It MCQ
It MCQ
2. ___________ is a prescribed sequence of work steps performed to produce a desired result for
organization.
a) Business Evaluation
b) Business process
c) Business Reporting
d) Business Environment
5. Which of these is a set of activities that are performed in coordination in an organizational and
technical environment?
a) Business Evaluation
b) Business process
c) Business Reporting
d) Business Environment
9. In which step of order to cash cycle items are moved from the warehouse to the staging area?
a) Shipping
b) Reconciliation
c) Pick Release
d) Customer Order
10. Which of these involves the transactional flow of data from the point of placing an order with
a vendor to the point of payment to the vendor?
a) Order To Cash
b) Purchase To Pay
c) Operating Cycle
d) Rationalize Cycle
11. Which is a document that is prepared requesting the purchase department to place an order
with the vendor specifying the quantity?
a) Purchase Requisition
b) Request for quote
c) Quotation
d) Purchase Order
12. A document through which vendor provide information about prize, discount & other details?
a) Purchase Requisition
b) Quotation
c) Bill Of Entry
d) All the above
17. In which level of BPM, the activities and their relationships are specified, but implementation
aspects of the business process are disregarded?
a) Supportive Business Process
b) Organizational Business Process
c) Operational Business Process
d) Implemented Business Process
18. Which level of BPM, contain information on execution of the process activities and the technical
and organizational environment in which they will be executed?
a) Supportive Business Process
b) Organizational Business Process
c) Operational Business Process
d) Implemented Business Process
19. Which term in the definition of BPM is about realizing strategic objectives as outlined in
?
a) Achievement
b) Improvement
c) Objectives
d) Essential
20. Which term in the definition of BPM refers to an enterprise or parts of an enterprise, perhaps a
business unit that is discrete in its own right ?
a) Achievement
b) Improvement
c) Objectives
d) Organization
21. Which term in the definition of BPM, is about making the business processes more efficient and
effective?
a) Achievement
b) Improvement
c) Objectives
d) Organization
23. Which term in the definition of BPM, comprises all the things we do to provide someone who
cares with what they expect to receive?
a) Achievement
b) Improvement
c) Management
d) Organization
24. Which of these is a generic software system that is driven by explicit process representations to
coordinate the enactment of business processes?
a) BPMS
b) TQM
c) DBMS
d) BPA
27. _______ are the core assets of an organization, and they produce the values that justify an
existence.
a) Strategies
b) Processes
c) Transactions
d) Information
30. _______ aligns the IT solution to be more in line with the process and once implemented, allows
organizations to measure, monitor, control, and analyze processes real time.
a) BPMS
b) TQM
c) DBMS
d) BPA
31. Which phase of BPM involves evaluation of potential solutions to meet the identified needs and
business process modeling?
a) Analysis Phase
b) Design Phase
c) Implementation Phase
d) Run & Monitor Phases
32. Which phase of BPM involves project preparation, blue printing, realization, final preparation,
go live and support?
a) Analysis Phase
b) Design Phase
c) Implementation Phase
d) Run & Monitor Phases
34. Which is a methodology are tools that organizations can use to implement process
improvement?
a) Business Process Re-engineering
b) Incremental Process Improvement
c) Both (a) & (b)
d) Neither (a) Nor (b)
36. Which of these is way things are usually done in most organization in absence of a TQM focus?
a) Traditional Management
b) Portfolio Management
c) Synergy Management
d) Resource Management
37. On which factor the nature of TQM differs from common management practices?
a) Organization Structure
b) Organization Change
c) Motivation and job design
d) All The Above
38. Which has meant that your process or product will perform with almost no defects?
a) Reaching Six Sigma
b) Ethnic Mix
c) Kieretsus
d) TQM
39. Which of these is a total management commitment and philosophy of excellence, customer
focus, process improvement, and the rule of measurement rather than gut feel?
a) Six Sigma
b) PESTEL
c) TQM
d) SWOT
40. Which of these is a people-focused management system that aims at continual increase in
customer satisfaction at continually lower real cost?
a) Competitive Taskforce Management
b) Market Facility Management
c) Total Quality Management
d) Portfolio Risk Management
41. Which is the principle for that guide the total quality management philosophy?
a) Focusing on Customer
b) Root Cause Corrective Action
c) Thinking Statistically
d) All The Above
42. ________ is a philosophy that seeks to prevent poor quality in products and services, rather than
simply to detect and short out defects.
a) TQM
b) ADL
c) PESTEL
d) SWOT
43. Six Sigma is related to ___________, the company that has invented it.
44. Which is primarily meant maintenance of the desired quality in processes and end products?
a) Six Sigma
b) PESTEL
c) SWOT
d) Kieretsus
45. Six Sigma strives _________ of products manufactured are defect free.
a) 99.98966 %
b) 99.99738 %
c) 99.99666 %
d) 99.99966 %
46. Which is not the area in which six sigma effort are targeted?
a) Improving customer satisfaction
b) Reducing Cycle Time
c) Reducing Defects
d) None of these
47. Which is not the area in which six sigma effort are targeted?
a) Improving customer satisfaction
b) Reducing Cycle Time
c) Reducing Defects
d) None of these
49. _______ means going to root of problem areas and not attempting to make any superficial
changes.
a) Fundamental Re-thinking
b) Radical Redesigning
c) Dramatic Improvement
d) All the above
50. _________ is meant for replacement of the old process by altogether new one to achieve
dramatic improvement in the performance.
a) Benchmarking
b) Strategic Change
c) Re-Engineering
51. Which refers to analysis & redesign of workflows & processes both within & between
organization?
a) Business Process Re-Engineering
b) Benchmarking
c) Strategic Change
d) Strategic Leadership
52. __________ implies not just change but dramatic change in the way a business functions.
a) BPR
b) Strategic Change
c) Benchmarking
d) SWOT
54. The success of _______ depends on how effectively management conveys the need for change to
the people.
a) TQM
b) SWOT
c) BPR
d) ERP
55. ________ actually paper-based standard operating procedures taken to their most productive
level throughout initiation of increasingly business centric technological advances.
a) BPM
b) TQM
c) SWOT
d) ERP
57. __________ is a useful tool for working out how we can create the greatest possible value for our
customers.
a) Business Process Re-engineering
58. _______ is a strategy to automate business processes so as to bring benefit to enter- prise in terms
of cost, time and effort.
a) BPM
b) TQM
c) SWOT
d) BPA
60. Which is a system of collection, storage and processing of financial data that is used by decision
makers.
a) Business Process Re-engineering
b) Accounting Information System
c) Value Chain Analysis
d) Total Quality Management
61. Which of these is not the basic function of accounting information system?
a) Collect and store data
b) Record transection
c) safeguard organizational assets
d) None of these
62. __________ present a chronological record of what occurred and provide management with
information in form of report which are useful for decision making.
a) Journals
b) Ledgers
c) Statements
d) Trial Balances
63. _________ allows management to verify that assigned responsibilities were completed correctly.
a) Inquiry
b) Documentation
c) Observation
d) Investigation
65. It is through the study of _________that we gain a clear view of a processing framework.
a) Transection Cycle
b) Finance Cycle
c) Revenue Cycle
d) Production Cycle
66. Which cycle includes the preparation of employee paychecks and the re- cording of payroll
activities.
a) Finance Cycle
b) Revenue Cycle
c) Production Cycle
d) Expenditure Cycle
67. If the process of updating of the data stored is periodic, it is referred to as ________.
a) Data Processing
b) Real-time Processing
c) Batch Processing
d) Consignment Processing
68. If the process of updating involves immediate updating as each transaction occurs, it is referred
to as ____________.
a) Data Processing
b) Real-time Processing
c) Batch Processing
d) Consignment Processing
69. In ________, the processes of business activities about which data must be collected and
processed are identified.
a) Data Processing Cycle
b) Realtime Processing Cycle
c) Financing Processing Cycle
d) Operating Cash Cycle
70. Which step of data processing cycle Involves the activities like capturing the data,
implementing control procedures, recording in journals, posting to ledgers and preparation of
reports?
