ADV Sample Question-split PDF
Document Details
Uploaded by SmoothConnemara2387
ICAI
Tags
Related
Summary
This document contains sample questions about ERP systems and auditing. It covers topics such as risks in an automated environment, internal control frameworks, and information systems.
Full Transcript
S.NO QUESTION ANSWER OPTION A OPTION B OPTION C OPTION D ANSWER...
S.NO QUESTION ANSWER OPTION A OPTION B OPTION C OPTION D ANSWER None of the 1 Which of these is an ERP Systems? All the above SAP Oracle All the above C above ______states that the objective of the auditor is to identify and None of the 2 assess the risks of material misstatement whether due to fraud SA315 SA330 SA315 SA300 B above or error including the including the excluding the excluding the including the entity's As per SA315,understanding the entity and its control entity's internal entity's external entity's internal entity's external 3 internal control A environment means _____ control control control control frameworks frameworks frameworks frameworks frameworks As per SA315,the auditor has to understand the information Financial 4 Both A & B Communication Either A or B Both A & B D systems environment relevan to _____ reporting In Governance Framework,The _______ is the owner of the None of the 5 IT team Business team IT team Either A or B B application above In Governance Framework,The _______ is the owner of the None of the 6 Business team Business team IT team Either A or B A data residing within the application above The communication lines are strictly drawn between the Chief 7 Information Officer and Chief Financial Officer so as to integrity confidentiality integrity availability All the above B maintain the ____ of the data within the application 8 The risk in an automated environment are _____ many less many moderate All the above B due to the interfaces number and security within 9 The risk in an automated environment may be ______ All the above between the All the above D location of the applications applications applications 143,internal 143,external In addtion to SA315,the auditor's in response to Clause (i) of 142,internal 142,external 143,internal financial financial financial 10 Sub-Section 3 of Section _____ of the Companies Act,2013,have controls system controls system B controls system in place controls system controls system to report whether the entity has adequate ______ in place in place in place in place ______ deals with the auditor's respnsibility to design and None of the 11 implement responses in the form of audit procedures in SA 330 SA 330 SA 300 SA 610 A above response to work done as part of SA 315. unlisted 12 The audit procedures are required for the _______ Both A & B listed companies Either A or B Both A & B D companies integrated A/An ______system inherently means that all the modules Enterprise integrated Enterprise Enterprise Entity resource None of the 13 within the system are seamlessly connected with each other and resource B resource planning resource planning above the transactions flow through the relevant modules planning planning In ERP,____Primary set of Books are there and _____ 14 one,all one,few many,all one,all many,few C transactions reside here. Systems Systems distributed volume of Which of these is not the possible reason of why substantive nature of outsourced distributed 15 within the same transactions are D procedures may not be feasible in ERP? business processes within the same geographies high geographies International International International Standard Indian Standard Indian Standard Standard for Standard for 16 ISAE means ______ for Assurance for Assurance for Audit B Assurance Audit Engagements Engagements Engagements Engagements Engagements Payment Payment Payment Card Payment Card Compliance Compliance Payment Card Industry- Industry-Data Industry-Data 17 PCI-DSS means _____ Industry-Data Industry-Data C Data Security Standard Security Sensitivity Sensitivity Security Standard Standard Standard Standard areas where Involvement of CAATS may be None of the 18 Which of the following are not the key aspects of SA 300? None of the above key team used as part of All the above D above members the audit procedures A test of controls is an _____ to test the effectiveness of a audit None of the 19 control used by a client entity to prevent or detect material audit procuedure audit strategy audit evidence B procuedure above missatements Say whether TRUE or FALSE? 20 When auditors have access to systems,Auditors should always TRUE TRUE FALSE A request access to the production or live environment 21 The type of access that auditors request should be ______ Both A & B Display-only read-only Either A or B Both A & B D Auditor should request for _____access for the duration of the priviliged administrative temporary 22 temporary access super user C audit access access access None of the 23 General IT controls are known as ____ controls Both A & B pervasive indirect Both A & B C above Application Data center and system 24 Which of the following is not a category of GITC? Access control Program change Access control Network acquisition,deve B operations lopment and maintenance Automated IT-Dependent None of the 25 ______ controls are embedded into IT applications Automated controls