A. Select the best answer from the alternates: 10X1=10
1. There are …………. Layers in OSI Reference Model:
(a) 3 (b) 4 (c) 5 (d) 7
2. ………….. Layer is there in between Physical and Network layer in OSI Model:
(a) Transport (b) Presentation (c) Data Link (d) Physical
3. The Network driver software is in the layer:
(a) Application
(b) Presentation
(c) Data Link
(d) Physical
4. Which of the following protocols is in Transport layer of TCP/IP?
(a) TCP (b) FTP (c) RPC (d) All of the above
5. Physical Address of NIC is also called:
(a) TCP (b) IP (c) MAC (d) POP
6. The IP address is converted into physical address by:
(a) ARP (b) RARP (c) SMTP (d) ICMP
7. The number of bits in IPv6 address is:
(a) 32 (b) 64 (c) 128 (d) 256
8. The FTP has port number
(a) 21 (b) 23 (c) 67 (d) 110
9. Which protocol is used to transfer HTML script over the network?
(a) SMTP (b) HTTP (c) POP (d) FTP
10. TTL stands for:
(a) Time to Link (b) Time to Leave (c) Transfer Time Limitation (d) Try to Leave
B. Select the answer from: 10X2=20
1. IETF sands for:
(a) Internet Engineers Task Force
(b) Internet Electronic Task Force
(c) Internet Engineers Time Force
(d) Intranet Engineers Task Force
2. RIP-2 supports:
(a) CIDR and VLSM (b) Multitasking (c) RIP-1 (d) All of the above
3. What is Class-D IP address used for?
(a) Broadcast (b) Multicast (c) Anycast (d) Future Use
4. In Class C, which of the following range of first octet is used in IP address?
(a) 240-247 (b) 224-239 (c) 192-223 (d) 128-191
5. WWW stands for:
(a) Wide World Web
(b) World Wide Wave
(c) World Wide Web
(d) Web World Wide
6. Which of the following organization is not related with IP Administration?
(a) ARIN (b) RIPE (c) APNIC (d) ABU
7. Which of the following protocol is not connection oriented?
(a) RPC (b) IP (c) UDP (d)All of the above
8. Which of the following is connection oriented protocol?
(a) TFTP (b) DNS (c) TCP (d) UDP
9. Which of the following protocols use well known ports?
(a) FTP (b) TCP (c) UDP (d) All of the above
10. The range of ephemeral port is:
(a) 1-1023 (b) 1024-65535 (c) 1-100 (d) Non All of the above
C. Select the best answer from: 5X4=20
1. Which of the following protocols use TCP?
(a) FTP (b) Telnet (c) IPC (d) All of the above
2. In OSI model, which of the following groups of layers belong to communication subnet boundary?
(a) Application, Presentation and Session
(b) Presentation, Session and Transport
(c) Transport, Network and Data Link
(d) Network, Data Link and Physical
3. IPC stands for:
(a) Inter Packet Communication
(b) Internet Packet Connection
(c) Inter Process Communication
(d) Non of the above
4. SACK stands for?
(a) Selective Acknowledgement (b) Single Acknowledgement (c) Small Acknowledgement (d) Non of the above
5. In class A network, the maximum possible number of networks are:
(a) 65534 (b) 254 (c) 14 (d) 30
D. Subjective Questions: 5X10=50
(a) Explain window principle applied in TCP.
(b) What do you mean by sockets and ports?
(c) Why is RIP-2 popular in comparision to RIP?
(d) i. What is Fragmentation?
ii. What is OSPF?
(e) Write short notes on:
i. TCP
ii. UDP
Coming soon.... from FEB 15
Coming soon......
