You are on page 1of 51

Information Technology

Multiple Choice Questions


(MCQs)
[FOR CA-INTERMEDIATE - IPC]

Om Trivedi
IIM-C Alumnus, Guest Faculty - LVC of the BOS,
External Subject Expert at the BOS and
Visiting Faculty of NIRC and WIRC of the ICAI

Carvinowledge
P R E S S
Co n te n t
Carvinowledge
P R E S S
Information Technology, 2ed
Multiple Choice Question

Chapter 1: Introduction to Business Process Management 1

Chapter 2: Business Process Management Implementation and Role of IT 6

Chapter 3: Business Process Mapping Systems 11

Chapter 4: Introduction to Information Systems 15

© Om Trivedi, 2019 Chapter 5: Computing Technologies 18


All rights reserved. No part of this publication may be reproduced or transmitted, in any form or by any means, without permission. Any per-
son who commits any unauthorised act in relation to this publication may be liable to criminal prosecution and civil claims for damages.
Chapter 6: Information System Layers, Life Cycle and Modern Technologies 29

Chapter 7: Telecommunications and Networks 37

Chapter 8: Internet and Other Technologies 49

Chapter 9: Introduction to Business Information Systems 57

Chapter 10: Specialized Business Information Systems 63

Chapter 11: Business Process Automation through Application Software 72

This book is meant for educational and learning purposes. The author(s) of the book has/have taken all reasonable care to ensure that the contents of the book do not
violate any existing copyright or other intellectual property rights of any person in any manner whatsoever. In the event the author(s) has/have been unable to track any
source and if any copyright has been inadvertently infringed, please notify the publisher in writing for corrective action.
c h a p t e r
1
Introduction to Business
Process Management

I
Multiple Choice Question (MCQs)

© Carvinowledge Press (CNP), 2019


1. Which of the following statement about 7. Which one of the following is not the benefit of

D
business is not true? Process or Modern organizations?
(a) It is an economic activity. (a) Responsive to market requirements

E
(b) It is pursued mainly to satisfy the material (b) Improved communication
needs of the society.

V
(c) Better collaboration between different

I
(c) It is conducted with the purpose of earning functional tasks
profits. (d) Performance measurements non-aligned

R
(d) It is conducted to avoid competition in the with process goals
market. 8. Which one of the following is the weakness of

T
2. A ___________ is a sequence of events that uses Process or Modern organizations?
inputs to produce outputs. (a) Duplication of functional expertise
(a) Business (b) Process (b) Responsive to market requirements

M
(c) Radical redesign (d) Economic activity (c) Improved communication
3. A business process comprises a combination of (d) Better collaboration between different
number of such independent or interdependent functional tasks

O
processes such as_________________. 9. Which one of the following is not the weakness

.F
(a) Developing new product of Process or Modern organizations?
(b) Customer order processing (a) Duplication of functional expertise
(c) Bill payment system (b) Inconsistency of functional performance
(d) All of the above between processes

O
4. Waiting in a queue in a post office or bank or (c) Performance measurements aligned with
buying a ticket for train or bus is a simple___. process goals

R
(a) Business (b) Business System (d) Increased operational complexity

P
(c) Business process (d) None of the above 10. “Barrier to communication between different
5. Process Owner is the key person in _______. functions” is a weakness of _____________.
(a) Functional organisation (a) Process Organization
(b) Traditional organisation (b) Traditional Organization
(c) Modern organisation (c) Functional Organization
(d) All of the above (d) Both “B” and “C”
6. Functional Executive is the key person in 11. Which one of the following is not the weakness
_______________. of Functional organizations?
(a) Traditional organisation (a) Poor handover between functions that
affects customer service
(b) Modern organisation
(b) Lack of end-to-end focus to optimize
(c) Process organisation
organizational performance
(d) All of the above
(c) Increased operational complexity
(d) Barrier to communication between different
functions
2 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs I ntrodu c tion to Bu s ines s Proces s M ana g ement 3

12. Which one of the following is not a benefits of 19. Business processes have ______________ on the 29. ________________ involves the transactional the technical and organizational environment
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


Functional organizations? financial status of the organization. flow of data from the point of placing an order in which they will be executed.
(a) Focus on functional excellence (a) Direct effect (b) Indirect effect with a vendor to the point of payment to the (a) Organisational business processes
(b) Toughand complicated work flow (c) No effect (d) Both a and b vendor. (b) Operational business processes
implementation (a) Sales cycle (c) Implemented business processes
20. _______________ covers the business processes
(c) Work balancing because workers have involved in recording and processing (b) Accounting cycle (d) Management Processes
similar skills accounting events of a company. (c) Inventory cycle
37. Process management involves concerted
(d) Clear management direction on how work (a) O2C cycle (b) Accounting cycle (d) Procure to pay cycle efforts to________ to organizational processes.
should be performed

I I
(c) P2P cycle (d) Inventory cycle 30. _____________ are the high- level processes that (a) Map (b) Implement
13. In which of the following duplication of 21. __________________ begins when a transaction are typically specified in textual form. (c) Improve (d) All of the above
functional expertise is exercised? (a) Organisational business processes

D D
occurs and ends with its inclusion in the 38. Which of the following is a benefits of using
(a) Traditional organisation financial statements. (b) Operational business processes techniques for BPM?

E E
(b) Modern organisation (a) O2C cycle (b) P2P cycle (c) Implemented business processes (a) Effectiveness gains for enterprises
(c) Functional organisation (c) Accounting cycle (d) Inventory cycle (d) All of the above (b) Creation of basic operational value

V V
(d) All of the above 22. OTC is also called as _________. 31. The _____________ is broken down into proposition

I I
14. Barrier to communication between different (a) Sales cycle (b) P2P cycle operational goals. (c) Revenue growth
functions is a limitation of ____________. (c) Accounting cycle (d) Inventory cycle (a) Business strategy (d) All of the above

R R
(a) Modern organisation (b) Organisational processes
23. O2C is also called as _________. 39. Which of the following is a benefits of using
(b) Traditional organisation

T T
(a) P2P cycle (b) Accounting cycle (c) Operational processes techniques for BPM?
(c) Process organisation (d) Implementation processes (a) Revenue growth
(c) Inventory cycle (d) Sales cycle
(d) All of the above 24. ___________________ covers all the business 32. The Business strategy is broken down into (b) Process improvements
15. ___________________ supports cost leadership processes relating to fulfilling customer ________________.

M M
(c) Goal fulfilment
strategy. requests for goods or services. (a) Organisational processes (d) All of the above
(a) Traditional organisation (a) P2P cycle (b) Sales cycle (b) Operational processes 40. Which of the following is a BPM practice?

O O
(b) Modern organisation (c) Accounting cycle (d) Inventory cycle (c) Operational goals (a) Strive for process-oriented organizational
25. _________________ involves transactional flow

.F .F
(c) Process organisation (d) Implementation processes structure.
(d) All of the above of data from the initial point of documenting a
customer order to the final point of collecting 33. _____ are specified by business process models. (b) Appoint process owners.
16. _________ supports differentiation strategy. the cash. (a) Organisational business processes (c) Senior management needs to commit and
(a) Traditional organisation (a) Sales cycle (b) P2P cycle (b) Operational business processes drive BPM.

O O
(b) Functional organisation (c) Accounting cycle (d) Inventory cycle (c) Implemented business processes (d) All of the above
(c) Modern organisation 26. _________________ is also known a P2P cycle. (d) Management Processes 41. Which of the following is a BPM practice?

R R
(d) All of the above (a) Sales cycle 34. Operational Business Processes are the basis (a) Work collaboratively with business partners

P P
17. Which of the following statement about (b) Accounting cycle for developing _____________________. on cross-organizational business processes.
business process flow is true? (c) Purchase to pay cycle (a) Organisational business processes (b) Continuously train the workforce and
(a) A business process flow is a prescribed (d) Inventory cycle (b) Operational business processes continuously improve business processes.
sequence of work steps. 27. _________________ is also known a P2P cycle. (c) Align employee bonuses and rewards to
(c) Implemented business processes
(b) It is performed in order to produce a desired (a) Procure to pay cycle business process performance.
(d) Management Processes
result for the organization. (b) Sales cycle (d) All of the above
(c) Accounting cycle 35. _________________________ are the basis for
(c) It is initiated by a particular kind of event. 42. From a business management point of view,
(d) Inventory cycle developing implemented business processes.
(d) All of the above which one of the following is not an important
(a) Organisational business processes
18. Which of the following statement about 28. _________________ covers all the business aspects of business process management?
processes relating to obtaining raw materials (b) Operational business processes
business process flow is true? (a) Increasing customer dissatisfaction
required for production of a product or for (c) Implemented business processes
(a) It is initiated by a particular kind of event. (b) Reducing cost of doing business (cost
providing a service. (d) Management Processes reduction)
(b) It has a well-defined beginning and end.
(a) Sales cycle 36. ______________________ contain information (c) Establishing new products services at low
(c) It is usually completed in a relatively short
(b) Accounting cycle on the execution of the process activities and cost (value creation)
period.
(c) Procure to pay cycle (d) Providing competitive advantages to the firm
(d) All of the above
(d) Inventory cycle
4 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs I ntrodu c tion to Bu s ines s Proces s M ana g ement 5

43. Which of the following phases of Business (b) Reducing cycle time (a) Bottom-up commitment (c) Control Phase
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


Process Management-Life cycle involves (c) Reducing defects (b) Horizontal commitment (d) Improve Phase
analysis of the current environment and (d) All of the above (c) Top-bottom commitment 63. Which of the following statement is incorrect
current processes, identification of needs and
50.
__________________ is a people-focused (d) None of the above in the explanation of BPR definition?
definition of requirements?
management system that aims at continual 58. BPR, TQM and Six Sigma are tools for________. (a) Fundamental: What is the company’s basic
(a) Design phase
increase in customer satisfaction at continually (a) Process devaluation style of working?
(b) Implementation phase lower real cost.
(b) Performance evaluation (b) Radical: All existing procedures and
(c) Analysis phase (a) Six sigma structures must be forgotten and new styles
(d) Run phase (c) Assets valuation

I I
(b) BPM of working must be discovered. Changes
(d) Processes Improvement must be made at the very root.
44. Which of the following phases of Business (c) Total Quality Management
Process Management-Life cycle involves 59. Which of the following is not a main area of (c) Spectacular: Spectacular changes must be

D D
(d) All of the above
evaluation of potential solutions to meet the target in six sigma efforts? discovered, which might also be marginal
identified needs, business process designing 51. TQM stands for ___________________. (a) Improving customer satisfaction improvements in business processes.

E E
and business process modelling? (a) Total Qualified Management (b) Reducing cycle time (d) Processes: Redesign must be fixed on the
(a) Design phase (b) Total Quality Management (c) Reducing value processes not on the tasks, jobs, people, or

V V
(b) Analysis phase (c) Total Quality Mechanism structures.

I I
(d) Reducing defects
(c) Implementation phase (d) Total Qualified Mechanism 64. A BPR team must represent________.
60. In six sigma the most appropriate solution is

R R
(d) Run phase 52. Value chain analysis is a business management identified using solution prioritization matrix (a) Every factor of the business environment
45. Which of the following phases of Business strategy, originally pioneered in the early and validated by using (b) All important stakeholders from the industry

T T
Process Management-Life cycle involves 1990s by ________________. (a) Root cause analysis (c) Every functional area of an organization
project preparation, blue printing, realization, (a) Michael Hammer (b) CTC analysis (d) The whole nation and its demographic
final preparation, going live and support? (b) James Champy (c) CTQ analysis factors

M M
(a) Analysis phase (c) Michael Porter (d) Pilot testing 65. Organization wide commitment means______.
(b) Design phase (d) Arthur D. Little (a) Top-bottom commitment
61. Process is standardized and documented.
(c) Implementation phase 53. Which of the following is a BPR success factor? Under which phase of ‘DMAIC’?

O O
(b) Bottom-up execution
(d) Run phase (a) Adequate IT infrastructure (a) Define Phase (b) Analyse Phase (c) Both ‘a’ and ‘b’

.F .F
46. Which of the following phases of Business (b) BPR team composition (c) Measure Phase (d) Control Phase (d) None of the above
Process Management-Life cycle involves (c) Business needs analysis 62. Cost and benefit analysis is performed to
business process execution or deployment and (d) All of the above validate the financial benefit of the solution
business process monitoring?
under________.

O O
54. Which of the following is a BPR success factor?
(a) Analysis phase
(a) Organization wide commitment (a) Define Phase
(b) Run and monitor phase

R R
(b) Ongoing continuous improvement (b) Measure Phase
(c) Design phase
(c) Effective change management
(d) Implementation phase

P P
(d) All of the above
47. Which of the following phases of Business Answer Keys - MCQs
Process Management-Life cycle involves 55. BPM is the achievement of an organization’s
iteration for continuous improvement? objectives through the ________________,
____________________ and ___________ of 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
(a) Analysis phase
essential business processes. (d) (b) (d) (c) (c) (a) (d) (a) (c) (d) (c) (b) (b) (b) (a) (c) (d) (d) (d) (b)
(b) Design phase
(a) Improvement (b) Management
(c) Implementation phase 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
(c) Control (d) All of the above
(d) Optimize (c) (a) (d) (b) (a) (c) (a) (c) (d) (a) (a) (c) (b) (c) (d) (c) (b) (d) (d) (d)
56. Which one of the following is not “BPM
48. Six Sigma is a business strategy developed Principles”?
41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
by ____________ in 1986 to achieve process (d) (a) (c) (a) (c) (b) (d) (a) (d) (b) (b) (c) (d) (d) (d) (d) (c) (d) (c) (d)
(a) Role of IT
improvement.
(b) Processes are Assets 61 62 63 64 65
(a) Motorola (b) Google
(c) Processes create consistent value (d) (d) (c) (c) (c)
(c) Apple (d) Microsoft
(d) Intermittent improvement of processes
49. Six Sigma efforts targets which of the following?
57. Senior management’s commitment is needed
(a) Improving customer satisfaction
for successful BPM. This is called ________.
c h a p t e r
2 Bu s ines s Proces s M a na g ement I mplementation a nd R ole of I T 7

12. Organizations that utilize BPM systems to (d) All of the above

Business Process Management accomplish IT enabled business process


change, gain from which of the following
18. Which of the following is not the reason for
failure of BPMS?
capabilities?
Implementation and Role of IT (a) Closer business involvement in designing IT
(a) System has been engineered as for to the
actual requirements.

© Carvinowledge Press (CNP), 2019


enabled business processes.
(b) Technological obsolescence.
(b) Ability to integrate people and systems that
(c) Software fails to meet business needs
participate in business processes.
(d) Both ‘b’ and ‘c’
(c) Ability to simulate business processes to

I I
Multiple Choice Questions (MCQs) design the most optimal processes for 19. Which of the following is not a benefit of
implementation. Business Process Automation?
1. Which of the following factors is not to be (d) Collaboration tools

D D
(d) All of the above (a) Business process improvement
considered in implementing BPM? 8. Which of the following component of BPM suit
13. Which of the following is a benefit of BPMS? (b) Improved procedures

E E
(a) Scope (b) Goal provides a system for storing and securing
(a) Automating repetitive business processes. (c) Better Process Control
(c) Tools (d) Only Methods electronic documents, images, and other files?
(b) BPMS works by ‘loosely coupling’ with a (d) Restriction on assignment.

V V
2. Six Sigma, BPM Life Cycle Method, TQM, (a) Process engine
company’s existing applications. 20. Which one of the following is not the key

I I
Informal methods are the ____________________ (b) Business analytics
(c) Operational savings. benefits of business process automation?
in BPM implementation. (c) Content management

R R
(d) All of the above (a) Business process improvement
(a) Scope and goals (b) Methods to be used (d) Collaboration tools
14. Which of the following is a benefit of BPMS? (b) Improved procedures
(c) Tools to be used (d) Skills required

T T
9. Which of the following component of BPM (c) Weak Process Control
3. Which one of the following is not considered suit removes intra- and interdepartmental (a) Reduction in the administration involved in
compliance and ISO Activities. (d) Improved efficiency
under the meaning of Sponsorship in BPM communication barriers through discussion
implementation key factors? forums, dynamic workspaces, and message (b) Freeing-up of employee time. 21. Which of the following is a benefit of Business

M M
(a) Executive Level (b) Process Owner Level boards? (c) Greater company agility. Process Automation
(c) Competitor Level (d) Employee Level (a) Process engine (d) All of the above (a) Improved assignments
(b) Improved customer service

O O
4. BPM includes ___________. (b) Business analytics 15. Which of the following is not a reason for failure
(c) Content management of BPMS? (c) Improved Efficiency
(a) Process (b) People

.F .F
(d) Collaboration tools (a) Superficial or deficient executive (d) All of the above
(c) Technology (d) All of the above
10. Which of the following is not a need for BPM involvement 22. BPA is a set of__________.
5. Which of the following is a Component of BPM
implementation? (b) Deficient project management (a) Strategies (b) Skills
suit?
(c) Breakdown in gap analysis

O O
(a) Process engine (a) To create the long-term future positioning (c) Plans (d) Tricks
of the business and enhance its future (d) Flexible enough or too complicated to be 23. Which of the following is a benefit of BPA?
(b) Business analytics

R R
capability. customized to meet the precise workflow
(c) Content management (a) Saving on costs
(b) To create short-term cost effectiveness and and business process.
(d) All of the above (b) Staying ahead in competition

P P
improvement to current customer service. 16. Which of the following is a reason for failure of
6. Which of the following component of BPM (c) Fast service to customers
(c) To initiate continuous improvement from the BPMS?
suit is a robust platform for modelling and base of the current, but improved, processes. (d) All of the above
(a) Limited options for customization of the
executing process-based applications, (d) To restrict the knowledge of products within BPM software are required 24. Which of the following is incorrect statement
including business rules? the organization. about BPA?
(b) Not flexible enough or too complicated to
(a) Process engine be customized to meet the precise workflow (a) BPA is a set of activities or strategies to
11. Which of the following is the need for BPM
(b) Business analytics implementation? and business process. automate business processes so as to bring
(c) Content management (c) Failure to identify future business needs benefit to enterprise in terms of cost, time
(a) To introduce a knowledge of product and
(d) Collaboration tools and effort.
customer profitability. (d) All of the above
(b) BPA consists of integrating applications,
7. Which of the following component of BPM suit (b) To address the cultural barriers that prevent 17. Which of the following is a reason for failure of restructuring labour resources and using
enable managers to identify business issues, effective cross-functional and hierarchical BPMS? software applications throughout the
trends, and opportunities with reports and working. (a) Inadequate assessment of the need for organization.
dashboards and react accordingly? (c) To re-engineer the business radically change management (c) Business processes can be determined for
(a) Process engine and provide clear future competitive (b) Persistent compatibility problems with the many functional units of an organization,
(b) Business analytics differentiation. diverse legacy systems of the partners. including sales, management, operations,
(c) Content management (d) All of the above (c) Resources not available when desirable
8 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Bu s ines s Proces s M a na g ement I mplementation a nd R ole of I T 9

supply chain, human resources and 32. _____________ are the activities related to the (c) Technology Development (d) Production Cycle
information technology. production of products and services. (d) Firm Infrastructure 44. _________ involves activities of selling goods or
(d) BPA decreases productivity by automating (a) Inbound logistics 39. ____________ is concerned with technological services and collecting payment for sales.
key business processes through computing (b) Operations innovation, training and knowledge that is (a) Financing Cycle (b) Expenditure Cycle
technology. (c) Outbound logistics crucial for most companies today in order to (c) Revenue Cycle (d) Production Cycle
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


25. In the automation of functional units, sales is (d) Marketing and sales survive.
45. ___________________includes transactions
automated through creation of _________. (a) Procurement
33. Which of the following terms, in case of a hotel surrounding the recognition of revenue
(a) SCM database (b) CRM database would include reception, room service etc. (b) Human Resource Management involving accounts like Sales, Accounts

I I
(c) AIS database (d) ERP database (a) Inbound logistics (c) Technology Development Receivable, Inventory and General Ledger.
26. Which one of the following is not a challenge in (b) Outbound logistics (d) Firm Infrastructure (a) Financing Cycle
implementing BPA?

D D
(c) Marketing and sales 40. _________ includes planning and control (b) Revenue Cycle
(a) Budget (d) Operations systems, such as finance, accounting, and (c) Expenditure Cycle

E E
(b) Single product or service line corporate strategy etc. (d) Production Cycle
34. _______________ are all the activities concerned
(c) Build and buy system with distributing the final product and/or (a) Procurement 46. __________________ involves activities of buying

V V
(d) Interfaces with the customers service to the customers. (b) Human Resource Management and paying for goods or services used by the

I I
(c) Technology Development organization.
27. The value chain approach was developed by (a) Inbound logistics
(a) Revenue Cycle (b) Expenditure Cycle
________ in the 1980s. (b) Marketing and sales (d) Firm Infrastructure

R R
(c) Financing Cycle (d) Production Cycle
(a) Michael Hammer (b) Michael Porter (c) Outbound logistics 41. Which one of the following statement is 47. _________________ includes transactions

T T
(c) James Champy (d) Jack Welch (d) Operations incorrect regarding AIS? surrounding the recognition of expenditures
28. The aim of the value chain framework is to 35. Which of the following terms, in case of a hotel (a) AIS is a system of collection, storage and involving accounts like Purchases, Accounts
__________. this activity would entail the ways of bringing processing of financial and accounting data Payable, Cash Disbursements, Inventory and
(a) Maximise value creation customers to the hotel. that is used by decision makers. General Ledger.

M M
(b) An Accounting Information System is a (a) Expenditure Cycle
(b) Minimising costs. (a) Inbound logistics
unified structure that employs physical (b) Revenue Cycle
(c) Diversifying products and services (b) Outbound logistics resources and components to transform

O O
(d) Both a and b (c) Marketing and sales (c) Financing Cycle
economic data into accounting information
(d) Production Cycle

.F .F
29. Which of the following is a support activity in (d) Operations for external and internal users.
48. ________________ involves activities of hiring
the value chain analysis? 36. ______________ essentially analyses the needs (c) Accounting information system (AIS) is a
and paying employees.
(a) Procurement and wants of customers and is responsible for specialized subsystem of the Information
System (IS). (a) Revenue Cycle
(b) Operation creating awareness among the target audience
(b) Financing Cycle

O O
of the company about the firm’s products and (d) AIS provide inadequate controls to ensure
(c) Outbound Logistics (c) Human Resource Cycle/Payroll Cycle
services. that data are recorded and processed
(d) Sales & Marketing (d) Production Cycle

R R
(a) Inbound logistics inaccurately by exposing organizational
30. Which of the following is a primary activity in assets (data and systems) by providing 49. ______________ involves the recurring set of
(b) Outbound logistics business activities and related data processing

P P
the value chain analysis? inadequate documentation of all business
(c) Marketing and sales activities and an ineffective segregation of operations associated with the manufacturers
(a) Procurement
(d) Operations duties. of products including activities like converting
(b) Human Resource Management
37.
________________ is concerned with the 42. Basic Functions of an AIS is__________. raw materials and labour into finished goods.
(c) Sales & Marketing
responsibility for purchasing the materials that (a) Collect and store data (a) Production Cycle (b) Payroll Cycle
(d) Administrative
are necessary for the company’s operations. (b) Record Transaction (c) Revenue Cycle (d) Financing Cycle
31. ______________ are the activities concerned (a) Procurement (c) Safeguard Organizational Assets 50.
______________ involves the information
with receiving the materials from suppliers,
(b) Human Resource Management (d) All of the above processing operations involved in updating
storing these externally sourced materials, and
(c) Technology Development 43. __________________ provides a clear view of the general ledger and preparing reports that
handling them within the firm.
(d) Firm Infrastructure firm’s processing framework and involves summarize the results of an organization’s
(a) Inbound logistics activities.
(b) Operations 38. _____________ is concerned with recruiting, activities of obtaining necessary funds to
run the organization, repay creditors, and (a) Payroll Cycle
(c) Outbound logistics training, motivating and rewarding the
workforce of the company. distribute profits to investors. (b) General Ledger and Reporting System
(d) Marketing and sales (c) Revenue Cycle
(a) Procurement (a) Financing Cycle
(b) Human Resource Management (b) Revenue Cycle (d) Financing Cycle
(c) Expenditure Cycle
10 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs

51. Purchase raw materials belongs to _________ (a) Financial Reporting Cycle
cycle. (b) Revenue Cycle
(a) Expenditure Cycle (c) Expenditure Cycle
(b) Production Cycle (d) Payroll Cycle
(c) Expenditure Cycle 58. ____________________ involves the activities
© Carvinowledge Press (CNP), 2019

(d) Payroll Cycle like capturing the data, implementing control


52. Decide how many units to make next month procedures, recording in journals, posting to
belongs to ___________________ cycle. ledgers and preparation of reports.
(a) Expenditure Cycle (a) Data input (b) Data storage

I
(b) Production Cycle (c) Data processing (d) Information output
(c) Expenditure Cycle 59. _________________ involves organizing the data
(d) Payroll Cycle in master file or reference file of an automated

D
53. Pay for raw materials belongs to __________ system for easy and efficient access.
cycle. (a) Data input (b) Data storage

E
(a) Expenditure Cycle (c) Data processing (d) Information output
(b) Production Cycle 60. The data files stored in the system typically

V
(c) Expenditure Cycle include which of the following?

