You are on page 1of 466

QUESTION

Collection of instruction is called a _____

procedure

batch

Combination of alphabetic and numeric data is


called _____ data

alpha numeric

Computers can be classified based on


______,______and _______

space occupied, price,


no. of users allowed

alpha beta
cost,
performan
ce their
ratio

_____________ is the Worlds largest computer


network .

Ethernet

Internet

_________ are used in large organizations for large


scale jobs

mini computers

microproc
essors

_______ devices are responsible for feeding data


into the computer

input

output

_______ is the capability of the o/s to run numerous


applications simultaneously
multiprocessing

multithrea
ding

_______ involves conversion of raw data into some


meaningful information

interpreter

compiler

_______ device is responsible for obtaining the


processed data from the computer

input

processor

_______ printers use light to produce the dots


needed to form pages of characters

impact printers

drum
printers

Hardware components in a computer are


_____,____,_____,______

operating system,
bootstrap, kernel, shell

control
program,
interprete
r,
assembler
, compiler

_______ software helps to do a specific task for the


user

operating system

applicatio
n software

_______ converts a high level language into


machine language

processor

compiler

_______is/are a popular front end tool

visual basic

power
builder

_______ translates assembly language program into


machine language instructions
compiler

interprete
r

The model through which the relationship is


diplayed between data and information is
called_______

processing model

model

____________looks like a ordinary credit card but


incorporate a microprocessor and memory
chip____________

smart card

RAM

______ computers are used in large organizations


for large scale jobs which have large storage
capacities

mainframes

super
computers

_______ is responsible for all calculations and


logical operations that have to be performed on
the data

control unit

arithmetic
and logic
unit

______ printer use laser light

band printer

drum
printer

______ software enhances the user to enter ,store,


manipulate and print any text

data management

word
processin
g

_______ is the temporary storage place for deleted


files

my computer

recycle
bin

Processed data is called ___________________

data

datum

_____ language consists of strings of binary


numbers

assembly language

machine
language

_________capability supports concurrent users


doing different tasks

multiprocessing

multithrea
ding

bulletin board system

business
broadcasti
ng system

BBS stands for______

USENET is a BBS on ____ scale

Internet can be defined as _______

_________is a program that displays information


about a host connected to the net

small

large

internal network

network
of
network

finger service

ping
service

_______ is a program or a tool that helps in locating


a file anywhere on the net
FTP

TELNET

URL stands for ____________

uniform research
locator

uniform
resource
locator

A ______ always begins with a slash

message

scheme

The World Wide Web is referred to shortly as the


_______

net

______ is a program that helps us to log on to other


networks
Usenet

web

finger
service

HTTP is the acronym for __________

Higher text transfer


protocol

Hyper text
transmissi
on port

______is used to transfer and copy files over the


internet

iccp

ftp

_____ is a program that helps us to log on to other


networks

yahoo

ftp

transfer control
protocol/internet

transmissi
on control
protocol/in
ternet
protocol

TCP/IP stands for ________________

HTTP stands for______

hotlink text transfer


protocol

hyper text
transfer
protocol

Two of the important browsers are_____ and_____

lynx,minx

netscape,i
e

________ are defined as ways of communication


amongst networks

protocols

IP address

HTML stands for_____

higher text medium


language

hyper
transfer
markup
language

The system of interlinked documents is known


as_______

hot links

hyperlink

The small programmes that create


animation,multimedia,real-time games and multi
user games are called______

The information displayed on the web page


includes______,_____ and_____

images

applets

graphics,videos,audio

programm
s,images,t
ext

The web pages that represent online home of their


author are called______
first page

home
page

_____ is the most popular internet service

electronic
mail

yahoo service

_______ is a program or a tool that helps us find a


file anywhere on the net

newsgroup

telnet

Yahoo,lycos,excite and webcrawlers are _____

search engines

web
directories

GIF is the acronym for ____________

Graphical interpreter
formatting

Graphical
interchan
ge Format

Joint Pictures Expert


Group

Jumbled
pictures
expert
graph

The World Wide Web consists of _________

information

web
pages

A hyperlink can be on ___________

text only

image
only

JPEG is the acronym for ___________

Web is a collection of ___________

web sites

images

The two major browsers used to surf the Internet


are ________,_______

MS Internet Explorer
and Mosaic

Netscape
Navigator
and
Mosaic

The internet is also called as _______________

arpanet

the net

The internet is similar to _________________

LAN

peer-topeer
connectivi
ty

The net transfers______ from one place to another

data

parcel

The net provides interesting services


like______,______ and______

scripting,parsing and
compiling

news,cook
ing and
fine arts

________ is the ancestors of the internet

dnet

arpanet

DARPA stands for


_______________________________________________

defensive
administrative rank
administration network

dedicated
and
registered
projects
administr
ation

DARPA is broken into ________ and _______

milnet,smaller arpanet

mailnet,in
et

education,research

music and
dance

Higher text
manipulation language

Hotlink
text
markup
language

NSFNET is the united states provides service to


_____ and_____

HTML stands for


______________________________________

The first international IP network connections were


established in 1973 with _____ and_____
united states and UK

england,n
orway

A_____ is a set of computers interconnected by


transmission paths to exchange information in
internet

client

server

A computer that provides a service usable by other


computers is called______
client

standalone

_____ can be owed by multiple organisation

MAN

LAN

Data is transmitted in the form of_____ signals

analog

digital

Modem stands for __________________

Moralize/demoralize

Modulatio
n/demodu
lation

______ is the process of the digital signals being


converted into a form suitable for analog
transmission

Mapping

Modulatio
n

________ and______ are two basic ways of getting


connected to the internet

Dedicated
access
Satellite link and digital and dial
signals
up access

SLIP stands for ________________

Standard long internet


protocol

Stream
line
internet
protocol

PPP stands for _____

Prime prolonged
protocol

Point to
point
protocol

Identify the need for controls and auditing in a


computerised environment.

Absence of input
documents

Lack of
visible
transactio
n trail

The organisational, management, maintenance


and access controls are categories of

Application controls

General
controls

The application controls are .

Input controls

Processing
controls

Identify the field check - "If a set of values is


defined, is the input data one of these defined
values?"

List

Range

The field check that conforms if data input for a


field is in a particular format.

Format mask

Data
mask

The field check on a processed data that fails if a


field is not initialized to zero or errors occur during
calculation is
Range

Sign

The validation checks applied to a field depending


on its logical interrelationships with the other fields
in the record are called ..
Field checks

Record
checks

A group of records or transactions that are


contiguous constitute ..

Physical batches

Logical
batches

..is the type of batch check (group of


records) for all input records of a particular type is
done.

Control totals

Serial
number

Grand totals calculated for any code on a


document in the batch are called..

Financial totals

Record
totals

Control that checks if correct sequence of


commands and update parameters are passed
from the application software to the database.

Table level

With respect to data integrity control, when


monetary transactions are processed against
master files without a match, we should maintain a
.
Sequence account

Data
Integrity

Data
account

The system test that tests the top-level modules


first and then the lower modules are simulated
with dummy modules to check the interfaces is
called .

Bottom up test

Hybrid
test

Identify the audit technique that examines each


transaction as it passes through the system.

Embedded code

Program
code

Database with master


table

Executabl
e program
with
master
copy

The Core Image Comparison audit technique


compares the.

The technique used by an auditor to list unused


program instructions is..

Modelling

Analyzing

The sample data created and used for the purpose


of testing the application system is called.
Test data

Table data

The test data (dummy unit) implemented in the


normal processing of the system over a period of
time is known as.

Black box
Test
Facility

Integrated Test Facility

The test data generated with correctness proof,


data flow analysis and control flow analysis tools is
called.
Test item block

Test data
pack

When a real-time system is simulated to generate


the same output as the real-time system, the
technique is called.

Tracing
parallel

Parallel trailing

When an auditor expands the extent of


substantive tests to determine the impact of
defects on the attainment of program objectives,
the methodology is.

This is an important control in systems that use


digital signatures for authentication purposes.

Cross reference lister

Formulate
flaw
hypothese
s

Public audit trails

Random
audit
trails

Selecting transactions based on a sampling rate is


called . method.
Transaction sampling

Systemati
c
sampling

The capability of the generalized audit software to


read different data coding schemes, different
record formats and different file structures is.
File size

File data

The audit software capability of frequency analysis


is to.
Sort and merge files

Sampling
nth item

The audit functions of attributes sampling,


variables sampling, stratified sampling are
included in . functions.

Stratification

Identify the functional limitation of a generalized


audit software that enables evidence collection
only on the state of an application system after the
fact.
Ex Post Auditing Only

Selection

Analytical
review
only

The purpose-written audit programs are used


for..

Sorting, creating, and


printing files

Data
retrieval,
code
compariso
n

Picture of a transaction as it flows through the


computer systems is called..

Program

Track

Identify the type of audit when auditors are


members of the systems development team.

General audit

Post audit

The processor uses this workspace as a scratch


pad during processing.

Monitor

Processor

1024 Megabyte is equivalent to:

1 KB

1 MB

The software used for layout of newsletters and


magazines along with text and images is called Application software

Desktop
publishing

The model used to describe the relationship


between data and information is called

System model

Data
model

A super computer uses a bus width of

16 bits

256 bita

When a processor executes one billion floatingpoint arithmetic operations per second, is
called..

Nanoflops

Tetraflops

The processor responsible for communication to


and from all the remote terminals connected is
termed as

Front-end processor

Host
processor

The processors used for speed-critical graphics


applications are

CISC

RISC

The plastic cards with embedded microprocessor


and memory are called..

Credit card

Computer
card

VLSI stands for..

Very large scale


Integration

Very
limited
silicon
integratio
n

The data width of a Pentium 4 computer is

16 bits

8 bits

The unit which executes addition, subtraction,


multiplication and division operations is

CPU

ALU

The instructions to be executed by the processor


are loaded from memory into the

Instruction unit

Process
register

The results of a process are stored into

Accumulator

Generalpurpose
Register

The memory that stores data as a series of


memory cells that can be accessed sequentially
is

DRAM

SAM

Processor bus

Cache
memory

The technology used to accelerate the processing


of a computer is

The memory used in a computer's BIOS chip


is..

Cache memory

SRAM

The process of swapping information between the


RAM and hard disk can cause

Fragmentation

Disk full

Dual independent bus

Dynamic
memory
bus

The DSP,DAC,ADC,and ROM are parts of the

Graphics card

Memory
card

The bus whose widths are 32 or 64 bits is


called

ISA

PCI

The standard system bus was replaced by


frontside and backside bus called.

The maximum resolution of a standard SVGA


adapter is

1024*640

780*1024

. synthesis method uses recordings of


actual instruments.

Amplitude

Frequency

The instrument that can produce continuous lines


is..

Printer

Plotter

PPM , CPS are units used to measure the printer's


..

Speed

Quality

Page definition limit

Page
descriptio
n
languages

The PCL and postscript are defacto standards


for

A laser printer has RAM for downloading fonts


called the.

Font catridges

Dynamic
catridges

The characteristic which refers to how sharply a


pixel appears on the monitor is called..

Convergence

Resolution

The faster the refresh rate, the lesser the


monitor..

Sharpness

Resolution

Size of image

Colors and
shades of
gray that
can be
displayed

The number of bits used to represent a pixel in a


monitor decides the .

The input device that utilizes a light-sensitive


detector to select objects on a display screen is
called..

Touch screen

Touch pad

The most commonly used scanner technology is. Charge-coupled device

Optical
character
recognitio
n

Identify the type of mice that uses optical sensors


to detect motion of the ball.

Mechanical

Optomech
anical

Identify the input device that consists the puck


and the stylus.

Trackball

Joystick

Zip disk

Floppy
disk

Identify the disk which has an access time of


30ms.

A set of tracks across a set of platters in a hard


disk is called a

Disk

Cylinder

The bus used to connect a CD-ROM to your


computer is..

SCSI

PCI

The digital audio tape with the capacity of 24GB of


data uses the technology called ..
Hyper circles

Fero
magnetic

The floppy disks that support 400k-1.2 MB belong


to

Macintosh

IBM

The backward compatible disk that has high


density-120MB is called.

SuperDisk

Jaz disk

The maximum capacity of an optical disk is

700 MB

6 GB

Which of the auxiliary storage devices uses the


constant angular velocity access technology?

Super disk

DAT-ROM

The..is an auxiliary sequential access nonvolatile storage device.

Winchester disk

Zip disk

The portable device that optimizes the features of


the floppy and the CD-ROM is.

Hard disk

Jaz disk

The important central module of an operating


system is the..

Memory module

Data
module

Identify the function of the operating system that


manages the tasks waiting to be processed.

Job management

I/O
managem
ent

This function of the OS manages allocation of a


minimum main memory to tasks.

Disk storage

Memory
storage

Identify the multitasking type that slices CPU time


to each program.

Paralleling

Cooperati
ve

The OS which allows different parts of a single


program to run concurrently is..

Multithreading

Multiproce
ssing

The OS that monitors external activities with


timing constraints is.

Multi-user

Real-time

Win 2000 server

Win 2000
datacente
r

The 32bit operating system for desktop version


that replaces Win 9x is..

The high-level logical disk structure which defines


the way the entire disk is organised is ..

Frame allocation table

File
allotted
table

A collection of sectors on a hard disk is a

Block sector

Cluster

The FAT system that provides long filename


support and was written using protected-mode
code .

FAT16

VFAT

Identify the file system that provides


networking,security,compression, large file
support.

FAT16

VFAT

The logical directory structure has a base of the


tree called the

Root directory

Main
directory

The process used to optimize the disk space by


arranging files contiguously is ..

Formatting

Defragme
ntation

Choose the level of RAID that offers disk mirroring


for fault tolerance.

Level 0

Level 2

Identify the archive formats found on Unix-based


Internet sites.

