Multiple Choice Questions, COPA, Semester-2: Dr.V.Nagaradjane

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 115

Multiple Choice Questions, COPA, Semester-2

Dr.V.Nagaradjane

December 25, 2017


ii

Author: Dr.V.Nagaradjane
Contents

1 Javascript 1
1.1 Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Flowcharts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.3 Web servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Features of web servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5 Programming languages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5.1 Compiler based programming languages . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5.2 Interpreter based programming languages . . . . . . . . . . . . . . . . . . . . . . . 4
1.6 Introduction to JavaScript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.7 JavaScript Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.8 JavaScript data types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.9 Special characters in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.10 Strings in JavaScript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.11 Operators in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.12 Math functions in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.13 Control statements in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.14 Loops in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.15 Functions in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.16 Objects in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.17 Array and data objects in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.18 Browser Object Model (BOM) in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.19 Document Object Model (DOM) in Javascript . . . . . . . . . . . . . . . . . . . . . . . . 15
1.19.1 Cookies in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

2 Visual Basic for Application (VBA) 17


2.1 VBA shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.2 Useful functions in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.3 Data types in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.4 Arithmetic operators in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.5 Comparison operators in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.6 Concatenation operators in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.7 Logical operators in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.8 Bitwise operators in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.9 Mathematical functions in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.10 String functions in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.11 Date/ Time functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.12 Arrays in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.13 Conditions in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.14 Loops in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.15 Message Box in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.16 Input box in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2.17 Creating function in VBA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

iii
iv CONTENTS

2.18 Creating Subroutines in VBA . . . . . . . . . . . . . . . . . ................ 30


2.19 Creating macros in VBA . . . . . . . . . . . . . . . . . . . . ................ 31
2.20 Object Oriented Programming System (OOPS) through VBA ................ 31
2.21 Event driven programming in VBA . . . . . . . . . . . . . . ................ 31
2.22 GUI components in VBA . . . . . . . . . . . . . . . . . . . . ................ 32
2.23 Properties for VBA controls . . . . . . . . . . . . . . . . . . ................ 33
2.24 Events associated with VBA controls . . . . . . . . . . . . . ................ 33
2.25 ActiveX data objects in VBA . . . . . . . . . . . . . . . . . ................ 34
2.26 Debugging techniques in VBA . . . . . . . . . . . . . . . . . ................ 34

3 Smart accounting 37
3.1 Basics of accounting . . . . . . . . . . . . . . . . . . . . . . ................ 37
3.2 Methods of accounting . . . . . . . . . . . . . . . . . . . . . ................ 37
3.3 Accounting concept . . . . . . . . . . . . . . . . . . . . . . ................ 38
3.4 Golden rules of double entry system . . . . . . . . . . . . . . ................ 39
3.5 Accounting termonologies . . . . . . . . . . . . . . . . . . . ................ 39
3.6 Voucher entry . . . . . . . . . . . . . . . . . . . . . . . . . ................ 39
3.7 Preparation of nal accounts . . . . . . . . . . . . . . . . . ................ 40
3.8 Cash book . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ 40
3.9 Ratio analysis . . . . . . . . . . . . . . . . . . . . . . . . . ................ 41
3.10 Depreciation . . . . . . . . . . . . . . . . . . . . . . . . . . ................ 42
3.11 Stock management . . . . . . . . . . . . . . . . . . . . . . . ................ 42
3.12 VAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ 43
3.13 Cash & fund ow . . . . . . . . . . . . . . . . . . . . . . . ................ 43
3.14 Tally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ 44
3.15 Accounting in Tally . . . . . . . . . . . . . . . . . . . . . . ................ 44
3.16 Shortcuts in Tally . . . . . . . . . . . . . . . . . . . . . . . ................ 45
3.17 Double entry system in Tally . . . . . . . . . . . . . . . . . . ................ 46
3.18 Budgeting system in Tally . . . . . . . . . . . . . . . . . . . ................ 47
3.19 Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ 47
3.20 Variance & ratio analysis . . . . . . . . . . . . . . . . . . . . ................ 48
3.21 Analysis of nancial statements . . . . . . . . . . . . . . . . ................ 48
3.22 Inventory basics . . . . . . . . . . . . . . . . . . . . . . . . ................ 48
3.23 POS Invoicing . . . . . . . . . . . . . . . . . . . . . . . . . ................ 49
3.24 Taxation in Tally . . . . . . . . . . . . . . . . . . . . . . . . ................ 49
3.25 Languages in Tally . . . . . . . . . . . . . . . . . . . . . . . ................ 50

4 E-Commerce 51
4.1 Introduction to E-Commerce . . . . . . . . . . . . . . . . . . ................ 51
4.2 Types of E-Commerce . . . . . . . . . . . . . . . . . . . . . ................ 51
4.3 Scope of E-Commerce platforms . . . . . . . . . . . . . . . . ................ 51
4.4 Bene ts of E-Commerce . . . . . . . . . . . . . . . . . . . . ................ 52
4.5 Capabilities required for E-Commerce platform . . . . . . . . ................ 52
4.6 Di erences between E-Commerce and traditional commerce . ................ 53
4.7 Types of E-Commerce websites . . . . . . . . . . . . . . . . ................ 53
4.8 Modes of payment for E-Commerce . . . . . . . . . . . . . . ................ 54
4.9 Payment gateway . . . . . . . . . . . . . . . . . . . . . . . ................ 55
4.10 General questions on E-Commerce . . . . . . . . . . . . . . . ................ 55

Author: Dr.V.Nagaradjane
CONTENTS v

5 Cyber security 59
5.1 Introduction to cyber security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
5.2 Threats to information security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
5.3 Vulnerability and risk management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.4 Directory service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.5 Access control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.6 Software development security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
5.7 Privacy protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
5.8 Information security audit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
5.9 Information Technology (IT) Act . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

6 General Questions on VBA 65

Author: Dr.V.Nagaradjane
vi CONTENTS

Author: Dr.V.Nagaradjane
3. The circle symbol denotes op-
Chapter 1 (a) eration in owchart.
start/ end
(b) continuation/ connector
(c) ow direction
Javascript (d)
4.
input/ output
The parallelogram symbol denotes

operation in owchart.
(a) start/ end
1.1 (b) continuation/ connector
(c) ow direction
Algorithms (d) input/ output

5. The arrow symbol denotes op-


1. The sequence
of steps taken to solve a eration in owchart.
problem is
called

(a) explanation

(c) algorithm

Answers (1 - 1)
1. (c)

1.2

Flowcharts
1. Graphical
representation of the ow of
program is
called
(a
) executable code
(b
) ow chart
(c
) source code
(d
) algorithm
The oval symbol
2. denotes
eration in
owchart.
(a) start/ end
(b) continuation/
connector
(c) ow direction
(d) input/ output
(c) decision makin
(d) input/ output
8.
start/ end of

(a)

(b)
(a) start/ end (c) -
(b) continuation/
connector (d)
(c) ow direction
9.
(d) input/ output
6. The rectangle symbol continuation
denotes
operation in
owchart.
(a) start/ end (a)
(b) processing
(c) decision making/ (b)
looping (c) -

(d) input/ output


(d)
7. The rhombus symbol 10.
denotes
of ow of prog

(a)
1
2 1.3. WEB SERVERS

(d) HTML documents


(b) 2. HTML stands for .
(c) -
(a) Higher Text Markup Language
(b) Hyper Text Markup Language
(d) (c) Hyper Transfer Markup Language
(d) Hyper Text Manipulation Language
11. symbol in owchart denotes
input/ output. 3. HTTP stands for .
(a) Hyper Text Transfer Protocol
(a) (b) Hyper Transmission Transfer Protocol
(c) Hyper Text Transfer Procedure
(b) (d) Hiker Text Transfer Protocol
@
@
@ 4. Port number handles HTTP
(c) @ communications.
(a) 80 (b) 443
(d) (c) 25 (d) 20
12. symbol in owchart denotes
processing. 5. HTTPS stands for .
(a) Hyper Text Transfer Protocol Secure
(a) (b) Hyper Transmission Transfer Protocol Secure
(c) Hyper Text Transfer Procedure Secure
(b) (d) Hiker Text Transfer Protocol Secure
@
@ 6. Port number handles HTTPS
@ communications.
@ (a) 80 (b) 443
(c) (c) 25 (d) 20
7. When HTTPS protocol is used, browser
shows aicon near the address
(d) bar.
(a) open lock
13. symbol in owchart denotes (b) lock with cross mark ( )
decision making. (c) danger icon
(d) green lock
(a)
8. SSL stands for .
(a) Secure Sur ng Layer
(b) (b) Second Socket Layer
@
@ (c) Secure Socket Layer
@ (d) Secure Socket Link
(c) @

(d)
Answers (2 - 14) 9. Scripting languages like PHP, Perl,
Python, ASP.NET, etc., executed by a
1. (b) 2. (a) 3. (b) 4. (d) web server are called side
5. (c) 6. (b) 7. (c) 8. (a) scripts.
9. (b) 10. (c) 11. (d) 12. (a) (a) server (b) client
13. (c) (c) way (d) unrelated
10. Scripting languages like Javascript, VB-
Script, etc., executed by a browser are
1.3 Web servers called side scripts.
(a) server (b) client
1. Web servers send pages in re- (c) way (d) unrelated
sponse to client request.
(a) Word documents 11. is a popular open source web
(b) A
L TEX documents server available free of cost.
(c) Powerpoint documents (a) Apache
(b) Microsoft Internet Information Server

Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 3

(c) Google Web Server (GWS) Answers (27 - 31)


(d) ngyngx
1. (b) 2. (a) 3. (c) 4. (b)
12. MS IIS in web servers stands for
. 5. (c)
(a) Microsoft Internet Interchange Server
(b) Microsoft Internet Information Signal
(c) Microsoft Internet Information Server 1.5 Programming languages
(d) Microsoft Integrated Information Server
1.5.1 Compiler based programming
languages
Answers (15 - 26)
1. Human readable program is called
1. (d) 2. (b) 3. (a) 4. (a) .
5. (a) 6. (b) 7. (d) 8. (c) (a) machine code
9. (a) 10. (b) 11. (a) 12. (c) (b) source code
(c) mnemonic code
(d) key code
1.4 Features of web servers
2. A compiler converts source code to
code.

1. URL stands for . (a) executable machine code


(a) United Resource Locator (b) source code
(b) Uniform Resource Locator (c) mnemonic code
(c) Uniform Resource Loader (d) key code

(d) Uniform Register Locator 3. converts source code to exe-


2. The rst part of URL placed to the left cutable machine code.
side of : (colon) symbol is . (a) document processor
(b) spreadsheet program
(a) protocol
(c) browser
(b) path
(d) compiler
(c) document name
(d) none of them 4. The rules to be followed in writing source
code are called of a program-
3. The last part of URL placed to the
ming language.
right side of = (forward slash) symbol is
(a) syntax (b) bugs
.
(a) protocol (c) laws (d) punishments
(b) path 5. The errors caused by improper syntax in
(c) document name source code are called .
(d) none of them (a) syntax (b) bugs
(c) laws (d) punishments
4. The part of URL placed between the pro-

tocol and document name and separated 6. Compilation is to create an ex-


by = (forward slash) symbol is . ecutable program from source code.
(a) done every time the source code needs to run
(a) protocol
(b) never done
(b) path
(c) always incomplete
(c) document name
(d) done only once
(d) none of them

5. Normally, the URL for an HTML docu- 7. Compiled machine code runs in-
ment begins with . terpreted source code.
(a) faster than (b) slower than
(a) http
(c) as fast as (d) none of them
(b) https
(c) both a and b 8. Assembly language, C, C++, Java, C#

(d) neither a nor b are examples of programming


languages.
(a) interpreter based
(b) browser based
Author: Dr.V.Nagaradjane
4 1.6. INTRODUCTION TO JAVASCRIPT

(c) compiler based (b) server side (using Node JS)


(d) Excel based (c) game development/ desktop applications &
9. Compiler based programming languages mo-bile apps
are data types and syntax errors. (d) all of them
(a) liberal 2. Javascript variables are
(b) strict typed.
(c) uncaring (a) statically (b) strongly
(d) very lenient about (c) dynamically (d) globally
3. Javascript language supports
1.5.2 Interpreter based programming concepts of programming.
(a) object oriented
languages (b) procedural
(c) imperative/functional
10. The special program which executes
source code one line (or few lines) at a (d) all of them
time is called . 4. Design concepts of Javascript language
(a) linker (b) loader were taken from .
(c) compiler (d) interpreter (a) C & C#
(b) COBOL & ADA
11. Interpreted programs run (c) BASIC & FORTRAN
compiled executable code. (d) Self & Scheme
(a) slower than 5. JavaScript runs was developed by
(b) faster than .
(c) as fast as (a) Netscape Communications
(d) much faster than (b) Microsoft corporation
12. Usually, interpreted languages are a bit (c) Sun Microsystems
about data types and syntax. (d) Oracle
(a) strict (b) very strict 6. Javascript code is written within
(c) liberal (d) stringent tags.
13. Javascript and VBScript are examples of (a) < html > ::: < =html >
based scripting languages. (b) < body > ::: < =body >
(a) browser (b) compiler (c) < script > ::: < =script >
(c) MS O ce (d) none of them (d) < table > ::: < =table >
14. Javascript, Perl, Python, PHP, Linux/ 7. Javascript script type is identi ed by the
Unix shell script, etc. are examples parameter type= .
of based programming lan-
(a) "text/vbscript"
guages. (b) "text/javascript"
(a) compiler (b) interpreter
(c) "text/html"
(c) MS O ce (d) none of them
(d) "text/plain"
8. Javascript language is identi ed by the
Answers (32 - 45)
parameter language= .
1. (b) 2. (a) 3. (d) 4. (a) (a) "javascript" (b) "vbscript"
5. (b) 6. (d) 7. (a) 8. (c) (c) "vba" (d) "java"
9. (b) 10. (d) 11. (a) 12. (c)
9. Javascript complies with stan-
13. (a) 14. (b) dard.
(a) Indian
(b) British
1.6 Introduction to JavaScript (c) ASCII
(d) ECMA-262 & ISO/IEC 16262
1. Javascript can be used for programming
. 10. Javascript objects support the dot nota-
(a) client side browser tion (e.g. obj.x=2) to access member
variables in addition to nota-tion.
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 5

a component looses focus.


(a) array (obj['x']=2)
(b) block (objf'x'g=2)
(c) function (obj('x')=2)
0 0
(d) tag (obj< x >= 2)

11. statement in JavaScript


helps to evaluate any mathematical string
at runtime.
(a) value (b) eval
(c) calc (d) cal
12. Method is a function bound to
.
(a) a procedure (b) a library
(c) a script (d) an object
13. The system of notations used to e ec-
tively process string related operations is
called .
(a) impression
(b) parser
(c) regular expression
(d) concatenation
14. External javascript les should have
as le name extension.
(a) .asp (b) .html
(c) .php (d) .js

15. In JavaScript, is used for


multiline comments.
(a) /* ... */ (b) f ... g
(c) # ... # (d) $ ... $

16. In JavaScript, is used for


single line comments.
(a) f ... g (b) // ...
(c) # ... # (d) $ ... $
17. In JavaScript, keywords/ reserved words
be used as variables, labels
or function names.
(a) may
(b) should always
(c) can
(d) must not

Answers (46 - 62)


1. (d) 2. (c) 3. (c) 4. (d)
5. (a) 6. (c) 7. (b) 8. (a)
9. (d) 10. (a) 11. (b) 12. (d)
13. (c) 14. (d) 15. (a) 16. (b)
17. (d)

1.7 JavaScript Events

1. event gets activated when


(c) onkeypress (d) onmouseover
(a) onfocus (b) onblur
(c) onclick (d) onerror 8. event gets activated when
mouse moves over a component.
2. event gets activated when (a) onkeydown (b) onmouseout
a component gains focus. (c) onkeypress (d) onmouseover
(a) onfocus (b) onblur
(c) onclick (d) onerror 9. event gets activated when
mouse moves out from a component.
3. event gets activated when (a) onmousedown (b) onmouseout
an error occurs during execution of script. (c) onload (d) onmouseover
(a) onfocus (b) onblur
(c) onclick (d) onerror 10. event gets activated after
loading a script le.
4. event gets activated when (a) onmousedown (b) onmouseout
a component is clicked. (c) onload (d) onmouseover
(a) onfocus (b) onblur
(c) onclick (d) onerror 11. event gets activated when
mouse key pressed.
5. event gets activated when (a) onmousedown (b) onmouseout
a key moves down. (c) onload (d) onmouseover
(a) onkeydown (b) onkeyup
(c) onkeypress (d) onmouseover
Answers (63 - 73)
6. event gets activated when
a key is pressed. 1. (b) 2. (a) 3. (d) 4. (c)
(a) onkeydown (b) onkeyup 5. (a) 6. (c) 7. (b) 8. (d)
(c) onkeypress (d) onmouseover 9. (b) 10. (c) 11. (a)
7. event gets activated when
a key moves up.
(a) onkeydown (b) onkeyup
Author: Dr.V.Nagaradjane
6 1.8. JAVASCRIPT DATA TYPES
(d) POSITIVE INFINITY
1.8 JavaScript data types 12. minimum permissible
number value in Javascript.
1. is the Javascript data type
to handle numbers.
(a) Number (b) String
(c) Boolean (d) null

2. is the Javascript data type


to handle character strings.
(a) Number (b) String
(c) Boolean (d) null

3. is the Javascript data type


to handle the results of logical compar-
isons (TRUE or FALSE).
(a) Number (b) String
(c) Boolean (d) null

4. is the Javascript data type


to handle unde ned data types.
(a) Unde ned (b) Object
(c) Number (d) String

5. is the Javascript data type


to handle objects.
(a) Unde ned (b) Object
(c) Number (d) String

6. is the keyword used in


Javascript to de ne a variable.
(a) Data (b) double
(c) var (d) DIM

7. denotes a value which is


not a number (e.g., result of division by
zero) in Javascript.
(a) NaN (b) in nity
(c) -in nity (d) isNaN()

8. denotes ini nite value in


Javascript.
(a) NaN (b) in nity
(c) -in nity (d) isNaN()

9. denotes negative ini nite


value in Javascript.
(a) NaN (b) in nity
(c) -in nity (d) isNaN()

10. tests whether a value is


not a number in Javascript.
(a) NaN (b) in nity
(c) -in nity (d) isNaN()

11. maximum permissible


number value in Javascript.
(a) MAX VALUE
(b) MIN VALUE
(c) NEGATIVE INFINITY
17. function converts a
(a) MAX VALUE string value to oating point value.
(b) MIN VALUE (a) Number() (b) ParseFloat()
(c) NEGATIVE INFINITY (c) ParseInt() (d) toString()
(d) POSITIVE INFINITY
18. function converts a num-
13. value of positive in nity ber value to string value.
in Javascript. (a) Number() (b) ParseFloat()
(a) MAX VALUE (c) ParseInt() (d) toString()

(b) MIN VALUE 19. returns a number for-


(c) NEGATIVE INFINITY matted in exponential notation.
(a) toExponential()
(d) POSITIVE INFINITY (b) toFixed()
(c) toPrecision()
14. value of negative in nity (d) valueOf()
in Javascript.
(a) MAX VALUE
20. returns a number for-
matted to speci ed length.
(b) MIN VALUE (a) toExponential()
(c) NEGATIVE INFINITY (b) toFixed()
(d) POSITIVE INFINITY (c) toPrecision()
(d) valueOf()
15. function converts a
string value to generic number value. 21. returns a number
(a) Number() (b) ParseFloat() rounded to speci ed number of digits.
(c) ParseInt() (d) toString() (a) toExponential()
(b) toFixed()
16. function converts a (c) toPrecision()
string value to integer value. (d) valueOf()
(a) Number() (b) ParseFloat()
(c) ParseInt() (d) toString()
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 7

