0% found this document useful (0 votes)
33 views

MIS REVIEW MCQ - converted

Chapter 6 discusses the limitations of traditional file environments, emphasizing issues like data redundancy and isolation, while introducing the advantages of DBMS, particularly relational databases. It also covers the importance of data governance, quality, and the challenges of big data management. The chapter further explores telecommunications, e-commerce, and security measures necessary for effective information management.

Uploaded by

Tommy smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

MIS REVIEW MCQ - converted

Chapter 6 discusses the limitations of traditional file environments, emphasizing issues like data redundancy and isolation, while introducing the advantages of DBMS, particularly relational databases. It also covers the importance of data governance, quality, and the challenges of big data management. The chapter further explores telecommunications, e-commerce, and security measures necessary for effective information management.

Uploaded by

Tommy smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Chapter 6: Databases and Information Management

1. Which of the following is a key problem with traditional file environments?


o A) Data redundancy
o B) Increased security
o C) Simplified data access
o D) Enhanced performance
Answer: A) Data redundancy
2. A DBMS reduces which of the following issues compared to traditional file
environments?
o A) Data isolation
o B) Data quality
o C) Processing time
o D) Data integration
Answer: A) Data isolation
3. Which type of database organizes data into two-dimensional tables?
o A) Relational DBMS
o B) Hierarchical DBMS
o C) Network DBMS
o D) Object-oriented DBMS
Answer: A) Relational DBMS
4. What is a key feature of relational DBMS?
o A) Redundancy
o B) Data isolation
o C) Flexibility in querying
o D) Lack of security
Answer: C) Flexibility in querying
5. Which of the following is NOT a component of a DBMS?
o A) Data definition language
o B) Application generator
o C) Data dictionary
o D) File transfer protocol
Answer: D) File transfer protocol
6. Data governance refers to which of the following?
o A) Standardized data formats
o B) Policies for data management
o C) Protection against data breaches
o D) Relational database structures
Answer: B) Policies for data management
7. Which of the following is used to ensure data quality?
o A) Data mining
o B) Normalization
o C) Data scrubbing
o D) Encryption
Answer: C) Data scrubbing
8. Which is a major challenge of big data management?
o A) Lack of data storage 7. What does "Electronic Data Interchange (EDI)" help with in business-to-
o B) Processing speed business transactions?
o C) Small data sets
o D) Limited data generation A) Reduces the need for customer reviews
Answer: B) Processing speed B) Increases the efficiency and speed of business document exchange
9. Which of the following technologies is used to store vast amounts of unstructured C) Eliminates the need for digital payment systems
data? D) Improves social media marketing strategies
o A) Relational databases
o B) Non-relational databases Answer: B) Increases the efficiency and speed of business document exchange
o C) Flat file systems
o D) Data lakes
Answer: B) Non-relational databases
10. Which of the following is NOT a tool for data analysis in business intelligence 8. Which of the following is an important type of m-commerce service?
systems?
o A) OLAP
A) Payment processing via email
o B) Data mining
B) Mobile bill payments
o C) HTTP
C) Traditional bank transfers
o D) SQL
D) Paper-based transaction records
Answer: C) HTTP
Answer: B) Mobile bill payments
Chapter 7: Telecommunications, the Internet, and Wireless Technology
9. Which of the following is an advantage of using private industrial networks in
11. Which of the following describes a LAN?
o A) A network that covers an entire country
B2B e-commerce?
o B) A network used for short-range communication
