0% found this document useful (0 votes)
83 views118 pages

View Answer Correct Answer: (A) CIO

The document contains 35 multiple choice questions that test knowledge of information systems concepts and terms. The questions cover topics such as transaction processing, data management, systems analysis, networking, security, and decision support systems. Key terms defined include encryption, structured problems, critical success factors, and transaction processing systems.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
83 views118 pages

View Answer Correct Answer: (A) CIO

The document contains 35 multiple choice questions that test knowledge of information systems concepts and terms. The questions cover topics such as transaction processing, data management, systems analysis, networking, security, and decision support systems. Key terms defined include encryption, structured problems, critical success factors, and transaction processing systems.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 118

1. ______________.

focuses on planning, policies, and procedures regarding the use of


corporate data and information.

A. CIO
B. systems analyst
C. database administrator
D. system operator

View answer
Correct answer: (A)
CIO

2. The extent to which technology permeates an area or department is called


______________.

A. Technology diffusion
B. Technology infusion
C. Technology collusion
D. Technology fusion

View answer
Correct answer: (A)
Technology diffusion

3. ______________ is any business-related exchange such as payments to employees,


sales to customers, or payments to suppliers.

A. Data
B. E-commerce
C. A transaction
D. Input

View answer
Correct answer: (C)
A transaction

4. ______________ is software programs that were developed for a general market and
that can be purchased in a store.

A. Proprietary software
B. Off-the-shelf software
C. Contract software
D. Application software

View answer
Correct answer: (B)
Off-the-shelf software

5. ______________ converts ciphertext back into plaintext.

A. Encryption
B. A firewall
C. Decryption
D. An encoder

View answer
Correct answer: (C)
Decryption

6. With the ______________ form of data processing, each transaction is processed


immediately.

A. OLTP
B. batch processing
C. active processing
D. automated transaction processing

View answer
Correct answer: (A)
OLTP

7. Using ______________ a decision maker can make hypothetical changes to problem


data and observe the impact on the results

A. Simulation
B. What-if analysis
C. Optimization
D. Goal-seeking analysis

View answer
Correct answer: (B)
What-if analysis

8. ______________ involves the investigation of new approaches to existing problems.

A. Systems analysis
B. Creative analysis
C. Critical analysis
D. Organizational analysis
View answer
Correct answer: (B)
Creative analysis

9. Whose responsibility is it to see that the potential consequences of IS use are fully
considered?

A. IS professionals
B. managers
C. users
D. all of the above

View answer
Correct answer: (A)
IS professionals

10. The first stage in the problem-solving process is called the ______________ stage.
During this stage, potential problems or opportunities are identified and defined.

A. Choice
B. Design
C. Monitoring
D. Intelligence

View answer
Correct answer: (C)
Monitoring

11. Which of the following is NOT a goal of transaction processing systems?

A. Capture, process, and store transactions


B. Produce a variety of documents related to routine business activities
C. Reduce manual effort associated with processing business transactions
D. Produce standard reports used for management decision making

View answer
Correct answer: (D)
Produce standard reports used for management decision making

12. ______________ is a protocol that enables you to copy a file from another computer
to your computer.

A. SLIP
B. Usenet
C. Telnet
D. FTP

View answer
Correct answer: (D)
FTP

13. According to the ______________ theory, organizations adapt to new conditions or


alter their practices over time.

A. Change model
B. Organizational learning
C. Organizational culture
D. Continuous improvement

View answer
Correct answer: (D)
Continuous improvement

14. ______________ organizational structure employs individuals, groups, or complete


business units in geographically dispersed areas who may never meet face to face in
the same room.

A. traditional
B. virtual
C. multidimensional
D. matrix

View answer
Correct answer: (B)
virtual

15. ______________ is a collection of single-application software packages in a bundle


designed to work similarly so that once you learn the basics for one application, the
other applications are easy to learn and use.

A. Bundled software
B. Software suite
C. Productivity applications
D. General purpose software

View answer
Correct answer: (B)
Software suite
16. The data processing activity that involves rekeying miskeyed or misscanned data
is called ______________.

A. editing
B. data storage
C. data correction
D. data collection

View answer
Correct answer: (C)
data correction

17. The component of a decision support system that provides decision makers access
to a variety of models and assists them in decision making is called the ______________.

A. Model base
B. model management software
C. database
D. dialogue manager

View answer
Correct answer: (C)
database

18. ______________ is a form of transaction processing in which all transactions are


collected into a group and processed together.

A. Accumulation processing
B. Batch processing
C. Data collection
D. Data collection

View answer
Correct answer: (B)
Batch processing

19. Information systems that support the firm in its interaction with its environment
are said to be performing within the ______________.

A. Workgroup sphere of influence


B. Global sphere of influence
C. Enterprise sphere of influence
D. Individual sphere of influence

View answer
Correct answer: (C)
Enterprise sphere of influence

20. ______________ are individuals who help users determine what outputs they need
from the system and construct the plans needed to develop the necessary programs
that produce these outputs.

A. Data entry operators


B. Programmers
C. Database administrators
D. Systems analysts

View answer
Correct answer: (D)
Systems analysts

21. The current major stage in the business use of IS is oriented towards ______________.

A. Cost reduction and productivity


B. Gaining competitive advantage
C. Strategic advantage and costs
D. Improved customer relationship management

View answer
Correct answer: (B)
Gaining competitive advantage

22. A ______________ is an abstraction or an approximation that is used to represent


reality.

A. Model
B. System parameter
C. System performance standard
D. System

View answer
Correct answer: (A)
Model

23. ______________ attacks have overwhelmed the capacity of some of the Web's most
established and popular sites.

A. Spam
B. Credit card fraud
C. Denial-of-service
D. Spoofing

View answer
Correct answer: (C)
Denial-of-service

24. ______________ gives the computer the ability to make suggestions and act like an
expert in a particular field.

A. Decision support systems


B. Virtual reality systems
C. Management information systems
D. Expert systems

View answer
Correct answer: (D)
Expert systems

25. ______________ is an Internet service that enables you to log on to another computer
and access its public files.

A. Telnet
B. FTP
C. Content streaming
D. Instant messaging

View answer
Correct answer: (A)
Telnet

26. ______________ describes various program functions and help users operate the
computer system

A. A computer program
B. Documentation
C. Systems software
D. A computer system platform

View answer
Correct answer: (B)
Documentation

27. Which of the following statements, about the use of decision support systems, is
true?
A. They are applied only to the choice phase of the problem-solving process.
B. They are only applied to frequent, recurring problems.
C. They are only applied to highly-structured problems
D. They assist decision makers at all levels within the organization.

View answer
Correct answer: (D)
They assist decision makers at all levels within the organization.

28. The value of information is directly linked to ______________ .

A. its accuracy and completeness


B. its verifiability
C. its simplicity and security
D. how it helps decision makers achieve organizational goals

View answer
Correct answer: (A)
its accuracy and completeness

29. ______________ often referred to as "rules of thumb," are commonly accepted


guidelines or procedures that usually lead to a good decision.

A. Optimization models
B. Satisficing models
C. Heuristics
D. Programmed decisions

View answer
Correct answer: (D)
Programmed decisions

30. ______________ represent(s) the application of information concepts and technology


to routine, repetitive, and usually ordinary business transactions

A. E-commerce
B. Transaction processing systems
C. Management information systems
D. Decision support systems

View answer
Correct answer: (B)
Transaction processing systems
31. ______________ is the process of converting a message into a secret code and
changing the encoded message back to regular text.

A. Encryption
B. Fraud
C. Encoding
D. Cryptography

View answer
Correct answer: (D)
Cryptography

32. Problems that are routine and have well-defined relationships are called
______________.

A. Structured problems
B. Programmed decisions
C. Simple problems
D. Heuristics

View answer
Correct answer: (A)
Structured problems

33. ______________ is an awareness and understanding of a set of information and ways


that information can be made useful to support a specific task or reach a decision

A. Knowledge
B. Data
C. Feedback
D. A process

View answer
Correct answer: (A)
Knowledge

34. Day's critical activities and is typically available at the beginning of each workday.

A. Demand report
B. scheduled report
C. key-indicator report
D. exception report

View answer
Correct answer: (C)
key-indicator report

35. ______________ is factors that are essential to the success of certain functional areas
of an organization.

A. Mission-critical factors
B. Critical success factors
C. Performance objectives
D. Strategic factors

View answer
Correct answer: (B)
Critical success factors

36. The four key questions related to fairness in information use are ______________

A. cost, timing, content, and frequency


B. notice, consent, accuracy, and authorization
C. knowledge, control, notice, and consent
D. knowledge, accuracy, timing, and permission

View answer
Correct answer: (D)
knowledge, accuracy, timing, and permission

37. Which of the following SDLCs listed below takes an iterative approach to the
systems development process?

A. end user
B. RAD
C. prototyping
D. traditional waterfall

View answer
Correct answer: (B)
RAD

38. ______________ is a crime in which the imposter obtains key pieces of personal
information in order to impersonate the victim.

A. Social engineering
B. Dumpster diving
C. Computer fraud
D. Identity theft
View answer
Correct answer: (A)
Social engineering

39. The translation of strategic and organizational goals into system development
initiatives is called ______________.

A. Systems development
B. information systems planning
C. project planning
D. project definition

View answer
Correct answer: (B)
information systems planning

41. Information systems that monitor the elementary activities and transactions of the
organizations are ______________.

A. management-level systems.
B. operational-level systems.
C. knowledge-level systems.
D. strategic systems.

View answer
Correct answer: (A)
management-level systems.

42. In ______________ organization, authority is delegated down the hierarchy.

A. traditional
B. classical
C. operational
D. absolute

View answer
Correct answer: (B)
classical

43. In compilation process the program is placed in the memory in the form
______________.

A. octal.
B. binary.
C. hexadecimal.
D. decimal.

View answer
Correct answer: (B)
binary.

44. The effectiveness of marketing information system depends to a larger extent of


______________ from market place to the firm.

A. marketing.
B. advertising.
C. feedback.
D. promoting.

View answer
Correct answer: (C)
feedback.

45. The starting point of MIS planning is general ______________ planning.

A. objective.
B. managers.
C. business.
D. firms.

View answer
Correct answer: (C)
business.

46. ______________ system is concerned with the way information is used for purpose of
control and applies technologies.

A. Feedback.
B. Interview.
C. Interaction.
D. Conference.

View answer
Correct answer: (A)
Feedback.

47. The information generated at regular intervals is a ______________ information.

A. depositing.
B. saving.
C. recurring.
D. collecting.

View answer
Correct answer: (C)
recurring.

48. In MIS ______________ plays economically sound and logically in development


process.

A. information.
B. data.
C. statements.
D. data flow.

View answer
Correct answer: (D)
data flow.

49. BPR means ______________

A. Business Product Engineering.


B. Business Process Engineering.
C. Business Product Electronic.
D. Business Process Electronic.

View answer
Correct answer: (B)
Business Process Engineering.

50. CPU means ______________.

A. Central Process Utility.


B. Central Processing Unit.
C. Central Process Uniformity.
D. Central Process Usage.

View answer
Correct answer: (B)
Central Processing Unit.

