COMPUTER SCIENCE - PAGE 12
1. Errors occur more often when
1. Data is entered by users
2. Data is entered by operators
3. When data is handwritten by users and entered by an operator
4. The key board design is bad
Ans: 3
2. In interactive data input terminal commands are normally used to
1. Enter new data
2. Add/delete data
3. Select one out of many alternatives often by a mouse click
4. Detect errors in data input
Ans: 2
3. Data inputs which required coding are
1. Fields which specify prices
2. Key fields
3. Name fields such as product name
4. Fields which are of variable length
Ans: 2
4. By the term "comprehensive code" we understand that the code
1. Conveys information on item being coded
2. Is of small length
3. Can add new item easily
4. Includes all relevant characteristics of item being coded
Ans: 4
5. Verification is
1. Checking that we are building the right system
2. Checking that we are building the system right
3. Performed by an independent test team
4. Making sure that it is what the user really wants
Ans: 2
6. A regression test
1. Will always be automated
2. Will help ensure unchanged areas of the software have not been affected
3. Will help ensure changed areas of the software have not been affected
4. Can only be run during user acceptance testing
Ans: 2
7. If an expected result is not specified then
1. We cannot run the test
2. It may be difficult to repeat the test
3. It may be difficult to determine if the test has passed or failed
4. We cannot automate the user inputs
Ans: 3
8. Requirement specification is carried out
1. After requirements are determined
2. Before requirements are determined
3. Simultaneously with requirements determination
4. Independent of requirements determination
Ans: 1
9. By economic feasibility of a system we mean that
1. It is economical to operate
2. It is expensive to operate
3. It will be cost-effective if implemented
4. Finances are available to implement the system and it will be cost-effective
Ans: 4
10. The major goal of requirement determination phase of information system development is
1. Determine whether information is needed by an organization
2. Determine what information is needed by an organization
3. Determine how information needed by an organization can be provided
4. Determine when information is to be given
Ans: 2
11. Information requirements of an organization can be determined by
1. Interviewing managers and users and arriving at the requirements based on consensus
2. Finding out what similar organizations do
3. Telling organization what they need based on your experience
4. Sending a questionnaire to all employees of the organization
Ans: 1
12. It is necessary to prioritize information requirements of an organization at the requirements determination phase as
1. It is always good to prioritize
2. There are conflicting demands from users
3. There are constraints on budgets, available time, human resource and requirement
4. all good organization do it
Ans: 3
13. System evaluation is carried out
1. After the system has been operational for a reasonable time
2. During system implementation
3. Whenever managers of user organization want it
4. Whenever operational staff want it
Ans: 1
14. The main objective of feasibility study is
1. To assess whether it is possible to meet the requirements specifications
2. To assess if it is possible to meet the requirements specified subject to Constraints of budget, human resource and hardware
3. To assist the management in implementing the desired system
4. To remove bottlenecks in implementing the desired system
Ans: 2
15. Quantification of goals is required because
1. Without quantification no work can be done
2. When goals are quantified it is possible to verify unambioguously whether they have been fulfilled
3. Goals have to be quantified for a good system
4. It facilitates designing a good system
Ans: 2
16. During feasibility analysis it is necessary to examine several alternative solutions because
( I ). A comparison of alternatives will lead to a cost-effective solution.
( II ). A pre-conceived singlesolution may turn out to be un-implementable.
( III ). It is always good to examine alternatives.
( IV). Management normally looks at alternatives.
1. i and iii
2. i and iv
3. i and ii
4. iiand iv
Ans: 3
17. At the end of the feasibility study the systems analyst
1. Meets the users for a discussion
2. Gives a summary feasibility report to the management
3. Gives a systems proposal to management
4. Tells the top management if the system is not feasible
Ans: 2
18. Data cannot flow from an external entity to an external entity because
1. It will get corrupted
2. It is not allowed in dfd
3. An external entity has no mechanism to read or write
4. Both are outside the context of the system
Ans: 4
19. In on-line data entry it is possible to
1. Give immediate feedback if incorrect data is entered
2. Eliminate all errors
3. Save data entry operators time
4. Eliminate forms
Ans: 1
20. A code is useful to represent a key field because
1. It is a concise representation of the field
2. It is usually done by all
3. It is generally a good idea
4. It is needed in database design
Ans: 1
21. By the term "concise code" we understand that the code
1. Conveys information on item being coded
2. Is of small length
3. Can add new item easily
4. Includes all relevant characteristics of item being coded
Ans: 2
22. By the term "meaningful code" we understand that the code
1. Conveys information on item being coded
2. Is of small length
3. Can add new item easily
4. Includes all relevant characteristics of item being coded
Ans: 1
23. A DFD is normally levelled as
1. It is a good ideal in design
2. It is recommended by many experts
3. It is easy to do it
4. It is easier to read and understand a number of smaller dfds than one large dfd
Ans: 4
24. In UML diagram of a class
1. State of object cannot be represented
2. State is irrelevant
3. State is represented as an attribute
4. State is represented as a result of an operation
Ans: 3
25. Attributes are assigned value
1. When operations are performed on an object
2. When instances of objects are defined
3. When methods are invoked
4. When classes are identified
Ans: 2
