System Analysis and Design Online MCQ Set 22

QN01. In the NetBill's protocol for small payments for services available in the internet.

  1. the customer is charged only when the information is delivered
  2. the vendor is guaranteed payment when information is delivered
  3. the customer must have a certified credit card
  4. the customer must have a valid public key
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. i, ii, iv
Answer

(D)i, ii, iv

QN02. Advantages of B2C commerce are

  1. Business gets a wide reach to customers
  2. Payment for services easy
  3. Shop can be open 24 hours a day seven days a week
  4. Privacy of transaction always maintained
  1. i and ii
  2. ii and iii
  3. i and iii
  4. iii and iv
Answer

(C)i and iii

QN03. ANSI X.12 is a standard developed by

  1. American National Standard Institute
  2. International Standard Institute
  3. European Common Market
  4. United Nations Economic Commission for Europe
Answer

(A)American National Standard Institute

QN04. Firewall as part of a router program

  1. filters only packets coming from internet
  2. filters only packets going to internet
  3. filters packets travelling from and to the intranet from the internet
  4. ensures rapid traffic of packets for speedy e-Commerce
Answer

(C)filters packets travelling from and to the intranet from the internet

QN05. Encryption is required to

  1. protect business information from eavesdropping when it is transmitted on internet
  2. efficiently use the bandwidth available in PSTN
  3. to protect information stored in companies' databases from retrieval
  4. to preserve secrecy of information stored in databases if an unauthorized person retrieves it
  1. i and ii
  2. ii and iii
  3. iii and iv
  4. i and iv
Answer

(D)i and iv

QN06. DES using 56 bit keys

  1. Cannot be broken in reasonable time using presently available computers
  2. Can be broken only if the algorithm is known using even slow computers.
  3. Can be broken with presently available high performance computers.
  4. It is impossible to break ever.
Answer

(C)Can be broken with presently available high performance computers.

QN07. In public key encryption if A wants to send an encrypted message to B

  1. A encrypts message using his private key
  2. A encrypts message using B's private key
  3. A encrypts message using B's public key
  4. A encrypts message using his public key
Answer

(C)A encrypts message using B's public key

QN08. A hashing function for digital signature

  1. must give a hashed message which is shorter than the original message
  2. must be hardware implementable
  3. two different messages should not give the same hashed message
  4. is not essential for implementing digital signature
  1. i and ii
  2. ii and iii
  3. i and iii
  4. iii and iv
Answer

(C)i and iii

QN09. The bank has to have the public keys of all customers in SET protocol as it has to

  1. check the digital signature of customers
  2. communicate with merchants
  3. communicate with merchants credit card company
  4. certify their keys
Answer

(A)check the digital signature of customers

QN10. B2C commerce

  1. includes services such as legal advice
  2. means only shopping for physical goods
  3. means only customers should approach customers to sell
  4. means only customers should approach business to buy
Answer

(A)includes services such as legal advice

QN11. EDI requires

  1. representation of common business documents in computer readable form
  2. data entry operators by receivers
  3. special value added networks
  4. special hardware at co-operating Business premises
Answer

(A)representation of common business documents in computer readable form

QN12. EDI standard

  1. is not easily available
  2. defines several hundred transaction sets for various business forms
  3. is not popular
  4. defines only a transmission protocol
Answer

(B)defines several hundred transaction sets for various business forms

QN13. Proxy application gateway

  1. acts on behalf of all intranet users wanting to access internet securely
  2. monitors all accesses to internet and allows access to only specified IP’addresses
  3. disallows use of certain protocols with security problems
  4. disallows all internet users from accessing intranet
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. ii, iii, iv
Answer

(B)i, ii, iii

QN14. The following ciphertext was received. The plaintext was permuted using permutation (34152) and substitution. Substitute character by character ±3 (A → D, etc). The plain text after decryption is: Cipher text : PDLJDLXHVQC

  1. MAIGAIUESNZ
  2. IAMAGENIUSZ
  3. LDPDJHPLXVZ
  4. IAMAGENIUSC
Answer

(B)IAMAGENIUSZ

QN15. Triple DES uses

  1. 168 bit keys on 64-bit blocks of plain text
  2. Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds.
  3. Works with 144 bit blocks of plain text and applies DES algorithm once.
  4. Uses 128 bit blocks of plain text and 112 bit keys and apply DES algorithm thrice.
Answer

(B)Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds.

