Q1: In which stage shows output of the lifecycle is a document that clearly outlines the scope of the project, the budget, the personnel involved, the likely milestones and the key success indicators.
a. Analysis
b. Design
c. Maintenance
d. Project Requirement
Answer
d. Project Requirement
Q2: The idea of having a plan that would lead to resumption of normal business with the IT infrastructure after a disruption caused by a natural/manmade disaster is called
a. Disaster recovery (DR)
b. Business continuity planning (BCP)
c. Both terms can be used interchangeably
d. None of these
Answer
c. Both terms can be used interchangeably
Q3: —– are set of problems the program is run on to see how it performs.
a. Design suits
b. Test suits
c. Platform
d. both a and b
Answer
b. Test suits
Q4: Analysis stage is also called the —– where the basic objective of the system is explained in as much details as possible
a. Requirement stage
b. Design stage
c. Coding stage
d. Testing stage
Answer
a. Requirement stage
Q5: What is called if the requirements are changed and accommodating the new requirements attracts extra charges.
a. Scope creep by shareholder
b. Scope creep by vendors
c. Test suits
d. Both a and b
Answer
b. Scope creep by vendors
Q6: What it is called when tests are conducted for individual modules.
a. Stub Testing
b. Integration Testing
c. System Testing
d. None of the above
Answer
a. Stub Testing
Q7: What is a prototyping
a. It is a software development implies creating a working model of the system not the entire system
b. It is system development process implies creating a entire system not the working model.
c. Both a and b
d. None of the above
Answer
a. It is a software development implies creating a working model of the system not the entire system
Q8: The software industry grew immensely and with it grew the problems of —– and the need for extensive and scientific testing.
a. Spaghetti code
b. parallel code
c. obfuscated code
d. Pizza code
Answer
a. Spaghetti code
Q9: Cracking methods whose crackers identify the kind and type of system that is being used and then uncover its security mechanism
a. Reverse Engineering
b. Political Espionage
c. Social Engineering
d. none of these
Answer
a. Reverse Engineering
Q10: A kind of ‘tunnel’ through which clients can connect to the organization’s network while using the public network
a. Wireless technology
b. RFID
c. Virtual Private Network
d. Wireless Sensor Network
Answer
c. Virtual Private Network
Q11: What prototyping is a formal method by which the system is built in sequence of cycles of the waterfall model
a. Slow
b. Rapid
c. Detailed
d. None of the above
Answer
b. Rapid
Q12: ILOVEYOU worm was written by two college dropout computer programmer, originated in
a. Germany
b. Philippines
c. Ukraine
d. Hong Kong
Answer
b. Philippines
Q13: What involves in Risk Assessment
a. it involves assigning estimates to the construction, use, value and eventual success of two alternatives.
b. it involves the assigning estimation to the construction, use, value and eventual success of three alternatives.
c. none of the above
d. Both a ad b
Answer
a. it involves assigning estimates to the construction, use, value and eventual success of two alternatives.
Q14: In waterfall model, the first three are considered the most critical and important parts of the life cycle are called as —–
a. Lower stages of the cycle
b. Middle stages of the cycle
c. Upper stage of the cycle
d. None of the above
Answer
c. Upper stage of the cycle
Q15: In an economy in which the firm is doing well, managers value information related to
a. employee satisfaction
b. market share
c. budgets and costs, receivables
d. both a and b
Answer
d. both a and b
Q16: What evolved the agile methods
a. Coding
b. Software development method
c. Design
c. System development method
Answer
b. Software development method
Q17: Which cryptography solves the problem of having to send a key secretly to receive of message
a. Symmetric Key
b. Public Key
c. Both a. and b.
d. Private Key
Answer
b. Public Key
Q18: Standard for the software development process and certifications for the same are based on —–
a. Waterfall model
b. Scrum model
c. Agile models
d. None of the above
Answer
a. Waterfall model
Q19: The project requirements provide a road map for the project with important details such as —– and ——.