Manual controls B controls controls above ______ controls are activities in a business process that are Automated IT-Dependent None of the 26 performed by individuals or employees without the need to rely Manual controls Manual controls A controls controls above on a IT system ______ controls are basically manual controls that make use of Automated IT-Dependent None of the 27 some form of data or information or report produced from IT IT-Dependent controls Manual controls C controls controls above system and application. Unauthorized Unauthorized Temporary changes to Direct data 28 Which of the following is not a risk in IT? Temporary access B access of data access systems or changes programs Information Which of the following is not essential for the effective IT-Dependent None of the 29 Manual controls produced by Manual controls B implementation and operation of General IT controls? controls above Entity(IPE) History of Which of the following are to be considered for determining the Risk 30 Risk management Types of control Timing of test errors and D sample size management expectations How does IT Have formal IT communicate How is the Are the Are the employees policies and and collaborate 31 Find the odd one out in the IT Governance Review Checklist? department employees D trained procedures been with other organised trained defined business functions The objective of program changes is to ensure that modified Internal Financial None of the 32 Financial reporting Both A & B B systmes continue to meet _____________ objectives reporting reporting above _____ are changes required in the existing functionality of the 33 normal change Minor change major change normal change data changes C ERP due to a business need. ______ are changes provided by the vendor of ERP to address patches and 34 known bugs,security or provide improvements to functionality patches and updates Minor change major change Bug fixes D updates to existing ERP. _____ are high risk because they bypass the application emergency direct data patches and 35 direct data changes major changes B controls and impact the integrity of financial data changes changes updates 36 Which is the last step in change management process? documentation change request implementation testing documentation D _______ are provided to the IT department where the systems Approved change All change Approved None of the 37 Major changes B analysts perform analysis and design requests requests change requests above system database netwrok 38 A priviliged user may be a _______ All the above All the above D administrator administrator administrator In a security log of ERP,if the system default value is OFF it None of the 39 disabled enabled disabled not defined B indicates the table log are _____ above Application None of the 40 Environment controls form part of the ______ of access security Physical layer Physical layer Network layer A layer above Data transfer Data transfer When a company has two or more IT systems as an interface between systems between systems 41 Both A & B Either A or B Both A & B D ,what is the risk involved? may be may be incomplete inaccurate accuracy of completeness of the validity of 42 The objecive of AAC's are to ensure______ All the above All the above D data data the transactions _______ controls come along with the implemented ERP and 43 Inherent Inherent configurable security embedded A also called as Input control operation design control communicating 44 ________ may not prevent or detect misstatements design deficiency B deficiency deficiency deficiency deficiency As per ________,communicating deficiencies in internal contol to those charged with governance and management makes it 45 SA 265 SA 315 SA 330 SA 265 SA 300 C necessary for the auditor to communicate control deficiencies to the management. ______ controls are implemented by the company at the time of 46 configurable Inherent configurable security embedded B installing the ERP 47 _____ controls are also known as processing controls Both B & C Inherent configurable embedded Both B & C D Which of the following are some basic controls in inherent depreciation discount None of the 48 Debit=Credit Debit=Credit A controls? calculation calculation above If the GITC's are found to be ineffective,then the auditor will None of the 49 have to test the auomated controls _______ Balance sheet date on on closer to the Either A or B A above to support the opinion on internal financial controls Do the auditor will have to mention if the deficiencies were 50 yes yes no A present in the prior periods of audit? to look into the to look into the One commonly preferred method for testing design a walkthrough of the a walkthrough None of the 51 process process flow C effectiveness is control of the control above narratives diagrams Entity Auditor to Personnel to Auditor to test a perform 52 IPE is used by All the above All the above D perform a relevant control substantive relevant control procedures 53 The IPE can be in ___ forms 2 2 3 4 1 A 54 How many types of reports can be extracted from ERP systems 3 1 2 3 4 C These are reports that are available at the time of Standard Customised Database None of the 55 Standard Reports A implementation of the ERP systems by the entity Reports Reports Queries