LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Select The Blank Question ________ do not have direct access to organizational data but usually use data that have been extracted from relevant databases. Correct Answer DSS Your Answer
DSS
Multiple Choice Multiple Answer Question Some of the popular reasons for breaking into computer system are :Correct Answer Money , Dishonor , Challenge of doing it data dictionary Your Answer
Money , Challenge of doing it data dictionary
True/False Question
Tick IT also includes ISO - 9002 document.
Correct Answer False Your Answer
False
Multiple Choice Multiple Answer Question The different techniques used for collecting primary data are :Correct Answer Interviews. , Observations. , Questionnaires. Your Answer
Interviews. , From newspapers. , Observations.
Multiple Choice Single Answer Question While controlling remote dial-in capabilities one of the following aspects need to be given consideration :Correct Answer Remote Access Servers Your Answer
Remote Access Servers
Multiple Choice Single Answer Question In the following type of "Asking method", the participants are asked to define ideal solutions and then select the best feasible ideal solution :Correct Answer Guided brainstorming. Your Answer
Guided brainstorming.
Select The Blank Question ________ helps integrate data from a number of heterogeneous sources.