Professional Documents
Culture Documents
Organisations and Information Systems
Organisations and Information Systems
3. The organisations are linked as nodes on the network where they receive and
transmit information (True/False) ⇒ True
7. With the current availability of data on the web, the most important data can be
accessed easily. (True/False) ⇒ False
9. CRM systems are used widely to maintain details about customers like
their
a. interactions with the organisation
b. purchasing and payment details
c. service needs and other similar details
d. all of the above
10. The IS Implementation process begins with a initiation, or the
recognition of a need for an IS. (True/False) ⇒ True
14. The city government obtains data from the information systems of form in
a city regarding their employees’ offices and places of living for promoting
carpooling. This is an example of the effects of the implementation
information systems by the firms.
a. third order
b. second order
c. first order
d. both b and c
17. What all a manager has to examine in order to understand if the new
system will fit and in what manner will be acquired or introduced. a.
culture
b. structure and infrastructure
c. both a and b
18. Lax security leads to problems of data theft, viruses, etc
20. Managers have to be careful about the security arrangements while moving
any functions in the cloud. (True/False) ⇒ True
22. Internal threats to an information system arise from computer viruses that enter
through the Internet services and disrupt the functioning of different systems within
the organisation. (True/False) ⇒ False
25. Information technology (IT) are the artefacts such as that constitute
the IS.
a. Computer
b. Software
c. Networks
d. all of the above
26. Culture or work culture of any organisation is understood as the shared
set of and within the organisation.
a. Values
b. Beliefs
c. Groups
d. both a and b
28. The challenge that most managers face is that of having efficient
processes that enable them to achieve their goals in the best possible
manner.
29. If the firm has an internal IS department then it may choose to build
the system on it own.
A.B2B
B.B2C
c.C2B
A.B2B
B. B2C
c.C2B
d.C2C
3) ………………..is concerned with the buying and selling information, products and services over
computer communication networks
(a) Commerce
(b) E-Commerce
(c) E-Business
(a) EDI
(b) Protocols
(c) Standards
(a) E-commerce
(b) E-Business
(c) EDI
6. Among the alternate models of B2B e-commerce,……is the best means to obtain a competitive
advantage in the Market place.
7. …………………is basically a concept of online marketing and distributing of products and services
over internet
(a) B2G
(b) B2E
(c) B2C
(d) B2B
(a) B2G
(b) B2E
(c) B2B
(d) B2C.
(a) clothes
(b) flowers
(d) none
10………………is any transaction, involving the transfer or rights to use goods and services, which is
initiated and or completed by using mobile access to computer mediated networks with the help of
an electronic device
A )Mobile Commerce
B) e-commerce
C) both of these
D )none of these
11. ………………type of payment system is highly useful to those customers who would like to control
overspending,
(a) Prepaid
(a) Prepaid
13. ………………….is a financial instrument which can be used more than once to borrow money or
buy products and services on credit.
(b) E-Cheques
(c) E-cash
14. The dimension of e-commerce that enables commerce across national boundaries is called
______
A. interactivity.
B. global reach.
C. richness.
D. ubiquity
d. either a or b
Book Questions
Answers:
Chapter 5 Information Technology Infrastructure and
Choices
c)After the completion of a machine cycle, the processor goes idle for a
very short duration before starting another cycle.
22.which of the following statements is not true about desktops and laptops?
a)The key advantage of desktops is they can be upgraded quite easily , as there is
plenty of space in the CPU units to add or change the components.
a)The OS does not manage or run the drivers of any peripheral hardware.
b)The operating system also manages a user interface, which is graphical in most modern
operating system.
c)The OS manages and maintains user accounts on a computer, each account having a name
and a password.
26.Match the following categories of software or applications with their respective product
groups.
(a)Database software
(b)Enterprise software
(c)Office productivity software
(d)Browser
(e)Multimedia software
(f)Networking applications
(g)Operating systems
(5)Skype, email servers Yahoo and Gmail, and email clients such as evolution on Linux and
outlook on Microsoft (f)
27.Enterprise systems are a class of systems that allow multiple possible applications to be
run in a Centralized, coordinated manner.
