System Analysis and Design MCQ IT Officer(PSC)
1. ______ is an important factor of a management information system.
a. System
b. Data
c. Process
d. All
Correct Answer: d
Explanation: A management information system (MIS) relies on all three components: the system (infrastructure), data (raw input), and processes (methods to convert data into meaningful information). The correct answer is "d" as all factors are essential.
2. Which are the following is/are the level(s) of documentation?
a. Documentation for management
b. Documentation for user
c. Documentation for data processing department
d. All of the above
Correct Answer: d
Explanation: Documentation in system design occurs at multiple levels, including for management (high-level overview), users (guides/manuals), and the data processing department (technical details). The answer "d" is correct.
3. ______ level supply information to strategic tier for the use of top management.
a. Operational
b. Environmental
c. Competition
d. Tactical
Correct Answer: d
Explanation: The tactical level provides summarized information to support strategic decision-making for top management, focusing on medium-term goals. The answer "d" is correct.
4. In a DFD external entities are represented by a
a. Rectangle
b. Ellipse
c. Diamond-shaped box
d. Circle
Correct Answer: a
Explanation: In a Data Flow Diagram (DFD), external entities (e.g., users or systems interacting with the system) are represented by rectangles. The answer "a" is correct.
5. ______ can be defined as data that has been processed into a form that is meaningful to the recipient and is of real or perceived value in current or prospective decisions.
a. System
b. Information
c. Technology
d. Service
Correct Answer: b
Explanation: Information is processed data that is meaningful and valuable for decision-making. The answer "b" is correct.
6. Use the new system at the same time as the old system to compare the results. This is known as
a. Procedure Writing
b. Simultaneous processing
c. Parallel Operation
d. File Conversion
Correct Answer: c
Explanation: Parallel operation involves running both the old and new systems simultaneously to compare results and ensure reliability. The answer "c" is correct.
7. Decision-making model was proposed by
a. Harry Goode
b. Herbert A. Simon
c. Recon Michal
d. None of this
Correct Answer: b
Explanation: Herbert A. Simon proposed a well-known decision-making model involving intelligence, design, and choice phases. The answer "b" is correct.
8. A data flow can
a. Only emanate from an external entity
b. Only terminate in an external entity
c. May emanate and terminate in an external entity
d. May either emanate or terminate in an external entity but not both
Correct Answer: c
Explanation: In a DFD, a data flow can both emanate from and terminate at an external entity, depending on the direction of data exchange. The answer "c" is correct.
9. ______ can be defined as the most recent and perhaps the most comprehensive technique for solving computer problems.
a. System Analysis
b. System Data
c. System Procedure
d. System Record
Correct Answer: a
Explanation: System Analysis is a comprehensive technique for understanding, designing, and solving computer-related problems. The answer "a" is correct.
10. SDLC stands for
a. System Development Life Cycle
b. Structure Design Life Cycle
c. System Design Life Cycle
d. Structure Development Life Cycle
Correct Answer: a
Explanation: SDLC stands for System Development Life Cycle, a framework for software development. The answer "a" is correct.
11. Which of these does not affect different types of software as a whole?
a. Security
b. Business and social change
c. Flexibility
d. Heterogeneity
Correct Answer: d
Explanation: Security, business/social changes, and flexibility are universal concerns for all software types. Heterogeneity (diversity in hardware/software environments) is less universally impactful as it depends on the specific software context. The correct answer is "d".
12. The 4GT Model acts as a package of
a. Software Tools
b. Software Programs
c. CASE tools
d. None of the above
Correct Answer: a
Explanation: The Fourth Generation Techniques (4GT) model involves software tools that enable rapid development using high-level languages and automation. The answer "a" is correct.
13. ______ originally proposed the spiral model.
a. Pressman
b. Royce
c. IBM
d. Barry Boehm
Correct Answer: d
Explanation: Barry Boehm proposed the spiral model in 1986, focusing on iterative development with risk management. The answer "d" is correct.
14. Out of the following, which one is not a workbench tool for Requirement Management?
a. RDD 100
b. Rational Suite
c. DOORS
d. RTM
Correct Answer: b
Explanation: RDD 100, DOORS, and RTM are specific tools for requirement management. Rational Suite (now IBM Rational) is a broader software development suite, not specifically a workbench tool for requirement management. The answer "b" is correct.
15. In system modelling, which model depicts a system's static nature?
a. Data Model
b. Structural Model
c. Context Model
d. Behavioural Model
Correct Answer: b
Explanation: The structural model represents the static structure of a system (e.g., classes, objects, relationships). The answer "b" is correct.
16. Source code translation and Program modularisation are the activities of
a. Reverse engineering
b. Forward Engineering
c. Reengineering and Reverse Engineering
d. Reengineering
Correct Answer: c
Explanation: Source code translation and program modularization involve reengineering (modifying existing systems) and often require reverse engineering (analyzing the existing code). The correct answer is "c".
17. Which of these reliability requirements is concerned with maintaining various system copies?
a. Ambiguous Requirements
b. Redundancy Requirements
c. Recovery Requirements
d. Checking Requirements
Correct Answer: b
Explanation: Redundancy requirements involve maintaining multiple copies of a system to ensure reliability in case of failure. Recovery requirements focus on restoring a system after failure, not maintaining copies. The correct answer is "b".
