You are on page 1of 51

Information Technology

By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)


md.monowar@gmail.com

Information Technology
26
Computer Related Short Forms & Full Forms Abbreviations

VIRUS — Vital Information Resource Under Seized.


Wi-Fi — Wireless Fidelity.
HTTP — Hyper Text Transfer Protocol.
HTTPS — HyperText Transfer Protocol Secure.
URL — Uniform Resource Locator.
IP — Internet Protocol
SIM — Subscriber Identity Module.
3G — 3rd Generation.
GSM — Global System for Mobile Communication.
CDMA — Code Divison Multiple Access.
UMTS — Universal Mobile Telecommunication System.
RTS — Real Time Streaming
AVI — Audio Video Interleave
SIS — Symbian OS Installer File
AMR — Adaptive Multi-Rate Codec
JAD — Java Application Descriptor
JAR — Java Archive
MP3 — MPEG player lll
3GPP — 3rd Generation Partnership Project
3GP — 3rd Generation Project
MP4 — MPEG-4 video file
AAC — Advanced Audio Coding
GIF — Graphic Interchangeable Format
BMP — Bitmap
JPEG — Joint Photographic Expert Group
SWF — Shock Wave Flash
WMV — Windows Media Video
WMA — Windows Media Audio
WAV — Waveform Audio
PNG — Portable Network Graphics
DOC — Doc**ent (Microsoft Corporation)

26
https://focus-bangla.com/computer-related-full-forms-abbreviations-pdf/

08(2021) Page # 197


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

PDF — Portable Doc**ent Format


M3G — Mobile 3D Graphics
M4A — MPEG-4 Audio File
NTH — Nokia Theme(series 40)
THM — Themes (Sony Ericsson)
MMF — Synthetic Music Mobile Application File
NRT — Nokia Ringtone
XMF — Extensible Music File
WBMP — Wireless Bitmap Image
DVX — DivX Video
HTML — Hyper Text Markup Language
WML — Wireless Markup Language
CD — Compact Disk.
DVD — Digital Versatile Disk.
CRT — Cathode Ray Tube.
DAT — Digital Audio Tape.
DOS — Disk Operating System.
GUI — Graphical User Interface.
ISP — Internet Service Provider.
TCP — Transmission Control Protocol.
UPS — Uninterruptible Power Supply.
HSDPA — High Speed Downlink Packet Access.
EDGE — Enhanced Data Rate for GSM [Global System for Mobile Communication]
VHF — Very High Frequency.
UHF — Ultra High Frequency.
GPRS — General Packet Radio Service.
WAP — Wireless Application Protocol.
ARPANET — Advanced Research Project Agency Network.
IBM — International Business Machines.
HP — Hewlett Packard.
AM/FM — Amplitude/ Frequency Modulation.
WLAN — Wireless Local Area Network
USB — Universal Serial Bus.

08(2021) Page # 198


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

Information Technology
27
MCQ for exam preparation:

1. A human order taker can be 2. Processed data is called


bypassed when using a(n) (a) Record
(a) Automation system (b) File
(b) Management information (c) Field
system (d) Information
(c) decision support system
(d) Transaction processing system
Ans.(d) Ans.(d)

3. The___can help you choose a 4. _____ is the most basic element of data
product. (a) Field
(a) management information (b) Record
system (c) Character
(b) transaction processing system (d) Database
(c) decision support system
(d) office automation system
Ans.(c) Ans.(c)

5. An intranet that is accessible by 6. Which of the following information


outside workers. systems are used in the daily running of
(a) MIS the business?
(b) Firewall (a) OPS
(c) Extranet (b) TPS
(d) Internet (c) OAS
(d) All the above
Ans.(c) Ans.(b)

7. Which of the following is an EIS? 8. To determine demand for Internet


(a) External information system. services in a market, companies should
(b) Extended information system. survey what?
(c) Electronic information system. (a) Percentage that have access to the Internet.
(b) Percentage that purchase online.
(d) Executive information system.
(c) Percentage that use the Internet to inform their
buying decision.
(d) All of the above.
Ans.(d) Ans.(d)

9. Which of the following system 10. In terms of a system, finished products


components is responsible for and information are examples of:
ensuring that the system is working
to fulfil its objective? (a) Feedback
(a)Outputs (b) Control
(b) Processing (c) Processing
(c) Feedback (d) Outputs
(d) Control
Ans.(d) Ans.(d)

27
https://www.sarpublisher.com/business-information-systems-mcq-questions-and-answers-part-3/

08(2021) Page # 199


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

11. Which of the following describes 12. A system that responds to changes in
exchanges between a system and the environment and modifies its
other systems or a system and any operation accordingly known as:
external agencies?
(a) Interface (a) A deterministic system.
(b) Suprasystem (b) A closed system.
(c) Environment (c) An adaptive system.
(d) Subsystem (d) A soft system.
Ans.(a) Ans.(c)

13. Which category of computer-based 14. In terms of the resources that support
information systems is concerned information systems, the procedures
with supporting the functional used by people are a example of:
areas of an organisation? (a) Hardware resources.
(a) Strategic information systems. (b) People resources.
(b) Expert systems. (c) Data resources.
(c) End user computing systems. (d) Software resources.
(d) Business information systems.
Ans.(d) Ans.(d)

15. Which of the following defines the 16. Which category of computer-based
scope of a system? information systems is concerned with
improving efficiency by applying
(a) Feedback mechanism. information technology to common
(b) Interface. administrative tasks, such as creating
(c) Boundary business documents?
(d) Process (a) Expert systems.
(b) Office automation systems.
(c) Business information systems.
(d) Strategic information systems.
Ans.(c) Ans.(b)

17. Information systems that monitor 18. Deciding where to locate new production
the elementary activities and facilities is a(n) example of a
transactions of the organizations manufacturing and production
are: information system operating at the:
(a) Management-level systems. (a) Operational level.
(b) Knowledge-level systems. (b) Management level.
(c) Strategic-level systems. (c) Knowledge level.
(d) Operational-level systems. (d) Strategic level.
Ans.(d) Ans.(d)

19. Assembling a product, identifying 20. Enterprise systems support:


customers and hiring employees
are: (a) Manufacturing processes.
(a) Transactions (b) Financial and accounting processes.
(b) Phases (c) Human resource processes.
(c) Business processes. (d) All of the above.
(d) Business functions.
Ans.(c) Ans.(d)

08(2021) Page # 200


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

21. ______were the original type of 22. Information is ________________


information system developed to
support managerial decision (a) a collection of data
making. (b) a processed data
(a) Management information (c) a text data.
systems (d) an audio/video data
(b) Decision Support systems
(c) Management Tracking System
(d) Strategic Information System
Ans.(a) Ans.(b)

23. If the ICAB sets up a web-based 24. To improve the performance of a


information system that faculty business process, which of the following
could access to record student is most relevant?
grades and to advise CA students,
that would be an example of a/an (a) Input.
(a) CRM (b) Processing.
(b) intranet (c) Control and feedback
(c) ERP (d) Output.
(d) extranet
Ans.(b) Ans.(c)

25. _______ is any business-related 26. ____ is a term that encompasses all
exchange such as payments to forms of technology used to create,
employees, sales to customers, or store, exchange, and use
payments to suppliers. information in its various forms.
(a) Input (a) Computer Technology
(b) Data (b) Network Technology
(c) eCommerce (c) Information Technology.
(d) A transaction (d) Client-Server Technology.
Ans.(d) Ans.(c)

27. ____ is an electronic device which 28. _____ is the utilization of technology to
converts raw data into meaningful improve the realization of office
information. functions.
(a) Hardware. (a) Office automation
(b) Software. (b) Office PC
(c) Compiler. (c) Office management
(d) Computer. (d) Office records
Ans.(d) Ans.(a)

28The first stage in the problem-solving process is called the ________ stage. During this stage,
29.
potential problems or opportunities are identified and defined.
(a) Choice (b) Design (c) Monitoring (d) Intelligence
Ans.(c)

28
https://wps.prenhall.com/bp_laudon_mis_9/32/8209/2101623.cw/-/2101642/index.html

08(2021) Page # 201


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

30 . The hardware device commonly 31 . When a bank teller uses a computer


referred to as the “brain” of the terminal to know the balance in a
computer customer’s accounts it is an example of?
(a) Secondary storage (a) Online updating
(b) CPU (b) Offline processing
(c) Data input (c) Online processing
(d) RAM chip (d) Online query
Ans.(b) Ans.(d)