1.9 Special characters in


22. function creates a new ar-
ray. Javascript
(a) newVar() (b) newArray()
(c) newDIM() (d) Redim() 1. Special characters are otherwise called
23. Members of an array have index values .
starting from . (a) escape sequaneces
(a) 0 (b) 1 (b) invalid characters
(c) 100 (d) 1000 (c) wrong characters
24. Identify the wrong variable declaration (d) constants
from the following:
(a) var x2=10; 2. denotes backspace in
Javascript.
(b) var x=2;
(c) var 1x = 3; (a) nb
(d) var name="Krish" (b) nt
(c) nn
25. Identify the wrong variable declaration
from the following: (d) nv
(a) var x2=10;
3. denotes newline in
(b) var x=2;
Javascript.
(c) var x.y = 3;
(a) nb
(d) var name="Krish"
(b) nt
26. Identify the wrong variable declaration (c) nn
from the following:
(a) var x2=10; (d) nv
(b) var x=2;
4. denotes tab in Javascript.
(c) var x y = 3;
(a) nb
(d) var name="Krish"
(b) nt
27. Identify the wrong initialization of vari- (c) nn
able from the following:
(a) var x2=10; (d) nv
(b) var x=2;
5. denotes vertical tab in
(c) var x=3;
Javascript.
(d) var name="Krish
(a) nb
28. A variable declared outsdide the scope of (b) nt
any function is . (c) nn
(a) an invalid variable
(b) a global variable (d) nv
(c) a variable with scope limited to a function 6. denotes form feed (page
(d) a variable having scope inside a block eject for printer) in Javascript.
(a) nf
(b) nr
Answers (74 - 101) (c) nn
1. (a) 2. (b) 3. (c) 4. (a) (d) n'
5. (b) 6. (c) 7. (a) 8. (b) 7. denotes enter key in Javascript.
9. (c) 10. (d) 11. (a) 12. (b)
13. (d) 14. (c) 15. (a) 16. (c) (a) nf
17. (b) 18. (d) 19. (a) 20. (c) (b) nr
21. (b) 22. (b) 23. (a) 24. (c) (c) nn
25. (c) 26. (c) 27. (d) 28. (b) (d) n'
8. denotes simple back slash in
Javascript.
(a) nf
(b) nr
(c) nn
(d) n'
9. denotes single quote in
Javascript.
Author: Dr.V.Nagaradjane
8 1.10. STRINGS IN JAVASCRIPT

(a) nf (b) lastIndexOf()


(b) nr (c) substr()
(c) nn (d) substring()
(d) n'
7. function in Javascript re-
10. denotes double quotes mark turns the substring from given index lo-
in Javascript. cation to speci ed length.
(a) nf (a) indexOf()
(b) nr (b) lastIndexOf()
(c) n" (c) substr()
(d) n' (d) substring()

8. function in Javascript re-


Answers (102 - 111) turns the substring from given index lo-
cation to speci ed ending index location.
1. (a) 2. (a) 3. (c) 4. (c) (a) indexOf()
5. (d) 6. (a) 7. (b) 8. (c) (b) lastIndexOf()
9. (d) 10. (c) (c) substr()
(d) substring()

1.10 Strings in JavaScript 9. function in Javascript re-


turns the string in upper case characters.
(a) toLowerCase()
1. function in Javascript re- (b) toUpperCase()
turns length of a string. (c) trim()
(a) length() (b) charAt() (d) fromCharCode()
(c) charCodeAt() (d) concat()
10. function in Javascript re-
2. function in Javascript turns the character equivalent of given
joins two strings. unicode value.
(a) length() (b) charAt() (a) toLowerCase()
(c) charCodeAt() (d) concat() (b) toUpperCase()
(c) trim()
3. function in Javascript re- (d) fromCharCode()
turns the character found at speci ed lo-
cation in a string. 11. function in Javascript re-
(a) length() (b) charAt() turns the string in lower case.
(c) charCodeAt() (d) concat() (a) toLowerCase()
(b) toUpperCase()
4. function in Javascript re- (c) trim()
turns the unicode value of the character (d) fromCharCode()
found at speci ed location in a string.
(a) length() (b) charAt() 12. function in Javascript re-moves
(c) charCodeAt() (d) concat() space, tab or other space holders
from beginning and end of a string.
5. function in Javascript re- (a) toLowerCase()
turns the rst found location where given (b) toUpperCase()
pattern occurs in the target string. (c) trim()
(a) indexOf() (d) fromCharCode()
(b) lastIndexOf()
(c) substr()
(d) substring() Answers (112 - 123)
6. function in Javascript re- 1. (a) 2. (d) 3. (b) 4. (c)
turns the last found location where given 5. (a) 6. (b) 7. (c) 8. (d)
pattern occurs in the target string. 9. (b) 10. (d) 11. (a) 12. (c)
(a) indexOf()
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 9

1.11 Operators in Javascript 9. operator in Javascript com-


pares whether two expressions are NOT
EQUAL.
1. denotes the bitwise AND (a) == (b) !=
operator in Javascript.
(a) &
(b) j
(c) ~
^
(d)

2. denotes the bitwise NOT


operator in Javascript.
(a) &
(b) j
(c) ~
^
(d)

3. denotes the bitwise OR op-


erator in Javascript.
(a) &
(b) j
(c) ~
^
(d)

4. denotes the bitwise XOR


operator in Javascript.
(a) &
(b) j
(c) ~
^
(d)

5. denotes the bitwise LEFT


SHIFT operator in Javascript.
(a) <<
(b) >>
(c) ~
^
(d)

6. denotes the bitwise RIGHT


SHIFT operator in Javascript.
(a) <<
(b) >>
(c) ~
^
(d)

7. operator in Javascript
compares whether two expressions are
EQUAL.
(a) == (b) !=
(c) === (d) !==

8. operator in Javascript
compares whether two expressions are
EQUAL using strict comparison rules.
(a) == (b) !=
(c) === (d) !==
(c) <= (d) >=
(c) === (d) !==
15. operator in Javascript
10. operator in Javascript com- compares whether the left side expression
pares whether two expressions are NOT is LESS THAN OR EQUAL TO the right
EQUAL using strict comparison rules. side one.
(a) == (b) != (a) < (b) >
(c) === (d) !== (c) <= (d) >=

11. operator in Javascript 16. operator in Javascript


compares whether the left side expression tests whether the left side value is found
is LESS THAN the right side one. in the right side collection.
(a) < (b) > (a) < (b) >
(c) <= (d) >= (c) in (d) instanceOf

12. operator in Javascript 17. operator in Javascript


compares whether the left side expression tests whether a variable belongs to par-
is GREATER THAN the right side one. ticular datatype.
(a) < (b) > (a) < (b) >
(c) <= (d) >= (c) in (d) instanceOf

13. operator in Javascript 18. operator in Javascript in-


compares whether the left side expression crements the given variable x BEFORE
is LESS THAN the right side one. evaluting the expression.
(a) < (b) > (a) x + + (b) + + x
(c) <= (d) >=
(c) x (d) x
14. operator in Javascript 19. operator in Javascript in-
compares whether the left side expression crements the given variable x AFTER
is GREATER THAN OR EQUAL TO the evaluting the expression.
right side one.
(a) < (b) >

Author: Dr.V.Nagaradjane
10 1.12. MATH FUNCTIONS IN JAVASCRIPT

(a) x++ (b) ++x (a) Math.sin() (b) Math.cos()


(c) x (d) x (c) Math.acos() (d) Math.abs()

20. operator in Javascript 2. function in Javascript re-


decrements the given variable x BEFORE turns sine value of its argument.
evaluting the expression. (a) Math.sin() (b) Math.cos()
(a) x++ (b) + + x (c) Math.acos() (d) Math.abs()
(c) x (d) x 3. function in Javascript re-
21. turns cosine value of its argument.
operator in Javascript
(a) Math.sin() (b) Math.cos()
decrements the given variable x AFTER
(c) Math.acos() (d) Math.abs()
evaluting the expression.
(a) x++ (b) + + x
4. function in Javascript re-
(c) x (d) x 1
turns cos value of its argument.
(a) Math.sin() (b) Math.cos()
22. operator in Javascript (c) Math.acos() (d) Math.asin()
multiplies the left and right side number
values and assigns the result to the left 5. function in Javascript re-
side variable. 1
turns sin value of its argument.
(a) = (b) = = (a) Math.sin() (b) Math.cos()
(c) += (d) = (c) Math.acos() (d) Math.asin()

23. operator in Javascript di- 6. function in Javascript re-


vides the left side value by the right side turns tangent value of its argument.
value and assigns the result to the left (a) Math.tan() (b) Math.cos()
side variable. (c) Math.acos() (d) Math.atan()
(a) = (b) = =
(c) += (d) = 7. function in Javascript re-
1
turns tan value of its argument.
24. operator in Javascript (a) Math.tan() (b) Math.cos()
substracts the right side value from the (c) Math.acos() (d) Math.atan()
left side value and assigns the result to
the left side variable. 8. function in Javascript re-
(a) = (b) = = turns the higher integer value for given
(c) += (d) = oating point number (e.g., return value
for 2.1 is 3).
25. operator in Javascript (a) Math.random()
adds the left and right side number val- (b) Math.ceil()
ues and assigns the result to the left side (c) Math. oor()
variable. (d) Math.round()
(a) = (b) = =
(c) += (d) = 9. function in Javascript re-
turns the lower integer value for given
oating point number (e.g., return value
Answers (124 - 148) for 2.8 is 2).
(a) Math.random()
1. (a) 2. (c) 3. (b) 4. (d)
(b) Math.ceil()
5. (a) 6. (b) 7. (a) 8. (c)
(c) Math. oor()
9. (b) 10. (d) 11. (a) 12. (b)
(d) Math.round()
13. (a) 14. (d) 15. (c) 16. (c)
17. (d) 18. (b) 19. (a) 20. (d) 10. function in Javascript re-
21. (c) 22. (a) 23. (b) 24. (d) turns the nearest integer value for given
25. (c) oating point number (e.g., return value
for 2.1 is 2; that for 2.8 is 3).
(a) Math.random()
1.12 Math functions in
Javascript
1. function in Javascript re-
turns positive value of its argument, irre-
spective of whether the input was positive Author: Dr.V.Nagaradjane
or negative.
Q. Bank [COPA Semester - 2] 11

(b) Math.ceil() 1.13 Control statements in


(c) Math. oor()
(d) Math.round()
Javascript
1. In javascript, if .. else condition helps to
11. function in Javascript re-
execute a block of statements .
turns random number between 0 and 1
(a) only if a condition is ful lled
(0 included, 1 excluded). (b) without any condition
(a) Math.random()
(c) without any restriction
(b) Math.ceil()
(d) randomly
(c) Math. oor()
(d) Math.round() 2. The value of x after executing the fol-

12. function in Javascript re- lowing statements would be .


turns natural logarithm of given value. var x, y=10;
(a) Math.random() if(y < 10)f
(b) Math.ceil() x=5;
(c) Math.log() g
(d) Math.exp() else f
x = 8;
13. function in Javascript re-
g
turns anti-logarithm of given value.
(a) Math.random() (a) 8 (b) 5
(b) Math.ceil() (c) 10 (d) 0
(c) Math.log() 3. The value of x after executing the fol-
(d) Math.exp() lowing statements would be .
var x, y=10;
14. function in Javascript re- if(y == 10)f
turns the rst number raised to the power x=5;
of second number.
(a) Math.pow() (b) Math.max() g
(c) Math.min() (d) Math.sqrt() else f
x = 8;
15. function in Javascript re- g
turns the maximum of the given collec- (a) 8 (b) 5
tion of numbers.
(a) Math.pow() (b) Math.max() (c) 10 (d) 0
(c) Math.min() (d) Math.sqrt() 4. The switch ... case statement checks for
several .
16. function in Javascript re- (a) loops (b) blocks
turns the minimum of the given collection (c) conditions (d) runs
of numbers.
(a) Math.pow() (b) Math.max() 5. statement is used at the
(c) Math.min() (d) Math.sqrt() end of each case block in switch ... case
condition.
17. function in Javascript re- (a) continue (b) break
turns the square root of the given col- (c) default (d) label
lection of numbers.
(a) Math.pow() (b) Math.max() 6. statement is used at the
(c) Math.min() (d) Math.sqrt() end of each case block in switch ... case
condition.
(a) continue (b) break
Answers (149 - 165) (c) default (d) label
7. In switch ... case condition in Javascript,
1. (d) 2. (a) 3. (b) 4. (c) statement is executed if no
5. (d) 6. (a) 7. (d) 8. (b) case condition is ful lled..
9. (c) 10. (d) 11. (a) 12. (c) (a) continue (b) break
13. (d) 14. (a) 15. (b) 16. (c) (c) default (d) label
17. (d)
Author: Dr.V.Nagaradjane
12 1.14. LOOPS IN JAVASCRIPT

8. What would be the value of the variable (a) 10 (b) 15


x, after executing the following switch ... (c) 20 (d) 25
case statement? 11. What would be the value of the variable x,
var x, y=3; switch(y) f after executing the following switch ...
case 1: case statement?
x=10; var x, y=11; switch(y) f
break; case 1:
case 2: x=10;
x=15; break;
break; case 2:
case 3: x=15;
x=20; break;
break; case 3:
default: x=20;
x=25; break;
g default:
(a) 10 (b) 15 x=25;
(c) 20 (d) 25 g
9. What would be the value of the variable (a) 10 (b) 15
x, after executing the following switch ... (c) 20 (d) 25
case statement?
var x, y=1; switch(y) f
case 1: Answers (166 - 176)
x=10;
break; 1. (a) 2. (a) 3. (b) 4. (c)
case 2: 5. (b) 6. (b) 7. (c) 8. (c)
x=15; 9. (a) 10. (b) 11. (d)
break;
case 3:
x=20;
1.14 Loops in Javascript
break;
1. In Javascript, for loop contains
default:
x=25;
parts.
(a) 1 (b) 2
g
(c) 3 (d) 4
(a) 10 (b) 15
(c) 20 (d) 25 2. In Javascript, rst part of for loop does
10. What would be the value of the variable
parts.
(a) condition checking
x, after executing the following switch ...
(b) initialization
case statement?
(c) increment/ decrement
var x, y=2; switch(y) f
(d) continue
case 1:
x=10; 3. In Javascript, second part of for loop does
break; parts.
(a) condition checking
case 2:
(b) initialization
x=15;
(c) increment/ decrement
break;
(d) continue
case 3:
4. In Javascript, third part of for loop does
x=20;
parts.
break;
(a) condition checking
default:
(b) initialization
x=25; g (c) increment/ decrement

Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 13

(d) continue (a) break (b) continue


(c) label (d) function
5. In Javascript, statement helps 2. Code block for each Javascript function
to skip the remaining statemets of the is enclosed in .
loop for next cycle of execution. (a) ( ... ) (b) f ... g
(a) break (c) [ ... ] (d) < ::: >
(b) initialization 3. Parameters/ arguments to be passed to a
(c) increment/ decrement
(d) continue function are enclosed in after
the name of the function.
6.In Javascript, statement helps (a) ( ... ) (b) f ... g
to exit the loop. (c) [ ... ] (d) < ::: >
(a) break
(b) initialization 4. is placed between function
(c) increment/ decrement keyword and function parameters in
(d) continue Javascript.
(a) Function opening
7. What would be the value of x, on
com-pleting the following for loop? (b) Function end
var i,x=10; (c) Function name
(d) Function code block
for(i = 10; i <= 12; i + +) f
s+=i; 5. The result of a Javascript function may
be passed back using key-
g
(a) 43 (b) 45 word.
(a) function (b) return
(c) 55 (d) 66
(c) break (d) continue
8. In Javascript, the loop helps 6. In Javascript, functions are also
to process each element of an array in .
succession. (a) variables
(a) for (b) for ... in (b) objects
(c) do ... while (d) while (c) both variables and objects
(d) neither variables nor objects
9. In Javascript, the loop helps
7. Any variable declared inside a function
to the following block of statements only
if the condition is true. has validity within the .
(a) for (b) for ... in (a) block only
(c) do ... while (d) while (b) function only
(c) global scope
10. In Javascript, the loop helps (d) constant
to the following block atleast once even 8. Any variable declared outside a function
if the condition is FALSE. has validity within the .
(a) for (b) for ... in
(a) block only
(c) do ... while (d) while
(b) function only
(c) global scope
Answers (177 - 186) (d) constant

1. (c) 2. (b) 3. (a) 4. (c)


5. (d) 6. (a) 7. (a) 8. (b) Answers (187 - 194)
9. (d) 10. (c)
1. (d) 2. (b) 3. (a) 4. (c)
5. (b) 6. (c) 7. (b) 8. (c)
1.15 Functions in Javascript

1. In Javascript, keyword de-


notes beginning of a function.
Author: Dr.V.Nagaradjane
14 1.16. OBJECTS IN JAVASCRIPT

1.16 Objects in Javascript (c) abstraction


(d) polymorphism
1. Creating new data types through pro- 9. The ability of a program object to re ect
gramming and adding new properties real world objects is called .
and methods to the data type is called (a) inheritance
programming. (b) encapsulation
(a) rapid (c) abstraction
(b) object oriented (d) polymorphism
(c) procedural
(d) functional
2. The domain created by a programmer Answers (195 - 203)
for placing all items related to a spe-ci c
object/solution in Javascript is called 1. (b) 2. (b) 3. (c) 4. (d)
. 5. (a) 6. (a) 7. (d) 8. (b)
(a) object (b) namespace 9. (c)
(c) class (d) property
3. The keyword used in Javascript to create
a new data type is . 1.17 Array and data objects in
(a) object (b) namespace Javascript
(c) class (d) property
4. The variable placed inside a class de ni- 1. A collection of values accessible through
tion to store values related to an object an index is called .
(such as colour, size, location, etc.) is (a) array (b) function
called . (c) variable (d) block
(a) object (b) namespace
(c) class (d) property 2. The array index begins at in
5. The special method placed inside a class Javascript.
having the name of the class itself as the (a) 3 (b) 2
function name is . (c) 1 (d) 0
(a) constructor 3. each element of an array may be of
(b) encapsulation data type(s).
(c) abstraction (a) di erent
(d) polymorphism (b) only the same
6. The ability of a class to derive the proper- (c) only integer
ties and methods of another class is called (d) only oat
. 4. What would be the value stored in
(a) inheritance name[2]?
(b) encapsulation varname=newAr-
(c) abstraction ray("Krish","Ram","Shiva",27);
(d) polymorphism (a) Krish (b) Ram
7. The ability to a method having the same (c) Shiva (d) 27
name but di erent behaviour in di er- 5. What would be the value stored in
ent parent and child classes is called name[3]?
.
(a) inheritance varname=newAr-
(b) encapsulation ray("Krish","Ram","Shiva",27);
(c) abstraction (a) Krish (b) Ram
(d) polymorphism (c) Shiva (d) 27
6. Length of an array may be accessed using
8. The ability of a class to bind properties
and methods with di erent access levels
property.
is called . (a) length (b) size
(a) inheritance
(b) encapsulation (c) width (d) height

7. Index of an array may be .


Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 15

(a) number Answers (212 - 217)


(b) string
(c) either number or string 1. (a) 2. (a) 3. (d) 4. (d)
(d) neither number nor string 5. (d) 6. (b)
8. Array having string value for index is
called array.
(a) assistant (b) associative 1.19 Document Object Model
(c) decent (d) string (DOM) in Javascript
1. The support provided for various compo-
Answers (204 - 211) nents of a HTML document (like head,
1. (a) 2. (d) 3. (a)4. (c) title, body, etc. in a browser is called
.
5. (d) 6. (a) 7. (c)8. (b) (a) Document Object Model
(b) Dominant Object Model
1.18 Browser Object Model (c) (d)
Document O ce Model
Document Object Management
(BOM) in Javascript 2. The abbreviation DOM stands for
.
1. The standard interfaces provided by a (a) Document Object Model
browser for interaction with program (b) Dominant Object Model
script is called . (c) Document O ce Model
(a) Browser Object Model (d) Document Object Management
(b) Browser Opening Model 3. DOM permits access to
(c) Brown Object Model methods.
(d) Browser Object Mission (a) docuemnt.getElementById()
2. BOM stands for . (b) document.getElementsByTagName()
(a) Browser Object Model (c) document.getElementByClassName()
(b) Browser Opening Model (d) all of them
(c) Brown Object Model 4. HTML element in DOM o ers
(d) Browser Object Mission properties.
3. Browser Object Model supports access to (a) innerHTML
object. (b) attribute
(a) window (b) document (c) setAttribute(attrib, val)
(c) innerhtml (d) all of them (d) all of them
4. Window.Location object supports 5. Methods of DOM (Document Object
properties. Model) are called on object.
(a) href (a) document (b) window
(b) hostname/protocol (c) button (d) text
(c) pathname
(d) all of them 1.19.1 Cookies in Javascript
5. Window.Navigator object supports
properties. 6. A text le used to save name, value pairs
(a) appName/appCodeName related to website visited by a browser is
(b) platform called .
(a) memory (b) history
(c) cookieEnabled/javaEnabled
(c) cookie (d) script
(d) all of them
7. Cookie may have \expires" property
6. Methods of BOM (Browser Object
which contains .
Model) are called on object. (a) name of owner
(a) document (b) window (b) date and time of expiry
(c) button (d) text