Thursday, January 6, 2011
MSC IT IV CSA 2nd
MscIT 4th Semester Client Server Architecture 2 credit hours
1 Marks
1. __________ is the standard CORBA protocol for ORB-to-ORB interworking
a) TCP/IP
b) IIOP
c) HTTP
d) FTP
2. In a ___________ architecture server download files from shared location to the desktop environment.
a. Mainframe architecture
b. File Sharing architecture
c. Client/Server architecture
d. Distributed/Collaborative enterprise architecture
3. OSF stands for ______________________
a. Open Systems Foundation
b. Open Source File
c. Open Systems File
d. None
4. File sharing architecture can support simultaneously _______________ number of users.
a. 12
b. 8
c. 100
d. 20
5. In RMI a typical server application creates a number of remote objects.
a) True -x
b) False
6. The two tier architecture improves scalability by accommodating up to _____________ users.
a. 12
b. 1000
c. 100
d. 200
7. New Java RMI functionality is added to _____________ software to expand the functionality of Java RMI.
a) JDK 1.2 -x
b) JDK 1.3
c) JDK 1.4
d) JDK 1.5
e) JDK 1.6
8. NFS stands for _____________________________
a. Network File System
b. New File System
c. Net File Sharing
d. None
9. A way to synchronize threads access to shared data is __________________
a. Alerts
b. Mutexes
c. Time slicing
d. None
10. The interfaces and classes that are responsible for specifying the remote behavior of the RMI system are defined in the _________________ package hierarchy.
a) Java.rmi -x
b) Javax.rmi
c) Java.rmi.remote
d) None
2 Marks
11. In CORBA, DSI stands for ________________
a) Dynamic Skeletmn Interface
b) Dynamic Stub Interface
c) Deferred Synchronous Invocation
d) None
12. The RMI registry daemon listens on port ________.
a. 80
b. 1099
c. 6000
d. 109
13. Video or voice data type are supported in ________________
a. RDBMS
b. DBMS
c. ODBMS
d. None
14. OLAP stands for
a. Online Analysis Processor
b. On-line Anticipation processor
c. On-line analytical processor
d. None
15. A ________ for a remote object acts as a Server’s local representative or proxy for the remote object.
a) Skeleton -x
b) Stub
16. Two phase commits are done to maintain ______________ and ___________ within the distributed databases through synchronized locking of all pieces of transaction.
a. Data integrity, consistency
b. Atomicity, consistency
c. Data integrity, accuracy
d. Durability, consistency
17. In RMI remote object is described by one or more_____________, which interfaces are written in the Java programming language that declare the methods of the remote object.
a) Distributed objects
b) remote interfaces –x
c) remote objects
d) remote methods
18. _______________ is considered as second generation of TP Monitor
a. Messaging Server
b. Application Server
c. DBMS Server
d. None
4 marks
19. The exception java.rmi.RemoteException is thrown when a remote method invocation fails for some reason:
I. Communication failure(the remote server is unreachable or is refusing connections; the connection is close by the server, etc.)
II. Failure during parameter or return value marshalling or unmarshalling
III. Protocols errors
Choose the correct answers
a) I true, II and III false
b) I false, II and III false
c) I,II,III true –x
d) I, II, III false
20. What messaging communication component such as CORBA does? Select all possible answers?
a. The implementation details of networking and protocols
b. The location and distribution of data, process, and hosts
c. Production environment services such as transaction management, security messaging reliability, and persistent storage
d. All
21. Building powerful distributed applications with Java RMI technology is simple four step process:
1) Implement the remote objects
2) Define the interfaces to your remote objects
3) Run rmic on remote implementation classes
4) Make code network-accessible
Choose correct order
a) 1, 2, 3, 4
b) 2, 1, 3, 4 -x
c) 3, 1, 2, 4
d) 2, 3, 1, 4
22. Inter-process communication (IPC) is a mechanism to ___________
a. Transfer data over the network
b. Memory management technique
c. Share data between two host
d. None
23. A) The ORB is the distributed service that implements the request to the remote object.
B) ORB is the CORBA communication channel.
a) Statement A true, statement B false
b) Statement A false, statement true
c) Both statement A and B are true
d) Both statement A and B are false
24. _______________ is to synchronize the check of a local computer with Universal Coordinated Time (UTC), as well as clocks of other computers on the network.
