52598bos42131 Inter P7a
52598bos42131 Inter P7a
52598bos42131 Inter P7a
1 During an audit of financial transactions in an enterprise XYZ, it was found that simple
errors of data entry were occurring when two digits that were either individual or part of
larger sequence of numbers were reversed when posting a transaction. Which type of error
is this?
(a) Addition Error
(b) Truncation Error
(c) Substitution Error
(d) Transposition Error
2 While Auditing the Input Controls in an enterprise ABC, which of the following controls will
not fall under the purview of Input Controls?
(a) Source Document Controls
(b) Data Coding Controls
(c) Boundary Controls
(d) Batch Controls
3 Which are the controls that are responsible for maintaining a chronology of the events
from the time a sender dispatches a message to the time a receiver obtains the message?
(a) Boundary Controls
(b) Communication Controls
(c) Input Controls
(d) Database Controls
6. XBL bank gave an undertaking to the third party for the supply of goods /services to pay
amount of Rs. 2 crore on behalf of the Mr. X, a business man, provided the terms and
conditions of the undertaking are complied with. This service of banks is known as -
(a) Issuing letter of Guarantee
(b) Issuing letter of Comfort
(c) Issuing letter of Credit
(d) Issuing letter of Understanding
8. Name the Module in ERP - Business Process Modules that includes the software deigned
specifically for production planning and management.
(a) Production Planning
(b) Material Management
(c) Sales and Distribution Module
(d) Supply Chain Module
9. Which of the following does not form part of Human Resource (HR) Management?
(a) Training and Development
(b) Career Development
(c) Leadership Management
11. Which of the following transactions are not recorded in the Voucher Type "Contra" of
the Accounting System?
(a) Cash deposit in bank
(b) Cash withdrawal from bank
(c) Cash transfer from one location to another
(d) Recording of all types of trading sales by any mode
12 In a 3-Tier Architecture, name the layer that is responsible of receiving the inputs fro the
users and perform certain validations.
(a) Application Layer
(b) Database Layer
(c) Operating System Layer
(d) Network Layer
13. An aspiring CA in his interview CA was asked to provide correct sequence of the
following sub-processes that represent Accounting Process Flow. The sub processes are -
(1) Source Document, (2) Financial Statement, (3) Adjustments (4) Ledger, (5) Adjusted Trail
Balance, (6) Closing Entries, (7) Journal and (8) Trial Balance. What should be the answer?
(a) (1)-(2)-(3)-(4)-(5)-(6)-(7)-(8)
(b) (4)-(3)-(7)-(6)-(1)-(2)-(8)-(5)
(c) (1)-(7)-(4)-(8)-(3)-(5)-(6)-(2)
(d) (8)-(5)-(3)-(1)-(2)-(4)-(6)-(7)
14. Which feature of Operating Systems helps in allocating resources to make optimum
utilization of resources?
(a) User Interface
(b) Memory Management
(c) File Management
(a) Managerial
(b) Application
(c) Preventive
(d) Corrective
16. Which feature of Operating Systems controls how memory is accessed and also
maximizes the memory availability and storage?
(a) User Interface
(b) Memory Management
(c) File Management
(d) Task Management
18 Provide the correct sequence of phases of Program Development Life Cycle. (1)
Operations and Maintenance, (2) Coding, (3) Control, (4) Design, (5) Testing and (6)
Planning
(a) (4)-(6)-(2)-(3)-(1)-(5)
(b) (6)-(3)-(4)-(2)-(5)-(1)
(c) (1)-(6)-(3)-(5)-(4)-(2)
(d) (3)-(5)-(2)-(1)-(6)-(4)
19. In ABC, financial institution, the authorised officials identified existence of numerous
accounts numbers of inactive accounts in their usage data of active customers. Complaint
was reported to their IT team. Which type of controls can be exercised by the IT Team in the
given case?
(a) Corrective Controls
20. Mr. Hope of Delhi ordered raw material for manufacturing of products for domestic use
from supplier in Kolkata. Service to deliver the raw material was fixed “within 10 days from
the date of order”. State the subsequent stage of order to cash cycle-
(a) Collections
(b) Invoicing
(c) Delivery Note
(d) Order Fulfillment
21. An organisation ABC used to make payment of the salaries to its employees by transferring of
funds to their saving accounts. This mode of transfer made by an ABC is ___________.
(a) Remittances
(b) ECS Credit
(c) ECS Debit
(d) Deposits
22. Mr. Mysterious used to chat on Internet under the name of Ms. Ritu. He also gave her landline
telephone number for further chatting. Ms. Ritu was a senior executive of the credit rating
information sources of India Ltd. Mr. Mysterious was employed as financial analyst but had been
forced to terminate the job earlier. Ritu started receiving mischievous calls. In the light of the given
facts, state the liability of Mr. Mysterious within the purview of the Information Technology Act,
2000.
(a) Punishable for offence related to web defacement
(b) Punishable for phishing and email scam
(c) Theft of confidential information
(d) Harassment via fake public profile on social networking site.
23. X through his computer steals the data saved in Y’s computer of valuable customers of ABC Ltd. X
sold this data to the competitor of ABC Ltd. This act of X is _________.
(a) Source code theft
(b) Theft of confidential information
(c) Email Account hacking
(d) Hacking
24. Which of the following is not a rule to be followed while Voucher Numbering?
(a) Voucher number must be unique.
(b) A voucher number may either have prefix or suffix or both.
(c) Voucher numbers may be numbered randomly.
(d) Every voucher type shall have a separate numbering series.
25. Which of the following statement is not true for Internal Control System?
(a) Facilitates the effectiveness and efficiency of operations.
(b) Helps safeguarding the assets of the entity.