Test.docx

  • Uploaded by: sonam
  • 0
  • 0
  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Test.docx as PDF for free.

More details

  • Words: 23,095
  • Pages: 90
BASIC_CONCEPT q_id q_desc BC1 Collection of instruction is called a _____ BC2 Combination of alphabetic and numeric data is called _____ data BC3 Computers can be classified based on ______,______and _______ BC4 _____________ is the Worlds largest computer network . BC5 _________ are used in large organizations for large scale jobs BC6 _______ devices are responsible for feeding data into the computer BC7 _______ is the capability of the o/s to run numerous applications simultaneously BC8 _______ involves conversion of raw data into some meaningful information BC9 _______ device is responsible for obtaining the processed data from the computer BC10 _______ printers use light to produce the dots needed to form pages of characters BC11 Hardware components in a computer are _____,____,_____,______

op1 procedure

op2 batch

op3 command

op4 program

ans D

alpha numeric

alpha beta

numerous alpha

number and A alpha

space occupied, price, no. of users allowed Ethernet

cost, performance their ratio Internet

size, performance, cost ARPANET

input, output, C performance ratios None of the B above.

mini computers microprocessors PCs

mainframes

D

input

feed

write

A

multiprocessing multithreading

multiplexing

multitasking D

interpreter

compiler

converter

process

D

input

processor

ram

output

D

impact printers drum printers

thermal printers

C

operating system, bootstrap, kernel, shell operating system

non-impact desktop printers control program, monitor, interpreter, program, assembler, keyboard, bus compiler application windows 95 software

CPU, D memory, input device, output device interpreter B

compiler

assembler

coder

B

power builder

SQL * plus

all of the above

D

BC12 _______ software helps to do a specific task for the user BC13 _______ converts a high processor level language into machine language BC14 _______is/are a popular visual basic front end tool

output

BASIC_CONCEPT q_id q_desc op1 BC15 _______ translates assembly compiler language program into machine language instructions BC24 The model through which processing the relationship is diplayed model between data and information is called_______ BC25 ____________looks like a smart card ordinary credit card but incorporate a microprocessor and memory chip____________ BC16 ______ computers are used mainframes in large organizations for large scale jobs which have large storage capacities BC17 _______ is responsible for all control unit calculations and logical operations that have to be performed on the data BC18 ______ printer use laser light band printer BC19 ______ software enhances the user to enter ,store, manipulate and print any text BC20 _______ is the temporary storage place for deleted files BC21 Processed data is called ___________________ BC22 _____ language consists of strings of binary numbers BC23 _________capability supports concurrent users doing different tasks

op2 interpreter

op3 assembler

model

system model none of the above

C

RAM

ROM

Firmware

A

super computers micro computers

none of the above

A

arithmetic and logic unit

none of the above

B

none of the above none of the above

C

data management

non impact printer word processing electronic spreadsheet

my computer

recycle bin

Microsoft exchange

none of the above

B

data

datum

information

none of the above none of the above none of the above

C

central processing unit

drum printer

assembly machine language language multiprocessing multithreading

Internet

INTERNET

high level language multiplexing

op4 processor

ans C

B

B D

q_ id

business broadcasting system large

bulletin broadcasting system very small

network of network

intermediate network

ping service

ftp service

TELNET

ARCHIE

uniform resource locator scheme

unlimited restore locator

net

web

browser

a n s none of A the above none of B the above none of B the above none of A the above none of C the above none of A the above none of C the above editor B

Usenet

finger service

ftp

telnet

Higher text transfer protocol

Hyper text transmission port

q_desc

op1

IN BBS stands for______ 1

bulletin board system

IN USENET is a BBS on ____ 2 scale

small

IN Internet can be defined as 3 _______

internal network

IN _________is a program that finger service 4 displays information about a host connected to the net IN _______ is a program or a FTP 5 tool that helps in locating a file anywhere on the net IN URL stands for ____________ uniform research locator 6 IN A ______ always begins with message 7 a slash IN The World Wide Web is 8 referred to shortly as the _______ IN ______ is a program that 9 helps us to log on to other networks IN HTTP is the acronym for 10 __________

IN ______is used to transfer and iccp 11 copy files over the internet IN _____ is a program that helps yahoo 12 us to log on to other networks IN TCP/IP stands for transfer control 13 ________________ protocol/internet

op2

op3

command line

op4

D

Hyper text Hyper C transfer protocol text transfe r port ftp uucp none of C the above ftp telnet none of C the above transmission transfer none of B control communication the protocol/inter protocol/interne above net protocol t protocol

INTERNET q_ id

q_desc

IN HTTP stands for______ 14

op1 hotlink text transfer protocol

IN Two of the important lynx,minx 15 browsers are_____ and_____ IN ________ are defined as ways protocols 16 of communication amongst networks IN HTML stands for_____ higher text medium 17 language IN The system of interlinked 18 documents is known as_______ IN The small programmes that 19 create animation,multimedia,realtime games and multi user games are called______ IN The information displayed on 20 the web page includes______,_____ and_____ IN The web pages that represent 21 online home of their author are called______ IN _____ is the most popular 22 internet service

hot links

IN _______ is a program or a 23 tool that helps us find a file anywhere on the net IN Yahoo,lycos,excite and 24 webcrawlers are _____ IN GIF is the acronym for 25 ____________

images

a n s hyper text higher type none of B transfer transfer protocol the protocol above netscape,ie mosaic,gopher none of B the above IP address dns none of A the above hyper transfer hyper text none of C markup markup the language language above hyperlink books marks none of B the above applets animation none of B the above op2

op3

op4

graphics,videos,audio

programms,im animation,script none of A ages,text s,executables the above

first page

home page

yahoo service

electronic mail search engines

newsgroup

telnet

ftp

search engines

web directories Graphical interchange Format

database

Graphical interpreter formatting

welcome page

none of B the above none of B the above archive D

channe B l Graphical Graphic B interface format al Interfac e format

INTERNET q_ id

q_desc

IN JPEG is the acronym for 26 ___________

op1 Joint Pictures Expert Group

op2

op3

Jumbled Joint pictures pictures expert expert graph graph

IN 27 IN 28

The World Wide Web consists information of _________ A hyperlink can be on text only ___________

web pages image only

network connections text or image

IN 29 IN 30

Web is a collection of web sites ___________ The two major browsers used MS Internet Explorer and to surf the Internet are Mosaic ________,_______

images

applets

IN The internet is also called as 31 _______________ IN 32 IN 33 IN 34 IN 35 IN 36

IN 37

arpanet

Netscape MS Internet Navigator and Explorer and Mosaic Netscape Navigator the net intranet

op4

a n s A

Joint picture s experi mental group mails B

neither C text nor image docum A ents None C of the above

none of B the above The internet is similar to LAN peer-to-peer wan none of B _________________ connectivity the above The net transfers______ from data parcel packets none of A one place to another the above The net provides interesting scripting,parsing and news,cooking email,file none of C services like______,______ compiling and fine arts retrived,internet the and______ tools above ________ is the ancestors of dnet arpanet ARPANET none of B the internet the above DARPA stands for defensive administrative dedicated and defensive none of C ________________________ rank administration registered advanced the _______________________ network projects research above administration projects administration net DARPA is broken into milnet,smaller arpanet mailnet,inet intranet,extrane none of A ________ and _______ t the

INTERNET q_ id

q_desc

op1

op2

op3

op4

a n s

above IN NSFNET is the united states education,research music and cooking and none of A 38 provides service to _____ dance dining the and_____ above IN HTML stands for Higher text manipulation Hotlink text Hyper transfer Hyper D 39 ________________________ language markup meta language text ______________ language markup Langua ge IN The first international IP united states and UK england,norwa united states & none of B 40 network connections were y Russia the established in 1973 with above _____ and_____ IN A_____ is a set of computers server client network none of C 41 interconnected by the transmission paths to above exchange information in internet IN A computer that provides a client stand-alone servers none of C 42 service usable by other the computers is called______ above IN _____ can be owed by LAN MAN WAN none of C 43 multiple organisation the above IN Data is transmitted in the analog digital non-digital none of B 44 form of_____ signals the above IN Modem stands for Moralize/demoralize Modulation/de Manipulate/dem none of B 45 __________________ modulation anipulate the above IN ______ is the process of the Mapping Modulation Manipulation none of B 46 digital signals being the converted into a form above suitable for analog transmission IN ________ and______ are two Satellite link and digital Dedicated Cable and wires none of B 47 basic ways of getting signals access and dial the connected to the internet up access above IN SLIP stands for Standard long internet Stream line Serial line none of C 48 ________________ protocol internet protocol the protocol above

INTERNET q_ id

q_desc

IN PPP stands for _____ 49

op1

op2

Prime prolonged protocol

op3

Point to point Pillar to pillar protocol protocol

a n s none of B the above op4

MKTQ_CAAT q_i q_desc op1 d CA Identify the need for Absence of input 1 controls and auditing in a documents computerised environment. CA The organisational, Application controls 2 management, maintenance and access controls are categories of …… CA The application controls are Input controls 3 ….

op2 Lack of visible transaction trail General controls

op3

op4

ans

Accessibility of All of D data and computer the programs above Check controls

Processing Both A and B controls

Input B control s Neithe C r A nor B Digit C

CA Identify the field check - "If a List 4 set of values is defined, is the input data one of these defined values?" CA The field check that Format mask 5 conforms if data input for a field is in a particular format. CA The field check on a Range 6 processed data that fails if a field is not initialized to zero or errors occur during calculation is…… CA The validation checks Field checks 7 applied to a field depending on its logical interrelationships with the other fields in the record are called ….. CA A group of records or Physical batches 8 transactions that are contiguous constitute …..

Range

Slab

Data mask

Field mask

Input mask

A

Sign

Overflow

Serial

C

Record checks

Batch checks

File B checks

Logical batches

Block batches

CA …………..is the type of batch Control totals

Serial

Transaction type

Transa A ct batche s Sequen C

INTERNET q_ id 9

CA 10 CA 11

CA 12

CA 13

CA 14

CA 15

q_desc check (group of records) for all input records of a particular type is done. Grand totals calculated for any code on a document in the batch are called….. Control that checks if correct sequence of commands and update parameters are passed from the application software to the database. With respect to data integrity control, when monetary transactions are processed against master files without a match, we should maintain a …. The system test that tests the top-level modules first and then the lower modules are simulated with dummy modules to check the interfaces is called …. Identify the audit technique that examines each transaction as it passes through the system. The Core Image Comparison audit technique compares the….

op1

op2

op3

number

op4 ce check

Financial totals

Record totals

Document totals

Hash D totals

Table level

Data Integrity

Batch check

System B test

Sequence account

Data account

Suspense account Update C accoun t

Bottom up test

Hybrid test Stub test

Top D down test

Embedded code

Program code

Databa A se code

Database Analyzers

Database with master Executable Transaction data table program with master with master transaction copy

CA The technique used by an Modelling 16 auditor to list unused program instructions is….. CA The sample data created Test data 17 and used for the purpose of testing the application

Analyzing

Mapping

Table data

Item data

Modul B e progra ms with snapsh ots Tracing C

Record A data

a n s

INTERNET q_ id

CA 18

CA 19

CA 20

CA 21

CA 22

CA 23

q_desc system is called…. The test data (dummy unit) implemented in the normal processing of the system over a period of time is known as…. The test data generated with correctness proof, data flow analysis and control flow analysis tools is called…. When a real-time system is simulated to generate the same output as the realtime system, the technique is called…. When an auditor expands the extent of substantive tests to determine the impact of defects on the attainment of program objectives, the methodology is…. This is an important control in systems that use digital signatures for authentication purposes. Selecting transactions based on a sampling rate is called …. method.

op1

op2

op3

Integrated Test Facility Black box Graph testing Test Facility

op4

Whiteb A ox testing

Test item block

Test data pack

Test program pack Test B record pack

Parallel trailing

Tracing parallel

Parallel coding

Cross reference lister

Formulate Correct lister flaw hypotheses

Public audit trails

Random Sample audit trails Data audit trails audit trails

Transaction sampling

Systematic Simple sampling sampling

CA The capability of the File size 24 generalized audit software to read different data coding schemes, different record formats and different file structures is…. CA The audit software Sort and merge files 25 capability of frequency analysis is to….

Parallel D simulat ion

Formul B ate correct hypoth eses

A

Demog B raphic sampli ng File C reorga nisatio n

File data

File access

Sampling nth item

Formatting output Classify D data on a criteria

a n s

INTERNET q_ id

q_desc

op1

op2

op3

CA The audit functions of Stratification 26 attributes sampling, variables sampling, stratified sampling are included in …. functions. CA Identify the functional Ex Post Auditing Only 27 limitation of a generalized audit software that enables evidence collection only on the state of an application system after the fact.

Selection

CA The purpose-written audit 28 programs are used for…..

Data retrieval, code comparison

Reading data, selecting and analyzing information

Track

Snapshot

Post audit

System audit

op2

op3

Sorting, creating, and printing files

CA Picture of a transaction as it Program 29 flows through the computer systems is called….. CA Identify the type of audit General audit 30 when auditors are members of the systems development team.

Statistical

op4

a n s

Reporti C ng

Analytical Limited ability to review only determine Propensity for Error

Limite A d ability to Verify Proces sing logic Specifi D c tasks with origina l or modifi ed progra ms Picture C

Concur D rent audit

Q_BC_IN q_i d

q_desc

op1

BC1 The processor uses this Monitor workspace as a scratch pad during processing. BC2 1024 Megabyte is 1 KB equivalent to: BC3 The software used for Application software layout of newsletters and magazines along with text

Processo Keyboard r

Memory

Ex an pr s 1 D BC

1 MB

100 MB

C

BC

Data modelling B

BC

1 GB

Desktop Application publishin development g

op4

INTERNET q_ id

BC4

BC5 BC6

BC7

BC8

BC9

BC1 0

BC1 1 BC1 2

q_desc and images is called…… The model used to describe the relationship between data and information is called A super computer uses a bus width of…… When a processor executes one billion floating-point arithmetic operations per second, is called….. The processor responsible for communication to and from all the remote terminals connected is termed as ……… The processors used for speed-critical graphics applications are…… The plastic cards with embedded microprocessor and memory are called….. VLSI stands for…..

