41
1. In tally, to change the date of the Voucher press ________. A. F2 B. F4 C. Control+F2 D. Control+F4 2. In tally, during voucher entry _____ are used. A. Groups B. Leger Accounts C. A or B D. None of the above 3. Default godown name in tally is ______ A. Primary B. Main location C. A or B D. None of the above 4. Tally Vault is a _______ A. Security mechanism B. Ledger A/C C. Cost category D. None of the above 5. In tally, Credit note records entry for _______________ A. Sales return B. Purchase return C. A or B D. None of the above 6. Tally can maintain a company type accounts with inventory by activating a feature integrate the A/C with inventory _________________

Itt Training Model T Paper - Copy

Embed Size (px)

Citation preview

Page 1: Itt Training Model T Paper - Copy

1. In tally, to change the date of the Voucher press ________.A. F2

B. F4C. Control+F2D. Control+F4

2. In tally, during voucher entry _____ are used.A. Groups

B. Leger AccountsC. A or BD. None of the above

3. Default godown name in tally is ______A. PrimaryB. Main locationC. A or BD. None of the above

4. Tally Vault is a _______A. Security mechanism

B. Ledger A/CC. Cost categoryD. None of the above

5. In tally, Credit note records entry for _______________A. Sales return

B. Purchase returnC. A or BD. None of the above

6. Tally can maintain a company type accounts with inventory by activating a feature integrate the A/C with inventory _________________A. TrueB. False

7. In tally method of voucher numbers is /are _________A. Automatic

B. ManualC. NoneD. All of the above

8. In tally number of users are __________A. 2B. 3

Page 2: Itt Training Model T Paper - Copy

C. 4D. 1

9. Name of the developer of tally is ________A. Peutronics Pvt LtdB. Putronics pvt ltd

C. Puetronics pvt ltdD. Pentasoft

10. Method of voucher number is tally 5.4 is /are _________A. Automatic

B. ManualC. NoneD. All of the above

11. In tally we use F12 key for ______________A. Enter documentB. Change configurationC. A or BD. None

12. In tally to create a new column in balancesheet press ____________A. Control +CB. Alt+C

C. Alt+Control+CD. None of the above

13. In tally we can alter ledger details using either a single or multiple modes but are not allowed to delete a ledger from multiple modes________A. TrueB. False

14. Tally provides ______ difference predefined voucher types.A. 4B. 11

C. 16D. 28

15. In tally a group Company is marked with an ________A. *

B. $C. &D. ^

16. A good example of AIS is the one that is used by distribution firms engaged in distributing products / services to their customers ______________A. TrueB. False

17. DFD document in AIS is called as ______ diagram.A. FlowB. Chart

Page 3: Itt Training Model T Paper - Copy

C. ContextD. All of the above

18. All the rejected orders will be stored in __________file in AISA. CustomerB. SuspenseC. OrderD. None of the above

19. To change the period in tally press______________A. F2

B. F4C. Alt +F2D. Control +F2

20. Difference types of valuation methods are available in tally if you press ___A. F7B. Alt+F7C. Control+F7D. F6

21. In tally, Cntrl+N is used for_____A. ValuationB. Text

C. Open calculatorD. None of the above

22.What is the default financial year in Tally 5.4___________. A.1-4-1995 to 31-3-1996 B. 1-4-1996 to 31-3-1997 C. 1-4-1997 to 31-3-1998

D. None of the above23. In AIS decrease of idle machine time and increased output by proper scheduling

is it true in AIS?A. Yes B No

24. You will get company information, if you press _________from gateway of tally.

A. F3B. Control+F3C. Alt+ F3D. None of the above

25. Tally format of data is compatible with other formats, and the mode of data exchange happen through XML___________A. TrueB. False

26. The orders that can be filled, are entered in a __________ file.A. OpenB. Reorder

Page 4: Itt Training Model T Paper - Copy

C. Back orderD. All of the above

27. An ______ is the official notice that the firm sends to its customers to advise them of the amount of money that is owed.A. InvoiceB. BillC. All of the aboveD. None of the above

28. EDI stands _________A. Sales local cash / chequeB. Sales local creditC. A and BD. None of the above

29. In AIS, the information, stores in a database is called _______ sub system.A. Components based information systemB. Computer based information systemC. Company based information systemD. All of the above.

