Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Computer Applications in Management

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 29

Computer Applications in Management

1. Select the option that suits the manifesto for Agile Software Development
a. Individuals and Interactions
b. Working software and Responding to change
c. Customer Collaboration
d. All of these

2. Agile software development is based on


a. Incremental development
b. Iterative development
c. Waterfall model
d. Both a and b

3. How many phases are there in Scrum


a. Two
b. Three
c. Four
d. Scrum is an agile method which means it does not have phases

4. Which of the following does not apply to agility to a software process


a. Uses incremental product delivery strategy
b. Only essential work products are produced
c. Eliminate the use of project planning and testing
d. None of these

5. Process is
a. program in High-level language kept on disk
b. contents of main memory
c. a program in execution
d. a job in secondary memory

6. What are the types of requirements?


a. Availability
b. Reliability
c. Usability and Flexibility
d. All of the mentioned
7. Consider a system where a heat sensor detects an intrusion and alerts the security
company. What kind of a requirement the system is providing?
a. Functional
b. Non-functional
c. Known requirement
d. None of these

8. Which of the following is not project management goal?


a. Keeping overall costs within budget
b. Delivering the software to the customer at the agreed time
c. Maintaining a happy and well-functioning development team
d. Avoiding customer complaints

9. Which of the following is not considered as a risk in project management?


a. Specification details
b. Product competition
c. Testing
d. Staff turnover

10. What describes the data and control to be processed?


a. Planning process
b. Software scope
c. External hardware
d. Project complexity

11. Which of the following term is best defined by the statement “the degree of uncertainty
that the product will meet its requirements and be fit for its intended use”?
a. Performance risk
b. Cost risk
c. Support risk
d. Schedule risk

12. Which of the following is a people-intensive activity


a. Problem solving
b. Organization
c. Motivation
d. Project management
13. What threatens the quality and timeliness of the software to be produced?
a. Known risks
b. Business risks
c. Project risks
d. Technical risks

14. What threatens the viability of the software to be built?


a. Known risks
b. Business risks
c. Project risks
d. Technical risks

15. Which risks are associated with constraints imposed by management or the market
place?
a. Business impact risks
b. Process definition risks
c. Product size risks
d. Development environment risks

16. Which web application attribute is defined by the statement “A large number of users
may access the web app at one time?
a. Unpredictable load
b. Performance
c. Concurrency
d. Network intensiveness

17. Which web application attribute is defined by the statement “The quality and aesthetic
nature of content remains an important determinant of the quality of a web app
a. Availability
b. Data driven
c. Content sensitive
d. Continuous evolution

18. Which analysis is a part of Analysis model of the web engineering process framework
a. Content analysis
b. Interaction analysis
c. Functional analysis
d. All of these
19. What category of web based system would you assign to electronic shopping?
a. Transaction oriented
b. Work flow oriented
c. Informational
d. Interactive

20. What category of web-based system would you assign to discussion groups?
a. Collaborative work
b. Online Communities
c. Web Portals
d. Work flow oriented

21. In simplex mode of transmission


a. Data transmission is one way
b. Data can be transmitted to small distances only
c. Data format is simple
d. None of the above

22. A digital channel implies that the channel


a. Is digitized
b. Is carrying digital data
c. Adopts digital modulation techniques
d. Is without carrier

23. The ground wave eventually disappears as one moves away from the transmitter
because of
a. Interference from the sky above
b. Loss of line-of-sight condition
c. Attenuation of energy by the ground
d. Maximum single hop distance limitation

24. Sharing of transmission medium and its bandwidth is known as


a. Encoding
b. Multiplexing
c. Modulation
d. Line discipline

25. In order to transfer messages in a computer network, we use the technique called
a. Circuit switching
b. Message switching
c. Packet switching
d. None of these

26. Project 802.2 defines standards for which layers of the OSI model?
a. Application and Presentation layers
b. Data Link layers
c. Network and Data Link layers
d. Transport and Network layers

27. The Media Access Control sublayer resides in which OSI layer?
a. Transport
b. Physical
c. Network
d. Data Link

28. In which layer of the OSI model do Bridges function?


a. Physical
b. Data link
c. Network
d. Both a and c

29. A repeater takes weak and corrupt signal and


a. Amplifies it
b. Regenerates it
c. Re-samples it
d. None of these

30. Which of the following is not an internetworking device?


a. Bridge
b. Amplifier
c. Gateway
d. None of these

31. A packet travelling from a token ring network to another token ring network uses
a. Simple bridge
b. Repeater
c. Router
d. None of these

32. Computers in a computer network are connected via:


a. Bounded media only
b. Unbounded media
c. Either a or b or both
d. None of these

33. Which of the following is a Network layer protocol?


a. IP
b. Telnet
c. FTP
d. None of these

34. Printek India wants to implement a LAN in an environment with many different voltage
devices. Which transmission medium, according to you, should they choose?
a. Twisted pair cable
b. Fiber optic cable
c. Coaxial cable
d. Either b or c

35. ATM is an acronym for


a. Asynchronous transfer mode
b. Automatic telecommunication method
c. Asynchronous transmission mode
d. None of these

36. Radio waves are


a. Omni directional
b. Bidirectional
c. Non-directional
d. None of these

37. The information to be communicated in a communication system is


a. Medium
b. Protocol
c. Message
d. None of these

38. Which out of the following topologies is the most reliable?


a. Star
b. Ring
c. Bus
d. None of these

39. In a network with 25 computers, which one of the following topologies would require the
least cabling?
a. Mesh topology
b. Star topology
c. Bus topology
d. Ring topology

40. Indicate the true statement:


Modulation is used to
a. Reduce the bandwidth
b. Separate differing transmission
c. Insure that intelligence signal may be transmitted over long distances
d. Allow the use of practicable antennas

41. The following topology has highest reliability:


a. Ring
b. Mesh
c. Bus
d. Star

42. A web page is


a. Made up of text and HTML tags
b. Marked by an opening HTML tag
c. Marked by a closing HTML tag
d. All of these

43. Viruses
a. Another form of computer attack is virus
b. Viruses are designed to spread into other programs and can wreak havoc in a system
c. Causing system crashes and program malfunctioning
d. All of these

44. The software designed to perform a specific task:


a. Synchronous Software
b. Package Software
c. Application Software
d. System Software

45. Developing software ________ means a major commitment of time, money and resources.
a. In-house
b. In-sync
c. On-date
d. On-duration

46. Which of the following is not a way of acquiring software?


a. Buying pre-written software
b Ordering customized software
c. Downloading public-domain Software
d. Duplicating the software

47. OSS stands for:


a. Open System Service
b. Open Source Software
c. Open System Software
d. Open Synchronized Software

48. Set of programs which consist of full documentation.


a. Software Package
b. System Software
c. Utility Software
d. File package

49. What do you call a specific instruction designed to do a task?


a. Command
b. Process
c. Task
d. Instruction
50. They normally interact with the system via user interface provided by the application
software.
a. Programmers
b. Developers
c. Users
d. Testers

51. Junk e-mail is also called


a. spam
b. spoof
c. sniffer script
d. spool

52. A computer cannot 'boot' if it does not have the


a. Compiler
b. Loader
c. Operating System
d. Assembler

53. Office LANS, which are scattered geographically on large scale, can be connected by the use
of corporate
a. CAN
b. LAN
c. DAN
d. WAN

54. What do you call the programs that are used to find out possible faults and their causes?
a. operating system extensions
b. cookies
c. diagnostic software
d. boot diskettes

55. MIS is designed to provide information needed for effective decision making by?
a. Consumers
b. Workers
c. Foremen
d. Managers

56. Personal computers use a number of chips mounted on a main circuit board. What is the
common name for such boards?
a. Daughter board
b. Motherboard
c. Father board
d. Bread board

57. A fault in a computer program which prevents it from working correctly is known as
a. Boot
b. Bug
c. Biff
d. Strap

58. Servers are computers that provide resources to other computers connected to a:
a. network
b. mainframe
c. supercomputer
d. client

59. The ability to recover and read deleted or damaged files from a criminal's computer is an
example of a law enforcement speciality called:
a. robotics
b. simulation
c. computer forensics
d. animation

60. Where does most data go first with in a computer memory hierarchy?
a. RAM
b. ROM
c. BIOS
d. CACHE

61. …………….are used to identify a user who returns to a Website


a. Cookies
b. Plug-ins
c. Scripts
d. ASPs

62. The process of transferring files from a computer on the Internet to your computer is called
a. Downloading
b. uploading
c. FTP
d. JPEG

63. Which of the following contains permanent data and gets updated during the processing of
transactions?
a. Operating System File
b. Transaction file
c. Software File
d. Master file

64. The common name for the crime of stealing passwords is:
a. Jacking.
b. Identity theft.
c. Spoofing.
d. Hacking.

65. Collecting personal information and effectively posing as another individual is known as the
crime of:
a. Spooling.
b. Identity theft.
c. Spoofing.
d. Hacking.

66. Malicious software is known as:


a. Badware.
b. Malware.
c. Maliciousware.
d. Illegalware.

67. A program that performs a useful task while simultaneously allowing destructive acts is a:
a. Worm.
b. Trojan horse.
c. Virus.
d. Macro virus.

68. An intentionally disruptive program that spreads from program to program or from disk to
disk is known as a:
a. Trojan horse.
b. Virus.
c. Time bomb.
d. Time-related bomb sequence.

69. What is the name of an application program that gathers user information and sends it to
someone through the Internet?
a. A virus
b. Spybot
c. Logic bomb
d. Security patch

70. _______ is the measurement of things such as fingerprints and retinal scans used for security
access.
a. Biometrics
b. Bio measurement
c. Computer security
d. Smart weapon machinery

71. Hardware or software designed to guard against unauthorized access to a computer network
is known as a(n):
a. Hacker-proof program.
b. Firewall.
c. Hacker-resistant server.
d. Encryption safe wall.

72. The scrambling of code is known as:


a. Encryption.
b. a firewall.
c. Scrambling.
d. Password proofing.

73. .......... are set of rules and procedures to control the data transmission over the Internet
a. IP address
b. Domains
c. Protocol
d. Gateway

74. ............... are system software to facilitate editing of text and data
a. MS Word
b. Editors
c. PowerPoint
d. MS publisher

75. Which of the following is a network topology


a. LAN
b. WAN
c. MAN
d. BUS

76. Note book, laptop, palm, hand-held computers are coming under the category of.........
computer
a. Digital computer
b. Mainframe computer
c. Portable computer
d. Hybrid computer

77. What is the most common tool used to restrict access to a computer system?
a. User logins
b. Passwords
b. Computer keys
d. Access-control software

78. The………….data mining technique derives rules from real-world case examples.
a. Rule discover
b. Signal processing
c. Neural nets
d. Case-based reasoning

79. ............. provides process and memory management services that allow two or more tasks,
jobs, or programs to run simultaneously
a. Multitasking
b. Multithreading
c. Multiprocessing
d. Multicomputing

80. The term ............. designates equipment that might be added to a computer system to
enhance its functionality.
a. digital device
b. system add-on
c. disk pack
d. peripheral device

81. Information is
a) Data
b) Processed data
c) Manipulated input
d) Computer output

82. In order to understand the working of an organization for which a computer based system is
being designed, an analyst must
a) Look at only current work and document flow in the organization
b) Discuss with top level and middle level management only
c) Interview top, middle, line managers and also clerks who will enter data and use the system
d) only clerical and middle level staff who have long experience in the organization and will be
users of the system

83. The main objective of the feasibility study is


a) to assess whether it is possible to meet requirements specification
b) to assess if it is possible to meet the requirements specified subject to constraints of budget,
human resource and hardware
c) to assist the management in implementing the desired system
d) to remove bottlenecks in implementing the desired system

84. System approval criteria are specified


a) When the final specifications are drawn up
b) During feasibility study
c) During the requirements specifications stage
d) During system study stage

85. System test plan is specified


a) when the final specifications are drawn up
b) during feasibility study
c) during the requirements specification stage
d) during the system study stage

86. Data Mining is used to aid in


a) operational management
b) analysing past decisions made by managers
c) detecting patterns in operational data
d) retrieving archival data

87. What is at the heart of any ERP system?


a) Information
b) Employees
c) Customers
d) Database

88. What are the several different types of software, which sit in the middle of and provide
connectivity between two or more software applications?
a) middleware
b) Enterprise application integration middleware
c) Automated business process
d) e-Business infrastructure

89. ________ handling and sharing has become a vital process for efficient and effective working
of any organization
a) Material
b) Resource
c) Information
d) Database

90. _______ is the encompassing term that involves the use of electronic platforms – intranets,
extranets and the Internet – to conduct a company’s business
a) e-Marketing
b) e-Business
c) e-Procurement
d) e-Commerce

91. Select the option that suits the manifesto for Agile Software Development
e. Individuals and Interactions
f. Working software
g. Customer Collaboration
h. Responding to change
i. All of the mentioned

92. Which of the following does not apply to agility to a software process
e. Uses incremental product delivery strategy
f. Only essential work products are produced
g. Eliminate the use of project planning and testing

93. Which of the following is not project management goal?


e. Keeping overall costs within budget
f. Delivering the software to the customer at the agreed time
g. Maintaining a happy and well functioning development team
h. Avoiding customer complaints

94. What describes the data and control to be processed?


e. Planning process
f. Software scope
g. External hardware
h. Project complexity

95. What threatens the quality and timeliness of the software to be produced?
e. Known risks
f. Business risks
g. Project risks
h. Technical risks

96. Which risks are associated with constraints imposed by management or the market
place?
e. Business impact risks
f. Process definition risks
g. Product size risks
h. Development environment risks

97. Which web application attribute is defined by the statement “A large number of users
may access the web app at one time”?
e. Unpredictable load
f. Performance
g. Concurrency
h. Network intensiveness

98. Which web application attribute is defined by the statement “The quality and aesthetic
nature of content remains an important determinant of the quality of a web app”
e. Availability
f. Data driven
g. Content sensitive
h. Continuous evolution

99. Which analysis is a part of Analysis model of the web engineering process framework
e. Content analysis
f. Interaction analysis
g. Functional analysis
h. All of these

100. What category of web based system would you assign to electronic shopping?
e. Transaction oriented
f. Work flow oriented
g. Informational
h. Interactive

101. Which of the type of system is an operational level information system?


a) Decision support system (DSS)
b) Executive Information system (EIS)
c) Transaction processing system (TPS)
d) Management information system (MIS)

102. Which of the following is not a functional information system?


a) Marketing information system
b) Data warehousing system
c) Financial information system
d) Payroll system

103. Information systems that automate the relationship between a firm and its suppliers are
called
a) Relational database management systems
b) Management information systems
c) Product management systems
d) Supply chain management system
e) Executive information system

104. Which of the following is the type of electronic commerce that involves consumers selling
directly to consumers?
a) B2C
b) B2B
c) C2C
d) Virtual storefront
e) Electronic bartering

105. Systems that maintain employee records: track employee skills, job performance and
training; and support planning for employee compensation and career development best
describes
a) Manufacturing and Production information systems
b) Sales and Marketing information systems
c) Finance and Accounting information system
d) Human Resources information systems
e) Economic system

106. Information Technology (IT) infrastructure comprises of


a) Computer Hardware
b) Computer Software
c) Data and Storage technology
d) Networks
e) All of these

107. Activity in which a firm excels as a world class leader is


a) Focused Differentiation
b) Core competency
c) Value chain
d) Product differentiation
e) Value web

108. Making repeated changes to selected variables until a chosen variable reaches a target
value is called as
a) What-if analysis
b) Sensitivity analysis
c) Goal-seeking analysis
d) Optimization analysis
e) Process analysis

109. What level of decision is appropriate for a manufacturing industry, if it involves re-arranging
the work area, altering production schedules, changing inventory methods or expanding
quality control measures?
a) Operational
b) Tactical
c) Strategic
d) Both (a) and (c)
e) All of these

110. A market place that is created by computers and communications technology, that link
many buyers and sellers is defined as
a) Mobile commerce
b) The Internet
c) Digital Markets
d) The World Wide Web
e) Electronic commerce

111. Which of the following is the most common IT project goal?


a) Global expansion
b) Reduce costs/Improve productivity
c) Streamline supply chain
d) Generate growth

112. What is a general name for the business function and academic discipline covering the
application of people, technologies and procedures to solve business problems?
a) IT
b) MIS
c) Technology’s role in business
d) Technology’s impact on business

113. What can IT enable an organization to accomplish?


a) Reduce costs
b) Improve productivity
c) Generate growth
d) All of these

114. Which of the following represents the relationship between functional areas in a business?
a) Independent
b) Autonomous
c) Interdependent
d) Self-sufficient

115. What are the raw facts that describe the characteristics of an event?
a) Information
b) IT
c) Data
d) All of these

116. What refers to the applications and technologies that are used to gather, provide access to
and analyze data and information to support decision-making efforts?
a) Data
b) IT
c) Business Intelligence
d) IT Resources

117. Why do students need to study IT?


a) IT is everywhere in business
b) IT is rarely discussed in business magazines
c) IT is rarely used in organizations
d) IT is found in only a few businesses

118. Which of the following represents the order of priority for the three primary organizational
key resources?
a) Information, People, IT
b) People, Information, IT
c) Information, IT, People
d) IT, People, Information

119. Which of the following statements is true?


a) IT equals business success
b) IT equals business innovation
c) IT represents business success and innovation
d) IT enables business success and innovation

120. What is data that has been converted into meaningful and useful context?
a) Information
b) IT
c) Information systems
d) All of these

121. Select the option that suits the manifesto for Agile Software Development
j. Individuals and Interactions
k. Working Software
l. Customer Collaboration
m. Responding to Change
n. All of the mentioned

122. Agile software development is based on


e. Incremental development
f. Iterative development
g. Linear development
h. Waterfall model
i. Both a and b

123. What describes the data and control to be processed?


i. Planning process
j. Software scope
k. External hardware
l. Project complexity

124 Which of the following term is best defined by the statement “The degree of uncertainty
that the product will meet its requirements and be fit for its intended use”?
e. Performance risk
f. Cost risk
g. Support risk
h. Schedule risk

125 Which analysis is a part of Analysis model of the Web Engineering process framework?
i. Content analysis
j. Interaction analysis
k. Functional analysis
l. All of these

126 Printek India wants to implement a LAN in an environment with many different voltage
devices. Which transmission medium, according to you, should they choose?
e. Twisted pair cable
f. Fiber optic cable
g. Coaxial cable
h. Either b or c

127 In a network with 50 computers, which one of the following topologies would require the
least cabling?
e. Mesh topology
f. Star topology
g. Bus topology
h. Ring topology

128 Jatin works as a Database Administrator for Bluewell Inc. The company has a SQL Server
database. A table in the database has a candidate key and an attribute that is not a
constituent of the candidate key. The non-key attribute depends upon the whole of the
candidate key rather than just a part of it. Which of the following normal forms is
represented in the scenario?
a. 4NF
b. 2NF
c. 1NF
d. 3NF

129 You have a table Product (ProductID, ProductCategory).


Which database term is used to describe the relationship between ProductID and
Product Category?
a. Cohort
b. Deterministic
c. Functionally Dependent
d. Compositional

130 Which key uniquely identifies a row in a table?


a. Foreign
b. Primary
c. Local
d. Superkey

131 Select the option that suits the manifesto for Agile Software Development
o. Individuals and Interactions
p. Working software
q. Customer Collaboration
r. Responding to change
s. All of the mentioned

132 Agile software development is based on


j. Incremental development
k. Iterative development
l. Linear development
m. Waterfall model
n. Both a and b

133 How many phases are there in Scrum


e. Two
f. Three
g. Four
h. Scrum is an agile method which means it does not have phases

144 Which of the following does not apply to agility to a software process
h. Uses incremental product delivery strategy
i. Only essential work products are produced
j. Eliminate the use of project planning and testing

145 Agile methods seem to work best when team members have a relatively high skill level
a. True
b. False

146 What are the types of requirements?


e. Availability
f. Reliability
g. Usability
h. Flexibility
i. All of the mentioned
147 Consider a system where a heat sensor detects an intrusion and alerts the security
company. What kind of a requirement the system is providing?
e. Functional
f. Non-functional
g. Known requirement

148 Which of the following is not project management goal?


i. Keeping overall costs within budget
j. Delivering the software to the customer at the agreed time
k. Maintaining a happy and well functioning development team
l. Avoiding customer complaints

149. Which of the following is not considered as a risk in project management?


e. Specification details
f. Product competition
g. Testing
h. Staff turnover

150 What describes the data and control to be processed?


m. Planning process
n. Software scope
o. External hardware
p. Project complexity

151 Which of the following term is best defined by the statement “the degree of uncertainty
that the product will meet its requirements and be fit for its intended use”?
i. Performance risk
j. Cost risk
k. Support risk
l. Schedule risk

152. Which of the following is a people-intensive activity


e. Problem solving
f. Organization
g. Motivation
h. Project management

153 What threatens the quality and timeliness of the software to be produced?
i. Known risks
j. Business risks
k. Project risks
l. Technical risks

154 What threatens the viability of the software to be built?


e. Known risks
f. Business risks
g. Project risks
h. Technical risks

155. Which risks are associated with constraints imposed by management or the market
place?
i. Business impact risks
j. Process definition risks
k. Product size risks
l. Development environment risks

156. Which web application attribute is defined by the statement “A large number of users
may access the web app at one time?
i. Unpredictable load
j. Performance
k. Concurrency
l. Network intensiveness

157. Which web application attribute is defined by the statement “The quality and aesthetic
nature of content remains an important determinant of the quality of a web app
i. Availability
j. Data driven
k. Content sensitive
l. Continuous evolution

158 Which analysis is a part of Analysis model of the web engineering process framework
m. Content analysis
n. Interaction analysis
o. Functional analysis
p. All of these

159 What category of web based system would you assign to electronic shopping?
w. Transaction oriented
x. Work flow oriented
y. Informational
z. Interactive

160 What category of web-based system would you assign to discussion groups?
e. Collaborative work
f. Online Communities
g. Web Portals
h. Work flow oriented

161. In simplex mode of transmission


e. Data transmission is one way
f. Data can be transmitted to small distances only
g. Data format is simple
h. None of the above

162. A digital channel implies that the channel


e. Is digitized
f. Is carrying digital data
g. Adopts digital modulation techniques
h. Is without carrier

163. The ground wave eventually disappears as one moves away from the transmitter
because of
e. Interference from the sky above
f. Loss of line-of-sight condition
g. Attenuation of energy by the ground
h. Maximum single hop distance limitation

164 Sharing of transmission medium and its bandwidth is known as


e. Encoding
f. Multiplexing
g. Modulation
h. Line discipline

165. In order to transfer messages in a computer network, we use the technique called
e. Circuit switching
f. Message switching
g. Packet switching
h. None of these

166. Project 802.2 defines standards for which layers of the OSI model?
e. Application and Presentation layers
f. Data Link layers
g. Network and Data Link layers
h. Transport and Network layers

167. The Media Access Control sublayer resides in which OSI layer?
e. Transport
f. Physical
g. Network
h. Data Link

168. In which layer of the OSI model do Bridges function?


e. Physical
f. Data link
g. Network
h. Both a and c

169. A repeater takes weak and corrupt signal and


e. Amplifies it
f. Regenerates it
g. Re-samples it
h. None of these

170. Which of the following is not an internetworking device?


e. Bridge
f. Amplifier
g. Gateway
h. None of these

171. A packet travelling from a token ring network to another token ring network uses
e. Simple bridge
f. Repeater
g. Router
h. None of these
172. Computers in a computer network are connected via:
e. Bounded media only
f. Unbounded media
g. Either a or b or both
h. None of these

173. Which of the following is a Network layer protocol?


e. IP
f. Telnet
g. FTP
h. None of these

174. Printek India wants to implement a LAN in an environment with many different voltage
devices. Which transmission medium, according to you, should they choose?
i. Twisted pair cable
j. Fiber optic cable
k. Coaxial cable
l. Either b or c

175. ATM is an acronym for


e. Asynchronous transfer mode
f. Automatic telecommunication method
g. Asynchronous transmission mode
h. None of these

176. Radio waves are


e. Omni directional
f. Bidirectional
g. Non-directional
h. None of these

177. The information to be communicated in a communication system is


e. Medium
f. Protocol
g. Message
h. None of these

178. Which out of the following topologies is the most reliable?


e. Star
f. Ring
g. Bus
h. None of these

179. In a network with 25 computers, which one of the following topologies would require the
least cabling?
i. Mesh topology
j. Star topology
k. Bus topology
l. Ring topology

180. Indicate the true statement:


Modulation is used to
e. Reduce the bandwidth
f. Separate differing transmission
g. Insure that intelligence signal may be transmitted over long distances
h. Allow the use of practicable antennas

Answers:

1d 2d 3b 4c 5c 6d 7a 8d 9c 10 b

11 a 12 d 13 d 14 b 15 a 16 c 17 c 18 d 19 c 20 b

21 a 22 b 23 c 24 b 25 c 26 b 27 d 28 d 29 b 30 b

31 32 c 33 a 34 b 35 a 36 a 37 c 38 b 39 d 40 c

41.b 42. d 43. d 44. c 45. a 46. d 47. b 48. a 49. a 50. c

51. a 52. c 53. d 54. c 55. d 56. b 57. b 58. b 59. c 60. a
61. a 62. a 63. d 64. c 65. b 66. b 67. b 68. b 69. b 70. a

71. b 72. a 73. c 74. b 75. d 76. c 77. b 78. c 79. a 80. d

You might also like