The data width of a Pentium 4 computer is …… The unit which executes addition, subtraction, multiplication and division operations is …… BC1 The instructions to be 3 executed by the processor are loaded from memory into the BC1 The results of a process are 4 stored into ………

op1

op2

System model

Data model

16 bits Nanoflops

Information model

op3

op4

a n s

Logical model A

BC

256 bita 64 bits

8 bits

C

BC

Tetraflop Megaflops s

Gigaflops

D

BC

Front-end processor Host Backend processo processor r

Terminal processor

A

BC

CISC

RISC

CCSIC

B

BC

Credit card

Compute Memory card Smart card r card

D

BC

Very large scale Integration

Very large silicon integration

A

BC

16 bits

Very Value limited limited scale ic silicon integrati on 8 bits 32 bits

1 k bits

C

BC

CPU

ALU

MU

CU

B

BC

Instruction unit

Process register

Program counter

Instruction register

D

BC

Accumulator

General- Process purpose register Register

Instruction register

A

BC

CAD

INTERNET q_ id

q_desc

op1

BC1 The memory that stores DRAM 5 data as a series of memory cells that can be accessed sequentially is…… BC1 The technology used to Processor bus 6 accelerate the processing of a computer is ……… BC1 The memory used in a Cache memory 7 computer's BIOS chip is…….. BC1 The process of swapping Fragmentation 8 information between the RAM and hard disk can cause BC1 The standard system bus Dual independent 9 was replaced by frontside bus and backside bus called……. BC2 The DSP,DAC,ADC,and Graphics card 0 ROM are parts of the …… BC2 The bus whose widths are ISA 1 32 or 64 bits is called…… BC2 The maximum resolution 1024*640 2 of a standard SVGA adapter is …… BC2 …………. synthesis method Amplitude 3 uses recordings of actual instruments. BC2 The instrument that can Printer 4 produce continuous lines is….. BC2 PPM , CPS are units used to Speed 5 measure the printer's ….. BC2 The PCL and postscript are Page definition limit 6 defacto standards for……

BC2 A laser printer has RAM for Font catridges 7 downloading fonts called

op2 SAM

SRAM

op3 ROM

op4 B

a n s BC

Cache BIOS memory ROM memeory B memory

BC

SRAM

Flash memory D

BC

Paging

C

BC

Dynamic Cache memory Dual interface A memory bus bus bus

BC

Memory Sound card card PCI AGP

Media card

C

BC

MCA

B

BC

780*102 1280*1024 4

1280*680

C

BC

Frequenc Pulse y

Wavetable

D

BC

Plotter

Scanner

Pen

B

BC

Quality

Resolution

Lines

A

BC

Page Pixel definition Page definition B descripti languages lines on language s Dynamic Soft fonts Soft settings C catridges

BC

Optical memory

Disk full Thrashing

BC

INTERNET q_ id

q_desc

op1

the……. BC2 The characteristic which Convergence 8 refers to how sharply a pixel appears on the monitor is called….. BC2 The faster the refresh rate, Sharpness 9 the lesser the monitor….. BC3 The number of bits used to Size of image 0 represent a pixel in a monitor decides the …….

op3

op4

a n s

Resolutio Dot-pitch n

Size

A

BC

Resolutio n Colors and shades of gray that can be displayed Touch pad

Size

C

BC

Resolution and Signal and sharpness refresh rate

B

BC

Light scan

D

BC

Optical PhotoOptical A character multiplier tube sensitive tube recogniti on Optomec Optical Joystick B hanical

BC

Trackball

Joystick

Zip disk

BC3 The input device that Touch screen 1 utilizes a light-sensitive detector to select objects on a display screen is called….. BC3 The most commonly used Charge-coupled 2 scanner technology is…. device

BC3 Identify the type of mice 3 that uses optical sensors to detect motion of the ball. BC3 Identify the input device 4 that consists the puck and the stylus. BC3 Identify the disk which has 5 an access time of 30ms. BC3 A set of tracks across a set 6 of platters in a hard disk is called a…… BC3 The bus used to connect a 7 CD-ROM to your computer is….. BC3 The digital audio tape with 8 the capacity of 24GB of data uses the technology called …..

op2

Mechanical

Flickers

Tablet

Light pen

BC

Pen

C

BC

Jaz disk

C

BC

Disk

Floppy Winchester disk disk Cylinder Spiral

Block

B

BC

SCSI

PCI

DAT

A

BC

Hyper circles

Fero Linear velocity Helical scan magnetic

D

BC

MCA

INTERNET q_ id

IBM

Macintos Lomega h

Imation

B

a n s BC

SuperDisk

Jaz disk

Zip disk

Hard disk

A

BC

700 MB

6 GB

630 MB

2GB

B

BC

Super disk

DATROM

CD-ROM

MO drives

C

BC

Winchester disk

Zip disk

Magnetic tape Magnetooptical drive

C

BC

Hard disk

Jaz disk

DAT drives

D

BC

Memory module

Data module

Kernel module I/O module

C

BC

Job management

I/O Batch manage management ment

Data management

A

BC

Disk storage

Memory Virtual storage memory storage

Extended storage

C

BC

Paralleling

Cooperat Dividing ive

Preemptive

D

BC

Multithreading

Multipro Multitasking cessing

Multiprogram A ming

BC

Multi-user

Real-time Multitasking

Multithreading B

BC

q_desc

BC3 The floppy disks that 9 support 400k-1.2 MB belong to…… BC4 The backward compatible 0 disk that has high density120MB is called…. BC4 The maximum capacity of 1 an optical disk is …… BC4 Which of the auxiliary 2 storage devices uses the constant angular velocity access technology? BC4 The……..is an auxiliary 3 sequential access nonvolatile storage device. BC4 The portable device that 4 optimizes the features of the floppy and the CDROM is…. BC4 The important central 5 module of an operating system is the….. BC4 Identify the function of the 6 operating system that manages the tasks waiting to be processed. BC4 This function of the OS 7 manages allocation of a minimum main memory to tasks. BC4 Identify the multitasking 8 type that slices CPU time to each program. BC4 The OS which allows 9 different parts of a single program to run concurrently is….. BC5 The OS that monitors 0 external activities with timing constraints is….

op1

op2

op3

op4

MO drives

INTERNET q_ id

q_desc

op1

BC5 The 32bit operating system Win 2000 server 1 for desktop version that replaces Win 9x is….. BC5 The high-level logical disk Frame allocation 2 structure which defines table the way the entire disk is organised is ….. BC5 A collection of sectors on a Block sector 3 hard disk is a BC5 The FAT system that FAT16 4 provides long filename support and was written using protected-mode code . BC5 Identify the file system FAT16 5 that provides networking,security,compr ession, large file support…. BC5 The logical directory Root directory 6 structure has a base of the tree called the…… BC5 The process used to Formatting 7 optimize the disk space by arranging files contiguously is ….. BC5 Choose the level of RAID Level 0 8 that offers disk mirroring for fault tolerance. BC5 Identify the archive Zip, LZH, ARJ 9 formats found on Unixbased Internet sites. BC6 Identify the window screen Title bar 0 part that indicates the name of the window, application or document. BC6 The button on the title bar Scroll box 1 of a window that displays the menu to control the size of the window is….. BC6 The mouse operation that Click 2 is used to move windows

op2

op3

op4

Win 2000 C advanced server Format File allocation D allocation type table

a n s BC

Win 2000 datacent er File allotted table

Win 2000 professional

Cluster

Block

Table

B

BC

VFAT

NTFS

FAT32

B

BC

VFAT

NTFS

FAT32

C

BC

Main Start directory Tree directory A directory

BC

Defragm Allocation entation

Partition

B

BC

Level 2

Level 1

Level 3

C

BC

Exe, zp, tz

Doc, xls, wzp

Tar, gz, taz

D

BC

Menu bar

Vertical bar

Control bar

A

BC

Control box

Minimize box Maximize box B

BC

Double click

Dragging

BC

Scrolling

C

BC

INTERNET q_ id

q_desc

and icons to different locations is ….. BC6 The start button,tray and 3 shortcuts are important features of the ……. BC6 The start menu option that 4 keeps track of your important websites is ….. BC6 If you want the recycle bin 5 capacity to be distributed across partitions, you must use the option …… BC6 The feature to retrieve 6 deleted files from the recycle bin is ….. BC6 The feature which enables 7 to synchronize files between a floppy and disk is ….. BC6 A file with the pdf 8 extension can be viewed with the application….. BC6 The remote administration 9 access to view shared resources on the network is….. BC7 The utility used to access 0 the directory structure, create files and folders etc is…. BC7 The font, color, 1 background settings are saved in the ….. BC7 The Notepad utility saves 2 files in the …… format. BC7 Identify the windows 3 feature that allows more than one person to use a single PC with his own desktop.

op1

op2

op3

op4

a n s

Control panel

Title bar Task bar

Command menu

C

BC

Documents

Programs Accessories

Favorites

D

BC

Configure drives independently

Configur e capacity independ ently De-link

Configure Confirm drive partition partitions capacity independently

A

BC

Restore

Re-copy

C

BC

Re-paste

My Documents

My My Folder Briefcase

My Directory

B

BC

Adobe Acrobat Reader

Adobe Viewer

Notepad

Wordpad

A

BC

Net Drive

Net Watcher

D

BC

Net Neighbourhood Net Tracer

Windows Tools

Windows Windows Explorer Accessories

Internet Explorer

B

BC

Control panel

Desktop icons C

BC

Binary

My Desktop compute themes r Unicode Hybrid

ASCII

D

BC

Log off

Run

Restart

A

BC

Find

INTERNET q_ id

q_desc

BC7 You can quickly access the 4 recently worked on files from this start menu option. IN1 The Internet is a network similar to ….. IN2 When a computer is connected to the internet through a LAN IN3 PPP stands for:

IN4 SLIP stands for:

IN5 When a user connects to Internet with a shell account it is called ……. IN6 The launch of DARPA's Internet Protocol (IP) facilitated the term….. IN7 The costs of Internet implementation are…..

IN8

IN9

IN1 0 IN1 1 IN1 2

op1

op2

op3

op4 C

a n s BC

Favorites

Accessori Documents es

Settings

Peer-to-Peer connectivity Dial-up access

Point-toPoint link Dedicate d access

Port-to-Port connection Deployed access

Peer-to-Peer A talking Service access B

IN

Pin to Pin communicatio n Serial Line Internet Protocol

Port to Port Protocol

B

IN

Setting Link C Inter Protocol

IN

Indirect access Dial-up access D

IN

Protocol to Protocol Point to Points Point Protocol Serial Limited Serial Internet Protocol Lock InterProtocol Direct access Dedicate d access Network

Connection cost, cost of telephone line

Consorti Internet um

Compute r cost, network card cost This software enables a Terminal embedded Terminal host to work as a terminal emulator on the network. The Windows Internet Sockets Package application functions were developed based on the UNIX programs called….. Each computer on the 24-bit address 16-bit Internet is identified with address a…. A mail server robot can Check mails Read automatically…. mails This protocol is used to Transmit Transmis check reliability, Communication sion

Topography

IN

C

IN

IC board cost, Connection A cable cost company cost, connection data cost Indirect Terminal B software communicator

IN

Protocol

A

IN

30-bit address 32-bit address D

IN

Respond to Delete mails C mails Telnet Control Communicatio B Port n Control

IN

Simulators

IN

IN

INTERNET q_ id

IN1 3

IN1 4

IN1 5

IN1 6 IN1 7 IN1 8 IN1 9

q_desc sequencing and flow control. To check that data reaches the destination in a proper order, the data packets are assigned…. The computer which provides FTP, WWW, Mail services on a network is called…. The method of accessing files through publicly accessible server that gives free access to the files is called …… This file is transferred verbatim with FTP service. We can access the Archie server by…… The types of Archie servers are ….. % telnet archie.ans.net is the command used by the Archie client to….

IN2 This tool helps us to locate 0 a file anywhere on the Internet. IN2 The computer that maps 1 the Internet domain name to the Internet numeric address is the ….. IN2 ………….is the format of 2 Internet Address. IN2 The email address has two 3 parts one is the username while the other is the …. IN2 The resources on the 4 World Wide Web are linked with the naming

op1 Protocol

op2

op3

op4

a n s

Control Protocol Packet Sequence numbers numbers

Protocol Data numbers C

IN

Client

Server

Host

PC

B

IN

Public FTP

Server FTP

Available FTP

Anonymous FTP

D

IN

ASCII file

BIT file

Binary File

TEXT file

C

IN

Tunnel

WWW

Telnet

Message

C

IN

Straight Archie

Windows Archie Program the Archie Server Remote

Both A and B

IN

Request the Archie server

Neither A nor C B Protocol the A Archie server

Archie

Archives

C

IN

Network translator Address Domain name Domain C server Naming server relation server server

IN

Aaa-bbb-ccc-ddd

IN

Order numbers

Login to Archie server

FTP

Domain

Aaa.bbb. Aaa/bbb/ccc/d Aaa*bbb*ccc* B ccc.ddd dd ddd Net Web Mail A

Universal Resource Universal Uniform Location Resource Resource Locator Locator

Uniform C Reserved Link

IN

IN

IN

INTERNET q_ id

q_desc

format ….. IN2 This Net tool provides a 5 stimulating on-line discussion environment. IN2 6 IN2 7 IN2 8

The IRC II client program command begins with a …. The IRC conversations are organized into…. Identify the output of the IRC command " /list -min 10" .

IN2 Lynx text browser is a web 9 client in which users can login with ….. IN3 A web browser provides 0 this hotlist for a user. IN3 The tool to obtain 1 information on the web by menus and more flexible than Archie is…. IN3 These servers help in 2 searching for words from a list of databases or documents. IN3 This scripting language is 3 an object based language and is developed by Netscape. IN3 The one-way broadcast of 4 live events is called…. IN3 This is a system of 5 thousands of distributed bulletin boards and read by a newsreader. IN3 Unix shell provides mailing 6 programs called ….

op1

op2

op3

op4

a n s

Internet Relay Chat Relay Chat packet messaging transmiss ion Percent Slash Line

Information chatting

A

IN

Dot

B

IN

Chats

Packets

Lines

Channels

D

IN

Display channels with at least four users

Display chats with the maximu m 10 users Terminal ping

Display channels with at least ten users

Display line with 10 removed channels

C

IN

Shell accounts Shell programs C

IN

Self accounts

Book-keeping

Bookmarks

D

IN

Lynx

Bookmar Menu king Juggler Gopher

Gateway

C

IN

WINWAIS and WAISMAN

WIIS and WINNET and NETWAIS WAISLINK

WINSRC and FTPWAIS

A

IN

SGMLScript

VbScript SunScript

JavaScript

D

IN

Netcast

Cybercas Eventcast t Newsgro Newsletter up

Livemessaging B

IN

Networkboard B

IN

Pile and Pine and Elem Embedd

Port and Elm

IN

Bulletinreader

Pine and Elm

A

INTERNET q_ id

q_desc

op1

op2

op3

op4

IN3 The Unix to Unix copy mail 7 system separates parts of the mail address with the symbol...….. IN3 The Netlauncher (TCP/IP) 8 software consists of these programs that can run under Windows. IN3 The parts of the WSIRC 9 server (net tool) window are…..

@

!

#

()

Spy Mosaic

Image View

Both A and B

Neither A nor C B

IN

Server message, command line and channels

Server message,com mand line and channels

Server C message,com mand line and channels

IN

IN4 These are small java 0 programs that create games, multimedia etc. These are downloaded over the Net and executed by a web browser. IN4 The World Wide Web is a 1 collection of….. IN4 It is a link which helps in 2 retrieving information from the WWW easily. IN4 …………..directories deliver 3 information on all the topics on the Internet. IN4 This browser does not 4 display links in color. IN4 The Mosaic browser stores 5 information about the configuration in a/an …. IN4 This is an indexer that 6 crawls around the web cataloging. IN4 The option by which the 7 browser window in Navigator Gold 2.0 can be shifted to editor window is ….

Java scripts

Server message, comman d line and channels Java exe

Java applets

Java objects

C

IN

Net addresses Web pages

D

IN

Netlink

Net pages Sitelink

Hyperlink

Hypernet

C

IN

Web maps

Net ports Wide maps

Web infos

A

IN

Netshark

Cello

Lynx

Mosaic

B

IN

Ini file

Exe file

Web file

Txt file

A

IN

Webcrawler

Web sites

Web creators Web ports

A

IN

Edit/New file

Edit/Save New/Edit page New/Edit Window Document

D

IN

Web windows

B

a n s IN

INTERNET q_ id

q_desc

IN4 This toolbar button 8 displays information about web creation. IN4 This window in Navigator 9 Gold does not support frame display. IN5 The different ways of 0 communication on the Web are….. IN5 This download tool 1 provides multi-server connection, can search for mirror sites and provides a file leecher. IN5 The…………button provides 2 HTML tags for font style, alignments, and colour options. IN5 Identify the search engine 3 that helps in concept based searching. IN5 This is a text only browser. 4 IN5 The multithreading feature 5 of Netscape is facilitated with a storage space named….. IN5 The distributed uploading 6 of web pages through Navigator Gold is called….. IN5 The method of presenting 7 information on the web through highlighted items is called…… IN5 The a2z directory is an 8 alphabetical list of pages used by the search engine….. IN5 Netscape browser can 9 display context links on an image called…..

op1 Printer

Script window

op2

op3

op4

Web Pager Document B page starter Browser Editor window Form window C window

Interpersonal

Group

Download Accelerator Plus

Both A and B

a n s IN

IN

Neither A nor C B

IN

Fresh WinZip Plus Downloa d

Webcow

A

IN

Edit Format

Characte File Format r Format

Window Format

B

IN

Lycos

Yahoo

Excite

Infoseek

C

IN

Lycos

Lynx

Links

Netshark

B

IN

Archive

Cache

Thread

Retriever

B

IN

Web loading

Web Web publish updation

Page publish

C

IN

Hypertext

Webtext Nettext

Hyperlimit

A

IN

Netleecher

Webinde Lynx xer

Lycos

D

IN

Image webs

Image maps

B

IN

Image graphs Image texts

INTERNET q_ id

q_desc

IN6 Name the download tool 0 which highlights an area of a page and gets all the links that are within the highlighted area. IN6 ………...helps in business 1 transactions, generating revenue and demand on the information highway. IN6 The transfer of structured 2 data for processing from computer to computer using agreed formats and protocols is called….. IN6 This system involves 3 electronic transfer of funds between financial institutions. IN6 A …… electronic mailbox 4 stores EDI transactions for later retrieval. IN6 5

IN6 6 IN6 7 IN6 8 IN6 9 IN7 0

op1

op2

op3

op4

Webcrawler

Webcow Weblinker

Webcaster

E-commerce

EBoth A and B Marketpl ace

Neither A nor C B

Electronic Document Intercahnge

Electroni Electronic Data Efficient Data c Data Internetworkin Interchange Interchan g ge

Electronic Financial Efficient Electronic Transmission Format Format Transacti Transfer ons Value Added Very Value Aided Networks Advance Networks d Networks The mutual satisfaction of Negotiation and Networki Negotiation price, terms and Bargaining ng and and servicing conditions, delivery and Buying evaluation criteria in a marketplace is…. The type of advertising, the Passive Push Portal Broadcast and Junk Mail models are of….. Identify the models of Billboard Portal Both A and B passive advertising. This layer is responsible for Network Layer Data Link Presentation transmitting data as Layer Layer frames. This layer is responsible for Link Layer Network Presentation encoding of data. Layer Layer This layer of the TCP/IP Application Layer Link Transport suite includes the device Layer Layer driver and network interface card.

