MCQs - Chapter 3
Chapter 3 –Information System & Its Components
MCQ Type Questions
(1)Which of the
following is not a characteristic of a System?
(a)System compromises of
mutually related & cooperating elements.
(b)System may contain several
subsystems with sub goals, all contributing to meeting the overall system goal.
(c)Five components of a
generic system include Input, Process, Output, Feedback and Control.
(d)In systems, information is used as the input for a process that
creates data as an output.
(2)Which of the
following is not a characteristic of a Information System?
(a)Information System aims to increase cost of operations.
(b)The main objective of
Information System is to convert the data into information which is useful and
meaningful.
(c)Information system model
highlights the relationships among the components and activities of information
systems.
(d)Information systems help
enterprise in decision making and controlling the operations.
(3)Identify the one which is not a component of Information Systems:
(a)Data
(b)Computer Network
(c)People
(d)Transaction Processing System
(4)Identify the one which is not a functional unit of Central
Processing Unit (CPU):
(a)Output devices
(b) Arithmetic and Logic Unit
(c)Registers
(d)Control Unit
(5)Which of the following is correct full form of RAM?
.
(a)Random Access Memorandum
(b)Random Access Memory
(c)Read Accessible Memory
(d)Read Authorization Memory
(6)Identify the term which is not used in Relational Database Models:
(a)Domain
(b)Relations
(c)Objects
(d)Attributes
(7)Which of the following is not an example of commercial available
DBMS?
(a)Oracle
(b)Java
(c)My SQL
(d)SQL Servers
(8)What is the full form of VoIP?
(a)Valid Internet Protocol
(b)Voice Over Internet Protocol
(c)Voice Over Internet Price
(d)Voice Over Internet
Performance
(9)Which of the following is not one of the controls lacking in a computerized environment?
(a)Lack of management support and understanding of IS
risks and related controls.
(b)Lack of awareness and knowledge of IS risks and
controls among the employees.
(c)Absence or inadequate IS control framework.
(d)Ease of
implementation of controls in network environments.
(10)Identify the control which is not corrective in nature:
(a)Hash Totals
(b)Business Continuity Plan
(c)Rerun Procedure
(d)Backup Procedure
(11)Which of the following is the process of conversion of data into a
cipher text for storage in databases and transmission over networks?
(a)Networking
(b)Decryption
(c) Encryption
(d)Logging
(12)Which of the following is the process of re-conversion of cipher
text into plain text?
(a)Networking
(b)Decryption
(c) Encryption
(d)Logging
(13)Which of the following
error occurs when a digit or character
is removed?
(a) Addition Error
(b)
Transposition Error
(c) Substitution Error
(d)Truncation
Error
(14)Which of the following
error occurs when an extra digit or character is added to the code?
(a)Transposition Error
(b)Substitution Error
(c)Addition Error
(d)Truncation Error
(15)Which of the following
error occurs when one digit is replaced with another digit?
(a)Transposition Error
(b)Substitution Error
(c)Addition Error
(d)Truncation Error
(16)Which of the following
error occurs when two digits are reversed?
(a)Transposition Error
(b)Substitution Error
(c)Addition Error
(d)Truncation Error
(17)Which of the following refers to the ability of a network to
recover from any kind of error like connection failure, loss of data etc.?
(a)Bandwidth
(b)Resilience
(c)Contention
(d)Routing
(18)Which of the following refers to the amount of data which can be
sent across a network in given time?
(a)Bandwidth
(b)Resilience
(c)Contention
(d) Routing
(19)Which of the following refers to the process of deciding on how to
communicate the data from source to destination in a network?
(a)Bandwidth
(b)Resilience
(c)Contention
(d) Routing
Click here for the correct
answer
(20)Which of the following refers to the situation that arises when
there is a conflict for some common resource in a network?
(a)Bandwidth
(b)Resilience
(c)Contention
(d)Routing
(21)Which of the following application controls, maintains the
chronology of events that occur when a user attempts to gain access to and
employ systems resources?
(a)Boundary Controls
(b)Input Controls
(c)Communication Controls
(d)Processing Controls
(22)Which of the following application controls, maintains the
chronology of events that occur either to the database definition or the
database itself?
(a)Boundary Controls
(b)Input Controls
(c)Database Controls
(d)Processing Controls
(23)Which of the following application controls, maintains the
chronology of events from the time data and instructions are captured and
entered into an application system until the time they are deemed valid and
passed onto other subsystems within the application system ?
(a)Boundary Controls
(b)Input Controls
(c)Database Controls
(d)Processing Controls
(24)Which of the following application controls, maintains a chronology
of the events from the time a sender dispatches a message to the time a
receiver obtains the message?
(a)Boundary Controls
(b)Input Controls
(c)Database Controls
(d)Communication Controls
(25)Which of the following technique involves embedding audit software
modules within a host application system to provide continuous monitoring of
the system’s transactions?
(a)Audit hooks
(b) SCARF
(c)Integrated Test Facility
(ITF)
(d)Continuous and Intermittent
Simulation (CIS)
(26)What is the full form of CIS?
