TYBSC IT - SEM VI - MCQ

 

MCQ ........ 

Multiple ........

Choice.........

 Questions....

 

SAMPLE MCQ

 

AS PER UNIVERSITY OF MUMBAI SYLLABUS

 

 

Will be helpful to regular students of Mumbai university colleges who are going to give the online examinations of SEM II, SEM  IV and SEM V class of students.

If it is helpful to you so also share it among your friends so that they will be also benefited from it.

 

ANSWERS ARE HIGHLIGHTED IN BOLD


CLASS: T.Y.B.SCIT-VI SEM REGULAR

 

SUB : SECURITY IN COMPUTING

 

MCQ (50 QUESTIONS)

 

1) which points will not consider in Maintenance for security in computing

a) Procedure                                        b)Policy enforcement  

c)Security awareness program       d)Ongoing guidance

2) ________attack attempts to learn or make use of information from the system but does not affect resources.

 

a) Active Attack        b) passive Attack     c) Denial Attack   d) User Attack

 

3) ___________ is a measure how easily data and software can be transferred from one organization to other organization

a) Carriers       b) Transport      c) Portability     d) Connection

 

4) Security ____the day to day practices of the individuals and technology assigned to the protection of assets

a) Strategy   b) Tactics   c)Defense   d) Determine

5)A security _____ is the definition of all the architecture and policy components that malware a complete plan for defense detection

a) Strategy    b) Tactics    c)Defense   d) Determine

6) ____is the process of identifying presence of some malicious activity which is concealed

a) Detection    b) Deterrence   c) Defense  d) Distributed

7)Common function of ____include stealing data and password, providing      

    remote access

a) Virus                      b) Worm                    c) Ransomware        d) Trojan

8) ____ typically arrive in document executable file and e-mail

a)Trojan                   b)Virus      c)worm             d) Passive attack

9) A ___ is self replicating program that uses other host files or code to replicate

a) Virus                   b) malware     c) worm       d) Ransomware

10) A computer ___ uses it own coding to replicate

a) Virus                   b) malware         c) worm           d)Ransomware

11) _____ work by passing as legitimate programs that are activated by an unsuspecting user

a) Trojan          b)Virus                      c)Worm                d)Malware

12)____ is also known as BACKDOOR for Computer System

a) Trojan             b)Virus                    c)Worm               d)Malware

13)_____ attack floods the intended victim computer with so much traffic legitimate or malformed that it becomes over utilized or lacks up, denying legitimate connections

a)  Virus                 b) Zombie  Trojan     c) DDoS      d)WORM

14)The use of sophisticated malware for targeted cybercrime is known as ______

a) Advance Persistent Threats (APT)      b) Zombie attack

c) DDoS                                                                d) Bounty program

15) ________ means that only the authorized individual or system can view sensitive information

 

a) Confidentiality      b) Integrity     c) Availability      d) Accesibility


16)Protocol anomaly attacks is net attacks is _______attack

a) Network layer   b) Physical layer   c)Data Link Layer      d) Logical layer

17)Which one is not application layer attack

a) Content attack    b) Buffer Overflows      c)Passwords       d) MAC

18) MAC is ____

a) Malware Access Control          b) Mass Accesses Control

c) Media Access Control            d) Medium Access Control

19) Which one not MITM attack

a) MAC flooding                          b) ARP Poisoning    

c) DHCP Poisoning                     d) Password cracking

20)Evil Twin is ____

a) Application Layer attack            b) Network Layer  attack

c) Physical  Layer  attack               d) Wireless Layer  attack

21)In CIA triad of security “C” represents

a) Communication             b) Control      c) Confidentiality     d) Connection

22) ____ Which is particularly relevant to data, refers to the assurance that the data has not been altered in an authorized way

a) Confidentiality    b) Integrity      c) Availability      d) Non-Repudiation

23)_____ refers to the restriction of access to data only to these who are authorized to use it

a) Confidentiality    b) Integrity     c) Availability      d) Non-Repudiation

24) The most common form of defence known as PERIMETER SECURITY follows which model

a) Lollipop model      b) Onion model    c) CIA triad model   d) ISO model

 

25)In ____ model once the hard crunchy exterior is cracked, the soft, chewy centre is exposed, hence Security is compromised.

a) Lollipop model     b) Onion model    c) CIA triad model d) ISO model

26)Layered strategy follows which model

a) Lollipop model     b) Onion model    c) CIA triad model d) ISO model

27) Which security model provides multiple of protection against internal and external threats

a) Layered         b) Perimeter    c) Defence       d) CIA Triad

28) ACL is ___

a)Access Control Limit                    b)Access Control List

c)Advance Control Limit                 d)Access Control Link

29) ____and ____ can be used to control intercommunication between network levels based on authorization rules defined in the security architecture.

a) SaaS Service and Cloud Service           b) ACL and Firewall

c) Internet bridge and business group      d) CIA triad model and ISO model

30)Online Transaction is example of ___

a) Communication model                              b) Security model 

 c) Workstation                                               d) Zone of trust

31) ________refers to the ability of the organization that allows it to respond rapidly to the changes in the external and internal environment

 

a) Business Agility                                         b) Portability   

c) Cost Reduction                                d)  Security Methodolog

32) _______is a malware that is disguised as legitimate software and which can be used to gain backdoor access to users computer

 

a) Worms            b) Trojan        c) Virus          d)passive attack

 

33) Kerberos is a method of _________ .