B

a n s IN

IN

B

IN

Electronic D Fund Transfer

IN

Value Enhanced Networks

A

IN

Critical buying A

IN

Smart

B

IN

Neither A nor C B Transport B Layer

IN

Physical Layer C

IN

Network Layer B

IN

IN

INTERNET q_ id

q_desc

op1

op2

IN7 This protocol is used for Simple Mail Transfer Internet Internet 1 flow control, echo and flow Protocol Control Control Data redirection. Message Protocol Protocol IN7 The software components Device drivers Device Device 2 that integrates different modules programs hardware devices with the operating system….. IN7 This is the basic Cable Interface Card Netlink Device 3 component that connects Interface Interface Card the computer to the Card network. IN7 The dumb terminal/node Personal computer Client Server 4 in a network depends on compute computer this computer for their r basic functioning. IN7 This has an embedded Data card Security Combi card 5 microchip which can both card manipulate data and execute applications. IN7 To ensure a reliable Session Socket Layer Secure Electronic 6 communication between Protocol Sockets Socket Layer the buyer and seller, the Layer Protocol protocol used is…. Protocol AC1 The financial transactions Collected and Sampled Grouped and are to be …………. leading computed and summarized to different steps in stratified Accounts Compilation. AC2 The basic document where Ledger Journal Voucher transactions are entered chronologically is…. AC3 These are the basis for Journal and Ledger P & L P & L Account analysis by potential Account and Balance investors, banks etc. and Sheet Journal AC4 The accounts that the Liability Income Sales business owns is called …. AC5 The expenditure for Expense Example Taxes running the business for a period is ….. AC6 Identify the account type Real accounts Personal Nominal

op3

op4

Single Control B Message Protocol Software devices

a n s IN

A

IN

Network D Interface Card

IN

Data computer C

IN

Meta card

C

IN

Cyber Socket B Layer Protocol

IN

Assets and liability

C

Trial Balance

B

Voucher C Account and Balance Sheet Asset

D

Income

A

Expense

B

INTERNET q_ id

AC7

AC8

AC9

AC1 0 AC1 1

AC1 2 AC1 3 AC1 4 AC1 5 AC1 6 AC1 7

AC1 8

q_desc

op1

by the rule: "Debit the receiver and credit the giver". The first document where Ledger the transaction is entered is called a ….. The document used for Voucher and journal posting of accounting transactions is …….... When the debit total is Income greater than credit total, the amount appears in the …….. column. The methods LIFO, FIFO, Value closing stock Moving Average are used to …. The report prepared taking P & L statement the asset and liability type accounts from the Trial Balance is called…. The report that depicts Trial balance operating profit/loss for a period is ….. The day book contains Income or transactions relating to expenditure ……… The Bills Receivable details Journal sheet are maintained in a …….. Creditors ledger has details Customers of your dues to …….. The sundry debtors are Income side placed in the Balance sheet on the …… The first step in Tally File before any transaction is entered or saved is creating a ……… To configure country F10 specific details use the function key……

op2

op3

accounts accounts

accounts

Liability

Voucher

Expense

Ledger and trial balance Debit

Balance sheet Journal and and trial ledger balance Credit Expense

op4

C

D

B

Value Value expense Value income A clearing stock stock stock Income Balance sheet Asset sheet C statemen t Trading P & L account statement

Suspense accounts

C

Sales or Asset or purchase liability

Profit or loss

B

Voucher Sundry debtors debtors Assets Liabilities

Original entry C Suppliers

D

Assets side

Payable side

B

Company Project

Application

B

F2

F11

C

Expense side

F12

a n s

INTERNET q_ id AC1 9 AC2 0 AC2 1 AC2 2

AC2 3 AC2 4

AC2 5 AC2 6 AC2 7

AC2 8 AC2 9 AC3 0

AC3 1

q_desc Identify the security mechanism used in Tally. After selecting a company in Tally, you will be in the…… Tally software is based on ……… accounting system. Identify the primary group of capital nature that uses bank account and cash in hand as sub groups. All financial entries in Tally are done using……. The Direct expenses, Purchase account, Direct income are primary groups of ….. The option to delete a subgroup is admissible through the menu…… The behavioural attributes of this group cannot be changed. Credit limits for personal accounts and branches can be done in the ledger mode…… We are not allowed to delete a ledger from this mode. All account heads except Cash and Bank are placed in the…… Identify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank OCC Account. The primary document for recording all financial

op1 Tally Secure

op2

op3

op4

Tally Tally Group Pack Gateway Entry of Tally of Tally

Tally Vault

Producti Mercantile on Current Loan assets assets

Manufacture

Vouchers

Groups

Ledgers

Capital nature

Expense Revenue nature nature

Income nature C

Alter

Delete

Display

Shift

Sub-group

Ledgergroup

Primary-group Alter-group

Single

Multiple Sub-group

Alter-group

B

Single

Subgroup

Alter-group

Multiple

D

Sub Ledger master

Group Ledger master Income

General Journal Ledger C Ledger master master Assets

Loans

D

Trial sheet

Voucher

File

C

Accounts of Tally

Sales Fixed assets

Expenses

Journal

Journal

D

Groups of Tally B

C

Capital assets B

D

A

C

a n s

INTERNET q_ id

AC3 2 AC3 3

AC3 4 AC3 5

AC3 6 AC3 7

q_desc transactions in Tally is the…… You can customize the voucher entry screen using the function key……. Identify the voucher type that records fund transfers between cash and bank accounts. This voucher type records adjustments between ledgers. The use of classes for payment, receipt and contra vouchers enables data input in …… The details of a voucher entry can be given in the ……. The credit note voucher can hold account types: ……..

AC3 The suffix and prefix 8 details for the voucher type can be made applicable only from the ……. AC3 The voucher used to 9 record all bank and cash payments is ….. AC4 Tally's age-wise analysis 0 considers the voucher's …… AC4 Arrange the steps in 1 generating the books of accounts.1. Create Trial balance2. Create new ledgers3. Generate Day Books4. Update journals for financial transactions

op1

op2

F13

F12

Credit Note

Sales

op4

F11

B

Payment Receipt

Contra

D

Receipt

Journals

D

Double entry mode List entry Choice entry mode mode

File entry mode

B

Comment

File

Narration

D

Sales account, Sales Ledger tax account account, Bank account End of a month First of a year

Suppliers account, Purchases account First of a month

Buyer's A account, Cash account End of a month

C

Credit Note

Contra

Sales Note

Payment

D

Previous date

Effective Current year date

Configured date

B

1, 2, 3, 4

1, 3, 4, 2 2, 4, 3, 1

3, 4, 2, 1

C

Memo

F10

op3

Payment

a n s

INTERNET q_ id

q_desc

AC4 For day-to-day 2 transactions the voucher types used are AC4 Say for example a payment 3 is made to a creditor ABC Rs.10000 by cash, it can be entered into the voucher type….. AC4 Identify the purchase 4 voucher type, the transaction for purchase of 10 CPUs,10 monitors by credit. AC4 Identify the voucher type 5 to be chosen for the sale of computers to Anand by cash @ Rs.210000 per unit. AC4 A bank overdraft repaid by 6 cheque at Rs.25000 can be made in the voucher….. AC4 The financial statement 7 that consolidates ledger balances is ….. AC4 8

AC4 9

AC5 0 AC5 1 AC5 2 AC5

op1

op2

op3

op4

Credit purchase

Cash Both A and B purchase

Contra purchase

C

Loan

Payment Receipt

Sales

B

Credit Purchases

Cash Expense Purchase Purchases s

Debit Purchases

A

Cash Ledger

Sale Sheet

Stock Journal

Purchase Voucher

C

Payment

Receipt

Debit

Contra

D

Journal

C

Expense reports

B

Net Account

C

Day book

D

Transaction analysis

A

Loans

B

Balance sheet

Profit & Trial balance Loss statemen t The F9 function key in the Accounting reports Inventory P & L reports left side of the Gateway of reports Tally screen displays the…… The option on the Gateway Net Loss Net Net Profit of Tally that will generate Income the P&L account statement is….. This displays the balance Record book Ledger Journal book daywise for a selected book voucher type. The feature in Tally to Ratio analysis Account Data analysis analyze accounts of a analysis company is….. The age-wise statement is Income Payables Expenses displayed based on…… The ratio analysis of Bill date Effective Voucher date

Previous date A

a n s

INTERNET q_ id 3 AC5 4

AC5 5

AC5 6

AC5 7

AC5 8

q_desc receivables can be done based on…… Name the statement that helps the management in the decision making process. Identify the budget type which is chosen where transaction amounts are to be monitored. Choose the budget type to be used where bank accounts balances are to be monitored. The management that needs to consolidate the accounts of its various enterprises uses ……. in Tally. Identify the user who can access audit trails in Tally.

AC5 Identify the accounting 9 feature in tally that facilitates splitting financial years for a company data. AC6 The tracking of changes in 0 vouchers and ledger masters is done by….. AC6 Tally can import data from 1 other programs and creates a log about the activity in the file….. AC6 Import and export of data 2 between Tally and other programs is possible with the help of….. AC6 The manual option of 3 voucher numbering leads to….. AC6 The Tally audit trail tracks

op1

op2

op3

op4

date Data flow

Funds flow

Stock flow

Cheque flow

B

On closing balance

On net credit flow

On net transactions

On net cash flow

C

On closing balance

On net credit flow

On net transactions

On net cash flow

A

Consolidate company

Group Set company company

Alter company B

Owner

Data Entry operator Yearlyentry accounti ng Tally Audit

Accountant

Administrator D

Period-less accounting

Transactionnumber accounting

C

Tally Report

Tally Group

B

Month-less accounting

Tally Vault

Tally.imp

Tally.cfg Tally.exp

Tally.ole

A

OLE

DBMS

MS-XLS

C

Auto numbers

Duplicate Sequence number number

Range number B

more than 30 Days

less than more than a

more than a

ODBC

A

a n s

INTERNET q_ id

q_desc

op1

4

changes made to vouchers old that are ….. AC6 The ratio analysis of Bills F5 5 Receivables or Bills Payables can be displayed with the function key…..

30 Days old F8

op2

op3

op4

day old

week old

F12

F6

a n s

D

q_desc q_id

q_desc

AC1 Bbasic documents used in the Financial Accounting System where transactions are entered first is __________ AC10 _________ are the major advantages of accounting software over manual accounting. AC11 As per any accounting software, there are only ________ types of ledger accounts. AC12 All __________ ledger balances are taken to Profit & Loss Account. AC13 difference between income and expenses is also taken to ______ report. AC14 ________ is the end point in accounting a mirror showing true and fair position of a concern. AC15 __________ is that data which is not expected to change frequently, which remain relatively permanent.

Voucher

Journal

Ledger

All

a n s A

Arithmetical accuracy

Time saving

Multiple reports on timely basis

All

D

debit balance

credit balances

Both A and B None

C

income and expense

Asset

Liability

A

Balance sheet

Profit & Loss Account Ratio Analysis None

A

Profit & Loss Account

bank book

Balance sheet

C

Master data

Transaction data

Relative data All

op1

op2

op3

op4

All

None

A

INTERNET

AC16 Voucher Type is _______ Master type of data. AC17 By default there are 24 _______ voucher types in Tally.ERP 9. AC18 CRM stand for _______ Cash Relation Management

Transaction

Relative

All

a n s A

28

32

22

A

Customer Relation Management

C

AC19 Tally.ERP 9 is a Multilanguage software offering a choice of __________ languages. AC2 __________ report gives the consolidated list of various Accounts and their balances. AC20 The name of the auto backup file shall be __________. AC21 In Tally, _________ is a system of encrypting data. AC22 default, security levels exist in tally.ERP9 _______ AC23 Language use for Tally Programming __________ AC24 TDL stand for ______

15

24

Customer None Relationship Management 40 60

Trial Balance

Profit & Loss Report

Balance Sheet

None

A

TBK.900

ABK.900

TallyBackup.9 None 00

B

Security Control Set Password

Tally Vault

All

C

Data Entry

Tally.Net User

Tally.Net Auditor

All

D

C

C++

TDL

None

C

Tally Define Language

Tally Detection Language

None

C

AC25 ______ Key Board shortcut use to select Purchase Voucher AC26 ______ Key Board shortcut use to select Contra Voucher AC27 In Tally.ERP 9, we can create ___________ Vouchers for

Alt +f9

Ctrl + F9

Tally Definition Language F9

None

C

F4

F5

F6

F9

A

Receipt

Payment

Contra

Journal

D

q_ id

q_desc

op1

op2

op3

op4

A

INTERNET q_ id

AC28

AC29

AC3

AC30

q_desc

op1

adjustments with respect to debit and credit amounts without involving the cash or bank accounts. ______ Key Board F5 shortcut use to select Stock Journal Voucher To view the Trial Balance Gateway of Tally _______ is path. > Display > Trial Balance. Balance Sheet shows the Trial Balance financial status of the business as at a particular date. To view Stock Summary Gateway of ______ is path Tally>Display > Stock Summary

AC31 Tally.ERP 9 facilitates generation of ___________ reports for Outstandings. AC32 ___________ is analytical reports in Tally.ERP 9 AC33 Tally.ERP 9 facilitates generation of __________, which displays the sources of the Funds and their applications. AC34 __________ is an indicator of the operating performance of a business. AC35 In Tally.ERP 9, we can view ___________ Report which provides infor-mation on the

op2

op3

op4

a n s

F7

ALT+F7

None

C

Gateway of Tally > day book > Trial Balance. Profit & Loss Report

Gateway of Tally > Trial Balance. Balance Sheet

None

A

None

C

Gateway of Tally > Stock Summary

Gateway of Tally >Vouchers> Stock Summary Ageing Analysis

None

B

None

C

Ratio Analysis None

C

Outstanding Report

Ratio Analysis

Balance sheet

Profit & loss

Cash Flow Statement

Fund Flow Statement Daily Cash Flow Statement

Balance sheet

Variance Analysis

None

B

Profit & loss

Ratio Analysis None

C

Ratio Analysis

Budget Analysis

A

None

INTERNET q_ id

AC36 AC37

AC38

AC39

AC4

AC40

AC41 AC42 AC43 AC44

AC45

q_desc difference between the actual vs the budgeted figures. Default Ledgr exist in tally _______ For filing of income tax return of a practicing chartered accountant, the appropriate return form is __________ . To file Incometax return online, site is _____________ ITR-1 Filled by person having income from __________ The Trial Balance has ____ number of columns. _________ ITR form filled by person if Income from Proprietary Business/Profession ITR-5 Filled by __________ ______ ITR will not be available for e-Filing Return Form can be used by a person being a BOI To register for the first time on Income Tax Return site, does not required information like _______ Services offered by efiling website _______

AC46 Digital signatures are commonly used for ______________.