o C) A network limited to a small geographic area
A) Limited supplier access
o D) A network used exclusively by government agencies
B) Greater efficiency and responsiveness in supply chains
Answer: C) A network limited to a small geographic area C) Increased reliance on physical stores
12. What is the primary difference between digital and analog signals? D) Reduced need for internet connectivity
o A) Digital signals are continuous, while analog signals are discrete
o B) Analog signals are continuous, while digital signals are discrete
Answer: B) Greater efficiency and responsiveness in supply chains
o C) Analog signals are used exclusively for telephony
o D) Digital signals cannot carry as much data as analog signals
Answer: B) Analog signals are continuous, while digital signals are discrete
13. Which technology allows high-speed transmission of data over phone lines? 10. When building an e-commerce presence, which platform is essential for
o A) Ethernet interacting with customers?
o B) Wi-Fi
o C) DSL A) Corporate website
o D) Fiber optics B) Television advertisements
Answer: C) DSL C) Paper brochures
14. Which of the following describes a VPN? D) In-store kiosks
o A) A virtualized network environment created over the Internet
o B) A physical private network used for secure communications Answer: A) Corporate website
o C) A network technology for wireless communications
Answer: B) Products such as music, video, and software that can be delivered digitally o D) A hardware firewall for secure access
Answer: A) A virtualized network environment created over the Internet
15. What is the primary function of a router?
o A) To connect multiple computers on the same network
3. Which of the following is a principal e-commerce business model? o B) To manage traffic between different networks
o C) To establish a wireless network connection
A) Broadcasting o D) To encrypt data sent across networks
B) E-tailers Answer: B) To manage traffic between different networks
C) News aggregators 16. Which of the following is the fastest type of physical transmission media?
D) Wholesale markets o A) Twisted pair wire
o B) Coaxial cable
Answer: B) E-tailers o C) Fiber-optic cable
o D) Wireless transmission
Answer: C) Fiber-optic cable
17. Which protocol is used for transferring web pages over the internet?
4. What is the primary benefit of behavioral targeting in e-commerce? o A) FTP
o B) HTTP
A) It increases operational costs o C) SMTP
B) It decreases customer engagement o D) IMAP
C) It improves the effectiveness of digital ads Answer: B) HTTP
D) It reduces the need for mobile applications 18. Which IP addressing version allows for the most unique addresses?
o A) IPv4
o B) IPv6
Answer: C) It improves the effectiveness of digital ads
o C) IPv3
o D) IPv5
Answer: B) IPv6
19. What term describes the ability of the internet to handle different data types
5. How has e-commerce transformed marketing?
simultaneously?
o A) Multiplexing
A) By reducing the use of social networks
o B) Convergence
B) By lowering the cost of advertising on traditional media
o C) Packet switching
C) By providing new ways of targeting customers through online channels
o D) Modulation
D) By eliminating the need for customer service
Answer: B) Convergence
20. Which wireless standard is most commonly used in local area networks?
Answer: C) By providing new ways of targeting customers through online channels
o A) Bluetooth
o B) Wi-Fi
o C) Zigbee
o D) 4G LTE
6. What is one important role of m-commerce? Answer: B) Wi-Fi
A) It limits businesses' geographic reach
B) It facilitates location-based applications
C) It only supports traditional retail business models Chapter 8: Securing Information Systems
D) It decreases the need for mobile apps
21. Which of the following is a common type of malware?
Answer: B) It facilitates location-based applications
o A) Data warehouse
o B) Trojan horse
o C) VPN
