
File Valuation
Utility
B
integrated
distributed
information
driven
isolated
de-centralized
A
resource driven
none
A
data-driven
general data
historical data
operational data
none
B
operational
backup
data
none
A
Adv IIT - Question bank
AER73
AER74
AER75
AER76
AER77
AER78
AER79
In essence, SCM integrates ___________ management within
and across companies.
_____________ including all fulfillment activities, warehousing
and transportation to customers.
Customer Relationship Management is a ________________
level strategy.
Operational CRM provides support to ___________ business
processes.
Collaborative ______ ultimate goal is to use information
collected by all departments to improve the quality of services
provided by the company.
Tally.ERP 9 follows the DES __________ method to safeguard the
data.
Immediate posting and updation of books of accounts as soon as
the transactions are entered. This is called as __________
supply and
demand
Inbound
operations
outbound
operations
supply and
sortage
hybridbound
operations
business
corporate
strategic
none
B
front office
back office
staff
none
A
CRM's
ERP
SCM
none
A
encryption
decryption
cryptography
none
A
Interactive
Processing
Immediate
Processing
Real Time
Processing
Business
Processing
C
supply and chain
none
A
none
B
Form 26,
Annexure to 26
Form 27,
Form 26Q,
All of the above
Annexure to 27 Annexure to 26Q
D
File Validation
Program
File Validation
Utility
File Valuation
Program
File Valuation
Utility
B
With ______________ technology the characters are reduced in
AER82 breadth and user is allowed to input additional characters which
would make the account name, entity complete and readable.
Tally Fix
Tally Adjust
Tally Fit
Tally AutoFit
C
In Tally.ERP 9 __________________ provides the user with
AER83 administrator rights and the capability to check the entries made
by the authorised users and alter these entries, if necessary.
User-defined
Security
Audit Feature
D
Tally.NET
Email facility
C
Either A or B
None of the
above
B
AER80 Which of the following ETDS forms are available in Tally.ERP 9?
AER81
The exported eTDS file from Tally.ERP 9 can be validated through
NSDL's freely downloadable utility called __________________
HTTP-XML based Unlimited multidata interchange user support
__________________ is an enabling framework which
Direct Web
AER84 establishes a connection through which the remote user can
Web Publishing
Browser Access
access the Client's data without copying/transferring the data.
If we want the company to be connected automatically for
Allow to Connect
AER85 remote access on load, the property __________ needs to be set
Contact On Load
Company
it as Yes.
Adv IIT - Question bank
ACS1
ACS2
ACS3
ACS4
ACS5
ACS6
ACS7
_______ is centralized Banking Application Software.
Core Banking
System
_________has several components which have been designed to
CBS
meet the demands of the banking industry.
Core Banking Solutions is a combination of an application
Network devices
software and ________
______ is a large data housing infrastructure that provides high
ATM Server
band width access to its clients.
Application
Data centre servers are known as_____________.
servers
________ is a method of creating virtual networks within a
VLAN
physical network.
Data communication between ______ VLANs can be controlled
1
as per business requirements.
ACS8
Bank mate is developed by the _______
ACS64
CBS Software resides in a Central application server which is
located in the ___________
A________ that runs the core banking solutions (CBS) and is
ACS65
centrally accessed by the branches.
__________ are capable of being connected only when devices
are connected to a switch.
A special feature of STP is that _____________ number for any
ACS70
outbound RTGS transaction is generated by the STP System.
B
NEFT
None
A
Firewall
IBAS
IBDS
A
Data Centre
IT
EDP
B
Data Base
Servers
Web server
All the above
D
LAN
WAN
MAN
A
2
3
4
B
Infosys
HCL Technologies
TCS
I-Flex
B
ATM Data centre
Middleware
Web centre
Central Office
Data Centre.
D
Database Server
Domain Name
Server
B
Client version
Firewall
C
Wide Area
Network
Domain Name
Server
Personnal Area
Network
Application
Server
Virtual Networks
MAN
WAN
B
PIN NO
Uniform
Transaction
Reference
None
C
ATM Server
The _________of the application is capable of only entering the
System version
data at the end point that is branches.
The application server would be placed in a trusted inside zone in Virtual Local Area
ACS67
a separate ____________
Network
ACS69
Complete
Centralized
Banking Solution Banking Solution
CSB
ACS66
ACS68 Application software would access the ________
Core Banking
Solution
Data base server
LAN
Unique
Transation
Referrence
Central
Application
Server
Application
Version
Local Area
Network
ATM DATA
Server
A
A
Adv IIT - Question bank
_____________refers to the process of developing software
which would produce the required output from the input
ACS71
provided of course, using the necessary hardware and
communication systems.
The______________is essential to ensure that computer security
ACS72 records are stored in sufficient detail for appropriate period of
time.
Application
Development
Software
Development
Server
Development
System
Development
D
Review
Management
RTGS
Log management
Authorized
Controller
C
The purpose of
is a legal attempt
the test is to
at gaining access
Ensure
identify security
Which of the following is “False“ in case of penetration testing in to protected recoverability of
ACS73
vulnerabilities
an IT environment of CBS?
computer
data in case of
and then attempt
systems or
system failure.
to successfully
networks.
exploit them.
