Explore topic-wise MCQs in Bachelor of Computer Applications (BCA).

This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Computer Applications (BCA) knowledge and support exam preparation. Choose a topic below to get started.

351.

The back bone of any organization is

A. information
B. employee
C. management
D. capital
Answer» B. employee
352.

The information of MIS comes from the

A. internal source
B. external source
C. both internal and external source
D. none of the above
Answer» D. none of the above
353.

______________ converts ciphertext back into plaintext.

A. encryption
B. a firewall
C. decryption
D. an encoder
Answer» D. an encoder
354.

A computer security protocol for logging in would be an example of the component of an information system:

A. software
B. hardware
C. data
D. procedure
Answer» E.
355.

Which of these items is a major component of today's IT infrastructure?

A. data management technology
B. networking
C. technology services
D. all of me above
Answer» E.
356.

The most important feature of spiral model is

A. requirement analysis
B. risk management
C. quality management
D. configuration management.
Answer» C. quality management
357.

The most creative and challenging phase of system life cycle is

A. feasibility study
B. maintenance
C. design
D. none of the above
Answer» D. none of the above
358.

A combination of a MIS and DSS called ______________ which helps top managers make decisions.

A. gis
B. eis
C. epi
D. cam
Answer» C. epi
359.

Accounting, finance, marketing, and human resources are known as

A. executive information systems
B. functional business areas
C. geographic information system
D. local information system
Answer» C. geographic information system
360.

Relational calculus is a

A. procedural language.
B. non- procedural language.
C. data definition language.
D. high level language.
Answer» C. data definition language.
361.

EDI stands for:

A. electronic data interchanqe
B. electrical data interchange
C. work flow automation software
D. enhanced data interchange
Answer» B. electrical data interchange
362.

The ______________ is monitors the activities of the computer system

A. processor.
B. ram.
C. rom
D. operating system.
Answer» E.
363.

SDLC stands for?

A. software design life cycle
B. software development life cycle
C. system design life cycle
D. system development life cycle
Answer» E.
364.

Data encryption concept is used for ______________ purposes.

A. data hidden
B. data display
C. data processing
D. data transfer
Answer» E.
365.

______________ is single user workstation that provide presenttion services,database services and connectivity

A. server
B. client
C. system
D. cpu
Answer» C. system
366.

A ______________ is a binary event representing a signal change from positive to negative

A. bit
B. band.
C. bandwidth.
D. frequency.
Answer» C. bandwidth.
367.

FIFO stands for ______________

A. first interactive first out
B. first in first out
C. first invented first out
D. first interface first out.
Answer» C. first invented first out
368.

GUI stands for ______________

A. graphical user interface
B. graphical user interactive
C. graphical user integration
D. graphical user inference
Answer» B. graphical user interactive
369.

In network the different communication are interconnected by using a communication processors called a ______________.

A. protocols.
B. gateway.
C. multiplexers.
D. router
Answer» C. multiplexers.
370.

Primary storage device such as semiconductor memory chips are called ______________.

A. parallel
B. sequential
C. direct access
D. binary access
Answer» D. binary access
371.

Acquiring, training and retaining good network ______________ should be a top priority.

A. data entry.
B. lab in charge.
C. administrator.
D. system tester.
Answer» D. system tester.
372.

The four key questions related to fairness in information use are ______________

A. cost, timing, content, and frequency
B. notice, consent, accuracy, and authorization
C. knowledge, control, notice, and consent
D. knowledge, accuracy, timing, and permission
Answer» E.
373.

Problems that are routine and have well-defined relationships are called ______________.

A. structured problems
B. programmed decisions
C. simple problems
D. heuristics
Answer» B. programmed decisions
374.

______________ is the process of converting a message into a secret code and changing the encoded message back to regular text.

A. encryption
B. fraud
C. encoding
D. cryptography
Answer» E.
375.

The current major stage in the business use of IS is oriented towards ______________.

A. cost reduction and productivity
B. gaining competitive advantage
C. strategic advantage and costs
D. improved customer relationship management
Answer» C. strategic advantage and costs
376.

Information systems that support the firm in its interaction with its environment are said to be performing within the ______________.