32 . A ___ is used to read handwritten 33 . A device for changing the connection on


or printed text to make a digital a connector to a different configuration
image that is stored in memory. is ___
(a) Touch pad (a) A converter
(b) Laser beam (b) An adapter
(c) Scanner (c) An attachment
(d) Printer (d) A component
Ans.(c) Ans.(b)

34. Peripheral devices such as printers 35. The other name of a motherboard is
and monitors are considered to be (a) Central Board
(a) Hardware (b) System Board
(b) Information (c) Computer Board
(c) Data (d) Mouse
(d) Software
Ans.(a) Ans.(b)

36. Computers that control processes 37. 29


EDSAC was invented in?
and accept data in a continuous (a) 1947
(a) Infinite loop (b) 1936
(b) Feedback loop (c) 1935
(c) Data highway (d) None of above
(d) Data traffic pattern
Ans.(b) Ans.(a)

38. The period from 1976 to present is 39. Speed of laser printer is measured in?
known as? (a) LPM
(a) Third Gen Computer (b) PPM
(b) Sixth Gen Computer (c) DPM
(c) Fourth Gen Computer (d) CPS
(d) Fifth Gen Computer
Ans.(d) Ans.(b)

29
https://freecomputernotes.com/objective%20type%20question%20of%20computer%20fundamental.html

08(2021) Page # 202


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

40. Secondary memory is also know 41. Index hole is related to?
as? (a) Hard disk
(a) Primary memory (b) CPU
(b) Secondary memory (c) Floppy disk
(c) Auxiliary memory (d) Printer
(d) None of above
Ans.(c) Ans.(b)

42. What is the full form of IP?


30
43. _________is a program that accepts a
(a) Internet protocol symbolic language program?
(b) Immediate protocol (a) Assembler
(c) Internet processing (b) Compiler
(d) Immediate processing (c) Loader
(d) None of these
Ans.(a) Ans.(a)

44. RAM stands for? 45. Which of the following is used between
(a) Random Aligned Memory CPU and RAM to speed up the processing
(b) Random Access Memory power of a CPU?
(c) Read Access Memory (a) Virtual Memory
(d) None of these (b) Cache Memory
(c) DRAM
(d) Flash Memory
Ans.(b) Ans.(b)

46. ______________ is any business- 47. ______________ is software programs


related exchange such as payments that were developed for a general
to employees, sales to customers, market and that can be purchased in a
or payments to suppliers. store.
(a) Data (a) Proprietary software
(b) A transaction (b) Off-the-shelf software
(c) E-commerce (c) Contract software
(d) Input (d) Application software

Ans.(b) Ans.(b)

30
http://techmasterplus.com/exam/mcqs/electrical/computer-hardware-mcq-part1.php?i=1

08(2021) Page # 203


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com
Off the shelf software are standardized software applications that are mass-produced, available to the general public, and fit for
immediate use. They are designed for a broad range of customers, offering a comprehensive set of features to streamline operations.

48. ___________ converts ciphertext 49. Determining the decryption key for an
back into plaintext. intruder is extremely difficuly even if the
(a) Encryption intruder has access to
(b) Decryption (a) orginal data.
(c) An encoder (b) public key.
(d) A decoder (c) private key.
(d) encrypted data.
Ans.(b) Ans.(d)

50. _________ involves the investigation of new approaches to existing problems.

(a) Systems analysis


(b) Creative analysis
(c) Critical analysis
(d) Organizational analysis

Ans. (b)

Creative analysis is about forethought and perspective,


being creative in how you apply analysis.

A solely analytical approach would insist that you can't fit a


square peg in a round hole. A solely creative approach would
feel stifled by having only limited tools to solve the problem.

08(2021) Page # 204


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

Information Technology
MCQ for exam preparation:

51. Whose responsibility is it to see that the potential consequences of IS use are
fully considered?
(a) Information System professionals
(b) managers
(c) users
(d) all of the above
Ans. (a)
Information systems professionals investigate, analyze, design, develop or manage information systems based on computer
and related technologies through the objective application of specialized knowledge and professional judgement.
52. The information of MIS comes from the
(a) Internal source
(b) External source
(c) Both internal and external source
(d) None of the above
(Ans: c)

53.The back bone of any organization is


(a) information
(b) employee
(c) management
(d) capital
(Ans: a)

54.AI is the short form of


(a) Artificial information
(b) Artificial intelligence
(c) Artificial integration
(d) None of the above
(Ans: b)

55.The advantage(s) of transistors are they


(a) Are portable
(b) Are more reliable
(c) Consume less power
(d) All of the above
(Ans: d)

08(2021) Page # 207


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

56.The flow of information through MIS is

(a) need dependent


(b) organization dependent
(c) information dependent
(d) management dependent
(Ans: a)

57.The elements of control will consist of

(a) Authority, Direction, Management


(b) Authority, Direction, Information
(c) Authority, Application, Management
(d) Authority, Application, Information
(Ans: a)

58.Internal information for MIS may come from any one of the following
departments.

(a) Customers care department


(b) HR department
(c) Marketing department
(d) Production department
(Ans: a)

59.Audit gives details about ________ to Account Payable System

(a) Account balance


(b) Transaction
(c) Expenditure
(d) All of the above
(Ans: a)

60.One byte is made of


(a) Four bits
(b) Eight bits
(c) Twelve bits
(d) Sixteen bits
(Ans: b)

08(2021) Page # 208


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

61.MIS normally found in a manufacturing organization will not be suitable in the


______.

(a) Service sector


(b) Banking sector
(c) Agriculture sector
(d) All of the above
(Ans: a)

62._______ details are given by Management to Marketing Service System.

(a) Customer
(b) Employee
(c) Supplier
(d) None of the above
(Ans: c)

63.The basic component(s) of DSS is (are)


(a) Database
(b) Model base
(c) DSS software system
(d) All of the above
(Ans: d)

64.GDSS is the short form of

(a) Group Decision Support System


(b) Group Discussion Support System
(c) Group Decision Service System
(d) Group Discussion Support Source
(Ans: a)

08(2021) Page # 209


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

65. Decision trees could be represented in different ways such as


(a) Bottom to top
(b) Left to right
(c) Top to bottom
(d) All of the above
(Ans: d)

66. The types of data transmission


modes are
(a) Half duplex. ,Duplex. , Singlex
(b) Half duplex. ,Duplex. , Simplex
(c) Half duplex. ,Duplex. , Half Singlex
(d) Singlex, duplex, half triplex
(Ans: b)

67. Which of the following is NOT an objective of MIS?

(a) Facilitate the decision-making process


(b) recruit people for system
(c) Provide requisite information at each level of management
(d) Support decision-making

Ans. (b)

08(2021) Page # 210


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

68. In the MIS system design, the sources of information may be categorized as
…………… and ……………

(a) internal, external


(b) personal, organizational
(c) useful, unuseful
(d) constructive, destructive

Ans. (a)

69. What among the following are the primary characteristics that information must
process?

i) Relevance ii) Availability


iii) Timeliness iv) Accuracy

(a) Only i, ii, and iii


(b) Only ii, iii and iv
(c) Only i, iii and iv
(d) All i, ii, iii, and iv
Ans. (a)

70. Which of the following models are developed on the principles of business
management, accounting, and econometrics?

(a) Behavioral model


(b) Management science models
(c) Operations research models
(d) Policymaking models
Ans. (b)

71. An …………………. is a set of processes and procedures that transform data into
information and knowledge.

(a) information system


(b) Knowledge system
(c) Database system
(d) Computer system
Ans.(a)

72. A system is called ………………… when the inputs, process and the outputs are
known with certainty.

(a) Probabilistic
(b) Deterministic

08(2021) Page # 211


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

(c) Open
(d) Close
Ans. (b)

Types of System: There are some of the types of system in SAD(system analysis and
31

design) which are given below:-

1. Deterministic / Probabilistic system


2. Open / Close system
3. Manual / Automated system
4. Physical / Abstract system

1.a) Deterministic system: A deterministic system is a system, which operated in a


predictable manner, where step execution take place and output is known, e.g.:- A computer
program for finding square of a number.

b) Probabilistic system: A probabilistic system is a system, which operates in an unpredictable


manner, where outcome is not certain or sure. eg:- weather forecasting.

