Advanced ITT Question Bank Formated
Advanced ITT Question Bank Formated
Page 1 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
________system of money transfer is primarily used for large transactions.
18 B
A) NEFT B) RTGS C) EFT D) All of the above
In RTGS, the STP generates an ___________for every outbound RTGS transaction.
19 C
A) UTN B) UTE C) UTR D) UTS
STP stands for ________________________________ in terms of CBS.
A) Audit of internal B) Systems audit are C) Audit of controls in D) None of the above
23 controls is not needed important for the any banking B
at all verification of the environment is
internal controls performed using
software audit
The Management Controls does not include ___________
The application server would be placed in a trusted inside zone in a separate ____________
29 A
A) Virtual Local Area B) Local Area Network C) Wide Area Network D) Personnal Area
Network Network
Application software would access the ________
30 A
A) Data base server B) ATM DATA Server C) Domain Name D) Application Server
Server
Page 2 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
__________ are capable of being connected only when devices are connected to a switch.
31 B
A) LAN B) Virtual Networks C) MAN D) WAN
_____________refers to the process of developing software which would produce the
required output from the input provided of course, using the necessary hardware and
32 communication systems. D
A) Application B) Software C) Server D) System
Development Development Development Development
The______________is essential to ensure that computer security records are stored in
sufficient detail for appropriate period of time.
33 C
A) Review B) RTGS C) Log management D) Authorized
Management Controller
All the various servers in the central data centre are seggregated through _______
34 B
A) LANs B) VLANs C) WANs D) MANs
The __________ is a complete process in the computer so that it ensures that data that is
35 fed in conforms to certain prerequisite conditions. D
A) Consalidation B) Password Policy C) protection D) Validation
When the central Data base is busy with central end of day activities or for any other
reason, the file containing the account balance of the customer is sent to the ATM
36 switch. Such a file is called __________ A
A) Positive Balance B) Application Server C) Centralised Data D) Central Office Data
File base security Centre.
The IBDS is located in a ____________
37 D
A) Militarised zone B) City Zone C) State zone D) demilitarised zone
The main components of Internet Banking system consist of __________
38 D
A) Web server B) IBAS C) IBDS D) All the above
Copy of the Anti Virus Software was updated promptly and regularly at the Data Centre
39 and pushed into all of the servers and in all the systems in the branches by ________ B
A) Hacking Method B) Push-pull method C) Both A &B D) None of the Above
The __________which is also residing in the server at the branch actually does the banking
operations.
40 C
A) Sytem software B) utility software C) Application D) Application Server
Software
In Core Banking concept all the systems of the bank are connected to the Central office
41 by means of a connectivity which may be either a _________ or a dial up line. B
A) local line B) Leased line C) Broadband D) None
The ________ is generated by the software and directly sent to equipment for printed the
Pin Mailer.
42 A) 16 digit number B) Personal C) Net transaction ID D) ATM No B
Identification Number NO
____________would also include the existence of built in controls in the system to ensure
43 proper processing of input data so as to provide the required output. C
A) Output Control B) Input control C) Process Control D) Data Control
____________refers to an arrangement wherein the issuing bank acts on the request and
44 instructions of a customer. A
A) Letter of Credit B) Letter of Tax C) Letter of Payable D) Letter of Receible
_______________ is a process by which the bank ensures the maintenance and recovery of
operations.
45 B
A) Business Recovery B) Business Continuity C) Disaster Recovery D) None
Planning Planning Planning
Page 3 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
At which phase of testing the version of software is called “ beta version”?
46 C
A) Programmer B) User testing C) (a) & (b) both D) None of above
testing
Finacle developed by _________
47 A
A) Infosys B) HCL Technologies C) TCS D) I-Flex
The number that is stored in the ATM switch is the difference of which of the following
number?
48 C
A) Pin No - offset value B) Offset value - Pin C) Pin No - Natural Pin D) Offset Value -
No Natural Pin
The information retrieval of transactions taking place at ATM located at remote
locations is through _________
49 A
A) Soft copy of B) Hard copy of C) Cash register D) (a) and (b) both
Electronic journal Electronic Journal
The number that is generated as soon as the customer inserts the card in the ATM
machine is __________
50 C
A) Offset value B) Pin sent to C) Natural Pin D) Card Number
customer
The tab in Expression Builder in which we write expressions is known as _____________.
51 C
A) Expression B) Operator Button C) Expression Box D) Expression Builder
Elements window
The criteria expression LIKE?B*.
Page 4 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
A bound main report is based on a ______________ and its _____________ contain realted
information.
60 C
A) Table or B) Table or query,Main- C) Table or query,Sub- D) None of the above
query,Inner-Report Report Report
DDL stands for ____________
61 A
A) Data Definition B) Data Defined C) Detailed Definition D) Data Detailed
Language Language Language Language
A___________used to compare multiple values of categories or differences over a period of
62 time. D
A) Pie Chart B) Area Chart C) Bar Chart D) Column Chart
A________used to compare trends over a period of time.
63 B
A) Pie Chart B) Line Chart C) Bar Chart D) Column Chart
To create a read-only copy of the database, which of the following file format can be
64 used? B
A) .ACCDB B) .ACCDE C) .MDW D) .ACCDT
The database administrator created a split database and created a front-end database
and back-end database file.Which of the file should be stored on the server ?
