View Answer Correct Answer: (A) CIO
View Answer Correct Answer: (A) CIO
A. CIO
B. systems analyst
C. database administrator
D. system operator
View answer
Correct answer: (A)
CIO
A. Technology diffusion
B. Technology infusion
C. Technology collusion
D. Technology fusion
View answer
Correct answer: (A)
Technology diffusion
A. Data
B. E-commerce
C. A transaction
D. Input
View answer
Correct answer: (C)
A transaction
4. ______________ is software programs that were developed for a general market and
that can be purchased in a store.
A. Proprietary software
B. Off-the-shelf software
C. Contract software
D. Application software
View answer
Correct answer: (B)
Off-the-shelf software
A. Encryption
B. A firewall
C. Decryption
D. An encoder
View answer
Correct answer: (C)
Decryption
A. OLTP
B. batch processing
C. active processing
D. automated transaction processing
View answer
Correct answer: (A)
OLTP
A. Simulation
B. What-if analysis
C. Optimization
D. Goal-seeking analysis
View answer
Correct answer: (B)
What-if analysis
A. Systems analysis
B. Creative analysis
C. Critical analysis
D. Organizational analysis
View answer
Correct answer: (B)
Creative analysis
9. Whose responsibility is it to see that the potential consequences of IS use are fully
considered?
A. IS professionals
B. managers
C. users
D. all of the above
View answer
Correct answer: (A)
IS professionals
10. The first stage in the problem-solving process is called the ______________ stage.
During this stage, potential problems or opportunities are identified and defined.
A. Choice
B. Design
C. Monitoring
D. Intelligence
View answer
Correct answer: (C)
Monitoring
View answer
Correct answer: (D)
Produce standard reports used for management decision making
12. ______________ is a protocol that enables you to copy a file from another computer
to your computer.
A. SLIP
B. Usenet
C. Telnet
D. FTP
View answer
Correct answer: (D)
FTP
A. Change model
B. Organizational learning
C. Organizational culture
D. Continuous improvement
View answer
Correct answer: (D)
Continuous improvement
A. traditional
B. virtual
C. multidimensional
D. matrix
View answer
Correct answer: (B)
virtual
A. Bundled software
B. Software suite
C. Productivity applications
D. General purpose software
View answer
Correct answer: (B)
Software suite
16. The data processing activity that involves rekeying miskeyed or misscanned data
is called ______________.
A. editing
B. data storage
C. data correction
D. data collection
View answer
Correct answer: (C)
data correction
17. The component of a decision support system that provides decision makers access
to a variety of models and assists them in decision making is called the ______________.
A. Model base
B. model management software
C. database
D. dialogue manager
View answer
Correct answer: (C)
database
A. Accumulation processing
B. Batch processing
C. Data collection
D. Data collection
View answer
Correct answer: (B)
Batch processing
19. Information systems that support the firm in its interaction with its environment
are said to be performing within the ______________.
View answer
Correct answer: (C)
Enterprise sphere of influence
20. ______________ are individuals who help users determine what outputs they need
from the system and construct the plans needed to develop the necessary programs
that produce these outputs.
View answer
Correct answer: (D)
Systems analysts
21. The current major stage in the business use of IS is oriented towards ______________.
View answer
Correct answer: (B)
Gaining competitive advantage
A. Model
B. System parameter
C. System performance standard
D. System
View answer
Correct answer: (A)
Model
23. ______________ attacks have overwhelmed the capacity of some of the Web's most
established and popular sites.
A. Spam
B. Credit card fraud
C. Denial-of-service
D. Spoofing
View answer
Correct answer: (C)
Denial-of-service
24. ______________ gives the computer the ability to make suggestions and act like an
expert in a particular field.
View answer
Correct answer: (D)
Expert systems
25. ______________ is an Internet service that enables you to log on to another computer
and access its public files.
A. Telnet
B. FTP
C. Content streaming
D. Instant messaging
View answer
Correct answer: (A)
Telnet
26. ______________ describes various program functions and help users operate the
computer system
A. A computer program
B. Documentation
C. Systems software
D. A computer system platform
View answer
Correct answer: (B)
Documentation
27. Which of the following statements, about the use of decision support systems, is
true?
A. They are applied only to the choice phase of the problem-solving process.
B. They are only applied to frequent, recurring problems.
C. They are only applied to highly-structured problems
D. They assist decision makers at all levels within the organization.
View answer
Correct answer: (D)
They assist decision makers at all levels within the organization.
View answer
Correct answer: (A)
its accuracy and completeness
A. Optimization models
B. Satisficing models
C. Heuristics
D. Programmed decisions
View answer
Correct answer: (D)
Programmed decisions
A. E-commerce
B. Transaction processing systems
C. Management information systems
D. Decision support systems
View answer
Correct answer: (B)
Transaction processing systems
31. ______________ is the process of converting a message into a secret code and
changing the encoded message back to regular text.
A. Encryption
B. Fraud
C. Encoding
D. Cryptography
View answer
Correct answer: (D)
Cryptography
32. Problems that are routine and have well-defined relationships are called
______________.
A. Structured problems
B. Programmed decisions
C. Simple problems
D. Heuristics
View answer
Correct answer: (A)
Structured problems
A. Knowledge
B. Data
C. Feedback
D. A process
View answer
Correct answer: (A)
Knowledge
34. Day's critical activities and is typically available at the beginning of each workday.
A. Demand report
B. scheduled report
C. key-indicator report
D. exception report
View answer
Correct answer: (C)
key-indicator report
35. ______________ is factors that are essential to the success of certain functional areas
of an organization.
A. Mission-critical factors
B. Critical success factors
C. Performance objectives
D. Strategic factors
View answer
Correct answer: (B)
Critical success factors
36. The four key questions related to fairness in information use are ______________
View answer
Correct answer: (D)
knowledge, accuracy, timing, and permission
37. Which of the following SDLCs listed below takes an iterative approach to the
systems development process?
A. end user
B. RAD
C. prototyping
D. traditional waterfall
View answer
Correct answer: (B)
RAD
38. ______________ is a crime in which the imposter obtains key pieces of personal
information in order to impersonate the victim.
A. Social engineering
B. Dumpster diving
C. Computer fraud
D. Identity theft
View answer
Correct answer: (A)
Social engineering
39. The translation of strategic and organizational goals into system development
initiatives is called ______________.
A. Systems development
B. information systems planning
C. project planning
D. project definition
View answer
Correct answer: (B)
information systems planning
41. Information systems that monitor the elementary activities and transactions of the
organizations are ______________.
A. management-level systems.
B. operational-level systems.
C. knowledge-level systems.
D. strategic systems.
View answer
Correct answer: (A)
management-level systems.
A. traditional
B. classical
C. operational
D. absolute
View answer
Correct answer: (B)
classical
43. In compilation process the program is placed in the memory in the form
______________.
A. octal.
B. binary.
C. hexadecimal.
D. decimal.
View answer
Correct answer: (B)
binary.
A. marketing.
B. advertising.
C. feedback.
D. promoting.
View answer
Correct answer: (C)
feedback.
A. objective.
B. managers.
C. business.
D. firms.
View answer
Correct answer: (C)
business.
46. ______________ system is concerned with the way information is used for purpose of
control and applies technologies.
A. Feedback.
B. Interview.
C. Interaction.
D. Conference.
View answer
Correct answer: (A)
Feedback.
A. depositing.
B. saving.
C. recurring.
D. collecting.
View answer
Correct answer: (C)
recurring.
A. information.
B. data.
C. statements.
D. data flow.
View answer
Correct answer: (D)
data flow.
View answer
Correct answer: (B)
Business Process Engineering.
View answer
Correct answer: (B)
Central Processing Unit.
View answer
Correct answer: (D)
Fibre optics.
52. In network based systems ______________ devices is used to connect all the system
in to one for sharing information.
A. modem.
B. adapter.
C. hub.
D. processor.
View answer
Correct answer: (C)
hub.
