Professional Documents
Culture Documents
Multiple Choice Questions, COPA, Semester-2: Dr.V.Nagaradjane
Multiple Choice Questions, COPA, Semester-2: Dr.V.Nagaradjane
Multiple Choice Questions, COPA, Semester-2: Dr.V.Nagaradjane
Dr.V.Nagaradjane
Author: Dr.V.Nagaradjane
Contents
1 Javascript 1
1.1 Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Flowcharts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.3 Web servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Features of web servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5 Programming languages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5.1 Compiler based programming languages . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5.2 Interpreter based programming languages . . . . . . . . . . . . . . . . . . . . . . . 4
1.6 Introduction to JavaScript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.7 JavaScript Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.8 JavaScript data types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.9 Special characters in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.10 Strings in JavaScript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.11 Operators in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.12 Math functions in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.13 Control statements in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.14 Loops in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.15 Functions in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.16 Objects in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.17 Array and data objects in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.18 Browser Object Model (BOM) in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.19 Document Object Model (DOM) in Javascript . . . . . . . . . . . . . . . . . . . . . . . . 15
1.19.1 Cookies in Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
iii
iv CONTENTS
3 Smart accounting 37
3.1 Basics of accounting . . . . . . . . . . . . . . . . . . . . . . ................ 37
3.2 Methods of accounting . . . . . . . . . . . . . . . . . . . . . ................ 37
3.3 Accounting concept . . . . . . . . . . . . . . . . . . . . . . ................ 38
3.4 Golden rules of double entry system . . . . . . . . . . . . . . ................ 39
3.5 Accounting termonologies . . . . . . . . . . . . . . . . . . . ................ 39
3.6 Voucher entry . . . . . . . . . . . . . . . . . . . . . . . . . ................ 39
3.7 Preparation of nal accounts . . . . . . . . . . . . . . . . . ................ 40
3.8 Cash book . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ 40
3.9 Ratio analysis . . . . . . . . . . . . . . . . . . . . . . . . . ................ 41
3.10 Depreciation . . . . . . . . . . . . . . . . . . . . . . . . . . ................ 42
3.11 Stock management . . . . . . . . . . . . . . . . . . . . . . . ................ 42
3.12 VAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ 43
3.13 Cash & fund ow . . . . . . . . . . . . . . . . . . . . . . . ................ 43
3.14 Tally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ 44
3.15 Accounting in Tally . . . . . . . . . . . . . . . . . . . . . . ................ 44
3.16 Shortcuts in Tally . . . . . . . . . . . . . . . . . . . . . . . ................ 45
3.17 Double entry system in Tally . . . . . . . . . . . . . . . . . . ................ 46
3.18 Budgeting system in Tally . . . . . . . . . . . . . . . . . . . ................ 47
3.19 Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ 47
3.20 Variance & ratio analysis . . . . . . . . . . . . . . . . . . . . ................ 48
3.21 Analysis of nancial statements . . . . . . . . . . . . . . . . ................ 48
3.22 Inventory basics . . . . . . . . . . . . . . . . . . . . . . . . ................ 48
3.23 POS Invoicing . . . . . . . . . . . . . . . . . . . . . . . . . ................ 49
3.24 Taxation in Tally . . . . . . . . . . . . . . . . . . . . . . . . ................ 49
3.25 Languages in Tally . . . . . . . . . . . . . . . . . . . . . . . ................ 50
4 E-Commerce 51
4.1 Introduction to E-Commerce . . . . . . . . . . . . . . . . . . ................ 51
4.2 Types of E-Commerce . . . . . . . . . . . . . . . . . . . . . ................ 51
4.3 Scope of E-Commerce platforms . . . . . . . . . . . . . . . . ................ 51
4.4 Bene ts of E-Commerce . . . . . . . . . . . . . . . . . . . . ................ 52
4.5 Capabilities required for E-Commerce platform . . . . . . . . ................ 52
4.6 Di erences between E-Commerce and traditional commerce . ................ 53
4.7 Types of E-Commerce websites . . . . . . . . . . . . . . . . ................ 53
4.8 Modes of payment for E-Commerce . . . . . . . . . . . . . . ................ 54
4.9 Payment gateway . . . . . . . . . . . . . . . . . . . . . . . ................ 55
4.10 General questions on E-Commerce . . . . . . . . . . . . . . . ................ 55
Author: Dr.V.Nagaradjane
CONTENTS v
5 Cyber security 59
5.1 Introduction to cyber security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
5.2 Threats to information security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
5.3 Vulnerability and risk management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.4 Directory service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.5 Access control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.6 Software development security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
5.7 Privacy protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
5.8 Information security audit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
5.9 Information Technology (IT) Act . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Author: Dr.V.Nagaradjane
vi CONTENTS
Author: Dr.V.Nagaradjane
3. The circle symbol denotes op-
Chapter 1 (a) eration in owchart.