65 B
A) Front-end database B) Back-end database C) Both of them D) None of them
In which formats can the Collect Data through email message feature can send the data
entry form?
66 A
A) HTML and InfoPath B) Access Forms C) Visual Basic D) Excel attachment
Application
Once a mail is sent using the collect data through email message feature in Access 2010.
The mail status can be checked using________________.
67 C
A) Export to Outlook B) Options in Tool C) Manage replies D) All of the above
menu of Access
The ___________ type of data cannot be collected using Collect data through email
68 messages. D
A) Text B) Number C) Date/time D) AutoNumber
What is the memo data type field used for?
69 A) To add table B) To store objects C) For long text entries D) For shout text C
created in other entries of no more
programs than 255 characters
The filter By selection feature allows you to filter:
70 A) Those records that B) Records based on a C) Records that meet D) All of above A
match an entity in a criterion you specify any of several criteria
field you specify
DML stands for _____________
Page 5 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
How do you update Pivot Table report data after changes are made to the source data?
A) Save your changes, B) Select the Pivot C) Click the report, and D) All of the above
73 close the workbook, Table worksheet and on the Pivot Table C
and then reopen it. press F9 on the toolbar, click the
keyboard refresh data button
A) To build a main B) Creates the macros C) To allow the user to D) To allow changing
84 A
switchboard form that used to program an switch from one from one report to
controls all other automatic application. database file to another.
forms. another.
How does a query-based report differ in design to a report based on just one table?
Page 6 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
How would you include some plain text into a mailing label report?
86 A) Type the text B) Use the > button. C) Use the Mailing D) Use the >> button. C
directly into the label. label wizard text
option.
In a Microsoft Access 2010 report, the page numbering would most likely be placed into
87 the: C
A) Report Footer B) Section Header C) Page Footer D) Page Header
If you wished to present a professionally looking form on screen that would show all the
necessary information, which of the following form design tools would you most likely
use?
88 C
A) Pivot Table B) Pivot Chart C) All The tools of the D) Form Wizard
form design control Columnar
gallery.
An .ACCDE file is a ___________ version of the original .ACCDB file.
89 B
A) Fixed-down B) Locked-down C) Open-down D) None of the above
Which type of the query is used to accept the value from the user while executing the
90 query and fetch records accordingly D
A) Make Table Query B) Update Query C) Delete Query D) Parameter Query
To encrypt the databse in Access 2010 must be opened in the __________________.
91 C
A) Open Secure mode B) Open Inclusive C) Open Exclusive D) Open Read Mode
mode mode
To extract the records based on date field, which of the symbol should be used
92 B
A) $ B) # C) () D) " "
FIX() is a kind of ____ function in MS-Access 2010.
93 A
A) Math B) Date C) Text D) None of the above
MS-Access 2010 has added new features of ______ to eliminate the need of VBA code
94 A
A) Macro B) Form C) Report D) None of the above
Encrypting a database does not restrict access to database objects, but to __________ the
95 database. A
A) Open B) Modify C) Read D) Write
Third Party Encryption Technology can also be applied to the database of Microsoft
96 Access 2010. A
A) TRUE B) FALSE
To create a split database in MS Access 2010 go to which tab?
97 D
A) Create Tab B) External Tab C) File tab D) Database Tools
After spliting database,frontend database holds_________________.
98 D
A) Forms B) Query C) Report D) All of the above
After spliting database,backend database holds_________________.
99 A
A) Tables B) Forms C) Query D) Report
When an Access database is split, it creates two files_________________.
100 A) A back-end B) A new database & C) primary database & D) None of the above A
database & front-end Old database. secondary database
database
Page 7 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
A Data Access Page is a special type of _________ that allows users to interface with
101 database using Internet Explorer. C
A) XML page B) HTML Page C) Web page D) None of the above
OLAP systems use concept of OLAP cube called a ______________ cube
102 C
A) single dimensional B) hyper dimensional C) multi dimensional D) none
The data which is to be exported from Tally.ERP 9 can be in ________ format.
103 D
A) XML B) HTML C) ASCII D) ALL
In Tally ERP-9 Remote Access is also known as __________.
104 C
A) Networking B) VB.Net C) Tally.Net D) None of the above
Accessing data store on a remote location using Internet in Tally.ERP9 is
105 called____________. B
A) Local Data B) Remote Data C) Internet Data D) None of the above
Tally.ERP9 can be classified user in two categories are___________.
106 C
A) Local User B) Remote User C) Both A & B D) None of the above
Which of the following is not a predefined security level provided by Tally.ERP 9?
107 B
A) Owner B) Public User C) Data Entry D) Tally.NET User
The business model is represented in the graphical form using ______________ and
________________
108 C
A) charts, pictures B) smart art, clip art C) flowcharts, flow D) graphs, shapes
diagrams
_______ integrates supply and demand mangement within and across companies.
109 B
A) BPM B) SCM C) PLM D) CRM
OLAP stands for _________________.
110 B
A) Online Analysis B) Online Analytical C) Online Analytical D) None of the above
Processing Processing Programming
__________ includes transportation from Suppliers and receiving inventory.
111 A
A) Inbound Operations B) Outbound C) Sourcing planning D) Production
Operations planning
Which of the following is not the service area of SCM?
