BASIC_CONCEPT q_id q_desc BC1 Collection of instruction is called a _____ BC2 Combination of alphabetic and numeric data is called _____ data BC3 Computers can be classified based on ______,______and _______ BC4 _____________ is the Worlds largest computer network . BC5 _________ are used in large organizations for large scale jobs BC6 _______ devices are responsible for feeding data into the computer BC7 _______ is the capability of the o/s to run numerous applications simultaneously BC8 _______ involves conversion of raw data into some meaningful information BC9 _______ device is responsible for obtaining the processed data from the computer BC10 _______ printers use light to produce the dots needed to form pages of characters BC11 Hardware components in a computer are _____,____,_____,______
op1 procedure
op2 batch
op3 command
op4 program
ans D
alpha numeric
alpha beta
numerous alpha
number and A alpha
space occupied, price, no. of users allowed Ethernet
cost, performance their ratio Internet
size, performance, cost ARPANET
input, output, C performance ratios None of the B above.
mini computers microprocessors PCs
mainframes
D
input
feed
write
A
multiprocessing multithreading
multiplexing
multitasking D
interpreter
compiler
converter
process
D
input
processor
ram
output
D
impact printers drum printers
thermal printers
C
operating system, bootstrap, kernel, shell operating system
non-impact desktop printers control program, monitor, interpreter, program, assembler, keyboard, bus compiler application windows 95 software
CPU, D memory, input device, output device interpreter B
compiler
assembler
coder
B
power builder
SQL * plus
all of the above
D
BC12 _______ software helps to do a specific task for the user BC13 _______ converts a high processor level language into machine language BC14 _______is/are a popular visual basic front end tool
output
BASIC_CONCEPT q_id q_desc op1 BC15 _______ translates assembly compiler language program into machine language instructions BC24 The model through which processing the relationship is diplayed model between data and information is called_______ BC25 ____________looks like a smart card ordinary credit card but incorporate a microprocessor and memory chip____________ BC16 ______ computers are used mainframes in large organizations for large scale jobs which have large storage capacities BC17 _______ is responsible for all control unit calculations and logical operations that have to be performed on the data BC18 ______ printer use laser light band printer BC19 ______ software enhances the user to enter ,store, manipulate and print any text BC20 _______ is the temporary storage place for deleted files BC21 Processed data is called ___________________ BC22 _____ language consists of strings of binary numbers BC23 _________capability supports concurrent users doing different tasks
op2 interpreter
op3 assembler
model
system model none of the above
C
RAM
ROM
Firmware
A
super computers micro computers
none of the above
A
arithmetic and logic unit
none of the above
B
none of the above none of the above
C
data management
non impact printer word processing electronic spreadsheet
my computer
recycle bin
Microsoft exchange
none of the above
B
data
datum
information
none of the above none of the above none of the above
C
central processing unit
drum printer
assembly machine language language multiprocessing multithreading
Internet
INTERNET
high level language multiplexing
op4 processor
ans C
B
B D
q_ id
business broadcasting system large
bulletin broadcasting system very small
network of network
intermediate network
ping service
ftp service
TELNET
ARCHIE
uniform resource locator scheme
unlimited restore locator
net
web
browser
a n s none of A the above none of B the above none of B the above none of A the above none of C the above none of A the above none of C the above editor B
Usenet
finger service
ftp
telnet
Higher text transfer protocol
Hyper text transmission port
q_desc
op1
IN BBS stands for______ 1
bulletin board system
IN USENET is a BBS on ____ 2 scale
small
IN Internet can be defined as 3 _______
internal network
IN _________is a program that finger service 4 displays information about a host connected to the net IN _______ is a program or a FTP 5 tool that helps in locating a file anywhere on the net IN URL stands for ____________ uniform research locator 6 IN A ______ always begins with message 7 a slash IN The World Wide Web is 8 referred to shortly as the _______ IN ______ is a program that 9 helps us to log on to other networks IN HTTP is the acronym for 10 __________
IN ______is used to transfer and iccp 11 copy files over the internet IN _____ is a program that helps yahoo 12 us to log on to other networks IN TCP/IP stands for transfer control 13 ________________ protocol/internet
op2
op3
command line
op4
D
Hyper text Hyper C transfer protocol text transfe r port ftp uucp none of C the above ftp telnet none of C the above transmission transfer none of B control communication the protocol/inter protocol/interne above net protocol t protocol
INTERNET q_ id
q_desc
IN HTTP stands for______ 14
op1 hotlink text transfer protocol
IN Two of the important lynx,minx 15 browsers are_____ and_____ IN ________ are defined as ways protocols 16 of communication amongst networks IN HTML stands for_____ higher text medium 17 language IN The system of interlinked 18 documents is known as_______ IN The small programmes that 19 create animation,multimedia,realtime games and multi user games are called______ IN The information displayed on 20 the web page includes______,_____ and_____ IN The web pages that represent 21 online home of their author are called______ IN _____ is the most popular 22 internet service
hot links
IN _______ is a program or a 23 tool that helps us find a file anywhere on the net IN Yahoo,lycos,excite and 24 webcrawlers are _____ IN GIF is the acronym for 25 ____________
images
a n s hyper text higher type none of B transfer transfer protocol the protocol above netscape,ie mosaic,gopher none of B the above IP address dns none of A the above hyper transfer hyper text none of C markup markup the language language above hyperlink books marks none of B the above applets animation none of B the above op2
op3
op4
graphics,videos,audio
programms,im animation,script none of A ages,text s,executables the above
first page
home page
yahoo service
electronic mail search engines
newsgroup
telnet
ftp
search engines
web directories Graphical interchange Format
database
Graphical interpreter formatting
welcome page
none of B the above none of B the above archive D
channe B l Graphical Graphic B interface format al Interfac e format
INTERNET q_ id
q_desc
IN JPEG is the acronym for 26 ___________
op1 Joint Pictures Expert Group
op2
op3
Jumbled Joint pictures pictures expert expert graph graph
IN 27 IN 28
The World Wide Web consists information of _________ A hyperlink can be on text only ___________
web pages image only
network connections text or image
IN 29 IN 30
Web is a collection of web sites ___________ The two major browsers used MS Internet Explorer and to surf the Internet are Mosaic ________,_______
images
applets
IN The internet is also called as 31 _______________ IN 32 IN 33 IN 34 IN 35 IN 36
IN 37
arpanet
Netscape MS Internet Navigator and Explorer and Mosaic Netscape Navigator the net intranet
op4
a n s A
Joint picture s experi mental group mails B
neither C text nor image docum A ents None C of the above
none of B the above The internet is similar to LAN peer-to-peer wan none of B _________________ connectivity the above The net transfers______ from data parcel packets none of A one place to another the above The net provides interesting scripting,parsing and news,cooking email,file none of C services like______,______ compiling and fine arts retrived,internet the and______ tools above ________ is the ancestors of dnet arpanet ARPANET none of B the internet the above DARPA stands for defensive administrative dedicated and defensive none of C ________________________ rank administration registered advanced the _______________________ network projects research above administration projects administration net DARPA is broken into milnet,smaller arpanet mailnet,inet intranet,extrane none of A ________ and _______ t the
INTERNET q_ id
q_desc
op1
op2
op3
op4
a n s
above IN NSFNET is the united states education,research music and cooking and none of A 38 provides service to _____ dance dining the and_____ above IN HTML stands for Higher text manipulation Hotlink text Hyper transfer Hyper D 39 ________________________ language markup meta language text ______________ language markup Langua ge IN The first international IP united states and UK england,norwa united states & none of B 40 network connections were y Russia the established in 1973 with above _____ and_____ IN A_____ is a set of computers server client network none of C 41 interconnected by the transmission paths to above exchange information in internet IN A computer that provides a client stand-alone servers none of C 42 service usable by other the computers is called______ above IN _____ can be owed by LAN MAN WAN none of C 43 multiple organisation the above IN Data is transmitted in the analog digital non-digital none of B 44 form of_____ signals the above IN Modem stands for Moralize/demoralize Modulation/de Manipulate/dem none of B 45 __________________ modulation anipulate the above IN ______ is the process of the Mapping Modulation Manipulation none of B 46 digital signals being the converted into a form above suitable for analog transmission IN ________ and______ are two Satellite link and digital Dedicated Cable and wires none of B 47 basic ways of getting signals access and dial the connected to the internet up access above IN SLIP stands for Standard long internet Stream line Serial line none of C 48 ________________ protocol internet protocol the protocol above
INTERNET q_ id
q_desc
IN PPP stands for _____ 49
op1
op2
Prime prolonged protocol
op3
Point to point Pillar to pillar protocol protocol
a n s none of B the above op4
MKTQ_CAAT q_i q_desc op1 d CA Identify the need for Absence of input 1 controls and auditing in a documents computerised environment. CA The organisational, Application controls 2 management, maintenance and access controls are categories of …… CA The application controls are Input controls 3 ….
op2 Lack of visible transaction trail General controls
op3
op4
ans
Accessibility of All of D data and computer the programs above Check controls
Processing Both A and B controls
Input B control s Neithe C r A nor B Digit C
CA Identify the field check - "If a List 4 set of values is defined, is the input data one of these defined values?" CA The field check that Format mask 5 conforms if data input for a field is in a particular format. CA The field check on a Range 6 processed data that fails if a field is not initialized to zero or errors occur during calculation is…… CA The validation checks Field checks 7 applied to a field depending on its logical interrelationships with the other fields in the record are called ….. CA A group of records or Physical batches 8 transactions that are contiguous constitute …..
Range
Slab
Data mask
Field mask
Input mask
A
Sign
Overflow
Serial
C
Record checks
Batch checks
File B checks
Logical batches
Block batches
CA …………..is the type of batch Control totals
Serial
Transaction type
Transa A ct batche s Sequen C
INTERNET q_ id 9
CA 10 CA 11
CA 12
CA 13
CA 14
CA 15
q_desc check (group of records) for all input records of a particular type is done. Grand totals calculated for any code on a document in the batch are called….. Control that checks if correct sequence of commands and update parameters are passed from the application software to the database. With respect to data integrity control, when monetary transactions are processed against master files without a match, we should maintain a …. The system test that tests the top-level modules first and then the lower modules are simulated with dummy modules to check the interfaces is called …. Identify the audit technique that examines each transaction as it passes through the system. The Core Image Comparison audit technique compares the….
op1
op2
op3
number
op4 ce check
Financial totals
Record totals
Document totals
Hash D totals
Table level
Data Integrity
Batch check
System B test
Sequence account
Data account
Suspense account Update C accoun t
Bottom up test
Hybrid test Stub test
Top D down test
Embedded code
Program code
Databa A se code
Database Analyzers
Database with master Executable Transaction data table program with master with master transaction copy
CA The technique used by an Modelling 16 auditor to list unused program instructions is….. CA The sample data created Test data 17 and used for the purpose of testing the application
Analyzing
Mapping
Table data
Item data
Modul B e progra ms with snapsh ots Tracing C
Record A data
a n s
INTERNET q_ id
CA 18
CA 19
CA 20
CA 21
CA 22
CA 23
q_desc system is called…. The test data (dummy unit) implemented in the normal processing of the system over a period of time is known as…. The test data generated with correctness proof, data flow analysis and control flow analysis tools is called…. When a real-time system is simulated to generate the same output as the realtime system, the technique is called…. When an auditor expands the extent of substantive tests to determine the impact of defects on the attainment of program objectives, the methodology is…. This is an important control in systems that use digital signatures for authentication purposes. Selecting transactions based on a sampling rate is called …. method.
op1
op2
op3
Integrated Test Facility Black box Graph testing Test Facility
op4
Whiteb A ox testing
Test item block
Test data pack
Test program pack Test B record pack
Parallel trailing
Tracing parallel
Parallel coding
Cross reference lister
Formulate Correct lister flaw hypotheses
Public audit trails
Random Sample audit trails Data audit trails audit trails
Transaction sampling
Systematic Simple sampling sampling
CA The capability of the File size 24 generalized audit software to read different data coding schemes, different record formats and different file structures is…. CA The audit software Sort and merge files 25 capability of frequency analysis is to….
Parallel D simulat ion
Formul B ate correct hypoth eses
A
Demog B raphic sampli ng File C reorga nisatio n
File data
File access
Sampling nth item
Formatting output Classify D data on a criteria
a n s
INTERNET q_ id
q_desc
op1
op2
op3
CA The audit functions of Stratification 26 attributes sampling, variables sampling, stratified sampling are included in …. functions. CA Identify the functional Ex Post Auditing Only 27 limitation of a generalized audit software that enables evidence collection only on the state of an application system after the fact.
Selection
CA The purpose-written audit 28 programs are used for…..
Data retrieval, code comparison
Reading data, selecting and analyzing information
Track
Snapshot
Post audit
System audit
op2
op3
Sorting, creating, and printing files
CA Picture of a transaction as it Program 29 flows through the computer systems is called….. CA Identify the type of audit General audit 30 when auditors are members of the systems development team.
Statistical
op4
a n s
Reporti C ng
Analytical Limited ability to review only determine Propensity for Error
Limite A d ability to Verify Proces sing logic Specifi D c tasks with origina l or modifi ed progra ms Picture C
Concur D rent audit
Q_BC_IN q_i d
q_desc
op1
BC1 The processor uses this Monitor workspace as a scratch pad during processing. BC2 1024 Megabyte is 1 KB equivalent to: BC3 The software used for Application software layout of newsletters and magazines along with text
Processo Keyboard r
Memory
Ex an pr s 1 D BC
1 MB
100 MB
C
BC
Data modelling B
BC
1 GB
Desktop Application publishin development g
op4
INTERNET q_ id
BC4
BC5 BC6
BC7
BC8
BC9
BC1 0
BC1 1 BC1 2
q_desc and images is called…… The model used to describe the relationship between data and information is called A super computer uses a bus width of…… When a processor executes one billion floating-point arithmetic operations per second, is called….. The processor responsible for communication to and from all the remote terminals connected is termed as ……… The processors used for speed-critical graphics applications are…… The plastic cards with embedded microprocessor and memory are called….. VLSI stands for…..
