MCQOPTIONS
Saved Bookmarks
This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
________ steps ensure the success of the new systems |
| A. | nitial |
| B. | mplementation |
| C. | esting |
| D. | esign |
| Answer» C. esting | |
| 2. |
______ type of feasibility deals with the costs of both development and operations of the system. |
| A. | conomic |
| B. | otivational |
| C. | echnical |
| D. | chedule |
| Answer» B. otivational | |
| 3. |
_____ duplex transmission can flow data in two ways but one direction at a time. |
| A. | ull |
| B. | witch |
| C. | alf |
| D. | ircuit |
| Answer» D. ircuit | |
| 4. |
Which of the following consists of all the hardware and software that a firm needs to achieve its business objectives? |
| A. | atabase technology |
| B. | etworking technology |
| C. | torage technology |
| D. | nformation technology |
| Answer» E. | |
| 5. |
Medium bans channels use ____ type of cables used for transmissions. |
| A. | hielded twisted pair |
| B. | nshielded twisted pair |
| C. | ibre optics |
| D. | o-axial |
| Answer» B. nshielded twisted pair | |
| 6. |
Which type of system tracks day-to-day activities of an organization? |
| A. | ransaction processing system (TPS) |
| B. | anagement information system (MIS) |
| C. | ecision-support system (DSS) |
| D. | xecutive support system (ESS) |
| Answer» B. anagement information system (MIS) | |
| 7. |
_______is (are) the important component(s) of DSS. |
| A. | ialogue Management |
| B. | odel Management |
| C. | odel Management |
| D. | ll the above |
| Answer» E. | |
| 8. |
The system is an orderly grouping of various components linked together to reach ______. |
| A. | profit state |
| B. | specific objective |
| C. | anagers objective |
| D. | arget |
| Answer» C. anagers objective | |
| 9. |
Where, when and how to apply knowledge is referred as __________________. |
| A. | isdom |
| B. | nformation |
| C. | ata |
| D. | nowledge |
| Answer» B. nformation | |
| 10. |
In network while transferring the data, whole is divided in to _____. |
| A. | ackets |
| B. | locks |
| C. | mall units |
| D. | ata |
| Answer» B. locks | |
| 11. |
Determining whether reliable hardware and software required by a proposed system is available or can be acquired by the computer using organization is called___________. |
| A. | ost/benefit analysis |
| B. | conomic feasibility |
| C. | perational feasibility |
| D. | echnical feasibility |
| Answer» E. | |
| 12. |
_____ is a device that makes pen and ink drawings of lines, curves and shapes. |
| A. | ight pen |
| B. | ouse |
| C. | eyboard |
| D. | lotters |
| Answer» E. | |
| 13. |
ESS and GDSS are mostly used by ____________. |
| A. | enior Executive |
| B. | iddle Managers |
| C. | perational Managers |
| D. | ata Workers |
| Answer» B. iddle Managers | |
| 14. |
_______ is small figures that look like a file folder appears in the screen. |
| A. | older |
| B. | cons |
| C. | ile |
| D. | ursor |
| Answer» C. ile | |
| 15. |
In database, table is made of _______. |
| A. | ields and records |
| B. | ata and information |
| C. | ell and borders |
| D. | ext and images |
| Answer» B. ata and information | |
| 16. |
Prototyping replaces unplanned work with _______________. |
| A. | nd-user practices |
| B. | ystem analysis |
| C. | ard-copy analysis |
| D. | lanned iteration |
| Answer» E. | |
| 17. |
Data encryption concept is used for ______ purposes. |
| A. | ata hidden |
| B. | ata display |
| C. | ata processing |
| D. | ata transfer |
| Answer» E. | |
| 18. |
Developing Products, Services, or Process that give a Company a Superior Business Position is termed as _________________. |
| A. | onopoly |
| B. | op Performance |
| C. | roductivity |
| D. | ompetitive Advantage |
| Answer» E. | |
| 19. |
In communication ______ controls the input and output activities |
| A. | oftware |
| B. | ardware |
| C. | ignals |
| D. | ata |
| Answer» B. ardware | |
| 20. |
A task of developing a technical blueprint and specifications for a solution that fulfills the business requirements is undertaken in the following phase of the system development process is _______________. |
| A. | ystem initiation |
| B. | ystem implementation |
| C. | ystem analysis |
| D. | ystem design |
| Answer» E. | |
| 21. |
The ______ is monitors the activities of the computer system |
| A. | rocessor |
| B. | AM |
| C. | OM |
| D. | perating system |
| Answer» E. | |
| 22. |
The person who ensures that systems are developed on time, within budget, and with acceptable quality is a __________________. |
| A. | ystem designer |
| B. | roject manager |
| C. | ystems owner |
| D. | xternal system user |
| Answer» C. ystems owner | |
| 23. |
_____ software describes the programs that are written for users system. |
| A. | ystem |
| B. | pplication |
| C. | eneralized |
| D. | pecific |
| Answer» C. eneralized | |
| 24. |
The system software are also called _______. |
| A. | ackage |
| B. | ystem Software |
| C. | tilities |
| D. | pplication Software |
| Answer» C. tilities | |
| 25. |
Which one of the following is not one of the major dimensions for developing international information systems architecture?. |
| A. | orporate global strategies |
| B. | rganization structure |
| C. | anagement and business processes |
| D. | usiness process reengineering |
| Answer» E. | |
| 26. |
GUI stands for _______ |
| A. | raphical User Interface |
| B. | raphical User Interactive |
