

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) .
251. |
When a bank offers web self-service for customers to answer their questions, the primary outcome is: |
A. | adds value |
B. | manages risks |
C. | reduces costs |
D. | none of the above |
Answer» C. reduces costs |
252. |
The general transformation cycle for information is: |
A. | information to data to knowledge |
B. | data to information to knowledge |
C. | knowledge to data to information |
D. | none of the above |
Answer» B. data to information to knowledge |
253. |
The most important attribute of information quality that a manager requires is: |
A. | relevance |
B. | media |
C. | presentation |
D. | none of the above |
Answer» A. relevance |
254. |
To improve the performance of a business process, which of the following is most relevant? |
A. | input |
B. | processing |
C. | control and feedback |
D. | all of the above |
Answer» C. control and feedback |
255. |
The majority of publically available Internet information sources are: |
A. | created in xml |
B. | structured information |
C. | normal information |
D. | unstructured information |
Answer» D. unstructured information |
256. |
Which of the following statements describes a taxonomy? |
A. | a browsable hierarchy |
B. | a list of equivalent terms |
C. | a complex controlled vocabulary showing relationships |
Answer» A. a browsable hierarchy |
257. |
Which is not a typical business function? |
A. | manufacturing |
B. | benefits and compensation |
C. | sales |
D. | services |
Answer» B. benefits and compensation |
258. |
Project Management ensures that |
A. | project’s risk is assessed |
B. | project’s feasibility is assessed |
C. | system is developed at minimum cost |
D. | both a and b |
Answer» C. system is developed at minimum cost |
259. |
Which of the following is NOT a feasibility analysis criterion? |
A. | technical feasibility |
B. | schedule feasibility |
C. | economic feasibility |
D. | resource feasibility |
Answer» D. resource feasibility |
260. |
IT has impacts as |
A. | first order |
B. | second order |
C. | third order |
D. | all of the above |
Answer» D. all of the above |
261. |
A centralised system keeps decision making firmly at the top of the hierarchy |
A. | true |
B. | false |
C. | not applicable |
D. | don’t know |
Answer» A. true |
262. |
Centralised IT management system best suited for |
A. | small sized organization |
B. | large sized organization |
C. | all of the above |
D. | none of the above |
Answer» A. small sized organization |
263. |
Decentralised IT management system best suited for |
A. | small sized organization |
B. | large sized organization |
C. | all of the above |
D. | none of the above |
Answer» B. large sized organization |
264. |
Centralised IT management system has |
A. | inadequate control over the organization |
B. | considerable control over the organization |
C. | all of the above |
D. | none of the above |
Answer» A. inadequate control over the organization |
265. |
Decentralised IT management system has |
A. | inadequate control over the organization |
B. | considerable control over the organization |
C. | all of the above |
D. | none of the above |
Answer» B. considerable control over the organization |
266. |
Information systems support an organization's business operations, managerial decision making and strategic competitive advantage. Such system is called |
A. | business process reengineering |
B. | competitive advantage |
C. | competitive advantage |
D. | roles of information systems |
Answer» D. roles of information systems |
267. |
The document listing all procedure and regulations that generally govern an organization is the |
A. | administrative policy manual |
B. | personal policy book |
C. | procedures log |
D. | organization manual |
Answer» D. organization manual |
268. |
Centralised IT management system has |
A. | vertical communication flow |
B. | open tree communication flow |
C. | normal communication flow |
D. | none of the above |
Answer» A. vertical communication flow |
269. |
Decentralised IT management system has |
A. | vertical communication flow |
B. | open tree communication flow |
C. | normal communication flow |
D. | none of the above |
Answer» B. open tree communication flow |
270. |
Advantage of Centralised IT management system is |
A. | proper coordination and leadership |
B. | sharing of burden and responsibility |
C. | no advantage |
D. | none of the above |
Answer» A. proper coordination and leadership |
271. |
Advantage of Decentralised IT management system is |
A. | proper coordination and leadership |
B. | sharing of burden and responsibility |
C. | no advantage |
D. | none of the above |
Answer» B. sharing of burden and responsibility |
272. |
In Centralised IT management system, power of decision making: |
A. | lies with top management |
B. | multiple person have the power |
C. | employee has the power |
D. | none of the above |
Answer» A. lies with top management |
273. |
In Deentralised IT management system, power of decision making: |
A. | lies with top management |
B. | multiple person have the power |
C. | employee has the power |
D. | none of the above |
Answer» B. multiple person have the power |
274. |
In Centralised IT management system decision making is |
A. | comparatively faster |
B. | slow |
C. | very fast |
D. | all of the above |
Answer» B. slow |
275. |