71. Which step of data processing cycle Involves organizing the data in master file or reference file
of an automated system for easy and efficient access?
a) Data Input
b) Data Storage
c) Data Processing
d) Information Output
72. Which step of data processing cycle Involves addition, deletion and updating of the data in the
transaction file, master file or reference file.?
a) Data Input
b) Data Storage
c) Data Processing
d) Information Output
74. _________are a new class of software that allows enterprises to devise process centric IT
solutions.
a) BPMS
b) TQM
c) DBMS
d) BPA
75. _________ means BPM solutions are able to integrate people, systems and data.
a) Freeing-Up
b) Value Creation
c) Process Centric
d) Modularity
78. Which of these is ideally suited to help support companies in their quest for process
improvement and compliance/governance certification?
a) BPM
b) TQM
c) DBMS
d) BPA
79. Using __________ enterprises can document workflow and processes, to identify bottlenecks and
recommend alternative and improved business processes.
a) TQM
b) DBMS
c) BPA
d) BPM
80. Which of these describes logical flow of data within a computer system & procedures that
employees must follow to accomplish application tasks?
a) Authentication
b) Documentation
c) Segregation Of Duties
d) Investigation
81. Documentation hel+`ps system designers develop new systems in much the same way that
blueprints help architects design building,
a) Authentication
b) Segregation Of Duties
c) Investigation
d) Documentation
82. Good documentation helps system designers develop ________ oriented software.
a) Program
b) System
c) Process
d) Policy
83. Which is popular pictorial representation or technique which may be adopted for mapping
business processes?
a) Data Flow Diagram
b) Flow Chart
c) Decision Tree
d) All The Above
85. Which relationship is shown on the diagram by a line connecting the two entities?
a) One to One
b) One to Many
c) Many to One
d) Many to Many
86. Which relationship is shown on the diagram by a line connecting the two entities with a
relationship?
a) One to One
b) One to Many
c) Many to One
d) Many to Many
87. Which relationship is shown on the diagram by a line connecting the two entities with
ends?
a) One to One
b) One to Many
c) Many to One
d) Many to Many
89. Which of these is a graphical representation of the flow of data through an information system?
a) Data Flow Diagram
b) Decision Tree
c) Flowchart
d) Decision Table
90.
a) Entity
b) Process
c) Data Store
d) Flowchart
92. Which of these is manipulation or work that transforms data, performing computations, making
decisions, or directing data flows based on business rules?
a) Entity
b) Process
c) Data Store
d) Flowchart
93. _________ is where a process stores data between processes for later retrieval by that same
process or another one. Files and tables are considered data stores.
a) Entity
b) Process
c) Data Store
d) Flowchart
94. ________ is the movement of data between the entity, the process and the data store.
a) Data Warehouse
b) Data Flow
c) Data Store
d) Datamart
103. Which logical operators are used to replicate the structure of If then rules?
a) AND & OR
b) SHALL & MUST
c) AND & IF
d) SHALL & WILL
106. Which of these may accompany a flowchart, defining possible contingencies that may be
considered within program & the appropriate course of action for each contingency?
a) Decision Tree
b) Flowchart
c) Decision Diagram
d) Decision Table
108. Which type of decision table is comprehensively lists the comparisons or conditions?
a) Condition Stub-
b) Action Entries-
c) Condition Entries-
d) Action Stub-
109. Which type of decision table comprehensively lists the actions to be taken along the various
program branches?
a) Condition Stub-
b) Action Entries-
c) Condition Entries-
d) Action Stub-
110. Which type of decision table list in its various columns the possible permutations of answer to
the questions in the conditions stub?
a) Condition Stub-
b) Action Entries-
c) Condition Entries-
d) Action Stub-
111. Which type of decision table lists, in its columns corresponding to the condition entries the
actions contingent upon the set of answers to questions of that column?
a) Condition Stub-
b) Action Entries-
c) Condition Entries-
d) Action Stub-
Answers
1 b 21 b 41 d 61 d 81 d 101 c
2 b 22 c 42 a 62 a 82 c 102 d
3 c 23 c 43 a 63 b 83 d 103 a
4 a 24 a 44 a 64 c 84 a 104 a
5 b 25 d 45 d 65 a 85 a 105 d
6 c 26 d 46 d 66 d 86 b 106 d
7 a 27 b 47 d 67 c 87 d 107 c
8 c 28 d 48 c 68 c 88 d 108 a
9 c 29 b 49 b 69 a 89 a 109 d
10 b 30 a 50 c 70 a 90 d 110 c
11 a 31 b 51 a 71 b 91 b 111 b
12 b 32 c 52 a 72 c 92 b 112 a
13 d 33 b 53 d 73 a 93 c
14 c 34 c 54 c 74 a 94 b
15 a 35 a 55 a 75 c 95 c
16 b 36 a 56 d 76 c 96 d
17 c 37 d 57 c 77 c 97 d
18 c 38 a 58 d 78 a 98 c
19 a 39 a 59 d 79 d 99 c
20 d 40 c 60 b 80 b 100 c
2. _______ provide a simple and inexpensive way to communicate with clients or customers as well
as vendors.
a) E-mail
b) Router
c) Server
d) Hub
3. Which is one such popular VOIP service, which allows people across the world to make free,
unlimited, superior quality voice calls via its innovative peer-to-peer?
a) E-mail
b) Router
c) Server
d) Skype
5. Using a ___________, information can be encrypted in a way to prevent unauthorized use, making
it quite safe and secure.
a) Policy
b) Program
c) Plan
d) Procedure
6. Which of these is a strategy that is used to optimize & stream- line essential business processes,
using latest technology to automate functions involved in carrying them out.
a) BPM
b) TQM
c) BPA
d) DBMS
8. Which methodology of audits had an audit trail which assisted the auditors in conducing and
documenting the audit?
a) Operational
b) Virtual
c) Traditional
d) Electronical
10. Which objective of audit verify that the assets, liabilities, ownership, and/or activities are real?
a) Existence
b) Authorization
c) Cutoff
d) Operational
12. Which objective of audit Verify that the transaction is re-coded in the proper accounting
period?
a) Existence
b) Authorization
c) Cutoff
d) Operational
13. Which objective of audit Verify that the program, area, or activity is performed economically,
efficient, and effectively?
