Mettl 2
Mettl 2
Assuming that you are in the vi editor in command mode ,which of the following
Commands will abort the current editing session.
a. Q
b. W
c. ZZ
d. q!
2. Which of the following objects enables users to select the information to be included
in a report or document at run time ?
a. Metric
b. Attribute
c. Prompt
d. Fact
5. What is inode?(checkbox)
a. File owner identifier
b. File Type
c. File access permissions
d. File reading
6. After you run a report,what report manipulation enables you to view data at levels
Other than the original level of the report?
a. Drilling
b. Advance sorting
c. Data pivoting
d. Outline mode
8. Which of the following features in unix may be used for inter process
communication?(checkbox)
a. Pipes
b. Files
c. Semaphores
d. Signals
11. Splitting project into tasks and estimate time and resources required to complete
Each task called as project scheduling.
a. True
b. False
16. The following are not the tasks of data warehousing(choose two)
a. Long database transactions
b. Sacking up data
c. Managing schema objects
d. Application development
e. Managing user and security
17. Executing the same test case by giving the number of inputs on same build called as
a. Regression testing
b. Re testing
c. Adhoc testing
d. Sanity testing
18. Which of the following objects provides descriptive information from the data warehousing that can be displayed on a
report?
a. Fact
b. Attribute
c. Hierarchy
19. A spelling error on the user interface screen what severity does this issue deserve.
a. Low
b. Medium
c. High
d. None of the above
20. ________ means under what test environment (h/w, s/w set up) the application will run smoothly.
a. Test bed
b. Checkpoint
c. Code walk through
d. Checklist
23. Standards and procedures for managing changes in an evolving s/w product is called?
a. Confirmation management
b. Confederation management
c. Configuration management
d. Comparability management
1) The approach/document used to make sure all the requirements are covered when writing test cases
a) Test Matrix
b) Checklist
c) Test bed
d) Traceablity Matrix
2) Executing the same test case by giving the number of inputs on same build called as
a) Regression Testing
b) ReTesting
c) Ad hoc Testing
d) Sanity Testing
3) Control Charts is a statistical technique to assess, monitor, and maintain the stability of a process.
a) True
b) False
4) To check whether we are developing the right product according to the customer requirements are not.
It is a static process
a) Validation
b) Verification
c) Quality Assurance
d) Quality Control
5) To check whether we have developed the product according to the customer requirements r not. It is a
Dynamic process.
a) Validation
b) Verification
c) Quality Assurance
d) Quality Control
6) Staff development plan describes how the skills and experience of the project team members will be
developed.
a) True
b) False
7) It is a set of levels that defines a testing maturity hieraecy
a) TIM (Testing Improving Model)
8) A Non-Functional Software testing done to check if the user interface is easy to use and understand
a) Usability Testing
b) Security Testing
c) Unit testing
d) Block Box Testing
9) The review and approved document (i.e. Test plan, System Requirement Specification’s) is called as
a) Delivery Document
b) Baseline Document
c) Checklist
a) Unit Testing
b) Integration Testing
a) True
b) False
12) A useful tool to visualize, clarify, link, identify, and classify possible cause of a problem. This is also
called as “fishbone diagram” what is this?
a) Pareto Analysis
b) Cause-and-Effect Diagram
13) It measures the quality of processes used to create a quality product.
It is a system of management activities,
It is a preventive process, It applies for entire life cycle & Deals with Process.
a) Validation
b) Verification
c) Quality Assurance
d) Quality Control
c) Defect
15) Verification is
a) Process based
b) Product based
17) Name the events that will be analyzed, Count the named incidents, Rank the count by frequency
using a bar chart & Validate reasonableness of the analysis is called as
a) Pareto Analysis
b) Cause and Effect Diagram
c) SWOT Analysis
d) Pie Charts
18) Retesting of a single program or component after a change has been made?
b) Unit Regression
c) Regional Regression
d) Retesting
19) Requirement and Analysis, Design, Development or Coding, Testing and Maintenance is called as
Software Development Life Cycle (SDLC )
a) True
b) False
20) The testing which is done by going thro' the code is known as,
a) Unit Testing
b) Blackbox testing
21) Configuration Management Plan describes the Configuration Management procedures and structures
to be used.
a) True
b) False
22)This type of testing method attempts to find incorrect or missing functions, errors in data structures or
external database access, interface errors, Performance errors and initialization and Termination errors. It
is called as
a) White Box Testing
b) CMM Level 2
c) None
24) Software testing which is done without planning and Documentation is known as
a) adHoc Testing
b) Unit Testing
c) Regression testing
d) Functional testing.
25) Acceptance testing is known as
a) Beta Testing
b) Greybox testing
c) Test Automation
d) White box testing
26) Retesting the entire application after a change has been made called as?
d) Retesting
b) Verification
c) Quality Assurance
d) Quality Control
a) True
b) False
31) A metric used to measure the characteristic of documentation and code called as
a) Process metric
b) Product Metric
c) Test metrics
c) Performance Testing
d) Regression testing
33) The process that deals with the technical and management issues of software development called
as?
a) Delivery Process
b) Testing Process
c) Software Process
a) Regression Testing
b) Retesting
c) Ad hoc Testing
d) Sanity Testing
a) equivalence partitioning
b) code coverage
c) fault injection
36) Business Risk affects The Organization developing or Procuring the software.
a) True
b) False
a) True
b) False
38) Automation Testing should be done before starting Manual testing.
b) No
a) Yes
b) No
b) Priority
c) Fix ability
d) Traceability
41) Software Testing is a process of evaluating a system by manual or automatic means and verify that it
satisfies specified requirements or identity differences between expected and actual results.
a) True
b) False
42) Retesting modules connected to the program or component after a change has been made?
a) Full Regression Testing
b) Unit Regression
c) Regional Regression
d) Retesting.
43) An Important metric is the number of defects found in internal testing compared to the defects found
in customer tests, Status of test activities against the plan, Test coverage achieved so far, comes under
a) Process Metric
b) Product Metric
c) Test Metric
a) User's site
b) Developers' site
45) SPICE Means
b) STLC
c) SQLC
d) BLC
47) It provides a set of levels and an assessment model, and presents a set of recommended practices
that allow organizations to improve their testing processes.
48) Standards and procedures for managing changes in an evolving software product is called?
a) Confirmation Management
b) Confederation Mangement
c) Configuration Management
d) Compartability Management
a) True
b) False
50) This Testing Technique examines the basic program structure and it derives the test data from the
program logic; Ensuring that all statements and conditions executed at least once. It is called as
a) Block box Testing
a) Usability Testing
b) User Acceptance Testing
c) Alpha Testing
d) Beta Testing.
b) MISSING
c) EXTRA
a) Plan(P)------>Check(C)------>Act(A)----->Do(D)
b) Plan(P)------>Do(D)------>Check(C)----->Act(A)
c) Plan(P)------>Do(D)------>Act(A)----->Check(C)
54) Conducted to validate that the application, database, and network they may be running on can handle
projected volumes of users and data effectively. The test is conducted jointly by developers, testers,
DBA’s and network associates after the system Testing called as
a) Functional Testing
b) Stress/Load Testing
c) Recovery Testing
d) Integration Testing
55) Maintenance Plan predicts the maintenance requirements of the system, maintenance costs and
effort required
a) True
b) False
a) Developer
b) User
c) Tester
57) Validation plan describes the approach ,resources and schedule used for system validation
a) True
b) False
a) CMM Level 1
b) CMM Level 3
c) CMM Level 2
d) None
59) Types of quality tools are Problem Identification Tools and Problem Analysis Tools.
a) True
b) False
60) Which Software Development Life cycle model will require to start Testing Activities when starting
development activities itself
c) V-model
d) Linear model
61) A metric used to measure the characteristic of the methods, Techniques and tools employed in
developing, implementing and maintaining the software system called as
a) Process metric
b) Product Metric
c) Test metrics
62) Check Sheet(Checklist) is considered a simple , but powerful statistical tool because it differentiates
between two extremes.
a) True
b) False
63) Application should be stable. Clear Design and Flow of the application is needed for Automation
testing.
a) False
b) True
64) Quality plan describes the quality procedures and standards that will be used in a project.
a) False
b) True
a) Severity
b) Priority
c) Fix ability
d) Traceability
a) True
b) False
67) The name of the testing which is done to make sure the existing features are not affected by new
changes
a) Recursive testing
b) Whitebox testing
c) Unit testing
d) Regression testing
a) CMM Level 1
b) CMM Level 3
c) CMM Level 4
d) CMM Level 2
c) Exploratory Testing
d) Performance Testing
70) Cost of Production = Right The First time cost(RTF) + Cost of Quality.
a) True
b) False
71) ------------- means under what test environment(Hardware, software set up) the application will run
smoothly
a) Test Bed
b) Checkpoint
c) Code Walk through
d) Checklist
73) Optimization, Defect Prevention, and Quality Control. Its come under the
a) CMM Level 2
b) CMM Level 3
c) CMM Level 4
d) CMM Level5
a) Testers
b) End Users
c) Customer
d) Developers
a) User place
b) Developers place
a) Migration Plan
b) Master plan
c) Maintenance plan
d) Mitigation Plan
77) Splitting project into tasks and estimate time and resources required to complete each task called as
Project Scheduling
a) True
b) False
Chapter 2
Major Business Initiatives
True/False Questions
T F 1. The distribution chain is simply the path followed from the distributor of a product or service to the
end consumer.
Answer: False Level: Hard Page: 62
T F 2. An alliance partner is a company you do business with on a regular basis in a cooperative fashion,
usually facilitated by IT systems.
Answer: True Level: Easy Page: 78
T F 3. A supply chain management system automates inventory tracking but still requires that information
be transferred manually.
Answer: False Level: Easy Page: 62
T F 4. Logistics refers to the set of processes that plans for and controls the efficient and effective
transportation and storage of supplies from suppliers to customers.
Answer: True Level: Easy Page: 63
T F 5. A software provider provides software over the Internet for a company to use.
Answer: False Level: Easy Page: 66
T F 6. Customer relationship management systems are remarkably successful when compared to other
information systems. Over 90% of installations are considered successful.
Answer: False Level: Easy Page: 70
T F 7. Business intelligence helps you make effective, important, often strategic decisions about your
business.
Answer: True Level: Easy Page: 72
T F 8. A business intelligence system supports the illegal gathering of confidential information from your
competitors.
Answer: False Level: Easy Page: 72
T F 9. Most organizations rarely use teams.
Answer: False Level: Easy Page: 77
T F 10. Virtual team members are typically located in the same geographic areas.
Answer: False Level: Easy Page: 77
T F 11. Collaboration systems are designed to support the sharing and flow of information between
companies.
Answer: False Level: Easy Page: 78
T F 12. Presence awareness software is based on e-mail.
Answer: False Level: Medium Page: 80
T F 13. Transportation logic is the process that plans for and controls the efficient and effective
transportation and storage of supplies from suppliers to customers.
Answer: False Level: Easy Page: 63
T F 14. Revenue and profit are optimized by a well-designed supply chain management.
Answer: True Level: Easy Page: 64
T F 15. Supply chain management includes fulfillment.
Answer: True Level: Easy Page: 64
T F 16. Upper level executives do not need to understand the importance of supply chain management.
Answer: False Level: Easy Page: 65
T F 17. Business intelligence is knowledge about your customers, your competitors, your partners, your
competitive environment, and your own internal operations.
Answer: True Level: Easy Page: 72
T F 18. Business intelligence comes from information.
Answer: True Level: Easy Page: 72
T F 19. A data mart is a subset of a data warehouse in which only a focused portion of the data warehouse
information is kept.
Answer: True Level: Easy Page: 73
T F 20. Data warehouses support only OLTP.
Answer: False Level: Medium Page: 73
Haag/Cummings, Information Systems Essentials 31
T F 21. A data warehouse is a logical collection of information – gathered from many different
operational databases – used to create business intelligence that supports business analysis activities and
decision-making tasks.
Answer: True Level: Medium Page: 73
T F 22. Customer relationship management is just another software package.
Answer: False Level: Medium Page: 68
T F 23. Customer relationship management systems often fail because company goals are too broad.
Answer: True Level: Medium Page: 71
T F 24. Generic strategies often lead to customer relationship management successes.
