1. During software development which factor is most crucial?
Correct : A. people
2. Upper CASE tools are used
Correct : A. for developing dfd\s
3. Identifying customers and markets using data on demographics, markets, consumer behaviour, and trends is
an example of:
Correct : B. knowledge-level sales and marketing information system.
4. ______________. focuses on planning, policies, and procedures regarding the use of corporate data and
information.
Correct : A. cio
5. The extent to which technology permeates an area or department is called ______________.
Correct : A. technology diffusion
6. ______________ is any business-related exchange such as payments to employees, sales to customers, or
payments to suppliers.
Correct : C. a transaction
7. ______________ is software programs that were developed for a general market and that can be purchased in
a store.
Correct : B. off-the-shelf software
8. With the ______________ form of data processing, each transaction is processed immediately.
Correct : A. oltp
9. In any of the system ______________ resource is consider as people resources.
Correct : A. end user.
10. ______________ information system that express a fundamental concept and activities of information
systems.
Correct : A. model.
11. In general the information system can also describe in terms of ______________.
Correct : B. functions.
12. ______________ is the people who develop and operate the information systems.
Correct : A. is specialists.
13. ______________ is a collection of single-application software packages in a bundle designed to work
similarly so that once you learn the basics for one application, the other applications are easy to learn and use.
Correct : B. software suite
14. Information systems that support the firm in its interaction with its environment are said to be performing
within the ______________.
Correct : C. enterprise sphere of influence
15. The current major stage in the business use of IS is oriented towards ______________.
Correct : B. gaining competitive advantage
16. ______________ is the process of converting a message into a secret code and changing the encoded
message back to regular text.
Correct : D. cryptography
17. Problems that are routine and have well-defined relationships are called ______________.
Correct : A. structured problems
18. The four key questions related to fairness in information use are ______________
Correct : D. knowledge, accuracy, timing, and permission
19. Acquiring, training and retaining good network ______________ should be a top priority.
Correct : C. administrator.
20. Primary storage device such as semiconductor memory chips are called ______________.
Correct : C. direct access
21. In network the different communication are interconnected by using a communication processors called a
______________.
Correct : B. gateway.
22. ______________ is single user workstation that provide presenttion services,database services and
connectivity
Correct : B. client
23. GUI stands for ______________
Correct : A. graphical user interface
24. FIFO stands for ______________
Correct : B. first in first out
25. A ______________ is a binary event representing a signal change from positive to negative
Correct : B. band.
26. Data encryption concept is used for ______________ purposes.
Correct : D. data transfer
27. The ______________ is monitors the activities of the computer system
Correct : D. operating system.
28. EDI stands for:
Correct : A. electronic data interchanqe
29. Accounting, finance, marketing, and human resources are known as
Correct : B. functional business areas
30. Relational calculus is a
Correct : B. non- procedural language.
31. SDLC stands for?
Correct : D. system development life cycle
32. A combination of a MIS and DSS called ______________ which helps top managers make decisions.
Correct : B. eis
33. The most creative and challenging phase of system life cycle is
Correct : C. design
34. The most important feature of spiral model is
Correct : B. risk management
35. Which of these items is a major component of today's IT infrastructure?
Correct : D. all of me above
36. ______________ converts ciphertext back into plaintext.
Correct : C. decryption
37. A computer security protocol for logging in would be an example of the component of an information
system:
Correct : D. procedure
38. Relational calculus is a
Correct : B. None- Procedural language.
39. The view of total database content is
Correct : A. Conceptual view
40. DML is provided for
Correct : C. Manipulation &processing of database.
41. ODBC stands for
Correct : D. Open Database Connectivity.
42. Architecture of the database can be viewed as
Correct : C. Three levels.
43. The database schema is written in
Correct : C. DDL
44. In the architecture of a database system external level is the
Correct : D. View level.
45. In a Hierarchical level model records are organized as
Correct : D. Tree.
46. The language used in application programs to request data from the DBMS is referred to as the
Correct : A. DML
47. The DBMS language component which can be embedded in a program is
Correct : B. The data manipulation language(DML)
48. Which one of the following statement is false?
Correct : B. Data elements in the database can be modified by changing the data dictionary.
49. An advantage of the database management approach is
Correct : C. Data is integrated and can be accessed by multiple programs.
50. A DBMS query language is designed to
Correct : D. All of the above.
51. Key to represent relationship between tables is called
Correct : C. Foreign Key
52. The full form of DDL
Correct : C. Data Definition Language
53. Which database level is closest to the users?
Correct : A. External
54. Hierarchical model is also called
Correct : A. Tree structure
55. Information system that monitor the elementary activities and transactions of the organizations
are
Correct : A. Management-level system
56. Information systems that monitor the elementary activities and transactions of the
organizations are:
Correct : A. Management-level system
57. Projections and responses to queries are information output characteristics associated with a (n)
Correct : C. ESS
58. Summary transaction data, high-volume data, and simple models are information inputs
characteristic of a (n):
Correct : B. MIS
59. Which of the following individuals typically have less formal, advanced educational degrees and
tend to process rather than create information?
