You are on page 1of 7

Information Technology

By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)


md.monowar@gmail.com

Information Technology
40
MCQ for exam preparation:
251. Which of the following involves analyzing 252. In which of the following types of analysis, the
complex relationships among thousands or value of only one variable is changed repeatedly,
even millions of data items stored in data and the resulting changes on other variables are
marts, data warehouses, and other observed.
multidimensional databases to discover
patterns, trends, and exception conditions? (a) what-if analysis
(b) Sensitivity analysis
(a) OLTP (c) Goal-seeking analysis
(b) OISE (d) All of the above
(c) OLALA
(d) OLAP
Ans.(d) Ans.(b)
OLAP (Online Analytical Processing) is the technology behind many Business Intelligence (BI) applications. OLAP is
a powerful technology for data discovery, including capabilities for limitless report viewing, complex analytical
calculations, and predictive “what if” scenario (budget, forecast) planning.

Sensitivity analysis determines how different values of an independent variable affect a particular dependent variable
under a given set of assumptions. In other words, sensitivity analyses study how various sources of uncertainty in a
mathematical model contribute to the model's overall uncertainty.

253. Summary transaction data, high-volume 254. Projections and responses to queries are
data, and simple models are information information output characteristics associated with
inputs characteristic of a(n): a(n):
(a) DSS (a) DSS
(b) MIS (b) MIS
(c) ESS (c) ESS
(d) TPS (d) TPS
Ans.(b) Ans.(c)

255. Decision support system involves all of 256. Another name of goal-seeking analysis is:
the following types of analytical
modelling activities except? (a) How to
(a) what-if analysis (b) How can
(b) Sensitivity analysis (c) Why not
(c) Goal-seeking analysis (d) Whats up
(d) Heuristics
Ans.(d) Ans.(b)

40
https://www.sarpublisher.com/business-information-systems-mcq-questions-and-answers-part-2/

08(2021) Page # 241


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

257. In which of the following types of analysis, 258. The first goal of executive information systems is
the goal is to find the optimum value for to provide top executives with immediate and
one or more target variables, given certain easy access to information about a firm, that is,
constraints? key factors that are critical to accomplishing an
organization’s strategic objectives.
(a) what-if analysis
(a) Critical Success Factors (CSFs)
(b) Sensitivity analysis
(b) Critical Accomplishing Factors (CAFs)
(c) Goal-seeking analysis
(c) Critical executive system (CECs)
(d) None of the above
(d) None of the above
Ans.(b) Ans.(a)

Critical Success Factors, also known as Key


Results Areas, are the areas of your business
or project that are vital to its success.
Identifying and communicating CSFs within
your organization helps to ensure that your
business or project is focused on its aims and
objectives.

259. ____ is a field of science and technology- 260. Technically, _____ is a defined structure for
based on disciplines such as computer efficient communication.
science, biology, psychology, linguistics,
mathematics, and engineering. (a) Networking.
(a) Natural intelligence (b) Communication technology
(b) Artificial intelligence (c) Information technology
(c) Articulate Intelligence (d) Computing
(d) None of the above
Ans.(b) Ans.(a)
Artificial intelligence is the simulation of Networking, also known as computer networking, is
human intelligence processes by machines, the practice of transporting and exchanging data
especially computer systems. Specific between nodes over a shared medium in an
applications of AI include expert systems, information system. Networking facilitates everything
natural language processing, speech recognition from telephone calls to text messaging to streaming
and machine vision. video to the internet of things (IoT).

261. EDP mean ——- 262. Hardware of computer means ——–

(a) Electrical disk processing (a) Paper used.


(b) Electronic data processing (b) Plastic box.
(c) Exact data processing. (c) Electronic circuit and devices.
(d) Extraordinary disk processing. (d) Magnetic particle.
Ans.(b) Ans.(c)
Electron Devices and Circuits : The branch of engineering in which the flow and control of electrons in vacuum or
semiconductor are studied is called electronics. The device which controls the flow of electrons is called electronic
device. These devices are the main building blocks of electronic circuits.

263. The payment on Internet is generally 264. Which of the following is a requirement for
made through ——– e-commerce?
(a) Cash card. (a) Market.
(b) Debit card. (b) Internet connectivity.
(c) Credit card. (c) Communication.
(d) Digital signature. (d) Digital signature.
Ans.(c) Ans.(b)

08(2021) Page # 242


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

265. The components of an expert system 266. _____ is the processing of raw data by using
include __________that perform a computer to perform the selection and
inferences on the knowledge in ordering process.
the knowledge base and communicate
answers to a user’s questions (a) Electronic data processing
(a) Database and software modules (b) Manual data processing.
(b) Knowledge base and software (c) Low data processing.
modules (d) High data processing.
(c) Communication base and software
modules
(d) knowledge base and interactive
device
Ans.(b) Ans.(a)

267. A computer security protocol for logging in 268. A System ——–


would be an example of the __________
component of an information system. (a) Is a place for the operation
(b) Is a set of the processes to perform the
(a) software operation.
(b) hardware (c) Does not accept the input/output.
(c) data (d) Is when the result are not obtained.
(d) procedure
Ans.(d) Ans.(a)

08(2021) Page # 243


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

269. A process is normally carried out——— 270. Boundaries of the system are the ——–

(a) On the system (a) System and environment interface.


