MCQ of CA (CL) - (301 To 600) - It - by MD - Monowar Hossain Fca, Cisa (05.2024)
MCQ of CA (CL) - (301 To 600) - It - by MD - Monowar Hossain Fca, Cisa (05.2024)
CA
Information Technology
MCQ for exam preparation:
301. To process the data EDP utilize needs —— - 302. —— support decision at operator level of
(a) Calculator. management.
(b) Computer. (a) MIS.
(c) Drawing instrument (b) ES.
(d) Telephone (c) DSS.
(d) EPS.
Ans.(b) Ans.(c)
303. A system of creating, delivering and 304. The type of decision in which all steps in the
receiving electronic message is decision-making process are structured is——
(a) Information system —
(b) Communication system (a) Structured decision
(c) Electronic system (b) Semi- structured decision.
(d) Any of the above (c) Unstructured decision.
(d) Free structured decision.
Ans.(b) Ans.(b)
305. Cybernetic system is the one which is 306. A system which records and report business
transactions, flow of funds and generate
(a) Self Monitoring financial statements is
(b) Self controlling (a) Management Information System
(c) Self regulating (b) Financial Information System
(d) All of the above (c) Accounting Information System
(d) Executive Information System
Ans.(d) Ans.(c)
05(2024) Page # 51
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
307. CIM stands for 308. ________is an interface between users and the
(a) Computerised information system various databases
(b) Computer Integrated Manufacturing (a) Application programmers
(c) Common Information System (b) DB Administers
(d) Commercial Information System (c) DBMS
(d) All of these
Ans.(b) Ans.(c)
309. A _______ circuit is an interconnection of flip- 310. What is concerned with the way the hardware
flops and gates. components operate to form computer
(a) combinational. system?
(b) arithmetic. (a) Computer organization.
(c) shift. (b) Computer design.
(d) sequential. (c) Computer architecture.
(d) Computer implementation.
Ans.(d) Ans.(a)
05(2024) Page # 52
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
311. Globalization and the increasing internet 312. Each gate can be represented in tabular form
users around the world, give IT budgets by __________.
(a) high priority (a) symbols.
(b) less important (b) function.
(c) more component (c) truth table.
(d) more productivity (d) logic.
Ans.(a) Ans.(c)
313. An interface computer-based system which 314. The CPU responds to the interrupt signal by
supports manages in making instructed storing the ____ address from program
decisions is counter.
(a) MIS. (b) ES. (a) stack. (b) memory.
(c) DSS. (d) EPS. (c) return. (d) I/O.
Ans.(a) Ans.(c)
315. Which of the system uses Multidimensional 316. Which of the following is/are file organisation
data analysis? type?
(a) DSS (b) MIS (a) Pile (b) Sequential
(c) ESS (d) All of the above (c) Indexed (d) All the above
Ans.(a) Ans.(d)
317. MRP-II is accurately described as 318. Enterprise Resource Planning (ERP) is
(a) MRP software designed for services (a) severely limited by current MRP computer
(b) MRP with a new set of computer systems
programs that execute on micro (b) not related to MRP
(c) MRP augmented by other resource (c) an advanced MRP II system that ties-in
variables customers and suppliers
(d) usually employed to isolate (d) not currently practical
manufacturing operations from other
aspects of an organization
05(2024) Page # 53
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
Ans.(c) Ans.(c)
319. How many digits are used in Binary number 320. What type of computer uses the binary
system? number system?
(a) zero. (b) one. (a) Analog. (b) Super.
(c) two. (d) three. (c) Intra. (d) Digital.
Ans.(c) Ans.(d)
321. The extension of MRP which extends to 322. The automatic transfer and positioning of
resources such as labour hours and machine work by machine without significant human
hours, as well as to order entry, purchasing, intervention or operation is_____
and direct interface with customers and (a) Updating
suppliers is (b) Automation
(a) MRP-II (c) Computerisation
(b) Enterprise Resource Planning (d) Mechanisation
(c) the master production schedule
(d) closed-loop MRP
Ans.(b) Ans.(b)
323. Restructuring and transforming a business 324. Batch processing is preferred over on-line
process by a fundamental rethink and transaction processing when
redesign to achieve dramatic improvement i) Processing efficiency is important
in cost, quality etc. ii) The volume of data to be processed is large
iii) Only periodic processing is needed
(a) Automation iv) A large number of queries are to be
(b) Business process Reengineering processed
(c) ERP
(a) i ,ii (b) i ,iii
(d) Modernisation A system of creating,
delivering and receiving electronic message is (c) ii ,iii (d) i ,ii, iii
Ans.(b) Ans.(d)
05(2024) Page # 54
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
325. If both inputs A and B are equal to 1 in AND 326. A Boolean function can be translated from
gate, the output is_______. _________ expression into a logic diagram.
(a) zero. (b) one. (a) boolean. (b) logical.
(c) don’t care. (d) binary. (c) relational. (d) algebric.
Ans.(b) Ans.(d)
327. A _________ circuit is a connected 328. The addition of 2 binary digits is done by
arrangement of logic gates with a set of ___________ circuit.
inputs and outputs. (a) half adder. (b) full adder.
(a) arithmetic. (b) logic. (c) BCD adder. (d) composite adder.
(c) combinational. (d) shift.
Ans.(b) Ans.(a)
05(2024) Page # 55
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
329. A _________ is a combinational circuit that 330. The storage element employed in clocked
forms sum of 3 input bits. sequential circuit is called ___________.
(a) half adder. (b) full adder. (a) memory. (b) flipflop.
(c) BCD adder. (d) composite adder. (c) circuit. (d) subtractor.
Ans.(b) Ans.(b)
331. Minterm is also called ________. 332. In flip-flop input R stands for __________.
(a) read.
(a) standard product. (b) reset.
(b) standard sum. (c) reimburse.
(c) union. (d) rectangle.
(d) difference.
Ans.(a) Ans.(b)
333. Short form of “American Standard Code for 334. The solution to any problem stated by a finite
Information Interchange”. number of procedural steps is _________.
(a) ASCFII (b) ASCII (a) procedure. (b) algorithm.
(c) ASCFI (d) ASCI (c) subprogram. (d) specification.
Ans.(b) Ans.(b)
05(2024) Page # 56
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
335. The multiplexer is also called ______ selector 336. A _______ is a digital circuit that performs the
since it selects one of many data inputs. inverse operation of a decoder.
(a) line. (b) data. (a) multiplexer. (b) adder.
(c) binary. (d) octal. (c) subtractor. (d) encoder.
Ans.(b) Ans.(d)
337. A register is capable of storing __________ bit 338. The _______ input in the register determines
of information. the action to be taken with each clock pulse.
(a) one. (b) two. (a) buffer. (b) register.
(c) three. (d) four. (c) load. (d) zero.
Ans.(a) Ans.(c)
339. The summation symbol stands for the 340. There are ________ basic arithmetic operations.
_______. (a) one. (b) two.
(a) ORing of terms. (b) AND of terms. (c) three. (d) four.
(c) Not. (d) NAND.
Ans.(a) Ans.(d)
341. What is the reflected code for the decimal 342. The K-Map is also called _______ diagram
equivalent 9? (a) venn. (b) boolean.
(a) 1100. (b) 1101. (c) vector (d) veitch
(c) 1011. (d) 1001.
