Suggested Answers
Information Technology & Systems (MB231) : January 2004
Section A : Basic Concepts
1. Answer : (c)
<>
Reason : Cache Memory is used to store frequently accessed programs and data. It is a special, high speed
memory, which is used to increase the speed of processing by making current data and programs
available to the CPU at a rapid rate. It has the fastest access speed compared to other
memories/storage devices.
Hence, from above discussion, we can infer that option (c) is correct.
Option (a) is incorrect. RAM stands for Random Access Memory. It is also called main memory or
primary memory. It is called RAM, as it is possible to randomly select and use any location of this
memory to directly store and retrieve data and instructions. It has fast access speed, but is not as fast
as Cache Memory. So, it is not applicable here.
Option (b) is incorrect. ROM stands for Read Only Memory. In this memory, information is
permanently stored. Data can be read from it, and not written to it. It has slow access speed. So, it is
not applicable here.
Option (d) is incorrect. Hard Disk stores the computer's operating system and applications, and
provides space for the user's data. It has medium access speed. So, it is not applicable here.
Option (e) is incorrect. Backup tape is a sequential storage device. The computer has to go through a
fixed sequence of stored items to access the needed file, say, a desired song. Hence, it has a very slow
access speed. So, it is not applicable here.
2. Answer : (d)
<>
Reason : Object-Based Logical Model (OBLM) is used in describing data at the logical level and at the view
level. Under OBLM, Entity-Relationship (E-R) Model falls. E-R Model is based on a perception of a
real world that consists of a collection of basic objects called entities and of relationships
(association) among these objects.
Hence, from above discussion, we can infer that option (d) is correct.
Option (a) is incorrect. The database in a Relational Model is generally a two-dimensional table. So,
it is not applicable here.
Option (b) is incorrect. The records in Network Model are organized as collections of arbitrary
graphs. So, it is not applicable here.
Option (c) is incorrect. The records in Hierarchical Model are organized as collections of trees. So, it
is not applicable here.
Option (e) is incorrect. Physical Model is used to describe data at the lowest level. So, it is not
applicable here.
3. Answer : (b)
<>
Reason : Workflow System helps users to collaborate with each other to accomplish and manage structural
work tasks within a knowledge-based business process.
Hence, from above discussion, we can infer that option (b) is correct.
Option (a) is incorrect. Electronic Meeting System facilitates group decision-making activities that
take place in a computer-based decision-room setting. So, it is not applicable here.
Option (c) is incorrect. Teleconferencing is an important group support facility, in which sessions are
held in real time where major participants are televised, while participants from remote areas may
take part with voice input of questions and responses. So, it is not applicable here.
Option (d) is incorrect. Data Conferencing is a method where a Groupware Package connects two or
more PCs over the Internet or Intranets, so that a team can share, mark up and revise a white board of
drawings, documents and other material displayed on their screens. So, it is not applicable here.
Option (e) is incorrect. White Boarding is another name of Data Conferencing. So, it is not applicable
here.
4. Answer : (a)
<>
Reason : In What-if Analysis, an end user makes changes to variables or relationships among them, and
observes the resulting changes in the values of other variables.
Hence, from above discussion, we can infer that option (a) is correct.
Option (b) is incorrect. Sensitivity Analysis is a special case of What-if Analysis. Typically, the value
of only one variable is changed, but many such iterations are carried out, and the resulting changes
are observed. So, it is not applicable here.
Option (c) is incorrect. Goal-seeking Analysis is the reverse of What-if Analysis and Sensitivity
Analysis. Instead of observing how changes in a variable affect other variables, Goal-seeking
Analysis sets a target value (the goal) for a variable and then repeatedly changes other values until the
target value is achieved. So, it is not applicable here.
Option (d) is incorrect. Optimization Analysis is a more complex extension of Goal-seeking Analysis.
It attempts to find the optimum value for one or more target variables, given certain constraints. So, it
is not applicable here.
Option (e) is incorrect. Cost-benefit Analysis is concerned with whether expected savings, increased
revenue, increased profits, reductions in required investment and other types of benefits will exceed
the costs of developing and operating a proposed system. So, it is not applicable here.
5. Answer : (e)
<>
Reason : User interface is that part of the operating system which interacts with the user.
User interfaces enable the users to perform the following functions:
IV. Log on to the system by providing a user name and a password.
V. Trigger Application Programs.
VI. Shut down the operations of the computer safely by following an orderly shutdown procedure.
Hence, from above discussion, we can infer that option (e) is correct.