112 D
A) Logistics B) Asset Management C) PLM D) CRM
Which step of the ERP implementation involves, educating and recruiting end users
113 throughtout the implementation process? B
A) Step 1 B) Step 2 C) Step 3 D) Step 4
The system ____________ process will address issues such as software configuration,
114 hardware acquisition and software testing. C
A) implementation B) upgradation C) installation D) migration
A __________________ review is recommended to ensure that all business objectives
established during the planning phase are achieved.
115 C
A) pre implementation B) under process C) post D) None of the above
review implementation
In _________________ stages, auditors have access to rudimentary ERP tools and capabilities
for auditing security configurations.
116 A
A) post B) pre implementation C) Both A & B D) Either A Or B
implementation
Page 8 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Immediate posting and updation of books of accounts as soon as the transactions are
entered. This is called as __________
117 C
A) Interactive B) Immediate C) Real Time D) Business
Processing Processing Processing Processing
Which of the following ETDS forms are available in Tally.ERP 9?
118 D
A) Form 26, Annexure B) Form 27, Annexure C) Form 26Q, D) All of the above
to 26 to 27 Annexure to 26Q
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely
downloadable utility called __________________
119 B
A) File Validation B) File Validation C) File Valuation D) File Valuation
Program Utility Program Utility
ERP systems provide an access to the__________ data
120 A
A) integrated B) distributed C) isolated D) de-centralized
________________ is a tool that refers to skills, processes, technologies, applications and
practices used to facilitate better, accurate and quicker decision making.
121 D
A) Data Warehousing B) Data Modeling C) Business Modeling D) Business
Intelligence
Business intelligence systems are ________ Decision Support Systems.
122 A
A) data-driven B) information driven C) resource driven D) none
Data warehousing technology is the process of creating and utilizing the company’s
123 __________ B
A) general data B) historical data C) operational data D) none
The data in the Warehouse comes from the _________ environment and external sources.
124 A
A) operational B) backup C) data D) none
In essence, SCM integrates ___________ management within and across companies.
125 A
A) supply and demand B) supply and chain C) supply and sortage D) none
Page 9 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Business Intelligence Systems are data-driven ___________________.
132 C
A) Information B) Integrated C) Decision Support D) Non-Isolated
Systems Information Systems Systems Information Systems
Which of the following ETDS forms are available in Tally.ERP 9?
133 D
A) Form 26, Annexure B) Form 27, Annexure C) Form 26Q, D) All of the above
to 26 to 27 Annexure to 26Q
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely
downloadable utility called __________________
134 B
A) File Validation B) File Validation C) File Valuation D) File Valuation
Program Utility Program Utility
With ______________ technology the characters are reduced in breadth and user is allowed
to input additional characters which would make the account name, entity complete
135 C
and readable.
A) Tally Fix B) Tally Adjust C) Tally Fit D) Tally AutoFit
In Tally.ERP 9 __________________ provides the user with administrator rights and the
capability to check the entries made by the authorised users and alter these entries, if
136 necessary. D
A) User-defined B) HTTP-XML based C) Unlimited multi- D) Audit Feature
Security data interchange user support
__________________ is an enabling framework which establishes a connection through which
the remote user can access the Client's data without copying/transferring the data.
137 C
A) Direct Web B) Web Publishing C) Tally.NET D) Email facility
Browser Access
If we want the company to be connected automatically for remote access on load, the
property __________ needs to be set it as Yes.
138 B
A) Allow to Connect B) Contact On Load C) Either A or B D) None of the above
Company
___________________ technology is the process of creating and utilizing the company's
historical data.
139 A
A) Data Warehousing B) Data Modeling C) Business Modeling D) Business
Intelligence
Is there a fixed qualification for internal auditor_________.
140 B
A) TRUE B) FALSE
Which of the following will not appear in the home page of K-Doc?
141 C
A) Powerpoint B) Word C) Paste Document D) My Templates
To change an email header so that the message appears to have originated from
someone or somewhere other than the actual source is known as___________.
142 B
A) Email middle B) Email Spoofing. C) Email hacking. D) Email tracking
attack.
To playfully satirize a website is known as_____________.
143 C
A) Web tapping B) Web Interception C) Web spoofing D) Web threating
_________is the complete package to manage the billing requirements of a CA firm on cash
system of accounting.
144 C
A) Payroll B) eSecretary C) Billing and D) K-DOC application
Accounting software
Which of the following is not a/an feature of eSecretary?
145 D
A) Contact B) Greeting C) Email Management D) Share certificate
Management Management printing
Page 10 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Annual return preparation can be done using ________.
146 A
A) ICAI-ROC B) K-DOC application C) ICAI XBRL Software D) Payroll
application
________is correspondence automation & management software that is seamlessly
integrated with Microsoft Office.
147 B
A) K-DOC application B) eSecretary C) ICAI XBRL Software D) ICAI-ROC
application
________ is an independent,objective assurance and consulting activity designed to add
148 value and improve an organization's operations. C
A) Statutory audit B) Tax audit C) Internal auditiing D) None of the Above
Which of the following is/are the main purpose of the internal audit?
149 C
A) Financial reporting B) Operations of the C) Both A and B D) Either A or B
organization
As per _____________of the Income tax Act,every person carrying on business or profession
150 is requires to get his accounts audited by a CA before the "specified date". D
A) Section 45 B) Section 44AD C) Section 43B D) Section 44AB
__________________ refers to use software/applications to automatically perform tasks such
151 as accounting,preparing trial balance, financial statements etc. and electronically B
A) ERP B) Office automation C) Either A or B D) None of the Above
FEMA Stands for _______________.