51. ______________ communication media is more expensive one in network.


A. Co-axial.
B. Unshielded cable.
C. Twisted Pair.
D. Fibre optics.

View answer
Correct answer: (D)
Fibre optics.

52. In network based systems ______________ devices is used to connect all the system
in to one for sharing information.

A. modem.
B. adapter.
C. hub.
D. processor.

View answer
Correct answer: (C)
hub.

53. In companies can develop ______________ information system to gain a competitive


edge.

A. Structural.
B. Strategic.
C. Procedural.
D. Physical.

View answer
Correct answer: (B)
Strategic.

54. In a company ______________ is the centre which consists of all processing activities.

A. Data.
B. Production.
C. Information.
D. Sales.

View answer
Correct answer: (A)
Data.
55. Acquiring, training and retaining good network ______________ should be a top
priority.

A. data entry.
B. lab in charge.
C. Administrator.
D. system tester.

View answer
Correct answer: (C)
Administrator.

56. In a firm the reports are generated under condition are called ______________
reports.

A. exception.
B. condition.
C. standard.
D. periodic.

View answer
Correct answer: (A)
exception.

57. ______________ models to analysis a problem and provides possible solution for
management evaluation

A. Decision.
B. Standard.
C. Structural.
D. Periodic.

View answer
Correct answer: (A)
Decision.

58. ______________ type of budgeting is based on estimation of total project cost by the
top management.

A. top-down
B. bottom-up
C. neural
D. zero-based

View answer
Correct answer: (A)
top-down

59. A ______________ evaluation process reduces the possibility of buying inadequate


hardware.

A. Stable
B. Formal
C. Unstable
D. Informal

View answer
Correct answer: (B)
Formal

60. ______________ type of computers is manufactures through silicon chips

A. Super
B. Micro
C. Mainframe
D. Mini

View answer
Correct answer: (B)
Micro

61. In OOPS the member functions also called ______________.

A. Variable
B. Object
C. Methods
D. Class

View answer
Correct answer: (C)
Methods

62. ______________ is one or more multi user process with a higher capacity of shared
memory which provides connectivity and database services

A. Client
B. Desktop
C. Server
D. None of the above
View answer
Correct answer: (C)
Server

63. ______________ is the period in days between the ordering and delivering of goods.

A. Demand
B. Duration
C. Lead time
D. Process

View answer
Correct answer: (C)
Lead time

64. In very big network the ______________ device is used to find the effective part in
time.

A. Router
B. Modem
C. Control
D. Hub

View answer
Correct answer: (A)
Router

65. ______________ configurations provide extremely a fast transmission between


workstations contains only one link.

A. General.
B. Star.
C. Mesh.
D. Ring.

View answer
Correct answer: (C)
Mesh.

66. In network while transferring the data, whole is divided in to ______________.

A. Packets
B. Blocks.
C. Small units
D. Data.
View answer
Correct answer: (A)
Packets

67. ______________ is small figures that look like a file folder appears in the screen.

A. Folder
B. Icons
C. File
D. Cursor

View answer
Correct answer: (B)
Icons

68. ________________ system has transformed office into an in house publisher of


business documents.

A. E-mail
B. Electronic meeting
C. Electronic publishing
D. Desktop publishing

View answer
Correct answer: (C)
Electronic publishing

69. TPS stands for ______________

A. Transaction Processing System


B. Transaction Process System
C. Transaction Product System
D. Transaction Profit System

View answer
Correct answer: (A)
Transaction Processing System

70. ______________ leader who commands both positional and personal influence. Team.

A. Team.
B. Project.
C. Formal.
D. Informal.
View answer
Correct answer: (C)
Formal.

71. The ______________ language is used to solve the numeric problems.

A. C.
B. Cobol.
C. Fortran.
D. Basic.

View answer
Correct answer: (C)
Fortran.

72. The ______________ information system deals with the flow of information about
people working in the organization

A. record.
B. transaction.
C. Personnel.
D. Blocked.

View answer
Correct answer: (C)
Personnel.

73. A deterministic system operate in a predictable ______________.

A. model.
B. style.
C. process.
D. manner.

View answer
Correct answer: (D)
manner.

74. ______________ is the fact that are properly arranged, classified and organized.

A. Data.
B. Events.
C. Statements.
D. Information.
View answer
Correct answer: (D)
Information.

75. ______________ is a prominent attribute of management information procured


through MIS of an organization.

A. Explicitness.
B. Completeness.
C. Accuracy.
D. Exception based.

View answer
Correct answer: (A)
Explicitness.

76. In any of the system ______________ resource is consider as people resources.

A. end user.
B. hardware.
C. data.
D. software.

View answer
Correct answer: (A)
end user.

77. MODEM means ______________.

A. Modulation and Demodulation.


B. Modernization and De-modern.
C. Model and De-model.
D. Modify and De-modify.

View answer
Correct answer: (A)
Modulation and Demodulation.

78. POS stands for ______________.

A. Point Of Structure.
B. Point Of Sale.
C. Product Of Structure.
D. Product Of Sale.
View answer
Correct answer: (B)
Point Of Sale.

79. In company side the outsourcing people also called ______________.

A. system integrators.
B. system analyst.
C. system evaluator.
D. system tester.

View answer
Correct answer: (A)
system integrators.

80. ATG in network stands for ______________.

A. Advanced Technology Groups.


B. Advanced Technical Groups.
C. Advanced Talent Groups.
D. Advanced Testing Groups.

View answer
Correct answer: (A)
Advanced Technology Groups.

81. Critical information for top management is provided by ______________ information


system.

A. Expert.
B. Executive.
C. Decision.
D. Managerial.

View answer
Correct answer: (B)
Executive.

82. Decision varies as to the ______________ structure within each level of management.

A. Degree.
B. Data.
C. Situation.
D. Order.
View answer
Correct answer: (A)
Degree.

83. ______________ sub system covers granting of credit and cost management

A. Accounting.
B. Purchase.
C. Personnel.
D. Sales.

View answer
Correct answer: (A)
Accounting.

84. The project team is composed of the system professional are directly responsible
for ______________ the system

A. testing
B. building
C. deleting
D. innovating

View answer
Correct answer: (B)
building

85. ______________ type of testing ensures the system is free of errors and is ready to be
placed into operation.

A. Audit
B. General
C. Technical
D. Data

View answer
Correct answer: (A)
Audit

86. GB in memory stands for ______________.

A. Giga Bytes
B. Giga Bits
C. Gif Bits
D. Gif Bytes
View answer
Correct answer: (A)
Giga Bytes

87. Primary storage device such as semiconductor memory chips are called
______________.

A. Parallel
B. Sequential
C. direct access
D. binary access

View answer
Correct answer: (C)
direct access

88. ______________ will produce the periodic financial statements and reports of the
business.

A. Cash ledger
B. Final Account
C. Trail Balance
D. General Ledger

View answer
Correct answer: (D)
General Ledger

89. ______________ system can process data that are incomplete

A. Random
B. Neural
C. Fuzzy logic
D. Cognitive

View answer
Correct answer: (C)
Fuzzy logic

90. In network the different communication are interconnected by using a


communication processors called a ______________.

A. Protocols.
B. Gateway.
C. Multiplexers.
D. Router

View answer
Correct answer: (B)
Gateway.

91. BPR stands for ______________

A. Business Process Reengineering


B. Business Process Reconstruction
C. Business Program Reengineering
D. Business Problen Report

View answer
Correct answer: (A)
Business Process Reengineering

92. ______________ system include electronic document,presentation graphics,and


multimedia system

A. Electronic Collabaration System


B. Electronic Publishing System
C. Electronic Communication System
D. Image Processing

View answer
Correct answer: (D)
Image Processing

93. In communication ______________ that controls the input and output activities

A. Software
B. Hardware
C. Signals
D. Data

View answer
Correct answer: (A)
Software

94. The evolution of Electronic data processing ______________

A. 1951-60
B. 1961-70
C. 1981-90
D. 1971

View answer
Correct answer: (A)
1951-60

95. The internal memory in computer is also called ______________.

A. buffer.
B. space.
C. processor.
D. cabinet.

View answer
Correct answer: (A)
buffer.

96. processing is considered as the classical method of processing data.

A. Batch.
B. Group.
C. Sequence.
D. Real.

View answer
Correct answer: (A)
Batch.

97. The ______________ component plays a decision rule for the computer.

A. program.
B. statements.
C. input data.
D. conditions.

View answer
Correct answer: (A)
program.

98. ______________ refers to the holism of the system in real time.

A. Organization.
B. Integration.
C. Interaction.
D. Central objective.

View answer
Correct answer: (B)
Integration.

99. The final element of feedback is essential fro system operation and for
______________.

A. self-regulation.
B. correct errors.
C. testing.
D. debugging.

View answer
Correct answer: (A)
self-regulation.

100. In among the firms executives, managers, and supervisors are comes under
______________ of workers.

A. knowledge.
B. leader.
C. informer.
D. higher level.

View answer
Correct answer: (A)
knowledge.

101. ______________ is the mortar that holds all the functional systems together.

A. Storage.
B. System.
C. Database.
D. Memory.

View answer
Correct answer: (C)
Database.

102. ______________ information system that express a fundamental concept and


activities of information systems.
A. Model.
B. Style.
C. Standard.
D. Logic.

View answer
Correct answer: (A)
Model.

103. ______________ type of data uses pictures and graphics shapes for usage.

A. Text.
B. Image.
C. Alpha numeric.
D. Symbols.

View answer
Correct answer: (B)
Image.

104. ______________ type of processing, data is processed immediately after a


transaction occurs.

A. Batch.
B. Parallel.
C. Sequence.
D. Real time.

View answer
Correct answer: (D)
Real time.

105. ______________ of information systems that support key business functions as well
as cross functional business processes.

A. Standards.
B. Rules.
C. Portfolio.
D. Procedure.

View answer
Correct answer: (C)
Portfolio.

106. ______________ manager typically manage the operation of specific LAN and WAN.
A. Factory.
B. Network.
C. Firm.
D. System.

View answer
Correct answer: (B)
Network.

107. In database handling ______________ reports used by software for data.

A. Condition.
B. Specific.
C. Periodic.
D. Demand.

View answer
Correct answer: (C)
Periodic.

108. In general the information system can also describe in terms of ______________.

A. Operations.
B. Functions.
C. events .
D. tasks.

View answer
Correct answer: (B)
Functions.

109. ______________ charts are used to represent the project tasks and durations.

A. Gantt
B. X ray
C. Bar
D. Scatter

View answer
Correct answer: (A)
Gantt

110. ______________ steps ensure the success of the new systems

A. Initial
B. Implementation
C. Testing
D. Design

View answer
Correct answer: (B)
Implementation

111. Finger print system of security control comes under ______________.

A. Procedural
B. Biometric
C. Hardware
D. Facility

View answer
Correct answer: (B)
Biometric

112. ______________ is single user workstation that provide presenttion


services,database services and connectivity

A. Server
B. Client
C. System
D. CPU

View answer
Correct answer: (B)
Client

113. GUI stands for ______________

A. Graphical User Interface


B. Graphical User Interactive
C. Graphical User Integration
D. Graphical User Inference

View answer
Correct answer: (A)
Graphical User Interface

114. FIFO stands for ______________


A. First Interactive First Out
B. First In First Out
C. First Invented First Out
D. First Interface First Out.

View answer
Correct answer: (B)
First In First Out

115. ______________ type of cables need minimum numbers of repeaters

A. Fibre optic
B. Co-axial.
C. Twisted pair.
D. Lead wire.

View answer
Correct answer: (A)
Fibre optic

116. A ______________ is a binary event representing a signal change from positive to


negative

A. Bit
B. Band.
C. Bandwidth.
D. Frequency.

View answer
Correct answer: (B)
Band.