Author: Dr.V.Nagaradjane
16 1.19. DOCUMENT OBJECT MODEL (DOM) IN JAVASCRIPT

(c) name of browser (c) window.history.back


(d) name of the web server (d) window.prompt
12. The statement docu-
8. property of the docu- ment.cookie=\name=Gayathri;" sets
ment class permits access to cookie. a cookie with name property. What is
(a) getElementById
the value of the name property?
(b) cookie
(a) name (b) ;
(c) innerHTML
(c) Gayathri (d) \"
(d) getElementByName
13. What does the following statement do?
9. What would be the value of pass prop-
var x = document.cookie;
erty in the following cookie? (a) gets all cookies in a variable named x
document.cookie="id=vi;pass=ret;org=iti"; (b) prompts for input and stores the input
(a) vi (b) ret value in x
(c) iti (d) none of them (c) alerts regarding an error
10. Image object in Javascript supports (d) sets the background color of the document

methods/properties.
(a) isMap/ useMap Answers (218 - 230)
(b) naturalHeight/ naturalWidth
(c) width/ height/ vspace 1. (a) 2. (a) 3. (d) 4. (d)
(d) all of them 5. (a) 6. (c) 7. (b) 8. (b)
9. (b) 10. (d) 11. (a) 12. (c)
11. property of Javascript helps 13. (a)
to set a cookie.
(a) document.cookie
(b) window.alert

Author: Dr.V.Nagaradjane
Chapter 2
Visual Basic for Application (VBA)

1. VBA Stands for . (c) Graphical User Interface


(a) Visual Binary Applications (d) Graphical Uni ed Interface
(b) Visual Basic for Animations
(c) Viral Basic for Applications 8. VBA permits of data from
(d) Visual Basic for Applications spreadsheets.
(a) reading
2. VBA has a coding, compilation, run-
(b) writing
ning and debugging environment called
. (c) both reading and writing
(a) Integrated Development Environment (IDE) (d) neither reading nor writing
(b) Editor 9. VBA supports ready made user interace
(c) Highlighter components like .
(d) Compiler (a) UserForm, CommandButton
3. IDE stands for . (b) Label, TextBox, ComboBox, ListBox
(a) Internal Development Environment (c) TabStrip, OptionButton, ToggleButton
(b) Integrated Design Environment (d) all of them
(c) Integrated Development Environment
(d) Integrated Drafting Environment 10. VBA supports through class
module.
4. The programming environment which (a) Object Oriented Programming System (OOPS)
permits coding, compilation, running and debugging (b) Procedural programming
from a single window is called (c) Functional programming
. (d) property based model
(a) Integrated Development Environment (IDE)
(b) Editor 11. MS O ce records macros in
(c) Highlighter language.
(a) VBA (b) C++
(d) Compiler
(c) C# (d) Java
5. The IDE of VBA supports
12. VBA can be used to automate
since it permits drag and drop approach
carried out through MS Excel.
for design of user interface.
(a) data processing
(a) Procedural Approach
(b) graphing
(b) reverse approach
(c) accessing cell values
(c) Rapid Application Development (RAD)
(d) all of them
(d) post x approach
6. RAD in the desing applications stands for 13. VBA code is compiled into an intermedi-
. ate code called code.
(a) Ready Application Development (a) P-Code
(b) Rapid Application Development (b) MicroSoft Intermediate Code (MSIL)
(c) Real Application Development (c) Java Virual Machine (JVM) code
(d) Rapid Analysis Development (d) Android Virtual Device (AVD) code
7. GUI stands for . 14. Excel le having VBA code is saved using
the extension .
(a) General User Interface
(b) Graphical User Interaction (a) .xlsx (b) .xlsm
(c) .xlst (d) .xls
17
18 2.1. VBA SHORTCUTS

(c) Ctrl+R (d) Ctrl+Shift+I


15. MS Excel creates to execute 26. is the shortcut to add breakpoint
VBA code. in VBA IDE.
(a) real time computer (a) F9 (b) F5
(b) mobile computer (c) F1 (d) F2
(c) tablet computer
27. is the shortcut to display help in
(d) virual machine
VBA IDE.
16. Comment in VBA begins with (a) F9 (b) F5
character and continues till the end of (c) F1 (d) F2
that line. 28. is the shortcut to display object
(a) & (b) "
browser in VBA IDE.
(c) ' (d) / (a) F9 (b) F5
17. characters should not be used in (c) F1 (d) F2
VBA variable names. 29. is the shortcut to run a program
(a) ' ', . (b) @, & in VBA IDE.
(c) $, # (d) all of them (a) F9 (b) F5
(c) F1 (d) F2
30. is the shortcut to display proper-
2.1 VBA shortcuts ties window in VBA IDE.
(a) F4 (b) F5
18. is the shortcut to open VBA IDE (c) F1 (d) F2
from MS Excel.
(a) Alt+F11 (b) Alt+F8
(c) Ctrl+Break (d) Ctrl+G
19. is the shortcut to open immedi- Answers (231 - 260)
ate window in VBA IDE.
(a) Alt+F11 (b) Alt+F8 1. (d) 2. (a) 3. (c) 4. (a)
(c) Ctrl+Break (d) Ctrl+G 5. (c) 6. (b) 7. (c) 8. (c)
20. is the shortcut to open list of 9. (d) 10. (a) 11. (a) 12. (d)
macros. 13. (a) 14. (b) 15. (d) 16. (c)
(a) Alt+F11 (b) Alt+F8 17. (d) 18. (a) 19. (d) 20. (b)
(c) Ctrl+Break (d) Ctrl+G 21. (c) 22. (a) 23. (b) 24. (c)
21. is the shortcut to stop execution 25. (d) 26. (a) 27. (c) 28. (d)
of programs in VBA IDE. 29. (b) 30. (a)
(a) Alt+F11 (b) Alt+F8
(c) Ctrl+Break (d) Ctrl+G
22. is the shortcut to display infor-
2.2 Useful functions in VBA
mation relating to selected component in
VBA IDE. 1. In VBA, the function Asc converts given
(a) Ctrl+I (b) Ctrl+J character value to numeric code in
(c) Ctrl+R (d) Ctrl+Shift+I system.
23. is the shortcut to properties and
(a) American Standard Code for Information
Inter-change (ASCII)
methods of a component in VBA IDE.
(a) Ctrl+I (b) Ctrl+J (b) Double Byte Character Set (DBCS)
(c) Ctrl+R (d) Ctrl+Shift+I (c) Unicode
(d) none of them
24. is the shortcut to display project
2. In VBA, the function AscB converts given
explorer in VBA IDE.
(a) Ctrl+I (b) Ctrl+J character value to numeric code in
(c) Ctrl+R (d) Ctrl+Shift+I system.
(a) American Standard Code for Information
25. is the shortcut to display param-
Inter-change (ASCII)
eter information for selected element (b) Double Byte Character Set (DBCS)
in VBA IDE. (c) Unicode
(a) Ctrl+I (b) Ctrl+J
(d) none of them

Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 19

3. In VBA, the function AscW converts 12. In VBA, CByte function converts String
given character value to numeric code in
to type.
system. (a)number (b) byte
(a) American Standard Code for Information Inter- (c)Currency (d) Decimal
change (ASCII) In VBA, CCur function converts String
13. to type.
(b) Double Byte Character Set (DBCS) number (b) byte
(c) Unicode (a)Currency (d) Decimal
(d) none of them (c)
In VBA, CLng function converts String
4. In VBA, the function Chr converts given 14. to type.
numeric value to character value in Long (b) byte
Currency (d) Decimal
system. (a)
(a) American Standard Code for Information Inter- (c) In VBA, CDec function converts String
change (ASCII) to type.
15. number (b) byte
(b) Double Byte Character Set (DBCS) Currency (d) Decimal
(c) Unicode
(a)
(d) none of them
(c)
5. In VBA, the function ChrB converts

16. function in VBA creates a cus-


given numeric value to character value in
tom error message.

system.
(a) Format (b) CVErr
(a) American Standard Code for Information Inter-
(c) InputBox (d) MsgBox
change (ASCII)

(b) Double Byte Character Set (DBCS) 17. function in VBA formats a num-
ber according to given text strings con-
(c) Unicode
taining 0, # and comma (,).
(d) none of them
(a) Format (b) CVErr
6. In VBA, the function ChrW converts
(c) InputBox (d) MsgBox
given numeric value to character value in
18. function in VBA displays a mes-

system.
(a) American Standard Code for Information Inter- sage.
(a) Format (b) CVErr
change (ASCII)
(c) InputBox (d) MsgBox
(b) Double Byte Character Set (DBCS)

(c) Unicode System 19. function in VBA displays an in-


(d) none of them put box.
(a) Format (b) CVErr
7. In VBA, Cstr function converts any data
(c) InputBox (d) MsgBox

to type.
(a) Integer (b) Double
(c) Single (d) String
Answers (261 - 279)
8. CDbl function converts String to
type.
1. (a) 2. (b) 3. (c) 4. (a)
(a) Integer (b) Double
5. (b) 6. (c) 7. (d) 8. (b)
(c) Single (d) String
9. (a) 10. (c) 11. (a) 12. (b)
9. In VBA, CInt function converts String to
13. (c) 14. (a) 15. (d) 16. (b)

type.
17. (a) 18. (d) 19. (c)
(a) Integer (b) Double
(c) Single (d) String

10. In VBA, Csng function converts String 2.3 Data types in VBA
to type.
1. data type in VBA stores true or
(a) Integer (b) Double
false values.
(c) Single (d) String
(a) Boolean (b) Integer
11. In VBA, Val function converts String to (c) Byte (d) Long
type. 2. Boolean data type in VBA has size of
(a) number (b) byte .
(c) Currency (d) Decimal

Author: Dr.V.Nagaradjane
20 2.3. DATA TYPES IN VBA

(a)1 byte (b) 2bytes 12. Double data type in VBA can store values
(c)3 bytes (d) 4bytes
in the range of .
3. Byte data type in VBA has size of
. (a) 1:79769313486232E308 to
(a) 1 byte (b) 2bytes 4:94065645841247E324
(b) -32,768 to +32,767
(c) 3 bytes (d) 4bytes
(c) -2,147,483,648 to +2,147,483,647
4. Byte in VBA can store values in the range (d) 3:402823E38 to 1:401298E45
of .
(a) 0 to 255 13. Integer data type in VBA has size of
.
(b) -922,337,203,685,477.5808 to +-
(a) 14 bytes (b) 8 bytes
922,337,203,685,477.5807
(c) 01-Jan-100 to 31-Dec-9999 (c) 4 bytes (d) 2 bytes
(d) 79; 228; 162; 514; 264; 337; 593; 543; 950; 335 14. Integer data type in VBA can store values
or 7:9228162514264337593543950335 in the range of .
5. Currency data type in VBA has size of (a) 1:79769313486232E308 to
. 4:94065645841247E324
(a) 2 bytes (b) 3 bytes (b) -32,768 to +32,767
(c) 4 bytes (d) 8 bytes (c) -2,147,483,648 to +2,147,483,647
6. Currency data type in VBA can store val- (d) 3:402823E38 to 1:401298E45
ues in the range of . 15. Long data type in VBA has size of
(a) 0 to 255 .
(b) -922,337,203,685,477.5808 to +- (a) 14 bytes (b) 8bytes
922,337,203,685,477.5807 (c) 4 bytes (d) 2bytes
(c) 01-Jan-100 to 31-Dec-9999 16. Long data type in VBA can store values
(d) 79; 228; 162; 514; 264; 337; 593; 543; 950; 335 in the range of .
or 7:9228162514264337593543950335 (a) 1:79769313486232E308 to
7. Date data type in VBA has size of 4:94065645841247E324
. (b) -32,768 to +32,767
(a) 2 bytes (b) 3 bytes (c) -2,147,483,648 to +2,147,483,647
(c) 4 bytes (d) 8 bytes (d) 3:402823E38 to 1:401298E45
8. Date data type in VBA can store values 17. Single data type in VBA has size of
in the range of . .
(a) 0 to 255 (a) 14 bytes (b) 8bytes
(b) -922,337,203,685,477.5808 to +- (c) 4 bytes (d) 2bytes
922,337,203,685,477.5807 18. Single data type in VBA can store values
(c) 01-Jan-100 to 31-Dec-9999 in the range of .
(d) 79; 228; 162; 514; 264; 337; 593; 543; 950; 335 (a) 1:79769313486232E308 to
or 7:9228162514264337593543950335 4:94065645841247E324
9. Decimal data type in VBA has size of (b) -32,768 to +32,767
. (c) -2,147,483,648 to +2,147,483,647
(a) 14 bytes (b) 8 bytes (d) 3:402823E38 to 1:401298E45
(c) 4 bytes (d) 2 bytes
19. Object data type in VBA has size of
10. Decimal data type in VBA can store val- .
ues in the range of . (a) 14 bytes (b) 8 bytes
(a) 0 to 255 (c) 4 bytes (d) 2 bytes
(b) -922,337,203,685,477.5808 to +- 20. String data type in VBA has size of
922,337,203,685,477.5807 .
(c) 01-Jan-100 to 31-Dec-9999 (a) 14 bytes
(d) 79; 228; 162; 514; 264; 337; 593; 543; 950; 335 (b) 10+length of string bytes
or 7:9228162514264337593543950335 (c) 4 bytes
11. Double data type in VBA has size of (d) 2 bytes
.
(a) 14 bytes (b) 8 bytes 21. String data type in VBA can store a max-
(c) 4 bytes (d) 2 bytes imum of characters.
(a) 65,400

Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 21

(b) 32,767 (a) 3*2


(c) 2,147,483,648 ^
(b) 2 4
(d) 100 (c) 5/2
22. Variant data type in VBA has size of (d) 3%2
.
(a) 14 bytes
(b) 10+length of string bytes Answers (303 - 308)
(c) 16 or 22+length in bytes
(d) 2 bytes 1. (d) 2. (d) 3. (a) 4. (d)
23. Variant data type can store .
5. (a) 6. (b)
(a) String larger than 65,400 characters in length
(b) number larger than Double
(c) both a & b
2.5 Comparison operators in
(d) none of them VBA
^
3*2+5/2+3%2*2 4
Answers (280 - 302)
1. (a) 2. (b) 3. (a) 4. (a)
5. (d) 6. (b) 7. (d) 8. (c)
9. (a) 10. (d) 11. (b) 12. (a)
13. (d) 14. (b) 15. (c) 16. (c)
17. (c) 18. (d) 19. (c) 20. (b)
21. (a) 22. (c) 23. (c)

2.4 Arithmetic operators in


VBA

1. The arithmetic operator in VBA


takes the highest precedence.
(a) % (b) +
(c) - (d) ^

2. The arithmetic operator in VBA


calcualtes power of a number.
(a) % (b) +
(c) - (d) ^

3. The arithmetic operator in VBA


^
has precedence after the operator.
(a) % (b) +
(c) - (d) /

4. The arithmetic operator in VBA


has precedence after the % operator.
(a) * (b) +
(c) - (d) /

5. The arithmetic operator in VBA


has precedence after the / operator.
(a) * (b) +
(c) - (d) none of them
6. In the following expression, nd out the
rst operation:
the left side is less than or equal the right
1. operator in VBA returns true if side.
the left and sides are equal. (a) <= (b) >=
(a) = (b) <> (c) < (d) >
(c) < (d) >
6. operator in VBA returns true if
2. operator in VBA returns true if the left side is greater than or equal to
the left and sides are not equal. the right side.
(a) = (b) <> (a) <= (b) >=
(c) < (d) > (c) < (d) >
7. What would be the result of the
3. operator in VBA returns true if following comparison?:
the left side is less than the right side. 5<3
(a) = (b) <> (a) true
(c) < (d) > (b) false
(c) neither true nor false
4. operator in VBA returns true if (d) both true and false
the left side is greater than the right side.
(a) = (b) <> 8. What would be the result of the
following comparison?:
(c) < (d) >
5>3
(a) true
5. operator in VBA returns true if

Author: Dr.V.Nagaradjane
22 2.6. CONCATENATION OPERATORS IN VBA

(b) false
(c) neither true nor false 3. In VBA, using operator for
(d) both true and false concatenation results concatenation of
Strings, irrespective of numeric or alpha-
9. What would be the result of the
numeric value stored in the Strings.
following comparison?: (a) & (b) $
5=3
(a) true (c) # (d) +
(b) false 4. Choose the result of the following VBA
(c) neither true nor false expression:
(d) both true and false x = "20" + "32"
(a) 2032 (b) 52
10. What would be the result of the
(c) 3220 (d) ""
following comparison?:
5 <= 3 5. Choose the result of the following VBA
(a) true expression:
(b) false Choose the result of the following
(c) neither true nor false VBA expression:
(d) both true and false x = "20" & "32"
(a) 2032 (b) 52
11. What would be the result of the
(c) 3220 (d) ""
following comparison?:
5 >= 3 6. Choose the result of the following VBA
(a) true expression:
(b) false x = "Hi, " + "how are you?"
(c) neither true nor false (a) "how are you, Hi?"
(d) both true and false (b) "Hi: how are you"
12. What would be the result of the (c) "Hi, how are you?"
following comparison?: (d) "Hi?"
5=3 7. Choose the result of the following VBA
(a) true expression:
(b) false x = "Hi, " & "how are you?"
(c) neither true nor false (a) "how are you, Hi?"
(d) both true and false (b) "Hi: how are you"
(c) "Hi, how are you?"
(d) "Hi?"
Answers (309 - 320)
1. (a) 2. (b) 3. (c) 4. (d) Answers (321 - 327)
5. (a) 6. (b) 7. (b) 8. (a)
9. (b) 10. (b) 11. (a) 12. (b) 1. (a) 2. (d) 3. (a) 4. (b)
5. (a) 6. (c) 7. (c)

2.6 Concatenation operators in 2.7 Logical operators in VBA


VBA
1. The operators in VBA which combine the
results of several comparisons are
1. and are the two con- called operators.
catenation operators available in VBA. (a) logical
(a) + and & (b) @ and % (b) arithmetical
(c) * and ! (d) # and $ (c) mathematical
(d) concatenation
2. In VBA, using operator
for concatenation results in addition if 2. The operator in VBA returns true only
Strings have numeric value and concate- if both sides of the operator are true.
nation if Strings have alphanumeric value.
(a) & (b) $
(c) # (d) +
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 23

(a) OR (b) AND Answers (328 - 338)