Answer: False Level: Medium Page: 74
T F 25. Customer relationship management should be completely based upon software—there are no
other components to consider.
Answer: False Level: Medium Page: 68
T F 26. Back office and front office systems are both part of intraoffice communications and management
systems.
Answer: False Level: Hard Page: 71
Multiple Choice Questions
27. Which term describes a company you do business with on a regular basis in a cooperative fashion,
usually facilitated by IT systems?
A) Alliance partner
B) Information partnership
C) Distribution chain
D) B2B
Answer: A Level: Easy Page: 78
28. Which term describes an approach that produces or delivers a product or service just at the time the
customer wants it?
A) Just-in-time
B) Supply chain
C) Distribution chain
D) Value chain
Answer: A Level: Easy Page: 63
Test Bank, Chapter 2 32
29. Just-in-time is an approach that produces or delivers a product or service just at the time the:
A) Supplier wants it
B) Distributor wants it
C) Customer wants it
D) Seller wants it
Answer: C Level: Easy Page: 63
30. Collaborative planning, forecasting, and replenishment (CPFR) is a concept that encourages and
facilitates collaborative processes between:
A) Members of a value chain
B) Members of a supply chain
C) Members of a distribution chain
D) None of the above
Answer: B Level: Medium Page: 65
31. Which term describes a concept that encourages and facilitates collaborative processes between
members of a supply chain?
A) Collaborative planning, focusing, and reordering (CPFR)
B) Collaborative planning, forecasting, and replenishment (CPFR)
C) Collaborative planning, forecasting, and reordering (CPFR)
D) Collaborative planning, focusing, and replenishment (CPFR)
Answer: B Level: Medium Page: 65
32. Which system below is used to maximize the amount of revenue that an airline generates on each
flight?
A) Collaborative filtering system
B) Yield management system
C) Disintermediation system
D) CPFR system
Answer: B Level: Easy Page: 84
33. Which of the following tracks inventory and information among business processes and across
companies?
A) supply chain management
B) power supply
C) customer relationship management
D) integrated supply management
Answer: A Level: Easy Page: 62
34. What does an application service provider do?
A) provides software over the intranet
B) provides hardware over the internet
C) provides computer equipment
D) none of the above
Answer: A Level: Medium Page: 66
Haag/Cummings, Information Systems Essentials 33
35. Which of the following systems can be used to gain insights into the needs, wants, and behaviors of
customers?
A) sales force automation systems
B) customer relationship management systems
C) transaction processing systems
D) collaborative systems
Answer: B Level: Easy Page: 68
36. Which of the following systems can perform sales lead tracking, contact management, and market
analysis?
A) sales force automation systems
B) customer relationship management systems
C) transaction processing systems
D) collaborative systems
Answer: A Level: Medium Page: 68
37. Which of the following are reasons that customer relationship management systems may fail?
A) company's goals are too broad
B) strategies are too generic
C) implementations are often too software-centric
D) all of the above
Answer: D Level: Medium Page: 71
38. Which systems are typically used to support customers or sales?
A) back office systems
B) front office systems
C) side office systems
D) information sales systems
Answer: B Level: Easy Page: 71
39. Which systems are typically used to fulfill and support customer orders?
A) back office systems
B) front office systems
C) side office systems
D) information sales systems
Answer: A Level: Easy Page: 71
40. Business intelligence includes knowledge about all but which of the following?
A) customers
B) competitors
C) business partners
D) all of the above
Answer: D Level: Easy Page: 72
Test Bank, Chapter 2 34
41. What is the objective of a business intelligence system?
A) gathering confidential information from competitors
B) improving the timeliness and quality of decisions
C) improving the timeliness and quality of input for decision making
D) all of the above
Answer: C Level: Medium Page: 72
42. Business intelligence focused on external competition is:
A) smart
B) external business intelligence
C) competitive intelligence
D) illegal
Answer: C Level: Easy Page: 72
43. Which of the following is a logical collection of data gathered from many databases and used to create
business intelligence?
A) competitive intelligence system
B) artificial intelligence
C) external intelligence gathering 'bots
D) data warehouse
Answer: D Level: Easy Page: 73
44. A ____________ is a subset of a data warehouse.
A) database
B) data storeroom
C) data set
D) data mart
Answer: D Level: Medium Page: 73
45. Data warehouses are queried using?
A) data-mining tools
B) picks and shovels
C) database management systems
D) data marts
Answer: A Level: Medium Page: 74
46. What displays key information gathered from several sources on a screen in a format tailored to the
needs and wants of an individual?
A) display format
B) web page
C) digital display
D) digital dashboard
Answer: D Level: Medium Page: 76
Haag/Cummings, Information Systems Essentials 35
47. What is the environment in which virtual teams work?
A) virtual world
B) virtual reality
C) integrated virtual teamwork environment
D) integrated collaboration environment
Answer: D Level: Easy Page: 77
48. A virtual team is made up of people:
A) located in different geographic locations
B) whose work is supported by an artificial intelligence superstructure
C) an imaginary team used for specific tasks only
D) a short-term team or task force normally used to develop virtual reality environments
Answer: A Level: Medium Page: 77
49. Software designed to improve the performance of teams by supporting the sharing and flow of
information is called a:
A) social network system
B) group decision support system
C) team system
D) collaboration system
Answer: D Level: Easy Page: 78
50. All of the steps required for a business process put together are called;
A) business process
B) steps
C) document management system
D) workflow
Answer: D Level: Easy Page: 78
51. Which system automates and manages the steps in a business process?
A) business process management system
B) document management system
C) workflow system
D) automatic workflow system
Answer: C Level: Easy Page: 78
52. Which system manages a document through all stages of its life cycle?
A) business process management system
B) document management system
C) workflow system
D) automatic workflow system
Answer: B Level: Easy Page: 78
Test Bank, Chapter 2 36
53. Which of the following is an IT system that supports the capture, organization, and dissemination of
knowledge?
A) business process management system
B) knowledge management system
C) workflow system
D) automatic workflow system
Answer: B Level: Easy Page: 78
54. Which of the following is an IT system that links you to people you know, and from there, to people
your contacts know/
A) social network system
B) knowledge management system
C) workflow system
D) automatic workflow system
Answer: A Level: Medium Page: 78
55. Which of the following indicates whether someone is available?
A) e-mail
B) workflow system
C) automatic personnel system
D) presence awareness
Answer: D Level: Medium Page: 80
56. Which of the following permits users to communicate in real time and share files without a central
server?
A) presence awareness
B) peer-to-peer collaboration software
C) yield management system
D) automatic workflow system
Answer: B Level: Easy Page: 80
57. The process that plans for and controls the efficient and effective transportation and storage of
supplies from suppliers to customers is called:
A) transportation
B) logic
C) logistics
D) transportation logic
Answer: C Level: Easy Page: 63
58. Which of the following are optimized by a well-designed supply chain management?
A) production
B) logistics
C) revenue and profit
D) all of the above
Answer: D Level: Easy Page: 64
Haag/Cummings, Information Systems Essentials 37
59. Supply chain management includes all but which of the following?
A) fulfillment
B) revenue and profit
C) spend
D) all of the above
Answer: D Level: Easy Page: 64
60. Which of the following is not a challenge to supply chain management?
A) upper level executives must understand the importance
B) the need to work closely with customers and suppliers
C) innovative integration of internal and external IT systems
D) all of the above are challenges for supply chain management
Answer: D Level: Easy Page: 65
61. What is the goal of a customer relationship management system?
A) to gain customers
B) to eliminate negative interactions with customers
C) to eliminate the need for customers
D) none of the above
Answer: B Level: Easy Page: 68
62. Where does business intelligence come from?
A) Information technology
B) Information
C) Customer knowledge
D) Competitor knowledge
Answer: B Level: Medium Page: 72
63. What is business intelligence knowledge about?
A) Customers
B) Competitors
C) Partners
D) All of the above
Answer: D Level: Easy Page: 72
64. Which of the following tools is used to help an organization build and use business intelligence?
A) Data warehouse
B) Data-mining tools
C) Database management systems
D) All of the above
Answer: D Level: Medium Page: 73
Test Bank, Chapter 2 38
65. What is a subset of a data warehouse in which only a focused portion of the data warehouse
information is kept?
A) Data mining tool
B) Data mart
C) Data warehouse
D) None of the above
Answer: B Level: Easy Page: 73
66. Which of the following describes a data warehouse?
A) Collection of information
B) Information gathered from many different knowledge workers
C) Used to support transactional processing
D) All of the above
Answer: A Level: Medium Page: 73
67. Customer relationship management systems often include functions such as:
A) sales force automation
B) customer service and support
C) Marketing campaign management and analysis
D) all of the above
Answer: D Level: Easy Page: 68
68. Sales force automation systems perform the following tasks, except:
A) contact management
B) sales lead tracking
C) demand forecasting
D) order management
Answer: C Level: Hard Page: 69
69. Which of the following are parts of IT support for customer relationship management?
A) front office systems
B) back office systems
C) all of the above
D) none of the above
Answer: C Level: Hard Page: 71
70. Business intelligence helps knowledge workers understand:
A) capabilities of the firm
B) state of the art, trends, and future directions in the markets
C) applicable technological, demographic, economic, political, social, and regulatory environments
D) all of the above
Answer: D Level: Hard Page: 72
Haag/Cummings, Information Systems Essentials 39
71. What is the name of the organization for people that specialize in competitive intelligence?
A) Society for Competitive Intelligence Professionals
B) Competitive Intelligence Quarterly
C) Society of Business Intelligence
D) Competitive Intelligence Association
Answer: A Level: Hard Page: 72
72. Business intelligence systems provide managers with which of the following?
A) information and knowledge
B) at the right time
C) in the right place
D) all of the above
Answer: D Level: Easy Page: 74
73. According to this text, which of the following is not required for business intelligence systems to have
an impact on business?
A) focus on using information to deal with an important issue
B) provide the ability to customize BI information for each knowledge worker
C) build discipline and precision into the decision-making process
D) provide excellent data
Answer: D Level: Medium Page: 75
74. Which of the following displays data for individual knowledge workers?
A) computer monitor
B) collaboration system
C) digital dashboard
D) PDA
Answer: C Level: Medium Page: 76
75. Which type of team works in different locations?
A) collaboration teams
B) virtual teams
C) unrelated teams
D) distributed teams
Answer: B Level: Easy Page: 77
76. Which system would be used to locate a contact person from another company?
A) knowledge management system
B) collaboration system
C) workflow system
D) social network system
Answer: D Level: Easy Page: 78
Test Bank, Chapter 2 40
77. Which of the following is not a challenge to success with integrated collaboration environments?
A) People don't understand how important their knowledge is and so do not contribute it
B) People believe that knowledge is power, so they are reluctant to share their knowledge
C) People do not have time to submit knowledge
D) Many people are unable to quantify their knowledge.
Answer: D Level: Medium Page: 79
78. Which of the following integrated collaboration environment providers does not include presence
awareness?
A) IBM/Lotus
B) Netware
C) Microsoft
D) Novel
Answer: B Level: Hard Page: 80
Fill in the Blank Questions
79. ________ is an approach that produces or delivers a product or service just at the time the customer
wants it.
Answer: Just-in-time Level: Easy Page: 63
80. ___________ is a concept that encourages and facilitates collaborative processes between members of
a supply chain.
Answer: Collaborative planning, forecasting, and replenishment (CPFR) Level: Easy Page: 65
81. ____________ tracks inventory and information among business processes and across companies.
Answer: Supply chain management Level: Easy Page: 62
82. A supply chain management system automates the tracking of ____________ and information among
business processes and across companies.
Answer: Inventory Level: Easy Page: 62
83. Coordinating ____________ to insure that supplies reach the correct destination at lowest possible
cost is critical to supply chain management.
Answer: Logistics Level: Hard Page: 64
84. A(n) ____________ helps companies understand customer needs so that they can serve them better.
Answer: customer relationship management system Level: Medium Page: 68
Haag/Cummings, Information Systems Essentials 41
85. A(n) ____________ tracks all steps in the sales process.
Answer: Sales force automation system Level: Easy Page: 68
86. A(n) ____________ is used to fulfill and support customer orders.
Answer: Back office system Level: Easy Page: 71
87. A(n) ____________ serves as the primary interface for customers and the sales process.
Answer: Front office system Level: Easy Page: 71
88. ____________ is knowledge about your customers, competitors, business partners, competitive
environment, and your own internal operations.