Options (a), (b), (c) and (d) are not correct as all of the three given alternatives are applicable and not
just one or two alternative (s).
6. Answer : (b)
<>
Reason : Computer-Aided Software Engineering usually involves software packages that assist the software
developers to perform many of the activities of the systems development cycle.
Hence, from above discussion, we can infer that option (b) is correct.
Option (a) is incorrect. Executive Information System combines many of the features of
Management Information System and Decision Support System. It gives top management immediate
and easy access to information about a firm’s Critical Success Factors (CSF’s), in accomplishing its
strategic objectives. So, it is not applicable here.
Option (c) is incorrect. Office Information System includes workstation-based tools for document
creation and document retrieval, tools for maintaining appointment calendars, and so on. So, it is not
applicable here.
Option (d) is incorrect. Multimedia Database contains images, spatial data, audio data, video data and
the like. So, it is not applicable here.
Option (e) is incorrect. Hypertext Database is enriched with lines that point to other documents. So, it
is not applicable here.
7. Answer : (c)
<>
Reason : Strategic information systems planning is an important component of total organizational planning
and focuses on the activities and outputs of strategic business planning.
Strategic information systems planning is business driven and not technology driven. IT strategies are
developed based on strategic business opportunities.
Hence, from above discussion, we can infer that option (c) is false with respect to strategic
information systems planning.
Options (a), (b), (d) and (e) are all true with respect to strategic information systems planning.
8. Answer : (e)
<>
Reason : No special symbol other than an underscore is allowed in defining variable names in C language.
Hence, from above discussion, we can infer that option (e) is not correct with respect to variables in
C language.
Options (a), (b), (c) and (d) are all correct with respect to variables in C language.
9. Answer : (b)
<>
Reason : Systems Analysis stage of Systems Development Life Cycle (SDLC) analyses the information needs
of end users, organizational environment and any system presently used. It develops the functional
requirements of a system, that can meet the needs of end users.
Hence, from above discussion, we can infer that option (b) is correct.
Option (a) is incorrect. Systems Investigation determines whether a business problem or
opportunity exists. So, it is not applicable here.
Option (c) is incorrect. Systems Design develops specifications for hardware, software, people,
network and data resources. So, it is not applicable here.
Option (d) is incorrect. Systems Implementation tests the system and trains people to operate and use
it. So, it is not applicable here.
Option (e) is incorrect. Systems Maintenance uses a post-implementation review process to monitor,
evaluate and modify the system as needed. So, it is not applicable here.
10. Answer : (c)
<>
Reason : Data Link Layer of OSI Reference Model is responsible for establishing an error-free
communications path between computers over the physical channel. It performs checksum Cyclic
Redundancy Check (CRC) to detect and correct errors in the transmission of data.
Hence, from above discussion, we can infer that option (c) is correct.
Option (a) is incorrect. Transport Layer provides control standards for a communication session for
enabling two processes at both ends to exchange data reliably and sequentially. So, it is not
applicable here.
Option (b) is incorrect. Network Layer sets up a logical path between the source and the destination
computers for the network. So, it is not applicable here.
Option (d) is incorrect. Session Layer provides means for establishing, maintaining and terminating a
dialogue or session between two end users. So, it is not applicable here.
Option (e) is incorrect. Application Layer provides services that directly support the end user of the
network. So, it is not applicable here.
11. Answer : (c)
<>
Reason : Program Design Language is a tool that is used for planning program logic and makes use
of "imitation code" that imitates real programming language.
Hence, from above discussion, we can infer that option (c) is correct.
Option (a) is incorrect. A flowchart is a pictorial representation of a program. So, it is not applicable
here.
Option (b) is incorrect. Decision Table is used to define clearly and concisely the statement of a
problem in tabular form. So, it is not applicable here.
Option (d) is incorrect. Compiler is a translation program that translates the entire source code into
object code and creates an object file. So, it is not applicable here.
Option (e) is incorrect. Interpreter translates one line of code at a time and executes the translated
information. So, it is not applicable here.
12. Answer : (e)
<>
Reason : The default initial value is zero for External and Static storage classes in C language.
Hence, from above discussion, we can infer that option (e) is correct.
Option (a) is incorrect. The default initial value for Automatic storage class is garbage value. So, it
is not applicable here.
Option (b) is incorrect. Both External and Static storage classes are applicable here.
Option (c) is incorrect. Both External and Static storage classes are applicable here.