a. Directory Service
b. Security services
c. Time services
d. None
25. Kerberos is ___________
a. Send data over the network
b. Inter-process data exchange
c. Allow the client to exchange encrypted information with authentication server
d. All
1 Marks
1. __________ is the standard CORBA protocol for ORB-to-ORB interworking
a) TCP/IP
b) IIOP
c) HTTP
d) FTP
2. In a ___________ architecture server download files from shared location to the desktop environment.
a. Mainframe architecture
b. File Sharing architecture
c. Client/Server architecture
d. Distributed/Collaborative enterprise architecture
3. OSF stands for ______________________
a. Open Systems Foundation
b. Open Source File
c. Open Systems File
d. None
4. File sharing architecture can support simultaneously _______________ number of users.
a. 12
b. 8
c. 100
d. 20
5. In RMI a typical server application creates a number of remote objects.
a) True -x
b) False
6. The two tier architecture improves scalability by accommodating up to _____________ users.
a. 12
b. 1000
c. 100
d. 200
7. New Java RMI functionality is added to _____________ software to expand the functionality of Java RMI.
a) JDK 1.2 -x
b) JDK 1.3
c) JDK 1.4
d) JDK 1.5
e) JDK 1.6
8. NFS stands for _____________________________
a. Network File System
b. New File System
c. Net File Sharing
d. None
9. A way to synchronize threads access to shared data is __________________
a. Alerts
b. Mutexes
c. Time slicing
d. None
10. The interfaces and classes that are responsible for specifying the remote behavior of the RMI system are defined in the _________________ package hierarchy.
a) Java.rmi -x
b) Javax.rmi
c) Java.rmi.remote
d) None
2 Marks
11. In CORBA, DSI stands for ________________
a) Dynamic Skeletmn Interface
b) Dynamic Stub Interface
c) Deferred Synchronous Invocation
d) None
12. The RMI registry daemon listens on port ________.
a. 80
b. 1099
c. 6000
d. 109
13. Video or voice data type are supported in ________________
a. RDBMS
b. DBMS
c. ODBMS
d. None
14. OLAP stands for
a. Online Analysis Processor
b. On-line Anticipation processor
c. On-line analytical processor
d. None
15. A ________ for a remote object acts as a Server’s local representative or proxy for the remote object.
a) Skeleton -x
b) Stub
16. Two phase commits are done to maintain ______________ and ___________ within the distributed databases through synchronized locking of all pieces of transaction.
a. Data integrity, consistency
b. Atomicity, consistency
c. Data integrity, accuracy
d. Durability, consistency
17. In RMI remote object is described by one or more_____________, which interfaces are written in the Java programming language that declare the methods of the remote object.
a) Distributed objects
b) remote interfaces –x
c) remote objects
d) remote methods
18. _______________ is considered as second generation of TP Monitor
a. Messaging Server
b. Application Server
c. DBMS Server
d. None
4 marks
19. The exception java.rmi.RemoteException is thrown when a remote method invocation fails for some reason:
I. Communication failure(the remote server is unreachable or is refusing connections; the connection is close by the server, etc.)
II. Failure during parameter or return value marshalling or unmarshalling
III. Protocols errors
Choose the correct answers
a) I true, II and III false
b) I false, II and III false
c) I,II,III true –x
d) I, II, III false
20. What messaging communication component such as CORBA does? Select all possible answers?
a. The implementation details of networking and protocols
b. The location and distribution of data, process, and hosts
c. Production environment services such as transaction management, security messaging reliability, and persistent storage
d. All
21. Building powerful distributed applications with Java RMI technology is simple four step process:
1) Implement the remote objects
2) Define the interfaces to your remote objects
3) Run rmic on remote implementation classes
4) Make code network-accessible
Choose correct order
a) 1, 2, 3, 4
b) 2, 1, 3, 4 -x
c) 3, 1, 2, 4
d) 2, 3, 1, 4
22. Inter-process communication (IPC) is a mechanism to ___________
a. Transfer data over the network
b. Memory management technique
c. Share data between two host
d. None
23. A) The ORB is the distributed service that implements the request to the remote object.
B) ORB is the CORBA communication channel.
a) Statement A true, statement B false
b) Statement A false, statement true
c) Both statement A and B are true
d) Both statement A and B are false
24. _______________ is to synchronize the check of a local computer with Universal Coordinated Time (UTC), as well as clocks of other computers on the network.
a. Directory Service
b. Security services
c. Time services
d. None
25. Kerberos is ___________
a. Send data over the network
b. Inter-process data exchange
c. Allow the client to exchange encrypted information with authentication server
d. All
MSC IT IV MIS 2nd
Subject: MIS Code: MT0050 Class: 4 MScIT Time: 2 Hours FM: 100
Instructions
1. Write all the information like roll number, name of the student, class name, semester, subject name, subject code, etc on the Answer Paper.