Page 11 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Which of these will trigger/alert for timely payment ?
160 C
A) Accounts Payable B) Accounts C) Expense D) Bank
Receivable Management Reconcilations
We can manage interviews,offers and job vacancies by using which of the application?
________is a type of training in which user logon on the training server with a user ID and
password.
169 B
A) Internal Training B) E-Learning C) Classroom Training D) E-Training
In some cases, trainee is supposed to appear for the examination/test at the end of the
training is____________.
170 B
A) Classroom Training B) E-Learning C) Virtual Learning D) All the Above
Page 12 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
_____________means information available in the organization should not be altered or
172 modified by unauthorized personnel. B
A) Confidentiality B) Integrity C) Availability D) Authentication
Which of these is/are the standard email program used in an organization?
173 C
A) Microsoft Exchange B) Lotus Notes C) Both A and B D) None of the Above
174 A) Most WANs are B) Compared to LAN, C) WAN uses only D) Switches are used B
owned by only one its transmission speed private networks. to connect LAN and
organization. is low WAN
_________is protection of information assets from threats to preserve their value.
175 C
A) Confidentiality B) Integrity C) Information D) None of the above
Security
Which types of information assets need to be secured in a CA Office?
176 D
A) Client data B) Own data C) Own documents D) All the above
The extent and level of _________ would depend on the nature of information.
177 B
A) Availability B) Confidentiality C) Integrity D) Authentication
__________ of information might be affected due to denial of service attack or some other
178 reasons. D
A) Integrity B) Authentication C) Confidentiality D) Availability
__________means the sender cannot deny having sent a message and receiver cannot deny
179 receiving the message. A
A) Non-Repudiation B) Integrity C) Authentication D) Confidentiality
Risk may not be _______ in nature.
180 D
A) reputational B) financial C) operational D) vulnerable
The process of identifying an individual, usually based on user id and password in an
181 organization is called______________. B
A) Availability B) Authentication C) Confidentiality D) Integrity
Which of the following is not a software equipment required in a CA's office?
182 A) Resource allocation B) Client management C) HR and Payroll D) None of the Above D
and scheduling
Page 13 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
___________ can be defined as the process of setting the procedures in the organization for
achieving the predefined goals.
186 B
A) Monte Carlo B) Corporate Planning C) Decision Tree D) Corporate Planning
Simulation Analysis & Analysis
________ shows ability of company to pay back long term loans along with interest or
other charges from generation of profit from its operations.
187 B
A) Debt Assets Ratio B) Interest Coverage C) Total Fund Ration D) None of the above
Ratio
_____________________is the simplest method of comparing different stocks at a point of time
to make investment decisions.
188 C
A) Earnings Per share B) Fixed Asset Over C) Price Earnings D) Gross Profit Ratio
ratio Multiple
The very first line of code of XML file is_____________.
190 A) B) C) D) A
<TagName>Data</Tag </TagName>Data<Tag </TagName>Data</Ta <TagName>Data<Tag
Name> Name> gName> Name>
Deletion of XML Map is done through __________.
191 C
A) Directally Delete B) Delete Button C) XML Maps Dialog D) None of the above
Command Box
Excel works primarily with ________ types of XML files.
192 B
A) 3 B) 2 C) 1 D) 4
Method of tax calculations shall change according to _________.
193 D
A) Annual Income B) DOB C) status of assess D) All of the above.
________ is a process used in statistical analysis in which a predetermined number of
observations will be taken from a larger population.
194 B
A) Snowball sampling B) Sampling C) Systematic D) Simple random
sampling sampling
In __________, Individuals are selected at regular intervals from a list of the whole
population.
195 C
A) Clustered sampling B) Sampling C) Systematic D) Simple random
sampling sampling
In ______________ each individual is chosen entirely by chance and each member of the
population has an equal chance, or probability, of being selected.
196 D
A) Snowball sampling B) Convenience C) Systematic D) Simple random
sampling sampling sampling
Which method is commonly used in social sciences when investigating hard to reach
groups?
197 C
A) Quota Sampling B) Sampling C) Snowball sampling D) Simple random
sampling
__________ are useful for quick reading and easy understanding, particularly for top
198 management. B
A) Balance sheet B) Summary reports C) IRR D) NPV
Page 14 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Popular methods of capital budgeting include _________ and payback period.
199 D
A) discounted cash B) internal rate of C) net present value D) All the above
flow return
_________ is the value of all future cash inflows less future cash outflows as on today.
200 A
A) Net present value B) Working capital C) IRR D) PMT
___________is the process of defining and analyzing the dangers to individuals, businesses
and government agencies posed by potential natural and human-caused adverse events.
201 B
A) Sensitivity analysis B) Risk analysis C) Qualitative risk D) Scenario analysis
analysis
__________ which is used more often, does not involve numerical probabilities or
predictions of loss.
202 C
A) Sensitivity analysis B) Risk analysis C) Qualitative risk D) Scenario analysis
analysis
________ are generally used to present information in a simple and better way and also be
203 used to analyse the risk in a better way. D
A) Graphs B) Sparklines C) Both A& B D) Charts
It is a technique used to determine how different values of an independent variable will
impact a particular dependent variable under a given set of assumptions.
