Information Systems for Managers NMIMS MCQ set 5

Q1: In which stage shows output of the lifecycle is a document that clearly outlines the scope of the project, the budget, the personnel involved, the likely milestones and the key success indicators.

a. Analysis

b. Design

c. Maintenance

d. Project Requirement

Answer

d. Project Requirement

Q2: The idea of having a plan that would lead to resumption of normal business with the IT infrastructure after a disruption caused by a natural/manmade disaster is called

a. Disaster recovery (DR)

b. Business continuity planning (BCP)

c. Both terms can be used interchangeably

d. None of these

Answer

c. Both terms can be used interchangeably

Q3: —– are set of problems the program is run on to see how it performs.

a. Design suits

b. Test suits

c. Platform

d. both a and b

Answer

b. Test suits

Q4: Analysis stage is also called the —– where the basic objective of the system is explained in as much details as possible

a. Requirement stage

b. Design stage

c. Coding stage

d. Testing stage

Answer

a. Requirement stage

Q5: What is called if the requirements are changed and accommodating the new requirements attracts extra charges.

a. Scope creep by shareholder

b. Scope creep by vendors

c. Test suits

d. Both a and b

Answer

b. Scope creep by vendors

Q6: What it is called when tests are conducted for individual modules.

a. Stub Testing

b. Integration Testing

c. System Testing

d. None of the above

Answer

a. Stub Testing

Q7: What is a prototyping

a. It is a software development implies creating a working model of the system not the entire system

b. It is system development process implies creating a entire system not the working model.

c. Both a and b

d. None of the above

Answer

a. It is a software development implies creating a working model of the system not the entire system

Q8: The software industry grew immensely and with it grew the problems of —– and the need for extensive and scientific testing.

a. Spaghetti code

b. parallel code

c. obfuscated code

d. Pizza code

Answer

a. Spaghetti code

Q9: Cracking methods whose crackers identify the kind and type of system that is being used and then uncover its security mechanism

a. Reverse Engineering

b. Political Espionage

c. Social Engineering

d. none of these

Answer

a. Reverse Engineering

Q10: A kind of ‘tunnel’ through which clients can connect to the organization’s network while using the public network

a. Wireless technology

b. RFID

c. Virtual Private Network

d. Wireless Sensor Network

Answer

c. Virtual Private Network

Q11: What prototyping is a formal method by which the system is built in sequence of cycles of the waterfall model

a. Slow

b. Rapid

c. Detailed

d. None of the above

Answer

b. Rapid

Q12: ILOVEYOU worm was written by two college dropout computer programmer, originated in

a. Germany

b. Philippines

c. Ukraine

d. Hong Kong

Answer

b. Philippines

Q13: What involves in Risk Assessment

a. it involves assigning estimates to the construction, use, value and eventual success of two alternatives.

b. it involves the assigning estimation to the construction, use, value and eventual success of three alternatives.

c. none of the above

d. Both a ad b

Answer

a. it involves assigning estimates to the construction, use, value and eventual success of two alternatives.

Q14: In waterfall model, the first three are considered the most critical and important parts of the life cycle are called as —–

a. Lower stages of the cycle

b. Middle stages of the cycle

c. Upper stage of the cycle

d. None of the above

Answer

c. Upper stage of the cycle

Q15: In an economy in which the firm is doing well, managers value information related to

a. employee satisfaction

b. market share

c. budgets and costs, receivables

d. both a and b

Answer

d. both a and b

Q16: What evolved the agile methods

a. Coding

b. Software development method

c. Design

c. System development method

Answer

b. Software development method

Q17: Which cryptography solves the problem of having to send a key secretly to receive of message

a. Symmetric Key

b. Public Key

c. Both a. and b.

d. Private Key

Answer

b. Public Key

Q18: Standard for the software development process and certifications for the same are based on —–

a. Waterfall model

b. Scrum model

c. Agile models

d. None of the above

Answer

a. Waterfall model

Q19: The project requirements provide a road map for the project with important details such as —– and ——.