Answer: Business intelligence Level: Easy Page: 72
89. Competitive intelligence is business intelligence focused on ____________ competition.
Answer: External Level: Easy Page: 72
90. A(n) ____________ is a logical collection of information used to create business intelligence.
Answer: Data warehouse Level: Medium Page: 73
91. A(n) ____________ is a subset of a data ____________.
Answer: Data mart, Warehouse Level: Medium Page: 73
92. A(n) ____________ is used to query information from a data warehouse.
Answer: Data-mining tool Level: Medium Page: 74
93. A(n) ____________ displays data extracted from a business intelligence system on a computer screen
in a format customized to an individual knowledge worker.
Answer: Digital dashboard Level: Hard Page: 76
94. A company must complete all steps in the ____________ to complete a business process.
Answer: Workflow Level: Easy Page: 78
95. A(n) ____________ facilitates the automation and management of business processes.
Answer: Workflow system Level: Medium Page: 78
96. Many companies, such as banks, maintain copies of your documents for many years. A(n)
____________ system could be used to track these.
Answer: Document management Level: Medium Page: 79
Test Bank, Chapter 2 42
97. A(n) ____________ supports the capture, organization, and dissemination of knowledge.
Answer: Knowledge management system Level: Easy Page: 78
98. A(n) ____________ links you to people you know, and from there, to people your contacts know.
Answer: Social network system Level: Hard Page: 78
99. ____________ permits users to communicate in real time and share files without a central server.
Answer: Peer-to-peer collaboration software Level: Easy Page: 80
100. A(n) ____________ is a special kind of DSS to help maximize the amount of revenue an airline
generates on each flight.
Answer: Yield management system Level: Medium Page: 84
101. ____________ refers to ensuring the right quantity of parts for production or products for sale arrive
at the right time.
Answer: Fulfillment Level: Easy Page: 64
102. ____________ refers to keeping the costs of transportation as low as possible consistent with safe
and reliable delivery.
Answer: Logistics Level: Easy Page: 64
103. ____________ refers to ensuring that production lines function smoothly because high quality parts
are available as needed.
Answer: Production Level: Easy Page: 64
104. ____________ refers to ensuring that no sales are lost because sales are empty.
Answer: Revenue and profit Level: Easy Page: 64
105. ____________ refers to keeping the cost of purchased parts and products at acceptable levels.
Answer: Spend Level: Easy Page: 64
106. ____________ is a total business objective which encompasses many different aspects of a business
including software, hardware, services, support, and strategic business goals.
Answer: Customer relationship management Level: Medium Page: 68
Haag/Cummings, Information Systems Essentials 43
In which approach of data warehousing, the transaction data is partitioned into facts
1. Normalized approach
2. Operational approach
3. Dimensional approach
4. None of these
One of the techniques of implementing the OLAP engine is a ‘Specialized SQL server’. This
server
exhibits the following properties:
1. It assumes that the data warehouse is in a multidimensional model and is implemented in a
relational DBMS
2. It facilitates OLAP operations in SQL, when the data warehouse organized as relational
tables
3. It facilitates OLAP operations in SQL
4. It facilitates SQL queries for the data warehouse that is physically organized as a
multidimensional
model
B-Tree is used as an index to provide access to records
1. Without scanning the entire table
2. By scanning the entire table
3. By scanning the entire meta data
4. None of these
An operational system is which of the following?
1. A system that is used to run the business in real time and is based on current data
2. A system that is used to support decision making and is based on current data.
3. A system that is used to support decision making and is based on historical data.
4. A system that is used to run the business in real time and is based on historical data.
In a traditional MIS system, there is an almost _______ sequence of queries.
1. exponential
2. quadratic
3. none of these
4. linear
Data warehouse bus matrix is a combination of
1. Dimensions and facts
2. Facts and data marts
3. Dimensions and data marts
4. Dimensions and detailed facts
Naturally Evolving architecture occurred when an organization had a _______ approach to
handling
the whole process of hardware and software architecture.
1. None of these
2. Good
3. Relaxed
4. Not Relaxed
The most common source of change data in refreshing a data warehouse is:
1. Queryable change data
2. Logged change dat
3. Cooperative change data
4. Snapshot change data
The performance in a MOLAP cube comes from the __________ look-up time for the array data
structure.
1. O(3)
2. O(0)
3. O(1)
4. O(2)
The active data warehouse architecture includes which of the following?
1. Data that can extracted from numerous internal and external sources
2. Near real-time updates
3. All of these
4. At least one data mart
A snowflake schema is which of the following types of tables?
1. Dimension
2. All of these
3. Fact
4. Helper
A data warehouse is said to contain a ‘subject-oriented’ collection of data because
1. It is a generalization of ‘object-oriented’ approach
2. It is built for a specific application
3. It cannot support multiple objects
4. Its contents have a common theme
Which of the following is not the managing issue in the modeling process?
1. Ensure that the transaction edit flat is used for analysis
2. Document each candidate data source
3. Walk through business scenarios
4. Do regions report to zones
The ‘Pivot’ is an OLAP operation which:
1. Is a visualization operation, rotating the axes for alternative presentation
2. Integrates several dimensions
3. Is not a visualization operation
4. Two consecutive slice operations in two different dimensions
Data transformation includes which of the following?
1. A process to change data from a detailed level to a summary level
2. A process to change data from a summary level to a detailed level
3. Joining data from one source into various sources of data
4. Separating data from one source into various sources of data
Taken jointly, the extract programs or naturally evolving systems formed a spider web, also
known as
1. Online Systems Architecture
2. Distributed Systems Architecture
3. Legacy Systems Architecture
4. Intranet Systems Architecture
What is true of the multidimensional model?
1. It typically requires less disk storage
2. Increasing the size of a dimension is difficult
3. Typical business queries requiring aggregate functions take more time
4. It typically requires more disk storage
The following technology is not well-suited for data mining:
1. Expert system technology
2. Data visualization
3. Technology limited to specific data types such as numeric data types
4. Parallel architecture
Which of the following statement is true?
1. The operational data are used as a source for the data warehouse
2. The data warehouse consists of data marts and operational data
3. All of these
4. The data warehouse is used as a source for the operational data
Fact tables are
1. Partially demoralized
2. Completely normalized
3. Partially normalized
4. Completely demoralized
_______ is an application of information and data.
1. Education
2. Power
3. Intelligence
4. Knowledge
Why aggregate is used in dimensional model of data warehouse?
1. To store data in one operational system
2. To take the dimension and change its granularity
3. All of these
4. To retrieve data from an operational system
The extract process is which of the following?
1. Capturing all of the data contained in various operational systems
2. Capturing a subset of the data contained in various decision support systems
3. Capturing all of the data contained in various decision support systems
4. Capturing a subset of the data contained in various operational systems
The growth of master files and magnetic tapes exploded around the mid- _______.
1. 1980s
2. 1970s
3. 1950s
4. 1960s
The content of a data warehouse is said to be ‘non-volatile’, because
1. Its life-span is very long
2. It is a read-only data
3. It disappears when the system is switched off
4. It remains the same even after the system crashes
A goal of data mining includes which of the following?
1. To create a new data warehouse
2. To confirm that data exists
3. To analyze data for expected relationships
4. To explain some observed event or condition
Which of the following is the most important when deciding on the data structure of a data mart?
1. XML data exchange standards
2. Data access tools to be used
3. Extract, Transform, and Load (ETL) tool to be used
4. Metadata naming conventions
A star schema has what type of relationship between a dimension and fact table?
1. Many-to-many
2. One-to-many
3. One-to-one
4. All of these
A data warehouse is an ‘integrated’ collection of data because
1. It is a relational database
2. It is a collection of data of derived from multiple sources
3. It contains summarized data
4. It is a collection of data of different types
The users of data warehouse are knowledge workers in other words they are _________ in the
organization.
1. Database Administrator
2. Decision maker
3. DWH Analyst
4. Manager
We want to add the following capabilities to Table2: show the data for 3 age groups (20-39, 40-
60, over 60), 3
revenue groups (less than $10,000, $10,000-$30,000, over $30,000) and add a new type of
account: Money
market. The total number of measures will be:
1. 4
2. Between 10 and 30 (boundaries included)
3. Between 40 and 60 (boundaries included)
4. More than 100
A data warehouse is said to contain a ‘time-varying’ collection of data because
1. It contains historical data
2. Its contents vary automatically with time
3. Its life-span is very limited
4. Its content has explicit time-stamp
Analytical processing uses ____________ , instead of record level access.
1. Single-level hierarchy
2. None of the Given
3. Single-level aggregates
4. multi-level aggregates
Multi-dimensional databases (MDDs) typically use ___________ formats to store pre-
summarized cube
structures.
1. SQL
2. Non- proprietary file
3. Object oriented
4. proprietary file
Among the following, which is NOT the objective of clustering?
1. To initiate hypothesis about the data
2. It facilitates OLAP operations
3. To cover natural groupings
4. To find consistent and valid organizations of the data
Which of the following statements is not true about refreshing a data warehouse:
1. Updates to dimension tables may occur at different times than the fact table
2. None of these
3. It is a process of managing timing differences between the updating of data sources and the
related data
warehouse objects
4. The data warehouse administrator has more control over the load time lag than the valid time
lag
Data warehousing and on-line analytical processing (OLAP) are _______ elements of decision
support system.
1. None of the given
2. Unusual
3. Essential
4. Optional
What is ‘ROLAP’?
1. ROLAP is an OLAP engine for (i) Multidimensional models and (ii) SQL queries, but does
not support
‘slice’ and ‘dice’ operations
2. ROLAP is an OLAP engine for (i) relational model and (ii) SQL based OLAP operations
3. ROLAP is a set of relational operations equivalent to OLAP operations
4. ROLAP is an OLAP engine for (i) multidimensional models and (ii) SQL based OLAP
operations
Which of the following is the collection of data objects that are similar to one another within the
same group?
1. Data source
2. Cluster
3. Grid
4. Table
Which of the following is not related to dimension table attributes?
1. Verbose
2. Descriptive
3. Complete
4. Equally unavailable
In a 3-tier architecture of the data warehouse, the OLAP engine is related to:
1. The Second layer of the architecture
2. The fourth layer of the architecture
3. The first layer of the architecture
4. The third layer of the architecture
Which of the following employees data mining techniques to analyze the intent of a user query,
provided
additional generalized or associated information relevant to the query?
1. Iceberg query method
2. Data analyzer
3. Query parser
4. Intelligent query answering
Choose the correct answer:
1. Data mining and data warehousing are the same
2. Data warehousing is the application of data mining.
3. Data mining is the application of data warehousing
4. Data mining and data warehousing are totally unrelated
The process of removing the deficiencies and loopholes in the data is called as
1. Extracting of data
2. Loading of data
3. Compression of data
4. Cleaning up of data
In order to populate the data warehouse, which of the following set of operations are
appropriate?
1. Query and update
2. Refresh and load
3. Insert and delete
4. Create and edit.
The following is true of three-tier data warehouses:
1. Once created, the data marts will keep on being updated from the data warehouse at
periodic
times
2. The data marts are different groups of tables in the data warehouse
3. A data mart becomes a data warehouse when it reaches a critical size
4. Once created, the data marts will directly receive their new data from the operational
databases
The divide&conquer cube partitioning approach helps alleviate the __________ limitations of
MOLAP
implementation.
1. Maintainability
2. Scalability
3. Security
4. Flexibility
What is a data mart?
1. It is the access layer of the data warehouse environment that is used to get data out to the
users
2. It is the process of extracting data
3. It is the collection of data in data warehouse
4. It is the process of extracting patterns from large data sets
Attempt to find a function which models the data with the least error is known as
1. None of these
2. Association rule
3. Clustering
4. Regression
The value at the intersection of the row labeled "India" and the column "Savings" in Table2
should be:
1. 800,000
2. 200,000
3. 500,000
4. 300,000
A ‘Drill-down’ operation is concerned with:
1. Which splits cells of any one dimension based on the characteristics of the dimension?
2. Which merges cells of any one dimension based on the characteristics of the dimension
3. Which splits cells of two dimensions
4. Which merges cells of two dimensions
A ‘Data mart’:
1. Is a stand-alone of a data warehouse, by itself, of a department of the enterprise
2. Is a place where data are dumped without any restrictions .
3. Is the analysis unit of the overall architecture of a warehouse
4. Is an essential component in the sense that every data warehouse necessarily has several
data
marts
The load and index is which of the following?