above These reports are created by the entities with respect to their Standard Customised Database None of the 56 Customised Reports B businesses, revenue streams, divisions etc. Reports Reports Queries above ________ are used to retrieve information or data from a Standard Customised Database None of the 57 Database Queries C database in a readable format using a SELECT statement Reports Reports Queries above Standard Customised Database None of the 58 These reports are inbuilt into the systems Standard Reports A Reports Reports Queries above ERP comes with a set of reports that can be used as is, if the 59 company has implemented the ERP without too many TRUE TRUE FALSE A modifications Cash flow statement is one of the examples of Database None of the 60 Standard Standard Customised A _________________ reports Queries above In ___________ reports, the company has followed their own Standard Customised Database None of the 61 pattern or code for Chart of Accounts (CoA), Vendors, Customised Reports B Reports Reports Queries above Customers etc. ______________ can be used to extract payroll information Standard Customised Database None of the 62 Database Queries C such as leaves available per employee Reports Reports Queries above Which of the following is not an element for determining the Report 63 Functions Source Data Report Logic Functions D testing strategy for reports Parameters Accuracy of Completeness of Accuracy of 64 Validation of Reports includes All the above All the above D Logic Data Data The Auditor has to check the ____________ of the data before 65 planning to understand the types of reports and the procedure integrity consistency integrity independency redundancy B to validate them Controls in Controls in The auditor may limit the test procedures to validate / test the Business 66 Both A and B GITC are Both A and B Either A or B C reports when ________________ Processes are effectuve effective Which of the folowing indicative commands will be used by the 67 All the above se16 se16n sa38 All the above D company in SAP to generate reports? In case of a standard report, the creator/modifier of the report finance 68 vendor vendor company IT personnel A would be the _____________ controller The evidence of the creator/modifier of the report can be found change 69 change management alert file backup B in _________________ logs management During 1st year of audit of the entity, after ensuring the creator/modifier value of the report, the auditor needs to then controls, controls, completeness, accuracy, 70 completeness, accuracy C understand and test the _____________ and ______________ of compliance efficiency accuracy impact the report During subsequent years of the audit, when GITCs and relevant no further reliance can be Business process controls are tested & effective, and there is no None of the 71 Both A and B testing need to placed on the Both A and B C change in the creator/modifier value of the standard reports, above be done report what need to be done by the auditor? relied upon by relied upon by the used by the auditors for compliance 72 Why to test the reports by the auditors? auditors during the management to during the All the above C purposes course of the audit make decisions course of the audit adopt adopt appropriate appropriate adopt In quarterly review of aging analysis, when report logic is controls based and controls based substantive None of the 73 Either A or B A working correctly, what is the next step to be done? substantive audit and substantive audit above procedures audit procedures procedures These reports are created by the business/IT persons in the Customised Database Standard 74 Customised Reports Other tools A company for their use and reporting requirements Reports Queries Reports The procedure to test the completeness and accuracy of the Standard customized 75 customized reports Both A and B Either A or B B reports have to be performed every year in ________________ Reports reports While testing for users who have access to create/modify the technical 76 custom report, the auditor will have to verify whether the users authorised users end users authorised users programmers B consultant are __________ appropriate appropriate appropriate appropriate If any change to the custom report has happened in the year of appropriate approvals code change date of change approvals report output 77 C audit, then _____________ should be verified should be should be should be should be verified verified verified verified These reports are extracted on ad hoc basis or on as and when Standard Customised Database None of the 78 Database Queries C basis Reports Reports Queries above These reports have a high probability of the data being Database Standard None of the 79 Database Queries Custom Reports A manipulated after creation Queries Reports above controls in all controls are controls are ineffective there are no The auditor cannot rely on just one sample to test the domains of ineffective in all 80 in all domains of relevant C completeness and accuracy assertions of the report when GITC's are domains of GITC's deficiencies effective GITC's Inclusion of New ERP 81 The criteria to be used to decide timing of report testing All the above Period and Company Policy All the above