qpdec2010sem1

18
IT for Management Multiple Choice Questions : 1. A Compiler is ____ a. a combination of computer hardware b. a program which translates from one high-level language to another c. a program which translates from one high-level to a machine level d. None of these Ans : c 2. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the corresponding bits a. ANSI b. ASCII c. EBCDIC d. ISO Ans : a 3. A Pixel is a. A computer program that draws picture b. A picture stored in secondary memory c. The smallest resolvable part of a picture d. None of these Ans : c 4. Which device is used as the standard pointing device in a Graphical User Environment a. Keyboard b. Mouse c. Joystick d. Track ball Ans : b 5. Which number system is usually followed in a typical 32-bit computer? a. 2 b. 10 c. 16 d. 32

Upload: vishal-kanojiya

Post on 21-Apr-2015

356 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: QPDEC2010Sem1

IT for Management

Multiple Choice Questions :

1. A Compiler is ____ a. a combination of computer hardwareb. a program which translates from one high-level

language to anotherc. a program which translates from one high-level to a

machine leveld. None of these

Ans : c

2. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the corresponding bits

a. ANSIb. ASCIIc. EBCDICd. ISO

Ans : a

3. A Pixel is a. A computer program that draws pictureb. A picture stored in secondary memoryc. The smallest resolvable part of a pictured. None of these

Ans : c

4. Which device is used as the standard pointing device in a Graphical User Environment

a. Keyboardb. Mousec. Joystickd. Track ball

Ans : b

5. Which number system is usually followed in a typical 32-bit computer?

a. 2b. 10c. 16d. 32

Ans : a

6. Which of the following is not an output device? a. Scannerb. Printerc. Flat Screend. Plotter

Page 2: QPDEC2010Sem1

Ans : a

7. Which of the following devices have a limitation that we can only information to it but cannot erase or modify it

a. Floppy Diskb. Hard Diskc. Tape Drived. CDROM

Ans : d

8. Which technology is used in Compact disks? a. Mechanicalb. Electricalc. Electro Magneticd. Laser

Ans : d

9. Which of the following storage devices can store maximum amount of data?

a. Floppy Diskb. Hard Diskc. Compact Diskd. Magneto Optic Disk

Ans : b

10. Which of the following is the largest manufacturer of Hard Disk Drives?

a. IBMb. Seagatec. Microsoftd. 3M

Ans : b

11. The memory location address are limited to a. 00000 to 9ffff(16)b. 00001 to 9ffff(16)c. 00010 to 9ffff(16)d. 10000 to 9ffff(16)

Ans : a

12. The programs which are as permanent as hardware and stored in ROM is known as

a. Hardwareb. Softwarec. Firmwared. ROMware

Ans : c

13. Memory is made up of

Page 3: QPDEC2010Sem1

a. Set of wiresb. Set of circuitsc. Large number of cellsd. All of these

Ans : c

14. Primary memory stores a. Data aloneb. Programs alonec. Results aloned. All of these

Ans : d

15. EPROM can be used for a. Erasing the contents of ROMb. Reconstructing the contents of ROMc. Erasing and reconstructing the contents of ROMd. Duplicating ROM

Ans : c

16. Which device can understand difference between data & programs?

a. Input deviceb. Output devicec. Memoryd. Microprocessor

Ans : d

17. The contents of information are stored in a. Memory data registerb. Memory address registerc. Memory access registerd. Memory arithmetic register

Ans : a

18. Memory unit is one part of a. Input deviceb. Control unitc. Output deviced. Central Processing Unit

Ans : d

19. Algorithm and Flow chart help us to a. Know the memory capacityb. Identify the base of a number systemc. Direct the output to a printerd. Specify the problem completely and clearly

Ans : d

Page 4: QPDEC2010Sem1

20. Which of the following is not a valid size of a Floppy Disk?

a. 8"b. 5 1/4"c. 3 1/2"d. 5 1/2"

Ans : d

21. The basic operations performed by a computers are

a. Arithmetic operationb. Logical operationc. Storage and relatived. All the above

