Anda di halaman 1dari 26

These systems (__________) record day-to-day transactions such as customer orders,

bills, inventory levels, and production output.


A. TPS
B. MIS
C. DSS
D. ESS

ANSWER: A

These systems (__________) summarize the detailed data of the transaction


processing systems in standard reports for middle-level managers.
A. CSS
B. MIS
C. DSS
D. ESS

ANSWER: B

Management Information Systems are used by


A. employee-level workers.
B. middle management
C. supervisor-level management
D. top-level management

ANSWER: B

These systems (__________) present information in a very highly summarized form.


A. TPS
B. MIS
C. DSS
D. ESS

ANSWER: D

The __________ activity records the customer requests for goods or services.
A. Payroll
B. Sales order processing
C. Inventory
D. General ledger

ANSWER: B

Money collected from or owed by customers is


A. accounts payable
B. inventory
C. accounts receivable
D. sales order processing

ANSWER: C

Management information systems produce reports that are


A. predetermined
B. encrypted
C. graphically simplified
D. dynamic

ANSWER: A

These types of systems would most likely be used to assist a manager in getting
answers to unexpected and generally nonrecurring kinds of problems.
A. TPS
B. MIS
C. DSS
D. ESS

ANSWER: C

Which of the following refers to a decision-making support system for teams?


A. TPS
B. GDSS
C. ESS
D. MIS

ANSWER: B

Data from within the organization consist principally of transactions from the
A. TPS
B. MIS
C. ESS
D. accounts receivable

ANSWER: A

Employees involved with the distribution and communication of information are


called
A. managers
B. data workers
C. IT staff
D. knowledge workers

ANSWER: B

Employees who create information are called


A. managers
B. data workers
C. IT staff
D. knowledge workers

ANSWER: B

Which of the following is an example of a knowledge work system?


A. project manager
B. Web server
C. Videoconferencing system
D. CAD/CAM

ANSWER: D

MIS is an ___ human-machine based system


A. integrated
B. independent
C. interdependent
D. stand alone

ANSWER: A

In a hospital�s information system the following type of information is operational


A. Data on births and deaths
B. Preparing patients� bill
C. Buying an expensive diagnostic system such as CAT scan
D. None

ANSWER: B

In a hospital�s information system the following type of information is statutory


A. Data on births and deaths
B. Preparing patients� bill
C. Buying an expensive diagnostic system such as CAT scan
D. None

ANSWER: A

Every record stored in a Master file has a key field because


A. it is the most important field
B. it acts as a unique identification of record
C. it is the key to the database
D. it is a very concise field

ANSWER: B

The primary storage medium for storing archival data is


A. floppy disk
B. magnetic disk
C. magnetic tape
D. CD- ROM

ANSWER: C

Master file is a file containing


A. all master records
B. all records relevant to the application
C. a collection of data items
D. historical data of relevance to the organization

ANSWER: B

Online transaction processing is used because


A. it is efficient
B. disk is used for storing files
C. it can handle random queries.
D. Transactions occur in batches
ANSWER: C

A management information system is one which


A. is required by all managers of an organization
B. processes data to yield information of value in tactical management
C. provides operational information
D. allows better management of organizations

ANSWER: B

Data mining is used to aid in


A. operational management
B. analyzing past decision made by managers
C. detecting patterns in operational data
D. retrieving archival data

ANSWER: C

Data mining requires


A. large quantities of operational data stored over a period of time
B. lots of tactical data
C. several tape drives to store archival data
D. large mainframe computers

ANSWER: A

Which phase of the SDLC are information needs identified?


A. preliminary investigation
B. systems analysis
C. systems design
D. systems development

ANSWER: C

In this phase of the SDLC, the new information systems are installed and adapted to
the new system, and people are trained to use them.
A. preliminary investigation
B. systems analysis
C. systems design
D. systems development

ANSWER: A

This phase of the SDLC is known as the "ongoing phase" where the system is
periodically evaluated and updated as needed.
A. preliminary investigation
B. systems analysis
C. systems design
D. systems development

ANSWER: D

In the preliminary investigation phase of the SDLC, which one of the following
tasks would not be included?
A. briefly defining the problem
B. suggesting alternative solutions
C. gathering the data
D. preparing a short report

ANSWER: C

In order to obtain financing for the analysis phase, the systems analyst must
A. prepare a preliminary investigation report
B. justify the expense of upgrading
C. consider abandoning the project
D. train users on the new system

ANSWER: A

which of the following is used to show the rules that apply to a decision when one
or more conditions apply?
A. system flowchart
B. decision table
C. grid chart
D. checklist

ANSWER: B

Which of the following tools shows the data or information flow within an
information system?
A. grid chart
B. decision table
C. system flowchart
D. data flow diagram

ANSWER: D

Which of the following is not found on a data flow diagram?