QN16. A digital signature is required

  1. to tie an electronic message to the sender's identity
  2. for non repudiation of communication by a sender
  3. to prove that a message was sent by the sender in a court of law
  4. in all e-mail transactions
  1. i and ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. ii, iii, iv
Answer

(B)i, ii, iii

QN17. In electronic cheque payments developed, it is assumed that most of the transactions will be

  1. customers to customers
  2. customers to business
  3. business to business
  4. banks to banks
Answer

(C)business to business

QN18. EDI standards are

  1. not universally available
  2. essential for B2B commerce
  3. not required for B2B commerce
  4. still being evolved
Answer

(B)essential for B2B commerce

QN19. EDI over internet uses

  1. MIME to attach EDI forms to e-mail messages
  2. FTP to send business forms
  3. HTTP to send business forms
  4. SGML to send business forms
Answer

(A)MIME to attach EDI forms to e-mail messages

QN20. Main function of proxy application gateway firewall is

  1. to allow corporate users to use efficiently all internet services
  2. to allow intranet users to securely use specified internet services
  3. to allow corporate users to use all internet services
  4. to prevent corporate users from using internet services
Answer

(B)to allow intranet users to securely use specified internet services

QN21. In cheque payment protocol, the purchase order form is signed by purchaser using

  1. his public key
  2. his private key
  3. his private key using his signature hardware
  4. various public keys
Answer

(C)his private key using his signature hardware

QN22. EDIFACT is a standard

  1. for representing business forms used in e-Commerce
  2. for e-mail transaction for e-Commerce
  3. for ftp in e-Commerce
  4. protocol used in e-Commerce
Answer

(A)for representing business forms used in e-Commerce

QN23. For secure EDI transmission on internet

  1. MIME is used
  2. S/MIME is used
  3. PGP is used
  4. TCP/IP is used
Answer

(B)S/MIME is used

QN24. By symmetric key encryption we mean

  1. one private key is used for both encryption and decryption
  2. private and public key used are symmetric
  3. only public keys are used for encryption
  4. only symmetric key is used for encryption
Answer

(A)one private key is used for both encryption and decryption

QN25. Public key system is useful because

  1. it uses two keys
  2. there is no key distribution problem as public key can be kept in a commonly accessible database
  3. private key can be kept secret
  4. it is a symmetric key system
Answer

(B)there is no key distribution problem as public key can be kept in a commonly accessible database

QN26. The responsibility of a certification authority for digital signature is to authenticate the

  1. hash function used
  2. private keys of subscribers
  3. public keys of subscribers
  4. key used in DES
Answer

(C)public keys of subscribers

QN27. The acronym DES stands for

  1. Digital Evaluation System
  2. Digital Encryption Standard
  3. Digital Encryption System
  4. Double Encryption Standard
Answer

(B)Digital Encryption Standard

QN28. In public key encryption system if A encrypts a message using his private key and sends it to B

  1. if B knows it is from A he can decrypt it using A's public key
  2. Even if B knows who sent the message it cannot be decrypted
  3. It cannot be decrypted at all as no one knows A's private key
  4. A should send his public key with the message
Answer

(A)if B knows it is from A he can decrypt it using A's public key

QN29. Certification of Digital signature by an independent authority is needed because

  1. it is safe
  2. it gives confidence to a business
  3. the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership
  4. private key claimed by a sender may not be actually his
Answer

(C)the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership

QN30. In SET protocol a customer encrypts credit card number using

  1. his private key
  2. bank's public key
  3. bank's private key
  4. merchant's public key
Answer

(B)bank's public key

QN31. The expansion of CASE tools is:

  1. Computer Assisted Self Evaluation
  2. Computer Aided Software Engineering
  3. Computer Aided Software Environment
  4. Core Aids for Software Engineering
Answer

(B)Computer Aided Software Engineering

QN32. CASE tools are useful

  1. only during system design stage
  2. during all the phases of system life cycle
  3. only for system documentation
  4. only during system analysis stage
Answer

(B)during all the phases of system life cycle

QN33. Open domain CASE tools

  1. are available for almost all phases of system analysis and design life cycle
  2. are available only for drawing DFD's
  3. are no available to document SRS
  4. creating data dictionaries
Answer

(A)are available for almost all phases of system analysis and design life cycle

QN34. Lower CASE tools are used for

  1. develop graphical user interface
  2. for converting decision tables to source programs
  3. for generating test cases
  4. for developing use cases
Answer

(B)for converting decision tables to source programs

QN35. CASE tools are used by industries to

  1. Improve productivity of their software engineers
  2. Reduce time to develop applications
  3. Improve documentation
  4. Automate system analysis
  1. i and ii
  2. i and iii
  3. i, ii, and iii
  4. ii and iii
Answer

(C)i, ii, and iii

QN36. The following are the disadvantages of CASE tools

  1. Some tools are expensive
  2. All software engineers need to be trained to use these tools
  3. A lot of time is wasted in using the tools
  4. Software developed using CASE tools are of poor quality
  1. i, ii, iii, iv
  2. iii and iv
  3. ii, iii, and iv
  4. i and ii
Answer

(D)i and ii

QN37. CASE tools are

  1. A Set of rules to be used during system analysis and design
  2. Program, packages used during system analysis and design
  3. A set of tools used by analysts
  4. Needed for use case development.
Answer

(B)Program, packages used during system analysis and design

QN38. Upper CASE tools are used

  1. for developing DFD's
  2. for screen design
  3. during all phases of system analysis and design life cycle
  4. for converting structured English procedures to source code into a language such as
Answer

(A)for developing DFD's

QN39. By open domain CASE tools we mean

  1. tools available in open domain
  2. software packages which can be downloaded form the internet
  3. software packages to aid each phase of the systems analysis and design which can be downloaded free of cost from the internet
  4. source codes of CASE tools
Answer

(C)software packages to aid each phase of the systems analysis and design which can be downloaded free of cost from the internet

QN40. CASE tools are classified often as

  1. Classical and Modern CASE tools
  2. Upper and lower CASE tools
  3. Source and Object CASE tools
  4. Object oriented and Structured CASE tools
Answer

(B)Upper and lower CASE tools

QN41. Lower CASE tools are used for

  1. for developing DFD's
  2. for screen design
  3. during all phases of system analysis and design life cycle
  4. for converting structured English procedures to source code into a language such as C
Answer

(D)for converting structured English procedures to source code into a language such as C

QN42. Open domain CASE tools

  1. are better than commercial tools
  2. are not very useful
  3. do not usually have very good user interface but are otherwise useful
  4. are full of bugs
Answer

(C)do not usually have very good user interface but are otherwise useful

QN43. The current standard tool for designing object oriented systems is called

  1. Unified Modelling Language
  2. Booch Modelling Language
  3. Object Modelling Language
  4. Class, responsibilities and collaborators language
Answer

(A)Unified Modelling Language

QN44. The following relation is not normalized because

Roll no Name Courses taken
Course No Dept Sem
4568 A.B Moni CS 101
EE 545
Phy 325
C.S.
E.E.
Physics
1
2
1
4894 R. Chamnlal Phy 101
Chem202
Math 103
CS 101
Physics
Chemistry.
Math.
C.S.
1
2
1
1
4954 R. Gupta CS 101 C.S. 1
  1. It is difficult to store due to non-uniform size of the attributes
  2. Roll no. 4568 have 3 course line whereas Roll no. 4954 has only one course line
  3. The composite attribute (CS 101, C.S., 1) is repeated
  4. Some item lines have composite attributes
Answer

(D)Some item lines have composite attributes

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.