1.
These systems (__________) summarize the detailed data of the transaction processing systems in standard reports for middle-level managers.
Correct Answer
D. Use the transaction data to produce information needed by managers to run the business
Explanation
The correct answer is "use the transaction data to produce information needed by managers to run the business." This answer accurately describes the purpose of these systems, which is to take the detailed data from transaction processing systems and generate standard reports that provide managers with the information they need to make informed decisions and manage the business effectively.
2.
An information system that supports the planning and assessment needs of executive management is
Correct Answer
E. None of the above
Explanation
The question asks for an information system that supports the planning and assessment needs of executive management. None of the options provided (DSS, TPS, ERP, MIS) specifically cater to this requirement. DSS (Decision Support System) focuses on providing analytical tools for decision-making, TPS (Transaction Processing System) handles routine transactions, ERP (Enterprise Resource Planning) integrates various business processes, and MIS (Management Information System) provides information for managerial decision-making. Therefore, none of these options are suitable for supporting the planning and assessment needs of executive management.
3.
Decision makers who are concerned with tactical (short-term) operational problems and decision making are
Correct Answer
A. Middle managers
Explanation
Middle managers are responsible for overseeing the day-to-day operations of an organization and making tactical decisions to address short-term operational problems. They bridge the gap between executive managers and supervisors, ensuring that the organization's strategic goals are implemented effectively at the operational level. Executive managers focus more on long-term strategic planning, while supervisors are responsible for directly overseeing the work of employees. Mobile managers, a term not mentioned in the question, do not fit the description of decision makers concerned with tactical operational problems. Therefore, the correct answer is middle managers.
4.
The general transformation cycle for information is:
Correct Answer
D. Data to information to knowledge.
Explanation
The correct answer is "data to information to knowledge." This sequence represents the typical transformation cycle for information. Data, which refers to raw facts and figures, is processed and organized to become information. Information is then interpreted and understood, leading to the creation of knowledge. Therefore, data is the starting point, followed by the transformation into information, and ultimately leading to the acquisition of knowledge.
5.
Prototypes are used in
Correct Answer
D. Accelerated systems analysis
Explanation
Prototypes are used in accelerated systems analysis. This approach involves quickly developing and testing prototypes of a system to gather feedback and make improvements. By creating prototypes, analysts can better understand user requirements, identify potential issues early on, and make necessary adjustments before finalizing the system design. This iterative process helps to accelerate the analysis phase and ensure a more efficient and effective system development process.
6.
In MIS system design, the sources of information may be categorized as ............... and ...............
Correct Answer
A. internal, external
Explanation
In MIS system design, the sources of information can be classified into two categories: internal and external. Internal sources refer to the data and information that originates within the organization, such as sales records, employee information, and financial data. External sources, on the other hand, include information that comes from outside the organization, such as market research reports, industry trends, and customer feedback. By categorizing the sources of information into internal and external, organizations can effectively gather and utilize data from both within and outside the company to make informed decisions and improve their business processes.
7.
In this topology there is a central controller or hub
Correct Answer
A. Star
Explanation
In a star topology, all devices are connected to a central controller or hub. This hub acts as a central point of connection, allowing all devices to communicate with each other. This topology is commonly used in local area networks (LANs) as it provides a centralized control and easy management of the network. It also offers high reliability, as if one device fails, it does not affect the rest of the network.
8.
Data communication system spanning states, countries, or the whole world is
Correct Answer
B. WAN
Explanation
A data communication system that spans states, countries, or the whole world is referred to as a Wide Area Network (WAN). LAN (Local Area Network) is a network that covers a small geographical area, usually within a single building or campus. MAN (Metropolitan Area Network) covers a larger geographical area, typically within a city. Therefore, WAN is the correct answer as it accurately describes a data communication system that extends across large distances, connecting different locations globally.
9.
WAN Stands for...
Correct Answer
B. Wide area network
Explanation
WAN stands for Wide Area Network. It is a type of computer network that spans a large geographical area, typically connecting multiple local area networks (LANs) together. WANs are used to connect different locations such as offices, buildings, or even countries, allowing for the sharing of resources and information over long distances. Unlike LANs which are confined to a single location, WANs provide connectivity over a wide area, making them essential for organizations with multiple branches or remote locations.
10.