A. Structural.
B. Strategic.
C. Procedural.
D. Physical.
View answer
Correct answer: (B)
Strategic.
54. In a company ______________ is the centre which consists of all processing activities.
A. Data.
B. Production.
C. Information.
D. Sales.
View answer
Correct answer: (A)
Data.
55. Acquiring, training and retaining good network ______________ should be a top
priority.
A. data entry.
B. lab in charge.
C. Administrator.
D. system tester.
View answer
Correct answer: (C)
Administrator.
56. In a firm the reports are generated under condition are called ______________
reports.
A. exception.
B. condition.
C. standard.
D. periodic.
View answer
Correct answer: (A)
exception.
57. ______________ models to analysis a problem and provides possible solution for
management evaluation
A. Decision.
B. Standard.
C. Structural.
D. Periodic.
View answer
Correct answer: (A)
Decision.
58. ______________ type of budgeting is based on estimation of total project cost by the
top management.
A. top-down
B. bottom-up
C. neural
D. zero-based
View answer
Correct answer: (A)
top-down
A. Stable
B. Formal
C. Unstable
D. Informal
View answer
Correct answer: (B)
Formal
A. Super
B. Micro
C. Mainframe
D. Mini
View answer
Correct answer: (B)
Micro
A. Variable
B. Object
C. Methods
D. Class
View answer
Correct answer: (C)
Methods
62. ______________ is one or more multi user process with a higher capacity of shared
memory which provides connectivity and database services
A. Client
B. Desktop
C. Server
D. None of the above
View answer
Correct answer: (C)
Server
63. ______________ is the period in days between the ordering and delivering of goods.
A. Demand
B. Duration
C. Lead time
D. Process
View answer
Correct answer: (C)
Lead time
64. In very big network the ______________ device is used to find the effective part in
time.
A. Router
B. Modem
C. Control
D. Hub
View answer
Correct answer: (A)
Router
A. General.
B. Star.
C. Mesh.
D. Ring.
View answer
Correct answer: (C)
Mesh.
A. Packets
B. Blocks.
C. Small units
D. Data.
View answer
Correct answer: (A)
Packets
67. ______________ is small figures that look like a file folder appears in the screen.
A. Folder
B. Icons
C. File
D. Cursor
View answer
Correct answer: (B)
Icons
A. E-mail
B. Electronic meeting
C. Electronic publishing
D. Desktop publishing
View answer
Correct answer: (C)
Electronic publishing
View answer
Correct answer: (A)
Transaction Processing System
70. ______________ leader who commands both positional and personal influence. Team.
A. Team.
B. Project.
C. Formal.
D. Informal.
View answer
Correct answer: (C)
Formal.
A. C.
B. Cobol.
C. Fortran.
D. Basic.
View answer
Correct answer: (C)
Fortran.
72. The ______________ information system deals with the flow of information about
people working in the organization
A. record.
B. transaction.
C. Personnel.
D. Blocked.
View answer
Correct answer: (C)
Personnel.
A. model.
B. style.
C. process.
D. manner.
View answer
Correct answer: (D)
manner.
74. ______________ is the fact that are properly arranged, classified and organized.
A. Data.
B. Events.
C. Statements.
D. Information.
View answer
Correct answer: (D)
Information.
A. Explicitness.
B. Completeness.
C. Accuracy.
D. Exception based.
View answer
Correct answer: (A)
Explicitness.
A. end user.
B. hardware.
C. data.
D. software.
View answer
Correct answer: (A)
end user.
View answer
Correct answer: (A)
Modulation and Demodulation.
A. Point Of Structure.
B. Point Of Sale.
C. Product Of Structure.
D. Product Of Sale.
View answer
Correct answer: (B)
Point Of Sale.
A. system integrators.
B. system analyst.
C. system evaluator.
D. system tester.
View answer
Correct answer: (A)
system integrators.
View answer
Correct answer: (A)
Advanced Technology Groups.
A. Expert.
B. Executive.
C. Decision.
D. Managerial.
View answer
Correct answer: (B)
Executive.
82. Decision varies as to the ______________ structure within each level of management.
A. Degree.
B. Data.
C. Situation.
D. Order.
View answer
Correct answer: (A)
Degree.
83. ______________ sub system covers granting of credit and cost management
A. Accounting.
B. Purchase.
C. Personnel.
D. Sales.
View answer
Correct answer: (A)
Accounting.
84. The project team is composed of the system professional are directly responsible
for ______________ the system
A. testing
B. building
C. deleting
D. innovating
View answer
Correct answer: (B)
building
85. ______________ type of testing ensures the system is free of errors and is ready to be
placed into operation.
A. Audit
B. General
C. Technical
D. Data
View answer
Correct answer: (A)
Audit
A. Giga Bytes
B. Giga Bits
C. Gif Bits
D. Gif Bytes
View answer
Correct answer: (A)
Giga Bytes
87. Primary storage device such as semiconductor memory chips are called
______________.
A. Parallel
B. Sequential
C. direct access
D. binary access
View answer
Correct answer: (C)
direct access
88. ______________ will produce the periodic financial statements and reports of the
business.
A. Cash ledger
B. Final Account
C. Trail Balance
D. General Ledger
View answer
Correct answer: (D)
General Ledger
A. Random
B. Neural
C. Fuzzy logic
D. Cognitive
View answer
Correct answer: (C)
Fuzzy logic
A. Protocols.
B. Gateway.
C. Multiplexers.
D. Router
View answer
Correct answer: (B)
Gateway.
View answer
Correct answer: (A)
Business Process Reengineering
View answer
Correct answer: (D)
Image Processing
93. In communication ______________ that controls the input and output activities
A. Software
B. Hardware
C. Signals
D. Data
View answer
Correct answer: (A)
Software
A. 1951-60
B. 1961-70
C. 1981-90
D. 1971
View answer
Correct answer: (A)
1951-60
A. buffer.
B. space.
C. processor.
D. cabinet.
View answer
Correct answer: (A)
buffer.
A. Batch.
B. Group.
C. Sequence.
D. Real.
View answer
Correct answer: (A)
Batch.
97. The ______________ component plays a decision rule for the computer.
A. program.
B. statements.
C. input data.
D. conditions.
View answer
Correct answer: (A)
program.
A. Organization.
B. Integration.
C. Interaction.
D. Central objective.
View answer
Correct answer: (B)
Integration.
99. The final element of feedback is essential fro system operation and for
______________.
A. self-regulation.
B. correct errors.
C. testing.
D. debugging.
View answer
Correct answer: (A)
self-regulation.
100. In among the firms executives, managers, and supervisors are comes under
______________ of workers.
A. knowledge.
B. leader.
C. informer.
D. higher level.
View answer
Correct answer: (A)
knowledge.
101. ______________ is the mortar that holds all the functional systems together.
A. Storage.
B. System.
C. Database.
D. Memory.
View answer
Correct answer: (C)
Database.
View answer
Correct answer: (A)
Model.
103. ______________ type of data uses pictures and graphics shapes for usage.
A. Text.
B. Image.
C. Alpha numeric.
D. Symbols.
View answer
Correct answer: (B)
Image.
A. Batch.
B. Parallel.
C. Sequence.
D. Real time.
View answer
Correct answer: (D)
Real time.
105. ______________ of information systems that support key business functions as well
as cross functional business processes.
A. Standards.
B. Rules.
C. Portfolio.
D. Procedure.
View answer
Correct answer: (C)
Portfolio.
106. ______________ manager typically manage the operation of specific LAN and WAN.
A. Factory.
B. Network.
C. Firm.
D. System.
View answer
Correct answer: (B)
Network.
A. Condition.
B. Specific.
C. Periodic.
D. Demand.
View answer
Correct answer: (C)
Periodic.
108. In general the information system can also describe in terms of ______________.
A. Operations.
B. Functions.
C. events .
D. tasks.
View answer
Correct answer: (B)
Functions.
109. ______________ charts are used to represent the project tasks and durations.