Option (d) is incorrect. The default initial value for Register storage class is garbage value. So, it is
not applicable here.
13. Answer : (d)
<>
Reason : Netware Directory Services (NDS) of Netware operating system provides both users and network
administrators with a single integrated view of an entire network and the servers connected to it.
Hence, from above discussion, we can infer that option (d) is correct.
Option (a) is incorrect. A Redirector at the client workstation determines whether requests made by
a user are for the local operating system or should be redirected to a server on the network. So, it is
not applicable here.
Option (b) is incorrect. Netware Core Protocol (NCP) includes file access, file locking, resource
tracking and allocating, event notification and other services to workstations that request them. So, it
is not applicable here.
Option (c) is incorrect. Netware Loadable Module (NLM) includes services for name space support,
internetworking, host connectivity, messaging services, communication services, etc. So, it is not
applicable here.
Option (e) is incorrect. Netware Directory Services (NDS) is applicable here.
14. Answer : (d)
<>
Reason : A “hanging indent” is not indented on the first line, but second and subsequent lines.
Hence, from above discussion, we can infer that option (d) is not true regarding paragraph
formatting.
Options (a), (b), (c) and (e) are all true regarding paragraph formatting.
15. Answer : (b)
<>
Reason : Data Flow Machine consists of highly parallel computers with many functional units, all working on
the same program. It has the least interprocessor distance of 0.1m.
Hence, from above discussion, we can infer that option (b) is correct.
Option (a) is incorrect. Multicomputer comes after Data Flow Machine and it communicates by
sending messages over very short, very fast buses. It has an interprocessor distance of 1m. So, it is
not applicable here.
Option (c) is incorrect. Local Area Network (LAN) is a privately owned network within a single
building or campus of up to a few kilometres in size. It has an interprocessor distance of 10 m to 1
km. So, it is not applicable here.
Option (d) is incorrect. Metropolitan Area Network (MAN) is a bigger version of LAN and may
cover a group of nearby corporate offices or a city and could be either private or public. It has an
interprocessor distance of 1 km to 10 km. So, it is not applicable here.
Option (e) is incorrect. Wide Area Network (WAN) would cover a large geographic area, generally a
country or a continent. It has an interprocessor distance of 100 km to 1,000 km. So, it is not
applicable here.
16. Answer : (d)
<>
Reason : World Wide Web contains a collection of documents inter-linked by hyperlinks over the Internet.
Hence, from above discussion, we can infer that option (d) is correct.
Option (a) is incorrect. Intranet is a Local Area Network that uses TCP/IP standards and is used for
internal use in the organization. So, it is not applicable here.
Option (b) is incorrect. Local Area Network (LAN) is a privately owned network within a single
building or campus of up to a few kilometres in size. So, it is not applicable here.
Option (c) is incorrect. Metropolitan Area Network (MAN) is a bigger version of LAN and may
cover a group of nearby corporate offices or a city and could be either private or public. So, it is not
applicable here.
Option (e) is incorrect. Internet Paging, also known as “Buddy List” software, runs on the
background of the user's computer, letting him/her know when his friends or coworkers (only those
who are registered) are online. So, it is not applicable here.
17. Answer : (b)
<>
Reason : User Interface Design focuses on supporting the interactions between end-users and their computerbased
applications. Designers concentrate on the design of attractive and efficient types of interfaces
for user input and output, such as easy-to-use web pages.
Hence, from above discussion, we can infer that option (b) is correct.
Option (a) is incorrect. Computer Aided Design (CAD) is a set of specialized software and
hardware that is used to design products directly on computer terminals. So, it is not applicable here.
Option (c) is incorrect. Data Design focuses on designing of the structure of databases and files that
would be used by the proposed information system. So, it is not applicable here.
Option (d) is incorrect. Process Design focuses on the design of software resources, that is, the
programs and procedures needed to create the proposed information system. So, it is not applicable
here.
Option (e) is incorrect. Data Design and Process Design are not applicable here.
18. Answer : (d)
<>
Reason : Control Listing, also known as Transaction Log, gives a detailed report of each transaction occurring
during a period. e.g., a payroll register lists every paycheck printed on a specific day.
Hence, from above discussion, we can infer that option (d) is correct.
Option (a) is incorrect. Action Document initiates actions by its recipient. So, it is not applicable
here.
Option (b) is incorrect. Information Document serves as a confirmation or proof for the recipient that
certain transactions have occurred. So, it is not applicable here.