204 B
A) Decision Tree B) Sensitivity analysis C) Both A& B D) Neither A &B
analysis
_______ involves computing different reinvestment rates for expected returns that are
reinvested during the investment horizon.
205 A
A) Scenario analysis B) Sensitivity analysis C) Decision Tree D) None
Analysis
Which function that is used to calculate the payment for specific loan terms ____________
206 B
A) SUMIF() B) PMT C) COUNTIF() D) None of the above
________helps to break down the Return on Equity
207 A
A) Du Point Analysis B) Return on C) Profitability Ration D) None of the above
Investment
_______ is a common method for financing property, facilities, and equipment.
208 B
A) Mortagage B) Leasing C) Rent D) All the above
Which option can be used to split windows into four in ms excel 2010?
209 B
A) Format -> Window B) Window -> Split C) View -> Window -> D) View -> Split
Split
How to restrict the values of a cell so that only a list can be entered in a cell?
210 A) Settings Tab under B) Settings Tab under C) Settings Tab under D) All of the above B
the Tab Format -> the tab Data -> the tab Data -> Filter -
Cells Validation >Advanced Filter
What does the COUNTA() function do in MS Excel 2010 ?
211 D
A) Counts cells having B) Counts empty cells C) Counts cells having D) Counts non-empty
alphabets number cells
If the value in A1 is "ITT" and in B1 is "ICAI ", which function in Excel will return " ITT @
212 ICAI " in cell C1? C
A) A1+ "@" + B1 B) A1 # "@" # B1 C) A1 & "@" & B1 D) A1 $ "@" $ B1
Page 15 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Which of the following function will return a value of 7?
Page 16 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
In Excel 2010, the __________ function is used to generate a forecast.
228 A
A) TREND B) STANDARDIZE C) CORREL D) GROWTH
______function calculates the payment for a loan (installment) based on constant
229 payments and a constant interest rate. D
A) PV B) NPV C) IRR D) PMT
__________ are easy-to-use filtering components that enable the user to quickly filter the
230 data in a PivotTable report in MS-Excel 2010. B
A) Sparklines B) Slicers C) Macros D) Data Forms
In Excel 2010, range C3:C6 indicates _______________.
231 A
A) Cells C3 through C6 B) Cell C3 and Cell C6 C) Cell C4 and Cell C5 D) None of the above
235 A) Name of the B) Name of the C) Name of the cell or D) Formula in the cell C
workbook currently worksheet currently range currently currently working on
working on working on working on
In Excel 2010, what is represented by the small black square in the lower-right corner
236 of an active cell or range? B
A) Copy handle B) Fill handle C) Insert handle D) Border
Suppose we accidentally erased a record in an Excel worksheet. Which command can be
237 used to restore it immediately? D
A) Insert B) Replace C) Paste D) Undo
Excel 2010 offers up to____________sort levels.
238 B
A) 32 B) 64 C) 60 D) 80
Which feature in Excel 2010 enables us to find the input values needed to achieve a goal
239 or objective? A
A) Goal Seek B) Consolidate C) Data Validation D) Subtotal
The INT function________
Page 17 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
What is a scenario summary report?
246 A) They allow you to B) They allow you to C) They allow you to D) They allow you to B
add dynamic data. rearrange row and generate e-mail print the reports with
column data. enabled reports. various settings.
Identify the need for controls and auditing in a computerised environment.
247 A) Absence of input B) Lack of visible C) Accessibility of data D) All of the above D
documents transaction trail and computer
programs
Grand totals calculated for any code on a document in the batch are called…..
248 D
A) Financial totals B) Record totals C) Document totals D) Hash totals
Control that checks if correct sequence of commands and update parameters are passed
249 from the application software to the database. B
A) Table level B) Data Integrity C) Batch check D) System test
With respect to data integrity control, when monetary transactions are processed
250 against master files without a match, we should maintain a …. C
A) Sequence account B) Data account C) Suspense account D) Update account
The system test that tests the top-level modules first and then the lower modules are
251 simulated with dummy modules to check the interfaces is called …. D
A) Bottom up test B) Hybrid test C) Stub test D) Top down test
Identify the audit technique that examines each transaction as it passes through the
system.
252 A
A) Embedded code B) Program code C) Database Analyzers D) Database code
Page 18 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
The test data (dummy unit) implemented in the normal processing of the system over a
period of time is known as….
256 A
A) Integrated Test B) Black box Test C) Graph testing D) Whitebox testing
Facility Facility
The test data generated with correctness proof, data flow analysis and control flow
257 analysis tools is called…. B
A) Test item block B) Test data pack C) Test program pack D) Test record pack
The organisational, management, maintenance and access controls are categories of ……
258 B
A) Application B) General controls C) Check controls D) Input controls
controls
When a real-time system is simulated to generate the same output as the real-time
system, the technique is called….
259 D
A) Parallel trailing B) Tracing parallel C) Parallel coding D) Parallel simulation
When an auditor expands the extent of substantive tests to determine the impact of
defects on the attainment of program objectives, the methodology is….
260 B
A) Cross reference B) Formulate flaw C) Correct lister D) Formulate correct
lister hypotheses hypotheses
This is an important control in systems that use digital signatures for authentication
purposes.
