ICAI ITT Questions

116
QUESTION A B procedure batch alpha numeric alpha beta Ethernet Internet mini computers microprocessors input output multiprocessing multithreading interpreter compiler input processor impact printers drum printers operating system processor compiler visual basic power builder compiler interpreter Collection of instruction is called a _____ Combination of alphabetic and numeric data is called _____ data Computers can be classified based on ______,______and _______ space occupied, price, no. of users allowed cost, performance their ratio _____________ is the Worlds largest computer network . _________ are used in large organizations for large scale jobs _______ devices are responsible for feeding data into the computer _______ is the capability of the o/s to run numerous applications simultaneously _______ involves conversion of raw data into some meaningful information _______ device is responsible for obtaining the processed data from the computer _______ printers use light to produce the dots needed to form pages of characters Hardware components in a computer are _____,____,_____,______ operating system, bootstrap, kernel, shell control program, interpreter, assembler, compiler _______ software helps to do a specific task for the user application software _______ converts a high level language into machine language _______is/are a popular front end tool _______ translates assembly language program into machine language instructions

description

ITT Questions

Transcript of ICAI ITT Questions

Sheet1QUESTIONABCDANSCollection of instruction is called a _____procedurebatchcommandprogramDCombination of alphabetic and numeric data is called _____ dataalpha numericalpha betanumerous alphanumber and alphaAComputers can be classified based on ______,______and _______space occupied, price, no. of users allowedcost, performance their ratiosize, performance, costinput, output, performance ratiosC_____________ is the Worlds largest computer network .EthernetInternetARPANETNone of the above.B_________ are used in large organizations for large scale jobsmini computersmicroprocessorsPCsmainframesD_______ devices are responsible for feeding data into the computerinputoutputfeedwriteA_______ is the capability of the o/s to run numerous applications simultaneouslymultiprocessingmultithreadingmultiplexingmultitaskingD_______ involves conversion of raw data into some meaningful informationinterpretercompilerconverterprocessD_______ device is responsible for obtaining the processed data from the computerinputprocessorramoutputD_______ printers use light to produce the dots needed to form pages of charactersimpact printersdrum printersnon-impact desktop printersthermal printersCHardware components in a computer are _____,____,_____,______operating system, bootstrap, kernel, shellcontrol program, interpreter, assembler, compilermonitor, program, keyboard, busCPU, memory, input device, output deviceD_______ software helps to do a specific task for the useroperating systemapplication softwarewindows 95interpreterB_______ converts a high level language into machine languageprocessorcompilerassemblercoderB_______is/are a popular front end toolvisual basicpower builderSQL * plusall of the aboveD_______ translates assembly language program into machine language instructionscompilerinterpreterassemblerprocessorCThe model through which the relationship is diplayed between data and information is called_______processing modelmodelsystem modelnone of the aboveC____________looks like a ordinary credit card but incorporate a microprocessor and memory chip____________smart cardRAMROMFirmwareA______ computers are used in large organizations for large scale jobs which have large storage capacitiesmainframessuper computersmicro computersnone of the aboveA_______ is responsible for all calculations and logical operations that have to be performed on the datacontrol unitarithmetic and logic unitcentral processing unitnone of the aboveB______ printer use laser lightband printerdrum printernon impact printernone of the aboveC______ software enhances the user to enter ,store, manipulate and print any textdata managementword processingelectronic spreadsheetnone of the aboveB_______ is the temporary storage place for deleted filesmy computerrecycle binMicrosoft exchangenone of the aboveBProcessed data is called ___________________datadatuminformationnone of the aboveC_____ language consists of strings of binary numbersassembly languagemachine languagehigh level languagenone of the aboveB_________capability supports concurrent users doing different tasksmultiprocessingmultithreadingmultiplexingnone of the aboveDBBS stands for______bulletin board systembusiness broadcasting systembulletin broadcasting systemnone of the aboveAUSENET is a BBS on ____ scalesmalllargevery smallnone of the aboveBInternet can be defined as _______internal networknetwork of networkintermediate networknone of the aboveB_________is a program that displays information about a host connected to the netfinger serviceping serviceftp servicenone of the aboveA_______ is a program or a tool that helps in locating a file anywhere on the netFTPTELNETARCHIEnone of the aboveCURL stands for ____________uniform research locatoruniform resource locatorunlimited restore locatornone of the aboveAA ______ always begins with a slashmessageschemecommand linenone of the aboveCThe World Wide Web is referred to shortly as the _______netwebbrowsereditorB______ is a program that helps us to log on to other networksUsenetfinger serviceftptelnetDHTTP is the acronym for __________Higher text transfer protocolHyper text transmission portHyper text transfer protocolHyper text transfer portC______is used to transfer and copy files over the interneticcpftpuucpnone of the aboveC_____ is a program that helps us to log on to other networksyahooftptelnetnone of the aboveCTCP/IP stands for ________________transfer control protocol/internettransmission control protocol/internet protocoltransfer communication protocol/internet protocolnone of the aboveBHTTP stands for______hotlink text transfer protocolhyper text transfer protocolhigher type transfer protocolnone of the aboveBTwo of the important browsers are_____ and_____lynx,minxnetscape,iemosaic,gophernone of the aboveB________ are defined as ways of communication amongst networksprotocolsIP addressdnsnone of the aboveAHTML stands for_____higher text medium languagehyper transfer markup languagehyper text markup languagenone of the aboveCThe system of interlinked documents is known as_______hot linkshyperlinkbooks marksnone of the aboveBThe small programmes that create animation,multimedia,real-time games and multi user games are called______imagesappletsanimationnone of the aboveBThe information displayed on the web page includes______,_____ and_____graphics,videos,audioprogramms,images,textanimation,scripts,executablesnone of the aboveAThe web pages that represent online home of their author are called______first pagehome pagewelcome pagenone of the aboveB_____ is the most popular internet serviceyahoo serviceelectronic mailsearch enginesnone of the aboveB_______ is a program or a tool that helps us find a file anywhere on the netnewsgrouptelnetftparchiveDYahoo,lycos,excite and webcrawlers are _____search enginesweb directoriesdatabasechannelBGIF is the acronym for ____________Graphical interpreter formattingGraphical interchange FormatGraphical interface formatGraphical Interface formatBJPEG is the acronym for ___________Joint Pictures Expert GroupJumbled pictures expert graphJoint pictures expert graphJoint pictures experimental groupAThe World Wide Web consists of _________informationweb pagesnetwork connectionsmailsBA hyperlink can be on ___________text onlyimage onlytext or imageneither text nor imageCWeb is a collection of ___________web sitesimagesappletsdocumentsAThe two major browsers used to surf the Internet are ________,_______MS Internet Explorer and MosaicNetscape Navigator and MosaicMS Internet Explorer and Netscape NavigatorNone of the aboveCThe internet is also called as _______________arpanetthe netintranetnone of the aboveBThe internet is similar to _________________LANpeer-to-peer connectivitywannone of the aboveBThe net transfers______ from one place to anotherdataparcelpacketsnone of the aboveAThe net provides interesting services like______,______ and______scripting,parsing and compilingnews,cooking and fine artsemail,file retrived,internet toolsnone of the aboveC________ is the ancestors of the internetdnetarpanetARPANETnone of the aboveBDARPA stands for _______________________________________________defensive administrative rank administration networkdedicated and registered projects administrationdefensive advanced research projects administration netnone of the aboveCDARPA is broken into ________ and _______milnet,smaller arpanetmailnet,inetintranet,extranetnone of the aboveANSFNET is the united states provides service to _____ and_____education,researchmusic and dancecooking and diningnone of the aboveAHTML stands for ______________________________________Higher text manipulation languageHotlink text markup languageHyper transfer meta languageHyper text markup LanguageDThe first international IP network connections were established in 1973 with _____ and_____united states and UKengland,norwayunited states & Russianone of the aboveBA_____ is a set of computers interconnected by transmission paths to exchange information in internetserverclientnetworknone of the aboveCA computer that provides a service usable by other computers is called______clientstand-aloneserversnone of the aboveC_____ can be owed by multiple organisationLANMANWANnone of the aboveCData is transmitted in the form of_____ signalsanalogdigitalnon-digitalnone of the aboveBModem stands for __________________Moralize/demoralizeModulation/demodulationManipulate/demanipulatenone of the aboveB______ is the process of the digital signals being converted into a form suitable for analog transmissionMappingModulationManipulationnone of the aboveB________ and______ are two basic ways of getting connected to the internetSatellite link and digital signalsDedicated access and dial up accessCable and wiresnone of the aboveBSLIP stands for ________________Standard long internet protocolStream line internet protocolSerial line protocolnone of the aboveCPPP stands for _____Prime prolonged protocolPoint to point protocolPillar to pillar protocolnone of the aboveBIdentify the need for controls and auditing in a computerised environment.Absence of input documentsLack of visible transaction trailAccessibility of data and computer programsAll of the aboveDThe organisational, management, maintenance and access controls are categories of Application controlsGeneral controlsCheck controlsInput controlsBThe application controls are .Input controlsProcessing controlsBoth A and BNeither A nor BCIdentify the field check - "If a set of values is defined, is the input data one of these defined values?"ListRangeSlabDigitCThe field check that conforms if data input for a field is in a particular format.Format maskData maskField maskInput maskAThe field check on a processed data that fails if a field is not initialized to zero or errors occur during calculation isRangeSignOverflowSerialCThe validation checks applied to a field depending on