Professional Documents
Culture Documents
Information Technology
26
Computer Related Short Forms & Full Forms Abbreviations
26
https://focus-bangla.com/computer-related-full-forms-abbreviations-pdf/
Information Technology
27
MCQ for exam preparation:
3. The___can help you choose a 4. _____ is the most basic element of data
product. (a) Field
(a) management information (b) Record
system (c) Character
(b) transaction processing system (d) Database
(c) decision support system
(d) office automation system
Ans.(c) Ans.(c)
27
https://www.sarpublisher.com/business-information-systems-mcq-questions-and-answers-part-3/
11. Which of the following describes 12. A system that responds to changes in
exchanges between a system and the environment and modifies its
other systems or a system and any operation accordingly known as:
external agencies?
(a) Interface (a) A deterministic system.
(b) Suprasystem (b) A closed system.
(c) Environment (c) An adaptive system.
(d) Subsystem (d) A soft system.
Ans.(a) Ans.(c)
13. Which category of computer-based 14. In terms of the resources that support
information systems is concerned information systems, the procedures
with supporting the functional used by people are a example of:
areas of an organisation? (a) Hardware resources.
(a) Strategic information systems. (b) People resources.
(b) Expert systems. (c) Data resources.
(c) End user computing systems. (d) Software resources.
(d) Business information systems.
Ans.(d) Ans.(d)
15. Which of the following defines the 16. Which category of computer-based
scope of a system? information systems is concerned with
improving efficiency by applying
(a) Feedback mechanism. information technology to common
(b) Interface. administrative tasks, such as creating
(c) Boundary business documents?
(d) Process (a) Expert systems.
(b) Office automation systems.
(c) Business information systems.
(d) Strategic information systems.
Ans.(c) Ans.(b)
17. Information systems that monitor 18. Deciding where to locate new production
the elementary activities and facilities is a(n) example of a
transactions of the organizations manufacturing and production
are: information system operating at the:
(a) Management-level systems. (a) Operational level.
(b) Knowledge-level systems. (b) Management level.
(c) Strategic-level systems. (c) Knowledge level.
(d) Operational-level systems. (d) Strategic level.
Ans.(d) Ans.(d)
25. _______ is any business-related 26. ____ is a term that encompasses all
exchange such as payments to forms of technology used to create,
employees, sales to customers, or store, exchange, and use
payments to suppliers. information in its various forms.
(a) Input (a) Computer Technology
(b) Data (b) Network Technology
(c) eCommerce (c) Information Technology.
(d) A transaction (d) Client-Server Technology.
Ans.(d) Ans.(c)
27. ____ is an electronic device which 28. _____ is the utilization of technology to
converts raw data into meaningful improve the realization of office
information. functions.
(a) Hardware. (a) Office automation
(b) Software. (b) Office PC
(c) Compiler. (c) Office management
(d) Computer. (d) Office records
Ans.(d) Ans.(a)
28The first stage in the problem-solving process is called the ________ stage. During this stage,
29.
potential problems or opportunities are identified and defined.
(a) Choice (b) Design (c) Monitoring (d) Intelligence
Ans.(c)
28
https://wps.prenhall.com/bp_laudon_mis_9/32/8209/2101623.cw/-/2101642/index.html
34. Peripheral devices such as printers 35. The other name of a motherboard is
and monitors are considered to be (a) Central Board
(a) Hardware (b) System Board
(b) Information (c) Computer Board
(c) Data (d) Mouse
(d) Software
Ans.(a) Ans.(b)
38. The period from 1976 to present is 39. Speed of laser printer is measured in?
known as? (a) LPM
(a) Third Gen Computer (b) PPM
(b) Sixth Gen Computer (c) DPM
(c) Fourth Gen Computer (d) CPS
(d) Fifth Gen Computer
Ans.(d) Ans.(b)
29
https://freecomputernotes.com/objective%20type%20question%20of%20computer%20fundamental.html
40. Secondary memory is also know 41. Index hole is related to?
as? (a) Hard disk
(a) Primary memory (b) CPU
(b) Secondary memory (c) Floppy disk
(c) Auxiliary memory (d) Printer
(d) None of above
Ans.(c) Ans.(b)
44. RAM stands for? 45. Which of the following is used between
(a) Random Aligned Memory CPU and RAM to speed up the processing
(b) Random Access Memory power of a CPU?
(c) Read Access Memory (a) Virtual Memory
(d) None of these (b) Cache Memory
(c) DRAM
(d) Flash Memory
Ans.(b) Ans.(b)
Ans.(b) Ans.(b)
30
http://techmasterplus.com/exam/mcqs/electrical/computer-hardware-mcq-part1.php?i=1
48. ___________ converts ciphertext 49. Determining the decryption key for an
back into plaintext. intruder is extremely difficuly even if the
(a) Encryption intruder has access to
(b) Decryption (a) orginal data.
(c) An encoder (b) public key.
(d) A decoder (c) private key.
(d) encrypted data.