a Design and coding
b. Budget allocation and time frame
c. Project walkthrough and allocation
d. None of the above
Answer
b. Budget allocation and time frame
Q20: Modules clubbed together called —–
a. Unit testing
b. Integration testing
c. System testing
d. both a and c
Answer
b. Integration testing
Q21: What involved in Lower stage cycle of waterfall model
a. Coding an implementation
b. implementation and maintenance
c. Analysis and design
d. project requirement and analysis
Answer
a. Coding an implementation
Q22: Which of the following is secure mode of running the system
a. Administrative mode
b. User mode
c. Both are equally secure
d. Both are insecure
Answer
b. User mode
Q23: Select from following proper sequence of six stags of waterfall model.
a. Design, Coding testing, Implementation integration, Maintenance, Analysis, Project requirement
b. Project requirement, Analysis. Coding testing, Design, Implementation integration, Maintenance
c. Project requirement, Design, Analysis Coding testing, Implementation integration, Maintenance
d. Project requirements, Analysis, Design, Coding testing, implementation integration, Maintenance.
Answer
d. Project requirements, Analysis, Design, Coding testing, implementation integration, Maintenance.
Q24: Culture or work culture of any organization is understood as the shared set of and within the organization.
a. Values
b. Beliefs
c. Groups
d. both a and b
Answer
d. both a and b
Q25: Who are connected to the system in a direct manner and sometimes indirectly and whose use or non-use of the system will determine its success.
a. Client
b. Tester
c. Stakeholders
d. Coder
Answer
c. Stakeholders
Q26: Which of the following is the part of the four main types for e-commerce
A.B2B
B.B2C
c.C2B
d. All of the Above
Answer
d. All of the Above
Q27: What was developed using principles of engineering, with an emphasis on design before implementation.
a. Hardware
b. Software
c. Coding
d. Planning
Answer
b. Software
Q28: Malicious codes called —–, also attack organizations to infect them or to steal data and money
a. Virus
b. Worms
c. Crackers
d. Malware
Answer
c. Crackers
Q29: In computing technology the original message to be encrypted is usually called a —– and the coded message is called a —–
a. Plaintext and Cipher text
b. Cipher text and Plaintext
c. Plaintext and symmetric text
d. Cipher text and Symmetric text
Answer
a. Plaintext and Cipher text
Q30: In which type of filtering technique, trusted users can be allowed to access the telnet facility, whereas other users can be barred from doing so
a. Packet filtering
b. Deep Packet inspection
c. Application Filtering
d. None of these
Answer
c. Application Filtering
Q31: Which type of e-commerce focuses on consumers dealing with each other?
a. B2B
b. B2C
c. C2B
d. C2C
Answer
d. C2C
Q32: While planning an information system, managers in many organizations have to consider trade-offs between speed and of information.
a. amount
b. accuracy
C. sources
d. both b and c
Answer
b. accuracy
Q33: In a furnished apartment most of the facilities for living are already available and the renter can start living there with only her personal effects. This analogy corresponds to which of the following cloud service models
a. Saas
b. Iaas
c. Paas
d. None of the above
Answer
c. Paas
Q34: Information technology (IT) are the artefacts such as that constitute the IS.
a. Computer
b. Software
c. Networks
d. all of the above
Answer
d. all of the above
Q35: —– is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networks with the help of an electronic device
a. Mobile Commerce
b. e-commerce
c. both of these
d. none of these
Answer
a. Mobile Commerce
Q36: The city government obtains data from the information systems of form in a city regarding their employees’ offices and places of living for promoting carpooling. This is an example of the effects of the implementation information systems by the firms.
a. third order
b. second order
c. first order
d. both b and c
Answer
a. third order
Q37: What is an following an important task of the project requirement phase.
a. Feasibility analysis
b. Technical analysis
c. Requirement analysis
d. Design analysis
Answer
a. Feasibility analysis
Q38: Which method rely on creating programs quickly and with close interaction with customer
a. Agile method
b. Waterfall model
c. Scrum mode
d. None of the above
Answer
a. Agile method
Q39: Which of the following statements is not true about servers and workstations
a. Servers, equipped with the high-speed processors and high-capacity RAM, are used to provide applications to the entire organization across its networks.
b. Servers have a shorter renewal cycle.
c. In multi-core servers, a single physical chip has more than one CPU. Multi core servers cost less, give improved utilization, and save on energy costs.
d. None of the above
Answer
b. Servers have a shorter renewal cycle.
Q40: Which is the type of actuators of the following
a. Electrical
b. Mechanical
c. Hydraulic and pneumatic
d. All the above
Answer
d. All the above