Ans.(b) Ans.(d)
05(2024) Page # 57
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
343. The arithmetic processor is simple if it has 344. A decimal arithmetic unit is a ___________
only fixed point ________ instruction. function that performs decimal micro
(a) add. (b) subtract. operations.
(c) multiply. (d) division. (a) analog. (b) logical.
(c) digital. (d) boolean.
Ans.(a) Ans.(c)
345. A straight subtraction of 2 numbers requires 346. The means of entering information into
a __________ circuit. computer is through a ___________.
(a) BCD adder. (a) mouse.
(b) subtractor. (b) keyboard.
(c) division. (c) printer.
(d) subtractor (d) monitor.
Ans.(b) Ans.(b)
347. The ___________ subsystem of a computer 348. A _______________ interrupt is a system that
provides communication between central establishes a priority over sources to
system and outside environment. determine which
condition to service first.
(a) input/output. (b) input. (a) software. (b) hardware.
(c) output. (d) exit. (c) priority. (d) device.
Ans.(a) Ans.(c)
349. __________ is a binary code of a group of 350. Which of the following combinational circuit
elements consisting of 10 decimal digits, the selects binary information from one of many
26 letters of the alphabet and a certain input lines and directs it to a single output
number of special symbols such as $. line?
(a) Alphanumeric code. (a) Encoder.
(b) Decimal code. (b) Decoder.
(c) Error detection code. (c) Demultiplexer.
(d) Reflected code. (d) Multiplexer.
Ans.(a) Ans.(d)
05(2024) Page # 58
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
05(2024) Page # 59
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
351. Overall design of database is called 352. Information currently stored in the database is
called____
(a) Structure (b) Architect (a) Instance (b) Record
(c) Schema (d) Layer (c) Data (d) Files
Ans.(c) Ans.(a)
A database schema is an abstract design
that represents the storage of your data
in a database. It describes both the
organization of data and the relationships
between tables in a given database.
353. ———- support decision at the strategic 354. Highest level of schema in a database is
level of management. (a) Physical schema (b) Logical schema
(a) MIS. (b) ES. (c) Subschema (d) None of these
(c) DSS. (d) EPS.
Ans.(b) Ans.(b)
355. An information system within a business 356. Many OS enable the CPU to proceeds a number of
organisations that support the traditional independent programs concurrently called
functions such as marketing, finance or ____________ .
production is (a) multitasking.
(a) MIS (b) BIS (b) multiprogramming.
(c) FIS (d) EIS (c) multi processing.
(d) multiple functions.
Ans.(b) Ans.(b)
357. A Business Information System planning 358. In T flip-flop T stands for ___________.
technique that identify key business goal
and strategies is (a) technical. (b) toggle.
(a) AIS (b) CSF (c) CAD (d) CPM (c) trigger. (d) type edged.
Ans.(b) Ans.(b)
05(2024) Page # 60
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
T Flip-Flop is a single input logic circuit that holds or toggles its output
according to the input state. Toggling means changing the next state
output to complement the current state. T is an abbreviation for Toggle.
A good example to explain this concept is using a light switch.
359. ROM is _______________ its contents are 360. The map for boolean functions of 4 variables
destroyed when power is turned off. consist of _______.
(a) non volatile. (b) permanent. (a) 4 minterms. (b) 4 maxterms.
(c) volatile. (d) initial. (c) 16 minterms. (d) 16 maxterms.
Ans.(a) Ans.(c)
361. RAM stands for _________. 362. Initial program is stored in ROM portion of main
(a) random access memory. memory called ___________ loader.
(b) random memory. (a) linking. (b) volatile.
(c) read only memory. (c) non volatile. (d) bootstrap.
(d) read access memory.
Ans.(a) Ans.(d)
363. A disk drive with removable disks is called 364. A tract in magnetic disk in a given sector near the
_____________ disk. circumstance is ________ than near the centre.
(a) magnetic tape. (b) magnetic. (a) smaller. (b) longer.
(c) floppy. (d) record. (c) thinner. (d) bigger.
Ans.(c) Ans.(b)
05(2024) Page # 61
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
365. The micro operation that specifies binary 366. The basic component of arithmetic circuit
operations for strings of bits stored in is________.
registers are___________. (a) parallel subtractor.
(a) logic micro operation. (b) parallel adder.
(b) shift micro operation. (c) half adder.
(c) arithmetic micro operation. (d) full adder.
(d) register transfer micro operation.
Ans.(a) Ans.(b)
367. The transformation of date from main 368. The map simplification method is also known as
memory to cache memory is called ___________ map.
____________ process. (a) karnaugh.
(a) execution. (b) algebric.
(b) mapping. (c) basic.
(c) unmapping. (d) binary.
(d) loading.
Ans.(b) Ans.(a)
05(2024) Page # 62
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
369. During the execution of the instructions, a 370. Maxterm is also called ________.
copy of the instructions is placed in the __.
(a) Register (b) RAM (a) standard product. (b) standard sum.
(c) System heap (d) Cache (c) union. (d) differnce.
Ans.(d) Ans.(b)
A cache -- pronounced CASH -- is hardware or software that is used to
store something, usually data, temporarily in a computing environment.
Maxterms are also called standard sum. They are also known
as canonic sum term. This is a term such as (A+B++)OR() where each
variable is used once only once.
371. The name of the operation that 372. The addition and subtraction operations can be
complements bits in A register where there combined into one common circuit by including a
are corresponding 1’s in B __ gate with each full adder.
register is _______.
(a) selective set. (a) exclusive-OR.
(b) selective complement. (b) AND.
(c) selective clear. (c) OR.
(d) mask. (d) NAND.
Ans.(b) Ans.(a)
The selective-complement operation complements
bits in A where there arecorresponding 1's in B.
373. The storage devices that stores information 374. LIFO stands for _______________.
in a manner that the item stored last in first
item retrieved is___. (a) last in flag out. (b) last in first out.
(a) queue. (b) stack. (c) loop in first out. (d) loop in flag out.
(c) CPU. (d) register.
Ans.(b) Ans.(b)
A stack is a storage device that stores information in such a
manner that the item stored last is the first item retrieved.
The stack in digital computers is essentially a memory unit with
an address register that can count only (after an initial value is
loaded into it).
05(2024) Page # 63
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
375. The operation of deletion in stack is__. 376. SP stands for _____________.
(a) PUSH. (b) POP. (a) Storage Pointer. (b) Seek Pointer.
(c) FRONT. (d) REAR. (c) Stack Pointer. (d) Synchronous Pointer.
Ans.(b) Ans.(c)
Accessing the content while removing it from the stack, is known as a The Stack Pointer (SP) register is used to indicate the location of the last item put
Pop Operation. In an array implementation of pop() operation, the data onto the stack. When you PUT something ONTO the stack (PUSH onto the stack),
element is not actually removed, instead top is decremented to a lower the SP is decremented before the item is placed on the stack.
position in the stack to point to the next value.
377. The mode in which the effective address is 378. The instruction that performs arithmetic, logic and
equal to the address part of instruction is shift operations are____________.
______. (a) data transfer instruction.
(a) indirect addressing mode. (b) data manipulation instruction.
(b) direct addressing mode. (c) register transfer instruction.