Ans.(b) Ans.(d)
Ans. (b)
Information Technology
MCQ for exam preparation:
51. Whose responsibility is it to see that the potential consequences of IS use are
fully considered?
(a) Information System professionals
(b) managers
(c) users
(d) all of the above
Ans. (a)
Information systems professionals investigate, analyze, design, develop or manage information systems based on computer
and related technologies through the objective application of specialized knowledge and professional judgement.
52. The information of MIS comes from the
(a) Internal source
(b) External source
(c) Both internal and external source
(d) None of the above
(Ans: c)
58.Internal information for MIS may come from any one of the following
departments.
(a) Customer
(b) Employee
(c) Supplier
(d) None of the above
(Ans: c)
Ans. (b)
68. In the MIS system design, the sources of information may be categorized as
…………… and ……………
Ans. (a)
69. What among the following are the primary characteristics that information must
process?
70. Which of the following models are developed on the principles of business
management, accounting, and econometrics?
71. An …………………. is a set of processes and procedures that transform data into
information and knowledge.
72. A system is called ………………… when the inputs, process and the outputs are
known with certainty.
(a) Probabilistic
(b) Deterministic
(c) Open
(d) Close
Ans. (b)
Types of System: There are some of the types of system in SAD(system analysis and
31
2.a) Open system: Open system are interacted with the environment. It receives input from
the environment and responds to them and delivers output to environment. These system
changes their organisation in response to changing conditions.
b) Close system: A system which does not interact with the environment is called closed
system. This system is self-control and control its own operation. Its environment does not
influence it.
3.a) Physical system: It may operate statically or dynamically eg:- A steal feeling cabin-ate is
a static physical item and air conditioning is a dynamic physical system which response to
environment and changes with time.
b) Abstract system: These types of system are conceptual. The are not physical entities. eg:-
Algorithm or an equation. Abstract system are always used to understand physical system.
Their components are inter relationship.
4.a) Manual System:In this type of system, human being work as main processor. All the
work related to input, processing and mostly depends on the human being. There are the
some advantages of human being i.e. they can think and analyse according to their past
experience.
So there are disadvantages of manual system like - It is time consuming. They need more
human efforts, chances of errors are high.
b) Automated system:The automated system works automatically. Computers are the best
example of automate system. There are some automated devices like:-
i) OMR (optical mark reader)
ii) MICR (magnetic ink character recogonization)
31 https://www.sahilnotes.xyz/2020/01/types-of-system-system-analysis-and.html
73. Which of the following steps is/are the implementation plans involved in MIS?
i) Word processing
ii) Electronic mail
iii) Voice mail
iv) Electronic calendaring
v) Audio/Video conferencing
32
77.
(a) interactivity
(b) global reach
(c) richness
(d) ubiquity
Ans. (b)
The dimension of e-commerce that enables commerce across national boundaries is called global reach. Global
Reach refers to a business initiative to increase the access between a company and their current and potential
customers through the use of the Internet.
78.
Doing business electronically describes e‐commerce. E-commerce (EC), an abbreviation for electronic commerce,
is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network,
primarily the internet.
79.
(a) C2B
(b) B2C
(c) B2B
(d) C2C
Ans. (a)
C2B is not one of the major types of e-commerce. The C2B, or consumer-to-business model, is when customers offer
products or services to businesses.
80. The term used to describe those people whose jobs involve sponsoring and
funding the project to develop, operate, and maintain the information system is
32 https://www.examveda.com/commerce/practice-mcq-question-on-ecommerce/
(a) technical hardware and software solution for the business problem
(b) business problem statement
(c) statement of the system users’ business requirements
(d) technical blueprint and specifications for a solution that fulfills the business requirements
(e) none of the above
Ans. (a)
82. When a bank uses information to launch a personalised credit card product this:
83. When a bank uses business performance management software to monitor its
performance in differences regions this:
84.When a bank offers web self-service for customers to answer their questions, the
primary outcome is:
86. The most important attribute of information quality that a manager requires is:
(a) relevance.
(b) media.
(c) presentation.
(d) timeliness.
(e) none of the above.
Ans.(a)
(a) Input.
(b) Processing.
(c) Output
(d) Control and feedback
(e) All of the above.
Ans. (d)
(a) Entity
(b) Source
(c) Process
(d) Attribute
(e) Database
Ans. (b)
92. A light sensitive device that converts drawing, printed text or other images into
33
digital form is
(a) Keyboard
(b) Plotter
(c) Scanner
(d) OMR
Ans. (c)
93. Information systems are composed 94. Information systems can facilitate
of basic components. supply chain management by:
(a) 4 (a) Providing product specifications.
(b) 3 (b) Tracking the status of orders.
(c) 2 (c) Rapidly communicating orders.
(d) None (d) Doing all of the above.
Ans.(b) Ans.(d)
95. Information has three dimensions. 96. Which of the following is not one of the
They are three ‘Cs’ describing groupware?