o D) Cookie 9. What is the role of business intelligence in enterprise applications?
Answer: B) Trojan horse
22. What is the primary goal of information security? Business intelligence in enterprise applications helps businesses by:
o A) To increase system complexity
o B) To ensure the confidentiality, integrity, and availability of data • A) Reducing the need for employee training
o C) To make all information publicly available • B) Providing real-time data analysis and decision support
o D) To enhance system performance • C) Limiting the number of systems used in the organization
Answer: B) To ensure the confidentiality, integrity, and availability of data • D) Enhancing customer relationship management
23. What is a key characteristic of a virus?
o A) It replicates by attaching to other programs Answer: B) Providing real-time data analysis and decision support
o B) It operates without a host
o C) It is a network security device
o D) It only affects system hardware
Answer: A) It replicates by attaching to other programs 10. What is social CRM, and how is it used?
24. What is the purpose of a firewall in network security?
o A) To monitor user activity How does social CRM enhance customer relationship management?
o B) To prevent unauthorized access
o C) To replicate data across servers
• A) By tracking customer purchases through loyalty programs
o D) To manage bandwidth usage
• B) By using social media to engage with customers and gather feedback
Answer: B) To prevent unauthorized access • C) By automating customer service processes
25. Which of the following is NOT considered an internal threat to information • D) By offering discounts to social media followers
systems?
o A) Malware
Answer: B) By using social media to engage with customers and gather feedback
o B) Employee errors
o C) Social engineering
CHAPTER 10
o D) Unapproved software installation
Answer: A) Malware
26. A denial-of-service (DoS) attack involves: 1. What is a unique feature of e-commerce technology?
o A) Deleting all the files on a server
A) Limited global reach
o B) Flooding a network with traffic to make services unavailable
B) Ubiquity
o C) Using social engineering to steal login credentials
C) High transaction costs
o D) Installing malware on a system remotely
D) Localized advertising
Answer: B) Flooding a network with traffic to make services unavailable
27. What does disaster recovery planning focus on?
o A) Recovering lost data during an attack
Answer: B) Ubiquity
o B) Restoring business operations after a disruption
o C) Preventing future cyber-attacks
o D) Increasing data storage capacity
Answer: B) Restoring business operations after a disruption 2. What does "digital goods" refer to?
28. Which of the following ensures that data has not been altered or tampered with?
o A) Confidentiality A) Products that must be delivered physically
o B) Integrity B) Products such as music, video, and software that can be delivered digitally
o C) Availability C) Products like clothing and furniture
D) Traditional goods sold through digital platforms
• C) On-demand deployment and remote access o D) Encryption
• D) Limited data accessibility Answer: B) Integrity
29. Which security measure is used to protect data during transmission?
Answer: C) On-demand deployment and remote access o A) Encryption
o B) Firewalls
o C) Antivirus software
o D) Biometrics
6. What is the purpose of cross-selling in customer relationship management Answer: A) Encryption
(CRM)? 30. What is the main purpose of auditing in information security?
o A) To create a backup of data
What is the main goal of cross-selling? o B) To ensure compliance with policies and regulations
o C) To update the operating system
• A) To offer customers discounts on products o D) To improve data storage capabilities
• B) To offer additional products or services to existing customers Answer: B) To ensure compliance with policies and regulations
• C) To identify unprofitable customers
• D) To improve employee performance

