82% found this document useful (11 votes)
25K views

Advanced ITT Question Bank Formated

This document contains a question bank with 30 multiple choice questions related to auditing software, core banking solutions, and financial transaction systems. Some key points covered include: - Statistical functions in IDEA can be applied to both numeric and date data. Stratification functions allow fixed or free interval increments. - Complex calculations and exception testing in IDEA are performed using the Equation Editor. Audit functions include stratification, and categories include data analysis and system validation. - In RTGS money transfers, the STP generates a Unique Transaction Reference (UTR) for each outbound transaction. STP stands for Straight Through Processing in terms of CBS. - Core Banking Solutions are supported by advanced technology infrastructure and have high

Uploaded by

mandar chavan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
82% found this document useful (11 votes)
25K views

Advanced ITT Question Bank Formated

This document contains a question bank with 30 multiple choice questions related to auditing software, core banking solutions, and financial transaction systems. Some key points covered include: - Statistical functions in IDEA can be applied to both numeric and date data. Stratification functions allow fixed or free interval increments. - Complex calculations and exception testing in IDEA are performed using the Equation Editor. Audit functions include stratification, and categories include data analysis and system validation. - In RTGS money transfers, the STP generates a Unique Transaction Reference (UTR) for each outbound transaction. STP stands for Straight Through Processing in terms of CBS. - Core Banking Solutions are supported by advanced technology infrastructure and have high

Uploaded by

mandar chavan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Advanced ITT QUESTION BANK

S.No. Questions Answer


In IDEA, Statistics functions can be applied on_________.
1 C
A) Numeric Data B) Date Data C) Both A and B D) None of the above
In IDEA, increment value in Stratification function can be fixed or free interval.
2 B
A) FALSE B) TRUE
In IDEA, Stratified Random functions is a part of which menu.
3 D
A) Analysis B) Data C) Relation D) Sampling
Which of the following is not an Audit Software
4 C
A) ACL B) IDEA C) Unix D) SOFTCAAT
Using which functions to perform more complex calculations and exception testing in
5 IDEA? A
A) Equation Editor B) function Editor C) Calculation Editor D) Testing Editor
Which of the following are categories of computer audit function ?
6 D
A) Items of audit B) Data Analysis C) System validation D) All of the above
interest
In the following list which is a audit function?
7 B
A) File Definition B) Stratification C) Print Preiview D) Append
Which is the following step involved in a source code review methodology ?

8 A) Review B) Understand C) Formulate flaw D) All of the above D


Programming program specifications hypotheses
standards
In IDEA which functions should be used to find repeated values ?
9 A
A) Detection B) Exclude C) Sequence checking D) Filter
In IDEA, Stratification functions can be applied on which type of data ?
10 D
A) Numeric Data B) Date Data C) Character Data D) All of the above
In IDEA,Summarization accumulates the values of Numeric fields for each____________.
11 B
A) Primary Key B) Unique Key C) Secondary Key D) Composite Key
In which sampling,selecting sampling units using a fixed interval between selections
12 is_______________. B
A) Random B) Systematic C) All of the above D) None of the above
Ensures that all combinations of sampling units in the population have an equal chance
13 of selection is____________. A
A) Random B) Systematic C) All of the above D) None of the above
Input Control method is a part of Application Control Group.
14 A
A) TRUE B) FALSE
Which is the following type of check that can be run when data is input through
15 terminal ? A
A) Field check B) Filter check C) Compare check D) Data check
In _______system money transfers are done on a one to one basis while in _______system
16 transfer is done in batches. B
A) NEFT, RTGS B) RTGS,NEFT C) EFT,RTGS D) None of the above
All the money transfers take place in the books of the _________________
17 B
A) Beneficiary bank B) Central bank(RBI) C) Remitting bank D) None of the above

Page 1 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
________system of money transfer is primarily used for large transactions.
18 B
A) NEFT B) RTGS C) EFT D) All of the above
In RTGS, the STP generates an ___________for every outbound RTGS transaction.
19 C
A) UTN B) UTE C) UTR D) UTS
STP stands for ________________________________ in terms of CBS.

20 A) Straight Through B) Straight Temporary C) Strict Through D) None of the above A


Processing Processing Processing

________ is a method of creating virtual networks within a physical network.


21 A
A) VLAN B) LAN C) WAN D) MAN
CMS stands for ______________________________ in terms of CBS.
22 B
A) Control B) Cash Management C) Core Management D) Centre
Management System System System Management System
Which of the following statements is true?

A) Audit of internal B) Systems audit are C) Audit of controls in D) None of the above
23 controls is not needed important for the any banking B
at all verification of the environment is
internal controls performed using
software audit
The Management Controls does not include ___________

24 A) Managing of Assets B) Formulating a C) Developing a D) Laying down A


security policy business continuity procedures for system
planning development
_______is supported by advanced technology infrastructure and has high standards of
business functionality.
25 C
A) Firewall B) Internet banking C) Core Banking D) Web centre
Solution
CBS Software resides in a Central application server which is located in the ___________
26 D
A) ATM Data centre B) Middleware C) Web centre D) Central Office Data
Centre.
A________ that runs the core banking solutions (CBS) and is centrally accessed by the
branches.
27 B
A) ATM Server B) Central Application C) Database Server D) Domain Name
Server Server
The _________of the application is capable of only entering the data at the end point that is
branches.
28 C
A) System version B) Application Version C) Client version D) Firewall

The application server would be placed in a trusted inside zone in a separate ____________
29 A
A) Virtual Local Area B) Local Area Network C) Wide Area Network D) Personnal Area
Network Network
Application software would access the ________
30 A
A) Data base server B) ATM DATA Server C) Domain Name D) Application Server
Server

Page 2 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
__________ are capable of being connected only when devices are connected to a switch.
31 B
A) LAN B) Virtual Networks C) MAN D) WAN
_____________refers to the process of developing software which would produce the
required output from the input provided of course, using the necessary hardware and
32 communication systems. D
A) Application B) Software C) Server D) System
Development Development Development Development
The______________is essential to ensure that computer security records are stored in
sufficient detail for appropriate period of time.
33 C
A) Review B) RTGS C) Log management D) Authorized
Management Controller
All the various servers in the central data centre are seggregated through _______
34 B
A) LANs B) VLANs C) WANs D) MANs
The __________ is a complete process in the computer so that it ensures that data that is
35 fed in conforms to certain prerequisite conditions. D
A) Consalidation B) Password Policy C) protection D) Validation
When the central Data base is busy with central end of day activities or for any other
reason, the file containing the account balance of the customer is sent to the ATM
36 switch. Such a file is called __________ A
A) Positive Balance B) Application Server C) Centralised Data D) Central Office Data
File base security Centre.
The IBDS is located in a ____________
37 D
A) Militarised zone B) City Zone C) State zone D) demilitarised zone
The main components of Internet Banking system consist of __________
38 D
A) Web server B) IBAS C) IBDS D) All the above
Copy of the Anti Virus Software was updated promptly and regularly at the Data Centre
39 and pushed into all of the servers and in all the systems in the branches by ________ B
A) Hacking Method B) Push-pull method C) Both A &B D) None of the Above
The __________which is also residing in the server at the branch actually does the banking
operations.
40 C
A) Sytem software B) utility software C) Application D) Application Server
Software
In Core Banking concept all the systems of the bank are connected to the Central office
41 by means of a connectivity which may be either a _________ or a dial up line. B
A) local line B) Leased line C) Broadband D) None
The ________ is generated by the software and directly sent to equipment for printed the
Pin Mailer.
42 A) 16 digit number B) Personal C) Net transaction ID D) ATM No B
Identification Number NO

____________would also include the existence of built in controls in the system to ensure
43 proper processing of input data so as to provide the required output. C
A) Output Control B) Input control C) Process Control D) Data Control
____________refers to an arrangement wherein the issuing bank acts on the request and
44 instructions of a customer. A
A) Letter of Credit B) Letter of Tax C) Letter of Payable D) Letter of Receible
_______________ is a process by which the bank ensures the maintenance and recovery of
operations.
45 B
A) Business Recovery B) Business Continuity C) Disaster Recovery D) None
Planning Planning Planning

Page 3 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
At which phase of testing the version of software is called “ beta version”?
46 C
A) Programmer B) User testing C) (a) & (b) both D) None of above
testing
Finacle developed by _________
47 A
A) Infosys B) HCL Technologies C) TCS D) I-Flex
The number that is stored in the ATM switch is the difference of which of the following
number?
48 C
A) Pin No - offset value B) Offset value - Pin C) Pin No - Natural Pin D) Offset Value -
No Natural Pin
The information retrieval of transactions taking place at ATM located at remote
locations is through _________
49 A
A) Soft copy of B) Hard copy of C) Cash register D) (a) and (b) both
Electronic journal Electronic Journal
The number that is generated as soon as the customer inserts the card in the ATM
machine is __________
50 C
A) Offset value B) Pin sent to C) Natural Pin D) Card Number
customer
The tab in Expression Builder in which we write expressions is known as _____________.
51 C
A) Expression B) Operator Button C) Expression Box D) Expression Builder
Elements window
The criteria expression LIKE?B*.

