Q.1
In punched card system, holes are punched by device are called ______.
Q.2
Finger print system of security control comes under ______.
Q.3
The _____ organization often constructs its own messages.
Q.4
______________ is unauthorized copying of software.
Q.5
A _______ evaluation process reduces the possibility of buying inadequate hardware.
Q.6
__________ charts are used to represent the project tasks and durations.
Q.7
The project team is composed of the system professional are directly responsible for _____ the system
Q.8
PDA means ______.
Q.9
In _____ organization, authority is delegated down the hierarchy.
Q.10
The emerging class of applications focuses on personalized decision support, modeling, information retrieval, data warehousing, what-if scenarios and reporting is called __________________.
Q.11
A _____ types of processor design uses a group of instruction processors to execute program at the same time.
Q.12
_____ leader who commands both positional and personal influence.
Q.13
RFP stands for ______.
Q.14
Decision support system involves all of the following types of analytical modeling activities except?
Q.15
Program testing concept use ________ approaches
Q.16
_________________ is an area of philosophy concerned with developing ethical principles and promoting ethical behavior and practices in the accomplishment of business tasks and decision making.
Q.17
__________ type of budgeting is based on estimation of total project cost by the top management.
Q.18
______ type of feasibility deals with the costs of both development and operations of the system.
Q.19
________ steps ensure the success of the new systems
Q.20
TPS stands for_____
Q.21
____ sub system deals with activities as purchasing, receiving inventory control and distribution
Q.22
GB in memory stands for _____.
Q.23
______________________ decision support system that provides support for decision making by groups of people
Q.24
Which one of the following is used for evaluating credit risks?
Q.25
________________ is a program code that cannot work without being inserted into another program.
Q.26
_______ takes responsibility and keeps track of progress in MIS design. Development and implementation.
Q.27
________________ is obsessive use of a computer or unauthorized access and use of computer systems.
Q.28
In which of the following types of analysis, the value of only one variable is changed repeatedly, and the resulting changes on other variables are observed.
Q.29
________ type of testing ensures the system is free of errors and is ready to be placed into operation.
Q.30
_________________ is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or the entire contents.
0 h : 0 m : 1 s