Well
Unit test, system documented Implement new/
Which of the following is erroneous statement in case of Change test, integration process should
changed
ACS74
Management Control?
test – all should
be there
programme as
be carried out. incorporating all per schedule.
the changes.
With respect to the customer changing the Pin at the ATM which
ACS75
procedure is the ”false“ procedure?
IN CBS, changes to the application server are not made directly
to it, instead done first on a __________
All the various servers in the central data centre are seggregated
ACS77
through _______
ACS76
Old offset value
Old Pin verified
used to derive
using HSM/SSM.
new PIN.
Natural Pin
remains the
same.
Trail server
Validate server
Test Server
LANs
VLANs
WANs
This is often the
most preferred
test as it is an
accurate
simulation of
how an
outsider/hacker
would see the
network and
attempt to break
into it.
It is important
that correct
latest version of
programe is used
but version
number need not
be changed.
Old offset value
erased and new
offset value
generated.
None of the
above
MANs
B
D
A
C
B
Adv IIT - Question bank
The __________ is a complete process in the computer so that it
ACS78 ensures that data that is fed in conforms to certain prerequisite
Consalidation Password Policy
protection
conditions.
When the central Data base is busy with central end of day
activities or for any other reason, the file containing the account Positive Balance
Application
Centralised Data
ACS79
balance of the customer is sent to the ATM switch. Such a file is
File
Server
base security
called __________
ACS80 The IBDS is located in a ____________
Militarised zone
The main components of Internet Banking system consist of
Web server
__________
Copy of the Anti Virus Software was updated promptly and
ACS82 regularly at the Data Centre and pushed into all of the servers
Hacking Method
and in all the systems in the branches by ________
The __________which is also residing in the server at the branch
ACS83
Sytem software
actually does the banking operations.
In Core Banking concept all the systems of the bank are
ACS84 connected to the Central office by means of a connectivity which
local line
may be either a _________ or a dial up line.
ACS81
The ________ is generated by the software and directly sent to
ACS85
equipment for printed the Pin Mailer.
16 digit number
____________would also include the existence of built in
ACS86 controls in the system to ensure proper processing of input data Output Control
so as to provide the required output.
____________refers to an arrangement wherein the issuing bank
ACS87
Letter of Credit
acts on the request and instructions of a customer.
Business
_______________ is a process by which the bank ensures the
ACS88
Recovery
maintenance and recovery of operations.
Planning
At which phase of testing the version of software is called “ beta
Programmer
ACS89
version”?
testing
Validation
D
Central Office
Data Centre.
A
City Zone
State zone
demilitarised
zone
D
IBAS
IBDS
All the above
D
Push-pull
method
Both A &B
None of the
Above
B
utility software
Application
Software
Application
Server
C
Leased line
Broadband
None
B
Personal
Identification
Number
Net transaction
ID NO
ATM No
B
Input control
Process Control
Data Control
C
Letter of Tax
Letter of Payable
Letter of
Receible
A
Business
Continuity
Planning
Disaster
Recovery
Planning
None
B
User testing
(a) & (b) both
None of above
C
Adv IIT - Question bank
ACS90
ACS91
ACS92
ACS93
ADB1
ADB2
ADB3
ADB4
ADB5
ADB6
ADB7
ADB8
ADB9
Network
Network
In an Organization structure of IT Department which of the
administrator
Administrator
following function is incompatible?
and Database
and Security
Administrator.
Administrator.
The number that is stored in the ATM switch is the difference of
Offset value - Pin Pin No - Natural
which of the following number?
No
Pin
Hard copy of
The information retrieval of transactions taking place at ATM
Soft copy of
Electronic
Cash register
located at remote locations is through _________
Electronic journal
Journal
The number that is generated as soon as the customer inserts
Pin sent to
Offset value
Natural Pin
the card in the ATM machine is __________
customer
Which is not a Database management system.
Unix
Oracle
Sybase
The _________ operator is used to find the null records in a
"= NULL"
NULL
IS NULL
table.
When you create relationship between two tables, the Common
different data
Text & Number Number & Text
field's data type should be
type
Structured
Sub Query
Structured Query
SQL stands for____________________.
Question
Language
Language
Language
MS Acces 2010 reads and writes to the .accdb file format in
Pages
Encrypt pages
Base Database
chunks also known as_____________.
Detailed
Data Definition
Data Defined
DDL stands for ____________
Definition
Language
Language
Language
Detailed
Data
Data Maintaining
DML stands for _____________
Maintaining
Manipulation
Language
Language
Language
update
have to update
Whenever a tables gets update, the dependent query will
Not update
automatically
manually
To extract the records based on date field, which of the symbol
$
#
()
should be used
ADB10 The data can be entered into a table in the ____________ view.
ADB11 In a Query the data can be sorted based
Database
Administrator
and Security
Administrator.
Pin No - offset
value
Tape Librarian
and database
administrator.