Ans : d22. The earliest calculating devices are

a. Abacusb. Clockc. Difference Engined. None of these

Ans : a23. The man who built the first Mechanical Calculator

wasa. Joseph Marie Jacquardb. John Mauchlyc. Blaise Pascald. Harward Ailken

Ans: c24. Punched cards were first introduced by

a. Powersb. Pascalc. Jacquardd. Herman Hollerith

Ans : d25. Computers built before the First Generation of

computers werea. Mechanicalb. Electro-mechanicalc. Electricald. None of these

Ans : b26. Word length of a Personal Computer is ___

a. 4 bitsb. 8 bitsc. 16 bitsd. 64 bits

Ans : a27. Size of the primary memory of a PC ranges

between

Page 5: QPDEC2010Sem1

a. 2KB to 8KBb. 64KB & 256KBc. 256KB & 640KBd. None of these

Ans : c28. CPU speed of a personal computer is

a. 32 KIPSb. 100 KIPSc. 1 MIPSd. None of these

Ans : b29. Programs are executed on the basis of a priority

number in aa. Batch processing systemb. Multiprogrammingc. Time sharingd. None of these

Ans : b30. Cursor is a ____

a.  Pixelb. Thin blinking linec. Pointing deviced. None of these

Ans : b31. In a high resolution mode, the number of dots in a

line will usually bea. 320b. 640c. 760d. 900

Ans : b32. The unit KIPS is used to measure the speed of ___

a. Processorb. Disk drivec. Printerd. Tape drive

Ans : a33. IC are classified on the basis of ___

a. Manufacturing companyb. Type of computerc. Number of transistorsd. None of these

Ans : c34. Computer software includes ____

a. Application programsb. Operating system programsc. Packaged programsd. All of these

Page 6: QPDEC2010Sem1

Ans : d35. Machine language ___

a. is the language in which programs were first writtenb. is the only language understood by the computerc. differs from one type of computer to anotherd. All of these

Ans : d36. Assembly language

a. uses alphabetic codes in place of binary numbers used in machine language

b. is the easiest language to write programsc. need not be translated into machine languaged. None of these

Ans : a37. A source program is

a. a program written in a machine languageb. a program to be translated into machine languagec. a machine language translation of a program written in

ad. None of these

Ans : b38. If a computer on the network shares resources for

others to use, it is called ____a. Serverb. Clientc. MainframeAnswer : a

39. Terminators are used in ______ topology.a. Busb. StarAnswer : a

40. In _____ topology, if a computer’s network cable is broken, whole network goes down.a. Busb. StarAnswer : a

41. For large networks, _______ topology is used.a. Busb. Starc. RingAnswer : b

42. ISO stands fora. International Standard Organizationb. International Student Organization

Page 7: QPDEC2010Sem1

c. Integrated Services OrganizationAnswer : a

43. ISO OSI model is used ina. Stand alone PCb. Network environmentAnswer : b

44. Network cable lies on _____ layera. Applicationb. Networkc. Physical

Answer : c

45. ____ layer decides which physical pathway the data should take.a. Applicationb. Networkc. PhysicalAnswer : c

46. ISDN is an example of ______ networka. Circuit switchedb. Packet switchedAnswer : a

47. X.25 is an example of ______ networka. Circuit switchedb. Packet switchedAnswer : b

48. _____________ allows LAN users to share computer programs and data.a. Communication serverb. Print serverc. File serverAnswer : c

49. Print server uses ________ which is a buffer that holds data before it is send to the printer.a. Queueb. Spoolc. NodeAnswer : b

50. A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of____

Page 8: QPDEC2010Sem1

a. LAN intrinsic softwareb. LAN aware softwarec. Groupwared. LAN ignorant softwareAnswer : a

51. The ______ portion of LAN management software restricts access, records user activities and audit data etc.a. Configuration managementb. Security managementc. Performance managementAnswer : b

52. What is the max cable length of STP?a. 100 ftb. 200 ftc. 100 md. 200 mAnswer : d

53. What is the max data capacity of STP?a. 10 mbpsb. 100 mbpsc. 1000 mbpsd. 10000 mbpsAnswer : b

54. Which connector STP uses?a. BNCb. RJ-11c. RJ-45d. RJ-69Answer : c

55. What is the central device in star topology?a. STP serverb. Hub/switchc. PDCd. RouterAnswer : b

56. What is max data capacity for optical fiber cable?a. 10 mbpsb. 100 mbpsc. 1000 mbpsd. 10000 mbpsAnswer : c

Page 9: QPDEC2010Sem1

57. Which of the following architecture uses CSMA/CD access method?a. ARCnetb. EthernetAnswer : b

58. Physical security measures to protect computer facilities and resources, such as computers, data centers, software, and networks, are all of the following except:a) Requiring strong passwords.b) Shielding against electromagnetic fields.c) Fire prevention, detection, and extinguishing systems.d) Motion detector alarms that detect physical intrusion.