A. Gantt
B. X ray
C. Bar
D. Scatter
View answer
Correct answer: (A)
Gantt
A. Initial
B. Implementation
C. Testing
D. Design
View answer
Correct answer: (B)
Implementation
A. Procedural
B. Biometric
C. Hardware
D. Facility
View answer
Correct answer: (B)
Biometric
A. Server
B. Client
C. System
D. CPU
View answer
Correct answer: (B)
Client
View answer
Correct answer: (A)
Graphical User Interface
View answer
Correct answer: (B)
First In First Out
A. Fibre optic
B. Co-axial.
C. Twisted pair.
D. Lead wire.
View answer
Correct answer: (A)
Fibre optic
A. Bit
B. Band.
C. Bandwidth.
D. Frequency.
View answer
Correct answer: (B)
Band.
A. Data hidden
B. data display
C. data processing
D. data transfer
View answer
Correct answer: (D)
data transfer
View answer
Correct answer: (D)
operating system.
View answer
Correct answer: (C)
Supply Chain Management
View answer
Correct answer: (A)
tracking the status of orders.
121. The major drawbacks in decision making by MIS is difficult due ______________ for
business problems.
A. structure.
B. rules.
C. strategy.
D. conditions.
View answer
Correct answer: (B)
rules.
122. ______________ planning systems deals with the projections of the future.
A. Operational.
B. Strategic.
C. Processing.
D. Statistical.
View answer
Correct answer: (B)
Strategic.
123. ______________ system grouping of people and behavior has been subjected to
research.
A. Closed.
B. Social.
C. Conceptual.
D. Manufactured.
View answer
Correct answer: (B)
Social.
124. ______________ means that information must reach the recipients within the
prescribe timerframe.
A. Duration.
B. Period.
C. Timeliness.
D. Time.
View answer
Correct answer: (C)
Timeliness.
125. ________________ system is that two or more subsystems share the data over a
network.
A. Open.
B. Closed.
C. Distributed.
D. Undistributed.
View answer
Correct answer: (C)
Distributed.
126. ______________ is the people who develop and operate the information systems.
A. IS specialists.
B. IS Analyst.
C. IS experts.
D. IS data entry.
View answer
Correct answer: (A)
IS specialists.
A. cables.
B. hardware devices.
C. transfer.
D. software.
View answer
Correct answer: (A)
cables.
A. system.
B. node.
C. group systems.
D. personal system.
View answer
Correct answer: (B)
node.
129. ______________ system will monitor and control the industrial processing activities.
A. Process control.
B. Process decision.
C. Process cleaning.
D. Process updating.
View answer
Correct answer: (A)
Process control.
View answer
Correct answer: (B)
Human Resource Management.
131. ______________ system that allocate costs to users based on the information
services rendered
A. change complete.
B. change back.
C. charge complete.
D. charge back.
View answer
Correct answer: (D)
charge back.
View answer
Correct answer: (D)
Auditing Information Systems.
133. In any real time system ______________ factors are termed as boundaries of the
system.
A. Statement.
B. Conditions.
C. Blocks.
D. Limit.
View answer
Correct answer: (D)
Limit.
134. ______________ sub system deals with activities as purchasing, receiving inventory
control and distribution
A. Marketing.
B. Purchase.
C. Sales.
D. Logistics.
View answer
Correct answer: (D)
Logistics.
View answer
Correct answer: (A)
Request for Proposal
View answer
Correct answer: (D)
Personal Digital Assistants
137. The ______________ most common form of visual output for user interface
A. e-data
B. printout
C. mail data
D. scan data
View answer
Correct answer: (B)
printout
138. Assembly language use ______________ technology for programming
A. Symbols
B. Data
C. Mnemonic codes
D. Alpha numeric
View answer
Correct answer: (C)
Mnemonic codes
139. ______________ type of cables uses the copper wire for data transmission
A. Fibre optics
B. Co-axial
C. Lead wire
D. Twisted pair
View answer
Correct answer: (D)
Twisted pair
A. Topology.
B. Structure.
C. Plans.
D. Architecture.
View answer
Correct answer: (A)
Topology.
A. Procedures.
B. Conditions.
C. Algorithms.
D. Rules and regulations.
View answer
Correct answer: (D)
Rules and regulations.
142. ______________ duplex transmission can flow data in two ways but one direction at
a time.
A. Full.
B. Switch.
C. Half.
D. Circuit.
View answer
Correct answer: (C)
Half.
View answer
Correct answer: (A)
fields and records.
View answer
Correct answer: (A)
Enterprise Resource Planning
A. formal
B. informal.
C. stable.
D. unstable.
View answer
Correct answer: (B)
informal.
146. In computer the number system of 0 and 1 is called as ______________.
A. octal.
B. hexadecimal.
C. decimal.
D. binary.
View answer
Correct answer: (D)
binary.
147. The most rapidly growing application for computer assisted decision making is
called ______________.
A. simulation.
B. attribute.
C. validation.
D. entity.
View answer
Correct answer: (A)
simulation.
View answer
Correct answer: (B)
electronic data processing.
149. The ______________ system which is closest to the stress will change the most.
A. super.
B. probabilistic.
C. sub.
D. stable.
View answer
Correct answer: (C)
sub.
150. Reporting the status of an activity through a feedback mechanism is called
______________ information.
A. process.
B. control.
C. executed.
D. validated.
View answer
Correct answer: (B)
control.
151. Plan must include the ______________ systems concept for implementation of the
new Information system.
A. Existing.
B. Future.
C. Omitted.
D. Progressing.
View answer
Correct answer: (A)
Existing.
152. ______________ information system uses the information technology to develop all
features in the products.
A. Structure.
B. Strategic.
C. Systematic.
D. Statistical.
View answer
Correct answer: (A)
Structure.
View answer
Correct answer: (C)
Data into information.
A. Satellite.
B. Fibre optics
C. Coaxial.
D. Twisted pair.
View answer
Correct answer: (A)
Satellite.
155. ______________ system monitors the processing of jobs, development and schedule
in the overall systems.
A. Testing.
B. Processing.
C. Performance.
D. Scheduling.
View answer
Correct answer: (C)
Performance.
A. user consultant.
B. user friendly.
C. user expert.
D. user manager.
View answer
Correct answer: (A)
user consultant.
157. The operating decisions resulting actions usually cover ______________ periods.
A. Medium.
B. short time.
C. over an year.
D. long time.
View answer
Correct answer: (B)
short time.
158. ______________ takes responsibility and keeps track of progress in MIS design.
Development and implementation.
A. Time remainder
B. Periods
C. Allocation
D. Scheduling
View answer
Correct answer: (D)
Scheduling
A. Sequence
B. Parallel
C. top-down
D. bottom-up
View answer
Correct answer: (C)
top-down
A. guided media
B. Unguided Media
C. Both media
D. None
View answer
Correct answer: (B)
Unguided Media
View answer
Correct answer: (B)
Customer Relationship Management
View answer
Correct answer: (C)
Inter Process Communication
163. __________ keeps tracks of data concerning purchase from and payments to
suppliers.
A. Inventory control
B. Accounts payable
C. Payroll
D. Accounts receivable
View answer
Correct answer: (B)
Accounts payable
A. Router.
B. Bridge.
C. Adapter.
D. Hub.
View answer
Correct answer: (B)
Bridge.
A. a profit state
B. a specific objective.
C. managers objective.
D. Target
View answer
Correct answer: (B)
a specific objective.
A. DSS
B. MIS
C. ESS
D. TPS
View answer
Correct answer: (C)
ESS
167. ______________ is the oldest and most widely used from of grouping activities.
A. Functional.
B. Operational.
C. Statistical
D. Managerial
View answer
A. program.
B. statements.
C. block.
D. grouping.
View answer
Correct answer: (A)
program.
169. ______________ is an overall performance summary to date and compared with the
previous periods, budgets.