I
(d) Payroll Cycle (a) Transaction file which is a collection of
54. Disburse payroll checks to factory workers transaction input data - normally temporary

R
belongs to _________________________ cycle. in nature.
(a) Expenditure Cycle (b) Master file which is a collection of data that

T
(b) Production Cycle are of a more permanent or continuing
(c) Expenditure Cycle interest.
(d) Payroll Cycle (c) Reference (table) file contains data that are
55. Hire a new assistant controller belongs to necessary to support data processing.

M
________ cycle. (d) All of the above
(a) Expenditure Cycle 61. _______________________ involves addition,

O
(b) Production Cycle deletion and updating of the data in the
(c) Expenditure Cycle transaction file, master file or reference file.

.F
(d) Payroll Cycle (a) Data input (b) Data storage
56. Update the allowance for uncollectible (c) Data processing (d) Information output
accounts belongs to _________________________ 62. __________involves generation of documents
cycle. and managerial reports in printable or

O
(a) Financial Reporting Cycle electronic form for addressing queries, to
(b) Production Cycle control operational activities and help the

R
(c) Expenditure Cycle management in decision making.
(d) Payroll Cycle (a) Data input (b) Data processing

P
57. Establish a ` 10,00,000 credit limit for (c) Data storage (d) Information output
customer Carvinowledge Press belongs to
_________________________ cycle.

Answer Keys - MCQs

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
(d) (b) (c) (d) (d) (a) (b) (c) (d) (d) (d) (d) (d) (d) (d) (d) (d) (c) (d) (c)
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
(d) (a) (d) (d) (b) (b) (b) (d) (a) (c) (a) (b) (d) (c) (b) (c) (a) (b) (c) (d)
41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
(d) (d) (a) (c) (b) (b) (a) (c) (a) (b) (c) (b) (a) (d) (d) (a) (b) (a) (b) (d)
61 62
(c) (b)
c h a p t e r
3
Business Process Mapping
Systems

© Carvinowledge Press (CNP), 2019


Multiple Choice Questions (MCQs)

D
ER DIAGRAMS 7. Which one of the following is not the advantages
1. _______________ are commonly used to of using E R Diagram?

E
represent entities in ER-Diagram. (a) It is Intuitive and helps in Physical Database
(a) Diamonds creation.

V
(b) Ovals (b) It can be generalized and specialized based

I
on needs.
(c) Rectangles
(c) It can help in database design.

R
(d) Square Boxes
(d) It is not simple but easily understandable.
2. ________________ are normally used to

T
represent relationships. 8. There are certain limitations of using E-R
Diagram. Which one of the following is not a
(a) Diamonds (b) Rectangular Boxes
limitation of using E-R Diagram?
(c) Ovals (d) Square Boxes
(a) Physical design derived from E-R Model may

M
3. ____________________ are used to represent have some amount of ambiguities
attributes. (b) or inconsistency.

O
(a) Rectangular Boxes (c) Sometime diagrams may lead to
(b) Ovals misinterpretations.

.F
(c) Diamonds (d) A diagram to show the entity relationship of
(d) Square Boxes different attributes.
4. ____________________ is a piece of data-an (e) None of the above.

O
object or concept about which data is stored. Answer the questions from the E R Diagram
(a) Attributes (b) Relationships drawn below.

R
(c) Entity (d) Flows Customer-street Loan-number Amount
Customer-Name
5. _______________________may be a ‘physical

P
Customer-Id Customer-City
object’ such as a house or a car, an ‘event’ such
as a house sale or a car service, or ‘concept’ Borrower
Customer Loan
such as a customer transaction or order. (Bank)
(a) Attributes (b) Relationships
(c) Entity (d) Flows
9. In the above E R Diagram, customer and loan
6. Which one of the reasons from why the are in which type of relationship?
documentation is important to Information (a) One to one (b) One to many
Systems is not correct?
(c) Many to one (d) Many to many
(a) Depicts how the system works
10. In the above E R Diagram, ‘customer name’ is:
(b) Trains the users
(a) An Entity (b) An Attribute
(c) Designs new systems
(c) A Relationship (d) A Flow of data
(d) Controls the system development and
maximizes costs 11. In the above E R Diagram, ‘Loan’ is:
(a) An Entity (b) An Attribute
(c) A Relationship (d) A Flow of data
12 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Bu s ines s Proces s M a pping Sys tems 13

12. In the above E R Diagram, ‘Loan number and (a) Physical DFD (b) Context DFD (c) Are helpful in explaining a program to others. (d) Represent the operations of a system with
Amount’ are: (c) Logical DFD (d) None of the above (d) All of the above the help of a logically drawn diagram, data,
(a) Entities (b) Attributes 22. A physical DFD _________________. 28. Once the flowchart is drawn, it becomes and illustrates the correct flow of documents.
(c) Relationships (d) Flow of data (a) Focuses on the business and how the ______________ to write the program in any 33. In a Computer system, the System Flowchart
DATA FLOW DIAGRAMS business operates. high level language. mainly consists of __________________.
13. Data flow diagram and flow chart are (b) Depicts the system (a) Difficult (b) Onerous (a) Sources from which input data is prepared
_____________. (c) It describes the business events that take (c) Easy (d) Inexpedient and the medium or devices used
(a) Synonymous (b) Different place and the data required and produced 29. It is ________________ to say that a flowchart (b) The processing steps or sequence of
(c) Same (d) Similar by each event. is a must for the better documentation of a operations involved, and

I I
14. Which of the following statement about DFD is (d) Reflects the business. complex program. (c) The intermediary and final outputs prepared
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


not correct? 23. Which of the following is an advantage using (a) Correct (b) Incorrect and the medium and devices used for their

D D
(a) A data flow diagram only shows what an Data Flow Diagram? (c) Inapposite (d) Infelicitous storage.
accounting system is doing (a) It aids in describing the boundaries of the 30. Which of the following is a limitation of (d) All of the above

E E
(b) It also shows what an information system is system. flowcharts? 34. ________________ are diagrammatic
doing and how the system is doing it. (b) It is beneficial for communicating existing (a) They are a better way of communicating the representation of the data processing steps to

V V
(c) A data flow diagram shows few technical system knowledge to the users. logic of a system to anyone. be performed within a computer program.

I I
details, it may be used to obtain an overall (c) A straightforward graphical technique which (b) The program logic is quite complicated. In (a) System Flow Charts
understanding of the system. is easy to recognize. that case, a flowchart becomes complex and (b) System Outline Charts

R R
(d) It is used as a last step of developing system (d) All of the above clumsy. (c) Program flow charts
flow-charts. 24. Which of the following is a limitation of using (c) Efficient Program Maintenance: The (d) None of the above

T T
15. The _____________ in a data flow diagram Data Flow Diagram? maintenance of an operating program 35. ______________________ are designed to present
are used to depict the flow of data from the (a) It is used as the part of system documentation becomes easy with the help of a flowchart. an overview of data flow through all parts of a
origination of transactions and other events, file. (d) Quicker grasp of relationships: Before computer.
through various stages of processing and any application can be solved, it must be (a) System Flow Charts

M M
(b) It simply takes a long time to create, so long
refinement, to the distribution of processed or that the analyst may not receive support understood, the relationship between (b) System Outline Charts
captured data. from the management to complete it. various elements of the application must (c) Program flow charts

O O
(a) Rectangle (b) Symbols (c) DFD can be easy understood by technical be identified. The programmer can chart a (d) None of the above
(c) Lines (d) Circles and nontechnical audiences. lengthy procedure more 36. ________________ represents flow of documents,

.F .F
16. Square in a DFD signifies ______________. (d) It supports the logic behind data flow within 31. Which of the following is an advantage of using the operations or activities performed, the
(a) External entity (b) Process the system. flowchart? persons or workstations.
(c) Data store (d) Data flow 25. Which of the following is an advantage of using (a) If alterations are to be done, the flowchart (a) System Outline Charts
Data Flow Diagram? may require complete re-drawing.

O O
17. Circle in a DFD signifies ________________. (b) Program flow charts
(a) External entity (b) Process (a) It make the programmers little confused (b) A flowchart acts as a guide or blueprint (c) System Flow Charts
regarding the system. during the systems analysis and program

R R
(c) Data store (d) Data flow (d) None of the above
(b) The biggest drawback of the DFD is that it development phase.
18. Rectangle with one side open in a DFD signifies 37. A _____________________ represents the
simply takes a long time to create, so long (c) As the flowchart symbols cannot be typed,

P P
________. operations of a system with the help of a
that the analyst may not receive support reproduction of a flowchart becomes a logically drawn diagram, data, and illustrates
(a) External entity (b) Process
from the management to complete it. problem. the correct flow of documents.
(c) Data store (d) Data flow
(c) DFD can be easy understood by technical (d) It becomes difficult to establish the linkage (a) System Outline Charts
CONTEXT DIAGRAM between various conditions, and the actions
and even by nontechnical audiences. (b) System Flow Charts
19. Context diagram is the ____________ DFD. to be taken thereupon, for a particular
(d) Physical considerations are left out. (c) Program flow charts
(a) Lowest level (b) Medium level condition.
Imagination (d) None of the above
(c) Highest level (d) Real level
FLOW CHARTS 38. ______________________ provide a complete
20. _________________ depicts a data processing
26. A ______________ is a graphic representation of and detailed sequence of logical operations to
system and includes external entities that are 32. System Outline Charts _____________.
an algorithm. be performed in a central processing unit of
the sources and destinations of system’s inputs (a) Merely list the inputs, file processed and the
and outputs. (a) Flowchart (b) ER diagram the computer for executing the program.
(c) Logical DFD (d) Context DFD outputs without considering their sequence.
(a) Flowchart (b) Context diagram (a) System Outline Charts
27. Flowcharts ________________. (b) Are designed to present an overview of data
(c) ER Diagram (d) None of the above (b) System Flow Charts
flow through all parts of a computer.
21. A ________________ shows how the system will (a) Play a vital role in the programming of a (c) Program flow charts
problem (c) Represent flow of documents, the operations
be implemented. The physical model depicts (d) None of the above
or activities performed, the persons or
the system. (b) Are quite helpful in understanding the logic
workstations.
of complicated and lengthy problems.
14 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs

39. _____________________ are used to depict the 42. Which of the following is an advantage of a
scientific, arithmetic and logical operations or decision tree?
steps which must be accomplished to solve the (a) It is simple to understand and interpret
computer application problem. They display (b) Possible scenarios can be added
specific operations and decisions and their (c) Worst, best and expected values can be
sequence within the program. determined for different scenarios
(a) System Outline Charts (d) All of the above
(b) Program flow charts 43. _____________ describe the conditions or
(c) System Flow Charts factors that will affect the decision or policy

I
(d) None of the above (a) Action stub (b) Condition entries
© Carvinowledge Press (CNP), 2019

40. ________________________ are used to translate (c) Condition stub (d) Action entries

D
the elementary steps of a procedure into a 44. ____________ describe, in the form of
program of coded instructions. statements, the possible policy actions or

E
(a) System Outline Charts decisions.
(b) Program flow charts (a) Condition stub (b) Action stub

V
(c) System Flow Charts (c) Condition entries (d) Action entries

I
(d) None of the above 45. _______________ indicate which conditions are
DECISION TABLE being met or answer the question in condition

R
41. Which of the following statement about stub.
decision tree is true? (a) Condition entries (b) Condition stub

T
(a) It is a tree-like representation and is defined (c) Action stub (d) Action entries
as a collection of a basis (condition) and 46. ___________________ describe which actions
a conclusion (action) and is a one way to are to be taken under a specific combination of

M
display an algorithm. conditions and defines the actual results of the
(b) It is also termed as an Inference or Logical decision.
tree. (a) Condition stub (b) Action stub

O
(c) It is a decision support tool that uses a tree- (c) Condition entries ( d) Action entries
like graph or model of decisions and their

.F
possible consequences, including chance
event outcomes, resource costs, and utility.
(d) All of the above

R O
1
(c)
P
Answer Keys - MCQs

2
(a)
3
(b)
4
(c)
5
(c)
6
(d)
7
(d)
8
(e)
9
(a)
10
(b)
11
(a)
12
(b)
13
(b)
14
(d)
15
(b)
16
(a)
17
(b)
18
(c)
19
(c)
20
(b)
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
(a) (b) (d) (b) (c) (a) (d) (c) (a) (b) (b) (a) (d) (c) (a) (c) (b) (c) (b) (b)
41 42 43 44 45 46
(d) (d) (c) (b) (a) (d)
c h a p t e r
4
Introduction to Information
System

© Carvinowledge Press (CNP), 2019


Multiple Choice Questions (MCQs)

D
INFORMATION SYSTEM NEED FOR INFORMATION TECHNOLOGY

E
1. An information system can be defined 6.
Why documentation is important to
technically as a set of interrelated components Information Systems?

V
that ____________________ information. (a) Depicting how the system works

I
(a) Collects (or retrieves) (b) Training users
(b) Processes (c) Designing new systems

R
(c) Distributes (d) All of the above

T
(d) All of the above 7.
Why documentation is important to
2. An information system support __________in Information Systems?
an organization. (a)
Controlling system development and

M
(a) Decision making (b) Coordination maintenance costs
(c) Control (d) All of the above (b) Standardizing communications with others

O
3. _________________________ can be defined (c) Auditing Information Systems

.F
technically as a set of interrelated components (d) All of the above
that collect (or retrieve), process, store, and 8. Which of the following statements about IT is
distribute information to support decision true?
making, coordination and control in an

O
(a) IT allows enterprises to work more efficiently
organization.
and to maximize productivity.

R
(a) Database system
(b) IT provides faster communication, electronic
(b) Information system storage and the protection of records to any

P
(c) Application software enterprise.
(d) System software (c)
IT enables business enterprises to
4. Feedback is _____________ of the information differentiate their products and services
system. from that of their competitors.
(a) Input (b) Process (d) All of the above
(c) Output (d) All of the above
REASONS FOR USE OF IT FOR BUSINESS
5. Feedback is returned to appropriate people or
9. Youtube, Facebook and WhatsApp are the
activities in the organization to evaluate and
examples of __________.
refine the ____________.
(a) Data and information management
(a) Input (b) Process
(b) Communication capabilities
(c) Output (d) All of the above
(c) Automated processes
(d) All of the above
16 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs I ntrodu c tion to I nfor mation Sys tem 17

10. BPA enables the organisation to optimize and (c) Valuation (d) Cut off 21. Which of the following is a type of Information 23. Which of the following is an impact of IT on
improve their business processes through 15. Which of the following objective of auditing System Control procedure? controls?
_____________. verify that the accounting values fairly present (a) Quality Assurance Procedures. (a) Realignment of functions data entry and
(a) Greater control over business and IT an item is worth? (b) Physical Access Controls. source of transactions may be centralized.
processes. (a) Valuation (b) Existence (b) Changes in custody of files and documents.
(c) Business Continuity Planning (BCP) and
(b) Reduced costs through higher efficiency and (c) Authorisation (d) Cut off Disaster Resource Planning (DRP). Ready access to data over telecom links
better management of the people involved. complicate custodial functions of data. Data
16. Which of the following objective of auditing (d) All of the above
(c) Shortened cycle times in the execution of librarian may become in charge for data.

I I
verify that the transaction is re-coded in the 22. Which of the following is a type of Information
processes through improved and refined (c) Transfer of responsibilities; Single action by
proper accounting period? System Control procedure?
business work flows. the user may complete the entire processing

D D
(a) Existence (b) Authorisation (a) Network and Communication.
(d) All of the above cycle of the transaction.
(c) Cut off (d) Valuation (b) Database Administration.

E E
(d) All of the above
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


IMPORTANCE OF IT IN AUDITING 17. Which of the following objective of auditing (c) Protective and detective mechanisms against

V V
11. Which of the following statements about audit verify that the processing is in compliance with internal and external attacks.

I I
in a computerised environment is true? governmental laws and regulations, generally (d) All of the above
(a) Auditing in a computerized environment accepted accounting procedures, and the

R R
would depend on the scope and objective of organization’s policies and procedures?

T T
audit. (a) Operational (b) Authorisation
(b) Audit broadly involves the process of (c) Compliance (d) Valuation
evaluating and reporting the adequacy 18. Which of the following objective of auditing

M M
of system controls, efficiency, economy, verify that the program, area, or activity is
effectiveness, and security practices performed economically, efficiently, and
(c) It assures that assets and information effectively?

O O
resources are safeguarded, that data integrity (a) Operational (b) Authorisation

.F .F
is protected, and that the system complies (c) Cut off (d) Valuation
with applicable policies, procedures,
standards, rules, laws and regulations. INFORMATION SYSTEM CONTROL PROCEDURE

O O
(d) All of the above 19. Which of the following is a type of Information
12. While conducting the audit in an IT System Control procedure?

R R
environment the auditor has to look at (a) Strategy and direction.
____________ parts of the system because of (b) General Organization and Management.

P P
their interfacing nature. (c) Access to IT resources, including data and
(a) Manual (b) Automated programs.
(c) both a and b (d) neither a nor b (d) All of the above Answer Keys - MCQs
13. Which of the following objective of auditing 20. Which of the following is a type of Information
verifies that the assets, liabilities, ownership, System Control procedure? 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
and/or activities are real? (a) System development methodologies and (d) (d) (b) (c) (a) (d) (d) (d) (b) (d) (d) (a) (d) (b) (a) (c) (c) (a) (d) (d)
(a) Authorisation (b) Valuation change control. 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
(c) Cut off (d) Existence (b) Operation procedures. (d) (d) (d)
14. Which of the following objective of auditing (c) System Programming and technical support
verify that events have occurred in accordance functions.
with management’s intent? (d) All of the above
(a) Existence (b) Authorisation
c h a p t e r
5 Compu ting Technologies 19

(c) Serves the needs of the users of other (d) FTP Servers
computers on a network. 20. A _____________________ is designed to restrict

Computing Technologies (d) All of the above


10. A _________________ is a server computer that
access to information on the Internet.
(a) Multimedia Servers
runs database software. (b) File server
(a) Database server (b) File server (c) Web server
(c) Proxy server (d) Anti-virus server (d) Proxy Server
11. The task of a ______________ is to store shared
POPULAR COMPUTING ARCHITECTURE

I I
Multiple Choice Questions (MCQs) files and programs.
(a) Database server (b) File server 21. The hardware of the computer ___________.
(a) Consists of all the electronic components

D D
COMPUTING (b) Includes programming and software (c) Proxy server (d) Anti-virus server
engineering and electromechanical devices
1. Computing involves _____________. 12. _________________ is one of the main reasons

E E
(c) Is involved in many hardware and software that many small networks exist. (b) Comprise the physical entity of the device
(a) Computer hardware
aspects of computing, from the design (a) Sharing printers (b) Sharing database (c) Is tangible
(b) Software

V V
of individual microprocessors, personal (c) Sharing files (d) All of the above (d) All of the above

I I
(c) Computer system computers, and supercomputers, to circuit
13. __________________ is a computer that manages 22. ____________________ is a part of the computer
(d) All of the above design that pertains to programming, which is

R
one or more printers.

R
2. Which of the following is a Sub-field of (d) All of the above basically machine language.

© Carvinowledge Press (CNP), 2019


Computing? (a) Database server (b) File server
7. An information system ____________________. (a) Instruction Set Architecture (ISA)

T T
(a) Computer Science (c) Print server (d) Proxy server
(a) Can be defined technically as a set of (b) Micro architecture
(b) Computer Engineering interrelated components that collect, 14. A _____________________ is a server computer
(c) System Design
(c) Information Technology process, store, and distribute information to that runs software that enables the computer
to host an Internet website. (d) All of the above

M M
(d) All of the above support decision making, coordination and
control in an organization. (a) Web server (b) Database server 23. The ________________________ provides
3. Which of the following is a Sub-field of commands to the processor, to tell it what it
(b) Contain information about significant (c) File server (d) Proxy server

O O
Computing? needs to do.
people, places, and things within the 15. Which of the following server applications
(a) Information Technology (a) Micro architecture

.F .F
organization or in the environment provide a service over the Internet?
(b) Software Engineering surrounding it. (b) System Design
(a) Web servers (b) Mail servers
(c) Information Systems (c) Aims to support operations, management (c) Instruction Set Architecture (ISA)
(c) FTP servers (d) All of the above
(d) All of the above and decision making (d) All of the above
16. Microsoft’s IIS (Internet Information Services)

O O
4. ________________________ refers to the scientific (d) All of the above 24. The __________ consists of multiple pieces,
is an example of _________.
and practical approach to computation and its 8. Software engineering ___________. including addressing modes, instructions,
(a) Database server (b) File server

R R
applications. native data types, registers, memory
(a) Is a field of Computer science, for designing (c) Web server (d) Proxy server
(a) Computer Science and writing programs for computers or other architecture, interrupt, and exception

P P
(b) Computer Engineering electronic devices 17. A ____________________ is a server that handles handling, and external I/O.
(c) Information Systems the network’s e-mail needs. (a) Micro architecture
(b) Is concerned with developing large
(d) Information Technology applications (a) Mail server (b) Database server (b) Instruction Set Architecture (ISA)
(c) Covers not only the technical aspects (c) File server (d) Web server (c) System Design
5. _____________ refers to the discipline
that integrates several fields of electrical of building software systems, but also 18.
_____________________ are software (d) All of the above
engineering and computer science required to management issues applications designed to stream audio and 25. ________________is related to the programming
develop computer hardware and software. (d) All of the above visual files over the Internet. of a computer, that is, how the computer
(a) Computer Science (a) Database server (b) Multimedia Servers understands what each element in its basic
COMPUTING TECHNOLOGIES (c) File server (d) Web server language means, what instructions are to be
(b) Computer Engineering
(c) Information Systems 9. A server ______________________________. 19. __________________________ are used to transfer carried out and in what order, etc.
(d) Information Technology (a) Is a computer (Hardware) or device on files from one computer to another over the (a) Instruction Set Architecture (ISA)
a network dedicated to run one or more Internet. (b) Micro architecture
6. Computer Engineering _________________. services (as a host) (a) Multimedia Servers (c) System Design
(a) Focuses on system and hardware aspects of (b) To serve the needs of the users of other
computing (b) File server (d) All of the above
computers on a network.
(c) Web server
20 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Compu ting Technologies 21

26. Which of the following instruction set enables (c) Small and complex (c) CISC use complex addressing modes 49. Micro Architecture is a lower level detailed
to add two number together? (d) Small and limited (d) CISC comparatively more power, as description of the system, for describing
(a) COMPARE (b) IN compared to RISC completely ___________________.
37. RISC instructions is of __________________.
(c) JUMP (d) ADD 44. Which of the following feature about CISC is (a) The operation of all parts of the computing
(a) Uniform fixed length
true? system
27. Which of the following instruction set enables (b) Variable length (b) The resources and methods used to achieve
to compare numbers? (c) Undefined length (a) CISC processors use a small and limited
architecture specification
(a) ADD (b) COMPARE number of instructions.
(d) Pre-defined length (c) The essential specifications for the logical
(c) IN (d) JUMP (b) CISC instructions are of uniform fixed length.
38. In ______________________, to execute each implementation

I I
28. Which of the following instruction set enables (c) MC88100 Processors is an example of the (d) All of the above
instruction, there is a separate electronic
to input information from a device? CISC.
circuitry in the control unit, which produces 50. __________ is also known as Computer
(d) CISC Processors have many processing

D D
(a) IN (b) ADD all the necessary signals. Organization.
features, and hence the job of Machine (a) Instruction Set Architecture (ISA)
(c) COMPARE (d) JUMP (a) CISC (b) RISC
Language Programmers becomes easier.

E E
29. Which of the following instruction set enables (c) System design (d) Micro architecture (b) Micro architecture
45. Which of the following feature about RISC is (c) System Design
to jump to designated RAM address? 39. _________________________ is also called hard-

V V
true? (d) All of the above
(a) ADD (b) COMPARE wired approach.

I I
(a) RISC chip design is comparatively complex 51. _______________________ is the process of
(c) JUMP (d) IN (a) CISC (b) Micro architecture
(b) Since RISC Processors have a small defining the architecture, components,

R R
30. Which of the following instruction set enables (c) Micro chip (d) RISC instruction set, they place extra demand modules, interfaces, and data for a system to
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


to load information from RAM to CPU? 40. Which of the following statement about CISC is on Programmers who must consider how satisfy specified requirements.

T T
(a) LOAD (b) STORE true? to implement complex computations by (a) Instruction Set Architecture (ISA)
(c) JUMP (d) OUT (a) They use simple addressing modes combining simple instructions. (b) Micro architecture
31. Which of the following instruction set enables (b) IBM RS6000 is an example of CISC (c) RISC use complex addressing modes (c) System Design

M M
to output information to device? (c) CISC chips have large and complex (d) RISC comparatively more power, as (d) All of the above
(a) LOAD (b) STORE instructions compared to CISC 52. ___________ could be seen as the application of
(c) JUMP (d) OUT (d) CISC instructions are of uniform fixed length 46. __________________ is the art that specifies the systems theory to product development.

