qpdec2010sem1
TRANSCRIPT
IT for Management
Multiple Choice Questions :
1. A Compiler is ____ a. a combination of computer hardwareb. a program which translates from one high-level
language to anotherc. a program which translates from one high-level to a
machine leveld. None of these
Ans : c
2. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the corresponding bits
a. ANSIb. ASCIIc. EBCDICd. ISO
Ans : a
3. A Pixel is a. A computer program that draws pictureb. A picture stored in secondary memoryc. The smallest resolvable part of a pictured. None of these
Ans : c
4. Which device is used as the standard pointing device in a Graphical User Environment
a. Keyboardb. Mousec. Joystickd. Track ball
Ans : b
5. Which number system is usually followed in a typical 32-bit computer?
a. 2b. 10c. 16d. 32
Ans : a
6. Which of the following is not an output device? a. Scannerb. Printerc. Flat Screend. Plotter
Ans : a
7. Which of the following devices have a limitation that we can only information to it but cannot erase or modify it
a. Floppy Diskb. Hard Diskc. Tape Drived. CDROM
Ans : d
8. Which technology is used in Compact disks? a. Mechanicalb. Electricalc. Electro Magneticd. Laser
Ans : d
9. Which of the following storage devices can store maximum amount of data?
a. Floppy Diskb. Hard Diskc. Compact Diskd. Magneto Optic Disk
Ans : b
10. Which of the following is the largest manufacturer of Hard Disk Drives?
a. IBMb. Seagatec. Microsoftd. 3M
Ans : b
11. The memory location address are limited to a. 00000 to 9ffff(16)b. 00001 to 9ffff(16)c. 00010 to 9ffff(16)d. 10000 to 9ffff(16)
Ans : a
12. The programs which are as permanent as hardware and stored in ROM is known as
a. Hardwareb. Softwarec. Firmwared. ROMware
Ans : c
13. Memory is made up of
a. Set of wiresb. Set of circuitsc. Large number of cellsd. All of these
Ans : c
14. Primary memory stores a. Data aloneb. Programs alonec. Results aloned. All of these
Ans : d
15. EPROM can be used for a. Erasing the contents of ROMb. Reconstructing the contents of ROMc. Erasing and reconstructing the contents of ROMd. Duplicating ROM
Ans : c
16. Which device can understand difference between data & programs?
a. Input deviceb. Output devicec. Memoryd. Microprocessor
Ans : d
17. The contents of information are stored in a. Memory data registerb. Memory address registerc. Memory access registerd. Memory arithmetic register
Ans : a
18. Memory unit is one part of a. Input deviceb. Control unitc. Output deviced. Central Processing Unit
Ans : d
19. Algorithm and Flow chart help us to a. Know the memory capacityb. Identify the base of a number systemc. Direct the output to a printerd. Specify the problem completely and clearly
