1. A program that can copy itself and infect a computer
without the permission or knowledge of the owner is called what? A. Floppy B. Virus C. WORM D. Byte Code 2. Which of these is a correct format of IP address? A. 192.168.1.1 B. 192.168.111.1111 C. 192.168.900.1 D. 192.900.168.1 3. Which was the first web browser? A. WorldWideWeb B. Netscape Navigator C. Internet Explorer D. Safari 4. It is a small piece of text stored on a user's computer by a web browser for maintaining the state. What we are talking about? A. Application B. Session C. Cookie D. QueryString 5. Which of these is a correct format of Email address? A. contact.website.info B. contactwebsite.info C. contact@website.info D. contact@website@info 6. Which of the following is not a Relational database? A. Oracle B. AJAX C. MySQL D. SQL Server 7. Which company is nicknamed "Big Blue"? A. TCS B. IBM C. Microsoft D. Satyam 8. WAV file format is associated with what type of files? A. Video B. Sound C. Image D. Word Document 9. What is a Compiler? A. Application software B. Process C. System Software D. Utility Software 10. Machine language is also known as A. Low level language B. Assembly language C. High level language D. Source code 11. Which company acquired Sun Microsystems on January 27, 2010? A. Apple Inc. B. Microsoft C. Oracle Corporation D. IBM 12. Which was the first ever web server software? A. GWS B. IIS 5.0 C. CERN httpd D. nginx 13. What does BCC means in EMail? A. Black Carbon Copy B. Blind Carbon Copy C. Business Computer Center D. Business Computer Card 14. Who is known as the father of the Java programming language? A. Bill Board B. James Gosling C. Jame Smith D. Sabeer Bhatia 15. In computers, a collection of row data is known as A. Information B. Output C. Data D. Query 16. Who Owns the Internet? A. Internet Engineering Task Force B. ICANN C. Internet Architecture Board D. No one owns it 17. What is the shortcut key of printing a document for computer having windows? A. Ctrl + P B. Shift + P C. Alt + P D. Shift + PP
Test-1
18. It is defined as the period of time that a unique user
interacts with a Web application. What we are talking about A. Application B. Session C. Cookie D. QueryString 19. The way of manipulating data into information is called A. Storing B. Processing C. Deletion D. Organizing 20. In windows computers, MPEG extension refers to what kind of file? A. Sytem file B. MultiMedia File C.Video file D.Image file 21. Which of these is the first web-based e-mail service? A. GMail B. Yahoo Mail C. Hotmail D. Rediff Mail 22. The Specially designed computers to perform very complex calculations extremely rapidly are called as A. Laptops B. Mainframe Computers C. Mini Computers D. Super Computers 23. How many layers are described in networking? A. 5 B. 6 C. 7 D. 8 24. Which of the following is not a web server? A. Apache B. IIS C. Jigsaw D. Zaob 25. What was the first general-purpose electronic computer? A. IBM 405 B. Zuse Z3 C. ENIAC D. CSIRAC 26. The major goal of requirement determination phase of information system development is a) determine whether information is needed by an organization b) determine what information is needed by an organization c) determine how information needed by an organization can be provided d) determine when information is to be given 27. Information requirements of an organization can be determined by a) interviewing managers and users and arriving at the requirements based on consensus b) finding out what similar organizations do c) telling organization what they need based on your experience d) sending a questionnaire to all employees of the organization 28. It is necessary to prioritize information requirements of an organization at the requirements determination phase as a) it is always good to prioritize b) there are conflicting demands from users c) there are constraints on budgets, available time, human resource and requirement d) all good organization do it 29. Requirement specification is carried out a) after requirements are determined b) before requirements are determined c) simultaneously with requirements determination d) independent of requirements determination 30. The role of a system analyst drawing up a requirements specification is similar to a) architect designing a building b) a structural engineer designing a building c) a contractor constructing a building d) the workers who construct a building 31. It is necessary to consult the following while drawing up requirement specification
City Classes Sandeep Sirs Academy (98156-00235)
Computer Information System
a) only top managers
b) only top and middle management c) only top, middle and operational managers d) top, middle and operational managers and also all who will use the system 32. A feasibility study is carried out a) after final requirements specifications are drawn up b) during the period when requirements specifications are drawn up c) before the final requirements specifications are drawn up d) at any time 33. The main objective of feasibility study is a) to assess whether it is possible to meet the requirements specifications b) to assess if it is possible to meet the requirements specified subject to constraints of budget, human resource and hardware c) to assist the management in implementing the desired system d) to remove bottlenecks in implementing the desired system 34. It is necessary to carry out a feasibility study as a) top management can not ensure that a project is feasible before calling a system analyst b) top management is not sure what they want from the system c) even though top management is in favor of the system, technology may not be mature for implementation d) all organizations do it 35. Feasibility study is carried out by a) managers of the organization b) system analyst in consultation with managers of the organization c) users of the proposed system d) systems designers in consultation with the prospective users of the system 36. Initial requirements specification