99. ____is the capability to continue 100. The expert system uses a (n) to select
as if nothing has happened, even the most appropriate response.
after a major component failure. (a) inference engine
(a) Redundancy (b) decision support system
(b) Interoperability (c) knowledge base
(c) Fault Tolerance (d) data source
(d) Backup
Ans.(c) Ans.(a)
33 https://allexamhub.com/computer-awareness/input-output-devices/subject/4/111
Information Technology
MCQ for exam preparation:
101. Which of the following is a 102. Which of the following level of managers
network of facilities for procuring develop short- and medium-range plans,
materials, transforming raw schedules, and budgets and specify the
materials into intermediate and policies, procedures, and business
finished products, and objectives for their sub-units of the
distributing the finished products company?
to customers? (a) Strategic
(a) production chain (b) Tactical
(b) primary chain (c) Operational
(c) supply chain (d) Front line
(d) distribution chain
Ans.(c) Ans.(b)
103. A tape library will use a robotic 104. A storage device that is connected
component called a(n)____ to directly to a network is an example of
change and store multiple tape _____
cartridges (a) network attached storage
(a) RAID (b) storage area network
(b) backup device (c) direct attached storage
(c) redundant system (d) RAID
(d) autoloader (e) None
Ans.(d) Ans.(a)
105. Preparing short-term budgets is 106. Tracking employee training, skills, and
an example of a finance and performance appraisals is an example of
accounting information system a human resource information system
operating at the: operating at the:
(a) Operational level. (a) Operational level.
(b) Management level. (b) Management level.
(c) Knowledge level. (c) Knowledge level.
(d) Strategic level. (d) Strategic level.
Ans.(b) Ans.(a)
107. More than one of the same 108. Which of the following is not one of the
component is an example of three main components in a decision
a___ system. support system?
(a) Scalable (a) Model
(b) redundant (b) Communications
(c) RAID (c) Data
(d) back-up (d) Dialogue
Ans.(b) Ans.(c)
111. Decision support systems 112. Identifying customers and markets using
usually: data on demographics, markets,
(a) Serve managers interested in consumer behaviour, and
weekly, monthly, and yearly trends is an example of a(n):
results, not day-to-day activities.
(b) Help managers make decisions (a) Operational-level sales and
that are unique, rapidly marketing information system.
changing, and not easily specified (b) Knowledge-level sales and marketing
in advance. information system.
(c) Provide managers with a (c) Management-level sales and
generalized computing and marketing information system.
telecommunications capacity that
(d) Strategic-level sales and marketing
can be applied to a changing
information system.
array of problems.
(d) Perform and record the daily
routine transactions necessary to
the conduct of business.
Ans.(b) Ans.(b)
113. Buy-side e-commerce is: 114. What is the role of document image
(a) The use of electronic processing (DIP) systems?
communications for all business
processes. (a) Conversion into digital format
(b) Any electronically mediated
(b) Product management.
communication between an
organisation and its stakeholders.
(c) Cash flow forecasting.
(c) An organisation using electronic (d) Producing customer invoices.
media to purchase from its suppliers.
(d) None
Ans.(c) Ans.(a)
Data mining is a feature of the conversion of data into some knowledgeable information. This
refers to getting some new information by looking into a large amount of data available. Using
various techniques and tools, one can predict the required information from the data only if
the procedure followed is correct. This helps various industries extract some required
information for future analysis by recognizing some patterns in the existing data in databases,
data warehouses, etc.
117. Which of the following is true 118. Which of these is a cost/efficiency driver
about ERP software? of e-commerce?
(a) Always adaptable to how the (a) Improving the range and quality of
business works. services offered.
(b) Extensive skills available for (b) Avoid losing market share to
development. businesses already using e-commerce.
(c) Supplier costs kept low. (c) Increasing speed with which supplies
(d) Simplified support and can be obtained.
maintenance through a supplier. (d) Customer demand.
Ans.(d) Ans.(c)
119. The ____ tells the computer how to 120. Operating System is——
use its components. (a) Software used for operation of the system.
(a) Application program (b) Closing of system.
(b) Operating system (c) To perform the function.
(c) Network (d) Multi-user system
(d) Utility
Ans.(b) Ans.(a)
123. Which of the following is not one 124. Which of the following individuals
of the five competitive forces typically have less formal, advanced
identified by Michael Porter? educational degrees and tend
to process rather than create
(a) The bargaining power of information?
customers.
(b) The threat of substitute (a) knowledge workers
products or services. (b) executives
(c) The threat of new entrants. (c) data workers
(d) The threat of changes in the (d) systems analysts
global economy.
Ans.(d) Ans.(c)
127. The secret code that restricts entry to 128. How many kilobytes make a megabyte?
some programs is
(a) 128
(a) Access-code (b) 256
(b) Entry-code (c) 512
(c) Passport (d) 1024
(d) Password
Ans.(a) Ans.(d)
129 Devices that provide backup storage are 130. The memory unit that directly
. called ___________ memory. communicates with CPU is called
__________ memory.
(a) main (b) auxiliary
(c) backup (d) device
(a) main (b) auxiliary
(c) device (d) backup
Ans.(b) Ans.(a)
131 The ____________ memory access time is 132. The fifth generation digital computer will
. less than the access time of the main be
memory. ____
133 Most application software’s today come 134. What software organizes, manages, and
. with an interface called a(n) ____ processes business data concerned with
inventory, customers, and vendors?