1. Data is entered by users
2. Data is entered by operators
3. When data is handwritten by users and entered by an operator
4. The key board design is bad
Ans: 3
2. In interactive data input terminal commands are normally used to
1. Enter new data
2. Add/delete data
3. Select one out of many alternatives often by a mouse click
4. Detect errors in data input
Ans: 2
3. Data inputs which required coding are
1. Fields which specify prices
2. Key fields
3. Name fields such as product name
4. Fields which are of variable length
Ans: 2
4. By the term "comprehensive code" we understand that the code
1. Conveys information on item being coded
2. Is of small length
3. Can add new item easily
4. Includes all relevant characteristics of item being coded
Ans: 4
5. Verification is
1. Checking that we are building the right system
2. Checking that we are building the system right
3. Performed by an independent test team
4. Making sure that it is what the user really wants
Ans: 2
6. A regression test
1. Will always be automated
2. Will help ensure unchanged areas of the software have not been affected
3. Will help ensure changed areas of the software have not been affected
4. Can only be run during user acceptance testing
Ans: 2
7. If an expected result is not specified then
1. We cannot run the test
2. It may be difficult to repeat the test
3. It may be difficult to determine if the test has passed or failed
4. We cannot automate the user inputs
Ans: 3
8. Requirement specification is carried out
1. After requirements are determined
2. Before requirements are determined
3. Simultaneously with requirements determination
4. Independent of requirements determination
Ans: 1
9. By economic feasibility of a system we mean that
1. It is economical to operate
2. It is expensive to operate
3. It will be cost-effective if implemented
4. Finances are available to implement the system and it will be cost-effective
Ans: 4
10. The major goal of requirement determination phase of information system development is
1. Determine whether information is needed by an organization
2. Determine what information is needed by an organization
3. Determine how information needed by an organization can be provided
4. Determine when information is to be given
Ans: 2
11. Information requirements of an organization can be determined by
1. Interviewing managers and users and arriving at the requirements based on consensus
2. Finding out what similar organizations do
3. Telling organization what they need based on your experience
4. Sending a questionnaire to all employees of the organization
Ans: 1
12. It is necessary to prioritize information requirements of an organization at the requirements determination phase as
1. It is always good to prioritize
2. There are conflicting demands from users
3. There are constraints on budgets, available time, human resource and requirement
4. all good organization do it
Ans: 3
13. System evaluation is carried out
1. After the system has been operational for a reasonable time
2. During system implementation
3. Whenever managers of user organization want it
4. Whenever operational staff want it
Ans: 1
14. The main objective of feasibility study is
1. To assess whether it is possible to meet the requirements specifications
2. To assess if it is possible to meet the requirements specified subject to Constraints of budget, human resource and hardware
3. To assist the management in implementing the desired system
4. To remove bottlenecks in implementing the desired system
Ans: 2
15. Quantification of goals is required because
1. Without quantification no work can be done
2. When goals are quantified it is possible to verify unambioguously whether they have been fulfilled
3. Goals have to be quantified for a good system
4. It facilitates designing a good system
Ans: 2
16. During feasibility analysis it is necessary to examine several alternative solutions because
( I ). A comparison of alternatives will lead to a cost-effective solution.
( II ). A pre-conceived singlesolution may turn out to be un-implementable.
( III ). It is always good to examine alternatives.
( IV). Management normally looks at alternatives.
1. i and iii
2. i and iv
3. i and ii
4. iiand iv
Ans: 3
17. At the end of the feasibility study the systems analyst
1. Meets the users for a discussion
2. Gives a summary feasibility report to the management
3. Gives a systems proposal to management
4. Tells the top management if the system is not feasible
Ans: 2
18. Data cannot flow from an external entity to an external entity because
1. It will get corrupted
2. It is not allowed in dfd
3. An external entity has no mechanism to read or write
4. Both are outside the context of the system
Ans: 4
19. In on-line data entry it is possible to
1. Give immediate feedback if incorrect data is entered
2. Eliminate all errors
3. Save data entry operators time
4. Eliminate forms
Ans: 1
20. A code is useful to represent a key field because
1. It is a concise representation of the field
2. It is usually done by all
3. It is generally a good idea
4. It is needed in database design
Ans: 1
21. By the term "concise code" we understand that the code
1. Conveys information on item being coded
2. Is of small length
3. Can add new item easily
4. Includes all relevant characteristics of item being coded
Ans: 2
22. By the term "meaningful code" we understand that the code
1. Conveys information on item being coded
2. Is of small length
3. Can add new item easily
4. Includes all relevant characteristics of item being coded
Ans: 1
23. A DFD is normally levelled as
1. It is a good ideal in design
2. It is recommended by many experts
3. It is easy to do it
4. It is easier to read and understand a number of smaller dfds than one large dfd
Ans: 4
24. In UML diagram of a class
1. State of object cannot be represented
2. State is irrelevant
3. State is represented as an attribute
4. State is represented as a result of an operation
Ans: 3
25. Attributes are assigned value
1. When operations are performed on an object
2. When instances of objects are defined
3. When methods are invoked
4. When classes are identified
Ans: 2
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15