Answer: B) To offer additional products or services to existing customers Chapter 9: Achieving Operational Excellence and Customer Intimacy

31. What is the main function of an enterprise system?


o A) To handle all database queries
7. What is the role of sales force automation in CRM systems? o B) To integrate business processes across departments
o C) To manage telecommunication networks
Sales force automation (SFA) helps sales teams by: o D) To track customer interactions
Answer: B) To integrate business processes across departments
• A) Managing inventory and logistics
• B) Automating the scheduling of employee training sessions 32. What is the primary benefit of supply chain management (SCM) systems?
• C) Automating and improving customer-facing processes like sales and lead management
• D) Managing customer feedback and complaints • A) Improved internet connectivity
• B) Enhanced customer relationship management
Answer: C) Automating and improving customer-facing processes like sales and • C) Better coordination of supply chain activities
lead management • D) Increased product variety
Answer: C) Better coordination of supply chain activities

33. Which of the following best describes a supply chain?


8. How do supply chain costs impact an organization’s profitability?
• A) A network of organizations involved in the creation and delivery of products
• B) The process of selling products to customers
How do supply chain costs affect a company’s profitability?
• C) A system for managing a company’s internal finances
• D) A method of customer support
• A) Supply chain costs do not affect profitability.
Answer: A) A network of organizations involved in the creation and delivery of
• B) High supply chain costs can reduce profit margins.
products
• C) Supply chain costs always lead to higher profitability.
• D) Supply chain costs are only relevant in the manufacturing industry.
34. Which of the following is a key feature of customer relationship management
(CRM) systems?
Answer: B) High supply chain costs can reduce profit margins.
• A) Financial reporting What is the primary function of supply chain management systems?
• B) Inventory tracking
• C) Managing customer interactions and relationships • A) Increase product variety
• D) Enterprise resource planning • B) Automate the flow of information among supply chain members
Answer: C) Managing customer interactions and relationships • C) Monitor employee performance
• D) Enhance internal collaboration
35. What is the main purpose of operational CRM?
Answer: B) Automate the flow of information among supply chain members
• A) To analyze customer purchasing trends
• B) To provide real-time customer service and support
• C) To manage supply chain logistics
• D) To integrate financial systems 3. How do customer relationship management systems help firms achieve
Answer: B) To provide real-time customer service and support customer intimacy?
36. Which of the following is a key benefit of analytical CRM? Which of the following is an example of a "touchpoint" in customer relationship
management?
• A) Automating customer service interactions
• B) Analyzing customer data for better decision-making • A) Customer feedback surveys
• C) Reducing supply chain costs • B) Financial performance reports
• D) Streamlining order fulfillment • C) Employee training sessions
Answer: B) Analyzing customer data for better decision-making • D) Business performance evaluations
37. What is a significant challenge of implementing enterprise systems? Answer: A) Customer feedback surveys
• A) Decreased supply chain visibility
• B) Lack of available software solutions
• C) High costs and complexity of implementation 4. What are the challenges that enterprise applications pose?
• D) Limited integration with customer-facing processes
Answer: C) High costs and complexity of implementation Which of the following is NOT a challenge of implementing enterprise applications?
38. Which technology is increasingly being integrated into next-generation enterprise
• A) High implementation costs
applications? • B) Streamlined employee communication
• C) Integration issues with existing systems
• A) Artificial intelligence • D) Organizational change management
• B) Ethernet
• C) Fax machines
Answer: B) Streamlined employee communication
• D) Mainframe computers
Answer: A) Artificial intelligence
39. Which of the following is an advantage of cloud-based enterprise applications?
5. How do enterprise applications take advantage of cloud computing and
• A) Higher implementation costs business intelligence?
• B) Reduced need for data governance
• C) Scalability and flexibility Which of the following benefits does cloud computing provide for enterprise applications?
• D) Lack of data security
Answer: C) Scalability and flexibility • A) Increased on-premises hardware requirements
• B) Reduced scalability
o D) Digital certificates 40. Global supply chains are particularly challenging due to:
o Answer: B) Firewall
12. What is the primary purpose of two-factor authentication? • A) Differences in communication technologies
o A) To increase system performance • B) Variations in regulatory environments across countries
o B) To reduce the complexity of user passwords • C) The uniformity of financial standards
o C) To verify a user's identity with two different forms of authentication • D) Similarities in production schedules
o D) To encrypt sensitive data Answer: B) Variations in regulatory environments across countries
o Answer: C) To verify a user's identity with two different forms of
authentication
13. What is the role of an intrusion detection system (IDS)?
o A) To monitor network traffic for suspicious activity Chapter 10: E-commerce: Digital Markets, Digital Goods
o B) To manage user access and authentication
o C) To encrypt data during transmission 41. What is one of the unique features of e-commerce that distinguishes it from
o D) To provide backup solutions in case of a system failure traditional commerce?
o Answer: A) To monitor network traffic for suspicious activity
14. Which of the following technologies provides an encrypted communication channel • A) Global reach
and verifies the authenticity of a user’s identity? • B) Limited access
o A) Digital certificate • C) Restricted product availability
o B) Token • D) Reduced interactivity
o C) Firewall Answer: A) Global reach
o D) Intrusion prevention system
o Answer: A) Digital certificate 42. Which of the following describes ubiquity in e-commerce?
15. Why might a small business choose to use a managed security service provider
(MSSP)? • A) E-commerce is only available at specific locations
o A) To reduce the cost of hardware • B) E-commerce transactions are always secure
o B) To enhance network speed • C) E-commerce is available everywhere and anytime
o C) To outsource security operations to experts • D) E-commerce supports only digital products
o D) To improve employee productivity Answer: C) E-commerce is available everywhere and anytime
o Answer: C) To outsource security operations to experts
CHAPTER 9 43. What is the primary function of an e-commerce revenue model?