28.IT outsourcing refers to the process of contracting out the management of computing
resources of an organization.
29.The virtual server is a technology that loosens the tight coupling between the
hardware and the operating system.
30.If in an organization , any of the interoperable technologies is upgraded, it may not be
easy to ensure that it remains interoperable with the other technologies as it were earlier
TRUE
31.Virtualisation allows many operating systems to be installed on the processors, each
having its own dedicated resources of hard disk space, RAM and network connectivity.
TRUE
32.Which of the following statements are true about the time and materials model of IT
outsourcing?
a)In this model, the vendor brings skilled staff and resources, such as software and
computers, to the site of the client to build systems.
b)The vendor bills the client for the hours spent on the job and the costs of the hardware
and software used.
c)This model is best suited for clients who are not very sure of their requirements, and need
the skills of the vendor to get going on their project.
4. In a furnished apartment most of the facilities for living are already available and the renter
can start living there with only her personal effects. This analogy corresponds to which of
the following cloud service models?
a) Saas
b) Iaas
c) Paas
d) None of the above
10. For which of the following tasks radio-frequency-identification(RFID) tags are not used.
a) Tracking the health parameters of those involved in inventory related jobs
b) Exact time and quantity of finished goods moved out of the factory premises
c) Exact location of the new inventory in a factory
d) Tracking material in factory
16. Which is the software for creating virtual machines that are lighter and suitable for cloud
environments?
a) Actuators
b) Heterogeneity
c) Sensors
d) Containers
17. Cloud services where specific applications are provided to clients over the internet is
a) Saas
b) Iaas
c) Caas
d) Paas
20. which of these is a hardware-level service, provides computing resources such as processing
power, memory, storage and network to cloud users?
a) Iaas
b) Paas
c) Saas
d) Naas
21. A mix of different kinds of hardware, software, and network components within a particular
computing infrastructure is
a) Containers
b) Heterogeneity
c) Actuators
d) sensors
22. Which cloud facility is dedicated to a single client, without any shared facilities?
a) Hybrid
b) Community
c) Private
d) public
24. Cloud service where computing infrastructure is provided to clients over the internet, where
they install their own applications is
a) Iaas
b) Paas
c) Saas
d) Caas
27. Cloud services where computing infrastructure is provided along with tools and software
libraries to build applications is
a) Paas
b) Caas
c) Iaas
d) saas
28. Which device that move or change their own state or of another device upon receiving a
signal?
a) Internet-of-things
b) Sensors
c) Actuators
d) Containers
\
Chapter 7 Information Systems Security and
Control
1. Malicious codes called ………………, also attack organizations to infect them or to steal
data and money
a) Virus
b) Worms
c) Crackers
d) Malware
2. ……………… and …………….. are rampant and infect million of computers wreaking heavy
damage on data and productivity
Ans. Virus and Worms
3. ILOVEYOU worm was written by two college dropout computer programmer, originated in
a) Germany
b) Philippines
c) Ukraine
d) Hong Kong
4. What is false about Conficker worms?
a) Use all known infection techniques to spread itself
b) Affected major government and defense departments
c) It was originated in Philippines
d) Spreads through USB memory sticks, email attachments or through shared files
5. The worm that comes as an attachment in an e-mail message
a) SQL Slammer
b) ILOVEYOU
c) Conficker worm
d) Both (a) and (b)
6. Cracking methods whose crackers identify the kind and type of system that is being used
and then uncover its security mechanism
a) Reverse Engineering
b) Political Espionage
c) Social Engineering
d) none of these
7. Which of the following is not a type of malicious software that pose a threat to security of
organization.