O O
41. Which of the following statement about RISC is relations and parts of a computer system. (a) System Design
32. Which of the following instruction set enables

.F .F
not true? (a) Instruction Set Architecture (ISA) (b) Instruction Set Architecture (ISA)
to store information to RAM?
(a) RISC processors use a small and limited (b) Computer architecture (c) Micro architecture
(a) LOAD (b) STORE
number of instructions. (c) System Design (d) All of the above
(c) JUMP (d) OUT
(b) RISC consume more power as compare to (d) All of the above 53. Systems design includes which of the following

O O
33. CISC stands for ___________________. hardware components within a computing
CISC. 47. The ____________________ of a computer system
(a) Complex Instruction Set Computer system?
(c) RISC instructions are of uniform fixed length. is concerned with the specifications of the

R R
(b) Competitive Instruction Set Computer (a) System interconnects-Computer buses and
(d) MC88100 Processors is an example of the various functional modules, such as processors
(c) Complex Information Set Computer RISC. and memories, and structuring them together switches

P P
(d) Competitive Information Set Computer into a computer system. (b) Memory controllers and hierarchies
42. Which of the following feature about RISC is
34. RISC stands for ___________________. true? (a) Instruction Set Architecture (ISA) (c) CPU off-load mechanisms-Direct Memory
(a) Redundant Instruction Set Computer (b) System Design Access (DMA)
(a) RISC are complex as well as expensive to
(b) Replicated Instruction Set Computer produce (c) Computer architecture (d) All of the above
(c) Reduced Instruction Set Computer (b) RISC chips have large and complex (d) All of the above 54. ________________________ is a communication
(d) Re-enforced Instruction Set Computer instructions 48. ______________ is a description of how the system that transfers data between components
(c) They mostly use hardwired control units ISA does and what it does, i.e. everything inside a computer, or between computers that
35. CISC chips have _________________ instructions. covers all related hardware components (wire,
(d) The Pentium series is a very popular example (resources, design techniques, etc.) is
(a) Large and limited organized on the Chip or Processor. optical fibre, etc.) and software, including
of the RISC
(b) Large and complex (a) Micro architecture communication protocol.
(c) Small and complex 43. Which of the following statement about CISC is (a) Computer bus
(b) Instruction Set Architecture (ISA)
not true?
(d) Small and limited (c) System Design (b) Memory controller
(a) CISC processors have comparatively simpler
36. RISC chips use _________________ instructions. (d) All of the above (c) Direct Memory Access (DMA)
design and high performance, as compared
(a) Large and limited to RISC. (d) Instruction Set Architecture (ISA)
(b) Large and complex (b) CISC chip design is comparatively complex
22 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Compu ting Technologies 23

55. The _________________________ is a digital CLOUD COMPUTING ENVIRONMENT 69. A hybrid cloud is essentially a combination of (c) Either a or b (d) Both a or b
circuit which manages the flow of data going 61. A ____________________ can be accessed by any ______________. 75. The front end in a cloud application consists
to and from the main memory and can be a subscriber with an internet connection and (a) Private and public clouds which of the following?
separate chip or integrated into another chip. access to the cloud space. (b) Public and community clouds (a) Fat client (b) Thin client
(a) Computer bus (a) Public cloud (c) Community and private clouds (c) Mobile device (d) All of the above
(b) Direct Memory Access (DMA) (b) Private cloud (d) At least two clouds, where the clouds 76. In cloud computing, the __________________ is
(c) Instruction Set Architecture (ISA) (c) Community cloud included are a mixture of public, private, or a cloud itself which may encompass various
(d) Memory controller (d) Hybrid cloud community. computer machines, data storage systems and
62. __________________________ describes cloud 70. A ___________________ cloud describes cloud servers.

I I
56. _____________________________ is a feature
computing where resources are dynamically computing where resources are dynamically (a) Back end (b) front end
of modern computers that allows certain
provisioned on an on-demand, self-service provisioned on an on-demand, self-service (c) Neither a nor b (d) Both a or b
hardware subsystems within the computer to

D D
basis over the Internet, via web applications/ basis over the Internet, via web applications/ 77. There are some set of rules, generally called
access system memory independently of the
web services, from a third-party provider who web services, from a third-party provider who as _______________ which are followed by back
central processing unit (CPU).

E E
bills on a utility computing basis. bills on a utility computing basis. end server.
(a) Computer bus (a) Public (b) Community
(a) Private cloud (a) Middleware (b) Virtualisation
(b) Memory controller

V V
(b) Community cloud (c) Private (d) Hybrid (c) Multiplexing (d) Protocols

I I
(c) Direct Memory Access (DMA) (c) Public cloud 71. A _____________ cloud is essentially a 78. ____________________ allow computers that are
(d) Instruction Set Architecture (ISA) (d) Hybrid cloud combination of at least two clouds. connected on networks, to communicate with

R R
57. _____________________ is the use of two or more 63. A __________________ environment is often the (a) Public (b) Private each other.
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


Central Processing Units (CPUs) within a single first step for a corporation prior to adopting a (c) Community (d) Hybrid (a) Middleware (b) Virtualisation

T T
computer system to allocate tasks between public cloud initiative. 72. VTAS Ltd. implemented cloud computing (c) Multiplexing (d) All of the above
them. (a) Private cloud technology in its enterprise, where the CHARACTERISTICS OF CLOUD COMPUTING
(a) Multiprocessing (b) Community cloud organization runs non-core applications on 79. Cloud computing gives us the ability to expand
web servers/ web applications of a third party

M M
(b) Hardware Virtualization (c) Public cloud and reduce resources according to the specific
(d) Hybrid cloud who bills on a utility computing basis, while service requirement. Which of the following
(c) Platform Virtualization
maintaining core applications and sensitive features does the above line signify?
(d) Both b and c 64. Which of the following type of cloud computing

O O
data in-house. Which of the following type of (a) Elasticity and Scalability
enables an enterprise to manage the
58. _____________________ refers to the creation of cloud computing environment is used by VTAS

.F .F
infrastructure and have more control? (b) Pay per use
a virtual machine that acts like a real computer ltd.?
(a) Community cloud (c) On-demand service
with an operating system. (a) Community cloud
(b) Public cloud (d) Resiliency
(a) Multiprocessing (b) Public cloud
(c) Hybrid cloud 80. We pay for cloud services only when we use
(b) Hardware Virtualization (c) Hybrid cloud

O O
(d) Private cloud them, either for the short term or for a longer
(c) Platform Virtualization (d) Private cloud duration. Which of the following features does
65. A ___________ cloud is established for a specific
CLOUD COMPUTING ARCHITECTURE

R R
(d) Both b and c group or organization and limits access to just the above line signify?
that group. 73. ___________________________ refers to the (a) Elasticityand Scalability
EMERGING COMPUTING MODELS components and subcomponents that typically

P P
(a) Public (b) Private (b) Resiliency
CLOUD COMPUTING consist of a front end platform (fat client, thin
(c) Neither a nor b (d) Both a and b (c) Pay per use
59. _______________ is a method of computing in client, mobile device), back end platforms
66. _________________ are also called internal (d) On-demand service
which an individual or an organization makes (servers, storage), a cloud based delivery, and
clouds. 81. We invoke cloud services only when we need
use of another organizations excess computing a network (Internet, Intranet, Inter-cloud).
(a) Private (b) Public them, they are not permanent parts of the IT
power or data storage capacity. (a) System design
(c) Community (d) Hybrid infrastructure: this is a significant advantage
(a) Cloud computing (b) Cloud computing architecture
67. A ________________ cloud is formed when several for cloud use as opposed to internal IT services.
(b) Grid computing (c) Protocols Which of the following features does the above
organizations with similar requirements share
(c) Mobile computing (d) Instruction design architecture (ISA) line signify?
common infrastructure.
(d) BYOD 74. _______________________ of the cloud (a) Pay per use
(a) Public (b) Private
60. NIST stands for ______________. computing system comprises of the client’s (b) Elasticityand Scalability
(c) Community (d) Hybrid
(a) National Institute of Space and Technology devices and some applications are needed for (c) Resiliency
68. A __________________ cloud is shared among accessing the cloud computing system.
(b) National Institute of Standards and (d) On-demand service
two or more organizations that have similar
Technology (a) Back end (b) Front end
cloud requirements.
(c) Northern Institute of Standards and
(a) Community (b) Public
Technology
(c) Private (d) Hybrid
(d) Northern Institute of Space and Technology
24 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Compu ting Technologies 25

82. The __________________ of a cloud service (a) Network as a service same on a physical device and are usually 103. Which of the following is the correct sequence
offering can completely isolate the failure (b) Software as a Solution competent enough to handle recovery of of Mobile Computing?
of server and storage resources from cloud (c) Node as a service information. (i) The user enters or access data using the
users. Work is migrated to a different physical (d) Node as a Solution 98. Which of the following is an advantage of cloud application on handheld computing device.
resource in the cloud with or without user 91. ____________________ is a category of cloud computing? (ii) Now both systems (handheld and site’s
awareness and intervention. services where the capability provided to the (a) Cloud computing is probably the most computer) have the same information and
(a) Resiliency cloud service user is to use network/transport cost efficient method to use, maintain and are in sync.
(b) Elasticityand Scalability connecting services. upgrade. (iii) The process work the same way starting from
(c) Pay per use (a) SaaS (b) Naas (b) Storing information in the cloud gives us the other direction.

I I
(d) On-demand service (c) Iaas (d) CaaS almost unlimited storage capacity. (iv) Using one of several connecting technologies,
83. Public cloud service providers often can host 92. _____________________ involves optimization (c) Since all the data is stored in the cloud, the new data are transmitted from handheld

D D
the cloud services for multiple users within the of resource allocation by considering network backing it up and restoring the same is to site’s information system where files are
same infrastructure. Which of the following and computing resources as a whole. relatively much easier than storing the updated and the new data are accessible to

E E
features does the above line signify? (a) Naas (b) SaaS same on a physical device and are usually other system user.
(a) Pay per use (c) Iaas (d) CaaS competent enough to handle recovery of (a) (i), (ii), (iii), (iv)

V V
(b) On-demand service information. (b) (iv), (iii), (ii), (i)
93. CaaS stands for _________________________.

I I
(c) Multi Tenancy (d) All of the above (c) (i), (ii), (iv), (iii)
(a) Communication as a Solution
(d) Elasticityand Scalability 99. Which of the following is a drawback of cloud (d) (i), (iv), (ii), (iii)
(b) Communication as a Service

R R
SERVICE MODELS OF CLOUD COMPUTING computing? 104. Mobile Hardware includes _________.
(c) Customization as a Service
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


84. SaaS stands for _________________________. (a) Technical issues (b) Inter-operability (a) Laptops (b) Smart phones
(d) Customization as a Solution

T T
(a) Solution as a Service (c) Prone to attack (d) All of the above (c) Tablet (d) All of the above
94. The _______________ vendor is responsible for
(b) Software as a Solution 100. Which of the following is a benefit of cloud 105. Mobile computing devices are configured to
all hardware and software management and
computing? operate in ______________ transmission mode.
(c) Software as a Service offers guaranteed Quality of Service (QoS).
(a) There are chances that all the application

M M
(d) Sample as a Service (a) Naas (b) SaaS (a) Full- duplex (b) Half- duplex
needed by the user may not be stationed (c) Single- duplex (d) none of the above
85. _________ includes a complete software offering (c) Iaas (d) CaaS
with a single cloud vendor and two vendors 106. Which of the following is a benefit of mobile
on the cloud. 95. Voice over IP (VoIP) and Instant Messaging (IM)

O O
may have applications that do not co-operate computing?
(a) SaaS (b) Iaas is an example of _________________________. with each other.

.F .F
(c) Naas (d) CaaS (a) CaaS (b) Naas (a) Increase in workforce productivity
(b) It is feasible to confine within budgetary
86. Which instance of SaaS allows users to explore (c) SaaS (d) Iaas (b) Improvement in customer service
allocations and can be ahead of completion
functionality of Web services such as Google 96. PaaS stands for _________________________. (c) Improvement in incident management
cycle times.
Maps, Payroll processing, and credit card (a) Platform as a Solution (d) All of the above
(c) Storing information in the cloud could make

O O
processing services etc.? (b) Program as a Solution the company vulnerable to external hack 107. Which of the following is a concern relating to
(a) Testing as a Service (TaaS) (c) Platform as a Service attacks and threats. mobile computing?

R R
(b) Communication as a Service (CaaS) (d) Program as a Service (d) Surrendering all the company’s sensitive (a) Mobile computing has its fair share of
(c) Data as a Service (DaaS) security concerns as any other technology.
ADVANTAGE/ DRAWBACKS OF CLOUD information to a third-party cloud service

P P
(d) API as a Service (APIaaS) provider could potentially put the company (b) Another problem plaguing mobile
COMPUTING
87. IaaS stands for _________________________. to great risk. computing are credential verification.
97. Which of the following is drawback of cloud
(a) Information as a service MOBILE COMPUTING (c) When a power outlet or portable generator
computing?
(b) Integration as a service 101. _______________________ is a computing system is not available, mobile computers must rely
(a) Cost Efficient: Cloud computing is probably
(c) Investment as a service where the users with portable computers still entirely on battery power.
the most cost efficient method to use,
(d) Infrastructure as a service have network connections while they move. (d) All of the above
maintain and upgrade.
88. __________________ is the foundation of cloud (b) Almost Unlimited Storage: Storing (a) Cloud computing GRID COMPUTING
services. information in the cloud gives us almost (b) Grid computing 108. _______________________ is a computer network
(a) SaaS (b) Iaas unlimited storage capacity. (c) Mobile computing in which each computer’s resources are shared
(c) Naas (d) CaaS (c) Surrendering all the company’s sensitive with every other computer in the system.
(d) All of the above
89. _________________ provides clients with access information to a third-party cloud service (a) Cloud computing
102. ______________ is someone/something that
to server hardware, storage, bandwidth and provider could potentially put the company can move or be moved easily and quickly from (b) Grid computing
other fundamental computing resources. to great risk. place to place. (c) Mobile computing
(a) SaaS (b) Naas (d) Since all the data is stored in the cloud, (a) Cloud (b) Mobile (d) All of the above
(c) Iaas (d) CaaS backing it up and restoring the same is (c) Grid (d) All of the above
90. NaaS stands for _________________________. relatively much easier than storing the
26 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Compu ting Technologies 27

109. Which of the following statement about grid (d) Multiplexer 123. Which of the following function is not required (a) Single Sign-on
computing is true? 115. In the ideal grid computing system, every by grid systems and applications? (b) Exportability
(a) It relies on complete computers (with on- resource __________________. (a) Authentication (b) Access Control (c) Protection of Credentials
board CPU, storage, power supply, network (a) Shall not be shared (c) Privacy (d) Repudiation (d) Interoperability with local security solutions
interface, and so forth). (b) Is shared 124. Which of the following is an authentication and VIRTUALIZATION
(b) It is connected to a network (private, public, (c) Might be hared access control issue? 129. _________________ refers to technologies
or the Internet) by a conventional network (d) Could be shared (a) To provide authentication to verify the users, designed to provide a layer of abstraction
interface. 116. A user, desirous of connecting to a grid process which have user’s computation between computer hardware systems and the
(c) It is a special kind of distributed computing. network,has to enrol his machine as and resources used by the processes to software, running on them.

I I
(d) All of the above _______________ on the grid and install the authenticate. (a) Virtualization (b) Cloud computing
110. Which of the following statement about grid provided grid software on his own machine. (b) To allow local access control mechanisms to (c) Grid computing (d) Mobile computing

D D
computing is true? (a) Authenticator (b) Administrator be used without change. 130. _______________ means to create a virtual
(a) It is a computer network in which each (c) Donor (d) Customer (c) Neither a nor b version of a device or resource.

E E
computer’s resources are shared with every 117. After the user positively establishes his identity (d) Both a and b (a) Cloud computing
other computer in the system. with a ________________, it shall take steps to 125. In a grid computing system, a user should (b) Virtualization

V V
(b) It relies on complete computers assure that the user is in fact who he claims to authenticate once and they should be able to (c) Grid computing

I I
(c) It is connected to a network (private, public, be. acquire resources, use them, and release them (d) Mobile computing
or the Internet) by a conventional network (a) Certificate Authority and to communicate internally without any
131. Which of the following statement is true about

R R
interface. (b) Donor further authentication. Which of the following
virtualization?
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


(d) All of the above (c) Customer constraint of security on grid is highlighted in
(a) It means to create a virtual version of a device

T T
111. Which of the following is a benefit of grid (d) Government the above phrases?
or resource.
computing? 118. The _____________________ is responsible for (a) Protection of Credentials
(b) It refers to technologies designed to provide
(a) Making use of Underutilized Resources controlling the rights of the users in the grid. (b) Interoperability with local security solutions
a layer of abstraction between computer
(b) Resource Balancing (c) Single Sign-on

M M
(a) Certificate Authority hardware systems and the software, running
(c) Parallel CPU Capacity (b) Customer (d) Exportability on them.
(d) All of the above (c) Donor 126. In a grid computing system, sensitive (c) It is the process of creating logical computing

O O
112. Which of the following is a benefit of grid (d) Government information such as user passwords and resources from available physical resources.
computing? private keys should be protected. Which of

.F .F
119. Procedures for removing users and machines (d) All of the above
(a) Virtual resources and virtual organizations are executed by the ______________. the following constraint of security on grid is
132. ____________ is the process of creating logical
for collaboration (a) Donor (b) Administrator highlighted in the above phrases?
computing resources from available physical
(b) High Reliability (c) Customer (d) Government (a) Single Sign-on resources.
(c) Access to additional resources (b) Protection of Credentials

O O
120. Which of the following is a responsibility of a (a) Grid computing (b) Mobile computing
(d) All of the above Certificate Authority? (c) Interoperability with local security solutions (c) Virtualization (d) Cloud computing
113. In which of the following means we can use the (d) Exportability

R R
(a) Positively identifying entities requesting 133. In ______________, a single physical server is
computation resources of a grid? certificates 127. In a grid computing system, access to local divided into multiple logical servers.
resources should have local security policy at

P P
(a) To run an existing application on an available (b) Issuing, removing, and archiving certificates (a) Partitioning (b) Consolidation
machine on the grid rather than locally; (c) Protecting the Certificate Authority server a local level. Despite of modifying every local
(c) Grouping (d) Both b and c
(b) To use an application designed to split its resource there should be an inter-domain
(d) All of the above 134. Platform Virtualization is also known as
work in such a way that the separate parts can security server for providing security to local
121. Which of the following is a responsibility of a _____________________.
execute in parallel on different processors resource. Which of the following constraint
user? (a) Hardware Virtualization
(c) To run an application, that needs to be of security on grid is highlighted in the above
(a) Maintaining a name space of unique names phrases? (b) Network Virtualization
executed many times, on many different for certificate owners
(a) Single Sign-on (c) Storage Virtualization
machines in the grid.
(b) Serving signed certificates to those needing (d) All of the above
(d) All of the above (b) Protection of Credentials
to authenticate entities 135. __________________ refers to the creation of a
114. ___________________________ in general is a (c) Exportability
(c) Issuing, removing, and archiving certificates virtual machine that acts like a real computer
special type of parallel computing that relies (d) Interoperability with local security solutions
(d) None of the above with an operating system.
on complete computers and connected to a 128. In a grid computing system, large amount of
122. The responsibility to manage the resources of (a) Hardware Virtualization
network by a conventional network interface. encryption shall not be used at a time. There
the grid belongs to the _______________. (b) Platform Virtualization
(a) Grid computing should be a minimum communication at a
(a) Administrator (b) User time. Which of the following constraint of (c) Storage Virtualization
(b) Cloud computing
(c) Customer (d) Government security on grid is highlighted in the above (d) Both a and b
(c) Mobile computing
phrases?
28 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs

136. _________________________ is a method of (b) Disaster recovery


combining the available resources in a network (c) Portable applications
by splitting up the available bandwidth into (d) Portable workspace
channels, each of which is independent from 139. __________________________ are needed when
the others, and each of which can be assigned running an application from a removable
(or reassigned) to a particular server or device drive, without installing it on the system’s main
in real time. disk drive.
(a) Hardware Virtualization (a) Server consolidation
(b) Network virtualization (b) Portable applications

I
(c) Platform Virtualization (c) Disaster recovery
(d) Storage Virtualization (d) Portable workspace

D
137. P2V transformation stands for _____________. 140. ___________________________ can be used to
(a) Public to Virtual encapsulate the application with a redirection

E
(b) Private to Virtual layer that stores temporary files, windows
(c) Physical to Virtual registry entries and other state information in

V
(d) Partitioned to Virtual the application’s installation directory and not

I
138. Virtual machines are used to consolidate many within the system’s permanent file system.
physical servers into fewer servers, which (a) Grid computing

R
in turn host virtual machines. Which of the (b) Cloud computing
© Carvinowledge Press (CNP), 2019

application of the concept of virtualisation is (c) Mobile computing

T
being highlighted in the above case? (d) Virtualization
(a) Server consolidation

O M
.F
Answer Keys - MCQs

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

O
(d) (d) (d) (a) (b) (d) (d) (d) (d) (a) (b) (d) (c) (a) (d) (c) (a) (b) (d) (d)
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

R
(d) (a) (c) (b) (a) (d) (b) (a) (c) (a) (d) (b) (a) (c) (b) (d) (a) (b) (d) (c)

P
41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
(b) (c) (a) (d) (b) (b) (c) (a) (d) (b) (c) (a) (d) (a) (d) (c) (a) (d) (a) (b)
61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
(a) (c) (a) (d) (b) (a) (c) (a) (d) (a) (d) (c) (b) (b) (d) (a) (d) (a) (c) (d)
81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
(a) (c) (c) (c) (a) (d) (d) (b) (c) (a) (b) (a) (b) (d) (a) (c) (c) (d) (d) (b)
101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120
(c) (b) (d) (d) (a) (d) (d) (b) (d) (d) (d) (d) (d) (a) (b) (c) (a) (a) (b) (d)
121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140
(d) (a) (d) (d) (c) (b) (d) (b) (a) (b) (d) (c) (a) (a) (d) (b) (c) (a) (b) (d)
c h a p t e r
6
Information System Layers, Life
Cycle and Modern Technologies
Multiple Choice Questions (MCQs)
APPLICATION SOFTWARE
1. Which of the following statement is true?

D I
6. Which of the following type of application
software provides capabilities required to
support enterprise software systems?

E
(a) Application software has been created to
perform a specific task for a user. (a) Application Suit
(b) Enterprise Software

V
(b) Application software is software that employs

I
the capabilities of a computer directly and (c) Information Worker Software
thoroughly to a task that the user wishes to (d) Enterprise Infrastructure Software

R
perform using a computer. 7. Which of the following type of application
(c) Application software is any program software addresses individual needs required

T
designed to perform a specific function to manage and create information for
directly for the user or, in some cases, for individual projects within departments?
another application program. (a) Application Suit
(d) All of the above

M
(b) Enterprise Software
2. Which of the following is an application
(c) Information Worker Software
software?
(d) Enterprise Infrastructure Software

O
(a) Word processing
(b) Electronic spreadsheet 8. Which of the following type of application

.F
(c) Database software is used to access contents and
(d) All of the above addresses a desire for published digital content
3. Which of the following is an application and entertainment?
software? (a) Content Access Software

O
(a) Email reader (b) Educational Software
(b) Web browser (c) Media Development Software

R
(c) Desktop publishing (d) Information Worker Software

P
(d) All of the above 9. Which of the following type of application
4. Which of the following type of application software holds contents adopted for use by
software has multiple applications bundled students?
together? (a) Content Access Software
(a) Enterprise Software (b) Educational Software
(b) Application Suit
(c) Media Development Software
(c) Enterprise Infrastructure Software
(d) Information Worker Software
(d) Information Worker Software
10. Which of the following type of application
5. Which of the following type of application
software addresses individual needs to generate
software addresses an enterprise’s need and
and print electronic media for others to
data flow in a huge distributed environment?
consumers?
(a) Enterprise Software
(a) Content Access Software
(b) Application Suit
(b) Educational Software
(c) Enterprise Infrastructure Software
(c) Information Worker Software
(d) Information Worker Software
(d) Media Development Software
30 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs I nfor mation Sys tem Layers, Life Cycle and M oder n Technologies 31

11. MS Office 2010, 2013 which has MS-Word, 19. Which of the following is an online data entry (a) Scanner (b) Printer (b) Primary Memory, cache memory, Registers
MS-Excel and MS-Access is an example of device? (c) Joystick (d) Graph plotters (c) Registers, Secondary Memory, cache
____________. (a) OCR (b) OMR memory
(a) Enterprise Software (c) Scanner (d) Touch screen PROCESSING AND MEMORY UNIT (d) RAM, ROM, CMOS
(b) Enterprise Infrastructure Software 20. Which of the following is an output device? 28. The Central Processing Unit (CPU) also 37. Which of the following is a type of Register?
(c) Application Suit known as the processor is the __________ of the
(a) VDU (b) OMR (a) Accumulators (AR)
(d) Information Worker Software computer.
(c) OCR (d) Track ball (b) Instruction Registers (IR)
(a) Heart (b) Soul
12. Email servers and security software are 21.
On-line data entry is when data is (c) Memory Registers (MR)
(c) Brain (d) All of the above

I I
examples of ______________. ____________________. (d) All of the above
(a) Enterprise Software 29. Which of the following is not a functional unit
(a) Stored 38. Primary Memory is of how many types?
of Central Processing Unit (CPU)?