D implementation Entries Appropriate When GITC's are effective, the auditor needs to follow which One Sample in each One Sample in None of the 82 One Sample substantive B sampling procedure to test a report Scenario each Scenario above procedures When there are deficiencies in the reports/IPE that have been 83 2 types 1 type 2 types 3 types 4 types B tested, the errors at a minimum may be of _______ ____________ is when a user has the ability to perform critical Authorized 84 Sensitive Access Role Responsibility Sensitive Access D business activities in an ERP Access The users who have the business activities that carry a higher Authorized 85 risk and could have wider impact onoperations are said to have Sensitive Access Sensitive Access Responsibility Role A Access _____________ __________ refers to the separation or distribution of job roles Segregation of 86 among employees in such a way that incompatible or conflicting Segregation of Duties Sensitive Access Roles Profiles B Duties job roles are assigned to different persons ___________ are typically regular employees who carry out 87 All the above Normal Users End Users Business Users All the above D day-to-day business operations and transactions using the ERP ________ users are internally used within the ERP to perform 88 System Users Normal Users System Users End Users Business Users B automated operations and transactions These are a type of super users who have very extensive or Previleged 89 unlimited access to carry out all or several activities in an ERP Previleged Users Normal Users System Users Business Users C Users environment These are the users that come packaged along with the ERP Previleged 90 Default Users Normal Users System Users Default Users D software Users _________ represent a title, position, designation or function, Previleged 91 place or region within a company and do not represent an Generic Users System Users Generic Users Default Users C Users individual or person Temporary 92 These are users who are given user id for a limited time period Temporary Users System Users Generic Users Default Users B Users Temporary 93 These are users who do not belong to the company External Users System Users Generic Users External Users D Users 94 Users access to ERP is based on _______ of respective users Both A and B Job Roles Responsibilities Either A or B Both A and B D The relationship between ERP Roles and Users is 95 Many to Many One to Many Many to One Many to Many One to One C __________________ ___________ are access control features in an ERP that enable None of the 96 Both A and B Roles Profile Both A and B C grouping of several related access rights in to a form above Roles offer an easy to understand, fast and reliable way to None of the 97 manage user access to an ERP. This feature is known as RBAC RBAC RBFC RBOC A above ____________ None of the 98 A ________ represents a high-level grouping Role User Role Profile B above A _________ is the more granular internal technical grouping 99 of authorisations, permissions and access rights winin the ERP Profile User Profile Either A or B Both A and B B based on the input derived from the Role Segregation of duties can be implemented as _____________ None of the 100 Either A or B Preventive Detective Either A or B C control above Tool used in implementing and review of segregation of duties 101 All the above SAP GRC Oracle GRC BIZRights All the above D and sensitive access Auditing standards require auditors to obtain the evidence for full period of None of the 102 full period of audit point-in-time Either A or B B _________ audit above IT dependent application None of the 103 User access controls are like ________ in an ERP environment application controls GITCs C controls controls above should evaluate should evaluate the should report the impact of When an auditor found deficiencies in User Access Controls, the ignore the record the 104 impact of these deficiency to these D auditor __________________ deficiency deficiency deficiencies on the audit management deficiencies on the audit The auditor should first gain and understand the ___________ Business 105 before auditing segregation of duties and sensitive access in an Both A and B IT Environment Both A and B Either A or B C Environment ERP 106 ______ make it easy to manage user access to an ERP Role Role Profile SA SOD A Reliability of user access controls in an ERP depend on IT dependent application None of the 107 GITCs GITCs A effectiveness of __________________ controls controls above Business rules for implementing segregation of duties should be 108 Company Auditor Company IT Consultant Government B defined by the ________ Business 109 Which of the following is an example of Generic Users? Sales User Auditors Consultants Sales User C Partners Business 110 Which of the following is an example of External Users? Business Partners Auditors Support Users Sales User D Partners 111 Which of the following is an example of Temporary Users? Auditors Auditors Vendors Sales User Customers A SAP the purchase and inventory processes are provided in the Procurement Inventory Materials Accounts 112 Materials Management C module known as____________. Management Management Management Management ____________Where the IT infrastructure