A. entities
B. process
C. offline storage
D. file

ANSWER: C

The final step of the systems analysis phase in the SDLC is to


A. gather data
B. write system analysis report
C. propose changes
D. analyze data

ANSWER: B

Which of the following would not be described in the systems analysis report?
A. the current information system
B. the requirements for a new system
C. the development schedule
D. the training requirements for users

ANSWER: D

Which of the following tasks is not part of the systems design phase?
A. designing alternative systems
B. selecting the best system
C. writing a systems design report
D. suggesting alternative solutions

ANSWER: D

The first task to complete in the design phase of the SDLC is to


A. design alternative systems
B. select the best design
C. examine hardware requirements
D. write a systems design report
ANSWER: A

After designing alternative systems, the system analyst must


A. prepare a system design report
B. diagram the system
C. prepare a data flow diagram
D. select the best alternative

ANSWER: D

The final task in the design phase of the SDLC is to


A. select the best design
B. design alternative systems
C. prepare a system design report
D. examine hardware requirements
ANSWER: C

A feasibility study is used to determine the proposed systems.


A. resource requirements
B. costs and benefits
C. availability of hardware and software
D. all of the above

ANSWER: D

Determining if employees, managers, and clients will resist a proposed new system
is part of this feasibility study.
A. technical feasibility
B. economic feasibility
C. organizational feasibility
D. operational feasibility

ANSWER: D

Determining whether expected cost savings and other benefits will exceed the cost
of developing an alternative system is related to
A. technical feasibility
B. economic feasibility
C. organizational feasibility
D. operational feasibility
ANSWER: B

The first step of systems development is to purchase or custom design


A. software
B. a network
C. hardware
D. training materials

ANSWER: A

The final step of development is to


A. acquire software
B. acquire hardware
C. prepare a systems development report
D. test the system
ANSWER: D

During which phase of the SDLC are users trained to use the new system?
A. Preliminary investigation
B. Systems implementation
C. Systems development
D. Systems maintenance
ANSWER: B

The __________ approach conversion type simply involves abandoning the old system
and using the new.
A. direct
B. pilot
C. phased
D. parallel

ANSWER: A

The old and new systems run side by side for a period of time when using the
__________ approach to implementation.
A. direct
B. pilot
C. phased
D. parallel

ANSWER: A

Although this conversion approach (__________) is considered low risk, keeping


enough equipment and people active to manage two systems at the same time can be
very expensive.
A. direct
B. pilot
C. phased
D. parallel

ANSWER: D

Using the __________ approach, a new system is tested in one part of the
organization before being implemented in others.
A. direct
B. pilot
C. phased
D. parallel

ANSWER: B

The __________ implementation approach is broken down into smaller parts that are
implemented over time.
A. direct
B. pilot
C. phased
D. parallel

ANSWER: C

The implementation approach that is the least risky would be the


A. direct
B. pilot
C. phased
D. parallel

ANSWER: C

This implementation approach (__________) is preferred when there are many people
in an organization performing similar operations.
A. direct
B. pilot
C. phased
D. parallel

ANSWER: A

Which of the following phases of the SDLC is considered as the �ongoing process�?
A. systems development
B. systems analysis
C. systems design
D. systems maintenance

ANSWER: D

A modifiable model built before the actual system is installed is called a(n)
A. sample
B. example
C. template
D. prototype

ANSWER: D

The process of building a model that demonstrates the features of a proposed


product, service or system is called a
A. JAD
B. RAD
C. template
D. prototype

ANSWER: D

RAD stands for


A. Redundant Array of Disks
B. Rapid Application Development
C. Remove and Destroy
D. Replication Applet Diagram

ANSWER: B

In the relational modes, cardinality is termed as:


A. Number of tuples
B. Number of attributes.
C. Number of tables
D. Number of constraints
ANSWER: A

The view of total database content is


A. Conceptual view
B. Internal view
C. External view
D. Physical View

ANSWER: A

DML is provided for


A. Description of logical structure of database.
B. Addition of new structures in the database system.
C. Manipulation & processing of database.
D. Definition of physical structure of database system.

