0 of 60 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 60 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
An Enterprise Information System (Eis) Provides A Technology Platform That Enables Organizations To Integrate And Coordinate Their Business Processes On A Robust Foundation. Identify The Statement That Does Not Fall Under The List Of Objectives Of Eis.
Depending On The Size, Nature Of Work And Complexity Involved In The Processes Of An Organization; Business Processes Are Often Broken Up Into Different Categories ‘ Primary, Secondary And Management Processes. Which One Of The Following Falls Under The Purview Of Primary Processes?
A Manufacturing Company Is Facing An Issue Of Not Being Able To Provide Timely Supply Of Its Products To The Customers. Mr. Anil, An Is Auditor Of This Company Identified That The Delay Is Due To The Manual Processing Of Certain Processes Involved In The Company. He Suggested That The Company Should Adopt _______ To Overcome The Problem.
Mr. X Has Setup His New Business Of Manufacturing Color Pens. He Is Well Known About Various Kinds Of Risks Involved In His Business; However, He Unintentionally Violated Some Industry Regulations While Setting Up His Business. Which Category Of The Risk Does This Refer To?
Gigs And Gigs, The Food Court In A Shopping Mall Wants To Automate Its Manual Cash Counter Into An Automated Card System. Same Card Can Be Used At Various Food Outlets In The Food Court. This Automation Optimizes The Information Flow In Service And Billing. Identify From The Following Objectives Of Business Process Automation That Gigs And Gigs Is Achieving By Using This Method.
Mr. Z Is Pursuing The Course Of Mca And Is Undergoing The Practical Training In An E-Commerce Company. He Has Been Given A Task To Prepare A Flowchart Describing The Flow Of Transactions Through Various Modes Of Payment Used By Customers To Pay The Bill To Company. Identify The Terminology That Is Irrelevant To The Process Of Making Of Flowcharts.
Enterprise Risk Management (Erm) Framework Consists Of Interrelated Components That Are Used To Identify Events That Are Relevant To Organization’S Objective. Identify Which Of The Following Is Not A Component Of Erm Framework.
The Objective Of Internal Control Is To Enable An Organization To Manage Its Challenges Or Disruptions Seamlessly. Identify Which Of The Following Is Not An Objective Of Internal Control.
Which one of the following deals with Section 143 of the Companies Act, 2013?
Abc Corporative Bank Strictly Follows The Policy Of Sensitive Personal Information. Choose The Attribute That Is Not Defined As Sensitive Personal Information.
Mr. Shravan, Hr Manager Of A Multinational Company (Mnc) Asked His Subordinate To Prepare The Files Of Various Processes Involved In Human Resource Management. Which Of The Following Does Not Form Part Of Hr Management?
To Make A Success In The Business And To Reduce The Timing Of Manual Work, The Organization Should Implement Business Process Automation (Bpa) Which Involves Documentation As Well. Which Of The Following Is Not A Benefit Of Documentation Of Bpa Implementation?
An Online Store Follows A Process Of Intimating About Whole Tracking Of The Order Placed By The Customers Through Sms On Their Registered Mobile Numbers. This Activity Is A Perfect Example Of ______.
A huge oil spilled from an oil well run by British Petroleum, one of largest oil companies in world, and resulted in an assessed environmental damage of about USD 20 Billion. The company expanded an amount of USD 2 Billion on promotional ads informing the world that it is an environment friendly company. The promotional advertisements were done to prevent the company from ___ damage.
A bank shares financial data of its borrowers with third-party without consent of borrowers. Identify the rule of Sensitive Information and Personal Data Rules, 2011 that bank has violated.
As An Internal Auditor Of A Steel Company, Mr. Ajay Observed That The Vendor Supplying The Material To Manufacture Steel Has Begun To Supply The Damaged Material. He Reported This Issue To The Company’S Top Management. Which Of The Following Risk Management Strategy Would Be Followed By Top Management Of Company, If They Decided To Seek For More Capable Supplier And Leave The Current Supplier?
In The Bi-Annual Meeting Of Def Hotel Group, The Senior Officials Are Discussing Risks That Could Impact Hotel’S Effective Working In Relation To Customer Satisfaction And Change Integration. Which Of The Following Business Risk Is Being Discussed In The Meeting?
Identify From The Following Controls That Does Not Belong To Information Technology General Controls.
A&B Financial Ltd. Company Provides Loans Against Gold. The Company Has Created Policy To Ensure Each Disbursed Loan Has Been Properly Documented, Gold Accepted As Security Has Been Properly Valued And Same Is Kept In Secured Vaults. _________ Would Ensure Management’S Directives To Mitigate Risks To The Achievement Of Objectives Are Carried Out. Fill In The Blank With Appropriate Option From The Following.
