A computer security protocol for logging in would be an example of the component of an information system:
1.software
2.hardware
3.Data
4.procedure
A database is a complex _____
1.Data structure
2.Memory
3.Both
4.None
A human order taker can be bypassed when using _____
1.Office automation system
2.Management information system
3.Transaction processing system
4.Decision support system
A network computer that shares resources with and responds to requests from other computer is known as
1.client
2.server,
3.terminal
4.key
A network geometric arrangement in which a sIngle connecting lirie is shared by a number of nodes is called
1.Car Topology
2.Bus Topology
3.Truck Topology
4.None of these
A ______ is a data communication system within a building plant, or campus or between nearby buildings.
1.MAN
2.LAN
3.WAN
4.none at the above
A ________ view of data expresses the way a user thinks about data
1.Logical view
2.Physical view
3.Both
4.None
Accounting, finance, marketing, and human resources are known as
1.Executive information systems
2.Functional business areas
3.Geographic information system
4.Local information system
An Enterprise Resource Planning application is an example of a (n) ______
1.single-user database application
2.multiuser database application
3.e-commerce database application
4.data mining database application
Any electronic device on a network is called a:
1.Node
2.Hub
3.Router
4.Cable.
Architecture of the database can be viewed as
1.two levels.
2.four levels.
3.three levels.
4.one level.
CASE Tool is
1.Computer Aided Software Engineering
2.Component Aided Software Engineering
3.Constructive Aided Software Engineering
4.Computer Analysis Software Engineering
CASE tools are
1.A Set of rules to be used during system analysis and design
2.Program, packages used during system analysis and design
3.A set of tools used by analysts
4.Needed for use case development.
Cybernetic system is the one which is _______
1.Self Monitoring.
2.Self controlling.
3.Self regulating.
4.all of the above.
DDL stands for:
1.Decode data languages
2.Data definition languages
3.Database define languages
4.Define data languages
During software development which factor is most crucial?
1.People
2.Process
3.Product
4.Project
EDI stands for:
1.Electronic data interchanqe
2.Electrical data interchange
3.work flow automation software
4.Enhanced data interchange
End- to-end connectivity is provided from host-to-host in
1.Network layer
2.Session Layer
3.Data link layer
4.Transport layer
Every record in the same size in bytes, the file is constituted of ________
1.Record
2.Record blocking
3.Fixed-length record
4.Variable-length record
Identifying customers and markets using data on demographics, markets, consumer behaviour, and trends is an example of:
1.Operational-level sales and marketing information system.
2.Knowledge-level sales and marketing information system.
3.Management-Level sales and marketing information system.
4.Strategic-level sales and marketing information system
In a __________ connection, three or more devices share a link.
1.Multipoint
2.Point-to-point.
3.Multipoint & point-to-point
4.None of the above
In the relational modes, cardinality is termed as:
1.Number of tuples.
2.Number of attributes.
3.Number of tables.
4.Number of constraints
In the system concepts, the term integration?
1.implies structure and order
2.refers to the manner in which each component functions with other components of the system
3.means that parts of computer system depends on one another
4.refers to the holism of systems
Information systems can facilitate supply chain management by:
1.Tracking the status of orders.
2.Rapidly communicating orders,
3.Providing product specifications.
4.none all of the above.
Lower CASE tools are used for
1.develop graphical user interface
2.for converting decision tables to source programs
3.for generating test cases
4.for developing use cases
MIS stands for ________
1.Management internet system.
2.Marketing Internet system.
3.Marketing and implementation software.
4.Management information system.
RAD stands for:
1.Rotate application development
2.Register application development
3.Related application development
4.Rapid application development
System development is a
1.Process of successive changes of system from new and changed requirement
2.It is a development of SRS of a system
3.Both (a) and (b)
4.None of the above
System Development process is also called as ____
1.System Development Life Cycle
2.System Life Cycle
3.Both A and B
4.System Process Cycle
The data types describing the type of values that can appear in each column is called ___
1.Relations
2.Domain
3.Queries
4.all of above
The DBMS acts as an interface between what two components of an enterprise-class database system?
1.Database application and the database
2.Data and the database
3.The user and the database application
4.Database application and SQL
The following are functions of a DBMS except _______
1.creating and processing forms
2.creating databases
3.processing data
4.administrating databases
The raw facts and figures are:
1.Data
2.Information
3.Snapshot
4.reports.
The tools that support different stages of software development life cycle are called:
1.CASE Tools
2.CAME tools
3.CAQE tools
4.CARE tools
Upper CASE tools are used
1.for developing DFD's
2.for screen design
3.during all phases of system analysis and design life cycle
4.for converting structured English procedures to source code into a language such as C
What is Software?
1.Set of computer programs, procedures and possibly associated document concerned with the operation of data processing.
2.A set of compiler instructions
3.A mathematical formula
4.None of Above
What is the benefit of the Networking?
1.File sharing
2.Easier Resources
3.Easier
4.All of the above
What type of computer is specially designed and/or used for tasks that require extremely rapid and complex calculations?
1.PC
2.supercomputer
3.midrange computer
4.mainframe
Which are the types of data independence:
1.Physical
2.Logical
3.Both
4.None of these
Which device is NOT considered an input device?
1.sensor
2.touch screen
3.keyboard
4.Printer
Which is not a software development life cycle model?
1.Spiral Model
2.Waterfall Model
3.Prototyping Model
4.Capability maturity Model
Which is not the feature of database:
1.Data redundancy
2.Independence
3.Flexibility
4.Data Integrity
Which is the most popular database model:
1.Network Model
2.Relational Model
3.Hierarchical Model
4.Object Oriented
Which of the following device copies electrical signals from one Ethernet to another?
1.Bridge
2.Repeater
3.Hub
4.Passive hub
Which of the following individuals typically have less formal, advanced educational degrees and tend to process rather than create information?
1.Knowledge workers
2.Executives
3.System analysts
4.Data workers
Which of the following Information category is used by middle management?
1.Organisational
2.Functional managerial knowledge
3.Decision support
4.Operational
Which topologies requires central controller or hub
1.Mesh
2.Star
3.Bus
4.Ring.
_____ is the attribute or group of attributes that uniquely identify occurrence of each entity.
1.Foreign key
2.Super Key
3.Primary Key
4.All of these
________ is the process of defining the current problem, determining why a new system is needed, identifying the objectives of the proposed system:
1.Feasibility analysis
2.System Analysis
3.System definition
4.System requirements,
_________ focuses on researching how the human brain does work and, how human beings imagine.
1.Cognitive science
2.Robotics
3.Natural interfaces
4.Artificial Intelligence