(a) Button user interface
(a) customer- oriented software
(b) Icon user interface
(b) data management software
(c) Character user interface
(c) storage area network network
(d) Graphical user interface (GUI)
(d) grid computing software
Ans.(d) Ans.(b)
135 Computer programs are written in a high- 136. Software for organizing storage and
. level programming language; however, the retrieval of information is a(an)
human-readable version of a program is
called ____ (a) Database program
(b) Database
(a) Instruction set (c) Data warehouse
(b) Word size (d) Operating system
(c) Source code
(d) Cache
Ans.(c) Ans.(c)
143 In a database, related fields are grouped 144. In a relational model, relations are
. to termed as
(a) File (b) Bank
(c) Menu (d) Data record (a) Rows (b) Attributes
(c) Tuples (d) Tables
Ans.(d) Ans.(d)
34 https://meritnotes.com/computer-quiz/dbms-pdf/1-76921/
Information Technology
MCQ for exam preparation:
151 The method of file organization in which 152. A database management system
. data records in a file are arranged in a (a) Allows simultaneous access to
specified order according to key field is multiple files
known as the (b) Can do more than a record
management system
(a) Queuing method (c) Is a collection of programs for
(b) Predetermined method managing data into a single file
(c) Direct access method (d) Both a and b
(d) Sequential access method
Ans.(d) Ans.(d)
153 Which of the following types of tables 154. Which of the following is/are the primary
. constraints will prevent the entry of features of a DBMS?
duplicate rows? (a) To provide an environment that is
(a) Foreign keys congenial to user
(b) Unique keys (b) To store the information
(c) Primary keys (c) To retrieve information
(d) Candidate keys (d) All of the above
Ans.(c) Ans.(d)
155 A _____ is a property of the entire relation 156. DBMS helps to achieve
. rather than of the individual tuples in which
each tuple is unique. (a) Data independence
(a) Rows (b) Attribute (b) More redundancy
(c) Fields (d) Key (c) Centralised manner to control of data
(d) Both a and c
Ans.(d) Ans.(d)
159 35
In a database, a network structure 160. Which of the following is at the highest
. (a) allows many-to-many relationship level in the hierarchy of data
(b) is a physical representation of the data organization?
(c) allows only one-to-one relationship (a) Database
(d) none of these (b) Data bank
(c) Data file
(d) Data record
Ans.(a) Ans.(a)
161 Mobile phone commercially available 162. Which language is used by most of
. in____year. DBMSs for helping their users to access
(a) 1983 (b) 1975 (c) 2001 data?
(d) 1988 (e) None of these (a) HLL (b) Query language
(c) SQL (d) 4 GL
Ans.(a) Ans.(b)
165 The management information system 166. ____ switching has used the
. (MIS) structure with one main computer transfer of coded values from input
system us called a to output.
(a) Centralized MIS structure (a) Combination
(b) Decentralized MIS structure (b) Space
(c) Distributed MIS structure (c) Time
(d) Hierarchical MIS structure (d) None of these
Ans.(a) Ans.(b)
35 https://meritnotes.com/computer-quiz/dbms-quiz/2-474/
36
https://t4tutorials.com/telecommunication-mcqs-multiple-choices-questions/
171. In the OSI layer, which layer 172. The performance of a data
performs management of communications network is
tokens _____? highly dependeds on _____
Ans.(c) Ans.(d)
173. Which type of protocol provides 174. Frames transfer from one LAN
a virtual terminal in TCP/IP to another LAN is by ______
model_
(a) Router
(a) SMTP (b) Modem
(b) Telnet (c) Repeater
(c) HTTP (d) Bridge
(d) None of these
Ans.(b) Ans.(d)
175. Internet service available on 176. How many digits of the DNIC
mobile phone in_____year can be used to identify the
country?
(a) 1999
(b) 1982 (a) first three
(c) 1991 (b) first five
(d) 1978 (c) first two
(e) None of these (d) first six
(e) None of these
Ans.(a) Ans.(a)
The DNIC (Data Network Identification Code) has three digits to identify the country (one to identify a zone and two
to identify the country within the zone) and one to identify the PDN (allowing only ten in each country).
177. Three major systems of the 178. Design issue of Data link Layer
GSM network are ______ in OSI Reference Model
_____?
(a) SS, BSS, OSS
(b) CELL, BSC, OSS (a) Framing
(c) BSS, BSC, MSC (b) Synchronization of bits
(d) None of these (c) Representation of bits
(d) Connection control
Ans.(a) Ans.(a)
Global system for mobile communication (GSM) is a globally accepted standard for digital cellular
communication. GSM is the name of a standardization group established in 1982 to create a common European
mobile telephone standard that would formulate specifications for a pan-European mobile cellular radio system
operating at 900 MHz. It is estimated that many countries outside of Europe will join the GSM partnership.