including operating Non-Technical Technical Non-Data 113 system,database,Network or hardware are changed but not Technical Migration Data Migration B Migration Migration Migration change in version or functioning of ERP. The Key Phases in any ERP migration project will consist of Data Data Data 114 Data Conversion Data Migration A planning,system design,________,Testing and Go Live. Conversion Convergence Configuration In-House 115 Which of the following is example of an ERP All of the above SAP Oracle R12 All of the above D Developed Which of the following activity is part of the system design Allocation of Mock 116 Configuration Configuration All of the above B phase of a migration Budget Conversion Allocation of Mock 117 __________ happens in Planning Phase. Allocation of Budget Configuration All of the above A Budget Conversion Allocation of Mock 118 ________is part of Data conversion phase. Mock Conversion Configuration All of the above C Budget Conversion 119 How many Phases are there in data migration strategy 5 4 5 6 7 B __________ In this phase of migration the objectives of Data 120 Planning System Design Planning Testing C migration and the migration strategy are defined. Conversion At which phase of the migration would rollback procedures be Data Migration 121 Go-Live Planning Go-Live C triggered,if necessary Conversion Testing Data Migration 122 Rollback procedure are defined in the ____________ phase. Planning Planning Go-Live B Conversion Testing User access and Which of the following require specific considerations during a 123 All of the above segregation of Open items Master data All of the above D migration. duties During pre- implementation When reviewing None of the 124 Where would auditors review migration process and controls. Both A& B /Post- general IT Both A& B C above implementation Controls reivews ___________ should be prepared and maintained for all phases Allocation of Technical 125 Documentation Documentation Configuration A of migration Budget Migration In Oracle the purchase and inventory processes are provided in Procurement & Procurement & Material & Migration and None of the 126 A the __________ module Inventory Inventory Inventory Inventory above _________ can be used for implementation of a completely new Microsoft 127 QuickBooks QuickBooks Open Bravo All of the above A accounting system. Dynamics Information Information Information Reports and system generated data IPE i.e._________________ 128 0 processed by planned by projected by D could change. entity entity entity ___________phase of migration process prepares including the Data 129 System Design System Design Planning Go-Live B process flows,data flows and business process re-engineering. Conversion __________ phase of migration involves identification of source Data 130 Data Conversion System Design Planning Go-Live A data,mapping between source and target system Conversion Intermediary data stores called ____ areas are used to hold Data Mock 131 Staging Integrity Staging C convert and transfer data. Conversion Conversion In __________ phase integrity checks are done to ensure Data 132 Data Conversion Sysmen Design Planning Go-Live A completeness and accuracy of data. Conversion _____________ are carried out iteratively to rectify errors and Data Mock 133 Mock Conversion Planning Sysmen Design D data inconsistencies. Conversion Conversion In ______ phase scenarios and scripts are prepared for the new Data 134 Testing System Design Testing Go-Live B system. Conversion A_______________ project provides an opportunity to review 135 and carry forward only the relevant data and discard obsolete Migration Technical Functional Migration Accounts C data. The auditor may consider using the work performed by internal 136 SA 610 SA 630 SA 330 SA 310 SA 610 D auditors in accordance with guidance given in __________ 137 How many types of journal entries are there ? 3 3 2 5 4 A _________transactions pertaining to sales, purchases, inventory, rent, audit fees, AMC Standard Non Standard Top Down 138 Standard Entries Top up Entries A expenses, salaries etc. are subject to internal controls as defined Entries Entries Entries by the company. _________these entities record nonrecurring,unusual Standard Non Standard Top Down 139 Non Standard Entries Top up Entries B transactions or adjustment entries in the ERP’s. Entries Entries Entries __________These entries may not be subject to the same level Standard Non Standard Top Down 140 of rigour of the internal controls or may not have passed Non Standard Entries Top up Entries B Entries Entries Entries through any controls at all. _____________are residing outside the books – for example in Standard Non Standard Top Down 141 Top up Entries Top up Entries C excel sheets etc. and may impact the financial statements. Entries Entries Entries If the journal entries are passed using a specific journal type Material Manual Journal Missing Journal Match Journal Manual Journal 142 then a list of such entries can be extracted from the system. For Journal D Vouchers Vouchers Vouchers Vouchers example, journal types could be MJV i.e._____________ Vouchers ERP/application should have ________ many fields and the 143 company must be entering data in these fields for them to be 17 17 18 19 20 A