its logical interrelationships with the other fields in the record are called ..Field checksRecord checksBatch checksFile checksBA group of records or transactions that are contiguous constitute ..Physical batchesLogical batchesBlock batchesTransact batchesA..is the type of batch check (group of records) for all input records of a particular type is done.Control totalsSerial numberTransaction typeSequence checkCGrand totals calculated for any code on a document in the batch are called..Financial totalsRecord totalsDocument totalsHash totalsDControl that checks if correct sequence of commands and update parameters are passed from the application software to the database.Table levelData IntegrityBatch checkSystem testBWith respect to data integrity control, when monetary transactions are processed against master files without a match, we should maintain a .Sequence accountData accountSuspense accountUpdate accountCThe system test that tests the top-level modules first and then the lower modules are simulated with dummy modules to check the interfaces is called .Bottom up testHybrid testStub testTop down testDIdentify the audit technique that examines each transaction as it passes through the system.Embedded codeProgram codeDatabase AnalyzersDatabase codeAThe Core Image Comparison audit technique compares the.Database with master tableExecutable program with master copyTransaction data with master transactionModule programs with snapshotsBThe technique used by an auditor to list unused program instructions is..ModellingAnalyzingMappingTracingCThe sample data created and used for the purpose of testing the application system is called.Test dataTable dataItem dataRecord dataAThe test data (dummy unit) implemented in the normal processing of the system over a period of time is known as.Integrated Test FacilityBlack box Test FacilityGraph testingWhitebox testingAThe test data generated with correctness proof, data flow analysis and control flow analysis tools is called.Test item blockTest data packTest program packTest record packBWhen a real-time system is simulated to generate the same output as the real-time system, the technique is called.Parallel trailingTracing parallelParallel codingParallel simulationDWhen an auditor expands the extent of substantive tests to determine the impact of defects on the attainment of program objectives, the methodology is.Cross reference listerFormulate flaw hypothesesCorrect listerFormulate correct hypothesesBThis is an important control in systems that use digital signatures for authentication purposes.Public audit trailsRandom audit trailsSample audit trailsData audit trailsASelecting transactions based on a sampling rate is called . method.Transaction samplingSystematic samplingSimple samplingDemographic samplingBThe capability of the generalized audit software to read different data coding schemes, different record formats and different file structures is.File sizeFile dataFile accessFile reorganisationCThe audit software capability of frequency analysis is to.Sort and merge filesSampling nth itemFormatting outputClassify data on a criteriaDThe audit functions of attributes sampling, variables sampling, stratified sampling are included in . functions.StratificationSelectionStatisticalReportingCIdentify the functional limitation of a generalized audit software that enables evidence collection only on the state of an application system after the fact.Ex Post Auditing OnlyAnalytical review onlyLimited ability to determine Propensity for ErrorLimited ability to Verify Processing logicAThe purpose-written audit programs are used for..Sorting, creating, and printing filesData retrieval, code comparisonReading data, selecting and analyzing informationSpecific tasks with original or modified programsDPicture of a transaction as it flows through the computer systems is called..ProgramTrackSnapshotPictureCIdentify the type of audit when auditors are members of the systems development team.General auditPost auditSystem auditConcurrent auditDThe processor uses this workspace as a scratch pad during processing.MonitorProcessorKeyboardMemoryD1024 Megabyte is equivalent to:1 KB1 MB1 GB100 MBCThe software used for layout of newsletters and magazines along with text and images is calledApplication softwareDesktop publishingApplication developmentData modellingBThe model used to describe the relationship between data and information is calledSystem modelData modelInformation modelLogical modelAA super computer uses a bus width of16 bits256 bita64 bits8 bitsCWhen a processor executes one billion floating-point arithmetic operations per second, is called..NanoflopsTetraflopsMegaflopsGigaflopsDThe processor responsible for communication to and from all the remote terminals connected is termed as Front-end processorHost processorBackend processorTerminal processorAThe processors used for speed-critical graphics applications areCISCRISCCADCCSICBThe plastic cards with embedded microprocessor and memory are called..Credit cardComputer cardMemory cardSmart cardDVLSI stands for..Very large scale IntegrationVery limited silicon integrationValue limited scale icVery large silicon integrationAThe data width of a Pentium 4 computer is 16 bits8 bits32 bits1 k bitsCThe unit which executes addition, subtraction, multiplication and division operations is CPUALUMUCUBThe instructions to be executed by the processor are loaded from memory into theInstruction unitProcess registerProgram counterInstruction registerDThe results of a process are stored into AccumulatorGeneral-purpose RegisterProcess registerInstruction registerAThe memory that stores data as a series of memory cells that can be accessed sequentially isDRAMSAMSRAMROMBThe technology used to accelerate the processing of a computer is Processor busCache memoryBIOS memoryROM memeoryBThe memory used in a computer's BIOS chip is..Cache memorySRAMOptical memoryFlash memoryDThe process of swapping information between the RAM and hard disk can causeFragmentationDisk fullThrashingPagingCThe standard system bus was replaced by frontside and backside bus called.Dual independent busDynamic memory busCache memory busDual interface busAThe DSP,DAC,ADC,and ROM are parts of the Graphics cardMemory cardSound cardMedia cardCThe bus whose widths are 32 or 64 bits is calledISAPCIAGPMCABThe maximum resolution of a standard SVGA adapter is 1024*640780*10241280*10241280*680C. synthesis method uses recordings of actual instruments.AmplitudeFrequencyPulseWavetableDThe instrument that can produce continuous lines is..PrinterPlotterScannerPenBPPM , CPS are units used to measure the printer's ..SpeedQualityResolutionLinesAThe PCL and postscript are defacto standards forPage definition limitPage description languagesPixel definition languagesPage definition linesBA laser printer has RAM for downloading fonts called the.Font catridgesDynamic catridgesSoft fontsSoft settingsCThe characteristic which refers to how sharply a pixel appears on the monitor is called..ConvergenceResolutionDot-pitchSizeAThe faster the refresh rate, the lesser the monitor..SharpnessResolutionFlickersSizeCThe number of bits used to represent a pixel in a monitor decides the .Size of imageColors and shades of gray that can be displayedResolution and sharpnessSignal and refresh rateBThe input device that utilizes a light-sensitive detector to select objects on a display screen is called..Touch screenTouch padLight scanLight penDThe most commonly used scanner technology is.Charge-coupled deviceOptical character recognitionPhoto-multiplier tubeOptical sensitive tubeAIdentify the type of mice that uses optical sensors to detect motion of the ball.MechanicalOptomechanicalOpticalJoystickBIdentify the input device that consists the puck and the stylus.TrackballJoystickTabletPenCIdentify the disk which has an access time of 30ms.Zip diskFloppy diskWinchester diskJaz diskCA set of tracks across a set of platters in a hard disk is called aDiskCylinderSpiralBlockBThe bus used to connect a CD-ROM to your computer is..SCSIPCIMCADATAThe digital audio tape with the capacity of 24GB of data uses the technology called ..Hyper circlesFero magneticLinear velocityHelical scanDThe floppy disks that support 400k-1.2 MB belong toIBMMacintoshLomegaImationBThe backward compatible disk that has high density-120MB is called.SuperDiskJaz diskZip diskHard diskAThe maximum capacity of an optical disk is 700 MB6 GB630 MB2GBBWhich of the auxiliary storage devices uses the constant angular velocity access technology?Super diskDAT-ROMCD-ROMMO drivesCThe..is an auxiliary sequential access non-volatile storage device.Winchester diskZip diskMagnetic tapeMagneto-optical driveCThe portable device that optimizes the features of the floppy and the CD-ROM is.Hard diskJaz diskDAT drivesMO drivesDThe important central module of an operating system is the..Memory moduleData moduleKernel moduleI/O moduleCIdentify the function of the operating system that manages the tasks waiting to be processed.Job managementI/O managementBatch managementData managementAThis function of the OS manages allocation of a minimum main memory to tasks.Disk storageMemory storageVirtual memory storageExtended storageCIdentify the multitasking type that slices CPU time to each program.ParallelingCooperativeDividingPreemptiveDThe OS which allows different parts of a single program to run concurrently is..MultithreadingMultiprocessingMultitaskingMultiprogrammingAThe OS that monitors external activities with timing constraints is.Multi-userReal-timeMultitaskingMultithreadingBThe 32bit operating system for desktop version that replaces Win 9x is..Win 2000 serverWin 2000 datacenterWin 2000 professionalWin 2000 advanced serverCThe high-level logical disk structure which defines the way the entire disk is organised is ..Frame allocation tableFile allotted tableFormat allocation typeFile allocation tableDA collection of sectors on a hard disk is aBlock sectorClusterBlockTableBThe FAT system that provides long filename support and was written using protected-mode code .FAT16VFATNTFSFAT32BIdentify the file system that provides networking,security,compression, large file support.FAT16VFATNTFSFAT32CThe logical directory structure has a base of the tree called theRoot directoryMain directoryStart directoryTree directoryAThe process used to optimize the disk space by arranging files contiguously is ..FormattingDefragmentationAllocationPartitionBChoose the level of RAID that offers disk mirroring for fault tolerance.Level 0Level 2Level 1Level 3CIdentify the archive formats found on Unix-based Internet sites.Zip, LZH, ARJExe, zp, tzDoc, xls, wzpTar, gz, tazDIdentify the window screen part that indicates the name of the window, application or document.Title barMenu barVertical barControl barAThe button on the title bar of a window that displays the menu to control the size of the window is..Scroll boxControl boxMinimize boxMaximize boxBThe mouse operation that is used to move windows and icons to different locations is ..ClickDouble clickDraggingScrollingCThe start button,tray and shortcuts are important features of the .Control panelTitle barTask barCommand menuCThe start menu option that keeps track of your important websites is ..DocumentsProgramsAccessoriesFavoritesDIf you want the recycle bin capacity to be distributed across partitions, you must use