MCQs - CH 3 Information Systems & Its Components - Done
MCQs - CH 3 Information Systems & Its Components - Done
C HAPTER 3
1. Information Systems not only establish communication but also support decision making within an
organization. Below mentioned are many components that comprise an Information system except
one. Identify that odd one out.
2. Communication controls responsible to handle exposures caused during the internetwork communication
are categorized further based on the specific functions performed. Which of following communication
control incorporates features that mitigate the possible effects of exposure?
3. In a computer system, a _____ memory which is volatile in nature and can read and modify the
information is referred as _____.
(a) Primary, Random Access Memory (b) Secondary, Random Access Memory
(c) Secondary, Cache Memory (d) Primary, Virtual Memory
4. In DBMS, Relational Database Model allows the data and its related operations like storage, retrieval
and integrity in a Table structure. All the terms mentioned below are associated with Relational
Database Model except one. Pick that odd one out.
5. Corrective controls are designed to reduce the impact or correct an error once it has been detected.
Which of the following is not an example of Corrective Control?
7. The data entry operator of GC College is responsible to enter the amount of fees paid by the students.
Accidentally, while making the entry, the fee amount of Ms. X of the amount INR 9854 was entered as
INR 8954 in the software, leading to the reverse of two digits in the amount. Under Data Coding Control,
which of the following error is made by data entry operator in this case?
8. As a system administrator of a newly established start-up KJL Ltd., Mr. Kamal sets up its computer
network in such a way that enables the network to recover from any kind of error like connection
failure, loss of data etc. In computer network, which of the following term’s definition takes care of
the said activities?
9. Every time when a user attempts to gain access to and employs system resources in an application,
the chronology of each such event is maintained. Which control under Application Controls is
responsible to do so?
10. Under Application Controls of Information System, __________ maintains the chronology of events
that occur either to the database definition or the database itself.
11. Big Data has captured the attention of Businesses for its processing power to analyse the data for
many benefits that it provides. Below are mentioned some of its benefits, except one. Identify it.
12. Ms. Shilpi is a final year student of B. Tech who is required to submit her project report on Library
Management System based on Relational Database Model. Which of the following example does not
belong to Relational Database?
Information Systems and Its Components – Nov 23
(a) Microsoft Access (b) MySQL
(c) Java (d) Oracle
13. Nice Collection is women apparel store with many branches in various cities of India. The management
of store uses data mining technique to make analysis to determine the sale on weekends of festive
month in cities with population less than 70,000. Which of following is not involved in technique used?
14. An IS Auditor is using an audit tool that involves embedding audit software modules within a host
application system to provide continuous monitoring of the system’s transactions. Which audit tool
does it refer to?
(a) Audit hooks (b) System Control Audit Review File (SCARF)
(c) Integrated Test Facility (ITF) (d) Continuous and Intermittent Simulation (CIS)
15. Mr. Ashu works in a Network Service provider Company where his job responsibility includes performing
routine tasks in the network such as making minor configuration changes and monitoring event logs.
Which of the following role he performs in the company?
16. Mr. Y used duplicate keys to enter in prohibited area zone of JKH Ltd. company and stole some
important documents of the company. Which of the following control you think has been compromised
to make such an incident happen?
17. Below mentioned are the steps that are involved in the Data Mining process. Select the step at which
the data is collected from all the different sources to initiate the process.
18. Output Controls are responsible to ensure that the data delivered to users will be presented,
formatted and delivered in a consistent and secured manner. Which of the following activity does not
belong under the purview of Output Control?
19. Which of following statement does not belong to Read Only Memory?
20. Operating System Software provides Application Program Interfaces (API) which can be used by
application developers to create application software. This is referred to as _____.
21. Identify from the following controls of Information System that deals with framing of high-level IT
policies, procedures, and standards on a holistic view.