is a) not changed till the end of the project b)continuously changed during project implementation c) only a rough indication of the requirement d) changed and finalized after feasibility study 37. Final specifications are drawn up by a) system analyst in consultation with the management of the organization b) the managers of user organization c) system analyst in consultation with programmers d) system designers along with users 38. The main goal of arriving at a final specification is a) to tell the organizations managers how the system will function b) to tell the organizations managers what the proposed system will achieve in a language understood by them c) to compute the cost of implementing the system d) to assist in designing the system 39 .The final specifications are arrived at a) after feasibility study b) during feasibility study c) just before implementation phase d) when the system is being designed 40. System approval criteria are specified a) when the final specifications are drawn up
Test-1
b) during feasibility study
c) during the requirements specifications stage d) during system study stage 41. System test plan is specified a) when the final specifications are drawn up b) during feasibility study c) during the requirements specifications stage d)during system study stage 42. Hardware study is required a) to find out cost of computer system needed b) to determine the type of computer system and software tools needed to meet the final system specification c) to make sure that the system does not become obsolete d) to find how to implement the system 43. Hardware study is carried out a) after the final system is specified b) at the requirements specification stage c) before the requirements are specified d) whenever management decides it is necessary 44. System design is carried out a) as soon as system requirements are determined b) whenever a system analyst feels it is urgent c) after final system specifications are approved by the org. d) whenever the user management feels it should be done 45. The primary objective of system design is to a) design the programs, databases and test plan b) design only user interfaces c) implement the system d) find out how the system will perform 46. The primary objective of system implementation is i) to build a system prototype ii) to train users to operate the system iii) to implement designed system using computers iv) write programs, create databases and test with live data a) i, iii b) i, ii, iii c) ii ,iii d) ii, iv 47. During system implementation the following are done i) programs are written and tested with operational data ii) user documentation is created and users trained iii) programmers are recruited and trained iv) the system is tested with operational data a) i and iii b) ii and iii c) ii and iv d) i, ii & iv 48. System evaluation is carried out a) after the system has been operational for a reasonable time b) during system implementation c) whenever managers of user organization want it d) whenever operational staff want it 49. The main objective of system evaluation is a) to see whether the system met specification b) to improve the system based on operational experience for a period c) to remove bugs in the programs d) to asses the efficiency of the system 50. Systems are modified whenever a) users requirements change b) new computers are introduced in the market c) new software tools become available in the market
City Classes Sandeep Sirs Academy (98156-00235)
Computer Information System
d) other similar organization modify these system
51. The main objective of system modification is a) to use the latest software tools b) to meet the users new/changed needs c) to use the latest hardware d) to have the most modern system 52. To easily modify the existing system it is necessary to a) use good software tools b) use the best hardware available c) design the system which can be changed at low cost d) keep the programming team happy 53. It is necessary to design an information system to easily accommodate change, because a) new computers are introduced every year b) new computer languages become popular every year c) organizations requirements change over a period of time d) systems need continuous debugging 54. Changing an operational information system is a) impossible b) expensive and done selectively c) never required d) usually done 55. System analysts have to interact with i) managers of organizations ii) users in the organization iii) programming team iv) data entry operator a) iii and iv b) i, ii and iii c) ii, iii and iv d) ii and iii 56. The primary responsibility of a systems analyst is to a) specify an information system which meets the requirements of an organization b) write programs to meet specifications c) maintain the system d) meet managers of the organization regularly 57. The responsibilities of a system analyst include i) defining and prioritizing information requirement of an organization ii) gathering data, facts and opinions of users in an organization iii) drawing up specifications of the system for an organization iv) designing and evaluating the system a) i and ii b) i, ii and iv c) i, ii, iii and iv d) i, ii and iii 58. The most important attribute of a systems analyst is a) excellent programming skills b) very good hardware designing skills c) very good technical management skills d) very good writing skills 59. Among the attributes of a good systems analyst the following are essential i) knowledge of organization ii) analytical mind iii) ability to communicate orally iv) excellent mathematical abilities a) i and ii b) i, ii and iii c) i, ii and iv d) i, iii and iv 60. Among the attributes of a systems analyst the following are most important i) knowledge of computer systems and currently available hardware ii) good interpersonal relations iii) broad knowledge about various organizations
Test-1
iv) very good accountancy knowledge