Zip, LZH, ARJ

Exe, zp, tz

Identify the window screen part that indicates the


name of the window, application or document.

The button on the title bar of a window that


displays the menu to control the size of the
window is..

The mouse operation that is used to move


windows and icons to different locations is ..

Title bar

Menu bar

Scroll box

Control
box

Click

Double
click

The start button,tray and shortcuts are important


features of the .

Control panel

Title bar

The start menu option that keeps track of your


important websites is ..

Documents

Programs

If you want the recycle bin capacity to be


distributed across partitions, you must use the
option

Configure drives
independently

Configure
capacity
independe
ntly

The feature to retrieve deleted files from the


recycle bin is ..

Re-paste

De-link

The feature which enables to synchronize files


between a floppy and disk is ..

My Documents

My
Briefcase

A file with the pdf extension can be viewed with


the application..

Adobe Acrobat Reader

Adobe
Viewer

The remote administration access to view shared


resources on the network is..

Net Neighbourhood

Net Tracer

The utility used to access the directory structure,


create files and folders etc is.

Windows Tools

Windows
Explorer

The font, color, background settings are saved in


the ..

Control panel

My
computer

The Notepad utility saves files in the format.

Binary

Unicode

Identify the windows feature that allows more than


one person to use a single PC with his own
desktop.
Log off

Run

You can quickly access the recently worked on files


from this start menu option.
Favorites

Accessorie
s

The Internet is a network similar to ..

Peer-to-Peer
connectivity

Point-toPoint link

When a computer is connected to the internet


through a LAN

Dial-up access

Dedicated
access

PPP stands for:

Protocol to Protocol
Points

Point to
Point
Protocol

SLIP stands for:

Serial Limited Internet


Protocol

Serial
Lock InterProtocol

When a user connects to Internet with a shell


account it is called .

Direct access

Dedicated
access

The launch of DARPA's Internet Protocol (IP)


facilitated the term..

Network

Consortiu
m

The costs of Internet implementation are..

Computer
cost,
Connection cost, cost of network
telephone line
card cost

This software enables a host to work as a terminal


on the network.

Terminal embedded

Terminal
emulator

The Windows Internet application functions were


developed based on the UNIX programs called..

Sockets

Package

Each computer on the Internet is identified with


a.

24-bit address

16-bit
address

A mail server robot can automatically.

Check mails

Read
mails

This protocol is used to check reliability,


sequencing and flow control.

Transmissi
Transmit
on Control
Communication Protocol Protocol

To check that data reaches the destination in a


proper order, the data packets are assigned.

Order numbers

Packet
numbers

The computer which provides FTP, WWW, Mail


services on a network is called.

Client

Server

The method of accessing files through publicly


accessible server that gives free access to the files
is called
Public FTP

Server
FTP

This file is transferred verbatim with FTP service.

ASCII file

BIT file

We can access the Archie server by

Tunnel

WWW

The types of Archie servers are ..

Straight Archie

Windows
Archie

Login to Archie server

Program
the Archie
Server

% telnet archie.ans.net is the command used by


the Archie client to.

This tool helps us to locate a file anywhere on the


Internet.

FTP

Remote

The computer that maps the Internet domain


name to the Internet numeric address is the ..

Network translator
server

Address
Naming
server

.is the format of Internet Address.

Aaa-bbb-ccc-ddd

Aaa.bbb.c
cc.ddd

The email address has two parts one is the


username while the other is the .

Domain

Net

Universal Resource
Location

Universal
Resource
Locator

This Net tool provides a stimulating on-line


discussion environment.

Internet Relay Chat

Relay
packet
transmissi
on

The IRC II client program command begins with a


.

Percent

Slash

The IRC conversations are organized into.

Chats

Packets

The resources on the World Wide Web are linked


with the naming format ..

Display
chats with
the
Identify the output of the IRC command " /list -min Display channels with at maximum
10" .
least four users
10 users

Lynx text browser is a web client in which users


can login with ..

Self accounts

Terminal
ping

A web browser provides this hotlist for a user.

Book-keeping

Bookmarki
ng

The tool to obtain information on the web by


menus and more flexible than Archie is.

Lynx

Juggler

These servers help in searching for words from a


list of databases or documents.

WIIS and
WINWAIS and WAISMAN NETWAIS

This scripting language is an object based


language and is developed by Netscape.

SGMLScript

VbScript

The one-way broadcast of live events is called.

Netcast

Cybercast

This is a system of thousands of distributed


bulletin boards and read by a newsreader.

Bulletinreader

Newsgrou
p

Unix shell provides mailing programs called .

Pine and Elm

Pile and
Elem

The Unix to Unix copy mail system separates parts


of the mail address with the symbol.....
@

The Netlauncher (TCP/IP) software consists of these


programs that can run under Windows.
Spy Mosaic

Image
View

The parts of the WSIRC server (net tool) window


are..

Server message,
command line and
channels

Server
message,
command
line and
channels

These are small java programs that create games,


multimedia etc. These are downloaded over the
Net and executed by a web browser.
Java scripts

Java exe

The World Wide Web is a collection of..

Web windows

Net pages

It is a link which helps in retrieving information


from the WWW easily.

Netlink

Sitelink

..directories deliver information on all the


topics on the Internet.

Web maps

Net ports

This browser does not display links in color.

Netshark

Cello

The Mosaic browser stores information about the


configuration in a/an .

Ini file

Exe file

This is an indexer that crawls around the web


cataloging.

Webcrawler

Web sites

The option by which the browser window in


Navigator Gold 2.0 can be shifted to editor window
is .
Edit/New file

Edit/Save
Window

This toolbar button displays information about web


creation.
Printer

Web page
starter

This window in Navigator Gold does not support


frame display.

Script window

Browser
window

The different ways of communication on the Web


are..

Interpersonal

Group

This download tool provides multi-server


connection, can search for mirror sites and
provides a file leecher.

Download Accelerator
Plus

Fresh
Download

Thebutton provides HTML tags for font


style, alignments, and colour options.

Edit Format

Character
Format

Identify the search engine that helps in concept


based searching.

Lycos

Yahoo

This is a text only browser.

Lycos

Lynx

The multithreading feature of Netscape is


facilitated with a storage space named..

Archive

Cache

The distributed uploading of web pages through


Navigator Gold is called..

Web loading

Web
updation

The method of presenting information on the web


through highlighted items is called

Hypertext

Webtext

The a2z directory is an alphabetical list of pages


used by the search engine..

Netleecher

Webindex
er

Netscape browser can display context links on an


image called..

Image webs

Image
maps

Name the download tool which highlights an area


of a page and gets all the links that are within the
highlighted area.

...helps in business transactions, generating


revenue and demand on the information highway.

Webcrawler

Webcow

E-commerce

EMarketpla
ce

The transfer of structured data for processing from


computer to computer using agreed formats and
Electronic Document
protocols is called..
Intercahnge

Electronic
Data
Interchan
ge

This system involves electronic transfer of funds


between financial institutions.

Electronic Financial
Transmission

Efficient
Format
Transactio
ns

Value Added Networks

Very
Advanced
Networks

A electronic mailbox stores EDI transactions


for later retrieval.

The mutual satisfaction of price, terms and


conditions, delivery and evaluation criteria in a
marketplace is.

Negotiation and
Bargaining

Networkin
g and
Buying

The type of advertising, the Broadcast and Junk


Mail models are of..

Passive

Push

Identify the models of passive advertising.

Billboard

Portal

This layer is responsible for transmitting data as


frames.

Network Layer

Data Link
Layer

This layer is responsible for encoding of data.

Link Layer

Network
Layer

This layer of the TCP/IP suite includes the device


driver and network interface card.

Application Layer

Link Layer

This protocol is used for flow control, echo and flow Simple Mail Transfer
redirection.
Protocol

Internet
Control
Message
Protocol

The software components that integrates different


hardware devices with the operating system..
Device drivers

Device
modules

This is the basic component that connects the


computer to the network.

Cable Interface Card

Netlink
Interface
Card

The dumb terminal/node in a network depends on


this computer for their basic functioning.

Personal computer

Client
computer

This has an embedded microchip which can both


manipulate data and execute applications.

Data card

Security
card

To ensure a reliable communication between the


buyer and seller, the protocol used is.

Session Socket Layer


Protocol

Secure
Sockets
Layer
Protocol

Sampled
The financial transactions are to be .
and
leading to different steps in Accounts Compilation. Collected and computed stratified

The basic document where transactions are


entered chronologically is.

These are the basis for analysis by potential


investors, banks etc.

Ledger

Journal

Journal and Ledger

P&L
Account
and
Journal

The accounts that the business owns is called .

Liability

Income

The expenditure for running the business for a


period is ..

Expense

Example

Identify the account type by the rule: "Debit the


receiver and credit the giver".

Real accounts

Personal
accounts

The first document where the transaction is


entered is called a ..

Ledger

Liability

The document used for posting of accounting


transactions is ....

Voucher and journal

Ledger
and trial
balance

When the debit total is greater than credit total,


the amount appears in the .. column.

Income

Debit

The methods LIFO, FIFO, Moving Average are used


to .
Value closing stock

Value
clearing
stock

The report prepared taking the asset and liability


type accounts from the Trial Balance is called.

Income
statement

P & L statement

The report that depicts operating profit/loss for a


period is ..

Trial balance

Trading
account

The day book contains transactions relating to

Income or expenditure

Sales or
purchase

The Bills Receivable details are maintained in a


..

Journal sheet

Voucher
debtors

Creditors ledger has details of your dues to ..

Customers

Assets

The sundry debtors are placed in the Balance


sheet on the

Income side

Assets
side

The first step in Tally before any transaction is


entered or saved is creating a

File

Company

To configure country specific details use the


function key

F10

F2

Identify the security mechanism used in Tally.

Tally Secure

Tally Pack

After selecting a company in Tally, you will be in


the

Accounts of Tally

Gateway
of Tally

Tally software is based on accounting


system.

Sales

Production

Identify the primary group of capital nature that


uses bank account and cash in hand as sub
groups.

Fixed assets

Current
assets

All financial entries in Tally are done using.

Vouchers

Groups

The Direct expenses, Purchase account, Direct


income are primary groups of ..

Capital nature

Expense
nature

The option to delete a sub-group is admissible


through the menu

Alter

Delete

The behavioural attributes of this group cannot be


changed.
Sub-group

Ledgergroup

Credit limits for personal accounts and branches


can be done in the ledger mode

Single

Multiple

We are not allowed to delete a ledger from this


mode.

Single

Sub-group

Sub Ledger master

Group
Ledger
master

All account heads except Cash and Bank are


placed in the

Identify the primary group of capital nature that


has the sub-groups: Bank OD Account, Bank OCC
Account.

Expenses

Income

The primary document for recording all financial


transactions in Tally is the

Journal

Trial sheet

You can customize the voucher entry screen using


the function key.

F13

F12

Identify the voucher type that records fund


transfers between cash and bank accounts.

Credit Note

Payment

This voucher type records adjustments between


ledgers.

Sales

Receipt

The use of classes for payment, receipt and contra


vouchers enables data input in
Double entry mode

List entry
mode

The details of a voucher entry can be given in the


.

Memo

Comment

The credit note voucher can hold account types:


..

Ledger
account,
Sales account, Sales tax Bank
account
account

The suffix and prefix details for the voucher type


can be made applicable only from the .

End of a month

First of a
year

The voucher used to record all bank and cash


payments is ..

Credit Note

Contra

Tally's age-wise analysis considers the voucher's

Previous date

Effective
date

Arrange the steps in generating the books of


accounts.
1. Create Trial balance
2. Create new ledgers
3. Generate Day Books
4. Update journals for financial transactions

1, 2, 3, 4

1, 3, 4, 2

For day-to-day transactions the voucher types


used are

Credit purchase

Cash
purchase

Say for example a payment is made to a creditor


ABC - Rs.10000 by cash, it can be entered into the
voucher type..
Loan

Payment

Identify the purchase voucher type, the transaction


for purchase of 10 CPUs,10 monitors by credit.
Credit Purchases

Cash
Purchases

Identify the voucher type to be chosen for the sale


of computers to Anand by cash @ Rs.210000 per
unit.
Cash Ledger

Sale
Sheet

A bank overdraft repaid by cheque at Rs.25000


can be made in the voucher..

The financial statement that consolidates ledger


balances is ..

Payment

Receipt

Balance sheet

Profit &
Loss
statement

The F9 function key in the left side of the Gateway


of Tally screen displays the
Accounting reports

Inventory
reports

The option on the Gateway of Tally that will


generate the P&L account statement is..

Net
Income

Net Loss

This displays the balance daywise for a selected


voucher type.

Record book

Ledger
book

The feature in Tally to analyze accounts of a


company is..

Ratio analysis

Account
analysis

The age-wise statement is displayed based on Income

Payables

The ratio analysis of receivables can be done


based on

Bill date

Effective
date

Name the statement that helps the management


in the decision making process.

Data flow

Funds flow

Identify the budget type which is chosen where


transaction amounts are to be monitored.

On closing balance

On net
credit flow

Choose the budget type to be used where bank


accounts balances are to be monitored.

On closing balance

On net
credit flow

The management that needs to consolidate the


accounts of its various enterprises uses . in
Tally.

Consolidate company

Group
company

Owner

Data
Entry
operator

Identify the accounting feature in tally that


facilitates splitting financial years for a company
data.

Month-less accounting

Yearlyentry
accountin
g

The tracking of changes in vouchers and ledger


masters is done by..

Tally Vault

Tally Audit

Identify the user who can access audit trails in


Tally.

Tally can import data from other programs and


creates a log about the activity in the file..

Tally.imp

Tally.cfg

Import and export of data between Tally and other


programs is possible with the help of..
OLE

DBMS

The manual option of voucher numbering leads


to..