The switching system (SS) is responsible for performing call processing and subscriber-related functions. The
switching system includes the following functional units.
181. The format of data is called 182. ___ physical path is used to
travel massages form one
(a) Semantics place to another
(b) Struck
(c) Syntax (a) Path
(d) Both a and b (b) Protocol
(e) None of the mentioned (c) Route
(d) Medium
Ans.(c) Ans.(d)
185. Which of this is not a network 186. A set of rules that governs
edge device? data communication
(a) Switch (a) Standards
(b) PC (b) RFCs
(c) Smartphones (c) Protocols
(d) Servers (d) None of these
Ans.(a) Ans.(a)
187. In which connection, three or 188. When a variety of varied PC’s
more devices share a link work in a single coherent
(a) Unipoint system to its consumer, then
(b) Point to point it’s known as
(c) Multipoint (a) computer network
(d) None of these (b) networking system
(c) distributed system
(d) none of the mentioned
Ans.(c) Ans.(c)
189. _______ topology requires a 190. Which network is built on the
multipoint connection. top of other networks?
(a) Star (a) overlay network
(b) Mesh (b) prior network
(c) Ring (c) chief network
(d) Bus (d) prime network
(e) None of these
Ans.(d) Ans.(a)
191. Two devices are in network if 192. WAN stands for __________
(a) a process is running on both
devices (a) World area network
(b) PIDs of the processes running
(b) Wide area network
of various devices area unit same
(c) a method in one device is in a
(c) Web area network
position exchange data with a (d) Web access network
method in another device
(d)None of these
Ans.(c) Ans.(b)
193. In computer network nodes are 194. The communication channel is
(a) the computer that originates shared by all the machines on
the data the network in
(b) the computer that routes
the data (a) unicast network
(c) the computer that (b) multicast network
terminates the data (c) None of these
(d) all of the mentioned (d) broadcast network
(e) None of these
Ans.(d) Ans.(d)
195. 37
Physical or logical 196. Which network topology
arrangement of network is requires a central controller or
__________ hub?
(a) Topology (a) Star
(b) Routing (b) Mesh
(c) Networking (c) Ring
(d) Control (d) Bus
Ans.(a) Ans.(a)
37
https://www.sanfoundry.com/computer-networks-mcqs-topology/
Information Technology
MCQ for exam preparation:
201. Which of the following is not 202. The idealistic market future at the
considered to be one of the three outset of the development of
phases of e-commerce? e-commerce is called a ______.
(a) Preservation. (a) Bailey market.
(b) Innovation. (b) Baxter market.
(c) Consolidation. (c) Bertrand market.
(d) Reinvention. (d) Bergman market
Ans.(a) Ans.(c)
Bertrand market
203. 38
Which one of the following is not 204. Compared to B2C e-commerce,
one of the major types of B2B e-commerce is ______.
e-commerce?
(a) of equal size.
(a) B2C.
(b) slightly smaller.
(b) B2B.
(c) slightly larger.
(c) C2C.
(d) much larger.
(d) C2B.
Ans.(d) Ans.(d)
38
https://www.studocu.com/en-ca/document/langara-college/entrepreneurship/other/business-model-e-business-mcq-multiple-choice-questions/4957542/view
207. All of the following are major B2C 208. The area of actual or potential
business models except ______. commercial value in which a
company intends to operate is a
(a) content provider. _______.
(b) transaction broker.
(a) market space.
(c) service provider.
(b) marketplace.
(d) industry consortium.
(c) perfect market.
(d) Bertrand market
Ans.(d) Ans.(a)
209. The underlying computing 210. E-commerce merchant server
equipment that the system uses to software includes all of the
achieve its e-commerce following except_______.
functionality is called a ______.
(a) content platform. (a) online catalog.
(b) transaction platform. (b) online shopping cart.
(c) scalability platform. (c) online credit card processing.
(d) hardware platform. (d) online e-mail.
Ans.(d) Ans.(d)
213. The most widely used encryption 214. Which of the following is NOT a
standard is ______. dimension of e-commerce security
(a) Advanced Encryption Standard (AES). provided by encryption?
(b) Data Encryption Standard (DES).
(a) availability.
(c) Universal Encryption Standard (UES).
(d) Optimal Encryption Standard (OES). (b) message integrity.
(c) nonrepudiation.
(d) confidentiality.
Ans.(a) Ans.(a)
215. Which of the following is not a 216. When hackers flood a Web site with
primary function of a portal? useless traffic to overwhelm the
network, it is called ______.
(a) navigation of the Web. (a) phishing.
(b) commerce. (b) a Denial of Service (DoS)
(c) content. attack.
(d) social networking. (c) spoofing.
(d) pharming.
Ans.(d) Ans.(b)
Phishing is a type of social engineering attack often used to steal user data, including login credentials
and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into
opening an email, instant message, or text message.
A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it
inaccessible to its intended users. Victims of DoS attacks often target web servers of high-profile
organizations such as banking, commerce, and media companies, or government and trade organizations.
