MBA/MBA System Analysis and Design Mcq Set 8 Sample Test,Sample questions

Question:
A check-point procedure

1.checks program correctness at certain points

2.divides a program into smaller parts

3.breaks a programs into portions at the end of each of which a check point program is executed

4.finds points in a program where it is convenient to check it


Question:
A digital signature is

1.a bit string giving identity of a correspondent

2.a unique identification of a sender

3.an authentication of an electronic record by tying it uniquely to a key only a sender knows

4.an encrypted signature of a sender


Question:
A firewall is a

1.wall built to prevent fires from damaging a corporate intranet

2.security device deployed at the boundary of a company to prevent unauthorized physical access

3.security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

4.device to prevent all accesses from the internet to the corporate intranet


Question:
A firewall is used in a system connected to a wide area network to

1.prevent spread of fire in the network

2.prevent unauthorized access by hackers

3.to scan for viruses in files

4.to extinguish fire spreading via network cables


Question:
A firewall may be implemented in

1.routers which connect intranet to internet

2.bridges used in an intranet

3.expensive modem

4.user's application programs


Question:
A hardened firewall host on an Intranet is

1.a software which runs in any of the computers in the intranet

2.a software which runs on a special reserved computer on the intranet

3.a stripped down computer connected to the intranet

4.a mainframe connected to the intranet to ensure security


Question:
A proof figure is

1.a figure used to prove the correctness of data entry

2.an additional data entered with each record to facilitate detection of arithmetic error

3.a number used during data entry

4.a modulus-11 check digit


Question:
A relationship check

1.is concerned with checking a relation

2.uses an entity-relationship model for checking

3.finds out if a relationship is satisfied in computation

4.uses the fact that a known relationship exists between two data elements and checks if it is satisfied during computation


Question:
A two way check

1.calculates the same quantity in two different ways and compares them for equality

2.calculates the quantities and compares them for equality

3.checks a data item in two different ways

4.enters data two times and cross-checks them


Question:
An audit trail is established in a system to

1.detect errors in a system

2.enable auditing of a system

3.localize the source of an error in a system

4.trail a program


Question:
ANSI X.12 is a standard developed by

1.American National Standard Institute

2.International Standard Institute

3.European Common Market

4.United Nations Economic Commission for Europe


Question:
Audit in the design of information system is used to

1.inspect the system and check that it is built as per specifications

2.protect data from accidental or intentional loss

3.ensure that the system processes data as it was designed to and that the results are reliable

4.ensure privacy of data processed by it


Question:
auditing with a computer we mean

1.the inputs and the corresponding outputs are compared and checked for correctness

2.the programs and procedures are checked for correctness

3.special synthetic data is input and outputs checked for correctness

4.programs are written to check the functioning of the computer hardware


Question:
B2C commerce

1.includes services such as legal advice

2.means only shopping for physical goods

3.means only customers should approach customers to sell

4.means only customers should approach business to buy


Question:
By applying permutation (31254) and substitution by 5 characters away from current character (A → F , B → G etc..) the following string ABRACADABRA becomes

1.FGWCAAADRBF

2.RABCAAADRBF

3.WFGHFFFIWGF

4.None of the above


Question:
By auditing around the computer we mean

1.the inputs and the corresponding outputs are compared and checked for correctness

2.the programs and procedures are checked for correctness

3.special synthetic data is input and outputs checked for correctness

4.programs are written to check the functioning of the computer hardware


Question:
By auditing through the computer we mean

1.the inputs and the corresponding outputs are compared and checked for correctness

2.the programs and procedures are checked for correctness

3.special synthetic data is input and outputs checked for correctness

4.programs are written to check the functioning of the computer hardware


Question:
By Electronic Commerce we mean:

1.Commerce of electronic goods

2.Commerce which depends on electronics

3.Commerce which is based on the use of internet

4.Commerce which is based on transactions using computers connected by telecommunication network


Question:
By encryption of a text we mean

1.compressing it

2.expanding it

3.scrambling it to preserve its security

4.hashing it


Question:
By information system testing we mean

1.testing an information system correctly

2.determining whether a system is performing as per specifications

3.determining whether a system is performing optimally

4.ensuring proper function of a system


Question:
By string test we mean

1.a test which tests operations with strings

2.a string of tests on programs

3.Test on related programs

4.The output of a program is sent as input to related program(s) to see if data is transferred correctly


Question:
Control in design of an information system is used to

1.inspect the system and check that it is built as per specifications

2.protect data from accidental or intentional loss

3.ensure that the system processes data as it was designed to and that the results are reliable

4.ensure privacy of data processed by it


Question:
DES using 56 bit keys

1.Cannot be broken in reasonable time using presently available computers

2.Can be broken only if the algorithm is known using even slow computers.

