Sei sulla pagina 1di 30

Question Paper

Information Technology and Systems – II (MB1C4): January 2009


 Answer all 99 questions.
 Each question carries one mark.

1. <Answer>
The application layer in the TCP/IP reference model contains protocols like virtual terminal protocols, file transfer
protocols, and electronic mail protocols. The File Transfer Protocol (FTP)
I. Allows a user on one computer to log onto a distant machine and work there.
II. Enables users to move data efficiently from one computer to another.
III. Maps host names onto their network addresses.
(a) Only (I) above
(b) Only (II) above
(c) Only (III) above
(d) Both (I) and (II) above
(e) Both (I) and (III) above.
2. <Answer>
Which among the following layers in the Open System Interconnection (OSI) reference model is also called the
syntax layer?
(a) Data link layer
(b) Presentation layer
(c) Application layer
(d) Physical layer
(e) Transport layer.
3. <Answer>
A protocol is a/an
(a) Working model of an information system
(b) Interconnected system of computers, terminals, and communication channels and devices
(c) Set of instructions that cause a computer to perform a particular task
(d) Standard set of rules and procedures for the control of communications in a communications network
(e) Media over which communication takes place between one computer to another computer.
4. <Answer>
SMS is a service of sending text messages of up to 160 characters length to mobile phones. SMS stands for
(a) System Messaging Service
(b) Source Messaging Service
(c) Special Messaging Service
(d) Short Messaging Service
(e) Storage Messaging Service.
5. <Answer>
ATM is a high-capacity cell switching technology. ATM stands for
(a) Automated Teller Machine
(b) Asynchronous Transfer Mode
(c) Any Time Money
(d) Automatic Teller Machine
(e) Automated Time Money.
6. <Answer>
The software in a computer network include
I. Network operating system.
II. Network interface cards.
III. Network applications.
(a) Only (III) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.

Page 1 of 30
7. <Answer>
The OSI reference model has seven layers. The controls in this model are passed from one layer to the next through
all the seven layers. The purpose of OSI model is to establish communication between different devices. Which of
the following statements is/are false about Network layer?
I. Network layer sets up a logical path between the source and the destination computers in the network, known
as the virtual circuit, for sending out data from one node to another.
II. Network layer ensures successful delivery of a packet to the destination.
III. Network layer splits data packets into frames which are transmitted sequentially by the sender.
(a) Only (II) above
(b) Only (III) above
(c) Both (I) and (II) above
(d) Both (I) and (III) above
(e) Both (II) and (III) above.
8. <Answer>
The OSI reference model has seven layers. The controls in this model are passed from one layer to the next through
all the seven layers. The purpose of OSI model is to establish communication between different devices. Which of
the following statements is/are false about Session layer?
I. The session layer provides the means for establishing, maintaining, and terminating a dialogue between the two
end users.
II. The session layer ensures the complete transfer of data, error recovery, and flow control between the systems.
III. The session layer regulates the direction of message flow.
(a) Only (II) above
(b) Only (III) above
(c) Both (I) and (II) above
(d) Both (I) and (III) above
(e) Both (II) and (III) above.
9. <Answer>
Which of the following statements is/are false about network components?
I. A bridge is used to increase the length of the network.
II. Hubs act as a firewall to prevent unwanted packets from entering and leaving a network.
III. Bridges are slower when compared to repeaters.
(a) Only (II) above
(b) Only (III) above
(c) Both (I) and (II) above
(d) Both (I) and (III) above
(e) Both (II) and (III) above.
10. Which of the following statements is/are false about different topologies? <Answer>

I. Bus topology has limited use because it requires a huge amount of cabling.
II. Star topology requires a greater amount of cabling compared to the tree, ring and bus topologies.
III. Direction of the traffic in ring topology is bidirectional.
(a) Only (II) above
(b) Only (III) above
(c) Both (I) and (II) above
(d) Both (I) and (III) above
(e) Both (II) and (III) above.
11. US-based companies like AT&T, Sprint, WorldCom, and Touch America are <Answer>

(a) IntereXchange Carriers (IXCs)


(b) Subscriber Loop Carriers (SLCs)
(c) Incumbent Local Exchange Carriers (ILECs)
(d) Competitive Local Exchange Carriers (CLECs)
(e) Concrete Local Exchange Carriers (CLECs).

Page 2 of 30
12. The telecommunication standards are governed by the Consultative Committee for International Telephone and <Answer>

Telegraphy (CCITT). CCITT is currently known as


(a) International Telecommunication Authority
(b) International Telecommunications Regulatory Authority
(c) American National Standards Institute
(d) International Telecommunication Union
(e) International Standards Organization.
13. Tymnet is a <Answer>

(a) Backbone
(b) Local Area Network
(c) Wide Area Network
(d) Point of Presence
(e) Metropolitan Area Network.
14. In telecommunication networks, six basic components are used to support an organization’s telecommunication <Answer>

activities. Functions like transmission error control, automatic dialing, and faxing are supported by
(a) Multiplexers
(b) Modems
(c) Internetworked Processors
(d) Telecommunication Software
(e) Router.
15. Which of the following guided media can conduct light pulses generated by lasers at transmission rates as high as 30 <Answer>
billion bits per second?
(a) Coaxial cables
(b) Fiber optics
(c) Twisted-pair wires
(d) Territorial microwave
(e) Open wires.
16. The service provided by the Public Switched Telephone Network (PSTN) is called POTS. POTS stands for <Answer>

(a) Plain Old Telephone Service


(b) Plain Old Television Service
(c) Plain Optical Telephone Service
(d) Public Optical Technology Service
(e) Public Optical Telephone Service.
17. Which of the following guided media is more flexible and easy to install? <Answer>

(a) Twisted-pair wires


(b) Optical cables
(c) Coaxial cables
(d) Communication satellites
(e) Cellular phone systems.
18. Which of the following statements is/are false about Terrestrial microwaves? <Answer>

I. Terrestrial microwaves are similar to radio waves or light and can cover long distances.
II. Terrestrial microwaves medium can be widely used in locations where cabling is very expensive.
III. For Terrestrial microwaves media, microwave antennas are not required to be placed in line of sight.
(a) Only (II) above
(b) Only (III) above
(c) Both (I) and (II) above
(d) Both (I) and (III) above
(e) Both (II) and (III) above.

Page 3 of 30
19. The various media over which data is transmitted and received in a telecommunications network are called <Answer>

telecommunication media. Which of the following telecommunication media is mostly used for local area networks
and in bus networks?
(a) Open wires
(b) Twisted-pair wires
(c) Terrestrial microwaves
(d) Coaxial cables
(e) Optical cables.
20. Which of the following technologies is/are not used in wireless LANs? <Answer>

I. Infrared.
II. Spread spectrum.
III. Ultra violet LAN.
(a) Only (II) above
(b) Only (III) above
(c) Both (I) and (II) above
(d) Both (I) and (III) above
(e) Both (II) and (III) above.
21. Which of the following stages in the Herbert Simon model is same as ‘Follow up’ stage in the systems approach to <Answer>

problem solving?
(a) Review
(b) Design
(c) Intelligence
(d) Choice
(e) Analysis.
22. Which of the following factors are evaluated for making a make-or-buy decision? <Answer>

I. In-house production cost.


II. Number of supervisors.
III. Purchasing cost.
IV. Available capacity.
(a) Both (I) and (III) above
(b) Both (I) and (IV) above
(c) Both (III) and (IV) above
(d) (I), (III) and (IV) above
(e) All (I), (II), (III) and (IV) above.
23. In the MIS design process, employees belonging to the technical cadre <Answer>

I. Represent the users of MIS.


II. Form the part of top level management.
III. Act as advisors and information solicitors.
(a) Only (I) above
(b) Only (III) above
(c) Both (I) and (II) above
(d) Both (I) and (III) above
(e) All (I), (II) and (III) above.