 

a) Authentication    b) Authorization   c) Non-repudiation   d) Accountability

 

34) FTP is ___

 

a) File Transfer Protocol                b) File Transport Protocol

c)File Transmission Protocol           d)Folder Transfer Protocol

35) SSL is ___

a) Secure Socket Layer           b) Secure Shell Layer   

 c) Security Shell Layer            d) Secure Shell Limit

36)___and ___ helps to encrypt the traffic in FTP

a) SSL and Digital Certificate      b) SSH  and  Digital Certificate

c) FTP and Digital Certificate         d) UDP and TCP

37) EFS is____

a) Encrypting Folder Session           b) Encoded Folder Session

c) Encryption File System             d) Encoded File System

38)___ encrypts and decrypts protected files and folder online

a) EFS                        b) FTP                       c) EPS           d) UDP

39) ___ will automatically generate public and private key

a) EFS                        b) FTP                       c) EPS           d) UDP

40) ___means that the receiver is ensured that the message is coming from intended sender not an imposer

a) Confidentiality                                          b) Integrity

c) Authentication                                d) Non-Repudiation

41) Which one is not Authentication method

a) Biometrics             b) Email              c) OTP        d) API Authentication

42)What is Process of identifying an individual

a) Authentication           b) Authorization     c) accounting   d) auditing

43) What do you call the process in which a user is identified via a username and password

a) Authentication    b) Authorization          c) accounting   d) auditing

44)Which Process of giving individual accesses to system or recourses

a) Authentication   b) Authorization     c) accounting   d) auditing

45)What process prevent someone from denying that he/she accessed resources

a) Authentication    b) Authorization     c) Accounting   d) Non-Repudiation

46)Which of the following is a secret numeric password used for authentication

a) Security token      b) Digital Certificate     c) Digital Signature   d) PIN

47) What type of electronic document contains a public key

a) Biometrics             b) Digital Certificate        c) PIN            d) PAN

48) What type authentication method identifies and recognizes people based on physical traits such as fingerprints

a) Digital Certificate    b) biometrics       c) WEP       d) RADIUS

49)what is the process converting data into a format that can not read by another user.

a) Encryption            b) Locking   c) Registering  d) Keying

50) _____   is authentication method which  require password, Security token ,biometric.

a) Biometric method                                     b) Mobile Authentication method

c) Three factor authentication method    d) multifactor authentication method

 

CLASS: T.Y.B.SCIT-VI SEM REGULAR

 

SUB : SOFTWARE QUALITY ASSURANCE

 

MCQ (50 QUESTIONS)

 

           

1  .Which of the following is included in failure costs?

a)   rework       b) repair         c) failure mode analysis          d)Internal failure cost

 

2  . Which requirements are the foundation from which quality is measured?

a)  Hardware  b) Software c) Programmers   d) Customers

 

3.    Which of the following is not a SQA plan for a project?

a)    evaluations to be performed             

        b) amount of technical work

  c) audits and reviews to be performed

   d) documents to be produced by the SQA group

 

4.    Degree to which design specifications are followed in manufacturing the product is called

a)    Quality Control                                          b) Quality of conformance

            c) Quality Assurance                                               d) Testing Control

 

5.  Which of the following is not included in External failure costs?

a)testing   b) help line support   c) warranty work   d) complaint resolution

 

6.  Which of the following is not an appraisal cost in SQA?

a)   inter-process inspection                                b) maintenance                               

c) quality planning                                     d) testing


7.    Who identifies, documents, and verifies that corrections have been made to the software?

a)  Project manager     b) Project team      c)SQA group         d)Team leader

 

8.  The primary objective of formal technical reviews is to find  ___ during the process so that  they do not become defects after release of the software.

a)   errors       b) equivalent faults     c) failure cause     d) defect

 

9.  What is not included in prevention costs?

a)  quality planning                                      b)  formal technical reviews

c) test equipment                          d)equipment calibration and maintenance

 

10.  Quality Management in software engineering is also known as

a)   SQA   b)SQM  c) SQI   d) SQA and SQM

 

11.  Quality also can be looked at in terms of user satisfaction following which one does not  include

a)   A compliant product                            b) Good quality output

b) Delivery within budget and schedule d) Product with failure

 

12.  Inspections and testing are what kinds of Quality Costs?

a)   Prevention   b) Internal Failure   c) External Failure   d) Appraisal

 