Ans : d
20. Which of the following is not a valid size of a Floppy Disk?
a. 8"b. 5 1/4"c. 3 1/2"d. 5 1/2"
Ans : d
21. The basic operations performed by a computers are
a. Arithmetic operationb. Logical operationc. Storage and relatived. All the above
Ans : d22. The earliest calculating devices are
a. Abacusb. Clockc. Difference Engined. None of these
Ans : a23. The man who built the first Mechanical Calculator
wasa. Joseph Marie Jacquardb. John Mauchlyc. Blaise Pascald. Harward Ailken
Ans: c24. Punched cards were first introduced by
a. Powersb. Pascalc. Jacquardd. Herman Hollerith
Ans : d25. Computers built before the First Generation of
computers werea. Mechanicalb. Electro-mechanicalc. Electricald. None of these
Ans : b26. Word length of a Personal Computer is ___
a. 4 bitsb. 8 bitsc. 16 bitsd. 64 bits
Ans : a27. Size of the primary memory of a PC ranges
between
a. 2KB to 8KBb. 64KB & 256KBc. 256KB & 640KBd. None of these
Ans : c28. CPU speed of a personal computer is
a. 32 KIPSb. 100 KIPSc. 1 MIPSd. None of these
Ans : b29. Programs are executed on the basis of a priority
number in aa. Batch processing systemb. Multiprogrammingc. Time sharingd. None of these
Ans : b30. Cursor is a ____
a. Pixelb. Thin blinking linec. Pointing deviced. None of these
Ans : b31. In a high resolution mode, the number of dots in a
line will usually bea. 320b. 640c. 760d. 900
Ans : b32. The unit KIPS is used to measure the speed of ___
a. Processorb. Disk drivec. Printerd. Tape drive
Ans : a33. IC are classified on the basis of ___
a. Manufacturing companyb. Type of computerc. Number of transistorsd. None of these
Ans : c34. Computer software includes ____
a. Application programsb. Operating system programsc. Packaged programsd. All of these
Ans : d35. Machine language ___
a. is the language in which programs were first writtenb. is the only language understood by the computerc. differs from one type of computer to anotherd. All of these
Ans : d36. Assembly language
a. uses alphabetic codes in place of binary numbers used in machine language
b. is the easiest language to write programsc. need not be translated into machine languaged. None of these
Ans : a37. A source program is
a. a program written in a machine languageb. a program to be translated into machine languagec. a machine language translation of a program written in
ad. None of these
Ans : b38. If a computer on the network shares resources for
others to use, it is called ____a. Serverb. Clientc. MainframeAnswer : a
39. Terminators are used in ______ topology.a. Busb. StarAnswer : a
40. In _____ topology, if a computer’s network cable is broken, whole network goes down.a. Busb. StarAnswer : a
41. For large networks, _______ topology is used.a. Busb. Starc. RingAnswer : b
42. ISO stands fora. International Standard Organizationb. International Student Organization
c. Integrated Services OrganizationAnswer : a
43. ISO OSI model is used ina. Stand alone PCb. Network environmentAnswer : b
44. Network cable lies on _____ layera. Applicationb. Networkc. Physical
Answer : c
45. ____ layer decides which physical pathway the data should take.a. Applicationb. Networkc. PhysicalAnswer : c
46. ISDN is an example of ______ networka. Circuit switchedb. Packet switchedAnswer : a
47. X.25 is an example of ______ networka. Circuit switchedb. Packet switchedAnswer : b
48. _____________ allows LAN users to share computer programs and data.a. Communication serverb. Print serverc. File serverAnswer : c
49. Print server uses ________ which is a buffer that holds data before it is send to the printer.a. Queueb. Spoolc. NodeAnswer : b
50. A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of____
a. LAN intrinsic softwareb. LAN aware softwarec. Groupwared. LAN ignorant softwareAnswer : a
51. The ______ portion of LAN management software restricts access, records user activities and audit data etc.a. Configuration managementb. Security managementc. Performance managementAnswer : b
52. What is the max cable length of STP?a. 100 ftb. 200 ftc. 100 md. 200 mAnswer : d
53. What is the max data capacity of STP?a. 10 mbpsb. 100 mbpsc. 1000 mbpsd. 10000 mbpsAnswer : b
54. Which connector STP uses?a. BNCb. RJ-11c. RJ-45d. RJ-69Answer : c
55. What is the central device in star topology?a. STP serverb. Hub/switchc. PDCd. RouterAnswer : b
56. What is max data capacity for optical fiber cable?a. 10 mbpsb. 100 mbpsc. 1000 mbpsd. 10000 mbpsAnswer : c
57. Which of the following architecture uses CSMA/CD access method?a. ARCnetb. EthernetAnswer : b
58. Physical security measures to protect computer facilities and resources, such as computers, data centers, software, and networks, are all of the following except:a) Requiring strong passwords.b) Shielding against electromagnetic fields.c) Fire prevention, detection, and extinguishing systems.d) Motion detector alarms that detect physical intrusion.