start/ end
(b) continuation/ connector
(c) ow direction
Javascript (d)
4.
input/ output
The parallelogram symbol denotes
operation in owchart.
(a) start/ end
1.1 (b) continuation/ connector
(c) ow direction
Algorithms (d) input/ output
(a) explanation
(c) algorithm
Answers (1 - 1)
1. (c)
1.2
Flowcharts
1. Graphical
representation of the ow of
program is
called
(a
) executable code
(b
) ow chart
(c
) source code
(d
) algorithm
The oval symbol
2. denotes
eration in
owchart.
(a) start/ end
(b) continuation/
connector
(c) ow direction
(d) input/ output
(c) decision makin
(d) input/ output
8.
start/ end of
(a)
(b)
(a) start/ end (c) -
(b) continuation/
connector (d)
(c) ow direction
9.
(d) input/ output
6. The rectangle symbol continuation
denotes
operation in
owchart.
(a) start/ end (a)
(b) processing
(c) decision making/ (b)
looping (c) -
(a)
1
2 1.3. WEB SERVERS
(d)
Answers (2 - 14) 9. Scripting languages like PHP, Perl,
Python, ASP.NET, etc., executed by a
1. (b) 2. (a) 3. (b) 4. (d) web server are called side
5. (c) 6. (b) 7. (c) 8. (a) scripts.
9. (b) 10. (c) 11. (d) 12. (a) (a) server (b) client
13. (c) (c) way (d) unrelated
10. Scripting languages like Javascript, VB-
Script, etc., executed by a browser are
1.3 Web servers called side scripts.
(a) server (b) client
1. Web servers send pages in re- (c) way (d) unrelated
sponse to client request.
(a) Word documents 11. is a popular open source web
(b) A
L TEX documents server available free of cost.
(c) Powerpoint documents (a) Apache
(b) Microsoft Internet Information Server
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 3
5. Normally, the URL for an HTML docu- 7. Compiled machine code runs in-
ment begins with . terpreted source code.
(a) faster than (b) slower than
(a) http
(c) as fast as (d) none of them
(b) https
(c) both a and b 8. Assembly language, C, C++, Java, C#
7. operator in Javascript
compares whether two expressions are
EQUAL.
(a) == (b) !=
(c) === (d) !==
8. operator in Javascript
compares whether two expressions are
EQUAL using strict comparison rules.
(a) == (b) !=
(c) === (d) !==
(c) <= (d) >=
(c) === (d) !==
15. operator in Javascript
10. operator in Javascript com- compares whether the left side expression
pares whether two expressions are NOT is LESS THAN OR EQUAL TO the right
EQUAL using strict comparison rules. side one.
(a) == (b) != (a) < (b) >
(c) === (d) !== (c) <= (d) >=
Author: Dr.V.Nagaradjane
10 1.12. MATH FUNCTIONS IN JAVASCRIPT
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 13
Author: Dr.V.Nagaradjane
16 1.19. DOCUMENT OBJECT MODEL (DOM) IN JAVASCRIPT
methods/properties.
