You are on page 1of 30

Question 

1
Correct
Mark 1.00 out of 1.00

Flag question

Question text
The current version of HTML is _______________.

Select one:

a.
Version 2010

b.
Version 6

c.
Version 7

d.
Version 5

e.
Version 4

Question 2
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Each column in the relation corresponds to _____________

Select one:

a.
An attribute of the entity
b.
Records

c.
Data of the entity

d.
Entity set

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Functions and procedures are

Select one:

a.
have side effects which require special care if they are used as subsystems

b.
not useful in designing computer systems

c.
useful in designing computer systems

d.
old fashioned and they are not useful

Question 4
Correct
Mark 1.00 out of 1.00

Flag question
Question text
A 3 NF relation is converted to BCNF by

Select one:

a.
removing multivalued dependencies

b.
dependent attributes of overlapping composite keys are put in a separaterelation

c.
dependent non-key attributes are put in a separate table

d.
removing composite keys

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A __________ Key Encryption eliminates the key distribution problem

Select one:

a.
Public

b.
Universal

c.
Global

d.
Private

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Why is there a need to control in information system?

Select one:

a.
Information system stores large volume of data.

b.
To comply with the technology requirement of the company.

c.
To prevent virus attack

d.
Information system took time to design. Redesigning the system will took a time to
redevelop.

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Information System is being tested as a whole system. What kind of testing is being
conducted?

Select one:

a.
Pilot Testing

b.
System Testing
c.
Parallel Test

d.
Full Testing

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Each computer connected to the internet must

Select one:

a.
be internet compatible

b.
have a modem connection

c.
have a unique IP address

d.
be an brand hi end personal computer or laptop

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Computer systems are designed by
Select one:

a.
breaking up the systems into independent parts

b.
simplifying requirements of system

c.
modular design

d.
breaking of the system into smaller self-contained co-operating subsystems

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is the best hierarchy of design of a report?

Select one:

a.
Report heading, Page heading, Control heading, Detail lines

b.
Detail lines, Report heading, Page heading, Control heading,

c.
Page heading, Report heading, Control heading, Detail lines

d.
Control heading, Report heading, Page heading, , Detail lines

Question 11
Correct
Mark 1.00 out of 1.00
Flag question

Question text
The last step in object oriented modelling is

Select one:

a.
develop an object interaction/collaboration graph

b.
document each class

c.
determine responsibilities of each object

d.
Assign object to its collaborations

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Each statement in DTD declares the element of HTML language.

Select one:
True
False 

Question 13
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Ronnie want to protect his data when sending from the main office to the branch office.
Which of the following information security he will apply?

Select one:

a.
Firewall

b.
Decryption

c.
Encryption

d.
File compression either zip or rar

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Relationships are identified from the word statement of a problem by

Select one:

a.
picking words which are verbs

b.
picking words which are pronouns

c.
picking words which are nouns

d.
picking words which are adjectives

Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text
The versions of IP address that coexist in the internet are _______________ and ____________.

Select one:

a.
Version 1 & 5

b.
Version 3 & 5

c.
Version 4 & 6

d.
Version 6 & 10

e.
Old and New

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In Entity Relationship, the Employee number, Gender, Salary are examples of
Select one:

a.
Entity

b.
Cardinality

c.
Attributes

d.
Tuples

e.
Relationship

Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Web@AT Corporation is newly established software company. Mr. Ang want to have a fast
and reliable DSL internet connection to his office. He asked his IT Officer to apply for a fast
connection.
Which of the following the IT Office need to do first?

Select one:

a.
Connect Mr. Ang computer to the server.

b.
Upgrade the company server.

c.
Check the telephone line if capable of DSL connection

d.
Request subscription fee to the Account Office.

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Who uses the report for tactical management?

Select one:

a.
Operational Management

b.
Middle Management

c.
Top Management

d.
All of the choices

Question 19
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This is a set of procedures that manage a database and provide application program access
the database in a form requested by the application programs.

Select one:

a.
Information System
b.
Flowcharting

c.
DMBS

d.
ER Process Diagram

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In the ER Diagram, relationships are

Select one:

a.
Adjective

b.
Verbs

c.
Nouns

d.
None of the choices

Question 21
Correct
Mark 1.00 out of 1.00

Flag question
Question text
DFD stands for _____________

Select one:

a.
Disk Flow Direction

b.
Data Flow Diagram

c.
Data File Diagram

d.
Direct File Direction

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Jonathan is the Web Programmer of TRA Corporation. He was assigned to develop an
informative website. He wants to use user defined tags. What markup language he will use?

Select one:

a.
XML

b.
HTML

c.
UDML

d.
SGML
Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This is concerned with protecting data regarding individuals from being accessed and used
without the permission/knowledge of concerned individuals.