117. Data encryption concept is used for ______________ purposes.

A. Data hidden
B. data display
C. data processing
D. data transfer

View answer
Correct answer: (D)
data transfer

118. The ______________ is monitors the activities of the computer system


A. Processor.
B. RAM.
C. ROM
D. operating system.

View answer
Correct answer: (D)
operating system.

119. SCM stands for ______________

A. Supply Chain Method


B. Supply Collection Management
C. Supply Chain Management
D. Search Chain Management

View answer
Correct answer: (C)
Supply Chain Management

120. Information systems can facilitate supply chain management by ______________.

A. tracking the status of orders.


B. know the employee history.
C. profit and loss predictions.
D. stock verification.

View answer
Correct answer: (A)
tracking the status of orders.

121. The major drawbacks in decision making by MIS is difficult due ______________ for
business problems.

A. structure.
B. rules.
C. strategy.
D. conditions.

View answer
Correct answer: (B)
rules.

122. ______________ planning systems deals with the projections of the future.
A. Operational.
B. Strategic.
C. Processing.
D. Statistical.

View answer
Correct answer: (B)
Strategic.

123. ______________ system grouping of people and behavior has been subjected to
research.

A. Closed.
B. Social.
C. Conceptual.
D. Manufactured.

View answer
Correct answer: (B)
Social.

124. ______________ means that information must reach the recipients within the
prescribe timerframe.

A. Duration.
B. Period.
C. Timeliness.
D. Time.

View answer
Correct answer: (C)
Timeliness.

125. ________________ system is that two or more subsystems share the data over a
network.

A. Open.
B. Closed.
C. Distributed.
D. Undistributed.

View answer
Correct answer: (C)
Distributed.
126. ______________ is the people who develop and operate the information systems.

A. IS specialists.
B. IS Analyst.
C. IS experts.
D. IS data entry.

View answer
Correct answer: (A)
IS specialists.

127. In a big network the communication media refers to use ______________.

A. cables.
B. hardware devices.
C. transfer.
D. software.

View answer
Correct answer: (A)
cables.

128. In a big network the system are called as ______________.

A. system.
B. node.
C. group systems.
D. personal system.

View answer
Correct answer: (B)
node.

129. ______________ system will monitor and control the industrial processing activities.

A. Process control.
B. Process decision.
C. Process cleaning.
D. Process updating.

View answer
Correct answer: (A)
Process control.

130. HRM stand for ______________.


A. Human Resource Manager.
B. Human Resource Management.
C. Human Re Management.
D. Human ReManager.

View answer
Correct answer: (B)
Human Resource Management.

131. ______________ system that allocate costs to users based on the information
services rendered

A. change complete.
B. change back.
C. charge complete.
D. charge back.

View answer
Correct answer: (D)
charge back.

132. AIS stands for ______________.

A. Account Interactive System.


B. Accounting Inactive system.
C. Account In System.
D. Auditing Information Systems.

View answer
Correct answer: (D)
Auditing Information Systems.

133. In any real time system ______________ factors are termed as boundaries of the
system.

A. Statement.
B. Conditions.
C. Blocks.
D. Limit.

View answer
Correct answer: (D)
Limit.
134. ______________ sub system deals with activities as purchasing, receiving inventory
control and distribution

A. Marketing.
B. Purchase.
C. Sales.
D. Logistics.

View answer
Correct answer: (D)
Logistics.

135. RFP stands for ______________.

A. Request for Proposal


B. Request for Process
C. Request for Product
D. Request for Prediction

View answer
Correct answer: (A)
Request for Proposal

136. PDA means ______________.

A. Pocket Data Assistants


B. Personal Data Assistants
C. Pocket Digital Assistants
D. Personal Digital Assistants

View answer
Correct answer: (D)
Personal Digital Assistants

137. The ______________ most common form of visual output for user interface

A. e-data
B. printout
C. mail data
D. scan data

View answer
Correct answer: (B)
printout
138. Assembly language use ______________ technology for programming

A. Symbols
B. Data
C. Mnemonic codes
D. Alpha numeric

View answer
Correct answer: (C)
Mnemonic codes

139. ______________ type of cables uses the copper wire for data transmission

A. Fibre optics
B. Co-axial
C. Lead wire
D. Twisted pair

View answer
Correct answer: (D)
Twisted pair

140. In networks can be classified by their shape are called ______________.

A. Topology.
B. Structure.
C. Plans.
D. Architecture.

View answer
Correct answer: (A)
Topology.

141. In network the term protocols means ______________.

A. Procedures.
B. Conditions.
C. Algorithms.
D. Rules and regulations.

View answer
Correct answer: (D)
Rules and regulations.
142. ______________ duplex transmission can flow data in two ways but one direction at
a time.

A. Full.
B. Switch.
C. Half.
D. Circuit.

View answer
Correct answer: (C)
Half.

143. In database, table is made of ______________.

A. fields and records.


B. data and information
C. cell and borders
D. text and images.

View answer
Correct answer: (A)
fields and records.

144. ERP stands for ______________

A. Enterprise Resource Planning


B. Enterprise Replanning
C. Enterprise Report Programming
D. Expert Research Program

View answer
Correct answer: (A)
Enterprise Resource Planning

145. The ______________ organization often constructs its own messages.

A. formal
B. informal.
C. stable.
D. unstable.

View answer
Correct answer: (B)
informal.
146. In computer the number system of 0 and 1 is called as ______________.

A. octal.
B. hexadecimal.
C. decimal.
D. binary.

View answer
Correct answer: (D)
binary.

147. The most rapidly growing application for computer assisted decision making is
called ______________.

A. simulation.
B. attribute.
C. validation.
D. entity.

View answer
Correct answer: (A)
simulation.

148. EDP means ______________./p>

A. electronic data process.


B. electronic data processing.
C. electronic data projection.
D. electronic data predict.

View answer
Correct answer: (B)
electronic data processing.

149. The ______________ system which is closest to the stress will change the most.

A. super.
B. probabilistic.
C. sub.
D. stable.

View answer
Correct answer: (C)
sub.
150. Reporting the status of an activity through a feedback mechanism is called
______________ information.

A. process.
B. control.
C. executed.
D. validated.

View answer
Correct answer: (B)
control.

151. Plan must include the ______________ systems concept for implementation of the
new Information system.

A. Existing.
B. Future.
C. Omitted.
D. Progressing.

View answer
Correct answer: (A)
Existing.

152. ______________ information system uses the information technology to develop all
features in the products.

A. Structure.
B. Strategic.
C. Systematic.
D. Statistical.

View answer
Correct answer: (A)
Structure.

153. The following statement which one is true to information systems.

A. Information into data.


B. Procedures into statement.
C. Data into information.
D. Statement into procedures.

View answer
Correct answer: (C)
Data into information.

154. ______________ is media used in network which is used to connect between


countries.

A. Satellite.
B. Fibre optics
C. Coaxial.
D. Twisted pair.

View answer
Correct answer: (A)
Satellite.

155. ______________ system monitors the processing of jobs, development and schedule
in the overall systems.

A. Testing.
B. Processing.
C. Performance.
D. Scheduling.

View answer
Correct answer: (C)
Performance.

156. Information System specialists also called as ______________.

A. user consultant.
B. user friendly.
C. user expert.
D. user manager.

View answer
Correct answer: (A)
user consultant.

157. The operating decisions resulting actions usually cover ______________ periods.

A. Medium.
B. short time.
C. over an year.
D. long time.
View answer
Correct answer: (B)
short time.

158. ______________ takes responsibility and keeps track of progress in MIS design.
Development and implementation.

A. Time remainder
B. Periods
C. Allocation
D. Scheduling

View answer
Correct answer: (D)
Scheduling

159. Program testing concept use ______________ approaches

A. Sequence
B. Parallel
C. top-down
D. bottom-up

View answer
Correct answer: (C)
top-down

160. ______________ data is communicated between communication devices in the form


of wave

A. guided media
B. Unguided Media
C. Both media
D. None

View answer
Correct answer: (B)
Unguided Media

161. CRM stands for

A. Consumer Relation Management


B. Customer Relationship Management
C. Customer Report Managemnet
D. None

View answer
Correct answer: (B)
Customer Relationship Management

162. IPC stands for ______________

A. Intra Process Communication


B. Internet Process Communication
C. Inter Process Communication
D. None

View answer
Correct answer: (C)
Inter Process Communication

163. __________ keeps tracks of data concerning purchase from and payments to
suppliers.

A. Inventory control
B. Accounts payable
C. Payroll
D. Accounts receivable

View answer
Correct answer: (B)
Accounts payable

164. A ______________ is a communication processor that connects two similar LANs

A. Router.
B. Bridge.
C. Adapter.
D. Hub.

View answer
Correct answer: (B)
Bridge.

165. The system is an orderly grouping of various components linked together to


reach ______________.

A. a profit state
B. a specific objective.
C. managers objective.
D. Target

View answer
Correct answer: (B)
a specific objective.

166. Projection and responses to queries are information output charecterstics


associate with ______________

A. DSS
B. MIS
C. ESS
D. TPS

View answer
Correct answer: (C)
ESS

167. ______________ is the oldest and most widely used from of grouping activities.

A. Functional.
B. Operational.
C. Statistical
D. Managerial

View answer

168. A sequence of instructions that works together to perform a task is called a


______________.

A. program.
B. statements.
C. block.
D. grouping.

View answer
Correct answer: (A)
program.

169. ______________ is an overall performance summary to date and compared with the
previous periods, budgets.

A. Sales recap
B. Sales data.
C. Sales list.
D. Sales objective.

View answer
Correct answer: (A)
Sales recap

170. To become an effective MIS department must state its ______________.

A. goals.
B. objective.
C. profit.
D. mission.

View answer
Correct answer: (D)
mission.

171. The word data is the plural form of ______________.

A. datas.
B. data.
C. datum.
D. fact.

View answer
Correct answer: (C)
datum.

172. ______________ type of system is essential for applying boundaries of the problem.

A. Super.
B. Sub.
C. Economic.
D. Non Adaptive

View answer
Correct answer: (B)
Sub.

173. Knowledge bases that hold knowledge in a variety of forms such as ______________.

A. facts and rules.


B. rules and procedures.
C. facts and information.
D. rules and regulations.

View answer
Correct answer: (A)
facts and rules.

174. The computer system uses ______________ forms of data for usage.

A. Symbols.
B. Analog.
C. Digital.
D. Text.

View answer
Correct answer: (C)
Digital.

175. ______________ information system planning us the last stage of the planning
process.

A. Tactical.
B. Strategic.
C. Architecture.
D. Processed.

View answer
Correct answer: (A)
Tactical.