ANSWER: C
Architecture of the database can be viewed as
A. Two levels
B. Four levels
C. Three levels
D. One level

ANSWER: C

In a relational model, relations are termed as


A. Tuples
B. Attributes
C. Tables
D. Rows.

ANSWER: C

In the architecture of a database system external level is the


A. Physical level
B. Logical level.
C. Conceptual level
D. View level.

ANSWER: D

An entity set that does not have sufficient attributes to form a primary key is a
A. Strong entity set
B. Weak entity set.
C. Simple entity set
D. Primary entity set.

ANSWER: B

In a Hierarchical model records are organized as


A. Graph
B. List
C. Links
D. Tree

ANSWER: D

In an E-R diagram attributes are represented by


A. Rectangle
B. Square
C. Ellipse
D. Triangle.

ANSWER: C

The language used in application programs to request data from the DBMS is referred
to as the
A. DML
B. DDL
C. VDL
D. SDL

ANSWER: A

A logical schema
A. Is the entire database.
B. Is a standard way of organizing information into accessible parts.
C. Describes how data is actually stored on disk.
D. Both (A) and (C)

ANSWER: A

Related fields in a database are grouped to form a


A. Data file
B. Data record.
C. Menu
D. Bank.

ANSWER: B

The database environment has all of the following components except:


A. Users
B. Separate files.
C. Database
D. Database administrator.

ANSWER: A

The language which has recently become the defacto standard for interfacing
application programs with relational database system is
A. Oracle
B. SQL.
C. Dbase
D. 4GL.

ANSWER: B

which is not networking device


A. hub
B. port
C. switch
D. router

ANSWER: B

which is not network topology


A. ring
B. hub
C. star
D. mesh

ANSWER: B

The---network is theoratically the best


A. ring
B. mesh
C. star
D. bus

ANSWER: B

Which is most intelligent network device


A. hub
B. repeater
C. switch
D. bridge

ANSWER: C

inbox is example of
A. cloud computing
B. email computing
C. web computing
D. online facilities

ANSWER: A

In this framework all devices work together on a problem


A. cloud computing
B. grid computing
C. distributed computing
D. mainframe computing

ANSWER: B

this helps in developing dynamic web pages


A. http
B. ajax
C. visual basic
D. c++

ANSWER: B

IP stands for
A. Internet Protocol
B. Internet Programming
C. Integrated Protocol
D. Information Protocol

ANSWER: A

SDLC stands for


A. System Development Life cycyle
B. Systematic Developemnt Life Cycle
C. Synthetic Decision Link Cycle
D. Structured Development Life Cycle

ANSWER: A

First Step of SDLC is


A. System Investigation
B. System Analysis
C. System Design
D. System Implementation

ANSWER: A

Second Stage of SDLC is


A. System Investigation
B. System Analysis
C. System Design
D. System Implementation

ANSWER: B

Third Stage of SDLC is


A. System Investigation
B. System Analysis
C. System Design
D. System Implementation

ANSWER: C

Fourth Stage of SDLC is


A. System Investigation
B. System Analysis
C. System Design
D. System Implementation

ANSWER: D

Fifth Stage of SDLC is


A. System Investigation
B. System Analysis
C. System Implementation
D. System Maintenance

ANSWER: D

Prototyping is
A. Traditional System
B. Quick System
C. Alternative System
D. None

ANSWER: C

User interface Layer is


A. part of CASE
B. part of RAD
C. part of SDLC
D. part of prototyping

ANSWER: A

Tool Management Service is part of


A. part of CASE
B. part of RAD
C. part of SDLC
D. part of prototyping

ANSWER: A

Object Management Layer is part of


A. part of CASE
B. part of RAD
C. part of SDLC
D. part of prototyping

ANSWER: A

Shared Repository layer is part of


A. part of CASE
B. part of RAD
C. part of SDLC
D. part of prototyping

ANSWER: A

this is suitable for connecting networks


A. Hub
B. Router
C. Switch
D. port

ANSWER: B

This only amplifies signal on network


A. Hub
B. Router
C. Switch
D. port

ANSWER: C

the speed of your internet system is written as:


A. 2mbps
B. 2MBPS
C. 2Mbps
D. 2mBPs

ANSWER: C

which is not key component of OOP


A. inheritance
B. polymorphism
C. encapsulation
D. parallelism

ANSWER: D

The RDBMS terminology for a row is


A. tuple
B. relation
C. attribute
D. degree

ANSWER: D

System approach takes


A. Interrelationship of entities
B. narrow view
C. broad view
D. A and C

ANSWER: D

relational model was proposed by


A. bill gates
B. steve jobs
C. e.f codd
D. herbert simon

ANSWER: D

which of following basic notions are utilised by the entity relationship model
A. mapping entities and table
B. attributes, fields, relationship sets
C. entity sets, relationship sets, attributes
D. none of these

ANSWER: C

The DBMS is adopted to avoid which of the following attributes


A. reduncdancy
B. shareability
C. availability
D. integrity

ANSWER: A

How many layers are there in OSI


A. 4
B. 5
C. 7
D. 11

ANSWER: B

Database Architechure normally provides----levels of data view


A. 2
B. 3
C. 4
D. 5

ANSWER: B

Theoratically this is the best topology


A. Star
B. ring
C. mesh
D. tree

ANSWER: C

Which is not system software


A. Utility Programs
B. Library Programs
C. application software
D. translator software

ANSWER:C

ATM receipt is example of


A. TPS
B. EIS
C. DSS
D. All

ANSWER: A
Bank Statement is example of
A. TPS
B. MIS
C. DSS
D. All

ANSWER:B

Google drive is
A. Indicator of AI
B. Example of Cloud
C. Is an expert system
D. is sponsored by Microsoft

ANSWER: B

Which is not example of logistics MIS


A. IRCTC
B. Red bus
C. google

ANSWER: C

Which is not office automation package


A. corel draw
B. EXCEL
C. word

ANSWER: A

ERP is
A. integrated MIS
B. functional MIS
C. can be developed in house only
D. is proprietary software by SAP

ANSWER: A

Atomicity is
A. one or none transaction
B. one transaction at a time
C. zero transaction

ANSWER: A

Isolation in DBMS is
A. Two transations carried out separately
B. two steps carried out separately
C. two persons carrying out operations separately
D. two different systems

ANSWER: A

The RDBMS terminology for a column is


A. tuple
B. relation
C. attribute
D. degree

ANSWER: C

The language used for granting access to data from the DBMS is referred to as the
A. DML
B. DDL
C. DCL
D. SDL

ANSWER: C

this system is like an expert


A. AI
B. Expert system
C. GIS

ANSWER: B

inference engine is part of


A. expert system
B. AI
C. GIS
D. None

ANSWER: A

Which of the following refers to a decision-making support system for teams?


A. TPS
B. GDSS
C. ESS
D. MIS

ANSWER: B

In a GDSS, the __________ is generally a decision-maker.


A. programmer
B. technician
C. user
D. client

ANSWER: C

In motor car manufacturing the following type of information is strategic


A. Decision on introducing a new model
B. Scheduling production
C. Assessing competitor car
D. Computing sales tax collected

ANSWER: A

In motor car manufacturing the following type of information is tactical


A. Decision on introducing a new model
B. Scheduling production
C. Assessing competitor car
D. Computing sales tax collected

ANSWER: C
In motor car manufacturing the following type of information is operational
A. Decision on introducing a new model
B. Scheduling production
C. Assessing competitor car
D. Computing sales tax collected

ANSWER: B

In motor car manufacturing the following type of information is statutory


A. Decision on introducing a new model
B. Scheduling production
C. Assessing competitor car
D. Computing sales tax collected

ANSWER: D

In a hospital�s information system the following type of information is strategic


A. Opening a new children�s ward
B. Data on births and deaths
C. Preparing patients� bill
D. Buying an expensive diagnostic system such as CAT scan

ANSWER: D

Relation refers to
A. hierarchy
B. tables
C. networks
D. nodes

ANSWER: B

Tuples refer to
A. rows
B. columns
C. grid chart
D. network chart

ANSWER: A

Attributes refer to
A. rows
B. columns
C. grid chart
D. network chart

ANSWER: B

DSS is a-----------
A. computer based information system
B. manual system
C. mathematical formulation
D. computer program