Page 4 of 30
24. The various approaches to MIS design are the shotgun approach, traditional approach, and empirical approach. <Answer>

These approaches are used for


I. Guiding the top management in designing MIS.
II. Providing a direction to design teams in developing the MIS design.
III. Specifying how information should flow to the various layers of management and to different managers in
each layer.
(a) Only (II) above
(b) Only (III) above
(c) Both (I) and (II) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
25. Development of the descriptive model, normative model, and consensus model of the system are part of the <Answer>

Information analysis model. A descriptive model provide a description of


I. Future operational information.
II. The roles played by each user in the organization to accomplish the tasks at their respective levels of
operations.
III. Interactions between the departments as well as between the departments and external agencies.
(a) Only (II) above
(b) Only (III) above
(c) Both (I) and (II) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
26. In the shotgun approach to MIS design <Answer>

I. The user has to manually filter and sort the information based on the requirement.
II. The cost of gathering and storing information using this approach does not increase the overall costs for the
organization.
III. Information consumes less memory space and chances of duplication are avoided.
(a) Only (I) above
(b) Only (III) above
(c) Both (I) and (II) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
27. Which of the following activities is/are involved in MIS design process? <Answer>

I. Planning the structure of the information systems group.


II. Decision making regarding the flow of information between departments and personnel.
III. Implementation of MIS design process influences its operational performance.
(a) Only (II) above
(b) Only (III) above
(c) Both (I) and (II) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
28. There are various types of outsourcing relationships identified between the buyer and the outsourcing vendor. <Answer>

Which of the following outsourcing relationships will very few organizations go for?
(a) Basic outsourcing relationship
(b) Preferred outsourcing relationship
(c) Layoff outsourcing relationship
(d) Strategic outsourcing relationship
(e) Non-strategic outsourcing relationship.

Page 5 of 30
29. Which of the following statements is/are true regarding different documents present in the IS procurement process? <Answer>

I. Request for Information (RFI) does not invite a seller to participate in the bid and does not involve any
obligations on the part of either the buyers or the sellers.
II. Request for Information (RFI) necessarily leads to a Request for Quotation (RFQ) or a Request for Proposal
(RFP).
III. Request for Proposal (RFP) is the document used for requesting the vendors to participate in the bidding
process for hardware, software, and/or services.
(a) Only (III) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
30. Which of the following steps or phases is used as the criteria to judge a proposal in IS procurement when live <Answer>

demonstrations and system benchmarks may not provide the entire information that is required to make a purchase?
(a) Identifying, selecting and planning the system
(b) Analyzing the system
(c) Inviting proposals
(d) Evaluating proposals
(e) Selecting the vendor.
31. Robert Zmud and James Cox identified four levels of involvement that can be applied to each of the implementation <Answer>
stages. They include consultation, influence, commitment and responsibility. They proposed that every group’s level
of involvement varied with each stage of the implementation process. The level(s) of involvement of operating team
during ‘Technical design’ stage is/are
(a) Influence
(b) Responsibility
(c) Consultation
(d) Commitment and influence
(e) Commitment and responsibility.
32. Prior to installation, all systems should be tested. System testing includes <Answer>

I. Complex logic systems.


II. Tests for system interfacing.
III. Test for usual operating conditions.
IV. Verification of multiple inputs.
(a) Both (I) and (II) above
(b) Both (I) and (III) above
(c) Both (II) and (IV) above
(d) (I), (II) and (III) above
(e) (I), (II) and (IV) above.
33. In the MIS implementation process, the point at which the new system replaces the old system is called as <Answer>

(a) Blackout
(b) Break down
(c) Cross over
(d) Cutover
(e) Turn off.

Page 6 of 30
34. Documentation is the process of maintaining written reports, describing the scope, purpose, information flow, and <Answer>

operating procedures of the system. It is required during


I. Troubleshooting.
II. Training of operating personnel.
III. Upgrading the system.
(a) Only (III) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
35. Robert Zmud and James Cox identified four levels of involvement that can be applied to each of the implementation <Answer>
stages. They include consultation, influence, commitment and responsibility. They proposed that every group’s level
of involvement varied with each stage of the implementation process. The level(s) of involvement of system team
during ‘Strategic design’ stage is/are
(a) Influence
(b) Responsibility
(c) Commitment and consultation
(d) Commitment and influence
(e) Commitment and responsibility.
36. With reference to the steps in MIS development, an acceptance test program is prepared for the <Answer>

(a) Top management


(b) Operating personnel
(c) System analysts
(d) Functional heads
(e) Line managers.
37. Training to organizational members is given in general as well as in specific areas. Which among the following <Answer>

includes training given in general areas?


I. Introduction to information system concepts.
II. Technical details about operating MIS in functional areas.
III. Training regarding connectivity and flow of information to and from each department.
(a) Only (I) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
38. The maintenance of the MIS could be a major problem if there is no proper plan involved. Who should actually <Answer>

initiate the process of maintenance?


(a) Top management
(b) Operating team
(c) System analysts
(d) Functional heads
(e) Supporting team.
39. Robert Zmud and James Cox identified four levels of involvement that can be applied to each of the implementation <Answer>
stages. They include consultation, influence, commitment and responsibility. They proposed that every group’s level
of involvement varied with each stage of the implementation process. The level(s) of involvement of Top
management during ‘Testing and conversion’ stage is/are
(a) Influence
(b) Responsibility
(c) Consultation
(d) Consultation and responsibility
(e) Influence and responsibility.

Page 7 of 30
40. Developing detailed technical designs and physical installation of networking and other facilities are responsibilities <Answer>
of
I. Systems analysts.
II. Functional managers.
III. Operating team.
(a) Only (I) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
41. One of the frameworks that help organizations implement IT governance is Control Objectives for Information and <Answer>

Related Technology (COBIT). This framework was developed by


(a) Central Computing and Telecommunications Agency
(b) Information Systems Audit and Control Foundation
(c) Information Resources Management Association
(d) British Standards Institute
(e) American National Standards Institute.
42. Which of the following statements is/are false regarding Business Continuity and Disaster Recovery (BC/DR) <Answer>

plans?
I. Disaster Recovery Plan (DRP) is a plan that ensures that the required IT services are available and that there is
minimum disruption in business activities in the event of a disaster.
II. Business Continuity Plan (BCP) ensures that the organization resumes its business operations only after the
occurrence of a disruptive event.
III. Most executives prefer to use the term DRP than BCP as the former is a much broader term that includes even
the latter.
(a) Only (I) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
43. According to the Gartner Group, a business resumption plan contains <Answer>

(a) Details about the strategies to be adopted in case of failure of the procedures during disasters
(b) Details about the various ways of carrying out essential services at the crisis site
(c) Details of ways in which the business operations can be recovered at an alternate location
(d) Details to deal with external events that will create a serious impact on the organization
(e) Both (a) and (c) above.
44. Simulation is a technique used to measure the sufficiency and completeness of various plans. This technique is part <Answer>
of the
(a) Test plan
(b) Backup plan
(c) Recovery plan
(d) Emergency plan
(e) Contingency plan.
45. IT Infrastructure Library (ITIL) framework is published in a series of eight books. IT Financial Management, <Answer>

Availability Management, and Capacity Management are part of


(a) Service delivery
(b) Service support
(c) Planning to implement service management
(d) Business perspective
(e) Software assets management.

Page 8 of 30
46. In the Control Objectives for Information and Related Technology (COBIT) framework, which of the following <Answer>

domain describes about the strategies that the organization should adopt to identify its IT requirements, procure
technology, and implement it?
(a) Planning and Organization
(b) Acquisition and Implementation
(c) Delivery and Support
(d) Monitoring
(e) Both (a) and (d) above.
47. While preparing a backup plan, it should be ensured that a backup is taken for all the vital resources of the <Answer>

organization. ‘Backup plan’ does not constitute


(a) The type of backup
(b) The frequency of backup
(c) The location of the backup
(d) The priorities assigned for recovering the various systems
(e) The process of carrying out the evacuation.
48. Who should take the IT decisions according to IT governance? <Answer>

(a) Chief information officer


(b) Chief financial officer
(c) Board
(d) Chief technology officer
(e) Chief operational officer.
49. Which of the following security controls oversees the management’s ability to battle interruptions and bring <Answer>

normalcy back in the operations?


