Vous êtes sur la page 1sur 46

Information Systems

Sample Questions

System Architecture
With a two tier architecture we address the disadvantages of Data Redundancy Data Inconsistency across locations Convenient Graphical User Interface All of the Above None of the Above
2

System Architecture
The two components of an application are Business Logic and Presentation Logic Graphical User Interface (GUI) and the Buttons Business Rules and the Business Logic All of the Above None of the Above
3

System Architecture
Three-tier architecture is also called client

server architecture. (T/ F)

In an organization wide system it is

preferable to keep data and applications in the same hardware component. (T/ F)

System Architecture
System Architecture is a representation of

the client and the server machines .(T/ F)

Common data server prevents issues of

data redundancy and data inconsistency. (T/ F)

An ERP application usually uses a 2-tier

architecture. (T/F)

Logical Data Model


An attribute is a distinct characteristic of an

ENTITY for which data is maintained. (T/F)

A relationship is a logical link between two

entities that represents a business rule or constraint. (T/F)

ER Diagram
STUDENT Student ID Student First Name Student Last name Student Major

ER Diagram
The attributes of STUDENT are Student First Name Student Last Name Student Major All of the Above None of the Above

ER Diagram
Student Id is the primary key for Student First

name (T/F)

Student First Name and Student Last name

together is a candidate key of STUDENT. (T/F)

Student id is an attribute. (T/F)

Normalization
STUDENT is in the following normal form First Normal Form Second Normal Form Third Normal Form All of the Above None of the Above

Normalization
If there are no repeating groups then the entity is in First Normal Form Second Normal Form Third Normal Form All of the Above None of the Above
11

Normalization
If all the non key attributes are independent of each other then the entity is in First Normal Form Second Normal Form Third Normal Form All of the Above None of the Above

Normalization
Before you normalize an entity you need to

identify the repeating groups. (T/F)

Before you normalize an entity you need to

identify the primary key. (T/F)

Normalization
Before you normalize an entity you need to identify Repeating groups Primary key Composite key All of the Above None of the Above

Physical Data Model


The transformation from logical model to

physical model includes implementation of referential integrity. (T/F) A procedure will perform a specific action and return a single value. (T/F) An index enables faster retrieval of data. (T/F) A view is a pseudo table. (T/F)

SQL
Write an SQL statement to find the

employees in departments other than 40.

SELECT * FROM EMPLOYEES WHERE DEPT != 40 SELECT * FROM EMPLOYEES WHERE DEPT <> 40

SQL
Write an SQL statement to list the clerks in

department 40 sorted by first names.

SELECT * FROM EMPLOYEES WHERE DEPT = 40 AND JOBDESC = clerk ORDER BY FIRSTNAME

SQL
Write an SQL statement to find managers in

department 40 with salary > 50000.

SELECT * FROM EMPLOYEES WHERE DEPT

= 40 AND JOBDESC = manager AND SALARY > 50000

Application Development
Java and Visual Basic are computer

languages. (T/F)

We need to know the syntax of a computer

language to write a program correctly. (T/F)

The compiler identifies the errors in

semantics of a program. (T/F)

Application Development
A compiler converts lower level language into

machine language consisting of 0s and 1s. (T/F)

It is possible for a computer programmer in

your organization to write the program which does the task of a compiler. (T/F)

Higher level language is close to natural

English. (T/F)

Application Development
A compiler converts lower level language into

machine language consisting of 0s and 1s. (T/F)

It is possible for a computer programmer in

your organization to write the program which does the task of a compiler. (T/F)

Higher level language is close to natural

English. (T/F)

Application Development
Whether to choose VB Script or javascript as the programming language will depend on The system architecture The application to be developed Whether it is to be web enabled or not All of the Above None of the Above

Application Development
IDE is a software that helps to compile a

program. (T/F)

An IDE helps to write a program. (T/F) Code written in C++ can be compiled by

compilers from different vendors. (T/F)

Application Development
In object oriented methodology, a method is

a set of actions that affect an instance of the class. (T/F)

In object oriented methodology, instances of

a class are called objects. (T/F)

Application Development
POLYMORPHISM is the phenomenon by

which the same attribute could mean different things in different methods. (T/F)

POLYMORPHISM is the phenomenon by

which the same method could mean different things in different attributes. (T/F)

Application Development
In object oriented methodology, data integrity is ensured by Allowing change to happen in the values of attributes only through an execution of a method Using SQL statements for CRUD functions Data normalization All of the Above None of the Above

Application Development
In object oriented methodology,

INHERITANCE is the phenomenon by which one class inherits attributes from another class. (T/F)

In object oriented methodology,

INHERITANCE is the phenomenon by which one attribute inherits methods from another class. (T/F)

Vendor Management
Criteria for evaluating potential vendors include Geographical location of the vendor Prior experience in similar applications Staff and facilities available to perform the work All of the Above None of the Above

Vendor Management
Vendor selection is done based on Geographical location of the vendor Suppliers performance records on similar work Staff and facilities available to perform the work All of the Above None of the Above

Vendor Management
Transitioning the application from the vendor

involves training for the users. (T/F)

Agreements with vendors should be ideally

done for long periods of time (10 years minimum) to take advantage of economies of scale (T/F)

Vendor Management
Technical reviews are conducted with the

vendors to monitor the progress and performance of the vendor. (T/F)

Management reviews are conducted with the

vendors to monitor the progress and performance of the vendor. (T/F)

Vendor Management
The formal agreement with the vendor should include Service Level Agreements Support terms and conditions Discounts and Liabilities All of the Above None of the Above

Vendor Management
We monitor selected vendor processes for Compliance with requirements of the agreement Detecting issues as early as possible Taking early corrective actions All of the Above None of the Above

Project Management
The Project Management processes are
Requirement Analysis Design Coding and Testing All of the Above None of the Above

Project Management
Project Management processes are
Project Planning Project Tracking Risk Management All of the Above None of the Above

Project Management
A good project estimate is that which
Is based on historical data Takes into considerations assumptions and

constraints Can be easily revised All of the Above None of the Above

Project Management
For every $1 spend on software development,

you will spend $200 on maintenance. (T/F)

For every $100 spend on software

development, you will spend $200 on maintenance of the software. (T/F)

For every $10 spend on software development,

you will spend $20 on maintenance. (T/F)

ERP
Extended ERP supports business partners. (T/F) KM system provides interface to external customers.

(T/F)

Objective of KM system is to support knowledge

creation, storage, maintenance and distribution. (T/F)

ERP
eCRM includes FAQs Chat rooms Call centers All of the Above None of the Above

ERP
Corporates implement ERP as Strategic Initiative Operational Initiative Organizational Initiative All of the Above None of the Above

IT Quality
Cost of Quality includes Prevention Costs Appraisal Costs Failure Costs All of the Above None of the Above

IT Quality
Pareto chart is used when analyzing data about the

frequency of problems or causes in a process . (T/F)

Histogram is used when you want to see the shape

of the datas distribution, especially when determining whether the output of a process is distributed approximately normally. (T/F)

IT in Business
A good outsourcing strategy would include

writing short term contracts. (T/F)

A good outsourcing strategy would be to do

selective outsourcing. (T/F)

Issues in outsourcing include cultural

differences and knowledge transition. (T/F)

IT Security
Unintentional security threats include
Human errors Environmental hazards Computer system failures All of the Above None of the Above

IT Security
Methods of attack on computer systems include Hacking Data Tampering Programming attacks All of the Above None of the Above

IT Security
IT Security management practices include Prevention and Deterrence Detection Limitation of Damage All of the Above None of the Above