Q1: What embodies most of the objectives of the agile manifesto and has been demonstrated to be effective for small to medium scale projects?
a. Embedded programming
b. Functional programming
C. scripting programming
d. Extreme programming
Answer
d. Extreme programming
Q2: —– type of payment system is highly useful to those customers who would like to control overspending,
a. Prepaid
b. Post paid
c. both of these
d. none of these
Answer
a. Prepaid
Q3: The —– shows what has been completed on a daily basis giving the team a focus for what needs to be achieved.
a. Documentation
b. Burn down chart
c. Flow chart
d. None of the above
Answer
b. Burn down chart
Q4: Private cloud is not known as:
a. Supportive cloud
b. Internal cloud
c. Corporate cloud
d. None of these
Answer
a. Supportive cloud
Q5: Software released for user for testing is said to be an —–
a. Alpha testing
b. Unit testing
c. Beta testing
d. System testing
Answer
a. Alpha testing
Q6: Which of the following is not suitable for a B2C transaction
a. clothes
b. flowers
C. airline reservation
d. none
Answer
d. none
Q7: What CASE stands for
a. Computer-Aided Software Engineering
b. Computer-Access Software Engineering
c. Computer-Aided System Engineering
d. Computer-Access System Engineering
Answer
a. Computer-Aided Software Engineering
Q8: In —– type of payment system customer is allowed to spend only up to the amount that have pre deposited into account.
a. Prepaid
b. Post paid
c. both of these
d. none of these
Answer
a. Prepaid
Q9: In what stage of waterfall model, the overall scope of the project is established.
a. Analysis phase
b. Project requirement phase
c. Design phase
d. Maintenance phase
Answer
b. Project requirement phase
Q10: Which is not a benefit of cloud computing
a. Scalability
b. Resource pooling
c. Dynamic load balances
d. Elasticity
Answer
c. Dynamic load balances
Q11: Which of the following is wireless technology
a. Wi-Fi Routers
b. RFID
c. Bluetooth
d. All of the above
Answer
d. All of the above
Q12: What phase is for the continued use of the system
a. Design
b. Coding
c. Implementation
d. Maintenance
Answer
d. Maintenance
Q13: Which cloud facility is dedicated to a single client, without any shared facilities
a. Hybrid
b. Community
c. Private
d. Public
Answer
c. Private
Q14: ATM is an example of
a. Single Factor Authentication
b. Two Factor Authentication
c. Either a. or b.
d. none of these
Answer
b. Two Factor Authentication
Q15: —– is a financial instrument which can be used more than once to borrow money or buy products and services on credit.
a. Credit card
b. E-Cheques
c. E-cash
d. none of these
Answer
a. Credit card
Q16: What analysts uses to ensure that the requirements they unearth are adequately recorded in the requirements document.
a. Rigorous documentation techniques
b. Easy analysis techniques
c. Easy documentation techniques
d. Rigorous analysis techniques
Answer
a. Rigorous documentation techniques
Q17: Which type of cloud need involvement of groups for its implementation
a. Private
b. Public
c. Hybrid
d. Community
Answer
d. Community
Q18: The framework or methodologies for software development present a —– in which software can be constructed.
a. Planned
b. Unplanned
c. Structured
d. Unstructured
Answer
c. Structured
Q19: The software that when installed stays in the RAM & keeps records of all keystrikes on the keyboard
a. DOS
b. Spyware
C. Key logger
d. None of these
Answer
C. Key logger
Q20: What are the initial set of functionalities defied as part of product vision.
a. User stories
b. Epics
c. Pigs
d. None of the above
Answer
b. Epics
Q21: —– e-commerce consists of the sale of products or services from a business to the general public
a. B2G
b. B2E
c. B2B
d. B2C
Answer
d. B2C
Q22: Which mode provides more privilege for changing the setting
a. Administrative mode
b. User mode
c. Both are equally secure
d. Both are insecure
Answer
a. administrative mode
Q23: What organization uses extensively to build and help maintain the system
a. User
b. Top management
c. Vendor
d. Team member
Answer
c. Vendor
Q24: What are the examples of IOT
a. logistics management with IOT
b. healthcare with IOT
c. Both a and b
d. none of these
Answer
c. Both a and b
Q25: Which of the following is not true about Public- key encryption
a. Followed by pair of key called public key and private key
b. Message is encrypted using private key and decrypted using public key
c. Also known as RSA encryption technique
d. Process involves taking the product of these numbers from which an amount is subtracted and division is performed
Answer
Message is encrypted using private key and decrypted using public key
Q26: The dimension of e-commerce that enables commerce across national boundaries is called —–
a. interactivity
b. global reach
c. richness
d. ubiquity
Answer
b. global reach
Q27: Software released to a longer audience and this is known as —–
a. Alpha Testing
b. Beta Testing
c. System Testing
d. None of the above
Answer
b. Beta Testing
Q28: —– is basically a concept of online marketing and distributing of products and services over internet
a. B2G
b. B2E
c. B2C
d. B2B
Answer
c. B2C
Q29: Which of the following is not true about DMZ
a. Buffer that allows user to enter after authentication is allowed to access other access
b. Virtual network apart from organization network
c. If one of the server is attacked, then others too are attacked
d. It stands for demilitarized zone
Answer
c. If one of the server is attacked, then others too are attacked
Q30: Which of the following describes e-commerce
a. Doing business electronically
b. Doing business
c. Sale of goods
d. All of the above
Answer
a. Doing business electronically
Q31: What is an issue for software project management in the current organizational environment
a. obtaining and retaining top management support
b. obtaining a retaining support of team member
c. Both a and b
d. None of the above
Answer
a. obtaining and retaining top management support
Q32: —– allows a business application on the computer of one organization to communicate directly with the business application on the computer of another company
a. EDI
b. Protocols
c. Standards
d. Business applications
Answer
a. EDI
Q33: Which techniques use to estimates the size and effort required to build an information system.
a. Function point analysis
b. Data function
c. Transaction function
d. None of the above
Answer
a. Function point analysis
Q34: Electronic Exchange of business documents in a standard format is known as —–
a. E-commerce
b. E-Business
c. EDI
d. None of these
Answer
c. EDI
Q35: Which testing is more rigorous as it forces the software to encounter situations it has not seen before?
a. Beta testing
b. Alpha testing
c. Integration testing
d. Unit testing
Answer
a. Beta testing
Q36: In what stage it is provide clear and precise guidelines as how the system will be built.
a. Coding
b. Testing
c. Implementation
d. Design
Answer
d. Design
Q37: Which is not the characteristics of sensors
a. Power consumption
b. Size
c. Mechanical
d. Data filter
Answer
c. Mechanical
Q38: Among the alternate models of B2B e-commerce —– is the best means to obtain a competitive advantage in the Market place.
a. Process based
b. strategic relationship based
C. transaction based
d. any of these
Answer
b. strategic relationship based
Q39: —– is concerned with the buying and selling information, products and services over computer communication networks
a. Commerce
b. E-Commerce
c. E-Business
d. None of these
Answer
b. E-Commerce
Q40: Cloud services where specific applications are provided to clients over the internet is
a. Saas
b. Iaas
c. Caas
d. Paas
Answer
a. Saas
View another MCQs Set of Information Systems for Managers
- Information Systems for Managers NMIMS MCQ set 1
- Information Systems for Managers NMIMS MCQ set 2
- Information Systems for Managers NMIMS MCQ set 3
- Information Systems for Managers NMIMS MCQ set 4
- Information Systems for Managers NMIMS MCQ set 5
- Information Systems for Managers NMIMS MCQ set 6
- Information Systems for Managers NMIMS MCQ set 7