CA ITT Database Online Test
Finish Quiz
0 of 29 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
Information
CA ITT Database Online Test CA Advanced ITT Question and Answers in English. CA ITT Database Online mock test paper is free for all students and Very Helpful for Exam Preparation. CA ITT Database Online Quiz. CA Information Technology Online Test. CA ITT Online Mock test for Database Topic. Here we are providing CA ITT Database Online Test Series in English. Check CA ITT Mock Test Series 2024-2024.
This paper has 30 questions.
Time allowed is 30 minutes.
The CA ITT online Mock Test Exam is Very helpful for all students. Now Scroll down below n click on “Start Quiz” or “Start Test” and Test yourself.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 29 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- Answered
- Review
-
Question 1 of 29
1. Question
Variance Analysis Report provides information on __________.
Correct
Incorrect
-
Question 2 of 29
2. Question
__________ controls are designed to ensure that the integrity of the data entered into
the computer system is maintained.Correct
Incorrect
-
Question 3 of 29
3. Question
Which of the following code type has the demerit of low mnemonic value?
Correct
Incorrect
-
Question 4 of 29
4. Question
_____________ is a record level check though applied for a field.
Correct
Incorrect
-
Question 5 of 29
5. Question
______________ are the grand totals calculated for any code on a document in the batch.
Correct
Incorrect
-
Question 6 of 29
6. Question
__________ are required to check if correct sequence of commands and update
parameters are passed from the application software to the database.Correct
Incorrect
-
Question 7 of 29
7. Question
___________ tables are stored tables from which certain values are extracted for further
processing and storing.Correct
Incorrect
-
Question 8 of 29
8. Question
In ____________ tests, top-level modules are tested first.
Correct
Incorrect
-
Question 9 of 29
9. Question
Which of the following technique is capable of identifying unusual transactions passing
through the system?Correct
Incorrect
-
Question 10 of 29
10. Question
In ___________________ technique, care must be taken to ensure that live data does not
impact actual results.Correct
Incorrect
-
Question 11 of 29
11. Question
_____________ testing is program-based.
Correct
Incorrect
-
Question 12 of 29
12. Question
Test data can be designed through ______________.
Correct
Incorrect
-
Question 13 of 29
13. Question
Which of the following is not required to be recorded in the public audit trail?
Correct
Incorrect
-
Question 14 of 29
14. Question
To select a random sample using MS-Excel 2007, which option of Analysis Tools in
Analysis ToolPak is used?Correct
Incorrect
-
Question 15 of 29
15. Question
Ageing analysis can be done using ________________ functions of Generalized Audit
Software.Correct
Incorrect
-
Question 16 of 29
16. Question
Which of the following is not a limitation of generalized audit software?
Correct
Incorrect
-
Question 17 of 29
17. Question
____ involves embedding audit software modules within an application system to provide
continuous monitoring of the system’s transactions.Correct
Incorrect
-
Question 18 of 29
18. Question
Fraudulent disbursement is included in ________ category of frauds.
Correct
Incorrect
-
Question 19 of 29
19. Question
Gaps testing is covered in _________________.
Correct
Incorrect
-
Question 20 of 29
20. Question
_____________ is ensuring that the originators of messages cannot deny that they in fact
sent the messages to the recipients.Correct
Incorrect
-
Question 21 of 29
21. Question
_____ encompasses logging the selected auditable events.
Correct
Incorrect
-
Question 22 of 29
22. Question
Which of the following is not a reason behind the requirement for controls and auditing in
a computerized setup?Correct
Incorrect
-
Question 23 of 29
23. Question
Which of these is a record check of input data?
Correct
Incorrect
-
Question 24 of 29
24. Question
In ___________________ technique, software is used by the auditor to compare the
executable version of a program with a secure master copy.Correct
Incorrect
-
Question 25 of 29
25. Question
ITF stands for _________________________.
Correct
Incorrect
-
Question 26 of 29
26. Question
Cross reference lister tool can be used in which step of source code review methodology?
Correct
Incorrect
-
Question 27 of 29
27. Question
_______________________ refer(s) to computer programs designed to perform audit
tasks in specific circumstances.Correct
Incorrect
-
Question 28 of 29
28. Question
Concurrent auditing techniques cover or collect data
_____________________________________.Correct
Incorrect
-
Question 29 of 29
29. Question
_______________ can be used to identify unusual or strange items.
Correct
Incorrect