MCQs - Chapter 3



Chapter 3 –Information System & Its Components

MCQ Type Questions


(1)Which of the following is not a characteristic of a System?
(a)System compromises of mutually related & cooperating elements.
(b)System may contain several subsystems with sub goals, all contributing to meeting the overall system goal.
(c)Five components of a generic system include Input, Process, Output, Feedback and Control.
(d)In systems, information is used as the input for a process that creates data as an output.


(2)Which of the following is not a characteristic of a Information System?

(a)Information System aims to increase cost of operations.
(b)The main objective of Information System is to convert the data into information which is useful and meaningful.
(c)Information system model highlights the relationships among the components and activities of information systems.
(d)Information systems help enterprise in decision making and controlling the operations.


(3)Identify the one which is not a component of Information Systems:

(a)Data
(b)Computer Network
(c)People
(d)Transaction Processing System


(4)Identify the one which is not a functional unit of Central Processing Unit (CPU):

(a)Output devices
(b) Arithmetic and Logic Unit
(c)Registers
(d)Control Unit


(5)Which of the following is correct full form of RAM?
                .
(a)Random Access Memorandum
(b)Random Access Memory
(c)Read Accessible Memory
(d)Read Authorization Memory


(6)Identify the term which is not used in Relational Database Models:

(a)Domain
(b)Relations
(c)Objects
(d)Attributes


(7)Which of the following is not an example of commercial available DBMS?

(a)Oracle
(b)Java
(c)My SQL
(d)SQL Servers


(8)What is the full form of VoIP?

(a)Valid Internet Protocol
(b)Voice Over Internet Protocol
(c)Voice Over Internet Price
(d)Voice Over Internet Performance


(9)Which of the following is not one of the controls lacking in a computerized environment?

(a)Lack of management support and understanding of IS risks and related controls.
(b)Lack of awareness and knowledge of IS risks and controls among the employees.
(c)Absence or inadequate IS control framework.
(d)Ease of implementation of controls in network environments. 


(10)Identify the control which is not corrective in nature:

(a)Hash Totals
(b)Business Continuity Plan
(c)Rerun Procedure
(d)Backup Procedure


(11)Which of the following is the process of conversion of data into a cipher text for storage in databases and transmission over networks?

(a)Networking
(b)Decryption
(c) Encryption   
(d)Logging


(12)Which of the following is the process of re-conversion of cipher text into plain text?

(a)Networking
(b)Decryption
(c) Encryption   
(d)Logging


(13)Which of the following error occurs when a digit or character is removed?

(a) Addition Error
(b) Transposition Error
(c) Substitution Error
(d)Truncation Error


(14)Which of the following error occurs when an extra digit or character is added to the code?

(a)Transposition Error
(b)Substitution Error
(c)Addition Error
(d)Truncation Error


(15)Which of the following error occurs when one digit is replaced with another digit?

(a)Transposition Error
(b)Substitution Error
(c)Addition Error
(d)Truncation Error


(16)Which of the following error occurs when two digits are reversed?

(a)Transposition Error
(b)Substitution Error
(c)Addition Error
(d)Truncation Error


(17)Which of the following refers to the ability of a network to recover from any kind of error like connection failure, loss of data etc.?

(a)Bandwidth
(b)Resilience
(c)Contention
(d)Routing


(18)Which of the following refers to the amount of data which can be sent across a network in given time?

(a)Bandwidth
(b)Resilience
(c)Contention
(d) Routing


(19)Which of the following refers to the process of deciding on how to communicate the data from source to destination in a network?

(a)Bandwidth
(b)Resilience
(c)Contention
(d) Routing

Click here for the correct answer

(20)Which of the following refers to the situation that arises when there is a conflict for some common resource in a network?

(a)Bandwidth
(b)Resilience
(c)Contention
(d)Routing


(21)Which of the following application controls, maintains the chronology of events that occur when a user attempts to gain access to and employ systems resources?

(a)Boundary Controls
(b)Input Controls
(c)Communication Controls
(d)Processing Controls


(22)Which of the following application controls, maintains the chronology of events that occur either to the database definition or the database itself?

(a)Boundary Controls
(b)Input Controls
(c)Database Controls
(d)Processing Controls



(23)Which of the following application controls, maintains the chronology of events from the time data and instructions are captured and entered into an application system until the time they are deemed valid and passed onto other subsystems within the application system ?

(a)Boundary Controls
(b)Input Controls
(c)Database Controls
(d)Processing Controls


(24)Which of the following application controls, maintains a chronology of the events from the time a sender dispatches a message to the time a receiver obtains the message?

(a)Boundary Controls
(b)Input Controls
(c)Database Controls
(d)Communication Controls


(25)Which of the following technique involves embedding audit software modules within a host application system to provide continuous monitoring of the system’s transactions?

(a)Audit hooks
(b) SCARF
(c)Integrated Test Facility (ITF)
(d)Continuous and Intermittent Simulation (CIS)


(26)What is the full form of CIS?