1. How do enterprise systems help businesses achieve operational excellence? • A) To determine a company's organizational structure
• B) To generate profits from e-commerce transactions
Which of the following is NOT supported by enterprise systems? • C) To improve product designs
• D) To reduce transaction costs
• A) Accounts Payable Answer: B) To generate profits from e-commerce transactions
• B) General Ledger
• C) Human Resources Management 44. Which of the following is an example of a B2C e-commerce business?
• D) Payroll
• A) A business purchasing raw materials from suppliers
Answer: C) Human Resources Management • B) A company selling office furniture to other businesses
• C) An online store selling products to individual consumers
• D) An auction site for peer-to-peer sales
Answer: C) An online store selling products to individual consumers
2. How do supply chain management systems coordinate planning, production,
and logistics with suppliers? 45. Which of the following is an example of a C2C e-commerce model?
• A) A company selling goods to individual customers 6. Which of the following laws requires companies to practice stringent electronic
• B) A customer selling items to other customers through a platform like eBay records management and adhere to strict standards for security, privacy, and
• C) A retailer purchasing products from a wholesaler control?
• D) A manufacturer selling products directly to businesses o A) HIPAA
Answer: B) A customer selling items to other customers through a platform like o B) GDPR
eBay o C) SOX (Sarbanes-Oxley Act)
o D) All of the above
46. What is a benefit of behavioral targeting in e-commerce? o Answer: D) All of the above
7. What is the purpose of electronic evidence?
• A) Reduced costs of website maintenance o A) To ensure user access control
• B) Personalized marketing messages based on user activity o B) To provide proof in legal proceedings
• C) Increased legal requirements for data usage o C) To increase system performance
• D) Limited customer engagement o D) To monitor network traffic
Answer: B) Personalized marketing messages based on user activity o Answer: B) To provide proof in legal proceedings
47. Which of the following describes the impact of social e-commerce? 8-3 What are the components of an organizational framework for security and
control?
• A) It limits business reach to traditional markets
• B) It allows businesses to leverage social networks to engage users and promote products 8. Which of the following is a type of general control for information systems?
• C) It decreases the value of customer feedback o A) Firewall protection
• D) It reduces the use of mobile commerce platforms o B) Employee training
Answer: B) It allows businesses to leverage social networks to engage users and o C) Backup and recovery procedures
promote products o D) Digital certificates
o Answer: C) Backup and recovery procedures
48. Which technology allows businesses to send electronic documents like invoices to 9. What is the purpose of risk assessment in an information systems security
each other in B2B e-commerce? framework?
o A) To improve system performance
• A) HTTP o B) To identify potential vulnerabilities and control weaknesses
• B) Electronic Data Interchange (EDI) o C) To provide legal evidence in case of a breach
• C) Ethernet o D) To define user roles and access levels
• D) Wi-Fi o Answer: B) To identify potential vulnerabilities and control weaknesses
Answer: B) Electronic Data Interchange (EDI) 10. What does an acceptable use policy (AUP) typically define?
o A) Password complexity requirements
49. Mobile commerce (m-commerce) refers to: o B) Rules for the legal use of information systems
o C) Backup procedures for sensitive data
• A) The use of mobile devices to conduct commercial transactions o D) The roles of users within an organization
• B) Businesses trading physical goods through traditional methods o Answer: B) Rules for the legal use of information systems
• C) The inability to conduct business transactions via the internet
• D) Limiting transactions to desktop computers 9-4 What are the most important tools and technologies for safeguarding
Answer: A) The use of mobile devices to conduct commercial transactions information resources?
50. What is one of the most common m-commerce applications? 11. Which of the following technologies helps to prevent unauthorized users from
accessing a private network when it is linked to the Internet?
• A) Remote server management o A) Intrusion detection system
• B) Location-based services o B) Firewall
• C) Physical point-of-sale transactions o C) Anti-malware software
10. Bluetooth (802.15) is a standard for which type of network? • D) Large-scale logistics planning
Answer: B) Location-based services
A) Personal Area Networks (PANs)
B) Local Area Networks (LANs) 51. Which of the following best describes mobile payment systems?
C) Metropolitan Area Networks (MANs)
D) Wide Area Networks (WANs) • A) They are used exclusively for large businesses
• B) They facilitate the payment of goods and services through mobile devices
Answer: A) Personal Area Networks (PANs) • C) They require a wired internet connection
• D) They are rarely used in m-commerce applications
CHAPTER 8 Answer: B) They facilitate the payment of goods and services through mobile
devices
8-1 Why are information systems vulnerable to destruction, error, and
abuse? 52. What is the first step in developing an e-commerce presence map?