22. Mr. Neeraj is working on a project on healthcare system where he has to perform data mining on the
database of patients of last five years in ABC Hospital. The hospital provided him inconsistent data
with lots of errors and missing values. He has to apply various techniques to get rid of these
anomalies. Identify from the following process which he can use to get rid of these anomalies.
23. The Chief sales head of the company wants to evaluate an annual sale made by sales revenue of the
company’s branches in different regions. Being the Sales manager of the company, Mr. Kumar is
asked to prepare the spreadsheets using computer software. Which of the following software he may
be working on?
24. A Database Model is a type of data model that determines the logical structure of a database and
fundamentally determines in which manner data can be stored, organized and manipulated. Which of
the following database model stores and organizes data in a table structure?
25. Under Asynchronous attacks in a telecommunication network system, __________ involves spying on
information being transmitted over communication network.
26. While doing a concurrent audit in a bank, Mr. X noticed that some changes have been made to advance
master data files of the database. He uses an audit technique to identify such suspicious transactions.
This technique shall be defined as _____________.
Information Systems and Its Components – Nov 23
a) Continuous and Intermittent Simulation (CIS) b) System Control Audit Review File (SCARF)
c) Audit Hook d) Integrated Test Facility (ITF)
27. A new system has been developed that ensures that as soon as inventory level goes below re-order level
in INVENTORY SYSTEM, a purchase requisition is generated from PURCHASE SYSTEM. Which testing
method shall be best suited to check whether the two systems are working properly?
28. Database is a collection of Data. Various database models are used. The database models having using a
primary key is _______________.
a) OODBMS b) RDBMS
c) Network Database Model d) Hierarchical Database Model
30. Which of the following does not belong to activities executed by Operating System?
a) It allows more than one user to use the system. b) It uses minimal memory.
c) It provides logical security to identify and d) It keeps the track of data stored.
authenticate various users.
31. While Auditing the Input Controls in an enterprise ABC, which of the following controls will not fall under
the purview of Input Controls?
32. In ABC, financial institution, the authorized officials identified existence of numerous accounts numbers
of inactive accounts in their usage data of active customers. Complaint was reported to their IT team.
Which type of controls can be exercised by the IT Team in the given case?
33. Provide the correct sequence of phases of Program Development Life Cycle. (1) Operations and
Maintenance, (2) Coding, (3) Control, (4) Design, (5) Testing and (6) Planning
a) (4)-(6)-(2)-(3)-(1)-(5) b) (6)-(3)-(4)-(2)-(5)-(1)
c) (1)-(6)-(3)-(5)-(4)-(2) d) (3)-(5)-(2)-(1)-(6)-(4)
35. Which of the following does not fit into best practices while dealing with passwords in order to avoid
system failures?
37. As an Information Systems Auditor, mention the activity that does not form part of audit of Logical
Access Controls?
a) Managerial b) Application
c) Preventive d) Corrective
39. In telecommunication network, ____________ is the act of following an authorized person through a
secured door or electronically attaching to an authorized telecommunication link that intercepts and
alters transmissions. This involves intercepting communication between the operating system and the
user and modifying them or substituting new messages.
40. Database Management Systems (DBMS) helps the organization to do various operations on the files
except _____________.
41. Except one, following are the means through which protection can be achieved in case an internet
connection exposes an organization to the harmful elements of the outside world. Identify it.
42. NMN Ltd. has its five branches in different cities of India. All branches are interconnected and use
centralized mechanism for data sharing and storage. To have a secure communication between its
Information Systems and Its Components – Nov 23
various branches, the company has installed anti-virus software and intrusion prevention system. The
installation of these systems is covered under which type of control?
43. Mr. Amit is appointed as an IS auditor by GH Financial services. He uses continuous audit techniques to
check whether the accounting systems of the company restricts the cash payment in excess of 50,000/-
or not. He enters a dummy entity in the application file to test this condition. Which of the following
continuous audit technique is being used by Mr. Amit for this audit?