13.  What is Six Sigma?

a)  It is the most widely used strategy for statistical quality assurance

b)  The “Six Sigma” refers to six standard deviations

c)  It is the most widely used strategy for statistical quality assurance AND The “Six Sigma” refers to six standard deviations

d)  A Formal Technical Review(FTR) guideline for quality walkthrough or inspection

 

14.  Which of the following is not a core step of Six Sigma?

a)  Define  b) Control  c) Measure   d) Analyse

 

15.  Non-conformance to software requirements is known as

a)   Software availability     b) Software reliability   c) Software failure  d)Software complexity

 

16.    What kind of quality cost is incurred when an error is detected in a product prior to shipment?

a)   Prevention    b) Internal Failure  c) External Failure  d) Appraisal

 

17.  The degree to which the design specifications are followed during manufacturing is known as

a)   Quality of design                                             b) Quality of conformance 

c) Quality of testing                                         d) Quality of reliability

 

18.  According to ISO 9001, inspection and testing comes under which management responsibility?

a)Process control                                                   b) Document control                                    c)  Control of nonconforming product            d) Servicing

 

19.  Alpha testing is done at

a)   Developer’s end   b) User’s end   c) Developer’s & User’s end d) Other stakeholder

 

20.  Boundary value analysis belong to?

a)   White Box Testing                                                     b) Black Box Testing

 c)  White Box & Black Box Testing                   d) Maintain testing

 

21.   Following which one is not  type of   Testing Levels?

a)  Unit Testing     b) System Testing   c) Integration Testing  d) Team testing

 

22.    Which of the following is/are White box technique?

a)    Statement Testing  b) Decision Testing c) Condition Coverage  d)Error guessing.

 

23.  Exhaustive testing is

a)   always possible                                                            b) practically possible

   c) impractical but possible                                          d) impractical and impossible

 

24.    White Box techniques are also classified as

a)  Design based testing          b) Structural testing

     c) Error guessing technique  d)  Statement Testing

 

25.  Which of the following term describes testing?

a)  Finding broken code     b) Evaluating deliverable to find errors

    c) A stage of all projects    d) delivering project to customer

 

 

26.  The testing in which code is checked

a)  Black box testing            b) White box testing

b)  Red box testing               d) Green box testing

 

27.  Acceptance testing is also known as

a)   Grey box testing     b) White box testing  c)  Alpha Testing  d) Beta testing

 

28.  Which of the following is non-functional testing?

a)     Black box testing      b) Performance testing    c) Unit testing   d) Grey testing

 

29.  Beta testing is done at

       a)User‟s end

b)    Developer‟s end

c)    User‟s & Developer‟s end

d)    Coder’s end

 

30.  Unit testing is done by

a)   Users   b) Developers c) Customers d) Stakeholders

 

31.  Behavioral testing is____

a)    White box testing  b) Black box testing  c) Grey box testing d) Grey testing

 

32.  Which of the following is black box testing

a)  Basic path testing             b) Boundary value analysis

     c) Code path analysis           d) Control flow testing.

 

33.  What is the main purpose of integration testing?

a)    Design errors       b) Interface errors     c) Procedure errors  d)    Decoding error

 

34.  Testing of individual components by the developers are comes under which type of testing?

 

a)   Integration testing    b) Validation testing  c)  Unit testing   d) Regression testing

 

35.  When the Testing Principles are useful while building the Software Product?

 

a)    During testing    b) During execution   c) During review d) Throughout life-cycle

 

36. Which of the following is the form of Alpha and Beta Testing?

a)    Acceptance Testing                       b) System Testing   

 c)  Unit Testing                               d) Integration Testing

 

 

37) Which of the following is a myth in testing?

          a)  Tester can find bugs                              b)  Any user can test software 

    c) Missed defects are not due to testers      d) Complete testing is not possible

         38) SDLC stands for ________

           a ) Software development life cycle    b) System development life cycle

           c) Software design life cycle                 d)  System design life cycle

           39) -------- is not a Test  Document.

       a)Test Policy                                             b) Test Case  

       c) PIN ( Project Initiation Note)   d) RTM (Requirement Traceability matrix)

 

40) ----------- is the application of quality principles to all facets and business process of an organization.

a)    TQM   b) Software Testing  c)  Software tools   d)    hardware

 

41) V- model uses following test models are ______

a)  Component testing, integration testing, system testing and acceptance testing

b)  alpha testing, beta testing , acceptance testing and user testing

c)         black box testing, white box testing and gray box testing

d)  alpha testing, beta testing , acceptance testing and acceptance r testing

 

42) ______ is dummy model for your actual model

a)    V-V model  b) Prototype model c) Spiral model d) SDLC

43)  Following which is not type of Prototype model

a)    Throwaway b) Evolutionary c) Incremental d) Extra model

44) Following which one is used for raising awareness in testing

a) good communication scale  b) understanding the business needs

c) Contiguous  learning             d) Quality

45) following which is not type of defect

a) wrong b) missing c) extra d) software complexity

46) Cost  of quality(COQ) =

a) Cost of  Control + Appraisal Cost

b) Cost of  Control + Cost of failure of control

c) Cost of Control + Prevention Cost

d) Cost of Internal failure + Cost of External failure

47) _____ is a type of software testing where we change certain statement in the source code and if the test cases are able to find the errors

a)    Integration testing    b) Validation testing  c)  Mutation testing    d) Regression testing