(a) isMap/ useMap Answers (218 - 230)
(b) naturalHeight/ naturalWidth
(c) width/ height/ vspace 1. (a) 2. (a) 3. (d) 4. (d)
(d) all of them 5. (a) 6. (c) 7. (b) 8. (b)
9. (b) 10. (d) 11. (a) 12. (c)
11. property of Javascript helps 13. (a)
to set a cookie.
(a) document.cookie
(b) window.alert
Author: Dr.V.Nagaradjane
Chapter 2
Visual Basic for Application (VBA)
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 19
3. In VBA, the function AscW converts 12. In VBA, CByte function converts String
given character value to numeric code in
to type.
system. (a)number (b) byte
(a) American Standard Code for Information Inter- (c)Currency (d) Decimal
change (ASCII) In VBA, CCur function converts String
13. to type.
(b) Double Byte Character Set (DBCS) number (b) byte
(c) Unicode (a)Currency (d) Decimal
(d) none of them (c)
In VBA, CLng function converts String
4. In VBA, the function Chr converts given 14. to type.
numeric value to character value in Long (b) byte
Currency (d) Decimal
system. (a)
(a) American Standard Code for Information Inter- (c) In VBA, CDec function converts String
change (ASCII) to type.
15. number (b) byte
(b) Double Byte Character Set (DBCS) Currency (d) Decimal
(c) Unicode
(a)
(d) none of them
(c)
5. In VBA, the function ChrB converts
system.
(a) Format (b) CVErr
(a) American Standard Code for Information Inter-
(c) InputBox (d) MsgBox
change (ASCII)
(b) Double Byte Character Set (DBCS) 17. function in VBA formats a num-
ber according to given text strings con-
(c) Unicode
taining 0, # and comma (,).
(d) none of them
(a) Format (b) CVErr
6. In VBA, the function ChrW converts
(c) InputBox (d) MsgBox
given numeric value to character value in
18. function in VBA displays a mes-
system.
(a) American Standard Code for Information Inter- sage.
(a) Format (b) CVErr
change (ASCII)
(c) InputBox (d) MsgBox
(b) Double Byte Character Set (DBCS)
to type.
(a) Integer (b) Double
(c) Single (d) String
Answers (261 - 279)
8. CDbl function converts String to
type.
1. (a) 2. (b) 3. (c) 4. (a)
(a) Integer (b) Double
5. (b) 6. (c) 7. (d) 8. (b)
(c) Single (d) String
9. (a) 10. (c) 11. (a) 12. (b)
9. In VBA, CInt function converts String to
13. (c) 14. (a) 15. (d) 16. (b)
type.
17. (a) 18. (d) 19. (c)
(a) Integer (b) Double
(c) Single (d) String
10. In VBA, Csng function converts String 2.3 Data types in VBA
to type.
1. data type in VBA stores true or
(a) Integer (b) Double
false values.
(c) Single (d) String
(a) Boolean (b) Integer
11. In VBA, Val function converts String to (c) Byte (d) Long
type. 2. Boolean data type in VBA has size of
(a) number (b) byte .
(c) Currency (d) Decimal
Author: Dr.V.Nagaradjane
20 2.3. DATA TYPES IN VBA
(a)1 byte (b) 2bytes 12. Double data type in VBA can store values
(c)3 bytes (d) 4bytes
in the range of .
3. Byte data type in VBA has size of
. (a) 1:79769313486232E308 to
(a) 1 byte (b) 2bytes 4:94065645841247E324
(b) -32,768 to +32,767
(c) 3 bytes (d) 4bytes
(c) -2,147,483,648 to +2,147,483,647
4. Byte in VBA can store values in the range (d) 3:402823E38 to 1:401298E45
of .
(a) 0 to 255 13. Integer data type in VBA has size of
.
(b) -922,337,203,685,477.5808 to +-
(a) 14 bytes (b) 8 bytes
922,337,203,685,477.5807
(c) 01-Jan-100 to 31-Dec-9999 (c) 4 bytes (d) 2 bytes
(d) 79; 228; 162; 514; 264; 337; 593; 543; 950; 335 14. Integer data type in VBA can store values
or 7:9228162514264337593543950335 in the range of .