A. Sales recap
B. Sales data.
C. Sales list.
D. Sales objective.
View answer
Correct answer: (A)
Sales recap
A. goals.
B. objective.
C. profit.
D. mission.
View answer
Correct answer: (D)
mission.
A. datas.
B. data.
C. datum.
D. fact.
View answer
Correct answer: (C)
datum.
172. ______________ type of system is essential for applying boundaries of the problem.
A. Super.
B. Sub.
C. Economic.
D. Non Adaptive
View answer
Correct answer: (B)
Sub.
173. Knowledge bases that hold knowledge in a variety of forms such as ______________.
View answer
Correct answer: (A)
facts and rules.
174. The computer system uses ______________ forms of data for usage.
A. Symbols.
B. Analog.
C. Digital.
D. Text.
View answer
Correct answer: (C)
Digital.
175. ______________ information system planning us the last stage of the planning
process.
A. Tactical.
B. Strategic.
C. Architecture.
D. Processed.
View answer
Correct answer: (A)
Tactical.
A. HR.
B. Manager.
C. GM.
D. In charge.
View answer
Correct answer: (A)
HR.
177. The total process of a system is the net contribution of ______________ individual
process in the design.
A. Three.
B. Many.
C. Equal to two.
D. One.
View answer
Correct answer: (B)
Many.
178. In overall business side the MIS planning initiates from business ______________.
A. Task.
B. Event.
C. Planning.
D. Operations.
View answer
Correct answer: (C)
Planning.
A. Coupled
B. Multilevel
C. Parallel
D. Single
View answer
Correct answer: (C)
Parallel
180. ______________ language use for artificial intelligence and symbolic applications
A. LISP
B. C
C. PROLOG
D. PASCAL
View answer
Correct answer: (A)
LISP
View answer
Correct answer: (A)
Unstructured
182. Medium bans channels use ______________ type of cables used for transmissions.
View answer
Correct answer: (A)
shielded twisted pair
A. 1
B. 2
C. 3
D. 4
View answer
Correct answer: (C)
3
184. The ______________ will make the automated inventory system understandable to
everyone.
A. statement.
B. programs.
C. document.
D. blocks.
View answer
Correct answer: (C)
document.
View answer
Correct answer: (A)
chief information.
186. ______________ system provide information in easy to use displays to top and =
middle management.
A. Decision.
B. Management.
C. Executive.
D. Expert.
View answer
Correct answer: (C)
Executive.
187. Manages can receive information from ______________ that supports their decision
making systems.
A. Workstations.
B. personal system.
C. Reports.
D. File.
View answer
Correct answer: (A)
Workstations.
A. Price.
B. Demand.
C. Consumer.
D. Product.
View answer
Correct answer: (C)
Consumer.
189. ______________ type of feasibility deals with the costs of both development and
operations of the system.
A. Economic
B. Motivational
C. Technical
D. Schedule
View answer
Correct answer: (A)
Economic
A. Object based
B. Rule based
C. Frame based
D. Case based
View answer
Correct answer: (C)
Frame based
191. Information systems that monitor the elementary activities and transactions of
the organizations are:
A. Management-level system
B. Operational-level, system
C. Knowledge-level system
D. Strategic level system
View answer
Correct answer: (A)
Management-level system
A. Serve managers interested in weekly, monthly, and yearly results, not day-to-
day activities.
B. Help managers make decisions that are unique, rapidly changing, and not easily
specified in advance.
C. Provide managers with a generalised computing and telecommunications
capacity that can be applied to a changing array of problems.
D. Perform and record the daily routine transactions necessary to the conduct of
business.
View answer
Correct answer: (A)
Serve managers interested in weekly, monthly, and yearly results, not day-to-day
activities.
193. Materials into intermediate and finished products, and distributing the finished
products to customers?
A. Production Chain
B. Primary Chain
C. Supply Chain
D. Distribution chain
View answer
Correct answer: (C)
Supply Chain
194. Customer numbers and their names would be an example of the ______________
component of an order management information system.
A. software
B. hardware
C. data
D. procedure
View answer
Correct answer: (C)
data
View answer
Correct answer: (A)
operational data has not been archived
View answer
Correct answer: (D)
All of the above.
197. The accounting system is ______________ whereas the demand forecasting system
is ______________.
A. deterministic, probabilistic
B. probabilistic, deterministic
C. open, close
D. close, open
View answer
Correct answer: (A)
deterministic, probabilistic
198. ______________ e-commerce applications use EDI over the secure Virtual private
network.
View answer
Correct answer: (D)
B2B (Business Organisation to Business)
199. The-popular term for the software component that supports the collaborative
efforts of a team is-
A. videoconferencing software
B. work flow automation software
C. groupware
D. none of above
View answer
Correct answer: (C)
groupware
200. The Management information System receives input from the:
A. EIS.
B. ES.
C. DSS.
D. TPS
View answer
Correct answer: (D)
TPS
A. tactical
B. project
C. organisational
D. strategic
View answer
Correct answer: (D)
strategic
A. magnetic tape
B. magnetic sensor
C. network
D. magnetic disk
View answer
Correct answer: (D)
magnetic disk
A. Dataflow
B. Mode of operation
C. Topology
D. none of the above
View answer
Correct answer: (C)
Topology
204. What is the meaning of Bandwidth in Network?
View answer
Correct answer: (A)
Transmission capacity of a communication channels
A. Bus network
B. Ring network
C. Star network
D. T-switched network
View answer
Correct answer: (D)
T-switched network
A. A computer network
B. A server
C. A client
D. Authentication
View answer
Correct answer: (A)
A computer network
A. Cross
B. Bus
C. Star
D. Ring
View answer
Correct answer: (B)
Bus
208. TPSs is called ______________
View answer
Correct answer: (C)
Transaction processing systems
View answer
Correct answer: (B)
is a standard way of organizing information into accessible parts
View answer
Correct answer: (E)
None of the above
A. Data
B. Behaviour
C. State
D. Both Data and behaviour
View answer
Correct answer: (D)
Both Data and behaviour
212. Which of the following is not an attribute of software engineering?
A. Efficiency.
B. Scalability.
C. Dependability.
D. Usability.
View answer
Correct answer: (C)
Dependability.
213. Which means a place where data can be stored in a structured manner:
A. CPU
B. Database
C. ALU
D. All of these
View answer
Correct answer: (B)
Database
A. Data definition
B. Data manipulation
C. Data integrity
D. Database schema
View answer
Correct answer: (D)
Database schema
215. Which is the person responsible for overall control of the database system:
A. DDL
B. DBMS
C. DBA
D. SDL
View answer
Correct answer: (C)
DBA
View answer
Correct answer: (C)
File
A. Query Language
B. Database Manager
C. File manager
D. All of these
View answer
Correct answer: (D)
All of these
218. The ______________ model stipulates that the requirements be completely specified
before the rest of the development can processed.
A. Waterfall
B. Rapid Application Development (RAD)
C. Iterative Development
D. Incremental Development
View answer
Correct answer: (A)
Waterfall
A. Network Model
B. Object oriented model
C. E-R Model
D. None of these
View answer
Correct answer: (A)
Network Model
220. The role of an integrated CASE tool in system analysis and design project is
A. Proving a CASE study for software development
B. To provide an environment that automate key tasks throughout software
development process
C. To provide tool for reacting a word file
D. None of the above
View answer
Correct answer: (B)
To provide an environment that automate key tasks throughout software
development process
A. Reusability
B. Portability
C. Inter operability
D. All of the above
View answer
Correct answer: (D)
All of the above
View answer
Correct answer: (D)
for converting structured English procedures to source code into a language such as
C
A. DSS
B. MIS
C. ESS
D. TPS
View answer
Correct answer: (C)
ESS
224. Prototype is a
View answer
Correct answer: (A)
Working model of existing system
A. Operational level
B. Management level
C. Knowledge level
D. Strategic level
View answer
Correct answer: (D)
Strategic level
A. Manufacturing processes.
B. Financial and accounting processes.
C. Human resource processes.
D. All of the above.
View answer
Correct answer: (D)
All of the above.