Ans: a59. Company executives are worried about
proprietary information "walking out the door" on employees' iPods, PDAs, or USB drives. Which of the following would be the most effective and viable solution to protect against this type of data loss/theft?a) Ban the use of those devices altogether.b) Do random spot checks of those devices.c) Run software on machines that tracks and manages what is being passed across to any USB drive.d) Notify all employees via email of the risk of data loss due to those devices.
Ans: c60. __________ is a broad term that refers to the
buying and selling of goods and services; servicing of customers; collaborating with business partners; and conducting electronic transactions within an organization.a) Pure e-commerceb) E-businessc) Online logisticsd) iCommerceAns : b
61. The vast majority of e-commerce volume is of which type?a) B2Bb) e-retailingc) B2Cd) social commerce
Ans: a
62. A company visits the Internal Revenue Service's Web site to learn how to pay its estimated quarterly income taxes. This is an example of:a) G2Gb) G2Bc) G2Cd) E2E
Ans: b
63. What is a satellite-based tracking system that is used to determine the location of a person or physical item?a) GPSb) SMSc) WAPd) WiMax
Ans: a64. What is the wireless broadband technology based
on the IEEE 802.16-2004 standard, designed to provide Internet access across metro areas to fixed users? a) WAPb) Wi-Fic) WiMax d) WLAN
Ans: c65. What is the technology that enables Internet
browsing from wireless devices? a) WAPb) EMSc) WiMax d) WLAN
Ans: a
66. In their effort to streamline Human Resources processes and to better manage employees, companies are developing web applications referred to as _____________.a) asset capital managementb) economic risk managementc) employee relationship managementd) labor relations information systems
Ans: c67. Which of the following statements most
comprehensively defines the supply chain?
a) Supply chains involve the flow of materials from raw materials suppliers and factories to warehousesb) Supply chains involve the flow of materials, information, money, and services from raw materials suppliers, through factories and warehouses, to the end-consumers.c) Supply chains involve the flow of materials and equipment from raw materials suppliers to factories.d) Supply chains involve the flow of materials and services from raw materials suppliers, through factories and warehouses, to the end-consumers.
Ans: b68. Supply chain management (SCM) systems add
value to ERP systems by providing __________ capabilities.a) customer and product supportb) analysis and decision supportc) forecastingd) project management
Ans: b69. The following are components of CRM except:
a) channel managementb) sales and marketingc) partner managementd) production
Ans: d
70. The following are characteristics of ERP software except:a) designed to improve standard business transactions from all of the functional departments.b) utilizes IT tools and quality control methods to track and improve process efficiency and effectiveness.c) provides an integrated framework of all routine activities in the enterprise.d) provides easy interfaces to legacy systems as well as to partners’ systems.
Ans: b71. Which company makes the leading ERP software?
a) Computer Associatesb) Oracle c) PeopleSoftd) SAP
Ans: d
72. What best describes customer relationship management (CRM)?a) CRM is an enterprisewide effort to acquire and retain all customers.b) CRM focuses on building long-term and sustainable customer relationships that add value for both the customer and the company.c) CRM is basically a simple idea: “Treat all customers the same.” d) CRM means being oriented to the needs of the typical customer in the market—the average customer.
Ans: b73. ____________ are interactive computerized systems
that help employees find and connect with colleagues with the expertise required for specific problems---whether they are across the country or across the room---in order to solve specific business problems in seconds.a) Bluetoothb) Expert locating systems c) Global positioning systems d) Knowledge management systems
Ans: b
74. What is the electronic movement of business documents between business partners?a) EDIb) EFTc) VANd) XML
Ans: a75. One of the newest and possibly most
revolutionary solutions to supply chain problems is: a) EDIb) EPCc) RFIDd) RPC
Ans: c76. Discovering knowledge contained in the data
stored in databases is achieved with:a) data miningb) visualizationc) automated decision supportd) enterprise search
Ans: a
77. IT can add value to a company directly by:a) Reducing the workforce while not reducing the production level. b) Widening the geographic market.c) Providing a competitive advantage through improved customer service.d) Reducing competition based on price.
