0% found this document useful (0 votes)
28 views

MICS

The document contains multiple choice questions about information systems, technology, and business topics. It covers areas like EDI, e-commerce, project management, risk analysis, security controls and more.

Uploaded by

sabin dhakal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

MICS

The document contains multiple choice questions about information systems, technology, and business topics. It covers areas like EDI, e-commerce, project management, risk analysis, security controls and more.

Uploaded by

sabin dhakal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

1.

System providing information to help the management to launch a new product shall be best
classified as
Ans: Strategy

2. the student of institute are usually required to create a document like chart, graphs, handouts
preparing document detections and editing of text. which of the information system suitable for
carrying out these activities?
a) MICS
b) Transaction processing
c) Management system
d) System management

3. EDI Stands for


a) Not universally available
b) Accessable to B2B commerce
c) Not required for B2B commerce still being evolved

4. By electronic commerce we mean-


a) Commerce of electronic goods
b) Commerce which depends on electronic
c) Commerce which is based on usage of internet
d) Commerce which is based on transactions using computer connected by the
telecommunication

5. Enables batch processing which greatly speed of high processing application


a) Scalability
b) Reliability
c) Elasticity
d) Utility

6. A software developer informed the project manager that a portion of application development
is going to take 5 additional days to complete.
a) The project manager should inform to other project participate of the schedule changes ,
b) change the project schedule to reflect the new time create project request
c) adjust the resource budget to account for schedule change

7. Cloud computing also a good option when the cost of infrastructure and management is third
management
a) Low
b) High
c) Moderate
d) None of the above
8. An organization want to reduce the number of user id & password that its employee need to
remember. What is the available best solution to the problem?
a) Password vault for storing user id & password
b) Token authentication and
c) single signing
d) reduce signing

9. While reviewing roles and responsibility IS experts discovered that some IT staffs are serving
multiple roles, which of the following are the greatest concern for IT auditors
a) Networking engineering are performing for quality assurance sake
b) Security administrators are also responsible for system programming
c) IT’s 1st line of support team are responsible for system
d) ABC

10. EDI requires the information of common document computer readable forms
a) Value entry operator by receivers
b) Special value-added networks
c) Special how the company operating business premises
d) Representation of common business document computer develop form

11. When an auditing the purposed acquisition of new computer system an IS audit 1 st
a) There business case has been approved by management
b) Corporate security standard system will be made
c) User will be involved in the implementation plan
d) New system will be the all required user’s function

12. M commerce means


a) Mobile commerce
b) The ability of consumer to reach wherever they are
c) The ability to have large capability of memory storage
d) The ability of business to reach potential costumer wherever they are the might which could
not exist
e) None of the above

13. Cause and effect analysis perform in which of the following phase of system
development(system testing phase ma cause & effect test garxam)
a) Definition
b) Requirement analysis
c) Design
d) Cause & effect

14. A primary benefit derived from organization in flowing control self-assessment techniques,
identify risk areas might need the details review
a) Reduce audit cost
b) Reduce audit time
c) Increase audit accuracy

15. Which of the following may be deployed in computer network as lower cost surveillance in early
warning tools?
a) Honeypot
b) Hardware id
c) Estate full inspection
d) Faithfull login id

16. An alternative processing center that content an application server is known as


a) Cold site
b) Hot site
c) Warm site
d) Clear site

17. Which business model allows the customer name their own price for product & services
a) C2C

18. Which of the following is not an enterprise management practice required in aligning IT Strategy
with enterprise definition?
a) Defining the target IT capability
b) Assessing the current environment capability & performance
c) Communicating the IT strategy & director
d) Mitigating the risk

19. Which of the purpose of critical analysis?


a) Determining the physical recovery target
b) Determining which staff member are must critical
c) Determining which business process are the suitable
d) Determining the maximum computer downtown

20. A collection of servers that is design to operate as single logical server


a) Cluster
b) CAAT
c) Cloud

21. Which category of computer-based information system are concerned with improving the
efficiency by applying information technology to common administrative task such as
a) Creating business
b) Auto machine system
c) Expert teams
d) Strategic information system
Ans : Office automation bhane point auxa
22. Electronic data interchange (EDI) software consists of following layers
a) Business application internal format conversion, edi translator, edi envelop
b) Transport layer
c) Application layer
d) Internal format conversion
e) Network translator

