Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

*$_In communication ______ that controls the input and output activities?

A. Software
B. Hardware
C. Signals
D. Data
Answer» B. Hardware
2.

*$_In database, table is made of _______.?

A. fields and records
B. data and information
C. cell and borders
D. text and images
Answer» B. data and information
3.

*$_Determining whether reliable hardware and software required by a proposed system is available or can be acquired by the computer using organization is called___________.?

A. Cost/benefit analysis
B. Economic feasibility
C. Operational feasibility
D. Technical feasibility
Answer» E.
4.

*$______ duplex transmission can flow data in two ways but one direction at a time.?

A. Full
B. Switch
C. Half
D. Circuit
Answer» D. Circuit
5.

*$________is (are) the important component(s) of DSS.?

A. Dialogue Management
B. Model Management
C. Model Management
D. All the above
Answer» E.
6.

*/*_Tracking employee training, skills, and performance appraisal is an example of a human resource information system operating at the ____________________.?

A. Operational level
B. Management level
C. Knowledge level
D. Strategic level
Answer» B. Management level
7.

*/*_____ means that information must reach the recipients within the prescribe timerframe.?

A. Duration
B. Period
C. Timeliness
D. Time
Answer» D. Time
8.

*/*_In which of the following functions of MIS reports are generated based on the enterprise's need ______________.?

A. Planning
B. Prediction
C. Data Processing
D. Data storage
Answer» B. Prediction
9.

*/*______ is the fact that are properly arranged, classified and organized.?

A. Data
B. Events
C. Statements
D. Information
Answer» E.
10.

*/*_The Management information System receives input from the _____________.?

A. EIS
B. ES
C. DSS
D. TPS
Answer» E.
11.

*/*_The emerging class of applications focuses on personalized decision support, modeling, information retrieval, data warehousing, what-if scenarios and reporting is called __________________.?

A. Decision Support Trends
B. Decision Support History
C. Decision Support models
D. Decision Support class
Answer» B. Decision Support History
12.

*/*_In which of the following types of analysis, the goal is to find the optimum value for one or more target variables, given certain constraints??

A. what if analysis
B. optimization
C. Goal seeking analysis
D. None of these
Answer» C. Goal seeking analysis
13.

*/*_Which one of the following is used for evaluating credit risks??

A. Virtual Reality
B. Neural Network
C. Fuzzy logic
D. None of the above
Answer» C. Fuzzy logic
14.

*/*_GB in memory stands for _____.?

A. Giga Bytes
B. Giga Bits
C. Gif Bits
D. Gif Bytes
Answer» B. Giga Bits
15.

*/*_Program testing concept use ________ approaches?

A. Sequence
B. Parallel
C. top-down
D. bottom-up
Answer» D. bottom-up
16.

*/*_In database handling ____ reports used by software for data.?

A. Condition
B. Specific
C. Periodic
D. Demand
Answer» D. Demand
17.

*/*_The analysis and design of application systems are the responsibility of a ___________.?

A. Computer Operator
B. Programmer
C. System Analyst
D. Data entry operator
Answer» D. Data entry operator
18.

*/*____ models to analysis a problem and provides possible solution for management evaluation?

A. Decision
B. Standard
C. Structural
D. Periodic
Answer» B. Standard
19.

*/*_An ________________ system has a stored knowledge base and an inference engine.?

A. Expert
B. Centers
C. Control
D. MIS
Answer» B. Centers
20.

*/*_In overall business side the MIS planning initiates from business _____.?

A. Task
B. Event
C. Planning
D. Operations
Answer» D. Operations
21.

*/*_________________ is a program that, unknown to the user, contains instructions that exploit a known vulnerability in some software.?

A. Hacking
B. Computer Crime
C. Trojan Horse
D. Sniffer
Answer» D. Sniffer
22.

*/*_________________ is obsessive use of a computer or unauthorized access and use of computer systems.?

A. Hacking
B. Computer Crime
C. Trojan Horse
D. Packet Sniffer
Answer» B. Computer Crime
23.

*/*______________ is a distinct program that can run unaided.?

A. Worm
B. Virus
C. Sniffer
D. Spoofing
Answer» B. Virus
24.

*/*_____ information system that express a fundamental concept and activities of information systems.?

A. Model
B. Style
C. Standard
D. Logic
Answer» B. Style
25.

*/*_A computer security protocol for logging in would be an example of the component of an information system ____________.?

A. Software
B. Hardware
C. Data
D. Procedure
Answer» E.
26.

*/*_The computer system uses _____ forms of data for usage.?

A. Symbols
B. Analog
C. Digital
D. Text
Answer» D. Text
27.

*/*____________ is the process of defining the current problem, determining why a new system is needed, identifying the objectives of the proposed system:?

