Showing posts with label Information system Audit. Show all posts
Showing posts with label Information system Audit. Show all posts

Sunday, November 30, 2025

MCQ questions on Data Analytics

MCQ questions on Data Analytics...

Section A:

*1. Big Data & Data Types*

_Which characteristic best defines “Big Data” in the context of IS audit?_

A) Small volume of structured data

B) High volume, velocity, and variety of data 

C) Only financial transaction records

D) Data stored exclusively on mainframes


*2. Data & Information*

_Information differs from data primarily because it:_

A) Is raw facts

B) Has context and meaning 

C) Is stored in databases

D) Never changes


*3. Data Analytics*

_Which technique is most appropriate for detecting patterns in large datasets?_

A) Manual sampling

B) Descriptive statistics

C) Predictive data analytics 

D) Compliance testing


*4. Data Integrity*

_Which control BEST ensures data integrity during data entry?_

A) Field checks 

B) Data encryption

C) Backup procedures

D) Network firewalls


*5. Data Mining*

_Data mining is primarily used to:_

A) Store current operational data

B) Discover hidden patterns in large datasets 

C) Perform routine transaction processing

D) Conduct physical security audits


*6. Data Warehouse & Data Mart*

_What is the main difference between a data warehouse and a data mart?_

A) Data warehouses store only current data; data marts store historical data

B) Data warehouses are department‑specific; data marts are enterprise‑wide

C) Data warehouses are centralized repositories of integrated data; data marts are subsets for specific user groups 

D) Data warehouses are cloud‑only; data marts are on‑premises only


*7. Structured, Unstructured & Semi‑Structured Data*

_Which of the following BEST describes “semi‑structured” data?_

A) Data that fits neatly into rows and columns

B) Data without any organization

C) Data that contains tags or markers to separate elements (e.g., XML, JSON) 

D) Data stored only in paper files


*8. Data Science & Cloud Computing*

_In cloud computing, “Software as a Service (SaaS)” means:_

A) The organization provides hardware to users

B) The provider delivers applications over the internet 

C) Users manage the underlying infrastructure

D) Data is stored only on local servers


*9. Computer Bug & Computer Virus*

_Which statement accurately differentiates a “bug” from a “virus”?_

A) A bug is malicious code; a virus is a coding error

B) A bug is an unintentional coding error; a virus is malicious software 

C) Both are types of malware

D) Bugs affect hardware; viruses affect software


*10. Data Redundancy*

_Which of the following is a benefit of controlled data redundancy?_

A) Improves data consistency when properly managed 

B) Reduces storage costs

C) Increases risk of unauthorized access

D) Eliminates the need for backups


*11. Data Life Cycle*

_Which phase of the data life cycle involves deciding when data is no longer needed and can be destroyed?_

A) Creation

B) Usage

C) Retention

D) Disposal 


*12. Data Visualization*

_The primary purpose of data visualization is to:_

A) Encrypt sensitive data

B) Present data in graphical formats to aid understanding 

C) Increase data storage capacity

D) Perform complex calculations


*13. Application Controls*

_Which of the following is an example of an application control?_

A) Firewalls

B) Input validation checks 

C) Intrusion detection systems

D) Physical access locks


Section B:

1. Big Data & Data Types

_Which “V” of Big Data refers to the speed at which data is generated and processed?_

A) Volume

B) Variety

C) Velocity 

D) Veracity


2. Structured vs. Unstructured Data

_Which of the following is an example of unstructured data?_

A) Relational database tables

B) CSV files

C) Emails 

D) Excel spreadsheets


3. Semi‑Structured Data

_XML and JSON are examples of:_

A) Structured data

B) Unstructured data

C) Semi‑structured data 

D) No data


4. Data Analytics – Types

_Descriptive analytics helps organizations:_

A) Predict future trends

B) Summarize historical data 

C) Recommend optimal actions

D) Identify hidden patterns


5. Data Integrity Controls

_Which control is MOST effective to prevent unauthorized alterations of financial data?_