176. The overall recruit process will be control by ______________ person

A. HR.
B. Manager.
C. GM.
D. In charge.

View answer
Correct answer: (A)
HR.

177. The total process of a system is the net contribution of ______________ individual
process in the design.

A. Three.
B. Many.
C. Equal to two.
D. One.

View answer
Correct answer: (B)
Many.

178. In overall business side the MIS planning initiates from business ______________.

A. Task.
B. Event.
C. Planning.
D. Operations.

View answer
Correct answer: (C)
Planning.

179. A ______________ types of processor design uses a group of instruction processors


to execute program at the same time.

A. Coupled
B. Multilevel
C. Parallel
D. Single

View answer
Correct answer: (C)
Parallel

180. ______________ language use for artificial intelligence and symbolic applications

A. LISP
B. C
C. PROLOG
D. PASCAL

View answer
Correct answer: (A)
LISP

181. The ______________ has no pre-established decision procedures.


A. Unstructured
B. Structured
C. Standard
D. Stable

View answer
Correct answer: (A)
Unstructured

182. Medium bans channels use ______________ type of cables used for transmissions.

A. shielded twisted pair


B. unshielded twisted pair.
C. fibre optics
D. co-axial.

View answer
Correct answer: (A)
shielded twisted pair

183. Client Server consist how many layers

A. 1
B. 2
C. 3
D. 4

View answer
Correct answer: (C)
3

184. The ______________ will make the automated inventory system understandable to
everyone.

A. statement.
B. programs.
C. document.
D. blocks.

View answer
Correct answer: (C)
document.

185. In Information system the operation managed by a ______________ officer


A. chief information.
B. chief manager.
C. chief operator.
D. chief analyst.

View answer
Correct answer: (A)
chief information.

186. ______________ system provide information in easy to use displays to top and =
middle management.

A. Decision.
B. Management.
C. Executive.
D. Expert.

View answer
Correct answer: (C)
Executive.

187. Manages can receive information from ______________ that supports their decision
making systems.

A. Workstations.
B. personal system.
C. Reports.
D. File.

View answer
Correct answer: (A)
Workstations.

188. A manufacturing company products may decide to diversify into ______________


lines.

A. Price.
B. Demand.
C. Consumer.
D. Product.

View answer
Correct answer: (C)
Consumer.
189. ______________ type of feasibility deals with the costs of both development and
operations of the system.

A. Economic
B. Motivational
C. Technical
D. Schedule

View answer
Correct answer: (A)
Economic

190. ______________ system uses the condition concept for processing.

A. Object based
B. Rule based
C. Frame based
D. Case based

View answer
Correct answer: (C)
Frame based

191. Information systems that monitor the elementary activities and transactions of
the organizations are:

A. Management-level system
B. Operational-level, system
C. Knowledge-level system
D. Strategic level system

View answer
Correct answer: (A)
Management-level system

192. Management information systems usually:

A. Serve managers interested in weekly, monthly, and yearly results, not day-to-
day activities.
B. Help managers make decisions that are unique, rapidly changing, and not easily
specified in advance.
C. Provide managers with a generalised computing and telecommunications
capacity that can be applied to a changing array of problems.
D. Perform and record the daily routine transactions necessary to the conduct of
business.

View answer
Correct answer: (A)
Serve managers interested in weekly, monthly, and yearly results, not day-to-day
activities.

193. Materials into intermediate and finished products, and distributing the finished
products to customers?

A. Production Chain
B. Primary Chain
C. Supply Chain
D. Distribution chain

View answer
Correct answer: (C)
Supply Chain

194. Customer numbers and their names would be an example of the ______________
component of an order management information system.

A. software
B. hardware
C. data
D. procedure

View answer
Correct answer: (C)
data

195. Data mining cannot be done if ______________

A. operational data has not been archived


B. earlier management decisions are not available
C. the organisation is large
D. all processing had been only batch processing

View answer
Correct answer: (A)
operational data has not been archived

196. Knowledge based system supports, ______________


A. Knowledge of creation.
B. Knowledge of support.
C. Knowledge of Dissemination.
D. All of the above.

View answer
Correct answer: (D)
All of the above.

197. The accounting system is ______________ whereas the demand forecasting system
is ______________.

A. deterministic, probabilistic
B. probabilistic, deterministic
C. open, close
D. close, open

View answer
Correct answer: (A)
deterministic, probabilistic

198. ______________ e-commerce applications use EDI over the secure Virtual private
network.

A. C2C: (Customer to CusJomer)


B. C2B (Customer to Business Organisation)
C. B2C (Business Organisation to Customer)
D. B2B (Business Organisation to Business)

View answer
Correct answer: (D)
B2B (Business Organisation to Business)

199. The-popular term for the software component that supports the collaborative
efforts of a team is-

A. videoconferencing software
B. work flow automation software
C. groupware
D. none of above

View answer
Correct answer: (C)
groupware
200. The Management information System receives input from the:

A. EIS.
B. ES.
C. DSS.
D. TPS

View answer
Correct answer: (D)
TPS

201. The first phase of IT planning is called ______________ planning

A. tactical
B. project
C. organisational
D. strategic

View answer
Correct answer: (D)
strategic

202. What is the most widely used secondary storage medium?

A. magnetic tape
B. magnetic sensor
C. network
D. magnetic disk

View answer
Correct answer: (D)
magnetic disk

203. ______________ refers to the physical or logical arrangement of a network.

A. Dataflow
B. Mode of operation
C. Topology
D. none of the above

View answer
Correct answer: (C)
Topology
204. What is the meaning of Bandwidth in Network?

A. Transmission capacity of a communication channels


B. Connected Computers in the Network
C. Class of IP used in Network
D. None of Above

View answer
Correct answer: (A)
Transmission capacity of a communication channels

205. A network that requires human intervention of rout a signal is called a

A. Bus network
B. Ring network
C. Star network
D. T-switched network

View answer
Correct answer: (D)
T-switched network

206. A group of computers connected together to communicate and share resources


is known as

A. A computer network
B. A server
C. A client
D. Authentication

View answer
Correct answer: (A)
A computer network

207. Which network topology is considered passive?

A. Cross
B. Bus
C. Star
D. Ring

View answer
Correct answer: (B)
Bus
208. TPSs is called ______________

A. Transfer point of sales


B. Technology processing systems
C. Transaction processing systems
D. None of the above

View answer
Correct answer: (C)
Transaction processing systems

209. A logical schema?

A. is the entire database


B. is a standard way of organizing information into accessible parts
C. describes how data is actually stored on disk
D. All of above

View answer
Correct answer: (B)
is a standard way of organizing information into accessible parts

210. During the maintenance phase

A. System requirements are established


B. System analysis is carried out
C. Programs are tested
D. All of the above
E. None of the above

View answer
Correct answer: (E)
None of the above

211. An object encapsulates

A. Data
B. Behaviour
C. State
D. Both Data and behaviour

View answer
Correct answer: (D)
Both Data and behaviour
212. Which of the following is not an attribute of software engineering?

A. Efficiency.
B. Scalability.
C. Dependability.
D. Usability.

View answer
Correct answer: (C)
Dependability.

213. Which means a place where data can be stored in a structured manner:

A. CPU
B. Database
C. ALU
D. All of these

View answer
Correct answer: (B)
Database

214. The overall description of a database is called ______________:

A. Data definition
B. Data manipulation
C. Data integrity
D. Database schema

View answer
Correct answer: (D)
Database schema

215. Which is the person responsible for overall control of the database system:

A. DDL
B. DBMS
C. DBA
D. SDL

View answer
Correct answer: (C)
DBA

216. ______________is a collection of all occurrences of similar types of records:


A. Data
B. Data item
C. File
D. All of these

View answer
Correct answer: (C)
File

217. Which is the component of database management system:

A. Query Language
B. Database Manager
C. File manager
D. All of these

View answer
Correct answer: (D)
All of these

218. The ______________ model stipulates that the requirements be completely specified
before the rest of the development can processed.

A. Waterfall
B. Rapid Application Development (RAD)
C. Iterative Development
D. Incremental Development

View answer
Correct answer: (A)
Waterfall

219. Which of the following is record based logical model?

A. Network Model
B. Object oriented model
C. E-R Model
D. None of these

View answer
Correct answer: (A)
Network Model

220. The role of an integrated CASE tool in system analysis and design project is
A. Proving a CASE study for software development
B. To provide an environment that automate key tasks throughout software
development process
C. To provide tool for reacting a word file
D. None of the above

View answer
Correct answer: (B)
To provide an environment that automate key tasks throughout software
development process

221. What are the qualities of a good s/w ?

A. Reusability
B. Portability
C. Inter operability
D. All of the above

View answer
Correct answer: (D)
All of the above

222. Lower CASE tools are used for

A. for developing DFD's


B. for screen design
C. during all phases of system analysis and design life cycle
D. for converting structured English procedures to source code into a language
such as C

View answer
Correct answer: (D)
for converting structured English procedures to source code into a language such as
C

223. Projections and responses to queries are Information output characteristics


associated with:

A. DSS
B. MIS
C. ESS
D. TPS

View answer
Correct answer: (C)
ESS

224. Prototype is a

A. Working model of existing system


B. Mini model of existing system
C. Mini model of processed system
D. None of the above

View answer
Correct answer: (A)
Working model of existing system

225. Deciding where to locate new production facilities is an example of a


manufacturing and production information system operating at the:

A. Operational level
B. Management level
C. Knowledge level
D. Strategic level

View answer
Correct answer: (D)
Strategic level

226. Enterprise systems support:

A. Manufacturing processes.
B. Financial and accounting processes.
C. Human resource processes.
D. All of the above.

View answer
Correct answer: (D)
All of the above.

227. Which of the following is not a characteristic of good information?

A. Interchangeability
B. relevance
C. cost effectiveness
D. timeliness

View answer
Correct answer: (A)
Interchangeability

228. Which is not a domain of-Artificial Intelligence?

A. Intelligent Agents.
B. Expert System.
C. None of the above.
D. A&B

View answer
Correct answer: (D)
A&B

229. Which of the following are the inputs of Marketing Information System?

i. Marketing research data


ii. Marketing intelligence data
iii. External environment data
iv. strategic plan

A. Only I, ii, and iii.


B. Only ii, iii and iv.
C. Only i, iii and iv.
D. All I, ii, iii and iv.

View answer
Correct answer: (D)
All I, ii, iii and iv.

230. In which of the following functions of MIS reports are generated based on the
enterprise's need'?

A. Planning
B. Prediction,
C. Data Processing
D. Data storage

View answer
Correct answer: (A)
Planning
231. The direct, computer-to-computer exchange of standardized, common business
transaction documents between business partners, suppliers, and customers is
______________

A. EDI
B. ES
C. EIS
D. ERP

View answer
Correct answer: (A)
EDI

232. What software organizes, manages, and processes business data concerned with
inventory, customers, and vendors?

A. customer- oriented software


B. data management software
C. storage area network network
D. grid computing software

View answer
Correct answer: (B)
data management software

233. Which topology requires a central controller or hub?

A. Mesh
B. Star
C. Bus
D. Ring

View answer
Correct answer: (B)
Star

234. A ______________ is a data communication system spanning states, countries, or,


the whole world.