52 A) Will match all text B) Will match all text


C) Will match all text D) Will match all text A
starting from B ending from B having second starting with a digit
character as B
__________ queries are useful for summarizing information, and are somewhat similar to
53 pivot tables in MS-Excel. B
A) Select query B) Crosstab query C) Action query D) Parameter query
While entering record in Datasheet view, in which order the records can be entered
54 B
A) Alphabetical Order B) At the end of the C) Any where in the D) Beginning of the
table table table
When you delete the record in form, it deletes the record from__________.
55 D
A) Form only B) Form but not in C) Table but not in D) Form & Table
table Form
Having clause is used in the aggregate query in MS Access 2010
56 B
A) FALSE B) TRUE
The controls that are not linked to any field of the table or query on the form are known
as ________.
57 B
A) ActiveX control B) Unbounded C) Graphics Control D) Bound Controls
Controls
Which property of the form can be used to insert a background image in MS Access
58 2010? D
A) Caption B) Background C) Record Source D) Picture
___________ is a report that is inserted in another report in MS Access 2010.
59 C
A) Inner-Report B) Sub-Report C) Inside-Report D) Insert-Report

Page 4 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
A bound main report is based on a ______________ and its _____________ contain realted
information.
60 C
A) Table or B) Table or query,Main- C) Table or query,Sub- D) None of the above
query,Inner-Report Report Report
DDL stands for ____________
61 A
A) Data Definition B) Data Defined C) Detailed Definition D) Data Detailed
Language Language Language Language
A___________used to compare multiple values of categories or differences over a period of
62 time. D
A) Pie Chart B) Area Chart C) Bar Chart D) Column Chart
A________used to compare trends over a period of time.
63 B
A) Pie Chart B) Line Chart C) Bar Chart D) Column Chart
To create a read-only copy of the database, which of the following file format can be
64 used? B
A) .ACCDB B) .ACCDE C) .MDW D) .ACCDT
The database administrator created a split database and created a front-end database
and back-end database file.Which of the file should be stored on the server ?
65 B
A) Front-end database B) Back-end database C) Both of them D) None of them

In which formats can the Collect Data through email message feature can send the data
entry form?
66 A
A) HTML and InfoPath B) Access Forms C) Visual Basic D) Excel attachment
Application
Once a mail is sent using the collect data through email message feature in Access 2010.
The mail status can be checked using________________.
67 C
A) Export to Outlook B) Options in Tool C) Manage replies D) All of the above
menu of Access
The ___________ type of data cannot be collected using Collect data through email
68 messages. D
A) Text B) Number C) Date/time D) AutoNumber
What is the memo data type field used for?

69 A) To add table B) To store objects C) For long text entries D) For shout text C
created in other entries of no more
programs than 255 characters
The filter By selection feature allows you to filter:

70 A) Those records that B) Records based on a C) Records that meet D) All of above A
match an entity in a criterion you specify any of several criteria
field you specify
DML stands for _____________

71 A) Detailed B) Data Maintaining C) Data Manipulation D) Detailed C


Maintaining Language Language Language Manipulation
Language
Which editor was provided for use with Access Basic?
72 B
A) The Visual Basic 1.0 B) Notepad C) The QuickBasic D) All of above
editor editor

Page 5 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
How do you update Pivot Table report data after changes are made to the source data?

A) Save your changes, B) Select the Pivot C) Click the report, and D) All of the above
73 close the workbook, Table worksheet and on the Pivot Table C
and then reopen it. press F9 on the toolbar, click the
keyboard refresh data button

What are the different views to display a Table ?


74 D
A) Datasheet View B) Design View C) Pivote Table & Pivot D) All Of Above
Chart View
Which Of The Following Creates A Drop Down List Of Values To Choose From?
75 D
A) Ole Object B) Hyperlink C) Memo D) Lookup Wizard
A __________ Enables You To View Data From A Table Based On A Specific Criterion
76 B
A) Form B) Query C) Macro D) Report
The Database Language That Allows You To Access Or Maintain Data In A Database
77 A
A) DCL B) DML C) DDL D) None Of Above
DCL Provides Commands To Perform Actions Like

78 A) Change The B) Insert, Update Or C) Authorizing Access D) None Of Above C


Structure Of Tables Delete Records And And Other Control
Data Values Over Database
Which is not a Database Model ?
79 D
A) Network Database B) Relational Database C) Object Oriented D) Structureed
Model Model Database Model Database Model
Which Of The Field Has Width 8 Bytes?
80 C
A) Memo B) Number C) Date/time D) Hyperlink
This Is The Stage In Database Design Where One Gathers And List All The Necessary
Fields For The Database Project.
81 A
A) Data Definition B) Data Refinement C) Establishing D) None Of The Above
Relationship
Whenever a tables gets update, the dependent query will
82 B
A) Not update B) update C) have to update D) never update
automatically manually
The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely
83 And Create A ___________ Between Tables A
A) Relationship B) Join C) Query D) None Of These
What is the purpose of the Switchboard Manager in Microsoft Access 2010?

A) To build a main B) Creates the macros C) To allow the user to D) To allow changing
84 A
switchboard form that used to program an switch from one from one report to
controls all other automatic application. database file to another.
forms. another.
How does a query-based report differ in design to a report based on just one table?

85 A) The reports are B) It doesn’t C) It doesn't have as D) The only report B


restricted in size. many design options. type available is the
Design Report.

Page 6 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
How would you include some plain text into a mailing label report?

86 A) Type the text B) Use the > button. C) Use the Mailing D) Use the >> button. C
directly into the label. label wizard text
option.
In a Microsoft Access 2010 report, the page numbering would most likely be placed into
87 the: C
A) Report Footer B) Section Header C) Page Footer D) Page Header
If you wished to present a professionally looking form on screen that would show all the
necessary information, which of the following form design tools would you most likely
use?
88 C
A) Pivot Table B) Pivot Chart C) All The tools of the D) Form Wizard
form design control Columnar
gallery.
An .ACCDE file is a ___________ version of the original .ACCDB file.
89 B
A) Fixed-down B) Locked-down C) Open-down D) None of the above
Which type of the query is used to accept the value from the user while executing the
90 query and fetch records accordingly D
A) Make Table Query B) Update Query C) Delete Query D) Parameter Query
To encrypt the databse in Access 2010 must be opened in the __________________.
91 C
A) Open Secure mode B) Open Inclusive C) Open Exclusive D) Open Read Mode
mode mode
To extract the records based on date field, which of the symbol should be used
92 B
A) $ B) # C) () D) " "
FIX() is a kind of ____ function in MS-Access 2010.
93 A
A) Math B) Date C) Text D) None of the above
MS-Access 2010 has added new features of ______ to eliminate the need of VBA code
94 A
A) Macro B) Form C) Report D) None of the above
Encrypting a database does not restrict access to database objects, but to __________ the
95 database. A
A) Open B) Modify C) Read D) Write
Third Party Encryption Technology can also be applied to the database of Microsoft
96 Access 2010. A
A) TRUE B) FALSE
To create a split database in MS Access 2010 go to which tab?
97 D
A) Create Tab B) External Tab C) File tab D) Database Tools
After spliting database,frontend database holds_________________.
98 D
A) Forms B) Query C) Report D) All of the above
After spliting database,backend database holds_________________.
99 A
A) Tables B) Forms C) Query D) Report
When an Access database is split, it creates two files_________________.