(a) Access control
(b) Compliance control
(c) Business continuity management control
(d) Communications and operations management control
(e) Personnel security control.
50. Which of the following statements is/are false regarding Information Resources Management Association (IRMA)? <Answer>

I. Students are eligible to become members of IRMA.


II. The primary objective of IRMA is to provide resources, assistance and other support to individuals who want
to enhance their knowledge in Information Resource Management (IRM).
III. IRMA provides professional and educational services to individuals and organizations for a low membership
fee.
(a) Only (I) above
(b) Only (II) above
(c) Both (I) and (II) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
51. Under Section 802 (a) (1) of the Sarbanes-Oxley Act, organizations are required to store all records related to an <Answer>

audit for at least


(a) Five years
(b) One year
(c) Two years
(d) Three years
(e) Four years.

Page 9 of 30
52. Which of following is/are not the characteristic(s) of a server certificate? <Answer>

I. It authenticates identity of websites to avoid impersonation.


II. It facilitates exchange of personal information like credit card numbers among website visitors.
III. It is a necessity for e-commerce sites that facilitate exchange of confidential information among customers,
vendors and clients.
IV. It is used to authenticate the identity of visitors and restrict their access to specific content.
(a) Only (II) above
(b) Only (IV) above
(c) Both (I) and (II) above
(d) Both (I) and (III) above
(e) (I), (II) and (IV) above.
53. Unstructured data can be found in <Answer>

I. Web.
II. Databases.
III. Images.
IV. Data files.
(a) Both (I) and (II) above
(b) Both (I) and (III) above
(c) Both (I) and (IV) above
(d) (I), (III) and (IV) above
(e) All (I), (II), (III) and (IV) above.
54. Given below are a set of combinations related to cryptography. Identify the correct combination. <Answer>

I. Cipher – Mathematical function.


II. Cryptographic Algorithm – Works independent of the key.
III. Crypto variables – Cipher.
IV. Cryptographic algorithm – Data encryption and decryption.
(a) Both (I) and (II) above
(b) Both (I) and (III) above
(c) Both (I) and (IV) above
(d) (I), (III) and (IV) above
(e) All (I), (II), (III) and (IV) above.
55. In the late 1990s and early 2000s, a few corporate scams increased the need for organizations to strictly abide with <Answer>

corporate governance norms. Enron Corporation and WorldCom Inc. were two such companies involved in
(a) Cheap marketing
(b) Selling flawed products
(c) Accounting irregularities
(d) Improper use of customer information
(e) HR irregularities.
56. In the IT Infrastructure Library (ITIL) framework, the various disciplines – Network Service Management, <Answer>

Management of Local Processors, and Systems Management belong to the set called
(a) Software Assets Management
(b) Service Delivery
(c) Applications Management
(d) Infrastructure Management
(e) Business perspective.
57. Transnational companies have <Answer>

(a) Independent operations


(b) Operations driven by the headquarters
(c) Operations supported by intellectual cooperation
(d) Integrated operations
(e) Both (a) and (b) above.

Page 10 of 30
58. Which of the following statements is/are true regarding international organizations? <Answer>

I. International organizations concentrate more on understanding national differences.


II. International organizations develop innovations in the home country and deploy it in other countries in order to
strengthen their competitive position in other countries.
III. The subsidiaries of international organizations are more efficient, more flexible and have comparatively more
autonomy than the subsidiaries of multinational companies.
(a) Only (II) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
59. Kranthi India Private Limited is a textile company that has centralized its operations in India. All the strategic and <Answer>

operational decisions in the company are centralized and are taken by the parent organization. Even the R&D
facility of the company is centralized. What type of strategy is the company following?
(a) Global strategy
(b) International strategy
(c) Transnational strategy
(d) Multinational strategy
(e) Independent strategy.
60. Which of the following is a major privacy and employment related concern for many countries that make it difficult <Answer>
for the IT managers to properly manage IT globally?
(a) Cultural differences
(b) Vendor problems
(c) Operational problems
(d) Trans-border flow of data
(e) Varied set of skills.
61. Which of the following statements is/are true regarding ITeS? <Answer>

I. ITeS is a unique form of outsourcing of non-core services to an external company that owns and manages the
process.
II. ITeS reduces the operating costs of the organization, thus enhancing its profitability.
III. ITeS can involve outsourcing processes that require continuous enhancement and rigorous quality checks and
those that can be enabled with IT.
(a) Only (II) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
62. An American software development company realized that the Japanese users of the company’s software <Answer>

complained on finding a dollar sign in place of the yen in a financial report which was denominated in yen. This is a
challenge faced by the company due to
(a) Problem of control
(b) Trans-border flow of data
(c) Geopolitical differences
(d) Cultural differences
(e) Varied set of skills.
63. Which was introduced in 1980s, provided technology to the management for investigating the strengths and <Answer>

weaknesses of the organization without the need for programmers?


(a) Transaction Processing Information Systems (TPIS)
(b) Management Information Systems (MIS)
(c) Decision Support Systems (DSS)
(d) Executive Information Systems (EIS)
(e) Expert Systems (ES).

Page 11 of 30
64. Which of the following information systems at CRY are used for strategic information analysis and providing <Answer>

service to donors?
(a) Financial accounting system
(b) Donation management system
(c) Contact management system
(d) Volunteer management system
(e) Human resource management system.
65. MarketSite and Ariba Network are examples of <Answer>

(a) Broker hubs


(b) Aggregator hubs
(c) Translator hubs
(d) Collaboration hubs
(e) One-to-many marketplaces.
66. CRY manages its donations, financials, contacts, and volunteers using a variety of information systems. Which of <Answer>

the following combination of information systems are integrated to check for any common volunteers and donors?
(a) Volunteer and Contact Management Systems
(b) Contact and Donation Management Systems
(c) Volunteer and Donation Management Systems
(d) Donation Management and Financial Accounting Systems
(e) Contact Management Systems and Financial Accounting Systems.
67. Non-profit organizations (NPOs) play a very important role in society. Which of the following statements is/are true <Answer>
regarding NPOs?
I. The scope of activities provided by the NPOs is sometimes limited to certain geographical areas.
II. The nature and scope of activities provided by NPOs vary from organization to organization.
III. The NPOs function only from funds received from government organizations.
(a) Only (II) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
68. A Project Management Information System (PMIS) helps in planning, scheduling and tracking the various tasks and <Answer>
procedures involved in the projects. It contains a set of automated tools and techniques which are used for gathering,
integrating and disseminating the results obtained from the project management process. Arrange the following
steps in an order for selecting a PMIS.
I. A set of priorities should be laid out for the items based on the extent to which they are required.
II. Each software package should be compared with a standard project which represents the current and the
forecasted future requirements.
III. A comprehensive set of selection criteria should be compiled.
IV. A preliminary evaluation of the software packages should be conducted with the help of data supplied by the
vendor, the product reviews and the software surveys.
V. Support from the vendors, training, maintenance of the product, etc. should be negotiated.
(a) I-IV-II-III-V
(b) I-II-V-IV-III
(c) II-IV-I-III-V
(d) III-I-II-IV-V
(e) III-I-IV-II-V.

Page 12 of 30
69. Which of the following statements is/are false regarding Project Management Information Systems (PMIS)? <Answer>

I. PMIS reports always highlight the actual problems involved.


II. PMIS equally cover all the project areas.
III. PMIS enables the project manager to update the project schedules on a regular basis.
(a) Only (III) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
70. Match the following infomediaries with their respective business models: <Answer>

i. Online exchanges p. These infomediaries offer guidance to buyers in fragmented


markets by providing information at a single online contact point
ii. Aggregators q. These infomediaries help sellers dispose of perishable goods or
excess stocks and enable buyers to purchase goods at discounted
rates
iii. Online auctioneers r. These infomediaries are neutral third parties that match the ask
and bid rates in a regulated environment

(a) i-q, ii-p, iii-r


(b) i-r, ii-p, iii-q
(c) i-p, ii-r, iii-q
(d) i-q, ii-r, iii-p
(e) i-p, ii-q, iii-r.
71. “Common representation of data and process” is one of the principles to be followed by the organizations for <Answer>

successful implementation of Enterprise Application Integration (EAI). This principle enables


I. The application to become accessible to all within the enterprise.
II. The application to become generic.
III. The application to become robust.
(a) Only (I) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
72. In Enterprise Application Integration (EAI), simulation technique is used for <Answer>

(a) Testing
(b) Integration
(c) Consolidation
(d) Application filtering
(e) Modifying the application.
73. The successful implementation of Enterprise Application Integration (EAI) is possible if the organization follows <Answer>

certain principles. Which of the following principles of EAI can resolve the issues of having no stability in
applications, protocols, standards or technology?
(a) Alignment of plans to strategy
(b) Re-factoring interfaces
(c) Early and regular testing
(d) Common representation of data and process
(e) Enforcement of EAI architecture.