2. This paper is divided in four Sections namely, A, B, C, and D
3. Section A, B, and C consists of Multiple Choice Questions having 1,2, and 4 marks respectively for each question. Section D consists of subjective questions. There is no negative marking.
4. Write all the answers on the answer sheets provided and don't write anything on the question paper
5. One has to pass in objective mode and subjective mode section separately. One has to score at least 40% in objective mode and 30% in subjective mode and 50% in aggregate in order to pass in each subject.
Group A (1 × 20 = 20)
1. The is automated to work on the knowledge based data and information required in a particular domain of management activity.
(a) Transaction processing systems (b) Knowledge based systems
(c) On line analytical processing systems d) Executive information systems
2. ______ helps in reorganization of the entire work force along with various flows, minimizing the wastages, and giving the system a new dimension.
(a) Automated expert system (b) Business process reengineering
(c) Artificial Intelligence (d) None of the above
3. Software and system metrics provides
(a) Activity of approximating the time, cost and benefits of development systems
(b) Provides an encyclopedia of techniques and tools
(c) Measuring and analyzing developer productivity
(d) Recording facts and specifications of the system
4. System analysis focuses on
(a) Data, Process, Interface and Geography (b) Data, Process, and Interface
(c) Data, Process, Interface and Delivery (d) Data, Process, Geography and User
5. Repository stands for
(a) Place where business data are stored (b) Place where application data are stored
(c) Place where documents are stored (d) Place where system development takes place
6. Study phase in FAST methodology consists of
(a) Establishment of project context, scope, budget, staffing and schedule
(b) Identifies and analyzes both business and technical problem
(c) Specifies the technical requirements for the target solution
(d) Identifies and analyzes both the business and technical and domain for specific problem
7. Prototyping stands for
(a) System designing document (b) Partial but functional version of a system or application
(c) Definition of business requirement design by models (d) Process for structured analysis & information engineering
8. Joint Application Development (JAD) is a method
(a) To change and improve the fundamental business process
(b) Jointly design and define the system
(c) Define new or existing objects that will be combined with existing objects
(d) A process centered techniques
9. Lower CASE tools support
(a) Survey study, definition and design phase (b) Better documentation
(c) Design, construction and delivery phase (d) System synthesis phase
10. Process Management is
(a) Defining, planning, directing, monitoring and controlling a project
(b) On going activities that documents manages & improves an organization chosen activities
(c) Methodology that supports different types of project
(d) Selecting appropriate FAST process
11. CASE repository is
(a) Developers database (b) User's database
(c) Backup database (d) System owner's database
12. DSS tools access data from
(a) Data warehouse (b) Real time data
(c) Transactional data (d) Intelligent network
13. Systems designers are
(a) Database Schema (b) E-R diagram
(c) Business Process (d) Precise language & database technology
14. Interfaces are
(a) How the data, process are distributed to different locations
(b) How the builders implement network using telecommunication language
(c) How the system is connected with other system, and presented to other user
(d) How the process performed to complete the mission of the business
15. System Development Life Cycle is
(a) Physical Process of system building (b) Logical Process of system building
(c) Logical process of using the system (d) Physical process of using the system
16. Systems should be considered as
(a) Capital Investment (b) Capital Expense
(c) Promotional Goods (d) Swift Processor
17. System Analysis focuses on
(a) Data, Process, Interface & geography building blocks from a system user's perspective
(b) The re-assembly of the system's component piece back into a whole system
(c) Information systems professionals who plan implement and support a system
(d) Representation of the essential process of a system along with inputs, outputs, and files
18. The term FAST refers to
(a) Framework for the Advance System Technique (b) Framework for the Application of System Technique
(c) Framework for the Application of System Transfer (d) Framework for the Advancement of the System Technique
19. In n-tired client/server computing
(a) Database stored in server & clients have the business logic
(b) Database and business logic are stored in separate servers
(c) Database and business logic is executed from the client end
(d) Database resides in server where as client has interface only
20. Unit tests
(a) Ensures application works properly when tested with total system
(b) Ensures application works properly when tested in isolation from the program
(c) Ensures application work properly when tested with other program
(d) Ensures application work properly when tested with business process
Group B (2 × 10 = 20)