Ans: a59. Company executives are worried about

proprietary information "walking out the door" on employees' iPods, PDAs, or USB drives. Which of the following would be the most effective and viable solution to protect against this type of data loss/theft?a) Ban the use of those devices altogether.b) Do random spot checks of those devices.c) Run software on machines that tracks and manages what is being passed across to any USB drive.d) Notify all employees via email of the risk of data loss due to those devices.

Ans: c60. __________ is a broad term that refers to the

buying and selling of goods and services; servicing of customers; collaborating with business partners; and conducting electronic transactions within an organization.a) Pure e-commerceb) E-businessc) Online logisticsd) iCommerceAns : b

61. The vast majority of e-commerce volume is of which type?a) B2Bb) e-retailingc) B2Cd) social commerce

Ans: a

Page 10: QPDEC2010Sem1

62. A company visits the Internal Revenue Service's Web site to learn how to pay its estimated quarterly income taxes. This is an example of:a) G2Gb) G2Bc) G2Cd) E2E

Ans: b

63. What is a satellite-based tracking system that is used to determine the location of a person or physical item?a) GPSb) SMSc) WAPd) WiMax

Ans: a64. What is the wireless broadband technology based

on the IEEE 802.16-2004 standard, designed to provide Internet access across metro areas to fixed users? a) WAPb) Wi-Fic) WiMax d) WLAN

Ans: c65. What is the technology that enables Internet

browsing from wireless devices? a) WAPb) EMSc) WiMax d) WLAN

Ans: a

66. In their effort to streamline Human Resources processes and to better manage employees, companies are developing web applications referred to as _____________.a) asset capital managementb) economic risk managementc) employee relationship managementd) labor relations information systems

Ans: c67. Which of the following statements most

comprehensively defines the supply chain?

Page 11: QPDEC2010Sem1

a) Supply chains involve the flow of materials from raw materials suppliers and factories to warehousesb) Supply chains involve the flow of materials, information, money, and services from raw materials suppliers, through factories and warehouses, to the end-consumers.c) Supply chains involve the flow of materials and equipment from raw materials suppliers to factories.d) Supply chains involve the flow of materials and services from raw materials suppliers, through factories and warehouses, to the end-consumers.

Ans: b68. Supply chain management (SCM) systems add

value to ERP systems by providing __________ capabilities.a) customer and product supportb) analysis and decision supportc) forecastingd) project management

Ans: b69. The following are components of CRM except:

a) channel managementb) sales and marketingc) partner managementd) production

Ans: d

70. The following are characteristics of ERP software except:a) designed to improve standard business transactions from all of the functional departments.b) utilizes IT tools and quality control methods to track and improve process efficiency and effectiveness.c) provides an integrated framework of all routine activities in the enterprise.d) provides easy interfaces to legacy systems as well as to partners’ systems.

Ans: b71. Which company makes the leading ERP software?

a) Computer Associatesb) Oracle c) PeopleSoftd) SAP

Ans: d

Page 12: QPDEC2010Sem1

72. What best describes customer relationship management (CRM)?a) CRM is an enterprisewide effort to acquire and retain all customers.b) CRM focuses on building long-term and sustainable customer relationships that add value for both the customer and the company.c) CRM is basically a simple idea: “Treat all customers the same.” d) CRM means being oriented to the needs of the typical customer in the market—the average customer.

Ans: b73. ____________ are interactive computerized systems

that help employees find and connect with colleagues with the expertise required for specific problems---whether they are across the country or across the room---in order to solve specific business problems in seconds.a) Bluetoothb) Expert locating systems c) Global positioning systems d) Knowledge management systems

Ans: b

74. What is the electronic movement of business documents between business partners?a) EDIb) EFTc) VANd) XML

Ans: a75. One of the newest and possibly most

revolutionary solutions to supply chain problems is: a) EDIb) EPCc) RFIDd) RPC

Ans: c76. Discovering knowledge contained in the data

stored in databases is achieved with:a) data miningb) visualizationc) automated decision supportd) enterprise search

Page 13: QPDEC2010Sem1

Ans: a

77. IT can add value to a company directly by:a) Reducing the workforce while not reducing the production level. b) Widening the geographic market.c) Providing a competitive advantage through improved customer service.d) Reducing competition based on price.