B
Offset Value Natural Pin
C
(a) and (b) both
A
Card Number
C
Foxpro
A
All of the Above
C
Same data type
D
System Query
Language
B
None of the
above
A
Data Detailed
Language
A
Detailed
Manipulation
Language
C
never update
B
""
B
Design
Datasheet
Dataview
All of the Above
B
Single column
Multiple columns
Both A and B
None of the
above
C
Adv IIT - Question bank
ADB12
When you create a field using text data type in MS Access 2010,
by default field will have ____ character.
If we are using the same table for main query and sub-query,we
ADB13
need to provide___________.
ADB14
Update Query can be used to update_________ in MS Access
2010.
ADB15 Delete Query can be used to delete
ADB16 How many Primary key constraints can create in a table______.
Unmatched Query can help to find records that have no
corresponding reord in other tables.
MS Access 2010 provides queries that can be used for obtaining
ADB18 the aggregated results instead of individual records
are____________.
A function that Counts the set of values that satisfy the given
ADB19
criteria in MS Access 2010 is___________.
ADB17
ADB20 Aggreagate Query also known as___________.
ADB21 Which Query wizard is used to find repeated records in a table?
ADB22
Append Query is used to ______________ in a table in MS
Access.
255
256
No need to
Alternate names
alternate name
to the tables
to the tables
More than 1
Single Record
record
More than 1
Single Record
record
258
128
A
Aliases name to
the tables
Both A and C.
D
Both A and B
Both A and B
As many
None of the
above
None of the
above
All of the Above
C
C
A
Only one
Two
FALSE
TRUE
Sum()
Count()
Avg()
All of the above
D
CountA()
Count()
Countif()
All of the above
B
Group By queries
Total query
Action query
Both A and B
D
Simple Query
Wizard
Duplicate Query
Wizard
Cross table
Query Wizard
All of the Above
B
Add Records
Delete Records
View Records
Update Records
A
B
The only report
It doesn't have as
How does a query-based report differ in design to a report based The reports are
type available is
ADB82
It doesn’t
many design
on just one table?
restricted in size.
the Design
options.
Report.
Type the text
Use the Mailing
How would you include some plain text into a mailing label
Use the >>
ADB83
directly into the Use the > button. label wizard text
report?
button.
label.
option.
In a Microsoft Access 2010 report, the page numbering would
ADB84
Report Footer
Section Header
Page Footer
Page Header
most likely be placed into the:
B
C
C
Adv IIT - Question bank
If you wished to present a professionally looking form on screen
ADB85 that would show all the necessary information, which of the
following form design tools would you most likely use?
ADB86
What are the benefits of an ACCDE
file__________________________ in Access
An .ACCDE file is a ___________ version of the original .ACCDB
file.
Which type of the query is used to accept the value from the
ADB88
user while executing the query and fetch records accordingly
To encrypt the databse in Access 2010 must be opened in the
ADB89
__________________.
ADB87
ADB90 FIX() is a kind of ____ function in MS-Access 2010.
MS-Access 2010 has added new features of ______ to eliminate
the need of VBA code
Encrypting a database does not restrict access to database
ADB92
objects, but to __________ the database.
ADB91
ADB93
The setting for the Security option can be handled
using_______________________ in Access 2010.
Third Party Encryption Technology can also be applied to the
database of Microsoft Access 2010.
ADB95 To create a split database in MS Access 2010 go to which tab?
After spliting database,frontend database
ADB96
holds_________________.
After spliting database,backend database
ADB97
holds_________________.
ADB94
All The tools of
the form design
control gallery.
Form Wizard
Columnar
C
Pivot Table
Pivot Chart
Reduces the size
of the database
Optimizes
memory usage
and improves
performance.
Fixed-down
Locked-down
Open-down
None of the
above
B
Update Query
Delete Query
Parameter Query
D
Make Table
Query
Open Secure
mode
Open Inclusive
mode
Math
Date
Macro
Form
Open
Modify
Protects the VBA
code from being
viewed or edited All of the above
while still
allowing it to run.
Open Exclusive
Open Read Mode
mode
None of the
Text
above
None of the
Report
above
Read
File Tab File Tab ->New File Tab ->Access
>Security
Options, and
Options, and
Options, and
selecting the
selecting the
selecting the
Trust Centre tab Trust Centre tab
Trust Centre tab
from the Access from the Access
from the Access
Option window Option window
Option window
D
C
A
A
Write
A
None of the
above
B
A
TRUE
FALSE
Create Tab
External Tab
File tab
Database Tools
D
Forms
Query
Report
All of the above
D
Tables
Forms
Query
Report
A
Adv IIT - Question bank
ADB98
When an Access database is split, it creates two
files_________________.
A Data Access Page is a special type of _________ that allows
users to interface with database using Internet Explorer.
MS Access provide__________ datatype to create link to a web
ADB100
page,file,or email address.
ADB99
ADB101 To make a switchboard appear while opening the database.
To add or delete buttons to Switchboard, which option is used in
Switchboard Manager is used.
The Switchboard Manager is a dialog box that allows creating a
ADB103
switchboard for an Access database.