A. Interchangeability
B. relevance
C. cost effectiveness
D. timeliness
View answer
Correct answer: (A)
Interchangeability
A. Intelligent Agents.
B. Expert System.
C. None of the above.
D. A&B
View answer
Correct answer: (D)
A&B
229. Which of the following are the inputs of Marketing Information System?
View answer
Correct answer: (D)
All I, ii, iii and iv.
230. In which of the following functions of MIS reports are generated based on the
enterprise's need'?
A. Planning
B. Prediction,
C. Data Processing
D. Data storage
View answer
Correct answer: (A)
Planning
231. The direct, computer-to-computer exchange of standardized, common business
transaction documents between business partners, suppliers, and customers is
______________
A. EDI
B. ES
C. EIS
D. ERP
View answer
Correct answer: (A)
EDI
232. What software organizes, manages, and processes business data concerned with
inventory, customers, and vendors?
View answer
Correct answer: (B)
data management software
A. Mesh
B. Star
C. Bus
D. Ring
View answer
Correct answer: (B)
Star
A. MAN
B. LAN
C. WAN
D. none of the above
View answer
Correct answer: (C)
WAN
A. Unicast, Multicast
B. Multicast, unicast
C. Broadcast, multicast
D. none of the above
View answer
Correct answer: (C)
Broadcast, multicast
236. Which of the following network covers the largest geographical area,
A. PAN
B. LAN
C. MAN
D. WAN
View answer
Correct answer: (D)
WAN
237. What is the powerful, centralized computer system that performs data storage
and processing tasks on behalf of clients and other network devices?
A. Client
B. Host computer
C. Terminal
D. Network
View answer
Correct answer: (B)
Host computer
238. Which of the following is a computer based system that stores and, manipulates
data that are viewed from a geographical point or reference?
239. An application where only one user accesses the database at a given time is an
example of a(n)
View answer
Correct answer: (A)
single-user database application
View answer
Correct answer: (C)
In every loop
A. Coding
B. Testing
C. Maintenance
D. Abstraction
View answer
Correct answer: (D)
Abstraction
242. Software testing techniques are most effective if applied immediately after?
A. Requirement specification
B. Design
C. Coding
D. Integration
View answer
Correct answer: (B)
Design
A. Start-user data
B. End-user data
C. Database
D. None of these
View answer
Correct answer: (B)
End-user data
A. Physical
B. Logical
C. External
D. All of these
View answer
Correct answer: (D)
All of these
View answer
Correct answer: (B)
Structured query language
A. Relational
B. Object-Relational
C. Network
D. All of these
View answer
Correct answer: (D)
All of these
A. Data
B. Meta-Data
C. Entity
D. Relations
View answer
Correct answer: (B)
Meta-Data
248. The first step in the systems development life cycle (SDLC) is:
A. Analysis.
B. Design.
C. Problem/Opportunity Identification.
D. Development and Documentation.
View answer
Correct answer: (C)
Problem/Opportunity Identification.
A. Small Projects
B. Complex Projects
C. Accommodating change
D. None of Above
View answer
Correct answer: (C)
Accommodating change
View answer
Correct answer: (C)
Both (a) and (b)
View answer
Correct answer: (B)
during all the phases of system development life cycle
252. The current standard tool for designing object oriented systems is called
View answer
Correct answer: (A)
Unified Modeling Language
253. Summary transaction data, high-volume data, and simple models are information
Inputs characteristic of:
A. DSS
B. MIS
C. ESS
D. TPS
View answer
Correct answer: (B)
MIS
A. Operational level
B. Management level
C. Knowledge level
D. Strategic level
View answer
Correct answer: (A)
Operational level
A. active
B. Passive
C. proper
D. business
View answer
Correct answer: (B)
Passive
A. DSS
B. MIS
C. ESS
D. All of the above
View answer
Correct answer: (A)
DSS
A. to connect LANs
B. to control Network speed
C. to separate LANs
D. All of the above
View answer
Correct answer: (A)
to connect LANs
258. EIS provide highly unstructured information to the level management for long
term decision making.
A. Operational
B. Bottom
C. Middle
D. Top
View answer
Correct answer: (D)
Top
259. The ______________ provides a manager with the information needed to make
decisions regarding, the firm's operational activities.
A. ElS
B. ES
C. MIS
D. EDl
View answer
Correct answer: (C)
MIS
260. Old main frame computers that are used to avoid high costs is called:
A. Legacy systems
B. Personal computers
C. server
D. Workstation
View answer
Correct answer: (A)
Legacy systems
A. Bus topology
B. Ring topology
C. Star toporogy
D. Mesh topology
View answer
Correct answer: (D)
Mesh topology
262. In which topologies, if there: are n devices in a network each device has n-1 ports
for cables
A. Mesh
B. Star
C. Bus
D. Ring
View answer
Correct answer: (A)
Mesh
263. The following device allows the user to add external components to a computer
system
A. Storage devices
B. Keyboards
C. Portal system boards
D. Diskettes
View answer
Correct answer: (C)
Portal system boards
View answer
Correct answer: (A)
Set of computer programs, procedures and possibly associated document concerned
with the operation of data processing.
A. Data
B. Information
C. Snapshot
D. Reports
View answer
Correct answer: (A)
Data
View answer
Correct answer: (B)
multiuser database application
267. The tools that support different stages of software development life cycle are
called:
A. CASE Tools
B. CAME tools
C. CAQE tools
D. CARE tools
View answer
Correct answer: (A)
CASE Tools
View answer
Correct answer: (D)
refers to the holism of systems
269. A ______________ view of data expresses the way a user thinks about data
A. Logical view
B. Physical view
C. Both
D. None
View answer
Correct answer: (A)
Logical view
View answer
Correct answer: (C)
Both
271. Every record in the same size in bytes, the file is constituted of ______________
A. Record
B. Record blocking
C. Fixed-length record
D. Variable-length record
View answer
Correct answer: (C)
Fixed-length record
A. Data redundancy
B. Independence
C. Flexibility
D. Data Integrity
View answer
Correct answer: (A)
Data redundancy
A. Number of tuples.
B. Number of attributes.
C. Number of tables.
D. Number of constraints
View answer
Correct answer: (A)
Number of tuples.
View answer
Correct answer: (A)
System Development Life Cycle
A. Spiral Model
B. Waterfall Model
C. Prototyping Model
D. Capability maturity Model
View answer
Correct answer: (D)
Capability maturity Model
View answer
Correct answer: (B)
Program, packages used during system analysis and design
View answer
Correct answer: (B)
for converting decision tables to source programs
278. Which of the following individuals typically have less formal, advanced
educational degrees and tend to process rather than create information?
A. Knowledge workers
B. Executives
C. System analysts
D. Data workers
View answer
Correct answer: (D)
Data workers
View answer
Correct answer: (D)
none all of the above.
View answer
Correct answer: (C)
Transaction processing system
A. Self Monitoring.
B. Self controlling.
C. Self regulating.
D. All Of the above.
View answer
Correct answer: (D)
All Of the above.
View answer
Correct answer: (C)
Decision support
View answer
Correct answer: (D)
Management information system.
284. What type of computer is specially designed and/or used for tasks that require
extremely rapid and complex calculations?
A. PC
B. supercomputer
C. midrange computer
D. mainframe
View answer
Correct answer: (B)
supercomputer
A. Multipoint
B. Point-to-point.
C. Multipoint & point-to-point
D. none of the above
View answer
Correct answer: (A)
Multipoint
View answer
Correct answer: (A)
Node
A. Mesh
B. Star
C. Bus
D. Ring
View answer
Correct answer: (B)
Star
A. File sharing
B. Easier Resources
C. Easier
D. All of the Above
View answer
Correct answer: (D)
All of the Above
289. The DBMS acts as an interface between what two components of an enterprise-
class database system?