• A) Setting up financial tracking systems


1. Which of the following is a common vulnerability of information systems?
• B) Identifying the platforms for web, mobile, and social media presence
o A) Strong password protocols
• C) Hiring customer service representatives
o B) Open system design of the Internet
• D) Launching targeted advertising campaigns
o C) Regular software updates
Answer: B) Identifying the platforms for web, mobile, and social media presence
o D) Comprehensive user training
o Answer: B) Open system design of the Internet
2. What type of malware replicates itself and spreads without user intervention? 53. Which of the following is critical when building an e-commerce presence?
o A) Virus
• A) Overloading the platform with features
o B) Trojan horse
• B) Developing a detailed timeline with milestones
o C) Worm
• C) Relying solely on third-party solutions
o D) Adware
• D) Ignoring mobile users
o Answer: C) Worm
3. Which of the following is an example of identity theft? Answer: B) Developing a detailed timeline with milestones
o A) Using a fake ID to steal financial information
o B) Hacking into a corporate network
54. What type of e-commerce involves transactions between businesses and their
o C) Sending phishing emails
suppliers?
o D) Unauthorized access to a database
• A) B2C
o Answer: A) Using a fake ID to steal financial information
• B) C2C
4. What is the primary risk posed by software defects in information systems?
• C) B2B
o A) Increased costs of hardware
• D) P2P
o B) Unauthorized access by hackers
o C) Decreased system performance
Answer: C) B2B
o D) Reduced data accuracy
o Answer: B) Unauthorized access by hackers
55. What is an advantage of cloud-based e-commerce solutions?

• A) Higher costs for scalability


9-2 What is the business value of security and control?
• B) Reduced flexibility for businesses
• C) Quick implementation and reduced IT overhead
5. Inadequate security controls may lead to:
• D) Lower levels of data security
o A) Increased productivity
Answer: C) Quick implementation and reduced IT overhead
o B) Legal liability
o C) Improved system performance
56. Which of the following is NOT a part of an e-commerce presence map?
o D) Reduced hardware costs
o Answer: B) Legal liability
• A) Website 6. What does Wi-Fi technology enable?
• B) Social media presence
• C) Brick-and-mortar store A) Long-range wireless communication over cities
• D) Mobile platform B) Wireless communication for small personal area networks (PANs)
Answer: C) Brick-and-mortar store C) Wireless communication for local area networks (LANs)
D) High-speed data transmission in 5G networks
57. Which of the following is critical in transforming e-commerce through social media?
Answer: C) Wireless communication for local area networks (LANs)
• A) Limiting user engagement
• B) Using personalized recommendations based on social interactions
• C) Reducing the amount of user-generated content
• D) Increasing transaction costs 7. What is the speed range of 3G networks?
Answer: B) Using personalized recommendations based on social interactions
A) 10 Kbps to 144 Kbps
58. Which mobile technology supports instant payments for goods and services? B) 144 Kbps to 2 Mbps
C) 100 Mbps to 1 Gbps
• A) NFC (Near-Field Communication) D) 1 Gbps to 10 Gbps
• B) Ethernet
• C) DSL Answer: B) 144 Kbps to 2 Mbps
• D) VPN
Answer: A) NFC (Near-Field Communication)
59. Which of the following describes a milestone in e-commerce development? 8. Which of the following is NOT a major Internet service?
• A) A small goal with no direct impact on the project A) Email
• B) A key event or deliverable during the project timeline B) Telnet
• C) An unimportant part of project management C) Twitter
• D) A requirement that delays the launch D) Instant Messaging
Answer: B) A key event or deliverable during the project timeline
Answer: C) Twitter
60. Which of the following describes how m-commerce has transformed marketing?
• A) It has led to fewer personalized marketing efforts
• B) It allows businesses to reach customers through location-based services
• C) It limits social media engagement
9. Which of the following is the primary standard for mobile networks in Europe
• D) It discourages the use of analytics and much of the world?
Answer: B) It allows businesses to reach customers through location-based services
A) Code Division Multiple Access (CDMA)
B) Global System for Mobile Communications (GSM)
C) Long Term Evolution (LTE)
D) 5G
Answer: B) Global System for Mobile Communications (GSM)
2. Which of the following is NOT a component of a simple network? BONUS REFERENCE FROM BOOK

A) Computers
B) Network interfaces
C) Routers CHAPTER 6
D) Network operating system software
MCQs on Problems of Managing Data Resources in a Traditional File
Answer: C) Routers Environment