ADB104 A macro can automate data entry in Access 2010.
ADB102
ADB105 Which of the following data-type is not available in MS-ACCESS
The validation can be defined at____________ level in Access
2010
A macro can be attached to an event of a
ADB107
control_________________________.
ADB106
ADB108 How to add switchboard in Access 2010?
ADB109
The command Design Application performed
action____________ on switchboard.
A back-end
primary database
A new database
database & front& secondary
& Old database.
end database
database
None of the
above
A
XML page
HTML Page
Web page
None of the
above
C
Link
Hyperlink
Insert
Attached
B
None of the
above
C
Build Option
B
Set as
Set as database
Set as Form
Switchboard
startup Option in startup Option in
startup Option in
Access Option
Access Option
Access Option
Add Option
Edit Option
Modify Option
TRUE
FALSE
A
FALSE
TRUE
B
Text
Number
AlphaNumeric
Date
C
Table
Form
Both A and B
Report
C
A form
A report
A button
All of the above
D
Click->File tabClick->File tab>Option Button- Click->File tabClick->File tab>>Quick Access
>Quick Access >Option Button- >Option ButtonToolbarToolbar>Command not >Quick Access
>Command not
>Command not
in RibbonToolbarin Ribbonin Ribbon>Switchboard
>Switchboard
>Switchboard
>Switchboard
Manager->Add- Manager->AddManager->AddManager->Add>OK
>OK
>OK
>OK
Opens a
Opens the
Close the current
Opens a report in
secondary
Switchboard
database
Print Preview.
switchboard.
Manager.
A
C
Adv IIT - Question bank
Switchboard Manager only allows a maximum of
__________command buttons on a switchboard
MS Access 2010 provides a __________pane that contained large
ADB111 list of actions to be chosen,enabling a wide range of commands
that can be performed
ADB110
ADB112 SQL is considered to be a __________
Which action in MS Access macro applies a fliter or query to a
table,form or report.
Opens a query in the Datasheet view, Design view, or Print
ADB114
Preview which macro action used in MS Access.
Among +, <>, MOD, AND, <= operator which operator has the
ADB115
highest priority.
ADB116 The Strcomp() function is a__________type function.
ADB113
ADB117 The SGN() function is a ____________ type function
ADB118 Which of the following symbol is used to write a sub query
For the Non-Aggregate Total field, the criteria can only be
ADB119
specified using the Where clause.
ADB120
ACA1
To export an access table to an XML File, which of the below
steps must be followed?
In IDEA, import Assistant wizard is used to import data
from____________.
ACA2 What is the procedure for importing data into IDEA ?
ACA3 IDEA exports data in a number of _______________________.
Nine
Eight
Seven
Six
B
Action List
Action Catalog
Action query
Action Box
B
2GL
3GL
4GL
None of the
above
C
DoFilter
FindFilter
ApplyFilter
UseFilter
C
OpenQuery
ShowQuery
RunQuery
FindQuery
A
+
MOD
AND
<>
B
Math
Financial
Text
Date & Time
Math
Financial
Text
Date & Time
[]
()
{}
#
C
A
B
TRUE
FALSE
Right-click the
table and select
Export ->XML
Go to External
Data ->Export,
click on More
and select XML
Right-click the
table and select
send as XML
Both A and B
A
Excel
Access
XML
All of the above
D
File->Import
Assistant->
Import to IDEA
text
In IDEA,Data Extraction select data form a file for
ACA4 further___________ for creating a new file of logically selected
Extraction
records.
What is step by step procedure for using Bendford's law function Data->Benford's
ACA5
in IDEA ?
Law
A
File->Select
File->Import -> File->Import as ->
Import -> Import
Import to IDEA Import to IDEA
to IDEA
spreadsheet and
database
mail merge
All of the above
format
A
D
Recording
Investigation
Sorting
C
Analysis>Benford's Law
Sampling->
Benford's Law
Tools->Benford's
Law
B
Adv IIT - Question bank
ACA6
A Benford's Law analysis is most effective on
data________________.
ACA7 In IDEA, blank value data can be extracted by using_________.
In IDEA, Summarization, Pivot Table, Stratify, Duplicate Key
ACA8
functions comes under which menu.
In IDEA, Extraction, Sort, Indices, Search functions comes under
ACA9
which menu.
Text files that are organized properly fall into one of two types
ADB37
are__________
To create an unmatched Query using wizard, minimum required
ADB38
number of table or fields is_________.
ADB39 While creating the query, the criteria can be set in
ADB40
ADB41
ADB42
ADB43
ADB44
ADB45
ADB46
ADB47
In MS Access query which logical operator returns True if both
the expressions compared are true.
In MS Access query which logical operator returns True if either
of the expressions compared are true.
Enfore Referencial Integrity option is used to restrict enerting
data in
In MS Access left("Access",3) function will return__________.
Which function is used to converts the text to lower case in MS
Access 2010.
Which function is used to remove leading or trailing spaces in a
text in MS Access 2010.
_____________ is contains a set of predefined functions in MS
Acccess and helps build complex expression.