the option Configure drives independentlyConfigure capacity independentlyConfigure drive partitions independentlyConfirm partition capacityAThe feature to retrieve deleted files from the recycle bin is ..Re-pasteDe-linkRestoreRe-copyCThe feature which enables to synchronize files between a floppy and disk is ..My DocumentsMy BriefcaseMy FolderMy DirectoryBA file with the pdf extension can be viewed with the application..Adobe Acrobat ReaderAdobe ViewerNotepadWordpadAThe remote administration access to view shared resources on the network is..Net NeighbourhoodNet TracerNet DriveNet WatcherDThe utility used to access the directory structure, create files and folders etc is.Windows ToolsWindows ExplorerWindows AccessoriesInternet ExplorerBThe font, color, background settings are saved in the ..Control panelMy computerDesktop themesDesktop iconsCThe Notepad utility saves files in the format.BinaryUnicodeHybridASCIIDIdentify the windows feature that allows more than one person to use a single PC with his own desktop.Log offRunFindRestartAYou can quickly access the recently worked on files from this start menu option.FavoritesAccessoriesDocumentsSettingsCThe Internet is a network similar to ..Peer-to-Peer connectivityPoint-to-Point linkPort-to-Port connectionPeer-to-Peer talkingAWhen a computer is connected to the internet through a LANDial-up accessDedicated accessDeployed accessService accessBPPP stands for:Protocol to Protocol PointsPoint to Point ProtocolPin to Pin communicationPort to Port ProtocolBSLIP stands for:Serial Limited Internet ProtocolSerial Lock Inter-ProtocolSerial Line Internet ProtocolSetting Link Inter ProtocolCWhen a user connects to Internet with a shell account it is called .Direct accessDedicated accessIndirect accessDial-up accessDThe launch of DARPA's Internet Protocol (IP) facilitated the term..NetworkConsortiumInternetTopographyCThe costs of Internet implementation are..Connection cost, cost of telephone lineComputer cost, network card costIC board cost, cable costConnection company cost, connection data costAThis software enables a host to work as a terminal on the network.Terminal embeddedTerminal emulatorIndirect softwareTerminal communicatorBThe Windows Internet application functions were developed based on the UNIX programs called..SocketsPackageProtocolSimulatorsAEach computer on the Internet is identified with a.24-bit address16-bit address30-bit address32-bit addressDA mail server robot can automatically.Check mailsRead mailsRespond to mailsDelete mailsCThis protocol is used to check reliability, sequencing and flow control.Transmit Communication ProtocolTransmission Control ProtocolTelnet Control PortCommunication Control ProtocolBTo check that data reaches the destination in a proper order, the data packets are assigned.Order numbersPacket numbersSequence numbersData numbersCThe computer which provides FTP, WWW, Mail services on a network is called.ClientServerHostPCBThe method of accessing files through publicly accessible server that gives free access to the files is called Public FTPServer FTPAvailable FTPAnonymous FTPDThis file is transferred verbatim with FTP service.ASCII fileBIT fileBinary FileTEXT fileCWe can access the Archie server byTunnelWWWTelnetMessageCThe types of Archie servers are ..Straight ArchieWindows ArchieBoth A and BNeither A nor BC% telnet archie.ans.net is the command used by the Archie client to.Login to Archie serverProgram the Archie ServerRequest the Archie serverProtocol the Archie serverAThis tool helps us to locate a file anywhere on the Internet.FTPRemoteArchieArchivesCThe computer that maps the Internet domain name to the Internet numeric address is the ..Network translator serverAddress Naming serverDomain name serverDomain relation serverC.is the format of Internet Address.Aaa-bbb-ccc-dddAaa.bbb.ccc.dddAaa/bbb/ccc/dddAaa*bbb*ccc*dddBThe email address has two parts one is the username while the other is the .DomainNetWebMailAThe resources on the World Wide Web are linked with the naming format ..Universal Resource LocationUniversal Resource LocatorUniform Resource LocatorUniform Reserved LinkCThis Net tool provides a stimulating on-line discussion environment.Internet Relay ChatRelay packet transmissionChat messagingInformation chattingAThe IRC II client program command begins with a .PercentSlashLineDotBThe IRC conversations are organized into.ChatsPacketsLinesChannelsDIdentify the output of the IRC command " /list -min 10" .Display channels with at least four usersDisplay chats with the maximum 10 usersDisplay channels with at least ten usersDisplay line with 10 removed channelsCLynx text browser is a web client in which users can login with ..Self accountsTerminal pingShell accountsShell programsCA web browser provides this hotlist for a user.Book-keepingBookmarkingMenuBookmarksDThe tool to obtain information on the web by menus and more flexible than Archie is.LynxJugglerGopherGatewayCThese servers help in searching for words from a list of databases or documents.WINWAIS and WAISMANWIIS and NETWAISWINNET and WAISLINKWINSRC and FTPWAISAThis scripting language is an object based language and is developed by Netscape.SGMLScriptVbScriptSunScriptJavaScriptDThe one-way broadcast of live events is called.NetcastCybercastEventcastLivemessagingBThis is a system of thousands of distributed bulletin boards and read by a newsreader.BulletinreaderNewsgroupNewsletterNetworkboardBUnix shell provides mailing programs called .Pine and ElmPile and ElemPine and EmbeddPort and ElmAThe Unix to Unix copy mail system separates parts of the mail address with the symbol.....@!#()BThe Netlauncher (TCP/IP) software consists of these programs that can run under Windows.Spy MosaicImage ViewBoth A and BNeither A nor BCThe parts of the WSIRC server (net tool) window are..Server message, command line and channelsServer message,command line and channelsServer message,command line and channelsServer message,command line and channelsCThese are small java programs that create games, multimedia etc. These are downloaded over the Net and executed by a web browser.Java scriptsJava exeJava appletsJava objectsCThe World Wide Web is a collection of..Web windowsNet pagesNet addressesWeb pagesDIt is a link which helps in retrieving information from the WWW easily.NetlinkSitelinkHyperlinkHypernetC..directories deliver information on all the topics on the Internet.Web mapsNet portsWide mapsWeb infosAThis browser does not display links in color.NetsharkCelloLynxMosaicBThe Mosaic browser stores information about the configuration in a/an .Ini fileExe fileWeb fileTxt fileAThis is an indexer that crawls around the web cataloging.WebcrawlerWeb sitesWeb creatorsWeb portsAThe option by which the browser window in Navigator Gold 2.0 can be shifted to editor window is .Edit/New fileEdit/Save WindowNew/Edit pageNew/Edit DocumentDThis toolbar button displays information about web creation.PrinterWeb page starterPagerDocumentBThis window in Navigator Gold does not support frame display.Script windowBrowser windowEditor windowForm windowCThe different ways of communication on the Web are..InterpersonalGroupBoth A and BNeither A nor BCThis download tool provides multi-server connection, can search for mirror sites and provides a file leecher.Download Accelerator PlusFresh DownloadWinZip PlusWebcowAThebutton provides HTML tags for font style, alignments, and colour options.Edit FormatCharacter FormatFile FormatWindow FormatBIdentify the search engine that helps in concept based searching.LycosYahooExciteInfoseekCThis is a text only browser.LycosLynxLinksNetsharkBThe multithreading feature of Netscape is facilitated with a storage space named..ArchiveCacheThreadRetrieverBThe distributed uploading of web pages through Navigator Gold is called..Web loadingWeb updationWeb publishPage publishCThe method of presenting information on the web through highlighted items is calledHypertextWebtextNettextHyperlimitAThe a2z directory is an alphabetical list of pages used by the search engine..NetleecherWebindexerLynxLycosDNetscape browser can display context links on an image called..Image websImage mapsImage graphsImage textsBName the download tool which highlights an area of a page and gets all the links that are within the highlighted area.WebcrawlerWebcowWeblinkerWebcasterB...helps in business transactions, generating revenue and demand on the information highway.E-commerceE-MarketplaceBoth A and BNeither A nor BCThe transfer of structured data for processing from computer to computer using agreed formats and protocols is called..Electronic Document IntercahngeElectronic Data InterchangeElectronic Data InternetworkingEfficient Data InterchangeBThis system involves electronic transfer of funds between financial institutions.Electronic Financial TransmissionEfficient Format TransactionsElectronic Format TransferElectronic Fund TransferDA electronic mailbox stores EDI transactions for later retrieval.Value Added NetworksVery Advanced NetworksValue Aided NetworksValue Enhanced NetworksAThe mutual satisfaction of price, terms and conditions, delivery and evaluation criteria in a marketplace is.Negotiation and BargainingNetworking and BuyingNegotiation and servicingCritical buyingAThe type of advertising, the Broadcast and Junk Mail models are of..PassivePushPortalSmartBIdentify the models of passive advertising.BillboardPortalBoth A and BNeither A nor BCThis layer is responsible for transmitting data as frames.Network LayerData Link LayerPresentation LayerTransport LayerBThis layer is responsible for encoding of data.Link LayerNetwork LayerPresentation LayerPhysical LayerCThis layer of the TCP/IP suite includes the device driver and network interface card.Application LayerLink LayerTransport LayerNetwork LayerBThis protocol is used for flow control, echo and flow redirection.Simple Mail Transfer ProtocolInternet Control Message ProtocolInternet Control Data ProtocolSingle Control Message ProtocolBThe software components that integrates different hardware devices with the operating system..Device driversDevice modulesDevice programsSoftware devicesAThis is the basic component that connects the computer to the network.Cable Interface CardNetlink Interface CardDevice Interface CardNetwork Interface CardDThe dumb terminal/node in a network depends on this computer for their basic functioning.Personal computerClient computerServer computerData computerCThis has an embedded microchip which can both manipulate data and execute applications.Data cardSecurity cardCombi cardMeta cardCTo ensure a reliable communication between the buyer and seller, the protocol used is.Session Socket Layer ProtocolSecure Sockets Layer ProtocolElectronic Socket Layer ProtocolCyber Socket Layer ProtocolBThe financial transactions are to be . leading to different steps in Accounts Compilation.Collected and computedSampled and stratifiedGrouped and summarizedAssets and liabilityCThe basic document where transactions are entered chronologically is.LedgerJournalVoucherTrial BalanceBThese are the basis for analysis by potential investors, banks etc.Journal and LedgerP & L Account and JournalP & L Account and Balance SheetVoucher Account and Balance SheetCThe accounts that the business owns is called .LiabilityIncomeSalesAssetDThe expenditure for running the business for a period is ..ExpenseExampleTaxesIncomeAIdentify