Q1. Systems maintenance is the longest and the costliest phase of the system`s life cycle.
a. True
b. False
Answer
a. True
Q2. In —–maintenance, the main aim is to keep the equipment of the system in working order without changing its functionality.
a. Disaster recovery
b. hardware
c. direction
d. None of these
Answer
b. hardware
Q3. Requirements do not change throughout the software development lifecycle.
a. True
b. False
Answer
b. False
Q4. A —– is a small computer program that extends the feature set or capabilities of another application.
a. codec
b. tag
c. third-party cookie
d. rootkit
d. plug-in
Answer
plug-in
Q5. Which of the following is the smallest visual element on a video monitor?
a. Character
b. Pixel
c. Byte
d. Bit
Answer
Pixel
Q6. What is the mean of the Booting in the system?
a. Restarting computer
b. Install the program
c. To scan
d. To turn off
Answer
a. Restarting computer
Q7. A computer is accurate, but if the result of a computation is false, what is the main reason for it?
a. Power failure
b. The computer circuits
c. Incorrect data entry
d. Distraction
Answer
c. Incorrect data entry
Q8. Which one of the following software applications would be the most appropriate for performing numerical and statistical calculations?
a. Database
b. Document processor
c. Graphics package
d. Spreadsheet
Answer
d. Spreadsheet
Q9. Which of the following languages computer understand?
a. JAVA language
b. C language
c. Binary Language
d. Object language
Answer
c. Binary Language
Q10. The continuous and steady flow of information helps an organisation to build —–, —–in business interaction.
a. components, interdependent, organised
b. product, service
c. Credibility and transparency
d. None of these
Answer
c. Credibility and transparency
Q11. Data is arranged, organised and processed.
a. True
b. False
Answer
b. False
Q12. A system can be defined as a set of —– which are —–and —–for a common purpose.
a. product, service, migration
b. components, interdependent, organised
c. process, actions, activities
d. None of these
Answer
b. components, interdependent, organised
Q13. Which of the following is not a characteristic of a system?
a. standards
b. boundaries
c. cost-effective
d. structure
Answer
c. Cost-effective
Q14. Which of the following is not a function of IS?
a. Data recovery
b. Storage
c. Processing
d. Input
Answer
a. Data recovery
Q15. A CBIS stores a huge amount of data and it automatically sorts data.
a. True
b. False
Answer
a. True
Q16. A business process is a series of steps that are performed to produce a —– or —–.
a. actions, activities
b. product, service
c. Hardware, Software
d. None of these
Answer
b. product, service
Q17. BPM concentrate on —–, —– and —–.
a. process, actions, activities
b. Hardware, Software
c. Ergonomics, radio frequency, software
d. None of these
Answer
a. process, actions, activities
Q18. MIS is used to analyse and organise unstructured data retrieved from internal resources only.
a. True
b. False
Answer
b. False
Q19. The two major components of information technology are—– and —–
a. Hardware, Software
b. Ergonomics, radio frequency
c. Bluetooth, infra-red
d. None of these
Answer
a. Hardware, Software
Q20. Which of the following type of devices control storage and retrieved information?
a. Processing
b. Input
c. Calculating
d. Output
Answer
a. Processing
Q21. QWERTZ keyboards are the most commonly used keyboards.
a. True
b. False
Answer
b. False
Q22. Name the study of methods that reduces stress on muscles?
a. Ergonomics
b. Bluetooth, infra-red, radio frequency
c. spreadsheets
d. None of these
Answer
a. Ergonomics
Q23. Wireless keyboards use different technologies, such as—–, —–, and —–, to connect to a computer.
a. Bluetooth, infra-red, radio frequency
b. wifi, msword, excel
c. photoshop, msword, excel
d. None of these
Answer
a. Bluetooth, infra-red, radio frequency
Q24. Which of the following are common forms of system attacks?
a. Virus outbreak
b. System compromise
c. Both of them
d. None of them
Answer
c. Both of them
Q25. Incident handling is a generalised term that pertains to the response to an attack, by a person or organisation.