a) Phishing
b) worm
c) Virus
d) Trojan Horse
8. ………………..is a type of software that resides in the computer and secretly relays
information about the usage of computer to agent outside
a) Worm
b) Trojan Horse
c) Spyware
d) Virus
9. Hacking is done for useful reasons known as ……………………
Ans. Ethical Hacking
10. The identity theft takes place by
a) Snooping
b) Key Logging
c) Both (a) and (b)
d) Phishing
11. The manipulation of unsuspecting users to extract private information from them is
done by
a) Political Espionage
b) Reverse Engineering
c) Social Engineering
d) None of these
12. The worm propagates only via the windows operating systems by relying on its
vulnerabilities
a) Conficker Worm
b) SQL Slammer
c) Stuxnet
d) none of these
13. The crackers break into organizations is for industrial and ………………………….
Ans. Political Espionage
14. The ………………………… worm did harm to systems too as it made changes to windows
so that it would always be invoked when the systems was booted up
a) Conficker worm
b) ILOVEYOU worm
c) SQL Slammer
d) Stuxnet
15. The technology by which a message or data is transformed or translated into a form
that is not easily readable by anyone
a) Public-key cryptography
b) Encryption
c) Firewall
d) Virtual Private Network
16. Which cryptography solves the problem of having to send a key secretly to receive of
message
a) Symmetric Key
b) Public Key
c) Both (a) and (b)
d) Private Key
17. What is wrong about cracking and hacking
a) Often use interchangeably
b) Exploit some weakness, human or technological, in security of system
c) Objective is to steal information, digital resources or money
d) none of these
18. In computing technology the original message to be encrypted is usually called a
…………….. and the coded message is called a ……………………..
a) Plaintext and Cipher text
b) Cipher text and Plaintext
c) Plaintext and symmetric text
d) Cipher text and Symmetric text
19. A …………………….. attack is a method by which crackers pull down or slow down the
service of website.
Ans. Denial-of-service (DOS)
20. How the plaintext is converted to cipertext
a) Shift 5 (shift each character by 5)
b) The character are shifted by 19 space(space 19)
c) Reverse and shift 5(reverse the order and shift by 5 characters)
d) All the above
21. The software that when installed stays in the RAM & keeps records of all keystrikes on
the keyboard
a) DOS
b) Spyware
c) Key logger
d) None of these
22. The DOS attack relies on ………………….. handshake of connection oriented protocol
a) One step
b) Two step
c) Three step
d) Four step
23. Which of the following is not true about DMZ?
a) Buffer that allows user to enter after authentication is allowed to access other access
b) Virtual network apart from organization network
c) If one of the server is attacked, then others too are attacked
d) It stands for demilitarized zone
24. ATM is an example of-
a) Single Factor Authentication
b) Two Factor Authentication
c) Either (a) or (b)
d) none of these
25. Co-Locations facilities have:
a) Temperature and humidity controlled rooms
b) Store data servers
c) Highly reliable power supply
d) specially designed building to protect from flood, earthquake
e) all of these
26. Under control of crackers, the machines acts as …………………….. and ………………………
Ans. Zombies and Botnets
27. Which of the following is not true about Public- key encryption?
a) Followed by pair of key called public key and private key
b) Message is encrypted using private key and decrypted using public key
c) Also known as RSA encryption technique
d) Process involves taking the product of these numbers from which an amount is
subtracted and division is performed
28. What is true about firewall?
a) Filtering and protecting device that is usually a combination of software and hardware.
b) Protects organization against malicious crackers and intruders
c) It is packet filter device that monitors both outgoing and incoming packets
d) All of these
29. The method of authentication using a public key technology is known as
………………………….
Ans. Digital Signature
30. Logging to an e-mail is an example of
a) Single Factor Authentication
b) Two Factor Authentication
c) Either (a) or (b)
d) none of these
31. Which of the following are features of Managing security in Information System?
a) Confidentiality
b) Message Integrity
c) Authentication
d) All of these
32. ……………………… are also used to authenticate the owner of public key.