(c) NOT (d) XOR
1. (a) 2. (b) 3. (c) 4. (a)
3. The operator in VBA returns 5. (d) 6. (a) 7. (b) 8. (a)
true only if given comparison is false. 9. (b) 10. (b) 11. (a)
(a) OR (b) AND
(c) NOT (d) XOR
2.8 Bitwise operators in VBA
4. The operator in VBA returns
true if atleast one of the 2 expressions is 1. operators in VBA compare the
true.
(a) OR (b) AND corresponding bits of numbers to
arrive a result.
(c) NOT (d) XOR a
r
5. The operator in VBA returns i
true if only one of the 2 comparisons is t
true. h
(a) OR (b) AND l m
(c) NOT (d) XOR o e
g t
6. The expression in VBA (5<3) AND (4 i i
> 2) results in . ( c c
(a) true aa (b
a
(b) false ) l )l
(c) neither true nor false m
(d) both true and false a
t
7. The expression in VBA (5<3) OR
h
(4>2) results in .
e
(a) true
m b
(b) false
a i
(c) neither true nor false t t
(d) both true and false i w
8. The expression in VBA (5<3) XOR ( c i
(4>2) results in . ca (d
s
(a) true ) l )e
(b) false T o
(c) neither true nor false 2h p
(d) both true and false . e e
9. The expression in VBA (5>3) XOR 1 only if both bits are 1. r
(4>2) results in . ( A
(a) true aO (b
N
(b) false ) R )D
( N X
(c) neither true nor false
cO (d
O
(d) both true and false
) T )R
10. The expression in VBA NOT (4>2) re- 3T o
sults in . . h p
(a) true e e
(b) false r
(c) neither true nor false a
(d) both true and false t
11. The expression in VBA NOT (4<2) re- o
sults in . r
(a) true r
(b) false e
(c) neither true nor false t
(d) both true and false u
given bit is 0 and returns 0 if given bit
i
s
1
.
( A
aO (b
N
)R )D
(N X
cO (d
O
)T )R
T
4h one of the two bits is 1 and the other one
. e i
s
0
.
( A
aO (b
N
) R )D
( N X
cO (d
O
) T )R
o 6. The expression in VBA 5 AND 3 (101
p AND 11) results in .
e (a) 1 (b) 3
r (c) 5 (d) 7
a 7. The expression in VBA 5 OR 3 (101 OR
t 11) results in .
o (a) 1 (b) 3
r (c) 5 (d) 7
r 8. The expression in VBA Dim x as Byte
e x=3
least one of the bits is 1. t NOT x results in .
( A u (a) 11111100 or 252
aO (b
N r (b) 00000011 or 3
)R )D n (c) neither a nor b
(N X s (d) both a & b
cO (d
O
9. The expression in VBA 5 XOR 3 (101
)T )R 1 XOR 011) results in .
T o
(a) 1 (b) 3
5h p i
(c) 6 (d) 7
. e e f
r a
a t
Author: Dr.V.Nagaradjane
24 2.9. MATHEMATICAL FUNCTIONS IN VBA

Answers (339 - 347)


11. function in VBA returns the
1. (d) 2. (b) 3. (c) 4. (a) sign (+ or ) symbol of given number.
5. (d) 6. (a) 7. (d) 8. (a) (a) SIN (b) RND
9. (c) (c) RANDOMIZE (d) SGN

12. function in VBA returns a ran-


2.9 Mathematical functions in dom number.
(a) SIN (b) RND
VBA (c) RANDOMIZE (d) SGN

13. function in VBA rounds the


1. function in VBA returns pos- given number to the nearest integer
itive value of a number, irrespective of value.
whether the input is positive or negative. (a) ROUND (b) SQR
(a) ABS (b) ATN (c) TAN (d) SGN
(c) COS (d) EXP
14. function in VBA returns tan-
2. function in VBA returns the gent value of given number.
cosine value of given number. (a) ROUND (b) SQR
(a) ABS (b) ATN (c) TAN (d) SGN
(c) COS (d) EXP
15. function in VBA returns
3. function in VBA returns arc square root of given number.
1
tangent (tan ) of given input. (a) ROUND (b) SQR
(a) ABS (b) ATN (c) TAN (d) SGN
(c) COS (d) EXP 16. What is the result of the following
expression in VBA?:
4. function in VBA returns expo- FORMAT(25.32864,"##,##,000.00")
nential value of given input. (a) 025.32864 (b) 25.3286
(a) ABS (b) ATN (c) 00,00,025.33 (d) 025.33
(c) COS (d) EXP

5. function in VBA returns inte- Answers (348 - 363)


ger part of given input.
(a) FIX (b) FORMAT 1. (a) 2. (c) 3. (b) 4. (d)
(c) INT (d) LOG 5. (a) 6. (c) 7. (d) 8. (b)
9. (c) 10. (a) 11. (d) 12. (b)
6. function in VBA returns inte-
ger portion of given input. 13. (a) 14. (c) 15. (b) 16. (d)
(a) FIX (b) FORMAT
(c) INT (d) LOG value of given number.
(a) SIN (b) RND
7. function in VBA returns loga- (c) RANDOMIZE (d) SGN
rithm of given number to speci ed base.
(a) FIX (b) FORMAT
(c) INT (d) LOG

8. function in VBA returns for-


matted version of given number (the for-
mat being speci ed by 0 and #).
(a) FIX (b) FORMAT
(c) INT (d) LOG

9. function in VBA initializes


random seed.
(a) SIN (b) RND
(c) RANDOMIZE (d) SGN

10. function in VBA returns sine


2.10 String functions in VBA catenated new string from given String
values.
(a) ASC (b) CHR
1. function in VBA returns the (c) & (d) INSTR
numeric value of given character in the 3. function in VBA returns charac-
American Standard Code of Information ter value of given numeric value.
Interchange (ASCII) system. (a) ASC (b) CHR
(a) ASC (b) CHR
(c) & (d) INSTR
2. function in VBA returns con-
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 25

(c) & (d) INSTR (a) MID (b) REPLACE


(c) SPACE (d) STR
4. function in VBA returns loca- 16. function in VBA returns speci-
tion at which the second string occurs
ed number of spaces.
within the rst string.
(a) ASC (b) CHR (a) MID (b) REPLACE
(c) & (d) INSTR (c) SPACE (d) STR
5. function in VBA returns last lo- 17. function in VBA converts given
cation at which the second string occurs number to string.
within the rst string. (a) MID (b) REPLACE
(a) INSTRREV (b) LCASE (c) SPACE (d) STR
(c) LEFT (d) RIGHT 18. function in VBA compares given
strings, returns -1 if the rst string is smaller than the
6. function in VBA returns lower- second string, 0 if both are equal and 1 if the rst is
case version of given string. greater than
(a) INSTRREV (b) LCASE the second string.
(c) LEFT (d) RIGHT (a) STRCOMP (b) STRCONV
7. function in VBA returns upper- (c) STRREVERSE (d) VAL
case version of given string.
19. function in VBA converts given
(a) INSTRREV (b) LCASE
string to uppercase, lowercase, proper-
(c) LEFT (d) UCASE
case, or unicode.
8. function in VBA returns given (a) STRCOMP (b) STRCONV
number of characters counted from the (c) STRREVERSE (d) VAL
left of the string. 20. function in VBA reverses given
(a) INSTRREV (b) LCASE string.
(c) LEFT (d) RIGHT (a) STRCOMP (b) STRCONV
(c) STRREVERSE (d) VAL
9. function in VBA returns given
21. function in VBA returns nu-
number of characters counted from the
meric value of string.
right of the string.
(a) STRCOMP (b) STRCONV
(a) INSTRREV (b) LCASE
(c) LEFT (d) RIGHT (c) STRREVERSE (d) VAL
10. function in VBA returns length
of given string. Answers (364 - 384)
(a) LEN (b) LTRIM
(c) RTRIM (d) TRIM 1. (a) 2. (c) 3. (b) 4. (d)
11. function in VBA removes white 5. (a) 6. (b) 7. (d) 8. (c)
spaces from the left end of given string. 9. (d) 10. (a) 11. (b) 12. (c)
(a) LEN (b) LTRIM 13. (d) 14. (a) 15. (b) 16. (c)
(c) RTRIM (d) TRIM 17. (d) 18. (a) 19. (b) 20. (c)
12. function in VBA removes white 21. (d)
spaces from the right end of given string.
(a) LEN (b) LTRIM
(c) RTRIM (d) TRIM
13.
spaces from both left and right ends of
given string.

(a) LEN (b) LTRIM 1. function in VBA returns today's


(c) RTRIM (d) TRIM date.
(a) Date (b) DATEADD

14. function in VBA extracts a sub-


(c) DATEDIFF (d) DATEPART
string from given start character for spec-
2. function in VBA returns part of
i ed count of characters.
(a) MID (b) REPLACE a date (YYYY for year, MM for month
(c) SPACE (d) STR and DD for day of month).
15. function in VBA nds given string and replaces it with another.
Author: Dr.V.Nagaradjane
26 2.12. ARRAYS IN VBA

(a) Date (b) DATEADD 14. function in VBA returns current


(c) DATEDIFF (d) DATEPART time.
3. function in VBA returns di er-
(a) NOW (b) TIMESERIAL
ence between two dates in speci ed unit (YYYY for
(c) TIMEVALUE (d) WEEKDAY
years, MM for months and DD 15. function in VBA returns time
for days). from hour, minute and second values.
(a) Date (b) DATEADD (a) NOW (b) TIMESERIAL
(c) DATEDIFF (d) DATEPART (c) TIMEVALUE (d) WEEKDAY
4. function in VBA adds given du- 16. function in VBA converts a string
ration to the speci ed date (YYYY for to time object.
years, MM for months and DD for days). (a) NOW (b) TIMESERIAL
(a) Date (b) DATEADD (c) TIMEVALUE (d) WEEKDAY
(c) DATEDIFF (d) DATEPART 17. function in VBA returns day of
5. function in VBA converts given week.
day of month, month and year values to (a) NOW (b) TIMESERIAL
date object. (c) TIMEVALUE (d) WEEKDAY
(a) DATESERIAL (b) DATEVALUE 18. function in
VBA returns name of
(c) DAY (d) FORMAT (b) TIMESERIAL
the day of week.
6. function in VBA converts a string (d) WEEKDAYNAME
(a) NOW
value to date. (c) TIMEVALUE
(a) DATESERIAL (b) DATEVALUE
(c) DAY (d) FORMAT
7. function in VBA returns day of Answers (385 - 402)
month from given date.
(a) DATESERIAL (b) DATEVALUE 1. (a) 2. (d) 3. (c) 4. (b)
(c) DAY (d) FORMAT 5. (a) 6. (b) 7. (c) 8. (d)
8. function in VBA returns format- 9. (a) 10. (b) 11. (c) 12. (d)
ted date object based on given string. 13. (a) 14. (a) 15. (b) 16. (c)
(a) DATESERIAL (b) DATEVALUE 17. (d) 18. (d)
(c) DAY (d) FORMAT

9. function in VBA returns month 2.12 Arrays in VBA


number from given date.
(a) MONTH (b) MONTHNAME 1. Variables which can be accessed using in-
(c) HOUR (d) MINUTE dex values (from 0 to given number) are
10. function in VBA returns name of called .
month from given date. (a) Array (b) Integer
(a) MONTH (b) MONTHNAME (c) Double (d) Single
(c) HOUR (d) MINUTE
2. Arrays can be created by .
11. function in VBA returns hour of
(a) declaring array with a size
day for given time.
(b) declaring array without size but populating
(a) MONTH (b) MONTHNAME
it to desired size
(c) HOUR (d) MINUTE (c) resizing array using REDIM command
12. function in VBA returns minute (d) all of them
of hour for given time. 3. The following declaration creates an array
(a) MONTH (b) MONTHNAME having number of elements.
(c) HOUR (d) MINUTE Dim a(3)
13. function in VBA returns year (a) 3 values indexed from 0 to 2
number from given date object. (b) 4 values indexed from 0 to 3
(a) YEAR (b) MONTHNAME (c) 3 values indexed from 1 to 3
(c) HOUR (d) MINUTE (d) 0 values indexed 0
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 27

4. From the following VBA code, select the (a) ISARRAY (b) FILTER
correct statement from given choices: Dim a(1) (c) ERASE (d) none of them
a(0)=10 14. function in VBA removes all ele-
a(1)=20 ments of an array.
REDIM PRESERVE a(2) (a) ISARRAY (b) FILTER
a(2)=30 (c) ERASE (d) none of them
(a) declares an array a with 2 elements
(b) assigns 10 and 20 at indices 0 and 1
(c) resizes the array to have 3 elements and Answers (403 - 416)
assigns 30 to array index 2
(d) all of them 1. (a) 2. (d) 3. (b) 4. (d)
5. A matrix can be represented using a 5. (b) 6. (b) 7. (c) 8. (a)
9. (b) 10. (c) 11. (d) 12. (b)
dimensional array in VBA. 13. (a) 14. (c)
(a) 1 (b) 2
(c) 3 (d) 4
6. The following VBA statement declares a 2.13 Conditions in VBA
dimensional array.
Dim a(3,4)
(a) 1 (b) 2 1. and are the conditional
statements available in VBA.
(c) 3 (d) 4 (a) IF ... Then and Select Case
(b) For and While
7. keyword in VBA causes previ-
(c) Do While and Do Until
ous elements of array to be kept in the
(d) none of them
new array.
(a) NEW (b) DIM 2. IF condition in VBA ends with
(c) PRESERVE (d) NEXT statement.
(a) ElseIf (b) End If
8. function in VBA returns the
(c) Else (d) Then
smallest index for given array.
(a) LBOUND (b) UBOUND 3. The line containing IF ends with
(c) SPLIT (d) JOIN keyword.
9. function in VBA returns the (a) ElseIf (b) End If
largest index for given array. (c) Else (d) Then
(a) LBOUND (b) UBOUND 4. Several successive conditions may be
(c) SPLIT (d) JOIN checked using statement of IF
condition.
10. function in VBA divides a string into (a) ElseIf (b) End If
an array at the occurrence of speci- (c) Else (d) Then
ed substring.
(a) LBOUND (b) UBOUND 5. In case none of the conditions in an IF
(c) SPLIT (d) JOIN ladder is ful lled, statements in
block are executed.
11. function in VBA joins elements of an (a) ElseIf (b) End If
array and creates a string with spec- (c) Else (d) Then
i ed separator.
6. In the following VBA code, nd out the
(a) LBOUND (b) UBOUND
possible bug/error:
(c) SPLIT (d) JOIN
Dim x as Integer
12. function in VBA returns ele-ments x=5
which ful ll certrain search crite- If x < 5
rion. End If
(a) ISARRAY (b) FILTER (a) End If is missing
(c) ERASE (d) none of them (b) Then keyword is missing at the end of If
13. function in VBA returns true if the (c) The condition in If statement is incorrect
argument is an array. (d) none of them
Author: Dr.V.Nagaradjane
28 2.14. LOOPS IN VBA

(a) Step (b) To


7. condition takes a value and (c) Next (d) Each
compares it against several Case state-
ments. 4. For loop ends with .
(a) Case (b) Select Case (a) Step (b) To
(c) End Select (d) Case Else (c) Next (d) Each
8. Select Case condition ends with
statement. 5. loop in VBA takes each ele-
(a) Case (b) Select ment of an array one by one.
(c) End Select (d) Case Else (a) For (b) For Each
(c) While (d) Do While
9. condition is matched if none
6. While loop in VBA ends with
of the Case conditions of Select Case is
matched. statement.
(a) Case (b) Select (a) End (b) Loop
(c) End Select (d) Case Else (c) Next (d) Wend
7. Do While loop in VBA ends with
10. What would be the value of y after
the execution of the following VBA code: statement.
(a) End (b) Loop
Dim x, y as Integer
(c) Next (d) Wend
x=5
Select Case 8. Do While statement executes till the
x Case 0 given condition is .
(a) false
y = 10
Case 1 (b) true
y=20 Case (c) both true and false
2 y=30 (d) neither true nor false
Case Else 9. Do Until statement executes till the given
y=100 End condition is .
Select (a) false
(b) true
(c) both true and false
(a) 10 (b) 20 (d) neither true nor false
(c) 30 (d) 100 10. Do Until loop in VBA ends with
statement.
(a) End (b) Loop
Answers (417 - 426) (c) Next (d) Wend
1. (a) 2. (b) 3. (d) 4. (a)
5. (c) 6. (b) 7. (b) 8. (c) Answers (427 - 436)
9. (d) 10. (d)
1. (d) 2. (b) 3. (a) 4. (c)
5. (b) 6. (d) 7. (b) 8. (b)
2.14 Loops in VBA 9. (a) 10. (b)

1. is the loop available in VBA.


(a) For and While 2.15 Message Box in VBA
(b) Do While and Do Until
(c) For Each
(d) all of them 1. function in VBA displays a
message box.
2. For statement uses to specify the (a) MsgBox (b) InputBox
upper limit of index. (c) Box (d) Message
(a) Step (b) To 2. MsgBox function in VBA takes a
(c) Next (d) Each
as the rst and mandatory pa-
3. For statement uses to specify the rameter.
increment to index value. (a) String (b) Integer
(c) Double (d) Long
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 29

3. The second parameter of MsgBox in VBA (d) vbQuestion


11. MsgBox may be provided the option
is to control the buttons of the
to display a warning query.
dialog. (a) vbYesNo
(a) Integer (b) Long
(b) vbRetryCancel
(c) Single (d) Double
(c) vbCritical
4. MsgBox may be provided the option (d) vbQuestion
to display only the OK button.
12. MsgBox may be provided the option
(a) vbYesNoCancel
to display an exclamation mes-
(b) vbAbortRetryIgnore
(c) vbOKCancel sage.
(a) vbExclamation
(d) vbOKOnly
(b) vbInformation
5. MsgBox may be provided the option (c) vbDefaultButton1
to display the OK and Cancel (d) vbDefaultButton2
buttons.
(a) vbYesNoCancel 13. MsgBox may be provided the option
(b) vbAbortRetryIgnore to display an information mes-
(c) vbOKCancel sage.
(d) vbOKOnly (a) vbExclamation
(b) vbInformation
6. MsgBox may be provided the option to
(c) vbDefaultButton1
display the Yes, No and Can-
(d) vbDefaultButton2
cel buttons.
(a) vbYesNoCancel 14. MsgBox may be provided the option
(b) vbAbortRetryIgnore to keep the rst button as the
(c) vbOKCancel default button.
(d) vbOKOnly (a) vbDefaultButton1
(b) vbDefaultButton2
7. MsgBox may be provided the option to
(c) vbDefaultButton3
display the Abort, Retry and
(d) vbDefaultButton4
Ignore buttons.
(a) vbYesNoCancel 15. MsgBox may be provided the option
(b) vbAbortRetryIgnore to keep the second button
(c) vbOKCancel as the default button.
(d) vbOKOnly (a) vbDefaultButton1
(b) vbDefaultButton2
8. MsgBox may be provided the option
(c) vbDefaultButton3
to display the Yes and No but-
(d) vbDefaultButton4
tons.
(a) vbYesNo 16. MsgBox may be provided the option to
(b) vbRetryCancel keep the third button as the
(c) vbCritical default button.
(d) vbQuestion (a) vbDefaultButton1
(b) vbDefaultButton2
9. MsgBox may be provided the option to
(c) vbDefaultButton3
display the Retry and Cancel
(d) vbDefaultButton4
buttons.
(a) vbYesNo 17. MsgBox may be provided the option
(b) vbRetryCancel to keep the fourth button as
(c) vbCritical the default button.
(d) vbQuestion (a) vbDefaultButton1
(b) vbDefaultButton2
10. MsgBox may be provided the option to
(c) vbDefaultButton3
display critical error mes-
(d) vbDefaultButton4
sage.
(a) vbYesNo 18. value in MsgBox function of
(b) vbRetryCancel VBA checks whether OK button was clicked.
(c) vbCritical
Author: Dr.V.Nagaradjane
30 2.16. INPUT BOX IN VBA

(a) vbOK (b) VKCancel 2.17 Creating function in VBA


(c) vbAbort (d) vbRetry
19. value in MsgBox function of
VBA checks whether Cancel button 1. A function begins with keyword.
was clicked. (a) Function (b) End Function
(a) vbOK (b) VKCancel (c) return (d) none of them
(c) vbAbort (d) vbRetry
2. A function ends with statement.
20. value in MsgBox function of (a) Function (b) End Function
VBA checks whether Abort button was
(c) return (d) none of them
clicked.
(a) vbOK (b) VKCancel 3. The return value of a function is assigned
(c) vbAbort (d) vbRetry to variable named .
(a) something other than the name of the function
21. value in MsgBox function of (b) exactly matching the name of the function
VBA checks whether Retry button was (c) return
clicked.
(d) end
(a) vbOK (b) VKCancel
(c) vbAbort (d) vbRetry 4. Unlike subroutines or procedures, func-
tion can a value.
(a) return (b) nullify
(c) add (d) subtract
Answers (437 - 457) 5. In a VBA project, inserting a
helps to create new function.
1. (a) 2. (a) 3. (a) 4. (d) (a) UserForm (b) Class Module
5. (c) 6. (a) 7. (b) 8. (a) (c) Module (d) none of them
9. (b) 10. (c) 11. (d) 12. (a)
13. (b) 14. (a) 15. (b) 16. (c)
17. (d) 18. (a) 19. (b) 20. (c) Answers (461 - 465)
21. (d)
1. (a) 2. (b) 3. (b) 4. (a)
5. (c)
2.16 Input box in VBA
1. Input box in VBA can be displayed using
2.18 Creating Subroutines in
function. VBA
(a) MsgBox (b) InputBox
(c) box (d) none of them
2. The rst parameter of InputBox is 1. A subroutine begins with key-
for the input dialog. word.
(a) prompt message (a) Function (b) End Function
(b) title of dialog (c) return (d) Sub
(c) both a & b
(d) neither a nor b 2. A subroutine ends with state-
ment.
3. The second parameter of InputBox is (a) Function (b) End Sub
for the input dialog. (c) return (d) none of them
(a) prompt message
(b) title of dialog 3. Subroutines are otherwise called .
(c) both a & b (a) procedures (b) conditions
(d) neither a nor b (c) loops (d) none of them

4. Subroutines return a value.


Answers (458 - 460) (a) do not
(b) do
1. (b) 2. (a) 3. (b) (c) may or may not
(d) none of them
5. In a VBA project, are handled using subroutines.

Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 31

(a) GUI events


(b) all computations 4. VBA supports keyword for access
(c) all variables control.
(a) Private (b) Public
(d) none of them
(c) both a & b (d) none of them
5. A property in VBA can be assigned new
Answers (466 - 470)
value through keyword.
1. (d) 2. (b) 3. (a) 4. (a) (a) Set (b) Let
5. (a) (c) Get (d) none of them
6. The value of a property can be obtained
using keyword.
2.19 Creating macros in VBA (a) Set (b) Let
(c) Get (d) none of them
1. A piece of code automatically generated 7. The variable declared using a new class
by an MS O ce program based on the
actions of user is called . can be initialized using keyword.
(a) fucntion (b) subroutine (a) Set (b) Let
(c) macro (d) micro (c) Get (d) none of them
2. Macro can be recorded using 8. Find the name of the property created
icon in the View menu. us-ing the following lines of VBA code: Private
(a) macro (b) micro s as Integer
(c) Font (d) Paragraph Public Property Let Score(x as Inte-
3. Code for macros is recorded in ger)
language. s=x
(a) C (b) C++ End Property
(c) Java (d) VBA Public Property Get Score() as Inte-
ger
Score = s
Answers (471 - 473) End Property
(a) s (b) Let
1. (c) 2. (a) 3. (d) (c) Get (d) Score

2.20Object Oriented Pro- Answers (474 - 481)


gramming System 1. (b) 2. (a) 3. (d) 4. (c)
(OOPS) through VBA 5. (b) 6. (c) 7. (a) 8. (d)

1. A class can be created by inserting


in a VBA project. 2.21 Event driven program-
(a) UserForm (b) class module
(c) module (d) none of them
ming in VBA
2. Class name in a VBA project can be 1. GUI stands for .
changed through . (a) General User Interface
(a) Name property in properties window
(b) Graphical Unity Interface
(b) UserForm
(c) Graphical User Interface
(c) Module
(d) Graphical User Interaction
(d) none of them
2. GUI supports visual components like
3. Class in VBA supports of Ob- CommandButton, Label, TexBox, Com-boBox,
ject Oriented Programming System. OptionBox, MultiPage, List, etc.
(a) Property (b) Function
(c) Subroutine (d) all of them which generate on user interac-
tion.
(a) events (b) properties
(c) functions (d) subroutines
Author: Dr.V.Nagaradjane
32 2.22. GUI COMPONENTS IN VBA

3. Events wait like hidden armoury until a (d) TextBox


occurs. 7. is creates an input box with a tick
(a) packing (b) trigger
mark.
(c) cleaning (d) deletion (a) CheckBox (b) OptionBox
4. Events red from components are han- (c) List (d) ToggleButton
dled by linked to those
events. 8. is creates a box with a circular dot,
(a) functions (b) properties which can be receives tick only if all
(c) variables (d) subroutines related boxes become switched o .
(a) CheckBox (b) OptionBox
(c) List (d) ToggleButton
Answers (482 - 485) 9. is creates a box with a triangular
button, clicking which displays a
1. (c) 2. (a) 3. (b) 4. (d) number of input values.
(a) ComboBox (b) OptionBox
(c) List (d) ToggleButton
2.22 GUI components in VBA 10. is creates a box with a scrollable
list containing a number of input values.
1. A large window which supports place-
(a) ComboBox (b) OptionBox
ment of other components on its surface
(c) List (d) ToggleButton
is called .
(a) CommandButton 11. is creates a control which remains
(b) Label pressed or released after each click.
(c) UserForm (a) ComboBox (b) OptionBox
(d) TextBox (c) List (d) ToggleButton
2. The member supports Run from Run 12. is creates controls help to create
menu of VBA IDE. sets of components which can be brought
(a) CommandButton to view by clicking a button at top.
(b) Label (a) TabStrip
(c) UserForm (b) MultiPage
(d) TextBox (c) both a & b
(d) neither a nor b
3. UserForm supports for control 13. control can be used to set nu-
of its window. meric values in other components.
(a) maximize (b) iconify
(a) SpinBox (b) Image
(c) close/ exit (d) all of them
(c) RefEdit (d) Label
4. is suitable to start computation
14. control can be used to display
after collecting required input data for
an image.
processing.
(a) CommandButton (a) SpinBox (b) Image
(b) Label (c) RefEdit (d) Label
(c) UserForm 15. control can be used to select
(d) TextBox a range from the spreadsheet when
5. is suitable to display a prompt the VBA program runs.
message to collect input data. (a) SpinBox (b) Image
(a) CommandButton (c) RefEdit (d) Label
(b) Label
(c) UserForm
(d) TextBox Answers (486 - 500)
6. is suitable to collect text input 1. (c) 2. (c) 3. (d) 4. (a)
from the user. 5. (b) 6. (d) 7. (a) 8. (b)
(a) CommandButton
9. (a) 10. (c) 11. (d) 12. (c)
(b) Label
13. (a) 14. (b) 15. (c)
(c) UserForm

Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 33

2.23 Properties for VBA con- 6. When a VBA control is deactivated, it


trols generates event.
(a) DblClick (b) Deactivate
1. Properties window can be displayed by (c) Error (d) Click
.
7. When a VBA control is encounters some
(a) choosing View >Properties error, it generates event.
(b) pressing Alt+V+W (a) DblClick (b) Deactivate
(c) pressing F4 (c) Error (d) Click
(d) all of them
8. When a VBA control is initilized, it gen-
2. Properties window can be accessed by erates event.
(a) Initialize (b) KeyDown
placing a after the name of a (c) KeyPress (d) KeyUp
variable.
(a) dot (.) (b) $ 9. When a key in the keyboard is pressed with
(c) # (d) ^ focus on a VBA control, it generates
event.
(a) Initialize (b) KeyDown
Answers (501 - 502) (c) KeyPress (d) KeyUp
10. When a key in the keyboard is pushed
1. (d) 2. (a) down with focus on a VBA control, it
generates event.
(a) Initialize (b) KeyDown
2.24 Events associated with (c) KeyPress (d) KeyUp
VBA controls 11. When a key in the keyboard is released
with focus on a VBA control, it
1. When a UserForm gets ready, generates event.
event is red. (a) Initialize (b) KeyDown
(a) Activate (c) KeyPress (d) KeyUp
(b) BeforeDragOver 12. When mouse button is pushed down on a
(c) BeforeDropOrPaste
(d) Click VBA component, event is gener-
ated.
2. When content is about to be dragged (a) MouseDown (b) MouseMove
over a VBA control, it gets event. (c) MouseUp (d) QueryClose
(a) Activate
(b) BeforeDragOver 13. When mouse moves over a VBA compo-
nent, event is generated.
(c) BeforeDropOrPaste
(a) MouseDown (b) MouseMove
(d) Click
(c) MouseUp (d) QueryClose
3. When some content is about to be droped
14. When mouse button is released after
or pasted on a VBA control, it gets
clicking a VBA component,
event.
(a) Activate event is generated.
(b) BeforeDragOver (a) MouseDown
(c) BeforeDropOrPaste (c) MouseUp
(d) Click 15. When query closes, the UserForm in VBA
receives event.
4. When a VBA control is clicked, it gener- (a) MouseDown (b) MouseMove
ates event.
(a) Activate (c) MouseUp (d) QueryClose
(b) BeforeDragOver
(c) BeforeDropOrPaste
(d) Click
Answers (503 - 517)
5. When a VBA control is double clicked, it 1. (a) 2. (b) 3. (c) 4. (d)
5. (a) 6. (b) 7. (c) 8. (a)
generates event. 9. (c) 10. (b) 11. (d) 12. (a)
(a) DblClick (b) Deactivate
(c) Error (d) Click 13. (b) 14. (c) 15. (d)
Author: Dr.V.Nagaradjane
34 2.25. ACTIVEX DATA OBJECTS IN VBA

2.25 ActiveX data objects in 5. (a) 6. (b) 7. (a) 8. (b)


VBA
2.26 Debugging techniques in
1. A set of Windows components, each one
created for speci c works related to con- VBA
tent downloaded from the World Wide
Web is called controls. 1. IDE stands for .
(a) ActiveX (b) X-Window (a) International Development Environment
(c) Visual (d) Spreadsheet (b) Internet Development Environment
2. In VBA, ADODC Connection object may (c) Integrated Development Environment
be enabled using menu. (d) Initial Development Environment
(a) Run >Run 2. The IDE of VBA provides to indi-cate
(b) Tools >References errors immediately on typing.
(c) File >Close (a) coloring
(d) View >Properties Window (b) popup
3. ADODC stands for . (c) both a & b
(a) ActiveX Device Object Data Control (d) neither a nor b
(b) Anti-Data Object Data Control 3. A breakpoint may be inserted using
(c) ActiveX Data Object Data Control .
(d) ActiveX Double Object Data Control (a) a click on the margin to the left of a line
4. ADODB stands for . (b) pressing F9 when cursor is in the line
(a) ActiveX Device Object Data Base (c) both a & b
(b) Anti-Data Object Data Base (d) neither a nor b
(c) ActiveX Data Object Data Base 4. When a runtime error occurs, choose from
(d) ActiveX Double Object Data Base the dialog to correct the pro-
5. ADODB Connection object may be ini- gram.
tilized using statement. (a) End (b) Debug
(a) Dim conn as New ADODB.Connection (c) Stop (d) Continue
(b) Dim rs as New ADODB.RecordSet 5. After program stops due to error or break-
(c) both a & b point, hovering mouse over a variable,
(d) neither a nor b .
6. ADODB RecordSet object may be ini- (a) ignores the variable
tilized using statement. (b) deletes the variable
(a) Dim conn as New ADODB.Connection (c) displays the value of the variable
(b) Dim rs as New ADODB.RecordSet (d) resets the variable
(c) both a & b 6. Using a variable on the right side of com-
(d) neither a nor b putaion expression without assigning any
7. method of ADODC connection value to the variable is may result in
opens a database connection. .
(a) Open (b) Close (a) junk result
(b) crashing of program
(c) Make (d) Query
(c) both a & b
8. In a query performed on data contained in (d) neither a nor b
Excel spreadsheet (say Sheet1), ta-ble name
7. After program stops due to error or break-
should be replaced by
name. point, trial code lines may be entered in to see the
(a) [Sheet1&] (b) [Sheet1$] result of changes on the
(c) [Sheet1#] (d) [Sheet1%] program.
(a) Immediate Window
(b) Properties Window
Answers (518 - 525) (c) Code Window
(d) Project Explorer
1. (a) 2. (b) 3. (c) 4. (c)

Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 35

8. After program stops due to error or break- (b) Choosing Run >Break or pressing Ctrl+Break
point, execution can be moved to the (c) choosing Run >Reset
start of a line by . (d) none of them
(a) choosing Debug >Step Into 12. After program stops due to error or
(b) Pressing F8 breakpoint, one can break execution by
(c) both a & b .
(d) neither a nor b (a) choosing Run >Continue
9. After program stops due to error or break- (b) Choosing Run >Break or pressing Ctrl+Break
point, execution can be moved to the end (c) choosing Run >Reset
of a lineby . (d) none of them
(a) choosing Debug >Step Over 13. After program stops due to error or break-
(b) Pressing Shift+F8 point, one can reset the execution by
(c) both a & b .
(d) neither a nor b (a) choosing Run >Continue
10. After program stops due to error or break- (b) Choosing Run >Break or pressing Ctrl+Break
point, line by line execution may be ended (c) choosing Run >Reset
by . (d) none of them
(a) choosing Debug >Step Out
(b) Pressing Ctrl+Shift+F8
(c) both a & b Answers (526 - 538)
(d) neither a nor b
1. (c) 2. (c) 3. (c) 4. (b)
11. After program stops due to error or break- 5. (c) 6. (c) 7. (a) 8. (c)
point, one can continue execution by 9. (c) 10. (c) 11. (a) 12. (b)
.
13. (c)
(a) choosing Run >Continue

Author: Dr.V.Nagaradjane
36 2.26. DEBUGGING TECHNIQUES IN VBA

Author: Dr.V.Nagaradjane
Chapter 3
Smart accounting

3.1 Basics of accounting (c) Journal Folio


(d) amount
9. Third column of debit/ credit form is used
1. Accounting is the of monetary to record of transaction.
transactions. (a) date
(a) recording (b) ver cation
(b) particulars
(c) tallying (d) all of them
(c) Journal Folio
2. Accounting is concerned with transact- (d) amount
tions involving .
(a) money 10. Fourth column of debit/ credit form is
(b) no money used to record of transaction.
(a) date
(c) movement of humans
(b) particulars
(d) none of them
(c) Journal Folio
3. Accounting transactions relate to (d) amount
.
(a) income/expense 11. The method of recording debit and credit
(b) asset/liability sides separated by a line is nicknamed
accounting.
(c) inventory
(a) T (b) U
(d) all of them
(c) V (d) W
4. Form used to record accounting transac-
tions contains columns.
(a) 3 (b) 5
(c) 8 (d) 11
Answers (539 - 549)
5. First 4 columns of account sheet are used 1. (d) 2. (a) 3. (d) 4. (c)
for recording . 5. (b) 6. (a) 7. (a) 8. (b)
(a) credit (b) debit 9. (c) 10. (d) 11. (a)
(c) income (d) expense
6. Columns 5 to 8 of account sheet are used
for recording . 3.2 Methods of accounting
(a) credit (b) debit
(c) income (d) expense 1. Accounting system which considers as-
7. First column of debit/ credit form is used sets, liabilities, revenue and expense is
to record of transaction. called method of accounting.
(a) date (a) British (b) American
(b) particulars (c) Indian (d) none of them
(c) Journal Folio 2. Accounting system which considers per-
(d) amount sonal account, real account and nominal
8. Second column of debit/ credit transac- account is called method of ac-
counting.
tion is used to record of trans- (a) British (b) American
action. (c) Indian (d) none of them
(a) date
(b) particulars

37
38 3.3. ACCOUNTING CONCEPT

3. Recording of debits and credits of indi- (b) Money measurement


viduals, bank accounts or other business (c) Going concern
sources is called account. (d) Dual aspect
(a) real (b) nominal
(c) personal (d) none of them 5. concept in accounting consid-
4. Recording of debits and credits related to ers that only the actual cost of transac-
movable assets, immovable assets, in-ventory tion should be recorded (not the market
(stock needed for production) is value of the transaction).
called account. (a) Cost
(a) real (b) nominal (b) Accounting period
(c) personal (d) none of them (c) Matching cost
5. Recording of debits and credits related (d) Accrual
to income, expense, in ow of money and
out ow of money is called ac-count. 6. concept in accounting consid-
ers that cost of manufacture should be
(a) real (b) nominal matched against the proceeds of sales.
(c) personal (d) none of them (a) Cost
(b) Accounting period
(c) Matching cost
Answers (550 - 554) (d) Accrual

1. (b) 2. (a) 3. (c) 4. (a) 7. concept in accounting consid-ers that


an account should be closed on a
5. (b)
periodic basis and reopened.
(a) Cost
3.3 Accounting concept (b) Accounting period
(c) Matching cost
(d) Accrual
1. concept in accounting consid- 8. concept in accounting consid-ers that
ers the business and its owner are di er-
revenue is recorded on the date of
ent entities.
(a) Business entity transaction itself but expenditure is
(b) Money measurement recorded only on the date of out ow of
(c) Going concern money (not the date of transaction,
(d) Dual aspect like encashing a cheque).
(a) Cost
2. concept in accounting con- (b) Accounting period
siders that only transactions involving (c) Matching cost
money should be recorded. (d) Accrual
(a) Business entity 9. concept in accounting consid-ers that
(b) Money measurement each transaction should be sup-
(c) Going concern ported by evidence.
(d) Dual aspect (a) Objective evidence
(b) Accounting period
3. concept in accounting consid- (c) Matching cost
ers that the business is a perpetual entity. (d) Accrual
(a) Business entity
(b) Money measurement
(c) Going concern Answers (555 - 563)
(d) Dual aspect
1. (a) 2. (b) 3. (c) 4. (d)
4. concept in accounting consid- 5. (a) 6. (c) 7. (b) 8. (d)
ers that each debit has a corresponding 9. (a)
credit.
(a) Business entity
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 39

3.4 Golden rules of double en- (a) Accrual basis


(b) Asset
try system (c) Credit
(d) Debit
1. account debits the receiver
and credits the giver. 6. considers that each debit has
(a) personal (b) real a corresponding credit.
(c) nominal (d) none of them (a) Double entry accounting
(b) Expense
2. account debits the incoming (c) Income or revenue
asset and credits the outgoing asset. (d) Debit
(a) personal (b) real
(c) nominal (d) none of them 7. considers out ow of money
for the in ow of goods/ services.
3. account debits expense and (a) Double entry accounting
credits the income. (b) Expense
(a) personal (b) real (c) Income or revenue
(c) nominal (d) none of them (d) Debit

8. considers in ow of money to
Answers (564 - 566) the business due to sales.
(a) Double entry accounting
1. (a) 2. (b) 3. (c) (b) Expense
(c) Income or revenue
(d) Debit
3.5 Accounting termonologies
1. is a record of all monetary Answers (567 - 574)
transactions.
(a) Accrual basis 1. (d) 2. (c) 3. (a) 4. (b)
(b) Asset 5. (d) 6. (a) 7. (b) 8. (c)
(c) Credit
(d) Account

2. denotes increase in money. 3.6 Voucher entry


(a) Accrual basis
(b) Asset 1. The evidence/ proof of a nancial trans-
(c) Credit action is called .
(a) amount (b) particulars
(d) Debit
(c) date (d) voucher

3. considers incoming money

to be instantly available and reduction of 2. is a format for recording nan-


cial transactions.
cash to occur only on the date of actual
(a) amount (b) particulars
out ow of money (instead of the date of
(c) date (d) voucher
transaction).

(a) Accrual basis 3. Voucher has sides.


(a) 2 (b) 3
(b) Asset
(c) 5 (d) 7
(c) Credit
(d) Debit 4. The left side of a voucher is meant for
entries.
4. denotes movable or immov-
(a) rough (b) unrelated
able property and inventory.
(c) credit (d) debit
(a) Accrual basis
(b) Asset 5. The right side of a voucher is meant for

(c) Credit entries.


(a) rough (b) unrelated
(d) Debit
(c) credit (d) debit

5. denotes reduction in money


6. voucher changes inventory posi-
or increase in liability.
tion.