2.a) Open system: Open system are interacted with the environment. It receives input from
the environment and responds to them and delivers output to environment. These system
changes their organisation in response to changing conditions.

b) Close system: A system which does not interact with the environment is called closed
system. This system is self-control and control its own operation. Its environment does not
influence it.

3.a) Physical system: It may operate statically or dynamically eg:- A steal feeling cabin-ate is
a static physical item and air conditioning is a dynamic physical system which response to
environment and changes with time.

b) Abstract system: These types of system are conceptual. The are not physical entities. eg:-
Algorithm or an equation. Abstract system are always used to understand physical system.
Their components are inter relationship.

4.a) Manual System:In this type of system, human being work as main processor. All the
work related to input, processing and mostly depends on the human being. There are the
some advantages of human being i.e. they can think and analyse according to their past
experience.

So there are disadvantages of manual system like - It is time consuming. They need more
human efforts, chances of errors are high.

b) Automated system:The automated system works automatically. Computers are the best
example of automate system. There are some automated devices like:-
i) OMR (optical mark reader)
ii) MICR (magnetic ink character recogonization)

31 https://www.sahilnotes.xyz/2020/01/types-of-system-system-analysis-and.html

08(2021) Page # 212


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

73. Which of the following steps is/are the implementation plans involved in MIS?

i) Preparing organizational plans


ii) Planning of workflow
iii) Training of personnel
iv) Development of software
v) Acquiring computer hardware

(a) i, ii and iii only


(b) i, ii, iii and iv only
(c) i, ii, iv and v only
(d) All i, ii, iii, iv and v
Ans. (d)

74. Which of the following is included in the Office automation systems?

i) Word processing
ii) Electronic mail
iii) Voice mail
iv) Electronic calendaring
v) Audio/Video conferencing

(a) i, ii, iii and v only


(b) i, ii, iii and iv only
(c) i, ii, iv and v only
(d) All i, ii, iii, iv and v
Ans. (d)

75. In a typical ……………. network, application processing is shared between clients


and one more server.
(a) client-server computing
(b) cloud computing
(c) mobile computing
(d) data computing
Ans. (a)

76. The ……………….. is defined as a set of activities performed across the


organization creating as the output of value to the customer.

(a) development process


(b) business process
(c) quality process
(d) customer focus
Ans. (b)

08(2021) Page # 213


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

32
77.

(a) interactivity
(b) global reach
(c) richness
(d) ubiquity
Ans. (b)
The dimension of e-commerce that enables commerce across national boundaries is called global reach. Global
Reach refers to a business initiative to increase the access between a company and their current and potential
customers through the use of the Internet.
78.

(a) Doing business electronically


(b) Doing business
(c) Sale of goods
(d) All of the above
Ans. (a)

Doing business electronically describes e‐commerce. E-commerce (EC), an abbreviation for electronic commerce,
is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network,
primarily the internet.

79.

(a) C2B
(b) B2C
(c) B2B
(d) C2C
Ans. (a)

C2B is not one of the major types of e-commerce. The C2B, or consumer-to-business model, is when customers offer
products or services to businesses.

80. The term used to describe those people whose jobs involve sponsoring and
funding the project to develop, operate, and maintain the information system is

(a) information worker


(b) internal system user
(c) systems owner
(d) external system user
Ans. (c)

32 https://www.examveda.com/commerce/practice-mcq-question-on-ecommerce/

08(2021) Page # 214


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

81. Which of the following is a deliverable of the system implementation phase in a


formal system development process?

(a) technical hardware and software solution for the business problem
(b) business problem statement
(c) statement of the system users’ business requirements
(d) technical blueprint and specifications for a solution that fulfills the business requirements
(e) none of the above
Ans. (a)

82. When a bank uses information to launch a personalised credit card product this:

(a) manages risks.


(b) creates a new opportunity.
(c) adds value.
(d) reduces costs.
(e) none of the above.
Ans. (c)

83. When a bank uses business performance management software to monitor its
performance in differences regions this:

(a) reduces costs.


(b) manages risks.
(c) adds value.
(d) creates a new opportunity.
(e) none of the above.
Ans. (b)

84.When a bank offers web self-service for customers to answer their questions, the
primary outcome is:

(a) adds value.


(b) manages risks.
(c) reduces costs.
(d) creates a new opportunity.
(e) none of the above.
Ans. (c)

08(2021) Page # 215


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

85. The general transformation cycle for information is:

(a) information to data to knowledge.


(b) knowledge to data to information.
(c) data to knowledge to information.
(d) data to information to knowledge.
(e) none of the above.
Ans. (d)

86. The most important attribute of information quality that a manager requires is:

(a) relevance.
(b) media.
(c) presentation.
(d) timeliness.
(e) none of the above.
Ans.(a)

87. To improve the performance of a business process, which of the following is


most relevant?

(a) Input.
(b) Processing.
(c) Output
(d) Control and feedback
(e) All of the above.
Ans. (d)

88. The majority of publically available Internet information sources are:

(a) created in XML.


(b) structured information.
(c) normal information.
(d) unstructured information.
(e) none of the above.
Ans. (d)

89. Which of the following should be represented on an information flow diagram?

(a) Entity
(b) Source
(c) Process

08(2021) Page # 216


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

(d) Attribute
(e) Database
Ans. (b)

90. A web blueprint depicts:

(a) the layout of an individual web page


(b) the layout of the home page

(c) the layout of an index page


(d) the layout of a website
(e) the layout of a sitemap
Ans. (d)

91. System Study involves

(a) study of an existing system


(b) documenting the existing system.
(c) identifying current deficiencies and establishing new goals
(d) All of the above
(e) None of the above
Ans. (d)

08(2021) Page # 217


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

92. A light sensitive device that converts drawing, printed text or other images into
33

digital form is
(a) Keyboard
(b) Plotter
(c) Scanner
(d) OMR
Ans. (c)

93. Information systems are composed 94. Information systems can facilitate
of basic components. supply chain management by:
(a) 4 (a) Providing product specifications.
(b) 3 (b) Tracking the status of orders.
(c) 2 (c) Rapidly communicating orders.
(d) None (d) Doing all of the above.
Ans.(b) Ans.(d)

95. Information has three dimensions. 96. Which of the following is not one of the
They are three ‘Cs’ describing groupware?

(a) Time, consent, and form (a) Coordination.


(b) Time, content, and form (b) Communication.
(c) Cost, content, and form (c) Compliance.
(d) Time, content, and Value (d) Collaboration
Ans.(b) Ans.(c)
97. Projections and responses to 98. Summary transaction data, high-volume
queries are information output data, and simple models are information
characteristics associated with inputs characteristic of a(n):
a(n):
(a) DSS
(a) DSS (b) MIS
(b) MIS (c) ESS
(c) ESS (d) TPS
(d) TPS
Ans.(c) Ans.(b)

99. ____is the capability to continue 100. The expert system uses a (n) to select
as if nothing has happened, even the most appropriate response.
after a major component failure. (a) inference engine
(a) Redundancy (b) decision support system
(b) Interoperability (c) knowledge base
(c) Fault Tolerance (d) data source
(d) Backup
Ans.(c) Ans.(a)

33 https://allexamhub.com/computer-awareness/input-output-devices/subject/4/111

08(2021) Page # 218


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

Information Technology
MCQ for exam preparation:

101. Which of the following is a 102. Which of the following level of managers
network of facilities for procuring develop short- and medium-range plans,
materials, transforming raw schedules, and budgets and specify the
materials into intermediate and policies, procedures, and business
finished products, and objectives for their sub-units of the
distributing the finished products company?
to customers? (a) Strategic
(a) production chain (b) Tactical
(b) primary chain (c) Operational
(c) supply chain (d) Front line
(d) distribution chain
Ans.(c) Ans.(b)
103. A tape library will use a robotic 104. A storage device that is connected
component called a(n)____ to directly to a network is an example of
change and store multiple tape _____
cartridges (a) network attached storage
(a) RAID (b) storage area network
(b) backup device (c) direct attached storage
(c) redundant system (d) RAID
(d) autoloader (e) None
Ans.(d) Ans.(a)

105. Preparing short-term budgets is 106. Tracking employee training, skills, and
an example of a finance and performance appraisals is an example of
accounting information system a human resource information system
operating at the: operating at the:
(a) Operational level. (a) Operational level.
(b) Management level. (b) Management level.
(c) Knowledge level. (c) Knowledge level.
(d) Strategic level. (d) Strategic level.
Ans.(b) Ans.(a)

