SlideShare a Scribd company logo
1 of 4
Download to read offline
1
National School of Business Management
System Analysis & Design
Sample Paper - MCQs with Answers
Question 1 (40 marks)
1) The person who ensures that computer systems are developed on time, within budget,
and with acceptable quality is the ……………………………
a) system designer
b) project manager
c) system administrator
d) system user
2) Data processing done on timely and regular basis for a huge volume of data is called as
a) Batch processing
b) Real time processing
c) Transaction processing
d) Demand processing
3) .................. is defined as a set of interconnected activities performed across an
organization creating an output with added value of a product or service to a client to
accomplish an organizational goal.
a) Development process
b) Business process
c) Quality process
d) Data process
4) “Software engineers should not use their technical skills to misuse other people’s
computers.” Here the term misuse refers to:
a) Unauthorized access to computer material
b) Unauthorized modification of computer material
c) Dissemination of viruses or other malware
d) All of the mentioned
5) ...................... is a set of processes and procedures that transform data into information
and knowledge.
a) Information system
b) Knowledge system
c) Database system
d) Computer system
6) Statement of scope and objectives, opportunities and performance criteria is identified
during the …………. phrase of SDLC.
a) Problem definition
b) System analysis
2
c) System design
d) Documentation
7) Decision makers who are concerned with tactical (short-term) operational problems and
making decisions are ………………..
a) executives
b) supervisors
c) middle managers
d) none of the above
8) When analysing systems “Close ended questions” are best suits to apply in
a) Interviews
b) Questionnaires
c) Both Interviews and Questionnaires
d) None of the above
9) Artificial intelligence is attempting to duplicate which of the following human
capabilities in computer-based systems?
a) Thinking and reasoning, and using reason to solve problems.
b) Learning or understanding from experience.
c) Responding quickly and successfully to new situations.
d) All of the choices are correct.
10) Which of the following are included in an Office automation system?
i) Word processing ii) Electronic mail
iii) Voice mail iv) Electronic calendaring
v) Audio conferencing
a) i, ii, iii and v only
b) i, ii, iii and iv only
c) i, ii, iv and v only
d) All i, ii, iii, iv and v
11) Reason for the formation of groups in a working environment includes,
a) In organizations, major decisions are often made by individuals as opposed to
groups.
b) Completion of certain critical tasks can be performed with individual efforts.
c) Transformation of skills and technical expertise is beneficial to the organization as
a whole, rather than individuals.
d) Companies who value teamwork, then promotions, pay raises, and other forms of
recognition can be given to individuals for how effectively they work as an individual.
12) Which business process typically employs more people in an organization than any other
functional area?
a) Logistics
b) Operations
3
c) Marketing
d) Finance
13) Which of the following can be considered as an important factor for a successful
outsourcing of information system development?
a) Understanding company goals and objectives, and having a strategic vision and plan.
b) Selecting the right vendor and ongoing management of the relationships.
c) Open communication with affected individuals/groups.
d) All of the choices are correct.
14) When somebody is collecting your personal information, you should be allowed,
a) to know why information is collected
b) to know what information is collected
c) to accept or deny collection of your information
d) all of the above
15) Design Phase consists of …………………….
i. Identifying the functions to be performed
ii. Design the input/output and file design
iii. Defining basic parameters for system design
a) i & ii
b) ii & iii
c) i & iii
d) I, ii & iii
16) A context diagram
a) describes the context of a system
b) is a DFD which gives an overview of the system
c) is a detailed description of a system
d) is not used in drawing a detailed DFD
17) ……………… is a tabular method for describing the logic of the decisions to be taken.
a) Decision tree
b) Decision Method
c) Decision Data
d) Decision tables
18) System Study involves
a) study of an existing system
b) identifying current deficiencies and establishing new goals
c) All of the above
d) None of the above
19) Documentation is prepared
a) at every stage
b) at system analysis & design only
4
c) at system development & implementation only
d) None of the above
20) Which of the following is not true of the conversion phase of the development life cycle?
a) the user and systems personnel must work closely together.
b) steps must be taken to phase out the old system
c) training and documentation are not required
d) None of the above