Page 13 of 30
74. Which of the following is/are not example(s) for Consumer-to-Consumer (C2C) websites? <Answer>

I. Yabuy.com.
II. BigEquip.com.
III. DoveBid.com.
(a) Only (II) above
(b) Only (III) above
(c) Both (I) and (II) above
(d) Both (I) and (III) above
(e) Both (II) and (III) above.
75. Which of the following statements is/are true with regard to the first phase of e-business evolution? <Answer>

I. The first phase, i.e., the dotcom phase focused more on customer centric e-business.
II. In the first phase, most organizations viewed e-business merely as the development of a website for offering
information about the company and its products.
III. Websites were used as sales and marketing channels in the first phase.
(a) Only (II) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
76. PricewaterhouseCoopers has identified four distinct phases of e-business. Arrange the below statements from first to <Answer>
fourth phase according to PricewaterhouseCoopers.
I. Putting supply chain management processes online by linking suppliers with the enterprise, using extranets and
intranets.
II. Convergence will lead to innovative products and services.
III. Implementation of a website that will enable the concerned organization to buy and sell online.
IV. Organization forms alliances with other online players indicating the adoption of e-business as a commercial
tool.
(a) I-II-IV-III
(b) I-III-II-IV
(c) II-IV-I-III
(d) III-IV-II-I
(e) III-I-IV-II.
77. Execution of the supply chain should be based on the available information details at each stage. Which of the <Answer>

following is not a component of the supply chain execution process?


(a) Distributed management
(b) Replenishment
(c) Transportation planning
(d) Reverse distribution or reverse logistics
(e) Production.
78. In the supply chain execution process, factors like time, quantity and location with regard to <Answer>

sub-assemblies is determined by
I. Master production schedule.
II. Order planning.
III. Manufacturing resource planning system.
(a) Only (I) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.

Page 14 of 30
79. Which of the following is/are the characteristic(s) of responsive supply chain? <Answer>

I. Available-to-Promise (ATP) factor.


II. Assigning delivery dates.
III. Upward & downward integration across the supply chain.
(a) Only (II) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
80. Given below are some of the components of the e-supply chain and their description. Choose the component(s) that <Answer>
has/have been correctly described.
I. E-logistics – Redesigning warehousing and product distribution using e-business technology.
II. Supply chain replenishment – Helps coordinate product flows across business units.
III. Collaborative product development – Design and implementation of the product development processes within
the organization and across partners and suppliers in the supply chain.
(a) Only (II) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
81. The type of inter-enterprise integration that modifies weak links in the supply chain based on changes in market <Answer>

conditions to achieve an advantage over competitors is


(a) Enterprising supply chain
(b) Responsive supply chain
(c) Intelligent supply chain
(d) Non-responsive supply chain
(e) Non-intelligent supply chain.
82. The integration of suppliers and business partners into a single manufacturing entity is called as <Answer>

(a) E-supply chain


(b) Supply chain replenishment
(c) Extraprise supply network
(d) E-procurement
(e) Continuous replenishment.
83. As the different materials and components have varying levels of importance in the production process, the <Answer>

relationships with different suppliers and channel partners also vary. The relationship between the company and the
supplier of direct or indirect material is called
(a) Strategic relationship
(b) Commodity-based relationship
(c) Go-to-the-market relationship
(d) Non-Strategic relationship
(e) Go-to-the-product relationship.
84. The latest trend in make-to-stock model is to assemble the final product in the distribution channel. This process is <Answer>

called
(a) Imbursement
(b) Advancement
(c) Deployment
(d) Replenishment
(e) Postponement.

Page 15 of 30
85. Which of the following characteristics is/are not exhibited by the built-to-order model? <Answer>

I. Mass customization.
II. Flexibility in procurement process.
III. Managing large stocks.
(a) Only (I) above
(b) Only (II) above
(c) Only (III) above
(d) Both (I) and (II) above
(e) Both (I) and (III) above.
86. The complexity of the Enterprise Resource Planning (ERP) system increases as the number of modules/applications <Answer>
that it needs to integrate increases. The maintenance of a system is more difficult than deployment. Therefore,
organizations are seeking end-to-end management tools to manage complex ERP systems. Which of the following
statements is/are true about service management tool?
I. It manages the network and systems for ERP.
II. It schedules jobs, monitors events, data output, backup and recovery.
III. It helps the management monitor the performance of various ERP applications.
(a) Only (I) above
(b) Only (II) above
(c) Only (III) above
(d) Both (I) and (II) above
(e) Both (I) and (III) above.
87. Which of the following methods is most widely used for an integrated process view? <Answer>

(a) Baan
(b) SAP
(c) JD Edwards
(d) ARIS
(e) CTI.
88. An Enterprise Resource Planning (ERP) system makes the process of tracking the lead times of all materials of the <Answer>

company easier. Identify the correct sequence of steps for tracking lead times using ERP.
I. Reaches the order to heads of various departments.
II. Determining the route and mode of transport.
III. Checking order by ERP system.
IV. Placing the customer order.
V. Preparing the bill of material.
VI. Preparing the production schedule.
VII. Preparing the purchase order.
(a) IV-I-VI-III-V-VII-II
(b) IV-I-III-V-VI-VII-II
(c) IV-I-VI-V-III-VII-II
(d) IV-I-VI-III-II-V-VII
(e) IV-VI-I-III-V-VII-II.
89. In ERP, which of the following statements is/are true with regard to the Big Bang approach? <Answer>

I. Big Bang approach forces employees to cope with the change quickly and thus speeds up the pace of change,
bringing about the benefits in a short span of time.
II. Big Bang approach implementation demands higher level of commitment from the employees.
III. In a Big Bang approach, the ERP implementation project is divided into logical phases, and the phases are
implemented one at a time.
(a) Only (II) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.

Page 16 of 30
90. Which of the following is/are involved in Enterprise Resource Planning (ERP) implementation project? <Answer>

I. Consultants.
II. People from various departments.
III. Quick learners.
(a) Only (II) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
91. Which of the following statements is/are true regarding Enterprise Resource Planning (ERP)? <Answer>

I. It makes optimum utilization of resources.


II. It reduces the consistency.
III. It enhances the integrity of data.
(a) Only (II) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
92. According to the ARIS framework, which of the following views look at all the departments and the people working <Answer>
in it?
(a) Data view
(b) Function view
(c) Organization view
(d) Process view
(e) Program view.
93. Which of the following, links all independent applications in a network, enabling the network to create custom <Answer>

composite applications?
(a) Service oriented architecture
(b) Business intelligence
(c) Application programming interface
(d) Data schemes
(e) Data mining.
94. The time gap between the receipt of the order and the delivery of the product is called <Answer>

(a) Lead time


(b) Cycle time
(c) Grace time
(d) Finishing time
(e) Response time.
95. Which of the following ERP modules comprises sub modules like master data management, warehouse management <Answer>
and pricing management?
(a) Finance and accounting module
(b) Manufacturing module
(c) Human resource management module
(d) Sales and distribution module
(e) Plant maintenance module.

Page 17 of 30
96. Which of the following features is/are not included in a well established e-CRM infrastructure? <Answer>

I. It manages several customer contact points separately.


II. It defines new business processes and data.
III. It adds new system applications and components.
(a) Only (I) above
(b) Only (II) above
(c) Only (III) above
(d) Both (I) and (II) above
(e) Both (I) and (III) above.
97. Based on spending habits, customers can be classified into various types of loyalists. In this context, Which of the <Answer>

following statements is/are false?