100 A) A back-end B) A new database & C) primary database & D) None of the above A
database & front-end Old database. secondary database
database

Page 7 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
A Data Access Page is a special type of _________ that allows users to interface with
101 database using Internet Explorer. C
A) XML page B) HTML Page C) Web page D) None of the above
OLAP systems use concept of OLAP cube called a ______________ cube
102 C
A) single dimensional B) hyper dimensional C) multi dimensional D) none
The data which is to be exported from Tally.ERP 9 can be in ________ format.
103 D
A) XML B) HTML C) ASCII D) ALL
In Tally ERP-9 Remote Access is also known as __________.
104 C
A) Networking B) VB.Net C) Tally.Net D) None of the above
Accessing data store on a remote location using Internet in Tally.ERP9 is
105 called____________. B
A) Local Data B) Remote Data C) Internet Data D) None of the above
Tally.ERP9 can be classified user in two categories are___________.
106 C
A) Local User B) Remote User C) Both A & B D) None of the above
Which of the following is not a predefined security level provided by Tally.ERP 9?
107 B
A) Owner B) Public User C) Data Entry D) Tally.NET User
The business model is represented in the graphical form using ______________ and
________________
108 C
A) charts, pictures B) smart art, clip art C) flowcharts, flow D) graphs, shapes
diagrams
_______ integrates supply and demand mangement within and across companies.
109 B
A) BPM B) SCM C) PLM D) CRM
OLAP stands for _________________.
110 B
A) Online Analysis B) Online Analytical C) Online Analytical D) None of the above
Processing Processing Programming
__________ includes transportation from Suppliers and receiving inventory.
111 A
A) Inbound Operations B) Outbound C) Sourcing planning D) Production
Operations planning
Which of the following is not the service area of SCM?
112 D
A) Logistics B) Asset Management C) PLM D) CRM
Which step of the ERP implementation involves, educating and recruiting end users
113 throughtout the implementation process? B
A) Step 1 B) Step 2 C) Step 3 D) Step 4
The system ____________ process will address issues such as software configuration,
114 hardware acquisition and software testing. C
A) implementation B) upgradation C) installation D) migration
A __________________ review is recommended to ensure that all business objectives
established during the planning phase are achieved.
115 C
A) pre implementation B) under process C) post D) None of the above
review implementation
In _________________ stages, auditors have access to rudimentary ERP tools and capabilities
for auditing security configurations.
116 A
A) post B) pre implementation C) Both A & B D) Either A Or B
implementation

Page 8 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Immediate posting and updation of books of accounts as soon as the transactions are
entered. This is called as __________
117 C
A) Interactive B) Immediate C) Real Time D) Business
Processing Processing Processing Processing
Which of the following ETDS forms are available in Tally.ERP 9?
118 D
A) Form 26, Annexure B) Form 27, Annexure C) Form 26Q, D) All of the above
to 26 to 27 Annexure to 26Q
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely
downloadable utility called __________________
119 B
A) File Validation B) File Validation C) File Valuation D) File Valuation
Program Utility Program Utility
ERP systems provide an access to the__________ data
120 A
A) integrated B) distributed C) isolated D) de-centralized
________________ is a tool that refers to skills, processes, technologies, applications and
practices used to facilitate better, accurate and quicker decision making.
121 D
A) Data Warehousing B) Data Modeling C) Business Modeling D) Business
Intelligence
Business intelligence systems are ________ Decision Support Systems.
122 A
A) data-driven B) information driven C) resource driven D) none

Data warehousing technology is the process of creating and utilizing the company’s
123 __________ B
A) general data B) historical data C) operational data D) none
The data in the Warehouse comes from the _________ environment and external sources.
124 A
A) operational B) backup C) data D) none
In essence, SCM integrates ___________ management within and across companies.
125 A
A) supply and demand B) supply and chain C) supply and sortage D) none

_____________ including all fulfillment activities, warehousing and transportation to


customers.
126 B
A) Inbound operations B) outbound C) hybridbound D) none
operations operations
Customer Relationship Management is a ________________ level strategy.
127 B
A) business B) corporate C) strategic D) none
Operational CRM provides support to ___________ business processes.
128 A
A) front office B) back office C) staff D) none
Collaborative ______ ultimate goal is to use information collected by all departments to
129 improve the quality of services provided by the company. A
A) CRM's B) ERP C) SCM D) none
Tally.ERP 9 follows the DES __________ method to safeguard the data.
130 A
A) encryption B) decryption C) cryptography D) none
Immediate posting and updation of books of accounts as soon as the transactions are
entered. This is called as __________
131 C
A) Interactive B) Immediate C) Real Time D) Business
Processing Processing Processing Processing

Page 9 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Business Intelligence Systems are data-driven ___________________.
132 C
A) Information B) Integrated C) Decision Support D) Non-Isolated
Systems Information Systems Systems Information Systems
Which of the following ETDS forms are available in Tally.ERP 9?
133 D
A) Form 26, Annexure B) Form 27, Annexure C) Form 26Q, D) All of the above
to 26 to 27 Annexure to 26Q
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's freely
downloadable utility called __________________
134 B
A) File Validation B) File Validation C) File Valuation D) File Valuation
Program Utility Program Utility
With ______________ technology the characters are reduced in breadth and user is allowed
to input additional characters which would make the account name, entity complete
135 C
and readable.
A) Tally Fix B) Tally Adjust C) Tally Fit D) Tally AutoFit
In Tally.ERP 9 __________________ provides the user with administrator rights and the
capability to check the entries made by the authorised users and alter these entries, if
136 necessary. D
A) User-defined B) HTTP-XML based C) Unlimited multi- D) Audit Feature
Security data interchange user support
__________________ is an enabling framework which establishes a connection through which
the remote user can access the Client's data without copying/transferring the data.
137 C
A) Direct Web B) Web Publishing C) Tally.NET D) Email facility
Browser Access
If we want the company to be connected automatically for remote access on load, the
property __________ needs to be set it as Yes.
138 B
A) Allow to Connect B) Contact On Load C) Either A or B D) None of the above
Company
___________________ technology is the process of creating and utilizing the company's
historical data.
139 A
A) Data Warehousing B) Data Modeling C) Business Modeling D) Business
Intelligence
Is there a fixed qualification for internal auditor_________.
140 B
A) TRUE B) FALSE
Which of the following will not appear in the home page of K-Doc?
141 C
A) Powerpoint B) Word C) Paste Document D) My Templates
To change an email header so that the message appears to have originated from
someone or somewhere other than the actual source is known as___________.
142 B
A) Email middle B) Email Spoofing. C) Email hacking. D) Email tracking
attack.
To playfully satirize a website is known as_____________.
143 C
A) Web tapping B) Web Interception C) Web spoofing D) Web threating
_________is the complete package to manage the billing requirements of a CA firm on cash
system of accounting.
144 C
A) Payroll B) eSecretary C) Billing and D) K-DOC application
Accounting software
Which of the following is not a/an feature of eSecretary?
145 D
A) Contact B) Greeting C) Email Management D) Share certificate
Management Management printing

Page 10 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Annual return preparation can be done using ________.
146 A
A) ICAI-ROC B) K-DOC application C) ICAI XBRL Software D) Payroll
application
________is correspondence automation & management software that is seamlessly
integrated with Microsoft Office.
147 B
A) K-DOC application B) eSecretary C) ICAI XBRL Software D) ICAI-ROC
application
________ is an independent,objective assurance and consulting activity designed to add
148 value and improve an organization's operations. C
A) Statutory audit B) Tax audit C) Internal auditiing D) None of the Above
Which of the following is/are the main purpose of the internal audit?
149 C
A) Financial reporting B) Operations of the C) Both A and B D) Either A or B
organization
As per _____________of the Income tax Act,every person carrying on business or profession
150 is requires to get his accounts audited by a CA before the "specified date". D
A) Section 45 B) Section 44AD C) Section 43B D) Section 44AB
__________________ refers to use software/applications to automatically perform tasks such
151 as accounting,preparing trial balance, financial statements etc. and electronically B
A) ERP B) Office automation C) Either A or B D) None of the Above
FEMA Stands for _______________.

152 A) Foreign Exports B) Financial C) Foreign Exchange D) None of the Above C


Management Act Enterprise Managament Act
Management Act
Which application helps the management to allocate the revenue to the credit of the
right employee who identified the opportunity?
153 A) Resource allocation B) Knowledge C) Document D) Client management D
and scheduling management Management Systems

Who has full privileges in the financial accounting application?


154 C
A) Database B) Account C) System D) User Administrator
administrator administrator administrator
_________is the centre point of the financial accounting application as any transactions
155 having financial impact carried out in any other module will reflect in this module. B
A) AP module B) GL module C) AR module D) FA module
In Financial Accounting Application,the transactions flow from GL (General ledger) to
156 other modules. B
A) TRUE B) FALSE
Which of the functionalities is not provided in the purchasing module of Financial
Accounting Application.
157 A) Evaluation of B) Receipts of goods or C) Invite and analyze D) Comparison with D
Vendors service quotations from budgets
vendors
In Financial Accounting Application,automatic sequence number of documents control
is not required in which of the following module?
158 C
A) Purchasing B) Accounts Payable C) Expense D) Fixed assets
Management
Which module of Financial Accounting Application can be used for assigning credit
limit to customers?
159 B
A) Purchasing B) Sales C) Accounts Payable D) Accounts
Receivable

Page 11 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Which of these will trigger/alert for timely payment ?
160 C
A) Accounts Payable B) Accounts C) Expense D) Bank
Receivable Management Reconcilations
We can manage interviews,offers and job vacancies by using which of the application?