Ans: a

Match the following : COLUMN A COLUMN B

I Gateway-5 1 Network layerII NIC-4 2 Transport LayerIII Router-1 3 Data Link LayerIV IEEE 802.x-3 4 Physical LayerV TCP/UDP-2 5 Works at all layers of

OSI

State True or False

1. The network interface card converts serial data from the computer into parallel data for transmission over the network cable.-False

2. All four types of information services—data, documents, voice, and video—transmit over networks using the TCP protocol.-False

3. To prepare data and documents for transmission over a network, they are converted into digital packets based on the Internet protocol.-True

4. GSM is an internationally-accepted standard for digital cellular communication and the most popular standard for mobile phones in the world.-True

5. With VoIP, voice and data transmissions are sent over telephone wires as packets, which is more expensive than equivalent service from traditional telecommunications companies.-False

6. Wi-Fi networks usually consist of a router, which transmits the signal, and one or more adapters, which receive the signal and are usually attached to computers.-True

Page 14: QPDEC2010Sem1

7. WiMax enables wireless broadband access as an alternative to cable and DSL.-True

8. Trojans horses are referred to as backdoors because they give an attacker illegal access to a network or account through a network port.-True

9. The final participants in B2B transactions are consumers.-False

10. Major limitations of mobile computing are small screens on mobile devices, limited bandwidth, high cost, unproven security, and possible health hazards.-True

11. Bluetooth is a wireless standard designed for temporary, short-range data and voice connections among mobile devices. –True

12. Insufficient telecommunications bandwidth is no longer a limitation of e-commerce.-False

13. The Internet introduced the concept of interactive marketing, which has enabled marketers and advertisers to interact directly with customers.- True

14. When the flow of work and information between departments does not work well, it results in delays, poor customer service, or higher costs.-True

15. Web-based human resource systems are extremely useful for recruiting and training.-True

16. Knowledge management (KM) is computer-based decision analysis usually done online by managers and staff. It includes forecasting, analyzing alternatives, and evaluating risk and performance.-False

17. An economic impact of EC is the trade-off between the number of customers a company can reach and the amount of interactions and information services it can provide to them, which is referred to as richness.-True

Fill in the blanks1. A type of network that is used to distribute frequently needed

employee handbooks, government forms, policies, and other materials to employees over the company’s internal network is referred to as a(n) ______________

Ans: Intranet2. A _________ is a type of local area network (LAN) that uses

high-frequency radio waves rather than wires to communicate between computers or devices such as printers, which are referred to as nodes on the network.

Ans: WLAN (wireless local area network)

3. __________ is the term often used to describe someone who gains unauthorized access to a computer system.

Page 15: QPDEC2010Sem1

Ans: Hacker

4. Viruses, worms, and Trojan horses are types of malicious code, which is also called _________.

Ans: malware5. A(n) _________ scans for unusual or suspicious traffic, which is

used to identify the start of a DoS attack by the traffic pattern, alerting the network administrator to take defensive action, such as switching to another IP addresses and diverting critical servers from the path of the attack.

Ans: intrusion detection system6. _________ controls are automated methods of verifying the

identity of a person, based on a physiological or behavioral characteristic, such as a fingerprint or keystroke dynamics.

Ans: Biometric7. A(n) ___________ is a technology that checks Internet packets

sent to and from a network and enforces access-control policies between networks.

Ans: firewall8. One way for a business to implement ERP is to lease ERP

systems from a(n) ____________.

Ans: application service provider (ASP)9. Historically, MIS has focused on capturing, storing, managing,

and reporting _________ knowledge, which deals with objective, rational, and technical knowledge.

Ans: Explicit10. The most popular software tool adopted as an easy-to-

use and powerful DSS tool for data manipulation is Microsoft ________________.

Ans: Excel

11. _________ is the practice of indiscriminately broadcasting unsolicited messages via e-mail and over the Internet; and one of the most widespread forms of digital noise.

Ans: Spamming12. The power of Intel chips is measured in MIPS, which

stands for _________ .

Ans: millions of instructions per second

Page 16: QPDEC2010Sem1