I. Deliberate loyalists are those who are not willing to take pains to shift to new products.
II. Emotional loyalists are those who have an emotional attachment with the brand.
III. Inert loyalists are those who are more likely to switch.
(a) Only (I) above
(b) Only (II) above
(c) Only (III) above
(d) Both (I) and (II) above
(e) Both (I) and (III) above.
98. Organizations can build customer loyalty by personalizing and customizing their products or services to meet <Answer>

customer requirements. Which of the following statements is/are false with regard to e-CRM tool used for
personalization of products and services?
I. Rules based software is generally used for cross-selling.
II. Inference based software tracks customer behavior and groups together customers who have similar behavior.
III. Inference based software is used for selling specific products and services.
(a) Only (II) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
99. Capturing, sharing and storing of customer information through electronic means and making it accessible to the <Answer>

entire organization is called


(a) Content management
(b) Contact management
(c) Information sharing
(d) Information capturing
(e) Information storing.
100. Which of the following is/are component(s) of e-CRM? <Answer>

I. Customer support and service.


II. Retention management.
III. Cross-selling and up-selling software.
(a) Only (I) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.

END OF QUESTION PAPER

Page 18 of 30
Suggested Answers
Information Technology and Systems – II (MB1C4): January 2009
Answer Reason

1. B The application layer is situated above the transport layer in the TCP/IP reference < TOP >
model. The various protocols that the layer supports are: virtual terminal protocols, file
transfer protocols, and electronic mail protocols. The file transfer protocol enables
users to move data efficiently from one computer to another.
2. B The presentation layer also referred to as syntax layer, provides appropriate data < TOP >
transmission formats and codes. It performs text compression, code conversion, or
security encryption on the message. This layer tries to convert the data into a form that
can be accepted and understood by the application layer.
3. D A protocol is a standard set of rules and procedures for the control of communications < TOP >
in a communications network. It consists of a set of rules regarding communication
that ensures that all the computers in the network communicate in the same language.
4. D In wireless networks, no wires are necessary to make connections to mobile < TOP >
computers. These networks use three major protocols: wireless application protocol
(WAP), short messaging service (SMS), and global system for mobile (GSM). Short
Messaging Service (SMS) is a service of sending text messages of up to 160 characters
length to mobile phones.
5. B Asynchronous Transfer Mode (ATM) is an emerging, high-capacity cell switching < TOP >
technology. An ATM switch breaks voice, video, and other data into fixed cells of 53
bytes and routes it to its next destination on the network. Companies which require
fast, high-capacity multimedia capabilities for voice, video, and data communication
are developing ATM networks.
6. C A computer network consists of both hardware and software. The hardware includes < TOP >
network interface cards and cables. The software includes the network operating
system, communication protocols and network applications.
7. B Network layer sets up a logical path between the source and the destination computers < TOP >
in the network, known as the virtual circuit, for sending out data from one node to
another. This layer ensures successful delivery of a packet to the destination. Data link
layer splits data packets into frames which are transmitted sequentially by the sender.
8. A The session layer provides the means for establishing, maintaining, and terminating a < TOP >
dialogue or session between the two end users. It specifies the dialogue type (one-way,
two-way alternative, or two-way simultaneous), initiates a dialogue, and even
regulates the direction of message flow. The transport layer ensures the complete
transfer of data, error recovery, and flow control between the systems.
9. A When compared to repeaters, bridges are slower, as they do some extra processing. < TOP >
Hubs are used as centralized points, to which various segments in a LAN are
connected. A hub joins multiple devices together to form a network within which they
communicate. Routers select the best path to route the message, based on the
destination address and the origin. Routers act as a firewall to prevent unwanted
packets from entering and leaving a network. A bridge is used to increase the length of
the network.
10. D Statement (I) and (III) are false because mesh topology has a limited use as it requires < TOP >
a huge amount of cabling and a number of I/O ports and it is difficult to install and
reconfigure. Ring topologies, however, are subject to traffic and media constraints, i.e.,
the number of devices and the length of the ring. Another disadvantage is the direction
of the traffic, which is unidirectional, that is, it flows in a single direction.

Page 19 of 30
11. A An IntereXchange Carrier (IXC), also known as long distance carrier comes into play < TOP >
when a user places a call outside the local transport area. In the US, companies like
AT&T, Sprint, WorldCom, and Touch America act as the IXCs. These IXCs provide
long distance communication services within the Local Access and Transport Area
(LATA).
12. D Telecommunication standards are governed by the International Telecommunications < TOP >
Union (ITU), previously called the Consultative Committee for International
Telephony and Telegraphy (CCITT). The ITU was established on May 17, 1865 in
Paris. It is currently a specialized division of the United Nations and is headquartered
at Geneva, Switzerland.
13. C Tymnet is a wide area network (WAN) which has more than 1,000 points of presence < TOP >
(POP) in the US. POP allows customers to access WAN by means of a local analog
telephone call or a direct digital connection.
14. B Modem is a device that converts digital signals from input/output devices into < TOP >
appropriate frequencies at a transmission terminal, and re-converts them into digital
signals at a receiving terminal. They support functions like transmission error control,
automatic dialing and faxing.
15. B Fiber optics use cables consisting of one or more hair-thin filaments of glass fiber < TOP >
wrapped in a protective jacket. They can conduct light pulses generated by lasers at
transmission rates as high as 30 billion bits per second. The size and weight of these
cables is substantially lesser than conventional cables. These also work at a greater
speed and have larger carrying capacity.
16. A The Public Switched Telephone Network or PSTN was the first telecom network. The < TOP >
PSTN telephone lines used analog technology. In this network system, copper wires
carry the transmitted data in the form of electrical pulses from one end to another.
PSTN ensures good audio quality over the network. The service provided by the PSTN
is called the Plain Old Telephone Service (POTS).
17. A Twisted-pair wires are more flexible than coaxial cables and optical fibers and it is < TOP >
very easy to install them. And twisted-pair wires also enhance the electrical
performance and give out higher bit rates compared to the untwisted-pair wires.
Communication satellites and cellular phone systems are unguided media.
18. B Terrestrial microwave involves earthbound microwave systems that transmit high- < TOP >
speed radio signals between the relay stations spaced approximately at 30 mile
intervals. Microwaves are similar to radio waves or light and can cover long distances.
This medium can be widely used in locations where cabling is very expensive. The
major disadvantage with this system is that the microwave antennas are required to be
placed in line of sight or in a place where they are visible from each other.
Geographical constraints could make this a difficult proposition in some areas.
19. D Coaxial cables are mostly used for local area networks and in bus networks. < TOP >

20. B A wireless LAN enables users to move around with a computer or a device and stay < TOP >
connected to the network. Infrared LAN is a wireless LAN that makes use of infrared
rays to establish network links between the various LAN components. Spread
spectrum is the technology widely used in wireless LANs. This technology is based on
radio waves which facilitate communication between computer systems or devices
within a limited area. Ultra violet LAN technology is not there in Wireless LANs.
21. A Review stage in the Herbert Simon model is same as ‘Follow up’ stage in the systems < TOP >
approach to problem solving.
22. D Every organization needs to make a decision whether to develop a part or a component < TOP >
in-house or buy it from external sources. This is called as make-or-buy decisions.
Organizations make this evaluation by considering factors like cost of production (in-
house), purchasing cost (external sources), quality, available capacity, reliability, etc.
However, the number of supervisors is not evaluated for making a make-or-buy
decision.

Page 20 of 30
23. B Employees belonging to the managerial cadre range from lower to top management < TOP >
and represent the main users of MIS. The employees who belong to the technical cadre
act as advisors and information solicitors.
24. D The approaches provide directions to the design team in developing MIS. It broadly < TOP >
specifies how information should flow to different layers of management and to
different managers in each layer.
25. D Though a descriptive model provides lots of information about the roles played by the < TOP >
users, yet it limits itself to the present/current operational information and does not
provide any insights on future operations of the organization. Hence, a normative
model is developed to get a view of the future operations and probable decisions that
could be taken.
26. A In the shotgun approach, the system ignores the process which filters the information < TOP >
or validates the query. Therefore, the user has to manually filter and sort the
information based on the requirement. This approach increases the cost of gathering
and storing information. The information also consumes a lot of memory space. The
system also returns identical information for different queries thus leading to
duplication of information.
27. D The process of planning the structure of the information systems group is taken care of < TOP >
in the organizing stage of MIS planning. The MIS design involves identifying and
allocating optimum information infrastructure and resources to all those personnel who
are called upon to make effective decisions in the long run. It specifies which
resources are to be allocated to which department and/or personnel. Design part of
MIS implementation influences it’s operational performance.
28. D In Basic outsourcing relationship, the organization buys the products or services of < TOP >
the outsourcing vendor considering the price and convenience factors. In Preferred
outsourcing relationship, the buyer and the vendor lay down preferences and prices
which would benefit each other. In Strategic outsourcing relationship, both buyer and
the seller share the risks and rewards equally. Very few organizations go in for these
kinds of relationships. Remaining options are not relevant.
29. C Request for Proposal (RFP) is the document used for requesting the vendors to < TOP >
participate in the bidding process for hardware, software, and/or services. Request for
Information (RFI) does not invite a seller to participate in the bid and does not involve
any obligations on the part of either the buyers or the sellers. Request for Information
(RFI) may not necessarily lead to an Request for Quotation (RFQ) or an Request for
Proposal (RFP).
30. B Sometimes, live demonstrations and benchmarks may not provide the entire < TOP >
information that is required to make a purchase. In these situations, the requirements
that are listed by the organization in the second phase (system analysis) can be used as
the criteria to judge a proposal.