Ans. Digital Certificates
33. Which mode provides more privilege for changing the setting
a) Administrative mode
b) User mode
c) Both are equally secure
d) Both are insecure
34. Which of the following is wireless technology
a) Wi-Fi Routers
b) RFID
c) Bluetooth
d) All of the above
35. In which type of filtering technique, trusted users can be allowed to access the telnet
facility, whereas other users can be barred from doing so
a) Packet filtering
b) Deep Packet inspection
c) Application Filtering
d) None of these
36. Which of the following is secure mode of running the system
a) Administrative mode
b) User mode
c) Both are equally secure
d) Both are insecure
37. …………………… encryption is used extensively to protect data on wired and wireless
networks
Ans. Symmetric keys
38. Public key cryptography followed here is having a pair of keys called………………
and……………………….
Ans. Public key and Private key
39. A kind of ‘tunnel’ through which clients can connect to the organization’s network while
using the public network
a) Wireless technology
b) RFID
c) Virtual Private Network
d) Wireless Sensor Network
40. Which statement is wrong about Virtual Private Network
a) Technology that enables clients or employees of organization who are outside the
network to connect to organization network securely
b) relies on authentication and encryption
c) Often able to go through firewall via special channel, allowing users to connect to all the
facilities anf features available on organization’s operating network
d) None of the above
41. The device rely on ……………………….. of different frequencies to connect with each other
to share info
a) UV Rays
b) Infrared Rays
c) Radio Waves
d) X-Rays
42. Which statement is not true about Wi-Fi routers and bluetooth
a) Wi-Fi connection is approved by IEEE for wireless connection
b) Bluetooth is popularly used with hotspot or access points that are routers
c) Bluetooth standard offers lower data transfer rates and operates over a short distance
d) Wi-Fi routers should be in an unsecured manner, where anybody can simply lock into
signal available and use the connection
43. Which of the following is/ are applications of RFID
a) Managing inventory in large warehouse by tagging all items
b) Charging cars at toll plazas through RFID tagged display cards
c) For use on public transportation where RFID tagged passes allow user to travel without
having to purchase tickel
d) all of the above
44. The network used for sensing agriculture region for what is termed ‘precision
agriculture’
a) RFD
b) Wireless sensor network
c) Both (a) and (b)
d) WI-FI
45 .Which is not true about wireless sensor network
1) What was developed using principles of engineering, with an emphasis on design before
implementation.
a. Hardware
b. Software
c. Coding
d. Planning
2) The software industry grew immensely, and with it grew the problems of _____, and the
need for extensive and scientific testing.
a. Spaghetti code
b. parallel code
c. obfuscated code
d. Pizza code
a. Analysis
b. Maintenance
c. Coding
d. Implementation
5) In what the project proceeds along each stage with the ability to loop back to a previous
stage if necessary.
a. Spiral Model
b. Agile Method
c. Waterfall Model
d. Scrum Method
6) In waterfall model, the first three are considered the most critical and important part s of
the life cycle are called as ______
a. Coding an implementation
b. implementation and maintenance
c. Analysis and design
d. project requirement and analysis
9) In what stage of waterfall model, the overall scope of the project is established.
a. Analysis phase
b. Project requirement phase
c. Design phase
d. Maintenance phase
a. Feasibility analysis
b. Technical analysis
c. Requirement analysis
d. Design analysis
11) The project requirements provide a road map for the project with important details
such as ________ and _______.
12) In which stage shows output of the lifecycle is a document that clearly outlines the
scope of the project, the budget, the personnel involved, the likely milestones and the key
success indicators.
a. Analysis
b. Design
c. Maintenance
d. Project Requirement
13) Analysis stage is also called the _______ where the basic objective of the system is
explained in as much details as possible.
a. Requirement stage
b. Design stage
c. Coding stage
d. Testing stage
14) Who are connected to the system in a direct manner and sometimes indirectly and
whose use or non-use of the system will determine its success.
a. Client
b. Tester
c. Stakeholders
d. coder
15) What analysts uses to ensure that the requirements they unearth are adequately
recorded in the requirements document.