Auto numbers

Duplicate
number

more than 30 Days old

less than
30 Days
old

The Tally audit trail tracks changes made to


vouchers that are ..

The ratio analysis of Bills Receivables or Bills


Payables can be displayed with the function key.. F5

F8

A Kilobyte equals approximately ____.

Ten Bytes

One
Hundred
bytes

_____ stores data as a series of memory cells that


can only be accessed sequentially.

Read only Memory

Flash
Memory

_____ allows to access any memory cell directly.

Flash
Random Access Memory Memory

VLSI Stands for ________.

Very Limited Storage


Integration

Very
Large
Scale
Integratio
n

_____ of the CPU sends command signals to the


other components of the system.

ALU

Which of the following is related to fifth


generation computers?

Very large
scale
Knowledge information integratio
processing system
n (VLSI)

The process of starting a or restarting a computer


system by loading instructions from a secondary
storage device into the computer memory is called Duping

Virtual
Memory

Booting

Medium Scale
Integrated Circuits

Medium
System
Integrated
Circuits

A Pixel is _________

A computer program
that draws picture

A picture
stored in
secondary
memory

. A/n _____ Device is any device that provides


information, which is sent to the CPU

Input

Output

MSI stands for

. Which is the type of memory for information that


does not change on your computer?
RAM

ROM

The third generation of computers dated from


1963 to 1975 used _________.

VLSI

Transistor
s

LSI, VLSI & ULSI chips were used in which


generation?

First

Second

Which of the following is the largest manufacturer


of Hard Disk Drives?

IBM

Seagate

First generation

Second
generatio
n

Networking such as LAN, MAN started from

Which characteristic of computer distinguishes it


from electronic calculators?

Accuracy

Storage

Which of the following is not a type of Software

System Software

Applicatio
n
Software

What do you call the programs that are used to


find out possible faults and their causes?

Operating system
extensions

Cookies

Which computer memory is used for storing


programs and data currently being processed by
the CPU?

Mass memory

Internal
memory

A device that enables a computer to transmit data


over telephone lines
Network card

Sound
card

Data and signals in computer travels through

Car

Bus

___ is a light sensitive pen like device used to point


to displayed objects and to draw images on the
screen
Image scanner

Light pen

The second generation of computers dated from


1959 to 1963 used _________.

Transistor
s

Computer chips

is an electronic data storage medium from which


data is read and written to by using low-powered
laser beam

Magnetic tape

Magnetic
disk

is a large flat circuit board covered with sockets


and other electronic parts, including variety of
chips

Motherboard

Sister
board

___ is a removable flash memory card format used


as storage media for a portable device
Pen drives

Memory
stick

A ____ is commonly used in digital cameras, mobile


phones, laptop computers, MP3 players and so on. Pen Drive

Mini CD

Generally a CD ROM can hold data

250 MB

500 MB

Pen drive is a portable

Flash memory

Primary
memory

A 5.25 inch high density floppy disk can store

1 MB

1.2 MB

EISA stands for _____________.

Extended Industry
Standard Architecture

Extended
Industry
Standard
Associatio
n

What does ALU not perform?

Arithmetic calculations

Comparis
ons

Printers that cannot print graphics, and are in


general, noisy and slow are ____ .

Dot Matrix

Daisy
Wheel

A ____ is one-billion floating point arithmetic


operations per second.

Nanoseconds

Gigaflop

Voice input devices convert a person's speech into


___ form.
Digital

Analog

____ is a device that draws pictures on paper based


on commands from a computer.
Sound card

Plotter

_______ refers to how sharply an individual color


pixel on a monitor appears.

Convergence

Resolution

_________ is defined as the amount of data that can


be transmitted in a fixed amount of time.
Convergence

Resolution

A nanosecond is ______________of a second.

One thousandt
h

One -millionth

_____ are printers that produce images by pushing


electrically heated pins against heat-sensitive
paper.

LED Printers

Thermal
Printers

Which of the following is not a basis of


classification of printers?

Speed

Impact or
Nonimpact

Dot Matrix printer is an example of _______.

Impact Printers

Thermal
Printers

_______ is an expansion board that enables a


computer to manipulate and output sounds.

Sound card

Plotters

________ is an input device that utilizes a lightsensitive detector to select objects on a display
sceen.

Touch Pad

Touch
Screen

In a mainframe computer system, a ___ processor


is responsible for handling communications to and
from all the remote terminals connected to the
computer system.
Back End

Processor

Which of the following is not a type of mouse?

Technical

Mechanical

A measurement that indicates the vertical distance


between each pixel on a display screen is referred
as ___.
Dpi (dots per inch)

Hertz (Hz)

Monochrome monitors display _______ colors.

Which of the following is not a characteristic of


monitor?

Size

Resolution

Magnetic Ink Code


Recognition

Medium
Iron
Character
Recognitio
n

MICR stands for _______________.

The capability of an operating system to process


multiple programs concurrently for multiple users
is known as ______.

Magnetic tape is a ____________ device.

CD-ROM stands for ________.

DAT (Digital Audio Tape) is_________.

Multiprocessing

Multiprogr
amming

Random Access

Indexed Sequentia
l Access

Compact Drive Read


Once Memory

Compact
Disk Read
Only
Memory

Sequential Access
Media

Random
Access
Media

_______ is referred as the time, on an average, the


drive takes to access a particular piece of
information.

Refresh time

Sleep
time

_______ are built into special purpose devices to


perform some specific task.

Embedded Computers

Mainfram
es

Which of the following is not a type of Optical


Disk?

CD-ROM

WORM

Write - Once, ReadMany

WriteOnce,
ReadMultiple

WORM stands for _________.

The process of allowing different parts of a single


program to run concurrently is referred as
_________.

Multiuser

Multiproce
ssing

The process of allowing more than one program to


run concurrently is referred as ____.
Multiuser

Multiproce
ssing

The process of allowing two or more users to run


programs at the same time is referred as ____.

Multiproce
ssing

Multiuser

The physical part of the computer is referred as


_________.

Software

Hardware

The process of allowing more than one process at


the same time is referred as ____.

Multiuser

Multiproce
ssing

_________ operating systems are systems that


respond to input immediately.

Multitasking

Real-time

Single User Opearting


System

Multiple
User
Operating
System

_____ is the input to the processing, ______ is the


output.

Information, Data

Figures,
data

In a mainframe computer system, a ___ processor


is responsible for handling data retrieval
operations.

Front End

Back End

Relevant

Incomplet
e

_____________ is an operating system intended to


serve real-time application requests.

Which of the following is not a characteristic of


useful information?

The first generation of computers dated from 1951


to 1959 used _________.
Computer Chips

Transistor
s

RISC stands for __________.

Reduced Instruction
Satellite Computer

Reduced
Input
Satellite
Computer

_____ controls are designed to provide reasonable


assurance that the recording, processing and
reporting of data through computer systems are
properly performed for specific applications.

General

Applicatio
n

Which of the following is not a type of control


totals ?

Financial totals

Hash
Totals

Which of the following is not a type of system test? Collection Test

Top down
Test

A ______ is a redundant digit that is added to a


code to enable the accuracy of other digits in the
code.

Parity Bit

Check
Digit

__ code type assigns blocks of numbers to the


primary attribute of the entity.

Serial

Block
Sequence

Which of the following is not a feature of system


security?

Confidentiality

Integrity

__ code type assigns consecutive numbers or


alphabets to entities.

Serial

Block
Sequence

SVGA Stands for _____.

Standard Video Graph


Adapter

Super
Video
Graphics
Array

____ controls create a framework of overall control


over the computer-based activities of the firm.

General

Applicatio
n

____ are designed to ensure that the integrity of


the data entered into the computer system is
maintained.

Processing Controls

Input
Controls

____ are designed to ensure that the appropriate


computer processes have been performed on the
data inputted to the computer system.

Processing Controls

Input
Controls

_____ error can occur when a computational field is


not initialized to 0.
Underflow

Overflow

____ are designed so that the results ultimately


reported as a consequence of the inputting and
processing of the data are valid, accurate and
complete.

Processing Controls

Windows ____ is the newest version of the Windows


operating system.
5

Input
Controls

In Windows 7,to the far right of the system clock is


a small rectangular button that serves as the Show
desktop icon is _____________.
Aero Peek

Quick
Launch

Libraries are use in Window 7 for manage

Documents

Music

Which of the following is best when you need to


leave your computer for short time?

Turn Off

Restart

Any files deleted in Windows goes into

Trash in

Recycle
Bin

Central Processing Unit consists of ___, ____ and


____.

RAM, ROM, Cache


Memory

Primary
Memory,
ALU and
Input

Windows 7 is available in__________different


editions

_________controls create a framework of overall


control over the computer-based activities of the
firm

Application Controls

General
Controls

_________check determines the reasonable value


for a field

Limit

Range

In a Record, which Check ensures that an amount


field has a positive sign

Reasonableness

Size

________is a process of grouping together


transactions that bear some type of relationship to
one another.
Batching

Grouping

Logical and Physical are types of _____

Groups

Batches

Physically contiguous transactions constitute


______ batches

Logical

Physical

System Testing can be _______

Top down

Bottom up

In ________testing the top-level modules are tested


first
Hybrid

Bottom up

________software is used by the auditor to compare


the executable version of a program with a secure
master copy
Audit Software

Core
Image
Comparis
on

______audit technique examines the rights


associated with terminals and ability of users to
access information on a database

Core
Image
Comparis
on

Audit Software

________software is used by the auditor to identify


which instructions were used in a program and in
what order

Tracing

Test Data

Which controls provide reasonable assurance that


the recording, processing and reporting of data is
properly performed.

Input controls

Processing
Controls

Two approaches of test data designs are_____

Black Box Testing

White Box
Testing

In ______ testing through the interaction with users


it is determined whether the application outputs
what it is supposed to
White Box

Black Box

_____testing focusses on finding if there is any


defective execution path in a program.

White Box

Black Box

Random

Simple
Random

_____sampling method selects transactions based


on a sampling rate

________refers to computer programs designed to


perform audit tasks in specific circumstances

Which function of GAS classifies data into


categories according to certain criteria?

The audit tasks that can be accomplished using


GAS are

Generalized Audit
Software

Specialize
d Audit
Software

Fil Access

File
Reorganiz
ation

Examine the quality of


data

Examine
the
quality of
processes

_____auditing techniques cover or collect data as


the transaction is being processed

Concurrent audit

Computer security is frequently associated with___ Confidentiality

Post
implemen
tation

Integrity

IDEA stands for ________

Interactin
g Data
Extraction
Interactive Data
and
Extraction and Analysis Analysis

_____data requires validation

Output

Processing

Which of the following is an audit software

Microsoft Office

ACL

There are ____ types of checks that can be run


when data is input

____checks are exclusive to a field only and do not


depend or validate data of other fields.
Record

Field

A __________ is a redundant digit that is added to a


code to enable the accuracy of the other digits in
the code.
Range

Sequence
Check

Which field check finds whether the input data falls


within the allowable value range or not?
Range

Blank
Data

CAAT stands for _________

Computer Aided
Auditing Techniques

Computer
Aided
Audit
Technique
s

_____is not a Record Check

Sequence Check

Check
Digit

BCNF stands for _______________.

Boyce
-Codd
Bradd Codd Normalized Normal
Form
Form

_______ of DBMS is also known as Internal Schema. Physical Level

Logical
Level

A DBMS that supports a database located at a


single site is called a _______.

Distributed DBMS

Multiple
DBMS

One-to-one

One-tomany

Which one of the following is not a degree of


relationship?

____ manages all hardware components and


makes it possible for all other software to run on
the computer.

DBMS software

Applicatio
n
Programs

___ is the software tool used to help manage the


database system's components.

DBMS software

Applicatio
n
Programs

In DBMS, Logical level is also known as__________.

Physical Level

Conceptu
al Schema

____ are the data elements that describe an entity. Attributes

Objects

____ is referred to as the degree of a relationship.

Cardinality

Frequency

______ is represented by a diamond in the ERdiagram.

Decision

Object

ANSI stands for _________.

American National
Simple Institute

American
National
Standards
Integratio
n

____ is used for controlling data and access to the


database.

Data Management
Language

Data
Dictionary
Language

Network Database Model was first implemented by


____.
Rockwell

Honeywell

Which of the following statement is incorrect?

A table is
perceived
as a twodimension
al
structure
composed
In RDBMS, the program of rows
and the data are
and
independent.
columns.

NULL value represents _____.

Blank Value

Zero
Value

________ is a database which contains data about


definitions of the data elements and their
relationships.

Flowchart

Data
Dictionary

A/an ___ is any object, place, person, concept,


activity about which an enterprise records data.

Entity

Attribute

____is implemented as an array of records.

Which of the following statement is incorrect?

Which of the following is not a function provided


by SQL?

A field that uniquely identifies each record is


referred as _______.

Relation

Table

A table is perceived as
a two-dimensional
structure composed of
rows and columns.

Each
row/colum
n
intersectio
n
represents
a single
data
value.

Data Management
Language

Data
Dictionary
Language

Foreign key

Secondary
key

_______is a feature in MS-Access that allows user to


review simple aggregate data in any datasheet.
Total Row

Total
Column

Which of the following is not a feature of RDBMS?

The program and data


are dependent on each
other

Format of
the
database
can be
changed
without
losing the
data

Which of the following is not a valid Data type in


MS Access?

Memo

Picture

In MS Access Hyperlink Data type can store


__________.

Web Address

Email
Address

In MS Access Lookup Wizard is used to


____________

To select from previous


values

To select
values
from Excel
sheet

In a datasheet what does each column represent?

Record

Field

In a datasheet what does each row represent?

Record

Field

What do you call a primary key field included in


another table?

Foreign Key

Parent Key

____________Data independence allows changes in


the physical storage devices?

Two

Physical

________ means that the data contained in the


database is both accurate and consistent?

