MCQOPTIONS
Saved Bookmarks
This section includes 4320 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.
| 3351. |
Programmers refer to the goal of solving a problem as the _____. |
| A. | Input |
| B. | Output |
| C. | Processing |
| D. | Purpose |
| E. | None of the above |
| Answer» C. Processing | |
| 3352. |
The requirements report includes |
| A. | a hierarchy chart showing the top-level modules |
| B. | a list of alternative solutions considered |
| C. | a data flow diagram describing the proposed new system. |
| D. | All of the above |
| E. | None of the above |
| Answer» D. All of the above | |
| 3353. |
A programmer would most likely prepare a |
| A. | general system flowchart |
| B. | specific system flowchart |
| C. | general program flowchart |
| D. | specific program flowchart |
| E. | None of the above |
| Answer» E. None of the above | |
| 3354. |
Coding and testing are done in which manner. |
| A. | ad hoc |
| B. | cross-sectional |
| C. | bottom-up |
| D. | top-down |
| E. | None of the above |
| Answer» E. None of the above | |
| 3355. |
In Prototyping, the following are used |
| A. | screen generators |
| B. | input generators |
| C. | application generators |
| D. | All of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 3356. |
The calculation instructions in an algorithm should state _____. |
| A. | Only what is to be calculated |
| B. | Only how to calculate something |
| C. | Both what is to be calculated and how to calculate it |
| D. | Both what is to be calculated and why is it calculated |
| E. | None of the above |
| Answer» D. Both what is to be calculated and why is it calculated | |
| 3357. |
Which is the best process to access number of records from the same file? |
| A. | a batch job |
| B. | a real-time job |
| C. | an on-line job |
| D. | All of the above |
| E. | None of the above |
| Answer» B. a real-time job | |
| 3358. |
A consideration evaluated by management when planning to convert to a computer system is |
| A. | available software |
| B. | vender maintenance |
| C. | CPU size and speed |
| D. | All of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 3359. |
The strategy for eliciting information regarding the user's requirements is (are) |
| A. | asking questions |
| B. | obtaining information from the present system |
| C. | prototyping |
| D. | All of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 3360. |
A menu-driven system |
| A. | can be used only by computer professionals |
| B. | is required only for on-line systems |
| C. | increases the operator's work |
| D. | presents options and allows the user to make selections |
| E. | None of the above |
| Answer» E. None of the above | |
| 3361. |
During what phase, the requirement analysis is performed? |
| A. | system design phase |
| B. | system development phase |
| C. | system analysis phase |
| D. | system investigation phase |
| E. | None of the above |
| Answer» D. system investigation phase | |
| 3362. |
HIPO |
| A. | is a forms-driven technique in which standard forms are used to document the information |
| B. | consists of a hierarchy chart and an associated set of input/process/ output charts |
| C. | captures the essence of top down decomposition. |
| D. | All of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 3363. |
An Audit trial is |
| A. | a feature of data processing systems that allows for the study of data as processed from step to step; and auditor can then trace all transactions that affect an account. |
| B. | a data item that characterizes an object |
| C. | two or more data items handled as a unit |
| D. | All of the above |
| E. | None of the above |
| Answer» B. a data item that characterizes an object | |
| 3364. |
During the implementation phase, the executive vice-president is primarily concerned with |
| A. | planning |
| B. | organizing |
| C. | directing |
| D. | controlling |
| E. | None of the above |
| Answer» E. None of the above | |
| 3365. |
Which of the following activities, does not belong to the Implementation phase of the SDLC? |
| A. | File conversion |
| B. | Program testing |
| C. | User training |
| D. | All of the above |
| E. | None of the above |
| Answer» C. User training | |
| 3366. |
Which of the following tools is not used for process descriptions? |
| A. | pseudocodes |
| B. | decision tables |
| C. | structured english |
| D. | data dictionaries |
| E. | None of the above |
| Answer» E. None of the above | |
| 3367. |
The imitation of a systems investigation may result from: |
| A. | a manager's formal request |
| B. | a scheduled system's review |
| C. | an analyst's investigation |
| D. | All of the above |
| Answer» E. | |
| 3368. |
Inverted list organization |