D D
(b) Enterprise Infrastructure Software (b) Shared
(a) Control unit (a) Two (b) Three
(c) Application Suit (c) Input straight into the computer for (c) Four (d) Five

E E
(d) Information Worker Software (b) Input Devices
processing.
(c) Registers 39. Which of the following is a primary memory?
13. Spreadsheets are example of _____________. (d) later transferred from the disk or tape to a

V V
(d) Arithmetic and Logic Unit (a) RAM (b) ROM
(a) Enterprise Software computer for processing

I I
30. In a microcomputer, the entire CPU is on a tiny (c) CMOS (d) All of the above
(b) Enterprise Infrastructure Software 22. _______________________ is usually achieved by
methods known as key-to-disk or key-to-tape. chip called a _________________. 40. The full form of RAM is _____________.

R R
(c) Application Suit
(a) On-line data entry (a) Micro powered unit (a) Random Access Memory
(d) Information Worker Software
(b) Microprocessor (b) Read Access Memory

T T
14. Windows media player is an example of ____. (b) Off-line data entry
(c) Both a and b (c) Micro unit (c) Random Accessible Memory
(a) Content Access Software
(d) None of the above (d) Microchip (d) Random Authorization Memory
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


(b) Educational Software
31. CU stands for ________________. 41. The data written on ______________ cannot be

M M
(c) Information Worker Software 23. Which of the following devices allow movement
on the screen? (a) Control Unit (b) Central Unit modified.
(d) Media Development Software
(a) Mouse (b) Joystick (c) Carbonized Unit (d) Control Unit (a) RAM (b) Virtual memory

O O
15. The threat of viruses invading custom-made (c) Flash Memory (d) ROM
applications is __________. (c) Light pen (d) All of the above 32. All the computer’s resources are managed

.F .F
24. _________________ use rows of needles which from the _______________. 42. ROM stands for _________________________.
(a) Very high (b) Moderate
are made to impact with an ink-ribbon to make (a) ALU (b) CU (a) Random Only Memory
(c) Very less (d) None of the above
the pattern of the required character on the (c) Register (d) All of the above (b) Read Operational Memory
HARDWARE paper. 33. __________________ is the logical hub of the (c) Read Only Memory

O O
16. Which of the following statement is not true? (a) Ink-jet printer (b) Dot-matrix printer computer. (d) Read Oscillation Memory
(a) Hardware is the collection of physical (c) Laser printer (d) All of the above (a) ALU (b) CU 43. _________ is temporary and is erased when

R R
elements that constitutes a computer system. 25. __________________ squirt quick-drying ink (c) Register (d) Terminal computer is switched off.
onto paper to form the shape of the character

P P
(b) Computer hardware refers to the physical 34. Logical operations include which of the (a) RAM (b) ROM
parts or components of a computer. being printed. following operation (c) CMOS (d) All of the above
(c) Monitor is an example of hardware. (a) Ink-jet printer (b) Dot-matrix printer (a) Addition 44. _________________ is made of thin crystal film
(d) Operating System is an example of hardware (c) Laser printer (d) All of the above (b) whether one number is equal to another known as synthetic garnet.
26. ___________________ use a laser beam to create number (a) RAM (b) Bubble Memory
INPUT/ OUTPUT DEVICES
an electric charge which attracts special black (c) Subtraction (c) Flash Memory (d) ROM
17. Optical disk is a _____________. dust to it. (d) Multiplication 45. The Black Strip on the back side of a Credit or
(a) Input device (a) Dot-matrix printer 35. _______________ are internal memory within Debit card is an example of ____________.
(b) Secondary memory device (b) Ink-jet printer CPU, which are very fast and very small. (a) RAM (b) Flash Memory
(c) Output device (c) Laser printer (a) Registers (b) ROM (c) ROM (d) Bubble Memory
(d) Primary memory device (d) All of the above (c) RAM (d) CMOS
18. Which of the following is a direct data entry 27. __________________ are devices which, in 36. There is a huge speed difference between 46. _________________ is non-volatile and can be
device? response to output signals from the computer, ____________ and _________________ to bridge used for auxiliary storage also.
(a) OCR (b) Mouse cause a pen to move across a sheet of paper to these speed differences, we have __________.
produce drawings such as graphs. (a) ROM (b) Bubble memory
(c) Touch screen (d) Key board (a) Registers, Primary Memory, cache memory (c) Flash Memory (d) All of the above
32 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs I nfor mation Sys tem Layers, Life Cycle and M oder n Technologies 33

47. _______________ is a volatile and cannot be used (a) Performing Hardware Function 61. ________________ refers to the amount of data 67. What are the Objectives of DBMS
for auxiliary storage. (b) User Interface which can be sent across a network in given (a) To acquire information
(a) ROM (b) RAM time.
(c) Hardware Independence (b) To assure information quality
(c) Bubble memory (d) Flash Memory (a) Resilience (b) Contention
(d) Memory management (c) To provide software tools so that users in
48. ______________ is an imaginary memory. (c) Routing (d) Bandwidth
55.
Every computer could have different the enterprise can access information they
(a) Virtual memory (b) ROM
specifications and configurations of hardware. 62. ________________ refers to the ability of a require
(c) RAM (d) Bubble Memory
If application developers would have to rewrite network to recover from any kind of error like (d) All of the above
49. When RAM runs low, virtual memory moves

I I
code for every configuration they would be in a connection failure, loss of data, etc. 68. Which of the following statements about DBMS
data from RAM to a space called a _____________.
(a) Debug files (b) Recycle bin big trouble. Which of the following feature of an (a) Routing (b) Bandwidth is true?
operating system deals with the above problem?

D D
(c) Paging file (d) CMOS (c) Resilience (d) Contention (a) It is a collection of programs that enables
(a) Performing Hardware Function users to create and maintain a database.
50. Virtual memory is an allocation of __________ 63. _______________ refers to the situation that

E E
space to help RAM. (b) User Interface (b) It is a general-purpose software system
arises when there is a conflict for some
(c) Hardware Independence that facilitates the processes of defining,
(a) CMOS (b) ROM common resource.

V V
constructing, manipulating, and sharing
(c) Hard disk (d) Bubble memory (d) Memory management

I I
(a) Routing (b) Contention databases among various users and
56. Which of the following is not an example of a applications.
SYSTEM SOFTWARE (c) Bandwidth (d) Resilience
system software?

R R
(c) A conceptual framework that defines
51. Which of the following is an example of a system (a) Microsoft Windows 10 64. In computer networks, _________ refers to the the logical relationships among the data

T T
software? (b) Mac OS X ability of a network to recover from any kind of elements needed to support a basic business
(a) Microsoft Windows 10 (c) Linux error like connection failure, loss of data etc. or other process.
(d) Google Chorme (a) Routing (b) Resilience (d) All of the above
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


(b) Mac OS X

M M
57. GUI stands for ______________________. (c) Contention (d) Bandwidth 69. Which of the following is an objectives of
(c) Linux
(a) Global User Interface DBMS?
(d) All of the above DATABASE MANAGEMENT SYSTEM
(b) Graphical User Interface

O O
(a) To know its information needs;
52. ________________ allows the part of a computer (c) Graphical User Index 65. Which of the following statement about
(b) To acquiring that information;

.F .F
to work together by performing tasks like (d) Graphical User Index database is correct?
transferring data between memory and disks (c) To organize that information in a meaningful
(a) A database system is basically a computer
or rendering output onto a display device. NETWORK way
based record keeping system.
(a) Operating system 58. ________________ is a collection of computers (b) It is the collection of data, usually referred to (d) All of the above

O O
(b) Utility software and other hardware interconnected by as the database, contains information about DATABASEMODELS

R
communication channels that allow sharing of

R
(c) Interpreter one particular enterprise. It maintains any
resources and information. 70. Which of the following term is not used in
(d) Compiler information that may be necessary to the
Relational Database Models?

P P
(a) Computer Network decision-making processes involved in the
53. _______________ helps to analyse, configure, (b) Node (a) Relations (b) Attributes
management of the organization.
optimize and maintain the computer. (c) Terminal (c) Objects (d) Tables
(c) A database may be defined as a collection
(a) Operating system (d) Station of interrelated data stored together to serve 71. Which of these is not an example of Relational
(b) Interpreter 59. A network is an interconnected set of devices multiple applications; the data is stored Database?
(c) Utility software known as _____________. in such a way that it is independent of the (a) Access (b) MySQL
(d) Compiler (a) Nodes (b) Terminals programs which use the data.
(c) Java (d) Oracle
(c) Stations (d) All of the above (d) All of the above
54. Which of the following feature of operating 72. Which of the following is a component of a
system does efficient management of all 60. _______________ refers to the process of 66. What are the Objectives of DBMS
telecommunications network?
peripheral devices, such as printer, hard-disk, deciding on how to communicate the data from (a) To know its information needs
(a) Terminals
scanner, etc. and it also efficiently manages source to destination in a network. (b) To acquiring that information
(b) Telecommunications processors
efficiently different applications/software like (a) Routing (b) Bandwidth (c) To organize that information in a meaningful
MS-Office, printer’s software, etc. (c) Computers
(c) Resilience (d) Contention way
(d) all of the above
(d) All of the above
34 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs I nfor mation Sys tem Layers, Life Cycle and M oder n Technologies 35

73. Which of the following statement about DBMS 79. Which of the following is an advantage of a 85. ____________________ is done to check the (b) System design
is true? DBMS? willingness and ability of management, (c) System investigation
(a) DBMS are software that aid in organizing, (a) Permitting data sharing users and Information Systems staff in the (d) System analysis
controlling and using the data needed by the (b) Minimizing Data Redundancy organisation to build and use the proposed
91. ________________________ implies that while
application programme. (c) Integrity can be maintained system.
the system runs satisfactorily, there is still
(b) They provide the facility to create and (d) All of the above (a) Technical feasibility
room for improvement.
maintain a well-organized database. 80. Which of the following is an advantage of a (b) Operational feasibility
(a) Perfective Maintenance
Applications access the DBMS, which then DBMS? (c) Legal feasibility

I I
(b) Adaptive Maintenance
accesses the data. (a) Program and file consistency (d) Schedule feasibility
(c) Corrective Maintenance
(c) A set of computer programs that controls the (b) User-friendly

D D
86. ____________________ finds out the possibility (d) All of the above
creation, maintenance, and utilization of the (c) Improved security of any conflict between the proposed system

E E
databases of an organization. 92. All systems will need to adapt to changing
(d) All of the above and legal requirements.
(d) All of the above needs within a company.Which of the following
(a) Legal feasibility

V V
ADVANTAGES/ DISADVANTAGE OF A DBMS implies the above said errors?
74. Child record can have _____________ parent

I I
(b) Technical feasibility
record. 81. Which of the following is an advantage of a (a) Perfective Maintenance
(c) Operational feasibility
DBMS? (b) Adaptive Maintenance

R R
(a) One (b) Two
(d) Schedule feasibility
(c) Three (d) Four (a) Achieving program/data independence (c) Corrective Maintenance

T T
87. _____________________ study is done to find out (d) All of the above
75.
Hierarchically structured databases are (b) Integrity can be maintained
that how long this system will take to develop
___________ other database structures. (c) Faster application development 93. Problems frequently surface after a system
and how can it be completed in a desired time
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


(a) More flexible than (d) All of the above has been in use for a short time, however
frame.

M M
thoroughly it was tested. ________________
(b) Flexible enough like 82. Systems Development Life Cycle (SDLC) refers (a) Technical feasibility
states that any errors must be corrected.
(c) Less flexible than to ____________ a system. (b) Operational feasibility

O O
(a) Perfective Maintenance
(d) None of the above (a) Conceiving (b) Designing (c) Legal feasibility

.F .F
(b) Corrective Maintenance
76. A ___________________ is structured into a (c) Implementing (d) All of the above (d) Schedule feasibility
(c) Adaptive Maintenance
series of two-dimensional tables. SOFTWARE/SYSTEM DEVELOPMENT LIFE CYCLE 88. __________________________ is done to measure (d) All of the above
(a) Hierarchical database (SDLC)/ INFORMATION SYSTEM LIFE CYCLE the costs and benefits of the new system.

O O
(b) Relational database 83. Arrange the following phases for developing an (a) Economic feasibility RECENT TECHNOLOGIES/ DEVICES
(c) Object oriented database information system in the correct order: 94. The iPod is a line of portable media players

R R
(b) Technical feasibility
(d) Network database i. System analysis (c) Operational feasibility designed and marketed by ________________.

P P
77. _____________________ is a logical data structure ii. System design (d) Legal feasibility (a) Google (b) Motorola
that allows many-to-many relationships iii. System maintenance (c) Apple (d) Xiomi
89. Coding and testing of the system and
among data records. iv. System investigation 95. Wi-Fi stands for ______________________.
acquisition of hardware and software is done
(a) Network database v. System implementation in which of the following stage of SDLC? (a) Wireless fidelity
(b) Hierarchical database (a) i, ii, iii, iv, v (b) iv, i, ii, v, iii
(a) System analysis (b) Wireless federation
(c) Relational database (c) i, iv, vii, iii (d) iii, iv, v, i, ii
(b) System implementation (c) Wireless fragmentation
84. ____________________ ensures that the
(d) Object oriented database (c) System design (d) 802.11 × Standard of IEEE
organisation has sufficient hardware, software
78.
______________ provide a unique object and personnel resources to develop and (d) System investigation 96. PDA stands for _____________________.
identifier (OID) for each object. support the proposed system. 90.
Examine current business, sending out (a) Personal Digital Assistant
(a) Network database questionnaires and observations of the current
(a) Operational feasibility (b) Private Digital Assistant
(b) Hierarchical database procedures is done in which of the following
(b) Legal feasibility (c) Personal Device Assistant
(c) Object oriented database stage of SDLC?
(c) Technical feasibility (d) Private Device Assistant
(d) Relational database
(d) Schedule feasibility (a) System implementation
36 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs

97. Android is an operating system based on the and reverse pinching to manipulate on-screen
_____________ with a user interface based objects, and a virtual keyboard.
on direct manipulation, designed primarily (a) Mac (b) IOS
for touchscreen mobile devices such as (c) Linux kernel (d) All of the above
smartphones and tablet computers, using
touch inputs, that loosely correspond to real-
world actions, like swiping, tapping, pinching,

D I
V E
R I
T
© Carvinowledge Press (CNP), 2019

O M
Answer Keys - MCQs

.F
O
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
(d) (d) (d) (b) (a) (d) (c) (a) (b) (d) (c) (b) (d) (a) (c) (d) (b) (a) (d) (a)

R
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

P
(c) (b) (d) (b) (a) (c) (d) (d) (b) (b) (a) (b) (b) (b) (a) (a) (d) (b) (d) (a)
41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
(d) (c) (a) (b) (d) (d) (b) (a) (c) (c) (d) (a) (c) (a) (c) (d) (b) (a) (d) (a)
61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
(d) (c) (b) (b) (d) (d) (d) (d) (d) (c) (c) (d) (d) (a) (c) (b) (a) (c) (d) (d)
81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97
(d) (d) (b) (c) (b) (a) (d) (a) (b) (d) (a) (b) (b) (c) (d) (a) (c)
c h a p t e r
7
Telecommunications
and Networks

I
Multiple Choice Questions (MCQs)

D
NETWORKING AN ENTERPRISE intranets, and inter-organizational extranets
1. The Internet and Internet-like networks inside to support electronic business and commerce,

E
the enterprise are called ________________. enterprise collaboration, and strategic
advantage in local and global markets.
a. Intranets b. Extranets

V
(a) Industry trend
c. Setranets d. Telnets

I
(b) Technology trend
2. The Internet and Internet-like networks
(c) Application trend

R
between an enterprise and its trading partners
are called _________________. (d) All of the above

T
a. Intranets b. Setranets 7. A telecommunications network is a collection
c. Extranets d. Telnets of _______________.
(a) Terminal nodes
TRENDS IN TELECOMMUNICATION (b) Links

M
3. Which of the following is a potential trend in (c) Any intermediate nodes
tele-communication? (d) All of the above

O
(a) Industry trend 8. ____________________ are information systems

.F
(b) Technology trend that use common standards for hardware,
(c) Application trend software, applications, and networking.
(d) All of the above (a) Open systems (b) Middleware
4. ________________ are the trends towards more (c) Multiplexers (d) Synchronisers

O
competitive vendors, carriers, alliances, and 9. __________________________ is a general term
network services, accelerated by deregulation for any programming that serves to glue

R
and the growth of the Internet and the together or mediate between two separate, and
WorldWide Web. usually already existing, programs.

P
(a) Industry trend (a) Middleware (b) Multiplexers
(b) Technology trend (c) Open systems (d) Synchronisers
(c) Application trend 10.
_________________________ is commonly
(d) All of the above known as the plumbing of an information
5. ____________________ is the trend towards system because it routes data and information
extensive use of Internet, digital fiber-optic, transparently between different back-end data
and wireless technologies to create high-speed sources and end-user applications.
local and global internet works for voice, data, (a) Middleware (b) Open systems
images, audio, and video communications. (c) Multiplexers (d) Synchronisers
(a) Industry trend 11. What are the advantages of a Computer
(b) Technology trend Network in an Organization?
(c) Application trend (a) File Sharing
(d) All of the above (b) Remote access
6. ______________________ is the trend towards (c) Resource Sharing
the pervasive use of the Internet, enterprise (d) All of the above
38 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Telecommu nications and Net wor ks 39

TELECOMMUNICATION NETWORK (a) Multiplexer (b) NIC 27.


_______________________ are an invisible 34. Radio waves are most commonly used
12. Which of the following is a component in a (c) Modem (d) Switch form of electromagnetic radiation that varies transmission media in the __________________.
telecommunications network? in wavelength from around a millimetre to (a) LAN (b) MAN
INTERNETWORK PROCESSOR 100,000 km. (c) WAN (d) PAN
(a) Terminals
20. ___________ is a communications processor (a) Terrestrial microwave
(b) Tele-communications processors FUNCATIONAL BASED CLASSIFICATION
that interconnects networks based on different (b) Radio waves
(c) Tele-communications channels rules or protocols, so that a telecommunications (c) Microwaves 35. Which of the following is functional based
(d) All of the above message can be routed to its destination. classification of telecommunication network?
(d) Infrared waves
13. _______________ are the starting and stopping (a) NIC (b) Router (a) Client-Server (b) Peer-to-Peer

I I
points in any telecommunication network 28. _______________________ are most commonly
(c) Modem (d) Gateway used transmission media in the wireless Local (c) Multi-Tier (d) All of the above
environment.
(a) Terminals 21. ____________________ is the process of deciding Area Networks. 36. Which of the following is functional based

D D
(b) Tele-communications processors on how to communicate the data from source (a) Terrestrial microwave classification of telecommunication network?
to destination, in a network.

E E
(c) Tele-communications channels (b) Microwaves (a) Client-Server
(d) Telecommunication software (a) Routing (b) Multiplexing (c) Radio waves (b) Public Network
(c) Virtualisation (d) Resilience

V V
14. __________________________ support data (d) Infrared waves (c) Private Network

I I
transmission and reception between terminals 22. A ____________ is a gizmo that gives your (d) Metropolitan Area Network (MAN)
29. Microwaves have wavelengths ranging from as
and computers by providing a variety of control network signals a boost so that the signals can 37. Which of the following is ownership-based
long one meter to as short as one millimetre,

R R
and support functions. travel farther. classification of telecommunication network?
or equivalently, with frequencies between 300
(a) Terminals (a) Hub (b) Switch MHz (0.3 GHz) and 300 GHz. (a) Public Network

T T
(b) Tele-communications processors (c) Repeater (d) Bridge (b) Private Network
(a) Communication satellite
(c) Tele-communications channels (c) Virtual Private Network (VPN)
TELECOMMUNICATION MEDIA/ CHANNELS (b) Terrestrial microwave
(d) Telecommunication software (d) All of the above
(c) Infrared waves
TELECOMMUNICATION PROCESSOR 23. Which of the following is a type of guided

M M
(d) Microwaves 38. Which of the following is ownership-based
15. _______________ is a card installed in a computer media? classification of telecommunication network?
that enables the computer to communicate (a) Twisted Pair Copper Cable 30. A satellite is some solar-powered electronic (a) Virtual Private Network (VPN)

O O
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


over a network. (b) Coaxial Copper Cable device that _______________ signals.
(b) Public Network
(a) NIC (b) Modem (a) Receives (b) Amplifies

.F .F
(c) Fibre Optic Cable (c) Multi-Tier
(c) Multiplexer (d) Switch (d) All of the above (c) Retransmits (d) All of the above (d) Metropolitan Area Network (MAN)
16. ____________________ is a device that converts 39. A _________________ is defined as a network
signals the computer understands into signals 24. Which of the following is a type of guided TYPE OF TELECOMMUNICATION NETWORK
media? shared and accessed by users not belonging to
that can be accurately transmitted over the

O O
AREA BASED CLASSIFICATION a single organization.
phone to another modem, which converts the (a) Fibre Optic Cable
31. Which of the following is Area Coverage Based (a) Public data network
signals back into their original form. (b) Infrared Waves

R R
Classification of telecommunication network? (b) Private data network
(a) Hub (b) Modem (c) Communication Satellites
(a) Local area Network (LAN) (c) Virtual data network
(d) Micro Waves

P P
(c) Multiplexer (d) NIC (d) none of the above
(b) Metropolitan Area Network (MAN)
17. _______________________ is a form of data 25. Which of the following is a type of unguided 40. _________________________ consists of two or
transmission in which one communication media? (c) Wide Area Network (WAN)
more internal networks (or intranets) which
channel carries several transmissions at the (a) Terrestrial Microwave (d) All of the above can communicate securely as if all internal
same time. (b) Radio Waves 32. ______________________ is a network that spans hosts from different intranets belonged to the
(a) Hub (b) Modem (c) Micro Waves a large geographic territory, such as an entire same virtual network.
(c) NIC (d) Multiplexer city, region, or even an entire country. (a) Public data network
(d) All of the above
18. Modem is an abbreviation of _________________. (a) WAN (b) LAN (b) Private data network
26. ______________________ transmits high-speed
(a) Modern-demodulator (c) PAN (d) MAN (c) Virtual data network
radio signals in a line-of-sight path between
(b) Mechanised-demodulator relay stations spaced approximately 30 miles 33. Which of the following is Area Coverage Based (d) none of the above
(c) Modulator-demodulator apart. Classification of telecommunication network? 41. ___________________ covers areas such as
(d) None of the above (a) Terrestrial microwave (a) Virtual Private Network (VPN) Offices, Classrooms, Buildings, Manufacturing
(b) Radio waves (b) Multi-Tier plant etc.
19. _______________ is a device that combines large
number of low speed transmission lines into (c) Microwaves (c) Wide Area Network (WAN) (a) WAN (b) PAN
high speed line. (d) Infrared waves (d) Peer-to-Peer (c) LAN (d) MAN
40 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Telecommu nications and Net wor ks 41

42. The network computer that contains the hard characteristic of Client-Server architecture has MULTI TIER ARCHITECTURE (c) It is impractical for an organization which
drives, printers, and other resources that are been highlighted in the above phrase? 56. A single computer that contains a database and requires two or more users to interact with
shared with other network computers is called (a) Shared Resources a front end to access the database is known as the organizational data stores at the same
a ___________________. (b) Transparency of Location ___________________. time.
(a) Node (b) Server (c) Scalability (a) Client-Server (b) Peer-to-Peer (d) All of the above
(c) Client (d) User (d) Integrity (c) Multi-Tier (d) Single-tier 64. Which of the following is an objective of
43. Any computer that’s not a ____________ is called applying control in e-commerce environment?
52. Client-Server software usually masks the 57. A ____________ system requires only one stand-
a client. location of the server from the clients by (a) Prevent loss of Computer Hardware,
alone computer.
Software and Personnel

I I
(a) Node (b) Server redirecting the service calls when needed. (a) One-tier (b) Two-tier
(c) Client (d) User Which of the following characteristic of Client- (b) Prevent from high costs of computer Error
(c) Three-tier (d) N-tier (c) Safeguard assets from un-authorized access
Server architecture has been highlighted in the

D D
44. A ____________ is a device that is connected to 58. A single computer that contains a database and
above phrase? (d) All of the above
the network. a front end to access the database is known as
(a) Shared Resources 65. Which of the following is a disadvantage of a

E E
(a) Node (b) Packet ________.
(b) Transparency of Location two- tier architecture?
(c) Topology (d) All of the above (a) One-tier (b) Two-tier (a) Processing is shared between the client

V V
45. A __________________ is a message that is sent (c) Scalability
(c) Three-tier (d) N-tier and server, so more users can interact with

I I
over the network from one node to another (d) Integrity system.
node. 59. A ____________ system consists of a client and a
53.
The ideal Client-Server software is server. (b) Performance deteriorates if number of users

R R
(a) Node (b) Packet independent of hardware or Operating System is greater than 100.
(c) Topology (d) All of the above (a) One-tier (b) Two-tier
software platforms. Which of the following (c) Limited functionality in moving the program

T T
46. Client computers can be classified as characteristic of Client-Server architecture has (c) Three-tier (d) N-tier
or programs across servers.
_____________________. been highlighted in the above phrase? 60. In ______________ system, the database is (d) Both b and c
(a) Fat (b) Thin (a) Shared Resources stored on the server, and the interface used to
(c) Hybrid (d) All of the above access the database is installed on the client. 66. A ____________ system can handle users only

M M
(b) Transparency of Location up to 100.
47. A ______________________ is a client that (c) Scalability (a) Two-tier (b) One-tier
performs the bulk of any data processing (a) One-tier (b) Three-tier
(d) Mix and match (c) Three-tier (d) N-tier

O O
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


operations itself, and does not necessarily rely (c) Two-tier (d) N-tier
54. In a Client-Server architecture environment, 61. In _______________ system, the user system
on the server. 67. Which of the following is an advantage of 3 tier

.F .F
client workstations can either be added or interface is usually located in the user’ desktop
(a) Fat client (b) Thin client and the database management services are architecture, as compared to two tier system?
(c) Hybrid client (d) All of the above removed and also the server load can be
usually in a server which is a more powerful (a) Improved scalability
distributed across multiple servers. Which of
48. A ______________________ is a client that machine that services many clients. (b) Improved data integrity
the following characteristic of Client-Server
performs the bulk of any data processing

O O
architecture has been highlighted in the above (a) One-tier (b) Three-tier (c) Improved security
operations itself, and does not necessarily rely
phrase? (c) Two-tier (d) N-tier (d) All of the above
on the server.