Page 21 of 30
31. D Levels of Involvement of the Organizational Members during MIS Implementation < TOP >

Implementation Top Functional Operating System


Stage Management Head Team Team
Entire Project Commitment Responsibility Commitment Commitment &
& Influence Consultation
Initiation Influence Responsibility Commitment Influence &
& Influence Consultation
Strategic Influence Responsibility Commitment Commitment &
Design & Influence Consultation
Technical No Influence Commitment Commitment &
Design Involvement & Influence Responsibility
Development No Influence Commitment Commitment &
Involvement & Influence Responsibility
Testing & Consultation Responsibility Commitment Commitment &
Conversion & Influence Influence
Evaluation Influence Responsibility Commitment Consultation
&
Consultation
From the above table, the level of involvement of operating team during ‘Technical
design’ stage are Commitment & Influence.
32. E Component testing includes tests for accuracy, range, and frequency of input, usual < TOP >
operating conditions, human factor, and reliability. System testing includes verification
of multiple inputs, complex logic systems, interaction of humans with widely varied
equipment, system interfacing, and timing of different parts.
33. D Cutover is the point at which the new system replaces the old system. This entails < TOP >
activities like the physical transfer of files, furniture, and other office equipment and
also the movement of people. Whereas, remaining options are not relevant.
34. E Documentation refers to the process of maintaining written reports describing the < TOP >
scope, purpose, information flow, and operating procedures of the system. It is
required when there is need for troubleshooting, replacement of subsystem, training
operating personnel, and upgrading the system.
35. C Levels of Involvement of the Organizational Members during MIS Implementation < TOP >

Implementation Top Functional Operating System


Stage Management Head Team Team
Entire Project Commitment Responsibility Commitment Commitment &
& Influence Consultation
Initiation Influence Responsibility Commitment Influence &
& Influence Consultation
Strategic Influence Responsibility Commitment Commitment &
Design & Influence Consultation
Technical No Influence Commitment Commitment &
Design Involvement & Influence Responsibility
Development No Influence Commitment Commitment &
Involvement & Influence Responsibility
Testing & Consultation Responsibility Commitment Commitment &
Conversion & Influence Influence
Evaluation Influence Responsibility Commitment & Consultation
Consultation
From the above table, the level of involvement of system team during ‘strategic
design’ stage are Commitment & Consultation.
36. B The various steps in system development are preparation of a test description, test < TOP >
specification, detailed report containing the testing procedure, and an acceptance test
program. An acceptance test program is prepared for the operating personnel.

Page 22 of 30
37. C In order to make employees feel comfortable about using MIS on a regular basis, they < TOP >
have to be trained adequately. Training employees during and after the implementation
process fulfills these educational requirements. Training is given in both general and
specific areas. The general areas of training include: introduction to computers and
information system concepts, how MIS provides connectivity to all the departments in
the organization and how information flows to and from each department, and
development of organizational members’ interpersonal skills. The specific areas of
training include information management in each functional area, technical details
about operating the MIS in each functional area, etc.
38. A The top management should actually initiate the process of maintenance. The < TOP >
supervisors, system analysts, computer experts etc. are the personnel responsible for
maintaining the MIS.
39. C Levels of Involvement of the Organizational Members during MIS Implementation < TOP >

Implementation Top Functional Operating System


Stage Management Head Team Team
Entire Project Commitment Responsibility Commitment Commitment &
& Influence Consultation
Initiation Influence Responsibility Commitment Influence &
& Influence Consultation
Strategic Influence Responsibility Commitment Commitment &
Design & Influence Consultation
Technical No Influence Commitment Commitment &
Design Involvement & Influence Responsibility
Development No Influence Commitment Commitment &
Involvement & Influence Responsibility
Testing & Consultation Responsibility Commitment Commitment &
Conversion & Influence Influence
Evaluation Influence Responsibility Commitment & Consultation
Consultation
From the above table, the level of involvement of Top management during ‘Testing
and conversion’ stage is consultation.
40. A Responsibility is the acceptance of the obligations of the MIS implementation process < TOP >
and performing them successfully. The system analysts develop detailed technical
designs and look after the physical installation of networking and other facilities.
41. B COBIT was developed by the IT Governance Institute and the Information Systems < TOP >
Audit and Control Foundation of the US in 1992. It provides a set of IT control
objectives that guide organizations on how to maximize the benefits from IT
implementation by developing control measures and appropriate IT governance. It
describes 34 IT control processes that are covered under four domains – Planning and
Organization, Acquisition and Implementation, Delivery and Support, and Monitoring.
42. E All statements are false regarding business continuity and disaster recovery (BC/DR) < TOP >
plans. DRP ensures that the organization resumes its business after the occurrence of a
disruptive event. BCP ensures that the required IT services are available and that there
is minimum disruption in the business activities even in the event of a disaster. Most
executives prefer to use the term BCP than DRP as the former is a much broader term
that includes even the latter.
43. B According to the Gartner Group, a business continuity plan contains a disaster < TOP >
recovery plan, a business resumption plan, a business recovery plan, and a contingency
plan. A business resumption plan specifies the various ways of carrying out the
essential services at the crisis site.
44. A Test plan is the last component of a DRP. It serves as an aid to spot deficiencies in < TOP >
other plans namely, the emergency, backup, and the recovery plans. It entails testing
the readiness of the organization and the employees during the disruptive event. This
testing is done by simulating a series of disasters and listing the norms or standards
against which the various plans must be measured to test their sufficiency and
completeness.

Page 23 of 30
45. A The ITIL framework addresses skill requirements and organizational structure and < TOP >
provides detailed information on how to manage IT operations. It is published in a
series of eight books called sets. These are further divided into disciplines. The various
sets are service delivery, service support, planning to implement service management,
security management, infrastructure management, business perspective, applications
management, and software assets management. Service delivery is a discipline that
discusses the services that are provided by the data center to the business. Its
disciplines include IT Financial Management, Availability Management, and Capacity
Management.
46. B COBIT describes 34 IT control processes that are covered under four domains – < TOP >
Planning and Organization, Acquisition and Implementation, Delivery and Support,
and Monitoring. The domain ‘Acquisition and Implementation’ describes the strategies
that the organization should adopt to identify its IT requirements, procure technology,
and implement it. It explains six control processes and also gives guidelines on how to
increase the life of the deployed technology.
47. E The fifth statement does not constitute in ‘Back up plan’ because it belongs to < TOP >
emergency plan. Whereas, remaining statements constitute the backup plan.
48. C In some cases, the IT decisions are taken by corporate executives or IT executives and < TOP >
in others, the power is given to the respective business unit leaders. However, IT
governance states that that IT decisions should be taken by the Board rather than by
the Chief Information Officer (CIO) or the business unit managers.
49. C (a) Access control to key informational assets mandates high control over the assets. < TOP >
It oversees the access to these assets based on business requirements and security
requirements.
(b) Compliance control addresses issues of organization’s adherence. It is the
organization’s ability to adhere to the regulatory, statutory, legal, and other
contractual obligations from the business environment.
(c) Business continuity management control oversees the management’s ability to
battle interruptions and bring normalcy back in the operations.
(d) Communications and operations management control includes various
operational, capacity planning, network management controls and procedures
that allow the organization to carry out secure operations and protect its
information system.
(e) Personnel security control enables personnel/employees’ screening to
authenticate their access to informational assets, informs the personnel about
their security responsibilities like information security codes of conduct, non-
disclosure agreements, etc.
50. B The primary objective of IRMA is to create awareness about understanding < TOP >
information as one of the key assets of the organization and to promote the practice of
managing these assets effectively to achieve organizational goals. Other objectives
include providing resources, assistance, and other support to individuals who want to
enhance their knowledge in this field. Students are eligible to become members of
IRMA It provides professional and educational services to individuals and
organizations for a low membership fee.
51. A Under Section 802 (a) (1) of the SOX Act, organizations were required to store all < TOP >
records related to an audit for at least five years. To comply with such rules of the
SOX Act, it was important that the chief financial officer (CFO) of the organization
had easy access to this information. Manual storage and maintenance of the data for
five years was a difficult task and thus the need arose for an efficient IT system that
could store a large amount of data for any period of time. This increased the
importance of having robust IT systems and IT executives to manage them.