The data width of a Pentium 4 computer is …… The unit which executes addition, subtraction, multiplication and division operations is …… BC1 The instructions to be 3 executed by the processor are loaded from memory into the BC1 The results of a process are 4 stored into ………
op1
op2
System model
Data model
16 bits Nanoflops
Information model
op3
op4
a n s
Logical model A
BC
256 bita 64 bits
8 bits
C
BC
Tetraflop Megaflops s
Gigaflops
D
BC
Front-end processor Host Backend processo processor r
Terminal processor
A
BC
CISC
RISC
CCSIC
B
BC
Credit card
Compute Memory card Smart card r card
D
BC
Very large scale Integration
Very large silicon integration
A
BC
16 bits
Very Value limited limited scale ic silicon integrati on 8 bits 32 bits
1 k bits
C
BC
CPU
ALU
MU
CU
B
BC
Instruction unit
Process register
Program counter
Instruction register
D
BC
Accumulator
General- Process purpose register Register
Instruction register
A
BC
CAD
INTERNET q_ id
q_desc
op1
BC1 The memory that stores DRAM 5 data as a series of memory cells that can be accessed sequentially is…… BC1 The technology used to Processor bus 6 accelerate the processing of a computer is ……… BC1 The memory used in a Cache memory 7 computer's BIOS chip is…….. BC1 The process of swapping Fragmentation 8 information between the RAM and hard disk can cause BC1 The standard system bus Dual independent 9 was replaced by frontside bus and backside bus called……. BC2 The DSP,DAC,ADC,and Graphics card 0 ROM are parts of the …… BC2 The bus whose widths are ISA 1 32 or 64 bits is called…… BC2 The maximum resolution 1024*640 2 of a standard SVGA adapter is …… BC2 …………. synthesis method Amplitude 3 uses recordings of actual instruments. BC2 The instrument that can Printer 4 produce continuous lines is….. BC2 PPM , CPS are units used to Speed 5 measure the printer's ….. BC2 The PCL and postscript are Page definition limit 6 defacto standards for……
BC2 A laser printer has RAM for Font catridges 7 downloading fonts called
op2 SAM
SRAM
op3 ROM
op4 B
a n s BC
Cache BIOS memory ROM memeory B memory
BC
SRAM
Flash memory D
BC
Paging
C
BC
Dynamic Cache memory Dual interface A memory bus bus bus
BC
Memory Sound card card PCI AGP
Media card
C
BC
MCA
B
BC
780*102 1280*1024 4
1280*680
C
BC
Frequenc Pulse y
Wavetable
D
BC
Plotter
Scanner
Pen
B
BC
Quality
Resolution
Lines
A
BC
Page Pixel definition Page definition B descripti languages lines on language s Dynamic Soft fonts Soft settings C catridges
BC
Optical memory
Disk full Thrashing
BC
INTERNET q_ id
q_desc
op1
the……. BC2 The characteristic which Convergence 8 refers to how sharply a pixel appears on the monitor is called….. BC2 The faster the refresh rate, Sharpness 9 the lesser the monitor….. BC3 The number of bits used to Size of image 0 represent a pixel in a monitor decides the …….
op3
op4
a n s
Resolutio Dot-pitch n
Size
A
BC
Resolutio n Colors and shades of gray that can be displayed Touch pad
Size
C
BC
Resolution and Signal and sharpness refresh rate
B
BC
Light scan
D
BC
Optical PhotoOptical A character multiplier tube sensitive tube recogniti on Optomec Optical Joystick B hanical
BC
Trackball
Joystick
Zip disk
BC3 The input device that Touch screen 1 utilizes a light-sensitive detector to select objects on a display screen is called….. BC3 The most commonly used Charge-coupled 2 scanner technology is…. device
BC3 Identify the type of mice 3 that uses optical sensors to detect motion of the ball. BC3 Identify the input device 4 that consists the puck and the stylus. BC3 Identify the disk which has 5 an access time of 30ms. BC3 A set of tracks across a set 6 of platters in a hard disk is called a…… BC3 The bus used to connect a 7 CD-ROM to your computer is….. BC3 The digital audio tape with 8 the capacity of 24GB of data uses the technology called …..
op2
Mechanical
Flickers
Tablet
Light pen
BC
Pen
C
BC
Jaz disk
C
BC
Disk
Floppy Winchester disk disk Cylinder Spiral
Block
B
BC
SCSI
PCI
DAT
A
BC
Hyper circles
Fero Linear velocity Helical scan magnetic
D
BC
MCA
INTERNET q_ id
IBM
Macintos Lomega h
Imation
B
a n s BC
SuperDisk
Jaz disk
Zip disk
Hard disk
A
BC
700 MB
6 GB
630 MB
2GB
B
BC
Super disk
DATROM
CD-ROM
MO drives
C
BC
Winchester disk
Zip disk
Magnetic tape Magnetooptical drive
C
BC
Hard disk
Jaz disk
DAT drives
D
BC
Memory module
Data module
Kernel module I/O module
C
BC
Job management
I/O Batch manage management ment
Data management
A
BC
Disk storage
Memory Virtual storage memory storage
Extended storage
C
BC
Paralleling
Cooperat Dividing ive
Preemptive
D
BC
Multithreading
Multipro Multitasking cessing
Multiprogram A ming
BC
Multi-user
Real-time Multitasking
Multithreading B
BC
q_desc
BC3 The floppy disks that 9 support 400k-1.2 MB belong to…… BC4 The backward compatible 0 disk that has high density120MB is called…. BC4 The maximum capacity of 1 an optical disk is …… BC4 Which of the auxiliary 2 storage devices uses the constant angular velocity access technology? BC4 The……..is an auxiliary 3 sequential access nonvolatile storage device. BC4 The portable device that 4 optimizes the features of the floppy and the CDROM is…. BC4 The important central 5 module of an operating system is the….. BC4 Identify the function of the 6 operating system that manages the tasks waiting to be processed. BC4 This function of the OS 7 manages allocation of a minimum main memory to tasks. BC4 Identify the multitasking 8 type that slices CPU time to each program. BC4 The OS which allows 9 different parts of a single program to run concurrently is….. BC5 The OS that monitors 0 external activities with timing constraints is….
op1
op2
op3
op4
MO drives
INTERNET q_ id
q_desc
op1
BC5 The 32bit operating system Win 2000 server 1 for desktop version that replaces Win 9x is….. BC5 The high-level logical disk Frame allocation 2 structure which defines table the way the entire disk is organised is ….. BC5 A collection of sectors on a Block sector 3 hard disk is a BC5 The FAT system that FAT16 4 provides long filename support and was written using protected-mode code . BC5 Identify the file system FAT16 5 that provides networking,security,compr ession, large file support…. BC5 The logical directory Root directory 6 structure has a base of the tree called the…… BC5 The process used to Formatting 7 optimize the disk space by arranging files contiguously is ….. BC5 Choose the level of RAID Level 0 8 that offers disk mirroring for fault tolerance. BC5 Identify the archive Zip, LZH, ARJ 9 formats found on Unixbased Internet sites. BC6 Identify the window screen Title bar 0 part that indicates the name of the window, application or document. BC6 The button on the title bar Scroll box 1 of a window that displays the menu to control the size of the window is….. BC6 The mouse operation that Click 2 is used to move windows
op2
op3
op4
Win 2000 C advanced server Format File allocation D allocation type table
a n s BC
Win 2000 datacent er File allotted table
Win 2000 professional
Cluster
Block
Table
B
BC
VFAT
NTFS
FAT32
B
BC
VFAT
NTFS
FAT32
C
BC
Main Start directory Tree directory A directory
BC
Defragm Allocation entation
Partition
B
BC
Level 2
Level 1
Level 3
C
BC
Exe, zp, tz
Doc, xls, wzp
Tar, gz, taz
D
BC
Menu bar
Vertical bar
Control bar
A
BC
Control box
Minimize box Maximize box B
BC
Double click
Dragging
BC
Scrolling
C
BC
INTERNET q_ id
q_desc
and icons to different locations is ….. BC6 The start button,tray and 3 shortcuts are important features of the ……. BC6 The start menu option that 4 keeps track of your important websites is ….. BC6 If you want the recycle bin 5 capacity to be distributed across partitions, you must use the option …… BC6 The feature to retrieve 6 deleted files from the recycle bin is ….. BC6 The feature which enables 7 to synchronize files between a floppy and disk is ….. BC6 A file with the pdf 8 extension can be viewed with the application….. BC6 The remote administration 9 access to view shared resources on the network is….. BC7 The utility used to access 0 the directory structure, create files and folders etc is…. BC7 The font, color, 1 background settings are saved in the ….. BC7 The Notepad utility saves 2 files in the …… format. BC7 Identify the windows 3 feature that allows more than one person to use a single PC with his own desktop.
op1
op2
op3
op4
a n s
Control panel
Title bar Task bar
Command menu
C
BC
Documents
Programs Accessories
Favorites
D
BC
Configure drives independently
Configur e capacity independ ently De-link
Configure Confirm drive partition partitions capacity independently
A
BC
Restore
Re-copy
C
BC
Re-paste
My Documents
My My Folder Briefcase
My Directory
B
BC
Adobe Acrobat Reader
Adobe Viewer
Notepad
Wordpad
A
BC
Net Drive
Net Watcher
D
BC
Net Neighbourhood Net Tracer
Windows Tools
Windows Windows Explorer Accessories
Internet Explorer
B
BC
Control panel
Desktop icons C
BC
Binary
My Desktop compute themes r Unicode Hybrid
ASCII
D
BC
Log off
Run
Restart
A
BC
Find
INTERNET q_ id
q_desc
BC7 You can quickly access the 4 recently worked on files from this start menu option. IN1 The Internet is a network similar to ….. IN2 When a computer is connected to the internet through a LAN IN3 PPP stands for:
IN4 SLIP stands for:
IN5 When a user connects to Internet with a shell account it is called ……. IN6 The launch of DARPA's Internet Protocol (IP) facilitated the term….. IN7 The costs of Internet implementation are…..
IN8
IN9
IN1 0 IN1 1 IN1 2
op1
op2
op3
op4 C
a n s BC
Favorites
Accessori Documents es
Settings
Peer-to-Peer connectivity Dial-up access
Point-toPoint link Dedicate d access
Port-to-Port connection Deployed access
Peer-to-Peer A talking Service access B
IN
Pin to Pin communicatio n Serial Line Internet Protocol
Port to Port Protocol
B
IN
Setting Link C Inter Protocol
IN
Indirect access Dial-up access D
IN
Protocol to Protocol Point to Points Point Protocol Serial Limited Serial Internet Protocol Lock InterProtocol Direct access Dedicate d access Network
Connection cost, cost of telephone line
Consorti Internet um
Compute r cost, network card cost This software enables a Terminal embedded Terminal host to work as a terminal emulator on the network. The Windows Internet Sockets Package application functions were developed based on the UNIX programs called….. Each computer on the 24-bit address 16-bit Internet is identified with address a…. A mail server robot can Check mails Read automatically…. mails This protocol is used to Transmit Transmis check reliability, Communication sion
Topography
IN
C
IN
IC board cost, Connection A cable cost company cost, connection data cost Indirect Terminal B software communicator
IN
Protocol
A
IN
30-bit address 32-bit address D
IN
Respond to Delete mails C mails Telnet Control Communicatio B Port n Control
IN
Simulators
IN
IN
INTERNET q_ id
IN1 3
IN1 4
IN1 5
IN1 6 IN1 7 IN1 8 IN1 9
q_desc sequencing and flow control. To check that data reaches the destination in a proper order, the data packets are assigned…. The computer which provides FTP, WWW, Mail services on a network is called…. The method of accessing files through publicly accessible server that gives free access to the files is called …… This file is transferred verbatim with FTP service. We can access the Archie server by…… The types of Archie servers are ….. % telnet archie.ans.net is the command used by the Archie client to….
IN2 This tool helps us to locate 0 a file anywhere on the Internet. IN2 The computer that maps 1 the Internet domain name to the Internet numeric address is the ….. IN2 ………….is the format of 2 Internet Address. IN2 The email address has two 3 parts one is the username while the other is the …. IN2 The resources on the 4 World Wide Web are linked with the naming
op1 Protocol
op2
op3
op4
a n s
Control Protocol Packet Sequence numbers numbers
Protocol Data numbers C
IN
Client
Server
Host
PC
B
IN
Public FTP
Server FTP
Available FTP
Anonymous FTP
D
IN
ASCII file
BIT file
Binary File
TEXT file
C
IN
Tunnel
WWW
Telnet
Message
C
IN
Straight Archie
Windows Archie Program the Archie Server Remote
Both A and B
IN
Request the Archie server
Neither A nor C B Protocol the A Archie server
Archie
Archives
C
IN
Network translator Address Domain name Domain C server Naming server relation server server
IN
Aaa-bbb-ccc-ddd
IN
Order numbers
Login to Archie server
FTP
Domain
Aaa.bbb. Aaa/bbb/ccc/d Aaa*bbb*ccc* B ccc.ddd dd ddd Net Web Mail A
Universal Resource Universal Uniform Location Resource Resource Locator Locator
Uniform C Reserved Link
IN
IN
IN
INTERNET q_ id
q_desc
format ….. IN2 This Net tool provides a 5 stimulating on-line discussion environment. IN2 6 IN2 7 IN2 8
The IRC II client program command begins with a …. The IRC conversations are organized into…. Identify the output of the IRC command " /list -min 10" .
IN2 Lynx text browser is a web 9 client in which users can login with ….. IN3 A web browser provides 0 this hotlist for a user. IN3 The tool to obtain 1 information on the web by menus and more flexible than Archie is…. IN3 These servers help in 2 searching for words from a list of databases or documents. IN3 This scripting language is 3 an object based language and is developed by Netscape. IN3 The one-way broadcast of 4 live events is called…. IN3 This is a system of 5 thousands of distributed bulletin boards and read by a newsreader. IN3 Unix shell provides mailing 6 programs called ….
op1
op2
op3
op4
a n s
Internet Relay Chat Relay Chat packet messaging transmiss ion Percent Slash Line
Information chatting
A
IN
Dot
B
IN
Chats
Packets
Lines
Channels
D
IN
Display channels with at least four users
Display chats with the maximu m 10 users Terminal ping
Display channels with at least ten users
Display line with 10 removed channels
C
IN
Shell accounts Shell programs C
IN
Self accounts
Book-keeping
Bookmarks
D
IN
Lynx
Bookmar Menu king Juggler Gopher
Gateway
C
IN
WINWAIS and WAISMAN
WIIS and WINNET and NETWAIS WAISLINK
WINSRC and FTPWAIS
A
IN
SGMLScript
VbScript SunScript
JavaScript
D
IN
Netcast
Cybercas Eventcast t Newsgro Newsletter up
Livemessaging B
IN
Networkboard B
IN
Pile and Pine and Elem Embedd
Port and Elm
IN
Bulletinreader
Pine and Elm
A
INTERNET q_ id
q_desc
op1
op2
op3
op4
IN3 The Unix to Unix copy mail 7 system separates parts of the mail address with the symbol...….. IN3 The Netlauncher (TCP/IP) 8 software consists of these programs that can run under Windows. IN3 The parts of the WSIRC 9 server (net tool) window are…..
@
!
#
()
Spy Mosaic
Image View
Both A and B
Neither A nor C B
IN
Server message, command line and channels
Server message,com mand line and channels
Server C message,com mand line and channels
IN
IN4 These are small java 0 programs that create games, multimedia etc. These are downloaded over the Net and executed by a web browser. IN4 The World Wide Web is a 1 collection of….. IN4 It is a link which helps in 2 retrieving information from the WWW easily. IN4 …………..directories deliver 3 information on all the topics on the Internet. IN4 This browser does not 4 display links in color. IN4 The Mosaic browser stores 5 information about the configuration in a/an …. IN4 This is an indexer that 6 crawls around the web cataloging. IN4 The option by which the 7 browser window in Navigator Gold 2.0 can be shifted to editor window is ….
Java scripts
Server message, comman d line and channels Java exe
Java applets
Java objects
C
IN
Net addresses Web pages
D
IN
Netlink
Net pages Sitelink
Hyperlink
Hypernet
C
IN
Web maps
Net ports Wide maps
Web infos
A
IN
Netshark
Cello
Lynx
Mosaic
B
IN
Ini file
Exe file
Web file
Txt file
A
IN
Webcrawler
Web sites
Web creators Web ports
A
IN
Edit/New file
Edit/Save New/Edit page New/Edit Window Document
D
IN
Web windows
B
a n s IN
INTERNET q_ id
q_desc
IN4 This toolbar button 8 displays information about web creation. IN4 This window in Navigator 9 Gold does not support frame display. IN5 The different ways of 0 communication on the Web are….. IN5 This download tool 1 provides multi-server connection, can search for mirror sites and provides a file leecher. IN5 The…………button provides 2 HTML tags for font style, alignments, and colour options. IN5 Identify the search engine 3 that helps in concept based searching. IN5 This is a text only browser. 4 IN5 The multithreading feature 5 of Netscape is facilitated with a storage space named….. IN5 The distributed uploading 6 of web pages through Navigator Gold is called….. IN5 The method of presenting 7 information on the web through highlighted items is called…… IN5 The a2z directory is an 8 alphabetical list of pages used by the search engine….. IN5 Netscape browser can 9 display context links on an image called…..
op1 Printer
Script window
op2
op3
op4
Web Pager Document B page starter Browser Editor window Form window C window
Interpersonal
Group
Download Accelerator Plus
Both A and B
a n s IN
IN
Neither A nor C B
IN
Fresh WinZip Plus Downloa d
Webcow
A
IN
Edit Format
Characte File Format r Format
Window Format
B
IN
Lycos
Yahoo
Excite
Infoseek
C
IN
Lycos
Lynx
Links
Netshark
B
IN
Archive
Cache
Thread
Retriever
B
IN
Web loading
Web Web publish updation
Page publish
C
IN
Hypertext
Webtext Nettext
Hyperlimit
A
IN
Netleecher
Webinde Lynx xer
Lycos
D
IN
Image webs
Image maps
B
IN
Image graphs Image texts
INTERNET q_ id
q_desc
IN6 Name the download tool 0 which highlights an area of a page and gets all the links that are within the highlighted area. IN6 ………...helps in business 1 transactions, generating revenue and demand on the information highway. IN6 The transfer of structured 2 data for processing from computer to computer using agreed formats and protocols is called….. IN6 This system involves 3 electronic transfer of funds between financial institutions. IN6 A …… electronic mailbox 4 stores EDI transactions for later retrieval. IN6 5
IN6 6 IN6 7 IN6 8 IN6 9 IN7 0
op1
op2
op3
op4
Webcrawler
Webcow Weblinker
Webcaster
E-commerce
EBoth A and B Marketpl ace
Neither A nor C B
Electronic Document Intercahnge
Electroni Electronic Data Efficient Data c Data Internetworkin Interchange Interchan g ge
Electronic Financial Efficient Electronic Transmission Format Format Transacti Transfer ons Value Added Very Value Aided Networks Advance Networks d Networks The mutual satisfaction of Negotiation and Networki Negotiation price, terms and Bargaining ng and and servicing conditions, delivery and Buying evaluation criteria in a marketplace is…. The type of advertising, the Passive Push Portal Broadcast and Junk Mail models are of….. Identify the models of Billboard Portal Both A and B passive advertising. This layer is responsible for Network Layer Data Link Presentation transmitting data as Layer Layer frames. This layer is responsible for Link Layer Network Presentation encoding of data. Layer Layer This layer of the TCP/IP Application Layer Link Transport suite includes the device Layer Layer driver and network interface card.