30. Tally provides the capability to the administrator / auditor to track changes in the area is / are _____________.A. Changes in transactions or vouchersB. Changes in ledger mastersC. Both A& BD. None of the above

31. The computer which can receive data from other computer on the network and print it is ____________A. File serverB. Printer serverC. Receiver D. None of the above

32. ____________ Connects LAN’SA. BridgesB. RoutersC. ProtocolD. Repeaters

33. Collection of instructions is called as ____________-.A. ProcedureB. BatchC. CommandD. Program

34. Combination of alphabetic and numeric data is called __________ data.A. Alpha numericB. Alpha beta

Page 5: Itt Training Model T Paper - Copy

C. Numerous alphaD. Number & Alpha.

35. Computers can be classified based on ___ and _______A. Space occupied, price, no of users allowed.B. Cost, performance, their ratioC. Size, performance, cost.D. Input, output, performance ratios.

36. _______ is the world’s largest computer network.A. EthernetB. InternetC. ArpanetD. None of the above.

37. _________ is the capability of the operating system to run numerous applications simultaneously.A. MultiprocessingB. Multi threadingC. MultiplexingD. Multitasking

38. ________ involves conversion of raw data in to some meaningful information.A. InterpreterB. CompilerC. ConverterD. Processor

39. ________ printers use light to produce the dots needed to form pages of characters.A. Impact printersB. Drum printersC. Non impact desktop printersD. Thermal printers

40. Hardware components in a computer are _________.A. Operating system, boot strap, kernel, shellB. Monitor, program, keyboard, busC. Control program, interpreter, assembler, and computer.D. CPU , memory, input, output.

41. ________ is a set of special instructions used to communicate effectively with the computer.A. BatchB. ProtocolsC. Software’sD. Procedures

42. _______ is / are a popular front end tool.A. visual basicB. Power builderC. SQL * Plus

Page 6: Itt Training Model T Paper - Copy

D. All of the above 43. ______ translates assembly language program in the machine language instructions.

A. CompilerB. Interpreter

C. AssemblerD. Processor

44. _________ S/W enable users to send and receive data to / from remote computers.

A. ApplicationB. SystemC. Operating systemD. Communication

45. ____- printers use laser light.A. Band printerB. Drum printerC. Non impact printerD. None of the aboveE.

46. __________ S/W enhances the user to enter store, manipulate and print any text.A. Data managementB. Word processingC. Electronic spreadsheetD. None of the above

47. ________ is a collection of related fields.A. FieldB. FileC. RecordD. None of the above

48. ________ capability supports concurrent users doing different tasks.A. MultiprocessingB. MultithreadingC. MultiplexingD. NAO 49. When all the processing is done by the mainframe itself, the type of processing is

sometimes called as __________--.A. Server processingB. Host processingC. Dumb processingD. Data processing. 50. DBMS model can be grouped under _____ categories.

Page 7: Itt Training Model T Paper - Copy

A. FourB. OneC. TwoD. Many

51. A new user initiates a new process of execution at the background, while the user can continue his query process as usual in the foreground. This situation is referred to as _________

A. MultiprocessingB. Multi threadingC. MultiplexingD. None of the above

52. SMTP stands for ____________A. System modulation transfer protocolB. Software mail transmission protocolC. Simple mail transfer protocolD. None of the above

53. ATM stands for ______________A. Aggregate transfer modeB. Area transfer modeC. Asynchronous transfer modeD. None of the above

54. SCARF involves embedding audit s/w modules with in an application system to provide continuous monitoring___________

A. TrueB. False

55. The first step for developing CAAT is ______A. To determine the audit objectiveB. Review and evaluate the types of dataC. To obtain a record layoutD. Extract data from file.