a) Existence
b) Authorization
c) Cutoff
d) Operational
15. In simplest way we can define __________ as removing the human element from existing business
processes by automating the repetitive or standardized process components
a) BPM
b) TQM
c) BPA
d) DBMS
16. ___________ entails understanding how information is collected & processed on a day-to-day
basis & then making recommendations on how best to automate those processes for maximum
benefit.
a) BPM
b) TQM
c) BPA
d) DBMS
18. Which phase of ERP involves evaluation of potential solutions to meet identified needs,
business process designing & business process modeling?
a) Analysis
b) Design
c) Implementation
d) Run & Monitor
19. Which phase of ERP involves project preparation, blue printing, realization, final preparation, go
live and support?
a) Analysis
b) Design
c) Implementation
d) Run & Monitor
21. Which of these refers to the scientific and practical approach to computation and its
applications?
a) Computer Science
b) Computer Engineering
c) Information System
d) Information Technology
22. Which of these refers to the discipline that integrates several fields of electrical engineering and
computer science required to develop computer hardware and software?
a) Computer Science
b) Computer Engineering
c) Information System
d) Information Technology
23. Which of these refers to the study of complementary networks of hardware and software that
enterprises, employees or individuals use to collect, process, create, store and distribute data?
a) Computer Science
b) Computer Engineering
c) Information System
d) Information Technology
24. Which of these refers to the application of computers and telecommunications to store, retrieve,
transmit and manipulate data in for processing of information in enterprises?
a) Computer Science
b) Computer Engineering
c) Information System
d) Information Technology
25. Which of these refers to the study of these approaches, which is primarily the application of
engineering to software?
a) Computer Science
b) Information System
c) Software Engineering
d) Information Technology
28.
instructions of the currently loaded program.
a) CPU (Processor)
b) ROM (Memory)
c) Printer (Output)
d) Keyboard (Input)
29. _______ deals with what the chip a sort of between software and hardware.
a) Instruction Set Architecture
b) Open Database Community
c) Software Engineering
d) Computer Engineering
30. If the control unit contains a number of micro-electronic circuitry to generate a set of control
signals and each micro- circuitry is activated by a micro-code, this design approach is called
__________ design.
a) CISC
b) RISC
c) Both (a) & (b)
d) Neither (a) Nor (b)
31. To execute each instruction, if there is separate electronic circuitry in the control unit, which
produces all the necessary signals, this approach of the design of the control section of the
processor is called ________ design.
a) CISC
b) RISC
c) Both (a) & (b)
d) Neither (a) Nor (b)
32. Since ________ processors have a small instruction set, they place extra demand on
programmers.
a) CISC
b) RISC
c) Both (a) & (b)
d) Neither (a) Nor (b)
34. Which is the term used to describe the resources and methods used to achieve architecture
specification.
a) System Design
b) Micro Architecture
c) Computer Engineering
d) Software Technology
35. Which refers to the creation of a virtual machine that acts like a real computer with an operating
system?
a) Hardware Virtualization
b) Software Virtualization
c) Network Virtualization
d) Storage Virtualization
42. Which provides clients with access to server hardware, storage, bandwidth and other
fundamental computing resources.
a) IaaS
b) Caas
c) Naas
d) Paas
43. Which is a model of software deployment where an application is hosted as a ser- vice
provided to customers across the Internet.
a) Caas
b) Naas
c) Paas
d) Saas
44. Which provides clients with access to the basic operating software and optional services to
develop and use software applications without the need to buy and manage the underlying
computing infrastructure.
a) Caas
b) Naas
c) Paas
d) Saas
49. MS Office 2010 has MS World, MS Excel, MS Access etc. this is example of _______ .
a) Content Access Software
b) Media Development
c) Application Suit
d) Information Worker Software
50. ________ provides capabilities required to support enterprise software systems. E.g. email servers.
a) Content Access Software
b) Media Development Software
c) Enterprise Infrastructure
d) Information Worker Software
57. The main feature of _______ is that it permits all types of relationships i.e. one to one, one to
many, many to one & many to many.
a) Network Database Structure
b) Relational Database Structure
c) Object Oriented Database Model
d) Hierarchical Database Model
59. __________ is computer software that is designed to operate the computer hardware and to give
and maintain a platform for running application software.
a) Information System
b) System Software
c) Computer Engineering
d) Micro Architecture
60. Which is a set of computer programs that manages computer hardware resources and acts as
an interface with computer applications programs?
a) Information System
b) System Software
c) Computer Engineering
d) Micro Architecture
62. Which feature of operating system helps in allocating resources to make optimum utilization of
resources?
a) Task Management
b) Logical Access Security
c) Networking Capability
d) File Management
63. _________are devices through which we interact with the systems and include devices like
Keyboard, Mouse and other pointing devices.
a) Input Devices
b) Output Devices
c) Virtual Devices
d) Grid Devices
64. Which is the actual hardware that interprets and executes the program instructions and
coordinates how all the other hardware devices work together?
a) CPU
b) Printer
c) Keyboard
d) Mouse
66. Which function of the processing device performs operations as addition, subtraction,
multiplication & logical comparison of numbers ?
a) Control Unit
b) Arithmetic & logical unit
c) Registers
d) Local Area Network
67. Which is the high speed memory units CPU for storing small amount of data ?
a) Control Unit
b) Arithmetic & logical unit
c) Registers
d) Local Area Network
68. Which memory is used to bridge speed difference between register & primary memory ?
a) Processor Register
b) Cache Memory
73. In which type of Primary memory information can be read only and not be modified ?
a) RAM
b) ROM
c) Register
d) Cache
74. Which is imaginary memory supported by some operating system in conjunction with the
hardware?
a) Primary Memory
b) Secondary Memory
c) Virtual Memory
d) Internal Memory
77. A vacuum tube that uses an electron gun to emit a beam of electrons that illuminates
phosphors on a screen as the beam sweeps across the screen repeatedly. A monitor is often
called __________.
a) Cathode Ray Tube
b) Liquid Crystal Display
c) Plotter
d) Ledger Printer
78. Which is a low-powered display technology used in laptop computers where rod-shaped crystal
molecules change their orientation when an electrical current flows through them.
a) Cathode Ray Tube
b) Liquid Crystal Display
c) Plotter
d) Ledger Printer
79. Smart cards don.t need to be inserted into a reader. Just waving them near a reader is just
sufficient for the card to exchange data.
a) Contact Cards
b) Contactless Cards
c) Combi Cards
d) None of these
80. A printer that makes images by forcing ink droplets through nozzles.
a) Plotter
b) Multifunction Printer
c) Laser Printer
d) Dot Matrix Printer
81. A printer that uses computer-directed pens for creating high-quality images, blueprints,
schematicx, etc:
a) Plotter
b) Multifunction Printer
c) Laser Printer
d) Dot Matrix Printer
84. Which of these refers to the amount of data which can be sent across a network in given time?
a) Routing
b) Bandwidth
c) Resilience
d) Contention
85. Which of these refers to the ability of a network to recover from any kind of error like
connection failure, loss of data etc.