(c) register addressing mode. (d) program control instruction.
(d) relative addressing mode.
Ans.(b) Ans.(b)
In the direct address mode, the address part of
the instruction is equal to the effective address.
Data manipulation performs arithmetic, logic, and shift operations. Program control
instructions provide decision-making capabilities and change the path taken by the
program when executed on the computer.
Logical Shift Left: SHL
Logical Shift Right: SHR
Arithmetic Shift Left: SHLA
Arithmetic Shift Right: SHRA
379. Software programs permanently stored in a 380. The access method of RAM is ________ if bits are
read only memory (ROM) are called ___ considered the unit of data access.
(a) software. (a) random
(b) firmware. (b) parallel
(c) hardware. (c) serial
(d) vaporware. (d) direct
Ans.(b) Ans.(b)
Firmware is a software program or set of In this method, the memory is accessed in a specific linear
instructions programmed on a hardware device. It is sequential manner, like accessing in a single Linked List.
typically stored in the flash ROM of a hardware device.
05(2024) Page # 64
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
381. A collection of 8 bits is called _________ 382. The two basic types of record access methods are
(a) byte. ________
(b) word. (a) sequential and random.
(c) record. (b) sequential and indexed.
(d) field. (c) direct and immediate.
(d) online and real time.
Ans.(a) Ans.(a)
We know, the terms random access and sequential access are often used to
describe data files. A random-access data file enables you to read or write
information anywhere in the file. In a sequential-access file, you can only read
Each 1 or 0 in a binary number is called a bit. From there, a group of
and write information sequentially, starting from the beginning of the file.
4 bits is called a nibble, and 8-bits makes a byte.
383. Which of the following are the two main 384. The addressing mode where the controls of an
components of the CPU? index register is added to the address part of the
instruction_____.
(a) Control unit and registers. (a) relative addressing mode.
(b) Registers and main memory. (b) direct addressing mode.
(c) Control unit and ALU. (c) indexed addressing mode.
(d) Control unit and ALU. (d) immediate addressing mode.
Ans.(d) Ans.(b)
385. The instruction provides decision making 386. The ____________ contains an address to specify
capabilities are___________. the desired location in the memory.
(a) data transfer instruction. (a) word count register.
(b) data manipulation instruction. (b) address register.
(c) register transfer instruction. (c) control register.
(d) program control instruction. (d) none of the above.
Ans.(d) Ans.(b)
05(2024) Page # 65
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
Program Control Instructions are the machine code that are
used by machine or in assembly language by user to
command the processor act accordingly. These instructions
are of various types. These are used in assembly language by
user also.
387. The computer code for interchanging the 388. Which counter counts in binary-coded decimal
information between terminals is_____. from 0000 to 1001 and back to 0000?
(a) ASCII. (a) BCD counter.
(b) BCD. (b) Asynchrounous counter.
(c) EBCDIC. (c) Flip-flop.
(d) CDIE. (d) Register.
Ans.(a) Ans.(a)
The computer code for the interchange of information between terminals is A BCD counter is one of the types of most widely used digital counters, which
ASCII. ASCII stands for American Standard Code for Information Interchange. counts up to 10 with an applied clock signal. It is a 4-bit binary digital counter,
Computers can only understand numbers, so an ASCII code is the numerical counts from 1 (0001) to 10 (1010). In practice, the BCD counter counts from 0000 (0)
representation of a character such as 'a' or '@' or an action of some sort. to 1001 (9) in decimal form on the application of the clock signal.
Pronounced ask-ee.
389. MSI stands for ________ 390. A micro program written as string of 0’s and 1’s is
(a) Medium Scale Integrated Circuits. a ___________
(b) Medium System Integrated Circuits. (a) symbolic microinstruction.
(c) Medium Scale Intelligent Circuit. (b) binary microinstruction.
(d) Medium System Intelligent Circuit. (c) symbolic microprogram.
(d) binary microprogram.
Ans.(a) Ans.(d)
05(2024) Page # 66
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
393. Binary circuit elements have _________ 394. Which of the following is associated with error
(a) one stable state. (b) two stable state. detector?
(c) three stable state. (d) zero state. (a) Odd parity bit. (b) Even parity bit.
(c) Both (a) and (b). (d) ASCII Code.
Ans.(b) Ans.(c)
395. The ALU and control unit of most of the 396. The base or radix of binary number system is
microcomputers are combined and _________
manufacture on a single silicon chip. What is
it called? (a) 2. (b) 16.
(a) Monochip. (b) Microprocessor. (c) 10. (d) 8.
(c) ALU. (d) Control unit.
Ans.(b) Ans.(a)
A microprocessor is a computer processor where the data processing
logic and control is included on a single integrated circuit, or a small
number of integrated circuits. The microprocessor contains the
arithmetic, logic, and control circuitry required to perform the functions of a
computer's central processing unit.
397. In immediate addressing the operand is 398. The expansion of RPN is ____________.
placed _________ (a) Reverse Polish Notation.
(a) in the CPU register. (b) Review Polish Notation.
(b) after OP code in the instruction. (c) Reverse Pointer Notation.
(c) in memory. (d) Review Pointer Notation.
(d) in stack.
Ans.(b) Ans.(a)
Reverse Polish notation (RPN) is a method for conveying mathematical expressions
without the use of separators such as brackets and parentheses.
05(2024) Page # 67
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
CA
Information Technology
MCQ for exam preparation:
401. The expansion of BCD is ___________. 402. The NOT gate is also called ________.
(a) Binary Codiac Decimal. (a) AND gate.
(b) Binary Coded Decimal. (b) NAND gate.
(c) Binary Coded Digit. (c) XOR gate.
(d) Binary Codiac Digit. (d) Inverter.
Ans.(b) Ans.(d)
403. ALU is _________ 404. The field that specifies the way the operand or the
effective address is determined is ____.
(a) Arithmetic Logic Unit.
(a) processor field.
(b) Array Logic Unit.
(b) mode field.
(c) Application Logic Unit.
(c) operation code field.
(d) Array Lack Unit.
(d) address field.
Ans.(a) Ans.(c)
05(2024) Page # 68
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
405. CD-ROM stands for _________ 406. The 10’s complement of a decimal number is equal
to its ____________.
(a) Compactable Read Only Memory. (a) 9’s complement + 1.
(b) Compact Data Read Only Memory. (b) 9’s complement – 1.
(c) Compactable Disk Read Only Memory. (c) 8’s complement + 2.
(d) Compact Disk Read Only Memory. (d) 8’s complement – 2.
Ans.(d) Ans.(a)
407. TOS represents______________. 408. The ________ holds the number of words to be
transferred to the memory.
(a) Top Of Simulator. (a) word count register.
(b) Top Of Stack. (b) address register.
(c) Top Of Storage. (c) control register.
(d) Top Of System. (d) program register.
Ans.(b) Ans.(a)
409. The instructions that perform binary 410. The term that provides simultaneous data
operations on strings of bits stored in processing tasks are____________.
registers_______.
(a) logical instructions. (a) parallel processing.
(b) shift instructions. (b) array processing.
(c) arithmetic instructions. (c) vector processing.
(d) complement instructions. (d) distributed processing.