op1

Profit & Loss Account ITR-I

op2

op3

op4

a n s

Purchase

Sales

None

A

ITR-II

ITR-III

ITR-IV

D

www.incometaxi www.taxreturnIndia.c www.Income None ndia.gov.in, o.in tax.co.in

A

Income from Salary/Pension

Income/Loss from Other Sources

A

2

3

Income/Loss None from House Property 4 6

ITR-I

ITR-II

ITR-III

ITR-IV

D

AOP

Companies

Trusts

None

A

ITR-4

ITR-5

ITR-6

ITR-7

D

ITR-2

ITR-3

ITR-4

ITR-5

D

PAN

NAME

BIRTH PLACE MAIL ID

Check CPC Refund Status financial transactions ON-Line Income Tax Return

B

C

View Form 26AS Check ITR-V status

All

D

software distribution

All

D

INTERNET q_ id

Physical

Logical

Mathmatical All

a n s C

physical

Logical

Mathmatical All

A

Department of Electronics

Director of Digital Signature

licensed Certifying Authority

Both A & B

C

LIFO

FIFO

Weighted Average

All

D

Chartered Accountant

Contact Authority

Certifying Authority

None

C

Rule Authority

Registration Authority Regulation Authority

None

B

TCS

NIC

e-Mudhra

All

D

Companies

Tax Payers audited u/s 44AB

Both A and B None

C

AOP

BOI

A

MS-Excel 2010

Power Point C 2010

XLS

None

q_desc

AC47 Technically, a digital signature is a________________ scheme for demonstrating the authenticity of a digital message or document. AC48 Digital Signature Certificates (DSC) are the digital equivalent (that is electronic format) of __________ certificates. AC49 digital signature issues by the ___________licensed Certifying Authority (CA) AC5 In Accounting system, the closing stock can be valued by any method __________. AC50 CA stand for(in reference of digital signature) _______ AC51 RA stand for(in reference of digital signature) _______ AC52 Digital Signature issue by the ______ AC53 Digital Signature is mandatory for __________ as per Income Tax Act 1961 AC54 ITR-V Filled by _____

op1

op2

e-File without Individual Digital Signature MS-Word 6.0 MS-Excel 6.0

AC55 Download the Income Tax Return (ITR) form in __________ software AC56 In which format Income XBRL Tax Return(ITR) file upload return on the web site ______

XML

op3

op4

B

INTERNET q_ id

q_desc

op1

op2

AC57 ITR-V should be send to 30 Central Processing Centre within ___________ days of uploading the return. AC58 There is no need of Director sending ITR-V acknowledgement to CPC, Bengaluru as the return is signed by the _________. AC59 TAN stand for ____ Transaction Account Number AC6 Accounts Receivable, Bills Receivable also known as ___________ AC60 Service tax e-filing is www.aces.gov.in taken care by _________ AC61 ACES stands for Automation of __________. Central Excise and Service Tax

60

AC62 www.mca.gov.in, Site is Income Tax use for ___________ of return filling AC63 In company law filling, XML necessary documents as attachments in ________ AC64 VFO stand for (In Verification reference of return Front Office filling) _____ AC65 SRN stand for ________ Service Request Number AC66 Form 23AC to be filed by Balance-Sheet all Companies for ________ AC67 Form 66 to be filed by Balance-Sheet Companies having paid up capital of Rs.10 lakh to Rs. 5 crore for

op3 90

Chartered Accountant Third Party

op4 120

Digital Signature

a n s D

D

Tax Deduction Account Number Bills Payable

Tax Authority None Number Bills Remain None

B

www.incometaxindia. gov.in, Automatic of Central Excise and Service Tax

A

Excise

www.Service None tax.gov.in Autofilling of None Central Excise and Service Tax Service Tax None

XBRL

PDF

DOC

C

Virtual Front Office

Value Front Office

None

B

Sequential Request Number Profit & Loss Account Compliance Certificate

None

A

Annual Return

A

Profit & Loss Account Compliance Certificate

Annual Return

C

Serial Request Number

A

A

D

INTERNET q_ id

q_desc

__________ AC68 Form 23ACA to be filed by all Companies for __________ AC69 XML stand for _________ AC7

AC70

AC71

AC8 AC9

BC1

BC10

BC11

BC12

op1

Balance-Sheet

Xtensible Markup Language _____________ gives the Bills Receivable details of the dues from the Customers. XBRL tags are defined Tag and organized using categorization schemes called ________. _______ Form for filing 23AC-XBRL XBRL document in respect of balance sheet and other documents with the Registrar _________ gives details Bills Receivable of your dues to suppliers. In Accounting system, bank book When we maintain a bank account, we prepare ________ After processing is done Meaningful on the raw data, data becomes___________. The computing needs of Mini computers engineers, architects and other professionals who need detailed graphics display is met by _____________. ______________process RISC ors are useful in specialpurpose applications such as graphics wherein speed in critical. Smart cards that we Microprocessor popularly use nowadays, & Memory chips

op2

op3

Profit & Loss Account Compliance Certificate Extensible Markup Language

op4

Annual Return

a n s B

B

Bills Payable

Extensible None Mark Language Bills Remain None

Dictionery

taxonomies

None

C

23ACA-XBRL

23ACB-XBRL None

A

Bills Payable

Bills Remain None

B

Pass book

Both A and B None

A

Useful

Both A & B

C

Micro computers

Workstations Super computers

C

CISC

Intel

None of the above

A

Memory chips & RAM ROM & RAM Hard Disk & RAM

A

None of the above

A

INTERNET q_ id

BC13 BC14

BC15

BC16

BC17

BC18

BC19

BC2

q_desc

op1

incorporate_________ and ____________. Integrated circuits are Chips also called ___________. In the fourth generation Networks of computers, the ________________conc ept encouraged programmers to reuse code by maintaining libraries of code segments. Handheld PCs, iPad, First Biomatrix Devices,Generation Future Processing, AI and Ultra book are features of __________generation of computers. Performing comparisons, CU sorting,combining data etc are the fuctions of which part of the CPU? The control unit uses the Instruction instruction contained in Register(IR) the ___________ to decide which circuits need to be activated. The answers from many ALU operations are stored temporarily in the __________before being put out to RAM. When we load software Main Memory from a fl oppy disk, hard disk or CD-ROM, it is stored in the__________. The key to the Memory computer’s versatility

op2

op3

Semiconductors

Both A & B

Object Oriented Programming

High-Level Languages

Second

op4

a n s

None of the above VLSI

C

Fifth

Third

C

ALU

IR

ACC

B

Accumulator(ACC)

RAM

None of the above

A

IR

ACC

CU

C

Hard disk

IR

ALU

A

CPU

I/O

All of the above

A

B

INTERNET q_ id

q_desc

op4

Serial Access Memory Sequentially accessed Memory SAM works very well for Memory buffers Reading a CD Writing to an ___________. USB drive Data in the SAM RAM ROM __________memory can be accessed in any order. ___________is the use Virtual Memory Flash memory Cache of a faster but smaller Memory memory type to accelerate a slower but larger memory type. _________is used for ROM Hard Disk SAM storing special sets of instructions which the computer needs when it starts up. Compact Flash, BIOS Cache Flash RAM chip, Smart Media etc. are examples of___________memory. The area of the hard disk Virtual Swap Page that stores the RAM image is called a_______file. Input devices other than Secondary Alternate devices Backup the keyboard are devices devices sometimes called____________. Microsoft’s natural Ergonomic Multimedia Standard keyboard is an example of an _________keyboard. The _________mouse is Optical Mechanical T17 also useful for graphics programs that allows to draw pictures by using the mouse like a pen, pencil or paintbrush.

None of the above

B

BC21

All of the above Hard Disk

A

BC22

BC23

RAM

C

BC24

RAM

A

BC25

ROM

B

BC26

None of the above

C

BC27

All of the above

B

BC28

Internet

A

BC29

Wireless

C

Simple Area Memory

op2

a n s

op3

is_________. BC20 SAM stands for,

op1

B

INTERNET q_ id

1 GB

1 TB

a n s B

Optomechanical Optical

Wireless

Mechanical

B

CAM

Tracing drawings

CAD

All of the above

B

Optical

Text

Sheet Fed

Flat Bed

A

Bar Code Reader Optical Mark Reader

Optical Character Recognition

None of the above

B

Drum

Hand held

Sheet Fed

Flat Bed

A

Hand held

Sheet Fed

Flat Bed

Drum

B

OCR

OMR

MICR

BCR

C

MICR

BCR

OCR

OMR

C

Face

Iris

Hand

Voice

B

Biometrics

Scanning

Punching

None of the

A

q_desc

BC3 Approximately One million bytes is equal to, BC30 __________is the most quick and precisely pointing mouse. BC31 The static nature of digitizing tablets makes them effective for_____________. BC32 __________scanners do not distinguish text from illustrations. BC33 To edit text read by an optical scanner, we need an__________system to translate the image into ASCII characters. BC34 __________scanner is much more expensive than the common CCD based scanners. BC35 ___________scanners are excellent for loose sheets of paper, but they are unable to handle bound documents. BC36 __________readers allow ATMs to read account information and facilitate monetary transactions. BC37 Which of the following input device senses the presence or absence of a pencil mark. BC38 ________ scanners are more secure biometric authentication schemes than other types of scanners. BC39 ___________is the

op1 1 KB

op2 1 MB

op3

op4

INTERNET q_ id

BC4

BC40 BC41

BC42

BC43 BC44

BC45

BC46

BC47

BC48

BC49

q_desc

op1

identification of a person by the measurement of their biological features. People who are trained Programmers in the use of a programming language and also write programs are called__________. Color monitors are also Dynamic called as ____________. monitors VGA and SVGA video Analog standards require _____________ monitors to display variable colors continuously. Monitors that are 16 or Large monitors more inches diagonally are often called________ Another term for dot Sulphur pitch pitch is_________. For___________devices Neutral the bandwidth is expressed in cycles per second or Hertz (Hz). The _________ printers Dot matrix can print to multi-page forms ___________kind of WORM optical disks caanot be modified. Copy machines work in a Ink Jet way similar to the __________ printers. The wavelength used by 850 standard DVD lasers is ______ nm. ___________printers can Daisy wheel achieve higher resolutions with special techniques known

op2

op3

op4

a n s

above

Designers

Database Analysts administrator s

A

Workstations

RGB monitors Color

Digital monitors Gray scale

C

Full-page monitors

Simple monitors

None of the above

B

Phosphor pitch

Potassium pitch Gray scale

B

Digital

Nitrogen pitch Analog

Ink Jet

Laser

Thermal

A

CD ROM

Erasable

All of the above

B

Laser

Thermal

Dot matrix

B

600

650

750

C

Thermal

Laser

Thermal

C

Digital

A

C

INTERNET q_ id

BC5

BC50

BC6

BC7

BC8

BC9

CA1

q_desc generally as resolution enhancement. _________ integrates the computer’s hardware components and provides tools for day-to-day maintenance tasks. The term helical scan usually refers to _____mm tapes. Data must be ________ but doesn't need to be relevant, timely or concise, unlike information. Supercomputers are not extensively used in the ___________industry. Supercomputers are rarely used for __________________. _____________are also frequently used as servers for local area networks. MUS stands for _______.

CA10 Auditor can gather the audit evidence based on_____________. CA11 The CAAT documentation must necessarily include ______. CA12 Audit findings & Audit conclusions are a part of the ___________ documentation. CA13 Audit Sampling can be ________.

op1

op2

op3

op4

a n s

Application software

MS Office

System software

None of the above

C

4

8

10

6

B

Useful

Accurate

Processed

Meaningful

B

Aerospace

Automative

Health

Chemical

C

Seismic Analysis Input/outputintensive processing Workstations

Super computers

Monetary Unit Sampling Inspection

Money Unit Sample

Planning documentation

Weather Forecasting

Intensive B mathematical calculations Mainframes Embedded A Computers

Most Unique Sample Inquiry and confirmation

All of the above All of the above

A

Execution documentation

Both A & B

Auditor Information

C

Execution documentation

Audit Evidence documentation

Planning None of the documentati above on

B

Statistical

Non-statistical

Both A & B

C

Observation

Only A

D

INTERNET q_ id

q_desc

op3

op4

a n s A

op1

op2

CA14 Which kind of Statistical Random sampling ensures that Sampling each sampling unit in a population has an equal chance? CA15 In Judgemental ___________sampling, Sampling the IS auditor places a bias on the sample. CA16 IDEA facilitates user to MS Access import external files in different formats like ________________ formats into IDEA database. CA17 In order to find the total Sampling sales of transactions by Cust-no. so as to produce a list of outstanding Sales customerwise______________tec hnique can be used. CA18 In IDEA, Quick Unique Keys are Summarisation can be upto 1000 used if, CA19 The _________ property Field Statistics in IDEA provides statistical information about all Numeric, Date, and Time fields within the active database. CA2 __________ are tools for Data Warehouse drawing inferences and gathering relevant and reliable evidence as per requirements of the assignment. CA20 How can we come to By checking the know about the date statistics transactions performed on Sundays?

Systematic Sampling

Judgemental Haphazard Sampling Sampling

Haphazard Sampling

Random Sampling

Systematic Sampling

B

MS Excel

DBase

All of the above

D

Sorting

Summarizatio Stratification C n

Unique Keys are upto Unique Keys Unique Keys B 4000 are more are only 100 than 4000 Sorting Filters None of the A above

CAATs

Business Re- None of the engineering above

By applying the dow() Both A & B function on the sample

B

Can't be C known at all

INTERNET q_ id

q_desc

op1

CA21 The probability-based Systematic sampling techniques of IDEA are_________. CA22 __________________ is Systematic a method to extract a Record Sampling number of records from a database at equal intervals to a separate database. CA23 Random Sampling in Functions IDEA is done based on____________ CA24 To divide the data from Sampling the file into bands and gaining the profile of the data is known as _______________ CA25 ________________functi Gap Detection ons assist the user to sift through large volumes of data and help pin-point specific duplicate entries or specific missing entries. CA26 Missing cheque numbers Sampling can be traced using the _________function. CA27 The file extension of an .IMD IDEA file is_______. CA28 Gap Detection is done to To test for check for____________. completeness

CA29 In order to map the Sampling outstanding debts at the year end so as to to determine provisions required against bad debts,__________techni que is used. CA3 CAATs can be applied MS Excel

op2

op3

op4

a n s D

Random

Stratified Random

All of the above

Random

Stratified Random

Monetary A Unit sampling

Without any technique

Random None of the Number Seed above

C

Stratification

Sorting

Filtering

B

Duplicate Detection

Both A & B

Sorting

C

Filtering

Gap Detection

Duplicate Detection

C

.IDE

.IDEA

.IDF

A

To test for gaps in the To know any All of the invoice missing above numbersequence unique number Gap Detection Ageing Filtering Analysis

D

MS Access

A

MS

MS Word

C

INTERNET q_ id

CA30

CA31

CA32

CA33

CA34

CA35

CA36

CA37

q_desc

op1

even by using commonly used software such as ________. Intervals for ageing Days analysis in IDEA can be in________. The most common use of Accounts the Ageing analysis is Receivable or with ______________. Debtor Ledgers _____________techniqu Ageing e can be used in IDEA to extract records where the credit limit of customers is exceeding Rs.50,000. The _____________ Gap Detection generates a database and optionally a results output, that we can analyze to identify possible errors, potential fraud, or other irregularities. Fields and their Field Statistics properties can be changed using _________________ in IDEA. In Financial Join audit,compliance with tax rates can be found using ________________functi ons of IDEA. We can know about the Join ghost employees of an organisation using which techniques of IDEA? Details of Dormant Identify Gaps, accounts can be known date difference by_______________tech

op2

op3

op4

a n s

PowerPoint

Months

Years

All of the above

D

Accounts Payable

Loans & Advances

None of the above

A

Direct Extraction

Stratification Summarisatio B n

Benford's Law

Summarisatio Direct n Extraction

B

Field Properties

Field Virtual Field Manipulation

C

Filter

Extract & All of the Compare files above

D

Summarization

Summarizatio All of the n above

D

Aging, MIS, date difference

Join, Relation, Filter,

A

Date difference, Aging, Filter

INTERNET q_ id

CA38

CA39

CA4

CA40

CA41

CA42

CA43

CA44

q_desc niques in IDEA. The Information Technology (IT) Act 2000 Amended in year ______. CAATs provide a mechanism to gain access and to __________ as per audit objective. Different types of files such as ___________can be accessed in a CAAT software. CAATs can be used to perform routine functions or activities which can be done using _________. CAATs Improving the efficiency and effectiveness of the __________. CAATs support the features of ___________. CAATs can be used for compliance or __________. CAATs may be used in performing various audit procedures.

op1

op2

op3

op4

a n s

2005

2006

Statistics 2007

data technique

analyze data

sorting data

organize data B

Database

Text formats

Excel files.