a) Routing
b) Bandwidth
c) Resilience
d) Contention
86. Which of these refers to the situation that arises when there is a conflict for some common
resource?
a) Routing
b) Bandwidth
c) Resilience
d) Contention
87. Which phase of information system life cycle examines that will the Information System do
what it must do to obtain the solution to the
a) System Investigation
b) System Analysis
c) System Designing
d) System Implementation
88. In Which activity of conversion of master files, user stops using the old system one particular
day and starts using the new system from thereon, usually over a weekend or during a slack
period?
a) Direct changeover
b) Parallel Conversion
c) Phased Conversion
d) Pilot Conversion
89. In Which activity of conversion of master files, old system continues alongside the new system
for a few weeks or months?
a) Direct changeover
b) Parallel Conversion
90. Which activity of conversion of master files is used with larger systems that can be broken
down into individual modules which can be implemented separately at different times?
a) Direct changeover
b) Parallel Conversion
c) Phased Conversion
d) Pilot Conversion
91. In Which activity of conversion of master files, New system will first be used by only a portion
of the enterprise, for example at one branch or factory?
a) Direct changeover
b) Parallel Conversion
c) Phased Conversion
d) Pilot Conversion
92. Which is a wireless technology standard for exchanging data over short distances up to 50
meters (164 feet) from fixed and mobile devices?
a) Bluetooth
b) WI-FI
c) Laptop
d) Touchpad
93. Which is the name of a popular wireless networking technology that uses radio waves to
provide wireless high-speed Internet and network connections?
a) Bluetooth
b) WI-FI
c) Laptop
d) Touchpad
94. Which was originally designed to be similar to a desktop, but be small and light enough that it
could be used while sitting in our lap.
a) Bluetooth
b) WI-FI
c) Laptop
d) Touchpad
97. Which is a mobile phone built on a mobile operating system, with more advanced computing
capability connectivity than a feature phone.
a) Smartphone
b) I-Pad
c) I-Pod
d) UMPC
98. Which is designed for finger-based use and has none of the tiny features which re- quired a
stylus on earlier tablets.
a) Smartphone
b) iOS
c) I-Pod
d) UMPC
99. Which is the iPod is a line of portable media players designed and marketed by Apple Inc.
a) Smartphone
b) I-Pad
c) I-Pod
d) UMPC
100. Which a small form factor version of a pen computer, a class of laptop whose specifications
were launched by Microsoft and Intel in spring 2006.
a) Smartphone
b) I-Pad
c) I-Pod
d) UMPC
101. Which is a Linux-based operating system designed primarily for touch screen mobile devices
such as smart phones and tablet computers.
a) Smartphone
b) I-Pad
c) I-Pod
d) Android
102. Smart cards that need to insert into a reader in order to work, such as a smart card reader or
automatic teller machines.
a) Contact Cards
b) Contactless Cards
c) Combi Cards
Answers
1 d 19 c 37 c 55 c 73 b 91 d
2 a 20 b 38 a 56 a 74 c 92 a
3 d 21 a 39 b 57 a 75 a 93 b
4 d 22 b 40 a 58 d 76 a 94 c
5 b 23 c 41 b 59 b 77 a 95 d
6 c 24 d 42 a 60 b 78 b 96 a
7 d 25 c 43 d 61 d 79 b 97 b
8 c 26 a 44 c 62 a 80 c 98 b
9 d 27 c 45 b 63 a 81 a 99 c
10 a 28 a 46 d 64 a 82 c 100 d
11 b 29 a 47 b 65 d 83 a 101 d
12 c 30 a 48 d 66 b 84 b 102 a
13 d 31 b 49 c 67 c 85 c
14 c 32 b 50 c 68 b 86 d
15 c 33 b 51 a 69 a 87 c
16 c 34 b 52 d 70 a 88 a
17 a 35 a 53 c 71 d 89 b
18 b 36 b 54 b 72 a 90 c
3. Which are the starting and stopping points in any telecommunication network environment.
a) Protocols
b) Terminals
c) Servers
d) Packets
4. Any input or output device that is used to transmit or receive data can be classified as a
__________.
a) Shared Database
b) Telecommunication
c) Core Banking
d) Terminal Component
6. ________ is a device that converts a digital computer signal into an analog telephone signal and
converts an analog telephone signal into a digital computer signal in a data communication
system.
a) Network Interface Card
b) Modem
c) multiplexer
d) Internetwork Processor
10. Which is a port-switching communications processor. This allows for the sharing of the network
resources such as servers, LAN workstations, printers, etc.?
a) Hub
b) Switch
c) Bridge
d) Gateway
11. _________is a communications processor than connects numerous Local Area Networks (LAN).
a) Router
b) Switch
c) Bridge
d) Gateway
12. _________ is a communications processor that boosts or amplifies the signal before passing it to
the next section of cable in a network.
a) Router
b) Repeater
c) Bridge
d) Gateway
13. _________ is a communications processor that connects networks that use different
communication architectures.
a) Router
b) Repeater
c) Bridge
d) Gateway
14. Guided Transmission Media uses a system that guides the data signals along a
specific path.
a) Cabling
15. _________ is ordinary telephone wire, consisting of copper wire twisted into pairs.
a) Coaxial Cable
b) Fiber Optics
c) Twisted Pair
d) Radio Waves
16. Which telecommunication media consists of copper or aluminum wire wrapped with spacers to
insulate and protect it?
a) Coaxial Cable
b) Fiber Optics
c) Twisted Pair
d) Radio Waves
17. ____________ consists of a means for the data signals to travel but nothing to guide them along a
specific path.
a) Fiber Optics
b) Twisted Pair
c) Unbound Media
d) Radio Waves
18. ___________ of these involves earthbound microwave systems, which transmit high-speed radio
signals in a line-of-sight path between relay stations spaced approximately 30 miles apart.
a) Terrestrial Microwave
b) Twisted Pair
c) Unbound Media
d) Radio Waves
19. Wireless networks do not require any physical media or cables for data transmission.
a) Coaxial Cable
b) Fiber Optics
c) Twisted Pair
d) Radio Waves
20. ____________ are radio waves with wavelengths ranging from as long as one meter to as short as
one millimeter, or equivalents, with frequencies between 300 MHz (0.3 GHz) and 300 GHz.
a) Coaxial Cable
b) Fiber Optics
c) Infrared Waves
d) Micro waves
22. Communication satellites use the atmosphere (microwave radio waves) as the medium through
which to transmit signals.
a) Radio Waves
b) Micro waves
c) Infrared Waves
d) Communication Satellites
23. A ________ is a group of computers and network devices connected together, usually within the
same building, campus or spanned over limited distance. It provides high speed data transfer
and is relatively inexpensive.
a) LAN
b) WAN
c) MAN
d) VPN
24. A _________ is a larger network that usually spans in the same city or town i.e. Cable network.
a) LAN
b) WAN
c) MAN
d) VPN
25. A ____________ is not restricted to a geographical location, although it might be confined within
the bounds of a state.
a) LAN
b) WAN
c) MAN
d) VPN
26. Which of these partitions tasks or workloads between the providers of a resource or service,
called servers, and service requesters, called clients.