Data Binding

Data
Mining

The overall design of the database is called the


_______ schema?

Database

External
Subschem
a

An instance of a relation is a set of tuples, also


called __________?

Row

Column

_____ is the process of refining the data model built


by the ER-Diagram.
Redundancy

Administr
ation

The Relational model represents data in the


__________ model called a Relation or a Table.

2-Dimensional

3Dimension
al

Autonumber field cant be updated.

TRUE

FALSE

Using Relationships __________are the benefits.

Consistency

Efficiency

If we type 70,000.07 in new column in datasheet


view for a new table, MS Access 2007 creates a
data type with a field of _______

Number, Long Integer

Number,
Single

In Access 2007, to make changes in the Trust


Center, you need to go to the __________.

Microsoft Office button

Navigatio
n Pane

In MS Access 2007 allows conditionl formatting


within reports

TRUE

FALSE

In Access 2007, you can export data to a .pdf file


format (Portable Document Format) or an .xps file
format (XML Paper Specification) to print, post, and
distribute e-mail.
TRUE

FALSE

In MS Access 2007, _________ is not a valid sample


templates available?

Assets

Liabilities

We use an ______ query when we have to change


or update existing data in a set of records.

Update

Delete

To add new record in a table ________ shortcut key


is used.

CTRL + +

ALT + +

ER-Modelling

Flowcharti
ng

________ is a technique for analysis and logical


modeling of a system's data requirement.

We can use a ______ query to create a new table


from data that is stored in other tables.

Append

MakeTable

We can add ______ number of fields in a table.

255

256

A _________ gives us 2 views of the data at the


same time as Form view and Datasheet view.

Multiple Items

Split form

Unbound control

Calculated
control

A control whose source of data is a field in a table


or query is called a ________

Which of the Following is not an action query?

add

Delete

Query Can be Use to select data from

Single table

Multiple
Table

Which Data type is better to use for storing the


price of an item ?

Text

Auto
Number

Which of the following is use to get data from


user ?

Query

Pages

In a Table to insert User's Voice,Image, Data Field


should be

OLE Object

Sound
Field

Fields cannot be added

Fields
cannot be
Deleted

___ are the persons who run the organization's


daily operations using application programs.

Database Designers

Database
Administr
ators

____ are instructions and rules that govern the


design and use of the database system.

Procedures

Data

After Creating the table which of the following is


correct ?

A DBMS that supports a database distributed


across several different sites is called a _______.

Centralized DBMS

Distribute
d DBMS

____ of DBMS describes the various user views.

Logical Level

View Level

A signature should indicate who has signed a


document , message or record.

Document
Authentication

Signer
Authentic
ation

Server certificate enables the web user to operate


in ______ mode.
Secure

unsecure

The Digital certificate is instrumental in


establishing a secure channel for communicating
any sensitive information back to the mall operator True

FALSE

Certain Certifying Authorities offer ____ classes of


Digital Certificates

If the subscriber loses control of the private key ,


the certificate becomes un reliable & CA may ____
the certificate

update

suspend

CRL stands for

Certificate Replication
list

Certificate
Revocatio
n List

Imposter

Message
Intregrity

DS , if properly Implemented & utlized offer


promising solution to the problems of

Institutional Overhead &


Subscriber & Relying
Institution
Cost Involve in impelmenting Digital signatures are Party Cost
al set up

Computer equipment & software utilizing two such Symmetric


keys are often collectively termed as
Cryptosystem

Cryptosys
tem

The branch of applied mathematics that concern


itself with transforming messages into seemigly
unintelligible form & back again are called

Cryptosystem

Cryptogra
phy

Trusted Time Stamping

Non
Repudiati
on

DrawBacks of Digital Sgnature

Digital Signatures are more difficult to forge than


the handwritten type signatures.

True

FALSE

Signing writing serve the following purposes

Evidence

cermony

Public

Private

Thing that Digital certificate do not contain

Owner's Name

DS of
issuer

Any mark made with the intention of


authenticating the marked document is called
______________.

Authentication mark

Signature

Key/s used in creating dIgital Signatures

______ helps the verifier to determine if the digital


signature was created during the operational
period.

User
stamp on
Company stamp on the the digital
digital signature
signature

____ are on-line databases of certificates and other


information available for retrieval and use in
verifying digital signatures.
Re-storage

Repositori
es

CA stands for ________________.

Centralize
d
Authority

Certification Authority

The word repudiation refers to

ALL

signature
is mine

_____ function is used in both creating & verifying a


digital signature.
Hash Digest

Hash

The Public key Certificate can be used to verify


that a public key belongs to a/an _____

Individual

All public

________ binds an identity to a pair of elctronic Keys


that can be used to encrypt and sign digital
information
Digital Signature

Digital
function

Digital certificate is signed with CA's ______ key

Public

Private

Format for Digital certificate is defined by


__________international standard.

CCITT X.508

CCITT
X.506

How many types of Digital Certificates are there? 1

Which of the following is not a benefit of E-filing?

Statement of deductions (from total income) is


under _______.

Duplication

Accuracy

Chapter IVA

Chapter
VA

Form number _____ is received from all the payers


who have got their tax deducted.

16

16 A

Body of individual should consist of :

Individual only

Persons
other than
individual
only

TRP stands for _____________________.

Tax Refund Preparer

Tax Return
Preparer

E-Filing website is now running on ________


encryption technology.

SSL

SMTP

It is mandatory for Companies and Firms requiring


statutory audit u/s 44AB to submit the ITR
electronically.

TRUE

FALSE

_____ is issued as a proof of filing (ITR) when return


is received and accepted.
ITR 1

ITR 2

IT E-filing website offers two free applications


______ & ______ to fill up the forms.

Word,Exce
l

PDF,Excel

The TRP is entitled to a maximum fees of Rs. 250/from the taxpayer.


TRUE

FALSE

_______ Form number used for Individuals having


income from proprietary business or profession.

ITR 1

ITR 2

Schedule- ______ is the statement of tax deducted


at source on salary.

TDS2

TDS1

Central Processing
Center

Centralize
d
Processing
Code

CPC stands for _________________________.

As per Section 80CCE, the aggregate amount of


deduction u/s 80C,80CCC and 80CCD shall not
exceed one lakh rupees.

TRUE

FALSE

Form 16 issued by the _____ in respect of salary


income.

Employee

Employer(
s)

ITR 7 is filled for persons including companies


required to furnish return under section ____ .

139 (4A)

139 (4B)

Which file format is supported by ITR E-filing?

XML

XLS

Any Company/Firm requiring statutory Audit under


section ______ to submit the ITR electronically.
44A

44AB

The Income Tax department launched the _____


(ITR form) in a new avatar which is really easy to
fill up

Saral

ITSaral

The acknowledgement of the return is deemed to


be the intimation of processing under section
______.

141(1)

142(1)

PAN stands for _________.

Personal Account
Number

Permanen
t Account
Number

Assessee is always a person but a person may or


may not be an assessee.

TRUE

FALSE

It is mandatory to file return of income after


getting PAN.

TRUE

FALSE

Which of the following is not an e-form of RoC?

Form 23AC

Form
23ACA

Control Board of Direct


Taxes

Central
Board of
Duties
Taxes

CBDT stands for ______________________.

Section _____ is used for deduction in respect of


royalty on patents.

80C

80DDB

SRN stands for _____________.

Standard Receipt
Number

Standard
Request
Number

A formula or a function contains invalid numeric


values

# N/A

# NUM

It returns the straight line depriciation of an assest


for one period
PMT

ABS

A process of examing the worksheet for errors in


formula is referred as _____

Accountin
g

Formula Auditing

Select the icon used to decrease the font size of


the selected cells to next smaller setting

A^

A?

To copy a format to many different ranges, after


selecting the source range, we have to double click
the ______ ICON
Format Painter

Font color

Format As Table option is available in _____ group


of _____ TAB

Text
,Insert

Cells, Home

Format as table features with formatting


thumbnails divided into__- section

Graphical representaion of worksheet data is called


as ____
Information

Charts

A line that serves as a major reference for plotting


data in a chart
X axis

Y axis

______ chart is also known as spider chart or star


chart

RADAR

BUBBLE

Can Sparklines be printed?

YES

NO

Function that returns the airthmetic mean of the


argument

AVEDEV

AVERAGE

Integral part of data analysis

Filtering

splitting

In Pivot table non numeric fields are added to _____


Lable, numeric fields are added to _____area
Values, ROW

ROW,
Values

Formulas in Excel 2010 usually begin with _____.

In Excel 2010, _________ error message is given if


the formula contains text that Excel doesn't
recognize.

#NAME?

REF!

The
contents
of the row
are
cleared as
well as
the row is
removed
but the
The contents of the row gap
are cleared but the
remains in
In Excel 2010, if a row is selected and Delete key is emptied row remains in between
pressed, ____________________________.
place
the rows

If cells A12, A13, B12 and B13 in a worksheet of


MS Excel 2010 are merged, the cell reference for
the merged cell is _______.

A12

A13

When a record is deleted using a data form in


Excel 2010, ________________________.

It doesn't get deleted

It gets
deleted
but it can
be
restored

To have column and row headings visible while


scrolling the worksheet of MS Excel 2010,
_______________ feature is used.

Splitting Panes

Freeze
Panes

By default, MS-Excel 2010 aligns text to the


________ of the cell.

Left

Center

In a PivotTable report in Excel 2010, numeric fields


are added to the ________________ area of the
layout section, by default.
Row Labels

Column
Labels

Ranges are defined by the addresses of two


opposite or diagonally pairedcorner cells separated
by _______
colon

two dots

The first cell in an Excel 2010 worksheet is labeled


as ____.
1A

A0

Intersection of row & column in excel 2010 is


called as ___

Paragraph

Cell

In Excel 2010, which of the following is Text


Concatenation operator?

"

We want to set such that when we type RAM and


drag the fill handle, Excel should produceShyam,
Sita, Geeta and so on. What should we set to
effect that?

Custom List

AutoFill
Options

Custom list would be available in _______

File tab

Insert Tab

Suppose you are editing a MS Excel 2010


worksheet that you had previously saved. If you
want to save the edited sheet without losing the
original one, which command should you use?

New

Save As

Which of the following is not a category of


functions in MS-Excel 2010?

Financial

Engineeri
ng

Excel 2010 gives a ____ extension to the template


file.

.xlsx

.xls

DDE stands for

Dynamic
Data
Dynamic Dat Exchange Excel

______ user interface makes Excel 2010 easy to


work in Excel

Result Oriented

Database

Shortcut key to show the shortcut menu

ALT+ F10

ALT

In Excel 2010 cell Number entered is called as

Text

Value

Function used to enter the current date is

Today

=Today

Which function key is used to put dollor sign that


lock the references in place

F3

F4

Example of Absolute Cell Referencing

A4

$A$4

Function that are used to calculate absolute


values, cosines, logs etc

Financial

Date &
Time

In Function FV(rate,nper,pmt,[pv],[type]) "nper"


means

payment
made
each
interest rate per period period

Which of the following is the mathematical


function?

today()

NPV()

following type of files can be exported to Excel


2010

Text file

CSV file

Powerful tool for data analysis which is used to


summarise , analyse explore & present summary
data is called

PIVOT Table

Pivot
Chart

Extension of MS-Excel 2010 is ______

.xlsx

.xls

Microsoft Excel 2010 is developed on the ______


concept

GUI

CUI

Which Function is used to add the cells specified


by a given condition or criteria ?

SUMIF

COUNTIF

Which Function is used to count the number of cell


specified by a given condition or criteria ?
SUMIF

COUNTIF

Which of the following is not What IF analysis tool


in Excel?

Goal Seek

Scenarios

A circular reference is

Geometric modeling
tool

A cell that
points toa
drawing
Object.

________ will find the right input when you know


the result you want

Goal Seek

Macros

A new tab added in excel 2010 ribbon is

Insert

view

Excel 2010 contains _________ number of rows

16384

65536

A__________ is like a pad of preprinted paper

Workbook

Templates

Name Manager option would be available in ____


TAB

Page Layout

Formula
TAB

Internet is also defined as ______________

Information subway

Informatio
n
superhigh
way

Which of the following is not an advantage of EMail?

Fast

Expensive

Dial up Connection

ISDN
Connectio
n

Dial up Connection

ISDN
Connectio
n

ADSL stands for ___________

Asymmetric Digital
Subscriber Line

Asynchron
ous Digital
Subscriber
Line

In the URL, http://www.yahoo.com, yahoo is


_________

Host Name

Domain
Name

_________ connection is an analog connection

_____________is an international communications


standard for sending voice, video and data over
digital telephone lines or normal telephone wires.

__________are stored web page locations that can


be retrieved

Bookmarks

Favourites

The Country Code Domain Name .ch stands for

China

Germany

The Transfer of structured data for processing from


computer to computer using agreed formats and
protocols is termed as _________
EDI

EFT

__________network exchanges EDI messages


among trading partners.

LAN

WAN

SSL stands for ___________

Secure Sockets
Layering

Secured
Socket
Layer

The process of transforming the analog signal into


digital representation at the receiving end is
called_______
Modulating

Transmitti
ng

Contact cards , Contactless cards and combi cards


are
examples of _________
Network Cards

Smart
Cards

_____________is another way to make payments


over the net.

Electronic Purse

EDI

_________is the basic component that will allow a


computer to communicate over a network.

Operating System

Smart
Cards

Co-axial , Twisted Pair and Fiber Optics are


examples of_

Routers

Repeaters

__________is a set of rules for communication


between computers and also provides unique
identities to each computer in the network.

ISP

Protocols

Which of the following is not a protocol?

HTTP

TCP/IP

The TCP/IP model ______ layers

Transport layer is the _____ layer of the OSI model. 2

The first layer of the OSI model is ________

Data Link
Layer

Network Layer

In the OSI model, at the sender's end data is


passed in which way?