Ans: a
Match the following : COLUMN A COLUMN B
I Gateway-5 1 Network layerII NIC-4 2 Transport LayerIII Router-1 3 Data Link LayerIV IEEE 802.x-3 4 Physical LayerV TCP/UDP-2 5 Works at all layers of
OSI
State True or False
1. The network interface card converts serial data from the computer into parallel data for transmission over the network cable.-False
2. All four types of information services—data, documents, voice, and video—transmit over networks using the TCP protocol.-False
3. To prepare data and documents for transmission over a network, they are converted into digital packets based on the Internet protocol.-True
4. GSM is an internationally-accepted standard for digital cellular communication and the most popular standard for mobile phones in the world.-True
5. With VoIP, voice and data transmissions are sent over telephone wires as packets, which is more expensive than equivalent service from traditional telecommunications companies.-False
6. Wi-Fi networks usually consist of a router, which transmits the signal, and one or more adapters, which receive the signal and are usually attached to computers.-True
7. WiMax enables wireless broadband access as an alternative to cable and DSL.-True
8. Trojans horses are referred to as backdoors because they give an attacker illegal access to a network or account through a network port.-True
9. The final participants in B2B transactions are consumers.-False
10. Major limitations of mobile computing are small screens on mobile devices, limited bandwidth, high cost, unproven security, and possible health hazards.-True
11. Bluetooth is a wireless standard designed for temporary, short-range data and voice connections among mobile devices. –True
12. Insufficient telecommunications bandwidth is no longer a limitation of e-commerce.-False
13. The Internet introduced the concept of interactive marketing, which has enabled marketers and advertisers to interact directly with customers.- True
14. When the flow of work and information between departments does not work well, it results in delays, poor customer service, or higher costs.-True
15. Web-based human resource systems are extremely useful for recruiting and training.-True
16. Knowledge management (KM) is computer-based decision analysis usually done online by managers and staff. It includes forecasting, analyzing alternatives, and evaluating risk and performance.-False
17. An economic impact of EC is the trade-off between the number of customers a company can reach and the amount of interactions and information services it can provide to them, which is referred to as richness.-True
Fill in the blanks1. A type of network that is used to distribute frequently needed
employee handbooks, government forms, policies, and other materials to employees over the company’s internal network is referred to as a(n) ______________
Ans: Intranet2. A _________ is a type of local area network (LAN) that uses
high-frequency radio waves rather than wires to communicate between computers or devices such as printers, which are referred to as nodes on the network.
Ans: WLAN (wireless local area network)
3. __________ is the term often used to describe someone who gains unauthorized access to a computer system.
Ans: Hacker
4. Viruses, worms, and Trojan horses are types of malicious code, which is also called _________.
Ans: malware5. A(n) _________ scans for unusual or suspicious traffic, which is
used to identify the start of a DoS attack by the traffic pattern, alerting the network administrator to take defensive action, such as switching to another IP addresses and diverting critical servers from the path of the attack.
Ans: intrusion detection system6. _________ controls are automated methods of verifying the
identity of a person, based on a physiological or behavioral characteristic, such as a fingerprint or keystroke dynamics.
Ans: Biometric7. A(n) ___________ is a technology that checks Internet packets
sent to and from a network and enforces access-control policies between networks.
Ans: firewall8. One way for a business to implement ERP is to lease ERP
systems from a(n) ____________.
Ans: application service provider (ASP)9. Historically, MIS has focused on capturing, storing, managing,
and reporting _________ knowledge, which deals with objective, rational, and technical knowledge.
Ans: Explicit10. The most popular software tool adopted as an easy-to-
use and powerful DSS tool for data manipulation is Microsoft ________________.
Ans: Excel
11. _________ is the practice of indiscriminately broadcasting unsolicited messages via e-mail and over the Internet; and one of the most widespread forms of digital noise.
Ans: Spamming12. The power of Intel chips is measured in MIPS, which
stands for _________ .
Ans: millions of instructions per second