B
a n s IN
IN
B
IN
Electronic D Fund Transfer
IN
Value Enhanced Networks
A
IN
Critical buying A
IN
Smart
B
IN
Neither A nor C B Transport B Layer
IN
Physical Layer C
IN
Network Layer B
IN
IN
INTERNET q_ id
q_desc
op1
op2
IN7 This protocol is used for Simple Mail Transfer Internet Internet 1 flow control, echo and flow Protocol Control Control Data redirection. Message Protocol Protocol IN7 The software components Device drivers Device Device 2 that integrates different modules programs hardware devices with the operating system….. IN7 This is the basic Cable Interface Card Netlink Device 3 component that connects Interface Interface Card the computer to the Card network. IN7 The dumb terminal/node Personal computer Client Server 4 in a network depends on compute computer this computer for their r basic functioning. IN7 This has an embedded Data card Security Combi card 5 microchip which can both card manipulate data and execute applications. IN7 To ensure a reliable Session Socket Layer Secure Electronic 6 communication between Protocol Sockets Socket Layer the buyer and seller, the Layer Protocol protocol used is…. Protocol AC1 The financial transactions Collected and Sampled Grouped and are to be …………. leading computed and summarized to different steps in stratified Accounts Compilation. AC2 The basic document where Ledger Journal Voucher transactions are entered chronologically is…. AC3 These are the basis for Journal and Ledger P & L P & L Account analysis by potential Account and Balance investors, banks etc. and Sheet Journal AC4 The accounts that the Liability Income Sales business owns is called …. AC5 The expenditure for Expense Example Taxes running the business for a period is ….. AC6 Identify the account type Real accounts Personal Nominal
op3
op4
Single Control B Message Protocol Software devices
a n s IN
A
IN
Network D Interface Card
IN
Data computer C
IN
Meta card
C
IN
Cyber Socket B Layer Protocol
IN
Assets and liability
C
Trial Balance
B
Voucher C Account and Balance Sheet Asset
D
Income
A
Expense
B
INTERNET q_ id
AC7
AC8
AC9
AC1 0 AC1 1
AC1 2 AC1 3 AC1 4 AC1 5 AC1 6 AC1 7
AC1 8
q_desc
op1
by the rule: "Debit the receiver and credit the giver". The first document where Ledger the transaction is entered is called a ….. The document used for Voucher and journal posting of accounting transactions is …….... When the debit total is Income greater than credit total, the amount appears in the …….. column. The methods LIFO, FIFO, Value closing stock Moving Average are used to …. The report prepared taking P & L statement the asset and liability type accounts from the Trial Balance is called…. The report that depicts Trial balance operating profit/loss for a period is ….. The day book contains Income or transactions relating to expenditure ……… The Bills Receivable details Journal sheet are maintained in a …….. Creditors ledger has details Customers of your dues to …….. The sundry debtors are Income side placed in the Balance sheet on the …… The first step in Tally File before any transaction is entered or saved is creating a ……… To configure country F10 specific details use the function key……
op2
op3
accounts accounts
accounts
Liability
Voucher
Expense
Ledger and trial balance Debit
Balance sheet Journal and and trial ledger balance Credit Expense
op4
C
D
B
Value Value expense Value income A clearing stock stock stock Income Balance sheet Asset sheet C statemen t Trading P & L account statement
Suspense accounts
C
Sales or Asset or purchase liability
Profit or loss
B
Voucher Sundry debtors debtors Assets Liabilities
Original entry C Suppliers
D
Assets side
Payable side
B
Company Project
Application
B
F2
F11
C
Expense side
F12
a n s
INTERNET q_ id AC1 9 AC2 0 AC2 1 AC2 2
AC2 3 AC2 4
AC2 5 AC2 6 AC2 7
AC2 8 AC2 9 AC3 0
AC3 1
q_desc Identify the security mechanism used in Tally. After selecting a company in Tally, you will be in the…… Tally software is based on ……… accounting system. Identify the primary group of capital nature that uses bank account and cash in hand as sub groups. All financial entries in Tally are done using……. The Direct expenses, Purchase account, Direct income are primary groups of ….. The option to delete a subgroup is admissible through the menu…… The behavioural attributes of this group cannot be changed. Credit limits for personal accounts and branches can be done in the ledger mode…… We are not allowed to delete a ledger from this mode. All account heads except Cash and Bank are placed in the…… Identify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank OCC Account. The primary document for recording all financial
op1 Tally Secure
op2
op3
op4
Tally Tally Group Pack Gateway Entry of Tally of Tally
Tally Vault
Producti Mercantile on Current Loan assets assets
Manufacture
Vouchers
Groups
Ledgers
Capital nature
Expense Revenue nature nature
Income nature C
Alter
Delete
Display
Shift
Sub-group
Ledgergroup
Primary-group Alter-group
Single
Multiple Sub-group
Alter-group
B
Single
Subgroup
Alter-group
Multiple
D
Sub Ledger master
Group Ledger master Income
General Journal Ledger C Ledger master master Assets
Loans
D
Trial sheet
Voucher
File
C
Accounts of Tally
Sales Fixed assets
Expenses
Journal
Journal
D
Groups of Tally B
C
Capital assets B
D
A
C
a n s
INTERNET q_ id
AC3 2 AC3 3
AC3 4 AC3 5
AC3 6 AC3 7
q_desc transactions in Tally is the…… You can customize the voucher entry screen using the function key……. Identify the voucher type that records fund transfers between cash and bank accounts. This voucher type records adjustments between ledgers. The use of classes for payment, receipt and contra vouchers enables data input in …… The details of a voucher entry can be given in the ……. The credit note voucher can hold account types: ……..
AC3 The suffix and prefix 8 details for the voucher type can be made applicable only from the ……. AC3 The voucher used to 9 record all bank and cash payments is ….. AC4 Tally's age-wise analysis 0 considers the voucher's …… AC4 Arrange the steps in 1 generating the books of accounts.1. Create Trial balance2. Create new ledgers3. Generate Day Books4. Update journals for financial transactions
op1
op2
F13
F12
Credit Note
Sales
op4
F11
B
Payment Receipt
Contra
D
Receipt
Journals
D
Double entry mode List entry Choice entry mode mode
File entry mode
B
Comment
File
Narration
D
Sales account, Sales Ledger tax account account, Bank account End of a month First of a year
Suppliers account, Purchases account First of a month
Buyer's A account, Cash account End of a month
C
Credit Note
Contra
Sales Note
Payment
D
Previous date
Effective Current year date
Configured date
B
1, 2, 3, 4
1, 3, 4, 2 2, 4, 3, 1
3, 4, 2, 1
C
Memo
F10
op3
Payment
a n s
INTERNET q_ id
q_desc
AC4 For day-to-day 2 transactions the voucher types used are AC4 Say for example a payment 3 is made to a creditor ABC Rs.10000 by cash, it can be entered into the voucher type….. AC4 Identify the purchase 4 voucher type, the transaction for purchase of 10 CPUs,10 monitors by credit. AC4 Identify the voucher type 5 to be chosen for the sale of computers to Anand by cash @ Rs.210000 per unit. AC4 A bank overdraft repaid by 6 cheque at Rs.25000 can be made in the voucher….. AC4 The financial statement 7 that consolidates ledger balances is ….. AC4 8
AC4 9
AC5 0 AC5 1 AC5 2 AC5
op1
op2
op3
op4
Credit purchase
Cash Both A and B purchase
Contra purchase
C
Loan
Payment Receipt
Sales
B
Credit Purchases
Cash Expense Purchase Purchases s
Debit Purchases
A
Cash Ledger
Sale Sheet
Stock Journal
Purchase Voucher
C
Payment
Receipt
Debit
Contra
D
Journal
C
Expense reports
B
Net Account
C
Day book
D
Transaction analysis
A
Loans
B
Balance sheet
Profit & Trial balance Loss statemen t The F9 function key in the Accounting reports Inventory P & L reports left side of the Gateway of reports Tally screen displays the…… The option on the Gateway Net Loss Net Net Profit of Tally that will generate Income the P&L account statement is….. This displays the balance Record book Ledger Journal book daywise for a selected book voucher type. The feature in Tally to Ratio analysis Account Data analysis analyze accounts of a analysis company is….. The age-wise statement is Income Payables Expenses displayed based on…… The ratio analysis of Bill date Effective Voucher date
Previous date A
a n s
INTERNET q_ id 3 AC5 4
AC5 5
AC5 6
AC5 7
AC5 8
q_desc receivables can be done based on…… Name the statement that helps the management in the decision making process. Identify the budget type which is chosen where transaction amounts are to be monitored. Choose the budget type to be used where bank accounts balances are to be monitored. The management that needs to consolidate the accounts of its various enterprises uses ……. in Tally. Identify the user who can access audit trails in Tally.
AC5 Identify the accounting 9 feature in tally that facilitates splitting financial years for a company data. AC6 The tracking of changes in 0 vouchers and ledger masters is done by….. AC6 Tally can import data from 1 other programs and creates a log about the activity in the file….. AC6 Import and export of data 2 between Tally and other programs is possible with the help of….. AC6 The manual option of 3 voucher numbering leads to….. AC6 The Tally audit trail tracks
op1
op2
op3
op4
date Data flow
Funds flow
Stock flow
Cheque flow
B
On closing balance
On net credit flow
On net transactions
On net cash flow
C
On closing balance
On net credit flow
On net transactions
On net cash flow
A
Consolidate company
Group Set company company
Alter company B
Owner
Data Entry operator Yearlyentry accounti ng Tally Audit
Accountant
Administrator D
Period-less accounting
Transactionnumber accounting
C
Tally Report
Tally Group
B
Month-less accounting
Tally Vault
Tally.imp
Tally.cfg Tally.exp
Tally.ole
A
OLE
DBMS
MS-XLS
C
Auto numbers
Duplicate Sequence number number
Range number B
more than 30 Days
less than more than a
more than a
ODBC
A
a n s
INTERNET q_ id
q_desc
op1
4
changes made to vouchers old that are ….. AC6 The ratio analysis of Bills F5 5 Receivables or Bills Payables can be displayed with the function key…..
30 Days old F8
op2
op3
op4
day old
week old
F12
F6
a n s
D
q_desc q_id
q_desc
AC1 Bbasic documents used in the Financial Accounting System where transactions are entered first is __________ AC10 _________ are the major advantages of accounting software over manual accounting. AC11 As per any accounting software, there are only ________ types of ledger accounts. AC12 All __________ ledger balances are taken to Profit & Loss Account. AC13 difference between income and expenses is also taken to ______ report. AC14 ________ is the end point in accounting a mirror showing true and fair position of a concern. AC15 __________ is that data which is not expected to change frequently, which remain relatively permanent.
Voucher
Journal
Ledger
All
a n s A
Arithmetical accuracy
Time saving
Multiple reports on timely basis
All
D
debit balance
credit balances
Both A and B None
C
income and expense
Asset
Liability
A
Balance sheet
Profit & Loss Account Ratio Analysis None
A
Profit & Loss Account
bank book
Balance sheet
C
Master data
Transaction data
Relative data All
op1
op2
op3
op4
All
None
A
INTERNET
AC16 Voucher Type is _______ Master type of data. AC17 By default there are 24 _______ voucher types in Tally.ERP 9. AC18 CRM stand for _______ Cash Relation Management
Transaction
Relative
All
a n s A
28
32
22
A
Customer Relation Management
C
AC19 Tally.ERP 9 is a Multilanguage software offering a choice of __________ languages. AC2 __________ report gives the consolidated list of various Accounts and their balances. AC20 The name of the auto backup file shall be __________. AC21 In Tally, _________ is a system of encrypting data. AC22 default, security levels exist in tally.ERP9 _______ AC23 Language use for Tally Programming __________ AC24 TDL stand for ______
15
24
Customer None Relationship Management 40 60
Trial Balance
Profit & Loss Report
Balance Sheet
None
A
TBK.900
ABK.900
TallyBackup.9 None 00
B
Security Control Set Password
Tally Vault
All
C
Data Entry
Tally.Net User
Tally.Net Auditor
All
D
C
C++
TDL
None
C
Tally Define Language
Tally Detection Language
None
C
AC25 ______ Key Board shortcut use to select Purchase Voucher AC26 ______ Key Board shortcut use to select Contra Voucher AC27 In Tally.ERP 9, we can create ___________ Vouchers for
Alt +f9
Ctrl + F9
Tally Definition Language F9
None
C
F4
F5
F6
F9
A
Receipt
Payment
Contra
Journal
D
q_ id
q_desc
op1
op2
op3
op4
A
INTERNET q_ id
AC28
AC29
AC3
AC30
q_desc
op1
adjustments with respect to debit and credit amounts without involving the cash or bank accounts. ______ Key Board F5 shortcut use to select Stock Journal Voucher To view the Trial Balance Gateway of Tally _______ is path. > Display > Trial Balance. Balance Sheet shows the Trial Balance financial status of the business as at a particular date. To view Stock Summary Gateway of ______ is path Tally>Display > Stock Summary
AC31 Tally.ERP 9 facilitates generation of ___________ reports for Outstandings. AC32 ___________ is analytical reports in Tally.ERP 9 AC33 Tally.ERP 9 facilitates generation of __________, which displays the sources of the Funds and their applications. AC34 __________ is an indicator of the operating performance of a business. AC35 In Tally.ERP 9, we can view ___________ Report which provides infor-mation on the
op2
op3
op4
a n s
F7
ALT+F7
None
C
Gateway of Tally > day book > Trial Balance. Profit & Loss Report
Gateway of Tally > Trial Balance. Balance Sheet
None
A
None
C
Gateway of Tally > Stock Summary
Gateway of Tally >Vouchers> Stock Summary Ageing Analysis
None
B
None
C
Ratio Analysis None
C
Outstanding Report
Ratio Analysis
Balance sheet
Profit & loss
Cash Flow Statement
Fund Flow Statement Daily Cash Flow Statement
Balance sheet
Variance Analysis
None
B
Profit & loss
Ratio Analysis None
C
Ratio Analysis
Budget Analysis
A
None
INTERNET q_ id
AC36 AC37
AC38
AC39
AC4
AC40
AC41 AC42 AC43 AC44
AC45
q_desc difference between the actual vs the budgeted figures. Default Ledgr exist in tally _______ For filing of income tax return of a practicing chartered accountant, the appropriate return form is __________ . To file Incometax return online, site is _____________ ITR-1 Filled by person having income from __________ The Trial Balance has ____ number of columns. _________ ITR form filled by person if Income from Proprietary Business/Profession ITR-5 Filled by __________ ______ ITR will not be available for e-Filing Return Form can be used by a person being a BOI To register for the first time on Income Tax Return site, does not required information like _______ Services offered by efiling website _______
AC46 Digital signatures are commonly used for ______________.