 

48) following which one is SQA goals

a) Education b) Security management c) Design ability d) safety

49) TQM stands for ______

a) Total Quality Metric  b) Total Quality Management

c) Total Quantity  Management d) Total Quantity  Metric

50) ______ ensure that each function or performance characteristic conforms to its specification

a) Integration testing    b) Validation testing  c)  Unit testing   d) Regression testing




CLASS: T.Y.B.SCIT-VI SEM REGULAR

 

SUB : CYBER LAW

 

MCQ (50 QUESTIONS)

 

 

1

The issues addressed by Cyber Law include

a)    Traditional commerce

b)   Intellectual property

c)    Stalking

d)    Physical Assault

2

In India , the primary legislation for cybercrimes as well as electronic commerce is

a)    Information Act 2000

b)    Intellectual property Act

c)    IPC

d)    Copyright act

3

Which US President , had announced a public private sector joint initiative to protect US information from hackers and viruses

a)    Barack Obama

b)   Bill Clinton

c)    Dr. Nuker

d)    Nelson

4

Offences in which arrest without warrant is provided are called

a)    Non cognizable offences

b)   Cognizable offences

c)    IPC

d)    Copyright

5

Following comes under cognizable offences

a)    Dowry death , murder, kidnapping

b)    Assault

c)    Cheating

d)    Defamation

6

Which section of IT Act deals with issues of  Hacking of computer system

a)    Section 66

b)    Section 68

c)    Section 67

d)    Section 80

7

Which section of IT Act deals with breach of confidentiality and privacy

a)    Section 71

b)   Section 72

c)    Section 66

d)    Section 80

8

The Information Technology Act (2000) was amended by

a)    Information Technology Act (2001)

b)    Information Technology Act (2015)

c)    Information Technology Act (2008)

d)    Information Technology Act (2018)

 

9

Hacking with computer system comes under

a)    Cognizable crime

b)    Non cognizable crime

c)    trademark law

d)    Copyright

10

In cognizable case the police initiate the investigation ______ and do not require the permission of the court

a)    on its own

b)    on demand by culprit

c)    on demand by complainant

d)    by order of SP

11

For cognizable offence following is require

a)    FIR and complaint

b)    Complaint only

c)    Complaint and proof

d)    Letter from SP

12

The term cyberspace signify everything related to ___________

a)    to computers , websites

b)    documents

c)    stalking

d)    criminals

13

Salient features of IT Act are

a)    The act gives legal recognition to all physical documents

b)   The act gives legal recognition on Digital Signatures

c)    Avoid theft

d)    Avoid physical assault

14

The IT Act has following number of chapters

a)    11

b)    12

c)    13

d)    16

15

The IT Act has altogether following sections

a)    13

b)    26

c)    90

d)    11

16

Hackers which have deep knowledge of the Internet and telecommunication systems are

a)    Code hackers

b)   Phreakers

c)    Cyber- punks

d)    stalking

17

Hackers who specialize in cryptography are known as

a)    Code hackers

b)    Phreakers

c)    Cyber- punks

d)    Crackers

 

18

Hackers who break into computer security  are known as

a)    Code hackers

b)    Phreakers

c)    Cyber- punks

d)   Crackers

19

A deliberate deception to secure unfair or unlawful gain or to deprive a victim of a legal right is called

a)    Hacking

b)   Fraud

c)    Concealment

d)    Theft

20

Computer virus means any computer instruction , data or programme that

a)    Destroys , damages or degrades the performance of a computer resource

b)    Checks login name and password

c)    Does key logging

d)    Sits idle without harming system

21

Computer containment means any set of computer instructions that are designed to

a)    Modify , destroy , record , transmit data or programme residing within a computer .

b)    Stealing of computer hardware

c)    Sniffing and spoofing

d)    Concealing the contents

22

Injury done to the reputation of a person is called as

a)    Cheating

b)   Defamation

c)    Harassment

d)    Sniffing

23

Publishing or transmitting of material depicting children in sexually explicit act etc , in electronic form is

a)    Harassment

b)   Cyber pornography

c)    Virus attack

d)    Trojan

24

The intermediaries who provide network technology services to users of the internet are called

a)    Network service providers

b)    DNS

c)    IP

d)    Hackers

25

The weapons with which cyber- crimes are committed are

a)    Mobile

b)   Technology

c)    Email

d)    Hacking

26

More teenage are attracted to cyber crime as

a)    It is a part of their syllabus

b)   They want to demonstrate their knowledge of internet and programming.