a Design and coding

b. Budget allocation and time frame

c. Project walkthrough and allocation

d. None of the above

Answer

b. Budget allocation and time frame

Q20: Modules clubbed together called —–

a. Unit testing

b. Integration testing

c. System testing

d. both a and c

Answer

b. Integration testing

Q21: What involved in Lower stage cycle of waterfall model

a. Coding an implementation

b. implementation and maintenance

c. Analysis and design

d. project requirement and analysis

Answer

a. Coding an implementation

Q22: Which of the following is secure mode of running the system

a. Administrative mode

b. User mode

c. Both are equally secure

d. Both are insecure

Answer

b. User mode

Q23: Select from following proper sequence of six stags of waterfall model.

a. Design, Coding testing, Implementation integration, Maintenance, Analysis, Project requirement

b. Project requirement, Analysis. Coding testing, Design, Implementation integration, Maintenance

c. Project requirement, Design, Analysis Coding testing, Implementation integration, Maintenance

d. Project requirements, Analysis, Design, Coding testing, implementation integration, Maintenance.

Answer

d. Project requirements, Analysis, Design, Coding testing, implementation integration, Maintenance.

Q24: Culture or work culture of any organization is understood as the shared set of and within the organization.

a. Values

b. Beliefs

c. Groups

d. both a and b

Answer

d. both a and b

Q25: Who are connected to the system in a direct manner and sometimes indirectly and whose use or non-use of the system will determine its success.

a. Client

b. Tester

c. Stakeholders

d. Coder

Answer

c. Stakeholders

Q26: Which of the following is the part of the four main types for e-commerce

A.B2B

B.B2C

c.C2B

d. All of the Above

Answer

d. All of the Above

Q27: What was developed using principles of engineering, with an emphasis on design before implementation.

a. Hardware

b. Software

c. Coding

d. Planning

Answer

b. Software

Q28: Malicious codes called —–, also attack organizations to infect them or to steal data and money

a. Virus

b. Worms

c. Crackers

d. Malware

Answer

c. Crackers

Q29: In computing technology the original message to be encrypted is usually called a —– and the coded message is called a —–

a. Plaintext and Cipher text

b. Cipher text and Plaintext

c. Plaintext and symmetric text

d. Cipher text and Symmetric text

Answer

a. Plaintext and Cipher text

Q30: In which type of filtering technique, trusted users can be allowed to access the telnet facility, whereas other users can be barred from doing so

a. Packet filtering

b. Deep Packet inspection

c. Application Filtering

d. None of these

Answer

c. Application Filtering

Q31: Which type of e-commerce focuses on consumers dealing with each other?

a. B2B

b. B2C

c. C2B

d. C2C

Answer

d. C2C

Q32: While planning an information system, managers in many organizations have to consider trade-offs between speed and of information.

a. amount

b. accuracy

C. sources

d. both b and c

Answer

b. accuracy

Q33: In a furnished apartment most of the facilities for living are already available and the renter can start living there with only her personal effects. This analogy corresponds to which of the following cloud service models

a. Saas

b. Iaas

c. Paas

d. None of the above

Answer

c. Paas

Q34: Information technology (IT) are the artefacts such as that constitute the IS.

a. Computer

b. Software

c. Networks

d. all of the above

Answer

d. all of the above

Q35: —– is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networks with the help of an electronic device

a. Mobile Commerce

b. e-commerce

c. both of these

d. none of these

Answer

a. Mobile Commerce

Q36: The city government obtains data from the information systems of form in a city regarding their employees’ offices and places of living for promoting carpooling. This is an example of the effects of the implementation information systems by the firms.

a. third order

b. second order

c. first order

d. both b and c

Answer

a. third order

Q37: What is an following an important task of the project requirement phase.

a. Feasibility analysis

b. Technical analysis

c. Requirement analysis

d. Design analysis

Answer

a. Feasibility analysis

Q38: Which method rely on creating programs quickly and with close interaction with customer

a. Agile method

b. Waterfall model

c. Scrum mode

d. None of the above

Answer

a. Agile method

Q39: Which of the following statements is not true about servers and workstations

a. Servers, equipped with the high-speed processors and high-capacity RAM, are used to provide applications to the entire organization across its networks.

b. Servers have a shorter renewal cycle.

c. In multi-core servers, a single physical chip has more than one CPU. Multi core servers cost less, give improved utilization, and save on energy costs.

d. None of the above

Answer

b. Servers have a shorter renewal cycle.

Q40: Which is the type of actuators of the following

a. Electrical

b. Mechanical

c. Hydraulic and pneumatic

d. All the above

Answer

d. All the above

View another MCQs Set of Information Systems for Managers

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.