23. Cloud computing shift capital expenditure into expenditure


a) Operating
b) Local
c) Services
d) None of above

24. Using CASE tools CASE stands for


a) Computer aided software engineering

25. Prototype are use in model type analysis


a) Working model of existing system

26. What personal should be involved in the requirement phase of project development
a) System
b) Relation operating development
c) Developer, Analysis, architect and uses

27. What is the purpose of statement of impact?


a) The purpose on business if the project in capability in business
b) The disaster effect on business

28. While auditing the input control in an enterprise ABC, which of the following control will not fall
under preview of input control
a) Source document control
b) Data coding control
c) Boundary control
d) Batch control

29. What do you mean by correct statement from the following?


a) Do you have a proper backup procedure in an enterprise is a best example of preventive
control?
b) Logical excess control are related to logical security of resources and intangible resources
store in tangible media
c) Pic As act of following unauthorized person through secured door
d) Internet network breach connect heterogeneous network
30. Recovery time objective is
a) Maximum period of downtime
b) Maximum data loss
c) Minimum period of downtime

31. E commerce involves


a) Electronic data interchange
b) Electronic mail
c) Electronic bullet
d) All of the above

32. Which of the following is not a feasibility analysis criterion?


a) Technical
b) Schedule feasibility
c) Operation
d) Hardware……

33. Which is the most valuable electronic commerce to the individual customer in log run
a) C2C
b) B2C

34. Which is the best way to ensure that the organization policy is compile with legal requirement
a) Periodic review of policy batch
b) Annual meeting of senior manager to discuss whether the policy is complete to legal
requirement
c) Updating the policy regularly
d) Regular conduct compliance test

35. A Makalu Pvt Ltd is facing problem trouble paying incentive to sale representative, the incentive
is paid on the basis of sale turnover achieve , the company has appointed as you as a consultant
to asking you , which type of system they need to create to solve the problem
A) MICS system
B) Transaction processing system
C) Executive information system
D) Executive support system

36. The accountability for the maintenance of appropriate security measures over information
assets
a) With security administrator
b) System administrator
c) Data and system owner

37. The goal of IT risk analysis is to enable the alignment of


a) IT risk management with enterprise risk management
b) Enable the priotrization of risk responses satisfy legal and
c) Know threat and vulnerability assets

38. The 1st step in business impact analysis is


a) Identify key assets

39. An organization has discovered the some of its employee has criminal records, what is the best
course of action for organization to take
a) Immediately perform the background checks including criminal history of all the employee
b) Immediately perform the background checks including criminal history of all new the
employee
c) On those with criminal records

40. An organization that has the experience certain increase in its long-distance charges has asked
the auditor to investigate what activities likely to suspect
a) Malfunction
b) Employee taking long distance call

41. In the interview with a candidate was asked to mentioned about all the component of
enterprises resources planning more that can be implement, identify the correct answer
a) Software component
b) Process flow
c) Customer mindset change

42. An auditor has reviewed the excesses privileged of sum employee and has discovered the
employee with longer term of service has exercised the privileged , what can the auditor
conclude from this
a) Employee privileged are not been removed when they are transferred from one position to
another
b) Long term employee are able to successfully gain others users password and
c) Long term employee are free to check the others password frequently

43. The IT department of XYZ Co. organization wants to make sure of ……. Resources (22)
a) The organization that is under taking business
b) Hybird cloud testai xa

44. The programmer is updating an application that saves password in plain text, what is the best
method to storage the pw encrypt with publicly
a) Each user publicly
b) Encrypt private vako point xa
45. A critically application is backed up once per day , the recovery point for this system is
a) 12 hr
b) 24 hr
c) Artalis hr
46. Nabil manufacturing co. is a manufacturing co. having worth of 500 million , world developing
business continuity plan the company setup a community for providing direction and guidance
to whole project team and responsible to make a all the decision relate to recovery planning
effort, which of the following is BCP community working
a) Replanning activities
b) Business impact analysis
c) Vulnerability adjustment
d) Plan development