From topmost layer


From bottom-most layer to bottom
to top-most layer
most layer

SLIP and PPP are used for__________

Dial Up Access

Dedicated
Access

OSI model has _____layers

In the OSI model, in the second layer, data is


broken into smaller pieces called as

Frames

Packets

Physical Layer

Network
Layer

In the OSI model, data is divided into Frames at


the ____ layer

ASCII stands for _________

American Standards
Coding for Information
Interchange

American
Standard
Code for
Informatio
n
Interchan
ge

_______layer is responsible for encoding data

Network Layer

Physical
Layer

SNMP stands for______________

Simple Network
Management Protocol

Simple
Neutral
Managem
ent
Protocol

_________network also shares operational and


valuable enterprise information with suppliers,
vendors, clients and other businesses

Intranet

LAN

EDI system has _____ components

________is not an component of EDI

Application Service

Transmitti
ng Service

Internal Format File

Internal
File
Format

Lynx is a ___________.

Graphical Browser

Text
based
Browser

Which of the following is not a document created


in EDI?

IFF

EFF

IFF stands for __________

In a Transmission File, documents of the same type


are packaged together as
Groups

Functional
Groups

EDI can support which of the following external


documents standards

EDIFACT

X12

Search Engines

Web
Directorie
s

_____is a cheap solution for long distance calls

VOIP

ISDN
Connectio
n

__________refers to sending unwanted e-mails in


bulk, which provide no purpose and needlessly
obstruct the entire system

Virus Threat

Spammin
g

Firefox, Opera,Netscape and Internet Explorer are


examples of_____

_________is a user command and an underlying


TCP/IP protocol for accessing remote computers

FTP

HTTP

IRC stands for __________

Internet Relying Chat

Internet
Replying
Chat

Communication on the web can be_______

Interpersonal

Group

_______is the process of sending data from a local


system to a remote system such as a server or
peer

Downloading

Uploading

Virtual Private
Network

Virtual
Public
Network

VPN stands for _________

________is the last part of an Internet Domain


Name

Domain Name

Host
Name

The TLD .aero is used for_______

Air Transport Industry

Aeroplane
s

The TLD used for U.S. military sites is_________

.usm

.umil

_________is a term used for hypertext which is not


constrained to be text

Hypermedia

Hypergrap
hics

Search Engines work in the order of_______

Web
Crawling,
Searching,Indexing,Web Searching,
Crawling
Indexing

________involves the electronic movement of funds


and fund information between financial institutions EPS

SLIP stands for_________

ISP stands for________

EFT

Serial Line Internet


Protocol

Sequentia
l Line
Internet
Protocol

Internet Servicing
Provider

Internet
Secure
Provider

______is a system of distributed servers that handle


hypermedia documents
E-mail

Gopher

_______-is another server that receives email


similar to POP server

IMAP

SMTP

_______ is a server that provides an email address


directory for users

SMTP

IMAP

_________tracks all the Gopher menus that can be


accessed

Archie

Veronica

ADSL

Cable
Connectio
n

Country Code Domain


Name

Country
Coded
Domain
Name

_______is not a type of Internet Connection

CCTLD stands for_________

Each computer on the Internet has a numerical


address called the____

Physical Address

Internet
Address

The WWW was created by ___in 1989

Donald Davies

Tim
Berners
Lee

Web sites can be classified as ___ & ____

Static and Dynamic

Dynamic
and Fast

Gmail

Windows
Live
Hotmail

__________ is a faster and more secure free email


services provided by Microsoft

Protocol that is used to transfer data from one


computer
to another through a network is __________

HTTP

TCP/IP

WML stands for __________

Wireless Mode
Language

Wired
Markup
Language

By default, Outlook display the calendar for the


______ date.

New

Current

RSS Feeds stands for ___________________________.

Ready
Start
Syndicatio
Really Start Syndication n

____ allows us to store a detailed list of personal


contacts in MS-Outlook.

Mail

Calendar

____ shows all our incoming email messages in MSOutlook.


Mail

Calendar

POP stands for _____________.

Post Office
Protocol

Point to Point

_____ allows us to send the received mail to a third


party in MS-Outlook.
Reply

Reply to
All

____ allows us to group email messages related to


a specific topic or activity in MS-Outlook.

Folders

Filter

____ Provides us a way to find information, no


matter which folder it is in.

Sorting

Filter

To add new people to the attendee list of an


Outlook meeting, one can click on the
_______________ button.

Add Attendees

Add
Others

In Outlook, "Cc" field stands for _____.

Carbon Cardboard

Carbon
Copy

______ is the outgoing server requires


authentication for sending mails in Outlook.

POP

IMAP

___ allows user to easily change the date currently


displayed in his/her Appointment Book.
Date Navigator

Calendar
Date

SSL stands for ________________.

Secure Sockets Layer

Set Socket
Layer

To view only working days in Outlook calendar


______ key is used.

Alt+Ctrl+1

Alt+Ctrl+
2

______ short cut key is used to navigate from any


Outlook bar to Tasks bar.

Ctrl+1

Ctrl+2

A ____ appointment cannot be seen even if we


make our calendar available to others.

Important

Private

To use Schedule a resource feature Microsoft


Exchange is needed.

TRUE

FALSE

MS-Outlook allow us to repeat the appointments


on regular basis.

TRUE

FALSE

Under Appointment Recurrence dialog box, ___


number of recurrence patterns are available.

Time of the appointment can be set in different


time zones in MS-Outlook?

TRUE

FALSE

Is it possible to drag a appontment from one part


of the calendar to another.

TRUE

FALSE

To make the appointment recur, use ______ button. Repeat

Appointm
ent

The biggest drawback to online outlook calendar is


that we have to be on a system in order to check
or alter the calendar.
TRUE

FALSE

The ________ schedule makes it easy for us to see


the combined schedules of a number of people or
resources needed at a meeting.

Calendar
Group

Appointment

click on Save button on


Which one is not the way of saving the powerpoint the Quick Access Tool
Press
presentation 2010
Bar
Ctrl+F

Powerpoint 2010 provides a pen & ______ tool so


that we can write on the slide while giving a
presentation

Paper

Highlighte
r

Advance slides

Slide
Show

What are the essentials of broadcasting the


presentation ?

Internet Connection

Supported
browser

To begin the broadcast click on ______

Start Slide Show in Slide End


Show Tab
BroadCast

______ feature in powerpoint 2010 enables


presenter to show a slide show with anyone,
anywhere, over the web.

To finish the presentation & ready to end the


Broadcast , press esc and click

Start Slide Show

End
BroadCast

Office 2010 introduces the ________ In MS


powerpoint 2010 to help us to identify and resolve
accessibility issues in the files
Spell Checker

Cryptogar
phy

In MS PowerPoint 2010, __________ tool can be used


to select part of a window while taking a
screenshot.
Screen Clipping

Screen
Cropping

Slide ___________ are motion effects that occur in


slideshow view when we move from one slide to
the next during a MS PowerPoint 2010
presentation.

Animations

Steps to exit the slide show of a MS Powerpoint


2010 presentation?

By
pressing
By pressing down arrow left arrow
key
key

A chart can be inserted in a MS PowerPoint 2010


presentation using _____________________.

Insert -> Pictures ->


Chart

Transitions

Insert ->
Images ->
Chart

The Power point presentation contains three Slide


masters, Slide Notes & Handout in master Views.

True

FALSE

Short cut to open an existing MS PowerPoint 2010


presentation, press __________.

Ctrl + A

Ctrl + N

While printing full page slides in a MS Powerpoint


2010 presentation, select _____________ to print a
thin border around slides.

Border Slides

Frame
Slides

The shortcut key to start the slide show of a


PowerPoint 2010 presentation is _____.

F2

F3

Which of the following is not a valid type of


animation effects in MS-PowerPoint 2010
presentation?

Motion Paths

Exit

What is a slide transition in MS-PowerPoint 2010?

Overheads

Letters

Extension of MS-PowerPoint 2010 is ______

.pptx

.ppt

To hide the selected


slides during
presentation .

To hide
the
selected
slides
during
Editing .

What is use of "Hide Slide" option ?

By enabling the option


"Loop continues until
How to show the same presentation continuously ? 'Esc' ".

By
enabling
the option
"Repeat
presentati
on".

How can you stop a Slide Show ?.

Press Esc.

Press The right Arrow.

Which of the following can you use to add times to


the slides in a presentation
Slice Show menu

Rehearse
timing
button

A ____ is a set of colors , fonts & special effects

templates

themes

Which of the following is not one of PowerPoints


views?

Slide show view

Normal
view

Can you print the slides?

Yes

No

Can Nested list be present in Powerpoint


Presentation 2010?

Yes

No

Which is not the type of Smart Art Graphic in


Power Point?

Process

Relationsh
ip

In Powerpoint 2010, multiple authors can


simultaneously change the same presentation
stored on the server

True

FALSE

_____ option print images that contains variation of


gray tones between blac & white
Color

Black &
white

When we add narration to a slide , a_____ icon


appear on the slide.

Display

Print

Tally package is developed by ________.

Peutronics

Tally
Solutions

Ths fund flow statement included:-

All sources and uses of


resources

Only cash
transactio
ns

All of the following are "other receivables" except:- Petty cash

Interest
receivable

Company Restore option is available in _______.

Company Features

Company
Informatio
n

Standards

Budgeted
Figures

Variance Analysis is done with regards to actuals


with ______.

_____ is an indicator of the operating performance


of a business.

Cash Flow Statement

Fund Flow
Statement

The shortcut key to quit from Tally is ______.

Ctrl+ L

Ctrl+ Q

To hide the name of the Company we need to


define______ in Tally.ERP9.

Security Control

Tally Audit

For Export of Data from Company to Company


Tally.ERP 9 uses ______.

XML Format

XLS
Format

In Tally.ERP 9, the shortcut used for Sales Order is


______.

F8

Alt+F8

The shortcut used to activate calculator is ______ in


Tally.ERP 9.
Ctrl+C

Ctrl+L

We can change the Company Information in Tally


from ________.

Company Info > Back


up

Company
Info >
Alter

In Tally.ERP 9 there is no difference between Shut


Company & Delete Company.

TRUE

FALSE

Alias represents _____ in Tally.ERP 9.

Short name

Nick name

How many formats are available in Tally while


Exporting?

In Tally.ERP 9 to see any report in detailed way,


press _____.

Alt+F2

Alt+F1

To print a voucher from Tally we need to press


_______.

Ctrl+P

Alt+P

We can Modify an existing Company from ______ in


Tally.ERP 9.
Company Info > Alter

Company
Info >
Alter
Company

In tally transfer from Main Cash to Petty Cash you


require to use ______ Voucher.

Sale

Contra

Which of the following would not be included on a


balance sheet?

Accounts receivable

Accounts
payable

ODBC server stands for __________.

Other Database
Connection

Open
Database
Clients

__________ is what the business owes to others.

Asset

Liability

To change Current Date from Gateway of Tally


press the key _____.

F1

F5

Bank Reconciliation Statement is prepared by


comparing the entries in ____________ and
___________.

Day Book, Pass Book

Day Book,
Bank Book

_______________ is an indicator of the operating


performance of a business.

Ageing Analysis

Ratio
Analysis

To view predefined Ledgers in Tally.ERP 9, press


_______.

Ctrl+L

Ctrl+G

Debit what comes in,


Credit what goes out

Debit the
Receiver,
Credit the
Giver

In case of Real Accounts, rule is


_________________________________.

___ Voucher is used for adjustments with respect to


debit and credit amount without involving the cash
or bank accounts.
Contra

Journal

____ Voucher is used for any kind of Purchase


Returns, Escalation/De-escalation in price, etc.

Purchase

Debit
Note

____ is a Book in which all cash receipts and cash


payments are recorded in Tally.ERP 9.

Cash Book

Bank Book

____ Statement, which displays the sources of the


Funds and their applications.

Cash Flow

Fund Flow

Tally.ERP 9 allows us to maintain company data for


any number of financial years.
TRUE

FALSE

Tally Vault password activation facility only


available in Company creation window.

FALSE

TRUE

In Tally.ERP9, party account can be created through


_______.
Group creation window

Ledger
creation
window

In Tally.ERP 9, Company Features (F11) divided into


___ major categories.
2

In Tally.ERP 9, we can pass Debit Note Voucher in


Invoice mode using the shortcut key _________.

Ctrl + V

Ctrl + F8

___________ is used to view Bank transactions for a


month in Tally.ERP 9.
Day Book

Month
Book

In Tally.ERP 9 a cash is received from debtor Raj &


Co., it should be entered into ______ Voucher.

Payment

Receipt

Sold goods on credit to Mr. Natekar for Rs.


5,000.00, it should be entered into ______ Voucher
in Tally.ERP9

Payment

Receipt

The closing stock of a business may be valued by


anyone of the following methods:-_____

LIFO

FIFO

The shortcut key to view predefined ledgers in


Tally.ERP 9 is __________.

Ctrl + G

Ctrl + L

The Tally.ERP 9 license file is ___________.

Tally_lck.lic

Tally.lic

_______ shortcut is used to shut a company in


Gateway of Tally.ERP 9.

Alt + F3

Alt + F1

_____ function key is pressed from any screen of


Tally.ERP 9 to enable the required features.

F12

F11

In general the Financial year from shall be from


_________.

1st April of any year

31st
March of
any year

______ function key is used to select the Inventory


features in Tally.ERP 9.

F1

F3

______ keyboard shortcut key is used to recall last


narration saved for the first ledger in the voucher,
irrespective of the voucher type.

Shift+R

Alt+R

In Tally.ERP 9, we can paas _____ for any kind of


Sales Return,Escalation/De-escalation in price, etc. Credit Note

Debit
Note

_____ accounting equation is correct?

Assets= Liabilities +
Owner's Equity

Owner's
Equity =
Assets Liabilities

Which of the following is not an Account Type?