3.Can be broken with presently available high performance computers.

4.It is impossible to break ever.


Question:
DES works by using

1.permutation and substitution on 64 bit blocks of plain text

2.only permutations on blocks of 128 bits

3.exclusive ORing key bits with 64 bit blocks

4.4 rounds of substitution on 64 bit blocks with 56 bit keys


Question:
EDI requires

1.representation of common business documents in computer readable form

2.data entry operators by receivers

3.special value added networks

4.special hardware at co-operating Business premises


Question:
EDI use

1.requires an extranet

2.requires value added network

3.can be done on internet

4.requires a corporate intranet


Question:
EDIFACT standard was developed by

1.American National Standard Institute

2.International Standard Institute

3.European Common Market

4.United Nations Economic Commission for Europe


Question:
Electronic Data Interchange is necessary in

1.B2C e-Commerce

2.C2C e-Commerce

3.B2B e-Commerce

4.Commerce using internet


Question:
Encryption can be done

1.only on textual data

2.only on ASCII coded data

3.on any bit string

4.only on mnemonic data


Question:
Firewall as part of a router program

1.filters only packets coming from internet

2.filters only packets coming from internet

3.filters packets travelling from and to the intranet from the internet

4.ensures rapid traffic of packets for speedy e-Commerce


Question:
Hashed message is signed by a sender using

1.his public key

2.his private key

3.receiver's public key

4.receiver's private key


Question:
HTML and XML are markup languages

1.Specially development for the web

2.Are based on SGML

3.Are versions of SGML

4.Independent of SGML


Question:
In auditing with a computer

1.auditing programs are designed and used to check a system

2.the hardware of the computer is thoroughly checked for malfunctions

3.system software is thoroughly checked to ensure error free operations

4.auditors check system with a computer


Question:
In Electronic cash payment

1.a debit card payment system is used

2.a customer buys several electronic coins which are digitally signed by coinissuing bank

3.a credit card payment system is used

4.RSA cryptography is used in the transactions


Question:
In public key encryption if A wants to send an encrypted message to B

1.A encrypts message using his private key

2.A encrypts message using B's private key

3.A encrypts message using B's public key

4.A encrypts message using his public key


Question:
In SET protocol a customer sends a purchase order

1.encrypted with his public key

2.in plain text form

3.encrypted using Bank's public key

4.using digital Signature system


Question:
IP addresses are converted to

1.a binary string

2.alphanumeric string

3.a hierarchy of domain names

4.a hexadecimal string


Question:
Message can be sent more securely using DES by

1.encrypting plain text by a different randomly selected key for each transmission

2.encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system

3.using an algorithm to implement DES instead of using hardware

4.designing DES with high security and not publicizing algorithm used by it


Question:
One of the problems with using SET protocol is

1.the merchant's risk is high as he accepts encrypted credit card

2.the credit card company should check digital signature

3.the bank has to keep a database of the public keys of all customers

4.the bank has to keep a database of digital signatures of all customers


Question:
Organizational measures in control mean

1.a set of well organized methods

2.assignment of appropriate responsibilities to individuals in data processing in an organization

3.proper organization of data

4.creation of an organization for controlling system


Question:
Parallel runs are used

1.during regular operation of an information system

2.when a system is initially implemented

3.whenever errors are found in a computerized system

4.whenever management insists


Question:
Public key encryption method is a system

1.which uses a set of public keys one for each participant in e-Commerce

2.in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him

3.which uses the RSA coding system

4.which is a standard for use in e-Commerce


Question:
Security in the design of information system is used to

1.inspect the system and check that it is built as per the specifications

2.protect data and programs from accidental or intentional loss

3.ensure that the system processes data as it was designed to and that the results are reliable

4.ensure privacy of data processed by it


Question:
The bank has to have the public keys of all customers in SET protocol as it has to