(a)Common Integrated System
(b)Common Integrated Simulation
(c)Continuous and Integrated System 
(d)Continuous and Intermittent Simulation


(27) In which technique, picture are taken of the transactions as transaction moves through various stages in the application system?
(a)Audit hooks
(b) Snapshots
(c)Integrated Test Facility (ITF)
(d)Continuous and Intermittent Simulation (CIS)


(28)Which of the following technique can be used whenever the application system uses the database management system (DBMS)?
(a)Audit hooks
(b) SCARF
(c)Integrated Test Facility (ITF)
(d)Continuous and Intermittent Simulation (CIS)


(29)In which of the following technique, auditor enters dummy or test transactions and verify the processing and results of these transactions for correctness?

(a)Audit hooks
(b) SCARF
(c)Integrated Test Facility (ITF)
(d)Continuous and Intermittent Simulation (CIS)


(30)What is the full form of SCARF?

(a)System Control Audit Review File
(b)System Consideration for Audit Review File
(c)System Control Audit Report File
(d)System Control Audit Review Format


(31)Which of the following is not an objective of audit trail?

(a)To reconstruct events
(b)To monitor user activities
(c)To detect unauthorized access
(d)To improve system performance


(32)Who among the following is top most leader in a larger IT organization?

(a)Chief Information Officer (CIO)
(b)Chief Technical Officer (CTO)
(c)Chief Information Security Officer (CISO)
(d)Chief Privacy Officer (CPO)


(33)Who among the following is responsible for organization’s overall technology strategy?

(a)Chief Security Officer (CSO)
(b)Chief Technical Officer (CTO)
(c)Chief Information Security Officer (CISO)
(d)Chief Privacy Officer (CPO)


(34)Who among the following is responsible for the overall information systems architecture in the organization?

(a)Systems Architect
(b)Systems Analyst
(c)System Developer
(d)System Programmer


(35)Who among the following is responsible for developing logical and physical designs of data models for applications and also designs an organization’s overall data architecture?

(a)Systems Architect
(b)Database Architect
(c)Database Administrator
(d)System Programmer


(36)Who among the following is responsible for designing data and voice networks and designs changes and upgrades to the network as needed to meet new organization objectives?

(a)Systems Architect
(b)Database Architect
(c)Database Administrator
(d)Network Architect


(37)Which of the following is not a segregation of duties control?

(a)Transaction Authorization
(b)Split custody of high value assets
(c)Workflow
(d)Statutory Audit  


(38)Which of the following is not a component of Information Systems?

(a)People
(b)Data
(c)Network
(d)Transaction Processing System


(39)Which of the following is not a functional unit of Central Processing Unit (CPU)?

(a)Control unit
(b)Input Devices
(c)Registers
(d)Arithmetic and Logic Unit


(40)The full form of RAM is        

(a)Random Access Memory
(b)Read Access Memory
(c)Random Accessible Memory
(d)Random Authorization Memory


(41)Which of the following term is not used in Relational Database Models?

(a)Relations
(b)Attributes
(c)Objects
(d)Tables


(42)Which of the following is not a Corrective Control?

(a)Backup Procedure
(b)Rerun Procedure
(c)Contingency Planning
(d)Hash Totals


(43)                       is the conversion of data into a secret code for storage in databases and transmission over networks.

(a)Cipher Text
(b)Encryption
(c)Decryption
(d)Logging


(44)Under Data Coding Control,      occurs when a digit or character is removed from the end of a code.

(a)Transposition Error
(b)Substitution Error
(c)Addition Error
(d)Truncation Error


(45)In computer networks,           refers to the ability of a network to recover from any kind of error like connection failure, loss of data etc.

(a)Routing
(b)Resilience
(c)Contention
(d)Bandwidth


(46)Under Application Controls,               maintains the chronology of events that occur when a user attempts to gain access to and employ systems resources.

(a)Boundary Controls
(b)Input Controls
(c)Communication Controls
(d)Processing Controls


(47)Under Application Controls,               maintains the chronology of events that occur either to the database definition or the database itself.

(a)Output Controls
(b)Input Controls
(c)Database Controls
(d)Processing Controls

Click here for the correct answer

(48)Which of these is not a mobile operating system?

(a)Android
(b)iOS
(c)Tywin
(d)Windows Phone OS

Click here for the correct answer

(49)Which of these is not an example of Relational Database?

(a)Access
(b)MySQL
(c)Java
(d)Oracle

Click here for the correct answer

(50)VoIP stands for
               
(a)Visual Over Internet Protocol
(b)Voice Over Internet Programme
(c)Voice Outside Internet Protocol
(d)Voice Over Internet Protocol
Click here for the correct answer


(51)                       technique involves embedding audit software modules within a host application system to provide continuous monitoring of the system’s transactions.

(a)Audit hooks
(b)SCARF
(c)Integrated Test Facility (ITF)
(d)Continuous and Intermittent Simulation (CIS)

Click here for the correct answer

(52)SCARF stands for      .

(a)System Control Audit Review File
(b)System Control Audit Report File
(c)Simulation Control Audit Review File
(d)System Control Audit Review Format

Click here for the correct answer