A. workgroup sphere of influence
B. global sphere of influence
C. enterprise sphere of influence
D. individual sphere of influence
Answer» D. individual sphere of influence
377.

______________ is a collection of single-application software packages in a bundle designed to work similarly so that once you learn the basics for one application, the other applications are easy to learn and use.

A. bundled software
B. software suite
C. productivity applications
D. general purpose software
Answer» C. productivity applications
378.

______________ is the people who develop and operate the information systems.

A. is specialists.
B. is analyst.
C. is experts.
D. is data entry.
Answer» B. is analyst.
379.

In general the information system can also describe in terms of ______________.

A. operations.
B. functions.
C. events .
D. tasks.
Answer» C. events .
380.

______________ information system that express a fundamental concept and activities of information systems.

A. model.
B. style.
C. standard.
D. logic.
Answer» B. style.
381.

With the ______________ form of data processing, each transaction is processed immediately.

A. oltp
B. batch processing
C. active processing
D. automated transaction processing
Answer» B. batch processing
382.

______________ is software programs that were developed for a general market and that can be purchased in a store.

A. proprietary software
B. off-the-shelf software
C. contract software
D. application software
Answer» C. contract software
383.

In any of the system ______________ resource is consider as people resources.

A. end user.
B. hardware.
C. data.
D. software.
Answer» B. hardware.
384.

______________ is any business-related exchange such as payments to employees, sales to customers, or payments to suppliers.

A. data
B. e-commerce
C. a transaction
D. input
Answer» D. input
385.

The extent to which technology permeates an area or department is called ______________.

A. technology diffusion
B. technology infusion
C. technology collusion
D. technology fusion
Answer» B. technology infusion
386.

______________. focuses on planning, policies, and procedures regarding the use of corporate data and information.

A. cio
B. systems analyst
C. database administrator
D. system operator
Answer» B. systems analyst
387.

Identifying customers and markets using data on demographics, markets, consumer behaviour, and trends is an example of:

A. operational-level sales and marketing information system.
B. knowledge-level sales and marketing information system.
C. management-level sales and marketing information system.
D. strategic-level sales and marketing information system
Answer» C. management-level sales and marketing information system.
388.

Upper CASE tools are used

A. for developing dfd\s
B. for screen design
C. during all phases of system analysis and design life cycle
D. for converting structured english procedures to source code into a language such as c
Answer» B. for screen design
389.

During software development which factor is most crucial?

A. people
B. process
C. product
D. project
Answer» B. process
390.

Projections and responses to queries are Information output characteristics associated with:

A. dss
B. mis
C. ess
D. tps
Answer» D. tps
391.

The accounting system is ______________ whereas the demand forecasting system is ______________.

A. deterministic, probabilistic
B. probabilistic, deterministic
C. open, close
D. close, open
Answer» B. probabilistic, deterministic
392.

Knowledge based system supports, ______________

A. knowledge of creation.
B. knowledge of support.
C. knowledge of dissemination.
D. all of the above.
Answer» E.
393.

Data mining cannot be done if ______________

A. operational data has not been archived
B. earlier management decisions are not available
C. the organisation is large
D. all processing had been only batch processing
Answer» B. earlier management decisions are not available
394.

The Management information System receives input from the:

A. eis.
B. es.
C. dss.
D. tps
Answer» E.
395.

Materials into intermediate and finished products, and distributing the finished products to customers?

A. production chain
B. primary chain
C. supply chain
D. distribution chain
Answer» D. distribution chain
396.

BPR stands for ______________

A. business process reengineering
B. business process reconstruction
C. business program reengineering
D. business problen report
Answer» B. business process reconstruction
397.

Decision varies as to the ______________ structure within each level of management.

A. degree.
B. data.
C. situation.
D. order.
Answer» B. data.
398.

The project team is composed of the system professional are directly responsible for ______________ the system

A. testing
B. building
C. deleting
D. innovating
Answer» C. deleting
399.

______________ gives the computer the ability to make suggestions and act like an expert in a particular field.

A. decision support systems
B. virtual reality systems
C. management information systems
D. expert systems
Answer» E.
400.

______________ is a form of transaction processing in which all transactions are collected into a group and processed together.

A. accumulation processing
B. batch processing
C. data collection
D. data collection
Answer» C. data collection