R R
(a) Fat client (b) Thin client (a) Shared Resources 62. Which of the following is an advantage of single
OWNERSHIP BASED CLASSIFICATION
(c) Hybrid client (d) All of the above (b) Transparency of Location tier architecture?

P P
(c) Scalability (a) It also requires only one installation of 68. A _______________________ is defined as a
49. __________________ use the resources of the network shared and accessed by users not
host computer. (d) Integrity proprietary software which makes it the
most cost-effective system available. belonging to a single organization.
(a) Fat client (b) Thin client 55. The server code and server data is centrally
(b) Can be used by only one user at a time. (a) Public data network
(c) Hybrid client (d) All of the above managed, which results in cheaper
(c) A single tier system is impractical for an (b) Private data network
50. A ________________ generally only presents maintenance and the guarding of shared
data integrity. At the same time, the clients organization which requires two or more (c) Virtual private network
processed data provided by an application
remain personal and independent. Which of users to interact with the organizational data (d) All of the above
server, which performs the bulk of any required
data processing. the following characteristic of Client-Server stores at the same time. 69. ______________ is a network established
(a) Fat client (b) Thin client architecture has been highlighted in the above (d) All of the above and operated by a telecommunications
phrase? 63. Which of the following is a disadvantage of a administration, or a recognized private
(c) Hybrid client (d) All of the above
(a) Shared Resources single tier architecture? operating agency, for the specific purpose of
TYPES OF TELECOMMUNICATION NETWORK (b) Transparency of Location (a) A single-tier system requires only one stand- providing data transmission services for the
(c) Scalability alone computer. public.
51. A server can service many clients at the
same time and regulate their access to the (d) Integrity (b) It also requires only one installation of (a) Public data network
shared resources. Which of the following proprietary software which makes it the (b) Private data network
most cost-effective system available. (c) Virtual private network
(d) All of the above
42 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Telecommu nications and Net wor ks 43

70. ________________________ provide businesses, (c) Grid computing 82. Which of the following is not a disadvantage of 89. In ______________________, each character is
government agencies and organizations of (d) Centralized computing mesh topology? sent at irregular intervals in time as in the case
all sizes a dedicated network to continuously (a) It is very difficult to diagnose network of characters entered at the keyboard in real
76. _________________________ is the allocation
receive and transmit data critical to both the problems. time.
of resources, both hardware and software, to
daily operations and mission critical needs of (b) Adding or replacing a node will disturb the (a) Serial transmission
each individual workstation, or office location
the organization. entire network. (b) Parallel transmission
which are capable of running independently of
(a) Public data network each other. (c) The cost of installation and maintenance is (c) Asynchronous transmission
(b) Private data network (a) Cloud computing high (more cable is required than any other (d) Synchronous transmission
(c) Virtual private network topology)

I I
(b) Decentralised computing 90. In __________________, the transmitter and
(d) All of the above (c) Grid computing (d) If there is a problem with main cable, the receiver are paced by the same clock.
71. A ______________________emulates a private entire network goes down.
(d) Centralized computing (a) Serial transmission

D D
network over public or shared and therefore
77. ___________________________ enable file sharing TRANSMISSION MODES (b) Parallel transmission
insecure infrastructures.

E E
and all computers can share peripherals such 83. In which of the following mode of transmission, (c) Asynchronous transmission
(a) Public data network as printers and scanners as well as modems, data can be communicated in both the (d) Synchronous transmission
(b) Private data network

V V
allowing all the computers in the network to directions but one at a time.
TRANSMISSION TECHNIQUES

I I
(c) Virtual private network connect to the Internet.
(a) Simplex (b) Half duplex
(d) All of the above (a) Cloud systems 91. In this ______________________ transmission
(c) Full duplex (d) All of the above

R R
72. ________________________ consists of two or (b) Decentralised systems technique a permanent path is establish
84. TV advertisement is an example of which of the between sender and receiver for the duration
more internal networks (or intranets) which (c) Grid systems

T T
following type of transmission? of data communication.
can communicate securely as if all internal (d) Centralized systems
hosts from different intranets belonged to the (a) Simplex (b) Half duplex (a) Circuit switching
same virtual network. NETWORK TOPOLOGY (c) Full duplex (d) All of the above (b) Message switching
85. Walky-talky is an example of which of the

M M
(a) Public data network 78. In ___________________ the nodes are strung (c) Packet switching
(b) Virtual private network together in a line. following type of transmission? (d) All of the above
(c) Private data network (a) Bus topology (b) Mesh topology (a) Simplex (b) Half duplex
92. ____________________ is the oldest

O O
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


(d) All of the above (c) Star topology (d) Ring topology (c) Full duplex (d) All of the above technique of data communication and this

.F .F
79. In a _______________, packets are sent around 86. Mr. Jack Welch was talking to his secretary on technique provide inefficient utilization of
NETWORK COMPUTING his smartphone, this type of transmission of communication channel.
the circle from computer to computer.
73. In network computing, network computers (a) Bus topology (b) Mesh topology data is called ___________________. (a) Message switching
and other thin clients provide a browser-based (a) Simplex (b) Half duplex (b) Circuit switching
(c) Star topology (d) Ring topology

O O
user interface for processing small application (c) Full duplex (d) All of the above
80. ________________ has multiple connections (c) Packet switching
programs called ________________.
between each of the nodes on the network (d) All of the above

R R
(a) Astrolls (b) Batrals TRANSMISSION TECHNOLOGY
(c) Applets (d) Ballets (a) Bus topology (b) Mesh topology 93. ___________________ is the latest technique of
87. In ________________, the bits of each byte are

P P
(c) Star topology (d) Ring topology data communication.
74. _____________________________ is computing sent along a single path one after another.
81. Which of the following is an advantage of ring (a) Message switching
done at a central location, using terminals that (a) Serial transmission
are attached to a central computer. topology? (b) Circuit switching
(b) Parallel transmission
(a) Centralized computing (a) It requires least amount of cable to connect (c) Packet switching
(c) Asynchronous transmission
(b) Cloud computing the computers together. (d) All of the above
(d) Synchronous transmission
(c) Decentralised computing (b) This topology is very reliable. If direct link 94. In this technique the data is communicated
between 2 nodes breaks down, there exists 88. In ________________, there are separate,
(d) Grid computing in the form of packets between sender and
an alternate path. parallel paths corresponding to each bit of the
receiver.
75. In _________________________, the computer byte so that all character bits are transmitted
(c) It is more reliable since communication (a) Packet switching
itself may control all the peripherals directly simultaneously.
between 2 computers is not dependent on a (b) Message switching
(if they are physically connected to the central single host computer. (a) Serial transmission
computer) or they may be attached via a (b) Parallel transmission (c) Circuit switching
(d) It is easy to extend the network. 2 Cables can
terminal server. (c) Asynchronous transmission (d) All of the above
be joined together with a connector, making
(a) Cloud computing a longer cable. With this more number of (d) Synchronous transmission
(b) Decentralised computing computers can be connected to the network.
44 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Telecommu nications and Net wor ks 45

95. In this technique many packets of common network nodes and a means for data to be sent 111. The _____________________ which provides an 118. ______________________ threats originate from
destinations are combined together in the form over the Physical layer in the form of packets? interface to the network hardware and device individuals who are highly motivated and
of a message for communication to a common (a) Data Link (b) Physical drivers. technically competent and usually understand
destination. (c) Network (d) Transport (a) Application Layer network systems design and the vulnerabilities
(a) Packet switching (b) Transport Layer of those systems.
103. Which of the following layer of the OSI model
(b) Message switching (c) Internet Layer (a) Structured (b) Unstructured
handles routing of data across network
(c) Circuit switching segments? (d) Network Interface Layer (c) Internal (d) External
(d) All of the above (a) Physical (b) Data Link 112. _______________________ can also be called the 119.
_____________________ threats originate
from individuals or organizations working

I I
(c) Network (d) Transport Data Link Layer.
NETWORK ARCHITECTURE AND PROTOCOLS outside an organization, which does not have
104. Which of the following layer of the OSI model (a) Application Layer
96. ___________________ refers to the layout of the authorized access to organization’s computer

D D
provides for reliable delivery of packets? (b) Network Interface Layer systems or network.
network, consisting of the hardware, software,
connectivity, communication protocols (a) Physical (b) Data Link (c) Transport Layer (a) Structured (b) Unstructured

E E
and mode of transmission, such as wired or (c) Network (d) Transport (d) Internet Layer (c) Internal (d) External
wireless. 105. Which of the following layer of the OSI
TCP/IP PROTOCOL SUITE 120. ___________________ threats originate from

V V
(a) Network architecture model establishes sessions between network individuals who have authorized access to the

I I
(b) Protocols applications? 113. TCP stands for _________________.
network.
(c) Layout (a) Session (b) Presentation (a) Transmission Control Protocol

R R
(a) Structured (b) Unstructured
(d) All of the above (c) Application (d) Physical (b) Transport Control Protocol
(c) Internal (d) External
(c) Transmission communication Protocol

T T
97. A ______________ is a set of rules that enables 106. Which of the following layer of the OSI model 121. A vulnerability is an inherent weakness in
effective communications to occur. converts data so that systems that use different (d) Transport communication Protocol
the _____________ of a network or system that
(a) Network architecture data formats can exchange information? 114. __________________________, the protocol on renders it susceptible to a threat.
(a) Session (b) Application which the Internet is built, is actually not a

M M
(b) Protocols (a) Design (b) Configuration
(c) Presentation (d) Physical single protocol but rather an entire suite of
(c) Layout (c) Implementation (d) All of the above
related protocols.
(d) All of the above 107. Which of the following layer of the OSI model 122. Buffer overflow, failure to handle exceptional

O O
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


allows applications to request network (a) TCP/IP (b) HTTPS
98. Which of the following type of protocol is a (c) HTTP (d) SSH conditions, access validation error, input
services?

.F .F
format of data, character set used, type of error validation errors are examples of _________.
correction used, and type of encoding scheme (a) Session (b) Application 115. TCP is a _________________________ transport
(a) Timing Windows
used? (c) Presentation (d) Physical layer protocol.
(b) Software bugs
(a) Syntax (b) Semantics 108. The ________________ which provides services (a) Connection oriented
(c) Insecure default configurations

O O
(c) Timing (d) None of the above directly to the users such as e-mail. (b) Application oriented
(d) Bad Protocols
(a) Transport Layer (c) Network oriented
99. Which of the following type of protocol is a type 123. _____________________ may occur when a

R R
and order of messages used to ensure reliable (b) Internet Layer (d) Data link oriented
temporary file is exploited by an intruder to
and error free information transfer? (c) Application Layer gain access to the file, overwrite important

P P
NETWORK RISKS, CONTOLS AND SECURITY
(a) Syntax (b) Semantics (d) Network Interface Layer data, and use the file as a gateway for advancing
116. Computer and network security is implemented
(c) Timing (d) None of the above 109. The _________________ which provides end-to- further into the system.
________________________.
100. Which of the following type of protocol defines end communication between applications and (a) Timing Windows
(a) To protect company assets
data rate selection and correct timing for verifies correct packet arrival. (b) Software bugs
(b) To gain a competitive advantage
various event a during data transfer? (a) Application Layer (c) Insecure default configurations
(c) To comply with regulatory requirements and
(a) Syntax (b) Semantics (b) Transport Layer judicial responsibilities (d) Bad Protocols
(c) Timing (d) None of the above (c) Internet Layer (d) All of the above 124. ______________________ occur when vendors
(d) Network Interface Layer use known default passwords to make it as
THE OSI MODEL THREATS AND VULNERABILITES
110. The ___________________ which provides packet easy as possible for consumers to set up new
101. Which of the following layer of the OSI model routing for error checking and addressing and 117. ____________________ threats originate mostly systems.
governs the layout of cables and devices such integrity. from inexperienced individuals using easily (a) Software bugs
as repeaters and hubs? available hacking tools from the Internet.
(a) Internet Layer (b) Timing Windows
(a) Data Link (b) Physical (a) Structured (b) Unstructured
(b) Application Layer (c) Insecure default configurations
(c) Network (d) Transport (c) Internal (d) External
(c) Transport Layer (d) Bad Protocols
102. Which of the following layer of the OSI model (d) Network Interface Layer
provides MAC addresses to uniquely identify
46 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Telecommu nications and Net wor ks 47

LEVELS OF SECURITY 132.


____________________ is the process of 140. SFTP stands for ___________________. (c) Operation (d) Provisioning
125. Report generation includes ___________. transforming information to make it (a) Secure Field Transfer Protocol 147. ___________________ deals with keeping track
unreadable to anyone except those possessing (b) Secure File Transfer Protocol of resources in the network and how they are
(a) Documenting the findings of the review
the key. assigned.
(b) Recommending new asset safeguarding (c) Secure File Transmission Protocol
(a) Encryption (b) Decryption (a) Operation (b) Administration
techniques (d) Secure File Transport Protocol
(c) Cryptanalysis (d) All of the above (c) Maintenance (d) Provisioning
(c) Recommending the levels of security to 141. _________________ are systems which control
be followed for individual end users and 133. Which of the following statement about the flow of traffic between the Internet and the 148. ___________________________ includes all the
systems. encryption is true? Firm’s internal LANs and systems. “housekeeping” that is necessary to keep the

I I
(d) All of the above (a) It is the process of transforming information (a) Anti-virus (b) SSL network under control.
to make it unreadable to anyone except those (a) Administration (b) Operation
126. _________________ is the process of proving (c) HTTPS (d) Firewalls
possessing a key

D D
one’s identity. 142. Which of the following is a feature of a good (c) Maintenance (d) Provisioning
(b) It is the changing of plaintext into cipher-
(a) Privacy/confidentiality firewall? 149.
_____________________ is concerned with
text.

E E
(b) Integrity (a) All traffic between the outside network and performing repairs and upgrades.
(c) It is the reverse process of decryption.
(c) Authentication the organizations Intranet must pass through (a) Operation (b) Administration
(d) All of the above

V V
(d) Non-repudiation the Firewall. (c) Maintenance (d) Provisioning

I I
134. The result of the process is encrypted (b) Only authorized traffic between the
127. ____________________ refers to ensuring that no information is referred to as ____________. 150.
_________________ is concerned with
one can read the message except the intended organization and the outside, as specified configuring resources in the network to

R R
(a) Plain text (b) Key by formal Security Policy, is allowed to pass
receiver. support a given service.
(c) cipher text (d) none of the above through the Firewall.

T T
(a) Authentication (a) Operation (b) Administration
135. The reverse procedure of encryption is called (c) The Firewall must be immune to penetration
(b) Privacy/confidentiality (c) Maintenance (d) Provisioning
________________. from both outside and inside the
(c) Integrity organization. 151. The goal of _______________________ is to
(a) Cryptanalysis (b) Decryption
(d) Non-repudiation recognize, isolate, correct and log faults that

M M
(c) Either a or b (d) Both a and b (d) All of the above
128. ___________________ ensures the receiver that occur in the network.
136. Which of the following statement about 143.
___________________ is a software-based
the received message has not been altered in (a) Accounting management
approach that prohibits access to certain

O O
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


any way from the original. decryption is true? (b) Configuration management
Web sites that are deemed inappropriate by
(a) The reverse procedure of encryption is called

.F .F
(a) Integrity management. (c) Fault management
decryption
(b) Authentication (a) Site Blocking (b) HID (d) Performance Management
(b) In decryption, when cipher text is applied
(c) Privacy/confidentiality (c) NID (d) NNID 152. __________________________________ monitors
to decryption also then original plaintext is
(d) Non-repudiation generated. 144.
________________________ are designed to network and system configuration information

O O
129. ______________________ refers to a mechanism monitor, detect and respond to user and system so that the impact on network operations
(c) Keys are used to decrypt a message.
to prove that the sender really sent this activity and attacks on a given host. (hardware and software elements) can be

R R
(d) All of the above tracked and managed.
message. (a) Firewall (b) HID
137. Keys are used to _______________ a message. (a) Fault management
(a) Authentication (c) NID (d) NNID

P P
(a) Encrypt (b) Decrypt (b) Accounting management
(b) Privacy/confidentiality
(c) Integrity
(c) Both a and b (d) None of the above NETWORK ADMINISTRATION AND MANAGEMENT (c) Configuration management
(d) Non-repudiation 138. Encryption and Decryption algorithms are 145. Network management refers to the activities, (d) Performance Management
__________ but keys may be and may not be methods, procedures, and tools that pertain 153. ________________________ is concerned with
NETWORK SECURITY TECHTNTIQUES _________________. to the _______________________ of networked tracking network utilization information, such
130. Cryptography ___________________. (a) Different, same (b) Different, different systems. that individual users, departments, or business
(a) Protects data from theft alteration (c) Same, same (d) Same, different (a) Operation (b) Administration units can be appropriately billed or charged for
(c) Maintenance (d) All of the above accounting purposes.
(b) Protects data from theft NETWORK SECURITY PROTOCOLS
146. _________________ deals with keeping the (a) Fault management
(c) Can also be used for user authentication
139. HTTPS stands for ____________________. network (and the services that the network (b) Accounting management
(d) All of the above
(a) Secure Hypertext Transmission Protocol provides) up and running smoothly. (c) Performance Management
131. _________________________ is the study of (b) Secure Hypertext Transport Protocol (a) Administration (b) Maintenance (d) Configuration management
techniques to defeat cryptographic techniques.
(c) Secure Hypertext Transfer Protocol
(a) Encryption (b) Decryption
(d) Secure Hypertext Transfer Protocol
(c) Cryptanalysis (d) All of the above
48 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs

154. ____________________ measures and makes 155. ___________________________ controls access


network performance data available so to network resources as established by
that performance can be maintained and organizational security guidelines.
acceptable thresholds. (a) Fault management
(a) Performance Management (b) Accounting management
(b) Fault management (c) Security Management
(c) Accounting management (d) Configuration management
(d) Configuration management

D I
V E
R I
T
O M
© Carvinowledge Press (CNP), 2019

.F
Answer Keys - MCQs

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
(a) (c) (d) (a) (b) (c) (d) (a) (a) (b) (d) (d) (a) (b) (a) (b) (d) (c) (a) (b)

O
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

R
(d) (c) (d) (a) (d) (a) (b) (c) (d) (d) (d) (a) (c) (a) (d) (a) (d) (b) (a) (c)
41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60

P
(c) (b) (b) (a) (b) (d) (a) (a) (b) (b) (a) (b) (d) (c) (d) (d) (a) (a) (b) (a)
61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
(c) (a) (c) (d) (d) (c) (d) (a) (b) (b) (c) (b) (c) (a) (d) (b) (b) (a) (d) (b)
81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
(c) (d) (b) (a) (b) (c) (a) (b) (c) (d) (a) (b) (c) (a) (b) (a) (b) (a) (b) (c)
101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120
(b) (a) (c) (d) (a) (c) (b) (c) (b) (a) (d) (b) (a) (a) (c) (d) (a) (b) (d) (c)
121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140
(d) (b) (a) (c) (d) (c) (b) (a) (d) (d) (c) (a) (d) (c) (b) (d) (c) (a) (c) (b)
141 142 143 144 145 146 147 148 149 150 151 152 153 154 155
(d) (d) (a) (b) (d) (c) (b) (a) (c) (d) (c) (b) (d) (a) (c)
c h a p t e r
8

Internet and other Technologies

I
Multiple Choice Questions (MCQs)

D
THE INTERNET REVOLUTION (d) Credit authorization at the point of sale using
1. Which of the following is not a feature of the online POS networks.

E
Internet? 4. Which of the following is an example of
(a) It does not have a central computer system business application of telecommunication

V
or telecommunications centre. network to overcome cost barriers?

I
(b) Instead, each message sent on the Internet (a) Use the Internet and extranets to transmit
has a unique address code so any Internet customer orders from traveling sales

R
server in the network can forward it to its people to a corporate data centre for order
destination. processing and inventory control.

T
(c) It does not have a headquarters. (b) Desktop video conferencing between a
(d) Its use is declining from time to time. company and its business partners using the
Internet, intranets, and extranets.
2. Which of the following is an example of

M
(c) Credit authorization at the point of sale using
business application of telecommunication
online POS networks.
network to overcome geographic barriers?
(d) Business-to-business electronic commerce

O
(a) Use the Internet and extranets to transmit
Web sites for transactions with suppliers and
customer orders from traveling sales

.F
customers using the Internet and extranets.
people to a corporate data centre for order
processing and inventory control. 5. Which of the following is an example of
(b) Credit authorization at the point of sale using business application of telecommunication
online POS networks. network to overcome structural barriers?

O
(c) Desktop video conferencing between a (a) Use the Internet and extranets to transmit
company and its business partners using the customer orders from traveling sales

R
Internet, intranets, and extranets. people to a corporate data centre for order
processing and inventory control.
(d) Business-to-business electronic commerce

P
Web sites for transactions with suppliers and (b) Credit authorization at the point of sale using
customers using the Internet and extranets. online POS networks.
(c) Business-to-business electronic commerce
3. Which of the following is an example of
Web sites for transactions with suppliers and
business application of telecommunication
customers using the Internet and extranets.
network to overcome time barriers?
(d) Desktop video conferencing between a
(a) Use the Internet and extranets to transmit
company and its business partners using the
customer orders from traveling sales
Internet, intranets, and extranets.
people to a corporate data centre for order
processing and inventory control. NETWORK AND THE INTERNET
(b) Desktop video conferencing between a 6. _________________ is a company’s private
company and its business partners using the network accessible only to the employees of
Internet, intranets, and extranets. that company.
(c) Business-to-business electronic commerce (a) Extranet
Web sites for transactions with suppliers and
(b) Intranet
customers using the Internet and extranets.
(c) Internet architecture
50 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs I nter net and other Technologies 51

(d) Internet 14. ___________ supports data rate of about 3 Mbps. INTRANET AND EXTRANET 27. It provides low cost online services to the
7. The purpose of ________________________ is to (a) ASDL connection 21. __________________ is an internal corporate organizations’ __________.
distribute data or information to employees, (b) VSDL connection network built using Internet and World Wide (a) Employees (b) Owners
to make shared data or files available, and to (c) SDSL connection Web standards and products. (c) Associates (d) Partners
manage projects within the company. (d) All of the above (a) Extranet E-COMMERCE
(a) Extranet (b) Intranet 28. Which of the following organizations are open
15. VDSL Connection stands for ______________.
(b) Internet architecture (c) Internet architecture of for 24x7x365?
(a) Very High Digital Subscriber Language
(c) Internet (d) Internet (a) E-commerce
(b) Very High Digital Subscriber Line

I I
(d) Intranet 22. __________________ are network links that (b) Traditional commerce
(c) Virtual High Digital Subscriber Line
8. An ________________ offers access to selected use Internet technologies to interconnect (c) Both a and b
(d) Virtual High Digital Subscriber Language
the intranet of a business with the intranets

D D
outsiders (d) None of the above
16. What is the business use of the Internet? of its customers, suppliers, or other business
(a) Extranet 29. Which of the following is an advantage of
(a) Strategic business alliances partners.

E E
(b) Internet architecture e-commerce?
(b) Providing customer and vendor support (a) Extranet
(c) Internet (a) Increases the profit margin of manufacturers.
(b) Intranet

V V
(c) Collaboration among business partners
(d) Intranet (b) Allows manufacturers to give discounts to

I I
(d) All of the above (c) Internet architecture
9. _______ allow business partners to exchange customers.
(d) Internet
information. 17. What is the business use of the Internet? (c) Customers get better prices.