op1
Profit & Loss Account ITR-I
op2
op3
op4
a n s
Purchase
Sales
None
A
ITR-II
ITR-III
ITR-IV
D
www.incometaxi www.taxreturnIndia.c www.Income None ndia.gov.in, o.in tax.co.in
A
Income from Salary/Pension
Income/Loss from Other Sources
A
2
3
Income/Loss None from House Property 4 6
ITR-I
ITR-II
ITR-III
ITR-IV
D
AOP
Companies
Trusts
None
A
ITR-4
ITR-5
ITR-6
ITR-7
D
ITR-2
ITR-3
ITR-4
ITR-5
D
PAN
NAME
BIRTH PLACE MAIL ID
Check CPC Refund Status financial transactions ON-Line Income Tax Return
B
C
View Form 26AS Check ITR-V status
All
D
software distribution
All
D
INTERNET q_ id
Physical
Logical
Mathmatical All
a n s C
physical
Logical
Mathmatical All
A
Department of Electronics
Director of Digital Signature
licensed Certifying Authority
Both A & B
C
LIFO
FIFO
Weighted Average
All
D
Chartered Accountant
Contact Authority
Certifying Authority
None
C
Rule Authority
Registration Authority Regulation Authority
None
B
TCS
NIC
e-Mudhra
All
D
Companies
Tax Payers audited u/s 44AB
Both A and B None
C
AOP
BOI
A
MS-Excel 2010
Power Point C 2010
XLS
None
q_desc
AC47 Technically, a digital signature is a________________ scheme for demonstrating the authenticity of a digital message or document. AC48 Digital Signature Certificates (DSC) are the digital equivalent (that is electronic format) of __________ certificates. AC49 digital signature issues by the ___________licensed Certifying Authority (CA) AC5 In Accounting system, the closing stock can be valued by any method __________. AC50 CA stand for(in reference of digital signature) _______ AC51 RA stand for(in reference of digital signature) _______ AC52 Digital Signature issue by the ______ AC53 Digital Signature is mandatory for __________ as per Income Tax Act 1961 AC54 ITR-V Filled by _____
op1
op2
e-File without Individual Digital Signature MS-Word 6.0 MS-Excel 6.0
AC55 Download the Income Tax Return (ITR) form in __________ software AC56 In which format Income XBRL Tax Return(ITR) file upload return on the web site ______
XML
op3
op4
B
INTERNET q_ id
q_desc
op1
op2
AC57 ITR-V should be send to 30 Central Processing Centre within ___________ days of uploading the return. AC58 There is no need of Director sending ITR-V acknowledgement to CPC, Bengaluru as the return is signed by the _________. AC59 TAN stand for ____ Transaction Account Number AC6 Accounts Receivable, Bills Receivable also known as ___________ AC60 Service tax e-filing is www.aces.gov.in taken care by _________ AC61 ACES stands for Automation of __________. Central Excise and Service Tax
60
AC62 www.mca.gov.in, Site is Income Tax use for ___________ of return filling AC63 In company law filling, XML necessary documents as attachments in ________ AC64 VFO stand for (In Verification reference of return Front Office filling) _____ AC65 SRN stand for ________ Service Request Number AC66 Form 23AC to be filed by Balance-Sheet all Companies for ________ AC67 Form 66 to be filed by Balance-Sheet Companies having paid up capital of Rs.10 lakh to Rs. 5 crore for
op3 90
Chartered Accountant Third Party
op4 120
Digital Signature
a n s D
D
Tax Deduction Account Number Bills Payable
Tax Authority None Number Bills Remain None
B
www.incometaxindia. gov.in, Automatic of Central Excise and Service Tax
A
Excise
www.Service None tax.gov.in Autofilling of None Central Excise and Service Tax Service Tax None
XBRL
PDF
DOC
C
Virtual Front Office
Value Front Office
None
B
Sequential Request Number Profit & Loss Account Compliance Certificate
None
A
Annual Return
A
Profit & Loss Account Compliance Certificate
Annual Return
C
Serial Request Number
A
A
D
INTERNET q_ id
q_desc
__________ AC68 Form 23ACA to be filed by all Companies for __________ AC69 XML stand for _________ AC7
AC70
AC71
AC8 AC9
BC1
BC10
BC11
BC12
op1
Balance-Sheet
Xtensible Markup Language _____________ gives the Bills Receivable details of the dues from the Customers. XBRL tags are defined Tag and organized using categorization schemes called ________. _______ Form for filing 23AC-XBRL XBRL document in respect of balance sheet and other documents with the Registrar _________ gives details Bills Receivable of your dues to suppliers. In Accounting system, bank book When we maintain a bank account, we prepare ________ After processing is done Meaningful on the raw data, data becomes___________. The computing needs of Mini computers engineers, architects and other professionals who need detailed graphics display is met by _____________. ______________process RISC ors are useful in specialpurpose applications such as graphics wherein speed in critical. Smart cards that we Microprocessor popularly use nowadays, & Memory chips
op2
op3
Profit & Loss Account Compliance Certificate Extensible Markup Language
op4
Annual Return
a n s B
B
Bills Payable
Extensible None Mark Language Bills Remain None
Dictionery
taxonomies
None
C
23ACA-XBRL
23ACB-XBRL None
A
Bills Payable
Bills Remain None
B
Pass book
Both A and B None
A
Useful
Both A & B
C
Micro computers
Workstations Super computers
C
CISC
Intel
None of the above
A
Memory chips & RAM ROM & RAM Hard Disk & RAM
A
None of the above
A
INTERNET q_ id
BC13 BC14
BC15
BC16
BC17
BC18
BC19
BC2
q_desc
op1
incorporate_________ and ____________. Integrated circuits are Chips also called ___________. In the fourth generation Networks of computers, the ________________conc ept encouraged programmers to reuse code by maintaining libraries of code segments. Handheld PCs, iPad, First Biomatrix Devices,Generation Future Processing, AI and Ultra book are features of __________generation of computers. Performing comparisons, CU sorting,combining data etc are the fuctions of which part of the CPU? The control unit uses the Instruction instruction contained in Register(IR) the ___________ to decide which circuits need to be activated. The answers from many ALU operations are stored temporarily in the __________before being put out to RAM. When we load software Main Memory from a fl oppy disk, hard disk or CD-ROM, it is stored in the__________. The key to the Memory computer’s versatility
op2
op3
Semiconductors
Both A & B
Object Oriented Programming
High-Level Languages
Second
op4
a n s
None of the above VLSI
C
Fifth
Third
C
ALU
IR
ACC
B
Accumulator(ACC)
RAM
None of the above
A
IR
ACC
CU
C
Hard disk
IR
ALU
A
CPU
I/O
All of the above
A
B
INTERNET q_ id
q_desc
op4
Serial Access Memory Sequentially accessed Memory SAM works very well for Memory buffers Reading a CD Writing to an ___________. USB drive Data in the SAM RAM ROM __________memory can be accessed in any order. ___________is the use Virtual Memory Flash memory Cache of a faster but smaller Memory memory type to accelerate a slower but larger memory type. _________is used for ROM Hard Disk SAM storing special sets of instructions which the computer needs when it starts up. Compact Flash, BIOS Cache Flash RAM chip, Smart Media etc. are examples of___________memory. The area of the hard disk Virtual Swap Page that stores the RAM image is called a_______file. Input devices other than Secondary Alternate devices Backup the keyboard are devices devices sometimes called____________. Microsoft’s natural Ergonomic Multimedia Standard keyboard is an example of an _________keyboard. The _________mouse is Optical Mechanical T17 also useful for graphics programs that allows to draw pictures by using the mouse like a pen, pencil or paintbrush.
None of the above
B
BC21
All of the above Hard Disk
A
BC22
BC23
RAM
C
BC24
RAM
A
BC25
ROM
B
BC26
None of the above
C
BC27
All of the above
B
BC28
Internet
A
BC29
Wireless
C
Simple Area Memory
op2
a n s
op3
is_________. BC20 SAM stands for,
op1
B
INTERNET q_ id
1 GB
1 TB
a n s B
Optomechanical Optical
Wireless
Mechanical
B
CAM
Tracing drawings
CAD
All of the above
B
Optical
Text
Sheet Fed
Flat Bed
A
Bar Code Reader Optical Mark Reader
Optical Character Recognition
None of the above
B
Drum
Hand held
Sheet Fed
Flat Bed
A
Hand held
Sheet Fed
Flat Bed
Drum
B
OCR
OMR
MICR
BCR
C
MICR
BCR
OCR
OMR
C
Face
Iris
Hand
Voice
B
Biometrics
Scanning
Punching
None of the
A
q_desc
BC3 Approximately One million bytes is equal to, BC30 __________is the most quick and precisely pointing mouse. BC31 The static nature of digitizing tablets makes them effective for_____________. BC32 __________scanners do not distinguish text from illustrations. BC33 To edit text read by an optical scanner, we need an__________system to translate the image into ASCII characters. BC34 __________scanner is much more expensive than the common CCD based scanners. BC35 ___________scanners are excellent for loose sheets of paper, but they are unable to handle bound documents. BC36 __________readers allow ATMs to read account information and facilitate monetary transactions. BC37 Which of the following input device senses the presence or absence of a pencil mark. BC38 ________ scanners are more secure biometric authentication schemes than other types of scanners. BC39 ___________is the
op1 1 KB
op2 1 MB
op3
op4
INTERNET q_ id
BC4
BC40 BC41
BC42
BC43 BC44
BC45
BC46
BC47
BC48
BC49
q_desc
op1
identification of a person by the measurement of their biological features. People who are trained Programmers in the use of a programming language and also write programs are called__________. Color monitors are also Dynamic called as ____________. monitors VGA and SVGA video Analog standards require _____________ monitors to display variable colors continuously. Monitors that are 16 or Large monitors more inches diagonally are often called________ Another term for dot Sulphur pitch pitch is_________. For___________devices Neutral the bandwidth is expressed in cycles per second or Hertz (Hz). The _________ printers Dot matrix can print to multi-page forms ___________kind of WORM optical disks caanot be modified. Copy machines work in a Ink Jet way similar to the __________ printers. The wavelength used by 850 standard DVD lasers is ______ nm. ___________printers can Daisy wheel achieve higher resolutions with special techniques known
op2
op3
op4
a n s
above
Designers
Database Analysts administrator s
A
Workstations
RGB monitors Color
Digital monitors Gray scale
C
Full-page monitors
Simple monitors
None of the above
B
Phosphor pitch
Potassium pitch Gray scale
B
Digital
Nitrogen pitch Analog
Ink Jet
Laser
Thermal
A
CD ROM
Erasable
All of the above
B
Laser
Thermal
Dot matrix
B
600
650
750
C
Thermal
Laser
Thermal
C
Digital
A
C
INTERNET q_ id
BC5
BC50
BC6
BC7
BC8
BC9
CA1
q_desc generally as resolution enhancement. _________ integrates the computer’s hardware components and provides tools for day-to-day maintenance tasks. The term helical scan usually refers to _____mm tapes. Data must be ________ but doesn't need to be relevant, timely or concise, unlike information. Supercomputers are not extensively used in the ___________industry. Supercomputers are rarely used for __________________. _____________are also frequently used as servers for local area networks. MUS stands for _______.
CA10 Auditor can gather the audit evidence based on_____________. CA11 The CAAT documentation must necessarily include ______. CA12 Audit findings & Audit conclusions are a part of the ___________ documentation. CA13 Audit Sampling can be ________.
op1
op2
op3
op4
a n s
Application software
MS Office
System software
None of the above
C
4
8
10
6
B
Useful
Accurate
Processed
Meaningful
B
Aerospace
Automative
Health
Chemical
C
Seismic Analysis Input/outputintensive processing Workstations
Super computers
Monetary Unit Sampling Inspection
Money Unit Sample
Planning documentation
Weather Forecasting
Intensive B mathematical calculations Mainframes Embedded A Computers
Most Unique Sample Inquiry and confirmation
All of the above All of the above
A
Execution documentation
Both A & B
Auditor Information
C
Execution documentation
Audit Evidence documentation
Planning None of the documentati above on
B
Statistical
Non-statistical
Both A & B
C
Observation
Only A
D
INTERNET q_ id
q_desc
op3
op4
a n s A
op1
op2
CA14 Which kind of Statistical Random sampling ensures that Sampling each sampling unit in a population has an equal chance? CA15 In Judgemental ___________sampling, Sampling the IS auditor places a bias on the sample. CA16 IDEA facilitates user to MS Access import external files in different formats like ________________ formats into IDEA database. CA17 In order to find the total Sampling sales of transactions by Cust-no. so as to produce a list of outstanding Sales customerwise______________tec hnique can be used. CA18 In IDEA, Quick Unique Keys are Summarisation can be upto 1000 used if, CA19 The _________ property Field Statistics in IDEA provides statistical information about all Numeric, Date, and Time fields within the active database. CA2 __________ are tools for Data Warehouse drawing inferences and gathering relevant and reliable evidence as per requirements of the assignment. CA20 How can we come to By checking the know about the date statistics transactions performed on Sundays?
Systematic Sampling
Judgemental Haphazard Sampling Sampling
Haphazard Sampling
Random Sampling
Systematic Sampling
B
MS Excel
DBase
All of the above
D
Sorting
Summarizatio Stratification C n
Unique Keys are upto Unique Keys Unique Keys B 4000 are more are only 100 than 4000 Sorting Filters None of the A above
CAATs
Business Re- None of the engineering above
By applying the dow() Both A & B function on the sample
B
Can't be C known at all
INTERNET q_ id
q_desc
op1
CA21 The probability-based Systematic sampling techniques of IDEA are_________. CA22 __________________ is Systematic a method to extract a Record Sampling number of records from a database at equal intervals to a separate database. CA23 Random Sampling in Functions IDEA is done based on____________ CA24 To divide the data from Sampling the file into bands and gaining the profile of the data is known as _______________ CA25 ________________functi Gap Detection ons assist the user to sift through large volumes of data and help pin-point specific duplicate entries or specific missing entries. CA26 Missing cheque numbers Sampling can be traced using the _________function. CA27 The file extension of an .IMD IDEA file is_______. CA28 Gap Detection is done to To test for check for____________. completeness
CA29 In order to map the Sampling outstanding debts at the year end so as to to determine provisions required against bad debts,__________techni que is used. CA3 CAATs can be applied MS Excel
op2
op3
op4
a n s D
Random
Stratified Random
All of the above
Random
Stratified Random
Monetary A Unit sampling
Without any technique
Random None of the Number Seed above
C
Stratification
Sorting
Filtering
B
Duplicate Detection
Both A & B
Sorting
C
Filtering
Gap Detection
Duplicate Detection
C
.IDE
.IDEA
.IDF
A
To test for gaps in the To know any All of the invoice missing above numbersequence unique number Gap Detection Ageing Filtering Analysis
D
MS Access
A
MS
MS Word
C
INTERNET q_ id
CA30
CA31
CA32
CA33
CA34
CA35
CA36
CA37
q_desc
op1
even by using commonly used software such as ________. Intervals for ageing Days analysis in IDEA can be in________. The most common use of Accounts the Ageing analysis is Receivable or with ______________. Debtor Ledgers _____________techniqu Ageing e can be used in IDEA to extract records where the credit limit of customers is exceeding Rs.50,000. The _____________ Gap Detection generates a database and optionally a results output, that we can analyze to identify possible errors, potential fraud, or other irregularities. Fields and their Field Statistics properties can be changed using _________________ in IDEA. In Financial Join audit,compliance with tax rates can be found using ________________functi ons of IDEA. We can know about the Join ghost employees of an organisation using which techniques of IDEA? Details of Dormant Identify Gaps, accounts can be known date difference by_______________tech
op2
op3
op4
a n s
PowerPoint
Months
Years
All of the above
D
Accounts Payable
Loans & Advances
None of the above
A
Direct Extraction
Stratification Summarisatio B n
Benford's Law
Summarisatio Direct n Extraction
B
Field Properties
Field Virtual Field Manipulation
C
Filter
Extract & All of the Compare files above
D
Summarization
Summarizatio All of the n above
D
Aging, MIS, date difference
Join, Relation, Filter,
A
Date difference, Aging, Filter
INTERNET q_ id
CA38
CA39
CA4
CA40
CA41
CA42
CA43
CA44
q_desc niques in IDEA. The Information Technology (IT) Act 2000 Amended in year ______. CAATs provide a mechanism to gain access and to __________ as per audit objective. Different types of files such as ___________can be accessed in a CAAT software. CAATs can be used to perform routine functions or activities which can be done using _________. CAATs Improving the efficiency and effectiveness of the __________. CAATs support the features of ___________. CAATs can be used for compliance or __________. CAATs may be used in performing various audit procedures.
op1
op2
op3
op4
a n s
2005
2006
Statistics 2007
data technique
analyze data
sorting data
organize data B
Database
Text formats
Excel files.