Page 24 of 30
52. B There are two types of digital certificates: server certificates and personal certificates. < TOP >
Server certificates are used to authenticate the identity of websites, to make sure there
is no impersonation. They facilitate exchange of personal information like credit card
numbers among website visitors. Server certificates are a necessity for e-commerce
sites that facilitate the exchange of confidential information among customers, vendors
and clients. Personal certificates are used to authenticate visitors’ identity and restrict
access to specific content.
53. B Information is derived from data or facts. These can be either structured or < TOP >
unstructured. Structured data is well organized and systematic. This type of data is
usually found in reports, databases, data files, etc. Unstructured data is subjective and
unorganized in nature. It is found in e-mail systems, images, drawings, video clips,
web, etc.
54. C Both (I) and (IV) are correct combination. Both (II) and (III) are incorrect < TOP >
combinations. A cryptographic algorithm works with a key, which may either be a
word, number or phrase for encrypting plain text. These ‘keys’ are also called crypto
variables.
55. C A few corporate scams that took place in the late 1990s and early 2000s increased the < TOP >
need for organizations to abide by corporate governance norms. Prominent among
these scams was the one involving Enron Corporation, a Texas, US-based natural gas,
energy trading and electric utilities company. This financial debacle was the result of
irregular accounting procedures adopted by Enron’s accounting firm Arthur Andersen
LLP. The trial involving Arthur Andersen exposed another accounting fraud at
WorldCom Inc., a telecommunication company, which later went bankrupt along with
Enron. Subsequently, a number of other companies in the US were found to have
indulged in fraudulent accounting practices along with high-level corruption and
insider trading.
56. D The Infrastructure Management set in the ITIL framework describes the processes, < TOP >
tools, and organization required for developing a robust IT infrastructure. Its
disciplines include Network Service Management, Management of Local Processors,
and Systems Management.
57. D A transnational company stresses both on efficiency and flexibility. The costs and < TOP >
revenues are simultaneously managed by this type of companies while the resources
and other capabilities are partly centralized and partly decentralized. These companies
aspire for global integration of processes and operating efficiencies. Transnational
organizations therefore have integrated operations. This helps the organization to meet
the requirements of various subsidiaries that are operating in different types of
environments.
58. A Multinational organizations concentrate more on understanding national differences. < TOP >
International organizations develop innovations in the home country and deploy it in
other countries in order to strengthen their competitive position in other countries. This
process involves transferring the processes, strategies, knowledge, and expertise from
the parent company to the subsidiaries. This knowledge is then diffused and adapted
by the subsidiaries. Subsidiaries of international companies are less efficient, less
flexible, less independent, and have comparatively less autonomy than the subsidiaries
of multinational companies. The parent company also retains the control and influence
upon the subsidiaries, but this is comparatively less than that imposed by a global
company.
59. A In a global organization, the control at the center is very strong. This control in turn < TOP >
results in standardized procedures throughout the world that enables the company to
reap the benefits of the economies of scale. In these organizations, all the strategic and
operational decisions are centralized. Kranthi India Private Limited is following a
global strategy.
60. D Global IT managers face the challenge of sharing data across borders. This is because < TOP >
some countries are concerned about the privacy and the employment related issues. To
tackle this, several laws and regulations have been framed by countries regarding
trans-border flow of data.

Page 25 of 30
61. E ITeS can be defined as a unique form of outsourcing non-core services to an external < TOP >
company that owns and manages the process. This would reduce the operating costs of
the organization thus enhancing its profitability. Another school of thought defines
ITeS as outsourcing those processes which can be enabled with IT. These processes,
though critical to the organization, are outsourced due to deficient in-house capability
and expertise. These processes require continuous enhancement and rigorous quality
checks and are therefore, outsourced to an external organization.
62. D Organizations face certain cultural challenges while operating in the global business < TOP >
environment. These challenges are due to the differences in religion, customs, social
attitudes, language, working styles, working relationships etc. An American software
development company realized that the Japanese users of the company’s software
complained on finding a dollar sign in place of the yen in a financial report which was
denominated in yen. This is a challenge faced by the company due to Cultural
differences.
63. D The Executive Information Systems (EIS) introduced in the 1980s helped the < TOP >
organizations to list out a summary of the day-to-day transactions. These systems
provided technology to the management which could be used for investigating the
strengths and weaknesses of the organization without the need for programmers.
64. C CRY Contact Management System (CRYCMS) handles the marketing (front office) of < TOP >
CRY. This system enables interaction with individual donors, corporate donors,
product buyers, etc. CRYCMS also provides service to the donors. CRYCMS enables
the organization in providing better service, strategic information analysis and avoid
concentration of information with one person or entity.
65. C Translator hubs are exchanges that offer capabilities like buying, selling, and < TOP >
collaboration. These exchanges are similar to collaboration hubs. They provide data
translation services to facilitate communication including EDI, electronic mail, fax,
eXtensible Markup Language. MarketSite from Commerce One and Ariba Network
from Ariba are examples of translator hubs.
66. C The CRY Volunteer Management System (CRYVMS) enables tracking of CRY < TOP >
volunteers while the CRY Donation Management System (CRYDMS) helps the
organization manage donations. Both these information systems are integrated to
check for any common volunteers and donors.
67. B The non-profit organizations (NPOs) carry out programs that help improve the lives of < TOP >
deprived sections of the society. The scope of activities provided by these
organizations is at times limited to certain geographical areas. The nature and the
scope of activities vary from organization to organization. These organizations operate
by using funds received from government organizations, public companies, private
companies, individuals, foundations, etc.
68. E Following are the steps involved in selecting a PMIS: < TOP >

1. A comprehensive set of selection criteria should be compiled.


2. A set of priorities should be laid out for the items based on the extent to which
they are required.
3. A preliminary evaluation of the software packages should be conducted with the
help of data supplied by the vendor, the product reviews and the software
surveys.
4. Each software package should be compared with a standard project which
represents the current and the forecasted future requirements.
5. The last stage involves negotiation of price, especially if the organization is
purchasing in larger volumes. The other terms in the contract like support from
the vendors, training, maintenance of the product, etc. should also be negotiated
at this stage.