ANSWER: A

Dss prove effective in addressing������..problem


A. structured
B. semistructured
C. unstructured
D. semi and unstructured

ANSWER: D

compared to MIS response time of DSS is


A. shorter
B. longer
C. same
D. instant

ANSWER:A

DSS tool query��. For analysis and reporting


A. TPS
B. MIS
C. Data warehouse
D. Data mining

ANSWER: C

The-----is periodic update of warehouse from transactional system


A. Data acquistion
B. data capture
C. data cleaning
D. data aggregation

ANSWER: B

The�� validates and corrects the data before it is inserted into warehouse
A. Data acquistion
B. data capture
C. data cleaning
D. data aggregation

ANSWER: C

The�. Is the process of storing data at the detail level or at some aggreagate
level or combination of both
A. Data acquistion
B. data capture
C. data cleaning
D. data aggregation

ANSWER: D

Meta data is defined as data about


A. data
B. subject
C. warehouse
D. system

ANSWER: A

The�.is computer assisted process of digging through and analyzing enormous sets of
data and then extracting the meaning of data
A. Data mining
B. data warehouse
C. data acquisition
D. data aggregation

ANSWER: A

Data mining is also known as


A. knowledge discovery in database
B. data warehouse
C. data cleansing
D. data costing

ANSWER: A

The �.. Searches for relationships and global patterns that exists in large
database
A. Data mining
B. data warehouse
C. data acquisition
D. data aggregation

ANSWER: A

The ----method of data mining helps in predicting future


A. prediction method
B. description method
C. mathematical method
D. astrology method

ANSWER: A

Based on user's request the -----is responsible for fetching relevant data
A. information depository
B. data warehouse server
C. data mining engine
D. graphical user interface

ANSWER: C

The�.. Method of data mining find human interpretable patterns that describe the
data
A. prediction method
B. description method
C. mathematical method
D. astrology method

ANSWER: B

The ----- communicates between user and data mining systeme


A. information depository
B. data warehouse server
C. data mining engine
D. graphical user interface

ANSWER: D

The�. Is set of theories, methodology process architecture and technologies that


transform raw data into meaningful and useful information for business purpose
A. Data warehousing
B. data mining
C. business intelligence
D. information depository

ANSWER: C

The ----- is interactive system that facilitates a number of decision makers in


finding solution to problem that are unstructured in nature
A. GDSS
B. DSS
C. Data warehousing
D. Data Mining

ANSWER: A

An��..is a specialized decision support system


A. GDSS
B. MIS
C. TPS
D. Executive information system

ANSWER: D

A�. Is a computer based information system that is designed to work with the
referenced by spatial coordination
A. GDSS
B. MIS
C. GIS
D. Executive information system

ANSWER: C

The general term used for firms which have enabled business relationships with
customers, employees and suppliers through digital networks is�.
A. digital marketing
B. network integration
C. Digital firm
D. SCM

ANSWER: C

At the heart of digital firms are


A. information system
B. computer system
C. Men
D. technology

ANSWER: A

The term --- was used to convey integration of internet and IT in key reosurce
management process and to transact business
A. E-commerce
B. MIS
C. e-business enterpirse
D. TPS

ANSWER: C
The�. Is the application of information and communication technologies in support
of all activities of business
A. E-business
B. MIS
C. TPS
D. E-commerce

ANSWER: A

The-----is the electronic transmission of buyer/seller transactions and information


between trading partners
A. E-business
B. MIS
C. TPS
D. E-commerce

ANSWER: D

These are collection of e-shops offered together via a single point of access
A. E-business
B. MIS
C. E-malls
D. E-commerce

ANSWER: C

The following is negotiation conducted via an online platform


A. E-retail
B. E-auction
C. E-malls
D. E-track

ANSWER:B

This model involves transaction between businesses


A. B2B
B. B2C
C. C2C
D. B2G

ANSWER: A

This model involves transaction between businesse and customers


A. B2B
B. B2C
C. C2C
D. B2G

ANSWER: B

Quicker and OLX are examples of


A. B2B
B. B2C
C. C2C
D. B2G

ANSWER:C

In this model consumer can post his resume for services he can offer
A. B2B
B. C2B
C. C2C
D. B2G