View answer
Correct answer: (A)
Database application and the database
View answer
Correct answer: (A)
creating and processing forms
View answer
Correct answer: (A)
Computer Aided Software Engineering
A. Data structure
B. Memory
C. Both
D. None
View answer
Correct answer: (A)
Data structure
View answer
Correct answer: (D)
Rapid application development
View answer
Correct answer: (B)
Data definition languages
A. Network Model
B. Relational Model
C. Hierarchical Model
D. Object Oriented
View answer
Correct answer: (B)
Relational Model
A. two levels.
B. four levels.
C. three levels.
D. one level.
View answer
Correct answer: (C)
three levels.
A. Foreign key
B. Super Key
C. Primary Key
D. All of these
View answer
Correct answer: (C)
Primary Key
View answer
Correct answer: (A)
People
View answer
Correct answer: (C)
Both (a) and (b)
View answer
Correct answer: (A)
for developing DFD's
View answer
Correct answer: (B)
Knowledge-level sales and marketing information system.
302. A computer security protocol for logging in would be an example of the
component of an information system:
A. software
B. hardware
C. Data
D. Procedure
View answer
Correct answer: (D)
Procedure
A. i, ii
B. i, iii
C. ii, iii, iv
D. i, jj ,iii
View answer
Correct answer: (B)
i, iii
304. ______________ is the process of defining the current problem, determining why a
new system is needed, identifying the objectives of the proposed system:
A. Feasibility analysis
B. System Analysis
C. System definition
D. System requirements,
View answer
Correct answer: (C)
System definition
305. ______________ focuses on researching how the human brain does work and, how
human beings imagine.
A. Cognitive science
B. Robotics
C. Natural interfaces
D. Artificial intelligence
View answer
Correct answer: (A)
Cognitive science
View answer
Correct answer: (A)
Electronic data interchanqe
A. sensor
B. touch screen
C. keyboard
D. Printer
View answer
Correct answer: (D)
Printer
A. MAN
B. LAN
C. WAN
D. none at the above
View answer
Correct answer: (B)
LAN
309. Which of the following device copies electrical signals from one Ethernet to
another?
A. Bridge
B. Repeater
C. Hub
D. Passive hub
View answer
Correct answer: (B)
Repeater
A. Network layer
B. Session Layer
C. Data link layer
D. Transport layer
View answer
Correct answer: (D)
Transport layer
311. A network computer that shares resources with and responds to requests from
other computer is known as
A. client
B. server,
C. terminal
D. key
View answer
Correct answer: (B)
server,
A. Car Topology
B. Bus Topology
C. Truck Topology
D. None of these
View answer
Correct answer: (B)
Bus Topology
View answer
Correct answer: (B)
Functional business areas
314. The data types describing the type of values that can appear in each column is
called ______________
A. Relations
B. Domain
C. Queries
D. All of above
View answer
Correct answer: (B)
Domain
View answer
Correct answer: (C)
an approach in which the top module is first tested-then program modules are
added from the highest level to the lowest level
View answer
Correct answer: (A)
Definition, development, support
A. Database associated
B. Database administrator
C. Database application
D. Database management system
View answer
Correct answer: (D)
Database management system
A. Register
B. Data
C. Logical view
D. Physical view
View answer
Correct answer: (B)
Data
A. Stack
B. Query
C. Linked list
D. All of these
View answer
Correct answer: (B)
Query
A. C
B. C++
C. SQL
D. None of these
View answer
Correct answer: (C)
SQL
A. Procedural language.
B. Non- Procedural language.
C. Data definition language.
D. High level language.
View answer
Correct answer: (B)
Non- Procedural language.
View answer
Correct answer: (D)
System development life cycle
A. IBM
B. Motorola
C. Microsoft
D. Lucent Technologies
View answer
Correct answer: (A)
IBM
View answer
Correct answer: (B)
Upper and lower CASE tools
A. Operational level
B. Management level
C. Knowledge level
D. Strategic level
View answer
Correct answer: (D)
Strategic level
A. Transactions
B. Phases
C. Business Processes
D. Business Functions
View answer
Correct answer: (C)
Business Processes
327. The quality of your ______________ is a large part of the quality of your information
system.
A. computer
B. thinking
C. time
D. challanges
View answer
Correct answer: (B)
thinking
A. Fuzzy Logic
B. Neural Network
C. Virtual-Reality
D. All of the above
View answer
Correct answer: (B)
Neural Network
329. ______________ Systems keep a track on the daily regular business transactions of
the organisation.
A. Management-level
B. Strategic-level
C. Executive information
D. Operational-level
View answer
Correct answer: (D)
Operational-level
330. ______________ makes use of groupware technology on Internet platform for faster
response Processing.
A. E-Communication
B. E-business
C. E-commerce
D. E-collaboration
View answer
Correct answer: (C)
E-commerce
331. A combination of a MIS and DSS called ______________ which helps top managers
make decisions.
A. GIS
B. EIS
C. EPI
D. CAM
View answer
Correct answer: (B)
EIS
A. Mesh
B. Star
C. Bus
D. Ring
View answer
Correct answer: (C)
Bus
A. WAN
B. an internet
C. LAN
D. none of the above
View answer
Correct answer: (B)
an internet
334. Networks that follow the 802.5 standard appear to be in a star topology but are
actually operating in what type of topology?
A. Linear bus
B. Modified star
C. Modified ring
D. Ring
View answer
Correct answer: (D)
Modified ring
335. A self-sufficient computer that acts as both a server and a client IS known as
A. host
B. Client
C. Server
D. Peer
View answer
Correct answer: (D)
Peer
A. Relations
B. Columns
C. Queries
D. All of above
View answer
Correct answer: (B)
Columns
A. Spreadsheet program
B. Word processor program
C. Graphics programs
D. All of above
E. None otabove
View answer
Correct answer: (D)
All of above
338. The feature of the object oriented paradigm which helps code reuse is
A. object
B. class
C. inheritance
D. aggregation
View answer
Correct answer: (C)
inheritance
A. development.
B. identification of faults.
C. testing and validation.
D. reverse engineering.
View answer
Correct answer: (A)
development.
A. Database associated
B. Database administrator
C. Database application
D. None of these
View answer
Correct answer: (B)
Database administrator
341. physical view of data refers to the way data is handled at a ______________ its
storage and retrieval:
A. High level
B. Low level
C. Medium level
D. All of these
View answer
Correct answer: (B)
Low level
View answer
Correct answer: (D)
Data manipulation languages
A. Record blocking
B. Fixed-length record
C. Variable-length record
D. None of these
View answer
Correct answer: (C)
Variable-length record
A. Internal level
B. External Level
C. Conceptual Level
D. All of these
View answer
Correct answer: (B)
External Level
A. Tuples.
B. Attributes
C. Tables.
D. Rows.
View answer
Correct answer: (C)
Tables.
346. ______________is the real world object, such as a person, place etc.
A. Attribute
B. Entity
C. Records
D. All of these
View answer
Correct answer: (B)
Entity
A. Functions
B. Procedures
C. Sub programs
D. All of the above
View answer
Correct answer: (D)
All of the above
348. The most creative and challenging phase of system life cycle is
A. Feasibility study
B. Maintenance
C. Design
D. None of the above
View answer
Correct answer: (C)
Design
A. requirement analysis
B. risk management
C. quality management
D. configuration management.
View answer
Correct answer: (B)
risk management
View answer
Correct answer: (D)
all of me above
View answer
Correct answer: (D)
use the transaction data to produce information needed by managers to run the
business
352. Which of the following is a deliverable of the system implementation phase in a
formal system development process?
View answer
Correct answer: (A)
technical hardware and software solution for the business problem
353. When a bank uses business performance management software to monitor its
performance in differences regions this:
A. reduces costs.
B. manages risks.
C. adds value.
D. creates a new opportunity.
E. none of the above.
View answer
Correct answer: (B)
manages risks.
View answer
Correct answer: (E)
none of the above.