Author: Dr.V.Nagaradjane
40 3.7. PREPARATION OF FINAL ACCOUNTS

(a) Accounting (b) Inventory 3.7 Preparation of nal ac-counts


(c) Cash (d) Contra

7. voucher changes monetary po-


sition.
(a) Accounting (b) Inventory 1. Final
accounts are prepared at
.
(c) Contra (d) none of them (a) beginning of nancial year
(b) beginning of each working day
8. voucher transfers money from
(c) end of each working day
one deposit/loan account to another.
(a) Accounting (b) Inventory (d) end of accounting period ( nancial year/
(c) Contra (d) none of them quar-ter/ month)

9. Vouchers are before posting 2. is an important accounts pre-


them in ledgers. pared at the end of accounting period.
(a) torn o (b) thrown aside (a) Balance sheet
(c) discarded (d) journalized (b) Pro t and Loss account
(c) Trading account
10. Transferring voucher entries to a ledger is (d) all of them
called in ledger. 3. The statement which shows the total debits
(a) tearing (b) posting and liabilities on the left side and credits and assets
(c) erasing (d) removing on the right side is
called .
11. Journal entries carry the name of
(a) balance sheet
in which the transaction is to (b) trading account
be posted. (c) pro t and loss account
(a) account (b) voucher (d) cash account
(c) journal (d) ledger 4. To nalize a balance sheet, is
12. The process of entering nalized nancial prepared with the aim of making
transaction in a ledger is called . correc-tions.
(a) posting (b) tearing (a) pro t and loss account
(c) erasing (d) removing (b) Stock & Inventory
(c) trial balance
13. Each ledger belongs to a speci c
. (d) cash ow account
(a) voucher 5. Balance sheet and pro t & loss ac-counts are
(b) journal prepared according to schedule
(c) account group of Companies Act.
(d) inventory (a) I (b) III
14. A journal entry from the debit side is en- (c) IV (d) VI
tered in side of ledger.
(a) debit (b) credit
(c) centre (d) margin
15. A journal entry from the credit side is en-
tered in side of ledger. Answers (590 - 594)
(a) debit (b) credit
1. (d) 2. (d) 3. (a) 4. (c)
(c) centre (d) margin
5. (d)

Answers (575 - 589)


3.8 Cash book
1. (d) 2. (d) 3. (a) 4. (d)
1. All in ow and out ow of money is
5. (c) 6. (b) 7. (a) 8. (c)
recorded in .
9. (d) 10. (b) 11. (d) 12. (a)
(a) cash book
13. (c) 14. (a) 15. (b)
(b) inventory ledger
(c) purchase ledger
(d) sales ledger

Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 41

2. Bank withdrawal, receipt of cash from in- (a) current


vestor, proceeds of sale, etc. are entered (b) quick
in side of cash book. (c) absolute liquid
(a) top (b) margin (d) gross pro t
(c) debit (d) credit 6. The ratio between net pro t after
3. Salary payment, rent payment, phone taxes and shareholders net worth
bill, electricity bill, etc. are entered in net prof it af ter taxes is called shareholders
side of cash book. networth
ratio.
(a) top (b) margin (a) net worth
(c) debit (d) credit (b) price earnings (PE)
(c) dividend yield
(d) net pro t
Answers (595 - 597)
7. The ratio between dividend per
1. (a) 2. (c) 3. (d) share and market value per share
dividend per share
market value per share is called
ratio.
3.9 Ratio analysis (a) net worth
(b) price earnings (PE)
1. Measuring performance of a company (c) dividend yield
against potential for performance is called (d) net pro t
.
(a) voucher 8. The ratio between market price
(b) ratio analysis per share and earning per share
market price per share
(c) journal
(d) ledger earning per share is called
2. The ratio between current assets and cur- ratio.
rent liabilities current assets is called (a) net worth
current liabilities
ratio. (b) price earnings (PE)
(a) current (c) dividend yield
(b) quick (d) net pro t
(c) absolute liquid 9. The ratio between operating pro t
(d) gross pro t operating prof it
3. The ratio between liquid assets and cur- and net sales is called
liquid assets
net sales

rent liabilities is called ratio.

current liabilities
ratio.
(a) current (a) net worth
(b) quick (b) price earnings (PE)
(c) absolute liquid (c) dividend yield
(d) gross pro t (d) net pro t
4. The ratio between absolute liq- 10. The ratio between net sales and in-
uid assets and current liabilities net sales
absolute liquid assets is called current liabilities ventory value inventory value is called
ratio. ratio.
(a) current (a) inventory
(b) quick (b) price earnings (PE)
(c) absolute liquid (c) overall pro t ratio
(d) gross pro t (d) net pro t
5. The ratio between gross pro t and net 11. The ratio between net pro t and total as-
gross prof it net prof it
sales is called
sets is called ra-
tio. total assets
(a) inventory
tio. net sales
(b) price earnings (PE)
(c) overall pro tability
(d) divident yield
Author: Dr.V.Nagaradjane
42 3.10. DEPRECIATION

Answers (598 - 608) (d) none of them


8. Book value of a product based on units
1. (b) 2. (a) 3. (b) 4. (c)
5. (d) 6. (a) 7. (c) 8. (b) of production method is .
9. (d) 10. (a) 11. (c) (a) bookvalue = assetcost
asset value salvage value age
lif e span
(b) bookvalue = assetcost
3.10 Depreciation asset value salvage value
production made
production capacity
1. The reduction in value of an asset with (c) bookvalue = assetcost2
straight line depreciation
passage of time is called . previous book value
(a) appreciation (b) depreciation (d) none of them
(c) escalation (d) in ation
9. Book value of a product based on double
2. The initial cost of an asset is called
. depreciation method is .
(a) asset value bookvalue = assetcost
(b) book value
(c) salvage value (a) asset value salvage value

(d) lifespan lif e span age


bookvalue = assetcost
3. The present cost of an asset after allow-
ing for depreciation is called . (b) asset value salvage value
(a) asset value production made
production capacity
(b) book value (c) bookvalue = assetcost2
(c) salvage value straight line depreciation
(d) lifespan previous book value
(d) none of them
4. The amount of money obtainable through
the disposal of an asset after useful lifes-
pan is called . Answers (609 - 617)
(a) asset value
(b) book value 1. (b) 2. (a) 3. (b) 4. (c)
(c) salvage value 5. (d) 6. (d) 7. (a) 8. (b)
(d) lifespan 9. (c)

3.11 Stock management


5. The duration of useful service period of 1. Purchase, storage and disposal of stock
an asset is called .
is called management.
(a) asset value
(a) stock (b) cash
(b) book value
(c) account (d) reorder
(c) salvage value
2. The safe stock level at which placing
(d) lifespan
fresh order will just allow fresh stock to
6. At the end of every year, the book value
reach before old stock depletes is called
of an asset is recorded after allowing re-
level.

duction for . (a) stock (b) cash


(a) asset value
(c) account (d) reorder
(b) book value
3. Storing more stock than necessary for
(c) salvage value
production/ sale, thus reducing cash
(d) depreciation
availability is called level.
7. Book value of a product based on straight
(a) stock
line depreciation is .
(b) overstocking
bookvalue = assetcost
(a) asset value salvage value (c) understocking

lif e span age (d) reorder


(b) bookvalue =assetcost

asset value salvage value


production capacity production made
(c) bookvalue = assetcost2
straight line depreciation
previous book value
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 43

4. Storing very low reserve stock resulting 3.13 Cash & fund ow
in disruption of production/sale is called
level. 1. Movement of money into and out of a
(a) stock business is called ow.
(b) overstocking (a) stock (b) cash
(c) understocking (c) rate (d) VAT
(d) reorder 2. In ow and out ow of money in a business
is called ow.
(a) stock (b) cash
Answers (618 - 621) (c) rate (d) VAT
1. (a) 2. (d) 3. (b) 4. (c) 3. In ow of money the strength of
business.
(a) increases
3.12 VAT (b) decreases
(c) does not a ect
1. VAT stands for in taxation. (d) none of them
(a) Value Added Tax
(b) Value Amount Tax 4. Out ow of money the strength
(c) Visual Added Tax of business.
(d) Value Asset Tax (a) increases
(b) decreases
2. The di erence between sales value and (c) does not a ect
purchase value of a product is called (d) none of them
.
(a) value addition 5. Money held in the form of account bal-
ance and cash is generally called .
(b) rate (a) fund (b) liquid money
(c) cost (c) voucher (d) journal
(d) sales
6. In ow and out ow of funds in the form
of currency and account balance is called
Answers (622 - 623) (a) stock ow
.
(b) ledger
1. (a) 2. (a) (c) voucher (d) fund ow
Author: Dr.V.Nagaradjane
44 3.14. TALLY
(c) loss

Answers (624 - 629)


1. (b) 2. (b) 3. (a) 4. (b)
5. (a) 6. (d)

3.14 Tally

1. Tally is a software.
(a) spreadsheet (b) accounting
(c) publishing (d) animation

2. Tally supports accounting types.


(a) cash (b) payroll
(c) inventory (d) all of them
3. Tally can maintain accounts for
company/companies.
(a) 9 (b) 99
(c) 99,999 (d) 100

4. Tally can provide to each com-


pany.
(a) password security
(b) no security
(c) barrier
(d) wrapper

5. Tally can maintain accounts.


(a) tax accounts
(b) liabilities accounts
(c) both a & b
(d) none of them

6. Tally allows data entry in lan-


guage(s).
(a) only Tamil
(b) only English
(c) only Hindi
(d) many Indian/Asian

7. Tally supports system of ac-


counting.
(a) single entry (b) double entry
(c) no entry (d) null entry

8. Tally generates report(s) au-


tomatically based on voucher/
journal en-tries.
(a) balance sheet
(b) stock report
(c) pro t & loss account
(d) all of them
9. Tally can maintain for stock keeping,
so that fresh invetory may arrive
before the old stock is exhausted.
(a) reorder level
(b) pro t
(a) Alt+F3 (b) F11
(c) F5 (d) F6
(d) cash
10. Balance sheet is produced 2. Pressing key opens accounting
when accounts are maintained in Tally. features.
(a) manually (a) Alt+F3 (b) F11
(b) automatically (c) F5 (d) F6
(c) remotely 3. Payroll, budgeting and scenario manage-
(d) randomly ment may be enabled through
11. The statement of account debits, credits, menu in Tally.
assets and liabilities is called . (a) Accounting Features
(a) stock & inventory report (b) Inventory Features
(b) pro t & loss account (c) Statutory and Taxation
(c) balance sheet (d) none of them
(d) cash balance 4. Account Groups, Ledgers, Budget and
scenario are available under in
Tally.
Answers (630 - 640) (a) Payroll Info
(b) Inventory Info
1. (b) 2. (d) 3. (c) 4. (a) (c) Accounts Info
5. (c) 6. (d) 7. (b) 8. (d) (d) none of them
9. (a) 10. (b) 11. (c)
5. Inventory groups, (categories, if needed),
items, units of measure, reorder level, in-ventory
3.15 Accounting in Tally vouchers, etc. are available under
in Tally.
(a) Payroll Info
1. Pressing button in the Gateway (b) Inventory Info
of Tally opens company info in Tally.
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 45

(c) Accounts Info


(d) none of them 9. is the shortcut to company
info from from Gateway of Tally.
6. Employee groups, employee, atten- (a) F1 (b) Alt+F1
dance/production types, pay heads, salary (c) Alt+F2 (d) Alt+F3
details, voucher types, etc. are
available under in Tally. 10. is the shortcut to inventory
(a) Payroll Info buttons from Accounting Vouchers in
(b) Inventory Info Tally.
(c) Accounts Info (a) Alt+F1 (b) Ctrl+F1
(d) none of them (c) F7 (d) F8

11. is the shortcut to payroll but-


Answers (641 - 646) tons from Accounting Vouchers in Tally.
(a) Alt+F1 (b) Ctrl+F1
1. (a) 2. (b) 3. (a) 4. (c) (c) F7 (d) F8
5. (b) 6. (a)
12. is the shortcut to Journal from
Accounting Vouchers in Tally.
(a) Alt+F1 (b) Ctrl+F1
(c) F7 (d) F8
3.16 Shortcuts in Tally 13. is the shortcut to sales
voucher from Accounting Vouchers in
1. is the shortcut to set date in Tally.
(a) Alt+F1 (b) Ctrl+F1
Tally.
(a) F6 (b) F5 (c) F9 (d) F8
(c) F4 (d) F2
14. is the shortcut to purchase
2. is the shortcut to create contra voucher from Accounting Vouchers in
voucher in Tally. Tally.
(a) F6 (b) F5 (a) Alt+F1 (b) Ctrl+F1
(c) F4 (d) F2 (c) F9 (d) F8

15. is the shortcut to credit note


3. is the shortcut to create pay-
from Accounting Vouchers in Tally.
ment voucher in Tally.
(a) Alt+F1 (b) Ctrl+F1
(a) F6 (b) F5
(c) Ctrl+F9 (d) Ctrl+F8
(c) F4 (d) F2
16. is the shortcut to debit note

4. is the shortcut to create receipt


from Accounting Vouchers in Tally.
voucher in Tally.
(a) Alt+F1 (b) Ctrl+F1
(a) F6 (b) F5
(c) Ctrl+F9 (d) Ctrl+F8
(c) F4 (d) F2

17. is the shortcut to revers-


5. is the shortcut to con gure a
ing journal from Accounting Vouchers in
compnany in Tally.
(a) F6 (b) F5 Tally.
(a) F10 (b) Ctrl+F10
(c) F4 (d) F12
(c) Alt+I (d) Alt+V
6. is the shortcut to select a com-
18. is the shortcut to revers-
pany in Tally.
(a) F1 (b) Alt+F1 ing journal from Accounting Vouchers in
(c) Alt+F2 (d) Alt+F3 Tally.
(a) F10 (b) Ctrl+F10
7. is the shortcut to change the
(c) Alt+I (d) Alt+V
accounting period from Gateway of Tally.

(a) F1 (b) Alt+F1 19. is the shortcut to Memos from


(c) Alt+F2 (d) Alt+F3 Accounting Vouchers in Tally.
(a) F10 (b) Ctrl+F10

8. is the shortcut to shut a com-


(c) Alt+I (d) Alt+V
pany in Tally.

(a) F1 (b) Alt+F1 20. is the shortcut to Account-


(c) Alt+F2 (d) Alt+F3 ing Invoice from Accounting Vouchers in
Tally.

Author: Dr.V.Nagaradjane
46 3.17. DOUBLE ENTRY SYSTEM IN TALLY
(c) Alt+F7 (d) Alt+F10
(a) F10 (b) Ctrl+F10 32. is the shortcut to rejection in
(c) Alt+I (d) Alt+V from Inventory Vouchers in Tally.
21. is the shortcut to voucher
as invoice from Accounting Vouchers in
Tally.
(a) F10 (b) Ctrl+F10
(c) Alt+I (d) Ctrl+V

22. is the shortcut to post dated


voucher from Accounting Vouchers in
Tally.
(a) Ctrl+T (b) Ctrl+F10
(c) Alt+I (d) Ctrl+V

23. is the shortcut to optional


voucher from Accounting Vouchers in
Tally.
(a) Ctrl+T (b) Ctrl+L
(c) Alt+I (d) Ctrl+V

24. is the shortcut to Payroll from


Payroll Vouchers in Tally.
(a) Alt+A (b) Alt+S
(c) Ctrl+F5 (d) Alt+F4

25. is the shortcut to Attendance


from Payroll Vouchers in Tally.
(a) Alt+A (b) Alt+S
(c) Ctrl+F5 (d) Ctrl+F4

26. is the shortcut to Payroll as


Voucher from Payroll Vouchers in Tally.
(a) Alt+A (b) Alt+S
(c) Ctrl+F5 (d) Ctrl+F4

27. is the shortcut to Payroll Aut-


o ll from Payroll Vouchers in Tally.
(a) Alt+A (b) Alt+S
(c) Ctrl+F5 (d) Ctrl+F4

28. is the shortcut to purchase or-


der from Payroll Vouchers in Tally.
(a) Alt+F4 (b) Alt+F5
(c) Ctrl+F5 (d) Ctrl+F4

29. is the shortcut to sales order


from Payroll Vouchers in Tally.
(a) Alt+F4 (b) Alt+F5
(c) Ctrl+F5 (d) Ctrl+F4

30. is the shortcut to physical


stock veri cation from Inventory Vouch-
ers in Tally.
(a) Alt+F4 (b) Alt+F5
(c) Alt+F7 (d) Alt+F10

31. is the shortcut to stock journal


from Inventory Vouchers in Tally.
(a) Alt+F4 (b) Alt+F5
9. (d) 10. (a) 11. (b) 12. (c)
13. (d) 14. (c) 15. (d) 16. (c)
(a) Alt+F6 (b) Ctrl+F6
17. (a) 18. (a) 19. (b) 20. (c)
(c) Alt+F8 (d) Alt+F9
21. (d) 22. (a) 23. (b) 24. (c)
33. is the shortcut to rejection out 25. (d) 26. (b) 27. (a) 28. (a)
from Inventory Vouchers in Tally. 29. (b) 30. (d) 31. (c) 32. (b)
(a) Alt+F6 (b) Ctrl+F6 33. (a) 34. (b) 35. (c) 36. (d)
(c) Alt+F8 (d) Alt+F9

34. is the shortcut to Indent from 3.17 Double entry system in


Inventory Vouchers in Tally. Tally
(a) Alt+F6 (b) Ctrl+F7
(c) Alt+F8 (d) Alt+F9
1. Tally maintains account using
35. is the shortcut to delivery note entry sytem of accounting.
from Inventory Vouchers in Tally. (a) single (b) double
(a) Alt+F6 (b) Ctrl+F7 (c) triple (d) quadruple
(c) Alt+F8 (d) Alt+F9 2. Entering each transaction in debit and
credit columns is called entry
36. is the shortcut to receipt note system of accounting.
from Inventory Vouchers in Tally. (a) single (b) double
(a) Alt+F6 (b) Ctrl+F7 (c) triple (d) quadruple
(c) Alt+F8 (d) Alt+F9

Answers (683 - 684)


Answers (647 - 682)
1. (b) 2. (b)
1. (d) 2. (c) 3. (b) 4. (a)
5. (d) 6. (a) 7. (c) 8. (b)

Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 47

3.18 Budgeting system in Tally (a) do not a ect


(b) a ect
1. Budget in Tally is available under (c) change
menu in Tally. (d) permanently damage
(a) GoT >Payroll Info 4. Scenarios can be created using
(b) GoT >Inventory Info menu in Tally.
(c) GoT >Accounting Info (a) GoT >Accounts Info >Groups >Create
(d) none of them (b) GoT >Accounts Info >Ledgers >Create
2. Prior allocation of money for speci c pur- (c) GoT >Accounts
poses using Tally is called . Info >Scenarios >Create
(a) budgeting (d) GoT >Accounts Info >Budgets >Create
(b) scenario 5. Extra columns may be added to the origi-
(c) inventory nal Trial Balance using menu
(d) voucher entry in Trial Balance.
3. Budgets can be created using (a) Budget (Alt+B)
menu in Tally. (b) Column (Alt+C)
(a) GoT >Accounts Info >Groups >Create (c) F6
(b) GoT >Accounts Info >Ledgers >Create (d) F7
(c) GoT >Accounts 6. Reversing journal entries may be made to
Info >Scenarios >Create
(d) GoT >Accounts Info >Budgets >Create scenario using shortcut under
4. Progress of expenses against budget Accounting Vouchers in Tally.
allocation may be compared to the trial (a) F5 (b) F6
balance of original company using (c) F7 (d) F10
menu in Trial Balance.
(a) Budget (Alt+B) 7. is the shortcut to delete an
(b) Column (Alt+C) item in Tally.
(c) F6 (a) Alt+D (b) Alt+Q
(d) F7 (c) Alt+P (d) Alt+G

8. is the shortcut to quit/ exit/


Answers (685 - 688) close Tally.
(a) Alt+D (b) Alt+Q
1. (c) 2. (a) 3. (d) 4. (a) (c) Alt+P (d) Alt+G