K&K Son’S Ltd. Automated All Its Business Processes To Operate Efficiently And Effectively. Identify The Factor That Is Responsible To Ensure That No Unauthorized Amendments Can Be Made In Its Data After Implementing Business Process Automation.
Mr. X Is Responsible To Maintain The Inventory Of Newly Opened Showroom Of Electronic Goods In Delhi. From The Following, Identify The Item Which Does Not Form Part Of Inventory Master Data.
Xyz Ltd. Is An Ink Manufacturing Company That Implemented Enterprise-Wide Information System To Coordinate All Resources And Activities Required To Complete Various Business Processes. Choose The Main Characteristic Of Erp System From Following.
To Sustain In Today’S Competitive World And Make The Business A Success, Organizations Are Implementing Erp System And Getting Many Benefits From The Same. From The Following, Which Is Not A Benefit Of Erp?
Mr. Rajesh Has Developed Accounting Software For A Private Firm. While Explaining The Benefits Of Software To Company’S Management, He Made A False Statement About The Back End Of Software. Identify From The Following Statements Which He Would Have Said About Back End.
Mr. X Works On Financial And Accounting System Of A Private Firm And Maintains Different Types Of Master Data In The System. Which Of The Following Master Data Is Not Controlled By The User And Depends On The Changes Recommended By The Government Time-To-Time?
All Of The Following Represents The Attributes Of Information Provided By Management Information System Except One. Identify The Odd One Which Does Not Belong To This Category.
Mr. Rajiv, A System Administrator Installed Application Software For Attendance System Of Employees In Automated Working Environment Of Raj And Sons Ltd. During The Briefing Session About The System To Management Of Raj And Sons Ltd., He Made Certain Statements Mentioned Below. Out Of These, Choose The Statement That Is Not True For Installed Software Application.
The Implementation Of _________ Involves Extract, Transform And Load (Etl) Procedures In Coordination With A Data Warehouse And Then Using One Or More Reporting Tools.
While Presenting Data Analytics Report To The Members Of Top Management Of His Firm, Mr. X Used Acronym Of Various Data Analytics Tools Which Were Non-Understandable By Many Members. One Of The Terms That He Often Referred Was Olap. Help The Members In Solving Confusion And Finding The Full Form Of Olap.
Sales And Distribution Module Is One Of An Important Modules Of Erp Package. Which Of The Following Activity Does Not Belong To Sales And Distribution Process?
If An Organization Does Not Want To Install Financial Application On Its Own System To Avoid The Hassles Of Its Implementation And Maintenance, They Can Use _______ Applications As An Alternative Of The Same.
Mr. B, Who Works For Private Firm Abc Ltd., Is Required To Make An Entry In The Accounting System For Maintaining A Record Of Physical Receipts Of Goods Purchased From One Of The Firm’S Vendor. Which Type Of Voucher Shall He Use To Do The Same?
In Accounting System, Various Types Of Vouchers Are Required To Maintain Transactions Within Organization. Which Of The Following Transaction Is Not Recorded In The Voucher Type “Contra” Of The Accounting System?
Mr. R Is An Accountant Of An Engineering College Who Works On Accounting System Of The College. He Is Responsible To Record All Types Of Payments – Salaries And Incentives, Made To Teaching And Non- Teaching Staff Through Any Mode. Identify The Type Of Voucher Of Accounting Module Used For This Purpose.
Mr. Anil Is A Clerk In Accounts Department Of Gbs Public School Who Works On Accounting System Well Implemented In The School. He Is Supposed To Record The Details Of Purchase/Sale Of Fixed Assets On Credit. Identify The Voucher From Following Which Is Being Used By Him For This Work.
Jkm Pvt. Ltd. Is An Apparel Manufacturing Company Well Equipped With Erp. Mm Group Approached Jkm Pvt. Ltd. With A Requisition Of Pieces Of Female Black Formal Suits. Mr. Y, A Senior Manager Of Jkm Pvt. Ltd. Wants To Evaluate The Current Stock Position And Purchase Order Pending Position Of His Company Before Accepting The Requisition. Which Of Following Module Of Erp Will Help Mr. Y In This?
Vv Enterprises Is A Publication House That Publishes Kids’ Newspaper, Reading And Activity Books. The Management Of Vv Enterprises From Its R&D Department Demanded An Analysis On Consumer Behaviour On Purchase Of Its Publications During Summer Break And Exam Time. Which Of The Following Data Analytical Tool Would Be Helpful To R&D Department?