In the context of information security, and especially network security, a spoofing attack is a situation in
which a person or program successfully identifies as another by falsifying data, to gain an
illegitimate advantage.
Pharming is a form of cyberattack that sends you to a fake website that looks like the real thing. The
user will type in a legitimate web address and is redirected to a fake website that resembles the real
website.
217. All of the following are potential 218. The two main types of Internet-
benefits of B2B e-commerce based B2B commerce are______.
except_________.
(a) reduced amount of 'first-mover' (a) Net marketplaces and private
advantages. industrial networks.
(b) decreased product cycle time. (b) Net marketplaces and
(c) increased opportunities for collaborative commerce.
collaborating with suppliers and (c) EDI and private industrial
distributors. networks.
(d) increased production flexibility. (d) EDI and collaborative
commerce.
Ans.(a) Ans.(c)
219. The most common and easily 220. The E-commerce domain that
understood type of Net involves business activity initiated
marketplace is ______. by the consumer and targeted to
businesses is known as ______.
(a) e-procurement marketplace.
(b) industry consortia. (a) Business to Business (B2B).
(c) independent exchanges. (b) Consumer to Consumer (C2C).
(d) e-distributors. (c) Business to Consumer (B2C)
(d) Consumer to Business (C2B).
Ans.(d) Ans.(d)
eBay, Amazon.com belong to B2Cs segments. The term business-to-consumer (B2C) refers to the process
of selling products and services directly between consumers who are the end-users of its products or
services.
39
https://www.examveda.com/which-segment-do-ebay-amazoncom-belong-32618/
225. Which type of e‐commerce focuses 226. The best products to sell in B2C
on consumers dealing with each e‐commerce are:
other? (a) Small products (b) Fresh
(a) B2B (b) B2C products
(c) C2B (d) C2C (c) Digital products
(d) Specialty products
Ans.(d) Ans.(c)
C2C type of e‐commerce focuses on consumers dealing The best products to sell in B2C e‐commerce
with each other. Consumer to consumer, or C2C, is the are Digital products. A digital product is an
business model that facilitates commerce between private intangible asset or piece of media that can be
individuals. Whether it's for goods or services, this sold and distributed repeatedly online without
category of e-commerce connects people to do business the need to replenish inventory.
with one another.
227. Digital products are best suited for 228. All of the following are techniques
B2C e‐commerce because they: B2C e‐commerce companies use to
(a) are commodity like products attract customers, except:
(b) can be mass‐customized and (a) Registering with search engines
personalized (b) Viral marketing
(c) can be delivered at the time of (c) Online ads
purchase (d) Virtual marketing
(d) All of the above
Ans.(d) Ans.(d)
Digital products are best suited for B2C e‐commerce because they are commodity like products, can be
mass‐customized and personalized and can be delivered at the time of purchase.
A logical design describes the flow of information at your e-commerce site and the infrastructure that will
be used in the system. Logical design is the conceptual design of a system. It describes the flow of
information at your e-commerce site, the processing functions that must be performed, the database that
will be used, the security and emergency backup procedures that will be instituted, and the controls that will
be used in the system.
Secure Sockets Layer (SSL) is a protocol for establishing a secure channel between two devices that are
connected over the Internet or an internal connection.
233. The success of web hypertext 234. ____ includes search and
publishing is aided by which of the discovery for a set of products in
following the larger information space
(a)More powerful workstations capable of meeting customer
(b)High-resolution graphic displays requirements and products
(c)Faster network communication (a)pre-purchase preparation phase
(d)All the above (b)purchase consummation phase
(c)post-purchase interaction phase
(d)none
Ans.(d) Ans.(a)
237. To facilitate better consumer and 238. The following are the components
organizational search, software of ________
intermediaries called 1. e-cash 2. e-cheque
3. credit card 4. debit card
(a) information brokers (a) electronic payment systems
(b) brokerages (b) electronic funds transfer
(c) information interfaces (c) electronic money system
(d) interface brokers (d) none of the above
Ans.(a) Ans.(a)
239. The Decision support systems use 240. ______were the original type of
all of the following EXCEPT: information system developed to
(a) Analytical models, support managerial decision
(b) Specialized databases making.
(c) Online Transaction processing (a) Management information
(d) A decision makers own systems
insights and judgments (b) Decision Support systems
(c) Management Tracking System
(d) Strategic Information System
Ans.(c) Ans.(a)
A decision support system (DSS) is a computerized program used to support determinations, judgments,
and courses of action in an organization or a business. A DSS sifts through and analyzes massive amounts
of data, compiling comprehensive information that can be used to solve problems and in decision-making.
241. Example of Office automation tools 242. Which of the following can work
are —- both as an input and output
(a)Pencil and Pen (b) File and Rack medium?
(c) Table and Desk
(d) Electronic Mail and Internet System (a) Keyboard (b) Trackball
(c) Light pen (d) Touch screen
Ans.(d) Ans.(d)
243. With the ____form of data 244. _____ is the multiplexing technique
processing, each transaction is that shifts each signal to a different
processed immediately. carrier frequency.