355. Which of the following is not a type of navigation system for a web site?
A. National
B. Global
C. Contextual
D. Local
E. Regional
View answer
Correct answer: (E)
Regional
View answer
Correct answer: (A)
database management system
View answer
Correct answer: (A)
bar coding, OCR, pen, and voice recognition
358. Which one is NOT a phase of the systems development life cycle?
A. problem analysis
B. scope definition
C. requirements analysis
D. post-implementation review
E. decision analysis
View answer
Correct answer: (D)
post-implementation review
View answer
Correct answer: (C)
a document that communicates business, technical, and support requirements for an
application software package to a single vendor that has been determined as being
able to supply that application package and service
A. model-driven analysis
B. object-oriented analysis
C. traditional approaches
D. accelerated systems analysis
E. structured analysis
View answer
Correct answer: (D)
accelerated systems analysis
View answer
Correct answer: (A)
problem analysis phase
362. Which one is NOT a common fact-finding technique?
A. prototyping
B. interviews
C. research and site visits
D. sampling of existing documents, forms, databases
E. reverse engineering
View answer
Correct answer: (E)
reverse engineering
363. Which of the following types of questions should not be asked on an interview?
A. closed-ended questions
B. biased questions
C. open-ended questions
D. loaded questions
E. both (b) and (d)
View answer
Correct answer: (E)
both (b) and (d)
364. Which installation strategy is a variation on the abrupt and parallel conversion?
A. location conversion
B. staged conversion
C. partial conversion
D. hierarchical conversion
E. none of the above
View answer
Correct answer: (B)
staged conversion
365. Which of the following is(are) the inputs to the Systems Construction phase?
A. design prototypes
B. redesigned business processes
C. physical design specifications
D. documentation
E. all of the above
View answer
Correct answer: (E)
all of the above
366. If you need to collect employee status information (e.g., full-time vs. part-time)
on a computer screen, your best choice for a GUI control would be:
A. drop-down list
B. masked edit control
C. radio buttons
D. spin box
E. none of the above
View answer
Correct answer: (C)
radio buttons
367. A listing of the names and addresses of all the employees for an organization
would be an example of a(n):
A. detailed report
B. summary report
C. external report
D. exception report
E. none of the above
View answer
Correct answer: (A)
detailed report
368. Which of the following is NOT a general principle for output design?
A. The distribution of (or access to) computer outputs must be sufficient to assist
all relevant users.
B. The computer outputs should be designed with automated tools.
C. The computer outputs must be acceptable to the system users.
D. Computer outputs should be simple to read and interpret.
E. The timing of computer outputs is important. Output information must reach
recipients while the information is pertinent to transactions or decisions.
View answer
Correct answer: (B)
The computer outputs should be designed with automated tools.
369. The term used to describe those people whose jobs involve sponsoring and
funding the project to develop, operate, and maintain the information system is
A. information worker
B. internal system user
C. systems owner
D. external system user
E. systems builder
View answer
Correct answer: (C)
systems owner
370. Decision makers who are concerned with tactical (short-term) operational
problems and decision making are
A. middle managers
B. executive managers
C. supervisors
D. mobile managers
E. none of the above
View answer
Correct answer: (A)
middle managers
View answer
Correct answer: (D)
data to information to knowledge.
View answer
Correct answer: (D)
the layout of a website
A. data
B. Objects
C. Entities
D. Actors
View answer
Correct answer: (D)
Actors
A. prototyping
B. software specifications
C. application programs
D. human engineering
E. none of the above
View answer
Correct answer: (C)
application programs
View answer
Correct answer: (A)
system improvement objectives
376. Rapid Application Development (RAD) strategy includes all of the following,
except
A. actively involves system users in the analysis, design, and construction activities
B. uses waterfall development approach to evolve system concept
C. organizes systems development into a series of focused, intense workshops
D. reduces the amount of time that passes before the users begin to see a working
system
E. accelerates the requirements analysis and design phases
View answer
Correct answer: (B)
uses waterfall development approach to evolve system concept
377. Which of the following phases identifies and expresses requirements, prioritizes
requirements, updates project plan, and communications the requirements statement?
View answer
Correct answer: (E)
none of the above
A. scope
B. functional requirement
C. preliminary requirement
D. nonfunctional requirement
E. none of the above
View answer
Correct answer: (D)
nonfunctional requirement
379. The person generally responsible for the program design strategy, standards, and
construction is called a(n):
A. program librarian
B. backup chief programmer
C. network designer
D. chief programmer
E. systems analyst
View answer
Correct answer: (D)
chief programmer
380. Which of the following is(are) the primary inputs into the task of writing and
testing new programs?
A. programming plan
B. database structure
C. test data
D. integration requirements
E. both (a) and (c)
View answer
Correct answer: (E)
both (a) and (c)
View answer
Correct answer: (C)
determine whether a known relationship between two fields is valid
382. Which of the following advanced input controls provides a nonnumeric means of
selecting a value?
A. ellipsis control
B. Internet hyperlink
C. check list box
D. slider edit calendar
E. none of the above
View answer
Correct answer: (D)
slider edit calendar
383. A count of the number of students who earned A, B, C, D, and F grades in a given
course would be an example of a(n):
A. external report
B. summary report
C. detailed report
D. exception report
E. none of the above
View answer
Correct answer: (B)
summary report
384. Which of the following is(are) the step(s) in the output design process?
View answer
Correct answer: (E)
all of the above
385. The person who ensures that systems are developed on time, within budget, and
with acceptable quality is a
A. systems designer
B. project manager
C. systems owner
D. external system user
E. systems builder
View answer
Correct answer: (B)
project manager
386. If a university sets up a web-based information system that faculty could access
to record student grades and to advise students, that would be an example of a/an
A. CRM
B. intranet
C. ERP
D. extranet
E. none of the above
View answer
Correct answer: (B)
intranet
387. When a bank uses information to launch a personalised credit card product this:
A. manages risks.
B. creates a new opportunity.
C. adds value.
D. reduces costs.
E. none of the above.
View answer
Correct answer: (C)
adds value.
388. Monitoring the legal constraints which a company operates under requires review
of:
A. a company's customers.
B. a company's outputs.
C. a company's macro-environment.
D. a company's micro-environment.
E. all of the above.
View answer
Correct answer: (C)
a company's macro-environment.
View answer
Correct answer: (C)
All XML documents must have a schema
A. Sales
B. Service
C. Manufacturing
D. Accounting
E. Benefits and Compensation
View answer
Correct answer: (E)
Benefits and Compensation
391. The first CMM level at which measurable goals for quality and productivity are
established is
A. Level 1
B. Level 2
C. Level 3
D. Level 4
E. Level 5
View answer
Correct answer: (D)
Level 4
A. object modeling
B. prototyping
C. fact-finding
D. data modeling
E. data flow diagram modeling
View answer
Correct answer: (C)
fact-finding
View answer
Correct answer: (E)
problem analysis phase
394. Randomly sampling ten invoices based on a given sample size would be an
example of
A. stratification
B. closed-ended sampling
C. observation
D. open-ended sampling
E. none of the above
View answer
Correct answer: (E)
none of the above
A. subset test
B. unit test
C. stub test
D. program test
E. system test
View answer
Correct answer: (C)
stub test
396. Which of the following is(are) the deliverables of the Systems Implementation
phase?
A. training materials
B. functional system
C. physical design specification
D. operational system
E. none of the above
View answer
Correct answer: (D)
operational system
397. If you need a student to select from a list of eighty courses of the university's on-
line catalogue, your best choice for a GUI control would be:
A. check box
B. radio buttons
C. drop-down list
D. combination box
E. Internet hyperlink
View answer
Correct answer: (C)
drop-down list
398. Which of the following reports presents information with little or no filtering or
restrictions?
A. non-filtered
B. summary
C. external
D. exception
E. none of the above
View answer
Correct answer: (E)
none of the above
399. Which kind of chart is useful for comparing series or categories of data, each in
its own bar?
