Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

________________ monitors and control industrial processes.

A. ransaction Processing Systems
B. rocess Control Systems
C. nterprise Collaboration Systems
D. anagement Information Systems
Answer» C. nterprise Collaboration Systems
2.

POS stands for ____.

A. oint Of Structure
B. oint Of Sale
C. roduct Of Structure
D. roduct Of Sale
Answer» C. roduct Of Structure
3.

Sales and inventory processing and accounting systems are examples of __________ systems.

A. ransaction Processing
B. rocess Control
C. nterprise Collaboration
D. anagement Information
Answer» B. rocess Control
4.

____ type of processing, data is processed immediately after a transaction occurs.

A. atch
B. arallel
C. equence
D. eal time
Answer» E.
5.

Information System specialists also called as ______.

A. ser consultant
B. ser friendly
C. ser expert
D. ser manager
Answer» B. ser friendly
6.

The results of "what-if" questions asked repeatedly to determine the impact of changes in one or more factors on the outcomes are called__________________.

A. ata modeling
B. orecasting
C. lassification clusters
D. ensitivity analysis
Answer» E.
7.

ATG in network stands for ____.

A. dvanced Technology Groups
B. dvanced Technical Groups
C. dvanced Talent Groups
D. dvanced Testing Groups
Answer» B. dvanced Technical Groups
8.

A type of decision in which there may be several "right" answers and no precise way to get a right answer is ____________________.

A. tructured decision
B. nstructured decision
C. ecurring decision
D. onrecurring decision
Answer» C. ecurring decision
9.

Program testing concept use ________ approaches

A. equence
B. arallel
C. op-down
D. ottom-up
Answer» D. ottom-up
10.

Decision support system involves all of the following types of analytical modeling activities except?

A. hat-if analysis
B. ensitivity analysis
C. oal-seeking analysis
D. euristics
Answer» E.
11.

RFP stands for ______.

A. equest for Proposal
B. equest for Process
C. equest for Product
D. equest for Prediction
Answer» B. equest for Process
12.

Which one of the following is used for evaluating credit risks?

A. irtual Reality
B. eural Network
C. uzzy logic
D. one of the above
Answer» C. uzzy logic
13.

_____ leader who commands both positional and personal influence.

A. eam
B. roject
C. ormal
D. nformal
Answer» D. nformal
14.

A _____ types of processor design uses a group of instruction processors to execute program at the same time.

A. oupled
B. ultilevel
C. arallel
D. ingle
Answer» D. ingle
15.

In which of the following types of analysis, the goal is to find the optimum value for one or more target variables, given certain constraints?

A. hat if analysis
B. ptimization
C. oal seeking analysis
D. one of these
Answer» C. oal seeking analysis
16.

The evolution of Electronic data processing_______

A. 951-60
B. 961-70
C. 981-90
D. 971
Answer» B. 961-70
17.

________ type of testing ensures the system is free of errors and is ready to be placed into operation.

A. udit
B. eneral
C. echnical
D. ata
Answer» B. eneral
18.

GB in memory stands for _____.

A. iga Bytes
B. iga Bits
C. if Bits
D. if Bytes
Answer» B. iga Bits
19.

In _____ organization, authority is delegated down the hierarchy.

A. raditional
B. lassical
C. perational
D. bsolute
Answer» C. perational
20.

PDA means ______.

A. ocket Data Assistants
B. ersonal Data Assistants
C. ocket Digital Assistants
D. ersonal Digital Assistants
Answer» E.
21.

The emerging class of applications focuses on personalized decision support, modeling, information retrieval, data warehousing, what-if scenarios and reporting is called __________________.

A. ecision Support Trends
B. ecision Support History
C. ecision Support models
D. ecision Support class
Answer» B. ecision Support History
22.

In punched card system, holes are punched by device are called ______.

A. ole
B. ey stroke
C. ey punch
D. canning
Answer» D. canning
23.

Which of the following level of managers develop short and medium range plans, schedules, and budgets and specify the policies, procedures, and business objectives for their sub units of the company?

A. trategic
B. actical
C. perational
D. ront Line
Answer» C. perational
24.

The analysis and design of application systems are the responsibility of a ___________.

A. omputer Operator
B. rogrammer
C. ystem Analyst
D. ata entry operator
Answer» D. ata entry operator
25.

Critical information for top management is provided by ____ information system.