In Dentralised IT management system decision making is |
A. | comparatively faster |
B. | slow |
C. | very fast |
D. | all of the above |
Answer» A. comparatively faster |
276. |
Standardisation implies that all components, physical and software ,which are used to create the IT infrastructure across the organization |
A. | are of same type and follow the same standard. |
B. | are of different type and follow the different standard. |
C. | are of same type but follow the different standard. |
D. | none of the above |
Answer» A. are of same type and follow the same standard. |
277. |
Virus is a |
A. | malicious program that spreads automatically |
B. | piece of code that attaches itself to legitimate program |
C. | both a and b |
D. | none of the above |
Answer» B. piece of code that attaches itself to legitimate program |
278. |
Worm is a |
A. | malicious program that spreads automatically |
B. | piece of code that attaches itself to legitimate program |
C. | both a and b |
D. | none of the above |
Answer» A. malicious program that spreads automatically |
279. |
Virus: |
A. | modifies the code |
B. | destructive in a nature |
C. | both a and b |
D. | replicate itself |
Answer» C. both a and b |
280. |
Worm: |
A. | doesn\t modifies the code |
B. | doesn\t replicate itself |
C. | both a and b |
D. | destructive in a nature |
Answer» A. doesn\t modifies the code |
281. |
The IT infrastructure consists of broad categories of components: |
A. | hardware |
B. | software |
C. | networks |
D. | all of the above |
Answer» D. all of the above |
282. |
To enable a secure IS infrastructure in an organisation, the following features are important: |
A. | confidentiality,authentication |
B. | message integrity |
C. | access and availability |
D. | all of the above |
Answer» D. all of the above |
283. |
RFID stands for |
A. | random frequency identification |
B. | radio frequency identification |
C. | rare frequency identification |
D. | radio firewall identification |
Answer» B. radio frequency identification |
284. |
NMEICT stands for: |
A. | national mission on education through ict |
B. | national mission on e-governance through ict |
C. | national mission on e-commerce through ict |
D. | national mission on e-learning through ict |
Answer» A. national mission on education through ict |
285. |
In a Computer a byte generally consists of: |
A. | (1) 4 bits |
B. | (2) 8 bits |
C. | (3) 16 bits |
D. | (4) 10 bits |
Answer» B. (2) 8 bits |
286. |
Which of the following is not an input device? |
A. | (1) microphone |
B. | (2) keyboard |
C. | (3) joystick |
D. | (4) monitor |
Answer» D. (4) monitor |
287. |
Which of the following is an open source software? |
A. | (1) ms word |
B. | (2) windows |
C. | (3) mozilla firefox |
D. | (4) acrobat reader |
Answer» C. (3) mozilla firefox |
288. |
Which of the following enables us to send the same letter to different persons in MS Word? |
A. | (1) mail join |
B. | (2) mail copy |
C. | (3) mail insert |
D. | (4) mail merge |
Answer» D. (4) mail merge |
289. |
If the binary equivalent of the decimal number 48 is 110000, then the binary equivalent of the decimal number 51 is given by |
A. | (1) 110011 |
B. | (2) 110010 |
C. | (3) 110001 |
D. | (4) 110100 |
Answer» A. (1) 110011 |
290. |
The process of copying files to a CD-ROM is known as |
A. | (1) burning |
B. | (2) zipping |
C. | (3) digitizing |
D. | (4) ripping |
Answer» A. (1) burning |
291. |
An unsolicited e-mail message sent to many recipients at once is a |
A. | (1) worm |
B. | (2) virus |
C. | (3) threat |
D. | (4) spam |
Answer» D. (4) spam |
292. |
_________ is a type of memory circuitry that holds the computer’s start-up routine. |
A. | (1) rim (read initial memory) |
B. | (2) ram (random access memory) |
C. | (3) rom (read only memory) |
D. | (4) cache memory |
Answer» C. (3) rom (read only memory) |
293. |
With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is called |
A. | electronic mail |
B. | data sourcing |
C. | mail merge |
D. | spam mail |
Answer» C. mail merge |
294. |
DVD technology uses an optical media to store the digital data. DVD is an acronym for |
A. | digital vector disc |
B. | digital volume disc |
C. | digital versatile disc |
D. | digital visualization disc |
Answer» C. digital versatile disc |
295. |
What is the name for a webpage address? |
A. | domain |
B. | directory |
C. | protocol |
D. | url |
Answer» D. url |
296. |
Which of the following domains is used for - profit businesses? |
A. | .org |
B. | .net |
C. | .edu |
D. | .com |
Answer» D. .com |
297. |
What is the full form of USB as used in computer related activities? |
A. | ultra security block |
B. | universal security block |
C. | universal serial bus |
D. | united serial bus |
Answer» C. universal serial bus |
298. |
Which of the following represents billion characters? |
A. | terabytes |
B. | megabytes |
C. | kilobytes |
D. | gigabytes |
Answer» D. gigabytes |
299. |
Who among the following had established UIDAI by passing Aadhaar Act, 2016 |
A. | state government |
B. | government of india |
C. | registrars |
D. | enrolment agency |
Answer» B. government of india |
300. |
When was UIDAI established as Statutory Authority under Ministry of Electronics and I.T ? |
A. | 28th january, 2009 |
B. | 29th september, 2010 |
C. | 12th september, 2015 |
D. | 12th july, 2016 |
Answer» D. 12th july, 2016 |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.