a) Client Server
b) Peer to peer
c) Multi-Tier
d) Private Network
27. __________is a type of decentralized and distributed network architecture in which individual
nodes in the network act as both suppliers and consumers of resources.
a) Client Server
b) Peer to peer
c) Multi-Tier
d) Private Network
29. Network established for all users across the world is known as _________.
a) Client Server
b) Virtual Private Network
c) Public Network
d) Private Network
30. A ____________ is a network that uses a public network, such as the Internet, to provide secure
a) Client Server
b) Virtual Private Network
c) Public Network
d) Wild Network
33. _____________ are telecommunications networks that cover large geographic areas with various
communication facilities such as long distance telephone service, satellite transmission, and
under-sea cables.
a) Local Area Networks
b) Virtual Private Network
c) Metropolitan Area Network
d) Wide Area Network
34. The Client/Server computing is an environment that satisfies the business need buy appropriate
allocating the application processing between the client and the server processors.
a) Metropolitan Area Network
b) Client/Server Computing
c) Public Network Community
35. A _______ is a single-user workstation that provides a presentation services & appropriate
computing, connectivity and database services relevant to business need.
a) Modem
b) Network
c) Server
d) Client
36. _________performs the bulk of any data processing operations itself, and does not necessarily
rely on the server.
a) Fat / Thick Client
b) Private Network
c) Radio Waves
d) Communication Satellites
37. A ___________generally only presents processed data provided by an application server, which
performs the bulk of any required data processing.
a) Thick Clien
b) Fat Client
c) Thin Client
d) Server
38. A _________ is one or more multi-user processors with share memory providing computing,
connectivity and the database services and the interfaces relevant to the business need.
a) Modem
b) Hub
c) Server
d) Client
39. A _________ network is created with two or more PCs connected together and share resources
without going through a separate server computer.
a) Client/Server
b) Peer to peer
c) Multi-Tier
d) Data-client
42. The ________ is used when an effective distributed client/server design is needed that provides
increased performance, flexibility, maintainability, reusability and scalability, while holding the
complexity of distributed processing from the user.
a) One Tier Architecture
b) Two Tier Architecture
c) Three Tier Architecture
d) None Of These
43. A _________ is defined as a network shared and accessed by users not belonging to a single
organization.
a) Metropolitan Area Network
b) Client/Server Computing
c) Public Data Network
d) Virtual Private Network
44. A _______ is a private network that uses a public network (usually the Internet) to connect remote
sites or users together.
a) Metropolitan Area Network
b) Client/Server Computing
c) Public Data Network
d) Virtual Private Network
45. __________ is the allocation of resources, both hardware and software, to each individual
workstation, or office location.
a) Decentralized Computing
b) Virtual Private Network
c) Three Tier Architecture
d) Communication Satellites
46. The geometrical arrangement of computer resources, remote devices and communication
facilities to known as ___________.
a) Network Structure
b) Virtual Network
c) Decentralized Computing
d) Communication Satellites
48. In ________ a single network cable runs in the building or campus and all modes are linked along
with this communication line called the bits or backbone or central cable.
a) STAR
b) BUS
c) MESH
d) RINGLOOP
49. In which topology the networks cable passes from one node to another until all nodes are
connected in the form of a loop or ring?
a) STAR
b) BUS
c) MESH
d) RINGLOOP
50. In which structure, there is a combination of two or more networks of different topologies
communication links?
a) STAR
b) BUS
c) MESH
d) RINGLOOP
51. In which approach, the bits of each byte are sent along a single path one after another serially?
a) Serial Transmission
b) Parallel Transmission
c) Asynchronous Transmission
d) Synchronous Transmission
52. In which approach the bits of a byte are simultaneously transmitted parallel paths as in the case
of parallel ports for printers?
a) Serial Transmission
b) Parallel Transmission
c) Asynchronous Transmission
d) Synchronous Transmission
53. In which each character is sent at irregular intervals in time as in the case of characters entered at the
keyboard in real time?
a) Serial Transmission
b) Parallel Transmission
54. In which approach, transmitter and receiver are paced by same clock & receiver continuously
receives information at same rate transmitter sends it?
a) Serial Transmission
b) Parallel Transmission
c) Asynchronous Transmission
d) Synchronous Transmission
55. A _______ communication mode permits data to flow in only one direction.
a) Simplex
b) Duplex
c) Half-Duplex
d) None Of These
56. Under this mode, data can be transmitted back and forth between two stations, but data can
only go in one of the two directions at any given point of time.
a) Simplex
b) Duplex
c) Half-Duplex
d) None Of These
57. A ________ connection can simultaneously transmit and receive data between two stations.
a) Simplex
b) Duplex
c) Half-Duplex
d) None Of These
58. A ____________ is one that establishes a fixed bandwidth circuit between nodes and terminals
before the users may communicate, as if the nodes were physically connected with an electrical
circuit.
a) Metropolitan Area Network
b) Client/Server Computing
c) Public Data Network
d) Circuit Switching Network
59. In __________, end-users communicate by sending each other a message, which contains the
entire data being delivered from the source to destination node.
a) Metropolitan Area
b) Messing Switching
c) Public Data Network
d) Circuit Switching
61. Which of these refers to protocols in which messages are broken up into small transmission units
called packets, before they are sent?
a) Metropolitan Area
b) Messing Switching
c) Packet Switching
d) Circuit Switching
62. ___________ refers to the layout of the network consisting of the hardware, software, connectivity,
communication protocols and mode of transmission, such as wired or wireless.
a) Network Architecture
b) Private Network
c) Radio Waves
d) Communication Satellites
63. __________are software that performs a variety of actions necessary for data transmission
between computers.
a) Protocols
b) Terminals
c) Servers
d) Packets
64. Which is an abstract description for layered communications and computer network protocol
design.
a) OSI
b) VPN
c) TQM
d) WAN
65. _____________ is the OSI layer is closest to the end user, which means that both the OSI
application layer and the user interact directly with the software application.
a) Application Layer
b) Presentation Layer
c) Network Layer
d) Transport Layer
68. Which layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between
the applications at each end?
a) Application Layer
b) Network Layer
c) Session Layer
d) Transport Layer
69. Which layer ensures reliable and transparent transfer of data between user processes, message
packets, provides error recovery and flow control?
a) Application Layer
b) Network Layer
c) Session Layer
d) Transport Layer
70. Which layer provides the functional and procedural means of transferring variable length data
sequences from a source to a destination via one or more networks, while maintaining the
quality of service requested by the Transport Layer.
a) Application Layer
b) Network Layer
c) Session Layer
d) Transport Layer
71. Which Layer responds to service requests from the Network Layer and issues service requests to
the Physical Layer?
a) Application Layer
b) Session Layer
c) Data-link Layer
d) Transport Layer
72. The _____________ is a hardware layer which specifies mechanical features as well as
electromagnetic features of the connection between the devices and the transmission.
a) Physical Layer
b) Session Layer
c) Transport Layer
d) Data-link Layer
74. These originate from individuals who are highly motivated and technically competent and
usually understand network systems design and the vulnerabilities of those systems.