A. xpert
B. xecutive
C. ecision
D. anagerial
Answer» C. ecision
26.

Electronic Filing, Voice Mail are the reponsibilities of _______________.

A. ffice Automation System
B. ransaction Processing System
C. xpert System
D. xecutive Support System
Answer» B. ransaction Processing System
27.

In database handling ____ reports used by software for data.

A. ondition
B. pecific
C. eriodic
D. emand
Answer» D. emand
28.

ECS means ___________________.

A. nterprise Collaboration System
B. conomical Calculation Service
C. nterprise Communication System
D. conomical Communication Service
Answer» B. conomical Calculation Service
29.

In a firm the reports are generated under condition are called _____ reports.

A. xception
B. ondition
C. tandard
D. eriodic
Answer» B. ondition
30.

Managers can receive information from _____ that supports their decision making systems.

A. orkstations
B. ersonal system
C. eports
D. ile
Answer» B. ersonal system
31.

___ models to analysis a problem and provides possible solution for management evaluation

A. ecision
B. tandard
C. tructural
D. eriodic
Answer» B. tandard
32.

The most advanced graphics software in any system used by management is normally found in __________________.

A. PS
B. SS
C. ntranets
D. nterprise systems
Answer» C. ntranets
33.

The operating decisions resulting actions usually cover ____ periods.

A. edium
B. hort time
C. ver an year
D. ong time
Answer» C. ver an year
34.

An ________________ system has a stored knowledge base and an inference engine.

A. xpert
B. enters
C. ontrol
D. IS
Answer» B. enters
35.

In any real time system ___ factors are termed as boundaries of the system.

A. tatement
B. onditions
C. locks
D. imit
Answer» E.
36.

MIS can provide ______________.

A. ast information
B. resent information
C. uture information
D. ll of the above
Answer» E.
37.

________________ is a program that, unknown to the user, contains instructions that exploit a known vulnerability in some software.

A. acking
B. omputer Crime
C. rojan Horse
D. niffer
Answer» D. niffer
38.

In general the information system can also describe in terms of ____.

A. perations
B. unctions
C. vents
D. asks
Answer» C. vents
39.

_____________________ is unauthorized use, access, modification, and destruction of hardware, software, data, or network resources

A. acking
B. omputer Crime
C. poofing
D. niffer
Answer» C. poofing
40.

In overall business side the MIS planning initiates from business _____.

A. ask
B. vent
C. lanning
D. perations
Answer» D. perations
41.

An instruction in a computer program that triggers a malicious act is called as ____________.

A. ogic Bombs
B. acket Sniffer
C. acking
D. omputer Crime
Answer» B. acket Sniffer
42.

___ sub system covers granting of credit and cost management

A. ccounting
B. urchase
C. ersonnel
D. ales
Answer» B. urchase
43.

_____________ is a distinct program that can run unaided.

A. orm
B. irus
C. niffer
D. poofing
Answer» B. irus
44.

_______ takes responsibility and keeps track of progress in MIS design. Development and implementation.

A. ime remainder
B. eriods
C. llocation
D. cheduling
Answer» E.
45.

________________ is a program code that cannot work without being inserted into another program.

A. orm
B. irus
C. niffer
D. poofing
Answer» C. niffer
46.

______ type of printer function like a photocopying

A. nk-Jet
B. ot matrix
C. erographic
D. aser
Answer» D. aser
47.

______ type of printer is good for text, but not for images

A. aisy wheel
B. ot matrix
C. aser
D. nk-Jet
Answer» B. ot matrix
48.

The _____ most common form of visual output for user interface

A. -data
B. rintout
C. ail data
D. can data
Answer» C. ail data
49.

The growth of corporate intranets, extranets, as well as the web, has accelerated the development and use of executive class information delivery and decision support software tools by lower levels of management and by individuals and teams of business professionals. This dramatic expansion has opened the door to the use of which of the following tool?

A. usiness Intelligence(BI)
B. usiness Knowledge (BK)
C. usiness Ideas (BI)
D. usiness Intelligent(BI)
Answer» B. usiness Knowledge (BK)
50.

________________ is obsessive use of a computer or unauthorized access and use of computer systems.

A. acking
B. omputer Crime
C. rojan Horse
D. acket Sniffer
Answer» B. omputer Crime