5. Currency data type in VBA has size of (a) 1:79769313486232E308 to
. 4:94065645841247E324
(a) 2 bytes (b) 3 bytes (b) -32,768 to +32,767
(c) 4 bytes (d) 8 bytes (c) -2,147,483,648 to +2,147,483,647
6. Currency data type in VBA can store val- (d) 3:402823E38 to 1:401298E45
ues in the range of . 15. Long data type in VBA has size of
(a) 0 to 255 .
(b) -922,337,203,685,477.5808 to +- (a) 14 bytes (b) 8bytes
922,337,203,685,477.5807 (c) 4 bytes (d) 2bytes
(c) 01-Jan-100 to 31-Dec-9999 16. Long data type in VBA can store values
(d) 79; 228; 162; 514; 264; 337; 593; 543; 950; 335 in the range of .
or 7:9228162514264337593543950335 (a) 1:79769313486232E308 to
7. Date data type in VBA has size of 4:94065645841247E324
. (b) -32,768 to +32,767
(a) 2 bytes (b) 3 bytes (c) -2,147,483,648 to +2,147,483,647
(c) 4 bytes (d) 8 bytes (d) 3:402823E38 to 1:401298E45
8. Date data type in VBA can store values 17. Single data type in VBA has size of
in the range of . .
(a) 0 to 255 (a) 14 bytes (b) 8bytes
(b) -922,337,203,685,477.5808 to +- (c) 4 bytes (d) 2bytes
922,337,203,685,477.5807 18. Single data type in VBA can store values
(c) 01-Jan-100 to 31-Dec-9999 in the range of .
(d) 79; 228; 162; 514; 264; 337; 593; 543; 950; 335 (a) 1:79769313486232E308 to
or 7:9228162514264337593543950335 4:94065645841247E324
9. Decimal data type in VBA has size of (b) -32,768 to +32,767
. (c) -2,147,483,648 to +2,147,483,647
(a) 14 bytes (b) 8 bytes (d) 3:402823E38 to 1:401298E45
(c) 4 bytes (d) 2 bytes
19. Object data type in VBA has size of
10. Decimal data type in VBA can store val- .
ues in the range of . (a) 14 bytes (b) 8 bytes
(a) 0 to 255 (c) 4 bytes (d) 2 bytes
(b) -922,337,203,685,477.5808 to +- 20. String data type in VBA has size of
922,337,203,685,477.5807 .
(c) 01-Jan-100 to 31-Dec-9999 (a) 14 bytes
(d) 79; 228; 162; 514; 264; 337; 593; 543; 950; 335 (b) 10+length of string bytes
or 7:9228162514264337593543950335 (c) 4 bytes
11. Double data type in VBA has size of (d) 2 bytes
.
(a) 14 bytes (b) 8 bytes 21. String data type in VBA can store a max-
(c) 4 bytes (d) 2 bytes imum of characters.
(a) 65,400
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 21
Author: Dr.V.Nagaradjane
22 2.6. CONCATENATION OPERATORS IN VBA
(b) false
(c) neither true nor false 3. In VBA, using operator for
(d) both true and false concatenation results concatenation of
Strings, irrespective of numeric or alpha-
9. What would be the result of the
numeric value stored in the Strings.
following comparison?: (a) & (b) $
5=3
(a) true (c) # (d) +
(b) false 4. Choose the result of the following VBA
(c) neither true nor false expression:
(d) both true and false x = "20" + "32"
(a) 2032 (b) 52
10. What would be the result of the
(c) 3220 (d) ""
following comparison?:
5 <= 3 5. Choose the result of the following VBA
(a) true expression:
(b) false Choose the result of the following
(c) neither true nor false VBA expression:
(d) both true and false x = "20" & "32"
(a) 2032 (b) 52
11. What would be the result of the
(c) 3220 (d) ""
following comparison?:
5 >= 3 6. Choose the result of the following VBA
(a) true expression:
(b) false x = "Hi, " + "how are you?"
(c) neither true nor false (a) "how are you, Hi?"
