Sei sulla pagina 1di 12

International Organisation for Professional Qualifications

Practice Questions

Gain the technology know-how you need to succeed

1. An organization bought an expensive book in order to derive a data that was readily available in internet. Which characteristic of a good information is it lacking? A) B) C) D) Accuracy Cost-effectiveness Fit for purpose Resource efficiency

2. If information flows both ways i.e. it is provided and received by both parties then the communication is known to be A) B) C) D) Multidirectional Duodirectional Bidirectional Crossdirectional

3. Which of the following acts below is not a real act? A) B) C) D) Data Protection Act, 1998 Computer Misuse Act 1990 Plagiarism Prevention Act 1982 Freedom of Information Act 2000

4. Whistle Blowing refers to the action of an employee A) B) C) D) to to to to entertain colleagues inform employer regarding inappropriate conduct of others inform employer regarding rights of subordinates persuade employer in order to get a promotion

5. Which of the following elements should NOT be regarded as a key element of an effective information system A) B) C) D) Data People Hardware None of the above

6. Exchange of information through private networks is an EDI system known as A) B) C) D) Value Value Value Value Added Network (VAN) Incorporated Network (VIN) Capacity Network (VCN) Enhance Network (VEN)

7. The payment system which is set up by the account holder and the bank itself is called A) B) C) D) Direct Debit Standing Order Invoice Discounting Charity Trust

8. The environment in an operating system that works as a base on which applications are run is called A) B) C) D) Software Software Software Software Base House Platform Station

9. The system used by sales department to improve customer relationship is known as A) B) C) D) Customer Relationship Management Customer Service Management Customer Management System Customer Based System

10. Which of the following choices is NOT necessarily a benefit of an integrated system? A) B) C) D) Easier backup Easier specialization Improved security Increased Reliability

11. The documentation that a developer writes so that other developers can read it is called A) B) C) D) Internal Documentation Technical Documentation User Documentation Development Documentation

12. Following terms include the three building blocks of JSP EXCEPT A) B) C) D) Sequence Iteration Fixation Selection

13. Quality of a programming code depends on which of the following factors? A) B) C) D) Portability Reliability Maintainability All of the above

14. The boundary of a programming problem is termed as the _______ of it. A) B) C) D) scope belt tip apex

15. Which of the followings is not a valid software devising tool used in an IDE A) B) C) D) A A A A compiler text editor compass linker

16. The management of recovering lost information due to natural or unnatural disaster is known to be A) B) C) D) disaster management risk management recovery management lost and found management

17. Which of the following security methods can be used in order to ensure that a person is not involved in a work process from the beginning to end? A) B) C) D) Closed-Circuit Television Separation of Duty Biometrics Firewalls

18. Software which is distributed freely for limited period after which a price is charged is called A) B) C) D) Shareholder Softshare Shareware Sharetech

19. Common threats to the IT sector include each of the following theft EXCEPT A) B) C) D) Customer Phishing Webpage defacement Debugging None of the above

20. A ______________ software is the one where the user can modify the programming source code. A) B) C) D) freeware shareware softpad open-source

21. The software that facilitates a developer to view the end result of internet pages or interfaces. A) B) C) D) WDERING WSCTIOU WSDRTYI WYSIWYG

22. The elaborated form of FTP is A) B) C) D) Flextime Protocol File Terminating Protocol Floor Transforming Protocol File Transfer Protocol

23. The benefits of e-commerce for organizations are each of the following terms EXCEPT A) B) C) D) international scope of operation ceaseless (24/7) operation low running cost All of the above

24. A ________ is a program placed in the search engine which reads the web contents to facilitate search result. A) B) C) D) Octopus Owl Spider Viper

25. A synonymous name to junk email is A) B) C) D) Scum Spam Spook Spit

26. Bandwidth is a unit of A) B) C) D) software system transmittable data quality of security all of the above

27. Optical Fibres transmits data through ________. A) B) C) D) Light Sound Electricity Heat

28. Optical Fibres can be produced into ________ & _______. A) B) C) D) Single mode and multimode Helix mode and dendrite mode Open mode and closed mode Binary mode and common mode

29. ____________ is a protocol used to exchange emails through a server. A) B) C) D) SMC SMTP FTP HTTP

30. Skype is an example of ________ technology A) B) C) D) Instant Messaging Blog Voice over Internet Protocol SMTP

31. XSS (Cross-Site scripting) is a __________ technique. A) B) C) D) networking hacking web designing browsing

32. _________ is a small program carried in an executed file and intends to destroy other files. A) B) C) D) Spider Firewall Virus Trojan