A) Data encryption at rest

B) Digital signatures 

C) Regular backups

D) Network intrusion detection


6. Data Mining

_The “association rule learning” technique in data mining is used to:_

A) Classify data into predefined categories

B) Discover relationships between variables 

C) Reduce dataset dimensionality

D) Perform statistical hypothesis testing


7. Data Warehouse & Data Mart

_Data marts typically serve which of the following purposes?_

A) Store all enterprise data in raw form

B) Provide department‑specific analytical data 

C) Replace operational databases

D) Perform real‑time transaction processing


8. Cloud Computing Models

_In which cloud service model does the provider manage the operating system, middleware, and runtime?_

A) IaaS

B) PaaS 

C) SaaS

D) Hybrid cloud


9. Computer Bug vs. Virus

_A “bug” in software typically results from:_

A) Intentional malicious code

B) Unintentional programming error 

C) Hardware failure

D) User negligence


10. Data Redundancy

_Controlled redundancy in a database improves:_

A) Storage cost efficiency

B) Fault tolerance 

C) Processing speed exclusively

D) Complexity of queries


11. Data Life Cycle – Retention

_During which phase are data retention policies defined?_

A) Creation

B) Usage

C) Retention 

D) Disposal


12. Data Visualization

_Which chart type is BEST for showing trends over time?_

A) Pie chart

B) Line chart 

C) Scatter plot

D) Heat map


13. Application Controls – Input Controls

_Which of the following validates that a date entry falls within a permissible range?_

A) Check digit

B) Reasonableness check 

C) Hash total

D) Authorization check


14. Cloud Data Security

_When data resides in a public cloud, which party is primarily responsible for physical security of the data center?_

A) Cloud customer

B) Cloud provider 

C) Third‑party auditor

D) End‑users


15. Data Science Lifecycle (CRISP‑DM)

_Which step follows “Data Understanding” in the CRISP‑DM methodology?_

A) Business Understanding

B) Data Preparation 

C) Modeling

D) Evaluation


www.gmsisuccess.in



ANSWERS:

MCQ questions on Data Analytics...

Section A:

*1. Big Data & Data Types*

_Which characteristic best defines “Big Data” in the context of IS audit?_

A) Small volume of structured data

B) High volume, velocity, and variety of data ✅

C) Only financial transaction records

D) Data stored exclusively on mainframes


*2. Data & Information*

_Information differs from data primarily because it:_

A) Is raw facts

B) Has context and meaning ✅

C) Is stored in databases

D) Never changes


*3. Data Analytics*

_Which technique is most appropriate for detecting patterns in large datasets?_

A) Manual sampling

B) Descriptive statistics

C) Predictive data analytics ✅

D) Compliance testing


*4. Data Integrity*

_Which control BEST ensures data integrity during data entry?_

A) Field checks ✅

B) Data encryption

C) Backup procedures

D) Network firewalls


*5. Data Mining*

_Data mining is primarily used to:_

A) Store current operational data

B) Discover hidden patterns in large datasets ✅

C) Perform routine transaction processing

D) Conduct physical security audits


*6. Data Warehouse & Data Mart*

_What is the main difference between a data warehouse and a data mart?_

A) Data warehouses store only current data; data marts store historical data

B) Data warehouses are department‑specific; data marts are enterprise‑wide

C) Data warehouses are centralized repositories of integrated data; data marts are subsets for specific user groups ✅

D) Data warehouses are cloud‑only; data marts are on‑premises only


*7. Structured, Unstructured & Semi‑Structured Data*

_Which of the following BEST describes “semi‑structured” data?_

A) Data that fits neatly into rows and columns

B) Data without any organization

C) Data that contains tags or markers to separate elements (e.g., XML, JSON) ✅

D) Data stored only in paper files


*8. Data Science & Cloud Computing*

_In cloud computing, “Software as a Service (SaaS)” means:_

A) The organization provides hardware to users

B) The provider delivers applications over the internet ✅

C) Users manage the underlying infrastructure

D) Data is stored only on local servers


*9. Computer Bug & Computer Virus*

_Which statement accurately differentiates a “bug” from a “virus”?_

A) A bug is malicious code; a virus is a coding error

B) A bug is an unintentional coding error; a virus is malicious software ✅

C) Both are types of malware

D) Bugs affect hardware; viruses affect software


*10. Data Redundancy*

_Which of the following is a benefit of controlled data redundancy?_

A) Improves data consistency when properly managed ✅

B) Reduces storage costs

C) Increases risk of unauthorized access

D) Eliminates the need for backups


*11. Data Life Cycle*

_Which phase of the data life cycle involves deciding when data is no longer needed and can be destroyed?_