A. MAN
B. LAN
C. WAN
D. none of the above

View answer
Correct answer: (C)
WAN

235. HUB is ______________ Device & Switch is ______________ Device.

A. Unicast, Multicast
B. Multicast, unicast
C. Broadcast, multicast
D. none of the above

View answer
Correct answer: (C)
Broadcast, multicast

236. Which of the following network covers the largest geographical area,

A. PAN
B. LAN
C. MAN
D. WAN

View answer
Correct answer: (D)
WAN

237. What is the powerful, centralized computer system that performs data storage
and processing tasks on behalf of clients and other network devices?

A. Client
B. Host computer
C. Terminal
D. Network

View answer
Correct answer: (B)
Host computer

238. Which of the following is a computer based system that stores and, manipulates
data that are viewed from a geographical point or reference?

A. Geographical information System (GIS)


B. Database System (DS)
C. Geographic System (GS)
D. Software System (SS)
View answer
Correct answer: (A)
Geographical information System (GIS)

239. An application where only one user accesses the database at a given time is an
example of a(n)

A. single-user database application


B. multiuser database application
C. e-commerce database application
D. data mining database application

View answer
Correct answer: (A)
single-user database application

240. In the spiral model risk analysis is performed

A. In the first loop


B. in the first and second loop
C. In every loop
D. before using spiral model

View answer
Correct answer: (C)
In every loop

241. Which phase is not available in software life cycle?

A. Coding
B. Testing
C. Maintenance
D. Abstraction

View answer
Correct answer: (D)
Abstraction

242. Software testing techniques are most effective if applied immediately after?

A. Requirement specification
B. Design
C. Coding
D. Integration
View answer
Correct answer: (B)
Design

243. The set of data available to the user, the so-called:

A. Start-user data
B. End-user data
C. Database
D. None of these

View answer
Correct answer: (B)
End-user data

244. Which are the three levels of abstraction:

A. Physical
B. Logical
C. External
D. All of these

View answer
Correct answer: (D)
All of these

245. SQL stands for:

A. System query language


B. Structured query language
C. Sets query languages
D. None of these

View answer
Correct answer: (B)
Structured query language

246. Which is the data model

A. Relational
B. Object-Relational
C. Network
D. All of these

View answer
Correct answer: (D)
All of these

247. ______________ is the information about data.

A. Data
B. Meta-Data
C. Entity
D. Relations

View answer
Correct answer: (B)
Meta-Data

248. The first step in the systems development life cycle (SDLC) is:

A. Analysis.
B. Design.
C. Problem/Opportunity Identification.
D. Development and Documentation.

View answer
Correct answer: (C)
Problem/Opportunity Identification.

249. Waterfall model is not suitable for?

A. Small Projects
B. Complex Projects
C. Accommodating change
D. None of Above

View answer
Correct answer: (C)
Accommodating change

250. The advantages of creating a prototype are.

A. It allows developers to experiment with number of different design options


B. It can serve as means of communication between developers and customers
C. Both (a) and (b)
D. None of the above

View answer
Correct answer: (C)
Both (a) and (b)

251. CASE tools are useful

A. only during system design stage


B. during all the phases of system development life cycle
C. only for system documentation
D. only during system analysis stage

View answer
Correct answer: (B)
during all the phases of system development life cycle

252. The current standard tool for designing object oriented systems is called

A. Unified Modeling Language


B. Booch Modeling Language
C. Object Modeling Language
D. Class, responsibilities and collaborators language

View answer
Correct answer: (A)
Unified Modeling Language

253. Summary transaction data, high-volume data, and simple models are information
Inputs characteristic of:

A. DSS
B. MIS
C. ESS
D. TPS

View answer
Correct answer: (B)
MIS

254. Tracking employee training, skills, and performance appraisal is an example of a


human resource information system operating at the:

A. Operational level
B. Management level
C. Knowledge level
D. Strategic level
View answer
Correct answer: (A)
Operational level

255. If you are a ______________ recipient of sensitive information such as might be


overheard or contained in a misdirected email, this would not be legal, but-might be
unethical to use it.

A. active
B. Passive
C. proper
D. business

View answer
Correct answer: (B)
Passive

256. Which of the system uses Multidimensional data analysis?

A. DSS
B. MIS
C. ESS
D. All of the above

View answer
Correct answer: (A)
DSS

257. What is the use of Bridge in Network?

A. to connect LANs
B. to control Network speed
C. to separate LANs
D. All of the above

View answer
Correct answer: (A)
to connect LANs

258. EIS provide highly unstructured information to the level management for long
term decision making.

A. Operational
B. Bottom
C. Middle
D. Top

View answer
Correct answer: (D)
Top

259. The ______________ provides a manager with the information needed to make
decisions regarding, the firm's operational activities.

A. ElS
B. ES
C. MIS
D. EDl

View answer
Correct answer: (C)
MIS

260. Old main frame computers that are used to avoid high costs is called:

A. Legacy systems
B. Personal computers
C. server
D. Workstation

View answer
Correct answer: (A)
Legacy systems

261. The topologies with highest reliability is

A. Bus topology
B. Ring topology
C. Star toporogy
D. Mesh topology

View answer
Correct answer: (D)
Mesh topology

262. In which topologies, if there: are n devices in a network each device has n-1 ports
for cables

A. Mesh
B. Star
C. Bus
D. Ring

View answer
Correct answer: (A)
Mesh

263. The following device allows the user to add external components to a computer
system

A. Storage devices
B. Keyboards
C. Portal system boards
D. Diskettes

View answer
Correct answer: (C)
Portal system boards

264. What is Software?

A. Set of computer programs, procedures and possibly associated document


concerned with the operation of data processing.
B. A set of compiler instructions
C. A mathematical formula
D. None of above

View answer
Correct answer: (A)
Set of computer programs, procedures and possibly associated document concerned
with the operation of data processing.

265. The raw facts and figures are:

A. Data
B. Information
C. Snapshot
D. Reports

View answer
Correct answer: (A)
Data

266. An Enterprise Resource Planning application is an example of a (n) ______________


A. single-user database application
B. multiuser database application
C. e-commerce database application
D. data mining database application

View answer
Correct answer: (B)
multiuser database application

267. The tools that support different stages of software development life cycle are
called:

A. CASE Tools
B. CAME tools
C. CAQE tools
D. CARE tools

View answer
Correct answer: (A)
CASE Tools

268. In the system concepts, the term integration?

A. implies structure and order


B. refers to the manner in which each component functions with other
components of the system
C. means that parts of computer system depends on one another
D. refers to the holism of systems

View answer
Correct answer: (D)
refers to the holism of systems

269. A ______________ view of data expresses the way a user thinks about data

A. Logical view
B. Physical view
C. Both
D. None

View answer
Correct answer: (A)
Logical view

270. Which are the types of data independence:


A. Physical
B. Logical
C. Both
D. None of these

View answer
Correct answer: (C)
Both

271. Every record in the same size in bytes, the file is constituted of ______________

A. Record
B. Record blocking
C. Fixed-length record
D. Variable-length record

View answer
Correct answer: (C)
Fixed-length record

272. Which is not the feature of database:

A. Data redundancy
B. Independence
C. Flexibility
D. Data Integrity

View answer
Correct answer: (A)
Data redundancy

273. In the relational modes, cardinality is termed as:

A. Number of tuples.
B. Number of attributes.
C. Number of tables.
D. Number of constraints

View answer
Correct answer: (A)
Number of tuples.

274. System Development process is also called as ______________


A. System Development Life Cycle
B. System Life Cycle
C. Both A and B
D. System Process Cycle

View answer
Correct answer: (A)
System Development Life Cycle

275. Which is not a software development life cycle model?

A. Spiral Model
B. Waterfall Model
C. Prototyping Model
D. Capability maturity Model

View answer
Correct answer: (D)
Capability maturity Model

276. CASE tools are

A. A Set of rules to be used during system analysis and design


B. Program, packages used during system analysis and design
C. A set of tools used by analysts
D. Needed for use case development.

View answer
Correct answer: (B)
Program, packages used during system analysis and design

277. Lower CASE tools are used for

A. develop graphical user interface


B. for converting decision tables to source programs
C. for generating test cases
D. for developing use cases

View answer
Correct answer: (B)
for converting decision tables to source programs

278. Which of the following individuals typically have less formal, advanced
educational degrees and tend to process rather than create information?
A. Knowledge workers
B. Executives
C. System analysts
D. Data workers

View answer
Correct answer: (D)
Data workers

279. Information systems can facilitate supply chain management by:

A. Tracking the status of orders.


B. Rapidly communicating orders,
C. Providing product specifications.
D. none all of the above.

View answer
Correct answer: (D)
none all of the above.

280. A human order taker can be bypassed when using ______________

A. Office automation system


B. Management information system
C. Transaction processing system
D. Decision support system

View answer
Correct answer: (C)
Transaction processing system

281. Cybernetic system is the one which is ______________

A. Self Monitoring.
B. Self controlling.
C. Self regulating.
D. All Of the above.

View answer
Correct answer: (D)
All Of the above.

282. Which of the following Information category is used by middle management?


A. Organisational
B. Functional managerial knowledge
C. Decision support
D. Operational

View answer
Correct answer: (C)
Decision support

283. MIS stands for ______________

A. Management internet system.


B. Marketing Internet system.
C. Marketing and implementation software.
D. Management information system.

View answer
Correct answer: (D)
Management information system.

284. What type of computer is specially designed and/or used for tasks that require
extremely rapid and complex calculations?

A. PC
B. supercomputer
C. midrange computer
D. mainframe

View answer
Correct answer: (B)
supercomputer

285. In a ______________ connection, three or more devices share a link.

A. Multipoint
B. Point-to-point.
C. Multipoint & point-to-point
D. none of the above

View answer
Correct answer: (A)
Multipoint

286. Any electronic device on a network is called a:


A. Node
B. Hub
C. Router
D. Cable.

View answer
Correct answer: (A)
Node

287. Which topologies requires central controller or hub

A. Mesh
B. Star
C. Bus
D. Ring

View answer
Correct answer: (B)
Star

288. What is the benefit of the Networking?

A. File sharing
B. Easier Resources
C. Easier
D. All of the Above

View answer
Correct answer: (D)
All of the Above

289. The DBMS acts as an interface between what two components of an enterprise-
class database system?

A. Database application and the database


B. Data and the database
C. The user and the database application
D. Database application and SQL

View answer
Correct answer: (A)
Database application and the database

290. The following are functions of a DBMS except ______________


A. creating and processing forms
B. creating databases
C. processing data
D. administrating databases

View answer
Correct answer: (A)
creating and processing forms

291. CASE Tool is

A. Computer Aided Software Engineering


B. Component Aided Software Engineering
C. Constructive Aided Software Engineering
D. Computer Analysis Software Engineering

View answer
Correct answer: (A)
Computer Aided Software Engineering

292. A database is a complex ______________

A. Data structure
B. Memory
C. Both
D. None

View answer
Correct answer: (A)
Data structure

293. RAD stands for:

A. Rotate application development


B. Register application development
C. Related application development
D. Rapid application development

View answer
Correct answer: (D)
Rapid application development

294. DDL stands for:


A. Decode data languages
B. Data definition languages
C. Database define languages
D. Define data languages

View answer
Correct answer: (B)
Data definition languages

295. Which is the most popular database model:

A. Network Model
B. Relational Model
C. Hierarchical Model
D. Object Oriented

View answer
Correct answer: (B)
Relational Model

296. Architecture of the database can be viewed as

A. two levels.
B. four levels.
C. three levels.
D. one level.

View answer
Correct answer: (C)
three levels.