a. True
b. False
Answer
a. True
Q26. —– refers to the distinct steps that are undertaken to bring the organisation back to its normal operation in case of any calamitous natural disaster or a national emergency
a. Disaster recovery
b. direction
c. reinterpreting, shifting
d. None of these
Answer
a. Disaster recovery
Q27: The manipulation of unsuspecting users to extract private information from them is done by
a. Political Espionage
b. Reverse Engineering
c. Social Engineering
d. None of these
Answer
c. Social Engineering
Q28: Which of the following is/ are applications of RFID
a. Managing inventory in large warehouse by tagging all items
b. Charging cars at toll plazas through RFID tagged display cards
c. For use on public transportation where RFID tagged passes allow user to travel without having to purchase ticket
d. all of the above
Answer
d. all of the above
Q29: In what the project proceeds along each stage with the ability to loop back to a previous stage if necessary.
a. Spiral Model
b. Agile Method
c. Waterfall Model
d. Scrum Method
Answer
c. Waterfall Model
Q30: The technology by which a message or data is transformed or translated into a form that is not easily readable by anyone
a. Public-key cryptography
b. Encryption
c. Firewall
d. Virtual Private Network
Answer
b. Encryption
Q31: The Second-order effects of the implementation of a new IS in an organization
a. become visible immediately
b. may become visible within a few weeks
c. may require years to become visible or measurable
d. both a and b
Answer
c. may require years to become visible or measurable
Q32: Which statement is not true about Wi-Fi routers and Bluetooth
a. Wi-Fi connection is approved by IEEE for wireless connection
b. Bluetooth is popularly used with hotspot or access points that are routers
c. Bluetooth standard offers lower data transfer rates and operates over a short distance
d. Wi-Fi routers should be in an unsecured manner, where anybody can simply lock into signal available and use the connection
Answer
b. Bluetooth is popularly used with hotspot or access points that are routers
Q33: Which of the following is not a type of malicious software that pose a threat to security of organization.
a. Phishing
b. worm
c. Virus
d. Trojan Horse
Answer
a. Phishing
Q34: The network used for sensing agriculture region for what is termed ‘precision agriculture’
a. RFD
b. Wireless sensor network
c. Both a. and b.
d. WI-FI
Answer
b. Wireless sensor network
Q35: The device rely on…………. …..of different frequencies to connect with each other to share info
a. UV Rays
b. Infrared Rays
c. Radio Waves
d. X-Rays
Answer
c. Radio Waves
Q36: Which is not true about wireless sensor network
a. Electronic device used to measure some aspect of the environment it is located in
b. Cannot measure temperature, humidity, movement etc.
c. Are used to sense some parameter and send out signal about measure value over wireless network
d. it ensure that the treatment is targeted at the specific spot when condition has been detected and not spend over the entire acreage
Answer
b. Cannot measure temperature, humidity, movement etc.
Q37: Which of the following is correct in regard to security audit
a. Helps the firm in achieving security goals
b. Risk assessment analyzed
c. It will test security weakness of the system
d. all of the above
Answer
d. all of the above
Q38: Which phase involves the building the system and writing the software
a. Coding and Testing
b. Implementation integration
c. Design
d. None of the above
Answer
a. Coding and Testing
Q39: Which of the following are true for mirroring?
a. It creates exact copy of entire data base of the organization
b. Called redundant facilities
c. Highly expensive, so they are stored at remote location called co- location facilities
d. All of above
Answer
d. All of above
Q40: What need led to the creation of Life cycle models.
a. Large contracts for programming, with millions of lines of code required a formal and structured manner.
b. Large contracts for software, with millions of lines of code required a formal and structured manner.
c. Small contracts for software, with millions of lines of code required unformal and unstructured manner.
d. Small contracts for software, with millions of lines of code required a formal and structured manner.
Answer
b. Large contracts for software, with millions of lines of code required a formal and structured manner.