System Analysis and Design Online MCQ Set 20

QN01. By an extranet we mean

  1. an extra fast computer network
  2. the intranets of two co-operating organizations interconnected via a secure leased line
  3. an extra network used by an organization for higher reliability
  4. an extra connection to internet provided to co-operating organizations
Answer

(B)the intranets of two co-operating organizations interconnected via a secure leased line

QN02. A URL specifies the following:

  1. protocol used
  2. domain name of server hosting web page
  3. name of folder with required information
  4. name of document formatted using HTML
  5. the name of ISP
  1. i, ii, iii, iv
  2. ii, iii, iv, v
  3. i, iii, iv
  4. i, ii, iii, v
Answer

(A)i, ii, iii, iv

QN03. The tags used for specifying fonts in HTML are

  1. <B>
  2. <I>
  3. <U>
  4. <L>
  1. (i) and (ii)
  2. (i) and (iii)
  3. (ii) and (iv)
  4. (i),(ii) and (iii)
Answer

(A)(i) and (ii)

QN04. XML uses

  1. user define tags
  2. pre-defined tags
  3. both predefined and user-defined tags
  4. Extended tags used in HTML and makes them powerful
Answer

(A)user define tags

QN05. IP address is currently

  1. 4 bytes long
  2. available in plenty
  3. 6 bytes long
  4. not assigned as it is all used up
Answer

(A)4 bytes long

QN06. World Wide Web

  1. is another name for internet
  2. world wide connection for computers
  3. a collection of linked information residing on computers connected by the internet
  4. a collection of world wide information
Answer

(C)a collection of linked information residing on computers connected by the internet

QN07. HTML stands for

  1. Hyper Text Making Links
  2. Hyper Text Markup Language
  3. Higher Textual Marking of Links
  4. Hyper Text Mixer of Links
Answer

(B)Hyper Text Markup Language

QN08. The tag used in HTML to link it with other URL's is:

  1. <A>
  2. <H>
  3. <U>
  4. <L>
Answer

(A)<A>

QN09. IP addresses are converted to

  1. a binary string
  2. alphanumeric string
  3. a hierarchy of domain names
  4. a hexadecimal string
Answer

(C)a hierarchy of domain names

QN10. HTML and XML are markup languages

  1. Specially development for the web
  2. Are based on SGML
  3. Are versions of SGML
  4. Independent of SGML
Answer

(B)Are based on SGML

QN11. Control in design of an information system is used to

  1. inspect the system and check that it is built as per specifications
  2. protect data from accidental or intentional loss
  3. ensure that the system processes data as it was designed to and that the results are reliable
  4. ensure privacy of data processed by it
Answer

(C)ensure that the system processes data as it was designed to and that the results are reliable

QN12. A proof figure is

  1. a figure used to prove the correctness of data entry
  2. an additional data entered with each record to facilitate detection of arithmetic error
  3. a number used during data entry
  4. a modulus-11 check digit
Answer

(B)an additional data entered with each record to facilitate detection of arithmetic error

QN13. Auditing of information systems is primarily required to ensure that

  1. all input records are correct and are included in processing
  2. the system has ample protection against frauds
  3. the processing performance is reliable
  4. the system is developed at low cost
  1. i and ii
  2. iii and iv
  3. ii and iii
  4. i, ii and iii
Answer

(D)i, ii and iii

QN14. It is advisable for an auditor to require an operational information system to

  1. keep logs of all system runs and people involved
  2. ensure that the programs and system operation are well documented
  3. ensure that no changes are allowed
  4. ensure that the inputs and batch controls are properly designed
  1. i, ii, iii
  2. ii, iii, iv
  3. i, ii, iv
  4. i, ii
Answer

(C)i, ii, iv

QN15. Program tests use test data to

  1. exercise all paths taken by a program
  2. test loop counters
  3. test with values which change state of logical variables
  4. comprehensively exercise program
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. i, ii, iv
Answer

(B)i, ii, iii

QN16. It is necessary to protect information system from the following risks:

  1. natural disasters like fire, floods etc
  2. disgruntled employees
  3. poorly trained employees
  4. hackers
  5. industrial spies
  6. data entry operators
  1. ii, iii, iv, v
  2. i, ii, iii, iv, v
  3. i, iv, v
  4. i, ii, iii, iv, v, vi
Answer

(D)i, ii, iii, iv, v, vi

QN17. To protect a system from viruses one should

  1. not allow unauthorized use of floppy disks
  2. scan viruses in files received via a network or floppies
  3. isolate a system from networks
  4. install a roll-back recovery program in the system
  1. i and iii
  2. i and ii
  3. ii and iv
  4. i, iii, iv
Answer

(B)i and ii

QN18. Proof figures are used to check

  1. arithmetic errors in processing
  2. data entry errors in processing
  3. loop errors in program
  4. proof of program correctness
  1. i and ii
  2. i and iii
  3. ii and iv
  4. iii and iv
Answer

(A)i and ii

QN19. A relationship check

  1. is concerned with checking a relation
  2. uses an entity-relationship model for checking
  3. finds out if a relationship is satisfied in computation
  4. uses the fact that a known relationship exists between two data elements and checks if it is satisfied during computation
Answer

(D)uses the fact that a known relationship exists between two data elements and checks if it is satisfied during computation

QN20. By auditing around the computer we mean

  1. the inputs and the corresponding outputs are compared and checked for correctness
  2. the programs and procedures are checked for correctness
  3. special synthetic data is input and outputs checked for correctness
  4. programs are written to check the functioning of the computer hardware
Answer

(A)the inputs and the corresponding outputs are compared and checked for correctness