Combination of two or more topologies are called
Correct Answer
D. Hybrid
Explanation
A combination of two or more topologies is called a hybrid topology. In a hybrid topology, different types of topologies are connected together to form a network. This allows for more flexibility and scalability in the network design. For example, a network may have a combination of star and ring topologies, where some nodes are connected in a star configuration and others are connected in a ring configuration. This combination of topologies allows for efficient data transmission and fault tolerance in the network.
11.
In a relational database a referential integrity constraint can be specified with the help of
Correct Answer
B. Foreign key
Explanation
A referential integrity constraint in a relational database ensures that relationships between tables are maintained. It ensures that values in a foreign key column of a table correspond to values in the primary key column of another table. Therefore, the correct answer for specifying a referential integrity constraint in a relational database is a foreign key.
12.
............................ is the powerful language for working with RDBMS
Correct Answer
C. Query Language
Explanation
Query Language is the correct answer because it is specifically designed for working with relational database management systems (RDBMS). It allows users to retrieve, manipulate, and manage data stored in a database. Query languages like SQL (Structured Query Language) are widely used to interact with databases and perform various operations such as selecting, inserting, updating, and deleting data. These languages provide a powerful and standardized way to communicate with RDBMS, making them an essential tool for working with databases.
13.
The file in DBMS is called as .................. in RDBMS
Correct Answer
C. Table
Explanation
In DBMS, the file is referred to as a "table" in RDBMS. A table is a collection of related data organized in rows and columns, where each row represents a record and each column represents a field. It is used to store and organize data in a structured manner, allowing for efficient retrieval, manipulation, and management of data.
14.
What is Software ?
Correct Answer
A. Set of computer programs, procedures and possibly associated document concerned with the operation of data processing.
Explanation
Software refers to a set of computer programs, procedures, and possibly associated documents that are specifically designed to facilitate data processing. It encompasses a wide range of applications, utilities, and operating systems that enable the functioning of computer hardware. This definition highlights the comprehensive nature of software, which includes not only the programs themselves but also the procedures and documentation necessary for their operation.
15.
Which is not a software life cycle model?
Correct Answer
D. Capability maturity Model
Explanation
The Capability Maturity Model (CMM) is not a software life cycle model. It is a process improvement model that focuses on the maturity and quality of an organization's processes. The CMM provides a framework for assessing and improving an organization's ability to consistently and predictably deliver quality software products and services. Unlike the other options listed, the CMM does not provide a specific approach or methodology for developing software.
16.
SDLC stands for ?
Correct Answer
D. System development life cycle
Explanation
The correct answer is "System development life cycle" because SDLC refers to the process of developing software systems. It encompasses all the phases involved in software development, including planning, design, coding, testing, and maintenance. The term "system" in SDLC refers to the software system being developed, and "development" highlights the iterative and structured approach followed in creating the software. Therefore, "System development life cycle" is the most appropriate choice for the acronym SDLC.
17.
RAD stands for ?
Correct Answer
A. Rapid Application Development
Explanation
RAD stands for Rapid Application Development. This approach to software development emphasizes fast prototyping and iterative development. It aims to deliver high-quality software quickly by involving users in the development process and focusing on essential functionality. RAD is characterized by its emphasis on speed, flexibility, and user involvement, making it an efficient approach for projects with rapidly changing requirements or tight deadlines.
18.
Intellectual Property Rights (IPR) protect the use of information and ideas that are of
Correct Answer
D. Commercial value
Explanation
Intellectual Property Rights (IPR) are legal rights that protect the ownership and control of intangible assets, such as inventions, designs, trademarks, and creative works. These rights are primarily aimed at protecting the commercial value of these assets, ensuring that individuals or organizations can profit from their creations and innovations. By granting exclusive rights to the creators, IPR encourages investment in research and development, stimulates economic growth, and fosters innovation. Therefore, the correct answer is "Commercial value."
19.
The term ‘Intellectual Property Rights’ covers
Correct Answer
D. All of the above
Explanation
The term 'Intellectual Property Rights' refers to legal rights that are granted to individuals or organizations for their creations or inventions. Copyrights protect original works of authorship such as books, music, and artwork. Know-how refers to confidential information or expertise that is not publicly known and gives a competitive advantage. Trade dress refers to the distinctive visual appearance of a product or its packaging that distinguishes it from others in the market. Therefore, 'All of the above' is the correct answer as it includes copyrights, know-how, and trade dress, which are all covered under Intellectual Property Rights.
20.
Trade mark
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above" because a trademark can be represented graphically, it can distinguish the goods or services of one person from others, and it can include shapes of goods or combinations of colors. This means that all of these options are valid characteristics of a trademark.