261 A
A) Public audit trails B) Random audit trails C) Sample audit trails D) Data audit trails
A) Sorting, creating, B) Data retrieval, code C) Reading data, D) Specific tasks with
267 D
and printing files comparison selecting and original or modified
analyzing information programs
Page 19 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
The application controls are ….
269 C
A) Input controls B) Processing controls C) Both A and B D) Neither A nor B
Identify the type of audit when auditors are members of the systems development
270 team. D
A) General audit B) Post audit C) System audit D) Concurrent audit
Identify the field check - "If a set of values is defined, is the input data one of these
271 defined values?" C
A) List B) Range C) Slab D) Digit
The field check that conforms if data input for a field is in a particular format.
272 A
A) Format mask B) Data mask C) Field mask D) Input mask
The field check on a processed data that fails if a field is not initialized to zero or errors
273 occur during calculation is…… C
A) Range B) Sign C) Overflow D) Serial
The validation checks applied to a field depending on its logical interrelationships with
274 the other fields in the record are called ….. B
A) Field checks B) Record checks C) Batch checks D) File checks
A group of records or transactions that are contiguous constitute …..
275 A
A) Physical batches B) Logical batches C) Block batches D) Transact batches
…………..is the type of batch check (group of records) for all input records of a particular
276 type is done. C
A) Control totals B) Serial number C) Transaction type D) Sequence check
DB2 is an example of __________
277 C
A) ODBMS B) RDBMS C) DBMS D) None
____________is used to Modify/Change Data in Table
278 A
A) Update Query B) Process Query C) Insert Query D) None
MS-Access is _________________
279 A
A) DBMS B) RDBMS C) ODBMS D) None
Which of the following is not a data type in MS-Access?
280 B
A) Number B) Character C) Memo D) Date
To make changes in MS-Access form should be opened in __________________
281 B
A) Form view B) Form Design C) Change Form D) None
_______layout of a form displays one record at a time
282 B
A) Tabular B) columnar C) Datasheet D) None
In SQL, DML stands for _________
283 A
A) Data manipulation B) Data mathematical C) both a and b D) None
language language
To see more than one record at a time in a form we use _______
284 A
A) Tabular B) columnar C) both a and b D) None
The default query invoked by ms-access is
285 B
A) Update Query B) Select Query C) Delete Query D) None
Page 20 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
__________ software serves as the Intermediary between the user and the database
286 B
A) DATABASE B) DBMS C) O.S D) None
Distributed database have now come to know as a __________ database
287 C
A) Client data base B) Server data base C) Client-Server D) None
database
DDL Stands for -.
288 C
A) Data Design B) Define Data C) Data Definition D) None
Language Language Language
In DBMS, view level data abstraction is known as __________
289 C
A) Internal Schema B) Conceptual Schema C) External Schema D) None
Page 21 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
A Record is also commonly called as a _________
302 C
A) column B) field C) tuple D) None
Most database operations that we do manually can be automated by using
303 D
A) Program B) query C) form D) macro
_________ are what we use to summarize and present data in the table
304 A
A) Report B) Query C) Form D) Macro
A database tabel is similar in appearance to a _______
305 B
A) MS-WORD B) Excel/spreadsheet C) Powerpoint D) None
SQL is considered to be a _______
306 B
A) 3 GL B) 4GL C) 5GL D) None
SQL is considered to as an ideal Language for _______
307 C
A) Java B) Internet C) Database D) Visual Basic
DBMS that supports a database located at a single site is called a _____
308 C
A) Multiuser DBMS B) Distributed DBMS C) Centralized DBMS D) Database
DBMS that supports a database distributed across several different site is called a _____
309 B
A) Client-Server B) Distributed DBMS C) Multiuser DBMS D) Centralized DBMS
database
The _________key does not accept Duplicate and Null values in Field.
310 B
A) key field B) Primary key C) Reference Key D) None
______ is often implemented as an array of records
311 B
A) Record B) Tuple C) Tabel D) Attribute
In MS-Access 2010,the ________ control in the form lets the user insert a picture into it.
312 B
A) Title B) Logo C) Picture D) Graphic
Which query should be used to retrieve the following information from table of
313 databases "Which employees earn more than Rs.30,000 a month?" D
A) Search Query B) Make Table Query C) Aggregate Query D) Select Query
Queries in MS-Access 2010 can be used as ________________________.
314 A) View, change and B) A source of records C) Both A and B D) Neither A nor B C
analyze data in for forms and reports
different ways
What is a form in MS-Access?
Page 22 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
In an ER model, a/an ___________ is any object, place, person, event or concept about
317 which an enterprise records data. A
A) Entity B) Attribute C) Relationship D) None of the above
The process of arranging data in a logical sequence is called ____________.
318 C
A) Classifying B) Filtering C) Sorting D) Summarizing
If some chunk of data is stored at two places in a database, then ___________.
Page 23 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
DCL provides commands to perform actions like _________.
333 A) Changing the B) Creating views and C) Authorizing access D) Inserting, updating C
structure of tables indexes and other control over or deleting records
database
A database _______ presents summarized information retrieved from a table in a
334 preformatted, attractive manner. D
A) Form B) Query C) Macro D) Report
In MS-Access 2010, which type of query extracts the data from one or more existing
335 tables and puts them into separate table? D
A) Parameter query B) Update query C) Crosstab query D) Make Table query
In an MS-Access report, in which section we can keep the count[Sales] to calculate the
total sales for each month?