56. Using the open database connectivity feature in ACL is __________A. Can bring the data directlyB. Can bring the data indirectlyC. All the aboveD. None of the above

Page 8: Itt Training Model T Paper - Copy

57. White box approach necessary involves expert knowledge on the part of auditor__________.

A. TrueB. FalseC.

58. Auditing with computer necessarily supports the _________A. Documents driven approachB. Risk driven approachC. Unique approachD. None of the above

59. For computerized auditing usage of sophisticated audit s/w would be a necessity ___________

A. TrueB. False

60. Computer operation controls are designed to provide ________A. The of by all concernedB. Providing access to computer to all organization personnelC. Use of any programD. None of the above

61. Systems development control, apart from others, include authorization, approval, testing, implementation and documentation of new system software and system software modification______

A True B False

62. Super computer are the largest and fastest and is very suitable for commercial application including audit work__________

A. TrueB. False

63. Operating systems are devised to optimize the machine capabilities, the function include ____________

A. Scheduled jobsB. Manage hardware & software resourcesC. Enable multiple user resource sharingD. All the above

64. General-purpose software provides a framework for highly complex scientific operation____________.

A. TrueB. False

Page 9: Itt Training Model T Paper - Copy

65. In batch processing, transactions are processed one after another __________A. TrueB. False

66. The use of computers assisted audit technique is not gaining popularity not only __________

A. With audit departmentsB. With production departmentsC. All the aboveD. None of the these

67. Master file contains current records for identification and summarizing ________.A. TrueB. False

68. Transaction file contains relatively permanent records take product profile, customer profile, employee profile etc______

A. TrueB. False

69. ___________ is a file management software package that lets users & programmers organize data into files and then process those files.

A. FilexB. File o manC. File managerD. Filepet

70. File interrogation refers to the ____ of information, from a file.A. BackupsB. RetrievalC. DeletionD. Addition

71. RDBMS is structured to a series of 2 dimensional tables ___________A. TrueB. False

72. SADB stands for ____________A. Seriously affected databaseB. Subject area databaseC. Software and databaseD. Safely and database.

73. In framed checking the data entry is checked against an expected picture or format ____________

Page 10: Itt Training Model T Paper - Copy

A. TrueB. False

74. ___________ law basically states that there is a specific probability of the first digit of a no. Being 1, 2, 3 etc.

A. BenfishB. BenfordC. BenjaminD. None of the above

75. Check digit is a group of No. s added to a code for determining the accuracy of other digits in the code __________

A. TrueB. False

76. The contents of a field could determine ______ sign for a ___ field.A. Valid, numericB. Invalid, alphabeticC. None of the aboveD. All the above

77. Internal tables are stored tables from which certain values are extracted for further processing and storing____________

A. TrueB. False78. In systems testing, test involves __________A. Bottom up testsB. Top down testsC. Hybrid testsD. All the above

79. Core image comparison is software used by the auditor to compare _____________ version of a program with a secure ____ copy.

A. Executable masterB. Deleted hardC. None of theseD. All the above

80. SAS stands for _________A. System analysis softwareB. System advanced softwareC. All the aboveD. None of the above.81. Log analysis is a s/w used by auditor to detect virus ____________A. True

Page 11: Itt Training Model T Paper - Copy

B. False

82. On line testing techniques the auditor ___________ data either ____________ or fictitious in order to see that a specific program or server edit test is doing its work.

A. Manipulates, realB. Create, falseC. None of the aboveD. All of the above

83. ____________ is a software of CAAT.A. IDEAB. ACLC. ALCD. ACLC

84. Base case system evaluation includes __________A. Fictitious data applied against the client programB. Comparison of source version of a programmedC. Analyzing the picture of a file or dataD. All the above

85. Black box testing seeks to determine whether application output is what it is supposed to be____________

A. TrueB. False

86. In integrated test facility approach the auditor should ensure that the impact of test transaction is subsequently eliminated from the computer files ________

A. TrueB. False

87. Generalized audit software function includes _________A. File access / organizationB. Statistical / arithmetic operationC. Stratification and frequency analysisD. None of the above

88. Sequence check is _________ level control check.A. FieldB. RecordC. Both D. NAO

Page 12: Itt Training Model T Paper - Copy

89. We use hash total to identify _________ within a series where there is a definite relation between items.

A. Duplicate valueB. Combined valueC. GapsD. All of the above

90. ________ Data type is generally used for fields assigned as primary keys in a table.