1. A process to load the data in the data warehouse and to create the necessary indexes
2. A process to reject data from the data warehouse and to create the necessary indexes
3. A process to upgrade the quality of data before it is moved into a data warehouse
4. A process to upgrade the quality of data after it is moved into a data warehouse
A ‘virtual house’ is essentially:
1. It is the operational database but provides warehouse facilities through a middleware
2. It is the conceptual view of the relational and transactional database
3. A traditional relational database providing a multidimensional view through a
middleware and it
is different from the enterprise’s operational database
4. It is the materialized view of the operational and transactional database
Choose the most correct answer::
1. Fact Constellation schema contains denormalized Dimension table
2. Snowflake schema contains normalized Dimension table
3. Star schema contains normalized Dimension table
4. Snowflake schema contains denormalized Dimension table.
What is data scrubbing?
1. A process to reject data from the data warehouse and to create the necessary indexes
2. A process to load the data in the data warehouse and to create the necessary indexes
3. A process to upgrade the quality of data after it is moved into a data warehouse
4. A process to upgrade the quality of data before it is moved into a data warehouse
Choose the most correct answer:
1. Snowflake schema contains two Fact tables
2. Fact Constellation schema contains two Fact tables
3. Star and snowflake schema contains two Fact tables.
4. Star schema contains two Fact tables
A data warehouse is built as a separate repository of data, different from the operational data of
an enterprise
because
1. It contains data derived from multiple sources
2. A data warehouse cannot afford to allow corrupted data within it
3. It is necessary to keep the operational data free of any warehouse operations
4. A data warehouse contains summarized data whereas the operational database contains
transactional data
________ gives total view of an organization.
1. Database
2. OLAP
3. Data Warehouse
4. OLTP
Data Warehouse provides the best support for analysis while OLAP carries out the _________
task.
1. Analysis
2. Whole
3. Mandatory
4. Prediction
Relational databases allow you to navigate the data in ____________ that is appropriate using
the primary,
foreign key structure within the data model.
1. None of these
2. Any Direction
3. Only One Direction
4. Two Direction
In _________ system, the contents change with time.
1. ATM
2. DSS
3. OLTP
4. OLAP
Q.1) Which of the following statements best describes the Micro Strategy Metadata?
A. It stores all of the information that you want to analyze from your various business systems.
B. It contains the definition of reports as well as all of the objects that are included in
reports.
C. It records data about your business
B
Q.2) Which of the following objects provides descriptive information from the data warehouse that can
be
displayed on a report?
A. Fact
B. Attribute
C. Hierarchy
B
Q.3) Which of the following objects enables users to select the information to be included in a report or
document at run time?
A. Metric
B. Attribute
C. Prompt
D. Fact
c
Q.4) All reports in MicroStrategy are made up of a filter and the following object:
A. Hierarchies
B. Fact
C. Template
c
Q.5) This folder contains reports, documents, and other objects that are accessible to you and other
users.
A. My Subscriptions
B. History List
C. Shared Reports
D. My Reports
c
Q.6) Which of the following statements about prompts is true?
A. Documents cannot be prompted
B. A prompt may have a default answer already selected when you first view it.
C. All prompts are displayed the same way.
B
Q.7) This type of report or document already has all of the content defined at run time.
A. Static
B. Predefined
C. Prompted
A
Q.8) Which type of prompt display option enables users to enter a single value? (For example, number,
text, or
date).
A. Pull Down
B. Text Box
C. Option Button
D. Check Box
B
Q.9) Which of the following views can you use to display reports?
A. Grid
B. Graph
C. Grid and Graph
D. All of the above
D
Q.10) After you run a report, what report manipulation enables you to view data at levels other than the
original
level of the report?
A. Drilling
B. Advanced Sorting
C. Data Pivoting
D. Outline Mode
A
Q.11) This functionality enables a report to be divided into separate pages for viewing purposes based
on an
object, such as an attribute or metric.
A. Outline Mode
B. Banding
C. Drilling
D. Page-by
D
Q.12) While viewing a document, which of the following statements about the grouping feature is true?
A. Grouping in documents is similar to the page-by axis in reports
B. You can change the order of the data elements in the Grouping field.
C. You can add additional data elements to the Grouping field.
A
Q.13) Which of the following statements about sorting report data is false?
A. Quick sort enables you to sort by one row or column at a time
B. You can perform an advanced sort using the sort buttons
C. Advanced sort enables you to sort sequentially by up to three rows or columns at a time.
B
Q.14) Which of the following is not a method for performing drilling on a report?
A. Clicking on a hyperlinked attribute element name
B. Right-clicking and using the Drill menu
C. Dragging an attribute to the Drill panel
D. Using the Drill panel
C
Q.15) In MicroStrategy Web, a document can be displayed in which of the following view modes?
A. Dynamic
B. Interactive
C. Static
D. Simplified
B
Q.16) You have a report that shows weekly regional performance based on sales. For any region that
generated
less than $50,000 in sales, the report displays its sales value in bold type and red font color. This type of
display is called:
A. Autostyle
B. Banding
C. Thresholds
D. Number formatting
C
Q.17) Which of the following statements about the Quick Switch feature in documents is true?
A. You use Quick Switch to switch from one document to another in the View Mode
B. You use Quick Switch for changing the display of a grid to a graph and vice versa in a
document
C. You use Quick Switch for converting a graph into a Flash widget
D. All of the above
B
Q.18) In a document, you can use a selector to perform which of the following manipulations?
A. Flip through panels in a panel stack
B. Select attribute elements to display in a grid or a graph
C. Select metrics to display in a grid or a graph
D. All of the above
D
Q.19) After running a prompted report, you are interested in selecting different prompt answers; what
feature will
enable you to carry out this task?
A. Clicking the Undo button
B. Clicking the Re-prompt button
C. Clicking the Rerun button
B
Q.20) Which of the following statements about subscriptions in Micro Strategy Web is true?
A. Subscriptions are useful for reports or documents that you routinely execute at
specific times or for
ones that take longer to process
B. When you subscribe to a report or document, you are requesting that the administrator execute the
report or document based on a schedule that you select
C. You can create your own schedules and then use them to subscribe to reports and documents
A
Q.21) Which folder allows you to access reports or documents that ran automatically using schedules?
A. My Subscriptions
B. History List
C. My Reports
D. Shared Reports
B
Q.22) To which of the following applications can you export report results?
A. PDF
B. Microsoft Word
C. Microsoft Access
D. All of the above
A
Q.23) Which of the following features would you use to make all of your reports display results with the
same
formatting?
A. Banding
B. Autostyle
C. Sorting
B
Q.24) Which of the following statements about using Outline Mode to display reports is true?
A. It requires Micro Strategy OLAP Services
B. It enables an indented, hierarchical display of report results
C. To use Outline mode, a report must be sorted first
B
Q.25)
Which of the following statements about thresholds is true?
A. Thresholds are visual indicators that certain conditions exist in data
B. In Micro Strategy Web, you first define the conditions and then format metric values to display in
specific ways when those conditions are met
C. You do not have the option to toggle thresholds on and off
A
Q.26) If you run a report that originally shows sales data at the country level, what report manipulation
can you
perform to view sales data at the state level?
A. Data Pivoting
B. Drilling
C. Banding
D. Outline Mode
B
Q.27) Which of the following statements about viewing documents in Interactive Mode is true?
A. By using a selector, you can determine what data is displayed in grid or graph reports
in the document
or which panel of a panel stack is displayed
B. By using the Quick Switch button, you can quickly switch from one document to another
C. You cannot view the document in Full Screen Mode
A
Q.28) Which of the following statements about view filters is true?
A. View filters limit the actual data that is brought back from the data warehouse
B. View filters can be saved and reused on other reports
C. You can only create view filters based on attributes and metrics in the Report Objects
window
(Answer)
C
Q.29) Which of the following statements about reports in Micro Strategy Web is true?
A. A report consists of a template, which defines the format and layout, and a filter,
which determines
the data that is included in the result
B. A report cannot have an empty filter
C. You cannot create multiple views of the report
A
Q.30) With Micro Strategy OLAP Services, which of the following scenarios requires new SQL to be
generated for a
report?
A. You add a metric from the Report Objects window to the template
B. You remove an attribute from the Report Objects window
C. You create a view filter on an attribute in the Report Objects window
D. You create a metric using two metrics that are in the Report Objects window
B
Q.31) Which of the following statements about derived metrics is false?
A. They are built using existing metrics already in the Report Objects window
B. You can save them and re-use them on other reports
C. Derived metric funtionality is available only if you have MicroStrategy OLAP Services
B
Q.32) This special type of derived metric allows you to create percent to total and rank calculations
based on
existing metrics in the report.
A. Nested metric
B. Shortcut metric
C. Complex metric
D. Simple metric
B
Q.33) Which of the following statements about data pivoting is true?
A. Metrics can be moved only to the rows or columns, not the page-by field
B. Pivoting enables you to quickly and easily rearrange data so that you can view it from
multiple
perspectives
C. Data pivoting requires MicroStrategy OLAP Services
B
Q.34) What report manipulation involves moving individual attributes or metrics from rows to columns
or columns
to rows or the page-by field?
A. Sorting
B. Data pivoting
C. Swap rows and columns
D. Exporting
B
Q.35) Which of the following statements about advanced drilling on reports in MicroStrategy Web is
true?
A. Advanced drills enable you to drill to any attribute in any hierarchy
B. Advanced drills can only be performed using the Drill menu
C. Advanced drills can only be performed using the Drill panel
A
Q.36) This feature enables you to easily select the data you want to keep for further analysis and then
removes the
rest of the data from the report display.
A. Data pivoting
B. Filter on Selections
C. Swap rows and columns
D. Advanced drilling
B
Q.37) Which of the following statements about view filters is true?
A. A view filter is used to display only a subset of the full result set
B. You can create view filters based on any project object, not just report objects
C. View filters can contain only one condition
A
Q.38) Which of the following statements about adding totals to a report is true?
A. You can define subtotals, which calculate totals at various attribute levels in a report
B. You can create your own custom subtotals and use them on a report
C. You can either show the grand total or subtotals but not both on a report
A
Q.39) Which of the following statements about saving prompted reports is false?
A. You can save the report as static or prompted
B. You can choose to keep either the filter or the template as prompted, or both
C. You cannot keep your current answers as the default answers
B
Q.40) Which of the following statements about adding reports and documents to the History List is
false?
A. You can subscribe to reports and documents and then use the History List to retrieve the results
B. You cannot add them from the wait page as they are executing
C. You can add them when you are viewing the result
B
Q.41) You have a report with a large result set. As you scroll down the report, the row and column
headers are no
longer visible. What feature can you use to ensure that the row and column headers are always visible
as
you scroll through the report?
A. Resize row and column headers
B. Enable banding
C. Lock row and column headers
C
Q.42) Which of the following statements about MicroStrategy OLAP Services is true?
A. It enables you to create metrics inside a report that you can use in other reports
B. It enables you to include attributes and metrics in the Report Objects window without
displaying
them on the template
C. It enables you to drill to any object in your project without generating new SQL
B
Q.43) Which of the following statements about predesigned reports in Micro Strategy Web is false?
A. They enable you to create your own reports using prompts
B. They cannot have a report filter
C. The Report Wizard provides a quick and easy way of creating your own report by selecting from
predefined templates and filters
D. The Report Builder provides a more detailed means for creating your own report. It enables you to
select the individual attributes and metrics for the template and to choose the objects and operators
that you want to use for the filter qualification
B
Q.44) Which Document Display Mode allows you to view the document results only and provides the
best
performance.
A. Flash mode
B. Express mode
C. Interactive mode
B
Q.45) Which feature of Micro Strategy is this statement referring to: This feature is the repository for
storing all of
the information that you want to analyze from disparate source systems.
A. Source Systems
B. Metadata Database
C. Data Warehouse
D. ETL Process
C
Q.46) Which one of these objects is NOT a schema object?