(d) both true and false (b) "Hi: how are you"
12. What would be the result of the (c) "Hi, how are you?"
following comparison?: (d) "Hi?"
5=3 7. Choose the result of the following VBA
(a) true expression:
(b) false x = "Hi, " & "how are you?"
(c) neither true nor false (a) "how are you, Hi?"
(d) both true and false (b) "Hi: how are you"
(c) "Hi, how are you?"
(d) "Hi?"
Answers (309 - 320)
1. (a) 2. (b) 3. (c) 4. (d) Answers (321 - 327)
5. (a) 6. (b) 7. (b) 8. (a)
9. (b) 10. (b) 11. (a) 12. (b) 1. (a) 2. (d) 3. (a) 4. (b)
5. (a) 6. (c) 7. (c)
4. From the following VBA code, select the (a) ISARRAY (b) FILTER
correct statement from given choices: Dim a(1) (c) ERASE (d) none of them
a(0)=10 14. function in VBA removes all ele-
a(1)=20 ments of an array.
REDIM PRESERVE a(2) (a) ISARRAY (b) FILTER
a(2)=30 (c) ERASE (d) none of them
(a) declares an array a with 2 elements
(b) assigns 10 and 20 at indices 0 and 1
(c) resizes the array to have 3 elements and Answers (403 - 416)
assigns 30 to array index 2
(d) all of them 1. (a) 2. (d) 3. (b) 4. (d)
5. A matrix can be represented using a 5. (b) 6. (b) 7. (c) 8. (a)
9. (b) 10. (c) 11. (d) 12. (b)
dimensional array in VBA. 13. (a) 14. (c)
(a) 1 (b) 2
(c) 3 (d) 4
6. The following VBA statement declares a 2.13 Conditions in VBA
dimensional array.
Dim a(3,4)
(a) 1 (b) 2 1. and are the conditional
statements available in VBA.
(c) 3 (d) 4 (a) IF ... Then and Select Case
(b) For and While
7. keyword in VBA causes previ-
(c) Do While and Do Until
ous elements of array to be kept in the
(d) none of them
new array.
(a) NEW (b) DIM 2. IF condition in VBA ends with
(c) PRESERVE (d) NEXT statement.
(a) ElseIf (b) End If
8. function in VBA returns the
(c) Else (d) Then
smallest index for given array.
(a) LBOUND (b) UBOUND 3. The line containing IF ends with
(c) SPLIT (d) JOIN keyword.
9. function in VBA returns the (a) ElseIf (b) End If
largest index for given array. (c) Else (d) Then
(a) LBOUND (b) UBOUND 4. Several successive conditions may be
(c) SPLIT (d) JOIN checked using statement of IF
condition.
10. function in VBA divides a string into (a) ElseIf (b) End If
an array at the occurrence of speci- (c) Else (d) Then
ed substring.
(a) LBOUND (b) UBOUND 5. In case none of the conditions in an IF
(c) SPLIT (d) JOIN ladder is ful lled, statements in
block are executed.
11. function in VBA joins elements of an (a) ElseIf (b) End If
array and creates a string with spec- (c) Else (d) Then
i ed separator.
6. In the following VBA code, nd out the
(a) LBOUND (b) UBOUND
possible bug/error:
(c) SPLIT (d) JOIN
Dim x as Integer
12. function in VBA returns ele-ments x=5
which ful ll certrain search crite- If x < 5
rion. End If
(a) ISARRAY (b) FILTER (a) End If is missing
(c) ERASE (d) none of them (b) Then keyword is missing at the end of If
13. function in VBA returns true if the (c) The condition in If statement is incorrect
argument is an array. (d) none of them
Author: Dr.V.Nagaradjane
28 2.14. LOOPS IN VBA
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 31
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 33
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 35
8. After program stops due to error or break- (b) Choosing Run >Break or pressing Ctrl+Break
point, execution can be moved to the (c) choosing Run >Reset
start of a line by . (d) none of them
(a) choosing Debug >Step Into 12. After program stops due to error or
(b) Pressing F8 breakpoint, one can break execution by
(c) both a & b .