(a) OLTP (a) FDM
(b) batch processing (b) TDM
(c) active processing (c) Both FDM & TDM
(d) automated transaction processing (d) PDM
Ans.(a) Ans.(a)
247. Transport layer aggregates data 248. _____represent complex data using
from different applications into a interactive three- dimensional
single stream before passing it to graphical forms such as charts,
____________ graphs, and maps.
249. The growth of corporate intranets, 250. There are two levels of information
extranets, as well as the web, has in every organization and are——- .
accelerated the development and use
of executive class information delivery
(a) An internet client and
and decision support software tools by
Internet Server.
lower levels of management and by
individuals and teams of business (b) Telephone information and
professionals. This dramatic expansion voice information.
has opened the door to the use of (c) Formal and informal
which of the following tool? information
(d) Internal Information and
(a) Business intelligence (BI) External Information.
(b) Business Knowledge (BK)
(c) Business Ideas (BI)
(d) Business Intelligent (BI)
Ans.(b) Ans.(d)
Information Technology
40
MCQ for exam preparation:
251. Which of the following involves analyzing 252. In which of the following types of analysis, the
complex relationships among thousands or value of only one variable is changed repeatedly,
even millions of data items stored in data and the resulting changes on other variables are
marts, data warehouses, and other observed.
multidimensional databases to discover
patterns, trends, and exception conditions? (a) what-if analysis
(b) Sensitivity analysis
(a) OLTP (c) Goal-seeking analysis
(b) OISE (d) All of the above
(c) OLALA
(d) OLAP
Ans.(d) Ans.(b)
OLAP (Online Analytical Processing) is the technology behind many Business Intelligence (BI) applications. OLAP is
a powerful technology for data discovery, including capabilities for limitless report viewing, complex analytical
calculations, and predictive “what if” scenario (budget, forecast) planning.
Sensitivity analysis determines how different values of an independent variable affect a particular dependent variable
under a given set of assumptions. In other words, sensitivity analyses study how various sources of uncertainty in a
mathematical model contribute to the model's overall uncertainty.
253. Summary transaction data, high-volume 254. Projections and responses to queries are
data, and simple models are information information output characteristics associated with
inputs characteristic of a(n): a(n):
(a) DSS (a) DSS
(b) MIS (b) MIS
(c) ESS (c) ESS
(d) TPS (d) TPS
Ans.(b) Ans.(c)
255. Decision support system involves all of 256. Another name of goal-seeking analysis is:
the following types of analytical
modelling activities except? (a) How to
(a) what-if analysis (b) How can
(b) Sensitivity analysis (c) Why not
(c) Goal-seeking analysis (d) Whats up
(d) Heuristics
Ans.(d) Ans.(b)
40
https://www.sarpublisher.com/business-information-systems-mcq-questions-and-answers-part-2/
257. In which of the following types of analysis, 258. The first goal of executive information systems is
the goal is to find the optimum value for to provide top executives with immediate and
one or more target variables, given certain easy access to information about a firm, that is,
constraints? key factors that are critical to accomplishing an
organization’s strategic objectives.
(a) what-if analysis
(a) Critical Success Factors (CSFs)
(b) Sensitivity analysis
(b) Critical Accomplishing Factors (CAFs)
(c) Goal-seeking analysis
(c) Critical executive system (CECs)
(d) None of the above
(d) None of the above
Ans.(b) Ans.(a)
259. ____ is a field of science and technology- 260. Technically, _____ is a defined structure for
based on disciplines such as computer efficient communication.
science, biology, psychology, linguistics,
mathematics, and engineering. (a) Networking.
(a) Natural intelligence (b) Communication technology
(b) Artificial intelligence (c) Information technology
(c) Articulate Intelligence (d) Computing
(d) None of the above
Ans.(b) Ans.(a)
Artificial intelligence is the simulation of Networking, also known as computer networking, is
human intelligence processes by machines, the practice of transporting and exchanging data
especially computer systems. Specific between nodes over a shared medium in an
applications of AI include expert systems, information system. Networking facilitates everything
natural language processing, speech recognition from telephone calls to text messaging to streaming
and machine vision. video to the internet of things (IoT).
263. The payment on Internet is generally 264. Which of the following is a requirement for
made through ——– e-commerce?
(a) Cash card. (a) Market.
(b) Debit card. (b) Internet connectivity.
(c) Credit card. (c) Communication.
(d) Digital signature. (d) Digital signature.
Ans.(c) Ans.(b)
265. The components of an expert system 266. _____ is the processing of raw data by using
include __________that perform a computer to perform the selection and
inferences on the knowledge in ordering process.
the knowledge base and communicate
answers to a user’s questions (a) Electronic data processing
(a) Database and software modules (b) Manual data processing.
(b) Knowledge base and software (c) Low data processing.
modules (d) High data processing.
(c) Communication base and software
modules
(d) knowledge base and interactive
device
Ans.(b) Ans.(a)
269. A process is normally carried out——— 270. Boundaries of the system are the ——–
271. Customer numbers and their names would 272. Non-routine cognitive skills include
be an example of the component of an
order management information system (a) Communication.