47. Mr. B want to invest more money for future but he has no idea where to invest and how much
to invest, he is seeking help us from specialized system which is helping him to find the answer
of all queries such as how much money can be invested in portfolio which securities would be
better for him , identify the special file software system is use in such
a) Core Banking system
b) Expert system
c) Financial system
d) Knowledge system

48. IT governance of company is more concerned with


a) IT Strategy
b) IT executive
c) IT Policy
d) Security policy

49. The business information system which provide the answer to semi structured problem and use
for handling for structured problem is
a) Trans
b) Executive support system
c) Structure
Ans: MIS

50. All the 5 branches of hospital in delhi are incorporated to each other with center database, the
patient may visit any of these 5 branches with no passport , the medical history of patient is
available in any branches
a) Reading
b) clouding

51. Which of the following intrustment is not correct with respect of organizations management
a) Management level develop develop tactical plan
b) Senior manager is responsible for strategic planning and objectivesThe course in lien in
business the company will pursue
c) The number of management levels are fixed to three irrespective of size and structures:
d) supervisor management will oversee an control the daily activities an d function of tactical
plan

52. Choose the correct statement of following


a) The incremental moral is the method software development where the module is design
and implemented and tested incrementally until the product is finish
b) Operation manual is the technical communication document intend to give assistant to
people using a particular system and usually written by technical writer
c) The step involved in preliminary investigation phase of STLC are identification problem,
identification
d) Decision tree data flow chart are some of the widely use fact tool system requirement too

53. Auditor has discovered several …… user account management where there are many
indeterminate employee accounts that are still active, what is the best course of action
a) Improve the employee termination
b) Audit the termination process more frequently

54. As per electronic transfer act which is the maximum period the it is decide to use certificate to
issue digital subsection 2
a) 7
b) 15
c) 25
d) 21

55. What is the most important consideration for site selection of what site
a) Natural result
b) Time zone
c) Geographical location relation to primary set
d) Proxima

56. An organization experience frequent malware function infection in user workstation that are
receive through email despite the fact that the office have antivirus software what are the best
of measure to
a) Firewall
b) Antivirus on email
c) Web Browser
d) Increase in prevention system

57. During system testing in system development life cycle the software and other system element
are tested as whole , which of the following is not the type of system testing
a) Performing testing
b) System testing
c) Alfa testing
d) recovery security
58. An auditor is examining key management process and has found that IT department not
following the split custody procedure, what is the likely result
a) Two or more employee are sharing administrative account
b) One or more individual are in the process of entire password encryption
c)
59. Which section of electronic transfer act deals with the damage to any computer and information
system and punishment covered by its 1 st conviction
a) Imprisonment upto 3 yrs and fine upto 2000 sec 46
b) Imprisonment upto 5 yrs and fine upoto5000
60. Which of the following requires system development method that use the data orientation and
is concerned with understanding relationship among data can be excess and summarized in
variety of
a) MICS
b) Expert system
c) Transaction processing
d) Decision support system
61. The task of identifying and expressing system requirement is perform in which phase
a) System analysis
Ans: requirement phase
62. The document standard for EDI which 1 st developed by large business house during 1970s are
now control over
a) ISO
b) ANSI
c) ITUI
d) IEE

63. By technical feasibility of solution means


a) Found are
b) Person are technical capable
c)
d) Technology are available to implement
64. As per electronic transfer act what is the maximum period of the control may on receipt on
application ……….sec 16 after considering qualification application and also document and ……
whether or not such a co…….license should be granted
a) 30 days
Ans: within 2 months
65. In an organization has must of the information system required some modification after
development system maintenance fee begins one of the important aspect of …… there are
different category of maintenance are sechule as preventive, adoptive , rescue, and perfective
………, which od the following is not correct
66. The phase and their order in software development are
a) Feasibility requirement, development testing
b) Feasibility,requirement, design, development,ctesting, implementation, post implementat
c) Requirement, feasibi
67. Which of the following should concerned IS auditor when reviewing the disk
a) Discipline flopway disk
b) Protecting
c) Client server
d) Encryption
e) Preventive unauthori

You might also like