Correct : D. Data workers
60. Management information systems usually:
Correct : A. Serve managers interested in weekly, monthly, and yearly results, not day-to-day activities.
61. Decision support systems usually:
Correct : B. Help managers make decisions that are unique, rapidly changing, and not easily specified in advance.
62. Identifying customers and markets using data on demographics, markets, consumer behavior, and trends is an example of a (n):
Correct : B. Knowledge-level sales and marketing information system.
63. Deciding where to locate new production facilities is a(n) example of a manufacturing and
production information system operating at the:
Correct : D. Knowledge level
64. Preparing short-term budgets is an example of a finance and accounting information system
operating at the:
Correct : B. Management level
65. Tracking employee training, skills, and performance appraisals is an example of a human
resource information system operating at the:
Correct : A. Operational level
66. Assembling a product, identifying customers and hiring employees are :
Correct : C. Business processes
67. Which of the followwing is a network of facilities for procuring materials, transforming raw materials
inti intermediate and finished products, and distributing the finished products to customers?
Correct : C. Supply Chain
68. Information systems can facilitate supply chain management by:
Correct : D. Doing all of the above
69. Enterprise systems support
Correct : D. All of the above
70. A computer security protocol for logging in would be an example of the __________________
component of an information system.
Correct : D. Procedure
71. Customer numbers and their names would be an example of the ______________ component of an
order management information system.
Correct : C. Data
72. The quality of your ___________________is a large part of the quality of your information system.
Correct : B. Time
73. Which of the following is not a characteristic of good information?
Correct : A. Interchangeability
74. If you are a _____________ recipients of sensitive information, such as might be overheard or contained in a misdirected email, this would not be illegal, but might be unethical to use it.
Correct : B. Passive
75. A human order taker can be bypassed when using a (n) ____________________
Correct : C. Transaction processing system
76. Data mining cannot be done if
Correct : A. Operational data has not been archived
77. Batch processing is preffered over on – line transaction processing when
Correct : D. A large number of queries are to be processed
78. On-line transaction processing is used when 1. It is required to answer random queries 2. It is required to ensure correct processing 3. All files are available on-line 4. All files are stored using hard disk
Correct : B. i,iii
79. Which is not a domain of Artificial Intelligence?
Correct : D. None of the above
80. Which one of the following is used for evaluating credit risks?
Correct : B. Neural Network
81. Which computer based model is developed after human brain?
Correct : B. Neural Network
82. Knowledge based system supports _________________
Correct : D. All of the above
83. Which of the system uses Multidimensional data analysis?
Correct : A. DSS
84. Cybernetic system is the one which is
Correct : D. All of the above
85. Which of the following level of managers develop short-and medium-range plans, schedules, and budgets and specify the policies, procedures, and business objectives for their sub – units of the company?
Correct : B. Tactical
86. Information that is outdated, inaccurate, or hard to understand would be very meaningful, useful, or valuable to you or other business professionals.
Correct : A. True
87. Information has three dimensions. There are
Correct : B. Time, content and form
88. According to your text book, the emerging class of applications focuses on personalized decision
support, modeling, information retrieval, data warehousing, what-if scenarios and reporting is called :
Correct : A. Decision Support Trends
89. The growth of corporate intranets, extranets, as well as the web, has accelerated the development and use of “executive class” information delivery and decision support software tools by lower levels of management and by individuals and teams of business professionals. This dramatic expansion has opened the door to the use of which of the following tool?
Correct : A. Business Intelligence(BI)
90. According to your text book, the Decision support systems use all of the following EXCEPT :
Correct : C. Online transaction processing
91. _________________ were the original type of information system developed to support managerial decision making. An MIS produces information.
Correct : A. Management information systems
92. Which of the following involves analyzing complex relationships among thousands or even millions of data items stored in data marts, data warehouses, and other multidimensional databases to discover patterns, trends, and exception conditions?
Correct : B. OLAP
93. _______________represent complex data using interactive three-dimensional graphical forms such
as charts, graphs and maps.
Correct : D. Data visualization systems
94. Another name of goal seeking analysis is :
Correct : B. How can
95. Decision support system involves all of the following types of analytical modeling activities except?
Correct : D. Heuristics
96. In which of the following types of analysis, the value of only one variable is changed repeatedly, and
the resulting changes on other variables are observed.
Correct : B. sensitivity analysis
97. In which of the following types of analysis, the goal is to find the optimum value for one or more
target variables, given certain constraints?
Correct : B. optimization
98. ________________ is one of the most common and useful types of data mining for marketing. The purpose of market basket analysis is to determine what products customers purchase together with other products.
Correct : A. Market Box Analysis (MBA)
99. The first goal of executive information system is to provide top executives with immediate and easy access to information about a firm’s______________,that is,key factors that are critical to information about a firm’s that is key factors that are critical to accomplishing an organizations strategic objectives.
Correct : A. Critical success factors (CSFs)
100. “ A user checks his email , looks up the current company stock price, checks his available vacation days, and receives an order from a customer-all from the browser on his desktop. That is the next – generation intranet,also known as: