Computer Applications in Management
Computer Applications in Management
Computer Applications in Management
1. Select the option that suits the manifesto for Agile Software Development
a. Individuals and Interactions
b. Working software and Responding to change
c. Customer Collaboration
d. All of these
5. Process is
a. program in High-level language kept on disk
b. contents of main memory
c. a program in execution
d. a job in secondary memory
11. Which of the following term is best defined by the statement “the degree of uncertainty
that the product will meet its requirements and be fit for its intended use”?
a. Performance risk
b. Cost risk
c. Support risk
d. Schedule risk
15. Which risks are associated with constraints imposed by management or the market
place?
a. Business impact risks
b. Process definition risks
c. Product size risks
d. Development environment risks
16. Which web application attribute is defined by the statement “A large number of users
may access the web app at one time?
a. Unpredictable load
b. Performance
c. Concurrency
d. Network intensiveness
17. Which web application attribute is defined by the statement “The quality and aesthetic
nature of content remains an important determinant of the quality of a web app
a. Availability
b. Data driven
c. Content sensitive
d. Continuous evolution
18. Which analysis is a part of Analysis model of the web engineering process framework
a. Content analysis
b. Interaction analysis
c. Functional analysis
d. All of these
19. What category of web based system would you assign to electronic shopping?
a. Transaction oriented
b. Work flow oriented
c. Informational
d. Interactive
20. What category of web-based system would you assign to discussion groups?
a. Collaborative work
b. Online Communities
c. Web Portals
d. Work flow oriented
23. The ground wave eventually disappears as one moves away from the transmitter
because of
a. Interference from the sky above
b. Loss of line-of-sight condition
c. Attenuation of energy by the ground
d. Maximum single hop distance limitation
25. In order to transfer messages in a computer network, we use the technique called
a. Circuit switching
b. Message switching
c. Packet switching
d. None of these
26. Project 802.2 defines standards for which layers of the OSI model?
a. Application and Presentation layers
b. Data Link layers
c. Network and Data Link layers
d. Transport and Network layers
27. The Media Access Control sublayer resides in which OSI layer?
a. Transport
b. Physical
c. Network
d. Data Link
31. A packet travelling from a token ring network to another token ring network uses
a. Simple bridge
b. Repeater
c. Router
d. None of these
34. Printek India wants to implement a LAN in an environment with many different voltage
devices. Which transmission medium, according to you, should they choose?
a. Twisted pair cable
b. Fiber optic cable
c. Coaxial cable
d. Either b or c
39. In a network with 25 computers, which one of the following topologies would require the
least cabling?
a. Mesh topology
b. Star topology
c. Bus topology
d. Ring topology
43. Viruses
a. Another form of computer attack is virus
b. Viruses are designed to spread into other programs and can wreak havoc in a system
c. Causing system crashes and program malfunctioning
d. All of these
45. Developing software ________ means a major commitment of time, money and resources.
a. In-house
b. In-sync
c. On-date
d. On-duration
53. Office LANS, which are scattered geographically on large scale, can be connected by the use
of corporate
a. CAN
b. LAN
c. DAN
d. WAN
54. What do you call the programs that are used to find out possible faults and their causes?
a. operating system extensions
b. cookies
c. diagnostic software
d. boot diskettes
55. MIS is designed to provide information needed for effective decision making by?
a. Consumers
b. Workers
c. Foremen
d. Managers
56. Personal computers use a number of chips mounted on a main circuit board. What is the
common name for such boards?
a. Daughter board
b. Motherboard
c. Father board
d. Bread board
57. A fault in a computer program which prevents it from working correctly is known as
a. Boot
b. Bug
c. Biff
d. Strap
58. Servers are computers that provide resources to other computers connected to a:
a. network
b. mainframe
c. supercomputer
d. client
59. The ability to recover and read deleted or damaged files from a criminal's computer is an
example of a law enforcement speciality called:
a. robotics
b. simulation
c. computer forensics
d. animation
60. Where does most data go first with in a computer memory hierarchy?
a. RAM
b. ROM
c. BIOS
d. CACHE
62. The process of transferring files from a computer on the Internet to your computer is called
a. Downloading
b. uploading
c. FTP
d. JPEG
63. Which of the following contains permanent data and gets updated during the processing of
transactions?
a. Operating System File
b. Transaction file
c. Software File
d. Master file
64. The common name for the crime of stealing passwords is:
a. Jacking.
b. Identity theft.
c. Spoofing.
d. Hacking.
65. Collecting personal information and effectively posing as another individual is known as the
crime of:
a. Spooling.
b. Identity theft.
c. Spoofing.
d. Hacking.
67. A program that performs a useful task while simultaneously allowing destructive acts is a:
a. Worm.
b. Trojan horse.
c. Virus.
d. Macro virus.
68. An intentionally disruptive program that spreads from program to program or from disk to
disk is known as a:
a. Trojan horse.
b. Virus.
c. Time bomb.
d. Time-related bomb sequence.
69. What is the name of an application program that gathers user information and sends it to
someone through the Internet?
a. A virus
b. Spybot
c. Logic bomb
d. Security patch
70. _______ is the measurement of things such as fingerprints and retinal scans used for security
access.
a. Biometrics
b. Bio measurement
c. Computer security
d. Smart weapon machinery
71. Hardware or software designed to guard against unauthorized access to a computer network
is known as a(n):
a. Hacker-proof program.
b. Firewall.
c. Hacker-resistant server.
d. Encryption safe wall.
73. .......... are set of rules and procedures to control the data transmission over the Internet
a. IP address
b. Domains
c. Protocol
d. Gateway
74. ............... are system software to facilitate editing of text and data
a. MS Word
b. Editors
c. PowerPoint
d. MS publisher
76. Note book, laptop, palm, hand-held computers are coming under the category of.........
computer
a. Digital computer
b. Mainframe computer
c. Portable computer
d. Hybrid computer
77. What is the most common tool used to restrict access to a computer system?
a. User logins
b. Passwords
b. Computer keys
d. Access-control software
78. The………….data mining technique derives rules from real-world case examples.
a. Rule discover
b. Signal processing
c. Neural nets
d. Case-based reasoning
79. ............. provides process and memory management services that allow two or more tasks,
jobs, or programs to run simultaneously
a. Multitasking
b. Multithreading
c. Multiprocessing
d. Multicomputing
80. The term ............. designates equipment that might be added to a computer system to
enhance its functionality.
a. digital device
b. system add-on
c. disk pack
d. peripheral device
81. Information is
a) Data
b) Processed data
c) Manipulated input
d) Computer output
82. In order to understand the working of an organization for which a computer based system is
being designed, an analyst must
a) Look at only current work and document flow in the organization
b) Discuss with top level and middle level management only
c) Interview top, middle, line managers and also clerks who will enter data and use the system
d) only clerical and middle level staff who have long experience in the organization and will be
users of the system
88. What are the several different types of software, which sit in the middle of and provide
connectivity between two or more software applications?
a) middleware
b) Enterprise application integration middleware
c) Automated business process
d) e-Business infrastructure
89. ________ handling and sharing has become a vital process for efficient and effective working
of any organization
a) Material
b) Resource
c) Information
d) Database
90. _______ is the encompassing term that involves the use of electronic platforms – intranets,
extranets and the Internet – to conduct a company’s business
a) e-Marketing
b) e-Business
c) e-Procurement
d) e-Commerce
91. Select the option that suits the manifesto for Agile Software Development
e. Individuals and Interactions
f. Working software
g. Customer Collaboration
h. Responding to change
i. All of the mentioned
92. Which of the following does not apply to agility to a software process
e. Uses incremental product delivery strategy
f. Only essential work products are produced
g. Eliminate the use of project planning and testing
95. What threatens the quality and timeliness of the software to be produced?
e. Known risks
f. Business risks
g. Project risks
h. Technical risks
96. Which risks are associated with constraints imposed by management or the market
place?
e. Business impact risks
f. Process definition risks
g. Product size risks
h. Development environment risks
97. Which web application attribute is defined by the statement “A large number of users
may access the web app at one time”?
e. Unpredictable load
f. Performance
g. Concurrency
h. Network intensiveness
98. Which web application attribute is defined by the statement “The quality and aesthetic
nature of content remains an important determinant of the quality of a web app”
e. Availability
f. Data driven
g. Content sensitive
h. Continuous evolution
99. Which analysis is a part of Analysis model of the web engineering process framework
e. Content analysis
f. Interaction analysis
g. Functional analysis
h. All of these
100. What category of web based system would you assign to electronic shopping?
e. Transaction oriented
f. Work flow oriented
g. Informational
h. Interactive
103. Information systems that automate the relationship between a firm and its suppliers are
called
a) Relational database management systems
b) Management information systems
c) Product management systems
d) Supply chain management system
e) Executive information system
104. Which of the following is the type of electronic commerce that involves consumers selling
directly to consumers?
a) B2C
b) B2B
c) C2C
d) Virtual storefront
e) Electronic bartering
105. Systems that maintain employee records: track employee skills, job performance and
training; and support planning for employee compensation and career development best
describes
a) Manufacturing and Production information systems
b) Sales and Marketing information systems
c) Finance and Accounting information system
d) Human Resources information systems
e) Economic system
108. Making repeated changes to selected variables until a chosen variable reaches a target
value is called as
a) What-if analysis
b) Sensitivity analysis
c) Goal-seeking analysis
d) Optimization analysis
e) Process analysis
109. What level of decision is appropriate for a manufacturing industry, if it involves re-arranging
the work area, altering production schedules, changing inventory methods or expanding
quality control measures?
a) Operational
b) Tactical
c) Strategic
d) Both (a) and (c)
e) All of these
110. A market place that is created by computers and communications technology, that link
many buyers and sellers is defined as
a) Mobile commerce
b) The Internet
c) Digital Markets
d) The World Wide Web
e) Electronic commerce
112. What is a general name for the business function and academic discipline covering the
application of people, technologies and procedures to solve business problems?
a) IT
b) MIS
c) Technology’s role in business
d) Technology’s impact on business
114. Which of the following represents the relationship between functional areas in a business?
a) Independent
b) Autonomous
c) Interdependent
d) Self-sufficient
115. What are the raw facts that describe the characteristics of an event?
a) Information
b) IT
c) Data
d) All of these
116. What refers to the applications and technologies that are used to gather, provide access to
and analyze data and information to support decision-making efforts?
a) Data
b) IT
c) Business Intelligence
d) IT Resources
118. Which of the following represents the order of priority for the three primary organizational
key resources?
a) Information, People, IT
b) People, Information, IT
c) Information, IT, People
d) IT, People, Information
120. What is data that has been converted into meaningful and useful context?
a) Information
b) IT
c) Information systems
d) All of these
121. Select the option that suits the manifesto for Agile Software Development
j. Individuals and Interactions
k. Working Software
l. Customer Collaboration
m. Responding to Change
n. All of the mentioned
124 Which of the following term is best defined by the statement “The degree of uncertainty
that the product will meet its requirements and be fit for its intended use”?
e. Performance risk
f. Cost risk
g. Support risk
h. Schedule risk
125 Which analysis is a part of Analysis model of the Web Engineering process framework?
i. Content analysis
j. Interaction analysis
k. Functional analysis
l. All of these
126 Printek India wants to implement a LAN in an environment with many different voltage
devices. Which transmission medium, according to you, should they choose?
e. Twisted pair cable
f. Fiber optic cable
g. Coaxial cable
h. Either b or c
127 In a network with 50 computers, which one of the following topologies would require the
least cabling?
e. Mesh topology
f. Star topology
g. Bus topology
h. Ring topology
128 Jatin works as a Database Administrator for Bluewell Inc. The company has a SQL Server
database. A table in the database has a candidate key and an attribute that is not a
constituent of the candidate key. The non-key attribute depends upon the whole of the
candidate key rather than just a part of it. Which of the following normal forms is
represented in the scenario?