Which of the following is a Database Software
Without assigned
numbers, such as
Comprised of
Without built-in bank accounts
similar sized
minimum and numbers and zip All of the above
values for similar
maximum values. codes and with
phenomena.
four or more
digits.
D
@isblank()
as Null
Null
Is Null
A
Data
Analysis
Sampling
Relation
B
Analysis
View
Relation
Data
D
Delimited files
Fixed-width files
Both A and B
None of the
above
C
one
two
three
four
B
Only one
More than One
Field
As many field
All of the Above
D
IF AND
AND
Both AND
LIKE AND
B
OR
IF OR
IS OR
LIKE OR
A
Parent Table
Child Table
Any one table
All of the Above
B
Acc3
Acc
3Acc
B
Lcase()
Lowercase()
Lower()
Remove()
Removetext()
Trim()
Expression
Design
Excel
Expression
Builder
Outlook
ess
None of the
above
None of the
above
Expression
elements
C++
Expression Box
Oracle
A
C
B
C
Adv IIT - Question bank
ADB48
Which of the following is not the characteristics of a Relational
Table?
ADB49 Which record will be retrieved if the query criteria is < #1/1/11#?
ADB50
The tab in Expression Builder in which we write expressions is
known as _____________.
ADB51 The criteria expression LIKE?B*.
ADB52
ADB53
ADB54
ADB55
ADB56
ADB57
ADB58
__________ queries are useful for summarizing information, and
are somewhat similar to pivot tables in MS-Excel.
While entering record in Datasheet view, in which order the
records can be entered
When you delete the record in form, it deletes the record
from__________.
Having clause is used in the aggregate query in MS Access 2010
The controls that are not linked to any field of the table or query
on the form are known as ________.
Which property of the form can be used to insert a background
image in MS Access 2010?
___________ is a report that is inserted in another report in MS
Access 2010.
ADB59
A bound main report is based on a ______________ and its
_____________ contain realted information.
ADB60
A___________used to compare multiple values of categories or
differences over a period of time.
Each Table row
represents a twoThe order of the Each column has
Each row/column
dimensional
rows and
a specific range
intersection
structure
columns is
of values known
represents a
composed of
immaterial to the as the Tuple
single data value
rows and
DBMS
domain
columns
D
All values less or
more than 1,195
All of above
C
Expression
Builder window
C
Expression
Elements
Value less than
Records with
95 characters date before 2011
Operator Button
Expression Box
Will match all
Will match all
Will match all
Will match all
text having
text starting from text ending from
text starting with
second character
B
B
a digit
as B
Select query
Crosstab query
Action query
Parameter query
Alphabetical
Order
At the end of the Any where in the Beginning of the
table
table
table
Form but not in Table but not in
Form only
Form & Table
table
Form
FALSE
TRUE
Unbounded
ActiveX control
Graphics Control Bound Controls
Controls
A
B
B
D
B
B
Caption
Background
Record Source
Picture
D
Inner-Report
Sub-Report
Inside-Report
Insert-Report
C
Table or
query,InnerReport
Table or
query,MainReport
Table or
query,SubReport
None of the
above
C
Pie Chart
Area Chart
Bar Chart
Column Chart
D
Adv IIT - Question bank
ADB61 A________used to compare trends over a period of time.
To create a read-only copy of the database, which of the
ADB62
following file format can be used?
The database administrator created a split database and created
ADB63 a front-end database and back-end database file.Which of the file
should be stored on the server ?
ADB64
To make database package and digitally sign using which option
in Access 2010 ?
In which formats can the Collect Data through email message
feature can send the data entry form?
Once a mail is sent using the collect data through email message
ADB66 feature in Access 2010. The mail status can be checked
using________________.
The ___________ type of data cannot be collected using Collect
ADB67
data through email messages.
ADB65
ADB68 What is the memo data type field used for?
ADB69 The filter By selection feature allows you to filter:
ADB70 Which editor was provided for use with Access Basic?
ADB71
How do you update Pivot Table report data after changes are
made to the source data?
ADB72 What are the different views to display a Table ?
Pie Chart
Line Chart
Bar Chart
Column Chart
B
.ACCDB
.ACCDE
.MDW
.ACCDT
B
Front-end
database
Back-end
database
Both of them
None of them
B
FileFileFile->New->Save File->Save as>Save&Publish>Save&PublishDatabase as>Save Database
>Save Database
>Save Object as>Package and as->Package and
as->Package and
>Package and
sign
sign
sign
sign
HTML and
Visual Basic
Access Forms
Excel attachment
InfoPath
Application
A
A
Export to
Outlook
Options in Tool
menu of Access
Manage replies
All of the above
C
Text
Number
Date/time
AutoNumber
D
To add table
To store objects
created in other
programs
For long text
entries
For shout text
entries of no
more than 255
characters
C
Records that
meet any of
All of above
several criteria
you specify
The Visual Basic
The QuickBasic
Notepad
All of above
1.0 editor
editor
Save your
Click the report,
Select the Pivot
changes, close
and on the Pivot
Table worksheet
the workbook,
Table toolbar, All of the above
and press F9 on
and then reopen
click the refresh
the keyboard
it.
data button
Pivote Table &
Datasheet View
Design View
All Of Above
Pivot Chart View
Those records
that match an
entity in a field
Records based
on a criterion
you specify
A
B
C
D
Adv IIT - Question bank
Which Of The Following Creates A Drop Down List Of Values To
Choose From?