107. More than one of the same 108. Which of the following is not one of the
component is an example of three main components in a decision
a___ system. support system?
(a) Scalable (a) Model
(b) redundant (b) Communications
(c) RAID (c) Data
(d) back-up (d) Dialogue
Ans.(b) Ans.(c)

109. A set of pre-recorded instructions 110. Computer programs are known as …


executed by a computer is called the - (a) operating system (b) applications
(a) Action. (b) Programs (c) multytusking (d) software
(c) Hardware. (d) Software.
Ans.(b) Ans.(d)

08(2021) Page # 217


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

Reliability of Series and Parallel (Redundant) Systems with calculation

111. Decision support systems 112. Identifying customers and markets using
usually: data on demographics, markets,
(a) Serve managers interested in consumer behaviour, and
weekly, monthly, and yearly trends is an example of a(n):
results, not day-to-day activities.
(b) Help managers make decisions (a) Operational-level sales and
that are unique, rapidly marketing information system.
changing, and not easily specified (b) Knowledge-level sales and marketing
in advance. information system.
(c) Provide managers with a (c) Management-level sales and
generalized computing and marketing information system.
telecommunications capacity that
(d) Strategic-level sales and marketing
can be applied to a changing
information system.
array of problems.
(d) Perform and record the daily
routine transactions necessary to
the conduct of business.
Ans.(b) Ans.(b)

113. Buy-side e-commerce is: 114. What is the role of document image
(a) The use of electronic processing (DIP) systems?
communications for all business
processes. (a) Conversion into digital format
(b) Any electronically mediated
(b) Product management.
communication between an
organisation and its stakeholders.
(c) Cash flow forecasting.
(c) An organisation using electronic (d) Producing customer invoices.
media to purchase from its suppliers.
(d) None
Ans.(c) Ans.(a)

08(2021) Page # 218


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

115. Materials Requirements Planning 116. Business Intelligence and data


(MRP) software is an example of warehousing are used for which of the
an information systems following?
application in which of the (a) Data mining.
following areas? (b) Analysis of large volumes of product
(a) Office automation systems. sales data.
(b) Operations management. (c) What-if scenarios.
(c) Marketing (d) All of the above.
(d) Human resource
management.
Ans.(b) Ans.(d)

Data mining is a feature of the conversion of data into some knowledgeable information. This
refers to getting some new information by looking into a large amount of data available. Using
various techniques and tools, one can predict the required information from the data only if
the procedure followed is correct. This helps various industries extract some required
information for future analysis by recognizing some patterns in the existing data in databases,
data warehouses, etc.

117. Which of the following is true 118. Which of these is a cost/efficiency driver
about ERP software? of e-commerce?
(a) Always adaptable to how the (a) Improving the range and quality of
business works. services offered.
(b) Extensive skills available for (b) Avoid losing market share to
development. businesses already using e-commerce.
(c) Supplier costs kept low. (c) Increasing speed with which supplies
(d) Simplified support and can be obtained.
maintenance through a supplier. (d) Customer demand.
Ans.(d) Ans.(c)

119. The ____ tells the computer how to 120. Operating System is——
use its components. (a) Software used for operation of the system.
(a) Application program (b) Closing of system.
(b) Operating system (c) To perform the function.
(c) Network (d) Multi-user system
(d) Utility
Ans.(b) Ans.(a)

08(2021) Page # 219


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

121. Software of computer means—— 122. Application software is—–


(a) Menu-driven specific software
(a) Magnetic disk.
(b) Software for specific operation.
(b) Electronic circuit and devices.
(c) Software for programming.
(c) Printing device.
(d) Printing device.
(d) Interface between operator and
machine.
Ans.(d) Ans.(b)

123. Which of the following is not one 124. Which of the following individuals
of the five competitive forces typically have less formal, advanced
identified by Michael Porter? educational degrees and tend
to process rather than create
(a) The bargaining power of information?
customers.
(b) The threat of substitute (a) knowledge workers
products or services. (b) executives
(c) The threat of new entrants. (c) data workers
(d) The threat of changes in the (d) systems analysts
global economy.
Ans.(d) Ans.(c)

125. Computers process binary numbers, 126. Android is ____


which are composed of ____ (a) Application (b) Interface
(a) 1s and 2s (b) 2s and 4s (c) Operating system
(c) 2s and 3s (d) 0s and 1s (d) A collection of all these
Ans.(d) Ans.(d)

08(2021) Page # 220


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

127. The secret code that restricts entry to 128. How many kilobytes make a megabyte?
some programs is
(a) 128
(a) Access-code (b) 256
(b) Entry-code (c) 512
(c) Passport (d) 1024
(d) Password
Ans.(a) Ans.(d)

129 Devices that provide backup storage are 130. The memory unit that directly
. called ___________ memory. communicates with CPU is called
__________ memory.
(a) main (b) auxiliary
(c) backup (d) device
(a) main (b) auxiliary
(c) device (d) backup
Ans.(b) Ans.(a)

08(2021) Page # 221


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

131 The ____________ memory access time is 132. The fifth generation digital computer will
. less than the access time of the main be
memory. ____

(a) virtual (b) associative (a) Versatility


(c) cache (d) mapping (b) Very expensive
(c) Extremely low cost
(d) Artificial intelligence
Ans.(c) Ans.(d)

133 Most application software’s today come 134. What software organizes, manages, and
. with an interface called a(n) ____ processes business data concerned with
inventory, customers, and vendors?
(a) Button user interface
(a) customer- oriented software
(b) Icon user interface
(b) data management software
(c) Character user interface
(c) storage area network network
(d) Graphical user interface (GUI)
(d) grid computing software
Ans.(d) Ans.(b)

135 Computer programs are written in a high- 136. Software for organizing storage and
. level programming language; however, the retrieval of information is a(an)
human-readable version of a program is
called ____ (a) Database program
(b) Database
(a) Instruction set (c) Data warehouse
(b) Word size (d) Operating system
(c) Source code
(d) Cache
Ans.(c) Ans.(c)

137 Management information systems 138. E-business is:


. usually:
(a) Serve managers interested in weekly, (a) Any electronically mediated
monthly, and yearly results, not day-to- communication between an
day activities. organisation and its
(b) Help managers make decisions that
stakeholders.
are unique, rapidly changing, and not
(b) The use of electronic
easily specified in advance.
(c) Provide managers with a generalized communications for all
computing and telecommunications business processes.
capacity that can be applied to a (c) An organisation using
changing array of problems. electronic media to
(d) Perform and record the daily routine purchase from its suppliers.
transactions necessary to the conduct of (d) An organisation using
business. electronic media to sell
direct to its customers.
Ans.(a) Ans.(b)
139 A pixel is – 140. What do we call a company that
. provides software through the Internet
(a) A virus directly to the user’s computer?
(b) The smallest resolvable part of a picture
(c) A picture stored in the secondary memory
(a) application vendor
(d) A computer program that draws picture (b) software service provider
(c) application service provider
(d) shareware
Ans.(b) Ans.(b)

08(2021) Page # 222


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

141 A collection of interrelated records is


34
142. What is correcting error in a program
. called a called?

(a) Database (a) Grinding


(b) Spreadsheet (b) Interpreting
(c) Management information system (c) Debugging
(d) Text file (d) Compiling
Ans.(a) Ans.(c)

143 In a database, related fields are grouped 144. In a relational model, relations are
. to termed as
(a) File (b) Bank
(c) Menu (d) Data record (a) Rows (b) Attributes
(c) Tuples (d) Tables
Ans.(d) Ans.(d)

145 What is software that is the electronic 146. External database is


. equivalent of a filing room? (a) Database created using DBMS
(a) document management package
(b) electronic management (b) Database created in MS-Word
(c) filenet (c) Database created in EXCEL
(d) filing Assembly Software (d) All of the above
(e) None of the above
Ans.(a) Ans.(a)
147 The logical data structure with a 148. Unlike filters queries can be saved as in
. one-to-many relationship is a a database.
(a) Tree (a) Database
(b) Chain (b) Filters
(c) Network (c) Objects
(d) All of these (d) None of the above
Ans.(a) Ans.(c)
149 The database environment has all the 150. Which database handles full text data,
. following components except image, audio and video?