33. Which of the following addresses is a possible IP address of the popular search engine Google? A) B) C) D) www. google.com 64.233.183.103 233.google.103 All of the above

34. The protocol https:// refers to __________ web servers. A) B) C) D) Sedimentary Social Secure Software

35. HTTP is an abbreviated form of _______ ________ ________ ________. A) B) C) D) Hypertext Hypertext Hypertext Hypertext Terminal Protocol Transfer Protocol Tertiary Protocol Tangent Protocol

36. The reason behind the fact that trafficking of counterfeit goods through P2P networks is difficult is A) B) C) D) it it it it is is is is cheap global decentralized counterfeited itself

37. The elaborated form of HTML is A) B) C) D) Hyper Text Markup Language Hypertension Markup Language Hybrid Text Markup Language Hyper Text Modified Language

38. The special computer that stores website content is called A) B) C) D) Web page Web developer Web server Homepage

39. A user needs a ____________ to access the internet contents. A) B) C) D) Website Web browser Mozilla Web server

40. According to surveys, the most used browser in the world is A) B) C) D) Mozilla Firefox Microsoft Internet Explorer Google Chrome Apple Safari

41. If an internet user needs a specific content he needs to search in a __________. A) B) C) D) Search Engine Google Search Bar Search Machine

42. The commonly used technology by the Local Area Networks is A) B) C) D) Ethernet Ethermetrics Etheronics Ethertool

43. ____________ is a non permanent connection used for light and periodic data set. A) B) C) D) SVC VCR SPL QPR

44. Topologies can be either physical or _________. A) B) C) D) Longitudinal Psychological Logical Abstract

45. The seven layers in an OSI model include each of the below EXCEPT A) B) C) D) Application Layer Transport Layer Physical Layer Connectivity Layer

46. The parts of an IP address that belong to host or network are determined by the ___________. A) B) C) D) Sub zero Subatomic level Subnet Mask Sub gradients

47. A Wi-Fi is commonly but mistakenly understood as A) B) C) D) Wireless Wireless Wireless Wireless Frequency Fidelity Fire system Fiat

48. ____________ is a term to represent programs composed in visual languages A) B) C) D) Blackboard Storyboard Mainboard Whiteboard

49. The __________ conversion strategy allows the system to be checked one segment after another. A) B) C) D) Phased Parallel Corrective Perfective

50. When a system is checked for fine modification even after having performed as expected a ____________ strategy is taken. A) B) C) D) Parallel Corrective Perspective Perfective

51. One of the reasons behind the decay of a system can be A) B) C) D) Increase of number of users Requirement of more capacity Availability of new technology All of the above

52. The investigative techniques used to obtain information regarding the systems include each of the following techniques EXCEPT A) B) C) D) Observation Meeting Interview Retrospect

53. Some organizations ask employees to sign ___________, which mean that the employee is not allowed to discuss sensitive and confidential information with individuals or groups who are outside the organization, either while employed by the organization or after they leave. A) B) C) D) nondisclosure agreements nonconforming agreements nondeliverable agreements nonconductive agreements

54. _______ skills are that you take with you from employer to employer and which can be applied regardless of your job. A) B) C) D) Transmitting Transparent Transferable Critical

55. ______ is a particular structure used in integrated circuit transistor manufacture. A) CMOS B) GAMA C) TEBS D) ETHOS

56. The general equation for obtaining the value of bus multiplier is A) maximum processor speed = processor bus speed + B) maximum processor speed = processor bus speed C) maximum processor speed = processor bus speed x D) maximum processor speed = processor bus speed / maximum multiplier maximum multiplier maximum multiplier maximum multiplier

57. Which decisions are decisions about what will happen within the organisation in the next five years or so? A) Operational B) Tactical C) Strategic D) Regulative

58. Data being _____ is the most fundamental characteristic of good data/information. A) valid B) plenty C) formal D) countable 59. ________ is used to help managers predict the future, using what if? scenarios, so that they can, as far as possible, see the consequences of decisions that they make. A) Decision support software B) Management Information System C) Middleware D) E-commerce 60. A ______ is a specialist software application that requests web pages (and their assets e.g. images) from a remote web server, downloads them and then renders them onto your computer systems (or mobile devices) screen. A) Modem B) RAM C) Motherboard D) Browser

Answer
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 B C C B D A B C A B B C D A C C B C C D 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 D D D C B B A A B C B C B C B C A C B B 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 A B A C D C B B A D D D A C A C B A A D

Potrebbero piacerti anche