a) i, iii and iv b) i and iii c) i, ii and iv d) i, ii and iii 61. Managers in organizations should not design their own systems as a) systems have to interact with other systems b) they do not have the special skills necessary to design systems c) it is not their job d) they are always very busy 62. Systems analyst should use software tools in their work a) all analysts use them b) they assist in systematic design of systems c) they are inexpensive d) they are easily available 63. A contemporary term that describes the combination of hardware, software and data communications is A) an information system B) information technology C) expert system D) artificial intelligence 64. An information system that processes payroll checks would be an example of a/an A) TPS B) DSS C) MIS D) EIS E) expert system 65. An information system that helped doctors make diagnoses would be an example of a/an A) TPS B) DSS C) MIS D) EIS E) expert system 66. Any person who has interest in existing or new info System A) A stockholder B) an end-user C) a stakeholder D) a network manager 67. The term used to describe those people whose jobs involve the creation, collection, processing, distribution and use of information is A) a network manager B) an information worker C) a systems owner D) a systems designer 68. An information system's sponsor and chief advocate is A) system user B) system builder C) system owner D) system analyst 69. The decision makers who focus on the day-to-day mgmt issues are A) supervisors B) middle managers C) executive managers D) mobile managers 70. The person who translates system users' business requirements and constraints into technical solutions is a A) systems designer B) systems builder C) systems user D) network manager 71. The person who constructs the information system components based on the design specifications is a A) systems designer B) systems builder C) systems user D) network manager 72. A systems analyst who sells his or her expertise to other businesses is known as a/an: A) ERP B) ESP C) EIS D) B2C 73. CPI stands for which of the following A) central processing input B) continuous process improvement C) continuous performance improvement D) control performance improvement
City Classes Sandeep Sirs Academy (98156-00235)
Computer Information System
74. A comprehensive approach to facilitate quality improvements and management within a business and its products and services is known as: A) capability maturity model B) continuous process improvement C) business process redesign D) total quality management 75. The study, analysis and redesign of fundamental business processes to reduce costs and/or improve value added to the business is known as: A) capability maturity model B) continuous process improvement C) business process redesign D) total quality management 76. Which command do you use to search a file in MSDOS A. dir/d B. dir/ad C. dir/s D. dir/a 77. What is the size limitation of MS-DOS file name and extension? A. 8, 3 B. 255, 3 C. 3, 8 D. 255, 8 78. What is the command to erase a file from the disk? A. Erase B. Del C. delete D. rd 79. Which of the following is not an internal MS-DOS command? A. type B. edit C. dir D. copy 80. Which is not displayed by CHKDSK command? A. storage capacity of the disk B. number of hidden files C. free space in the disk D. number of executable files 81. Which external command file is required to use format command? A. format.exe B. format.com C. format.sys D. format.hlp 82. A program or command to execute automatically when OS starts is kept in which file? A. config.sys B. any batch file C. autoexec.bat D. command.com 83. Which command do you use to display the contents of a file? A. dir B. type C. edit D. copy 84. Which cmd do you use to list all the files and folders whose name contains EST from second character? A. dir *est B. dir ?est C. dir ?est* D. dir est 85. Which of the following is not a MS-DOS internal command? A. dir B. copy C. move D. rd 86. Which of the following command is used to display the list of files and directories starting with c? A. dir ?c B. dir c* C. dir c? D. dir c 87. Which of the following command is used to copy all the files stored in floppy disk into the DATA directory of hard disk (c drive)? A. copy A:\*.* C: B. copy A:\*.* c:\data C. copy A: C: D. copy A:\data C:
Test-1
88. What is the function of Ctrl+C in DOS?
A. breaks execution of command B. copies the selected text C. saves a file D. undelete the deleted file 89. What happens when you type CD\ and press Enter key? A. returns to the parent directory B. enters into a subdirectory C. returns to the root directory D. displays current directory 90. What type of OS is MSDOS? A. Single user, GUI B. Multi User, GUI C. Single user, CUI D. Multi User, CUI 91. Which command can be used to recreate the disks tracks and sectors? A. FDISK B. FORMAT C. CHKDSK D. ATTRIB 92. Which of the following statements is true in regard to DISKCOPY? A. COPY and DISKCOPY are same B. DISKCOPY is a built in command in DOS C. DISKCOPY can be used on hard disks D. DISKCOPY can be used with a floppy and a hard disk 93. Which file names are invalid in MSDOS? A. MYFILE.DOS B. CHECK$.(1) C. VERIFIED.### D. QUERY.1?3 94. Which command in DOS is used to set a name to a disk? A. VOLUME B. VOL C. LABEL D. DISKLABEL 95. Which of the following commands displays names of files in sorted order? A. DIR/N B. DIR/SO C. DIR/AN D. DIR/AH 96. Which command displays the list of all previous commands entered by the used? A. COMMANDS/ALL B. KEYDOS C. DOSKEY D. DIR/ALL 97. Which is MS-DOS essential file? A. command.com B. io.sys C. msdos.sys D. all of the above 98. Which file system does DOS typically use ? A. FAT16 B. FAT32 C. NTFS D. DFS 99. The fundamental conceptual unit in a computer is: A. CPU B. Hard Drive C. Operating System D. Transistor 100. Which of the following started out as separate program from operating systems but usually is included as part of the OS later on? A. Text Editor B. Command processor C. Resource allocator D. Dispatcher