(a) Database administrator (a) Multimedia database


(b) Database (b) Video on demand database
(c) Users (c) Graphics database
(d) Separate files (d) Transaction database
Ans.(d) Ans.(a)

34 https://meritnotes.com/computer-quiz/dbms-pdf/1-76921/

08(2021) Page # 223


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

Information Technology
MCQ for exam preparation:

151 The method of file organization in which 152. A database management system
. data records in a file are arranged in a (a) Allows simultaneous access to
specified order according to key field is multiple files
known as the (b) Can do more than a record
management system
(a) Queuing method (c) Is a collection of programs for
(b) Predetermined method managing data into a single file
(c) Direct access method (d) Both a and b
(d) Sequential access method
Ans.(d) Ans.(d)

153 Which of the following types of tables 154. Which of the following is/are the primary
. constraints will prevent the entry of features of a DBMS?
duplicate rows? (a) To provide an environment that is
(a) Foreign keys congenial to user
(b) Unique keys (b) To store the information
(c) Primary keys (c) To retrieve information
(d) Candidate keys (d) All of the above
Ans.(c) Ans.(d)

155 A _____ is a property of the entire relation 156. DBMS helps to achieve
. rather than of the individual tuples in which
each tuple is unique. (a) Data independence
(a) Rows (b) Attribute (b) More redundancy
(c) Fields (d) Key (c) Centralised manner to control of data
(d) Both a and c
Ans.(d) Ans.(d)

08(2021) Page # 224


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

157 A file consists of 158. An entry in the telephone book can be


. compared to a
(a) Fields and records
(b) Records and sorts
(a) Field (b) Record
(c) Fields and sorts
(c) File (d) Database
(d) Databases and fields
Ans.(a) Ans.(b)

159 35
In a database, a network structure 160. Which of the following is at the highest
. (a) allows many-to-many relationship level in the hierarchy of data
(b) is a physical representation of the data organization?
(c) allows only one-to-one relationship (a) Database
(d) none of these (b) Data bank
(c) Data file
(d) Data record
Ans.(a) Ans.(a)

161 Mobile phone commercially available 162. Which language is used by most of
. in____year. DBMSs for helping their users to access
(a) 1983 (b) 1975 (c) 2001 data?
(d) 1988 (e) None of these (a) HLL (b) Query language
(c) SQL (d) 4 GL
Ans.(a) Ans.(b)

163 Managing the rate at which the traffic 164. 36


Which among the following is/are
. in a network is_______ control. supported by LAN?
(a) Routing (a) HTTP
(b) Flow (b) PABX
(c) Data (c) SNDP
(d) Matadata (d) PDF
Ans.(b) Ans.(b)

165 The management information system 166. ____ switching has used the
. (MIS) structure with one main computer transfer of coded values from input
system us called a to output.
(a) Centralized MIS structure (a) Combination
(b) Decentralized MIS structure (b) Space
(c) Distributed MIS structure (c) Time
(d) Hierarchical MIS structure (d) None of these
Ans.(a) Ans.(b)

35 https://meritnotes.com/computer-quiz/dbms-quiz/2-474/

36
https://t4tutorials.com/telecommunication-mcqs-multiple-choices-questions/

08(2021) Page # 225


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

167 In populated area______network 168. In a mesh topology relationship


. used interconnection computer. between one device and another
(a) MAN device is …?
(b) LAN (a) Peer to Peer
(c) WAN (b) Peer to primary
(d) All of above (c) Primary to secondary
(e) None of these (d) Peer review
Ans.(a) Ans.(a)

169 In ______ iPhone was introduced. 170. First smartphone is_______.


.
(a) IBM Simon
(a) 2007 (b) Nokia 1110
(b) 1999 (c) Samsung
(c) 2006 (d) Poco Phone
(d) a and b both (e) None of the above s
(e) None of these
Ans.(a) Ans.(a)

171. In the OSI layer, which layer 172. The performance of a data
performs management of communications network is
tokens _____? highly dependeds on _____

(a) Network Layer (a) Number of users


(b) Transport Layer (b) transmission
(c) Session Layer (c) hardware and software
(d) All of these (d) All of the above
(e) None of these

Ans.(c) Ans.(d)
173. Which type of protocol provides 174. Frames transfer from one LAN
a virtual terminal in TCP/IP to another LAN is by ______
model_
(a) Router
(a) SMTP (b) Modem
(b) Telnet (c) Repeater
(c) HTTP (d) Bridge
(d) None of these
Ans.(b) Ans.(d)

08(2021) Page # 226


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

175. Internet service available on 176. How many digits of the DNIC
mobile phone in_____year can be used to identify the
country?
(a) 1999
(b) 1982 (a) first three
(c) 1991 (b) first five
(d) 1978 (c) first two
(e) None of these (d) first six
(e) None of these
Ans.(a) Ans.(a)
The DNIC (Data Network Identification Code) has three digits to identify the country (one to identify a zone and two
to identify the country within the zone) and one to identify the PDN (allowing only ten in each country).

177. Three major systems of the 178. Design issue of Data link Layer
GSM network are ______ in OSI Reference Model
_____?
(a) SS, BSS, OSS
(b) CELL, BSC, OSS (a) Framing
(c) BSS, BSC, MSC (b) Synchronization of bits
(d) None of these (c) Representation of bits
(d) Connection control
Ans.(a) Ans.(a)

Global system for mobile communication (GSM) is a globally accepted standard for digital cellular
communication. GSM is the name of a standardization group established in 1982 to create a common European
mobile telephone standard that would formulate specifications for a pan-European mobile cellular radio system
operating at 900 MHz. It is estimated that many countries outside of Europe will join the GSM partnership.

The switching system (SS) is responsible for performing call processing and subscriber-related functions. The
switching system includes the following functional units.

Base Station System (BSS)

Operation and Support System (OSS)

179. Default subnet mask for 180. Mobile Application Protocol


class C network is typically runs on top of
which protocol______?
(a) 127.0.0.5
(b) 255.255.255.0 (a) SMTP
(c) 255.255.0.0 (b) SNMP
(d) 255.0.0.9 (c) SS7
(d) All of these
Ans.(b) Ans.(c)

08(2021) Page # 227


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

181. The format of data is called 182. ___ physical path is used to
travel massages form one
(a) Semantics place to another
(b) Struck
(c) Syntax (a) Path
(d) Both a and b (b) Protocol
(e) None of the mentioned (c) Route
(d) Medium
Ans.(c) Ans.(d)

183. When the information packet 184. The first Network


moves from the higher to lower
layers in layer hierarchy, (a) ARPANET
headers are. (b) CNNET
(a) Removed (c) NSFNET
(b) Rearranged (d) ASAPNET
(c) Modified (e) None of these
(d) Added
Ans.(d) Ans.(a)

185. Which of this is not a network 186. A set of rules that governs
edge device? data communication
(a) Switch (a) Standards
(b) PC (b) RFCs
(c) Smartphones (c) Protocols
(d) Servers (d) None of these
Ans.(a) Ans.(a)
187. In which connection, three or 188. When a variety of varied PC’s
more devices share a link work in a single coherent
(a) Unipoint system to its consumer, then
(b) Point to point it’s known as
(c) Multipoint (a) computer network
(d) None of these (b) networking system
(c) distributed system
(d) none of the mentioned
Ans.(c) Ans.(c)
189. _______ topology requires a 190. Which network is built on the
multipoint connection. top of other networks?
(a) Star (a) overlay network
(b) Mesh (b) prior network
(c) Ring (c) chief network
(d) Bus (d) prime network
(e) None of these

08(2021) Page # 228


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

Ans.(d) Ans.(a)

191. Two devices are in network if 192. WAN stands for __________
(a) a process is running on both
devices (a) World area network
(b) PIDs of the processes running
(b) Wide area network
of various devices area unit same
(c) a method in one device is in a
(c) Web area network
position exchange data with a (d) Web access network
method in another device
(d)None of these
Ans.(c) Ans.(b)
193. In computer network nodes are 194. The communication channel is
(a) the computer that originates shared by all the machines on
the data the network in
(b) the computer that routes
the data (a) unicast network
(c) the computer that (b) multicast network
terminates the data (c) None of these
(d) all of the mentioned (d) broadcast network
(e) None of these
Ans.(d) Ans.(d)
195. 37
Physical or logical 196. Which network topology
arrangement of network is requires a central controller or
__________ hub?
(a) Topology (a) Star
(b) Routing (b) Mesh
(c) Networking (c) Ring
(d) Control (d) Bus
Ans.(a) Ans.(a)

