Practice MCQs -Set 1
(1) Which of
the following indicates ‘decision’ in flowchart:
(a)Diamond
(b)Circle
(c)Rectangle Box
(d)Square
Answer: (a)Diamond
(2) Use of virtual keyboard for online payment is to prevent which of the below fraud:
(a)Social Engineering
(b)Hacking
(c)Credit card fraud
(d)Phishing
Answer: (c)Credit card fraud
(3) An
organization involved in oil extraction causes lot of environmental damage.
Company spends lot of money on promotional ads informing the world that it is
an environmentally friendly company. The promotional ads were done to prevent
company from which damage?
(a)Strategic
(b)Operational
(c)Financial
(d)Reputational
Answer: (d)Reputational
(4) Sending
immediate receipt for online payment received from customer is an example of:
(a)Best HR Practice
(b)Customer Relationship Management
(c)Supplier
Relationship Management
(d)Order to cash cycle
Answer: (b)Customer Relationship
Management
(5)Which
voucher type is to be used for writing off amount which is not to be recovered
from customer?
(a)Journal
(b)Sales
(c)Purchases
(d)Contra
Answer: (a)Journal
(6) Which of the following control is not available in Enterprise
Resource Planning (ERP) systems:
(a)General Controls
(b)Application Controls
(c)Management
Controls
(d)Business Continuity Controls
Answer: (d)Business Continuity Controls
(7) Which
module of ERP system, shall deal
with Inventory Valuation as per AS-2 on "Inventory Valuation"?
(a)Supply Chain
(b)Controlling
(c)Production
(d)Human Resources
Answer: (b)Controlling
(8) Which report indicates increasing cash sales over a period of time?
(a)Management Information Systems
(MIS)
(b)Receipt and payment
(c)Cash and fund flow
(d)Balance
Sheet and Profit/Loss Account
Answer: (a)Management Information Systems (MIS)
(9) Extensible Business Reporting Language (XBRL) is used by .
(a)Companies
(b)Government
(c)Regulator
(d)All of above
Answer: (d)All
of above
(10) Database Model with inverted tree like structure:
(a)Hierarchical Database Model
(b)Relational
Database Model
(c)Network Database Model
(d)Object oriented Database Model
Answer: (a)Hierarchical Database
Model
(11) In case
of conflict for some common resource, computer resource has capacity to
recover. This is known as:
(a)Routing
(b)Bandwidth
(c)Resilience
(d)Contention
Answer: (d)Contention
(12) In which
technique, saving bank interest of Rs. 2,500.25 is credited as Rs. 2,500 to
customer account, the balance Rs. 0.25 being credited to a fraudster account:
(a)Salami
(b)Spoofing
(c)Bomb
(d)Christmas Card
Answer: (a)Salami
(13) Audit
technique to identify suspicious transactions is known as:
a)Continuous and Intermittent Simulation(CIS)
(b)System
Control Audit Review File (SCARF)
(c)Audit Hook
(d)Integrated
Test Facility (ITF)
Answer: (c)Audit Hook
(14) Which of
the following is common element in E-commerce revolution, WWW and other
emerging technologies:
(a)VPN
(b)Mobile
(c)User
(d)Internet
Answer: (d)Internet
(15)Identify the one not used as Network as a Service (NaaS)?
(a)Virtual Private Network ( VPN)
(b)Bandwidth on Demand (BOD)
(c)Mobile Virtual Network (MVN)
(d)VOIP
Answer: (d)VOIP
(16)For an
organisation that is subject to changing business needs, which network
architecture would be preferred?
(a)Two Tier
(b)Three Tier
(c)Any of Two
(d)None of the Two
Answer: (b)Three Tier
(17)Which of the following is a modern method of Digital payment?
(a)Mobile Wallet
(b)E Wallet
(c)Net Banking
(d)Cards
Answer: (a)Mobile Wallet
(18) Which
technology solution is provided by banks to a company that is paying dividend
to its shareholders?
(a)ECS Credit
(b)ECS Debit
(c)MICR
(d)CBS
Answer: (b)ECS Debit
(19) Which
server offers a computer network services to allow clients to make indirect
network connections to other network connection?
(a)Web Server
(b)Database Server
(c)Application Server
(d)Proxy server
Answer: (d)Proxy server
(20)While
defining RISK, the person is not likely to refer to which terms in its definition.
(a)Vulnerability
(b)Threats
(c)Impact
(d)Asset
Answer: (c)Impact
(21)In case
of disaster, an entity not having a proper back-up of data is faced with huge
business risk. The same (risk)
is dealt in which accounting standard issued by ICAI, New Delhi.
(a)AS - 2
(b)AS - 1
(c)AS - 9
(d)AS – 28
Answer: (b)AS - 1
(22)Under which
IT Offence, punishment
is given for
statement given below: "Whoever fraudulently or
dishonestly make use of electronic signature, password or any other unique
identification feature of any other person."
(a)Section 66- B
(b)Section
66- C
(c)Section 66- D
(d)Section 66- E
Answer: (b)Section
66- C
(23)Inadequate Security
is known as:
(a)Vulnerability
(b)Threats
(c)Risk
(d)Impact
Answer: (a)Vulnerability
(24)Where
in a CBS architecture does ATM / POS switch reside?
(a)Client
(b)Channel
Server
(c)Application
Server
(d)Host
Database Server
Answer:
(b)Channel Server
(25)A Bank
has updated its existing CBS system to a new version. It found that the new
system is not automatically sending monthly Bank Statements to its customers.
The same feature was available in the
previous system. This error is result of mistake in which step?
(a)Design
(b)Planning
(c)Implementation
(d)Maintenance
Answer: (a)Design