the account type by the rule: "Debit the receiver and credit the giver".Real accountsPersonal accountsNominal accountsExpense accountsBThe first document where the transaction is entered is called a ..LedgerLiabilityVoucherExpenseCThe document used for posting of accounting transactions is ....Voucher and journalLedger and trial balanceBalance sheet and trial balanceJournal and ledgerDWhen the debit total is greater than credit total, the amount appears in the .. column.IncomeDebitCreditExpenseBThe methods LIFO, FIFO, Moving Average are used to .Value closing stockValue clearing stockValue expense stockValue income stockAThe report prepared taking the asset and liability type accounts from the Trial Balance is called.P & L statementIncome statementBalance sheetAsset sheetCThe report that depicts operating profit/loss for a period is ..Trial balanceTrading accountP & L statementSuspense accountsCThe day book contains transactions relating to Income or expenditureSales or purchaseAsset or liabilityProfit or lossBThe Bills Receivable details are maintained in a ..Journal sheetVoucher debtorsSundry debtorsOriginal entryCCreditors ledger has details of your dues to ..CustomersAssetsLiabilitiesSuppliersDThe sundry debtors are placed in the Balance sheet on the Income sideAssets sideExpense sidePayable sideBThe first step in Tally before any transaction is entered or saved is creating a FileCompanyProjectApplicationBTo configure country specific details use the function keyF10F2F12F11CIdentify the security mechanism used in Tally.Tally SecureTally PackTally GroupTally VaultDAfter selecting a company in Tally, you will be in theAccounts of TallyGateway of TallyEntry of TallyGroups of TallyBTally software is based on accounting system.SalesProductionMercantileManufactureCIdentify the primary group of capital nature that uses bank account and cash in hand as sub groups.Fixed assetsCurrent assetsLoan assetsCapital assetsBAll financial entries in Tally are done using.VouchersGroupsJournalLedgersDThe Direct expenses, Purchase account, Direct income are primary groups of ..Capital natureExpense natureRevenue natureIncome natureCThe option to delete a sub-group is admissible through the menuAlterDeleteDisplayShiftAThe behavioural attributes of this group cannot be changed.Sub-groupLedger-groupPrimary-groupAlter-groupCCredit limits for personal accounts and branches can be done in the ledger modeSingleMultipleSub-groupAlter-groupBWe are not allowed to delete a ledger from this mode.SingleSub-groupAlter-groupMultipleDAll account heads except Cash and Bank are placed in theSub Ledger masterGroup Ledger masterGeneral Ledger masterJournal Ledger masterCIdentify the primary group of capital nature that has the sub-groups: Bank OD Account, Bank OCC Account.ExpensesIncomeAssetsLoansDThe primary document for recording all financial transactions in Tally is theJournalTrial sheetVoucherFileCYou can customize the voucher entry screen using the function key.F13F12F10F11BIdentify the voucher type that records fund transfers between cash and bank accounts.Credit NotePaymentReceiptContraDThis voucher type records adjustments between ledgers.SalesReceiptPaymentJournalsDThe use of classes for payment, receipt and contra vouchers enables data input in Double entry modeList entry modeChoice entry modeFile entry modeBThe details of a voucher entry can be given in the .CommentMemoFileNarrationDThe credit note voucher can hold account types: ..Sales account, Sales tax accountLedger account, Bank accountSuppliers account, Purchases accountBuyer's account, Cash accountAThe suffix and prefix details for the voucher type can be made applicable only from the .End of a monthFirst of a yearFirst of a monthEnd of a monthCThe voucher used to record all bank and cash payments is ..Credit NoteContraSales NotePaymentDTally's age-wise analysis considers the voucher's Previous dateEffective dateCurrent yearConfigured dateBArrange the steps in generating the books of accounts.1. Create Trial balance2. Create new ledgers3. Generate Day Books4. Update journals for financial transactions1, 2, 3, 41, 3, 4, 22, 4, 3, 13, 4, 2, 1CFor day-to-day transactions the voucher types used areCredit purchaseCash purchaseBoth A and BContra purchaseCSay for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be entered into the voucher type..LoanPaymentReceiptSalesBIdentify the purchase voucher type, the transaction for purchase of 10 CPUs,10 monitors by credit.Credit PurchasesCash PurchasesExpense PurchasesDebit PurchasesAIdentify the voucher type to be chosen for the sale of computers to Anand by cash @ Rs.210000 per unit.Cash LedgerSale SheetStock JournalPurchase VoucherCA bank overdraft repaid by cheque at Rs.25000 can be made in the voucher..PaymentReceiptDebitContraDThe financial statement that consolidates ledger balances is ..Balance sheetProfit & Loss statementTrial balanceJournalCThe F9 function key in the left side of the Gateway of Tally screen displays theAccounting reportsInventory reportsP & L reportsExpense reportsBThe option on the Gateway of Tally that will generate the P&L account statement is..Net LossNet IncomeNet ProfitNet AccountCThis displays the balance daywise for a selected voucher type.Record bookLedger bookJournal bookDay bookDThe feature in Tally to analyze accounts of a company is..Ratio analysisAccount analysisData analysisTransaction analysisAThe age-wise statement is displayed based onIncomePayablesExpensesLoansBThe ratio analysis of receivables can be done based onBill dateEffective dateVoucher datePrevious dateAName the statement that helps the management in the decision making process.Data flowFunds flowStock flowCheque flowBIdentify the budget type which is chosen where transaction amounts are to be monitored.On closing balanceOn net credit flowOn net transactionsOn net cash flowCChoose the budget type to be used where bank accounts balances are to be monitored.On closing balanceOn net credit flowOn net transactionsOn net cash flowAThe management that needs to consolidate the accounts of its various enterprises uses . in Tally.Consolidate companyGroup companySet companyAlter companyBIdentify the user who can access audit trails in Tally.OwnerData Entry operatorAccountantAdministratorDIdentify the accounting feature in tally that facilitates splitting financial years for a company data.Month-less accountingYearly-entry accountingPeriod-less accountingTransaction-number accountingCThe tracking of changes in vouchers and ledger masters is done by..Tally VaultTally AuditTally ReportTally GroupBTally can import data from other programs and creates a log about the activity in the file..Tally.impTally.cfgTally.expTally.oleAImport and export of data between Tally and other programs is possible with the help of..OLEDBMSODBCMS-XLSCThe manual option of voucher numbering leads to..Auto numbersDuplicate numberSequence numberRange numberBThe Tally audit trail tracks changes made to vouchers that are ..more than 30 Days oldless than 30 Days oldmore than a day oldmore than a week oldAThe ratio analysis of Bills Receivables or Bills Payables can be displayed with the function key..F5F8F12F6DIn IDEA, import Assistant wizard is used to import data from____________.ExcelAccessXMLAll of the aboveDIn IDEA, Append functions can be used to_________.Import dataAdd data at the endSortFilterBIn IDEA, Statistics functions can be applied on_________.Numeric DataDate DataBoth A and BNone of the aboveCIn IDEA, increment value in Stratification function can be fixed or free interval.FALSETRUEBIn IDEA, Stratified Random functions is a part of which menu.AnalysisDataRelationSamplingDWhich of the following is not an Audit SoftwareACLIDEAUnixSOFTCAATCUsing which functions to perform more complex calculations and exception testing in IDEA?Equation Editorfunction EditorCalculation EditorTesting EditorAWhich is the step by step procedure for reporting in IDEA.File->Print->Create ReportClick on Create Report button on the Operation toolbars->Report Assistant.Both A and BFile->Select Export -> Print Report.CWhich of the following are categories of computer audit function ?Items of audit interestData AnalysisSystem validationAll of the aboveDIn the following list which is not an audit function ?SortingFilteringSamplingExportDIn the following list which is a audit function?File DefinitionStratificationPrint PreiviewAppendBWhat is the procedure for importing data into IDEA ?File->Import Assistant-> Import to IDEAFile->Import -> Import to IDEAFile->Import as -> Import to IDEAFile->Select Import -> Import to IDEAAWhich is the following step involved in a source code review methodology ?Review Programming standardsUnderstand program specificationsFormulate flaw hypothesesAll of the aboveDIn IDEA which functions should be used to find repeated values ?DetectionExcludeSequence checkingFilterAIn IDEA, Stratification functions can be applied on which type of data ?Numeric DataDate DataCharacter DataAll of the aboveDIn IDEA,Summarization accumulates the values of Numeric fields for each____________.Primary KeyUnique KeySecondary KeyComposite KeyBIn which sampling,selecting sampling units using a fixed interval between selections is_______________.RandomSystematicAll of the aboveNone of the aboveBEnsures that all combinations of sampling units in the population have an equal chance of selection is____________.RandomSystematicAll of the aboveNone of the aboveAIn Audit tool, to built relation between two tables, both table should have_____________.Common TableCommon FieldCommon recordNone of the aboveBInput Control method is a part of Application Control Group.TRUEFALSEAWhich is the following type of check that can be run when data is input through terminal ?Field checkFilter checkCompare checkData checkAWhich is the following is the correct types of Field checks on processed data ?OverflowRangeSign TestAll of the aboveDIDEA exports data in a number of _______________________.textdatabasespreadsheet and mail merge formatAll of the aboveDWhich is the following is the correct types of Record checks on input data ?ResonablenessCompareUn-compareRandomnessAWhich is the correct types of Batch Checks ?Control TotalsOutdated checksOn-line dated checkedMixed dated checksAWhich is the need for table level tests ?Data IntegrityControls are required for authorizationBoth A and BNone of the aboveCWhich is the following is the major points with respect to inter table tests ?This may make the entire child tables referenced by the master field in the main table un-availableTheir Master & Child relationship reference the table from one anotherBoth A and BNone of the aboveCWhich is the software used by the auditor to take a view of a file of data or transaction passing through the system at a particular point of time ?MappingSnapshotsModellingSource comparisonBWhich is the software used by the auditor to compare the source version of a program with a secure master copy ?Souce comparisonCode compasionModel comparisonExe comparisonAWhich is the techniques whereby the auditor arranges or manipulates data either real or fictitious, in order to see that a specific program or screen edit test is doing its work ?Debug TestingLogic TestingOff-line TestingOn-line TestingDWhich is the software used by the auditor to list un-used program instruction ?Log AnalysisMappingProgram