37
https://www.sanfoundry.com/computer-networks-mcqs-topology/

08(2021) Page # 229


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

197. _______ topology requires a 198. Data communication system


multipoint connection. spanning states, countries, or
(a) Star the whole world is
(b) Mesh (a) LAN
(c) Ring (b) WAN
(d) Bus (c) MAN
(d) PAN
Ans.(d) Ans.(b)
199. Data communication system 200. In TDM, slots are further
within a building or campus divided into __________
is________
(a) LAN (a) Seconds
(b) WAN (b) Frames
(c) MAN (c) Packets
(d) PAN (d) Bits
Ans.(a) Ans.(b)

08(2021) Page # 230


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

Information Technology
MCQ for exam preparation:
201. Which of the following is not 202. The idealistic market future at the
considered to be one of the three outset of the development of
phases of e-commerce? e-commerce is called a ______.
(a) Preservation. (a) Bailey market.
(b) Innovation. (b) Baxter market.
(c) Consolidation. (c) Bertrand market.
(d) Reinvention. (d) Bergman market
Ans.(a) Ans.(c)

Bertrand market

Bertrand competition is price competition in


an oligopolistic market in which two or
more firms produce a homogeneous
good. This means that each firm sets the
price for its product with the aim to maximize
its own profit (and of course taking into
account the prices set by competing firms).

203. 38
Which one of the following is not 204. Compared to B2C e-commerce,
one of the major types of B2B e-commerce is ______.
e-commerce?
(a) of equal size.
(a) B2C.
(b) slightly smaller.
(b) B2B.
(c) slightly larger.
(c) C2C.
(d) much larger.
(d) C2B.
Ans.(d) Ans.(d)

205. Which of the following is an 206. The primary source of financing


example of a portal? during the early years of
e-commerce was _______.
(a) Amazon. (a) large retail firms.
(b) eBay. (b) bank loans.
(c) Facebook (c) venture capital funds.
(d) Google/Yahoo (d) initial public offerings.
Ans.(d) Ans.(a)
The primary source of financing during the early years of e-commerce was venture capital funds. Venture Capital is money invested in
businesses that are small; or exist only as an initiative, but have huge potential to grow. The people who invest this money are called
venture capitalists (VCs). The venture capital investment is made when a venture capitalist buys shares of such a company and becomes a
financial partner in the business.

38
https://www.studocu.com/en-ca/document/langara-college/entrepreneurship/other/business-model-e-business-mcq-multiple-choice-questions/4957542/view

08(2021) Page # 231


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

207. All of the following are major B2C 208. The area of actual or potential
business models except ______. commercial value in which a
company intends to operate is a
(a) content provider. _______.
(b) transaction broker.
(a) market space.
(c) service provider.
(b) marketplace.
(d) industry consortium.
(c) perfect market.
(d) Bertrand market
Ans.(d) Ans.(a)
209. The underlying computing 210. E-commerce merchant server
equipment that the system uses to software includes all of the
achieve its e-commerce following except_______.
functionality is called a ______.
(a) content platform. (a) online catalog.
(b) transaction platform. (b) online shopping cart.
(c) scalability platform. (c) online credit card processing.
(d) hardware platform. (d) online e-mail.

Ans.(d) Ans.(d)

211. Which of the following is not a 212. In the e-commerce security


widely used midrange or high-end environment, which of the following
e-commerce suite? constitutes the inner-most layer?
(a) people.
(a) Microsoft Commerce Server. (b) technology solutions.
(b) WebTrends Marketing Lab2. (c) organizational policies and
(c) IBM WebSphere Commerce. procedures.
(d) Broadvision Commerce. (d) data.
Ans.(a) Ans.(d)

08(2021) Page # 232


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

213. The most widely used encryption 214. Which of the following is NOT a
standard is ______. dimension of e-commerce security
(a) Advanced Encryption Standard (AES). provided by encryption?
(b) Data Encryption Standard (DES).
(a) availability.
(c) Universal Encryption Standard (UES).
(d) Optimal Encryption Standard (OES). (b) message integrity.
(c) nonrepudiation.
(d) confidentiality.
Ans.(a) Ans.(a)
215. Which of the following is not a 216. When hackers flood a Web site with
primary function of a portal? useless traffic to overwhelm the
network, it is called ______.
(a) navigation of the Web. (a) phishing.
(b) commerce. (b) a Denial of Service (DoS)
(c) content. attack.
(d) social networking. (c) spoofing.
(d) pharming.
Ans.(d) Ans.(b)

Phishing is a type of social engineering attack often used to steal user data, including login credentials
and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into
opening an email, instant message, or text message.

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it
inaccessible to its intended users. Victims of DoS attacks often target web servers of high-profile
organizations such as banking, commerce, and media companies, or government and trade organizations.

08(2021) Page # 233


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

In the context of information security, and especially network security, a spoofing attack is a situation in
which a person or program successfully identifies as another by falsifying data, to gain an
illegitimate advantage.

Pharming is a form of cyberattack that sends you to a fake website that looks like the real thing. The
user will type in a legitimate web address and is redirected to a fake website that resembles the real
website.

217. All of the following are potential 218. The two main types of Internet-
benefits of B2B e-commerce based B2B commerce are______.
except_________.
(a) reduced amount of 'first-mover' (a) Net marketplaces and private
advantages. industrial networks.
(b) decreased product cycle time. (b) Net marketplaces and
(c) increased opportunities for collaborative commerce.
collaborating with suppliers and (c) EDI and private industrial
distributors. networks.
(d) increased production flexibility. (d) EDI and collaborative
commerce.
Ans.(a) Ans.(c)

08(2021) Page # 234


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

219. The most common and easily 220. The E-commerce domain that
understood type of Net involves business activity initiated
marketplace is ______. by the consumer and targeted to
businesses is known as ______.
(a) e-procurement marketplace.
(b) industry consortia. (a) Business to Business (B2B).
(c) independent exchanges. (b) Consumer to Consumer (C2C).
(d) e-distributors. (c) Business to Consumer (B2C)
(d) Consumer to Business (C2B).

Ans.(d) Ans.(d)

221. The type of website that is 222. A _________ is a B2B trading


designed to build customer goodwill network that links a particular
and to supplement other sales seller with its own trading partners.
channels rather then sell the
company's products directly is (a) bitstream.
known as a _____ website. (b) private trading network.
(a) corporate. (b) marketing. (c) virtual network.
(c) click-and-mortar. (d) web community.
(d) customer service.
Ans.(a) Ans.(b)

223. When preparing a website, 224. Which segment do eBay,


39

designers should ensure that the Amazon.com belong?


site enables user-to-user
communication.This design feature (a) B2Bs
is known as ________. (b) B2Cs
(c) C2Bs
(a) context. (b) commerce. (d) C2Cs
(c) community. (d) connection.
Ans.(c) Ans.(b)

eBay, Amazon.com belong to B2Cs segments. The term business-to-consumer (B2C) refers to the process
of selling products and services directly between consumers who are the end-users of its products or
services.

39
https://www.examveda.com/which-segment-do-ebay-amazoncom-belong-32618/

08(2021) Page # 235


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

225. Which type of e‐commerce focuses 226. The best products to sell in B2C
on consumers dealing with each e‐commerce are:
other? (a) Small products (b) Fresh
(a) B2B (b) B2C products
(c) C2B (d) C2C (c) Digital products
(d) Specialty products
Ans.(d) Ans.(c)

C2C type of e‐commerce focuses on consumers dealing The best products to sell in B2C e‐commerce
with each other. Consumer to consumer, or C2C, is the are Digital products. A digital product is an
business model that facilitates commerce between private intangible asset or piece of media that can be
individuals. Whether it's for goods or services, this sold and distributed repeatedly online without
category of e-commerce connects people to do business the need to replenish inventory.
with one another.

227. Digital products are best suited for 228. All of the following are techniques
B2C e‐commerce because they: B2C e‐commerce companies use to
(a) are commodity like products attract customers, except:
(b) can be mass‐customized and (a) Registering with search engines
personalized (b) Viral marketing
(c) can be delivered at the time of (c) Online ads
purchase (d) Virtual marketing
(d) All of the above
Ans.(d) Ans.(d)

Digital products are best suited for B2C e‐commerce because they are commodity like products, can be
mass‐customized and personalized and can be delivered at the time of purchase.