All of the above
Calculator
PDA
Smart Pones computers
D
Computer process
System process
Audit process None of the above
C
Sampling
Stratification
Frequency analysis
All of the above
D
Substantive tests Black box test
White box test
Gray box test A
Analytical review Compliance tests of general controls
Compliance All of the tests of above application controls Observation None of the above
D
Observation All of the above
D
CA45 _________ is primarily Recalculation said to be the process of collecting and evaluating audit evidence as per audit objectives. CA46 Auditor can obtain the Recalculation audit evidence by _______.
Audit
Inspection
2008
D
D
B
INTERNET q_ id
q_desc
CA47 _______ sampling, Systematic Involves selecting sampling units using a fixed interval between selections, the first interval having a random start. CA48 ________ sampling, Systematic Ensures that all combinations of sampling units in the population have an equal chance of selection. CA49 The probability-based Random sampling techniques are ________. CA5 ___________functions of Arithmetic CAAT enable intelligent analysis of data. CA50 The statistical sampling Attribute techniques are __________. CA51 Systematic Record TRUE Samplings a method to extract a number of records from a database at equal intervals to a separate database. CA52 _________ ar the some Identify examples of tests which exceptions can be performed using CAATs. CA53 SA stands for Standard on ______________ in Auditing CAATs. CA54 _________ enable CAATs auditors to use computers as a tool to audit electronic data. CA55 CAATs Documentation Work papers required the following
Random
Haphazard
Judgmental
a n s A
Random
Haphazard
Judgmental
B
Systematic
Stratified Random
All of the above
D
Statistical
Data Selection
op1
op2
Classical Variable
op3
op4
File B Reorganizatio n Monetary All of the D Unit sampling above
FALSE
A
Identify errors
Statistical sampling
All of the above
D
Section on Auditing
Standard on Schedule on A Account Auditing
Audit
eSecretary software
Contact A Management software
Planning
Execution
All of the above
D
INTERNET q_ id
CA56
CA57
CA58
CA59
CA6
CA60 CA61
CA62
CA63
CA64
q_desc
op1
steps_________. There are _____ 2 commonly used sampling methods in CAATs. Non-statistical sampling Haphazard methods are _______ & _____________. IDEA stands for Interactive Data ____________________. Extraction and Analysis Data should be in row TRUE and coloumn format to import in IDEA. Which functions of Data Selection CAATs enable performing recomputations and reperformance of results? _______ file format was Excel not supported by IDEA. _____________ ensures Random that all combinations of sampling sampling units in the population have an equal chance of selection in CAATs. Which of the following Direct option is not available under options under Extract Group of IDEA? _______ function is used Direct to extract records by writing one more criteria’s and allows to save result in new database. ______to extract Direct specified number of top or bottom records for each value of key in a separate database.
op2
op3
op4
a n s
4
5
3
B
Judgmental
Both A & B
None of the above
C
Interactive Database Internet Data Interactive A Extraction and Extraction Data Example Analysis and Analysis and Analysis FALSE B
File Reorganization
Arithmetic
Statistical
C
XML
ODBC
JPEG
D
Haphazard sampling
Judgmental sampling
None of the above
A
Indexed
Duplicate Key Sorting Detection
D
Indexed
Duplicate Key Key Value Detection
A
Indexed
Top Records Key Value
C
INTERNET q_ id
q_desc
CA65 The ______ task is used to identify duplicate items in a database. CA66 Duplicate Key Detection can also be used to identify non-duplicate keys. CA67 ______ task identifies "missing" information in a database. CA68 Which of the following search option is provided by IDEA? CA69 Benford’s Law, also called the _________. CA7 CAATS can be used effectively to detect_______. CA70 _____has been used to detect unusual patterns that are often the result of errors or, worse, fraud. CA71 IDEA only tests positive numbers 10 and over in the data file CA72 _______ Function returns the absolute value of a numeric expression. CA73 ______ function Returns the day of the week. CA74 _______ Function Returns the integer portion of a numeric value. CA75 _______ function Returns a string with all the numeric characters removed.
op1
op2
op3 Indexed
op4 All of the above
a n s B
Key Value
Duplicate Key Detection
TRUE
FALSE
Gap Detection
Duplicate Key Detection
Indexed
Key Value
A
Date
Numeric Field
Character
All of the above
D
First-digit law
IT LAW
A
Frauds
Errors
Last-digit law All of the above Exceptions All of the above
Gap Detection
Benford's law
Duplicate Key None of the Detection above
B
TRUE
FALSE
@age
@abs
@value
All of the above
B
@date
@week
@dow
C
@num
@int
@itr
None of the above @fr
@justnumber
@justletters
@justchar
@letter
B
A
D
A
B
INTERNET q_ id
q_desc
op1
op3
a n s Level of audit B risk op4
CA8 Which is not a factor to be considered while using CAATs?
Fees to be given to the auditor
Time constraints
CA9
Audit evidence
Data
All of the above
B
ERP
Accounting
Graphics
A
Demilitarized Zone
LAN
None of the above
B
IBDS
ATM Server
Middleware
C
ALPMS
CBS
All of the above
A
9
7
6
B
Proxy
Antivirus
Firewall
B
Control access to a set of servers System administrator Netwok administrator
Manage websites
C
Database
System
CB1
CB10
CB11
CB12
CB13
CB14
CB15
Computer knowledge, expertise, and experience of the IS auditor Audit is primarily said to Information be the process of collecting and evaluating ___________ as per audit objectives. Which software has been CBS designed to meet the needs of the banking industry? The IBDS server is Firewall Zone located in the _______________ Which of the following is IBAS not a component of the Internet banking system? Each branch performs TBA the branch operations in totality at the respective branch itself in _______ How many servers are 8 hosted in the data centre? ______________server ATM provides network security by preventing malicious data from entering the network. In CBS, the role of the Prevent entry of Domain Controller is to, malicious code
op2
CB16 Deciding the access rules Security to data and other it administrator resources is the sole responsibility of ___________ CB17 In the CBS system, who Netwok
Control access to websites
Security
Database A administrator
D
INTERNET q_ id
CB18
CB19
CB2
CB20
CB21
CB22
CB23
CB24
q_desc has the power to create, modify and delete the users in accessing the system. In the CBS system, who ensures the recoverability of data in case of system failure? Ensuring the strategic placement of IPS and IDS in the network is the pivotal job of ____________ The CBS Software resides in the ________________ server. In the CBS system_____________ar ranges for vulnerability assessment and penetration tests. All the versions of the CBS application program are maintained by the _________ In the _________version of testing, the overall aspects of a program are tested. Which of the following tests are conducted in the development environment? User Acceptance Test is,
op1
op2
op3
op4
a n s
administrator
administrator
administrator administrator
System administrator
Librarian
Database Netwok C administrator administrator
Librarian
Netwok administrator Security Database B administrator administrator
Database
Proxy
Central Application
Netwok administrator
Librarian
Database Security A administrator administrator
Security administrator
System administrator Librarian
Database C administrator
Alpha
Gama
Beta
Test
C
Unit Test
System Test
Integration Test
All of the above
D
When the librarian after necessary documentation transfers the program into production
When the users accept the software
When users When the A start using software is in the software the production environment
Antivirus
C
INTERNET q_ id
q_desc
op1 environment Database
CB25 In the core banking environment, the reports are stored in the __________server. CB26 In CBS, to ensure security 10 and to ensure there is no unauthorised usage, a session is allowed to be active for not more than______minutes. CB27 An ATM switch is, A normal networking switch CB28 The value of the Natural Added PIN is always __________from the pin value. CB29 ATM doesn't perform the Withdrawal of following function, Cash CB3 CBS is a combination of, Application software CB30 The encryption of the HSM PIN in the ATM machine is done by the , CB31 Cash dispensing at the Cash Journal ATM is recorded in, CB32 Which of the following is Card and PIN not a control used in generation Card and PIN should be generation? handled by separate staff
op2
op3
op4
a n s
Report Generation
Central Application
Antivirus
B
15
20
5
A
A switch with a server An ATM attached Machine
None of the above
B
Deducted
Multiplied
Divided
B
Balance Enquiry
Changing of PIN number Both A & B
Network devices SSM
ATM log
Depositing Cash None of the above Either A or B None of the above
D
Both A & B
Cash Book
C
The PIN mailer and the card should be delivered together
D
Both A & B
D
All of the above
D
PIN mailer must have There should card and account reconciliation number in the number of cards and PIN mailers produced CB33 While evaluating ATM card should PIN mailer must be There should controls in the dispatch be dispatched dispatched from the be proper of ATM cards, from th Branch Central Office records of the delivered cards CB34 While evaluatng controls Cash inserted Cash dispensed Cash over ATMs, the bank remaining
C C
INTERNET q_ id
CB35 CB36
CB37
CB38
CB39
CB4
CB40
CB41
CB42
CB43
q_desc staff should duly reconcile, The soft copy of the ATM journal is known as Who forwards the customer details to the internet banking applictions server? ___________converts the data to suit the requirements of the IBDS. Which of the following is not a security concern in Internet Banking? The Internet Banking Security Policy must include, In CBS, the networking devices, firewalls and other related equipments are all housed in the __________ The various access points to the Internet Banking System are, In CBS, any attempt that is made to penetrate the network must be proactively detected by , In __________kind of funds transfer, the money transfer takes place in the books of the Reserve Bank of India Which of the following is not needed to initiate the funds transfer?
op1
op2
op3
op4
a n s
Electronic Cash journal journal Database server Web server
ATM journal None of the above Central Antivirus Application server server
A
IBAS
Web server
Middleware Database server
C
Lack of segregation of duties Firewall policy
Inadequate network security
Unauthorised Routers access to PIN improperly positioned Both A & B Network policy
C
Access policy
B
C
Data Repository Data Centre
Database
Server Room B
User System
Web server
Front end application
All of the above
D
Intrusion Prevention Systems
Intrusion Detection Systems
Routers
Both A & B
D
IMPS
RTGS
NEFT
None of the above
B
Name of the PAN of the beneficiary Name of the Account beneficiary bank customer beneficiary number of customer the beneficiary customer
B
INTERNET q_ id
q_desc
op1
CB44 The member institutions Straight through software system and processing RTGS software talk to each other through defined interfaces in_________ CB45 Every Straight Through SN Processing(STP) generates a unique number known as, CB46 To monitor collections IMPS and payments across the country, the banks have developed the, CB47 The various parameters Clearing Cycle in the CMS include, CB48 The various controls to Management be adhered to in CBS are, controls CB49 Organisation structure of Organizational the IT department and IT controls strategies are handled by, CB5 The servers in the data VLAN centre are segregated using the concept of __________ CB50 Banks collect demand SLR deposits and term deposits, out of this they maintain CB51 How can the adequacy of By validations controls be checked in the CBS environment? CB52 Policy dealing with the Security Policy proper maintenenace of the organizational assets is a part of _____________ CB53 __________is not a part E-mail policy of the Communications and Operations
op2
op3
op4
a n s A
Cash Management System
Internet Banking
ATM transactions
PIN
UTR
None of the above
C
CMS
CBS
Internet Banking
B
Credit Limit
Interest
D
Organizational Operational controls controls Management controls Operational controls
All of the above All of the above None of the above
WAN
LAN
MAN
A
CRR
Both A & B
None of the above
C
By performing audit
By doing bank visits
All of the above
B
Business Continuity Planning
Review of Review of Systems system logs Development Procedures
A
Internet policy
Media Handling
C
Firewall security policy
D A
INTERNET q_ id
CB54
CB55
CB56
CB57
CB58
CB59
CB6
CB60
CB61
q_desc
op1
management under the Security Policy A bank ensures the Disaster maintenance and Management recovery of operations through the process of _________ A plan made to recover Business from the impact of any Continuity disaster, so as to restore Planning normalcy is known as the __________ _________refers to the Systems process of developing Development software which produce the required output from the input provided. If the programs tested Audit result in inadequacies and deficiencies, then they are sent back to the _______________team for correction. Who is responsible of Programmer moving a completely tested program from the development department to the production department? In CBS, vulnerability Discrete assessment is a kind of a __________process. Data of all the branches Central Database of a bank are stored in the ________server. ____________are Packs solutions for dealing with the vulnerabilities discovered during vulnerability assessment. ___________is System
op2
op3
op4
a n s
Business Continuity Planning
Systems audit
None of the above
B
Systems audit
Disaster Recovery Planning
Internet Banking
C
Audit Review
Media Handling
None of the above
A
Programming
Testing
Design
B
Librarian
Designer
Analyst
B
Continuous
Slow
On-going
B
Application
Proxy
Web
A
Traps
Patches
All of the above
C
Librarian
Database
Netwok
D
INTERNET q_ id
CB62
CB63
CB64
CB65 CB66
CB67
q_desc responsible for continuously applying patches in the network. The authorisation done with another user ID and password in a dual control system is known as the, Reports generated by the system automatically are known as _________ Which of the following is not a log generated by the system in cbs? In banks, application logs ar egenerated for, In the ATMs, cash disposal is facilitated by the __________. Which of the following statement is true?
op1
op2
op3
op4
a n s
administrator
administrator administrator
Checker concept Maker checker concept
Maker concept
None of the above
B
Reviews
Messages
Logs
Alerts
C
Operating system
Network
Application
Data Base
B
Loan authorisation ATM switch
Limit creation
Pre-closure of deposits ATM Server
All of the above None of the above
D
ATM card of one bank can be processed at the ATM kiosk of another bank without any mutual understanding between customer and bank. First two
ATM card of one bank can be processed at the ATM kiosk of another bank only because of the agreement between the two banks to allow this.
ATM card of one bank can be processed only at the ATM kiosk of any one bank.
ATM card of B one bank cannot be processed at the ATM kiosk of another bank.
Last four
First four
Middle four
CB68 Natural PIN represents the ________ digits of the decimalised encrypted value of the card number. CB69 There should be strict Stock of blank security procedures for, cards CB7 The core banking Application applications like Finacle, Flexcube, Iflex etc. reside
ATM log
Access to the building Stock of live All of the cards and PIN above mailers Proxy Mail Antivirus
A
C
D
A
INTERNET q_ id
CB70
CB71
CB72
CB73
CB74
CB75
CB8
CB9
DB1
DB10 DB11
q_desc on the __________server. To place controls over cash,the bank staff should duly reconcile_____________ __ Which of the following is not stored at the ATM switch? The information received from the web server is verified with the data of the customer held in the ______________. ___________________is not a security concern in Internet Banking. MIS Reports generated during RTGS are in the ________ formats. To overcome the problems arising out of high volume of disbursements,________ ______was developed. The bank has the _________version of the banking software. In CBS, the database server can be accessed by the other servers, An Access database stores its tables in a single file, along with other objects, such as _________. The Size of Memo Data Type is ___________ _______data type is a combinations of text and
op1
op2
op3
op4
a n s
Miffed noted
Cash inserted
Cash dispensed
All of the above
D
Details of hot listed cards
ATM PIN of the customers
IBAS
IBDS
Account balance of customers Middleware
Details of B surrendered cards Central A database server
Inadequacy of security of web server. Excel
User authentication
Stock of blank cards
C
PDF
XML
Inadequate network security All of the above
RTGS
CMS
NEFT
None of the above
B
Beta
Alpha
Client
Final
C
Directly
Only through VLAN
Accessed via B WAN
Forms
Reports
Can't be accessed at all Macros
All of These
D
255
63000
63999
16384
C
Text
Number
AlphaNumeri None c
D
A
INTERNET q_ id
DB12
DB13
DB14
DB15
DB16
DB17
DB18
DB19
DB2
DB20
q_desc
op1
numbers, as well as numbers that don’t require calculations, such as phone numbers. The Size of Date/Time 4 bytes Data Type is ___________ What is the size of 4 bytes AutoNumber Data Type if FieldSizeproperty is set to Replication? Yes and No values and fi Yes/No elds that contain only one of two values that includes ___________. _______is used to Text creates a field that allows the user to choose. Fields that are part of a Text table relationship are called ________. A table can have only Primary key one _______________ which consists of one or more fields that uniquely identify each record that is stored in the table. ________ contains Primary key values that correspond to values in the primary key of another table. The design process Determine the consists of __________. purpose of the database. A part of an Access Spreadsheet database are __________. We can create a table by Table into an creating a new database, existing by inserting a database
op2
op3
op4
a n s
6 bytes
8 bytes
10 bytes
C
6 bytes
8 bytes
16 bytes
D
True/False
On/Off
All of These
D
Field
Lookup Wizard
None
C
Keys
Values
None
B
Foreign key
Super key
Candidate key
A
Foreign key
Super key
Candidate key
B
Find and organize the Specify All of These information required. primary keys.