21. The "trend analysis model" of _____ indicate how different variables behave in trend setting in the _______ .
(a) MIS, Past (b) MIS, Future
(c) DSS, Past & Future (d) MIS, Past & Future
22. A DSS shell is a ______ used to build a _______ DSS
(a) Structure, User oriented (b) Generator, Customized
(c) Program, Customized (d) Shell, Customized
23. The components of DBMS are
(a) Hierarchical Model, Network Model (b) RDBMS, Plugging
(c) DDS, DML (d) DBMS, SQL
24. The mathematical problem represent ____ in term of variables, constants, and parameters expressed in terms of ______
(a) Mathematical problems, Real life situation (b) Real life problems, Algebraic equation
(c) Algebraic equation, Mathematical problems (d) Real life problems, Mathematical equation
25. The components of an IS are
(a) Hardware, Software (b) Input, Output
(c) Processing, Feedback (d) (a), (b) & (c)
26. Top managers may use a(n) ________________, a combination of ___ and DSS, to support their decision making.
(a) GIS, MIS (b) ESS, TPS
(c) Expert system, OA (d) GDSS, MIS
27. SDLC is _____ and has _____ phases
(a) System Design Life Cycle, 5 (b) System Development Life Cycle, 4
(c) System Development Life Cycle, 5 (d) System Development Life Cycle, 6
28. Generally closed systems are _____ and open systems are _______
(a) Deterministic, Probabilistic (b) Probabilistic, Deterministic
(c) Probabilistic, Operational (d) Probabilistic, Statistical
29. Expert system shell is a ________ that can be tailored to a specific problem domain by adding _________ .
(a) Multiprocessor, DBMS (b) Readymade Processor, Knowledge base
(c) Both (a) and (b) (d) None of the Above
30. The DSS model are
(a) OS Model, Mainframe Model (b) Behavioral Model, Operations Research Model
(c) Management Science Model, Behavioral Model (d) (b) or (c)
Group C (4 × 8 = 32)
31. Which of the following statement(s) is/are correct about expert systems?
I. Afford high interactivity II. Aims to replace human thought process
III. Incorporation of expert knowledge in diverse fields IV. Designed specifically for executives
(a) I and IV only (b) I and II only
(c) I, II, and III only (d) I, II, III, and IV
32. The important functions of the management are
(a) Marketing, Management, Controlling, Aligning (b) Planning, Organizing, Controlling, Directing
(c) financing, Accounting, Management, Decision Making (d) Both b) and c)
33. Systems that serve planning, controlling and decision making are ___ and which address unstructured decision to address the ____ Problems are ___ systems. These must be ___.
(a) MIS, Strategic, Executive Support, Integrated (b) TPS, Routine, MIS, Segregated
(c) MIS, Routine, FIS, Integrated (d) Either a) or c)
34. A good data model is
I. Simple II. Essentially non-redundant
III. Complex IV. Flexible
(a) I only (b) III only
(c) I, II & IV only (d) II, III, & IV only
35. Information system consists of
I. Transaction Processing System II. Management Information System III. Intelligent Support System
IV. Office Automation System V. Decision Support System VI. Expert System
(a) I, II, III, and IV only (b) I, II, III, IV and V only
(c) II, III, V and VI only (d) All of the above
36. Behavioral model which is studied under ____ has been categorized into the following types of models ______, ______ and ___ .
(a) MIS, Planning Model, Trend Analysis, Futuristic model (b) ESS, Trend Analysis, Futuristic model, Regression model
(c) DSS, Trend Analysis, Forecasting Analysis, Statistical Analysis (d) Either a) or b)
37. Office Automation Systems are
I. Document Management System II. Communication System III. Teleconferencing System IV. Imaging System V. Electronic Data Interchange VI. Office Support System
(a) I, II, III, IV and VI only (b) I, II, III, and VI only
(c) All of the above (d) None of the above
38. The functions/benefits of an MIS include
(a) Collecting, Storing, Recording, Helping in decision making
(b) Planning, Coordinating, Controlling, Directing
(c) Goal setting, Strategic planning, Evolving business plans, Implementing the plan
(d) Both (a) and (c)
Instructions
1. Write all the information like roll number, name of the student, class name, semester, subject name, subject code, etc on the Answer Paper.