161 A) Resource allocation B) HR and Payroll C) Knowledge D) None of the Above B


and scheduling applications management

________,___________,__________ are commonly referred to as CIA in information security


parlance.
A) B) C) D)
162 A
Confidentiality,Integrit Confidentiality,Integrit Confidentiality,Integrit Confidentiality,Integra
y and Availability y and Authentication y and Access rights tion and
Authentication
___________provides information about updation of project cost based on time spent by
employees on various projects.
163 D
A) Performance B) HR management C) Payroll D) Timesheet
management system system application
Which of the follwing is not a/an functionality provided by PMS?

164 A) Capture the Key B) Employee C) Automated alerts D) Prepare summary B


Performance designation and for pending appraisals or bell curve analysis
Indicators reporting structure of all employees
___________automates the calculation of salary for taking inputs from the timesheet
application, leaves from Leave Management System and salary details from the HR
165 master data. C
A) Timesheet System B) HR management C) Payroll System D) Knowledge
System management System
Which of the follwing is not a control in Leave Management System?

166 A) Reduce B) Excess leave C) Error free capture D) Approval workflow C


administrative burden of leave details
on HR
Permanent Audit File are obtained once but updated on __________basis.
167 B
A) half-yearly B) yearly C) monthy D) quarterly
In Permanent Audit file, _______ is not the key data documented.

A) Organization chart B) Client’s accounting C) Copies of clients’ D) Copies of important


168 C
manual incorporation contracts or long term
documents like MoC lease agreements

________is a type of training in which user logon on the training server with a user ID and
password.
169 B
A) Internal Training B) E-Learning C) Classroom Training D) E-Training

In some cases, trainee is supposed to appear for the examination/test at the end of the
training is____________.
170 B
A) Classroom Training B) E-Learning C) Virtual Learning D) All the Above

________ are the hardware/infrastructure equipments used in a CA firm.


171 D
A) PC B) Application Server C) WAN D) All the Above

Page 12 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
_____________means information available in the organization should not be altered or
172 modified by unauthorized personnel. B
A) Confidentiality B) Integrity C) Availability D) Authentication
Which of these is/are the standard email program used in an organization?
173 C
A) Microsoft Exchange B) Lotus Notes C) Both A and B D) None of the Above

Which of the following is not a characteristics of WAN?

174 A) Most WANs are B) Compared to LAN, C) WAN uses only D) Switches are used B
owned by only one its transmission speed private networks. to connect LAN and
organization. is low WAN
_________is protection of information assets from threats to preserve their value.
175 C
A) Confidentiality B) Integrity C) Information D) None of the above
Security
Which types of information assets need to be secured in a CA Office?
176 D
A) Client data B) Own data C) Own documents D) All the above
The extent and level of _________ would depend on the nature of information.
177 B
A) Availability B) Confidentiality C) Integrity D) Authentication
__________ of information might be affected due to denial of service attack or some other
178 reasons. D
A) Integrity B) Authentication C) Confidentiality D) Availability
__________means the sender cannot deny having sent a message and receiver cannot deny
179 receiving the message. A
A) Non-Repudiation B) Integrity C) Authentication D) Confidentiality
Risk may not be _______ in nature.
180 D
A) reputational B) financial C) operational D) vulnerable
The process of identifying an individual, usually based on user id and password in an
181 organization is called______________. B
A) Availability B) Authentication C) Confidentiality D) Integrity
Which of the following is not a software equipment required in a CA's office?

182 A) Resource allocation B) Client management C) HR and Payroll D) None of the Above D
and scheduling

Which of the following is not an application arranged by ICAI?


183 D
A) ICAI-XBRL suite B) K-DOC C) Billing and D) ICAI-TOC
Accounting
PBX stands for ________
184 C
A) Private Exchange B) Public Exchange C) Private Branch D) Public Branch
Branch Branch exchange exchange
________ is the process of meeting the financial goals through the proper management of
finances.
185 C
A) Corporate planning B) Monte Carlo C) Financial planning D) Personal Finance
simulation planning

Page 13 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
___________ can be defined as the process of setting the procedures in the organization for
achieving the predefined goals.
186 B
A) Monte Carlo B) Corporate Planning C) Decision Tree D) Corporate Planning
Simulation Analysis & Analysis
________ shows ability of company to pay back long term loans along with interest or
other charges from generation of profit from its operations.
187 B
A) Debt Assets Ratio B) Interest Coverage C) Total Fund Ration D) None of the above
Ratio
_____________________is the simplest method of comparing different stocks at a point of time
to make investment decisions.
188 C
A) Earnings Per share B) Fixed Asset Over C) Price Earnings D) Gross Profit Ratio
ratio Multiple
The very first line of code of XML file is_____________.

A) <?xml B) <?xml version="2.0" C) <?xml D) <?xml


189 C
version="3.0" encoding="ISO-8859- version="1.0" version="0.0"
encoding="ISO-8859- 1"?> encoding="ISO-8859- encoding="ISO-8859-
1"?> 1"?> 1"?>
Every bit of data has to start and end with an identical tag

190 A) B) C) D) A
<TagName>Data</Tag </TagName>Data<Tag </TagName>Data</Ta <TagName>Data<Tag
Name> Name> gName> Name>
Deletion of XML Map is done through __________.
191 C
A) Directally Delete B) Delete Button C) XML Maps Dialog D) None of the above
Command Box
Excel works primarily with ________ types of XML files.
192 B
A) 3 B) 2 C) 1 D) 4
Method of tax calculations shall change according to _________.
193 D
A) Annual Income B) DOB C) status of assess D) All of the above.
________ is a process used in statistical analysis in which a predetermined number of
observations will be taken from a larger population.
194 B
A) Snowball sampling B) Sampling C) Systematic D) Simple random
sampling sampling
In __________, Individuals are selected at regular intervals from a list of the whole
population.
195 C
A) Clustered sampling B) Sampling C) Systematic D) Simple random
sampling sampling
In ______________ each individual is chosen entirely by chance and each member of the
population has an equal chance, or probability, of being selected.
196 D
A) Snowball sampling B) Convenience C) Systematic D) Simple random
sampling sampling sampling
Which method is commonly used in social sciences when investigating hard to reach
groups?
197 C
A) Quota Sampling B) Sampling C) Snowball sampling D) Simple random
sampling
__________ are useful for quick reading and easy understanding, particularly for top
198 management. B
A) Balance sheet B) Summary reports C) IRR D) NPV

Page 14 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Popular methods of capital budgeting include _________ and payback period.
199 D
A) discounted cash B) internal rate of C) net present value D) All the above
flow return
_________ is the value of all future cash inflows less future cash outflows as on today.
200 A
A) Net present value B) Working capital C) IRR D) PMT
___________is the process of defining and analyzing the dangers to individuals, businesses
and government agencies posed by potential natural and human-caused adverse events.
201 B
A) Sensitivity analysis B) Risk analysis C) Qualitative risk D) Scenario analysis
analysis
__________ which is used more often, does not involve numerical probabilities or
predictions of loss.
202 C
A) Sensitivity analysis B) Risk analysis C) Qualitative risk D) Scenario analysis
analysis
________ are generally used to present information in a simple and better way and also be
203 used to analyse the risk in a better way. D
A) Graphs B) Sparklines C) Both A& B D) Charts
It is a technique used to determine how different values of an independent variable will
impact a particular dependent variable under a given set of assumptions.
204 B
A) Decision Tree B) Sensitivity analysis C) Both A& B D) Neither A &B
analysis
_______ involves computing different reinvestment rates for expected returns that are
reinvested during the investment horizon.
205 A
A) Scenario analysis B) Sensitivity analysis C) Decision Tree D) None
Analysis
Which function that is used to calculate the payment for specific loan terms ____________
206 B
A) SUMIF() B) PMT C) COUNTIF() D) None of the above
________helps to break down the Return on Equity
207 A
A) Du Point Analysis B) Return on C) Profitability Ration D) None of the above
Investment
_______ is a common method for financing property, facilities, and equipment.
208 B
A) Mortagage B) Leasing C) Rent D) All the above
Which option can be used to split windows into four in ms excel 2010?
209 B
A) Format -> Window B) Window -> Split C) View -> Window -> D) View -> Split
Split
How to restrict the values of a cell so that only a list can be entered in a cell?

210 A) Settings Tab under B) Settings Tab under C) Settings Tab under D) All of the above B
the Tab Format -> the tab Data -> the tab Data -> Filter -
Cells Validation >Advanced Filter
What does the COUNTA() function do in MS Excel 2010 ?
211 D
A) Counts cells having B) Counts empty cells C) Counts cells having D) Counts non-empty
alphabets number cells
If the value in A1 is "ITT" and in B1 is "ICAI ", which function in Excel will return " ITT @
212 ICAI " in cell C1? C
A) A1+ "@" + B1 B) A1 # "@" # B1 C) A1 & "@" & B1 D) A1 $ "@" $ B1

Page 15 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Which of the following function will return a value of 7?

213 A) B) C) ROUND(7.4999,0) D) Only B & C D


ROUNDUP(7.4999,0) ROUNDDOWN(7.4999,
0)
A tiny chart embedded in a worksheet cell that provides a visual representation of data
214 is a _________ B
A) Bar Chart B) Sparkline C) Pivot Chart D) Pie Chart
_________is a graphical equivalent of a pivot table, which is used to visualise PivotTable
215 report summary data B
A) Bar Chart B) Pivot Chart C) Sparklines D) None of the above
To frequently print a specific range of cells on a worksheet , the option used is
216 A
A) Pagelayout -> Page B) Pagelayout -> Print C) Page Setup -> Print D) Print Area
Setup -> Print Area Area Area
Non-excel files can be opened in MS Excel using the
217 C
A) Add Ins B) Developer Tab C) Text Import wizard D) Analysis Tool Pak

_____is a text concatenation operator.


218 C
A) # B) $ C) & D) *
Which of the following is correct?

219 A) AVERAGE(4,5,6,7) B) C) D) All of the above D


AVERAGE(A1,B1,C1) AVERAGE(A1:A6,B1:B
6)
___ function in MS-Excel returns the remainder after number is divided by divisor.
220 A
A) MOD() B) INT() C) DIV() D) REMAINDER()
EXCEL Work in ________ Mode
221 A
A) 3 B) 5 C) 7 D) 11
In Ms-Excel 2010, ______ is Last Column Name?
222 B
A) XWE B) XFD C) XAA D) AAA
In Excel 2010, the default criteria setting for AutoFilter in each field is __________.
223 D
A) Top10 B) Bottom10 C) Top half D) All
Subtotal option is in __________ group of Data tab in Excel 2010.
224 B
A) Sort & Filter B) Outline C) Data Tools D) Calculation
Which of the following cannot store connection information of an external data source
225 in Excel 2010? C
A) Workbook B) .odc file C) .htm file D) .udcx file
The default pivot chart type in Excel 2010 is a ________ chart.
226 A
A) Column B) Line C) Scatter D) Bubble
To consolidate Excel data, ________________________ is used when worksheet data does not
have a consistent layout or pattern.
227 C
A) Consolidation by B) Consolidation by C) Consolidation using D) Any of the above
position category 3-D formulas

Page 16 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
In Excel 2010, the __________ function is used to generate a forecast.
228 A
A) TREND B) STANDARDIZE C) CORREL D) GROWTH
______function calculates the payment for a loan (installment) based on constant
229 payments and a constant interest rate. D
A) PV B) NPV C) IRR D) PMT
__________ are easy-to-use filtering components that enable the user to quickly filter the
230 data in a PivotTable report in MS-Excel 2010. B
A) Sparklines B) Slicers C) Macros D) Data Forms
In Excel 2010, range C3:C6 indicates _______________.
231 A
A) Cells C3 through C6 B) Cell C3 and Cell C6 C) Cell C4 and Cell C5 D) None of the above

Keyboard shortcut to show a shortcut menu in MS Excel 2010 is _______________.


232 A
A) Shift + F10 B) Shift + F1 C) Shift + F11 D) Shift + F12
To select multiple non-adjacent cells in an Excel 2010 worksheet, click them holding
233 _________ key. A
A) Ctrl B) Alt C) Shift D) Ctrl + Shift
A quick way to return to a specific area of a worksheet in Excel 2010 is to type the cell
234 address or range name in the ____________. A
A) Name Box B) Formula Bar C) Zoom Box D) Sheet Tab
In MS-Excel 2010, the Name Box shows the ________________________.

235 A) Name of the B) Name of the C) Name of the cell or D) Formula in the cell C
workbook currently worksheet currently range currently currently working on
working on working on working on
In Excel 2010, what is represented by the small black square in the lower-right corner
236 of an active cell or range? B
A) Copy handle B) Fill handle C) Insert handle D) Border
Suppose we accidentally erased a record in an Excel worksheet. Which command can be
237 used to restore it immediately? D
A) Insert B) Replace C) Paste D) Undo
Excel 2010 offers up to____________sort levels.
238 B
A) 32 B) 64 C) 60 D) 80
Which feature in Excel 2010 enables us to find the input values needed to achieve a goal
239 or objective? A
A) Goal Seek B) Consolidate C) Data Validation D) Subtotal
The INT function________

240 A) Rounds a number B) Rounds a number C) Rounds a number D) Calculates interest B


to a desired multiple down to the nearest up
integer
Which of the following statements about scenarios is not true?

A) A scenario is a set B) A workbook can C) Scenarios provide a D) Scenarios help to


241 B
of values saved with have one scenario per way to see different perform what-if
the workbook. sheet. solutions for analysis.
worksheet formulas.

Page 17 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
What is a scenario summary report?

A) A formatted B) A formatted defined C) A worksheet with a D) A worksheet with


242 A
description of each range of Solver and separate thumbnail for separate macros for
scenario on a separate Goal Seek solutions each formula each scenario
worksheet
What does Solver uses in its dialog box?
243 D
A) Arguments B) Limitations C) Constraints D) Parameters
What term describes a feature that gives Excel enhanced capability?
244 D
A) Trendlining B) Enhancement bit C) Thumbnail D) Add-in
What dialog box allows you to change a field name in a PivotTable?
245 C
A) Field Options B) Field Pane C) Field Settings D) Field Structure
Why are PivotTables considered interactive?

246 A) They allow you to B) They allow you to C) They allow you to D) They allow you to B
add dynamic data. rearrange row and generate e-mail print the reports with
column data. enabled reports. various settings.
Identify the need for controls and auditing in a computerised environment.

247 A) Absence of input B) Lack of visible C) Accessibility of data D) All of the above D
documents transaction trail and computer
programs
Grand totals calculated for any code on a document in the batch are called…..
248 D
A) Financial totals B) Record totals C) Document totals D) Hash totals
Control that checks if correct sequence of commands and update parameters are passed
249 from the application software to the database. B
A) Table level B) Data Integrity C) Batch check D) System test
With respect to data integrity control, when monetary transactions are processed
250 against master files without a match, we should maintain a …. C
A) Sequence account B) Data account C) Suspense account D) Update account
The system test that tests the top-level modules first and then the lower modules are
251 simulated with dummy modules to check the interfaces is called …. D
A) Bottom up test B) Hybrid test C) Stub test D) Top down test
Identify the audit technique that examines each transaction as it passes through the
system.
252 A
A) Embedded code B) Program code C) Database Analyzers D) Database code

The Core Image Comparison audit technique compares the….

253 A) Database with B) Executable program C) Transaction data D) Module programs B


master table with master copy with master with snapshots
transaction
The technique used by an auditor to list unused program instructions is…..
254 C
A) Modelling B) Analyzing C) Mapping D) Tracing
The sample data created and used for the purpose of testing the application system is
255 called…. A
A) Test data B) Table data C) Item data D) Record data

Page 18 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
The test data (dummy unit) implemented in the normal processing of the system over a
period of time is known as….
256 A
A) Integrated Test B) Black box Test C) Graph testing D) Whitebox testing
Facility Facility
The test data generated with correctness proof, data flow analysis and control flow
257 analysis tools is called…. B
A) Test item block B) Test data pack C) Test program pack D) Test record pack
The organisational, management, maintenance and access controls are categories of ……
258 B
A) Application B) General controls C) Check controls D) Input controls
controls
When a real-time system is simulated to generate the same output as the real-time
system, the technique is called….
259 D
A) Parallel trailing B) Tracing parallel C) Parallel coding D) Parallel simulation

When an auditor expands the extent of substantive tests to determine the impact of
defects on the attainment of program objectives, the methodology is….
260 B
A) Cross reference B) Formulate flaw C) Correct lister D) Formulate correct
lister hypotheses hypotheses
This is an important control in systems that use digital signatures for authentication
purposes.
261 A
A) Public audit trails B) Random audit trails C) Sample audit trails D) Data audit trails

Selecting transactions based on a sampling rate is called …. method.


262 B
A) Transaction B) Systematic C) Simple sampling D) Demographic
sampling sampling sampling
The capability of the generalized audit software to read different data coding schemes,
different record formats and different file structures is….
263 C
A) File size B) File data C) File access D) File reorganisation

The audit software capability of frequency analysis is to….


264 D
A) Sort and merge files B) Sampling nth item C) Formatting output
D) Classify data on a
criteria
The audit functions of attributes sampling, variables sampling, stratified sampling are
265 included in …. functions. C
A) Stratification B) Selection C) Statistical D) Reporting
Identify the functional limitation of a generalized audit software that enables evidence
collection only on the state of an application system after the fact.
266 A) Ex Post Auditing B) Analytical review C) Limited ability to D) Limited ability to A
Only only determine Propensity Verify Processing logic
for Error
The purpose-written audit programs are used for…..

A) Sorting, creating, B) Data retrieval, code C) Reading data, D) Specific tasks with
267 D
and printing files comparison selecting and original or modified
analyzing information programs

Picture of a transaction as it flows through the computer systems is called…..


268 C
A) Program B) Track C) Snapshot D) Picture

Page 19 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
The application controls are ….
269 C
A) Input controls B) Processing controls C) Both A and B D) Neither A nor B

Identify the type of audit when auditors are members of the systems development
270 team. D
A) General audit B) Post audit C) System audit D) Concurrent audit
Identify the field check - "If a set of values is defined, is the input data one of these
271 defined values?" C
A) List B) Range C) Slab D) Digit
The field check that conforms if data input for a field is in a particular format.
272 A
A) Format mask B) Data mask C) Field mask D) Input mask
The field check on a processed data that fails if a field is not initialized to zero or errors
273 occur during calculation is…… C
A) Range B) Sign C) Overflow D) Serial
The validation checks applied to a field depending on its logical interrelationships with
274 the other fields in the record are called ….. B
A) Field checks B) Record checks C) Batch checks D) File checks
A group of records or transactions that are contiguous constitute …..
275 A
A) Physical batches B) Logical batches C) Block batches D) Transact batches
…………..is the type of batch check (group of records) for all input records of a particular
276 type is done. C
A) Control totals B) Serial number C) Transaction type D) Sequence check
DB2 is an example of __________
277 C
A) ODBMS B) RDBMS C) DBMS D) None
____________is used to Modify/Change Data in Table
278 A
A) Update Query B) Process Query C) Insert Query D) None
MS-Access is _________________
279 A
A) DBMS B) RDBMS C) ODBMS D) None
Which of the following is not a data type in MS-Access?
280 B
A) Number B) Character C) Memo D) Date
To make changes in MS-Access form should be opened in __________________
281 B
A) Form view B) Form Design C) Change Form D) None
_______layout of a form displays one record at a time
282 B
A) Tabular B) columnar C) Datasheet D) None
In SQL, DML stands for _________
283 A
A) Data manipulation B) Data mathematical C) both a and b D) None
language language
To see more than one record at a time in a form we use _______
284 A
A) Tabular B) columnar C) both a and b D) None
The default query invoked by ms-access is
285 B
A) Update Query B) Select Query C) Delete Query D) None

Page 20 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
__________ software serves as the Intermediary between the user and the database
286 B
A) DATABASE B) DBMS C) O.S D) None
Distributed database have now come to know as a __________ database
287 C
A) Client data base B) Server data base C) Client-Server D) None
database
DDL Stands for -.
288 C
A) Data Design B) Define Data C) Data Definition D) None
Language Language Language
In DBMS, view level data abstraction is known as __________
289 C
A) Internal Schema B) Conceptual Schema C) External Schema D) None

In DBMS, Normalization concept responsible for _______________


290 B
A) Increase data B) Reduce C) Increase Efficiency D) All
duplication Redundancy
one 2 one, one 2 many and many 2 many Relationship exist in _________ model
291 C
A) Hierachical B) FLAT FILE SYSTEM C) Relational model D) None

Record is also known as ________ in a Relational data base


292 C
A) Attribute B) Entity C) Tuple D) None
____________ is extention of ACCESS DATABASE
293 C
A) .mdb B) .dbf C) .accdb D) None
Default length of numeric data type is ____________
294 D
A) 255 char B) 16 chra C) text D) long Integer
Default value option in field property use for ________
295 A
A) enter a value B) for checking C) for validation check D) None
automatically
Value of Report Header exist on ___________ page of report
296 B
A) every B) first C) last D) None
__________ is an action or set of actions that you can use to automate tasks
297 C
A) program B) check C) macro D) All
SQL is a _________ Language
298 B
A) Programming B) Non-Procedural C) Application D) None
Which one is the Second Level of Data Abstraction?
299 B
A) Physical level B) Logical Level C) View Level D) None
Memo data type store _________ number of characters.
300 D
A) 256 B) 1000 C) 16536 D) 63999
__________ data type field can't be updated
301 D
A) YES/NO B) HYPERLINK C) MEMO D) AUTONUMBER

Page 21 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
A Record is also commonly called as a _________
302 C
A) column B) field C) tuple D) None
Most database operations that we do manually can be automated by using
303 D
A) Program B) query C) form D) macro
_________ are what we use to summarize and present data in the table
304 A
A) Report B) Query C) Form D) Macro
A database tabel is similar in appearance to a _______
305 B
A) MS-WORD B) Excel/spreadsheet C) Powerpoint D) None
SQL is considered to be a _______
306 B
A) 3 GL B) 4GL C) 5GL D) None
SQL is considered to as an ideal Language for _______
307 C
A) Java B) Internet C) Database D) Visual Basic
DBMS that supports a database located at a single site is called a _____
308 C
A) Multiuser DBMS B) Distributed DBMS C) Centralized DBMS D) Database
DBMS that supports a database distributed across several different site is called a _____
309 B
A) Client-Server B) Distributed DBMS C) Multiuser DBMS D) Centralized DBMS
database
The _________key does not accept Duplicate and Null values in Field.
310 B
A) key field B) Primary key C) Reference Key D) None
______ is often implemented as an array of records
311 B
A) Record B) Tuple C) Tabel D) Attribute
In MS-Access 2010,the ________ control in the form lets the user insert a picture into it.
312 B
A) Title B) Logo C) Picture D) Graphic
Which query should be used to retrieve the following information from table of
313 databases "Which employees earn more than Rs.30,000 a month?" D
A) Search Query B) Make Table Query C) Aggregate Query D) Select Query
Queries in MS-Access 2010 can be used as ________________________.

314 A) View, change and B) A source of records C) Both A and B D) Neither A nor B C
analyze data in for forms and reports
different ways
What is a form in MS-Access?

A) It is a printed page B) It is a Data Entry C) It is a part of D) None of the above


315 where users will enter Screen to make database used by the B
data viewing, entering and analysts to draw
editing data in the conclusions
database table
Which of the following degree of relationship cannot be applied in MS-Access 2010?
316 D
A) One-to-One B) One-to-Many C) Many-to-Many D) Many-to-One

Page 22 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
In an ER model, a/an ___________ is any object, place, person, event or concept about
317 which an enterprise records data. A
A) Entity B) Attribute C) Relationship D) None of the above
The process of arranging data in a logical sequence is called ____________.
318 C
A) Classifying B) Filtering C) Sorting D) Summarizing
If some chunk of data is stored at two places in a database, then ___________.

A) Storage space is B) Changing the data C) It can be more D) Both A and B


319 D
wasted at one place only will easily accessed
cause data
inconsistency
In MS-Access, what data type can be used for a phone number field in a database?
320 B
A) Number B) Text C) Memo D) Any of the above
E-R Diagram is ________________ Model.
321 A
A) Conceptual Model B) Structural Model C) Object Model D) Interface
Which of the following can be a primary key in an employee database?
322 A
A) Employee Code B) Employee Name C) Date of Birth D) Joining Date
Which of the following is a Database Management System?
323 B
A) Java B) Oracle C) Lotus 1-2-3 D) MS-Outlook
Which of the following is not a data type in MS-Access 2010?
324 C
A) Memo B) Yes/No C) Image D) AutoNumber
Which of the following is a New data type in MS-Access 2010?
325 C
A) Memo B) Yes/No C) Calculated Field D) AutoNumber
In MS-Access 2010, __________ queries are best suitable to summarize information and
326 looking for trends. A
A) Crosstab B) Parameter C) Action D) None of the above
Which of the following is not a section in Report Design view in MS-Access 2010?
327 D
A) Report Header B) Page Header C) Detail Section D) Summary Section
Section Section
Which of the following is not an action query in MS-Access 2010?
328 A
A) Select B) Delete C) Make Table D) Update
In MS-Access 2010, which data type is best suitable for storing the price of a
329 commodity? C
A) Text B) Number C) Currency D) AutoNumber
In MS-Access 2010, which of the following data type creates a field that allows the user
to choose a value from another table or from a list of values by using a list box or combo
330 D
box?
A) OLE Object B) Memo C) Hyperlink D) Lookup Wizard
In a table, _____________ uniquely identifies each record that is stored in the table.
331 C
A) Unique Key B) Foreign Key C) Primary Key D) Record Key
_________ is used to insert values in Table directly.
332 A
A) Query B) Report C) Form D) None

Page 23 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
DCL provides commands to perform actions like _________.