a. 4NF
b. 2NF
c. 1NF
d. 3NF
131 Select the option that suits the manifesto for Agile Software Development
o. Individuals and Interactions
p. Working software
q. Customer Collaboration
r. Responding to change
s. All of the mentioned
144 Which of the following does not apply to agility to a software process
h. Uses incremental product delivery strategy
i. Only essential work products are produced
j. Eliminate the use of project planning and testing
145 Agile methods seem to work best when team members have a relatively high skill level
a. True
b. False
151 Which of the following term is best defined by the statement “the degree of uncertainty
that the product will meet its requirements and be fit for its intended use”?
i. Performance risk
j. Cost risk
k. Support risk
l. Schedule risk
153 What threatens the quality and timeliness of the software to be produced?
i. Known risks
j. Business risks
k. Project risks
l. Technical risks
155. Which risks are associated with constraints imposed by management or the market
place?
i. Business impact risks
j. Process definition risks
k. Product size risks
l. Development environment risks
156. Which web application attribute is defined by the statement “A large number of users
may access the web app at one time?
i. Unpredictable load
j. Performance
k. Concurrency
l. Network intensiveness
157. Which web application attribute is defined by the statement “The quality and aesthetic
nature of content remains an important determinant of the quality of a web app
i. Availability
j. Data driven
k. Content sensitive
l. Continuous evolution
158 Which analysis is a part of Analysis model of the web engineering process framework
m. Content analysis
n. Interaction analysis
o. Functional analysis
p. All of these
159 What category of web based system would you assign to electronic shopping?
w. Transaction oriented
x. Work flow oriented
y. Informational
z. Interactive
160 What category of web-based system would you assign to discussion groups?
e. Collaborative work
f. Online Communities
g. Web Portals
h. Work flow oriented
163. The ground wave eventually disappears as one moves away from the transmitter
because of
e. Interference from the sky above
f. Loss of line-of-sight condition
g. Attenuation of energy by the ground
h. Maximum single hop distance limitation
165. In order to transfer messages in a computer network, we use the technique called
e. Circuit switching
f. Message switching
g. Packet switching
h. None of these
166. Project 802.2 defines standards for which layers of the OSI model?
e. Application and Presentation layers
f. Data Link layers
g. Network and Data Link layers
h. Transport and Network layers
167. The Media Access Control sublayer resides in which OSI layer?
e. Transport
f. Physical
g. Network
h. Data Link
171. A packet travelling from a token ring network to another token ring network uses
e. Simple bridge
f. Repeater
g. Router
h. None of these
172. Computers in a computer network are connected via:
e. Bounded media only
f. Unbounded media
g. Either a or b or both
h. None of these
174. Printek India wants to implement a LAN in an environment with many different voltage
devices. Which transmission medium, according to you, should they choose?
i. Twisted pair cable
j. Fiber optic cable
k. Coaxial cable
l. Either b or c
179. In a network with 25 computers, which one of the following topologies would require the
least cabling?
i. Mesh topology
j. Star topology
k. Bus topology
l. Ring topology
Answers:
1d 2d 3b 4c 5c 6d 7a 8d 9c 10 b
11 a 12 d 13 d 14 b 15 a 16 c 17 c 18 d 19 c 20 b
21 a 22 b 23 c 24 b 25 c 26 b 27 d 28 d 29 b 30 b
31 32 c 33 a 34 b 35 a 36 a 37 c 38 b 39 d 40 c
41.b 42. d 43. d 44. c 45. a 46. d 47. b 48. a 49. a 50. c
51. a 52. c 53. d 54. c 55. d 56. b 57. b 58. b 59. c 60. a
61. a 62. a 63. d 64. c 65. b 66. b 67. b 68. b 69. b 70. a
71. b 72. a 73. c 74. b 75. d 76. c 77. b 78. c 79. a 80. d