a) Unstructured Threats
b) Structured Threats
c) External Threats
d) Internal Threats
75. These originate from individuals or organizations working outside an organization, which does
not have authorized access to computer systems or network.
a) Unstructured Threats
b) Structured Threats
c) External Threats
d) Internal Threats
76. Typically, these threats originate from individuals who have authorized access to the network.
a) Unstructured Threats
b) Structured Threats
c) External Threats
d) Internal Threats
78. _______________are so common that users have developed techniques to work around the
consequences, and bugs that make saving work necessary every half an hour or crash the
computer every so often are considered to be a normal part of computing.
a) Software Bug
b) Vulnerability
c) Timing Window
d) Configuration
80. _______________occur when vendors use known default passwords to make it as easy as possible
for consumers to set up new systems.
a) Insecure default configuration
b) Vulnerability
c) Timing Window
d) Trusting Untrustworthy information
81. ________ is usually a problem that affects routers, or those computers that connect one network
to another?
a) Vulnerability
b) Timing Window
c) Trusting Untrustworthy information
d) Insecure default configuration
82. _________ is the practice and study of techniques for secure communication in the presence of
third parties.
a) Vulnerability
b) Authentication
c) Ring-loop
d) Cryptography
83. In Cryptography, encryption is the process of encoding messages in such a way that
eavesdroppers or hackers cannot read it, but only authorized parties can.
a) Vulnerability
b) Encryption
c) Authentication
d) Ring-loop
84. Which is the message that is to be encrypted & transformed by a function that is parameterized
by a key?
a) Terminal
b) Packet
c) Plaintext
d) Cipher Text
86. Which
the message?
a) Vulnerability
b) Authentication
c) Ring-loop
d) Cryptography
87. This means that the data must arrive at the receiver exactly as it was sent.
a) Vulnerability
b) Authentication
c) Integrity
d) Cryptography
88. This means that a receiver must be able to prove that a received message came from a specific
sender and the sender must not be able to deny sending it.
a) Non-Repudiation
b) Authentication
c) Integrity
d) Cryptography
89. ___________ is a program to log into another computer over a network, to execute commands in a
remote machine, and to move files from one machine to another.
a) Secure Shell
b) Integrity
c) Multi-Tier
d) Data-client
90. ________is a computing network protocol for accessing & managing files on remote file systems.
a) SFTP
b) HTTP
c) SSL
d) WAN
91. __________is a communications protocol for secure communication over a computer network, with
especially wide deployment on the Internet.
a) SFTP
b) HTTP
c) SSL
d) WAN
93. Which is a device that forms a barrier between a secure and an open environment when the
latter environment is usually considered hostile, for example, the Internet?
a) Site Blocking
b) IDS Technology
c) Anti-Malware
d) Firewall
94. _________ is a software-based approach that prohibits access to certain Web sites that are
deemed inappropriate by management.
a) Site Blocking
b) IDS Technology
c) Anti-Malware
d) Firewall
95. __________ are network links that use Internet technologies to interconnect the intranet of a
business with the intranets of its customers, suppliers, or other business partners.
a) Terminals
b) Packets
c) Extranets
d) Cipher Texts
96. __________enable a company to offer new kinds of interactive Web-enabled services to their
business partners.
a) Terminals
b) Packets
c) Extranets
d) Cipher Texts
97. __________ refers to exchange of services, information and/or products from one business to
another.
a) B2B
b) B2C
c) C2B
d) C2C
98. It is defined as the exchange of services, information and/or products from a business to a
consumer, as opposed to between one business and another.
a) B2B
99. In _________ e-Commerce model, consumers directly contact with business vendors by posting
their project work online so that the needy companies review it and con- tact the consumer
directly with bid.
a) B2B
b) B2C
c) C2B
d) C2C
100. _________ e-Commerce is an Internet-facilitated form of commerce that has existed for span of
history in form of barter, flea markets, swap meets, yard sales & the like.
a) B2B
b) B2C
c) C2B
d) C2C
101. Using these machines customers can withdraw cash, make deposits, pay bills, transfer funds
electronically without going to the bank.
a) ATM
b) I-Mac
c) G-Trade
d) WTM
Answers
1 A 19 D 37 C 55 A 73 A 91 B
2 D 20 D 38 D 56 C 74 B 92 B
3 B 21 C 39 B 57 B 75 C 93 D
4 D 22 D 40 B 58 D 76 D 94 A
5 A 23 A 41 B 59 B 77 B 95 C
6 B 24 C 42 C 60 C 78 A 96 C
7 B 25 B 43 B 61 C 79 C 97 A
8 B 26 A 44 D 62 A 80 A 98 B
9 A 27 B 45 B 63 B 81 C 99 C
10 A 28 C 46 C 64 A 82 D 100 D
11 C 29 C 47 A 65 A 83 B 101 A
12 C 30 B 48 B 66 B 84 C
13 D 31 A 49 D 67 B 85 D
14 A 32 A 50 C 68 C 86 B
15 C 33 D 51 A 69 D 87 C
16 A 34 B 52 B 70 B 88 A
17 C 35 D 53 C 71 C 89 A
18 A 36 A 54 D 72 A 90 A
3. ________ is a raw fact and can take the form of a number or statement such as a date or a
measurement.
a) Component
b) Data
c) Feedback
d) Dashboard
5. ____________ is an activity or set of activities that will accomplish a specific organization goal.
a) Business Process
b) ABC Analysis
c) Business Intelligence
d) Data Mining
6. A _________ is a specific ordering of work activities across time and place, with a beginning, an
end, and clearly defined inputs and outputs: a structure for action.
a) System
b) Terminal
c) Process
d) Procedure
7. Which of these is to track & deal with strategic issues, assisting long-range planning?
9. These can include tracking customer orders, invoice tracking, etc. & that business
procedures are followed.
a) Management Level System
b) Strategic Level System
c) Operational Level System
d) Transaction Processing System
11. These include Managers or supervisors that are responsible for the daily management of the
line workers who actually produce the product or offer the service.
a) Strategic Level
b) Management Level
c) Operational Level
d) None of these
12. A __________ may be defined as a type of information system that collects, stores, modifies and
retrieves the day-to-day data transactions of an enterprise.
a) Management Level System
b) Strategic Level System
c) Operational Level System
d) Transaction Processing System
13. Which of these ensures that people who are not authorized to use the system are not
permissible to influence or transform the transaction process?
a) Access Control
b) Equivalence
c) Trustworthiness
d) Rapid Processing
15. Which of these means that a transaction is either completed in full or not at all. TPS systems
ensure that transactions take place in their entirety?
a) Atomicity
b) Isolation
c) Durability
d) Consistency
17. ____________refers to entire tools & methods that are applied to office activities which
formulate it achievable to practice written, visual, & sound data in a computer-aided mode.
a) Partial Strategic Extortion
b) Operational Level System
c) Transaction Processing System
d) Office Automation System
18. Which is amalgamation of hardware, software, and other resources used to smooth progress
of communications and augment efficiency?
a) Partial Strategic Extortion
b) Office Automation System
c) Operational Level System
d) Transaction Processing System
19. _________ refers to the use of computer and software to digitally generate, collect, store,
manipulate, and relay office information needed for accomplishing basic tasks and goals.
