ANSWER: A
ANSWER: B
The __________ activity records the customer requests for goods or services.
A. Payroll
B. Sales order processing
C. Inventory
D. General ledger
ANSWER: B
ANSWER: A
�
These types of systems would most likely be used to assist a manager in getting
answers to unexpected and generally nonrecurring kinds of problems.
A. TPS
B. MIS
C. DSS
D. ESS
�
ANSWER: C
Data from within the organization consist principally of transactions from the
A. TPS
B. MIS
C. ESS
D. accounts receivable
�
ANSWER: A
ANSWER: B
ANSWER: A
ANSWER: B
ANSWER: A
ANSWER: B
ANSWER: B
ANSWER: B
ANSWER: C
ANSWER: A
ANSWER: C
In this phase of the SDLC, the new information systems are installed and adapted to
the new system, and people are trained to use them.
A. preliminary investigation
B. systems analysis
C. systems design
D. systems development
ANSWER: A
This phase of the SDLC is known as the "ongoing phase" where the system is
periodically evaluated and updated as needed.
A. preliminary investigation
B. systems analysis
C. systems design
D. systems development
ANSWER: D
In the preliminary investigation phase of the SDLC, which one of the following
tasks would not be included?
A. briefly defining the problem
B. suggesting alternative solutions
C. gathering the data
D. preparing a short report
�
ANSWER: C
In order to obtain financing for the analysis phase, the systems analyst must
A. prepare a preliminary investigation report
B. justify the expense of upgrading
C. consider abandoning the project
D. train users on the new system
�
ANSWER: A
which of the following is used to show the rules that apply to a decision when one
or more conditions apply?
A. system flowchart
B. decision table
C. grid chart
D. checklist
�
ANSWER: B
Which of the following tools shows the data or information flow within an
information system?
A. grid chart
B. decision table
C. system flowchart
D. data flow diagram
�
ANSWER: D
Which of the following would not be described in the systems analysis report?
A. the current information system
B. the requirements for a new system
C. the development schedule
D. the training requirements for users
�
ANSWER: D
Which of the following tasks is not part of the systems design phase?
A. designing alternative systems
B. selecting the best system
C. writing a systems design report
D. suggesting alternative solutions
�
ANSWER: D
Determining if employees, managers, and clients will resist a proposed new system
is part of this feasibility study.
A. technical feasibility
B. economic feasibility
C. organizational feasibility
D. operational feasibility
ANSWER: D
Determining whether expected cost savings and other benefits will exceed the cost
of developing an alternative system is related to
A. technical feasibility
B. economic feasibility
C. organizational feasibility
D. operational feasibility
ANSWER: B
ANSWER: A
During which phase of the SDLC are users trained to use the new system?
A. Preliminary investigation
B. Systems implementation
C. Systems development
D. Systems maintenance
ANSWER: B
The __________ approach conversion type simply involves abandoning the old system
and using the new.
A. direct
B. pilot
C. phased
D. parallel
�
ANSWER: A
The old and new systems run side by side for a period of time when using the
__________ approach to implementation.
A. direct
B. pilot
C. phased
D. parallel
�
ANSWER: A
Using the __________ approach, a new system is tested in one part of the
organization before being implemented in others.
A. direct
B. pilot
C. phased
D. parallel
�
ANSWER: B
The __________ implementation approach is broken down into smaller parts that are
implemented over time.
A. direct
B. pilot
C. phased
D. parallel
�
ANSWER: C
This implementation approach (__________) is preferred when there are many people
in an organization performing similar operations.
A. direct
B. pilot
C. phased
D. parallel
�
ANSWER: A
Which of the following phases of the SDLC is considered as the �ongoing process�?
A. systems development
B. systems analysis
C. systems design
D. systems maintenance
ANSWER: D
A modifiable model built before the actual system is installed is called a(n)
A. sample
B. example
C. template
D. prototype
ANSWER: D
ANSWER: D
ANSWER: C
ANSWER: D
An entity set that does not have sufficient attributes to form a primary key is a
A. Strong entity set
B. Weak entity set.
C. Simple entity set
D. Primary entity set.
ANSWER: B
The language used in application programs to request data from the DBMS is referred