A. IntegerB. NumberC. Primary numberD. Auto number

91. MS access objects can be published in the web ___________A. TrueB. False

92. The 3 list boxes present at the bottom of the expression builder are called ________

A. Action listB. Macro listC. Expression elements list boxD. None of the above

93. ______ Option is selected from the view menu to create macros with conditions.A. ConditionsB. ActionC. InsertD. None of the above

94. ________ Report can be created with minimum user input.A. TabularB. ColumnarC. Auto reportD. EmbeddedE.95. ________ Layout of a form displays one record at a time.A. TabularB. ColumnarC. Data sheetD. Justified.

Page 13: Itt Training Model T Paper - Copy

96. The table or query name on which we are going to build our report is selected from the __________ dialogue box.

A. Create reportB. Link reportC. Embedded reportD. New report.

97. _______ Window is used to write VB code in access application.A. ReportB. Macro sheetC. ModuleD. None of the above

98. Visual basic language is a ______ tool.A. RAOB. RAPC. RAIDD. None of the above

99. OLE stands for _________.A. Object linking and embeddingB. On line executionC. On line editingD. None of the above.

100. _____ option in publish to web wizard produces a page that is static in nature.A. Static fileB. Static htmlC. Dynamic fileD. None of the above

101. ___________ Page in a web application is used to main gate to the rest of the pages in the application.

A. Start upB. HomeC. EndD. None of the above

102. _______ is fired when an event is triggered is the concept based on a visual basic language.

A. BulletB. CommandC. ProcedureD. None of the above

Page 14: Itt Training Model T Paper - Copy

103. Ms access is a ________A. DBMSB. RDBMSC. Front endD. Language.

104. A collection of stored in different objects is known as a _______.A. Data groupB. Data collectionC. Data baseD. Data storage.

105. Duplication of records in a field won’t be allowed if the fields are declared a ________.

A. Primary keyB. Not numbersC. Candidate keyD. No duplicate key.

106. In Ms access files excluding selection will display only those records which meet the criteria _________

A. TrueB. False

107. Joining tables without any matching values in the fields is called___________.

A. Inner joinB. Self joinC. No match joinD. Outer join

108. Primary key uniquely identifies each record __________.A. TrueB. False.

109. Which of the following dialog box is / are used in the creation of form ________

A. New form dialog boxB. Form create dialog boxC. Form wizard dialogD. Both 1 &3

110. Selecting _ from view menu option can change properties of a form.A. Change properties

Page 15: Itt Training Model T Paper - Copy

B. PropertiesC. Form propertiesD. New properties.

111. In Ms access, while using form Design view, for creating a command button for adding a new record. WE should select the _______ category from the command button wizard.

A. Record navigationB. Record operationsC. Form operationsD. None of the above.

112. _________ Are used to select only some particular records from the table or any other data box objects.

A. FilesB. SortsC. PipesD. Gateways

113. ________ Wild card character represent any single character.A. *B. $C. @D. ?114. A control without a data source is known as _________.A. Bound controlB. Unbound controlC. Data less controlD. Data control.

115. Set of related option buttons, check boxes and toggle buttons is known as _____.

A. Button groupB. Option groupC. Controls groupD. Record group

116. The collection of related data and objects is called ________A. Data baseB. FormC. CollectionD. None of the above.

117. In Ms Access the function that gives the current date is __________A. Current date

Page 16: Itt Training Model T Paper - Copy

B. TodayC. DateD. Day

118. __________ Is a control that lists set of data.A. Text boxB. List boxC. Combo boxD. Static text

119. The wild card representation for any 5-letter word that stats with ram is ____________.

A. Ram *B. Ram ??C. Two of the aboveD. None of the above

120. __________ is an access object that displays un-editable table date.A. ReportB. FormC. TableD. Ledger

121. __________ Represents data in a pictorial format.A. ChartB. LabelC. BitmapD. Report

122. Changes of one table can be carried over to another related table_____________.

A. TrueB. False

123. In Ms access alter command may be used in adding a primary key to a table ______________.

A. TrueB. False.

124. Update query is used to add records from one or more tables to the end of an existing table ___________.

A. TrueB. False

Page 17: Itt Training Model T Paper - Copy

125. ___________ Are used to jump to any kind of information from a datasheet or a form.