A __________ Enables You To View Data From A Table Based On
ADB74
A Specific Criterion
The Database Language That Allows You To Access Or Maintain
ADB75
Data In A Database
ADB73
ADB76
ADB77
ADB78
ADB79
ADB80
ADB81
Ole Object
Hyperlink
Memo
Lookup Wizard
D
Form
Query
Macro
Report
B
DCL
DML
DDL
None Of Above
A
Authorizing
Insert, Update Or
Access And Other
DCL Provides Commands To Perform Actions Like
Delete Records
None Of Above
Control Over
And Data Values
Database
Network
Relational
Object Oriented
Structureed
Which is not a Database Model ?
Database Model Database Model Database Model Database Model
Which Of The Field Has Width 8 Bytes?
Memo
Number
Date/time
Hyperlink
This Is The Stage In Database Design Where One Gathers And List
Establishing
None Of The
Data Definition Data Refinement
All The Necessary Fields For The Database Project.
Relationship
Above
Change The
Structure Of
Tables
The Third Stage In Designing A Database Is When We Analyze Our
Tables More Closely And Create A ___________ Between Tables
What is the purpose of the Switchboard Manager in Microsoft
Access 2010?
ACA46 Which of the following is a benefit of using CAATs?
AOA1 Is there a fixed qualification for internal auditor_________.
__________________ refers to use software/applications to
automatically perform tasks such as accounting,preparing trial
AOA2
balance, financial statements etc. and electronically transmit
data or information using internet..
Relationship
Join
Query
To build a main
Creates the
To allow the user
switchboard
macros used to
to switch from
form that
program an
one database file
controls all other
automatic
to another.
forms.
application.
Identify an audit
File an FIR based
finding w.r.t.
on audit finding materiality in an
IT environment
TRUE
FALSE
ERP
Office
automation
C
D
C
A
None Of These
A
To allow
changing from
one report to
another.
A
To give
Investigation of
assurance to
fraud in audit customers about
area
the performance
of the company
B
B
Either A or B
None of the
Above
B
Adv IIT - Question bank
________,___________,__________ are commonly referred to
AOA3
as CIA in information security parlance.
Confidentiality,In Confidentiality,In Confidentiality,In Confidentiality,In
tegrity and
tegrity and
tegrity and
tegration and
Availability
Authentication
Access rights
Authentication
A
AOA4
_____________means information available in the organization
should not be altered or modified by unauthorized personnel.
Confidentiality
Integrity
Availability
Authentication
B
AOA5
The process of identifying an individual, usually based on user id
and password in an organization is called______________.
Availability
Authentication
Confidentiality
Integrity
B
Which of the following is not a software equipment required in a
AOA6
CA's office?
Resource
allocation and
scheduling
Client
management
HR and Payroll
None of the
Above
D
AOA7 Which of the following is not an application arranged by ICAI?
ICAI-XBRL suite
K-DOC
ICAI-TOC
D
2
3
5
B
Private Branch
exchange
Public Branch
exchange
C
AOA8 How many stages are there in the sales cycle?
AOA9 PBX stands for ________
Which of the following will not appear in the home page of KDoc?
To change an email header so that the message appears to have
AOA11 originated from someone or somewhere other than the actual
source is known as___________.
AOA10
AOA12 To playfully satirize a website is known as_____________.
_________is the complete package to manage the billing
AOA13
requirements of a CA firm on cash system of accounting.
AOA14 Which of the following is not a/an feature of eSecretary?
AOA15 Annual return preparation can be done using ________.
AOA16
________is correspondence automation & management
software that is seamlessly integrated with Microsoft Office.
Private Exchange Public Exchange
Branch
Branch
Billing and
Accounting
4
Powerpoint
Word
Paste Document
My Templates
C
Email middle
attack.
Email Spoofing.
Email hacking.
Email tracking
B
Web tapping
Web Interception
Web spoofing
Web threating
C
K-DOC
application
C
Share certificate
printing
D
Payroll
A
ICAI-ROC
application
B
Payroll
eSecretary
Contact
Management
ICAI-ROC
application
K-DOC
application
Greeting
Management
K-DOC
application
eSecretary
Billing and
Accounting
software
Email
Management
ICAI XBRL
Software
ICAI XBRL
Software
Adv IIT - Question bank
________ is an independent,objective assurance and consulting
AOA17 activity designed to add value and improve an organization's
operations.
Which of the following is/are the main purpose of the internal
AOA18
audit?
As per _____________of the Income tax Act,every person
AOA19 carrying on business or profession is requires to get his accounts
audited by a CA before the "specified date".
AOA20 FEMA Stands for _______________.
Which application helps the management to allocate the revenue
AOA21 to the credit of the right employee who identified the
opportunity?
