TQ With Answer Key
TQ With Answer Key
ACT 05
PRELIMINARY EXAMINATION
Name: Course/Year:
____________3. Which technology allows devices to communicate over the internet without human
intervention?
a) Cloud computing c) Internet of Things (IoT)
b) Artificial Intelligence d) Blockchain
____________9. Which system collects, processes, and stores data from business transactions?
a) Expert System c) Transaction Processing System
b) Management Information System d) Decision Support System
____________11. Which of the following is a type of system used to automate office tasks like email
handling and scheduling?
a) Decision Support System c) Knowledge Management System
b) Office Automation System d) Transaction Processing System
TEST-II
1. An Information System: An organized combination of people, hardware, software,
networks, data sources, and policies and procedures that store, retrieve, transform, and
disseminate information within an organization.
2. Office Automation System (OAS)
3. Artificial Intelligence (AI)
4. Big Data
5. Decision Support System (DSS)
6. Management Information System (MIS)
7. Expert System (ES)
8. Virtual Reality (VR)
9. Internet of Things (IoT)
10.Transaction Processing System (TPS)
11.Blockchain
12.Knowledge Management System (KMS)
13.Remote data storage and access
14.Technological Pressure
15.Digital Transformation
TEST-III
Enumerate the major technological trends in Information Technology.
Answer:
1. Internet of Things (IoT)
2. Artificial Intelligence (AI)
3. Cloud Computing
4. Big Data
5. Virtual and Augmented Reality
6. Blockchain
7. Edge Computing
8. Machine Learning
Name the different types of Information Systems.
Answer:
1. Transaction Processing System (TPS)
2. Management Information System (MIS)
3. Decision Support System (DSS)
4. Expert System (ES)
5. Office Automation System (OAS)
6. Knowledge Management System (KMS)
List the main managerial challenges related to Information Technology.
Answer:
1. Big Data Management
2. Asset and Data Management
3. Data Protection
4. Evolving Cybersecurity Threats
5. Skills Gap