1.check the digital signature of customers

2.communicate with merchants

3.communicate with merchants credit card company

4.certify their keys


Question:
The purpose of parallel run is to

1.to see whether outputs of a newly computerized system matches those of currently running manual or legacy system

2.have redundancy for reliability

3.test an operational information system

4.test a system being newly designed


Question:
The scope of the system test includes

1.both computerized and manual procedures

2.only test of computer procedures

3.computerized procedures, manual procedures, computer operations and controls

4.mainly computerized procedures and operations controls


Question:
The Secure Electronic Transaction protocol is used for

1.credit card payment

2.credit card payment

3.electronic cash payments

4.payment of small amounts for internet services


Question:
Triple DES

1.is a symmetric key encryption method

2.guarantees excellent security

3.is implementable as a hardware VLSI chip

4.is public key encryption method with three keys.


Question:
Triple DES

1.Cannot be broken in reasonable time using presently available computers.

2.Can be broken only if the algorithm is known using even slow computer.

3.Can be broken with presently available high performance computers.

4.It is impossible to break ever.


Question:
While sending a signed message, a sender

1.sends message key using public key encryption using DES and hashed message using public key encryption

2.sends message using public key encryption and hashed message using DES

3.sends both message and hashed message using DES

4.sends both message and hashed message using public key encryption


More MCQS

  1. MBA Accounting MCQ Question Set 1
  2. MBA Accounting MCQ Question Set 2
  3. MBA Accounting MCQ Question Set 3
  4. MBA Accounting MCQ Question Set 4
  5. MBA Accounting MCQ Question Set 5
  6. MBA Accounting MCQ Question Set 6
  7. MBA Accounting MCQ Question Set 7
  8. MBA Accounting MCQ Question Set 8
  9. MBA Accounting MCQ Question Set 9
  10. MBA Accounting MCQ Question Set 10
  11. MBA Advertising and Sales Promotion Mcq Set 1
  12. MBA Advertising and Sales Promotion Mcq Set 2
  13. MBA Advertising and Sales Promotion Mcq Set 3
  14. MBA Advertising and Sales Promotion Mcq Set 4
  15. MBA Advertising and Sales Promotion Mcq Set 5
  16. MBA Advertising and Sales Promotion Mcq Set 6
  17. MBA Advertising and Sales Promotion Mcq Set 7
  18. MBA Advertising and Sales Promotion Mcq Set 8
  19. MBA Advertising and Sales Promotion Mcq Set 9
  20. MBA Advertising and Sales Promotion Mcq Set 10
  21. MBA Advertising and Sales Promotion Mcq Set 11
  22. MBA Advertising and Sales Promotion Mcq Set 12
  23. MBA Advertising and Sales Promotion Mcq Set 13
  24. MBA Behavioural and Allied Sciences MCQ Set 1
  25. MBA Behavioural and Allied Sciences MCQ Set 2
  26. MBA Behavioural and Allied Sciences MCQ Set 3
  27. MBA Behavioural and Allied Sciences MCQ Set 4
  28. MBA Behavioural and Allied Sciences MCQ Set 5
  29. MBA Behavioural and Allied Sciences MCQ Set 6
  30. MBA Behavioural and Allied Sciences MCQ Set 7
  31. MBA Behavioural and Allied Sciences MCQ Set 8
  32. MBA Behavioural and Allied Sciences MCQ Set 9
  33. MBA Behavioural and Allied Sciences MCQ Set 10
  34. MBA Brand Management MCQ Set 1
  35. MBA Brand Management MCQ Set 2
  36. MBA Brand Management MCQ Set 3
  37. MBA Brand Management MCQ Set 4
  38. MBA Brand Management MCQ Set 5
  39. MBA Business Communication MCQ Set 1
  40. MBA Business Communication MCQ Set 2
  41. MBA Business Communication MCQ Set 3
  42. MBA Business Communication MCQ Set 4
  43. MBA Business Communication MCQ Set 5
  44. MBA Business Communication MCQ Set 6