extracted. _________ the entries passed during the year to the balances in 144 the Trial Balance. The auditor may use ACL/IDEA Roll forward Roll Down Roll forward Roll Back Roll up B Caseware/MS Access/Excel to perform __________ testing Using tools such as ______, IDEA Caseware, MS Access, Excel 145 ACL ACL ADL ABL AGL A etc., the auditor can test the data for completeness __________ can also help in finding out if there are duplicate 146 All of the above ACL Ms Access CAAT All of the above D journal numbers used. 147 ______Accounts that are used very infrequently. Seldom Unusual Intercompany Seldom Non General C Non Standard Journal Non Stimulated Non Standard Non Sensitive Non Segregated 148 What is the expansion of NSJE__________ B Entries Journal Entries Journal Entries Journal Entries Journal Entries The unusual, non-recurring transactions may generally be None of the 149 General Ledger Sub ledgers General Ledger Excel sheets B directly entered in_________ above Standard Non Standard None of the 150 Estimates, impairments are generally a type of__________ Non Standard journals Top up journals C Journals journals above SA/SOD among Timing of While understanding the IT/ERP systems used to record Automated or 151 All of the above IT and Business passing the All of the above D entries, the points to note are___________ Manual entries teams entries Personal gain Debts Some of the fraud risk factors to note which may lead to 152 All of the above Sales Targets such as Bonus, requirements All of the above D unusual transactions are_____ incentives etc. for banks etc. A key factor to be kept in mind while making enquiries of Ask open ended Ask close ended No discussions Ask open ended None of the 153 C personnel are_______ questions questions required questions above Risk of Risk of lack of Risk of Material Risk of Material management Risk of lack of 154 Which is the main risk due to Non Standard Journal entries: segregation of A misstatement misstatement override of sensitive access duties. controls __________are entries that may be passed as a result of fraud. 155 Hence, this is the main risk. Another risk can also be risk of NSJE NSJE NSVE NSUE NSWE A management override of controls. It is possible that a Non-standard journal entry may not have None of the 156 Printed Non-Printed Printed All of the above B relevant ____________ supporting. above In industries/sectors, where volume of data is huge, 157 ________________ testing may not be an appropriate way of Roll forward Roll Down Roll forward Roll Back Roll up B testing completeness of data. ______________ to be achieved may be a key fraud risk factor Purchase Marketing Operational 158 from an investor/ stock holder perspective leading to Non- Sales Targets Sales Targets C Targets Targets Target standard journal entries. _____________ to be achieved may be a key fraud risk factor Non-Debt Monetary Non-Monetary Debt 159 Debt Requirements D from a bank/financial institution perspective. Requirements Requirements Requirements Requirements To bring in efficiencies in the process of extraction and analysis Developer Software Hardware 160 Software Scripts Testing Scripts B of JE data, the auditor may use ____________ Scripts Scripts Scripts Automated Automated Automated Automated Automated command 161 What is the expansion of ACL__________ command control corrected computer A language language language language language To perform un-matched Query, minimum required tables/fields 162 two one two three four B are Which of the follwing wild card character is to be represent 163 * + - & * D more than 1 characters 164 Which of the following symbol is used to write a sub query () [] () {} # B 165 The Sub query must always be written as a SQL Statement TRUE FALSE TRUE B The where clause can be used in both aggregate and non- 166 TRUE TRUE FALSE A aggregate query 167 Having clause is used in the aggregate query TRUE FALSE TRUE B If the sub query is returning more than 1 row, which operator Any one of the None of the 168 Any one of the above IN ANY C should be sued above above 169 Which of the following is an aggregate function All of the Above Sum() AVG() Count() All of the Above D 170 How many different joins available In Access Databse 3 1 3 2 4 B In MS-Access, forms help to display, add, modify and delete 171 TRUE TRUE FALSE A data In Access form, un-bound coltrols are linked with any field of 172 FALSE TRUE FALSE B Table/Query 173 In MS-Access, data can be edited in Reports FALSE FALSE TRUE A Non of the 174 In MS-Access, Report Header is used to print information in Report Header Page Header Report Header All of the Above B above Non of the 175 In MS-Access, Page Header is used to print information in Page Header Page Header Report Header All of the Above A above parameter 176 A _______________ is a query nested inside another query sub-query select query sub-query group by query C query ___________________ will return the records from the first Find matched Find unmatched Find unique Find duplicate 177 Find unmatched query B table which do not have matching values in second table query query query query other sub 178 Sub queries can be used within ______________________ All of the above select query action query All of the above D queries Sub queries in select statement can