A. line chart
B. pie chart
C. scatter char
D. bar chart
E. none of the above
View answer
Correct answer: (D)
bar chart
400. Which one of the following is not a business driver for an information system?
View answer
Correct answer: (C)
proliferation of networks and the Internet
A. external communication.
B. information overload.
C. sensing.
D. internal communication.
E. none of the above.
View answer
Correct answer: (C)
sensing.
A. Entity
B. Source
C. Process
D. Attribute
E. Database
View answer
Correct answer: (B)
Source
A. DFD
B. Information flow diagram
C. XML
D. Entity relationship diagram
View answer
Correct answer: (C)
XML
404. Contemporary Information Systems are interfacing with customers and suppliers
using :
A. BPR
B. CRM
C. SCM
D. Both A and B
E. Both B and C
View answer
Correct answer: (E)
Both B and C
405. A specification of how the user moves from window to window, interacting with
the application programs to perform useful work is called:
A. interface specifications
B. software specifications
C. user dialog
D. prototyping specifications
E. navigation specification
View answer
Correct answer: (C)
user dialog
406. Which one is NOT a category of problems represented by the PIECES framework?
A. control
B. efficiency
C. service
D. economics
E. technology
View answer
Correct answer: (E)
technology
407. A model-driven analysis approach that focuses on the structure of stored data in
a system rather than on processes is
A. structured analysis
B. information engineering
C. rapid architected analysis
D. object-oriented analysis
E. none of the above
View answer
Correct answer: (B)
information engineering
408. The tasks of defining acceptance tests, structuring functional requirements, and
validating functional requirements are performed in which one of the phases?
View answer
Correct answer: (D)
logical design phase
A. observations
B. work sampling
C. interviews
D. proxemics
E. none of the above
View answer
Correct answer: (E)
none of the above
410. Which of the following is(are) the task(s) of the Systems Conversion phase?
View answer
Correct answer: (D)
build and test networks
A. batch document
B. source document
C. on-line document
D. data entry document
E. none of the above
View answer
Correct answer: (B)
source document
412. In cases where the data item has a large number of predefine values and screen
space is tight, the following GUI control should be used for an input:
A. combination box
B. drop-down list
C. list box
D. ellipsis control
E. none of the above
View answer
Correct answer: (B)
drop-down list
413. Which of the following reports categorizes information for managers who are not
interested to wade through the details?
A. external
B. detailed
C. exception
D. supplemental
E. none of the above
View answer
Correct answer: (E)
none of the above
414. A task of developing a technical blueprint and specifications for a solution that
fulfills the business requirements is undertaken in the following phase of the system
development process
A. system initiation
B. system implementation
C. system analysis
D. system design
E. feasibility analysis
View answer
Correct answer: (D)
system design
415. The most important attribute of information quality that a manager requires is:
A. relevance.
B. media.
C. presentation.
D. timeliness.
E. none of the above.
View answer
Correct answer: (A)
relevance.
A. Entities
B. Processes
C. Data
D. Information
E. Objects
View answer
Correct answer: (E)
Objects
417. Information systems that support the business functions that reach out to
suppliers are known as:
View answer
Correct answer: (A)
back office information systems
View answer
Correct answer: (C)
design analysis phase
420. The process of requirements discovery consists of the following activities, except
A. requirements management
B. sampling of existing documentation, forms and files
C. requirements discovery
D. problem discovery and analysis
E. documenting and analyzing requirements
View answer
Correct answer: (B)
sampling of existing documentation, forms and files
A. missing requirements
B. overlapping requirements
C. costly requirements
D. conflicting requirements
E. ambiguous requirements
View answer
Correct answer: (C)
costly requirements
422. Which of the following is NOT a guideline for successfully conducting a Joint
Requirements Planning (JRP) session?
A. stay on schedule
B. allow for ample breaks
C. encourage user and management participation
D. brainstorm technical alternatives to problems identified in a JRP session
E. ensure that the scribe is able to take notes
View answer
Correct answer: (D)
brainstorm technical alternatives to problems identified in a JRP session
423. Which of the following is the first phase of the Systems Implementation phase?
View answer
Correct answer: (A)
conduct system test
View answer
Correct answer: (D)
both (a) and (b) and (c)
A. screen
B. paper
C. e-mail
D. microfilm
E. none of the above
View answer
Correct answer: (B)
paper
426. Which of the following is not a technology driver for an information system?
A. enterprise applications
B. object technologies
C. knowledge asset management
D. collaborative technologies
E. networks and the Internet
View answer
Correct answer: (C)
knowledge asset management
427. To improve the performance of a business process, which of the following is most
relevant?
A. Input.
B. Processing.
C. All of the above.
D. Control and feedback
E. Output.
View answer
Correct answer: (D)
Control and feedback
View answer
Correct answer: (C)
Encryption policies
429. Who are the people that actually use the system to perform or support the work
to be completed?
A. system analysts
B. system designers
C. system owners
D. system builders
E. none of the above
View answer
Correct answer: (E)
none of the above
A. layerware
B. tool kit
C. interfaceware
D. middleware
E. none of the above
View answer
Correct answer: (D)
middleware
A. assisting users
B. adapting the system to new requirements
C. recovering the system
D. fixing software defects
E. all of the above
View answer
Correct answer: (E)
all of the above
432. Which of the following analysis techniques derive system models from existing
system or discovery prototypes?
View answer
Correct answer: (A)
rapid architected analysis
View answer
Correct answer: (D)
work sampling
434. Which of the following is the last phase of the Systems Construction phase?
View answer
Correct answer: (B)
write and test new programs
A. smart card
B. biometric
C. optical mark
D. point-of-sale
E. all of the above
View answer
Correct answer: (E)
all of the above
View answer
Correct answer: (D)
both (a) and (c)
437. A turnaround output is an example of
A. internal output
B. external output
C. summary output
D. exception output
E. none of the above
View answer
Correct answer: (B)
external output
438. An information system that supports the planning and assessment needs of
executive management is
A. DSS
B. TPS
C. ERP
D. MIS
E. none of the above
View answer
Correct answer: (E)
none of the above
439. When a bank offers web self-service for customers to answer their questions, the
primary outcome is:
A. adds value.
B. manages risks.
C. reduces costs.
D. creates a new opportunity.
E. none of the above.
View answer
Correct answer: (C)
reduces costs.
A. created in XML.
B. structured information.
C. normal information.
D. unstructured information.
E. none of the above.
View answer
Correct answer: (D)
unstructured information.
A. A browsable hierarchy
B. A list of equivalent terms
C. A complex controlled vocabulary showing relationships
View answer
Correct answer: (A)
A browsable hierarchy
View answer
Correct answer: (C)
Data flow model
A. procedures
B. work flow
C. process flow
D. process requirements
E. procedures
View answer
Correct answer: (B)
work flow
444. Which of the following phases is unique to the commercial application package
implementation strategy as opposed to the rapid application development strategy
A. problem analysis
B. construction and testing
C. scope definition
D. requirements analysis
E. business process design
View answer
Correct answer: (E)
business process design
A. technical feasibility
B. schedule feasibility
C. operational feasibility
D. economic feasibility
E. resource feasibility
View answer
Correct answer: (E)
resource feasibility
446. The task of identifying and expressing system requirements is performed in which
phase of systems analysis?
View answer
Correct answer: (D)
requirements analysis phase
View answer
Correct answer: (E)
all of the above
448. Which of the tests is a final system test performed by end users using real data
over an extended period of time?
A. final test
B. complete test
C. systems acceptance test
D. parallel test
E. none of the above
View answer
Correct answer: (C)
systems acceptance test
A. radio button
B. slider edit calendar
C. spin box
D. both (a) and (c)
E. Internet hyperlink
View answer
Correct answer: (D)
both (a) and (c)
450. A list of the names of all customers who purchased only one product within a six-
month period would be an example of a(n):
A. detailed report
B. summary report
C. exception report
D. external report
E. none of the above
View answer
Correct answer: (C)
exception report