More Related Content

What's hot

Ob chp09
Ob chp09Ob chp09
Ob chp09Dytan
 
4+1view architecture
4+1view architecture4+1view architecture
4+1view architecturedrewz lin
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery PlanningJohn Wilson
 
Domain Controller
Domain Controller Domain Controller
Domain Controller SamNang LEAP
 
Ob chp05
Ob chp05Ob chp05
Ob chp05Dytan
 
Advanced Systems Analyis Design (UML)
Advanced Systems Analyis Design (UML)Advanced Systems Analyis Design (UML)
Advanced Systems Analyis Design (UML)Makaha Rutendo
 
Information System Development
Information System DevelopmentInformation System Development
Information System DevelopmentSamudin Kassan
 
Security & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSecurity & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSmart ERP Solutions, Inc.
 
CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2Ahmad Ammari
 
Itil in practice (public version)
Itil in practice (public version)Itil in practice (public version)
Itil in practice (public version)Trung. Le Thanh
 
Istqb question-paper-dump-3
Istqb question-paper-dump-3Istqb question-paper-dump-3
Istqb question-paper-dump-3TestingGeeks
 
Cobit5 owerwiev and implementation proposal
Cobit5 owerwiev and implementation proposalCobit5 owerwiev and implementation proposal
Cobit5 owerwiev and implementation proposalEmilio Gratton
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructureMuhammad Ahad
 
System Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU EthiopiaSystem Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU EthiopiaDebre Tabor University
 
Data center disaster recovery.ppt
Data center disaster recovery.ppt Data center disaster recovery.ppt
Data center disaster recovery.ppt omalreda
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recoveryKrutiShah114
 
System analysis and_design
System analysis and_designSystem analysis and_design
System analysis and_designTushar Rajput
 

What's hot (20)

Ob chp09
Ob chp09Ob chp09
Ob chp09
 
4+1view architecture
4+1view architecture4+1view architecture
4+1view architecture
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
Domain Controller
Domain Controller Domain Controller
Domain Controller
 
Ob chp05
Ob chp05Ob chp05
Ob chp05
 
Advanced Systems Analyis Design (UML)
Advanced Systems Analyis Design (UML)Advanced Systems Analyis Design (UML)
Advanced Systems Analyis Design (UML)
 
System analysis 1
System analysis 1System analysis 1
System analysis 1
 
Information System Development
Information System DevelopmentInformation System Development
Information System Development
 
Security & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSecurity & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoft
 
Iso 27001 Checklist
Iso 27001 ChecklistIso 27001 Checklist
Iso 27001 Checklist
 
Business impact analysis
Business impact analysis Business impact analysis
Business impact analysis
 
CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2
 
Itil in practice (public version)
Itil in practice (public version)Itil in practice (public version)
Itil in practice (public version)
 
Istqb question-paper-dump-3
Istqb question-paper-dump-3Istqb question-paper-dump-3
Istqb question-paper-dump-3
 
Cobit5 owerwiev and implementation proposal
Cobit5 owerwiev and implementation proposalCobit5 owerwiev and implementation proposal
Cobit5 owerwiev and implementation proposal
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
 
System Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU EthiopiaSystem Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU Ethiopia
 
Data center disaster recovery.ppt
Data center disaster recovery.ppt Data center disaster recovery.ppt
Data center disaster recovery.ppt
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
System analysis and_design
System analysis and_designSystem analysis and_design
System analysis and_design
 

Similar to Sad sample paper - mcq answers

ACC 340 Expect Success/newtonhelp.com
ACC 340 Expect Success/newtonhelp.comACC 340 Expect Success/newtonhelp.com
ACC 340 Expect Success/newtonhelp.commyblue003
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examenersivard
 
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdf
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdfSubject name Object Oriented Analysis and DesignMultiple Choice (.pdf
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdfakilastationarrymdu
 
Acc 340 final exam guide new
Acc 340 final exam guide newAcc 340 final exam guide new
Acc 340 final exam guide newpatienceisno2
 
Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%Austing_3
 
Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%liamSali
 
(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%liamSali
 
(New) final exam for bis 220 bis 220 all correct answers 100%
(New) final exam for bis 220 bis 220 all correct answers 100%(New) final exam for bis 220 bis 220 all correct answers 100%
(New) final exam for bis 220 bis 220 all correct answers 100%ri0908O0o
 
(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%quikly11
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examgiquickly
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exambubyslyke
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examginistays
 
Bis 220 final exam 30 30 correct answers 100%
Bis 220 final exam 30 30 correct answers 100%Bis 220 final exam 30 30 correct answers 100%
Bis 220 final exam 30 30 correct answers 100%eriks23
 
Acc 340 final exam guide
Acc 340 final exam guideAcc 340 final exam guide
Acc 340 final exam guidefirstcome01
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examsdvsdvsdv
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam34t34g
 

Similar to Sad sample paper - mcq answers (20)

Sad -sample_paper
Sad  -sample_paperSad  -sample_paper
Sad -sample_paper
 
Chap02 re
Chap02 reChap02 re
Chap02 re
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
ACC 340 Expect Success/newtonhelp.com
ACC 340 Expect Success/newtonhelp.comACC 340 Expect Success/newtonhelp.com
ACC 340 Expect Success/newtonhelp.com
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdf
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdfSubject name Object Oriented Analysis and DesignMultiple Choice (.pdf
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdf
 
Acc 340 final exam guide new
Acc 340 final exam guide newAcc 340 final exam guide new
Acc 340 final exam guide new
 
Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%
 
Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%
 
(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%
 
(New) final exam for bis 220 bis 220 all correct answers 100%
(New) final exam for bis 220 bis 220 all correct answers 100%(New) final exam for bis 220 bis 220 all correct answers 100%
(New) final exam for bis 220 bis 220 all correct answers 100%
 
(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam 30 30 correct answers 100%
Bis 220 final exam 30 30 correct answers 100%Bis 220 final exam 30 30 correct answers 100%
Bis 220 final exam 30 30 correct answers 100%
 
Acc 340 final exam guide
Acc 340 final exam guideAcc 340 final exam guide
Acc 340 final exam guide
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 

More from HarithaRanasinghe (20)

Session12 pointers
Session12 pointersSession12 pointers
Session12 pointers
 
Session11 single dimarrays
Session11 single dimarraysSession11 single dimarrays
Session11 single dimarrays
 
Session09 multi dimarrays
Session09 multi dimarraysSession09 multi dimarrays
Session09 multi dimarrays
 
Session07 recursion
Session07 recursionSession07 recursion
Session07 recursion
 
Session06 functions
Session06 functionsSession06 functions
Session06 functions
 
Session05 iteration structure
Session05 iteration structureSession05 iteration structure
Session05 iteration structure
 
Session04 selection structure_b
Session04 selection structure_bSession04 selection structure_b
Session04 selection structure_b
 
Session04 selection structure_a
Session04 selection structure_aSession04 selection structure_a
Session04 selection structure_a
 
Session03 operators
Session03 operatorsSession03 operators
Session03 operators
 
Session02 c intro
Session02 c introSession02 c intro
Session02 c intro
 
Session01 basics programming
Session01 basics programmingSession01 basics programming
Session01 basics programming
 
Program flow charts
Program flow chartsProgram flow charts
Program flow charts
 
Paper
PaperPaper
Paper
 
Model questions
Model questionsModel questions
Model questions
 
Model paper algorithms and data structures
Model paper  algorithms and data structuresModel paper  algorithms and data structures
Model paper algorithms and data structures
 
Doc 20180208-wa0001
Doc 20180208-wa0001Doc 20180208-wa0001
Doc 20180208-wa0001
 
Doc 20180130-wa0006
Doc 20180130-wa0006Doc 20180130-wa0006
Doc 20180130-wa0006
 
Doc 20180130-wa0005
Doc 20180130-wa0005Doc 20180130-wa0005
Doc 20180130-wa0005
 
Doc 20180130-wa0004-1
Doc 20180130-wa0004-1Doc 20180130-wa0004-1
Doc 20180130-wa0004-1
 