D
Document
Tables
C
By linking to a table from another data source - such as a
By importing All of These a table from another data
None
D
INTERNET q_ id
q_desc
op1
op2
op3
op4
Microsoft Offi ce Excel source - such 2007 Workbook, a as a Microsoft Offi ce Microsoft Word 2007 document Offi ce Excel or another database. 2007 Workbook, a Microsoft Offi ce Word 2007 document or another database. DB21 To import or link a table Excel worksheet XML file Another All of These in a Access 2010 user use Access ______________ Database DB22 SharePoint is a web site IE Access Both A and B None that can be displayed in a browser such as ________ and includes an interface for displaying lists and libraries in a secure database. DB23 The predefined Contacts Issues Both A and B Nither A Nor templates in Office B Access 2010 include _________. DB24 Every field has a name True False Not Say's None that uniquely identifies the field within a table. DB25 Every field has an Records Data Properties None associated group of settings called __________. DB26 _________ is never Fields Primary key Records Tables empty or null. DB27 Access automatically Charts Index Data None creates an ________ for the primary key DB28 ___________properties Format InputMask Caption All of These affect how our
a n s
__________.
D
A
C
A
C
B B
D
INTERNET q_ id
DB29
DB3
DB30
DB31
DB32
DB33
DB34
q_desc information appears in table and query datasheets. _____is used to enter text that appears when a record violates the Validation Rule expression. ______ are sometimes referred to as "Data Entry Screens". In Ms Access types of controls includes ___________. In Access, Properties are display in a property sheet also called ___________. __________ can be defined as an operation that extracts record(s) from a database based on a given condition. A query consists of search criteria expressed in a database language called ______________. User can create a query in MS-Access using __________.
op1
op2
op3
op4
a n s
Records
Fields
Validation Text
Validation Critaria
C
Tables
Forms
Reports
Queries
B
Bound Controls
Unbound Controls
Calculated Controls
All of These
D
Property window Field Discription
Property Control
None
A
Table
Query
Form
Report
B
BASIC
COBOL
SQL
FOTRAN
C
Choose the Query Wizard provided by Microsoft Access for the ease of user to build a query. Select
Create own queries from scratch using query design.
Both A and B Nither A Nor C B
DB35 __________ querie are Update useful for summarizing information, calculating statistics, spotting bad data and looking for trends. DB36 Action query is used to Create new table Delete rows from
Crosstab
Make Table
C
Update
All of These
D
INTERNET q_ id
q_desc
op1
___________.
DB37 Delete query not deletes True all records in an underlying table from the set results of a query. DB38 _______ query is used to Select create a new table and populate it with data from one or more existing tables. DB39 __________query allows Select the user to make global changes to data in one or more tables. DB4 _________ are what we Tables use to summarize and present data in the tables. DB40 A _______ query is used Sub to pass a parameter to a different query such as an action or a select query. DB41 The SQL aggregate query Sum includes __________functions. DB42 ___________ may be Query wizard used by a user to automatically create a simple query. DB43 Using Simple Query Text Wizard, Summary Option functions are word on _________only. DB44 <> means __________. Equal to DB45 _______operater is used Between
op2 existing table
op3
op4
a n s
False
records or creating entirely new ones in a table Not Say's None
B
Update
Crosstab
Make Table
D
Update
Crosstab
Make Table
B
Forms
Reports
Queries
C
Parameter
Data
Make Table
B
Last
Var
All of These
D
Simple query
Sub
None
A
Number
Date
Time
B
Not equal to Not Between
Not In Is Null
Is Null Is Not Null
B D
INTERNET q_ id
q_desc
if value is not missing from the field. DB46 In like operater * means__________. DB47 Reports provide the most flexible way of viewing and printing ___________. DB48 Report Header section is as a ________.
DB49 _________controls in the Page Header section normally print at the top of every page. DB5 Reports are generally formatted to be printed out, but they can also be ________ DB50 In Access, Page Footer section usually contains __________. DB6 ________is used to retrieve specific data from the tables. DB7 Macro is attached through _______________on aform so that the macro runs whenever Macro is required. DB8 A module is a collection of _________ that are stored together as a unit. DB9 A record is also commonly called a
op1
op2
op3
op4
a n s
Single character Any series of characters General Deep information information
Both A and B Nither A Nor B B Summarized All of These C information
Cover page
Text or text box Number or number box
For All of These D information that needs to be communicate d only once to the user of the report. Character or Date or date A character box box
Viewed on the screen
Exported to another program
Sent as eAll of These mail message
Page numbers
Control totals.
Both A and B Nither A Nor C B
Tables
Forms
Reports
Command button
VB Application
Both A and B Nither A Nor A B
Declarations
Statements
Procedures
Row,Column
Column,Row
Data,Records Raw Facts,Data
Cover letter
Queries
All of These
D
D
D
A
INTERNET q_ id
q_desc
________ and a field is referred as a _______. EX1 A __________ is a visual display of the most important information needed to achieve one or more objectives; consolidated and arranged on a single screen so the information can be monitored at a glance.” EX10 Which feature is added In Excel 2013 and Excel 2016 related to Charts? EX11 __________option is selected, then the changes will be reflected only if we manually click on Update button on Right hand bottom side of PivotTable Field list. EX12 Dashboard is ready to share, we can __________. EX13
EX14
EX15 EX16
EX17
op1
op2
op3
op4
a n s
Dashboard
Spreadsheet
DBMS
None of These
A
Recommended Charts
Reconnected Charts
Reinstalled Charts
None of These
A
Row
Filters
Defer Layout Both A and B C Update
E-mail the Excel Save the Excel dashboard dashboard workbook workbook. on a shared network drive. What is the shortcut key Ctrl+T Ctrl+L to Put Your Data in an Excel Table? __________ work like a Table Slicers filter without going to dropdown. Slicers is used for Pivot Tables Multiple PivotTables ________. How to Add a Simple Options>Calculat Options>Tools>Formu Calculated Field in ions>Fields,Items las>Calculated Fields PivotTable ? & Sets>Calculated Fields In Excel if we have rows Pivot Tables PowerPivot more than 5 lacs rows
Share the dashboard online.
All of These
D
Ctrl+D
Both A and B D
Filters
Sorting
B
Both A and B Nither A Nor C B Options>Tool None of A s>Fields,Item These s& Sets>Calculat ed Fields Both A and B This type of B problem not
INTERNET q_ id
EX18 EX19
EX2
EX20
EX21
EX22
EX23 EX24
EX25
q_desc then system start working slow and get hanged or “Not Responding to handle this situation Microsoft introduced _______feature. Text files delimiters includes ___________. According to Text import Wizard Text qualifier includes ___________. Dashboards can be categorized based on ___________. Single File Web Page format includes ____________. ______ allow us to query data from a specific World Wide Web, Internet, or intranet site and retrieve the information directly into a Microsoft Excel worksheet PivotTable report is an interactive way to quickly summarize ________ amounts of data. PivotTable Field List pane includes _________. Choose where you want the pivot table report to be placed includes ________. Pivot gives us the facility to __________ fields upto any Level by adding to Rows or Columns.
op1
op2
op3
op4
a n s
arised
Tab
Comma
"
'
Strategic Dashboards
Analytical Dashboards Operational Dashboards
.mht
.mhl
Both A and B Nither A Nor C B
Web queries
Web Browser
Web Engine
Web Casting A
Small
Large
New
Quick
B
Report Filter
Column Labels
Values
All of These
D
New Worksheet Existing Worksheet
Current Worksheet
Both A and B D
Group & subgroup
Conclusion
None
Summary
Both A and B Nither A Nor C B Both A and B Nither A Nor C B All of These
D
A
INTERNET q_ id
q_desc
EX26 To Expand all our categories: Select PivotTable tools from Ribbon go to ____________. EX27 Slicer can be accessed from ____________
EX28 ________group that enables us to add subtotals and grand totals to the pivot table and modifyits basic layout. EX29 Apart from sum PivotTable gives us the several other options for summarisation that includes __________. EX3 ___________ comes handy for the top-level management in decision making and to determining and aligning with strategic targets within the organization. EX30 Sorting could be from________. EX31 _____are also used to indicate progress or decline or to indicate good or poor results. EX32 Filtering filter condition includes ___________. EX33 IS PivotTable also gives us the possibility of presenting data with conditional formatting? EX34 Instead of a table full of numbers, a PivotChart
op1
op2
op3
op4
Options>Tools>E Options>Tools>Active Options> None xpand entire >Expand entire Field Active Field field>Expand entire Field PivotTable Tools > Options>Activity >Insert Slicer Layout
PivotTable Tools > Options>Sort & Filter>Insert Slicer
a n s C
B
Design
PivotTable None Tools > Options>Inse rt Slicer Options Pivot Table
Design
Sum
StdDat
D
Strategic Dashboards
Analytical Dashboards Operational Dashboards
Smallest to Largest Icons
Left to Right
Equal to
Top 10
True
False
Both A and B Nither A Nor C B Not Say's None A
Columns
Bars
Pie
Colors
Product
A
Informational A Dashboards
Both A and B Nither A Nor C B Shapes None A
All of These
D
INTERNET q_ id
EX35
EX36
EX37 EX38
EX39
EX4
EX40
EX41
EX42
q_desc can use _________illustrate the numbers. Normal Charts not includes but Pivot Charts Includes __________fields. After we insert a pivot chart_____new tabs are available. Is Tool Tab is a part of Pivot Charts Tabs? ______ is an Excel feature that we can use to define restrictions on what data can or should be entered in a cell. To Validate a List, List option is choose from _______drop down box. Strategic dashboards require to have periodic and static snapshots of data that includes _________. In Excel and according to Data validation Error alert Style includes ____________. _____ option is the only Style choice that completely prevents the person using the workbook from entering invalid data. In Excel and according to Data validation clicking OK enters the new data in the cell; Cancel leaves the cell unchanged that option is available
op1
op2
op3
op4
a n s
Sort data
Collapse or Expand
Summary
Both A and B D
1
2
3
4
D
True
False
Not Say's
None
B
Consolidation
What if Analysis
Data validation
None
C
Source
Allow
Data
Criteria
B
Daily
Weekly
Annually
All of These
D
Stop
Warning
Information
All of These
D
Stop
Warning
Information
None
A
Stop
Warning
Information
None
C
INTERNET q_ id
q_desc
through _________. EX43 Data validation is used for ____________.
EX44 Data validation options are located on the Data tab, in the ________. EX45 Data validation can be applied to cell to achieve the objectives that includes ___________. EX46
EX47
EX48
EX49 EX5
EX50
EX51 EX52 EX53
op1
op2
Restrict data to Restrict numbers predefined items outside a specified in a list range Data Tools group Outline group
op3
op4
Limit the All of These number of text characters Connections Validation group group
Restrict data Restrict data entry to Use a All of These entry to values in a whole number formula to a drop-down list. within limits. calculate what is allowed. How to find cells that Home>Editing>Fi Home>Editing>Find & Home>Editin None have data validation? nd & Select>Go Select>Go to g>Find & to>Data Special>Data Select>Find> Validation Validation Data Validation ______ tools help make Data Consolidation Data Data Analusis sure any invalid data validation doesn’t end up in the worksheets. To defend against Locked Hidden Both A and B Nither A Nor dangers, we need to use B Excels worksheet protection that includes _________. Protecting a worksheet Protecting cells Protecting worksheet Both A and B Nither A Nor involves _________. B Examples of analytical Finance Sales Management Both A and B Nither A Nor dashboards include Management dashboard B ___________. dashboard To protect the workbook Review>Changes Review>Sheet>Protec Review>Tools Review>Prote user select ___________. >Protect t Workbook >Protect ct>Protect Workbook Workbook Workbook Excel 2010 offers up to 28 64 255 None _______ sort levels. Sort Includes Column Sort on Order All of These ____________. __________tool create Consolidation Subtotal Solver Scenario
a n s D
A
D
B
C
C
C C
A
B D B
INTERNET q_ id
EX54
EX55
EX56 EX57
EX58 EX59
EX6
EX60 EX61
EX62
EX63
q_desc groups and subtotals all in one click a feature that can save us lots of time. Is Count Function Work other than Number like Text Etc.? _____ is used to creat a summarised results into one worksheet. Consolidation is used for __________. 3-D Formulas in Consolidate means ___________.
op1
op2
op3
op4
a n s
manager
Yes
No
Not say any thing
None
B
Consolidation
Subtotal
Solver
Scenario manager
A
Business forecasts Only a 3-D effect
All of These
D
None
A
Budgets
Inventory requirements Refer to multiple Refer to Single worksheets and worksheets and can can be used to be used to combine combine data data What-if analysis includes Solver Scenario manager ___________. ___________take sets of Scenarios Data Tables input values and determine possible results. ________ are mini Pie Sparklines charts. It can be prepared either Row wise or Column-wise and can be placed in a single cell. Goal Seek requires Set cell To value __________information. According to Financial Forign Value Fix Value Functions, FV means_______. According to Financial Beginning of the End of the period Functions, Type 0 means period _______. __________solves the Solver Scenario manager problem by adjusting a number of input cells according to a set of criteria or constraints
Consolidation All of These
B
Paste
Both A and B D
Column
Diagrams
B
By changing All of These cell Future Value Financial Value
D
Exact value
B
None
Consolidation Data Table
C
A
INTERNET q_ id
EX64
EX65
EX66
EX67
EX68
EX69
EX7
EX70
EX71
EX72
q_desc
op1
which are defined by the user. Solver in Excel 2010, was Microsoft developed by ______________ The Format as Table Banded rows style helps in creating tables with ______________. How many built in 255 formats are available in a Excel? In Excel, According to Increases the Home Tab A^ means font size __________. ________ command Freeze Data freezes portions of a worksheet, typically column and row headings, so that we can view distant parts of the worksheet while the headings remain in place. _________ are graphical Charts representations of worksheet data. ________ is an excellent Table feature which is used for summarising large data sets and help in quick analysis of data. A macro is a program Spread Sheet that uses_______ code to automate a sequence of actions or instructions. Excel creates a hidden Anyname.xlsm personal macro workbook with name ____________. In Excel, Formula always <
op2
op3
op4
a n s
Frontline Systems Inc. Sun
None
B
Border colors
Patterns
All of These
C
16384
96885
1048576
C
Decreases the font size
Both A and B Nither A Nor A B
Freeze Panes
Split Data
None
B
Diagram
Figures
Tables
A
Charts
PivotTable
None of These
C
VBA
Excel
Recording
B
Anyname.xlsb
Personal.xlsm Personal.xlsb D
>
=
<>
C
INTERNET q_ id
EX73
EX74
EX75
EX8
EX9 OS1 OS10
OS11
OS12
OS13
OS14
q_desc
op1
begins with an ________ sign. _______ error is shown #NULL! in a excel if the formula tries to divide by zero or the divisor is a reference to a blank cell,which Excel considers to be zero value. _______ is always Current sheet highlighted in the sheet tab. _______function returns Max the k-th largest value in a data set. Excel has several built-in Column chart that includes __________. Line chart is used for Compare data __________. values Which is not the state of Blocked the process ? ___ Processor is BACK END responsible for handling communications to and from all the remote terminals connected to computer system. Single-user computers Workstation have two categories ___ & ____. The speed of Gigaflop Supercomputers measured in ______. _____________ is also Multiprogrammi called parallel ng processing. Enabling the user to Multitasking swith between the task is known as_____.
op2
op3
op4
REF!
a n s
#DIV/0!