229. A _________ describes the flow of 230. Electronic Data Interchange is


information at your e-commerce necessary in
site and the infrastructure that will
be used in the system. (a) B2C e-Commerce
(a) system design (b) B2B e-Commerce
(b) tactical design (c) C2C e-Commerce
(c) logical design (d) Commerce using internet
(d) physical design
Ans.(c) Ans.(b)

A logical design describes the flow of information at your e-commerce site and the infrastructure that will
be used in the system. Logical design is the conceptual design of a system. It describes the flow of
information at your e-commerce site, the processing functions that must be performed, the database that
will be used, the security and emergency backup procedures that will be instituted, and the controls that will
be used in the system.

231. The ARPANET researchers created 232. SSL stands for


______.
(a)National Communication (a) Socket secure layer
Protocol (b) Secondary segment layer
(b)Internet Protocol (c) Secure sockets layer
(c)Network Communication (d) Secure system layer
protocol
(d)Transport Control Protocol
Ans.(c) Ans.(c)

08(2021) Page # 236


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

Secure Sockets Layer (SSL) is a protocol for establishing a secure channel between two devices that are
connected over the Internet or an internal connection.

233. The success of web hypertext 234. ____ includes search and
publishing is aided by which of the discovery for a set of products in
following the larger information space
(a)More powerful workstations capable of meeting customer
(b)High-resolution graphic displays requirements and products
(c)Faster network communication (a)pre-purchase preparation phase
(d)All the above (b)purchase consummation phase
(c)post-purchase interaction phase
(d)none
Ans.(d) Ans.(a)

08(2021) Page # 237


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

235. _____ includes mercantile 236. ____ includes customer service


protocols that specify the flow of and support to address customer
information and documents complaints, product returns, and
associated with purchasing. product defects.
(a)pre-purchase preparation phase (a)pre-purchase preparation phase
(b)purchase phase (b)purchase phase
(c)post-purchase interaction phase (c)post-purchase interaction phase
(d)none (d)none
Ans.(b) Ans.(c)

237. To facilitate better consumer and 238. The following are the components
organizational search, software of ________
intermediaries called 1. e-cash 2. e-cheque
3. credit card 4. debit card
(a) information brokers (a) electronic payment systems
(b) brokerages (b) electronic funds transfer
(c) information interfaces (c) electronic money system
(d) interface brokers (d) none of the above
Ans.(a) Ans.(a)

239. The Decision support systems use 240. ______were the original type of
all of the following EXCEPT: information system developed to
(a) Analytical models, support managerial decision
(b) Specialized databases making.
(c) Online Transaction processing (a) Management information
(d) A decision makers own systems
insights and judgments (b) Decision Support systems
(c) Management Tracking System
(d) Strategic Information System
Ans.(c) Ans.(a)

A decision support system (DSS) is a computerized program used to support determinations, judgments,
and courses of action in an organization or a business. A DSS sifts through and analyzes massive amounts
of data, compiling comprehensive information that can be used to solve problems and in decision-making.

08(2021) Page # 238


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

241. Example of Office automation tools 242. Which of the following can work
are —- both as an input and output
(a)Pencil and Pen (b) File and Rack medium?
(c) Table and Desk
(d) Electronic Mail and Internet System (a) Keyboard (b) Trackball
(c) Light pen (d) Touch screen
Ans.(d) Ans.(d)

243. With the ____form of data 244. _____ is the multiplexing technique
processing, each transaction is that shifts each signal to a different
processed immediately. carrier frequency.
(a) OLTP (a) FDM
(b) batch processing (b) TDM
(c) active processing (c) Both FDM & TDM
(d) automated transaction processing (d) PDM
Ans.(a) Ans.(a)

OLTP (Online Transactional Processing)


is a category of data processing that is
focused on transaction-oriented tasks. OLTP
typically involves inserting, updating, and/or
deleting small amounts of data in a
database. OLTP mainly deals with large
numbers of transactions by a large number
of users. OLTP and OLAP: The two terms
look similar but refer to different kinds of
systems. Online transaction processing
(OLTP) captures, stores, and processes data
from transactions in real time. Online
analytical processing (OLAP) uses complex
queries to analyze aggregated historical
data from OLTP systems

08(2021) Page # 239


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

245. Using __________ a decision 246. Which of the following are


maker can make hypothetical transport layer protocols used in
changes to problem data and networking?
observe the impact on the results (a) TCP and FTP
(a) Simulation (b) Optimization (b) UDP and HTTP
(c) What-if analysis (c) TCP and UDP
(d) Goal-seeking analysis (d) HTTP and FTP
Ans.(c) Ans.(c)

What-If Analysis is the process of changing


the values in cells to see how those changes
will affect the outcome of formulas on the
worksheet. Three kinds of What-If Analysis
tools come with Excel: Scenarios, Goal
Seek, and Data Tables. Scenarios and Data
tables take sets of input values and
determine possible results.

247. Transport layer aggregates data 248. _____represent complex data using
from different applications into a interactive three- dimensional
single stream before passing it to graphical forms such as charts,
____________ graphs, and maps.

(a) network layer (a) Data Entry Systems


(b) data link layer (b) Data Analysis systems
(c) application layer (c) Database Management
(d) physical layer (d) Data visualization systems
Ans.(a) Ans.(d)

249. The growth of corporate intranets, 250. There are two levels of information
extranets, as well as the web, has in every organization and are——- .
accelerated the development and use
of executive class information delivery
(a) An internet client and
and decision support software tools by
Internet Server.
lower levels of management and by
individuals and teams of business (b) Telephone information and
professionals. This dramatic expansion voice information.
has opened the door to the use of (c) Formal and informal
which of the following tool? information
(d) Internal Information and
(a) Business intelligence (BI) External Information.
(b) Business Knowledge (BK)
(c) Business Ideas (BI)
(d) Business Intelligent (BI)
Ans.(b) Ans.(d)

08(2021) Page # 240


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

Information Technology
40
MCQ for exam preparation:
251. Which of the following involves analyzing 252. In which of the following types of analysis, the
complex relationships among thousands or value of only one variable is changed repeatedly,
even millions of data items stored in data and the resulting changes on other variables are
marts, data warehouses, and other observed.
multidimensional databases to discover
patterns, trends, and exception conditions? (a) what-if analysis
(b) Sensitivity analysis
(a) OLTP (c) Goal-seeking analysis
(b) OISE (d) All of the above
(c) OLALA
(d) OLAP
Ans.(d) Ans.(b)
OLAP (Online Analytical Processing) is the technology behind many Business Intelligence (BI) applications. OLAP is
a powerful technology for data discovery, including capabilities for limitless report viewing, complex analytical
calculations, and predictive “what if” scenario (budget, forecast) planning.

Sensitivity analysis determines how different values of an independent variable affect a particular dependent variable
under a given set of assumptions. In other words, sensitivity analyses study how various sources of uncertainty in a
mathematical model contribute to the model's overall uncertainty.

253. Summary transaction data, high-volume 254. Projections and responses to queries are
data, and simple models are information information output characteristics associated with
inputs characteristic of a(n): a(n):
(a) DSS (a) DSS
(b) MIS (b) MIS
(c) ESS (c) ESS
(d) TPS (d) TPS
Ans.(b) Ans.(c)

255. Decision support system involves all of 256. Another name of goal-seeking analysis is:
the following types of analytical
modelling activities except? (a) How to
(a) what-if analysis (b) How can
(b) Sensitivity analysis (c) Why not
(c) Goal-seeking analysis (d) Whats up
(d) Heuristics
Ans.(d) Ans.(b)

40
https://www.sarpublisher.com/business-information-systems-mcq-questions-and-answers-part-2/

08(2021) Page # 241


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

257. In which of the following types of analysis, 258. The first goal of executive information systems is
the goal is to find the optimum value for to provide top executives with immediate and
one or more target variables, given certain easy access to information about a firm, that is,
constraints? key factors that are critical to accomplishing an
organization’s strategic objectives.
(a) what-if analysis
(a) Critical Success Factors (CSFs)
(b) Sensitivity analysis
(b) Critical Accomplishing Factors (CAFs)
(c) Goal-seeking analysis
(c) Critical executive system (CECs)
(d) None of the above
(d) None of the above
Ans.(b) Ans.(a)

Critical Success Factors, also known as Key


Results Areas, are the areas of your business
or project that are vital to its success.
Identifying and communicating CSFs within
your organization helps to ensure that your
business or project is focused on its aims and
objectives.

