Practice MCQs -Set 1




(1) Which of the following indicates ‘decision’ in flowchart:
(a)Diamond
(b)Circle
(c)Rectangle Box
(d)Square





Answer: (a)Diamond


(2) Use of virtual keyboard for online payment is to prevent which of the below fraud:
(a)Social Engineering
(b)Hacking
(c)Credit card fraud
(d)Phishing

 

Answer: (c)Credit card fraud



(3) An organization involved in oil extraction causes lot of environmental damage. Company spends lot of money on promotional ads informing the world that it is an environmentally friendly company. The promotional ads were done to prevent company from which damage?
(a)Strategic
(b)Operational
(c)Financial
(d)Reputational

 




Answer: (d)Reputational



(4) Sending immediate receipt for online payment received from customer is an example of:
(a)Best HR Practice
(b)Customer Relationship Management
(c)Supplier Relationship Management
(d)Order to cash cycle





Answer: (b)Customer Relationship Management


(5)Which voucher type is to be used for writing off amount which is not to be recovered from customer?
(a)Journal
(b)Sales
(c)Purchases
(d)Contra



Answer: (a)Journal




(6) Which of the following control is not available in Enterprise Resource Planning (ERP) systems:
(a)General Controls
(b)Application Controls
(c)Management Controls
(d)Business Continuity Controls







Answer: (d)Business Continuity Controls



(7) Which module of ERP system, shall deal with Inventory Valuation as per AS-2 on "Inventory Valuation"?
(a)Supply Chain
(b)Controlling
(c)Production
(d)Human Resources



Answer: (b)Controlling


(8) Which report indicates increasing cash sales over a period of time?
(a)Management Information Systems (MIS)
(b)Receipt and payment
(c)Cash and fund flow
(d)Balance Sheet and Profit/Loss Account




Answer: (a)Management Information Systems (MIS)






(9) Extensible Business Reporting Language (XBRL) is used by .
(a)Companies
(b)Government
(c)Regulator
(d)All of above



 
Answer: (d)All of above






(10) Database Model with inverted tree like structure:
(a)Hierarchical Database Model
(b)Relational Database Model
(c)Network Database Model
(d)Object oriented Database Model



 
Answer: (a)Hierarchical Database Model


(11) In case of conflict for some common resource, computer resource has capacity to recover. This is known as:
(a)Routing
(b)Bandwidth
(c)Resilience
(d)Contention




 
Answer: (d)Contention


(12) In which technique, saving bank interest of Rs. 2,500.25 is credited as Rs. 2,500 to customer account, the balance Rs. 0.25 being credited to a fraudster account:
(a)Salami
(b)Spoofing
(c)Bomb
(d)Christmas Card




Answer: (a)Salami



(13) Audit technique to identify suspicious transactions is known as:
 a)Continuous and Intermittent Simulation(CIS)
(b)System Control Audit Review File (SCARF)
(c)Audit Hook
(d)Integrated Test Facility (ITF)



Answer: (c)Audit Hook



(14) Which of the following is common element in E-commerce revolution, WWW and other emerging technologies:
(a)VPN
(b)Mobile
(c)User
(d)Internet



Answer: (d)Internet



(15)Identify the one not used as Network as a Service (NaaS)?
(a)Virtual Private Network ( VPN)
(b)Bandwidth on Demand (BOD)
(c)Mobile Virtual Network (MVN)
(d)VOIP




Answer: (d)VOIP



(16)For an organisation that is subject to changing business needs, which network architecture would be preferred?
(a)Two Tier
(b)Three Tier
(c)Any of Two
(d)None of the Two




 
Answer: (b)Three Tier


(17)Which of the following is a modern method of Digital payment?
(a)Mobile Wallet
(b)E Wallet
(c)Net Banking
(d)Cards





Answer: (a)Mobile Wallet



(18) Which technology solution is provided by banks to a company that is paying dividend to its shareholders?
(a)ECS Credit
(b)ECS Debit
(c)MICR
(d)CBS




Answer: (b)ECS Debit





(19) Which server offers a computer network services to allow clients to make indirect network connections to other network connection?
(a)Web Server
(b)Database Server
(c)Application Server
(d)Proxy server




Answer: (d)Proxy server




(20)While defining RISK, the person is not likely to refer to which terms in its definition.
(a)Vulnerability
(b)Threats
(c)Impact
(d)Asset



Answer: (c)Impact



(21)In case of disaster, an entity not having a proper back-up of data is faced with huge business risk. The same (risk) is dealt in which accounting standard issued by ICAI, New Delhi.
(a)AS - 2
(b)AS - 1
(c)AS - 9
(d)AS – 28




Answer: (b)AS - 1




(22)Under  which  IT  Offence,  punishment  is  given  for   statement   given   below: "Whoever fraudulently or dishonestly make use of electronic signature, password or any other unique identification feature of any other person."
(a)Section 66- B
(b)Section 66- C
(c)Section 66- D
(d)Section 66- E






Answer: (b)Section 66- C



(23)Inadequate Security is known as:
(a)Vulnerability
(b)Threats
(c)Risk
(d)Impact





Answer: (a)Vulnerability




(24)Where in a CBS architecture does ATM / POS switch reside?
(a)Client
(b)Channel Server
(c)Application Server
(d)Host Database Server




Answer: (b)Channel Server





(25)A Bank has updated its existing CBS system to a new version. It found that the new system is not automatically sending monthly Bank Statements to its customers. The same feature was available in the previous system. This error is result of mistake in which step?
(a)Design
(b)Planning
(c)Implementation
(d)Maintenance



 
Answer: (a)Design