| A. | means storing records in contiguous blocks according to a key. |
| B. | Stores records sequentially but uses an index to locate records |
| C. | uses an index for each key type |
| D. | has records placed randomly throughout the file |
| E. | None of the above |
| Answer» D. has records placed randomly throughout the file | |
| 3369. |
The combination of the top-down and the bottom-up approach may be referred to as an |
| A. | integrative approach |
| B. | interpretive approach |
| C. | interactive approach |
| D. | both b and c |
| E. | None of the above |
| Answer» B. interpretive approach | |
| 3370. |
The advantage of Purchase Option is (are) |
| A. | No financing is requird. The risk of system obsolescence is shifted to the lessor |
| B. | the flexibility of modifying the system at will |
| C. | Insurances, maintenance, and other expenses are included in the rental charge |
| D. | All of the above |
| E. | None of the above |
| Answer» C. Insurances, maintenance, and other expenses are included in the rental charge | |
| 3371. |
Management's decision to rent a computer system may be based upon |
| A. | desire to avoid a large one-time payment |
| B. | tax advantages |
| C. | operational flexibility in changing hardware |
| D. | All of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 3372. |
All of the following tools are used for process descriptions except: |
| A. | structured english |
| B. | decision tables |
| C. | pseudocode |
| D. | data dictionaries |
| E. | None of the above |
| Answer» E. None of the above | |
| 3373. |
Which of the following would not be a major deliverable of the structured systems analysis phase. |
| A. | data dictionaries |
| B. | data flow diagrams |
| C. | entity relationship diagrams |
| D. | prototype model |
| E. | None of the above |
| Answer» E. None of the above | |
| 3374. |
A data element in a record, that uniquely distinguishes the record, from all other records, is called |
| A. | response time |
| B. | Key |
| C. | System review |
| D. | test data |
| E. | None of the above |
| Answer» C. System review | |
| 3375. |
A Turnaround document |
| A. | is circulated among all the staff of an organization. |
| B. | is circulated among all the heads of departments of an organization. |
| C. | is output at one point which later comes back as an input |
| D. | All of the above |
| E. | None of the above |
| Answer» D. All of the above | |
| 3376. |
The first step in the problem-solving process is to _____. |
| A. | Plan the algorithm |
| B. | Analyze the problem |
| C. | Desk-check the algorithm |
| D. | Evaluate and modify (if necessary) the program |
| E. | Code the algorithm. |
| Answer» C. Desk-check the algorithm | |
| 3377. |
Checking the quality of software in both simulated and line environments, is known as |
| A. | checking |
| B. | usability |
| C. | validity |
| D. | validation |
| E. | None of the above |
| Answer» E. None of the above | |
| 3378. |
Some firms have created a combination position called |
| A. | manager / analyst |
| B. | programmer / operator |
| C. | analyst / programmer |
| D. | manager / operator |
| E. | None of the above |
| Answer» D. manager / operator | |
| 3379. |
An indexed file offers the facility of a Random file and the access method of a |
| A. | Sequential file |
| B. | indexed file |
| C. | direct access file |
| D. | random access file |
| E. | None of the above |
| Answer» B. indexed file | |
| 3380. |
Most algorithms begin by _____. |
| A. | Displaying the input items |
| B. | Displaying the output items |
| C. | Entering the input items into the computer |
| D. | Entering the output items into the computer |
| E. | Processing the input items by doing some calculations on them |
| Answer» D. Entering the output items into the computer | |
| 3381. |
The processes at the most detailed level of the data flow diagrams are called |
| A. | transform descriptions |
| B. | functional primitives |
| C. | data flows |
| D. | interfaces |
| E. | None of the above |
| Answer» C. data flows | |
| 3382. |
A pseudocode is |
| A. | a protocol used in data communication |
| B. | an easy way to communicate the logic of a program, in English like statements |
| C. | a computer generated random number |
| D. | a machine code |
| E. | None of the above |
| Answer» C. a computer generated random number | |
| 3383. |
Which of the following way(s) the information system and capability are related to each other: |
| A. | improved processing speed |
| B. | increased volume of activities |
| C. | faster retrieval of information |
| D. | All of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 3384. |
System design aid should primarily |
| A. | help analyse both data and activities |