Ans.(a) Ans.(a)
05(2024) Page # 69
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
411. AR represents____________. 412. The state table of sequential circuit consists of
__________ sections.
(a) Auto Register. (b) Address Register. (a) one. (b) two.
(c) Auxiliary Register. (d) Associate Register. (c) three. (d) four.
Ans.(b) Ans.(d)
413. The bits of the instruction are divided into 414. The program that translates a high level language
groups called ______. program into binary is called _________
(a) formats. (b) fields. (a) translator. (b) compiler.
(c) bytes. (d) address. (c) interpreter. (d) simulator.
Ans.(b) Ans.(b)
415. A set of common instruction that can be 416. A memory that is part of a control unit is referred
used in a program many times is called a to as ___________
__________ (a) primary memory.
(a) function. (b) secondary memory.
(b) subroutine. (c) control memory.
(c) method. (d) virtual memory.
(d) structure.
Ans.(b) Ans.(c)
05(2024) Page # 70
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
417. The register that keeps track of the 418. The addressing mode the operands are in registers
instructions in the program stored in that reside within CPU is ___________
memory is __________ (a) register mode.
(a) control register. (b) register indirect mode.
(b) status register. (c) implied mode.
(c) direct register. (d) indexed addressing mode.
(d) program register.
Ans.(d) Ans.(a)
419. The part of a processor unit that executes 420. The communication between central system and
arithmetic operations is ____ the outside environment is done by ____________
(a) array processor. (a) input-output subsystem.
(b) arithmetic processor. (b) control system.
(c) vector processor. (c) memory system.
(d) multiprocessor. (d) logic system.
Ans.(b) Ans.(a)
421. In addition algorithm, the signs of A and B 422. What is Not involved in the basics of Robotics?
are __________ Choose one answer.
(a) Controls involved (b) Kinematics module
(a) identical. (b) different. (c) Sensor module (d) Actuator module
(c) dissimilar. (d) asymmetry. (e) Mechanical system (f) Programming
Ans.(a) Ans.(b)
05(2024) Page # 71
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
423. The gate that gives 1 output if any one of 424. The NOR gate produce the output 1, if _______.
the input is 1, is _______. (a) X = Y = 0. (b) X=1, Y=0.
(a) AND. (b) NAND. (c) X=0, Y=1. (d) X = Y = 1.
(c) NOT. (d) OR.
Ans.(d) Ans.(a)
425. The base or radix of octal number system is 426. The base or radix of hexadecimal number system is
_______________ _____________
(a) 2. (b) 16. (a) 2. (b) 16.
(c) 10. (d) 8. (c) 10. (d) 8.
Ans.(d) Ans.(b)
427. The concept of online marketing and selling 428. E‑commerce has _____ scope than
of products and services through the E-Business or Digital Business.
internet is _________
(a) B2G (b) B2C (a) Higher (b) Narrower
(c) B2B (d) B2E (c) Wider (d) More
Ans.(b) Ans.(b)
429. Among the alternative models of B2B E- 430. Which of the following is not a party of Supply
commerce, which is the best means to Chain Management (SCM)?
acquire a competitive advantage in the
market? (a) Suppliers
(a) Strategic relationship (b) Manufacturers
(b) Process (c) Customers
(c) Transaction (d) Distributors
(d) All of the above
Ans.(a) Ans.(d)
05(2024) Page # 72
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
A B2B partnership is a collaboration between
2 or more companies where the goal is to
build a mutually beneficial relationship that
will sustain growth and add significant value
to all parties involved. This could be in the
form of product development, marketing,
and/or overall business opportunities.
431. ___________ allows transactions among 432. Some marketers or companies charge other
customers and dealers through supplying companies for letting them place a banner on their
complete information and ancillary services, websites, blogs or platforms known as the
without being concerned about the actual ___________
exchange of products and offerings among E- Commerce Model.
the parties. (a) Affiliate (b) Transaction
(a) Middlemen (b) Intermediary (c) Aggregator (d) Advertising
(c) Metamediary (d) All of the following
Ans.(c) Ans.(d)
433. E-commerce can be defined as______ 434. The prerequisite for realizing e-commerce
(a) Digital business transactions between is___________
institutions and individuals
(b) Digital transactions and processes that (a) Talent
take place within the enterprise (b) Logistics
(c) Use the Internet and www to conduct (c) Electronic Information Technology
business transactions (d) Information
(d) Both ‘a’ and ‘c’
Ans.(a) Ans.(c)
05(2024) Page # 73
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
435. Which of the following device is used to 436. A term related sending data to a satellite is?
connect two systems, especially if the (a) Downlink
systems use different protocols? (b) Modulate
(a) Repeater (b) Gateway (c) Demodulate
(c) Bridge (d) Hub (d) Uplink
Ans.(b) Ans.(d)
437. A popular way to learn about computers 438. Networks are monitored by security personnel and
without ever going to a classroom is called supervised by _____ who set(s) up accounts and
passwords for authorized network users.
(a) E-learning (a) IT managers
(b) Star network (b) The government
(c) I-learning (c) Password administrators
(d) Close learning (d) Network administrators
Ans.(a) Ans.(d)
439. What device separates a single network into 440. Which of the following is required to communicate
two segments but lets the two segments between two computers?
appear as one to higher protocols? (a) Communications software
(a) Switch (b) Router (b) Protocol
(c) Bridge (d) Gateway (c) Communications hardware
(d) All of the above
Ans.(c) Ans.(d)
05(2024) Page # 74
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
441. In a _______ connection, more than two 442. PCM is an example of ____ conversion.
devices can share a single link. (a) Analog-to-analog (b) Analog-to-digital
(a) Point-to-point (b) Primary (c) Digital-to-digital (d) Digital-to-analog
(c) Multi-point (d) Secondary
Ans.(c) Ans.(b)
443. 13
Which topology requires a central 444. The information to be communicated in a data
controller or hub? communications system is the __
(a) Star (b)Mesh (a) Medium (b) Protocol
(c) Bus (d) Ring (c) Transmission (d) Message
Ans.(a) Ans.(d)
445. Which of the following language does the 446. Which of the following is the brain of the
computer understand? computer?
(a) Computer understands only C Language
(b) Computer understands only Assembly (a) Central Processing Unit (CPU)
Language (b) Memory
(c) Computer understands only Binary (c) Arithmetic and Logic unit (ALU)
Language (d) Control unit
(d) Computer understands only BASIC
Ans.(c) Ans.(a)
13
https://www.ezgolearning.com/data-communication-mcqs/2/
05(2024) Page # 75
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
447. Which of the following statements best 448. What is the full form of the first Electronic
describes the batch method of input ? Computer ENIAC?
(a) Data is processed as soon as it is input (a) Electronic Numerical Integrator and Computer
(b) Data is input at the time it is collected (b) Electronic Numeric Integrator and Calculator
(c) Data is collected in the form of source (c) Electrical Numerical Integrated Computer
documents, placed into groups, and then (d) Electro Numeric Integrity Computer
input to the computer
(d) Source documents are not used
Ans.(c) Ans.(a)
451. IDE stands for? 452. Which of the following statements is true?
14 https://www.javatpoint.com/digital-electronics-mcq
05(2024) Page # 76
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
IDE stands for Integrated Development Python is a high-level and interpreted object-oriented
Environment. language.
453. Who developed Python? Select the correct 454. The most common output device is a(n)
answer.