297. ______________ is the attribute or group of attributes that uniquely identify


occurrence of each entity.

A. Foreign key
B. Super Key
C. Primary Key
D. All of these

View answer
Correct answer: (C)
Primary Key

298. During software development which factor is most crucial?


A. People
B. Process
C. Product
D. Project

View answer
Correct answer: (A)
People

299. System development is a

A. Process of successive changes of system from new and changed requirement


B. It is a development of SRS of a system
C. Both (a) and (b)
D. None of the above

View answer
Correct answer: (C)
Both (a) and (b)

300. Upper CASE tools are used

A. for developing DFD's


B. for screen design
C. during all phases of system analysis and design life cycle
D. for converting structured English procedures to source code into a language
such as C

View answer
Correct answer: (A)
for developing DFD's

301. Identifying customers and markets using data on demographics, markets,


consumer behaviour, and trends is an example of:

A. Operational-level sales and marketing information system.


B. Knowledge-level sales and marketing information system.
C. Management-Level sales and marketing information system.
D. Strategic-level sales and marketing information system

View answer
Correct answer: (B)
Knowledge-level sales and marketing information system.
302. A computer security protocol for logging in would be an example of the
component of an information system:

A. software
B. hardware
C. Data
D. Procedure

View answer
Correct answer: (D)
Procedure

303. On-line transaction processing is used when ______________

i. it is required to answer random queries


ii. it is required to ensure correct processing
iii. all files are available on-line
iv. all files are stored using hard disk.

A. i, ii
B. i, iii
C. ii, iii, iv
D. i, jj ,iii

View answer
Correct answer: (B)
i, iii

304. ______________ is the process of defining the current problem, determining why a
new system is needed, identifying the objectives of the proposed system:

A. Feasibility analysis
B. System Analysis
C. System definition
D. System requirements,

View answer
Correct answer: (C)
System definition

305. ______________ focuses on researching how the human brain does work and, how
human beings imagine.

A. Cognitive science
B. Robotics
C. Natural interfaces
D. Artificial intelligence

View answer
Correct answer: (A)
Cognitive science

306. EDI stands for:

A. Electronic data interchanqe


B. Electrical data interchange
C. work flow automation software
D. Enhanced data interchange

View answer
Correct answer: (A)
Electronic data interchanqe

307. Which device is NOT considered an input device?

A. sensor
B. touch screen
C. keyboard
D. Printer

View answer
Correct answer: (D)
Printer

308. A ______________ is a data communication system within a building plant, or


campus or between nearby buildings.

A. MAN
B. LAN
C. WAN
D. none at the above

View answer
Correct answer: (B)
LAN

309. Which of the following device copies electrical signals from one Ethernet to
another?

A. Bridge
B. Repeater
C. Hub
D. Passive hub

View answer
Correct answer: (B)
Repeater

310. End- to-end connectivity is provided from host-to-host in

A. Network layer
B. Session Layer
C. Data link layer
D. Transport layer

View answer
Correct answer: (D)
Transport layer

311. A network computer that shares resources with and responds to requests from
other computer is known as

A. client
B. server,
C. terminal
D. key

View answer
Correct answer: (B)
server,

312. A network geometric arrangement in which a sIngle connecting lirie is shared by


a number of nodes is called

A. Car Topology
B. Bus Topology
C. Truck Topology
D. None of these

View answer
Correct answer: (B)
Bus Topology

313. Accounting, finance, marketing, and human resources are known as


A. Executive information systems
B. Functional business areas
C. Geographic information system
D. Local information system

View answer
Correct answer: (B)
Functional business areas

314. The data types describing the type of values that can appear in each column is
called ______________

A. Relations
B. Domain
C. Queries
D. All of above

View answer
Correct answer: (B)
Domain

315. Top-down programming is

A. a group of related fields


B. a map of the programmer's view of the data
C. an approach in which the top module is first tested-then program modules are
added from the highest level to the lowest level
D. a series or group of components that perform one or more operations of a
more complex system
E. None of the above

View answer
Correct answer: (C)
an approach in which the top module is first tested-then program modules are
added from the highest level to the lowest level

316. What are the three generic phases of software engineering?

A. Definition, development, support


B. What, how, where
C. Programming, debugging, maintenance
D. Analysis, design, testing

View answer
Correct answer: (A)
Definition, development, support

317. DBMS stands for:

A. Database associated
B. Database administrator
C. Database application
D. Database management system

View answer
Correct answer: (D)
Database management system

318. A DBMS provides users with the conceptual representation of:

A. Register
B. Data
C. Logical view
D. Physical view

View answer
Correct answer: (B)
Data

319. Retrieval of data is done by using a ______________

A. Stack
B. Query
C. Linked list
D. All of these

View answer
Correct answer: (B)
Query

320. Which is the database language:

A. C
B. C++
C. SQL
D. None of these

View answer
Correct answer: (C)
SQL

321. Relational calculus is a

A. Procedural language.
B. Non- Procedural language.
C. Data definition language.
D. High level language.

View answer
Correct answer: (B)
Non- Procedural language.

322. SDLC stands for?

A. Software design life cycle


B. Software development life cycle
C. System design life cycle
D. System development life cycle

View answer
Correct answer: (D)
System development life cycle

323. RAD Model was purposed by?

A. IBM
B. Motorola
C. Microsoft
D. Lucent Technologies

View answer
Correct answer: (A)
IBM

324. CASE tools are classified often as

A. Classical and Modern CASE tools


B. Upper and lower CASE tools
C. Source and Object CASE tools
D. Object oriented and Structured CASE tools

View answer
Correct answer: (B)
Upper and lower CASE tools

325. Preparing short-term budgets is an example of a finance and accounting


Information system operating at the:

A. Operational level
B. Management level
C. Knowledge level
D. Strategic level

View answer
Correct answer: (D)
Strategic level

326. Assembling a product, identifying customers and hiring employees are:

A. Transactions
B. Phases
C. Business Processes
D. Business Functions

View answer
Correct answer: (C)
Business Processes

327. The quality of your ______________ is a large part of the quality of your information
system.

A. computer
B. thinking
C. time
D. challanges

View answer
Correct answer: (B)
thinking

328. Which computer based model is developed after human brain?

A. Fuzzy Logic
B. Neural Network
C. Virtual-Reality
D. All of the above
View answer
Correct answer: (B)
Neural Network

329. ______________ Systems keep a track on the daily regular business transactions of
the organisation.

A. Management-level
B. Strategic-level
C. Executive information
D. Operational-level

View answer
Correct answer: (D)
Operational-level

330. ______________ makes use of groupware technology on Internet platform for faster
response Processing.

A. E-Communication
B. E-business
C. E-commerce
D. E-collaboration

View answer
Correct answer: (C)
E-commerce

331. A combination of a MIS and DSS called ______________ which helps top managers
make decisions.

A. GIS
B. EIS
C. EPI
D. CAM

View answer
Correct answer: (B)
EIS

332. Which topology requires a multipoint connection?

A. Mesh
B. Star
C. Bus
D. Ring

View answer
Correct answer: (C)
Bus

333. ______________ is a collection of many separate networks.

A. WAN
B. an internet
C. LAN
D. none of the above

View answer
Correct answer: (B)
an internet

334. Networks that follow the 802.5 standard appear to be in a star topology but are
actually operating in what type of topology?

A. Linear bus
B. Modified star
C. Modified ring
D. Ring

View answer
Correct answer: (D)
Modified ring

335. A self-sufficient computer that acts as both a server and a client IS known as

A. host
B. Client
C. Server
D. Peer

View answer
Correct answer: (D)
Peer

336. In relational schema, each tuple is divided into fields called?

A. Relations
B. Columns
C. Queries
D. All of above

View answer
Correct answer: (B)
Columns

337. Information can be transferred between the DBMS and a?

A. Spreadsheet program
B. Word processor program
C. Graphics programs
D. All of above
E. None otabove

View answer
Correct answer: (D)
All of above

338. The feature of the object oriented paradigm which helps code reuse is

A. object
B. class
C. inheritance
D. aggregation

View answer
Correct answer: (C)
inheritance

339. Top down approach is used for

A. development.
B. identification of faults.
C. testing and validation.
D. reverse engineering.

View answer
Correct answer: (A)
development.

340. DBA stands for:

A. Database associated
B. Database administrator
C. Database application
D. None of these

View answer
Correct answer: (B)
Database administrator

341. physical view of data refers to the way data is handled at a ______________ its
storage and retrieval:

A. High level
B. Low level
C. Medium level
D. All of these

View answer
Correct answer: (B)
Low level

342. DML stands for:

A. Data description languages


B. Data design languages
C. Database dictionary languages
D. Data manipulation languages

View answer
Correct answer: (D)
Data manipulation languages

343. ______________ is the records in the file are of different sizes:

A. Record blocking
B. Fixed-length record
C. Variable-length record
D. None of these

View answer
Correct answer: (C)
Variable-length record

344. Which level of database is viewed by user:

A. Internal level
B. External Level
C. Conceptual Level
D. All of these

View answer
Correct answer: (B)
External Level

345. In a relational model, relations are termed as

A. Tuples.
B. Attributes
C. Tables.
D. Rows.

View answer
Correct answer: (C)
Tables.

346. ______________is the real world object, such as a person, place etc.

A. Attribute
B. Entity
C. Records
D. All of these

View answer
Correct answer: (B)
Entity

347. The term module in the design phase refers to ?

A. Functions
B. Procedures
C. Sub programs
D. All of the above

View answer
Correct answer: (D)
All of the above

348. The most creative and challenging phase of system life cycle is

A. Feasibility study
B. Maintenance
C. Design
D. None of the above

View answer
Correct answer: (C)
Design

349. The most important feature of spiral model is

A. requirement analysis
B. risk management
C. quality management
D. configuration management.

View answer
Correct answer: (B)
risk management

350. Which of these items is a major component of today's IT infrastructure?

A. data management technology


B. networking
C. technology services
D. all of me above

View answer
Correct answer: (D)
all of me above

351. Management information systems (MIS)

A. create and share documents that support day-today office activities


B. process business transactions (e.g., time cards, payments, orders, etc.)
C. capture and reproduce the knowledge of an expert problem solver
D. use the transaction data to produce information needed by managers to run
the business
E. none of the above

View answer
Correct answer: (D)
use the transaction data to produce information needed by managers to run the
business
352. Which of the following is a deliverable of the system implementation phase in a
formal system development process?