A. TableB. FormC. ReportD. Hyperlink.E.126. Make table queries create a new table from the records of another table

_______A. TrueB. False

127. In Ms Access to protect a data base file from illegal access, we may not data base password. The option of setting data base password is available in ____ menu.

A. InsertB. RecordsC. ToolsD. None of the above.

128. We can switch from datasheet view to form view by selecting view _____ form view option.

A. TrueB. False

129. In Ms access while designing a table for a particular field, the required parameter is set to yes, this validates the field as __________.

A. NullB. Not nullC. ZeroD. None of the above

130. Sorting is applied to select only some particular records _________A. TrueB. False

131. ? Wild card character represents any no of character.A. TrueB. False

132. __________ Of the following is /are a type of chart.A. PieB. Bar

Page 18: Itt Training Model T Paper - Copy

C. Both 1 & 2D. None of the above

133. A calculated control uses a expression as a source of data ______A. TrueB. False

134. If a table is joined to itself it is called as ________A. Inner joinB. Outer joinC. Self joinD. Table join

135. In Ms access, the records in a table area sorted based _________.A. The first field of the tableB. The last field of tableC. Primary key fieldD. None of the above

136. A macro is performed only when the user initiates an event._________A. TrueB. False137. We can add our own functions to the expression elements list box of

the expression builds __________A. TrueB. False

138. Chart can be either a form or a report _________A. TrueB. FalseC.139. Group header will be present at the design view of a report even if the

report is not grouped _______________ A. TrueB. False

140. The default data type of VB is integer ___________A. TrueB. False

141. __________ Are forms that are included in other forms.A. Sub formsB. Child formsC. Inner formD. None of the above

Page 19: Itt Training Model T Paper - Copy

142. __________ Are used to represent our data in graphical format.A. GraphsB. ChartC. LabelsD. Report

143. Large ant of data can be summarized using ________ tables.A. PivotB. CreateC. FormD. None of the above

144. __________ Forms displays field in single row.A. Tabular formB. Chart formC. Datasheet formD. No of the above

145. ________ Control is tied to field.A. CalculatedB. UnboundC. BoundD. Static

146. _________ And ________ are the buttons belonging to the option group.

A. Option, toggle and command buttons.B. Command button, check & list boxes.C. List, check & combo boxesD. Option button, toggle button & check boxes.

147. ____________ Allows us to create a filter frame a field short cut menus.

A. Filter by formB. Filter by reportC. Filter by recordD. Filter by input.

148. Digital signature involves two processes, they area ___________ & ___________.

A. Digital signature creationB. Digital signature verificationC. Both A & BD. Either A or B

Page 20: Itt Training Model T Paper - Copy

149. A digital certificate is issued by a certification authority and is signed with the CA’S private key _____________.

A. TrueB. False

150. A digital certificate does contain owners public key, owner’s name, and expiration date of the private key, serial number of the digital certificate______________.

A. TrueB. False

151. ___________ Enables web servers to operate in a secure mode .A. Server certificateB. Developer certificateC. Personal digital certificateD. None of the above.

152. The most widely accepted format for digital certificate is defined by the CCITTX.509 ______________.

A. TrueB. False

153. The relying party can use the ___________ listed in the certificate to verify that the digital signature was creates with the corresponding.

A. Public keyB. Private keyC. Both A and BD. Both B & A.

154. To associate with a key pair with a prospective signer, a certification authority issues digital certificate. __________.

A. TrueB. False

155. __________ is known only to the signer and is used to create the digital signature.

A. Private keyB. Public keyC. Both A& BD. Either A or B

156. ________ is / are a form of advertisement where people relate their experience with products & services.