2. This paper is divided in four Sections namely, A, B, C, and D
3. Section A, B, and C consists of Multiple Choice Questions having 1,2, and 4 marks respectively for each question. Section D consists of subjective questions. There is no negative marking.
4. Write all the answers on the answer sheets provided and don't write anything on the question paper
5. One has to pass in objective mode and subjective mode section separately. One has to score at least 40% in objective mode and 30% in subjective mode and 50% in aggregate in order to pass in each subject.
Group A (1 × 20 = 20)
1. The is automated to work on the knowledge based data and information required in a particular domain of management activity.
(a) Transaction processing systems (b) Knowledge based systems
(c) On line analytical processing systems d) Executive information systems
2. ______ helps in reorganization of the entire work force along with various flows, minimizing the wastages, and giving the system a new dimension.
(a) Automated expert system (b) Business process reengineering
(c) Artificial Intelligence (d) None of the above
3. Software and system metrics provides
(a) Activity of approximating the time, cost and benefits of development systems
(b) Provides an encyclopedia of techniques and tools
(c) Measuring and analyzing developer productivity
(d) Recording facts and specifications of the system
4. System analysis focuses on
(a) Data, Process, Interface and Geography (b) Data, Process, and Interface
(c) Data, Process, Interface and Delivery (d) Data, Process, Geography and User
5. Repository stands for
(a) Place where business data are stored (b) Place where application data are stored
(c) Place where documents are stored (d) Place where system development takes place
6. Study phase in FAST methodology consists of
(a) Establishment of project context, scope, budget, staffing and schedule
(b) Identifies and analyzes both business and technical problem
(c) Specifies the technical requirements for the target solution
(d) Identifies and analyzes both the business and technical and domain for specific problem
7. Prototyping stands for
(a) System designing document (b) Partial but functional version of a system or application
(c) Definition of business requirement design by models (d) Process for structured analysis & information engineering
8. Joint Application Development (JAD) is a method
(a) To change and improve the fundamental business process
(b) Jointly design and define the system
(c) Define new or existing objects that will be combined with existing objects
(d) A process centered techniques
9. Lower CASE tools support
(a) Survey study, definition and design phase (b) Better documentation
(c) Design, construction and delivery phase (d) System synthesis phase
10. Process Management is
(a) Defining, planning, directing, monitoring and controlling a project
(b) On going activities that documents manages & improves an organization chosen activities
(c) Methodology that supports different types of project
(d) Selecting appropriate FAST process
11. CASE repository is
(a) Developers database (b) User's database
(c) Backup database (d) System owner's database
12. DSS tools access data from
(a) Data warehouse (b) Real time data
(c) Transactional data (d) Intelligent network
13. Systems designers are
(a) Database Schema (b) E-R diagram
(c) Business Process (d) Precise language & database technology
14. Interfaces are
(a) How the data, process are distributed to different locations
(b) How the builders implement network using telecommunication language
(c) How the system is connected with other system, and presented to other user
(d) How the process performed to complete the mission of the business
15. System Development Life Cycle is
(a) Physical Process of system building (b) Logical Process of system building
(c) Logical process of using the system (d) Physical process of using the system
16. Systems should be considered as
(a) Capital Investment (b) Capital Expense
(c) Promotional Goods (d) Swift Processor
17. System Analysis focuses on
(a) Data, Process, Interface & geography building blocks from a system user's perspective
(b) The re-assembly of the system's component piece back into a whole system
(c) Information systems professionals who plan implement and support a system
(d) Representation of the essential process of a system along with inputs, outputs, and files
18. The term FAST refers to
(a) Framework for the Advance System Technique (b) Framework for the Application of System Technique
(c) Framework for the Application of System Transfer (d) Framework for the Advancement of the System Technique
19. In n-tired client/server computing
(a) Database stored in server & clients have the business logic
(b) Database and business logic are stored in separate servers
(c) Database and business logic is executed from the client end
(d) Database resides in server where as client has interface only
20. Unit tests
(a) Ensures application works properly when tested with total system
(b) Ensures application works properly when tested in isolation from the program
(c) Ensures application work properly when tested with other program
(d) Ensures application work properly when tested with business process
Group B (2 × 10 = 20)