259. ____ is a field of science and technology- 260. Technically, _____ is a defined structure for
based on disciplines such as computer efficient communication.
science, biology, psychology, linguistics,
mathematics, and engineering. (a) Networking.
(a) Natural intelligence (b) Communication technology
(b) Artificial intelligence (c) Information technology
(c) Articulate Intelligence (d) Computing
(d) None of the above
Ans.(b) Ans.(a)
Artificial intelligence is the simulation of Networking, also known as computer networking, is
human intelligence processes by machines, the practice of transporting and exchanging data
especially computer systems. Specific between nodes over a shared medium in an
applications of AI include expert systems, information system. Networking facilitates everything
natural language processing, speech recognition from telephone calls to text messaging to streaming
and machine vision. video to the internet of things (IoT).

261. EDP mean ——- 262. Hardware of computer means ——–

(a) Electrical disk processing (a) Paper used.


(b) Electronic data processing (b) Plastic box.
(c) Exact data processing. (c) Electronic circuit and devices.
(d) Extraordinary disk processing. (d) Magnetic particle.
Ans.(b) Ans.(c)
Electron Devices and Circuits : The branch of engineering in which the flow and control of electrons in vacuum or
semiconductor are studied is called electronics. The device which controls the flow of electrons is called electronic
device. These devices are the main building blocks of electronic circuits.

263. The payment on Internet is generally 264. Which of the following is a requirement for
made through ——– e-commerce?
(a) Cash card. (a) Market.
(b) Debit card. (b) Internet connectivity.
(c) Credit card. (c) Communication.
(d) Digital signature. (d) Digital signature.
Ans.(c) Ans.(b)

08(2021) Page # 242


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

265. The components of an expert system 266. _____ is the processing of raw data by using
include __________that perform a computer to perform the selection and
inferences on the knowledge in ordering process.
the knowledge base and communicate
answers to a user’s questions (a) Electronic data processing
(a) Database and software modules (b) Manual data processing.
(b) Knowledge base and software (c) Low data processing.
modules (d) High data processing.
(c) Communication base and software
modules
(d) knowledge base and interactive
device
Ans.(b) Ans.(a)

267. A computer security protocol for logging in 268. A System ——–


would be an example of the __________
component of an information system. (a) Is a place for the operation
(b) Is a set of the processes to perform the
(a) software operation.
(b) hardware (c) Does not accept the input/output.
(c) data (d) Is when the result are not obtained.
(d) procedure
Ans.(d) Ans.(a)

08(2021) Page # 243


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

269. A process is normally carried out——— 270. Boundaries of the system are the ——–

(a) On the system (a) System and environment interface.


(b) Done out of the system. (b) Parameter of the environment.
(c) Outside the system. (c) Border of the system.
(d) Send to the system. (d) Bases of the system.
Ans.(a) Ans.(a)

271. Customer numbers and their names would 272. Non-routine cognitive skills include
be an example of the component of an
order management information system (a) Communication.
(a) software (b) Problem-solving.
(b) hardware (c) Abstract reasoning.
(c) data (d) All of the above.
(d) procedure
Ans.(c) Ans.(d)

273. The system which keeps uses of the 274. Stable system is a system———
activities and transactions of the
organization is. (a) Which varies with home
(b) Does not vary with home.
(a) Knowledge level system. (c) Remains unsteady
(b) Operational level system. (d) Distributed by external changer.
(c) Management level system.
(d) Strategic level system.
Ans.(a) Ans.(b)

275. The actual machinery in a computer is 276. E-commerce means ——-


called—–
(a) Business through electronic media.
(a) Machinery. (b) Commercial activity.
(b) Hardware. (c) Electronic media.
(c) Software. (d) Transaction.
(d) Instruments.
Ans.(b) Ans.(a)

277. A human order taking can be bypassed 278. If you are a _________recipient of sensitive
when using a(n)____________________ information, such as might be overheard or
contained in a misdirected email, this would not
(a) Office automation system be illegal, but might be unethical to use it.
(b) Management information system (a) active
(c) Transaction processing system (b) passive
(d) Decision support system (c) proper
(d) business
Ans.(c) Ans.(b)

08(2021) Page # 244


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

279. Which is not a domain of Artificial 280. On-line transaction processing is used when
Intelligence? (a) it is required to ensure correct processing
(a) Virtual Reality (b) it is required to answer random queries & all
(b) Intelligent Agents files are available on-line
(c) Expert System (c) all files are available on-line
(d) None of the above (d) all files are stored using hard disk
Ans.(d) Ans.(b)

281. Which of the following is not a 282. The quality of your ____is a large part of the
characteristic of good information? quality of your information system.
(a) computer
(a) interchangeability
(b) thinking
(b) relevance
(c) time
(c) cost effectiveness
(d) challenges
(d) Accuracy
Ans.(a) Ans.(b)

283. Which of the following is not included in 284. Analysing data from different sources and
three levels of data abstraction perspectives and summarizing it into useful
information is
(a) Physical (a) Data warehousing
(b) Logical (b) Data Mining
(c) View (c) Data Digging
(d) data link (d) Data Bank
Ans.(d) Ans.(d)

08(2021) Page # 245


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

285. Enterprise resource planning (ERP) 286. Which is true in Enterprise resource planning
(a) has been made possible because of (ERP)
advances in hardware and software (a) has existed for over a decade
(b) uses client/server networks (b) does not integrate well with functional areas
(c) creates commonality of databases other than operations
(d) All of the above are true of ERP. (c) is inexpensive to implement
(d) automates and integrates the majority of
business processes
Ans.(d) Ans.(d)

287. Which consists of instructions and data that 288. What is the term used for “sequence of
computer manipulates to perform data instructions for the computer”?
processing tasks? (a) hardware.
(a) middleware. (b) program.
(b) hardware. (c) data.
(c) firmware. (d) instruction.
(d) software.
Ans.(d) Ans.(b)

289. Which computer-based model is developed 290. Which one of the following is used for evaluating
after human brain? credit risks?
(a) Fuzzy Logic (a) Virtual Reality
(b) Neural Network (b) Neural Network
(c) Virtual Reality (c) Fuzzy Logic
(d) All of the above (d) None of the above
Ans.(b) Ans.(b)

Neural Network

08(2021) Page # 246


Information Technology
By Md. Monowar Hossain, FCA,CISA, CPA,CPFA(UK)
md.monowar@gmail.com

291. Knowledge based system supports_______ 292. ________is a collection of logically related
(a) Knowledge of reation records and file.
(b) Knowledge of support (a) Folder
(c) Knowledge of Dissemination (b) Application
(d) All of the above (c) Database
(d) Field
Ans.(d) Ans.(c)

293. What digit is called a bit? 294. Which component of the computer consists of
physical entity of the device?
(a) decimal. (a) software.
(b) binary. (b) middleware.
(c) octal. (c) hardware.
(d) hexadecimal. (d) firmware.
Ans.(b) Ans.(c)

295. Distribution Resource Planning (DRP) is 296. In what way are Distribution Resource Planning
(DRP) and Material Requirements Planning
(a) a transportation plan to ship materials (MRP) similar?
to warehouses (a) Both employ similar logic and procedures.
(b) a time-phased stock replenishment (b) Both are employed in a manufacturing
plan for all levels of a distribution organization.
(c) a shipping plan from a central (c) Both work most efficiently with the largest
warehouse to retail warehouses lot sizes.
(d) material requirements planning with (d) Both are employed by retail organizations.
feedback loop from distribution
Ans.(b) Ans.(a)

297. All of the following are advantages of 298. Which of the following is false concerning
enterprise resource planning (ERP) except enterprise resource planning (ERP)?
(a) creates commonality of databases (a) It attempts to automate and integrate the
(b) increases communications and majority of business processes.
collaboration worldwide (b) It shares common data and practices across
(c) helps integrate multiple sites and the enterprise.
business units (c) It is inexpensive to implement
(d) requires major changes in the company (d) It provides and accesses information in a
and its processes to implement real-time environment.
Ans.(d) Ans.(c)

299. The segment in which business directly 300. The manipulation of binary information is done
sells to the end consumer is called ———– by logic circuits called __________.
(a) C2C. (a) blocks.
(b) P2P. (b) gates.
(c) B2C. (c) symbols.
(d) G2G. (d) functions.
Ans.(c) Ans.(b)

08(2021) Page # 247

You might also like