#N/A
B
Excel Spreadsheet
Workstation WorlPlace
A
Maximum
Large
MaxA
C
Scatter
Bar
All of These
D
Trends over time
Distribution
All of These
D
Ready
Suspended
Privileged
D
FROND END
HOST
None of the above
B
Microcomputer
Mainframe
Both A & B
D
Megaflop
Picaflop
All of above
A
Multiprocessing
Multitasking Multithreadin B g
Multithreading
MultiProcessi None of the ng above
A
INTERNET q_ id
q_desc
op1
OS15 Which of the following Convenient facility is not provided by OS layers to use hardware? OS16 Efficient and fair sharing TRUE of resources among programs is a key goal of Operating System. OS17 Major activities of an Deadlock Operating System with Handling respect to process management ________. OS18 A_____is a collection of File related information defi ned by its creator. OS19 ________ is measured as Turnaround time the number of processes that are completed by the system per unit time. OS2 The number of processes Output completed per unit time is known as_______ ? OS20 Which of the following is Object not a components of a process? OS21 During the lifespan of a Five process, its execution status may be in one of_____ states. OS22 In multiprogramming CPU bound jobs ,most of the time perform I/O operations and CPU utilization is very low ,this kind of jobs is called as ____________. OS23 Threads are oftern Mini processes referred as________________. OS24 Operating system is a TRUE system software.
op2 Efficient
op3 Safe
op4 None of the above
FALSE
a n s D
A
Process Communication
Process All of above synchronizati on
D
Document
Program
None of the above
A
Throughput
Response time
All of above
B
Throughput
Efficiency
Capacity
B
Data
Status
None of the above
D
Four
Three
Two
B
I/O bound jobs
I/O Status Information
None of the above
B
Lightweight processes Both A and B None of the above
C
FALSE
A
INTERNET q_ id
q_desc
OS25 Each thread of process has___________. OS26 In case of ___________ operating system, the user views the system as a 'Virtual Uniprocessor'. OS27 In Operating System, threads in multithreading refer to ______________. OS28 Which of the operating system was recorded in C programing language ? OS29 The two commonly used models for kernel design in operating systems are__________ and__________. OS3 Process is ____________.
op1 Own program counter Distributed
op2
op3
Own register states
Own stack
Centralized
Network
Different parts of Different programs of Different a single process a single process processes of a single program UNIX Linux DOS
Monolithic kernel
Microkernel
All of the above Real-time
Different users of single processes Windows
a n s D A
A
A
Both A and B None of the above
C
A program in A job in execution secondary memory Memory All of the protection above
C
Last Updated
File Size
All of the above
D
Write
Seek
Open
C
Rename
Write
Open
B
UNIX
DOS
MAC
A
Program in High Contents of main level language memory kept on disk Proper job mix CPU scheduling
OS30 Under ______ option proper mix of I/O-bound and CPU-bound jobs are required to effectively overlap the operations of the CPU and I/O devices. OS31 The attribute of a fi le Date & Time contains other information about the file such as_______. OS32 ______ operation is used Read with random access files to first position the read/write pointer to a specific place in the file. OS33 ______ is used to change Read the name of an existing file. OS34 _____ is a prominent MULTICS example of a layered
op4
A
INTERNET q_ id
OS35
OS36
OS37
OS38
OS39
OS4
q_desc operating system. ________is a bridge between applications and the actual data processing done at the hardware level. The design of Linux is an example of ______architecture . In context with multiprocessing ,SMP stands for ___________. Which state of process records the status of I/O devices ____________. Whch of the following measure is used in case of interactive system _____________. PCB stands for_____________.
op1
op2
op3
op4
Operating System
Kernel
CPU
Monolithic
Micro
Both A and B None of the above
A
Symetric None of the Multiprocessi above ng Running None of the above
C
Response time
C
Server Shared Multiprocessing Multiprocessing Blocked
Suspended
Throughput
Turnaround time
Program Control Process Control Block Process Block Communicati on Block Sustended Blocked Terminating state
OS40 When the process is waititng for an I/O devicethat state is known as _________________. OS41 Requirements of Large memory Memory protection multiprogramming are _____________. OS42 The part of the CPU CPU Scheduler Instruction Register which decides which of the ready jobs must be allocated to the CPU when it is free is known as ________. OS43 Sharing of computing Resource sharing Time Sharing resourses among many users by the operating system is know as____________.
ALU
a n s
None of the above
B
A
Program B Communicati on Block None of the B above
Job status All of the preservation above
D
Control Unit Arithmetic Logic Unit
A
Computer Sharing
B
Processs Sharing
INTERNET q_ id
q_desc
op1
op2
OS44 Which of the following is Creation and Suspension and not an activity of deletion of user resumption of Operating system with and system processes respect to process processes management? OS45 The memory Synchronization Allocation demanagement module of Asynchronization allocation an operating system takes care of the_________________ of memory space to the various programs in need of this resource. OS46 The _________ module Security Process management of operating system managemnt ensure that data should be protected from unauthorized users. OS47 The Operating system Process Control Process Circuit Board maintains Block a_________________ for each loaded process before taking away the CPU from a running process. OS48 In UNIX terminology Kernel Shell commannd interpreter is referred as _________________. OS49 A process control Process State Process Identifier block(PCB) doesn't contain______________. OS5 A computer system that Multitasking Multiprogramming permits multiple users to run programs at same time. OS50 In _______the jobs were Batch Processing Manual Loading then automatically loaded from the input device and executed by the system one by one
a n s Improve CPU A mechanism C utilization for deadlock handling op3
Suspension resumption
op4
None of the above
B
Memory Device A management management
Program None of the Control Block above
A
Program
None of the above
B
I/O Status Information
Memory Information
D
Multithreadi Multiprocessi B ng ng
Batch Working
All of the above
A
INTERNET q_ id
OS6 OS7 OS8
OS9
PP1
PP10
PP11
PP12
PP13
PP14
PP15
q_desc
op4
a n s
All of above
A
None of the above Windows XP UNIX
A
Tightly-coupled
Multi-tasking None of the above
A
.ppnt
.pptx
None
C
SHIFT +F12
SHIFT+F10
Both A & B
D
Themes
Slide Masters None
A
CTRL
ALT
All
A
F5
F6
F7
B
ctrl + f5
alt + f5
None
A
Slide Show
Transition
View
D
op1
without any operator intervention. A Microsoft Windows is Operating a(n)_______. System Which of the following is Accessories program group? Which of the following is DOS not an operating system? A Linux Beowulf cluster is Loosely-coupled an example of a _____ system. PowerPoint 2010 .ppt presentations have the extension __________ _______ keyboard CTRL+S shortcut use to save the document in PowerPoint. The arrangement of Layout placeholders on a slide is called a __________. To create a perfect SHIFT square or circle or Line (In Power Point), press and hold _______ while user drag it. To view presentation in F4 Slide Show view from the first slide, shortcut key use from keyboard is _______ To view presentation in shift+f5 Slide Show view from the current slide, shortcut key use from keyboard is _______ In Power point, slide Animation master option exist in _________ tab.
op2
Word Software MS Word Excel
op3
Graphics Software MS Paint
B
INTERNET q_ id
q_desc
.pptx
.potx
.pptt
a n s C
Clipboard
Paste Special None
A
Transitions
Animations
Insert
D
Red
Yellow
None
A
XBRL
XML
None
C
Object Linking
Illustrations
None
B
Save
Paste Special None
C
Save
Paste Special None
C
Action
Pull
None
B
Notes Master
Handout Master
None
A
op1
PP16 PowerPoint template is a .ppt pattern or blueprint of a slide or group of slides that has an extention ________. PP17 _________ is use to Format Painter apply formatting from text, shapes, and pictures to another text selection, shape, or picture. PP18 In Powerpoint 2010, Design chart utility exist in _______ tab. PP19 When we insert a chart Blue in Powerpoint 2010, Only the data enclosed by the _________ lines will appear in the chart. PP2 .PPTX is an extention of HTML power point, where X at the end denotes that the new file format is based on an open ____ PP20 ___________ is a Hypertext technology that allows linking to documents and other objects. PP21 Paste link exist in Clipboard ________ dialog box. PP22 Transpose option exist in Clipboard __________ dialog box. PP23 In PowerPoint, you can Push use _________ button to launch any other Presentation, Application or Website from your presentation. PP24 A ________ is the top Slide Master slide in a hierarchy of slides.
op2
op3
op4
INTERNET q_ id
Slide Master
Notes Master
Handout Master
None
a n s B
One
Two
Three
Four
C
Slide Show
Design
View
Review
C
Static Images
Dynamic Image
Logical Image None
A
SmartArt graphic Shapes
Slide Show
A
Themes
Slide layouts
Slide Masters All
B
Image
Link
Symbols
Media
D
Four
Five
Six
Seven
A
Emphasis
Motion Paths
Entrance
All
D
Animation
Slide transitions
Slide Show
None
B
Portrait
Landscape
Custom
None
B
q_desc
PP25 __________ controls the appearance of all speaker notes pages. PP26 The PowerPoint presentation contains ___________ masters. PP27 In PowerPoint, Master view exist in __________ Tab. PP28 Screenshots image is __________ PP29 A __________ is a visual representation of information that can quickly and easily create, for effectively communicate messages or ideas. PP3 In Power point, how the information is arranged on the slide is controlled by ___________ . PP30 All options to insert a video are located on the Insert tab, in the_________ group. PP31 There are ______ different kinds of animation effects in PowerPoint 2010 PP32 __________ Animation effects exist in PowerPoint 2010 PP33 __________ are motion effects that occur in Slide Show view when we move from one slide to the next during a presentation. PP34 Default page orientation in Power point is
op1
op2
op3
op4
None
INTERNET q_ id
PP35
PP36
PP37
PP38 PP39
PP4
PP40
PP41
PP42
q_desc ___________ Default number of handouts exist in one page, in PowerPoint are ______ In PowerPoint, Rehearse time option exist in ________ group of slide show Tab. __________ slide show option use for, to choose the slides to use in the show and the order shown. _________ key is use to exist from slide show. The __________ view provides a thumbnail view of the slides in a presentation. ________ are combinations of design elements such as color schemes and fonts that make it easy to create attractive slides. view is to view a presentation not in fullscreen Slide Show view, but in a window with simple controls that make the presentation easy to review. ________view occupies the full computer screen, exactly the way presentation will look on a big screen. __________ View is used in viewing presentation with speaker notes on
op1
6
op2
8
op3
op4
a n s
10
12
A
Start Slide Show Monitor
Set Up
None
C
From Beginning From Current slide
Custom Show None
C
Delete
Enter
Esc
C
Slide Sorter
Normal view
Reading view Master view A
Themes
Slide layouts
Slide Masters All
Slide Sorter
Normal view
Reading view Master view C
Slide Show
Normal view
Reading view Master view A
Slide Show
Normal view
Reading view Presenter
Break
A
D
INTERNET q_ id
PP43
PP44 PP45 PP46
PP47
PP48
PP49
PP5
PP50
PP6
PP7
PP8
q_desc one computer. __________ is the main editing view where we can write and design the slides of a presentation. _______ Number of tabs exist in PowerPoint Number of master views exist in PowerPoint To insert a new slide in power point using keyboard __________ key used First group in view tab in powerpoint is __________ which tab contain macro tool in PowerPoint ________ Default paper size in power point ___________ __________ use to change the appearance of all the slides in our presentation at once. To define time for a particular slide __________ PowerPoint includes a slick diagramming feature called __________ The dialog box launcher button available is in the group at __________ corner. ________ is a customize toolbar that contains commands frequently in
op1
op2
op3
op4
a n s
Slide Show
Normal view
Reading view Presenter
B
6
9
12
13
B
2
3
4
6
B
CTRL+K
CTRL+N
CTRL+M
None
C
Master View
Presentation View
Zoom
Macro
B
Home Tab
Insert
Design
View
D
A4
Letter
Legal
Executive
B
Themes
Slide layouts
Slide Masters All
C
Rehearse Time
Use Timings
Play Narration
None
A
SmartArt
Shapes
Media clips
None
A
bottom-right
bottom-left
Top-right
Top-left
A
Home Tab
Control Tab
Quick Access None Toolbar
C
INTERNET q_ id
PP9 WO1
WO1 0
WO1 1 WO1 2
WO1 3 WO1 4 WO1 5
WO1 6 WO1 7
WO1 8 WO1 9 WO2
q_desc
op1
use. The _________ shows Slides tab thumbnail icons of slides. The Navigation Pane 1 provides____number of views of our document ___________ Indentation determines the distance of the paragraph from either the left or the right margin. Negative indent is also Indentation known as _________. In Indentation, Hanging __________ controls the left boundary of every line in a paragraph except the first one. Ctrl + Shift+S is used for Save As ___________ Insert tab includes Pages __________. According to Table in Ms Combine Cell word,_________combin e two or more cells in the same row or column into a single cell. Tables of citations is Bibliography known as _____ and _______ are footnote and used for provide endnotes references for text of document Cross reference depends CITATIONS on ______ Shortcut key for Web ALT+W+P layout is In Navigation Pane, Headings _____ view provides hierachy of headings in
op2
op3
op4
a n s
Outline tab
Both A & B
None
A
2
3
4
C
Paragraph
Spacing
Line
A
Outdent
None
B
First Line
Negtive Spacing Left
Right
A
Solver
Styles box
Only Save
C
Illustrations
Text
All of above
D
Merging Cells
Select Cell
Delete Cell
B
Table of figure HEADER AND FOOTER CITATION AND CAPTIONS
Table of Authority THESAURAS AND RESEARCH
A
captions
FOOTER
FOOTNOTE
B
ALT+W+U
ALT+W+L
ALT+W+O
C
Thumbnail
search results None
Table of content
A
A
INTERNET q_ id
WO2 0 WO2 1 WO2 2
WO2 3
WO2 4
WO2 5 WO2 6 WO2 7
q_desc our document ______is a helpful tool for setting margins and tabs _________defines the colors,fonts and graphics effects for a document if a word too long to fit at the end of a line then to adjust word we can use ___________ is often used to hide or trim a part of a picture either for emphasis or to remove unwanted portions. ____________ is the ratio between picture width and picture height which can be maintained even when resizing a picture. In SmartArt, What is the Purpose of Cycle?
Which of them is a part of Charts? ___________ identifies a location or a selection of text that we name and identify for future reference. WO2 _______________ are 8 areas in the top, bottom and side margins of each page in a document. WO2 __________ are those 9 giant letters that begin the first paragraph of a chapter or document.
op1
op2
op3
op4
a n s
ruler
GRIDLINES
NAVIGATION HEADINGS PANE
Theme
STYLE
WORD ART
WATERMARK A
hyphentation
ALIGN
WREP TEXT
LINE BREAK
Cropping
Removing
Deleting
Moving
Quick Ratio
Equity Ratio
Aspect Ratio General Size C Ratio
Show a continual Shows steps in a process process or timeline
Show nonsequential information doughnut charts Crossreference
A
A
Show how parts relate to a whole All of above
A
None
B
Column charts
Surface charts
Hyperlink
Bookmark
Header
Footer
Both A and B Nither A Nor C B
Drop Cap
All Cap
Upper Case
Font Size
D
A
INTERNET q_ id
q_desc
WO3 Screenshot feature will not be available in word2010 if we are working on a document in ____ mode WO3 In Word,User create a 0 table of contents by applying __________. WO3 Shortcut key of footnote 1 and end note are __________ WO3 __________________ is 2 a list of sources, usually placed at the end of a document that we consulted or cited in creating the document. WO3 In word, Insert caption is 3 a numbered label, such as_________ WO3 In 4 Figures,____________is defined as a list of the captions that appear in the document and the associated page numbers. WO3 In Word2010,What is the 5 path of Recover Unsave Files?
op1
op2
op3
op4
a n s A
compatibility
normal
Page layout
None
Index
Heading styles
Table Designing
Table Creation
CTRL+ALT+ F
CTRL+ALT+ D
Both A and B Nither A Nor C B
Bibliography
Acknowledgement
Last Slide Source
None
A
Table 1
Figure 1
Equation 1
All of above
D
Table of Content Table of Figures
Table of Tables
Table of Equations
B
File>Info>Versio ns>Manage Versions>Recove r Unsaved Documents
File>Save & None Send>Version s>Manage Versions>Rec over Unsaved Documents Gridlines Navigation Pane
WO3 In Word2010,Which of Ruler 6 them is not included in a show tab under View tab? WO3 Switch Windows button True 7 contains up to nine open documents in Word2010. WO3 In word2010,_________ Macro
File>Options>Versions >Manage Versions>Recover Unsaved Documents
Formula Bar
FALSE
Tabs
B
A
B
A
Formulas
Data
A
INTERNET q_ id 8
WO3 9
WO4
WO4 0 WO4 1 WO4 2
WO4 3
WO4 4
WO4 5 WO4 6
q_desc is a series of commands that we can use to automate a repeated task and can be run when we have to perform the task. _______format preserves document formatting and enables file sharing By default ______ will appear on the quick access toolbar What is the shortcut key for finding word with similar meaning __________is not an option of the Page setup group. A __________ setting adds extra space to the side or top margin of a document for binding ______option of the Mailings tab is used to correlate fields from a data source to fields in a main document having different field names __________ can help to separate sections of a document and make them look interesting to read Watermark option is in __________group of Pagelayout tab To combines a document with a list of names and addresses to produce individualized
op1
op2
op3
op4
a n s
XML
XLS
PDF
DOC
C
Save
Undo
Redo
All
D
Ctrl+F7
F7
Alt+F7
Shift+F7
D
Margins
Size
Drop Cap
Columns
C
Left margin
Gutter margin
Mirror margin
Right margin B
Select Recipient Match Fields
FindFields
None of the above
B
Orientation
Columns
Theme
C
Page Background Theme
Pagesetup
None of the above
A
Main document Data source
Mail merge
Merge field
C
Watermark
INTERNET q_ id
q_desc
documents name as ____________. WO4 We use _________ when 7 we want to create a set of documents, such as a form letter that is sent to multiple recipients. WO4 Shortcut key for 8 Printlayout is WO4 PDF stands for 9 _____________. WO5
WO5 0
WO5 1 WO5 2 WO5 3
WO5 4
WO5 5
op1
op2
op3
op4
a n s
Mail merge
macros
Smart art
End notes
A
ALT+W+P
ALT+W+U
ALT+W+L
ALT+W+O
A
Portable Documents Form
Portable Documented Format ctrl+C
Portable Document Format None
D
Match Fields
Compare Fields
Auto Check for Errors
B
Envelopes
Memos
Directory
C
Matrix
Table
Paragraphs
C
Field
Field name
Record
C
Last-Name
Last_Name
Last\Name
C
Enter Key
Shift + Enter Ctrl +Shift+ Enter
Printable Document Format The shortcut for opening ctrl+F the search area of the navigation pane Which button on the Find Recipient Mailings tab is used to correlate fields from a data source to fields in a main document that have different field names? Which of the following is Letters not a default document type for a mail merge? How is the information in Chart a data source organized? What is the name of the Data field column heading for each category in a data source? By Default,When a field LastName name has a space in its title, such as Last Name, how is the merge field displayed in the mail merge document? Which key should be Down Cursor Key pressed to start a new paragraph in MS Word 2010?
ctrl+A
A
INTERNET q_ id
q_desc
WO5 ) In MS Word 2010, the 6 extension "rtf" stands for ___________. WO5 ________ option in Ms7 Word 2010 shows paragraph marks and other hidden formatting symbols? WO5 In H2O the figure 2 is 8 appeared lowered. Which effect has been applied? WO5 Which of the following 9 shortcut key is used to check spelling? WO6 _______ feature of word2010 which allows us to recover unsaved documents which were closed due to some reasons WO6 In Word 2010, 0 ____________ is a preset document layout with a collection of styles which are saved to a file and can be applied to other documents WO6 In Word 2010, ____ 1 option automatically resizes the table to fit in a Web browser window when window size is changed. WO6 To adjust a list in single 2 page we use WO6 The extension file name 3 for the list of mail merge is WO6 Orientation modes in 4 Word2010 are
op1
op2
op3
op4
a n s B
Reversible Text Format
Rich Text Format
Return Text File
Return Text format
Show/Hide
Enable/Disable
Clipboard
Styles
A
Superscript
Lowered
Subscript
Laid down
C
Ctrl+F7
F7
Alt+F7
Shift+F7
B
Manage versions Accesibility checker
check None compatibility
A
Template
Screenshot
Style
Agenda
A
Fixed column Width
AutoFit to contents
AutoFit to window
None of the above
C
section break
continous break
.mdb
.rtf
column break next page break .accdb .swp
top and bottom horizantal and vetical wide and narrow
none
C A
B
INTERNET q_ id WO6 5 WO6 6 WO6 7
WO6 8
WO6 9
WO7
WO7 0 WO8
WO9
printing option
envelop option
both a and b none
a n s B
wrap text
word art
format text
text box
A
next page section break
continous break
even or odd section
previos page B section break
count numbers
line numbers
both
none
B
add ins
plug-ins
meta-ins
none
A
.doc
.docx
.dotx
None
B
true
false
Ctrl+delete
Ctrl+backspace
True
False
q_desc Monarch is an example of Behind text is an option of We would use a ____break if we wanted different kinds of formatting on the same page A utility of word2010 is used when we need to refer to specfic lines in a document such as script or legal contract An _____ has an installed functionality that adds custom commands and new features in office 2010 programs Word2010 uses ___file extension to save documents Add-ins run without notification To delete the entire word to left of the cursor position the cursor to the left of the text we want to delete and for that we press _____ we cannot delete the page break that word inserts automatically
op1
op2
op3
op4
A cut
none
A
A
TALLY_FINAL q_id
q_desc
TL1 The financial transactions are to be …………. leading to different steps in Accounts Compilation.
op1
op2
op3
Collecte Sampled and Grouped and d and stratified summarized comput ed
op4 Assets and liability
an s C
INTERNET q_ id
q_desc
op1
op3
a n s
op4
TL10 The methods LIFO, FIFO, Moving Average are used to ….
Value clearing Value expense Value income stock stock stock
A
TL11
Income statement
Balance sheet
C
Trading account Sales or purchase
P&L Suspense statement accounts Asset or liability Profit or loss
C
Voucher debtors Assets
Sundry debtors Original entry
C
Liabilities
Suppliers
D
Assets side
Expense side
Payable side
B
Company
Project
Application
B
F2
F12
F11
C
Tally Pack
Tally Group
Tally Vault
D
Journal
Voucher
Trial Balance
B
Gateway of Tally
Entry of Tally
Groups of Tally B
Production
Mercantile
Manufacture
C
Current assets Loan assets
Capital assets
B
Groups
Journal
Ledgers
D
Expense nature
Revenue nature
Income nature C
TL12 TL13
TL14 TL15 TL16 TL17
TL18 TL19 TL2
TL20
TL21 TL22
TL23 TL24
Value closing stock The report prepared taking the asset P & L and liability type accounts from the statem Trial Balance is called…. ent The report that depicts operating Trial profit/loss for a period is ….. balance The day book contains transactions Income relating to ……… or expendi ture The Bills Receivable details are Journal maintained in a …….. sheet Creditors ledger has details of your Custom dues to …….. ers The sundry debtors are placed in the Income Balance sheet on the …… side The first step in Tally before any File transaction is entered or saved is creating a ……… To configure country specific details F10 use the function key…… Identify the security mechanism used Tally in Tally. Secure The basic document where Ledger transactions are entered chronologically is…. After selecting a company in Tally, Accoun you will be in the…… ts of Tally Tally software is based on ……… Sales accounting system. Identify the primary group of capital Fixed nature that uses bank account and assets cash in hand as sub groups. All financial entries in Tally are done Vouche using……. rs The Direct expenses, Purchase Capital account, Direct income are primary nature
op2
Asset sheet
B
INTERNET q_ id
TL25 TL26 TL27
TL28 TL29
TL3
TL30
TL31
TL32 TL33
TL34 TL35
TL36 TL37
TL38
q_desc groups of ….. The option to delete a sub-group is admissible through the menu…… The behavioural attributes of this group cannot be changed. Credit limits for personal accounts and branches can be done in the ledger mode…… We are not allowed to delete a ledger from this mode. All account heads except Cash and Bank are placed in the……
op1
op2
Shift
a n s
op4
Alter
Delete
Subgroup Single
Ledger-group Primary-group Alter-group
C
Multiple
Sub-group
Alter-group
B
Single
Sub-group
Alter-group
Multiple
D
Sub Group Ledger Ledger master master These are the basis for analysis by Journal P & L Account potential investors, banks etc. and and Journal Ledger Identify the primary group of capital Expens Income nature that has the sub-groups: Bank es OD Account, Bank OCC Account. The primary document for recording Journal Trial sheet all financial transactions in Tally is the…… You can customize the voucher entry F13 F12 screen using the function key……. Identify the voucher type that Credit Payment records fund transfers between cash Note and bank accounts. This voucher type records Sales Receipt adjustments between ledgers. The use of classes for payment, Double List entry receipt and contra vouchers enables entry mode data input in …… mode The details of a voucher entry can be Comme Memo given in the ……. nt The credit note voucher can hold Sales Ledger account types: …….. account account, Bank , Sales account tax account The suffix and prefix details for the End of a First of a year
Display
op3
A
General Ledger Journal Ledger C master master P & L Account and Balance Sheet Assets
Voucher C Account and Balance Sheet Loans D
Voucher
File
C
F10
F11
B
Receipt
Contra
D
Payment
Journals
D
Choice entry mode
File entry mode B
File
Narration
Suppliers account, Purchases account
Buyer's A account, Cash account
D
First of a month End of a month C
INTERNET q_ id
TL39 TL4 TL40 TL41
TL42
q_desc voucher type can be made applicable only from the ……. The voucher used to record all bank and cash payments is ….. The accounts that the business owns is called …. Tally's age-wise analysis considers the voucher's …… Arrange the steps in generating the books of accounts.1. Create Trial balance2. Create new ledgers3. Generate Day Books4. Update journals for financial transactions For day-to-day transactions the voucher types used are
TL43 Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be entered into the voucher type….. TL44 Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10 monitors by credit. TL45 Identify the voucher type to be chosen for the sale of computers to Anand by cash @ Rs.210000 per unit. TL46 A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher….. TL47 The financial statement that consolidates ledger balances is ….. TL48 The F9 function key in the left side of the Gateway of Tally screen displays the…… TL49 The option on the Gateway of Tally that will generate the P&L account statement is….. TL5 The expenditure for running the business for a period is ….. TL50 This displays the balance daywise for
op1
op2
op3
a n s
op4
month Credit Contra Note Liability Income
Sales Note
Payment
D
Sales
Asset
D
Previou Effective date Current year s date 1, 2, 3, 1, 3, 4, 2 2, 4, 3, 1 4
Configured date 3, 4, 2, 1
B
Credit Cash purchase Both A and B purchas e Loan Payment Receipt
Contra purchase
C
Sales
B
Credit Cash Purchas Purchases es Cash Sale Sheet Ledger
Expense Purchases
Debit Purchases
A
Stock Journal
Purchase Voucher
C
Paymen Receipt t
Debit
Contra
D
Balance sheet Accoun ting reports Net Loss
Profit & Loss statement Inventory reports
Trial balance
Journal
C
P & L reports
Expense reports
B
Net Income
Net Profit
Net Account
C
Taxes
Income
A
Journal book
Day book
D
Expens Example e Record Ledger book
C
INTERNET q_ id
TL51 TL52 TL53 TL54
TL55
TL56
TL57
q_desc a selected voucher type. The feature in Tally to analyze accounts of a company is….. The age-wise statement is displayed based on…… The ratio analysis of receivables can be done based on…… Name the statement that helps the management in the decision making process. Identify the budget type which is chosen where transaction amounts are to be monitored. Choose the budget type to be used where bank accounts balances are to be monitored. The management that needs to consolidate the accounts of its various enterprises uses ……. in Tally.
op1
op2
book Ratio Account analysis analysis Income Payables
a n s
op4
Transaction analysis Loans
A
Bill date Effective date Voucher date
Previous date
A
Data flow
Funds flow
Cheque flow
B
On closing balance On closing balance Consoli date compan y Owner
On net credit On net flow transactions
On net cash flow
C
On net credit On net flow transactions
On net cash flow
A
Group company
Set company
Alter company B
Accountant
Administrator D
Period-less accounting
Transactionnumber accounting
C
Nominal accounts
Expense accounts
B
Tally Report
Tally Group
B
Tally.exp
Tally.ole
A
ODBC
MS-XLS
C
Sequence number
Range number B
TL58 Identify the user who can access Data Entry audit trails in Tally. operator TL59 Identify the accounting feature in Month- Yearly-entry tally that facilitates splitting financial less accounting years for a company data. account ing TL6 Identify the account type by the rule: Real Personal "Debit the receiver and credit the account accounts giver". s TL60 The tracking of changes in vouchers Tally Tally Audit and ledger masters is done by….. Vault TL61 Tally can import data from other Tally.im Tally.cfg programs and creates a log about the p activity in the file….. TL62 Import and export of data between OLE DBMS Tally and other programs is possible with the help of….. TL63 The manual option of voucher Auto Duplicate numbering leads to….. number number s
Data analysis
op3
Expenses
Stock flow
B
INTERNET q_ id
q_desc
op1
op2
a n s
op4
TL64 The Tally audit trail tracks changes made to vouchers that are …..
more than a day old
more than a week old
A
TL65
F12
F6
D
Test program pack
Test record pack
B
TL66
TL67
TL68
TL69
TL7 TL70
TL71
TL72
TL73
more less than 30 than 30 Days old Days old The ratio analysis of Bills Receivables F5 F8 or Bills Payables can be displayed with the function key….. The test data generated with Test Test data pack correctness proof, data flow analysis item and control flow analysis tools is block called…. When a real-time system is Parallel Tracing simulated to generate the same trailing parallel output as the real-time system, the technique is called…. When an auditor expands the extent Cross Formulate of substantive tests to determine the referen flaw impact of defects on the attainment ce lister hypotheses of program objectives, the methodology is…. This is an important control in Public Random audit systems that use digital signatures audit trails for authentication purposes. trails The first document where the Ledger Liability transaction is entered is called a ….. Selecting transactions based on a Transac Systematic sampling rate is called …. method. tion sampling samplin g The capability of the generalized File size File data audit software to read different data coding schemes, different record formats and different file structures is…. The audit software capability of Sort Sampling nth frequency analysis is to…. and item merge files The audit functions of attributes Stratific Selection sampling, variables sampling, ation stratified sampling are included in ….
op3
Parallel coding Parallel simulation
D
Correct lister
Formulate correct hypotheses
B
Sample audit trails
Data audit trails
A
Voucher
Expense
C
Simple sampling
Demographic sampling
B
File access
File C reorganisation
Formatting output
Classify data on D a criteria
Statistical
Reporting
C
INTERNET q_ id
q_desc
functions. TL74 Identify the functional limitation of a generalized audit software that enables evidence collection only on the state of an application system after the fact. TL75 The purpose-written audit programs are used for…..
TL76 Picture of a transaction as it flows through the computer systems is called….. TL77 Identify the type of audit when auditors are members of the systems development team. TL8 The document used for posting of accounting transactions is ……....
op1
op2
op3
a n s
op4
Ex Post Analytical Auditin review only g Only
Limited ability to determine Propensity for Error
Limited ability A to Verify Processing logic
Sorting, Data retrieval, creating code , and comparison printing files Progra Track m
Reading data, selecting and analyzing information
Specific tasks D with original or modified programs
Snapshot
Picture
C
General Post audit audit
System audit
Concurrent audit
D
Balance sheet and trial balance Credit
Journal and ledger
D
Expense
B
Vouche Ledger and r and trial balance journal TL9 When the debit total is greater than Income Debit credit total, the amount appears in the …….. column.