A) Creation

B) Usage

C) Retention

D) Disposal ✅


*12. Data Visualization*

_The primary purpose of data visualization is to:_

A) Encrypt sensitive data

B) Present data in graphical formats to aid understanding ✅

C) Increase data storage capacity

D) Perform complex calculations


*13. Application Controls*

_Which of the following is an example of an application control?_

A) Firewalls

B) Input validation checks ✅

C) Intrusion detection systems

D) Physical access locks


Section B:

1. Big Data & Data Types

_Which “V” of Big Data refers to the speed at which data is generated and processed?_

A) Volume

B) Variety

C) Velocity ✅

D) Veracity


2. Structured vs. Unstructured Data

_Which of the following is an example of unstructured data?_

A) Relational database tables

B) CSV files

C) Emails ✅

D) Excel spreadsheets


3. Semi‑Structured Data

_XML and JSON are examples of:_

A) Structured data

B) Unstructured data

C) Semi‑structured data ✅

D) No data


4. Data Analytics – Types

_Descriptive analytics helps organizations:_

A) Predict future trends

B) Summarize historical data ✅

C) Recommend optimal actions

D) Identify hidden patterns


5. Data Integrity Controls

_Which control is MOST effective to prevent unauthorized alterations of financial data?_

A) Data encryption at rest

B) Digital signatures ✅

C) Regular backups

D) Network intrusion detection


6. Data Mining

_The “association rule learning” technique in data mining is used to:_

A) Classify data into predefined categories

B) Discover relationships between variables ✅

C) Reduce dataset dimensionality

D) Perform statistical hypothesis testing


7. Data Warehouse & Data Mart

_Data marts typically serve which of the following purposes?_

A) Store all enterprise data in raw form

B) Provide department‑specific analytical data ✅

C) Replace operational databases

D) Perform real‑time transaction processing


8. Cloud Computing Models

_In which cloud service model does the provider manage the operating system, middleware, and runtime?_

A) IaaS

B) PaaS ✅

C) SaaS

D) Hybrid cloud


9. Computer Bug vs. Virus

_A “bug” in software typically results from:_

A) Intentional malicious code

B) Unintentional programming error ✅

C) Hardware failure

D) User negligence


10. Data Redundancy

_Controlled redundancy in a database improves:_

A) Storage cost efficiency

B) Fault tolerance ✅

C) Processing speed exclusively

D) Complexity of queries


11. Data Life Cycle – Retention

_During which phase are data retention policies defined?_

A) Creation

B) Usage

C) Retention ✅

D) Disposal


12. Data Visualization

_Which chart type is BEST for showing trends over time?_

A) Pie chart

B) Line chart ✅

C) Scatter plot

D) Heat map


13. Application Controls – Input Controls

_Which of the following validates that a date entry falls within a permissible range?_

A) Check digit

B) Reasonableness check ✅

C) Hash total

D) Authorization check


14. Cloud Data Security

_When data resides in a public cloud, which party is primarily responsible for physical security of the data center?_

A) Cloud customer

B) Cloud provider ✅

C) Third‑party auditor

D) End‑users


15. Data Science Lifecycle (CRISP‑DM)

_Which step follows “Data Understanding” in the CRISP‑DM methodology?_

A) Business Understanding

B) Data Preparation ✅

C) Modeling

D) Evaluation


*Answers Key*

1‑C, 2‑C, 3‑C, 4‑B, 5‑B, 6‑B, 7‑B, 8‑B, 9‑B, 10‑B, 11‑C, 12‑B, 13‑B, 14‑B, 15‑B


www.gmsisuccess.in