R R
23. Companies use Extranets to ___________.
(a) Internet architecture (a) Buying and selling products and services (d) All of the above
(a) Share product Catalogues exclusively with
(b) Marketing, sales, and customer service

T T
(b) Internet wholesalers or Retailers in the Distribution 30.
In e-commerce customer interaction is
applications Channel _________________.
(c) Intranet
(c) Growth of cross-functional business (b) Collaborate with other Companies on joint (a) Screen to face (b) Screen to screen
(d) Extranet
applications development efforts (c) Face to face (d) All of the above

M M
INTERNET APPLICATIONS (d) All of the above (c) Provide or access services provided by one
31. Which of the following is a benefit to customers,
10. ADSL stands for ____________________. 18. What is the business use of the Internet? Company to a group of other Companies
given by e-commerce?

O O
(a) Asymmetric Digital Subscriber Language (a) Emergence of applications in engineering, (d) All of the above
(a) Various options
manufacturing, human resources and 24. Companies use Extranets to _________________.

.F .F
(b) Algometrical Digital Subscriber Line (b) Time saving
accounting. (a) Jointly develop and use Training Programs
(c) Asymmetric Digital Subscriber Line (c) Reviews and coupons available
(b) Enterprise communications and with other Companies
(d) Algometrical Digital Subscriber Language (d) All of the above
collaboration (b) Provide or access services provided by one
11. _____________________ supports a data rate of (c) Attracting new customers with innovative Company to a group of other Companies 32. Which of the following is a benefit to sellers,

O O
about 1.5 to 9 Mbps for downloading and upto marketing and products. (c) Share news of common interest exclusively given by e-commerce?
640 kbps while uploading. with Partner Companies (a) Wide customer base
(d) All of the above

R R
(a) SDSL connection (d) All of the above
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


19. What is the business use of the Internet? (b) Instant transactions
(b) VSDL connection 25. Intranet can be used for which of the following

P P
(a) Retaining present customers with improved (c) Recurring payments made easy
(c) ASDL connection purposes? (d) All of the above
customer service and support.
(d) All of the above (a) Jointly develop and use Training Programs
(b) Developing new web-based markets and 33. Which of the following is a benefit to sellers,
12. SDSL Connection stands for __________. with other Companies given by e-commerce?
distribution channels for existing products.
(a) Symmetric Digital Subscriber Line (b) Provide or access services provided by one (a) Reduction in cost
(c) Developing new information-based
(b) Similar Digital Subscriber language Company to a group of other Companies
products accessible on the Web. (b) Creation of new markets
(c) Symmetric Digital Subscriber Line (c) Share news of common interest exclusively
(d) All of the above (c) Easier entry into new markets
with Partner Companies
(d) Similar Digital Subscriber language 20. What is the business use of the Internet? (d) All of the above
(d) Intranets are used developing and deploying
13. ____________________ supports same data rate (a) Generating revenue through electronic critical business applications to support 34. Which of the following is a benefit to sellers,
for uploading and downloading. commerce applications is a growing source business operations and managerial given by e-commerce?
(a) ASDL connection of business value. decision making across the inter-networked (a) Reduction in error
(b) SDSL connection (b) Electronic commerce enterprise. (b) Better quality of goods
(c) VSDL connection (c) Enterprise communications and 26. Intranet provides low cost online services to (c) Reduction in cycle time
(d) All of the above collaboration the organizations’ __________.
(d) All of the above
(d) All of the above (a) Employees (b) Owners
(c) Associates (d) Partners
52 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs I nter net and other Technologies 53

35. Which of the following is a component of 44. B2B stands for _________________. 49. In an e-commerce environment, the inability (b) Faster time to market as business processes
e-commerce? (a) Boston-to-Business to complete transactions or meet deadlines, or are linked, thus enabling seamless processing
(a) Warehouse operations (b) Business-to-Business the risk of inadvertently exposing information and eliminating time delays.
(b) Supply chain of trading partners poses significant legal (c) Optimization of resource selection as
(c) Business-to-Boston
risks. Which of the following concern has been businesses form cooperative teams to
(c) Shipping and returns (d) Boston-to-Boston highlighted in the above phases? increase the chances of economic successes,
(d) All of the above 45. C2C stands for ____________________. (a) Loss of audit trail and to provide the customer products
36. Which of the following is a component of (a) Customer-to-corporates (b) Business Continuity and capabilities more exactly meeting the
e-commerce? (b) Corporates-to-customer requirements.
(c) Exposure of data

I I
(a) Warehouse operations (c) Customer-to-customer (d) All of the above
(d) Legal Risks
(b) Privacy policy (d) Corporate-to-corporate 54. What is the benefits of e-commerce application
50. In an e-commerce environment,electronic

D D
(c) Shipping and returns and implementation?
E-COMMERCE GENERAL CONCERNS information has the same legal and statutory
(d) All of the above requirements as paper information. (a) Reduction in inventories and reduction of

E E
37. Which of the following is a component of 46. In general consideration, paper is the prime Organizations are responsible for the safe risk of obsolete inventories as the demand
e-commerce? source of a certifiable audit trail. Without storage, retention and retrieval of this for goods and services is electronically

V V
(a) Mobile apps paper certification, the issue of the reliability information. Which of the following concern linked through just-in-time inventory and

I I
of electronic certification becomes a has been highlighted in the above phases? integrated manufacturing techniques.
(b) Payment gateways
management concern. Which of the following (b) Reduction in overhead costs through
(a) Record retention and retrievability

R R
(c) Web portals concern has been highlighted in the above
(b) Business Continuity uniformity, automation, and large-scale
(d) All of the above phases? integration of management processes.

T T
(a) Loss of audit trail (c) Exposure of data
TYPES OF E-COMMERCE (c) Reduction in use of ecologically damaging
(b) Business Continuity (d) Legal Risks
materials through electronic coordination of
38. _____________________ is simply e-commerce
(c) Exposure of data BENEFITS/ RISKS OF E-COMMERCE activities and the movement of information
between private individuals or consumers.

M M
(d) Legal Risks rather than physical objects.
(a) C2C (b) B2B 51. What is the benefits of e-commerce application
47. In an e-commerce environment, increased and implementation? (d) All of the above
(c) B2C (d) C2B
dependence is placed on an electronic 55. What is the benefits of e-commerce application

O O
(a) Reduction in costs to buyers from increased
39. OLX and Quikr are examples of ________. means of conducting business, the loss due and implementation?
competition in procurement.

.F .F
(a) B2B (b) B2C to E-Commerce Systems has the potential to (a) Reduction in advertising costs.
(b) Reduction in errors, time, and overhead
(c) C2C (d) C2B cripple an organization. Which of the following costs in information processing. (b) Creation of new markets through the
40. ______________________ e-commerce is simply concern has been highlighted in the above ability to easily and cheaply reach potential
(c) Reduction in costs to suppliers by
defined as e-commerce between companies. phases? customers.
electronically accessing on-line databases of

O O
(a) C2C (b) B2B (a) Loss of audit trail bid opportunities, on-line abilities to submit (c) Easier entry into new markets, especially
(c) B2C (d) C2B (b) Business Continuity bids, and on-line review of rewards. geographically remote markets, for

R R
(c) Exposure of data (d) All of the above enterprises regardless of size and location.
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


41. _____________________________ e-commerce is
defined as e-commerce between companies (d) Legal Risks (d) All of the above

P P
52. What is the benefits of e-commerce application
and consumers. 48. In an e-commerce environment, data is shared and implementation? 56. Which of the following is not a befit of
(a) C2C (b) B2B and organizations become connected to the (a) Reduction in time to complete business e-commerce?
(c) C2B (d) B2C outside world, the possibility of data exposure transactions, particularly from delivery to (a) Reduction in costs to buyers from increased
to Vendors, Service Providers, and Trading payment. competition in procurement.
42. Amazon and Flipkart are examples of Partners is significantly increased. Which of
_____________. (b) Creation of new markets through the (b) Reduction in errors, time, and overhead
the following concern has been highlighted in ability to easily and cheaply reach potential costs in information processing.
(a) C2C (b) B2B the above phases? customers. (c) There is a lack of authenticity of transactions
(c) B2C (d) C2B (a) Loss of audit trail (c) Easier entry into new markets, especially (d) Reduction in costs to suppliers by
43. A consumer posts his project with a set budget (b) Business Continuity geographically remote markets, for electronically accessing on-line databases of
online and within hours companies review (c) Exposure of data enterprises regardless of size and location. bid opportunities, on-line abilities to submit
the consumer’s requirements and bid on the (d) Legal Risks bids, and on-line review of rewards.
(d) All of the above
project. The above instant is an example of
which of the following types of E-commerce. 53. What is the benefits of e-commerce application
(a) C2C (b) B2B and implementation?
(c) B2C (d) C2B (a) Better quality of goods as specifications are
standardized and competition is increased.
54 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs I nter net and other Technologies 55

57. In e-commerce, there is need to identify 62. In an e-commerce environment, service (c) Repudiation of contract environment so the business have to do a
and authenticate users in the virtual global to customers may be denied due to non- (d) All of the above smart pricing of their products and services
market where anyone can sell to or buy from availability of system as it may be affected by so as to make them competitive as that of their
68. What are the risks involved in e-Commerce?
anyone, anything from anywhere. Which of viruses, e-mail bombs and floods. Which of competitors. The above phrase highlights
the following risks in e-commerce has been the following risks in e-commerce has been (a) Denial of Service which of the following advantage of an
highlighted in the above phrases? highlighted in the above phrases? (b) Non-recognition of electronic transactions e-commerce environment.
(a) Repudiation of contract (a) Lack of authenticity of transactions (c) Lack of audit trails (a) Providing wider reach
(b) Problem of anonymity (b) Data Loss or theft or duplication (d) All of the above (b) Reducing transaction costs
(c) Lack of authenticity of transaction (c) Denial of Service 69. What are the key aspects to be considered in (c) Competitive pricing

I I
(d) Denial of service (d) Attack from hackers implementing e-commerce? (d) Quick ordering facilities
58.
In e-commerce environment, there is 63. In an e-commerce environment,e-Commerce (a) Implementing appropriate policies, 75. Which of the following is not a disadvantage of

D D
possibility that the electronic transaction in transactions, as electronic records and digital standards and guidelines e-commerce?
the form of contract, sale order or purchase by signatures may not be recognized as evidence (b) Performing cost benefit analysis and risk (a) Small screens of most devices still limit

E E
the trading partner or customer may be denied. in courts of law. Which of the following risks in assessment to ensure value delivery types of file and data transfer (i.e. streaming
Which of the following risks in e-commerce has e-commerce has been highlighted in the above (c) Implementing the right level of security videos, etc.)

V V
been highlighted in the above phrases? phrases? across all layers and processes (b) WAP and SMS limited to small number of

I I
(a) Problem of anonymity (a) Non-recognition of electronic transactions (d) All of the above characters and text.
(b) Lack of authenticity of transaction (b) Lack of audit trails

R
70. What are the key aspects to be considered in

R
(c) Use of limited graphics.
(c) Repudiation of contract (c) Problem of piracy implementing e-commerce? (d) Reducing transaction costs

T T
(d) Denial of service (d) Problem of anonymity (a) Establishing and implementing the right
59. In an e-commerce environment, the electronic 64. In an e-commerce environment,Audit trails in level of baseline (best practice) controls
documents that are produced in the course e-Commerce system may be lacking and the (b) Integration of e-Commerce with the business EFT SYSTEMS IN OPERATIONS
of an e-Commerce transaction may not be logs may be incomplete, too voluminous or process and the physical delivery channels 76. ATM stands for _____________________.

M M
authentic and reliable. Which of the following easily tampered with. Which of the following (c) Providing adequate user training (a) Automated Talking Machine
risks in e-commerce has been highlighted in risks in e-commerce has been highlighted in (d) All of the above (b) Automated Teller Machine

O O
the above phrases? the above phrases? (c) Automatic Teller Machine
(a) Lack of authenticity of transactions (a) Non-recognition of electronic transactions. MOBILE COMMERCE

.F .F
(d) Automated Teller Mechanism
(b) Data Loss or theft or duplication (b) Lack of audit trails 71. Which of the following is an advantage of 77. PIN stands for _____________________________.
(c) Attack from hackers (c) Problem of piracy m-commerce? (a) Personal identification number
(d) Denial of Service (d) Problem of anonymity (a) Providing wider reach (b) Private identification number

O O
(b) Reducing transaction costs (c) Personal identity number
60. In an e-commerce environment, the data 65. In an e-commerce environment, Intellectual
transmitted over the Internet may be lost, property may not be adequately protected (c) Competitive pricing (d) Private identity number

R R
duplicated, tampered with or replayed. Which when such property is transacted through (d) All of the above 78. The customer’s bank is usually referred to as
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


of the following risks in e-commerce has been e-Commerce. Which of the following risks in 72. Mobile devices are called _______________ the _______________.

P P
highlighted in the above phrases? e-commerce has been highlighted in the above because their transmission medium is a radio (a) Issuer bank
(a) Lack of authenticity of transactions phrases? channel, or air interface. (b) Acquirer bank
(b) Data Loss or theft or duplication (a) Non-recognition of electronic transactions (a) Wired (b) Wireless (c) Reserve bank of India
(c) Attack from hackers (b) Lack of audit trails (c) Mobile (d) Flyings (d) Central bank
(d) Denial of Service (c) Problem of piracy 79. The _____________________ is usually referred
73. ___________________is e-commerce where
(d) Problem of anonymity to as the issuer bank.
61. In an e-commerce environment, web servers customers access the network using a mobile
(a) Merchant’s bank
used for e-Commerce may be vulnerable 66. What are the risks involved in e-Commerce? device such as a mobile phone, or a smart
phone. (b) Government’s bank
to hackers. Which of the following risks in (a) Lack of authenticity of transactions
e-commerce has been highlighted in the above (c) Reserve bank of India
(b) Data Loss or theft or duplication (a) Mobile computing
phrases? (d) Customer’s bank
(c) Attack from hackers (b) Cloud commuting
(a) Lack of authenticity of transactions 80. The term __________________ denotes the bank
(d) All of the above (c) B2C e-commerce that actually issued the payment instrument
(b) Data Loss or theft or duplication (d) M-commerce
67. What are the risks involved in e-Commerce? that the customer uses for payment.
(c) Denial of Service 74. The e-commerce websites offer a huge range (a) Acquirer bank (b) Issuer bank
(a) Problem of piracy
(d) Attack from hackers of options in commodities to choose from. (c) Central bank (d) Reserve bank of India
(b) Problem of anonymity
There are many competitors in an e-commerce
56 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs

81. The ____________________ acquires payment 84. ___________________________ is a method of


records (i.e., paper charge slips or electronic automatically depositing to or withdrawing
data) from the merchants. funds from an individual’s account, when the
(a) Acquirer bank account holder authorizes the bank or a third
(b) Central bank party (such as an employer) to do so.
(c) Issuer bank (a) Automated teller machine
(d) Reserve bank of India (b) Point of sale (PoS) transaction
82.
The _____________________ serves as an (c) Telephone transfer
(d) Pre-authorised transfers

I
intermediary between the traditional payment
infrastructure and the electronic payment 85.
Using _______________________, consumers
infrastructure. can transfer funds from one account to

D
(a) ECS mechanism (b) Payment gateway another through telephone instructions rather
than traditional written authorization or

E
(c) Banks (d) All of the above
instrument.
83.
_____________________________ in general
(a) Automated teller machine

V
denotes any kind of network (e.g., Internet)
(b) Point of sale (PoS) transaction

I
service that includes the exchange of money
for goods or services. (c) Telephone transfer

R
(a) Core banking system (d) Pre-authorised transfers
(b) Electronic payment system

T
(c) Electronic fund transfer system
(d) None of the above

O M
.F
R O
© Carvinowledge Press (CNP), 2019

Answer Keys - MCQs

1
(d)
21
(b)
41
P2
(a)
22
(a)
42
3
(d)
23
(d)
43
4
(b)
24
(d)
44
5
(c)
25
(d)
45
6
(b)
26
(a)
46
7
(d)
27
(c)
47
8
(a)
28
(a)
48
9
(d)
29
(d)
49
10
(c)
30
(a)
50
11
(c)
31
(d)
51
12
(a)
32
(d)
52
13
(b)
33
(d)
53
14
(c)
34
(d)
54
15
(b)
35
(d)
55
16
(d)
36
(d)
56
17
(d)
37
(d)
57
18
(d)
38
(a)
58
19
(d)
39
(c)
59
20
(d)
40
(b)
60
(d) (c) (d) (b) (c) (a) (b) (c) (d) (a) (d) (d) (d) (d) (d) (c) (b) (c) (a) (b)
61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
(d) (c) (a) (b) (c) (d) (d) (d) (d) (d) (d) (b) (d) (c) (d) (b) (a) (a) (d) (b)
81 82 83 84 85
(a) (b) (b) (d) (c)
c h a p t e r
9
Introduction to business
Information system

I
Multiple Choice Questions (MCQs)

D
INFORMATION SYSTEM CONCEPT 8. __________________ is data that has been
1. Data is _________________________. selected and organized into meaningful

E
patterns, and recorded by the human intellect.
(a) A collection of facts.
(a) Information (b) Wisdom
(b) Collected as the result of experience,

V
observation or experiment, or processes (c) Knowledge (d) Experience

I
within a set of premises. 9. Information is ________________ that has been
processed so that they are meaningful.

R
(c) Lowest level of abstraction.
(d) All of the above. (a) Knowledge (b) Information

T
2. Data consists of ____________________________. (c) Experience (d) Data
(a) Numbers (b) Words 10. Information is data that have been processed
(c) Images (d) All of the above so that they are ___________.
(a) Useless (b) Meaningful

M
3. ______________ is a collection of facts.
(c) Meaningless (d) All of the above
(a) Data (b) Knowledge
11. Process explains the activities carried out by

O
(c) Experience (d) Information
__________.
4. ______________ is the lowest level of abstraction

.F
(a) Users (b) Managers
from which __________ and _______________ are
derived. (c) Staff (d) All of the above
(a) Information; data; knowledge COMPONENTS OF INFORMATION SYSTEM

O
(b) Knowledge; Data; information 12. Which of the following is not a component of
(c) Data; information; Experience Information Systems?

R
(d) Data; information; knowledge (a) People

© Carvinowledge Press (CNP), 2019


5. _______________ is data that have been (b) Data

P
processed so that they are meaningful. (c) Network
(a) Knowledge (b) Experience (d) Transaction Processing System
(c) Information (d) Wisdom 13. Information Systems (IS) can perform which
6. Information systems change data into of the following purpose for a business
_____________, which is useful and capable of enterprise?
giving a certain meaning to its users. (a) Support of business processes and
(a) Knowledge (b) Information operations.
(c) Experience (d) Wisdom (b) Support of decision making by employees
7. While ______________ is raw facts and figures, and managers.
_____________ is facts or figures ready for (c) Support of strategies for competitive
communication or use. advantage.
(a) Information; wisdom (d) All of the above
(b) wisdom; information 14. A business process ________________.
(c) Data; wisdom (a) Has a Goal
(d) Data; information (b) Has specific inputs
58 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs I ntrodu c tion to bu s ines s I nfor mation s ys tem 59

(c) Has specific outputs 20. __________________________ is used for the TRANSACTION PROCESSING SYSTEM 33. If an integrity constraint states that all
(d) All of the above monitoring, controlling, decision-making, 27. A ____________________________________ is a transactions in a database must have a
and administrative activities of middles type of information system that collects, stores, positive value, any transaction with a negative
15. A business process ________________.
management. modifies and retrieves the day-to-day data value would be refused. This is an example of
(a) Uses resources ______________________.
(a) Management- Level Systems transactions of an enterprise.
(b) Has a number of activities that are performed (a) Consistency (b) Isolation
(b) Strategic Level Systems (a) Management Information System
in some order
(c) Knowledge- Level Systems (b) Office Information System (c) Atomicity (d) Durability
(c) Creates value of some kind for the customer.
The customer may be internal or external. (d) Operational- Level Systems (c) Transaction Processing System 34. ____________________ means that transactions
must appear to take place in seclusion.

I I
(d) All of the above 21. ______________________________ support (d) Decision Support System
discovery, processing and storage of knowledge (a) Consistency (b) Atomicity
28. A Transaction Processing System is a type of
ORGANIZATION INFORMATION SYSTEM AND and data workers. (c) Isolation (d) Durability

D D
information system that ________________ the
BUSINESS PRO USES (a) Strategic Level Systems day-to-day data transactions of an enterprise. 35. ____________________ means that a transaction

E E
16. ________________________ is a standardized set (b) Knowledge- Level Systems (a) Collects (b) Stores is either completed in full or not at all. TPS
of activities that accomplish a specific task, (c) Management- Level Systems (c) Retrieves (d) All of the above systems ensure that transactions take place in
such as processing a customer’s order. their entirety.

V V
(d) Operational- Level Systems 29. ____________________________________ are

I I
(a) Business (a) Consistency (b) Atomicity
22.
_________________________ ensure that mainly used by clerical staff performing such
(b) Business process business procedures are followed. regular business activities as invoicing and (c) Isolation (d) Durability

R R
(c) Value creation (a) Strategic Level Systems issuing of stock, following well defined business 36.
___________________ state that once
(d) Business process automation (b) Management- Level Systems procedures. transactions are completed they cannot be

T T
17. A _____________________ is a coordinated and (a) Transaction Processing System undone.
(c) Knowledge- Level Systems
standardized flow of activities performed (b) Management Information System (a) Consistency (b) Isolation
(d) Operational- Level Systems
by people or machines, which can traverse (c) Office Information System (c) Atomicity (d) Durability
23. Strategic Level Systems is used by ___________.

M M
functional or departmental boundaries to (d) Decision Support System 37. To ensure _________________________, even if
achieve a business objective that creates value (a) Middle Managers
30. The users of _____________________________ the TPS suffers failure, a log will be created to
for internal or external customers. (b) Knowledge and data workers document all completed transactions.

O O
____ tend to work at the lowest level of detail
(a) Business (c) Chief Executive Officers (a) Consistency (b) Durability
as they process or query one transaction at a

.F .F
(b) Value creation (d) Supervisors time, using computer systems to capture the (c) Isolation (d) Atomicity
(c) process 24. Management- Level Systems is used by raw data which reflects the business processes 38.
___________________________________ is a
(d) Business process automation _______________. of the organisation. computer-based information systems that
(a) Middle Managers (a) Management Information System collect, process, store, and transmit electronic

O O
INFORMATION SYSTEM AND THEIR ROLE IN
(b) Chief Executive Officers (b) Office Information System messages, documents, and other forms of
BUSINESSES
(c) Knowledge and data workers (c) Transaction Processing System office communications among individuals,

R R
18. An information system can perform for a workgroups, and organizations.
(d) Supervisors (d) Decision Support System
business enterprise: (a) Management Information System

P P
(a) Support of business processes and 25.
Knowledge- Level Systems is used by 31. __________________________ ensures that
_____________________________. people who are not authorized to use the (b) Office Automation System
operations.
system are not permissible to influence or (c) Transaction Processing System
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


(b) Support of decision making by employees (a) Middle Managers
(b) Knowledge and data workers transform the transaction process. (d) Decision Support System
and managers.
(c) Supervisors (a) Equivalence
(c) Support of strategies for competitive OFFICE AUTOMATION SYSTEMS (OAS)
advantage. (d) Chief Executive Officers (b) Access Control
39. Which of the following statements is true?
(d) All of the above 26.
Operational- Level Systems is used by (c) Trustworthiness
(a) The Office Automation Systems (OAS) is
_____________________________. (d) High Volume Rapid Processing
19. ________________________________ is used to amalgamation of hardware, software, and
track and deal with strategic issues, assisting (a) Middle Managers 32. __________________________ ensures that all other resources used to smooth the progress
long-range planning. (b) Supervisors transactions are processed in the similar format of communications and augment efficiency.
(a) Management- Level Systems (c) Knowledge and data workers every time to ensure that full effectiveness is (b) Office automation refers to the use of
achieved. computer and software to digitally generate,
(b) Knowledge- Level Systems (d) Chief Executive Officers
(a) Equivalence collect, store, manipulate, and relay office
(c) Strategic Level Systems
(b) Trustworthiness information needed for accomplishing basic
(d) Operational- Level Systems
(c) Access Control tasks and goals.
(d) High Volume Rapid Processing
60 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs I ntrodu c tion to bu s ines s I nfor mation s ys tem 61

(c) Office Automation Systems (OAS) is a 45. The goal of __________________________ is to (c) It is articulated and represented in the (a) Data mining
computer-based information system help knowledge workers create, organize, and form of spoken words, written material and (b) Data discovery
that collect, process, store, and transmit make available important business knowledge, compiled data. (c) Data transformation
electronic messages, documents, and other wherever and whenever it’s needed in an (d) This type of knowledge is codified, easy to (d) All of the above
forms of office communications among organization. document, transfer and reproduce.
individuals, workgroups, and organizations. (a) Office Automation System 57.
Data warehouse databases contain
50. Which of the following statements about _____________ data.
(d) All of the above (b) Knowledge Management Systems explicit knowledge is true?
(a) Dynamic (b) Static
40. Which of the following activities can be (c) Transaction Processing System (a) It is a knowledge which can be formalized
performed by Office Automation System? (c) Neither a Nor b (d) Both a and b
(d) Decision Support System easily and is easily available across the

I I
(a) Exchange of information organization. 58. In data mining, the data in a data warehouse
46. _______________________ facilitate
(b) Management of administrative documents (b) It is the kind of knowledge that is difficult are analysed to reveal _________________.
organizational learning and knowledge

D D
(c) Handling of numerical data creation. to transfer to another person by means of (a) Hidden patterns
(d) All of the above (a) Knowledge Management Systems writing it down or verbalizing it. (b) Hidden trends in historical business activity

E E
(b) Office Automation System (c) It resides in a few often-in just one person (c) Neither a Nor b
KNOWLEDGE MANAGEMENT SYSTEM (KMS) and hasn’t been captured by the organization (d) Both a and b

V V
(c) Transaction Processing System
41. Knowledge ______________________________. or made available to others.