| B. | help in documentation |
| C. | help in programming |
| D. | generate code |
| E. | None of the above |
| Answer» B. help in documentation | |
| 3385. |
Any data that are entered into the computer, for the first time, will go through the process of |
| A. | System testing |
| B. | Sequential testing |
| C. | String testing |
| D. | Validation |
| E. | None of the above |
| Answer» E. None of the above | |
| 3386. |
Mistakes made in the system analysis stage show up in : |
| A. | implementation |
| B. | system design |
| C. | system developments |
| D. | All of the above |
| E. | None of the above |
| Answer» B. system design | |
| 3387. |
During the system study, analysts determine manager's information needs by |
| A. | conducting tours of a nearby computer center |
| B. | asking questions |
| C. | showing samples of computer reports |
| D. | teaching short courses in programming languages |
| E. | None of the above |
| Answer» C. showing samples of computer reports | |
| 3388. |
The combination of the top-down and the bottom-up approach may be referred to as an: |
| A. | interactive approach |
| B. | interpretive approach |
| C. | integrative approach |
| D. | All of the above |
| E. | None of the above |
| Answer» D. All of the above | |
| 3389. |
Advantages of Relational Database Management systems are |
| A. | Flexibility, of relating different logical files |
| B. | Security controls can be more easily implemented. |
| C. | Data independence since it allows the database to grow by adding new attributes and relations. |
| D. | All of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 3390. |
The first step of the implementation phase is |
| A. | select the computer |
| B. | announce the implementation project |
| C. | implementation planning |
| D. | prepare physical facilities |
| E. | None of the above |
| Answer» D. prepare physical facilities | |
| 3391. |
A square symbols |
| A. | defines a source or destination of system data |
| B. | identifies data flow |
| C. | represents a process that transforms incoming data flow(s) into outgoing data flows |
| D. | is a data store-data at rest, or a temporary repository of data |
| E. | None of the above |
| Answer» B. identifies data flow | |
| 3392. |
Environment in systems parlance refers to |
| A. | a sub-system |
| B. | the boundary |
| C. | a part outside the boundaries |
| D. | All of the above |
| E. | None of the above |
| Answer» D. All of the above | |
| 3393. |
When desk-checking an algorithm, you should set up a table that contains _____. |
| A. | One column for each input item |
| B. | One column for each output item |
| C. | One column for each processing item |
| D. | Both a and b |
| E. | a, b, and c |
| Answer» F. | |
| 3394. |
Where one has to process all the data records in a file, the best tile organization is |
| A. | Indexed |
| B. | sequential |
| C. | direct access |
| D. | random access |
| E. | None of the above |
| Answer» C. direct access | |
| 3395. |
The black-box concept: |
| A. | is invoked by describing a system in terms of inputs and outputs, leaving the transformation process a black box. |
| B. | assumes that the black box is independent |
| C. | assumes that inputs and outputs will remain stable |
| D. | All of the above |
| E. | None of the above |
| Answer» F. | |
| 3396. |
A _____ is software that is designed for drawing diagrams of information systems, writing process specifications, and maintaining data dictionaries. |
| A. | System Development Life Cycle |
| B. | CASE tool |
| C. | Phased Conversion |
| D. | Success factors |
| E. | Move of the above. |
| Answer» C. Phased Conversion | |
| 3397. |
Which of the following is an integrated collection of data with minimum redundancy, so that different applications can use the required data. |
| A. | records |
| B. | file |
| C. | DBMS |
| D. | schema |
| E. | None of the above |
| Answer» D. schema | |
| 3398. |
An open rectangle |
| A. | defines a source or destination of system data |
| B. | identifies data flow |
| C. | represents a process that transforms incoming data flow(s) into outgoing data flows |
| D. | is a data store-data at rest, or a temporary repository of data |
| E. | None of the above |
| Answer» E. None of the above | |
| 3399. |
The feasibilities studied in preliminary investigation is (are): |
| A. | technical feasibility |
| B. | economic feasibility |
| C. | operational feasibility |
| D. | All of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 3400. |
Branch mark programs are best characterized as |
| A. | Simulator programs |
| B. | Hallmarking |
| C. | Actual system programs |
| D. | Vendor software for applications |
| E. | None of the above |
| Answer» C. Actual system programs | |