Page 21: Itt Training Model T Paper - Copy

A. Customer endorsementsB. Bill boardsC. CatalogD. Broadcast

157. The ________ allows for protocol conversion and communication with the bane using the banks private network or the Internet.

A. EDIB. TCP /IPC. EFTD. Gateway.

158. In E commerce, data extraction, transforming the data into transmittable form, transmitting the data and downloading the data are the operations employed in ____________.

A. ComplierB. InterpreterC. AssembleD. EDI

159. The _____ commerce assists in integrating the customers and supplies of the company directly into the organization.

A. Business to businessB. Business to consumer

C. Consumer to businessD. Customer to company.

160. E Commerce is a tool that addresses the desire of firms to cut services cost and improving the quality of goods; it is a definition of E- commerce from ______.

A. Communication perspectiveB. Business process perspectiveC. Service perspectiveD. None of the above.

161. The ____________ is the process of encoding information to prevent it from being read by unauthorized parties.

A. DecryptionB. SSLC. EncryptionD. Subscription

162. The EDI standardization for international trade and commerce is introduced by ___________.

Page 22: Itt Training Model T Paper - Copy

A. ANSIB. UN/EBCDICC. UNESCOD. UN/EDIFACT

163. Decryption is a process employed for scrambling of plain text for web based transaction ______________.

A. TrueB. False

164. The advertising strategies emerging in the on line world are ____________

A. Active or push based advertisingB. Passive or pull based advertisingC. Glow sign or no adding strategiesD. All of the above.

165. The ___________ is a form of mail that is not targeted to a specific audience.

A. E mailB. Bulk mailC. Direct mailD. Junk mail.

166. The alphabet indicating the column followed by the row number is known an ____________.

A. Cell referenceB. Row referenceC. Column referenceD. None of the above

167. The command to display the current date in a cell is ____________A. = today ( )B. = date ( )C. = current data ( )D. None of the above

168. In excel, absolute reference are represented by a ________ before the column and row addresses.

A. Dollar signB. = signC. # signD. None of the above

Page 23: Itt Training Model T Paper - Copy

169. Which of the following do not belong to the formula category in excel environment _________

A. TextB. LogicalC. NumericD. Boolean

170. The function that is used to add together all values that meet specific criteria is known as _____________

A. AverageB. SumC. Sum ifD. Count if

171. A particular part of a work sheet can be printed by setting the _________

A. Page setupB. Print areaC. PrintD. Print preview172. There are __________ types of data tables.A. 1B. 2C. 3D. 4173. ____________ is a set of tables that describe each of the data services.A. Series or rankB. CategoryC. LegendD. Data marker174. The chart that contains only one data series is ____________.A. Column chartB. Bar chartC. Pie chartD. Surface chart.

175. The chart that is used for displaying stock market information ___________.

A. Line chartB. Bar chartC. Stock chartD. Pie chart

176. A pie chart can represent only one data services at a time _________

Page 24: Itt Training Model T Paper - Copy

A. TrueB. False177. Which one of the following statements related to stock chart is not true

___________A. It is also called as high low close chartB. It shows trends over timeC. It is often used to display share market prices over a period of timeD. It is also used for indicating fluctuations in temperature changes.

178. The state govt. needs to finalize a 5 yr plan to implement 100 % literacy in the state. Which one of the following will be the best tool that should be used to work out the plan __________

A. Pivot tableB. Scenario managerC. Pivot tableD. Data table.179. Forecast 99 is a group working on exit poll. It wants the know how

many seat ABC party needs to won in totality to obtain majority to from the govt. which one of the following will be in tool that will help the team _______-

A. Goal seekB. Scenario managerC. Pivot tableD. Data table

180. Which one of the following will be the tool that provides a way to view and compare the results of all the difficult variations together on the worksheet ________

A. Goal seekB. Pivot tableC. SolverD. Data table.181. Spreadsheet are useful for _____________A. Performing calculationsB. Performing database operationsC. Performing text formattingD. All of the above.182. Filtering rearranges a list to display the required records __________A. TrueB. False183. The stacked bar graphs can be represented in _______A. 3 dimensionsB. 4 dimensionsC. Multi dimensions

Page 25: Itt Training Model T Paper - Copy

184. Which 2 of the following statements related to pivot table are true ________

A. It is a tool for summarizing and analyzing the data records in an interactive manner.

B. It is a tool that provides a way to view and compare the results of all the different variations together on the worksheet.