c)    They consider it ethical

d)    they don’t have complete programming knowledge so do it by mistake

27

In _____ we buy , sell or render services in the internet

a)    Ecommerce

b)    commerce

c)    EDI

d)    Type and click

28

Click wrap agreements can be of the following  type

a)    Type and click

b)    Pointer click

c)    Drag and click

d)    Push and click

29

A click wrap contract is

a)    Scrap it

b)   Take it or leave it

c)    Take it only

d)    leave it always

30

The type of agreement wherein the user can see the contract only after opening the product is

a)    Click wrap

b)   Shrink wrap

c)    take it type

d)    leave it type

31

For the cyber world , Section 11 of the IT Act 2000 provides that an e-record would be attributed to the originator , if it was sent by

a)    The receiver itself

b)   A person who had the authority to act on behalf of the originator in respect of the electronic record

c)    The deceased person

d)    The ISP

 

32

Agreements declared void under the Act are summarized as follows:

Where the consideration or object of an agreement is unlawful . an agreement is unlawful if

a)    It is allowed by law

b)   It is of such a nature that , if permitted, it would defeat the provisions of any law or is fraudulent

c)    It involved or implies , no harm or injury to person or property of another

d)    no rules as such

32

Consumer foram have the power to grant the following relief :

a)    to replace the goods with new goods

b)    to cause or injure the suppliers in case he doesn’t replace good

c)    to seize the supplier place

d)     to offer hazardous goods for sale

34

E-Commerce is about using technology to streamline business model with following feature :

a)    High costs

b)   More responsive relationships with customers , suppliers and partners

c)    Lack of  efficiency

d)    Less responsive

35

In India the law of contracts is stated in

a)    The American contract act

b)   The Indian contract Act 1872

c)    Copyright act

d)    Sales of goods act

36

The type of agreement mostly found as the installation process of software packages :

a)    Click wrap

b)    Shrink wrap

c)    Open source

d)    Close source

37

When one person signifies to another his willingness to do or to abstain from doing anything, with a with to obtaining the assent of that other to such act or abstinence , he is said to make a ____

a)    deal

b)   proposal

c)    agreement

d)    NDA

38

The person making the proposal for the contract is called

a)    promisor

b)    promise

c)    agreement

d)    mediator

39

Every promise and every set of promises , forming the consideration for each other is called

a)    promise

b)   agreement

c)    legal

d)    shrink wrap

40

An agreement not enforceable by law is said to be  ___

a)    void

b)    crime

c)    agreement

d)    legal

 

41

An agreement enforceable by law is a __________

a)    promise

b)   contract

c)    NDA

d)    patent

42

Following comes under unfair trade practices

a)    to sell genuine product

b)   making false representation of product through advertisements

c)    using registered trademark

d)    using patented products  

43

A legal contract between two parties that outlines confidential material , knowledge or information that the parities with to share with one another but wish to restrict access to or by third parties is

a)    Warranty

b)    Contract

c)    Non disclosure Agreement

d)    Agreement

44

An NDA creates a ____________relationship between the parties to protect any type of confidential and proprietary information or trade secrets

a)    confidential

b)    non repudiation

c)    integrated

d)    unfair

45

A ___________is the legal contract between the licensor and/or author and purchase of the software which establish the purchaser’s right

a)    leave licence

b)   software license agreement

c)    open source agreement

d)    copyright agreement

 

46

UCC Stands for

a)    uniform commercial code

b)    universe commerce conduct

c)    universe  contract code

d)    uniform code conduct

47

Jurisdiction based upon monetary limits is known as

a)    pecuniary

b)    territorial

c)    subject matter

d)    court

48

Jurisdiction based on certain subject  is known as

a)    pecuniary

b)    territorial

c)    subject matter

d)    agreement

49

The fact or facts which give a person to right to seek judicial relief is called

a)    FIR

b)   Cause of action

c)    Territorial jurisdiction

d)    Agreement

50

Which of the following is not a type of cyber crime?
a) cyber Data theft
b) cyber Forgery
c) Damage to data and computer systems
d) Installing antivirus

 

CLASS: T.Y.B.SCIT-VI SEM REGULAR

 

SUB : Business Intelligence

 

 

MCQ (50 QUESTIONS)

 

1)    The objective of B.I. is

 

a)    To support decision-making and complex problem solving.

b)    To support information gathering.

c)    To support data collection.

d)    To support data analysis.

 

 

2) Decision making process is of phases.

a)    Three

b)    Five

c)    Two

d)    Six

 

3) DSS stands for:

a)    Decision Support System.

b)    Definition support System.

c)    Data sub system

d)    Data storage system.

 

4) Decision support systems are used for

a)    Management decision making

b)   Providing tactical information to management

c)    Providing strategic information to management

d)   Better operation of an organization

 

5) Which of following is not phase of decision making process

a)    Design

b)    Analysis

c)    Intelligence

d)    Choice

 

6) Strategic information is needed for

a)    Day to day operations

b)    Meet government requirements

c)    Long range planning

d)    Short range planning

 

 

7) Phases are in Decision making process

a)    Intelligence, Design, Choice, Implementation, Control.

b)    Design, Develop, Apply

c)    Data, Process, Develop, Implement, Control

d)    Search, Sort, Design, Develop, Implement

 

8) Business intelligence allows to make and timely decisions.

a)    Effective

b)    Right

c)    Correct

d)    D. Beneficiary

9) What is a model ?