16) In what stage it is provide clear and precise guidelines as how the system will be built.
a. Coding
b. Testing
c. Implementation
d. Design
19) Which phase involves the building the system and writing the software
20) _____ are set of problems the program is run on to see how it performs.
a. Design suits
b. Test suits
c. Platform
d. both a and b
21) What it is called when tests are conducted for individual modules.
a. Stub Testing
b. Integration Testing
c. System Testing
d. None of the above
a. Unit testing
b. Integration testing
c. System testing
d. both a and c
23) Software released for user for testing is said to be an ___
a. Alpha testing
b. Unit testing
c. Beta testing
d. System testing
a. Alpha Testing
b. Beta Testing
c. System Testing
d. None of the above
25) which testing is more rigorous as it forces the software to encounter situations it has
not seen before?
a. Beta testing
b. Alpha testing
c. Integration testing
d. Unit testing
a. Design
b. Coding
c. Implementation
d. Maintenance
27) Standard for the software development process and certifications for the same are
based on ______
a. Waterfall model
b. Scrum model
c. Agile models
d. None of the above
28) What is called if the requirements are changed and accommodating the new
requirements attracts extra charges.
30) what prototyping is a formal method by which the system is built in sequence of cycles
of the waterfall model
a. slow
b. Rapid
c. Detailed
d. None of the above
31) Which model was developed to address some of the concerns raised by system
developers about the waterfall model.
a. Agile Model
b. Scrum Model
c. Both a and b
d. Spiral model
a. it involves assigning estimates to the construction, use, value and eventual success of
two alternatives.
b. it involves the assigning estimation to the construction, use, value and eventual success
of three alternatives.
c. none of the above
d. Both a ad b
a. coding
b. Software development method
c. Design
c. System development method
34) Which method rely on creating programs quickly and with close interaction with
customer.
a. Agile method
b. Waterfall model
c. Scrum model
d. None of the above
35) What embodies most of the objectives of the agile manifesto and has been
demonstrated to be effective for small to medium scale projects?
a. Embedded programming
b. Functional programming
c. scripting programming
d. Extreme programming
a. stories
b. Programming
c. Both a and b
d. None of the above
37) Who is responsible for removing any impediments the team faces.
a. Product owner
b. Scrum master
c. Team member
d. user
38) The _____ shows what has been completed on a daily basis giving the team a focus for
what needs to be achieved.
a. Documentation
b. Burn down chart
c. Flow chart
d. None of the above
40) what are the initial set of functionalities defied as part of product vision.
a. User stories
b. Epics
c. Pigs
d. None of the above
41) The framework or methodologies for software development present a ______ in which
software can be constructed.
a. Planned
b. Unplanned
c. Structured
d. Unstructured
42) What is an issue for software project management in the current organizational
environment?
43) What organization uses extensively to build and help maintain the system?
a. User
b. Top management
c. Vendor
d. Team member
45) Which techniques use to estimates the size and effort required to build an information
system.
Basic processes
False
True
D
D
Y2K
D
D
False
b
a- iii
b–i
c – ii
c
cold calls
touch points
analytical CRM and
executional/operational
CRM
True
True
A – iv
B–i
c-ii
d-iii
A–v
B – iv
C–i
D – viii
E – iii
F – vii
G – vi
H – ii
d
c
a- iv
b. iii
c. ii
d. i
Change
management.
Project
management
D
D
Outsourcing, Off
shoring
True
True
True
Extra questions
4 Name the function which focus on deploying best in class application for content management,
leveraging enterprise solution, maximising synergies across the business verticals?
IT
4 Which chain has received international recognition and was given the international retailer of the
year award in 2007?
The pantaloon chain.
6 Which facility allowed to attract larger capital market then otherwise it would have?
Cash on delivery
7 Which was the largest e-commerce firm in India by the late of 2011?
Flipkart.com
8 Where is the second largest e-commerce firm in India by the late of 2011?
Futurebazaar.com
7 Which technology enables user institutions to build facility rapidly by renting facilities from existing
providers then scaling up according to the need?
Cloud technologies.
3 Name a telescope survey of the sky that collect data on stars and galaxies?
The Sloan Digital sky survey
4 What is one of the most promising technologies which is gaining a lot of traction for processing big
data in the open source software?
Hadoop