a) Office Automation System
b) Partial Strategic Extortion
c) Operational Level System
d) Transaction Processing System
20. Which of these is an old management tool, which has been long used by people for
superior management and scientific decision making.
a) Management Information System
b) Business Information system
c) Transaction Processing System
d) Executive Information System
22. Management Information System is a system which provides accurate, timely and
meaningful data for management planning, analysis and control to optimize the growth of
the organization.
a) Management Information System
b) Business Information system
c) Transaction Processing System
d) Executive Information System
23. Which of these includes Input data-entry devices, CPU, Data Storage files and Output Devices?
a) Hardware
b) Software
c) User Interface
d) Telecommunication
24. Which of these includes hardware and software components by which people interact with a
machine?
a) Hardware
b) Software
c) User Interface
d) Telecommunication
25. Which of these involves transmitting data from one place to another in a reliable networked system?
a) Hardware
b) Software
c) User Interface
d) Telecommunication
26. It is defined by some renowned researchers that ERP system is rooted in Materials
Requirement Planning and Manufacturing Resource Planning S y s t e m .
a) Business Information system
b) Transaction Processing System
c) Executive Information System
d) Enterprise Resource Planning
27. _________ are a contradictory compilation of interactive computer tools-first and foremost
customizable software - design ed to lend a hand in decision-making.
a) Office Automation System
b) Transaction Processing System
c) Executive Information System
29. ___________ can be defined as an interactive software-based system intended to help decision
makers compile useful information from raw data, documents, personal knowledge, and/or
business models to identify and solve problems and make decisions.
a) Office Automation System
b) Transaction Processing System
c) Decision Support System
d) Executive Information System
31. Model base is the brain of the DSS as it performs data manipulations and computations
with the data provided to it by the user and the database.
a) Model Base
b) Planning Languages
c) Terminals
d) User Interface
32. Which of these is the nature of IS used by executives to access and administer the data
they entail to make informed business decisions?
Transaction Processing System
a) Strategic Level System
b) Rapid Processing
c) Office Automation System
d) Executive Information System
33. "_________ is not a piece of hardware / software, but an infrastructure that supplies to a
firm's executives up-to-the-minute operational data, gathered & sifted from various
databases.
a) Strategic Level System
b) Rapid Processing
c) Office Automation System
d) Executive Information System
35. It is the supervision of supply, storage and accessibility of items in order to make certain a sufficient
supply without excessive oversupply.
a) ABC Analysis
b) EOQ
c) JIT
d) Inventory Control
36. _______is that technique of material control in which we divide our material into three
categories and investment is done according to the value and nature of that category's
materials.
a) ABC Analysis
b) EOQ
c) JIT
d) Inventory Control
37. Which of these is used as part of a uninterrupted review inventory system in which the level
of inventory is scrutinize at all times and a fixed magnitude is ordered each time inventory
level reaches a particular reorder point?
a) ABC Analysis
b) EOQ
c) JIT
d) Inventory Control
38. ___________ is a production planning & inventory control system used to manage manufacturing
processes.
a) ABC Analysis
b) EOQ
c) JIT
d) MRP
39. It is defined as a method for valuable planning of all resources of a manufacturing company, preferably, it
addresses operational planning in units, financial planning, & has a simulation ability to respond "what-if"
questions & extension of closed-loop MRP which looks after production related activities.
a) Material Requirement Planning
b) Manufacturing & Resource Planning
c) Enterprise Resource Planning
d) Distribution Resource Planning
41. ___________ may be defined as the process of planning, implementing and controlling the
operations of the supply chain with the purpose of satisfying the customer's requirement
as efficiently as possible.
a) Supply Chain Management
b) Facilitated Supply Chain
c) Supply Identification Program
d) Manufacturing & Resource Planning
42. Which of these is a software application that coalesce many functions, together with benefits
administration, payroll, recruiting and training, and performance analysis and assessment into
one parcel?
a) Customer Relationship Management
b) Human Resource Management
c) Project Management Module
d) Quality Management Module
44. _________ core banking solution is a comprehensive, agile, componentized yet integrated
business solution, addressing all the core needs of banks, in easy-to-configure modules.
a) Finacle
b) Oracle
c) NERO
d) Coral Draw
45. Finacle provides all the building blocks of business functionality enabling users to configure
products and processes flexibly in order to adapt to a dynamic environment.
a) Oracle
b) NERO
c) Finacle
d) Coral Draw
46. Which of these is defined as a system of collection, storage and processing of financial and
accounting data that is used by decision makers?
47. Which is the vicinity of computer science focusing on creating machines that can fit into place on
behaviors that humans regard as intelligent?
a) Data Analytics
b) Artificial Intelligence
c) Analytics Module
d) Data Mining
48. Which is a computerized information system that allows non-experts to make decisions
comparable to those of an expert?
a) Strategic Level System
b) Rapid Processing
c) Office Automation System
d) Expert System
49. ____________ is the delivery of accurate, useful information to the appropriate decision makers
within the necessary time frame to support effective decision making for business processes.
a) Artificial Intelligence
b) Business Intelligence
c) Data Analytics
d) Field Analytics
50. Which of these involves using the information gathered from the data warehouse and
making it available to users as snapshots of many different things with the objective of getting
response to the query: "Tell me a lot of things, but without too much effort".
a) Dash-word
b) Scorecards
c) Data Mining
d) Business Analytics
51. Which involves providing a visual representation of the enterprise strategy by taking critical
metrics and mapping them to strategic goals throughout the enterprise?
a) Dash-word
b) Scorecards
c) Data Mining
d) Business Analytics
52. Which of these involves using statistical, artificial intelligence, and related techniques to
mine through large volumes of data and providing knowledge without users even having to
ask specific questions?
a) Dash-word
Answers
1 a 11 c 21 a 31 a 41 a 51 b
2 c 12 d 22 a 32 d 42 b 52 c
3 b 13 a 23 a 33 d 43 d
4 b 14 d 24 c 34 d 44 a
5 a 15 a 25 d 35 d 45 c
6 c 16 a 26 d 36 a 46 a
7 a 17 d 27 d 37 a 47 b
8 a 18 b 28 a 38 a 48 d
9 c 19 a 29 c 39 b 49 b
10 a 20 a 30 b 40 a 50 a
7. _______ Allows its user to run multiple operating system simultaneously on a single machine.
a) Virtualization
b) Grid Computing
10. A computer that is using with Microsoft windows may host a virtual machine that looks like a
computer with Linux Operating system.
a) Server Virtualization
b) Hardware Virtualization
c) Database Virtualization
d) Software Virtualization
12. To ensure that data is only available to person who have right to see the same .
a) Confidentiality
b) Integrity
c) Availability
d) Timeliness
15. Which is not the criteria while deciding goal for implementing BPA ?
a) Specific
b) Measurable
c) Attainable
d) Accurate
17. Which error occur when an extra digit or character is added t0 code ?
OR
83276 is recorded as 832766. which type of error is it?
a) Addition Error
b) Truncation Errors
c) Substitution Error
d) None of these
18. Which error occur when a digit or character is removed from the end of as code ?
OR
83276 is recorded as 8327. which type of error is it ?