  45. MBA Business Communication MCQ Set 7
  46. MBA Business Communication MCQ Set 8
  47. MBA Business Communication MCQ Set 9
  48. MBA Brand Management MCQ Set 10
  49. MBA Brand Management MCQ Set 11
  50. MBA Business Economics MCQ Set 1
  51. MBA Business Economics MCQ Set 2
  52. MBA Business Economics MCQ Set 3
  53. MBA Business Economics MCQ Set 4
  54. MBA Business Economics MCQ Set 5
  55. MBA Business Economics MCQ Set 6
  56. MBA Business Environment MCQ Set 1
  57. MBA Business Environment MCQ Set 2
  58. MBA Business Environment MCQ Set 3
  59. MBA Business Environment MCQ Set 4
  60. MBA Business Environment MCQ Set 5
  61. MBA Business Environment MCQ Set 6
  62. MBA Business Environment MCQ Set 7
  63. MBA Business Environment MCQ Set 8
  64. MBA Business Environment MCQ Set 9
  65. MBA Business Ethics and Governance MCQ Set 1
  66. MBA Business Law Mcq Set 1
  67. MBA Business Law Mcq Set 2
  68. MBA Business Law Mcq Set 3
  69. MBA Business Law Mcq Set 4
  70. MBA Business Law Mcq Set 5
  71. MBA Business Law Mcq Set 6
  72. MBA Business Law Mcq Set 7
  73. MBA Business Law Mcq Set 8
  74. MBA Business Law Mcq Set 9
  75. MBA Business Mathematics Mcq Set 1
  76. MBA Business Mathematics Mcq Set 2
  77. MBA Business Mathematics Mcq Set 3
  78. MBA Business Mathematics Mcq Set 4
  79. MBA Business Mathematics Mcq Set 5
  80. MBA Business Mathematics Mcq Set 6
  81. MBA Business Statistics Mcq Set 1
  82. MBA Business Statistics Mcq Set 2
  83. MBA Computers In Management Mcq Set 1
  84. MBA Computers In Management Mcq Set 2
  85. MBA Computers In Management Mcq Set 3
  86. MBA Computers In Management Mcq Set 4
  87. MAB Cost and Managerial Accounting Mcq Set 1
  88. MBA Cost and Managerial Accounting Mcq Set 1
  89. MBA Cost and Managerial Accounting Mcq Set 2
  90. MBA Cost and Managerial Accounting Mcq Set 3
  91. MBA Cost and Managerial Accounting Mcq Set 4
  92. MBA Cost and Managerial Accounting Mcq Set 5
  93. MBA Cost and Managerial Accounting Mcq Set 6
  94. MBA Cost and Managerial Accounting Mcq Set 7
  95. MBA Cost and Managerial Accounting Mcq Set 8
  96. MBA Cost and Managerial Accounting Mcq Set 9
  97. MBA Cost and Managerial Accounting Mcq Set 10
  98. MBA Cost and Managerial Accounting Mcq Set 11
  99. MBA E-Business MCQ Set 1
  100. MBA E-Business MCQ Set 2
  101. MBA E-Business MCQ Set 3
  102. MBA E-Business MCQ Set 4
  103. MBA English Language MCQ Set 1
  104. MBA English Language MCQ Set 2
  105. MBA Entrepreneurship Management MCQ Set 1
  106. MBA Entrepreneurship Management MCQ Set 2
  107. MBA Entrepreneurship Management MCQ Set 3
  108. MBA Entrepreneurship Management MCQ Set 4
  109. MBA Entrepreneurship Management MCQ Set 5
  110. MBA Entrepreneurship Management MCQ Set 6
  111. MBA Financial Management MCQ Set 1
  112. MBA Financial Management MCQ Set 2
  113. MBA Financial Management MCQ Set 3
  114. MBA Financial Management MCQ Set 4
  115. MBA Financial Management MCQ Set 5
  116. MBA Financial Management MCQ Set 6
  117. MBA Financial Management MCQ Set 7
  118. MBA Financial Management MCQ Set 8
  119. MBA Financial Management MCQ Set 9
  120. MBA Financial Management MCQ Set 10
  121. MBA Financial Management MCQ Set 11
  122. MBA Financial Management MCQ Set 12
  123. MBA Human Resource Management Mcq Set 1
  124. MBA Human Resource Management Mcq Set 2
  125. MBA Human Resource Management Mcq Set 3
  126. MBA Human Resource Management Mcq Set 4
  127. MBA Human Resource Management Mcq Set 5
  128. MBA Human Resource Management Mcq Set 6
  129. MBA Human Resource Management Mcq Set 7
  130. MBA Human Resource Management Mcq Set 8
  131. MBA Insurance and Risk Management Mcq Set 1
  132. MBA Insurance and Risk Management Mcq Set 2