LibraryAll of the aboveBWhich is the software used by auditor to read and analyze records of machine activity ?Machine levelExecutable levelLog Analyzers SoftwareSystax levelCWhich of the following reason strongly call for Control & Audit Function ?Lack of Visible Transaction TrailAbsence of Input DocumentAll of the aboveNone of the aboveCIn IDEA,Data Extraction select data form a file for further___________ for creating a new file of logically selected records.ExtractionRecordingInvestigationSortingCWhich is the correct types of Field checks on input data ?Missing dataBlank dataBoth typeNone of the aboveCWhich is the major points to be consider with respect to System tests ?To ensure the input data is valid before entering the valueTest whether the overall system meet the requirement specificationsTo ensure the entered data is saved without failAll of the aboveAIn Data analysis techniques, which law is used to idenfity statistical report on numeric data ?Bend LawBenjamin lawBenford LawBritish LawCWhich is not a feature of File reorganization with an auditor perspective?FilteringSortingIndexingLinking the identified filesAWhat do you understand by the term, Data Consistency in using CAATs?Establish relationship between two or more tables as required.Identify fields, which have null values.Identify data, which are not in agreement with the regular format.Identify whether all fields have valid data.CFunctions involving use of arithmetic operators, which enable performing re-computations and re-performance of results is an example of?Statistical functionArithmetic functionLogical functionRelational functionBWhich of the following is a benefit of using CAATs?File an FIR based on audit findingIdentify an audit finding w.r.t. materiality in an IT environmentInvestigation of fraud in audit areaTo give assurance to customers about the performance of the companyBWhat is step by step procedure for using Bendford's law function in IDEA ?Data->Benford's LawAnalysis->Benford's LawSampling-> Benford's LawTools->Benford's LawBA Benford's Law analysis is most effective on data________________.Comprised of similar sized values for similar phenomena.Without built-in minimum and maximum values.Without assigned numbers, such as bank accounts numbers and zip codes and with four or more digits.All of the aboveDIn IDEA, blank value data can be extracted by using_________.@isblank()as NullNullIs NullAIn IDEA, Summarization, Pivot Table, Stratify, Duplicate Key functions comes under which menu.DataAnalysisSamplingRelationBIn IDEA, Extraction, Sort, Indices, Search functions comes under which menu.AnalysisViewRelationDataD_______ is centralized Banking Application Software.Core Banking SystemCore Banking SolutionComplete Banking SolutionCentralized Banking SolutionBFlexcube developed by ________InfosysHCL TechnologiesTCSI-FlexDQuarz developed by ____InfosysHCL TechnologiesTCSI-FlexCThe server is a sophisticated computer that accepts service requests from different machines which are called__________ClientsCustomersPartyIPA__________ server has to be a powerful and robust system as it has to perform all the core banking operations.Antivirus ServerApplication ServerWeb serverClients ServerBATMS stands for_________Automatic Telephone MachineAutomated Teller Machine ServerAuto MachanicAllow to MachineBIBAS stands for ___________Internet Business Application ServerInternet Banking Application ServerInternet Banking Application softwareInternet Business Authenticatin serverBPBF stands for________Positive Balance FilePost Balance FilePositive Balance FilePositive Balance FlexCInternet banking refers to a banking transactions routed through the ________BankInternetIntranetNet bankingBCPPD Stands for ______________.Computer Planning and plant departmentComputerized Planning and Policy DepartmentBoth A &BComputer Planning and Policy DepartmentDThe _________ is generally a hardware and it plays the role of preventing unauthorized access.Date base ServerWeb serverProxyFirewallD_________has several components which have been designed to meet the demands of the banking industry.CBSCSBNEFTNoneA________enable data transmission over different networks.SwitchesFirewallRoutersMiddlewareC_________have many ports that are connected to different systems and it facilitates data transmission with the network.RouterSwitchesFirewallMiddlewareBA Proxy server always acts in conjunction with a _________.FirewallInternetAntivirusNoneAThe ________ provides network security by preventing malicious data from entering the network.ATM ServerProxy ServerDate base ServerWeb serverB_________is used for authentication.System auditsystem administrationDomain ControllerNetwork securityCAccess to a set of servers is controlled by the ________.System auditsystem administrationLibrarianDomain ControllerD________is a process of unauthorized entering a network.Data base administrationHackingRoutorsThrashingB____________ facility provides a customer to access financial transactions in a public place.Automatic tele MachineAutomated Teller MachineAutomated Technical MachineAccelereated Teller machineBWhich is the Function of ATM?Cash WithdrawalBalance InquiryRegistering requests for Cheque bookAll the aboveDEvery bank branch should madatorily have a security policy.FALSETRUEBCore Banking Solutions is a combination of an application software and ________Network devicesFirewallIBASIBDSAThe Operational Controls include controls on ___________Physical AccessLogical AccessEnvironmental ControlsAll of the aboveDApplication Controls are broadly classified into __________________Input ControlsOutput ControlsProcessing ControlsAll of the aboveD__________controls check that the data entered is complete and correct.Input ControlsOutput ControlsProcessing ControlsAll of the aboveAReasonableness check is a _________.Processing ControlsInput ControlsOutput ControlsManagement ControlBWhich of the following is not a module of the CBS?Customer ID generationAccounts managementEquity Share managementClearing ModuleCBank guarantees can be __________________________Performance GuaranteeDeferred Payment GuaranteeBoth A & BNone of the aboveCSLR stands for ________________________________Statutory Liquidified RatioStatutory Liquidity RatioStandard Liquidity RatioStable Liquidity RatioB________are record of activities that have taken place in the system irrespective of the modules.LogsIndexActivity LogsNone of the aboveAThe contents of a log includes _____________________Activity performedUser detailsDate and TimeAll of the aboveDCommunication and Operations management must include which policies?E-mail policyFirewall security policyInternet policyAll of the aboveD______ is a large data housing infrastructure that provides high band width access to its clients.ATM ServerData CentreITEDPBLogs of the various activities in CBS can be deleted immediately and also be accessed by anybody.TRUEFALSEBCRR stands for _________________________ in terms of CBS.Cash Reserve RatioCommunity Reserve RatioCash Reversal RatioCash Reimbursed RatioADoes the IS Audit also include audit of the outsourcing activites carried out in the CBS system?YesNoADRP stands for ___________________________ in terms of CBS.Disaster Recovery PlanningDiscovered Resources PlanningDisastrous Recovery PlanningDisaster Recording PlanningA_____________are soultions applied when any kind of vulnerabilities discovered in networks in the CBS system.PatchesLogsAccess RightsNone of the aboveA__________can be viewed only by the DBA of an organisation.Access Rights LogsDatabase LogOperating System LogActivity LogBIs performing periodic vulnerability assessment of the networks is necessary?YesNoAKYC stands for _________________________________ in terms banking.Know Your CustomerKnow Your CompanyKnow Your ConnectionKnow Your CentreAIn CBS, the Accounts Management module deals with _____________________Creation of Savings AccountCreation of Current AccountOverdraftAll of the aboveDSoft copy of the ATM journal rolls is called_____________Stock JournalJournal ReportElectronic JournalAll of the aboveCData centre servers are known as_____________.Application serversData Base ServersWeb serverAll the aboveDThe ATM switch consists of a _____________________computerserverBoth A & BNone of the aboveC_______________testing should be done to check the unauthorised access to the network in CBS.PenetrationHierarchicalTop downBottom upA_________enables transfer of money from one bank to another in "Real time" and on "Gross" basis.EFTNEFTRTGSNone of the aboveCIn _______system money transfers are done on a one to one basis while in _______system transfer is done in batches.NEFT, RTGSRTGS,NEFTEFT,RTGSNone of the aboveBAll the money transfers take place in the books of the _________________Beneficiary bankCentral bank(RBI)Remitting bankNone of the aboveBEFT and NEFT work on _______________basisDNSHSMSSMAll of the aboveA________system of money transfer is primarily used for large transactions.NEFTRTGSEFTAll of the aboveBIn RTGS, the STP generates an ___________for every outbound RTGS transaction.UTNUTEUTRUTSCUTR full form _________________________________ in terms of CBS.Unique Transaction ReferenceUnidentified Transaction ReferenceUnique Transmission ReferenceNone of the aboveASTP stands for ________________________________ in terms of CBS.Straight Through ProcessingStraight Temporary ProcessingStrict Through ProcessingNone of the aboveA________ is a method of creating virtual networks within a physical network.VLANLANWANMANACMS stands for ______________________________ in terms of CBS.Control Management SystemCash Management SystemCore Management SystemCentre Management SystemBWhich of the following statements is true?Audit of internal controls is not needed at allSystems audit are important for the verification of the internal controlsAudit of controls in any banking environment is performed using software auditNone of the aboveBThe Management Controls does not include ___________Managing of AssetsFormulating a security policyDeveloping a business continuity planningLaying down procedures for system developmentA_______is supported by advanced technology infrastructure and has high standards of business functionality.FirewallInternet bankingCore Banking SolutionWeb centreCCBS Software resides in a Central application server which is located in the ___________ATM Data centreMiddlewareWeb centreCentral Office Data Centre.DA________ that runs the core banking solutions (CBS) and is centrally accessed by the branches.ATM ServerCentral Application ServerDatabase ServerDomain Name ServerBThe _________of the application is capable of only entering the data at the end point that is branches.System versionApplication VersionClient versionFirewallCThe application server would be placed in a trusted inside zone in a separate ____________Virtual Local Area NetworkLocal Area NetworkWide Area NetworkPersonnal Area NetworkAApplication software would access the ________Data base serverATM DATA ServerDomain Name ServerApplication ServerA__________ are capable of being connected only when devices are connected to a switch.LANVirtual NetworksMANWANBData communication between ______ VLANs can be controlled as per business requirements.1234BA special feature of STP is that _____________ number for any outbound RTGS transaction is generated by the STP System.Unique