A. Metric
B. Attribute
C. Fact
D. Hierarchy
A
Q.47) Which of the following statements is true with regard to report creation for a Web
Reporter/Analyst?
A. This user can create reports from a Predesigned Report and a Prompted Predesigned
Report
B. This user can create reports from a Predesigned Report, Prompted Predesigned Report and from
scratch
C. Can create a Document
A
Q.48) If you want to customize your print settings, which of the following components would you use?
A. Preferences
B. My Reports
C. My Subscriptions
A
Q.49) You can only create Derived Elements on a report that is based on a published Intelligent Cube.
A. True
B. False
A
Q.50) Which formats can you export reports to?
A. Excel (with or without formatting)
B. CSV (file format recognized by Excel)
C. HTML
D. Plain text
E. All of the above
E
Sno Question Text Choice1 Choice2 Choice3 Choice4 Choice5
1 In requirements TRUE FALSE
validation the
requirements model is
reviewed to ensure its
technical feasibility.
State True/False
2 Software engineering Reliable Cost Effective Reliable and None Of Above
aims at developing Software Software cost effective
Software
3 Software Engineering Better Error free s/w Reusable Quality
approach is used to performance of software software
achieve h/w product
4 The best way to send them to use a checklist have the examine the
conduct a the design of questions to customer look system model
requirements team and examine each over the for errors
validation review is to see if they have requirement requirements
any concerns
5 Project risk factor is Water fall Spiral Prototype All of the above
considered in
6 Management of People Product Process All of the above
software
development is
dependent upon
7 Milestones are used Know the cost Know the Know the user None of the
to of the project status of the expectations above
project
8 The review is one of Inspection Walkthrough Testing All of the above
the methods of V&V.
The other methods
are
9 Which of the Inherent in Neither Something to Probability of
following is not Risk every project intrinsically fear but not loss
characteristic good not bad something to
manage
10 The Prototype is a Working Mini model of Mini model of None of the
model of existing system processed above
existing system system
11 Which is not the Plan how and Prepare the Prepare Plan resources
responsibility of by whom each acceptance resource plan for providing
customer/ user of the acceptance plan information on
software activity will be which to base
performed acceptance
decisions
12 Software Engineering IEEE Bauer Boehm Charles Babbage
is the systematic
approach to the
development,
operation,
maintenance and
retirement of
software. This
definition is given
by_________
13 Software engineering TRUE FALSE
umbrella activities are
only applied during
the initial phases of
software
development projects.
State True or False
14 Which of the items Process Manufacturing Methods Tools
listed below is not one
of the software
engineering layers
15 A stakeholder is TRUE FALSE
anyone who will
purchase the
completed software
system under
development. State
True/False
16 Major component of The probability The potential The potential A and C.
Risk Analysis are that the loss is very loss or impact
negative event high associated
will occur with the event
17 Change cannot be TRUE FALSE
easily accommodated
in most software
systems, unless the
system was designed
with change in mind.
State True/False
18 Which phase is not Coding Design Specifications Installation &
available in s/w life Maintenance
cycle
19 The work products size of the size of the software stakeholders
produced during product being budget process being needs
requirement built used
elicitation will vary
20 The term module in Functions Procedures Sub programs All of the above
the design phase
refers to
21 Which of the The modern Mainly used at The primary All the above
following is the version of systems output of the
correct definition for flowchart specification system design
DFD stages phase
22 In system design, we Hardware Software Parallel No hardware
do following design after design after hardware and design needed
software hardware software
design
23 In object oriented attributes and operations and attributes, None of above
design of software , names only names only name and
objects have operations
24 Informational data structured Modularity Concurrency
cohesion is a abstraction programming
realization of
25 Software is a product TRUE FALSE
and can be
manufactured using
the same technologies
used for other
engineering artifacts.
State True or False
26 Object-oriented TRUE FALSE
analysis techniques
can be used to
identify and refine
user task
objects and actions
without any need to
refer to the user
voice. State
True/False
27 Which of these size maintainability simplicity modularity b,c and d
criteria are useful in
assessing the
effectiveness of a
particular
design notation
28 Which of these is a decision table process flowchart ER diagram
graphical notation for diagram
depicting procedural
detail
29 Which of the Objects inherit Classes are an object can classes are
following comments the properties defined based belong to two always different
about object oriented of class on the classes
design of software, is attributes of
not true objects
30 The entity relationship depicts indicates depicts indicates how
diagram relationships system functions that data are
between data reactions to transform the transformed by
objects external events data flow the system
31 The data flow diagram TRUE FALSE
must be augmented
by descriptive text in
order to
describe the
functional
requirements for a
software product.
State True/False
32 Which is not a Water fall Spiral Prototype Capability
software life cycle Maturity
model Model
33 If requirements are Water fall Spiral Prototype None
understandable, easy,
defined, which model
is best suited
34 If requirements are Water fall Spiral Prototype RAD
frequently changing,
which model is best
suited
35 A data model consists Data Object The attributes Relationship All of the above
of the following that describe that connect
information data object data object to
one another
36 The incremental A good A reasonable The best A revolutionary
model of software approach approach approach to model that is
development is when a when use for not used for
working core requirements projects with commercial
product is are well large products
required defined development
quickly teams.
37 The prototyping The best A risky model A useful A reasonable
model of software approach to that rarely approach approach when
development is use for projects produces a when a requirements
with large meaningful customer are well defined
development product cannot define
teams requirements
clearly
38 Which of following is Dataflow Class diagram Activity State diagram
not a UML diagram diagram diagram
used creating a
system analysis
model
39 Control flow diagrams needed to required for all used in place useful for both a and d
are model event systems. of data flow modeling real-
driven systems. diagrams. time systems.
40 The object Data flow Flow chart Entity All of the above
relationship pair of diagram relationship
data model is diagram
represented
graphically by using
41 Using software To decrease To meet To decrease To increase all of them
process improvement development schedule the defect rate profitability
model will help a time
company
42 Data structure data design architectural procedural interface design
suitable for the design design
application is
discussed in ?
43 Process models are eliminate the make do not waste emphasize
described as agile need for extensive use development maneuverability
because they cumbersome of prototype time on and adaptability
documentation creation planning
activities
44 Software processes TRUE FALSE
can be constructed
out of pre-existing
software patterns to
best meet the needs
of a software project.
State True or False
45 The following s/w Incremental Component Concurrent All of the above
process model can be model assembly development
represented model
schematically as a
series of major
technical activities
and there associated
sate
46 Which one is the most Quality Risk Performance Efficiency
important feature of management Management Management management
spiral model
47 To produce a good Complex Efficient Rigorous None
quality product,
process should be
48 If Quality Control and Both are QA is a higher QC is a higher QA is done by
Quality Assurance are literally the activity in the activity in the the client and
compared same management management QC is done by
Hierarchy Hierarchy the software
vendor
49 Who is essentially Customer QA Manager Development
responsible for the Manager
quality of a product
50 What is used to Process metrics Product Software None of the
measure the metrics Quality metrics above
characteristics of the
documentation and
code
51 What are the qualities Reusability Portability Inter All The Above
of a good s/w Operability
52 A key concept of are delivered have are thoroughly have complete
quality control is that on time and measurable tested before documentation
all work products under budget specifications delivery to the
for process customer
outputs
53 Software safety is a affect the may result prevent may cause an
quality assurance reliability of a from user profitable entire system to
activity that focuses software input errors marketing of fail
on hazards that component the final
product
54 What exactly Baseline A single A quantitative A test or None of the
means software measure of the analysis above
product that current level conducted
may or may of after an
not fully performance application is
support a moved into
business production
function
55 What is configuration overall management the in object-
management in management of the identification oriented
software engineering of the design of configurable of the programming,
the system components in configuration the
a system of a system at management of
discreet points objects that
in time to control the
control configuration of
changes to the some other
configuration function(s) in
the system
56 Which of the change control version control reporting statistical
following tasks is not quality control
part of software
configuration
management?
57 Which of these are documentation software tools test data executable all of the above
valid software programs
configuration items?
58 The primary purpose evaluate the make sure that allow revision none of the
of configuration status performance of change of project above
reporting is to software information is schedules and
developers and communicated cost estimates
organizations to all affected by project
parties managers
59 variant entity item version
A new __________ is
defined when major
changes have been
made to one or more
configuration objects.
60 In software quality TRUE FALSE
assurance work there
is no difference
between software
verification and
software validation.
State True/False
61 People who perform TRUE FALSE
software quality
assurance must look
at the software from
the customer's
perspective.
62 Variation control in process product resources all of the
the context of applied quality expended above
software engineering attributes
involves controlling
variation in the
63 The goal of quality TRUE FALSE
assurance is to
provide management
with the data needed
to determine which
software engineers
are producing the
most defects.
64 TRUE FALSE
The purpose of
software reviews is to
uncover errors in
work products so they
can be removed
before moving on to
the next phase of
development.
65 The ability to track TRUE FALSE
relationships and
changes to
configuration objects
is one of the most
important features of
the SCM repository.
66 A basic configuration program data unit of a software all of the above
object is a structure information component
__________ created
by a software
engineer during some
phase of the software
development process.
67 When software quality development senior testing
configuration assurance team managers specialists
management is a group
formal activity, the
software
configuration audit is
conducted by the
68 State whether True or TRUE FALSE
False.
A use case can result
into more than one
scenario.
Testers should be
involved in reviewing
documents as soon as
drafts are available in
the development
cycle.
76 A procedure used to Requirement Test Planning Test Design Test Execution Test Design
derive and or select Analysis and Execution
test cases is called?
77 Testing during the Examining the Reading drafts Integration 1 and 3 None of the
design stage involves? design of the planning Testing above
documents documents
85 A defect is found after Open, Fixed, Reopen, Fixed, Defferred, Reopen, Fixed
retest. What are all Reopen, Closed Closed Open, Fixed,
the possible stages Reopen,
this defect may Closed
undergo?
86 What are the action Update status Log defect Retest Execute next
items if an application of the defect test step of
does not behave as same test case
expected?
87 Which is not a major Develop and Logging the Verifying that Checking test 3 and 4
task of test prioritizing test outcome of the test logs against the
implementation and cases, creating test execution environment exit criteria
execution? test data, and recording has been set specified in test
writing test the identities up correctly planning
procedures and and versions of
optionally, the software
preparing test under test, test
harness and tools and
writing testware
automated test
scripts
88 What are the Rejected Open Deferred Fixed Closed
subsequent states
that a new defect can
undergo?
1. Conducted by one
or more peers in the
team
2. Conducted by one
or more reviewers or
SME
3. Conducted by the
author himself
94 Review of Test case Checklist Self review Peer review Author Reviewer
Artifact is done with
the help of?
95 What are the possible Misunderstood Defective code Less Developers Lack of domain
causes for ending up requirements knowledge on tend to neglect knowledge
into 0.1 % defective development test approach
application? language to the
developed
product.
96 In causal analysis Reason Cause Test Approach Requirement Failures
which attributes gathering
among below assist in
analyzing the effect?
97 Software testing Usage of Use of proper Proper causal Requirement None of the
ensures which of the design test approach analysis satisfaction and above
below? architecture usage of best
design
architecture
105 Which statements are Includes Integration System test Acceptance System testing
applicable to V verification on test plan is plan is testing is the is done after
model? right arm and prepared prepared last phase integration
validation on based on based on user testing
left arm of the detailed design requirements
V shape phase
106 State whether True or TRUE FALSE
False. Test Design is
done after
requirement analysis
and before test
execution
107 State whether True or TRUE FALSE
False. Test Design
involves the activity of
prioritizing the test
cases
113 Which statement is These are These are These are These are None of the
correct with regards required to be required to be required to be required to be above
to Post Condition? set for verified by verified by set for planning
performing the tester after developer the activity to
activity to the activity is after the achieve the goal
achieve the performed activity is
goal performed
114 Which of the Identify test Identify input Combine Combine on None of the
following is not a step conditions variables, scenarios with split test cases above
involved to arrive at a different test conditions for different
test case? options for the flows
input variables
115 The process of Test Scenario Test Case Test Test Execution None of the
creating complete set Development above
of test cases is called?