(a) Expert system
(a) Dennis Ritchie
(b) Printer
(b) Guido Van Rossum
(c) Mouse
(c) James Gosling
(d) Keyboard
(d) Bill Gates
Ans.(b) Ans.(b)
Python was developed by Guido Van Rossum. A printer is a common output device and because
the other replies represent input,
not output devices.
455. 15
A software package that is used with a 456. Which of the following represents a type of
large set of organized data that presents the applications software that a large client is most
computer as an expert on a particular topic is likely to use?
referred to as a(n)
(a) Enterprise resource planning.
(a) Data mining.
(b) Operating system.
(b) Expert system.
(c) Central processing unit.
(c) Artificial intelligence.
(d) Value-added network.
(d) Virtual reality.
Ans.(b) Ans.(a)
The requirement is to identify a type of software The requirement is to identify the type of applications
package that uses a large set of organized data software that a large client is most likely to use.
that presents the computer as an expert on a (a) is correct because enterprise resource planning (ERP)
particular topic. software is a form of applications software that provides
(b) is correct -because an expert system presents relatively complete information systems for large and
the computer as such an expert. medium size organizations.
(a) is incorrect because data mining uses tools (b) is incorrect because a computer operating system is
which look for trends or anomalies without considered systems software, not applications software.
advance knowledge of the meaning of the data. (c) is incorrect because the central processing unit is the
(c) is incorrect because artificial principal hardware component of a computer, not
intelligence is a branch of computer science that software.
involves computer programs that can solve specific (d) is incorrect because a value-added network is a
problems creatively. privately owned network whose services are sold to the
(d) is incorrect because virtual reality involves public.
computer creation of an artificial, three-dimension
world that may be interacted with.
15
http://www.accountingmcqs.com/a-software-package-that-is-used-with-a-large-set-o-mcq-4541
05(2024) Page # 77
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
457. The Systems Development Life Cycle (SDLC) 458. Which of the following system implementation
is the traditional methodology for models has the advantage of achieving a full
developing information systems. In operational test of the new system before it is
which phase of the SDLC would the activity implemented?
of identifying the problem(s) that need to be
solved most likely occur?
(a) Parallel implementation.
(a) Analysis.
(b) Plunge implementation.
(b) Implementaion.
(c) Pilot implementation.
(c) Planning.
(d) Phased implementation.
(d) Development.
Ans.(c) Ans.(a)
.
459. Which of the following represents a type of 460. A general type of IT system that is designed to
applications software that a large client is improve the productivity of daily office work is
most likely to use? referred to as a(n)
05(2024) Page # 78
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
461. Which of the following characteristics 462. Which of the following is least likely to be
distinguishes computer processing from manual considered an advantage of a database?
processing?
(a) Computer processing virtually eliminates the (a) Easy to distribute information to every possible
occurrence of computational error normally user.
associated with manual processing. (b) Easy to organize and reorganize information.
(b) Errors or fraud in computer processing will (c) Easy to retrieve information quickly.
be detected soon after their occurrences.
(d) Easy to store large quantities of information.
(c) The potential for systematic error is
ordinarily greater in manual processing than
in computerized processing.
(d) Most computer systems are designed so
that transaction trails useful for audit
purposes do not exist.
Ans.(a) Ans.(a)
463. Which computer application is most 464. Which computer application is most frequently
frequently used to analyze numbers and used on mainframe computers?
financial information? (a) Graphics.
(a) Computer graphics programs. (b) Databases.
(b) WAN applications. (c) Spreadsheets.
(c) Word processing programs. (d) Word processing.
(d) Spreadsheets.
Ans.(d) Ans.(b)
465. Analysis of data in a database using tools 466. A set of step-by-step procedures used to
which look for trends or anomalies without accomplish a task is a(n)
knowledge in advance of the meaning
of the data is referred to as (a) Algorithm.
(b) Compilation master.
(a) Artificial intelligence. (c) Linux.
(b) Data mining. (d) Transistor.
(c) Virtual reality.
(d) Transitory analysis.
Ans.(b) Ans.(a)
05(2024) Page # 79
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
467. Which of the following compiles a complete 468. Which term below describes the technology that
translation of a program in a high-level allows multiple operating systems to run
computer language before the program is simultaneously on a single computer?
run for the first time? (a) Client.
(a) Visual Basic. (b) Mainframe.
(b) Java. (c) Linux.
(c) Algorithm. (d) Virtualization.
(d) Compiler.
Ans.(d) Ans.(d)
469. What type of secondary storage device 470. Another term for cloud-based storage is
requires no moving parts for read/write (a) RAID.
operations? (b) Solid state storage.
(a) Magnetic tape. (c) Analog.
(b) Compact discs. (d) Storage-as-a-Service.
(c) Solid State drives.
(d) RAID
Ans.(c) Ans.(d)
05(2024) Page # 80
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
471. The 2nd generation programming language 472. The online analytical processing term that
that is generally specific to a computer represents a combination of systems that help
architecture (i.e., it is not portable) is aggregate, access, and analyze business data and
(a) Binary. assist in the business decision-making process is
(b) Assembly language. (a) Artificial intelligence.
(c) COBOL. (b) Data mart.
(d) C++. (c) Decision support system.
(d) Business intelligence.
Ans.(b) Ans.(d)
473. What is the hierarchy of data organization, 474. Several language interfaces exist in a database
from smallest to largest unit, for a relational management system. These typically include a data
database? definition language (DDL), a data control language
(DCL), a data manipulation language (DML), and a
(a) Bit, byte, field, record, table, database. database query language (DQL). What language
(b) Byte, bit, record, field, table, database. interface would a database administrator use to
(c) Byte, bit, table, field, record, database. establish the structure of database tables?
(d) Database, table, field, record, byte, bit.
(a) DDL (b) DQL (c) DML (d) DCL
Ans.(a) Ans.(a)
05(2024) Page # 81
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
475. User acceptance testing is more important in 476. What technology is needed in order to convert a
an objectoriented development process than paper document into a computer file?
in a traditional environment because of the
implications of the (a) Optical character recognition.
(b) Electronic data interchange.
(a) Absence of traditional design documents. (c) Bar-coding scanning.
(b) Inheritance of properties in hierarchies. (d) Joining and merging.
(c) Potential for continuous monitoring.
(d) Lack of a tracking system for changes.
Ans.(b) Ans.(a)
477. A companys management has expressed 478. Client/server architecture may potentially involve a
concern over the varied system architectures variety of hardware, systems software, and
that the organization uses. Potential security application software from many vendors. The best
and control concerns would include all of the way to protect a client/server system from
following except: unauthorized access is through
(a) There are difficulties in developing uniform (a) Thorough testing and evaluation of remote
security standards for the various platforms.
procedure calls.
(b) Users may have different user ID codes and (b) A combination of application and general
passwords to remember for the several systems
access control techniques.
that they use.
(c) Use of a commercially available authentication
(c) Having data distributed across many system.
computers throughout the organization increases
(d) Encryption of all network traffic.
the risk that a single disaster would destroy large
portions of the organization’s data.
(d) Backup file storage administration is often
decentralized.
Ans.(c) Ans.(b)
05(2024) Page # 82
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
479. Unauthorized alteration of online records can 480. What type of computer system is characterized by
be prevented by employing data that are assembled from more than one
location and records that are updated
(a) Key verification. immediately?