Transation ReferrencePIN NOUniform Transaction ReferenceNoneC_____________refers to the process of developing software which would produce the required output from the input provided of course, using the necessary hardware and communication systems.Application DevelopmentSoftware DevelopmentServer DevelopmentSystem DevelopmentDThe______________is essential to ensure that computer security records are stored in sufficient detail for appropriate period of time.Review ManagementRTGSLog managementAuthorized ControllerCWhich of the following is False in case of penetration testing in an IT environment of CBS?is a legal attempt at gaining access to protected computer systems or networks.Ensure recoverability of data in case of system failure.The purpose of the test is to identify security vulnerabilities and then attempt to successfully exploit them.This is often the most preferred test as it is an accurate simulation of how an outsider/hacker would see the network and attempt to break into it.BWhich of the following is erroneous statement in case of Change Management Control?Unit test, system test, integration test all should be carried out.Well documented process should be there incorporating all the changes.Implement new/ changed programme as per schedule.It is important that correct latest version of programe is used but version number need not be changed.DWith respect to the customer changing the Pin at the ATM which procedure is the false procedure?Old offset value used to derive new PIN.Old Pin verified using HSM/SSM.Natural Pin remains the same.Old offset value erased and new offset value generated.AIN CBS, changes to the application server are not made directly to it, instead done first on a __________Trail serverValidate serverTest ServerNone of the aboveCAll the various servers in the central data centre are seggregated through _______LANsVLANsWANsMANsBThe __________ is a complete process in the computer so that it ensures that data that is fed in conforms to certain prerequisite conditions.ConsalidationPassword PolicyprotectionValidationDWhen the central Data base is busy with central end of day activities or for any other reason, the file containing the account balance of the customer is sent to the ATM switch. Such a file is called __________Positive Balance FileApplication ServerCentralised Data base securityCentral Office Data Centre.ABank mate is developed by the _______InfosysHCL TechnologiesTCSI-FlexBThe IBDS is located in a ____________Militarised zoneCity ZoneState zonedemilitarised zoneDThe main components of Internet Banking system consist of __________Web serverIBASIBDSAll the aboveDCopy of the Anti Virus Software was updated promptly and regularly at the Data Centre and pushed into all of the servers and in all the systems in the branches by ________Hacking MethodPush-pull methodBoth A &BNone of the AboveBThe __________which is also residing in the server at the branch actually does the banking operations.Sytem softwareutility softwareApplication SoftwareApplication ServerCIn Core Banking concept all the systems of the bank are connected to the Central office by means of a connectivity which may be either a _________ or a dial up line.local lineLeased lineBroadbandNoneBThe ________ is generated by the software and directly sent to equipment for printed the Pin Mailer.16 digit numberPersonal Identification NumberNet transaction ID NOATM NoB____________would also include the existence of built in controls in the system to ensure proper processing of input data so as to provide the required output.Output ControlInput controlProcess ControlData ControlC____________refers to an arrangement wherein the issuing bank acts on the request and instructions of a customer.Letter of CreditLetter of TaxLetter of PayableLetter of ReceibleA_______________ is a process by which the bank ensures the maintenance and recovery of operations.Business Recovery PlanningBusiness Continuity PlanningDisaster Recovery PlanningNoneBAt which phase of testing the version of software is called beta version?Programmer testingUser testing(a) & (b) bothNone of aboveCFinacle developed by _________InfosysHCL TechnologiesTCSI-FlexAIn an Organization structure of IT Department which of the following function is incompatible?Database Administrator and Security Administrator.Network administrator and Database Administrator.Network Administrator and Security Administrator.Tape Librarian and database administrator.BThe number that is stored in the ATM switch is the difference of which of the following number?Pin No - offset valueOffset value - Pin NoPin No - Natural PinOffset Value - Natural PinCThe information retrieval of transactions taking place at ATM located at remote locations is through _________Soft copy of Electronic journalHard copy of Electronic JournalCash register(a) and (b) bothAThe number that is generated as soon as the customer inserts the card in the ATM machine is __________Offset valuePin sent to customerNatural PinCard NumberCWhich is not a Database management system.UnixOracleSybaseFoxproAThe data can be entered into a table in the ____________ view.DesignDatasheetDataviewAll of the AboveBMS Access provide__________ datatype to create link to a web page,file,or email address.LinkHyperlinkInsertAttachedBTo make a switchboard appear while opening the database.Set as database startup Option in Access OptionSet as Form startup Option in Access OptionSet as Switchboard startup Option in Access OptionNone of the aboveCTo add or delete buttons to Switchboard, which option is used in Switchboard Manager is used.Add OptionEdit OptionModify OptionBuild OptionBThe Switchboard Manager is a dialog box that allows creating a switchboard for an Access database.TRUEFALSEAA macro can automate data entry in Access 2010.FALSETRUEBWhich of the following data-type is not available in MS-ACCESSTextNumberAlphaNumericDateCThe validation can be defined at____________ level in Access 2010TableFormBoth A and BReportCA macro can be attached to an event of a control_________________________.A formA reportA buttonAll of the aboveDHow to add switchboard in Access 2010?Click->File tab->Option Button->Quick Access Toolbar->Command not in Ribbon->Switchboard Manager->Add->OKClick->File tab->Option Button->Command not in Ribbon->Switchboard Manager->Add->OKClick->File tab->Option Button->Quick Access Toolbar->Switchboard Manager->Add->OKClick->File tab->>Quick Access Toolbar->Command not in Ribbon->Switchboard Manager->Add->OKAThe command Design Application performed action____________ on switchboard.Close the current databaseOpens a secondary switchboard.Opens the Switchboard Manager.Opens a report in Print Preview.CIn a Query the data can be sorted basedSingle columnMultiple columnsBoth A and BNone of the aboveCSwitchboard Manager only allows a maximum of __________command buttons on a switchboardNineEightSevenSixBMS Access 2010 provides a __________pane that contained large list of actions to be chosen,enabling a wide range of commands that can be performedAction ListAction CatalogAction queryAction BoxBSQL is considered to be a __________2GL3GL4GLNone of the aboveCWhich action in MS Access macro applies a fliter or query to a table,form or report.DoFilterFindFilterApplyFilterUseFilterCOpens a query in the Datasheet view, Design view, or Print Preview which macro action used in MS Access.OpenQueryShowQueryRunQueryFindQueryAAmong +, , MOD, AND, XMLGo to External Data ->Export, click on More and select XMLRight-click the table and select send as XMLBoth A and BAIf we are using the same table for main query and sub-query,we need to provide___________.Alternate names to the tablesNo need to alternate name to the tablesAliases name to the tablesBoth A and C.DUpdate Query can be used to update_________ in MS Access 2010.Single RecordMore than 1 recordBoth A and BNone of the aboveCDelete Query can be used to deleteSingle RecordMore than 1 recordBoth A and BNone of the aboveCHow many Primary key constraints can create in a table______.Only oneTwoAs manyAll of the AboveAUnmatched Query can help to find records that have no corresponding reord in other tables.FALSETRUEBMS Access 2010 provides queries that can be used for obtaining the aggregated results instead of individual records are____________.Sum()Count()Avg()All of the aboveDA function that Counts the set of values that satisfy the given criteria in MS Access 2010 is___________.CountA()Count()Countif()All of the aboveBThe _________ operator is used to find the null records in a table."= NULL"NULLIS NULLAll of the AboveCAggreagate Query also known as___________.Group By queriesTotal queryAction queryBoth A and BDWhich Query wizard is used to find repeated records in a table?Simple Query WizardDuplicate Query WizardCross table Query WizardAll of the AboveBAppend Query is used to ______________ in a table in MS Access.Add RecordsDelete RecordsView RecordsUpdate RecordsAWhich type of joins not available in Access 2010?Inner joinLeft outer joinRight outer joinFull joinDA join returns only those rows from both tables that match on the joining field is___________ in MS Access 2010.Inner joinLeft outer joinRight outer joinFull joinAThe query returns all of the rows from left table, and also those rows from the right table that is known as____________.Right outer joinLeft outer joinInner joinNone of the aboveBThe query using ___________ returns all the rows from right table, and also those rows from the left table that share a common value on both sides of join.Right outer joinLeft outer joinInner joinNone of the aboveAHow can we add a table to the Query Design window_________?Select Create-> Add TableSelect Database Tools-> Add TableSelect Design -> Show TableSelect the table from navigation Pane.C___________can be considered a questions in a data base.QueriesFormReprtMacroAOperands can be_________ in MS Access 2010.LiteralsIdentifiersFunctionAllDWhen you create relationship between two tables, the Common field's data type should beText & NumberNumber & Textdifferent data typeSame data typeDIn example "Hello"+" " +" everyone" ,hello is _____Text LiteralDate LiteralNumber LiteralNone of the aboveALength("Ms Access") will return the count of charcters is __________.9876AAND ,OR is a kind of ________ in MS-Access 2010.ArithmeticLogicalComparisionNone of the aboveBComparision operators is also known as_______ in MS-Access 2010.ArithmeticLogicalRelationalNone of the aboveCLIKE operator works with______in MS Access 2010.TextDateBoth A and BNone of the aboveCIN operator is used __________ in MS Access 2010.To match the value to a set of valuesTo find the null records of given tablereturns true or falseNone of the aboveAOperator precedence is similar to _____ that is follwed in Algebra in MS-Access 2010.BODMASBOMDASBODSAMNone of the aboveAText files that are organized properly fall into one of two types are__________Delimited filesFixed-width filesBoth A and BNone of the aboveCTo create an unmatched Query using wizard, minimum required number of table or fields is_________.onetwothreefourBWhile creating the query, the criteria can be set inOnly oneMore than One FieldAs many fieldAll of the AboveDSQL stands for____________________.Sub Query LanguageStructured Query LanguageStructured Question LanguageSystem Query LanguageBIn MS Access query which logical operator