39) You want to copy all files whose names begin with the character ‘l’, followed only by a digit,
from the Prof directory to the Pers directory. The Prof and Pers directories are in
your home directory, Pat. You are currently in your home directory. Which of the following
commands will you use?
Replicate edits in similar sentences
1) cp Prof\l* Pers
2) cp Prof\*[0-9] Pers
3) cp Prof\?[0-9] Pers
4) cp Prof\l[0-9] Pers
40) You have issued a command to display the contents of your home directory. You have used
redirection to send the output of the command to a file. Which of the following filters will you use to
count the number of files in your home directory?
1) grep
2) wc
3) cut
4) tr
41) You want to display all the files in your home directory that have the extension bp. Which of the
following expressions will you use with the grep filter?
1) grep “.bp$”
2) grep “^.bp”
3) grep “.[bp]”
4) grep “\.bp”
42) ftp command is used to link files from one directory to another.
1) True
2) False
43) You need to view only the files that begin with the character ‘s’ followed by four characters.
Which of the following will you use?
1) ls s????
2) cat s????
3) ls s*
4) cat s*
44) Which of the following commands will you use to send the output of a command to the standard
output file and to save the data in a disk file?
1) cat
2) ls
3) mput
4) cd
45) Which of the following commands is used to display messages on the screen?
1) echo
2) cat
3) ls
4) pwd
49) Which command is used to provide information about the currently the processes, including the
Process Identification Number (PID).
1) process
2) ps
3) prs
4) pid
51) What minimum permission must a directory have for a user to both enter the directory and list its
contents?
1) read only
2) execute only
3) write and read
4) execute and read
52) Which of the following commands searches the contents of files for a specific string?
1) find
2) grep
3) search
4) whereis
53) You want to repeat the last command you entered. How would you do this?
1) #
2) !!
3) #l
4) ##
54) You want to view a listing of previously entered commands. What command would you use?
1) hist
2) histfile
3) showbuff
4) history
61) The ______ command is typically used to search files for a specified string.
1) search
2) grep
3) tr
4) ls
62) What utility would use to remove/display columns from each line of a file?
1) pwd
2) col
3) cut
4) tail
63) Which of the following commands will show the file access permissions for the file "test.txt ?
1) ls -p test.txt
2) ls test.txt -p
3) ls -l test.txt
4) ls test.txt
70) The ______ variables contains the number of arguments specified in a command.
1) $1
2) $$
3) $*
4) $#
71) Which of the following variables stores the name of the last executed command ?
1) $0
2) $!
3) $#
4) $$
73) The file descriptor ____ is assigned to the standard input file?
1) 0
2) 1
3) 2
4) 3
74) The file descriptor ____ is assigned to the standard output file?
1) 0
2) 1
3) 2
4) 3
75) The file descriptor ____ is assigned to the standard error file?
1) 0
2) 1
3) 2
4) 3
83) The grep filter can be used without specified a regular expression
a. True
b. False
85) Which option of the grep command prints each line matching the pattern along with its line
number?
a) –n
b) –c
c) –v
d) –nv
86) Which option of the grep command prints only a count of the lines that match a pattern?
a) –n
b) –c
c) –v
d) –nv
87) Which option of the grep command print out all those lines that do not match the pattern
specified by the regular expression?
a) –n
b) –c
c) –v
d) -nv
95) ________ command is used in UNIX to view contents of data in a screenful at a time?
a) more
b) page
c) pg
d) ls
99) The tr filter can be used to translate from one set of character to another
a) true
b) false
100) Which option of tr command is used to specify squeezing of several occurrences of character
into one character?
1) –o
2) –c
3) –s
4) –z
101)Which option of cut filter display the column specified?
1) –c
2) –f
3) –d
4) -s
102)Which option of cut filter display the character?
1) –c
2) –f
3) –d
4) –s
103) Which option of cut filter display the column delimiter?
a) –c
b) –f
c) –d
d) –s
104)The _________ is the standard source for standard input, standard output and standard error
destination for most UNIX command.
a) shell
b) telnet
c) terminal
d) GNOME
107)_______ command followed by the screen coordinates , positions the cursor on the specified row
and column?
a) tput cup
b) tput smso
c) tput rmso
d) tput blink
112) Which of the following options of date command can be used to display the month of the year
in digits?
1) %m
2) %M
3) %Month
4) %mon
113) Which of the following options of date command can be used to display Day of the month in
digits?
1) %d
2) %D
3) %dd
4) %day
114) Which of the following options of date command can be used to display year in last 2 digits?
1) %y
2) %yy
3) %year
4) %YY
115) Which of the following options of date command can be used to display Date as mm/dd/yy
format?
1) %m/%d/%y
2) %mm/%dd/%yy
3) %
4) Non of the above
116) Which of the following options of date command can be used to display Hour in the format of
00 to 23?
1) %h
2) %H
3) %hh
4) %HH
117) Which of the following options of date command can be used to display minutes in the format
of 00 to 59?
a) %m
b) %mm
c) %
d) Non of the above
118)Which of the following options of date command can be used to display seconds in the format of
00 to 59?
a) %s
b) %S
c) %ss
d) %SS
119) Which of the following options of date command can be used to display time as HH:MM:SS?
a) %T
b) %M
c) %S
d) %T:%M:%S
120) Which of the following options of date command can be used to display abbreviated weekday?
a) %a
b) %w
c) %day
d) %dow
121) Which of the following options of date command can be used to display abbreviated month?
a) %m
b) %h
c) %mon
d) %month
122) Which of the following options of date command can be used to display time in AM/PM
notation?
a) %AM
b) %PM
c) %AM/PM
d) %r
130) Which of the following command is used to find the things to be carefull about when using the
command?
a) WARNINGS
b) ERROR
c) DEBUGS
d) DESCRIPTION
Chapter 2:Level 2
1) You have stored the reservation details of a flight in the file, Flightdet. This file contains details
such as the name of the passenger, class of travel, seat number, and reservation status. You want to
display the number of passengers for each class of the flight in the file, Classdet. Which of the
following commands will you use to display the total number of passengers travelling in first class?
a. cat Flightdet | grep “first” | wc -l
b. echo Flightdet | wc -c
c. echo Flightdet | grep “first” | wc -l
d. cat Flightdet | tr “first” | wc -c
2) You want to display the names of the files having the execute permission and created by a user,
Peter. You have logged in as Peter. The file name is stored in the variable, fname. Which of the
following test expressions will you use to check for the files?
a) test –G $fname –a –e $fname
b) test –O $fname –a –e $fname
c) test –O $fname –a –x $fname
d) test –G $fname –a –x $fname
4)You have a directory named Sales in your current directory. This contains files relating to all sales
transactions, details of customers, sales targets and plans, and details of sales personnel. For the
purpose of easier organization of files, you have decided to create subdirectories within the Sales
directory. You need to move all the files that end with the characters ‘rep’ in the Sales directory to
the subdirectory, Sales_Rep. Which of the following will you use to move the files from the Sales
directory to the Sales_Rep directory?
a) cp Sales\*rep Sales\Sales_Rep
b) rm Sales\*rep Sales\Sales_Rep
c) mv Sales\*rep Sales\Sales_Rep
d) mv Sales\?rep Sales\Sales_Rep
5. A user wants the script name1 to process the contents of the file "name2", then redirect the output
to the program name3) Which if the following shell commands will do this?
a) name1 | name2 > name3
b) name1 < name2 | name3
c) name1 > name2 | name 3
d) name1 | name2 < name3
6. Which of the following commands is used to set default file permissions for any newly created
file?
a) mask
b) umask
c) fmask
d) createMask
9. Which of the following will copy file1)txt to file2)txt? Choose The most correct answer.
a) cat file1)txt > file2)txt
b) cat file1)txt | file2)txt
c) cp file1)txt > file2)txt
d) cpio < file1)txt > file2)txt
10. Which of the following will copy file1)txt to file2)txt? Choose the correct answer.
a) cat file1)txt | file2)txt
b) cp file1)txt > file2)txt
c) cp file1)txt file2)txt
d) cpio < file1)txt > file2)txt
Remark: Answers are different, that’s the reason I have specified this questions.
11. $ ps –u | less
What is the true about the following command?
1) The –u option tells ps to provide detailed information about each process.
2) The –u option to list the processes of all users on the system rather then just those of the current
users.
3) The –u adds to the list processes that have no controlling terminal.
4) None of the above
12. $ ps –a | less
What is the true about the following command?
1) The –a option tells ps to provide detailed information about each process.
2)The –a option to list the processes of all users on the system rather then just those of the
current users.
3)The –a adds to the list processes that have no controlling terminal.
4)None of the above
13. $ ps –x | less
What is the true about the following command?
1) The –x option tells ps to provide detailed information about each process.
2)The –x option to list the processes of all users on the system rather then just those of the current
users.
3)The –x adds to the list processes that have no controlling terminal.
4)None of the above
14) What is the result of the following command?
# cat 'echo "$SMISRA
a) A syntax error
b) The value of $SMISRA
c) cat followed by the value of $ SMISRA
d) echo followed by the value of $ SMISRA
19. A user needs to search a file for lines that contain the asterisk (*) character. Which grep search
command will accomplish this?
a) grep <\*> textfile
b) grep '*' textfile
c) grep \"*" textfile
d) grep \<*\> textfile
20. Which command will output the exit status of the previous command (a 1 or a 0)?
a) echo $?
b) echo $1
c) echo $EXIT
d) exitstatus
21) Arrange the following in a proper order the way shell interprets.
a. Loads into the memory
b. Executes it
c. Reads the command
d. Searches for and locates the file with that name in the directories containing commands.
1) a,b,c,d
2) c,d,a,b
3) d,c,b,a
4) b,a,d,c
22) After executing the following command line, what will be the contents of the file myout.txt?
echo \”smisra\”> myout.txt
a) smisra
b) “smisra”
c) smisra
24. Statement A. Single tasking operating system can only perform one job at a time.
Statement B. UNIC operating system will simultaneously perform multiple task for a single user.
1) Statement A is True, Statement B is False
2) Statement A is False, Statement B is True
3) Statement A is True, Statement B is True
4) Statement A is False, Statement B is False
25. What does the command “ln test misra” typically do?
a) It will create a symbolic link from test to misra.
b) It will create a hard link from misra to test.
c) It will create a symbolic link from misra to test.
d) It will create a copy of the file test in misra.
26. Your unmask is set to 002) If you create a new file, what will the permission of the new file be?
a) –rw-rw-r--
b) rwxrwx-w-
c) ------w-
d) rwxrwxr-x
28. Which of the following commands will return the number of files having a string "what" in their
filename, in the current directory ?
a) ls | grep "what" | wc -l
b) ls | grep -n "what"
c) ls |`grep "what" `| wc -l
d) ls what* | grep -c
29. What does the following command do find / -name "core" -exec rm {} \;
a) It removes all files with the name core in the current directory
b) It removes all files with the name core in the root directory and all its sub directories
c) It first displays all files with the name core and later deletes it.
d) It first deletes all files with the name core and then displays their names
31) Which of the following command will create a link to file2 with file1
1) link file1 file2
2) ln file1=file2
3) ln file1 file2
4) link file1=file2
32) Which of the following commands is executed as a background process ?
1) sort -n catalog
2) date&
3) rm file*
4) awk
33) In order to remove a directory along with its sub-directories the command is _______
1) rmdir dirname
2) del dirname
3) rm -r dirname
4) rmdir -r dirname
34) What will be the output of the following command?
$ tr “[a-z]” “[A-Z]”
All Dogs will go to Heaven
a) All Dogs will go to Heaven
b) ALL DOGS WILL GO TO HEAVEN
c) all dogs will go to heaven
d) ERROR
39. You wish to find the man page that discusses how to change a password. You type man password
but you get the message that no manual entry for password exists.
Which command will find the appropriate page?
1) man -C password
2) man -k password
3) man -c password
4) man -q password
40. You want to find how to set the manpath variable so you type man man. What would you type
while displaying the page to find the location where manpath is discussed?
grep manpath
find manpath
/manpath
locate manpath
41) You want to review the man page on the files used to control host access, however, when you
enter man hosts_access you get the man page for routines used to programmatically manipulate
access.
What is the problem?
1) The page you are looking for does not exist on your system.
2) The page you are looking for resides in a directory that is searched later.
3) You typed the name of the page incorrectly.