I I
(d) Decision Support System MANAGEMENT INFORMATION SYSTEM (MIS)
(a) Is a much broader concept than information (d) Tacit knowledge is unarticulated and
47. Which of the following statements about represented as intuition, perspective, beliefs, 59. Management Information Systems is _______.

R R
(b) Consists of many pieces of related explicit knowledge is true?
information, and has a structure or and values that individuals form based on (a) The study of information systems in business
(a) It is a knowledge which can be formalized their experiences.

T T
organisation whereby each piece of and management.
easily and is easily available across the 51. The processed data is known as __________. (b) Aims at meeting the information needs of
information is linked to others
organization. managers, particularly with regard to the
(c) Consists of knowing which action alternatives (a) Wisdom (b) Knowledge
(b) It is articulated and represented in the current and past operations of the enterprise.
are available and what information is (c) Information (d) Experience

M M
form of spoken words, written material and (c) A system which provides accurate, timely
required before one can decide on a specific 52.
Knowledge is the internalization of
compiled data. and meaningful data for management
course of action ________________.
(c) This type of knowledge is codified, easy to planning, analysis and control to optimize

O O
(d) All of the above (a) Information (b) Data
document, transfer and reproduce. the growth of the organization.
42. Wisdom is the combination of ________________

.F .F
(d) All of the above (c) Experience (d) All of the above (d) All of the above
with ______________.
48. Which of the following statements about tacit 53. Information is ____________________. 60. Management Information Systems is a system
(a) Knowledge; Experience
knowledge is true? (a) Piecemeal (b) Fragmented which provides ______________ data to the
(b) Data ; Experience
(a) It is the kind of knowledge that is difficult (c) Particular (d) All of the above organization.

O O
(c) Knowledge; Data to transfer to another person by means of 54. Knowledge is ___________________. (a) Accurate (b) Timely
(d) None of the above writing it down or verbalizing it. (c) Meaningful (d) All of the above

R R
(a) Structured (b) Coherent
43. ___________________ refers to any kind of IT (b) It resides in a few often-in just one person
(c) Often universal (d) All of the above 61. Management Information Systems is a system
system that stores and retrieves knowledge, and hasn’t been captured by the organization

P P
improves collaboration, locates knowledge which data for management ____________ to
or made available to others. KNOWLEDGE DISCOVERY AND DATA MINING
sources and mines repositories for hidden optimize the growth of the organization.
(c) Tacit knowledge is unarticulated and 55. _____________________________ is a key
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


knowledge. (a) Planning (b) Analysis
represented as intuition, perspective, beliefs, intellect who is employed owing to his or her
(a) Office Automation System and values that individuals form based on (c) Control (d) All of the above
acquaintance of a subject matter, rather than
(b) Transaction Processing System their experiences. their ability to perform manual labour. DECISION SUPPORT SYSTEM (DSS)
(c) Knowledge Management Systems (d) All of the above (a) Knowledge worker 62. _____________________ are computer-based
(d) Decision Support System 49. Which of the following statements about tacit (b) Intellectual worker information systems that provide interactive
44. ________________________ treats the knowledge knowledge is true? (c) Brain worker information support to managers and business
component of any organization’s activities as (a) It is a knowledge which can be formalized (d) All of the above professionals during the decision making
an explicit concern reflected in strategy, policy, easily and is easily available across the process.
and practice at all levels of the organization. organization. 56. ___________________________ is a major use
of data warehouse databases and the static (a) Transaction Processing System
(a) Office Automation System (b) It is difficult to document and communicate (b) Management Information System
data they contain to reveal hidden trends in
(b) Knowledge Management Systems the tacit knowledge.
historical business activity. (c) Decision Support System
(c) Transaction Processing System (d) Office Information System
(d) Decision Support System
62 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs

63. What are the components of a Decision Support 66. Which of the following component of EIS
System? includes Input data-entry devices, CPU, Data
(a) User Storage files and Output Devices?
(b) Database (a) Software (b) Hardware
(c) Planning language (c) User interface (d) Telecommunication
(d) All of the above 67. Which of the following component of EIS
64. __________________ is the brain of the DSS includes Text base software, Database, and
as it performs data manipulations and Graphic types such as time series charts, scatter
diagrams, maps, motion graphics, sequence

I
computations with the data.
charts, and comparison-oriented graphs (i.e.,
(a) User (b) Database
bar charts) Model base?

D
(c) Model base (d) Planning language
(a) Software (b) Hardware
EXECUTIVE INFORMATION SYSTEM (c) User interface (d) Telecommunication

E
65. Which of the following statement about 68. Which of the following component of EIS
includes hardware (physical) and software

V
Executive Information System is true?
(logical) components by which people (users)

I
(a) It is a tool that provides online access directly
to the relevant information, in the format interact with a machine?

R
that is useful and can be browsed. (a) Hardware
(b) It ensures that relevant information is timely, (b) Software

T
precise and useful in business aspects, (c) Telecommunication
according to the interest of certain managers. (d) User interface
(c) It has useful format, and ensures that data 69. Which of the following component of EIS
can be browsed easily; will mean that the

M
involves transmitting data from one place to
system has been specially built for the use another in a reliable networked system?
of individuals who have little time to spare,
(a) Hardware

O
are less skilful in using the keyboard and less
experienced with computers. (b) Software

.F
(d) All of the above (c) Telecommunication
(d) User interface

R
Answer Keys - MCQs
O
P
© Carvinowledge Press (CNP), 2019

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
(d) (d) (a) (d) (c) (b) (d) (a) (d) (b) (d) (d) (d) (d) (d) (b) (c) (d) (c) (a)
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
(b) (d) (a) (c) (d) (b) (c) (d) (a) (c) (b) (c) (a) (c) (b) (d) (b) (c) (d) (d)
41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
(d) (a) (c) (b) (d) (a) (d) (d) (b) (a) (c) (d) (d) (d) (d) (a) (b) (d) (d) (d)
61 62 63 64 65 66 67 68 69
(d) (c) (d) (c) (d) (b) (a) (d) (c)
c h a p t e r
10
Specialized Business Information
Systems

I
Multiple Choice Questions (MCQs)

D
ENTERPRISE RESOURCE PLANNING (ERP) VARIOUS STAGES OF ERP
1. _________________________ is an integrated 4. _________________________ is an accounting

E
cross-functional software that reengineers procedure or system designed to encourage
manufacturing, distribution, finance, human competence or give surety the implementation

V
resources, and other basic business processes of a strategy or maintain assets or avoids fraud

I
of a company to improve its efficiency, agility, and error etc.
and profitability. (a) ABC analysis

R
(a) Customer Relationship Management (CRM) (b) EOQ
(b) Supply Chain Management (SCM)

T
(c) Inventory control
(c) Enterprise Resource Planning (ERP) (d) Just in Time (JIT)
(d) Core Banking System (CBS) 5. ___________________ is the supervision of
2.
_____________________ integrates and supply, storage and accessibility of items

M
automates many internal business in order to make certain a sufficient supply
processes and information systems within without excessive oversupply.

O
the manufacturing, logistics, distribution, (a) Inventory control
accounting, finance, and human resource (b) ABC analysis

.F
functions of a company.
(c) EOQ
(a) Enterprise Resource Planning (ERP)
(d) Just in Time (JIT)
(b) Customer Relationship Management (CRM)
6. ___________ is that technique of material
(c) Supply Chain Management (SCM)

O
control in which we divide our material into
(d) Core Banking System (CBS) three categories and investment is done

R
3. Which of the following statement about according to the value and nature of that
Enterprise Resource Planning (ERP) is true? category’s materials.

P
(a) Enterprise Resource Planning is essentially (a) ABC analysis (b) Inventory control
a software which integrates all the (c) EOQ (d) Just in Time (JIT)
departments and their functions within a
7. _________ is the order size for materials that
company through a single IT system.
will result in minimizing the costs of ordering
(b) ERP is software architecture that allows and carrying stock.
the exchange of information between all
(a) Inventory control (b) ABC analysis
functions.
(c) Just in Time (JIT) (d) EOQ
(c) ERP is the technological backbone of
e-business, an enterprise wide transaction 8. _________ provides a model for calculating
framework with links into sales order the suitable reorder point and the optimal
processing, inventory management and reorder quantity to make sure the immediate
control, production and distribution replenishment of inventory with no shortages.
planning, and finance. (a) EOQ (b) Inventory control
(d) Its adds a huge cost which is way more than (c) ABC analysis (d) Just in Time (JIT)
its benefit.
64 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Specialized Bu s ines s I nfor mation Sys tems 65

9. _________ Technique enables a company to 16. ____________________________ allows greater (a) Enterprise Resource Planning (ERP) (a) Planning (b) Implementing
ensure that it receives products/spare parts/ responsiveness to customer needs through (b) Customer Relationship Management (CRM) (c) Controlling (d) All of the above
materials from its suppliers on the exact date sourcing of products and services outside of (c) Supply Chain Management (SCM) 29. ____________________ means the purchasing of
and at the exact time when they are needed. your enterprise.
(d) Core Banking System (CBS) parts, components, or services.
(a) Inventory control (b) Just in Time (JIT) (a) Operational CRM
22. _____________ refers to the linkages between (a) Procurements (b) Operations
(c) ABC analysis (d) EOQ (b) Collaborative CRM
suppliers, manufacturers and customers. (c) Distribution (d) Integration
10. JIT principles can be applied to which of the (c) Analytical CRM
(a) Enterprise Resource Planning (ERP) 30.
____________________________ must ensure
following part of an organization? (d) All of the above
(b) Supply Chain Management (SCM) that the right items are delivered in the exact

I I
(a) Distribution (b) Sales 17. Which of the following is a benefit of CRM? quantities at the correct location on the
(c) Customer Relationship Management (CRM)
(c) Accounting (d) All of the above (a) Integrates and personalizes the delivery of specified time schedule at minimal cost.
(d) Core Banking System (CBS)
customer services.

D D
11. JIT principles can be applied to which of the (a) Operations (b) Distribution
23. ____________ involves all activities like sourcing
following part of an organization? (b) Improves the customer experience through (c) Procurements (d) Integration
and procurement of material, conversion, and

E E
(a) Order taking (b) Purchasing whatever point of contact is chosen.
logistics. 31. ________________________ ensures having raw
(c) Opera¬tions (d) All of the above (c) Influences the Internet as a self-service materials, parts, components, assemblies,
(a) Supply Chain Management (SCM)

V V
delivery channel. or services from suppliers, the firm must
CUSTOMER RELATIONSHIP MANAGEMENT (CRM) (b) Enterprise Resource Planning (ERP)

I I
(d) All of the above. transform them and produce the products
(c) Customer Relationship Management (CRM)
12. _________________________ tracks all the ways in 18. Which of the following is a benefit of CRM? or the services that meet the needs of its

R R
which a company interacts with its customers (d) Core Banking System (CBS) consumers.
(a) Provides a single point of access to
and analyses these interactions to optimize information for sales, marketing and 24. __________ integrates management practices (a) Procurements (b) Distribution

T T
revenue, profitability, customer satisfaction, customer service. and information technology to optimize (c) Integration (d) Operations
and customer retention. information and product flows among the
(b) Supports better-informed business decisions 32.
____________________ involves several
(a) Customer Relationship Management (CRM) processes and business partners within a
by providing a single enterprise-wide view of activities—transportation (logistics),
supply chain.

M M
(b) Supply Chain Management (SCM) the customer. warehousing, and customer relationship
(c) Enterprise Resource Planning (ERP) (a) Enterprise Resource Planning (ERP)
(c) Enables real-time interactions between management (CRM).
(d) Core Banking System (CBS) customers, employees, partners and the (b) Customer Relationship Management (CRM)
(a) Procurements (b) Distribution

O O
enterprise. (c) Core Banking System (CBS)
13. Customer relationship management (c) Operations (d) Integration

.F .F
applications, dealing with the analysis of (d) All of the above (d) Supply Chain Management (SCM)
33. Distribution involves which of the following
customer data to provide information for 25. _________________________ is an extension of activities?
improving business performance are a part of SUPPLY CHAIN MANAGEMENT (CRM) logistic management.
(a) Transportation (logistics)
___________________. 19. ______ is the management of the flow of goods. (a) Enterprise Resource Planning (ERP)
(b) Warehousing

O O
(a) Analytical CRM (a) Supply chain management (b) Supply Chain Management (SCM)
(c) Customer relationship management (CRM)
(b) Operational CRM (b) Logistics management (c) Customer Relationship Management (CRM)

R R
(d) All of the above
(c) Collaborative CRM (c) Customer relationship management (d) Core Banking System (CBS)
(d) All of the above (d) Core banking system 34. ____________________ is critical because it is

P P
26.
Logistical activities typically include necessary that all participants in the service
14. _______________ uses customer understanding 20. ________ includes the movement and storage of management of __________________________. chain recognize the entirety of the service
to perform effective relationship management. raw materials, work-in-process inventory, and (a) Warehousing
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


chain.
(a) Operational CRM finished goods from point of origin to point of (b) Inventory management (a) Procurements (b) Operations
(b) Collaborative CRM consumption.
(c) Supply/demand planning (c) Integration (d) Distribution
(c) Analytical CRM (a) Logistics management
(d) All of the above
(d) All of the above (b) Customer relationship management HUMAN RESOURCE MANAGEMENT (HRM)
27.
Logistical activities typically include
(c) Core banking system 35. A ________________________ is a software
15. ____________________ supports customer management of __________________________.
interaction with greater convenience through (d) Supply chain management application that combines many human
(a) Inbound goods (b) Outbound goods
a variety of channels, including phone, fax, 21. _____________________ is a network of facilities resources functions, together with benefits
(c) Transportation (d) All of the above
e-mail, chat, and mobile devices and distribution options that performs the administration, payroll, recruiting and
functions of procurement of materials, 28. Supply Chain Management may be defined as training, and performance analysis and
(a) Operational CRM
transformation of these materials into the process of __________________________ the assessment into one parcel.
(b) Collaborative CRM operations of the supply chain with the purpose
intermediate and finished products, and the (a) Customer Relationship Management (CRM)
(c) Analytical CRM of satisfying the customer’s requirement as
distribution of these finished products to (b) Human Resource Management Systems
(d) All of the above customers. efficiently as possible.
(HRMS)
66 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Specialized Bu s ines s I nfor mation Sys tems 67

(c) Supply Chain Management (SCM) CORE BANKING SYSTEM (c) Customer relationship management (CRM) 54. ________________________________ is generally
(d) Core Banking System (CBS) 41. ________________________ is the structural activities a computer-based method for tracking
network of institutions that offer financial (d) All of the above accounting activity in conjunction with
36. _______________________ shapes an intersection
services within a county. information technology resources.
between Human Resource Management 49. Which of the following is an elements of Core
(HRM) and Information Technology. Banking System (a) Customer Relationship Management (CRM)
(a) HR system (b) Banking system
(b) Supply Chain Management (SCM)
(a) Human Resource Management Systems (c) Political system (d) Accounting system (a) Managing customer accounts
(HRMS) (c) Accounting Information System (AIS)
42. Which of the following is a member of the (b) Establishing criteria for minimum balances,
(d) Core Banking System (CBS)
(b) Human Resource Information systems banking system? interest rates, number of withdrawals
55. ____________ is a unified structure that

I I
(HRIS) (a) Commercial banks allowed and so on
employs physical resources and components
(c) HR Technology (b) Investment banks (c) Establishing interest rates and
to transform economic data into accounting
(d) All of the above (d) All of the above

D D
(c) National central banks information for external and internal users.
37. Human Resource Information Systems (HRIS) (d) All of the above 50. Which of the following statement about CBS is (a) Accounting Information System (AIS)

E E
are designed to supports______________. true? (b) Customer Relationship Management (CRM)
43. Which of the following facilities are offered by
(a) Planning to meet the personnel needs of the the core banking system? (a) It is defined as the set of basic software (c) Supply Chain Management (SCM)

V V
business. components that manage the services (d) Core Banking System (CBS)
(a) Internet banking

I I
(b) Development of employees to their full provided by a bank to its customers through 56. _____________________________ collects,
(b) Branch clearing facility for banking branch its branches (branch network).
potential. processes and reports information related to
offices

R R
(c) Control of all personnel policies and (b) It is the platform where communication the financial aspects of business events.
(c) Electronic fund Transfers or EFT technology and information technology are
programs. (a) Customer Relationship Management (CRM)

T T
(d) All of the above merged to suit core needs of banking
(d) All of the above (b) Supply Chain Management (SCM)
44. Which of the following facilities are offered by (c) It is the networking of branches, which (c) Accounting Information System (AIS)
38. What are the benefits of Human Resource
the core banking system? enables Customers to operate their accounts,
Management Systems (HRMS)? (d) Core Banking System (CBS)
and avail banking services from any branch

M M
(a) Automatic teller machine or ATM
(a) Improves leadership development and of the Bank on CBS network, regardless of 57. ______________ is a system of collection, storage
succession. (b) Electronic fund Transfers or EFT
where he maintains his account. and processing of financial and accounting
(c) Tele-banking

O O
(b) Enhances data integrity within the enterprise. (d) All of the above data that is used by decision-makers.
(c) ix. Enables to meet compliance and audit (d) All of the above (a) Customer Relationship Management (CRM)

.F .F
51.
The platform where communication
requirements. 45. Core stands for __________________. (b) Accounting Information System (AIS)
technology and information technology are
(d) All of the above (a) Centralized Online Real-time Environment merged to suit core needs of banking is called (c) Supply Chain Management (SCM)
39. What are the benefits of Human Resource (b) Centralized Online Real-time Interference _________________________________. (d) Core Banking System (CBS)
Management Systems (HRMS)? (c) Customer Online Real-time Environment

O O
(a) Customer Relationship Management (CRM) 58. _______________ are a system that brings
(a) Reduces HR administrative costs. (d) Centralized Online Real-time Environment (b) Supply Chain Management (SCM) together, records, stores, and processes data to

R R
(b) Increases employee engagement and 46. Which of the following is an elements of Core (c) Enterprise Resource Planning (ERP) fabricate information for decision makers.
satisfaction. Banking System (d) Core Banking System (CBS) (a) Accounting Information System (AIS)

P P
(c) Ensures seamless flow of information (a) Maintaining records for all the bank’s (b) Customer Relationship Management (CRM)
52. Which of the following is a banking product?
between employees, supervisors, managers transactions. (c) Supply Chain Management (SCM)
and administrators. (a) Infosys’ Finacle
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


(b) Processing payments and cheques (d) Core Banking System (CBS)
(d) All of the above (b) Nucleus FinnOne
(c) Making and servicing loans 59. What are the components of Accounting
(c) Oracle’s Flexcube
40. What are the benefits of Human Resource (d) All of the above Information System (AIS)?
Management Systems (HRMS)? (d) All of the above
47. Which of the following is an elements of Core (a) Software
(a) Bringing industry best practices to the HR Banking System ACCOUNTING INFORMATION SYSTEM (AIS) (b) Information Technology Infrastructure
functions.
(a) Making and servicing loans 53. _______________________ is a system of (c) Internal Controls
(b) HRMS lets you assess and utilize the human
(b) Opening new accounts collection, storage and processing of financial (d) All of the above
resource potential completely.
(c) Processing cash deposits and withdrawals and accounting data that is used by decision
(c) The solution increases the operational 60. What are the components of Accounting
(d) All of the above makers.
efficiency and productivity of the HR Information System (AIS)?
(a) Customer Relationship Management (CRM)
department. 48. Which of the following is an elements of Core (a) People
(b) Accounting Information System (AIS)
(d) All of the above Banking System (b) Procedure and Instructions
(c) Supply Chain Management (SCM)
(a) Processing payments and cheques (c) Data
(d) Core Banking System (CBS)
(b) Calculating interest (d) All of the above
68 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Specialized Bu s ines s I nfor mation Sys tems 69

ARTIFICIAL INTELLIGENCE (AI) EXPERT SYSTEM 74.


______________________ includes the data, BUSINESS INTELLIGENCE
61. _____________________________ is the effort 66. _________________________ is a knowledge- knowledge, Relationship, and decision rules 82. Which of the following business tools involve
to develop computer-based systems that can based information system that uses its used by experts to solve a particular type of using the data warehouse to get response to the
behave like humans, with the ability to learn knowledge about a specific, complex problem. query: “Tell me what happened”.
languages, accomplish physical tasks, use a application area to act as an expert consultant (a) Knowledge base (a) Dashboard
perceptual apparatus, and emulate human to end users. (b) User interface (b) Simple reporting and querying
expertise and decision making. (a) Management Information System (c) Inference engine (c) Scoreboard
(a) Business Intelligence (BI) (b) Office Information System (d) Explanation facility (d) Data mining

I I
(b) Artificial Intelligence (AI) (c) Expert system 75.
____________________ is the computer 83. A ________ has a graphical list of specific,
(c) Expert system (d) Decision Support System equivalent of all the knowledge and insight attainable strategic milestones, combined with
(d) All of the above that an expert or a group of experts develop

D D
67. Expert System can be ________________________ metrics that serve as benchmarks.
62. __________________________ is the delivery of for providing problem solution or advice. through years of experience in their field.
(a) Scorecard (b) Dashboard
(a) User interface (b) Knowledge base

E E
accurate, useful information to the appropriate (a) Example based (b) Rule based (c) Data mining (d) OLTP
decision makers within the necessary time (c) Frame based (d) All of the above (c) Inference engine (d) Explanation facility
frame to support effective decision making for 84. _________________ involves data analysis for

V V
68. The ____________________ level expert system 76. ________________________ is used for building discovering useful patterns that are “hidden”

I I
business processes. knowledge base of an expert system.
draws the user’s attention on the problem area. in large volume of diverse data.
(a) Business Intelligence (BI) (a) User interface
(a) Assistant (b) Colleague (a) Scorecard (b) Data mining

R R
(b) Artificial Intelligence (AI) (b) Inference engine
(c) True (d) All of the above (c) Dashboard (d) OLTP
(c) Expert system (c) Explanation facility
69. The _______________________ level expert

T T
(d) All of the above 85. _________________________ is a process of
system discusses the problem with the user to (d) Knowledge Acquisition facility delivering business intelligence (BI) or
63. BI is essentially _______________________ arrive at an agreement 77.
____________________________ is used by information about business operations as they
business insights, and the work processes and (a) Assistant (b) Colleague programmer for collecting and organizing occur.

M M
technologies used to obtain them. (c) True (d) All of the above knowledge and expertise of human experts in (a) OLTP (b) OLAP
(a) Timely 70. While using the _______________________ level the knowledge base.
expert system, the user accepts the solution (c) Real-time Business Intelligence
(b) Accurate

O O
(a) Knowledge Acquisition facility (d) Operational Business Intelligence
without any questions.
(c) high-value and actionable (b) User interface

.F .F
(a) Assistant (b) Colleague 86. Extract Transform Load (ETL) is a part of
(d) all of the above (c) True (d) All of the above (c) Inference engine _________________.
71. ___________________________ allows the user to (d) Explanation facility (a) Business Reporting
64. Business Intelligence tools are a type of software design, create, update, use and communicate 78. In ______________________ system, developers (b) Inventory Accounting
that is designed to _________________________ with the expert system.