Doc 20180130-wa0004
Doc 20180130-wa0004Doc 20180130-wa0004
Doc 20180130-wa0004
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Sad sample paper - mcq answers

  • 1. 1 National School of Business Management System Analysis & Design Sample Paper - MCQs with Answers Question 1 (40 marks) 1) The person who ensures that computer systems are developed on time, within budget, and with acceptable quality is the …………………………… a) system designer b) project manager c) system administrator d) system user 2) Data processing done on timely and regular basis for a huge volume of data is called as a) Batch processing b) Real time processing c) Transaction processing d) Demand processing 3) .................. is defined as a set of interconnected activities performed across an organization creating an output with added value of a product or service to a client to accomplish an organizational goal. a) Development process b) Business process c) Quality process d) Data process 4) “Software engineers should not use their technical skills to misuse other people’s computers.” Here the term misuse refers to: a) Unauthorized access to computer material b) Unauthorized modification of computer material c) Dissemination of viruses or other malware d) All of the mentioned 5) ...................... is a set of processes and procedures that transform data into information and knowledge. a) Information system b) Knowledge system c) Database system d) Computer system 6) Statement of scope and objectives, opportunities and performance criteria is identified during the …………. phrase of SDLC. a) Problem definition b) System analysis
  • 2. 2 c) System design d) Documentation 7) Decision makers who are concerned with tactical (short-term) operational problems and making decisions are ……………….. a) executives b) supervisors c) middle managers d) none of the above 8) When analysing systems “Close ended questions” are best suits to apply in a) Interviews b) Questionnaires c) Both Interviews and Questionnaires d) None of the above 9) Artificial intelligence is attempting to duplicate which of the following human capabilities in computer-based systems? a) Thinking and reasoning, and using reason to solve problems. b) Learning or understanding from experience. c) Responding quickly and successfully to new situations. d) All of the choices are correct. 10) Which of the following are included in an Office automation system? i) Word processing ii) Electronic mail iii) Voice mail iv) Electronic calendaring v) Audio conferencing a) i, ii, iii and v only b) i, ii, iii and iv only c) i, ii, iv and v only d) All i, ii, iii, iv and v 11) Reason for the formation of groups in a working environment includes, a) In organizations, major decisions are often made by individuals as opposed to groups. b) Completion of certain critical tasks can be performed with individual efforts. c) Transformation of skills and technical expertise is beneficial to the organization as a whole, rather than individuals. d) Companies who value teamwork, then promotions, pay raises, and other forms of recognition can be given to individuals for how effectively they work as an individual. 12) Which business process typically employs more people in an organization than any other functional area? a) Logistics b) Operations
  • 3. 3 c) Marketing d) Finance 13) Which of the following can be considered as an important factor for a successful outsourcing of information system development? a) Understanding company goals and objectives, and having a strategic vision and plan. b) Selecting the right vendor and ongoing management of the relationships. c) Open communication with affected individuals/groups. d) All of the choices are correct. 14) When somebody is collecting your personal information, you should be allowed, a) to know why information is collected b) to know what information is collected c) to accept or deny collection of your information d) all of the above 15) Design Phase consists of ……………………. i. Identifying the functions to be performed ii. Design the input/output and file design iii. Defining basic parameters for system design a) i & ii b) ii & iii c) i & iii d) I, ii & iii 16) A context diagram a) describes the context of a system b) is a DFD which gives an overview of the system c) is a detailed description of a system d) is not used in drawing a detailed DFD 17) ……………… is a tabular method for describing the logic of the decisions to be taken. a) Decision tree b) Decision Method c) Decision Data d) Decision tables 18) System Study involves a) study of an existing system b) identifying current deficiencies and establishing new goals c) All of the above d) None of the above 19) Documentation is prepared a) at every stage b) at system analysis & design only
  • 4. 4 c) at system development & implementation only d) None of the above 20) Which of the following is not true of the conversion phase of the development life cycle? a) the user and systems personnel must work closely together. b) steps must be taken to phase out the old system c) training and documentation are not required d) None of the above