(b) Computer sequence checks. (a) Microcomputer system.
(c) Database access controls. (b) Minicomputer system.
(d) Computer matching. (c) Batch processing system.
(d) Online real-time system.
Ans.(c) Ans.(d)
481. Which of the following characteristics 482. Where disk files are used, the grandfather-father-
distinguishes electronic data interchange son updating
(EDI) from other forms of electronic backup concept is relatively difficult to implement
commerce? because the
(a) EDI transactions are formatted using (a) Process of updating old records is destructive.
the standards that are uniform (b) Information must be dumped in the form of
worldwide. hard copy if it is to be reviewed before used in
(b) EDI transactions are usually recorded updating.
without security and privacy concerns. (c) Magnetic fields and other environmental factors
(c) EDI transactions ordinarily are cause
processed without the Internet. off-site storage to be impractical.
(d) EDI transactions need not comply with (d) Location of information points on disks is an
generally accepted extremely time-consuming task.
accounting principles.
Ans.(a) Ans.(a)
483. A computer that is designed to provide 484. Which is least likely to be considered a component
software and other applications to other of a computer network?
computers is referred to as a
(a) Applications programs.
(a) Microcomputer. (b) Computers.
(b) Network computer. (c) Software.
(c) Server. (d) Routers.
(d) Supercomputer.
Ans.(c) Ans.(a)
05(2024) Page # 83
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
485. RISC stands for_____________ 486. The relationship between a function and its binary
(a) Reduced Instruction Set Computer. variables can be represented in____
(b) Reverse Instruction Set Computer. (a) boolean function.
(c) Reduced Implied Set Computer. (b) truth table.
(d) Reverse Implied Set Computer. (c) logic diagram.
(d) combinational circuits.
Ans.(a) Ans.(b)
487. The NOR gate is complement of ________ 488. The ALS represents _____________
(a) AND gate. (a) Arithmetic Logic Shift Unit.
(b) OR gate. (b) Auto Logic Shift Unit.
(c) NAND gate. (c) Arithmetic Logic Simple Unit.
(d) NOT gate. (d) Auto Logic Shift Unit.
Ans.(b) Ans.(a)
489. The base or radix of decimal number system 490. Which statement is valid?
is ____________
(a) 2. (b) 16. (a) 1KB = 1024 bytes.
(c) 10. (d) 8. (b) 1 MB = 2048 bytes
(c) 1 Mb = 1000 kilobytes.
(d) 1 Kb = 1000 bytes.
Ans.(c) Ans.(a)
05(2024) Page # 84
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
491. The ALU and control unit of most of the 492. A set of rules for exchanging data between two
microcomputers are combined and computers is a
manufacture on a single silicon chip. (a) Communicator.
(b) Operating system.
What is it called? (c) Protocol.
(a) Monochip. (b) Microprocessor. (d) Transmission speed.
(c) ALU. (d) Control unit.
Ans.(b) Ans.(c)
493. A webpage is most frequently created using 494. Which of the following is a risk that is higher when
an electronic funds transfer (EFT) system is used?
(a) Visual Basic. (a) Improper change control procedures.
(b) Java or C++. (b) Unauthorized access and activity.
(c) HTML or XML. (c) Insufficient online edit checks.
(d) SQL. (d) Inadequate backups and disaster recovery
procedures.
Ans.(c) Ans.(b)
495. Customers pay a fixed amount, usally 496. A __________ describes the flow of information at
monthly or quarterly or annually, to get your e-commerce site and the infrastructure that
some type of service is known as _____ will be used in the system.
E-Commerce Business Model.
05(2024) Page # 85
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
(a) Affiliate (b) Subscription (a) logical design (b) system design
(c) Lincensing (d) Transaction (c) physical design (d) tractical design
Ans.(b) Ans.(a)
497. A company’s management is concerned 498. What is the job of the Mother Board?
about computer data eaves dropping and
wants to maintain the confidentiality of its (a) Sends power to all the components
information as it is transmitted. (b) Holds all the circuits and components
together correct
The company should utilize
(c) Displays information
(a) Data encryption.
(d) Tells the computer what to do
(b) Password codes.
(c) Dial-back systems.
(d) Message acknowledgement
procedures.
Ans.(a) Ans.(b)
05(2024) Page # 86
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
501. Network operating system runs on ------
16 502. In real time operating system __________
(a) process scheduling can be done only
(a) server
once.
(b) every system in the network
b) all processes have the same priority.
(c) cloud
c) kernel is not required.
(d) both server and every system in the
d) a task must be serviced by its deadline
network
period.
Ans.(a) Ans.(d)
16
https://www.sanfoundry.com/operating-system-questions-answers/
05(2024) Page # 87
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
505. The memory devices which are similar to 506. Software is defined as ___________
EEPROM but differ in the cost
effectiveness is ______ (a) set of programs, documentation &
(a) CMOS configuration of data
(b) Memory sticks (b) set of programs
(c) Blue-ray devices (c) documentation and configuration of data
(d) Flash memory (d) None of the mentioned above
Ans.(d) Ans.(a)
507. Which type of data can be stored in the 508. Which of the following is the subset of SQL
database? commands used to manipulate Oracle
(a) Image oriented data Structures, including tables?
(b) Text, files containing data (a) Data Described Language
(c) Data in the form of audio or video (b) Data Retrieval Language
(d) All of the above (c) Data Manipulation Language
(d) Data Definition Language
Ans.(d) Ans.(d)
509. Which of the following key is required in 510. What is Cloud Computing?
to handle the data when the encryption (a) Cloud Computing means providing
is applied to the data so that the services like storage, servers, database,
unauthorised user cannot access the networking, etc
data? (b) Cloud Computing means storing data in
(a) Authorised key a database
(b) Decryption key (c) Cloud Computing is a tool used to create
(c) Encryption key an application
(d) Primary key (d) None of the above
Ans.(b) Ans.(a)
05(2024) Page # 88
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
511. Which of the following is not a type of 512. The _______ program initializes all aspects
cloud server? of the system, from CPU registers to device
(a) Public Cloud Servers controllers and the contents of main
(b) Private Cloud Servers memory, and then starts the operating
(c) Dedicated Cloud Servers system.
(d) Merged Cloud Servers (a) rom (b) bootstrap
(c) main (d) bootloader
Ans.(d) Ans.(b)
There are also three main types of cloud computing services: Infrastructure-as-a-Service (IaaS),
Platforms-as-a-Service (PaaS), and Software-as-a-Service (SaaS). Choosing a cloud type or
cloud service is a unique decision.
513. If the sum of the working – set sizes 514. ____________ is the definition of objects in
increases, exceeding the total number of the database that leads directly to a
available frames ____________ standard approach for the creation of
software documentation.
(a) the operating system selects a process
to suspend. (a) Data/data integration
(b) the system crashes. (b) Information sharing
(c) then the process crashes. (c) Document standardization
d) the memory overflows. (d) Data integrity
Ans.(a) Ans.(c)
05(2024) Page # 89
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
515. The microprocessor of a computer can 516. Which of the following is a special-purpose
operate on any information if it is present register of microprocessor?
in ______________ only.