A. technical hardware and software solution for the business problem


B. business problem statement
C. statement of the system users' business requirements
D. technical blueprint and specifications for a solution that fulfills the business
requirements
E. none of the above

View answer
Correct answer: (A)
technical hardware and software solution for the business problem

353. When a bank uses business performance management software to monitor its
performance in differences regions this:

A. reduces costs.
B. manages risks.
C. adds value.
D. creates a new opportunity.
E. none of the above.

View answer
Correct answer: (B)
manages risks.

354. Records management:

A. is a discipline limited to digitised paper documents.


B. is a discipline limited to library books.
C. is a discipline limited to paper documents.
D. is a discipline limited to information contained in databases.
E. none of the above.

View answer
Correct answer: (E)
none of the above.

355. Which of the following is not a type of navigation system for a web site?

A. National
B. Global
C. Contextual
D. Local
E. Regional

View answer
Correct answer: (E)
Regional

356. Which of the following is not a class of information system applications?

A. database management system


B. decision support system
C. expert system
D. management information system
E. office automation system

View answer
Correct answer: (A)
database management system

357. Examples of keyless interfaces include:

A. bar coding, OCR, pen, and voice recognition


B. mouse, OCR, pen, and voice recognition
C. keyboard, OCR, pen, and voice recognition
D. all of the above
E. none of the above

View answer
Correct answer: (A)
bar coding, OCR, pen, and voice recognition

358. Which one is NOT a phase of the systems development life cycle?

A. problem analysis
B. scope definition
C. requirements analysis
D. post-implementation review
E. decision analysis

View answer
Correct answer: (D)
post-implementation review

359. Request for quotation (RFQ) is


A. a document that compares business and technical requirements of a
commercial application package against the capabilities and features of a
specific commercial application package
B. a document that communicates business, technical, and support requirements
for an application software package to vendors that wish to compete for the
sale of that application package and services
C. a document that communicates business, technical, and support requirements
for an application software package to a single vendor that has been
determined as being able to supply that application package and service
D. a contract with management and the user community to develop or enhance
an information system
E. none of the above

View answer
Correct answer: (C)
a document that communicates business, technical, and support requirements for an
application software package to a single vendor that has been determined as being
able to supply that application package and service

360. Prototypes are used in

A. model-driven analysis
B. object-oriented analysis
C. traditional approaches
D. accelerated systems analysis
E. structured analysis

View answer
Correct answer: (D)
accelerated systems analysis

361. The task of establishing system improvement objectives is performed in which


phase of systems analysis?

A. problem analysis phase


B. logical design phase
C. scope definition phase
D. physical design phase
E. requirements analysis phase

View answer
Correct answer: (A)
problem analysis phase
362. Which one is NOT a common fact-finding technique?

A. prototyping
B. interviews
C. research and site visits
D. sampling of existing documents, forms, databases
E. reverse engineering

View answer
Correct answer: (E)
reverse engineering

363. Which of the following types of questions should not be asked on an interview?

A. closed-ended questions
B. biased questions
C. open-ended questions
D. loaded questions
E. both (b) and (d)

View answer
Correct answer: (E)
both (b) and (d)

364. Which installation strategy is a variation on the abrupt and parallel conversion?

A. location conversion
B. staged conversion
C. partial conversion
D. hierarchical conversion
E. none of the above

View answer
Correct answer: (B)
staged conversion

365. Which of the following is(are) the inputs to the Systems Construction phase?

A. design prototypes
B. redesigned business processes
C. physical design specifications
D. documentation
E. all of the above

View answer
Correct answer: (E)
all of the above

366. If you need to collect employee status information (e.g., full-time vs. part-time)
on a computer screen, your best choice for a GUI control would be:

A. drop-down list
B. masked edit control
C. radio buttons
D. spin box
E. none of the above

View answer
Correct answer: (C)
radio buttons

367. A listing of the names and addresses of all the employees for an organization
would be an example of a(n):

A. detailed report
B. summary report
C. external report
D. exception report
E. none of the above

View answer
Correct answer: (A)
detailed report

368. Which of the following is NOT a general principle for output design?

A. The distribution of (or access to) computer outputs must be sufficient to assist
all relevant users.
B. The computer outputs should be designed with automated tools.
C. The computer outputs must be acceptable to the system users.
D. Computer outputs should be simple to read and interpret.
E. The timing of computer outputs is important. Output information must reach
recipients while the information is pertinent to transactions or decisions.

View answer
Correct answer: (B)
The computer outputs should be designed with automated tools.

369. The term used to describe those people whose jobs involve sponsoring and
funding the project to develop, operate, and maintain the information system is
A. information worker
B. internal system user
C. systems owner
D. external system user
E. systems builder

View answer
Correct answer: (C)
systems owner

370. Decision makers who are concerned with tactical (short-term) operational
problems and decision making are

A. middle managers
B. executive managers
C. supervisors
D. mobile managers
E. none of the above

View answer
Correct answer: (A)
middle managers

371. The general transformation cycle for information is:

A. information to data to knowledge.


B. knowledge to data to information.
C. data to knowledge to information.
D. data to information to knowledge.
E. none of the above.

View answer
Correct answer: (D)
data to information to knowledge.

372. A web blueprint depicts:

A. the layout of an individual web page


B. the layout of the home page
C. the layout of an index page
D. the layout of a website
E. the layout of a sitemap

View answer
Correct answer: (D)
the layout of a website

373. Use-case analysis focuses upon:

A. data
B. Objects
C. Entities
D. Actors

View answer
Correct answer: (D)
Actors

374. Language-based, machine-readable representations of what a software process


is supposed to do, or how a software process is supposed to accomplish its task is
known as:

A. prototyping
B. software specifications
C. application programs
D. human engineering
E. none of the above

View answer
Correct answer: (C)
application programs

375. The deliverable of the problem analysis phase is

A. system improvement objectives


B. problem statement
C. statement of constraints
D. statement of work
E. none of the above

View answer
Correct answer: (A)
system improvement objectives

376. Rapid Application Development (RAD) strategy includes all of the following,
except

A. actively involves system users in the analysis, design, and construction activities
B. uses waterfall development approach to evolve system concept
C. organizes systems development into a series of focused, intense workshops
D. reduces the amount of time that passes before the users begin to see a working
system
E. accelerates the requirements analysis and design phases

View answer
Correct answer: (B)
uses waterfall development approach to evolve system concept

377. Which of the following phases identifies and expresses requirements, prioritizes
requirements, updates project plan, and communications the requirements statement?

A. logical design phase


B. decisions analysis phase
C. problem analysis phase
D. systems analysis phase
E. none of the above

View answer
Correct answer: (E)
none of the above

378. A property or quality the system must have is called a:

A. scope
B. functional requirement
C. preliminary requirement
D. nonfunctional requirement
E. none of the above

View answer
Correct answer: (D)
nonfunctional requirement

379. The person generally responsible for the program design strategy, standards, and
construction is called a(n):

A. program librarian
B. backup chief programmer
C. network designer
D. chief programmer
E. systems analyst

View answer
Correct answer: (D)
chief programmer

380. Which of the following is(are) the primary inputs into the task of writing and
testing new programs?

A. programming plan
B. database structure
C. test data
D. integration requirements
E. both (a) and (c)

View answer
Correct answer: (E)
both (a) and (c)

381. Combination checks:

A. determine data entry errors on primary keys


B. ensure that the correct type of data is input
C. determine whether a known relationship between two fields is valid
D. determine whether all required fields of the input have actually been entered
E. none of the above

View answer
Correct answer: (C)
determine whether a known relationship between two fields is valid

382. Which of the following advanced input controls provides a nonnumeric means of
selecting a value?

A. ellipsis control
B. Internet hyperlink
C. check list box
D. slider edit calendar
E. none of the above

View answer
Correct answer: (D)
slider edit calendar

383. A count of the number of students who earned A, B, C, D, and F grades in a given
course would be an example of a(n):
A. external report
B. summary report
C. detailed report
D. exception report
E. none of the above

View answer
Correct answer: (B)
summary report

384. Which of the following is(are) the step(s) in the output design process?

A. specify physical output requirements


B. identify system outputs and review logical requirements
C. design, validate, and test outputs
D. design any preprinted forms
E. all of the above

View answer
Correct answer: (E)
all of the above

385. The person who ensures that systems are developed on time, within budget, and
with acceptable quality is a

A. systems designer
B. project manager
C. systems owner
D. external system user
E. systems builder

View answer
Correct answer: (B)
project manager

386. If a university sets up a web-based information system that faculty could access
to record student grades and to advise students, that would be an example of a/an

A. CRM
B. intranet
C. ERP
D. extranet
E. none of the above

View answer
Correct answer: (B)
intranet

387. When a bank uses information to launch a personalised credit card product this:

A. manages risks.
B. creates a new opportunity.
C. adds value.
D. reduces costs.
E. none of the above.

View answer
Correct answer: (C)
adds value.

388. Monitoring the legal constraints which a company operates under requires review
of:

A. a company's customers.
B. a company's outputs.
C. a company's macro-environment.
D. a company's micro-environment.
E. all of the above.

View answer
Correct answer: (C)
a company's macro-environment.

389. Which of the following statements about XML schemas is incorrect?

A. Schemas can specify integer values


B. Schemas are defined by XSD tag
C. All XML documents must have a schema
D. Schemas provide data oriented data types
E. They offer more flexibility than DTDs

View answer
Correct answer: (C)
All XML documents must have a schema

390. Which is not a typical business function?

A. Sales
B. Service
C. Manufacturing
D. Accounting
E. Benefits and Compensation

View answer
Correct answer: (E)
Benefits and Compensation

Management Information Systems

391. The first CMM level at which measurable goals for quality and productivity are
established is

A. Level 1
B. Level 2
C. Level 3
D. Level 4
E. Level 5

View answer
Correct answer: (D)
Level 4

392. A cross life-cycle activity of system development is

A. object modeling
B. prototyping
C. fact-finding
D. data modeling
E. data flow diagram modeling

View answer
Correct answer: (C)
fact-finding

393. Cause-and-effect analysis is performed in the following phase of systems analysis

A. scope definition phase


B. logical design phase
C. requirements analysis phase
D. physical design phase
E. problem analysis phase

View answer
Correct answer: (E)
problem analysis phase

394. Randomly sampling ten invoices based on a given sample size would be an
example of

A. stratification
B. closed-ended sampling
C. observation
D. open-ended sampling
E. none of the above

View answer
Correct answer: (E)
none of the above

395. Which one of the tests is performed on a subset of a program?

A. subset test
B. unit test
C. stub test
D. program test
E. system test

View answer
Correct answer: (C)
stub test

396. Which of the following is(are) the deliverables of the Systems Implementation
phase?

A. training materials
B. functional system
C. physical design specification
D. operational system
E. none of the above

View answer
Correct answer: (D)
operational system

397. If you need a student to select from a list of eighty courses of the university's on-
line catalogue, your best choice for a GUI control would be:

A. check box
B. radio buttons
C. drop-down list
D. combination box
E. Internet hyperlink

View answer
Correct answer: (C)
drop-down list

398. Which of the following reports presents information with little or no filtering or
restrictions?

A. non-filtered
B. summary
C. external
D. exception
E. none of the above

View answer
Correct answer: (E)
none of the above

399. Which kind of chart is useful for comparing series or categories of data, each in
its own bar?

A. line chart
B. pie chart
C. scatter char
D. bar chart
E. none of the above

View answer
Correct answer: (D)
bar chart

400. Which one of the following is not a business driver for an information system?

A. business process redesign


B. knowledge asset management
C. proliferation of networks and the Internet
D. security and privacy
E. collaboration and partnership

View answer
Correct answer: (C)
proliferation of networks and the Internet

401. The application of information to scan an organisation's environment is:

A. external communication.
B. information overload.
C. sensing.
D. internal communication.
E. none of the above.

View answer
Correct answer: (C)
sensing.