to as the
A. DML
B. DDL
C. VDL
D. SDL
�
ANSWER: A
A logical schema
A. Is the entire database.
B. Is a standard way of organizing information into accessible parts.
C. Describes how data is actually stored on disk.
D. Both (A) and (C)
ANSWER: A
ANSWER: A
The language which has recently become the defacto standard for interfacing
application programs with relational database system is
A. Oracle
B. SQL.
C. Dbase
D. 4GL.
�
ANSWER: B
inbox is example of
A. cloud computing
B. email computing
C. web computing
D. online facilities
�
ANSWER: A
IP stands for
A. Internet Protocol
B. Internet Programming
C. Integrated Protocol
D. Information Protocol
�
ANSWER: A
Prototyping is
A. Traditional System
B. Quick System
C. Alternative System
D. None
�
ANSWER: C
which of following basic notions are utilised by the entity relationship model
A. mapping entities and table
B. attributes, fields, relationship sets
C. entity sets, relationship sets, attributes
D. none of these
�
ANSWER: C
ANSWER:C
Google drive is
A. Indicator of AI
B. Example of Cloud
C. Is an expert system
D. is sponsored by Microsoft
�
ANSWER: B
ANSWER: A
ERP is
A. integrated MIS
B. functional MIS
C. can be developed in house only
D. is proprietary software by SAP
�
ANSWER: A
Atomicity is
A. one or none transaction
B. one transaction at a time
C. zero transaction
�
ANSWER: A
Isolation in DBMS is
A. Two transations carried out separately
B. two steps carried out separately
C. two persons carrying out operations separately
D. two different systems
�
ANSWER: A
The language used for granting access to data from the DBMS is referred to as the
A. DML
B. DDL
C. DCL
D. SDL
�
ANSWER: C
ANSWER: B
ANSWER: A
ANSWER: C
In motor car manufacturing the following type of information is operational
A. Decision on introducing a new model
B. Scheduling production
C. Assessing competitor car
D. Computing sales tax collected
�
ANSWER: B
ANSWER: D
Relation refers to
A. hierarchy
B. tables
C. networks
D. nodes
�
ANSWER: B
Tuples refer to
A. rows
B. columns
C. grid chart
D. network chart
�
ANSWER: A
Attributes refer to
A. rows
B. columns
C. grid chart
D. network chart
�
ANSWER: B
DSS is a-----------
A. computer based information system
B. manual system
C. mathematical formulation
D. computer program
ANSWER: A
ANSWER: D
ANSWER:A
The�� validates and corrects the data before it is inserted into warehouse
A. Data acquistion
B. data capture
C. data cleaning
D. data aggregation
�
ANSWER: C
The�. Is the process of storing data at the detail level or at some aggreagate
level or combination of both
A. Data acquistion
B. data capture
C. data cleaning
D. data aggregation
ANSWER: D
The�.is computer assisted process of digging through and analyzing enormous sets of
data and then extracting the meaning of data
A. Data mining
B. data warehouse
C. data acquisition
D. data aggregation
�
ANSWER: A
The �.. Searches for relationships and global patterns that exists in large
database
A. Data mining
B. data warehouse
C. data acquisition
D. data aggregation
�
ANSWER: A
ANSWER: A
Based on user's request the -----is responsible for fetching relevant data
A. information depository
B. data warehouse server
C. data mining engine
D. graphical user interface
�
ANSWER: C
The�.. Method of data mining find human interpretable patterns that describe the
data
A. prediction method
B. description method
C. mathematical method
D. astrology method
�
ANSWER: B
ANSWER: C
ANSWER: A
A�. Is a computer based information system that is designed to work with the
referenced by spatial coordination
A. GDSS
B. MIS
C. GIS
D. Executive information system
ANSWER: C
The general term used for firms which have enabled business relationships with
customers, employees and suppliers through digital networks is�.
A. digital marketing
B. network integration
C. Digital firm
D. SCM
�
ANSWER: C
The term --- was used to convey integration of internet and IT in key reosurce
management process and to transact business
A. E-commerce
B. MIS
C. e-business enterpirse
D. TPS
�
ANSWER: C
The�. Is the application of information and communication technologies in support
of all activities of business
A. E-business
B. MIS
C. TPS
D. E-commerce
�
ANSWER: A
These are collection of e-shops offered together via a single point of access
A. E-business
B. MIS
C. E-malls
D. E-commerce
�
ANSWER: C
ANSWER: A
In this model consumer can post his resume for services he can offer
A. B2B
B. C2B
C. C2C
D. B2G
�
ANSWER: B
ANSWER: C
This call centre is designed to receive large volume of request from customers by
telephone
A. inbound call centre
B. outbound call centre
C. customer service centre
D. BPO
�
ANSWER: A
This is combination of hardware and software that controls the flow of incoming and
outgoing netwrok traffic and prevents unauthorized communication in and out the
network
A. biometric authentication
B. pass word encryption system
C. Firewall
D. AntiMalware system
�
ANSWER: C
ANSWER: C
The following enables client and server computer to establish a secure connection
server and manage encryption and decryption activities
A. Secure hyper text transfer protocol
B. secure socket layer
C. antivirus software
D. intusion detection system
ANSWER: B
JAD is
A. Joint application design
B. joint application development
C. joint additional development
D. all
ANSWER: B
ANSWER: B
using intranets to gather store and share a company's best practice amont employees
A. DSS
B. KMS
C. EIS
D. none
�
ANSWER: B
�ANSWER: B
ANSWER: A
information systems for strategic information needs of top and middle managers
A. EIS
B. DSS
C. TPS
D. IRS
�
ANSWER: A
Control totals, error signals, backup files, and security codes are example of:
A. information system analysis
B. Information sytem Design
C. information system control
�
�
ANSWER: C
A computer system that acts as a filter for connection with any external network is
A. Router
B. Bridges
C. Firewall
D. none
�
ANSWER: C
ANSWER: B
ANSWER: A
software that can infect machine and sends private information back to owners is
A. adware
B. malware
C. trojan
D. worm
�
ANSWER: A
Designing computer hardware, software, and workstations that are safe, comfortable
and easy to use:
A. Egromonics
B. Ergonomics
C. Erithromonics
D. economics
�
ANSWER: B