44. The Information Systems Auditing is defined as the process of attesting various objectives that are
mentioned below:
i) Asset safeguarding
I. This involves protecting of various resources like hardware, software, data files etc. by using internal
controls from unauthorized access.
II. This involves whether a system reports information in a way that facilitates its users in decision -
making or not.
III. This involves use of various Information system resources minimally with their optimum utilization.
IV. This involves maintaining the accuracy, completeness, reliability, and transparency of the data.
45. Refer below mentioned statements are related to memory of Computer System.
i) It is made up of semi-conductors.
v) It is volatile in nature.
Choose the correct set of true statements w.r.t. Primary Memory of the Computer System.
46. Following information w.r.t Telecommunication sector is stored somewhere in Database Management
System.
(i) The information related to monthly bill details, call records, minimum balance etc.
(ii) The information regarding product promotions, decisions related to sales, cash back offers etc.
(iii) The information analyzed by using different techniques to find out call duration w.r.t a particular
age group from the entire data available.
The relevant term for their appropriate storage could be any of the following:
(A) Datawarehouse
(B) Data Mining
(C) Database
Choose the correct match from the following:
a) (i) – (C), (ii) – (B), (iii) – (A) b) (i) – (B), (ii) – (C), (iii) – (A)
c) (i) – (C), (ii) – (A), (iii) – (B) d) (i) – (A), (ii) – (B), (iii) – (C)
47. The key areas that an auditor should emphasize while auditing an Application Control Framework of
an organization are mentioned below.
i. Auditors should determine whether the report collection, distribution and printing controls are well
executed in an organization or not.
ii. Auditors should assess the performance of the validation controls to check for any data
processing errors.
iii. Auditors need to determine how well the safeguard assets are used & preserve data integrity.
iv. Auditors need to comprehend various approaches used to enter data into an application system
and their relative strengths and weaknesses.
v. Auditors must assess the topological controls to review the logical arrangement of various nodes
and their connectivity using various internetworking devices in a network.
The auditing of Application Control Framework can be categorized as under:
I. Auditing Input Controls
II. Auditing Communication Controls
III. Auditing Boundary Controls
IV. Auditing Output Controls
V. Auditing Processing Controls
Match the key area with its corresponding category of auditing of Application Control:
a. (i)– I, (ii) – II, (iii) – III, (iv) – IV, (v) – V
b. (i) – IV, (ii) – V, (iii) – III, (iv) – I, (v) – II
c. (i) – V, (ii) – III, (iii) – I, (iv) – IV, (v) – II
d. (i) – I, (ii) – V, (iii) – III, (iv) – II, (v) – IV
Information Systems and Its Components – Nov 23
48. Studious Library is a public library which provides each of its subscribers a unique membership-id and
PIN number as an access control mechanism to access its e-books/research papers and journals through
its app. Under which of following Application control does this specific access control mechanism fall.
49. Various risks that may persist in the working environment of an organisation are controlled using
following measures.
(I) Fire Alarms
(II) Identification Badges
(III) Privilege Management
(IV) Firewall
(V) Password Management System
The controls under which the aforementioned measures are categorized as under:
(A) Network Access Control
(B) User Access Management
(C) Physical Controls
(D) Environmental Controls
(E) Operating System Access Control
Choose the correct option that pairs the measure/factors with its associated controls.
a) (I)–(A), (II)-(B), (III)-(C), (IV)–(D), (V)–(E)
b) (IV)–(B), (I)-(A), (II)-(D), (IV)–(E), (V)–(C)
c) (I)–(D), (II)-(C), (III)-(B), (IV)–(A), (V)–(E)
d) (I)–(D), (II)-(B), (III)-(A), (IV)–(C), (V)–(E)
50. To avoid any discrepancy in the calculation of the salary based on number of working days of each
employee, a company has implemented Biometric Attendance System for employees in its working
environment. Which of the following control is applied by company in this case?
a) Preventive Control e) Detective Control
b) Corrective Control c) Manual Control
2. A D D IT IO NA L MCQ S
51. Which of the following refers to process of deciding on how to communicate the data from source to
destination in a network?
a) Routing b) Bandwidth
c) Resilience d) Contention
53. Which is the high-speed memory unit CPU for storing small amount of data?
55. _________ is the conversion of data into a secret code for storage in databases and transmission over
networks.