402. Which of the following should be represented on an information flow diagram?

A. Entity
B. Source
C. Process
D. Attribute
E. Database

View answer
Correct answer: (B)
Source

403. Which of the following relates to enterprise interoperability?

A. DFD
B. Information flow diagram
C. XML
D. Entity relationship diagram

View answer
Correct answer: (C)
XML

404. Contemporary Information Systems are interfacing with customers and suppliers
using :

A. BPR
B. CRM
C. SCM
D. Both A and B
E. Both B and C

View answer
Correct answer: (E)
Both B and C

405. A specification of how the user moves from window to window, interacting with
the application programs to perform useful work is called:

A. interface specifications
B. software specifications
C. user dialog
D. prototyping specifications
E. navigation specification

View answer
Correct answer: (C)
user dialog

406. Which one is NOT a category of problems represented by the PIECES framework?

A. control
B. efficiency
C. service
D. economics
E. technology

View answer
Correct answer: (E)
technology

407. A model-driven analysis approach that focuses on the structure of stored data in
a system rather than on processes is

A. structured analysis
B. information engineering
C. rapid architected analysis
D. object-oriented analysis
E. none of the above

View answer
Correct answer: (B)
information engineering
408. The tasks of defining acceptance tests, structuring functional requirements, and
validating functional requirements are performed in which one of the phases?

A. problem analysis phase


B. decision analysis phase
C. systems analysis phase
D. logical design phase
E. none of the above

View answer
Correct answer: (D)
logical design phase

409. Which one of the following fact-finding techniques is an inexpensive means of


gathering data from a large number of individuals?

A. observations
B. work sampling
C. interviews
D. proxemics
E. none of the above

View answer
Correct answer: (E)
none of the above

410. Which of the following is(are) the task(s) of the Systems Conversion phase?

A. prepare conversion plan


B. train users
C. convert to new system
D. build and test networks
E. none of the above

View answer
Correct answer: (D)
build and test networks

411. A form used to record data about a transaction is a(n)

A. batch document
B. source document
C. on-line document
D. data entry document
E. none of the above

View answer
Correct answer: (B)
source document

412. In cases where the data item has a large number of predefine values and screen
space is tight, the following GUI control should be used for an input:

A. combination box
B. drop-down list
C. list box
D. ellipsis control
E. none of the above

View answer
Correct answer: (B)
drop-down list

413. Which of the following reports categorizes information for managers who are not
interested to wade through the details?

A. external
B. detailed
C. exception
D. supplemental
E. none of the above

View answer
Correct answer: (E)
none of the above

414. A task of developing a technical blueprint and specifications for a solution that
fulfills the business requirements is undertaken in the following phase of the system
development process

A. system initiation
B. system implementation
C. system analysis
D. system design
E. feasibility analysis

View answer
Correct answer: (D)
system design
415. The most important attribute of information quality that a manager requires is:

A. relevance.
B. media.
C. presentation.
D. timeliness.
E. none of the above.

View answer
Correct answer: (A)
relevance.

416. UML depicts information systems as a collection of:

A. Entities
B. Processes
C. Data
D. Information
E. Objects

View answer
Correct answer: (E)
Objects

417. Information systems that support the business functions that reach out to
suppliers are known as:

A. back office information systems


B. decision support systems
C. expert information systems
D. front office information systems
E. none of the above

View answer
Correct answer: (A)
back office information systems

418. Project Management ensures that

A. project's risk is assessed


B. project's feasibility is assessed
C. system is developed at minimum cost
D. both A and B
E. none of the above
View answer
Correct answer: (C)
system is developed at minimum cost

419. All of the following are phases of systems analysis, except

A. decision analysis phase


B. requirements analysis phase
C. design analysis phase
D. problem analysis phase
E. scope definition phase

View answer
Correct answer: (C)
design analysis phase

420. The process of requirements discovery consists of the following activities, except

A. requirements management
B. sampling of existing documentation, forms and files
C. requirements discovery
D. problem discovery and analysis
E. documenting and analyzing requirements

View answer
Correct answer: (B)
sampling of existing documentation, forms and files

421. All of the following are examples of requirements problems, except

A. missing requirements
B. overlapping requirements
C. costly requirements
D. conflicting requirements
E. ambiguous requirements

View answer
Correct answer: (C)
costly requirements

422. Which of the following is NOT a guideline for successfully conducting a Joint
Requirements Planning (JRP) session?

A. stay on schedule
B. allow for ample breaks
C. encourage user and management participation
D. brainstorm technical alternatives to problems identified in a JRP session
E. ensure that the scribe is able to take notes

View answer
Correct answer: (D)
brainstorm technical alternatives to problems identified in a JRP session

423. Which of the following is the first phase of the Systems Implementation phase?

A. conduct system test


B. build and test networks
C. prepare conversion plan
D. build and test databases
E. write and test new programs

View answer
Correct answer: (A)
conduct system test

424. Remote batch processing has the following characteristic(s):

A. Data is entered online.


B. Data is collected in batches.
C. Data is processed at a later time.
D. both (a) and (b) and (c)
E. none of the above

View answer
Correct answer: (D)
both (a) and (b) and (c)

425. The most common medium for computer outputs is:

A. screen
B. paper
C. e-mail
D. microfilm
E. none of the above

View answer
Correct answer: (B)
paper
426. Which of the following is not a technology driver for an information system?

A. enterprise applications
B. object technologies
C. knowledge asset management
D. collaborative technologies
E. networks and the Internet

View answer
Correct answer: (C)
knowledge asset management

427. To improve the performance of a business process, which of the following is most
relevant?

A. Input.
B. Processing.
C. All of the above.
D. Control and feedback
E. Output.

View answer
Correct answer: (D)
Control and feedback

428. What should not be part of an acceptable use policy?

A. Allowable use of systems


B. Legal obligations
C. Encryption policies
D. User responsibilities
E. Account and password responsibilities

View answer
Correct answer: (C)
Encryption policies

429. Who are the people that actually use the system to perform or support the work
to be completed?

A. system analysts
B. system designers
C. system owners
D. system builders
E. none of the above
View answer
Correct answer: (E)
none of the above

430. Open database connectivity (OBDC) tools are an example of:

A. layerware
B. tool kit
C. interfaceware
D. middleware
E. none of the above

View answer
Correct answer: (D)
middleware

431. An ongoing activity of systems support is

A. assisting users
B. adapting the system to new requirements
C. recovering the system
D. fixing software defects
E. all of the above

View answer
Correct answer: (E)
all of the above

432. Which of the following analysis techniques derive system models from existing
system or discovery prototypes?

A. rapid architected analysis


B. object-oriented analysis
C. data modeling
D. discovery prototyping
E. structure analysis

View answer
Correct answer: (A)
rapid architected analysis

433. A fact-finding technique that involves a large number of observations taken at


random intervals is called:
A. randomization
B. stratification
C. people sampling
D. work sampling
E. none of the above

View answer
Correct answer: (D)
work sampling

434. Which of the following is the last phase of the Systems Construction phase?

A. build and test databases


B. write and test new programs
C. prepare conversion plan
D. build and test networks
E. none of the above

View answer
Correct answer: (B)
write and test new programs

435. Which of the following is(are) an input process method(s)?

A. smart card
B. biometric
C. optical mark
D. point-of-sale
E. all of the above

View answer
Correct answer: (E)
all of the above

436. Optical character recognition:

A. is less prevalent than optical mark recognition


B. is used on forms for subjective-based questions on exams
C. requires the user to carefully handwrite input data on a business form
D. both (a) and (c)
E. both (a) and (b) and (c)

View answer
Correct answer: (D)
both (a) and (c)
437. A turnaround output is an example of

A. internal output
B. external output
C. summary output
D. exception output
E. none of the above

View answer
Correct answer: (B)
external output

438. An information system that supports the planning and assessment needs of
executive management is

A. DSS
B. TPS
C. ERP
D. MIS
E. none of the above

View answer
Correct answer: (E)
none of the above

439. When a bank offers web self-service for customers to answer their questions, the
primary outcome is:

A. adds value.
B. manages risks.
C. reduces costs.
D. creates a new opportunity.
E. none of the above.

View answer
Correct answer: (C)
reduces costs.

440. The majority of publically available Internet information sources are:

A. created in XML.
B. structured information.
C. normal information.
D. unstructured information.
E. none of the above.
View answer
Correct answer: (D)
unstructured information.

441. Which of the following statements describes a taxonomy?

A. A browsable hierarchy
B. A list of equivalent terms
C. A complex controlled vocabulary showing relationships

View answer
Correct answer: (A)
A browsable hierarchy

442. Which of the following is part of a static view of information?

A. Logical data model


B. Meta data
C. Data flow model
D. Information process model

View answer
Correct answer: (C)
Data flow model

443. The flow of transactions through business processes to ensure appropriate


checks and approvals are implemented is called:

A. procedures
B. work flow
C. process flow
D. process requirements
E. procedures

View answer
Correct answer: (B)
work flow

444. Which of the following phases is unique to the commercial application package
implementation strategy as opposed to the rapid application development strategy

A. problem analysis
B. construction and testing
C. scope definition
D. requirements analysis
E. business process design

View answer
Correct answer: (E)
business process design

445. Which of the following is NOT a feasibility analysis criterion?

A. technical feasibility
B. schedule feasibility
C. operational feasibility
D. economic feasibility
E. resource feasibility

View answer
Correct answer: (E)
resource feasibility

446. The task of identifying and expressing system requirements is performed in which
phase of systems analysis?

A. problem analysis phase


B. logical design phase
C. scope definition phase
D. requirements analysis phase
E. none of the above

View answer
Correct answer: (D)
requirements analysis phase

447. Which of the following is an advantage of discovery prototyping?

A. serves as a training mechanism for users


B. allows users and developers to experiment with the software and develop an
understanding of how the system might work
C. aids in building system test plans and scenarios
D. aids in determining the feasibility and usefulness of the system before high
development costs are incurred
E. all of the above

View answer
Correct answer: (E)
all of the above
448. Which of the tests is a final system test performed by end users using real data
over an extended period of time?

A. final test
B. complete test
C. systems acceptance test
D. parallel test
E. none of the above

View answer
Correct answer: (C)
systems acceptance test

449. Which of the following is NOT an advanced input control?

A. radio button
B. slider edit calendar
C. spin box
D. both (a) and (c)
E. Internet hyperlink

View answer
Correct answer: (D)
both (a) and (c)

450. A list of the names of all customers who purchased only one product within a six-
month period would be an example of a(n):

A. detailed report
B. summary report
C. exception report
D. external report
E. none of the above

View answer
Correct answer: (C)
exception report

You might also like