Identify The False Statement From The Following Statements On Various Modules Of Erp.
Organizations Implementing Erp Should Be Abreast Of Latest Technological Development. The Control Where Care Must Be Taken While Selecting The Vendor And Upgrade Contracts Should Be Signed To Minimize The Risks, It Belongs To _______ Aspect Of Technological Risks.
Abc Company Started Using Sap As Application Software For Its Hr And Accounting Department. Which Of The Following Layer Of The Software Carries The Instruction And Processes Them Using Data Stored In Database?
Information Systems Not Only Establish Communication But Also Support Decision Making Within An Organization. Below Mentioned Are The Components That Comprise An Information System Except One. Identify That Odd One Out.
Communication Controls Responsible To Handle Exposures Caused During The Internetwork Communication Are Categorized Further Based On The Specific Functions Performed. Which Of The Following Communication Control Incorporates Features That Mitigate The Possible Effects Of Exposure?
In A Computer System, A ______ Memory Which Is Volatile In Nature And Can Read And Modify The Information Is Also Referred As ______.
In Dbms, Relational Database Model Allows The Data And Its Related Operations Like Storage, Retrieval, And Integrity In A Table Structure. All The Terms Mentioned Below Are Associated With Relational Database Model Except One. Pick That Odd One Out.
Corrective Controls Are Designed To Reduce The Impact Or Correct An Error Once It Has Been Detected. Which Of The Following Is Not An Example Of Corrective Control?
Mr. Y, A Senior Network Administrator Of Hkl Pvt Ltd., Sent A Confidential Data Of The Company To Its Chief Financial Officer. For Secure Data Transmission In A Network, __________Is A Technique That Converts Data Into A Secret Code For Storage In Databases.
The data entry operator of GC College is responsible to enter the amount of fees paid by the students. Accidentally, while making the entry, the fee amount of Ms. X of the amount ` 9854 was entered as ` 8954 in the software, leading to the reverse of two digits in the amount. Under Data Coding Control, which of the following error is made by data entry operator in this case?
As A System Administrator Of A Newly Established Start-Up Kjl Ltd., Mr. Kamal Sets Up Its Computer Network In Such A Way That Enables The Network To Recover From Any Kind Of Error Like Connection Failure, Loss Of Data Etc. In Computer Network, Which Of The Following Term’S Definition Takes Care Of The Said Activities?
Every Time When A User Attempts To Gain Access To And Employs System Resources In An Application, The Chronology Of Each Such Event Is Maintained. Which Application Control Is Responsible To Do So?
Under Application Controls Of Information Systems, __________ Maintains The Chronology Of Events That Occur Either To The Database Definition Or The Database Itself.
Big Data Has Captured The Attention Of Businesses For Its Processing Power To Analyse The Data For Many Benefits That It Provides. Below Mentioned Are Some Of Its Benefits, Except One. Identify It.
Ms. Shilpi Is A Final Year Student Of B.Tech Who Is Required To Submit Her Project Report On Library Management System Based On Relational Database Model. Which Of The Following Example Does Not Belong To Relational Database?
Nice Collection Is Women Apparel Store With Many Branches In Various Cities Of India. The Management Of Store Uses Data Mining Technique To Make Analysis To Determine The Sale On Weekends Of Festive Month In Cities With Population Less Than 70000 ,. Which Of The Following Is Not Involved In The Technique Used?
An Is Auditor Is Using An Audit Tool That Involves Embedding Audit Software Modules Within A Host Application System To Provide Continuous Monitoring Of System’S Transactions. Which Audit Tool Does This Refer To?
Mr. Ashu Works In A Network Service Provider Company Where His Job Responsibility Includes Performing Routine Tasks In The Network Such As Making Minor Configuration Changes And Monitoring Event Logs. Which Of The Following Role Does He Perform In The Company?
Mr. Y Used Duplicate Keys To Enter In Prohibited Area Zone Of Jkh Ltd. Company And Stole Some Important Documents Of The Company. Which Of The Following Control You Think Has Been Compromised To Make Such An Incident Happen?
Below Mentioned Are The Steps That Are Involved In The Data Mining Process. Select The Step Wherein The Data Is Collected From All The Different Sources To Initiate The Process.
Output Controls Are Responsible To Ensure That The Data Delivered To Users Will Be Presented, Formatted, And Delivered In A Consistent And Secured Manner. Which Of The Following Activity Does Not Fall Under The Purview Of Output Control?
Which Of Following Statement Does Not Belong To Read Only Memory?
Operating System Software Provides Application Program Interfaces (Api) Which Can Be Used By Application Developers To Create Application Software. This Is Referred To As ______.