  133. MBA Insurance and Risk Management Mcq Set 3
  134. MBA Insurance and Risk Management Mcq Set 4
  135. MBA Insurance and Risk Management Mcq Set 5
  136. MBA Insurance and Risk Management Mcq Set 6
  137. MBA Management Information Systems Mcq Set 1
  138. MBA Management Information Systems Mcq Set 2
  139. MBA Management Information Systems Mcq Set 3
  140. MBA Management Information Systems Mcq Set 4
  141. MBA Management Information Systems Mcq Set 5
  142. MBA Management Information Systems Mcq Set 6
  143. MBA Management Information Systems Mcq Set 7
  144. MBA Management Information Systems Mcq Set 8
  145. MBA Management Information Systems Mcq Set 9
  146. MBA Marketing Management Mcq Set 1
  147. MBA Marketing Management Mcq Set 2
  148. MBA Marketing Management Mcq Set 3
  149. MBA Marketing Management Mcq Set 4
  150. MBA Marketing Management Mcq Set 5
  151. MBA Marketing Management Mcq Set 6
  152. MBA Marketing Management Mcq Set 7
  153. MBA Marketing Management Mcq Set 8
  154. MBA Marketing Management Mcq Set 9
  155. MBA Marketing Management Mcq Set 10
  156. MBA Marketing Management Mcq Set 11
  157. MBA Marketing Management Mcq Set 12
  158. MBA Marketing Management Mcq Set 13
  159. MBA Media Planning Mcq Set 1
  160. MBA Media Planning Mcq Set 2
  161. MBA Media Planning Mcq Set 3
  162. MBA Media Planning Mcq Set 4
  163. MBA Operations Research Mcq Set 1
  164. MBA Operations Research Mcq Set 2
  165. MBA Operations Research Mcq Set 3
  166. MBA Operations Research Mcq Set 4
  167. MBA Operations Research Mcq Set 5
  168. MBA Organisational Behavior Mcq Set 1
  169. MBA Organisational Behavior Mcq Set 2
  170. MBA Organisational Behavior Mcq Set 3
  171. MBA Organisational Behavior Mcq Set 4
  172. MBA Principles and Practices of Management Mcq Set 1
  173. MBA Principles and Practices of Management Mcq Set 2
  174. MBA Principles and Practices of Management Mcq Set 3
  175. MBA Principles and Practices of Management Mcq Set 4
  176. MBA Principles and Practices of Management Mcq Set 5
  177. MBA Principles and Practices of Management Mcq Set 6
  178. MBA Principles and Practices of Management Mcq Set 7
  179. MBA Principles and Practices of Management Mcq Set 8
  180. MBA Principles and Practices of Management Mcq Set 9
  181. MBA Production and Operations Management Mcq Set 1
  182. MBA Production and Operations Management Mcq Set 2
  183. MBA Production and Operations Management Mcq Set 3
  184. MBA Production and Operations Management Mcq Set 4
  185. MBA Production and Operations Management Mcq Set 5
  186. MBA Production and Operations Management Mcq Set 6
  187. MBA Production and Operations Management Mcq Set 7
  188. MBA Production and Operations Management Mcq Set 8
  189. MBA Production and Operations Management Mcq Set 9
  190. MBA Production and Operations Management Mcq Set 10
  191. MBA System Analysis and Design Mcq Set 1
  192. MBA System Analysis and Design Mcq Set 2
  193. MBA System Analysis and Design Mcq Set 3
  194. MBA System Analysis and Design Mcq Set 4
  195. MBA System Analysis and Design Mcq Set 5
  196. MBA System Analysis and Design Mcq Set 6
  197. MBA System Analysis and Design Mcq Set 7
  198. MBA System Analysis and Design Mcq Set 8
  199. MBA System Analysis and Design Mcq Set 9
  200. MBA Total Quality Management Mcq Set 1
  201. MBA Total Quality Management Mcq Set 2
  202. MBA Total Quality Management Mcq Set 3
  203. MBA Total Quality Management Mcq Set 4
  204. MBA Total Quality Management Mcq Set 5
  205. MBA Total Quality Management Mcq Set 6
  206. MBA Total Quality Management Mcq Set 7
  207. MBA Total Quality Management Mcq Set 8
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!