All of the above

Calculator

PDA

Smart Pones computers

D

Computer process

System process

Audit process None of the above

C

Sampling

Stratification

Frequency analysis

All of the above

D

Substantive tests Black box test

White box test

Gray box test A

Analytical review Compliance tests of general controls

Compliance All of the tests of above application controls Observation None of the above

D

Observation All of the above

D

CA45 _________ is primarily Recalculation said to be the process of collecting and evaluating audit evidence as per audit objectives. CA46 Auditor can obtain the Recalculation audit evidence by _______.

Audit

Inspection

2008

D

D

B

INTERNET q_ id

q_desc

CA47 _______ sampling, Systematic Involves selecting sampling units using a fixed interval between selections, the first interval having a random start. CA48 ________ sampling, Systematic Ensures that all combinations of sampling units in the population have an equal chance of selection. CA49 The probability-based Random sampling techniques are ________. CA5 ___________functions of Arithmetic CAAT enable intelligent analysis of data. CA50 The statistical sampling Attribute techniques are __________. CA51 Systematic Record TRUE Samplings a method to extract a number of records from a database at equal intervals to a separate database. CA52 _________ ar the some Identify examples of tests which exceptions can be performed using CAATs. CA53 SA stands for Standard on ______________ in Auditing CAATs. CA54 _________ enable CAATs auditors to use computers as a tool to audit electronic data. CA55 CAATs Documentation Work papers required the following

Random

Haphazard

Judgmental

a n s A

Random

Haphazard

Judgmental

B

Systematic

Stratified Random

All of the above

D

Statistical

Data Selection

op1

op2

Classical Variable

op3

op4

File B Reorganizatio n Monetary All of the D Unit sampling above

FALSE

A

Identify errors

Statistical sampling

All of the above

D

Section on Auditing

Standard on Schedule on A Account Auditing

Audit

eSecretary software

Contact A Management software

Planning

Execution

All of the above

D

INTERNET q_ id

CA56

CA57

CA58

CA59

CA6

CA60 CA61

CA62

CA63

CA64

q_desc

op1

steps_________. There are _____ 2 commonly used sampling methods in CAATs. Non-statistical sampling Haphazard methods are _______ & _____________. IDEA stands for Interactive Data ____________________. Extraction and Analysis Data should be in row TRUE and coloumn format to import in IDEA. Which functions of Data Selection CAATs enable performing recomputations and reperformance of results? _______ file format was Excel not supported by IDEA. _____________ ensures Random that all combinations of sampling sampling units in the population have an equal chance of selection in CAATs. Which of the following Direct option is not available under options under Extract Group of IDEA? _______ function is used Direct to extract records by writing one more criteria’s and allows to save result in new database. ______to extract Direct specified number of top or bottom records for each value of key in a separate database.

op2

op3

op4

a n s

4

5

3

B

Judgmental

Both A & B

None of the above

C

Interactive Database Internet Data Interactive A Extraction and Extraction Data Example Analysis and Analysis and Analysis FALSE B

File Reorganization

Arithmetic

Statistical

C

XML

ODBC

JPEG

D

Haphazard sampling

Judgmental sampling

None of the above

A

Indexed

Duplicate Key Sorting Detection

D

Indexed

Duplicate Key Key Value Detection

A

Indexed

Top Records Key Value

C

INTERNET q_ id

q_desc

CA65 The ______ task is used to identify duplicate items in a database. CA66 Duplicate Key Detection can also be used to identify non-duplicate keys. CA67 ______ task identifies "missing" information in a database. CA68 Which of the following search option is provided by IDEA? CA69 Benford’s Law, also called the _________. CA7 CAATS can be used effectively to detect_______. CA70 _____has been used to detect unusual patterns that are often the result of errors or, worse, fraud. CA71 IDEA only tests positive numbers 10 and over in the data file CA72 _______ Function returns the absolute value of a numeric expression. CA73 ______ function Returns the day of the week. CA74 _______ Function Returns the integer portion of a numeric value. CA75 _______ function Returns a string with all the numeric characters removed.

op1

op2

op3 Indexed

op4 All of the above

a n s B

Key Value

Duplicate Key Detection

TRUE

FALSE

Gap Detection

Duplicate Key Detection

Indexed

Key Value

A

Date

Numeric Field

Character

All of the above

D

First-digit law

IT LAW

A

Frauds

Errors

Last-digit law All of the above Exceptions All of the above

Gap Detection

Benford's law

Duplicate Key None of the Detection above

B

TRUE

FALSE

@age

@abs

@value

All of the above

B

@date

@week

@dow

C

@num

@int

@itr

None of the above @fr

@justnumber

@justletters

@justchar

@letter

B

A

D

A

B

INTERNET q_ id

q_desc

op1

op3

a n s Level of audit B risk op4

CA8 Which is not a factor to be considered while using CAATs?

Fees to be given to the auditor

Time constraints

CA9

Audit evidence

Data

All of the above

B

ERP

Accounting

Graphics

A

Demilitarized Zone

LAN

None of the above

B

IBDS

ATM Server

Middleware

C

ALPMS

CBS

All of the above

A

9

7

6

B

Proxy

Antivirus

Firewall

B

Control access to a set of servers System administrator Netwok administrator

Manage websites

C

Database

System

CB1

CB10

CB11

CB12

CB13

CB14

CB15

Computer knowledge, expertise, and experience of the IS auditor Audit is primarily said to Information be the process of collecting and evaluating ___________ as per audit objectives. Which software has been CBS designed to meet the needs of the banking industry? The IBDS server is Firewall Zone located in the _______________ Which of the following is IBAS not a component of the Internet banking system? Each branch performs TBA the branch operations in totality at the respective branch itself in _______ How many servers are 8 hosted in the data centre? ______________server ATM provides network security by preventing malicious data from entering the network. In CBS, the role of the Prevent entry of Domain Controller is to, malicious code

op2

CB16 Deciding the access rules Security to data and other it administrator resources is the sole responsibility of ___________ CB17 In the CBS system, who Netwok

Control access to websites

Security

Database A administrator

D

INTERNET q_ id

CB18

CB19

CB2

CB20

CB21

CB22

CB23

CB24

q_desc has the power to create, modify and delete the users in accessing the system. In the CBS system, who ensures the recoverability of data in case of system failure? Ensuring the strategic placement of IPS and IDS in the network is the pivotal job of ____________ The CBS Software resides in the ________________ server. In the CBS system_____________ar ranges for vulnerability assessment and penetration tests. All the versions of the CBS application program are maintained by the _________ In the _________version of testing, the overall aspects of a program are tested. Which of the following tests are conducted in the development environment? User Acceptance Test is,

op1

op2

op3

op4

a n s

administrator

administrator

administrator administrator

System administrator

Librarian

Database Netwok C administrator administrator

Librarian

Netwok administrator Security Database B administrator administrator

Database

Proxy

Central Application

Netwok administrator

Librarian

Database Security A administrator administrator

Security administrator

System administrator Librarian

Database C administrator

Alpha

Gama

Beta

Test

C

Unit Test

System Test

Integration Test

All of the above

D

When the librarian after necessary documentation transfers the program into production

When the users accept the software

When users When the A start using software is in the software the production environment

Antivirus

C

INTERNET q_ id

q_desc

op1 environment Database

CB25 In the core banking environment, the reports are stored in the __________server. CB26 In CBS, to ensure security 10 and to ensure there is no unauthorised usage, a session is allowed to be active for not more than______minutes. CB27 An ATM switch is, A normal networking switch CB28 The value of the Natural Added PIN is always __________from the pin value. CB29 ATM doesn't perform the Withdrawal of following function, Cash CB3 CBS is a combination of, Application software CB30 The encryption of the HSM PIN in the ATM machine is done by the , CB31 Cash dispensing at the Cash Journal ATM is recorded in, CB32 Which of the following is Card and PIN not a control used in generation Card and PIN should be generation? handled by separate staff

op2

op3

op4

a n s

Report Generation

Central Application

Antivirus

B

15

20

5

A

A switch with a server An ATM attached Machine

None of the above

B

Deducted

Multiplied

Divided

B

Balance Enquiry

Changing of PIN number Both A & B

Network devices SSM

ATM log

Depositing Cash None of the above Either A or B None of the above

D

Both A & B

Cash Book

C

The PIN mailer and the card should be delivered together

D

Both A & B

D

All of the above

D

PIN mailer must have There should card and account reconciliation number in the number of cards and PIN mailers produced CB33 While evaluating ATM card should PIN mailer must be There should controls in the dispatch be dispatched dispatched from the be proper of ATM cards, from th Branch Central Office records of the delivered cards CB34 While evaluatng controls Cash inserted Cash dispensed Cash over ATMs, the bank remaining

C C

INTERNET q_ id

CB35 CB36

CB37

CB38

CB39

CB4

CB40

CB41

CB42

CB43

q_desc staff should duly reconcile, The soft copy of the ATM journal is known as Who forwards the customer details to the internet banking applictions server? ___________converts the data to suit the requirements of the IBDS. Which of the following is not a security concern in Internet Banking? The Internet Banking Security Policy must include, In CBS, the networking devices, firewalls and other related equipments are all housed in the __________ The various access points to the Internet Banking System are, In CBS, any attempt that is made to penetrate the network must be proactively detected by , In __________kind of funds transfer, the money transfer takes place in the books of the Reserve Bank of India Which of the following is not needed to initiate the funds transfer?

op1

op2

op3

op4

a n s

Electronic Cash journal journal Database server Web server

ATM journal None of the above Central Antivirus Application server server

A

IBAS

Web server

Middleware Database server

C

Lack of segregation of duties Firewall policy

Inadequate network security

Unauthorised Routers access to PIN improperly positioned Both A & B Network policy

C

Access policy

B

C

Data Repository Data Centre

Database

Server Room B

User System

Web server

Front end application

All of the above

D

Intrusion Prevention Systems

Intrusion Detection Systems

Routers

Both A & B

D

IMPS

RTGS

NEFT

None of the above

B

Name of the PAN of the beneficiary Name of the Account beneficiary bank customer beneficiary number of customer the beneficiary customer

B

INTERNET q_ id

q_desc

op1

CB44 The member institutions Straight through software system and processing RTGS software talk to each other through defined interfaces in_________ CB45 Every Straight Through SN Processing(STP) generates a unique number known as, CB46 To monitor collections IMPS and payments across the country, the banks have developed the, CB47 The various parameters Clearing Cycle in the CMS include, CB48 The various controls to Management be adhered to in CBS are, controls CB49 Organisation structure of Organizational the IT department and IT controls strategies are handled by, CB5 The servers in the data VLAN centre are segregated using the concept of __________ CB50 Banks collect demand SLR deposits and term deposits, out of this they maintain CB51 How can the adequacy of By validations controls be checked in the CBS environment? CB52 Policy dealing with the Security Policy proper maintenenace of the organizational assets is a part of _____________ CB53 __________is not a part E-mail policy of the Communications and Operations

op2

op3

op4

a n s A

Cash Management System

Internet Banking

ATM transactions

PIN

UTR

None of the above

C

CMS

CBS

Internet Banking

B

Credit Limit

Interest

D

Organizational Operational controls controls Management controls Operational controls

All of the above All of the above None of the above

WAN

LAN

MAN

A

CRR

Both A & B

None of the above

C

By performing audit

By doing bank visits

All of the above

B

Business Continuity Planning

Review of Review of Systems system logs Development Procedures

A

Internet policy

Media Handling

C

Firewall security policy

D A

INTERNET q_ id

CB54

CB55

CB56

CB57

CB58

CB59

CB6

CB60

CB61

q_desc

op1

management under the Security Policy A bank ensures the Disaster maintenance and Management recovery of operations through the process of _________ A plan made to recover Business from the impact of any Continuity disaster, so as to restore Planning normalcy is known as the __________ _________refers to the Systems process of developing Development software which produce the required output from the input provided. If the programs tested Audit result in inadequacies and deficiencies, then they are sent back to the _______________team for correction. Who is responsible of Programmer moving a completely tested program from the development department to the production department? In CBS, vulnerability Discrete assessment is a kind of a __________process. Data of all the branches Central Database of a bank are stored in the ________server. ____________are Packs solutions for dealing with the vulnerabilities discovered during vulnerability assessment. ___________is System

op2

op3

op4

a n s

Business Continuity Planning

Systems audit

None of the above

B

Systems audit

Disaster Recovery Planning

Internet Banking

C

Audit Review

Media Handling

None of the above

A

Programming

Testing

Design

B

Librarian

Designer

Analyst

B

Continuous

Slow

On-going

B

Application

Proxy

Web

A

Traps

Patches

All of the above

C

Librarian

Database

Netwok

D

INTERNET q_ id

CB62

CB63

CB64

CB65 CB66

CB67

q_desc responsible for continuously applying patches in the network. The authorisation done with another user ID and password in a dual control system is known as the, Reports generated by the system automatically are known as _________ Which of the following is not a log generated by the system in cbs? In banks, application logs ar egenerated for, In the ATMs, cash disposal is facilitated by the __________. Which of the following statement is true?

op1

op2

op3

op4

a n s

administrator

administrator administrator

Checker concept Maker checker concept

Maker concept

None of the above

B

Reviews

Messages

Logs

Alerts

C

Operating system

Network

Application

Data Base

B

Loan authorisation ATM switch

Limit creation

Pre-closure of deposits ATM Server

All of the above None of the above

D

ATM card of one bank can be processed at the ATM kiosk of another bank without any mutual understanding between customer and bank. First two

ATM card of one bank can be processed at the ATM kiosk of another bank only because of the agreement between the two banks to allow this.

ATM card of one bank can be processed only at the ATM kiosk of any one bank.

ATM card of B one bank cannot be processed at the ATM kiosk of another bank.

Last four

First four

Middle four

CB68 Natural PIN represents the ________ digits of the decimalised encrypted value of the card number. CB69 There should be strict Stock of blank security procedures for, cards CB7 The core banking Application applications like Finacle, Flexcube, Iflex etc. reside

ATM log

Access to the building Stock of live All of the cards and PIN above mailers Proxy Mail Antivirus

A

C

D

A

INTERNET q_ id

CB70

CB71

CB72

CB73

CB74

CB75

CB8

CB9

DB1

DB10 DB11

q_desc on the __________server. To place controls over cash,the bank staff should duly reconcile_____________ __ Which of the following is not stored at the ATM switch? The information received from the web server is verified with the data of the customer held in the ______________. ___________________is not a security concern in Internet Banking. MIS Reports generated during RTGS are in the ________ formats. To overcome the problems arising out of high volume of disbursements,________ ______was developed. The bank has the _________version of the banking software. In CBS, the database server can be accessed by the other servers, An Access database stores its tables in a single file, along with other objects, such as _________. The Size of Memo Data Type is ___________ _______data type is a combinations of text and

op1

op2

op3

op4

a n s

Miffed noted

Cash inserted

Cash dispensed

All of the above

D

Details of hot listed cards

ATM PIN of the customers

IBAS

IBDS

Account balance of customers Middleware

Details of B surrendered cards Central A database server

Inadequacy of security of web server. Excel

User authentication

Stock of blank cards

C

PDF

XML

Inadequate network security All of the above

RTGS

CMS

NEFT

None of the above

B

Beta

Alpha

Client

Final

C

Directly

Only through VLAN

Accessed via B WAN

Forms

Reports

Can't be accessed at all Macros

All of These

D

255

63000

63999

16384

C

Text

Number

AlphaNumeri None c

D

A

INTERNET q_ id

DB12

DB13

DB14

DB15

DB16

DB17

DB18

DB19

DB2

DB20

q_desc

op1

numbers, as well as numbers that don’t require calculations, such as phone numbers. The Size of Date/Time 4 bytes Data Type is ___________ What is the size of 4 bytes AutoNumber Data Type if FieldSizeproperty is set to Replication? Yes and No values and fi Yes/No elds that contain only one of two values that includes ___________. _______is used to Text creates a field that allows the user to choose. Fields that are part of a Text table relationship are called ________. A table can have only Primary key one _______________ which consists of one or more fields that uniquely identify each record that is stored in the table. ________ contains Primary key values that correspond to values in the primary key of another table. The design process Determine the consists of __________. purpose of the database. A part of an Access Spreadsheet database are __________. We can create a table by Table into an creating a new database, existing by inserting a database

op2

op3

op4

a n s

6 bytes

8 bytes

10 bytes

C

6 bytes

8 bytes

16 bytes

D

True/False

On/Off

All of These

D

Field

Lookup Wizard

None

C

Keys

Values

None

B

Foreign key

Super key

Candidate key

A

Foreign key

Super key

Candidate key

B

Find and organize the Specify All of These information required. primary keys.