(a) System Control Audit Review File (b) System Control Audit Report File
(c) Simulation Control Audit Review File (d) System Control Audit Review Format
58. Which function of the processing device performs operation as addition, subtraction, multiplication, &
logical comparison of numbers?
59. Which is the imaginary memory supported by some operating system in conjunction with the hardware?
60. Which database model allows the definition of the data & their structures, storage and retrieval
operations & integrity constrains that can be organized in a table structure?
a) Hackers b) Employees
c) IS personnel d) All of the above
63. Which of the following performs validation checks to identify error during processing of data?
64. Tracing a transaction is a computerized system can be performed with the help of _________.
65. Fire damage, power spikes and water damage are the example of _______.
67. Which type of output is used for individual who are blind as raised lines drawing?
68. Which approach starts by creating small data warehouse, called data marts, to solve specific business
problems?
69. Which of the following is not the example of network access control?
70. Which of the following is not the function of operation management control?
71. Which error occur when one digit in a code is replaced with another?
Or
73. Which of the following are audit routines that flag suspicious transaction?
74. Which approach suggest that we should start by creating an enterprise-wide data warehouse?
75. Which of these refers to the situation that arises when there is conflict for some common resource in a
network?
a) Routing b) Bandwidth
c) Resilience d) Contention
77. Well known example of Trojan due to which users cannot save their half-finished work.
a) Bomb b) Worm
c) Trap doors d) Christmas cards
78. Which is a system that enforces access control between two networks?
a) Firewall b) Encryption
c) Callback devices d) Routing control
79. Which error occur when two adjacent digits are reversed?
Or
12345 is recorded as 21345. Which type of error is it?
80. Which are trails that can be designed to record activity at the system, application, & user level?
81. Which control maintains the chronology of events that occur either to the database definition or the
database itself?
Information Systems and Its Components – Nov 23
a) Processing controls b) Output controls
c) Communication controls d) Database controls
82. Which is a set of computer program that manages computer hardware resources & act as an interface
with computer application program?
83. Which is a process of analyzing data to find previously unknown trends, pattern & association to make
decision?
85. _______ is needed because nodes in network can differ in terms of the rate at which they can send,
received and process data.
86. Which feature of operating system helps in operating resources to make optimum utilization of
resources?
i) interpretation/ evaluation, ii) data transformation, iii) selection, iv) data mining
88. In which of the following door lock, a magnetic or embedded chip-based plastic card key or token may
be entered a reader to gain access in these systems?
89. Which of the following activity is considered under audit environment control?
90. Google & yahoo are the example of _______ which should consult to see what information about
organization is available?
92. MS office 2019 has MS word, MS Excel, MS access etc. are examples of _______.
a) Characters b) Field
c) Records d) File
94. Which is collection of computers & other hardware interconnected by communication channel that
allows Sharing of resource & information?
95. Anti- virus software & firewall are the example of ______
96. Which control has a pair of doors that are typically found in entries to facilities such as computer room
and document station
a) Leading b) Organizing
c) Planning d) Controlling
100. Which is not the role of IS auditor in auditing physical access control?
Information Systems and Its Components – Nov 23
a) Risk management b) Process management
c) Controls assessment d) Review of document
101. Facebook, LinkedIn, my space, and twitter are the examples of ______.
103. Which of the following audit tool is not embedded in the Application System?
106. Auditing physical access requires the auditor to review the physical access risk and controls to form an
opinion on the effectiveness of the physical access controls. This involves the following:
Answer Key
1. D 2. D 3. A 4. C 5. D 6. B 7. A
106. D