Select one:

a.
Data Security

b.
Data Integrity

c.
Data Privacy

d.
Data Piracy

Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A relationship is in 2NF if,

Select one:

a.
If there are only 2 attributes

b.
If key attributes is independent on composite attribute

c.
If duplicate tuples exists

d.
It is in 1NF

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text
One entity may be

Select one:

a.
related to only two other entities

b.
related to itself

c.
related to only one other entity

d.
related to many other entities

Question 26
Correct
Mark 1.00 out of 1.00

Flag question

Question text
HTTP is a language used to create web pages.
Select one:
True
False 

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A member of a class is __________________.

Select one:

a.
an object instance

b.
a method

c.
an entity

d.
an attribute

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Hiding implementation details of methods from outside world.

Select one:

a.
Inheritance

b.
Abstraction

c.
Encapsulation

d.
Polymorphism

Question 29
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Inheritance in object-oriented modelling can be used to

Select one:

a.
specialize classes

b.
generalize and specialize classes

c.
create new classes

d.
generalize classes

Question 30
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which of the following is used to secure an E Commerce

Select one:

a.
Secure Socket Layer

b.
None of the choices

c.
All of the choices

d.
Digital certificate

e.
Encryption

Question 31
Correct
Mark 1.00 out of 1.00

Flag question

Question text
E-R Model has the ability to describe

Select one:

a.
All of the choices

b.
Many to Many
c.
1 to Many

d.
1 to 1

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text
An instance of an object is created by a

Select one:

a.
constructor operation

b.
open operation

c.
query operation

d.
update operation

Question 33
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This is acomputer-to-computer exchange of business documents in a standard electronic
format between business partners.
Select one:

a.
EDI

b.
HTML

c.
Email

d.
XML

Question 34
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This is the address of a web page on the internet.

Select one:

a.
DTD

b.
URL

c.
HTML

d.
XML

Question 35
Correct
Mark 1.00 out of 1.00
Flag question

Question text
The ___________ tag is used to link a web page to another page.

Select one:

a.
Link tag

b.
Connect tag

c.
Open tag

d.
Anchor tag

Question 36
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is a control technique during input preparation?

Select one:

a.
Regularly saving the record

b.
Responsive screen layout

c.
Data entry validation
d.
Account Login

Question 37
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Pie charts are normally used when

Select one:

a.
relative distribution of data in specified categories is to be shown

b.
percent use of resources under various heads is to be shown

c.
trends as a function of time is to be illustrated

d.
it is required to illustrate geographical distribution of data

Question 38
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Aldrin want to conduct a testing of the developed information system together with the
manual system using data used from manual system to test system when it is first
implemented. What kind of testing Aldrin will conduct?

Select one:
a.
Pilot Testing

b.
Full Testing

c.
System Testing

d.
Parallel Test

Question 39
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Entities are identified from the word statement of a problem by

Select one:

a.
picking words which are nouns

b.
picking words which are verbs

c.
picking words which are adjectives

d.
picking words which are pronouns

Question 40
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which of the following is a valid ER Diagram?

Select one:

a.

b.

c.

d.
Question 41
Correct
Mark 1.00 out of 1.00

Flag question

Question text
New classes are created from current classes by using the idea of _____________.

Select one:

a.
Polymorphism

b.
Encapsulation

c.
Inheritance

d.
Abstraction

Question 42
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This acts on behalf of all users of an organization wanting to use the internet.

Select one:

a.
Web application

b.
Internet Application Protocol
c.
Proxy application gateway

d.
Server application

Question 43
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This is an industry standard notation to represent a class.

Select one:

a.
ERD

b.
SDLC

c.
DBMS

d.
UML

Question 44
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In object modelling, special properties of objects are
Select one:

a.
methods, attributes, classes

b.
none of the choices

c.
encapsulation, inheritance and polymorphism

d.
entity, relationship, attributes

Question 45
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
A type of testing wherein incorrect inputs, incorrect processing and incorrect outputs will be
detected during operation.

Select one:

a.
Parallel Test

b.
Pilot Testing

c.
Full Testing

d.
System Testing

Question 46
Correct
Mark 1.00 out of 1.00
Flag question

Question text
In ER Model, student, teacher, professor and school are

Select one:

a.
Entity

b.
Properties

c.
Nouns

d.
Actors

e.
Relations

Question 47
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Designing screens uses principles

Select one:

a.
similar to those used for printed reports

b.
which are well specified
c.
different from those used for printed reports

d.
which are unique

Question 48
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Errors are found in an operational information system will result to

Select one:

a.
redesigning the system

b.
report to the programmers

c.
system shutdown

d.
lost of trust in the IS

Question 49
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A firewall is used in a system connected to a wide area network to
Select one:

a.
to extinguish fire spreading via network cables

b.
prevent unauthorized access by hackers

c.
prevent spread

d.
to scan for viruses in files

Question 50
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is also known as information hiding.

Select one:

a.
Inheritance

b.
Polymorphism

c.
Encapsulation

d.
Abstraction

You might also like