D

Document

Tables

C

By linking to a table from another data source - such as a

By importing All of These a table from another data

None

D

INTERNET q_ id

q_desc

op1

op2

op3

op4

Microsoft Offi ce Excel source - such 2007 Workbook, a as a Microsoft Offi ce Microsoft Word 2007 document Offi ce Excel or another database. 2007 Workbook, a Microsoft Offi ce Word 2007 document or another database. DB21 To import or link a table Excel worksheet XML file Another All of These in a Access 2010 user use Access ______________ Database DB22 SharePoint is a web site IE Access Both A and B None that can be displayed in a browser such as ________ and includes an interface for displaying lists and libraries in a secure database. DB23 The predefined Contacts Issues Both A and B Nither A Nor templates in Office B Access 2010 include _________. DB24 Every field has a name True False Not Say's None that uniquely identifies the field within a table. DB25 Every field has an Records Data Properties None associated group of settings called __________. DB26 _________ is never Fields Primary key Records Tables empty or null. DB27 Access automatically Charts Index Data None creates an ________ for the primary key DB28 ___________properties Format InputMask Caption All of These affect how our

a n s

__________.

D

A

C

A

C

B B

D

INTERNET q_ id

DB29

DB3

DB30

DB31

DB32

DB33

DB34

q_desc information appears in table and query datasheets. _____is used to enter text that appears when a record violates the Validation Rule expression. ______ are sometimes referred to as "Data Entry Screens". In Ms Access types of controls includes ___________. In Access, Properties are display in a property sheet also called ___________. __________ can be defined as an operation that extracts record(s) from a database based on a given condition. A query consists of search criteria expressed in a database language called ______________. User can create a query in MS-Access using __________.

op1

op2

op3

op4

a n s

Records

Fields

Validation Text

Validation Critaria

C

Tables

Forms

Reports

Queries

B

Bound Controls

Unbound Controls

Calculated Controls

All of These

D

Property window Field Discription

Property Control

None

A

Table

Query

Form

Report

B

BASIC

COBOL

SQL

FOTRAN

C

Choose the Query Wizard provided by Microsoft Access for the ease of user to build a query. Select

Create own queries from scratch using query design.

Both A and B Nither A Nor C B

DB35 __________ querie are Update useful for summarizing information, calculating statistics, spotting bad data and looking for trends. DB36 Action query is used to Create new table Delete rows from

Crosstab

Make Table

C

Update

All of These

D

INTERNET q_ id

q_desc

op1

___________.

DB37 Delete query not deletes True all records in an underlying table from the set results of a query. DB38 _______ query is used to Select create a new table and populate it with data from one or more existing tables. DB39 __________query allows Select the user to make global changes to data in one or more tables. DB4 _________ are what we Tables use to summarize and present data in the tables. DB40 A _______ query is used Sub to pass a parameter to a different query such as an action or a select query. DB41 The SQL aggregate query Sum includes __________functions. DB42 ___________ may be Query wizard used by a user to automatically create a simple query. DB43 Using Simple Query Text Wizard, Summary Option functions are word on _________only. DB44 <> means __________. Equal to DB45 _______operater is used Between

op2 existing table

op3

op4

a n s

False

records or creating entirely new ones in a table Not Say's None

B

Update

Crosstab

Make Table

D

Update

Crosstab

Make Table

B

Forms

Reports

Queries

C

Parameter

Data

Make Table

B

Last

Var

All of These

D

Simple query

Sub

None

A

Number

Date

Time

B

Not equal to Not Between

Not In Is Null

Is Null Is Not Null

B D

INTERNET q_ id

q_desc

if value is not missing from the field. DB46 In like operater * means__________. DB47 Reports provide the most flexible way of viewing and printing ___________. DB48 Report Header section is as a ________.

DB49 _________controls in the Page Header section normally print at the top of every page. DB5 Reports are generally formatted to be printed out, but they can also be ________ DB50 In Access, Page Footer section usually contains __________. DB6 ________is used to retrieve specific data from the tables. DB7 Macro is attached through _______________on aform so that the macro runs whenever Macro is required. DB8 A module is a collection of _________ that are stored together as a unit. DB9 A record is also commonly called a

op1

op2

op3

op4

a n s

Single character Any series of characters General Deep information information

Both A and B Nither A Nor B B Summarized All of These C information

Cover page

Text or text box Number or number box

For All of These D information that needs to be communicate d only once to the user of the report. Character or Date or date A character box box

Viewed on the screen

Exported to another program

Sent as eAll of These mail message

Page numbers

Control totals.

Both A and B Nither A Nor C B

Tables

Forms

Reports

Command button

VB Application

Both A and B Nither A Nor A B

Declarations

Statements

Procedures

Row,Column

Column,Row

Data,Records Raw Facts,Data

Cover letter

Queries

All of These

D

D

D

A

INTERNET q_ id

q_desc

________ and a field is referred as a _______. EX1 A __________ is a visual display of the most important information needed to achieve one or more objectives; consolidated and arranged on a single screen so the information can be monitored at a glance.” EX10 Which feature is added In Excel 2013 and Excel 2016 related to Charts? EX11 __________option is selected, then the changes will be reflected only if we manually click on Update button on Right hand bottom side of PivotTable Field list. EX12 Dashboard is ready to share, we can __________. EX13

EX14

EX15 EX16

EX17

op1

op2

op3

op4

a n s

Dashboard

Spreadsheet

DBMS

None of These

A

Recommended Charts

Reconnected Charts

Reinstalled Charts

None of These

A

Row

Filters

Defer Layout Both A and B C Update

E-mail the Excel Save the Excel dashboard dashboard workbook workbook. on a shared network drive. What is the shortcut key Ctrl+T Ctrl+L to Put Your Data in an Excel Table? __________ work like a Table Slicers filter without going to dropdown. Slicers is used for Pivot Tables Multiple PivotTables ________. How to Add a Simple Options>Calculat Options>Tools>Formu Calculated Field in ions>Fields,Items las>Calculated Fields PivotTable ? & Sets>Calculated Fields In Excel if we have rows Pivot Tables PowerPivot more than 5 lacs rows

Share the dashboard online.

All of These

D

Ctrl+D

Both A and B D

Filters

Sorting

B

Both A and B Nither A Nor C B Options>Tool None of A s>Fields,Item These s& Sets>Calculat ed Fields Both A and B This type of B problem not

INTERNET q_ id

EX18 EX19

EX2

EX20

EX21

EX22

EX23 EX24

EX25

q_desc then system start working slow and get hanged or “Not Responding to handle this situation Microsoft introduced _______feature. Text files delimiters includes ___________. According to Text import Wizard Text qualifier includes ___________. Dashboards can be categorized based on ___________. Single File Web Page format includes ____________. ______ allow us to query data from a specific World Wide Web, Internet, or intranet site and retrieve the information directly into a Microsoft Excel worksheet PivotTable report is an interactive way to quickly summarize ________ amounts of data. PivotTable Field List pane includes _________. Choose where you want the pivot table report to be placed includes ________. Pivot gives us the facility to __________ fields upto any Level by adding to Rows or Columns.

op1

op2

op3

op4

a n s

arised

Tab

Comma

"

'

Strategic Dashboards

Analytical Dashboards Operational Dashboards

.mht

.mhl

Both A and B Nither A Nor C B

Web queries

Web Browser

Web Engine

Web Casting A

Small

Large

New

Quick

B

Report Filter

Column Labels

Values

All of These

D

New Worksheet Existing Worksheet

Current Worksheet

Both A and B D

Group & subgroup

Conclusion

None

Summary

Both A and B Nither A Nor C B Both A and B Nither A Nor C B All of These

D

A

INTERNET q_ id

q_desc

EX26 To Expand all our categories: Select PivotTable tools from Ribbon go to ____________. EX27 Slicer can be accessed from ____________

EX28 ________group that enables us to add subtotals and grand totals to the pivot table and modifyits basic layout. EX29 Apart from sum PivotTable gives us the several other options for summarisation that includes __________. EX3 ___________ comes handy for the top-level management in decision making and to determining and aligning with strategic targets within the organization. EX30 Sorting could be from________. EX31 _____are also used to indicate progress or decline or to indicate good or poor results. EX32 Filtering filter condition includes ___________. EX33 IS PivotTable also gives us the possibility of presenting data with conditional formatting? EX34 Instead of a table full of numbers, a PivotChart

op1

op2

op3

op4

Options>Tools>E Options>Tools>Active Options> None xpand entire >Expand entire Field Active Field field>Expand entire Field PivotTable Tools > Options>Activity >Insert Slicer Layout

PivotTable Tools > Options>Sort & Filter>Insert Slicer

a n s C

B

Design

PivotTable None Tools > Options>Inse rt Slicer Options Pivot Table

Design

Sum

StdDat

D

Strategic Dashboards

Analytical Dashboards Operational Dashboards

Smallest to Largest Icons

Left to Right

Equal to

Top 10

True

False

Both A and B Nither A Nor C B Not Say's None A

Columns

Bars

Pie

Colors

Product

A

Informational A Dashboards

Both A and B Nither A Nor C B Shapes None A

All of These

D

INTERNET q_ id

EX35

EX36

EX37 EX38

EX39

EX4

EX40

EX41

EX42

q_desc can use _________illustrate the numbers. Normal Charts not includes but Pivot Charts Includes __________fields. After we insert a pivot chart_____new tabs are available. Is Tool Tab is a part of Pivot Charts Tabs? ______ is an Excel feature that we can use to define restrictions on what data can or should be entered in a cell. To Validate a List, List option is choose from _______drop down box. Strategic dashboards require to have periodic and static snapshots of data that includes _________. In Excel and according to Data validation Error alert Style includes ____________. _____ option is the only Style choice that completely prevents the person using the workbook from entering invalid data. In Excel and according to Data validation clicking OK enters the new data in the cell; Cancel leaves the cell unchanged that option is available

op1

op2

op3

op4

a n s

Sort data

Collapse or Expand

Summary

Both A and B D

1

2

3

4

D

True

False

Not Say's

None

B

Consolidation

What if Analysis

Data validation

None

C

Source

Allow

Data

Criteria

B

Daily

Weekly

Annually

All of These

D

Stop

Warning

Information

All of These

D

Stop

Warning

Information

None

A

Stop

Warning

Information

None

C

INTERNET q_ id

q_desc

through _________. EX43 Data validation is used for ____________.

EX44 Data validation options are located on the Data tab, in the ________. EX45 Data validation can be applied to cell to achieve the objectives that includes ___________. EX46

EX47

EX48

EX49 EX5

EX50

EX51 EX52 EX53

op1

op2

Restrict data to Restrict numbers predefined items outside a specified in a list range Data Tools group Outline group

op3

op4

Limit the All of These number of text characters Connections Validation group group

Restrict data Restrict data entry to Use a All of These entry to values in a whole number formula to a drop-down list. within limits. calculate what is allowed. How to find cells that Home>Editing>Fi Home>Editing>Find & Home>Editin None have data validation? nd & Select>Go Select>Go to g>Find & to>Data Special>Data Select>Find> Validation Validation Data Validation ______ tools help make Data Consolidation Data Data Analusis sure any invalid data validation doesn’t end up in the worksheets. To defend against Locked Hidden Both A and B Nither A Nor dangers, we need to use B Excels worksheet protection that includes _________. Protecting a worksheet Protecting cells Protecting worksheet Both A and B Nither A Nor involves _________. B Examples of analytical Finance Sales Management Both A and B Nither A Nor dashboards include Management dashboard B ___________. dashboard To protect the workbook Review>Changes Review>Sheet>Protec Review>Tools Review>Prote user select ___________. >Protect t Workbook >Protect ct>Protect Workbook Workbook Workbook Excel 2010 offers up to 28 64 255 None _______ sort levels. Sort Includes Column Sort on Order All of These ____________. __________tool create Consolidation Subtotal Solver Scenario

a n s D

A

D

B

C

C

C C

A

B D B

INTERNET q_ id

EX54

EX55

EX56 EX57

EX58 EX59

EX6

EX60 EX61

EX62

EX63

q_desc groups and subtotals all in one click a feature that can save us lots of time. Is Count Function Work other than Number like Text Etc.? _____ is used to creat a summarised results into one worksheet. Consolidation is used for __________. 3-D Formulas in Consolidate means ___________.

op1

op2

op3

op4

a n s

manager

Yes

No

Not say any thing

None

B

Consolidation

Subtotal

Solver

Scenario manager

A

Business forecasts Only a 3-D effect

All of These

D

None

A

Budgets

Inventory requirements Refer to multiple Refer to Single worksheets and worksheets and can can be used to be used to combine combine data data What-if analysis includes Solver Scenario manager ___________. ___________take sets of Scenarios Data Tables input values and determine possible results. ________ are mini Pie Sparklines charts. It can be prepared either Row wise or Column-wise and can be placed in a single cell. Goal Seek requires Set cell To value __________information. According to Financial Forign Value Fix Value Functions, FV means_______. According to Financial Beginning of the End of the period Functions, Type 0 means period _______. __________solves the Solver Scenario manager problem by adjusting a number of input cells according to a set of criteria or constraints

Consolidation All of These

B

Paste

Both A and B D

Column

Diagrams

B

By changing All of These cell Future Value Financial Value

D

Exact value

B

None

Consolidation Data Table

C

A

INTERNET q_ id

EX64

EX65

EX66

EX67

EX68

EX69

EX7

EX70

EX71

EX72

q_desc

op1

which are defined by the user. Solver in Excel 2010, was Microsoft developed by ______________ The Format as Table Banded rows style helps in creating tables with ______________. How many built in 255 formats are available in a Excel? In Excel, According to Increases the Home Tab A^ means font size __________. ________ command Freeze Data freezes portions of a worksheet, typically column and row headings, so that we can view distant parts of the worksheet while the headings remain in place. _________ are graphical Charts representations of worksheet data. ________ is an excellent Table feature which is used for summarising large data sets and help in quick analysis of data. A macro is a program Spread Sheet that uses_______ code to automate a sequence of actions or instructions. Excel creates a hidden Anyname.xlsm personal macro workbook with name ____________. In Excel, Formula always <

op2

op3

op4

a n s

Frontline Systems Inc. Sun

None

B

Border colors

Patterns

All of These

C

16384

96885

1048576

C

Decreases the font size

Both A and B Nither A Nor A B

Freeze Panes

Split Data

None

B

Diagram

Figures

Tables

A

Charts

PivotTable

None of These

C

VBA

Excel

Recording

B

Anyname.xlsb

Personal.xlsm Personal.xlsb D

>

=

<>

C

INTERNET q_ id

EX73

EX74

EX75

EX8

EX9 OS1 OS10

OS11

OS12

OS13

OS14

q_desc

op1

begins with an ________ sign. _______ error is shown #NULL! in a excel if the formula tries to divide by zero or the divisor is a reference to a blank cell,which Excel considers to be zero value. _______ is always Current sheet highlighted in the sheet tab. _______function returns Max the k-th largest value in a data set. Excel has several built-in Column chart that includes __________. Line chart is used for Compare data __________. values Which is not the state of Blocked the process ? ___ Processor is BACK END responsible for handling communications to and from all the remote terminals connected to computer system. Single-user computers Workstation have two categories ___ & ____. The speed of Gigaflop Supercomputers measured in ______. _____________ is also Multiprogrammi called parallel ng processing. Enabling the user to Multitasking swith between the task is known as_____.

op2

op3

op4

REF!

a n s

#DIV/0!

