System Analysis and Design MCQ
1) In which thing we can arrange our data with condition rules and regulation.
a) Decision table
b) Decision tree
c) data flow diagram
d) None of the above
Answer...A
2) form contain
a) Label
b) checkbox
c) combobox
d) All of the above
Answer...D
3) In which format the database is stored ?
a) Graphical format
b) Image format
c) Tabular format
d) All of the above.
Answer...C
4) Storing the data in the file in sequential method is .
a) Sequential file organization
b) Hash file organization.
c) heap file organization
d) None of these.
Answer...A
5) which of the following file organization method is fast & efficient for huge data.
a) Sequential file organization
b) Hash file organization.
c) heap file organization
d) None of these.
Answer...A
6) The data blocks are used in.
a) Sequential file organization
b) Hash file organization.
c) heap file organization
d) B t tree.
Answer...C
7) In hash file organization the hashing is an efficient technique to directly search the location of data.without using index structure.
a) true
b) false
Answer...A
8) B t tree is similar to.
a) Decision tree
b) tree
c) Binary search tree
d) None of these.
Answer...C
9) BST stand for.
a) Binary search tree
b) Bounded search tree
c) Block search tree
d) None of these.
Answer...A
10) In which order BT tree sert their records ?
a) Decrease
b) Increase
c) Both (a) & (b)
d) None of these.
Answer...B
11) Only one record is stored in cluster file.
a) True
b) false
Answer...B
13) system implementation plan involve
a) project leader
b) project scope
c) project team
d) All of the above
Answer...D
14) QA stands for Quality assurance
a) true
b) false
Answer...A
15) Migration & recovery are the types of system testing.
a) true
b) false
Answer.. A
16) In which testing the s/w can be moved from older system infrastructure to morder system infrastructure.
a) Load testing
b) Recovery testing
c) Migration testing
d) viability testing
Answer...C
17) which model is used for collection documentation
a) waterfall model
b) Incremental model
c) Spiral model
d) None
Answer...A
18) SAD stands for......
a) System Advanced Development
b) System Analysis & Design
c) System Android Development
d) None of these
Ans : b
19) The collection of elements and components which have their specific goal is known as....
a) System
b) Analysis
c) Design
d) None of these
Ans : a
20) Which is the most important thing in the planning phase ?
a) Create smaller goals within larger project
b) Create a team
c) Complete the project within a given time
d) All of the above
Ans : c
21) Which phase describe the cost and benefits of the project ?
a) Implementation
b) Analysis
c) Both a & b
d) None of these
Ans : b
22) Skills of system analyst........
a) Knowledge of har
b) Ability to learn quickly
c) Encryption and decryption technique
d) All of the above
Ans : d
23) Open and closed system are the type of system ?
a) True
b) False
Ans : a
24) Non-physical system means....
a) Man made information system
b) Abstract system
c) Both a & b
d) None
Ans : b
25) DFD stands for___
a) Data for data
b) Data finding diagram
c) Data flow diagram
d) None of these
Ans : c
26) How many symbols are used in DFD ?
a) 1
b) 2
c) 3
d) 4
Ans : d
27) Logical data flow diagram focuses on.....
a) Business activities
b) System implement plan
c) Both a & b
d) None of these
Ans : a
28) Flowchart shows the
a) Flow of work
b) Past information
c) Both a & b
c) None of these
Ans : a
29) The rectangle shape is used in flowchart for........
a) Input & output
b) Process
c) Start
d ) End
Ans : b
30) Decision tree have internal node, leaf node and root node.
a) True
b) False
Ans : a
31) Decision tree used to learn knowledge on........
a) Information
b) Diagram
c) Classification
d) All of the above
Ans : c
32) Which of the following are the characteristics of system?
a) Speed
b) Accuracy
c) Reliability
d) All of the above
Ans : d
33) CBA stands for
a) Control Business Application
b) Combining Business Applicant
c) Cost Benefit Analysis
d) None of these
Ans : c
34) Application failure is a type of disaster.
a) True
b) False
Ans : a
35) DRP stands for Deriving Report Plan.
a) True
b) False
Ans : b
36) Which of the following are the types of security threat.
a) Malware
b) Emotet
c) Denial of service
d) All of the above
Ans : d
37) Security of system can break down into.......and...........
a) Malware and Emotet
b) Threat and Attack
c) Valid and Invalid
d) None of these
Ans : b
Comments
Post a Comment