O O
enter the case facts and results. (c) Financial Accounting
data. (a) Inference engine (a) Example-based (b) Rule-based
(b) User interface (d) Payroll Accounting

R R
(a) Retrieve (b) Analyse (c) Frame based (d) All of the above
(c) Explanation facility 87. OLAP stands for __________________.
(c) Report (d) All of the above
(d) Knowledge base 79. ______________________ systemis created by (a) Offline Analytical Processing

P P
65. Which of the following statements of BI is true? 72. __________________________ contains the storing data and decision rules as if-then rules. (b) Online Analytical Processing
(a) Business Intelligence tools are a type of basic logic and reasoning part of the system (a) Example-based (b) Rule-based (c) Online Analytical Product
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


software that is designed to retrieve, analyse to arrive at solution for problem provided by (c) Frame based (d) All of the above (d) Offline Analytical Product
and report data. user by matching the problem solution from
80. ______________________are appropriate when a 88. ______________________ is a BI tool capability
(b) BI tools are standalone tools or suites of tools knowledge base.
history of cases is unavailable or when a body that relates geographic contexts to business
that are targeted to a specific industry that (a) User interface (b) Explanation facility
of knowledge can be structured within a set of data.
implement a particular BI technique. (c) Knowledge base (d) Inference engine
general rules. (a) Scorecard
(c) Business Intelligence tools are software 73. Explanation of logic used to arrive at its (b) Dashboard
(a) Example-based (b) Rule-based
programs and features that are used to conclusion is given at ____________________.
(c) Frame based (d) All of the above (c) Location intelligence
complete detailed data analysis. (a) User interface
81. _______________________ systems organize all (d) OLAP
(d) All of the above (b) Inference engine
the information (data, description, rules etc.) 89. Business reports are routinely assigned to
(c) Explanation facility about a topic into logical units called frames, ____________________________.
(d) Knowledge base which are similar to linked records in data files. (a) Accomplish conclusions about a trouble or
(a) Example-based (b) Rule-based issue.
(b) Demonstrate short and apparent
(c) Frame based (d) All of the above
communication skills.
70 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Specialized Bu s ines s I nfor mation Sys tems 71

(c) Endow with recommendations for upcoming 96. ____________________ identifies what systems, 102. Smart cards have an embedded __________. 106. The Cheque is in an electronic format, so it can
accomplishing. network resources, etc. a subject can access. (a) Magnetic strip (b) Microchip be processed in ___________ steps as compared
(d) All of the above Related processes also enforce least privilege, (c) Sensors (d) All of the above to a standard paper Cheque.
90. Business reports are routinely assigned to need-to-know, and separation of duties. (a) Fewer
103. __________________________ are the smart cards
____________________________. (a) Identity management (b) More
that need to insert into a reader in order to
(a) Exhibit our analytical, reasoning, and (b) Authentication work, such as a smart card reader or automatic (c) Same
evaluation skills in identifying and weighing- (c) Authorization teller machines. (d) Any of the above, depending upon the nature
up potential solutions and outcomes. (d) Accountability of payment
(a) Contact Cards (b) Contactless Cards
(b) Pertain business and management theory to

I I
a practical situation. 97. ________________________ refers to give only (c) Combi Cards (d) Hybrid Cards 107. The Cheque is in an electronic format, so it can
those privileges to a user account, which are 104. ____________________________ don’t need to be be processed has __________________ security
(c) Scrutinize obtainable and potential solutions
essential to that user’s work. features than a standard paper Cheque.

D D
to a problem, situation, or question. inserted into a reader. Just waving them near a
(d) All of the above (a) Rules-based Access Control (RAC) reader is just sufficient for the card to exchange (a) Fewer

E E
91. What are the benefits for Micro-Businesses and (b) Role-based Access Control (RBAC) data. (b) More
Small to Medium Enterprises? (c) Principle of least privilege (a) Contact Cards (c) Same

V V
(a) Paperless lodgement (d) All of the above (b) Combi Cards (d) Any of the above, depending upon the nature

I I
(b) Electronic record keeping 98. _______________________ states that, if a backup (c) Contactless Cards of payment
(c) Pre-filled forms user does not need to install software; hence, (d) Hybrid Cards 108. Electronic cheques incorporate ______________

R R
(d) All of the above the backup user should be given rights only to 105. Electronic Cheque is a form of payment made as its security feature.
92. What are the benefits for Micro-Businesses and run backup and backup-related applications. via the internet that is designed to perform the (a) Authorisation (b) Encryption

T T
Small to Medium Enterprises? Any other privileges, such as installing new _________________ function as a conventional (c) Digital signature (d) All of the above
software, should be blocked. paper Cheque.
(a) Ease of sharing
(a) Principle of least privilege (a) Similar (b) Same
(b) Secure AUS-key authentication

M M
(b) Rules-based Access Control (RAC) (c) Distinguished (d) Different
(c) Same-time validation
(c) Role-based Access Control (RBAC)
(d) All of the above
(d) All of the above

O O
IMPORTANCE OF ACCESS AND PRIVILEGE
ELECTRONIC FUND TRANSFER

.F .F
CONTROL
93. ________________________ consists of one or 99. EFT stands for _____________________________.
more processes to verify the identity of a subject (a) Electronic finance transfer
attempting to access an object. However, it (b) Electronic fund transfer

O O
does not provide 100 percent assurance of the (c) Electronic fund transmission
subject’s identity. (d) Electronic finance transmission Answer Keys - MCQs

R R
(a) Identity management
(b) Authentication PAYMENT MECHANISM

P P
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
(c) Authorization 100. _______________________ allows the cardholder
(d) Accountability to pay for goods and services based on the (c) (a) (d) (c) (b) (a) (d) (a) (b) (d) (d) (a) (a) (c) (a) (b) (d) (d) (a) (d)
© Carvinowledge Press (CNP), 2019

© Carvinowledge Press (CNP), 2019


holder’s promise to pay for them. 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
94. _______________________ includes assigning
and managing a subject’s identity. (a) Debit card (b) Mobile banking (c) (b) (a) (d) (b) (d) (d) (d) (a) (c) (d) (b) (d) (c) (b) (d) (d) (d) (d) (d)
(c) Credit card (d) Internet banking
(a) Authentication 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
(b) Authorization 101. _________________________ is a form of (b) (d) (d) (d) (a) (d) (d) (d) (d) (d) (d) (d) (b) (c) (a) (c) (b) (a) (d) (d)
(c) Accountability payment made via the internet that is designed
to perform the same function as a conventional 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
(d) Identity management
paper Cheque. (b) (a) (d) (d) (d) (c) (d) (a) (b) (c) (b) (d) (c) (a) (b) (d) (a) (a) (b) (b)
95. ________________ is the process of verifying a (a) National Electronic Fund Transfer (NEFT) 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
subject’s identity at the point of object access.
(b) Immediate Payment Service (IMPS) (c) (b) (a) (b) (c) (a) (b) (c) (d) (d) (d) (d) (a) (d) (b) (c) (c) (a) (b) (c)
(a) Identity management
(c) Real Time Gross Settlement (RTGS)
(b) Authentication 101 102 103 104 105 106 107 108
(d) Electronic Cheque
(c) Authorization (d) (b) (a) (c) (b) (a) (b) (d)
(d) Accountability
c h a p t e r
11 Bu s ines s Proces s Au tomation throu g h Application S of t ware 73

(b) It consists of integrating applications, (b) Charging for instant access to records.

Business Process Automation restructuring labour resources and using


software applications throughout the
(Example: Public information, student
transcripts, medical records)
organization.
through Application Software
(c) Cost Savings, being clearly computed and
(c) BPA increases productivity by automating demonstrated.
key business processes through computing (d) All of the above
technology.
16. VTAS ltd wants to implement BPA in its
(d) All of the above business. Which of the following benefits justify
11. The process of __________________ enables the the implementations?

I I
Multiple Choice Questions (MCQs)

© Carvinowledge Press (CNP), 2019


ability to bring tasks that exist across multiple (a) Reducing the cost of audits and lawsuits.
computers and different business departments (b) Taking advantage of early payment discounts

D D
INTRODUCTION Business Process Automation (BPA) or branches under one umbrella that is the and eliminating duplicate payments.
1. Which of the following cases are examples of 5. ______________________ is a set of activities or business process itself.
(c) New revenue generation opportunities.

E E
automation? strategies to automate business processes so as (a) Integration (b) Automation
(d) All of the above
(a) The newspaper delivery boy has used Google to bring benefit to enterprise in terms of cost, (c) Orchestration (d) All of the above

V V
time and effort. 17.
Arrange the following steps of the
maps to chart his/her path to our house.

I I
STEPS IN IMPLEMENTING BPA implementation of BPA in the correct order:
(b) At petrol pumps, automated machines which (a) Business Process Automation (BPA)
12. Which of the following consideration is treated i. Define why we plan to implement BPA
fill car’s tank and generate computerized (b) Business Process Reprocessing

R R
bills. as a return on investment (ROI) on BPA? ii. Document the process, we wish to automate
(c) Business Process Re-engineering (BPR)
(a) Cost Savings, being clearly computed and iii. Development of BPA

T T
(c) Mother Dairy uses high degree of technology (d) Business Process Affirmation
to ensure that we get the freshest milk. demonstrated. iv. Testing the BPA
6. A BPA programme should ensure that data is
(d) All of the above (b) Savings in employee salary by not having to v. Defined the goals or objectives to be achieved
only available to persons who have right to see
replace those due to attrition. by implementing BPA
the same. Which of the following feature of BPA

M M
TYPES OF BUSINESS APPLICATIONS (c) The cost of space regained from paper, file vi. Understand the regulation /rules which it
is highlighted in the above phrases?
2. In ____________________, the data is first cabinets, reduced. needs to comply with
(a) Integrity (b) Availability
collected and then all the collected data is

O O
(d) All of the above vii. Calculate the ROI of project
(c) Confidentiality (d) Timeliness
processed in one go. 13. Which of the following consideration is treated viii. Engage a business process consultant

.F .F
(a) Online processing 7. A BPA programme should ensure that no un-
as a return on investment (ROI) on BPA? Arrange the above in the correct order:
authorized amendments can be made in the
(b) Real-time processing (a) Eliminating fines to be paid by the entity (a) i, ii, iii, iv, v, vi, vii and viii
data. Which of the following feature of BPA is
(c) Batch processing highlighted in the above phrases? with timely carrying out of process. (Due to (b) i, ii, vi, vii iii, iv, v, and viii
(d) None of the above delays being avoided.)

O O
(a) Integrity (b) Confidentiality (c) i, vi, ii, v, viii, vii, iii and iv
3. In _____________________, the data is processed (b) Reducing the cost of audits and lawsuits. (d) i, v, ii, iii, iv, vi, vii and viii
(c) Availability (d) Timeliness
(c) Taking advantage of early payment discounts

R R
immediately while it is entered, the user usually 18. There are thousands of processes across the
8. A BPA programme should ensure that data and eliminating duplicate payments.
only has to wait a short time for a response. world for which entities have gone for BPA
is available when asked for. Which of the

P P
(a) Batch processing (d) All of the above and reaped numerous benefits. These include
following feature of BPA is highlighted in the
(b) Online processing above phrases? 14. Which of the following consideration is treated __________________________.

©©Carvinowledge
(c) Real-time processing (a) Confidentiality (b) Integrity as a return on investment (ROI) on BPA? (a) Tracking movement of goods
(d) None of the above (a) Ensuring complete documentation for all (b) Sales order processing

CarvinowledgePress
(c) Timeliness (d) Availability
new accounts. (c) Customer services departments
4. In ________________________, input is 9. A BPA programme should ensure that data is
continuously, automatically acquired from (b) New revenue generation opportunities. (d) All of the above
made available in at the right time. Which of
sensors, for example, which is processed the following feature of BPA is highlighted in (c) Collecting accounts receivable faster and
19. There are thousands of processes across the
immediately in order to respond to the input in the above phrases? improving cash flow.
world for which entities have gone for BPA

Press(CNP),
as little time as possible. (a) Confidentiality (b) Timeliness (d) All of the above and reaped numerous benefits. These include
(a) Real-time processing (c) Integrity (d) Availability 15. Which of the following consideration is treated __________________________.

(CNP),2019
(b) Batch processing as a return on investment (ROI) on BPA? (a) Inventory management
10. Which of the following is a benefits of BPA?
(c) Online processing (a) Building business by providing superior (b) Employee Management System
(a) Business Process Automation (BPA) is a set of

2019
(d) None of the above levels of customer service. (c) Asset tracking systems.
activities or strategies to automate business
processes so as to bring benefit to enterprise (d) All of the above
in terms of cost, time and effort.”
74 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Bu s ines s Proces s Au tomation throu g h Application S of t ware 75

20. Goals must be clearly defined. It means they MANUAL INFORMATION PROCESSING CYCLE 35. ______________________________ ensures that operation and maintenance of information
shall be __________________ 27. The production manager of ENT enterprises no valid transactions have been omitted from systems in a planned and controlled manner in
(a) Measurable (b) Attainable instructed its workers to produce paper cups to the accounting records. an organization.
(c) Relevant (d) Specific the best of their abilities. Which of the following (a) Authorization (b) Completeness (a) Application (b) Managerial
feature is lacking in the above objective? (c) Accuracy (d) Validity (c) Corrosive (d) Preventive
21. Goals must be easily quantifiable in monetary
(a) Specific (b) Measurable
terms. It means they shall be __________. 36. _______________________________ ensures that 42. ______________ are the controls on the sequence
(c) Attainable (d) Timeliness all valid transactions are accurate, consistent of processing events.
(a) Measurable (b) Specific
28. ________________________ means entering data with the originating transaction data, and
(c) Attainable (d) Relevant (a) Application (b) Managerial
into the computer. information is recorded in a timely manner.

I I
22. Goals must be Achievable through best efforts. (c) Corrosive (d) Preventive
(a) Input (b) Processing (a) Authorization (b) Completeness
It means they shall be __________________ (c) Storage (d) Output 43. ______________ cover all phases of data right
(c) Accuracy (d) Validity

D D
(a) Specific (b) Measurable 29. _______________ means performing operations from data origination to its final disposal.
(c) Attainable (d) Relevant on the data. 37. _______________________________ ensures that (a) Managerial (b) Corrosive

E E
(a) Input (b) Storage all recorded transactions fairly represent (c) Application (d) Preventive
23. Goals shall be set as per the needs of the entity. the economic events that actually occurred,
It means they shall be __________________. (c) Output (d) Processing 44. _______________ cover transactions as they
are lawful in nature, and have been executed

V V
(a) Specific (b) Relevant 30. ____________ means saving data, programs and recorded in each stage of processing into
in accordance with management’s general

I I
(c) Measurable (d) Attainable outputs for future use. master, parameter and transaction files and
authorization.
(a) Input (b) Storage include controls relating to transmission

R R
24. Goals must be achieved within a given time (a) Validity (b) Authorization
(c) Processing (d) Output and distribution of output through display,
frame. It means they shall be __________________ (c) Completeness (d) Accuracy electronic media or printed reports.
31. __________ means presenting information in

T T
(a) Specific (b) Measurable the form of Report. 38. __________________________________ ensures (a) Managerial (b) Corrosive
(c) Attainable (d) Timely (a) Input (b) Processing that access to physical assets and information (c) Preventive (d) Application
25. Mr. Vishal Sarangi, the Manager (sales) of OTC (c) Output (d) Storage systems are controlled and properly restricted
to authorized personnel. 45.
______________________ comprises the

M M
ltd., has set a goal of achieving the sales of 1 32. ___________________________ ensures that all components that establish the interface
lakh units in the quarter of July- September. transactions are approved by responsible (a) Physical Safeguards and Security
between the user and the system.
Its previous records state that in the current personnel in accordance with their specific (b) Error Handling

O O
(a) Input (b) Communication
production capacity and capital availability or general authority before the transaction is (c) Completeness
the sale cannot be more than 40,000 units at (c) Boundary (d) Processing

.F .F
recorded. (d) Segregation of Duties
full utilization of the company’s resources. So, (a) Authorization (b) Completeness 46.
_____________________ comprises the
thereby the above goal cannot be achieved with 39. ______________________________ ensures that components that capture, prepare, and enter
(c) Accuracy (d) Validity errors detected at any stage of processing
the current production capacity and available commands and data into the system.
resources. Which of the following feature of an DELIVERY CHANNELS receive prompts corrective action and
(a) Boundary (b) Input

O O
optimum goal is lacking in the above case? are reported to the appropriate level of
33. ______________________ refers to the mode management. (c) Communication (d) Processing
(a) Specific (b) Measurable

R R
through which information or products are 47.
______________________ comprises the
(a) Physical Safeguards and Security
(c) Attainable (d) Timely delivered to users. components that transmit data among
(b) Error Handling

P P
26. The managers of Prathama ltd., desired to (a) Processing cycle (b) Delivery channel subsystems and systems.
(c) Completeness
produce 5 lakh units of ice cream cups and (c) Storage database (d) Feedback channels (a) Boundary (b) Input
cones and sell it in the month of July. Its current (d) Segregation of Duties
© Carvinowledge Press (CNP), 2019

©©Carvinowledge
(c) Processing (d) Communication
production capacity is of 7 lakh units with CONTROLS IN BPA 40. _________________________ ensures that duties

CarvinowledgePress
available resources and capital. On 15th July, are assigned to individuals in a manner that 48. __________________ comprises the components
34.
________________________ ensures that all
the workers of Prathama ltd. went on strike for ensures that no one individual can control both that perform decision making, computation,
transactions are approved by responsible
five days because of this the above budgeted the recording function and the procedures classification, ordering, and summarization of
personnel in accordance with their specific
sale level was achieved in the first week of relative to processing a transaction. data in the system.
or general authority before the transaction is
August. Which of the following feature lacked recorded. (a) Physical Safeguards and Security (a) Processing (b) Boundary

Press(CNP),
in the attainment of the above set goal? (a) Authorisation (b) Completeness (b) Error Handling (c) Input (d) Communication
(a) Specific (b) Measurable (c) Accuracy (d) Error handling (c) Completeness 49. __________________ comprises the components

(CNP),2019
(c) Attainable (d) Timeliness (d) Segregation of Duties that retrieve and present data to users of the
system.

2019
INFORMATION SYSTEM CONTROLS (a) Boundary (b) Input
41. __________________________ controls over the (c) Output (d) Database
managerial functions that must be performed
to ensure the development, implementation,
76 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs Bu s ines s Proces s Au tomation throu g h Application S of t ware 77

50. __________________ comprises the components 58. _________________________________ are 63. In computer system, _____________________ 69. ______________________ are intended to detect
that define, add, access, modify, and delete responsible for the daily running of hardware establish the authenticity of persons and errors in transaction data before the data are
data in the system. and software facilities. prevent the denial of messages or contracts processed.
(a) Boundary (b) Input (a) Data Resource Management Controls when data is exchanged electronically. (a) Source Document Control
(c) Output (d) Database (b) Quality Assurance Management Controls (a) Digital Signatures (b) Data Coding Controls
51. In which of the following the auditors evaluate (c) Security Management controls (b) Personal Identification Number (c) Batch Controls
systems development controls overall. (d) Operations management controls (c) Plastic cards (d) Validation Controls
(a) Concurrent audit 59. The system of internal control is said to be well (d) None of the above 70. ______________________ involve Transmission

I I
(b) Post-implementation designed and properly operated when _______. 64. ____________________ that are used to identify Media, Communication Lines, Modems,
(c) General audit (a) All transactions are executed in accordance a user need to go through procedural controls Port Protection Devices, Multiplexors and
with management’s general or specific like application for a card, preparation of the Concentrators.

D D
(d) None of the above
authorization; card, issue of the card, use of the card and (a) Physical Component Controls
52.
________________ focuses on individual return of the card or card termination phases.

E E
program modules. (b) Assets are safeguarded from unauthorized (b) Line Error Controls
access, use or disposition; and (a) Digital Signatures (c) Flow Controls
(a) Unit Testing
(b) Personal Identification Number

V V
(c) The recorded assets are compared with the (d) Link Controls
(b) Integration Testing

I I
existing assets at reasonable intervals and (c) Plastic cards
(c) Whole-of-Program Testing 71.
Whenever data is transmitted over a
appropriate action is taken with regard to (d) None of the above
(d) None of the above communication line, it can be received in error

R R
any differences.
65. In systems that use physical source documents because of attenuation, distortion, or noise
53. _________________ focuses in groups of program (d) All of the above to initiate transactions, careful control must be that occurs on the line. Which of the following

T T
modules. exercised over these instruments. controls shall be implemented so as to prevent
(a) Unit Testing TYPES OF APPLICATION CONTROLS
(a) Source Document Control such errors?
(b) Whole-of-Program Testing 60. Controls in the boundary subsystem serves (a) Physical Component Controls
(b) Data Coding Controls
which of the following purposes?

M M
(c) Integration Testing (c) Batch Controls (b) Flow Controls
(a) To establish the identity and authenticity of
(d) None of the above (d) Validation Controls (c) Link Controls
would-be-users of a computer system;
54. __________________ focuses on whole program. (d) Line Error Controls

O O
(b) To establish the identity and authenticity of 66. _________________________ are put in place
(a) Unit Testing computer-system resources that users wish at locations where batch processing is being 72. Which of the following is not way of Error

.F .F
(b) Integration Testing to employ; used. Detection?
(c) Whole-of-Program Testing (c) To restrict the actions undertaken by users (a) Source Document Control (a) Parity Checking
(d) None of the above who obtain computer resources to a set of (b) Data Coding Controls (b) Cyclic Redundancy Checks (CRC)
authorized actions.
(c) Batch Controls (c) Loop Check

O O
55. In __________program errors are corrected.
(d) All of the above
(a) Repair maintenance (d) Validation Controls (d) Forward Error Correcting Codes
61. _____________ restrict use of computer system

R R
(b) Adaptive Maintenance resources to authorized users, limit the 67. ___________________________ is where there is 73. Which of the following can be used for error
(c) Perfective Maintenance actions authorized users can taker with these a time gap between occurrence and recording correction?

P P
(d) None of the above resources, and ensure that users obtain only of transactions, that is, transactions are not (a) Parity Checking
authentic computer system resources. recorded at the time of occurrence but are (b) Cyclic Redundancy Checks (CRC)
56. In _____________ the program is modified to accumulated and a set (based on number/
© Carvinowledge Press (CNP), 2019

©©Carvinowledge
meet changing user requirements. (a) Access Controls (c) Loop Check
(b) Cryptographic controls time) is processed.

CarvinowledgePress
(a) Repair maintenance (d) Using backward Error Correction codes
(c) Input controls (a) Source Document Control
(b) Perfective Maintenance (b) Data Coding Controls 74. _______________________ are needed because
(d) Communication controls two nodes in a network can differ in terms of
(c) Adaptive Maintenance (c) Batch Controls
62. The _____________________ is similar to a the rate at which they can send receive and
(d) None of the above password assigned to a user by an institution (d) Validation Controls process data.

Press(CNP),
57. In _________________ the program is tuned to based on the user characteristics and encrypted 68. _____________________ validate the accuracy/ (a) Physical Component Controls
decrease the resource consumption. using a cryptographic algorithm. correctness of input data. (b) Flow Controls

(CNP),2019
(a) Repair maintenance (a) Digital Signatures (a) Source Document Control (c) Link Controls
(b) Perfective Maintenance (b) Personal Identification Number (b) Data Coding Controls (d) Line Error Controls

2019
(c) Adaptive Maintenance (c) Plastic cards (c) Batch Controls
(d) None of the above (d) None of the above (d) Validation Controls
78 IN FO RMATIO N T E C H N O LO G Y ( IT ) – M CQs

75.
The simplest form of flow control is (a) Process controls
“_____________ Flow Control” in which the (b) Physical Component Controls
sender transmits a frame of data only when the (c) Flow Controls
receiver is ready to accept the frame.
(d) Link Controls
(a) Stop-and-Wait (b) Pause-and-Play
80. ______________ ensure that the data delivered
(c) Stop-and-Play (d) Play-and-Rewind
to users will be represented, formatted and
76. __________ involves two common protocols – delivered in a consistent and secured manner.
HDLC and SDLC. (a) Output controls

I
(a) Physical Component Controls (b) Source Document Control
(b) Flow Controls (c) Data Coding Controls
(c) Link Controls

D
(d) Batch Controls
(d) Line Error Controls
81. _______________ consider the duration for

E
77. __________________________________ is which outputs should be retained before being
the process of connecting two or more destroyed.

V
communication networks together to allow the (a) Existence controls

I
users of one network to communicate with the
(b) Source Document Control
users of other networks.
(c) Retention controls

R
(a) Topological (b) Channel Access
(d) Data Coding Controls
(c) Internet working ( d) Flow

T
82. _____________________ are needed to recover
78. Which of the following device is not used to
output in the event that it is lost or destroyed.
connect sub-networks in an Internet?
(a) Source Document Control
(a) Bridge (b) Link

M
(b) Existence controls
(c) Router (d) Gateway
(c) Retention controls
79. ___________________________ perform
(d) Data Coding Controls

O
validation checks to identify errors during
processing of data.

.F
Answer Keys - MCQs

R O
P
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
(d) (c) (b) (a) (a) (c) (a) (d) (b) (d) (c) (d) (d) (d) (d) (d) (c) (d) (d) (d)
© Carvinowledge Press (CNP), 2019

21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
(a) (c) (b) (d) (c) (d) (a) (a) (d) (b) (c) (a) (b) (a) (b) (c) (a) (a) (b) (d)
41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
(b) (a) (c) (d) (c) (b) (d) (a) (c) (d) (c) (a) (c) (b) (a) (c) (b) (d) (d) (d)
61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
(a) (b) (a) (c) (a) (b) (c) (d) (d) (a) (d) (d) (d) (b) (a) (c) (c) (b) (a) (a)
81 82
(c) (b)
EIS-SM App
at
Google Play Store

You might also like