(a) Instruction register
(a) Program Counter (b) Program counter
(b) Flag (c) Accumulator
(c) Secondary Memory (d) Temporary register
(d) Main Memory
Ans.(d) Ans.(b)
517. The term “logical view of computing 518. Which Business Process is situated at top of
resources rather than physical view”, all other processes?
define which technology..
Ans.(c) Ans.(d)
05(2024) Page # 90
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
519. A security guard at the gate of ATM is an 520. Which of the following is not a component
example of.. of Decision Support System (DSS)?
(a) Preventive Control (a) User
(b) Detective Control (b) Database
(c) Corrective Control (c) Model Base
(d) Administrative Control (d) Artificial Intelligence
Ans.(a) Ans.(d)
521. ‘X’ LPC is using Google Cloud Service for 522. In Database Management Systems (DBMS)
hosting its data / application. This use by concept, which of the following statement
the company of Google cloud can be is not correct?
classified as..
(a) File is a collection of Records
(a) Public Cloud (b) Field is a collection of characters
(b) Private Cloud (c) Characters of a collection of bits
(c) Hybrid Cloud (d) Record is a collection of files
(d) Community Cloud
Ans.(a) Ans.(d)
05(2024) Page # 91
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
523. System providing information to help 524. An organization system send a SMS to HR /
management to launch a new product control office/ head office of employess if
shall be best classified as.. attendance has not been marked on
office’s bio-metric attendance system. This
(a) Management Level System is a good example of..
(b) Strategic Level System (a) Attendance System
(c) Operational Level System (b) Biometric System
(d) Knowledge Level System (c) Business Process Automation
(d) Business Process
Ans.(b) Ans.(c)
525. 5 Right’s, namely; Right Time, Right 526. In a proposed system, entity finds that
Customer, Right Price, Right Place and system does not have an option to modify
Right Product are part of.. rates of TDS. The need may arise whenever
law changes in future. This failure may be
(a) ERP defined as failure of…
(b) CRM
(c) SCM (a) Economic Feasibility
(d) CBS (b) Legal Feasibility
(c) Operational Feasibility
(d) Schedule Feasibility
Ans.(c) Ans.(b)
05(2024) Page # 92
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
527. SaaS model in cloud computing is a good 528. All but one can be used as an input as well
example of.. as an output device.
529. In terms of geographical spread, which 530. All are types of Expert System, except..
has the largest footprint?
(a) Rule Based
(a) VPN
(b) Policy Based
(b) LAN
(c) Example Based
(c) MAN
(d) Frame Based
(d) WAN
Ans.(d) Ans.(b)
05(2024) Page # 93
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
531. Purchasing and selling products online is 532. Which is the model in E - Commerce, if the
referred to as? seller is a business and the individual is an
consumer?
(a) E-Commerce (a) Consumer to Business (C2B)
(b) Cyber-Selling (b) Business to Consumer(B2C)
(c) Hyper-Marketing (c) Business to Business (B2B)
(d) E-Tech Marking (d) Consumer to Consumer (C2C)
Ans.(a) Ans.(b)
533. What is the abbreviation of CGI? 534. What is the full form of EDI?
535. Which card permits online payment using 536. Which of the following authenticates and
balance amount available in bank handles credit card payment for E-
account? Commerce?
05(2024) Page # 94
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
537. Which is the function of specifying access 538. Which is the model in E - Commerce, if the
rights to resources related to information seller and buyer are both business firms?
security?
(a) Consumer to Business (C2B)
(a) OTP (b) Business to Consumer (B2C)
(b) Pin (c) Business to Business (B2B)
(c) Authorization (d) Consumer to Consumer (C2C)
(d) Passcode
Ans.(c) Ans.(c)
539. Which is the model in E - Commerce, if 540. The processes that keep track of all mobile
the seller and the buyer are the both hosts visiting the area is _________
individuals?
(a) Consumer to Business (C2B) (a) Home agent
(b) Business to Consumer (B2C) (b) Mobile agent
(c) Business to Business (B2B) (c) Foreign agent
(d) Consumer to Consumer (C2C) (d) User agent
Ans.(d) Ans.(c)
05(2024) Page # 95
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
541. Terminals are required for _________ 542. The network in which all the nodes are
(a) Real-time, batch processing & symmetric and there is no central control
timesharing or hierarchy is ________
(b) Real-time, timesharing & distributed
message processing (a) Distance Server Technology
(c) Real-time, distributed processing & (b) Client Server Technology
manager inquiry (c) Peer-to-Peer (P2P)
(d) Real-time, time sharing & message (d) MANET
switching
Ans.(d) Ans.(c)
543. Each packet is routed independently in 544. Time out determination policy is used in
__________ _________
(a) Network layer
(a) Virtual circuit subnet
(b) Data link layer
(b) Short circuit subnet
(c) Transport layer
(c) Datagram subnet
(d) Application layer
(d) ATM subnet
Ans.(c) Ans.(c)
05(2024) Page # 96
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
545. ________is used to validate the identity 546. Sending a packet to all destinations
of the message sender to the recipient. simultaneously is called _________.
(a) Encryption (b) Digital certificate (a) Multicasting (b) Uni-casting
(c) Decryption (d) Authtication (c) Telecasting (d) Broadcasting
Ans.(b) Ans.(d)
547. A permanent virtual circuit involves 548. Which of the following circuit is used as a
________ special signal to demultiplex the address
(a) Connection establishment bus and data bus?
(b) Data transfer (a) Priority Encoder (b) Decoder
(c) Connection release (c) Demultiplexer
(d) Connection check (d) Address Latch Enable
Ans.(b) Ans.(d)
549. Whenever a process needs I/O to or from 550. Software Debugging is known as _______
a disk it issues a ______________ (a) creating program code
(a) a special procedure (b) creating the algorithm
(b) system call to the operating system (c) identifying the task to be computerized
(c) system call to the CPU d) finding and correcting errors in the
(d) all of the mentioned program code
Ans.(b) Ans.(d)
05(2024) Page # 97
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
551. Flow control policy is implemented in 552. The PSTN is an example of a ________
__________ network.
(a) Packet switched
(a) Network layer
(b) Circuit switched
(b) Transport layer (c) Message switched
(c) Application layer (d) Combined switched
(d) Physical layer
Ans.(b) Ans.(b)
553. What is the type of network in which the 554. Which type of switching uses the entire
routers themselves are mobile? capacity of a dedicated link?
05(2024) Page # 98
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
555. LANs can be connected by a device 556. In which routing method do all the routers
called __________ have a common database?
557. When seeking to upgrade for a particular 558. Which of the following is not an advantage
motherboard what do you need to of secondary memory?
know?