C. It summarizes the data using analytical functions.185. Pick out the window that is not a form of excel ____________A. Application windowB. Document windowC. Modal window.186. The world wide web was devised by _____________A. CERNB. ECRNC. CARND. NET187. Winsock’s is expanded as _______________A. Windows socksB. Windows socketsC. Windows stocksD. None of the above188. The space used by Netscape to store the retrieved page is called

__________A. BufferB. CacheC. Built inD. None of the above189. Internet can be defined as ___________A. Internal networkB. Network of networkC. Intermediate networkD. None of the above190. The most important service of the ________ is to manage traffic

control.A. Application layerB. Transport layerC. Physical layerD. Session layer191. __________ is a program. That displays information about a host

connected to the net.A. Finger serviceB. Ping serviceC. FTP serviceD. None of the above

Page 26: Itt Training Model T Paper - Copy

192. __________ is a program. Or a tool that helps in locating a file anywhere on the net.

A. FTPB. TELNETC. ARCHIED. None of the above193. In an URL the word before the color refers to _________A. Host computerB. None of the resourceC. SchemeD. None of the above194. The web maps are called ____________A. ListB. DirectoriesC. Image listD. None of the above195. Directories consist of ____________ levels.A. NoB. Maximum of fiveC. OneD. Many196. The 2 types of search in veronica are _________ and ___________.A. Directory search, index searchB. Index search, new searchC. New search, item searchD. Item search, index search.197. Mosaic displays links in color where as _________ does not display

links in color.A. Net sharkB. CelloC. LynxD. All the above198. _________ Supports one button publish.A. LynxB. MosaicC. LycosD. Navigator gold 2.0199. __________ is used to transfer and copy files over the internet.A. ICCPB. FTPC. UUCPD. None of the above.200. ________ is a program that helps us to log on to other networks.A. YahooB. FTP

Page 27: Itt Training Model T Paper - Copy

C. TELNETD. None of the above.

201) ____ statements help management in the decision making process

A. Cash flow statementsB. Fund flow statementsC. Either A Or BD. Cash and fund flow statements

202) Budget can be planned based on the followingA. Net transactionsB. Closing balanceC. Both A and BD. Either A or B

203) To create a new company in tally press _______A. F3B. F4C. Alt+F3D. Alt+F4

204) A Group company in tally should consist atleast of ____ members

A. 4B. 2C. 1D. 3

205) A constituent company can be member of more than one group

A. TrueB. False

206) In tally the changes can be tracked in _____ areasA. OneB. TwoC. ThreeD. None of the above

207) Tally creates a log of the import activity in a file called as _______

A. Tally.iniB Tally. impC Either A or BD None of the above

208) Import and export of data between Tally and other programs is possible only through the _____

A. OLEB ODBCC XML

Page 28: Itt Training Model T Paper - Copy

D None of the above209) General controls create a framework of overall control over the

___A. Computer based activityB. Component based activityC. Company based activityD. None of the above

210)________ is the computer on the internet that translates between the internet domain names and the internet numeric address.

A. FTP ServerB. Domain name serversC. Web serversD. None of the above

211) ______ searches by keyword.A. InfoseekB. ExciteC. LycosD. All of the above

212) Gopher and WAIS enables the user to __________A. BrowserB. Read the use net newsC. Search for databaseD. None of the above

212) Prodigy is run by IBM and _______A. DelphiB. MicrosoftC. SearsD. General electric

214) Spreadsheet is a grid of rows and colums and Is called as a ________A. WorksheetB. WorkbookC. TablesD. Database

215)________ is used to differentiate one data series from anotherA. Series or rankB. CategoryC. LegendD. Data marker

216)_______ is a set of tables that describe each of the dataseries.A. Series or rankB. CategoryC. LegendD. Data marker