be the part of Where clause 179 TRUE TRUE FALSE A or Having clause in Group By query The queries that can be used for obtaining the aggregated Find unmatched Find duplicate Group By Parameter 180 results instead of individual records are known as Group By queries C queries queries queries queries _______________ A _______________ can be considered as a modified form of 181 Pivot Table Datasheet form Pivot Table Pivot Chart Multiple items B Crosstab queries 182 Pivot Chart helps visualize a ____________________ All of the above Pivot Table Query Form All of the above D 183 Joins created in a _______ are temporary Query Table Query Either A or B Both A and B B The __________________ query returns all of the rows from Right Outer 184 left table, and also those rows from the right table that share a Left Outer Join Left Outer Join Inner Join Cross Join A Join common value on both sides of the join Access query result is not restricted to the table fields but can Unbounded Calculated Expression 185 display many other computed columns known as Calculated Fields Bounded Fields C Fields Fields Fields _________________ Memory None of the 186 Unbound controls are also known as ____________________ Either A or B Variables Either A or B C Variables above Computed results may be bounded to some field in the table or 187 TRUE TRUE FALSE A may be unbounded A _______________ is a compact method of presenting a list of 188 Combo box Option Button Check Box Tab Control Combo box D choices and allows user to enter a value that is not in the list ________ controls are usually graphical objects that do not 189 operate as standalone solutions, and they run only in the Active X Add-in Plug-in Com Add-in Active X D Windows environment ___________ controls are useful for presenting grouped 190 Tab List Box Tab Calendar Combo Box B information that can be assembled by category ___________ can be created in forms to display a summary of Form with Sub 191 Pivot Table Pivot Table Linked form Split form A data form 192 ______________ represents the data in a graphical form Pivot Chart Pivot Table Pivot Chart Multiple Items Modal Dialog B The calculated values in reports are added using a 193 Text Box Label box Text Box List Box Combo box B _____________ and specifying an expression The calculated values in queries are displayed as _______ in 194 Fields Data Variables Fields Values C reports which use them ______________ is a report that is inserted into another report Unbound 195 Sub-Report Bound Report Child Report Sub-Report D called the Main report Report An ___________ is not based on a table or query, but can serve Bound main Unbound main None of the 196 Unbound main report Main report B as a container for one or more sub-reports report report above 197 _________ are a way of communicating database information Reports Tables Queries Forms Reports D The best way to display the summary report is to create _____ 198 Charts Pivot Table Queries Charts Sub-Report C to represent the data The multiple columns for the report can be set using the Report Page 199 Report Page Setup Report Wizard Report Report Print A ___________ property Setup The report event _______________ can be used to cancel the 200 On No Data On Print Cancel Print Cancel Event On No Data D printing of report when no data is returned Tables & Forms & 201 Expressions can be used with ____________________ All the above Macros All the above D Queries Reports 202 An ___________ is a value on which a calculation is performed Operand Operator Operand Expression Paranthesis B 203 Operands can be _____________ All of the above literals identifiers functions All of the above D 204 Literals are also referred as ______________ Constants Identifiers Operators Constants Operands C 205 Identifiers are ________________ Variables Variables Operators Constants Operands A 0 or any number a single a set of 206 [XYZ] denotes __________ in LIKE Operator a set of characters a single digit C of characters character characters The BETWEEN operator cannot be used with ______________ Either A or B or 207 Text Numeric Text Date B datatype C Comparison Arithmetic Miscellaneous Boolean 208 Logical Operators are also known as ___________________ Boolean Operators D Operators Operators Operators Operators ______________ are used to override the default order of Operator None of the 209 Parentheses Orders Parentheses C precedence Precedence above Expression 210 A text box in which expressions are written Expression Box Code Builder Macro Builder Expression Box C Elements Among +, , MOD, AND operator which operator has the 211 MOD + MOD AND B highest priority A _________ allows you to automate tasks and add 212 Macro Function Expression Macro Module C functionality to your forms, reports, and controls In Access, ___________ can be considered as a simplified 213 Macros Expressions Macros Modules Switchboard B version of VBA programming MS Access 2010 provides a _________ that contained large list Action Catalog 214 of actions to be chosen, enabling a wide range of commands that Action Catalog Pane Task Pane Navigation Pane Action Pane C Pane can be performed Macros can automate responses to many types of __________ Either A or B or 215 events events queries controls A without using a programming language