MSCIT Data Base Management Mock Test
Finish Quiz
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
MSCIT Data Base Management Online Test, Data Base Management Test In English. MSCIT Online Test is designed for Various Govt. Exams Held in Maharashtra. Check MSCIT Data Base Management Question and Answers.The MSCIT Full Mock test paper is free for all students. By practicing with the MSCIT Mock Tests given here, you will not only be prepared about the type of exam, but also be able to judge and plan your preparation with the CAknowledge preparation analysis. Now scroll down below n check various “MSCIT Mock Test Papers, MSCIT Model Test Papers Online”
This paper has 30 questions.
Time allowed is 30 minutes.
The MSCIT online Mock Test Exam for Data Base Management is Very helpful for all students who are appearing in MKCL MSCIT exams and onwards… Now Scroll down below n click on “Start Quiz” or “Start Test” and Test yourself.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
The DBMS acts as an interface between what two components of an enterprise-class database system?
Correct
Incorrect
-
Question 2 of 30
2. Question
Variance Analysis Report provides information on __________.
Correct
Incorrect
-
Question 3 of 30
3. Question
__________ controls are designed to ensure that the integrity of the data entered into
the computer system is maintained.Correct
Incorrect
-
Question 4 of 30
4. Question
Which of the following code type has the demerit of low mnemonic value?
Correct
Incorrect
-
Question 5 of 30
5. Question
_____________ is a record level check though applied for a field.
Correct
Incorrect
-
Question 6 of 30
6. Question
______________ are the grand totals calculated for any code on a document in the batch.
Correct
Incorrect
-
Question 7 of 30
7. Question
__________ are required to check if correct sequence of commands and update
parameters are passed from the application software to the database.Correct
Incorrect
-
Question 8 of 30
8. Question
___________ tables are stored tables from which certain values are extracted for further
processing and storing.Correct
Incorrect
-
Question 9 of 30
9. Question
In ____________ tests, top-level modules are tested first.
Correct
Incorrect
-
Question 10 of 30
10. Question
Which of the following technique is capable of identifying unusual transactions passing
through the system?Correct
Incorrect
-
Question 11 of 30
11. Question
In ___________________ technique, care must be taken to ensure that live data does not
impact actual results.Correct
Incorrect
-
Question 12 of 30
12. Question
_____________ testing is program-based.
Correct
Incorrect
-
Question 13 of 30
13. Question
Test data can be designed through ______________.
Correct
Incorrect
-
Question 14 of 30
14. Question
Which of the following is not required to be recorded in the public audit trail?
Correct
Incorrect
-
Question 15 of 30
15. Question
To select a random sample using MS-Excel 2007, which option of Analysis Tools in
Analysis ToolPak is used?Correct
Incorrect
-
Question 16 of 30
16. Question
Ageing analysis can be done using ________________ functions of Generalized Audit
Software.Correct
Incorrect
-
Question 17 of 30
17. Question
Which of the following is not a limitation of generalized audit software?
Correct
Incorrect
-
Question 18 of 30
18. Question
____ involves embedding audit software modules within an application system to provide
continuous monitoring of the system’s transactions.Correct
Incorrect
-
Question 19 of 30
19. Question
Fraudulent disbursement is included in ________ category of frauds.
Correct
Incorrect
-
Question 20 of 30
20. Question
Gaps testing is covered in _________________.
Correct
Incorrect
-
Question 21 of 30
21. Question
_____________ is ensuring that the originators of messages cannot deny that they in fact
sent the messages to the recipients.Correct
Incorrect
-
Question 22 of 30
22. Question
_____ encompasses logging the selected auditable events.
Correct
Incorrect
-
Question 23 of 30
23. Question
Which of the following is not a reason behind the requirement for controls and auditing in
a computerized setup?Correct
Incorrect
-
Question 24 of 30
24. Question
Which of these is a record check of input data?
Correct
Incorrect
-
Question 25 of 30
25. Question
In ___________________ technique, software is used by the auditor to compare the
executable version of a program with a secure master copy.Correct
Incorrect
-
Question 26 of 30
26. Question
ITF stands for _________________________.
Correct
Incorrect
-
Question 27 of 30
27. Question
Cross reference lister tool can be used in which step of source code review methodology?
Correct
Incorrect
-
Question 28 of 30
28. Question
_______________________ refer(s) to computer programs designed to perform audit
tasks in specific circumstances.Correct
Incorrect
-
Question 29 of 30
29. Question
Concurrent auditing techniques cover or collect data
_____________________________________.Correct
Incorrect
-
Question 30 of 30
30. Question
_______________ can be used to identify unusual or strange items.
Correct
Incorrect