 

a)    a selective abstraction of real world

b)    a selective imagination of 1st world

c)    a selective proposal of real world

d)    a selective example of second word

 

10) ______ is the outcome of extraction and processing activities carried out on data.

 

a)    Knowledge

b)   Information

c)    Data

d)    Raw Data

 

11 In BI Architecture, ____is used to gather and integrate the data stored in various primary and secondary sources.

 

a)    Data Warehouse

b)    Data mart

c)    Data source

d)    knowledge.

12 Extraction of information and knowledge from data is known as

a)    Data mining

b)    Optimisation

c)    Data exploration

d)    Data mart

13 An _____is a physical replica of a system usually based on a different scale than the original.

a)    iconic model

b)    analog model

c)    mathematical model

d)    Datawarehouse  

14 In ETL ‘E’ stands for .

a)    External

b)   Extraction

c)    Extreme

d)    Evolve

15 In ETL ‘T’ stand for

a)    Trail

b)    Transform

c)    Teleport

d)    Telephone

16 In ETL ‘L’ stand for

a)    Lead

b)    Load

c)    Lay

d)    Lack

 

17. During the phase, additional data conversion occurs to performed to obtain the summaries that will reduce the response time.

a) Loading.

b) Extraction.

c) Transformation

d) Performance Evaluation.

 

18 Optimization is:

a) Determine the best solution

b) Successful marketing approaches to achieve the optimum outcome.

c) Getting the greatest return for the least expenditure of time, effort, manpower.

d) Determine the worst solution

 

19. _________measurements express the level of conformity of a given system to the objectives for which it was designed.

a) Effectiveness

b) Efficiency

c) Evaluation

d) Feedback

20. ____  Is the first stage in developing in decision support system.

a) Analysis

b) Design

c) Knowledge Acquisition

d) Planning

21 Data by itself is not useful unless

a)    It is massive

b)   it is processed to obtain information

c)    It is collected from diverse sources

d)    It is properly stated

22 Decision support systems are used by

a) Line managers.

b) Top-level managers.

c) Middle level managers.

d) System users

 

23  Which of following is not phase of decision-making process

a) Design

b) Analysis

c) Intelligence

d) Choice

 

24 ________is a broad category of applications and technologies for gathering, storing, analysing, and providing access to data to help enterprise users make better business decisions.

a) best practice

b) data mart

c) business information warehouse

d)business intelligence

 

25 Decision support systems are essential for

a) Day–to-day operation of an organization.

b) Providing statutory information.

c) Top level strategic decision making

d) Ensuring that organizations are profitable.

 

26  A material representation of a real system, whose behaviour is imitated for the purpose of the analysis is called as ?

 

a.    Analogical Model

b.    Iconic Model

c.    Symbolic Model

d.    Static Model

 

27 Which of the following is finally produced by Hierarchical Clustering?

a. final estimate of cluster centroids

b. tree showing how close things are to each other

c. assignment of each point to clusters

d. k-Means Clustering

 

28  Neural Networks are methods of ?

 

a. Regression

b. Clustering

c. Classification

d. Customization

 

29   ETL process consists of Extract,________ and Load.

a) Translate

b) Track

c) Transmit

d) Transform

 

30 Which model observes the status of a system only at the beginning or at the end of discrete intervals?

a) Discrete time model

b) Static-time dynamic models

c) Symbolic -time dynamic models

d) Iconic-time dynamic models

 

 

31   _____is used when the target variable takes on continuous values.

a) Regression

b) Clustering

c) Classification

d) Characterization

 

32 The term refers to a homogeneous subgroup existing within a population.

a) Continuous

b) Discrete

c) Nominal

d) cluster

 

33 Deterministic vs probabilistic comes under ___________

a)    Mathematical model

b)    Datawarehouse

c)    Clustering

d)    Symbolic model

 

34 __________Models are typically in the form of equations or mathematical statement

a)    Mathematical model

b)    Datawarehouse

c)    Clustering

d)    Symbolic model

 

35  ___________ is a process that uses data mining and probability to forecast outcomes

a)    optimisation model

b)   predictive model

c)    project management model

d)    risk analysis model

36 _____ deals with identifying a pattern and confirming it again such as fingerprint image , human face etc

a)     optimisation model

b)    predictive model

c)    project management model

d )pattern recognition model

37 In ________ architecture , data mining system does not use any functionality of  a database

a)    no-coupling

b)    loose coupling

c)    semi-tight coupling

d)    tight coupling

 

38 In this architecture , data mining system uses a database for data retrieval . it is for memory based data mining system ,

a)    no-coupling

b)   loose coupling

c)    semi-tight coupling

d)    tight coupling

 

39 In this architecture . data mining uses several features of data warehouse system such sorting , integration and aggregation .