AOA22 Who has full privileges in the financial accounting application?
_________is the centre point of the financial accounting
AOA23 application as any transactions having financial impact carried
out in any other module will reflect in this module.
In Financial Accounting Application,the transactions flow from GL
AOA24
(General ledger) to other modules.
Which of the functionalities is not provided in the purchasing
AOA25
module of Financial Accounting Application.
In Financial Accounting Application,automatic sequence number
AOA26 of documents control is not required in which of the following
module?
Which module of Financial Accounting Application can be used
AOA27
for assigning credit limit to customers?
AOA28 Which of these will trigger/alert for timely payment ?
Statutory audit
Tax audit
Internal auditiing
None of the
Above
C
Financial
reporting
Operations of the
organization
Both A and B
Either A or B
C
Section 45
Section 44AD
Section 43B
Section 44AB
D
None of the
Above
C
Foreign Exports
Management Act
Resource
allocation and
scheduling
Database
administrator
Financial
Foreign Exchange
Enterprise
Managament Act
Management Act
Client
management
D
Account
administrator
Document
Management
Systems
System
administrator
User
Administrator
C
AP module
GL module
AR module
FA module
B
TRUE
FALSE
Evaluation of
Vendors
Knowledge
management
B
Invite and
Receipts of
analyze
Comparison with
goods or service quotations from
budgets
vendors
D
C
Purchasing
Accounts Payable
Expense
Management
Purchasing
Sales
Accounts Payable
Accounts Payable
Accounts
Receivable
Expense
Management
Fixed assets
Accounts
Receivable
Bank
Reconcilations
B
C
Adv IIT - Question bank
We can manage interviews,offers and job vacancies by using
AOA29
which of the application?
AOA30
___________provides information about updation of project
cost based on time spent by employees on various projects.
AOA31 Which of the follwing is not a/an functionality provided by PMS?
___________automates the calculation of salary for taking inputs
AOA32 from the timesheet application, leaves from Leave Management
System and salary details from the HR master data.
AOA33
Which of the follwing is not a control in Leave Management
System?
AOA34
Permanent Audit File are obtained once but updated on
__________basis.
AOA35
In Permanent Audit file, _______ is not the key data
documented.
AOA36
The Document Management Sytem offers the
features___________.
________is a type of training in which user logon on the training
server with a user ID and password.
In some cases, trainee is supposed to appear for the
AOA38
examination/test at the end of the training is____________.
________ are the hardware/infrastructure equipments used in a
AOA39
CA firm.
AOA37
Resource
allocation and
scheduling
Performance
management
system
HR and Payroll
applications
Knowledge
management
None of the
Above
B
HR management
system
Payroll
Timesheet
application
D
Employee
Prepare
Capture the Key
Automated alerts
designation and
summary or bell
Performance
for pending
reporting
curve analysis of
Indicators
appraisals
structure
all employees
B
Payroll System
Knowledge
management
System
C
Excess leave
Error free
capture of leave
details
Approval
workflow
C
yearly
monthy
quarterly
B
Timesheet
System
HR management
System
Reduce
administrative
burden on HR
half-yearly
Copies of
Copies of clients’
Client’s
important
Organization
incorporation
accounting
contracts or long
chart
documents like
manual
term lease
MoC
agreements
Cost effective to
Role based
Complete audit
maintain the
All the Above
access
trail
documents in
soft copy
Classroom
Internal Training
E-Learning
E-Training
Training
Classroom
E-Learning
Virtual Learning
All the Above
Training
Application
PC
WAN
All the Above
Server
C
D
B
B
D
Adv IIT - Question bank
AOA40
Which of these is/are the standard email program used in an
organization?
AOA41 Which of the following is not a characteristics of WAN?
AOA42
AOA43
AOA44
AOA45
AOA46
AOA47
_________is protection of information assets from threats to
preserve their value.
Which types of information assets need to be secured in a CA
Office?
The extent and level of _________ would depend on the nature
of information.
__________ of information might be affected due to denial of
service attack or some other reasons.
__________means the sender cannot deny having sent a
message and receiver cannot deny receiving the message.
Risk may not be _______ in nature.
ACA10 In IDEA, Append functions can be used to_________.
ACA11 In IDEA, Statistics functions can be applied on_________.
In IDEA, increment value in Stratification function can be fixed or
free interval.
ACA13 In IDEA, Stratified Random functions is a part of which menu.
ACA12
Microsoft
Exchange
Lotus Notes
Most WANs are
owned by only
one organization.
Compared to
LAN, its
transmission
speed is low
Confidentiality
Integrity
Information
Security
None of the
above
C
Client data
Own data
Own documents
All the above
D
Availability
Confidentiality
Integrity
Authentication
B
Integrity
Authentication
Confidentiality
Availability
D
Non-Repudiation
Integrity
Authentication
Confidentiality
A
reputational
financial
Add data at the
end
operational
vulnerable
D
Sort
Filter
B
Numeric Data
Date Data
Both A and B
None of the
above
C
FALSE
TRUE
Analysis
Data
Relation
Sampling
IDEA
Unix
Calculation
Editor
SOFTCAAT
D
C
Testing Editor
A
File->Select
Export -> Print
Report.