9. is the shortcut to Print a re-


3.19 Scenario
(a)
port from Tally.
Alt+D (b) Alt+Q
1. Creating a hypothetical situation for a (c) Alt+P (d) Alt+G
company is called .
10. is the shortcut to change the
(a) budgeting
language in Tally.
(b) scenario (a) Alt+D (b) Alt+Q
(c) inventory (c) Alt+P (d) Alt+G
(d) voucher entry
2. The voucher created for scenario is called 11. is the shortcut to duplicate a
voucher. voucher in Tally.
(a) purchase (a) Alt+2 (b) Alt+A
(b) sales (c) Alt+C (d) Alt+E
(c) reversing journal
(d) payment 12. is the shortcut to add a
3. Reversing journal entries made for sce- voucher in Tally.
nario the original account of (a) Alt+2 (b) Alt+A
company. (c) Alt+C (d) Alt+E

13. is the shortcut to export a re-


port to di erent format in Tally.
(a) Alt+2 (b) Alt+A
(c) Alt+C (d) Alt+E

Author: Dr.V.Nagaradjane
48 3.20. VARIANCE & RATIO ANALYSIS

(a) balance sheet


14. is the shortcut to create a (b) pro t and loss accounts
master at a voucher screen in Tally. (c) balance sheet & pro t and loss accounts
(a) Alt+2 (b) Alt+A
(d) none of them
(c) Alt+C (d) Alt+E
2. Statements of account like trial bal-ance, day
book, account books, state-ment of accounts, inventory
Answers (689 - 702) books, state-
ment of inventory, statutory info, statu-
1. (b) 2. (c) 3. (a) 4. (c) tory reports, cash/fund ow, list of ac-
5. (b) 6. (d) 7. (a) 8. (b) counts, exception reports are available
9. (c) 10. (d) 11. (a) 12. (b) under menu in Tally.
13. (d) 14. (c) (a) GoT >Display
(b) GoT >Accounting Info
(c) GoT >Inventory Info
3.20 Variance & ratio analysis (d) GoT >Payroll Info

1. Comparison of company performance


against budget goals is called . Answers (707 - 708)
(a) variance analysis
(b) trial balance 1. (c) 2. (a)
(c) balance sheet
(d) pro t & loss accounts
2. Cost centre can be created using 3.22 Inventory basics
menu in Features (F11) at
Gateway of Tally.
(a) Accounting features 1. Stock maintained for production purpose
(b) Inventory features is called .
(a) ledger
(c) Statutory & taxation
(b) payroll
(d) none of them
(c) trial balance
3. A number ranging from 0 to 1 (or as a (d) inventory
percentage) to measure the performance
2. Invetory of general type can be created
of company against its potential is called
. using menu.
(a) scenarios (a) GoT >Accounting Info >Groups >Create
(b) budgets (b) GoT >Invetory Info >Groups >Create
(c) ratio analysis (c) GoT >Payroll Info >Groups >Create
(d) voucher (d) none of them
4. Ratio analysis is available under 3. is an optional grouping of in-ventory
menu. which can be accessed through
(a) GoT >Balance Sheet Features (F11) >Inventory features.
(b) GoT >Stock & Inventory Report (a) Category
(c) GoT >Pro t & Loss Accounts (b) Group
(d) GoT >Ratio Analysis (c) Item
(d) Inventory Voucher
4. Items can be created under given cate-
Answers (703 - 706) gory using menu in Tally.
(a) GoT >Accounting
1. (a) 2. (a) 3. (c) 4. (d)
Info >Ledgers >Create
(b) GoT >Invetory Info >Items >Create
3.21 Analysis of nancial state- (c) GoT >Payroll Info >Employees >Create
(d) none of them
ments
1. Schedule VI of Companies Act speci es
the format for report.
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 49

5. is the shortcut for purchase or- Answers (717 - 720)


der in Tally.
(a) F8 (b) F9 1. (d) 2. (b) 3. (a) 4. (a)
(c) Alt+F4 (d) Alt+F5

6. is the shortcut for sales order 3.24 Taxation in Tally


in Tally.
(a) F8 (b) F9 1. In taxation, TDS stands for .
(c) Alt+F4 (d) Alt+F5 (a) Tax Deviation at Source
(b) Tax Deduted at Station
7. is the shortcut for purchase (c) Tax Deduted at Source
voucher in Tally. (d) Tari Dedution at Source
(a) F8 (b) F9
(c) Alt+F4 (d) Alt+F5 2. In taxation, TCS stands for .
(a) Tax Creation at Source
8. is the shortcut for sales (b) Tax Collected at Source
voucher in Tally. (c) Tax Combined at Source
(a) F8 (b) F9 (d) Tari Collected at Station
(c) Alt+F4 (d) Alt+F5
3. In taxation, FBT stands for .
Answers (709 - 716) (a) Fringe Bene t Tax
1. (d) 2. (b) 3. (a) 4. (b) (b) Frame Bene t Tax
5. (c) 6. (d) 7. (b) 8. (a) (c) Fast Bene t Tax
(d) Fringe Bene t Tari
4. In taxation, VAT stands for .
3.23 POS Invoicing (a) Value Assigned Tax
(b) Value Approved Tax
(c) Value Added Transaction
1. POS stands for in accounting/ (d) Value Added Tax
Tally.
(a) Purchase of Sale 5. The tax collected by the employer to-
(b) Point of Safety wards income of an employee is called
(c) Purpose of Sale .
(a) Tax Deducted at Source (TDS)
(d) Point of Sale
(b) Tax Collected at Source (TCS)
2. Point of sale voucher can be created from (c) Fringe Bene t Tax (FBT)
menu in Tally. (d) Value Added Tax (VAT)
(a) GoT >Accounting Info >Vouchers
6. The tax collected by the seller from the
(b) GoT >Inventory Info >Vouchers
buyer is generally called .
(c) GoT >Payroll Info >Attendance
(a) Tax Deducted at Source (TDS)
(d) none of them
(b) Tax Collected at Source (TCS)
3. The head of account for a POS voucher (c) Fringe Bene t Tax (FBT)
should be under . (d) Value Added Tax (VAT)
(a) Sales
(b) Purchase 7. The tax payable towards to perks/ small
(c) Expense (Direct) bene ts o ered by the employer to the employees
(d) Income (Indirect) through extra means other
than salary is called .
4. POS voucher entry can be made from
(a) Tax Deducted at Source (TDS)
menu in Tally.
(b) Tax Collected at Source (TCS)
(a) GoT >Accounting Vouchers >Sales
(c) Fringe Bene t Tax (FBT)
Voucher (F8)
(b) GoT >Inventory Vouchers >Purchase (d) Value Added Tax (VAT)
Vouchers 8. The tax on the value added to an item is
(c) GoT >Inventory Vouchers >Sales Vouchers called .
(d) GoT >Payroll Vouchers >Payroll (a) Tax Deducted at Source (TDS)
Author: Dr.V.Nagaradjane
50 3.25. LANGUAGES IN TALLY

(b) Tax Collected at Source (TCS) 5. (a) 6. (b) 7. (c) 8. (d)


(c) Fringe Bene t Tax (FBT) 9. (b) 10. (a)
(d) Value Added Tax (VAT)
9. In Tally, taxation details can be controlled
through . 3.25 Languages in Tally
(a) GoT >Features (F11) >Payroll Processing
(b) GoT >Features (F11) >Statutory & Taxa- 1. Language of Tally user interface can be
tion changed using in Tally Window.
(c) GoT >Features (F11) >Cash Centres (a) Languages (Alt+G)
(d) GoT >Features (F11) >Godowns (b) Delete (Alt+D)
10. In Tally, taxation details can be controlled (c) Print (Alt+P)
through . (d) Quit (Alt+Q)
(a) GoT >Display >Statutory Reports
(b) GoT >Display >Statement of Accounts 2. Tally ERP 9 supports about lan-
(c) GoT >Display >Trial Balance guages.
(d) GoT >Display >Ratio Analysis (a) 1 (b) 2
(c) 3 (d) 13

Answers (721 - 730) Answers (731 - 732)


1. (c) 2. (b) 3. (a) 4. (d) 1. (a) 2. (d)
Author: Dr.V.Nagaradjane
Chapter 4
E-Commerce

4.1 Introduction to E-Commerce (a) C2B or Consumer to Business


(b) B2C or Business to Consumer
1. Sale or purchase of items without physi- (c) B2B or Business to Business
cally visiting a shop is called . (d) C2C or Consumer to Consumer
(a) E-Commerce 4. When the seller and the buyer are both
(b) Point of Sale (POS) individuals, it is called model of
(c) Goods and Services E-Commerce.
(d) Disposal (a) C2B or Consumer to Business
2. E-Commerce may be carried out using (b) B2C or Business to Consumer
modes. (c) B2B or Business to Business
(a) SMS/ phone conversation (d) C2C or Consumer to Consumer
(b) Web
(c) email
(d) all of them Answers (735 - 738)
1. (c) 2. (b) 3. (a) 4. (d)

Answers (733 - 734) 4.3 Scope of E-Commerce


1. (a) 2. (d) platforms
1. The geographical domain of business of
4.2 Types of E-Commerce an E-Commerce platform is called
of the platform.
1. When the seller and the buyer are both (a) length (b) height
business rms, it is called model (c) scope (d) sales
of E-Commerce. 2. E-Commerce platforms like Quikr, OLX,
(a) C2B or Consumer to Business
(b) B2C or Business to Consumer etc. have scope of business.
(c) B2B or Business to Business (a) National (b) local
(d) C2C or Consumer to Consumer (c) Global (d) none of them
2. When the seller is a business and the is 3. E-Commerce platforms like Snapdeal,
an individual consumer, it is called Flipkart, Shopclues, etc. have
model of E-Commerce. scope of business.
(a) C2B or Consumer to Business (a) National (b) local
(b) B2C or Business to Consumer (c) Global (d) none of them
(c) B2B or Business to Business 4. E-Commerce platforms like amazon,
(d) C2C or Consumer to Consumer eBay, etc. have scope of busi-
3. When the seller is an individual and ness.
the buyer is a business rm, it is called model (a) National (b) local
of E-Commerce. (c) Global (d) none of them

51
52 4.4. BENEFITS OF E-COMMERCE

Answers (739 - 742) 4.5 Capabilities required for E-


1. (c) 2. (b) 3. (a) 4. (c) Commerce platform
1. in an E-Commerce platform helps to
4.4 Bene ts of E-Commerce keep selected products until
checkout/ payment.
1. Bene t of E-Commerce platform is/are (a) basket (b) cart
. (c) tray (d) plate
(a) Competitive pricing to bene t both seller 2. Items added to the cart of an E-
and buyer Commerce platform are checked out after
(b) large number of products to choose from .
(c) ability to buy products not available in the (a) payment (b) order on COD
local market (c) both a & b (d) none of them
(d) all of them
3. After placing an order, the buyer is pro-
2. Description of a product by the seller
vided for tracking the progress of
might , which will result in cus-tomer
shipment till delivery.
dissatisfaction.
(a) Waybill number
(a) not match the product
(b) be inadequate (b) postal registration number
(c) omit certain defects (c) consignment tracking ID
(d) all of them (d) any one of a, b or c
4. After delivering a product and its ac-
3. During transit, a product might
, which will result in cus- ceptance by the buyer, the seller gets
.
tomer dissatisfaction.
(a) get damaged (a) payment for the transaction
(b) get broken (b) delisted
(c) be a ected by excess light/ radiation (c) penalized for the transaction
(d) all of them (d) scolded through email
4. After ordering a product, the buyer might the 5. After completing an E-Commerce trans-
product, which will result action, the seller and buyer should be
in unnecessary transport expense to provided an opportunity to their
the seller.
(a) fail to pay for transaction experience.
(b) reject (a) undo
(c) nd defects in (b) regret
(d) all of them (c) provide rating for
(d) forget
5. The delivery for the buyer of E-Commerce
6. The E-Commerce platform should pro-
platform , thus resulting in dis-
satisfaction to the buyer. vide facility for transaction for
(a) might not reach on promised date
electronic payment.
(b) may reach as per schedule (a) unprotected (b) secure
(c) may reach in good condition (c) unsafe (d) uncontrolled
(d) may arrive earlier than the promised date
7. The payment gateway of an E-Commerce
platform should be available .
Answers (743 - 747) (a) 2 hours per day
(b) from 9AM to 5PM
(c) 24 7
(d) at midnight every day
1. (d) 2. (d) 3. (d) 4. (d)
8. To protect the customer from loss of
5. (a)
money, the E-Commerce platform should
maintain a list of and provide
appropriate remidy to the customer.
(a) failed transaction
(b) completed transactions
(c) partially completed transactions
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 53

(d) all of them (a) gets a demo on


9. The user of a E-Commerce platform (b) needs to gure out
should remain watchful about . (c) gets a demo by an expert on
(a) online fraudsters (d) gets a demo through a technician from the seller
(b) fake web commerce portals 5. E-Commerce platforms help the manu-
(c) fake seller/ buyer facturers to , thus reducing the
(d) all of them cost of a product.
10. is the name for online descrip- (a) directly deliver to the customer
tion of a product. (b) deliver to the customer through several
(a) Online catelogue inter-mediaries
(b) O ine catelogue (c) deliver to the customer through several
(c) Printed Catelogue distrib-utors
(d) create a chain of local shops
(d) Handwritten catelogue
11. Online catelogue should clearly describe 6. E-Commerce permits without
of a product sold through E- physically visiting several shops.
Commerce platform. (a) comparison of several products
(a) salient internal features (b) get best rate possible for buyer/ seller
(b) physical details (c) release the product to a large market
(c) defects, if any without delay
(d) all of them (d) all of them

Answers (748 - 758) Answers (759 - 764)


1. (b) 2. (c) 3. (d) 4. (a) 1. (a) 2. (d) 3. (b) 4. (b)
5. (c) 6. (b) 7. (c) 8. (d) 5. (a) 6. (d)
9. (d) 10. (a) 11. (d)
4.7 Types of E-Commerce
4.6 Di erences between E- websites
Commerce and traditional
1. The online portal of a shop which cor-responds
commerce to a physically accessible shop,
thus making the online store compli-mentary to
the physical store is called E-Commerce site.
1. In E-Commerce a buyer touch (a) transactional type
or feel the product. (b) information delivery
(a) cannot (b) can
(c) e-marketplace
(c) may (d) might
(d) none of them
2. After completing an E-Commerce trans-
action, the buyer needs to . 2. The online portal for dissemination of in-
(a) pick the product and go home formation about products (without per-mission for
(b) take the product to home online transactions) is called
E-Commerce site.
(c) collect it directly from a store
(a) transactional type
(d) wait till delivery of product (b) information delivery
3. In an E-Commerce platform, bargaining (c) e-marketplace
is . (d) none of them
(a) not possible
(b) permitted with certain restrictions 3. The online portal which permits sellers and
(c) not allowed buyers to register, sell/ buy products
(d) not permitted
online is called E-Commerce
4. The buyer of a new product from an E- site.
Commerce platform the usage of (a) transactional type
the product.
Author: Dr.V.Nagaradjane
54 4.8. MODES OF PAYMENT FOR E-COMMERCE

(b) information delivery (d) all of them


(c) e-marketplace 8. Usually, credit or debit card number is
(d) none of them digits longs.
(a) 8 (b) 12
(c) 16 (d) 20
Answers (765 - 767) 9. To complete an E-Commerce transaction,
details about a credit/ debit
1. (a) 2. (b) 3. (c)
card are required.
(a) Card number/ card expiry month/ year
(b) card holder name
4.8 Modes of payment for E- (c) Card Veri cation Value (CVV)
Commerce (d) all of them
10. In credit/ debit cards, CVV stands for
1. In E-Commerce, COD stands for .
. (a) Credit Veri cation Value
(a) Commerce On Delivery (b) Card Veri cation Value
(b) Cash On Demand (c) Card Validity Value
(c) Cart on Delivery (d) Credit Veri cation Visual
(d) Cash On Delivery
11. During an online transaction, a 6 or 8
2. A card which permits online payment us-
digit number called is sent to the
ing balance amount available in a bank
account is called . registered mobile number/ email ID
(a) debit card (b) credit card to complete the transaction.
(c) wallet (d) none of them (a) Card number
(b) Card Veri cation Value (CVV)
3. A card which permits spending money (c) One Time Password (OTP)
rst, for which payment will be made
later against bill is called . (d) Grid Value
(a) debit card (b) credit card 12. To make online payment through Internet
(c) wallet (d) none of them banking, is required to authorize
the user to access the bank account.
4. An online repository in which cash is (a) user name (b) password
recharged for spending online is called (c) both a & b (d) none of them
.
(a) debit card (b) credit card 13. With relation to online transaction, OTP
(c) wallet (d) none of them stands for .
(a) One Time Password
5. Online payment for an E-Commerce plat- (b) Only Time Password
form can be made using . (c) One Type Password
(a) credit/debit card
(d) One Tracking Password
(b) Internet banking
(c) electronic Wallet 14. OTP may be received through
.
(d) all of them (a) SMS (b) email
6. In a credit or debit card, a 3 digit number (c) both a & b (d) none of them
printed on the reverse to verify the card 15. During a secure online transaction, a
authenticity is called . icon is shown next to the ad-
(a) Card Veri cation Value (CVV)
dress bar.
(b) PIN (a) locked lock
(c) PAN (b) green lock
(d) Grid (c) either a or b
7. Most commonly used credit/ debit cards (d) none of them
are issued by . 16.
During a insecure online transaction, a
(a) VISA icon is shown next to the ad-
(b) Master/ Maestro dress bar.
(c) American Express (a) open lock/ lock with red X mark

Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 55

(b) closed lock 3. What is the full form of B2C?