 

a)    no-coupling

b)    loose coupling

c)    semi-tight coupling

d)    tight coupling

 

40 In this architecture  , a data warehouse is treated as an information retrieval component . all the features of database are used to perform datamining task.

a)    no-coupling

b)    loose coupling

c)    semi-tight coupling

d)   tight coupling

 

41 The process of removing noise from the data in data transformation strategies is _________

a)    smoothing

b)    aggregation

c)    generalization

d)    normalisation

 

42  The process where summary or aggregation operations are applied to  the data in  data transformation strategies is _________

a)    smoothing

b)   aggregation

c)    generalization

d)    normalisation

 

43  In _____ low level data are replace with high level data by using concept of hierarchical  climbing

a)    smoothing

b)    aggregation

c)    generalization

d)    normalisation

 

44  An ___________ does not look like the real system but behaves like it. These are usually two dimensional charts or diagrams, e.g., organisation charts, showing structure and  relationships.

 

a)    iconic model

b)   analog model

c)    mathematical model

d)    datawarehouse

45  Iconic models can be represented in

a)    two dimensions and three dimension

b)    multidimension

c)    single dimensions

d)    mathematical model

46  In _____ model every set of variable states is uniquely determining by parameters in the model and by sets of previous states of these variables

a)    probabilistic

b)   deterministic

c)    static

d)    dynamic

 

47  A model which arises from empirical finding and generalization from them is _

a)    deductive

b)   inductive

c)    probabilistic

d)    dynamic

 

48 The _____ is the process of assessing the likelihood of an adverse event occurring within the corporate , govt. or environmental sector .

 

a)    project management model

b)   risk analysis model

c)    predictive model

d)    waiting line model

 

49  The _________ models or methodologies provide the framework to execute projects

a.     project management model

b.    risk analysis model

c.    predictive model

d.    waiting line model

 

50  _______ module is mainly responsible for the measure of  the pattern by using a threshold value

a)    data mining engine

b)   pattern evaluation module

c)    graphical user interface

d)    database

 

51  ______ scaled attribute data to fall within a specified range such as 0.0 to 1.0 in data transformations strategies

a)    smoothing

b)    aggregation

c)    genericization

d)   normalisation

 

 

 

 CLASS : T.Y.Bsc IT -VI SEM

 

 

SUB: PRINCIPLES OF GIS

 

CLASS TEST : 50 QUESTIONS

 

1.            _____COMPONENT OF GIS.

   a. Space         b. Graph                  c. Network              d. Login

 

2.            GI Science majorly contributing________

   a. Data            b. Computer Science                          c. Factory                    d. Coding

              

3.            ________ is a database system.

a.            Spatial Database  b. Special Database          c. Data Warehouse               d. Geographical Database

              

4. SDT Means ___________

   a. Specific Data Type  b. Special Data Type  c. Spatial Data Type  d. System Data Type

              

5. Basic Unit of Spatial Information is

   a. Point, Line, Arc   b. Data           c. Graph                d. Design

              

6.Which one of this is not main component of GIS?

   a. People        b. Data                    c. Software              d. Snip tool

              

7.GIS stands for __

   a. Geographic Information System b. Generic Information System  c. Geological Information System

   d. Geographic Information Sharing

              

8. Which is not key component of “Spatial Data Quality”?

a.            Geodatabases                  b. Positional Accuracy  c. Temporal accuracy               d. Logical Consistency

 

9.What is model?

   a. The process of producing an abstraction of the ‘real world’

   b. Representation of Geographic phenomenon

   c. The process of producing an abstraction of the ‘real world’ and Representation of Geographic phenomenon

   d. Building

              

10.Once the data is entered it must be _______ and ______

   a. Capture and organised   b. Verified and edited   c. Verified and Generalised           

   d. Edited and organised

11. Which one of this is not main component of GIS?

   a. People        b. Data                    c. Software              d. Snip tool

              

12.The _phase deals with putting it all together into a format that communicates the result of data analysis in the best possible way.

   a. Data capture and preparation b. Data management                     c. Data manipulation and Analysis

   d. Data Presentation

              

 

13.______ Refers to the spatial relationship between geographical elements in a data set that do not change under a continuous transformation.

   a. Modeling    b. Topology          c. Shapefile             d. Node

              

14.______ type of tessellation.

a.            Regular tessellation   b. Irregular tessellation     c. Regular tessellation and Irregular tessellation

d.            Graphic Tessellation

              

15.A GIS is computer based system that provides

   a. Data Capturing, preparation, management, storage, manipulation and presentation.

   b. Data                                             c. Presentation      d. Cleaning

              

16.A process that can be named Georeferenced assigned a time interval is known as

   a. Georeferencing    b. Geographic phenomenon    c. Geographic information system

   d. Global positioning system

              

17.Partition of space into mutually exclusive cell is known as __

   a. Tessellation                               b. Tracking             c. Thematic study                  d. Tier I study

              

18. Which is not field type in GIS?

   a. Text             b. Decimal              c. Date                      d. Double