4) The installation of man pages on your system is corrupt.
42. Suppose you are editing a file and want to read set of phone numbers from a file called phone in
alphabetical order, which command you will you?
1) :r !sort phone
2) :r !sort –a phone
3) :r !phone sort
4) :r !phone sort -a
44. What is the command to display all file names, which do NOT starts with 7 followed by any
character.
1) ls [789]*
2) ls 7*
3) ls 777
4) ls [^0-9]*
45. Comments which are required to be ignored by the shell can be included by prefixing them with
/*…….*/
1) True
2) False
46. Which of the following commands makes /usr/using executable by everyone but only writable by
its owner?
a) chmod 557 /usr/using
b) chmod o +rwx, a+rx /usr/using
c) chown 557 /usr/using
d) chmod 755 /usr/using
49. Which of the following commands would display the lines containing capital letters form the file
“turkey.txt”?
a) cat turkey.txt|wc -|
52) When the kill command is given with only the PID number of the process to kill (as in ‘kill
1234’), this crresponds to which type of kill signal?
a) 2 (SIGINT)
b) 1 (SIGHUP)
c) 9 (SIGKILL)
d) 15 (SIGTERM)
53) Which of the following would copy the file file1 to file2?
a) cp file1 | file2
b) cat file1 | file2
c) cat file1 > file2
d) copy file1 | file2
2) &
3) %
4) ||
55. You need to find all references in your system documentation to the word “copy”.
Which of the following will best accomplish this task?
1) man copy
2) which copy
3) locate copy
4) grep “copy” /usr/man/*
56. Which of the following commands can be used to view kernel messages?
1) less dmesg
2) less /var/log/boot.log
3) cat /proc/kernel |less
4) cat /proc/dmesg
Remark: part of courseware, page number:41
57. Which of the following is NOT the File Access Permission (FAP) refer to the permissions
associated with file?
5) File Owner
6) Group Owner
7) Other Users
8) Administrators
59. What is the output of the following command? (All are part of answers, choose the best answer)
$cat chap*.*
3) This command display all files starting with chap and containing any sequence of characters
(or no characters), followed by a dot, followed by any sequence of characters (or no characters)
4) This command display all files starting with chap and followed by a dot, followed by any
sequence of characters (or no characters)
5) This command display all files starting with chap and containing any sequence of characters (or no
characters), followed by a dot.
6) None of the above, return error.
60. Which of the following command is used to create a link file from existing file ?
(choose the best answer)
a) ln
b) vi
c) mv
d) cp
Chapter-2:Level 3
1) You have files related to the sales targets of each quarter in the directory Saletarg. You have
created directories for each quarter, such as Q1saletarg, Q2saletarg, Q3saletarg, and Q4saletarg,
under the Saletarg directory. You need to organize the files under the respective directories. The file
naming convention followed in your organization stipulates that the quarter name is followed by the
file name. You are currently in the Saletarg directory. Which of the following commands will you
use to move quarter one files from the Saletarg directory to the Q1saletarg directory?
a) mv Q[1]* Q1saletarg
b) mv Q[0-9]* Q1saletarg
c) mv Q[1-4]? Q1saletarg
d) mv Q[1] Q1saletarg
2) You have the project evaluation report and all project related documents in the directory, Proj005.
The Proj005 directory is in your home directory. You want to copy all the files in this directory to the
directory, Projtemp. You need to create the directory, Projtemp and then copy the files. You are
currently logged in your home directory. Which of the following commands will you use?
a) cp Proj005 Projtemp
b) ls Proj005 Projtemp
c) cp –r Proj005 Projtemp
d) ls –l Proj005 Projtemp
3) You want to display all the lines in a file, Proj_det, which begin with the word Proj followed by
any three digits. Which of the following will you use?
a) grep “^Proj[0-9][0-9][0-9]” Proj_det
b) grep –c “^Proj[0-9][0-9][0-9]” Proj_det
c) grep “Proj[^0-9][^0-9][^0-9]” Proj_det
d) grep “Proj[0-9][0-9][0-9]” Proj_det
4) You have stored the reservation details of a flight in the file, Flightdet. This file contains details
such as the name of the passenger, class of travel, seat number, and reservation status. You want to
display the number of passengers for each class of the flight in the file, Classdet. Which of the
following commands will you use to display the total number of passengers travelling in first class?
a) cat Flightdet | grep “first” | wc -l
b) echo Flightdet | wc -c
c) echo Flightdet | grep “first” | wc -l
d) cat Flightdet | tr “first” | wc -c
5. Which directory, the UNIX system allows users to create files, which not allows deleting the files
other then owners.
1) /home
2) /tmp
3) /var
4) /usr
6. Which directory, the UNIX system allows users to create files, which not allows deleting the files
other then owners.
a. /home
b. /tmp
c. /var/tmp
d. /usr
7. If the Process Identification Numbers (PID) of a frozen or crashed program is found to 1125, then
which command can be used to terminate the process?
1) kill 9 1125
2) kill 1125
3) kill 1125 9
4) kill 9
8. You need to have all the output from the executable myprog written to a text log named file1)out.
This program must not send any output to the console. Which of the commands listed will
accomplish this?
1) myprog > file1)out 2>&1
2) myprog > file1)out 1>&2
3) myprog > file1)out 1> /dev/null
4) myprog 1&2> file1)out
10. What does the command "foo < bar | foobar" do?
foo reads bar as stdin, pipes output to foobar
foo and bar are fed to foobar as stdin
foo's output is sent to bar, output is written to foobar
None of the above
11) You want to move all files in /dir1 to /dir2 that begin with a and end with v. What is the correct
command to do this?
a) mv /dir1/a*v /dir2
b) mv -r /dir1/a.v /dir2
c) move /dir1/a?v /dir2
d) ls a*v | cp /dir2
13) You need to alter the permissions on the directory /home/mrking and all it's contents to match the
following permissions.
drwxr--r--
Which of these commands with options and arguments will accomplish this? Choose two.
a) chmod 0744 /home/mrking -R
b) chmod 744 /home/mrking/*
c) chmod -R /home/mrking
d) chmod u+rwx,g+r,o+r /home/mrking
14) You need to alter the permissions on the directory /home/mrking and all it's contents to match the
following permissions.
drwxr--r--
Which of these commands with options and arguments will accomplish this? Choose two.
a) chmod /home/mrking -R
b) chmod 744 /home/mrking/*
c) chmod -R u=rwx,g=r,o=r /home/mrking
d) chmod u+rwx,g+r,o+r /home/mrking
15.Venkata Subramanya Rama Reddy is a Web Site developer, He frequently need to up load his
web pages and graphic files in his web site. He wants to sends (upload) a single file called
penpencil.gif to the remote machine. Which command he must use?
PORT
binary
put
transfer
16. You run the following commands:
[user@prompt]$ nice –n 1 program1
[user@prompt]$ nice –n 5 program2
[user@prompt]$ nice –n 10 program3
Which of the program started will have the highest priority?
program1
program2
program3
Non of the above
17. Which command removes all subdirectories in /tmp?
del /tmp/*
m –rf /tmp
rm –Ra /tmp/*
rm –r /tmp/*
18. Statement A: Grep filter searches a file for a particular pattern of characters, and display all the
line that contain that pattern.
Statement B: The file name is must in the grep command
Statement A is True and B is False
Statement A is False and B is true
Both Statements are True
Both Statements are False
19. You want to search the file myfile for all occurrences of string containing at least five characters,
where character number 2 and 5 are ‘a’ and character number 3 is NOT ‘b’. Which command would
you use?
grep a*^b*a myfile
grep .a[^b].a myfile
grep .[a].*.[a] myfile
grep .a*^b..a myfile
20. Which of the following commands will give read and write permissions to the file owner and
execute permission to the group owner for the file "test.exe" ?
chmod u+rw g+x test.exe
chmod +rwx, +xg test.exe
chmod (rw)u, (x)g test.exe
chmod u+rw,g+x test.exe
Chapter-3: VI Editor
Chapter 3:Level 1
1) Which of the following is a program used to accept input from the standard input, process it, and
send the output to the standard output file?
Environment variables
vi Editor
Filter
Pipe
2) An employee file contains the addresses and phone numbers of all employees. Which of the
following commands will you use to view the contents of the file and edit it?
vi
cat
ls
cp
3) You have created a script file, daily_sales, to generate the daily sales report. You have assigned
the execute permission for the file. Which of the following will you use to execute the file?
ls daily_sales
cat daily_sales
echo daily_sales
daily_sales
4) Which of the following commands can be used to go to the 25th line of a file in vi?
:25
25G
G25
g25
5. Select the ways of exiting and saving a vi session.
:wq
:w
:ZZ
:exit
6. Select all the ways of exiting and saving a vi session.
:w
:ZZ
Shift ZZ
:x
Remarks: part of Lab exercise
7. Select all the ways of exiting and saving a vi session.
:w
:ZZ
:x
:exit
Remarks: part of Lab exercise
8. After starting vi to edit an existing text file, you press ‘A’ (shift +1). This will let you:
Insert text at the end of the current file.
Insert text at the end of the current line.
Insert text after your current cursor position.
Insert text at the end of the file.
9. After starting vi to edit an existing text file, you press ‘a’. This will let you:
a) Insert text at the end of the current file.
b) Insert text at the end of the current sentence.
c) Insert text after your current cursor position.
d) Insert text at the end of the file.
10. You are writing text in vi. Now you want to save your changes and exit.
Which inputs will accomplish this?
1) esc XX
2) ctrl :w!
3) esc zz
4) esc :wq
11) In the vi editor, you accidentally pressed ' x ', while you were in the command mode. Which of
the following key should be pressed to put deleted text before cursor?
a) P
b) U
c) Ctrl z
d) X
23) In vi editor, which command is used to paste yanked lines after the current cursor position?
a) p
b) P
c) pp
d) PP
24) In vi editor, which command is used to paste yanked lines before the current cursor position?
a) p
b) P
c) pp
d) PP
2) Which keystrokes will move the cursor 3 lines down and 4 characters to the right?
a) 3j4l
b) 3k4m
c) 3h4j
d) 3l4k
3) You want to save vi changes to the file myfile with :w!, but vi complains it can not write to the
file.
Therefore, you want to check the write permissions on the file. To do this without leaving vi, you
type:
a) :!ls –l myfile
b) :\ls –l myfile
c) esc :ls –l myfile
d) :?ls –l myfile
2) Which of the following could be used to load kernel modules for a 2)4)x kernel?
1) vi/proc/modules
2) rmmod
3) kmod
4) depmod
3) When starting vi with the file nohup.out, which of the following will enable onscreen numbers?
1) vi +/set num nohup.out
2) vi +"se nu" nohup.out
3) vi /+"set number" nohup.out
4) vi +":set num" nohup.out
5. Which command used to find character x on current line after current cursor position?
1) fx
2) Fx
3) tx
4) Tx
6. Which command used to find character x on current line before current cursor position?
fx
Fx
tx
Tx
7. Which command is used to find next line containing pattern ?
/pattern
\pattern
?pattern
/?pattern
8) A user wants to set vi environmental settings each time when vi is invoked. This can be done by
using the following file:
.exrc
.profile
.bash_profile
.hash_profile
9) A user wants to copy 3 lines from a file prg1)c to another file prg2)c. This can be done efficiently
using:
Use 3yy in prg1)c and in prg2)c use p
using named buffer
using 3dd in prg1)c and in prg2)c use p
using %yy in prg1)c and in prg2)c use 3p
10. Assume that you have a file called my_wip_ccp.txt, which contain 177 lines. You want to filter
the line number 127 to 137.
Which command you will use?
:! sort 127..137
:! sort 127,137
:127..137 ! sort
:127,137 ! sort
Chapter-4: UNIX Shell
Chapter1:Level 1
1) Which of the following command is used to declare a global variable?
echo
read
export
env
2. You want to change your primary shell prompt to your user name, Jack. Which of the following
commands will you use to achieve this?
1) PATH=“Jack”
2) PS1=“Jack”
3) PS2=“Jack”
4) echo $SHELL
6. Once the execution permission is granted then the shell script can be executed by directly invoking
its name at a $ prompt.
1) True
2) False
7. What is the output of the following command after pressing enter key?
$ echo “All Cats will go to Hell”
1.