(b) Done out of the system. (b) Parameter of the environment.
(c) Outside the system. (c) Border of the system.
(d) Send to the system. (d) Bases of the system.
Ans.(a) Ans.(a)

271. Customer numbers and their names would 272. Non-routine cognitive skills include
be an example of the component of an
order management information system (a) Communication.
(a) software (b) Problem-solving.
(b) hardware (c) Abstract reasoning.
(c) data (d) All of the above.
(d) procedure
Ans.(c) Ans.(d)

273. The system which keeps uses of the 274. Stable system is a system———
activities and transactions of the
organization is. (a) Which varies with home
(b) Does not vary with home.
(a) Knowledge level system. (c) Remains unsteady
(b) Operational level system. (d) Distributed by external changer.
(c) Management level system.
(d) Strategic level system.
Ans.(a) Ans.(b)

275. The actual machinery in a computer is 276. E-commerce means ——-


called—–
(a) Business through electronic media.
(a) Machinery. (b) Commercial activity.
(b) Hardware. (c) Electronic media.
(c) Software. (d) Transaction.
(d) Instruments.
Ans.(b) Ans.(a)

277. A human order taking can be bypassed 278. If you are a _________recipient of sensitive
when using a(n)____________________ information, such as might be overheard or
contained in a misdirected email, this would not
(a) Office automation system be illegal, but might be unethical to use it.
(b) Management information system (a) active
(c) Transaction processing system (b) passive
(d) Decision support system (c) proper
(d) business
Ans.(c) Ans.(b)

08(2021) Page # 244


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

279. Which is not a domain of Artificial 280. On-line transaction processing is used when
Intelligence? (a) it is required to ensure correct processing
(a) Virtual Reality (b) it is required to answer random queries & all
(b) Intelligent Agents files are available on-line
(c) Expert System (c) all files are available on-line
(d) None of the above (d) all files are stored using hard disk
Ans.(d) Ans.(b)

281. Which of the following is not a 282. The quality of your ____is a large part of the
characteristic of good information? quality of your information system.
(a) computer
(a) interchangeability
(b) thinking
(b) relevance
(c) time
(c) cost effectiveness
(d) challenges
(d) Accuracy
Ans.(a) Ans.(b)

283. Which of the following is not included in 284. Analysing data from different sources and
three levels of data abstraction perspectives and summarizing it into useful
information is
(a) Physical (a) Data warehousing
(b) Logical (b) Data Mining
(c) View (c) Data Digging
(d) data link (d) Data Bank
Ans.(d) Ans.(d)

08(2021) Page # 245


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

285. Enterprise resource planning (ERP) 286. Which is true in Enterprise resource planning
(a) has been made possible because of (ERP)
advances in hardware and software (a) has existed for over a decade
(b) uses client/server networks (b) does not integrate well with functional areas
(c) creates commonality of databases other than operations
(d) All of the above are true of ERP. (c) is inexpensive to implement
(d) automates and integrates the majority of
business processes
Ans.(d) Ans.(d)

287. Which consists of instructions and data that 288. What is the term used for “sequence of
computer manipulates to perform data instructions for the computer”?
processing tasks? (a) hardware.
(a) middleware. (b) program.
(b) hardware. (c) data.
(c) firmware. (d) instruction.
(d) software.
Ans.(d) Ans.(b)

289. Which computer-based model is developed 290. Which one of the following is used for evaluating
after human brain? credit risks?
(a) Fuzzy Logic (a) Virtual Reality
(b) Neural Network (b) Neural Network
(c) Virtual Reality (c) Fuzzy Logic
(d) All of the above (d) None of the above
Ans.(b) Ans.(b)

Neural Network

08(2021) Page # 246


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

291. Knowledge based system supports_______ 292. ________is a collection of logically related
(a) Knowledge of reation records and file.
(b) Knowledge of support (a) Folder
(c) Knowledge of Dissemination (b) Application
(d) All of the above (c) Database
(d) Field
Ans.(d) Ans.(c)

293. What digit is called a bit? 294. Which component of the computer consists of
physical entity of the device?
(a) decimal. (a) software.
(b) binary. (b) middleware.
(c) octal. (c) hardware.
(d) hexadecimal. (d) firmware.
Ans.(b) Ans.(c)

295. Distribution Resource Planning (DRP) is 296. In what way are Distribution Resource Planning
(DRP) and Material Requirements Planning
(a) a transportation plan to ship materials (MRP) similar?
to warehouses (a) Both employ similar logic and procedures.
(b) a time-phased stock replenishment (b) Both are employed in a manufacturing
plan for all levels of a distribution organization.
(c) a shipping plan from a central (c) Both work most efficiently with the largest
warehouse to retail warehouses lot sizes.
(d) material requirements planning with (d) Both are employed by retail organizations.
feedback loop from distribution
Ans.(b) Ans.(a)

297. All of the following are advantages of 298. Which of the following is false concerning
enterprise resource planning (ERP) except enterprise resource planning (ERP)?
(a) creates commonality of databases (a) It attempts to automate and integrate the
(b) increases communications and majority of business processes.
collaboration worldwide (b) It shares common data and practices across
(c) helps integrate multiple sites and the enterprise.
business units (c) It is inexpensive to implement
(d) requires major changes in the company (d) It provides and accesses information in a
and its processes to implement real-time environment.
Ans.(d) Ans.(c)

299. The segment in which business directly 300. The manipulation of binary information is done
sells to the end consumer is called ———– by logic circuits called __________.
(a) C2C. (a) blocks.
(b) P2P. (b) gates.
(c) B2C. (c) symbols.
(d) G2G. (d) functions.
Ans.(c) Ans.(b)

08(2021) Page # 247

You might also like