#N/A

B

Excel Spreadsheet

Workstation WorlPlace

A

Maximum

Large

MaxA

C

Scatter

Bar

All of These

D

Trends over time

Distribution

All of These

D

Ready

Suspended

Privileged

D

FROND END

HOST

None of the above

B

Microcomputer

Mainframe

Both A & B

D

Megaflop

Picaflop

All of above

A

Multiprocessing

Multitasking Multithreadin B g

Multithreading

MultiProcessi None of the ng above

A

INTERNET q_ id

q_desc

op1

OS15 Which of the following Convenient facility is not provided by OS layers to use hardware? OS16 Efficient and fair sharing TRUE of resources among programs is a key goal of Operating System. OS17 Major activities of an Deadlock Operating System with Handling respect to process management ________. OS18 A_____is a collection of File related information defi ned by its creator. OS19 ________ is measured as Turnaround time the number of processes that are completed by the system per unit time. OS2 The number of processes Output completed per unit time is known as_______ ? OS20 Which of the following is Object not a components of a process? OS21 During the lifespan of a Five process, its execution status may be in one of_____ states. OS22 In multiprogramming CPU bound jobs ,most of the time perform I/O operations and CPU utilization is very low ,this kind of jobs is called as ____________. OS23 Threads are oftern Mini processes referred as________________. OS24 Operating system is a TRUE system software.

op2 Efficient

op3 Safe

op4 None of the above

FALSE

a n s D

A

Process Communication

Process All of above synchronizati on

D

Document

Program

None of the above

A

Throughput

Response time

All of above

B

Throughput

Efficiency

Capacity

B

Data

Status

None of the above

D

Four

Three

Two

B

I/O bound jobs

I/O Status Information

None of the above

B

Lightweight processes Both A and B None of the above

C

FALSE

A

INTERNET q_ id

q_desc

OS25 Each thread of process has___________. OS26 In case of ___________ operating system, the user views the system as a 'Virtual Uniprocessor'. OS27 In Operating System, threads in multithreading refer to ______________. OS28 Which of the operating system was recorded in C programing language ? OS29 The two commonly used models for kernel design in operating systems are__________ and__________. OS3 Process is ____________.

op1 Own program counter Distributed

op2

op3

Own register states

Own stack

Centralized

Network

Different parts of Different programs of Different a single process a single process processes of a single program UNIX Linux DOS

Monolithic kernel

Microkernel

All of the above Real-time

Different users of single processes Windows

a n s D A

A

A

Both A and B None of the above

C

A program in A job in execution secondary memory Memory All of the protection above

C

Last Updated

File Size

All of the above

D

Write

Seek

Open

C

Rename

Write

Open

B

UNIX

DOS

MAC

A

Program in High Contents of main level language memory kept on disk Proper job mix CPU scheduling

OS30 Under ______ option proper mix of I/O-bound and CPU-bound jobs are required to effectively overlap the operations of the CPU and I/O devices. OS31 The attribute of a fi le Date & Time contains other information about the file such as_______. OS32 ______ operation is used Read with random access files to first position the read/write pointer to a specific place in the file. OS33 ______ is used to change Read the name of an existing file. OS34 _____ is a prominent MULTICS example of a layered

op4

A

INTERNET q_ id

OS35

OS36

OS37

OS38

OS39

OS4

q_desc operating system. ________is a bridge between applications and the actual data processing done at the hardware level. The design of Linux is an example of ______architecture . In context with multiprocessing ,SMP stands for ___________. Which state of process records the status of I/O devices ____________. Whch of the following measure is used in case of interactive system _____________. PCB stands for_____________.

op1

op2

op3

op4

Operating System

Kernel

CPU

Monolithic

Micro

Both A and B None of the above

A

Symetric None of the Multiprocessi above ng Running None of the above

C

Response time

C

Server Shared Multiprocessing Multiprocessing Blocked

Suspended

Throughput

Turnaround time

Program Control Process Control Block Process Block Communicati on Block Sustended Blocked Terminating state

OS40 When the process is waititng for an I/O devicethat state is known as _________________. OS41 Requirements of Large memory Memory protection multiprogramming are _____________. OS42 The part of the CPU CPU Scheduler Instruction Register which decides which of the ready jobs must be allocated to the CPU when it is free is known as ________. OS43 Sharing of computing Resource sharing Time Sharing resourses among many users by the operating system is know as____________.

ALU

a n s

None of the above

B

A

Program B Communicati on Block None of the B above

Job status All of the preservation above

D

Control Unit Arithmetic Logic Unit

A

Computer Sharing

B

Processs Sharing

INTERNET q_ id

q_desc

op1

op2

OS44 Which of the following is Creation and Suspension and not an activity of deletion of user resumption of Operating system with and system processes respect to process processes management? OS45 The memory Synchronization Allocation demanagement module of Asynchronization allocation an operating system takes care of the_________________ of memory space to the various programs in need of this resource. OS46 The _________ module Security Process management of operating system managemnt ensure that data should be protected from unauthorized users. OS47 The Operating system Process Control Process Circuit Board maintains Block a_________________ for each loaded process before taking away the CPU from a running process. OS48 In UNIX terminology Kernel Shell commannd interpreter is referred as _________________. OS49 A process control Process State Process Identifier block(PCB) doesn't contain______________. OS5 A computer system that Multitasking Multiprogramming permits multiple users to run programs at same time. OS50 In _______the jobs were Batch Processing Manual Loading then automatically loaded from the input device and executed by the system one by one

a n s Improve CPU A mechanism C utilization for deadlock handling op3

Suspension resumption

op4

None of the above

B

Memory Device A management management

Program None of the Control Block above

A

Program

None of the above

B

I/O Status Information

Memory Information

D

Multithreadi Multiprocessi B ng ng

Batch Working

All of the above

A

INTERNET q_ id

OS6 OS7 OS8

OS9

PP1

PP10

PP11

PP12

PP13

PP14

PP15

q_desc

op4

a n s

All of above

A

None of the above Windows XP UNIX

A

Tightly-coupled

Multi-tasking None of the above

A

.ppnt

.pptx

None

C

SHIFT +F12

SHIFT+F10

Both A & B

D

Themes

Slide Masters None

A

CTRL

ALT

All

A

F5

F6

F7

B

ctrl + f5

alt + f5

None

A

Slide Show

Transition

View

D

op1

without any operator intervention. A Microsoft Windows is Operating a(n)_______. System Which of the following is Accessories program group? Which of the following is DOS not an operating system? A Linux Beowulf cluster is Loosely-coupled an example of a _____ system. PowerPoint 2010 .ppt presentations have the extension __________ _______ keyboard CTRL+S shortcut use to save the document in PowerPoint. The arrangement of Layout placeholders on a slide is called a __________. To create a perfect SHIFT square or circle or Line (In Power Point), press and hold _______ while user drag it. To view presentation in F4 Slide Show view from the first slide, shortcut key use from keyboard is _______ To view presentation in shift+f5 Slide Show view from the current slide, shortcut key use from keyboard is _______ In Power point, slide Animation master option exist in _________ tab.

op2

Word Software MS Word Excel

op3

Graphics Software MS Paint

B

INTERNET q_ id

q_desc

.pptx

.potx

.pptt

a n s C

Clipboard

Paste Special None

A

Transitions

Animations

Insert

D

Red

Yellow

None

A

XBRL

XML

None

C

Object Linking

Illustrations

None

B

Save

Paste Special None

C

Save

Paste Special None

C

Action

Pull

None

B

Notes Master

Handout Master

None

A

op1

PP16 PowerPoint template is a .ppt pattern or blueprint of a slide or group of slides that has an extention ________. PP17 _________ is use to Format Painter apply formatting from text, shapes, and pictures to another text selection, shape, or picture. PP18 In Powerpoint 2010, Design chart utility exist in _______ tab. PP19 When we insert a chart Blue in Powerpoint 2010, Only the data enclosed by the _________ lines will appear in the chart. PP2 .PPTX is an extention of HTML power point, where X at the end denotes that the new file format is based on an open ____ PP20 ___________ is a Hypertext technology that allows linking to documents and other objects. PP21 Paste link exist in Clipboard ________ dialog box. PP22 Transpose option exist in Clipboard __________ dialog box. PP23 In PowerPoint, you can Push use _________ button to launch any other Presentation, Application or Website from your presentation. PP24 A ________ is the top Slide Master slide in a hierarchy of slides.

op2

op3

op4

INTERNET q_ id

Slide Master

Notes Master

Handout Master

None

a n s B

One

Two

Three

Four

C

Slide Show

Design

View

Review

C

Static Images

Dynamic Image

Logical Image None

A

SmartArt graphic Shapes

Slide Show

A

Themes

Slide layouts

Slide Masters All

B

Image

Link

Symbols

Media

D

Four

Five

Six

Seven

A

Emphasis

Motion Paths

Entrance

All

D

Animation

Slide transitions

Slide Show

None

B

Portrait

Landscape

Custom

None

B

q_desc

PP25 __________ controls the appearance of all speaker notes pages. PP26 The PowerPoint presentation contains ___________ masters. PP27 In PowerPoint, Master view exist in __________ Tab. PP28 Screenshots image is __________ PP29 A __________ is a visual representation of information that can quickly and easily create, for effectively communicate messages or ideas. PP3 In Power point, how the information is arranged on the slide is controlled by ___________ . PP30 All options to insert a video are located on the Insert tab, in the_________ group. PP31 There are ______ different kinds of animation effects in PowerPoint 2010 PP32 __________ Animation effects exist in PowerPoint 2010 PP33 __________ are motion effects that occur in Slide Show view when we move from one slide to the next during a presentation. PP34 Default page orientation in Power point is

op1

op2

op3

op4

None

INTERNET q_ id

PP35

PP36

PP37

PP38 PP39

PP4

PP40

PP41

PP42

q_desc ___________ Default number of handouts exist in one page, in PowerPoint are ______ In PowerPoint, Rehearse time option exist in ________ group of slide show Tab. __________ slide show option use for, to choose the slides to use in the show and the order shown. _________ key is use to exist from slide show. The __________ view provides a thumbnail view of the slides in a presentation. ________ are combinations of design elements such as color schemes and fonts that make it easy to create attractive slides. view is to view a presentation not in fullscreen Slide Show view, but in a window with simple controls that make the presentation easy to review. ________view occupies the full computer screen, exactly the way presentation will look on a big screen. __________ View is used in viewing presentation with speaker notes on

op1

6

op2

8

op3

op4

a n s

10

12

A

Start Slide Show Monitor

Set Up

None

C

From Beginning From Current slide

Custom Show None

C

Delete

Enter

Esc

C

Slide Sorter

Normal view

Reading view Master view A

Themes

Slide layouts

Slide Masters All

Slide Sorter

Normal view

Reading view Master view C

Slide Show

Normal view

Reading view Master view A

Slide Show

Normal view

Reading view Presenter

Break

A

D

INTERNET q_ id

PP43

PP44 PP45 PP46

PP47

PP48

PP49

PP5

PP50

PP6

PP7

PP8

q_desc one computer. __________ is the main editing view where we can write and design the slides of a presentation. _______ Number of tabs exist in PowerPoint Number of master views exist in PowerPoint To insert a new slide in power point using keyboard __________ key used First group in view tab in powerpoint is __________ which tab contain macro tool in PowerPoint ________ Default paper size in power point ___________ __________ use to change the appearance of all the slides in our presentation at once. To define time for a particular slide __________ PowerPoint includes a slick diagramming feature called __________ The dialog box launcher button available is in the group at __________ corner. ________ is a customize toolbar that contains commands frequently in

op1

op2

op3

op4

a n s

Slide Show

Normal view

Reading view Presenter

B

6

9

12

13

B

2

3

4

6

B

CTRL+K

CTRL+N

CTRL+M

None

C

Master View

Presentation View

Zoom

Macro

B

Home Tab

Insert

Design

View

D

A4

Letter

Legal

Executive

B

Themes

Slide layouts

Slide Masters All

C

Rehearse Time

Use Timings

Play Narration

None

A

SmartArt

Shapes

Media clips

None

A

bottom-right

bottom-left

Top-right

Top-left

A

Home Tab

Control Tab

Quick Access None Toolbar

C

INTERNET q_ id

PP9 WO1

WO1 0

WO1 1 WO1 2

WO1 3 WO1 4 WO1 5

WO1 6 WO1 7

WO1 8 WO1 9 WO2

q_desc

op1

use. The _________ shows Slides tab thumbnail icons of slides. The Navigation Pane 1 provides____number of views of our document ___________ Indentation determines the distance of the paragraph from either the left or the right margin. Negative indent is also Indentation known as _________. In Indentation, Hanging __________ controls the left boundary of every line in a paragraph except the first one. Ctrl + Shift+S is used for Save As ___________ Insert tab includes Pages __________. According to Table in Ms Combine Cell word,_________combin e two or more cells in the same row or column into a single cell. Tables of citations is Bibliography known as _____ and _______ are footnote and used for provide endnotes references for text of document Cross reference depends CITATIONS on ______ Shortcut key for Web ALT+W+P layout is In Navigation Pane, Headings _____ view provides hierachy of headings in

op2

op3

op4

a n s

Outline tab

Both A & B

None

A

2

3

4

C

Paragraph

Spacing

Line

A

Outdent

None

B

First Line

Negtive Spacing Left

Right

A

Solver

Styles box

Only Save

C

Illustrations

Text

All of above

D

Merging Cells

Select Cell

Delete Cell

B

Table of figure HEADER AND FOOTER CITATION AND CAPTIONS

Table of Authority THESAURAS AND RESEARCH

A

captions

FOOTER

FOOTNOTE

B

ALT+W+U

ALT+W+L

ALT+W+O

C

Thumbnail

search results None

Table of content

A

A

INTERNET q_ id

WO2 0 WO2 1 WO2 2

WO2 3

WO2 4

WO2 5 WO2 6 WO2 7

q_desc our document ______is a helpful tool for setting margins and tabs _________defines the colors,fonts and graphics effects for a document if a word too long to fit at the end of a line then to adjust word we can use ___________ is often used to hide or trim a part of a picture either for emphasis or to remove unwanted portions. ____________ is the ratio between picture width and picture height which can be maintained even when resizing a picture. In SmartArt, What is the Purpose of Cycle?