(d) neither a nor b (a) choosing Run >Continue
9. After program stops due to error or break- (b) Choosing Run >Break or pressing Ctrl+Break
point, execution can be moved to the end (c) choosing Run >Reset
of a lineby . (d) none of them
(a) choosing Debug >Step Over 13. After program stops due to error or break-
(b) Pressing Shift+F8 point, one can reset the execution by
(c) both a & b .
(d) neither a nor b (a) choosing Run >Continue
10. After program stops due to error or break- (b) Choosing Run >Break or pressing Ctrl+Break
point, line by line execution may be ended (c) choosing Run >Reset
by . (d) none of them
(a) choosing Debug >Step Out
(b) Pressing Ctrl+Shift+F8
(c) both a & b Answers (526 - 538)
(d) neither a nor b
1. (c) 2. (c) 3. (c) 4. (b)
11. After program stops due to error or break- 5. (c) 6. (c) 7. (a) 8. (c)
point, one can continue execution by 9. (c) 10. (c) 11. (a) 12. (b)
.
13. (c)
(a) choosing Run >Continue
Author: Dr.V.Nagaradjane
36 2.26. DEBUGGING TECHNIQUES IN VBA
Author: Dr.V.Nagaradjane
Chapter 3
Smart accounting
37
38 3.3. ACCOUNTING CONCEPT
8. considers in ow of money to
Answers (564 - 566) the business due to sales.
(a) Double entry accounting
1. (a) 2. (b) 3. (c) (b) Expense
(c) Income or revenue
(d) Debit
3.5 Accounting termonologies
1. is a record of all monetary Answers (567 - 574)
transactions.
(a) Accrual basis 1. (d) 2. (c) 3. (a) 4. (b)
(b) Asset 5. (d) 6. (a) 7. (b) 8. (c)
(c) Credit
(d) Account
Author: Dr.V.Nagaradjane
40 3.7. PREPARATION OF FINAL ACCOUNTS
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 41
current liabilities
ratio.
(a) current (a) net worth
(b) quick (b) price earnings (PE)
(c) absolute liquid (c) dividend yield
(d) gross pro t (d) net pro t
4. The ratio between absolute liq- 10. The ratio between net sales and in-
uid assets and current liabilities net sales
absolute liquid assets is called current liabilities ventory value inventory value is called
ratio. ratio.
(a) current (a) inventory
(b) quick (b) price earnings (PE)
(c) absolute liquid (c) overall pro t ratio
(d) gross pro t (d) net pro t
5. The ratio between gross pro t and net 11. The ratio between net pro t and total as-
gross prof it net prof it
sales is called
sets is called ra-
tio. total assets
(a) inventory
tio. net sales
(b) price earnings (PE)
(c) overall pro tability
(d) divident yield
Author: Dr.V.Nagaradjane
42 3.10. DEPRECIATION
4. Storing very low reserve stock resulting 3.13 Cash & fund ow
in disruption of production/sale is called
level. 1. Movement of money into and out of a
(a) stock business is called ow.
(b) overstocking (a) stock (b) cash
(c) understocking (c) rate (d) VAT
(d) reorder 2. In ow and out ow of money in a business
is called ow.
(a) stock (b) cash
Answers (618 - 621) (c) rate (d) VAT
1. (a) 2. (d) 3. (b) 4. (c) 3. In ow of money the strength of
business.
(a) increases
3.12 VAT (b) decreases
(c) does not a ect
1. VAT stands for in taxation. (d) none of them
(a) Value Added Tax
(b) Value Amount Tax 4. Out ow of money the strength
(c) Visual Added Tax of business.
(d) Value Asset Tax (a) increases
(b) decreases
2. The di erence between sales value and (c) does not a ect
purchase value of a product is called (d) none of them
.
(a) value addition 5. Money held in the form of account bal-
ance and cash is generally called .
(b) rate (a) fund (b) liquid money
(c) cost (c) voucher (d) journal
(d) sales
6. In ow and out ow of funds in the form
of currency and account balance is called
Answers (622 - 623) (a) stock ow
.