returns True if both the expressions compared are true.IF ANDANDBoth ANDLIKE ANDBIn MS Access query which logical operator returns True if either of the expressions compared are true.ORIF ORIS ORLIKE ORAEnfore Referencial Integrity option is used to restrict enerting data inParent TableChild TableAny one tableAll of the AboveBIn MS Access left("Access",3) function will return__________.Acc3Acc3AccessBWhich function is used to converts the text to lower case in MS Access 2010.Lcase()Lowercase()Lower()None of the aboveAWhich function is used to remove leading or trailing spaces in a text in MS Access 2010.Remove()Removetext()Trim()None of the aboveC_____________ is contains a set of predefined functions in MS Acccess and helps build complex expression.Expression DesignExpression BuilderExpression BoxExpression elementsBWhich of the following is a Database SoftwareExcelOutlookOracleC++CWhich of the following is not the characteristics of a Relational Table?Each Table row represents a two-dimensional structure composed of rows and columnsEach row/column intersection represents a single data valueThe order of the rows and columns is immaterial to the DBMSEach column has a specific range of values known as the Tuple domainDWhich record will be retrieved if the query criteria is < #1/1/11#?All values less or more than 1,195Value less than 95 charactersRecords with date before 2011All of aboveCMS Acces 2010 reads and writes to the .accdb file format in chunks also known as_____________.PagesEncrypt pagesBase DatabaseNone of the aboveAThe tab in Expression Builder in which we write expressions is known as _____________.Expression ElementsOperator ButtonExpression BoxExpression Builder windowCThe criteria expression LIKE?B*.Will match all text starting from BWill match all text ending from BWill match all text having second character as BWill match all text starting with a digitA__________ queries are useful for summarizing information, and are somewhat similar to pivot tables in MS-Excel.Select queryCrosstab queryAction queryParameter queryBWhile entering record in Datasheet view, in which order the records can be enteredAlphabetical OrderAt the end of the tableAny where in the tableBeginning of the tableBWhen you delete the record in form, it deletes the record from__________.Form onlyForm but not in tableTable but not in FormForm & TableDHaving clause is used in the aggregate query in MS Access 2010FALSETRUEBThe controls that are not linked to any field of the table or query on the form are known as ________.ActiveX controlUnbounded ControlsGraphics ControlBound ControlsBWhich property of the form can be used to insert a background image in MS Access 2010?CaptionBackgroundRecord SourcePictureD___________ is a report that is inserted in another report in MS Access 2010.Inner-ReportSub-ReportInside-ReportInsert-ReportCA bound main report is based on a ______________ and its _____________ contain realted information.Table or query,Inner-ReportTable or query,Main-ReportTable or query,Sub-ReportNone of the aboveCDDL stands for ____________Data Definition LanguageData Defined LanguageDetailed Definition LanguageData Detailed LanguageAA___________used to compare multiple values of categories or differences over a period of time.Pie ChartArea ChartBar ChartColumn ChartDA________used to compare trends over a period of time.Pie ChartLine ChartBar ChartColumn ChartBTo create a read-only copy of the database, which of the following file format can be used?.ACCDB.ACCDE.MDW.ACCDTBThe database administrator created a split database and created a front-end database and back-end database file.Which of the file should be stored on the server ?Front-end databaseBack-end databaseBoth of themNone of themBTo make database package and digitally sign using which option in Access 2010 ?File->Save&Publish->Save Database as->Package and signFile->New->Save Database as->Package and signFile->Save as->Save Database as->Package and signFile->Save&Publish->Save Object as->Package and signAIn which formats can the Collect Data through email message feature can send the data entry form?HTML and InfoPathAccess FormsVisual Basic ApplicationExcel attachmentAOnce a mail is sent using the collect data through email message feature in Access 2010. The mail status can be checked using________________.Export to OutlookOptions in Tool menu of AccessManage repliesAll of the aboveCThe ___________ type of data cannot be collected using Collect data through email messages.TextNumberDate/timeAutoNumberDWhat is the memo data type field used for?To add tableTo store objects created in other programsFor long text entriesFor shout text entries of no more than 255 charactersCThe filter By selection feature allows you to filter:Those records that match an entity in a fieldRecords based on a criterion you specifyRecords that meet any of several criteria you specifyAll of aboveADML stands for _____________Detailed Maintaining LanguageData Maintaining LanguageData Manipulation LanguageDetailed Manipulation LanguageCWhich editor was provided for use with Access Basic?The Visual Basic 1.0 editorNotepadThe QuickBasic editorAll of aboveBHow do you update Pivot Table report data after changes are made to the source data?Save your changes, close the workbook, and then reopen it.Select the Pivot Table worksheet and press F9 on the keyboardClick the report, and on the Pivot Table toolbar, click the refresh data buttonAll of the aboveCWhat are the different views to display a Table ?Datasheet ViewDesign ViewPivote Table & Pivot Chart ViewAll Of AboveDWhich Of The Following Creates A Drop Down List Of Values To Choose From?Ole ObjectHyperlinkMemoLookup WizardDA __________ Enables You To View Data From A Table Based On A Specific CriterionFormQueryMacroReportBThe Database Language That Allows You To Access Or Maintain Data In A DatabaseDCLDMLDDLNone Of AboveADCL Provides Commands To Perform Actions LikeChange The Structure Of TablesInsert, Update Or Delete Records And Data ValuesAuthorizing Access And Other Control Over DatabaseNone Of AboveCWhich is not a Database Model ?Network Database ModelRelational Database ModelObject Oriented Database ModelStructureed Database ModelDWhich Of The Field Has Width 8 Bytes?MemoNumberDate/timeHyperlinkCThis Is The Stage In Database Design Where One Gathers And List All The Necessary Fields For The Database Project.Data DefinitionData RefinementEstablishing RelationshipNone Of The AboveAWhenever a tables gets update, the dependent query willNot updateupdate automaticallyhave to update manuallynever updateBThe Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A ___________ Between TablesRelationshipJoinQueryNone Of TheseAWhat is the purpose of the Switchboard Manager in Microsoft Access 2010?To build a main switchboard form that controls all other forms.Creates the macros used to program an automatic application.To allow the user to switch from one database file to another.To allow changing from one report to another.AHow does a query-based report differ in design to a report based on just one table?The reports are restricted in size.It doesntIt doesn't have as many design options.The only report type available is the Design Report.BHow would you include some plain text into a mailing label report?Type the text directly into the label.Use the > button.Use the Mailing label wizard text option.Use the >> button.CIn a Microsoft Access 2010 report, the page numbering would most likely be placed into the:Report FooterSection HeaderPage FooterPage HeaderCIf you wished to present a professionally looking form on screen that would show all the necessary information, which of the following form design tools would you most likely use?Pivot TablePivot ChartAll The tools of the form design control gallery.Form Wizard ColumnarCWhat are the benefits of an ACCDE file__________________________ in AccessReduces the size of the databaseOptimizes memory usage and improves performance.Protects the VBA code from being viewed or edited while still allowing it to run.All of the aboveDAn .ACCDE file is a ___________ version of the original .ACCDB file.Fixed-downLocked-downOpen-downNone of the aboveBWhich type of the query is used to accept the value from the user while executing the query and fetch records accordinglyMake Table QueryUpdate QueryDelete QueryParameter QueryDTo encrypt the databse in Access 2010 must be opened in the __________________.Open Secure modeOpen Inclusive modeOpen Exclusive modeOpen Read ModeCTo extract the records based on date field, which of the symbol should be used$#()" "BFIX() is a kind of ____ function in MS-Access 2010.MathDateTextNone of the aboveAMS-Access 2010 has added new features of ______ to eliminate the need of VBA codeMacroFormReportNone of the aboveAEncrypting a database does not restrict access to database objects, but to __________ the database.OpenModifyReadWriteAThe setting for the Security option can be handled using_______________________ in Access 2010.File Tab ->New Options, and selecting the Trust Centre tab from the Access Option windowFile Tab ->Access Options, and selecting the Trust Centre tab from the Access Option windowFile Tab ->Security Options, and selecting the Trust Centre tab from the Access Option windowNone of the aboveBThird Party Encryption Technology can also be applied to the database of Microsoft Access 2010.TRUEFALSEATo create a split database in MS Access 2010 go to which tab?Create TabExternal TabFile tabDatabase ToolsDAfter spliting database,frontend database holds_________________.FormsQueryReportAll of the aboveDAfter spliting database,backend database holds_________________.TablesFormsQueryReportAWhen an Access database is split, it creates two files_________________.A back-end database & front-end databaseA new database & Old database.primary database & secondary databaseNone of the aboveAA Data Access Page is a special type of _________ that allows users to interface with database using Internet Explorer.XML pageHTML PageWeb pageNone of the aboveCAn _____________ is a group of people with a common goal, having certain resources at its disposal to achieve the common goal.CompanyEnterpriseOrganizationConcernB______________ can be defined as subject-oriented, integrated, time-variant, non-volatile collections of data used to support analytical decision making.Data ModelsData WarehousesData MinesOperational DataB________________ databases contain detailed data that is needed to satisfy processing requirements but which has no relevance to management or analysis.OperationalNon-OperationalSubject-OrientedInformationalAData in the Data Warehouse is ______________ , not ____________.Dynamic, StaticNon-Volatile, StaticVolatile, StaticStatic, DynamicD____________ data contains an historical perspective that is not generally used by the _____________ systems.Operational, InformationalOperational, StaticInformational, StaticInformational, OperationalDThe definition of data elements in the data warehouse and in the data sources and the transformation rules that relate them, are referred to as ___________.MasterdataDetaileddataMetadataBasedataCData warehouses are not the optimal environment for ____________ data.StructuredUnstructuredInformationalOperationalBMaintenance Costs are high for Data Warehousing.TRUEFALSEAData Warehousing can be used for ___________________.Credit