(a)Common Integrated System
(b)Common Integrated
Simulation
(c)Continuous and Integrated
System
(d)Continuous and Intermittent Simulation
(27) In which technique, picture are taken of the transactions as
transaction moves through various stages in the application system?
(a)Audit hooks
(b) Snapshots
(c)Integrated Test Facility
(ITF)
(d)Continuous and Intermittent
Simulation (CIS)
(28)Which of the following technique can be used whenever the
application system uses the database management system (DBMS)?
(a)Audit hooks
(b) SCARF
(c)Integrated Test Facility
(ITF)
(d)Continuous and Intermittent Simulation (CIS)
(29)In which of the following technique, auditor enters dummy or test
transactions and verify the processing and results of these transactions for
correctness?
(a)Audit hooks
(b) SCARF
(c)Integrated Test Facility (ITF)
(d)Continuous and Intermittent
Simulation (CIS)
(30)What is the full form of SCARF?
(a)System Control Audit Review File
(b)System Consideration for
Audit Review File
(c)System Control Audit Report
File
(d)System Control Audit Review
Format
(31)Which of the following is not an objective of audit trail?
(a)To reconstruct events
(b)To monitor user activities
(c)To detect unauthorized
access
(d)To improve system performance
(32)Who among the following is top most leader in a larger IT
organization?
(a)Chief Information Officer (CIO)
(b)Chief Technical Officer
(CTO)
(c)Chief Information Security
Officer (CISO)
(d)Chief Privacy Officer (CPO)
(33)Who among the following is responsible for organization’s overall
technology strategy?
(a)Chief Security Officer
(CSO)
(b)Chief Technical Officer (CTO)
(c)Chief Information Security
Officer (CISO)
(d)Chief Privacy Officer (CPO)
(34)Who among the following is responsible for the overall information
systems architecture in the organization?
(a)Systems Architect
(b)Systems Analyst
(c)System Developer
(d)System Programmer
(35)Who among the following is responsible for developing logical and
physical designs of data models for applications and also designs an
organization’s overall data architecture?
(a)Systems Architect
(b)Database Architect
(c)Database Administrator
(d)System Programmer
(36)Who among the following is responsible for designing data and voice
networks and designs changes and upgrades to the network as needed to meet new
organization objectives?
(a)Systems Architect
(b)Database Architect
(c)Database Administrator
(d)Network Architect
(37)Which of the following is not a segregation of duties control?
(a)Transaction Authorization
(b)Split custody of high value
assets
(c)Workflow
(d)Statutory Audit
(38)Which of the following is not a component of Information Systems?
(a)People
(b)Data
(c)Network
(d)Transaction Processing System
(39)Which of the following is not a functional unit of Central
Processing Unit (CPU)?
(a)Control unit
(b)Input Devices
(c)Registers
(d)Arithmetic and Logic Unit
(40)The full form of RAM is
(a)Random Access Memory
(b)Read Access Memory
(c)Random Accessible Memory
(d)Random Authorization Memory
(41)Which of the following term is not used in Relational Database
Models?
(a)Relations
(b)Attributes
(c)Objects
(d)Tables
(42)Which of the following is not a Corrective Control?
(a)Backup Procedure
(b)Rerun Procedure
(c)Contingency Planning
(d)Hash Totals
(43) is the conversion of data into a
secret code for storage in databases and transmission over networks.
(a)Cipher Text
(b)Encryption
(c)Decryption
(d)Logging
(44)Under Data Coding Control, occurs when a digit or character is
removed from the end of a code.
(a)Transposition Error
(b)Substitution Error
(c)Addition Error
(d)Truncation Error
(45)In computer networks,
refers to the ability of a network to recover from any kind of error
like connection failure, loss of data etc.
(a)Routing
(b)Resilience
(c)Contention
(d)Bandwidth
(46)Under Application Controls, maintains
the chronology of events that occur when a user attempts to gain access to and
employ systems resources.
(a)Boundary Controls
(b)Input Controls
(c)Communication Controls
(d)Processing Controls
(47)Under Application Controls, maintains
the chronology of events that occur either to the database definition or the
database itself.
(a)Output Controls
(b)Input Controls
(c)Database Controls
(d)Processing Controls
Click here for the correct
answer
(48)Which of these is not a mobile operating system?
(a)Android
(b)iOS
(c)Tywin
(d)Windows Phone OS
Click here for the correct
answer
(49)Which of these is not an example of Relational Database?
(a)Access
(b)MySQL
(c)Java
(d)Oracle
Click here for the correct
answer
(50)VoIP stands for
(a)Visual Over Internet
Protocol
(b)Voice Over Internet
Programme
(c)Voice Outside Internet
Protocol
(d)Voice Over Internet Protocol
Click here for the correct answer
(51) technique involves embedding
audit software modules within a host application system to provide continuous
monitoring of the system’s transactions.
(a)Audit hooks
(b)SCARF
(c)Integrated Test Facility
(ITF)
(d)Continuous and Intermittent Simulation (CIS)
Click here for the correct
answer
(52)SCARF stands for .
(a)System Control Audit Review File
(b)System Control Audit Report
File
(c)Simulation Control Audit
Review File
(d)System Control Audit Review
Format
Click here for the correct answer