Profit

Asset

Which of the following is not a type of Company


Features in Tally.ERP 9?

Accounting Features

Auditing
Features

The Sundry Debtors are placed in the Balance


sheet on the ______________.

Income side

Assets
side

_______is what the business owns and is due to the


business.
Asset

Liability

In the given entry which type of accounts are


involved respectively:-"Purchase of goods worth
Rs.10,000.00 on credit from Mahesh Traders"?

Nominal &
Personal

Real & Personal

________shows the financial status of the business


as at a particular date.

Profit & Loss Account

Trial
Balance

The user with Administrator level password is


authorised for full access to all feature and set
access control for other.

TRUE

FALSE

ODBC stands for ________________________.

Open Database
Connectivity

Open
Data
Connect

____ is used to record the actual stock which is


verified or counted in Tally.

Journal

Physical
Stock
Voucher

TDS deduction entry can be made through


________.

Journal Voucher

Payment
Voucher

Tally.ERP 9 provides us with the capability to take


____ of one or more companies in a single
directory.

Copy

Backup

In MS Word 2010, which tab is used to manage


documents such as opening, creating, saving and
printing documents

Home Tab

File Tab

The shortcut key for Paste Special is____

Ctrl+C

Ctrl+V

The file extension used by MS Word 2010 is

.doc

.docx

Which of the following options is not present in the


Home Tab?
Clipboard

Font

The Microsoft Office Clipboard is used to ____

Copy
pictures
from one
word
document
Copy a single text from and paste
Internet and paste them into
in a document
another

This font effect raises the selected text above the


baseline and changes the selected text to a
smaller font size

Superscript

Subscript

The shortcut key for Aligning the text to right


is____

Ctrl+R

Ctrl+L

_______determines the distance of the paragraph


from either the left or the right margin

Paragraph Spacing

Indentatio
n

_______is the shortcut key for File Tab

Alt+F

Ctrl+F

The first line of a paragraph by itself at the bottom


of a page is known as an
Widow

Abstract

________are an efficient way to define the


appearance of various text elements in our
documents

Styles

Fonts

We can use _________in MS Word 2010 to search for


text as well as graphics, tables, equations and
other non-textual elements
Search option

Select All

________allow us to apply preformatted styles to an


entire document
Templates

Themes

The Insert Tab contains_______ option

Pages

Illustration
s

The Distribute Rows option in the Layout tab of


table creation is used to_____

Divides
Adjusts the width of the the rows
rows
equally

______removes or masks areas of a picture that we


dont want to be shown by reducing the vertical or
horizontal edges
Deleting

Cropping

_____is a visual representation of our information


that we can quickly and easily create choosing
from different layouts

Charts

Smart Art

_____are helpful for copying Web Pages and other


sources whose formatting might not successfully
transfer into the file by any other method

Format Painter

Themes

Which of the following is not a option of the Links


group in MS Word 2010?

Word Art

Hyperlink

_____is a gallery of text styles that we can add to


our Office documents

Smart Art

Word Art

Which tab offers tools for citing sources, creating


bibliography and managing sources

Home Tab

Insert Tab

In a document we can add page numbers, time


and date, company logo, author's name or file
name on all the pages as_______

Cross Reference

Hyperlink

_____is not a view of the navigation pane

Headings View

Thumbnail
Page View

The keyboard shortcut to insert a subsequent


footnote is_____

CTRL+ALT+F

CTRL+ALT
+E

A _______ is a list of sources, usually placed at the


end of a document that we consulted or cited in
creating the document

Citation

Bibliograp
hy

The numbered label that we can add to a figure,


table, an equation or another object is called
a_____

Bookmark

Cross
Reference

Tracking is a group under_______tab

Home Tab

View Tab

________provides us a list of synonyms for a


selected word

Dictionary

Thesaurus

_______feature of MS Word allows us to see what


changes have been made in the document

Track Changes

Comment
s

Print Layout

Full
Screen
Reading

_______is not a document's view in MS Word 2010

A _______is a series of commands that we can use


to automate a repeated task and can be run when
we have to perform the task
Hyperlink

Template

PDF stands for _________

Portable Document
Format

Portable
Document
Formattin
g

_____ format preserves the document formatting


and enables file sharing

DOCX

DOC

The ______ tool in Microsoft Word 2010 allows us to


capture an image of a particular screen and then
insert it into our document
Screenshot

Snipping

_______can help to separate sections of a


document and make them look more interesting to
read
Breaks

Columns

_____ is not a group under the Mailings tab in MS


Word 2010

Write &
Insert
fields

Start Mail Merge

To create a set of documents, that is to be sent to


many people at the same time_____option is used

Mail Merge

Macros

The keyboard shortcut to change font type is_____

CTRL+SHIFT+F

CTRL+SHI
FT+A

The keyboard shortcut to insert hyperlink is____

CTRL+L

CTRL+D

The keyboard shortcut to insert a Page Break is


____

CTRL+Space

CTRL+Ent
er

The screenshot tool is available in the ____ tab in


MS Word 2010

Home Tab

Insert Tab

Pictures can look more like a sketch, drawing or


painting by applying ________ in MS Word 2010

Format Painter

Picture
Styles

Word 2010 documents open in _________ view if the


documents come from an untrusted source
Protected

Private

________provides us access to commands we


frequently use

Home Tab

File Tab

Which of the following doesn't appear by default


on the Quick Access Toolbar

Find

Save

Sampled
The financial transactions are to be .
and
leading to different steps in Accounts Compilation. Collected and computed stratified

The methods LIFO, FIFO, Moving Average are used


to .
Value closing stock

Value
clearing
stock

The report prepared taking the asset and liability


type accounts from the Trial Balance is called.

P & L statement

Income
statement

The report that depicts operating profit/loss for a


period is ..

Trial balance

Trading
account

The day book contains transactions relating to

Income or expenditure

Sales or
purchase

The Bills Receivable details are maintained in a


..

Journal sheet

Voucher
debtors

Creditors ledger has details of your dues to ..

Customers

Assets

The sundry debtors are placed in the Balance


sheet on the

Income side

Assets
side

The first step in Tally before any transaction is


entered or saved is creating a

File

Company

To configure country specific details use the


function key

F10

F2

Identify the security mechanism used in Tally.

Tally Secure

Tally Pack

The basic document where transactions are


entered chronologically is.

Ledger

Journal

After selecting a company in Tally, you will be in


the

Accounts of Tally

Gateway
of Tally

Tally software is based on accounting


system.

Sales

Production

Identify the primary group of capital nature that


uses bank account and cash in hand as sub
groups.

Fixed assets

Current
assets

All financial entries in Tally are done using.

Vouchers

Groups

The Direct expenses, Purchase account, Direct


income are primary groups of ..

Capital nature

Expense
nature

The option to delete a sub-group is admissible


through the menu

Alter

Delete

The behavioural attributes of this group cannot be


changed.
Sub-group

Ledgergroup

Credit limits for personal accounts and branches


can be done in the ledger mode

Multiple

Single

We are not allowed to delete a ledger from this


mode.

Single

Sub-group

Sub Ledger master

Group
Ledger
master

These are the basis for analysis by potential


investors, banks etc.

Journal and Ledger

P&L
Account
and
Journal

Identify the primary group of capital nature that


has the sub-groups: Bank OD Account, Bank OCC
Account.

Expenses

Income

All account heads except Cash and Bank are


placed in the

The primary document for recording all financial


transactions in Tally is the

Journal

Trial sheet

You can customize the voucher entry screen using


the function key.

F13

F12

Identify the voucher type that records fund


transfers between cash and bank accounts.

Credit Note

Payment

This voucher type records adjustments between


ledgers.

Sales

Receipt

The use of classes for payment, receipt and contra


vouchers enables data input in
Double entry mode

List entry
mode

The details of a voucher entry can be given in the


.

Comment

Memo

The credit note voucher can hold account types:


..

Ledger
account,
Sales account, Sales tax Bank
account
account

The suffix and prefix details for the voucher type


can be made applicable only from the .

End of a month

First of a
year

The voucher used to record all bank and cash


payments is ..

Credit Note

Contra

The accounts that the business owns is called .

Liability

Income

Previous date

Effective
date

Tally's age-wise analysis considers the voucher's

Arrange the steps in generating the books of


accounts.
1. Create Trial balance
2. Create new ledgers
3. Generate Day Books
4. Update journals for financial transactions

1, 2, 3, 4

1, 3, 4, 2

For day-to-day transactions the voucher types


used are

Credit purchase

Cash
purchase

Say for example a payment is made to a creditor


ABC - Rs.10000 by cash, it can be entered into the
voucher type..
Loan

Payment

Identify the purchase voucher type, the transaction


for purchase of 10 CPUs,10 monitors by credit.
Credit Purchases

Cash
Purchases

Identify the voucher type to be chosen for the sale


of computers to Anand by cash @ Rs.210000 per
unit.
Cash Ledger

Sale
Sheet

A bank overdraft repaid by cheque at Rs.25000


can be made in the voucher..

The financial statement that consolidates ledger


balances is ..

Payment

Receipt

Balance sheet

Profit &
Loss
statement

The F9 function key in the left side of the Gateway


of Tally screen displays the
Accounting reports

Inventory
reports

The option on the Gateway of Tally that will


generate the P&L account statement is..

Net
Income

Net Loss

The expenditure for running the business for a


period is ..

Expense

Example

This displays the balance daywise for a selected


voucher type.

Record book

Ledger
book

The feature in Tally to analyze accounts of a


company is..

Ratio analysis

Account
analysis

The age-wise statement is displayed based on Income

Payables

The ratio analysis of receivables can be done


based on

Effective
date

Bill date

Name the statement that helps the management


in the decision making process.

Identify the budget type which is chosen where


transaction amounts are to be monitored.

Choose the budget type to be used where bank


accounts balances are to be monitored.

Data flow

Funds flow

On closing balance

On net
credit flow

On closing balance

On net
credit flow

The management that needs to consolidate the


accounts of its various enterprises uses . in
Tally.

Identify the user who can access audit trails in


Tally.

Identify the accounting feature in tally that


facilitates splitting financial years for a company
data.

Consolidate company

Group
company

Owner

Data
Entry
operator

Month-less accounting

Yearlyentry
accountin
g

Identify the account type by the rule: "Debit the


receiver and credit the giver".

Real accounts

Personal
accounts

The tracking of changes in vouchers and ledger


masters is done by..

Tally Vault

Tally Audit

Tally can import data from other programs and


creates a log about the activity in the file..

Tally.imp

Tally.cfg

Import and export of data between Tally and other


programs is possible with the help of..
OLE

DBMS

The manual option of voucher numbering leads


to..

Auto numbers

Duplicate
number

more than 30 Days old

less than
30 Days
old

The Tally audit trail tracks changes made to


vouchers that are ..

The ratio analysis of Bills Receivables or Bills


Payables can be displayed with the function key.. F5

F8

The test data generated with correctness proof,


data flow analysis and control flow analysis tools is
called.
Test item block

Test data
pack

When a real-time system is simulated to generate


the same output as the real-time system, the
technique is called.

Tracing
parallel

Parallel trailing

When an auditor expands the extent of


substantive tests to determine the impact of
defects on the attainment of program objectives,
the methodology is.

Cross reference lister

Formulate
flaw
hypothese
s

This is an important control in systems that use


digital signatures for authentication purposes.

Public audit trails

Random
audit
trails

The first document where the transaction is


entered is called a ..

Ledger

Liability

Selecting transactions based on a sampling rate is


called . method.
Transaction sampling

Systemati
c
sampling

The capability of the generalized audit software to


read different data coding schemes, different
record formats and different file structures is.
File size

File data

The audit software capability of frequency analysis


is to.
Sort and merge files

Sampling
nth item

The audit functions of attributes sampling,


variables sampling, stratified sampling are
included in . functions.

Stratification

Identify the functional limitation of a generalized


audit software that enables evidence collection
only on the state of an application system after the
fact.
Ex Post Auditing Only

Selection

Analytical
review
only

The purpose-written audit programs are used


for..

Sorting, creating, and


printing files

Data
retrieval,
code
compariso
n

Picture of a transaction as it flows through the


computer systems is called..

Program

Track

Identify the type of audit when auditors are


members of the systems development team.

General audit

Post audit

Voucher and journal

Ledger
and trial
balance

The document used for posting of accounting


transactions is ....

When the debit total is greater than credit total,


the amount appears in the .. column.

Income

Debit

ANS

command

program

numerous alpha
size,
performance,
cost

number and
alpha
input, output,
performance
ratios

ARPANET

None of the
above.