(b) ledger
1. (a) 2. (a) (c) voucher (d) fund ow
Author: Dr.V.Nagaradjane
44 3.14. TALLY
(c) loss
3.14 Tally
1. Tally is a software.
(a) spreadsheet (b) accounting
(c) publishing (d) animation
Author: Dr.V.Nagaradjane
46 3.17. DOUBLE ENTRY SYSTEM IN TALLY
(c) Alt+F7 (d) Alt+F10
(a) F10 (b) Ctrl+F10 32. is the shortcut to rejection in
(c) Alt+I (d) Alt+V from Inventory Vouchers in Tally.
21. is the shortcut to voucher
as invoice from Accounting Vouchers in
Tally.
(a) F10 (b) Ctrl+F10
(c) Alt+I (d) Ctrl+V
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 47
Author: Dr.V.Nagaradjane
48 3.20. VARIANCE & RATIO ANALYSIS
51
52 4.4. BENEFITS OF E-COMMERCE
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 55
12. In an on line marketplace, transactions 21. What is the full form of CSP in ecom-
merce?
are processed by . (a) Card Service Provider
(a) marketplace operator (b) Customer Service Provider
(b) customer (c) central Service Provider
(c) seller (d) none of them
(d) none of them 22. What is the full form of ACH in ecom-
13. Example of an online marketplace are merce?
. (a) Association of Clearing Houses
(a) eBay (b) Snapdeal (b) Anonymous Cleansing House
(c) Flipkart (d) all of them (c) Automatic Clearing House
14. Which of the following ecommerce plat- (d) none of them
forms allows consumers to buy goods di- 23. What is the full form of BITS in ecom-
rectly from seller over the Internet? merce?
(a) e-webshop (b) e-shopping (a) Bihartiya Institute of Technology & Society
(c) e-webstore (d) all of them (b) Banking Industry Technology Secretariat
(c) Banking Institute of Technology & Society
15. Which software model allows accumula-
(d) none of them
tion of a list of items before making the
online purchase? 24. Which system facilitates the adoption of
(a) online shopping electronic payment for online transac-
(b) e-shopping tions?
(c) shopping cart (a) motivated electronic purchase system
(d) none of them (b) electronic payment system
(c) online payment system
16. What is the name of front page of a web
(d) none of them
store accessed by visitors to the online
shop? 25. What is the ll form of CVN in ecom-
(a) storefront (b) webfront merce?
(a) Card Veri cation Number
(c) e-store (d) none of them
(b) Commerce Veri ed Number
17. If a company sends bills over the Internet (c) Consumer Veri ed Number
and consumers pay the bills online, it is (d) none of them
called .
(a) Internet billing 26. In system, payment gateway al-lows
(b) web billing the consumer to specify the bank from
(c) electronic billing which payment should be made.
(d) none of them (a) e-pay banking
(b) e-commerce banking
18. Which parties are involved in electronic
(c) net banking
billing?
(a) billers (d) none of them
(b) bankers 27. What can be used by a consumer and
(c) consolidators accepted by a merchant for making pay-
(d) all of them ments?
(a) merchant card
19. What is the full form of BPP in ecom- (b) payment card
merce?
(a) Biller Payment Provider (c) visiting card
(b) Biller Provision Provider (d) none of them
(c) Biller Payment Protector 28. What is the size of payment card?
(d) none of them (a) 85:60 53:98cm
20. What is the full form of BSP in ecom- (b) 85:60 53:98mm
merce? (c) 85:60 53:98m
(a) Biller Service Protector (d) none of them
(b) Biller Service Provider 29. The default period of loan for a credit
(c) Biller Service Packer card holder is days.