333 A) Changing the B) Creating views and C) Authorizing access D) Inserting, updating C
structure of tables indexes and other control over or deleting records
database
A database _______ presents summarized information retrieved from a table in a
334 preformatted, attractive manner. D
A) Form B) Query C) Macro D) Report
In MS-Access 2010, which type of query extracts the data from one or more existing
335 tables and puts them into separate table? D
A) Parameter query B) Update query C) Crosstab query D) Make Table query
In an MS-Access report, in which section we can keep the count[Sales] to calculate the
total sales for each month?
336 D
A) In the Report B) In the Report C) In the Page Footer D) In the Month Group
Header Section Footer Section Section Footer Section
What is the first step in creating a form or report using the Form Wizard or the Report
Wizard in MS-Access 2010?
A) Selecting the fields B) Selecting the C) Reading several D) Selecting how the
337 that we want to underlying table or screens of mostly form or report should B
appear in the form or query on which we useless information be formatted
report want to base the form and clicking next
or report
Which of the following is not an advantage of using a DBMS?

338 A) Data independence B) Data integrity and C) Decentralized data


D) Reduced C
security application
development time
___________ provides in Access 2010 is used to convert database tables to the normalized
form.
339 A
A) Table Analyzer B) Database Analyzer C) Form Analyzer D) None of the above
Wizard Wizard Wizard
Which Ribbon command tab includes the Table Analyzer Wizard in MS Access 2010 ?
340 D
A) Create B) External Data C) Home D) Database Tools
A Junction Table creates a _______________ relationship between two tables.
341 C
A) One-to-One B) One-to-Many C) Many-to-Many D) None of the above
The Primary key of one table and the matching column in another table is known as
342 ______________. B
A) Matching Key B) Foreign Key C) Index key D) None of the above
In SQL, having clause is used for _________

343 A) For ordering B) specifying C) updating records D) None B


records conditions with group
by clause
To compact the database in MS Access 2010, the database must be opened in the
344 ___________. B
A) Inclusive Mode B) Exclusive Mode C) Normal Mode D) Save Mode
In MS Access 2010,_________ help protect a database from system failures and against
345 mistakes that the Undo command cannot fix. A
A) Backups B) Save Database C) Save As Databse D) None of the above

Page 24 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Improving the performance of a database in MS Access 2010 used______________ tool.
346 A
A) Performance B) Hi-tech Analyzer C) Online Analyzer D) None of the above
Analyzer
The _________ can be used to create reports on database objects for planning and
modifying database design.
347 B
A) Table Documenter B) Database C) Query & Report D) None of the above
Documenter Documenter
Use _____________ to grant or revoke permissions or to change the owner of database
objects.
348 C
A) User and Group B) User-level Security C) User and Group D) None of the above
Accounts Wizard Permissions
_____________ commands are used to enforce database security in a multiple user database
349 environment. B
A) Security B) Grant and revoke C) Select D) Create
Which SQL clause is used to retrieve data from database?
350 A
A) SELECT B) WHERE C) FROM D) INSERT
The __________clause is used to filter records in database.
351 B
A) SELECT B) WHERE C) FROM D) INSERT
DCL(Data Control Language) used for

352 A) Entering Data B) Defining Data C) D) All C


Controlling/Accessing
Data
__________is Example of DBMS
353 C
A) Word B) Excel C) Access D) None
What are the features of the Payroll Software provide by the ICAI.
354 D
A) Recruitment B) salary Process C) Time & attendance D) All of the above
Management
Which are the transaction supported by the Billing and Accounting software ?
355 D
A) Billing B) Previous years C) Cash receipt D) All of the above
pending bills
The software provide creating,printing and sending bulk individual mail
is_______________________.
356 A) eSecretary software B) Contact C) Template D) All of the above A
Management software Management software

The feature Archive is available in K-DOC application for the purpose of____________.

357 A) To create new file B) To save file C) To cut & paste the D) None of the above C
completed and old
document.
Employee Information Portal feature in Payroll Application provide employee to view
their________________.
358 A) Personal profile B) PAN Number C) PF No,online D) All of the above D
submission of loan etc

Page 25 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Which is not a feature of ICAI-ROC application ?

A) Generation of forms B) Maintain Minutes C) Calculate the filing D) Bank Receipt


359 D
as per formats and Book fee
requirement of MCA

The Payroll application supports three methods of salary disbursement


are________________.
360 D
A) Salary Paid in Cash B) Salar paid by C) Salary credited to D) All of the above
Cheque/DD Bank
Which Tools and Utilities is not supported by Payroll Application ?
361 C
A) MIS B) Export Journal C) TCS D) Backup utilities
Voucher
The software provide the facility to generate bills,receipts,vouchers and clients
outstanding etc is______________.
362 A
A) Billing & B) Payroll Software C) K-DOC application D) ICAI-ROC
Accounting softwatre application
A software which provide the structured file management and knowledge
mamnagement is_____________________.
363 A) ICAI-File B) K-DOC application C) Knowledge D) None of the above B
management Management Software
application
The software provides a complete package to manage secretarial requirements &
generates forms as per MCA21 requirements
364 D
A) Billing & B) Payroll Software C) K-DOC application D) ICAI-ROC
Accounting softwatre application
The ICAI-ROC provides the facility to prepare________________.
365 D
A) Auto filing of B) Shares C) Annual Returs D) All of the above
eForms Records/Certificates forms
The software which provide the Contact Management,Correspondence Management,
simplified Mail/Email etc.
366 A) eSecretary software B) Contact C) Template D) All of the above A
Management software Management software

Correspondence feature of eSecretary application provide facilities are______________.


367 D
A) Templates B) Blank document C) Outside document D) All of the above
To create New Contact and access Contact features are available in which application ?

368 A) eSecretary software B) Contact C) Template D) All of the above A


Management software Management software

_____________________ is comprehensive package that combines Income Tax,Service Tax,e-


TDS.e-AIR etc.
369 C
A) Tax Application B) K-DOC application C) Tax Suite D) All of the above
Application
The financial transactions are to be …………. leading to different steps in Accounts
Compilation.
370 C
A) Collected and B) Sampled and C) Grouped and D) Assets and liability
computed stratified summarized

Page 26 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
The methods LIFO, FIFO, Moving Average are used to ….
371 A
A) Value closing stock B) Value clearing stock C) Value expense stock D) Value income stock

The report prepared taking the asset and liability type accounts from the Trial Balance
372 is called…. C
A) P & L statement B) Income statement C) Balance sheet D) Asset sheet
The report that depicts operating profit/loss for a period is …..
373 C
A) Trial balance B) Trading account C) P & L statement D) Suspense accounts
The day book contains transactions relating to ………
374 B
A) Income or B) Sales or purchase C) Asset or liability D) Profit or loss
expenditure
The Bills Receivable details are maintained in a ……..
375 C
A) Journal sheet B) Voucher debtors C) Sundry debtors D) Original entry
Creditors ledger has details of your dues to ……..
376 D
A) Customers B) Assets C) Liabilities D) Suppliers
The sundry debtors are placed in the Balance sheet on the ……
377 B
A) Income side B) Assets side C) Expense side D) Payable side
The first step in Tally before any transaction is entered or saved is creating a ………
378 B
A) File B) Company C) Project D) Application
To configure country specific details use the function key……
379 C
A) F10 B) F2 C) F12 D) F11
Identify the security mechanism used in Tally.
380 D
A) Tally Secure B) Tally Pack C) Tally Group D) Tally Vault
The basic document where transactions are entered chronologically is….
381 B
A) Ledger B) Journal C) Voucher D) Trial Balance
After selecting a company in Tally, you will be in the……
382 B
A) Accounts of Tally B) Gateway of Tally C) Entry of Tally D) Groups of Tally
Tally software is based on ……… accounting system.
383 C
A) Sales B) Production C) Mercantile D) Manufacture
Identify the primary group of capital nature that uses bank account and cash in hand as
384 sub groups. B
A) Fixed assets B) Current assets C) Loan assets D) Capital assets
All financial entries in Tally are done using…….
385 D
A) Vouchers B) Groups C) Journal D) Ledgers
The Direct expenses, Purchase account, Direct income are primary groups of …..
386 C
A) Capital nature B) Expense nature C) Revenue nature D) Income nature
The option to delete a sub-group is admissible through the menu……
387 A
A) Alter B) Delete C) Display D) Shift