QN21. Some audit and control procedures in a system

  1. detect and correct errors in programs
  2. selectively print records in a system which meet certain criteria
  3. examine credit and debit balances in an accounting system and check if they balance
  4. provide a facility to trace a variable value through processing steps and print intermediate values when required
  1. i and ii
  2. ii and iii
  3. i, ii, iii
  4. ii, iii, iv
Answer

(D)ii, iii, iv

QN22. By information system testing we mean

  1. testing an information system correctly
  2. determining whether a system is performing as per specifications
  3. determining whether a system is performing optimally
  4. ensuring proper function of a system
Answer

(B)determining whether a system is performing as per specifications

QN23. Security in the design of information system is used to

  1. inspect the system and check that it is built as per the specifications
  2. protect data and programs from accidental or intentional loss
  3. ensure that the system processes data as it was designed to and that the results are reliable
  4. ensure privacy of data processed by it
Answer

(B)protect data and programs from accidental or intentional loss

QN24. Some security measures commonly used are

  1. data encryption
  2. logging of all accesses to an information system and recording changes made (if any)
  3. data compression
  4. copying of files
  1. ii and iii
  2. i and iii
  3. i and ii
  4. ii and iv
Answer

(C)i and ii

QN25. Controls are necessary in information systems as

  1. massive amounts of data are processed and human errors are expected in data entry
  2. accidental errors can lead to loss of money and credibility in a system
  3. to protect the system from virus attack
  4. data may be lost due to disk crashes
  1. i and ii
  2. i and iii
  3. i and iv
  4. ii and iii
Answer

(A)i and ii

QN26. Audit in the design of information system is used to

  1. inspect the system and check that it is built as per specifications
  2. protect data from accidental or intentional loss
  3. ensure that the system processes data as it was designed to and that the results are reliable
  4. ensure privacy of data processed by it
Answer

(A)inspect the system and check that it is built as per specifications

QN27. A two way check

  1. calculates the same quantity in two different ways and compares them for equality
  2. calculates the quantities and compares them for equality
  3. checks a data item in two different ways
  4. enters data two times and cross-checks them
Answer

(A)calculates the same quantity in two different ways and compares them for equality

QN28. Some of the features of audit package used to check systems are:

  1. facility to total specified items based on some criteria
  2. extracting items based on some criteria for checking
  3. check-pointing and restart facility
  4. hardware faults recovery
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. i, ii, iv
Answer

(B)i, ii, iii

QN29. By string test we mean

  1. a test which tests operations with strings
  2. a string of tests on programs
  3. Test on related programs
  4. The output of a program is sent as input to related program(s) to see if data is transferred correctly
Answer

(D)The output of a program is sent as input to related program(s) to see if data is transferred correctly

QN30. The following measures are taken to ensure security of information systems:

  1. duplicate copies of data/programs are kept in a different place preferably in fire-proof vault
  2. password protection is used to prevent unauthorized access
  3. no one is allowed to alter data in the database
  4. no one is allowed alter programs
  1. i and ii
  2. i, ii, iii
  3. ii, iii, iv
  4. iii and iv
Answer

(A)i and ii

QN31. The major objectives of control are

  1. guard against frauds in data entry/processing
  2. check clerical handling of data before it enters a computer
  3. to provide a method to trace the steps and find where error has occurred
  4. automatically correct errors in data entry/processing
  1. i, ii and iv
  2. i, ii, iii and iv
  3. i, ii and iii
  4. i and iii
Answer

(C)i, ii and iii

QN32. At each check-point

  1. quantities such as control totals and proof figures are checked for correctness
  2. process state is stored in secondary storage
  3. a program halts for check by programmers
  4. a self-checking system is invoked by the analyst
  1. i and iv
  2. ii and iii
  3. i and ii
  4. i and iii
Answer

(C)i and ii

QN33. In auditing with a computer

  1. auditing programs are designed and used to check a system
  2. the hardware of the computer is thoroughly checked for malfunctions
  3. system software is thoroughly checked to ensure error free operations
  4. auditors check system with a computer
Answer

(A)auditing programs are designed and used to check a system

QN34. Parallel runs are used

  1. during regular operation of an information system
  2. when a system is initially implemented
  3. whenever errors are found in a computerized system
  4. whenever management insists
Answer

(B)when a system is initially implemented

QN35. A firewall is used in a system connected to a wide area network to

  1. prevent spread of fire in the network
  2. prevent unauthorized access by hackers
  3. to scan for viruses in files
  4. to extinguish fire spreading via network cables
Answer

(B)prevent unauthorized access by hackers

QN36. Organizational measures in control mean

  1. a set of well organized methods
  2. assignment of appropriate responsibilities to individuals in data processing in an organization
  3. proper organization of data
  4. creation of an organization for controlling system
Answer

(C)proper organization of data

QN37. A check-point procedure

  1. checks program correctness at certain points
  2. divides a program into smaller parts
  3. breaks a programs into portions at the end of each of which a check point program is executed
  4. finds points in a program where it is convenient to check it
Answer

(C)breaks a programs into portions at the end of each of which a check point program is executed

QN38. An audit trail is established in a system to

  1. detect errors in a system
  2. enable auditing of a system
  3. localize the source of an error in a system
  4. trail a program
Answer

(C)localize the source of an error in a system

QN39. The scope of the system test includes

  1. both computerized and manual procedures
  2. only test of computer procedures
  3. computerized procedures, manual procedures, computer operations and controls
  4. mainly computerized procedures and operations controls
Answer

(C)computerized procedures, manual procedures, computer operations and controls

QN40. A two-way check is used to

  1. check program correctness
  2. find data entry errors
  3. find multiplication errors
  4. find arithmetic error in processing
  1. i and ii
  2. ii and iii
  3. ii and iv
  4. i and iv
Answer

(C)ii and iv

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.