336 D
A) In the Report B) In the Report C) In the Page Footer D) In the Month Group
Header Section Footer Section Section Footer Section
What is the first step in creating a form or report using the Form Wizard or the Report
Wizard in MS-Access 2010?
A) Selecting the fields B) Selecting the C) Reading several D) Selecting how the
337 that we want to underlying table or screens of mostly form or report should B
appear in the form or query on which we useless information be formatted
report want to base the form and clicking next
or report
Which of the following is not an advantage of using a DBMS?
Page 24 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Improving the performance of a database in MS Access 2010 used______________ tool.
346 A
A) Performance B) Hi-tech Analyzer C) Online Analyzer D) None of the above
Analyzer
The _________ can be used to create reports on database objects for planning and
modifying database design.
347 B
A) Table Documenter B) Database C) Query & Report D) None of the above
Documenter Documenter
Use _____________ to grant or revoke permissions or to change the owner of database
objects.
348 C
A) User and Group B) User-level Security C) User and Group D) None of the above
Accounts Wizard Permissions
_____________ commands are used to enforce database security in a multiple user database
349 environment. B
A) Security B) Grant and revoke C) Select D) Create
Which SQL clause is used to retrieve data from database?
350 A
A) SELECT B) WHERE C) FROM D) INSERT
The __________clause is used to filter records in database.
351 B
A) SELECT B) WHERE C) FROM D) INSERT
DCL(Data Control Language) used for
The feature Archive is available in K-DOC application for the purpose of____________.
357 A) To create new file B) To save file C) To cut & paste the D) None of the above C
completed and old
document.
Employee Information Portal feature in Payroll Application provide employee to view
their________________.
358 A) Personal profile B) PAN Number C) PF No,online D) All of the above D
submission of loan etc
Page 25 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Which is not a feature of ICAI-ROC application ?
Page 26 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
The methods LIFO, FIFO, Moving Average are used to ….
371 A
A) Value closing stock B) Value clearing stock C) Value expense stock D) Value income stock
The report prepared taking the asset and liability type accounts from the Trial Balance
372 is called…. C
A) P & L statement B) Income statement C) Balance sheet D) Asset sheet
The report that depicts operating profit/loss for a period is …..
373 C
A) Trial balance B) Trading account C) P & L statement D) Suspense accounts
The day book contains transactions relating to ………
374 B
A) Income or B) Sales or purchase C) Asset or liability D) Profit or loss
expenditure
The Bills Receivable details are maintained in a ……..
375 C
A) Journal sheet B) Voucher debtors C) Sundry debtors D) Original entry
Creditors ledger has details of your dues to ……..
376 D
A) Customers B) Assets C) Liabilities D) Suppliers
The sundry debtors are placed in the Balance sheet on the ……
377 B
A) Income side B) Assets side C) Expense side D) Payable side
The first step in Tally before any transaction is entered or saved is creating a ………
378 B
A) File B) Company C) Project D) Application
To configure country specific details use the function key……
379 C
A) F10 B) F2 C) F12 D) F11
Identify the security mechanism used in Tally.
380 D
A) Tally Secure B) Tally Pack C) Tally Group D) Tally Vault
The basic document where transactions are entered chronologically is….
381 B
A) Ledger B) Journal C) Voucher D) Trial Balance
After selecting a company in Tally, you will be in the……
382 B
A) Accounts of Tally B) Gateway of Tally C) Entry of Tally D) Groups of Tally
Tally software is based on ……… accounting system.
383 C
A) Sales B) Production C) Mercantile D) Manufacture
Identify the primary group of capital nature that uses bank account and cash in hand as
384 sub groups. B
A) Fixed assets B) Current assets C) Loan assets D) Capital assets
All financial entries in Tally are done using…….
385 D
A) Vouchers B) Groups C) Journal D) Ledgers
The Direct expenses, Purchase account, Direct income are primary groups of …..
386 C
A) Capital nature B) Expense nature C) Revenue nature D) Income nature
The option to delete a sub-group is admissible through the menu……
387 A
A) Alter B) Delete C) Display D) Shift
Page 27 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
The behavioural attributes of this group cannot be changed.
388 C
A) Sub-group B) Ledger-group C) Primary-group D) Alter-group
Credit limits for personal accounts and branches can be done in the ledger mode……
389 B
A) Single B) Multiple C) Sub-group D) Alter-group
We are not allowed to delete a ledger from this mode.
390 D
A) Single B) Sub-group C) Alter-group D) Multiple
All account heads except Cash and Bank are placed in the……
391 C
A) Sub Ledger master B) Group Ledger C) General Ledger D) Journal Ledger
master master master
These are the basis for analysis by potential investors, banks etc.
392 C
A) Journal and Ledger B) P & L Account and C) P & L Account and D) Voucher Account
Journal Balance Sheet and Balance Sheet
Identify the primary group of capital nature that has the sub-groups: Bank OD Account,
393 Bank OCC Account. D
A) Expenses B) Income C) Assets D) Loans
The primary document for recording all financial transactions in Tally is the……
394 C
A) Journal B) Trial sheet C) Voucher D) File
You can customize the voucher entry screen using the function key…….