18. The worst form of module cohesion is
a. Coincidental Cohesion
b. Functional Cohesion
c. Temporal Cohesion
d. Logical Cohesion
Correct Answer: a
Explanation: Coincidental cohesion occurs when module elements are grouped arbitrarily, leading to poor design. It’s the worst form compared to functional (best), temporal, or logical cohesion. The answer "a" is correct.
19. How does the implementation of generalisation occur in Object-Oriented programming languages?
a. Encapsulation
b. Abstract Classes
c. Inheritance
d. Polymorphism
Correct Answer: c
Explanation: Generalization in OOP is implemented through inheritance, where a subclass inherits properties from a parent class. The answer "c" is correct.
20. Out of these early OOD methods, which one incorporates both a "macro development process" and a "micro development process"?
a. Wirfs-Brock method
b. Booch method
c. Coad and Yourdon method
d. Rumbaugh method
Correct Answer: b
Explanation: The Booch method (by Grady Booch) includes both macro (high-level design) and micro (detailed design) development processes. The answer "b" is correct.
21. Out of these web engineering metrics, which one measures the relatedness extent between multiple web pages?
a. Static Content Objects Numbers
b. Dynamic Content Objects Numbers
c. Internal Page Links Number
d. Web Page Similarity
Correct Answer: d
Explanation: Web Page Similarity measures how related multiple web pages are, often based on content or structure. The answer "d" is correct.
22. Which one isn't a stage of the COCOMO-II?
a. Model of Application Composition estimation
b. Model of Early design estimation
c. Model of Post architecture estimation
d. Model of Comprehensive cost estimation
Correct Answer: d
Explanation: COCOMO-II includes Application Composition, Early Design, and Post-Architecture estimation models. "Comprehensive cost estimation" is not a specific stage. The correct answer is "d".
23. Which one isn't an approach to estimate the cost of the software?
a. Heuristic
b. Empirical
c. Critical
d. Analytical
Correct Answer: c
Explanation: Heuristic, empirical, and analytical are recognized approaches for software cost estimation. "Critical" is not a standard approach. The answer "c" is correct.
24. The aviation industry follows which of these standards?
a. RTCA DO-178B
b. CTRADO-172B
c. CTCADO-178B
d. RTRADO-178B
Correct Answer: a
Explanation: RTCA DO-178B is a standard for software in airborne systems, widely used in the aviation industry. The answer "a" is correct.
25. We generally use the ______ for Software Maintenance.
a. Integration Testing
b. Unit Testing
c. System Testing
d. Regression Testing
Correct Answer: d
Explanation: Regression testing ensures that new changes during maintenance don’t break existing functionality. The answer "d" is correct.
26. The language-processing system performs the translation of an XML data description to a
a. Alternative XML representation
b. Machine code
c. Software module
d. Alternative XML representation and machine code
Correct Answer: a
Explanation: A language-processing system typically translates XML data into another XML representation (e.g., for compatibility). Machine code translation is not typical for XML. The correct answer is "a".
27. What establishes the profile of end-users of the system?
a. System image
b. Mental image
c. User's model
d. Design model
Correct Answer: c
Explanation: The user’s model defines the profile of end-users, capturing their needs and behaviors. The answer "c" is correct.
28. Which is a stimuli category?
a. Management stimuli
b. Hardware stimuli
c. Software stimuli
d. Periodic stimuli
Correct Answer: d
Explanation: Periodic stimuli refer to events that occur at regular intervals, a common category in system design. The answer "d" is correct.
29. An object does NOT provide this service:
a. Deactivating & Activating Objects
b. Files implementing the identified entities in the ERD
c. Registering object implementation
d. Security features
Correct Answer: b
Explanation: Objects in OOP don’t directly provide "files implementing entities in the ERD" as a service; that’s a database design concept. The answer "b" is correct.
30. Out of these, which one isn't a business process's example?
a. Purchasing services
b. Testing software
c. Designing a new product
d. Hiring an employee
Correct Answer: b
Explanation: Testing software is a technical process, not a business process. Purchasing, designing, and hiring are business processes. The answer "b" is correct.
31. Which one of these is a data problem?
a. Record organisation problem
b. Hardware problems
c. Loss of comments
d. Heavy computational demands
Correct Answer: a
Explanation: Record organization problems (e.g., poor data structure) are data-related issues. The others are unrelated to data. The answer "a" is correct.
32. The FIT (Failure in Time) is another way in which one can REPORT
a. MTTF
b. MTTR
c. MTBF
d. MTSF
Correct Answer: a
Explanation: FIT (Failures in Time) measures the failure rate, often used to report Mean Time To Failure (MTTF). The answer "a" is correct.
33. What do we mean by Six Sigma?
a. A widely used strategy to implement statistical quality assurance
b. Six standard deviations
c. A widely used strategy that maintains statistical quality assurance and six standard deviations
d. An FTR (Formal Technical Review) guideline for inspection or a quality walkthrough
Correct Answer: a
Explanation: Six Sigma is a strategy for statistical quality assurance, aiming to reduce defects. It’s not specifically about six standard deviations in practice. The correct answer is "a".
34. Name an evaluation technique to assess the quality of test cases.
a. Validation
b. Mutation analysis
c. Performance analysis
d. Verification
Correct Answer: b
Explanation: Mutation analysis evaluates test cases by introducing changes (mutations) and checking if the test cases detect them. The answer "b" is correct.
35. Code is checked in which type of testing?
a. White box testing
b. Black box testing
c. Green box testing
d. Red box testing
Correct Answer: a
Explanation: White box testing involves examining the internal code structure. The answer "a" is correct.
Comments
Post a Comment