ANSWER: B

The following is free from spatial and temporal constraints


A. e-comerce
B. e-business
C. mobile computing
D. Digital firm

ANSWER: C

This call centre is designed to receive large volume of request from customers by
telephone
A. inbound call centre
B. outbound call centre
C. customer service centre
D. BPO

ANSWER: A

This centre processes information related to third parties


A. inbound call centre
B. outbound call centre
C. customer service centre
D. BPO

ANSWER: D

This is combination of hardware and software that controls the flow of incoming and
outgoing netwrok traffic and prevents unauthorized communication in and out the
network
A. biometric authentication
B. pass word encryption system
C. Firewall
D. AntiMalware system

ANSWER: C

This conceals the ip addresses of the organizations internal host computer to


protect against sniffer programs outside the firewall
A. Packet filtering
B. Sateful inspection
C. Network address translation
D. Application Proxy filtering

ANSWER: C

The following enables client and server computer to establish a secure connection
server and manage encryption and decryption activities
A. Secure hyper text transfer protocol
B. secure socket layer
C. antivirus software
D. intusion detection system

ANSWER: B

This is digital code attached to an electronically transmitted message that is used


to verify the origin and contents of a message
A. Digital signature
B. Digital certificates
C. public key encryption
D. private key encryption

ANSWER: A

JAD is
A. Joint application design
B. joint application development
C. joint additional development
D. all

ANSWER: B

which is not part of maintenance of system development


A. corrective
B. coercive
C. perfective
D. adaptive

ANSWER: B

What is to be done is reflected in----


A. logical design
B. physical design
C. integrated design
D. all

ANSWER: A

where the involvement of user is at maximum


A. prototype
B. waterfall
C. RAD
D. OOP

ANSWER: A

DSS is subset of MIS


A. TRUE
B. FALSE
C. not related


ANSWER: A

The following studies pattern


A. data mining
B. data warehouse
C. knowledge base
D. inference engine
ANSWER: A

A collection of mathematical models and analytical techniques


A. model base
B. knowledge base
C. business intelligence

ANSWER: A

using intranets to gather store and share a company's best practice amont employees
A. DSS
B. KMS
C. EIS
D. none

ANSWER: B

Computer based machines possesing human like physical capabilities


A. expert system
B. robots
C. intelligent agents

�ANSWER: B

AI system that use approximate reasoning to process ambiguous data


A. fuzzy logic
B. Expert system
C. robots
D. none

ANSWER: A

knowledge based software surrogates that do things for you


A. intelligent agents
B. robots
C. bots
D. experts

ANSWER: A

information systems for strategic information needs of top and middle managers
A. EIS
B. DSS
C. TPS
D. IRS

ANSWER: A

provide interactive modeling capability tailored to specific information needs of


manager
A. EIS
B. DSS
C. TPS
D. IRS

ANSWER: B

Control totals, error signals, backup files, and security codes are example of:
A. information system analysis
B. Information sytem Design
C. information system control


ANSWER: C

A computer system that acts as a filter for connection with any external network is
A. Router
B. Bridges
C. Firewall
D. none

ANSWER: C

Tracing of entrie information flow process is called as


A. flow tracing
B. audit trail
C. information trail
D. a and c

ANSWER: B

Scrambling data during transmission is


A. encryption
B. decryption
C. encoding
D. decoding

ANSWER: A

Sending unsolicited email is


A. spam
B. flaming
C. emailing
D. hacking

ANSWER: A

sending extremeily vular and derogatory email is


A. spam
B. flaming
C. emailing
D. hacking

ANSWER: B

software that can infect machine and sends private information back to owners is
A. adware
B. malware
C. trojan
D. worm

ANSWER: A

overwhelming machine with request from captive computers is


A. Distributed denial of service
B. fault tolerant
C. intellectual property theft
D. none

ANSWER: A

Using computer to steal money, services, s/w and data


A. hacking
B. flaming
C. spamming
D. none

ANSWER: A

Designing computer hardware, software, and workstations that are safe, comfortable
and easy to use:
A. Egromonics
B. Ergonomics
C. Erithromonics
D. economics

ANSWER: B

Anda mungkin juga menyukai