21. The "trend analysis model" of _____ indicate how different variables behave in trend setting in the _______ .
(a) MIS, Past (b) MIS, Future
(c) DSS, Past & Future (d) MIS, Past & Future
22. A DSS shell is a ______ used to build a _______ DSS
(a) Structure, User oriented (b) Generator, Customized
(c) Program, Customized (d) Shell, Customized
23. The components of DBMS are
(a) Hierarchical Model, Network Model (b) RDBMS, Plugging
(c) DDS, DML (d) DBMS, SQL
24. The mathematical problem represent ____ in term of variables, constants, and parameters expressed in terms of ______
(a) Mathematical problems, Real life situation (b) Real life problems, Algebraic equation
(c) Algebraic equation, Mathematical problems (d) Real life problems, Mathematical equation
25. The components of an IS are
(a) Hardware, Software (b) Input, Output
(c) Processing, Feedback (d) (a), (b) & (c)
26. Top managers may use a(n) ________________, a combination of ___ and DSS, to support their decision making.
(a) GIS, MIS (b) ESS, TPS
(c) Expert system, OA (d) GDSS, MIS
27. SDLC is _____ and has _____ phases
(a) System Design Life Cycle, 5 (b) System Development Life Cycle, 4
(c) System Development Life Cycle, 5 (d) System Development Life Cycle, 6
28. Generally closed systems are _____ and open systems are _______
(a) Deterministic, Probabilistic (b) Probabilistic, Deterministic
(c) Probabilistic, Operational (d) Probabilistic, Statistical
29. Expert system shell is a ________ that can be tailored to a specific problem domain by adding _________ .
(a) Multiprocessor, DBMS (b) Readymade Processor, Knowledge base
(c) Both (a) and (b) (d) None of the Above
30. The DSS model are
(a) OS Model, Mainframe Model (b) Behavioral Model, Operations Research Model
(c) Management Science Model, Behavioral Model (d) (b) or (c)
Group C (4 × 8 = 32)
31. Which of the following statement(s) is/are correct about expert systems?
I. Afford high interactivity II. Aims to replace human thought process
III. Incorporation of expert knowledge in diverse fields IV. Designed specifically for executives
(a) I and IV only (b) I and II only
(c) I, II, and III only (d) I, II, III, and IV
32. The important functions of the management are
(a) Marketing, Management, Controlling, Aligning (b) Planning, Organizing, Controlling, Directing
(c) financing, Accounting, Management, Decision Making (d) Both b) and c)
33. Systems that serve planning, controlling and decision making are ___ and which address unstructured decision to address the ____ Problems are ___ systems. These must be ___.
(a) MIS, Strategic, Executive Support, Integrated (b) TPS, Routine, MIS, Segregated
(c) MIS, Routine, FIS, Integrated (d) Either a) or c)
34. A good data model is
I. Simple II. Essentially non-redundant
III. Complex IV. Flexible
(a) I only (b) III only
(c) I, II & IV only (d) II, III, & IV only
35. Information system consists of
I. Transaction Processing System II. Management Information System III. Intelligent Support System
IV. Office Automation System V. Decision Support System VI. Expert System
(a) I, II, III, and IV only (b) I, II, III, IV and V only
(c) II, III, V and VI only (d) All of the above
36. Behavioral model which is studied under ____ has been categorized into the following types of models ______, ______ and ___ .
(a) MIS, Planning Model, Trend Analysis, Futuristic model (b) ESS, Trend Analysis, Futuristic model, Regression model
(c) DSS, Trend Analysis, Forecasting Analysis, Statistical Analysis (d) Either a) or b)
37. Office Automation Systems are
I. Document Management System II. Communication System III. Teleconferencing System IV. Imaging System V. Electronic Data Interchange VI. Office Support System
(a) I, II, III, IV and VI only (b) I, II, III, and VI only
(c) All of the above (d) None of the above
38. The functions/benefits of an MIS include
(a) Collecting, Storing, Recording, Helping in decision making
(b) Planning, Coordinating, Controlling, Directing
(c) Goal setting, Strategic planning, Evolving business plans, Implementing the plan
(d) Both (a) and (c)
Subscribe to:
Comments (Atom)