(a) Memory (a) It is cost-effective
(b) Hard drive (b) It has large storage capacity
(c) Make & model (c) It has highest speed
(d) It is easily portable
(d) Country of origin
Ans.(c) Ans.(a)
559. Which of the following data structure 560. As opposed to detailed transaction
can’t store the non-homogeneous data information, the management information
elements? system (MIS) responds to the need for
(a) Arrays (a) Electronic data processing
(b) Records (b) Managerial information
(c) Pointers (c) Accounting application
(d) Stacks (d) Utility billing information
Ans.(a) Ans.(b)
561. Which of the following in not a function 562. A sequence of instructions, in a computer
of DBA? language, to get the desired result, is known
(a) Routine Maintenance as
(a) Algorithm
(b) Schema Definition
(b) Decision Table
(c) Authorization for data access
(c) Program
(d) Network Maintenance (d) Network
05(2024) Page # 99
Information Technology
By Md. Monowar Hossain, FCA,CISA,CPFA(UK)
[email protected]
CA
Information Technology
MCQ for exam preparation:
Ans.(d) Ans.(c)
563. ChatGPT is a large language model chatbot 564. The maximum count which a 6-bit binary
developed by OpenAI based on GPT-3.5. It has a word can represent is
remarkable ability to interact in conversational
dialogue form and provide responses that can (a) 36
appear surprisingly human. What is the GPT? (b) 63
(a) Generative Pre-determined Translator (c) 64
(b) Generative Pre-trained Transformer (d) 65
(c) Generative Pre-decided Transformer
(d) None of the above
Ans.(b) Ans.(c)
565. Which of the following is not a core 566. What is the purpose of a router?
component of an operating system?
(a) To connect two or more networks
(a) Process Manager
(b) To provide secure access to the internet
(b) Database Manager
(c) To provide a connection to a modem
(c) File Manager
(d) To provide a connection to a server
(d) Memory Manager
Ans.(b) Ans.(a)
CA
Information Technology
MCQ for exam preparation:
567. Which of the following is not an example 568. Which of the following is not a type of
of a computer application? computer memory?
569. Which of the following is not a type of 570. Which of the following is not an example
Computer Security? of a software application?
(a) Data security (a) Web browsers
(b) Network security (b) Operating systems
(c) System security (c) Word processors
(d) Lifetime Security (d) Monitors
Ans.(d) Ans.(d)
571. What is the purpose of a software patch? 572. Which of the following is an example of a
database?
(a) To add additional features to a
program (a) Microsoft Word
(b) To upgrade a program to a new version (b) Microsoft Excel
(c) To fix existing bugs and security issues (c) Microsoft Access
(d) To install a new program (d) Microsoft Outlook
Ans.(c) Ans.(c)
573. What is the output of the following code? 574. Which of the following is not a form of
int x = 7; ransomware?
int y = 5; System.out.println(x * y); (a) Trojan Horse (b) WannaCry
(a) 35 (b) 12 (c) 17 (d) None (c) Spyware (d) CryptoLocker
Ans.(a) Ans.(c)
575. Which of the following is a feature of a 576. What is the purpose of a Firewall?
client/server network?
(a) All users are connected to a single (a) To provide anti-virus protection
computer (b) To monitor user activity
(b) Data is stored on a central server (c) To provide secure storage
(c) All users have equal access rights (d) To provide a secure gateway between
(d) Connections are made through cables networks
Ans.(b) Ans.(d)
CA
Information Technology
MCQ for exam preparation:
577. What type of attack is an attacker 578. What is the purpose of Chatbot?
attempting when they use a denial-of-
service attack? (a) To provide automated customer service
(b) To provide automated online support
(a) Buffer overflow
(c) To provide automated data entry
(b) Malware
(d) To provide automated customer
(c) Phishing
satisfaction
(d) Distributed denial-of-service
Ans.(d) Ans.(a)
579. How can you prevent data loss when 580. Which of the following best describes the
using Excel? purpose of a spreadsheet?
(a) To create a graphical representation of
(a) Use the AutoSave feature
data
(b) Save the file regularly
(b) To maintain a list of data
(c) Use the Password Protect feature
(c) To store and manipulate data
(d) All of the above
(d) To analyze data
Ans.(d) Ans.(c)
581. Which of the following is not a type of 582. What is the most popularly used computer
computer? language?
(a) Mainframe (b) Laptop (a) Java (b) Python
(c) Calculator (d) Server (c) C++ (d) HTML
Ans.(c) Ans.(b)
583. Which of the following is a type of cloud 584. Which of the following is a process of
computing? evaluating the security of an information
(a) Software as a Service (SaaS) system?
(b) Platform as a Service (PaaS) (a) Risk Assessment
(c) Infracture as a Service (IaaS) (b) Penetration Testing
(d) All of the Above (c) Vulnerability Scanning
(d) All of the above
Ans.(d) Ans.(d)
CA
Information Technology
MCQ for exam preparation:
585. When it comes to IT audit, the acronym SOC 586. Which of the following is a best practice when
stands for conducting an IT audit?
(a) Systematic Organizational Compliance (a) Ask questions that are easy to answer.
(b) System and Organization Controls (b) Rely on management’s assurances.
(c) Document the audit process.
(c) Service Organization Controls
(d) Use a checklist to ensure all areas are
(d) Security Operational Compliance
covered.
Ans.(c) Ans.(d)
587. Which of the following is NOT an 588. What is the main purpose of e-commerce?
example of a security control? (a) To facilitate the exchange of goods and services
between businesses and consumers
(a) Access Control (b) To provide a platform for online marketing and
(b) Backup and Recovery advertising
(c) Encryption (c) To enable secure online payments
(d) Installing Malware (d) To increase customer loyalty
Ans.(d) Ans.(a)
589. The transfer of assets, money, or services 590. What is the most important purpose of
from one party to another over a supply chain management?
computer-mediated network is known as
(a) e-commerce (a) To reduce costs
(b) To improve customer service
(b) e-business
(c) To increase efficiency
(c) e-transaction
(d) To reduce inventory
(d) e-payment
Ans.(c) Ans.(b)
591. A hard disk drive is a: 592. Which of the following is an example of
system software?
(a) peripheral device
(a) Microsoft Word
(b) software program
(b) Microsoft Windows
(c) system component (c) Microsoft Skype
(d) data storage device (d) Microsoft Excel
Ans.(d) Ans.(b)
CA
Information Technology
MCQ for exam preparation:
593. What is the purpose of software? 594. What is the best way of connecting two
(a) To provide instructions for a computer to buildings that are located in close proximity
follow to each other?
(b) To store data (a) Ethernet
(c) To allow the user to interact with the (b) Wireless
operating system (c) Fiber Optic
(b) To create a user interface (d) Coaxial
Ans.(a) Ans.(b)
595. What was the first electronic computer? 596. Which of the following programming
languages was developed in the 1950s?
(a) ENIAC (b) Z3 (a) Fortran (b) Python
(c) EDVAC (d) ABC (c) Java (d) C++
Ans.(a) Ans.(a)
597. What is the purpose of Customer 598. Which of the following is the most popular
Relationship Management (CRM)? web browser?
(a) To improve customer service
(a) Google Chrome
(b) To increase customer loyalty (b) Mozilla Firefox
(c) To increase sales (c) Microsoft Internet Explorer
(d) All of the above (d) Safari
Ans.(d) Ans.(a)
599. Enterprise Resource Planning (ERP) is a 600. The purpose of the CA Certificate Level
software application used for Exam is to:
(a) managing and automating the (a) Assess the candidate's knowledge of
financial processes of a business accounting principles and practices.
(b) automating the production processes (b) Assess the candidate's ability to pass a
of a business professional examination.
(c) automating the inventory (c) Assess the candidate's knowledge of
management processes of a business the CA Code of Ethics.
(d) All of the above (d) Assess the candidate's knowledge of
the legal framework.
Ans.(d) Ans.(a)