Question 1 :
_______________is the practice of marketing additional related products to customers based on previous purchases.
- Up-selling
- Cross-Selling
- Down-selling
- Seasonal-Selling
Question 2 :
The information system which collects data continuously, typically in real time is_________
- Business Intelligence System
- Expert System
- Transaction Processing System
- Database Systems
Question 3 :
A relational database consists of a collection of _____________
- Tables
- Fields
- Records
- Keys
Question 4 :
What is Unethical is not necessarily_____
- Legal
- Illegal
- Secure
- Unsecure
Question 5 :
Extended service set in a wireless network comprises of __________
- All access points
- All network points
- All connected access points
- Connected basic service sets
Question 6 :
Backbone of any organisation is____________
- Employee
- Information
- Management
- Capital
Question 7 :
Business processes NOT supported by ERP systems is ______
- Daily Transactions
- Procurement process
- Fulfillment process
- Production process
Question 8 :
The department responsible for payroll preparation and other various benefits is ______
- Customer relations Management
- Human Resources Planning and Management
- Accounting and Finance
- Financial planning
Question 9 :
A cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources is refered to as__________
- Spyware
- Phishing attack
- Cyberwarfare
- Denial of service
Question 10 :
Difference between star and snowflake schema is______
- One fact table and many dimension tables
- Many fact table and many dimension tables
- Normalizing dimension tables
- Functional Dependency
Question 11 :
In ____________, needed services such as temporary help or extra space are traded on an as-needed basis.
- Horizontal exchanges
- Vertical exchanges
- Personal exchanges
- Functional exchanges
Question 12 :
A cross-functional business process that originates when the company receives a customer order and concludes when it receives a payment from the customer is _____
- Order fulfillment process
- Control Process
- Manufacturing process
- Procurement process
Question 13 :
To effectively manage reports by exception, the company must first create:
- Performance standards
- Best practices
- User information requirements
- A database
Question 14 :
The purpose of data warehouse is to provide________data that is not stored in the operational environment.
- Summary
- Normalized
- Informational
- Denormalized
Question 15 :
_____ reports show a greater level of detail than is included in routine reports
- Drill-down
- Key-indicator
- Routine
- Ad hoc
Question 16 :
Which is NOT a fundamental tenet of ethics-
- Privacy
- Responsibility
- Accountability
- Liability
Question 17 :
Organizations usually are not using social computing in which of the following functions?
- Marketing
- Customer Relationship Management
- Human Resource Management
- Production
Question 18 :
Which web technique allows viewers to write short messages
- Review Sheet
- Forum
- Microblogging
Question 19 :
The data in the datawarehouse is described by:
- Relational data
- Operational data
- Informational data
- Meta data
Question 20 :
Pervasive computing is also known as ________
- Super computing
- Ubiquitous computing
- Mainframe computing
- Satellite computing
Question 21 :
A datawarehouse helps buisness executives to
- Archive the important Data
- use their data for decision making
- organize data
- create real time transactions
Question 22 :
_____ is a CRM system that is hosted by an external vendor in the vendor's data center.
- Analytical CRM
- On-demand CRM
- Operational CRM
- Customer-facing CRM
Question 23 :
Which is not a computer based information system
- Customer relationship management
- Supply chain management
- Visionary management
- Operation management
Question 24 :
Businesses have become dependent on computer networks for improving their_________
- Efficiency
- Accuracy
- Interactions
- Information exchange
Question 25 :
An instruction in a computer program that triggers a malicious act is called as _________
- Logic Bombs
- Packet Sniffer
- Hacking
- Computer Crime