(c) green lock (a) Bihar to Chandigarh
(d) none of them (b) Bombay square to Chandigarh
(c) Business to Consumer
(d) none of them
Answers (768 - 783) 4. What is the full form of ALE in e-
commerce?
1. (d) 2. (a) 3. (b) 4. (c) (a) Application Link Embedding
5. (d) 6. (a) 7. (d) 8. (c) (b) Application Link Electronics
9. (d) 10. (b) 11. (c) 12. (c) (c) Application Leakage Enabling
13. (a) 14. (c) 15. (c) 16. (a) (d) none of them
5. What is the full form of EDI in e-
commerce?
4.9 Payment gateway (a) Electronic Detailed International
(b) Electronic Data Interchange
1. The intermediary responsible for process- (c) Electronic Digital Interchange
ing the transfer of fund from payee to re- (d) none of them
cipient in an E-Commerce transaction is
called . 6. Which e-commerce software requires ini-tial
(a) Payment gateway one time password investment of li-
(b) credit card censing fee?
(c) debit card (a) OnPromise (b) SaaS
(d) wallet (c) Open Source (d) none of them
2. is a common Payment Gateway 7. Which of the following is a cloud based
used for online transactions. ecommerce platform (applications are hosted and
(a) CCAvenue (b) PaySeal managed in service providers datacentre,
(c) BillDesk (d) all of them subscribed on payment ba-
sis)?
3. The payment gateway the (a) OnPromise (b) SaaS
amount to the recipient after the (c) Open Source (d) none of them
payee completes transaction.
8. Which of the ecommerce software is free
(a) transfers
(b) does not transfer of charge (no licensing fee)?
(a) OnPromise (b) SaaS
(c) cheats
(c) Open Source (d) none of them
(d) does not pay
9. What is the full form of C2B?
(a) Chandigarh to Bihar
Answers (784 - 786) (b) Chandigarh to Bombay square
(c) Consumer to Business
1. (a) 2. (d) 3. (a) (d) none of them
10. What is the full form of CRM in ecom-
merce?
4.10 General questions on E- (a) Crime Report Management
Commerce (b) Customer Relationship Management
(c) Consumer Resource Management
(d) none of them
1. is the trading of goods and 11. What is the term given to e-commerce site
items through the Internet. where product and inventory informa-
(a) E-Trade (b) E-Commerce tion is provided by multiple third parties?
(c) E-Network (d) none of them (a) online marketplace
2. What is the full form of B2B? (b) online e-commerce
(a) Bihar to Bihar (c) e-marketplace
(b) Bombay to Bombay (d) none of them
(c) Business to Business
(d) none of them
Author: Dr.V.Nagaradjane
56 4.10. GENERAL QUESTIONS ON E-COMMERCE

12. In an on line marketplace, transactions 21. What is the full form of CSP in ecom-
merce?
are processed by . (a) Card Service Provider
(a) marketplace operator (b) Customer Service Provider
(b) customer (c) central Service Provider
(c) seller (d) none of them
(d) none of them 22. What is the full form of ACH in ecom-
13. Example of an online marketplace are merce?
. (a) Association of Clearing Houses
(a) eBay (b) Snapdeal (b) Anonymous Cleansing House
(c) Flipkart (d) all of them (c) Automatic Clearing House
14. Which of the following ecommerce plat- (d) none of them
forms allows consumers to buy goods di- 23. What is the full form of BITS in ecom-
rectly from seller over the Internet? merce?
(a) e-webshop (b) e-shopping (a) Bihartiya Institute of Technology & Society
(c) e-webstore (d) all of them (b) Banking Industry Technology Secretariat
(c) Banking Institute of Technology & Society
15. Which software model allows accumula-
(d) none of them
tion of a list of items before making the
online purchase? 24. Which system facilitates the adoption of
(a) online shopping electronic payment for online transac-
(b) e-shopping tions?
(c) shopping cart (a) motivated electronic purchase system
(d) none of them (b) electronic payment system
(c) online payment system
16. What is the name of front page of a web
(d) none of them
store accessed by visitors to the online
shop? 25. What is the ll form of CVN in ecom-
(a) storefront (b) webfront merce?
(a) Card Veri cation Number
(c) e-store (d) none of them
(b) Commerce Veri ed Number
17. If a company sends bills over the Internet (c) Consumer Veri ed Number
and consumers pay the bills online, it is (d) none of them
called .
(a) Internet billing 26. In system, payment gateway al-lows
(b) web billing the consumer to specify the bank from
(c) electronic billing which payment should be made.
(d) none of them (a) e-pay banking
(b) e-commerce banking
18. Which parties are involved in electronic
(c) net banking
billing?
(a) billers (d) none of them
(b) bankers 27. What can be used by a consumer and
(c) consolidators accepted by a merchant for making pay-
(d) all of them ments?
(a) merchant card
19. What is the full form of BPP in ecom- (b) payment card
merce?
(a) Biller Payment Provider (c) visiting card
(b) Biller Provision Provider (d) none of them
(c) Biller Payment Protector 28. What is the size of payment card?
(d) none of them (a) 85:60 53:98cm
20. What is the full form of BSP in ecom- (b) 85:60 53:98mm
merce? (c) 85:60 53:98m
(a) Biller Service Protector (d) none of them
(b) Biller Service Provider 29. The default period of loan for a credit
(c) Biller Service Packer card holder is days.
(d) none of them

Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 57

(a) 55 (b) 50 (c) credit (d) none of them


(c) 58 (d) none of them 38. Which cards store card data that can be read
30. A partial payment of loan in case of by physical contact and swiping past
a reading head?
charge cards may attract . (a) magnetic strip
(a) bonus (b) late fee (b) embossing
(c) interest (d) none of them (c) smart
31. In which card, a card holder is not re- (d) none of them
quired to make payments every month? 39. Which card contains a chip having em-
(a) charge (b) credit bedded integrated circuit which can pro-
(c) debit (d) none of them cess data?
32. In which card, funds are directly with- (a) magnetic strip
drawn from his bank account for each (b) embossing
payment made through the card? (c) smart
(a) debit (b) credit (d) none of them
(c) ATM (d) none of them 40. Which of the following authenticates and
33. What is the full form of ATM? handles credit card payment for ecom-
(a) Any Time Money merce?
(a) payment gateway
(b) Automated Transaction Management (b) e-commerce gateway
(c) Automated Teller Machine (c) software gateway
(d) none of them (d) none of them
34. Which card cannot be used for cash with-
drawal?
(a) ATM (b) charge Answers (787 - 826)
(c) debit (d) none of them
35. Which cards have a monetary value store 1. (b) 2. (c) 3. (c) 4. (a)
on the card itself? 5. (b) 6. (a) 7. (b) 8. (c)
(a) ATM (b) charge 9. (c) 10. (b) 11. (a) 12. (a)
(c) stored-value (d) none of them 13. (d) 14. (d) 15. (c) 16. (a)
36. Which cards are not issued in the name 17. (c) 18. (d) 19. (a) 20. (b)
of any individual? 21. (b) 22. (c) 23. (b) 24. (b)
(a) ATM (b) stored value 25. (a) 26. (c) 27. (b) 28. (b)
(c) debit (d) none of them 29. (a) 30. (c) 31. (c) 32. (a)
37. Which cards are commonly used to buy 33. (c) 34. (b) 35. (c) 36. (b)
gasoline (petrol), diesel and other fuels? 37. (a) 38. (a) 39. (c) 40. (a)
(a) eet/fuel (b) ATM

Author: Dr.V.Nagaradjane
58 4.10. GENERAL QUESTIONS ON E-COMMERCE

Author: Dr.V.Nagaradjane
Chapter 5
Cyber security

5.1 Introduction to cyber secu- 5.2 Threats to information se-


rity curity
1. Protecting data from online attacks, dele- 1. Script les sent mostly through email at-
tachment to attack host computer are
tions, malware, etc. is called se- called .
curity. (a) Worms
(a) physical (b) cyber (b) Phishing attacks
(c) hyper (d) reliable (c) Trojans
2. Victims of cyber attack might loose (d) Computer Viruses
. 2. Attacking the victims through fake URL
(a) data (b) money resembling that of a valid nancial Insti-
(c) both a & b (d) none of them tution is called .
3. The practise of protecting data from (a) Worms
unauthorized access is called se- (b) Phishing attack
curity. (c) Trojans
(a) physical (b) disk (d) Computer Viruses
(c) risk (d) information 3. Getting the user ID and password from a
4. Under information security, any device victim through dubious program is
called attack.
having is classi ed as a comput- (a) Worms
ing device. (b) Phishing attack
(a) processor (c) Trojan
(b) memory (d) Computer Viruses
(c) both a & b
4. A malicious program spreading through
(d) neither a nor b
Internet and storage media and attack-
5. Under information security, CIA stands ing the data in victims computer is called
for . .
(a) Criminal Investigation Agency (a) Worms
(b) Con dentiality, Integrity, Availability (b) Phishing attack
(c) Cost Information Agency (c) Trojan
(d) Credit Integrity Assessment (d) Computer Virus
Answers (827 - 831)
Answers (832 - 835)
1. (b) 2. (c) 3. (d) 4. (c)
5. (b)
1. (a)2. (b) 3. (c) 4. (d)

59
60 5.3. VULNERABILITY AND RISK MANAGEMENT

5.3 Vulnerability and risk man- (c) secure IT infrastructure


(d) all of them
agement
1. Potential weaknesses in IT infrastructure Answers (836 - 843)
through which a cyber attack might occur
is called . 1. (c) 2. (d) 3. (c) 4. (a)
(a) strength 5. (d) 6. (b) 7. (d) 8. (d)
(b) antivirus
(c) vulnerability
(d) port 5.4 Directory service
2. Vulnerability for cyber attack may be in
. 1. A single point of access for several net-
(a) operating system working services is called .
(b) application software (a) Directory Service
(c) IT infrastructure (b) web server
(d) all of them (c) email server
3. To protect the network infrastructure (d) none of them
from vulnerability, is setup. 2. Directory service permits security admin-
(a) rewall istrators to .
(b) Internet security software (a) concentrate on security of directory service
(c) both a & b in-stead of individual machines
(d) none of them (b) create new vulnerabilities
(c) damage the security of computers
4. The person using vulnerability in operat-ing
system or application software or IT
(d) create new virus
infrastructure to intrude in to the com- 3. Directory service should be able to
puter of a victim is called . in the infrastrucure.
(a) hacker (b) cracker (a) include new services
(c) maker (d) taker (b) esaily search for information in the network
(c) the information stored on the directory server
5. Periodic assessment of security vulner-
should be accessible from any operating system
ability in computer systems is called (d) all of them
audit.
(a) threat (b) attack 4. LDAP in directory service stands for
(c) hacking (d) security .
(a) Light Weight Director Access Provider
6. Maintaining computers free from cyber
(b) Light Weight Director Access Protocol
attack is called .
(a) cyber attack (c) Light Weight Director Access Provider
(b) risk management (d) Light Weight Director Access Protection
(c) online fraud
(d) phishing
Answers (844 - 847)
7. The security audit team to
1. (a) 2. (a) 3. (d) 4. (b)
keep the computers safe from cyber at-
tacks.
(a) assesses vulnerability
(b) decides the safety measures through hardware 5.5 Access control
and software
(c) considers latest threat scenario and implements
information safety 1. Protecting access to a computer through
(d) all of them is called access control.
(a) physical restriction of entry
8. To ensure information safety,
(b) password security for login
should be implemented.
(c) both a & b
(a) physical access security
(d) none of them
(b) password access security
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 61

Answers (848 - 848) (a) veri cation


(b) maintaining historical records
1. (c) (c) error handling
(d) log of changes (whois making request)
8. in source code development means
5.6 Software development se- veri cation of role before permit-ting
curity access to source code.
(a) veri cation
1. Security should be implemented at the (b) maintaining historical records
stage of in software. (c) error handling
(a) development stage (d) log of changes (whois making request)
(b) entire life cycle 9. in source code development means
(c) Sofware Development Life Cycle (SDLC) handling of con guration errors,
(d) all of them session errors and exceptionsa.
2. SDLC in software development stands for (a) veri cation
. (b) maintaining historical records
(a) Software Development Life Circus (c) error handling
(b) Software Development Life Cycle (d) log of changes (whois making request)
(c) Software Drafting Life Cycle
(d) Software Development Lead Cycle
3. Protection from of source code Answers (849 - 857)
means non-disclosure of the source
code to outsiders. 1. (d) 2. (b) 3. (a) 4. (b)
(a) disclosure 5. (c) 6. (d) 7. (a) 8. (b)
(b) alteration 9. (c)
(c) destruction
(d) log of changes (whois making request)
4. Protection from of source code means 5.7 Privacy protection
alloting the right to edit the source
code to authorized persons only. 1. Protecting the data divulged by cus-tomers
(a) disclosure from unauthorized access is called
(b) alteration .
(c) destruction (a) privacy protection
(d) log of changes (whois making request) (b) audit
(c) antinvirus
5. Protection from of source code means (d) vulnerability
protection of any individual from
destroying the software source code. 2. Information on criminal records of indi-
(a) disclosure viduals, nancial data of companies, ge-
(b) alteration netic information, address, mobile num-
(c) destruction ber, email ID, record of web sur ng be-
(d) log of changes (whois making request) haviour, record of credit card, record of
debit card, netbanking details, etc. are
6. Protection from of source code classi ed under .
means recording all changes made (a) privacy protection
to the source code and the person (b) audit
making such changes. (c) antinvirus
(a) disclosure
(d) vulnerability
(b) alteration
(c) destruction
(d) log of changes (whois making request) Answers (858 - 859)
7. of access rights in source code
development means veri cation of role 1. (a) 2. (a)
before permitting access to source code.

Author: Dr.V.Nagaradjane
62 5.8. INFORMATION SECURITY AUDIT

5.8 Information security audit


5. Section of IT Act imposes ne up
1. Information security audit may be con- to 1Lakh and imprisonment up to 3 years
ducted with reference to . for receiving stolen computer or mobile
(a) vulnerabilities device.
(b) threats (a) 65 (b) 66
(c) 66B (d) 66C
(c) preventive measures
(d) all of them
6. Section of IT Act imposes ne up
2. Information security audit analyses events to 1Lakh and imprisonment up to 3 years
of past threats to formulate .
for misuse of password.
(a) security measures (a) 65 (b) 66
(b) safe practices (c) 66B (d) 66C
(c) software protection
(d) all of them 7. Section of IT Act imposes ne up
to 1Lakh and imprisonment up to 3 years
3. Any single employee hold all data for cheating with computer.
needed for making a complete nancial (a) 66D (b) 66E
transaction. (c) 66F (d) 67
(a) should not (b) should
(c) may (d) might 8. Section of IT Act imposes ne up
4. IT audit of the rm should be conducted to 2Lakh and imprisonment up to 3 years
periodically, which may be every . for publishing private images of others.
(a) fortnight (b) month (a) 66D (b) 66E
(c) quarter (d) all of them (c) 66F (d) 67

9. Section of IT Act imposes life im-


Answers (860 - 863) prisonment for cyber terrorism.
(a) 66D (b) 66E
1. (d) 2. (d) 3. (a) 4. (d) (c) 66F (d) 67

10. Section of IT Act imposes ne up


5.9 Information Technology to 1Lakh and imprisonment up to 5 years
(IT) Act for publishing obscene content.
(a) 66D (b) 66E
(c) 66F (d) 67
1. IT act was enacted in the year .
(a) 1900 (b) 1950 11. Section of IT Act imposes ne up
(c) 2000 (d) 2008 to 1Lakh and imprisonment up to 7 years
for publishing sexual content.
2. IT act aims to . (a) 67A (b) 67B
(a) protect victims of cyber fraud (c) 67C (d) 68
(b) punish misbehious involving technology
(c) both a & b 12. Section of IT Act imposes ne up
(d) none of them to 1Lakh and imprisonment up to 7 years
for publishing child porn.
(a) 67A (b) 67B
3. Section of IT Act imposes ne up
to 2Lakh and imprisonment up to 2 years (c) 67C (d) 68
for tampering with computer source doc-
uments. 13. Section of IT Act imposes unde-
(a) 65 (b) 66 ned ne amount and imprisonment up
(c) 66B (d) 66C to 3 years for failure to maintain records
by operator.
4. Section of IT Act imposes ne up (a) 67A (b) 67B
to 5Lakh and imprisonment up to 3 years (c) 67C (d) 68
for hacking.
(a) 65 (b) 66 14. Section of IT Act imposes ne up
(c) 66B (d) 66C to 2Lakh and imprisonment up to 3 years
for failure to comply with orders.
(a) 67A (b) 67B
(c) 67C (d) 68

Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 63

(c) 5 (d) 7
15. Section of IT Act imposes unde-
ned ne amount and imprisonment up 21. Imprisonment up to years may
to 7 years for refusal to decrypt data. be imposed under sections 66 (hacking),
(a) 69 (b) 70 66B (receiving stolen computer/ mobile),
(c) 67C (d) 68 66C (misuse of password), 66D (cheating
with computer), 66E (publishing private
16. Section of IT Act imposes ne up images of others), 67C (failure to main-
to 1Lakh and imprisonment up to 3 years
tain records by operator), 68 (failure to
for disclosure of wrong information.
(a) 69 (b) 70 comply with orders) & 70 (disclosure of
(c) 67C (d) 68 wrong information) of the IT Act, 2000.
(a) 2 (b) 3
17. Fine up to Rs. may be imposed (c) 5 (d) 7
under sections 66B (receiving stolen mo-
22. Imprisonment up to years may
bile/ computer), 66C (password misuse),
be imposed under section 67 (publishing
66D (cheating with computer), 67 (pub- obscene content) of the IT Act, 2000.
lishing obscene content), 67A (publish- (a) 2 (b) 3
ing sexual content), 67B (publishing child (c) 5 (d) 7
porn) & 70 (disclosure of wrong informa-
tion) of the IT Act, 2000. 23. Imprisonment up to years may be
(a) 1Lakh (b) 2Lakh imposed under sections 67A (publishing
(c) 5Lakh (d) none of them sexual content) & 69 (refusal to decrypt
data) of the IT Act, 2000.
18. Fine up to Rs. may be imposed (a) 2 (b) 3
under sections 65 (tampering with com- (c) 5 (d) 7
puter), 66E (publishing private images of
others) & 68 (failure to comply with or- 24. Imprisonment up to years may be
ders) of the IT Act, 2000. imposed under section 66F (cyber terror-
(a) 1Lakh (b) 2Lakh ism) of the IT Act, 2000.
(c) 5Lakh (d) none of them (a) Life (b) 3
(c) 5 (d) 7
19. Fine up to Rs. may be imposed
under section 66 (hacking) of the IT Act,
20 Answers (864 - 887)
00.
(a) 1Lakh (b) 2Lakh 1. (c) 2. (c) 3. (a) 4. (b)
(c) 5Lakh (d) none of them 5. (c) 6. (d) 7. (a) 8. (b)
9. (c) 10. (d) 11. (a) 12. (b)
20. Imprisonment up to years may 13. (c) 14. (d) 15. (a) 16. (b)
be imposed under section 65 (tampering 17. (a) 18. (b) 19. (c) 20. (a)
with computer documents) of the IT Act, 21. (b) 22. (c) 23. (d) 24. (a)
20
00.
(a) 2 (b) 3
Author: Dr.V.Nagaradjane
64 5.9. INFORMATION TECHNOLOGY (IT) ACT

Author: Dr.V.Nagaradjane
Chapter 6
General Questions on VBA

1. VBA is . (a) Properties window


(a) a Microsoft programming language used to (b) Immediate window
ex-tend Excel functions (c) Project Explorer window
(b) a statistical tool developed by Microsoft for (d) Code window
- nancial analysts
(c) an open-source programming environment 8. Function procedure di ers from Sub pro-
(d) a Microsoft programming environment that re- cedure in that Function procedure:
places Excel (a) refers to a set of programming instructions
that performs some action
2. A unit of VBA code is called a (b) is an information statement that you provide to
(a) subroutine (b) routine VBA
(c) is a set of programming instructions that
(c) macro (d) program returns a single value
3. Which of the following is a program-ming (d) is a code in a VBA module
language that includes built-in com-mands that mimic the 9. Which of the following would you use to
functionality avail-able from menus and dialog boxes declare a variable explicitly?
within (a) Dim statement
an application? (b) Operator
(a) Macro language (c) Do-While loop
(b) HTML (d) Comment tool
(c) FrontPage
10. Which of the following structures is use-ful for
(d) Query-by-example tool
decisions involving three or more
4. Which of the following refers to computer code, options?
in VBA, that performs some action (a) For-Next (b) ElseIf
on or with objects? (c) If-Then (d) Select Case
(a) Excel function
(b) Sub procedure 11. What does VBA stand for?
(c) Primary key (a) Visual Basic for Applications
(d) Integrity constrain (b) Virtual Basic for Advanced programming
(c) Very Basic Applications
5. In VBA, which of the following is a place
(d) Visual Basic Applied
to store a piece of information?
(a) Compartment (b) Variable 12. What is a macro used for?
(c) Macro (d) Field (a) To access programs in Excel
6. Which of the following VBE tools dis-plays a
(b) To create buttons and forms in Excel
tree diagram that consists of every (c) To automatically complete a series of
workbook currently open in Excel? Excel steps
(a) Menu bar (d) To link Excel les together
(b) Code window 13. What does a VBA macro consist of?
(c) Immediate window (a) Excel functions
(d) Project Explorer window (b) Computer code that performs some
7. Which of the following is most useful for actions on or with objects
(c) User instructions and Excel functions
executing VBA statements directly and for
debugging your code?

65
66

(d) Macro instructions that direct the user (a) function (b) sub
applica-tion and provide help to the user (c) visual (d) sub macro
14. Which of the following VBA windows 17. Which of the following would you begin
shows the code of the active object? a comment line with?
(a) Explorer Window (a) Single quote (b) Double quote
(b) Properties window (c) Underscore (d) Equal sign
(c) Immediate window
(d) Code window
15. Which of the following would NOT be a Answers (888 - 904)
good use for a macro?
(a) Inserting a logo on all spreadsheets 1. (a) 2. (c) 3. (a) 4. (b)
(b) Creating a custom button 5. (b) 6. (d) 7. (b) 8. (c)
(c) Performing the same calculation on 9. (a) 10. (d) 11. (a) 12. (c)
multiple workbooks 13. (b) 14. (d) 15. (d) 16. (b)
(d) Computing statistical calculations on data 17. (a)
16. A piece of a macro that completes some
sub task is called a procedure.

Author: Dr.V.Nagaradjane

You might also like