395 B
A) F13 B) F12 C) F10 D) F11
Identify the voucher type that records fund transfers between cash and bank accounts.
396 D
A) Credit Note B) Payment C) Receipt D) Contra
This voucher type records adjustments between ledgers.
397 D
A) Sales B) Receipt C) Payment D) Journals
The use of classes for payment, receipt and contra vouchers enables data input in ……
398 B
A) Double entry mode B) List entry mode C) Choice entry mode D) File entry mode
Page 28 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Tally's age-wise analysis considers the voucher's ……
404 B
A) Previous date B) Effective date C) Current year D) Configured date
Arrange the steps in generating the books of accounts.
405 1. Create Trial balance C
A) 1, 2, 3, 4 B) 1, 3, 4, 2 C) 2, 4, 3, 1 D) 3, 4, 2, 1
For day-to-day transactions the voucher types used are
406 C
A) Credit purchase B) Cash purchase C) Both A and B D) Contra purchase
Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be
407 entered into the voucher type….. B
A) Loan B) Payment C) Receipt D) Sales
Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10
408 monitors by credit. A
A) Credit Purchases B) Cash Purchases C) Expense Purchases D) Debit Purchases
Identify the voucher type to be chosen for the sale of computers to Anand by cash @
409 Rs.210000 per unit. C
A) Cash Ledger B) Sale Sheet C) Stock Journal D) Purchase Voucher
A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher…..
410 D
A) Payment B) Receipt C) Debit D) Contra
The financial statement that consolidates ledger balances is …..
411 C
A) Balance sheet B) Profit & Loss C) Trial balance D) Journal
statement
The F9 function key in the left side of the Gateway of Tally screen displays the……
412 B
A) Accounting reports B) Inventory reports C) P & L reports D) Expense reports
The option on the Gateway of Tally that will generate the P&L account statement is…..
413 C
A) Net Loss B) Net Income C) Net Profit D) Net Account
The expenditure for running the business for a period is …..
414 A
A) Expense B) Example C) Taxes D) Income
This displays the balance daywise for a selected voucher type.
415 D
A) Record book B) Ledger book C) Journal book D) Day book
The feature in Tally to analyze accounts of a company is…..
416 A
A) Ratio analysis B) Account analysis C) Data analysis D) Transaction
analysis
The age-wise statement is displayed based on……
417 B
A) Income B) Payables C) Expenses D) Loans
The ratio analysis of receivables can be done based on……
418 A
A) Bill date B) Effective date C) Voucher date D) Previous date
Name the statement that helps the management in the decision making process.
419 B
A) Data flow B) Funds flow C) Stock flow D) Cheque flow
Page 29 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Identify the budget type which is chosen where transaction amounts are to be
monitored.
420 C
A) On closing balance B) On net credit flow C) On net transactions D) On net cash flow
Choose the budget type to be used where bank accounts balances are to be monitored.
421 A
A) On closing balance B) On net credit flow C) On net transactions D) On net cash flow
The management that needs to consolidate the accounts of its various enterprises uses
……. in Tally.
422 B
A) Consolidate B) Group company C) Set company D) Alter company
company
Identify the user who can access audit trails in Tally.
423 D
A) Owner B) Data Entry operator C) Accountant D) Administrator
Identify the accounting feature in tally that facilitates splitting financial years for a
company data.
424 C
A) Month-less B) Yearly-entry C) Period-less D) Transaction-
accounting accounting accounting number accounting
Identify the account type by the rule: "Debit the receiver and credit the giver".
425 B
A) Real accounts B) Personal accounts C) Nominal accounts D) Expense accounts
The tracking of changes in vouchers and ledger masters is done by…..
426 B
A) Tally Vault B) Tally Audit C) Tally Report D) Tally Group
Tally can import data from other programs and creates a log about the activity in the
427 file….. A
A) Tally.imp B) Tally.cfg C) Tally.exp D) Tally.ole
Import and export of data between Tally and other programs is possible with the help
428 of….. C
A) OLE B) DBMS C) ODBC D) MS-XLS
The manual option of voucher numbering leads to…..
429 B
A) Auto numbers B) Duplicate number C) Sequence number D) Range number
The Tally audit trail tracks changes made to vouchers that are …..
430 A
A) more than 30 Days B) less than 30 Days C) more than a day old D) more than a week
old old old
The ratio analysis of Bills Receivables or Bills Payables can be displayed with the
431 function key….. D
A) F5 B) F8 C) F12 D) F6
The test data generated with correctness proof, data flow analysis and control flow
432 analysis tools is called…. B
A) Test item block B) Test data pack C) Test program pack D) Test record pack
When a real-time system is simulated to generate the same output as the real-time
system, the technique is called….
433 D
A) Parallel trailing B) Tracing parallel C) Parallel coding D) Parallel simulation
When an auditor expands the extent of substantive tests to determine the impact of
defects on the attainment of program objectives, the methodology is….
434 B
A) Cross reference B) Formulate flaw C) Correct lister D) Formulate correct
lister hypotheses hypotheses
Page 30 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
This is an important control in systems that use digital signatures for authentication
purposes.
435 A
A) Public audit trails B) Random audit trails C) Sample audit trails D) Data audit trails
A) Sorting, creating, B) Data retrieval, code C) Reading data, D) Specific tasks with
442 D
and printing files comparison selecting and original or modified
analyzing information programs
Page 31 of 31