a) Addition Error
b) Truncation Errors
c) Substitution Error
d) None of these
19. Which error occur when one digit in a code is replaced with another ?
OR
83276 is recorded as 83266. which type of error is it ?
a) Addition Error
20. Which errors occur when two adjacent digits are reversed?
OR
12345 is recorded as 21345. which type of error is it?
a) Single Transposition errors
b) Multiple transposition errors
c) Truncation Errors occur
d) None of these
21. Which error occur when an extra digit or character is added t0 code ?
OR
83276 is recorded as 832766. which type of error is it ?
a) Addition Error
b) Truncation Errors
c) Substitution Error
d) None of these
22. Which is to verify fields appearing in different files to see that the result tally ?
a) Limit Checks
b) Parity Check
c) Picture Checks
d) Cross Check
23. Which is to ensure that physical records follow a required order matching with logical records ?
a) Limit Checks
b) Valid Code Checks
c) Sequence Checks
d) Arithmetic Checks
24. In which the signals are transported along an enclosed physical path like - twisted pair, coaxial
cable, and Optical fiber .
a) Guided Bound Media
b) Sequence Check
c) Parity Check
d) Limit Check
25. Which is used to mitigate exposure associated with dial-up access to a computer system ?
a) Port protection Device
b) Sequence Check
c) Transmission Media
26. Which data processing control are generated to identify errors in the processed data?
a) Run-to-Run totals
b) Edit Checks
c) Exception Reports
d) Field Initialization
27. Which of these is a basic test for data processing accuracy and may be applied to both the input
and output?
a) Limit Checks
b) Picture Checks
c) Valid Coad Checks
d) Arithmetic Checks
28. Which of these checks against entry into processing of incorrect/invalid character ?
a) Limit Checks
b) Picture Checks
c) Valid Coad Checks
d) Arithmetic Checks
29. By which method nodes in a network must compete with each other to gain access to a channe?
a) Sequence Check
b) Cross Check
c) Parity Control
d) Contention
30. Which is to verify fields appearing in different files to see that the result tally ?
a) Limit Checks
b) Parity Check
c) Picture Checks
d) Cross Check
31. Which perform validation checks to identify errors during processing of data ?
a) Real Memory Control
b) Virtual Memory Control
c) Data Processing Control
d) None of these
32. __________ as a computer program used to fulfill a person's need for regular occupation or
commercial activity.
a) Data Analytics
b) Artificial Intelligence
c) Business Application
33. Which range from application software such as TALLY and wings to high-and applications such
as SAP and Oracle Financials.
a) Accounting Application
b) Compliance Application
c) Management Support Software
d) Logistic Management Software
34. ________ applications help entities to manage their office requirements like word processors,
electronic spreadsheets, presentation software, file sharing systems, etc.
a) Accounting Application
b) Compliance Application
c) Management Support Software
d) Logistic Management Software
35. ________ are applications catering to decision-making needs of the management & they may
be further classified based on the level of management using them.
a) Accounting Management Application
b) Compliance Management Application
c) Management Support Software
d) Logistic Management Software
36. These applications called as ____________ software, which are used by entities to manage
resources optimally and to maximize the three Es i.e. Economy, Efficiency and Effectiveness
of business operations.
a) Enterprise Resource Planning
b) Compliance Application
c) Management Support Software
d) Logistic Management Software
38. __________ is ERP software, which allows an entity to integrate its business processes. ERP stands
for Enterprise Resource Planning, which aims at better utilization of the resources and helps
entity achieve better business performance.
a) Tally
b) SAP
c) MS-Office
39. There are programs that transform data into codes that appear meaningless to anyone who
does not possess the authentication to access the respective system resource or file.
a) Cryptography
b) Passwords
c) PIN
d) Identification Cards
40. User identification by an authentication mechanism with personal characteristics like name, birth
date, employee code, function, designation or a combination of two or more of these can be
used as a _________ boundary access control.
a) Cryptography
b) Passwords
c) PIN
d) Identification Cards
41. ______________ is similar to a password assigned to a user by an institution based on the user
characteristics and encrypted using a cryptographic algorithm.
a) Cryptography
b) PIN
c) Identification Cards
d) None Of these
42. Which technique of boundary control are used to store information required in an authentication
process?
a) Cryptography
b) PIN
c) Identification Cards
d) Passwords
43. Which is defined as a processing of large set of data in a specific way, automatically, without
needing any user intervention?
a) Batch Processing
b) Online Processing
c) Real-time Processing
d) None of These
44. In which type of application data is processed immediately while it is entered, the user usually
only has to wait a short time for a response?
a) Batch Processing
b) Online Processing
c) Real-time Processing
d) None of These
45. These are the standard applications which are not free but are licensed.
46. A new method for getting applications is being used today, where user pays fixed rent for using
the application for agreed terms.
a) Packaged Software
b) Leased Application
c) Custom Built Application
d) None of These
47. In which part, we shall examine controls over the managerial controls that must be performed
to ensure the development, implementation, operation and maintenance of information systems
in a planned and controlled manner in an organization?
a) Managerial Control
b) Application Control
c) Both (a) & (b)
d) Neither (a) nor (b)
48. Which of these include the programmatic routines within application program code & have
objective to ensure that data remains complete, accurate & valid during its input, update &
storage?
a) Managerial Control
b) Application Control
c) Both (a) & (b)
d) Neither (a) nor (b)
49. Auditors are members of the system development team. They assist the team in improving the quality of systems
development forthe specific system they are building and implementing.
a) Concurrent Audit
b) Post-Implementation Audit
c) General Audit
d) None of these
50. Auditors seek to help an organization learn from its experiences in the development of a specific application system.
a) Concurrent Audit
b) Post-Implementation Audit
c) General Audit
d) None of these
51. In which of these system development management control Auditors evaluate systems
development controls overall?
a) Concurrent Audit
b) Post-Implementation Audit
c) General Audit
52. Which are designed to protect the privacy of data and to prevent unauthorized modifications
of data?
a) Cryptography Control
b) Access Control
c) Digital Signature
d) Plastic Card
53. ___________ restrict use of computer system resources to authorized users, limit the actions
authorized users can taker with these resources, and ensure that users obtain only authentic
computer system resources.
a) Cryptography Control
b) Access Control
c) Digital Signature
d) Plastic Card
54. In computer system, Digital Signatures establish the authenticity of persons and prevent the
denial of messages or contracts when data is exchanged electronically.
a) Cryptography Control
b) Access Control
c) Digital Signature
d) Plastic Card
Answers
1 a 11 d 21 a 31 c 41 b 51 c
2 d 12 a 22 d 32 c 42 c 52 a
3 b 13 b 23 c 33 a 43 a 53 b
4 b 14 d 24 a 34 a 44 b 54 b
5 b 15 d 25 a 35 c 45 a 55 b
6 a 16 c 26 c 36 a 46 a
7 a 17 a 27 a 37 a 47 a
8 b 18 b 28 b 38 b 48 b
9 a 19 c 29 d 39 a 49 a
10 b 20 a 30 d 40 b 50 b