C
Import data
ACA14 Which of the following is not an Audit Software
ACL
Using which functions to perform more complex calculations and
ACA15
Equation Editor
exception testing in IDEA?
ACA16 Which is the step by step procedure for reporting in IDEA.
function Editor
Click on Create
Report button on
File->Printthe Operation
>Create Report
toolbars->Report
Assistant.
Both A and B
None of the
Above
Switches are
WAN uses only
used to connect
private networks.
LAN and WAN
C
B
B
Both A and B
Adv IIT - Question bank
Which of the following are categories of computer audit function
?
ACA18 In the following list which is not an audit function ?
Items of audit
interest
Sorting
ACA19 In the following list which is a audit function?
File Definition
Review
Programming
standards
Stratification
Understand
program
specifications
Detection
ACA17
ACA20
Which is the following step involved in a source code review
methodology ?
ACA21 In IDEA which functions should be used to find repeated values ?
In IDEA, Stratification functions can be applied on which type of
data ?
In IDEA,Summarization accumulates the values of Numeric fields
ACA23
for each____________.
In which sampling,selecting sampling units using a fixed interval
ACA24
between selections is_______________.
ACA22
ACA25
ACA26
ACA27
ACA28
ACA29
ACA30
Ensures that all combinations of sampling units in the population
have an equal chance of selection is____________.
In Audit tool, to built relation between two tables, both table
should have_____________.
Input Control method is a part of Application Control Group.
Which is the following type of check that can be run when data is
input through terminal ?
Which is the following is the correct types of Field checks on
processed data ?
Which is the following is the correct types of Record checks on
input data ?
ACA31 Which is the correct types of Batch Checks ?
ACA32 Which is the need for table level tests ?
Data Analysis
System
validation
Sampling
All of the above
D
Export
Print Preiview
Append
D
B
Formulate flaw
hypotheses
All of the above
D
Exclude
Sequence
checking
Filter
A
Numeric Data
Date Data
Character Data
All of the above
D
Primary Key
Unique Key
Secondary Key
Composite Key
B
Random
Systematic
All of the above
None of the
above
B
Random
Systematic
All of the above
None of the
above
A
Common Table
Common Field
Common record
None of the
above
B
TRUE
FALSE
Field check
Filter check
Compare check
Data check
A
Overflow
Range
Sign Test
All of the above
D
Resonableness
Compare
Un-compare
Randomness
A
Control Totals
Outdated checks
On-line dated
checked
Mixed dated
checks
A
Data Integrity
Controls are
required for
authorization
Both A and B
None of the
above
C
Filtering
A
Adv IIT - Question bank
ACA33
ACA34
ACA35
ACA36
ACA37
ACA38
ACA39
Which is the following is the major points with respect to inter
table tests ?
This may make
the entire child Their Master &
tables referenced Child relationship
by the master
reference the
field in the main table from one
table unanother
available
Both A and B
Which is the software used by the auditor to take a view of a file
of data or transaction passing through the system at a particular
Mapping
Snapshots
Modelling
point of time ?
Which is the software used by the auditor to compare the source
Souce
Model
Code compasion
version of a program with a secure master copy ?
comparison
comparison
Which is the techniques whereby the auditor arranges or
manipulates data either real or fictitious, in order to see that a
Debug Testing
Logic Testing
Off-line Testing
specific program or screen edit test is doing its work ?
Which is the software used by the auditor to list un-used
Log Analysis
Mapping
Program Library
program instruction ?
Which is the software used by auditor to read and analyze
Log Analyzers
Machine level Executable level
records of machine activity ?
Software
Which of the following reason strongly call for Control & Audit
Lack of Visible Absence of Input
All of the above
Function ?
Transaction Trail
Document
ACA40 Which is the correct types of Field checks on input data ?
Missing data
Blank data
Both type
Test whether the
To ensure the
To ensure the
overall system
Which is the major points to be consider with respect to System input data is valid
entered data is
ACA41
meet the
tests ?
before entering
saved without
requirement
the value
fail
specifications
In Data analysis techniques, which law is used to idenfity
ACA42
Bend Law
Benjamin law
Benford Law
statistical report on numeric data ?
Which is not a feature of File reorganization with an auditor
ACA43
Filtering
Sorting
Indexing
perspective?
None of the
above
C
Source
comparison
B
Exe comparison
A
On-line Testing
D
All of the above
B
Systax level
C
None of the
above
None of the
above
C
C
All of the above
A
British Law
C
Linking the
identified files
A
Adv IIT - Question bank
ACA44
What do you understand by the term, “Data Consistency” in
using CAATs?
Functions involving use of arithmetic operators, which enable
ACA45 performing re-computations and re-performance of results is an
example of?
Establish
relationship
between two or
more tables as
required.
Identify fields,
which have null
values.
Statistical
function
Arithmetic
function
Identify data,
which are not in Identify whether
agreement with all fields have
the regular
valid data.
format.
Logical function
Relational
function
C
B
Download