PCs

mainframes

feed

write

multiplexing

multitasking

converter

process

ram

output

non-impact
desktop printers thermal printers

monitor,
program,
keyboard, bus

CPU, memory,
input device,
output device

windows 95

interpreter

assembler

coder

SQL * plus

all of the above

assembler

processor

system model

none of the
above

ROM

Firmware

micro
computers

none of the
above

central
processing unit

none of the
above

non impact
printer

none of the
above

electronic
spreadsheet

none of the
above

Microsoft
exchange

none of the
above

information

none of the
above

high level
language

none of the
above

multiplexing

none of the
above

bulletin
broadcasting
system

none of the
above

very small

none of the
above

intermediate
network

none of the
above

ftp service

none of the
above

ARCHIE

none of the
above

unlimited
restore locator

none of the
above

command line

none of the
above

browser

editor

ftp

telnet

Hyper text
transfer
protocol

Hyper text
transfer port

uucp

none of the
above

telnet

none of the
above

transfer
communication
protocol/interne none of the
t protocol
above

higher type
transfer
protocol

none of the
above

mosaic,gopher

none of the
above

dns

none of the
above

hyper text
markup
language

none of the
above

books marks

none of the
above

none of the
above

animation,script none of the


s,executables
above

welcome page

none of the
above

search engines

none of the
above

animation

ftp

archive

database

channel

Graphical
Graphical
interface format Interface format

Joint pictures
expert graph

Joint pictures
experimental
group

network
connections

mails

text or image

neither text nor


image

applets

documents

MS Internet
Explorer and
Netscape
Navigator

None of the
above

intranet

none of the
above

wan

none of the
above

packets

none of the
above

email,file
retrived,internet none of the
tools
above

ARPANET

none of the
above

defensive
advanced
research
projects
administration
net

none of the
above

intranet,extrane none of the


t
above

cooking and
dining

none of the
above

Hyper transfer
meta language

Hyper text
markup
Language

united states & none of the


Russia
above

network

none of the
above

servers

none of the
above

WAN

none of the
above

none of the
above

Manipulate/dem none of the


anipulate
above

none of the
above

none of the
Cable and wires above

Serial line
protocol

none of the
above

Pillar to pillar
protocol

none of the
above

non-digital

Manipulation

Accessibility of
data and
computer
programs

All of the above

Check controls

Input controls

Both A and B

Neither A nor B

Slab

Digit

Field mask

Input mask

Overflow

Serial

Batch checks

File checks

Block batches

Transact batches A

Transaction type Sequence check

Document
totals

Hash totals

Batch check

System test

Suspense
account

Update account

Stub test

Top down test

Database
Analyzers

Database code

Transaction data
with master
Module programs
transaction
with snapshots
B

Mapping

Tracing

Item data

Record data

Graph testing

Whitebox testing A

Test program
pack

Test record pack

Parallel coding

Parallel
simulation

Correct lister

Formulate correct
hypotheses
B

Sample audit
trails

Data audit trails

Simple
sampling

Demographic
sampling

File access

File
reorganisation

Formatting
output

Classify data on a
criteria
D

Statistical

Reporting

Limited ability
to determine
Propensity for
Error

Limited ability to
Verify Processing
logic
A

Reading data,
selecting and
analyzing
information

Specific tasks
with original or
modified
programs

Snapshot

Picture

System audit

Concurrent audit D

Keyboard

Memory

1 GB

100 MB

Application
development

Data modelling

Information
model

Logical model

64 bits

8 bits

Megaflops

Gigaflops

Backend
processor

Terminal
processor

CAD

CCSIC

Memory card

Smart card

Value limited
scale ic

Very large silicon


integration
A

32 bits

1 k bits

MU

CU

Program
counter

Instruction
register

Instruction
Process register register

SRAM

ROM

BIOS memory

ROM memeory

Optical memory Flash memory

Thrashing

Paging

Cache memory
bus

Dual interface
bus

Sound card

Media card

AGP

MCA

1280*1024

1280*680

Pulse

Wavetable

Scanner

Pen

Resolution

Lines

Pixel definition
languages

Page definition
lines

Soft fonts

Soft settings

Dot-pitch

Size

Flickers

Size

Resolution and
sharpness

Signal and
refresh rate

Light scan

Light pen

Photo-multiplier Optical sensitive


tube
tube

Optical

Joystick

Tablet

Pen

Winchester disk Jaz disk

Spiral

Block

MCA

DAT

Linear velocity

Helical scan

Lomega

Imation

Zip disk

Hard disk

630 MB

2GB

CD-ROM

MO drives

Magnetic tape

Magneto-optical
drive

DAT drives

MO drives

Kernel module

I/O module

Batch
management

Data
management

Virtual memory
storage
Extended storage C

Dividing

Preemptive

Multitasking

Multiprogrammin
g
A

Multitasking

Multithreading

Win 2000
professional

Win 2000
advanced server

Format
allocation type

File allocation
table

Block

Table

NTFS

FAT32

NTFS

FAT32

Start directory

Tree directory

Allocation

Partition

Level 1

Level 3

Doc, xls, wzp

Tar, gz, taz

Vertical bar

Control bar

Minimize box

Maximize box

Dragging

Scrolling

Task bar

Command menu

Accessories

Favorites

Configure drive
partitions
Confirm partition
independently capacity
A

Restore

Re-copy

My Folder

My Directory

Notepad

Wordpad

Net Drive

Net Watcher

Windows
Accessories

Internet Explorer B

Desktop themes Desktop icons

Hybrid

ASCII

Find

Restart

Documents

Settings

Port-to-Port
connection

Peer-to-Peer
talking

Deployed
access

Service access

Pin to Pin
Port to Port
communication Protocol

Serial Line
Internet
Protocol

Setting Link Inter


Protocol
C

Indirect access

Dial-up access

Internet

Topography

IC board cost,
cable cost

Connection
company cost,
connection data
cost

Indirect
software

Terminal
communicator

Protocol

Simulators

30-bit address

32-bit address

Respond to
mails

Delete mails

Telnet Control
Port

Communication
Control Protocol

Sequence
numbers

Data numbers

Host

PC

Available FTP

Anonymous FTP

Binary File

TEXT file

Telnet

Message

Both A and B

Neither A nor B

Request the
Archie server

Protocol the
Archie server

Archie

Archives

Domain name
server

Domain relation
server

Aaa/bbb/ccc/dd
d
Aaa*bbb*ccc*ddd B

Web

Mail

Uniform
Resource
Locator

Uniform Reserved
Link
C

Information
Chat messaging chatting

Line

Dot

Lines

Channels

Display
Display line with
channels with at 10 removed
least ten users channels

Shell accounts

Shell programs

Menu

Bookmarks

Gopher

Gateway

WINNET and
WAISLINK

WINSRC and
FTPWAIS

SunScript

JavaScript

Eventcast

Livemessaging

Newsletter

Networkboard

Pine and
Embedd

Port and Elm

()

Both A and B

Neither A nor B

Server
message,comm
and line and
channels

Server
message,comma
nd line and
channels
C

Java applets

Java objects

Net addresses

Web pages

Hyperlink

Hypernet

Wide maps

Web infos

Lynx

Mosaic

Web file

Txt file

Web creators

Web ports

New/Edit page

New/Edit
Document

Pager

Document

Editor window

Form window

Both A and B

Neither A nor B

WinZip Plus

Webcow

File Format

Window Format

Excite

Infoseek

Links

Netshark

Thread

Retriever

Web publish

Page publish

Nettext

Hyperlimit

Lynx

Lycos

Image graphs

Image texts

Weblinker

Webcaster

Both A and B

Neither A nor B

Electronic Data Efficient Data


Internetworking Interchange

Electronic
Electronic Fund
Format Transfer Transfer

Value Aided
Networks

Value Enhanced
Networks

Negotiation and
servicing
Critical buying

Portal

Smart

Both A and B

Neither A nor B

Presentation
Layer

Transport Layer

Presentation
Layer

Physical Layer

Transport Layer Network Layer

Internet Control Single Control


Data Protocol
Message Protocol B

Device
programs

Software devices A

Device Interface Network Interface


Card
Card
D

Server
computer

Data computer

Combi card

Meta card

Electronic
Socket Layer
Protocol

Cyber Socket
Layer Protocol

Grouped and
summarized

Assets and
liability

Voucher

Trial Balance

P & L Account
and Balance
Sheet

Voucher Account
and Balance
Sheet
C

Sales

Asset

Taxes

Income

Nominal
accounts

Expense
accounts

Voucher

Expense

Balance sheet
and trial
balance

Journal and
ledger

Credit

Expense

Value expense
stock

Value income
stock

Balance sheet

Asset sheet

Suspense
P & L statement accounts

Asset or liability Profit or loss

Sundry debtors Original entry

Liabilities

Suppliers

Expense side

Payable side

Project

Application

F12

F11

Tally Group

Tally Vault

Entry of Tally

Groups of Tally

Mercantile

Manufacture

Loan assets

Capital assets

Journal

Ledgers

Revenue nature Income nature

Display

Shift

Primary-group

Alter-group

Sub-group

Alter-group

Alter-group

Multiple

General Ledger Journal Ledger


master
master

Assets

Loans

Voucher

File

F10

F11

Receipt

Contra

Payment

Journals

Choice entry
mode

File entry mode

File

Narration

Suppliers
account,
Purchases
account

Buyer's account,
Cash account

First of a month End of a month

Sales Note

Payment

Current year

Configured date

2, 4, 3, 1

3, 4, 2, 1

Both A and B

Contra purchase

Receipt

Sales

Expense
Purchases

Debit Purchases

Stock Journal

Purchase Voucher C

Debit

Contra

Trial balance

Journal

P & L reports

Expense reports

Net Profit

Net Account

Journal book

Day book

Data analysis

Transaction
analysis

Expenses

Loans

Voucher date

Previous date

Stock flow

Cheque flow

On net
transactions

On net cash flow C

On net
transactions

On net cash flow A

Set company

Alter company

Accountant

Administrator

Period-less
accounting

Transactionnumber
accounting

Tally Report

Tally Group

Tally.exp

Tally.ole

ODBC

MS-XLS

Sequence
number

Range number

more than a day more than a


old
week old

F12

F6

One Thousand
bytes

Ten Thousand
bytes

Cache Memory

Serial Access
Memory

Cache Memory

Serial Access
Memory

Vast Large Scale Vast Limited


Interface
Scale Integration B

Control Unit

Both of above

Padding

None of the
above

Only b

CPS

Medium Scale
Intelligent
Circuit

Medium System
Intelligent Circuit A

The smallest
resolvable part
of a picture

None of these

CPU

Memory

ERAM

RW / RAM

Integrated
Circuits

Vacuum Tubes

Third

Fourth

Microsoft

3M

Third
generation

Fourth generation D

Versatility

Automatic

Entertainment
Utility Software Software

Diagnostic
software

Boot diskettes

Non-volatile
memory

PROM

Modem card

Graphics card

Truck

Airplane

None of the
Bar code reader above

Cache

Vacuum Tubes

Optical disk

None of above

Microprocessor

All of the above

Smart cards

All of above

Memory stick

Projector

700 MB

1 GB

Volatile memory All of above

1.4 MB

2 MB

Extensive
Industry
Standard
Architecture

Extended Input
Standard
Architecture

Sorting

Signal
Transmission

Laser Printer

Plotter

Hertz

Byte

Hybrid

None

Printer

Speaker

Refresh Rate

None of the
above

Refresh Rate

Bandwidth

One - tenth

One - billionth

Laser Printers

Daisy wheel
Printer

Fonts

Weight

Laser Printers

Daisy wheel
Printer

Printers

Speakers

Light Pen

Monitor

Front End

None of the
above

Optomechanical Optical

Dot-pitch

Pages Per Minute


(PPM)
C

Divergence

Refresh Rate

Magnetic Ink
Code Reader

Magnetic Ink
Character
Recognition

Multitasking

Massively Parallel
Processors
B

Sequential
Access

None of the
above

Condensed
Condensed Disk
Drive Read Only Read Only
Memory
Memory

Indexed
Sequential
media

None of the
above

Access Time

Elapse Time

Super
computers

Palmtops

Erasable

Magnetic Disk

Write-Once,
Read - More

Write - Only,
Read - Many

Multitasking

Multithreading

Multitasking

Multithreading

Multitasking

Multithreading

Data

People

Multitasking

Multithreading

Multiprogrammi
ng
Multiprocessing

Real-Time
Operating
system

None of the
above

Data,
Information

Fact, information C

Processor

None of the
above

Concise

Accurate

Cache

Vacuum Tubes

Reduced
Instruction Set
Computer

None of the
above

Special

None of the
above

Document/Reco
rd Counts
Transaction totals D

Bottom up Test

Hybrid Test

Leftmost Bit

Rightmost Bit

Hierarchical

Association

Authentication

Non repudiation

Hierarchical

Association

Super Visual
Graphics
Adapter

Standard Visual
Graph Array

Special

None of the
above

Application
Output Controls Controls

Application
Output Controls Controls

Range

Sign Test

Application
Output Controls Controls

None of the
above

Aero Snap

None of the
above

Picture

All of the above

Hibernate

Stand By

Deleted Files

None of the
above

Control Unit,
Input Unit,
Output unit

Control Unit, ALU,


Memory Unit
D

None of the
above

Management
Controls

All the above

Reasonableness Sequence

Sequence
Check

Valid Sign

Sequencing

Filtering

Files

Fields

Contiguous

None of the
above

Hybrid

All of the above

Top down

System

Database
Embedded Code Analysers

Database
Embedded Code Analysers

Snapshots

Mapping

Output Controls All the above

Both A & B

None of the
above

Both A & B

None of the
above

Both A & B

None of the
above

Systematic
Sampling

All of the above

Utility Programs
and existing
None of the
entity programs above

Statistical

Stratification and
Frequency
Analysis
D

Examine the
existence of
entities

All the above

General

None of the
above

Authentication

All the above

Interactive Data Interactive Data


Extract and
Expansion and
Analysis
Analysis

Input

All

Visual Basic

None of the
above

Batch

File

Missing data

Check Digit

Check Digit

Set
membership(slab
)
A

Computer
Auditing Aided
Technology

None of the
above

Size

Valid Sign

Boyce -Courier
Normal Form

Bryan -Codd
Normal Form

View Level

None of the
above

Hierarchical
DBMS

Centralized DBMS D

Many-to-many

Many-to-one

Operating
system
Software

Utility software

Operating
system
Software

Utility software

External
Schema

View Level

Relations

None of the
above

Transparency

Dependency

Relationship

Attribute

American
African National National
Standards
Standards
Institute
Institute

Data Control
Language

Data Definition
Language

Stylewell

None of the
above

Each
row/column
intersection
represents a
multiple data
value.

The order of the


rows and
columns is
immaterial to the
DBMS.
C

Unknown
or inapplicable
value

None of the
above

Structured
English

Data Flow
Diagram

DBMS

None of the
above

Chart

Button

The order of the


rows and
columns is
immaterial to
the DBMS.