Option (c) is incorrect. Turnaround Document is a document designed to initiate action and then be
returned for use in processing the completion of the transaction. So, it is not applicable here.
Option (e) is incorrect. Edit Report describes errors detected during processing. So, it is not
applicable here.
19. Answer : (a)
<>
Reason : A telecommunication processor supports data transmission and reception between the terminals and
the computers. It performs a variety of control and support functions in a telecommunication
network. e.g. a modem.
Hence, from above discussion, we can infer that option (a) is correct.
Option (b) is incorrect. Micro Computer is used by small organizations, executives in large
organizations and even by professionals working out of their homes. In the past, IBM set the
standards for Micro Computer hardware. Now, the distinction between a Micro Computer and a
Personal Computer has got blurred because of the variety of features being provided by a Personal
Computer nowadays. So, it is not applicable here.
Option (c) is incorrect. Coaxial Cable consists of a sturdy copper or aluminum wire wrapped with
spacers to insulate and protect it. This insulation minimizes the chance of interference from other
signals, and distortion of the signals that the cable carries. So, it is not applicable here.
Option (d) is incorrect. Fibre-optic Cable consists of one or more hair thin filaments of glass fibre
wrapped in a protective jacket. So, it is not applicable here.
Option (e) is incorrect. Web browser is a software application that allows for the browsing of the
World Wide Web. So, it is not applicable here.
20. Answer : (e)
<>
Reason : Process Control System is a computer system that controls an ongoing physical manufacturing
process. Such a system requires the use of special sensing devices that measure physical phenomena
such as temperature, pressure etc.
Hence, from above discussion, we can infer that option (e) is correct.
Option (a) is incorrect. Computer Aided Design (CAD) is a set of specialized software and
hardware that is used to design products directly on computer terminals. So, it is not applicable here.
Option (b) is incorrect. Computer Aided Manufacturing (CAM) is a specialized computer system,
which translates the CAD information into instructions for automated machines, so that they perform
the necessary production operations. So, it is not applicable here.
Option (c) is incorrect. Manufacturing Resource Planning (MRP II) is an integrated information
system that shares data among and synchronizes the activities of production and the other functional
areas of the business like marketing, finance etc. So, it is not applicable here.
Option (d) is incorrect. Materials Requirement Planning (MRP) enables the implementation of the
Master Production Schedule by showing time-phased requirements for releasing and receiving of
materials. So, it is not applicable here.
21. Answer : (d)
<>
Reason : Central Office Exchange (Centrex) is like a Private Branch Exchange (PBX), except that
the switching equipment is located in one of the telephone company’s “central exchanges” instead of
on the premises of a business. It incorporates data-over-voice technology to use telephones for
simultaneous voice and data transmissions.
Hence, from above discussion, we can infer that option (d) is not correct regarding Central Office
Exchange (Centrex).
Options (a), (b), (c) and (e) are all correct regarding Central Office Exchange (Centrex).
22. Answer : (c)
<>
Reason : A Decision Support System (DSS) is a type of management support system which provides direct
support to the decision-makers, with the help of ‘what-if’ analysis, ‘optimization models’ etc. It
makes use of analytical models, specialized databases, and indeed, the decision-maker’s own insights
and judgements, to support the making of structured and unstructured decisions by individual
managers.
Hence, from above discussion, we can infer that option (c) is not true about a Decision Support
System (DSS).
Option (a) is true because a Decision Support System (DSS) involves an iterative analytical modeling
process.
Option (b) is true because it makes use of specialized databases.
Option (d) is true because it helps managers to explore possible alternatives.
Option (e) is true because Focus and Decision-Web are examples of such a system.
23. Answer : (b)
<>
Reason : Exception Report is generated only in exceptional situations. It lists items that fall outside the
prescribed limits. e.g., a report that lists all those items where actual expenditures exceeded budget
targets by at least 10 percent.
Hence, from above discussion, we can infer that option (b) is correct.
Option (a) is incorrect. External Report is prepared primarily for readers outside the company. e.g.,
drafts of income statements and balance sheets. So, it is not applicable here.
Option (c) is incorrect. Summary Report summarizes detailed information into convenient, compact
formats. So, it is not applicable here.
Option (d) is incorrect. Periodic Scheduled Report uses a pre-specified format, designed to provide
managers with information on a regular basis. So, it is not applicable here.