(d) none of them
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 57
Author: Dr.V.Nagaradjane
58 4.10. GENERAL QUESTIONS ON E-COMMERCE
Author: Dr.V.Nagaradjane
Chapter 5
Cyber security
59
60 5.3. VULNERABILITY AND RISK MANAGEMENT
Author: Dr.V.Nagaradjane
62 5.8. INFORMATION SECURITY AUDIT
Author: Dr.V.Nagaradjane
Q. Bank [COPA Semester - 2] 63
(c) 5 (d) 7
15. Section of IT Act imposes unde-
ned ne amount and imprisonment up 21. Imprisonment up to years may
to 7 years for refusal to decrypt data. be imposed under sections 66 (hacking),
(a) 69 (b) 70 66B (receiving stolen computer/ mobile),
(c) 67C (d) 68 66C (misuse of password), 66D (cheating
with computer), 66E (publishing private
16. Section of IT Act imposes ne up images of others), 67C (failure to main-
to 1Lakh and imprisonment up to 3 years
tain records by operator), 68 (failure to
for disclosure of wrong information.
(a) 69 (b) 70 comply with orders) & 70 (disclosure of
(c) 67C (d) 68 wrong information) of the IT Act, 2000.
(a) 2 (b) 3
17. Fine up to Rs. may be imposed (c) 5 (d) 7
under sections 66B (receiving stolen mo-
22. Imprisonment up to years may
bile/ computer), 66C (password misuse),
be imposed under section 67 (publishing
66D (cheating with computer), 67 (pub- obscene content) of the IT Act, 2000.
lishing obscene content), 67A (publish- (a) 2 (b) 3
ing sexual content), 67B (publishing child (c) 5 (d) 7
porn) & 70 (disclosure of wrong informa-
tion) of the IT Act, 2000. 23. Imprisonment up to years may be
(a) 1Lakh (b) 2Lakh imposed under sections 67A (publishing
(c) 5Lakh (d) none of them sexual content) & 69 (refusal to decrypt
data) of the IT Act, 2000.
18. Fine up to Rs. may be imposed (a) 2 (b) 3
under sections 65 (tampering with com- (c) 5 (d) 7
puter), 66E (publishing private images of
others) & 68 (failure to comply with or- 24. Imprisonment up to years may be
ders) of the IT Act, 2000. imposed under section 66F (cyber terror-
(a) 1Lakh (b) 2Lakh ism) of the IT Act, 2000.
(c) 5Lakh (d) none of them (a) Life (b) 3
(c) 5 (d) 7
19. Fine up to Rs. may be imposed
under section 66 (hacking) of the IT Act,
20 Answers (864 - 887)
00.
(a) 1Lakh (b) 2Lakh 1. (c) 2. (c) 3. (a) 4. (b)
(c) 5Lakh (d) none of them 5. (c) 6. (d) 7. (a) 8. (b)
9. (c) 10. (d) 11. (a) 12. (b)
20. Imprisonment up to years may 13. (c) 14. (d) 15. (a) 16. (b)
be imposed under section 65 (tampering 17. (a) 18. (b) 19. (c) 20. (a)
with computer documents) of the IT Act, 21. (b) 22. (c) 23. (d) 24. (a)
20
00.
(a) 2 (b) 3
Author: Dr.V.Nagaradjane
64 5.9. INFORMATION TECHNOLOGY (IT) ACT
Author: Dr.V.Nagaradjane
Chapter 6
General Questions on VBA
65
66
(d) Macro instructions that direct the user (a) function (b) sub
applica-tion and provide help to the user (c) visual (d) sub macro
14. Which of the following VBA windows 17. Which of the following would you begin
shows the code of the active object? a comment line with?
(a) Explorer Window (a) Single quote (b) Double quote
(b) Properties window (c) Underscore (d) Equal sign
(c) Immediate window
(d) Code window
15. Which of the following would NOT be a Answers (888 - 904)
good use for a macro?
(a) Inserting a logo on all spreadsheets 1. (a) 2. (c) 3. (a) 4. (b)
(b) Creating a custom button 5. (b) 6. (d) 7. (b) 8. (c)
(c) Performing the same calculation on 9. (a) 10. (d) 11. (a) 12. (c)
multiple workbooks 13. (b) 14. (d) 15. (d) 16. (b)
(d) Computing statistical calculations on data 17. (a)
16. A piece of a macro that completes some
sub task is called a procedure.
Author: Dr.V.Nagaradjane