A. Feasibility analysis
B. System Analysis
C. System definition
D. System requirements
Answer» D. System requirements
28.

*/*_____ type of data uses pictures and graphics shapes for usage.?

A. Text
B. Image
C. Alpha numeric
D. Symbols
Answer» C. Alpha numeric
29.

*/*_Which is not a domain of Artificial Intelligence??

A. Intelligent Agents
B. Expert System
C. None of the above
D. Both A & B
Answer» E.
30.

*/*_POS stands for ____.?

A. Point Of Structure
B. Point Of Sale
C. Product Of Structure
D. Product Of Sale
Answer» C. Product Of Structure
31.

*/*_Petroleum refining, power generation and steel production systems are example of ____________ systems.?

A. Transaction Processing
B. Process Control
C. Enterprise Collaboration
D. Management Information
Answer» C. Enterprise Collaboration
32.

*/*_The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver is called _________________.?

A. Demodulation
B. Filtering
C. Encryption
D. Stateful inspection
Answer» D. Stateful inspection
33.

*/*_____ system that allocate costs to users based on the information services rendered?

A. change complete
B. change back
C. charge complete
D. charge back
Answer» E.
34.

*/*_Decision trees could be represented in different ways such as ____________________.?

A. Bottom to top
B. Left to right
C. Top to bottom
D. All of the above
Answer» E.
35.

*/*_____ information system planning us the last stage of the planning process.?

A. Tactical
B. Strategic
C. Architecture
D. Processed
Answer» B. Strategic
36.

*/*_The flow of information through MIS is ______________.?

A. Need dependent
B. Organization dependent
C. Information dependent
D. Management dependent
Answer» B. Organization dependent
37.

*/*_________ language use for artificial intelligence and symbolic applications?

A. LISP
B. C
C. PROLOG
D. PASCAL
Answer» B. C
38.

*/*_The main characteristics of Knowledge Process Outsourcing are___________.?

A. Process are not easily codified
B. The agent has to interpret the information
C. The agent is expected to exercise judgement
D. All of the above
Answer» E.
39.

*/*_FIFO stands for ______.?

A. First Interactive First Out
B. First In First Out
C. First Invented First Out
D. First Interface First Out
Answer» C. First Invented First Out
40.

*/*_Setting up fake Web sites that look like those of legitimate businesses to ask users for confidential personal data is called__________________.?

A. Phishing
B. Pharming
C. Evil twin
D. Spamming
Answer» B. Pharming
41.

*/*_Which one of the following is not one of the major dimensions for developing international information systems architecture?.?

A. Corporate global strategies
B. Organization structure
C. Management and business processes
D. Business process reengineering
Answer» E.
42.

*/*_______ type of cables need minimum numbers of repeaters?

A. Fibre optic
B. Co-axial
C. Twisted pair
D. Lead wire
Answer» B. Co-axial
43.

*/*_E-commerce is ubiquitous it reduces __________.?

A. Marketspace
B. Transaction costs
C. Dynamic pricing
D. Price discrimination
Answer» C. Dynamic pricing
44.

*/*_In network the term protocols means ____.?

A. Procedures
B. Conditions
C. Algorithms
D. Rules and regulations
Answer» E.
45.

*/*_____ system is concerned with the way information is used for purpose of control and applies technologies.?

A. Feedback
B. Interview
C. Interaction
D. Conference
Answer» B. Interview
46.

*/*_A combination of a MIS and DSS called _____________ which helps top managers make decisions.?

A. GIS
B. EIS
C. EPI
D. CAM
Answer» C. EPI
47.

*/*_The information generated at regular intervals is a _____ information.?

A. depositing
B. saving
C. recurring
D. collecting
Answer» D. collecting
48.

*/*_Management information systems usually______________.?

A. Serve managers interested in weekly, monthly, and yearly results, not day-to-day activities
B. Help managers make decisions that are unique, rapidly changing, and not easily specified in advance
C. Provide managers with a generalised computing and telecommunications capacity that can be applied to a changing array of problems
D. Perform and record the daily routine transactions necessary to the conduct of business
Answer» B. Help managers make decisions that are unique, rapidly changing, and not easily specified in advance
49.

*/*_Plan must include the _____ systems concept for implementation of the new Information system.?

A. Existing
B. Future
C. Omitted
D. Progressing
Answer» B. Future
50.

*/*_The advantages of creating a prototype are ____________________.?

A. It allows developers to experiment with number of different design options
B. It can serve as means of communication between developers and customers
C. Both (a) and (b)
D. None of the above
Answer» D. None of the above