(a) software (b) Problem-solving.
(b) hardware (c) Abstract reasoning.
(c) data (d) All of the above.
(d) procedure
Ans.(c) Ans.(d)
273. The system which keeps uses of the 274. Stable system is a system———
activities and transactions of the
organization is. (a) Which varies with home
(b) Does not vary with home.
(a) Knowledge level system. (c) Remains unsteady
(b) Operational level system. (d) Distributed by external changer.
(c) Management level system.
(d) Strategic level system.
Ans.(a) Ans.(b)
277. A human order taking can be bypassed 278. If you are a _________recipient of sensitive
when using a(n)____________________ information, such as might be overheard or
contained in a misdirected email, this would not
(a) Office automation system be illegal, but might be unethical to use it.
(b) Management information system (a) active
(c) Transaction processing system (b) passive
(d) Decision support system (c) proper
(d) business
Ans.(c) Ans.(b)
279. Which is not a domain of Artificial 280. On-line transaction processing is used when
Intelligence? (a) it is required to ensure correct processing
(a) Virtual Reality (b) it is required to answer random queries & all
(b) Intelligent Agents files are available on-line
(c) Expert System (c) all files are available on-line
(d) None of the above (d) all files are stored using hard disk
Ans.(d) Ans.(b)
281. Which of the following is not a 282. The quality of your ____is a large part of the
characteristic of good information? quality of your information system.
(a) computer
(a) interchangeability
(b) thinking
(b) relevance
(c) time
(c) cost effectiveness
(d) challenges
(d) Accuracy
Ans.(a) Ans.(b)
283. Which of the following is not included in 284. Analysing data from different sources and
three levels of data abstraction perspectives and summarizing it into useful
information is
(a) Physical (a) Data warehousing
(b) Logical (b) Data Mining
(c) View (c) Data Digging
(d) data link (d) Data Bank
Ans.(d) Ans.(d)
285. Enterprise resource planning (ERP) 286. Which is true in Enterprise resource planning
(a) has been made possible because of (ERP)
advances in hardware and software (a) has existed for over a decade
(b) uses client/server networks (b) does not integrate well with functional areas
(c) creates commonality of databases other than operations
(d) All of the above are true of ERP. (c) is inexpensive to implement
(d) automates and integrates the majority of
business processes
Ans.(d) Ans.(d)
287. Which consists of instructions and data that 288. What is the term used for “sequence of
computer manipulates to perform data instructions for the computer”?
processing tasks? (a) hardware.
(a) middleware. (b) program.
(b) hardware. (c) data.
(c) firmware. (d) instruction.
(d) software.
Ans.(d) Ans.(b)
289. Which computer-based model is developed 290. Which one of the following is used for evaluating
after human brain? credit risks?
(a) Fuzzy Logic (a) Virtual Reality
(b) Neural Network (b) Neural Network
(c) Virtual Reality (c) Fuzzy Logic
(d) All of the above (d) None of the above
Ans.(b) Ans.(b)
Neural Network
291. Knowledge based system supports_______ 292. ________is a collection of logically related
(a) Knowledge of reation records and file.
(b) Knowledge of support (a) Folder
(c) Knowledge of Dissemination (b) Application
(d) All of the above (c) Database
(d) Field
Ans.(d) Ans.(c)
293. What digit is called a bit? 294. Which component of the computer consists of
physical entity of the device?
(a) decimal. (a) software.
(b) binary. (b) middleware.
(c) octal. (c) hardware.
(d) hexadecimal. (d) firmware.
Ans.(b) Ans.(c)
295. Distribution Resource Planning (DRP) is 296. In what way are Distribution Resource Planning
(DRP) and Material Requirements Planning
(a) a transportation plan to ship materials (MRP) similar?
to warehouses (a) Both employ similar logic and procedures.
(b) a time-phased stock replenishment (b) Both are employed in a manufacturing
plan for all levels of a distribution organization.
(c) a shipping plan from a central (c) Both work most efficiently with the largest
warehouse to retail warehouses lot sizes.
(d) material requirements planning with (d) Both are employed by retail organizations.
feedback loop from distribution
Ans.(b) Ans.(a)
297. All of the following are advantages of 298. Which of the following is false concerning
enterprise resource planning (ERP) except enterprise resource planning (ERP)?
(a) creates commonality of databases (a) It attempts to automate and integrate the
(b) increases communications and majority of business processes.
collaboration worldwide (b) It shares common data and practices across
(c) helps integrate multiple sites and the enterprise.
business units (c) It is inexpensive to implement
(d) requires major changes in the company (d) It provides and accesses information in a
and its processes to implement real-time environment.
Ans.(d) Ans.(c)
299. The segment in which business directly 300. The manipulation of binary information is done
sells to the end consumer is called ———– by logic circuits called __________.
(a) C2C. (a) blocks.
(b) P2P. (b) gates.
(c) B2C. (c) symbols.
(d) G2G. (d) functions.
Ans.(c) Ans.(b)