Option (e) is incorrect. Push Report is pushed to a manager’s workstation through Intranet in the form
of a web cast. So, it is not applicable here.
24. Answer : (e)
<>
Reason : Telecommunication software packages help diverse networks communicate with each other.
The functions of telecommunication software packages are:
V. Access Control.
VI. Transmission Control.
VII. Error Control.
VIII. Security Management.
Hence, from above discussion, we can infer that option (e) is correct.
Options (a), (b), (c) and (d) are not correct as all of the four given alternatives are applicable and not
just one or two alternative (s).
25. Answer : (b)
<>
Reason : Vi is a full screen editor available in UNIX. A Vi session begins with the command Vi, with or
without a filename. By default, the Vi editor will be in the command mode.
Hence, from above discussion, we can infer that option (b) is correct.
Option (a) is incorrect. Input mode is not the default mode of Vi editor of UNIX. So, it is not
applicable here.
Option (c) is incorrect. Ex mode is not the default mode of Vi editor of UNIX. So, it is not applicable
here.
Option (d) is incorrect. Output mode is not the default mode of Vi editor of UNIX. So, it is not
applicable here.
Option (e) is incorrect. Command mode is applicable here.
26. Answer : (e)
<>
Reason : Biometric Controls are security measures that use human body parts such as retina or fingerprint to
identify a unique individual.
Hence, from above discussion, we can infer that option (e) is correct.
Option (a) is incorrect. Input Controls are usually set in the form of login passwords and other
security codes, formatted data entry success, appropriate error signals etc. So, they are not applicable
here.
Option (b) is incorrect. Processing Controls are developed to identify errors in arithmetic calculation
and logical operations. So, they are not applicable here.
Option (c) is incorrect. Output Controls are developed to ensure that information products are correct
and complete. So, they are not applicable here.
Option (d) is incorrect. Procedural Controls are methods that specify how an organization’s computer
and network resources should be operated for maximum security. So, they are not applicable here.
27. Answer : (d)
<>
Reason : Sub Program Section of a C program contains all the user-defined functions that are called from the
‘main’ function.
Hence, from above discussion, we can infer that option (d) is correct.
Option (a) is incorrect. Documentation Section consists of a set of comment lines giving the name
of the program, the author and other details which the programmer would like to use later. So, it is
not applicable here.
Option (b) is incorrect. Definition Section defines all the symbolic constants. So, it is not applicable
here.
Option (c) is incorrect. Global Declaration Section is used to declare all the global variables. So, it is
not applicable here.
Option (e) is incorrect. Link Section provides instructions to the compiler to link functions from the
system library. So, it is not applicable here.
28. Answer : (e)
<>
Reason : The ‘else’ statement will be executed if the condition specified is false.
Hence, from above discussion, we can infer that option (e) is not correct regarding decision-making
statements in C programming language.
Options (a), (b), (c) and (d) are all correct regarding decision-making statements in C programming
language.
29. Answer : (d)
<>
Reason : Internet Paging, also known as “Buddy List” software, runs on the background of the user's
computer, letting him/her know when his friends or coworkers (only those who are registered) are
online.
Hence, from above discussion, we can infer that option (d) is correct.
Option (a) is incorrect. File Transfer Protocol is an Internet Standard developed to exchange files.
So, it is not applicable here.
Option (b) is incorrect. Internet Telephony is the mechanism of carrying out telephonic conversations
over the Internet. So, it is not applicable here.
Option (c) is incorrect. Internet Fax is the mechanism of sending faxes through computers connected
over the Internet. So, it is not applicable here.
Option (e) is incorrect. Usenet is a system where messages about any subject can be posted and other
people on the Internet can reply to them. So, it is not applicable here.
30. Answer : (e)
<>
Reason : A flowchart is a pictorial representation of a program. In spite of the many advantages of a
flowchart, it has certain limitations too. One of these is that there are no specific standards for
determining the amount of detail that should be included in a flowchart.
Hence, from above discussion, we can infer that option (e) is not an advantage of a flowchart.
Options (a), (b), (c) and (d) are all advantages of a flowchart.
Search Assignments and Papers Here ...
For ICFAI Objective Questions check out
http://www.quizmantra.com
Tuesday, March 17, 2009
Information Technology and Systems (MB231) : January 2004 Suggested Answers Section A
Posted by MindGrill at 1:29 AM
Labels: Information Technology and Systems (MB231) : January 2004 Suggested Answers
Subscribe to:
Post Comments (Atom)
0 Comments:
Post a Comment