 

19.The most common tessellations are __

   a. a solid, opaque, transparent  b. Blue, green, brown  c. Square cells, hexagonal cells, triangular cells  

d. a solid, opaque, transparent, Blue, green, brown, Square cells, hexagonal cells, triangular cells

              

20.Tessellations are also known as ___

   a. Volumes     b. Rasters              c. Code I                  d.Type II

              

21.The following is an example of “geographical fields”

   a. Points         b. Lines                   c. Elevation            d. Polygons

              

22.By ‘Spatial data’ we mean data that has__

   a. Complex values   b. Positional Values  c. Graphical Values                 d. Decimal Values

              

23.TIN stands for _

   a. Traffic Internet Network  b. Triangulated Irregular Network     c. Temporal Interest Network

   d. Temperature Irregular Network

              

24.Triangulation based on input locations with stretched  triangles that are equilateral is known as ___

   a. TIN              b. Delaunay Triangulation  c. Hobson’s Triangulation       d. Isosceles Triangulation

              

25. Analysis and Visualizations of events, reading over time is known as ___

   a. Multi dimension  b. Temporal dimension   c. Spatial dimension           d. Geopositional dimension

              

26.Vector representation of data includes __

   a. Points, lines(arcs),polygons                                 b. Square, hexagon, tracks c. Rectangle, rhombus, rivers

   d. TIN, Delaunay triangles, tracks

              

 

27.A coordinate based regional, local or global system used to locate geographical entities is known as ____

   a. Reference system b. Spatial Reference System c. Interface System  d. Map System

              

28.Due to irregularities or mass anomalies in the distribution, there is an undulated surface known as ___

   a. Parabola    b. Geoid                 c. Map                     d. Hyperbola

              

29.Which one of the following is NOT a kind of map projection?

   a. Cylindrical b. Conical    c. Azimuthal   d. Tangential

              

30.While a spheroid approximates the shape of the earth, a _________ defines the position of the spheroid relative to the center of the earth. It provides a frame of reference for measuring locations on the surface of the earth.

   a. Geoid          b. Data     c. Datum                               d. Polygon

              

31.What is used to represent Raster data?

   a. Cell and grids                           b. Line    c. Point  d. Polygon

 

32.How is the boundary of the object is represented in GIS?

   a. Circular       b. Crisp of fuzzy c. Dotted                  d. Straight

              

33.Interpolation is made possible by a principle called ______

   a. Special       b. Spatial auto-correlational   c. Relation                d. Static

              

34.The coastline is having ___

   a. Fuzzy Boundaries   b. Crisp Boundary   c. Line     d. Circle

              

35.What are the Topological properties

   a. Boundary b. Dot    c. Nodes, Lines and polygons                        d. Size

 

36. The science and art of map making is known as ___

   a. Digital maps                                b. Cartography     c. Accuracy     d. Structure

              

37.Geographic fields can be _______ and ___

   a. Raster and Grid   b. Discrete and Continuous   c. Fast and Slow        d. Fixed and Raw

              

38. A continuous Raster is also called _____ raster.

   a. Double point                               b. Floating Point c. Char Point d. String Point

              

39._______ data values are values that provide a name or identifier.

   a. Nominal     b. Ordinal                c. Ratio                   d. Interval

              

40.Which data values refer as a qualitative data values?

   a. Interval and ratio   b. Interval and Categorical  c. Nominal and Ratio     d. Nominal and Categorical

              

41.Quadtrees are _____

   a. Natural        b. Adaptive            c. Static             d. Partition

              

42. The Continuous fields are represented by ________

   a. TIN                                               b. Point                   c. Line              d. Polygon

              

43.Collection of (Connected ) lines may represents phenomenon that are best viewed as ______________

   a. Graph         b. Network             c. Vector                   d. Raster

              

44.Traditional techniques for obtaining spatial data, typically from paper sources included ___________

   a. Planning     b. Manual, digitizing and scanning   c. Marking    d. Posting

              

45.In GIS, data are usually grouped into ______

   a. Layers        b. Transaction        c. Masking               d. Intersection

              

46.GIS software packages provide support for _________ data.

   a. Spatial        b. Attribute              c. Spatial and attribute  d. Parallel and intersection

              

47._______ representation allows easy association with attribute data.

   a. Vector        b. Raster                 c. Masking               d. Interpreted

              

48. SDSS stands for ______

   a. Support direct stand systems b. Spatial direct and stand system

   c. Spatial Decision Spatial system                               d. Spatial decision support system

 

49._________ representation is efficient for image processing .

   a. Manual       b. Raster                c. Vector                   d. Formal

              

50. GIS packages provide facilities to link with a ____ and ex-change attribute data with it.

   a. DBMS         b. Cluster                c. Files                      d. File system

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  

 

 

 

 

 

 

 


Comments

Popular posts from this blog

SYBMS - SEM IV - MCQ

SYBCOM - SEM III - MCQ

MU circular on current year 2020-21 examinations and practicals