Which of them is a part of Charts? ___________ identifies a location or a selection of text that we name and identify for future reference. WO2 _______________ are 8 areas in the top, bottom and side margins of each page in a document. WO2 __________ are those 9 giant letters that begin the first paragraph of a chapter or document.

op1

op2

op3

op4

a n s

ruler

GRIDLINES

NAVIGATION HEADINGS PANE

Theme

STYLE

WORD ART

WATERMARK A

hyphentation

ALIGN

WREP TEXT

LINE BREAK

Cropping

Removing

Deleting

Moving

Quick Ratio

Equity Ratio

Aspect Ratio General Size C Ratio

Show a continual Shows steps in a process process or timeline

Show nonsequential information doughnut charts Crossreference

A

A

Show how parts relate to a whole All of above

A

None

B

Column charts

Surface charts

Hyperlink

Bookmark

Header

Footer

Both A and B Nither A Nor C B

Drop Cap

All Cap

Upper Case

Font Size

D

A

INTERNET q_ id

q_desc

WO3 Screenshot feature will not be available in word2010 if we are working on a document in ____ mode WO3 In Word,User create a 0 table of contents by applying __________. WO3 Shortcut key of footnote 1 and end note are __________ WO3 __________________ is 2 a list of sources, usually placed at the end of a document that we consulted or cited in creating the document. WO3 In word, Insert caption is 3 a numbered label, such as_________ WO3 In 4 Figures,____________is defined as a list of the captions that appear in the document and the associated page numbers. WO3 In Word2010,What is the 5 path of Recover Unsave Files?

op1

op2

op3

op4

a n s A

compatibility

normal

Page layout

None

Index

Heading styles

Table Designing

Table Creation

CTRL+ALT+ F

CTRL+ALT+ D

Both A and B Nither A Nor C B

Bibliography

Acknowledgement

Last Slide Source

None

A

Table 1

Figure 1

Equation 1

All of above

D

Table of Content Table of Figures

Table of Tables

Table of Equations

B

File>Info>Versio ns>Manage Versions>Recove r Unsaved Documents

File>Save & None Send>Version s>Manage Versions>Rec over Unsaved Documents Gridlines Navigation Pane

WO3 In Word2010,Which of Ruler 6 them is not included in a show tab under View tab? WO3 Switch Windows button True 7 contains up to nine open documents in Word2010. WO3 In word2010,_________ Macro

File>Options>Versions >Manage Versions>Recover Unsaved Documents

Formula Bar

FALSE

Tabs

B

A

B

A

Formulas

Data

A

INTERNET q_ id 8

WO3 9

WO4

WO4 0 WO4 1 WO4 2

WO4 3

WO4 4

WO4 5 WO4 6

q_desc is a series of commands that we can use to automate a repeated task and can be run when we have to perform the task. _______format preserves document formatting and enables file sharing By default ______ will appear on the quick access toolbar What is the shortcut key for finding word with similar meaning __________is not an option of the Page setup group. A __________ setting adds extra space to the side or top margin of a document for binding ______option of the Mailings tab is used to correlate fields from a data source to fields in a main document having different field names __________ can help to separate sections of a document and make them look interesting to read Watermark option is in __________group of Pagelayout tab To combines a document with a list of names and addresses to produce individualized

op1

op2

op3

op4

a n s

XML

XLS

PDF

DOC

C

Save

Undo

Redo

All

D

Ctrl+F7

F7

Alt+F7

Shift+F7

D

Margins

Size

Drop Cap

Columns

C

Left margin

Gutter margin

Mirror margin

Right margin B

Select Recipient Match Fields

FindFields

None of the above

B

Orientation

Columns

Theme

C

Page Background Theme

Pagesetup

None of the above

A

Main document Data source

Mail merge

Merge field

C

Watermark

INTERNET q_ id

q_desc

documents name as ____________. WO4 We use _________ when 7 we want to create a set of documents, such as a form letter that is sent to multiple recipients. WO4 Shortcut key for 8 Printlayout is WO4 PDF stands for 9 _____________. WO5

WO5 0

WO5 1 WO5 2 WO5 3

WO5 4

WO5 5

op1

op2

op3

op4

a n s

Mail merge

macros

Smart art

End notes

A

ALT+W+P

ALT+W+U

ALT+W+L

ALT+W+O

A

Portable Documents Form

Portable Documented Format ctrl+C

Portable Document Format None

D

Match Fields

Compare Fields

Auto Check for Errors

B

Envelopes

Memos

Directory

C

Matrix

Table

Paragraphs

C

Field

Field name

Record

C

Last-Name

Last_Name

Last\Name

C

Enter Key

Shift + Enter Ctrl +Shift+ Enter

Printable Document Format The shortcut for opening ctrl+F the search area of the navigation pane Which button on the Find Recipient Mailings tab is used to correlate fields from a data source to fields in a main document that have different field names? Which of the following is Letters not a default document type for a mail merge? How is the information in Chart a data source organized? What is the name of the Data field column heading for each category in a data source? By Default,When a field LastName name has a space in its title, such as Last Name, how is the merge field displayed in the mail merge document? Which key should be Down Cursor Key pressed to start a new paragraph in MS Word 2010?

ctrl+A

A

INTERNET q_ id

q_desc

WO5 ) In MS Word 2010, the 6 extension "rtf" stands for ___________. WO5 ________ option in Ms7 Word 2010 shows paragraph marks and other hidden formatting symbols? WO5 In H2O the figure 2 is 8 appeared lowered. Which effect has been applied? WO5 Which of the following 9 shortcut key is used to check spelling? WO6 _______ feature of word2010 which allows us to recover unsaved documents which were closed due to some reasons WO6 In Word 2010, 0 ____________ is a preset document layout with a collection of styles which are saved to a file and can be applied to other documents WO6 In Word 2010, ____ 1 option automatically resizes the table to fit in a Web browser window when window size is changed. WO6 To adjust a list in single 2 page we use WO6 The extension file name 3 for the list of mail merge is WO6 Orientation modes in 4 Word2010 are

op1

op2

op3

op4

a n s B

Reversible Text Format

Rich Text Format

Return Text File

Return Text format

Show/Hide

Enable/Disable

Clipboard

Styles

A

Superscript

Lowered

Subscript

Laid down

C

Ctrl+F7

F7

Alt+F7

Shift+F7

B

Manage versions Accesibility checker

check None compatibility

A

Template

Screenshot

Style

Agenda

A

Fixed column Width

AutoFit to contents

AutoFit to window

None of the above

C

section break

continous break

.mdb

.rtf

column break next page break .accdb .swp

top and bottom horizantal and vetical wide and narrow

none

C A

B

INTERNET q_ id WO6 5 WO6 6 WO6 7

WO6 8

WO6 9

WO7

WO7 0 WO8

WO9

printing option

envelop option

both a and b none

a n s B

wrap text

word art

format text

text box

A

next page section break

continous break

even or odd section

previos page B section break

count numbers

line numbers

both

none

B

add ins

plug-ins

meta-ins

none

A

.doc

.docx

.dotx

None

B

true

false

Ctrl+delete

Ctrl+backspace

True

False

q_desc Monarch is an example of Behind text is an option of We would use a ____break if we wanted different kinds of formatting on the same page A utility of word2010 is used when we need to refer to specfic lines in a document such as script or legal contract An _____ has an installed functionality that adds custom commands and new features in office 2010 programs Word2010 uses ___file extension to save documents Add-ins run without notification To delete the entire word to left of the cursor position the cursor to the left of the text we want to delete and for that we press _____ we cannot delete the page break that word inserts automatically

op1

op2

op3

op4

A cut

none

A

A

TALLY_FINAL q_id

q_desc

TL1 The financial transactions are to be …………. leading to different steps in Accounts Compilation.

op1

op2

op3

Collecte Sampled and Grouped and d and stratified summarized comput ed

op4 Assets and liability

an s C

INTERNET q_ id

q_desc

op1

op3

a n s

op4

TL10 The methods LIFO, FIFO, Moving Average are used to ….

Value clearing Value expense Value income stock stock stock

A

TL11

Income statement

Balance sheet

C

Trading account Sales or purchase

P&L Suspense statement accounts Asset or liability Profit or loss

C

Voucher debtors Assets

Sundry debtors Original entry

C

Liabilities

Suppliers

D

Assets side

Expense side

Payable side

B

Company

Project

Application

B

F2

F12

F11

C

Tally Pack

Tally Group

Tally Vault

D

Journal

Voucher

Trial Balance

B

Gateway of Tally

Entry of Tally

Groups of Tally B

Production

Mercantile

Manufacture

C

Current assets Loan assets

Capital assets

B

Groups

Journal

Ledgers

D

Expense nature

Revenue nature

Income nature C

TL12 TL13

TL14 TL15 TL16 TL17

TL18 TL19 TL2

TL20

TL21 TL22

TL23 TL24

Value closing stock The report prepared taking the asset P & L and liability type accounts from the statem Trial Balance is called…. ent The report that depicts operating Trial profit/loss for a period is ….. balance The day book contains transactions Income relating to ……… or expendi ture The Bills Receivable details are Journal maintained in a …….. sheet Creditors ledger has details of your Custom dues to …….. ers The sundry debtors are placed in the Income Balance sheet on the …… side The first step in Tally before any File transaction is entered or saved is creating a ……… To configure country specific details F10 use the function key…… Identify the security mechanism used Tally in Tally. Secure The basic document where Ledger transactions are entered chronologically is…. After selecting a company in Tally, Accoun you will be in the…… ts of Tally Tally software is based on ……… Sales accounting system. Identify the primary group of capital Fixed nature that uses bank account and assets cash in hand as sub groups. All financial entries in Tally are done Vouche using……. rs The Direct expenses, Purchase Capital account, Direct income are primary nature

op2

Asset sheet

B

INTERNET q_ id

TL25 TL26 TL27

TL28 TL29

TL3

TL30

TL31

TL32 TL33

TL34 TL35

TL36 TL37

TL38

q_desc groups of ….. The option to delete a sub-group is admissible through the menu…… The behavioural attributes of this group cannot be changed. Credit limits for personal accounts and branches can be done in the ledger mode…… We are not allowed to delete a ledger from this mode. All account heads except Cash and Bank are placed in the……

op1

op2

Shift

a n s

op4

Alter

Delete

Subgroup Single

Ledger-group Primary-group Alter-group

C

Multiple

Sub-group

Alter-group

B

Single

Sub-group

Alter-group

Multiple

D

Sub Group Ledger Ledger master master These are the basis for analysis by Journal P & L Account potential investors, banks etc. and and Journal Ledger Identify the primary group of capital Expens Income nature that has the sub-groups: Bank es OD Account, Bank OCC Account. The primary document for recording Journal Trial sheet all financial transactions in Tally is the…… You can customize the voucher entry F13 F12 screen using the function key……. Identify the voucher type that Credit Payment records fund transfers between cash Note and bank accounts. This voucher type records Sales Receipt adjustments between ledgers. The use of classes for payment, Double List entry receipt and contra vouchers enables entry mode data input in …… mode The details of a voucher entry can be Comme Memo given in the ……. nt The credit note voucher can hold Sales Ledger account types: …….. account account, Bank , Sales account tax account The suffix and prefix details for the End of a First of a year

Display

op3

A

General Ledger Journal Ledger C master master P & L Account and Balance Sheet Assets

Voucher C Account and Balance Sheet Loans D

Voucher

File

C

F10

F11

B

Receipt

Contra

D

Payment

Journals

D

Choice entry mode

File entry mode B

File

Narration

Suppliers account, Purchases account

Buyer's A account, Cash account

D

First of a month End of a month C

INTERNET q_ id

TL39 TL4 TL40 TL41

TL42

q_desc voucher type can be made applicable only from the ……. The voucher used to record all bank and cash payments is ….. The accounts that the business owns is called …. Tally's age-wise analysis considers the voucher's …… Arrange the steps in generating the books of accounts.1. Create Trial balance2. Create new ledgers3. Generate Day Books4. Update journals for financial transactions For day-to-day transactions the voucher types used are

TL43 Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be entered into the voucher type….. TL44 Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10 monitors by credit. TL45 Identify the voucher type to be chosen for the sale of computers to Anand by cash @ Rs.210000 per unit. TL46 A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher….. TL47 The financial statement that consolidates ledger balances is ….. TL48 The F9 function key in the left side of the Gateway of Tally screen displays the…… TL49 The option on the Gateway of Tally that will generate the P&L account statement is….. TL5 The expenditure for running the business for a period is ….. TL50 This displays the balance daywise for

op1

op2

op3

a n s

op4

month Credit Contra Note Liability Income

Sales Note

Payment

D

Sales

Asset

D

Previou Effective date Current year s date 1, 2, 3, 1, 3, 4, 2 2, 4, 3, 1 4

Configured date 3, 4, 2, 1

B

Credit Cash purchase Both A and B purchas e Loan Payment Receipt

Contra purchase

C

Sales

B

Credit Cash Purchas Purchases es Cash Sale Sheet Ledger

Expense Purchases

Debit Purchases

A

Stock Journal

Purchase Voucher

C

Paymen Receipt t

Debit

Contra

D

Balance sheet Accoun ting reports Net Loss

Profit & Loss statement Inventory reports

Trial balance

Journal

C

P & L reports

Expense reports

B

Net Income

Net Profit

Net Account

C

Taxes

Income

A

Journal book

Day book

D

Expens Example e Record Ledger book

C

INTERNET q_ id

TL51 TL52 TL53 TL54

TL55

TL56

TL57

q_desc a selected voucher type. The feature in Tally to analyze accounts of a company is….. The age-wise statement is displayed based on…… The ratio analysis of receivables can be done based on…… Name the statement that helps the management in the decision making process. Identify the budget type which is chosen where transaction amounts are to be monitored. Choose the budget type to be used where bank accounts balances are to be monitored. The management that needs to consolidate the accounts of its various enterprises uses ……. in Tally.

op1

op2

book Ratio Account analysis analysis Income Payables

a n s

op4

Transaction analysis Loans

A

Bill date Effective date Voucher date

Previous date

A

Data flow

Funds flow

Cheque flow

B

On closing balance On closing balance Consoli date compan y Owner

On net credit On net flow transactions

On net cash flow

C

On net credit On net flow transactions

On net cash flow

A

Group company

Set company

Alter company B

Accountant

Administrator D

Period-less accounting

Transactionnumber accounting

C

Nominal accounts

Expense accounts

B

Tally Report

Tally Group

B

Tally.exp

Tally.ole

A

ODBC

MS-XLS

C

Sequence number

Range number B

TL58 Identify the user who can access Data Entry audit trails in Tally. operator TL59 Identify the accounting feature in Month- Yearly-entry tally that facilitates splitting financial less accounting years for a company data. account ing TL6 Identify the account type by the rule: Real Personal "Debit the receiver and credit the account accounts giver". s TL60 The tracking of changes in vouchers Tally Tally Audit and ledger masters is done by….. Vault TL61 Tally can import data from other Tally.im Tally.cfg programs and creates a log about the p activity in the file….. TL62 Import and export of data between OLE DBMS Tally and other programs is possible with the help of….. TL63 The manual option of voucher Auto Duplicate numbering leads to….. number number s

Data analysis

op3

Expenses

Stock flow

B

INTERNET q_ id

q_desc

op1

op2

a n s

op4

TL64 The Tally audit trail tracks changes made to vouchers that are …..

more than a day old

more than a week old

A

TL65

F12

F6

D

Test program pack

Test record pack

B

TL66

TL67

TL68

TL69

TL7 TL70

TL71

TL72

TL73

more less than 30 than 30 Days old Days old The ratio analysis of Bills Receivables F5 F8 or Bills Payables can be displayed with the function key….. The test data generated with Test Test data pack correctness proof, data flow analysis item and control flow analysis tools is block called…. When a real-time system is Parallel Tracing simulated to generate the same trailing parallel output as the real-time system, the technique is called…. When an auditor expands the extent Cross Formulate of substantive tests to determine the referen flaw impact of defects on the attainment ce lister hypotheses of program objectives, the methodology is…. This is an important control in Public Random audit systems that use digital signatures audit trails for authentication purposes. trails The first document where the Ledger Liability transaction is entered is called a ….. Selecting transactions based on a Transac Systematic sampling rate is called …. method. tion sampling samplin g The capability of the generalized File size File data audit software to read different data coding schemes, different record formats and different file structures is…. The audit software capability of Sort Sampling nth frequency analysis is to…. and item merge files The audit functions of attributes Stratific Selection sampling, variables sampling, ation stratified sampling are included in ….

op3

Parallel coding Parallel simulation

D

Correct lister

Formulate correct hypotheses

B

Sample audit trails

Data audit trails

A

Voucher

Expense

C

Simple sampling

Demographic sampling

B

File access

File C reorganisation

Formatting output

Classify data on D a criteria

Statistical

Reporting

C

INTERNET q_ id

q_desc

functions. TL74 Identify the functional limitation of a generalized audit software that enables evidence collection only on the state of an application system after the fact. TL75 The purpose-written audit programs are used for…..

TL76 Picture of a transaction as it flows through the computer systems is called….. TL77 Identify the type of audit when auditors are members of the systems development team. TL8 The document used for posting of accounting transactions is ……....

op1

op2

op3

a n s

op4

Ex Post Analytical Auditin review only g Only

Limited ability to determine Propensity for Error

Limited ability A to Verify Processing logic

Sorting, Data retrieval, creating code , and comparison printing files Progra Track m

Reading data, selecting and analyzing information

Specific tasks D with original or modified programs

Snapshot

Picture

C

General Post audit audit

System audit

Concurrent audit

D

Balance sheet and trial balance Credit

Journal and ledger

D

Expense

B

Vouche Ledger and r and trial balance journal TL9 When the debit total is greater than Income Debit credit total, the amount appears in the …….. column.

More Documents from "sonam"