Page 27 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
The behavioural attributes of this group cannot be changed.
388 C
A) Sub-group B) Ledger-group C) Primary-group D) Alter-group
Credit limits for personal accounts and branches can be done in the ledger mode……
389 B
A) Single B) Multiple C) Sub-group D) Alter-group
We are not allowed to delete a ledger from this mode.
390 D
A) Single B) Sub-group C) Alter-group D) Multiple
All account heads except Cash and Bank are placed in the……
391 C
A) Sub Ledger master B) Group Ledger C) General Ledger D) Journal Ledger
master master master
These are the basis for analysis by potential investors, banks etc.
392 C
A) Journal and Ledger B) P & L Account and C) P & L Account and D) Voucher Account
Journal Balance Sheet and Balance Sheet
Identify the primary group of capital nature that has the sub-groups: Bank OD Account,
393 Bank OCC Account. D
A) Expenses B) Income C) Assets D) Loans
The primary document for recording all financial transactions in Tally is the……
394 C
A) Journal B) Trial sheet C) Voucher D) File
You can customize the voucher entry screen using the function key…….
395 B
A) F13 B) F12 C) F10 D) F11
Identify the voucher type that records fund transfers between cash and bank accounts.
396 D
A) Credit Note B) Payment C) Receipt D) Contra
This voucher type records adjustments between ledgers.
397 D
A) Sales B) Receipt C) Payment D) Journals
The use of classes for payment, receipt and contra vouchers enables data input in ……
398 B
A) Double entry mode B) List entry mode C) Choice entry mode D) File entry mode

The details of a voucher entry can be given in the …….


399 D
A) Comment B) Memo C) File D) Narration
The credit note voucher can hold account types: ……..
400 A
A) Sales account, Sales B) Ledger account, C) Suppliers account, D) Buyer's account,
tax account Bank account Purchases account Cash account
The suffix and prefix details for the voucher type can be made applicable only from the
401 ……. C
A) End of a month B) First of a year C) First of a month D) End of a month
The voucher used to record all bank and cash payments is …..
402 D
A) Credit Note B) Contra C) Sales Note D) Payment
The accounts that the business owns is called ….
403 D
A) Liability B) Income C) Sales D) Asset

Page 28 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Tally's age-wise analysis considers the voucher's ……
404 B
A) Previous date B) Effective date C) Current year D) Configured date
Arrange the steps in generating the books of accounts.
405 1. Create Trial balance C
A) 1, 2, 3, 4 B) 1, 3, 4, 2 C) 2, 4, 3, 1 D) 3, 4, 2, 1
For day-to-day transactions the voucher types used are
406 C
A) Credit purchase B) Cash purchase C) Both A and B D) Contra purchase
Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be
407 entered into the voucher type….. B
A) Loan B) Payment C) Receipt D) Sales
Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10
408 monitors by credit. A
A) Credit Purchases B) Cash Purchases C) Expense Purchases D) Debit Purchases
Identify the voucher type to be chosen for the sale of computers to Anand by cash @
409 Rs.210000 per unit. C
A) Cash Ledger B) Sale Sheet C) Stock Journal D) Purchase Voucher
A bank overdraft repaid by cheque at Rs.25000 can be made in the voucher…..
410 D
A) Payment B) Receipt C) Debit D) Contra
The financial statement that consolidates ledger balances is …..
411 C
A) Balance sheet B) Profit & Loss C) Trial balance D) Journal
statement
The F9 function key in the left side of the Gateway of Tally screen displays the……
412 B
A) Accounting reports B) Inventory reports C) P & L reports D) Expense reports

The option on the Gateway of Tally that will generate the P&L account statement is…..
413 C
A) Net Loss B) Net Income C) Net Profit D) Net Account
The expenditure for running the business for a period is …..
414 A
A) Expense B) Example C) Taxes D) Income
This displays the balance daywise for a selected voucher type.
415 D
A) Record book B) Ledger book C) Journal book D) Day book
The feature in Tally to analyze accounts of a company is…..
416 A
A) Ratio analysis B) Account analysis C) Data analysis D) Transaction
analysis
The age-wise statement is displayed based on……
417 B
A) Income B) Payables C) Expenses D) Loans
The ratio analysis of receivables can be done based on……
418 A
A) Bill date B) Effective date C) Voucher date D) Previous date
Name the statement that helps the management in the decision making process.
419 B
A) Data flow B) Funds flow C) Stock flow D) Cheque flow

Page 29 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
Identify the budget type which is chosen where transaction amounts are to be
monitored.
420 C
A) On closing balance B) On net credit flow C) On net transactions D) On net cash flow

Choose the budget type to be used where bank accounts balances are to be monitored.
421 A
A) On closing balance B) On net credit flow C) On net transactions D) On net cash flow

The management that needs to consolidate the accounts of its various enterprises uses
……. in Tally.
422 B
A) Consolidate B) Group company C) Set company D) Alter company
company
Identify the user who can access audit trails in Tally.
423 D
A) Owner B) Data Entry operator C) Accountant D) Administrator

Identify the accounting feature in tally that facilitates splitting financial years for a
company data.
424 C
A) Month-less B) Yearly-entry C) Period-less D) Transaction-
accounting accounting accounting number accounting
Identify the account type by the rule: "Debit the receiver and credit the giver".
425 B
A) Real accounts B) Personal accounts C) Nominal accounts D) Expense accounts
The tracking of changes in vouchers and ledger masters is done by…..
426 B
A) Tally Vault B) Tally Audit C) Tally Report D) Tally Group
Tally can import data from other programs and creates a log about the activity in the
427 file….. A
A) Tally.imp B) Tally.cfg C) Tally.exp D) Tally.ole
Import and export of data between Tally and other programs is possible with the help
428 of….. C
A) OLE B) DBMS C) ODBC D) MS-XLS
The manual option of voucher numbering leads to…..
429 B
A) Auto numbers B) Duplicate number C) Sequence number D) Range number
The Tally audit trail tracks changes made to vouchers that are …..
430 A
A) more than 30 Days B) less than 30 Days C) more than a day old D) more than a week
old old old
The ratio analysis of Bills Receivables or Bills Payables can be displayed with the
431 function key….. D
A) F5 B) F8 C) F12 D) F6
The test data generated with correctness proof, data flow analysis and control flow
432 analysis tools is called…. B
A) Test item block B) Test data pack C) Test program pack D) Test record pack
When a real-time system is simulated to generate the same output as the real-time
system, the technique is called….
433 D
A) Parallel trailing B) Tracing parallel C) Parallel coding D) Parallel simulation

When an auditor expands the extent of substantive tests to determine the impact of
defects on the attainment of program objectives, the methodology is….
434 B
A) Cross reference B) Formulate flaw C) Correct lister D) Formulate correct
lister hypotheses hypotheses

Page 30 of 31
Advanced ITT QUESTION BANK
S.No. Questions Answer
This is an important control in systems that use digital signatures for authentication
purposes.
435 A
A) Public audit trails B) Random audit trails C) Sample audit trails D) Data audit trails

The first document where the transaction is entered is called a …..


436 C
A) Ledger B) Liability C) Voucher D) Expense
Selecting transactions based on a sampling rate is called …. method.
437 B
A) Transaction B) Systematic C) Simple sampling D) Demographic
sampling sampling sampling
The capability of the generalized audit software to read different data coding schemes,
different record formats and different file structures is….
438 C
A) File size B) File data C) File access D) File reorganisation

The audit software capability of frequency analysis is to….


439 D
A) Sort and merge files B) Sampling nth item C) Formatting output
D) Classify data on a
criteria
The audit functions of attributes sampling, variables sampling, stratified sampling are
440 included in …. functions. C
A) Stratification B) Selection C) Statistical D) Reporting
Identify the functional limitation of a generalized audit software that enables evidence
collection only on the state of an application system after the fact.
441 A) Ex Post Auditing B) Analytical review C) Limited ability to D) Limited ability to A
Only only determine Propensity Verify Processing logic
for Error
The purpose-written audit programs are used for…..

A) Sorting, creating, B) Data retrieval, code C) Reading data, D) Specific tasks with
442 D
and printing files comparison selecting and original or modified
analyzing information programs

Picture of a transaction as it flows through the computer systems is called…..


443 C
A) Program B) Track C) Snapshot D) Picture
Identify the type of audit when auditors are members of the systems development
444 team. D
A) General audit B) Post audit C) System audit D) Concurrent audit
The document used for posting of accounting transactions is ……....
445 D
A) Voucher and B) Ledger and trial C) Balance sheet and D) Journal and ledger
journal balance trial balance
When the debit total is greater than credit total, the amount appears in the …….. column.
446 B
A) Income B) Debit C) Credit D) Expense

Page 31 of 31

You might also like