1. What is a major problem with the traditional file environment?


o a) Program independence
3. Which of the following networks spans broad geographical distances, such as o b) Data redundancy
continents? o c) Data flexibility
o d) Easy data sharing
A) LAN o Answer: b) Data redundancy
B) MAN 2. Which of the following describes the lack of ability to access data easily across
C) WAN functional areas in a traditional file environment?
D) PAN o a) Program-data dependence
o b) Data redundancy
Answer: C) WAN (Wide Area Network) o c) Inflexibility
o d) Lack of data sharing
o Answer: d) Lack of data sharing
3. Program-data dependence occurs when:
4. Which technology allows for low-cost voice transmission over the Internet? o a) Changes in programs do not affect the data.
o b) Data is stored in independent files.
A) VoIP (Voice over IP) o c) Changes in data require changes in programs.
B) VPN (Virtual Private Network) o d) Data is easily accessible across departments.
C) DNS (Domain Name System) o Answer: c) Changes in data require changes in programs.
D) Wi-Fi (Wireless Fidelity)

Answer: A) VoIP (Voice over IP)


MCQs on Capabilities of Database Management Systems (DBMS)

4. Which of the following is NOT a capability of a DBMS?


5. What is the primary function of RFID technology? o a) Data manipulation language
o b) Data definition capability
A) To enable wireless communication between devices o c) Data dictionary capability
B) To track goods using tiny embedded tags o d) Program-data dependence
C) To transmit internet data at high speeds o Answer: d) Program-data dependence
D) To secure a network from unauthorized access 5. Which language is used for accessing and manipulating data in a DBMS?
o a) HTML
Answer: B) To track goods using tiny embedded tags o b) SQL
o c) XML
o d) JSON
o Answer: b) SQL
6. In a relational database, data is organized into:
o a) Files and folders o Answer: b) Distributed processing of large data sets
o b) Rows and columns 12. Which data storage system is useful for companies dealing with extremely large
o c) Objects and classes datasets and requires distributed storage?
o d) Hierarchical trees o a) Data mart
o Answer: b) Rows and columns o b) Hadoop Distributed File System (HDFS)
o c) Relational database
o d) Data warehouse
o Answer: b) Hadoop Distributed File System (HDFS)
MCQs on Relational DBMS and Data Organization
7. What is the primary key in a relational database?
o a) A field that is optional for each record MCQs on Data Governance and Data Quality
o b) A unique identifier for each record
o c) A field that is used to link two tables 13. What is the main purpose of data governance?
o d) A field that can be repeated in multiple records o a) To improve the performance of hardware
o Answer: b) A unique identifier for each record o b) To ensure the proper use, management, and security of data
8. What is the process of eliminating redundant data from a relational database o c) To manage software updates
called? o d) To enable faster processing of data
o a) Normalization o Answer: b) To ensure the proper use, management, and security of data
o b) Data mining 14. Which of the following is NOT a common data quality problem?
o c) Denormalization o a) Inaccuracy
o d) Referential integrity o b) Inconsistency
o Answer: a) Normalization o c) Duplication
9. Which of the following ensures that relationships between tables remain consistent o d) Accessibility
in a relational database? o Answer: d) Accessibility
o a) Entity-relationship diagram 15. Which tool is used to remove or correct inaccurate data in a database?
o b) Referential integrity o a) Data dictionary
o c) Foreign key o b) Data cleansing software
o d) Data dictionary o c) Entity-relationship diagram
o Answer: b) Referential integrity o d) Normalization tool
o Answer: b) Data cleansing software
MCQs on Tools and Technologies for Accessing Information from Databases
CHAPTER 7
10. Which of the following is a method for analyzing large data sets to find patterns?
o a) Text mining 1. What is the primary function of a Domain Name System (DNS)?
o b) Data mining
o c) Web mining A) To assign IP addresses to computers on the Internet
o d) OLAP B) To convert IP addresses into user-friendly domain names
o Answer: b) Data mining C) To manage email communication on the Internet
11. Hadoop is a tool used for: D) To secure communications over the Internet
o a) In-memory computing
o b) Distributed processing of large data sets Answer: B) To convert IP addresses into user-friendly domain names
o c) Data cleansing
o d) Creating relational databases

You might also like