Charts are
implemented as
an array of
records.

Data Control
Language

Data Definition
Language

Primary key

None of the
above

Total Cell

None of the
above

Relationships
can be
established
Sorting, indexing
between two or and reporting
more databases allowed
A

Currency

Autonumber

Path of a file

All of the above

To select values
from another
Not a valid Data
table
type

Database

Table

Database

Table

Child key

Index

Logical

Difficult

Data Checking

Data integrity

Internal
Subschema

None

Records

All

Normalization

Representation

Hierarchical

None of the
above

Comprehensibili
ty
All of the above

Number, Double Text

Quick Access
toolbar

Database Tools
command tab

Events

Contacts

Select

Append

CTRL + N

ALT + N

Structured
Data Dictionary English

Update

Addnew

128

64

Blank Form

Form Wizard

Bound control

None of the
above

Make-table

Update

Both A & B

None of the
above

Number

Currency

Form

Report

Voice Field

Memo

Fields can
added but only
once

Fields can added


and deleted as
needed
D

End Users

System
Administrators

Functions

None of the
above

Multiple DBMS

None of the
above

Physical Level

None of the
above

both A & B

None of the
above

VPN

None of the
above

Revoke

Both B& C

Common
resouce list

None of the
above

Open System

All the above

Salary of
Individual

Building cost

Assymmetric
Cryptosystem

None of the
above

Digital
Signature

None of the
above

WYSIWYS

Both A & B

Approval

All the above

Hash Value

None of the
above

Private Key of
the owner

Publick key of the


owner
C

Evidence

Digital Signature B

Time-stamp on
the digital
signature

Digital stamp on
the digital
signature

Recipients

Data records

None of the
Caller Authority above

act of
disclaiming
responsibility
for a message

accept the
responsibility

Hash Value

None of the
above

Public

None of the
above

Signature

Digital Certificate D

both A & B

None of the
above

CCITT X.509

CCITT X.507

Convenience

None of the
above

Security

Chapter VIA

15

12

None of the
Both the above above

Transfer
Request
Protocol

Transfer Request
Preparer
B

IP

POP

ITR V

ITR IV

Word, PDF

All of the above

ITR 3

ITR 4

CG

OS

Centralized
Processing
Centre

Centralized
Posting Centre

Income Tax
Office

MCA

139 (4C) or 139


(4D)
All of above

DOC

TXT

80D

139 (4A)

Esaral

EITR

143(1)

144(1)

Permanent
Action Number

Personal
Activation
Number

Form 23CA

Form 20B

Central Board of None of the


Direct Taxes
above

80G

80RRB

Service Request
Number
All of the above

# NUM !

# VALUE

INT

SLN

Error Checking

All the above

AV

None of the
above

fill color

None of the
above

styles,Home

editing, Home

Diagrams

All the above

Axis

None of the
above

PIE

COLUMN

COVARIANCE

AVERAGE P

freezing

Sorting

ROW, Column

Column, Values

#####

#DIV/0!

The contents of
the row are
cleared as well
as the row is
removed and
the surrounding
rows are moved
to fill the gap

The row is
removed and the
contents are
moved in the
subsequent row C

B12

B13

It gets deleted
and cannot be
restored

Whether the
deletion is
permanent or
temporary is
dependent on
how it is deleted. C

Radar Panes

Format

Right

Justified mode

Values

Report Filter

both A & B

None of the
above

A1

AA

active cell

None of the
above

&

Fill Across
Worksheet

Fill Series

DATA TAB

Formula Tab

Edit

Save

Cooking

Information

.xltx

.xlt

Disasater data
excel

Dynamic Data
Exchange

Common

None of the
above

CTRL+F10

SHIFT + F10

label

None of the
above

TODAY()

None of the
above

F5

F6

A$4

$A4

maths &
Trignometry

Statisticals

present value

total no of
payment periods
in annunity
D

MAX()

GCD()

both A & B

None of the
above

None of the
What if analysis above

.xltx

None of the
above

both A & B

None of the
above

SUMIFS

None of the
above

SUMIFS

None of the
above

Macros

None of above

A formula that
either directly
or indirectly
depends on
itself

Always erroneous C

DataTable

None of above

File

Developer

1048576

10000576

Worksheets

Agenda

DATA TAB

View TAB

Informative
highway

Information way

Easy to Filter

Secure & Relaible B

T-1 Lines
DSL Connection Connection

ADSL
Connection

Cable Connection B

Asymmetry
Asymmetrical
Digital
Digital
Subscriber Line Subscriber Line

Method

Top Level Domain


Name
B

Both A & B

None of the
above

Denmark

Switzerland

EPS

None of the
above

MAN

VAN

Secure Sockets
Layer

None of the
above

Demodulation

Modulation

Network
Interface Cards All the above

EFT

FTP

Network
Interface Card

None of the
above

Networks

Cables

Web Browsers

All the above

FTTP

SMTP

Transport Layer Physical Layer

Both A & B

None of the
above

Both A & B

None of the
above

Modules

All the above

Session Layer

Data Link Layer

America
Standard Codes
for Information
Interchange

American
Standard Code
for Information
Intermediate

Presentation
Layer

Transport Layer

Simple Net
Mastering
Parotocol

Sample Network
Magaement
Protocol

VAN

Extranet

Translation
Service

Communication
Service

Internal Filing
Format

None of the
above

Search Engine

ISP

Transmission
File

CFF

Interchange
Sets

Batches

TDCC

All the above

Web Browsers

None of the
above

ISD

All the above

Forwarding

EDI

SMTP

Telnet

Internet Relay
Chat

Internet Result
Chat

Organizational

All the above

Transferring

All the above

Virtually Private Virtual Protected


Network
Network

Top Level
Domain Name

Method/Scheme

Aerodynamics

None of the
above

.mil

.mili

Hyperpages

Hyperlinks

Web Crawling,
Indexing
,Searching

Indexing,
Searching,Web
Crawling

EDI

VAN

Serial Line
International
Protocol

Serial Line
Intranet Protocol

Internet Service Intranet Service


Provider
Provider

Telnet

WWW

LDAP

None of the
above

LDAP

HTTP

Jughead

WAIS

LDAP

T-1 Lines
Connection

Country Coding Country Codec


Domain Naming Domain Name

IP Address

None of the
above

Robert Taylor

None of the
above

None of the
Static and Slow above

Yahoo Mail

AIM Mail

FTP

SMTP

Wireless Markup Wireless Manual


Language
Language

Last

First

Really Simple
Syndication

Really Start
Synchronization

Contacts

Tasks

Contacts

Tasks

Protocol for
Profile

Protocol for Mail

Forward

All of the above

Sort

Mail

Instant Search

None of the
above

Add

Add Attendee to
the List

Copy Carbon

None of these

SMTP

SSL

Menu

Tab

Secure Set
Layer

None of the
above

Alt+Ctrl+3

Alt+Ctrl+4

Ctrl+3

Ctrl+4

VIP

Personal

Recurrence

Actions

Contacts

Tasks

Click the file tab


to switch the
backstage view &
Press Shift+F12 then choose save B

Ink

None of the
above

Broadcast Slide
Show
F5

Supported
powerpoint
features

All the above

None of the
above

All the above

None of the
above

All the above

Accessibilty
Checker

None of the
above

Clip Art

None of the
above

Narrations

Views

By pressing Esc By pressing Tab


key
key

Insert ->
Illustrations ->
Chart

Insert -> Symbols


-> Chart
C

Ctrl + M

Ctrl + O

High Quality

Scale to Fit Paper B

F4

F5

Entrance

Italics

A slide effect
used to
introduce a
slide in a slide
show

The way one


slide looks

.pps

pptx

To hide the
To hide the
selected slides selected slides
during Printing. during Deleting.

By enabling the
option "Show
same
Presentation ".

Presentation
cannot be
continue once it
finished.

Press The left


Arrow.

Press The down


Arrow.

Slide transition
button

All of the above

all the above

None of the
above

Slide Sorter
View

Presentation view D

hierarchy

block

Grayscale

None of the
above

Sound

Blank

Coral Softwares Vedika Softwares B

Only
transactions
affecting
current assets

Only transaction
affecting fund
accounts

Income taxes
refundable

Advances to
employees

Configuration

None of the
above

Benchmarks

All of the above

Ratio Analysis

None of the
above

Ctrl+ M

Ctrl+ X

Tally Vault
Password

Create at least
one User

DOCX Format

EXE Format

Alt+F4

Alt+F5

Ctrl+N

Ctrl+M

Company Info >


Split Company None of the
Data
above

Code name

All of the above

Alt+F4

F1

Shift+P

All of the above

Gateway of Tally
> Modify
None of the
Company
above

Receipt

Journal

Sales

Cash

Open Database
Connectivity
Open Data Cost

Expense

Income

F2

F7

Bank Book, Pass


Book
All of the above

Budgeting
Analysis

Variance Analysis B

Ctrl+D

Ctrl+A

Debit what goes Debit all


out, Credit what Expenses, Credit
comes in
all Income
A

Payment

Sales

Credit Note

Sales

Day Book

None of the
above

Ratio Analysis

None of the
above

Inventory
creation window All of the above

Ctrl + G

Ctrl + I

Bank Book

Bank Register

Contra

Sales

Contra

Sales

Average Price

All of the above

Alt + G

Alt + L

Tally9.lic

lck.lic

Alt + F4

Alt + S

F5

F2

Both A & B

None of the
above

F2

F4

Ctrl+V

None of the
above

Both of these

None of these

Liabilities =
Assets Owner's Equity

All of the above

Liability

Income

Inventory
Features

Tally.NET features B

Expense side

Liabilities side

Income

Expense

Real & Nominal Personal & Real

Balance Sheet

None of the
above

Organizational
Database
Connectivity

Organizational
Data Connect

Stock Journal

All of above

Contra Voucher Receipt Voucher

Restore

Shut

Insert Tab

View Tab

Alt+Ctrl+V

Alt+V

.dot

.rtf

Paragraph

Page Background D

Copy multiple
text and
graphical items
from Office
documents or
other programs
and paste them
into another
None of the
document
above

Outline

Shadow

Ctrl+C

Ctrl+E

Line Spacing

None of the
above

Shift +Ctrl +F

None of the
above

Orphan

All of the above

Templates

Themes

Navigation Pane Replace

Styles

All of the above

Text

All of the above

Adjusts height
of selected rows
to distribute
rows evenly
All of the above

Cutting

None of the
above

Pictures

Clip Art

Screenshots

Templates

Bookmark

Cross Reference

Themes

Templates

PageLayout Tab References Tab

Header & Footer All of the above

SearchResults
View

Outline View

CTRL+ALT+H

CTRL+ALT+J

Table of
Contents

Table of Figures

Style

Caption

Review Tab

Insert Tab

Tracking

None of the
above

Cross Reference Research

Draft

Print Preview

None of the
above

Portable
None of the
Desktop Format above

PDF

Macro

XML

Select All

All of the above

Themes

All of the above

Preview Results Select Recipients D

Hyperlinks

None of the
above

CTRL+SHIFT+D CTRL+SHIFT+T

CTRL+K

CTRL+M

CTRL+SHIFT+E
nter
CTRL+ALT+Enter B

PageLayout Tab View Tab

Artistic Effects

None of the
above

Restricted

All of the above

Quick Access
tool bar

None of the
above

Undo

Redo

Grouped and
summarized

Assets and
liability

Value expense
stock

Value income
stock

Balance sheet

Asset sheet

Suspense
P & L statement accounts

Asset or liability Profit or loss

Sundry debtors Original entry

Liabilities

Suppliers

Expense side

Payable side

Project

Application

F12

F11

Tally Group

Tally Vault

Voucher

Trial Balance

Entry of Tally

Groups of Tally

Mercantile

Manufacture

Loan assets

Capital assets

Journal

Ledgers

Revenue nature Income nature

Display

Shift

Primary-group

Alter-group

Sub-group

Alter-group

Alter-group

Multiple

General Ledger Journal Ledger


master
master

P & L Account
and Balance
Sheet

Voucher Account
and Balance
Sheet
C

Assets

Loans

Voucher

File

F10

F11

Receipt

Contra

Payment

Journals

Choice entry
mode

File entry mode

File

Narration

Suppliers
account,
Purchases
account

Buyer's account,
Cash account

First of a month End of a month

Sales Note

Payment

Sales

Asset

Current year

Configured date

2, 4, 3, 1

3, 4, 2, 1

Both A and B

Contra purchase

Receipt

Sales

Expense
Purchases

Debit Purchases

Stock Journal

Purchase Voucher C

Debit

Contra

Trial balance

Journal

P & L reports

Expense reports

Net Profit

Net Account

Taxes

Income

Journal book

Day book

Data analysis

Transaction
analysis

Expenses

Loans

Voucher date

Previous date

Stock flow

Cheque flow

On net
transactions

On net cash flow C

On net
transactions

On net cash flow A

Set company

Alter company

Accountant

Administrator

Period-less
accounting

Transactionnumber
accounting

Nominal
accounts

Expense
accounts

Tally Report

Tally Group

Tally.exp

Tally.ole

ODBC

MS-XLS

Sequence
number

Range number

more than a day more than a


old
week old

F12

F6

Test program
pack

Test record pack

Parallel coding

Parallel
simulation

Correct lister

Formulate correct
hypotheses
B

Sample audit
trails

Data audit trails

Voucher

Expense

Simple
sampling

Demographic
sampling

File access

File
reorganisation

Formatting
output

Classify data on a
criteria
D

Statistical

Reporting

Limited ability
to determine
Propensity for
Error

Limited ability to
Verify Processing
logic
A

Reading data,
selecting and
analyzing
information

Specific tasks
with original or
modified
programs

Snapshot

Picture

System audit

Concurrent audit D

Balance sheet
and trial
balance

Journal and
ledger

Credit

Expense

You might also like