Card Churn AnalysisInsurance Fraud AnalysisLogistics ManagementAll of the aboveD_________________ is the process of extracting patterns from data.Data AnalysisData WarehousingData MiningData ModelingC___________________ is an approach to quickly answer multi-dimensional analytical queries.Business Processing ManagementOnline Analytical ProcessingProduct Life Cycle ManagementSupply Chain ManagementB________________ include money, manpower, materials, machines, technologies etc.CostingProductionSalesResourcesDThe Output of an OLAP query is typically displayed in a ___________ format.MatrixColumnarSteppedOutlineA______________ companies is planning to support tens of millions of customers with just hundreds of employees.B2BB2CC2BC2CBWhich of the following is the limitation of Open Source ERP?Increased ComplexitiesLegal ComplexitiesUnsuitable for conventional applicationsAll of the aboveDWhich of the following is not an Open ERP software?OpenbravoSQL-LedgerOpen-ProjectERP5ERPC_____ is the process of integrating all the business functions and processes in an organization to achieve numerous benefits.EDIERPBPMNone of the aboveB________ must consider the fundamental issues of system integration by analyzing the organization's vision and corporate objectives.ManagerAuditorTop Management CommitmentEither A or B or CAThe more the number of __________, the longer the implementation time.modulesprocesspackageunitsDCustomization of ERP systems is one of the major challenges in auditing ERP security.TRUEFALSEATally.ERP 9 provides graphical analysis of data which helps the user to perform deeper analysis.TRUEFALSEAThe user can ________ the company data into multiple companies as per financial periods required.ImportExportSplitBackupC___________ is a collection of activities that make one or more kinds of input and creates an output that is of value to the customer.Business ModelBusiness FunctionBusiness ProcessBusiness OperationCE-Filing of Returns refers to the process of electronically filing your tax returns through the ___________.IntranetInternetExtranetAny of the aboveBTally.ERP 9 does not allows you to export the ETDS forms in NSDL compliant formats as well as facilitates printing of TDS Forms in Physical Form.TRUEFALSEBTally.ERP 9 offers a data encryption option called _______________.Tally Data EncryptionTally Data EncodingTally VaultTally Data ConversionC___________________ is the process of exchanging Tally.ERP 9 data between two or more locations.SerializationRandomizationSynchronizationAsynchronizationCThe Tally website offers _______________, by which a user can communicate with a Tally representative and get required information.Tally ForumTally FAQTally SupportTally ChatDTally.NET use _______________ for centralised Account Management.Data CentreControl CentreCloud CentreAdministration CentreBThe data is transferred between the remote location and the server using a secured mechanism called __________________.EncodingDecodingEncryptionDecryptionCSales Tax Ledger falls under which Group?Indirect ExpensesDuties and TaxesSalesPurchasesBAlias represents ___________ in Tally.ERP9.Short nameNicknameCode nameAll of theseDIf we purchase any Fixed asset in credit, we can pass it from _________.Payment modeReceipt modeJournal modeContra modeCInformation systems can be designed so that accurate and timely data are shared between functional areas. These systems are called _______________________________.Integrated Information SystemsIsolated Information SystemsNon-Integrated Information SystemsNon-Isolated Information SystemsATo save entry without any amount, we have to use _____________.Cost CenterMaintain Multiple godownAllow 0 value entryUse Rej NotesCTransfer of materials from one godown to another godown, use ______________.Manufacturing JournalStock JournalPurchase JournalBoth A & BBWhile exporting Ledgers from Tally to Web Page, we use _________.XML FormatASCII FormatSDF FormatHTML FormatDBudget represents _______________________.EstimationForecastingAssumptionAll of theseDIn Service tax Credit Adjustment (%) should be either ____________.0.21Both A & BNeither A &BCService Tax Report can be seen from _________________.Display > Day BookDisplay > Account BooksDisplay > Statutory MastersDisplay > Statutory ReportsDCan we allow Expenses/Fixed Assets in Purchase vouchers?YesNoATransfer from Main Cash to Petty Cash we require to pass _______ voucher.PaymentContraReceiptNone of theseBIncome Tax number of the Company will appear in which report?Cash/Bank BookProfit and Loss A/cReminder LetterNone of theseDA business model is not a ___________ model.systemmathematicalConceptualLogicalBThe approach to ERP is to first develop a ______________ comprising the business processes or activities that are the essence of a business.Business ModelBusiness FunctionBusiness ProcessBusiness OperationAOLAP systems use concept of OLAP cube called a ______________ cubesingle dimensionalhyper dimensionalmulti dimensionalnoneCThe data which is to be exported from Tally.ERP 9 can be in ________ format.XMLHTMLASCIIALLDIn Tally ERP-9 Remote Access is also known as __________.NetworkingVB.NetTally.NetNone of the aboveCAccessing data store on a remote location using Internet in Tally.ERP9 is called____________.Local DataRemote DataInternet DataNone of the aboveBTally.ERP9 can be classified user in two categories are___________.Local UserRemote UserBoth A & BNone of the aboveCWhich of the following is not a predefined security level provided by Tally.ERP 9?OwnerPublic UserData EntryTally.NET UserBThe business model is represented in the graphical form using ______________ and ________________charts, picturessmart art, clip artflowcharts, flow diagramsgraphs, shapesCWhich of the following is/are the data warehousing activity?Identifying and prioritizing subject areas to be included in the Data WarehouseDefining the correct level of summarization to support business decision makingEstablishing a data warehouse help desk and training users to effectively utilize the desktop toolsAll of the aboveD___________________ is the succession of strategies used by management as a product goes through its life cycle.Business Processing ManagementOnline Analytical ProcessingProduct Life Cycle ManagementSupply Chain ManagementC_______ integrates supply and demand mangement within and across companies.BPMSCMPLMCRMBOLAP stands for _________________.Online Analysis ProcessingOnline Analytical ProcessingOnline Analytical ProgrammingNone of the aboveB__________ includes transportation from Suppliers and receiving inventory.Inbound OperationsOutbound OperationsSourcing planningProduction planningAWhich of the following is not the service area of SCM?LogisticsAsset ManagementPLMCRMDWhich step of the ERP implementation involves, educating and recruiting end users throughtout the implementation process?Step 1Step 2Step 3Step 4BThe system ____________ process will address issues such as software configuration, hardware acquisition and software testing.implementationupgradationinstallationmigrationCA __________________ review is recommended to ensure that all business objectives established during the planning phase are achieved.pre implementationunder process reviewpost implementationNone of the aboveCIn _________________ stages, auditors have access to rudimentary ERP tools and capabilities for auditing security configurations.post implementationpre implementationBoth A & BEither A Or BAImmediate posting and updation of books of accounts as soon as the transactions are entered. This is called as __________Interactive ProcessingImmediate ProcessingReal Time ProcessingBusiness ProcessingCWhich of the following ETDS forms are available in Tally.ERP 9?Form 26, Annexure to 26Form 27, Annexure to 27Form 26Q, Annexure to 26QAll of the aboveDThe exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely downloadable utility called __________________File Validation ProgramFile Validation UtilityFile Valuation ProgramFile Valuation UtilityBERP systems provide an access to the__________ dataintegrateddistributedisolatedde-centralizedA________________ is a tool that refers to skills, processes, technologies, applications and practices used to facilitate better, accurate and quicker decision making.Data WarehousingData ModelingBusiness ModelingBusiness IntelligenceDBusiness intelligence systems are ________ Decision Support Systems.data-driveninformation drivenresource drivennoneAData warehousing technology is the process of creating and utilizing the companys __________general datahistorical dataoperational datanoneBThe data in the Warehouse comes from the _________ environment and external sources.operationalbackupdatanoneAIn essence, SCM integrates ___________ management within and across companies.supply and demandsupply and chainsupply and sortagenoneA_____________ including all fulfillment activities, warehousing and transportation to customers.Inbound operationsoutbound operationshybridbound operationsnoneBCustomer Relationship Management is a ________________ level strategy.businesscorporatestrategicnoneBOperational CRM provides support to ___________ business processes.front officeback officestaffnoneACollaborative ______ ultimate goal is to use information collected by all departments to improve the quality of services provided by the company.CRM'sERPSCMnoneATally.ERP 9 follows the DES __________ method to safeguard the data.encryptiondecryptioncryptographynoneABusiness Intelligence Systems are data-driven ___________________.Information SystemsIntegrated Information SystemsDecision Support SystemsNon-Isolated Information SystemsCWith ______________ technology the characters are reduced in breadth and user is allowed to input additional characters which would make the account name, entity complete and readable.Tally FixTally AdjustTally FitTally AutoFitCIn Tally.ERP 9 __________________ provides the user with administrator rights and the capability to check the entries made by the authorised users and alter these entries, if necessary.User-defined SecurityHTTP-XML based data interchangeUnlimited multi-user supportAudit FeatureD__________________ is an enabling framework which establishes a connection through which the remote user can access the Client's data without copying/transferring the data.Direct Web Browser AccessWeb PublishingTally.NETEmail facilityCIf we want the company to be connected automatically for remote access on load, the property __________ needs to be set it as Yes.Allow to Connect CompanyContact On LoadEither A or BNone of the aboveB___________________ technology is the process of creating and utilizing the company's historical data.Data WarehousingData ModelingBusiness ModelingBusiness IntelligenceAIs there a fixed qualification for internal auditor_________.TRUEFALSEBWhich of the following will not appear in the home page of K-Doc?PowerpointWordPaste DocumentMy TemplatesCTo change an email header so that the message appears to have originated from someone or somewhere other than the actual source is known as___________.Email middle attack.Email Spoofing.Email hacking.Email trackingBTo playfully satirize a website is known as_____________.Web tappingWeb InterceptionWeb spoofingWeb threatingC_________is the complete package to manage the billing requirements of a CA firm on cash system of accounting.Payroll