| C. | raphical User Integration |
| D. | raphical User Inference |
| Answer» B. raphical User Interactive | |
| 27. |
Restructuring & transforming a business process by a rethinking and redesign done by ____________. |
| A. | IS |
| B. | nd-Users |
| C. | PR Process |
| D. | educed rate of growth in expenses |
| Answer» D. educed rate of growth in expenses | |
| 28. |
A decision support system, which provides support for decision making by a group of persons is __________. |
| A. | SSB |
| B. | he firm's existing MIS |
| C. | DSS |
| D. | ardware components |
| Answer» D. ardware components | |
| 29. |
In the Financial Decision-Making System which of the following is not a transaction processing system input _____________. |
| A. | ash receipts |
| B. | ash returns |
| C. | ash issues |
| D. | arehouse requisition slip |
| Answer» E. | |
| 30. |
Assembly language use _______ technology for programming |
| A. | ymbols |
| B. | ata |
| C. | nemonic codes |
| D. | lpha numeric |
| Answer» D. lpha numeric | |
| 31. |
Hardware and software placed between an organization's internal network and an external network to prevent outsiders from invading private networks best describes a(n) ______________. |
| A. | ntruder detection system |
| B. | irewall |
| C. | yber checkpoint |
| D. | yberwall |
| Answer» C. yber checkpoint | |
| 32. |
Google are using information technology to pursue this generic strategy of ____________. |
| A. | ow-cost leadership |
| B. | roduct differentiation |
| C. | ocus on market niche |
| D. | trengthening customer and supplier intimacy |
| Answer» C. ocus on market niche | |
| 33. |
The ________ has no pre-established decision procedures. |
| A. | nstructured |
| B. | tructured |
| C. | tandard |
| D. | table |
| Answer» B. tructured | |
| 34. |
In very big network the ______device is used to find the effective part in time. |
| A. | outer |
| B. | odem |
| C. | ontrol |
| D. | ub |
| Answer» B. odem | |
| 35. |
Setting up fake Web sites that look like those of legitimate businesses to ask users for confidential personal data is called__________________. |
| A. | hishing |
| B. | harming |
| C. | vil twin |
| D. | pamming |
| Answer» B. harming | |
| 36. |
________ system uses the condition concept for processing. |
| A. | bject based |
| B. | ule based |
| C. | rame based |
| D. | ase based |
| Answer» D. ase based | |
| 37. |
Common threats against information systems come from all of the following factors except ___________________. |
| A. | echnical |
| B. | rganizational |
| C. | overnmental |
| D. | nvironmental |
| Answer» D. nvironmental | |
| 38. |
_________ will produce the periodic financial statements and reports of the business. |
| A. | ash ledger |
| B. | inal Account |
| C. | rail Balance |
| D. | eneral Ledger |
| Answer» E. | |
| 39. |
The main characteristics of Knowledge Process Outsourcing are___________. |
| A. | rocess are not easily codified |
| B. | he agent has to interpret the information |
| C. | he agent is expected to exercise judgement |
| D. | ll of the above |
| Answer» E. | |
| 40. |
________ keeps tracks of data concerning purchase from and payments to suppliers. |
| A. | nventory control |
| B. | ccounts payable |
| C. | ayroll |
| D. | ccounts receivable |
| Answer» C. ayroll | |
| 41. |
The MIS should be developed by____________. |
| A. | he manager |
| B. | he information specialist |
| C. | oth (a) and (b) |
| D. | either (a) or (b) |
| Answer» D. either (a) or (b) | |
| 42. |
A network of organizations used for procuring raw materials, transforming these materials into products, and distributing the products to customers is called _____________________. |
| A. | alue chain |
| B. | upply chain |
| C. | nterprise system |
| D. | rocess chain |
| Answer» C. nterprise system | |
| 43. |
______ type of cables need minimum numbers of repeaters |
| A. | ibre optic |
| B. | o-axial |
| C. | wisted pair |
| D. | ead wire |
| Answer» B. o-axial | |
| 44. |
This type of encryption verifies the origin and content of a message and provides a way to associate a message with a sender is _________________. |
| A. | igital signature |
| B. | ymmetric key encryption |
| C. | ublic key encryption |
| D. | igital certificate |
| Answer» B. ymmetric key encryption | |
| 45. |
_______ type of cables uses the copper wire for data transmission |
| A. | ibre optics |
| B. | o-axial |
| C. | ead wire |
| D. | wisted pair |
| Answer» E. | |
| 46. |
In networks can be classified by their shape are called _____. |
| A. | opology |
| B. | tructure |
| C. | lans |
| D. | rchitecture |
| Answer» B. tructure | |
| 47. |
E-commerce is ubiquitous it reduces __________. |
| A. | arketspace |
| B. | ransaction costs |
| C. | ynamic pricing |
| D. | rice discrimination |
| Answer» C. ynamic pricing | |
| 48. |
In network the different communication are interconnected by using a communication processors called a _____. |
| A. | rotocols |
| B. | ateway |
| C. | ultiplexers |
| D. | outer |
| Answer» C. ultiplexers | |
| 49. |
A method of interacting with customers such as a Web site or a wireless device is called _____________. |
| A. | emand point |
| B. | ustomer service model |
| C. | ales force point |
| D. | ouch point |
| Answer» E. | |
| 50. |
In network the term protocols means ____. |
| A. | rocedures |
| B. | onditions |
| C. | lgorithms |
| D. | ules and regulations |
| Answer» E. | |