217) The function that is used to calculate the payment for specific loan terms______

Page 29: Itt Training Model T Paper - Copy

A. SumifB. PmtC. CountifD. None of the above

218) The _______ can be used to select the function and assemble the arguments correctly

A. AutosumB. AutofillC. Function wizardD. None of the above

219) Valued added network is an example of __________A. Global networkB. Private networkC. Satellite area networkD. None of the above

220) In EDI the transmission files are composed of different sets of external format files which are grouped into multiple sets under the name of _____________

A. Batch filesB. Interchange setsC. FunctionsD. Functional groups

221) In EDI standardization for international Trade and Commerce is introduced by ________

A. ANSIB. UN/EBCDICC. UNESCOD. UN/EDIFACT

222) EDI interface, the translation service receives ____ as incoming files fro the communication services

A. Internal format fileB. External format fileC. Transmission fileD. None of the above

223) ____ Commerce assists in interrogating the customers and suppliers of the company directly into the organization

A. Business-to-BusinessB. Business-to-ConsumerC. Consumer-to-BusinessD. Customer-to-Company

224) IFACT is an abbreviation of ______A. EDI for Administration, Commerce and TranscationB. EDI for Administrator ,Consumer and TransportC. EDI for Administration, Commerceand TransportD. None of the above

225) ______ is known only to the signer and is used to create the digital signature

Page 30: Itt Training Model T Paper - Copy

A. private keyB. public keyC. both A & BD. Either A or B

226) _____ are online databases of certificates and other information available for retrieval and use in verifying digital signatures.

A. Private certificateB. RepositoriesC. Public keyD. None of the above

227) The costs of digital signature consists mainly of the following:A. Institutional overhead and subscriber relying party costB. Subscriber relying party costC. Institutional overheadD. None of the above

228) Between and Not Between is_____ type of operatorsA. relationalB. listC. rangeD. logical

229) The default query invoked by ms-access is _______A. Update queryB. Select queryC. Delete queryD. Append query

230) _____ option from the new object toolbar gives the easiest way of generating a report .

A. AutoreportB. ReportC. ModuleD. None of the above

231) _____ queries allows us to view data in row by column manner A. crosstabB. row/column queriesC. select queriesD. update queries

232) To build complex expressions _____ is usedA. CalculatorB. Code builderC. Expression builderD. Expression elements

233) Data validity test representsA. Exception testingB. Comparison of dataC. Duplicate testing

Page 31: Itt Training Model T Paper - Copy

D. All of the above234) We use Hash Total to identify ___ within a series where there is a definite relation between items.

A. Duplicate valueB. Combined valueC. GapsD. All of the above

235) Black box testing is _____ based and white box testing is ____ basedA. Specification, programB. File, hardwareC. None of the aboveD. All of the above

236) SAS stands for _____A. System Analysis SoftwareB. System advanced SoftwareC. All of the aboveD. None of the above

237) For small to medium sized systems, individual modules are coded and individually tested and then assembled to be tested as a whole the testing strategy is referred to ______

A. E-brainB. Bouncing ballC. Big-bangD. Stub

238) IDEA stands for ______A. Incremental designed enlarge activityB. Interactive data extraction and analysisC. Interactive data innumerable analysisD. None of the above

239) Auditing with computer necessarily supports the _____A. Document driven approachB. Risk driven approachC. Unique approachD. None of the above

241) The protocol ____ is a network protocol to be built for the worldwidewebA. Transfer protocol7B. Transmission protocolC. Hypertext D. None of the above

242) SMTP stands for_____A. System modulation transfer protocolB. Software mail transmission protocolC. Simple mail transfer protocolD. None of the above

243) ISDN stands for ______

Page 32: Itt Training Model T Paper - Copy

A. Internal services digital networkB. Internal service design networkC. Integrated services digital networkD. None of the above

244) In tally to cancel a voucher entry we press ____A. Alt+xB. Alt+dC. Alt+cD. Ctrl+d

245) EDI stands for _____A. Exchange data and informationB. Electrical data interchangeC. Electronic data interchangeD. None of the above