Page 26 of 30
69. B PMIS enables the project manager to update the project schedules on a regular basis. < TOP >
The PMIS reports might not always highlight the actual problems involved. They may
simply comprehend the existing problems without providing any solutions. The PMIS
does not equally cover all the project areas. Too much stress is laid upon certain areas
while other areas are neglected. This ultimately results in an imbalance.
70. B Infomediares help bring buyers and sellers together. Aggregators offer guidance to < TOP >
buyers in fragmented markets by providing information at a single online contact
point. Online auctioneers help sellers dispose of perishable goods or excess stocks and
enable buyers to purchase goods at discounted rates. Online exchanges are neutral
third parties that match ask and bid rates in a regulated environment.
71. E The common representation of data and process is essential because it will enable the < TOP >
application to become - accessible to all within the enterprise, generic (to be decoupled
from any application), and robust (to represent an application’s data and process
information). This will facilitate communication between the various applications,
which, in turn, will greatly increase the ease of the systems’ interoperability and
understanding.
72. A One of the principles in EAI is to conduct early and regular testing. By doing this, it < TOP >
becomes cheaper to build executable models. Testing is carried out by using the
simulation technique. Simulators are close to the real-world processes and systems and
hence provide meaningful information with a reasonable ability to predict outcomes.
73. B Re-factoring interfaces: A stable interface is the key to sustaining quality integration, < TOP >
yet there’s no stability in applications, protocols, standards, or technology. We can
resolve this issue by reportedly re-factoring the interface software as an organization
adopts new technology.
74. E DoveBid.com and BigEquip.com are examples for B2B (Business-to-Business) < TOP >
websites. Only Yabuy.com is an example for C2C (Consumer-to-Consumer) websites.
75. D The first phase of e-business evolution began in the mid and late-1990s. It focused on < TOP >
transaction-oriented e-commerce rather than e-business. In other words, it focused
only on online trading of goods and services. During this phase, dotcom companies
focused on having better search, graphical product display, and payment processing
capabilities. Most organizations viewed e-business merely as the development of a
website for offering information about the company and its products. In some cases,
organizations used their websites as just another marketing and sales channel.
76. E PricewaterhouseCoopers (PWC) has identified four distinct phase of e-business. The < TOP >
first phase, is marked by the implementation of a website that will enable the
concerned organization to buy and sell online. The second phase, involves putting
supply chain management processes online by linking suppliers with the enterprise,
using extranets and intranets. In the third phase, the organization forms alliances with
other online players indicating the adoption of e-business as a commercial tool. In the
fourth phase, there is a convergence that will lead to innovative products and services.
77. C Transportation planning is a part of the supply chain planning process. Order planning, < TOP >
production, replenishment, distribution management, production, reverse distribution
and logistics are part of the supply chain execution process.
78. C Production is a major component of the supply chain execution process. In the current < TOP >
scenario, sub-assemblies are procured when products are to be assembled. The time,
quantity and location where the subassemblies will be required, are determined by the
master production schedule and the manufacturing resource planning system.

Page 27 of 30
79. B Responsive supply chains enable quick response to customer requirements. The most < TOP >
important factor to consider is whether the inputs for the product are available, so that
a commitment to deliver can be made. In short, this is called the available-to-promise
(ATP) factor. Companies adopting the build-to-order strategy need to be aware of the
material availability before they commit to any order. ATP tracking monitors material
availability in the entire supply chain. This helps the company check on material
availability, assign delivery dates and meet deliveries on schedule.
Enterprising supply chain aims to bring about changes in the supply chain in response
to changes in customer demand as quickly as possible. To compete effectively,
companies should respond quickly to changing market conditions and customer
preferences. This requires two-way integration (up and down) in the supply chain.
80. C Supply chain replenishment involves aligning the real time demand of a particular < TOP >
business with suppliers and partners to improve customer service and enhance
customer satisfaction. The coordination of product flows and resource optimization is
possible through collaborative planning. Remaining statements (I) and (III) are
correctly described.
81. C < TOP >
The type of inter-enterprise integration that modifies weak links in the supply chain
based on changes in market conditions to achieve an advantage over competitors is
Intelligent supply chain.

82. C The collaborative application of information systems by the members of supply chain < TOP >
(companies, their suppliers and business partners) to achieve synergy in supply chain
operations and to streamline B2B processes is referred to as the e-supply chain. The
integration of suppliers and business partners into a single manufacturing entity is
known as the extraprise supply network.
83. B Commodity-based relationships are those between a company and its suppliers of < TOP >
commodity products. Commodities may be either direct or indirect materials. The
direct materials are raw materials or subassemblies used for production, and the
indirect materials are non-production materials such as computers, stationery, etc.
Decisions on the purchase of commodities are usually based on price and service as
well as transportation and availability. Strategic relationships are the relations of
companies with its suppliers of non-commodity items which affect the daily operations
of a company.
84. E The latest trend in make-to-stock is to assemble the final product in the distribution < TOP >
channel. This process is called Postponement.
85. C First two are characteristics exhibited by the built-to-order model. Large stocks are not < TOP >
maintained as they may become outdated over time. So, companies try to be more
flexible in their procurement processes.
86. C Use-management tool: It schedules jobs, monitors events, data output, backup and < TOP >
recovery. It manages the applications when they are being accessed by users.
Service management tools: These help the management monitor the performance of
various ERP applications. These tools need to be powerful as they have to analyze
thousands of transactions that occur simultaneously in an ERP system.
System administration tool: It manages the network and systems for ERP. It manages
inventory and assets, configures software, modifies applications when needed, and
distributes software.
87. D ARIS (Architecture of Integrated Information System) developed by Prof.A.W.Scheer < TOP >
of the IWI University of Saarland, Germany is the most widely used method for an
integrated process view. Whereas, SAP, JD Edwards and Baan are vendor offering
ERP packages.

Page 28 of 30
88. B Once an order is placed by a customer, the details reach the desktop of the heads of the < TOP >
concerned departments. The ERP system checks if the required number of machines
with the required specifications is available in the finished goods inventory. Bill of
material specifies all the materials required in the production and delivery of each
product made by the company and the lead-time required for each material. The
production department identifies the number of products to be manufactured and
prepares the production schedule. The materials management department prepares
purchase orders for all components to be procured. The logistics department finally
decides the route and mode of transport depending on the destination so that the costs
are minimized and speed of delivery maximized.
89. B The phased approach breaks down the ERP project into certain stages. Each stage is < TOP >
taken one at a time for implementation and is finished completely before moving to the
next stage. Remaining statements are true about Big-bang approach.
90. E People from various departments are pooled to form a team for the purpose of ERP < TOP >
implementation. This is to help maintain a process view of the system. Consultants
may be hired to provide expert advice and support for implementation. Individuals
who are capable of learning new concepts quickly are to be included.
91. C The first and third statements are true because ERP makes optimum utilization of < TOP >
resources and improves integrity of data. Whereas the second statement is false
because ERP improves both process efficiency and consistency.
92. C ARIS (Architecture of Integrated Information System) developed by Prof. A.W. < TOP >
Scheer of the IWI University of Saarland, Germany is the most widely used method
for an integrated process view. According to the ARIS framework, a complex business
process can be viewed in terms of data, function, organization and process views. The
data view emphasizes different data entities and the relationships between them (e.g.,
date of placing order, item name, item code, customer name, and customer address).
The function view breaks each function into a set of activities and establishes
hierarchical relationships between them. For example, the production function is
divided into production planning and production control; the sales function is divided
into receiving a customer inquiry, creating a customer offer, confirming the order,
addressing a customer status inquiry and tracking the customer order. The organization
view looks at all the departments and the people working in it. It can be represented by
an organization chart.
93. A Service oriented architecture (SOA) links all independent applications in a network < TOP >
enabling it to create custom composite applications.
94. B The time gap between the receipt of the order and the delivery of the product is called < TOP >
cycle time.
95. D The sub-modules like master data management, warehouse management and pricing < TOP >
management come under Sales and Distribution module of ERP modules.
96. A A well established e-CRM infrastructure must enable one to: < TOP >

 Integrate multiple customer contact points


Define new business processes and data
Add new system applications and components
Support multiple users simultaneously
Add new data sources.
Well established e-CRM infrastructures create several customer contact points and
make efforts to integrate them.
97. E Based on spending habits, customers can be classified into various types of loyalists. < TOP >
These include emotional loyalists, who have an emotional attachment with the brand,
inert loyalists, who are not willing to take pains to shift to new products and deliberate
loyalists, who select the best products. The emotional and inert loyalists are less likely
to switch.

Page 29 of 30
98. C Personalization can be achieved by e-CRM tools like inference based and rules based < TOP >
software. Inference based software is generally used for cross-selling. It tracks
customer behavior and groups together customers who have similar behavior. Rules
based personalization is used for selling specific products and services. The software
keeps track of the products/services that an online visitor has browsed for. This would
enable organization to offer customized products/services to the visitors.
99. B Contact management refers to capturing, sharing and storing of customer information < TOP >
through electronic means and making it accessible to the entire organization. Contact
management opens up several opportunities for customer interaction for different
departments in an organization. The source of customer inquiries may include the
Internet, call center or other electronic channels. Contact management can be used as
an effective tool. It ensures the availability of current information on customers.
100. E Customer support and service, Retention management, Cross-selling and up-selling < TOP >
software are components are e-CRM.
< TOP OF THE DOCUMENT >

Page 30 of 30

Potrebbero piacerti anche