2. Display the enclosed text on the screen
3. Keeps the cursor on the same line on the screen after displaying the argument
4. Display the additional blank line after the argument
5. Display the enclosed text on the screen and then sound the system bell
8. What is the output of the following command after pressing enter key?
$ echo “All Cats will go to Hell \007”
1. Display the enclosed text on the screen
2. Keeps the cursor on the same line on the screen after displaying the argument
3. Display the additional blank line after the argument
4. Display the enclosed text on the screen and then sound the system bell
12) In a shell program there must be no space on either side of assignment operator
true
false
13) What is the output of the following command after pressing enter key?
$ x=$today
1. display current date
2. display current date and time
3. Display error
4. Does not display anything
2. –a
3. &
4. –n
3. ||
4. –o
20. Which command is used to stop execution of shell script and return to the $ prompt.
a) quit
b) exit
c) logout
d) return
21) the _________ construct evaluates the values of variable and compares it with each values
specified?
a) if……..fi
b) case……..esac
c) do…….while
d) while……do…….done
22) _______ command is used to resume execution at the top of the while loop?
a) exit
b) break
c) stop
d) continue
23) Which test command option used to test file exist and is ordinary
a) test –f filename
b) test –d filename
c) test –r filename
d) test –w filename
24) Which test command option used to test file exist and is directory
a) test –f filename
b) test –d filename
c) test –r filename
d) test –w filename
25. Which test command option used to test file exist and is readable
a) test –f filename
b) test –d filename
c) test –r filename
d) test –w filename
26. Which test command option used to test file exist and is writeable
a) test –f filename
b) test –d filename
c) test –r filename
d) test –w filename
27. Which test command option used to test file exist and is executable
a) test –f filename
b) test –d filename
c) test –x filename
d) test –w filename
28. Which test command option used to test file exist and is ordinary
a) test –f filename
b) test –d filename
c) test –r filename
d) test –s filename
29. Every user in UNIX system has an associated directory called home directory and can be
assigning a value to which environmental variable?
a) HOME
b) $home
c) PWD
d) PATH
30. Which variable contain a list of all full path-names of directories that are to be searcher for an
executable program.
1. PS1
2. HOME
3. PATH
4. Any variable
31) the PS1 variable can be set to new value only at the UNIX command line and not within a shell
script.
1. True
2. False
32) Which of the following file executed as soon as the user logs in to the UNIX system?
a) .file
b) .profile
c) $file
d) $profile
33) Which of the following command is used to terminate the background process?
a) By pressing Del key
b) kill
c) PS1
d) Terminate
34) Which of the following command is used to terminate the foreground process?
a) By pressing Del key
b) kill
c) PS1
d) Terminate
35. Which of the following command is used to terminate the foreground process?
a) By pressing Ctrl & d
b) kill
c) PS1
d) Terminate
36. Which of the following arithmetic test operator is used for Equal to meaning?
a) –eq
b) –ne
c) –qt
d) –qe
37. Which of the following arithmetic test operator is used for Not Equal to meaning?
a) –eq
b) –ne
c) –qt
d) –qe
38. Which of the following arithmetic test operator is used for Greater than meaning?
a) –eq
b) –ne
c) –gt
d) –qe
39. Which of the following arithmetic test operator is used for Greater than and equal to meaning?
a) –eq
b) –ne
c) –gt
d) –ge
40. Which of the following arithmetic test operator is used for less then meaning?
a) –lt
b) –ne
c) –qt
d) –qe
41) Which of the following arithmetic test operator is used for Less than and equal to meaning?
a) –lt
b) –ne
c) –le
d) –qe
42) What minimum permissions must a user have in order to run a shell script?
read
write
browse on the directory
users cannot run shell scripts
44) Hidden files in UNIX always begin with _________
1) dot (.)
2) –
3) *
4) ~
Chapter-4: Level 2
1) Consider the following statements:
Statement A: Variables in shell scripts do not have any associated data type.
Statement B: A variable created at a shell prompt will remain in existence until the shell is
terminated.
Which of the following is true about the above statements?
1. Statement A is true, and statement B is false.
2. Statement A is false, and statement B is true.
3. Both statements are true.
4. Both statements are false.
2) You have created a shell script to view the contents of the file, Customers and store the names of
all customers whose availed credit amounts have exceeded Rs.50, 000. The names of all such
customers will be stored in the file, Creditdet. You do not want any
errors while executing the script to interrupt your work. Which of the following will you implement
to store the errors in the file, Errordet?
a) Filters
b) Redirection
c) Pipe
d) Command substitution
3) When executing a command that produces output to the screen, you get an exit code of 0. Choose
the best description of what has happened
a) The program executed properly
b) The program encountered an error
c) The program requires more input
d) The program has returned standard input
4) Consider the following script ctr=1 while test $ctr -lt 10 do ctr=`expr $ctr+1` done
a) It displays 1 to 10
b) It executes the loop ten times and comes out without displaying anything
c) It is an infinite loop
d) It will not enter the loop at all
b) This will display all the user-id's of all users from the password file.
c) This will display the names of home directories of all users
Remarks: This question is not ambiguous; always UNIX treats any value as a test only.
9. Consider the following script
$ var1=2.5
$ expr $var1 + 5
What is the result of the above statement?
a) Works fine
12) How many cron fields are there for specifying the time to execute a cron job?
a) 1
b) 3
c) 4
d) 5
16) While executing a shell script with command line parameters, number of arguments
are stored in:
1) $0
2) $1
3) $#
4) $*
17) While executing a shell script with command line parameters, the first argument1
is stored in:
$1
$0
$*
$#
18) What would be the output of the following:
a=5
b=10
echo $a + $b
15
10+5
Error
105
19. What would be the output of the following shell script when the user enters 0(zero)
echo “Enter a number”
read num
if test $num –gt 0
then echo “Number is positive”
else
echo “Number is negative”
fi
1. Number is positive
2. Number is negative
3. Gives an error
4. Either (1) or (2)
20) what would be the output after executing the following statements:
a=5
b=10
c=`expr $a + $b`
echo $c
1) 10
2) 5
3) 10+5
4) 15
c) &&
d) ||
28) If a user wants to increase the number of command line arguments through a script, which of the
following command can be used:
a) set
b) shift
c) env
d) unshift
29) The following lines are from a shell script by name ‘myfiles’
for myfiles in `ls`
do
echo $myfiles
done
The output will be:
a) ls
b) Display all files from the current directory
c) Display only ordinary files from current directory
d) Display only directory files from the current directory
31) A user wants to check all processes that are specific to a user ‘user1’. What would be the
command
a) ps –U user1
b) ps –u user1
c) ps –e user1
d) ps –a user1
36) A user modifies his .profile file and he wants to make the modifications in effect without logging
out. How is this achieved
a) Issue the command . .profile(dot .profile)
b) Issue the command sh .profile
c) Give execute permission and issue the command .profile
d) User needs to logout to reflect the same
37) The administrator wants to restrict certain directories to a particular user as and when he login.
This can be done by using making modifications in :
1. /etc directory
2. . profile file
3. /bin directory
4. /etc and /bin directory
Chapter-4:Level 3
1) You need to create a shell script to display the project status of different projects. The project
status of each project is stored in a different file. The name of a project file is preceded by the
respective project code. All project status files are stored in the Project directory. You need to display
the contents of a project file based on the project code entered by a user. Which of the following shell
scripts will you use?
Enter/type: See MS and use the term accordingly globally.
1. echo “Enter project code”
read Pcode
ls Project | grep “Pcode*” | echo
2. echo “Enter project code”
read Pcode
ls Project | grep “$Pcode*” | cat
3. echo “Enter project code”
read Pcode
cat Project | grep “$Pcode*” | echo
4. echo “Enter project code”
read Pcode
cat Project | grep “Pcode*” | cat
2) You need to create a script to accept a student code and marks and display the grade obtained by a
student. Students who have obtained 90 percent or more are given an A grade. Students whose marks
are less than 90 percent and 70 percent or more are given B grade, and students whose mark are less
than 70 percent and 50 percent or more are given C grade. Students who have obtained less than 50
percent have failed the test. Which of the following shell scripts will you use?
1) echo –n “Enter student code: ”
read code
echo –n “Enter student mark: ”
read mark
case ${mark} in
-ge 90 –a –le 100)
echo “Student code: ” $code
echo “Student grade: A”;;
-lt 90 –a –ge 70)
echo “Student code: ” $code
echo “Student grade: B”;;
-lt 70 –a –ge 50)
echo “Student code: ” $code
echo “Student grade: C”;;
-lt 50 –a –ge 0)
echo “Student code: ” $code
echo “The student has failed”;;
*)
echo “You have entered wrong data”;;
esac
2) echo –n “Enter student code: ”
read code
echo –n “Enter student mark: ”
read mark
if test ${mark} –ge 90 –a ${mark} –le 100
then
echo “Student code: ” $code
echo “Student grade: A”
elif test ${mark} –ge 70 –a ${mark} –lt 90
then
echo “Student code: ” $code
echo “Student grade: B”
elif test ${mark} –ge 50 –a ${mark} –lt 70
then
echo “Student code: ” $code
echo “Student grade: B”
elif test ${mark} –ge 0 –a ${mark} –lt 50
then
echo “Student code: ” $code
echo “Student grade: B”
else
echo “You have entered wrong data”
fi
3) echo –n “Enter student code: ”
read code
echo –n “Enter student mark: ”
read mark
case test $mark in
-ge 90 –a –le 100)
echo “Student code: ” $code;;
echo “Student grade: A”;;
-lt 90 –a –ge 70)
echo “Student code: ” $code;;
echo “Student grade: B”;;
-lt 70 –a –ge 50)
echo “Student code: ” $code;;
echo “Student grade: C”;;
-lt 50 –a –ge 0)
echo “Student code: ” $code;;
echo “The student has failed”;;
esac
4) echo –n “Enter student code: ”
read code
echo –n “Enter student mark: ”
read mark
if test ${mark} >= 90 –a <= 100
then
echo “Student code: ” $code
echo “Student grade: A”
fi
elif test ${mark} >= 70 –a < 90
then
echo “Student code: ” $code
echo “Student grade: B”
fi
elif test ${mark} >= 50 –a < 70
then
echo “Student code: ” $code
echo “Student grade: B”
fi
elif test ${mark} >= 0 –a < 50
then
echo “Student code: ” $code
echo “Student grade: B”
fi
else
echo “You have entered wrong data”
fi
3) You have to create a shell script to accept the first and second semester marks of students and to
display their average marks. Which of the following scripts will you use?
1). echo “Enter student id”
read studid
echo “Enter sem1 mark”
read sem1
echo “Enter sem2 mark”
read sem2
tot=`expr sem1 + sem2`
avg=`expr tot / 2`
echo “Student id is ” studid
echo “Average mark is ” avg
2) echo “Enter student id”
read studid
echo “Enter sem1 mark”
read sem1
echo “Enter sem2 mark”
read sem2
tot=expr $sem1 + $sem2
avg=expr $tot / 2
echo “Student id is ” $studid
echo “Average mark is ” $avg
3) echo “Enter student id”
read studid
echo “Enter sem1 mark”
read sem1
echo “Enter sem2 mark”
read sem2
tot=`$sem1 + $sem2`
avg=`$tot / 2`
echo “Student id is ” $studid
echo “Average mark is ” $avg
4) echo “Enter student id”
read studid
echo “Enter sem1 mark”
read sem1
echo “Enter sem2 mark”
read sem2
tot=`expr $sem1 + $sem2`
avg=`expr $tot / 2`
echo “Student id is ” $studid
echo “Average mark is ” $avg
4) Before you start creating directories on a newly created file system, what should you do?
a) check the base system's umask setting
b) check the base system's CMOS setting
c) check the base system's init stage setting
d) check the base system's process ID setting
5. What BASH environment variable will prevent you from overwriting a file with a “>” or “>>”?
a) set-o safe
b) set-o noglob
c) set-o noclobber
d) set-o append
6. Which two files in a user’s home directory are used to customize the bash environment?
1. bash and .bashrc
2. bashrc and-bash_conf
3. bashrc and bashprofile
4. .bashrc and .bash_profile
7. What program do you use to suspend a printer queue?
5) lpr
6) lpq
7) lpc
8) lpd